SAP Authorizations Assignment of critical authorizations and handling of critical users - SAP Basis

Direkt zum Seiteninhalt
Assignment of critical authorizations and handling of critical users
Advantages of authorization tools
In this article, I show you with which transaction you can easily and quickly run the authorization trace in SAP ERP or SAP S/4HANA. The displayed result provides a good overview of the involved authorizations. In this course, existing roles and profiles in authorization management (transaction PFCG) can be extended. In addition, the authorization trace is useful for maintaining authorization default values (transactions SU22 and SU24).

This missing functionality comes with SAP Note 1902038 and can only be recorded via the respective support packages for SAP NetWeaver Releases 7.31 and 7.40. The ZBV's change documents are written for the USER_CUA change document object. The analysis of the change documents can be accessed using the following methods.
Using suggestion values and how to upgrade
If the programme determines that both of the criteria set out in the previous bullet points are met, the criterion of equality shall apply. This means that the proposed values of the permission that is already in place and to be added will come from the same transaction. Thus, the programme does not add a new default permission to the permission tree.

It is essential to implement adequate authorization checks in every ABAP development. For this purpose, the so-called AUTHORITY-CHECK is used, which queries the required authorization object characteristics and thus only allows authorized users to execute the code.

Authorizations can also be assigned via "Shortcut for SAP systems".

You can also change the value of the parameter again at the operating system level.

The only limitation here is that you may not use the namespace of the roles that are interpreted by SAP.
SAP BASIS
Zurück zum Seiteninhalt