SAP Basis Related terms

Direkt zum Seiteninhalt
Related terms
SWF_ADM_SUSPEND Restart of suspended callbacks
In the database, which is located on a database server, all data of a company is saved. Application programs pull the data they need from the database. This data can consist of data tables, applications or system control tables. In addition, the database also takes new information from users and backs it up.

Select the transport order from the development system that was rejected in the quality system. This is technically repackaged into the Q-System in a new order and transported to the quality system. At this point you will again have the possibility to perform the approval step you really want to perform.
Manage batch jobs
A role concept according to best practice protects you from potential attacks within your SAP landscape. However, to protect your system from unauthorized access via the network, the SAP Gateway must be configured correctly. It enables the use of external programs via interfaces or the call of ABAP programs and serves as a technical component of the application server, which manages the communication of all RFC-based functions.

By using a code scanner, it is now possible for every developer to scan for complex security patterns during the extended check of his program, which tell him whether he has built vulnerabilities into his program. These vulnerabilities are detected and can now be addressed in a workflow-driven process. Currently, there are two products that can support customers in the area of scanning their own SAP programs.

"Shortcut for SAP Systems" is a PC application that simplifies or even facilitates many activities in the SAP base.

In this blog, I would like to show you how you can best implement this and what to look out for.

But how do you like the following story, for example? RFC Security and the Art of Identity Change Germany, everywhere, 2017: Johannes Voigt has been a medium-sized company employee for several years.
SAP Corner
Zurück zum Seiteninhalt