Enroll Now sap-security-training

Online TrainingOnline Training

Corporate TrainingCorporate Training

Course On DemandON Demand

SAP Security Administration Training  

Complete this course and you will be comfortable performing beginner and intermediate level security jobs in SAP. Designed for SAP Security Administrators, this course teaches the daily responsibilities and tasks of a security admin. 

Course Goal

  • Learn how to create single/composite/derived roles in SAP
  • Maintain authorization objects and their field values
  • Analyze the user authorization failures and their authorization buffer
  • Maintain user master records for multiple users
  • Execute and analyze the multiple SUIM reports
  • Analyze and resolve the authorization failures in an authorization trace


  • IT/Business analysts
  • Project team members
  • System Administrators

Introduction to ERP

  • Security Introduction
  • SAP Project Lifecycle
  • Default user-id's and clients
  • Creating user-id's

Overview of SAP Security (Roles and Profiles)

  • Authorisation concepts,transactions,authorisation objects
  • Introduction to Profile Generator
  • Introduction to Composite and derived roles
  • Practical exercise building roles,composite and derived
  • Adding Missing Authorisation Objects
  • System Trace and SU53
  • Inactivating Authorisation objects
  • Creating and assigning users to roles
  • use of User Groups in Security
  • How SU25,SU24 and PFCG are linked
  • Use of se16 and S_TABU_DIS
  • Use of SM30 and SM3
  • Continue review of Useful tables for security
  • Use of Compare
  • Use of SUIM reports
  • System security settings SCC4,SCC1,SE03,SE06
  • Use of SE11,SE54,and security table groups
  • Use of SAP supplied roles
  • use of SUPC
  • Use of OSS to report and search for issues
  • Audit requirements
  • Transporting roles
  • Use of SAP_ALL and SAP_NEW
  • How to delete Roles
  • Use of SAP* and DDIC
  • USR*,AGR*,USH* Tables
  • Evaluation Reports RSUSR002,RSUSR040,RSUSR003


  • Overview of SAP-HR Security
  • Pre-requisites to implement HR Security
  • Indirect assignment of standard HR Roles to Organisational Objects
  • Creating structural profiles and assigning to users
  • Executing report in SA38 for comparing usersin structural profiles


  • Overview of Analysis Authorisations
  • Difference between OLTP and OLAP
  • Overview of info objects, info cubes and hierarchies
  • Asministrative workbench Authorisations Report level Authorisations at infoobject,infocube and infoprovider level

United Global Soft Key Features

Expert Instructors

Practical Implementation

Real- time Case Studies

Certification Guidance

Resume Preparation

Placement Assistance

Copyright 2018 © www.unitedglobalsoft.com . All right reserved | Sitemap | Privacy Policy | Terms Of Services