SAP Authorizations Bypass Excel-based Permissions Traps - SAP Stuff

Direkt zum Seiteninhalt
Bypass Excel-based Permissions Traps
Background processing
This only takes into account the applications that are maintained in the role menus of the selected PFCG roles. If you have set the check for Only applications with changed SU22 data, only applications where the suggestion values have been changed by an import, e.g. by Support Packages or Enhancement Packages, will be used. Take the step to take the data from the SU22 transaction by selecting your applications. You will now get a list of applications that you need to match. Select the rows that the applications to match. The buttons in the menubar help you to adjust.

Depending on the configuration of root data and processes, different permission checks can be relevant, so that it makes sense to adjust the proposed values. If custom applications have been created in the form of Z-transactions, Web-Dynpro applications, or external services, you must maintain suggestion values for these applications to avoid having manual permissions in the PFCG roles. You must ensure that custom applications are not always visible in the SU24 transaction. This is the case for TADIR services and external services. To learn how to make these services available for suggestion maintenance, see Tip 38, "Use the SU22 and SU24 transactions correctly.".
System trace function ST01
Only adding an authorization object via SU24 does not automatically result in a check within the transaction. The developer has to include an authorization check exactly for this object in the program code.

"Shortcut for SAP systems" is a tool that enables the assignment of authorizations even if the IdM system fails.

At "www.sap-corner.de" you will also find a lot of useful information on the subject of SAP authorizations.

Step 2d (Show Modified Transaction Codes) lists all roles that have been found to use an old transaction code.

SAP Stuff
Zurück zum Seiteninhalt