BlogCreation and use of a transaction SU24N proposal data variant (Part 2)31. August 2022SAP Authorizations, SAP S/4HANA, SAP SecurityAlexander Sambill
BlogThe new transaction SU24N (Part 1)26. August 2022SAP Authorizations, SAP SecurityAlexander Sambill
BlogAbout the complexity of authorization management in SAP Fiori26. July 2022SAP Authorizations, SAP FioriStefan Wohlschlag
BlogSAP Security Hardening – Implement Security by Design and Zero Trust12. July 2022Cybersecurity, SAP SecurityAlessandro Banzer
BlogThe Security Audit Log – What should be considered with an SAP Audit?27. June 2022SAP Authorizations, SAP Security, XAMSAdam Egeric
BlogSAP Certification: Tips to consider and Tricks to avoid21. June 2022News, SAP SecurityJulius Bussche
BlogSAP Identity Provisioning Service – Identity Provisioning In The Cloud25. May 2022Cloud Security, SAP IDMTam Nguyen
BlogSecure Authentication and SSO for SAP30. March 2022Cloud Security, SAP Security, SAP Single Sign-OnCarsten Olt
BlogGADOS: THE W-Questions in the World of SAP Authorizations2. March 2022SAP Authorizations, XAMSStefan Wohlschlag