Seguridad sap

Solo disponible en BuenasTareas
  • Páginas : 9 (2239 palabras )
  • Descarga(s) : 7
  • Publicado : 24 de junio de 2010
Leer documento completo
Vista previa del texto
SAP BASIS and Security Administration
An Article From thespot4sap LTD

Contents
1.0 Introduction...............................................................................................................2 2.0 SAP Security Components – The Big Picture ............................................................2 2.1 SAP AuthorizationConcept...................................................................................3 2.2 Composite Profiles ................................................................................................4 2.3 User Ids.................................................................................................................4 2.4 Authorizations.......................................................................................................4 3.0 Security Configuration in SAP...................................................................................4 3.1 User Authentication...............................................................................................4 3.2 Creating and Assigning Authorization Profiles.......................................................5 3.3 Auditing and Monitoring.......................................................................................6 3.4 Administration and Maintenance ...........................................................................9

© www.thespot4sap.com

Page 1 of 9

independent.current.research

SAP BASIS and Security Administration 1.0 Introduction
SAP has done nothing less than change the entire systems landscape for enterprises. Thebenefits it can bring have led to widespread adoption across the globe. One of the key benefits SAP brings to an enterprise is the ability to integrate the data both within the enterprise, and between it and it’s partners / competitors. In many cases organizations today are both partners and competitors at the same time. Think of wholesalers and distributors, SAP and Oracle, AT&T and BT, or twooil giants who have an upstream joint venture. These companies use SAP to integrate process between themselves for their mutual benefit. This ability to integrate, however, brings with it a particular risk – that of exposing their data to the un-authorized outside world. Entire companies have been built up around highly guarded intellectual property and process secrets ... and could easily fall ifthis was breached. Therefore, keeping the security of the organization intact is one of the vital aspects of any SAP implementation. SAP BASIS addresses all security issues by incorporating an authorization module. With increased potential for security breaches in the computer systems around the world, BASIS consultants face a tough task of maintaining the integrity and administering the securityof SAP systems. Interoperability features of a SAP system makes this task a bit more difficult.

2.0 SAP Security Components – The Big Picture
SAP security in an integrated environment can be viewed in the form of discrete components as shown below (figure 1).

Figure 1 © www.thespot4sap.com Page 2 of 9 independent.current.research

Tight security is required for each of the abovecomponents (Network, Workstation, Operating System and Database) as a breach made in one area can compromise the entire system. The scope of this article is SAP Application Security, which can be achieved with the help of SAP’s BASIS security application through the concept of authorization. In SAP, security is administered for objects (profiles and authorizations). Users are only authorized to see orchange the parts of the system required by their respective job responsibilities. 2.1 SAP Authorization Concept The SAP authorization concept is based upon the logical relationship between a user ID and the range of system authorizations with which it can be associated. The architecture of the authorization system is based upon the utilization of several individuals but related logical components:...
tracking img