Aufbau der SAP Basis
Either temporary programme calls are blocked that are actually desired or enormously large gateway logs must be analysed. If, due to the heavy workload, one were to decide to forgo the use of the access control lists permanently, this would be a major security vulnerability. The unprotected system does not have any limitations on the external services that may register, and there are no rules for running programmes. One possible consequence would be, for example, the registration of an external system on which malicious programmes exist. At the moment when foreign programmes are running on your system without any control, you can expect that great damage will be done. For example, it ranges from an unnoticed reading of purchase and sales figures, a diversion of funds, to a paralysis or manipulation of the entire system. In addition, this scenario is also possible for poorly maintained access control lists. Our solution: secinfo and reginfo Generator for SAP RFC Gateway To solve the problem, we have developed a generator that can automatically create secinfo and reginfo files based on gateway logs. The basic idea is based on the logging-based approach. It performs the task of time-consuming analysis of log files and also ensures maximum reliability through automation. Nevertheless, the entries of the generated files should be checked by one person. Since the log files used as input are sensitive data, of course none of the inserted data leave your system. More information about the generator can be found here.
We actively support you in the migration of operating systems and databases. The optimization of time-critical processes guarantees a smooth process.
SAP Solution Manager
Critical business processes require a secure, efficient and stable operation of an SAP system landscape. High demands on the management as well as the operation of the underlying SAP NetWeaver platform require competent support in all tasks of planning, support and updating of the SAP Basis. The increase in installed components as well as systems integrated via interfaces expands these needs. Only with professional care and maintenance of its components can SAP NetWeaver bring its advantages as an integrative platform to bear.
You can control the access rights as usual. The big advantage of CMC tab configuration is that you can easily grant or withdraw group access to specific tabs. This gives you the ability to prepare background access permissions and then unlock all permissions by clicking on the CMC tab configuration. On the other hand, this allows you to remove accesses without having to edit any existing permissions. Have you already experienced CMC tab configuration or have questions about the application? I welcome any suggestions you may make as a comment.
Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.
Both have advantages and disadvantages, which I would like to explain in the following.
Since it has already been completed, ignore the hint and select Next.