Archive for April 2014
SAP Security : 8 things that matter
sap security wiki
sap security tutorials
sap security guide
sap security jobs
sap security training
sap security interview questions
sap security salary
sap security certification
SAP Security : 8 things that matter
SAP Security - 8 things that matter
sap security wiki
sap security tutorials
sap security guide
sap security jobs
sap security training
sap security interview questions
sap security salary
sap security certification
SAP Security - 8 things that matter
Stock transactions
1KEH – EC-PCA: Transfer Material Stocks Enterprice Controlling – Profit Center Accounting
LS26 – Warehouse stocks per material Logistics Execution – Warehouse Management
LT0G – Return delivery to stock Logistics Execution – Warehouse Management
LX02 – Stock list Logistics Execution – Warehouse Management
LX23 – Stock comparison IM – WM Logistics Execution – Warehouse Management
MB52 – List of Warehouse Stocks on Hand MM – Inventory Management
MB53 – Display Plant Stock Availability MM – Inventory Management
MB5B – Stocks for Posting Date MM – Inventory Management
MB5L – List of Stock Values: Balances MM – Inventory Management
MB5T – Stock in transit CC MM – Inventory Management
MBBS – Display valuated special stock MM – Inventory Management
MBLB – Stocks at Subcontractor MM – Inventory Management
MC.1 – INVCO: Plant Anal. Selection: Stock MM – Inventory Controlling
MC50 – INVCO: Analysis of Dead Stock MM – Inventory Controlling
MCNB – BW: Initialize Stock Balances Logistics – Data Collection
MD04 – Display Stock/Requirements Situation PP – Master Data
ME27 – Create Stock Transport Order MM – Purchasing
ME2O – SC Stock Monitoring (Vendor) MM – Purchasing
MM74 – Archive Special Stocks Logistics – Material Master
MMBE – Stock Overview Logistics – Material Master
MS04 – Planning Scenario: Stock/Reqmts List PP – Master Data
OM13 – Control Profile: Stock Transfer PP – KANBAN
OMM8 – Stock Removal Strat. Stringent FIFO Logistics Execution – Other Functions
QAC2 – Transfer stock to insp. lot QM – Quality Inspection
RWBE – Stock Overview Logistics – Material Master
Stock transactions
Vendor transactions
F-43 – Enter Vendor Invoice FI – Financial Accounting
F-44 – Clear Vendor FI – Financial Accounting
F-48 – Post Vendor Down Payment FI – Financial Accounting
F-54 – Clear Vendor Down Payment FI – Financial Accounting
F-90 – Acquisition from purchase w. vendor FI – Basic Functions
FBL1N – Vendor Line Items FI – Information System
FK01 – Create Vendor (Accounting) FI – Financial Accounting
FK02 – Change Vendor (Accounting) FI – Financial Accounting
FK03 – Display Vendor (Accounting) FI – Financial Accounting
FK08 – Confirm Vendor Individually (Acctng) FI – Financial Accounting
FK10N – Vendor Balance Display FI – Financial Accounting
J1INCERT – Print Vendor WH Tax Certificates FI – Localization
LEMA – Dun long-term vendor decl. (vendor) SD – Basic Functions
ME1L – Info Records per Vendor MM – Purchasing
ME2L – Purchase Orders by Vendor MM – Purchasing
ME61 – Maintain Vendor Evaluation MM – Vendor Evaluation
MK01 – Create vendor (Purchasing) FI – Basic Functions
MK02 – Change vendor (Purchasing) FI – Basic Functions
MKVZ – List of Vendors: Purchasing MM – Purchasing
PRAA – Automatic Vendor Maintenance FI – Travel Expenses
XK01 – Create Vendor (Centrally) FI – Basic Functions
XK02 – Change vendor (centrally) FI – Basic Functions
XK03 – Display vendor (centrally) FI – Basic Functions
XK05 – Block Vendor (Centrally) FI – Basic Functions
BD14 – Send vendor Logistics – Vendor Master
Vendor transactions
purchase order transactions
ME21 – Create Purchase Order MM – Purchasing
ME21N – Create Purchase Order MM – Purchasing
ME22 – Change Purchase Order MM – Purchasing
ME22N – Change Purchase Order MM – Purchasing
ME23 – Display Purchase Order MM – Purchasing
ME23N – Display Purchase Order MM – Purchasing
ME24 – Maintain Purchase Order Supplement MM – Purchasing
ME28 – Release Purchase Order MM – Purchasing
ME29N – Release purchase order MM – Purchasing
ME2C – Purchase Orders by Material Group MM – Purchasing
ME2J – Purchase Orders for Project MM – Purchasing
ME2L – Purchase Orders by Vendor MM – Purchasing
ME2M – Purchase Orders by Material MM – Purchasing
ME2N – Purchase Orders by PO Number MM – Purchasing
ME2S – Services per Purchase Order MM – External Services
ME2W – Purchase Orders for Supplying Plant MM – Purchasing
ME91F – Purchase Orders: Urging/Reminders MM – Purchasing
ME9F – Message Output: Purchase Orders MM – Purchasing
MEMASSPO – Mass Change of Purchase Orders MM – Purchasing
MEPO – Purchase Order MM – Purchasing
MWBQ – Purchase order history corr. QM Logistics – Batches
VL10B – Purchase Orders Due for Delivery Logistics Execution – Shipping
WF10 – Collective Purchase Order Logistics – Merchandise Distribution
FMN4N – Reconstruction of Purchase Orders CO – Funds Management
ME1P – Purchase Order Price History MM – Purchasing
purchase order transactions
OJayo helps 7300 students !!!
Last year alone, OJAYO helped over 7300 students learn premium skills from more than 1000+ HD videos.
Highly recommended.
Primarily through word-of-mouth alone, OJAYO has become the world’s #1 SAP online training institute. For the last 10+ years, companies have been switching to OJAYO because it’s famously easy-to-use, reliable, and It Just Works™. Combine that with our best-in-the-biz customer service, and you’ve got a unique and delightful package. Just last week, another 200 students started using OJAYO.
A track record you can trust.
We’ve been in SAP business for 20+ years, so you can depend on us to be here when you need us. We’re profitable, debt-free, and privately owned so we answer to our customers and no one else. Our job is to help you do your job better.
Apple and Android marketplace.
OJAYO’s courses will work at home on Safari (Mac, iPhone/iPad), Chrome (Mac, PC, iPhone/iPad, Android), Firefox (Mac, PC), and IE 9+ (PC, Surface). Official apps are available for the iPhone in the App Store and Android on Google Play.
No “extras” required.
OJAYO runs in the cloud on our secure servers, so you don’t have to mess with anything technical. And with a % uptime record over the last 12 months, OJAYO is rock-solid reliable. If everyone in your group has a web browser or a smartphone, then they already have everything they need to start using OJAYO.
Online HD classes + Q&A.
Who uses OJAYO?
From Students, professionals, freelancers, to small shops, to mid-sized companies, to enormous multinationals, OJAYO is the go-to SAP online training tool for hundreds of thousands of groups world-wide.
Till date, over 10,000 people have used OJAYO at work or for their own personal skill enhancement and knowledge. Ask around, there’s probably already someone at your company who’s used OJAYO before!
Any other questions we can answer?
We do whatever it takes to make sure our customer service is the best in the business. Fast, friendly, knowledgeable, and often hilarious, you’ll feel like old friends in no time. Email us and you’ll get a personal response ASAP!
Give OJAYO a try
All text & design is copyright ©1999-2014 OJAYO. All rights reserved.
OJAYO
Enjoy the rest of your day!
OJayo helps 7300 students !!!
SAP documents
General SAP R/3 Security Administration Documents
Topic | File | Description | ||
R/3 Role Design Tips | USVAR Table | Provides Org values for all Org which one can use in SUIM to find out roles which contain those org values | ||
Designing Roles | A presentation on responsibility of Security provided by Pandya, Snehal , nice system risk matrix. | |||
Designing Roles | A presentation provided by Pandya, Snehal on role design. | |||
Upgrade | SAP Security Upgrade White Paper | Upgrading to Role Based Profiles | ||
SOD | This was written by SAP and is based on transactions level authorizations | |||
Business Warehouse | Business Warehouse Security Overview | |||
Business Warehouse | Business Warehouse Security Overview | |||
Business Warehouse | Training Document for Learning BW Security | I am writing this document as I have time. Gary Morris | ||
HR Structural Authorizations | Structural Authorizations Step By Step | HR Security Doc by Norm and Carl provided by Amy Sue Lambermont. Thanks Amy! | ||
Security Setup | System Parameters related to security | |||
Training Ids | Step by Step Guide to setting up Training IDs and setting same password, Woo Hoo!! | |||
RBE | Using the RBE Tool for Security | A document from Larry Justice on How to use the RBE tool for Security | ||
AIS | AIS Strategy.ppt | A ppt on Implementing an AIS strategy for auditing. | ||
Controls | A ppt on configurable controls | |||
ESS | Security for ESS.ppt | a ppt on Security for Employee Self Service and Manager’s Desktop | ||
R/3 Security Overview | A ppt on R/3 Security Foundational Information | |||
R/3 Security Design | A PPT from Coke on R/3 Security Design | |||
R/3 Security Overview | A ppt on foundational R/3 security information | |||
R/3 Security Overview | foundational R/3 security information | |||
R/3 Security Overview | ||||
Security Tools | A PPT on tools to mitigate Risks in R/3 | |||
Security Administration | A ppt on User & Security Administration for e-Procurement at Delta Air Lines | |||
Security Administration | Authorizations made easy 45A/B | The Authorization Made Easy Guide for 45A/B | ||
Workplace | A ppt on Workplace Security | |||
Workplace | A ppt on Workplace Single Sign On | |||
User Buffers | Info on auth/new_buffering | |||
Authorization Objects | User Administration Authorizations | Critical Authorization Objects that control User administration access | ||
Third Party Tools | BindviewSAPControl overview.ppt | Overview of the Bindview Control product | ||
Third Party Tools | Sample Bindview Control Reports | |||
Third Party Tools | Bindview Information | |||
Third Party Tools | Bindview Information | |||
Third Party Tools | Bindview Information | |||
CUA | A ppt on Central User Administration | |||
CUA | Quick run through of how to setup | A quick list of how to setup CUA | ||
CUA | A ppt on Central User Administration management | |||
CUA | A ppt of Central User Administration at Delta Airlines | |||
CUA | A pdf by P.M.V. Subba Rao | |||
RBE | STEPS TO GENERATE RBE EXTRACT FILE | Document on using the RBE tool to analyze transaction usage. | ||
Security Audit Logs | Format of Security Audit Log Files | |||
Security Audit Logs | SAP Manual on Security Audit Logs | |||
Security Audit Logs | Setup Security Audit Logs | |||
SAP Security Guide Ver 3 | secguide.zip (unzip and use index as starting page) | The Official SAP Security Guide Version 3 | ||
Security Audit Logs | Security Audit Logging with SM19 | All the steps needed to setup Security Audit Logging | ||
Security Audit Logs | Security Audit Log Filters SM19 | SM19 Enabling Dynamic Filters for Security Audit Logs Example | ||
Security Audit Logs | SM20 Analyzing Security Audit Logs Examples | |||
Security Audit Logs | Why the Security Audit Logs lose their Settings when system reboots | |||
Tips | ABAP Code for resetting SAP* password across all clients | |||
SAP Security Guide Ver 3 | ||||
SAP Security Guide Ver 2 | securtyguidever2vol3checklists.pdf | SAP Security Checklists | ||
Security Administration | ||||
Workplace | ||||
CRM | ||||
All Activities | Table TACT | |||
Security Adminsitration | ||||
Designing Roles | ||||
Secure OS | ||||
Security Overview |
SAP documents