Administration (14)

SAP Cloud Platform Security: Basic Cryptography

Whether you’re granting object privileges within SAP HANA or destroying data with SAP ILM, it’s important to keep your SAP solutions secure and out...

What Are Access Logs in SAP Cloud Platform Integration?

The Access Logs section offers access to different logs created in SAP Cloud Platform Integration.

Taking the ABAP Pain Out of Upgrades

In this wonderful software world in which we live it has been said that the best and worst thing about the current state of affairs is the...

Why Implement Your SAP S/4HANA System with SAP Activate?

SAP Activate is a methodology businesses use to perform SAP S/4HANA implementations.

A Look at ChaRM Roles for SAP Solution Manager

SAP provides a standard workflow for processing requests for change and the follow-on change documents that ultimately deploy the change depending on...

SAP Activate Q&A: SAP Authors Answer Your Questions

Sven Denecken, Jan Musil, Srivatsan Santhanam, and Bob Byrne, SAP employees and authors of our book SAP Activate: Project Management for SAP S/4HANA,...

SAP Security: Authorization Risks to Know

When it comes to security, authorizations must follow a strict principle of data minimization. All access beyond the purpose of processing is a...

Why Should You Protect an SAP HANA System?

SAP HANA is an in-memory database that stores and processes large amounts of data generated by SAP applications.

Testing SAP Solutions with the SAP Solution Manager Test Suite

Test Execution in the SAP Solution Manager Test Suite largely can be broken out into manual test execution, which involves testers, and automated...

The SAP Landscape Transformation Scenario for SAP S/4HANA

Editor's note: landscape transformation is no longer recommended by SAP and can only be accessed by purchasing SAP services.

Landscape...