SAP Basis Troubleshooting and support (2nd and 3rd level support) - SAP Corner

Direkt zum Seiteninhalt
Troubleshooting and support (2nd and 3rd level support)
Administration
An understandable and comprehensible strategy enables the SAP basis to derive it as easily as possible to practice and to the resulting requirements and activities. The main task of the SAP basis is to support new business models by implementing the strategy and to show how much technical and financial effort and benefit is generated. It is also the task of the SAP basis to identify the skills and resources necessary for them and to ensure their existence at an early stage.

Significant changes have also been brought about by SAP's cloud strategy. For example, the latest products such as SAP HANA and SAP S/4HANA are available entirely as cloud solutions.
Provision of the services and basics
In addition to scanning and identifying the respective security vulnerabilities of a program, it is also possible to stop tasks that are to be transported to other SAP systems with security vulnerabilities in the further transport process This applies, for example, to the CHARM process based on SAP Solution Manager. This forces a programmer to securely check the programs he or she is responsible for according to the same security criteria. If a program then still has security problems, it can either be released via the dual control principle or returned for further processing. Do you know of any other solutions for improving ABAP code security or have you already gained experience with the products mentioned above? I look forward to your comments!

If the user assignment of several transactions is to be verified, where it is not clear whether all transactions have been maintained in the menu of roles, the use of the transaction SE16N is always appropriate. Here you can also see the transactions that were assigned to a role only by the S_TCODE permission object. The result also shows which transaction is included in which role. What experience have you had in identifying specific transactions with user assignment? Do you know of any other ways to solve this problem? About your experiences and.

For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.

Preventing weak password hashes The generation of unsafe hash values can be prevented by setting the login/password_downwards_compatibility profile parameter to 0.

SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page: www.sap-corner.de.


The tool is available in the NetWeaver ABAP stack and is based on versions from: 7.0 NetWeaver: in EHP2 SP 14 or higher / 7.0 NetWeaver: in EHP3 SP 09 or higher / 7.3 NetWeaver: in EHP1 SP 09 or higher / 7.4 NetWeaver: in SP05 or higher To use the CVA tool, the execution of system-wide security controls must be enabled with the RSLIN_SEC_LICENSE_SETUP report.
SAP Corner
Zurück zum Seiteninhalt