Show TOC

User Administration and AuthenticationLocate this document in the navigation structure

Use

An unauthorized user, who manages to access a system under a known user in the system, can proceed to do whatever is possible under this known user. If the known user happens to have access to critical information, then the impersonator also has access to the same information. Therefore, providing secure authentication protects the availability, integrity, and privacy of your system at every level.

We describe how the AS ABAP systems facilitate secure authentication and administration in the following topics.