SE16N and SAP_EDIT
This is a continuation of the many different articles on this blog around security around tables. However, the articles till
Read MoreLearn SAP Security & Authorizations Concepts
This is a continuation of the many different articles on this blog around security around tables. However, the articles till
Read MoreMy apologies if the title of the post make no sense. Probably that’s because of the relatively niche nature of
Read MoreThe PRGN_CUST tables contains entries for a number of switches which can affect the default behavior of various security transactions.
Read MoreSAP provides two different ways of securing OLAP data in BW. The first is the traditional, and till BW 3.5
Read MoreIn a large organization using structural authorizations, the PD profiles assigned to a user might return thousands of distinct objects.
Read MorePD profiles can be assigned to users in two basic ways Transaction OOSB can be used to assign one or
Read MorePD profiles are created through the OOSP transaction. SAP provides a few standard profiles but to a large extent, PD
Read MoreStructural Authorizations as the name suggests are used to restrict access to a certain organizational structure. As such they are
Read MoreAn Evaluation Path is a chain of relationships between related OM objects in the Organizational Hierarchy. Different evaluation paths can
Read MoreIn our article on SU24, we saw the feasibility of selectively switching off checks for certain authorization objects. However, HR
Read More