{"id":1341,"date":"2020-07-28T13:08:59","date_gmt":"2020-07-28T11:08:59","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1341"},"modified":"2020-07-28T13:15:56","modified_gmt":"2020-07-28T11:15:56","slug":"how-to-master-increasing-complexity-sap-s4hana-security","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/","title":{"rendered":"How to master the increasing complexity of SAP S\/4HANA security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1342 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen-300x198.jpg\" alt=\"SAST Blog: How to master the increasing complexity of SAP S\/4HANA Security\" width=\"300\" height=\"198\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen-300x198.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The SAP S\/4HANA software suite represents a cutting-edge cornerstone for the digitalization of enterprises and is increasingly being used by both SMEs and large corporations. However, the implementation of and migration to SAP S\/4HANA also entail increasing complexity in system administration and management. Our specialized software tools enable you to master this project successfully.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>SAP S\/4HANA often involves changes to the system landscape. The software structure of the new system can be embedded, central hub, or even hybrid. This, in turn, affects the design of your authorization and role concepts.<\/p>\n<h2>Different system architectures in SAP S\/4HANA systems.<\/h2>\n<p>The embedded system architecture requires the least administration and management effort for granting authorizations, but does not always meet the respective IT requirements.<\/p>\n<p>In a central hub system architecture, more effort will be needed due to the separate authorization assignment in the front-end and back-end systems, as well as due to the increased complexity for tracking the activities performed. Even if switching to a multi-tier central hub approach seems more involved at first, it could still be the more sensible solution for your needs. In our blog post <a href=\"https:\/\/sast-blog.akquinet.com\/2020\/06\/08\/adapting-authorization-management-in-central-hub-sap-s4hana-system-strategy-administration-tool\/\" target=\"_blank\" rel=\"noopener noreferrer\">Adapting authorization management in a central hub SAP S\/4HANA system<\/a>, for example, you can find out how you can proficiently adapt your roles and authorizations and monitor them efficiently, saving time.<\/p>\n<p>Each system architecture has its advantages and disadvantages and requires individual customization. The security of the SAP S\/4HANA system has to be guaranteed for both variants, however.<\/p>\n<h2>Different levels and media for accessing the SAP S\/4HANA system.<\/h2>\n<p>Moreover, different levels and media are available for accessing an SAP S\/4HANA system, independently of the structure of the system landscape. In addition to classic SAP GUI calls from a PC or notebook, it is also possible to access SAP applications from mobile devices, using SAP Fiori Launchpad, independently of time and location. Authorization for direct access to the powerful SAP HANA database can also be granted. The permissions of all these access types are still based on role and user authorizations, but are more complex for system administrators to manage and monitor due to their sophistication.<\/p>\n<h2><strong>Tool-based software solutions to master the complexity of SAP S\/4HANA.<\/strong><\/h2>\n<p>The SAST SUITE for S\/4HANA contains a specially developed rule set that enables you to identify and clear up SAP S\/4HANA-specific critical single authorizations and separation-of-duty risks. Our experience shows that <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> support can cut the effort required to set up and administer a secure SAP S\/4HANA system by up to 80 percent.<\/p>\n<p>We will be happy to help you master the challenges of your SAP S\/4HANA implementation and\/or migration, while keeping an eye on the protection of your systems at all times. We work together with you to find out which procedure best fits your needs and advise you in every phase of your project.<\/p>\n<p>For more information, please visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">just get in touch<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1344\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/07\/ali-riza-catak-foto.1024x1024_-300x300.jpg\" alt=\"Ali-Riza Catak (SAST SOLUTIONS)\" width=\"221\" height=\"221\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/ali-riza-catak-foto.1024x1024_-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/ali-riza-catak-foto.1024x1024_-150x150.jpg 150w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/ali-riza-catak-foto.1024x1024_-768x768.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/ali-riza-catak-foto.1024x1024_-800x800.jpg 800w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/ali-riza-catak-foto.1024x1024_.jpg 1024w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/> \u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1038\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/03\/Alina-Demuth_SAST-SOLUTIONS-300x300.jpg\" alt=\"Alina-Demuth (SAST-SOLUTIONS)\" width=\"220\" height=\"220\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/03\/Alina-Demuth_SAST-SOLUTIONS-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/03\/Alina-Demuth_SAST-SOLUTIONS-150x150.jpg 150w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/03\/Alina-Demuth_SAST-SOLUTIONS-768x768.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/03\/Alina-Demuth_SAST-SOLUTIONS-800x800.jpg 800w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/03\/Alina-Demuth_SAST-SOLUTIONS.jpg 1024w\" sizes=\"auto, (max-width: 220px) 100vw, 220px\" \/><br \/>\n<strong>Ali-Riza Catak + Alina Demuth (SAP S\/4HANA Consultants, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Further articles on the topic:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/05\/12\/framework-and-application-authorization-concepts-for-sap-erp-and-s4hana\/\">Speed uo development of framework and application authorization concepts for SAP ERP and S\/4HANA<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/01\/07\/sap-s-4hana-how-to-ensure-a-secure-s-4hana-migration\/\">SAP S\/4HANA: How to ensure a secure S\/4HANA Migration<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The SAP S\/4HANA software suite represents a cutting-edge cornerstone for the digitalization of enterprises and is increasingly being used by both SMEs and large corporations. However, the implementation of and migration to SAP S\/4HANA also entail increasing complexity in system administration and management. Our specialized software tools enable you to master this project successfully.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[67,64,153,163,68],"class_list":["post-1341","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-identity-management","tag-role-management","tag-s-4hana","tag-s4hana-migration","tag-sap-authorizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to master the increasing complexity of SAP S\/4HANA Security<\/title>\n<meta name=\"description\" content=\"The migration to SAP S\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to master the increasing complexity of SAP S\/4HANA security\" \/>\n<meta property=\"og:description\" content=\"The migration to SAP S\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-28T11:08:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-28T11:15:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to master the increasing complexity of SAP S\/4HANA security\" \/>\n<meta name=\"twitter:description\" content=\"The migration to SAP S\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"How to master the increasing complexity of SAP S\\\/4HANA security\",\"datePublished\":\"2020-07-28T11:08:59+00:00\",\"dateModified\":\"2020-07-28T11:15:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/\"},\"wordCount\":549,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Rollen_Berechtigungen-300x198.jpg\",\"keywords\":[\"Identity Management\",\"Role Management\",\"S\\\/4HANA\",\"S\\\/4HANA Migration\",\"SAP Authorizations\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/\",\"name\":\"How to master the increasing complexity of SAP S\\\/4HANA Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Rollen_Berechtigungen-300x198.jpg\",\"datePublished\":\"2020-07-28T11:08:59+00:00\",\"dateModified\":\"2020-07-28T11:15:56+00:00\",\"description\":\"The migration to SAP S\\\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Rollen_Berechtigungen-300x198.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Rollen_Berechtigungen-300x198.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/07\\\/28\\\/how-to-master-increasing-complexity-sap-s4hana-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to master the increasing complexity of SAP S\\\/4HANA security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to master the increasing complexity of SAP S\/4HANA Security","description":"The migration to SAP S\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/","og_locale":"en_US","og_type":"article","og_title":"How to master the increasing complexity of SAP S\/4HANA security","og_description":"The migration to SAP S\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/","og_site_name":"SAST BLOG","article_published_time":"2020-07-28T11:08:59+00:00","article_modified_time":"2020-07-28T11:15:56+00:00","og_image":[{"width":640,"height":422,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"How to master the increasing complexity of SAP S\/4HANA security","twitter_description":"The migration to SAP S\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"How to master the increasing complexity of SAP S\/4HANA security","datePublished":"2020-07-28T11:08:59+00:00","dateModified":"2020-07-28T11:15:56+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/"},"wordCount":549,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen-300x198.jpg","keywords":["Identity Management","Role Management","S\/4HANA","S\/4HANA Migration","SAP Authorizations"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/","name":"How to master the increasing complexity of SAP S\/4HANA Security","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen-300x198.jpg","datePublished":"2020-07-28T11:08:59+00:00","dateModified":"2020-07-28T11:15:56+00:00","description":"The migration to SAP S\/4HANA increases the complexity of system administration and management. Our specialized software tools help to face this challenge.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen-300x198.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/07\/Rollen_Berechtigungen-300x198.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/07\/28\/how-to-master-increasing-complexity-sap-s4hana-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"How to master the increasing complexity of SAP S\/4HANA security"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1341"}],"version-history":[{"count":13,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1341\/revisions"}],"predecessor-version":[{"id":1360,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1341\/revisions\/1360"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}