Professional Documents
Culture Documents
&RQWHQWV
7KH56\VWHP
System: __________
Date: ____/____/____
Admin: _____________________
Release 4.6A/B
7–2
Chapter 7: Scheduled Quarterly Tasks
Database
'DWDEDVH
2SHUDWLQJ6\VWHP
2WKHU
1RWHV
In chapters 4-8, we have included a list of transactions like the ones below. This list contains
basic information about the transactions in the checklist. For additional information on these
transactions, see the chapter referenced in each checklist.
(GLW6\VWHP3URILOH3DUDPHWHUV7UDQVDFWLRQ5=
:KDW
There are security parameters for the user’s password (for example, the minimum password
length, the time interval that the user must change their password, and so on).
The following is a list of the most important password parameters:
< Minimum password length: login/min_password_lng
A longer password is more difficult to break or guess.
The standard for many companies is five (5) characters.
< Password expiration time: login/password_expiration_time
This is the length of time before the user must change their password.
The length of time that auditors recommend is thirty (30) days.
The maximum that should be used is ninety (90) days.
< Password lockout: login/fails_to_user_lock
This parameter locks out users after attempting to log in with an invalid password for a
defined number of times.
The standard is to lock a user after three (3) failed attempts.
Release 4.6A/B
7–4
Chapter 7: Scheduled Quarterly Tasks
Notes
:K\
Properly assigned parameters will make it more difficult to break into the system.
6HOHFW%DFNJURXQG-REV7UDQVDFWLRQ60
:KDW
Background jobs are batch jobs scheduled to run at specific times during the day.
:K\
If you are running critical jobs, you need to know if the job failed because there may be
other processes, activities, or tasks that are dependent on these jobs.
8VHU0DLQWHQDQFH7UDQVDFWLRQ68
:KDW
The lock/unlock function is part of the logon check, which allows or prevents the user from
logging onto the R/3 System. For terminated users, the user’s ID should be locked and the
user assigned to the user group “term.”
:K\
< Locking a user
If an employee leaves the company, is assigned to a different group, or is on leave, their
R/3 access should be removed. With the lock function, the user’s ID and security profile
remain on the system but the user cannot log on. This function is ideal for temporary
personnel or consultants where, unless the access is required, the user ID remains
locked.
< Unlocking a user
If users incorrectly log on more that the allowed number of times, they are automatically
locked out of the system. (An incorrect logon is usually the result of a forgotten
password.) The administrator must unlock the user ID and more than likely reset the
user’s password.
Release 4.6A/B
7–6