Authorizations in SAP : 100 Things You Should Know About...

個数:

Authorizations in SAP : 100 Things You Should Know About...

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 346 p.
  • 言語 ENG
  • 商品コード 9781592294060
  • DDC分類 005.8

Full Description

Work smarter with authorizations! Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with ""100 Things"" that unlock the secrets of managing your security and authorizations in SAP.The tips are grouped together based on the area of authorizations they cover, such as development security, Profile Generator, upgrades, and more. They have been carefully selected to provide a collection of the best, most useful, and rarest information. An invaluable resource to support you in your SAP administration duties! Highlights:

User master records
Development security
Profile Generator
Segregation of duties
Upgrades
Auditing
Security templates
Continuous Compliance and Governance

Contents

Acknowledgments
PART 1
User Master Records
Displaying the Technical Names of Transactions in the SAP Easy Access Menu en Masse
Improving Your User Master Record Accuracy with Hidden Fields
Defining an SAP User ID Naming Convention to Manage User Master Records
Using BAPIs to Help Mass-Maintain the User Master Record
Customizing the Rules for Automatically Generated Passwords During User Creation
Finding and Using User Parameters to Prepopulate Transactional Fields
Improving Your Business Reporting through User Groups
Working with Inactive Users
Customizing SAP and User Menus through the Session Manager
Assigning Roles through an Organization Structure without SAP HCM Deployed
Constraining Organization Structure Visibility through an HR Personnel Development Profile
Automatically Maintaining Structural Authorizations
Linking User Master Records to HR Data
Performing Mass Changes for Users and Roles in Java
Displaying Authorization Errors in Transaction Log SU53 for Different Users
Customizing Users' Selection en Masse
Mass-Changing Secure Network Communications Data for SSO User Mapping
PART 2
Development Security
Validating Your ABAP Code before Moving into the Production System
Archiving and Restoring a User's Favorites
Displaying the Security Data Dictionary Definition with the Object Navigator
Finding Vulnerability Strings in Your ABAP Code
Creating a Transaction Variant to Restrict User Activities
Finding Authorization Object Documentation
Searching for Values and Definitions in ABAP Data Dictionary Tables
Mass-Exporting Query User Group Information
Managing an Authorization Check in the Transaction Header
Restricting a User's Access to Called Transactions
Managing Customizing Tables in a Production System
Analyzing Your Security System to Keep it Updated
Using Parameter Transactions to Avoid Giving Direct Tables/Programs Access to End Users
Discovering Maintenance Customizing Transactions with a Table Name
PART 3
Profile Generator
Finding Roles That Contain Transactions at the Menu Level
Permanently Enable the Technical Name View in Transaction PFCG's Authorization Tree
Creating a Sustainable Authorization Roles Naming Convention
Evaluating the Manual or Modified Authorization Status during Profile Generator Maintenance
Creating an SAP_ALL Display-Only Role
Maintaining an Aligned Set of Job Roles with a Naming Convention
Designing and Assigning a Basic Role to All Users
Maintaining Derived Roles to Improve Authorization Maintenance
Discovering Misalignment between Transactions by Downloading Data to Spreadsheets
Finding Misinterpreted Authorization Wildcards in Your Roles
Performing Mass Downloads and Uploads of Standard Authorization Values
Setting Up Mass Adjustments for Derived Roles
Troubleshooting Authorization Problems for Users
Customizing Your Tree Menu Settings to Avoid Duplicate Structures
Automatically Populating the Authorization Objects Transaction Link When Performing a Developer Trace
Adjusting Query Maintenance to Avoid Security Problems
Cleaning Up Unused Batch Jobs
Setting Up Authorizations to Allow Internet Service
Avoiding Security Holes during SAP Menu Role Maintenance
Changing the Rules to Generate Profile Names
Comparing Authorization Roles to Check for Alignment Between Systems
Replacing the Parent Role of a Derived Role en Masse
Generating Large Quantities of Profiles for Roles in a Single Transaction
Using SAP BAPIs to Manage Roles with an External Program
Using Manual Composite Profiles to Bypass the Profile Technical Limit of 312
Using Parameter IDs and Customizing Transactions to Manage Authorizations
Removing Expired User-Role Links
Filtering Roles by Their Status
PART 4
Segregation of Duties
Tailoring Your Ad-Hoc Analysis by Using Custom Groups in RAR and ARA
Modifying Your Selection Criteria for User/Roles Analysis in SAP GRC 10.0
Clustering Data to Enhance Your RAR Reporting for Easier Consumption
Performing a User Impact Risk Analysis
Setting Selection Criteria for the Web Interface as a Default Value
Defining a Firefighter User ID Naming Method
Using Organizational-Level Mapping in Business Role Management to Improve Role Derivation
Using Business Role Management to Define Business Roles in Place of Composite Roles
Setting Up Data Segregation in SAP GRC ARA
Keeping Your Mitigation Tables Clean and Accurate with the Invalid Mitigation Report
PART 5
Upgrades
Making Your Roles Compliant with Transaction SU25
Deciding How to Set Up Your Authorization Upgrade
Managing Derived Roles during an Upgrade
Converting a Manually Created Profile into a Role
Avoid Maintaining a Role's Authorization Tree Twice When New Transaction Codes Are Added
Identifying New Transactions in a Role's Menu
Communicating Password Requirement Changes During SAP Upgrades
PART 6
Auditing
Searching for Roles or Users Using Transaction SUIM with Asterisk Searching
Using the Security Audit Log to Manage Your Super Users' Access
Changing the Classification of an Audit Log Message
Configuring the SAP System to Log Activity in the Security Structure
Activating Table Tracing to Log the Details of Changes Made
Viewing All Instances of Profile Parameters
Identifying Alias Transactions to Eliminate Unauthorized System Access
Finding a Specific User Who Has Made Changes to Values
Identifying Query Changes
Protecting and Auditing Your Remote Function Call
PART 7
Security Templates
Using a Spreadsheet to Collect Authorization Data
Defining a Template for Gathering and Defining Your Job Role Data
Defining a Template for Gathering the Organizational Constraints of Job Role Data
Defining a Template for Gathering the Nonorganizational Constraints of Job Role Data
Using Pivot Tables and Authorization Reports to Customize Data for the Reader
PART 8
Continuous Compliance and Governance
Defining Data for User Revalidation
Revalidating Roles and Providing Documentation for Analysis
Making Sure Users Are Assigned Only to the Roles and Transactions They Use
Using Indirect Role Assignment to Simplify User Maintenance and Reporting
Defining Business Owners
Finding Misalignments between Organizational-Level Pop-Ups and Authorization Data in Derived Roles
Finding Manually Created Authorizations in a Role's Authorization Tree
Substituting SAP Queries with Specific Transaction Codes
Using a Query to Find Manually Created Authorizations and Convert them to Roles
Additional Resources
Index

最近チェックした商品