Control users and access rights
Database export / import
So-called Access Control Lists (ACL) offer a good possibility to secure your gateway in order to exclude unwanted external accesses to the database of the application server. With the help of the ACL files reginfo and secinfo an access control can be implemented, in which allowed as well as forbidden communication partners can be defined. The reginfo file controls the registration of external programs on the gateway, which means that rules can be defined that allow or prohibit programs. With the help of the file secinfo you can define which users are allowed to start an external program. To be able to use these files, you must set the parameters gw/reg_info and gw/sec_info (transaction RZ11). For more information, refer to SAP Note 1408081.
If you look at everything I've described up front in its entirety, it quickly becomes clear which direction things are headed: the SAP basis will increasingly move toward an SRE-centric environment over the next decade. This is what the future of SAP looks like, and I look forward to an exciting journey.
Individual SAP Basis and Database Service for your business software
Today, most customers rely on an infrastructure abstraction layer, whether it's VMware or one of the cloud hypervisors. So base administrators need to know how to provision and manage systems in the cloud.
In addition, the applications prepare the data in such a way that the user can visually capture it via the presentation layer. Conversely, the application server transfers all data that a user enters via the presentation layer to the underlying database.
Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.
This includes the continuous monitoring and allocation of access possibilities as well as the systematic securing of functional separation (SoD - Segregation of Duties) in the IT systems.
To store all the information on the subject of SAP - and others - in a knowledge database, Scribble Papers is suitable.
Availability and stability are the most important factors.