- Back to Home »
- SAP documents
Posted by : Unknown
Wednesday, April 2, 2014
General SAP R/3 Security Administration Documents
Topic | File | Description | ||
R/3 Role Design Tips | USVAR Table | Provides Org values for all Org which one can use in SUIM to find out roles which contain those org values | ||
Designing Roles | A presentation on responsibility of Security provided by Pandya, Snehal , nice system risk matrix. | |||
Designing Roles | A presentation provided by Pandya, Snehal on role design. | |||
Upgrade | SAP Security Upgrade White Paper | Upgrading to Role Based Profiles | ||
SOD | This was written by SAP and is based on transactions level authorizations | |||
Business Warehouse | Business Warehouse Security Overview | |||
Business Warehouse | Business Warehouse Security Overview | |||
Business Warehouse | Training Document for Learning BW Security | I am writing this document as I have time. Gary Morris | ||
HR Structural Authorizations | Structural Authorizations Step By Step | HR Security Doc by Norm and Carl provided by Amy Sue Lambermont. Thanks Amy! | ||
Security Setup | System Parameters related to security | |||
Training Ids | Step by Step Guide to setting up Training IDs and setting same password, Woo Hoo!! | |||
RBE | Using the RBE Tool for Security | A document from Larry Justice on How to use the RBE tool for Security | ||
AIS | AIS Strategy.ppt | A ppt on Implementing an AIS strategy for auditing. | ||
Controls | A ppt on configurable controls | |||
ESS | Security for ESS.ppt | a ppt on Security for Employee Self Service and Manager’s Desktop | ||
R/3 Security Overview | A ppt on R/3 Security Foundational Information | |||
R/3 Security Design | A PPT from Coke on R/3 Security Design | |||
R/3 Security Overview | A ppt on foundational R/3 security information | |||
R/3 Security Overview | foundational R/3 security information | |||
R/3 Security Overview | ||||
Security Tools | A PPT on tools to mitigate Risks in R/3 | |||
Security Administration | A ppt on User & Security Administration for e-Procurement at Delta Air Lines | |||
Security Administration | Authorizations made easy 45A/B | The Authorization Made Easy Guide for 45A/B | ||
Workplace | A ppt on Workplace Security | |||
Workplace | A ppt on Workplace Single Sign On | |||
User Buffers | Info on auth/new_buffering | |||
Authorization Objects | User Administration Authorizations | Critical Authorization Objects that control User administration access | ||
Third Party Tools | BindviewSAPControl overview.ppt | Overview of the Bindview Control product | ||
Third Party Tools | Sample Bindview Control Reports | |||
Third Party Tools | Bindview Information | |||
Third Party Tools | Bindview Information | |||
Third Party Tools | Bindview Information | |||
CUA | A ppt on Central User Administration | |||
CUA | Quick run through of how to setup | A quick list of how to setup CUA | ||
CUA | A ppt on Central User Administration management | |||
CUA | A ppt of Central User Administration at Delta Airlines | |||
CUA | A pdf by P.M.V. Subba Rao | |||
RBE | STEPS TO GENERATE RBE EXTRACT FILE | Document on using the RBE tool to analyze transaction usage. | ||
Security Audit Logs | Format of Security Audit Log Files | |||
Security Audit Logs | SAP Manual on Security Audit Logs | |||
Security Audit Logs | Setup Security Audit Logs | |||
SAP Security Guide Ver 3 | secguide.zip (unzip and use index as starting page) | The Official SAP Security Guide Version 3 | ||
Security Audit Logs | Security Audit Logging with SM19 | All the steps needed to setup Security Audit Logging | ||
Security Audit Logs | Security Audit Log Filters SM19 | SM19 Enabling Dynamic Filters for Security Audit Logs Example | ||
Security Audit Logs | SM20 Analyzing Security Audit Logs Examples | |||
Security Audit Logs | Why the Security Audit Logs lose their Settings when system reboots | |||
Tips | ABAP Code for resetting SAP* password across all clients | |||
SAP Security Guide Ver 3 | ||||
SAP Security Guide Ver 2 | securtyguidever2vol3checklists.pdf | SAP Security Checklists | ||
Security Administration | ||||
Workplace | ||||
CRM | ||||
All Activities | Table TACT | |||
Security Adminsitration | ||||
Designing Roles | ||||
Secure OS | ||||
Security Overview |
SAP documents