Access control in SAP is composed of several concepts:
Program code that calls an authorization check using the authority-check statement. This will look something like:
authority-check object id field
Authorization fields (corresponding to the in the above code) that define a scope of possible values. Examples of authorization fields would be:
ACTIVITY: defines the type of activity the user is doing with the data. Possible values are
'DISPLAY', 'MODIFY', 'DELETE', etc.
COMPANY_CODE: possible values are any single value, or any range of values, or any combination thereof (such as '0438' and '0600' thru '1100')
Authorization objects that define a group of fields. For example, an authorization object called 'CO_MDATA', containing our above fields ACTIVITY and COMPANY_CODE, might used to control access to the company master data tables.
Authorizations, each of which belong to exactly one authorization object, that define authorization values (within the scopes defined by the authorization objects) to be granted to users. Note that an authorization is different from an authorization object!! Extending our previous examples, we might have an authorization, belonging to the authorization object 'CO_MDATA', called 'CO_MDATA_ALL', that grants all access to all company master data. Then 'CO_MDATA_ALL' would have the following values:
FIELD VALUE
ACTIVITY *
COMPANY_CODE *
Profiles, each of which may contain several authorizations or profiles. A simple profile contains a group of authorizations. A composite profile contains a group of profiles (simple or composite). [Profiles can be conceptualized as forming the structure of a tree, in which end nodes (leaves) are authorizations, and all other nodes are profiles. Simple profiles are nodes whose children are all end nodes, and composite profiles are nodes, other than end nodes, who have no end nodes for children.]
Profiles are designed to define set or one or more functions or positions. For example, a functional profile might define all the authorizations that are required for doing a goods receipt, or for making a payment in the AP module. A position profile, on the other hand, might define all of the authorizations that are granted to an accountant, or to a warehouse supervisor. Often, a position profile is a composite profile consisting of several functional profiles.
Users, to whom profiles are assigned. A user is assigned one or more profiles by the system administrator. These profiles define all of the user's system authorizations. It sounds complicated, but once you start working with authorizations, it's pretty easy.
How to Earn Rs.25000 every month in internet without Investment?
Authorization Concepts
Subscribe to:
Post Comments (Atom)
topics
-
▼
2008
(397)
-
▼
April
(39)
- Comparing locally managed and dictionary managed t...
- How to monitor update processes and update records
- List of deletable SAP system files
- SAPgui disconnection problem
- Upgrading from SAP kernel 6.20 to 6.40
- How to develop an RFI for SAP 4.6c to ECC 6.0 migr...
- SAP installation keys for upgrades or new installa...
- Upgrading R/3 with smallest possible data loss
- Migrating test programs from ECC 4.6 to 6.0
- Building a new PRD system from an online backup
- Generating an SAP installation key
- Go-Live check
- Close a hung session in SAP
- Display locked and unlocked SAP transactions
- How to reinstall the Support Package Manager from ...
- New security features in ECC 5.0?
- SAP security audit log setup
- What are the industry standards for SAP authentica...
- How do I link user IDs to positions in SAP?
- How do I fix user role problems in SAP security?
- How do I utilize SAP inspection plans and support ...
- How do I utilize SAP inspection plans and support ...
- Allowing only a certain number of users in SAP at ...
- How do I restrict transaction access based on user...
- Blocking a material type in Transaction MM01
- Listing TCODE transactions used to view what users...
- What is the process for resetting a DDIC password?
- Accessing the SE38 T code with only display author...
- Assigning roles to all users in a group
- How do I go about creating an authorization group?
- What is the difference between Basis and the Appli...
- Support packages and add-ons, why are they important?
- SAP R3 Business BluePrint - Planning Your SAP Impl...
- SAP R3 EarlyWatch Session
- What is SAP Internet Transaction Server ITS
- SAP Role Maintenance Administration Tool
- SAP Transport Management System Concepts
- How to know the kernel version of a SAP R3 system?
- Authorization Concepts
-
▼
April
(39)
No comments:
Post a Comment