Rsecadmin - Auth Issue Log
Rsecadmin - Auth Issue Log
http://wiki.scn.sap.com/wiki/display/BI/The+authorization+Log+in+...
Welcome, Guest
Login
Register
Purpose
To describe how to read and analyze authorization issues with the Authorization Log in RSECADMIN.
Overview
The OLAP-authorization-check must not be confused with the basis-authorization-check traced in transaction ST01 or SU53. Analysis Authorizations are NOT based on the SAP Standard
Authorization concept. They use their own concept based on the BW reporting and analysis features. Hence the OLAP authorization-check cannot be traced via ST01 or SU53, you need to trace and
display the OLAP-authorization-log in transaction RSECADMIN.
Fast creation
Call transaction RSUDO, set the "With Log" indicator next to the user field and choose "Start Transaction". (Leave the transaction selector on "RSRT".) Execute the query in transaction RSRT. Then,
choose "Back" (F3) two times to go back to transaction RSUDO. Choose "Display Log". You are immediately transferred to the log.
Usage in a message
If you assume that there is a program error in the authorization code, you require a simplified example in your system so that a remote analysis can be executed. However, the processing time of a
customer message can significantly be reduced if this remote analysis is superfluous because a good authorization log is available. Use your simplified example to create a log and attach this log to the
message.
You can easily save the log locally as an HTML file by choosing "Save Document" in the display.
Note the following:
1. Log on to the system (only for log output) in English so that all employees of SAP Support can read the log.
2. Set the relevant switch to display the relevant parts of the log before saving. If required , create a short version and a long version of the same log.
3. In specific cases, several logs can be written. Search for the suitable log.
1 of 3
11/2/2014 1:03 AM
http://wiki.scn.sap.com/wiki/display/BI/The+authorization+Log+in+...
Header
Basic data of the execution is displayed:
Date and time of log creation; name of the executed query; which transaction was executed. In addition, the relevant user names are specified: Logon user and authorization-relevant user.
InfoProvider check
Authorizations are filtered at a very early stage for the validity of the relevant InfoProvider. This is displayed here.
a. if TCTNIOBJNM = 0HIER_NODE, then a text node with the name <TCTNODE> is authorized.
b. If TCTNIOBJNM is blank, a hierarchy leaf with the given name is authorized.
c. If TCTNIOBJNM has the same name as the hierarchy-defining characteristic, a chargeable node is authorized.
CAUTION The node type is relevant for the authorization. For example: A hierarchy authorization for a text node cannot directly authorize a chargeable node with the same name.
Most of the following lines are self-explanatory.
The next block is: "Optimization of Authorizations:" (in italics and highlighted in light orange)
Here, the formatting of the authorizations is logged. This is difficult from a logical point of view and therefore explained in detail in Note 1000004.
Related Content
2 of 3
11/2/2014 1:03 AM