Monitoring and Logging of Signature Processes 

Use

Digital approval processes must be reliable and transparent in order to comply with security requirements. For this reason, the SAP System offers the following:

Features

User Lock

When a signature is executed, unsuccessful attempts can take place for a number of different reasons (for example, the user has entered the wrong password, the user is not authorized to execute the signature, or the system could not verify the signature). After a certain number of unsuccessful attempts has been exceeded, the user is locked as follows:

Security Audit Log

Any failed signature attempt is logged in the Security Audit Log along with other security-relevant events of the SAP System. The system documents, for example, the reason for the error, date and time, and the signatory's user ID. The security administrator can use the CCMS alert monitor to evaluate the Security Audit Log.

Log for Digital Signature

The log for the digital signature documents all relevant steps in a signature process. This includes successful and canceled signatures as well as signatures that were deleted when the signature process was canceled. You can evaluate the signature log, for example, by signature object, signature time, and the signatory's user ID (see Analyzing Logs for Digital Signatures). It contains the result of the signature steps along with all messages and the data that is transferred to the signed document if the signatures were successful.