Posted by : Unknown Wednesday, April 2, 2014

General SAP R/3 Security Administration Documents
































































































































































































































































































TopicFileDescription
R/3 Role Design TipsUSVAR TableProvides Org values for all Org which one can use in SUIM to find out roles which contain those org values
Designing Roles
external image pdf.gif

Security Design Concepts


A presentation on responsibility of Security provided by Pandya, Snehal , nice system risk matrix.
Designing Roles
external image pdf.gif

Authorization Design


A presentation provided by Pandya, Snehal on role design.
Upgrade
external image doc.gif

SAP Security Upgrade White Paper


Upgrading to Role Based Profiles
SOD
external image xls.gif

Segregation of Duties Matrix


This was written by SAP and is based on transactions level authorizations
Business Warehouse
external image pdf.gif

bw30reportingauth.pdf


Business Warehouse Security Overview
Business Warehouse
external image pdf.gif

bwauthconcepts_JUDI_1204.pdf


Business Warehouse Security Overview
Business Warehouse
external image htm.gif

Training Document for Learning BW Security


I am writing this document as I have time.

Gary Morris
HR Structural Authorizations
external image doc.gif

Structural Authorizations Step By Step


HR Security Doc by Norm and Carl provided by Amy Sue Lambermont. Thanks Amy!
Security Setup
external image doc.gif

System Parameters


System Parameters related to security
Training Ids
external image ppt.gif

Creating Users Script


Step by Step Guide to setting up Training IDs and setting same password, Woo Hoo!!
RBE
external image doc.gif

Using the RBE Tool for Security


A document from Larry Justice on How to use the RBE tool for Security
AIS
external image ppt.gif

AIS Strategy.ppt


A ppt on Implementing an AIS strategy for auditing.
Controls
external image ppt.gif

Configurable Controls.ppt


A ppt on configurable controls
ESS
external image ppt.gif

Security for ESS.ppt


a ppt on Security for Employee Self Service and Manager’s Desktop
R/3 Security Overview
external image ppt.gif

SecurityFoundations.ppt


A ppt on R/3 Security Foundational Information
R/3 Security Design
external image ppt.gif

Security Design.ppt


A PPT from Coke on R/3 Security Design
R/3 Security Overview
external image ppt.gif

Security foundation.ppt


A ppt on foundational R/3 security information
R/3 Security Overview
external image doc.gif

SAP Audit Information


foundational R/3 security information
R/3 Security Overview
external image doc.gif

SAP Security



Security Tools
external image ppt.gif

Toolstocontrolrisk.ppt


A PPT on tools to mitigate Risks in R/3
Security Administration
external image ppt.gif

UserSecurityDelta.ppt


A ppt on User & Security Administration for e-Procurement at Delta Air Lines
Security Administration
external image zip.gif

Authorizations made easy 45A/B


The Authorization Made Easy Guide for 45A/B
Workplace
external image ppt.gif

DWorkplacesecurity.ppt


A ppt on Workplace Security


external image pdf.gif

SAP_System_Parameters.pdf



Workplace
external image ppt.gif

WorkplaceSSO.ppt


A ppt on Workplace Single Sign On
User Buffers
external image htm.gif

auth/new_buffering


Info on auth/new_buffering
Authorization Objects
external image htm.gif

User Administration Authorizations


Critical Authorization Objects that control User administration access
Third Party Tools
external image ppt.gif

BindviewSAPControl overview.ppt


Overview of the Bindview Control product
Third Party Tools
external image ppt.gif

bv_sap_sample_reports.ppt


Sample Bindview Control Reports
Third Party Tools
external image ppt.gif

bv-ControlSAPds1.pdf


Bindview Information
Third Party Tools
external image doc.gif

bvcvsSAP.doc


Bindview Information
Third Party Tools
external image pdf.gif

SAPCaseStudy.pdf


Bindview Information
CUA
external image ppt.gif

CentralUserAdmin.ppt


A ppt on Central User Administration
CUA
external image htm.gif

Quick run through of how to setup


A quick list of how to setup CUA
CUA
external image ppt.gif

Central User Administration


A ppt on Central User Administration management
CUA
external image ppt.gif

Delta Central User Admin.ppt


A ppt of Central User Administration at Delta Airlines
CUA
external image pdf.gif

personeldevcua.pdf


A pdf by P.M.V. Subba Rao
RBE
external image doc.gif

STEPS TO GENERATE RBE EXTRACT FILE


Document on using the RBE tool to analyze transaction usage.
Security Audit Logs
external image doc.gif

Format of Security Audit Log Files



Security Audit Logs
external image pdf.gif

SECAUDLOGONLINE_EN.pdf


SAP Manual on Security Audit Logs
Security Audit Logs
external image txt.gif

sec_audit_log_param.txt


Setup Security Audit Logs
SAP Security Guide Ver 3
external image zip.gif

secguide.zip (unzip and use index as starting page)


The Official SAP Security Guide Version 3
Security Audit Logs
external image htm.gif

Security Audit Logging with SM19


All the steps needed to setup Security Audit Logging
Security Audit Logs
external image htm.gif

Security Audit Log Filters SM19


SM19 Enabling Dynamic Filters for Security Audit Logs Example
Security Audit Logs
external image htm.gif

Analyzing Security Audit Logs


SM20 Analyzing Security Audit Logs Examples
Security Audit Logs
external image txt.gif

sap_note_135210_secAudLog.txt


Why the Security Audit Logs lose their Settings when system reboots
Tips
external image txt.gif

Resetting SAP*


ABAP Code for resetting SAP* password across all clients
SAP Security Guide Ver 3
external image pdf.gif

sapsecurityguidever3.pdf



SAP Security Guide Ver 2
external image pdf.gif

securtyguidever2vol3checklists.pdf


SAP Security Checklists
Security Administration
external image pdf.gif

business_user_adm_mysap.pdf



Workplace
external image ppt.gif

Roles workplace.ppt



CRM
external image pdf.gif

CRM_AUTH_20C.pdf



All Activities
external image xls.gif

tact.xls


Table TACT
Security Adminsitration
external image pdf.gif

Users_and_Roles_620.pdf



Designing Roles
external image htm.gif

Security Naming Convention



Secure OS
external image pdf.gif

SECUREOSSEN.pdf



Security Overview
external image ppt.gif

System Security Overview.ppt







SAP documents

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Popular Post

Followers

Powered by Blogger.

- Copyright © 2013 oJAYo SAP training -Metrominimalist- Powered by Blogger - Designed by Johanes Djogan | Distributed by Rocking Templates -