ABAP Debugger
After finishing the last post on SE16N and DEBUG, I realised that since this site primarily caters to the aspiring
Read moreAfter finishing the last post on SE16N and DEBUG, I realised that since this site primarily caters to the aspiring
Read moreFew aspects of SAP Security are as well explored by Security Consultants as security for Tables. SAP already provides a
Read moreTransaction variants allows us to selectively mask certain fields in SAP transactions/screens. Though strictly not a security tool, transaction variants
Read moreWe have already come across LSMW for mass changes to SAP data. Let us not assume that LSMW is the
Read moreOften a security administrator comes across requirements where the existing authorization objects delivered by SAP is not enough. Mostly these
Read moreNew t-codes can be created through the transaction SE93. In the example below, the t-code is created to call a
Read moreThis post talks about the program level mechanism to implement a check for a particular authorization object. SAP Business applications
Read more