• An overview of SAP security
• The purpose of the SAP Profile Generator
• Single roles versus composite roles
• User authorizations
• How user authorizations differ based on SAP application server type
In this hour, we look at SAP security. An overview of this broad subject is followed by a closer look at SAP roles and authorizations. In this way, we set the stage for Hour 12, “Using SAP to Do Your Job,” which is where an SAP end user can finally focus on getting actual work done in SAP.
In the same way an SAP implementation is complex, so is the topic of SAP security. SAP security can be confusing, too. To IT infrastructure professionals, security ...