• Authentication vs authorization
• Users, roles, profiles, authorizations – relationship and flow
• SAP security architecture basics
• Important T-codes for security work (high-level overview)
• Understanding client, system, and mandant concepts
• Create, change, lock/unlock, delete users
• Password policies and login security settings
• User groups, user parameters, address and defaults
• Mass user maintenance concepts
• Authorization values – activities and restrictions
• How authorization checks work in SAP
• SU24 basics – proposal and maintenance concept
• Profiles and authorization generation basics
• Role structure – menu, authorizations, user assignment
• Building menus – transactions, reports, web links
• Role naming standards and documentation
• Transport basics for roles (landscape movement overview)
• Derivation roles concept (organizational levels)
• Organizational level fields and best practices
• Master roles vs derived roles
• Common role design patterns for business teams
• Validity dates, temporary access, emergency access overview
• Access provisioning workflow suggestions
• Periodic role review and user access review checklist
• Using SU53 for error analysis
• Using STAUTHTRACE basics (when and how)
• Fixing issues via role updates, SU24 adjustments, missing objects
• Best-practice troubleshooting flow
• Typical SoD conflict examples in SAP processes
• Risk mitigation methods (role redesign, controls, approvals)
• Audit-ready access management practices
• Role approval and change management controls
• Access review documentation and evidence
• Logs and monitoring basics relevant to security teams
• Secure administration checklist