Analysis and Recommended Settings of the Security Audit Log (SM19 / SM20)
This document was generated from the following discussion: Recommended Settings for the Security Audit Log (SM19 / SM20) ContentsRecommended Settings for the Security Audit Log (SM19 / SM20)Profile...
View ArticleControlling Authorization Object for the transaction variant created via SHD0v
Hello - We created a new transaction variant with reference to VL03N and assigned it to a new transaction called ZVL03N. The reason for creating this new transaction was to suppress the document flow...
View ArticleSAP GUI SNC client encryption with commoncryptolib
Dear experts,I am searching a lot in this Topic but I am not sure if it is possible and allowed by SAP to encrypt the communication between SAP GUI and AS ABAP using the commoncryptolib without SAP...
View ArticleAS2 adapter not visible in Receiver Communication Channel (Adapter Type)
Hi, We wish to connect to our customer using AS2 adapter as the receiver communication channel.We are unable to find the "AS2 adapter type in the in "adapter type" field. (Choose Adapter Metadata). Our...
View ArticleSAP Mobile Platform Security: Introduction
Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace...
View ArticleERPScan warns SAP Clients about serious vulnerabilities in Microsoft...
April 17, 2015– As a part of monthly updates Microsoft released security update MS15-034 which closes vulnerability in driver HTTP.sys which enables an attacker to execute arbitrary code on OS...
View ArticleSecurity at Sapphire Now and the ASUG Annual Conference!
Visit us in Orlando and learn about SAP's security offerings and strategy. We'll be there with a booth as well as a number of lectures, demos, and discussion forums around varioussecurity features....
View ArticleView SQL statements in DB
Hi, I am trying to find where I can find the log for users being unlocked thru a SQL statement and this is viewved in the DB. BUT funny thing is that SU01 doesnt show last changed according to the...
View ArticleNW 7.3 SSO to SuccessFactors
Anyone come across the following issue with single sign on between SAP and SuccessFactors? Caused by: dk.itst.oiosaml.sp.model.validation.ValidationException: The assertion must contain the service...
View ArticleAuthorization check on Z report
Hello Experts, We had a requirement to develop a report which would combine the features of V.14 and V23 with some additional features like removing delivery blocks and billing blocks. We want to add...
View ArticleSAP HANA Security - Best Practice for Access to Schemas??
Hi, Currently we don'y have a defined Security model in HANA Studio.Neither there is no defined duties of a BASIS / Security / Developers.I want to understand what best practices are followed at other...
View ArticleMultiple Users for Authorization Trace
Greetings! I would like to inquire if there are alternate transaction(s) or program(s) to enable authorization trace for multiple users. Currently, we are looking at transaction STAUTHTRACE, and it...
View ArticleSAP Business Objects Password Expiry
Can anyone please assist with this issue: We currently have a SAP BOBJ 4.1 environment which is internet facing which authenticates via our BW 7.3 which is in the LAN. The issue arises when the...
View ArticleSAP BW AUTHORIZATION: Restricting key figure field
Hello Kindly help me with the following requirement. We have been asked to restrict most users from viewing the key figure salary amount from the query.I created an authorization analysis object and...
View ArticleWhat role needs to be assigned to the user to access existing custom OData...
Hi all, What role needs to be assigned to the user to access existing custom OData services? With SAP ALL its working. But cannot assign that to all users. Whats the specific role for this? I tried...
View ArticleFeatured Content in Security
Security at Sapphire Now and the ASUG Annual Conference!Visit us in Orlando, May 5-7, and learn about SAP's security offerings and strategy. We'll be there with a booth as well as a number of lectures,...
View ArticleSAP Enterprise Threat Detection
OverviewThe interconnected nature of modern business systems means that successful companies with critical business on SAP software must effectively manage exposure to external and internal threats....
View ArticleIs S_RFCACL a critical Authorization Object ?
Hi All, As we know that S_RFCACL (Authorization Check for RFC User (e.g. Trusted System)) is required for having access to the trusted systems. In most of our roles for this authorization Object we...
View ArticleSSL Server Standard and SSL Client Standard PSE's missing.
Hi, Title: SSL Server Standard and SSL Client Standard PSE's missing. iam about to configure strustsso2. But i cant find the above PSE's in this transaction. When i checked Transaction SMICM - Trace...
View Article