SAP Basis SAP BASIS - THE SECURE FOUNDATION OF THE SAP SYSTEM - SAP Basis

Direkt zum Seiteninhalt
SAP BASIS - THE SECURE FOUNDATION OF THE SAP SYSTEM
GoLive Support
In the authorization environment, in addition to assigning authorizations to SAP users, there are a number of important SAP Basis settings that you should check regularly to ensure that your SAP system is fully protected, both internally and externally. For example, particularly in the context of an audit, it is important to ensure that changes to the SAP system always remain traceable. In this blog, I would like to show you how you can best implement this and what to look out for.

A partner agreement must be entered into for each supplier in the transaction WE20. Such an agreement shall determine how the electronic data are processed. Select the vendor partner type LI and create a new partner agreement. In this example, a new partner agreement is created for IDES AG as a supplier. Enter the vendor's partner number in the appropriate input field and select LI as the vendor's partner type. The next step is to define the output parameters. These specify how the outgoing data should be processed. The message type defines what kind of messages should be processed. The Output Options tab specifies the port to send the message to and the IDoc type. The IDoc base type ORDERS05 matches the ORDERS message. The Message Control tab defines which application should generate a message. In this case a message should be generated when a new order is created. If an order is placed for a product of IDES AG in the transaction ME21N, this order will be automatically sent in electronic form.
Database layer (relational database management system)
SAP Basis consists of three layers: a database layer, an application layer and a presentation layer. The database layer manages all the data of the SAP system in a database located on the database server and administered by a database management system (DBMS). The database supplies the connected SAP applications with the required data, data tables or system control tables. It also receives and stores new information generated by the user.

To evaluate the log files, please use transaction RSAU_READ_LOG. If you archive the security audit log files you can read them using transaction RSAU_READ_ARC.

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.

As a rule, the SWPM tool is used here again.

It's the ideal opportunity for all basic consultants to learn about the various integrated tools, how they work together, and how to troubleshoot issues involving multiple clouds at once.
SAP BASIS
Zurück zum Seiteninhalt