Complete SAP Basis Bootcamp: Go from zero to hero in SAP Basis module | George Boyle | Skillshare

Playback Speed

  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x

Complete SAP Basis Bootcamp: Go from zero to hero in SAP Basis module

teacher avatar George Boyle, Project manager at Accenture

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Lessons in This Class

88 Lessons (3h 17m)
    • 1. Welcome

    • 2. SAP Basis fundamentals

    • 3. Steps to start a SAP system

    • 4. Start a SAP system

    • 5. Check system start log

    • 6. Prepare a system shutdown

    • 7. Stop a SAP system

    • 8. Understand work process and operation mode

    • 9. Create an instance

    • 10. Create an operation mode

    • 11. Define a work process distribution

    • 12. Configure a time allocation for operation modes

    • 13. What's included in profile parameters

    • 14. Work with profile parameters

    • 15. What's CCMS alert monitor and its structure

    • 16. Display alerts with the CCMS alert monitor

    • 17. Check open alerts

    • 18. Create a new monitor set

    • 19. Add a monitor to a monitor set

    • 20. Delete a monitor from a monitor set

    • 21. Change alert threshold values

    • 22. Explore system trace options

    • 23. Check system log via SM21

    • 24. What's dump analysis

    • 25. Analyze ABAP dumps

    • 26. Understand system trace

    • 27. Turn on system trace

    • 28. What's Performance Trace

    • 29. How does performance trace work

    • 30. What's Developer Trace

    • 31. Activate Developer Trace

    • 32. Why to check Application Server and Work Process

    • 33. Check application servers and work processes

    • 34. Understand Lock Entries

    • 35. Take a Deep Dive into Lock Entries

    • 36. Basic Necessity of Cancelling the Update Request

    • 37. Cancel Update Requests

    • 38. Understand Database System Architecture

    • 39. Backup concept for database

    • 40. What's is DBA Cockpit

    • 41. Plan database tasks

    • 42. Check DBA Planning Calendar

    • 43. Check Backup Logs

    • 44. Perform a Database Analysis

    • 45. Monitor Database Performance

    • 46. Introduce Users in the SAP Environment

    • 47. Set up new users

    • 48. What is User Group

    • 49. Create a User Group

    • 50. Handle Mass User Changes

    • 51. Authorization Management

    • 52. How Authorization Check Process Works

    • 53. Explore Authorization Objects

    • 54. Understand Authorization Roles

    • 55. Create a Single Role

    • 56. What are Authorization Profiles

    • 57. Display Authorization Profiles

    • 58. Central user administration

    • 59. What is Background Processing

    • 60. Key Job Elements-Job Steps, Job Class and Job User ID

    • 61. Start Criteria and Status for a Job

    • 62. Schedule a Job in Your System

    • 63. Monitor a Job

    • 64. Printing Principals in SAP Environment

    • 65. How Local Printing Works

    • 66. How Remote Printing Works

    • 67. How Front-end Printing Works

    • 68. Set up Front-end Printers

    • 69. Set up Remote Printers

    • 70. What's Logical spool server

    • 71. Set up the Spool Servers

    • 72. Introduction to Transport Print Landscape

    • 73. Transporting Output Devices

    • 74. Outputting Data in the System

    • 75. How to Manage Spool and Output Requests

    • 76. Understand Maintain Spool Database

    • 77. Output Management Last Job-Deleting Old Spool Request

    • 78. Start System Maintenance From Fundamentals

    • 79. Introduce the Tool of Downloading Support Packages

    • 80. Determine the System's Current Support Package Level

    • 81. Find Support Packages in SAP Support Portal

    • 82. How to Download Support Package

    • 83. Explore Update Process Itself-Kernel Update

    • 84. SPAM and SAINT Update

    • 85. Apply the SPAM and SAINT Update

    • 86. Add-On Installation Tool

    • 87. What is Remote Function Call

    • 88. Set Up RFC Connections

  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels
  • Beg/Int level
  • Int/Adv level

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.





About This Class

Learn SAP Basis technical module like a Professional! Start from the basics and go all the way to creating instance, setting up system alerts, analyzing database performance and more!

Hi! Welcome to the SAP Basis Bootcamp, the only course you need to learn SAP Basis module. There are a lot of options for SAP administrators, but this course is without a doubt the most comprehensive and effective on the market. 

This course has been designed by senior SAP consultants so that we can share our knowledge and help you learn complex SAP technical theory in a simple way.

We will walk you step-by-step into the World of SAP Basis. With every tutorial you will develop new skills and improve your understanding of this challenging yet lucrative sub-field of SAP.

The lectures are designed to be interactive, easily consumable through hands-on and demo-rich formats to give you the whole picture by putting the different function modules together.

SAP Enterprise Resource Planning is an industry-leading ERP system to help more than 80% of fortune 500 companies stay competitive by streamlining business processes, unlocking productivity and exploring insights.

I'm George, and I've been teaching people how to deploy, configure, and use SAP ERP since R/3 came into existence in 1990s.

If you are new to SAP Basis, this course will help you get started, and for those of you who have been around SAP Basis for some time this series can be used to help you expand your knowledge and prepare for the SAP basis certificate exam or become a SAP Basis consultant.

In this video series, I break SAP Basis technical modules down for you. Each video is a self-contained discussion of a particular sub module of SAP Basis. And I've tried to be practical in these episodes, too. Each one contains explanations of the topic, and demonstrations for using it.

Thank you for signing up for this course. The course will always be up-to-date here and nowhere else. I am also available for questions inside the course discussion board.

Meet Your Teacher

Teacher Profile Image

George Boyle

Project manager at Accenture


Hello, I'm George, and I've been teaching people how to deploy, configure, and use SAP ERP since R/3 came into existence in 1990s.

Over 10-year of SAP implementation experience with Accenture and two of the fortune 500 clients has helped me grow into the role of an SAP project manager with a great understanding of what it takes for an organization to get to the top and stay there.

I am absolutely and utterly passionate about ERP and I am looking forward to sharing my passion and knowledge with you! Feel free to contact me on LinkedIn.

See full profile

Class Ratings

Expectations Met?
  • Exceeded!
  • Yes
  • Somewhat
  • Not really
Reviews Archive

In October 2018, we updated our review system to improve the way we collect feedback. Below are the reviews written before that update.

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.


1. Welcome: the S. A P basis team is a very important part of every organization. It's not only a major cost, they actually determine the performance of an organizational I t system. Still, many organizations and I t managers don't do a very good job with S a P basis. Now, this isn't because of a lack of knowledge. It's because of a lack of education and applying what we know works in this course I want to share with you the fundamentals of S a P basis. I'll talk about what system admin overview is how to start and stop the S A. P system. How to configure system parameters. We'll also look at system monitoring and troubleshooting as well as how to work with database. Finally, I'll share an overview of user admin, background tasks, output management system maintenance and RFC connections. That's a P basis is challenging, but with the tools and skills you'll learn in this course, you'll be well on your way to understanding how to use s a P basis to help your organization be more successful. The good news here, you don't need any ASAP knowledge. You'll learn everything about s a P basis from zero. But the skills you learned in this course are in high demand, because s a P R P is a highly integrated but complex system. Let's think about, say, the dashboard of an airplane. We all those different buttons and displays well, ASAP is like that there. We've got a long learning curve. It's still a great investment. If you can spend reasonable amounts of time and money on learning S I. P s. A P basis is important to corporations for a number of reasons. It determined system landscape fundamentals on their ability to be up and running in today's world. But there's another element toe ASAP basis that makes it important. And that's performance and security. Then that result of both decides the end user experience, corporate risk, data consistency, accuracy on system stability. Our target audience, then, is the S a p beginner. If you're gonna consider system administration as a career option, discourse is absolutely a great choice for you on this course is also applicable s a p basis. Consultants who are considering delivering basis tasks in project nowadays s a p A. Consultants work with companies and help them develop high tech services that will allow the companies to manage their business more efficiently. The demand for S A. P consultants has grown lately, and therefore you may find S a B consultants switching their jobs more frequently on being really highly paid. So if you want to become one of these ASAP consultants, this course is a great starting point. 2. SAP Basis fundamentals: this lesson deals with the essential tasks off a basis member will also cover the most frequently used terms processes on the system. Technical architecture. So what are the basis Team rolls? It's a simple question, and I ask it to people all the time. What does the S a P basis team actually do? Who are they? I actually, people would say free or four basic tasks or some other minor stuff that they're responsible for. But I'd say there are seven different roles within the S a P basis team. So the system administrated user administrator, security administrator, transport administrator, background job administrator, database administrator and finally operating system administrator. The system administrated keeps the system up and running their monitor and manage system performance on long guns. The user administrators daily tasks are to manage user accounts ASAP. Roles and profiles. So what are the differences between the S A P role and profile? Well, s A P roles are defined the actual resource position within a workspace, whereas profiles control the activities. You can operate on the S A P system. Firstly, we've gotto assigned different profiles to the s a p role, then the basis team is responsible for assigning the rolls to a specific user account. The security administrator insurance The level of security on also monitors breaches of security on a regular basis. The transport administrator copies and manages the change requests between systems. The background job administrator schedules monitors and manages background jobs. The database administrator deals with the database specific tasks. Sometimes we call them de Be a for sure, So D. B. A is an i T professional responsible for the performance, integrity and security of databases within a company. The operating System Administrative manages the operating system related tasks. The duties of a system administrator wind ranging vary widely from one organization to another system. Add Menzie, usually charged with installing, supporting on maintaining servers or other computer systems on planning for and responding to service outages and other problems. Other duties may include scripting or light programming project management for systems related projects. So now it's time to talk about a few S A p specific terms, and I think these definitions one of the most important pieces of the course because of that fact, this is how s a P describes their technical stuff, So a database server. Obviously, this contains the database on the date of those system clock server sets. The time for the S a p business suite like e r P and C R M etcetera Application server. This server is where the essay people not run instance. So it s a P instance. Condemn fine a group of resources such as memory processes, dispatcher or Gateway. There are two most basic times. The central instance on this dialogue instance. Dialogue instance exists in the application layer. It maintains the load on the server dialogue instance can exist on different hosts is the number of dialogue instance increases. The hardware resources dispatcher on work processes would also increase, meaning that more users can log in at the same time. The central instance is to contain on cue on message servers. All dialogue instances communicate with central instance before requesting database with message server. When an instances started, the dispatcher process attempts to establish a connection to the message server. Meanwhile, we've gotta use on cue in central instance to lock tables. Okay, the next time this system, each ASAP system of a database server on several up servers running the application logic is defined by a single s i d As a peace system. Identification s a P s i. D is a free character code such as NPR or ABC. Okay, finally, client. So we need to look at one more concept before we think about the S A P system Architecture In the world of S A P, the tone client has special meaning. Clients are essentially self contained business entities or units within each individual s a p A system using a web browser, a one of us a piece special user interfaces. You lock into a client in S A P to actually access and use the system. Each system as a P R P c RN SCM and so on has a unique system specific client you log into contemporary organizations, thus have multiple production close. So one production client, per s, a P component on each component contained several non production clients as well. These he used to develop and test the business functionality that will one day be put into the production client and handed over to the company's end users. Alright, it's time to look at the architecture of A S A P system so From this point of view, the S A P system has three different layers. There's the presentation layer the application layer on the data base layer. The presentation layer is the end to face between the S A P system and its users. ASAP System uses the S A P gooey or Internet browser to access the data. The presentation layer also sends the user's input to the application server on receives data for display. The application layer consists of one or more application servers at a message server. Each applications never contains a set of services used to run the R three system. Theoretically, you only need one application server to run the S A P system. But in real life, services are normally distributed across more than one application server. The Message server is responsible for communication between the application servers. It passes requests from one application server to another within the system. It also contains information about applications service groups on the current load within them. The message service is going to use this information to dispatch an active user to the most appropriate server. All right. Next, the data base layer, which has a central database system to save the data from S A P system. This database system has two components. The database management system or D B. M. S on the database itself. The database contains the control and customizing data that determine how your escapee system runs, and it also contains the program code for your applications. Applications consist of program code, screen definitions, menus, function modules on various other components. These are stored in the repository off the database. 3. Steps to start a SAP system: one of the more common tasks of the basis team is to start and stop s a p. Whether the system performance is stable or whatever the case may be starting and stopping the S A P system is a key unit for every basis team member. So in this tutorial, we're gonna be focusing on it on the ways that you need to perform this crucial task. It's really important to know the procedure you need to follow to start the S A p A system . Firstly, you need to start the server on the operating system, and then you can move to start the database and then finally, the S a P application. We've got a dual these three tasks one by one, they can't be done in tandem because each leg can only run correctly if the underlying layer is active first. So I'm going to explain to you exactly what we should do. First, we've got to make sure the operating system is up and running. The operating system, or OS provides the most fundamental layer for the database on the S a P application, and it runs on a server. OS utilizes the hardware resources off the physical server and makes it available to run the S a P application. All s a P system data is stored in the database. On this includes the application data such as purchase orders, invoices and transactional data, as well as the system settings on the program source code. So we must install and configure database before starting the S A P system. 4. Start a SAP system: holding. I'm going to show you a demo starting ASAP in just a moment for so we click on the S A P log on icon Nick, I double click I d s one sister, we've got Austin pop up. The system cannot be reached. Message operating the prerequisite. We've got to make sure the operating system and database is successfully installed and configured are the Windows operating system. First, we've got a launch, s a p management comes right. Do that. Go to the start menu programs on S a P management console box. We didn't know ASAP Management council can only be installed on the Microsoft operating system. Hasn't admit different operating system. Please open a shell and type starts up in the console command field to start the S A. P A system right click on the system idea of the system you want in the next dialog box. We need to enter the password to log on as an administrator. Other system, because overly administrators are allowed to start and stop an escape system in the S, a p management console. The initial status his yellow on this status will turn to green if we successfully start ASAP. Her during now. It may take several minutes to start ASAP. Instant. And now the system is stopped. Whether the s a p system is running, log onto the system via a s, a p gooey. And if it's all sat, the log on screen will now display. 5. Check system start log: if there any errors that occurred during the initial start. Please go and find the start logs in the directory. U S R s a P s I. D. Instance work. Then check the error messages, which will be in the following five files. That s a P start. Log s a P start. SRV log def display Dev M s and death W zero. Now you've got to check the system lock. So to do this, you need to log onto the system via ASAP. Guri on Enter the transaction code s M 21 to look up. If anything, you need to deliver trouble sheeting to 6. Prepare a system shutdown: All right, let's explore how to prepare to shut down the S A P system. So there's something you need to do before the system shut down. We've got to send Assistant Massachusetts about the plant shutdown announcement to all end users. The transaction code to create a system message is sm zero to then we have to check to make sure there are no active users on the system through the transaction code, sm 04 or A L 08 in transaction code s and 37 we can check if there are any active or scheduled jobs in the system. If there are any, we've gotta reschedule or council the jobs before the system shut them. Then we can check whether any active processes are still running through transaction code sm 50 or sm 51. Finally, we used transaction smg W to look for any active remote function called Connect 7. Stop a SAP system: All right, so now it's time to demonstrate how to stop s a p first stop. The s a P application in this example will still be using Microsoft's over. So we go to the start menu again. Programs on escaping Management council. Now, you can choose to stop the S A P system only or to stop both the S A p on the database. Please shut down the S A P system before the database because we would lose the buffer data or the data in memory if we shut down the database first. So right, click on the system i d. This will stop the S A P system only right. Click on the name of the instance and choose. Stop now. We stopped both of them. Then you're gonna enter your password to gain authentication as an administrator. As the system starts, only the system admin construct the S A P. Next, the database is going to stop. The status will change from green to gray in the s, a pain management console 8. Understand work process and operation mode: right. Once you've had a live s a P system, you've got everything ready to go. So now it's times actually start configuring an s a P system by defining profile parameters , each instance provides a configurable number of work processes. These processes are responsible for the actual processing off the tasks that are transferred to the system. These may include executing a transaction in the use of dialogue or processing a background job. For example, work processes are divided into various types based on the tasks for which they are reserved. Dialogue work processes execute S a p dialogue programs D I. A is the abbreviation for dialogue work process. Within the system, patchwork processes execute background jobs. BTC is the abbreviation for batch work processes update work process control, asynchronous database changes and U. P. D. Is the abbreviation for this process. Actually, in the S a p system, there are two types of update work processes. U p d is the update service which a time critical, such as creating a sales order. For example, on you PD to is a non time critical service typically performing the update of statistical data in the S. A. P system. You PD has a higher priority than new PD to on cue work processes. Execute locking or releasing S a p lock Objects such as tables in a database and E n Q. Is the abbreviation for this spore work processes process. Print data on again The abbreviation for this is S p O. There's a dispatcher in the application service to assign tasks to different work process according to tough types on the workload of each work process. Hudson As a pay administrator, you must consider on the one hand with us, AP system should compromise one or more instances. But on the other hand, you can also determine number on distribution off the work process types off the instances . For example, you could have one instance the dialogue lock ons on a second instance for background processing only. Typically, customers require more dialogue processes during the day on more background processes during the night. To adjust the proportions Of the various are three work processes. To suit different phases of system activity, you can define operation modes and use the operation mode. Switch operation modes, optimized system resources for different faces, off system activity, operation mode, switching reconfigures your system dynamically so that you don't need to change the instance. Profiles feel server on Do you experience no system Downtime on operation mode configures the use of resources all the instances in your system based on work processes you need on the time interval you choose time intervals are the different times of day. The total number of work processes in an instance is relatively static because it could only be changed by restarting the application server. However, you can use operation modes to influence the tight distribution of the work processes dynamically. As a rule, work processes are switched in synchronization with different times of the day. For example, more dialogue processes could be made available during daytime hours. Toe handle the higher number of users logging on at night when only a small number of users that most are using the system on the focus is on the processing of schedule background jobs. The dialog processes can be switched to batch processes. This ensures that more processes air available for background processing operation modes, therefore allow you to adjust the S A P system configuration in accordance with your enterprises requirements. However, the total number of work processes remains unchanged in small installations, where I mostly a handful of batch jobs that process that night, you may be able to dispense with the additional process of configuring on managing operation modes. Fewer operation modes means less administrative work to maintain the system. However, after the system has being configured correctly, the subsequent administrative effort required is low. 9. Create an instance: Okay, so let's learn how to create an instance. First, Enter the transaction are said zero for in the command field and press the enter key or select the menu option tools, CCM s configuration, ours that zero full operation modes or instances. Now click on Operation modes or Instances on then choose the Create New instance. I come the instance data must be maintained on this screen end to the name of the server under host name and to the system number in the S a p system number field. To find the instances, start profile under start profile. How into the name of the instance Profile under instance profile. When you finished, choose safe. Now a dialog box will appear in which you must specify how the work process types are to be distributed because these settings are to be defined later by operation modes. End to the placeholder star in the operation mode field and leave the unset ings unchanged . Announce she's safe. Choose no in the dialog box. Now the instances created you return automatically to the initial screen. The table displays the production instances. Their detailed data on the distribution of work processes now choose safe 10. Create an operation mode: all right. After creating the instance, we next learn how to create the operation mode. You want your system to have so again enter transaction ours at 04 in the command field. On press the enter key or select the menu option tools, CCN s configuration has had 04 operation modes or instances. Now choose create operation mode on the next screen ends a daytime in the operation mode field on in the short description field, enter a description that's meaningful as possible. We end today and she is safe. You return automatically to the initial screen of the existing operation modes where the operation mode you just created is now displayed in the list of production operation modes choose create operation mode to create another one. This time a sign in a nighttime on the short description night to the Operation mode Click on Save. So now, both daytime and night time that you've created are shown in the list of operation modes 11. Define a work process distribution: after we've created these operation modes, we can now assign them to the instance. So let's learn how to do that. Assigning operation modes and defining work process distribution Once again, enter transaction are said zero for in the command field and press the enter key also like the menu option tools. See CMS configuration. How's that? Zero Full operation Modes or Instances and again, click on Operation Modes or Instances only screen. Position the cursor on the first Operation Mode, Row, Entry star and click on shoes in the dialog box that opens. Choose the other Operation My Button Answer. One of the daytime operation modes you created in the Operation Mode Field. We used the input help to select an operation mode. You can use the minus and plus buttons to change the number of work processes on when you finished too safe. Repeat the steps again on select the next operation mode nighttime again Configure the work process distribution and click on Safe in the table of you. Position your cursor on the star entry, which is not needed, and select the menu option instance that the league country to delete it. She's yes to confirm the dialogue box and then click safe by following the steps you've assigned the relevant operation modes to the instance on defined how the work processes are to be distributed for each operation mode. Next, you need to configure time dependent operation mode switching. 12. Configure a time allocation for operation modes: the operation modes and associated work process distribution a subject to time dependent switching. So let's learn how to define this Switching and execute This time ends a transaction S M 63 in the command field press the enter key Also like the menu option tools CCN s configuration as Sen 63 Operation Mode calendar Now select normal operation on click on the change butter And on this screen you define the time interval for which the Operation motors to be valid. So position your cursor the start of the period. For example, eight oclock to nine oclock If daytime operations are to start at 8 a.m. select a menu option Operation mode, Select Interval or you could press the F two key Now the intervals been selected. Click on the menu option Operation mode a sign or click on the assign button in the dialog box used the input help to select the relevant operation mode and click on continue if daytime operations that ended eight oclock in the evening. On other time intervals and nighttime operations, we select time intervals on a sign operation motor them one by one. - The assignment is shown in the table and when we finished, choose safe. The status bar displays a message indicating that the Operation Mode set has been saved for normal operation. From this point on, the operation modes will be switched using this timetable. 13. What's included in profile parameters: profile parameters are used in the S a P system to control basic technical sittings that are required to start the system. For example, you can use parameters to specify the number of work processes a system should have or the required minimum number of characters in a user password. Profile parameters are stored in three different profiles. Firstly, start profile on this profile defines the name of the system on which ASAP services are started. Secondly, default profile. This profile contains all parameters that must be identical for also instances off the system on Thirdly, The instance. Profile This profile determines the detailed configuration off a specific instance. This makes it possible to have different configurations for individual application servers or instances that are intended for different tasks. The profiles are loaded in the sequence giving in the preceding list out. Stand up the profiles of seders files at the operating system level. They're located in the directory Us are s I P. Sister. My day sis profiles. So from the picture, we can see the files default dot pfl Ellie I dvb mgs double zero beatable cl on start DVB MGs double zero e double C l 14. Work with profile parameters: so let's learn how to maintain profile parameters and the transaction are said. 10 in the command field and press the enter key or select the menu option tools. See CMS configuration as a 10 system profile. Enter the relevant system profile in the profile field or used the input help to selected free options of that available in the Edit Profiles area. There's administrative data. This option is not a maintenance option. Instead, it's used to change the file name. If you need to change the profile basic maintenance. And in this mode you can define buffers, work processes and directories in the system profiles. You can also specify which ASAP components are to be started in start profiles such a message server applications over and so on. This type of maintenance protects most profile parameters from being changed by potentially incorrect settings. Then thirdly, extended maintenance and this mode enables full access to all profile parameters. So select extended maintenance. I click on change. Position the curse on the road below the new row. You want to be inserted with the profile parameter. Click the create parameter butter to create the parameter. Enter the name of the new parameter in the parameter name field and press the enter key. This feature allows you to keep track of which persons have made profile changes, at which times the S a P D full value of the parameters is displayed under UN substituted default value. Enter the desired value in the parameter value. Failed under comment, entered the reason for the change for documentation purposes. Now, when you finished, click on copy the system enters your user i d. On the current date In the comment field, a message is also displayed to confirm that the changes have bean applied. Now click back well, then returned automatically to the list of profile parameters. And you'll see the new parameter has been added to the list. Click on copy. A message is displayed at the bottom of the screen to confirm that the profile has been changed. Click on back on on the edit profile screen. Click on Safe Now. Choose yes to confirm activation of the profile. There are others using the system now. We cannot impact them on normally using the system, so we will not save it 15. What's CCMS alert monitor and its structure: in this section, we're going to learn how to check system status and handle the possible critical systems situations well, then step through all the basics you need to know to monitor computing Trenton management system or see CMS Alert how to connect remote systems on how to maintain threshold values. Next, we'll learn all the ins and outs of additional log and trace options and troubleshooting approaches to process different business functions. In an essay P system. There are many components within it. You have to monitor these components on a regular basis to prevent errors. Now this type of monitoring avoids performance issues or an unplanned system. Shut down. So we use See CMS alert Monitoring infrastructure to track entire ASAP system efficiently and centrally. ASAP. Computing centre monitor. Insistent is a centralized monitoring architecture that provides a set of monitors for monitoring the S A P environment. Using the CTM S functions, you can check the performance of the various s A p system components diagnose potential problems on be alerted about error and warning conditions. The monitors provide you with the information you require to find you in the S. A P system on the operating nodes and hence optimize system performance. Okay, Now let's take a look at the monitor structure. So on the highest level, the sea CMS alert monitor can have different monitor sets. Every monitor set bundles monitors to display different parts of the monitoring architecture by topic area the sea CMS alert monitor can collect data from multiple ASAP systems. The delivered monitor sets can be different for each system. So, for example, on S a PCRM system contains a special set for monitoring CRM scenarios. Meisters represented grouping of monitor entry elements, or NT's. The monitoring architecture displays a tree was all monitor tree elements of the S A P system. These aunties help visualization one creating a new tree. The elements are uniquely structures on ordered within the S a P system in the tree antes ordered under a summary node, they're logically combined in groups which are called the monitor in context. The monitor in context is named after the root element of the monitoring tree. The measured values that are collected by the data collectors are displayed at the lowest level in the leaves of the tree. On these leaves are known as monitoring attributes, threshold values can be stored for a monitoring attribute and S a p delivers default threshold values. However, in order to customize the monitor as well as possible for your system environment, you should check these threshold values and adjust them if required. Monitoring attributes a grouped at the second lowest level using monitoring objects. For example, the Monitoring Object program buffer contains, amongst other things, the attributes hit rate and swap all other nodes in the tree served to structure the monitoring objects in a logical and clear way so that you can easily find the monitoring attributes that you require. 16. Display alerts with the CCMS alert monitor: Let's now see how to display alerts by using c CMS alert Monitor. So type and end to the transaction code are said 20 in the command field. Or you could select the menu option tools. See CMS control monitoring. Are there 20 CCM s monitor sets on the screen? You can see all monitor sets in the system. You can expand a C CMS monitor template to view what we've got to see in this monitor. Set the one with the S. A P logo is the official standard monitor set, and we can't change that at all. We can only change the user specific monitor to start a monitor its entire system. So double click on it or choose the row you want to apply, and then she's load monitor on the top left of the screen. Now you'll see the monitor we just selected in the current system status view. The monitor objects are arranged in a tree structure on a different color indicates the different status. So for green, no alerts exist for yellow. Let's have been detected. But there are nothing really serious on for red. Siri's alerts exist. Expand the tree structure to drill down the individual monitor object list. The lowest level in the tree structure shows the monitor objects that is, the components or aspects of the system that are being monitored, such as the memory available on the drive. Each monitor object has a monitor attributes, such as free space in megabytes. On to display these details, we can select, monitor, object, and then she's display details. The detailed view shows additional data about the current now choose back to return to the monitor view on. We can also display the threshold values of a monitoring object by choosing on the object in the monitor view on clicking on properties now in the performance attributes tab, we confined threshold in the threshold values area. Okay, now choose back to return to the monitor. 17. Check open alerts: Now let's look at how to check previous existing alerts. So click on open alerts in the monitor to switch to the previous existing alert view to choose display alone. See all that to see a list of all alerts, then our, based on their priority on you, could navigate to the details or properties of a monitor to show the alert history on the threshold values alerts will remain open until they're confirmed on. You can click on complete alerts if the alert is successfully resolved. 18. Create a new monitor set: the sea. CMS monitors provided in the standard S A P monitoring options. However, if the standard monitor sets don't meet your requirements, you can build your own so this we're going to create a new monitor set. So enter transaction as a 20 in the command field. Or again, you can go through the menu. Option tools. See CMS control monitoring as it 20 CCM as monitor sets now select the menu option extras on activate maintenance function To activate the maintenance functions on now, choose create. You can also click the copy button to copy an existing monitor set as a template. Then select the new monitor set and click on continue. All right on the next screen, enter a name for the set in the monitor set field. You can also specify the permission to edit the set in the modify Ability field. Or, if you want the monitor set to display on the initial screen of transaction as a 20 then check the public option now choose. Continue now the new monetise that is already in my favorites. The public monitor set I can't means you've created the entries yourself. The modifiable icon indicates that you can add it. The set. All right, so in the next section will learn how to add on removed a monitor. 19. Add a monitor to a monitor set: All right, We're gonna add a monitor toe a monitor set. So, type transaction. Are there 20 in the command field on presenter, or you can select the menu option tools. See CMS control monitoring. I'll said 20 CCM s monitor sets activated maintenance functions. Move your cursor on the monitor set and shoes create the monitor. Objects we've added will display in a tree structure. Expound the monitor tree and select the no do you want to add? And here we're going to select background. When you selected all monitor objects you want to add, click on save in the next dialog box type of name for the new monitor in the monitor field and shoes continue to save. Expand your monitor set on. Place the cursor on the new monitor, then choose load monitor. Expand the monitor tree. This new monitor only displays the nodes you selected on. In this example. The monitor is used for monitoring background processing by the system 20. Delete a monitor from a monitor set: in order to delay to monitor from a monitor set, you need to end the transaction are said 20 again in the command field and press the enter key. You could also go through the menu as before, activate the maintenance functions and expand the monitor structure in the monitor set. Position the cursor on the monitor you want to delete. And here we're gonna delete background processing. Ellie, I so select that. Now choose delete in the dialog box. We now choose yes to confirm on when we see this message box, the monitor will be successfully deleted. Obviously, you can repeat the steps until you're saved the monitors you need. 21. Change alert threshold values: fresh whole values dictate which reported values generating alert for the node for performance attributes. Depending on the severity of the problem, the alert would turn green, yellow or red. Now, every ASAP installation is unique. Various kinds of threshold values are extremely important to get a meaningful performance insight. So in order to change alert threshold values again, that's the transaction. Ours a 20 on press enter as a reminder. The menu option now is tools. See CMS control Monitoring are that 20 cc amass Monitor sets. Once again, expand the monitor structure in your monitor set. Select the monitor object. You want to change the alert threshold value on In this example, we're going to modify the threshold value for CPU utilization and she's properties. Click on display changed chips, which to change mode under threshold values. End to the values now choose save 22. Explore system trace options: the S. A P system provides a wide range of trace options that you can use to track system activities at the different levels. Here's a quick list of the most frequently used tools on their transaction codes. So for system log, the code is s M 21 dump analysis. It's s T 22 system. Trace is S T 01 Performance traces S T 05 Developer traces Ste 11 to check the application service and work processes. It's sm 50 and s and 51 to lock entries. The code is sm 12 to check. Counseled update requests. It s and 13. We're gonna talk about each one of these now in the coming course. So if a system love this records all events, errors, problems and other system messages like update failure, lock table overflow, small overflow operating system issues, network issues, table space, full issues and other database issues. System Lord will trace all the zahra messages in a system time. This is an important log because unexpected or unfamiliar warning and error messages may indicate serious problems. So we recommend you check your system log at least two times a day. 23. Check system log via SM21: we can check system loud by transaction, sm 21. So let's have a look at how that works. So enter transaction s and 21 in the command field and press enter through the menu option . That's tools Administration monitor Essam 21 system. Look now in the from date time field and to the start time you want to check. We could restrict the selection with a lot of details, such as traces specific. Usual transaction. Use the problem classes radio buttons to define whether all messages are to be listed or critical. Events only. Click on the re read system Log button. A list of system log salted by time will now display. So check the entries for Ariza warnings, using the colored icons in the priority column as a guide to display log details. Double click on a certain row and shoes details. Now you can use the system log to get a quick overview 24. What's dump analysis: an error in Ann Arbor program is running in the background generally causes an immediate termination of the background job background job is terminated if, for example, the program does not correct the error or a division by zero takes place. If another program terminates on our but dump is usually generated, this dunk contains a description of the precise cause of the era. 25. Analyze ABAP dumps: Now let's analyze Arbab dumps, so type transaction S T 22 in the command field and press enter. If you want to go through the Manu once again, that's tools Administration Monitor S T 22 don't analysis. You can select the dumps to display here in two ways, so one is a simple selection you select today or yesterday in the standard screen area. The other way to do this is to control the selection by criteria, so you enter the relevant parameters in the own selection area on click on Start Now. Next will see the run time errors on the initial screen. When you click that today or yesterday buttons providing a rough indication of system status, a large number of short dumps might indicate a general system problem that's affecting a lot of users. So in this case, the basis team is going to resolve the issues as soon as they're able to. If the number of short dumps is smaller, the system obviously has a more or less stable status. Check the recorded our bar run time errors at regular intervals several times a day, so choose today we can see a run time errors list, so double click on the dump we want to analyze on. You'll get more details on this dump. If you want to save this log in a local file for further analysis, you can select the menu option system list, save local file in the long text of the runtime era and then save this short dump to your PC. 26. Understand system trace: All right. No system trays. If you want to record the internal s a P system activities like authorization check or database access you can use the function s A B system trace. This is primarily used authorization trace. We recommend you to use system log or the developer trace for system monitoring and problem in our 27. Turn on system trace: Now I'm gonna turn on the system. Trace. So this one is transaction as t 01 Select authorization Check RFC coals and lock operations . You can also choose the General Filters button to set further restriction. To trace a user, choose the traits on button to start the system trace. Then we're gonna do a few daily operations so that we can get a trace file. So this time, let's enter transaction code s u 01 Choose users. Change on the address tap page, change the title and save your change on done. That's deactivate the trace and evaluate the trace file so and to transaction as t 01 and choose the trace off button. Now choose Go to analysis on select authorization check. RFC cools on lock operations and choose start reporting. 28. What's Performance Trace: ASAP. Performance Trace. Trace his execution of S A P programs or jobs to catch performance. Statistics related to SQL Statement. Execution s a p on cue operation ASAP. RFC Activities s A P buffer access and http activities so you can analyze trace to validate performance or identified before this bottleneck. It also allows you to enter an SQL statement and analyze its execution plan without executing a program. 29. How does performance trace work: Let's take a look at how performance trace works. So enter transaction code s t 05 And so, like SQL trace, we can choose the activate trace with filter button on. Enter the user as a selection criteria for tracing purposes. We're going to start the program. Our S U S R. 000 in transaction s a 38. Then stop the trace in transaction S t 05 By choosing deactivate trace, choose the display trace button on select SQL trace. You can now display the SQL commands in plain text to select a data record on choose explain. 30. What's Developer Trace: developer traces contain technical information for use in the event of problems. So these traitors will help us identify most problems of remote function. Call dispatch a work processes database and so on to view the developer traces you can goto s t 11 on the transaction code which will take you to the service directory. For example. If we want to investigate problems in the work processes, I can open the death w zero train. 31. Activate Developer Trace: right. Let's activate a developer Trace. So enter transaction code s t 11 in the command field on press center through the man knew . That's tools. Administration monitor traces S t 11. Developer traces. Now we'll see a list of the era logs on you. Just double click on an item to analyze it. 32. Why to check Application Server and Work Process: when a dialogue application server is in active. Users who normally log onto this server are unable to do so when the batch application server is inactive. But jobs that have been selected for this server cannot be executed When all work processes air occupied, no further tasks can be processed and this situation may arise is too many users are logged on or too many background jobs and running in parallel. We've got a monitor, the application so on work processes for further analysis. So you'll see. Now I'm gonna show you how to check the application server on dwork process. 33. Check application servers and work processes: Okay, let's get going. So first we gotta check if the application servers are active. Let's go to transaction, sm 51 in the command field on press enter through the menu. We go to Tools Administration Monitor System monitoring at 7 51 servers. Now we'll see the list of active servers. Check whether the service status is active. If all applications are active, you can begin to check the work processes. So enter transaction sm 50 in the command field and press enter or again through the menu Tools Administration Monitor System Monitoring S and 50 process Overview on. Now we'll see the individual work processes. Status processes with waiting are available, while processes with the status running are currently occupied by the system. The action column provides details about the processes that are currently running When checking the process. Overview. Focus on the following information dialogue, work processes or de ia with high time values may point to a problem or two. A step in background process that's taking a long time to execute on that starts a dialogue process you've stopped has shown in the status column for a work process. This may also indicate a problem because this process may have failed or being interrupted . Now, in certain cases, you may need to counsel processes manually to eliminate a blockage in the system. If necessary, you can select the Menu Option Process Council with without core to make system resources available. The application server overview and process overview provide you with a quick initial impression of the system status. Using this approach, you may be able to detect even at this early stage, any indications of system instability or insufficient hardware resources. 34. Understand Lock Entries: as nature of S a P system behaviour. Whenever a user performs an update on any table for that period of time, the lock on that particular feel of the table will be created to prevent any other user updating that table to obtain data consistency. For example, when a user is trying to update the database, like editing customer address for postal number, then the user met a planned power failure or lost the connection to network so that usual may luck the system and that causes the other users to not be able to edit the entries. The lock entries will be deleted through SN 12 and there's some 12 is a basis T code. In fact, at 7 12 T code is the part of the daily monitoring sheet on. We need to monitor the lock countries on a daily basis. 35. Take a Deep Dive into Lock Entries: right. We're gonna lock entries now, so enter transaction sm 12 in the command field. On press the enter key through the Manny this his tools administration monitor. Ask them 12 lakh entries. If you only want to analyze lock entries in general, we clear all fields to restrict the selection and to the relevant parameters in the fields provided on click the list button. Now we can see the look entries. If you double click on a lot country on, she's continue or choose details of further analysis on, then she's continue. You'll return to the list you to delete a lock. Select the Roey one release on a quick on the late. Now choose yes to confirm after you get a message box, choose the close button. 36. Basic Necessity of Cancelling the Update Request: ASAP system sends update requests to the database. It's the data can be saved now. In some cases, an update request may fail. Said basis admin is going to cancel the update request. There's looking an example. So an accountant gives a file to a manager assistant. This is the equivalent of saving a transaction in the system. The assistant and issues the accountant with an acknowledgement of receipt on this equates to the creation of A S a P document number. Now, on the way to the filing cabinet, the clerical assistants stumbles and is injured. As a result, the file isn't filed in the cabinet. We can compare this incident with an update error. So the result that is, that the files and all in the filing cabinet. Even though the accountant has received an acknowledgement, the same thing happens in an essay pay update environment. So the documents not in the S a P system, even though the use has been given a document number for it. When users receive a document number, they assume that the corresponding entries been successfully entered in the system. However, if the update record is counseled, the entry doesn't exist in the system even though they've got a document number four it. So you should therefore check the system counseled update records several times a day in global systems. He should adjust the times at which he searched for counseled update records in accordance with the various time zones. Employees located within the relevant time zone should also be involved in this check. The more time that elapses between the cancellation of the update on your detection of it, the more difficulties for users to remember exactly what they were doing when the update record was counseled. If you are quickly, you can also reduce the frequency with which update records are counseled. 37. Cancel Update Requests: so we're gonna cancel the update requests now. So it's transaction s and 13 in the command field and press enter again through the menu. That's tools Administration Monitor s M 13 update. Now, we need to type a few criteria to control the search results. And in this example, we're gonna list all update requests. So we type star as a variant on that list several and to star in the client field and a star in the user field. Select the entry. All now, leave the front date field blank. When we finished, choose execute. Now here, there's no record, but it doesn't matter. We slow down the system performance, create a sales order and then save it. Okay, that's execute at some 13. Again. Great. Was one record search The status column with the air s status here is indicated Terminated . Update record. If you find no canceled update records, your task ends here. You can double click on entry to display its details. The update module screen provides details of the user transaction and function. That's to be updated. Click on the error information button details of the update status and then displayed, which may indicate an error. If you detect the occurrence of update areas, you must then notify the affected users. These users, in turn, should search permitting entries and re enter the data records that haven't Bean updated. 38. Understand Database System Architecture: the real power of S a p E r p lies in the built in editor that empowers you to take database administration to the next level. In this tutorial will take a high level overview of the database that will deliver you periodic checks. The database is a really important component within the S A P system architecture, because it contains the Arbab programs system settings on the actual transactional data, depending on the size of your enterprise on the way in which it's organized. The most frequently used databases are IBM, DB two, Oracle, Microsoft SQL Server and Max DB. The database management system, or D BMS, is an application that interacts with the user other applications on the database itself to capture and analyze data. The General Purpose de BMS is designed to allow the definition creation querying update on administration of databases. A typical DBM s includes database processes, a buffer in the main memory data files that contain the actual data on log files. At the start of A S. A P system, all work processes is linked to a database process. Database queries are executed, passed by S a P work processes now special database processes are responsible for exchanging data between the buffer on the data files during this exchange. The data is always read and written in complete pages, which usually contains several data records. If any data has changed, it would generate change. Lock in the log file. Only the changes on not complete pages are logged in the log buffer. The entries are written from the log buffer to the log file, of which there could be more than one depending on the database. For every database, there's a mechanism the backs off the log information from the log file to other files or directly to a backup medium. This ensures that the log file does not become too large. ASAP recommends that you mirror the log file. Some databases provide special software mirrors to allow you to do this. The database always also includes structured data that contains essential information for the database, such as the number of data files and so on. The ongoing log information may include the structural data. This information is extracted from log files for migration to back up media such as data cassette 39. Backup concept for database: a backup concept for the database always includes the regular backup of data files the structure data on the log information all data files in the structure data backed up together on the ongoing log information is backed up separately. Now we recommend that the duration of a backup cycle is 28 days. This means the backup media for the data and log information Backups are not over written for at least 28 days. We should perform complete data backups every day to minimize data loss risks. Some data vote is offer hot backups, which means we don't back up the complete data over and over again. We just back up the data that's being changed. If you use heart back up, we suggest you foot performer complete data backup at least once a week. So that's four complete data backups in the whole cycle. Meanwhile, we've got a back up the log information at least once a day. We recommend you always have to different back on media to contain the same information, performance data and log information backup with verification of the backup media, at least ones in the back of cycle 40. What's is DBA Cockpit: too many. My system downtime an improved performance. You were schedule regular administrative jobs, such as backups than database checks on monetary or database on a daily basis. The DB A cop. It is the central point for monitoring and administration of database within the S A P system. The deviate finding Canada on the central DB, a planning calendar, are used to schedule backups. In the meantime, you can use the backup log overview to display backup blog's archive directory status and restore reports. With their irony, the DB operations monitors for checking the database operations status and lugs, including backup monitoring optimizes statistics. Updates on database checks. The Database Performance Monitor displays performance indicators for the database, such as buffer cache quality user call statistics or database management system and database configurations. The tables and indexes monitor tracks the storage behavior of the database, for example, space statistics that shows the database size and free space database objects status like table size on in 41. Plan database tasks: okay. In this demo, I'll show you how to plan a new database. Administration task so and to the transaction, DB 13 in the command box on press the enter key or select the menu option tools CCN s db administration flooding calendar D B 13 local. Now we can see the DB A planning calendar to plan a database administration tasks selected date in the calendar and choose schedule action in the schedule Action dialog box. Choose the action you want. I'm gonna choose check database in this tutorial in the start time, we're gonna enter the start time as five o'clock PM and choose. Continue now. We've already successfully added this action to the calendar. Also, we can edit tasks haven't been executed yet. We can change the action parameters, will delete the action from the DB. A planning calendar in the deviate planning calendar. Navigated a certain date, select the planned action. You want to change and choose change action to adjust the action parameters, click on change in action. Then we can change data like start time from five oclock to for a club she's continue on, then done. If you want to delete inaction, choose a task and click delete action. Then we'll see a dialogue box for the planned action. And you can confirm this by now. Choosing delete. 42. Check DBA Planning Calendar: You can also use the DB a planning calendar to check the date status of a data votes administration task. For example, you can use it to check whether a task has been successfully performed to do this and to the transaction. Db 13 in the command box on press the enter key or select tools, see CMS Devi Administration planning Calendar D B 13 Local. Jed was task status color in the calendar view. Different colors stand for different admin task results. So red means era yellow is warning on green or blue means successful execution. Move to the action you require on choose action logs to check the locks in the BR Connect action log for database. Ellie I window. We can check the details by clicking on detail. Log exit the detail view. Choose back. We consent the execution status by clicking on job logs. On this list, we can see the job name status scheduled, start time, actual start time on end time. We could drill down the detailed job execution by clicking on display log. Now we recommend you deliver this check at least once a day, and that's to ensure the database actions, which are usually scheduled in the night time work as well as expected 43. Check Backup Logs: All right. Next, let's learn how to check the backup plugs, so enter the transaction code. DB 13 on. We'll see. There's a whole database Online backup action on the status now is red, so we've got to check the backup logs with the transaction code D B 12 Answer transaction DB 12 in the command field and press the enter key or again through the menu. It's tools. See CMS Devi Administration Davey 12 Backup Blog's on the back of blocks Overview for database screen. Choose that it from button in the database backups area to check the time on content off the database backup. In this case, we choose last unsuccessful backup. Now we click on detail. Log on the information about the last backup is listed. Okay, she's back to exit the view. 44. Perform a Database Analysis: all right, so the next thing we're gonna learn is how to perform a database analysis. This time it's transaction DB 02 in the command box on Press the Enter Key again. If you want to go through the menu, we're looking at Tools Administration Monitor Performance Database D B 02 Tables in nexus On the database analysis initial screen. We can see an overview of the most important information about the database, so the database name and database server size and occupancy statistics, number of tables and indexes on consistency off the database. Check the date and time of the last update before you call detailed information about individual areas. If this time is too far in the past, you would choose Refresh. The system may issue a message indicating that the update may take some time, but she's yes to confirm this dialogue. Bob's use the buttons in the database performance tables and indexes view to navigate to the detail view for the individual analysis areas. For example, current sizes in table spaces area. The data is displayed in a new window so we can check interesting information in a similar way. One by one 45. Monitor Database Performance: All right. So we're gonna monitor database performance using S T 04 So again in the command box and tears t 04 on Press center, for example, we can check long table scans in table scans and fetches area. The system displays performance information about the database cash we find hit rate information and calculate the hit rate divide session cursor Cash hits 18716 by session. Cursor cash count for 54 on the hit rate is 2.4%. This figure indicates the number of database accesses that can be performed from a fast cash. A race of more than 98% is considered to be an excellent value If the rate is considerably lower. Slower memory areas must be used for many requests on this may lead unsatisfactory performance. We can change the size of the database cash to resolve performance problems, but these changes may cause more problems than they resolve. So if in doubt, consult an expert before you make a change 46. Introduce Users in the SAP Environment: let's explore some of the basic techniques for user administration. One of the best things about s a p E R p is they've added in the ability to make all of your users compliant. So to achieve this goal, we're gonna talk about creating users rolls Authorization profiles in this section will also explain the central User administration concept that uses in the S A. P says don't need their specific authorizations to log on when they love onto an operating system a database or A s, a P system that got her entered. A user I D and password users An authorization data Klein dependent. A system admin. We're gonna protect the level of access to the operating system applications over on database server for data security purposes. So user types, there's dialogue, and this is the most commonly used time. This user type is primarily for individuals to gain interactive system access. The user of this type can perform dialogue processing an interactive mode, not gon processing much import processing and CP. I see services provided there are no explicit restrictions of our assignment of specific authorizations. As a P licensing can prohibit multiple concurrent use of the same user i d in production s a P systems communication user. This user type is used with dialogue free communication between systems such as RFC or remote function called communication. This user is not allowed to log on to the R three system or start dialogue Processing. A system user is the user type which could be used for dialogue free communication within a system. Such is for RFC uses for Ailey TMS Workflow and See you a on for background processing. A specific use of the system user type is a validity period of a password won't fly for this type, so this could be used to run background jobs on in between our FC's so that jobs or RFC communications won't fail due to expiry of the password. Please also note that log on in dialogue is not possible. Used system user type service users. This year's A Type is a dialogue user, which is available toe a large anonymous group of users, for example, to access FYI, TS or Internet transactions server. There won't be any check on initial password or expired passwords for this user type. Also, multiple log on zehr explicitly permitted for this user type. However, this user types should be assigned with great caution on with limited authorizations. For security reasons, there's also reference user on this user type is, in general a non person related user so it can't be used for log on. Instead, this user type will serve as a reference for assigning additional identical authorizations to other users. For example, in case you have to assign some identical authorizations to all Internet uses, you can create a reference user with those authorizations and use this reference user to assign identical authorizations to all of the 47. Set up new users: right. Let's learn how to set up a New Year's in the S A. P system. So before setting up a new user, we've gotta have the user related information and approvals. We can copy an existing user as a template or set up a brand new user profile. So here I'm going to demonstrate how to copy from an existing user. So enter transaction s U 01 in the command box on press enter also like tools, administration user maintenance s U 01 users in the S A P menu. Then we've got to take the user. I d. You want to copy in the user box and select copy in the coffee uses dialog box. Answer a new use I d into the field. Activate the tab. Do you want to copy on select coffee? Select the generate password button to generate an initial password via random generator. You can also enter a password manually in the initial password field. So, for example, we're gonna type 654321 on. Repeat this again in the repeat password field and to the user group to which the user is supposed to belong in the user Group area for authorization check. So, for example, super. Or use the input. Help to select the user group from a list onto the time frame. Now in the Valley from on Val into fields, choose the address. Tap the type the user address if you want. Now we're gonna answer a few basic pieces of user information, so there's last name first name function department location, telephone, email, then select the defaults top. We've got to make sure that the log on language is correct. If a default language has been defined in the system parameters, for example, German, this field is only required to define a different log on language. For example, e en for English for the individual user. Now that's that system outputs in the spool control area. Enter a standard printer in the output device field or used the input help function to select one from list. Activate the two output immediately on delete. After output, check boxes. Check the personal time zone on. You can also use the input help function. If you want to change to a specific time zone, select the most appropriate decimal notation under date format. Select the right day for Select the Parameters tab and enter parameters and parameter values in the table. Select the roles. Tap on a sign the authorization rolls to the user on defined the valid from on Valid. To choose the profiles, tap on a sign the authorization profiles based on user requirements, select the Greaves tab and then to the user groups to whom you want to assign the user. Unlike the user group assigned in log on data tab, these groups are not included in the authorization check, but instead service an additional group in characteristic, for example, for selections or similar. Now choose the personalization tab and change the personalization options if required. Now choose the license data tab on store the contractual user type I d. Corresponding to your license agreement on God save. Now we successfully created a new user. In some cases, we don't have the right used to copy. So we've got to create a brand new user account, and to do this again, transaction s U 01 in the command box and press enter again. If you want to use the Standard s a paper new That's tools administration using maintenance . S U 01 users and to the user I d to be created and then click on Create on will follow the same procedures before to input the user information. Sometimes we've got to maintain the user profile again into transaction s u 01 or go through the S A P manuals before and to the user. I d. You want to maintain and click on change in the maintain user screen, you can now change and save the data. 48. What is User Group: the user groups commonly used to categorize users into a common denominator sort users into logical groups and allow segregation of use. And maintenance is especially useful in a large organization. We can categorize user groups into two types. Authorization User group in conjunction with Ass User Group Authorization object it allows to create security management authorisation by user group, for example, you can have a local security administrator only able to manage users in his groups. Helped us to reset passwords all users except uses in some groups. Also, General User Group in conjunction with S u I haven't s you 10 to select all the users in a specific group use It can only be member of one authorization user group but several general user groups. 49. Create a User Group: Now let's learn how to create a years a group and the transaction sug ar in the command box and press enter through the S A p menu. That's tools administration use a maintenance sug I user groups enter a name for the user crew. So in this example, we're going to set up the user group sales on click on the Create User Group button. I am now into a description. Then we're gonna add users to the group on the user assignment. I know we just click on safe. Don't. 50. Handle Mass User Changes: as we've already mentioned, individual user master records concluded, re created or updated through the S u 01 transaction. From time to time, a security administrator gets a request to create or modify and number reviews of master records. S A P provides us with a number of options toe handle, mass user changes, and I'll be covering this topic now. There are a lot of scenarios that we can apply mass maintenance to in the company. For example, when we assign a new company address due to organisational changes or change the validate SMP implementation team due to project timeline, postponement or locking lots of users for system maintenance. So let's quickly look at how to change use of master records. This time we enter transaction s u 10 in the command books and presenter through the S A P Manu. That's tools administration user maintenance s U 10 user must maintenance now into the user . ID's on in this demo. We're gonna change. BC user one on BC user to user groups. We'll click on change, select the relevant tabs we want to change and we're gonna change. Log on data here and to the data you want to maintain and you use a group and activate the change check box. Now, when you've made all of your changes, you can click on save and so, like yes, check the change logs on put back to exit. 51. Authorization Management: authorization management in S A P can make testing the s a P solution a cumbersome process and often created potential compliance risk. In terms of the use of the S, A P system in testing authorization errors can block test cases for hours every time they occur, which wastes precious time, generates risks and build our frustration in these projects. Managing a SAPI licenses shows that as many as one in four s A P roles and not used in the life production s a P system. This not only clogs up the system, but after license costs compared to user administration, the authorization system is mainly characterized by business needs. In other words, that uses departments of your enterprise will determine to a large extent how authorizations are assigned. For example, the HR department must be consulted when the HR module is implemented or if personal data of employees are managed in the system. Furthermore, coordination with external auditors, legal and enterprise internal regulation should be in place. So consult your external auditors with regard to requirements that are made on the audit related internal control of user administration and surprises organized their user north or ization administration according to the segregation of duties principle, Separation of duties is a classic security method to manage conflict of interest, the appearance of conflict of interest and fraud. It restricts the amount of power held by any one individual on it puts a barrier in place to prevent fraud that maybe perpetrated by one single individual. 52. How Authorization Check Process Works: authorization check. It s a P. Make sure that users have the proper authorization to perform the task A person could log on to a client. Oven s a P system if he or she knows the user name and password of the user master record. And if the user type is authorized for the log on type, for example, it's not possible to log on with the communication or system user in the dialogue process they use a master record is the collection of the user information such as address, name, user type roles and authorizations and so on. Log on type is determined by user type in the S A P sister. There is an authorization check every time we execute a transaction code. If the user starts a transaction code for which he'll she has authorization, the system displays the initial screen of this transaction code. Depending on the transaction cold, the user enters data and performs actions on this screen. There may be additional authorization checks for the data and actions to be protected. User authorizations are assigned using rolls. The authorizations are combined in roles on the roles are entered in the user master record 53. Explore Authorization Objects: authorization objects composed of a grouping of fields. The values in these fields will be used in the authorization check, and they could be a maximum of 10 fields defined on authorization object. Basically, we use this authorization object to check if the user is having an authorization to run a particular transaction. We assign authorization objects to a role with a specific A C T. V T type. So, for example, the user is authorized to read only while another could be authorized at it. The authorization check entails multiple phases in the S a P system. When a transaction is started, the system first checks based on the authorization object s T code. Whether the user is authorized execute the transaction. If the user doesn't have this authorization, well, that attracts it. Translation wouldn't run. Besides the check of the transaction authorization, the system runs additional authorization checks within the transaction. If specific actions carried out which authorization objects are addressed with which click on how many checks are made depends on the source code and therefore varies considerably. Every transaction authorization objects, but with one or more fields whose combination map in action in the S. A P system. This usually involve multiple possible activities. For example, create change or display in connection with an object in the system. For example, a table or the authorization role in this context, the activity and the object representive field within the authorization object, the respective activity or the explicit object is entered as field values in the authorization field. The combination of several field values represents an authorization. So, for example, changed the S A p b c sec orthe admin role for reasons of manageability related authorization. Objects grouped in object classes, which are in turn organized by application areas or modules. Users may only execute actions in the S a P system if they have the relevant permission. If they don't have the relevant permission for specific actions, they may not execute them. Users obtained permission to execute inaction by having the required authorisation assigned , and this is done either viol authorization roles were using authorization profiles 54. Understand Authorization Roles: authorization roles in corn Trust Toe authorization profiles on the technically up to date form for assigning authorizations on their based on the technology of authorization profiles, but it considerably easier to manage and maintain and provide many more options. The role concepts seizes the approach of bundling authorizations required for a specific task to what extent the technical role actually maps the respective workplace within your enterprise mainly depends on the enterprises size structure on security or confidentiality requirements ASAP. Modules use would also play a role here. An employee usually have several authorization rolls whose combination describes the workplace you define on. Describe the structure according to which you organize your authorization roles in an authorization concept, for example, according to modules, tasks, business areas. And so now there are two types of authorization. Roles. Single and compass. It rolls in single rolls. You can add authorization objects to assign them to users. By contrast, complicit rolls enable you to combine single roles for easier management. Now authorizations can't be added to complicit roles. The profile generator is the central access point for all tasks with regard to the maintenance of authorization roles. Here you create change and copy single and complicit roles assigned them to users and transfer them to other S A P Systems. The role maintenance transaction code is PFC. G. On it was all actual previously called profile generator or activity groups. The profile generator is the central access point for all tasks with regards to the maintenance of authorization roles. Here you create, change and copy single and complicit roles, assigned them to users and transfer them to other S A P Systems roll maintenance simplifies the creation of authorizations and their assignment to users in role maintenance. Transactions that belong together from the company's point of view are selected. Roll maintenance creates authorizations with the required field values for the authorization objects that are checked in the selected transactions, a role could be assigned to various users. Changes to a role therefore, have an effect on multiple users. Users can be assigned various roles. The use of menu comprises the role menu and contains the entry, such as transactions, you, RL's reports and so on that are assigned to the user through the roles 55. Create a Single Role: Okay, let's look at creating a single roll now. So and to transaction PFC G in the command box and press enter through the menu, we can go Tools Administration, User Maintenance Roll Administration, PFC G Roles. Enter a name for the new authorization role in the role field and click single roll in this screen. Answer a meaningful description and you couldn't use the long tax field at a description. Now go to the menu time I confirmed with Yes, authorization roles provide the option to structure the transaction authorizations contained there in in the form of a role menu to facilitate the users access to transactions so continuing with the role menu maintenance. Create a new folder in the Roman You using the create folder button so it created folder specifying name. Don't click. Continue. The system now creates the folder in the role menu, so we select this folder and click the transaction. Mutton now into the transaction is supposed to be assigned to the role in press enter. This will confirm it. The system determines the text for the transaction selected, and we click a sign transactions in the role menu. You can not only define transactions but also programs or are about reports, queries, transaction variants, you, RL's files and business warehouse reports. Besides the manual menu maintenance, you can also import specific menu parts from the S, A P menu or the S, a P area menu from already existing menus of other authorization roles as well as external files into your role. You console the Roman you've I dragon drop. So as soon as you've added transactions to the menu, the status of the top changes to green For the role to function. You maintain the roles authorization profile in the next step, so go to the authorizations tab. The information about authorization profile is empty for newly created roles. Without that maintained and generated authorization profile, however, you can't assign authorizations using a role. Click proposed profile names toe. Have the system generate a name on a profile text. Then we click change authorization data to edit and generate the profile. The system promise you to save the role, and you can confirm with yes in the next few you aside authorizations, but defining the authorization objects based on the check indicator. The systems already added several authorization objects to the role expand the tree structure to obtain an overview of the authorization object suggested, for example, under cross application authorization objects Transaction code. Check out transaction Start. You can find the transaction added to the menu in the structure navigato, an authorization object and the corresponding authorization fields indicated with missing values. For example, basis administration authorizations. Roll check. Click on the change icon in front of the role name field. To enter a change, failed values on Maintain the desired values in the table. Click on transfer When you're done, the field values are now being transferred. If values that defined for all fields of an object, the status display changes to all maintained repeat Lee steps for all of the other authorization objects. With the missing value status, a new dialog window opens the variables. Missing status means that not all organizational levels of being maintained yet. So click on the organizational levels button to fill the variables. Organizational levels, airfield values that he used in many authorization objects with the same value and can therefore be maintained comprehensively as variables. For example, company code controlling area and so on. Try to avoid maintaining accordingly highlighted fields directly in the authorization object because you then override the role wide value of the variable. Now enter value for the variable and click save. After you have maintained all authorization objects, click save. Then you must generate the authorization to create the authorization profile of the role. Click back to exit the View. The status of the authorizations tabbies green. Now on the status of the authorization profile is generated. Go to the user top and to the user i d. You want to assign to the role in the user assignments area. If required, Enter a validity period in which the authorization is supposed to be assigned to provide the authorization immediately to the newly assigned user Select User comparison button. Click on complete comparison. The single roll maintenance is now complete. Because you usually create roles in the development system, you must now transport them. The authorization profiles that belong to the single roles are transported as well. Click save to save your entries 56. What are Authorization Profiles: user authorizations that not usually assigned directly to use a master records but grouped together in authorization profiles. The system administrator can create authorization profiles automatically using the profile generator. You are not authorized to use transaction. XXX So this is the status message you get when you access a transaction, which your user profile has no authorizations for In real life, this scenario is the same When you get inside a hotel. Not all Rome's are open for you. So am I restricted. Let's take a few minutes to compare the difference between roll. Use a profile on authorization authorization. Objects are assigned inside a role, and the role is assigned to a user profile so a user profile can consist of many roles. On a roll can consist of many authorization objects in a company and employees. User profile depends on his role to the company. So, for example, if you're from the sales department, you can't access transactions from the purchasing department, or if you're a manager, you may have more access than your team members 57. Display Authorization Profiles: So let's learn how to display authorization profiles. Here we enter transaction s u 02 in the command box and press enter. You can go through the menu is always tolls. Administration, user maintenance, authorization and profiles. Manual maintenance s U zero to edit profiles manually and to the name of the authorization profile in the profile field. Leave the field blind to generate a complete list of profiles. Now click on Create Work Area for profiles in the next screen. The system displays the authorization profiles to which your selection criteria apply. Open the profile by double clicking the profile name or clicking. Change profile in the text. In user master field, you could define a single or composite profile hand for composite rolls, the consisting of profiles, aerialists, the single profiles that are included in the composite profile. Double click the profile name of a single profile to navigate to the next few at the level of single profiles. The consisting of authorizations area lists the authorization objects contained in the profile Double click an object to open the field values. You are now in the display of the authorization fields off the authorization object bellow each field, you can view the field values that were defined in the authorization profile. With this approach, you can examine the content of specific authorization profiles. 58. Central user administration: Central User Administration is a feature in S A P that helps streamline multiple users. Account management on different clients in a multi ASAP systems environment. This feature is laudable and similarly user accounts it created on managed on multiple clients. User administration is centrally performed from the central system so that Clyde with See You a other clients that have been controlled by the central system, turns child clients from the foregoing. It could be said that the central system therefore acts like a parent client the benefit of See you a lies in the possibility to restrict user access to specific clients in the multiple s A p system environment. The system makes use of application link enabling, which is called a Ali to exchange master data Acosta clients. Ellie is a technology that allows distributed in a synchronous business processing. The implication here is the elimination of possible areas that may occur as a result of master data exchange across clients and possibly systems conclusively depending on your configuration. In transaction, S C u N. You could manage users luck rolls, profiles on log on data, amongst other things 59. What is Background Processing: In previous tutorials, we've seen how to set Operation Mode, which reaches speeds the work processes for dialogues on background tasks so that background tasks are able to utilize more hardware resource. In this step, we're going to go through the process of scheduling different types of jobs on defining the trigger events and more. Now you may be wondering what exactly is a background task? Well, a background task stands for a sequence of S A P programs which executed step by step automatically in the background. They can be scheduled to run automatically a pre defined days or with the pre defined frequency. S A P Background processing allows the automation of routine tasks on the optimization of the use of S A p computing resources background processing, sometimes also called background jobs or batch jobs are scheduled background programs that usually run on a regular basis without any user operations. They used the process high volumes of data that would usually take up a lot of memory. Resource is like running material requirements, planning MRP, the daily database backup all the month end closing. Obviously, background jobs could bring lots of benefits to the company like we can run background jobs after work or at the weekend. We haven't got to lock a user when the job is started in the s a p r p A. System were free to switch between dialog mode on background mode in many transactions. For example, you can use transaction codes M D 01 or Andy Beattie to execute material requirements. Planning Andy 01 His dialogue mode on em DBT is background mode. 60. Key Job Elements-Job Steps, Job Class and Job User ID: the work unit of the background processing system is the background job on each background job consists of one or more jobs steps. The step could be an Arbor program on external command or on external program. We can schedule every our bar program as a step of a job. If the Arbor program has one or more selection screens, you must create the input form of a variant. Variant makes it possible to run in our bar program in the background the values stored in the variant and then used during the execution. Off the program. External commands a pre defined commands for end users they are operating system independent on are protected by authorizations so that normal end users can schedule only those commands that the system administrator permits them to with an external command on ordinary end user. Any user without background processing administrator authorization may run a host System commander program that's being pre defined by the administrator in the S. A. P system. The user who schedules the external command must have the authorization required for the external command. Since the external commanders defined in the S a P system, the administrator is gonna limit the scope of the commands toe s A P users External programs are unrestricted commands that are neither pre defined, all restricted by authorizations. A user with administrator authorization can enter any one of these in a job step with nice turtle program. A system administrator can enter any desired host operating system commander program in a job Step no s. A P authorizations test is carried out before executing the command. The job class defines the priority of a background job. Class A started before Class B Plus B before Class C See is the system default job. Plus, if you have mission critical jobs whose immediate execution must always being should you can set up Class A Is your critical jobs category reserve awoke process for Class A jobs and a sign Class A. Only to these mission critical jobs. Have a look at the example below. Classes B and C provide secondary to level job prioritization. Class B jobs Get free background work processes before Class C jobs. This secondary prioritization operates separately from the class a critical track since plus B and C jobs can never block a class. A job like dialog mode, background processing requires proper authorization in dialogue processing programs that usually executed with the user i d. That is currently logged on to the system for background processing. A job is normally started with the user created the batch job. In most circumstances, you can create Siris of users to schedule batch jobs like Batch one. Now the typical botch job ideas here are batch BC for system admin jobs much F I for financial accounting on batch PP for running MRP. 61. Start Criteria and Status for a Job: we can trigger a job by a specific time or event. If triggered by time, you can schedule a job on a particular date at a particular time or even immediately. If we triggered by event, you can define a current of a particular event on. I'll show you the details in demo so a job can have. The following status is scheduled, which means the steps that make up the job have already been defined. But the start condition has not yet been defined released, so the job here has been completely defined, including its star condition. The job cannot be released without a start condition, and only an administrator or a user with the relevant authorizations for background processing can release a job. This ensures that unauthorized users cannot execute jobs without approval ready. The start condition of a release job has been fulfilled. A job scheduler has placed the job in the wake you for a free background work process. Active means the job is currently being executed and can't be deleted or changed. Finished means all steps of the job was successfully completed. On cancelled means the jobs being counseled by an administrative by using the transaction code, s M 37 or alternatively, a job step has been terminated with ERA. If the execution of the jobs already begun, you can monitor the processing in the job log if the job contains are about programs that create ALPA lists these air stored in school lists. 62. Schedule a Job in Your System: before we define a job, which use a program P p A, R, C H P one and creative variant. For the program, we used transaction code, etc. 38. To change the program on the Arbab editor initial screen, we can put the program name in the text box and then executed. We can see the program is used to set deletion flag on deletion indicated to the production orders. Then we import the values and click on Save is variant. On this screen, we can take the variant name and description. Select only for background processing Check box click on Save on the Variant test has been created. All right, let's learn how to create a new job. So enter transaction sm 36 in the command box and press the enter all select the menu option tools. See CMS Background Processing S M 36 Defined job going through a name in the job name. Define the start priority of the job with job class on type of specific server. So let's step on. Click on the Arbat program button in the dialog box to schedule in our program. It's Job consists of one or several steps that need to be defined individually on these steps are executed in succession. In user, you can optionally define a user I D, under which the job is supposed to be executed. The user of the job step provides the authorizations with which the job is executed. Irrespective of this entry, The Job Overview list a job with the user idea of the Creator. You can only use user ID's of the user type dialogue system or service for background processing in the program area. Enter the name of the program under name. If there are varying to the program, you can also enter a variant click on Jack to check the consistency of your entries. Actually com print specifications. If the program generates a spore output request into the name of the printer in output device, click on properties to define the required sport control options in the spore. Request attributes screen. When you're finished, choose continue. Also confirmed a selection of the print in the previous screen background print parameters with continue save your entries in the initial dialog box using save, the overview of the pre defined steps is displayed, and here you can have more steps and change or delete pre defined steps. If necessary, Select back to return to the initial screen off the job definition. Click on start condition. If you schedule a regular job selected eight in time button Entra date in date and time in time for scheduled start. Or if you want to start the execution of the program immediately, select immediate for no start after and to the last possible date and time for the program . Start the date and time of the scheduled Scott refers to the database server and not to the local time. Activate the periodic job check box and click on the Period Values button in the dialog box . Select the required button so, for example, daily and click on check if the system doesn't output in error. Message. Select save. Verify your entries in the start time screen using check and then confirm with Save this, Will that navigate you back to the defined background screen in the defined background job screen Again, click on Save the Status Bar now displays a message that confirms the creation off the background job 63. Monitor a Job: Okay, let's learn out of monitor background jobs now, so let's end to transition sm 37 in the command box on Press the enter key. Also like the menu option tools. See CMS background processing sn 37. Job overview and administration in job name. Enter the name of the background job or used the star wildcard of UAL jobs onto the user i d of the creator of the job in user name Or use the star Wild Counter. View the jobs of all users We input s a P brief on the job status. Activate the check box for released, Ready, active, finished on cancelled. Restrict the evaluation period by defining a start dating from on an end dating to for the job. Start condition on, then click Execute. You can navigate to other job specific views from the job. Overview. The smallest contains the output lists for our but programs if they exist. The job details contained, amongst other information, the job definition duration of processing on the start time. All messages output by background program are stored in the job lug, and you could display this log to obtain information about a program that terminated with errors or to perform a detailed investigation about a background processing run in the job . Overview. Check the jobless for counseled or erroneous jobs. Look for jobs that have counseled in the status column. Monitor critical jobs in particular, for example, for material requirements planning. Double click on a row to call the basic data off the background jump. We can never get to job specific views from the job. Overview. The small list contains the output list for our BART programs. If they exist, use back to return to the job. Overview. Check the room times of the job duration Seconds column If the runtime deviates from the normal run time, this can indicate a problem and it should be analyzed to evaluate the room time. You have to monitor it over a long period of time and compare it to previous runs off the job. 64. Printing Principals in SAP Environment: in this section, I'll walk you through the output management basics from processing output, data flow, creating printers and small servers on managing spore requests. I'll show you everything you need to build your first printing workflow, So let's dive into up and running With output management. There are various document classes in the S. A P system such as report lists, s A P script. Oh, ASAP. Smart forms documents, although the way in which documents I created may be completely different. The output on paper is always performed using the same mechanism in two steps. First, a small request is created. The small request contains device. Independent print data on includes administrative information such as author date, number of copies on the actual print data only when the Spool request is to be out put on a particular device. It's an output request created the device. Independent print data from the spore request is converted to the printer language that the selected output device understands. This procedure allows the user to display a school request before output. There can also be several output requests for one school request. This can then avoid the user having to recreate a small request. If, for example, the toner in the printer is exhausted or the wrong paper was in the tray, the user can, of course, create a small request andan output request at the same time. Immediate print. By choosing the print out immediately. Option. The actual document content of a small request is stored in 10 C for temporary sequential objects, for which you define the storage location with the profile parameter R S P O store location . Creating an output request prompts the S A P sports system To spend a printer dependent, completely formatted data string to a printer through an operating system spolar or OS pool . This means that the address printed model must be known to the S A p system definitions of this time I described as device types. If the prince it cannot be controlled the operating system level, it can't be used from the S A P system either. There are several ways in which a sport work process can reach an operating system. Spolar, the most important of these connections, is described as access methods. These access methods are local printing, remote printing and front end printing. 65. How Local Printing Works: so the method for local printing that well in local printing, the spore work process and operating systems full run on the same host. It's irrelevant whether the printer is directly connected to this host or is reached over a network and possibly another prince ever. The small work process passes on its data locally that is, on the same host on UNIX systems. The brute data with access method L is output using operating system methods, for example, with the commands You one or You W The specifics intact is stored in profile parameters. Under Microsoft Windows, the data with access method see is passed directly to the operating system. Print a P I Local printing is the fastest and most reliable connection from the S A P system to the operating system. A. Soon as the sport work processes transferred its data, it could deal with new Alpo requests. Even if the operating system spool is still occupied, you can configure multiple school work process for a S, a P instance. Regardless of the access method, this effects the output sequence. Different sport requests for the same printer may be printed in a different order to that in which they were created. If you require output in sequence, you can specify this. For individual printers. However, a setting of this type reduces the ability to process print out in parallel. 66. How Remote Printing Works: with remote printing, the small work process and operating systems ball a run on different hosts in exactly the same ways with local printing. It's a relevant from the S a P systems point of view whether the printer is directly connected to the remote host or is reached using another network connection. Typical scenarios for remote printing are as follows. Network printers provide their own operating systems, ballers and I directly connected to a computer network. Princes of this type of directly addressed from the S A P system using their names access method you access Method year is also used. If the remote host is a UNIX system, it could be used for the various types of UNIX versions. S A P provides the S A. P s print program for all hosts running on Microsoft Windows operating systems as a PS print is a window service capable of multi threading. Each output request is processing a separate isolated threat. The output requests, that s a P s print received from the S. A P system can thus be transferred to a particular printer individually. If the printer isn't working, This doesn't disturb the printing of other output requests on other printers. Access method s is usually used here ASAP. Protocol but access method you. The UNIX Berkeley Protocol is also supported for performance reasons. You should only use remote printing in a land environment, not a one on ensure that the operating system schoolers are available. 67. How Front-end Printing Works: from 10. Print in using control technology with access method G controls the d L L's that run in the process context of the S A P gooey. The new print control receives the print data and transfers it to the printing system for the operating system, in contrast to previous from 10 printing with access method F from 10 printing with control , technology and access method G offers the advantage that front end printing using S A PG for Java could be set up irrespective of the platform printing. Using the Windows Terminal server is also made easier with from 10 printing using control technology. The processing of front end printing is also performed as with the other output methods using a spool work process. These can therefore be conflicts with regular and front and print requests. The profile parameter are this slash WP no. S p o from Max allows you to define the maximum number of school work processes for front end printing. For each S. A P. Instance. Front and printing is suitable output on local printers. However, it's not for production. All mouth printing from 10 printing requires a connection to the front end PC However, this method cannot be used for background processing. If you're using the S A P gary for HTML on, want to print on your front end. This is also possible through access Method G. The print data is sent to the browser and displayed using this print method, and you can then print a document on your front end. S A P recommends you configure at least one school work process on each application server that users log onto. If no work processes running on the application server that a user wants to use for front end printing the system, select one of the available small service with the least load. To process the print request, you can define a small server specifically for from 10 printing by setting the profile parameter R S P o local print server to the required seven name. 68. Set up Front-end Printers: So this is how to set up front end printers. Now it's possible that not all printed of your enterprise and network compatible but apparently connected via USB toe a PC. You can also print with these devices from the S A P system on set up a front end printer for this purpose. Our example. It seems the operating systems used on desktops. So let's learn how to set up front imprint of step by step For this. The transaction Cody's S P. A. D in the command, field and press enter through the tools menu that these tools CCM s small sparred School administration many path. Select the display option for the output devices in the Devices Service tab. The system displays the printers that are currently available in the system to change the settings of an existing server or create a new printer. Click on change. Create a new printer by clicking the create button under a name for the printer. For example, Loc L. In the head of data under the Output Device field. In this example, enter a short name yourself by entering Loc El Onda Short name. Select the S Wayne or S a pay win entry from a drop down list of the device type field from the device. Attributes Tab. Select an appropriate device class, for example. Standard printer, if required. Define a general description of the device in the message failed. Go to the access method tub in the Host Full Access Method Field Select F or G. The Access Method F works with the transfer program S A P I. P D, which is installed with S A P. Geary on PC's. Alternatively, you can I use Access Method G, which doesn't use S A P I. P D. And to the default value in the host printer field. By entering default, the system addresses the output device, which is defined as the default printer in the Windows operating system. With the desktop computer. Leave the default settings in the output attributes and train for traps unchanged. Now choose save and click back to return to the list of output devices. The new Princess Loc L is included in the print list. Now, if we're going to test it, select the Output Device print screen list option in the menu bar and specify the newly created print LoC L. As the output device. If you set access method, half the system determines the default printer of the PC. When printing and enters it in the windows printer field, click on Continue. If you've used access method G, the dialog window appears again after you click. Continue, select the required printer and click OK. You've now set up the Windows Standard printer in the S A. P system. You can use this procedure particularly if you don't use on the network printer but a USB printer, for example. In print dialog windows, you can now select the printer's device. LoC help. 69. Set up Remote Printers: before you can print from the S I P system, you must first divine the output device that is the physical printer. This applies the network printers as well as the local devices connected to your PC. To ensure that the print coupling between the system and the operating system works, you need to first set up the network prince with the operating system level. So let's go through the following steps before setting up a printer. So you set up the printer of the operating system level right down the network name of the printer, for example. Half I and three or accounting account to not the printed type like Okay, I see 5400 right down the printed type. The type is a combination of the manufacturer name and the printer model. So, for example, HP Okay, I see 54 double zero. Now let's configure the network Prentice step by step so into Transaction SP a day in the command field. In precedent as before, the tools see CMS Spool sponsors Bull administration Menu Path works so that display option for the output devices in the Devices Service tab. The system displays the printers that are currently available in the system. To change the settings of an existing server or creating new printer, click on change. Create a new principal clicking the create button. The system displays the Spolar administration. Create output device view. Make the following settings. Enter the name of the printer with which the print is supposed to be managing the S A P system in the output device field in the head of data if you need to enter a short name. But if you don't make any entries here, the system will generate one for you. Select the prints of model from the device type drop down list in the device. Attributes tab. To find a small server, select an appropriate device class. Specify further information on the model and location of the printer as required. The model in location fields are essential for the administration of output devices on facilitate the assignment of S A P princes to physical devices, so don't forget to update the location field. If you move the printer, I go to the access method tab. Select a host full access method. The access method defines how the s a peaceful system forwards the print data to the operating system school system. The access method depends on the operating system on which the sports never runs. So, for example, UNIX onto which operating system the printer is connected. So, for example, Windows for desktop printers ask the administrator who's responsible for the network printers. If you're unsure about the access method in the host print of field, enter the network name of the printer as it was defined in the operating system level in the destination hosts field and to the PC operating system Print server. To wish the prince connected, get the output attributes to have up. Hey, you can optionally maintain other settings for the printer. For example, whether a cover page is gonna be printed. Open the tray of Oh, tap and maintain the page formats of the paper trays if required. And after you've made all the entries, select save, Click back to return to the list of output devices and you'll see the new printers now displayed in the print A list. So the network printer has been set up and can now be used 70. What's Logical spool server: The printing concept introduced up to now envisages a fixed assignment of an output device to a small server. A small server, on the other hand, can be assigned multiple output devices, which raises the risk of this server becoming overloaded. It would therefore be desirable toe have a mechanism for load balancing across multiple servers. It's also advisable to set up groups of small servers to ensure reliability. Both suspects are considered in this introduction to Logical Spool service include logical sports overs from the outset when planning your printer landscape and that one scaling your S A P system later. For example, additional instances with school work processes. A logical sponsors make it easier to adapt the printer landscape. A sports over is an S, a P application server with at least one school work process. Every output request is processed on a real sport server of this type, an output device created in the S. A P system could be a cider spool servant directly. However, there are many advantages associated with an additional logical layer between the output device. On the small server, you can use logical or spool serious for this purpose. These dumb for a hierarchy of other logical service and or riel small servers. You can classify output devices and small service, for example, for test printing or production. Printing. The S A P system checks the classifications when saving on display is a warning message. If there are deviations, for example, the system warns you if you attempt to assign a high volume printer to a production prince of 71. Set up the Spool Servers: If users use the print buttons, notify the system that they want output a list or a screen view on a printer. TSA pay system initially creates a spool request. To turn this small request into an output requests that could be forwarded to the printer. You need a small work process. Schoolwork process, in turn, is provided by sports server ASAP. Applications over itself is usually the first ball server off your S a P system. Beyond that, you can define additional, really logical school service an additional real sports serve. It could be another physical s a P system. For example, your quality assurance system was ashamed of formatting a spool requests in case of bottlenecks as the alternative server. A logical sports over, however, is not a separate physical device, but only a mapping of a real server. You use logical service, for example, to optimize the management of an output devices by assigning a logical sports over to your printers. For example, if you transport your output devices, you must then only switch the logical output service to the new real outputs over. Instead of adjusting the output server of oil output devices, we'll describe a comment scenario in which two real sports there is a map biological spool server. Each load balancing is set up between a logical small servers, which passport requests to the alternative server if the first server is overloaded. So let's learn step by step and the transaction S p a D in the command field and press, enter or go down the menu path tools. See CMS Print S P A D school administration Select the display option for the small service in the Devices Service tab. The system displays his full service that it currently defined in the system to change the settings of an existing server or created news false. Ever click on change, creating new riel school server by clicking the create button and to the name of the server on the description and then select Save the entry in the service class field mainly serves informational purposes on should primarily ensure higher clarity. You can leave the entries unclassified if you don't want to use the servant classes. Now click back to return to the list of sport servers and re select create to now create a new logical server and to a servant name and description and activate the logical service check box and to a real sports over in the mapping failed and click save. To save your entries, click back to return to the list of school service. Repeat the previous step to create a second logical small server. As a result, you know, have to really sport servers onto logical small servers, which each map a real surfer to define. Load balancing position that curse on the first logical server and then kick can choose button to open the detail View now activate the allow load balancing checkbooks on Enter the name of the logical server under alternative server Save your entries If all spore work process off. Illogical server allergy one or the rails False. Over. E CCL Ellie, I double zero should be fully utilized. The system will now pass the small requests to the logical spool server. Log to that is the real server. E CCL Ellie eyes double zero 72. Introduction to Transport Print Landscape: s a P recommends a free system landscape. This consists of a development system death, a quality assurance system QS on a production system PR Day death system is where the consultants do the customization as per the company's requirements. So it's for continuous S a p configuration, customization, maintenance on updates and bug fixes. This system is the very start for business related configuration and customization that will push to QS. Q s is used to carry out configuration and custom code testing on a large scale configuration and customization will be transporting from Dev to Qs on. They're gonna be tested thoroughly to ensure all business processes are working just fine. Pay ideas for production environment. All the business transaction data will run in the production system. It's the system where the end users perform daily operations after go live. The concept of logical servers supports you when defining a consistent transportable print landscape. Unlike real small servers, logical servers can have the same name in various escape systems. In this way, you can define a consistent s a p print architecture in the development system on then transported to other systems after the transport, all we need to do is adjust the mapping of the logical servers to the small servers of the new system. There are functions for the manual transport of output devices and small servers in transaction code S p A D. 73. Transporting Output Devices: if you operate more than one ASAP system in your enterprise on If printing on physical princes is supposed to be possible from very assistance, you don't have to redefine the output devices in each system. For this purpose, you can use the option of transporting already completed printers, so I'm to transaction S p a d in the command field and present that money half again is tools. See CMS Spool Spat School Administration. Select the display option for the output devices in the Devices service tab. Now position your cursor on a printer and choose transport to transport an individual device. If you want to transfer the entire list of output devices, select, add it. Transport. Transport all a dialog window opens which informs unit process the printers later on in the target system. I confirmed this with continue in the next dialog window used the input, helped to select a workbench transport request or create a new request and again click on continue. The Prince is selected, were recorded in the transport requests pacified and can now be imported into other S I P systems. Sports servers can be transported similarly 74. Outputting Data in the System: the S. A P system distinguishes two types of requests. Spore requests and output requests. Whenever you flicked the print icon, the system initially creates a small request. This includes the document to be printed. The date of this document is stored in the 10 C database. The school requested the 10 C data then used as the basis to create an output request, which now also includes attributes such as the Target printer on the number of copies. It's very easy to output data in the S A. P Systems. Let's quickly learn we actually complete the print button in any view. A list take production or the info system is an example, so let's print it. The Prince Green List dialog appears when you're prompted to specify a printer, depending on the sport control. Fixed values defined in your user master recorder print is already displayed in the output device field. Call the details for the small request by selecting the properties button 75. How to Manage Spool and Output Requests: to maintain small helper requests, call the output controller using contract election code S P 01 If you only want to check the status of your own small requests, you can use translation code as P zero to S P 01 provides many selection criteria for selecting particular school or output requests. The further selection criteria function is simple to use on allows each user to define their own selection criteria. The displayed list shows all smaller output requests that match your selection criteria. The list is created using the S A P list Viewer LV. This allows you to change the appearance of the list as you desire, and it means you can show and hide columns, sort them or create variants. The following indicators specified the status of a sport quest so minus not yet sent to the operating system. So no output request exists If you see plus sport Quest is still being created and stored in the school system waiting. The output request has not been processed yet by the school system. Prock, a small work processes formatting the output request to printing print. The output request is printing by the operating system. Spolar if the Queria, the host bowler, is not activated, this status has shown for around a minute complexes that CEO MPL the Alva request has been printed. If the query the host smaller isn't activated, that's J status Changes to Compal assumes the output request is transferred to the hosts Fuller at five. This means there are at least two out for requests with various status is problem. This indicated error not of a serious nature, such as an incomplete character set. This request was still printed era. Now it's indicates a serious errors, such as a network Hera Time. A particular time was specified for the output of the request by the request Creator. If you double click the status of a small request, the system displays the associative output requests to view the output requests of multiple small requests. Select these and shoes output requests or five for every unsuccessful output request. A log is written that you can use for air analysis 76. Understand Maintain Spool Database: the system administrator is responsible for regular deleting old spore requests on monitoring the consistency of the sport. Database to delete Holds four requests Schedule the Our Bar programme RSP O Double zero for one with an appropriate variant as a periodic job for more information will introduce it to you in the next lecture to check the consistency of the school database schedule. The Arbor programme RSP 010 for three with an appropriate variant is a daily job. You can also start school administration tools in the dialogue in transaction code S p A. D in the abdomen tab page. However, the functions provided in transaction coming S p a D for deleting small requests on running consistency checks are limited compared to the other programs available. 77. Output Management Last Job-Deleting Old Spool Request: depending on how your sport system's been configured, multiples may consume memory in your database or file system. In both cases, this memory could be used more reasonably for other purposes or could result in memory problems in extreme cases. Full requests The story of the operating system level of the Spool Server under U. S. R. S A. P s i. D. Six global clients. School. The file name includes the number of the S A P spool request on As in the picture small requests a store in day drive us are s a P Ellie I safe Global 800 school Report R S P 00041 exists for deleting old spore requests, which could also be scheduled as a standard job. S a p reorg small on this should be run on a daily basis. The job the Littles four requests completed whose minimum retention period, which is usually eight days, has been exceeded. If Alper request still exist for an expired small request which have not been completed, for example, due to error messages, the small request is not removed. US therefore regularly used the transaction code SP 01 to check whether obsolete or undulated small requests exist on remedy possible errors in the system 78. Start System Maintenance From Fundamentals: okay, In this chapter, we're going to talk about how to maintain S a p systems with support packages and patches. Now, one of the most basic things you'll do is a system admin. In a basis team is system maintenance with S a p e r p. You've got a lot more control to help you do the maintenance tasks. And in this lesson, I'll show you how to download software updates from the S a p support portal on execute kernel update on Maintain the Arbab components as they be software is largely maintained using support packages. A support package is a set of corrections for errors in our bar programs. These corrections air usually already available. As I say, p notes a safety no changes individual objects. They can contain general information, hints and tips or recommendations from S A P. They can also describe a problem and the solution to errors in standard functions of the S . A. P software. This type of escaping node contains a solution to an individual problem, which is often the solution to a programming error in the form of corrected lines of source code. A support package is a collection of objects. It bundles the corrections that have been provided over a certain period in a consolidated package. In most cases, support packages contain error corrections only, while functional enhancements are less common support packages and provided for specific products releases in components they provide corrections both of the system basis on for the functional application modules. Because the individual components of an essay pay system interact with one another, the support package versions of the various components must be compatible. For example, if you import a support package for an application component that requires a specific basis support package, serious errors may occur if both packages are not implemented. Support packages enabled the early detection of resolution of problems in your system. S O P recommends customers import all support packages as soon as they are released to avoid the occurrence of serious problems to resolve such conflicts. S A P recommends you import support packages using support Package stocks Support package. Staggs Heir recommended combinations of support packages of different software components. Support package stocks contain compatible kernel and support package versions for all components. In a system. You should use the support package stacks available rather than importing support packages in isolation. ASAP, Colonel comprises a range of components, including the start SAP on stop SAP files for starting and stopping the S A P server colonel we used when problems occur in the communication between the S A P system on the operating system. 79. Introduce the Tool of Downloading Support Packages: support packages and support package stacks can be downloaded from the S, a P support portal. Arbab supports packages for all S A P systems as A s a P net weaver 7.0 could be downloaded with the maintenance optimizer in the S a p solution manager. While the support packages you require could also be selected in the support panel directly , you need solution manager to confirm the downloads. The maintenance optimizer greatly simplifies the selection of support packages that helps avoid errors as a P. Therefore strongly recommend that you use solution manager, colonel updates and updates for the F p A, M or S AI NT version could be downloaded without S a P solution Manager transaction code S P A. M Support Package Manager on S. AI NT the Adul installation tool. They used import updates and add ons. Both transactions are updated using a separate spam or ST update. The Spam ST version is important because certain above support package it's require a minimum version. If the minimum spam ST version required is not in your system, serious errors may occur when you import support packages. The SPAN ST version is the last piece of information you need to start downloading support packages from the S, a P support portal 80. Determine the System's Current Support Package Level: Before you download support packages, you need to determine which components are contained in your system, on which UPDATES have already been imported so we can check the system Status. Information about support package levels is included in the status display, so let's go through it. Step by step. Choose the menu option system status on dysfunctions accessible from all transactions and menus. In this demo, our system status component version is S a p E C C 6.0, the Unicode system is yes. You can also get additional information about Colonel Operating system is Windows and T Machine type is Intel 8068? It means 32 bit or 64 bit version on the data. Most system is Oracle. Then she's component information. We're going to see a table of our system version in the support package level in the demo system. The software component is that KP basis. The release is 700 the level is 0005 We can also choose the print button to print it out. The support package version has a standard naming principle. It has s a P K plus component plus trip release plus level in the high support package. Our demo system is S a PKB 70005 Which means the component is s a P basis. Support packages five on release. His 7.0 choose continue to return to the previous screen. Now we'll check the kernel version, so choose the other Colonel Info button and you'll see the Colonel releases 700 on the patch level is 52. So take a note of this information and click on. Continue. And you've now got everything you need to download up up on the colonel patches. 81. Find Support Packages in SAP Support Portal: Now let's learn how to find support packages in the SNP support portal, so I support Dodd s a p dot com In your Internet browser, inflict on software downloads, Click on the support packages and patches Lings and you'll now have various options for selecting support packages, social support packages and patches. So enter a search text browse download category searched by product vision applications by indexes in alphabetical search. My company's application components the products and components your company has registered with S a P In this demo, we're gonna find support package for S a PHP one for S a P Net weaver 7.0, select Brown's download category Search byproduct version selected Product group s A P Net waiver and complementary products. Select the relevant subgroup s a P. Net. Weaver. Select your component version, which he check. The system status s a PHP one for ASAP Network of 7.0, click of entry by component on now a tree structure weapons and select the component Application Server. Arbab now go through the list of your products components in detail on select with support packages to download, start with the component P I basis 7.1 Click on this component. Now click on support packages. The list of download objects is displayed in the bottom of the screen. Scroll down through this list and select one or more support packages with a higher support package level than the current level in your system. So, for example, P. I basically support package. There are four for 7.1. If you haven't imported any support packages for a long time, several new levels may have been made available since your last import. So, for example, your system may currently have patch level free on patch. Level six is now available if you want what they'll system to the latest level. So in this case, Level six and skip several patch levels four and five. You must download all files available, so levels 45 and six need to be downloaded on click on add to download musket. Another browser window opens confirming that the files but added to your download box, and you can now choose clothes. Continue with the other arm bar components. So s a P A. B. A. 7.1 s a P basis 7.1 s a p B W 7.1 Go through the individual components, adding the support packages to your download basket one after another, as described in steps P I basis seven point. So what, then select the entry s a p I. G s 7.0, a tree structure expands in which you can select your service operating system. So, for example, Windows Server on a 32 32 bit ASAP, Internet graphics service or the S A P I. G. S ensures that graphical content can be displayed in the S A. P system select the latest version. So, for example, patch level 20 on added to your download basket. Continue with the download of the S A. P. Colonel. Make sure to select the appropriate version few operating systems of 32 or 64 bit on base your selection or whether you're ASAP systems Unicode or a non Unicode system. For our example. Here, we're going to select A s a P colonel 7.1 32 bit Unicode. So, like the correct operating system. So, for example, Windows Server on a 32 32 bit click on the database independent link ASAP, colonel consists of a large database independent, part Colonel, Part one. On the smaller database dependent part, which is Carol Part two. You must always download both parts and install them together. Scroll back up through the list and select the database dependent part of the colonel by clicking on the link for your database system. E g max db. Next scroll through the list again on our Colonel Part two for basis 7.1 with the latest version. For example, patch level 69 to your download basket On the downloads top. You must select the same patch level you selected for Colonel Part one. You selected all of the ASAP support packages and level punches you need on. You can search for the latest Spam ST version. To do this, select the download menu options support packages and patches. Browse download category search byproduct version additional components S a P span ST Update Select some spam saying version. So, for example, updates 71 click on support packages now select the latest version. So, for example, spam saying top date version 701 slash double zero Fight six. On addict. Your download basket. You're down the list is now complete on all files are in the download basket, so you can now start downloading the software packages. 82. How to Download Support Package: After adding all support packages to your download basket, you could begin the download access the S a P support portal, click on software downloads and then click on my download basket, the download basket tablets, all the files you can download in our example. The list only shows the freely available criminal components switch to the approval list tab. It shows the files for which it download needs to be approved with the S a P solution manager. This is indicated by the request AP approval. Entry in the status color assumes that downloads been approved. The Arbab support packages the require approval are also displayed on the download basket tab. Now click the get download manager button to start the download manager and click on download all objects. The download manager downloads the files from the S, a P support portal, and when it's finished, the files are available locally on your PC, and you can then start import the support package 83. Explore Update Process Itself-Kernel Update: Now we come to the process of the update itself. As explained earlier, you should always start with the kernel update. The operating files of the S A P system are updated in a kernel update Colonel update normally used to eliminate bugs and other errors in the kernel. In other words, they use when problems occur. In the communication between the S A P system on the operating system, the colonel depends on the operation system. On on the database of the S A P server, the same kernel version must be installed on all service in a system the central instance and other application service. Now, OK, Loveday comprises the following steps. Firstly, you save the old Colonel, then copy the new kernel to the S, A P server and unpack it. Then stop the F A B system and services. Now replace the Colonel files, restart the S A. P A system and check the logs. You generally know that an update has been a success. If you can start the system and log on with the S A. P gooey 84. SPAM and SAINT Update: about components and maintained using the following to, say, P tools. Firstly, the support package manager it's all for importing support packages. Is the support package manager you can call it by using the transaction S P A. M or spam? The adult installation tool on the transaction code is S ai nt or ST Most standard software components often s a P system are installed during the initial installation process. Additional software components can be imported afterwards if required. Please refer to it add ons. Examples of add ons, maybe plug ins or industry specific components or industry solutions that are not part of the standard installation these adults were imported with the help of the add on installation Tool on its transaction is ST. These tools are enhanced on an ongoing basis and not data delivered with the SPAN ST Update Before you imported Arbab Support package or announce on into your system, you should always import the latest Spam ST update First to avoid errors and problems. Some support packages even require a certain minimum spam ST version before they can be imported, and you should therefore always download the latest. I'm saying to update from the S. O. P portal together with the support packages 85. Apply the SPAM and SAINT Update: So let's learn how to install the update. So long Guns, the S A P system in client 000 on. Enter the transaction spam in the command field and press the enter key. Also like the menu option tools ASAP. Workbench Utilities Maintenance Spam Support Package Manager. Select the menu Options Support package Local packages from front end now Navigator where the file is stored on your local PC. Open it, Andi. Compress it toe. Blow the update file. Select the menu Options Support package Import span ST Update. Read the essay Pino display to determine possible prerequisites or known problems associated with importing the update on, then imported. Now the update is imported. When this is complete, your prompted to restart transaction span after restarting transactions found the update is now complete. Once you've imported the span ST Update, you can proceed to import about support packages or install add ons. 86. Add-On Installation Tool: you've already downloaded the support package files from the S A P support. Portland's have told them locally on your PC, You now need to make these files available to the S a P server. In other words, you must load the support packages on. There are two ways to do this. You can load them from the front end or from the application server. Loading the support packages from the front end that is from your local PC is very simple. If you use the support package manager because you're not required to manually copy the files to the server and unpack them there, however, you should only use this option of the archive is smaller than 10 mag. Log on to the S a P system inclined 000 and again cooler transaction spam. Select the Menu Options Support Package Lo Packages from Applications Server. It's very similar to apply in the spam, saying top date so loading from the application server isn't explained. Here, Adams enhance the functional scope of Standard s A P Systems on examples of Adam's include industry solutions and plug ins. You can download add ons from the SNP support powerful in just the same way. Support packages Adams that have been downloaded could be installed with the add on installation tool, and the transaction is ST. This tool is similar to the Support package Manager. The transaction span, which is used to maintain the Spam ST Update. 87. What is Remote Function Call: all right. In this chapter, I'm going to introduce you to the various ways you can connect across your sister landscape . Here's an overview. The first is to explain the concept of remote function. Call. You can also get to know different types of remote function calls on. I'll also show you how to set up a remote function. Call in real life RFC or remote function. Call is an s a p interface protocol based on CPI. I see it's the programming of communication processes between systems. RFC is enabled you to call and execute pre defined functions in the same system or a remote system such as R three to R three, or are three to external system. Typical destinations of the function call is a server system client or so. So there are five different kinds of RFC. There is the synchronous R F seal SRF C for direct communication between different systems . On between s a p net waiver Yes, on A s A p gooey there is the asynchronous RFC or a RFC. This is for direct communication between different systems on for parallel processing of selected tasks. Transactional RFC Your T RFC is for General Asynchronous Communication Transactional RFC ensures transaction like processing off processing steps that were originally autonomous que de rfc or Q rfc So cute. RFC is an extension of tea rfc. It also ensures that individual steps are processed in sequence. Um, finally background RFC or BG rfc BG RFC is the successor to T rfc on Cure FC. 88. Set Up RFC Connections: So I'm gonna set up in RFC connection. This transaction in the command field is s and 59 on you press the enter key through the man you you can go Tools, administration, administration that work as I'm 59 rfc destinations on the configuration of RFC connection screen select the Arbab Connections folder under RFC Connections. Now we're going to see the existing RFC connections. Double click on the destination we want to display on set of the new connection choose create and her name on the RFC destination. Select a connection type. And in this demo, we're gonna type free for a new of our connection and to text in the description fields on press enter, we're gonna enter the name or i p address of the S a P server That's to be called in the target host Field the system number in the technical settings tab. Now switch to the log on and security top. Enter a log on language in the language field in the client field onto the client. You want to use the RFC Logan function in the user field onto the use idea. The function is to be executed in the target system onto the password of the user in the target system. Now press the enter key. Choose. Continue to confirm we're going to see the RFC destination I. D s 800 few here. You can see that your entries have been copied into the log on Field Group. She was saved to save the RFC connection. All right, now we're gonna test the connection, so we'll click the connection test bottom assistant now attempts to reach the remote so over in the network using the pain command on diff This test is successful. A connection could be set up a TCP I pay level. Okay. Cheese back on the IRA. See? Destination ideas. 800 screen. Can't remote log on to verify that. The log on data after Logan, we can see that the start ASAP. Easy access screen on. You'll now in the target system. So the RSC connection has now being set up. Actually, the view on the new collection will display in list