SAP Authorizations Security in development systems - SAP Corner

Direkt zum Seiteninhalt
Security in development systems
PRGN_COMPRESS_TIMES
In order to be able to use the following reports, you must not only have the appropriate authorizations, but also be aware that, depending on your SAP release or Notes, some reports are not yet or no longer available. The following reports were executed with release level 7.50.

In order to be able to execute subsequent SAP standard reports, you need authorizations to access certain programs or reports and in the area of role maintenance. The transactions "SA38" and "SE38" for executing programs are of particular importance. They enable a far-reaching system analysis by means of certain programs for the end user. Additional rights associated with this, which can go beyond the basic rights of administrators, have to be controlled by explicit values in a dedicated manner.
Authorization concept - recertification process
You can disable this new behaviour for the SAP_ALL profile by setting the customising switch ADD_S_RFCACL to the value YES in the table PRGN_CUST. If the ADD_S_RFCACL entry is YES, SAP_ALL still contains the total permissions for the S_RFCACL authorization object.

Before you start and define critical permissions, you should identify your core business processes or functions and then map the conflicting processes in meaningful combinations as so-called risk. The RSUSR008_009_NEW report cannot replace a GRC system (GRC = Governance, Risk, and Compliance) with the SAP Access Control component. Rather, this report should be understood and used as an indicator of the current system state. The report identifies the users that have the critical permission combinations defined in the USKRIA table. The identifier, which can also be called a risk ID, describes a combination of authorization objects with field names and field values. These are linked to one of the two operatives AND or OR available.

With "Shortcut for SAP systems" you can automate the assignment of roles after a go-live.

If you want your own developments to meet your security requirements, just like the standard, you must assign table permission groups to the custom tables.

If you want to know more about SAP authorizations, visit the website www.sap-corner.de.


The Selection Conditions tab allows you to specify your restrictive organisational condition in the form of a field and a field value.
SAP Corner
Zurück zum Seiteninhalt