BlogStrengthening SAP Security in the Age of DORA: A Guide for Financial Entities12. March 2024SAP SecurityAlessandro Banzer
BlogOrgset Management and Field Replicator ā The XAMS Role Replicator25. August 2023SAP Security, XAMSLaura Gƶthlich
BlogThe difference between S_PROGRAM and S_PROGNAM and the use of parameter transactions23. January 2023SAP Authorizations, SAP Security, XAMSSteffen LĆ¼ken
BlogBulk Processing of Roles with Transaction PFCGMASSVAL8. November 2022SAP Authorizations, SAP Security, XAMSErwin Lachenmaier
BlogCreation and use of a transaction SU24N proposal data variant (Part 2)31. August 2022SAP Authorizations, SAP S/4HANA, SAP SecurityAlexander Sambill
BlogThe new transaction SU24N (Part 1)26. August 2022SAP Authorizations, SAP SecurityAlexander Sambill
BlogSAP Security Hardening – Implement Security by Design and Zero Trust12. July 2022Cybersecurity, SAP SecurityAlessandro Banzer
BlogSAP Certification: Tips to consider and Tricks to avoid21. June 2022News, SAP SecurityJulius Bussche
BlogSecure Authentication and SSO for SAP30. March 2022Cloud Security, SAP Security, SAP Single Sign-OnCarsten Olt
BlogSAP Security Orchestration with Xitingās Security Solutions21. October 2021Cloud Security, GRC, SAP SecurityAlessandro Banzer
BlogTransaction SUPO: Promote authorization fields to organizational levels24. July 2020SAP SecurityAlessandro Banzer
BlogAn introduction to SAP UI data security solutions ā Part 1 of 3ļ»æ12. February 2019SAP SecurityAbdullah Alebrahem
BlogHow does the European GDPR affect my Roles and Authorizations?6. February 2018SAP SecurityAlessandro Banzer
BlogSU24 Tips & Tricks – How to authorize menu navigation from application menus30. June 2017SAP SecurityJulius Bussche
BlogSU24 Tips & Tricks – How to authorize forward navigation from list reporting8. June 2017SAP SecurityJulius Bussche