SAP Basis CONSIDER WITH EXTERNAL SERVICES PROVIDERS

Direkt zum Seiteninhalt
CONSIDER WITH EXTERNAL SERVICES PROVIDERS
SHAPING ARCHITECTURE POLICIES
Another way to secure your gateway using the SAP standard is to encrypt communication using Secure Network Communication (SNC). In the case of unprotected data communication paths between different client and server components of the SAP system that use the SAP protocol RFC or DIAG, the data exchange takes place in plain text and there is a risk that this can be read. With the help of SNC, you can create end-to-end encryption (E2EE), which can be used to secure communication between two components, such as between the application server and SAP GUI. In addition, SNC encryption provides the basis for using SAP Single Sign-On (SSO) as a security solution, which significantly reduces the internal effort of password management.

This is key to leveraging SAP's simplification plan. Since the release of SAP HANA, SAP has worked to simplify the system.
Missing result documentation
The tasks of a company's own SAP Basis department are currently undergoing enormous change, as SAP is also increasingly relying on cloud services. Strategically, completely self-hosted SAP systems are becoming rarer and the proportion of customers using an SAP system from the cloud is increasing. The new roles of SAP Basis employees tend to be "enablers" and coordinators between the cloud provider and internal IT and the business departments. Until that time comes, companies can also rely on external service providers to offer expert know-how as well as operational support for the transition period.

In order to reduce the complexity of the SAP basis operation and to accelerate and simplify the tasks of the SAPBasis and to create free capacities, standardisation and automation of the existing activities is required. Details can be found in chapters 7.7 and 9.5 of the Master's thesis.

"Shortcut for SAP Systems" is a PC application that simplifies or even facilitates many activities in the SAP base.

The use of eCATT and CATT should also be at least restricted, as allowing them can lead to significant database changes.

Run RSEPSUPL in the target system.
SAP Corner
Zurück zum Seiteninhalt