Blog2024 SAP Cloud Identity Services & IAM Portfolio: Whatās New?23. February 2024Identity and Access ManagementCarsten Olt
BlogOrgset Management and Field Replicator ā The XAMS Role Replicator25. August 2023SAP Security, XAMSLaura Gƶthlich
BlogTop 5 SAP Authorizations Management Mistakes and How to Fix Them31. March 2023SAP Authorizations, XAMSAlessandro Banzer
BlogSuccess story: SCHWENK Zement GmbH & Co. KG3. February 2023SAP Authorizations, Success Story, XAMSManuel Griebel
BlogThe difference between S_PROGRAM and S_PROGNAM and the use of parameter transactions23. January 2023SAP Authorizations, SAP Security, XAMSSteffen LĆ¼ken
BlogSuccess Story: Nordzucker AG23. November 2022SAP Fiori, SAP S/4HANA, Success Story, XAMSManuel Griebel
BlogBulk Processing of Roles with Transaction PFCGMASSVAL8. November 2022SAP Authorizations, SAP Security, XAMSErwin Lachenmaier
BlogThe Security Audit Log ā What should be considered with an SAP Audit?27. June 2022SAP Authorizations, SAP Security, XAMSAdam Egeric