Sunday 11 September 2011

Is there any major difference between SAP Security adminis

Is there any major difference between SAP Security administration functions between different SAP SYSTEMS

 SAP Security and basis are common thread of people who will be involved in all the sap systems. It can be Portal, BI SRM CRM ECC etc.  Since all the systems will need access restrictions within the system. So there will be a need for SAP Security administrators for all the systems.

Is there any major difference between SAP Security administrations between different SAP SYSTEMS?

Let us say you are driving Hyundai Car for past two years. You now understand where all the different controls are located and you very comfortable with driving the car. You also know the common problems or preventive measures you need to take base on the type and make of the car,  like when to change the tire, when check for tire pressure, when to change new tires, when to do tune-ups etc. Let us say now you are given a Toyota Minivan to drive and do you think you will be difficult to drive. Of course you cannot jump into the van and drive. You need to look at where all the controls are located, ask the previous owner for some of the tips and tricks, and all the options available.

Please watch the SAP demo training for preparing you for SAP Openings

SAP GRC Training -About the Training
httpv://www.youtube.com/watch?v=ypX6oa_ObF8


Logging on to SAP and Basic Introduction
httpv://www.youtube.com/watch?v=fyFuOLIqR2A

SAP Online Training-SU24 Object Status
httpv://www.youtube.com/watch?v=bu03bCmMzSM

Browsing SAP Tables for Audit Compliance

httpv://www.youtube.com/watch?v=ZtRYSizs6w0

Creating and scheduling SAP Batch Jobs in SAP System

httpv://www.youtube.com/watch?v=G5DJqLMPsHQ

SAP GRC features: Ruining Batch job to check for risk in the roles or users Daily

httpv://www.youtube.com/watch?v=pMSPK9kDLSc

This same concept applies to SAP Security. Once you learn SAP Security for SAP ECC. The general concepts of trouble shooting techniques, SAP authorization concept, tracing for missing authorization, analyzing the error logs, applies to all the SAP Systems line SAP SEM, SAP SRM, SAP PLM SAP BI etc. Each of them have little twist and something new functionality but the general concept remains the same.  For example restricting data in BI or BOBJ needs to be done at the info object level and SRM the data to the vendors has to be restricted at the hierarchy level.

In a company environment when the company has multiple systems they want the all the SAP security administrators to manage all the systems since they want everyone to have some knowledge about the all SAP Systems. Once the client is live with all the SAP system they want them to support these systems.  They could be on call and they should be able to understand the problem and resolve the issues 

www.SapSecurityTrainer.com

SAP GRC and Audit Compliance Security Training

Download attached file(s)

No comments:

Post a Comment