SAP Security Questions
SAP Security Questions
SAP SECURITY
INTERVIEW
QUESTIONS
The table USOBT_C defines each transaction and for each authorization object which
default values an authorization created from the authorization object should have in the
Profile Generator.
Q3. What authorization are required to create and maintain user master records?
A. The following authorization objects are required to create and maintain user master
records:
A Service user - Only user administrators can change the password. No check for
expired/initial passwords. Multiple logon permitted
System users are not capable of interaction and are used to perform certain system
activities, such as background processing, ALE, Workflow, and so on.
A Reference user is, like a System user, a general, non-personally related, user. Additional
authorizations can be assigned within the system using a reference user. A reference user
for additional rights can be assigned for every user in the Roles tab.
The higher-level role passes on its authorizations to the derived role as default values which
can be changed afterwards.
Organizational-level definitions are not passed on. They must be created anew in the
inheriting role. User assignments are not passed on either.
Derived roles are an elegant way of maintaining roles that do not differ in their functionality
(identical menus and identical transactions) but have different characteristics with regard to
the organizational level. Follow this link for more info
Composite roles do not contain authorization data. If you want to change the authorizations
(that are represented by a composite role), you must maintain the data for each role of the
composite role.
Creating composite roles makes sense if some of your employees need authorizations from
several roles. Instead of adding each user separately to each role required, you can set up a
composite role and assign the users to that group.
The users assigned to a composite role are automatically assigned to the corresponding
(elementary) roles during comparison.
The benefit of transaction SU24 occurs when transactions are added to or deleted from
Role Groups using the Profile Generator.
When new transactions are added, the Profile Generator will add all authorization values
maintained in SU24 for the transaction(s).
When deleting a transaction the Profile Generator will remove all authorization values that
are maintained in SU24 for the transaction.
Activities performed:
Do not Check NO Do not Check The object will not be inserted into the
roles and there will not be any check
performed during runtime of the
transaction
Q10. How can I track the impact of SU24 changes on role groups?
A. Authorization objects are maintained in SU24 for a particular transaction code. When a
transaction code is added to the role, only the authorization objects having check as check
indicator value and yes as proposal value, maintained for that t code will be added into the
role group.
Q11. What are the best practices for adding Tcodes to a role?
A. When a new tcode is added to a role, going in either change authorization data or expert mode
provides the same result. All the authorizations maintained for the tcode at the SU24 level are
added to the role.
The program adds new standard authorizations for objects in the roles If the authorization
default values contain objects that previously did not exist Or only had authorizations in the
status changed or Manual
A new standard authorization is not included if the authorization fields contain identical
authorizations in the status Standard in both authorizations, and the fields maintained in the old
authorizations are empty in the new standard authorization.
If there were already authorizations in the status Maintained (active or inactive) or Inactive
Standard before the merge, the program compares the values and the maintenance status of
all authorization fields to determine whether new standard authorizations must be extended.
Q13. What are the considerations I need to make before changing SU24 values for a Tcode?
A. If the authorization data is changed for any tcode in SU24 and tcode is already present in
the role, then going into the expert mode with the option “read old data and compare with
new data” will only reflect the additional changes. Change authorization data will not pull
the new data for that code maintained at the SU24 level
Q14. What are the steps involved in removing Tcodes from a role in SAP Security?
A. When you remove transactions from the role menu, this has the following effect on the
authorizations.
A standard authorization for which the associated transaction was removed from the
role menu is removed during the merge unless at least one other transaction that
remains in the menu uses the same authorization default value. This applies both for
active and inactive standard authorizations.
Authorizations in the statuses Changed and Manual are not affected by the merge. They
are therefore always retained.
This transaction has 6 steps. This transaction is used to fill the customer tables of the
Profile Generator the first time the Profile Generator is used or update the customer tables
after an upgrade. The customer's tables of the Profile Generator are used to add a copy of
the SAP default values for the check indicators and field values. These check indicators and
field values are maintained in transaction SU24. If you have made changes to check
indicators, you can compare these with the SAP default values and adjust your check
indicators as needed.
Step 1: If you have not yet used the ProfileGenerator or you want to add all SAP default
values again, use the initial fill procedure for the customer tables.
If you have used the Profile Generator in an earlier Release and want to compare the data
with the new SAP defaults after an upgrade, use steps 2a to 2d. Execute the steps in the
order specified here.
Step 2:
a) is used to prepare the comparison and must be executed first.
b) If you have made changes to check indicators or field values in transaction
SU24, you can compare these with the new SAP default values. The values
delivered by SAP are displayed next to the values you have chosen so that you
can adjust them if necessary. If you double-click on the line, you can assign
check indicators and field values. You maintain these as described in the
documentation for transaction SU24.
Note on the list of transactions to be checked To the right of the list you can see
the status which shows whether or not a transaction has already been checked.
At first, the status is set to be checked. If you choose the transaction in the
change mode and then choose save, the status is automatically set to checked.
By choosing the relevant menu option in the list of transactions you can
manually set the status to checked without changing check indicators or field
values, or even reset this status to to be checked.
If you want to use the SAP default values for all the transactions that you have
not yet checked manually, you can choose the menu option to copy the
remaining SAP default values.
c) You can determine which roles are affected by changes to authorization data.
The corresponding authorization profiles need to be edited and regenerated.
The affected roles are assigned the status “profile comparison required”.
Alternatively, you can dispense with editing the roles and manually assign the
users the profile SAP_NEW (make sure the profile SAP_NEW only contains the
sub-profiles corresponding to your release upgrade. This profile contains
authorizations for all new checks in existing transactions). The roles are
assigned the status “profile comparison required” and can be modified at the
next required change (for example, when the role menu is changed). This
procedure is useful if a large number of roles are used as it allows you to modify
each role as you have time.
d) Transactions in the R/3 System are occasionally replaced by one or more other
transactions.
This step is used to create a list of all roles that contain transactions replaced
by one or more other transactions.
The list includes the old and new transaction codes. You can replace the
transactions in the roles as needed. Double-click the list to go to the role.
Step 3: This step transports the changes made in steps 1, 2a, and 2b.
Changes to the check indicators are made in step 4. You can also go to step 4 by calling
transaction SU24
In step 6 you can create roles from authorization profiles that you generated manually. You
then need to tailor and check these roles.
The table USOBT_C defines each transaction and for each authorization object which
default values an authorization created from the authorization object should have in the
Profile Generator.
Q18. What authorization are required to create and maintain user master records?
A. The following authorization objects are required to create and maintain user master
records:
Q19. What are the key principles of Segregation of Duties (SOD) in SAP Security?
A. Segregation of duties is a basic, key internal control and one of the most difficult to
achieve. It is used to ensure that errors or irregularities are prevented or detected on a
timely basis by employees in the normal course of business. Segregation of duties provides
two benefits:
1. Deliberate fraud is more difficult because it requires the collusion of two or more
persons, and
2. it is much more likely that innocent errors will be found.
At the most basic level, it means that no single individual should have control over two or
more phases of a transaction or operation. Management should assign responsibilities to
ensure a crosscheck of duties.
Authorizing a transaction, receiving and maintaining custody of the asset that resulted
from the transaction.
Receiving checks (payment on account) and approving write-offs.
Depositing cash and reconciling bank statements.
Approving time cards and having custody of paychecks.
Having unlimited access to assets, accounting records, and computer terminals and
programs. For instance, having access and using checks as the source documents to
post to accounting records rather than using a check log or receipts.
There are four general categories of duties or responsibilities that are examined when
segregation of duties is discussed: authorization, custody, record keeping, and
reconciliation.
In an ideal system, different employees would perform each of these four major functions.
In other words, no one person should have control of two or more of these responsibilities.
The more negotiable the asset, the greater the need for proper segregation of duties –
especially when dealing with cash, negotiable checks, and inventories. In those instances
where duties cannot be fully segregated, mitigating or compensating controls must be
established. Mitigating or compensating controls are additional procedures designed to
reduce the risk of errors or irregularities. For instance, if the record keeper also performs a
reconciliation process a detailed review of the reconciliation could be performed and
documented by a supervisor to provide additional control over the assignment of
incompatible functions. Segregation of duties is more difficult to achieve in a centralized,
computerized environment. Compensating controls in that arena include passwords,
inquiry-only access, logs, dual authorization requirements, and documented reviews of
input/output. Some special aspects of the segregation of duties apply to IT functions
themselves. There should be segregation between systems development and operations,
operations and data control, and database administration and system development.
Q20. How to Identify the SAP System Parameters that need to be implemented?
A. This overview describes how security and controls can be implemented through system
parameters. System parameters are used to maintain configuration over the operation of
the SAP system. System parameters may define key settings for the whole system on
which SAP runs, individual host systems (e.g. configuration for only one of many
application servers), or the instances that are running on these servers. The majority of
system parameters ensure that SAP operates effectively on the customer's preferred
hardware, operating system, and database platforms. System parameters also control how
SAP operates and provide system-wide control over some aspects of Security. System
parameters are set using transaction RZ10. To make the parameters globally effective set
them in the default profile, DEFAULT.PFL. To make them instance-specific, you must set
them in the profiles of each application server in your R/3 System. System parameters can
be reviewed with transaction TU02 or from the standard SAP report RSPARAM using
transaction SA38.
Q21. What are the possible causes of incorrect logon, default clients, and default start menus in
SAP?
Login/system_client
This parameter specifies the default client. This client is automatically filled in on the
system logon screen. Users can enter a different client.
Login/ext_security
Since release 3.0E, external security tools such as Kerberos or Secude have managed
R/3 System access. If this parameter is set, an additional identification can be specified
for each user (in user maintenance) where users log on to their security system. To
activate, set the value to X.
Start_menu
This parameter specifies the default start menu for all users and can be overwritten
with the user- specific start menu (transaction SU50). The default is S000, and this
value can be set to any other area menu code.
Q22. What are the best practices for password security in SAP?
A. System profile parameters define the minimum length of a password and the frequency
with which users must change passwords.
Login/min_password_lng
minimum password length. The minimum is three characters and the maximum eight
characters.
Login/password_expiration_time
number of days after which a password must be changed. The parameter allows users
to keep their passwords without time limit and leaves the value set to the default, 0.
To prevent use of a certain password, enter it in table USR40. Maintain this table with
transaction SM30. In USR40, you may also generically specify prohibited passwords.
There are two wild-card characters:
1. ? means a single character
2. * means a sequence of any combination of characters of any length
Examples:
123* in table USR40 prohibits any password that begins with the sequence 123.
*123* prohibits any password that contains the sequence 123.
AB? prohibits passwords that begin with AB and have an additional character, such as
ABA, ABB, and ABC.
Q23. What are the steps involved in securing the SAP user master record?
A. login/no_automatic_user_sapstar
By default, SAP is installed with a user master record SAP*. This user has the profile
SAP_ALL with access to all transactions and programs in SAP. By default, if this user
master record is deleted then SAP allows logon using SAP* and a password of ‘PASS'.
Although the user master record does not exist, SAP grants unrestricted system access
privileges to SAP*. By setting this parameter value to ‘1' this ‘backdoor' access is
blocked in the event the SAP* user master record is deleted. Prior to version 4.0, this
parameter was login/no_automatic_user_sap*.
Q25. What are the considerations need to be made before deactivating authority checks in SAP?
A. Auth/no_check_on_sucode (version 3.0E to version 3.1H – default value ‘N'),
Auth/no_check_on_tcode (version 4.0 onwards – default value – ‘N')
From release 3.0E, the system checks on object S_TCODE. In upgrades from versions prior
to 3.0E set this flag to ‘Y' to ensure that old profiles operate in the new system. By default,
the function is inactive.
The flag should not normally be switched on because of the degradation in security that
results.
Q26. What is the maximum number of authorizations that can be stored in a user buffer in SAP?
A. Auth/auth_number_in_userbuffer
When a user logs onto SAP, the authorizations contained in the user's profiles are copied to
a user buffer in memory. The maximum number of authorizations copied is set by this
parameter. The size of the buffer must always exceed the maximum number of
authorizations as authorization checks are made only against those in the buffer.
The default value is 800, but this can be set to between 1–2000. Refer to OSS notes 84209
and 75908 for more detailed information regarding changes to the size of the user buffer.
Transaction SU56 shows the contents of the user's user buffer and a total for all the
authorizations in a user master record.
Q27. What are the differences between table, ABAP, and RFC system parameters?
A. Rec/client (default value – ‘N')
The parameter switches automatic table logging on. Images of the table before and after
are logged rather than just changes so consideration to which tables are to be logged and
log volumes must be made before using this as part of a control solution.
Auth/rfc_authority_check (default value – ‘1')
The parameter determines how object S_RFC is checked during RFC calls. The object has
three fields, activity, the name of the function being called, and the function group in which
the function resides. The parameter defines whether the S_RFC object is checked and if so,
whether the function group field is included in the validation.
Value = 0, no check against S_RFC
Value = 1, check active but no check for SRFC-FUGR
Value = 2, check active and check against SRFC-FUGR
Auth/system_access_check_off (default value – ‘0' – check remains active)
This parameter inactivates the automatic authorization check for particular ABAP/4
language elements (file operations, CPIC calls, and calls to kernel functions). This
parameter ensures the downward compatibility of the R/3 kernel.
Q28. What are the differences between derive and composite role in SAP?
A. Derived Role
Derived roles refer to roles that already exist. The derived roles inherit the menu
structure and the functions included (transactions, reports, Web links, and so on)
from the role referenced. A role can only inherit menus and functions if no
transaction codes have been assigned to it before.
The higher-level role passes on its authorizations to the derived role as default
values which can be changed afterwards. Organizational-level definitions are not
passed on. They must be created anew in the inheriting role. User assignments are
not passed on either.
Derived roles are an elegant way of maintaining roles that do not differ in their
functionality (identical menus and identical transactions) but have different
characteristics with regard to the organizational level.
Composite Role
A composite role is a container that can collect several different roles. For reasons
of clarity, it does not make sense and is therefore not allowed to add composite
roles to composite roles. Composite roles are also called roles.
Composite roles do not contain authorization data. If you want to change the
authorizations (that are represented by a composite role), you must maintain the
data for each role of the composite role.
Creating composite roles makes sense if some of your employees need
authorizations from several roles. Instead of adding each user separately to each
role required, you can set up a composite role and assign the users to that group.
The users assigned to a composite role are automatically assigned to the
corresponding (elementary) roles during comparison.
Q29. Find the list of Transactions accesed by a particular user in a particular time period.
A. Goto ST03N->Expert mode–>Total–>Month–>User and Settlement Statistics–>User
Profile–> Find
you will get your desired result.
It's better to run as a background Job. Report PFCG_TIME_DEPENDENCY must also run
after each import of activity groups from other systems.
Q32. How can I use the system trace (ST01) to troubleshoot authorization issues in SAP?
A. SAP offers the system trace the opportunity to evaluate the authorization objects that are
checked during the call of the different transactions. With the help of the trace all
authorization objects, on which an authority check is executed while working with the
system, can be logged.
This also includes the corresponding field values within the authorization objects.
Call the transaction ST01 for the use of the system trace.
In the selection screen the different components can be activated via checkmark.
There are options for additional filter settings. Push the button General Filters. You can filter
for the process you want to log, the user, the transaction, or the program.
Enter the required selection, push the key Enter, and then activate the trace.
Note: An activation of the trace for all system users should not be activated. For user
evaluation always enter the username you want to analyze. With the activation of the trace,
all required access rights for the selected user will be logged. When all actions are traced,
and logged, then please switch the Trace off.
After that, you can evaluate the results by pushing the button Analysis [or key F2]. The
evaluation path varies in dependency on the current release level.
Activate the integrated button Analysis. Enter the required selection for evaluation, and push
the key F8 for activation.
Q34. How to evaluate the trace results to troubleshoot authorization issues in SAP?
A.
For interpretation of the evaluation, you can use the following overview of relevant
information.
Q35. What is the return code in SAP and how to interpret it?
A. Successfully passed authorization check are marked in dark green already and have the
value RC=0 added in the column next to the authorization object.
In the following window you can enter remarks as well as a file name.
If you do not enter an absolute path when entering the file name manually, the file will be
created in the log directory.
For the automatic file name creation, the system provides a file name and creates the file in
the log directory.
Automatically created file names can be selected with the F4 search key in the future.
This option is not available for manually created names.
Automatically created file names can be deleted within this application, manually created
file names need to be deleted on the OS level separately.
Therefore the automatic file name creation is to be preferred.
The system trace cannot only be used for the evaluation of authority checks, but also for
evaluation of kernel functions, kernel modules, DB access, table buffer, RFC calls, and lock
operations. For system monitoring the developer trace is usually preferred.
Q38. What does the different color light mean in profile generator?
A.
Q39. What are the different types of users in SAP and what are their roles?
A. The SAP system categorizes users into several types for different purposes as shown in the
table below:
User Types
Type Purpose
Dialog (A)
User type for exactly one interactive user (all logon types including Internet users):
During a dialog log on, the system checks whether the password has expired or is initial.
The user can change his or her password himself or herself.
Multiple dialog logons are checked and, where appropriate, logged.
Dialog (A)
User type for exactly one interactive user (all logon types including Internet users):
During a dialog log on, the system checks whether the password has expired or is initial.
The user can change his or her password himself or herself.
Multiple dialog logons are checked and, where appropriate, logged.
System (B)
User type for background processing and communication within a system (internal RFC
calls).
A dialog logon is not possible.
The system does not check whether the password has expired or is initial.
Due to a lack of interaction, no request for a change of password occurs. (Only the user
administrator can change the password.)
Multiple logons are permissible.
Communication (C)
User type for dialog-free communication between systems (such as RFC users for ALE,
Workflow, TMS, and CUA):
A dialog logon is not possible.
Whether the system checks for expired or initial passwords depends on the logon
method(interactive or not interactive). Due to a lack of interaction, no request for a
change of password occurs.
Service (S)
User type that is a dialog user available to a larger, anonymous group of users. Assign
only very restricted authorizations for this user type:
During a log-on, the system does not check whether the password has expired or is
initial. Only the user administrator can change the password (transaction SU01, Goto ®
Change Password).
Multiple logons are permissible.
Service users are used, for example, for anonymous system accesses through an ITS
service. After an individual authentication, an anonymous session begun with a service
user can be continued as a person-related session with a dialog user.
Reference (L)
User type for general, non-person related users that allows the assignment of additional
identical authorizations, such as for Internet users created with transactions SU01. You
cannot log on to the system with a reference user.
To assign a reference user to a dialog user, specify it when maintaining the dialog user
on the Roles tab page. In general, the application controls the assignment of reference
users. This assignment is valid for all systems in a Central User Administration (CUA)
landscape. If the assigned reference user does not exist in a CUA child system, the
assignment is ignored.
You should be very cautious when creating reference users.
The role has various components such as the MENU of the transaction, reports, URLs;
AUTHORIZATION PROFILE(S), and USERS who are assigned to that role.
Maintained:
At least one field in the subordinate levels of the hierarchy was empty by default and
has since been filled with a value.
Changed:
The proposed value for at least one field in the subordinate levels of the hierarchy has
been changed from the SAP default value.
Manual:
They maintained at least one authorization in the subordinate hierarchy levels manually (it
was not proposed by the Profile Generator).
Before you make a change to authorizations that generate the status.
Only by performing these steps can you avoid the default being read again and again, and
ensure that you have no inexplicable values to maintain.
Status texts after a comparison.
Old: The comparison found that all field values in the subordinate levels of the hierarchy are
still current and that no new authorizations have been added.
New: The comparison found that at least one new authorization has been added to the
subordinate levels of the hierarchy. If you now click New, all new authorizations in the
subordinate levels are expanded.
Q42. What are the expert mode options available in the SAP system?
A. Delete and recreate profile and authorizations
All authorizations are recreated. Values that had previously been maintained, changed,
or entered manually are lost. Only the maintained values for organizational levels
remain.
Edit old status
The last saved authorization data for the role is displayed. This is not useful if
transactions in the role menu have been changed.
Read old status and compare with new data
If you change transactions in the role menu, this option is preconfigured. The profile
generator compares the existing authorization data with the authorization default values
for the menu transactions. If new authorizations are added during this process, they
receive the status New. Authorizations that already existed receive the status Old.
Q43. What are the differences between SAP_ALL and SAP_NEW authorization profiles?
A. SAP_ALL is an SAP standard profile, which is used on a need basis, to resolve particular
issues which may arise during the usage of SAP. It is used by Administrators/Developers
only and is applied on a need-to-use basis, then withdrawn. It contains all SAP system
objects and Transactions. SAP_ALL is very critical and only SAP* contains SAP_ALL
attached to it in the production system. No other dialog users have SAP_ALL attached to
them.
SAP_NEW is an SAP standard Profile that is usually assigned to system users temporarily
during an upgrade to ensure that the activities and operations of SAP users are not
hindered, during the Upgrade. It contains all the necessary objects and transactions for the
users to continue their work during the upgrade. It should be withdrawn once all
upgrade activities are completed, and replaced with the now modified Roles as it has
extensive authorizations than required.
Start Profiles
When you start an SAP instance on a host, the start profile defines which SAP services are
started (message server, dialog, gateway, or enqueue process. for example). The startap
program is responsible for starting these service processes, and it uses a start profile to
begin the startup process.
Default Profiles
If you want to assign the same parameter value for all application servers (such as the
name of the database host, or the host on which the message server is running), enter it in
the default profile.
You cannot choose a name for the default profile. It is always called DEFAULT.PFL . Default
profiles are also called system profiles.
Instance Profiles
Instance profiles provide an application server with additional configuration parameters to
complement the settings values from the default profile. Typically, these parameter settings
adapt the instance according to the desired resources. They also define the available
instance resources (main memory, shared memory, roll memory, and so on), and how to
allocate memory to the SAP application buffers.
You can choose any name for an instance profile. The SAP naming convention is as follows:
<SID>_<instancename> or <SID>_<instancename>_<hostname>.
To start application servers on several computers using identical parameter settings, you
can use a single instance profile. It is generally not necessary for each application server to
have its own instance profile. Instance profiles are also called system profiles.
Q45. What is the difference between a customized request and a workbench request in SAP?
A. The Transport Organiser maintains Change Requests. These requests record the changes
made to the repository and customizing objects. Based on the objects changed they are
WorkBench Request &
Customizing Request
Workbench Requests are those that involve changes to cross-client Customising and
Repository Objects. The objects are independent of the client. Hence the requests are used
for transferring and transporting changed Repository objects and changed system settings
from cross-client tables.
Customizing Requests involves changes recorded to client-specific Customizing objects.
These client-specific requests are used for copying and transporting changed system
settings from client-specific tables.
Q46. What is the difference between a customized request and a workbench request in SAP?
A. Table USR02 is the answer.
USR02-GLTGV (field) is the date from when the user is permitted to use the system.
So let's suppose you created the UserID on 01/01/2011 and want to allow him/her from
03/01/2011 then the user creation date would be 01/01/2011 but USR02-GLTGV holds the
value 03/01/2011.
Q47. What does the lock value in the USR02 table mean?
A. Actually, this information is new for me. I got this question in an Interview.
I knew that except '0' (Zero) rest are locked. But there is some value that is maintained in
USR02 when the user is locked by a different user/purpose.
We use the USR02 table for checking the status of a user whether a user is locked or not.
There are 6 types of values are there.
0 Not locked
16 Mystery values
Q48. What are the differences between SU22 and SU24 in SAP?
A. SU22 displays and updates the values in tables USOBT and USOBX, while SU24 does the
same in tables USOBT_C and USOBX_C. The _C stands for Customer.
The profile generator gets its data from the _C tables. In the USOBT and USOBX tables, the
values are the SAP standard values as shown in SU24. With SU25 one can (initially) transfer
the USOBT values to the USOBT_C table.
Q49. What is difference between add T-CODE IN ROLE MENU (PFCG) and add T-CODE in
S_TCODE OBJECT IN TCD field?
A. Roles are basically the graphical interface of end-users. If you add some role in the PFCG
Menu then the end-user will show a link in the end user's Screen.
Even end-users don't know which T-CODE is calling for clicking a link on his/ her screens
and the link will appear only when ROLE is assigned to the user.
But when you add a T-CODE in S_TCODE in TCD fields then the user is able to run the query
in the backend (sap logon pad), not from the end-user screen because no LINK will come for
that.
So, when you enter a T-CODE in the PFCG screen it will automatically added to object
S_TCODE, but the opposite is not true.
Suppose you have a profile SAP_ALL, you can do anything in the backend (using SAP
LOGON PAD). but when you assign this to an end-user, he/she should not get any link to
their screens (it's a profile, not a Role).
Like, we are in the Security Module, we have access to User and Role administration. but a
person Like a Sales Supervisor, he/she doesn't know even what is the background behind
that, he/she knows only if he clicks some link he can perform some job.
Q51. How SAP R/3 security is different from SAP BW and Enterprise Portal.
A. Security in SAP BW, Enterprise Portal, and SAP HR is quite different from the SAP R/3
Security.
BW: In SAP BW there are primarily two different types of authorization objects. The standard
authorization objects that are provided by SAP cover all checks for e.g. system
administration tasks, data modeling tasks, and granting access to InfoProviders for
reporting.
This type of authorization has the same concept and technique as that of an R/3 system.
The second type of authorization object is used for granular authorization checks on an Info
Provider's data and is defined by the customer. These reporting authorization objects can
be used to specify which part of data within an InfoProvider is visible to a user. Both types
of authorization objects use the same authorization framework.
Technically they are treated in the same way. However, the design of reporting
authorizations is more complex because of the need to design the reporting authorization
objects first. This is an additional step that needs to be treated with care because the
structure of the authorization objects determines the possible use in regard to selections,
combinations, and granularity.
Enterprise Portal: SAP Enterprise Portal provides a bunch of capabilities to the end users—
with uniform, role-based, and secure access to their day-to-day work and information
resources through a Web-based portal interface. These resources include SAP applications,
third-party applications, databases, data warehouses, desktop documents, Web content, and
services. The portal makes it possible to search internal and external sources and to access
both structured and unstructured information from any geographical location throughout
the organization.
The portal has an authorization concept that is implemented using permissions, security
zones, UME actions, and the AuthRequirement property.
Permissions: permissions for all Portal Content Directory (PCD) objects. Portal permissions
define portal user access rights to portal objects in the PCD and are based on the access
control list (ACL)methodology.
Security Zones: Control which portal components and portal services users can launch and
are defined in the development phase. If a portal component or service is not assigned a
complete security zone in its descriptor file, the portal runtime assigns it to a predefined
security zone folder for unspecified components or services.
UME Actions: the User Management Engine (UME) equivalent of portal permissions. The
UME verifies that users have the appropriate UME actions assigned to them before granting
them access to UME iViews and functions.
Auth Requirement property: This is a master iView property used in EP that defines which
users are authorized to access a master iView or Java iViews derived from a master iView.
For backward compatibility with iViews developed for EP 5.0, EP 6.0 supports this property.
Usually, the sap standard tables USOBX and USOBT are not allowed modifications so we
copy the customized tables from these tables in order to copy the tables we need to go
through the transaction su25.
su22 displays and updates the values in standard tables USOBT, USOBX.
su24 displays and updates the values in customizing tables USOBT_C, USOBX_C.
The Authorization Object is where Permitted Activity configurations are performed against
specific fields.
Before a User can be granted permission by the Authorization Object, the User’s Master
Record is assigned a Role, which includes a Profile.
The Profile contains what is simply called the Authorization and is where the specific data
for the Authorization Object’s field is assigned to the configured Permitted Activity.
This field is for the internal organization of users and helpful e.g. For mass maintenance
– if you want to maintain users of a certain group. This group is also called the General
user group.
This field allows to restrict user maintenance to specific groups based on the
authorization object S_USER_GRP. If a user has an assignment maintained in this field,
the user administrator will need the corresponding group assigned to his authorization
based on S_USER_GRP to be able to actually maintain this user.
Example:
The user administrator who wants to maintain this user Z_ZYX will need the authorization:
S_USER_GRP
with ACTVT = 02 [change]
with CLASS = TCS
The activities that are available for defining the access level on S_USER_GRP are the
following:
The information for the User group for Authorization Checks is also stored in the table
USR02 in the field CLASS [User group] whereas the assignment for the field General user
groups is stored in the table USGRP_USER, and can be displayed via SE16.
The report RSUSR002 allows to distinguish and select users based on the respective group
information.
The transaction in this example currently consists of only one authorization object
(S_TCODE) and is not listed in the table USOBT_C yet.
Confirm your choice via Execute(F8) and double click the selected entry.
The following message will be displayed.
Confirm the message with Enter. Select the target client.Enter your request ID and confirm
via Enter.
Select the item Authorization objectsfrom the menu bar, and therethe entry Insert.
Choose the corresponding authorization object from the list, or enter it directly.
The selected authorization object will be transferred to the list. If you want this object to be
called by the profile generator for maintenance you have to adapt the Check ID.
When you are finished with the maintenance – save the adjustments.
At the call of the transaction SE16N /SM31 with a selection of the table USOBT_C, the maintained
values for the corresponding transaction are added to the table.
At the call of the profile generator [PFCG] with selection of the previously maintained self-
created transaction, the adapted check values are displayed for further maintenance.
In SE16, only one authorization object (S_TABU_DIS) is checked and maintained in SU24.
Here ACTVT =03 AND DICBERCLS (AUTH GROUP) is blank. So when PFCG (ROLE
Maintenance) pull the data from SU24 for SE16 the object S_TABU_DIS will be yellow.
(For more details go to “What does the different color light mean in profile generator“)
Before that we have to check, what are the AUTHORIZATION GROUP for those tables
(USR02 and AGR_USERS).
So goto Data Browser (SE16) and Type Table TDDAT. It stores Table auth group.
Now goto authorization tab and fill the profile name and click CHANGE AUTHORIZATION DATA.
So you have to maintain those field values, and change DICBERCLS (AUTH GROUP).
Goto change (pencil Icon) to DICBERCLS field. And add those two AUTH GROUP (SC and SS).
And save it and Generate the Role. And it will look like …….
Now create a USER ZZOT0003, and assign role Z_TCS to the user.
Now Run SE16 and Put the table USR02. It will execute without authorization error.
But when you want to execute USR40, it will give an authorization error like “you are not
authorized to display this table”. Because you were not added to the Auth Group for USR40.
Caution:
When you ADD Auth Group to DICBERCLS it doesn’t seem that you have only that table
access, you can access all the table which has the same Auth Group maintained in TDDAT
table.
In this example you can find, there are 1569 tables, which has the same Auth Group (SC).
there are 2163 tables, which has the same Auth Group (SS).
Summary:
2. You can now add AUTH GROUP to a S_TABU_DIS with your project requirements.
Q58. How to analyze the problem and what will be the solutions?
A. There are no error records found in ST01 for user Y.
Only Role A has SU01D TCODE.
Problem Analysis:
Maybe the user comparison is not done properly for user Y.
You can refresh the User Buffer (Logoff and Login )
No need to go to ST01 because No record is there (as mentioned).
It may be the user buffer can store a maximum of 312 profiles, it may be possible user
(Y) has more than 312 Profiles.
Solutions:
Please assign a reference User to user Y. And assign Role A to the reference user, So Y
can access Role A.
1. So first we have to check which role contains those Authorization Objects. Goto SUIM
and ROLE -> “Roles by complex selection Criteria”
Select User as “BIJOY” and Authorization Object as S_TABU_DIS. You can select both Auth
Objects.
3. Now we have to find How many Authorization Groups are present in those roles
4. Goto SE16 (Data Browser) -> AGR_1251 (table)
5. Paste those roles Z_JOY and Z_TCS (from Step 1 and 2) and authorization as
S_TABU_DIS.
6. Output is Like
7. Here we got “SC” and “SS” Authorization Group. If the List is too long, just copy this
into an Excel file filter the Field Name, and select DICBERCLS. So you can get all
authorization groups.
8. Now we have to find how many tables are linked with those authorization Group
9. Goto SE16 (Data browser) -> TDDAT (table). Select the authorization tab and paste
all the authorization Groups.
Q61. What is ‘reference’ user type in SU01? and when do you use it?
A. Reference user is when a user gets his authorizations from another user ID. This can be
practical for internet users. You need to be careful about this type of access, as it will not
show up in your ordinary SUIM0 reports! Or AGR_USERS.
Reference user is used only to assign additional authorizations. you cannot log in by using
the reference user
User type for general, non-person related users that allows the assignment of additional
identical authorizations, such as for Internet users created with transactions SU01. You
cannot log on to the system with a reference user.
To assign a reference user to a dialog user, specify it when maintaining the dialog user on
the Roles tab page. In general, the application controls the assignment of reference users.
This assignment is valid for all systems in a Central User Administration (CUA) landscape. If
the assigned reference user does not exist in a CUA child system, the assignment is
ignored.
Now we create a new Dialog user ZZOT0002 and assign role Z_NEW to it.
And assign the REFERENCE user ZZOT0001 to “REF user for additional rights” field.
Now login through ZZOT0002 user it only shows Z_NEW roles. (SM36 and SM 59)
But when you execute SE16 it will execute with no authorization errors .
But Roles of reference user will never show for the dialog users. Here it shows only Z_NEW,
not Z_JOY.
If you do not implement the reference user concept, you can deactivate this field in
accordance with SAP Note 330067.
We also recommend that you set the value for the Customizing switch
REF_USER_CHECK in table PRGN_CUST to “E”. This means that only users of type
REFERENCE can then be assigned. Changing the Customizing switch affects only new
assignments of reference users. Existing assignments are retained.
We further recommend that you place all reference users in one particularly secure user
group to protect them from changes to assigned authorizations and deletion.
The following information is obtained based on permissions for the requested object:
iView –Program that retrieves data from content sources and displays it in the SAP
content area.
Page – consists of layout and assigned content.
Work set – a specific collection of tasks, services, and information that is part of a role.
Role –Collection of tasks, services and information that is available for groups of users.
Portal Content
All Content objects are stored in a central persistence store, the Portal Content Directory
(PCD) Provides the following functions:
Content Area
The following two areas appear in the content area:
Portal Catalog
Consists of :
Object tabs
Object Editor Tools
Object Editor
Property Editor
Object Relations
Object properties:
Parameters that permit the configuration and personalization of content.
All objects have properties
Properties are object-specific.
Can be maintained with the property editor.
Delta Links
A delta link is a relationship between two objects in the PCD (Source and target objects).
Source object passes its values to target objects.
Changes made to the source object are copied to the target object.
Changes made to the target object have no effect on the source object.
Creating iViews
Portal Content Studio provides a framework for creating iViews in a number of ways,
without having to write any code.
Content Administrator can create an iView using
iView wizards
Copies of existing iViews
Once a new iView has been created, the property editor is used to fine-tune some iView
properties.
Before assigning a new iView to the user, test the result with a preview.
Typically iView is assigned to a page or a work set or role.
Q66. What are the different blocks and architecture of SAP Enterprise Portal?
A.
Blocks of EP
Portal platform - Has an open architecture that enables integration of SAP Net Weaver
components such as knowledge management and collaboration. Components of the
portal platform:
Knowledge management SAP Net Weaver component that offers a central, role-specific
point of entry to unstructured information from various data sources in SAP EP. KM
platform consists of :
Content Management (CM)
Search and Classification (TREX)
Collaboration with Net Weaver offers services that support communication and
cooperation in enterprise-specific business processes.
portal architecture
Portal Runtime(PRT) – Delivers the runtime environment for portal components and
portal services.
Portal component – Java code that is executed according to user requests and
generates HTML output for display on the client.
Portal services – Act as interfaces that are able to exchange procedures and data.(e.g)
PCD service acts as an interface to the portal system database.