Tag Archives: SAP Security

Five steps to implementing an effective SAP cyber security program

Establishing an effective SAP cyber security program ties key activities to clearly defined business risks specific to your organization. The high level steps to do this are: 1.Evaluate the organization’s capabilities and identify gaps 2.Understand the SAP landscape and the … Continue reading

Posted in Security | Tagged , , , , , , , , , , , | Leave a comment

What is an authorization object?

Authorization objects are groups of authorization fields that control a particular activity. Authorization fields are contained within authorization objects. Authorization objects relate to a particular action while authorization fields allow for security administrators to configure specific values in that particular … Continue reading

Posted in Security | Tagged , , , , , | Leave a comment

User Status Security in PM

A guide on setting up user status security for Plant Maintenance is now posted. Though B_USERSTAT is used universally across modules, it used in the PM module. Statuses can be controlled on equipment, work orders, notifications, etc. The B_USERSTAT Authorization … Continue reading

Posted in Plant Maintenance, Security, Troubleshooting, Tutorial | Tagged , , , , , , , , , , | Leave a comment