Search
Close this search box.

Temporary Emergency Rights for End Users With XAMS

Your Contact

Roland Aczberger
Authorization Management

SAP Emergency User Concept in Detail

Extensive system access that goes beyond the standard authorizations is generally considered as a critical security vulnerability in SAP systems. Nevertheless, this access is necessary to support specialist departments effectively. An emergency user concept enables the controlled and transparent implementation of emergency users and their documentation. It defines the entire process of granting extended authorizations (EAM: Extended Access Management) via emergency users, and meets all requirements for internal and external revision.

With the Xiting Authorizations Management Suite (XAMS), you can easily assign emergency rights to end users via a ā€œbackpack.ā€ Therefore, the end user receives the necessary critical authorizations for a limited period and still works with his or her own user (context).

This enables transparent traceability if your users have to provide risky system support. Our consultants implement and configure our XAMS solution, which helps you efficiently and verifiably provide extended rights for emergency actions.

Are you interested in this service?

Contact us for a non-binding offer!

More Services offered by Xiting

Get to know our SAP authorization services with the Xiting Authorizations Management Suite.

SAP Security Monitoring and ICS

Document your SAP security concept and compare it with the current settings in your systems.

RFC Interface Cleanup

Identify and optimize existing authorization checks and correct implementation errors in your own developments.

Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now