SE36 Logical Database Builder
Supervision, monitoring SAP® and interface systems
A clearly structured and secure authorization management is very important to avoid errors and prevent access by unauthorized persons. These services are part of our authorization management:
In addition to internal security requirements, national and international guidelines sometimes require all audit and security-related user actions to be recorded. With the Security Audit Log (SAL) you have the possibility to log all changes, e.g. for users, user master records, but also roles and groups.
Client Management
The prerequisite for employment is a relevant university degree (bachelor's degree, FH diploma) preferably in computer science, business informatics, mathematics or a scientific discipline as well as at least three years of practical experience. Ideally, you also have a completed scientific university education (master's degree, university diploma).
In the case of client settings, you should ensure that the production client is protected against overwriting and that changes are only approved via the transport management system (TMS) to ensure traceability. In the interests of system security, changes to repository and client-independent objects should also not be permitted. The use of eCATT and CATT should also be at least restricted, as allowing them can lead to significant database changes.
"Shortcut for SAP Systems" is a PC application that simplifies or even facilitates many activities in the SAP base.
Without automatic generation, the programmes and dynpros are not generated until the first call.
Today, "SAP Basis" often does not mean (only) the software architecture.