Most people think that you can protect SAP systems by removing and assigning transaction codes to users and that the purpose of authorization objects is to restrict certain organizational levels. The reality is however completely different.
This e-book provides insight in SAP authorizations logic, the logic and illogic of transaction codes and authorization objects, the access path and an evolving approach for your GRC solutions.
The fourth edition was released on February 16, 2016.
Learn more what people have to say about the Ebook, here.