Enquiry
course-leftside-review

ECC Security

Learning SAP skills is an opportunity for growth and better job prospects. SAP skills differentiate you in the crowded market. You can access individual to global opportunities with SAP skills.

SAP has solution for anticipating risk, governance and compliance management. GRC (Governance Risk and Compliance) directly interacts, controls, and governs user access, which in itself is SAP Security. GRC, which stands for "Governance, Risk, and Compliance", is a process by which you control user security in the system. Every concept of GRC is built on the knowledge of SAP Security. GRC relies on the "ruleset", which is a catalog of t-codes and security authorizations that need to be monitored or controlled.

Training delivered for this course at Aspire is by professionals who are working in the field since last 6 years. They have hands on experience in SAP implementation/ support projects.

  • SAP Generation Shift
  • Why SAP is needed
  • Modules and the purpose of it

  • FI

  • MM
  • SD
  • QM
  • PP
  • HR
  • Job function and the responsibilities and Why SAP Security required in SAP ERP system
  • i. Transaction codes
  • ii. Landscape (DEVELOPMENT, QUALITY and PRODUCTION)
  • A. Single user creation SU01
  • i. Create user
  • ii.Assign Roles/Profiles
  • iii.Lock /Unlock user
  • iv. Delete user
  • v. Parameter tab
  • vi. Licence tab
  • vii. Default tab
  • viii. Role tab
  • ix. Profile tab
  • x. Address tab
  • xi. Reset/Change/Deactivate Password
  • xii. Reset/Change/Deactivate Password
  • B. Mass user creation SU10
  • i. Create users
  • ii. Deactivate mass users password
  • iii. Assign Roles/profiles
  • iv. Lock / unlock users
  • v. Delete mass users
  • vi. Disadvantages of SU10
  • C. user types
  • D. User groups for the purpose to use it
  • A. Role types
  • i. Single role
  • ii. Master role - Derived role
  • iii. Composite role
  • B. Introduction to Authorization objects
  • i. Activities/fields.
  • ii. Important Authorization objects
  • C. Add manually authorization objects/T-codes
  • i. Deactivate authorization object.
  • D. Traffic lights
  • E. Mass user comparison
  • G. Authorization generation
  • H. Expert mode of role generation
  • A. Role types
  • i. Transport request types
  • ii. Transport single /mass roles
  • iii. Release transport
  • iv. Import transport.
  • v. Role Download/upload
  • vi. How to delete the role from production system
  • i. User selection criteria
  • ii. Roles by complex selection criteria
  • iii. Comparison
  • iv. Change documents
  • i. Authorization group creation
  • ii. Map authorization group to Tables
  • iii How to restrict a custom program
  • i. SU53
  • ii. Map authorization group to Tables
  • i. SU53
  • ii. Map authorization group to Tables

Download PDF

Benefits of Aspire Techsoft training

ASAP methodology

24 HOURS LAB

MATERIAL SOFT COPY& HARD COPY

100% PLACEMENT ASSISTANCE

RESUME PREPARATION

SOFT SKILLS& HR TIPS

Did Aspire convinced you ? Add Your Review

Your Ratings



course_footer

Courses We Offer

ADD NEW SKILLS TO YOUR PROFILE



Also Find Us At


Explore Smarty