With the installation of a SAP® system, some standard users are created in the individual clients or system environments. Some of these users have already high authorizations from the beginning, and of course most of them have standard passwords assigned that are generally known.
These special users need special treatment and special protection.
The user SAP* exists right after the installation in all clients. He has the composite profile SAP_ALL assigned and with that all relevant authorizations for the system set up.
SAP® has implemented a backdoor [coding] for this user.
If someone deletes the user SAP*, a login is possible with the standard password PASS including the corresponding SAP_ALL authorizations.
To prevent a login of the SAP* after a deletion, the parameter login/no_automatic_user_sapstar can be utilized.
With a parameter setting to 0 the login is possible.
Any value higher than 0, prevents a login after the deletion.
The standard password for this user directly after the installation is 06071992.
The standard password after deletion is PASS.
The preferable method to protect this user is the deactivation of SAP* :
– Remove all authorizations from this user.
– Lock the user account.
– Set the parameter login/no_automatic_user_sapstar
– Activate the audit log for this user.
You can also consider to assign this user to a user administration group that is protected by a dual control principle.
This report RSDELSAP deletes the user SAP*in the client 066. The corresponding source code is not active but available.
The user DDIC is established in the client 000 and 001 with the installation
[and copies of these].
This standard user is uitilized to cover installation and release updates including changes to the data dictionary. The use of the transport management system is restricted to Display only.
This is the protection against direct developments.
As the technical steps related to this process are initiated in the client 000, the DDIC only needs to be a dialog user in this client.
In all other clients he can be set to the user type “system”.
The standard password for this user directly after the installation is 19920706.
The report RDDPWCHK allows to check the password that is assigned to the user DDIC. In case the password matches, the dialog window will be closed. For mismatches the message False is displayed.
The counter for false login does not count these password detection attempts.
The user TMSADM is automatically created at the set up the change and transport management system in the client 000.
His user type is “Communication”, and he is utilized for transports by the CTS.
He has the profile S_A.TMSADM assigned that authorizes the use of RFC with display of the development environment e.g. as well as writing to the file system.
The standard password for this user directly after the installation is PASSWORD.
The user SAPCPIC is created as a “communication” user at the installation and is utilized especially for EDI. The standard profile S_A.CPIC restricts the access to the use of RFC.
This user is coded into the function module INIT_START_OF_EXTERNAL_PROGRAM together with his standard password. This needs to be considered in case of password changes for this user.
The standard password for this user directly after the installation is ADMIN.
The user EARLYWATCH is created in the client 066 at the installtion. He can be utilized for remote control by SAP® and is only set up with some standard authorizations S_TOOLS_EX_A for performance monitoring. The user is to be locked in general, and can be unlocked upon request.
For the evaluation of the passwords you may use the report RSUSR003.
6. SAP* in J2EE
The user is established with full authorizations for the administration.
With regard to security, the user has no standard password assigned.
To utilize this user as emergency user the properties in the UME need to be maintained.
Setting the ume.superadmin.activated property to true will activate the use of this user for emergency cases.
Setting a password in ume.superadmin.password will then activate the user finally after the restart of the engine.
While the user SAP* is in use, all other users will be inactivated during this time.
When the system is fixed, the deactivation can be achieved by setting the ume.superadmin.activated property to false.
This user is the Java standard user with full administration authorization in this environment. The password is to be assigned during the set up.
High complexity is recommended for this password.
This user is a Java standard user who can be utilized for anonymous access.
The user is locked per default. The password is assigned during the installation.
This user is a standard communication user for LDAP [Lightweight Directory Access Protocol] data sources.
This standard user is utilized for the communication between Java and ADS
[Adobe Document Service].
This standard user is utilized in the context of the Composite Application Framework (CAF) core transport system and communication with other Java services.