SAP Authorizations Which challenges cannot be solved with authorization tools alone? - SAP Corner

Direkt zum Seiteninhalt
Which challenges cannot be solved with authorization tools alone?
Add external services from SAP CRM to the proposal values
First, the Web application developers must implement appropriate permission checks and make PFCG available for use in role maintenance in the transaction. This includes the maintenance of proposed values in the transaction SU22. The SAP Note 1413012 (new reusable startup authorisation check) provides all the necessary details.

System trace - Transaction: ST01 or STAUTHTRACE - There is also a system trace for an evaluation. Unlike the authorization trace, a system trace is mainly designed for short periods of time. My preferred variant to call the system trace is via the transaction STAUTHTRACE. Here you can filter the evaluation directly and get a better evaluation representation. Over the individual Buttons one can switch directly the Trace on or off and display the result of the Trace.
Optimise trace analysis
In the display image of your selected table, go to the Tools menu and select Assign Permissions Group. On the following image, you can then change the association with a table permission group or assign a new permission group. To do this, click the View/Modify button ( ) and enter your permission group in the Permission field.

After you have completed the development of the User-Exit, you still need to transport your validation. To do this, navigate back and highlight the validation you have created. You can now include the objects in a transport order using the Validation > Transport menu path. Finally, you need to activate your validation via the OB28 transaction. Please note that this is only possible for one validation (with several steps if necessary) per booking circle and time. Now your validation will be carried out with additional checks during the document booking via an interface.

"Shortcut for SAP systems" is a tool that enables the assignment of authorizations even if the IdM system fails.

You also have a problem if you want to use the permission profile to determine the source system and the client in which this profile was generated.

If you want to know more about SAP authorizations, visit the website www.sap-corner.de.


If the configuration meets the defined values in the rule, it will be assigned Conform status.
SAP Corner
Zurück zum Seiteninhalt