Beginner`s Guide to SAP Security and Authorizations

Nonfiction, Computers, Application Software, Business Software
Cover of the book Beginner`s Guide to SAP Security and Authorizations by Tracy Juran, Espresso Tutorials GmbH
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tracy Juran ISBN: 1230001182729
Publisher: Espresso Tutorials GmbH Publication: June 16, 2016
Imprint: Language: English
Author: Tracy Juran
ISBN: 1230001182729
Publisher: Espresso Tutorials GmbH
Publication: June 16, 2016
Imprint:
Language: English

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed. 

More books from Espresso Tutorials GmbH

Cover of the book SAP SOA Integration - Enterprise Service Monitoring by Tracy Juran
Cover of the book First Steps in ABAP by Tracy Juran
Cover of the book Practical Guide to SAP CO-PC (Product Cost Controlling) by Tracy Juran
Cover of the book Vos premiers pas avec SAP Contrôle de gestion (CO) by Tracy Juran
Cover of the book First Steps in the SAP Purchasing Processes (MM) by Tracy Juran
Cover of the book Reconciling SAP COPA to the General Ledger by Tracy Juran
Cover of the book Demand Planning with SAP APO - Execution by Tracy Juran
Cover of the book Guide to SAP In-House Cash (IHC) by Tracy Juran
Cover of the book Practical Guide to SAP GTS Part 1: SPL Screening and Compliance Management by Tracy Juran
Cover of the book Practical Guide to SAP GTS Part 3: Bonded Warehouse, Foreign Trade Zone, and Duty Drawback by Tracy Juran
Cover of the book SAP Enterprise Performance Management (EPM) Add-In by Tracy Juran
Cover of the book SAP BW/4HANA and BW on HANA by Tracy Juran
Cover of the book First Steps in SAP Predictive Analytics by Tracy Juran
Cover of the book New SAP® Controlling Planning Interface by Tracy Juran
Cover of the book Universal Worklist with SAP NetWeaver Portal by Tracy Juran
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy