Вы находитесь на странице: 1из 6

Day-wise Plan (Training Program - ABAP: Authorization Concept)

Day

Day 1

Day 2

Day 3

Day 4

Day 5

Day 6
Day 6
Day-wise Plan (Training Program - ABAP: Authorization Concept)
Topics
Overview of Authorization Concept
What are Authorizations ?
Creating and Implementing an Authorization Concep
Basic Terminology of Authorizations
Elements and Terminology of the SAP R/3 Authorization Concept
Authorization Checks in the SAP System
User Settings
Create and change user master records
Set the values on the tab pages of the user master record
Define the differences between the user types
Operate and implement mass maintenance
Display and archive change documents for authorization assignment
Working with the Profile Generator
Describe and explain the basic steps for assigning authorizations with the Profile Generator
Create new roles, change and copy roles, and specify their activities
Display and maintain authorizations that were generated automatically
Compare user master records directly in role maintenance PFCG or through user maintenance "SU01"
Describe how to perform a mass comparison and state which report you can schedule for an automatic comparison
Describe the use of Customizing roles
Explain the advantages and disadvantages of composite roles
Define the relationship between reference roles and derived roles
Basic Settings
Perform the steps necessary to install the Profile Generator
Find default values and check indicators in the system
Modify, delete, or extend the default values of the Profile Generator
Perform the necessary steps after an upgrade for postprocessing old and new authorization values
Define password rules and system profile parameters
Protect special users in the SAP system
Protect SAP functions with authorization object S_TCODE
Protect tables and views using authorization groups
Protect programs with authorization groups
Transporting Authorizations
Copy user master records to other clients
Transport roles and describe the behavior in the system: With and without profile information, with and without user
assignments, in a CUA landscape or without CUA
Transport check indicators using Transaction SU25
Describe the transport behavior of composite, reference, and derived
Integration into the Company Landscape
Create organizational units in HR Organizational Management
Link roles with the organizational plan objects
Link users with the organizational plan objects
Perform a comparison of the indirect role and user assignments
Compare user master record
Assign roles for a specific period of time
Explain how the central user administration functions
Specify the most important steps for setng up the central user
Day-wise Plan (Training Program - ABAP: Secure SAP System Managemen
Day

Day 1

Day 2

Day 3

Day 4
Day-wise Plan (Training Program - ABAP: Secure SAP System Management)
Topics
Overview of Secure SAP System Management
Define goals for secure enterprise applications
Explain the purpose and procedures for conducting audits of your internal system security of your system
Identify tools available for conducting audits of system security
Outline the authorization and role maintenance process
SAP Audit Information System
Describe the purpose of the Audit Information System (AIS)
Configure and assign AIS roles and authorizations
Demonstrate the ability to navigate and use the AIS roles
Identify the requirements for configuring the security audit log
Demonstrate how to read the security audit log
Demonstrate use of the security alert monitor in CCMS
Demonstrate use of the security alert monitor in CCMS
Configuring and Using Security Audit Tools
Identify the requirements for configuring the security audit log
Demonstrate how to read the security audit log
Demonstrate use of the security alert monitor in CCMS
Securing Systems through User, Role and Authorization Maintenance
Describe the value of transaction code security
Outline recommendations for securing program execution
Explain the authorization objects that protect transaction codes,tables, and program execution
Demonstrate the use of SAP tools to assign table and program groups to unprotected tables
Describe how the Authorization Group field is used in many SAP application areas
Identify logs available in an SAP system
Describehowthelogsareused
Securing Production Systems
Describe the change management landscape, procedures, and tools that protect your production systems from
unauthorized or untested change
Identify secured systems and clients against unauthorized or untested change
Outline the benefits of a QA approval system and of controlling the release of change into production
Demonstrate how to secure background processing
Discuss security for spool and print processing
Describe how to effectively secure access to the operating system
Identify security needs for desktop downloads and program file input/output
Structure security requirements for communication interfaces

Вам также может понравиться