During specific system activities, you may need to lock all the other users except Admin users to log in to the HANA DB. It is a tedious task to manually […]
With the introduction of SAP HANA’s future execution model, it is the responsibility of SAP Security consultants to manage the SAP HANA DB security as well. Activities such as User […]
While creating Access requests in SAP GRC, users might select too many roles which might result in Timeout error message during the submission, or Risk Analysis. To overcome this issue, […]
Designing, configuring, and implementing SAP Security is a complex and resource-intensive task. Hence, companies should identify the right approach before building authorizations. This is also important when it comes to […]
SAP licensing optimization is always a complicated activity for many organizations. The various issues and/or problems faced in managing the SAP licenses makes it hard to stay compliant with the […]
Most of you might know and also have already worked with the STAUTHTRACE transaction code. For those who are still not aware of this transaction code or never used it […]