Frank_Buchholz
Advisor
Advisor
Member since ‎11-26-2011

User Statistics

  • 359 Posts
  • 41 Solutions
  • 77 Kudos given
  • 454 Kudos received

User Activity

Introduction A security policy is a collection of security policy attributes and their values. This definition replaces the definition of behavior with profile parameters: once a security policy is assigned to a user master record, this determines th...
Risk zone ! The password hash algorithm used by ABAP based systems had evolved over time. Older hash algorithms are seen as weak nowadays and you should get rid of any such weak password hashes. References: Blog SAP password hashes security from...
The Security Optimization Service (SOS) is designed to check the security of your SAP system (see Introduction to Security Optimization Service (SOS) – Security health Check report). The SOS report shows two tables with results and findings. In the...
You can increase the security of your system landscape with the Trusted RFC concept (see Trusted Systems: Maintain Trust Relationships Between SAP Systems). This blog describes how Trusted RFC can be configured securely. Some well-known impacts of i...
You can use SAP NW Identity Management to develop a central password self-service applications which can be used by all users to set their password in various backend systems. Well, I agree that implementing Single Sign-On is always better than deali...