SlideShare una empresa de Scribd logo
1 de 12
Users & Authorization
    Users must be setup and roles assigned to user
     master records before you can use the SAP
     System.
    A user can only log on to the system if he or she
     has a user master record. A user menu and
     authorizations are also assigned to the user
     master record via one or more roles.
Users in the R/3 Environment
Present.



                                     Operating System   OS User
 Server




                                                        R/3 User
Application




                                     Operating System   OS User
  Server




                  Dispatcher


              D    B    V      ...
                                                        Admin. User
  Database Server
Database




                                     Operating System   OS User
 Server




                                                        DB User
The User Master Record



                 All user data required for
                R/3 System access is stored
                 in the user master record
                     in eight categories
Types of users
Authorization Concept
     User master record                      User master record

          Profile                                  Profile

        Authorization                           Authorization
         for Task A                              for Task B



     Action                                                  Action


                        Transaction permitted?

                    Authorizations assigned?

                    Objects needing protection

              Vendor              Material
        Company code                                 Plant
Authorization Check
       SAP GUI
                  Dynpro



                 Authority     User
                  Check       Context



                   OK?          No



                              Message
                    Yes



                 Processing
Authorization

                                    Customer company code:
             Authorization object       Authorization A
  Object
  class       Object: Customer             0001-0009
               company code
 Financial                              display, change
                Company Code
Accounting
                   Activity         Customer company code:
                                        Authorization B

                                               *


                                            display
Object         Fields     Value   Meaning
  User Master                01      Create
                  ACTIVITY
 Maintenance:                02      Change
 Authorizations              03      Display
(S_USER_AUT)                 06      Delete
                             07      Activate
                             08      Display change documents
                             22      Assign authorization profiles
                             24      Archive



                  AUTH               Limited name space
                                     for the assignment
                                     of authorization names



                  OBJECT             Authorization objects
Central User Administration
With central user administration, the
creation and maintenance of all user
master data is performed in a single
R/3 System
                                        Client 100   QAS System
                                        Client 200




      Client 100
      Client 200
      Client 300




                                                     PRD System
     DEV System                         Client 100
Information System

Más contenido relacionado

La actualidad más candente

N(i)2 technical architecture 2.0 (v1 1)
N(i)2 technical architecture 2.0 (v1 1)N(i)2 technical architecture 2.0 (v1 1)
N(i)2 technical architecture 2.0 (v1 1)
kvz
 
Business Solutions Using Office Share Point Server2007
Business Solutions Using Office Share Point Server2007Business Solutions Using Office Share Point Server2007
Business Solutions Using Office Share Point Server2007
LiquidHub
 

La actualidad más candente (9)

User Guide for Sales Reps and Dealers by Amasty
User Guide for Sales Reps and Dealers by AmastyUser Guide for Sales Reps and Dealers by Amasty
User Guide for Sales Reps and Dealers by Amasty
 
Vb
VbVb
Vb
 
N(i)2 technical architecture 2.0 (v1 1)
N(i)2 technical architecture 2.0 (v1 1)N(i)2 technical architecture 2.0 (v1 1)
N(i)2 technical architecture 2.0 (v1 1)
 
Business Solutions Using Office Share Point Server2007
Business Solutions Using Office Share Point Server2007Business Solutions Using Office Share Point Server2007
Business Solutions Using Office Share Point Server2007
 
Jsf
JsfJsf
Jsf
 
Java EE Services
Java EE ServicesJava EE Services
Java EE Services
 
Javabeans .pdf
Javabeans .pdfJavabeans .pdf
Javabeans .pdf
 
Verschillenlijst exact synergy asp vs exact synergy enterprise
Verschillenlijst exact synergy asp vs exact synergy enterpriseVerschillenlijst exact synergy asp vs exact synergy enterprise
Verschillenlijst exact synergy asp vs exact synergy enterprise
 
MAIstro™ Admin Module
MAIstro™ Admin ModuleMAIstro™ Admin Module
MAIstro™ Admin Module
 

Destacado

Destacado (6)

SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications Webinar
 
SAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview PresentationSAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview Presentation
 
Authorisations in SAP: best practices
Authorisations in SAP: best practicesAuthorisations in SAP: best practices
Authorisations in SAP: best practices
 
SAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data securitySAP HCM authorisations: streamline processes and improve HR data security
SAP HCM authorisations: streamline processes and improve HR data security
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 

Similar a 6 7-users-authorization

157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf
157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf
157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf
RobertMarcinov1
 
Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017
Amazon Web Services
 
Towards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingTowards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computing
Rahid Abdul Kalam
 
Design for Compliance - AWS FS Cloud Symposium Apr 2019.pdf
Design for Compliance - AWS FS Cloud Symposium Apr 2019.pdfDesign for Compliance - AWS FS Cloud Symposium Apr 2019.pdf
Design for Compliance - AWS FS Cloud Symposium Apr 2019.pdf
Amazon Web Services
 

Similar a 6 7-users-authorization (20)

157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf
157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf
157265792-Advanced-Features-of-SAP-BW-Reporting-Authorizations.pdf
 
Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
 
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech TalksDeep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
 
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech TalksDeep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
 
Deconstructing SaaS: Deep Dive into Building Multi-Tenant Solutions on AWS (A...
Deconstructing SaaS: Deep Dive into Building Multi-Tenant Solutions on AWS (A...Deconstructing SaaS: Deep Dive into Building Multi-Tenant Solutions on AWS (A...
Deconstructing SaaS: Deep Dive into Building Multi-Tenant Solutions on AWS (A...
 
Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...
Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...
Deconstructing SaaS: A Deep Dive into Building Multi-tenant Solutions on AWS ...
 
Discover what´s new in Windows 8 Active Directory
Discover what´s new in Windows 8 Active DirectoryDiscover what´s new in Windows 8 Active Directory
Discover what´s new in Windows 8 Active Directory
 
Amazon Cognito Deep Dive
Amazon Cognito Deep DiveAmazon Cognito Deep Dive
Amazon Cognito Deep Dive
 
Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017
 
Raleigh DevDay 2017: Managing User Onboarding, Sign-up, Sign-in, Identity and...
Raleigh DevDay 2017: Managing User Onboarding, Sign-up, Sign-in, Identity and...Raleigh DevDay 2017: Managing User Onboarding, Sign-up, Sign-in, Identity and...
Raleigh DevDay 2017: Managing User Onboarding, Sign-up, Sign-in, Identity and...
 
Cognito Customer Deep Dive
Cognito Customer Deep DiveCognito Customer Deep Dive
Cognito Customer Deep Dive
 
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
 
Towards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingTowards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computing
 
Less07 Users
Less07 UsersLess07 Users
Less07 Users
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...
 
Journey through the Cloud - Best Practices Getting Started in the AWS Cloud
Journey through the Cloud - Best Practices Getting Started in the AWS CloudJourney through the Cloud - Best Practices Getting Started in the AWS Cloud
Journey through the Cloud - Best Practices Getting Started in the AWS Cloud
 
Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...
 
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
 
Design for Compliance - AWS FS Cloud Symposium Apr 2019.pdf
Design for Compliance - AWS FS Cloud Symposium Apr 2019.pdfDesign for Compliance - AWS FS Cloud Symposium Apr 2019.pdf
Design for Compliance - AWS FS Cloud Symposium Apr 2019.pdf
 

Más de sanganiraju

17 sap-memory-management (1)
17 sap-memory-management (1)17 sap-memory-management (1)
17 sap-memory-management (1)
sanganiraju
 
16 performance-tuning
16 performance-tuning16 performance-tuning
16 performance-tuning
sanganiraju
 
14 support-packs
14 support-packs14 support-packs
14 support-packs
sanganiraju
 
13 monitor-analyse-system
13 monitor-analyse-system13 monitor-analyse-system
13 monitor-analyse-system
sanganiraju
 
11 transport-system
11 transport-system11 transport-system
11 transport-system
sanganiraju
 
10 background-processing
10 background-processing10 background-processing
10 background-processing
sanganiraju
 
9 print-spool-system
9 print-spool-system9 print-spool-system
9 print-spool-system
sanganiraju
 
8 operation-modes
8 operation-modes8 operation-modes
8 operation-modes
sanganiraju
 
4 5-profile-and-startup (2)
4 5-profile-and-startup (2)4 5-profile-and-startup (2)
4 5-profile-and-startup (2)
sanganiraju
 
3 installation-setup-of-r3
3 installation-setup-of-r33 installation-setup-of-r3
3 installation-setup-of-r3
sanganiraju
 
1 basis technical-overview (2)
1 basis technical-overview (2)1 basis technical-overview (2)
1 basis technical-overview (2)
sanganiraju
 
18 sap-table-buffers
18 sap-table-buffers18 sap-table-buffers
18 sap-table-buffers
sanganiraju
 

Más de sanganiraju (15)

17 sap-memory-management (1)
17 sap-memory-management (1)17 sap-memory-management (1)
17 sap-memory-management (1)
 
16 performance-tuning
16 performance-tuning16 performance-tuning
16 performance-tuning
 
15 rfc
15 rfc15 rfc
15 rfc
 
14 support-packs
14 support-packs14 support-packs
14 support-packs
 
13 monitor-analyse-system
13 monitor-analyse-system13 monitor-analyse-system
13 monitor-analyse-system
 
12 client-tools
12 client-tools12 client-tools
12 client-tools
 
11 transport-system
11 transport-system11 transport-system
11 transport-system
 
10 background-processing
10 background-processing10 background-processing
10 background-processing
 
9 print-spool-system
9 print-spool-system9 print-spool-system
9 print-spool-system
 
8 operation-modes
8 operation-modes8 operation-modes
8 operation-modes
 
4 5-profile-and-startup (2)
4 5-profile-and-startup (2)4 5-profile-and-startup (2)
4 5-profile-and-startup (2)
 
3 installation-setup-of-r3
3 installation-setup-of-r33 installation-setup-of-r3
3 installation-setup-of-r3
 
2 system-kernel
2 system-kernel2 system-kernel
2 system-kernel
 
1 basis technical-overview (2)
1 basis technical-overview (2)1 basis technical-overview (2)
1 basis technical-overview (2)
 
18 sap-table-buffers
18 sap-table-buffers18 sap-table-buffers
18 sap-table-buffers
 

6 7-users-authorization

  • 1. Users & Authorization Users must be setup and roles assigned to user master records before you can use the SAP System. A user can only log on to the system if he or she has a user master record. A user menu and authorizations are also assigned to the user master record via one or more roles.
  • 2. Users in the R/3 Environment Present. Operating System OS User Server R/3 User Application Operating System OS User Server Dispatcher D B V ... Admin. User Database Server Database Operating System OS User Server DB User
  • 3. The User Master Record All user data required for R/3 System access is stored in the user master record in eight categories
  • 4.
  • 6. Authorization Concept User master record User master record Profile Profile Authorization Authorization for Task A for Task B Action Action Transaction permitted? Authorizations assigned? Objects needing protection Vendor Material Company code Plant
  • 7. Authorization Check SAP GUI Dynpro Authority User Check Context OK? No Message Yes Processing
  • 8. Authorization Customer company code: Authorization object Authorization A Object class Object: Customer 0001-0009 company code Financial display, change Company Code Accounting Activity Customer company code: Authorization B * display
  • 9. Object Fields Value Meaning User Master 01 Create ACTIVITY Maintenance: 02 Change Authorizations 03 Display (S_USER_AUT) 06 Delete 07 Activate 08 Display change documents 22 Assign authorization profiles 24 Archive AUTH Limited name space for the assignment of authorization names OBJECT Authorization objects
  • 10.
  • 11. Central User Administration With central user administration, the creation and maintenance of all user master data is performed in a single R/3 System Client 100 QAS System Client 200 Client 100 Client 200 Client 300 PRD System DEV System Client 100

Notas del editor

  1. This unit focuses on the R/3 user within the R/3 System. However, it is important for the R/3 System administrator to control access to both the operating system (OS) where the R/3 Systems reside and the database (DB). External user IDs exist both at the OS and DB levels that can be used to disrupt normal operation of the R/3 System. Access to the R/3 System is controlled at the client level. Each R/3 user must have a user master record in the client in which that user will work. In R/3, authorizations are used to restrict access to programs and data. This unit focuses on: The creation of user master records Authorization profiles Controlling access to transactions and data in the R/3 System
  2. To create and maintain user master records, use transaction SU01 . For each user, the user master record contains all data and settings required for client access for the user. This data is arranged with tabs and includes the following: Address : basic user information such as name, physical location, and telephone number Login date : password information as well as the validity period for the record Defaults : defined default values for start menu, date format, printers, and so on Parameters : defined default values (PIDs) for R/3 fields such as company code 001 Systems : central user administration system information Activity Groups : defined activity groups (with validity period) associated with user Profiles : all profiles assigned to user master record, including standard profiles and profiles generated by the profile generator Groups : all user groups associated with the user master record Tab Systems only appears if central user administration is activated. Current status and change history can be displayed for the current record. To access a detailed change history outlining all change to the user master record, use transaction SUIM .
  3. In R/3, for each user who requires access in a client, the authorization administrator creates a user master record for that user in that client. The user master record includes one-to-many (1-n) profiles containing all the authorizations needed by the user to perform tasks in the specified client. An authorization provides the permission(s) required to access certain transactions, reports, or data. For each user activity or transaction, an authorization check is performed to see if the required authorizations have been assigned to that user. Authorizations limit access to transactions and objects in the R/3 System that need protection, for example, a company code or vendor. The R/3 authorization concept enables authorizations to be assigned at the transaction level. If a user who is not authorized to perform a certain task attempts to run the corresponding transaction, R/3 sends a message denying access to that transaction. Authorization checks are performed at various points during the execution of a transaction or report to verify that the user has the required authorization(s) for the objects requested. For example, R/3 may check if the user is authorized to access data for company code 001.
  4. When a user logs on to the R/3 System, all authorizations in the profiles assigned to the corresponding user master record are loaded into the user buffer for the application server to which the user is connected. Once the dispatcher assigns the user request to an available dialog work process, the relevant program is loaded and the user context is checked to see if the user has the necessary authorizations. The user context contains the user authorizations. These are checked against the authorization objects called in the authority check specified in the ABAP code. The user authorizations are checked using OR logic to determine if an exact match exists. If the required authorization exists the user is allowed to proceed and processing continues. If none of the authorizations contain the required combination of field values, a message is sent denying the user access to that object. Once the dialog step has been completed, the user context for the user is rolled out of the dialog process and the process is free to work for another user. The user context remains in the user buffer and is available for use during the next dialog step. To adjust or cancel authorization checks either globally or for individual transactions, the authorization administrator must use transaction SU24 . Checks can be adjusted, for example, if detailed authorization checks are not needed in certain transactions. To adjust or cancel checks, set profile parameter auth/no_check_in _some_cases to value Y (this is the system default value in Release 4.6).
  5. 5 5 To maintain authorizations, run transaction SU03. The initial screen lists various object classifications. An object class is a logical grouping of authorization objects that share a similar purpose or business area. For example, object class Basis: Administration contains authorization objects that control access to Basis transactions. The authorization object is the template from which the authorization is created. It is used in the ABAP code for authorization checks. Each object has up to 10 fields that are checked using AND logic before access is granted to the desired transaction. The authorization administrator creates authorizations from the authorization object. The authorizations contain the field values (permissions) for each field contained in the object. Field values control access to the business area or data addressed by the transaction. To create or change an authorization, enter or change the relevant values in the fields of the authorization. All authorizations are positive, in that they grant permissions to the user.
  6. The graphic lists the authorization objects that are checked when working with the Profile Generator and when maintaining users: S_USER_AUT (create and change authorizations, enter authorizations in profiles, ...)
  7. 31 Managing users across the system landscape can become a complex task. Central User Administration enables you to maintain user master records in a central repository and easily access: An overview of all users Existing user groups Systems defined within the system group Activity groups Central User Administration allows you to maintain user master records within a single client on the central system and distribute this information to all systems in your landscape. In this context, the central system is defined as an R/3 System that keeps and controls user master data for the entire system landscape. Reasons for using Central User Administration include: The system landscape is complex, with several clients in different systems The same user works in more than one system The same user ID should represent the same individual in all systems An enormous effort is otherwise required to synchronize user data in all systems To access Central User Administration, use transaction SCUM . For more information on Central User Administration, take SAP Basis Class BC305 Advanced Administration.
  8. The information system provides a basis for conducting detailed analysis of user master records, profiles, authorizations, and activity groups. To access the information system, use transaction SUIM . The information system report tree enables you to access the standard delivered SAP user analysis reports. You can search in these reports using complex search criteria that provide detailed information on: Users Profiles Authorization objects Authorizations Transactions User master record comparisons Change documents To identify pre-delivered reports from SAP for Users and User Administration, call transaction SE38 . Enter RSUSR* in the program field and select the down arrow. This provides a listing of the user reports. To obtain detailed information on a report, select the report and view the documentation written by the developer.