SAP Add for authorization management
In addition to the basic module, the solution consists of the components apm composer (role creation), apm observer (evaluation and analysis), apm transformer (mass changes) and apm requester (role request system).
Product sheet: apm atlantis
apm atlantis keeps your SAP authorization management simple and secure: role creation, evaluation & analysis, mass changes and role request management.
apm core is the basic module, the heart and fixed component of apm atlantis and forms the interface to other modules. Call up information about transactions, authorization object, etc. and create scenarios, templates, and favorites for the role generation. Use the authorization trace to determine which permissions user and departments actually need within the organization and SAP.
With the apm composer, you can create your roles more easily, efficiently, and securely: The module supports any type of role creation (manual, transaction-related or via authorization trace). You can identify critical authorizations even during the role generation. Thanks to the automatic entry and takeover of authorization values, you prevent errors. Additional features such as mass change allows you to correct authorization values quickly and without errors across all fields.
The apm transformer offers you various possibilities for easy adjustment and correction of roles: Role-related, role-spanning with free role selection or with specified derivations, you can correct all roles quickly and error-free. The mass deletion function provides you with easy system cleansing for roles that are no longer needed.
With the apm requester, you automate the application for and approval of authorizations in SAP. The module structures and documents inquiries to change, delete, and generate rights. Responsibilities are clearly defined and processing is monitored and logged verifiably along the entire workflow.
With the apm observer, you can determine, monitor, and if necessary eliminate critical authorizations. The extensive analysis module offers the opportunity to record, analyze, and document security-relevant system information. If critical rights are assigned purposefully, they can be approved within the analyses and linked to internal and external documents. Critical rights can be determined immediately and the approval status checked at the same time. With simulation possibilities, security risks can be detected in advance and prevented.