The Authorization Concept
Introduction on Authorizations- Authorization objects enable complex checks of an authorization, which allows a user to carry out an action. An authorization object can group up to 10 authorization fields that are checked in an AND relationship.
- For an authorization check to be successful, all field values of the authorization object must be maintained accordingly. The fields in an object should not be seen as input fields on a screen. Instead, fields should be regarded as system elements, such as infotypes, which are to be protected.
- You can define as many system access authorizations as you wish for an object by creating a number of allowed values for the fields in an object. These value sets are called authorizations. The system checks these authorizations in OR relationships.
Authorization:
Authorization means permission to perform a particular function in the sap system. It is achieved by assigning authorization profiles to users.
Authorization Field:
1.It is an element which requires protection.
2.The is the least granular field against which SAP system is protected.
3.These fields are associated with the data elements of the ABAP/4 dictionary
4.This is defined in the transaction SU20.
5.Data Element: It is least granular element which has a valuable name defined by length and type.
Activity:
1.It is defined the type of action which can be performed an authorization field. Example: Create, Modify, Delete, Display, Approve, Save, Reverse, Print, etc.
2.Activities are defined in the table.
Authorization Object:
1. R/3
uses authorization objects to assign authorizations to users.
2. An
authorization object is a template for an authorization.
For example, authorization object F_SKA1_BUK - G/L Account: Authorization for company codes requires
the specification of two field values: Company Code and Activity. To allow a
General Ledger supervisor to create a general ledger master record, he/she must
be assigned an authorization to create (Activity 1) accounts for a specific
company code (eg. Company Code 2000). Such an authorization is created using
the object F_SKA1_BUK by assigning these field values and naming the
authorization following an appropriate convention (eg. Z_SCC20001).
3. The
Authorization object defines an activity that needs to be protected in the SAP
System.
4. An
authorization object groups together upto 10 authorization fields that are
checked together in an authorization check.
5. Authorization
objects are defined in transaction SU21 (Most are
in-built)
Object Class:
1. Depending
on Application Area, Group of relevant authorization objects are grouped into
an object class.
2. These
are defined in transaction SU22.
Authorizations:
1. Authorization
is used to define permitted values for the fields of an authorization object.
2. Authorizations
are defined in SU20.
Authorization Profiles:
1. As
a rule authorizations are not directly assigned to a user. Instead these
authorizations are clubbed in an authorization profile and are then assigned to
the user master records.
2. A
group of not more than 150 authorizations is called an authorization profile.
3. Before
4.6c version, profiles created manually in SU02. From 4.6c onwards, profiles are generated
using Profile Generator.
This post is probably where I got the most useful information for my research. Thanks for posting, maybe we can see more on this.
ReplyDeleteAre you aware of any other websites on this
sap-security Online training
Well, Good information you have placed and useful too. Just now I saw your blog and it is nice and good SAP GRC ONLINE TRAINING
ReplyDeleteThanks for sharing this Information, Got to learn new things from your Blog on SAP HR.
ReplyDeleteRef link : http://thecreatingexperts.com/sap-hr-training-in-chennai/
SAP HR
Thank you. for Sharing Great Information. It is Very Helpful Information on sap training videos.
ReplyDeleteIt was so nice article.I was really satisfied by seeing this article sap training video tutorial.
ReplyDeleteI am glad that I saw this post. It is informative blog for us and we need this type of blog thanks for share this blog, Keep posting such instructional blogs and I am looking forward for your future posts.
ReplyDeleteCyber Security Projects for CSE
JavaScript Training in Chennai
Project Centers in Chennai for CSE
JavaScript Training in Chennai
Thank you. sir, Really I like your post on s4 hana server access india.
ReplyDelete