Do you want more traffic, leads, and sales?
SAP IDM
SAP Cyber Security
SAP Lead Generation
Recent Posts
SAP Security Management Best Practice: Managing you object changes in SAP roles
When you add transaction to the role the objects are brought into the roles in two states Standard or maintained. When you change the Standard state the object will go to changed status. But if you...
SAP License audit is a Yearly Ritual which has to be performed by all the SAP customers. This will enable SAP to review the SAP License Compliance by their customer. This way SAP can determine if...
SAP License Audit Steps 1. Review all your users in SAP System to make sure they still are required. Mainly focus on user who are no more with the company and test ids created in the with user...
[slideshow_deploy id='1684'] [vc_row css=".vc_custom_1512575306373{margin-top: 50px !important;}"][vc_column width="1/3"][vc_cta h2="Free Step by Step SAP License Optimization Guide" shape="square"...
Steps for SAP Security Assessment of Roles in SAP ECC System
Simple Steps for SAP Security Assessment of Roles in SAP ECC System SAP Security Assessment on SAP role-based security landscape to access the Current SAP Security Posture in five key areas: SAP...
This Information and documentation is copyright by SAP AG UCON Phase Tool (Transaction UCONPHTL) UCON RFC Security Concept External access to RFC function modules requires assignment to the UCON...