11-03-2015 10:03 AM
Hi,
My requirement is to identify any indirect usage to SAP. One of the ways is to call any RFC FM in the SAP system from an external system.
How can this be identified?
There are transactions such as ST03N and a program provided by SAP STRFCTRACE to monitor RFC connections, but I am unable to interpret them as well.
Please help.
Regards,
Anirudh
11-03-2015 10:12 AM
Hi Anirudh
Could you please expand a bit more on your requirement.
What is it that you're wanting to achieve with this?
Regards
Arden
11-03-2015 10:17 AM
Hi Arden,
I want to identify Indirect Access to SAP system and hence check if my system is in compliance with the SAP Licenses.
So, i want to know which external system made a call to any RFC in SAP system.
11-03-2015 10:12 AM
Hi,
Go to transaction SM59 and check that how many system are connected to your SAP system.
You can also filter out the Function Modules which can be getting called from other system
1) SE16 - TABLE NAME TFDIR
2) SELECT FMODE AS 'R'
It will give you list of FM's in your SAP systems which can be called from other systems.
Thanks.
Regards,
Ashish Desai
11-03-2015 10:20 AM
Hi Ashish,
I don't think this would be the correct approach. SM59 would have RFC destinations which would be used by SAP system to connect to the other systems, not the other way round. When an external system makes a call to my SAP system it would use a destination created at there end.
And identifying RFC's in the system would not be of much help, as there would be a lot of RFC FM's, but which are used in the SAP system only, like BAPI's.
Regards,
Anirudh
11-03-2015 10:24 AM
Hi Anirudh
I don't think you can apply just 1 approach to this requirement.
In addition to the options supplied from Ashish, you should also analyse the users on your system.
Start by identifying System users as opposed to Dialog users.
No one and I mean no one should be accessing your system without a valid login. Start from there and work backwards to determine what they're using the access for. If it's not as required then deactivate the login.
Once you're done with that I'd very all Dialog users are indeed valid Dialog users...not System users who've been set-up incorrectly.
Regards
Arden
11-03-2015 11:30 AM
Hi,
Arden is correct.
There is no single approach or tcode which can give you details.
One other method is
You can identify the external user ( Remote User ) who is accessing your system and view the log using transaction code STAD. You can take help from your basis team.
Thanks.
Regards,
Ashish Desai