Incentive and Commission Management offers a range of security-related functions with which you can cover your security requirements. In addition to the specific Incentive and Commission Management topics, see also the SAP Security Guide that covers the SAP security standard.
Here you find all of the security topics related to Incentive and Commission Management and links to the relevant sections in the SAP Security Guide.
Introduction
An explanation of the importance of security and for which target groups the Security Guide is relevant.
Before You Start
Where to find information on security.
Technical System Landscape
An overview of the technical system landscape of Incentive and Commission Management.
User Administration and Authentication
· Authorization Management
· User Data Synchronization
· Integration into Single Sign-On Environments
Authorizations
· Authorization Profile
· Authorization Types
Network and Communication Security
All (RFC) interface modules undergo the same authorization check as the transactions in the Incentive and Commission dialog.
· Interfaces and Data Transfer in ICM
· See the SAP Security Guide Volume II, unit: Communication Interfaces
Virus Protection
Data Protection in ICM
All posting-relevant data is available for audit in Incentive and Commission Management. Note that changes to important data can only be made with a log of all of the necessary parameters (user, time, and so on) because otherwise the changes cannot be tracked. For more information, see Period and Version Management.
Data Storage Security in ICM
Procedure Documentation in ICM
See Procedure Documentation in ICM