{"id":798,"date":"2019-03-11T12:54:46","date_gmt":"2019-03-11T11:54:46","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=798"},"modified":"2020-10-28T13:25:46","modified_gmt":"2020-10-28T12:25:46","slug":"cut-down-critical-sap-authorizations-without-interrupting-operations","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/","title":{"rendered":"Cut down on critical SAP authorizations without interrupting operations"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-411 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg\" alt=\"SAP Authorizations, SAP Security &amp; Compliance\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/motiv_es_sast-sgm_72dpi_1612.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Companies that operate SAP systems are subject to an annual audit by an auditor. Often, SAP authorizations are also examined. The audits check for separation of duties (SoD) and critical authorizations, in particular where SAP Basis Administration is concerned. Read this blog to learn how you can quickly reduce critical SAP authorizations (auditor findings).<\/p>\n<p><!--more--><\/p>\n<p>Authorization objects and transactions in the context of SAP Basis are used in particular by business functions, and not infrequently. Some examples of these objects include:<\/p>\n<ul>\n<li>S_RFC (Remote Function Call)<\/li>\n<li>S_DATASET (access to files in application server directories)<\/li>\n<li>S_ADMI_FCD (various functions in SAP Basis Administration)<\/li>\n<li>S_SPO_ACT (actions related to the spool)<\/li>\n<li>S_TABU_DIS \/ S_TABU_NAM (access to tables)<\/li>\n<li>S_USER_GRP (maintenance of user masters)<\/li>\n<li>S_USER_AGR (maintenance of authorization roles)<\/li>\n<li>S_DEVELOP (ABAP development)<\/li>\n<\/ul>\n<p>Of course, there are many more objects that could be added to this list. Critical transactions in the context of SAP Basis are also often handled too permissively. Examples include SE16 (Table Display), SM30 (Table Maintenance), SQ01 (Query Management), SPRO (System Customizing) and SCC4 (Client Settings), among others.<\/p>\n<p><strong>High Risks are Associated with Authorizations that are Assigned Too Freely<\/strong><\/p>\n<p>Again and again, ignorance of the criticality is the reason that authorization objects are defined comprehensively and critical transactions too often assigned. As a result, those responsible face increased IT risk that can have far-reaching consequences. The loss of entire system clients is a real threat if the way in which critical transactions are used is unknown \u2013 clients can be deleted in SCC5 \u2013 not to mention that availability and confidentiality can no longer be guaranteed<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-799\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/03\/Reduction-of-critical-permissions.jpg\" alt=\"SAP Auhthorizations: Reduction of critical permissions\" width=\"700\" height=\"456\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Reduction-of-critical-permissions.jpg 1009w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Reduction-of-critical-permissions-300x195.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/03\/Reduction-of-critical-permissions-768x500.jpg 768w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p><strong>Quickly Reduce Critical SAP Authorizations (Auditor Findings)<\/strong><\/p>\n<p>Our <a href=\"https:\/\/www.sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">GRC SAST SUITE<\/a> allows some 95 percent of critical authorizations to be cleaned up. In addition, you can use it to easily analyze how critical object values are actually used across all users. The advantage of this is, in particular, that daily business is not affected at all.<\/p>\n<p>Assigning authorizations based on our evaluations is easy and the people responsible are able to decide which users truly need them. Typically, users only rarely need this kind of critical authorizations, which is why removing them from the majority of users is possible without interrupting their work. Another objective is to separate authorizations according to the minimum principle. Not only will this help keep administrative expenses down, but it will enable you to meet today&#8217;s and tomorrow&#8217;s legal requirements.<\/p>\n<p><strong>Smooth Migration of SAP Authorizations<\/strong><\/p>\n<p>When you use <a href=\"https:\/\/www.sast-solutions.de\/en\/grc-consulting\/sap-safe-go-live-management\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Go Live Management<\/a> to go live, you are adding extra protections in the unlikely event of errors. One of the biggest challenges faced when migrating or redesigning SAP authorizations is ensuring the continuity of normal business operations. With our SAST Safe Go-Live Management approach, these problems are now a thing of the past.<\/p>\n<p>Are you facing a similar challenge? Would you like to find out more about comprehensive protection of your SAP systems? Check out our <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\">SAST SOLUTIONS website<\/a> or send us an e-mail to <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a>.<\/p>\n<p>We will be happy to advise you!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-412\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/referent_steffenmaltig_akquinet-e1517509266646-300x225.jpg\" alt=\"Steffen Maltig, SAST SOLUTIONS\" width=\"300\" height=\"225\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/referent_steffenmaltig_akquinet-e1517509266646-300x225.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/referent_steffenmaltig_akquinet-e1517509266646.jpg 649w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Steffen Maltig, Head of SAST Authorization Management for SAST SOLUTIONS<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>This might also be of interest to you<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2018\/05\/14\/handling-authorizations-during-an-sap-release-upgrade\/\">Handling Authorizations During an SAP Release Upgrade<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2018\/02\/08\/this-is-how-to-ensure-a-smooth-migration-of-your-sap-authorizations-while-simultaneously-reducing-your-security-risks\/\">This is how to ensure a smooth migration of your SAP authorizations while simultaneously reducing your security risks<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies that operate SAP systems are subject to an annual audit by an auditor. Often, SAP authorizations are also examined. The audits check for separation of duties (SoD) and critical authorizations, in particular where SAP Basis Administration is concerned. Read this blog to learn how you can quickly reduce critical SAP authorizations (auditor findings).<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[67,58,68,114],"class_list":["post-798","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-identity-management","tag-real-time-monitoring","tag-sap-authorizations","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cut down on critical SAP authorizations without interrupting operations<\/title>\n<meta name=\"description\" content=\"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cut Down on Critical SAP Authorizations Without Interrupting Operations\" \/>\n<meta property=\"og:description\" content=\"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T11:54:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-28T12:25:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_331648835_akqw_jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cut Down on Critical SAP Authorizations Without Interrupting Operations\" \/>\n<meta name=\"twitter:description\" content=\"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_331648835_akqw_jpg.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Cut down on critical SAP authorizations without interrupting operations\",\"datePublished\":\"2019-03-11T11:54:46+00:00\",\"dateModified\":\"2020-10-28T12:25:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/\"},\"wordCount\":566,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg\",\"keywords\":[\"Identity Management\",\"Real-time monitoring\",\"SAP Authorizations\",\"Threat Detection\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/\",\"name\":\"Cut down on critical SAP authorizations without interrupting operations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg\",\"datePublished\":\"2019-03-11T11:54:46+00:00\",\"dateModified\":\"2020-10-28T12:25:46+00:00\",\"description\":\"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/03\\\/11\\\/cut-down-critical-sap-authorizations-without-interrupting-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cut down on critical SAP authorizations without interrupting operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cut down on critical SAP authorizations without interrupting operations","description":"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/","og_locale":"en_US","og_type":"article","og_title":"Cut Down on Critical SAP Authorizations Without Interrupting Operations","og_description":"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/","og_site_name":"SAST BLOG","article_published_time":"2019-03-11T11:54:46+00:00","article_modified_time":"2020-10-28T12:25:46+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_331648835_akqw_jpg.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Cut Down on Critical SAP Authorizations Without Interrupting Operations","twitter_description":"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_331648835_akqw_jpg.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Cut down on critical SAP authorizations without interrupting operations","datePublished":"2019-03-11T11:54:46+00:00","dateModified":"2020-10-28T12:25:46+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/"},"wordCount":566,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg","keywords":["Identity Management","Real-time monitoring","SAP Authorizations","Threat Detection"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/","name":"Cut down on critical SAP authorizations without interrupting operations","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg","datePublished":"2019-03-11T11:54:46+00:00","dateModified":"2020-10-28T12:25:46+00:00","description":"Reduce critical SAP authorizations (auditor findings) in no time at all, without limiting day-to-day business and in real time - with SAST.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/motiv_es_sast-sgm_72dpi_1612-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/03\/11\/cut-down-critical-sap-authorizations-without-interrupting-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Cut down on critical SAP authorizations without interrupting operations"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=798"}],"version-history":[{"count":4,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/798\/revisions"}],"predecessor-version":[{"id":1470,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/798\/revisions\/1470"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}