Treasury
Network and Communication Security
Communication with external systems is possible using standard interfaces via BAPI, IDoc, and XI.
Communication Destinations
In certain cases a technical user may be required for applying BAPIs.
Data Storage Security
Treasury accesses financial transaction data that can be particularly sensitive. Access is protected by the roles described in the Authorizations section.
More Security Information
All authorizations are controlled by means of roles and profiles. In addition you can further increase the system security by making a number of Customizing settings such as trader authorization and posting release. However, the authorization check itself must always be run on the basis of roles and profiles.
Important SAP Notes
See SAP Notes 445148 (Access of the tax authorities to stored data) and 683810 (CFM-TM Tax reduction law: Separate authorization) for information about the German principles of data access and verifiability of digital documentation (GDPdU).