Composite Roles
Till now, all our discussion on role administration has been concentrated on creation and maintenance of single roles. A single
Read moreMiscellaneous Tools
Till now, all our discussion on role administration has been concentrated on creation and maintenance of single roles. A single
Read moreTransaction variants allows us to selectively mask certain fields in SAP transactions/screens. Though strictly not a security tool, transaction variants
Read moreThe PRGN_CUST tables contains entries for a number of switches which can affect the default behavior of various security transactions.
Read moreAuthorization Groups allow us to secure access to various entities in the SAP landscape. The most common application of authorization
Read moreWe have already come across LSMW for mass changes to SAP data. Let us not assume that LSMW is the
Read moreLSMW stands for Legacy System Migration WorkBench. Originally it was a tool supplied by SAP to migrate data from a
Read moreThe SAP Query component in R/3 provides a way of generating simple reports without any actual coding. From this standpoint,
Read moreAs we have already seen in one of the earlier articles, individual user master records can be created/updated through the
Read moreNew t-codes can be created through the transaction SE93. In the example below, the t-code is created to call a
Read moreThe Data Browser (transaction SE16) allows us to display (or maintain) transparent tables from the ABAP Data Dictionary. Its an
Read more