Customize Your RFC Interfaces With XAMS

RFC interfaces play a crucial role in many SAP implementations by enabling data exchange between SAP systems, as well as between SAP and non-SAP systems. Unfortunately, many RFC interfaces are over-authorized and have more powerful roles than they need. This opens up critical vulnerabilities in your SAP landscape.

The Xiting Authorizations Management Suite (XAMS) can safely reauthorize RFC interfaces and associated technical users without negatively impacting the operation of the interface.

XAMS achieves this by analyzing the interface’s activity in the productive landscape and automatically creating actionable reports that role administrators can use to quickly create matching roles in a development environment. That concept has helped countless customers, such as Audi and Daimler, to optimize their RFC interfaces without interrupting their operation.

SAP endorses Xiting’s solution as the best practice approach for an RFC redesign in OSS Note 1682316.

OSS Note 1682316 - Optimizing RFC User Authorizations
OSS Note 1682316 - Optimizing RFC User Authorizations

Our Solution

The following XAMS modules can help you redesign the authorizations of your RFC interfaces.

Role Builder

Virtually eliminate the need to test new roles or role changes through an innovative concept called Productive Test Simulation (PTS).

Role Profiler

Optimize SU24, identify issues in your existing roles and authorizations, and prevent issues in new roles from entering your production landscape.

Do you want to remove SAP_ALL from your RFC interfaces?

We would be pleased to support you in the implementation of your project!

Get our XAMS use Case Booklet!

Download here


Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now