Configure and maintain secure system access!

Authorizations in SAP S/4HANA and SAP Fiori







Print edition E-book Bundle
625 pages, , Print edition hardcover
ISBN 978-1-4932-2036-6
625 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2037-3
625 pages, , Print edition hardcover
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2038-0
Develop a complete authorization concept for SAP S/4HANA and SAP Fiori with this guide! Start by understanding how authorizations work in an ABAP system and exploring the main transactions you’ll use for configuration. Then learn to create roles with Transaction SU24 and the Profile Generator, track and correct missing authorizations with traces, manage users, and more. See how SAP Access Control can be a useful tool to manage authorizations and learn to migrate authorizations to SAP S/4HANA.
  • Configure and maintain ABAP authorizations for SAP S/4HANA and SAP Fiori
  • Work with roles, profiles, authorization objects, and system traces
  • Maintain system users, manage roles with SAP Access Control, and more
About the Book About the E-book 625 pages, hardcover, 1.4 in. Reference book format 7 x 10 in. Printed black and white on 60# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout. E-book in full color. PDF (23 MB), EPUB (23 MB) file for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you’ll learn about:

  1. Authorization Concept

    Create and configure SAP S/4HANA roles that comply with business and legal regulations. Learn to use traces, maintain user master records, and debug authorizations.

  2. Tools and Transactions

    Master essential authorization management tools and transactions, including Transactions SU24, PFCG, SU01, and SAP Access Control.

  3. SAP Fiori

    Design roles and configure frontend and backend authorizations for SAP Fiori.

Highlights include:

  • ABAP authorizations
  • Roles
  • Transaction SU24
  • Profile Generator
  • Authorization traces
  • User maintenance
  • SAP Access Control
  • Debugging
  • Migration
  • Xiting Authorizations Management Suite (XAMS)

Alessandro Banzer is the chief executive officer of Xiting. He has worked in information technology since 2004, specializing in SAP since 2009. Since then, Alessandro has been involved with global SAP projects in various roles.

Alexander Sambill is a senior SAP security consultant and certified SAP trainer at Xiting Germany.

more >

You may also like:

  • Cover of Configuring SAP Fiori Launchpad

    Configuring SAP Fiori Launchpad

    Claus Burgaard, Setu Saxena

    515 pages, hardcover

    Get the SAP Fiori launchpad up and running! Configure the SAP Fiori launchpad for key on-premise systems: SAP S/4HANA, SAP Business Suite, and SAP Enterprise Portal. Use the SAP Launchpad service in the cloud by setting up SAP Business Technology More about the book

    from $74.99


    E-book | Print edition | Bundle
  • Cover of SAP Business Technology Platform

    SAP Business Technology Platform
    An Introduction

    Smitha Banda, Shibaji Chandra, Chun Aun Gooi

    570 pages, hardcover

    What is SAP Business Technology Platform, and what does it offer your organization? Answer these questions and more with this introduction! See how SAP BTP serves as your complete technical foundation and learn about its capabilities for application development, integration, More about the book

    from $74.99


    E-book | Print edition | Bundle
  • Cover of Implementing SAP Fiori 3 Security

    Implementing SAP Fiori 3 Security

    Neha Gulati, Shreya Gulati

    104 pages

    Get the guidance you need to protect your SAP Fiori apps! Start by reviewing SAP Fiori 3 architecture to see how it impacts security. Then follow step-by-step instructions to configure frontend and backend authorizations. Learn how to implement security methods More about the book