SAP Authorizations ACCESS CONTROL | AUTHORIZATION MANAGEMENT FOR SAP® - SAP Corner

Direkt zum Seiteninhalt
ACCESS CONTROL | AUTHORIZATION MANAGEMENT FOR SAP®
Authorizations
The next step is to evaluate the usage data; here the monthly aggregates are typically sufficient. These include the user ID, function block, and number of calls. For an overview of the usage data already stored in the system, see the SWNC_COLLECTOR_GET_DIRECTORY function block (GET_DIR_FROM_CLUSTER = X input parameter). The actual downloading of the usage data is then performed using the function block SWNC_COLLECTOR_GET_AGGREGATES.

Once you have logged in, the permissions associated with your user (via the user account) will be available. Each of your actions leads to the use of runtime versions of the corresponding objects. This also applies to every privilege and role. Runtime versions of rolls are not transportable in SAP HANA. However, in order to achieve a high quality in the development of your applications, you should use a system landscape with development system (DEV), quality assurance system (QAS) and productive system (PRD). To enable you to translate development results to QAD and PRD, SAP HANA Studio provides you with the opportunity to create objects in a (freely definable) Design Time Repository that you can provide and transport via Delivery Units to other systems.
Risk: historically grown authorizations
Database Schema Privileges permissions: Schema Privileges are SQL object permissions that control access to and modification of a (database) schema, including the objects contained in that schema. A user who has an Object Privilege for a schema also has the same Object Privilege for all objects in that schema.

The convenience of configuring and evaluating the Security Audit Log has been improved. For this purpose, the maximum number of marked messages in the detail selection has been increased to 40 events, a forward navigation for the displayed objects has been added and the details selection in transaction SM20 has been supplemented with the technical event names. You will find the corrections and an overview of the required support packages in SAP Note 1963882.

The possibility of assigning authorizations during the go-live can be additionally secured by using "Shortcut for SAP systems".

In this case, you need a public key pair for your ABAP system, which is stored as a Personal System Security Environment (PSE).

The website www.sap-corner.de offers a lot of useful information about SAP authorizations.


It is also possible to enter an authorization object several times in the role using the MANUAL button.
SAP Corner
Zurück zum Seiteninhalt