Identity Management |
Identity Management for System Landscapes |
SAP NetWeaver Identity Management |
Integration of User Management in Your System Landscape |
Adding an ABAP System to Your System Landscape |
Adding an AS Java System to Your System Landscape |
Administration of User Data |
Integrated Role and User Administration |
Using ABAP-Centered Role Administration |
Using Portal-Centered Role Administration |
Using ABAP-Centered Role Assignment |
Using the Portal-Centered Role Assignment |
User and Role Administration of AS ABAP |
AS ABAP Authorization Concept |
Organizing Authorization Administration |
Assigning Authorizations |
From the Programmed Authorization Check to a Role |
Editing Authorization Default Data (Development System) |
Editing Authorization Default Data (Customer System) |
Maintaining Authorizations in SAP Example Roles |
Maintaining Authorizations in Roles for Productive Use |
Trace for Authorization Checks |
Maintaining Authorization Default Values Using Trace Evaluation |
Maintaining Authorization Fields Using Trace Evaluation in Trans |
Maintaining Role Menus Using Trace Evaluation in Transaction PFC |
Using the System Trace to Record Authorization Checks (Transacti |
Glossary |
Configuration of User and Role Administration |
First Installation Procedure |
Setting Up User and Authorization Administrators |
Configuring User Group as Required for User Master Records |
Interaction of Required User Groups and Central User Administrat |
Enabling Movement Activity for S_USER_GRP |
Setting Up the Role Administration Tool |
Defining the Scope of Authorization Checks |
Preparatory Steps |
Globally Deactivating Authorization Checks |
Reducing Authorization Checks in Applications |
Searching for Deactivated Authority Checks |
Editing Templates for General Authorizations |
Check Indicators |
Logon and Password Security in the ABAP-System |
Password Rules |
Profile Parameters for Logon and Password (Login Parameters) |
Customizing Switches for Generated Passwords |
Rules for User Names |
Protecting Special Users |
Securing User SAP* Against Misuse |
Securing User DDIC Against Misuse |
Security in System Groups |
Role Administration |
Role Administration Functions |
Changing Standard Roles |
Creating Single Roles |
Role Menu |
Merge Function for the Authorization Data of PFCG Roles |
Editing Predefined Authorizations |
Symbols and Status Text in Authorization Administration |
Copying Authorizations From Templates |
Assigning Users |
Assign MiniApps |
Personalization Tab Page |
Creating Derived Roles and Copying Authorizations |
Authorization Checks when Adjusting Derived Roles |
Comparing and Adjusting Role Menus |
Creating Composite Roles |
Generating Authorization Profiles |
Regenerate the Authorization Profile Following Changes |
Performing a Mass Generation of Profiles |
Transporting Authorization Components |
Transporting and Distributing Roles |
Transporting Manually-Created Profiles |
Transporting Manually-Created Authorizations |
Transporting Check Indicators and Field Values |
Loading or Storing Check Indicators and Authorization Default Va |
Transporting Templates |
Analyzing Authorization Checks |
Analyzing Authorizations using the System Trace |
Authorization Error Analysis Functions |
Indirect Role Assignment Using Organizational Management (OM) |
Assigning a Role Indirectly |
Indirect Role Assignment in a System Landscape |
Distribution of the Organizational Management Model |
Creating an Organizational Management Distribution Model in the |
Generating Partner Profiles of the OM Distribution Model |
Creating an Outbound Filter with Customer Exit |
Activating Change Pointers |
Writing Change Pointers for Infotype 0105 |
Distributing the Organizational Management Model (Initial Distri |
Distributing Changes to the Organizational Management Model |
Central User Administration |
Setting Up Central User Administration |
Creating an Administration User |
Setting Up Logical Systems |
Defining/Setting Up a Logical System |
Assigning a Logical System to a Client |
System Users and RFC Destinations |
Defining Authorizations for System Users |
Determining Existing RFC Destinations and System Users |
Creating System Users |
Creating an RFC Destination for the Target System |
System Users and RFC Destinations with Trusted Systems |
Creating RFC Destinations for the Target System with a Trusted S |
Advantages and Disadvantages of Trusted RFC Destinations |
Creating the Central User Administration |
Setting Up Field Distribution Parameters |
Synchronizing and Distributing Company Addresses |
Synchronizing User Groups |
Transferring Users from New Systems |
Displaying and Processing Distribution Logs |
Error Analysis |
Checking the Setup of Central User Administration |
Avoiding Termination when Saving the System Landscape |
Creating an ALE Model Including Partner Profiles Manually |
Creating the ALE Distribution Model |
Generating Partner Profiles |
Checking Partner Profiles |
Correcting Errors in Partner Profiles |
Distributing the Model View |
Other Error Sources |
Activated Background Processing |
Changing Partner Profiles with Active Background Processing |
Creating a Background User |
Removing Central User Administration |
Removing a Child System from Central User Administration |
Removing Central User Administration Completely |
Glossary |
Application Link Enabling (ALE) |
ALE Landscape |
ALE Integrated System |
User Master Record |
Authorization |
Authorization Profile |
Background Processing |
IDoc |
System User |
Logical System |
Partner Profile |
Profile |
Profile Generator |
Remote Function Call (RFC) |
Role |
Child System |
Distribution Model |
Central User Administration (CUA) |
Central System |
Central Repository for Personalization Data |
Use of the Generic Repository |
Implementing a Dialog |
Integrating External Tables |
Registering Personalization Objects |
Directory Services |
LDAP Connector |
Maintaining the Directory Server |
Configuring the LDAP Connector |
Configuring Connection Data for the Directory Service |
Defining the System User of the Directory Service |
LDAP Connector Interface |
Logging On to the Directory Service |
Calling LDAP Protocol Functions |
Synchronization of SAP User Administration with an LDAP-Compatib |
Mapping SAP Data Fields to Directory Attributes |
Mapping and Synchronization Process |
Schema Extension |
Generating a Schema Extension |
Mapping SAP Data Fields to Directory Attributes |
Mapping with a Function Module (Linking Type) |
Mapping Indicator Versus Synchronization Indicator |
Setting Mapping Indicators |
Setting Synchronization Indicators |
Preparing and Starting Synchronization |
Synchronization Report RSLDAPSYNC_USER: Examples |
Administering the Synchronization Log |
Upgrade Procedure |
Source Release with the Profile Generator (> SAP R/3 3.0F) |
Migrate Report Trees |
Comparing Check Indicators/Field Values After Upgrade |
Generated Role SAP_NEW |
Administration of Users and Roles |
User Administration |
User Administration Functions |
Creating and Editing User Master Records |
Logon Data Tab Page |
Password Status |
SNC Tab Page |
Roles Tab Page |
Profiles Tab |
Groups Tab Page |
Personalization Tab Page |
Licence Data Tab Page |
Copying Users |
Personalizing User or Role |
Changing the Standard Company Address |
Assigning Roles |
Assign a Standard Role to a User |
Mass Changes |
Logging Off Inactive Users |
Editing User Defaults and Options |
Comparing User Master Records |
Creating and Editing Internet Users |
Operating Central User Administration |
User Administration with Active Central User Administration |
Assigning Passwords with Active Central User Administration |
Sending User Master Data to a Child System |
Performing a Text Comparison with Target System Specification |
User Information System |
Determining Users with the Users Node |
Determining Cross-System Information |
Users by Complex Selection Criteria (RSUSR002) |
By Critical Combinations of Authorizations at Transaction Start |
By Logon Date and Password Change (RSUSR200) |
With Critical Authorizations (RSUSR009) |
With Critical Authorizations (New Version, RSUSR008_009_NEW) |
Determining Roles, Profiles, Authorizations, and Authorization O |
Determining Transactions (RSUSR010) |
Comparing Cross-System Users, Authorizations, Roles, and Profile |
Creating Where-Used Lists for Roles (RSUSR002) |
Creating Where-Used Lists for Profiles (RSUSR002) |
Creating Where-Used Lists for Authorizations (RSUSR002) |
Creating Where-Used Lists for Authorization Values (RSUSR002) |
Creating Where-Used Lists for Authorization Objects (RSUSR002) |
Determining Change Documents |
Creating a User-Specific Result List |
Troubleshooting |
Cleaning Up User Tables |
Reference Documentation for User and Role Administration |
Authorization Objects Checked in Role Administration |
Role Administration: Example |
Role Administration: Tips and Tricks |
Creating Roles |
Organization without the Profile Generator |
Creating and Maintaining Authorizations/Profiles Manually |
Line-oriented Authorizations |
Administration Tasks |
Maintaining Authorization Profiles |
Simple and Composite Profiles |
Defining Profiles and Authorizations |
Alternative Authorizations |
Choosing Authorization Objects |
Maintaining Composite Profiles |
Activate profiles |
Naming Convention for Predefined Profiles |
Maintaining Authorizations |
Creating and Maintaining Authorizations |
Entering Values |
Activating Authorizations |
Naming Convention for SAP Authorizations |
Special Authorizations Requiring Protective Measures |
Authorization Profile SAP_ALL |
Generated Role SAP_APP |
Developer Documentation for User and Role Administration |
Authorization Checks |
Authorization Checks in Your Own Developments |
Creating Authorization Fields |
Assigning an Authorization Object to an Object Class |
Programming Authorization Checks |
Transporting Authorization Objects and Classes |
User Management of the Application Server Java |
User Management Engine |
Authorization Concept of the AS Java |
Configuring User Management |
UME Data Sources |
Selecting the UME Data Source |
Database Only as Data Source |
LDAP Directory as Data Source |
Organization of Users and Groups in LDAP Directory |
Configuring the UME to Use an LDAP Directory as Data Source |
Configuring High Availability of the LDAP Data Source |
UME LDAP Configuration Tool |
Configuring the UME Offline to Use an LDAP Directory |
Customizing a UME Data Source Configuration |
Accessing Data Source Configuration Files Offline |
Accessing Data Source Configuration Files Online |
Data Source Types |
Home Data Source |
Data Partitioning Scenarios |
Namespaces |
Structure of a Data Source Configuration File |
<dataSources> |
<homeFor> and <notHomeFor> |
<responsibleFor> and <notResponsibleFor> |
<attributeMapping> |
<privateSection> |
Examples of Data Source Configuration Files |
Example: Attribute Mapping for Client Certificates |
Example: Attribute Mapping for Custom Attributes |
Example: Configuration of Multiple LDAP Data Sources |
Example: Type-Based Data Partitioning |
Example: User-Based Data Partitioning |
Example: Attribute-Based Data Partitioning |
Example: Multiple Object Classes for a Principal Type |
Example: Negative User Filter |
Example: Self-Managed Passwords |
User Management of Application Server ABAP as Data Source |
Constraints for UME with ABAP Data Source |
Constraints for the UME and Central User Administration |
Data Source Configuration Files |
Configuring the UME to Use an AS ABAP as Data Source |
Changing the AS ABAP Back-End System for the UME |
Changing the ABAP Client for the UME After a Client Copy |
Changing the Password of the User for UME-ABAP Communication |
Requirements for the System User for UME-ABAP Communication |
Offline Configuration of the UME for AS ABAP |
Editing UME Properties |
Configuring the Security Policy for User ID and Passwords |
Integration of the UME Security Policy With External Data Source |
Default Security Policy Profiles |
Notification by E-Mail |
Configuring E-Mail Notification |
Changing the Texts of Notification E-Mails |
Configuring Self-Registration |
Configuring Self-Management |
Enabling Users to Reset Their Own Password |
Configuring Logon Help |
Configuring Legacy Logon Help |
Configuring the Logon Screen |
Configuring Delegated User Administration Using Companies |
Configuring Companies |
Using a Trading Partner Directory Implementation for Companies |
Types of User Administrator |
Companies |
Company Group |
Companies and Self-Registration with Approval |
Configuring Virtual Groups |
Allowing Users to View the Contact Information of Other Users |
Adding Custom Attributes to the User Profile |
Additional Configuration Options |
Configuring Users' Display Name |
Configuring Groups' Name, Display Name, and Description |
Configuring Simple Search |
Configuring Search Options for the UME |
Configuring the List of Available Languages |
Configuring E-Mail Signatures |
Enabling E-Mail Signatures |
Creating and Modifying Corporate Signatures |
Creating and Modifying Personalized Signatures |
Defining a Pattern for User E-Mail Addresses |
Optimizing Performance With the UME Cache |
Administration of Users and Roles |
Identity Management |
Integration of UME Roles with ABAP Roles |
UME Groups |
Default Groups |
User Profile |
Managing Users, Groups, and Roles |
Assigning Principals to Roles or Groups |
Password Management |
Locking or Unlocking Users |
Approving or Rejecting Users |
Creating a Technical User |
Self-Registration |
Moving a User to Another Company |
Maintaining the User's Certificate Information |
Exporting User Management Data |
Importing User Management Data |
Monitoring the Performance of the UME Cache |
 AS Java User Management Using the Visual Administrator |
Managing Resources |
Troubleshooting |
Activating the Emergency User |
Modifying the Default Administrator User |
Logging and Tracing |
Directory Server Access Log |
Directory Server Connection Pool Log |
Checking the Consistency of Entries in the UME Database |
Repairing Inconsistencies of Entries in the UME Database |
Refreshing the User Caches of the AS Java |
Downloading the UME Configuration |
Reference Documentation for User Management |
Logical Attributes |
Standard UME Actions |
Standard UME Roles |
UME Properties |
SAP* Superuser |
UME Properties for Default Groups |
Data Source |
UME Properties for an AS ABAP Data Source |
UME Properties for LDAP Directory Data Source |
UME Properties for LDAP Directory: Connection Pooling |
UME Properties for Logon Functions |
Logon Ticket |
Logoff |
User Mapping |
UME Properties for Administration |
UME Properties for the Security Policy |
UME Properties for E-Mail Notification |
UME Properties for Companies |
UME Properties for Users |
UME Properties of the Security Audit Log |
Simple Search |
UME Properties for Virtual Groups |
UME Cache |
Import Format for UME Principals |
User Data Import Format |
Group Data Import Format |
Role Data Import Format |
 Additional User Stores of the AS Java |
Developer Documentation for User Management |