SAP Basis What is "SAP Basis" and what are the tasks of "SAP Basis administrators"?

Direkt zum Seiteninhalt
What is "SAP Basis" and what are the tasks of "SAP Basis administrators"?
SAP Electronic Data Interchange
Many companies are struggling with the introduction and use of secinfo and reginfo files to secure SAP RFC gateways. We have developed a generator that supports the creation of the files. This blog post lists two SAP best practices for creating the secinfo and reginfo files to enhance the security of your SAP gateway and how the generator helps you do this. secinfo and reginfo Request generator Option 1: Restrictive procedure In the case of the restrictive solution approach, only in-system programmes are allowed. Therefore, external programmes cannot be used. However, since this is desired, the access control lists must be gradually expanded to include each programme required. Although this procedure is very restrictive, which speaks for safety, it has the very great disadvantage that, in the creation phase, links which are actually desired are always blocked. In addition, the permanent manual activation of individual connections represents a continuous effort. For large system landscapes, this procedure is very complex. Option 2: Logging-based approach An alternative to the restrictive procedure is the logging-based approach. To do this, all connections must be allowed first by the secinfo file containing the content USER=* HOST=* TP=* and the reginfo file contains the content TP=*. During the activation of all connections, a recording of all external programme calls and system registrations is made with the gateway logging. The generated log files can then be evaluated and the access control lists created. However, there is also a great deal of work involved here. Especially with large system landscapes, many external programmes are registered and executed, which can result in very large log files. Revising them and creating access control lists can be an unmanageable task. However, this process does not block any intentional connections during the compilation phase, which ensures the system will run non-disruptively.

The following figure shows the logging for the SAP standard group "SUPER". For this group, all activities are recorded in all clients.
SWELS Switch event trace on/off
The identification of critical SAP permissions for the use of an SAP system must therefore be carried out in any case. In addition to permissions, you can also identify critical profiles and roles that are already in the delivery state.

It is essential to define the role to be played within the company. STEP 4: DETERMINATION OF THE TARGET GROUP In this step, the target group of the service is defined and described in detail, e.g. by means of a letter. It will also discuss future target groups which may be of interest in the future. By defining a target group within a company, the SAP basis decides for whom the services and IT products should be delivered. It also makes sense to identify and describe future target groups (e.g. specialist areas) within the framework of a transformation of the SAP basis. STEP 5: POSITIONING This step will position the service on the market and also position the competitors in the relevant segment.

For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.

DDIC_IMPORT In this step, all ABAP Dictionary objects of the queue are imported.

In the area of SAP Basis Operations, we handle all technical tasks for our customers that arise during the installation, operation and maintenance of SAP systems.
SAP Corner
Zurück zum Seiteninhalt