BlogOrgset Management and Field Replicator – The XAMS Role Replicator25. August 2023SAP Security, XAMSLaura Göthlich
BlogLeveraging IGA for Enhanced Security: An Overview and the Unique Offerings of Xiting22. August 2023Cloud Security, GRC, SAP IDM, SAP SecurityAlessandro Banzer
BlogThe difference between S_PROGRAM and S_PROGNAM and the use of parameter transactions23. January 2023SAP Authorizations, SAP Security, XAMSSteffen Lüken
BlogBulk Processing of Roles with Transaction PFCGMASSVAL8. November 2022SAP Authorizations, SAP Security, XAMSErwin Lachenmaier
BlogCreation and use of a transaction SU24N proposal data variant (Part 2)31. August 2022SAP Authorizations, SAP S/4HANA, SAP SecurityAlexander Sambill
BlogThe new transaction SU24N (Part 1)26. August 2022SAP Authorizations, SAP SecurityAlexander Sambill
BlogSAP Security Hardening – Implement Security by Design and Zero Trust12. July 2022Cybersecurity, SAP SecurityAlessandro Banzer
BlogThe Security Audit Log – What should be considered with an SAP Audit?27. June 2022SAP Authorizations, SAP Security, XAMSAdam Egeric
BlogSAP Certification: Tips to consider and Tricks to avoid21. June 2022News, SAP SecurityJulius Bussche
BlogSecure Authentication and SSO for SAP30. March 2022Cloud Security, SAP Security, SAP Single Sign-OnCarsten Olt
BlogLog4j Vulnerability and SAP (CVE-2021-44228)17. December 2021News, SAP Authorizations, SAP SecurityCarsten Olt
BlogSAP Security Orchestration with Xiting’s Security Solutions21. October 2021Cloud Security, GRC, SAP SecurityAlessandro Banzer
BlogTransaction SUPO: Promote authorization fields to organizational levels24. July 2020SAP SecurityAlessandro Banzer
BlogAn introduction to SAP UI data security solutions – Part 1 of 312. February 2019SAP SecurityAbdullah Alebrahem
BlogHow does the European GDPR affect my Roles and Authorizations?6. February 2018SAP SecurityAlessandro Banzer