SAP Security

Uncategorized

About Course

SAP Security training Content 

 

Module1 Introduction of SAP 

1.1 Understanding SAP

1.2 Understanding SAP Security

Module 2 User Administration

2.1 User Types in SAP

2.2 Creating User in SAP

2.3 SAP User Account – Mandatory Fields to Maintain

2.4 Creating user accounts in SAP using t-code SU10

2.5 Renaming User in SAP

2.6 User Group in Logon Tab and Groups Tab – 1

2.7 User Group in Logon Tab and Groups Tab – 2

2.8 Important SAP Tables – User Account Details

2.9 Retrieving E-mail Address of Multiple Users from System

 

Module 3 SAP Authorization

3.1 Understanding SAP Authorization

3.2 Key elements and building blocks of SAP Authorization

3.3 SAP Security

 

Module 4 Role Administration

4.1 Understanding check indicator t-code (SU24) and SU22

4.2 Understanding SU22 and SU24 inside Live System

4.3 SAP Security Role

4.4 SAP Role Creation

4.5 Single and Composite Role

4.6 Adding A Composite Role To Another Composite Role

4.7 Master and Derived Roles

4.8 Task and Value Roles

4.9 Authorization Object Maintenance Status in Role

4.10 Creating a Custom Authorization Class, Object, and Field

 

Module 5 User information system

5.1 Introduction to User Information System

5.2 User by Address data

5.3 Users by Complex Selection Criteria

 

Module 6 Playing around with transaction codes

6.1 Creating custom T-Code – SHD0

6.2 SAP Query – SQVI

 

Module 7 System Administration

7.1 Login into another Instance/Server

7.2 Locking/Unlocking of t-code and Get List of All Locked t-codes

7.3 Active User Sessions

7.4 Authorization trace – Troubleshooting authorization issues

X