13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 12: User AdministrationOverviewUser administration is a serious function, not just a necessary administrative task. Security isat stake each time the system is accessed. Because the company’s financial and otherproprietary information is on the system, the administrator is subject to externalrequirements from the company’s external auditors, regulatory agencies, and others.Customers should consult with their external auditors for audit-related internal control useradministration requirements. For example, human resources should be consulted if the HRmodule is implemented or if personnel data is maintained on the system.A full discussion on security and user administration is beyond the scope of this guidebook.For example, manually creating and maintaining security profiles and authorizations is alsonot covered. Our discussion is limited to a general introduction and a list of the majorissues related to security. The two sections below affect all aspects of security, which is whywe begin with them.User groups are created by an administrator to organize users into logical groups, such as: Basis Finance ShippingFor additional information, refer to the section User Groups on page 12–29.The Profile Generator is a tool used to simplify the creation and maintenance of SAPsecurity. It reduces (but does not eliminate) the need for specialized security consultants.The value of the Profile Generator is more significant for smaller companies with limitedresources that cannot afford to have dedicated security administrators. For moreinformation on the Profile Generator, see the Authorizations Made Easy guidebook.12–2Release 4.6A/B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!