Showing posts with label Administration. Show all posts
Showing posts with label Administration. Show all posts

Tuesday, 24 November 2020

Remote client copy

 Pre-requsites:

  • Create client in the target system using SCC4.
  • Set login/automatic login sap* profile parameter and restart the server.
  • ABAP RFC connection from target to source client using SM59.
  • system user in source client.
  • All connection test should work in SM59 from target to source.
Process:

login to target client.
Run T-code: SCC9
provide profile and RFC connection details to source client.

click on Schedule as Background job.


 enable immediately check box --> schedule job


 
Review and click on continue


click on continue



Now Access T-code: SCC3


Based on the data in the table,it will take some time to complete the remote client copy.can check the successfully completed status as highlighted below.





Saturday, 22 February 2020

Client Administration in SAP BASIS

Here are the list of T-code that involve in Client Administration in SAP BASIS

  1. BDLS  - To rename the existing logical system name(CLNT<SID><client no.>).
  2. BD54 or SALE - To create new logical system (CLNT<SID><client no.>).
  3. SCC1 -  To move Transport requests in between clients with in the system.
  4. SCCL - TO perform local client copy.
  5. SCC3 - To  view the logs of on- going client copy and status of previous client copies .
  6. SCC4 - To create new client( just an entry in table T000).
  7. SCC5 - To delete exist client in SAP system. Need to login same client to which need to delete.
  8. SCC7 - To perform post client import. which makes run time adoption of client import data.
  9. SCC8 - To export exist client data.
  10. SCC9 - To perform remote client copy.
  11. STMS_IMPORT  - To import Transport request, Which is obtained by client export.
  12. SCU0 - To perform client compare between two clients

Saturday, 14 September 2019

User administration in SAP BASIS

1.Good reference for user administration in ECC systems. 
2. Good reference for user administration in portal systems.




Saturday, 31 August 2019

BI_security/ BW_security

                                                           A brief note on security:                                                              
  • ECC security is Transaction based security.       
  • HR security is position based security.
  • BW/BI is Query based security.                                                                                                                                    
  • Data in ECC system is permanent data. where as BW/BI is analytics data.
Ex1: bank transaction data for all the transaction will be stored bank server is an example for ECC system data.where as last 6 transaction data which, will get in mini statement is query based data from BW/BI server.

Ex2: Suppose their are 3 lakhs of employee working in an ERP based company.this data will be stored in ECC systems. where as query for top 10 salary getting employees query will be in BW/BI system.

  • Query in BW/BI server will re-arrange the data in ECC system.
  • Authorization maintenance for this queries is called BW/BI security.  

Note:
connection between ECC system to BW/BI system will be done through RFC connection. with the concept behind it ETL tool.

E - extract.
T- Translation.
L- Load.

ex: in ECC system                                                                             in BI/BW system

                emp name ----------------------------------------------------------------> first name

Difference between BW and BI systems:
----------------------------------------------------------|---------------------------------------------------------------
                  BW                                                                                           BI
------------------------------------------------------------------------------------------------------------------------                                                                                
  • last version of BW - 3.5                                                      last version of BI 7.X
  • ABAP based                                                                          Netweaver based
  • Customizing authorization objects                                     Analysis authorization
  • T-code: RSSM                                                                     T-code: RSECADMIN
  • one authorization objects have 10 fields                              No limit
--------------------------------------------------------------------------------------------------------------------------
Note:
for security admin only works on 2 T-codes: RSSM (if the system is BW system.)
                                                                        RSECADMIN (if the system is BI system.)

Key points to be consider for BI security:
  • source system: It's either SAP or NON SAP system.
  • Data source: whatever the data available in SAP BI system we call Data source (Info packages).
  • Info Area: the place where BI data is store in the BI system is called INFO AREA(folder name).
  • Info object catalog: who folds actual /all objects( Folders inside INFO AREA, for better segregation).
eg: Movies is folder name, inside telugu movies,tamil movies,Kanada movies are folders inside the folder Movies.

  • Info objects: Each field in the tables( combination of key figures and characteristics)
  • Info provider: Through info provider will load the data inti info objects.

Here we go for the practical steps 👀:

  1. login to BI system.by providing user id and password.
2. Access T-code RSECADMIN
3. The screen rsecadmin screen looks like below.                                                                                    
4.click on Autorizations and then Maint. As shown below.                                                                      

5.Enter the Authorization object name.So called as Role in ECC systems.                                     

6.click on create.                                                                                                                                         
7.provide the description details.                                                                                                           

8.click on insert special characters to obtain default authorization object.

8(2). Resultant screen for the step 8.                                                                                                         


9. click on the intervel option.as shown below.


10.Click on the add  button. To add the custom role as per the business requirement.
11.Then click on the help button. As shown below to add Info objects.

12. Add the required info object.

13. Add the intervals value.




14. Click on SAVE.


14. To add no. of info objects

15. Followed by operator value.

16. select the value as per the business requirement.                                                                                



17. click on SAVE.

18. Go with YES.
19. finally SAVE again, after defining the interval value.



20.From the previous steps creation of Authorization required is completed. Now assign to user.
21.Click on Assign.
22.Click on Change as shown below screenshot.

23. Enter the Authorization role in the Authorization selections & click on Insert.
      Cross check the result as shown in the screen shot as 2.

Hurrah!!! the authorization is added to the user in BI system.




Authorization maintenance for BW(3.5) system

Note: The authorization maintenance for BW system is almost similar to ECC system. But the below authorization object need to add manually.

step 1: 

SU01 ---> collection user details--> assign the T-code: RSSM
PFCFG --> create role.


step 2:

Name of the Authorization object is s_rs_comp



step 3:                                                                                                                                                       
Add the s_rs_comp1 to add user details.                                                                     




Step 4: save and generate profile similar like ECC system.


Saturday, 11 May 2019

SAP HANA COCKPIT NOTES 8: Setup and Administration with the Cockpit Manager


  • The Cockpit Manager configuration tool is an application separate from the SAP HANA cockpit itself.
  • The functionality visible in the Cockpit Manager depends on the role(s) assigned to the user accessing the Cockpit Manager.

The purpose of HANA COCKPIT MANAGER:




Note: creation of cockpit users,register resource,create resource groups,add resources to resource groups & grant cockpit users access to resources groups,modify settings related to the configuration of the cockpit can also be done in COCKPIT also. but proper Privileges is required.


 

Friday, 10 May 2019

SAP HANA COCKPIT Notes 7:Authorizations Needed for Monitoring and Administration

 To connect to the resource with a database user with appropriate database privileges.



1. To be able to connect to a resource and see minimum monitoring information   
  • CATALOG READ 
  • SELECT privilege on the schema _SYS_STATISTICS.