SAP Security

Summary

Relatively a new area in SAP. SAP Security in particular handles Authorizations, User roles, BI Security and SCM Security.

Course Content

Introduction

  • Why Authorizations are necessary
  • Types of Authorizations (OS-Network LEVEL , DB Level , Application Level )
  • Sap Security – What all can be protected using SAP Security
  • SOD – User Admin / R&A Activities
  • Users -Types of Users (5)
  • User Creation , User master Record Maintenance
  • User Related Tables
  • Important Security Profile Parameters
  • Transaction codes – examples
  • Authorization Object
  • Authorizations
  • Profiles
  • Roles
  • Types of roles – single and composite and there limitations
  • Important Objects in SAP R/3
  • Role creation
  • Introduction to PFCG
  • Role Assignments
  • User Based Security / Role Based Security / Position Based Security
  • SUIM introduction
  • AGR Tables
  • Real Time Introduction -
  • Live Authorization issues
  • Trace setup and analysis
  • SU53 Analysis
  • Issue Replication
  • Identify the Right Authorizations /Roles for users
  • Few Concepts of role Assignments – Manual /Gordon/Portal Groups

BI Security

  • OLAP and OLTP
  • Difference between R/3 and BI Security Roles
  • Infocubes
  • Infoprovider /Info area /Mutlprovider /Data Mart
  • PSA Deletion
  • Types of BI roles
  • Analysis Authorizations
  • Menu and Data role
  • Automatic Roles
  • Trace Analysis in BI
  • Important RS Tables
  • Important BI objects
  • Support Issues

SCM Security

  • SNC – Flow
  • Business Partner
  • BP Types and Difference (Customer and Vendor)
  • SCM-EM
  • Important EM Tables
  • Roles creation in EM
  • Role modification in EM
  • Replication
  • Support Issues

I am Interested

  First Name:
  Your Email Address:*
  Mobile:
  Country:
   Preferred Format:*

 

Video Slider

Courses Highlights

  • Virtual classroom training via state of art online collaboration tools with sharing of all the presentations, demonstrations over real time systems.
  • Video files of the tool navigations taught during the sessions shall be shared with you post every session.
  • assignments to help you get hands on experience to handle such requirements in future. Real time case studies along with assignments shall be part of the courses.
  • In addition to the training videos, material required to prepare for certification shall be provided. An expert guidance for people interested in certification on any particular technology.
  • Career oriented assistance shall be offered to interested subscribers as part of the same course track.
  • Interview assistance and On job support shall be offered to all on demand, after successful completion of training

Testimonials

We were helped with fast track exclusively for four of our resources, to complete the training and proceed with our project. Feedback from the resources is positive.
Raghu, New Jersey
Weekend batches are helpful to many working professionals like me. Also upgrading myself to security consultant gives me a great scope in career.
William . J, Chicago
It is a real time training and the mentor has good exposure to the module. It is quite evident from teaching methods, and work profile. Good training.
Yogesh, Houston