SM02 Create system message
Error minimization & data security
What do RFC interfaces and RFC security have to do with the play "Hauptmann von Köpenick" and the science fiction film "Minority Report"? Probably more than you like! RFC security and theatre?! Germany, Berlin, 1906: The 46-year-old cobbler Wilhelm Voigt dreams of returning to a normal life. After various convictions and many prison stays, he lives on the margins of society. It's not just the money he lacks. Above all, the lack of access to his social system makes him. In view of his impasse, he opts for a drastic measure. The excluded shoemaker pulls off and grates off several junk dealers to assemble a military uniform gradually. A few days later, he slips into the same disguise, successfully changes his identity and then swings through Berlin as Captain von Köpenick. He commandeers soldiers, storms the town hall and even detains the mayor. There is no doubt about the commands and their execution, because their true identity is veiled: Because of a simple disguise. A disguise that gives him all the necessary permissions he needs for his scam. At the end of the day, Wilhelm Voigt successfully compromised the Berlin government. RFC Security and Science Fiction?! USA, Washington, DC, 2054: The Washington police have long since stopped investigating murders: It prevents the killings right in advance. For this purpose, so-called "precogs" are used, which use precognition to predict and report murders in visions before they happen. At the same time, the government uses a system of public scanners that can identify all citizens clearly at any time by iris detection. One day, when policeman John Anderton himself appears as the culprit in a vision of the "Precogs," he flees the police building and decides to find out why.
The higher the degree of standardisation of operational and maintenance tasks, the more effective the technical operation and maintenance can be. At the same time, this simplifies outsourcing and, if necessary, the use of a cloud solution. CHOOSING AN APPROPRIATE SERVICE FORM Regardless of the chosen service form, as well as outsourcing and outtasking, the overall responsibility for the availability and performance of the IT-supported applications remains with the company. This still means internal coordination of maintenance windows or release booths, which remains in place. Similarly, the services provided by the external partner must be regularly monitored and their quality checked. Therefore, the chosen IT strategy must be chosen from this point of view with the lowest risk. If the technical operation is not sufficiently assessed in the decision, there is a significant business risk.
SAP Security
Within SAP R/3 Enterprise, the SAP Basis Plug-In is a prerequisite for you to use the SAP R/3 Plug-In. SAP Basis Plug-In and SAP R/3 Plug-In must always have the same release level, for example PI 2004.1 and PI Basis 2004.1. If you plan to upgrade SAP R/3 Plug-In within SAP R/3 Enterprise, you must also upgrade SAP Basis Plug-In. As of SAP Basis Plug-In 2005.1, the release levels of the two plug-ins no longer need to correspond. However, the SAP R/3 Plug-In Support Package for PI 2004.1, which contains new interfaces, still requires a specific SAP Basis Plug-In. For example, SAP R/3 Plug-In Support Package 10 for SAP Plug-In 2004.1 requires SAP Basis Plug-In 2005.1.
However, the system modifiability has no influence on customising changes that are customised by the client. If you want to set the customising changes to customise, you must go to the client control. You can achieve this either by pressing the button "Client Control" when changing the system or by calling the table T000 via the transaction SM30. If you are now in the list of clients, you can double-click on the respective row to jump into the settings of the respective client. Here you can also make the desired settings and save them. Step-by-Step Tutorials System Modifiability (Customising Settings and Repository Objects that are independent of the client) Call the SE06 and click on "System Modifiability". Adjust the desired objects and global setting, depending on your request. Save the changes. Client control (custom customising settings) Call the T000 table in the SM30. Double click on the desired client. Change the settings here depending on your request. Save your changes.
For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.
Planning ahead: Ideally, your SAP system administrator should make the necessary adjustments to your system landscape before end users are affected.
It is possible to identify master and derived roles by using naming conventions.