3 arrows

Winter-Ready Savings Up To $500 Off Training 

closeClose

SAP Security Boot Camp to certification

Skills Gained Learn about the elements, strategies, and tools of the SAP authorization concept Create and assign authorizations using the Role Administration / Profile Generator Know more about the...

Read More
$4,090 USD
Course Code WNASEC-v016
Duration 5 days
Available Formats Classroom
5254 Reviews star_rate star_rate star_rate star_rate star_half
Course Image

Skills Gained

  • Learn about the elements, strategies, and tools of the SAP authorization concept
  • Create and assign authorizations using the Role Administration / Profile Generator
  • Know more about the principle usage of the NetWeaver Identity Management and Central User Administration (CUA)
  • For classroom events this workshop includes the associate exam on the final day (C_AUDSEC_731). For virtual deliveries students will be issued a Pearson VUE Voucher.

Who Can Benefit

  • System Administrator
  • Technology Consultant

Prerequisites

  • *Essential:
       -SAPTEC *Recommended:
       -none

Course Details

Course Content

  • Authorization Concepts for Compliant Identity Management
       -Working with Identity Management (IDM)
       -Working with Governance, Risk and Compliance (GRC)
       -Working with Compliant Identity Management (CIM)
       -Designing an Authorization Concept for an AS ABAP based system
       -Implementing an Authorization Concept for an AS ABAP based system
       -Authorization Terminology
       -Working with the Elements and Terms of an Authorization concept
       -Checking authorization in an ABAP systems
  • User Maintenance
       -Working with different User sources
       -Maintaining User
  • Basic Role Maintenance
       -Defining a role
       -Defining authorizations in a role
       -Creating composite roles
       -Creating reference and derived roles
  • Advanced Role Maintenance
       -Using subtleties of the authorization maintenance
       -Defining authorizations for system user
  • Configure authorization environment
       -Installing and Upgrade the role maintenance
       -Configuring the role maintenance
       -Defining system settings
       -Analyzing authorization
  • Compliance and Provisioning Applications from SAP
       -Explaining SAP Governance, Risk, and Compliance (SAP GRC)
       -Describing SAP GRC
       -Using Identity Management (IdM)
       -Implementing Central User Administration (CUA)
  • Infrastructure Security
       -Enabling Secure Network Communication (SNC)
       -Enabling Secure Socket Layer (SSL)
       -Implementing Single Sign-On (SSO) in SAP Systems
  • Audit Information System (AIS) and the Audit Information System Cockpit
       -Configuring and Using the AIS
       -Performing a System Audit Using the Audit Cockpit
  • User and Authorization Audit
       -Customizing the Role Maintenance Tool
       -Analyzing and Securing Users
  • System Audit
       -Configuring and Using the Security Audit Log
       -Securing System Administration Services
  • Security Assessment
       -Optimizing Security Using SAP Security Optimization Self-Service
       -Consulting SAP Security Notes
Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward