Error minimization & data security
REGULAR PARTICIPATION IN INFORMATION EVENTS
Especially after security incidents it may be necessary to find out which (technical) users have logged in at which time. The USR02 table provides a first entry point. In the TRDAT column you can find the last login date for the user you want. However, a history of previous applications is not found in this table. In such cases, the Security Auditlog or SAL helps. Preparation In order to access the desired data, it must also have been saved previously. In the Security Auditlog, you can use various filters to determine which users are logged on which client and which information. The Security Auditlog stores, depending on configuration, logins, RFC calls, and other actions for specific users. You can make these settings in the SM19 transaction. Note: Logging user activity must be aware of the users concerned! Configure the SAL only for technical users or in consultation with users / works council / etc. It can be seen there among other things when the SAL was activated and last edited (1). You can also select the various filters (2), activate the filters individually (3), specify clients and users (4) and specify which activities are logged (5). Static configuration in the SM19 Under the Dynamic Configuration you can also see if SAL is currently active for the system. Determine the status of the SAL Evaluation of the SAL If the Security Audit Log is active, switch to the SM20 evaluation of the Security Audit Log. Select the desired user and client and the appropriate time window. The option Dialogues login is sufficient for the login. Then, restart the AuditLog analysis. Start evaluation You will get an overview of the user's login to the selected client of the system.
No matter whether a change of the operating system or the database used is pending or a move of the SAP system as well as a migration to SAP HANA has to be completed - we are your experts. We create a plan together with you and migrate your SAP system within the shortest possible time. Our services:
You can control the access rights as usual. The big advantage of CMC tab configuration is that you can easily grant or withdraw group access to specific tabs. This gives you the ability to prepare background access permissions and then unlock all permissions by clicking on the CMC tab configuration. On the other hand, this allows you to remove accesses without having to edit any existing permissions. Have you already experienced CMC tab configuration or have questions about the application? I welcome any suggestions you may make as a comment.
The definition, organisational structure as well as the naming of the SAP basis is historically conditioned by previous SAP software versions and components. This also results in the perception of the SAP basis and the related focus of the SAP NetWeaver and the ABAP system core, which is still widely used today. However, the scope of activities has changed significantly in terms of tasks and technology and will continue to change in view of SAP's perspective and product strategy and the changing roles of IT. In order to accommodate this change and to change perceptions both in the overall context of the SAP ecosystem and within its own company, the SAP basis must develop a new self-understanding and establish a marketing for the publication of its own performance. The underlying information can be found in the master thesis in chapters 7.4 and 9.2.
"Shortcut for SAP Systems" makes many tasks in the area of the SAP basis much easier.
A less good choice is the test automation for frequently changing software or processes, because the maintenance effort can be enormous.
Using the DBACOCKPIT, it is not possible to create entire table structures using Create Table.