Upload
sandeep-singh
View
190
Download
11
Embed Size (px)
Citation preview
SAP ECC HR BI Business Objects Security and GRC Audit Training ( Email:[email protected] or Phone 302 494 9476)
Event Details
Overview
OvervR/3 System Security and the Authorization Concept
Overview
Overview of the Authorization Concept
SAP* and DDIC Users
What Is the Profile Generator?
What Is a Security role?
What Happened to Responsibilities?
Security role Assignments
The Big Picture: Successful and Secure R/3 Implementation
Case Study: Security Strategy in a Three-System Environment
Authorization Administration Using the Profile Generator
Setting Up Security Administrators
Policies and Procedures
Auditing Requirements
Naming Convention for Authorization Profiles
Setting Up the Profile Generator
Overview
When to Use the Profile Generator
Activating the Profile Generator
Working on SAP Check Indicator Defaults and Field Values
Reducing the Scope of Authorization Checks in R/3 (SU24)
Generating the SAP Standard Menu and Company Menu
Getting Support from the Online Service System
Applying Advance Corrections to Your R/3 System
User Administration:
Overview
System Users
External R/3 Users
Internal R/3 Users
Special R/3 Users
User Groups
Authorizations and Authorization Profiles
Mass Operations
Creating a New User
Listing All Defined System Users
Changing a User’s Password
Displaying a Generated Authorization Profile and its Authorizations
Working with Security roles
Overview
Starting Security role Maintenance (PFCG)
Creating Security roles
Copying and Deriving Security roles
Choosing the Correct Menu Path in Session Manager
Selecting Workflow Tasks
Displaying Security roles
Changing Security roles
Deleting Security roles
Transporting Security roles
Generating and Maintaining Authorization Profiles
Overview
Generating the Authorization Profiles
Where
103 Ascension Drive
Wilmington, DE 19808
Yahoo | Mapquest | Microsoft
SAP GRC AUDIT ECC BI and HR Training
Wilmington, DE
SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...
1 of 3 13-12-2010 11:39
Displaying an Overview of Generated Profiles
Displaying the Technical Names in the Tree List
Regenerating Authorization Profiles After Making Changes
Elements and Symbols of the Hierarchy Display
Using Utilities
Customizing Authorizations
Day 2 ( 10 Hours)
Special Cases
Overview
Manually Post maintaining Authorizations
Assigning Transaction Codes to Reports
Adding Any Missing Transactions to the Company Menu Tree
Assigning Security roles and Users
Overview
Assigning Users to Security roles
Assigning Security roles to Users
Assigning PD Objects to Security roles
Assigning Security roles to PD Objects
Transferring Users from an IMG Project to an Security role
Updating Profiles in the User Master Records
Creating a Sample Organizational Plan
Info system Authorizations
Overview
Displaying Information
Additional Reports and Transactions
Predefined Security roles and Authorization Profiles
What Are Predefined Security roles
Advantages of Predefined Security roles
Which Security roles Are Predefined
Predefined Data for the Security roles
Adapting the Predefined Security roles to Your Specific Needs
Installing the Predefined Security roles
Transports
Overview
Transports Between Clients
Transports Between R/3 Systems
Transporting Security roles
Transporting Check Indicators and Field Values
Transporting the Company Menu
Transporting Authorization Templates
Transporting User Master Records
Tips and Troubleshooting Management
Overview
Tracing Authorizations with Transaction SU53
System Trace Using Transaction ST01
Evaluating a Written Trace File
Day 3 ( 10 Hours)
Upgrades
Overview
Upgrade from a Release Before 3.1x to 4.5
Upgrade from Release 3.0F to 4.5A or 4.5B
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.5x
Online Service System Notes
Overview
Online Service System Notes
Important System Profile Parameters
Incorrect Logons, Default Clients, and Default Start Menu
SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...
2 of 3 13-12-2010 11:39
Contact Host for event and ticket information.
Setting Password Length and Expiration
Specifying Impermissible Passwords
Securing SAP* Against Misuse
Tracing Authorizations
Profile Generator and Transaction SU24
User Buffer
No Check on Object S_TCODE
No Check on Certain ABAP Objects
RFC Authority Check
Frequently Used Transactions
Overview
Transaction Code Switches
Authorizations/User Administration Function
Miscellaneous Transactions
Frequently Asked Questions
Overview
Profile Generator Setup
Working with the PG and Profiles
Authorization Checks (SU24)
Including Transactions or Reports
Missing Authorizations
User Administration
Session Manager
Transporting
Menu Generation
Tables
Day 4 ( 10 Hours)
SAP BW/BI Security Concepts
User Administration and Authentication
Authorizations – Administration and Reporting
Communication Security
Security and Data Storage
Trace and Log files
SAP GRC Concepts
Functions of SAP GRC access control
Risk analysis and remediation- ABAP Version Only
Compliant User Provisioning- Concept Overview
Enterprise Role Management- Concept Overview
Super user privilege management- ABAP Version Only
SAP Security Automation
CATT Scripts
SAP GRC AUDIT ECC BI and HR Training - Eventbrite http://sapgrc.eventbrite.com/?ref=esli&goback=.gde_54221_membe...
3 of 3 13-12-2010 11:39