Posts Currently viewing the category: "security-blog"

Nowadays, our systems run in a hybrid system landscape with On-Premise and Cloud systems. For this reason, it makes sense to be able to centrally manage the user accounts for On-Premise as well as for Cloud systems. To centrally managed, there is the SAP Cloud Identity Provisioning Service (Identity Provisioning Service), which cooperates…(Read More)

In my earlier blog about Firefighter lifecycles (https://blogs.sap.com/2014/03/03/firefighter-id-lifecycle/), I mentioned the requirement to review Firefighter IDs on a regular basis. Over the last couple of years, this requirement has become an audit finding in most organizations. Firefighter ID management is still a challenge for most organizations…(Read More)

In the previous articles about the migration to S/4HANA, we talked about the changes in transactions and the difficulties that come with them. One more of a general problem is the question “Where do I start?” No matter if you just want to see what changes might have to be done to your roles…(Read More)

Migration to S4HANA

Xiting offers a free S/4HANA role migration analysis tool to estimate the impact of a S/4HANA migration on your roles and authorizations. S/4HANA is the next generation of enterprise software from SAP, and it comes with an entirely new security model. With S/4HANA, SAP has decided to combine, replace or remove…(Read More)

SU24 Tips and Tricks

The first two blogs dealt with fields which you should and respectively should not maintain as SU24 proposals for roles. The example of SAP standard organizational level fields is already dealt with in blog 2 to introduce fields which you should not maintain in SU24, but that is because you should maintain them in the…(Read More)

Subscribe to our SAP Security Newsletter

Stay up to date with the latest SAP security news and receive valuable tips and tricks by subscribing to our newsletter.