Temporary Emergency Rights for End Users With XAMS

  • Implementation of a revision-compliant emergency user concept
  • Execution of highly critical activities (maintenance and support) in accordance with compliance requirements
  • Provision of detailed test reports
  • Time and resource savings for administrators through automated allocation of emergency rights (self-service)
  • Emergency rights are always used with your own user ID and thus offer transparency in emergency activities
Your Contact
AMERICAS

Alessandro Banzer
SAP Authorization
[email protected]

Your Contact
EMEA

Marc Spitzer
SAP Authorizations
[email protected]

SAP Emergency User Concept in Detail

Extensive system access that goes beyond the standard authorizations is generally considered as a critical security vulnerability in SAP systems. Nevertheless, this access is necessary to support specialist departments effectively. An emergency user concept enables the controlled and transparent implementation of emergency users and their documentation. It defines the entire process of granting extended authorizations (EAM: Extended Access Management) via emergency users, and meets all requirements for internal and external revision.

With the Xiting Authorizations Management Suite (XAMS), you can easily assign emergency rights to end users via a “backpack.” Therefore, the end user receives the necessary critical authorizations for a limited period and still works with his or her own user (context).

This enables transparent traceability if your users have to provide risky system support. Our consultants implement and configure our XAMS solution, which helps you efficiently and verifiably provide extended rights for emergency actions.

Are you interested in this service?

Contact us for a non-binding offer!

More Services offered by Xiting

Get to know our SAP authorization services with the Xiting Authorizations Management Suite.

SAP Security Monitoring and ICS

Document your SAP security concept and compare it with the current settings in your systems.

RFC Interface Cleanup

Identify and optimize existing authorization checks and correct implementation errors in your own developments.