SAP Authorizations Dissatisfaction and unclear needs in the process

Direkt zum Seiteninhalt
Dissatisfaction and unclear needs in the process
Schedule PFUD transaction on a regular basis
SAP authorizations are a security-critical and thus an immensely important topic in companies. They are used not only to control the access options of users in the SAP system, but also the external and internal security of company data depends directly on the authorizations set.

Personally, I'm a big fan of the role-based authorizations in SAP SuccessFactors and I'm glad the system has such extensive capabilities. To review your need for action in this area, I advise you to ask yourself the following questions: Do you know which users get which SAP authorizations and why? Can you explain the concept to your data protection officer? Is it easy for you to introduce a new process because you know how the authorizations work? If you have to answer "no" here (several times), I recommend you to dedicate yourself to the topic. It will make their lives easier in the future. If you need help with this, feel free to contact us!
SU2X_CHECK_CONSISTENCY & SU24_AUTO_REPAIR
Login with user and password of another application (such as an AD or portal) In this case, the Web application must be able to obtain a unique SAP user ID to the login data. You should choose an application where the user does not easily forget his password.

Further changes can be found when using the proof of use. When you click on the button (proof of use), you will receive a new selection. You can check which permissions, SU24 suggestion values, or SU22 suggestion values the authorization object uses. The ABAP-Workbench selection, as in previous releases, provides you with the proof of use for implementing the authorization object in programmes, classes, and so on. You can use the SAP NEW Data button to mark whether this authorization object is relevant to an SAP New role of a particular release.

With "Shortcut for SAP systems" you can automate the assignment of roles after a go-live.

If you want to get more information about SAP basis, visit the website www.sap-corner.de.


This also increases the dependency on the external tool, and the authorisation system is further removed from the SAP standard and the best practices recommended by SAP in role management.

To store all the information on the subject of SAP - and others - in a knowledge database, Scribble Papers is suitable.


Essential to the permission technique are database objects such as tables and views - which allow access to the stored data - as well as executable procedures and users.
Zurück zum Seiteninhalt