Introduction/training of the in-memory database
Planning and conception of the system architecture, system layout, hardware sizing, system monitoring
SAP Basis usually takes care of the administration of the SAP system. The most important SAP Basis transactions are listed in this article.
You can control the access rights as usual. The big advantage of CMC tab configuration is that you can easily grant or withdraw group access to specific tabs. This gives you the ability to prepare background access permissions and then unlock all permissions by clicking on the CMC tab configuration. On the other hand, this allows you to remove accesses without having to edit any existing permissions. Have you already experienced CMC tab configuration or have questions about the application? I welcome any suggestions you may make as a comment.
Decentralized, cross-site monitoring and alerting
By using a code scanner, it is now possible for every developer to scan for complex security patterns during the extended check of his program, which tell him whether he has built vulnerabilities into his program. These vulnerabilities are detected and can now be addressed in a workflow-driven process. Currently, there are two products that can support customers in the area of scanning their own SAP programs.
In the initial screen, you can first use the global settings to specify whether changes should be allowed in general. Furthermore, you can define specifically for the software components and namespaces of the Repository objects whether they can be changed at all, or whether changeability should only be possible to a limited extent.
"Shortcut for SAP Systems" simplifies tasks in the area of the SAP basis and complements missing functions of the standard.
The digitization of businesses and the emergence of new technologies mean that admins have to adapt to constantly changing conditions.
The goal of an automated environment is not to have to react manually to every faulty job.