SAP Security ADMINISTRATION

Enquire, Join and get training by Well Experienced & Certified tutors
for your professional IT Course.

Watch Sample Session!

Get in Touch

+1 202-403-9022

+91 951 583 9400

info@suvenit.com

MODULE#1 –Introduction to SAP
• Understanding the application
• Briefing about Installation process
• Modules in SAP
• Authentication process in SAP
• Levels of Security in SAP

MODULE#2 –Architecture of SAP
• R/2 and R/3 Architecture introduction
• Detail understanding of Instances
• Overview of work processes

MODULE#3 –SAP Landscape
• Single system landscape
• Two system landscape
• Three system landscape
• Multi system landscape
• Flavors in SAP

MODULE#4 –Client Administrations
• Brief Understanding about Clients
• Client creation
• Local client copy
• Remote client copy

MODULE#5 –User Administrations
• User creation, deletion
• Lock and unlock
• Rename, De-activate users and passwords
• Mass user administration
• Maintain user groups

MODULE#6 –Profiles Administration
• Types of profiles
• Profile protection

MODULE#7 –Role Administrations
• Types of Roles
• Creation of Roles
• Working on standard roles
• Roles with functional modules
• Authorization concepts
• Object class
• Authorization objects
• Activities
• Authorization checks
• Status of Authorizations
• Check indicators
• User buffer
• Maintaining org levels
• Offshore security

MODULE#8 –Types of Security’s
• Internal Security
• External Security
• SAP Security

MODULE#9 –Table Security
• Authorization groups
• User trace
• Trace configuration

MODULE#10 –Transports
• Understanding the security
• Use of Transports
• Construction of transports
• Change requests
• Background Jobs (Monitoring and scheduling)
• User master records
• Critical Authorization Objects

MODULE#11 –Central User Administration
• CUA Creation,
• Usage and Deletion
• Compliances calibrator,
• Role manager
• Fire fighter
• Access enforcer

MODULE#12 –BI Security
• Understanding BI security
• BI Authorization
• OLTP and OLAP
• BI Authorization Concepts
• Critical T-Codes
• Types of users
• Critical Authorization objects

MODULE#13 –BI Analysis authorizations
• Features of Analysis authorizations
• Analysis T-Codes and it’s security
• Risk management

Quick Contact
close slider