Cloud
The Basis system comprises a total of three layers (Figure 1):
In order to fully exploit the advantages of SAP NetWeaver as an integration platform, professional care and maintenance of the components by experienced SAP developers is indispensable. Only under these circumstances can IT operations meet the requirements and work quickly, flexibly, innovatively and cost-effectively.
SAP Basis administrators still spend much of their time reviewing their systems or doing project work such as new installations. With the transition to more automated, container-based environments that span multiple clouds, the role of the administrator will also need to be redefined and root cause analysis will take on a much higher profile.
System replication is better
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.
The SAP Authorization Concept course provides a fundamental overview of the SAP authorization concept. The goal is to understand the authorization concept and the ability to define individual authorization profiles. The delivered roles and the profile generator of SAP are used.
Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.
The website www.sap-corner.de offers many useful information about SAP basis.
Warning: There must be permissions for the transaction RSPRECALCADMIN and SM51.
To run Fiori applications from the launchpad and the permission queries defined in the OData services, the corresponding Fiori permission objects must also be maintained in the PFCG.