Beginner`s Guide to SAP Security and Authorizations

Nonfiction, Computers, Application Software, Business Software
Cover of the book Beginner`s Guide to SAP Security and Authorizations by Tracy Juran, Espresso Tutorials GmbH
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tracy Juran ISBN: 1230001182729
Publisher: Espresso Tutorials GmbH Publication: June 16, 2016
Imprint: Language: English
Author: Tracy Juran
ISBN: 1230001182729
Publisher: Espresso Tutorials GmbH
Publication: June 16, 2016
Imprint:
Language: English

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed. 

More books from Espresso Tutorials GmbH

Cover of the book SAP Fixed Assets Accounting (FI-AA) by Tracy Juran
Cover of the book Business Intelligence with SAP BI Edge by Tracy Juran
Cover of the book Vos premiers pas avec SAP Finance (FI) by Tracy Juran
Cover of the book SAP Enterprise Performance Management (EPM) Add-In by Tracy Juran
Cover of the book New SAP® Controlling Planning Interface by Tracy Juran
Cover of the book First Steps in ABAP by Tracy Juran
Cover of the book First Steps in SAP Financial Accounting (FI) by Tracy Juran
Cover of the book SAP HANA Advanced Modeling by Tracy Juran
Cover of the book Securing SAP S/4HANA by Tracy Juran
Cover of the book Guide to SAP In-House Cash (IHC) by Tracy Juran
Cover of the book Universal Worklist with SAP NetWeaver Portal by Tracy Juran
Cover of the book The SAP BW to HANA Migration Handbook by Tracy Juran
Cover of the book First Steps for Building SAP UI5 Mobile Apps by Tracy Juran
Cover of the book First Steps in SAP S/4HANA Finance by Tracy Juran
Cover of the book First Steps in the SAP Purchasing Processes (MM) by Tracy Juran
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy