SAP Basis Storage Management Parameters in the SAP System

Direkt zum Seiteninhalt
Storage Management Parameters in the SAP System
SQ03 User group maintenance
The comprehensive analysis provides the pattern and roadmap for the next steps. This also includes the right sizing, the selection of the monitoring concept and the appropriate deployment model, i.e. on-premise, cloud or hybrid cloud. Only with this planning can you ultimately achieve the desired goal - with transparent costs.

Many companies that use or would like to use an SAP Basis system seek advice from external service providers or completely outsource the administration of the system. SAP Basis Consulting is a technical consulting service that covers many tasks and sub-areas related to SAP Basis. Providers include BasisTeam IT Service & Consulting AG, Phoron, Mindsquare and many others.
Integration of SAP Notes
So-called Access Control Lists (ACL) offer a good possibility to secure your gateway in order to exclude unwanted external accesses to the database of the application server. With the help of the ACL files reginfo and secinfo an access control can be implemented, in which allowed as well as forbidden communication partners can be defined. The reginfo file controls the registration of external programs on the gateway, which means that rules can be defined that allow or prohibit programs. With the help of the file secinfo you can define which users are allowed to start an external program. To be able to use these files, you must set the parameters gw/reg_info and gw/sec_info (transaction RZ11). For more information, refer to SAP Note 1408081.

What makes using Avantra so interesting is the elimination of manual effort. This frees up SAP technology teams to build new skills.

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.

Some useful tips about SAP basis can be found on www.sap-corner.de.

Therefore, the chosen IT strategy must be chosen from this point of view with the lowest risk.

For example, lists of existing roles or user groups and tables are read from the system each time the document is generated and updated in the permission concept.
SAP Corner
Zurück zum Seiteninhalt