{"id":254,"date":"2011-08-19T06:31:45","date_gmt":"2011-08-19T06:31:45","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=254"},"modified":"2015-05-03T09:01:08","modified_gmt":"2015-05-03T09:01:08","slug":"r3-security-introduction","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/r3-security-introduction\/","title":{"rendered":"R\/3 Security"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"color: #4c4c4c;\">In this section we will discuss about SAP R\/3 Security.<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><!--more--><br \/>\n<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\">In an organization there are various business processes like Finance, HR, Sales, Distribution etc. Hence, it becomes necessary that SAP System is protected from unauthorized access and security is properly implemented.<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><!--more--><br \/>\n<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\">There are various aspects of Security which need to be taken care of while implementation. Some of these are:<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\">(i) <strong>Authentication<\/strong><br \/>\n(ii) <strong>Authorization<\/strong><br \/>\n(iii) <strong>Privacy Protection<\/strong><\/span><br \/>\n<span style=\"color: #4c4c4c;\"> (iv) <strong>Auditing and logging<\/strong><\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><!--more--><br \/>\n<\/span><\/p>\n<p><span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\">We will discuss about these concepts in details in the coming topics.<\/span><br \/>\n<\/span><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><br \/>\n<span style=\"color: #0000ff;\"><!--more--><\/span><\/p>\n<h3><span style=\"color: #0000ff;\"><br \/>\n<span style=\"color: #e63518;\"><strong>Next \u00a0<em><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/security-tables\"><span style=\"color: #e63518;\">SAP Security Tables<\/span><\/a><\/em><\/strong><\/span><br \/>\n<\/span><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; In this section we will discuss about SAP R\/3 Security.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/254"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":25,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/254\/revisions"}],"predecessor-version":[{"id":2124,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/254\/revisions\/2124"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}