SAP Security and basis are common thread of people who will be involved in all the sap systems. It can be Portal, BI SRM CRM ECC etc. Since all the systems will need access restrictions within the system. So there will be a need for SAP Security administrators for all the systems.
Is there any major difference between SAP Security administrations between different SAP SYSTEMS?Let us say you are driving Hyundai Car for past two years. You now understand where all the different controls are located and you very comfortable with driving the car. You also know the common problems or preventive measures you need to take base on the type and make of the car, like when to change the tire, when check for tire pressure, when to change new tires, when to do tune-ups etc. Let us say now you are given a Toyota Minivan to drive and do you think you will be difficult to drive. Of course you cannot jump into the van and drive. You need to look at where all the controls are located, ask the previous owner for some of the tips and tricks, and all the options available.Please watch the SAP demo training for preparing you for SAP OpeningsSAP GRC Training -About the Training
httpv://www.youtube.com/watch?v=ypX6oa_ObF8
Logging on to SAP and Basic Introduction
httpv://www.youtube.com/watch?v=fyFuOLIqR2A
SAP Online Training-SU24 Object Status
httpv://www.youtube.com/watch?v=bu03bCmMzSM
Browsing SAP Tables for Audit Compliance
httpv://www.youtube.com/watch?v=ZtRYSizs6w0
Creating and scheduling SAP Batch Jobs in SAP System
httpv://www.youtube.com/watch?v=G5DJqLMPsHQ
SAP GRC features: Ruining Batch job to check for risk in the roles or users Daily
httpv://www.youtube.com/watch?v=pMSPK9kDLSc
This same concept applies to SAP Security. Once you learn SAP Security for SAP ECC. The general concepts of trouble shooting techniques, SAP authorization concept, tracing for missing authorization, analyzing the error logs, applies to all the SAP Systems line SAP SEM, SAP SRM, SAP PLM SAP BI etc. Each of them have little twist and something new functionality but the general concept remains the same. For example restricting data in BI or BOBJ needs to be done at the info object level and SRM the data to the vendors has to be restricted at the hierarchy level.In a company environment when the company has multiple systems they want the all the SAP security administrators to manage all the systems since they want everyone to have some knowledge about the all SAP Systems. Once the client is live with all the SAP system they want them to support these systems. They could be on call and they should be able to understand the problem and resolve the issues www.SapSecurityTrainer.comSAP GRC and Audit Compliance Security TrainingDownload attached file(s)
No comments:
Post a Comment