Homogeneous
Permanent tuning and performance monitoring in the aforementioned areas
Practical experience at home and abroad has given us a proven view of heterogeneous system landscapes. This flows into our consulting as a further plus point and creates not only smooth functionality but also cost efficiency of your individual system landscape.
SAP offers a huge toolbox of different technologies to support business processes. The usefulness of their use is essentially determined by the task and its technical requirements. We have gained a lot of valuable experience in the following technologies, which we would like to make available to you.
System Guides
How does a blockchain build consensus? Once you decide to send a payment to someone, you must use the Private Key to "sign" it (in German: signature). This means nothing other than that you specify another public address to which you want to send the money and confirm this transaction with your own private key. You don't have a central authority to send the information to, you're going to spread the information to all the other Miners around you. The miners then forward this information to other miners, who in turn do the same. This exponential wave of information reaches the entire network of the distributed community within a few milliseconds. Every time a miner receives a transaction, it checks that the transaction is actually correct. It checks which private key has signed, which public address the transaction should go to and whether the sender has enough "coins" for this transaction. What are consensus mechanisms? Any miner that solves a transaction through complex mathematical calculations is rewarded by the sender with a "fee" (transaction fee). How will it be decided which miner will receive the transaction fee? Because only one can get this reward. Also, what happens when you try a double spending by sending one transaction to one miner and then another transaction with the same money to another one millisecond later? These two could not yet exchange and thus information would be different in the network.
In this article on SAP Security Automation I would like to take a look at the future of automated processes in the SAP Security area. For many companies, the topic of security automation still offers a lot of potential in terms of time savings and process optimisation. Our daily work environment offers numerous tasks that could be handled excellently automatically. For this reason, in this article I present two of the possibilities that already exist in the broad area of security automation. Security Automation via SAP Security Check The first option of Security Automation, which I want to introduce here, is the automatic verification of the existing permissions. Have you ever wondered who has critical permissions in your SAP system? And have you ever tried to do this by hand? Depending on the level of expertise and experience of the privilege administrator, this is a time-consuming work. If an audit is also announced and the SAP system is to be checked for critical permissions and segregation of duties, then it is very difficult to meet all requirements and secure the eligibility landscape in this respect. For this reason, various vendors provide solutions to automate the verification of the permission system with regard to critical permissions and segregation of duties using tool support. This allows permission administrators to use their valuable time to correct the errors rather than just looking for them. For example, we use a tool that runs through the verification of over 250 rules. We then get an evaluation of which rules are violated and which points are correct. A simple example of such rules is the use of the SAP_ALL profile. Another would be to grant the jump permission in debugging (S_DEVELOP permission object with the ACTVT = 02 field). These are two relatively simple examples of Security Check tools' rulebook. In addition, queries are also made, which are located in the field of Segregation of Duties. Using this tool allowed us to move from manual validation of critical permissions to an automatic process.
"Shortcut for SAP Systems" makes it easier and quicker to complete a number of SAP basis tasks.
If you want to get more information about SAP basis, visit the website www.sap-corner.de.
This consists of one or more application servers and a message server.
The status light should be green.