0% found this document useful (0 votes)
150 views

SAP Security

The document discusses SAP authorizations and security. Authorizations are permissions that control access at the application level by checking authorization fields and objects. Profiles provide authorizations and determine access based on authorization objects and fields. Roles combine menus, authorizations, profiles and personalization to describe work areas and assign activities to users.

Uploaded by

Surya Nanda
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
150 views

SAP Security

The document discusses SAP authorizations and security. Authorizations are permissions that control access at the application level by checking authorization fields and objects. Profiles provide authorizations and determine access based on authorization objects and fields. Roles combine menus, authorizations, profiles and personalization to describe work areas and assign activities to users.

Uploaded by

Surya Nanda
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

SAP Security,Authorizations

An authorization is a permission to perform a certain action in the SAP System. Authorizations are used to control access at the application level.. SAP Authorization concept is basically used for SAP Security. Security: Security means protecting your data and your business. SAP Authorization Architecture

Structure of Authorization is as follows: Field: Smallest unit against which a chec should be run. !t is a least granular element"data element to secure the data"information. Authorizations: Authorizations are used to control access at the application level. Authorization #b$ect: %roups & to &' authorization fields together. (hese fields are then chec ed simultaneously. Authorization #b$ect )lass: *ogical grouping of authorization ob$ects. Profile: Profiles is to provide Authorization based on provided Authorizations and Authorization #b$ects. +e used to create profiles up to ,.-) version in S.'/ (ransaction )ode, after ,.-) version these profiles will create automatically while modifying"creating roles or generation roles.

0ole: !ts is a combination of 1enu2s, Authorizations, Profiles and personalization. A role is a group of activities performed within business scenarios. #r Activities assigned to the user. #r a role is a set of functions describing a specific wor area. 0oles consist of 1enu, Authorizations, #rganizational values.

You might also like