Administration SAP & SAP HANA
Installation and configuration of SAP® systems
Furthermore, you enrich our team with: Knowledge or experience in SAP NetWeaver technologies (e.g. AS-Java, AS-ABAP, S/4HANA SAP PI, SAP BI, SAP Gateway or SAP folder management), Experience in the administration of Windows or Linux server systems, databases or web applications, Knowledge or experience in the administration of server hardware and storage technologies, very good conceptual skills in system design and system integration, very good knowledge in the area of security relevant topics of IT system operation, good teamwork skills, good communication skills and a service-oriented attitude with high self-motivation and willingness to perform. Good written and spoken German skills are expected (level similar to at least B2). Regular further training will help you to develop your personal skills in a targeted manner.
A BW system often plays a very central role in larger companies. Here the data from the various connected source systems are analysed and reported centrally. A previous customer of mine had a BW system, to which a total of over 20 other SAPP production systems were connected. With such a large and mostly living system landscape, it is normal that individual systems are dismantled from time to time. However, especially with large SAP landscapes, there are strict regulations regarding the permissions of technical RFC users. For this reason, the simple "right-click —> delete" of a source system in RSA1 will often not lead to the target, but rather to a failed permission check. With this blog post, I'll show you a workaround on how to clean a source system from a BW system using the RSAR_LOGICAL_SYSTEM_DELETE and RSAP_BIW_DISCONNECT function blocks.
Schedule and execute background jobs
Database layer: All of a company's data is stored in the database, which is located on a database server. Application programs pull the data they need from the database. This data can consist of data tables, applications or system control tables. In addition, the database also takes new information from users and backs it up.
By using a code scanner, it is now possible for every developer to scan for complex security patterns during the extended check of his program, which tell him whether he has built vulnerabilities into his program. These vulnerabilities are detected and can now be addressed in a workflow-driven process. Currently, there are two products that can support customers in the area of scanning their own SAP programs.
With "Shortcut for SAP Systems" a tool is available that greatly facilitates some tasks in the SAP basis.
SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page: www.sap-corner.de.
You can also find more support for using ACL files in the SAP Community Wiki.
They are therefore largely excluded from operational operations.