SAP Basis /IWFND/MAINT_SERVICE Activate and manage services

Direkt zum Seiteninhalt
/IWFND/MAINT_SERVICE Activate and manage services
SAP Administration I
An important area of SAP Security is the analysis of the customer's own SAP programs, which are classically written in the proprietary SAP language ABAP. Here, too, as in all programming languages, security vulnerabilities can be programmed - whether consciously or unconsciously. However, the patterns of security vulnerabilities in ABAP code differ from those in Java stacks or Windows programs. The goal of these conventional programs is usually to either crash the program (buffer overflow) or to artificially execute the program's own code (code injection). Both is not possible in ABAP, since a crash of a process causes nothing else than the creation of an entry in the log database (Dump ST22) and a subsequent termination of the report with return to the menu starting point. So a direct manipulation as in other high level languages or servers is not possible. However, there are other manipulation possibilities.

The application layer is the central component of the SAP R/3 system. This layer is therefore also referred to by SAP as the actual basis system. Within the layer there are application servers and a message server.
SAP license maintenance
Expand your SAP landscape by adding new functionalities or installing SAP Enhancement Packages (EHP). Even if you want to update your SAP system to the latest version, we will be at your side to ensure that your systems remain up-to-date and functional. All services at a glance:

The tasks described above, which occur at rather irregular intervals and involve a certain degree of complexity due to the lack of routine or process know-how, should be examined in order to determine whether they can be performed more efficiently by an external service provider. One question to be answered is whether it is necessary to keep the necessary knowledge in the company in order to be able to react faster than the external service provider. For example, for business critical systems. Security aspects should also be considered, as external persons gain access to the system. From now on, outtasking performance must be regularly monitored and checked for quality and documentation. A complete dependence on the external partner must not arise.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

Basically, it is a condition that occurs sooner or later in any organization that maintains SAP systems.

The "Single Role" button will then be used to create the desired role.
SAP Corner
Zurück zum Seiteninhalt