Authorizations

[101 Matches Found]
Page 1 of 6         1 2 3 4 5 6      
Article icon
Financials – 

Examine how Eli Lilly and Company ensures the reliability and auditability of its process control system. Learn how it defines and deploys continuous control monitoring and the process flow it uses to identify issues.


Article icon
Financials – 
Learn how Tyson Foods maintains Sarbanes-Oxley (SOX) compliance by taking full advantage of its SAP governance, risk, and compliance (GRC) solutions to anticipate possible controls violations before they occur. See how the company proactively performs rigorous controls self-assessments using SAP Process Control.

Article icon
Financials – 
Mars transitioned its largest SAP user population to a new global security architecture and governance process. See how Mars completed the phases of the security redesign and learn about the key tasks it performed to ensure proper security role maintenance and user assignment.

Article icon
by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services November 13, 2017
BI/HR/SAP Professional Journal – 

Big Data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP HANA uses analytic authorizations to implement row-level security ensuring the information is consumed only by its rightful users. However, SAP HANA does not offer a column-level security feature out of the box. Abhijit Ingale describes the process to implement column-level security in SAP HANA.


Article icon
by Kehinde Eseyin, Security Architect June 14, 2017
SAP Professional Journal/BI/HR – 

Kehinde Eseyin shows how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Article icon
by Diony J. Ruiz R., SAP Architect and Senior Consultant, Group Intellego February 1, 2016
SCM/Financials – 

Diony Ruiz explains the steps to complete in customizing to configure advanced authorization strategies in Credit Management/Risk Management in SAP sales and distribution (SD).


Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys November 25, 2015
SAP Professional Journal/BI – 

Nitin Aggarwal and Sanjeev Kotwal show the various options available to customize SAP Access Control to provide automated provisioning of dynamic analysis authorization values in SAP Business Warehouse (SAP BW) systems.


Article icon
by Anjali Butley, Solution Architect, SAP SCM and SAP Integrated Business Planning November 11, 2015
SCM/SAP Professional Journal – 
Anjali Butley explains how to manage stakeholder access for SAP Integrated Business Planning for sales and operations 4.0. She also describes the challenges of ensuring that SAP Integrated Business Planning for sales and operations data is accessed and shared by the right users.

Article icon
by Ameya Pimpalgaonkar, Senior SAP Architect May 26, 2015
SAP Professional Journal – 

Ameya Pimpalgaonkar shows how to configure SAP HANA Cloud Platform to switch from the standard identity provider (IDP) or SAP ID Service to instead authenticate users using your own custom identity provider. Every organization would want to maintain its own user store and identity management for security purposes. SAP HANA Cloud Platform by default uses the SAP ID Service, which requires users to be registered users on SCN. However, at the organization level, this makes no sense. This is why it is important to have custom identity providers. Learn how to configure a local IDP that you can create on the fly within Eclipse. You can create temporary users within Eclipse so that you can test the custom IDP-based authentication without any additional configuration. You can then use these users to run applications deployed on SAP HANA Cloud Platform.


Article icon
by Sam Gassem, Senior Business Consultant/BW Lead, Rural Sourcing, Inc. March 2, 2015
SAP Professional Journal – 
Change Request Management (ChaRM) security is not a subject about which you can easily find complete organized information. Sam Gassem discusses ChaRM security in detail.

Article icon
by Kees van Westerop, Senior SAP Consultant, Kwest Consulting December 19, 2014
Financials/SAP Professional Journal – 

Kees van Westerop explains how to configure settings to enable extended authorization with Project System via partner roles.


Article icon
BI – 

Ned Falk shows how you can create personalized scheduled Web Intelligence documents with SAP BW and BusinessObjects to elevate performance issues and provide reports tailored to each user.


Article icon
by Amit Saini, Specialist Developer, SAP Labs India Pvt. Ltd. October 13, 2014
SAP Professional Journal – 

Amit Saini explains how to set up authorization for different business users inside an organization using SAP Process Control. He also covers troubleshooting and best practices for different application scenarios in SAP Process Control.


Quick tips icon
by Meta Hoetjes, SAP Security Expert, CSI-tools December 31, 2013
SAP Professional Journal/Financials – 
Meta Hoetjes defines what access governance is and explains why it is so important for organizations to use good supporting tools for implementing access governance in organizations using SAP systems.

Article icon
by Kehinde Eseyin, Security Architect December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


Video icon
by Tracy Levine, SAP Application Consultant, itelligence November 27, 2013
SAP Professional Journal/Financials – 
In this webinar, Tracy Levine, SAP GRC Consultant at itelligence, discusses strategies around surviving an SAP security audit and maintaining compliance objectives long term. Tracy shares her methodology around optimizing your SAP security landscape and utilizing SAP Access Control to prevent reintroduction from risk exposures by taking an audit approach to SAP security.

Page 1 of 6         1 2 3 4 5 6