E N D
CONTACT US: SPECTO TRAINING INDIA +91-9533456356 USA :+1-847-787-7647 info@spectoittraining.com www.spectoittraining.com www.saponlinetraining.in https://www.facebook.com/spectoittraining/ http://www.saponlinetraining.in/sap-security-online-training www.spectoittraining.com
Sap security online training • Sap apo online training in usa • Sap apo online training in uk • Sap apo online training in australia • Sap apo online training in canada • Sap apo online training in pune • Sap apo online training in singapore • Sap apo online training in south africa • Sap apo online training in dubai • Sap apo online training in malaysia • Sap apo online training in india • Sap apo online training in mumbai www.spectoittraining.com
Sap security online training • Online classes on sap security in uk • Live classes on sap security in usa • Training classes on sap security in australia • Learn best tutorial on sap security in london • The best training course on sap security in usa • Best tutorials on sap security training in canada • Sap security training classes by real time experts • Sap security training in hyderabad www.spectoittraining.com
SAP Security Online Training Introduction • What is Security • Building blocks • Common terminologies used Most Common • tools in Security • CUA www.spectoittraining.com
Sap security online training www.spectoittraining.com
SAP Security Online Training • Building Blocks • User Master • Record Roles • Profiles Authorization • Objects www.spectoittraining.com
SAP Security Online Training • Roles and Profiles Roles is group of tcode (s), which is used to perform a specific business task. • Each role requires specific privileges to perform a function in SAP that is called AUTHORIZATIONS There are 3 types of Roles: • Single – an independent Role • Derived – has a parent and differs only in Organization Levels. Maintain Transactions, Menu, Authorizations only at the parent level • Composite – container that contains one or more Single or Derived Roles www.spectoittraining.com
SAP Security Online Training Authorization Objects • Authorization Objects are the keys to SAP security • When you attempt actions in SAP the system checks to see whether you have the appropriate Authorizations • The same Authorization Objects can be used by different Transactions www.spectoittraining.com
SAP Security Online Training User Buffer? • When a User logs into the system, all of the Authorizations that the User has are loaded into a special place in memory called the User Buffer • As the User attempts to perform activities, the system checks whether the user has the appropriate Authorization Objects in the User Buffer. • You can see the buffer in Transaction . www.spectoittraining.com
CONTACT US: SPECTO TRAINING INDIA +91-9533456356 USA :+1-847-787-7647 info@spectoittraining.com www.spectoittraining.com www.saponlinetraining.in https://www.facebook.com/spectoittraining/ http://www.saponlinetraining.in/sap-security-online- training