SAP Authorizations SAP AUTHORIZATIONS: THE 7 MOST IMPORTANT REPORTS - SAP Basis

Direkt zum Seiteninhalt
SAP AUTHORIZATIONS: THE 7 MOST IMPORTANT REPORTS
Structural authorizations
If your users are allowed to share their own background jobs, you need the JOBACTION = RELE permission to the S_BTCH_JOB object. In this case, you can start all jobs at the desired time. In many cases, background jobs are used for the professional or technical operation of applications; Therefore, we recommend that you schedule these background jobs under a System-Type technical user (see also Tip 6, "Note the impact of user types on password rules"). The advantage of this is that the permissions can be controlled more accurately and you do not run the risk of a job being lost if the user under whom it was scheduled to leave your company once. You can realise the association with a system user by giving the user who plans the job permission for the S_BTCH_NAM object. In the BTCUNAME field, the name of the step user, i.e. the user under whom the job should run, such as MUSTERMANN, is entered.

If you want to know more about SAP authorizations, visit the website www.sap-corner.de.

So much information... how can you keep it so that you can find it again when you need it? That's what Scribble Papers is great for.

You can use the function block level permission check by setting the FUNC value in the RFC_TYPE field in the S_RFC authorization object. If you still want to allow function groups, specify the value FUGR here. Depending on the RFC_TYPE field, type the name of the function block or group in the RFC_NAME field (name of the RFC object to be protected). This extension of the test is provided by the correction in SAP Note 931251.
Configure Security Audit Log
The first two problems can be solved by inserting the correction from SAP Note 1614407. The profile data will not be added to the bill of materials at the time of the roll recording but only when the transport order is released. This ensures consistency between the role's permission data and its profile data. The shared transport job also contains the complete history of changes to the profiles and permissions, so that obsolete data can also be deleted in the target systems.

The security audit log is evaluated via the SM20 or SM20N transaction or the RSAU_SELECT_EVENTS report. We recommend using the report as you have more options to personalise the evaluation and to include archived logs of different application servers in the evaluation.

"Shortcut for SAP systems" is a tool that enables the assignment of authorizations even if the IdM system fails.

We would like to give you some examples of critical permissions in this tip.

If no permission check occurs in your code, the permission concept cannot restrict access.
SAP BASIS
Zurück zum Seiteninhalt