I need some opinions about following issue:
We have some jobs who have to be done every day. So, these jobs are planned every morning. The jobs are backgroundjobs and [b]one[/b] system user runs [b]all the jobs[/b]. Therefore, this system user has a SAP_ALL.
A system user can't login on a normal basis but I don't feel well with the SAP_ALL.
I have the idea to split this user in several system users, with a big profile of the module which need some background jobs. (HR-user for HR-backgroundjobs, FI-user for FI-backgroundjobs,...)
Is this realistic or is there an other solution? Maybe our situation at this moment isn't so bad as I think???
Can someone help me?
Thanks in advance!
Bart
Answer:
It's perfectly feasible to split them by function or module.
For non-sensitive stuff I generally have a user e.g. FIBATCH with auths to cover what's needed. It takes a bit more work to set up but helps keep things arranged in an orderly manner.
Answer:
I’ve been through audits in the past where they have been satisfied with the background user having SAP_ALL as long as you have tightly controlled who can actually schedule jobs etc against that ID.
Answer:
I’ve been through audits in the past where they have been satisfied with the background user having SAP_ALL as long as you have tightly controlled who can actually schedule jobs etc against that ID.
Its all about risk. System users can also be used as communications users and there are some tricks that could allow someone to abuse a systems user in an RFC call. (They involve a kind of password hack). If you restrict the authority of the systems user you can diminish the opportunity for abuse.
You also have to be very restrictive about authority for S_BTCH_NAM.
_________________
bwSecurity
Answer:
I’ve been through audits in the past where they have been satisfied with the background user having SAP_ALL as long as you have tightly controlled who can actually schedule jobs etc against that ID.
When I perform audits I prefer not to see the ID with SAP_ALL - as there are plenty of ways it can be misused if the required restrictions are not in place.
If you do want to use one user, at least use a chopped down version of SAP_ALL with some of the more sensitive auths removed or very tightly controlled to grant what specifically is used.
Friday, February 13, 2009
Subscribe to:
Post Comments (Atom)
Archive
-
▼
2009
(74)
-
▼
February
(65)
- What database and operating systems are supported ...
- Cloning an SAP system
- Backups during upgrade
- Refreshing development system without losing syste...
- Methodology for creating indexes
- Determining the amount of data in a client
- Basic Knowledge and System Navigation Question
- SAP Background Job Administration
- background job failed because of authorization
- Background Jobs
- background jobs via background users
- Background Processing VS Batch processing
- Deleting a scheduled Background job
- Schedule Manager
- how you can assign a Background work process as a ...
- How To Delete a Scheduled Job
- Checking your program Background Job Status
- Availability Check on Quotation
- material Determination based on availability check
- Creating Multiple Materials in Material Determination
- Backward and Forward Scheduling
- Authorization Concept
- SAP’s TCODE checks with the authorization tool
- Listing TCODE transactions used to view what users...
- Authorization Check
- SAP BASIS (BC) Authorization Concepts
- Unlocking a blocked admin user ID in an Oracle DB
- How to Check Missing Authorisation for User
- SAP Profile Generator tables
- Query About Tcode PFCG
- How To Compare The Roles
- Creating New User With Authorizations
- Introduction on Authorizations
- Troubleshooting authorization in SAP R/3
- Shortcut to create role with many reports /tcode
- check which authorisation objects are checked with...
- What are the Authorizations Required
- How do I go about creating an authorization group?
- Frequently Asked Questions on Authorization
- What is an Authorisation Object?
- SAP Create authorization object
- SAP Creating an auth group and assigning a table
- SAP creating authorization levels
- SAP Creating Authorization profile
- SAP creating custamizing autharization objects
- SAP Creating new authorization object
- SAP Creating New Organizational Levels
- SAP S_TABU_LIN
- SAP S_TABU_LIN set up as organizational level
- SAP S_TCODE
- SAP S_TCODE check after upgrade to 4.7
- SAP s_tcode display only problem
- SAP S_TCODE is not in change mode
- SAP S_TCODE Lookup
- SAP S_TCODE with * Value
- SAp S_TRANSPRT versus S_CTS_ADMI
- SAP S_USER_ALL
- Auditor role/authorization
- SAP SU53 Authorization Check
- Authorizations
- System Administration: Authorization Concepts
- SAP Authorization Checks
- SAP Authorization Check
- What is authorization
- SAP auth/new_buffering
-
▼
February
(65)
Translation by Google
Subscription Free
Categories
- ABAP WORKFLOW
- Administration Faqs
- AIS - audit management preparation.sim
- AIS Implementation
- ALE
- ALE Scenario in SAP
- Alert Monitor(CCMS) in SAP
- Analyze Authorization
- Archive
- Archiving
- Auditing Information System
- Auth/new_buffering
- Authorization Concepts
- Authorizations Objects
- Availability Check
- Background Job
- Background Processing
- EDI and IDOCS
- Faqs
- Hot Packages
- Troubleshooting
No comments:
Post a Comment