SAP Authorizations Authorization concepts in SAP systems - SAP Stuff

Direkt zum Seiteninhalt
Authorization concepts in SAP systems
SAP Authorizations - Overview HCM Authorization Concepts
You can also evaluate the application log through the SLG1 (ATAX object) transaction; the output of the report CA_TAXLOG seems more useful here. Finally, we have some important information for you: There are individual programmes that can be used read-only, but also offer options for updates to the database. In these cases, additional logic was implemented (e.g. in SAP Note 925217 to the RFUMSV00 programme for the sales tax pre-reporting). Action log data can be accessed via the transaction SLG2 (Object: ATAX) (see also SAP Note 530733). If you want to customise for the annual permissions directly in the production system (so-called "current setting"), the SAP Note 782707 describes how to do this. Basic information about Current Settings is provided in SAP Notes 135028 and 356483. SAP Note 788313 describes in detail the functional components of the time-space test and the additional logging and also serves as a "cookbook" to use in customer-specific developments. How you can prevent access to the SAP menu and only show the user menu to the user, we described in Tip 47, "Customising User and Permissions Management".

Structural authorizations work with SAP HCM Organizational Management and define who can be seen, but not what can be seen. This is done based on evaluation paths in the org tree. Structural authorizations should therefore only be used together with general authorizations. Just like the general authorizations in SAP ECC HR, they enable regulated access to data in time-dependent structures. An authorization profile is used to determine the authorization. In addition, it is defined how the search is carried out on the org tree.
What to do when the auditor comes - Part 2: Authorizations and parameters
Until now, there were no ways to define different password rules or password change requirements for these users. Today, this is possible with the security guidelines that you assign to users and clients. In the following we will show you how to define security policies and how they work.

The possibility of assigning authorizations during the go-live can be additionally secured by using "Shortcut for SAP systems".

At "www.sap-corner.de" you will also find a lot of useful information on the subject of SAP authorizations.

The Roles button (Use in Single Roles) identifies all the roles that the selected application contains and displays them directly in the SU24 transaction.

SAP Stuff
Zurück zum Seiteninhalt