Tables, Roles, Profiles and Authorizations in SAP

Posted by Fabio Mambretti on Apr 15, 2022 8:15:00 AM

Which are the main Security SAP Tables for SAP Roles and Profiles?

SAP contains hundreds of thousands of tables. In some cases the direct access to these tables allows one to retrieve data faster. Below a list of tables for each defined area:

  • SAP Roles
  • SAP Profiles
  • Users
  • Authorizations
  • Authorization objects
Read More

Topics: SAP ECC, sap standard role, Profiles, SAP Table

SAP Security Audit Log

Posted by Marta Ortona on Jan 21, 2022 8:15:00 AM

What is it for?

This tool allows you to trace the activities of one or more SAP users at application level. Can also be used to connect SAP to a third SIEM (Security Information and Event Management) or the solution SAP Enterprise Threat Detection (ETD).

Read More

Topics: SAP Security, governance, SAP ECC, security audit log

Yes Subscribe!

Blog Aglea, what you could find out?

Every Friday a new post, interview or content related to SAP Security.

  • Tips on how to design SAP Security
  • How to
  • Checklist
  • Common error and pitfall on security SAP
  • Interview with experts
  • Who we are and Aglea vision on SAP Security

Recent Posts

Post By Topic

See all