Identity Management |
Users and Roles (BC-SEC-USR) |
SAP Authorization Concept |
Organizing Authorization Administration |
Organization if You Are Using the Profile Generator |
Setting Up Administrators |
Authorization Objects Checked in Role Maintenance |
Role Maintenance |
Setting Up Role Maintenance |
Role Maintenance Functions |
Changing Standard Roles |
Creating Single Roles |
Creating Role Menus |
Assigning Users |
Assign MiniApps |
Personalization Tab Page |
Creating Composite Roles |
Deriving Roles and Copying Authorizations |
Authorization Checks when Adjusting Derived Roles |
Comparing and Adjusting Role Menus |
Generating Authorization Profiles |
Regenerate the Authorization Profile Following Changes |
Merge Function for the Authorization Data of PFCG Roles |
Performing a Mass Generation of Profiles |
Editing Predefined Authorizations |
Symbols and Status Text in Authorization Maintenance |
Copying Authorizations From Templates |
Role Maintenance: Example |
Role Maintenance: Tips and Tricks |
Indirect Role Assignment Using HR-ORG |
Assigning a Role Indirectly |
Indirect Role Assignment in a System Landscape |
Distributing the HR-ORG Model |
Creating an HR-ORG Distribution Model in the Sending System |
Generating Partner Profiles of the HR-ORG Distribution Model |
Creating an Outbound Filter with Customer Exit |
Activating Change Pointers |
Writing Change Pointers for Infotype 0105 |
Distribute HR-ORG-Model (Initial Distribution) |
Distribute Changes to the HR_ORG Model |
Organization without the Profile Generator |
Creating and Maintaining Authorizations/Profiles Manually |
Line-oriented Authorizations |
Administration Tasks |
Maintaining Authorization Profiles |
Simple and Composite Profiles |
Defining Profiles and Authorizations |
Alternative Authorizations |
Choosing Authorization Objects |
Maintaining Composite Profiles |
Activate profiles |
Naming Convention for Predefined Profiles |
Maintaining Authorizations |
Creating and Maintaining Authorizations |
Entering Values |
Activating Authorizations |
Naming Convention for SAP Authorizations |
Protective Measures for Special Profiles |
Authorization Profile SAP_ALL |
Authorization Profile SAP_NEW |
Assigning Authorizations |
Authorization Checks |
Reducing the Scope of Authorization Checks |
Preparatory Steps |
Globally Deactivating Authorization Checks |
Reducing Authorization Checks in Applications |
Searching for Deactivated Authority Checks |
Editing Templates for General Authorizations |
Comparing Check Indicators/Field Values After Upgrade |
Check Indicators |
Transporting Authorization Components |
Transporting and Distributing Roles |
Transporting Manually-Created Profiles |
Transporting Manually-Created Authorizations |
Transporting Authorization Objects and Classes |
Transporting a User Master Record |
Transporting Check Indicators and Field Values |
Loading or Storing Check Indicators and Authorization Default Va |
Transporting Templates |
Analyzing Authorization Checks |
Analyzing Authorizations using the System Trace |
Authorization Checks in Your Own Developments |
Creating Authorization Fields |
Assigning an Authorization Object to an Object Class |
Programming Authorization Checks |
User Maintenance |
User Maintenance Functions |
Creating and Maintaining User Master Records |
Logon Data Tab Page |
SNC Tab Page |
Roles Tab Page |
Profiles Tab Page |
Groups Tab Page |
Personalization Tab Page |
Licence Data Tab Page |
Copying Users |
Personalizing User or Role |
Changing the Standard Company Address |
Central Repository for Personalization Data |
Use of the Generic Repository |
Implementing a Dialog |
Integrating External Tables |
Registering Personalization Objects |
Assigning Roles |
Mass Changes |
Logon and Password Security in the SAP System |
Password Rules |
Profile Parameters for Logon and Password (Login Parameters) |
Customizing Switches for Generated Passwords |
Logging Off Inactive Users |
Maintaining User Defaults and Options |
Comparing User Master Records |
Special Functions of User and Role Maintenance |
Create and Maintain Internet Users |
Assign a Standard Role to a User |
Central User Administration |
Setting Up Central User Administration |
Creating an Administration User |
Setting Up Logical Systems |
Defining/Setting Up a Logical System |
Assigning a Logical System to a Client |
System Users and RFC Destinations |
Defining Authorizations for System Users |
Determining Existing RFC Destinations and System Users |
Creating System Users |
Creating an RFC Destination for the Target System |
System Users and RFC Destinations with Trusted Systems |
Creating RFC Destinations for the Target System with a Trusted S |
Creating the Central User Administration |
Setting Up Field Distribution Parameters |
Synchronizing and Distributing Company Addresses |
Synchronizing User Groups |
Transferring Users from New Systems |
Displaying and Processing Distribution Logs |
Operating Central User Administration |
User Maintenance with Active Central User Administration |
Assigning Passwords with Active Central User Administration |
Sending User Master Data to a Child System |
Performing a Text Comparison with Target System Specification |
Error Analysis |
Checking the Setup of Central User Administration |
Creating an ALE Model Including Partner Profiles Manually |
Creating the ALE Distribution Model |
Generating Partner Profiles |
Checking Partner Profiles |
Correcting Errors in Partner Profiles |
Distributing the Model View |
Other Error Sources |
Activated Background Processing |
Changing Partner Profiles with Active Background Processing |
Creating a Background User |
Removing Central User Administration |
Removing a Child System from Central User Administration |
Removing Central User Administration Completely |
Glossary |
Application Link Enabling (ALE) |
ALE Landscape |
ALE Integrated System |
User Master Record |
Authorization |
Authorization Profile |
Background Processing |
IDoc |
System User |
Logical System |
Partner Profile |
Profile |
Profile Generator |
Remote Function Call (RFC) |
Role |
Child System |
Distribution Model |
Central User Administration (CUA) |
Central System |
User Information System |
Determining Users with the Users Node |
Determining Cross-System Information |
Users by Complex Selection Criteria (RSUSR002) |
By Critical Combinations of Authorizations at Transaction Start |
By Logon Date and Password Change (RSUSR200) |
With Critical Authorizations (RSUSR009) |
With Critical Authorizations (New Version, RSUSR008_009_NEW) |
Determining Roles, Profiles, Authorizations, and Authorization O |
Determining Transactions (RSUSR010) |
Comparing Cross-System Users, Authorizations, Roles, and Profile |
Creating Where-Used Lists for Roles (RSUSR002) |
Creating Where-Used Lists for Profiles (RSUSR002) |
Creating Where-Used Lists for Authorizations (RSUSR002) |
Creating Where-Used Lists for Authorization Values (RSUSR002) |
Creating Where-Used Lists for Authorization Objects (RSUSR002) |
Determining Change Documents |
Creating a User-Specific Result List |
First Installation Procedure |
Protecting Special Users |
Securing User SAP* Against Misuse |
Protecting User DDIC Against Unauthorized Access |
Security in System Groups |
Upgrade Procedure |
Source Release with the Profile Generator (> SAP R/3 3.0F) |
Migrate Report Trees |
User Management Engine |
Administration of Users, Groups, and Roles |
Default Groups |
Activating the Emergency User |
User Administration Console |
User Profile |
Managing Users, Groups, and Roles |
Assigning Objects to Roles or Groups |
Password Management |
Locking or Unlocking Users |
Approving or Rejecting Users |
Creating a Technical User |
Self-Registration |
Delegated User Administration |
Import and Export of User Management Data |
UME Object Data Import |
UME Object Data Export |
Standard Format |
Users |
Groups |
Roles |
UME Configuration |
UME Data Sources |
Installation Options |
Preconfigured Data Source Combinations |
Database Only as Data Source |
LDAP Directory as Data Source |
Organization of Users and Groups in LDAP Directory |
SAP NetWeaver AS ABAP User Management as Data Source |
Data Source Configuration Files |
Requirements for System User SAPJSF_<SID> in ABAP Systems |
Changing the AS for ABAP Backend System |
Configuring UME to Use an LDAP Server as Data Source |
Entering the Connection Data for the LDAP Server |
UME LDAP Configuration Tool |
Verifying Your Configuration |
Changing the Administrator User in Secure Storage |
Configuring High Availability of the LDAP Data Source |
Customizing a UME Data Source Configuration |
Data Source Types |
Home Data Source |
Data Partitioning Scenarios |
Namespaces |
Structure of a Data Source Configuration File |
<dataSources> |
<homeFor> and <notHomeFor> |
<responsibleFor> and <notResponsibleFor> |
<attributeMapping> |
Attribute Mapping for Client Certificates |
<privateSection> |
Examples of Data Source Configuration Files |
Example: Type-Based Data Partitioning |
Example: User-Based Data Partitioning |
Example: Attribute-Based Data Partitioning |
Configuration of More Than One LDAP Data Source |
LDAP Only: Multiple Object Classes for a Principal Type |
LDAP Only: Negative User Filter |
Editing UME Properties and Files |
Editing UME Properties |
Editing UME Configuration Files |
Security Policy |
Notification by E-Mail |
Changing the Texts of Notification E-Mails |
Configuring Log on With Alias |
Logon Screen Customization |
Companies |
Company Group |
Using a Trading Partner Directory Implementation for Companies |
Companies and Self-Registration with Approval |
Delegated User Administration Using Companies |
Configuration of Delegated User Administration Using Companies |
Moving a User to Another Company |
Defining Virtual Groups |
Adding Custom Attributes to the User Profile |
Multitenant Portal |
Additional Customizing Options |
Customizing Users' Display Name |
Customizing Groups' Name, Display Name, and Description |
Customizing the Set of Available Languages |
Customizing Simple Search |
Logging and Tracing |
What is Logged? |
Directory Server Access Log |
Directory Server Connection Pool Log |
UME Reference |
Logical Attributes |
Standard UME Actions |
Preconfigured Data Source Combinations |
UME Properties |
SAP* Superuser |
Default Groups |
Data Source |
SAP ABAP-Based System as Data Source |
LDAP Directory Data Source |
LDAP Directory: Connection Pooling |
Logon |
Logon Ticket |
Logoff |
User Mapping |
Administration |
Security Policy |
E-Mail Notification |
Companies |
Users |
Security Audit |
Simple Search |
Virtual Groups |
Multitenancy |
Users and Authorizations on the J2EE Engine |
Concept of Interchangeable User Stores |
User Management Engine |
DBMS User Store |
Managing User Stores Using the Visual Administrator |
User Store Configuration |
Changing User Store Configuration Options |
Managing User Store Login Modules |
User and Authorization Administration |
Administration of Users, Groups, and Roles |
Default Groups |
Activating the Emergency User |
User Administration Console |
User Profile |
Managing Users, Groups, and Roles |
Assigning Objects to Roles or Groups |
Password Management |
Locking or Unlocking Users |
Approving or Rejecting Users |
Creating a Technical User |
Self-Registration |
Delegated User Administration |
Import and Export of User Management Data |
UME Object Data Import |
UME Object Data Export |
Standard Format |
Users |
Groups |
Roles |
J2EE Engine User Management Using the Visual Administrator |
Managing Users |
Creating and Removing Users |
Managing User Certificates |
Viewing User Information |
Managing Groups |
Security Roles Management |
Architecture of Security Roles |
Applying Security Constraints to a Security Role |
Mapping Users and Groups |
Modifying the Default Administrator User |
Managing Resources |
Directory Services (BC-SEC-DIR) |
LDAP Connector |
Maintaining the Directory Server |
Configuring the LDAP Connector |
Configuring Connection Data for the Directory Service |
Define System User of the Directory Service |
LDAP Connector Interface |
Logging On to the Directory Service |
Calling LDAP Protocol Functions |
Synchronization of SAP User Administration with an LDAP-Compatib |
Mapping SAP Data Fields to Directory Attributes |
Mapping and Synchronization Process |
Schema Extension |
Generate Schema Extension |
Mapping SAP Data Fields to Directory Attributes |
Mapping with a Function Module (Linking Type) |
Mapping Indicator Versus Synchronization Indicator |
Setting Mapping Indicators |
Setting Synchronization Indicators |
Preparing and Starting Synchronization |
Synchronization Report RSLDAPSYNC_USER: Examples |
Administer Synchronization Log |
Identity Management Developer Documentation |
Using Security Roles or UME Permissions in Applications |
Security Roles |
Architecture of Security Roles |
Permissions, Actions, and UME Roles |
Tutorials for Using Roles and Permissions in Applications |
Overview of the Tutorials |
 Protecting Access to a J2EE-Based Application Using J2EE Securit |
 Protecting Access to a J2EE-Based Application Using UME Permissi |
 Protecting Access to the Web Dynpro Application Using UME Permis |
User Management Engine |
SAP Web AS Java |
Authentication |
SAP Enterprise Portal |
LoginModule Example |
Customized Password Authentication |
Customized Authentication Implementation |
Configure the Portal for Customized Authentication |
Changing the Logon Screen |
Advanced Authentication Example |
User |
Service User |
Role |
Group |
Searching for Users, Roles and Groups |
User Mapping |
Access Control List (ACL) |