Sie sind auf Seite 1von 3

Software Training & Development

http://www.sstechnologis.com/
1-11-101/1 Dr Praveen complex,Opp-Bus-stop,MainRoad,Alwal,Secunderabad-10
Mob : 40-27972266,9032041119


SAP Security Training Syllabus (R/3, BI, HCM, Portal & BPC)

R/3 Security Concepts

1.1 Overview of SAP
1.2 Overview of SAP BASIS
1.3 Introduction to SAP Security
1.3.1 Why we need security
1.3.2 What needs to be protected
1.3.3 From whom we need to protect
1.3.4 Implementation methodology
1.4 User administration
1.4.1 Single user administration
1.4.2 Mass User administration
1.4.3 LSMW Script running
1.5 Introduction of CUA (Central User administration)
1.5.1 CUA Configuration for different landscapes
1.5.2 Performing user administration activities in CUA
1.5.3 Distributing User/IDOCS and troubleshooting issues
1.6 User Groups Concept
1.7 Role Administration and authorizations concept
1.7.1 Overview of authorizations and roles
1.7.2 Change management process
1.7.3 Creating custom authorization objects
1.7.4 SAP Role types
1.7.5 Working with Profile Generator
1.7.6 Creating and modifying different roles
1.8 Authorization Group Concept
1.9 Missing authorization
1.10 Tracing the user for missing authorization.
1.11 Working with R/3 tables, parameters and Reports (in Detail)
1.12 Authorization Objects that needs to be verified in Production
1.12 SAP Security Audit

BI Security





Software Training & Development

http://www.sstechnologis.com/
1-11-101/1 Dr Praveen complex,Opp-Bus-stop,MainRoad,Alwal,Secunderabad-10
Mob : 40-27972266,9032041119


SAP Security Training Syllabus (R/3, BI, HCM, Portal & BPC)

Introduction: Info areas, Info providers, Infocubes, Multiproviders, DSO,
Architecture and strategies for a BI authorization concept
Difference between BW and R/3 security
Difference between BW and BI Security
Creating BW/BI roles and modification
Restricting access to Info Providers
Restricting access to queries
Securing Data Access for Reporting Users
How to Use BI-Specific Authorization Values
Defining Security Using Hierarchies
Important Aspects of BI Authorization
Different authorization objects involved in BW/BI
Analysis authorization concept and reporting
Troubleshooting BW/BI issues

HR/HCM Security
Introduction & Overview of the HR/HCM Functional
What is Infotype
HR Structures
Overview of Organizational Management
Difference between R/3 and HR Security
HR General Authorizations
HR Authorization Switches
Double Verification Principle
Symmetrical Double Verification Principle
Asymmetrical Double Verification Principle
HR Authorization Objects
Indirect Role Assignment
Structural Authorizations
Context Sensitive Authorization
Reports in HR

Portal Security




Software Training & Development

http://www.sstechnologis.com/
1-11-101/1 Dr Praveen complex,Opp-Bus-stop,MainRoad,Alwal,Secunderabad-10
Mob : 40-27972266,9032041119


SAP Security Training Syllabus (R/3, BI, HCM, Portal & BPC)

Introduction to Enterprise Portal
Creation of Users
Creation of Iviews,
Creation of Pages,
Creation of Worksets,
Creation of Roles
Creation of Portal Groups
Export and import of Roles, Groups and portal content.
Trouble Shooting Portal Issues.

BPC Security
What is BPC,
Versions of BPC
User management in BPC
Creation of Teams
Creation of Tasks
Creation of Data Access Profiles.
Trouble shooting the issues in BPC

Das könnte Ihnen auch gefallen