SAP Business One Citrix Installation Guide free downloads

SAP Business One Citrix Installation Guide

Installation Guide for MiniSAP 4.6D Steps free downloads

Installation Guide for MiniSAP 4.6D

MCOD tech Installation Steps free downloads

MCOD tech Installation

SAP 4.7 Installation on UNIX Steps free downloads

SAP 4.7 Installation on UNIX

SAP GUI 710 Installation Guide free downloads

SAP GUI 710 Installation Guide

Multinational SAP Implementation Steps free downloads

Multinational SAP Implementation

CRM Installation Guide free downloads

CRM Installation Guide

EP Installation Guide With Screenshots free downloads

EP Installation Guide With Screenshots

XI Installation Guide With ScreenShots free downloads

XI Installation Guide With ScreenShots

SAP WEB AS Installation On Windows Oracle steps

SAP WEB AS Installation On Windows Oracle

SAP Netweaver JDI steps free downloads

SAP Netweaver JDI

GUI Installation for Mass Users Steps free downloads

GUI Installation for Mass Users

Oracle Installation Steps free downloads

Oracle Installation

Installation of SAP WEBAS ABAP J2EE Steps


Installation of SAP WEBAS ABAP J2EE

Post and Pre Installtion procedure

Post and Pre Installtion procedure

Solution manager 4.0 on Windows Oracle Steps free downloads

Solution manager 4.0 on Windows Oracle

Installation of SAP R3 4.7 Steps free downloads

Installation of SAP R3 4.7

GUI Installation Steps free downloads

GUI Installation

Solution Manager 7.0 Installation Steps free downloads

Solution Manager 7.0 Installation

BIW 3.5 Installation Steps free downloads

BIW 3.5 Installation

ECC 5.0 Installtion Steps free downloads

ECC 5.0 Installtion

ECC 6.0 Installation screen shots free downloads

ECC 6.0 Installation screen shots

solution manager Material free downloads

solution manager tutor 21.rar
Use of Solution Manager.ppt
Solution manager
Solution manager Overview
Solution Manager Solution Monitoring

Profiles

Profile Parameters
Profiles

Sarbanes - Oxley(SOX) Material free downloads

Sarbanes - Oxley(SOX)

AIS Implementation Material free downloads


Security Foundation
Users and Roles
AIS Implementation
SAP Virsa Presentation
SAP Virsa User Guides

Generating profiles using Automatic Profile Generator material free downloads

Authorization Transactions
Authorization check in HR Master Data
Generating profiles using Automatic Profile Generator
Generating Profiles using Manual Method
Authorizations using PD Method

Security Audit Log Material free downloads

Security Audit Log
Securities Release 4.6C
Security Foundation
Security Guide for MySAP CRM 5.0
Structural Authorizations Step by Step
SAP Secure System Management


SAP Security Guide Volume 1 & 2 Material free downloads

Security And Control Update Handbook
SAP Security Guide Volume 1 & 2
SAP Security Guide Vol - 3
Audit Information Approach
Security In SAP Systems
SAP Security Administration
Security Design For Coca-Cola
Security Management
Security Foundation

Operation modes Overview Material free downloads

Operation modes Overview
Defining Operation Modes

AIS - audit management preparation.sim Material free downloads

ais - audit management preparation.sim
ais - audit management execution.sim
ais - audit management 2 audit plans.sim

Profile Parameters Material free downloads

Profile Parameters

SAP Security HandBook free downloads

Security HandBook

Implementing OSS notes using SNOTE Material free downloads

Implementing OSS notes using SNOTE
SAP Patch Manager 4.6C
SPAM Patch Manager

Saint SAP Add On Installation Materail free downloads

How to use SPAM
Saint SAP Add On Installation
Support Packs

Applying Hot Packages Using OSS Material free downloads


spool administration snap shots Free downloads

spool administration snap shots.rar
spool_administration.rar
printing problems.rar
SAP Printing Guide

Homo-Hetro System Copy For WEB AS 620 Material free downloads

Homo-Hetro System Copy For WEB AS 620
Homogeneous System Copy
Homogeneous System Copy - 1

System copy procedure & DB refresh Free downloads

System copy procedure
System copy and DB Refresh

Transports.ppt Material free downloads

Transports.ppt
TMS.ppt

Creating Change Request And Change Task

Transporting SAP Objects At OS Level
Creating Change Request And Change Task

TMS Configuration Material free dwonloads

TMS Configuration
Correction and Transport
Insiders Guide To SAP - CTS
R3 Enterprise Tech Facts
Releasing Change Request

STMS Material free downloads


STMS
TMS Overview
TMS Overview By SAP-AG
TMS With MYSAP Landscape
TMS With MYSAP Landscape - 1
Types Of Transports
Managing Transports

JAVA Troubleshooting Guide For WEB AS Installation

JAVA Troubleshooting Guide For WEB AS Installation

Troubleshooting XI,Debug XI3.0 material free downloads

How To Debug XI 3.0
How To Handle XI 3.0 Caches
Message Troubleshooting In XI 3.0
How To Monitor analyze Errors In SAP J2EE Engine
Troubleshooting XI

general problems in sap r/3 material free downloads

general problems.rar
Trouble shooting guide

Creating Multiple R3 Users using SCATT free downloads

Creating Multiple R3 Users using SCATT
Central User Administration
User Administration Tasks

SCOT Configuration Material free download

SCOT Configuration
One document for easy SAP.doc

kernel_download_swdc.rar
Checklist For Basis Consultant.rar
How to Configure SAP Library.ppt
Call Management .rar
SAP R/3 Overview
History Of SAP
SAP Products Reference
Using SAP in Education and Reference

SAP Upgrade Guide Material free downloads

Upgrading the kernel 620 to 640.rar
Component Upgrade Guide Windows
Component Upgrade To 4.7
SAP Upgrade 4.6 SR2
SAP Systems Upgrade from 3.x - 4.6
SAP Upgrade 4.6c On Unix
SAP Upgrade Guide
SAP Upgrade Guide To 4.6b
SAP Upgrade Master Guide To ECC 5.0
SAP Upgrade to 4.6b on NT
SAP Upgrade To 4.5b
System Switch Upgrade
Transition And Upgrade to MYSAP ERP
Upgrade Of MYSAP
ECC Customer based Upgrade
SAP R3 Customer based Upgrade
Customer based Upgrade
ERP 6.0 Upgrade

SAP Performance Tuning material free download

Scheduled Daily Tasks
Scheduled Weekly Tasks
Scheduled Monthly Tasks
Scheduled Quarterly Tasks
Scheduled Annual Tasks
Analyzing SAP Buffers
Performance in a Nutshell
Performance Optimization using Data Archiving
Planning and Conducting high volume load tests
Performance Tuning for SAP BW
SAP Performance Optimization Guide
SAP Press BW Performance Optimization Guide
SAP Performance Tuning

Split Mirror Disk Backup For Oracle Material free download

DB Upgrade
DB Export
Administration Of SAPDB
Run Check DB And Optimizer
SAPDBA
Split Mirror Disk Backup
Split Mirror Disk Backup For Oracle
Split Mirror Disk Backup For Oracle - 1
Database Administration SAPDB,DB13
Disaster Recovery

Database Security For Oracle material free downloads

Database Security For Oracle
Check For OracleEntries
MCOD Introduction
Database SetupAnd Tuning
Oracle 9i backup and Recovery Concepts
Oracle 9i Security and network Integration Guide
Oracle 9i Database Administration Guide
BIT660 Data Archiving
Step by Step Process Of Data Archiving
Oracle DBA
Oracle Database Administration With SAPDBA
Upgrade to Oracle 9.20 On Windows

Oracle Upgrade Master Guide 9i To 9.20 free downloads

Oracle Upgrade Master Guide 9i To 9.20
Upgrade Oracle 9.20 on UNIX
Upgrade To Oracle 10g
Upgrade To Oracle 10g SR1
Upgrade To Oracle 8.17.3
Upgrade To Oracle 8i ver 816 NT
Upgrade To Oracle Ver 815 NT

Migrating Or Upgrading To Oracle Ver : 8.0.5 free download

Migrating Or Upgrading To Oracle Ver : 8.0.5
Managing efficient Upgrades
Migrating Or Upgrading To Oracle 8.0.4
Migrating Or Upgrading To Oracle 8.0.6

Client adminstration Material free download

Client adminstration
Client Copy Screen Shots
Client Administration with Screenshots
Deleting A Client in R3
Exporting Client To Other R3
Importing Client From Other R3

How to Use CCMS free downloads

How to Use CCMS
CCMS Agent Installation
CCMS Monitoring
CCMS rule Based Monitors Configuration Guide For Dummies
CCMS Rule Based Monitors Configuration Guide
CCMS SSNP TRAPS
CCMS Alert Management

BR Tools Screen Shots free download

BR Tools Screen Shots
BR Tools Overview
BR Tools All Tablespace Info
BR Tools Resizing A Data File
BR Tools Starting And Stopping The Database
BR Tools Toogle Archive Mode Log
BR Tools Instance Status
BR Tools Adding Data File To The Table Space
Backup Strategy For Oracle
BR Backup
BR Connect_620
Use of BR Tools
BR Tools To Backup Oracle
BR Tools With Oracle Recovery Manager
EMC Legato_SAPAG
Robot_Oracle_BR Tools
SAP Backup tools
Backup And Recovery Guide
BR Connect
BR Space
BR*tools support for Heterogenous System Copy

Remote Services- OSS- SAP Net- Early Watch

Remote Services- OSS- SAP Net- Early Watch

SAP Router700 free download

SAP Router700

Using Tivoli to manage Large Scale R3 Environment

Using Tivoli to manage Large Scale R3 Environment
SAP R3 System Administration Made Easy - MSSQL Server

SAP System Measurement Guide free download

SAP System Measurement Guide

SAP R3 Administration Press Book free download

SAP R3 Administration Press Book

SAP System Administration Made Easy- MS SQL free download

R3 System Administration
SAP R3 Administration Overview
SAP System Administration Made Easy- MS SQL
Duke R3 SAP Basis Guide

Basis Weeks Material free download

BasisWeek-1 TABC 10-11
BasisWeek-2TABC10-11
BasisWeek-3TABC10-11
BasisWeek-4TABC - 20
BasisWeek-5TABC - 30

System Administration Tasks,SPAM,KERNEL,CLIENT COPY Free download

System Administration Tasks
SPAM,KERNEL,CLIENT COPY,SYSTEM PASSWORD

SAP R3 Handboook Edition -3 Free download

SAP R3 Handboook Edition - 3

T-code sa38

SA38 is used to run programs or reports in SAP. This Tcode is highly critical. This tcode is generally not given to any one int Production and quality environment. Only Virsa firefighter ids and SUPER users has this tcode.
enter SA38 in the command field on top left corner and hit enter key.
Then you will see the screenThen enter the program name and press F8 key or click on execute button
Then you will see the program screen......


After that i hope you know what you are supposed to do.

When you add SA38 to a role menu the following objects gets added
S_PROGRAM
and authorization groups.

the S_PROGRAM object contains the following values
SUBMIT
BTCSUBMIT
VARIANT


SUBMIT allows one to run a program.
BTCSUBMIT allows the user to Schedule a background job for the execution of a program.
VARIANT allows user to maintain variants for the program.
These three can be given depending upon the policy of the customer.
There is another tcode SE38 which has same functionality as SA38 but can do a lot more than sa38

T-code SU24

SU24 gives you the list of authorization objects that are checked when an tocde is executed. For example when you enter tcode mbo2 there are many authorization objects checked for the transaction to be executed successfully. This tcode gives all of the authorization objexts that are checked or included for checking during the execution of this tcode. A security consultant will have acces to su24 transaction. This is helpful when dealing with su53 dumps.
Goto transaction Su24 you will end up with a screen as shown below

Then enter transaction like ME28 ( int the figure different Tcode is used)
and press F8 key. Then you will see the following screen.Here you can see list of objects that has will be checked during execution of the tcode. The objects with proposal values (last column) set to YS will be checked and are added to the profile when the tcode is entered in role menu.
Click on the image to see full view.
And the color indicator (first column) green === globally active
light gray OR DIAMOND shape == globally inactive objects which are not checked in any case.

The objects with proposal YS are checked definitely. The objects with proposal NO will not be checked normally. They will be checked based on the input entered in the tcode.

as you can see the last but one column is global check indicator which indicates whether the object is disabled globally or not.

What is and authorization object

An authorization object is a collection of fields. Each field can have many values.
For example S_TABU_DIS has two fields.

Authorization Field

Long Text

DICBERCLS

Authorization group

ACTVT

Activity


This authorization object is checked when tcode se16 (table display) is executed.

ACTVT is the activity one can do in that tcode. and DICBERCLS is the authorization group for which the ACTVT is valid.

if you have values ACTVT as 3 (display ) and DICBERCLS is "par" you can see all the tables which are included in authorization group par. and if you have ACTVT as 2 (change) then you can edit the tables in authorization group par.

How to lock or unlock transactions in SAP

There are some transactions that has to be locked in some sittuations, like se01 when system maintenance is going on like se01 or there are some critical transactions like scc5 that has to be locked... To lock such transactions we use sm01. After execution sm01 and selecting a particular transaction by entering in the search field





just check the field along the tcode and the transaction code will be locked. TO unlock the tcode just uncheck the check button



The se16 T-code

This code is used to view table data. This is a high data security risk since the user can access confidential data. It also causes performance hit when large tables are viewed. This tcode must be restricted to few users or firefighter ids.

You can see the initial screen. Here we enter the table name to be viewed and hit the enter button and click on the view data button
.



You will see the next selection fields appear as shown below. YOu have to enter your selection criteria so that only selected data can be view. Normally almost all tables are large in size so its better to view only selected data. IF you try to view the whole data of the table it takes long time to display and performance of the server get s hit .


S_TABUS_DIS is checked for authorization of SE16. One can give display activity ( 03) only to and end user for this tcode and authorization group DICERBLS field is also checked. give 03 activity and authorization group which the user belongs to for restricting access.

The user must be in a particular USER group like FI to view FI tables or CO to view CO tables. Without user group assignment one cannot see the respective tables. These user groups are maintained using tcode SUGR. These user groups are different from the logon user groups which has entirely different purpose

How to get the list of users authorized for a Particular TCODE

Goto SUIM then drill down
user --> complex selection criteria --> by transaction authorizations and enter the tcode click on execute button
then you will see a screen as below
Enter the tcode and press F8 key to get the list of users who has authorizations to a particular tcode

How to lock a user in SAP

Goto SU01
enter the userID to be locked in the user field




and click on lock button Then you will see the the following screen if the user is already locked.





click on the unlock button at the bottom left of the window and the user will be unlocked.
to lock a user again enter the user id in the user field and click on lock button
and you will see the following screen





now press on the lock button to lock the user...

you can also lock the user at database level. login to the system database..then run a query to update the USR02 table.
To lock an user.
SQL> UPDATE USR02 SET UFLAG = '64' where BNAME='USERID' AND MANDT='CLIENT'
SQL> COMMIT
To unlock an user use
SQL> UPDATE USR02 SET UFLAG = '0' where BNAME='USERID' AND MANDT='CLIENT'
SQL> COMMIT
Here the different values of uflag have different meaning
UFLAG value

  • 0 ------ Not locked

  • 16 ------ Mystery values

  • 32 ------ Locked by CUA admin

  • 64 ------ Locked by system Administrator

  • 128 ------ Locked due to incorrect logon attempts or too many failed attempts

  • 192 ------ A combination of both. The user is locked by admin and user tries to logon with incorrect passwords and gets locked ( 192 = 64+128)

How to list all transactions executable for a role.

Goto SUIM----> transactions----> executable for role.


and enter the role name and press F8 to get the results.

but this gives only tcode in the menu of the role.
It will not show the tcodes that are added manually to the role in S_TCODE object.
To find all tcode executable for role along with the tcode that are present in the tcd field..
goto se16 enter agr_1251 and click on data browser button
enter the role name in agr_name field and enter tcd in FIELD field ash shown in figure.



Then click on execute button or press F8 to execute and you will see the list of tcodes executable for that role as below

What is a SAP Landscape?

it is a collection of system which are connected throug TMS (transport management system).
The standard and recommend landscape is three system Landscape as shown in figure
Here a new tcode or new program is developed in Development system and is transported to Quality system. Then it is tested on smaple data present in the QA system and then transported to production only if tests are successfull.
The transport flow is

DEVELOPMENT --------> QUALITY -----------> PRODUCTION.
There are no reverse routes.
export(development) ---->import(quality)----> import(production)

nut there are much more complicated landscapes out there..
some contains sandbox systems, some contains demo systems.

Authorization Analysis

  1. Choose the menu path System -> Utilities -> Display Authorization Check or transaction code SU53. You now can analyze an error in your system that just occurred because of a missing authorization.
  2. You can call Transaction SU53 in all sessions, not just in the session in which the error occurred. Authorization errors in other users' sessions, however, cannot be analyzed from your own session.
  3. In the below example, user Bob calls Transaction VA03 (display sales order). The message "You do not have authorization for Transaction VA03" appears. User Bob now chooses transaction code /nSU53 and the system displays the authorization object that was just checked and, for comparison purposes, the values of the object that user Bob has in its user master record. In this case the user Bob don’t have VA03 assigned to any of his role.
  4. Transaction SU56 allows the user to see what current authorizations are in his buffer

authorization_analysis_01

Authorization Trace ST01

You can analyze authorizations as follows: Choose Tools -> Administration -> Monitor -> Traces -> SAP System Trace or Transaction ST01.

Choose trace component Authorization check and pushbutton Trace on. The trace is automatically written to the hard disk.

To limit the trace function to your own sessions, choose Edit -> Filter -> Shared. Enter your user ID in field Trace for user only in the displayed dialog box.

Once the analysis is completed, choose Trace off.

To display the results of the analysis, choose Goto -> Files/Analysis or the pushbutton File listSelect the required file and choose Analyze.

  • The results of the authorization check are displayed in the following format: :=
  • The return code shows whether or not the authorization code was successful.
  • ST01 Return Code

0

Authorization check passed

1

No Authorization

2

Too many parameters for authorization check

3

Object not contained in user buffer

4

No profile contained in user buffer

6

Authorization check incorrect

7,8,9

Invalid user buffer

authorization_analysis_02

Checking your program Background Job Status

Checking your job status with SM50 (processor type BTC) is more accurate then SM37. SAP updates the tables TBTCO wheneveryour background jobs status change. If SAP is shutdown, the currentjobs might not be update ontime to the table. (e.g. a background job wasshown as Active (SM37), in fact it real status should be Cancelled.

The type of work process:

  • DIA - work process for executing dialog steps in user transactions
  • UPD - update process for executing U1 (time-critical) database changes
  • UP2 - update process for executing U2 (non-critical) database changes
  • ENQ - for setting and releasing locks on SAP lock objects
  • BTC - for executing background jobs
  • SPO - for spool formatting processes
PID: Process ID of the work process

How to modify the multiple step program variant?

Go to tcode SM37
- At the Job Overview screen, position your cursor at the scheduled jobs you want to changed (the jobs status must still be Released)

- Click Job -> Change

- Click the Steps button -> here you can move, add or delete addition programs steps to be run

Change the variants or SAP Printers of scheduled background jobs
Change the variants or SAP Printers of scheduled background jobs

- Double click the program name you want to change

- Click the Print specifications button if you want to change the SAP printers

How To Delete a Scheduled Job in sap

I am working in production support and have been asked to stop a scheduled jobs. The job will run on the first of next month and I need to stop it from running.

To delete a job:

Go to Transaction SM37. Select a job (or jobs) from the Select Background Jobs screen. In the Job Overview, mark the job or jobs you want to delete by checking the box to the left of the job name. Choose Job --> Delete.

How To Delete a Scheduled Job

Deleting Jobs That Have Dependent Jobs:

If you delete a job that must be processed before another job can be started, the dependent job can no longer be started. The system will inform you of any such existing dependent, or successor, jobs. You'll then need to either reschedule or delete the dependent job.

If you try to release a job whose predecessor job was deleted, the system sets the status of the job to Planned. To start this job, you must release it and specify the start conditions.

What is the use of Authorization Checks?

To ensure that a user has the appropriate authorizations when he or she

performs an action, users are subject to authorization checks.

The following actions are subject to authorization checks that are performed

before the start of a program or table maintenance and which the SAP

applications cannot avoid:

· Starting SAP transactions (authorization object S_TCODE)

· starting reports (authorization object S_PROGRAM)

· Calling RFC function modules (authorization object S_RFC)

· Table maintenance with generic tools (S_TABU_DIS)

In coming posts, we will see how to add authorization checks for Reports and

transactions.

Today we will discuss about table authorization checks.

Purpose of assigning authorization groups for tables:

You can assign authorization groups to tables to avoid users accessing tables

using general access tools (such as transaction SE16). A user requires not only

authorization to execute the tool, but must also have authorization to be permitted

to access tables with the relevant group assignments. For this case, we deliver

tables with predefined assignments to authorization groups. The assignments

are defined in table TDDAT; the checked authorization object is S_TABU_DIS.

Now we will see how to assign/create authorization group for a table:

Go to SE54, Give the table name and choose authorization group and then click

on create/change. You can

create an authorization group.

Example:

You can assign a table to authorization group Z001. (Use transaction SM30 for

table TDDAT) A user that

wants to access this table must have authorization object S_TABU_DIS in his or

her profile with the value

Z001 in the field DICBERCLS (authorization group for ABAP Dictionary objects).

Authorization Check:

In the earlier post, we came to know the importance of authorization check in real

time environment. We know how to check authorization for table maintenance.

(Please refer earlier post).

Now we will see how to check authorization for Reports, Transactions, RFC

function modules.

The following actions are subject to authorization checks that are performed

before the start of a program or table maintenance and which the SAP

applications cannot avoid:

Starting SAP transactions (authorization object S_TCODE)

 starting reports (authorization object S_PROGRAM)

 Calling RFC function modules (authorization object S_RFC)

 Table maintenance with generic tools (S_TABU_DIS)

The authorization objects S_TCODE, S_PROGRAM, S_RFC, and S_TABU_DIS

are standard SAP provided.

Creating a new authorization object is not in the scope of ABAP developer. It will

be taken care by SAP BASIS team.

To add authorization check to your program, you need to add the following code in

your report. Imagine that you have created a transaction code for your report, then

you should use the authorization object S_TCODE to check the authorization.

You can place the code in initialization event.

*Initialization

INITIALIZATION.

AUTHORITY-CHECK OBJECT 'S_TCODE'

ID 'TCD' FIELD 'ZEXAMPLE'.

IF sy-subrc <> 0. "Not Authorized

MESSAGE e003(ZZ) WITH 'TCD' 'ZEXAMPLE'.

ENDIF.

Here zexample is the transaction code created for the report.

SAP Authorization Concept

The SAP authorization concept is based upon the logical relationship between a user ID and the range of system authorizations with which it can be associated. The architecture of the authorization system is based upon the utilization of several individuals but related logical components: Profiles, Objects, Fields, and Authorizations. The user ID refers exclusively to profiles. Each profile grants a set of specific system access authorizations to user.

Composite Profiles


Composite profiles refer to the various employee roles available in the corporation (for instance: Purchasing / Receiving Clerk or Accounts Agent). As the name suggests, composite profiles may contain multiple user IDs necessary to perform all the business operations associated with a particular role. A composite profile may encapsulate another composite profile(s). In practice, a model composite profile should be recognized for each possible role in the organization, which may be used to produce hybrid composite profiles. The over-existence of the hybrids can defy the very purpose of composite profiles and they should be created only when specific needs arise.


User Ids


User ids allow access to SAP applications. Each user must have a corresponding profile specifically assigned. In many situations, multiple composite profiles can be assigned to a user ID, depending on the role(s) an individual user is responsible for, in the business processes.


Authorizations

Authorizations are the key building blocks of SAP security. Authorization is the process of assigning values to fields present in authorization objects. In SAP, access to all system functionality is achieved through a complex array of authorizations. Sometimes users find that they lack the necessary authorizations to perform a certain function in the system, in which case the message: “You are not authorized…” is displayed at the bottom of the screen.


An authorization process may ask for second associated authorization process which in turn asks for third and so on. For example, the task of paying a vendor invoice may require 10 different authorizations.

Authorization Check

The following actions are subject to authorization checks that are performed

before the start of a program or table maintenance and which the SAP

applications cannot avoid:

 Starting SAP transactions (authorization object S_TCODE)

 starting reports (authorization object S_PROGRAM)

 Calling RFC function modules (authorization object S_RFC)

 Table maintenance with generic tools (S_TABU_DIS)

The authorization objects S_TCODE, S_PROGRAM, S_RFC, and S_TABU_DIS

are standard SAP provided.

Creating a new authorization object is not in the scope of ABAP developer. It will

be taken care by SAP BASIS team.

Listing TCODE transactions used to view what users are logged in to SAP

I want to get a list of all transactions used per user in a specific time period. Basically I’m looking for a list of all users logged in SAP and the details of the tcodes they used. Is there any standard report or tcode available to view this info?

There is no standard transaction. The information is available for configurable time periods using transaction ST05N but it is not organized to readily provide a report of users and transactions. Also the information available summarizes a user’s use of a transaction. There will be one entry (with count data) per user per time period. Daily, weekly and monthly summaries can be created and they are stored for configurable durations.

The information is summarized into a cluster table called MONI based on the STAT files that are written in the file system and regularly refreshed. MONI cannot be queried via SE16 etc., but SAP delivers a number of function modules that retrieve data from these tables.

It is also possible to configure audit logging via SM19 and read the log files via SM20. This will provide more detail but it also introduces new file management issues and requires a change to system settings.

SAP’s TCODE checks with the authorization tool

What are the checks that the SAP authorization tool performs when a TCODE is executed in order to ensure authorization of that user?

When initiating a transaction, a system program performs a series of checks to ensure the user is authorized.

1. The program checks whether the transaction code exists in table TSTC.

2. The program checks whether the transaction code is locked by the administrator (transaction code SM01).

3. The program checks whether the user has the authority to start the transaction. Authorization object S_TCODE (transaction start) contains the authorization field TCD (transaction code). The user must have the appropriate authorization for the transaction code to be started (for example, FK01, Create Vendor).

4. The program checks whether an authorization object is assigned to the transaction code. If this is the case, the program checks whether the user has an authorization for this authorization object. The transaction code/authorization object assignment is stored in table TSTCA.

Note: An SAP program controls steps 1 through 4. It displays an automatic message to the user if an authorization attempt fails in the step.

5. The system performs authorization checks in the ABAP program using the ABAP statement AUTHORITY-CHECK.

What are the Authorizations Required

Administrators who use the Profile Generator require authorization for the following authorization objects: S_USER_AGR Authorization Check for Activity Groups

S_USER_TCD Transaction Assignment of Transactions to Activity Groups

S_USER_GRP User Master Maintenance: User groups

S_USER_PRO User Master Maintenance: Authorization Profile

S_USER_AUT User Master Maintenance: Authorizations

S_USER_VAL Maintenance of Authorization Values in Activity Groups

topics