Beginner`s Guide to SAP Security and Authorizations

Nonfiction, Computers, Application Software, Business Software
Cover of the book Beginner`s Guide to SAP Security and Authorizations by Tracy Juran, Espresso Tutorials GmbH
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tracy Juran ISBN: 1230001182729
Publisher: Espresso Tutorials GmbH Publication: June 16, 2016
Imprint: Language: English
Author: Tracy Juran
ISBN: 1230001182729
Publisher: Espresso Tutorials GmbH
Publication: June 16, 2016
Imprint:
Language: English

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed. 

More books from Espresso Tutorials GmbH

Cover of the book Demand Planning with SAP APO - Execution by Tracy Juran
Cover of the book SAP HANA Advanced Modeling by Tracy Juran
Cover of the book The SAP BW to HANA Migration Handbook by Tracy Juran
Cover of the book Universal Worklist with SAP NetWeaver Portal by Tracy Juran
Cover of the book Quick Guide to SAP CO-PA (Profitability Analysis) by Tracy Juran
Cover of the book Practical Guide to SAP CO-PC (Product Cost Controlling) by Tracy Juran
Cover of the book Practical Guide to SAP Cost Center Accounting by Tracy Juran
Cover of the book First Steps in ABAP by Tracy Juran
Cover of the book SAP Fixed Assets Accounting (FI-AA) by Tracy Juran
Cover of the book Guide pratique SAP by Tracy Juran
Cover of the book Cash Management in SAP S/4HANA by Tracy Juran
Cover of the book SAP HANA - Implementation Guide by Tracy Juran
Cover of the book Reconciling SAP COPA to the General Ledger by Tracy Juran
Cover of the book Electronic Bank Statement & Lockbox in SAP ERP by Tracy Juran
Cover of the book Invoice Verification for SAP by Tracy Juran
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy