Use the SAP Configuration Validator Tool to Diagnose Issues with SAP Access Control Configuration

  • by John Stephens, Senior SAP Security Consultant, Hermosa Beach Consulting Group
  • December 7, 2012
Learn how to configure and use the Configuration Validator tool for SAP Access Control 5.3 to diagnose issues with your company’s configuration or provide quick information to speed up the SAP support process.
Key Concept
The SAP Access Control Configuration Validator (ACCV) tool provides a summarized report of your current SAP Access Control configuration. It can be used to diagnose a current issue, provide periodic configuration checks, or provide a quick report to SAP support to speed up the support process. The report lists more than 53 different configuration checks and ranks the severity from low to very high. Additionally, you can configure certain aspects of the report to suit your company’s system or just provide a quick variant report of a targeted issue.

The SAP Access Control Configuration Validator (ACCV) tool helps you in diagnosing possible configuration errors with your SAP Access Control 5.3 system. It is designed to provide information to SAP support, but it can also be very useful for a company to use for a quick configuration check or a baseline of configuration before a system Support Package upgrade. Before using the tool, refer to “Technical Tips for the SAP Access Control Configuration Validation Tool” to determine if your company’s system is properly upgraded to the correct Support Package and whether it has the proper authorization to run it.


John Stephens

John M. Stephens is a senior SAP security and GRC consultant with Hermosa Beach Consulting Group. He has 15 years of SAP authorizations experience and has specialized in security implementations and upgrades of SAP GRC, SAP NetWeaver BW, SAP BusinessObjects, and SAP NetWeaver Portal over the last five years. Before joining Hermosa Beach Consulting Group, he managed teams to coordinate and performed SAP security implementations and administration activities within small, midsize, and large multinational SAP environments and operated as an independent consultant, performing SAP system audits, security implementations, and redesigns across many SAP applications.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.