- SAP Security Tutorial
- SAP Security - Home
- SAP Security - Overview
- User Authentication & Management
- Network Communication Security
- Protecting Standard Users
- Un-authorizing Logons Protections
- System Authorization Concept
- SAP Security - Unix Platform
- SAP Security - Windows Platform
- SAP Security - Databases
- User Authentication & Single SignOn
- SAP Security - Logon Tickets
- SAP Security Useful Resources
- SAP Security - Quick Guide
- SAP Security - Useful Resources
- SAP Security - Discussion
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
SAP Security Tutorial
SAP Security is required to protect SAP Systems and Critical Information from Unauthorized Access in a Distributed Environment while accessing the system locally or remotely. It covers various Authentication Methods, Database Security, Network and Communication Security and protecting standard users and other best practices that should be followed in maintaining your SAP Environment. In a SAP Distributed Environment, there is always a need that you protect your critical information and data from unauthorized access. Human Errors, Incorrect Access Provisioning shouldn’t allow unauthorized access to system and there is a need to maintain and review the profile policies and system security policies in your SAP environment.
Audience
This tutorial is suitable for those professionals who have a good understanding about SAP Basis tasks and a basic understanding of the system security. After completing this tutorial, you will find yourself at a moderate level of expertise in implementation of the security concepts in a SAP system.
Prerequisites
Before you start with this tutorial, we assume that you are well-versed with SAP Basis activities – User Creations, Password Management, and RFC’s. In addition, you should have a basic understanding of security terms in the Window and UNIX environment.