<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Generic USERS in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/generic-users/m-p/4784347#M1120655</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with Jurjen that a best practice is to avoid using the generic user ID's altogether in these situations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One excellent resource for security best practices is this book.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.sap-press.com/product.cfm?account=&amp;amp;product=H1910" target="test_blank"&gt;http://www.sap-press.com/product.cfm?account=&amp;amp;product=H1910&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It covers a multitude of topics on SAP Security and Authorizations, including best practices for user management, and is written in a very easy to understand format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Dec 2008 13:07:22 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2008-12-09T13:07:22Z</dc:date>
    <item>
      <title>Generic USERS</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/generic-users/m-p/4784345#M1120653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Generic users should not be used for different reasons, in particular OSS users who could get developer keys etc&lt;/P&gt;&lt;P&gt;Does anyone know where I can find official documentation on best practise for this topic?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nadia&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 09:56:19 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/generic-users/m-p/4784345#M1120653</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-12-03T09:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: Generic USERS</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/generic-users/m-p/4784346#M1120654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not know about best practice documents but in my opinion it is simple:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logging on to a system is a process called 'authentication', to prove your identity to the system so it can determine the correct authorizations. Using generic userid's, the kind that cannot be linked to one human uniquely, breaks the basis of your whole system security........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides that, your SAP contract may be based on named users in which case using generic ID's will violate your license agreement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 10:05:16 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/generic-users/m-p/4784346#M1120654</guid>
      <dc:creator>jurjen_heeck</dc:creator>
      <dc:date>2008-12-03T10:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: Generic USERS</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/generic-users/m-p/4784347#M1120655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with Jurjen that a best practice is to avoid using the generic user ID's altogether in these situations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One excellent resource for security best practices is this book.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.sap-press.com/product.cfm?account=&amp;amp;product=H1910" target="test_blank"&gt;http://www.sap-press.com/product.cfm?account=&amp;amp;product=H1910&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It covers a multitude of topics on SAP Security and Authorizations, including best practices for user management, and is written in a very easy to understand format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Dec 2008 13:07:22 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/generic-users/m-p/4784347#M1120655</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-12-09T13:07:22Z</dc:date>
    </item>
  </channel>
</rss>

