ADM940 - EN - Part-3
ADM940 - EN - Part-3
d) Exit the report Authorization Objects by Object Name, Text and go back to the SAP
Easy Access menu.
6. How many authorization objects have a name that begins with S_USER?
____________________
a) Analyze the list of authorization objects.
Number of authorization objects that begin with S_USER:
13 Authorization objects
7. Find out about the authorization object S_USER_TCD by displaying the documentation.
What is controlled with this authorization object?
_________________________________________________________
_________________________________________________________
_________________________________________________________
Which authorization field(s) does the object consist of?
____________________
a) In line with the authorization object S_USER_TCD, double-click the Information button
(i).
TCD: Transactions that administrators may assign to roles and for which they may
assign authorization to start a transaction in Role Maintenance.
c) Exit the report and return to the SAP Easy Access menu.
Task 4: Analyze the Role ADM940_SD_SALES Using the User Information System
2. Use Report Roles by Complex Selection Criteria node → By Role Name with the role
ADM940_SD_SALES.
a) Expand the structure for the Roles node, then expand the structure for the Roles by
Complex Selection Criteria node, and choose the report By Role Name by double-
clicking it.
b) Exit the report and return to the initial Information System screen.
Business Example
In practice, it is important to know the special features of the authorization check performed
when a transaction is called in the system. It is also important to determine, if an unsuccessful
authorization check is reported, why it was unsuccessful. This exercise will consolidate the
content of the lesson with work in the system.
3. Which authorization values must exist for the authorization check to be positive and the
transaction to be started?
____________________
6. Find out which object was checked, and what authorizations you have.
Use transaction SU53 to find out which object was checked, and what authorizations you
have.
____________________
________________________________________
________________________________________
________________________________________
________________________________________
3. Display the buffer for your user “ADM940-SU53”. How many authorization entries does
this user have?
____________________
Business Example
In practice, it is important to know the special features of the authorization check performed
when a transaction is called in the system. It is also important to determine, if an unsuccessful
authorization check is reported, why it was unsuccessful. This exercise will consolidate the
content of the lesson with work in the system.
c) Choose Display.
3. Which authorization values must exist for the authorization check to be positive and the
transaction to be started?
____________________
a) Choose the Values button.
Activity: 03
The company code is not checked here, so it does not matter which authorization
values exist in the user master record for it.
e) Choose Enter.
6. Find out which object was checked, and what authorizations you have.
Use transaction SU53 to find out which object was checked, and what authorizations you
have.
____________________
a) Enter the transaction code SU53 in the command line.
The object “S_TCODE” was checked, and your user had no authorizations for Object
S_TCODE field TCD Value1 VA07.
b) Double-click the row indicating the missing authorization for transaction VA07.
c) Select the node User's Authorization Data ADM940-SU53 and choose Expand Subtree
(F6).
The column Authorization Values shows that your user has the following
authorizations for Object S_TCODE field TCD:
SESS, SESSION_MANAGER, SMEN, SSC1, SU3, SU53, and SU56 .
____________________
a) With transaction SU56.
3. Display the buffer for your user “ADM940-SU53”. How many authorization entries does
this user have?
____________________
a) Start transaction SU56.
Business Example
Almost all companies use PCs and software programs to support their employees in their
daily work. However, to work with this technology, the users require access and
authorizations to call the programs. A control method in an SAP system is the user master
record and its roles and profiles.
2. Enter an initial password of your choice and assign the user to user group ZGR##.
Initial password: Init1234
3. Assign the log-on language that you have used yourself for logging on.
Task 3: Assign a Predefined Work Center Example to Your New User Master Record
Assign a predefined work center example ADM940_BC_ADMIN to your new user master
record by choosing the Other Menu button on the SAP Easy Access initial screen.
1. Choosing the Other Menu button on the SAP Easy Access initial screen (on the application
toolbar: [Shift+F5]).
1. Switch from the Other menu display back to the SAP menu display.
3. Link your user with another role. Choose the role ADM940_PLUS.
If you are in “display mode”, then change to “change mode” (Shift+F7).
___________________;
___________________.
1. Display the change documents for your user GR##-ADM by calling up the information
system for users and authorizations and selecting the report For Users under Change
Documents for users and authorizations.
2. Does the list tell you that creating the user master record and assigning the user to roles
were separate steps?
______________________________________________
Task 6: Log On to the System with the Credentials of the Created User
Try to log on to the system as user GR##-ADM without Language information.
4. Check the user buffer by calling the Analyze User Buffer transaction.
How many authorizations exist?
____________________
For which authorization objects? List some examples.
______________________________________________
______________________________________________
GR##-FI1
User Name
GR##-FI2
GR##-SD1
GR##-SD2
GR##-MM1
GR##-MM2
4. Assign the log-on language that you have used yourself for logging on.
6. Check the result in the change log for a given user entry.
You can copy the generated initial passwords into the tables in the exercise section.
Hint:
Passwords of 40 characters in length are automatically generated. If you
want, you can copy the generated passwords from the log to the following
table, or change them directly for future tasks in transaction SU01 when
required, using the Change Password button (Shift+F8).
GR##-FI1
GR##-FI2
GR##-SD1
GR##-SD2
GR##-MM1
GR##-MM2
7. You can copy the generated initial passwords into the tables in the exercise section.