Everyone could stand to learn a little SAP administration. Whether you're working with a database, securing your systems against threats, or migrating to a new solution, you'll find answers here.
Learn about access management for your cloud and hybrid landscapes with SAP Cloud Identity Access Governance! First, understand the security challenges that SAP Cloud IAG helps solve. Then see how SAP Cloud IAG’s services work, from access analysis and privileged
… More about the book
Create custom integration patterns for SAP Cloud Platform Integration with Groovy! Start by getting a handle on the language before dancing your way into rapid development, from iFlow simulations to dependency management with IntelliJ IDEA. Use Groovy scripts to transform
… More about the book
The SAP S/4HANA migration cockpit has a new look—and new features! In this E-Bite, you’ll learn to navigate the new SAP Fiori-based UI and discover the latest tools to move your data to both on-premise SAP S/4HANA and SAP S/4HANA
… More about the book
Does your organization have a lot of custom code? Are you planning a move to SAP S/4HANA? Then this E-Bite is for you! Walk through the process of migrating your code from SAP ERP to SAP S/4HANA, starting with a
… More about the book
It’s time to migrate your SAP BTP, Neo environment scenarios to the multi-cloud foundation for SAP BTP! See how SAP Activate can be used to manage migrations on SAP Business Technology Platform. Then follow step-by-step instructions to migrate integrations, workflows,
… More about the book
Making the switch to SAP S/4HANA? Ensure a smooth transition with this guide to readying your SAP ERP system for migration. Explore the SAP tools you need to perform readiness checks. Walk through system changes like business partner and MRP
… More about the book
Learn how to handle errors and monitor interfaces with SAP Application Interface Framework in this E-Bite. Master transactions /AIF/ERR and /AIF/IFMON, set up alerts, view reports, create authorizations, and integrate SAP AIF with other SAP monitoring tools. Make sure all
… More about the book
Unlock the secrets of SAP SuccessFactors Admin Center (formerly OneAdmin)! Learn to navigate the homepage and its portlets. Then, follow step-by-step instructions for maintaining your SAP SuccessFactors data—including importing and exporting data—and securing your system using Role-Based Permissions (RBP). From
… More about the book
Explore the new and improved SAP Master Data Governance on SAP S/4HANA, including enhanced functionality for central governance, remediation, mass processing, and consolidation. Discover practical improvements to the overall framework and the changes to the material, customer, and supplier master
… More about the book
SAP HANA is nothing without good data. In this E-Bite, learn how to use SAP HANA EIM (enterprise information management) functionalities to load and cleanse data. Follow step-by-step instructions to set up adapters to establish connectivity. Build flowgraphs for altering
… More about the book
Are you building secure cloud applications? Reduce SAP system vulnerabilities by implementing security best practices in your applications. Learn to set up user authentication and authorization control in your apps. Address cloud application security weaknesses like broken access control, sensitive
… More about the book
Data protection is a key element of system security! With this E-Bite, learn to configure SAP S/4HANA to mask data in tables, transactions, and applications. Maintain flags, parameters, reasons codes, and more to set up UI data protection masking and
… More about the book
Use automation to increase efficiency and agility with the latest in business process management (BPM)! In this E-Bite, learn how SAP Workflow Management helps you digitize, model, and execute workflows. You’ll use rulesets to automate decision making, create a continuous
… More about the book
Mercedes Barrachina, Glen Hoaglund, Gaurang Joshi, Ryan Throop
80 pages
Stay ahead of cybersecurity vulnerabilities with SAP Enterprise Threat Detection. Learn to set up and use standard and nonstandard logs to analyze risks in your SAP environment. Review attack detection patterns and create your own custom patterns based on log
… More about the book
Logs are useful for more than just record-keeping. Learn how to analyze, use, and manage logs to improve your SAP S/4HANA security with this E-Bite! Start by accessing your logs, whether you’re running SAP S/4HANA on-premise or in the cloud.
… More about the book
The foundation of SAP S/4HANA is its new technical architecture — but what does that mean for you? See how the new data structure, modern user experience, and key embedded technologies can help you drive business process improvements with SAP
… More about the book
How does SAP HANA Cloud work, and what does it offer your business? Find out by taking your first steps with the new database application platform and understanding its architecture and underlying technologies. Learn about key capabilities for provisioning, administration,
… More about the book
Get the guidance you need to protect your SAP Fiori apps! Start by reviewing SAP Fiori 3 architecture to see how it impacts security. Then follow step-by-step instructions to configure frontend and backend authorizations. Learn how to implement security methods
… More about the book
Provision users and set up permissions in SAP Integrated Business Planning! Begin by learning about identity and access management in the SAP IBP landscape. Then, follow step-by-step walkthroughs for each key task: creating and provisioning SAP IBP users, assigning permissions,
… More about the book
Data breaches, account hijacking, exploits—you know the threats to your data. With this E-Bite, see how SAP secures your cloud system. Discover the tools you can use to protect your data: single sign-on, the code vulnerability analyzer, SAP Solution Manager,
… More about the book
Cloud systems can be vulnerable to attack—so make sure yours isn’t! See how to create users in SAP Analytics Cloud and enable a custom SAML identity provider to implement single sign-on for them. Assign users to teams and teams to
… More about the book