SAP Security
SAP Security
SAP delivers ECC 6.0 with more than 3000 authorization objects. Remembering even a tiny
fraction of the total number is a daunting task. SAP help provides adequate documentation on the
fields and use of most, if not all, the delivered objects. So instead of repeating existing
information here, I would just mention a few of the existing authorization objects and their
applications.
Tables Security for tables are controlled through three authorization objects,
S_TABU_DIS (based on the table authorization group), S_TABU_CLI (security for
client independent tables) and S_TABU_LIN (row level access to tables).
Reports Reports/Executable programs (Executable programs are just one of many
different types of programs) can be protected through S_PROGRAM. S_PROGRAM
checks if the executing user has access to the program authorization group maintained as
a program attribute.
Background Jobs The basic object is S_BTCH_JOB. To administer jobs created by
other users, users would also need S_BTCH_ADM. To schedule jobs with the access of
another user would require S_BTCH_NAM.
Spools S_ADMI_FCD, S_SPO_ACT, S_SPO_DEVand S_SPO_PAGE.
S_SPO_ACT can be used to give access to spools with specific authorization values.
S_ADMI_FCD in addition to spools controls access to a lot of system
administration/Basis function.
User/Roles A number of authorizations like S_USER_AGR, S_USER_AUT,
S_USER_GRP, S_USER_OBJ, S_USER_PRO, S_USER_SAS. You can segregate the
access for role administration with that of user administration by use of these objects.
BDC Sessions S_BDC_MONI. Batch Sessions are one of the possible ways of loading
data into SAP. Sessions are monitored through the SM35 transaction. S_BDC_MONI
allows security on session names and the possible activities (process, lock, delete) on
sessions.
ABAP Work Bench Access to ABAP development objects is controlled through
S_DEVELOP. Controls are possible on object type, object name, activity, and packages.
You might have noticed that all the above authorization objects begin with S as they deal with
System Administration. I have purposely not included authorization belonging to the individual
application components like MM, FICO, SD or HR as a discussion of these do nt make sense
without discussing the applications themselves. So, we keep these for a later post.
SAP Authorization Objects Tables
Table Name
Description
TOBJ
Authorization Objects
TACT
TACTZ
TDDAT
TSTC
TPGP
USOBT
USOBX
USOBT_C
USOBX_C
User Tables
Table
USR01
USR02
USR03
USR04
USR05
USR06
USR07
USR08
USR09
USR10
USR11
USR12
USR13
USR14
USR30
USH02
USH04
USH10
USH12
UST04
UST10C
UST10S
UST12
Description
User master record (runtime data)
Logon data
User address data
User master authorizations
User Master Parameter ID
Additional Data per User
Object/values of last authorization check that failed
Table for user menu entries
Entries for user menus (work areas)
User master authorization profiles
User Master Texts for Profiles (USR10)
User master authorization values
Short Texts for Authorizations
Surcharge able Language Versions per User
Additional Information for User Menu
Change history for logon data
Change history for authorizations
Change history for authorization profiles
Change history for authorization values
User masters
User master: Composite profiles
User master: Single profiles
User master: Authorizations
Description
User master maintenance: Authorizations
S_USER_AUT
This authorization object defines which authorizations the administrator can
process. You can use the activities to specify the types of processing (such as
creating, deleting, displaying change documents).
User master maintenance: User groups
S_USER_GRP
The authorization object is used in role administration when assigning users to
S_USER_SYS
S_USER_SAS
The authorization object S_USER_SAS is checked in transactions SU01,
SU10, PFCG, and PFUD when you assign roles, profiles, and systems to users.
It represents a development of the authorization objects S_USER_GRP,
...
1.
Changing a Role
The user requires change authorization for all derived roles (S_USER_AGR, activity 02). To
avoid inconsistencies between the derived roles, the process is terminated, if the authorization
check fails for at least one role. A list of all roles for which change authorization has not been
assigned is displayed first.
2.
The system automatically generates profile names for roles to which no profile name has yet been
assigned (starting with "T-"). The system then checks whether the role administrator is
authorized to save the name (S_USER_PRO, activity 01). The program also only continues in this
case, if all checks are successfully performed, because roles with no profile names cannot be
correctly saved. The profile and role names for all failed checks are displayed.
3.
During the adjustment of derived roles, their authorization data is completely removed and
replaced by the data of the original role. Since the authorizations of the derived roles can be
maintained individually, the system must check whether the administrator has the required
authorizations for S_USER_VAL to be permitted to remove them. If the derived roles also
contain manual authorizations for the object S_TCODE, the corresponding rights for
S_USER_TCD are also required. If the checks are not successful for all derived roles, the process
is terminated after displaying the missing authorizations.
4.
The administrators authorizations for S_USER_VAL and S_USER_TCD are also checked here.
Note that full authorization is required in the field AUTH_VALUE of S_USER_VAL for
authorization fields that contain ranges of values (see also SAP Note 495282). If the derived role
also contains manual authorizations for the object S_TCODE, the corresponding rights for
S_USER_TCD are also required. These conditions also apply for point 3. In the case of missing
authorizations, a list is again displayed before the process terminates with an error message.
5.
If you have chosen the function Generate Derived Roles, you also require the authorization
S_USER_AGR with activity 64 for the original role and the derived roles. For structural reasons,
it is not possible to adjust derived roles if you do not have authorization to generate the profile of
the original role, since this action is performed before the adjustment process. If this is the case,
the system displays system message 425 (class S#). Derived roles for which the profiles cannot
be generated due to missing authorization are displayed in a list at the end of the adjustment
process. The profiles of all other roles are generated. Termination is not required, since the
authorization data of the derived roles cannot become inconsistent. After confirming the list, the
system displays message 680 (S#) to complete the process. If all profiles have been generated, the
system displays the message "Action performed successfully".
You can also use a background job to adjust derived roles. To do this, schedule a variant of the
report SUPRN_REGENERATE_DEPENDENT, in the selection screen of which you enter the
name of the original role in the field TOP_AGR. To also generate the profile, select the field GEN
with an "X", otherwise leave it empty. If authorization checks fail during the run, these are
recorded in the job log.
You can adjust the data for all derived roles in a single work step. If there are multiple derived
roles for an original role and you want to adjust the authorization data for all derived roles to the
data of the original role, we recommend that you use one of the functions listed under 3 or 4,
instead of adjusting the roles individually with Transfer Data.
Creating Role Menus
You can create the role menu in the following ways on the Menu tab page, which are explained in
more detail below:
Copying Menus
Buttons for menu extension: Copying transactions, reports, other objects, and authorization
default values
Additional activities
Other functions
Copying Menus
With these functions, you copy some or all of the menus of other roles.
You can activate the automatic redundancy avoidance for the following activities to ensure that
there are no repeated entries in the newly created menu:
Roles
Area menus
A file
To copy complete menu branches or parts of menu branches, select these or expand them and
select only the subordinate nodes or individual transactions and repots that you want to copy to
the menu.
You can also copy submenus using an RFC link if you want to use the menu from another
mySAP Workplace component system for example. Specify a target system and choose From
SAP menu. You can specify whether you want to copy the menu locally or the menu of the target
system of the RFC link. If you choose Remote, you are offered the SAP menu of the target
system.
Use the same procedure for the options From other role and From area menu.
From a role
You can use this function to copy a menu structure that is already defined for a role in the same
system or from a role delivered by SAP to the role that you are currently editing.
You can copy area menus (SAP Standard and your own) into a role menu. Choose an area menu
from the list of menus and copy the transactions you want.
You can copy menu descriptions from external products to the SAP system if the external product
creates a file with the menu definition that can be uploaded into a role. If you want to create this
file yourself, see the procedure in SAP Note 389675.
Buttons for Menu Extension
Transaction
You can extend the user menu by directly entering a transaction code.
Report
You can use this function to add reports, transaction variants, or queries in the user menu. You do
not need to assign a transaction code to the reports, transaction variants, or queries to be included
in advance.
ABAP report
Choose a report and a variant. Set the corresponding indicators to automatically generate
a transaction code and to copy the description of the report.
SAP Query
Enter the name of a user group and of a query. If the query has a variant, you can specify
it. You can also specify a global query. For more information, see Query work areas.
The system administrator can create transaction variants in the SAP system personalization.
Transaction variants adjust complex SAP system transactions to customer business processes, by,
for example, hiding superfluous information and adding other information such as pushbuttons,
text or graphics. You can put a transaction variant call in a user menu by entering the transaction
code and variant which you created in the transaction SHD0.
BW report
To include a report from the Business Information Warehouse, enter the ID of the report in the
appropriate input field.
Other
In this case, a system-specific list is displayed, from which you can insert additional objects.
Depending on the system, the list may contain additional entries as well as those listed below.
BW WebReport
You can publish queries which were defined in the Business Explorer Analyzer, in the
Intranet or Internet with Web Reporting. You can insert the queries in any HTML pages
to present them. You can also put various queries in an HTML page and use predefined
navigation buttons or graphics to display the data.
For more information, see the documentation for the Business Information Warehouse
and the SAP Service Marketplace under service.sap.com/bw Documentation
Documentation Enhancements.
Choose the information object type with the input help for the Document field. You go to
a selection screen in which you can search for the object in the Knowledge Warehouse.
You can use this function to copy authorization default values for the subsequently listed entries,
without this being visible in the SAP Easy Access user menu. This is useful, for example, if your
users use a Web browser. In this situation, the Web server accesses the backend system using the
relevant user and starts transactions there, for example. Since the users do not access the backend
system themselves, however, they also do not require entries for the corresponding actions in
their user menus, but rather only the undisplayed authorizations, so that the Web server can start
the transaction for them.
You assign, for example, authorization for transaction SE61 with the role that you are editing, but
this is not displayed in the SAP Easy Access menu. On the other hand, for example, transaction
SE63, which you insert using the Transaction button, is displayed in the SAP Easy Access menu.
The entries have different icons so that you can tell them apart while creating the menu.
Transaction
Copies the authorization default values for transactions.
RFC Function
Copies the authorization default values for RFC function modules. Currently, the correct
authorization default values for the authorization object S_RFC are automatically copied.
You must still add the other authorization values required for the relevant function
module.
Service
Copies the authorization default values for services. From a technical point of view, there
are two types of services: Repository services (program ID) and external services. All
services that are managed in the repository in the SAP system and which have an object
catalog entry are combined under repository services. In this case, the input help displays
only the services for which there are authorization default values. External services are
services that were created outside the SAP system, such as a Java program. In this case,
the input help displays only the services for which there are authorization default values
in the current SAP system. The names of the external services, which can be any length,
are abbreviated to 132 characters in the input help, meaning that there can be identical
names.
You can download the roles from one system and upload them into another
You can import the role from a remote system using RFC
Role upload loads all role data, including authorization data from a file into the SAP system. The
user assignments for the role and the generated profiles for the role are exceptions in this case.
Transporting Roles with the Role Transport Function
The Mass Transport of Roles screen appears. You can control the default settings for the options
Also transport single roles for composite roles and Also transport generated profiles for roles
using Customizing switches (see Role Administration Functions in the section Functions of the
Utilities Menu).
You should not change the authorizations profiles of the role after you have included the role in a
transport request. If you need to change the profiles or generate them for the first time, transport
the entire role again afterwards.
3.
In the following dialog box, specify whether the user assignment and the personalization
data should also be transported.
If the user assignments are also transported, they will replace the entire user assignment of roles
in the target system. To lock a system so that user assignments of roles cannot be imported, enter
it in the Customizing table PRGN_CUST using transaction SM30. Add the line
USER_REL_IMPORT and the value NO.
If you are using Central User Administration (CUA) with global role assignment, you should not
transport the user assignments of a role together with the role. In this case, you can only create
user assignments in the central system. You can then send these to the system group that you have
defined, if appropriate. If you nevertheless import user assignments for roles into the child
systems of the CUA in these circumstances, the central system is not informed about the changes
to the user master records. This means that data for the users in the child systems that you have
changed in this way is overwritten with the data from the central system during the next
distribution. Therefore, the user assignments created locally in the child systems with the role
import are deleted.
4.
The role is entered in a Customizing request. Use Transaction SE10 to display this.
10
The authorization profiles are transported along with the roles, unless the profile parameter
transport/systemtype is set in this SAP system to value SAP. In this case, only the profiles whose
roles are assigned to customer-relevant delivery classes are transported.
You can also use a Customizing entry to prevent authorization profiles from being transported
with the roles. In the transport source system, add the entry PROFILE_TRANSPORT with the
value NO in table PRGN_CUST. In this case, you must use transaction SUPC (mass generation)
or transaction PFCG (generation of profiles for individual roles) to generate the profiles in the
target system after the transport.
5.
You can create perform a user master comparison in the following ways:
Procedure
1.
In role maintenance (transaction SUPC), choose Utilities Mass Generation in the role
maintenance (transaction SUPC).
2.
11
To generate all profiles to be generated automatically (last checkbox), you can further
restrict the role selection in the next screen.
Comparing User Master Records
Use
The user master record comparison consists of three types of comparison:
This updates the role assignments defined in composite roles, that is, added or deleted.
This generates the direct role assignments from the indirect role assignments of the organizational
management model.
You can also choose the Clean-Ups option to delete invalid, generated profiles, and invalid role
assignments.
Procedure
1.
2.
Specify the roles that you want to use for the comparison.
3.
12
With this action, you start the user master comparison in dialog for individual roles. You
can select the required processing types (see 4.).
4.
If you have selected Perform User Master Comparison, choose one or more of the
following processing types:
Composite role comparison: Start the composite role comparison if you make changes to
a composite role definition (that is, if you add or delete single roles to a composite role) or import
a change. Single-role assignments are compared with the composite role assignments for the user.
If you add single roles to the composite role, the single roles are assigned to those users that are
assigned the composite role. Conversely, if single role assignments are deleted for the users, the
single role is removed from the composite role.
Clean-Ups: Perform clean-ups when you generate or import profiles. Generated profiles
that no longer exist are deleted. Regular clean-ups are particularly important if you transport your
roles and profiles frequently, as this helps to solve possible inconsistencies quickly.
You can also select the following options:
Display error messages: All error messages are displayed on the screen in dialog mode.
Replicate local HR assignments in the central system: You can only select this option if
you are in a child system of a CUA group and if organizational management is active. This option
replicates the role assignments that exist in the child system that originate through relationships in
the local organizational management model, for information in the CUA central system. You can
display these relationships in the user maintenance (transaction SU01).
Result
Following the comparison the system displays a log that includes any errors that occurred
(background processing log for a background job).
Comparing and Adjusting Role Menus
Use
You can use this procedure to compare role menus that
13
Prerequisites
To compare two role menus from different systems, their RFC destinations must be maintained.
Procedure
To compare the role menus, use the display mode by choosing the Compare pushbutton . To
adjust the menu of the first role, that is to copy parts of the comparison role menu, choose change
mode by choosing Adjust. The procedure describes change mode.
1.
In the role maintenance (transaction PFCG), choose Utilities Role comparison tool or
call transaction ROLE_CMP.
2.
Enter the name of the role to be adjusted in the Role input field. Then enter the
comparison role in the Comparison role field.
If you specify a single role in the Role field, compare it only to another single role. If you specify
a composite role in the Role field, compare it only to a single or composite role contained within
it.
3.
Choose Adjust.
The Role Comparison screen appears. Until you choose Save or Activate, this screen is the same
as the display mode under Role Comparison.
In this example, we compare the role to be compared Role_Compare_1 with the comparison role
Role_Compare_2. Two menu entries are red in Role_Compare_1. This means that this role has
two extra entries in comparison to the role Role_Compare_2. You can delete these entries by
dragging them to the trashcan.
In the menu of the role Role_Compare_2, the entry Business Add-Ins is blue. That is, this entry is
not contained in the role menu to be adjusted. You can copy it to the appropriate place in the role
menu to be adjusted using Drag&Drop.
You cannot change the black entries.
4.
Save your entries. You have created a maintenance version and the initial screen appears
again.
On the initial screen of the transaction, you can choose Role Delete maintenance vers to
discard the changes.
5.
Preparatory Steps
14
When you activate the Profile Generator, you permit specified authorization checks to be
deactivated. The Profile Generator is active in the standard system (the system profile parameter
auth/no_check_in_some_cases is set).
This setting has the following effect:
When a transaction is called, the system always checks to see whether the authorization
checks contained within it are to be suppressed.
The authorization Profile Generator is activated. The system displays Authorizations on the
initial screen for Transaction PFCG (Role Maintenance).
Perform the following steps in the Implementation Guide (IMG):
...
1.
Copy SAP default settings for check indicators and authorization field values
Using Transaction SU25 (step 1), copy the default values delivered by SAP. This is how you
import the SAP check indicator default values for the authorization objects within a transaction,
and the authorization field values for the Profile Generator into the customer tables (tables
USOBX_C and USOBT_C). You can edit these in Transaction SU24.
You can change both configurations to meet your requirements.
To import an upgrade, follow steps 2a to 2d.
It may take a few minutes to copy the SAP defaults into the customer tables.
See the documentation in Transaction SU25.
2.
You can set a time limit on the assignment of users to roles. To ensure that these changes are
reflected in the user master record during the profile assignment, you need to schedule a
background job to make the relevant adjustments daily.
For more information, see Comparing user master record profiles with roles.
To maintain the default check indicator settings, use transaction SU24 (see the following topics).
To do this, you require the authorization ABAP Workbench (S_DEVELOP) with the following
field values:
DEVCLASS: any
OBJTYPE
15
P_GROUP: any
3.
Select the profiles you want to transport or all profiles in the list displayed.
4.
Enter the transport request number for each profile or profile group in the dialog box.
5. The system asks whether you want to transport just the profile, or the authorizations it
contains as well. You can either transport the profile by itself, or include all of its components in
the transport request.
The system also transports the documentation for the profiles and authorizations.
6. When you have finished your selection, you can execute your transport request using the
Workbench Organizer.
16
Note that the transport overwrites all existing check indicators and field values in the target
system.
You can use transaction SU24 to maintain individual check indicators. You can use the
Workbench Organizer to record your changes. By executing the corresponding transport request,
you distribute your check indicators to other systems.
Transporting Templates
All SAP templates are automatically identical in all systems following an upgrade. You cannot
change SAP templates.
The Workbench Organizer (transaction SE09) records changes to your own templates.
Transport the request. The objects in the transport request have the following syntax: R3TR
SUSV <Name of the template>. The system transports the template name (in all languages) as
well as the maintained data.
Transport User Tables between Clients
Use report RSCLCCOP to transport user master records, profiles and authorizatons between
clients in an R/3 system.
Start RSCLCCOP from the target client which the users and authorizations should be copied.
Do not use this report if the target client contains some users and authorizations you want to
preserve.
First Installation Procedure
To set up user and role administration for your SAP system:
1.
2.
If your company uses various applications, you must liaise with the various departments to decide
which roles to define in each department, and which authorizations the staff is to be given. Each
workplace should be defined (in writing). The authorization administrators need to know in detail
which employees can access which data, call which transactions and programs, and so on.
3.
In transaction SU25, choose menu entry 1: Initial Fill of the Customer Tables.
When initially filling the customer tables, the check indicators and authorization values that are
preset by SAP are copied to the appropriate customer tables.
Users and user groups are assigned roles, possibly predefined, that contain typical transactions for
their work. On the basis of the transactions contained in a role, the role administration tool selects
the authorization objects that are checked in the transactions. If a menu has been created for a
role, the role administration tool searches for the associated authorizations. These can be
supplemented and modified by the administrator.
Depending on how exact the default values are, green (complete authorization), yellow (must be
maintained by the authorization administrator), or red (organizational levels need to be
maintained) lights appear in the display for the maintenance of the individual roles.
17
Default values for authorizations are delivered by SAP in the form of the tables USOBX and
USOBT. The customer tables USOBX_C and USOBT_C are initially filled with the contents of
these tables and can synchronized at each further upgrade.
USOBX
USOBT
4.
tool.
Defines for each transaction and authorization object which default values
should be used in the role administration tool for the transaction codes
entered in a role menu.
If necessary, adjust the extent of authorization checks before using the role administration
You also use check indicators to control which objects are not to be checked, which appear in the
role administration tool and which field values are displayed there for editing before the
authorization profiles are generated automatically.
Adjust the authorization checks to be performed for each transaction according to your wishes. To
do this, call transaction SU25 and choose point 4: Check Indicators in Transactions (SU24).
You can also globally deactivate authorization objects in the transaction SU25 (item 5). See
Reduce extent of authorization checks.
5.
To copy the tables to other systems in your system group, choose point 3: Transport
Customer Tables.
6.
18
At the common level, access to commonly used transactions is created for all users of the system.
Examples of contained transactions are: Printing, Online Help, SAP office, and so on. Create one
(or more) roles for general activities in your company. Changes to these roles affect all
employees. If general activities are part of specific job roles, changes in the general
authorizations must be adjusted in all roles.
At the application level, all users of a particular application should be assigned general
transactions for this application. This procedure leads to a time saving, as these general
application-specific roles usually remain stable even after upgrades. If you need to make changes,
you can again make one change for all.
At the job role level, you should assign the transactions and authorizations that are required
especially for one (or a few) work centers. If roles are used at different organizational levels (for
example, in different company codes), you can derive roles and change the appropriate
organizational levels for the derived role in a dialog window.
Since both of the lower levels remain largely stable after the authorization administration has
been implemented, the work of the authorization administrator will mainly be related to roles at
the job role level after the implementation.
2.
Do not enter any transactions, choose the Authorizations tab page and then Change
authorization data.
3.
Do not copy any templates, but choose Edit Add authorization. Full authorization.
4.
Here you find the authorizations that are generally regarded as critical.
5.
Deactivate all authorizations which begin with User master maintenance or have
S_USER_* in the object name, and any others which you regard as critical.
6.
Using the role administration tool, generate a new profile and save it under a new name.
19
You can assign the role that you have just created to the relevant users in user maintenance. See
Assigning roles .
This control ensures the integrity and stability of the system.
The Basis authorization objects are documented in the transaction AUTH_DISPLAY_OBJECTS.
The authorization objects in the object class Basis - Administration are called S_USER_*. Place
the cursor on an authorization object and choose Information.
For more information about Basis system and SAP work area authorizations, see Tools
AcceleratedSAP Customizing Edit project and choose the SAP Reference IMG button.
Search for the entries User or Authorization to call the authorization sections.
The authorization administrator creates the roles for end users in the development system. These
roles are transported to the final test in the quality assurance system before being put in the
production system. The user master records are usually created in the production system shortly
before it goes live. The roles are assigned to the end users in the production system together with
the transported authorization data, as required.
The authorization administrator must know which clients are to be created in the customer
systems. Roles are not automatically copied when new clients are created. Since users, roles,
authorization profiles and authorizations are client-specific, the client copy administrator must
also know which user master records are to be copied.
The quality assurance system
The authorization administrator can start to transport the roles from the development system into
the quality assurance system when it has been setup.
For example a member of the FI project team can check the following in the accounts payable
accounting with a model user ID:
Whether the user has access to the transactions in the roles assigned to him or her
Whether these transactions correspond to the role defined by the company for the accounts
payable accounting
Whether the model user ID has access authorization for certain transactions without
permission
The end users can logon in a test environment and simulate production processing to test the user
authorizations.
A training client is usually created in the quality assurance system because it contains the newest
configuration. Larger installations have a separate training system.
The production system
When the roles and authorization profiles have been completely tested in the quality assurance
system and approved by the end users or project team, the roles can be transported into the
production system. The user IDs can then be created.
20
You should never make changes to a production SAP system. You should therefore not assign
following authorizations to users in a production system:
Authorizations for the ABAP Workbench (authorization objects ABAP Workbench
(S_DEVELOP) and Transport Organizer (S_TRANSPRT))
Administrator
Permitted Tasks
Impermissible Tasks
User Administrator
Creating and
changing user master
records
Assigning roles to
users
Changing or
generating profiles
Assigning profiles
beginning with "T" to
users
Displaying
authorizations and
profiles
Using the User
Information System
Authorization Data
Administrator
Creating and
changing roles
Changing users
21
SAP_ADM_AU
Changing
authorization data
and transaction
selection in roles
Generating profiles
Changing users
Using transaction
PFCG or SUPC to
generate the
authorizations and
profiles that begin
with T for roles
that have
authorization data
Generating
authorization profiles
with authorization
objects that begin
with S_USER
SAP_ADM_PR
Performing a user
master comparison
(transaction PFUD,
Performing a profile
comparison of the
user master
comparison)
Using the User
Information System
Prerequisites
You are an administrator with the predefined profile S_A.SYSTEM, with which you can edit
users of the group SUPER.
Procedure
1.
1.
a.
Enter a name in the Role field in role administration
(transaction PFCG) and choose Create Role.
2.
b.
Do not assign any transactions; instead, choose Change
authorization data on the Authorizations tab page.
A dialog box appears asking you to choose a template.
22
3.
c.
Choose one of the following templates:
Administrator
Authorization profile
administrator
SAP_ADM_AU Authorization data
administrator
SAP_ADM_US User administrator
4.
d.
Generate an authorization profile in each case.
Use a profile name that does not begin with T, so that the authorization data
administrator cannot change his or her own authorizations.
Template
SAP_ADM_PR
2.
On the User tab page, assign the role to the relevant user, that is, to the administrator.
3.
4.
So that the user administrators cannot change their own user master records, or those of
other administrators, assign them to the group SUPER. This applies if you are using the
predefined user administration authorizations.
a.
To do this, choose the Logon Data tab page in user administration (transaction SU01).
b.
In the User Group for Authorization Check field, enter the value SUPER.
c.
Save your entries.
5.
For the user administrator, you can restrict the authorization to particular user groups.
For the profile administrator, you can exclude additional authorization objects, for
example, for HR data. If you want your generated authorization profiles to begin with a letter
other than T, you should inform your profile administrator.
Setting Up the Role Administration Tool
To use the role administration tool, perform the following steps:
...
1.
The role administration tool is activated when delivered; that is, the profile parameter
auth/no_check_in_some_cases is preset to the value Y. Do not change this setting.
2.
This copies the SAP check indicator defaults and field values into the customer tables so that you
can change them.
You can then use the role administration tool to edit the authorization information for your users.
Password Rules
23
The following table describes the specifications that are to be followed for passwords. It also
shows whether these guidelines are predefined in the system or whether you can change them
using profile parameters.
Rule
Notes
24
25
The password can only be changed after the old password has been entered correctly.
At least x characters in the new password must be different from the old password.
For an exact description of the sequence and the scope of the check, see the documentation for the
function module. You can display this documentation with transaction SE37.
26
The maintenance user for the ABAP Dictionary and software logistics, user DDIC.
The user master record for user DDIC is automatically created in clients 000 and 001
when you install your SAP System. The default password for this user is 19920706. The
system code allows user DDIC special privileges for certain operations. For example,
DDIC is the only user that is allowed to log on to the SAP System during an upgrade.
To secure DDIC against unauthorized use, you must change the initial password for the
user in clients 000 and 001 in your R/3 System.
The user EarlyWatch is delivered in client 066 and is protected using the password
SUPPORT. The SAP EarlyWatch experts use this user which should not be deleted.
Change the password. This user should only be used for EarlyWatch functions
(monitoring and performance).
Upgrade Procedure
After an upgrade, you must make adjustments to the user and role administration. What these are
depends on whether you were already using the profile generator in the source release.
In the following, it is assumed that you have not yet used the profile generator, and that you are
not upgrading from SAP R/3 3.0F.
If you were already using the profile generator in the last release, read Source Release with the
Profile Generator (> SAP R/3 3.0F).
First of all, choose one of the following options:
1.
Convert the profiles that you manually created to roles. To do this, choose step 6 in
transaction SU25.
This has the advantage that the administrator can assign all of the existing, thoroughly checked
profiles to the corresponding roles. You can, however, only create a user menu for the role if the
corresponding authorizations for the authorization object S_TCODE are contained in the profile.
Additionally, you cannot use the configuration tables (USOBX_C, USOBT_C) in which the
predefined authorization values are contained.
27
If you use transaction SU25 (option 6) to convert profiles into roles, which you then want to
derive, ensure that you choose the optimized option to copy the status of the organizational level
fields contained in the profiles correctly to the role. You may then have to maintain the values in
the organizational level fields, since transaction SU25 collects the field values from all
authorization objects including the affected organizational levels. This means that after the
migration, every authorization object contains the total of all field values in the profile for this
organizational level. This ensures that the uniform status of the organizational levels in all
authorization objects is maintained. This is the prerequisite for maintaining the organizational
levels using the dialog box Determine Organiz. Levels.
If you are migrating the profiles using the option Identical to Profile, although only the values for
the organizational level fields contained in the profile are copied to the role, it is no longer
possible to maintain organization levels using the dialog box Determine Organiz. Levels.
2.
Carry out a new implementation of the authorization administration using the profile
generator.
This has the following advantages:
Customers experiences have made it clear that the time invested in the new
implementation of the authorization administration pays off with a large time saving
during other maintenance of the user and authorization data.
Your employees can take advantage of user-friendly user menus.
We recommend the second option. In addition to the advantages already mentioned, you can use
the three level model for the implementation of roles, as shown in the section First Installation
Procedure. A redesign of the authorization administration using the three-level model makes
sense in the long term, in that the work time that an authorization administrator must expend for
the maintenance of the roles can be significantly reduced.
If you have decided to use the second option (Redesigning the Authorization Administration),
read the First Installation Procedure, and the following advice:
Plan the conversion of profiles to roles. Produce a list of transactions and associated
profiles for which you want to set up roles. Use the Information System (transaction SUIM). You
can download the Information System lists to a Microsoft Excel sheet and use it as the basis for
the migration to be performed. Contact the departments and discuss which roles should be
provided for which departments.
During the conversion to roles, you can decide if the naming conventions that you used
have proved to be useful. If necessary, you can define a different naming convention.
The following procedure may be useful when copying the authorization values from the old
profiles:
Open three sessions in the SAP system.
In the first session, start transaction SU02 and choose a profile that you want to
convert to a role
28
In the second session, call transaction PFCG and create the new role there.
In the third session, start the transaction SUIM as a utility for maintaining the
authorizations. Choose Authorization Objects Authorization Objects by Complex
Selection Criteria. Enter the name of an authorization object. You want to know, for
example, in which profile the object S_TABU_DIS is used. Choose Where-Used List.
Choose the profile for which you want to create a role. Select the profile and choose
Expand Subtree.
You can now search for the desired authorization object (in this case S_TABU_DIS)
and enter the authorization values in the role.
When you have finished the conversion of profiles to roles, call step 2C of transaction
SU25.
All roles that are affected by newly added authorization checks and must be correspondingly
supplemented. Edit and regenerate their authorization profiles. The system assigns the status
Profile comparison required to the affected roles. Step 2C uses a traffic light system to display
which roles must be checked after an upgrade. For revised roles, the traffic light is green. For
roles that have not yet been revised, the traffic light is red. You can call the report repeatedly
without overwriting adjustments that you have already made.
Transaction SU25 would have produced no output for profiles. It makes sense to create the roles
beforehand, in order to find out which roles authorization checks have been added for.
Call step 2D to find out if transaction codes have been changed in the new release. You can
also download this list to a Microsoft Excel sheet and then remove the old transaction codes
during the test phase once the testers are satisfied with the new transactions.
Step 2D uses a traffic light system to display which roles have already been revised after the
upgrade. For revised roles, the traffic light is green. For roles that have not yet been revised, the
traffic light is red. You can switch the traffic light from red to green by double clicking it. You can
call the report repeatedly without overwriting adjustments that you have already made.
In Step 2D, you can use the following pushbuttons to add new transactions to roles or to replace
old transactions with new ones:
29