table of contents

1. overview 4

2. Security upgrade objectives, Process and approaches 5

2.1. Objectives 5

2.2. Overview of the Security upgrade process 5

2.3. Approaches to convert manual profiles to Activity Groups: 6

2.3.1. Approach #1: SAP’s standard utility SU25 6

2.3.2. Approach #2: Manual reconstruction of Profiles as Roles (Activity Groups) 7

3. Items requiring special attention 8

3.1. Authorizations 8

3.2. ‘*’ in S_TCODE 8

3.3. Report Trees 8

3.4. ABAP Query reports 8

3.5. S_RFC 8

3.6. Custom tables and views 9

3.7. User menus versus SAP menu 9

3.8. Re-linking of user master records to profiles 9

3.9. Dual-maintenance 9

3.10. Transport of activity groups 10

3.11. Client copies 10

3.12. SU24 10

3.13. Composite Activity Groups 10

3.14. Central User Administration 10

4. additional tips 12

4.1. OSS and Release Notes 12

4.2. Workplan 12

4.3. Standards and Procedures 12

4.4. Testing 12

4.4.1. Resources for testing 12

4.4.2. Test Plan 13

4.5. Issue Management (tracking and resolution) 13

4.6. Status reporting 14

4.7. Detailed cutover plan 14

4.8. Project team access 14

4.9. Training and new functionality 14

4.10. SU53 15

4.11. Post Go-live 15

5. helpful reports, transactions and tables 16

5.1. Reports and Programs 16

5.2. Transactions 16

5.3. Tables 17


No comments:

topics