دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Andrea Cavalleri. Massimo Manara
سری:
ISBN (شابک) : 1592294065, 9781592294060
ناشر: SAP PRESS
سال نشر: 2012
تعداد صفحات: 351
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 15 مگابایت
در صورت تبدیل فایل کتاب Authorizations in SAP: 100 Things You Should Know About... به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجوزها در SAP: 100 چیزی که باید در مورد ... نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
با این کتاب یاد بگیرید که چگونه در زمان مدیریت امنیت سیستم SAP صرفه جویی کنید، که اسرار کار با مجوزها در سیستم SAP Basis را باز می کند. 100 نکته و راه حل را پیدا خواهید کرد که می توانید از آنها برای افزایش بهره وری و بهبود امنیت سیستم SAP خود استفاده کنید. نکات بر اساس حوزه مجوزهایی که تحت پوشش قرار میدهند، مانند امنیت توسعه، تولیدکننده نمایه، ارتقاها و موارد دیگر با هم گروهبندی میشوند. آنها با دقت انتخاب شده اند تا مجموعه ای از بهترین، مفیدترین و کمیاب ترین اطلاعات را ارائه دهند. با استفاده از این کتاب، میتوانید سریعتر، آسانتر و مؤثرتر کار کنید.
Learn how to save time when managing SAP system security with this book, which unlocks the secrets of working with authorizations in the SAP Basis system. Youll find 100 tips and workarounds you can use to increase productivity and improve the security of your SAP system. The tips are grouped together based on the area of authorizations they cover, such as development security, Profile Generator, upgrades, and more. They have been carefully selected to provide a collection of the best, most useful, and rarest information. With this book, you will be able to work more quickly, easily, and effectively.
Displaying the Technical Names of Transactions in the SAP Easy Access Menu en Masse And Here’s How ... Improving Your User Master Record Accuracy with Hidden Fields And Here’s How ... Defining an SAP User ID Naming Convention to Manage User Master Records And Here’s How ... Using BAPIs to Help Mass-Maintain the User Master Record And Here’s How ... Customizing the Rules for Automatically Generated Passwords During User Creation And Here’s How ... Finding and Using User Parameters to Prepopulate Transactional Fields And Here’s How ... Improving Your Business Reporting through User Groups And Here’s How ... Working with Inactive Users And Here’s How ... Customizing SAP and User Menus through the Session Manager And Here’s How ... Assigning Roles through an Organization Structure without SAP HCM Deployed And Here’s How ... Constraining Organization Structure Visibility through an HR Personnel Development Profile And Here’s How ... Automatically Maintaining Structural Authorizations And Here’s How ... Linking User Master Records to HR Data And Here’s How ... Performing Mass Changes for Users and Roles in Java And Here’s How ... Displaying Authorization Errors in Transaction Log SU53 for Different Users And Here’s How ... Customizing Users’ Selection en Masse And Here’s How ... Mass-Changing Secure Network Communications Data for SSO User Mapping And Here’s How ... Validating Your ABAP Code before Moving into the Production System And Here’s How ... Archiving and Restoring a User’s Favorites And Here’s How ... Displaying the Security Data Dictionary Definition with the Object Navigator And Here’s How ... Finding Vulnerability Strings in Your ABAP Code And Here’s How ... Creating a Transaction Variant to Restrict User Activities And Here’s How ... Finding Authorization Object Documentation And Here’s How ... Searching for Values and Definitions in ABAP Data Dictionary Tables And Here’s How ... Mass-Exporting Query User Group Information And Here’s How ... Managing an Authorization Check in the Transaction Header And Here’s How ... Restricting a User’s Access to Called Transactions And Here’s How ... Managing Customizing Tables in a Production System And Here’s How ... Analyzing Your Security System to Keep it Updated And Here’s How ... Using Parameter Transactions to Avoid Giving Direct Tables/Programs Access to End Users And Here’s How ... Discovering Maintenance Customizing Transactions with a Table Name And Here’s How ... Finding Roles That Contain Transactions at the Menu Level And Here’s How ... Permanently Enable the Technical Name View in Transaction PFCG’s Authorization Tree And Here’s How ... Creating a Sustainable Authorization Roles Naming Convention And Here’s How ... Evaluating the Manual or Modified Authorization Status during Profile Generator Maintenance And Here’s How ... Creating an SAP_ALL Display-Only Role And Here’s How ... Maintaining an Aligned Set of Job Roles with a Naming Convention And Here’s How ... Designing and Assigning a Basic Role to All Users And Here’s How ... Maintaining Derived Roles to Improve Authorization Maintenance And Here’s How ... Discovering Misalignment between Transactions by Downloading Data to Spreadsheets And Here’s How ... Finding Misinterpreted Authorization Wildcards in Your Roles And Here’s How ... Performing Mass Downloads and Uploads of Standard Authorization Values And Here’s How ... Setting Up Mass Adjustments for Derived Roles And Here’s How ... Troubleshooting Authorization Problems for Users And Here’s How ... Customizing Your Tree Menu Settings to Avoid Duplicate Structures And Here’s How ... Automatically Populating the Authorization Objects Transaction Link When Performing a Developer Trace And Here’s How ... Adjusting Query Maintenance to Avoid Security Problems And Here’s How ... Cleaning Up Unused Batch Jobs And Here’s How ... Setting Up Authorizations to Allow Internet Service And Here’s How ... Avoiding Security Holes during SAP Menu Role Maintenance And Here’s How ... Changing the Rules to Generate Profile Names And Here’s How ... Comparing Authorization Roles to Check for Alignment Between Systems And Here’s How ... Replacing the Parent Role of a Derived Role en Masse And Here’s How ... Generating Large Quantities of Profiles for Roles in a Single Transaction And Here’s How ... Using SAP BAPIs to Manage Roles with an External Program And Here’s How ... Using Manual Composite Profiles to Bypass the Profile Technical Limit of 312 And Here’s How ... Using Parameter IDs and Customizing Transactions to Manage Authorizations And Here’s How ... Removing Expired User-Role Links And Here’s How ... Filtering Roles by Their Status And Here’s How ... Tailoring Your Ad-Hoc Analysis by Using Custom Groups in RAR and ARA And Here’s How ... Modifying Your Selection Criteria for User/Roles Analysis in SAP GRC 10.0 And Here’s How ... Clustering Data to Enhance Your RAR Reporting for Easier Consumption And Here’s How ... Performing a User Impact Risk Analysis And Here’s How ... Setting Selection Criteria for the Web Interface as a Default Value And Here’s How ... Defining a Firefighter User ID Naming Method And Here’s How ... Using Organizational-Level Mapping in Business Role Management to Improve Role Derivation And Here’s How ... Using Business Role Management to Define Business Roles in Place of Composite Roles And Here’s How ... Setting Up Data Segregation in SAP GRC ARA And Here’s How ... Keeping Your Mitigation Tables Clean and Accurate with the Invalid Mitigation Report And Here’s How ... Making Your Roles Compliant with Transaction SU25 And Here’s How ... Deciding How to Set Up Your Authorization Upgrade And Here’s How ... Managing Derived Roles during an Upgrade And Here’s How ... Converting a Manually Created Profile into a Role And Here’s How ... Avoid Maintaining a Role’s Authorization Tree Twice When New Transaction Codes Are Added And Here’s How ... Identifying New Transactions in a Role’s Menu And Here’s How ... Communicating Password Requirement Changes During SAP Upgrades And Here’s How ... Searching for Roles or Users Using Transaction SUIM with Asterisk Searching And Here’s How ... Using the Security Audit Log to Manage Your Super Users’ Access And Here’s How ... Changing the Classification of an Audit Log Message And Here’s How ... Configuring the SAP System to Log Activity in the Security Structure And Here’s How ... Activating Table Tracing to Log the Details of Changes Made And Here’s How ... Viewing All Instances of Profile Parameters And Here’s How ... Identifying Alias Transactions to Eliminate Unauthorized System Access And Here’s How ... Finding a Specific User Who Has Made Changes to Values And Here’s How ... Identifying Query Changes And Here’s How ... Protecting and Auditing Your Remote Function Call And Here’s How ... Using a Spreadsheet to Collect Authorization Data And Here’s How ... Defining a Template for Gathering and Defining Your Job Role Data And Here’s How ... Defining a Template for Gathering the Organizational Constraints of Job Role Data And Here’s How ... Defining a Template for Gathering the Nonorganizational Constraints of Job Role Data And Here’s How ... Using Pivot Tables and Authorization Reports to Customize Data for the Reader And Here’s How ... Defining Data for User Revalidation And Here’s How ... Revalidating Roles and Providing Documentation for Analysis And Here’s How ... Making Sure Users Are Assigned Only to the Roles and Transactions They Use And Here’s How ... Using Indirect Role Assignment to Simplify User Maintenance and Reporting And Here’s How ... Defining Business Owners And Here’s How ... Finding Misalignments between Organizational-Level Pop-Ups and Authorization Data in Derived Roles And Here’s How ... Finding Manually Created Authorizations in a Role’s Authorization Tree And Here’s How ... Substituting SAP Queries with Specific Transaction Codes And Here’s How ... Using a Query to Find Manually Created Authorizations and Convert them to Roles And Here’s How ...