menu
{ "item_title" : "Beginner's Guide to SAP Security and Authorizations", "item_author" : [" Tracy Juran "], "item_description" : "SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed. Basic architecture of SAP Security and AuthorizationsGRC Access Control introductionUser profile creation and role assignmentsCommon security and authorization pain point troubleshooting", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/1/50/863/539/1508635390_b.jpg", "price_data" : { "retail_price" : "19.95", "online_price" : "19.95", "our_price" : "19.95", "club_price" : "19.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Beginner's Guide to SAP Security and Authorizations|Tracy Juran

Beginner's Guide to SAP Security and Authorizations

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, field values, etc. Explore the basic architecture of SAP Security and Authorizations, including user master records, roles, profiles, authorization object classes, authorization objects, and authorization fields. Dive into how to create user profiles and assign roles. Get tips on leveraging the profile generator transaction, PFCG. Obtain valuable tools and tables for identifying user master records and role and authorization information. By using practical examples, tips, and screenshots, the author brings readers new to SAP Security and Authorizations up to speed.


  • Basic architecture of SAP Security and Authorizations
  • GRC Access Control introduction
  • User profile creation and role assignments
  • Common security and authorization pain point troubleshooting

This item is Non-Returnable

Details

  • ISBN-13: 9781508635390
  • ISBN-10: 1508635390
  • Publisher: Createspace Independent Publishing Platform
  • Publish Date: April 2016
  • Dimensions: 9 x 6 x 0.22 inches
  • Shipping Weight: 0.34 pounds
  • Page Count: 106

Related Categories

You May Also Like...

    1

BAM Customer Reviews