- Back to Home »
- SAP documents
Posted by : Unknown
Wednesday, April 2, 2014
General SAP R/3 Security Administration Documents
| Topic | File | Description | ||
| R/3 Role Design Tips | USVAR Table | Provides Org values for all Org which one can use in SUIM to find out roles which contain those org values | ||
| Designing Roles | A presentation on responsibility of Security provided by Pandya, Snehal , nice system risk matrix. | |||
| Designing Roles | A presentation provided by Pandya, Snehal on role design. | |||
| Upgrade | SAP Security Upgrade White Paper | Upgrading to Role Based Profiles | ||
| SOD | This was written by SAP and is based on transactions level authorizations | |||
| Business Warehouse | Business Warehouse Security Overview | |||
| Business Warehouse | Business Warehouse Security Overview | |||
| Business Warehouse | Training Document for Learning BW Security | I am writing this document as I have time. Gary Morris | ||
| HR Structural Authorizations | Structural Authorizations Step By Step | HR Security Doc by Norm and Carl provided by Amy Sue Lambermont. Thanks Amy! | ||
| Security Setup | System Parameters related to security | |||
| Training Ids | Step by Step Guide to setting up Training IDs and setting same password, Woo Hoo!! | |||
| RBE | Using the RBE Tool for Security | A document from Larry Justice on How to use the RBE tool for Security | ||
| AIS | AIS Strategy.ppt | A ppt on Implementing an AIS strategy for auditing. | ||
| Controls | A ppt on configurable controls | |||
| ESS | Security for ESS.ppt | a ppt on Security for Employee Self Service and Manager’s Desktop | ||
| R/3 Security Overview | A ppt on R/3 Security Foundational Information | |||
| R/3 Security Design | A PPT from Coke on R/3 Security Design | |||
| R/3 Security Overview | A ppt on foundational R/3 security information | |||
| R/3 Security Overview | foundational R/3 security information | |||
| R/3 Security Overview | ||||
| Security Tools | A PPT on tools to mitigate Risks in R/3 | |||
| Security Administration | A ppt on User & Security Administration for e-Procurement at Delta Air Lines | |||
| Security Administration | Authorizations made easy 45A/B | The Authorization Made Easy Guide for 45A/B | ||
| Workplace | A ppt on Workplace Security | |||
| Workplace | A ppt on Workplace Single Sign On | |||
| User Buffers | Info on auth/new_buffering | |||
| Authorization Objects | User Administration Authorizations | Critical Authorization Objects that control User administration access | ||
| Third Party Tools | BindviewSAPControl overview.ppt | Overview of the Bindview Control product | ||
| Third Party Tools | Sample Bindview Control Reports | |||
| Third Party Tools | Bindview Information | |||
| Third Party Tools | Bindview Information | |||
| Third Party Tools | Bindview Information | |||
| CUA | A ppt on Central User Administration | |||
| CUA | Quick run through of how to setup | A quick list of how to setup CUA | ||
| CUA | A ppt on Central User Administration management | |||
| CUA | A ppt of Central User Administration at Delta Airlines | |||
| CUA | A pdf by P.M.V. Subba Rao | |||
| RBE | STEPS TO GENERATE RBE EXTRACT FILE | Document on using the RBE tool to analyze transaction usage. | ||
| Security Audit Logs | Format of Security Audit Log Files | |||
| Security Audit Logs | SAP Manual on Security Audit Logs | |||
| Security Audit Logs | Setup Security Audit Logs | |||
| SAP Security Guide Ver 3 | secguide.zip (unzip and use index as starting page) | The Official SAP Security Guide Version 3 | ||
| Security Audit Logs | Security Audit Logging with SM19 | All the steps needed to setup Security Audit Logging | ||
| Security Audit Logs | Security Audit Log Filters SM19 | SM19 Enabling Dynamic Filters for Security Audit Logs Example | ||
| Security Audit Logs | SM20 Analyzing Security Audit Logs Examples | |||
| Security Audit Logs | Why the Security Audit Logs lose their Settings when system reboots | |||
| Tips | ABAP Code for resetting SAP* password across all clients | |||
| SAP Security Guide Ver 3 | ||||
| SAP Security Guide Ver 2 | securtyguidever2vol3checklists.pdf | SAP Security Checklists | ||
| Security Administration | ||||
| Workplace | ||||
| CRM | ||||
| All Activities | Table TACT | |||
| Security Adminsitration | ||||
| Designing Roles | ||||
| Secure OS | ||||
| Security Overview |
SAP documents