SAP Basis Database management, database export and database import

Direkt zum Seiteninhalt
Database management, database export and database import
Connect and configure printers and other peripheral devices
SAP Basis Operation manages the IT underlying the SAP system. In addition, the operation ensures the maintenance and availability of business processes. Various tools can be used for this purpose, which take over the maintenance, care, configuration and monitoring of the SAP system. Basic operation is the prerequisite for ensuring that the SAP system is fully operational and covers the business processes well.

Another important example is the reading permission for TemSe objects. The temporary files are often forgotten, because it is often not considered that cached (strictly) sensitive data, which is intended for only one user (owner), can be viewed by another user without permission - and across clients. The examples mentioned show us how important it is to carefully assign permissions for client-independent transactions. Download Transaction tables The transactions that enable the examples above, including certain expressions of the associated permission objects and our recommendations for them, can be found in the file "Critical cross-client permissions" for download. Other client-independent transactions are located in the Cross Clients TCODES file. The criticality of these transactions should be assessed according to the context. I recommend always being careful and keeping these transactions in mind.
Unicode Conversion
As a member of the SAP Basis specialist team, your responsibilities will include the design, operation, administration, support and installation of an extensive SAP system landscape with over 50 systems for 17 universities and 2 institutions in Lower Saxony. Furthermore, you will monitor the SAP system landscape as well as its interfaces to external systems and carry out measures within the scope of software lifecycle management (e.g. note maintenance, support stacks, release upgrades) and change management (e.g. hardware migration, transport system and documentation). As part of the SAP Basis team, you will be the contact person for organizational and technical questions of the universities and in 3rd-level support for user inquiries.

This access method depends solely on the rights assigned to the user. System users: Users of this user group are comparable to SAP*. They act as administrator in the system. Therefore, they should be deactivated / set to inactive as soon as possible, as soon as the system operation is ensured. You should still be aware of the SAP ERP environment to address this security risk. In a HANA system, there are privileges instead of permissions. The difference is first of all in terms of terminology. Nevertheless, the permissions are assigned differently (directly / indirectly) via the assignment of roles. These are thus accumulations of privileges. As in older SAP systems, system users must be disabled and certain roles that already exist must be restricted. Compared to an SAP ERP system, small apps are allowed instead of large applications. In this case, attention should be paid to an individual authorisation. It should be a matter of course for users to have implemented secure password rules. Settings Securing the system also means securing the underlying infrastructure. Everything from the network to the host's operating system must be secured. When looking at the system landscape, it is striking that the new technology brings many connections that need to be secured. The SAP Gateway, which is responsible for the connection between backend and frontend, is also a security risk and must be considered. All security settings of existing and future components must be validated to HANA compatibility. Secure communication of connections is obtained when you restrict access where possible. Encryption of the data of a HANA system is disabled by default. Be sure to encrypt sensitive data anyway. Especially data that is archived. If an attack is made on your system, you should be able to run forensic analysis, so you should enable the audit log. Moreover, few users should have access to it.

The "Shortcut for SAP Systems" tool is ideal for doing many tasks in the SAP basis more easily and quickly.

At this point, the SAP Solution Manager offers extensive opportunities to manage templates and result documents centrally and in the individual test plans.

Using HTTPS instead of HTTP is one of the basics.
SAP Corner
Zurück zum Seiteninhalt