Indra Tanudjaja San Jose State University November 2002

Slides:



Advertisements
Similar presentations
SAP - Online Transaction Processing (OLTP)
Advertisements

Users & Authorization Users must be setup and roles assigned to user master records before you can use the SAP System. A user can only log on to the system.
SE 464: Industrial Information systems Most Images and inform. used in these slides are SAP © Not to be used for other than educational purposes Systems.
SOFTWARE OPERATIONAL SHORTCUT HELP KEYS KEYBOARD REGULAR FUNCTION KEYS.
Certified Medical Coders (CMC) translate clinical data from patient health records and assign appropriate medical codes. Their work is submitted to.
For Details Visit: Call Us: US: , India:
3/5/2009Computer systems1 Analyzing System Using Data Dictionaries Computer System: 1. Data Dictionary 2. Data Dictionary Categories 3. Creating Data Dictionary.
1 Password Advanced Password Management. 2 Standard Password Management including tool for blocking usage of easily cracked passwords Extensive dictionary.
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.
Copyright © 2003 Americas’ SAP Users’ Group Authorizations in the Finance & Controlling Modules Ranvir Singh, Sherman Wright Business Analysts, LSI LOGIC.
The Medical Billing Cycle
1 ERP  What are Enterprise Resource Planning (ERP) Systems? Incredibly large, extensive software packages used to manage a firm’s business processes.
 SAP AG CSU Chico 102/14/981SAP Security Lecture MINS 298C SAP Configuration & Use: Security Copyright 1996, 1997, James R. Mensching, Gail Corbitt.
8/28/97Information Organization and Retrieval Files and Databases University of California, Berkeley School of Information Management and Systems SIMS.
Introduction to SAP R/3.
University of Southern California Enterprise Wide Information Systems The Procurement Process Instructor: Richard W. Vawter.
SAP R/3 Materials Management Module
SAP An Introduction October 2012.
ADMS3510 June 2009 Introduction to SAP ERP. ERP © 2008 by SAP AG. All rights reserved. 2 What are Enterprise Resource Planning (ERP) Systems? Incredibly.
Configuring the MM Structures. Slide 2 Review of the Procurement Process Goods Receipt Pay Invoice Purchase Requisition Purchase Order Invoice Receipt.
SECURITY ERP.
MBS HOW TO: MBS 3.74 ENHANCEMENTS AND CUSTOMER COMMUNICATIONS Bonnie Faulkner & Terri Hunt.
Pen Inc Introduction to Your Company
Istanbul Kultur University Enterprise Wide Information Systems The Procurement Process.
Phase II: Procurement SAP University Alliances Version 2.2
Continuous Monitoring for Enterprise Applications: Real Needs, Real Solutions. November 22, th Continuous Assurance and Auditing Symposium Newark,
DATABASE. A database is collection of information that is organized so that it can easily be accessed, managed and updated. It is also the collection.
Gold Loan SOFTWARE Presents.  DEE SOFT India is a premier software development company of AGRA.  Under the leadership of Om Prakash Dakch, Our approach.
UCB SA-NV SAP TEAM EURO Information Session 17th November
Normalization (Codd, 1972) Practical Information For Real World Database Design.
ERP Systems Implementation Prepared by: Chandra Agarwal PGDM V SEC A.
© The McGraw-Hill Companies, Inc., McGraw-Hill/Irwin Managerial Briefing 13 Enterprise Resource Planning Systems.
CHAPTER FOURTEEN ACCOUNTING FOR SALES McGraw-Hill/Irwin Accounting Fundamentals, 7/e © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved
SE 464: Industrial Information systems Most Images and inform. used in these slides are SAP © Not to be used for other than educational purposes Systems.
Introduction to SAP SAP University Alliances Version 2.11
2 1 Database Systems: Design, Implementation, & Management, 7 th Edition, Rob & Coronel Data Models Why data models are important About the basic data-modeling.
HRMS Implementation Project HRMS Security Authorization Administrator Module.
Our paperless pickup and delivery system Visit our Website
SPECTO IT TRAING CONTACT US: mail: SAP FSCM ONLINE TRAINING IN BANGALORE.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
QuickASSET Fixed Asset Management Software Powered by : Qelocity Technologies.
 Andersen Consulting 2000 MM03 - Master Data in Purchasing & Contract November, 2000.
Unit 3 Account Payable. Unit 3 : Account Payable Vendor Master Record Daily Accounting Transactions in AP Integration with Materials Management Closing.
 Tata Consultancy Services 1 Financial Information.
SAP Security Online Training Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA
FI-CA and FI-AR What is the Difference ?
Service Contract with Periodic Billing
ERP.
Sap GRC 10.0 Online Training In OnlineItGuru
BUDGET Process Change Description Type of Change Process
Learning Objectives Today we will Learn:
Accounting Information Systems with ERP Applications
Computerized AIS October 20
Accounting Information Systems with ERP Applications
Purchase Returns and Allowances
CMA Srushti Ashok Bedekar
Sales Order Process.
James Baranello MIS 5121:Business Process, ERP Systems & Controls Week 8: Security 2 – Roles Financial Processes and Controls.
the financing & payment service needs of the IT & ITES industry
Introduction to Purchasing Richard Lewis
User manual for extracting Dummy Payment Report from SAP
Workshop: High Level Reporting
Presentation transcript:

Indra Tanudjaja San Jose State University November 2002 SAP Security Indra Tanudjaja San Jose State University November 2002

What is SAP? SAP stands for Systeme, Anwendungen, Produkte in der Datenverarbeitung, which freely translates into Systems, Applications, and Products in Data Processing. SAP is a collection of software for nearly all business applications in middle and large sized companies.

SAP Security Terminology • Authorization object: the basic building block of SAP security (e.g. user group or company code during invoice payment entry) • Authorization: Set of values for an authorization object (e.g. user group “Finance” or company code “CA01” during invoice payment entry) • Profile (Simple Profile): Logical grouping of several authorizations. Profiles usually represent business tasks/functions that can be carried out. • Composite profile: Logical grouping of several profiles. Composite profiles usually represent roles within an organization. • User Master: Each user must have a User Master Record. A user is assigned one or more profiles and/or composite profiles in their master record.

SAP Security in the real world

Questions?