SAP Authorizations The SAP authorization concept - SAP Stuff

Direkt zum Seiteninhalt
The SAP authorization concept
Note the effect of user types on password rules
Versions are the change documents within the development environment, for example, for changes to ABAP source code or the technical properties of tables. This authorization should only be assigned to an emergency user.

As in other systems, user maintenance and role/profile assignment must be restricted to the group of user administrators. In contrast to the previous systems, however, roles and profiles are maintained here, so that appropriate rights must be assigned to the role/profile administrators.
Maintaining Authorization Objects (Transaction SU21)
Authorizations are assigned to users in SAP systems in the form of roles. The goal is to create a system that is as secure as possible and to keep the complexity and number of roles as low as possible. This is the only way to achieve a balanced cost-benefit ratio.

If you do not see the Expert Mode button for step 2 in the SU25 transaction, check whether you can call the expert mode from the SU24 transaction by clicking the Sample Value Match button. In this view, it is possible to select the proposed values to be matched by specific selections, so that not all proposed values are used for matching. In the first selection, you can choose the data to take. You can select here whether only SAP standard applications or customer or partner applications should be considered. You can still limit the selection by type of application, package, or component shortcut in the Other Constraints pane. In the Application Search pane, you can also limit the SU22 data to an upload file, transport jobs, or role menus.

With "Shortcut for SAP systems" you can automate the assignment of roles after a go-live.

These are the authorization objects that allow access to data.

The website www.sap-corner.de offers a lot of useful information about SAP authorizations.

Nevertheless, it provides good guidance for the initial resolution of security gaps.
SAP Stuff
Zurück zum Seiteninhalt