SAP Basis Implementation of the configuration in the system

Direkt zum Seiteninhalt
Implementation of the configuration in the system
Planning / Implementation
When it comes to outsourcing or outtasking SAP Basis services, we see ourselves as an experienced partner for ensuring that your SAP systems run smoothly. In addition to planning your future SAP deployment, we perform upgrades and configuration changes. We support you on-site and/or remotely in all SAP system management tasks to ensure the continuous availability of SAP applications.

Job scheduling: your system needs to run various automatic background jobs that consume resources. Your administrator must carefully schedule these tasks when user demand is low so they don't impact performance.
Layer Description
Presentation layer: The presentation layer is the interface to the users. With the help of SAP GUI, the data is graphically prepared here and made available to the user on the screen. Furthermore, the data newly collected here is passed on to the application programs of the application layer.

Therefore, there can also be critical permissions, profiles, and roles that do not fit in the naming scheme defined by SAP. Manual identification of critical SAP permissions is difficult overall. However, tools are available that automatically check for critical permissions. In this case, the critical SAP permissions are usually predefined by special verification software. If the critical permissions, profiles, and roles are identified, they should be adjusted according to the permission planning. The system will then be checked to see if the desired system behaviour has been achieved or if malfunctions occur. This adjustment process may be complex in the event of major changes and should not be carried out on the production system.

"Shortcut for SAP Systems" simplifies tasks in the area of the SAP basis and complements missing functions of the standard.

SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page: www.sap-corner.de.

Everything from the network to the host's operating system must be secured.

This role must be filled more and more often.
SAP Corner
Zurück zum Seiteninhalt