sapdev logo background
sapdev logo sapdev logo
Comments

SAP OTHER PROGRAMMING SCRTY documentation, setup help and example usage



Return to SAP documentation index


ARTICLE

Further Security Risks
  • Insufficient authorization checks

  • User-specific program flow

  • Cross-client database access

  • Disguising ABAP source code
    Documentation extract taken from SAP system, � Copyright SAP AG. All rights reserved




  • OS_TRANSACTION_TERMS
    OUTPUT_FIELD_GLOSRY




    comments powered by Disqus