{"id":1250,"date":"2020-06-08T08:34:07","date_gmt":"2020-06-08T06:34:07","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1250"},"modified":"2020-07-28T13:11:00","modified_gmt":"2020-07-28T11:11:00","slug":"adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/","title":{"rendered":"Adapting authorization management in a central hub SAP S\/4HANA system \u2013 save valuable time with the right strategy and the right administration tool"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1251 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701-300x200.png\" alt=\"SAST Blog: Adapting authorization management in a central hub SAP S\/4HANA system \" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701-300x200.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701-768x512.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>When setting up an SAP S\/4HANA system landscape, you have the option of establishing a front-end system as the central, superordinate system that accesses different back-end systems. To do this, you have to consider and logically design many factors in advance. In addition to the technical prerequisites, the role and authorization concepts have to be revised. But how can you adapt authorization management in an SAP S\/4HANA system with little effort?<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Development of role strategies in the authorization concept <\/strong><\/h2>\n<p>The management of users and authorizations in a distributed, multi-tier system landscape is often associated with increased expenses, as well as further challenges like transparency and traceability of actions performed.<\/p>\n<p>The concept for the respective system architecture must include a role strategy that will require the least possible effort from user and authorization administrators. An <strong>embedded system architecture<\/strong> does not represent a substantial change to authorization assignment from the administrator perspective. Both front-end and back-end authorizations can be maintained on the same system. The administration effort needed is hardly greater than in an ERP system.<\/p>\n<p>A <strong>central hub system landscape<\/strong> is an entirely different story, though. Authorizations are usually assigned in the front-end and back-end systems. This is necessary because the front-end system is usually a separate SAP system, which is linked with the back-end system through RFC connections. As a result, at least two authorization roles in two systems have to be assigned for the same user. The manual effort required to assign and document the roles is doubled, due to the architecture of the system landscape.<\/p>\n<p>Consideration of these aspects is crucial for a successful SAP S\/4HANA system design. In addition to examining the new technical features of SAP S\/4HANA, you also need to think about the changed authorization and role concepts, as well as the new request procedures.<\/p>\n<h2><strong>How can you control and manage roles and authorizations in the central hub SAP S\/4HANA system?<\/strong><\/h2>\n<p>The new, more complex management of roles and authorizations often poses a major challenge to companies, especially since the provided tools are not very user-friendly. If user identities have also to be maintained in multiple systems, things get particularly time-consuming.<\/p>\n<p>The lack of options for maintaining users and authorizations transparently across systems can easily result in confusion and unresolved SoD conflicts \u2013 and ultimately in difficult clean-ups.<\/p>\n<h2><strong>Optimized authorization management in a central hub SAP S\/4HANA system with SAST User Access Management <\/strong><\/h2>\n<p>Our practical tool <a href=\"https:\/\/sast-solutions.de\/sap-identity-and-user-access-management.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST User Access Management<\/a> lets you monitor and manage roles and authorizations of your SAP users efficiently, reliably, and above all conveniently. Its support for cross-system assignment and documentation of authorizations helps you increase security even in SAP S\/4HANA central hub system landscapes with a minimum of effort.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1252\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/SAST-Blog_UAM-auf-S4H_Grafik.jpg\" alt=\"SAST Blog: Adapting authorization management in a central hub SAP S\/4HANA system \" width=\"682\" height=\"425\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/SAST-Blog_UAM-auf-S4H_Grafik.jpg 682w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/SAST-Blog_UAM-auf-S4H_Grafik-300x187.jpg 300w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/p>\n<p>The persons responsible in your organizational areas can freely define and configure the required approval steps for every SAP workflow.<\/p>\n<p>You will benefit from increased transparency, individually customizable authorization management, and seamless traceability of all changes, as well as the automated SoD analysis. What&#8217;s more, compliance with legal documentation requirements is ensured.<\/p>\n<p>Are you interested in saving time with automated authorization requests? Find out more on our <a href=\"https:\/\/sast-solutions.de\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a>. We&#8217;ll be happy to answer all your questions regarding authorization management in a central hub SAP S\/4HANA system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1008\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/02\/Paul-Michaelis-300x214.jpg\" alt=\"Paul Michaelis (SAST SOLUTIONS by akquinet AG)\" width=\"300\" height=\"214\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/02\/Paul-Michaelis-300x214.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/02\/Paul-Michaelis-1024x732.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/02\/Paul-Michaelis-768x549.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/02\/Paul-Michaelis-1536x1097.jpg 1536w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/02\/Paul-Michaelis-2048x1463.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Paul Michaelis (Consultant SAP S\/4HANA Authorizations, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Further article about S\/4HANA authorizations:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/02\/06\/sap-s-4hana-authorizations-choice-brownfield-or-greenfield\/\">SAP S\/4HANA authorizations \u2013 it\u2019s your choice: brownfield or greenfield<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/03\/28\/authorizations-for-batch-processing-in-netweaver-and-s-4hana-environments\/\">Authorizations for batch processing in NetWeaver and S\/4HANA environments<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When setting up an SAP S\/4HANA system landscape, you have the option of establishing a front-end system as the central, superordinate system that accesses different back-end systems. To do this, you have to consider and logically design many factors in advance. In addition to the technical prerequisites, the role and authorization concepts have to be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[67,64,153,68,80],"class_list":["post-1250","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-identity-management","tag-role-management","tag-s-4hana","tag-sap-authorizations","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adapting authorization management in a central hub S\/4HANA system<\/title>\n<meta name=\"description\" content=\"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\/4HANA system with little effort.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adapting authorization management in a central hub S\/4HANA system\" \/>\n<meta property=\"og:description\" content=\"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\/4HANA system with little effort.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-08T06:34:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-28T11:11:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adapting authorization management in a central hub S\/4HANA system\" \/>\n<meta name=\"twitter:description\" content=\"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\/4HANA system with little effort.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Adapting authorization management in a central hub SAP S\\\/4HANA system \u2013 save valuable time with the right strategy and the right administration tool\",\"datePublished\":\"2020-06-08T06:34:07+00:00\",\"dateModified\":\"2020-07-28T11:11:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/\"},\"wordCount\":609,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Motiv_SAST-UAM_150dpi_1701-300x200.png\",\"keywords\":[\"Identity Management\",\"Role Management\",\"S\\\/4HANA\",\"SAP Authorizations\",\"SAP Security\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/\",\"name\":\"Adapting authorization management in a central hub S\\\/4HANA system\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Motiv_SAST-UAM_150dpi_1701-300x200.png\",\"datePublished\":\"2020-06-08T06:34:07+00:00\",\"dateModified\":\"2020-07-28T11:11:00+00:00\",\"description\":\"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\\\/4HANA system with little effort.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Motiv_SAST-UAM_150dpi_1701-300x200.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Motiv_SAST-UAM_150dpi_1701-300x200.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/06\\\/08\\\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adapting authorization management in a central hub SAP S\\\/4HANA system \u2013 save valuable time with the right strategy and the right administration tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adapting authorization management in a central hub S\/4HANA system","description":"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\/4HANA system with little effort.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/","og_locale":"en_US","og_type":"article","og_title":"Adapting authorization management in a central hub S\/4HANA system","og_description":"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\/4HANA system with little effort.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/","og_site_name":"SAST BLOG","article_published_time":"2020-06-08T06:34:07+00:00","article_modified_time":"2020-07-28T11:11:00+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Adapting authorization management in a central hub S\/4HANA system","twitter_description":"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\/4HANA system with little effort.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Adapting authorization management in a central hub SAP S\/4HANA system \u2013 save valuable time with the right strategy and the right administration tool","datePublished":"2020-06-08T06:34:07+00:00","dateModified":"2020-07-28T11:11:00+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/"},"wordCount":609,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701-300x200.png","keywords":["Identity Management","Role Management","S\/4HANA","SAP Authorizations","SAP Security"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/","name":"Adapting authorization management in a central hub S\/4HANA system","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701-300x200.png","datePublished":"2020-06-08T06:34:07+00:00","dateModified":"2020-07-28T11:11:00+00:00","description":"Our tool allows you to adapt and revise your role and authorization concepts in a central hub SAP S\/4HANA system with little effort.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701-300x200.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/06\/Motiv_SAST-UAM_150dpi_1701-300x200.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Adapting authorization management in a central hub SAP S\/4HANA system \u2013 save valuable time with the right strategy and the right administration tool"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1250"}],"version-history":[{"count":7,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1250\/revisions"}],"predecessor-version":[{"id":1355,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1250\/revisions\/1355"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}