Sunteți pe pagina 1din 392

$XWKRUL]DWLRQV0DGH(DV\

8VHU5ROH7HPSODWHVDQG
*HQHUDWLQJ$XWKRUL]DWLRQ3URILOHV

Release 4.6A/B

SAP Labs, Inc.


Palo Alto, California
&RS\ULJKW

E\6$3$*$OOULJKWVUHVHUYHG
1HLWKHUWKLVGRFXPHQWDWLRQQRUDQ\SDUWRILWPD\EHFRSLHGRUUHSURGXFHGLQDQ\IRUPRUE\DQ\PHDQVRU
WUDQVODWHGLQWRDQRWKHUODQJXDJHZLWKRXWWKHSULRUFRQVHQWRI6$3$*
6$3$*PDNHVQRZDUUDQWLHVRUUHSUHVHQWDWLRQVZLWKUHVSHFWWRWKHFRQWHQWKHUHRIDQGVSHFLILFDOO\GLVFODLPV
DQ\LPSOLHGZDUUDQWLHVRIPHUFKDQWDELOLW\RUILWQHVVIRUDQ\SDUWLFXODUSXUSRVH6$3$*DVVXPHVQR
UHVSRQVLELOLW\IRUDQ\HUURUVWKDWPD\DSSHDULQWKLVGRFXPHQW7KHLQIRUPDWLRQFRQWDLQHGLQWKLVGRFXPHQWLV
VXEMHFWWRFKDQJHZLWKRXWQRWLFH6$3$*UHVHUYHVWKHULJKWWRPDNHDQ\VXFKFKDQJHVZLWKRXWREOLJDWLRQWR
QRWLI\DQ\SHUVRQRIVXFKUHYLVLRQRUFKDQJHV6$3$*PDNHVQRFRPPLWPHQWWRNHHSWKHLQIRUPDWLRQ
FRQWDLQHGKHUHLQXSWRGDWH

7UDGHPDUNV
6$3WKH6$3ORJR55$%$3DQGRWKHU6$3UHODWHGSURGXFWVPHQWLRQHGKHUHLQDUHUHJLVWHUHGRU
XQUHJLVWHUHGWUDGHPDUNVRI6$3$*$OORWKHUSURGXFWVPHQWLRQHGLQWKLVGRFXPHQWDUHUHJLVWHUHGRU
XQUHJLVWHUHGWUDGHPDUNVRIWKHLUUHVSHFWLYHFRPSDQLHV

6LPSOLILFDWLRQ*URXS
6$3/DEV,QF
'HHU&UHHN5RDG
3DOR$OWR&$

ZZZVDSODEVFRPVLPSOH
VLPSOLI\U#VDSFRP

3ULQWHGLQWKH8QLWHG6WDWHVRI$PHULFD
,6%1;

7KLVERRNXVHV(FR)/(;OD\IODWELQGLQJ:LWKWKLVOD\IODWIHDWXUH³GHYHORSHGE\
DQGH[FOXVLYHO\DYDLODEOHDW-RKQVRQ3ULQWLQJ6HUYLFH -36 ³\RXFDQRSHQWKLVERRN
DQGNHHSLWRSHQZLWKRXWLWVQDSSLQJVKXWRQ\RX<RXQHHGQRWZRUU\DERXW
EUHDNLQJWKHVSLQH(FR)/(;PDNHVERRNVOLNHWKLVRQHHDVLHUWRXVH
&RQWHQWVDWD*ODQFH

$FNQRZOHGJHPHQWV [LLL
,QWURGXFWLRQ  [Y
:KDW·V1HZLQ5HOHDVH  [[L
&KDSWHU 56\VWHP6HFXULW\DQGWKH$XWKRUL]DWLRQ&RQFHSW ²
&KDSWHU $XWKRUL]DWLRQVDQG$6$3 ²
&KDSWHU 6HWWLQJ8SWKH3URILOH*HQHUDWRU ²
&KDSWHU 8VHU$GPLQLVWUDWLRQ ²
&KDSWHU 8VHU5ROH7HPSODWHV ²
&KDSWHU $GYDQFHG3URILOH*HQHUDWRU)XQFWLRQDOLW\²
&KDSWHU 3UHSDULQJWKH5(QYLURQPHQWIRU*R/LYH²
&KDSWHU ,QVHUWLQJ0LVVLQJ$XWKRUL]DWLRQV²
&KDSWHU $VVLJQLQJ$FWLYLW\*URXSV ²
&KDSWHU 6HWWLQJ8SWKH$/((QYLURQPHQWIRU&HQWUDO8VHU
$GPLQLVWUDWLRQ²
&KDSWHU 6HWWLQJ8S&HQWUDO8VHU$GPLQLVWUDWLRQ ²
&KDSWHU 7LSVDQG7URXEOHVKRRWLQJ ²
&KDSWHU 6$36HFXULW\$XGLWDQG/RJJLQJ²
&KDSWHU 8SJUDGH ²
$SSHQGL[$ 6$31HW²5)URQWHQG1RWHV  $²
$SSHQGL[% )UHTXHQWO\$VNHG4XHVWLRQV %²
$SSHQGL[& ,PSRUWDQW6\VWHP3URILOH3DUDPHWHUV &²
*ORVVDU\  *²
,QGH[ ,²

Authorizations Made Easy iii


iv
'HWDLOHG7DEOHRI&RQWHQWV

$FNQRZOHGJHPHQWV [LLL
,QWURGXFWLRQ  [Y
What Is this Book About? ................................................................................... xvi
Who Should Read this Book?............................................................................. xvi
How to Use this Guide ........................................................................................ xvii
Conventions......................................................................................................... xvii
:KDW·V1HZLQ5HOHDVH  [[L
Overview............................................................................................................... xxii
User Role Templates........................................................................................... xxii
Flexible User Menus............................................................................................ xxii
Composite Activity Groups............................................................................... xxiv
User Groups........................................................................................................ xxiv
Central User Administration ............................................................................. xxiv
&KDSWHU 56\VWHP6HFXULW\DQGWKH$XWKRUL]DWLRQ&RQFHSW ²
Overview............................................................................................................... 1–2
The Authorization Concept ................................................................................ 1–4
Authorization Object .............................................................................................. 1–5
Authorization Object Fields ................................................................................... 1–6
Authorizations........................................................................................................ 1–6
Authorization Profiles ............................................................................................ 1–7
Naming Convention for Authorization Profiles........................................................ 1–7
User Master Records ............................................................................................ 1–7
Authorization Checks ............................................................................................ 1–8
Activating and Deactivating Authorization Checks in Transactions...................... 1–8
SAP* and DDIC Users ......................................................................................... 1–8
What Is the Profile Generator? .......................................................................... 1–9
Components of the Profile Generator ................................................................. 1–10
Activity Groups...................................................................................................... 1–10
Composite Activity Groups ................................................................................... 1–10
Derived Activity Groups ........................................................................................ 1–10
User Assignment .................................................................................................. 1–10
Generating the Profiles........................................................................................ 1–10
What Is an Activity Group? .............................................................................. 1–12
Activity Group Assignments ................................................................................ 1–12
R/3 login user IDs ............................................................................................... 1–12
Jobs ..................................................................................................................... 1–12
Positions.............................................................................................................. 1–13
Organizational units ........................................................................................... 1–13
What Is a User Role Template? .......................................................................... 1–13

Authorizations Made Easy v


Detailed Table of Contents

R/3 Tools for Security Implementation ........................................................... 1–14


Case Study: Security Strategy in a Three-System Environment ................. 1–15
Development System (DEV) ............................................................................... 1–15
Quality Assurance System (QAS) ....................................................................... 1–17
Training Client System (TRG)...............................................................................1–17
Production System (PRD) ................................................................................... 1–18
Setting Up the Authorization Administrators ................................................. 1–19
How the Administrators Work Together ..............................................................1–21
Policies and Procedures................................................................................... 1–21
User Administration ............................................................................................. 1–21
Policies ..................................................................................................................1–21
Procedures ............................................................................................................1–22
Roles and Responsibilities ....................................................................................1–22
System Security................................................................................................... 1–23
Policies ..................................................................................................................1–23
Procedures ............................................................................................................1–23
Roles and Responsibilities ....................................................................................1–24
Auditing Requirements ..................................................................................... 1–24
&KDSWHU $XWKRUL]DWLRQVDQG$6$3 ²
Overview ............................................................................................................... 2–2
ASAP Roadmap ................................................................................................... 2–2
Authorizations in the Roadmap Structure ............................................................. 2–4
Knowledge Corner............................................................................................... 2–5
Questions and Answers Database (Q&Adb) .................................................... 2–6
What Is the Q&Adb?.............................................................................................. 2–6
How to Work with the Q&Adb................................................................................ 2–6
How to Generate the Authorization List from the Q&Adb ..................................... 2–6
Authorization List ................................................................................................ 2–6
What Is the Authorization List?.............................................................................. 2–6
How to Work with the Authorization List................................................................ 2–7
Generate Authorization List from the Q&Adb..........................................................2–7
Define User Roles ...................................................................................................2–8
Generate User Roles Overview ..............................................................................2–9
Build User Roles .....................................................................................................2–9
&KDSWHU 6HWWLQJ8SWKH3URILOH*HQHUDWRU ²
Overview ............................................................................................................... 3–2
Confirming that the Profile Generator Is Active............................................... 3–2
Checking the Required Instance Profile Parameter.............................................. 3–2
Loading the USOBX_C and USOBT_C tables .................................................. 3–4
Initial Copying of SAP Defaults into the Customer Tables (SU25) ....................... 3–4
Transporting the Defaults ...................................................................................... 3–6
Getting Support from the SAPNet – R/3 Frontend Notes................................ 3–7
Accessing the Error Notes Database ....................................................................3–7
Printing Important SAPNet – R/3 Frontend Notes ................................................ 3–8
Applying Advance Corrections to Your R/3 System.............................................. 3–8
&KDSWHU 8VHU$GPLQLVWUDWLRQ ²
Overview ............................................................................................................... 4–2
System Users ....................................................................................................... 4–2

vi Authorizations Made Easy


Detailed Table of Contents

External R/3 Users ................................................................................................ 4–3


Internal R/3 Users ................................................................................................. 4–3
Dialog...................................................................................................................... 4–3
Batch Data Communication.................................................................................... 4–3
Background............................................................................................................. 4–3
CPIC ....................................................................................................................... 4–4
Special R/3 Users.................................................................................................. 4–4
SAP* ....................................................................................................................... 4–4
DDIC ....................................................................................................................... 4–4
EarlyWatch ............................................................................................................. 4–4
Creating Users ...................................................................................................... 4–5
User Groups......................................................................................................... 4–5
Authorizations and Authorization Profiles ....................................................... 4–6
Mass Operations ................................................................................................. 4–6
Creating a New User (Client-Specific)............................................................... 4–7
Changing a User’s Password........................................................................... 4–10
Password Requirements ..................................................................................... 4–11
User Information System.................................................................................. 4–12
&KDSWHU 8VHU5ROH7HPSODWHV ²
Overview............................................................................................................... 5–2
What Are User Role Templates? ....................................................................... 5–2
User Menu ............................................................................................................ 5–2
How to Work with User Role Templates ........................................................... 5–3
Starting Activity Group Maintenance (PFCG) ....................................................... 5–4
Using the SAP-Provided User Role Templates .................................................... 5–4
Copying and Modifying SAP-Provided User Role Templates............................. 5–10
Create your own User Role Templates............................................................... 5–22
Creating Composite Activity Groups ................................................................... 5–32
Tips for an Administrator ................................................................................. 5–35
Available User Role Templates........................................................................ 5–40
Release 4.6A ....................................................................................................... 5–40
Release 4.6B ....................................................................................................... 5–44
&KDSWHU $GYDQFHG3URILOH*HQHUDWRU)XQFWLRQDOLW\²
Overview............................................................................................................... 6–2
Selecting Views/Types in Activity Group Maintenance .................................. 6–2
Exploring Advanced Profile Generator Functionality ..................................... 6–3
Creating and Changing the Hierarchy................................................................... 6–4
Inserting Transactions ............................................................................................ 6–5
Inserting Internet and Document Links ............................................................... 6–10
Inserting Reports ................................................................................................. 6–12
Displaying the Online Documentation for Activity Group Objects ...................... 6–15
Copying and Deriving Activity Groups ...........................................................6–16
Basics on Duplicating Activity Groups ................................................................ 6–16
Copying Activity Groups ...................................................................................... 6–17
Deriving Activity Groups ...................................................................................... 6–17
Selecting Workflow Tasks................................................................................ 6–21
What You Should Know About Workflow............................................................ 6–21
Deleting Activity Groups .................................................................................. 6–24

Release 4.6A/B vii YLL


Detailed Table of Contents

Postmaintaining User Role Templates............................................................ 6–25


Different Settings for the Maintenance View ....................................................... 6–25
Maintaining and Generating the Authorization Profiles................................ 6–26
Displaying an Overview of Generated Profiles .............................................. 6–30
Regenerating Authorization Profiles After Making Changes ....................... 6–32
Using Utilities to Change Generated Authorizations .................................... 6–36
Merging Authorizations........................................................................................ 6–36
Reorganizing Technical Names of Authorizations .............................................. 6–37
Customizing Authorizations............................................................................. 6–38
Assigning IMG Projects or Project Views to Activity Groups .............................. 6–38
&KDSWHU 3UHSDULQJWKH5(QYLURQPHQWIRU*R/LYH ²
Overview ............................................................................................................... 7–2
Transports Between Clients............................................................................... 7–2
Transports Between R/3 Systems ..................................................................... 7–3
Transporting Activity Groups ............................................................................ 7–3
Transporting Single Activity Groups Using the Activity Group Maintenance
Transaction........................................................................................................ 7–4
Mass Transport of Activity Groups ........................................................................ 7–6
Transporting Check Indicators and Field Values ............................................7–8
Transporting Authorization Templates ............................................................. 7–8
Transporting User Master Records ................................................................... 7–8
&KDSWHU ,QVHUWLQJ0LVVLQJ$XWKRUL]DWLRQV ²
Manually Postmaintaining Authorizations........................................................ 8–2
When to Insert Missing Authorizations?................................................................ 8–2
Case #1: Authorization Is Missing for Related Transactions ..................................8–2
Case #2: The Generated Profile Does Not Assign Any General Rights to the
User ....................................................................................................................8–2
Case #3: Cannot Select Transaction SU53 from the Menu in PFCG .....................8–2
How to Insert Missing Authorizations .................................................................... 8–3
Manually Inserting Authorizations..................................................................... 8–3
Using Selection Criteria ......................................................................................... 8–4
Inserting Manually.................................................................................................. 8–6
Inserting Authorizations from Templates ......................................................... 8–7
Creating a New Template...................................................................................... 8–7
Inserting Authorizations from a Template ........................................................... 8–10
Inserting Authorizations from a Profile........................................................... 8–12
Inserting Full Authorizations: Profile “<YourCompany>” ............................ 8–15
&KDSWHU $VVLJQLQJ$FWLYLW\*URXSV²
Overview ............................................................................................................... 9–2
Assigning Users to Activity Groups.................................................................. 9–3
Assigning Activity Groups to Users.................................................................. 9–6
Assigning PD Objects to Activity Groups ........................................................ 9–7
Assigning Activity Groups to PD Objects ...................................................... 9–10
Transferring Users from an IMG Project to an Activity Group ..................... 9–13
Updating Profiles in the User Master Records............................................... 9–15

viii Authorizations Made Easy


Detailed Table of Contents

Comparing User Master Data from Within Transaction PFCG........................... 9–15


Profile Comparisons Using Mass Compare (PFUD)........................................... 9–18
Report PFCG_TIME_DEPENDENCY to Schedule Time Dependency.............. 9–19
Creating a Sample Organizational Plan .......................................................... 9–21
Using the Classic R/3 Transaction ...................................................................... 9–22
Using the Enjoy Transaction ............................................................................... 9–27
Structural Authorizations ................................................................................. 9–28
&KDSWHU 6HWWLQJ8SWKH$/((QYLURQPHQWIRU&HQWUDO8VHU
$GPLQLVWUDWLRQ²
Overview............................................................................................................. 10–2
Setting Up an ALE User.................................................................................... 10–3
Naming Logical Systems.................................................................................. 10–5
Assigning Logical Systems to Clients............................................................ 10–8
Defining Target System for RFC Calls .......................................................... 10–10
Distribution Model........................................................................................... 10–13
Generating Partner Profiles in the Central System ..................................... 10–16
Distributing Model View ................................................................................. 10–17
Generating Partner Profiles in the Client System........................................ 10–18
&KDSWHU 6HWWLQJ8S&HQWUDO8VHU$GPLQLVWUDWLRQ ²
Overview............................................................................................................. 11–2
Assigning the Central User Administration Distribution Model .................. 11–2
Testing Central User Administration .............................................................. 11–3
Migrating Existing Users to the Central System............................................ 11–7
Defining Field Attributes for User Maintenance ............................................ 11–9
Global User Manager ...................................................................................... 11–10
Structure of the Global User Manager .............................................................. 11–12
Using the Global User Manager........................................................................ 11–12
System Landscape with Existing Users ............................................................. 11–12
System Landscape Without Existing Users........................................................ 11–13
User Creation...................................................................................................... 11–14
Defining System Types and User Groups......................................................... 11–14
Modeling with the Global User Manager........................................................... 11–16
Authorization for the Global User Manager....................................................... 11–17
Distributing Data in the Global User Manager .................................................. 11–18
Immediate Distribution........................................................................................ 11–19
Scheduling Background Distribution................................................................... 11–19

&KDSWHU 7LSVDQG7URXEOHVKRRWLQJ ²


Overview............................................................................................................. 12–2
Tracing Authorizations with Transaction SU53 ............................................. 12–2
System Trace Using Transaction ST01........................................................... 12–4
Analyzing a Written Trace File ......................................................................... 12–9
Reducing the Scope of Authorization Checks............................................. 12–12
Overview............................................................................................................ 12–12
Enabling the Profile Generator.......................................................................... 12–12
Enabling/Disabling Other System-wide Checks ............................................... 12–12

Release 4.6A/B ix L[
Detailed Table of Contents

Enabling auth/tcodes_not_checked ....................................................................12–12


Enabling auth/rfc_authority_check......................................................................12–13
Globally Deactivating or Activating Authorization Checks ..................................12–13
Parameter Transactions......................................................................................12–18
Deactivating Authorization Checks Using SU24 ............................................... 12–18
Reducing the Scope of Authorization Checks................................................... 12–19
Maintaining Check Indicators for Transaction Codes .........................................12–20
Mass Change of Check Indicators ......................................................................12–28
Maintaining Authorizations in the Activity Groups...............................................12–32
&KDSWHU 6$36HFXULW\$XGLWDQG/RJJLQJ  ²
Overview ............................................................................................................. 13–2
Audit Tools (SM20, SM19, SECR) .................................................................... 13–2
Security Audit Log (SM20)................................................................................... 13–2
Running the Audit Log...........................................................................................13–4
Setting Security Audit Log Parameters (SM19) .................................................. 13–5
Defining Filter Group 1 ..........................................................................................13–7
Defining Filter Group 2 ..........................................................................................13–7
Audit Information System (SECR)..................................................................... 13–11
Complete Audit....................................................................................................13–12
User-Defined Audit..............................................................................................13–16
User Security Audit Jobs ................................................................................... 13–18
Audit Tasks (SM21, STAT, ST03) ................................................................... 13–20
Reviewing Validity of Named Users .................................................................. 13–20
Reviewing Profiles for Accuracy and Permission Creep................................... 13–21
System Log (SM21)........................................................................................... 13–22
Statistic Records in CCMS (STAT) ................................................................... 13–24
ST03 – User Profile ........................................................................................... 13–26
Logging of Specific Activities............................................................................. 13–28
Logging Changes to Table Data .........................................................................13–28
Logging Changes to User Master Records, Profiles, and Authorizations 13–30
&KDSWHU 8SJUDGH  ²
Before Doing Any Upgrade .............................................................................. 14–2
Validation Steps After Upgrading Is Completed ............................................ 14–3
Converting Previously Created SU02 Profiles to Activity Groups............... 14–4
Creating an Activity Group from Manually Maintained Profiles........................... 14–4
Removing User Assignments from the Original SU02 Profile............................. 14–9
Upgrading from a Release Prior to 3.1x to 4.6 A/B ...................................... 14–11
Converting Existing Authorization Profiles for the Profile Generator ................ 14–11
Re-creating the Authorization Profiles from Scratch Using the Profile
Generator ...................................................................................................... 14–11
Upgrading from Release 3.0F to 4.6 A/B....................................................... 14–12
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B...................................... 14–14
Upgrade from Releases 4.0x or 4.5x to 4.6 A/B............................................ 14–22
$SSHQGL[$ 6$31HW²5)URQWHQG1RWHV  $²
Overview ...............................................................................................................A–2
SAPNet – R/3 Frontend Notes ............................................................................A–3

x Authorizations Made Easy


Detailed Table of Contents

$SSHQGL[% )UHTXHQWO\$VNHG4XHVWLRQV %²


Overview...............................................................................................................B–2
R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................B–2
Profile Generator Setup ......................................................................................B–3
Working with the PG and Profiles .....................................................................B–3
Authorization Checks (SU24).............................................................................B–5
Upgrade Procedure (SU25) ................................................................................B–7
Including Transactions or Reports ...................................................................B–7
Missing Authorizations.......................................................................................B–7
User Administration ............................................................................................B–8
Transporting ........................................................................................................B–8
Tables ...................................................................................................................B–8
$SSHQGL[& ,PSRUWDQW6\VWHP3URILOH3DUDPHWHUV &²
Incorrect Logons, Default Clients, and Default Start Menu............................C–2
Setting Password Length and Expiration.........................................................C–2
Specifying Impermissible Passwords...............................................................C–3
Securing SAP* Against Misuse..........................................................................C–3
Tracing Authorizations .......................................................................................C–3
Profile Generator and Transaction SU24..........................................................C–4
User Buffer ...........................................................................................................C–4
No Check on Object S_TCODE ..........................................................................C–4
No Check on Certain ABAP Objects .................................................................C–4
RFC Authority Check ..........................................................................................C–5
*ORVVDU\  *²
,QGH[ ,²

Release 4.6A/B xi [L
Detailed Table of Contents

xii Authorizations Made Easy


$FNQRZOHGJPHQWV

,ZLVKWRH[SUHVVDSSUHFLDWLRQWRWKHIROORZLQJLQGLYLGXDOVZKRSURYLGHGWLPHPDWHULDOH[SHUWLVHDQG
UHVRXUFHVWRKHOSPDNHWKLVJXLGHERRNSRVVLEOH LQDOSKDEHWLFDORUGHU 

6$3$* 1RUPDQ'H/HHXZ0DWKLDV.LQ]OHU(UZLQ5RMHZVNL0DUNXV6FKPLGW+HLNR6WRFN
6YHQ6FKZHULQ:HQ]HO7KRUVWHQ9LHWK
6$3$PHULFD 0DULD*UHJJ´&DVSHUµ:DL)X.DQ'DQLHO%HQMDPLQ)LJ=DLGVSLQHU
6$3/DEV $QLO-DLQ-RKQ.DQFOLHU2OLYHU0DLQND*DU\1DND\DPD.XUW:ROI

1LKDG$O)WD\HK
6$3/DEV,QF

xiii
Acknowledgments

xivxiv Authorizations Made Easy


,QWURGXFWLRQ

&RQWHQWV

What Is this Book About? .......................................................................................xvi


Who Should Read this Book?.................................................................................xvi
How to Use this Guide............................................................................................xvii
Conventions ............................................................................................................xvii

xv
Introduction
What Is this Book About?

:KDW,VWKLV%RRN$ERXW"

7KLVJXLGHERRNLVGHVLJQHGWRKHOS\RXVHWXSWKHDXWKRUL]DWLRQHQYLURQPHQWLQWKH
FXVWRPHUV\VWHPXVLQJWKH3URILOH*HQHUDWRU 3* ,WH[SODLQVZKDW\RXQHHGWRNQRZWR
SHUIRUPWKLVWDVNDQGKHOSV\RXXVHWKHVWDQGDUGWRROVSURYLGHGZLWK\RXUV\VWHP
7KLVERRNGRHVQRWFRYHUDXWKRUL]DWLRQVIRUDGGRQFRPSRQHQWVRU1HZ'LPHQVLRQ
SURGXFWV,WDOVRGRHVQRWFRYHU,QWHUQHWUHODWHGDXWKRUL]DWLRQV HQFU\SWLRQDXWKHQWLFDWLRQ
DQGFUHGLWFDUGVHFXULW\ 
7KLVJXLGHUHIHUVWR5HOHDVH$%RIWKH6$356\VWHP$OOVFUHHQVKRWVDUHIURP5HOHDVH
$XQOHVVRWKHUZLVHQRWHG
7KHVWUXFWXUHRIWKLVJXLGHERRNPDWFKHVWKHVHWXSRIWKHDXWKRUL]DWLRQFRQFHSWSURJUHVVLQJ
IURPDQHZ5LQVWDOODWLRQDOOWKHZD\WRDQXSJUDGH,I\RXXSJUDGHIURPDQROGHUUHOHDVH
VHHFKDSWHU8SJUDGHIRUPRUHLQIRUPDWLRQ
7KHJUDSKLFEHORZSURYLGHVDQURXJKRYHUYLHZDERXWWKH5DXWKRUL]DWLRQF\FOH)RUD
PRUHGHWDLOHGLQIRUPDWLRQRQWKHDXWKRUL]DWLRQF\FOHDQGWKHWRROVXVHGVHHFKDSWHU5
6\VWHP6HFXULW\DQGWKH$XWKRUL]DWLRQ&RQFHSW

Operations and
Evaluation Implementation
Continuous Improvement

Upgrade +
Preparing the R/3 Environment Production
Authorizations Scoping Ongoing
and Preparation for Go-Live Phase
Development

7KLVJXLGHSURYLGHV\RXZLWKWKHIROORZLQJ
< 7KHELJSLFWXUH VHFXULW\DQGWKHDXWKRUL]DWLRQFRQFHSWLQ5
< 7DVNV\RXQHHGWRSHUIRUPGXULQJDQGDIWHULQVWDOODWLRQRI5WRIDFLOLWDWHWKHXVHRIWKH
3*
< 7DVNV\RXQHHGWRSHUIRUPDIWHUDQXSJUDGHRIWKH56\VWHP
< $OOWKHHVVHQWLDOVWHSVIRUVHFXULW\LPSOHPHQWDWLRQXVLQJWKH3*DQG&HQWUDO8VHU
$GPLQLVWUDWLRQ
< 7DVNVWRSUHSDUHIRUJRLQJOLYH
< $SSHQGL[HVZLWKWKHPRVWLPSRUWDQW6$31HW²5)URQWHQGQRWHVIRUDXWKRUL]DWLRQV
DQGWKHPRVWIUHTXHQWO\DVNHGTXHVWLRQV

:KR6KRXOG5HDGWKLV%RRN"

7KLVJXLGHZDVGHVLJQHGIRUWKHIROORZLQJSHRSOHXVLQJWKH3*HLWKHULQDQLPSOHPHQWDWLRQ
SURMHFWRUDVDQRQJRLQJUHIHUHQFH
< %DVLV&RQVXOWDQWVZKRLQVWDOO5DQGVHWXSWKHVHFXULW\DWFXVWRPHUVLWHV

xvixvi Authorizations Made Easy


Introduction
How to Use this Guide

< $SSOLFDWLRQ&RQVXOWDQWVZKRZDQWWRVWDUWXVLQJWKH3*DVWKHEDVLVIRUWKHLUFXVWRPHU
VHFXULW\LPSOHPHQWDWLRQ
< &XVWRPHU,7DQGKHOSGHVNSHUVRQQHO

+RZWR8VHWKLV*XLGH

'HSHQGLQJRQ\RXUJHQHUDO6$3DQGDXWKRUL]DWLRQVSHFLILFNQRZOHGJHVWDUWZLWKWKH
IROORZLQJVHFWLRQV
< ,I\RXKDYHOLWWOHRUQRNQRZOHGJHFRQFHUQLQJVHFXULW\DQGWKHDXWKRUL]DWLRQFRQFHSWLQ
5VWDUWZLWKFKDSWHU56\VWHP6HFXULW\DQGWKH$XWKRUL]DWLRQ&RQFHSW
< (YHU\RQHHYHQWKHH[SHUWVVKRXOGUHDGFKDSWHU6HWWLQJ8SWKH3URILOH*HQHUDWRU
)DPLOLDULW\ZLWKWKLVFKDSWHUHQVXUHVDFRPSOHWHVHWXSEHIRUH\RXDFWXDOO\VWDUWZRUNLQJ
ZLWKWKH3*
< ,I\RXKDYHDOUHDG\XVHGWKH3*LQ5HOHDVH)*+$%$RU%ZH
VWURQJO\UHFRPPHQGWKDW\RXUHDGWKHFKDSWHU:KDWªV1HZLQ5HOHDVHDQGWKH
DSSURSULDWHVHFWLRQLQFKDSWHU8SJUDGH,QWKLVFKDSWHUZHGLVFXVVWKHVWHSVWREH
SHUIRUPHGEHIRUH\RXFRQWLQXHZRUNLQJZLWKWKH3*DIWHUDQ56\VWHPXSJUDGH:H
SURYLGHLQIRUPDWLRQIRUDVPRRWKWUDQVLWLRQWR\RXUQH[WUHOHDVH
< 5HDGFKDSWHUV²DWOHDVWRQFHIRULQIRUPDWLRQUHODWHGWRWKHLPSOHPHQWDWLRQRIVHFXULW\
DQGXVLQJWKH3URILOH*HQHUDWRU$IWHUWKDW\RXFDQEURZVHWKHFKDSWHUVRQSHUIRUPLQJ
VSHFLILFWDVNV
< %HIRUHWUDQVSRUWLQJDFWLYLW\JURXSVUHDGFKDSWHU3UHSDULQJWKH5(QYLURQPHQWIRU*R
/LYHFDUHIXOO\
< &KDSWHU7LSVDQG7URXEOHVKRRWLQJKHOSVVROYHRQJRLQJDXWKRUL]DWLRQSUREOHPVRQFH
\RXJROLYH
&HUWDLQWHUPLQRORJ\XVHULQIRUPDWLRQDQGVSHFLDOLFRQVDUHXVHGWKURXJKRXWWKLVJXLGH
7KHIROORZLQJVHFWLRQVH[SODLQKRZWRLGHQWLI\DQGXVHWKHVHKHOSIXOIHDWXUHV

&RQYHQWLRQV

,QWKHWDEOHEHORZ\RXZLOOILQGVRPHRIWKHWH[WFRQYHQWLRQVXVHGWKURXJKRXWWKLVJXLGH

&ROXPQ7LWOH &ROXPQ7LWOH

6DQVVHULILWDOLF 6FUHHQQDPHVRURQVFUHHQREMHFWV EXWWRQV


ILHOGVVFUHHQWH[WHWF
Monospace 8VHULQSXW WH[WWKHXVHUW\SHVYHUEDWLP
1DPH→1DPH 0HQXVHOHFWLRQ1DPHLVWKHPHQXQDPH
DQG1DPHLVWKHLWHPRQWKHPHQX

Release 4.6A/B xvii


xvii
Introduction
Conventions

6DPSOH55HOHDVH6FUHHQ

Menu Bar
Standard Toolbar
Screen Title
♦ Application Toolbar

User menu

SAP standard menu

♣ Workplace Menu

Workplace

Status Bar

♦$SSOLFDWLRQWRROEDU
7KHVFUHHQVKRWVVKRZQLQWKLVJXLGHDUHEDVHGRQIXOOXVHUDXWKRUL]DWLRQ 6$3B$// 
'HSHQGLQJRQ\RXUDXWKRUL]DWLRQVVRPHRIWKHEXWWRQVRQ\RXUDSSOLFDWLRQWRROEDUPD\
QRWEHDYDLODEOH
♣:RUNSODFHPHQX
'HSHQGLQJRQ\RXUDXWKRUL]DWLRQV\RXUZRUNSODFHPHQXPD\ORRNGLIIHUHQWIURP
VFUHHQVKRWVLQWKLVJXLGHZKLFKDUHEDVHGRQ6$3B$//7KH8VHUPHQXDQG6$3VWDQGDUG
PHQXEXWWRQVSURYLGHGLIIHUHQWYLHZVRIWKHZRUNSODFHPHQX
,QWKLVJXLGHERRN\RXOHDUQKRZWREXLOGXVHUPHQXV

1RWH,QWKLVJXLGHERRNZHVKRZWKHWHFKQLFDOQDPHVRIHDFKWUDQVDFWLRQ7RPDWFKRXU
VHWWLQJVFKRRVH([WUDV→6HWWLQJVDQGVHOHFW6KRZWHFKQLFDOQDPHV

xviii Authorizations Made Easy


xviii
Introduction
Conventions

6SHFLDO,FRQV
7KURXJKRXWWKLVJXLGHVSHFLDOLFRQVLQGLFDWHLPSRUWDQWPHVVDJHV%HORZDUHEULHI
H[SODQDWLRQVRIHDFKLFRQ

([HUFLVHFDXWLRQZKHQSHUIRUPLQJWKLVWDVNRUVWHS$QH[SODQDWLRQRIZK\\RXVKRXOGEH
FDUHIXOLVLQFOXGHG

7KLVLQIRUPDWLRQKHOSV\RXXQGHUVWDQGWKHWRSLFLQJUHDWHUGHWDLO,WLVQRWQHFHVVDU\WR
NQRZWKLVLQIRUPDWLRQWRSHUIRUPWKHWDVN

7KHVHPHVVDJHVSURYLGHKHOSIXOKLQWVDQGVKRUWFXWVWRPDNH\RXUZRUNIDVWHUDQGHDVLHU

Release 4.6A/B xix


xix
Introduction
Conventions

xx xx Authorizations Made Easy


:KDW·V1HZLQ5HOHDVH

&RQWHQWV

Overview ..................................................................................................................xxii
User Role Templates...............................................................................................xxii
Flexible User Menus ...............................................................................................xxii
Composite Activity Groups...................................................................................xxiv
User Groups ...........................................................................................................xxiv
Central User Administration .................................................................................xxiv

xxi
What’s New in Release 4.6
Overview

2YHUYLHZ

7KLVFKDSWHUSURYLGHVDEULHIGHVFULSWLRQRIWKHQHZIXQFWLRQDOLW\LQDXWKRUL]DWLRQUHODWHG
WRSLFVLQWKH55HOHDVH
)RUVWHSE\VWHSSURFHGXUHVDQGGHWDLOHGLQIRUPDWLRQRQVSHFLILFWRSLFVSOHDVHVHHWKH
DSSURSULDWHFKDSWHUVDVUHIHUHQFHG

)RUWKHODWHVWLQIRUPDWLRQ\RXVKRXOGDOZD\VFKHFNWKHUHOHDVHQRWHVIRU5HOHDVH

8VHU5ROH7HPSODWHV

:LWK5HOHDVH$6$3GHOLYHUVRYHUXVHUUROHWHPSODWHV7KHXVHUUROHWHPSODWHVDUH
SUHGHILQHGDFWLYLW\JURXSVFRQVLVWLQJRIWUDQVDFWLRQVUHSRUWVDQGZHEDGGUHVVHV<RXKDYH
WKUHHPHWKRGVWRZRUNZLWKXVHUUROHWHPSODWHV
< 8VHDVGHOLYHUHG
< &RS\DQGFKDQJHWKHPWRVXLW\RXUQHHGV
< &UHDWH\RXURZQDFWLYLW\JURXSVIURPVFUDWFK
2QFHXVHUVDUHDVVLJQHGWRRQHRUPRUHDFWLYLW\JURXSVDQGORJRQWRWKHV\VWHPWKH\VHH
WKHLUXVHUPHQX$VVKRZQLQWKHJUDSKLFRQWKHQH[WSDJHWKLVXVHUPHQXFRQWDLQVRQO\
WKRVHLWHPVVXFKDVWUDQVDFWLRQVUHSRUWVDQGZHEDGGUHVVHVWKH\QHHGWRSHUIRUPWKHLU
GDLO\WDVNV8VHUVFDQDOVRDGGWKHLUPRVWIUHTXHQWO\XVHGWUDQVDFWLRQVWRD)DYRULWHVPHQX
IRUTXLFNHUDFFHVV

)OH[LEOH8VHU0HQXV

$VRI5HOHDVH$WKHV\VWHPGLVSOD\VDVSHFLILFXVHUPHQXLQWKHIRUPRIDWUHHDIWHUXVHUV
ORJRQWRWKHV\VWHP VHHJUDSKLFRQQH[WSDJH 7KLVXVHUPHQXLVEDVHGRQWKHXVHUUROH
WHPSODWHRUDFWLYLW\JURXSWKHXVHULVDVVLJQHGWR8VHUVQRORQJHUKDYHWRQDYLJDWHWKURXJK
XQQHFHVVDU\5IXQFWLRQVIRUZKLFKWKH\KDYHQRDXWKRUL]DWLRQ7KHFRPSDQ\PHQXLVQR
ORQJHUDYDLODEOHDVRI5HOHDVH$
:KHQDIXQFWLRQLVVHOHFWHGLWVWDUWVLQWKHVDPHVHVVLRQUHSODFLQJWKHXVHUPHQXZLWKWKH
H[HFXWHGIXQFWLRQ:KHQDXVHUH[LWVDWUDQVDFWLRQRUVWDUWVDQHZVHVVLRQWKHVSHFLILFXVHU
PHQXDXWRPDWLFDOO\UHDSSHDUV
$ORQJZLWKWKHXVHUPHQXV\RXFDQGLVSOD\DFRPSOHWHYLHZRIDOOIXQFWLRQVGHOLYHUHGE\
6$3XVLQJWKH6$3VWDQGDUGPHQX7KLVFRPSOHWHYLHZGLVSOD\VDXWRPDWLFDOO\LIQRXVHU

xxiixxii Authorizations Made Easy


What’s New in Release 4.6
Flexible User Menus

PHQXVKDYHEHHQGHILQHGRULIWKHDGPLQLVWUDWRUKDVFKRVHQWKLVRSWLRQZKHQGHILQLQJQHZ
XVHUPHQXV

8VHU0HQX([DPSOH

+HUHDUHVRPHH[DPSOHVRIGHOLYHUHGDFWLYLW\JURXSV

%DVLV 0LVFHOODQHRXV

$XWKRUL]DWLRQGDWDDGPLQLVWUDWRU &26DOHVPDQDJHU
$XWKRUL]DWLRQSURILOHDGPLQLVWUDWRU &2+HDGRIFRQWUROOLQJ
8VHUDGPLQLVWUDWRU ),$FFRXQWVSD\DEOHDFFRXQWDQW
6\VWHPDGPLQLVWUDWRU ),$FFRXQWVUHFHLYDEOHDFFRXQWDQW
%DFNJURXQGDGPLQLVWUDWRU /23URGXFWLRQSODQQLQJ:RUNHU
'DWDEDVHDGPLQLVWUDWRU /23URGXFWLRQSODQQLQJ2SHUDWRU
&XVWRPL]LQJSURMHFWPHPEHU 00$FFRXQWVSD\DEOHFOHUN

Release 4.6A/B xxiii


xxiii
What’s New in Release 4.6
Composite Activity Groups

&RPSRVLWH$FWLYLW\*URXSV

$VRI5HOHDVH$LWLVSRVVLEOHWRFUHDWHDQDFWLYLW\JURXSWKDWFRQWDLQVDFROOHFWLRQRIRWKHU
DFWLYLW\JURXSV7KLVDFWLYLW\JURXSLVFDOOHGDFRPSRVLWHDFWLYLW\JURXS&RPSRVLWHDFWLYLW\
JURXSVFRQWDLQRQO\RWKHUDFWLYLW\JURXSVDQGQRDXWKRUL]DWLRQGDWD

8VHU*URXSV

,QVWHDGRIXVLQJXVHUJURXSVWRRQO\GLVWULEXWHXVHUPDLQWHQDQFHDPRQJVHYHUDO
DGPLQLVWUDWRUV\RXFDQQRZDVVLJQXVHUVWRRQHRUPRUHXVHUJURXSV7KHFDWHJRU\8VHU
JURXSFDQEHXVHGDVDEDVLVIRUEHWWHUGLVWULEXWLRQRIXVHUGDWDLQFUHDVLQJWKHVSHHGRI
&HQWUDO8VHU$GPLQLVWUDWLRQ

&HQWUDO8VHU$GPLQLVWUDWLRQ

,IDV\VWHPJURXSFRQVLVWVRIGLIIHUHQW56\VWHPVZLWKPXOWLSOHFOLHQWVWKHQWKHVDPH
XVHUVDUHFUHDWHGVHYHUDOWLPHVLQHYHU\FOLHQWDQGDVVLJQHGWRDFWLYLW\JURXSV&HQWUDO8VHU
$GPLQLVWUDWLRQLVGHVLJQHGWRFDUU\RXWWKHVHWDVNVLQDFHQWUDOV\VWHPDQGWKHQGLVWULEXWH
WKLVGDWDWRDOOV\VWHPVLQWKHV\VWHPJURXS
7KH*OREDO8VHU0DQDJHUSURYLGHVWKHV\VWHPDGPLQLVWUDWRUZLWKDQRYHUYLHZRIWKHXVHUV
H[LVWLQJXVHUJURXSVWKHV\VWHPVLQWKHV\VWHPJURXSDQGWKHDFWLYLW\JURXSV%\VLPSO\
XVLQJGUDJDQGGURSWKHV\VWHPDGPLQLVWUDWRUFDQPDNHFKDQJHVLQWKHRYHUYLHZ7KHVH
FKDQJHVWDNHHIIHFWDIWHUGLVWULEXWLRQWRGHSHQGHQWV\VWHPV

xxiv Authorizations Made Easy


xxiv
&KDSWHU 56\VWHP6HFXULW\DQGWKH 
$XWKRUL]DWLRQ&RQFHSW

&RQWHQWV

Overview ..................................................................................................................1–2
The Authorization Concept ....................................................................................1–4
SAP* and DDIC Users .............................................................................................1–8
What Is the Profile Generator? ..............................................................................1–9
What Is an Activity Group? ..................................................................................1–12
R/3 Tools for Security Implementation ...............................................................1–14
Case Study: Security Strategy in a Three-System Environment .....................1–15
Setting Up the Authorization Administrators.....................................................1–19
Policies and Procedures ......................................................................................1–21
Auditing Requirements ........................................................................................1–24

1–1
Chapter 1: R/3 System Security and the Authorization Concept
Overview

2YHUYLHZ

,QWKLVFKDSWHUZHH[SODLQWKHVHWXSDQGPDLQWHQDQFHRIWKH5DXWKRUL]DWLRQFRQFHSW
WKURXJKWKHFRPSOHWH5OLIHF\FOH
7KHJUDSKLFEHORZLOOXVWUDWHVWKH5DXWKRUL]DWLRQF\FOHDQGWKHWRROVXVHGLQYDULRXV
VWDJHVRIWKHLPSOHPHQWDWLRQ

Operations and
Evaluation Implementation
Continuous Improvement

Upgrade +
Preparing the R/3 Environment Production
Authorizations Scoping Ongoing
and Preparation for Go-Live Phase
Development

Description of Setting up User User role Preparation for Going live,


ASAP Miscellaneous Upgrade
auth. concept the profile admin. templates Transporting (AG, user,
generator templates,…)

Setting up ALE
Info gathering Roadmap,
+ structure
IMG
R/3
Users
3 methods of using
user role templates:
Infosystem. 3.x-4.x Õ 4.6
Setting up Central
- Use as is
User Admnistration
Strategy, SU25 - Copy + change
Q&Adb (4.6B) Tips & SU25
Definition First installation - Create own
Global user Troubleshoot. Upgrade
manager
Authorization SAPNet -R/3 Description how to work
with user role templates (AG) Security
list (AL.xls) Frontend
(which exists, how to use, Audit
notes
(formerly OSS) customizing, creating, etc.)

7RROVWR6XSSRUWWKH5$XWKRUL]DWLRQ&\FOH

7KHJXLGHERRNLVGLYLGHGLQWRIRXUVHSDUDWHSKDVHV

< $XWKRUL]DWLRQ6FRSLQJ FKDSWHU


< 3UHSDULQJWKH5(QYLURQPHQWDQG3UHSDUDWLRQIRU*R/LYH FKDSWHU
< 3URGXFWLRQ3KDVH FKDSWHU
< 8SJUDGHDQG2QJRLQJ'HYHORSPHQW FKDSWHU
:HEHJLQZLWKWKH5DXWKRUL]DWLRQFRQFHSWDQGWKHDXWKRUL]DWLRQGHVLJQVR\RXFDQPHHW
UHTXLUHPHQWVVXFKDVPD[LPXPVHFXULW\HDV\XVHUPDLQWHQDQFHDQGVXIILFLHQWSULYLOHJHV
IRUHQGXVHUVWRIXOILOOWKHLUMREGXWLHV7KHDXWKRUL]DWLRQFRQFHSWGHILQHVWKHIXQFWLRQVWREH
FDUULHGRXWLQYDULRXVRUJDQL]DWLRQDOXQLWVE\SHRSOHLQVSHFLILFSRVLWLRQV7KHFRQFHSWDOVR
H[WHQGVWKH5RQOLQHGRFXPHQWDWLRQRQDXWKRUL]DWLRQVDQGSURILOHVUHTXLUHGIRUWKH
YDULRXVHQWHUSULVHDUHDV
,PSOHPHQWLQJDPXOWLOHYHOFOLHQWVHUYHUHQYLURQPHQWRQ:$1VSURYLGHVJUHDWIOH[LELOLW\
%XWLQWKLVHQYLURQPHQWKLJKO\VHQVLWLYHGDWDDQGSURJUDPVDUHDWDJUHDWHUULVNRIEHLQJ
ORVWPDQLSXODWHGDQGVSLHGXSRQWKDQLQDFRQYHQWLRQDOPDLQIUDPHHQYLURQPHQW(YHQ
ZLWKORFDORSHUDWLRQWKLVULVNDSSOLHVWRDOOWKUHHOD\HUV 3UHVHQWDWLRQ$SSOLFDWLRQDQG
'DWDEDVH DQGEHFRPHVHYHQPRUHDFXWHWKDQ:$1V

Authorizations Made Easy


1–2
Chapter 1: R/3 System Security and the Authorization Concept
Overview

7KHIROORZLQJJUDSKLFVKRZVKRZ5FRYHUVWKHDVSHFWVRIGDWDSURWHFWLRQDQGVHFXULW\

$XWKRUL]DWLRQ
FRYHUHGLQ
&RQFHSWLQ5
 'DWDSURWHFWLRQ

$XWKRUL]DWLRQV DWGDWDEDVHOHYHO

0DGH(DV\

SAP SAP

'DWDEDFNXS

$FFHVVSURWHFWLRQ
3URWHFWLRQDW

FRPPXQLFDWLRQOHYHO

5
,QWHJULW\FKHFN

'DWD3URWHFWLRQDQG6HFXULW\

7RPHHWWKHKLJKGHPDQGVRIGDWDSURWHFWLRQDQGVHFXULW\6$3SURYLGHVWKHIROORZLQJ5
VHFXULW\PHFKDQLVPV
< $XWKRUL]DWLRQFRQFHSW WKLVJXLGHERRNGLVFXVVHVDQDXWKRUL]DWLRQGHVLJQXVLQJWKH
3URILOH*HQHUDWRU
< $FFHVVSURWHFWLRQDQGDXWKHQWLFDWLRQRXWVLGHRI5LQFOXGLQJDXWKRUL]DWLRQVEHWZHHQ
:HEEDVHGDSSOLFDWLRQVDQG5 QRWGLVFXVVHGLQWKLVJXLGH
< 3URWHFWLRQDWQHWZRUNFRPPXQLFDWLRQOHYHO QRWGLVFXVVHGLQWKLVJXLGH
< 'DWDSURWHFWLRQDWGDWDEDVHOHYHO QRWGLVFXVVHGLQWKHJXLGH

Release 4.6A/B
1–3
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept

7KH$XWKRUL]DWLRQ&RQFHSW

7KHFRQFHSWRIDXWKRUL]DWLRQVLQWKH56\VWHPLQFOXGHVWKHIROORZLQJ
< 3URILOH*HQHUDWRU
< /RFNLQJDQGXQORFNLQJWUDQVDFWLRQV
< /RFNHGUHFRUGV
< 6WUXFWXUDODXWKRUL]DWLRQV 1RWGLVFXVVHGLQWKLVYHUVLRQVHH$XWKRUL]DWLRQV0DGH(DV\
JXLGHERRN$%IRULQIRUPDWLRQ
< 'DWDHQFU\SWLRQ QRWGLVFXVVHGLQWKLVERRN
< /RFNLQJV\VWHPIRUFKDQJHV
7KH5DXWKRUL]DWLRQFRQFHSWSHUPLWVWKHDVVLJQPHQWRIJHQHUDODQGRUILQHO\GHWDLOHG
XVHUDXWKRUL]DWLRQV7KHVHDVVLJQPHQWVFDQUHDFKGRZQWRWKHWUDQVDFWLRQILHOGDQGILHOG
YDOXHOHYHO7KHVHDXWKRUL]DWLRQVDUHFHQWUDOO\DGPLQLVWHUHGLQXVHUPDVWHUUHFRUGVDQGPRVW
DOORZWKHKDQGOLQJRIFHUWDLQ5FRPSRQHQWVDSSOLFDEOHWRVSHFLILFRSHUDWLRQV$FWLRQVE\D
XVHUPD\UHTXLUHVHYHUDODXWKRUL]DWLRQV)RUH[DPSOHWRFKDQJHDPDWHULDOPDVWHUUHFRUG
DXWKRUL]DWLRQVDUHUHTXLUHGIRUWKH
< 7UDQVDFWLRQ´FKDQJHµ
< 6SHFLILFPDWHULDO
< *HQHUDODXWKRUL]DWLRQWRZRUNZLWKLQWKHFRPSDQ\FRGH
7KHUHVXOWLQJUHODWLRQVKLSVFDQEHFRPHYHU\FRPSOH[7RPHHWWKHVHUHTXLUHPHQWVWKH5
DXWKRUL]DWLRQFRQFHSWKDVEHHQLPSOHPHQWHGDVDIRUPRISVHXGRREMHFWRULHQWHGFRQFHSW
ZLWKFRPSOHWHDXWKRUL]DWLRQREMHFWV(DFKDXWKRUL]DWLRQREMHFWLVDFRPELQDWLRQRI
DXWKRUL]DWLRQILHOGV$QDXWKRUL]DWLRQDOZD\VUHIHUVWRDQDXWKRUL]DWLRQREMHFWDQGFDQ
FRQWDLQLQWHUYDOVIRUWKHILHOGYDOXHV$XWKRUL]DWLRQFKHFNVSURWHFWWKHIXQFWLRQVRUREMHFWV
\RXFKRRVH6WDQGDUGGHOLYHUHG5KDVDXWKRUL]DWLRQFKHFNVHPEHGGHGLQWKHSURJUDP
ORJLF3URJUDPPHUVKDYHWRGHFLGHZKLFKDVSHFWVRIWKHLUSURJUDPPHGIXQFWLRQDOLW\VKRXOG
EHFKHFNHGDQGKRZWKHFKHFNVKRXOGEHFRQGXFWHG
$XWKRUL]DWLRQDGPLQLVWUDWRUVFUHDWHDXWKRUL]DWLRQVWKDWDUHDVVLJQHGWRXVHUVLQFROOHFWLRQV
FDOOHGSURILOHV7KH3URILOH*HQHUDWRU 3* XVXDOO\JHQHUDWHVDXWKRUL]DWLRQVDQG
DXWKRUL]DWLRQSURILOHVDOWKRXJKDXWKRUL]DWLRQVFDQDOVREHPDQXDOO\LQVHUWHGLQWRDSURILOH
7KHIROORZLQJJUDSKLFVKRZVWKHDXWKRUL]DWLRQFRPSRQHQWVDQGH[SODLQVWKHLUUHODWLRQVKLS

Authorizations Made Easy


1–4
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept

2EMHFW&ODVV $XWKRUL]DWLRQ $XWKRUL]DWLRQ 3URILOH 8VHU

2EMHFW

)LHOG *HQHUDWHG

)LHOGYDOXH IURP3*

-RKQ([DPSOH

6$3
/RQJWH[W

7HFKQQDPH )LHOG

)LHOGYDOXH
),

/RQJWH[W

7HFKQQDPH )LHOG

)LHOGYDOXH

/RQJWH[W )LHOG *HQHUDWHG $P\$Q\ZKHUH


+5
7HFKQQDPH )LHOGYDOXH IURP3* 6$3

6$3$XWKRUL]DWLRQ&RQFHSW

$XWKRUL]DWLRQ2EMHFW
$VVKRZQLQWKHJUDSKLF´6$3$XWKRUL]DWLRQ&RQFHSWµDERYHREMHFWVDOORZFRPSOH[XVHU
DXWKRUL]DWLRQFKHFNV$QDXWKRUL]DWLRQREMHFWZRUNVDVDWHPSODWHIRUDWREHGHILQHG
DXWKRUL]DWLRQDQGFRQWDLQVDPD[LPXPRIWHQILHOGVSHUREMHFW8VHUVPD\RQO\FRQGXFWDQ
DFWLYLW\LIWKH\VDWLVI\WKHDXWKRUL]DWLRQFKHFNIRUHDFKILHOGLQWKHDXWKRUL]DWLRQGHILQHGRQD
VSHFLILFDXWKRUL]DWLRQREMHFW
$XWKRUL]DWLRQREMHFWVDUHJURXSHGLQDQREMHFWFODVVVXFKDV)LQDQFLDO$FFRXQWLQJRU
+XPDQ5HVRXUFHV$XWKRUL]DWLRQREMHFWVFDQEHFUHDWHGPDQXDOO\E\FKRRVLQJ7RROV→
$%$3:RUNEHQFK→'HYHORSPHQW→2WKHU7RROV→$XWKRUL]DWLRQ2EMHFWV→2EMHFWV%HFDXVH
DXWKRUL]DWLRQREMHFWVDUHFOLHQWLQGHSHQGHQWDQGGHILQHGLQWKH$%$3:RUNEHQFK
GHYHORSHUVDQGSURJUDPPHUVDUHJHQHUDOO\UHVSRQVLEOHIRUFUHDWLQJQHZDXWKRUL]DWLRQ
REMHFWV
&KDQJHVDUHQHFHVVDU\RQO\LI\RX´PRGLI\µ\RXUV\VWHPDQGZDQWWRLQFOXGH
$87+25,7<&+(&.FDOOVRUQHZDXWKRUL]DWLRQREMHFWV<RXFDQRQO\FKDQJHRUGHOHWH
DXWKRUL]DWLRQREMHFWVDGGHGE\\RXUFRPSDQ\5DXWKRUL]DWLRQREMHFWVPD\QRWEHGHOHWHG
RUFKDQJHG7RFKDQJHDQREMHFW\RXPXVWILUVWGHOHWHDOODXWKRUL]DWLRQVZLWKZKLFKLWLV
DVVRFLDWHG

$Q$87+25,7<&+(&.LVDQ$%$3FRPPDQG

Release 4.6A/B
1–5
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept

$XWKRUL]DWLRQ2EMHFW)LHOGV
$XWKRUL]DWLRQILHOGVIRUDQREMHFWFDQEHFUHDWHGPDQXDOO\E\FKRRVLQJ7RROV→$%$3
'HYHORSPHQW:RUNEHQFK→'HYHORSPHQW→2WKHU7RROV→$XWKRUL]DWLRQ2EMHFWV→)LHOGV
7KHILHOGVLQDQDXWKRUL]DWLRQREMHFWDUHOLQNHGWRGDWDHOHPHQWVLQWKH6$3$%$3
'LFWLRQDU\7KHSHUPLVVLEOHYDOXHVFRQVWLWXWHDQDXWKRUL]DWLRQ:KHQDQDXWKRUL]DWLRQ
FKHFNWDNHVSODFHWKHV\VWHPFKHFNVWKHYDOXHV\RXKDYHVSHFLILHGLQDQDXWKRUL]DWLRQ
DJDLQVWWKRVHUHTXLUHGWRFDUU\RXWWKHDFWLRQ8VHUVPD\RQO\FDUU\RXWWKHDFWLRQLIWKH\
VDWLVI\WKHFRQGLWLRQVIRUHYHU\ILHOGGHILQHGIRUDVSHFLILFDXWKRUL]DWLRQREMHFW
8VLQJWKHDXWKRUL]DWLRQPDLQWHQDQFHIXQFWLRQVGHILQHDOODXWKRUL]DWLRQILHOGVLQWKHV\VWHP
GHYHORSPHQWHQYLURQPHQW&KDQJHVDUHQHFHVVDU\RQO\LI\RX´PRGLI\µ\RXUV\VWHPDQG
WKHQHZV\VWHPHOHPHQWVDUHVXEMHFWHGWRDXWKRUL]DWLRQFKHFNV

$XWKRUL]DWLRQV
$QDXWKRUL]DWLRQDOORZV\RXWRFDUU\RXWDQ5WDVNEDVHGRQDVHWRIILHOGYDOXHVLQDQ
DXWKRUL]DWLRQREMHFW(DFKDXWKRUL]DWLRQUHIHUVWRH[DFWO\RQHDXWKRUL]DWLRQREMHFWDQG
GHILQHVWKHSHUPLWWHGYDOXHUDQJHIRUHDFKDXWKRUL]DWLRQILHOGRIWKLVDXWKRUL]DWLRQREMHFW
$XWKRUL]DWLRQVDUHXVHGLQWKHXVHUPDVWHUUHFRUGDVSURILOHV
%\WKHPVHOYHVDXWKRUL]DWLRQVGRQRWH[LVW7KH\RQO\KDYHPHDQLQJLQVLGHDSURILOH

)LHOG 9DOXH

&XVWRPHUW\SH &8677<3(
$FWLYLW\ $&797 
([SODQDWLRQ  DOOSRVVLEOHYDOXHV GLVSOD\

$XWKRUL]DWLRQVDUHXVHGWRVSHFLI\SHUPLWWHGYDOXHVIRUWKHILHOGVLQDQDXWKRUL]DWLRQREMHFW
7KHUHPD\EHRQHRUPRUHYDOXHVIRUHDFKILHOG$XWKRUL]DWLRQVDOORZ\RXWRGHWHUPLQHWKH
QXPEHURIVSHFLILFYDOXHVRUYDOXHUDQJHVIRUDILHOG$OOYDOXHVRUHPSW\ILHOGVFDQEH
SHUPLVVLEOHYDOXHV&KDQJHVDIIHFWDOOXVHUVZKRVHDXWKRUL]DWLRQSURILOHFRQWDLQVWKDW
DXWKRUL]DWLRQ7KH5DXWKRUL]DWLRQDGPLQLVWUDWRUFDQPDLQWDLQDXWKRUL]DWLRQV
DXWRPDWLFDOO\XVLQJWKH3*RUPDQXDOO\2QFHWKHDXWKRUL]DWLRQLVDFWLYDWHGFKDQJHVDIIHFW
DOOXVHUVZKLFKFRQWDLQWKHSURILOHZLWKWKHDFWLYDWHGDXWKRUL]DWLRQ

2QFHJHQHUDWHGDXWKRUL]DWLRQVDQGSURILOHVFUHDWHGZLWKWKH3*DUHDXWRPDWLFDOO\
DFWLYDWHG,I\RXPDQXDOO\FUHDWHDQGPDLQWDLQDXWKRUL]DWLRQVDQGSURILOHV\RXPXVWDOVR
PDQXDOO\DFWLYDWHWKHP*HQHUDWHGSURILOHVDQGDXWKRUL]DWLRQVFDQQRWEHPDLQWDLQHG
PDQXDOO\ZLWKWKHFRQYHQWLRQDOPDLQWHQDQFHWUDQVDFWLRQV68DQG68+RZHYHUZH
GRQRWUHFRPPHQGWKHXVHRIWKHVHWUDQVDFWLRQVIRUSURILOHDQGXVHUDGPLQLVWUDWLRQ
DQ\PRUH<RXVKRXOGXVHWKH3URILOH*HQHUDWRULQVWHDG

Authorizations Made Easy


1–6
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept

$XWKRUL]DWLRQ3URILOHV
8VHUDXWKRUL]DWLRQVDUHQRWGLUHFWO\DVVLJQHGZLWKWKH3*WRWKHXVHUPDVWHUUHFRUGV
,QVWHDGWKHVHDXWKRUL]DWLRQVDUHDVVLJQHGDVDXWKRUL]DWLRQSURILOHV7KHDXWKRUL]DWLRQ
DGPLQLVWUDWRUFDQFUHDWHDXWKRUL]DWLRQSURILOHVPDQXDOO\RUDXWRPDWLFDOO\
&KDQJHVDIIHFWDOOXVHUVWRZKRPWKLVSURILOHLVDVVLJQHGDQGWDNHHIIHFWRQO\ZKHQWKHXVHU
ORJVRQ8VHUVZKRDUHORJJHGRQZKHQWKHFKDQJHWDNHVSODFHUHPDLQXQDIIHFWHGGXULQJ
WKHLUFXUUHQWVHVVLRQEXWZKHQWKH\ORJRQDJDLQWKHLUSURILOHFKDQJHVDFFRUGLQJO\$XVHU·V
DXWKRUL]DWLRQVDUHORDGHGLQWRWKHXVHUEXIIHURQO\ZKHQWKH\ORJRQ

<RXFDQQRWXVHWKHDXWKRUL]DWLRQSURILOHPDLQWHQDQFHWUDQVDFWLRQ68WRPDQXDOO\
PDQLSXODWHWKH3*FUHDWHGDXWKRUL]DWLRQSURILOHV$OWKRXJKWHFKQLFDOO\SRVVLEOHQHYHU
FUHDWHDSURILOHWKDWFRQWDLQVERWKPDQXDOO\DQGDXWRPDWLFDOO\JHQHUDWHGDXWKRUL]DWLRQVRU
SURILOHV:HQRORQJHUUHFRPPHQGWKHXVHRIWUDQVDFWLRQ68IRUSURILOHDQGXVHU
DGPLQLVWUDWLRQ<RXVKRXOGXVHWKH3URILOH*HQHUDWRULQVWHDG
1DPLQJ&RQYHQWLRQIRU$XWKRUL]DWLRQ3URILOHV
$XWKRUL]DWLRQSURILOHVEHJLQQLQJZLWKD7PD\FRQWDLQFULWLFDO 6B86(5 DXWKRUL]DWLRQ
REMHFWV$OVRXVHWKH3*WRH[FOXGHIXUWKHUDXWKRUL]DWLRQREMHFWV IRUH[DPSOH+5GDWD
IURPWKHSURILOH
1RWHWKDWZHDUHWDONLQJDERXWDXWKRUL]DWLRQSURILOHVQRWDFWLYLW\JURXSV

:KHQ\RXILUVWVDYHWKHDXWKRUL]DWLRQSURILOHV\RXDUHSURPSWHGWRHQWHUDSURILOHQDPH
7KHV\VWHPSURSRVHVDQDPHIRUWKHSURILOHKRZHYHURQO\WKHILUVWFKDUDFWHUV WKH
SURILOHWRUVR FDQEHIUHHO\DVVLJQHG7KHQXPEHURISURILOHVJHQHUDWHGGHSHQGVRQWKH
QXPEHURIDXWKRUL]DWLRQVLQHDFKDFWLYLW\JURXS$PD[LPXPRIDXWKRUL]DWLRQVILWLQWR
DSURILOH,IWKHUHDUHPRUHWKDQDXWKRUL]DWLRQVDQDGGLWLRQDOSURILOHLVJHQHUDWHG,W
KDVWKHVDPHFKDUDFWHUWRUVRDVWKHSURILOHQDPHDQGWKHODVWWZRGLJLWV SRVLWLRQV
DQG DUHXVHGDVDFRXQWHU
7RDYRLGFRQIOLFWVEHWZHHQFXVWRPHUGHILQHGSURILOHVDQGWKRVHSURILOHVVXSSOLHGE\6$3
\RXVKRXOGQRWXVHDQ\QDPHWKDWKDVDQXQGHUVFRUHLQWKHVHFRQGSRVLWLRQ6$3SODFHVQR
RWKHUUHVWULFWLRQVRQWKHQDPLQJRIDXWKRUL]DWLRQSURILOHV UHIHUWRQRWH 7KHUHIRUHLI
\RXUFRPSDQ\KDVLWVRZQQDPLQJFRQYHQWLRQV\RXDUHDOORZHGWRRYHUZULWHWKH
SURSRVHGQDPH
7KHQDPHVRIWKHDXWKRUL]DWLRQVDUHDOVRGHULYHGIURPWKHSURILOHWRUVR:KHQPRUHWKDQ
RQHDXWKRUL]DWLRQLVUHTXLUHGIRUDQREMHFWWKHODVWWZRSODFHVDUHXVHGDVDFRXQWHU%DVHG
RQWKHQDPHIRUWKHDXWKRUL]DWLRQSURILOHWKHWHFKQLFDOQDPHVIRUWKHDXWKRUL]DWLRQVWREH
FUHDWHGVWDUWZLWKD7DQGFRPSULVHWKHLQWHUQDOQXPEHURIWKHDFWLYLW\JURXSDQGWZRHQG
GLJLWVLQWKHUDQJH² 7LVDVDPSOHDXWKRUL]DWLRQQDPH

8VHU0DVWHU5HFRUGV
0DVWHUUHFRUGVHQDEOHWKHXVHUWRORJRQWRWKH56\VWHPDQGDOORZOLPLWHGDFFHVVWRWKH
IXQFWLRQVDQGREMHFWV7KHXVHUDGPLQLVWUDWRUPDLQWDLQVXVHUPDVWHUUHFRUGVE\FKRRVLQJ
7RROV→$GPLQLVWUDWLRQ→8VHUPDLQWHQDQFH→8VHUV

Release 4.6A/B
1–7
Chapter 1: R/3 System Security and the Authorization Concept
SAP* and DDIC Users

$XWKRUL]DWLRQ&KHFNV
7RFRQGXFWDQDXWKRUL]DWLRQFKHFNWKLVFKHFNPXVWEHLQFOXGHGLQWKHWUDQVDFWLRQ·VVRXUFH
FRGH'XULQJWKHFKHFNWKHV\VWHPFRPSDUHVDXWKRUL]DWLRQSURILOHYDOXHV DVVLJQHGE\WKH
DXWKRUL]DWLRQDGPLQLVWUDWRU WRWKHYDOXHVQHHGHGWRFDUU\RXWDSURJUDPVSHFLILHGDFWLRQ$
XVHUPD\RQO\FDUU\RXWWKHDFWLRQLIWKHDXWKRUL]DWLRQFKHFNLVVXFFHVVIXOIRUHYHU\ILHOGLQ
WKHDXWKRUL]DWLRQREMHFW
$XWKRUL]DWLRQFKHFNVDUHWULJJHUHGE\WKH$%$3$87+25,7<&+(&.VWDWHPHQW7KH
SURJUDPPHUVSHFLILHVDQDXWKRUL]DWLRQREMHFWDQGWKHUHTXLUHGYDOXHVIRUHDFKDXWKRUL]DWLRQ
ILHOG7KH$87+25,7<&+(&.WKHQYHULILHVLIDXVHUKDVDXWKRUL]DWLRQDQGLIWKLV
DXWKRUL]DWLRQLVIURPWKHXVHUPDVWHUUHFRUG7KHFKHFNLVVXFFHVVIXOLIDQDXWKRUL]DWLRQLV
IRXQGWKDWFRQWDLQVWKHYDOXHVVSHFLILHGLQWKH$87+25,7<&+(&.
:KHQ5WUDQVDFWLRQVDUHH[HFXWHGVLQFHWKHWUDQVDFWLRQFDOOVRWKHUZRUNDUHDVLQWKH
EDFNJURXQGPDQ\DXWKRUL]DWLRQREMHFWVDUHRIWHQFKHFNHG)RUWKHVHFKHFNVWREH
VXFFHVVIXOWKHXVHUPXVWKDYHWKHDSSURSULDWHDXWKRUL]DWLRQV$XWKRUL]DWLRQFKHFNVFDQEH
GLVDEOHGE\VHWWLQJFKHFNLQGLFDWRUVLQWUDQVDFWLRQ68RUE\VZLWFKLQJRIIREMHFWVJOREDOO\

$FWLYDWLQJDQG'HDFWLYDWLQJ$XWKRUL]DWLRQ&KHFNVLQ7UDQVDFWLRQV
,WLVSRVVLEOHWKDWXVHUVUHFHLYHPRUHDXWKRUL]DWLRQVWKDQQHFHVVDU\OHDGLQJWRDQLQFUHDVHG
PDLQWHQDQFHORDG$XWKRUL]DWLRQFKHFNVDUHFRQGXFWHGZKHUHYHUWKH\DUHZULWWHQLQWRD
WUDQVDFWLRQ·VVRXUFHFRGH2QO\E\XVLQJWKH3*FDQFKHFNLQGLFDWRUVEHVHWWRH[FOXGH
< &HUWDLQDXWKRUL]DWLRQREMHFWVIURPDXWKRULW\FKHFNV
< 6SHFLILFDXWKRUL]DWLRQFKHFNVLQVSHFLILFWUDQVDFWLRQV
< $QDXWKRUL]DWLRQREMHFWIURPEHLQJFKHFNHG
$OORIWKHVHDGMXVWPHQWVDUHSRVVLEOHZLWKRXWDOWHULQJWKHSURJUDPFRGH3ULRUWR
DXWRPDWLFDOO\JHQHUDWLQJWKHDXWKRUL]DWLRQSURILOHXVHWKHFKHFNLQGLFDWRUVWRFRQWUROZKLFK
REMHFWVDSSHDULQWKH3*DQGZKLFKILHOGYDOXHVDUHGLVSOD\HG6$3GHOLYHUVDGHIDXOWFKHFN
LQGLFDWRUVHWWLQJZLWK5)RUPRUHLQIRUPDWLRQUHIHUWRFKDSWHU7LSVDQG
7URXEOHVKRRWLQJWKHVHFWLRQ5HGXFLQJWKH6FRSHRI$XWKRUL]DWLRQ&KHFNV

6$3 DQG'',&8VHUV

'XULQJ\RXU5LQVWDOODWLRQFOLHQWVDQGDUHFUHDWHG,QFOLHQWVDQG
WZRVSHFLDOXVHUVDUHGHILQHGEXWQRVSHFLDOXVHULVFUHDWHGLQFOLHQW6LQFHWKHVHXVHUV
KDYHVWDQGDUGQDPHVDQGSDVVZRUGV\RXQHHGWRVHFXUHWKHVHXVHUVIURPXQDXWKRUL]HG
XVDJH WKH(DUO\:DWFKDQG&3,&XVHUVDUHQRWFRYHUHGLQWKLVERRN 
7KHWZRVSHFLDO5XVHUVDUH
< 6$3
'HILQHGDVWKHVWDQGDUG5VXSHUXVHU6$3 GRHVQRWUHTXLUHDXVHUPDVWHUUHFRUG
5DWKHULW

Authorizations Made Easy


1–8
Chapter 1: R/3 System Security and the Authorization Concept
What Is the Profile Generator?

Π,VGHILQHGLQWKHV\VWHPFRGH
Π+DVDGHIDXOWSDVVZRUG PASS
Π+DVXQOLPLWHGV\VWHPDFFHVVDXWKRUL]DWLRQV
:KHQ\RXLQVWDOO5DXVHUPDVWHUUHFRUGLVGHILQHGLQFOLHQWVDQGZLWKWKH
LQLWLDOSDVVZRUG060719926$3 XVHUPDVWHUUHFRUGGHDFWLYDWHV6$3 ªVVSHFLDO
SURSHUWLHV7RSUHYHQW6$3 PLVXVHFKDQJHWKHSDVVZRUG:HUHFRPPHQGKRZHYHU
WKDW\RXGHDFWLYDWH6$3 DQGGHILQH\RXURZQVXSHUXVHU
< '',&
7KLVXVHULVWKHPDLQWHQDQFHXVHUIRUWKH$%$3'LFWLRQDU\DQGVRIWZDUHORJLVWLFV7KH
XVHUPDVWHUUHFRUGIRU'',&LVDXWRPDWLFDOO\FUHDWHGLQFOLHQWVDQGDQGKDVWKH
GHIDXOWSDVVZRUG199207066\VWHPFRGHWHVWLQJDOORZV'',&VSHFLDOSULYLOHJHVIRU
FHUWDLQRSHUDWLRQV)RUH[DPSOH'',&LVWKHRQO\XVHUWKDWFDQORJRQGXULQJDQ
XSJUDGH7RSUHYHQW'',&PLVXVHFKDQJHWKHSDVVZRUG

8VHUHSRUW56865WRFKHFNZKHWKHUWKHVWDQGDUG6$3 DQG'',&SDVVZRUGVKDYH
EHHQFKDQJHG7KLVUHSRUWLVUHVWULFWHGWRXVHUVZKREHORQJWRWKHXVHUJURXS683(5ZLWK
DFWLYLW\DQGFOLHQWDGPLQLVWUDWLRQ

:KDW,VWKH3URILOH*HQHUDWRU"

6$3·V3URILOH*HQHUDWRU 3* KHOSVWKHDXWKRUL]DWLRQDGPLQLVWUDWRUFUHDWHJHQHUDWHDQG
DVVLJQDXWKRUL]DWLRQSURILOHV)LUVWUHOHDVHGZLWK*WKH3*DFFHOHUDWHV5
LPSOHPHQWDWLRQE\VLPSOLI\LQJWKHWDVNRIVHWWLQJXSWKHDXWKRUL]DWLRQHQYLURQPHQW7KH
DGPLQLVWUDWRURQO\QHHGVWRFRQILJXUHWKHFXVWRPHUVSHFLILFVHWWLQJVWKH3*PDQDJHVRWKHU
WDVNVVXFKDVVHOHFWLQJWKHUHOHYDQWDXWKRUL]DWLRQREMHFWVIRUFRQVLGHUDWLRQ7KH3*LVIXOO\
LQWHJUDWHGZLWK5DQGLVDYDLODEOHRQDOO5VXSSRUWHGSODWIRUPV7KH3*UHSUHVHQWV\HW
DQRWKHULPSURYHPHQWRI6$3·VWRROEDVHGVXSSRUWDQGDUHGXFWLRQLQ5LPSOHPHQWDWLRQ
WLPH
7KH3*LVDQDSSURDFKWRGHILQLQJWKHDXWKRUL]DWLRQHQYLURQPHQW7KHDGPLQLVWUDWRUQR
ORQJHUXVHVWKHDXWKRUL]DWLRQREMHFWVWRGHILQHWKHDXWKRUL]DWLRQVIRUYDULRXVXVHUJURXSV
LQVWHDGDXWKRUL]DWLRQSURILOHVDUHEXLOWDURXQGWKHIXQFWLRQVWREHSHUIRUPHGLQ5%DVHG
RQWKHIXQFWLRQVVHOHFWHGWKH3*SLFNVWKHUHOHYDQWDXWKRUL]DWLRQREMHFWVDQGJURXSVWKHP
LQDQHZDXWKRUL]DWLRQSURILOH
8VLQJIXQFWLRQVWRGHILQHDXWKRUL]DWLRQSURILOHV
< 6SHHGVXSWKHSURFHVV
< 'HILQHVDXWKRUL]DWLRQSURILOHV
< 6LPSOLILHVDGPLQLVWUDWRUXVHUFRPPXQLFDWLRQDOORZLQJERWKWKHDGPLQLVWUDWRUDQG
XVHUVWRXVHWKHVDPH5IXQFWLRQWHUPLQRORJ\
7RXVHWKH3*\RXILUVWKDYHWRVHWLWXS7KHRQHWLPHVHWXSLQYROYHVWKHIROORZLQJVWHSV
 &KHFNLIWKH6$356\VWHPSDUDPHWHULVVHWFRUUHFWO\WRDFWLYH

Release 4.6A/B
1–9
Chapter 1: R/3 System Security and the Authorization Concept
What Is the Profile Generator?

 8VH68WRLQLWLDOL]HWKHWDEOHV862%7B&DQG862%;B& DQGWKHQFXVWRPL]HWKHPLI
GHVLUHG 
)RUGHWDLOHGLQIRUPDWLRQSOHDVHUHDGFKDSWHU6HWWLQJ8SWKH3URILOH*HQHUDWRU
2QFHWKH3*LVVHWXS\RXFDQZRUNZLWKLW%HIRUHZRUNLQJZLWKZLWKWKH3*LWLVXVHIXOWR
XQGHUVWDQGLWVFRPSRQHQWV

&RPSRQHQWVRIWKH3URILOH*HQHUDWRU
7KH3*KDVWKHIROORZLQJFRPSRQHQWV
$FWLYLW\*URXSV
$QDFWLYLW\JURXSLVDFROOHFWLRQRI5WUDQVDFWLRQVDXWKRUL]DWLRQVDQGDGGLWLRQDOREMHFWV
<RXFDQDVVLJQDQDFWLYLW\JURXSWRDVPDQ\XVHUVDV\RXZDQW<RXFDQFUHDWHGLVSOD\
FKDQJHFRS\DQGWUDQVSRUWDFWLYLW\JURXSV
&RPSRVLWH$FWLYLW\*URXSV
&RPSRVLWHDFWLYLW\JURXSVDUHPDGHXSRIDFROOHFWLRQRIDFWLYLW\JURXSV7KHXVHUVDVVLJQHG
WRDFRPSRVLWHDFWLYLW\JURXSDUHDXWRPDWLFDOO\DGGHGWRWKHDFWLYLW\JURXSVGXULQJD
FRPSDULVRQ&RPSRVLWHDFWLYLW\JURXSVWKHPVHOYHVGRQRWFRQWDLQDQ\DXWKRUL]DWLRQGDWD
,QVWHDGRIKDYLQJWRDVVLJQHDFKXVHUWRHDFKDFWLYLW\JURXS\RXFDQVHWXSDFRPSRVLWH
DFWLYLW\JURXSDQGWKHQDVVLJQWKHXVHUVWRWKLVJURXS
'HULYHG$FWLYLW\*URXSV
<RXFDQXVHDQH[LVWLQJDFWLYLW\JURXSDVDUHIHUHQFHZKHQFUHDWLQJDQHZRQH7KHV\VWHP
WUDQVIHUVWKHWUDQVDFWLRQVLQRQHDFWLYLW\JURXSWRDQHZDFWLYLW\JURXS³RQHWKDWUHPDLQV
GHSHQGHQWRQWKHILUVW<RXFDQGLVSOD\WKHKLHUDUFK\RIWKHDFWLYLW\JURXSVWKDWLQKHULW
WUDQVDFWLRQVIURPHDFKRWKHUE\FKRRVLQJ$FWLYLW\JURXS→:KHUHXVHGOLVW
:LWKDQDFWLYLW\JURXSGHULYHGIURPDGLIIHUHQWDFWLYLW\JURXS\RXFDQQRWHQWHU
WUDQVDFWLRQVGLUHFWO\<RXFDQQRWUHVHWWKHGHILQLWLRQRIWKHLQLWLDODFWLYLW\JURXSIURPZKLFK
WKHGHULYHGDFWLYLW\JURXSLQKHULWHGLWVWUDQVDFWLRQV3DVVLQJRQWUDQVDFWLRQVRQO\UHIHUVWR
WKHPHQXVHOHFWLRQDQGQRWWRWKHDXWKRUL]DWLRQV<RXPXVWPDLQWDLQDXWKRUL]DWLRQV
VHSDUDWHO\LQHDFKDFWLYLW\JURXSWKHVHDUHQRWSDVVHGRQ,WLVDOVRSRVVLEOHWRWUDQVIHUWKH
DXWKRUL]DWLRQGDWDRIWKHSUHYLRXVDFWLYLW\JURXSWRWKHGHULYHGDFWLYLW\JURXSDVDFRS\
8VHU$VVLJQPHQW
8VHUVFDQEHDVVLJQHGWRVLQJOHDFWLYLW\JURXSVRUWRFRPSRVLWHDFWLYLW\JURXSVZKLFKPRVWO\
UHSUHVHQWMREUROHV8VHUVWKDW\RXDVVLJQWRDQDFWLYLW\JURXSPD\H[HFXWHWKHWUDQVDFWLRQV
UHSRUWVRUDQ\RWKHUWDVNLQWKHDFWLYLW\JURXSZLWKWKHFRUUHVSRQGLQJDXWKRUL]DWLRQV

*HQHUDWLQJWKH3URILOHV
7KHDGPLQLVWUDWRUFKRRVHVWKHVSHFLILFPHQXSDWKVDQGIXQFWLRQVIRUHDFKXVHUJURXS7KLV
VHOHFWLRQGHWHUPLQHVWKH5DFWLYLWLHVWKDWXVHUVLQHDFKXVHUJURXSDUHDXWKRUL]HGWR
SHUIRUP
8VLQJWKHVHOHFWHGWUDQVDFWLRQFRGHVWKH3*GHWHUPLQHVWKHDIIHFWHGDXWKRUL]DWLRQREMHFWV
7RVLPSOLI\WKHFUHDWLRQRIVXEVHTXHQWLQGLYLGXDODXWKRUL]DWLRQSURILOHV5FRQWDLQV

Authorizations Made Easy


1–10
Chapter 1: R/3 System Security and the Authorization Concept
What Is the Profile Generator?

GHIDXOWYDOXHVIRUPDQ\DXWKRUL]DWLRQILHOGVLQVSHFLILFDXWKRUL]DWLRQREMHFWV)RUH[DPSOH
RQHSRVVLEOHDFFHVVUHVWULFWLRQPLJKWEHWKHGHIDXOWYDOXH'LVSOD\OLPLWLQJWKHXVHUWR
GLVSOD\PRGHRQFHUWDLQWUDQVDFWLRQV
$GGLWLRQDOO\WKH3*LGHQWLILHVWKHRUJDQL]DWLRQDOOHYHOVWKDWSOD\DUROHLQWKHH[WUDFWHG
DXWKRUL]DWLRQREMHFWVDQGFOHDUO\GLVSOD\VWKHVHOHYHOVIRUWKHDGPLQLVWUDWRU7KH
DXWKRUL]DWLRQDGPLQLVWUDWRUPD\KDYHWRLQWHUYHQHDQGPDQXDOO\GHILQHWKHOHYHOVWRZKLFK
WKHXVHUVQHHGDFFHVV IRUH[DPSOHWKHFRPSDQ\FRGH 
7KH3*WKHQSODFHVWKHVSHFLILHGOHYHOVLQWKHDXWKRUL]DWLRQREMHFWV$WWKLVSRLQWDORWRI
DXWKRUL]DWLRQREMHFWILHOGVIRUWKHQHZDXWKRUL]DWLRQSURILOHKDYHEHHQILOOHGKRZHYHUWKHUH
DUHVWLOOILHOGVWKDWQHHGWREHPDLQWDLQHG7KHDXWKRUL]DWLRQREMHFWVDUHGLVSOD\HG
KLHUDUFKLFDOO\LQDVSHFLDOPDLQWHQDQFHWUDQVDFWLRQ7KHDGPLQLVWUDWRUPD\DGMXVWWKH
UHPDLQLQJYDOXHVVXFKDVPDWHULDOW\SHRUGHUW\SHHWF
:LWKLQWKLVPDLQWHQDQFHWUDQVDFWLRQWKHDGPLQLVWUDWRUFDQHDVLO\QDYLJDWHIURPWKH
RYHUYLHZVFUHHQWRWKHORZHVWGLVSOD\OHYHO WKHDXWKRUL]DWLRQVDQGWKHLUILHOGV DQGGLUHFWO\
DVVLJQWKHYDOXHV*HQHUDOO\SHUPLVVLEOHYDOXHVFDQDOVREHDVVLJQHGDWKLJKHUOHYHOV7KH
IROORZLQJXWLOLWLHVWRVSHFLI\WKHYDOXHVDUHDYDLODEOHDWHYHU\OHYHORIWKHKLHUDUFKLFDO
GLVSOD\
< 9DOXHVHOHFWLRQIURPOLVWV
< &KHFNER[HVIRUVLPSOHDFWLYLW\VHOHFWLRQ
< 'HOHWHDQGFRS\IXQFWLRQV
,IDGPLQLVWUDWRUVGHWHUPLQHWKDWQRIXUWKHUDXWKRUL]DWLRQUHVWULFWLRQVDUHQHFHVVDU\RQD
FHUWDLQOHYHOE\FKRRVLQJDEXWWRQWKH3*ILOOVLQWKHUHPDLQLQJYDOXHV
)LQDOO\DQRWKHUPHQXLWHPLQWKHV\VWHPDVVLJQVWKHXVHUVWRWKH5IXQFWLRQV,QWKLV
SURFHVVWKH3*DXWRPDWLFDOO\FRSLHVDOOWKHFRUUHVSRQGLQJDXWKRUL]DWLRQSURILOHVWRWKHXVHU
PDVWHUUHFRUG2IFRXUVHXVHUVFDQEHDVVLJQHGPXOWLSOHVHOHFWLRQVZKLFKPHDQVWKDW
FHUWDLQJHQHUDODXWKRUL]DWLRQVQHHGWREHPDLQWDLQHGRQO\RQFHDQGDUHDYDLODEOHIRU
DVVLJQPHQWWRDOOV\VWHPXVHUV
,QWHJUDWLQJWKH3*LQ5DOVRHQDEOHVWKHDGPLQLVWUDWRUWRDFFHVVWKHGRFXPHQWDWLRQRQ
HYHU\DXWKRUL]DWLRQREMHFWGLUHFWO\IURPWKH3*)XUWKHUPRUHWKH3*FDQOLVWDOO5
IXQFWLRQVWKDWFKHFNDVSHFLILFDXWKRUL]DWLRQ

5HTXLUHPHQWVDQG$YDLODELOLW\
7KH3*UXQVRQDOOVXSSRUWHGSODWIRUPVDQGKDVEHHQDYDLODEOHVLQFH5HOHDVH*IRU
JHQHUDOFXVWRPHUXVH6WDUWLQJZLWK5HOHDVHLWLVDOUHDG\DFWLYDWHGIRUXVH

Release 4.6A/B
1–11
Chapter 1: R/3 System Security and the Authorization Concept
What Is an Activity Group?

:KDW,VDQ$FWLYLW\*URXS"

7KHSURFHVVRIVHFXULW\LPSOHPHQWDWLRQZLWKWKH3*LVEDVHGRQWKHFUHDWLRQRIDFWLYLW\
JURXSVRUDFROOHFWLRQRIOLQNHGRUDVVRFLDWHGDFWLYLWLHVVXFKDVWDVNVUHSRUWVDQG
WUDQVDFWLRQV$QDFWLYLW\JURXSLVD´GDWDFRQWDLQHUµIRUWKH3*WRJHQHUDWHDXWKRUL]DWLRQ
SURILOHVDQGXVXDOO\UHSUHVHQWVDMREUROHLQ\RXUFRPSDQ\ +RZHYHUFXVWRPHUVRIWHQ
GHILQHDFWLYLW\JURXSVVRPHZKDWGLIIHUHQWO\$VVXFKWKHUHLVQRRQHFRQFUHWHGHILQLWLRQRI
DQDFWLYLW\JURXSRWKHUWKDQLWLVDGDWDFRQWDLQHUIRUDXWKRUL]DWLRQV
$FWLYLW\JURXSVDUHGHILQHGE\WKHFXVWRPHUSHUIRUPLQJWKHLPSOHPHQWDWLRQDQGDOORZ
V\VWHPDWLFRUJDQL]DWLRQDQGHIILFLHQWPDLQWHQDQFHRIV\VWHPDFWLYLWLHV
7KH6$3%XVLQHVV:RUNIORZ3HUVRQQHO3ODQQLQJDQG'HYHORSPHQWDVZHOODVWKH5HSRUW
:ULWHUDQGRWKHUUHSRUWLQJWRROVDUHWLJKWO\OLQNHGZLWKWKH3*6$3%XVLQHVV:RUNIORZ
LQFOXGHVZRUNIORZWDVNVWKDWFDQEHOLQNHGWRDQDFWLYLW\JURXS8VHUVDVVLJQHGZLWKDFFHVV
WRDSDUWLFXODUDFWLYLW\JURXSUHDOO\FRPHIURPWKH+53HUVRQQHO3ODQQLQJDQG
'HYHORSPHQWIXQFWLRQDOLW\)XUWKHUPRUHWKHSODQYHUVLRQWKDWLVXVHGLQ+53HUVRQQHO
3ODQQLQJDQG'HYHORSPHQWLVWKHVDPHSODQYHUVLRQXVHGE\WKH3*DQG:RUNIORZ
8VLQJDQDFWLYLW\JURXSDVDQLQIRUPDWLRQGDWDEDVHUHGXFHVGDWDHQWU\WLPH6HOHFWWKH
FULWHULDVXFKDVDFFHVVULJKWVDQGGLYLGHWKHDFWLYLWLHVLQWRDSSURSULDWHJURXSV)RUH[DPSOH
\RXFRXOGGHFLGHWRJURXSDFWLYLWLHVE\VXEMHFWPDWWHUVXFKDVSHUVRQQHOSD\UROORU
EXGJHWLQJ2U\RXFRXOGJURXSDFWLYLWLHVE\MREFODVVHVVXFKDVWUDQVODWLRQDFWLYLWLHV
FRPSXWHUSURJUDPPHUDFWLYLWLHVRUVHFUHWDULDODFWLYLWLHV<RXFRXOGDOVRVHWXSD
FRPELQDWLRQRIVXEMHFWPDWWHUDQGMRERULHQWHGDFWLYLW\JURXSV$IWHUVHWWLQJXSDFWLYLW\
JURXSV\RXFDQDVVLJQWKHPWRYDULRXV5REMHFWV

$FWLYLW\*URXS$VVLJQPHQWV
$QDFWLYLW\JURXSFDQEHDVVLJQHGWRPDQ\XVHUV2QHXVHUFDQDOVREHDVVLJQHGWRPDQ\
DFWLYLW\JURXSV
$QDFWLYLW\JURXSFDQEHDVVLJQHGWRWKHIROORZLQJW\SHVRIXVHUV
5ORJLQXVHU,'V
$Q5XVHULVDQLQGLYLGXDOZKRLVUHFRJQL]HGE\WKH56\VWHPDQGLVDOORZHGWRORJRQ
)RUWKHV\VWHPWRUHFRJQL]HXVHUVWKHLUQDPHVPXVWEHHQWHUHGLQWKHXVHUPDVWHUUHFRUGRI
WKH%DVLVFRPSRQHQW
-REV
$MREUHSUHVHQWVDJHQHUDOFODVVLILFDWLRQRIZRUNGXWLHVVXFKDVDGPLQLVWUDWLYHDVVLVWDQW
FRPSXWHUSURJUDPPHULQVWUXFWRUHWF0DQ\HPSOR\HHVLQ\RXUFRPSDQ\PD\KROGWKH
VDPHMREFODVVLILFDWLRQ )RUH[DPSOHWKHUHPLJKWEHSHRSOHZKRVHMRELVDGPLQLVWUDWLYH
DVVLVWDQW 3RVLWLRQVDUHXVXDOO\EDVHGRQMREV$Q\RQHZKRKROGVDMREDXWRPDWLFDOO\
LQKHULWVWKHLQIRW\SHVHWWLQJVDWWULEXWHVDQGSURSHUWLHVRIWKDWMRE8QOHVVWKHDFWLYLW\
JURXSVJUDQWVJHQHUDODFFHVVULJKWVVXFKDVWKHULJKWVQHHGHGWRZRUNZLWK6$3RIILFHEH
FDUHIXOZKHQDVVLJQLQJDFWLYLW\JURXSVWRMREV

Authorizations Made Easy


1–12
Chapter 1: R/3 System Security and the Authorization Concept
What Is an Activity Group?

3RVLWLRQV
$SRVLWLRQUHSUHVHQWVDQHPSOR\HH·VXQLTXHLQGLYLGXDODVVLJQPHQWZLWKLQDFRPSDQ\ IRU
H[DPSOHPDUNHWLQJDVVLVWDQWVDOHVPDQDJHUHWF 3RVLWLRQVVKRXOGQRWEHFRQIXVHGZLWK
MREV<RXFDQKDQGOHDXWKRUL]DWLRQPDQDJHPHQWLQDQDOPRVWFRPSOHWHO\SRVLWLRQRULHQWHG
IDVKLRQ$OOWKHDFFHVVULJKWVDUHWKHQOLQNHGWRWKHSRVLWLRQVRLWGRHVQRWPDWWHUZKRILOOV
WKLVSRVLWLRQ2QFHDXVHUFKDQJHVSRVLWLRQVDQGDIWHUWKHXVHUPDVWHUUHFRUGLVXSGDWHGWKH
DXWKRUL]DWLRQSURILOHDXWRPDWLFDOO\FKDQJHV
2UJDQL]DWLRQDOXQLWV
2UJDQL]DWLRQDOXQLWVUHSUHVHQWDQ\RUJDQL]DWLRQDOHQWLW\WKDWSHUIRUPVDVSHFLILHGVHWRI
IXQFWLRQVZLWKLQDFRPSDQ\)RUH[DPSOHRUJDQL]DWLRQDOXQLWVUHSUHVHQWVXEVLGLDULHV
GLYLVLRQVGHSDUWPHQWVJURXSVVSHFLDOSURMHFWWHDPVHWF,GHQWLI\WKHRUJDQL]DWLRQDO
VWUXFWXUHDW\RXUILUPE\FUHDWLQJRUJDQL]DWLRQDOXQLWVDQGLGHQWLI\LQJWKHUHODWLRQVKLSV
DPRQJWKHXQLWV$Q\RQHZKRLVDVVLJQHGWRDQRUJDQL]DWLRQDOXQLWDXWRPDWLFDOO\LQKHULWV
WKHLQIRW\SHVHWWLQJVDWWULEXWHVDQGSURSHUWLHVRIWKLVRUJDQL]DWLRQDOXQLW
([DPSOHVRIXQLWVLQFOXGH
< 6XEVLGLDULHV
< 'LYLVLRQV
< 'HSDUWPHQWV
< *URXSV
< 6SHFLDOSURMHFWWHDPV
8QOHVVWKHDFWLYLW\JURXSVJUDQWVJHQHUDODFFHVVULJKWVVXFKDVSULQWLQJEHFDUHIXOZKHQ
DVVLJQLQJDFWLYLW\JURXSVWRRUJDQL]DWLRQDOXQLWV)RUH[DPSOHLIDXWKRULW\SURILOHVWHQGWR
EHIDLUO\VWDQGDUGIRUDOOZRUNHUVLQDQRUJDQL]DWLRQDOXQLWLWPD\EHPRVWHIIHFWLYHWRDVVLJQ
DFWLYLW\JURXSVDQGLWVSURILOHVWRRUJDQL]DWLRQDOXQLWV:KHQH[FHSWLRQVRFFXUIRUMREVRU
SRVLWLRQVFUHDWHDGGLWLRQDODFWLYLW\JURXSVIRUWKHP,IKRZHYHUDXWKRULWLHVYDU\E\MRERU
SRVLWLRQLWPD\EHEHVWWRDVVLJQDFWLYLW\JURXSVWRWKHMREVRUSRVLWLRQVFRQFHUQHG%\
FUHDWLQJRUJDQL]DWLRQDOXQLWVDQGLGHQWLI\LQJWKHUHODWLRQVKLSVEHWZHHQWKHXQLWV\RX
LGHQWLI\\RXUFRPSDQ\·VRUJDQL]DWLRQDOVWUXFWXUH

:KDW,VD8VHU5ROH7HPSODWH"
8VHUUROHWHPSODWHVDUHDFWLYLW\JURXSVLQWKHVWDQGDUG56\VWHPGHOLYHUHGE\6$3WKDW
DOUHDG\FRQWDLQWUDQVDFWLRQVDQGUHSRUWVIURPDOODSSOLFDWLRQDUHDV7KHVHXVHUUROH
WHPSODWHVDUHUHDG\WRXVH<RXKDYHWKHRSWLRQWRXVHDXVHUUROHWHPSODWHDVLVRUFRS\DQG
FKDQJHLWWR\RXUQHHGV,IXVHUVDUHDVVLJQHGWRDMREUROHDQGWKH\ORJRQWRWKHV\VWHP
WKH\RQO\VHHWKRVHWDVNVWKH\DUHDOORZHGWRSHUIRUP

Release 4.6A/B
1–13
Chapter 1: R/3 System Security and the Authorization Concept
R/3 Tools for Security Implementation

57RROVIRU6HFXULW\,PSOHPHQWDWLRQ
,QIRUPDWLRQ6RXUFH /RFDWLRQ
2YHUYLHZRILPSRUWDQW6$31HW¥5 $SSHQGL[$
)URQWHQGQRWHV IRUPHUO\266
)UHTXHQWO\DVNHGTXHVWLRQV )$4 $SSHQGL[%
2YHUYLHZRIV\VWHPSURILOHSDUDPHWHUV $SSHQGL[&
/LEUDU\2QOLQH'RFXPHQWDWLRQ &KRRVH+HOS→5OLEUDU\→%DVLV→&RPSXWHU&HQWHU
0DQDJHPHQW6\VWHP→8VHUVDQG$XWKRUL]DWLRQV
5HOHDVH,QIRUPDWLRQ &KRRVH+HOS→5HOHDVHQRWHV
56HFXULW\*XLGH 1RWH
5HSRUW'RFXPHQWDWLRQ 5HSRUWGRFXPHQWDWLRQFDQEHDFFHVVHGIURPWKHVHOHFWLRQ
VFUHHQE\HLWKHUFKRRVLQJ+HOS→([WHQGHG+HOSRU6\VWHP→
6HUYLFHV→5HSRUWLQJHQWHULQJWKHUHSRUWQDPHDQGWKHQ
VHOHFWLQJ*RWR→'RFXPHQWDWLRQ
7UDLQLQJFRXUVHV 6HH6$31HWIRUFXUUHQWFRXUVHVKWWSZZZVDSFRP
&KRRVH+HOS→5OLEUDU\→*ORVVDU\IRUWKHHQWLUHJORVVDU\RU
*ORVVDU\ FKRRVH+HOS→*ORVVDU\IRUDFRQWH[WVHQVLWLYHJORVVDU\
0RYHWKHFXUVRUWRDILHOGRUWRDV\VWHPPHVVDJHDQG
&RQWH[W6HQVLWLYH+HOS SUHVV)
1RWH
.QRZOHGJH3URGXFWV
1RWH
$%$3:RUNEHQFK'RFXVHW
6$31HWLVDQLQWHUQHWVHUYLFHWKDWEULQJVQHZLQIRUPDWLRQDQG
FRPPXQLFDWLRQFKDQQHOVEHWZHHQ6$3DQGLWVFXVWRPHUV/RJ
6$31HW
RQE\HQWHULQJKWWSZZZVDSFRPRQDQLQWHUQHWEURZVHUDQG
FOLFNWKH3DUWQHU&XVWRPHUEXWWRQ&OLFN)UHTXHQWXVHUVDQGHQWHU
\RXU6$31HW¥5)URQWHQGQRWH IRUPHUO\266 SDVVZRUG
6LPSOLILFDWLRQ*URXSVZHESDJHKWWSZZZVDSODEVFRPDXWKIRU
6$3/DEV6LPSOLILFDWLRQ XSGDWHVEHWDUHOHDVHVRIQHZJXLGHERRNVDGGLWLRQDO
*URXS LQIRUPDWLRQSUHGHILQHGDFWLYLW\JURXSVJXLGHERRNVIRU
SUHYLRXVUHOHDVHVHWF
7KH$6$3,PSOHPHQWDWLRQ5RDGPDSUHFRPPHQGVXVLQJWKH
$FFHOHUDWHG6$35RDGPDS 3*LQLWVDXWKRUL]DWLRQGHVLJQSURSRVDO<RXFDQDOVRILQGOLQNV
$6$3 WRWKLVJXLGHERRNIURPGLIIHUHQWORFDWLRQVLQWKHURDGPDS
VWUXFWXUH,QVLGH$6$3FKRRVH,PSOHPHQWDWLRQ5RDGPDS→
3KDVH5HDOL]DWLRQ→(VWDEOLVK$XWKRUL]DWLRQ&RQFHSW

Authorizations Made Easy


1–14
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment

&DVH6WXG\6HFXULW\6WUDWHJ\LQD7KUHH6\VWHP
(QYLURQPHQW

'HYHORSPHQW6\VWHP '(9

'(9 4$6 35'

R/3 R/3 R/3

SAP SAP SAP

'(96\VWHPLQD7KUHH6\VWHP(QYLURQPHQW

:KHQWKHGHYHORSPHQWV\VWHP '(9 LVILUVWLQVWDOOHGSURMHFWPHPEHUVLQFOXGLQJ


FRQILJXUDWRUVGHYHORSHUVV\VWHPDGPLQLVWUDWRUVDQGUHFHQWWUDLQHHVFRPSULVHWKHEXONRI
5XVHUV6$3UHFRPPHQGVWKHXVHRIMREUROHWHPSODWHV$VWKH5SURMHFWSURJUHVVHV
WKHQHHGWROLPLWXVHUDFFHVVLQFUHDVHV,QJHQHUDO'(9V\VWHPXVHUVKDYHPRUHDFFHVVWKDQ
TXDOLW\DVVXUDQFH 4$6 RUSURGXFWLRQ 35' V\VWHPXVHUV
$VFRQILJXUDWLRQLVGRQHLQ'(9\RXFDQQRZXVHWKHQHZIXQFWLRQDOLW\RIFXVWRPL]LQJ
DFWLYLW\JURXSVWRHQVXUHWKDWSHRSOHDUHFRQILJXULQJRQO\WKHLURZQSDUWRIWKHV\VWHP
3OHDVHUHDGFKDSWHUIRUGHWDLOHGLQIRUPDWLRQRQFXVWRPL]LQJDXWKRUL]DWLRQV
7UHDWVXSHUXVHUDFFRXQWVOLNH´URRWµLQ81,;7KH<RXU&RPSDQ\!B$//SURILOHOLPLWVULVN
RQWKH'(9V\VWHP6\VWHPPDOIXQFWLRQVGXHWRH[FHVVLYHDFFHVVFDQDOVRFDXVHSURMHFW
GHYHORSPHQWGHOD\V
<RXQRZFRQWUROZKRFUHDWHVDQGPDLQWDLQV
< 8VHUV
< 3URILOHV
< $XWKRUL]DWLRQV
<RXDOVRHOLPLQDWHDWWHPSWVWR
< /RFNWUDQVDFWLRQV
< 'HOHWHXVHUVHVVLRQV
< 6WRSZRUNSURFHVVHV
7KLVFRQWUROPDLQWDLQVWKHV\VWHP·VLQWHJULW\DQGVWDELOLW\8VLQJWKH3*WKHDXWKRUL]DWLRQ
DGPLQLVWUDWRUGHYHORSVHQGXVHUSURILOHVDQGDXWKRUL]DWLRQVLQWKH'(9V\VWHP7KHVH
SURILOHVDQGDXWKRUL]DWLRQVZLOOEHWUDQVSRUWHGWRWKH4$6V\VWHPIRUILQDOWHVWLQJEHIRUH
PRYLQJWR35'7KHHQGXVHUPDVWHUUHFRUGVDUHXVXDOO\FUHDWHGLQ35'FORVHUWRWKHJROLYH
GDWH7KHDFWLYLW\JURXSVWRJHWKHUZLWKWKHWUDQVSRUWHGDXWKRUL]DWLRQGDWDDUHDVVLJQHGWR
WKHHQGXVHUVDVUHTXLUHGLQ35':KHQ\RXWUDQVSRUWDFWLYLW\JURXSVWKLVDOVRWUDQVSRUWV

Release 4.6A/B
1–15
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment

WKHDXWKRUL]DWLRQSURILOHV7KHVHSURILOHVGRQRWQHHGWREHUHJHQHUDWHGLQWKHWDUJHWV\VWHP
+RZHYHU\RXVKRXOGFRPSDUHWKHXVHUPDVWHUUHFRUGVZKHQ\RXLPSRUWDFWLYLW\JURXSV
LQWRWKHWDUJHWV\VWHPLIXVHUVDUHDOUHDG\DVVLJQHG6HHFKDSWHUIRUPRUHLQIRUPDWLRQ
DERXWWUDQVSRUWLQJ
0DLQWDLQLQJGRFXPHQWDWLRQLVDOVRLPSRUWDQWEHFDXVHLW
< +HOSVIXWXUHSURMHFWUROORXWVSURFHHGVPRRWKO\
< ,VHVVHQWLDOWRSDVVVHFXULW\DGPLQLVWUDWLYHIXQFWLRQVWRRWKHUSURMHFWPHPEHUV
< ,VUHTXLUHGE\DXGLWRUV
7KHDXWKRUL]DWLRQDGPLQLVWUDWRUVKRXOGZRUNFORVHO\ZLWKWKHFOLHQWFRS\DGPLQLVWUDWRUV
:KHQQHZFOLHQWVDUHFUHDWHGDFWLYLW\JURXSVDUHQRWDXWRPDWLFDOO\FRSLHG6LQFHXVHUV
DFWLYLW\JURXSVDXWKRUL]DWLRQSURILOHVDQGDXWKRUL]DWLRQVDUHDOOFOLHQWGHSHQGHQWWKHFOLHQW
FRS\DGPLQLVWUDWRUDOVRQHHGVWRNQRZZKLFKXVHUPDVWHUUHFRUGVWRFRS\6HHFKDSWHUIRU
PRUHLQIRUPDWLRQDERXWWUDQVSRUWLQJ
7KHDXWKRUL]DWLRQDGPLQLVWUDWRUVKRXOGDOVRZRUNFORVHO\ZLWKWKRVHLQ\RXUFRPSDQ\WKDW
IXQFWLRQDVFKDQJHPDQDJHPHQWDGPLQLVWUDWRUV%RWKDGPLQLVWUDWRUVDUHLPSRUWDQWSURMHFW
FRQWUROSRLQWV7KHV\VWHPODQGVFDSHFOLHQWODQGVFDSHDQGFOLHQWUROHVVKRXOGEHFOHDUO\
GHILQHGDQGSUHVHQWHGWRWKHSURMHFWWHDP'HYHORSPHQWFODVVHVDQGDXWKRUL]DWLRQJURXSV
VKRXOGEHHVWDEOLVKHGIRUDOOQHZGHYHORSPHQW$OODGPLQLVWUDWRUVVKRXOGFRPSOHWH
DSSURSULDWH6$3·VWUDLQLQJFRXUVHVIRUWKHDXWKRUL]DWLRQHQYLURQPHQWWKH\DUHWU\LQJWRVHW
XS:HUHFRPPHQGWKDW\RXDWWHQGFRXUVHVDQGZRUNVKRSVLPPHGLDWHO\DIWHUWKHLQLWLDO
LQVWDOODWLRQRI\RXU56\VWHP
1H[WWKHVHDGPLQLVWUDWRUVVKRXOGFRQGXFWDSURMHFWVSHFLILFZRUNVKRSWRERWKUHYLHZWKH
V\VWHPDQGFOLHQWODQGVFDSHDQGGLVFXVVWKHIROORZLQJFRQWUROSRLQWV
< :KHQGHYHORSPHQWUHTXHVWVZLOOPRYH
< 7RZKLFKFOLHQWVWKHVHUHTXHVWVZLOOPRYH
< :KRVHVLJQDWXUHVZLOOEHUHTXLUHGDORQJWKHZD\
7KHDXWKRUL]DWLRQDGPLQLVWUDWRUVKRXOGZRUNFORVHO\ZLWKWKHGHYHORSHUVWRHQIRUFHVHFXULW\
VWDQGDUGVIRUQHZ$%$3SURJUDPVDQGWUDQVDFWLRQVZKLFKFDQEHHQIRUFHGWKURXJK
&KDQJH0DQDJHPHQW$OOQHZFXVWRPHUZULWWHQFRGHVVKRXOGEHDVVLJQHGWRDQ
DXWKRUL]DWLRQJURXSZLWKWUDQVDFWLRQ6(DQG6(WKH$%$3HGLWRUDWWULEXWHVVFUHHQ
8QSURWHFWHGFXVWRPHUZULWWHQSURJUDPVDQGWUDQVDFWLRQVLQ35'DOZD\VSUHVHQWSUREOHPV
7KHDXWKRUL]DWLRQDGPLQLVWUDWRUVKRXOGLQYROYHWKHFRUSRUDWHDXGLWRUVDWWKLVMXQFWXUH

:HUHFRPPHQGLQYROYLQJWKHFRUSRUDWHDXGLWRUVXSIURQWVRWKHLUUHTXLUHPHQWVDUH
LQFRUSRUDWHGLQWKHGHYHORSPHQWHIIRUWV,WLVDOZD\VXQSOHDVDQWWRDXGLWSRVWOLYH
SURMHFWV,QWKHZRUVWFDVHVFHQDULRSURMHFWVVKRXOGEHKDOWHGXQWLODXGLWRUUHTXLUHPHQWV
DUHPHWDQGDWDPLQLPXPDOORIWKHRULJLQDOGHYHORSPHQWZRUNPD\KDYHWREHUHYLVHG

Authorizations Made Easy


1–16
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment

4XDOLW\$VVXUDQFH6\VWHP 4$6

'(9 4$6 35'

R/3 R/3 R/3

SAP SAP SAP

4$66\VWHPLQD7KUHH6\VWHP(QYLURQPHQW

:KHQWKH4$6V\VWHPDQGFOLHQWDUHFUHDWHGWKHDXWKRUL]DWLRQDGPLQLVWUDWRUFDQVWDUW
WUDQVSRUWLQJWKHFRPSRQHQWVRIWKHDXWKRUL]DWLRQV\VWHP WDEOH862%;B&WHPSODWHV
DFWLYLW\JURXSVDQGFRPSRVLWHVDFWLYLW\JURXSV IURPWKH'(9V\VWHPWRWKH4$6V\VWHP
VHHFKDSWHURQKRZWRWUDQVSRUW $XWKRUL]DWLRQSURILOHVIRULPSRUWHGDFWLYLW\JURXSVQR
ORQJHUQHHGWREHUHJHQHUDWHGVLQFHWKHV\VWHPFDQGRWKLVDXWRPDWLFDOO\QRZ%HIRUH
PRYLQJWKHDFWLYLW\JURXSVDQGDXWKRUL]DWLRQGDWDWR35'DILQDOWHVWLQJSODQVKRXOGEH
SURGXFHG
)RUH[DPSOHDQ),SURMHFWWHDPPHPEHUPD\XVHDVDPSOHDFFRXQWVSD\DEOHXVHU,'WR
< &RQILUPWKDWWKHXVHUKDVDFFHVVWRWKHVSHFLILFWUDQVDFWLRQVJRYHUQHGE\HDFKDFWLYLW\
JURXSWRZKLFKWKHXVHULVDVVLJQHG
< (QVXUHWKDWWKHVHWUDQVDFWLRQVPDWFKWKHFRPSDQ\GHILQHGUROHIRUDFFRXQWVSD\DEOH
< 9HULI\WKDWWKHVDPSOHXVHU,'GRHVQRWKDYHDFFHVVWRXQDXWKRUL]HGWUDQVDFWLRQV
6RPHVLWHVFRQGXFWDGD\LQWKHOLIHWHVWDVSDUWRIWKHLUJROLYHSODQZKHUHHQGXVHUVORJRQ
WRDSUHSURGXFWLRQHQYLURQPHQWDQGVLPXODWHUHDOSURGXFWLRQ7KLVSURFHVVLVDQH[FHOOHQW
ZD\RIWHVWLQJWKHJHQHUDWHGDXWKRUL]DWLRQSURILOHV
7UDLQLQJ&OLHQW6\VWHP 75*
:KLOHPDQ\FXVWRPHUVGRQRWSXWWKHLUWUDLQLQJHQYLURQPHQWRQDQRWKHUV\VWHPHQWLUHO\
PDQ\GR<RXQHHGWRVHWXSWKHDSSURSULDWHDXWKRUL]DWLRQVIRUWKHWUDLQLQJV\VWHPDVZHOO
7KHDSSURSULDWHDXWKRUL]DWLRQVHWXSFDQQRWEHGHWHUPLQHGZLWKRXWILUVWNQRZLQJIURP
ZKHUHWKHGDWDWKDWDSSHDUVLQWKHWUDLQLQJV\VWHPFRPHVIURP RUKRZWKHV\VWHPDQG
WUDLQLQJFOLHQWZHUHFUHDWHG )RUH[DPSOHLIWKHWUDLQLQJV\VWHPLVDFRS\RIWKHSURGXFWLRQ
HQYLURQPHQWRUDFRS\RIWKHFOLHQWZKHUHFRQYHUVLRQVDQGLQWHUIDFHVZHUHLQLWLDOO\WHVWHGLW
PD\EHSRVVLEOHWKDWWKHWUDLQLQJV\VWHPFRQWDLQVVHQVLWLYHLQIRUPDWLRQVXFKDVVRFLDO
VHFXULW\QXPEHUVFRQYHUWHGSD\UROOLQIRUPDWLRQDGGUHVVHVHWF

Release 4.6A/B
1–17
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment

3URGXFWLRQ6\VWHP 35'

'(9 4$6 35'

R/3 R/3 R/3

SAP SAP SAP

35'6\VWHPLQD7KUHH6\VWHP(QYLURQPHQW

2QFHWKHDFWLYLW\JURXSVDQGDXWKRUL]DWLRQSURILOHVKDYHEHHQIXOO\WHVWHGLQ4$6DQGHQG
XVHUDQGSURMHFWWHDPDSSURYDOKDVEHHQSURYLGHGWKHFRPSRQHQWVRIWKHDXWKRUL]DWLRQ
V\VWHP WDEOH862%;B&WHPSODWHVDFWLYLW\JURXSVDQGFRPSRVLWHVDFWLYLW\JURXSV DUH
PRYHGWR35' VHHFKDSWHURQKRZWRWUDQVSRUW $FWXDOHQGXVHU,'VFDQEHFUHDWHG$
IRUPWKDWLQFOXGHVDOORIWKHSHUWLQHQWLQIRUPDWLRQIRUXVHU,'FUHDWLRQDORQJZLWKWKH
SURSHUVLJQDWXUHVLVGHYHORSHGDQGGLVWULEXWHGWRWKHGHSDUWPHQWV
7KHDXWKRUL]DWLRQDGPLQLVWUDWRUVKRXOGEHDSDUWRIWKHJROLYHSODQ7KHILUVWGD\VRIJRLQJ
OLYHDUHKHFWLFDQGWKHUHVKRXOGEHDSURFHGXUHWRUHSRUWDFFHVVSUREOHPVLQSURGXFWLRQ7KH
KHOSGHVNLVDJRRGIRFDOSRLQW:KHQXVHUVKDYHDFFHVVSUREOHPV IRUH[DPSOHZKHQXVHUV
VHHWKHPHVVDJH1RDXWKRUL]DWLRQIRUWUDQVDFWLRQ;;;; WKH\VKRXOGH[HFXWHWUDQVDFWLRQ
68WRREWDLQWKHDXWKRUL]DWLRQUHTXLUHGIRUWKLVWUDQVDFWLRQ 5HPHPEHUVLQFH+
WUDQVDFWLRQ68LVDOVRSURWHFWHGE\REMHFW6B7&2'(6HHFKDSWHU,QVHUWLQJ0LVVLQJ
$XWKRUL]DWLRQVIRUPRUHGHWDLOV $VFUHHQSULQWVKRXOGEHVHQWWRWKHKHOSGHVNDQGWKH
DXWKRUL]DWLRQDGPLQLVWUDWRUIRUHYDOXDWLRQ2QFHWKHDSSOLFDWLRQDUHDRZQHUDSSURYHVWKH
DGGLWLRQDODFFHVVLWLVDVVLJQHGWRWKHXVHU$GGLWLRQDODFFHVVPHDQVWKDWWKHDFWLYLW\JURXSV
PLJKWEHFKDQJHGRUWKDWDPLVVLQJDXWKRUL]DWLRQREMHFWPD\QHHGWREHPDQXDOO\LQVHUWHG
LQWKHDXWKRUL]DWLRQSURILOHV
7KHDXWKRUL]DWLRQDGPLQLVWUDWRUVKRXOGVWDUWSODQQLQJIRURWKHUSURMHFWSKDVHV7KLVPD\
LQFOXGHRWKHUUROORXWVWRGLIIHUHQWORFDWLRQVGLIIHUHQWSODQWVGLIIHUHQWPRGXOHVRU5
XSJUDGHV$OORIWKHVHUROORXWVVKRXOGLQYROYHWKHDXWKRUL]DWLRQDGPLQLVWUDWRU

Authorizations Made Easy


1–18
Chapter 1: R/3 System Security and the Authorization Concept
Setting Up the Authorization Administrators

6HWWLQJ8SWKH$XWKRUL]DWLRQ$GPLQLVWUDWRUV

:HUHFRPPHQG\RXGLYLGHWKHV\VWHPDGPLQLVWUDWLRQWDVNVDVVKRZQLQWKHJUDSKLFEHORZ
WRHQVXUHJUHDWHUV\VWHPVHFXULW\)RUFRPSDQLHVWKDWKDYHVHYHUDOSHRSOHGHYRWHGWRWKH
DXWKRUL]DWLRQVFRPSRQHQWRI5WKLVGLYLVLRQPDNHVJRRGVHQVH6$3VXSSRUWVWKLV
DSSURDFKZLWKWKHXVHUUROHWHPSODWHVIRUWKHVHDGPLQLVWUDWRUV,QWKHVWDQGDUG56\VWHP
\RXFDQILQGWKHIROORZLQJWHPSODWHV

$GPLQLVWUDWRU 8VHU5ROH7HPSODWH
$XWKRUL]DWLRQ'DWD$GPLQLVWUDWRU 6$3B%&B$87+B'$7$B$'0,1B$*
$XWKRUL]DWLRQ3URILOH$GPLQLVWUDWRU 6$3B%&B$87+B352),/(B$'0,1B$*
8VHU$GPLQLVWUDWRU 6$3B%&B86(5B$'0,1B$*

6XSHU8VHU

SAP

$XWKRUL]DWLRQ3URILOH

8VHU$GPLQLVWUDWRU $GPLQLVWUDWRU

- Maintain user master records - Maintain activity groups


- Assign activity groups to users - Within activity groups:
- Assign profiles to users (T ONLY) - Change authorizations (T ONLY)
- Display auth. and profiles - Generate profiles (T ONLY)
- Call user information system - Execute transaction information
- Call user information system
$XWKRUL]DWLRQ'DWD

$GPLQLVWUDWRU

- Maintain activity groups


- Within activity groups:
-Change transaction selection
- Change authorization data
- Call user information system

Organizing Authorization Administration

)RUFRPSDQLHVZLWKYHU\IHZSHRSOHLQYROYHGLQVHWWLQJXSDQGPDLQWDLQLQJDXWKRUL]DWLRQV
GLYLGLQJXSVXFKWDVNVFRPSOLFDWHVWKHSURFHVVRIFUHDWLQJDQGPDLQWDLQLQJWKH
DXWKRUL]DWLRQVFRPSRQHQW<RXVKRXOGDOVRGHFLGHZKHWKHUPDLQWHQDQFHRIXVHUVDFWLYLW\
JURXSVDXWKRUL]DWLRQSURILOHDQGDXWKRUL]DWLRQVVKRXOGEHFHQWUDOL]HGRUGHFHQWUDOL]HG:H
UHFRPPHQGFHQWUDOL]LQJPDLQWHQDQFHXQWLO\RXUJROLYHGDWHDQGILUVWUROORXW&HQWUDOL]HG
DGPLQLVWUDWRUVKDYHDEHWWHUXQGHUVWDQGLQJRIZKDWLVLQYROYHGLQDUROORXWDQGFHQWUDOL]LQJ
WKHDGPLQLVWUDWLYHWDVNVHVWDEOLVKHVQDPLQJVWDQGDUGV%\WKHILUVWUROORXWDOODGPLQLVWUDWLYH
IXQFWLRQVVKRXOGEHGRFXPHQWHGDQGFDQWKHQEHGHFHQWUDOL]HG

Release 4.6A/B
1–19
Chapter 1: R/3 System Security and the Authorization Concept
Setting Up the Authorization Administrators

&RQYHUVHO\ZKHQWKHDGPLQLVWUDWLYHIXQFWLRQVDUHGHFHQWUDOL]HGXSIURQWDGPLQLVWUDWRUV
XVHGLIIHUHQWQDPLQJVWDQGDUGVIRUWKHLUDFWLYLW\JURXSVDXWKRUL]DWLRQSURILOHVDQG
DXWKRUL]DWLRQVDQGGLIIHUHQWDSSURDFKHVWRLPSOHPHQWLQJVHFXULW\,IHDFKDGPLQLVWUDWRU
FUHDWHVKLVRUKHURZQVWDQGDUGVHYHU\WKLQJKDVWREHUHQDPHGRQFHWKHDXWKRUL]DWLRQ
LPSOHPHQWDWLRQLVVWDQGDUGL]HG
7KHVXSHUXVHUVHWVXSXVHUPDVWHUUHFRUGVSURILOHVDQGDXWKRUL]DWLRQVIRUDGPLQLVWUDWRUVLQ
DGHSDUWPHQWDFRVWFHQWHUDQGRWKHURUJDQL]DWLRQDOXQLWV:LWKLQDQDUHDDGPLQLVWUDWLYH
WDVNVDUHGLYLGHGEHWZHHQWKHXVHUDGPLQLVWUDWRUDXWKRUL]DWLRQGDWDDGPLQLVWUDWRUDQG
DXWKRUL]DWLRQSURILOHDGPLQLVWUDWRU7KHIROORZLQJLVDOLVWRIHDFKDGPLQLVWUDWRU·VWDVNVDQG
UHVSRQVLELOLWLHV
< 8VHU$GPLQLVWUDWRU
Π&UHDWLQJDQGFKDQJLQJXVHUV
Π$VVLJQLQJXVHUVWRDFWLYLW\JURXSV
Π$VVLJQLQJSURILOHVEHJLQQLQJZLWK7WRXVHUV RUIROORZLQJ\RXURZQQDPLQJ
FRQYHQWLRQ
Π'LVSOD\LQJDXWKRUL]DWLRQVDQGSURILOHV
Π:RUNLQJZLWKWKHXVHULQIRUPDWLRQV\VWHP
'LVSOD\LQJRUFKDQJLQJDFWLYLW\JURXSGDWDDQGFKDQJLQJRUJHQHUDWLQJSURILOHVVKRXOG
QRWEHSHUPLWWHGIRUXVHUDGPLQLVWUDWRUV
< $XWKRUL]DWLRQ'DWD$GPLQLVWUDWRU
Π'LVSOD\LQJXVHUV
Π&UHDWLQJDQGFKDQJLQJDFWLYLW\JURXSV
Π&KDQJLQJWKHWUDQVDFWLRQVHOHFWLRQDQGDXWKRUL]DWLRQGDWDLQDFWLYLW\JURXSV
Π'LVSOD\LQJSURILOHV
Π:RUNLQJZLWKWKHXVHULQIRUPDWLRQV\VWHP
&KDQJLQJXVHUVDQGJHQHUDWLQJSURILOHVVKRXOGQRWEHSHUPLWWHGIRUDXWKRUL]DWLRQGDWD
DGPLQLVWUDWRUV
< $XWKRUL]DWLRQ3URILOH$GPLQLVWUDWRU
Π'LVSOD\LQJDFWLYLW\JURXSVDQGWKHLUGDWDDQGXVHUV
Π*HQHUDWLQJDXWKRUL]DWLRQVDQGDXWKRUL]DWLRQSURILOHVEHJLQQLQJZLWK7EDVHGRQ
H[LVWLQJDFWLYLW\JURXSV RUUHVSHFWLYHO\IROORZLQJ\RXURZQQDPLQJFRQYHQWLRQ
Π:RUNLQJZLWKWKHXVHULQIRUPDWLRQV\VWHP
7KHIROORZLQJWDVNVVKRXOGQRWEHSHUPLWWHGIRUDXWKRUL]DWLRQSURILOHDGPLQLVWUDWRUV
Π&KDQJLQJXVHUV
Π&KDQJLQJDFWLYLW\JURXSGDWD
Π*HQHUDWLQJDXWKRUL]DWLRQSURILOHVFRQWDLQLQJDXWKRUL]DWLRQREMHFWVEHJLQQLQJZLWK
6B86(5

Authorizations Made Easy


1–20
Chapter 1: R/3 System Security and the Authorization Concept
Policies and Procedures

+RZWKH$GPLQLVWUDWRUV:RUN7RJHWKHU
7KHDXWKRUL]DWLRQGDWDDGPLQLVWUDWRU
< &UHDWHVDQDFWLYLW\JURXS
< &KRRVHVWUDQVDFWLRQV
< 0DLQWDLQVDXWKRUL]DWLRQGDWD
:LWKRXWWKHDSSURSULDWHDXWKRUL]DWLRQWRJHQHUDWHWKHSURILOHWKHDXWKRUL]DWLRQGDWD
DGPLQLVWUDWRUVDYHVWKHSURILOHDQGDFFHSWVWKHGHIDXOWSURILOHQDPH7RUDQDPHWKDW
IROORZV\RXUQDPLQJFRQYHQWLRQ
7KHDXWKRUL]DWLRQSURILOHDGPLQLVWUDWRU
< &DOOVWUDQVDFWLRQPFCG
< 6HOHFWVWKH'LVSOD\PRGHWRFKHFNWKHGDWD
< *HQHUDWHVWKHDXWKRUL]DWLRQSURILOHV
)LQDOO\WKHXVHUDGPLQLVWUDWRUDVVLJQVWKHDFWLYLW\JURXSWRDXVHURUD3'REMHFWVXFKDVD
SRVLWLRQDQGXSGDWHVWKHXVHUPDVWHUUHFRUG7KHDXWKRUL]DWLRQSURILOHLVWKHQDGGHGWRWKH
XVHUPDVWHUUHFRUG

3ROLFLHVDQG3URFHGXUHV

7KHIROORZLQJVKRZVDVDPSOHRISROLFLHVDQGSURFHGXUHVKRZHYHUIRU\RXUFRPSDQ\LW
PLJKWEHGLIIHUHQW

8VHU$GPLQLVWUDWLRQ
3ROLFLHV
< 6XSHUXVHUV6$3 DQG'',&
Π7KHUHLVQRXVHU6$3 DQG'',&LQDQ\FOLHQWZLWKRXWDSDVVZRUG
Π7KH6$3 XVHUKDVQRDXWKRUL]DWLRQV
< 8VHUQDPLQJFRQYHQWLRQ
$OOXVHUVDUHDVVLJQHGQDPHVLGHQWLFDOWRWKHLUHPSOR\HH,'QXPEHUV SHUVRQQHO
QXPEHUV 
< 8VHUPDLQWHQDQFH
Π7KHV\VWHPDGPLQLVWUDWLRQGHSDUWPHQWKDVWRUHFHLYHWKH8VHU0RGLILFDWLRQ5HTXHVW
)RUPZLWKHPDLOVLJQHGE\WKHXVHU·VDSSOLFDWLRQGHSDUWPHQWPDQDJHU
Π$OOSURILOHVWKDWWKHXVHUUHTXLUHVPXVWEHVSHFLILFDOO\OLVWHGRQWKHUHTXHVWIRUP7KH
IRUPPXVWLQGLFDWHZKHWKHUWKHXVHULVWHPSRUDU\RUSHUPDQHQW
Π)RUWHPSRUDU\HPSOR\HHVDQDFFRXQWH[SLUDWLRQGDWHPXVWEHLQFOXGHG
< 8VHUOHDYLQJWKHFRPSDQ\
 7KH8VHU0RGLILFDWLRQ5HTXHVW)RUPPXVWEHILOOHGRXWDQGVLJQHGE\WKHDSSOLFDWLRQ
GHSDUWPHQWPDQDJHU
 $FRS\RIWKLVIRUPPXVWEHVHQWWR+5GHSDUWPHQW

Release 4.6A/B
1–21
Chapter 1: R/3 System Security and the Authorization Concept
Policies and Procedures

 7KH+5GHSDUWPHQWPDQDJHUPXVWVLJQWKHUHTXHVWIRUGHOHWLRQ
 7KLVPDQDJHUVHQGVWKHVLJQHGFRS\EDFNWRWKHV\VWHPDGPLQLVWUDWLRQGHSDUWPHQW
 $OOHPSOR\HHPDVWHUUHFRUGLQIRUPDWLRQLQFOXGLQJLQWHUQDOSRVWRIILFHPXVWEH
GHOHWHG
3URFHGXUHV
< 6XSHUXVHUV6$3 DQG'',&
Π6$3 LVXVHGRQO\IRUFOLHQWFRSLHV
Π3VHXGRVXSHUXVHUVDUHFUHDWHGLQHDFKFOLHQWZLWKWKH6$3B$//SURILOH
Π7KHSDVVZRUGLVFKDQJHGHYHU\PRQWK
7KLVFDQEHGHWHUPLQHGZLWKWKHIROORZLQJV\VWHPSURILOHSDUDPHWHUV
ORJLQSDVVZRUGBH[SLUDWLRQBWLPH VHHDSSHQGL[&IRUWKHOLVWRIV\VWHPSURILOH
SDUDPHWHUV 
Π8VHUHSRUW56865WRFKHFNZKHWKHUWKHVWDQGDUGSDVVZRUGVIRU6$3 DQG'',&
KDYHEHHQFKDQJHGIURPWKHGHIDXOWV
< 8VHUQDPLQJFRQYHQWLRQ
7KHDSSOLFDWLRQPDQDJHUPXVWFRQWDFWWKH+5GHSDUWPHQWDQGUHFHLYHWKHQHZ
HPSOR\HH,'QXPEHU7KLV,'QXPEHULVHQWHUHGLQWRWKH8VHU0RGLILFDWLRQ5HTXHVW)RUP
ZKHUHLQGLFDWHG
< 8VHUPDLQWHQDQFH
7KH8VHU0RGLILFDWLRQ5HTXHVW)RUPPXVWEHFRPSOHWHGDQGPDLOHGWRWKHV\VWHP
DGPLQLVWUDWLRQGHSDUWPHQW
< 8VHUOHDYLQJWKHFRPSDQ\
7KH8VHU0RGLILFDWLRQ5HTXHVW)RUPPXVWEHFRPSOHWHGDQGVHQWWRWKHV\VWHP
DGPLQLVWUDWLRQGHSDUWPHQWDQGWRWKH+5GHSDUWPHQWPDQDJHU7KH+5GHSDUWPHQW
PDQDJHUPXVWVLJQWKHIRUPDQGUHWXUQWKHVLJQHGFRS\WRWKHV\VWHPDGPLQLVWUDWLRQ
GHSDUWPHQW
5ROHVDQG5HVSRQVLELOLWLHV

7DVN 5ROH

0DLQWDLQLQJVXSHUXVHUV 6\VWHPDGPLQLVWUDWRU
0DLQWDLQLQJQDPLQJFRQYHQWLRQV $SSOLFDWLRQGHSDUWPHQWPDQDJHU+5
GHSDUWPHQW
0DLQWDLQLQJXVHUV $SSOLFDWLRQGHSDUWPHQWPDQDJHUV\VWHP
DGPLQLVWUDWRU
0DLQWDLQLQJXVHUVOHDYLQJFRPSDQ\ $SSOLFDWLRQGHSDUWPHQWPDQDJHUV\VWHP
DGPLQLVWUDWRU+5GHSDUWPHQW

Authorizations Made Easy


1–22
Chapter 1: R/3 System Security and the Authorization Concept
Policies and Procedures

6\VWHP6HFXULW\
3ROLFLHV
< ,70DQDJHU
7KH,70DQDJHUZKRLVUHVSRQVLEOHIRUDOODVSHFWVRIV\VWHPVHFXULW\PXVWUHYLHZWKH
VHFXULW\VWUDWHJ\HYHU\WZRPRQWKV
< 6XSHUXVHUV
)RUUHYLVLRQDQGVHFXULW\SXUSRVHVWKHVXSHUXVHU6$3 ZLOOQRWEHXVHGIRUV\VWHP
PDLQWHQDQFH$OOPDLQWHQDQFHKDVWREHSHUIRUPHGZLWKQHZO\GHILQHGVXSHUXVHUV
< 6\VWHPSDVVZRUGV
6\VWHPSDVVZRUGV '%XVHUVDSU26XVHU6,'!$'0'',& PXVWEHFKDQJHGHYHU\
IRXUZHHNV,QFDVHRIDQHPHUJHQF\SDVVZRUGDFFHVVPXVWEHHQVXUHG
< 8VHUSDVVZRUGV
7RSURWHFWWKHV\VWHPIURPXQDXWKRUL]HGDFFHVVPDNHXVHUVFKDQJHWKHLUSDVVZRUG
HYHU\IRXUZHHNV$PLQLPXPSDVVZRUGOHQJWKRIVL[FKDUDFWHUVLVUHTXLUHG$IWHUWKUHH
XQVXFFHVVIXOORJRQDWWHPSWVWKHDFFRXQWZLOOEHORFNHG
< 6$3FRQQHFWLRQ
7KHFRQQHFWLRQWR6$3LVRSHQHGRQO\IRUDVHUYLFHVHVVLRQ7KHVHFRQQHFWLRQVDUH
6$31HW¥5)URQWHQGQRWHV IRUPHUO\266 (DUO\:DWFKDQG5HPRWH&RQVXOWLQJ
&RQQHFWLRQWR6$3FDQRQO\EHRSHQHGIURPWKHFXVWRPHUVLWH&RQQHFWLRQVKDYHWREH
PRQLWRUHGZLWKDQDSSURSULDWHWRRO
< 6$3URXWHU
6$3URXWHUD6$3VXSSOLHGWRROIRUVHFXULQJ5DFFHVVLVQHFHVVDU\IRUFRQQHFWLQJWR
6$3V\VWHPV
< 5HPRWHFRQQHFWLRQV
)RUH[WHUQDOFRQQHFWLRQV PRELOHHQGXVHUV IL[HG,3DGGUHVVHVDUHDVVLJQHG2QH
H[SOLFLWHQWU\SHUH[WHUQDOFRQQHFWLRQLVPDLQWDLQHGLQWKHSHUPLVVLRQOLVWIRU6$3URXWHU
3URFHGXUHV
< ,70DQDJHU
(YHU\WZRPRQWKVWKH,7PDQDJHUDQGWKHV\VWHPDGPLQLVWUDWRUVKRXOGUHYLHZV\VWHP
VHFXULW\
< 6XSHUXVHUV
7KH6$3B$//SURILOHLVUHPRYHGIURPWKHXVHU6$3 DQGWKH6$3 XVHULVORFNHG$OO
PDLQWHQDQFHWDVNVDUHSHUIRUPHGXVLQJDFFRXQWVZLWKWKH6$3B$//SURILOH
< 6\VWHPSDVVZRUGV
7KHV\VWHPDGPLQLVWUDWRUFKDQJHVWKHV\VWHPSDVVZRUGVHYHU\IRXUZHHNV7KHV\VWHP
DGPLQLVWUDWRUPXVWZULWHGRZQWKHFXUUHQWSDVVZRUGVDQGSODFHWKHPLQDVHDOHG
HQYHORSHZKLFKPXVWEHVWRUHGLQWKHGDWDVDIHDQGEHDFFHVVLEOHLQFDVHRIHPHUJHQF\
8VHUHSRUW56865WRFKHFNLIV\VWHPSDVVZRUGVKDYHEHHQFKDQJHG

Release 4.6A/B
1–23
Chapter 1: R/3 System Security and the Authorization Concept
Auditing Requirements

< 8VHUSDVVZRUGV
8VHUVPXVWFKDQJHWKHLUSDVVZRUGVHYHU\IRXUZHHNVE\VHWWLQJWKHDSSURSULDWH
SDUDPHWHUVLQWKH'()$8/7SURILOH7KLVVWHSHQVXUHVWKDWWKHVHWWLQJVDUHYDOLGLQWKH
HQWLUHV\VWHP7KHPLQLPXPQXPEHURIFKDUDFWHUVIRUDSDVVZRUGLVVL[DQGWKH
LQWUXGHUORFNRXWFRXQWLVVHWWRWKUHH
< 6$3FRQQHFWLRQ
$FRQQHFWLRQEHWZHHQ6$3DQGWKHFXVWRPHULVHVWDEOLVKHGE\VWDUWLQJ6$3URXWHULQWKH
FXVWRPHUQHWZRUNDQGVWDUWLQJIRUH[DPSOH6$3*8,IRUDQ6$31HW²5)URQWHQG
QRWHFRQQHFWLRQ
< 6$3URXWHU
6$3URXWHULVVWDUWHGDQGVWRSSHGRQFHDGD\WRHQVXUHWKHUHLVQRRSHQFRQQHFWLRQV
< 5HPRWHFRQQHFWLRQV
)RUUHPRWHXVHUVGHGLFDWHG,3DGGUHVVHVDUHPDLQWDLQHG7KHVHDGGUHVVHVPXVWDOVREH
PDLQWDLQHGLQWKH6$352877$%WRPDNHVXUHWKDWXQDXWKRUL]HGXVHUVGRQRWORJRQWR
5
5ROHVDQG5HVSRQVLELOLWLHV

7DVN 5ROH

'HILQLQJDQGPDLQWDLQLQJ6$352877$% 6\VWHPDGPLQLVWUDWRU

0RQLWRULQJRSHQFRQQHFWLRQV 2SHUDWRU
6KXWWLQJGRZQUHVWDUWLQJ6$3URXWHUGDLO\ 2SHUDWRU
5HYLHZLQJVHFXULW\VWUDWHJ\ ,7PDQDJHU
&KDQJLQJV\VWHPSDVVZRUGV 6\VWHPDGPLQLVWUDWRU

$XGLWLQJ5HTXLUHPHQWV

,Q5WKHUHDUHVHYHUDODUHDVUHODWHGWRDXGLWLQJ
< 3URFHVVFRQWUROV
< &KDQJHPDQDJHPHQW
< $XWKRUL]DWLRQLPSOHPHQWDWLRQ
< 81,;
< 'DWDEDVH
<RXUVLWHPD\KDYHDGGLWLRQDODXGLWLQJUHTXLUHPHQWV1XPHURXVFRPSDQLHVKDYH
LPSOHPHQWHGH[FHOOHQWDXGLWLQJSURFHGXUHVEDVHGRQVWDQGDUG6$3WRROVDQGFXVWRPHUEXLOW
WRROV$PHULFDV·6$38VHUV·*URXS $68* ,QWHUQDO&RQWUROVDQG6HFXULW\RIIHUVWKHEHVW
LQIRUPDWLRQRQKRZRWKHUFRPSDQLHVKDYHKDQGOHGDXGLWLQJLQ5)RUPRUHLQIRUPDWLRQ
RQ$68*VHHKWWSZZZDVXJFRP)RUPRUHLQIRUPDWLRQRQDXGLWLQJVHHFKDSWHU6$3
6HFXULW\$XGLWDQG/RJJLQJ

Authorizations Made Easy


1–24
&KDSWHU $XWKRUL]DWLRQVDQG$6$3 

&RQWHQWV

Overview ..................................................................................................................2–2
ASAP Roadmap.......................................................................................................2–2
Knowledge Corner ..................................................................................................2–5
Questions and Answers Database (Q&Adb) ........................................................2–6
Authorization List....................................................................................................2–6

2–1
Chapter 2: Authorizations and ASAP
Overview

2YHUYLHZ

$FFHOHUDWHG6$3 $6$3 LV6$3·VFRPSUHKHQVLYHLPSOHPHQWDWLRQVROXWLRQWRVWUHDPOLQH5


SURMHFWV$6$3LQWHJUDWHVWKUHHFRPSRQHQWVWKH$6$35RDGPDS7RROVDQG56HUYLFHDQG
7UDLQLQJZKLFKZRUNLQFRQMXQFWLRQWRVXSSRUWWKHUDSLGDQGHIILFLHQWLPSOHPHQWDWLRQRI
WKH56\VWHP
< $FFHOHUDWHG6$35RDGPDSGHOLYHUVDSURFHVVRULHQWHGFOHDUDQGFRQFLVHSURMHFWSODQWR
SURYLGHVWHSE\VWHSGLUHFWLRQWKURXJKRXW\RXULPSOHPHQWDWLRQRI5
< 7RROVLQFOXGHV$6$3VSHFLILFWRROVWRVXSSRUWSURMHFWPDQDJHPHQWTXHVWLRQQDLUHVIRU
WKHEXVLQHVVSURFHVVFRQVXOWDQWVDQGQXPHURXVWHFKQLFDOJXLGHERRNVDQGFKHFNOLVWV
< 56HUYLFHVDQG7UDLQLQJLQFOXGHVDOOFRQVXOWLQJWUDLQLQJDQGVXSSRUWVHUYLFHV IRU
H[DPSOHKRWOLQH(DUO\:DWFKUHPRWHXSJUDGHVRUDUFKLYLQJHWF 7KHVHSURGXFWVKHOS
WRVWDQGDUGL]HFHUWDLQWDVNVWRSHUIRUPWKHPDVTXLFNO\DVSRVVLEOH
,QUHVSHFWWRDXWKRUL]DWLRQV$6$3GHVFULEHVWKHSURFHVVWRVHWXSDQDXWKRUL]DWLRQFRQFHSW
:KLOHWKLVJXLGHERRNKHOSV\RXLQWKHWHFKQLFDOLPSOHPHQWDWLRQRIDXWKRUL]DWLRQV$6$3
GHVFULEHVWKHVHWXSRIDQDXWKRUL]DWLRQFRQFHSWIURPDPHWKRGLFDODQGRUJDQL]DWLRQDOYLHZ
SRLQW%\IROORZLQJWKHVWHSVRI$6$35RDGPDS\RXFDQHVWDEOLVK\RXUDXWKRUL]DWLRQ
FRQFHSWZLWKDSURYHQLPSOHPHQWDWLRQSURFHVV7KH.QRZOHGJH&RUQHUSURYLGHV\RXZLWK
WRROVWKDWKHOS\RXWRDFFHOHUDWHWKHDXWKRUL]DWLRQLPSOHPHQWDWLRQ
,QWKLVFKDSWHUZHEULHIO\GLVFXVVKRZWRZRUNZLWK$6$3DQGZKDWLWFRQWDLQVLQUHJDUGV
WRDXWKRUL]DWLRQV:HH[SODLQKRZWRDFFHVVWKH$6$3FRPSRQHQWVFRQWDLQLQJ
DXWKRUL]DWLRQUHODWHGUHVRXUFHVUDWKHUWKDQGLVFXVVLQJWKHFRQWHQWVWKHPVHOYHV

$6$35RDGPDS

7KH$6$35RDGPDSVWUXFWXUHLVGLYLGHGLQWRGLIIHUHQWOHYHOV
< 3KDVH
< :RUNSDFNDJH
< $FWLYLW\
< 7DVN
2QWKHKLJKHVWOHYHOWKH$6$35RDGPDSFRQVLVWVRIILYHSKDVHVDVIROORZV

Authorizations Made Easy


2–2
Chapter 2: Authorizations and ASAP
ASAP Roadmap

User and authorization


management is covered
in phase 3, Realization

 3URMHFW3UHSDUDWLRQ
,QWKLVSKDVH\RXPDNHVXUHDOOGHFLVLRQPDNHUVDUHRQERDUGIRU\RXU5
LPSOHPHQWDWLRQDQGJDWKHU\RXULQWHUQDODQGH[WHUQDOLPSOHPHQWDWLRQWHDP
 %XVLQHVV%OXHSULQW
&UHDWHWKH%XVLQHVV%OXHSULQWGRFXPHQWLQJ\RXUFRPSDQ\·VEXVLQHVVUHTXLUHPHQWV7KH
%XVLQHVV%OXHSULQWLVDYLVXDOPRGHORI\RXUEXVLQHVV·IXWXUHVWDWHDIWHU\RX·YH
LPSOHPHQWHGWKH56\VWHP,WDOORZV\RXUSURMHFWWHDPWRFOHDUO\GHILQH\RXUVFRSH
DQGRQO\IRFXVRQWKH5SURFHVVHVQHHGHGWRUXQ\RXUEXVLQHVV
 5HDOL]DWLRQ
,QWKLVSKDVH\RXULPSOHPHQWDWLRQWHDPFRQILJXUHVDQGILQHWXQHVWKH56\VWHP
 )LQDO3UHSDUDWLRQ
7HVWDOOLQWHUIDFHVWUDLQDOOHQGXVHUVDQGPLJUDWH\RXUEXVLQHVVGDWDWR\RXU5
6\VWHP
 *R/LYH 6XSSRUW
,QWKLVSKDVHJROLYHZLWK5<RXHVWDEOLVKSURFHGXUHVDQGPHDVXUHPHQWVWRUHYLHZ
WKHEHQHILWVRI\RXU5LQYHVWPHQWRQDQRQJRLQJEDVLV6$3VXSSRUWDQGVHUYLFHV
DVVXUHWKDW\RXUV\VWHPFRQWLQXHVWRUXQVPRRWKO\FOHDQO\DQGHIILFLHQWO\

8VHUDQGDXWKRUL]DWLRQPDQDJHPHQWLVFRYHUHGLQWKH5HDOL]DWLRQSKDVHRIWKH$6$3
5RDGPDS,QWKHZRUNSDFNDJH(VWDEOLVK$XWKRUL]DWLRQ&RQFHSW\RXILQGDGHVFULSWLRQRIWKH
PHWKRGRORJ\WRVHWXSDQDXWKRUL]DWLRQVFRQFHSW)ROORZWKHVWHSVEHORZ

Release 4.6A/B
2–3
Chapter 2: Authorizations and ASAP
ASAP Roadmap

$XWKRUL]DWLRQVLQWKH5RDGPDS6WUXFWXUH
 6WDUWWKH,PSOHPHQWDWLRQ$VVLVWDQW
 2QWKH5RDGPDSWDERIWKH$6$3 2
,PSOHPHQWDWLRQ$VVLVWDQWFKRRVH
,PSOHPHQWDWLRQ5RDGPDS→ 3
5HDOL]DWLRQ→(VWDEOLVK
$XWKRUL]DWLRQ&RQFHSW
 2QWKHULJKWVLGHDQH[SODQDWLRQRI
WKHFRQWHQWVDSSHDUVIRUWKHQRGH
VHOHFWHGRQWKHOHIW

1RWH'XHWRVWUXFWXUDOGLIIHUHQFHVLQWKH$6$3URDGPDSEHWZHHQ$6$35HOHDVH$DQG%WKH
QXPEHURIWKHZRUNSDFNDJH(VWDEOLVK$XWKRUL]DWLRQ&RQFHSWLVHLWKHULQ$6$35HOHDVH$RULQ
$6$35HOHDVH%

7KHZRUNSDFNDJH(VWDEOLVK$XWKRUL]DWLRQ&RQFHSWFRQWDLQVWKUHHDFWLYLWLHVZKLFKDUH
 &UHDWH$XWKRUL]DWLRQ'HWDLOHG'HVLJQ
 ,PSOHPHQW$XWKRUL]DWLRQ&RQFHSW
 9DOLGDWH$XWKRUL]DWLRQ&RQFHSW
7RDFFHVVWKHDFWLYLWLHVEHORQJLQJWRWKHZRUNSDFNDJH(VWDEOLVK$XWKRUL]DWLRQ&RQFHSWIROORZWKHVWHSV
EHORZ

 &KRRVHWKHILUVWDFWLYLW\&UHDWH
$XWKRUL]DWLRQ'HWDLOHG'HVLJQWRJHW
DQRYHUYLHZDERXWWKHWDVNVWKLV
1
DFWLYLW\FRQWDLQV

Authorizations Made Easy


2–4
Chapter 2: Authorizations and ASAP
Knowledge Corner

 :RUN\RXUZD\WKURXJKWKH
GLIIHUHQWWDVNV
 :KHQ\RXILQLVKWKHVHWDVNV
FRQWLQXHZLWKWKHQH[WDFWLYLW\DQG 2
LWVWDVNV

.QRZOHGJH&RUQHU

7KH.QRZOHGJH&RUQHU .& LVDFROOHFWLRQRIUHVRXUFHVWKDWKHOSV\RXWRDFFHOHUDWHWKH5


LPSOHPHQWDWLRQ,QRUGHUWRDFFHVVDOODYDLODEOHDXWKRUL]DWLRQGRFXPHQWVDQGWRROVLQWKH.QRZOHGJH
&RUQHUIROORZWKHVWHSVEHORZ
 6WDUWWKH,PSOHPHQWDWLRQ$VVLVWDQW
 2QWKH.&WDERIWKH$6$3 2
,PSOHPHQWDWLRQ$VVLVWDQWFKRRVH6$3
3URGXFWV→&URVV$SSOLFDWLRQ→ 3
$XWKRUL]DWLRQV
 7KHXSSHUULJKWWLOHVKRZVDQ
H[SODQDWLRQRIWKHFRQWHQWVIURPWKH
OHIW
 7KHORZHUULJKWWLOHVKRZVDOO
DXWKRUL]DWLRQGRFXPHQWVDQGWRROV
DYDLODEOHLQWKH.& 4

Release 4.6A/B
2–5
Chapter 2: Authorizations and ASAP
Questions and Answers Database (Q&Adb)

4XHVWLRQVDQG$QVZHUV'DWDEDVH 4 $GE

:KDW,VWKH4 $GE"
7KH4XHVWLRQVDQG$QVZHUV'DWDEDVH 4 $GE LVDWRROWKDWKHOSV\RXWRDQDO\]HDQG
GHWHUPLQHWKHVFDOHDQGVFRSHRI\RXUV\VWHPLPSOHPHQWDWLRQGXULQJWKH%XVLQHVV%OXHSULQW
SKDVHRIDQ$6$3LPSOHPHQWDWLRQSURMHFW,QWKH4 $GEDOOSURFHVVHVWKDWFDQEH
LPSOHPHQWHGLQWKH56\VWHPDUHGLVSOD\HGLQDWUHHFDOOHGWKHUHIHUHQFHVWUXFWXUH:KLOH
GHILQLQJWKH%XVLQHVV%OXHSULQW\RXDUHVHWWLQJWKHEXVLQHVVSURFHVVHVLQVFRSHWKDW\RXDLP
WRLPSOHPHQWZLWKWKH56\VWHP
$VRI$6$35HOHDVH%\RXFDQFUHDWHXVHUUROHVLQWKH4 $GEDQGDVVLJQWKHSURFHVVHV
WREHLPSOHPHQWHGWRWKHVHUROHV7KLVLQIRUPDWLRQLVODWHUSDVVHGWRWKH$XWKRUL]DWLRQ/LVW
ZKHUH\RXFDQFRPSOHWHWKHXVHUUROHGHILQLWLRQ

+RZWR:RUNZLWKWKH4 $GE
)RUGHWDLOVRQKRZWRFUHDWHDQGPDLQWDLQXVHUUROHVZLWKLQWKH4 $GEVHHWKH4 $GE
RQOLQHKHOS

+RZWR*HQHUDWHWKH$XWKRUL]DWLRQ/LVWIURPWKH4 $GE
,QRUGHUWRUHILQHWKHXVHUUROHVWKDW\RXKDYHGHILQHGLQWKH4 $GE\RXFDQJHQHUDWHWKH
$XWKRUL]DWLRQ/LVW'XULQJWKHJHQHUDWLRQRIWKH$XWKRUL]DWLRQ/LVWERWKWKHSURFHVVHVVHWLQ
VFRSHDQGWKHGHILQHGXVHUUROHVDUHWUDQVIHUUHGWRWKH$XWKRUL]DWLRQ/LVW)RUGHWDLOVRQ
KRZWRJHQHUDWHWKH$XWKRUL]DWLRQ/LVWIURPWKH4 $GEVHHWKH4 $GERQOLQHKHOS

$XWKRUL]DWLRQ/LVW

:KDW,VWKH$XWKRUL]DWLRQ/LVW"
7KH$XWKRUL]DWLRQ/LVWLVDQ([FHOZRUNVKHHWWKDWKHOSV\RXWRPRGHO\RXUXVHUUROHVSULRU
WRWKHLPSOHPHQWDWLRQLQWKH56\VWHP8VLQJWKH$XWKRUL]DWLRQ/LVW\RXFDQGHVLJQXVHU
UROHVLQDQHDUO\V\VWHPLPSOHPHQWDWLRQSKDVHHYHQZLWKRXWKDYLQJLQVWDOOHG5
,QWKH$XWKRUL]DWLRQ/LVW\RXFUHDWHXVHUUROHVDQGGHILQHWKHWUDQVDFWLRQVDVVRFLDWHGZLWK
WKHVHUROHV7RPRGHOWKHXVHUUROHVWKH$XWKRUL]DWLRQ/LVWSURYLGHV\RXWZRGLIIHUHQW
YLHZV
< 3URFHVVYLHZ
7KHSURFHVVYLHZ 5ROHV'HVLJQ4 $GEVFRSHWDE LVJHQHUDWHGIURPWKH4 $GEDQG
FRQWDLQVWKHSURFHVVHVWKDWKDYHEHHQVHWLQVFRSHGXULQJWKH%XVLQHVV%OXHSULQWSKDVH
$OOSURFHVVHVDUHGLVSOD\HGLQWKHVDPHKLHUDUFK\DVLQWKHUHIHUHQFHVWUXFWXUHRIWKH
4 $GE<RXFDQGHILQH\RXUXVHUUROHVDQGVHOHFWWKHSURFHVVHVWRLQFOXGHWKHPLQWKH
XVHUUROHV

Authorizations Made Easy


2–6
Chapter 2: Authorizations and ASAP
Authorization List

< 0HQXYLHZ
,QWKHPHQXYLHZ 5ROHV'HVLJQ¥6$3PHQXWDE DOOWUDQVDFWLRQVLQWKHVWDQGDUG6$3
PHQXDUHGLVSOD\HG<RXFDQGHILQH\RXUXVHUUROHVDQGVHOHFWWUDQVDFWLRQVIURPWKH6$3
PHQXWRLQFOXGHWKHPLQ\RXUXVHUUROHV
$IWHUFRPSOHWLQJWKHPRGHOLQJRIXVHUUROHV\RXFDQJHQHUDWHDQRYHUYLHZRIDOO
WUDQVDFWLRQVLQFOXGHGLQHDFKXVHUUROH

+RZWR:RUNZLWKWKH$XWKRUL]DWLRQ/LVW
7RXVHWKH$XWKRUL]DWLRQ/LVWIRUWKHGHVLJQDQGLPSOHPHQWDWLRQRI\RXUDXWKRUL]DWLRQ
FRQFHSWIROORZWKHVWHSVEHORZ
 *HQHUDWHDXWKRUL]DWLRQOLVWIURPWKH4 $GE
 'HILQHXVHUUROHV
 *HQHUDWHXVHUUROHVRYHUYLHZ
 %XLOGXVHUUROHV

*HQHUDWH$XWKRUL]DWLRQ/LVWIURPWKH4 $GE
7RZRUNZLWKSURFHVVYLHZ\RXQHHGWRJHQHUDWHWKH$XWKRUL]DWLRQ/LVWIURPWKH4 $GE
3URFHHGDVGHVFULEHGLQWKH4 $GERQOLQHKHOS

(YHQLI\RXGRQRWZRUNZLWKWKH4 $GE\RXFDQXVHWKH$XWKRUL]DWLRQ/LVW7KHWHPSODWH
FDQEHIRXQGLQWKH$6$3.QRZOHGJH&RUQHU+RZHYHUWKHSURFHVVYLHZZLOOEHHPSW\WKXV
\RXFDQGHILQH\RXUXVHUUROHVRQO\YLDWKHPHQXYLHZ

Release 4.6A/B
2–7
Chapter 2: Authorizations and ASAP
Authorization List

'HILQH8VHU5ROHV
7RGHILQHDXVHUUROH\RXQHHGWRFUHDWHDXVHUUROHDQGDVVLJQSURFHVVHVRUWUDQVDFWLRQVWRWKDWXVHUUROH
 2SHQWKH$XWKRUL]DWLRQ/LVW
 (QWHU%XVLQHVV$UHDDQG5ROH 2
1DPHIRUWKHXVHUUROHWKDW
Tip
\RXZDQWWRFUHDWH
 0DUNWKHGHVLUHGWUDQVDFWLRQV

&KRRVH&OLFNKHUHIRULQVWUXFWLRQV
WRJHWDQH[SODQDWLRQRQWKH
IXQFWLRQDOLW\RIWKH$XWKRUL]DWLRQ
/LVW
7KHFRPSOHWHIXQFWLRQDOLW\RIWKH
$XWKRUL]DWLRQ/LVWLVGHVFULEHGLQ
WKHKHOSZLQGRZVKRZQWRWKH
ULJKW

Authorizations Made Easy


2–8
Chapter 2: Authorizations and ASAP
Authorization List

*HQHUDWH8VHU5ROHV2YHUYLHZ
7RJHQHUDWHWKHXVHUUROHVRYHUYLHZIURPWKH$XWKRUL]DWLRQ/LVW
 6HOHFWWKH7&RGHVSHU5ROHWDE
 &KRRVH*HQHUDWH2YHUYLHZWR
FUHDWHIRUHDFKXVHUUROHDOLVW
RIWUDQVDFWLRQVDVVLJQHGWR 2
WKDWUROH

1
 )RUDOOXVHUUROHVWKHVHOHFWHG
WUDQVDFWLRQVDUHVXPPDUL]HG
LQWKH$XWKRUL]DWLRQ/LVW

(YHU\WLPH\RXPDNHFKDQJHVWRWKHUROHVRUFUHDWHQHZUROHVWKH7&RGHVSHU5ROH
RYHUYLHZQHHGVWREHUHJHQHUDWHG

%XLOG8VHU5ROHV
8VLQJWKH3*FUHDWHDOOWKHVLQJOHDQGFRPSRVLWHDFWLYLW\JURXSVUHTXLUHGWRLPSOHPHQWWKH
XVHUUROHVGHILQHGLQWKH$XWKRUL]DWLRQ/LVW

Release 4.6A/B
2–9
Chapter 2: Authorizations and ASAP
Authorization List

Authorizations Made Easy


2–10
&KDSWHU 6HWWLQJ8SWKH3URILOH 
*HQHUDWRU

&RQWHQWV

Overview ..................................................................................................................3–2
Confirming that the Profile Generator Is Active ..................................................3–2
Loading the USOBX_C and USOBT_C tables ......................................................3–4
Getting Support from the SAPNet – R/3 Frontend Notes....................................3–7

3–1
Chapter 3: Setting Up the Profile Generator
Overview

2YHUYLHZ

8VLQJWKH3URILOH*HQHUDWRU 3* LQ5HOHDVH[PDNHVVHQVHIRUQHZFXVWRPHUVMXVW
VWDUWLQJWKHLU5SURMHFWDQGFXUUHQWFXVWRPHUVZLWKDXWKRUL]DWLRQSURILOHVFUHDWHGLQDQ
HDUOLHU5UHOHDVH0DLQWHQDQFHWUDQVDFWLRQV68DQG68DUHQRORQJHUUHTXLUHGDQG
FXVWRPHUVZKRKDYHSUHYLRXVO\EHHQXVLQJWKLVPHWKRGVKRXOGIDPLOLDUL]HWKHPVHOYHVZLWK
WKH3*,I\RXKDYHDOUHDG\FUHDWHGDXWKRUL]DWLRQSURILOHVZLWKRXWWKH3*6$3RIIHUV\RXD
ZD\WRPLJUDWHWKHVHSURILOHVWRWKH3*
)RULQIRUPDWLRQRQXSJUDGLQJWR5HOHDVHIURPDSUHYLRXVUHOHDVHVHHFKDSWHU
8SJUDGH
6HWWLQJXSWKH3*LQ[FRQVLVWVRIWZRVWHSV
 &RQILUPLQJWKDWWKH3*LVDFWLYH
 /RDGLQJWKHFXVWRPHUWDEOHV 862%;B&DQG862%7B& 

&RQILUPLQJWKDWWKH3URILOH*HQHUDWRU,V$FWLYH

:LWK55HOHDVHWKH3*LVDOUHDG\DFWLYDWHG<RXGRQRWKDYHWRVHWWKHV\VWHP
SDUDPHWHULQWKH5LQVWDQFHSURILOHLI\RXKDYHLQVWDOOHGWKH55HOHDVHDVDQHZ
V\VWHP7KHGHIDXOWYDOXHLVDXWKQRBFKHFNBLQBVRPHBFDVHV <

&KHFNLQJWKH5HTXLUHG,QVWDQFH3URILOH3DUDPHWHU
,I\RXDUHQRWVXUHZKHWKHUWKH3*LVDFWLYDWHG\RXFDQFKHFNWKHLQVWDQFHSURILOH
SDUDPHWHU7KHIROORZLQJSURFHGXUHVKRZV\RXKRZWRFKHFNLI\RXUSURILOHSDUDPHWHULVVHW
FRUUHFWO\DQGDFWLYH7RFKHFNLIWKHLQVWDQFHSURILOHSDUDPHWHULVVHWFRUUHFWO\UXQWKHUHSRUW
563$5$0DVVKRZEHORZ

Authorizations Made Easy


3–2
Chapter 3: Setting Up the Profile Generator
Confirming that the Profile Generator Is Active

 ,QWKH&RPPDQGILHOGHQWHUSA38DQGFKRRVH(QWHU RUFKRRVH 6\VWHP→6HUYLFHV→5HSRUWLQJ 


 (QWHURSPARAMLQWKH3URJUDP
ILHOG
 &KRRVH([HFXWH 3

$OLVWRISDUDPHWHUQDPHVDSSHDUVZLWKFRUUHVSRQGLQJXVHUGHILQHGYDOXHV7KHSDUDPHWHU
QDPHVDUHSURYLGHGLQYDULDEOHIRUP$WUXQWLPHWKHVHYDULDEOHVDUHUHSODFHGZLWKDFWXDO
YDOXHV8VHUGHILQHGYDOXHVDUHWKHDFWXDOYDOXHVRIWKHLQGLYLGXDOSDUDPHWHUV

 ,IDFWLYHWKHSURILOHSDUDPHWHU Tip
IRUWKH3*DXWKQRBFKHFNBLQB
VRPHBFDVHVLVGLVSOD\HGDVD<LQ
WKHWKLUGFROXPQ

8VHWKH LFRQWRVHDUFKIRUWKHHQWU\auth/no_check_in_some_casesLQWKHOLVWLI\RX
GRQRWVHHLWULJKWDZD\
,IWKHYDOXH<IRUWKHLQVWDQFHSURILOHSDUDPHWHUDXWKQRBFKHFNBLQBVRPHBFDVHVLVQRW
GLVSOD\HG\RXPXVWILUVWFKDQJHWKHLQVWDQFHSURILOHDQGWKHQUHERRWWKH5LQVWDQFH
)RUPRUHLQIRUPDWLRQRQKRZWRGRWKLVVHHFKDSWHU8SJUDGH

Release 4.6A/B
3–3
Chapter 3: Setting Up the Profile Generator
Loading the USOBX_C and USOBT_C tables

/RDGLQJWKH862%;B&DQG862%7B&WDEOHV

/RDGLQJWKH862%;B&DQG862%7B&WDEOHVLVDFFRPSOLVKHGLQWZRVWHSV
 ,QLWLDOFRS\LQJRI6$3GHIDXOWVLQWRWKHFXVWRPHUWDEOHV
 7UDQVSRUWLQJWKHGHIDXOWV

,QLWLDO&RS\LQJRI6$3'HIDXOWVLQWRWKH&XVWRPHU7DEOHV 68
8VLQJWUDQVDFWLRQ68 &RS\LQLWLDOGHIDXOWV FRS\WKHVXSSOLHG6$3GHIDXOWVWDEOHV862%;DQG862%7
7KLVVWHSLPSRUWVWKH6$3FKHFNLQGLFDWRUGHIDXOWVIRUWKHDXWKRUL]DWLRQREMHFWVZLWKLQDWUDQVDFWLRQDQG
WKHDXWKRUL]DWLRQILHOGYDOXHVIRUWKH3*LQWRFXVWRPHUWDEOHV862%;B&DQG862%7B&:HGLVFXVVKRZWR
HGLWWKHVHYDOXHVXVLQJWUDQVDFWLRQ68LQFKDSWHU7LSV 7URXEOHVKRRWLQJ
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSPRODQGFKRRVH(QWHU
RUIURPWKH6$3VWDQGDUGPHQXWUHHFKRRVH7RROV→$FFHOHUDWHG6$3→&XVWRPL]LQJ→(GLW3URMHFW 
 &KRRVH 6$35HIHUHQFH,0*
 ,QWKH,0*RSHQ%DVLV&RPSRQHQWV
→6\VWHP$GPLQLVWUDWLRQ→8VHUV
DQG$XWKRUL]DWLRQV→0DLQWDLQ
$XWKRUL]DWLRQVDQG3URILOHV8VLQJ
3URILOH*HQHUDWRUDQGFKRRVH QH[W
WR:RUNRQ6$3&KHFN,QGLFDWRUVDQG
)LHOG9DOXHV

7RUHDFKWKH3URILOH*HQHUDWRU8SJUDGH 3
DQG)LUVW,QVWDOODWLRQVFUHHQ\RXPD\
DOWHUQDWLYHO\XVHWUDQVDFWLRQSU25

Authorizations Made Easy


3–4
Chapter 3: Setting Up the Profile Generator
Loading the USOBX_C and USOBT_C tables

 2QWKHQH[WVFUHHQVHOHFW&RS\6$3WHVWVWDWXVHVDQGILHOGYDOXHV WKLVWUDQVODWLRQLVLQFRUUHFWWKHWH[W
VKRXOGUHDG&RS\6$3FKHFNLQGLFDWRUVDQGILHOGYDOXHV 

 &KRRVH QH[WWR,QLWLDOO\ILOOWKH
FXVWRPHUWDEOHVLI\RXKDYHQRW 6
SUHYLRXVO\ZRUNHGZLWKWKH3*RU
LI\RXZDQWWRUHWUDQVIHUDOO6$3
GHIDXOWYDOXHV7KLVVWHSPD\WDNH
VHYHUDOPLQXWHV
5

,I\RXKDYHQRWSUHYLRXVO\ZRUNHG
ZLWKWKH3*RU\RXZDQWWRUHWUDQVIHU
DOO6$3GHIDXOWYDOXHVXVH,QLWLDOO\
ILOOWKHFXVWRPHUWDEOHVIXQFWLRQXQGHU
,QVWDOOLQJWKH3URILOH*HQHUDWRU

,I\RXKDYHDOUHDG\ZRUNHGZLWKWKH
3*DQGZDQWWRFRPSDUH\RXUGDWD
ZLWKWKH6$3GHIDXOWYDOXHVVHH
FKDSWHU8SJUDGH

 $ZDUQLQJPHVVDJHDSSHDUVRQDGLDORJER[5HDGLWFDUHIXOO\DQGFKRRVH 

Release 4.6A/B
3–5
Chapter 3: Setting Up the Profile Generator
Loading the USOBX_C and USOBT_C tables

7UDQVSRUWLQJWKH'HIDXOWV
 &KRRVH QH[WWR7UDQVSRUWWKH
FXVWRPHUWDEOHVWRWUDQVSRUWWKH3*
FXVWRPHUWDEOHV 862%;B&DQG
862%7B& 

$WWKLVWLPHSHUIRUPRQO\VWHSV
DQG'RQRWUXQVWHSV$WKURXJK
'\HW6HHFKDSWHU8SJUDGHIRU
PRUHLQIRUPDWLRQ
7

1RWHWKDWWKHFXVWRPHUWDEOHV 862%;B&DQG862%7B& DUHFRPSOHWHO\WUDQVSRUWHG$OO


FKDQJHVWRDXWKRUL]DWLRQFKHFNVWKDWZHUHPDGHLQWKLVWUDQVDFWLRQRULQ68DUHDOVR
WUDQVSRUWHGLQWRWKHWDUJHWV\VWHP7KLVVWHSUHSODFHVDOOWKHILHOGYDOXHDQGFKHFNLQGLFDWRU
VHWWLQJVLQWKHWDUJHWV\VWHP

1RDFWLYLW\JURXSVRUDXWKRUL]DWLRQSURILOHVDUHWUDQVSRUWHGLQWKLVVWHS7RWUDQVSRUWQHZO\
JHQHUDWHGDFWLYLW\JURXSVXVHWKHDFWLYLW\JURXSWUDQVSRUWFRQQHFWLRQ

 &KRRVH DIWHUWKHUHSRUWLVILQLVKHG
 &KRRVH RQWKHIROORZLQJVFUHHQWRILQLVKWKHSURFHGXUH

Authorizations Made Easy


3–6
Chapter 3: Setting Up the Profile Generator
Getting Support from the SAPNet – R/3 Frontend Notes

*HWWLQJ6XSSRUWIURPWKH6$31HW²5)URQWHQG1RWHV

$VPRRWKVHFXULW\LPSOHPHQWDWLRQRI\RXUSURMHFWLVLPSRUWDQW7KHWRSSULRULWLHVRIWKH
6$31HW²5)URQWHQG1RWHV IRUPHUO\266 DUHWRVXSSRUW\RXUZRUNDQGVSHHGXS\RXU
LPSOHPHQWDWLRQ7KH6$31HW²5)URQWHQGQRWHVDUHDQHDV\WRXVHGLUHFW
FRPPXQLFDWLRQOLQNWR6$3VR\RXFDQTXLFNO\DQGHIILFLHQWO\REWDLQSUREOHPVROYLQJ
LQIRUPDWLRQ6$31HW²5)URQWHQGQRWHVJLYHV\RXDIDVWHUUHVSRQVHWLPHE\DOORZLQJ\RX
WRE\SDVVWKH6$3KHOSGHVNDQGHQWHUSUREOHPVGLUHFWO\LQWRRXUGDWDEDVH
%\HQWHULQJSUREOHPVRULQTXLULHVGLUHFWO\LQWRWKH6$31HW²5)URQWHQGQRWHV\RXFDQ
< 7DNHDGYDQWDJHRI5VHUYLFHVUHJDUGOHVVRIWKHDYDLODELOLW\DQGZRUNORDGRIWKH
UHVSRQVLEOHKHOSGHVNSHUVRQQHO
< 4XLFNO\UHSRUW\RXUSUREOHPV
< 'LUHFWO\VXEPLW\RXUSUREOHPVWRILUVWOHYHOFXVWRPHUVHUYLFHIRUSURFHVVLQJ

$FFHVVLQJWKH(UURU1RWHV'DWDEDVH
6$31HW²5)URQWHQGQRWHVDFWLYHO\LQYROYHV\RXLQWKHSUREOHPVROYLQJSURFHVVE\
JLYLQJ\RXGLUHFWDFFHVVWR6$3·VLQWHUDFWLYH(UURU1RWHVGDWDEDVH7KLVGDWDEDVHFRQWDLQV
HUURUOLVWLQJVDQGVROXWLRQVWRFRPPRQV\VWHPSUREOHPV:LWKWKH6$31HW²5)URQWHQG
QRWHV\RXFDQYLHZWKHVHVROXWLRQVZLWKRXWVXEPLWWLQJDSUREOHPPHVVDJHWRILUVWOHYHO
FXVWRPHUVHUYLFH'LUHFWDFFHVVWRWKH(UURU1RWHVGDWDEDVHZLWKWKH6$31HW²5
)URQWHQGQRWHVDOVRSURYLGHVKHOSIXOWLSVRQDYRLGLQJSRWHQWLDOSUREOHPV

1RZLVDJRRGWLPHWRORRNDWWKH6$31HW²5)URQWHQGQRWHVOLVWHGLQDSSHQGL[$
7KHVHQRWHVKHOS\RXSUHSDUHIRUIXUWKHU5VHFXULW\VHWXSWDVNV
<RXVKRXOGDOVRORRNLQWRWKH6$31HW²5)URQWHQGQRWHVLIDQ\H[SHULHQFHVRFFXU
WKDWDUHQRWFRYHUHGE\WKLVJXLGHERRN

7RXVH6$31HW¥5)URQWHQGQRWHV
 &RQWDFW\RXUV\VWHPDGPLQLVWUDWRUIRUDQ\IXUWKHULQIRUPDWLRQDERXWWKH6$31HW²
5)URQWHQGQRWHV
 )LQGRXWZKRDOUHDG\KDVDFFHVVWRWKH6$31HW²5)URQWHQGQRWHVLQ\RXU
FRPSDQ\
 0DNHVXUH\RXKDYHDFFHVVWRWKH6$31HW²5)URQWHQGQRWHV
 /RJRQWRWKH6$31HW²5)URQWHQGQRWHVDQGEURZVHWKURXJKWKH6$31HW²5
)URQWHQGQRWHVLQDSSHQGL[$

Release 4.6A/B
3–7
Chapter 3: Setting Up the Profile Generator
Getting Support from the SAPNet – R/3 Frontend Notes

3ULQWLQJ,PSRUWDQW6$31HW²5)URQWHQG1RWHV
6LQFHZHUHIHUWRFHUWDLQ6$31HW²5)URQWHQGQRWHVLQWKLVJXLGHERRNSOHDVHOHDUQKRZ
WRSULQWDQRWHSURSHUO\7KHSULQWIXQFWLRQLVQRWVXSSRUWHGLQ6$31HW²5)URQWHQG
QRWHVVR\RXPXVWILUVWGRZQORDGWKHQRWHDQGSULQWLWORFDOO\5HDGQRWHVDQG
WRIDPLOLDUL]H\RXUVHOIZLWKGRZQORDGLQJDQGSULQWLQJWKHQRWHV%HIRUH\RXFRQWLQXHSULQW
RXWWKHQRWHVLQDSSHQGL[$DQGNHHSWKHPDVKDQG\UHIHUHQFHWRROV

$SSO\LQJ$GYDQFH&RUUHFWLRQVWR<RXU56\VWHP

$GYDQFHFRUUHFWLRQVVKRXOGEHDSSOLHGRQO\ZLWKWKHDSSURYDORIWKH%DVLV6\VWHP
$GPLQLVWUDWRU

7KH56\VWHPQHHGVFHUWDLQFRUUHFWLRQVWRSHUIRUPSURSHUO\7RDSSO\WKHVHFRUUHFWLRQVLQ
DGYDQFHUHIHUWR6$31HW²5)URQWHQGQRWHIRUWKHDYDLODELOLW\RIWKH3*KRW
SDFNDJHVIRU5HOHDVHV$DQG%

Authorizations Made Easy


3–8
&KDSWHU 8VHU$GPLQLVWUDWLRQ 

&RQWHQWV

Overview ..................................................................................................................4–2
System Users ..........................................................................................................4–2
User Groups ............................................................................................................4–5
Authorizations and Authorization Profiles...........................................................4–6
Mass Operations .....................................................................................................4–6
Creating a New User (Client-Specific)...................................................................4–7
Changing a User’s Password ..............................................................................4–10
User Information System .....................................................................................4–12

4–1
Chapter 4: User Administration
Overview

2YHUYLHZ

<RXKDYHWZRRSWLRQVWRVHWXS\RXUXVHUDGPLQLVWUDWLRQ
< &HQWUDO8VHU$GPLQLVWUDWLRQ
< &OLHQWVSHFLILFXVHUDGPLQLVWUDWLRQ
,QWKLVFKDSWHUZHRQO\GHVFULEHWKHFOLHQWVSHFLILFXVHUDGPLQLVWUDWLRQ,I\RXDUHXVLQJWKH
&HQWUDO8VHU$GPLQLVWUDWLRQVHHFKDSWHU6HWWLQJ8S&HQWUDO8VHU$GPLQLVWUDWLRQIRUPRUH
LQIRUPDWLRQ
5DOORZV\RXWRGHILQHDQGPDLQWDLQXVHUVDQGXVHUDXWKRUL]DWLRQVE\JLYLQJ\RXSUHFLVH
FRQWURORYHUXVHUDFFHVV7KHGHILQLWLRQDQGYDOLGDWLRQRIDXWKRUL]DWLRQWHFKQRORJ\LV
LQWHJUDWHGLQWRWKH6$3GHYHORSPHQWHQYLURQPHQWDQGLVHDVLO\DGGHGWRFXVWRPHU
PRGXOHV
$OWKRXJKXVHUDGPLQLVWUDWLRQLVDQRQJRLQJSURFHVV\RXVKRXOGQRWDGPLQLVWHU\RXUXVHUV
LQDSURGXFWLYHHQYLURQPHQW3HUIRUPXVHUDGPLQLVWUDWLRQWDVNVLQ\RXU'(9V\VWHP:KHQ
\RXWUDQVSRUWWKHDFWLYLW\JURXSVWKHXVHUVDUHDOVRWUDQVSRUWHGWKURXJKWKH4$6WR\RXU
35'V\VWHPZKHQHYHUXVHUVDQGDXWKRUL]DWLRQREMHFWVDUH
< &UHDWHG
< 'HOHWHG
< &KDQJHG
< 0RQLWRUHG
+RZHYHU\RXPLJKWKDYHGLIIHUHQWXVHUVLQWKH'(9DQG4$6V\VWHPWKDW\RXGRQRWQHHG
LQ\RXU35'V\VWHPODWHU IRUH[DPSOHDGHYHORSHU $QDGPLQLVWUDWRU·VUROHLQWKLVSURFHVV
YDULHVGHSHQGLQJRQKRZXVHUDGPLQLVWUDWLRQWDVNVDUHGHOHJDWHG

(YHQLI\RXDUHXVLQJWKH+5PRGXOHXVHUDGPLQLVWUDWLRQVWLOOQHHGVWREHVHWXSEXW
PDLQWHQDQFHLQWKHORQJUXQLQFOXGHVRWKHUIDFHWV

6\VWHP8VHUV

,QFOLHQWVSHFLILFXVHUDGPLQLVWUDWLRQXVHUVPXVWEHVHSDUDWHO\GHILQHGIRUHDFKFOLHQWLQ
\RXUV\VWHP$XVHUGHILQLWLRQKDVPDQ\RIWKHIROORZLQJFRPSRQHQWV
< %DVLFXVHUGDWD
Π1DPH
Π3DVVZRUG
Π$GGUHVV
Π&RPSDQ\LQIRUPDWLRQ

Authorizations Made Easy


4–2
Chapter 4: User Administration
System Users

< 8VHUGHIDXOWV
Π/RJRQODQJXDJH
Π'HIDXOWSULQWHU
Π'DWHDQGGHFLPDOIRUPDWV
Π'HIDXOWWLPH]RQH
< 8VHUSURILOHLQIRUPDWLRQ
Π3DUWVRI5DXVHUFDQDFFHVV
Π8VHUJURXSV
Œ $FWLYHDQGH[SLUDWLRQGDWHVRIDXVHU·VDFFRXQW
7KHUHDUHWZRZD\VWRFUHDWHXVHUV)LUVWIURPVFUDWFKE\GHILQLQJWKHYDULRXVXVHU
FRPSRQHQWVDQGVHFRQGE\FRS\LQJDQH[LVWLQJXVHU:KHQFRS\LQJDQH[LVWLQJXVHU\RX
PD\DOVRFRS\WKHGHIDXOWVDGGUHVVDQGPHPRU\SDUDPHWHUVHWWLQJV

([WHUQDO58VHUV
([WHUQDOXVHUVLQFOXGHWKRVHFUHDWHGIRU:LQGRZV17DFWLYLWLHV IRUH[DPSOH
6$36,'!DGPDGPLQLVWUDWRUDQG6$36HUYLFH6$36,'! DQGGDWDEDVHFRQQHFWLRQV
6$35GDWDEDVHDGPLQLVWUDWRUDQG64/XVHUV 

,QWHUQDO58VHUV
,QWHUQDOXVHUVDUHFUHDWHGDQGPDLQWDLQHGLQ5(DFKXVHULVDVVLJQHGDXVHUW\SHZKLFK
FRQWUROVKRZWKHXVHULQWHUDFWVZLWK5
,QWHUQDOXVHUW\SHVLQFOXGH
< 'LDORJ
< %DWFK'DWD&RPPXQLFDWLRQ %'&
< %DFNJURXQG
< &3,&
'LDORJ
7KHGLDORJXVHUW\SHKDQGOHVRQOLQHWUDQVDFWLRQVDQGDSSOLHVWRPRVWXVHUVLQDFRPSDQ\
'LDORJXVHUVPD\ORJRQDQGLQWHUDFWLYHO\ZRUNZLWK57KHVHXVHUVDUHVXEMHFWWR
DXWKRUL]DWLRQFKHFNVDQGUHTXLUHDXWKRUL]DWLRQSURILOHVDQGSDVVZRUGV$OWKRXJKLWLVQRW
UHTXLUHGGLDORJXVHUVVKRXOGEHDVVLJQHGWRDXVHUJURXS
%DWFK'DWD&RPPXQLFDWLRQ
7KHEDWFKGDWDFRPPXQLFDWLRQ %'&RUEDWFKLQSXW XVHUW\SHLVXVHGIRUDXWKRUL]DWLRQ
FKHFNVZKHQSURFHVVLQJDEDWFKLQSXWVHVVLRQ7KHVHXVHUVFDQQRWORJRQRUZRUN
LQWHUDFWLYHO\DQGDUHVXEMHFWWRDXWKRUL]DWLRQFKHFNV
%DFNJURXQG
7KHEDFNJURXQGXVHUW\SHUXQVEDFNJURXQGMREV7KHVHXVHUVFDQQRWORJRQDQGZRUN
LQWHUDFWLYHO\7KHDGPLQLVWUDWRUFDQFUHDWHEDFNJURXQGXVHUVZLWKWKHQHFHVVDU\
DXWKRUL]DWLRQVWRSHUIRUPDVHULHVRIWDVNV7RGHILQHWKHEDFNJURXQGMREVFKDQJHWKHXVHU
ILHOGWRWKHEDFNJURXQGXVHUQDPH\RXFUHDWHG$OODXWKRUL]DWLRQFKHFNVJRDJDLQVWWKH

Release 4.6A/B
4–3
Chapter 4: User Administration
System Users

EDFNJURXQGXVHUUDWKHUWKDQWKHXVHUFUHDWLQJWKHMRE$OWKRXJKEDFNJURXQGXVHUVDUH
XQDIIHFWHGE\SDVVZRUGFRQWUROSDUDPHWHUV IRUH[DPSOHSDVVZRUGH[SLUDWLRQVRUFKDUDFWHU
OHQJWK WKHVHXVHUVDUHVXEMHFWWRDXWKRUL]DWLRQFKHFNV
&3,&
7KH&3,&XVHULVGHOLYHUHGLQFOLHQWZLWKQRDXWKRUL]DWLRQVDQGORJVRQXVLQJWKH&3,&
LQWHUIDFH7KLVLQWHUIDFHGRHVQRWZRUNLQWHUDFWLYHO\ZLWK57KH&3,&XVHUUHFHLYHVUHWXUQ
FRGHVIURPH[WHUQDOSURJUDPVDQGWKHVWDWLVWLFFROOHFWRUV UHIHUWR6$31HW²5)URQWHQG
QRWH 6$3&3,&LVQRORQJHUUHTXLUHGIRUWKHWUDQVDFWLRQ60
7KH&3,&XVHUUHTXLUHVDQDXWKRUL]DWLRQWRSHUIRUPWKHQHFHVVDU\DFWLYLWLHVLQ5DQGLV
VXEMHFWWRDXWKRUL]DWLRQFKHFNV

6SHFLDO58VHUV
6$3
,QFOLHQWVDQGWKH56\VWHPLQFOXGHVWKHGHIDXOWVXSHUXVHU6$3 'XULQJ
LQVWDOODWLRQDXVHUPDVWHUUHFRUGLVGHILQHGIRU6$3 +RZHYHU6$3 LVSURJUDPPHGLQ
5DQGGRHVQRWUHTXLUHDXVHUPDVWHUUHFRUG$IWHULQVWDOODWLRQRQFHWKH6$3 XVHUPDVWHU
UHFRUGEHFRPHVDYDLODEOHXVHWKHSDVVZRUG06071992,IWKH6$3 XVHUPDVWHUUHFRUGLV
GHOHWHGDQGDXVHUORJVRQDJDLQDVSAP*ZLWKWKHLQLWLDOSDVVZRUGPASSWKHQ6$3 LVQRW
VXEMHFWWRDXWKRUL]DWLRQFKHFNVDQGKDVWKHSDVVZRUGPASSZKLFKFDQQRWEHFKDQJHG
'',&
7KH'',&XVHUPDLQWDLQVWKH$%$3'LFWLRQDU\DQGWKHVRIWZDUHORJLVWLFV$'',&XVHU
PDVWHUUHFRUGLVDXWRPDWLFDOO\FUHDWHGLQFOLHQWVDQGZKHQ5LVLQVWDOOHGDQGKDV
VWDQGDUGSDVVZRUG199207067KLVLVWKHRQO\XVHUWKDWFDQORJRQWR5GXULQJDQHZ
UHOHDVHLQVWDOODWLRQ3URWHFWWKH'',&XVHUIURPXQDXWKRUL]HGDFFHVVE\FKDQJLQJWKHLQLWLDO
SDVVZRUGLQFOLHQWVDQG7KLVXVHULVUHTXLUHGIRUFHUWDLQLQVWDOODWLRQDQGVHWXS
WDVNVVRLWVKRXOGQRWEHGHOHWHG
(DUO\:DWFK
7KH(DUO\:DWFKXVHULVRQO\GHOLYHUHGLQFOLHQWZLWKWKHLQLWLDOSDVVZRUGSUPPORT
$FFHVVLVOLPLWHGWRPRQLWRULQJDQGSHUIRUPDQFHGDWD7KH(DUO\:DWFKXVHULVXVHGE\
6$3·V(DUO\:DWFKH[SHUWV7KLVXVHUVKRXOGQRWEHGHOHWHGDQGWKHSDVVZRUGVKRXOGEH
FKDQJHG(DUO\:DWFKVKRXOGQRWEHXVHGIRUDQ\SXUSRVHRWKHUWKDQ(DUO\:DWFKIXQFWLRQV

Authorizations Made Easy


4–4
Chapter 4: User Administration
User Groups

&UHDWLQJ8VHUV

,I\RXGRQRWXVHWKH&HQWUDO8VHU$GPLQLVWUDWLRQIXQFWLRQWKHXVHUPDVWHUUHFRUGVDQG
DXWKRUL]DWLRQFRPSRQHQWVDUHFOLHQWVSHFLILFDQGPXVWEHVHSDUDWHO\GHILQHGIRUHDFK
V\VWHPFOLHQW

8VHUVDUHFUHDWHGHLWKHUIURPVFUDWFK XVLQJWUDQVDFWLRQ68 RUIURPDFRS\RIDQH[LVWLQJ


XVHUE\
< 8VLQJWUDQVDFWLRQ68
< &UHDWLQJDWHPSODWHXVHU
< &RS\LQJLWWRRWKHUVLPLODUXVHUV
< 0DQXDOO\HQWHULQJHDFKSDVVZRUG
7KHKLHUDUFKLFDOVHFXULW\HIIHFWRIXVHUJURXSVHQDEOHVWKHDGPLQLVWUDWRUWRGLVWULEXWHXVHU
PDLQWHQDQFHWDVNVDQGPDLQWDLQKLJKVHFXULW\:LWKLQDVSHFLILFJURXSVHFXULW\WDVNVFDQEH
GLVWULEXWHGLQVXFKDZD\WKDWWKUHHSHRSOHDUHUHTXLUHGWRFUHDWHXVHUVDQGPDQDJHDFWLYLW\
JURXSVDQGDXWKRUL]DWLRQV7KXVXVHUDQGDXWKRUL]DWLRQDGPLQLVWUDWRUVFDQRQO\FRPSOHWH
FHUWDLQSDUWVRIWKHUHTXLUHGWDVNV7KLVSURFHVVHQVXUHVWKDWQRRQHSHUVRQFDQFLUFXPYHQW
5·VDXWKRUL]DWLRQVFKHPH,IDFRPSDQ\KDVDFHQWUDOL]HGRUJDQL]DWLRQDOVWUXFWXUHDOO
PDLQWHQDQFHWDVNVPD\QHHGWREHSHUIRUPHGE\DVLQJOHXVHUWKHVRFDOOHGVXSHUXVHU
7RDOORZXVHUVWRVHHWKHLURZQXVHUPDVWHUUHFRUGVXVHWUDQVDFWLRQ68'

)RUVHFXULW\UHDVRQVWKHUHVSRQVLELOLW\IRUWKHIROORZLQJPDLQWHQDQFHWDVNVVKRXOGEH
GLVWULEXWHGDPRQJWKUHHGLIIHUHQWDGPLQLVWUDWRUV VHHFKDSWHUIRUDGGLWLRQDO
LQIRUPDWLRQ 

8VHU*URXSV

,QVWHDGRIXVLQJXVHUJURXSVWRRQO\GLVWULEXWHXVHUPDLQWHQDQFHDPRQJVHYHUDO
DGPLQLVWUDWRUV\RXFDQQRZDVVLJQXVHUVWRRQHRUPRUHXVHUJURXSV1RWHWKDWRQHJURXS
LVVWLOOWKHSULPDU\JURXSIRUWKHDXWKRUL]DWLRQFKHFN7KLVLVWKHJURXSWKDWDSSHDUVLQWKH
WRSILHOGRQWKH/RJRQGDWDWDELQWKHXVHUPDLQWHQDQFHWUDQVDFWLRQ7KHFDWHJRU\8VHUJURXS
FDQEHXVHGDVDEDVLVIRUEHWWHUGLVWULEXWLRQRIXVHUGDWDWKXVLQFUHDVLQJWKHVSHHGRI
&HQWUDO8VHU$GPLQLVWUDWLRQ<RXPD\XVHDQ\QDPLQJFRQYHQWLRQ
8VHUJURXSVHQDEOHWKHDGPLQLVWUDWRUWRSURYLGHDSSOLFDWLRQPDQDJHUVZLWKWKHULJKWV
UHTXLUHGWRFRQWUROWKHLUXVHUV7KXVWKHVHPDQDJHUVFDQFRQWURODOOXVHUVLQWKHLUXVHU
JURXSVDQGXVHUVQRW\HWDVVLJQHGWRDXVHUJURXS+RZHYHUDSSOLFDWLRQPDQDJHUVFDQQRW
FKDQJHXVHUVLQRWKHUXVHUJURXSV
$OWKRXJKDXVHUJURXSDIILOLDWLRQLVQRWUHTXLUHGZKHQ\RXFUHDWHXVHUVWKLVDIILOLDWLRQLV
QHFHVVDU\WRGHOHJDWHXVHUPDLQWHQDQFHWDVNVWRDSSOLFDWLRQPDQDJHUVDQGVWDII/DWHUZH
VKRZKRZWRGLVWULEXWHXVHUDGPLQLVWUDWLRQWDVNVWRWKHDSSURSULDWHDSSOLFDWLRQSHUVRQQHO

Release 4.6A/B
4–5
Chapter 4: User Administration
Authorizations and Authorization Profiles

8VHUJURXSVDUHQRUPDOO\EDVHGRQWKHUHTXLUHPHQWVGLFWDWHGE\WKHGLIIHUHQWDSSOLFDWLRQ
JURXSV7KHQXPEHURIXVHUVLQHDFKXVHUJURXSDOVRLQIOXHQFHVWKHVHJURXSV6LQFHXVHU
JURXSVGLVWULEXWHXVHUDGPLQLVWUDWLYHWDVNV\RXUXVHUJURXSVZLOOEHEDVHGRQWKHDYDLODEOH
RUJDQL]DWLRQDOVXSSRUWVWUXFWXUH$IHZWKLQJVWRUHPHPEHUZKHQZRUNLQJZLWKXVHU
JURXSVDUHWKDW
< 8VHUJURXSVDUHFUHDWHGZLWKWUDQVDFWLRQ68*5 7RROV→$GPLQLVWUDWLRQ→8VHU
0DLQWHQDQFH→0DLQWDLQ8VHUV*URXSV 
< 8VHUJURXSVDIIHFWQRWKLQJXQWLO\RXVHWXS\RXUJURXSDGPLQLVWUDWRUVZLWKLQDXVHU
JURXS
< (DFKXVHUFDQEHORQJWRPDQ\XVHUJURXSV
< 8VHUJURXSVFDQEHPDLQWDLQHGEHIRUHWKH\DUHDVVLJQHGWRXVHUV

$XWKRUL]DWLRQVDQG$XWKRUL]DWLRQ3URILOHV

$XWKRUL]DWLRQSURILOHVDOORZ\RXWRRUJDQL]HDFFHVVSULYLOHJHVE\WDVNRUMREIXQFWLRQ
6SHFLILFDOO\WKLVSURILOHFRQWDLQVWKHDFFHVVSULYLOHJHVQHHGHGWRSHUIRUPSDUWLFXODUMREV
VXFKDVGDWDHQWU\RUDSSOLFDWLRQPDLQWHQDQFH7RDXWKRUL]HDXVHUIRUDMRE\RXRQO\QHHG
WRJLYHWKHXVHUWKHFRUUHVSRQGLQJDXWKRUL]DWLRQSURILOH7KH3URILOH*HQHUDWRU 3*
VLPSOLILHVWKHWDVNRIVHWWLQJXSDXWKRUL]DWLRQSURILOHV

0DVV2SHUDWLRQV

7KH56\VWHPSURYLGHVVHYHUDOXWLOLWLHVWRDGPLQLVWHUDOORUDVHOHFWHGVHWRIXVHUV
&KDQJHVPDGHIRURQHXVHULQXVHUDGPLQLVWUDWLRQFDQDOVREHPDGHIRUDODUJHQXPEHURI
XVHUVDOODWRQFH<RXFDQFKDQJHORJRQGDWDGHIDXOWYDOXHVSDUDPHWHUVDFWLYLW\JURXSV
DQGSURILOHVIRUDSDUWLFXODUVHWRIXVHUV IRUH[DPSOHDOOXVHUVRIDXVHUJURXS 
7RDFFHVVWKHPDVVFKDQJHVVFUHHQHQWHUWUDQVDFWLRQSU01DQGFKRRVH(QYLURQPHQW→0DVV
FKDQJHV
,I\RXDUHXVLQJ&HQWUDO8VHU$GPLQLVWUDWLRQ E\PDNLQJPDVVFKDQJHVLQWKHFHQWUDO
V\VWHP WKHSURILOHVDQGDFWLYLW\JURXSVDUHGLVSOD\HGDFFRUGLQJWRWKHUHOHYDQWV\VWHP
7KHPDVVFKDQJHIXQFWLRQVRQWKHLQLWLDOVFUHHQDIIHFWWKHXVHUGDWDRIDOOGLVSOD\HGXVHUV
XQOHVV\RXKDYHVHOHFWHGVSHFLILFXVHUV

)RUHYHU\FKDQJHRQWKH$GGUHVV/RJRQGDWDDQG'HIDXOWYDOXHVWDEV\RXPXVWFKRRVH
&KDQJH7KLVHQVXUHVWKDW\RXUFKDQJHVVXFKDVGHOHWLRQRIILHOGFRQWHQWVWDNHHIIHFWIRU
WKHFRUUHVSRQGLQJILHOGV

Authorizations Made Easy


4–6
Chapter 4: User Administration
Creating a New User (Client-Specific)

&UHDWLQJD1HZ8VHU &OLHQW6SHFLILF

'RQRWFUHDWHRUFKDQJHXVHUVLQFOLHQWVRU7RFUHDWHRWKHUQHZFOLHQWVPDNHDFRS\RI
FOLHQW VWDQGDUG6$3FOLHQW 

 /RJRQWRWKH6$3FOLHQWZKHUH\RXZLVKWRFUHDWHDQHZXVHU
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSU01DQGFKRRVH(QWHU RUFKRRVH7RROV→$GPLQLVWUDWLRQ→
8VHUPDLQWHQDQFH→8VHUV 
 ,QWKH8VHUILHOG HQWHUWKHQHZXVHU
QDPH
 &KRRVH  4

 (QWHUWKHUHTXLUHGGDWDLQWRWKH
ILHOGV<RXFDQDOZD\VFRPHEDFN
DQGFKDQJHWKHGDWDODWHU
 &KRRVHWKH/RJRQGDWDWDE

7KHEXWWRQ2WKHUFRPPXQLFDWLRQž
OLQNV\RXWRWKHFHQWUDODGGUHVV
DGPLQLVWUDWLRQIXQFWLRQDOLW\7KLV
IXQFWLRQDOLW\LVQRWFRYHUHGLQWKLV
Tip
ERRN

Release 4.6A/B
4–7
Chapter 4: User Administration
Creating a New User (Client-Specific)

 (QWHUDQ,QLWLDOSDVVZRUG IRU
H[DPSOHinit)ZKLFKWKHXVHU
XVHVIRUWKHILUVWORJRQ'XULQJWKDW
ILUVWORJRQWKHXVHUFKRRVHVDQHZ
SDVVZRUG
 5HHQWHUWKHSDVVZRUGWRYHULI\WKH 10
VSHOOLQJLQWKHILHOG5HSHDWSDVVZRUG
 <RXPD\HGLWRWKHU/RJRQGDWD 7
ILHOGVVXFKDV8VHUJURXSRU8VHU 8
W\SHDVQHHGHG VHHWKH7HFK7DON
EHORZ 
9
 &KRRVHWKH'HIDXOWVWDE

/RJRQ'DWD)LHOG'HILQLWLRQV

8VHUJURXSIRUDXWKRUL]DWLRQFKHFN
$VVLJQLQJXVHUVWRJURXSVDOORZVWKHXVHUPDLQWHQDQFHWDVNWREHGLVWULEXWHGDPRQJVHYHUDO
XVHUDGPLQLVWUDWRUV<RXFDQDVVLJQXVHUVWRRQHRUPRUHXVHUJURXSV
9DOLGIURP9DOLGWR
7KHVHILHOGVDUHXVHIXOLI\RXDUHFUHDWLQJDWHPSRUDU\XVHUVXFKDVDFRQWUDFWRU7R
LPPHGLDWHO\DFWLYDWHWKHXVHUOHDYHWKH9DOLGIURPILHOGEODQN)RUDXVHUZLWKQRDQWLFLSDWHG
WHUPLQDWLRQGDWHOHDYHWKH9DOLGWRILHOGEODQNZKLFKDOORZVLQGHILQLWHDFFHVV
$FFRXQWLQJQXPEHU
7KLVILHOGLVIRUDIUHHO\VHOHFWDEOHDFFRXQWLQJQDPHRUQXPEHU,I\RXXVHWKH6$3DFFRXQWLQJ
V\VWHPWKHXVHU·VV\VWHPXVDJHLVDVVLJQHGWRWKLVDFFRXQW7KHDFFRXQWLQJQDPHRUQXPEHU
PD\EHXQLTXHWRHDFKXVHURUFDQEHVKDUHGDPRQJJURXSVRIXVHUV
&RVW&HQWHU
8VHWKLVILHOGIRUWKHXVHU·VFRVWFHQWHUQXPEHU
'LDORJ
6HOHFWWKLVXVHUW\SHIRUQRUPDOGLDORJXVHUV
%'&
:KHQ\RXSURFHVVDEDWFKLQSXWVHVVLRQVHOHFWWKLVXVHUW\SHIRUXVHUVZKRDUHRQO\XVHGIRU
WKHDXWKRUL]DWLRQFKHFN

Authorizations Made Easy


4–8
Chapter 4: User Administration
Creating a New User (Client-Specific)

%DFNJURXQG
6HOHFWWKLVXVHUW\SHIRUXVHUVZKRDUHDXWKRUL]HGWRH[HFXWHEDWFKUXQV
&3,&
6HOHFWWKLVXVHUW\SHIRUXVHUVZKRDUHDXWKRUL]HGWRH[HFXWH&3,&FDOOV

 <RXPD\HLWKHUHQWHUD6WDUW0HQX 17
RUOHDYHWKHILHOGEODQN
 (QWHUDODQJXDJHFRGHLQWKH/RJRQ
ODQJXDJHILHOG
 (QWHUDGHIDXOW2XWSXW'HYLFH WKH
SULQWHURUILOHWRZKLFKWKHXVHUZLOO
DXWRPDWLFDOO\SULQW 
11
 :HUHFRPPHQGVHOHFWLQJ2XWSXW
12
LPPHGLDWHO\DQG'HOHWHDIWHURXWSXW
2XWSXWLPPHGLDWHO\UHOHDVHVVSRRO
UHTXHVWV2WKHUZLVHVSRROUHTXHVWV 13
VWD\LQWKHVSRROV\VWHPXQWLO 14 15
PDQXDOO\UHOHDVHG7KH'HOHWHDIWHU
RXWSXWRSWLRQSUHYHQWVVSRRO
UHTXHVWVIURPEHLQJUHWDLQHGDIWHU
SULQWLQJ
 6HOHFWWKHGHVLUHG'HFLPDOQRWDWLRQ
DQG'DWHIRUPDW
 &KRRVH 

)RUHDFKXVHUILHOGGHIDXOWVRUSDUDPHWHUVVWRUHGHIDXOWYDOXHVIRU5ILHOGV:KHQDILHOGLV
GLVSOD\HGWKHSDUDPHWHU·VYDOXH LIDQ\ LVDGHIDXOWYDOXH8VHUSDUDPHWHUVDUHRSWLRQDODQG
GRQRW\HWQHHGWREHGHILQHG

7RDVVLJQDQDXWKRUL]DWLRQSURILOHWR\RXUQHZXVHUPDVWHUUHFRUG
 6HOHFWDXVHUUROHWHPSODWHRUFUHDWHDQDFWLYLW\JURXS\RXUVHOI
 *HQHUDWHDXWKRUL]DWLRQSURILOHVIRUWKHDFWLYLW\JURXSV
 $VVLJQDFWLYLW\JURXSVWRQHZXVHUVDQGWUDQVIHUSURILOHV
)RUPRUHLQIRUPDWLRQDERXWWUDQVSRUWLQJXVHUPDVWHUUHFRUGVVHHFKDSWHU3UHSDULQJWKH5
(QYLURQPHQWIRU*R/LYH

Release 4.6A/B
4–9
Chapter 4: User Administration
Changing a User’s Password

&KDQJLQJD8VHU·V3DVVZRUG

8VHUVFDQFKDQJHWKHLURZQSDVVZRUGVDQGDGPLQLVWUDWRUVFDQFKDQJHDQ\XVHU·VSDVVZRUG
8VHUVPD\RQO\FKDQJHWKHLUSDVVZRUGVRQFHDGD\KRZHYHUDQDGPLQLVWUDWRUFDQFKDQJH
SDVVZRUGVZKHQHYHUUHTXLUHG$QDGPLQLVWUDWRUPD\QHHGWRFKDQJHSDVVZRUGVDIWHUD
QHZLQVWDOODWLRQ ZKHQWKHGHIDXOWSDVVZRUGVKRXOGEHFKDQJHGIRUVHFXULW\SXUSRVHV RU
ZKHQXVHUVORVHRUIRUJHWWKHLUSDVVZRUGV:KHQDQDGPLQLVWUDWRUFKDQJHVDSDVVZRUGWKH
QHZSDVVZRUGLVRQO\WHPSRUDU\$WWKHQH[WORJRQWKHXVHUHQWHUVWKLVSDVVZRUGDQGWKHQ
VHOHFWVDSHUPDQHQWRQH5HIHUWRWKHWDEOH3DVVZRUG5HTXLUHPHQWVRQWKHQH[WSDJHIRU
SDVVZRUGUHTXLUHPHQWV

,I\RXGRQRWXVH&HQWUDO8VHU$GPLQLVWUDWLRQWKHXVHUVDUHFOLHQWVSHFLILF%HIRUH
SURFHHGLQJEHVXUHWKDW\RXDUHORJJHGRQWRWKH6$3FOLHQWWKDWFRQWDLQVWKHXVHUZKRVH
SDVVZRUG\RXZDQWWRFKDQJH

 7RFKDQJHDXVHU·VSDVVZRUGLQWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSU01DQGFKRRVH(QWHU RUFKRRVH
7RROV→$GPLQLVWUDWLRQ→8VHUPDLQWHQDQFH→8VHUV 

 ,Q8VHUHQWHUWKHQDPHRIWKHXVHU
ZKRVHSDVVZRUG\RXZRXOGOLNHWR
FKDQJH 3
 &KRRVH 

 (QWHUWKHQHZLQLWLDOSDVVZRUG IRU
4
H[DPSOHinit DQGUHHQWHUWKH
SDVVZRUGIRUYHULILFDWLRQLQWKH
QH[WOLQH 5
 &KRRVH &RS\WRFKDQJHWKH
SDVVZRUG

Authorizations Made Easy


4–10
Chapter 4: User Administration
Changing a User’s Password

3DVVZRUG5HTXLUHPHQWV
7KHIROORZLQJWDEOHOLVWVWKHSDVVZRUGUHTXLUHPHQWV$GGLWLRQDOO\LWZLOOKHOS\RX
GHWHUPLQHLIWKHVHUHTXLUHPHQWVFDQEHFXVWRPL]HG$SSHQGL[&DOVROLVWVLPSRUWDQWV\VWHP
SURILOHSDUDPHWHUVWRFXVWRPL]HSDVVZRUGVHWWLQJV

3DVVZRUG5HTXLUHPHQWV 'HIDXOW 2SWLRQV


0LQLPXPOHQJWKLVWKUHHFKDUDFWHUV 0LQLPXPOHQJWKFDQ
EHLQFUHDVHG
([SLUDWLRQ 3DVVZRUGPXVW 1XPEHURIGD\VDIWHU
QRWEHFKDQJHG ZKLFKDSDVVZRUG
PXVWEHFKDQJHGFDQ
EHVHW
3DVVZRUGPD\QRWEHVHWWRDQ\YDOXH 1RSDVVZRUGV &DQEHFXVWRPL]HG
LQDORFNRXWOLVW DUHEORFNHG
RWKHUWKDQ3$66
DQG6$3
)LUVWFKDUDFWHUPD\QRWEHDQ )L[HGLQWKH5
H[FODPDWLRQSRLQW  RUTXHVWLRQPDUN 6\VWHP
" 
)LUVWWKUHHFKDUDFWHUVPD\QRWDSSHDULQ )L[HGLQWKH5
WKHVDPHVHTXHQFHLQWKHXVHU,' 6\VWHP
)LUVWWKUHHFKDUDFWHUVPD\QRWEH )L[HGLQWKH5
LGHQWLFDO 6\VWHP
6SDFHFKDUDFWHUQRWDOORZHGZLWKLQILUVW )L[HGLQWKH5
WKUHHFKDUDFWHUV 6\VWHP
3DVVZRUGPD\QRWEHPASSRUSAP* )L[HGLQWKH5
6\VWHP
$Q\NH\ERDUGFKDUDFWHULVDOORZHGLQD )L[HGLQWKH5
SDVVZRUG3DVVZRUGVDUHQRWFDVH 6\VWHP
VHQVLWLYHQRGLVWLQFWLRQLVPDGH
EHWZHHQXSSHUDQGORZHUFDVHOHWWHUV
8VHUVFDQFKDQJHWKHLUSDVVZRUGVRQO\ )L[HGLQWKH5
RQFHDGD\7KLVUHVWULFWLRQGRHVQRW 6\VWHP
DSSO\WRXVHUDGPLQLVWUDWRUV
$SDVVZRUGPD\QRWEHFKDQJHGEDFN )L[HGLQWKH5
WRDXVHU·VSUHYLRXVILYHSDVVZRUGV 6\VWHP
7KLVUHVWULFWLRQGRHVQRWDSSO\WRXVHU
DGPLQLVWUDWRUV

Release 4.6A/B
4–11
Chapter 4: User Administration
User Information System

8VHU,QIRUPDWLRQ6\VWHP

,QWKH8VHU,QIRUPDWLRQ6\VWHP\RXKDYHWKHRSWLRQWRUXQGLIIHUHQWUHSRUWVWRREWDLQ
LQIRUPDWLRQRQDOOUHODWHGGDWDFRQFHUQLQJXVHUV7KHVHUHSRUWVDUHDOOLQWHJUDWHGLQWKH
PHQXWUHHDQGFDQEHVWDUWHGGLUHFWO\IURPWKHUH
,QIRUPDWLRQLVDYDLODEOHIRUWKHIROORZLQJFDWHJRULHV
< 8VHU
< 3URILOHV
< $XWKRUL]DWLRQREMHFWV
< $XWKRUL]DWLRQV
< $FWLYLW\JURXSV
< 7UDQVDFWLRQV
< &RPSDULVRQV
< :KHUHXVHGOLVW
< &KDQJHGRFXPHQWV
5HWULHYLQJWKHLQIRUPDWLRQLVEDVLFDOO\WKHVDPHIRUDOOFDWHJRULHV,QWKHIROORZLQJH[DPSOH
ZHGHPRQVWUDWHKRZLWZRUNV7RJHWLQIRUPDWLRQIRUDGLIIHUHQWFDWHJRU\UXQWKH
FRUUHVSRQGLQJUHSRUWZLWK\RXUVSHFLILFUHTXLUHPHQWV

Authorizations Made Easy


4–12
Chapter 4: User Administration
User Information System

([DPSOH)LQGRXWZKLFKXVHUVDUHDOORZHGWRUXQDVSHFLILFWUDQVDFWLRQ

 ,QWKH6$3VWDQGDUGPHQXFKRRVH7RROV→$GPLQLVWUDWLRQ→8VHUPDLQWHQDQFH→,QIRUPDWLRQ6\VWHP,Q
WKLVPHQXDUHDWKHUHDUHVHYHUDOGLIIHUHQWUHSRUWVWRFKRRVHIURP7RVHHZKLFKXVHUVDUHDOORZHGWRUXQ
DSDUWLFXODUWUDQVDFWLRQ\RXPD\FKRRVHDQ\WUDQVDFWLRQFRGH\RXDUHLQWHUHVWHGLQ

 ,QWKH,QIRUPDWLRQ6\VWHPPHQX
DUHDGRXEOHFOLFN%\WUDQVDFWLRQ
DXWKRUL]DWLRQV

 (QWHUDWUDQVDFWLRQFRGHWR
GHWHUPLQHZKLFKXVHUVKDYHDFFHVV
WRWKDWWUDQVDFWLRQ IRUH[DPSOH
FB01  4

 &KRRVH WRVWDUWWKHUHSRUW 3

 $WDEOHDSSHDUVOLVWLQJDOOWKHXVHUV 6
DOORZHGWRUXQWKDWWUDQVDFWLRQ
 &KRRVH LI\RXZLVKWRUHWXUQ
DQGUHYLHZDGLIIHUHQWWUDQVDFWLRQ
FRGH 5 ;;;;;;;

Release 4.6A/B
4–13
Chapter 4: User Administration
User Information System

Authorizations Made Easy


4–14
&KDSWHU 8VHU5ROH7HPSODWHV 

&RQWHQWV

Overview ..................................................................................................................5–2
What Are User Role Templates? ...........................................................................5–2
User Menu................................................................................................................5–2
How to Work with User Role Templates ...............................................................5–3
Tips for an Administrator .....................................................................................5–35
Available User Role Templates............................................................................5–40

5–1
Chapter 5: User Role Templates
Overview

2YHUYLHZ

,QWKLVFKDSWHUZHGHVFULEHKRZWRZRUNZLWKXVHUUROHWHPSODWHVDQGVHWXS\RXUDFWLYLW\
JURXSV)RUPRUHLQIRUPDWLRQRQKRZWRZRUNZLWKWKHDFWLYLW\JURXSVDQGXVHUUROH
WHPSODWHVZLWKWKH3URILOH*HQHUDWRU 3* VHHFKDSWHU$GYDQFHG3URILOH*HQHUDWRU
)XQFWLRQDOLW\

:KDW$UH8VHU5ROH7HPSODWHV"

6$3GHOLYHUVPRUHWKDQXVHUUROHWHPSODWHV IRUPHUO\NQRZQDVSUHGHILQHGDFWLYLW\
JURXSV ZKLFKFDQEHGLUHFWO\DVVLJQHGWRXVHUV7KHVHXVHUUROHWHPSODWHVFRQVLVWRI
FRPSRVLWHDFWLYLW\JURXSVRUVLQJOHDFWLYLW\JURXSVZKLFKDUHSUHGHILQHGZLWKWUDQVDFWLRQV
DQGDXWKRUL]DWLRQV7KHVHDFWLYLW\JURXSVDUHFUHDWHGE\DSSOLFDWLRQFRQVXOWDQWVLQ
FRQMXQFWLRQZLWKFXVWRPHUVWRIXOILOOWKHPRVWVWULQJHQWUHTXLUHPHQWV8VHUUROHVDUH
DVVLJQHGLQGLYLGXDOXVHUV:KHQXVHUVORJRQWRWKH56\VWHPWKH\RQO\VHHWKHSDUWRIWKH
6$3PHQXZKLFKLVUHTXLUHGWRIXOILOOWKHLUUROHWDVNV7KLVLQGLYLGXDOPHQXLVFDOOHGWKH
XVHUPHQX8VHUVFDQDUUDQJHWKHVWUXFWXUHRIWKHLUPHQXDQGKDYHWKHRSWLRQWRDGG
IUHTXHQWO\XVHGWUDQVDFWLRQVWRDSHUVRQDOIDYRULWHVIROGHU7KH\FDQDOVRDGGZHEOLQNVDQG
OLQNVWRORFDOGRFXPHQWVIRUH[DPSOH0LFURVRIW:RUGRU([FHOILOHV
7RZRUNZLWKWKHVHXVHUUROHWHPSODWHVXVHWKHWUDQVDFWLRQ3)&*ZKLFKLVNQRZQDVWKH
3URILOH*HQHUDWRU 3* 7KHXVHUUROHWHPSODWHVDUHVWDQGDUGGHOLYHUHGDFWLYLW\JURXSVILOOHG
ZLWKGDWD$OO6$3GHOLYHUHGXVHUUROHWHPSODWHVVWDUWZLWK6$3Bž$FWLYLW\JURXSVDUH
XVHGE\WKH3*WRJHQHUDWHDXWKRUL]DWLRQSURILOHV7KHILUVWSULRULW\LVWRVHOHFWWUDQVDFWLRQV
DQGUHSRUWV7KLVLQIRUPDWLRQ WUDQVDFWLRQVFRGHVPHQXSDWKVUHSRUWQDPHVHWF LVVDYHG
LQDQDFWLYLW\JURXSZKLFKVHUYHVDVDGDWDEDVHWRKHOSWKH3*GHWHUPLQHWKHQHFHVVDU\
DXWKRUL]DWLRQVDQGJHQHUDWHWKHSURILOH V 
<RXPD\VHWXSDVPDQ\DFWLYLW\JURXSVDV\RXUFRPSDQ\UHTXLUHV$VLQJOHDFWLYLW\ D
WUDQVDFWLRQUHSRUWRUWDVN FDQEHLQFOXGHGLQPDQ\GLIIHUHQWDFWLYLW\JURXSVDQGDQ
DFWLYLW\JURXSFDQLQFOXGHDVPDQ\VLQJOHDFWLYLWLHVDVQHHGHG
7RVDYHWLPH6$3SURYLGHVXVHUUROHWHPSODWHVVR\RXGRQRWKDYHWRFUHDWHDOODFWLYLW\
JURXSVRQ\RXURZQ+RZHYHU\RXPD\VWLOOFUHDWH\RXURZQDFWLYLW\JURXSVRUPRGLI\WKH
RQHV6$3GHOLYHUV

8VHU0HQX

8VHUVRQO\VHHWKHWUDQVDFWLRQVWKH\DUHDOORZHGWRH[HFXWHLQWKHV\VWHP³WKRVHGHILQHGLQ
WKHDFWLYLW\JURXSDVVLJQHGWRWKHP
,QWKHIROORZLQJH[DPSOHWKHXVHUPHQXIRUWKHXVHUUROHWHPSODWH´4XDOLW\0DQDJHUµLV
VKRZQ7KH6$3(DV\$FFHVVPHQXVHUYHVDVWKHLQGLYLGXDOL]HGXVHUPHQX7KHPHQX

Authorizations Made Easy


5–2
Chapter 5: User Role Templates
How to Work with User Role Templates

VWUXFWXUHLVH[DFWO\ZKDWWKH4XDOLW\0DQDJHUVHHVZKHQORJJHGRQWR5,QRXUH[DPSOH
ZHKDYHDVVLJQHGRQO\RQHDFWLYLW\JURXSRIFRXUVH\RXFDQDVVLJQPDQ\PRUH


An example user menu using the user role template SAP_BC_CAT_QUALITYMANAGER_AG

<RXFDQVWLOOVZLWFKWRWKHFRPSOHWH6$3VWDQGDUGPHQXXVLQJ WKRXJKWKHXVHULVQRW
DXWKRUL]HGWRUXQHYHU\WUDQVDFWLRQLQWKHVWDQGDUGPHQX7RUHWXUQWRWKHXVHUPHQX
FKRRVH 

+RZWR:RUNZLWK8VHU5ROH7HPSODWHV

7KHUHDUHGLIIHUHQWPHWKRGVWRZRUNZLWKXVHUUROHWHPSODWHV<RXPD\HLWKHU
< 8VHWKH6$3SURYLGHGXVHUUROHWHPSODWHVDVLV
< &RS\DQGPRGLI\WKH6$3SURYLGHGXVHUUROHWHPSODWHV
< &UHDWH\RXURZQXVHUUROHWHPSODWHV
,QWKHIROORZLQJVHFWLRQVZHH[SODLQHDFKRSWLRQDQGSURYLGHWKHEDVLFNQRZOHGJH\RXQHHG
WRZRUNZLWKXVHUUROHWHPSODWHV,I\RXQHHGPRUHDGYDQFHGLQIRUPDWLRQRQKRZWRZRUN
ZLWKWKHXVHUUROHWHPSODWHVUHIHUWRFKDSWHU$GYDQFHG3URILOH*HQHUDWRU)XQFWLRQDOLW\
7KHWRROXVHGWRZRUNZLWKWKHXVHUUROHWHPSODWHVDQGDFWLYLW\JURXSVUHVSHFWLYHO\LVWKH
3URILOH*HQHUDWRU 3* 8VHWKHWUDQVDFWLRQPFCGIRUWKH3*

Release 4.6A/B
5–3
Chapter 5: User Role Templates
How to Work with User Role Templates

6WDUWLQJ$FWLYLW\*URXS0DLQWHQDQFH 3)&*
6WDUWWKH3URILOH*HQHUDWRU 3* E\RQHRIWKHIROORZLQJPHWKRGVIURPWKH6$3(DV\$FFHVV
VFUHHQ
< &KRRVH &UHDWH0HQX
< (QWHUWKHWUDQVDFWLRQPFCGLQWKH&RPPDQGILHOGDQGFKRRVH(QWHU
< &KRRVH7RROV→$GPLQLVWUDWLRQ→8VHUPDLQWHQDQFH→3)&*¥$FWLYLW\JURXSV
7KHQ\RXFDQVWDUWZRUNLQJZLWKWKHXVHUUROHWHPSODWHV

8VLQJWKH6$33URYLGHG8VHU5ROH7HPSODWHV
7RXVHWKH6$3SURYLGHGXVHUUROHWHPSODWHVMXVWDVVLJQWKHXVHUUROHWHPSODWHWRDXVHU
:KHQWKDWXVHUORJVRQWRWKHV\VWHPDVSHFLILFXVHUUROHPHQXDSSHDUV
7RDVVLJQXVHUUROHWHPSODWHV\RXKDYHWZRRSWLRQV
< 8VHWKH3*VHOHFWWKHGHVLUHGDFWLYLW\JURXSJHQHUDWHLWDVVLJQLWWRDXVHUDQGGRD
XVHUFRPSDUH7KHIROORZLQJH[DPSOHH[SODLQVKRZWRDVVLJQDXVHUUROHWHPSODWHXVLQJ
WKH3*
< 8VHWKHXVHUPDLQWHQDQFHWUDQVDFWLRQ68WRDVVLJQWKHGHVLUHGXVHUUROHWHPSODWHVWRD
VSHFLILFXVHU6HHFKDSWHU$VVLJQLQJ$FWLYLW\*URXSV

([DPSOH
+RZWRDVVLJQDXVHUUROHWHPSODWHWRDXVHUIRUH[DPSOHWKH4XDOLW\0DQDJHUXVLQJWKH3URILOH
*HQHUDWRU

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 2QWKH$FWLYLW\*URXS0DLQWHQDQFH
VFUHHQXVHSRVVLEOHHQWULHVWRVHOHFW
WKHGHVLUHGDFWLYLW\JURXSLQWKH
$FWLYLW\JURXSILHOG IRUH[DPSOH 2
6$3B%&B&$7B4XDOLW\PDQDJHUB$*  3
 &KRRVH &KDQJH

Tip

<RXKDYHWKHRSWLRQWRDVVLJQVLQJOH
DFWLYLW\JURXSVRUFRPSRVLWHDFWLYLW\
JURXSVWKDWFDQFRQWDLQPXOWLSOHDFWLYLW\
JURXSV

Authorizations Made Easy


5–4
Chapter 5: User Role Templates
How to Work with User Role Templates

 &KRRVHWKH0HQXWDEWRUHYLHZWKH
WUDQVDFWLRQVDVVLJQHGWRWKLVDFWLYLW\
JURXS

,QWKH6$3GHOLYHUHGDFWLYLW\JURXSV
\RXDOZD\VVHHDQ$FWLYLW\JURXS Tip
GHVFULSWLRQRIWKHFRQWHQWIRUWKHVHOHFWHG
DFWLYLW\JURXS<RXFDQDOVRDGG\RXU
RZQGHVFULSWLRQ

 7KHHQGXVHUZLOOVHHWKHIROGHUVDQG
WUDQVDFWLRQVDVWKH\DSSHDULQWKH
$FWLYLW\JURXSPHQX
 <RXFDQFKDQJHWKHRUGHURIDQ\
LWHPE\VHOHFWLQJLWDQGXVLQJ DQG
WRPRYHLWXSDQGGRZQ 7
6
 6HOHFWWKH$XWKRUL]DWLRQVWDEWR
JHQHUDWHWKLVDFWLYLW\JURXS
5

7KHUHGOLJKW RQWKH$XWKRUL]DWLRQV
WDELQGLFDWHVWKHSURILOHLVQRWJHQHUDWHG
\HW

Release 4.6A/B
5–5
Chapter 5: User Role Templates
How to Work with User Role Templates

 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD

 7RJHQHUDWHWKHDXWKRUL]DWLRQ
10
SURILOH FKRRVH .
 &KRRVH  9

Authorizations Made Easy


5–6
Chapter 5: User Role Templates
How to Work with User Role Templates

 &KRRVHWKH8VHUWDEWRDVVLJQDXVHU
WRWKLVDFWLYLW\JURXS

11
7KHUHGOLJKW RQWKH8VHUWDE
LQGLFDWHVWKDWQRXVHULVDVVLJQHG\HW

6WDWXV'LVSOD\RQWKH7DE
7KHVWDWXVGLVSOD\RQWKHWDELQGLFDWHVLIDXVHULVDOUHDG\DVVLJQHGWRDQDFWLYLW\JURXS
8VHU²*UHHQ$WOHDVWRQHXVHULVDVVLJQHGWRWKHJURXS
8VHU²5HG1RXVHUVDUHDVVLJQHG
8VHU²<HOORZ$OWKRXJKXVHUVKDYHEHHQDVVLJQHGWRWKHDFWLYLW\JURXSWKHXVHU
PDVWHUUHFRUGFRPSDULVRQLVQRWFXUUHQW
,IWKHDFWLYLW\JURXSLVDFRPSRVLWHDFWLYLW\JURXSWKHVWDWXVGLVSOD\RQO\LQGLFDWHV
ZKHWKHUXVHUVDUHDVVLJQHGWRWKHDFWLYLW\JURXS

Release 4.6A/B
5–7
Chapter 5: User Role Templates
How to Work with User Role Templates

 ,QWKH8VHU,'ILHOGVHOHFWWKH
GHVLUHGXVHUE\HLWKHUHQWHULQJWKH
QDPHGLUHFWO\RUXVLQJSRVVLEOH
HQWULHV<RXPD\VHOHFWPXOWLSOH
HQWULHVIURPWKHOLVW

13

12
7KH8VHUQDPHLVDXWRPDWLFDOO\HQWHUHG
LQWKHVHFRQGFROXPQQH[WWRWKHXVHU
,',QWKHWZRDGGLWLRQDOFROXPQV )URP
WR \RXFDQVSHFLI\DYDOLGLW\SHULRGIRU
WKHDVVLJQPHQW<RXFDQGHOHWHWKHXVHU
,'VE\XVLQJ DQGLQVHUWDQDGGLWLRQDO
RQHLQIURQWRIDVHOHFWHGXVHU,'XVLQJ

7RJHWDGGLWLRQDOLQIRUPDWLRQRQ
DVVLJQLQJXVHUVDQGWLPHGHSHQGHQF\
FKRRVH 
 $IWHUHQWHULQJDOOXVHUVVHOHFW
8VHUFRPSDUH

2QWKH&RPSDUH8VHU0DVWHU5HFRUGRI
14
$FWLYLW\*URXSVFUHHQQRWHWKHVWDWXVRI
WKHXVHUPDVWHUUHFRUG,WVD\V8VHU
PDVWHUUHFRUGKDVQRW\HWEHHQFRPSOHWHO\
FRPSDUHG7KHUHIRUHSHUIRUPFRPSOHWH
FRPSDUHLQVWHS
 &KRRVH &RPSOHWHFRPSDUH

Authorizations Made Easy


5–8
Chapter 5: User Role Templates
How to Work with User Role Templates

 7KHXVHULVQRZDVVLJQHGWRWKH
DFWLYLW\JURXS:KHQORJJLQJRQWR
5WKHXVHUZLOOVHHDVSHFLILFXVHU
PHQXZLWKRQO\WKRVHWUDQVDFWLRQV
IURPWKHVHOHFWHGDFWLYLW\JURXS

7KHSURFHVVLVQRZFRPSOHWH

15

:KHQWKHXVHU)7$<(+ORJVLQWKH
VFUHHQWRWKHULJKWDSSHDUVDIWHUDQ
DFWLYLW\JURXS IRUH[DPSOH
6$3B%&B&$7B48$/,7<0$1$*(5B
$* KDVEHHQDVVLJQHGWR)7$<(+
$V\RXFDQVHHWKHPHQXLVVLPLODUWR
WKHRQHFUHDWHGLQWKH3*

Release 4.6A/B
5–9
Chapter 5: User Role Templates
How to Work with User Role Templates

&RS\LQJDQG0RGLI\LQJ6$33URYLGHG8VHU5ROH7HPSODWHV
,I\RXDUHQRWFRPSOHWHO\VDWLVILHGZLWKWKHFRQWHQWRIDQ6$3GHOLYHUHGXVHUUROHWHPSODWH
\RXFDQPRGLI\WKHWHPSODWH:HUHFRPPHQGWKDW\RXILUVWFRS\WKHDFWLYLW\JURXSDQGWKHQ
PDNHDQ\FKDQJHVWRWKHQHZO\FUHDWHGFRS\&RS\LQJILUVWHQVXUHVWKDW\RXNHHSWKH
RULJLQDO6$3WHPSODWHLQWDFW'RFXPHQWWKHFKDQJHV\RXPDNHWRWKHVWDQGDUG
,QWKLVVHFWLRQZHVKRZ\RXKRZWRFRS\DQH[LVWLQJDFWLYLW\JURXSPRGLI\LWDQGDVVLJQLW
WRDXVHU
,I\RXZDQWDGYDQFHGLQIRUPDWLRQRQKRZWRZRUNWKHFRPSOHWH3*IXQFWLRQDOLW\VHH
FKDSWHU$GYDQFHG3URILOH*HQHUDWRU)XQFWLRQDOLW\

([DPSOH

7KHIROORZLQJH[DPSOHGHPRQVWUDWHVKRZWRFRS\DQGUHQDPHWKHXVHUUROHWHPSODWHIRU
WKH$FFRXQWV3D\DEOH$FFRXQWDQW ZHZLOOXVH´$FFRXQWV3D\DEOH$FFRXQWDQWµYDULDQW 
:HDVVXPHWKDWRQO\RQHFRPSDQ\FRGHZLOOEHXVHGVRZHGHOHWHWKHIROGHU&URVV
&RPSDQ\&RGH7UDQVDFWLRQDVZHOODV%LOORI([FKDQJHDQG5HMHFW3DUNHG'RFXPHQWV
)XUWKHUPRUHZHDGGWZRWUDQVDFWLRQV³05+5(QWHU,QYRLFHDQG05+*(QWHU&UHGLW
0HPR³LQWRWKHIROGHU,QYRLFHFUHGLWPHPR)LQDOO\ZHDVVLJQWKHQHZDFWLYLW\JURXS
),B$3B$&&2817$17B9$5,$17B$*WRDXVHUXVLQJWKH3*DQGGHPRQVWUDWHZKDWWKLV
XVHULVJRLQJWRVHHZKHQORJJLQJRQWR5

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 2QWKH$FWLYLW\*URXS0DLQWHQDQFH
VFUHHQXVHSRVVLEOHHQWULHVWRVHOHFW 3
WKHGHVLUHGDFWLYLW\JURXSLQWKH
$FWLYLW\JURXSILHOG IRUH[DPSOH 2
6$3B),B$3B$&&2817$17B$* 
 &KRRVH WRFRS\WKHDFWLYLW\
JURXS

 (QWHUDQDPHIRUWKHQHZDFWLYLW\
4
JURXS
5
 &KRRVH &RS\VHOHFWLYHO\WRGHFLGH
ZKDWREMHFWV\RXZRXOGOLNHWRFRS\
ZLWKWKHDFWLYLW\JURXS

Authorizations Made Easy


5–10
Chapter 5: User Role Templates
How to Work with User Role Templates

 &KRRVH ZLWKRXWVHOHFWLQJ
DQ\WKLQJ<RXVKRXOGFRS\WKH
DFWLYLW\JURXSZLWKRXWWKHXVHU
DVVLJQPHQW

 &KRRVH &KDQJHWRPRGLI\WKHQHZ
DFWLYLW\JURXS

 (QWHUDVKRUWGHVFULSWLRQIRU\RXU
QHZDFWLYLW\JURXSLQWKH'HVFULSWLRQ
ILHOG
 8QGHU$FWLYLW\JURXSGHVFULSWLRQ
HQWHUDIUHHWH[WGHVFULSWLRQ
 &KRRVHWKH0HQXWDE 8
10

Release 4.6A/B
5–11
Chapter 5: User Role Templates
How to Work with User Role Templates

1RZ\RXVHHWKHPHQXRIWKH
RULJLQDODFWLYLW\JURXSLQWKHQHZ
DFWLYLW\JURXS2SHQWKHGHVLUHG
IROGHUZKHUH\RXZDQWWRPRGLI\RU
GHOHWHWUDQVDFWLRQV,QRXUH[DPSOH
ZHZRXOGOLNHWRGHOHWHWUDQVDFWLRQ
)%9DQGWKHIROGHUV&URVVFRPSDQ\
FRGHWUDQVDFWLRQDQG%LOORIH[FKDQJH
12
XQGHUWKH3D\PHQWDQGFOHDULQJQRGH
 6HOHFW)%9¥5HMHFW
 7RGHOHWHWKHWUDQVDFWLRQFKRRVH 

Tip
11
7RGLVSOD\WKHWUDQVDFWLRQFRGHVFKRRVH
,IWKH\DUHWXUQHGRQWKHLFRQ
FKDQJHVWR 

 6HOHFWWKH&URVVFRPSDQ\FRGH
WUDQVDFWLRQOLQHDQGFKRRVH 

13

 6HOHFWWKH%LOORIH[FKDQJHOLQHDQG
FKRRVH 

14

Authorizations Made Easy


5–12
Chapter 5: User Role Templates
How to Work with User Role Templates

 7RLQVHUWDQHZWUDQVDFWLRQFRGH
PDQXDOO\VHOHFWWKHIROGHULQZKLFK
\RXZRXOGOLNHWKDWWUDQVDFWLRQWR
DSSHDUDQGFKRRVH 7UDQVDFWLRQ
IRUH[DPSOHZHZRXOGOLNHWRHQWHU
WKHWUDQVDFWLRQ(QWHU,QYRLFHLQWRWKH
IROGHU,QYRLFHFUHGLWPHPR 
15

 (QWHUWKHWUDQVDFWLRQFRGHLQWRWKH
7UDQVDFWLRQFRGHILHOG,I\RXSUHVV
(QWHUWKHWH[WRIWKHWUDQVDFWLRQFRGH
ZLOODSSHDULQWKH7H[WFROXPQ
 &KRRVH $VVLJQWUDQVDFWLRQVWR
WUDQVIHUWKHWUDQVDFWLRQLQWRWKH
DFWLYLW\JURXSPHQX

17

Release 4.6A/B
5–13
Chapter 5: User Role Templates
How to Work with User Role Templates

,I\RXZRXOGOLNHWRFKDQJHWKHSRVLWLRQ
RIWKHWUDQVDFWLRQLQWKHKLHUDUFK\VHOHFW
WKHWUDQVDFWLRQDQGXVHWKH WR
PRYHWKHWUDQVDFWLRQGRZQRUXS
 ,I\RXGRQRWNQRZWKHWUDQVDFWLRQ 18
FRGHDQGZRXOGUDWKHUVHOHFWWKH
WUDQVDFWLRQIURPWKH6$3PHQX
FKRRVH )URPWKH6$3PHQX

:HUHFRPPHQG\RXVWD\ZLWKRQHRSWLRQ(LWKHUHQWHUWKHWUDQVDFWLRQPDQXDOO\RUHQWHU
LWWKURXJKRQHRIWKHPHQXV 6$3PHQXDFWLYLW\JURXSRUDUHDPHQX ,I\RXFKRRVHWR
HQWHUIURPWKHPHQXWKHPHQXSDWKZLOOEHWUDQVIHUUHGWRWKHDFWLYLW\JURXSPHQXDV
ZHOO

Authorizations Made Easy


5–14
Chapter 5: User Role Templates
How to Work with User Role Templates

 6HOHFWWKHGHVLUHGWUDQVDFWLRQFRGH
LWLVSRVVLEOHWRVHOHFWPRUHWKDQ
RQH 
 &KRRVH 7UDQVIHUWRWUDQVIHUWKH
WUDQVDFWLRQLQWRDFWLYLW\JURXS
PHQX

19

7RVZLWFKWKHWHFKQLFDOQDPHVRQRURII
FKRRVH RU ,I\RXFDQQRWVHHWKH 20
WHFKQLFDOQDPHRIWKHWUDQVDFWLRQVFUROO
WRWKHULJKWZKHUHLWLVVKRZQ
7KHWUDQVDFWLRQLVWUDQVIHUUHGWRWKH
DFWLYLW\JURXSPHQXDQGLQFOXGHV
WKHFRPSOHWHPHQXSDWKIURPWKH
6$3PHQX
 6HOHFWWKHGHVLUHGWUDQVDFWLRQDQG
PRYHLWWRWKHGHVLUHGSRVLWLRQE\
HLWKHU
< 'UDJDQGGURS
< RU
< 0RYHQRGH
,QWKLVH[DPSOHZHXVHGGUDJDQG
GURS

21

Release 4.6A/B
5–15
Chapter 5: User Role Templates
How to Work with User Role Templates

We moved the transaction into the


folder Invoice/credit memo, below the
transaction MRHR-Enter Invoice

 7RGHOHWHWKHOHIWPHQXSDWKIURP
WKHMXVWLQVHUWHGWUDQVDFWLRQVFUROO
GRZQWRWKHPHQXSDWKWKDWEHJLQV
ZLWK6$356\VWHP
 6HOHFWWKHGHVLUHGIROGHUDQGFKRRVH
WRGHOHWHWKHIROGHUDQGWKH
FRPSOHWHVWUXFWXUHEHORZLW
23

22

Authorizations Made Easy


5–16
Chapter 5: User Role Templates
How to Work with User Role Templates

$IWHU\RXILQLVKGHOHWLQJDQG
LQVHUWLQJWUDQVDFWLRQVPDLQWDLQWKH
DXWKRUL]DWLRQVIRUWKHWUDQVDFWLRQVLQ
WKLVDFWLYLW\JURXS
 &KRRVHWKH$XWKRUL]DWLRQVWDE

24

 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD


WRPDLQWDLQWKHDXWKRUL]DWLRQGDWD

,Q ([SHUWPRGHIRUSURILOHJHQHUDWLRQ
\RXFDQVHOHFWH[SOLFLWO\WKHRSWLRQZLWK
ZKLFK\RXZDQWWRPDLQWDLQ
DXWKRUL]DWLRQYDOXHV7KLVRSWLRQLV
DXWRPDWLFDOO\VHWFRUUHFWO\LQQRUPDO
PRGH

25
Tip

Release 4.6A/B
5–17
Chapter 5: User Role Templates
How to Work with User Role Templates

1RZDGMXVWWKHDXWKRUL]DWLRQVWR
\RXUVSHFLILFQHHGV2SHQWKH
GHVLUHGIROGHUDQGFKHFNRUFKDQJH
WKHYDOXHV 26
,QWKLVH[DPSOHZHDUHQRWFKDQJLQJ
DQ\WKLQJEHFDXVHHYHU\WKLQJIURP
WKHFRSLHGDFWLYLW\JURXSLVFRUUHFW
)RUGHWDLOHGLQIRUPDWLRQRQKRZWR
ZRUNZLWKWKHDXWKRUL]DWLRQILHOGV
VHHFKDSWHU$GYDQFHG3URILOH
*HQHUDWRU)XQFWLRQDOLW\
 7RJHQHUDWHWKHSURILOHFKRRVH 

([SODQDWLRQRIWKH7UDIILF/LJKWV
²*UHHQ$OODXWKRUL]DWLRQILHOGVKDYHEHHQPDLQWDLQHG
²5HG2UJDQL]DWLRQDOOHYHOVDUHQRWPDLQWDLQHG
²<HOORZ2SHQDXWKRUL]DWLRQILHOGVH[LVWZLWKRXWYDOXHVWKDWDUHQRWRUJDQL]DWLRQDO
OHYHOV

 7KHV\VWHPVXJJHVWV7LQWHUQDO
QXPEHU!DVWKHGHIDXOWQDPH7KH 27
3URILOHQDPHFDQQRWEHFKDQJHGODWHU
KRZHYHUWKH7H[WFDQ 28
 7RFRQWLQXHFKRRVH 

1DPLQJ&RQYHQWLRQVIRU$XWKRUL]DWLRQ3URILOHVDQG*HQHUDWHG$XWKRUL]DWLRQV
:KHQ\RXVDYH\RXUFKDQJHV\RXDUHSURPSWHGWRHQWHUDSURILOHQDPH+RZHYHURQO\
WKHILUVWFKDUDFWHUV WKHSURILOHWRUVR FDQEHIUHHO\DVVLJQHG7KHQXPEHURISURILOHV
JHQHUDWHGGHSHQGVRQWKHQXPEHURIDXWKRUL]DWLRQVLQHDFKDFWLYLW\JURXS$PD[LPXP
RIDSSUR[LPDWHO\DXWKRUL]DWLRQVFDQILWLQWRDSURILOH,IWKHUHDUHPRUHWKDQ
DXWKRUL]DWLRQVDQDGGLWLRQDOSURILOHLVJHQHUDWHG,WKDVWKHVDPHFKDUDFWHUWRUVRDVWKH
SURILOHQDPHDQGWKHODVWWZRGLJLWVDUHXVHGDVDFRXQWHU
7RDYRLGFRQIOLFWVEHWZHHQFXVWRPHUGHILQHGDQG6$3VXSSOLHGSURILOHVGRQRWXVHDQ\
QDPHZLWKDQXQGHUVFRUH B LQWKHVHFRQGSRVLWLRQ6$3SODFHVQRRWKHUUHVWULFWLRQVRQ
WKHQDPLQJRIDXWKRUL]DWLRQSURILOHV UHIHUDOVRWRQRWH ,I\RXUFRPSDQ\KDVLWV
RZQQDPLQJFRQYHQWLRQV\RXPD\RYHUZULWHSURSRVHGQDPHV
7KHQDPHVRIWKHDXWKRUL]DWLRQVDUHDOVRGHULYHGIURPWKHSURILOHWRUVR7KHODVWWZR
GLJLWVDUHXVHGDVDFRXQWHUZKHQPRUHWKDQRQHDXWKRUL]DWLRQLVUHTXLUHGIRUDQREMHFW

Authorizations Made Easy


5–18
Chapter 5: User Role Templates
How to Work with User Role Templates

'HSHQGLQJRQWKHDXWKRUL]DWLRQSURILOHQDPHWKHWHFKQLFDOQDPHVIRUDXWKRUL]DWLRQVDUH
QDPHGDVIROORZV
< %HJLQZLWKD7
< &RPSULVHDQLQWHUQDOQXPEHU
< (QGZLWKDWZRGLJLWQXPEHUEHWZHHQDQG
6DPSOHDXWKRUL]DWLRQQDPH7

 &KRRVH WRUHWXUQWRWKH&KDQJH 29


$FWLYLW\*URXSVVFUHHQ

$OOWKHWUDQVDFWLRQVDQG
DXWKRUL]DWLRQVIRUWKHDFWLYLW\JURXS
KDYHQRZEHHQFROOHFWHGDQG
JHQHUDWHG7KHQH[WVWHSLVWRDVVLJQ
DXVHUWRWKHDFWLYLW\JURXS
 &KRRVHWKH8VHUWDEWRDVVLJQDXVHU
30

7KHUHGOLJKW RQWKH8VHUWDE
LQGLFDWHVWKDWQRXVHUKDVEHHQDVVLJQHG

Release 4.6A/B
5–19
Chapter 5: User Role Templates
How to Work with User Role Templates

6WDWXV'LVSOD\RQWKH7DE
7KHVWDWXVGLVSOD\RQWKHWDELQGLFDWHVLIDXVHULVDOUHDG\DVVLJQHGWRDQDFWLYLW\JURXS
8VHU²*UHHQ$WOHDVWRQHXVHULVDVVLJQHGWRWKHJURXS
8VHU²5HG1RXVHUVDUHDVVLJQHG
8VHU²<HOORZ$OWKRXJKXVHUVKDYHEHHQDVVLJQHGWRWKHDFWLYLW\JURXSWKHXVHU
PDVWHUUHFRUGFRPSDULVRQLVQRWFXUUHQW
,IWKHDFWLYLW\JURXSLVDFROOHFWLYHDFWLYLW\JURXSWKHVWDWXVGLVSOD\RQO\LQGLFDWHV
ZKHWKHUXVHUVDUHDVVLJQHGWRWKHDFWLYLW\JURXS

 ,QWKH8VHU,'ILHOGVHOHFWWKH
GHVLUHGXVHUE\HLWKHUHQWHULQJWKH
QDPHGLUHFWO\RUXVLQJSRVVLEOH
HQWULHV<RXFDQVHOHFWPXOWLSOH
HQWULHVIURPWKHOLVWDWWKHVDPHWLPH
 ,QWKH)URPDQGWRFROXPQ\RXFDQ
HQWHUWKHGDWHUDQJHIRUKRZORQJ
WKHXVHULVDVVLJQHGWRWKHDFWLYLW\ 33
JURXS
32
 $IWHUHQWHULQJDOOXVHUVVHOHFW 31
8VHUFRPSDUH

7KH8VHUQDPHLVDXWRPDWLFDOO\HQWHUHGLQWKHVHFRQGFROXPQQH[WWRWKHXVHU,',QWKH
WZRDGGLWLRQDOFROXPQV )URPWR \RXFDQVSHFLI\DYDOLGLW\SHULRGIRUWKHDVVLJQPHQW
<RXFDQGHOHWHWKHXVHU,'VE\XVLQJ DQGLQVHUWDQDGGLWLRQDORQHLQIURQWRIDVHOHFWHG
XVHU,'XVLQJ 
)RUDGGLWLRQDOLQIRUPDWLRQRQDVVLJQLQJXVHUVDQGWLPHGHSHQGHQF\FKRRVH 

 &KRRVH &RPSOHWHFRPSDUH

34

Authorizations Made Easy


5–20
Chapter 5: User Role Templates
How to Work with User Role Templates

tip

,I\RXFKRRVH8WLOLWLHV→6HWWLQJVDQG
VHOHFW$XWRPDWLFFRPSDULVRQDWVDYHWKH
XVHUFRPSDUHRFFXUVDXWRPDWLFDOO\
ZKHQ\RXVDYHWKHDFWLYLW\JURXS
 7KHXVHULVQRZDVVLJQHGWRWKH
DFWLYLW\JURXS
:KHQORJJLQJRQWR5WKHXVHU
ZLOOVHHDVSHFLILFXVHUPHQXZLWK
RQO\WKRVHWUDQVDFWLRQVIURPWKH
VHOHFWHGDFWLYLW\JURXS

35

7KLVLVWKHVFUHHQDXVHUVHHVZKHQ
ORJJLQJRQWRWKHV\VWHPDIWHUDQ
DFWLYLW\JURXS IRUH[DPSOH
),B$3B$&&2817$17B9$5,$17B
$* KDVEHHQDVVLJQHGWRWKDWXVHU
$V\RXFDQVHHWKHPHQXORRNVWKH
VDPHDVWKDWFUHDWHGLQWKH3*

Release 4.6A/B
5–21
Chapter 5: User Role Templates
How to Work with User Role Templates

&UHDWH\RXURZQ8VHU5ROH7HPSODWHV
,I\RXQHHGXVHUUROHWHPSODWHVLQDGGLWLRQWRWKHRQHV6$3GHOLYHUV\RXFDQFUHDWH\RXU
RZQDFWLYLW\JURXS
,QWKLVVHFWLRQZHVKRZ\RXKRZWRFUHDWHDQDFWLYLW\JURXSVHOHFWWUDQVDFWLRQFRGHV
JHQHUDWHWKHDXWKRUL]DWLRQVDQGDVVLJQWKHPWRDXVHU
,I\RXZRXOGOLNHDGYDQFHGLQIRUPDWLRQRQKRZWRZRUNWKHFRPSOHWH3*IXQFWLRQDOLW\VHH
FKDSWHU$GYDQFHG3URILOH*HQHUDWRU)XQFWLRQDOLW\

([DPSOH
,QWKHIROORZLQJH[DPSOHZHGHPRQVWUDWHKRZWRFUHDWHDQHZDFWLYLW\JURXSDQG
WKHUHIRUHWKHXVHUUROHWHPSODWHIRUDGDWDHQWU\FOHUN$WWKHHQGZHDVVLJQWKHQHZ
DFWLYLW\JURXSZKLFKZHQDPH),B$3B'$7$B(175<B&/(5.B$*WRDXVHUZLWKWKH3*
DQGGHPRQVWUDWHZKDWWKLVXVHULVJRLQJWRVHHZKHQORJJLQJRQWR5

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 ,QWKH$FWLYLW\JURXSILHOGHQWHUWKH
QDPHIRUWKHQHZDFWLYLW\JURXS IRU
H[DPSOHFI_AP_DATA_ENTRY_
CLERK  2

 7RFUHDWHWKHQHZDFWLYLW\JURXS 3
FKRRVH &UHDWH

Tip

<RXKDYHWKHRSWLRQWRDVVLJQVLQJOH
DFWLYLW\JURXSVRUFRPSRVLWHDFWLYLW\
JURXSVZKLFKFDQFRQWDLQPXOWLSOH
DFWLYLW\JURXSV6HH&UHDWLQJ&RPSRVLWH
$FWLYLW\*URXSVRQSDJH²

Authorizations Made Easy


5–22
Chapter 5: User Role Templates
How to Work with User Role Templates

 ,Q'HVFULSWLRQHQWHUDVKRUW
GHVFULSWLRQ
 8QGHU$FWLYLW\JURXSGHVFULSWLRQ
HQWHUDGHVFULSWLRQRIWKHDFWLYLW\
JURXS
 7RVDYHWKHDFWLYLW\JURXSFKRRVH

 &KRRVHWKH0HQXWDEWRVHOHFWWKH
WUDQVDFWLRQVIRUWKHDFWLYLW\JURXS

7KHUHDUHGLIIHUHQWZD\VWRDVVLJQWUDQVDFWLRQVWRDQDFWLYLW\JURXS<RXFDQDVVLJQD
WUDQVDFWLRQE\GRLQJRQHRIWKHIROORZLQJ
< (QWHULQJLWGLUHFWO\ RQO\WKHWUDQVDFWLRQZLWKRXWWKHPHQXSDWKLVDGGHG
< 6HOHFWLQJLWIURPWKH6$3PHQX WKHFRPSOHWHPHQXSDWKZLOOEHVKRZQ
< 6HOHFWLQJLWIURPDQH[LVWLQJDFWLYLW\JURXS WKHFRPSOHWHPHQXSDWKZLOOEHVKRZQ
< 6HOHFWLQJLWIURPDQDUHDPHQX WKHFRPSOHWHPHQXSDWKZLOOEHVKRZQ
,QWKLVH[DPSOHZHGHPRQVWUDWHKRZWRLQVHUWDWUDQVDFWLRQIURPDQH[LVWLQJDFWLYLW\JURXSDQGKRZWR
LQVHUWWKHWUDQVDFWLRQFRGHGLUHFWO\7KHRWKHURSWLRQVZRUNDFFRUGLQJO\
:HZRXOGOLNHWRLQVHUWWKHWUDQVDFWLRQVIRU´FUHDWLQJYHQGRULQYRLFHVFUHGLWPHPRµ )% DQG
´GLVSOD\LQJGRFXPHQWVµ )% ZLWKWKHVDPHPHQXSDWKDVLWLVLQWKHDFWLYLW\JURXSIRUWKH´DFFRXQWV
SD\DEOHDFFRXQWDQWµ 6$3B),B$3$&&2817B$* 
 &KRRVH )URPDFWLYLW\JURXS

,I\RXZRXOGOLNHWRVHOHFWWKH
WUDQVDFWLRQFRGHIURPWKH6$3PHQX
FKRRVH )URPWKH6$3PHQX7KHQ
IROORZWKHVDPHSURFHGXUH
 ,QWKHIROORZLQJVFUHHQVHOHFWWKH 8
DFWLYLW\JURXS
6$3B),B$3B$&&2817$17B$*
 &KRRVH(QWHU

Release 4.6A/B
5–23
Chapter 5: User Role Templates
How to Work with User Role Templates

 6HOHFWWKHGHVLUHGWUDQVDFWLRQV)RU
H[DPSOHZHVHOHFWHG
< 6FKHGXOH0DQDJHU
< &UHDWHYHQGRULQYRLFHVFUHGLWPHPRV 11
XQGHU(QWU\→,QYRLFHFUHGLW
PHPR
< 'LVSOD\GRFXPHQW XQGHU(QWU\→
,QYRLFHFUHGLWPHPR
< 'LVSOD\YHQGRU XQGHU$FFRXQW
PDVWHUGDWD
 7RDGGWKHVHOHFWHGWUDQVDFWLRQVWR
WKHDFWLYLW\JURXSPHQXFKRRVH
$GG

12

7RVZLWFKWKHWHFKQLFDOQDPHVRQDQGRIIFKRRVH RU ,I\RXFDQQRWVHHWKHWHFKQLFDO


QDPHRIWKHWUDQVDFWLRQVFUROOIDUWKHUWRWKHULJKW

,I\RXRSHQWKHIROGHUV\RXFDQVHH
KRZWKHWUDQVDFWLRQVDQGSDWKVKDYH
EHHQLQVHUWHG7KH\DSSHDULQWKH
8VHUPHQXLQH[DFWO\WKHVDPHZD\
DVGHILQHGLQWKH3*
7KHQH[WWUDQVDFWLRQVWRLQVHUWDUH
)%DQG)%)RUWKRVH
WUDQVDFWLRQVZHZLOOFUHDWHDQHZ
IROGHUFDOOHG8VHUVHWWLQJV 13
 7RFUHDWHDQHZIROGHUFKRRVH
DQGHQWHUWKHQHZQDPHIRUWKH
IROGHU LQH[DPSOH8VHUVHWWLQJV 

7RVZLWFKWKHWHFKQLFDOQDPHVRQDQG
RIIFKRRVH RU 7KHWHFKQLFDOQDPHV
DSSHDULQIURQWRIWKHWUDQVDFWLRQFRGH
WH[W

Authorizations Made Easy


5–24
Chapter 5: User Role Templates
How to Work with User Role Templates

 7RPRYHWKHIROGHUWRWKHHQGRIWKH
PHQXKLJKOLJKWWKHIROGHU\RXZDQW
WRPRYHDQGFKRRVH WRPRYHLW
GRZQ
 7RHQWHUWKHWUDQVDFWLRQVFKRRVH
7UDQVDFWLRQ

14 15

 (QWHUWKHGHVLUHGWUDQVDFWLRQV IRU


H[DPSOHFB00DQGFB07 7KH
GHVFULSWLRQWH[WIRUWKHWUDQVDFWLRQ 16
FRGHDSSHDUVLQULJKWFROXPQ
 &KRRVH $VVLJQWUDQVDFWLRQV

17

$IWHU\RXVHOHFWDOOWKHWUDQVDFWLRQV 18
QHFHVVDU\ IRUH[DPSOHIRUWKH'DWD
(QWU\&OHUN 
 7RVDYHWKHDFWLYLW\JURXSFKRRVH

 7RPDLQWDLQWKHDXWKRUL]DWLRQGDWD 19
FKRRVHWKH$XWKRUL]DWLRQVWDE

Release 4.6A/B
5–25
Chapter 5: User Role Templates
How to Work with User Role Templates

 7RPDLQWDLQWKHDXWKRUL]DWLRQVGDWD
FKRRVH &KDQJHDXWKRUL]DWLRQGDWD

,Q ([SHUWPRGHIRUSURILOHJHQHUDWLRQ
\RXFDQVSHFLILFDOO\VHOHFWWKHRSWLRQ
ZLWKZKLFK\RXZDQWWRPDLQWDLQ
DXWKRUL]DWLRQYDOXHV7KLVRSWLRQLV
DXWRPDWLFDOO\VHWFRUUHFWO\LQQRUPDO
PRGH

20
Tip

,IQHFHVVDU\WKH'HILQH2UJDQL]DWLRQDO
/HYHOVGLDORJER[DSSHDUV7KLV
VFUHHQXVXDOO\SRSVXSWKHILUVWWLPH
\RXFKRRVH&KDQJHDXWKRUL]DWLRQGDWD
8VHSRVVLEOHHQWULHVWRVHOHFWWKH
GHVLUHGYDOXHVRUYDOXHUDQJH
 ,QWKLVH[DPSOHZHVHOHFWHG)XOO
DXWKRUL]DWLRQIRUWKHRUJDQL]DWLRQDO
OHYHOV
 &KRRVH6DYH

21
22

&RPSDQ\FRGHVEXVLQHVVDUHDVDQGSODQWVDUHH[DPSOHVRIRUJDQL]DWLRQDOOHYHOV<RX
FDQGLVSOD\DQGPDLQWDLQDOLVWRIH[LVWLQJOHYHOVZLWKWUDQVDFWLRQ6832

Authorizations Made Easy


5–26
Chapter 5: User Role Templates
How to Work with User Role Templates

2QWKH&KDQJH$FWLYLW\*URXS
$XWKRUL]DWLRQVVFUHHQWKHDXWKRUL]DWLRQ
GDWDDSSHDUVKLHUDUFKLFDOO\
7KHDFWLYLW\JURXSDSSHDUVDWWKHILUVW
OHYHO EOXH 8QGHUQHDWK\RXILQG
< 2EMHFWFODVVHV SXUSOH
< $XWKRUL]DWLRQREMHFW JUHHQ
< $XWKRUL]DWLRQ \HOORZ 23
< $XWKRUL]DWLRQILHOGV OLJKWEOXH 26

 7RPDLQWDLQWKHDFWLYLW\FOLFNWKH
$FWLYLW\YDOXHILHOG

([SODQDWLRQRIWKH7UDIILF/LJKWV
²*UHHQ$OODXWKRUL]DWLRQILHOGVKDYHEHHQPDLQWDLQHG
²5HG2UJDQL]DWLRQDOOHYHOVDUHQRWPDLQWDLQHG
²<HOORZ2SHQDXWKRUL]DWLRQILHOGVZLWKRXWYDOXHVH[LVWWKDWDUHQRWRUJDQL]DWLRQDO
OHYHOV

 6HOHFWWKHGHVLUHGDXWKRUL]DWLRQ IRU


H[DPSOH'LVSOD\ 
 7RWUDQVIHUFKRRVH 
24

25

 2QWKH&KDQJH$FWLYLW\*URXS$XWKRUL]DWLRQVVFUHHQ, WRPDLQWDLQWKH$XWKRUL]DWLRQJURXSFOLFNWKH


$XWKRUL]DWLRQJURXSYDOXHILHOG

Release 4.6A/B
5–27
Chapter 5: User Role Templates
How to Work with User Role Templates

 (QWHURUVHOHFWWKHGHVLUHGYDOXH ZH
FKRRVH)XOODXWKRUL]DWLRQ 
 7RWUDQVIHUFKRRVH  27

28

3URFHHGZLWKDOORSHQILHOGVLQWKHVDPH 29
ZD\XQWLODOOOLJKWVVZLWFKWRJUHHQ
30
 &KRRVH 
 7RJHQHUDWHWKHSURILOHFKRRVH 

 7KHV\VWHPVXJJHVWV7LQWHUQDO
QXPEHU!DVWKHGHIDXOWQDPH7KH 31
3URILOHQDPHFDQQRWEHFKDQJHGODWHU
KRZHYHUWKH7H[WFDQ 32
 7RFRQWLQXHFKRRVH 

1DPLQJ&RQYHQWLRQVIRU$XWKRUL]DWLRQ3URILOHVDQG*HQHUDWHG$XWKRUL]DWLRQV
:KHQ\RXVDYH\RXUFKDQJHV\RXDUHSURPSWHGWRHQWHUDSURILOHQDPH+RZHYHURQO\
WKHILUVWFKDUDFWHUV WKHSURILOHWRUVR FDQEHIUHHO\DVVLJQHG7KHQXPEHURISURILOHV
JHQHUDWHGGHSHQGVRQWKHQXPEHURIDXWKRUL]DWLRQVLQHDFKDFWLYLW\JURXS$PD[LPXP
RIDSSUR[LPDWHO\DXWKRUL]DWLRQVFDQILWLQWRDSURILOH,IWKHUHDUHPRUHWKDQ
DXWKRUL]DWLRQVDQDGGLWLRQDOSURILOHLVJHQHUDWHG,WKDVWKHVDPHFKDUDFWHUWRUVRDVWKH
SURILOHQDPHDQGWKHODVWWZRGLJLWVDUHXVHGDVDFRXQWHU
7RDYRLGFRQIOLFWVEHWZHHQFXVWRPHUGHILQHGDQG6$3VXSSOLHGSURILOHVGRQRWXVHDQ\
QDPHZLWKDQXQGHUVFRUH B LQWKHVHFRQGSRVLWLRQ6$3SODFHVQRRWKHUUHVWULFWLRQVRQ
WKHQDPLQJRIDXWKRUL]DWLRQSURILOHV UHIHUDOVRWRQRWH ,I\RXUFRPSDQ\KDVLWV
RZQQDPLQJFRQYHQWLRQV\RXPD\RYHUZULWHSURSRVHGQDPHV

Authorizations Made Easy


5–28
Chapter 5: User Role Templates
How to Work with User Role Templates

7KHQDPHVRIWKHDXWKRUL]DWLRQVDUHDOVRGHULYHGIURPWKHSURILOHWRUVR7KHODVWWZR
GLJLWVDUHXVHGDVDFRXQWHUZKHQPRUHWKDQRQHDXWKRUL]DWLRQLVUHTXLUHGIRUDQREMHFW
'HSHQGLQJRQWKHDXWKRUL]DWLRQSURILOHQDPHWKHWHFKQLFDOQDPHVIRUDXWKRUL]DWLRQVDUH
QDPHGDVIROORZV
< %HJLQZLWKD7
< &RPSULVHDQLQWHUQDOQXPEHU
< (QGZLWKDWZRGLJLWQXPEHUEHWZHHQDQG
6DPSOHDXWKRUL]DWLRQQDPH7

 &KRRVH WRUHWXUQWRWKH&KDQJH 33


$FWLYLW\*URXSVVFUHHQ

,I\RXFKRRVH DQGIRUJHWWRJHQHUDWHWKHDFWLYLW\JURXSWKHV\VWHPVKRZV\RXWKH
VWDWXVDQGUHPLQGV\RXWRJHQHUDWHWKHDFWLYLW\JURXS

Release 4.6A/B
5–29
Chapter 5: User Role Templates
How to Work with User Role Templates

$OOWKHWUDQVDFWLRQVDQG
DXWKRUL]DWLRQVIRUWKHDFWLYLW\JURXS
KDYHQRZEHHQFROOHFWHGDQG
JHQHUDWHG7KHQH[WVWHSLVWRDVVLJQ
DXVHUWRWKHDFWLYLW\JURXS
 &KRRVHWKH8VHUWDEWRDVVLJQDXVHU
34

7KHUHGOLJKW RQWKH8VHUWDE
LQGLFDWHVWKDWQRXVHUKDVEHHQDVVLJQHG

6WDWXV'LVSOD\RQWKH7DE
7KHVWDWXVGLVSOD\RQWKHWDELQGLFDWHVLIDXVHULVDOUHDG\DVVLJQHGWRDQDFWLYLW\JURXS
8VHU²*UHHQ$WOHDVWRQHXVHULVDVVLJQHGWRWKHJURXS
8VHU²5HG1RXVHUVDUHDVVLJQHG
8VHU²<HOORZ$OWKRXJKXVHUVKDYHEHHQDVVLJQHGWRWKHDFWLYLW\JURXSWKHXVHU
PDVWHUUHFRUGFRPSDULVRQLVQRWFXUUHQW
,IWKHDFWLYLW\JURXSLVDFROOHFWLYHDFWLYLW\JURXSWKHVWDWXVGLVSOD\RQO\LQGLFDWHV
ZKHWKHUXVHUVDUHDVVLJQHGWRWKDWDFWLYLW\JURXS

 ,QWKH8VHU,'ILHOGVHOHFWWKH
GHVLUHGXVHUE\HLWKHUHQWHULQJWKH
QDPHGLUHFWO\RUXVLQJSRVVLEOH
HQWULHV<RXPD\VHOHFWPXOWLSOH
HQWULHVIURPWKHOLVWDWWKHVDPHWLPH
 ,QWKH)URPDQGWRFROXPQHQWHUWKH
GDWHUDQJHIRUKRZORQJWKHXVHU
VKRXOGEHDVVLJQHGWRWKHDFWLYLW\ 37
JURXS
36
 $IWHUHQWHULQJDOOXVHUVVHOHFW 35
8VHUFRPSDUH

Authorizations Made Easy


5–30
Chapter 5: User Role Templates
How to Work with User Role Templates

7KH8VHUQDPHLVDXWRPDWLFDOO\HQWHUHGLQWKHVHFRQGFROXPQQH[WWRWKHXVHU,',QWKH
WZRDGGLWLRQDOFROXPQV )URPWR \RXFDQVSHFLI\DYDOLGLW\SHULRGIRUWKHDVVLJQPHQW
<RXFDQGHOHWHWKHXVHU,'VE\XVLQJ DQGLQVHUWDQDGGLWLRQDORQHLQIURQWRIDVHOHFWHG
XVHU,'XVLQJ 
)RUDGGLWLRQDOLQIRUPDWLRQRQDVVLJQLQJXVHUVDQGWLPHGHSHQGHQF\FKRRVH 

 &KRRVH &RPSOHWHFRPSDUH

38

Tip

,I\RXFKRRVH8WLOLWLHV→6HWWLQJVDQG
VHOHFW$XWRPDWLFFRPSDULVRQDWVDYHWKH
XVHUFRPSDUHRFFXUVDXWRPDWLFDOO\
ZKHQ\RXVDYHWKHDFWLYLW\JURXS
 7KHXVHULVQRZDVVLJQHGWRWKH
DFWLYLW\JURXS:KHQORJJLQJRQWR
5WKHXVHUVHHVDVSHFLILFXVHU
PHQXZLWKRQO\WKRVHWUDQVDFWLRQV
IRUWKHVHOHFWHGDFWLYLW\JURXS
39

Release 4.6A/B
5–31
Chapter 5: User Role Templates
How to Work with User Role Templates

7KHXVHUVHHVWKH6$3(DV\$FFHVV¥8VHU
PHQXIRUXVHUªVQDPH!ZKHQORJJLQJ
LQWR5DIWHUWKHDVVLJQPHQWRIWKH
DFWLYLW\JURXS LQWKLVH[DPSOHWKHXVHU
PHQXIURP),B$3B'$7$B(175<B
&/(5. 

8VHUVFDQPDLQWDLQWKHLURZQIDYRULWHV
DQGLQVHUWOLQNVWRWKHLUPHQX6HH
FKDSWHU$GYDQFHG3URILOH*HQHUDWRU
)XQFWLRQDOLW\IRUGHWDLOV

&UHDWLQJ&RPSRVLWH$FWLYLW\*URXSV
,QWKHSUHYLRXVVHFWLRQZHGHVFULEHGKRZWRFUHDWH\RXURZQXVHUUROHWHPSODWHVXVLQJVLQJOHDFWLYLW\
JURXSV<RXDOVRKDYHWKHRSWLRQWRFUHDWHFRPSRVLWHDFWLYLW\JURXSVZKLFKFRQVLVWRIPXOWLSOHVLQJOH
DFWLYLW\JURXSV,QWKRVHFRPSRVLWHDFWLYLW\JURXSV\RXFDQQRWDVVLJQWUDQVDFWLRQVGLUHFWO\<RXKDYHWR
HQWHUVLQJOHWUDQVDFWLRQVLQWRVHSDUDWHDFWLYLW\JURXSVDQGWKHQDVVLJQWKRVHDFWLYLW\JURXSVWRFRPSRVLWH
DFWLYLW\JURXS
,QWKHIROORZLQJSURFHGXUHZHGHPRQVWUDWHKRZWRFUHDWHDFRPSRVLWHDFWLYLW\JURXSWKDWLQFOXGHVWKUHH
VLQJOHDFWLYLW\JURXSV

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 8QGHU7\SHVHOHFW&RPSRVLWHDFWLYLW\
JURXS
 ,QWKH$FWLYLW\JURXSILHOGHQWHUWKH
QDPHIRUWKHQHZDFWLYLW\JURXS IRU 3
H[DPSOHFI_AP_DATA_MANAGER  4
 7RFUHDWHWKHQHZDFWLYLW\JURXS
FKRRVH &UHDWH

Authorizations Made Easy


5–32
Chapter 5: User Role Templates
How to Work with User Role Templates

 ,Q'HVFULSWLRQ HQWHUDVKRUW
7
GHVFULSWLRQ
 8QGHU$FWLYLW\JURXSGHVFULSWLRQ
HQWHUDGHVFULSWLRQRIWKHDFWLYLW\
JURXS
 7RVDYHWKHDFWLYLW\JURXSFKRRVH 5
8

 &KRRVHWKH$FWLYLW\JURXSVWDEWR
VHOHFWWKHDFWLYLW\JURXSVIRUWKLV
FRPSRVLWHDFWLYLW\JURXS

 6HOHFW WRLQVHUWWKHDFWLYLW\
JURXSV

<RXFDQRQO\LQVHUWDFWLYLW\JURXSVLQWR 9
FRPSRVLWHDFWLYLW\JURXSV,WLVQRW
SRVVLEOHWRDVVLJQRWKHUFRPSRVLWH
DFWLYLW\JURXSVRUVLQJOHWUDQVDFWLRQVWR
DFRPSRVLWHDFWLYLW\JURXS

 6HOHFWWKHDFWLYLW\JURXSVWKDW\RX
ZRXOGOLNHWRLQFOXGHLQWKH
FRPSRVLWHDFWLYLW\JURXS
10
 &KRRVH 

11

Release 4.6A/B
5–33
Chapter 5: User Role Templates
How to Work with User Role Templates

7KHDFWLYLW\JURXSVKDYHEHHQ
LQVHUWHG
 &KRRVHWKH0HQXWDEWRFKHFNWKDW
\RXFDQQRWPDLQWDLQWKHPHQXIRU
WKHFRPSRVLWHDFWLYLW\JURXS

12

 &KRRVHWKH8VHUWDEWRDVVLJQXVHUV

13

 ,QWKH8VHU,'ILHOGVHOHFWWKH
GHVLUHGXVHUE\HLWKHUHQWHULQJWKH
QDPHGLUHFWO\RUXVLQJSRVVLEOH
HQWULHV<RXPD\VHOHFWPXOWLSOH
HQWULHVIURPWKHOLVWDWWKHVDPHWLPH
 ,QWKH)URPDQGWRFROXPQHQWHUWKH
GDWHUDQJHIRUKRZORQJWKHXVHU
VKRXOGEHDVVLJQHGWRWKHDFWLYLW\
JURXS 16
 $IWHUHQWHULQJDOOXVHUVFKRRVH8VHU 15
14
FRPSDUH

Authorizations Made Easy


5–34
Chapter 5: User Role Templates
Tips for an Administrator

7KH8VHUQDPHLVDXWRPDWLFDOO\HQWHUHGLQWKHVHFRQGFROXPQQH[WWRWKHXVHU,',QWKH
WZRDGGLWLRQDOFROXPQV )URPWR \RXFDQVSHFLI\DYDOLGLW\SHULRGIRUWKHDVVLJQPHQW
<RXFDQGHOHWHWKHXVHU,'VE\XVLQJ DQGLQVHUWDQDGGLWLRQDORQHLQIURQWRIDVHOHFWHG
XVHU,'XVLQJ 
)RUDGGLWLRQDOLQIRUPDWLRQRQDVVLJQLQJXVHUVDQGWLPHGHSHQGHQF\FKRRVH 
<RXDUHQRZILQLVKHGFUHDWLQJDFRPSRVLWHDFWLYLW\JURXSDQGDVVLJQLQJWKLVWRDXVHU:KHQ
XVHUVORJRQWRWKH56\VWHPWKHLUPHQXZLOOFRQWDLQWKHWUDQVDFWLRQVRIWKHWKUHHLQVHUWHG
DFWLYLW\JURXSVIURPRXUH[DPSOH

7LSVIRUDQ$GPLQLVWUDWRU

$VDQDGPLQLVWUDWRUZLWKVSHFLDODXWKRUL]DWLRQV\RXFDQKDYHDVKRUWFXWIRUDVVLJQLQJXVHU
UROHVWRDXVHUZLWKRXWJRLQJLQWRWUDQVDFWLRQ3)&*RU68
7RVHHDQGSHUIRUPWKHVKRUWFXW\RXQHHGDFFHVVWRWUDQVDFWLRQFRGH3)&*7KHILHOGYDOXHV
QHHGWREHVHWWRIXOODXWKRUL]DWLRQ LQWKHDXWKRUL]DWLRQREMHFWV6B86(5B352
6B86(5B*536B86(5B$87DVVKRZLQWKHWDEOHEHORZ

$XWKRUL]DWLRQREMHFW6B86(5B352
$FWLYLW\
$XWKSURILOHLQXVHUPDVWHUPDLQWHQDQFH 352),/(
$XWKRUL]DWLRQREMHFW6B86(5B*53
$FWLYLW\
8VHUJURXSLQXVHUPDVWHUPDLQWHQDQFH &/$66
$XWKRUL]DWLRQREMHFW6B86(5B$87
$FWLYLW\
$XWKRUL]DWLRQQDPHLQXVHUPDVWHUPDLQWHQDQFH $87+
$XWKREMHFWLQXVHUPDVWHUPDLQWHQDQFH 2%-(&7
 IXOODXWKRUL]DWLRQ

Release 4.6A/B
5–35
Chapter 5: User Role Templates
Tips for an Administrator

,QWKHIROORZLQJH[DPSOHZHGHPRQVWUDWHKRZWRDVVLJQDXVHUUROHWHPSODWHWRDXVHUXVLQJWKLVVKRUWFXW

 2QWKH6$3(DV\$FFHVVVFUHHQ
FKRRVH 2WKHUPHQX
1
7KHPHQXZLOORQO\EHGLVSOD\HGLQ
WKLVZD\LIWKHVHWWLQJVIRUWKH
DXWKRUL]DWLRQREMHFWVDUHVHWDV
GHVFULEHGLQWKHWDEOHRQWKH
SUHYLRXVSDJH

 6HOHFWWKHXVHUUROHWHPSODWHWKDW
\RXZRXOGOLNHWRDVVLJQWRDXVHU
 &KRRVH  3

'HSHQGLQJRQ\RXUVHWWLQJVWKH
ZLQGRZPLJKWORRNGLIIHUHQWEXWLW 2
SURYLGHVWKHVDPHIXQFWLRQDOLW\

Authorizations Made Easy


5–36
Chapter 5: User Role Templates
Tips for an Administrator

 7KHVWUXFWXUHRIWKHXVHUUROH
WHPSODWHDSSHDUVWKHVDPHZD\DQ
HQGXVHUVHHVLWODWHU
5
 )RUDQRYHUYLHZRIZKDWWKLVXVHU
4
UROHWHPSODWHFRYHUVFKRRVH
'RFXPHQWDWLRQ

 7KHGHVFULSWLRQDERXWWKHVHOHFWHG
XVHUUROHWHPSODWHLVPDLQWDLQHGLQ 6
WKHDFWLYLW\JURXSGHVFULSWLRQILHOG
LQWKH3*
 &KRRVH 

Release 4.6A/B
5–37
Chapter 5: User Role Templates
Tips for an Administrator

 7RDVVLJQDXVHUWRWKLVXVHUUROH
WHPSODWHFKRRVH$VVLJQXVHUV
8

 ,QWKH$VVLJQXVHUVZLQGRZHQWHUWKH
XVHUVQDPHGLUHFWO\RUXVHSRVVLEOH
HQWULHVWRVHOHFWDXVHUIURPDOLVW 9

 &KRRVH 

10

 7RJHQHUDWHWKHSURILOHIRUWKH
DFWLYLW\JURXSFKRRVH<HV
11

Authorizations Made Easy


5–38
Chapter 5: User Role Templates
Tips for an Administrator

 7KHVHOHFWHGXVHUKDVEHHQDVVLJQHG 13
WRWKHXVHUUROHWHPSODWHDQGWKH
GDWDZDVVDYHG
 &KRRVH RUUHSHDWWKHVWHSVIRUD
QHZDVVLJQPHQW

12

Release 4.6A/B
5–39
Chapter 5: User Role Templates
Available User Role Templates

$YDLODEOH8VHU5ROH7HPSODWHV

,QWKHSUHYLRXVVHFWLRQZHH[SODLQHGKRZWRZRUNZLWKWKHXVHUUROHWHPSODWHV7KLVVHFWLRQSURYLGHVDQ
RYHUYLHZRIWKHXVHUUROHWHPSODWHVGHOLYHUHGZLWK5VRUWHGE\DSSOLFDWLRQDUHD
(DFKXVHUUROHWHPSODWHFRQWDLQVD
< 6KRUWGHILQLWLRQRIWKHUROHDQGDQRYHUYLHZRIWDVNV
< 5ROHEDVHGPHQX
< &RPSOHWHO\PDLQWDLQHGDXWKRUL]DWLRQSURILOHDFFRUGLQJWRWKHIXQFWLRQDOLW\DFFHVVLEOH

5HOHDVH$
7KHIROORZLQJXVHUUROHWHPSODWHVDUHDYDLODEOHZLWK55HOHDVH$DQGDUHGLVWULEXWHGDVDFWLYLW\
JURXSV
$UHD&URVV$SSOLFDWLRQ $UHD/RJLVWLFV([HFXWLRQ
$XGLWRU 7UDQVSRUW&RVW0DQDJHU
'DWD3URWHFWLRQ$XGLWRU 7UDQVSRUW&RVW&OHUN
$XGLWRU+5 :DUHKRXVH:RUNHU
$XGLWRU6\VWHP :DUHKRXVH0DQDJHU
6SHFLDOLVW'DWD7UDQVIHU :DUHKRXVH&OHUN
$UHD0DWHULDOV0DQDJHPHQW3URFXUHPHQW /RJLVWLFV0DQDJHU
5HTXLVLWLRQHU /RJLVWLFV&OHUN
053FRQWUROOHU 7UDQVSRUW3ODQQHU
%X\HU 7UDQVSRUW0DQDJHU
*5&OHUN 7UDQVSRUW&OHUN
6(&OHUN 6KLSSLQJ0DQDJHU
*/%X\HU 6KLSSLQJ&OHUN
,9&OHUN 3URMHFW0DQDJHPHQW
3URGXFWLRQ3ODQQLQJ 3URMHFW0DQDJHU&
332SHUDWRU 3URMHFW0DQDJHU7
333URGXFW0DQDJHU :RUN3DFNDJH5HVSRQVLEOH
336XSHUYLVRU ,QYHVWPHQW0DQDJHPHQW
.DQEDQ&RQWUROOHU ,QYHVWPHQWV$QDO\VW
053&RQWUROOHU ,QYHVWPHQWV0DQDJHU
5HS0DQXIDFWXUHU ,QYHVWPHQWV3ODQHU 25
,QYHVWPHQWV3ODQHU 35
6HWWOH6SHFLDOLVW

Authorizations Made Easy


5–40
Chapter 5: User Role Templates
Available User Role Templates

8VHU5ROH7HPSODWHV$ FRQWLQXHG
%DVLV'HYHORSPHQW 4XDOLW\0DQDJHPHQW
$XWKRUL]DWLRQ'DWD$GPLQLVWUDWRU &HUWLILFDWH
$XWKRUL]DWLRQ3URILOH$GPLQLVWUDWRU (TXLSPHQW0DQDJHU
6\VWHP$GPLQLVWUDWRU ,QVSHFWLRQ0DQDJHU
%DWFK$GPLQLVWUDWRU ,QVSHFWLRQ3ODQHU
$GPLQLVWUDWRU 3UREOHP$XWKRU
3URFHVV&RQWUROOHU 3UREOHP3URFHVVRU
:RUNIORZ'HYHORSHU 4XDOLW\$QDO\VW
:RUNIORZ3URFHVV&RQWUROOHU 4XDOLW\(QJLQHHU
4XDOLW\0DQDJHU 4XDOLW\,QVSHFWRU
7UDQVSRUW0DQDJHU 6XSSRUW/LQH/HYHO
&XVWRPL]LQJ3URMHFW0HPEHU 6XSSRUW/LQH/HYHO
'DWDEDVH$GPLQLVWUDWRU 6DOHV 'LVWULEXWLRQ
$%$3'HYHORSHU 2UGHU3URFHVVLQJ&OHUN
'HYHORSPHQW0DQDJHU 6DOHV5HSUHVHQWDWLYH
'RFXPHQWDWLRQ'HYHORSHU 6DOHV0DQDJHU
3URMHFW0DQDJHU &RQWUROOLQJ
(QGXVHU3URILOH 3ODQQLQJ$FWLYLW\&RRUGLQDWRU
(YHU\(PSOR\HH 6HQLRU&RVWPDQDJHU
$/($GPLQLVWUDWRU 0DQDJHULDO$FFRXQWDQW
$/('HYHORSHU 6DOHV0DQDJHU
$GPLQLVWUDWRU$XWKRUL]IRU6\VWHP$GPLQLVWUDWLRQ$VVLVWDQW )LQDQFH0DQDJHPHQW
3URMHFW/HDGHU$XWKRUL]IRU6\VWHP$GPLQLVWUDWLRQ$VVLVWDQW $VVHW&OHUN
8VHU$XWKRUL]IRU6\VWHP$GPLQLVWUDWLRQ$VVLVWDQW $VVHW$FFRXQWDQW
6$3VFULSW3RZHU8VHU 6WDII$FFRXQWDQW
6SRRO$GPLQLVWUDWRU $FFRXQWV5HFHLYDEOH$FFRXQWDQW
$UFKLYHOLQN$GPLQLVWUDWRU $FFRXQWV5HFHLYDEOH6XSHUYLVRU
$UFKLYHOLQN8VHU $FFRXQWV3D\DEOH$FFRXQWDQW
7HFKQLFDO(QJLQHHU $FFRXQWV3D\DEOH6XSHUYLVRU
8VHU$GPLQVWUDWRU &DVK0DQDJHU
%XVLQHVV:RUNSODFHIRUDOO8VHUV &UHGLW0DQDJHU
$GPLQLVWUDWRU $FFRXQWLQJ6XSHUYLVRU
&RQWUROOHU 3URILW&HQWHU$FFRXQWLQJ
,PSOHPHQWDWLRQV7HDP 3URILW&HQWHU&RQWUROOHU
3URILW&HQWHU0DQDJHU

Release 4.6A/B
5–41
Chapter 5: User Role Templates
Available User Role Templates

8VHU5ROH7HPSODWHV$ FRQWLQXHG
7UDYHO0DQDJHPHQW 5HDO(VWDWH
7UDYHO$GPLQLVWUDWRU &RQWUROOHUDQG0DQDJHU
7UDYHO$SSURYLQJPDQDJHU 5HQW$GMXVWPHQW&OHUN
7UDYHO6\VWHPPDQDJHU 6&6&OHUN
7UDYHO$VVLVWDQW 7HQDQW&OHUN
7UDYHOHU 7HQDQW5HQWDO&OHUN
7UHDVXU\ +XPDQ5HVRXUFHV
$GPLQLVWUDWRU $GPLQLVWUDWLYH&OHUN
&UHGLW$QDO\VW $GPLQLVWUDWLYH&OHUN%HQHILWV
'HSDUWPHQW0DQDJHU/RDQV $GPLQLVWUDWLYH&OHUN&RPSHQVDWLRQ
/RDQV2IILFHU $GPLQLVWUDWLYH&OHUN2UJDQL]DWLRQDO0DQDJHPHQW
5ROORYHU2IILFHU %HQHILWV6SHFLDOLVW
6WDII$FFRXQWDQW &RPSHQVDWLRQ6SHFLDOLVW
%DFNRIILFH3URFHVV /LQH0DQDJHU%HQHILWV
&DVKPDQDJHU /LQH0DQDJHU2UJDQL]DWLRQDO0DQDJHPHQW
&RQWUROOHU /LQH0DQDJHU3HUVRQQHO&RVW3ODQQLQJ
)XQG0DQDJHU /LQH0DQDJHU$SSUDLVDO6\VWHP
5LVN&RQWUROOHU /LQH0DQDJHU5RRP5HVHUYDWLRQV
6WDII$FFRXQWDQW +50DQDJHU
7UDGH&RQWUROOHU +50DQDJHU2UJDQL]DWLRQDO0DQDJHPHQW
7UDGHU +50DQDJHU3HUVRQQHO&RVW3ODQQLQJ
7UHDVXU\0DQDJHU +50DQDJHU$SSUDLVDO6\VWHP
3URGXFW'DWD0DQDJHPHQW +50DQDJHU5RRP5HVHUYDWLRQV
'HVLJQHU +50DQDJHU&RPSHQVDWLRQ
:RUN3UHSDUHU $GPLQLVWUDWLYH&OHUN
)RUHLJQ7UDGH $GPLQLVWUDWLYH&OHUN%HQHILWV
&RQ([SRUW&RQWURO0DQDJHU $GPLQLVWUDWLYH&OHUN&RPSHQVDWLRQ
*RY3HULRG0DQDJHU $GPLQLVWUDWLYH&OHUN2UJDQL]DWLRQDO0DQDJHPHQW
/RFDO'RF3D\PHQW0DQDJHU %HQHILWV6SHFLDOLVW
3UHIHUHQFHPDQDJHU &RPSHQVDWLRQ6SHFLDOLVW
3UR([SRUW0DQDJHU /LQH0DQDJHU%HQHILWV
3UR,PSRUW0DQDJHU /LQH0DQDJHU2UJDQL]DWLRQDO0DQDJHPHQW
6XSHUYLVRU /LQH0DQDJHU3HUVRQQHO&RVW3ODQQLQJ
/LQH0DQDJHU$SSUDLVDO6\VWHP
/LQH0DQDJHU5RRP5HVHUYDWLRQV
+50DQDJHU

Authorizations Made Easy


5–42
Chapter 5: User Role Templates
Available User Role Templates

8VHU5ROH7HPSODWHV$ FRQWLQXHG
+50DQDJHU2UJDQL]DWLRQDO0DQDJHPHQW 3D\UROO6SHFLDOLVW*HUPDQ\
+50DQDJHU3HUVRQQHO&RVW3ODQQLQJ 3D\UROO6SHFLDOLVW'DQPDUN
+50DQDJHU$SSUDLVDO6\VWHP 3D\UROO6SHFLDOLVW6SDLQ
+50DQDJHU5RRP5HVHUYDWLRQV 3D\UROO6SHFLDOLVW)UDQFH
+50DQDJHU&RPSHQVDWLRQ 3D\UROO6SHFLDOLVW*UHDW%ULWDLQ
,QFHQWLYH:DJHV6SHFLDOLVW 3D\UROO6SHFLDOLVW+RQJ.RQJ
7LPH5HFRUGLQJ6SHFLDOLVW 3D\UROO6SHFLDOLVW,QGRQHVLD
6SHFLDOLVW2SHUDWLRQVSODQQHU 3D\UROO6SHFLDOLVW,UHODQG
3D\UROO&OHUN 3D\UROO6SHFLDOLVW-DSDQ
3D\UROO&OHUN$XVWULD 3D\UROO6SHFLDOLVW0H[LFR
3D\UROO&OHUN%HOJLXP 3D\UROO6SHFLDOLVW0DOD\VLD
3D\UROO&OHUN&DQDGD 3D\UROO6SHFLDOLVW1HWKHUODQGV
3D\UROO&OHUN*HUPDQ\ 3D\UROO6SHFLDOLVW1RUZD\
3D\UROO&OHUN6SDLQ 3D\UROO6SHFLDOLVW1HZ=HDODQG
3D\UROO&OHUN*UHDW%ULWDLQ 3D\UROO6SHFLDOLVW3KLOLSSLQHV
3D\UROO&OHUN,QGRQHVLD 3D\UROO6SHFLDOLVW3RUWXJDO
3D\UROO&OHUN0H[LFR 3D\UROO6SHFLDOLVW6ZHGHQ
3D\UROO&OHUN0DOD\VLD 3D\UROO6SHFLDOLVW6LJQDSRUH
3D\UROO&OHUN1HWKHUODQGV 3D\UROO6SHFLDOLVW7KDLODQG
3D\UROO&OHUN1RUZD\ 3D\UROO6SHFLDOLVW7DLZDQ
3D\UROO&OHUN1HZ=HDODQG 3D\UROO6SHFLDOLVW86$
3D\UROO&OHUN3KLOLSSLQHV 3D\UROO6SHFLDOLVW6RXWK$IULFD
3D\UROO&OHUN3RUWXJDO 5HFUXLWHU
3D\UROO&OHUN6LJQDSRUH 6\VWHP$GPLQLVWUDWRU
3D\UROO&OHUN7DLZDQ 6\VWHP$GPLQLVWUDWRU$UJHQWLQLD
3D\UROO&OHUN86$ 6\VWHP$GPLQLVWUDWRU$XVWULD
3D\UROO&OHUN9HQH]XHOD 6\VWHP$GPLQLVWUDWRU$XVWUDOLD
3D\UROO&OHUN6RXWK$IULFD 6\VWHP$GPLQLVWUDWRU%HOJLXP
3D\UROO6SHFLDOLVW 6\VWHP$GPLQLVWUDWRU%UDVLO
3D\UROO6SHFLDOLVW$UJHQWLQLD 6\VWHP$GPLQLVWUDWRU&DQDGD
3D\UROO6SHFLDOLVW$XVWULD 6\VWHP$GPLQLVWUDWRU6XLVVH
3D\UROO6SHFLDOLVW$XVWUDOLD 6\VWHP$GPLQLVWUDWRU*HUPDQ\
3D\UROO6SHFLDOLVW%HOJLHQ 6\VWHP$GPLQLVWUDWRU'DQPDUN
3D\UROO6SHFLDOLVW%UDVLO 6\VWHP$GPLQLVWUDWRU6SDLQ
3D\UROO6SHFLDOLVW&DQDGD 6\VWHP$GPLQLVWUDWRU)UDQFH
3D\UROO6SHFLDOLVW6XLVVH 6\VWHP$GPLQLVWUDWRU*UHDW%ULWDLQ

Release 4.6A/B
5–43
Chapter 5: User Role Templates
Available User Role Templates

8VHU5ROH7HPSODWHV$ FRQWLQXHG
6\VWHP$GPLQLVWUDWRU+RQJ.RQJ 6\VWHP$GPLQLVWUDWRU2UJDQL]DWLRQDO0DQDJHPHQW
6\VWHP$GPLQLVWUDWRU,QGRQHVLD 6\VWHP$GPLQLVWUDWRU3HUVRQQHO$GPLQLVWUDWLRQ
6\VWHP$GPLQLVWUDWRU,UHODQG 6\VWHP$GPLQLVWUDWRU3HUVRQQHO&RVW3ODQQLQJ
6\VWHP$GPLQLVWUDWRU-DSDQ 6\VWHP$GPLQLVWUDWRU3HUVRQQHO'HYHORSPHQW
6\VWHP$GPLQLVWUDWRU0DOD\VLD 6\VWHP$GPLQLVWUDWRU$SSUDLVDO6\VWHP
6\VWHP$GPLQLVWUDWRU1HWKHUODQGV 6\VWHP$GPLQLVWUDWRU7UDLQLQJDQG(YHQWV
6\VWHP$GPLQLVWUDWRU1RUZD\ 6\VWHP$GPLQLVWUDWRU5RRP5HVHUYDWLRQV
6\VWHP$GPLQLVWUDWRU1HZ=HDODQG 6\VWHP$GPLQLVWUDWRU3D\UROO
6\VWHP$GPLQLVWUDWRU3KLOLSSLQHV 6\VWHP$GPLQLVWUDWRU5HFUXLWPHQW
6\VWHP$GPLQLVWUDWRU3RUWXJDO 7UDLQLQJDQG'HYHORSPHQW&OHUN
6\VWHP$GPLQLVWUDWRU6ZHGHQ 7UDLQLQJDQG'HYHORSPHQW&OHUN3HUVRQQHO'HYHORSPHQW
6\VWHP$GPLQLVWUDWRU6LJQDSRUH 7UDLQLQJDQG'HYHORSPHQW&OHUN$SSUDLVDO6\VWHP
6\VWHP$GPLQLVWUDWRU7KDLODQG 7UDLQLQJDQG'HYHOSP&OHUN7UDLQLQJDQG(YHQW0DQDJHPHQW
6\VWHP$GPLQLVWUDWRU7DLZDQ 7UDLQLQJDQG'HYHORSPHQW&OHUN5RRP5HVHUYDWLRQ
6\VWHP$GPLQLVWUDWRU86$ 7UDLQLQJDQG'HYHORSPHQW6SHFLDOLVW3HUVRQQHO'HYHORSPHQW
6\VWHP$GPLQLVWUDWRU,QWHUQDWLRQDO 7UDLQLQJDQG'HYHORSPHQW6SHFLDOLVW$SSUDLVDO6\VWHP
6\VWHP$GPLQLVWUDWRU6RXWK$IULFD 7UDLQLQJDQG'HYHORSPHQW6SHFLDOLVW7UDLQLQJ
6\VWHP$GPLQLVWUDWRU5RRP5HVHUYDWLRQV 7UDLQLQJDQG'HYHORSPHQW6SHFLDOLVW5RRP5HVHUYDWLRQ
6\VWHP$GPLQLVWUDWRU%HQHILWV 7UDLQLQJDQG'HYHORSPHQW6SHFLDOLVW
6\VWHP$GPLQLVWUDWRU&RPSHQVDWLRQ

5HOHDVH%
7KHIROORZLQJXVHUUROHWHPSODWHVDYDLODEOHZLWK55HOHDVH%DUHLQDGGLWLRQWRWKHH[LVWLQJIURP
5HOHDVH$DVVKRZQDERYH

%DVLV +XPDQ5HVRXUFHV
$%$3'HYHORSHU ,QFHQWLYH:DJHV&OHUN
$OH$GPLQLVWUDWRU ,QFHQWLYH:DJHV6SHFLDOLVW
$/('HYHORSHUV 7LPH5HFRUGLQJ$GPLQLVWUDWRU
0DVWHU'DWD'LVWULEXWLRQ 7LPH5HFRUGLQJ6SHFLDOLVW
$FFRXQWLQJ0DVWHU'DWD'LVWULEXWLRQ 6KLIW3ODQQLQJ&OHUN
+50DVWHU'DWD'LVWULEXWLRQ 6KLIW3ODQQLQJ6SHFLDOLVW
/RJLVWLFV0DVWHU'DWD'LVWULEXWLRQ 0DWHULDO0DVWHU
)LQDQFHPDQDJHPHQW %X\LQJ
),$GYDQFH3D\HUIRU7ULS$GYDQFHV

Authorizations Made Easy


5–44
Chapter 5: User Role Templates
Available User Role Templates

8VHU5ROH7HPSODWHV% FRQWLQXHG
5HWDLO 0DLQWHQDQFHRI6DOHV3ULFH&DOFXODWLRQV
$OORFDWLRQ7DEOH 3ULFLQJ(QYLURQPHQW
$VVRUWPHQW0DQDJHPHQW 6DOHV3ULFH&DOFXODWLRQV 6WUDWHJLF
5HWDLO6WRFN3ODQQHU 3URPRWLRQ0DQDJHPHQW
2UGHU2SWLPL]LQJ 6WRUH0DQDJHU
3HULVKDEOHV3ODQQLQJ 7ULJJHULQJDQG&RQWUROOLQJ0HUFKDQGLVH3URFXUHPHQWLQD6WRUH
&DWHJRU\0DQDJHU *DWKHULQJ,QIRUPDWLRQDQG&KDQJLQJ0DVWHU
&ODVVLILFDWLRQ 6WRUH*RRGV5HFHLSWV,VVXHVDQG,QYHQWRU\
0DLQWHQDQFHRI3XUFKDVH3ULFH&RQGLWLRQV 0DQDJHPHQWRI,QVWRUH3HUVRQQHO
0DLQWHQDQFHRI6DOHV3ULFH&RQGLWLRQV ,QVWRUH3ODQQLQJDQG&RQWURO
*RRGV5HFHLSW 6DOHV$FWLYLWLHVLQD6WRUH
*RRGV5HFHLSW$VVRFLDWH 6DOHV'HSDUWPHQW0DQDJHULQD6WRUH
,QWHUQDO:DUHKRXVH+DQGOLQJ 6WRUH$VVRFLDWH8VLQJ6$35HWDLO6WRUH
:DUHKRXVH0DQDJHU 6HWWOHPHQWRI&XVWRPHU$UUDQJHPHQWV
6KLSSLQJ$VVRFLDWH 0DLQWHQDQFHRI&XVWRPHU$UUDQJHPHQWV
:DUHKRXVH:RUNHU 6HWWOHPHQWRI9HQGRU$UUDQJHPHQWV
5HWDLO%X\HU 0DLQWHQDQFHRI9HQGRU$UUDQJHPHQWV
%X\LQJ$FWLYLWLHV 7UDQVSRUWDWLRQ0DQDJHU
*DWKHULQJ,QIRUPDWLRQDQG&KDQJLQJ0DVWHU 7UDQVSRUWDWLRQ3ODQQHU
,QYRLFH9HULILFDWLRQ&OHUN /RJLVWLFV([HFXWLRQ
9HULILFDWLRQRI,QYRLFHV 6KLSSLQJ&OHUN
$UFKLYLQJRI,QYRLFHV 6KLSSLQJ0DQDJHU
)XQFWLRQVLQWKH,QYRLFH9HULILFDWLRQ(QYLURQPHQW 3ODQLQJ6\VWHPV
&RRUGLQDWLRQRI0HUFKDQGLVHDQG$VVRUWPHQW 'LVSOD\DQG0DLQWDLQ:RUN&HQWHU0DVWHU'DWD
([HFXWLRQRI0HUFKDQGLVHDQG$VVRUWPHQW3ODQQLQJ 6DOHV3ULFH9DOXDWLRQ
0HUFKDQGLVH&DWHJRU\+LHUDUFK\&UHDWLRQ
5HTXLUHPHQWV3ODQQLQJ

Release 4.6A/B
5–45
Chapter 5: User Role Templates
Available User Role Templates

Authorizations Made Easy


5–46
&KDSWHU $GYDQFHG3URILOH*HQHUDWRU 
)XQFWLRQDOLW\

&RQWHQWV

Overview ..................................................................................................................6–2
Selecting Views/Types in Activity Group Maintenance ......................................6–2
Exploring Advanced Profile Generator Functionality .........................................6–3
Copying and Deriving Activity Groups ...............................................................6–16
Selecting Workflow Tasks....................................................................................6–21
Deleting Activity Groups ......................................................................................6–24
Postmaintaining User Role Templates ...............................................................6–25
Maintaining and Generating the Authorization Profiles....................................6–26
Displaying an Overview of Generated Profiles ..................................................6–30
Regenerating Authorization Profiles After Making Changes ...........................6–32
Using Utilities to Change Generated Authorizations ........................................6–36
Customizing Authorizations ................................................................................6–38

6–1
Chapter 6: Advanced Profile Generator Functionality
Overview

2YHUYLHZ

,QDGGLWLRQWRWKHWKUHHPHWKRGVRIXVLQJWKHXVHUUROHWHPSODWHVWKH3URILOH*HQHUDWRU 3*
SURYLGHVDGGLWLRQDORSWLRQDOIXQFWLRQDOLW\
,QWKLVFKDSWHUZHH[SODLQPRUHRIWKHYDVWIXQFWLRQDOLW\RIWKH3*([DPSOHVVKRZKRZWR
HQKDQFHWKHXVHRI\RXUXVHUUROHWHPSODWHV

6HOHFWLQJ9LHZV7\SHVLQ$FWLYLW\*URXS0DLQWHQDQFH

Possible entries

Views

Types

,QWKH$FWLYLW\*URXS0DLQWHQDQFHZLQGRZ WUDQVDFWLRQ3)&* \RXFDQWRJJOHEHWZHHQ


GLIIHUHQWYLHZVDQGW\SHV)RUYLHZV\RXFDQFKRRVH
< %DVLFPDLQWHQDQFH PHQXVSURILOHVRWKHUREMHFWV
< 2YHUYLHZ 2UJDQL]DWLRQDO0DQDJHPHQWDQGZRUNIORZ
)RUW\SHV\RXFDQFKRRVH
< $FWLYLW\JURXS
< &RPSRVLWHDFWLYLW\JURXS
7KHVHYLHZVDQGW\SHVDUHGHVFULEHGLQWKHIROORZLQJVHFWLRQV

%DVLF0DLQWHQDQFH

6HOHFW%DVLFPDLQWHQDQFH PHQXVSURILOHVRWKHUREMHFWV WRFUHDWHDFWLYLW\JURXSVDQGDVVLJQ


WKHVHJURXSVWRXVHUV

2YHUYLHZ 2UJDQL]DWLRQDO0DQDJHPHQW

6HOHFW2YHUYLHZ 2UJDQL]DWLRQDO0DQDJHPHQWDQGZRUNIORZ WRFUHDWHDFWLYLW\JURXSVDQG


DVVLJQWKHVHDFWLYLW\JURXSVWR5XVHUVRU3'REMHFWV2YHUYLHZJLYHV\RXIXOODFFHVVWRDOO
DFWLYLW\JURXSPDLQWHQDQFHIXQFWLRQVLQFOXGLQJRUJDQL]DWLRQPDQDJHPHQWDQGWKHUHODWHG
WLPHGHSHQGHQFLHV)RUH[DPSOHZKHQ\RXDUHFUHDWLQJRUFKDQJLQJDQDFWLYLW\JURXS\RX
FDQRQO\OLQNZRUNIORZWDVNVWRDQDFWLYLW\JURXSLQ2YHUYLHZ

Authorizations Made Easy


6–2
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

$FWLYLW\*URXS

6HOHFW$FWLYLW\JURXSWRGLVSOD\DOODYDLODEOHDFWLYLW\JURXSVLQFOXGLQJFRPSRVLWHDFWLYLW\
JURXSVZKHQ\RXVHOHFWSRVVLEOHHQWULHV

&RPSRVLWH$FWLYLW\*URXS

6HOHFW&RPSRVLWHDFWLYLW\JURXSVWRGLVSOD\RQO\FRPSRVLWHDFWLYLW\JURXSVZKHQ\RXVHOHFW
SRVVLEOHHQWULHV

([SORULQJ$GYDQFHG3URILOH*HQHUDWRU)XQFWLRQDOLW\

,QFKDSWHU8VHU5ROH7HPSODWHVZHGHVFULEHGWKUHHPHWKRGVWRZRUNZLWKXVHUUROH
WHPSODWHV<RXDFWXDOO\KDYHPRUHRSWLRQVZKHQZRUNLQJZLWKWKHDFWLYLW\JURXSVDQG
3URILOH*HQHUDWRU 3* )RUH[DPSOHWKHUHDUHGLIIHUHQWZD\VWRDVVLJQREMHFWVWRDQDFWLYLW\
JURXS³\RXFDQFUHDWH\RXURZQKLHUDUFK\ZLWKFXVWRPL]HGIROGHUVQDPHVDQGOLQNVIRU
WKHXVHUUROHWHPSODWHV\RXFUHDWH
2QWKH&KDQJH$FWLYLW\*URXSVVFUHHQ VHHEHORZ DVHULHVRIEXWWRQVDURXQGWKHDVVLJQHG
WUDQVDFWLRQVSURYLGHGLIIHUHQWIXQFWLRQDOLW\

Creating or changing the Inserting Internet and


hierarchy (folders, names, document links
order)

Select a system where


Inserting transactions and you would like these
reports manually or from transactions to be
different existing menus executed

Additional activities
(moving object in hierarchy,
translating, displaying Displaying report
technical names, or information
displaying object
documentation)

Release 4.6A/B
6–3
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

&UHDWLQJDQG&KDQJLQJWKH+LHUDUFK\
<RXFDQDVVLJQREMHFWVWRDQDFWLYLW\JURXSE\HLWKHU
< &UHDWLQJ\RXURZQKLHUDUFK\
< 0RYLQJREMHFWVLQWRWKHH[LVWLQJKLHUDUFK\DQGUHQDPLQJWKHPWRVXLW\RXUQHHGV
,QWKHIROORZLQJH[DPSOHZHGHPRQVWUDWHKRZWRLQVHUWDIROGHUJLYHLWDQHZQDPHDQGPRYHLWLQWRWKH
KLHUDUFK\
:HZDQWWRFUHDWHDQHZIROGHUDQGFDOOLW´%X\HUµXQGHU0DVWHU'DWD→9HQGRULQWKHDFWLYLW\JURXS
00B%8<(5B$*

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRU
H[DPSOH00B%8<(5B$* DQG
FKRRVH &KDQJH
 ,QWKH&KDQJH$FWLYLW\*URXSVVFUHHQ
VHOHFWWKHKLHUDUFK\OHYHOXQGHU
ZKLFK\RXZDQWWRLQVHUWWKHIROGHU
IRUH[DPSOH9HQGRULQ
00B%8<(5B$*  4

 &KRRVH 

 (QWHUWKHQDPHRIWKHQHZIROGHU
5
 &KRRVH 
6

Authorizations Made Easy


6–4
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

 7KHQHZIROGHULVSODFHGRQHOHYHO
EHORZWKHVHOHFWHGIROGHULQWKH
KLHUDUFK\7RPRYHLWXSRUGRZQ
XVHWKHDUURZV RUXVHGUDJ
DQGGURS

7RFKDQJHWKHWH[WRIWKHQRGHVHOHFWLW
DQGHQWHUWKHQHZQDPH

<RXQHHGWREHFHUWDLQKRZ\RXFKDQJH\RXUPHQXVEHFDXVHLIWKHRULJLQDO5PHQX
SDWKFKDQJHV\RXPLJKWQRWEHDEOHWRILQG\RXUVHOHFWHGWUDQVDFWLRQLQWKHVDPH
SRVLWLRQDVEHIRUH

,QVHUWLQJ7UDQVDFWLRQV
:HFRQWLQXHIURPWKHVWHSDERYHWRVKRZKRZWRLQVHUWWUDQVDFWLRQVXQGHUWKHQHZO\FUHDWHGIROGHU
,I\RXNQRZWKHWUDQVDFWLRQFRGH\RXFDQLQVHUWLWPDQXDOO\E\FKRRVLQJ 7UDQVDFWLRQDQGHQWHULQJWKH
WUDQVDFWLRQFRGH VHHFKDSWHUWKHVHFWLRQ&RS\DQG0RGLI\WKH6$3SURYLGHG8VHU5ROH7HPSODWHVIRUGHWDLOV 
7RVHOHFWWKHWUDQVDFWLRQIURPDPHQXFKRRVHRQHRIWKHIROORZLQJEXWWRQV
)URPWKH6$3PHQX VHHFKDSWHUWKHVHFWLRQ&RS\DQG0RGLI\WKH6$3SURYLGHG8VHU5ROH7HPSODWHV
)URPDFWLYLW\JURXS
)URPDUHDPHQX

Release 4.6A/B
6–5
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

 &KRRVHIURPZKHUH\RXZRXOGOLNH
WRLQVHUWWKHWUDQVDFWLRQ LQWKLV
H[DPSOHZHFKRVH )URPDFWLYLW\
JURXS 

,I\RXLQVHUWWUDQVDFWLRQVIURPD 1
GLIIHUHQWPHQXWKHFRPSOHWHPHQXSDWK
IURPWKDWVRXUFHZLOOEHDGGHG

 6HOHFWWKHDFWLYLW\JURXSIURPZKHUH
\RXZRXOGOLNHWRWUDQVIHUWKH
WUDQVDFWLRQFRGH<RXQHHGWRNQRZ
ZKDWDFWLYLW\JURXSFRQWDLQVWKLV 2
WUDQVDFWLRQ:HVHOHFWHG
6$3B00B*/B%8<(5B$*
 &KRRVH 
3

Authorizations Made Easy


6–6
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

7KHPHQXVWUXFWXUHRIWKHVHOHFWHG
DFWLYLW\JURXSDSSHDUV
 2SHQWKHGHVLUHGKLHUDUFK\OHYHO
DQGVHOHFWWKHGHVLUHGWUDQVDFWLRQ V 

7RVLPSOLI\\RXUVHDUFKWXUQRQWKH
WHFKQLFDOQDPHVE\FKRRVLQJ 
 &KRRVH $GGWRWUDQVIHUWKH
WUDQVDFWLRQVWR\RXUDFWLYLW\JURXS
7KHFRPSOHWHPHQXSDWK LQWKLV
FDVH9HQGRU→%X\HUZLWKDFWLYLW\ 5
JURXSV&UHDWH&KDQJHDQG'LVSOD\
LVWUDQVIHUUHG
$IWHUWKHFRPSOHWHPHQXSDWKLV
LQVHUWHG\RXKDYHWKHRSWLRQWR
UHQDPHLWDQGPRYHWKHLQVHUWHG
WUDQVDFWLRQVWRWKHGHVLUHGSRVLWLRQ
XVLQJGUDJDQGGURSRU
0RYHQRGH
 6HOHFWWKHWUDQVDFWLRQWREHPRYHG
 &KRRVH 0RYHQRGHRUXVHGUDJ
DQGGURSWRPRYHLW

Release 4.6A/B
6–7
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

 6HOHFWWKHGHVLUHGIROGHU IRU
H[DPSOH%X\HU 
 &KRRVH 

7KHWUDQVDFWLRQKDVEHHQPRYHG
'RWKHVDPHIRUWKHRWKHU
WUDQVDFWLRQVXQWLODOODUHLQWKHULJKW
IROGHU
 6HOHFWWKHPHQXHQWU\WKDWZDV
WUDQVIHUUHG IRUH[DPSOH9HQGRU  11
 &KRRVH WRGHOHWHWKHHQWU\

10

Authorizations Made Easy


6–8
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

7KHWUDQVDFWLRQVKDYHEHHQPRYHG
DQGWKHQRGHKDVEHHQGHOHWHG
$IWHULQVHUWLQJDOOWKHGHVLUHG
WUDQVDFWLRQV\RXKDYHWRJHQHUDWH
WKHDFWLYLW\JURXSDQGDVVLJQXVHUV

Release 4.6A/B
6–9
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

,QVHUWLQJ,QWHUQHWDQG'RFXPHQW/LQNV
<RXKDYHWKHRSWLRQWRDVVLJQOLQNV³IRUH[DPSOH0LFURVRIW:RUG([FHOGRFXPHQWVRU,QWHUQHWVLWHV³WRDQ
DFWLYLW\JURXSVRWKDWWKHVHOLQNVZLOOEHDYDLODEOHWRDOOHQGXVHUVDVVLJQHGWRWKDWDFWLYLW\JURXS(QGXVHUV
DOVRKDYHWKHRSWLRQWRFUHDWHWKHLURZQOLQNVODWHURQWKHLU(DV\$FFHVVVFUHHQ,QWKHIROORZLQJH[DPSOH
ZHDGGDOLQNWRDORFDO0LFURVRIW([FHOVSUHDGVKHHWDQGDZHESDJH:HDUHJRLQJWRXVHWKHDFWLYLW\JURXS
IURPDERYHDQGZLOOLQVHUWDIROGHUFDOOHG,QIRUPDWLRQVRXUFHDVDSUHUHTXLVLWH

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRU
H[DPSOH00B%8<(5B$* DQG
FKRRVH &KDQJH
 ,QWKH&KDQJH$FWLYLW\*URXSV
ZLQGRZVHOHFWWKHSRVLWLRQZKHUH
\RXZRXOGOLNHWRLQVHUWWKH
GRFXPHQWOLQN IRUH[DPSOHWKH
IROGHU,QIRUPDWLRQVRXUFH  4
3
 &KRRVH :HEDGGUHVV
1RWH(YHQLI\RXZDQWWRLQVHUWD
GRFXPHQWOLQN\RXPXVWXVHWKH
:HEDGGUHVVEXWWRQ

 (QWHUWKHWH[WIRUWKHOLQNLQWKH7H[W 5
ILHOG 6

 (QWHUWKHSDWKWRWKHGRFXPHQWRU 7
XVHSRVVLEOHHQWULHVWRVHOHFWLW
 &KRRVH 

7KHGRFXPHQWFDQEHDORFDOGRFXPHQWRUDGRFXPHQWIURPWKHQHWZRUN1RWHWKDW
QDPHVIRUGLIIHUHQWKDUGGULYHVPD\EHGLIIHUHQW

Authorizations Made Easy


6–10
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

 7KHOLQNWRWKH([FHOVSUHDGVKHHWKDV
EHHQLQVHUWHG7KHV\VWHPGLVSOD\V
DQLFRQWKDWUHSUHVHQWVWKH
GRFXPHQWW\SH
 &KRRVH :HEDGGUHVVWRLQVHUWWKH
,QWHUQHWOLQN

 ,Q7H[WHQWHUWKHWH[WIRUWKHOLQN
 ,Q:HEDGGUHVVRUILOHHQWHUWKH85/
OLQNWRWKHGHVLUHGSDJHRUXVH
SRVVLEOHHQWULHVWRVHOHFWDVDYHG85/
 &KRRVH 
 7KHOLQNWRWKH,QWHUQHWSDJHKDV
EHHQLQVHUWHG7KHV\VWHPGLVSOD\V
WKHLFRQ IRU,QWHUQHWOLQNV

13

Release 4.6A/B
6–11
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

,QVHUWLQJ5HSRUWV
1HDUO\HYHU\UHSRUWLQWKHV\VWHPKDVDWUDQVDFWLRQDVVLJQHGWRLW7KHUHIRUH\RXFDQVHOHFW
DQ\UHSRUWDQGDXWKRUL]HXVHUVMXVWIRUFHUWDLQUHSRUWV7KHUHDUHGLIIHUHQWRSWLRQVWRDVVLJQD
UHSRUWWRDQDFWLYLW\JURXS<RXFDQVHOHFWIURPHLWKHU
< $%$3UHSRUW
< 6$3TXHU\
< 7UDQVDFWLRQZLWKYDULDQW
< 5HSRUW:ULWHU
< 'ULOOGRZQ
< 5HSSRUWIROLR
1RWRQO\FDQ\RXDVVLJQUHSRUWVWRWKHPHQXWKDWDUHSURYLGHGE\6$3WKDWDOUHDG\KDYHD
WUDQVDFWLRQEXWLWLVDOVRSRVVLEOHWRDVVLJQVHOIGHYHORSHGUHSRUWVZLWKWKLVIXQFWLRQDOLW\
:KHQ\RXDVVLJQDVHOIGHYHORSHGUHSRUW\RXFDQFUHDWHDWUDQVDFWLRQFRGHWRWKHUHSRUW
ZKHQDGGLQJLWWRWKHPHQX
,QWKHIROORZLQJH[DPSOHZHGHPRQVWUDWHRQO\RQHPHWKRG WKHRWKHUVDUHVLPLODU 

([DPSOH
:HVHOHFWWKHUHSRUW'XH'DWH$QDO\VLVIRU2SHQ,WHPVIURPWKHDSSOLFDWLRQFODVV),$FFRXQWVSD\DEOHDQG
DVVLJQLWWRDIROGHUFDOOHG5HSRUWV

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRU
H[DPSOH00B%8<(5B$* DQG
FKRRVH &KDQJH
 2QWKH0HQXWDEVHOHFWWKHIROGHU
ZKHUH\RXZRXOGOLNHWRLQVHUWWKH
UHSRUW
4
 &KRRVH 5HSRUW
3

Authorizations Made Easy


6–12
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

,QRXUH[DPSOHZHGHPRQVWUDWH
KRZWRVHOHFWDUHSRUWIURPWKH
DSSOLFDWLRQFODVV
5
 &KRRVH'ULOOGRZQ

,I\RXH[SDQGWKHSRSXSXVLQJ WR
GLVSOD\RWKHURSWLRQV\RXFDQFKRRVH
ZKHWKHUWRDVVLJQ\RXURZQWUDQVDFWLRQ Tip
FRGHRUGHVFULSWLRQWRWKHUHSRUWRU
JHQHUDWHWKHWUDQVDFWLRQFRGH
DXWRPDWLFDOO\DQGDGRSWWKHUHSRUW
WUDQVDFWLRQ


 6HOHFWWKHGHVLUHGFODVVIURPWKHOLVW
6
 &KRRVH(QWHU

'HSHQGLQJRQZKDW\RXVHOHFWHGWKH
IROORZLQJZLQGRZ RUZLQGRZV IRU
VWHSV²PLJKWGLIIHU
 6HOHFWWKHGHVLUHGUHSRUWW\SH
8
 &KRRVH 

 &KRRVHSRVVLEOHHQWULHVWRVHOHFWWKH
UHSRUW
10

Release 4.6A/B
6–13
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

 6HOHFWWKHGHVLUHGUHSRUWIURPWKHKLW
OLVW
11
 &KRRVH 
12

 &KRRVH 

13

 &KRRVH 

14

 7RVDYH\RXUZRUNFKRRVH 
7KHUHSRUWKDVEHHQDVVLJQHG 15

,I\RXGHFLGHGWRJLYHWKHUHSRUWD
GLIIHUHQWQDPHDQGGHVFULSWLRQWKHQHZ
LQIRUPDWLRQZRXOGEHGLVSOD\HGLQWKH
PHQXLQVWHDG

Authorizations Made Easy


6–14
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality

'LVSOD\LQJWKH2QOLQH'RFXPHQWDWLRQIRU$FWLYLW\*URXS2EMHFWV
<RXPD\UHYLHZWKHRQOLQHGRFXPHQWDWLRQIRUQHDUO\HYHU\REMHFWLQWKHDFWLYLW\JURXSVWUXFWXUH LI
DYDLODEOH ,I\RXDUHQRWVXUHDERXWDFHUWDLQWUDQVDFWLRQLQVWHDGRIJRLQJWKURXJKWKHRQOLQH
GRFXPHQWDWLRQMXVWPDUNLWLQWKHVWUXFWXUHDQGFKRRVH 'LVSOD\GRFXPHQWDWLRQ7KHDGYDQWDJHRIWKLV
PHWKRGLV\RXGRQRWQHHGWRNQRZZKDWDUHD\RXUREMHFWEHORQJVWR
,QWKHIROORZLQJH[DPSOHZHZRXOGOLNHWRNQRZPRUHDERXWWKHWUDQVDFWLRQ0(&UHDWHSXUFKDVHRUGHU

 6HOHFWWKHREMHFWIRUZKLFK\RXZDQW
WRUHDGWKHGRFXPHQWDWLRQ
 &KRRVH 'LVSOD\GRFXPHQWDWLRQ

 7KHGRFXPHQWDWLRQEURZVHUDSSHDUV
ZLWKWKHRQOLQHGRFXPHQWDWLRQIRU
WKHVHOHFWHGREMHFW

'HSHQGLQJRQKRZ\RXVHWXS\RXU
RQOLQHGRFXPHQWDWLRQWKHEURZVHU
PLJKWORRNGLIIHUHQW

Release 4.6A/B
6–15
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups

&RS\LQJDQG'HULYLQJ$FWLYLW\*URXSV

%DVLFVRQ'XSOLFDWLQJ$FWLYLW\*URXSV
,WLVDFFHSWDEOHWRXWLOL]HRQO\DFWLYLW\JURXSVLQ\RXULPSOHPHQWDWLRQDQGFUHDWHWKHPDV
QHHGHG+RZHYHU6$3SURYLGHVWZRPHWKRGVWRPDNHDFWLYLW\JURXSPDLQWHQDQFHHDVLHU
7KHVHWZRFRUHPHWKRGVLQFOXGH
< &RS\LQJDFWLYLW\JURXSV
< 8VLQJGHULYHGRULQKHULWHGDFWLYLW\JURXSV
7KHGLDJUDPEHORZSURYLGHVDQRYHUYLHZRIZKDWWRH[SHFWIURPWKRVHRSWLRQV
7KHJUHHQFLUFOHLQGLFDWHVWKDWPDLQWDLQHGRUDVVLJQHGLWHPVH[LVW
7KHUHG;LQGLFDWHVWKDWQRPDLQWDLQHGRUDVVLJQHGLWHPVH[LVW

&RS\LQJDQDFWLYLW\JURXSZLWKRXWDXVHU

$FWLYLW\JURXS $FWLYLW\BJURXSB $FWLYLW\JURXS $FWLYLW\BJURXSB

'HVFULSWLRQ 2ULJLQDODFWLYLW\JURXS 'HVFULSWLRQ &RSLHGDFWLYLW\JURXS


copy WITHOUT
'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

7KHFRS\ DFWLYLW\BJURXSB FRQWDLQVWKHVDPH


$FWLYLW\BJURXSBLVWKHRULJLQDODFWLYLW\JURXS

ZKLFKZHDUHJRLQJWRFRS\ ZLWKWKHXVHU LQIRUPDWLRQDVDFWLYLW\BJURXSB H[FHSWWKHXVHU


DVVLJQPHQWLQWKLVH[DPSOH

&RS\LQJDQDFWLYLW\JURXSZLWKDXVHU

$FWLYLW\JURXS $FWLYLW\BJURXSB $FWLYLW\JURXS $FWLYLW\BJURXSB

'HVFULSWLRQ 2ULJLQDODFWLYLW\JURXS 'HVFULSWLRQ &RSLHGDFWLYLW\JURXS


copy WITH
'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

$FWLYLW\BJURXSBLVWKHRULJLQDODFWLYLW\JURXS 7KHFRS\ DFWLYLW\BJURXSB LVLGHQWLFDOWR

ZKLFKZHDUHJRLQJWRFRS\ ZLWKWKHXVHU DFWLYLW\BJURXSB

DVVLJQPHQWLQWKLVH[DPSOH

7KHUHLVQROLQNDJHEHWZHHQDFWLYLW\BJURXSBDQGDFWLYLW\BJURXSBDIWHUWKHFRS\SURFHVVLV
SHUIRUPHGLQWKHWZRFDVHVDERYH

Authorizations Made Easy


6–16
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups

'HULYLQJDQDFWLYLW\JURXS

$FWLYLW\JURXS $FWLYLW\BJURXSB $FWLYLW\JURXS $FWLYLW\BJURXSB

'HVFULSWLRQ 2ULJLQDODFWLYLW\JURXS 'HVFULSWLRQ 'HULYHGDFWLYLW\JURXS

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

:HDUHJRLQJWRFUHDWHDQHZDFWLYLW\JURXS 7KLVLVWKHGHULYHGDFWLYLW\JURXS$OOWUDQVDFWLRQV

DFWLYLW\BJURXSB IURP$FWLYLW\BJURXSBE\ IURPWKHRULJLQDODFWLYLW\JURXSVDUHDOVRLQWKLV


Derive
XVLQJ7UDQVDFWLRQ,QKHULWDQFH RQH<RXFDQQRWDGGDQ\LWHPVWRWKHPHQX
activity group 7KHDXWKRUL]DWLRQYDOXHVQHHGWREHPDLQWDLQHG

7UDQVDFWLRQ,QKHULWDQFH 7UDQVDFWLRQ,QKHULWDQFH

'HULYHIURPDFWLYLW\JURXS 'HULYHIURPDFWLYLW\JURXS

$FWLYLW\BJURXSB

2ULJLQDODFWLYLW\JURXS

$GGLQJWUDQVDFWLRQFRGHVWRDFWLYLW\BJURXSBDIWHUDFWLYLW\BJURXSBLVFUHDWHGRUJHQHUDWHG
DXWRPDWLFDOO\LPSDFWVDFWLYLW\BJURXSB/LQNDJHEHWZHHQDFWLYLW\BJURXSBDQG
DFWLYLW\BJURXSBLVDOZD\VXSGDWHGDXWRPDWLFDOO\ZKHQDFWLYLW\BJURXSBKDVQHZWUDQVDFWLRQ
FRGHVDGGHGWRLW

&RS\LQJ$FWLYLW\*URXSV
$VVKRZQLQFKDSWHUWKHVHFWLRQ&RS\DQG&KDQJH([LVWLQJ8VHU5ROH7HPSODWHVFRS\LQJ
PHDQVWKDW\RXUHSURGXFHDQH[LVWLQJDFWLYLW\JURXS<RXFDQFKRRVHZKHWKHURUQRW\RX
ZDQWWRFRS\WKHXVHUDVVLJQPHQWZLWKWKLVDFWLYLW\JURXS
2QWKH$FWLYLW\*URXS0DLQWHQDQFHVFUHHQHQWHUWKHQDPHRIWKHDFWLYLW\JURXSZKLFK\RX
ZRXOGOLNHWRFRS\RUVHOHFWLWE\XVLQJSRVVLEOHHQWULHV7KHQFKRRVH WRFRS\LW2QWKH
IROORZLQJVFUHHQHQWHUWKHQHZQDPHIRUWKHFRSLHGDFWLYLW\JURXS)RUDPRUHGHWDLOHG
GHVFULSWLRQVHHFKDSWHUWKHVHFWLRQ&RS\DQG&KDQJH([LVWLQJ8VHU5ROH7HPSODWHV

'HULYLQJ$FWLYLW\*URXSV
'HULYLQJDQDFWLYLW\JURXS DOVRFDOOHGWUDQVDFWLRQLQKHULWDQFH PHDQV\RXFDQXVHDQ
H[LVWLQJDFWLYLW\JURXSDVDUHIHUHQFH(VVHQWLDOO\WKHV\VWHPWUDQVIHUVWKHWUDQVDFWLRQVIURP
DQH[LVWLQJDFWLYLW\JURXS7KLVSURFHVVRIGHULYLQJRQHDFWLYLW\JURXSIURPDQRWKHULVRQO\
SRVVLEOHLI\RXKDYHQRW\HWDVVLJQHGDQ\WUDQVDFWLRQVWRWKHQHZDFWLYLW\JURXS7KH
SUHYLRXVDFWLYLW\JURXSSDVVHVRQDOOLWVWUDQVDFWLRQVWRWKHDFWLYLW\JURXSGHSHQGHQWRQLW,I
\RXXVHGHULYHGDFWLYLW\JURXSVLWLVHDV\WRPDLQWDLQFRQVLVWHQF\EHWZHHQDFFHVVWR
WUDQVDFWLRQFRGHV

,I\RXDUHJRLQJWRXVHGHULYHGDFWLYLW\JURXSVLWGRHVQRWPDNHPXFKVHQVHWRXVH
WHPSODWHVRUPDQXDOO\LQVHUWHGDXWKRUL]DWLRQVZLWKWKHRULJLQDODFWLYLW\JURXS2QO\WKH
WUDQVDFWLRQFRGHVDUHSDVVHGDORQJWRWKHGHULYHGDFWLYLW\JURXS7KHPDQXDOO\LQVHUWHG
DXWKRUL]DWLRQVDQGWHPSODWHVLQDFWLYLW\JURXSZLOOQRWEHFRSLHGLQWRDFWLYLW\JURXS
QRUZLOOWKHOLQNDJHEHPDLQWDLQHGLIPDQXDOO\LQVHUWHGLQDFWLYLW\JURXS 

Release 4.6A/B
6–17
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups

$VRI5HOHDVH%LWLVDOVRSRVVLEOHWRDGMXVWDQGJHQHUDWHWKHSURILOHVIRUDOODFWLYLW\
JURXSVGHULYHGIURPWKHRULJLQDODFWLYLW\JURXS$OOWKHDXWKRUL]DWLRQGDWDIRUWKLVDFWLYLW\
JURXSLVSDVVHGWRWKHGHULYHGDFWLYLW\JURXSVH[FHSWIRUWKHRUJDQL]DWLRQDOOHYHOV7KH
RUJDQL]DWLRQDOOHYHOVRIWKHGHULYHGDFWLYLW\JURXSVUHPDLQXQFKDQJHG7KHGDWDIRUWKH
FRUUHVSRQGLQJRUJDQL]DWLRQDOOHYHOLVRQO\SDVVHGLIQRGDWDKDVEHHQPDLQWDLQHGIRUWKH
RUJDQL]DWLRQDOOHYHOLQDGHULYHGDFWLYLW\JURXS
7RH[HFXWHWKLVDFWLRQ\RXQHHGIXOODXWKRUL]DWLRQIRUWKHREMHFW6B86(5B9$/DVZHOODVWKH
DXWKRUL]DWLRQWRFKDQJHWKHGHULYHGDFWLYLW\JURXSV
7RDFFHVVWKLVIXQFWLRQDOLW\FKRRVH$XWKRUL]DWLRQV→$GMXVWGHULYHGDFWLYLW\JURXSVRQWKH
&KDQJH$XWKRUL]DWLRQ'DWDVFUHHQRIWKHRULJLQDODFWLYLW\JURXS

([DPSOH8VDJHRI'HULYHG$FWLYLW\*URXSV
$PDQDJHUZDQWVKHUVWDIIWREHDEOHWRDFFHVVDOOWKHWUDQVDFWLRQVWKDWVKHFDQ+RZHYHU
KHUHPSOR\HHVDUHQRWWRKDYHDOOWKHIXQFWLRQDOLW\WKDWHDFKWUDQVDFWLRQRIIHUV
$VVXFKZHFRXOGFUHDWHDQDFWLYLW\JURXSFDOOHG0$1$*(5$$&&(66ZLWKWKH
WUDQVDFWLRQFRGHV:HZRXOGDOVRPDLQWDLQDOOWKHDXWKRUL]DWLRQILHOGYDOXHVIRUWKLV
DFWLYLW\JURXS7KHQZHZRXOGFUHDWHDQDFWLYLW\JURXSFDOOHG(03/2<((60$1$*(5
$DQGXVH0$1$*(5$$&&(66DVWKHGHULYHGDFWLYLW\JURXS 2QWKH(03/2<((6
0$1$*(5$DFWLYLW\JURXS·VGHVFULSWLRQVFUHHQRIWUDQVDFWLRQ3)&*LQWKHILHOG'LYHUW
$FWLYLW\*URXSZHZRXOGSODFH0$1$*(5$$&&(66 6LQFHRQO\WKHWUDQVDFWLRQVDUH
FRSLHGLQWRWKH´PHQXµ GHULYHGIURP0$1$*(5$$&&(66 ZHVWLOOQHHGWRPDLQWDLQ
WKHDXWKRUL]DWLRQILHOGYDOXHVIRUWKH(03/2<((60$1$*(5$DFWLYLW\JURXS

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 2QWKH$FWLYLW\*URXS0DLQWHQDQFH
VFUHHQHQWHUWKHQDPHIRU\RXUQHZ
DFWLYLW\JURXSLQWKH$FWLYLW\JURXS
ILHOG 2
 &KRRVH &UHDWH
3

Authorizations Made Easy


6–18
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups

 ,Q'HVFULSWLRQHQWHUDVKRUW
GHVFULSWLRQ
 8QGHU$FWLYLW\JURXSGHVFULSWLRQ
HQWHUDORQJGHVFULSWLRQ
 8QGHU7UDQVDFWLRQLQKHULWDQFHVHOHFW
4
DQDFWLYLW\JURXSIURPZKLFK\RX
ZDQWWRLQKHULWWKHWUDQVDFWLRQVE\
HLWKHUHQWHULQJWKHQDPHLQWKH
'HULYHIURPDFWLYLW\JURXSILHOGRUE\
XVLQJSRVVLEOHHQWULHV

 &KRRVH<HV

Release 4.6A/B
6–19
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups

 &KRRVH  8
 7RUHYLHZWKHLQKHULWHGWUDQVDFWLRQV
FKRRVHWKH0HQXWDE

$OOWKHWUDQVDFWLRQVIURP\RXU
RULJLQDODFWLYLW\JURXSKDYHEHHQ
LQKHULWHG7KHPHQXLVJRLQJWRORRN
WKHVDPHIRUWKHXVHUDV\RXGHILQHG
LWKHUH
1RZ\RXFDQPDLQWDLQWKH
DXWKRUL]DWLRQVIRUWKHDFWLYLW\JURXS

Authorizations Made Easy


6–20
Chapter 6: Advanced Profile Generator Functionality
Selecting Workflow Tasks

6HOHFWLQJ:RUNIORZ7DVNV

:KDW<RX6KRXOG.QRZ$ERXW:RUNIORZ
7KLVVHFWLRQSURYLGHVDVWHSE\VWHSVDPSOH6$3%XVLQHVV:RUNIORZDQGDQH[SODQDWLRQRI
ZKDW\RXVKRXOGNQRZDERXWWDVNVEHIRUH\RXDVVLJQWKHPWR\RXUDFWLYLW\JURXS
7DVNVDUHXVHGWRH[SHGLWHDEXVLQHVVSURFHGXUH$WDVNFDQEHHLWKHUDVLQJOHVWHSWDVNRUD
PXOWLVWHSWDVN,QWKHIROORZLQJH[DPSOHFUHDWLQJWKH5HTXHVWIRU/HDYHIRUPDQGWKHQ
FKHFNLQJWKLVUHTXHVWDUHERWKVLQJOHVWHSWDVNV7KHSURFHGXUHIRUSURFHVVLQJD5HTXHVWIRU
/HDYHIRUPLVDPXOWLVWHSWDVNFRQVLVWLQJRIVHYHUDOFRPELQHGVLQJOHVWHSWDVNV
7KHUHDUHGLIIHUHQFHVEHWZHHQWKHVLQJOHVWHSVWDQGDUGWDVNVDQGWKHPXOWLVWHSZRUNIORZ
WHPSODWHV6WDQGDUGWDVNVDUHWKHVLQJOHVWHSWDVNVXVHGLQ6$3·VZRUNIORZWHPSODWHV0DQ\
VWDQGDUGWDVNVDQGZRUNIORZWHPSODWHVDUHSURYLGHGE\6$3DQGVKRXOGQRWEHFKDQJHGE\
FXVWRPHUV&XVWRPHUVFDQKRZHYHUFRS\DQGPRGLI\WKHVHWHPSODWHVWRFUHDWHWKHLURZQ
VWDQGDUGWDVNVDQGZRUNIORZWHPSODWHV

:RUNIORZREMHFWVWKDWFDQEHOLQNHGWRDQDFWLYLW\JURXS

6WDQGDUGWDVNV 76 76²FOLHQWLQGHSHQGHQW

:RUNIORZWHPSODWHV :6 :6FOLHQW

([DPSOH6DPSOH:RUNIORZIRUD1RWLILFDWLRQ$EVHQFH

7KLVSURFHVVEHJLQVZKHQDQHPSOR\HHVXEPLWVDFRPSOHWHG5HTXHVWIRU/HDYHIRUP7KLV
IRUPLVDXWRPDWLFDOO\IRUZDUGHGWRWKHHPSOR\HH·VVXSHUYLVRU,IWKHVXSHUYLVRUDSSURYHV
WKHUHTXHVWWKHHPSOR\HHLVLQIRUPHGDQGWKHZRUNIORZHQGV,IWKHVXSHUYLVRUUHMHFWVWKH
UHTXHVWWKHHPSOR\HHPXVWGHFLGHZKHWKHUKHRUVKHVKRXOGWRUHYLVHWKHUHTXHVWRU
ZLWKGUDZLWFRPSOHWHO\,IWKHHPSOR\HHGHFLGHVWRUHYLVHWKHUHTXHVWWKHIRUPLV
DXWRPDWLFDOO\UHWXUQHGWRWKHHPSOR\HH·VLQER[DQGWKHZRUNIORZEHJLQVDJDLQ
,QWKHIROORZLQJSURFHGXUHZHVKRZKRZWRDVVLJQWKHVWDQGDUGWDVN&RQILUPDWLRQRI/HDYH
5HTXHVWWRWKHDFWLYLW\JURXS),6XSHUYLVRU

Release 4.6A/B
6–21
Chapter 6: Advanced Profile Generator Functionality
Selecting Workflow Tasks

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 2QWKH$FWLYLW\*URXS0DLQWHQDQFH
VFUHHQVHOHFW2YHUYLHZ 2UJDQL]DWLRQ
0DQDJHPHQWDQGZRUNIORZ 
 2QWKH&KDQJH$FWLYLW\*URXSV
VFUHHQFKRRVHWKH:RUNIORZWDE 3
 &KRRVH :RUNIORZWDVNV
4

7KH:RUNIORZWDELVRQO\GLVSOD\HGLI\RXVHOHFWHG2YHUYLHZ 2UJDQL]DWLRQ0DQDJHPHQWDQG
ZRUNIORZ DWWKHEHJLQQLQJRIWUDQVDFWLRQ3)&*,I\RXGRQRWVHHWKLVWDEWKHYLHZ%DVLF
PDLQWHQDQFH PHQXVSURILOHVRWKHUREMHFWV ZDVSUREDEO\VHOHFWHGRQWKH$FWLYLW\*URXS
0DLQWHQDQFHVFUHHQ

 &KRRVH WRDGGDWDVN

 6HOHFWWKHGHVLUHGWDVNW\SH IRU
H[DPSOH6WDQGDUGWDVN 
6
 &KRRVH 

$OWKRXJKWKHRSWLRQV:RUNIORZWDVNDQG7DVNVWLOODSSHDUWKH\DUHQRORQJHUXVHGRU
VXSSRUWHG

 &KRRVH WRFRQWLQXH
8

Authorizations Made Easy


6–22
Chapter 6: Advanced Profile Generator Functionality
Selecting Workflow Tasks

 6HOHFWWKHGHVLUHGLWHP IRUH[DPSOH
&RQILUPDWLRQRI/HDYH5HTXHVW 
10
 &KRRVH 

 &KRRVHWKHFRUUHFWWLPHSHULRGIRU
WKHDVVLJQPHQW
 &KRRVH 

11
12

 &KRRVH 
13
7KHVHOHFWHGWDVNLVQRZDVVLJQHGWR
WKHDFWLYLW\JURXS(YHU\RQHWR
ZKRPWKLVDFWLYLW\JURXSZLOOEH
DVVLJQHGFDQFRQILUPWKHOHDYH
UHTXHVWLQWKHGHILQHGWLPHSHULRG

Release 4.6A/B
6–23
Chapter 6: Advanced Profile Generator Functionality
Deleting Activity Groups

'HOHWLQJ$FWLYLW\*URXSV

:KHQ\RXGHOHWHDQDFWLYLW\JURXSWKHV\VWHPDXWRPDWLFDOO\GHOHWHVDQ\DVVLJQPHQWV
H[LVWLQJEHWZHHQWKHDFWLYLW\JURXSDQG5XVHUVSRVLWLRQVMREVRURUJDQL]DWLRQDO
XQLWV

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 ,QWKH$FWLYLW\*URXS0DLQWHQDQFH
VFUHHQVHOHFWWKHDFWLYLW\JURXS\RX 3
ZRXOGOLNHWRGHOHWHE\HLWKHU
HQWHULQJWKHQDPHLQWKH$FWLYLW\
2
JURXSILHOGRUFKRRVLQJSRVVLEOH
HQWULHV
 &KRRVH WRGHOHWHWKHDFWLYLW\
JURXS

 &KRRVH<HV

9HULI\WKDW\RXUDFWLYLW\JURXSZDV
DFWXDOO\HQWHUHGLQDWUDQVSRUWUHTXHVW
FRPSOHWHGHDUOLHU2WKHUZLVHWKH
GHOHWLRQFDQQRWEHWUDQVSRUWHG
 &KRRVH 
7KHFKRVHQDFWLYLW\JURXSDQGDOOWKH
FRUUHVSRQGLQJDVVLJQPHQWVKDYH
QRZEHHQGHOHWHG7KHDXWKRUL]DWLRQ
SURILOHV³LQFOXGLQJWKH 5
DXWKRUL]DWLRQVJHQHUDWHGIRUWKLV
DFWLYLW\JURXS³DUHDOVRGHOHWHG

Authorizations Made Easy


6–24
Chapter 6: Advanced Profile Generator Functionality
Postmaintaining User Role Templates

3RVWPDLQWDLQLQJ8VHU5ROH7HPSODWHV

7RJHQHUDWHDQDXWKRUL]DWLRQSURILOH\RXPXVWILUVWFUHDWHRUXVHDQH[LVWLQJDFWLYLW\JURXS
,QFKDSWHU8VHU5ROH7HPSODWHVZHGHPRQVWUDWHGKRZWRXVHWKHXVHUUROHWHPSODWHVDQG
JHQHUDWHGWKHUHODWHGDXWKRUL]DWLRQVDQGWKHLUSURILOHV,QWKLVVHFWLRQZHVKRZ\RXKRZWR
SRVWPDLQWDLQH[LVWLQJDFWLYLW\JURXSVLQJUHDWHUGHWDLO
2QFH\RXKDYHGHILQHGDQDFWLYLW\JURXSXVHWKH3URILOH*HQHUDWRU 3* WRDXWRPDWLFDOO\
JHQHUDWHDQDXWKRUL]DWLRQSURILOH$XWKRUL]DWLRQVDXWRPDWLFDOO\JHQHUDWHGIRUDFWLYLW\
JURXSVXVH6$3VXSSOLHGGDWDVRWKDWPRVWILHOGVDUHDOUHDG\ILOOHGZLWKSURSRVHGYDOXHV
7RJHQHUDWHDQDXWKRUL]DWLRQSURILOH
 6WDUWWKHJHQHUDWLRQSURFHVV
 0DLQWDLQWKHRUJDQL]DWLRQDOOHYHOV
 3RVWHGLWWKHDXWKRUL]DWLRQVDQGRUJDQL]DWLRQDOOHYHOV

7KH6$3GHOLYHUHGXVHUUROHWHPSODWHVDOUHDG\KDYHVRPHDXWKRUL]DWLRQGDWD$OORSHQ
DXWKRUL]DWLRQILHOGVDQGRUJDQL]DWLRQDOOHYHOVVXFKDVFRPSDQ\FRGHVEXVLQHVVDUHDVRU
SODQWVKDYHWKHDVWHULVNV IRUIXOODXWKRUL]DWLRQDVVLJQHGEXWWKHSURILOHVDUHQRW
JHQHUDWHG\HW

'LIIHUHQW6HWWLQJVIRUWKH0DLQWHQDQFH9LHZ
<RXKDYHGLIIHUHQWRSWLRQVWRGLVSOD\VHYHUDOEXWWRQVLQWKHWUHHVWUXFWXUHIRUWKHPDLQWHQDQFHSURFHVV
7RDFFHVVWKHVHOHFWLRQVFUHHQVWDUWWKH3*DQGJRWRWKH&KDQJH$FWLYLW\*URXSVVFUHHQ2QWKH
$XWKRUL]DWLRQVWDEFKRRVH &KDQJHDXWKRUL]DWLRQGDWD&KRRVH8WLOLWLHV→6HWWLQJVWRJHWWRWKH'HILQH
6HWWLQJVIRU8VHUZLQGRZ
'LIIHUHQWEXWWRQVVLPSOLI\\RXUZRUN,Q
WKHWUHHVWUXFWXUH\RXVHH
²2YHUYLHZRIDXWKRUL]DWLRQREMHFWXVH
²0HUJLQJVHYHUDODXWKRUL]DWLRQV
²&RS\LQJDXWKRUL]DWLRQ
²'HOHWLQJILHOGFRQWHQWV
7KHWHFKQLFDOQDPHLVGLVSOD\HGDWWKHHQG
RIWKHFRUUHVSRQGLQJOLQH
6DYH\RXUVHWWLQJVDIWHUWKHVHOHFWLRQ
)RUIXUWKHUH[SODQDWLRQRIWKHLFRQVFKRRVH
RQWKH&KDQJH$FWLYLW\*URXSVVFUHHQ

Release 4.6A/B
6–25
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles

0DLQWDLQLQJDQG*HQHUDWLQJWKH$XWKRUL]DWLRQ3URILOHV

,QWKLVVHFWLRQZHDVVXPHWKHDFWLYLW\JURXSKDVDOUHDG\EHHQFUHDWHGDQGVDYHG:HVKRZKRZWR
JHQHUDWHWKHDXWKRUL]DWLRQSURILOHVIRUWKHDFWLYLW\JURXS
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHDFWLYLW\JURXS\RXZDQWWR
PDLQWDLQDQGFKRRVH &KDQJH IRU
H[DPSOH00B%8<(5B$* 
 2QWKH&KDQJH$FWLYLW\*URXSV
VFUHHQFKRRVHWKH$XWKRUL]DWLRQVWDE
3
 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD

Tip

7KHUHGOLJKW RQWKH$XWKRUL]DWLRQV
WDELQGLFDWHVWKDWQRDXWKRUL]DWLRQ 4
SURILOHVKDYHEHHQJHQHUDWHGIRUWKLV
DFWLYLW\JURXS<RXFDQDOVRVHHWKH
VWDWXVIRUWKHDXWKRUL]DWLRQSURILOHLQ
WKH,QIRUPDWLRQRQDXWKRUL]DWLRQSURILOH
ER[
2QWKH&KDQJH$FWLYLW\*URXS
$XWKRUL]DWLRQVVFUHHQWKH
DXWKRUL]DWLRQVGDWDDSSHDUV
KLHUDUFKLFDOO\
7KHDFWLYLW\JURXSDSSHDUVDWWKH
ILUVWOHYHO KLJKOLJKWHGLQEOXH 
Tip
8QGHUQHDWK\RXILQGOLQHV
KLJKOLJKWHGDVIROORZV 5
< 2EMHFWFODVVHV RUDQJH
< $XWKRUL]DWLRQREMHFW JUHHQ
< $XWKRUL]DWLRQ \HOORZ
< $XWKRUL]DWLRQILHOGV OLJKWEOXH
7RYLHZWKHOHJHQGIRUWKHLFRQV
DQGFRORUVFKRRVH 
 7RPDLQWDLQRUFKDQJHWKHDFWLYLW\
GRXEOHFOLFNRQWKHHQWU\QH[WWRWKH
DFWLYLW\ILHOG

Authorizations Made Easy


6–26
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles

7RGLVSOD\DOOVHOHFWHGWUDQVDFWLRQVWKDWFKHFNWKLVDXWKRUL]DWLRQREMHFWIRUWKHXQGHUO\LQJ
DFWLYLW\JURXSFKRRVH 
([SODQDWLRQRIWKHOLJKWV
*UHHQ$OODXWKRUL]DWLRQILHOGVKDYHEHHQPDLQWDLQHG
5HG2UJDQL]DWLRQDOOHYHOVDUHQRWPDLQWDLQHG
<HOORZ2SHQDXWKRUL]DWLRQILHOGVZLWKRXWYDOXHVH[LVWWKDWDUHQRWRUJDQL]DWLRQDO
OHYHOV

 6HOHFWRUGHVHOHFWDOOGHVLUHGYDOXHV
IRUWKHDFWLYLW\ \RXFDQXVH)XOO
DXWKRUL]DWLRQ 
6
 7RWUDQVIHU\RXUVHOHFWLRQFKRRVH


 7RPDLQWDLQWKHYDOXHVIRUWKHRSHQ
DXWKRUL]DWLRQVFOLFNQH[WWRWKH
DXWKRUL]DWLRQILHOGQDPH

 (QWHUDVLQJOHYDOXHLQWKH)URP
FROXPQRUDYDOXHUDQJHLQWKH)URP
DQG7RFROXPQVHLWKHUGLUHFWO\RUE\
XVLQJSRVVLEOHHQWULHV 9

)RUPXOWLSOHVHOHFWLRQVILOOLQWKH
URZVEHORZWKHHQWU\
 7RWUDQVIHUWKHGDWDFKRRVH 
10

Release 4.6A/B
6–27
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles

$IWHUPDLQWDLQLQJWKHDFWLYLW\DQG
WKHILHOGYDOXHVIRUWKHDXWKRUL]DWLRQ
WKHOLJKWFKDQJHVIURP\HOORZWR
JUHHQ
 7RPDLQWDLQWKHPLVVLQJ
RUJDQL]DWLRQDOOHYHOVFOLFNRQWKH
ILHOGQH[WWRWKHDXWKRUL]DWLRQILHOG
QDPH IRUH[DPSOH&RPSDQ\&RGH
XQGHUWKHREMHFW$XWKRUL]DWLRQIRU
&RPSDQ\&RGHV

11

 (QWHUDVLQJOHYDOXHLQWKH)URP
FROXPQRUDYDOXHUDQJHLQWKH)URP
DQG7RFROXPQVHLWKHUGLUHFWO\RUE\
XVLQJSRVVLEOHHQWULHV 12

)RUPXOWLSOHVHOHFWLRQVILOOLQWKH
URZVEHORZWKHHQWU\
 7RWUDQVIHUWKHGDWDFKRRVH 
13

$IWHUPDLQWDLQLQJWKHPLVVLQJGDWD 14
IRUWKLVRUJDQL]DWLRQDOOHYHOWKHOLJKW
FKDQJHVIURPUHGWRJUHHQ
3URFHHGZLWKWKHRWKHURSHQILHOGVLQ Tip
WKHVDPHZD\XQWLODOOOLJKWVKDYH
FKDQJHGWRJUHHQ
 7RVDYH\RXUFKDQJHVFKRRVH 

7RDVVLJQIXOODXWKRUL]DWLRQVWRDOORSHQ
ILHOGVFOLFNRQWKH\HOORZOLJKWDWWKH
WRSQH[WWRWKHDFWLYLW\JURXS

Authorizations Made Easy


6–28
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles

5HPHPEHUWRPDLQWDLQHDFKRSHQDXWKRUL]DWLRQILHOGZLWKDVXLWDEOHYDOXH)RUVRPH
DXWKRUL]DWLRQVHQWHUDVXLWDEOHYDOXHLQ$XWKRUL]DWLRQJURXS,I\RXDUHQRWVXUHRID
VXLWDEOHYDOXHXVHWKHDVWHULVN WRDVVLJQRYHUDOODXWKRUL]DWLRQIRUXQPDLQWDLQHGILHOGV
5HPHPEHUWKDW\RXFDQDOZD\VFKDQJHYDOXHVODWHU

:KHQDOOOLJKWVKDYHFKDQJHGWR
JUHHQDQG\RXKDYHVDYHG\RXU
FKDQJHVJHQHUDWHWKHDXWKRUL]DWLRQ 15
SURILOH
 7RJHQHUDWHWKHDXWKRUL]DWLRQV
FKRRVH 

7KHV\VWHPJHQHUDWHVDQDXWKRUL]DWLRQIRUHDFKDXWKRUL]DWLRQLQWKHWUHHDQGDQ
DXWKRUL]DWLRQSURILOHIRUWKHDFWLYLW\JURXSWKDWDSSOLHVWRWKHHQWLUHWUHH

 7KH$VVLJQ3URILOH1DPHIRU*HQHUDWHG
$XWKRUL]DWLRQ3URILOHGLDORJER[
16
DSSHDUV7KHV\VWHPVXJJHVWV
7BLQWHUQDOQXPEHU!DVWKHGHIDXOW
SURILOHQDPH
17
 &KRRVH 

7KHVKRUWSURILOHQDPHFDQQRWEHFKDQJHGODWHU+RZHYHUWKHORQJWH[WIRUWKHSURILOHFDQ
EHFKDQJHGDWDQ\WLPH

1DPLQJ&RQYHQWLRQVIRU$XWKRUL]DWLRQ3URILOHVDQG$XWKRUL]DWLRQV*HQHUDWHGZLWK
WKH3*
:KHQ\RXVDYH\RXUFKDQJHV\RXDUHSURPSWHGWRHQWHUDSURILOHQDPH+RZHYHURQO\
WKHILUVWFKDUDFWHUV WKHSURILOHWRUVR FDQEHIUHHO\DVVLJQHG7KHQXPEHURISURILOHV
JHQHUDWHGGHSHQGVRQWKHQXPEHURIDXWKRUL]DWLRQVLQHDFKDFWLYLW\JURXS$PD[LPXP
RIDSSUR[LPDWHO\DXWKRUL]DWLRQVFDQILWLQWRDSURILOH,IWKHUHDUHPRUHWKDQ
DXWKRUL]DWLRQVDQDGGLWLRQDOSURILOHLVJHQHUDWHG,WKDVWKHVDPHFKDUDFWHUWRUVRDVWKH
SURILOHQDPHDQGWKHODVWWZRGLJLWVDUHXVHGDVDFRXQWHU
7RDYRLGFRQIOLFWVEHWZHHQFXVWRPHUGHILQHGDQG6$3VXSSOLHGSURILOHVGRQRWXVHDQ\
QDPHZLWKDQXQGHUVFRUH B LQWKHVHFRQGSRVLWLRQ6$3SODFHVQRRWKHUUHVWULFWLRQVRQ
WKHQDPLQJRIDXWKRUL]DWLRQSURILOHV UHIHUDOVRWRQRWH ,I\RXUFRPSDQ\KDVLWV
RZQQDPLQJFRQYHQWLRQV\RXPD\RYHUZULWHSURSRVHGQDPHV

Release 4.6A/B
6–29
Chapter 6: Advanced Profile Generator Functionality
Displaying an Overview of Generated Profiles

7KHQDPHVRIWKHDXWKRUL]DWLRQVDUHDOVRGHULYHGIURPWKHSURILOHWRUVR7KHODVWWZRGLJLWV
DUHXVHGDVDFRXQWHUZKHQPRUHWKDQRQHDXWKRUL]DWLRQLVUHTXLUHGIRUDQREMHFW
'HSHQGLQJRQWKHDXWKRUL]DWLRQSURILOHQDPHWKHWHFKQLFDOQDPHVIRUDXWKRUL]DWLRQVDUH
WKHQQDPHGDVIROORZV
< %HJLQZLWKD7
< &RPSULVHDQLQWHUQDOQXPEHU
< (QGZLWKDWZRGLJLWQXPEHUEHWZHHQDQG
6DPSOHDXWKRUL]DWLRQQDPH7

7KHDXWKRUL]DWLRQREMHFW6B86(5B352LVFKHFNHGGXULQJDXWKRUL]DWLRQPDLQWHQDQFH7KH
REMHFWLVGHILQHGZLWKWKHIROORZLQJILHOGV$XWKRUL]DWLRQSURILOHDQG$FWLYLW\,Q
$XWKRUL]DWLRQSURILOHHQWHUWKHDXWKRUL]DWLRQSURILOHVWKDWDQDXWKRUL]DWLRQDGPLQLVWUDWRU
FDQPDLQWDLQRUWKDWXVHUDGPLQLVWUDWRUVFDQDVVLJQWRWKHLUXVHUV,Q$FWLYLW\\RXFDQ
OLPLWZKDWWKHDGPLQLVWUDWRULVDOORZHGWRGR
,I\RXZDQWWRVHWXSDQDXWKRUL]DWLRQDGPLQLVWUDWRUZKRFDQPDLQWDLQRQO\FHUWDLQ
SURILOHVVHWXS\RXURZQQDPLQJFRQYHQWLRQ

'LVSOD\LQJDQ2YHUYLHZRI*HQHUDWHG3URILOHV

$IWHUVXFFHVVIXOO\JHQHUDWLQJWKHDXWKRUL]DWLRQSURILOHVWRILQGRXWKRZPDQ\SURILOHVZHUH
JHQHUDWHG\RXKDYHWRNQRZWKHQXPEHURIDXWKRUL]DWLRQVLQHDFKDFWLYLW\JURXS$
PD[LPXPRIDSSUR[LPDWHO\DXWKRUL]DWLRQVILWLQWRDSURILOH,IWKHUHDUHPRUHWKDQ
DXWKRUL]DWLRQVDQDGGLWLRQDOSURILOHLVJHQHUDWHG,WKDVWKHVDPHFKDUDFWHUWRUVRDVWKH
SURILOHQDPHZLWKWKHODVWWZRGLJLWVXVHGDVDFRXQWHU

,IDQDFWLYLW\JURXSLVFKDQJHGVRWKDWRQHSURILOHEHFRPHVWZRRUPRUHWKHDGGLWLRQDO
SURILOHVDUHDXWRPDWLFDOO\DVVLJQHGWRDOOWKHRULJLQDOSURILOH·VXVHUV7KHXVHUPDVWHURIWKLV
XVHULVDXWRPDWLFDOO\XSGDWHG

,QWKHIROORZLQJSURFHGXUHZHGHPRQVWUDWHKRZWRGLVSOD\WKHRYHUYLHZRIWKHJHQHUDWHG
SURILOHVIRUWKHDFWLYLW\JURXS6$3B$//B',63/$<B$*ZKLFKFRQWDLQWKHDXWKRUL]DWLRQWR
GLVSOD\´HYHU\WKLQJµH[FHSWIRU+5
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHDFWLYLW\JURXS\RXZRXOGOLNHWRYLHZ IRUH[DPSOH00B%8<(5B$* DQG
FKRRVH &KDQJH
 2QWKH&KDQJH$FWLYLW\*URXSVVFUHHQFKRRVHWKH$XWKRUL]DWLRQVWDE
 &KRRVH &KDQJH$XWKRUL]DWLRQ'DWD

Authorizations Made Easy


6–30
Chapter 6: Advanced Profile Generator Functionality
Displaying an Overview of Generated Profiles

 &KRRVH$XWKRUL]DWLRQV→3URILOH
2YHUYLHZ 5

,IWKHJHQHUDWHGDXWKRUL]DWLRQ
SURILOHVDUHDOUHDG\DFWLYHWKHGLDORJ
ER[SURYLGHVDQRYHUYLHZRIWKH
FXUUHQWSURILOHZLWKSURILOHQDPH
ORQJWH[WDQGWKHVWDWXVRIWKH
YHUVLRQ

Release 4.6A/B
6–31
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes

5HJHQHUDWLQJ$XWKRUL]DWLRQ3URILOHV$IWHU0DNLQJ
&KDQJHV

:KHQDQDFWLYLW\JURXSLVFKDQJHGIRUH[DPSOHDIWHU\RXDGGWUDQVDFWLRQVUHJHQHUDWHLWV
DXWKRUL]DWLRQSURILOHVZLWKWUDQVDFWLRQ3)&*
)RUWKHIROORZLQJH[DPSOHZHKDYHWDNHQWKHDFWLYLW\JURXS00B%8<(5B$*DGGHGVRPH
WUDQVDFWLRQVDQGVDYHGWKHFKDQJHV1RZZHKDYHVRPHPRUHDXWKRUL]DWLRQVWKDWQHHGWREH
PDLQWDLQHGDQGWKHDFWLYLW\JURXSQHHGVWREHUHJHQHUDWHG

:KHQ\RXFKDQJHDQDFWLYLW\JURXSWKHVWDWXVRQWKH$XWKRUL]DWLRQVWDELQGLFDWHVZKHWKHU
DSURILOHLVFXUUHQWRUQRW,IWKHGLVSOD\VKRZVDUHGRU\HOORZOLJKWWKHSURILOHLVQRW
FXUUHQW7KHVWDWXVWH[WRQWKHVFUHHQH[SODLQVZK\WKHSURILOHLVQRWFXUUHQW
< 5HGOLJKWDQGWKHWH[W3URILOHFRPSDULVRQUHTXLUHG
7KHPHQXKDVEHHQFKDQJHGVLQFHWKHSURILOHZDVODVWJHQHUDWHG7KHUHIRUHWKHSURILOH
LVQRWFXUUHQWDQGWKHDXWKRUL]DWLRQSURILOHVQHHGVWREHUHJHQHUDWHG<RXPD\DOVR
KDYHWRPDLQWDLQWKHDXWKRUL]DWLRQILHOGYDOXHV
< <HOORZOLJKW
7KHSURILOHKDVEHHQFKDQJHGDQGVDYHGVLQFHLWZDVODVWJHQHUDWHGWKHSURILOHLVQRW
FXUUHQWDQ\PRUHDQGWKHDXWKRUL]DWLRQSURILOHQHHGVWREHUHJHQHUDWHG
< ,I\RXDUHXQVXUHZKHWKHUDQDXWKRUL]DWLRQSURILOHVVKRXOGEHUHJHQHUDWHG
15XQWUDQVDFWLRQSUPC
26HOHFW$OVRDFWJUSVWREHDGMXVWHG
3&KRRVH WRH[HFXWHWKHWUDQVDFWLRQ
7KHV\VWHPJHQHUDWHVDOLVWRIDOODFWLYLW\JURXSVZLWKH[LVWLQJDXWKRUL]DWLRQGDWDLQWKH
V\VWHP$FWLYLW\JURXSVLQUHGQHHGWREHUHJHQHUDWHGDIWHUSRVWPDLQWDLQLQJDQ\RSHQ
DXWKRUL]DWLRQILHOGV6HOHFWRQHRIWKHVHDFWLYLW\JURXSVDQGFKRRVH0DLQWDLQSURILOH)URP
SUPCFDOOWUDQVDFWLRQPFCGDQGSURFHHGDVGHVFULEHGEHORZ

Authorizations Made Easy


6–32
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes

3UHUHTXLVLWH<RXPXVWPDNHFKDQJHVWR
DQDFWLYLW\JURXSDQGVDYHWKHPEHIRUH
\RXFDQUHJHQHUDWHDXWKRUL]DWLRQ
SURILOHV
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRU
H[DPSOH00B%8<(5B$* DQG
FKRRVH &KDQJH
 2QWKH$XWKRUL]DWLRQVWDEFKRRVH
([SHUWPRGHIRUSURILOHJHQHUDWLRQ

,QH[SHUWPRGH\RXFDQVHOHFWH[SOLFLWO\
WKHRSWLRQZLWKZKLFK\RXZDQWWR
PDLQWDLQWKHDXWKRUL]DWLRQYDOXHV7KLV 3
RSWLRQLVDXWRPDWLFDOO\VHWFRUUHFWO\LQ
QRUPDOPRGH
 6HOHFW5HDGROGVWDWXVDQGPHUJHZLWK
QHZGDWD
4
 &KRRVH 
5

2SWLRQVRQWKH'HILQH0DLQWHQDQFH7\SHVFUHHQ
< 'HOHWHDQGUHFUHDWHSURILOHDQGDXWKRUL]DWLRQV
$OODXWKRUL]DWLRQVDUHUHFUHDWHG9DOXHVWKDWKDYHSUHYLRXVO\EHHQPDLQWDLQHG
FKDQJHGRUHQWHUHGPDQXDOO\DUHORVW2QO\WKHPDLQWDLQHGYDOXHVIRURUJDQL]DWLRQDO
OHYHOVUHPDLQ
< (GLWROGVWDWXV
<RXFDQHGLWWKHDXWKRUL]DWLRQSURILOH\RXSUHYLRXVO\PDLQWDLQHGZLWKLWVROGYDOXHV
,WLVQRWZRUWKHGLWLQJLIWKHDVVLJQPHQWRIWUDQVDFWLRQVWRDFWLYLW\JURXSVKDV
FKDQJHG
< 5HDGROGVWDWXVDQGPHUJHZLWKQHZGDWD
7KH3*FRPSDUHVWKHROGDQGFXUUHQWGDWDIURPWKHDFWLYLW\JURXS7KLVFKRLFHLVWKH
EHVWRSWLRQLIWKHDFWLYLW\JURXSKDVFKDQJHG8QFKDQJHGGDWDLVPDUNHGDV2OGQHZ
GDWDDV1HZ

Release 4.6A/B
6–33
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes

:HDGGHGDIHZWUDQVDFWLRQVWRWKH
DFWLYLW\JURXS7KHSUHYLRXVO\
PDLQWDLQHGRUJDQL]DWLRQDOOHYHOVDUH
NHSW:KHQQHZRUJDQL]DWLRQDOOHYHOV
DUHDGGHGWKH\PXVWEHPDLQWDLQHG
 0DLQWDLQWKHRUJDQL]DWLRQDOOHYHOV
ZLWKWKHULJKWYDOXHVRUFKRRVH)XOO
DXWKRUL]DWLRQWRILOODOOEODQNVZLWK
DVWHULVNV  :HFKRVH)XOO
DXWKRUL]DWLRQLQRXUH[DPSOH
 &KRRVH  7

2OGDXWKRUL]DWLRQVDUHPDUNHG2OG 9
QHZDXWKRUL]DWLRQVDUHPDUNHG1HZ
 0DLQWDLQWKHRSHQILHOGVDV
GHVFULEHGLQ0DLQWDLQLQJDQG
*HQHUDWLQJWKH$XWKRUL]DWLRQ3URILOHV
RQSDJH²
 &KRRVH 

Authorizations Made Easy


6–34
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes

3OHDVHNHHSWKHIROORZLQJLQPLQGZKHQPDNLQJWKHSRVWFKDQJHFRPSDULVRQ
< 3UHYLRXVO\PDLQWDLQHGRUJDQL]DWLRQDOOHYHOVDUHNHSW,IQHZRUJDQL]DWLRQDOOHYHOVDUH
DGGHG\RXPXVWPDLQWDLQWKHVHOHYHOV
< ,IDXWKRUL]DWLRQVZLWKLQDQDXWKRUL]DWLRQREMHFWKDYHFKDQJHG\RXQHHGWRH[HFXWH
WKHFRPSDULVRQPDQXDOO\<RXPXVWGHFLGHZKHWKHUWRNHHSWKHROGPRGLILHGGDWDRU
XVHWKHFXUUHQWGDWD'HOHWHRUPDLQWDLQWKHDXWKRUL]DWLRQV\RXQRORQJHUUHTXLUH
< 0DLQWDLQHGDXWKRUL]DWLRQVDUHFRQILJXUHGZLWKWKHYDOXHV\RXPDLQWDLQHGIRUWKHP
)RUH[DPSOHIRUDXWKRUL]DWLRQJURXSFHUWDLQDFWLYLWLHV ,QVHUW&KDQJHDQG
'LVSOD\ DQGPDLQWDLQHGDXWKRUL]DWLRQVIRUWKHDFWLYLW\JURXSWUDQVDFWLRQVDUH
UHTXLUHG \RXPDLQWDLQHGWKHYDOXHIRUDXWKRUL]DWLRQJURXS &KDQJHWKHDFWLYLW\
JURXSVRWKDWWKHIROORZLQJDFWLYLWLHVDULVH&KDQJH'LVSOD\DQG'HOHWH7KHYDOXH
LVFRSLHGIRUWKHDXWKRUL]DWLRQJURXSIRU&KDQJHDQG'LVSOD\ WKHVHDFWLYLWLHVZHUH
DOUHDG\PDLQWDLQHG 7KH,QVHUWRSWLRQGLVDSSHDUV)RUWKH'HOHWHDFWLYLW\PDLQWDLQWKH
DXWKRUL]DWLRQJURXSDJDLQVLQFHWKLVJURXSZDVQRWPDLQWDLQHGLQWKHROGSURILOH·V
VWDWXV
< :KHUHYHUWKH1HZDWWULEXWHDSSHDUVFKHFNLIWKHQHZDXWKRUL]DWLRQVPDNHVHQVH \RX
FDQFRPSDUHWKHPPDQXDOO\ZLWKWKHROGYDOXHV 
< 0DQXDOO\HQWHUHGDXWKRUL]DWLRQVDUHQRWGHOHWHG
7KHYDOXHVIRUWKHDXWKRUL]DWLRQREMHFW6B7&2'(DUHDOZD\VDXWRPDWLFDOO\ILOOHGZLWK
WKHFXUUHQWWUDQVDFWLRQIURPWKHDFWLYLW\JURXSEXWKDYHWKHDWWULEXWH2OG

:KHQWKHUHDUHRQO\JUHHQOLJKWVLQWKH
WUHHWKHUHDUHQRPRUHRSHQ
DXWKRUL]DWLRQILHOGVWRPDLQWDLQ
10
 &KRRVH WRUHJHQHUDWHWKHH[LVWLQJ
DXWKRUL]DWLRQSURILOHV
$IWHUWKHUHJHQHUDWLRQRIWKH
DXWKRUL]DWLRQSURILOHVLVILQLVKHG
\RXFDQJREDFNWRWKHPDLQVFUHHQ

Release 4.6A/B
6–35
Chapter 6: Advanced Profile Generator Functionality
Using Utilities to Change Generated Authorizations

8VLQJ8WLOLWLHVWR&KDQJH*HQHUDWHG$XWKRUL]DWLRQV

7KHUHDUHWZRRSWLRQVWRDOWHUWKHDXWRPDWLFDOO\JHQHUDWHGDXWKRUL]DWLRQV7KHVHRSWLRQVDUHIRXQGLQ
WUDQVDFWLRQ3)&*XQGHUWKH8WLOLWLHVPHQXLQWKH&KDQJH$FWLYLW\*URXS$XWKRUL]DWLRQVVFUHHQ

0HUJLQJ$XWKRUL]DWLRQV
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
4
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRU
H[DPSOH00B%8<(5B$* DQG
FKRRVH &KDQJH
 2QWKH$XWKRUL]DWLRQVWDEFKRRVH
&KDQJHDXWKRUL]DWLRQGDWD
 &KRRVH8WLOLWLHV→0HUJH
DXWKRUL]DWLRQV

 7KHV\VWHPDXWRPDWLFDOO\
VXPPDUL]HVDOOSRVVLEOH
DXWKRUL]DWLRQVDQGWKHUHVXOW
DSSHDUVLQDV\VWHPPHVVDJH
,QRXUH[DPSOHWKHVWDWXVEDUVKRZV
WKDWILYHDXWKRUL]DWLRQVKDYH
FRPELQHGZLWKRWKHUV

Authorizations Made Easy


6–36
Chapter 6: Advanced Profile Generator Functionality
Using Utilities to Change Generated Authorizations

5HRUJDQL]LQJ7HFKQLFDO1DPHVRI$XWKRUL]DWLRQV
7KHWHFKQLFDOQDPHRIDQDXWKRUL]DWLRQIRUDQDXWKRUL]DWLRQREMHFWLVWKHQDPHRIWKHDFWLYLW\JURXSDQGD
WZRGLJLWQXPEHUEHWZHHQDQG
7LQWHUQDOQXPEHU!QQIRUH[DPSOH7
,IWKHDXWKRUL]DWLRQSURILOHVFKDQJHGDVDUHVXOWRIFKDQJHVLQWKHDSSURSULDWHDFWLYLW\JURXSUHRUJDQL]HWKH
QXPEHUVWRDYRLGQXPEHUDVVLJQPHQWSUREOHPV7KHIROORZLQJSURFHGXUHUHVWDUWVWKHQXPEHUDVVLJQPHQW
IURP:KHQHYHU\RXJHQHUDWHDQHZDXWKRUL]DWLRQSURILOHWKLVUHRUJDQL]DWLRQLVDXWRPDWLFDOO\WDNHQ
LQWRDFFRXQW
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
4
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRU
H[DPSOH00B%8<(5B$* DQG
FKRRVH &KDQJH
 2QWKH$XWKRUL]DWLRQVWDEFKRRVH
&KDQJHDXWKRUL]DWLRQGDWD
 &KRRVH8WLOLWLHV→5HRUJDQL]H

7KHV\VWHPDXWRPDWLFDOO\
UHRUJDQL]HVWKHILQDOGLJLWVRIWKH
DXWKRUL]DWLRQVWHFKQLFDOQDPHVDQG
WKHUHVXOWDSSHDUVLQDV\VWHP
PHVVDJH IRUH[DPSOH$XWKRUL]DWLRQV
ZHUHUHRUJDQL]HG 

Release 4.6A/B
6–37
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations

&XVWRPL]LQJ$XWKRUL]DWLRQV

6$3GHOLYHUVDXVHUUROHWHPSODWHIRUWKH&XVWRPL]LQJ3URMHFW0HPEHUZKLFKLVFDOOHG
6$3B%&B&86B&86720,=(5B$*7KLVDFWLYLW\JURXSFDQEHDVVLJQHGWRDQ\SHUVRQGRLQJFXVWRPL]LQJLQ
5,QDGGLWLRQ\RXFDQDVVLJQSURMHFWVRUYLHZVRIWKH,PSOHPHQWDWLRQ*XLGH ,0* WRDQDFWLYLW\JURXS
7KHDLPRIWKLVDVVLJQPHQWLVWRJHQHUDWHDXWKRUL]DWLRQVIRUDQGDVVLJQXVHUVWRVSHFLILF,0*DFWLYLWLHV7KDW
LQVXUHVWKDWXVHUVDUHRQO\DOORZHGWRSHUIRUPWDVNVLQWKHLUFXVWRPL]LQJSURMHFWDQGQRWLQDQ\RWKHU
:KHQ\RXJHQHUDWHSURILOHVLWDOVRJHQHUDWHVWKHDXWKRUL]DWLRQVQHFHVVDU\WRH[HFXWHDOODFWLYLWLHVLQWKH
DVVLJQHG,0*SURMHFWVRUSURMHFWYLHZV

$VVLJQLQJ,0*3URMHFWVRU3URMHFW9LHZVWR$FWLYLW\*URXSV
,QWKHIROORZLQJH[DPSOHZHGHPRQVWUDWHKRZWRFUHDWHDFXVWRPL]LQJDFWLYLW\JURXSIRUD40
FXVWRPL]LQJSURMHFW7KHUHIRUHZHZLOOFUHDWHDQHZDFWLYLW\JURXSFDOOHG40B&86720,=,1*DQGDVVLJQ
WKH40FXVWRPL]LQJSURMHFWWRLW<RXFDQDVVLJQGLIIHUHQWSURMHFWYLHZVLIDYDLODEOH
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 ,QWKH$FWLYLW\JURXSILHOGHQWHUD
QDPHIRU\RXUQHZDFWLYLW\JURXS
 &KRRVH &UHDWH

Authorizations Made Easy


6–38
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations

8
 (QWHUDVKRUWGHVFULSWLRQLQWKH
'HVFULSWLRQILHOG
6
 (QWHUDORQJWH[WGHVFULSWLRQIRUWKH
DFWLYLW\JURXS RSWLRQDO 
 7RVDYHWKHDFWLYLW\JURXSFKRRVH
 4
7
 &KRRVHWKH0HQXWDE
 &KRRVH8WLOLWLHV→&XVWRPL]LQJDXWK

<RXFDQVHHWKHVWDWXVRIWKHDFWLYLW\
JURXSLQWKHGLDORJER[
 &KRRVH $GGWRDVVLJQD
FXVWRPL]LQJSURMHFWRUSURMHFWYLHZ 9
WRWKHDFWLYLW\JURXS
 6HOHFW,0*SURMHFWRU,0*SURMHFW
YLHZGHSHQGLQJRQZKDW\RXZRXOG
OLNHWRDVVLJQ,QRXUH[DPSOHZH
10
DVVLJQHGDQ,0*SURMHFW
 &KRRVH  11

 6HOHFWWKHGHVLUHGSURMHFWRUSURMHFW
YLHZ LQWKLVH[DPSOHZHVHOHFWHG
WKHSURMHFW40B&86720  12

 &KRRVH 
13

 &KRRVH WRFRQWLQXH

14
Tip

Release 4.6A/B
6–39
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations

7UDQVIHUULQJ8VHUVIURPDQ,0*3URMHFW
2QWKH&XVWRPL]LQJ$XWKRUL]DWLRQVVFUHHQLIWKHUHDUHXVHUVDVVLJQHGWRWKH,0*SURMHFW
WKDW\RXZRXOGOLNHWRDVVLJQWRWKLVDFWLYLW\JURXSFKRRVH 8VHU7KLVDFWLRQFRSLHVWKH
XVHUVIURPWKH,0*SURMHFWWRWKHDFWLYLW\JURXS
1RWHWKDW\RXPXVWFDOOWKLVIXQFWLRQDJDLQHDFKWLPHFKDQJHVDUHPDGHLQWKH,0*
SURMHFWDGPLQLVWUDWLRQ

7KHV\VWHPDXWRPDWLFDOO\
GHWHUPLQHVWKHWUDQVDFWLRQFRGHV
DQGDGGLWLRQDODXWKRUL]DWLRQREMHFWV 15
WKDWDUHUHTXLUHGWRPDLQWDLQWKH
WDEOHVIRUWKLV,0*SURMHFWRUSURMHFW
YLHZDQGLPSRUWVWKHPLQWRWKH
DFWLYLW\JURXS
 7RVDYH\RXUDFWLYLW\JURXSFKRRVH


Tip

<RXFDQQRWPDQXDOO\DVVLJQ
WUDQVDFWLRQVWRWKLVDFWLYLW\JURXSQRU
FDQ\RXVHOHFWDQ\IURPWKH6$3PHQX
1RWHWKDWWKHEXWWRQVWRGRWKLVKDYH
YDQLVKHG

Authorizations Made Easy


6–40
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations

 &KRRVHWKH$XWKRUL]DWLRQVWDEWR
FRQWLQXHWKHJHQHUDWLRQSURFHVV
 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD

16

17

,IQHFHVVDU\WKHGLDORJER['HILQH
2UJ/HYHOVDSSHDUV
 (QWHUWKHDSSURSULDWHGDWD<RXFDQ 18
JLYHIXOODXWKRUL]DWLRQVE\FKRRVLQJ
)XOODXWKRUL]DWLRQLQWKHORZHUULJKW
FRUQHU
 &KRRVH 

19

Release 4.6A/B
6–41
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations

 0DLQWDLQDOORSHQDXWKRUL]DWLRQ
ILHOGVLQGLFDWHGE\WKH\HOORZOLJKW
DVGHVFULEHGHDUOLHULQWKLV
ERRN,QRXUH[DPSOHZHFKRVHIXOO
DXWKRUL]DWLRQE\FOLFNLQJRQWKH
XSSHUPRVW\HOORZOLJKW
20

,I\RXFKRRVHIXOODXWKRUL]DWLRQVD
FRQILUPDWLRQVFUHHQDSSHDUV
 &KRRVH WRFRQWLQXH
21

$OORSHQDXWKRUL]DWLRQVDUHILOOHG
ZKHQDOOWKHOLJKWVKDYHFKDQJHGWR
JUHHQ 22

 6DYHWKHDFWLYLW\JURXS

Authorizations Made Easy


6–42
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations

 2QWKH$VVLJQ3URILOH1DPHIRU
*HQHUDWHG$XWKRUL]DWLRQ3URILOHVFUHHQ 23
\RXKDYHWKHRSWLRQWRFKDQJHWKH
3URILOHQDPH<RXZLOOQRWEHDEOHWR 24
FKDQJHLWODWHU
 &KRRVH 
 7RJHQHUDWHWKHDFWLYLW\JURXS
FKRRVH 
26
 7RJREDFNWRWKHPDLQVFUHHQ
FKRRVH 
25

<RXKDYHQRZFUHDWHGDFXVWRPL]LQJ
DFWLYLW\JURXSDQGDVVLJQHG
DXWKRUL]DWLRQGDWDWRLW
,IWKHUHDUHQRXVHUVDVVLJQHGWRWKH
VHOHFWHG,0*SURMHFWRULI\RXFKRVH
QRWWRFRS\WKHPWRWKHDFWLYLW\
JURXSLQDQHDUOLHUVWHS\RXVWLOO
KDYHWRGRVR&KRRVHWKH8VHUVWDE
WRDVVLJQXVHUVWRWKHDFWLYLW\JURXS
DVGHPRQVWUDWHGLQFKDSWHUVDQG

Release 4.6A/B
6–43
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations

,IWKH,0*SURMHFWKDVFKDQJHG\RXVKRXOGUHJHQHUDWHWKHDXWKRUL]DWLRQGDWDIRUWKLV
DFWLYLW\JURXS7KHILUVWVWHSLVWRFKRRVH 5HIUHVKRQWKH&XVWRPL]LQJ$XWKRUL]DWLRQV
GLDORJER[ VHHVWHSRQSDJH² 7KLVDFWLRQUHFDOFXODWHVWKHWUDQVDFWLRQFRGHV<RX
PXVWWKHQUHJHQHUDWHWKHDXWKRUL]DWLRQSURILOHVIRUWKHDFWLYLW\JURXS
7RDVVLJQXVHUVWRWKHFXVWRPL]LQJDFWLYLW\JURXS\RXFDQWUDQVIHUWKHXVHUVWKDWDUH
DOUHDG\DVVLJQHGWRWKHFXVWRPL]LQJSURMHFWRUSURMHFWYLHZ<RXFDQDOVRDVVLJQDQ\RWKHU
XVHUWRWKLVFXVWRPL]LQJDFWLYLW\JURXS
<RXVKRXOGFRQVLGHUXVLQJWKH6$3SURYLGHGXVHUUROHWHPSODWH
6$3B%&B&86B&86720,=(5B$*IRUHYHU\FXVWRPL]LQJSURMHFWPHPEHU

Authorizations Made Easy


6–44
&KDSWHU 3UHSDULQJWKH5 
(QYLURQPHQWIRU*R/LYH

&RQWHQWV

Overview ..................................................................................................................7–2
Transports Between Clients ..................................................................................7–2
Transports Between R/3 Systems .........................................................................7–3
Transporting Activity Groups ................................................................................7–3
Transporting Check Indicators and Field Values ................................................7–8
Transporting Authorization Templates.................................................................7–8
Transporting User Master Records.......................................................................7–8

7–1
Chapter 7: Preparing the R/3 Environment for Go-Live
Overview

2YHUYLHZ

:KHQ\RXILQLVKXVLQJRQHRIWKHWKUHHSRVVLEOHPHWKRGVIRUZRUNLQJZLWKXVHUUROH
WHPSODWHV³DQG\RXKDYHPDLQWDLQHGDQGJHQHUDWHGDOOQHFHVVDU\DXWKRUL]DWLRQV³\RXFDQ
SUHSDUHIRUJROLYH3UHSDUDWLRQPHDQVWKDW\RXKDYHWRWUDQVSRUWHYHU\WKLQJ\RXKDYH
FUHDWHGLQ\RXU'(9V\VWHPWR\RXU4$6V\VWHPDQGILQDOO\WR\RXU35'V\VWHP VHH
FKDSWHURQWKHWKUHHV\VWHPHQYLURQPHQW 
<RXFDQWUDQVSRUWHLWKHUEHWZHHQFOLHQWVZLWKLQDQ56\VWHPRUEHWZHHQ56\VWHPV
'HSHQGLQJRQWKHW\SHRIWUDQVSRUW\RXFDQWUDQVSRUWWKHIROORZLQJLWHPV
< $FWLYLW\JURXSV
< &RPSRVLWHDFWLYLW\JURXSV
< $XWKRUL]DWLRQSURILOHGDWD
< $XWKRUL]DWLRQGDWD
< 8VHUPDVWHUUHFRUGV

7UDQVSRUWV%HWZHHQ&OLHQWV

7KHLWHPVLQWKHOLVWDERYHDUHFOLHQWGHSHQGHQW7KHUHIRUHVHSDUDWHUHFRUGVDFWLYLW\JURXSV
SURILOHVDQGDXWKRUL]DWLRQVPXVWEHPDLQWDLQHGIRUHDFK5FOLHQW7UDQVDFWLRQ6&&/ 7RROV
→$GPLQLVWUDWLRQ→$GPLQLVWUDWLRQ→&OLHQW$GPLQLVWUDWLRQ→&OLHQW&RS\→6&&/¥/RFDO
&RS\ ZKLFKPXVWEHUXQIURPWKHWDUJHWFOLHQWWUDQVSRUWVXVHUPDVWHUUHFRUGV
DXWKRUL]DWLRQSURILOHVDQGDXWKRUL]DWLRQVEHWZHHQFOLHQWV$VRI5HOHDVH$DFWLYLW\
JURXSVDUHFRSLHGZLWK&XVWRPL]LQJ

:KHQ\RXFDUU\RXWDWUDQVSRUWDOOXVHUPDVWHUUHFRUGVSURILOHVDQGDXWKRUL]DWLRQVLQWKH
WDUJHWV\VWHPZLWKWKHVDPHQDPHVDVLWHPVLQWKHWUDQVSRUWZLOOEHRYHUZULWWHQ
7KHUHIRUHGRQRWXVH6&&/LI\RXUWDUJHWFOLHQWFRQWDLQVDXWKRUL]DWLRQVDQGXVHUPDVWHU
UHFRUGVWKDW\RXZDQWWRNHHS2QO\XVH6&&/WRFUHDWHDQHZFOLHQWZLWKWKHREMHFWV
6$3B&867 XVHUVZLOOEHNHSW RU6$3B8&86 XVHUVFRPHIURPWKHVRXUFHFOLHQW 

6LQFHDFWLYLW\JURXSVEHORQJWR&XVWRPL]LQJWKH\DUHFRSLHGDXWRPDWLFDOO\GXULQJFOLHQW
FRS\,WLVDOVRSRVVLEOHWRFRS\WKHPPDQXDOO\ VHHEHORZ 

7KHWUDQVDFWLRQGRFXPHQWDWLRQFRQWDLQVDGGLWLRQDOLQIRUPDWLRQDERXWWKHQHFHVVDU\
DXWKRUL]DWLRQV8VHWUDQVDFWLRQ6&& 7RROV→$GPLQLVWUDWLRQ→$GPLQLVWUDWLRQ→&OLHQW
$GPLQLVWUDWLRQ→6SHFLDO)XQFWLRQV→6&&¥&RS\7UDQVSRUW5HTXHVW WRPDQXDOO\FRS\
DFWLYLW\JURXSVEHWZHHQH[LVWLQJFOLHQWV

Authorizations Made Easy


7–2
Chapter 7: Preparing the R/3 Environment for Go-Live
Transports Between R/3 Systems

7RFRS\DFWLYLW\JURXSVEHWZHHQFOLHQWV
 &UHDWHDWUDQVSRUWUHTXHVWZLWKWKHDSSURSULDWHDFWLYLW\JURXSV
 ,I\RXXVHWUDQVDFWLRQ6&&GRQRWUHOHDVHWKHWUDQVSRUW
7UDQVDFWLRQ6&&ZRUNVZLWKUHOHDVHGDQGXQUHOHDVHGWUDQVSRUWV
 /RJRQWRWKHRWKHUFOLHQW
 5XQWUDQVDFWLRQ6&&
 &KRRVHWKH6RXUFHFOLHQWDQG7UDQVSRUWUHTXHVWLQFOXGLQJWKHWDVNQXPEHU
 ([HFXWH
7KHDFWLYLW\JURXS V VKRXOGQRZEHDFWLYHLQWUDQVDFWLRQ3)&*

:KHQ\RXWUDQVSRUWXVLQJ6&&WKHUHSRUWWUHHLQVLGHWKHDFWLYLW\JURXSLVWUDQVSRUWHG
EXWQRWWKHUHSRUWWUHHLWVHOI<RXKDYHWRWUDQVSRUWWKHUHSRUWWUHHEHIRUHKDQG$OVR
UHPHPEHUWKDWUHSRUWWUHHVDUHFOLHQWGHSHQGHQW

7UDQVSRUWV%HWZHHQ56\VWHPV

<RXFDQWUDQVSRUWDXWKRUL]DWLRQFRPSRQHQWVDFWLYLW\JURXSVDQGXVHUPDVWHUUHFRUGV
EHWZHHQ56\VWHPV&RPSRQHQWVPD\EHWUDQVSRUWHGLQGHSHQGHQWO\RUZLWKDOORIWKHLU
DVVRFLDWHGDXWKRUL]DWLRQV

7UDQVSRUWLQJ$FWLYLW\*URXSV

:KHQ\RXWUDQVSRUWDFWLYLW\JURXSVWKLVDOVRWUDQVSRUWVWKHDXWKRUL]DWLRQSURILOHV7KH
SURILOHVQRORQJHUKDYHWREHUHJHQHUDWHGLQWKHWDUJHWV\VWHPLQWUDQVDFWLRQ683&
+RZHYHU\RXVKRXOGFRPSDUHWKHXVHUPDVWHUUHFRUGVZKHQ\RXLPSRUWDFWLYLW\JURXSV
LQWRWKHWDUJHWV\VWHP
2QFH\RXKDYHHQWHUHGWKHDFWLYLW\JURXSLQDWUDQVSRUWUHTXHVW\RXVKRXOGQRWPDNHDQ\
PRUHFKDQJHVWRWKHDXWKRUL]DWLRQSURILOHVRIWKDWDFWLYLW\JURXS,I\RXFKDQJHSURILOHVRU
JHQHUDWHWKHPIRUWKHILUVWWLPH\RXVKRXOGHQWHUWKHZKROHDFWLYLW\JURXSLQDWUDQVSRUW
UHTXHVWDJDLQ
7KHDFWLYLW\JURXSVHQWHUHGLQDWUDQVSRUWUHTXHVWFDQEHGLVSOD\HGZLWKWUDQVDFWLRQ6(

Release 4.6A/B
7–3
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups

7UDQVSRUWLQJ6LQJOH$FWLYLW\*URXSV8VLQJWKH$FWLYLW\*URXS
0DLQWHQDQFH7UDQVDFWLRQ
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 (QWHUWKHDFWLYLW\JURXS\RXZRXOG
OLNHWRWUDQVSRUWRUVHOHFWLWXVLQJ 3
SRVVLEOHHQWULHV
 &KRRVH WRWUDQVSRUWWKHDFWLYLW\ 2
JURXS

 &KRRVH WRFRQWLQXH

 ,I\RXZRXOGOLNHWRWUDQVSRUWWKH
XVHUDVVLJQPHQWDVZHOOVHOHFW8VHU
$VVLJQPHQW,I\RXGRQRWZDQWWR
WUDQVSRUWWKHXVHUDVVLJQPHQWZLWK
WKHDFWLYLW\JURXSPDNHVXUHLWLV
5
GHVHOHFWHG
 &KRRVH 
6

Authorizations Made Easy


7–4
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups

<RXFDQGHFLGHZKHWKHUWKHXVHUDVVLJQPHQWVVKRXOGDOVREHWUDQVSRUWHG3OHDVHQRWH
WKDWZKHQ\RXWUDQVSRUWWKHXVHUDVVLJQPHQWVZLWKWKHDFWLYLW\JURXSVWKLVDFWLRQ
UHSODFHVWKHDFWLYLW\JURXSXVHUDVVLJQPHQWLQWKHWDUJHWV\VWHP
,I\RXDUHXVLQJ&HQWUDO8VHU0DLQWHQDQFH\RXFDQRQO\FUHDWHXVHUDVVLJQPHQWVLQWKH
FHQWUDOV\VWHP7KHVHXVHUDVVLJQPHQWVFDQWKHQEHVHQWE\UHTXHVWWRWKHV\VWHPJURXS
WKDW\RXVSHFLILHG,IXVHUDVVLJQPHQWVWRDFWLYLW\JURXSVZHUHDGGLWLRQDOO\WUDQVSRUWHG
WKH&HQWUDO8VHU$GPLQLVWUDWLRQGLVSOD\ZRXOGEHLQFRQVLVWHQW7KHXVHUVWUDQVSRUWHGLQ
WKLVZD\ZRXOGEHUHPRYHGDWWKHQH[WXVHUGLVWULEXWLRQ

,I\RXZDQWWRORFNWKHV\VWHPDJDLQVWLPSRUWLQJXVHUDVVLJQPHQWVIURPDFWLYLW\JURXSV
\RXFDQVSHFLI\WKLVLQWKH&XVWRPL]LQJWDEOH35*1B&867 XVLQJWUDQVDFWLRQ60 
(QWHUDOLQHZLWKWKHLGHQWLILHUUSER_REL_IMPORTDQGWKHYDOXHNO.

 ,QWKH3URPSWIRU&XVWRPL]LQJUHTXHVW
GLDORJER[HQWHUWKHFRUUHFW
&XVWRPL]LQJUHTXHVWQXPEHURUXVH
SRVVLEOHHQWULHVWRVHOHFWDQH[LVWLQJ 7
RQH,IQRQHH[LVWVFUHDWHDQHZRQH
XVLQJ 
8
 &KRRVH 
 <RXFDQXVHWUDQVDFWLRQ6(WRGLVSOD\\RXUFXVWRPL]LQJWUDQVSRUWUHTXHVWV
 7RLPSRUWWKHUHTXHVWZLWKWKHGDWDORJRQWRWKHFOLHQW\RXZRXOGOLNHWRLPSRUWWKHGDWDWRDQG
H[HFXWHWUDQVDFWLRQ6&& VHH7UDQVSRUW%HWZHHQ&OLHQWVVWHSV²RQSDJH² 

Release 4.6A/B
7–5
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups

0DVV7UDQVSRUWRI$FWLYLW\*URXSV
7RWUDQVSRUWDVHWRIDFWLYLW\JURXSVDOODWRQFHXVHWKHPDVVWUDQVSRUWIXQFWLRQLQVLGHWKH3*
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
2
 2QWKH$FWLYLW\*URXS0DLQWHQDQFH
VFUHHQFKRRVH(QYLURQPHQW→0DVV
WUDQVSRUW

 (QWHUWKHILUVWDQGODVWDFWLYLW\JURXS
RIWKHUDQJHWKDW\RXZRXOGOLNHWR
WUDQVSRUW<RXFDQDOVRXVHSRVVLEOH
HQWULHVIRUDOLVWRIDOOH[LVWLQJDFWLYLW\ 4
JURXSV
3
,QWKLVH[DPSOHZHFKRVHDOODFWLYLW\
JURXSVIURP
),B$3B'DWDB(QWU\B&OHUNWR
40B0DQDJHUB$VVLWDQW
 &KRRVH 
 &KRRVH WRFRQWLQXH

Authorizations Made Easy


7–6
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups

 ,I\RXZRXOGOLNHWRWUDQVSRUWWKH
XVHUDVVLJQPHQWDVZHOOVHOHFW8VHU
$VVLJQPHQW,I\RXGRQRWZDQWWR
WUDQVSRUWWKHXVHUDVVLJQPHQWZLWK
WKHDFWLYLW\JURXSPDNHVXUHLWLV
6
GHVHOHFWHG
 &KRRVH 
7

<RXFDQGHFLGHZKHWKHUWKHXVHUDVVLJQPHQWVVKRXOGDOVREHWUDQVSRUWHG3OHDVHQRWH
WKDWZKHQ\RXWUDQVSRUWWKHXVHUDVVLJQPHQWVZLWKWKHDFWLYLW\JURXSVWKLVDFWLRQ
UHSODFHVWKHDFWLYLW\JURXSXVHUDVVLJQPHQWLQWKHWDUJHWV\VWHP
,I\RXDUHXVLQJ&HQWUDO8VHU0DLQWHQDQFH\RXFDQRQO\FUHDWHXVHUDVVLJQPHQWVLQWKH
FHQWUDOV\VWHP7KHVHXVHUDVVLJQPHQWVFDQWKHQEHVHQWE\UHTXHVWWRWKHV\VWHPJURXS
WKDW\RXVSHFLILHG,IXVHUDVVLJQPHQWVWRDFWLYLW\JURXSVZHUHDGGLWLRQDOO\WUDQVSRUWHG
WKH&HQWUDO8VHU$GPLQLVWUDWLRQGLVSOD\ZRXOGEHLQFRQVLVWHQW7KHXVHUVWUDQVSRUWHGLQ
WKLVZD\ZRXOGEHUHPRYHGDWWKHQH[WXVHUGLVWULEXWLRQ

,I\RXZDQWWRORFNWKHV\VWHPDJDLQVWLPSRUWLQJXVHUDVVLJQPHQWVIURPDFWLYLW\JURXSV
\RXFDQVSHFLI\WKLVLQWKH&XVWRPL]LQJWDEOH35*1B&867 XVLQJWUDQVDFWLRQ60 
(QWHUDOLQHZLWKWKHLGHQWLILHUUSER_REL_IMPORTDQGWKHYDOXHNO.

 ,QWKH3URPSWIRU&XVWRPL]LQJUHTXHVW
GLDORJER[HQWHUWKHFRUUHFW
&XVWRPL]LQJUHTXHVWQXPEHURUXVH
SRVVLEOHHQWULHVWRVHOHFWDQH[LVWLQJ 8
RQH,IQRQHH[LVWFUHDWHDQHZRQH
XVLQJ 
9
 &KRRVH 

8VHU0DVWHU5HFRUG&RPSDULVRQ$IWHU,PSRUWLQWRWKH7DUJHW6\VWHP
2QFHWKHDFWLYLW\JURXSVKDYHEHHQLPSRUWHGLQWRWKHWDUJHWV\VWHP\RXVKRXOGFRPSDUH
WKHXVHUPDVWHUUHFRUGVRIWKHDFWLYLW\JURXSVFRQFHUQHG([HFXWHWKLVFRPSDULVRQXVLQJ
UHSRUW3)&*B7,0(B'(3(1'(1&<ZKLFK\RXVKRXOGVFKHGXOHSHULRGLFDOO\
,I\RXGRQRWZDQWWRZDLWXQWLOWKDWUHSRUWUXQVDQGZDQWWKHDFWLYLW\JURXSVLQWKHWDUJHW
V\VWHPWREHLPPHGLDWHO\FRQVLVWHQWFRPSDUHWKHDFWLYLW\JURXSVE\FKRRVLQJ(QYLURQPHQW
→0DVVFRPSDUHLQWUDQVDFWLRQ3)&*,QWKH$FWLYLW\JURXSILHOGFKRRVHWKHDFWLYLW\JURXSV
FRQFHUQHG6HOHFW&RPSOHWHFRPSDUHLQWKH6HOHFWLRQRIDFWLRQILHOGDQGVWDUWWKHUHSRUWE\
FKRRVLQJWKH 7KHDFWLYLW\JURXSVLQWKHWDUJHWV\VWHPDUHWKHQPDGHFRQVLVWHQW

Release 4.6A/B
7–7
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Check Indicators and Field Values

7UDQVSRUWLQJ&KHFN,QGLFDWRUVDQG)LHOG9DOXHV

:LWKWUDQVDFWLRQ68\RXFDQFRS\WKHVXSSOLHG6$3GHIDXOWVFRQFHUQLQJFKHFNLQGLFDWRUV
ILHOGYDOXHVDQGWDEOHV862%;DQG862%77KLVSURFHGXUHLPSRUWVERWKWKH6$3FKHFN
LQGLFDWRUGHIDXOWVIRUDXWKRUL]DWLRQREMHFWVLQDWUDQVDFWLRQDQGWKHDXWKRUL]DWLRQILHOG
YDOXHVIRUWKH3*LQWRWKHFXVWRPHUWDEOHV862%;B&DQG862%7B&
:KHWKHU\RXUXQWUDQVDFWLRQ68LQLWLDOO\RUFKDQJHWKHGHIDXOWVODWHUZLWKWUDQVDFWLRQ
68WKHSURFHVVLVUHFRUGHGLQWKHFRUUHFWLRQDQGWUDQVSRUWV\VWHPV%\FDUU\LQJRXWWKH
FRUUHVSRQGLQJWUDQVSRUWUHTXHVW\RXGLVWULEXWH\RXUFKHFNLQGLFDWRUVLQWKHV\VWHP
7KH7UDQVDFWLRQQDPH!FRUUHVSRQGVWRQRUPDO6$3WUDQVDFWLRQQDPHVVXFKDV9$7KH
FKHFNLQGLFDWRUVDQGILHOGYDOXHVDUHLQFOXGHGLQWKHWUDQVSRUW&KHFNLQGLFDWRUVDUHVDYHGLQ
WDEOH862%;B&DQGILHOGYDOXHVIRUWKH3*DUHVDYHGLQWDEOH862%7B&

7UDQVSRUWLQJ$XWKRUL]DWLRQ7HPSODWHV

$IWHUDQXSJUDGHDOO6$3GHOLYHUHGWHPSODWHVZLOOEHLGHQWLFDOLQDOOV\VWHPV<RXFDQQRW
FKDQJHWKHVHWHPSODWHV\RXFDQRQO\FRS\DQGDOWHUWKHP<RXFDQKRZHYHUFUHDWH\RXU
RZQWHPSODWHVDVGHVFULEHGHDUOLHULQWKLVERRN:KHQ\RXFRPSDUHDFWLYLW\JURXSVXQOLNH
6$3GHIDXOWFKDQJHVWHPSODWHFKDQJHVDUHQRWDXWRPDWLFDOO\SDVVHGRQWRWKHDSSURSULDWH
DXWKRUL]DWLRQSURILOH V ZKHUHWKHWHPSODWHZDVLQVHUWHG2QFH\RXKDYHFKDQJHGD
WHPSODWHWKDWZDVSUHYLRXVO\LQVHUWHGLQDQDXWKRUL]DWLRQSURILOHIRUDQDFWLYLW\JURXS\RX
PXVWPDQXDOO\XSGDWHWKDWSURILOHZLWKWKHVDPHFKDQJHVWKDWZHUHPDGHWRWKHWHPSODWH
&KDQJHVWR\RXURZQWHPSODWHVDUHUHFRUGHGE\WKHFRUUHFWLRQDQGWUDQVSRUWV\VWHPV7R
FDUU\RXWWKHWUDQVSRUWUHTXHVWREMHFWVLQWKHUHTXHVWPXVWFRQWDLQWKHIROORZLQJV\QWD[
R3TR SUSP <Template Name>

7UDQVSRUWLQJ8VHU0DVWHU5HFRUGV

7RWUDQVSRUWXVHUPDVWHUUHFRUGVEHWZHHQFOLHQWVUXQWKHFOLHQWFRS\WUDQVDFWLRQSCCL
7RROV→$GPLQLVWUDWLRQ→$GPLQLVWUDWLRQ→&OLHQW$GPLQLVWUDWLRQ→&OLHQW&RS\→6&&/¥
/RFDO&RS\ DQGVHOHFWSURILOH6$3B86(5)RUWUDQVSRUWLQJXVHUPDVWHUUHFRUGVEHWZHHQ5
6\VWHPVXVHWUDQVDFWLRQSCC8 7RROV→$GPLQLVWUDWLRQ→$GPLQLVWUDWLRQ→&OLHQW
$GPLQLVWUDWLRQ→&OLHQW7UDQVSRUW→6&&&OLHQW7UDQVSRUW ZLWKSURILOH6$3B86(5

Authorizations Made Easy


7–8
&KDSWHU ,QVHUWLQJ0LVVLQJ 
$XWKRUL]DWLRQV

&RQWHQWV

Manually Postmaintaining Authorizations ...........................................................8–2


Manually Inserting Authorizations ........................................................................8–3
Inserting Authorizations from Templates.............................................................8–7
Inserting Authorizations from a Profile ..............................................................8–12
Inserting Full Authorizations: Profile “<YourCompany>” ................................8–15

8–1
Chapter 8: Inserting Missing Authorizations
Manually Postmaintaining Authorizations

0DQXDOO\3RVWPDLQWDLQLQJ$XWKRUL]DWLRQV

$OWKRXJKWKH3URILOH*HQHUDWRU 3*EXLOGVDXWKRUL]DWLRQSURILOHVLWPD\VRPHWLPHVEH
QHFHVVDU\WRLQVHUWDPLVVLQJDXWKRUL]DWLRQRUWRDGMXVWDILHOGYDOXH7KHSURFHVVRI
PDLQWDLQLQJ3*·VVXJJHVWHGDXWKRUL]DWLRQV DVGHULYHGIURPWKHWUDQVDFWLRQVVHOHFWHGIRUDQ
DFWLYLW\JURXS LVFDOOHGSRVWPDLQWDLQLQJDXWKRUL]DWLRQV0DQXDOSRVWPDLQWHQDQFHPD\EH
QHFHVVDU\LQWKHSDUDPHWHUDQGYDULDQWWUDQVDFWLRQVDQGGXULQJWKHXSJUDGH

:KHQWR,QVHUW0LVVLQJ$XWKRUL]DWLRQV"
6KRZQEHORZDUHVRPHRIWKHW\SLFDOFDVHVZKHUH\RXPXVWPDQXDOO\LQFOXGH
DXWKRUL]DWLRQV
&DVH$XWKRUL]DWLRQ,V0LVVLQJIRU5HODWHG7UDQVDFWLRQV
$OWKRXJKWKH3*DVVLJQVDSDUWLFXODUSURILOHWRDXVHULWLVSRVVLEOHWKDWWKHVDPHXVHUPD\
UHFHLYHWKHHUURUPHVVDJH´<RXDUHQRWDXWKRUL]HGžµZKHQDWWHPSWLQJWRXVHDUHODWHG
WUDQVDFWLRQ
7RDGGUHVVWKHDXWKRUL]DWLRQVHWWLQJVIRUWKHUHODWHGWUDQVDFWLRQGRWKHIROORZLQJ
 8VHWUDQVDFWLRQ68 'LVSOD\FKHFNYDOXHVRIDXWKRUL]DWLRQFKHFNVLIQRWDXWKRUL]HG WRVHH
WKHODVWDXWKRUL]DWLRQFKHFNWKDWIDLOHG VHHFKDSWHU7LSVDQG7URXEOHVKRRWLQJWROHDUQ
KRZWRXVHWUDQVDFWLRQ68 
 &KHFNWKHUHODWHGWUDQVDFWLRQWRFRQILUPLIDQDXWKRUL]DWLRQREMHFWLVFKHFNHG
 &KHFNWKHJHQHUDWHGSURILOHWRFRQILUPLIWKHDXWKRUL]DWLRQIRUWKHUHODWHGWUDQVDFWLRQLV
LQFRUUHFWO\VHW
 8VHWUDQVDFWLRQ68WRFKDQJHWKHFKHFNLQGLFDWRUIRUWKHDXWKRUL]DWLRQREMHFWLQWKH
GHVLUHGWUDQVDFWLRQ VHHFKDSWHU7LSVDQG7URXEOHVKRRWLQJWROHDUQKRZWRXVH
WUDQVDFWLRQ68 
&DVH7KH*HQHUDWHG3URILOH'RHV1RW$VVLJQ$Q\*HQHUDO5LJKWVWRWKH
8VHU
6LQFHEDVLFDXWKRUL]DWLRQVDUHVRJHQHUDOLWLVQRWSUDFWLFDOWRLQFOXGHWKHPLQLQGLYLGXDO
WUDQVDFWLRQV
7RLPSURYHV\VWHPSHUIRUPDQFH WKRXJKXQXVXDOIURPDQDXWKRUL]DWLRQVVWDQGSRLQW 
< 5GRHVQRWFKHFNLIDQDXWKRUL]DWLRQLVQHHGHGIRUDQH[LVWLQJWUDQVDFWLRQ
< 1HZDXWKRUL]DWLRQVDUHDGGHGZLWKRXWFKHFNLQJIRUH[LVWLQJDXWKRUL]DWLRQV
7KHV\VWHPSURYLGHVWKHIXQFWLRQDOLW\WRVXPPDUL]HDXWKRUL]DWLRQVIRUWKHVDPH
DXWKRUL]DWLRQREMHFW
&DVH&DQQRW6HOHFW7UDQVDFWLRQ68IURPWKH0HQXLQ3)&*
6$3UHFRPPHQGVLQFOXGLQJWKHDSSURSULDWHDXWKRUL]DWLRQVIRUWUDQVDFWLRQ68LQHDFK
DXWKRUL]DWLRQSURILOH7KHVHDXWKRUL]DWLRQVJXDUDQWHHWKDWLIXVHUVJHWDQHUURUPHVVDJH IRU

Authorizations Made Easy


8–2
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations

H[DPSOH´<RXDUHQRWDXWKRUL]HG«µ´1RDXWKRUL]DWLRQIRU«µRUDQ\PHVVDJHUHJDUGLQJ
DQDXWKRUL]DWLRQSUREOHP WKHKHOSGHVNFDQPRUHHDVLO\DVVLVWWKHP7KHDFWLYLW\JURXS
6$3B%&B(1'86(5B$*DOUHDG\FRQWDLQVWKHDXWKRUL]DWLRQIRU687KLVDFWLYLW\JURXSLV
DOVRLQFOXGHGLQWKHFRPSRVLWHDFWLYLW\JURXS6$3B%&B(9(5<B(03/2<((

+RZWR,QVHUW0LVVLQJ$XWKRUL]DWLRQV
<RXPD\LQVHUWPLVVLQJDXWKRUL]DWLRQV
< 0DQXDOO\
< )URPDWHPSODWH
< )URPDSURILOH
< %\LQVHUWLQJFRPSOHWHDXWKRUL]DWLRQV

0DQXDOO\,QVHUWLQJ$XWKRUL]DWLRQV

8VLQJWUDQVDFWLRQ68 'LVSOD\FKHFNYDOXHVRIDXWKRUL]DWLRQFKHFNVLIQRWDXWKRUL]HG \RXFDQ


ILQGRXWLIDQDXWKRUL]DWLRQFKHFNIRU\RXUWUDQVDFWLRQLVPLVVLQJ7UDQVDFWLRQ68LVRQO\
RQHRIWKHZD\VWRGHWHUPLQHPLVVLQJDXWKRUL]DWLRQV6RPHWLPHVWUDFHVDUHPRUHXVHIXO
EHFDXVHWKH\DUHPRUHDFFXUDWHDQGFRPSOHWH³SDUWLFXODUO\ZKHQGHDOLQJZLWK+5
DXWKRUL]DWLRQSUREOHPV,GHQWLI\WKHDXWKRUL]DWLRQREMHFWDQGWKHPLVVLQJDXWKRUL]DWLRQILHOG
YDOXHV7KHQPDQXDOO\LQVHUWWKHPLVVLQJDXWKRUL]DWLRQ
<RXFDQXVHWKHIROORZLQJWZRRSWLRQVWRLQVHUWDXWKRUL]DWLRQV
< 6HOHFWLRQFULWHULD FKRRVHIURPDXWKRUL]DWLRQVVRUWHGE\FODVV
< 0DQXDOO\ LI\RXNQRZWKHREMHFWRUFDQFKRRVHIURPDQREMHFWOLVW

7RDVVLJQJHQHUDODXWKRUL]DWLRQVFKRRVHRQHRIWKHIROORZLQJRSWLRQV
< &UHDWHDVHSDUDWHDFWLYLW\JURXSFRQWDLQLQJRQO\JHQHUDODXWKRUL]DWLRQV IRUH[DPSOH
SULQWLQJ DQGDVVLJQWKLVDFWLYLW\JURXSWRDOOXVHUV7KLVPHWKRGZRUNVEHVWLIXVHUV
ZLOOSULQWWRSDUWLFXODUSULQWHUV$JHQHULFSULQWLQJDXWKRUL]DWLRQFDQEHDVVLJQHG
*HQHUDWHWKHDXWKRUL]DWLRQSURILOHVIRUWKHVHDFWLYLW\JURXSVDQGDVVLJQWKHSURILOHVWR
WKHXVHUV
< ,QFOXGHWKHUHTXLUHGREMHFWVLQWKHDFWLYLW\JURXSE\XVLQJ6$3WHPSODWHVRU\RXURZQ
WHPSODWHVE\PDLQWDLQLQJDQ\PLVVLQJILHOGHQWULHV7KLVPHWKRGZRUNVEHVWLIXVHUV
ZLOOEHDVVLJQHGWRVSHFLILFSULQWHUV
< 6$3DOUHDG\GHOLYHUVDFWLYLW\JURXSVZLWKJHQHUDODXWKRUL]DWLRQVIRUH[DPSOH
6$3B%&B(9(5<B(03/2<((DQG6$3B%&B(1'86(5

Release 4.6A/B
8–3
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations

8VLQJ6HOHFWLRQ&ULWHULD
<RXFDQXVHVHOHFWLRQFULWHULDWRLQVHUWPLVVLQJDXWKRUL]DWLRQV
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRUH[DPSOH00B%8<(5B$* DQGFKRRVH &KDQJH
 &KRRVHWKH$XWKRUL]DWLRQVWDE
 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD

2QVFUHHQ\RXFDQVHHWKHFXUUHQWO\
LQFOXGHGDXWKRUL]DWLRQFODVVHVIRU
WKHVHOHFWHGDFWLYLW\JURXS 5
 &KRRVH 6HOHFWLRQFULWHULDWRVHOHFW
WKHDXWKRUL]DWLRQ\RXZRXOGOLNHWR
LQVHUW VRUWHGE\FODVV 

,I\RXDOUHDG\NQRZWKHDXWKRUL]DWLRQ
REMHFW\RXZRXOGOLNHWRLQVHUW
PDQXDOO\FKRRVH 0DQXDOO\DQGHQWHU
WKHREMHFWRUXVHSRVVLEOHHQWULHVDQG
VHOHFWLWIURPDOLVW VHHH[DPSOHVKRZQ
EHORZ 

Authorizations Made Easy


8–4
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations

 ([SDQGWKHREMHFWFODVVHVDQGFKRRVH
WKHGHVLUHGDXWKRUL]DWLRQREMHFW IRU
H[DPSOHZHVHOHFWHG%DVLV
$GPLQLVWUDWLRQWRFKRRVHWKH
DXWKRUL]DWLRQREMHFWVIRUSULQWLQJ 

 6FUROOGRZQXQWLO\RXVHHWKH
GHVLUHGDXWKRUL]DWLRQREMHFWV
 6HOHFWWKHDXWKRUL]DWLRQREMHFWV\RX
9
ZDQWWRLQVHUWE\FOLFNLQJWKHUHG
PLQXV  VLJQV IRUH[DPSOH6SRRO
$FWLRQVDQG6SRRO'HYLFH
$XWKRUL]DWLRQV 7KHJUHHQSOXV  8
VLJQVLQGLFDWHWKDWWKHREMHFWVKDYH
7
EHHQVHOHFWHG
 &KRRVH,QVHUWFKRVHQ

 7KHVHOHFWHGDXWKRUL]DWLRQREMHFWV
DUHWUDQVIHUUHGEDFNWRWKH
DXWKRUL]DWLRQFODVVHVIRUWKHJLYHQ 12
DFWLYLW\JURXS7KHV\VWHPFUHDWHVD
QHZDXWKRUL]DWLRQIRUHDFK
DXWKRUL]DWLRQREMHFW7KH\HOORZ
OLJKWLQGLFDWHVWKDWQRDXWKRUL]DWLRQ 10 11
ILHOGYDOXHVDUHPDLQWDLQHG
 7KHV\VWHPVWDWXVLVGLVSOD\HGDV
0DQXDOO\ZKLFKPHDQVWKDWWKHUH
DUHPDQXDOO\LQVHUWHGDXWKRUL]DWLRQV
LQWKLVREMHFWFODVV
 &KRRVH 2SHQWRGLVSOD\DOORSHQ
DXWKRUL]DWLRQILHOGV

Release 4.6A/B
8–5
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations

 0DLQWDLQWKHDSSURSULDWHYDOXHVIRU
WKHRSHQDXWKRUL]DWLRQSURILOHV
 6DYHDQGJHQHUDWHWKHDFWLYLW\
JURXS

13

14

,QVHUWLQJ0DQXDOO\
,I\RXNQRZWKHDXWKRUL]DWLRQREMHFW\RXZRXOGOLNHWRLQVHUWSHUIRUPWKHIROORZLQJVWHSV
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXS IRUH[DPSOH00B%8<(5B$* DQGFKRRVH &KDQJH
 2QWKH&KDQJH$FWLYLW\*URXSVVFUHHQFKRRVHWKH$XWKRUL]DWLRQVWDE
 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD
 2QWKH&KDQJH$FWLYLW\*URXS$XWKRUL]DWLRQVVFUHHQFKRRVH 0DQXDOO\
 (QWHUWKHDXWKRUL]DWLRQREMHFWRU
FKRRVHSRVVLEOHHQWULHV 3
 &KRRVH 

Authorizations Made Easy


8–6
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates

,QVHUWLQJ$XWKRUL]DWLRQVIURP7HPSODWHV

*HQHUDWHGSURILOHVGRQRWDXWRPDWLFDOO\JUDQWDQ\JHQHUDOULJKWVWR
< 3ULQW
< /RJRQWR6$31HW²5)URQWHQGQRWHV
< 8VHWUDQVDFWLRQ68
< 'HEXJ YLHZRQO\
,QWKHIROORZLQJH[DPSOHZHZLOOILUVWFUHDWHDQHZWHPSODWHDQGWKHQLQVHUWWKHWHPSODWHLQWRDQH[LVWLQJ
DFWLYLW\JURXS

&UHDWLQJD1HZ7HPSODWH
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 2QWKH$FWLYLW\*URXS0DLQWHQDQFHVFUHHQFKRRVH(QYLURQPHQW→&KHFNLQGLFDWRU
 6HOHFW(GLWDXWKRUL]DWLRQWHPSODWHV
 &KRRVH 

 &KRRVH 

7RDYRLGFRQIOLFWVEHWZHHQFXVWRPHUGHILQHGWHPSODWHVDQGWKH6$3GHOLYHUHG
WHPSODWHVGRQRWXVHQDPHVIRU\RXUWHPSODWHVWKDWEHJLQZLWK6RU-)RUDGGLWLRQDO
LQIRUPDWLRQVHH6$31HW²5)URQWHQGQRWHDQGORRNIRUWUDQVSRUWREMHFW575
6863
7HPSODWHFKDQJHVDUHQRWSDVVHGRQZKHQ\RXFRPSDUHDFWLYLW\JURXSV7KDWLVLI\RX

Release 4.6A/B
8–7
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates

FKDQJHDWHPSODWHWKDW\RXDOUHDG\LQVHUWHGLQWRDQDFWLYLW\JURXSWKHUHLVQRLQGLFDWRU
LQWKHDFWLYLW\JURXSWRVKRZWKDWWKHLQVHUWHGWHPSODWHKDVFKDQJHG

 (QWHUWKHWHPSODWHQDPHDQGDVKRUW
GHVFULSWLRQ 6
7
 &KRRVH 
 &KRRVH 6HOHFWLRQFULWHULDWRVHOHFW
WKHDXWKRUL]DWLRQ\RXZDQWWRLQVHUW
VRUWHGE\FODVV  Tip 8

,I\RXDOUHDG\NQRZWKHDXWKRUL]DWLRQREMHFW\RXZDQWWRLQVHUWPDQXDOO\\RXFDQ
FKRRVH 0DQXDOLQSXWDQGHQWHUWKHREMHFW RUXVHSRVVLEOHHQWULHVDQGVHOHFWLWIURPD
OLVW 

 ([SDQGWKHREMHFWFODVVHVWRFKRRVH
WKHGHVLUHGDXWKRUL]DWLRQREMHFW IRU
H[DPSOHZHVHOHFWHG%DVLV
$GPLQLVWUDWLRQWRFKRRVHWKH
DXWKRUL]DWLRQREMHFWVIRUSULQWLQJ 

Authorizations Made Easy


8–8
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates

 6FUROOGRZQXQWLO\RXVHHWKH
DXWKRUL]DWLRQREMHFWV\RXZDQWWR
LQVHUW
 6HOHFWWKHDXWKRUL]DWLRQREMHFWV\RX 12
ZDQWWRLQVHUWE\FOLFNLQJWKHUHG
PLQXV  VLJQV IRUH[DPSOH6SRRO
$FWLRQVDQG6SRRO'HYLFH
$XWKRUL]DWLRQV 7KHJUHHQSOXV  11
VLJQVLQGLFDWHWKDWWKHREMHFWVKDYH
EHHQVHOHFWHG
 &KRRVH,QVHUWFKRVHQ

 0DLQWDLQDOOWKHDSSURSULDWHYDOXHV
IRUWKHDXWKRUL]DWLRQILHOGV IRU
H[DPSOHZHFKRVH)XOO 14 15
DXWKRUL]DWLRQ 
 &KRRVH 
 &KRRVH 

13

7KHWHPSODWHQRZDSSHDUVLQWKH
WHPSODWHOLVWDQGLVUHDG\IRUXVH
 &KRRVH 

16

Release 4.6A/B
8–9
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates

,QVHUWLQJ$XWKRUL]DWLRQVIURPD7HPSODWH
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXSLQZKLFK\RXZRXOGOLNHWRLQVHUWDWHPSODWH IRUH[DPSOH
00B%8<(5B$* DQGFKRRVH &KDQJH
 &KRRVHWKH$XWKRUL]DWLRQVWDE
 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD

 &KRRVH(GLW→,QVHUWDXWKRUL]DWLRQ V
→)URPWHPSODWHž 5

Authorizations Made Easy


8–10
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates

 6HOHFWWKHWHPSODWH\RXZDQWWR
LQFOXGH IRUH[DPSOH35,17,1* 6
WHPSODWH 
0XOWLSOHWHPSODWHVHOHFWLRQVDUH
SRVVLEOH
 &KRRVH 

7KHWHPSODWHZDVLQVHUWHGDQG
PDUNHGZLWKVWDWXV0DQXDOO\7KH
JUHHQOLJKWLQGLFDWHVWKDWWKH
DXWKRUL]DWLRQILHOGVDUHPDLQWDLQHG
8
 7RUHJHQHUDWHWKHDXWKRUL]DWLRQ
SURILOHFKRRVH 

,I\RXLQVHUWHGDWHPSODWHZLWKDXWKRUL]DWLRQILHOGVWKDWDUHQRWPDLQWDLQHGWKHLQGLFDWRU
OLJKWVDSSHDUDV\HOORZRUUHGIRUWKHDSSURSULDWHDXWKRUL]DWLRQV%HIRUHSURFHHGLQJ\RX
PXVWILUVWSRVWPDLQWDLQDOORSHQILHOGV

Release 4.6A/B
8–11
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from a Profile

,QVHUWLQJ$XWKRUL]DWLRQVIURPD3URILOH

,I\RXKDYHDOUHDG\FUHDWHGDXWKRUL]DWLRQSURILOHVXVLQJWUDQVDFWLRQV68DQG68\RXFDQLQVHUWWKHVH
DXWKRUL]DWLRQVSURILOHVLQWRWKHOLVWRIWKHDXWKRUL]DWLRQVIRUWKHDFWLYLW\JURXS

0LJUDWLQJ3URILOHV&UHDWHGZLWK7UDQVDFWLRQV68DQG68
1RWHWKDWQRDFWLYLW\JURXSLQIRUPDWLRQ VXFKDVWUDQVDFWLRQFRGHVDXWRPDWLFDOO\
PDLQWDLQHGIRUREMHFW6B7&2'( FDQEHUHJHQHUDWHGIRULQVHUWHGSURILOHV7KHWHFKQLTXH
EHORZRQO\DOORZVSURILOHVFUHDWHGZLWKWUDQVDFWLRQV68DQG68WRPLJUDWHWRVXFK
SURILOHVDQGODWHUEHPDLQWDLQHGZLWKWKH3*7KHUHLVQRZD\WRUHFUHDWHWKHDSSURSULDWH
DFWLYLW\JURXSLQIRUPDWLRQ
7KLVPHDQVWKDWHYHU\WKLQJXQGHUWKH0HQXWDEZLOOEHXQFKDQJHGLI68SURILOHVDUH
FRSLHGLQWRWKHDFWLYLW\JURXS
+RZHYHUZLWK\RXKDYHQRZWKHRSWLRQWRPLJUDWHSURILOHVFUHDWHGZLWK68DQG
68LQWRDFWLYLW\JURXSV6HHFKDSWHUWKHVHFWLRQ&RQYHUWLQJ3UHYLRXVO\&UHDWHG68
3URILOHVLQWR$FWLYLW\*URXSV

,QFHUWDLQFLUFXPVWDQFHV\RXPD\ILUVWFUHDWHDWHPSODWHIURP\RXUSURILOHDQGWKHQLQVHUW
WKHWHPSODWH7HPSODWHVDUHUHXVDEOHDQGHDV\WRLQVHUW

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHGHVLUHGDFWLYLW\JURXSLQZKLFK\RXZRXOGOLNHWRLQVHUWWKHDXWKRUL]DWLRQ IRUH[DPSOH
00B%8<(5B$* DQGFKRRVH &KDQJH

Authorizations Made Easy


8–12
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from a Profile

 &KRRVHWKH$XWKRUL]DWLRQVWDE
 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD

,Q ([SHUWPRGHIRUSURILOHJHQHUDWLRQ
\RXFDQVSHFLI\WKHRSWLRQZLWKZKLFK
\RXZDQWWRPDLQWDLQWKHDXWKRUL]DWLRQ
YDOXHV7KLVRSWLRQLVDXWRPDWLFDOO\VHW
FRUUHFWO\LQQRUPDOPRGH

4
Tip

 &KRRVH(GLW→,QVHUWDXWKRUL]DWLRQ V
→)URPSURILOH 5

 (QWHUWKHSURILOHQDPHRUXVHSRVVLEOH
6
HQWULHV
 &KRRVH  7

,I\RXLQFOXGHDSURILOHWKDWLQFOXGHVWKHREMHFW6B7&2'(LWGRHVQRWDGGWKHWUDQVDFWLRQ
FRGHWRWKHPHQXSRUWLRQRIWKHDFWLYLW\JURXSGHILQLWLRQ

Release 4.6A/B
8–13
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from a Profile

 6HOHFWWKHGHVLUHGSURILOHIURPWKH
OLVWRISURILOHV
9
 &KRRVH 
8

<RXUGLDORJER[PD\ORRNGLIIHUHQW7KH
DSSHDUDQFHGHSHQGVRQWKHVHWWLQJVIRU
SRVVLEOHHQWULHVXQGHU+HOS→6HWWLQJV→
3RVVLEOHHQWULHV→6HWWLQJV
 7KHVHOHFWHGSURILOHLVWUDQVIHUUHG
10
 &KRRVH 
11

 $OOWKHDXWKRUL]DWLRQVLQWKHVHOHFWHG
SURILOHDUHWUDQVIHUUHGDQGPDUNHG
ZLWKWKHVWDWXV0DQXDOO\7KHJUHHQ 13
OLJKWLQGLFDWHVWKDWWKHSURILOHLV
PDLQWDLQHG

12

,I\RXLQVHUWDXWKRUL]DWLRQVIURPD
SURILOHZLWKQRQPDLQWDLQHG
DXWKRUL]DWLRQILHOGVWKHUHGOLJKW
DSSHDUVDQG\RXKDYHWRSRVWPDLQWDLQ
DOORSHQILHOGVEHIRUHSURFHHGLQJ
 7RUHJHQHUDWHWKHDXWKRUL]DWLRQ
SURILOHFKRRVH 

Authorizations Made Easy


8–14
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”

,QVHUWLQJ)XOO$XWKRUL]DWLRQV3URILOH´<RXU&RPSDQ\!µ

,QWKHIROORZLQJH[DPSOH\RXOHDUQKRZWRFUHDWHDQHZSURILOHFDOOHG&203B$//ZKHUH´&203µVWDQGV
IRU\RXUFRPSDQ\QDPH7KLVSURILOHZLOOEHPRGHOHGDIWHU6$3B$//EXWZLWKWKHVXSHUXVHUDXWKRUL]DWLRQ
UHPRYHG7KHUHIRUHZHZLOOFUHDWHDQDFWLYLW\JURXSFDOOHG&203$1<B$//DQGLQFOXGHWKHSURILOH
&203B$//
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 (QWHUWKHQDPHRIWKHDFWLYLW\JURXS
\RXZDQWWRFUHDWH IRUH[DPSOH
COMPANY_ALL 
 &KRRVH &UHDWH
2

 ,QWKH'HVFULSWLRQILHOGHQWHUD 5
GHVFULSWLRQIRUWKHDFWLYLW\JURXS
 &KRRVH WRVDYHWKHDFWLYLW\JURXS
 &KRRVHWKH$XWKRUL]DWLRQVWDE

4
6

Release 4.6A/B
8–15
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”

 &KRRVH &KDQJHDXWKRUL]DWLRQGDWD

 &KRRVH 'RQRWVHOHFWWHPSODWHV

7KHV\VWHPGLVSOD\VWKH&KRRVH7HPSODWH
ZLQGRZEHFDXVHZHFKRVHWKH 8
$XWKRUL]DWLRQVWDEZLWKRXWVHOHFWLQJDQ\
WUDQVDFWLRQV
 &KRRVH(GLW→,QVHUWDXWKRUL]DWLRQ V
→)XOODXWKRUL]DWLRQ 9

Authorizations Made Easy


8–16
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”

 &KRRVH<HV

10

7KHLQVHUWLRQGRHVQRWLQFOXGHDGGRQFRPSRQHQWVH[FHSWGHGXFWLRQPDQDJHPHQWDGG
RQFRPSRQHQWV

 &KRRVH WRFRQWLQXH

11

 &OLFNRQWKHQRGHIRUWKHREMHFWFODVV
%DVLV$GPLQLVWUDWLRQWRRSHQLW

12

Release 4.6A/B
8–17
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”

 ,QWKH6\VWHP$XWKRUL]DWLRQVOLQH
FKRRVH WRGHDFWLYDWHWKHREMHFW
7KHDXWKRUL]DWLRQREMHFW6\VWHP
$XWKRUL]DWLRQV 6B$'0,B)&' LV
QRZLQDFWLYHDQGZLOOQRWEH
JHQHUDWHGLQWRWKHDXWKRUL]DWLRQ
SURILOHIRU&203B$//

13

 6FUROOGRZQXQWLO\RXVHHWKH
DXWKRUL]DWLRQREMHFWVWKDWEHJLQZLWK
$XWKRUL]DWLRQ&KHFNIRU$FWLYLW\ 17
*URXSV
 &KRRVH LQIURQWRIWKHIROORZLQJ 15
DXWKRUL]DWLRQREMHFWVWRGHDFWLYDWH 14
WKHP
< $XWKRUL]DWLRQ&KHFNIRU$FWLYLW\
*URXSV 6B86(5B$*5
< 8VHU0DVWHU0DLQWHQDQFH
$XWKRUL]DWLRQV 6B86(5B$87+
< 8VHU0DVWHU0DLQWHQDQFH8VHU
*URXSV 6B86(5B*53
< 8VHU0DVWHU0DLQWHQDQFH
$XWKRUL]DWLRQ3URILOH
6B86(5B352
< 8VHU0DVWHU0DLQWHQDQFH
6\VWHPIRU&HQWUDO8VHU
0DLQWHQDQFH 6B86(5B6<6
< 7UDQVDFWLRQ$VVLJQPHQWRI
7UDQVDFWLRQVWR$FWLYLW\*URXSV
6B86(5B7&'
 2QFH\RXKDYHGHDFWLYDWHGWKHVHFULWLFDODXWKRUL]DWLRQREMHFWVIRU\RXUDXWKRUL]DWLRQSURILOHVHOHFW
DQGGHDFWLYDWHRWKHUFULWLFDODXWKRUL]DWLRQREMHFWVLIQHHGHG
 &KRRVH2UJDQL]DWLRQDOOHYHOV

Authorizations Made Easy


8–18
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”

 &KRRVH)XOODXWKRUL]DWLRQIRUWKH
RUJDQL]DWLRQDOOHYHOV7KHDVWHULVNV
ZLOOEHLQVHUWHGLQDOOWKHRSHQ
ILHOGV
 &KRRVH 

18
19

 7RJHQHUDWHWKHSURILOHFKRRVH 

 <RXFDQJLYHWKHQHZSURILOHWKH
VDPHQDPHDQGGHVFULSWLRQDVWKH 21
DFWLYLW\JURXS IRUH[DPSOH
COMP_ALL  22
 &KRRVH WRJHQHUDWHWKH
DXWKRUL]DWLRQSURILOH V 

Release 4.6A/B
8–19
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”

 7RYLHZDOOWKHFUHDWHGSURILOHV
FKRRVH$XWKRUL]DWLRQV→3URILOH 23
RYHUYLHZ

 7KH2YHUYLHZRI*HQHUDWHG3URILOHV
VFUHHQOLVWVDOOWKHJHQHUDWHG
24
DXWKRUL]DWLRQSURILOHV
 &KRRVH WRFRQWLQXH

25

Authorizations Made Easy


8–20
&KDSWHU $VVLJQLQJ$FWLYLW\*URXSV 

&RQWHQWV

Overview ..................................................................................................................9–2
Assigning Users to Activity Groups .....................................................................9–3
Assigning Activity Groups to Users .....................................................................9–6
Assigning PD Objects to Activity Groups ............................................................9–7
Assigning Activity Groups to PD Objects ..........................................................9–10
Transferring Users from an IMG Project to an Activity Group.........................9–13
Updating Profiles in the User Master Records ..................................................9–15
Creating a Sample Organizational Plan ..............................................................9–21
Structural Authorizations.....................................................................................9–28

9–1
Chapter 9: Assigning Activity Groups
Overview

2YHUYLHZ

7KHQHZ6$3(DV\$FFHVVXVHUPHQXLVWKHXVHUVSHFLILFSRLQWRIHQWU\LQWRWKH56\VWHP
'HSHQGLQJRQWKHDVVLJQHGXVHUUROHWHPSODWHRUDFWLYLW\JURXSVWKHXVHUPHQXORRNV
GLIIHUHQWIRUHDFKXVHU7KHXVHUPHQXFRQWDLQVRQO\WKRVHLWHPV³VXFKDVWUDQVDFWLRQV
UHSRUWVDQGZHEDGGUHVVHV³WKDWWKHDVVLJQHGDFWLYLW\JURXSVFRQWDLQDQGWKHUHIRUHRQO\
WKRVHWDVNVQHHGHGWRSHUIRUPWKHGDLO\ZRUN
'HSHQGLQJRQWKHDUHDRIWKHV\VWHP\RXZRUNLQDVVLJQLQJDFWLYLW\JURXSVWR5REMHFWV
VXFKDVXVHUVSRVLWLRQVMREVRURUJDQL]DWLRQDOXQLWV DIIHFWVWKHIROORZLQJDUHDV
< ,Q%XVLQHVV:RUNIORZWKHVHDVVLJQPHQWVGHWHUPLQHWKHV\VWHPWDVNVDXVHUFDQSHUIRUP
IRUZRUNIORZXVHUVLWLVPDQGDWRU\WRRQO\LQFOXGHWDVNVLQDFWLYLW\JURXSV 
< ,Q+XPDQ5HVRXUFHVWKHVHDVVLJQPHQWVVHUYHDVKLJKO\GHWDLOHGREMHFWGHVFULSWLRQV IRU
MRESRVLWLRQGHVFULSWLRQVHWF 
7KHVDPHDFWLYLW\JURXSFDQEHDVVLJQHGWRVHYHUDOGLIIHUHQWREMHFWV$VLQJOHREMHFWPD\DOVR
EHUHODWHGWRVHYHUDOGLIIHUHQWDFWLYLW\JURXSV7KHGLIIHUHQWDFWLYLW\JURXSVDVVLJQHGWRDQ
REMHFWDUHWRJHWKHUUHIHUUHGWRDVWKHREMHFW·VDFWLYLW\SURILOH7KHYDULRXV5REMHFWVDUH
< 5XVHUV²2EMHFWW\SH86
$Q5XVHULVDQLQGLYLGXDOZKRLV
Π5HFRJQL]HGE\5
Π$OORZHGWRORJRQ
Π$OORZHGWRSHUIRUPVSHFLILHGV\VWHPDFWLYLWLHV
)RUWKHV\VWHPWRUHFRJQL]HXVHUVWKHLUQDPHVPXVWEHHQWHUHGLQWKH%DVLV
FRPSRQHQWRIWKHXVHUPDVWHUUHFRUG
< :RUNFHQWHU2EMHFWW\SH$
$ZRUNFHQWHULGHQWLILHVDORFDWLRQZKHUHZRUNLVFDUULHGRXW$ORFDWLRQFDQUHSUHVHQWD
JHRJUDSKLFORFDWLRQVXFKDVWKH3KLODGHOSKLDEUDQFKRIILFHRUWKH6LQJDSRUHVXEVLGLDU\
RULWFDQEHPRUHSUHFLVH)RUH[DPSOHLWFDQLGHQWLI\DVSHFLILFZRUNVWDWLRQZLWKFHUWDLQ
PDWHULDOVDQGHTXLSPHQWRQDVSHFLILFIORRURIDVSHFLILFEXLOGLQJ:RUNFHQWHUVFDQEH
XVHGZLWKMREVDQGWDVNVWRFUHDWHFRPSUHKHQVLYHMREGHVFULSWLRQV7KHMRELGHQWLILHVWKH
MREFODVVLILFDWLRQWKHWDVNVLQGLFDWHWKHW\SHVRIGXWLHVSHUIRUPHGDQGWKHZRUNFHQWHU
LGHQWLILHVZKHUHWKHWDVNVDUHFDUULHGRXW
< -RE2EMHFWW\SH&
$MRELVDJHQHUDOFODVVLILFDWLRQRIZRUNGXWLHVVXFKDVDGPLQLVWUDWLYHDVVLVWDQW
FRPSXWHUSURJUDPPHURULQVWUXFWRU0DQ\HPSOR\HHVPD\KROGWKHVDPHMRE IRU
H[DPSOHWKHUHPLJKWEHHPSOR\HHVZRUNLQJDVHQJLQHHUV -REVDUHQRUPDOO\XVHGWR
FUHDWHSRVLWLRQV$Q\RQHZKRKROGVDMREDXWRPDWLFDOO\LQKHULWVWKHLQIRW\SHVHWWLQJV
DWWULEXWHVDQGSURSHUWLHVRIWKHMRE8QOHVVWKHVHJURXSVJUDQWJHQHUDODFFHVVULJKWV
VXFKDVWKRVHUHTXLUHGWRZRUNZLWK6$3RIILFHXVHFDUHZKHQDVVLJQLQJDFWLYLW\JURXSV
WRMREV

Authorizations Made Easy


9–2
Chapter 9: Assigning Activity Groups
Assigning Users to Activity Groups

< 2UJDQL]DWLRQDOXQLW2EMHFWW\SH2
2UJDQL]DWLRQDOXQLWVUHSUHVHQWRUJDQL]DWLRQDOHQWLWLHVGHVLJQDWHGWRSHUIRUPDVSHFLILHG
VHWRIIXQFWLRQV)RUH[DPSOHRUJDQL]DWLRQDOXQLWVUHSUHVHQWVXEVLGLDULHVGLYLVLRQV
GHSDUWPHQWVJURXSVVSHFLDOSURMHFWWHDPVHWF,GHQWLI\WKHRUJDQL]DWLRQDOVWUXFWXUHDW
\RXUILUPE\FUHDWLQJRUJDQL]DWLRQDOXQLWVDQGLGHQWLI\LQJWKHUHODWLRQVKLSVDPRQJWKH
XQLWV$QHPSOR\HHDVVLJQHGWRDQRUJDQL]DWLRQDOXQLWDXWRPDWLFDOO\LQKHULWVWKH
LQIRW\SHVHWWLQJVDWWULEXWHVDQGSURSHUWLHVRIWKLVXQLW
8QOHVVWKHVHJURXSVJUDQWJHQHUDODFFHVVULJKWVVXFKDVSULQWLQJXVHFDUHZKHQ
DVVLJQLQJDFWLYLW\JURXSVWRMREV)RUH[DPSOHLIDXWKRULW\SURILOHVWHQGWREHIDLUO\
VWDQGDUGIRUDOOZRUNHUVLQDQRUJDQL]DWLRQDOXQLWLWPD\EHPRVWHIIHFWLYHWRDVVLJQ
DFWLYLW\JURXSVDQGWKHLUSURILOHVWRRUJDQL]DWLRQDOXQLWV,IH[FHSWLRQVRFFXUFUHDWH
DGGLWLRQDODFWLYLW\JURXSV,IKRZHYHUDXWKRULWLHVYDU\E\MRERUSRVLWLRQLWPD\EHEHVW
WRDVVLJQDFWLYLW\JURXSVWRWKHVSHFLILFMREVRUSRVLWLRQV
< 3HUVRQ2EMHFWW\SH3
$SHUVRQ
< 3RVLWLRQ2EMHFWW\SH6
$SRVLWLRQUHSUHVHQWVDXQLTXHLQGLYLGXDOHPSOR\HHDVVLJQPHQWZLWKLQDFRPSDQ\ IRU
H[DPSOHWKHPDUNHWLQJDVVLVWDQWVDOHVPDQDJHUHWF 3RVLWLRQVVKRXOGQRWEHFRQIXVHG
ZLWKMREVDQGDUHXVXDOO\FUHDWHGEDVHGRQMREV$Q\RQHZKRKROGVDSRVLWLRQ
DXWRPDWLFDOO\LQKHULWVWKHLQIRW\SHVHWWLQJVDWWULEXWHVDQGSURSHUWLHVRIWKHSRVLWLRQ
7KLVSURFHVVDOORZV\RXWRKDQGOHDXWKRUL]DWLRQPDQDJHPHQWLQDOPRVWDFRPSOHWHO\
SRVLWLRQRULHQWHGIDVKLRQ6LQFHDOORIWKHDFFHVVULJKWVDUHQRZOLQNHGWRWKHSRVLWLRQLW
GRHVQRWPDWWHUZKRILOOVWKLVSRVLWLRQ2QFHDXVHUFKDQJHVSRVLWLRQVWKHDXWKRUL]DWLRQ
SURILOHDXWRPDWLFDOO\FKDQJHVDIWHUWKHXVHUPDVWHUUHFRUGLVXSGDWHG

$VVLJQLQJ$FWLYLW\*URXSV
0DNHVXUH\RXDVVLJQWKHDFWLYLW\JURXSWRWKHVSHFLILFSRVLWLRQWKDWZLOOUHFHLYHDQ
DXWKRUL]DWLRQSURILOH,I\RXDVVLJQWKHDFWLYLW\JURXSWRDMREDOORIWKHSRVLWLRQV
FUHDWHGIURPWKDWMREZLOOLQKHULWWKHDFWLYLW\JURXSDQGLWVDXWKRUL]DWLRQSURILOH V 

$VVLJQLQJ8VHUVWR$FWLYLW\*URXSV

$OWKRXJKZHDOUHDG\GHPRQVWUDWHGLQFKDSWHU8VHU5ROH7HPSODWHVKRZWRDVVLJQDXVHUWR
DXVHUUROHWHPSODWHRUDFWLYLW\JURXSXVLQJWKH3*ZHZLOOGHPRQVWUDWHLWKHUHLQPRUH
GHWDLO
7KHIROORZLQJPHWKRGLVUHFRPPHQGHGLI\RXZDQWWRDVVLJQPRUHXVHUVWRDVSHFLILF
DFWLYLW\JURXS
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHDFWLYLW\JURXS\RXZDQWWRDVVLJQWRDQHPSOR\HHDQGFKRRVH &KDQJH

Release 4.6A/B
9–3
Chapter 9: Assigning Activity Groups
Assigning Users to Activity Groups

 &KRRVHWKH8VHUWDE
 (QWHUWKHXVHU,'LQWKH8VHU,'ILHOG
<RXFDQLQFOXGHXVHU,'VE\RQHRI 4
WKHIROORZLQJPHWKRGV
< (QWHUWKHXVHU,'GLUHFWO\
< 0DNHDVHOHFWLRQIURPWKHSRVVLEOH
HQWULHVOLVW
< 8VHPXOWLSOHVHOHFWLRQIURPD
VHOHFWLRQOLVWE\FKRRVLQJ
Tip
6HOHFWLRQ6HHWKHIROORZLQJ7LSV
7ULFNV
3
 7RVDYH\RXUDVVLJQPHQWFKRRVH 

%\XVLQJWKHEXWWRQ 6HOHFWLRQ\RXFDQLQFOXGH
VHYHUDOXVHUV IRUH[DPSOHDOOXVHUVLQDSDUWLFXODU
XVHUJURXSRUDOOXVHUVLQWKH56\VWHP 6HOHFWWKH
GHVLUHGXVHUDQGFKRRVH 

,I\RXFDQQRWILQGWKHUHTXLUHGXVHURULI\RXZDQWWR
FKRRVHWKHXVHUWKURXJKDXVHUJURXS
D &KRRVH 
a
E 2QWKH([HFXWHYDOXHUHVWULFWLRQZLQGRZILQGWKH
XVHUE\HLWKHU
< (QWHULQJWKHILUVWOHWWHU V RIWKHXVHUQDPHDQG b
DQDVWHULVN WRH[SDQGVHOHFWLRQOLVW c
< 8VLQJWKH8VHUJURXSILHOGWRILQGWKHXVHU
WKURXJKWKHLUXVHUJURXS
F &KRRVH  d
G 6HOHFWWKHXVHU
,WLVSRVVLEOHWRVHOHFWVHYHUDOXVHUV e
H &KRRVH 

Authorizations Made Easy


9–4
Chapter 9: Assigning Activity Groups
Assigning Users to Activity Groups

 7KHFKRVHQXVHU V DSSHDULQWKH
8VHU,'DQG8VHUQDPHFROXPQV
8
 ,QWKH)URPDQGWRFROXPQVUHVWULFW
WKHVWDUWDQGHQGGDWHRIWKHXVHU
DVVLJQPHQW
7KHV\VWHPHQWHUVE\GHIDXOWWKH
FXUUHQWGDWHDVWKHVWDUWGDWHDQG
DVWKHHQGGDWH
9
 &KRRVH WRVDYH\RXUVHOHFWLRQ
 &KRRVH 8VHUFRPSDUH 6 7

6WDWXV'LVSOD\RQWKH7DE
7KHVWDWXVGLVSOD\RQWKH8VHUWDEGLVSOD\VZKHWKHURUQRWXVHUVDUHDOUHDG\DVVLJQHGWR
WKHDFWLYLW\JURXS,IWKHGLVSOD\DSSHDUVLQUHGQRXVHUVDUHDVVLJQHG,IJUHHQDWOHDVW
RQHXVHULVDVVLJQHGWRWKHJURXS,I\HOORZLWPHDQVWKDWDOWKRXJKXVHUVKDYHEHHQ
DVVLJQHGWRWKHDFWLYLW\JURXSWKHXVHUPDVWHUUHFRUGFRPSDULVRQLVQRWFXUUHQW

7LPH'HSHQGHQF\RI8VHU$VVLJQPHQWDQG$XWKRUL]DWLRQV
,I\RXDOVRXVHWKHDFWLYLW\JURXSWRJHQHUDWHDXWKRUL]DWLRQSURILOHVWKHQ\RXVKRXOG
QRWHWKDWWKHJHQHUDWHGSURILOHLVQRWHQWHUHGLQWKHXVHUPDVWHUUHFRUGXQWLOWKHXVHU
PDVWHUUHFRUGVKDYHEHHQFRPSDUHG:KHQ\RXVSHFLI\WKHXVHUVIRUWKHDFWLYLW\JURXS
WKHV\VWHPGHIDXOWVWRWKHFXUUHQWGDWHDVWKHVWDUWGDWHRIWKHXVHUDVVLJQPHQWDQG
DVWKHHQGGDWH,I\RXZDQWWRUHVWULFWWKHVWDUWDQGHQGGDWHVRIWKH
DVVLJQPHQWIRUH[DPSOHLI\RXZDQWWRGHILQHDWHPSRUDU\UHSODFHPHQWIRUDXVHUWKH
V\VWHPDXWRPDWLFDOO\PDNHVWKHFKDQJHVWRWKHXVHU7KLVDXWRPDWLFDGMXVWPHQWRIWKH
XVHU·VDXWKRUL]DWLRQVLVH[HFXWHGE\UHSRUW3)&*B7,0(B'(3(1'(1&<,QWKLVFDVH
\RXVKRXOGVFKHGXOHUHSRUW3)&*B7,0(B'(3(1'(1&<GDLO\IRUH[DPSOHHDUO\LQWKH
PRUQLQJWRUXQLQWKHEDFNJURXQG LQWUDQVDFWLRQ6$IRUH[DPSOH 7KLVUHSRUW
FRPSDUHVWKHXVHUPDVWHUUHFRUGVIRUDOODFWLYLW\JURXSVDQGXSGDWHVWKHDXWKRUL]DWLRQV
IRUWKHXVHUPDVWHUUHFRUGV7KHV\VWHPUHPRYHVDXWKRUL]DWLRQSURILOHVIURPLQYDOLGXVHU
DVVLJQPHQWVDQGHQWHUVDXWKRUL]DWLRQSURILOHVIURPYDOLGDVVLJQPHQWV

Release 4.6A/B
9–5
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to Users

$VVLJQLQJ$FWLYLW\*URXSVWR8VHUV

<RXFDQDOVRDVVLJQXVHUUROHWHPSODWHVRUDFWLYLW\JURXSVWRXVHUVXVLQJWUDQVDFWLRQ68¥8VHUV,I\RX
ZRXOGOLNHWRDVVLJQVHYHUDODFWLYLW\JURXSVWRRQHXVHUWKLVLVDPRUHHIILFLHQWZD\IRUWKHDVVLJQPHQW
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSU01DQGFKRRVH(QWHU RULQWKH6$3VWDQGDUGPHQXFKRRVH
7RROV→$GPLQLVWUDWLRQ→8VHUPDLQWHQDQFH→8VHUV 
 (QWHUWKHQDPHRIWKHXVHUWRZKRP
\RXZRXOGOLNHWRDVVLJQWKHDFWLYLW\
JURXSRUXVHSRVVLEOHHQWULHV
 &KRRVH 
3

 6HOHFWDOOWKHGHVLUHGDFWLYLW\JURXSV
E\HQWHULQJWKHFRUUHFWQDPHVRUXVH
SRVVLEOHHQWULHV 6

 (QWHUWKHFRUUHFWYDOLGLW\SHULRGIRU
WKHDVVLJQPHQW
Tip
 &KRRVH WRVDYH\RXUDVVLJQPHQW

5
4

7RVHHWKHFRUUHVSRQGLQJSURILOHVVHOHFW
WKH3URILOHVWDE

Authorizations Made Easy


9–6
Chapter 9: Assigning Activity Groups
Assigning PD Objects to Activity Groups

$OOFKDQJHVKDYHEHHQVDYHGWRWKH
XVHUPDVWHUUHFRUG

5HPHPEHUDVORQJDVDQDFWLYLW\JURXSLVDVVLJQHGWRDQ5XVHU\RXFDQFKDQJHWKLV
DFWLYLW\JURXSDQGWKHDSSURSULDWHDXWKRUL]DWLRQSURILOHVDVRIWHQDV\RXZDQWZLWKRXW
XSGDWLQJWKHXVHUPDVWHUUHFRUG
,IDQDFWLYLW\JURXSLVFKDQJHGVRWKDWRQHSURILOHEHFRPHVWZRRUPRUHWKHVHSURILOHV
DUHDXWRPDWLFDOO\DVVLJQHGWRDOOWKHXVHUVWRZKRPWKHROGSURILOHEHORQJHG7KHXVHU
PDVWHURIWKLVXVHUDXWRPDWLFDOO\JHWVXSGDWHG

$VVLJQLQJ3'2EMHFWVWR$FWLYLW\*URXSV

<RXFDQDVVLJQ3'REMHFWVVXFKDVSRVLWLRQVMREVRURUJDQL]DWLRQDOXQLWVWRDFWLYLW\JURXSV8VLQJ
WUDQVDFWLRQPFCGYHULI\WKDWWKHDXWKRUL]DWLRQSURILOHVKDYHEHHQJHQHUDWHG WKHOLJKWRQWKH$XWKRUL]DWLRQV
WDEVKRXOGEHJUHHQ 

&UHDWHD6DPSOH2UJDQL]DWLRQDO3ODQ
7RDVVLJQ3'REMHFWVWRDFWLYLW\JURXSV\RXUV\VWHPPXVWKDYHDQRUJDQL]DWLRQDOSODQ,I
\RXKDYHQRWFUHDWHGRQHIRU\RXUFRPSDQ\EXW\RXZDQWWRWHVWWKLVIXQFWLRQDOLW\VHH
&UHDWLQJD6DPSOH2UJDQL]DWLRQDO3ODQRQSDJH²

 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHDFWLYLW\JURXSWREHDVVLJQHGWRD3'REMHFW
 6HOHFW2YHUYLHZ 2UJDQL]DWLRQDOPDQDJHPHQWDQGZRUNIORZ 
 &KRRVH &KDQJH

Release 4.6A/B
9–7
Chapter 9: Assigning Activity Groups
Assigning PD Objects to Activity Groups

 2QWKH&KDQJH$FWLYLW\*URXSV
VFUHHQFKRRVHWKH8VHUWDE
 &KRRVH 2UJDQL]DWLRQDO0ž

5
6

 7RFUHDWHWKHDVVLJQPHQW , FKRRVH 

 6HOHFWWKHREMHFWWREHDVVLJQHG IRU
H[DPSOH3RVLWLRQ 
 &KRRVH 
8

 &KRRVH WRJHWDOLVWRISRVLWLRQV


10

 )URPWKHOLVWRISRVLWLRQVVHOHFWWKH
SRVLWLRQ\RXZRXOGOLNHWRDVVLJQWR
WKHVHOHFWHGDFWLYLW\JURXS PRUH 11
WKDQRQHSRVLWLRQPD\EHVHOHFWHG 
 &KRRVH  12

Authorizations Made Easy


9–8
Chapter 9: Assigning Activity Groups
Assigning PD Objects to Activity Groups

 (QWHUWKHWLPHSHULRGIRUWKH
UHODWLRQVKLS
 &KRRVH WRFUHDWHWKHUHODWLRQVKLS

13

14

7KHUHODWLRQVKLSLVHVWDEOLVKHG
 8QGHUWKHDFWLYLW\JURXS\RXFDQVHH
WKHDVVLJQHGSRVLWLRQ8QGHUWKH
16
SRVLWLRQ\RXFDQVHHWKHDVVLJQHG
XVHU
 7RXSGDWHWKHXVHUPDVWHUUHFRUGVVR
15
WKDWWKHDSSURSULDWHSURILOHVDUH
LQVHUWHGLQWRWKLVUHFRUGFKRRVH 

<RXKDYHWKHRSWLRQWRVHOHFWEHWZHHQGLIIHUHQWYLHZVIRUWKHDVVLJQPHQW)URPWKH
PHQXEDUFKRRVH9LHZDQGWKHQVHOHFWDQ\RIWKHIROORZLQJPHQXRSWLRQV.H\
$EEUHYLDWLRQ2EMHFWSHULRG5HODWLRQVKLSSHULRG8VHUVRQO\

7KHDVVLJQPHQWLVVDYHGDQGWKH
XVHUPDVWHUGDWDXSGDWHG

Release 4.6A/B
9–9
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to PD Objects

$VVLJQLQJ$FWLYLW\*URXSVWR3'2EMHFWV

<RXFDQDVVLJQDFWLYLW\JURXSVWR3'REMHFWV8VLQJWKH3*YHULI\WKDWWKHDXWKRUL]DWLRQSURILOHVKDYHEHHQ
JHQHUDWHG WKHOLJKWRQWKH$XWKRUL]DWLRQVWDEVKRXOGEHJUHHQ
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQppom_oldDQGFKRRVH(QWHU RULQWKH6$3VWDQGDUGPHQX
FKRRVHWKH+XPDQUHVRXUFHV→2UJDQL]DWLRQDOPDQDJHPHQW→([SHUWPRGH→6LPSOHPDLQWHQDQFH→
3320B2/'¥FKDQJH 
 (QWHUWKHRUJDQL]DWLRQDOXQLWRUXVH
SRVVLEOHHQWULHV

 &KRRVH76WUXFWXUH6HDUFKWRVHOHFW 3
WKHRUJDQL]DWLRQDOXQLWXVLQJD
VWUXFWXUDOVHDUFK

 6HOHFWWKHDSSURSULDWHURRW
RUJDQL]DWLRQDOXQLW,QWKLVH[DPSOH
4
ZHFKRVHWKHURRWRUJDQL]DWLRQDO
XQLWIURPWKHVDPSOHRUJDQL]DWLRQDO
SODQ
 &KRRVH 
5

Authorizations Made Easy


9–10
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to PD Objects

 7KHVHOHFWHGRUJDQL]DWLRQDOSODQ
DSSHDUVLQWKH2UJDQL]DWLRQDOXQLW
ILHOG
7
 &KRRVH 
6

 &KRRVH6WDIIDVVLJQPHQWV

 ([SDQGWKHXQLWVDQGVHOHFWWKHRQH
WRZKLFK\RXZRXOGOLNHWRDVVLJQ
WKHDFWLYLW\JURXS IRUH[DPSOH 10
%X\HU 
 &KRRVH7DVNSURILOH

Release 4.6A/B
9–11
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to PD Objects

 2QWKH7DVN3URILOH&KDQJHVFUHHQ
VHOHFWWKHSRVLWLRQWRZKLFK\RX
ZRXOGOLNHWRDVVLJQDQDFWLYLW\ 12
JURXS
 &KRRVH $FWLYLW\JURXS 11

 (QWHUWKHILUVWOHWWHURIWKHDFWLYLW\ 13
JURXS\RXZRXOGOLNHWRDVVLJQRU
14
OHDYHWKHDVWHULVNV LQWKHILHOGWR
JHWDOLVWRIDOODFWLYLW\JURXSV
 &KRRVH 
 6HOHFWWKHDFWLYLW\JURXS\RXZLVKWR
DVVLJQ PXOWLSOHVHOHFWLRQVDUH
SRVVLEOH  15

 &KRRVH  16

 7RYHULI\WKHDVVLJQPHQWFKRRVH 

17

7KHDVVLJQPHQWEHWZHHQWKHSRVLWLRQ
DQGWKHDFWLYLW\JURXSKDVEHHQVDYHG

7RPDNHFKDQJHVWRWKHDVVLJQHG
DFWLYLW\JURXSVHOHFWWKHDFWLYLW\JURXS
DQGFKRRVH*RWR→$FWLYLW\JURXS

7KHQH[WVWHSLVWRXSGDWHWKHXVHUPDVWHUUHFRUGVVRWKDWWKHDSSURSULDWHSURILOHVDUHLQVHUWHGLQWRWKH
XVHUPDVWHUUHFRUGDQGDVVLJQHGWRWKHRUJDQL]DWLRQDOXQLWV

Authorizations Made Easy


9–12
Chapter 9: Assigning Activity Groups
Transferring Users from an IMG Project to an Activity Group

7UDQVIHUULQJ8VHUVIURPDQ,0*3URMHFWWRDQ$FWLYLW\
*URXS

,I\RXDVVLJQHGXVHUV UHVRXUFHV WRDQ,0*SURMHFWLQWKHSURMHFWPDQDJHPHQWDQGGLGQRW


FRS\WKHXVHUDVVLJQPHQWZKHQFUHDWLQJWKHFXVWRPL]LQJDXWKRUL]DWLRQV\RXFDQWUDQVIHU
WKHVHXVHUVWRWKHDFWLYLW\JURXSXVLQJWKHIROORZLQJSURFHGXUH

1RWHWKDW\RXPXVWFDOOWKLVIXQFWLRQDJDLQHDFKWLPH\RXPDNHFKDQJHVLQWKH,0*SURMHFW
DGPLQLVWUDWLRQ

)RUWKHIROORZLQJH[DPSOHZHDVVXPHWKDW
< $Q,0*SURMHFWZLWKDWOHDVWRQHDVVLJQHGXVHUH[LVWV
< <RXDVVLJQHGDQ,0*SURMHFWRUSURMHFWYLHZWRWKHDFWLYLW\JURXS VHHFKDSWHUWKH
VHFWLRQ$VVLJQLQJ,0*3URMHFWVRU3URMHFW9LHZVWR$FWLYLW\*URXSV
< <RXPDLQWDLQHGWKHDXWKRUL]DWLRQVIRUWKHFXVWRPL]LQJDFWLYLW\JURXS VHHFKDSWHUWKH
VHFWLRQ$VVLJQLQJ,0*3URMHFWVRU3URMHFW9LHZVWR$FWLYLW\*URXSV
7RWUDQVIHUXVHUVIURPDQ,0*SURMHFWWRDQDFWLYLW\JURXS
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWWKHFXVWRPL]LQJDFWLYLW\JURXSWRZKLFK\RXZRXOGOLNHWRWUDQVIHUWKHXVHUIURP
DQ,0*SURMHFW IRUH[DPSOH40B&86720,=,1* DQGFKRRVH &KDQJH
 &KRRVHWKH0HQXWDE

 &KRRVH8WLOLWLHV→
&XVWRPL]LQJDXWK 4

Release 4.6A/B
9–13
Chapter 9: Assigning Activity Groups
Transferring Users from an IMG Project to an Activity Group

 &KRRVH 8VHU

 6HOHFWWKHXVHUV\RXZRXOGOLNHWR
DVVLJQ
6
 &KRRVH 
$OOVHOHFWHGXVHUVZLOOEHWUDQVIHUUHG 7
E\GHIDXOW
 &KRRVH  8
 &KRRVHWKH8VHUWDE
 &KRRVH 8VHUFRPSDUH

10
$VFXVWRPL]LQJLVSURMHFWUHODWHGDQG
UXQVIRUDOLPLWHGSHULRG\RXVKRXOG
PDLQWDLQWKHHQGGDWHIRUWKHXVHULQWKH
XVHUDVVLJQPHQW7LPHUHVWULFWLRQV
SUHYHQWXVHUVZKRDUHDVVLJQHGWRWKH
DFWLYLW\JURXSIURPKDYLQJ
DXWKRUL]DWLRQIRUWKHDVVLJQHGSURMHFWV
RUSURMHFWYLHZVDIWHUWKHFXVWRPL]LQJ
SURMHFWLVFRPSOHWH

 &KRRVH &RPSOHWHFRPSDUH

11

Authorizations Made Easy


9–14
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records

7KHXVHUVIURPWKHFXVWRPL]LQJ
SURMHFWDUHWUDQVIHUUHGWRWKH
DFWLYLW\JURXS

8SGDWLQJ3URILOHVLQWKH8VHU0DVWHU5HFRUGV

7KLVVHFWLRQGHVFULEHVWKHVWHSVLQYROYHGLQXVLQJUHSRUW3)&*B7,0('(3(1'(1&<WR
XSGDWHXVHUPDVWHUUHFRUGV5HPHPEHUWKDWDFWLYLW\JURXSVWKHLUDVVLJQPHQWWRXVHUPDVWHU
UHFRUGVRU3'REMHFWVFDQEHGHOLPLWHG
7RHQVXUHWKDWRQO\YDOLGDXWKRUL]DWLRQSURILOHVUHPDLQLQWKHXVHUPDVWHUUHFRUGHDFKGD\
FRQGXFWGDLO\SURILOHFRPSDULVRQV)RUWKHFKDQJHVLQWKHXVHUPDVWHUUHFRUGWREHHIIHFWLYH
WKLVFRPSDULVRQPXVWWDNHSODFHEHIRUHWKHXVHUORJVRQ
7RFRQGXFWDFRPSDULVRQ\RXFDQHLWKHU
< &RPSDUHWKHXVHUPDVWHUGDWDGLUHFWO\IURPZLWKLQWKH3*
< 8VHPDVVFRPSDUHZLWKLQWKH3* (QYLURQPHQW→0DVVFRPSDUH
< 5XQUHSRUW3)*&B7,0(B'(3(1'(1&<LQDEDFNJURXQGMREEHIRUHWKHVWDUWRIHDFK
GD\
7KHVHRSWLRQVDUHGLVFXVVHGLQWKHIROORZLQJWKUHHVHFWLRQV

&RPSDULQJ8VHU0DVWHU'DWDIURP:LWKLQ7UDQVDFWLRQ3)&*
$FRPSDULVRQRIXVHUPDVWHUGDWDGLUHFWO\IURPZLWKLQWKH3*LPPHGLDWHO\XSGDWHVD
VSHFLILFXVHUPDVWHUDIWHUFUHDWLQJDQDVVLJQPHQW
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWDQDFWLYLW\JURXSIRUZKLFK\RXZRXOGOLNHWRXSGDWHWKHXVHUPDVWHUGDWDDQG
FKRRVH &KDQJH

Release 4.6A/B
9–15
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records

 2QWKH&KDQJH$FWLYLW\*URXSV
VFUHHQFKRRVHWKH8VHUWDE
 ,QWKH8VHU,'FROXPQHQWHUDXVHU
,'RUVHOHFWLWIURPDOLVWXVLQJ
SRVVLEOHHQWULHV
 (QWHUDYDOLGLW\SHULRG
3
 &KRRVH 8VHUFRPSDUH 6

5
4

6WDWXV'LVSOD\RQWKH8VHU7DE
7KHVWDWXVGLVSOD\RQWKHWDEWHOOVLIDXVHULVDOUHDG\DVVLJQHGWRDQDFWLYLW\JURXS,IWKH
LQGLFDWRULVUHGQRXVHUVDUHDVVLJQHG,IJUHHQDWOHDVWRQHXVHULVDVVLJQHGWRWKHJURXS
,I\HOORZWKLVPHDQVWKDWDOWKRXJKXVHUVKDYHEHHQDVVLJQHGWRWKHDFWLYLW\JURXSWKH
XVHUPDVWHUUHFRUGFRPSDULVRQLVQRWFXUUHQW

 &KRRVH &RPSOHWHFRPSDUH

Tip
7

7KHH[SHUWPRGHGLVSOD\VH[DFWO\ZKLFKSURILOHVZHUHLQVHUWHGDQGUHPRYHGIRUHDFK
XVHU$V\RXKDYHWKHRSWLRQWRUHVWULFWWKHVHOHFWLRQRIWKHSURILOHVIRUSURFHVVLQJWKH
VWDWXVRI8VHUFRPSDUHLVQRWVZLWFKHGWRJUHHQ7KLVVWDWXVLVRQO\WKHFDVHLIWKH
FRPSDULVRQLVH[HFXWHGE\FKRRVLQJ &RPSOHWHFRPSDUH,I\RXFKRRVH ([SHUWPRGHIRU
FRPSDUHWKHVWDWXVLVQRWVHWWRJUHHQ

 ,I\RXKDYHQRWVDYHGWKHDFWLYLW\
JURXS\HWFKRRVH<HV
8

Authorizations Made Easy


9–16
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records

 7KHJUHHQOLJKWRQ8VHUFRPSDUH
LQGLFDWHVWKDWWKHFRPSDULVRQLV
FRPSOHWH

1RWHWKDWFKDQJHVDUHILUVWDFWLYHZLWKWKHQH[WXVHUORJRQ

Release 4.6A/B
9–17
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records

3URILOH&RPSDULVRQV8VLQJ0DVV&RPSDUH 3)8'
)RUSURILOHFRPSDULVRQZLWKLQWKH3*\RXFDQXVHWKHPDVVFRPSDUHIXQFWLRQUHJXODUO\WRFKHFNIRU
EDFNJURXQGMREHUURUV
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQPFUDDQGFKRRVH(QWHU RUDFFHVVWKH3*DQGFKRRVH
(QYLURQPHQW→0DVVFRPSDUH 
 &KRRVHWKHDFWLYLW\JURXSV\RX
ZRXOGOLNHWRUHFRQFLOH
 6HOHFWRQHRIWKHIROORZLQJDFWLRQV
6
< 6FKHGXOHRUFKHFNMREIRUIXOO
UHFRQFLOLDWLRQ
2
VHHWKHQH[WVHFWLRQ
< 0DQXDOVHOHFWLRQRISURILOHV
IRUVHOHFWHGSURILOHV 3
< &RPSOHWHFRPSDUH
WRDGMXVWXVHUPDVWHUUHFRUGVIRU
DOODFWLYLW\JURXSV
4
 8QGHU2SWLRQVVHOHFWWKHGHVLUHG
VHWWLQJV ZHVHOHFWHGDOO 
 ,I\RXZRXOGOLNHWRUHFRQFLOHZLWK 5
RUJDQL]DWLRQDOPDQDJHPHQWVHOHFW
5HFRQFLOHZLWK+52UJDQL]DWLRQDO
0DQDJHPHQW
 &KRRVH 

7KHIROORZLQJZLQGRZRQO\DSSHDUVLI\RXVHOHFWWKHRSWLRQ0DQXDOVHOHFWLRQRISURILOHVLQ
VWHSEHFDXVHWKHVWDWXVIRUWKHFRPSOHWHFRPSDUHKDVQRWEHHQVHW,I\RXOHDYHWKH
GHIDXOWYDOXHZKLFKLV&RPSOHWHFRPSDUH\RXZLOOQRWJHWWKHIROORZLQJZLQGRZEHFDXVH
WKHVWDWXVZLOODOUHDG\EHVHWFRUUHFWO\IRUWKH3*

 &KRRVH 

Authorizations Made Easy


9–18
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records

 &KRRVH 8VHUPDVWHUUHFRUG

7KHXVHUPDVWHUUHFRUGVKDYHEHHQ
VXFFHVVIXOO\XSGDWHG

1RWHWKDWFKDQJHVDUHILUVWDFWLYHZLWKWKHQH[WXVHUORJRQ

5HSRUW3)&*B7,0(B'(3(1'(1&<WR6FKHGXOH7LPH'HSHQGHQF\

7LPH'HSHQGHQF\RI8VHU$VVLJQPHQWDQG$XWKRUL]DWLRQV
:KHQ\RXVSHFLI\WKHXVHUVIRUWKHDFWLYLW\JURXSWKHV\VWHPGHIDXOWVWRWKHFXUUHQWGDWH
DVWKHVWDUWGDWHRIWKHXVHUDVVLJQPHQWDQGDVWKHHQGGDWH,I\RXZDQWWR
UHVWULFWWKHVWDUWDQGHQGGDWHVRIWKHDVVLJQPHQWIRUH[DPSOHLI\RXZDQWWRGHILQHD
WHPSRUDU\UHSODFHPHQWIRUDXVHUWKHV\VWHPDXWRPDWLFDOO\PDNHVWKHFKDQJHVWRWKH
XVHU7KLVDXWRPDWLFDGMXVWPHQWRIWKHXVHU·VDXWKRUL]DWLRQVLVH[HFXWHGE\UHSRUW
3)&*B7,0(B'(3(1'(1&<,QWKLVFDVH\RXVKRXOGVFKHGXOHUHSRUW
3)&*B7,0(B'(3(1'(1&<GDLO\IRUH[DPSOHHDUO\LQWKHPRUQLQJWRUXQLQWKH
EDFNJURXQG LQWUDQVDFWLRQ6$IRUH[DPSOH 7KLVUHSRUWFRPSDUHVWKHXVHUPDVWHU
UHFRUGVIRUDOODFWLYLW\JURXSVDQGXSGDWHVWKHDXWKRUL]DWLRQVIRUWKHXVHUPDVWHUUHFRUGV
7KHV\VWHPUHPRYHVDXWKRUL]DWLRQSURILOHVIURPLQYDOLGXVHUDVVLJQPHQWVDQGHQWHUV
DXWKRUL]DWLRQSURILOHVIURPYDOLGXVHUDVVLJQPHQWV
,IWKHUHSRUW3)&*B7,0(B'(3(1'(1&<UXQVHYHU\QLJKWWKHDXWKRUL]DWLRQSURILOHVLQWKH
XVHUPDVWHUZLOOEHXSGDWHGHDFKPRUQLQJ7KHEHVWSURFHGXUHLVWRVFKHGXOHWKLVUHSRUWLQD
SHULRGLFEDFNJURXQGMRE

Release 4.6A/B
9–19
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records

 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQPFUDDQGFKRRVH(QWHU RUDFFHVVWKH3*DQGFKRRVH
(QYLURQPHQW→0DVVFRPSDUH 
 ,QWKH$FWLYLW\JURXSILHOGVHOHFWWKH
GHVLUHGDFWLYLW\JURXS
 6HOHFW6FKHGXOHRUFKHFNMREIRUIXOO
UHFRQFLOLDWLRQ 4

 &KRRVH  2

 ,Q-REQDPHHQWHUDMREQDPHRU
OHDYHWKHGHIDXOW
 8QGHU6WDUWGDWHVHOHFWWKHGDWHDQG
WLPH\RXZDQWWKHUHSRUWWRVWDUW 7
DXWRPDWLFDOO\
 &KRRVH ([HFXWH 5

Authorizations Made Easy


9–20
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan

 &KRRVH .

 (QWHUDMREQDPHRUOHDYHWKH
GHIDXOW
11
 (QWHUDMREFODVV SULRULW\ 
Tip
 &KRRVH 
9
10

7KHMREZL]DUGKHOSV\RXWRGHILQHDMRE
XVLQJVWHSE\VWHSGLDORJVFUHHQVWR
JXLGH\RXWKURXJKWKHSURFHVV2QWKH
ODVWVFUHHQ\RXVHHDVXPPDU\RIZKDW
\RXKDYHGHILQHGEHIRUH\RXVDYH

&UHDWLQJD6DPSOH2UJDQL]DWLRQDO3ODQ

<RXKDYHWZRRSWLRQVWRFUHDWHDQRUJDQL]DWLRQDOSODQ
< 7KHFODVVLF5WUDQVDFWLRQ PPOC_OLD
< 7KH(QMR\WUDQVDFWLRQ PPOCE
%RWKFDQEHIRXQGLQWKH2UJDQL]DWLRQDOPDQDJHPHQWXQGHU+XPDQ5HVRXUFHVLQWKH6$3
VWDQGDUGPHQX
,QWKHIROORZLQJVHFWLRQZHGHVFULEHWKHVWHSVWRFUHDWHDVDPSOHRUJDQL]DWLRQDOSODQIRU
WHVWLQJ7KLVSODQLVQRWFRPSOHWHEXWVKRZVWKHUHTXLUHGHOHPHQWV

Release 4.6A/B
9–21
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan

8VLQJWKH&ODVVLF57UDQVDFWLRQ
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQPPOC_OLDDQGFKRRVH(QWHU RUFKRRVH+XPDQ5HVRXUFHV→
2UJDQL]DWLRQDOPDQDJHPHQW→([SHUW0RGH→6LPSOH0DLQWHQDQFH→332&B2/'&UHDWH 
AURRWRUJDQL]DWLRQDOXQLW WKH
KLJKHVWOHYHOLQDQRUJDQL]DWLRQDO
VWUXFWXUH QHHGVWREHFUHDWHG7KHQ
EXLOGXSWKHRUJDQL]DWLRQDOVWUXFWXUH
3
IURPWKHURRWRUJDQL]DWLRQDOXQLW
 (QWHUWKHVKRUWDQGORQJQDPHIRU
WKHURRWRUJDQL]DWLRQDOXQLW 2
 &KRRVH 

 ,QWKH5HTXHVWILHOGXVHSRVVLEOH
HQWULHVWRVHOHFWDFKDQJHUHTXHVW,I
4
QRQHH[LVWV\HWXVH WRFUHDWHRQH
 &KRRVH  5
,QWKHIROORZLQJVWHSVZHZLOOQRW
VKRZWKLVGLDORJER[DQ\PRUH,ILW
GRHVDSSHDUSURFHHGLQWKHVDPH
ZD\DVKHUH
 &KRRVH WRFUHDWHWKH
RUJDQL]DWLRQDOXQLWVWKDWIROORZ\RXU
URRWXQLW
6

Authorizations Made Easy


9–22
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan

 (QWHUWKHQH[WRUJDQL]DWLRQDOXQLWV
XQGHU\RXUURRWXQLW
 &KRRVH  7

 6HOHFWDQRUJDQL]DWLRQDOXQLWDQG
FKRRVH WRHQWHUWKHQH[WOHYHO

 (QWHUWKHQH[WRUJDQL]DWLRQDOXQLW
XQGHUWKHVHOHFWHGOHYHO IRU
H[DPSOH6XEVLGLDU\$*HUPDQ\ 
10
 &KRRVH 
11

 &KRRVH6WDIIDVVLJQPHQW

12

Release 4.6A/B
9–23
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan

7KH6WDII$VVLJQPHQWV&KDQJH
ZLQGRZDOORZV\RXWRLGHQWLI\WKH 13
IXQGDPHQWDOVWDIILQJGHWDLOV
UHTXLUHGIRUDQRUJDQL]DWLRQDOSODQ
7KLVVWHSLVDFKLHYHGE\FUHDWLQJ
MREVDQGSRVLWLRQVDQGE\DVVLJQLQJ
KROGHUVWRSRVLWLRQV
 &KRRVH(GLW→&UHDWH→-REV

-REVDUHRQHRIWKHREMHFWVWKDWPDNHXSDQRUJDQL]DWLRQDOSODQ$MRELVDJHQHUDO
FODVVLILFDWLRQVXFKDVDGPLQLVWUDWLYHDVVLVWDQWFRPSXWHUSURJUDPPHULQVWUXFWRUHWF
<RXPD\FUHDWHDVPDQ\MREVDV\RXZDQW2QFHDMRELVFUHDWHGGHVFULEHLWVDWWULEXWHVE\
GHILQLQJLQIRW\SHV$QHPSOR\HHDXWRPDWLFDOO\LQKHULWVWKHLQIRW\SHVHWWLQJVDWWULEXWHV
DQGSURSHUWLHVRIWKHMRE SRVLWLRQVDUHXVXDOO\EDVHGRQMREV 

 (QWHUWKHMRELQIRUPDWLRQ
 &KRRVH  14

15

 6HOHFWDQRUJDQL]DWLRQDOXQLWWKHQ
FKRRVH 3RVLWLRQV

16

Authorizations Made Easy


9–24
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan

 &KRRVHSRVVLEOHHQWULHVIRU$EEU

17

3RVLWLRQVDUHWKHLQGLYLGXDOHPSOR\HHDVVLJQPHQWVZLWKLQDFRPSDQ\IRUH[DPSOH
< 6DOHVPDQDJHU
< 0DUNHWLQJDVVLVWDQW
< -XQLRUPDQXIDFWXULQJHQJLQHHU
%\FUHDWLQJSRVLWLRQVDQGUHODWLRQVKLSVDPRQJWKHGLIIHUHQWSRVLWLRQV\RXFDQLGHQWLI\
WKHUHSRUWLQJVWUXFWXUHDW\RXUILUP3RVLWLRQVDUHXVXDOO\EDVHGRQMREV

 6HOHFWWKH$EEUHYLDWLRQDQG1DPHWDE 18

 &KRRVH 

19

 6HOHFWWKHDSSURSULDWHMRE
 &KRRVH 
20

21

 8QGHU3RVLWLRQ HQWHUDGHVFULSWLRQRI


WKHSRVLWLRQLQWKHDSSURSULDWH
ILHOGV
 &KRRVH 
22

23

Release 4.6A/B
9–25
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan

5HSHDWVWHSV²WRFUHDWH
DGGLWLRQDOSRVLWLRQV
24
 6HOHFWDSRVLWLRQDQGFKRRVH$VVLJQ
KROGHUž

$VVLJQKROGHUVZKHQ\RXZDQWWR
LGHQWLI\ZKRRFFXSLHVRUILOOVD
VSHFLILFSRVLWLRQ

,Q6LPSOH0DLQWHQDQFHDVVLJQHLWKHU
DQHPSOR\HHRU5XVHUWRD
SRVLWLRQ:RUNIORZXVHUVDVVLJQ5
XVHUVWRSRVLWLRQV3HUVRQQHO
DGPLQLVWUDWLRQXVHUVDVVLJQ
HPSOR\HHVWRSRVLWLRQV
 &KRRVHSRVVLEOHHQWULHVWRGLVSOD\WKH
25
OLVWRI5XVHUVDOUHDG\LQ\RXU
V\VWHP
 6HOHFWWKHFRUUHFWXVHURIWKHSRVLWLRQ
IURPWKHOLVW
 &KRRVH 
26

27

 (QWHUWKHYDOLGLW\SHULRGRIWKH
DVVLJQPHQW
 &KRRVH 

28
29

Authorizations Made Easy


9–26
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan

5HSHDWVWHSV²WRDVVLJQDGGLWLRQDO
KROGHUVWRSRVLWLRQV
7KHRUJDQL]DWLRQDOSODQLVQRZFUHDWHG 31
7RJHWDJUDSKLFDORYHUYLHZFRQWLQXH
ZLWKWKHIROORZLQJVWHSV 30

 6HOHFWWKHURRWRUJDQL]DWLRQDOXQLW
 &KRRVH WRGLVSOD\WKH6WUXFWXUDO
*UDSKLFV

8VLQJWKH(QMR\7UDQVDFWLRQ
7KHSURFHGXUHWRFUHDWHWKHRUJDQL]DWLRQDOSODQXVLQJWKH(QMR\WUDQVDFWLRQLVEDVLFDOO\WKHVDPHDVWKH
FRPPRQ5VW\OH7KHRQO\GLIIHUHUHQFHLVWKDWDOOWKHSURFHGXUHVDUHGLVSOD\HGDQGSHUIRUPHGRQRQH
VFUHHQ
$WWKHWLPHRIWKLVZULWLQJWKH(QMR\IXQFWLRQDOLW\ZDVVWLOOXQGHUGHYHORSPHQW7KHUHIRUHZHRQO\
SURYLGHWKHVFUHHQEHORZZKLFK\RXFDQUHDFKWKHIROORZLQJZD\
,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQPPOCEDQGFKRRVH(QWHU RUFKRRVH+XPDQ5HVRXUFHV→
2UJDQL]DWLRQDOPDQDJHPHQW→2UJDQL]DWLRQDOSODQ→2UJDQL]DWLRQDQG6WDIILQJ→&UHDWH .
+HUH\RXHQWHUWKHQHZ2UJDQL]DWLRQDO
XQLWDQGDOOWKHRWKHUGDWDDVZH
GHVFULEHXVLQJWKHFRPPRQ5VW\OH

Release 4.6A/B
9–27
Chapter 9: Assigning Activity Groups
Structural Authorizations

6WUXFWXUDO$XWKRUL]DWLRQV

6WUXFWXUDODXWKRUL]DWLRQVDUHQRWFRYHUHGLQWKLVJXLGH+RZHYHULI\RXQHHGLQIRUPDWLRQ
RQVWUXFWXUDODXWKRUL]DWLRQVUHIHUWRWKH$XWKRUL]DWLRQV0DGH(DV\JXLGHERRN5HOHDVH
$%FKDSWHU6WUXFWXUDO$XWKRUL]DWLRQV7KLVFKDSWHUFDQDOVREHGRZQORDGHGIURPWKH
6LPSOLILFDWLRQ*URXSVZHESDJHDWKWWSZZZVDSODEVFRPDXWK

Authorizations Made Easy


9–28
&KDSWHU 6HWWLQJ8SWKH$/(

(QYLURQPHQWIRU&HQWUDO8VHU
$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................10–2
Setting Up an ALE User........................................................................................10–3
Naming Logical Systems .....................................................................................10–5
Assigning Logical Systems to Clients................................................................10–8
Defining Target System for RFC Calls ..............................................................10–10
Distribution Model ..............................................................................................10–13
Generating Partner Profiles in the Central System .........................................10–16
Distributing Model View .....................................................................................10–17
Generating Partner Profiles in the Client System............................................10–18

10–1
Chapter 10: Setting Up the ALE Environment for Central User Administration
Overview

2YHUYLHZ

&HQWUDO8VHU$GPLQLVWUDWLRQLVQHZWR5HOHDVH,QHDUOLHUUHOHDVHVXVHUPDVWHUUHFRUGV
ZHUHFUHDWHGLQHDFKFOLHQWDQGHDFKV\VWHPWKHXVHUORJJHGRQWR IRUH[DPSOH'(94$6
35'HWF (DFKXVHUPDVWHUUHFRUGIRUWKHVDPHXVHUZDVLQGHSHQGHQWRIRWKHUXVHUPDVWHU
UHFRUGV,IDXVHUZDVFKDQJHGLQRQHFOLHQWWKHQWKHVDPHXVHUKDGWREHFKDQJHGLQDOO
RWKHUFOLHQWVDQGV\VWHPVPDQXDOO\&HQWUDO8VHU$GPLQLVWUDWLRQUHGXFHVWKHPDLQWHQDQFH
DQGV\QFKURQL]DWLRQLVVXHVIDFHGE\DXWKRUL]DWLRQDGPLQLVWUDWRUV
7KHFRUHFRQFHSWEHKLQG&HQWUDO8VHU$GPLQLVWUDWLRQLVWRGHVLJQDWHRQHFOLHQWLQRQH
V\VWHPDVWKHUHSRVLWRU\IRUPDLQWDLQLQJDXWKRUL]DWLRQV7KLVFOLHQWV\VWHPLVGHVLJQDWHGDV
WKHVHQGHU$OORWKHUFOLHQWVLQRWKHUV\VWHPVDUHGHVLJQDWHGDVUHFHLYHUV$SSOLFDWLRQ/LQN
(QDEOLQJ $/( LV5·VWHFKQRORJ\WRHQDEOHGDWDH[FKDQJHEHWZHHQGLIIHUHQWV\VWHPV
&HQWUDO8VHU$GPLQLVWUDWLRQGLVWULEXWHVXVHUGDWDEHWZHHQFHQWUDODQGFOLHQWV\VWHPV
7KLVFKDSWHUGLVFXVVHVKRZWRVHWXS$/(IRUXVHZLWK&HQWUDO8VHU$GPLQLVWUDWLRQ7KH
QH[WFKDSWHUGLVFXVVHVWKHVWHSVLQYROYHGLQXVLQJ&HQWUDO8VHU$GPLQLVWUDWLRQ

6HWWLQJXS$/(PXVWEHGRQHWRJHWKHUZLWKDV\VWHPDGPLQLVWUDWRURUWKHSHUVRQZKRILUVW
VHWXSWKHFOLHQWV,QVHWWLQJXS$/(WKHHQWLUHFOLHQW·VGHILQLWLRQZLOOEHFKDQJHGDQGWKLV
PXVWQRWEHGRQHZLWKRXWWKHFRQVHQWRIWKHV\VWHPDGPLQLVWUDWRU

'XULQJWKHLQVWDOODWLRQRIDQ$/(HQYLURQPHQW\RXPXVWIROORZHYHU\VWHSIRUDOOFOLHQW
V\VWHPVWREHLQWHJUDWHGLQWRRQHXVHUDFFRXQW7KLVXVHUDFFRXQWQHHGVWRKDYHV\VWHP
DGPLQLVWUDWRUULJKWV(DFKFOLHQWV\VWHPFRPELQDWLRQLVUHFRJQL]HGE\$/(DVDORJLFDO
V\VWHP
6HWWLQJXSDQ$/(HQYLURQPHQWDOORZV\RXWRGLVWULEXWHGDWDEHWZHHQORJLFDOV\VWHPVDQG
NHHSWKLVGDWDFRQVLVWHQW7KHV\VWHPVRIDQ$/(HQYLURQPHQWDUHRQO\ORRVHO\OLQNHG7KH
GDWDLVEHLQJH[FKDQJHGDV\QFKURQRXVO\ZKLFKLQVXUHVWKDWWKHGDWDZLOOEHUHFHLYHGE\WKH
UHFLSLHQWV\VWHPHYHQLIWKHUHFHLYLQJV\VWHPLVWXUQHGRIIDWWKHWLPHRIVHQGLQJ
6\QFKURQRXVFRQQHFWLRQVDUHRQO\EHLQJXVHGWRUHDGGDWDE\$/(

Authorizations Made Easy


10–2
Chapter 10: Setting Up the ALE Environment for Central User Administration
Setting Up an ALE User

7KHJUDSKLFRQWKHULJKW
VKRZVDQ$/(HQYLURQPHQW
IRU&HQWUDO8VHU
$GPLQLVWUDWLRQ
2QHV\VWHPQHHGVWREH
GHILQHGDVWKHFHQWUDO
V\VWHP7KHOLQNVUXQIURP
WKHFHQWUDOV\VWHPWRWKH
FOLHQWV\VWHPVZKHUHWKH
FHQWUDOV\VWHPVHUYHVDVWKH
KXE
7KHFOLHQWV\VWHPVDUHQRW
GLUHFWO\OLQNHGWRHDFK
RWKHU

6HWWLQJ8SDQ$/(8VHU

)RULQWHUQDOFRPPXQLFDWLRQEHWZHHQDOOV\VWHPVLQDQ$/(HQYLURQPHQW\RXQHHGDXVHUDFFRXQW8VHGIRU
LQWHUQDOFRPPXQLFDWLRQWKLVXVHUDFFRXQWLVQRWXVHGLQGLDORJPRGH7KHXVHUQHHGVWRKDYHWKHVDPH
XVHUQDPHDQGSDVVZRUGIRUDOOWKHV\VWHPVLQDQ$/(HQYLURQPHQW

 ,QWKH&RPPDQGILHOGHQWHUWKHXVHU
PDLQWHQDQFHWUDQVDFWLRQSU01DQG
FKRRVH(QWHU
 ,Q8VHUHQWHUDXVHUQDPHIRUWKH 3
LQWHUQDOXVHU
 7RFUHDWHWKHXVHUFKRRVH 
2

Release 4.6A/B
10–3
Chapter 10: Setting Up the ALE Environment for Central User Administration
Setting Up an ALE User

 2QWKH$GGUHVVWDEVSHFLI\DWOHDVW
WKHODVWQDPHRIWKHXVHU
 &KRRVHWKH/RJRQGDWDWDE

 8QGHU3DVVZRUGHQWHUDQLQLWLDO
SDVVZRUG
 5HSHDWWKHLQLWLDOSDVVZRUG
 8QGHU8VHUW\SHVHOHFW&3,&

6
7
:HUHFRPPHQG\RXXVHWKHXVHUW\SH
&3,&VLQFHVXFKDV\VWHPXVHUFDQQRW
ORJRQWR5XVLQJDGLDORJZLQGRZ
7KLVXVHUFDQRQO\EHXVHGIRUWKH
LQWHUQDOFRPPXQLFDWLRQEHWZHHQ
V\VWHPV+RZHYHULWLVSRVVLEOHWRXVH
DGLDORJXVHUIRUWKLVFRPPXQLFDWLRQ
8
 &KRRVH3URILOHVWDE

Authorizations Made Easy


10–4
Chapter 10: Setting Up the ALE Environment for Central User Administration
Naming Logical Systems

 ,QWKH3URIOFROXPQHQWHUWKHSURILOH 11
SAP_ALL
 7RVDYHWKHXVHUFKRRVH 
 5HSHDWVWHSV²IRUDOOFOLHQWV\RX
ZDQWWRVHWXSIRUWKH$/(
HQYLURQPHQW

10

1DPLQJ/RJLFDO6\VWHPV

 ,QWKH&RPPDQGILHOGHQWHU
WUDQVDFWLRQSALEDQGFKRRVH(QWHU
 ([SDQGWKHQRGHVIRU6HQGLQJDQG
5HFHLYLQJ6\VWHPVDQG/RJLFDO
6\VWHPV
 &KRRVH QH[WWRWKH,0*DFWLYLW\
1DPH/RJLFDO6\VWHP 2

 1RWHWKDWWKHWDEOHLVFOLHQW
LQGHSHQGHQWDQGFKRRVH 

Release 4.6A/B
10–5
Chapter 10: Setting Up the ALE Environment for Central User Administration
Naming Logical Systems

7KHGDWDIRUWKHORJLFDOV\VWHPVLVVWRUHGLQDFOLHQWLQGHSHQGHQWWDEOH7KHUHIRUHLWLV
YDOLGIRUDOOFOLHQWVLQDQ56\VWHP,I\RXU$/(HQYLURQPHQWFRQVLVWVRQO\RIORJLFDO
V\VWHPVLQRQH56\VWHP\RXQHHGWRGHILQHWKHORJLFDOV\VWHPVRQO\RQFH,I\RXDUH
XVLQJPXOWLSOH56\VWHPVDOOORJLFDOV\VWHPVQHHGWREHVHWXSLQHYHU\LQVWDQFH

$WDEOHDSSHDUVZLWKDOOGHILQHG
ORJLFDOV\VWHPVIRUWKHGDWD
GLVWULEXWLRQRI\RXUFHQWUDO5
V\VWHP 5

 7RDGGQHZORJLFDOV\VWHPVLQWRWKH
OLVWFKRRVH1HZHQWULHV

 ,QWKHFROXPQ/RJ6\VWHPHQWHUD
7
VKRUWQDPHLQFDSLWDOOHWWHUVWKDW
\RXZRXOGOLNHWKHV\VWHPWREH
LGHQWLILHGDVLQWKH$/(
HQYLURQPHQW(QWHUDFOHDU
GHVFULSWLRQLQWKH1DPHFROXPQIRU
WKHORJLFDOV\VWHP 6

 $IWHUHQWHULQJDOOWKHORJLFDO
V\VWHPVFKRRVH WRVDYH\RXU
GDWD

5HPHPEHUWRHQWHULIDYDLODEOHDOO
ORJLFDOV\VWHPVWKDWDUHQRWSDUWRIWKH
DFWXDO56\VWHPV$OOORJLFDOV\VWHPV
QHHGWREHGHILQHGLQHYHU\56\VWHP
RIWKH$/(HQYLURQPHQW

Authorizations Made Easy


10–6
Chapter 10: Setting Up the ALE Environment for Central User Administration
Naming Logical Systems

:HUHFRPPHQG\RXQDPHWKHV\VWHPXVLQJDFRPELQDWLRQRIWKHV\VWHPQDPHDQGFOLHQW
QXPEHU IRUH[DPSOHIRUV\VWHP%,=ZLWKWKHFOLHQWWKHQDPH%,=&/17 

(QWHU\RXUWUDQVSRUWUHTXHVWIRUWKH
DERYHHQWHUHGGDWD
 ,I\RXDOUHDG\KDYHDWUDQVSRUW
UHTXHVWLQWKLVV\VWHPFKRRVH2ZQ
UHTXHVWDQGVHOHFWLWIURPWKHOLVWDQG 9 8
&RQWLQXHZLWKVWHS
 ,I\RXGRQRWKDYHDWUDQVSRUW
UHTXHVW\HWRUZRXOGOLNHWRFUHDWHD
QHZRQHFKRRVH 
D ,Q6KRUWGHVFULSWLRQHQWHUDVKRUW
GHVFULSWLRQIRUWKHWUDQVSRUW
9a
UHTXHVW
E &KRRVH 

9b

7KHV\VWHPVXJJHVWVDFRXQWLQJ
QXPEHUIRUWKHUHTXHVW
 &KRRVH WRHQWHUWKHWUDQVSRUW
UHTXHVW
10

,I\RXUORJLFDOV\VWHPLVH[FOXVLYHO\LQRQH56\VWHPWKHQDPLQJSURFHVVLVQRZ
FRPSOHWH
,I\RXUORJLFDOV\VWHPVDUHLQGLIIHUHQW56\VWHPV\RXKDYHWRUHSHDWVWHSV²IRU
HDFK56\VWHP$OOORJLFDOV\VWHPVQHHGWREHGHILQHGLQDOO56\VWHPVRIWKH$/(
HQYLURQPHQW

Release 4.6A/B
10–7
Chapter 10: Setting Up the ALE Environment for Central User Administration
Assigning Logical Systems to Clients

$OWKRXJK\RXQDPHGWKHORJLFDOV\VWHPV\RXKDYHQRW\HWOLQNHGWKHORJLFDOV\VWHPVWR
WKHH[LVWLQJFOLHQWVLQ\RXU56\VWHP

$VVLJQLQJ/RJLFDO6\VWHPVWR&OLHQWV

$IWHUQDPLQJWKHORJLFDOV\VWHPVWKHQH[WVWHSLVWRDVVLJQORJLFDOV\VWHPVWRFOLHQWV,QWKLVVHFWLRQZHOLQN
WKHQHZO\QDPHGORJLFDOV\VWHPVWRWKHH[LVWLQJFOLHQWVLQ\RXU56\VWHP
 )URPWKHODVWVFUHHQRIWKHSUHYLRXVVHFWLRQFKRRVH WZLFHWRUHWXUQWRWUDQVDFWLRQSALE
 8QGHUWKHQRGHV6HQGLQJDQG
5HFHLYLQJ6\VWHPVDQG/RJLFDO
6\VWHPVFKRRVH QH[WWRWKH,0*
DFWLYLW\$VVLJQ/RJLFDO6\VWHPWR
&OLHQW

 1RWHWKDWWKHWDEOHLVFOLHQW
LQGHSHQGHQWDQGFKRRVH WR
FRQWLQXH

Authorizations Made Easy


10–8
Chapter 10: Setting Up the ALE Environment for Central User Administration

$OLVWRIDYDLODEOHFOLHQWVLQWKLV5
6\VWHPDSSHDUV
 6HOHFWWKHFOLHQWWRZKLFK\RXZDQW 5
WRDVVLJQDORJLFDOV\VWHPQDPHDQG
LQWHJUDWHLQWRWKH$/(HQYLURQPHQW
 &KRRVH 
4

 (QWHUDGHVFULSWLRQIRUWKHFOLHQWLI
8
QHFHVVDU\
 7RDVVLJQDORJLFDOV\VWHPWRWKDW
FOLHQWHQWHUWKHORJLFDOV\VWHPLQ
XSSHUFDVH 6
 &KRRVH 
7
 2QWKHQH[WZLQGRZFKRRVH WR
SURFHHG<RXZLOOUHFHLYHDPHVVDJH
WKDW\RXUGDWDKDVEHHQVDYHG
 7RDVVLJQDQRWKHUORJLFDOV\VWHPWRD
FOLHQWFKRRVH DQGUHSHDWVWHSV²


7RDVVLJQDFOLHQWRIDGLIIHUHQW56\VWHPWRDORJLFDOV\VWHPORJRQWRWKDW5
6\VWHPVWDUWWUDQVDFWLRQSALEDQGUHSHDWVWHSV²

Release 4.6A/B
10–9
Chapter 10: Setting Up the ALE Environment for Central User Administration
Defining Target System for RFC Calls

'HILQLQJ7DUJHW6\VWHPIRU5)&&DOOV

$IWHUDVVLJQLQJORJLFDOV\VWHPVWRFOLHQWV\RXPXVWGHILQHWKHWDUJHWV\VWHPIRU5)&FDOOV
 )URPWKH&KDQJH9LHZ§&OLHQWV¨'HWDLOVVFUHHQFKRRVH WZLFHWRUHWXUQWRWUDQVDFWLRQSALE
 8QGHUWKHQRGHV6HQGLQJDQG
5HFHLYLQJ6\VWHPVDQG6\VWHPVLQ
1HWZRUNFKRRVH QH[WWRWKH,0*
DFWLYLW\'HILQH7DUJHW6\VWHPVIRU5)&
FDOOV

 &KRRVH&UHDWH

$Q5)&GHVWLQDWLRQLVDOZD\VFUHDWHG
IURPWKHFOLHQWZKHUH\RXDUHFXUUHQWO\
ORJJHGRQ7RGHILQHDQ5)&
FRQQHFWLRQIURPFOLHQWWRFOLHQW
\RXPXVWEHORJJHGRQWRFOLHQW
5)&FRQQHFWLRQVIRUWKH&HQWUDO8VHU
$GPLQLVWUDWLRQDOZD\VQHHGDEDFN
DQGIRUWKFRQQHFWLRQ7RGHILQHWKH
5)&FRQQHFWLRQFRPSOHWHO\\RXDOVR
QHHGWREHORJJHGRQWRFOLHQWDQG
VHWXSFOLHQWDVWKH5)&FRQQHFWLRQ

Authorizations Made Easy


10–10
Chapter 10: Setting Up the ALE Environment for Central User Administration
Defining Target System for RFC Calls

 ,Q5)&GHVWLQDWLRQHQWHUWKHQDPHRI
9
WKHORJLFDOV\WHPWRZKLFK\RXZDQW
WRGHILQHD5)&FRQQHFWLRQIURP
\RXUFXUUHQWV\VWHP5HPHPEHUWR
XVHXSSHUFDVH
 ,Q&RQQHFWLRQW\SHHQWHU3 GHIDXOW 4
YDOXH LILWLVDFRQQHFWLRQWRDQRWKHU
56\VWHP
5
 8QGHU'HVFULSWLRQHQWHUDGHWDLOHG
GHVFULSWLRQIRUWKH5)&GHVWLQDWLRQ
6
 ,Q&OLHQWHQWHUWKHQXPEHURIWKH
WDUJHWFOLHQW
 ,QWKH8VHUDQG3DVVZRUGILHOGHQWHU
WKHXVHUDQGWKHFRUUHVSRQGLQJ 7
SDVVZRUG\RXVSHFLILHGIRUWKH
8
LQWHUQDOFRPPXQLFDWLRQRIWKH
V\VWHPVLQWKH$/(HQYLURQPHQW
 7RVDYH\RXUGDWDFKRRVH 

Release 4.6A/B
10–11
Chapter 10: Setting Up the ALE Environment for Central User Administration
Defining Target System for RFC Calls

7KHPHVVDJH'HVWLQDWLRQ;;;;
13
VDYHGDSSHDUV
1HZRSWLRQVDSSHDURQVFUHHQ<RX
FDQQRZFKRRVHWRXVHDORDG 14
GLVWULEXWLRQ UHFRPPHQGHG ,I\RX
GRQRWZDQWWRXVHWKHORDG
GLVWULEXWLRQVNLSDKHDGWRVWHS
 6HOHFW<HVIRU/RDGGLVWULE
10
 ,Q7DUJHWKRVWHQWHUWKHQXPEHURI 11 12
WKHPHVVDJHVHUYHU6HHWKH7LSV
7ULFNVEHORZ
 ,Q6\VWHPQXPEHUHQWHUWKHV\VWHP
QXPEHURIWKHPHVVDJHVHUYHU6HH
WKH7LSV 7ULFNVEHORZ

7RILQGWKHQDPHRIWKHPHVVDJHVHUYHU
RIWKHWDUJHWKRVWJRWRWKHWDUJHW
V\VWHPDQGVWDUWWUDQVDFWLRQRZ03
8VXDOO\\RXZLOOVHHDOLVWZLWKVHYHUDO
VHUYHUQDPHV7KHFRUUHFWPHVVDJH
VHUYHULVWKHRQHWKDWKDVDQ0OLVWHGLQ
WKH6HUYLFHVFROXPQ7KHQDPHRIWKH
PHVVDJHVHUYHUDSSHDUVDVWKHILUVWSDUW
RIWKH6HUYHUQDPHLQIURQWRIWKH
XQGHUVFRUH7KHODVWWZRGLJLWVRIWKH
6HUYHUQDPHUHSUHVHQWWKHV\VWHP
QXPEHU
 7RVDYH\RXUGDWDFKRRVH 
$VWDWXVPHVVDJHDSSHDUVVD\LQJ
'HVWLQDWLRQ;;;;VDYHG
 &KRRVH7HVWFRQQHFWLRQWRWHVWLIWKH
FRQQHFWLRQZRUNVFRUUHFWO\

Authorizations Made Easy


10–12
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distribution Model

$FRUUHFWFRQQHFWLRQWHVWORRNVOLNH
WKHVFUHHQWRWKHULJKW

$WHVWZLWK5HPRWHORJLQZRXOGQRW
ZRUNLI\RXXVHGWKH6\VWHPXVHU &3,&
IRUWKHFRQQHFWLRQ,I\RXXVHGD'LDORJ
XVHU\RXFDQXVH5HPRWH/RJLQIRUDQ
DGGLWLRQDOWHVWFRQQHFWLRQ

7RHQWHUDQRWKHU5)&GHVWLQDWLRQLQWKHVDPH56\VWHPFKRRVH WZLFHDQGUHSHDWVWHSV²
7RHQWHUDQRWKHU5)&GHVWLQDWLRQLQDGLIIHUHQW56\VWHPORJRQWRWKDWV\VWHPVWDUWWUDQVDFWLRQ
SALE,DQGUHSHDWVWHSV²

'LVWULEXWLRQ0RGHO

7KHGLVWULEXWLRQPRGHOGHVFULEHVWKH$/(PHVVDJHIORZEHWZHHQORJLFDOV\VWHPV

 /RJRQWRWKHFHQWUDOV\VWHPRIWKH$/(HQYLURQPHQW
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQBD64DQGFKRRVH(QWHU
 &KRRVH WRVZLWFKEHWZHHQ
GLVSOD\DQGHGLWPRGH

Release 4.6A/B
10–13
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distribution Model

 &KRRVH &UHDWHPRGHOYLHZ

 ,Q6KRUWWH[WHQWHUDVKRUW
GHVFULSWLRQ 5
6
 ,Q7HFKQLFDOQDPHHQWHUDWHFKQLFDO
QDPHIRUWKHPRGHOYLHZ
 &KRRVH  7

 &KRRVH LQIURQWRI0RGHOYLHZVWR
UHFHLYHDOLVWRIDOOPRGHOYLHZV
LQFOXGLQJWKHRQH\RXMXVWFUHDWHG

 6HOHFWWKHMXVWFUHDWHGPRGHOYLHZ
7KHHQWU\ZLOOEHKLJKOLJKWHG
 &KRRVH $GG%$3, 10

7RGLVWULEXWHWKHGDWD\RXKDYHWRGHILQHWZRPHWKRGVIRUWKHQHZO\FUHDWHGGLVWULEXWLRQ
PRGHO:LWKLQ&HQWUDO8VHU$GPLQLVWUDWLRQRQHRIWKHPHWKRGVLVIRUWKHGLVWULEXWLRQRI
WKHXVHUDQGRQHIRUWKHFRPSDQ\7KHVHPHWKRGVDUHUHDOL]HGWKURXJK%$3,V %XVLQHVV
$SSOLFDWLRQ3URJUDPPLQJ,QWHUIDFH 

Authorizations Made Easy


10–14
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distribution Model

 ,Q0RGHOYLHZHQWHUWKHWHFKQLFDO
QDPHRIWKHQHZO\FUHDWHG 11
GLVWULEXWLRQPRGHO
12
 ,Q6HQGHUFOLHQWHQWHUWKHORJLFDO 13
V\VWHPQDPHRIWKHFHQWUDOV\VWHP
 ,Q5HFHLYHUVHUYHUHQWHUWKHWKH 14
ORJLFDOV\VWHPQDPHRIWKHFOLHQW 15
V\VWHP 16
 ,Q2EMQDPHLQWHUIDFHHQWHUWKHREMHFW
USER QRWHWKDWWKLVHQWU\LVFDVH
VHQVLWLYH 
 ,Q0HWKRGHQWHUClone QRWHWKDW
WKLVHQWU\LVFDVHVHQVLWLYH 
 &KRRVH 
 5HSHDWVWHS²WRDGGDPHWKRG
IRUWKHFRPSDQ\DGGUHVV(QWHU
UserCompanyLQVWHSLQVWHDGRI
USER QRWHWKDWWKHHQWU\LVFDVH
VHQVLWLYH 
 &KRRVH  17

18

,IWKHUHDUHPRUHWKDQWZRV\VWHPVLQ\RXUSODQQHG$/(HQYLURQPHQWUHSHDW²IRU
DOORWKHUFOLHQWV\VWHPV

 7RVDYHWKHGDWDFKRRVH  19

,I\RXH[SDQGWKHPRGHOYLHZ
FRPSOHWHO\XVLQJ \RXUPRGHO
YLHZIRUDWZRV\VWHP$/(
HQYLURQPHQWVKRXOGORRNOLNHWKH
VFUHHQWRWKHULJKW

Release 4.6A/B
10–15
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Central System

*HQHUDWLQJ3DUWQHU3URILOHVLQWKH&HQWUDO6\VWHP

3ULRUWRWKHJHQHUDWLRQRIWKHSDUWQHUSURILOHVZKLFKVHWVWKHFRQGLWLRQVIRUWKHHOHFWURQLFGDWDH[FKDQJHLQ
WKH$/(HQYLURQPHQW\RXILUVWFKRRVHWKHSDUDPHWHUVLQWKHFXUUHQWPRGHOYLHZDVGHVFULEHGEHORZ

 2QWKH'LVWULEXWLRQ0RGHO&KDQJHG
VFUHHQFKRRVH(QYLURQPHQW→ 1
*HQHUDWH3DUWQHU3URILOHV

 ,Q0RGHOYLHZHQWHUWKHWHFKQLFDO
QDPHRIWKHQHZO\FUHDWHGPRGHO
YLHZ8VHXSSHUFDVHOHWWHUV
 ,Q3DUWQHUV\VWHPHQWHUWKHORJLFDO 4
V\VWHPQDPHRIWKHFOLHQWV\VWHP 2 Tip
3

,IWKHUHDUHPRUHFOLHQWV\VWHPVLQ\RXU
$/(HQYLURQPHQWVHOHFWWKRVHORJLFDO
V\VWHPVXVLQJ 

 &KRRVH 

7RLPSURYHSHUIRUPDQFH\RXFDQVHOHFWXQGHU3DFNHWVL]HKRZPDQ\,'RFV GDWD
FRQWDLQHUH[FKDQJHEHWZHHQ56\VWHPV ZLOOEHVHQWIRUHDFK5)&SURFHVV7KH
VXJJHVWHGYDOXHRI,'RFVLVDFRPSURPLVHWRNHHSWKHQXPEHURIGLDORJSURFHVVHV
GRZQDQGDWWKHVDPHWLPHTXLFNO\SURFHVVFKDQJHV7RLQFUHDVHWKHSHUIRUPDQFH
FKRRVHDVPDOOHUQXPEHURI,'RFVWREHVHQWIRUHYHU\5)&SURFHVV

Authorizations Made Easy


10–16
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distributing Model View

 <RXUHFHLYHWKH3URWRFROIRU
JHQHUDWLQJSDUWQHUSURILOH&KHFNLIWKH 6
SDUWQHUSURILOHVKDYHEHHQFUHDWHG
VXFFHVVIXOO\
5
 &KRRVH WZLFHWRUHWXUQWRWKH
VWDUWVFUHHQLQ%'

'LVWULEXWLQJ0RGHO9LHZ

 6HOHFWWKHPRGHOYLHZFUHDWHG
HDUOLHU7KHHQWU\ZLOOEH 2
KLJKOLJKWHG
 &KRRVH(GLW→0RGHOYLHZ→
'LVWULEXWH
1

$OLVWDSSHDUVZLWKDOOH[LVWLQJFOLHQW
V\VWHPVLQWKH$/(HQYLURQPHQWWR
ZKLFKWKHPRGHOYLHZQHHGVWREH
GLVWULEXWHG
 6HOHFWWKHGHVLUHGV\VWHP
3
 &KRRVH 

Release 4.6A/B
10–17
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Client System

<RXUHFHLYHDORJLIWKHPRGHOYLHZ
KDVEHHQFUHDWHGLQWKHFOLHQWV\VWHP

7RFKHFNLIWKHPRGHOYLHZKDVEHHQHVWDEOLVKHGIRUWKHFOLHQWV\VWHPSHUIRUPWKH
IROORZLQJVWHSV
 /RJRQWRWKHGHVLUHGFOLHQWV\VWHP
 6WDUWWUDQVDFWLRQSCUA
 (QWHUWKHWHFKQLFDOQDPHRIWKHPRGHOYLHZ
 &KRRVH'LVWULEXWLRQPRGHO→'LVSOD\VWUXFWXUH

*HQHUDWLQJ3DUWQHU3URILOHVLQWKH&OLHQW6\VWHP

 /RJRQWRWKHFOLHQWV\VWHP
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQBD64DQGFKRRVH(QWHU.
 6HOHFWWKHPRGHOYLHZFUHDWHG
HDUOLHU7KHHQWU\ZLOOEH 4
KLJKOLJKWHG
 &KRRVH(QYLURQPHQW→*HQHUDWH
3DUWQHU3URILOHV
3

Authorizations Made Easy


10–18
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Client System

 ,Q0RGHOYLHZHQWHUWKHWHFKQLFDO
QDPHRIWKHQHZO\FUHDWHGPRGHO
YLHZ8VHXSSHUFDVH
 ,Q3DUWQHUV\VWHPHQWHUWKHORJLFDO 7
V\VWHPQDPHRIWKHFHQWUDOV\VWHP 5
:LWKWKLVHQWU\\RXHVWDEOLVKWKH 6
SDUWQHUSURILOHIRUWKHUHWXUQ
FRQHFWLRQIURPWKHFOLHQWV\VWHPWR
WKHFHQWUDOV\VWHP
 &KRRVH 

<RXUHFHLYHWKH3URWRFROIRUJHQHUDWLQJ
SDUWQHUSURILOH&KHFNLIWKHSDUWQHU
SURILOHVKDYHEHHQFUHDWHG
VXFFHVVIXOO\
5HSHDWVWHSV²IRUDOOFOLHQW
V\VWHPVLIQHFFHVVDU\

<RXKDYHQRZVHWXSWKHFRPSOHWH$/(HQYLURQPHQW

Release 4.6A/B
10–19
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Client System

Authorizations Made Easy


10–20
&KDSWHU 6HWWLQJ8S&HQWUDO8VHU

$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................11–2
Assigning the Central User Administration Distribution Model ......................11–2
Testing Central User Administration ..................................................................11–3
Migrating Existing Users to the Central System................................................11–7
Defining Field Attributes for User Maintenance ................................................11–9
Global User Manager ..........................................................................................11–10

11–1
Chapter 11: Setting Up Central User Administration
Overview

2YHUYLHZ

:LWK&HQWUDO8VHU$GPLQLVWUDWLRQ\RXFDQUHGXFHWKHV\VWHPDGPLQLVWUDWRU·VHIIRUWWRPDLQWDLQXVHUVLQWKH
5HQYLURQPHQW&HQWUDO8VHU$GPLQLVWUDWLRQDOORZV\RXWRPDLQWDLQWKHXVHUVFHQWUDOO\LQRQHV\VWHP
7KHLQIRUPDWLRQLVWKHQDXWRPDWLFDOO\GLVWULEXWHGWRWKHGHSHQGHQWV\VWHPV
7RVHWXS&HQWUDO8VHU$GPLQLVWUDWLRQZHDVVXPHWKDW\RXXVHRQHXVHUDFFRXQWWKDWKDVV\VWHP
DGPLQLVWUDWRUDXWKRUL]DWLRQVIRUWKHFRPSOHWHV\VWHPHQYLURQPHQW

7RVHWXSWKH&HQWUDO8VHU$GPLQLVWUDWLRQIRU\RXU56\VWHPJURXS\RXQHHGWRVHW
XSWKH$/(HQYLURQPHQW DVGHVFULEHGLQFKDSWHU6HWWLQJ8SWKH$/((QYLURQPHQWIRU
&HQWUDO8VHU$GPLQLVWUDWLRQ IRU\RXUFHQWUDOV\VWHP7KLVFHQWUDOV\VWHPPXVWQRZEHVHW
XSIRUWKHXVHUPDLQWHQDQFH

$VVLJQLQJWKH&HQWUDO8VHU$GPLQLVWUDWLRQ'LVWULEXWLRQ
0RGHO

 /RJRQWR\RXUFHQWUDOV\VWHP
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSCUADQGFKRRVH(QWHU
 ,Q0RGHOYLHZHQWHUWKHWHFKQLFDO
4
QDPHRIWKHGLVWULEXWLRQPRGHODV
FUHDWHGIRUWKH$/(HQYLURQPHQW

7KHPRGHO\RXFKRRVHKHUHLVWKHEDVLV 3
IRUWKHGLVWULEXWLRQRIXVHUGDWDLQ\RXU
$/(HQYLURQPHQW

 &KRRVH 

6DYLQJWKHPRGHODVVLJQPHQWIRUWKH&HQWUDO8VHU$GPLQLVWUDWLRQGLVWULEXWHVWKH
FRPSOHWHGLVWULEXWLRQPRGHOWRDOOFOLHQWV\VWHPV$IWHUWKHGLVWULEXWLRQ\RXFDQQR
ORQJHUFUHDWHDXVHULQWKHFOLHQWV\VWHP)URPWKLVSRLQWIRUZDUGDV\VWHPLVGHILQHGDV
WKHFHQWUDOV\VWHPDQGWKHRWKHUV\VWHPVDVFOLHQWV\VWHPVRI&HQWUDO8VHU
$GPLQLVWUDWLRQ

Authorizations Made Easy


11–2
Chapter 11: Setting Up Central User Administration
Testing Central User Administration

&KHFNLIWKHPRGHOKDVEHHQDVVLJQHGDV
WKHFOLHQWV\VWHP 7
 /RJRQWRWKHFOLHQWV\VWHP
 ,QWKH&RPPDQGILHOGHQWHU
WUDQVDFWLRQSCUADQGFKRRVH(QWHU
7KHGLVWULEXWLRQPRGHOLVHQWHUHG
DXWRPDWLFDOO\
 &KRRVH'LVWULEXWLRQPRGHO→'LVSOD\
VWUXFWXUH

$FRPSOHWHYLHZRIWKHPRGHO
VWUXFWXUHDSSHDUV

,I\RXGRQRWVHHDQ\VWUXFWXUHLWFRXOG
EHEHFDXVHWKHGDWDKDVEHHQGLVWULEXWHG
DV\QFKURQRXVO\,IWKLVLVWKHFDVHJR
EDFNWRWKHVWDUWVFUHHQRIWUDQVDFWLRQ
SCUAZDLWIRUWZRPLQXWHVDQGUHSHDW
VWHS

7HVWLQJ&HQWUDO8VHU$GPLQLVWUDWLRQ

 ,QWKH&RPPDQGILHOGRIWKHFHQWUDOV\VWHPHQWHUWUDQVDFWLRQSU01DQGFKRRVH(QWHU
 ,Q8VHUHQWHUDXVHUQDPHIRUWKH
WHVWXVHU
 &KRRVH 

Release 4.6A/B
11–3
Chapter 11: Setting Up Central User Administration
Testing Central User Administration

 2QWKH$GGUHVVWDEHQWHUDWOHDVWD
ODVWQDPH
 &KRRVHWKH/RJRQGDWDWDE

 (QWHUDQ,QLWLDOSDVVZRUGIRUWKHWHVW
XVHU<RXPXVWFKDQJHWKHLQLWLDO
SDVVZRUGDWILUVWORJRQWRWKH5
6\VWHP
 5HHQWHUWKHLQLWLDOSDVVZRUG
 &KRRVHWKH6\VWHPVWDE
8

6
7

Authorizations Made Easy


11–4
Chapter 11: Setting Up Central User Administration
Testing Central User Administration

 ,QWKH6\VWHPFROXPQHQWHUWKH
ORJLFDOQDPHVRIWKHFHQWUDOV\VWHP
DQGRIDOOWKHFOLHQWV\VWHPVLQWKH
V\VWHPVWDEOH
 &KRRVHWKH$FWLYLW\JURXSVWDE

10

 &KRRVH7H[WFRPSDULVRQIURPFKLOG
V\V

$WH[WFRPSDULVRQLVQHHGHGWRSURYLGH
WKHFHQWUDOV\VWHPZLWKDYDLODEOH
DFWLYLW\JURXSVIURPWKHFOLHQWV\VWHP 11
2QO\LIWKLVVWHSKDVEHHQSHUIRUPHG
FDQDFWLYLW\JURXSVRIWKHFOLHQWV\VWHPV
EHGLVSOD\HGDQGVHOHFWHGLQWKHFHQWUDO
V\VWHPXVLQJSRVVLEOHHQWULHV,WLVDOVR
SRVVLEOHWRDVVLJQDFWLYLW\JURXSV
PDQXDOO\IURPWKHFOLHQWV\VWHP
ZLWKRXWWKHWH[WFRPSDULVRQ

 5HDGWKHGLDORJZLQGRZDQGFKRRVH
WRFRQWLQXH

Release 4.6A/B
11–5
Chapter 11: Setting Up Central User Administration
Testing Central User Administration

$VVLJQDQDFWLYLW\JURXSWRWKHWHVWXVHU
15
LQHYHU\ORJLFDOV\VWHPRIWKHV\VWHP
JURXS
 ,QWKH6\VWHPFROXPQHQWHUDOOWKH
ORJLFDOV\VWHPV
 ,QWKH$FWLYFROXPQHQWHUWKH
DFWLYLW\JURXS\RXZDQWWRDVVLJQWR
WKHWHVWXVHULQWKHFRUUHVSRQGLQJ
V\VWHP IRUWHVWSXUSRVHVLWLV
HQRXJKWRDVVLJQRQHDFWLYLW\JURXS
13 14
SHUV\VWHP 
 &KRRVH 

6DYLQJVWDUWVWKHGLVWULEXWLRQSURFHVV
DXWRPDWLFDOO\7KHXVHULVFUHDWHGZLWK
WKHDFWLYLW\JURXSDVVLJQPHQWLQHYHU\
GHILQHGV\VWHP

7KHXVHUPDLQWHQDQFHMXPSVEDFNWR 16
WKHVWDUWVFUHHQRI68
<RXUHFHLYHWKHPHVVDJH8VHUžZDV
VDYHG<RXFDQQRZFKHFNLIWKHXVHU
GDWDKDVEHHQGLVWULEXWHGFRUUHFWO\
 &KRRVH(QYLURQPHQW→'LVWULEXWLRQ
ORJ WUDQVDFWLRQSCUL 

Authorizations Made Easy


11–6
Chapter 11: Setting Up Central User Administration
Migrating Existing Users to the Central System

$VHULHVRIEXWWRQVSURYLGHVDFFHVVWR
GLIIHUHQWORJGLVSOD\V
,I\RXFKRRVH6\VWHPUHSRUWV\RXUHFHLYH
WKHXVHUVWDWXVVRUWHGE\FOLHQWV\VWHPV
,I\RXH[SDQGWKHWUHH\RXUHFHLYHWKH
XVHUVRIWKHFOLHQWV\VWHPV
$QRYHUYLHZDERXW(UURUV:DUQLQJV
6XFFHVVIXODQG1HZXQFRQILUPHG
GLVWULEXWLRQVLVGLVSOD\HG8QFRQILUPHG
GLVWULEXWLRQVFRXOGUHVXOWIURPDIDXOW\
5)&FRQQHFWLRQ

0LJUDWLQJ([LVWLQJ8VHUVWRWKH&HQWUDO6\VWHP

,I\RXDOUHDG\VHWXSXVHUDFFRXQWVLQWKHFOLHQWV\VWHPVWKHVHXVHUVQHHGWREHPLJUDWHGWRWKHFHQWUDO
V\VWHP,IWKLVDFWLRQKDVDOUHDG\EHHQSHUIRUPHG\RXFDQPDLQWDLQWKHXVHUGDWDFHQWUDOO\
 ,QWKH&RPPDQGILHOGRIWKHFHQWUDOV\VWHPHQWHUWUDQVDFWLRQSCUGDQGFKRRVH(QWHU
 6HOHFWWKHFOLHQWV\VWHPIURPZKHUH\RXZRXOGOLNHWRPLJUDWHWKHXVHUGDWD
 &KRRVH7UDQVIHUXVHUV

Release 4.6A/B
11–7
Chapter 11: Setting Up Central User Administration
Migrating Existing Users to the Central System

2QWKH1HZXVHUVWDE\RXFDQVHHDOO
XVHUDFFRXQWVDYDLODEOHLQWKHFOLHQW
V\VWHPEXWQRWLQWKHFHQWUDOV\VWHP
<RXFDQPLJUDWHDOOWKHVHXVHUVLQWRWKH 4 5
&HQWUDO8VHU$GPLQLVWUDWLRQ
 7RVHOHFWDOOFKRRVH  6

 &KRRVH 7UDQVIHUXVHUV
 &KRRVHWKH,GHQWLFDOXVHUVWDE

2QWKH,GHQWLFDOXVHUVWDEDOOXVHU
DFFRXQWVZLWKLGHQWLFDOILUVWDQGODVW
QDPHVLQWKHFOLHQWDQGFHQWUDOV\VWHP
DUHGLVSOD\HG$OORIWKHVHXVHUVFDQEH 7 8
PLJUDWHGWR&HQWUDO8VHU
$GPLQLVWUDWLRQ7KH\ZLOODOVRJHWWKH 9
FOLHQWV\VWHPDVVLJQHGLQ&HQWUDO8VHU
$GPLQLVWUDWLRQ
 7RVHOHFWDOOFKRRVH 
 &KRRVH 7UDQVIHUXVHUV
 &KRRVHWKH'LIIHUHQWXVHUVWDE

2QWKH'LIIHUHQWXVHUVWDEDOOXVHU
DFFRXQWVZLWKWKHVDPHXVHU,' EXW
ZLWKQDPHVWKDWDUHGLIIHUHQWLQWKH
FOLHQWRUFHQWUDOV\VWHP DUHGLVSOD\HG
10b
 ,IWKHXVHULVFRUUHFWLQWKHFHQWUDO
V\VWHPSURFHHGZLWKWKHIROORZLQJ
D 6HOHFWWKHGHVLUHGHQWU\
10a
E &KRRVH 7UDQVIHUXVHUV
 ,IWKHXVHULVFRUUHFWLQWKHFOLHQW
V\VWHPSURFHHGZLWKWKHIROORZLQJ
D (QWHUWKHVDPHQDPHLQWKH
FHQWUDOV\VWHPDVLWLVGLVSOD\HG
LQWKHFOLHQWV\VWHP7KHXVHULV
QRZGLVSOD\HGXQGHUWKH
,GHQWLFDOXVHUVWDE
E 6HOHFWWKHGHVLUHGHQWU\
F &KRRVH 7UDQVIHUXVHUV

Authorizations Made Easy


11–8
Chapter 11: Setting Up Central User Administration
Defining Field Attributes for User Maintenance

,IWKHGLIIHUHQWQDPHVUHVXOWIURPGHDOLQJZLWKWZRGLIIHUHQWSHUVRQV\RXKDYHWRFKDQJHWKHXVHUQDPHV
XVLQJSU01HLWKHULQWKHFHQWUDORUFOLHQWV\VWHP7KHXVHUQDPHRIWKHFOLHQWV\VWHPFDQEHIRXQGRQWKH
1HZXVHUVWDEDIWHUZDUGV
2QWKH$OUHDG\FHQWUDOXVHUWDEDOOXVHU
DFFRXQWVDUHGLVSOD\HGWKDWKDYHEHHQ
PLJUDWHGXVLQJRQHRIWKHDERYHVWHSV
RUKDYHEHHQFUHDWHGLQWKHFHQWUDO
V\VWHPRI&HQWUDO8VHU$GPLQLVWUDWLRQ

'HILQLQJ)LHOG$WWULEXWHVIRU8VHU0DLQWHQDQFH

$OWKRXJKLWLVQRORQJHUSRVVLEOHWRFUHDWHXVHUVLQWKHFOLHQWV\VWHP\RXFDQPDLQWDLQDOUHDG\H[LVWLQJXVHU
GDWDLQWKHFOLHQWV\VWHP7KHUHIRUHLWLVXVHIXOWRGHILQH DWWKHILHOGOHYHO LIDQGKRZWKLVGDWDVKRXOGEH
PDLQWDLQHG,QWKHIROORZLQJSURFHGXUHZHGHPRQVWUDWHKRZWRGHILQHILHOGDWWULEXWHV
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSCUMDQGFKRRVH(QWHU
 $OORFDWHRQDOOWDEVIRUHDFKILHOGWKH 3
DWWULEXWHVGHVFULEHGLQWKHWDEOH
EHORZ1RWDOODWWULEXWHVFDQEH
VHOHFWHGIRUHYHU\ILHOG
 &KRRVH 

Release 4.6A/B
11–9
Chapter 11: Setting Up Central User Administration
Global User Manager

$WWULEXWH 'HVFULSWLRQ

*OREDO 7KHGDWDFDQRQO\EHPDLQWDLQHGLQWKHFHQWUDOV\VWHPDQGLV
GLVWULEXWHGIURPWKHUHLQWRWKHFOLHQWV\VWHPV
/RFDO 7KHGDWDFDQRQO\EHPDLQWDLQHGLQWKHFOLHQWV\VWHPDQGLVQRW
GLVWULEXWHG
3URSRVDO 'XULQJWKHFUHDWLRQRIDXVHUWKHVXJJHVWHGYDOXHLVPDLQWDLQHGDQG
WKHQGLVWULEXWHGWRWKHFOLHQWV\VWHPV$IWHUWKHGLVWULEXWLRQWKHGDWDLV
PDLQWDLQHGRQO\ORFDOO\,IDQHZFOLHQWV\VWHPLVFRQQHFWHGWR&HQWUDO
8VHU$GPLQLVWUDWLRQWKHSURSRVHGYDOXHLVGLVWULEXWHGWRWKLVV\VWHP
,IWKHSURSRVHGYDOXHLVFKDQJHGLQWKHFHQWUDOV\VWHPLWLVRQO\
GLVWULEXWHGWRWKHQHZV\VWHPV$OUHDG\H[LVWLQJV\VWHPVDUHQRW
DIIHFWHG
5HW9DO 7KHXVHUGDWDFDQEHPDLQWDLQHGLQWKHFHQWUDOV\VWHPDVZHOODVWKH
FOLHQWV\VWHP7KHFKDQJHVPDGHLQWKHFOLHQWV\VWHPDUHUHGLVWULEXWHG
WRWKHFHQWUDOV\VWHP)URPWKHUHWKHGDWDLVGLVWULEXWHGWRDOORWKHU
FOLHQWV\VWHPV
(YHU\ZKHUH 7KHXVHUGDWDFDQEHPDLQWDLQHGLQWKHFHQWUDOV\VWHPDQGWKHFOLHQW
V\VWHP7KHFKDQJHVLQWKHFOLHQWV\VWHPDUHQRWGLVWULEXWHGDQ\ZKHUH
7KHFKDQJHVDIIHFWRQO\WKLVFOLHQWV\VWHP

7KHLQVWDOODWLRQRIWKH&HQWUDO8VHU$GPLQLVWUDWLRQLVQRZFRPSOHWH

*OREDO8VHU0DQDJHU

7KH*OREDO8VHU0DQDJHULVDQRSWLRQDOWRROWKDWVLPSOLILHV\RXUZRUNZLWK&HQWUDO8VHU
$GPLQLVWUDWLRQ<RXFDQVWLOOXVHWKHXVHUPDLQWHQDQFHWUDQVDFWLRQDQGWKH3URILOH*HQHUDWRU
3* WRDVVLJQXVHUVDQGDFWLYLW\JURXSV
<RXQRZKDYHWKHRSWLRQWRXVHGLIIHUHQWJURXSLQJW\SHVRQWKHXVHUDQGV\VWHPOHYHOZLWK
WKH*OREDO8VHU0DQDJHU7KHJURXSLQJLVFDUULHGRXWWKURXJKXVHUJURXSVRQWKHXVHUOHYHO
DQGWKURXJKV\VWHPW\SHVIRUWKHV\VWHP
7KHVHPDLQWHQDQFHRSWLRQVDUHFRPELQHGLQWKH*OREDO8VHU0DQDJHUVLQFHWKHUHDUH
XVXDOO\QRFKDQJHVWRRWKHUGDWDLQWKHXVHUPDVWHUGDWDDIWHUWKHFUHDWLRQRIWKHXVHU
+RZHYHUV\VWHPDQGDXWKRUL]DWLRQDVVLJQPHQWVDUHDQRQJRLQJSURFHVV

,I\RXDUHQRWFRPSOHWHO\ILQLVKHGZLWKVHWWLQJXSWKHXVHUGDWDGRQRWGLVWULEXWHWKHXVHU
GDWDXVLQJWKH*OREDO8VHU0DQDJHU(YHU\WKLQJWKDWLVQRWGHILQHGLQWKH*OREDO8VHU
0DQDJHUZLOOEHGHOHWHGLQWKHWDUJHWV\VWHP

Authorizations Made Easy


11–10
Chapter 11: Setting Up Central User Administration
Global User Manager

,WLVQRWSRVVLEOHWRDVVLJQDXWKRUL]DWLRQSURILOHVGLUHFWO\WRXVHUVRUXVHUJURXSVZLWKWKH
*OREDO8VHU0DQDJHU7KHDXWKRUL]DWLRQVDUHDVVLJQHGWKURXJKDFWLYLW\JURXSV,I\RX
ZDQWWRFUHDWHDQDFWLYLW\JURXSDXWRPDWLFDOO\IURPDQH[LVWLQJDXWKRUL]DWLRQSURILOHXVH
WUDQVDFWLRQSU25VWHS&RS\GDWDIURPROGSURILOHV

7KHPDLQDGYDQWDJHRIWKH*OREDO8VHU0DQDJHULVWKDW\RXQHYHUKDYHWRYLHZWKH
FRPSOHWHV\VWHPODQGVFDSHWRDVVLJQDXWKRUL]DWLRQV,QHYHU\WDVN\RXRQO\ORRNDWDVPDOO
SDUWRIWKHFRPSOHWHODQGVFDSH7KHGLDJUDPEHORZVKRZVWKDW\RXRQO\ORRNDWWZRVLGHVRI
WKHDVVLJQPHQWWULDQJOH

6RXUFH 7DUJHW

8VHU8VHUJURXS 6\VWHP6\VWHPW\SH
6\VWHP6\VWHPW\SH $FWLYLW\JURXS&RPSRVLWHDFWLYLW\JURXS
$FWLYLW\JURXS&RPSRVLWHDFWLYLW\JURXS 8VHU8VHUJURXS

7RPRGHODFRPSOHWHDVVLJQPHQWIRUGLVWULEXWLRQLQWKHWDUJHWV\VWHPV\RXQHHGWRFUHDWH
DFORVHGWULDQJOHIRUWKDWDVVLJQPHQWDVVKRZQLQWKHJUDSKLFDERYH7RUHGXFHWKH
FRPSOH[LW\RIWKLVSURFHVVWKH*OREDO8VHU0DQDJHULVVHWXSLQVXFKDZD\WKDW\RX
RQO\KDYHWRDVVLJQWKHRWKHUWZRDQJOHV2QFH\RXKDYHFRPSOHWHGHDFKRIWKHWKUHH
DQJOHVWKHDVVLJQPHQWVDUHFRPSOHWH

Release 4.6A/B
11–11
Chapter 11: Setting Up Central User Administration
Global User Manager

6WUXFWXUHRIWKH*OREDO8VHU0DQDJHU

7KH*OREDO8VHU0DQDJHUFDQRQO\EHXVHGLQWKHFHQWUDOV\VWHPRI&HQWUDO8VHU
$GPLQLVWUDWLRQ

7RVWDUWWKH*OREDO8VHU0DQDJHUHQWHUWUDQVDFWLRQSUUMLQWKH&RPPDQGILHOGDQGFKRRVH
(QWHU

On the left tile, all users On the right tile, all activity
and user groups in the groups and composite
system environment are activity groups in the
displayed. system environment are
displayed.
In the middle tile, all the
systems and system
groups are displayed.

7RGLVSOD\WKHDFWLYLW\JURXSVDQGFRPSRVLWHDFWLYLW\JURXSVRIWKHFOLHQWV\VWHPLQWKH
*OREDO8VHU0DQDJHUFKRRVH([WUDV→6\VWHPFRPSDULVRQ$OWHUQDWLYHO\\RXFDQSHUIRUP
WKH7H[WFRPSDULVRQIRUFKLOGV\VRQWKH$FWLYLW\JURXSVWDELQXVHUPDLQWHQDQFHWUDQVDFWLRQ
SU01 DVGHVFULEHGHDUOLHU 1RWHWKDWLWPD\WDNHVRPHWLPHIRUWKHGDWDWREHFRPH
DYDLODEOHVLQFHLWLVGLVWULEXWHGDV\QFKURQRXVO\

8VLQJWKH*OREDO8VHU0DQDJHU
7KHXVHRIWKH*OREDO8VHU0DQDJHUGHSHQGVRQZKHWKHURUQRWWKHUHZHUHXVHUVLQ\RXU
V\VWHPODQGVFDSHEHIRUHWKHLQVWDOODWLRQRIFHQWUDOXVHUPDQDJHPHQW
,IXVHUVDOUHDG\H[LVWLWLVDGYLVDEOHWRPLJUDWHWKDWXVHUPDVWHUGDWDLQWRWKH*OREDO8VHU
0DQDJHU7KLVHQVXUHVWKDWWKHXVHUGDWDZLOOQRWEHGHOHWHGZLWKWKHILUVWGLVWULEXWLRQ
6\VWHP/DQGVFDSHZLWK([LVWLQJ8VHUV
,I\RXZDQWWRXVHWKH*OREDO8VHU0DQDJHULQDV\VWHPODQGVFDSHZLWKDQH[LVWLQJDQG
SURGXFWLYHXVHUSURFHHGDVGHVFULEHGEHORZ
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSUUMDQGFKRRVH(QWHU
 )URPWKHVWDQGDUGPHQXEDU

Authorizations Made Easy


11–12
Chapter 11: Setting Up Central User Administration
Global User Manager

< &KRRVH([WUDV→0LJUDWLRQ→8VHUWRGLVSOD\WKHFXUUHQWVWDWXVRIXVHUPDVWHU
UHFRUGVLQDOOV\VWHPVLQWKH*OREDO8VHU0DQDJHU
< &KRRVH([WUDV→0LJUDWLRQ→$FWLYLW\JURXSVWRDVVLJQDFWLYLW\JURXSVDXWRPDWLFDOO\
LQWKHYDOLGV\VWHPVLQWKH*OREDO8VHU0DQDJHU

7KHGDWDLVRQO\XSGDWHGRQWKHVLQJOHXVHUOHYHOZLWKWKHFXUUHQWVWDWXVLQWKH*OREDO8VHU
0DQDJHUDIWHUWKHPLJUDWLRQ'RQRWVWDUWZLWKWKHFUHDWLRQRIXVHUJURXSVDQGV\VWHP
W\SHVLI\RXDUHQRWFRPSOHWHO\ILQLVKHGZLWKWKHPLJUDWLRQ

$FWLYLW\JURXSVVKRXOGEHQDPHGFOHDUO\LQWKHV\VWHPODQGVFDSH7KHV\VWHPODQGVFDSH
DFWVOLNHDVLQJOHV\VWHP7KHUHIRUHDQDFWLYLW\JURXSVKRXOGRQO\H[LVWRQFHLQWKLVV\VWHP
,IDQDFWLYLW\JURXSZLWKWKHVDPHQDPHH[LVWVLQPXOWLSOHV\VWHPVLQWKHV\VWHP
ODQGVFDSHLWZLOODSSHDUPXOWLSOHWLPHVLQWKHDFWLYLW\JURXSOLVWLQWKH*OREDO8VHU
 0DQDJHU

,QWKH*OREDO8VHU0DQDJHU\RXFDQFUHDWHDVVLJQPHQWVRQWKHVLQJOHXVHUOHYHODVZHOODV
RQWKHXVHUJURXSOHYHO7KLVDELOLW\PD\OHDGWRXQZDQWHGHIIHFWVDIWHUDXVHUPLJUDWLRQ
)RUH[DPSOH\RXPLJUDWHGDOOGHYHORSHUVLQ\RXUV\VWHPLQWRWKH*OREDO8VHU0DQDJHUDV
GHVFULEHGDERYH7KHQ\RXGHILQHGDXVHUJURXSIRUDOOGHYHORSHUVWKDWFRQWDLQVWKHVDPH
DXWKRUL]DWLRQVWKDW\RXGHILQHGHDUOLHURQWKHVLQJOHXVHUOHYHO,I\RXDVVLJQDOOGHYHORSHUV
WRWKDWXVHUJURXSLWZRXOGOHDGWRDGRXEOHDVVLJQPHQWRIWKHVDPHDXWKRUL]DWLRQV,I\RX
GHOHWHGWKHDVVLJQPHQWRIRQHXVHUWRWKLVXVHUJURXSWKLVXVHUZRXOGVWLOOKDYHWKH
DXWKRUL]DWLRQVRQWKHVLQJOHXVHUOHYHO7KHUHIRUH\RXPXVWGHOHWHWKHDVVLJQPHQWWRWKH
VLQJOHXVHUOHYHODVVRRQDV\RXDVVLJQWKHXVHUWRDXVHUJURXSDIWHUWKHPLJUDWLRQ7KH
VLQJOHXVHUDVVLJQPHQWVKRXOGEHXVHGWRJLYHDXVHUDGGLWLRQDODXWKRUL]DWLRQVWKDWGHYLDWH
IURPWKHVWDQGDUG

6\VWHP/DQGVFDSH:LWKRXW([LVWLQJ8VHUV
,I\RXKDYHQRH[LVWLQJXVHUVLQ\RXUV\VWHPODQGVFDSHWKHPLJUDWLRQRIWKHXVHUPDVWHU
GDWDGRHVQRWDSSO\<RXFDQLPPHGLDWHO\VWDUWZLWKWKHFUHDWLRQRIXVHUVLQWKHXVHU
PDLQWHQDQFHWUDQVDFWLRQSU01DQGFUHDWHWKHDXWKRUL]DWLRQDVVLJQPHQWVLQWKHV\VWHP
ODQGVFDSHWKURXJKWKH*OREDO8VHU0DQDJHU(YHU\XVHURQO\QHHGVWREHFUHDWHGRQFHLQWKH
FHQWUDOV\VWHPDQGPLJKWJHWDVVLJQHGWRRWKHUV\VWHPVZLWKWKHKHOSRIWKH*OREDO8VHU
0DQDJHU7KHFUHDWLRQRIWKDWXVHULQWKHRWKHUV\VWHPVDQGWKHDVVLJQPHQWWRWKHDFWLYLW\
JURXSVWDNHVSODFHDXWRPDWLFDOO\WKURXJKWKH*OREDO8VHU0DQDJHU

Release 4.6A/B
11–13
Chapter 11: Setting Up Central User Administration
Global User Manager

8VHU&UHDWLRQ
 &UHDWHDXVHULQWUDQVDFWLRQ68DV
XVXDO VHHFKDSWHUIRUGHWDLOHG
LQIRUPDWLRQ 
 (QWHUD8VHUJURXSRQWKH*URXSVWDE
IRUWKHFXUUHQWXVHU LIWKLVXVHU
JURXSKDVDOUHDG\EHHQFUHDWHGLQ
WKH*OREDO8VHU0DQDJHU <RXZLOO
QRWQHHGWRPDNHWKDWDVVLJQPHQWLQ
WKH*OREDO8VHU0DQDJHUDQ\PRUH
2

<RXVKRXOGRQO\FUHDWHDVVLJQPHQWVRQWKH6\VWHPVDQG$FWLYL DFWLYLW\JURXSV WDEVLI


\RXDUHFHUWDLQWKLVDVVLJQPHQWLVRQO\YDOLGIRUWKHVLQJOHXVHU2WKHUZLVHFUHDWHWKH
DVVLJQPHQWVIRUXVHUJURXSVLQWKH*OREDO8VHU0DQDJHU

$OOGDWDHQWHUHGLQWUDQVDFWLRQ68LVDOVRDYDLODEOHLQWKH*OREDO8VHU0DQDJHU$OO
DVVLJQPHQWVFUHDWHGLQWKH*OREDO8VHU0DQDJHUDUHDOVRDYDLODEOHLQWUDQVDFWLRQSU01

'HILQLQJ6\VWHP7\SHVDQG8VHU*URXSV
:HQRZGHPRQVWUDWHKRZWRJURXSPXOWLSOHV\VWHPVLQWRDV\VWHPJURXS
 &KRRVH QH[WWR6\VWHP7\SHVWR
FUHDWHDV\VWHPW\SH

 ,Q6\VWHPW\SHHQWHUDQDPHIRUWKH
V\VWHPW\SH 2
3
 ,Q6KRUWWH[WHQWHUWKHVKRUWWH[WIRU
4
WKDWV\VWHPW\SH
 &KRRVH WRFUHDWHWKHV\VWHPW\SH

Authorizations Made Easy


11–14
Chapter 11: Setting Up Central User Administration
Global User Manager

 7KHQHZV\VWHPW\SHDSSHDUVLQWKH
OLVW
 7RDVVLJQDV\VWHPWRWKHMXVWFUHDWHG
V\VWHPW\SHVHOHFWWKHGHVLUHG
V\VWHPIURPWKH6\VWHPVOLVW0RYHLW 5
XVLQJGUDJDQGGURSLQWRWKHQHZ 6
V\VWHPW\SH LQRXUH[DPSOH
'(9(/ 
 5HSHDWWKLVSURFHGXUHIRUHYHU\
V\VWHP\RXZRXOGOLNHWRDVVLJQWRD
V\VWHPW\SH

2QHV\VWHPFDQEHDVVLJQHGWRRQO\RQHV\VWHPJURXS$XVHUFDQEHDVVLJQHGWR
GLIIHUHQWXVHUJURXSV

,QWKHIROORZLQJVWHSVZHGHPRQVWUDWHKRZWRGHILQHDXVHUJURXS
 &KRRVH QH[WWR8VHUJURXSV

 ,Q8VHUJURXSHQWHUDQDPHIRUWKH
8VHUJURXS 2
3
 ,Q6KRUWWH[WHQWHUWKHVKRUWWH[WIRU
4
WKDWXVHUJURXS
 &KRRVH WRFUHDWHWKHXVHUJURXS

Release 4.6A/B
11–15
Chapter 11: Setting Up Central User Administration
Global User Manager

 7KHQHZXVHUJURXSDSSHDUVLQWKH
OLVW
 7RDVVLJQDXVHUWRWKHMXVWFUHDWHG
XVHUJURXSVHOHFWWKHGHVLUHGXVHU
5
IURPWKH8VHUVOLVW0RYHLWXVLQJ 6
GUDJDQGGURSLQWRWKHQHZXVHU
JURXS LQRXUH[DPSOH'(9(/23 
 5HSHDWWKLVSURFHGXUHIRUHYHU\XVHU
WKDW\RXZRXOGOLNHWRDVVLJQWRD
XVHUJURXS

0RGHOLQJZLWKWKH*OREDO8VHU0DQDJHU
,QWKHIROORZLQJSURFHGXUHZHGHPRQVWUDWHKRZWRDVVLJQWKHFRUUHFWV\VWHPVDQGDFWLYLW\JURXSVWRDXVHU
JURXS
 6HOHFWWKHMXVWFUHDWHGXVHUJURXS
 &KRRVH WRGLVSOD\WKH
DVVLJQPHQWV
2

 <RXUHFHLYHWKHFXUUHQWVWDWXVRIWKH
V\VWHPV\VWHPW\SHDQGDFWLYLW\
JURXSDVVLJQPHQWVIRUWKHVHOHFWHG
XVHUJURXS,QRXUH[DPSOHZHKDYH
PDGHQRDVVLJQPHQWVIRUWKHXVHU
JURXS'(9(/237KHUHIRUHQR 3 3
DVVLJQPHQWVDSSHDUMXVWWKHIROGHUV

Authorizations Made Easy


11–16
Chapter 11: Setting Up Central User Administration
Global User Manager

 7RDVVLJQDV\VWHPRUV\VWHPW\SHWR
DXVHUJURXSVHOHFWWKHGHVLUHG
V\VWHPRUV\VWHPW\SHIURPWKH
6\VWHPVRU6\VWHPW\SHVOLVWDQGPRYH
LWXVLQJGUDJDQGGURSLQWRWKH
GHVLUHGIROGHU IRUH[DPSOHDIROGHU 5
EHORQJLQJWR$VVLJQPHQWWR8VHU 4
JURXS'(9(/23 
 7RDVVLJQDFWLYLW\JURXSVRU
FRPSRVLWHDFWLYLW\JURXSVWRWKH
XVHUJURXSSURFHHGZLWKWKHVDPH
SURFHGXUH

7RUHGXFHWKHQXPEHURIGLVSOD\HGHQWULHVLQDOLVW IRUWKHXVHUDFWLYLW\JURXSHWF 
FKRRVHWKHVHOHFWLRQLFRQQH[WWRWKHGHVLUHGHQWU\

5HPHPEHUWKDWDFFRUGLQJWRWKHDVVLJQPHQWWULDQJOHVKRZQHDUOLHU\RXKDYHRQO\GHILQHG
WZRRIWKHWKUHHDQJOHVVRIDU,QWKHH[DPSOHDERYHZHIRFXVHGRQWKHXVHUJURXSWR
DVVLJQV\VWHPVDQGDFWLYLW\JURXSV:KDWLVPLVVLQJLVWKHDVVLJQPHQWEHWZHHQDFWLYLW\
JURXSVDQGV\VWHPV,I\RXPLJUDWHGWKHDFWLYLW\JURXSVWKHDVVLJQPHQWKDVEHHQ
SHUIRUPHGDXWRPDWLFDOO\DQGWKHWULDQJOHLVFRPSOHWH,IQRW\RXKDYHWRGHILQHWKH
DVVLJQPHQWIRUHYHU\DFWLYLW\JURXS

<RXKDYHWKHRSWLRQWRGLVSOD\DQGPDLQWDLQDVVLJQPHQWVIURPHYHU\FRUQHURIWKH
WULDQJOH,I\RXGLVSOD\WKHDVVLJQPHQWVRIDQDFWLYLW\JURXSWKHQ\RXFDQPDLQWDLQWKH
V\VWHPDQGXVHUJURXSVIRUWKDWDFWLYLW\JURXS,I\RXGLVSOD\WKHDVVLJQPHQWRIDV\VWHP
W\SHWKHQ\RXFDQGHILQHWKHXVHUDQGDFWLYLW\JURXSVWKDWDUHYDOLGIRUWKLVV\VWHPW\SH

$XWKRUL]DWLRQIRUWKH*OREDO8VHU0DQDJHU
:LWKWKH*OREDO8VHU0DQJHU\RXKDYHWKHRSWLRQWRPDLQWDLQXVHUVDQGDOOWKHLU
DXWKRUL]DWLRQVLQHYHU\V\VWHPIURPWKHFHQWUDOV\VWHPRIWKHV\VWHPODQGVFDSH7KLVRSWLRQ
FDQEHYHU\XVHIXOEXWDOVRYHU\SUREOHPDWLFLIXVHGLQFRUUHFWO\)RUH[DPSOHDOOXVHUVLQD
V\VWHPW\SHFRXOGEHGHOHWHGYHU\HDVLO\7KHUHIRUHLWLVYHU\LPSRUWDQWWRSD\FDUHIXO
DWWHQWLRQWRWKHDXWKRUL]DWLRQVRIWKHPRGHOHUDQGDGPLQLVWUDWRURIWKH*OREDO8VHU
0DQDJHU
:HUHFRPPHQG\RXXVHWKHIRXUH\HSULQFLSOHZKHUHRQHDGPLQLVWUDWRUPRGHOVWKH
DVVLJQPHQWVDQGDQRWKHUFKHFNVWKRVHDVVLJQPHQWVEHIRUHWKHGDWDLVGLVWULEXWHG7KH
PRGHOLQJLVWKHXQFULWLFDOSDUWEHFDXVHQRGDWDLVEHLQJFKDQJHGLQWKHFOLHQWV\VWHPV7KLV
KDSSHQVRQO\GXULQJWKHGLVWULEXWLRQ
7KHGLVWULEXWLRQRQO\WDNHVSODFHRQWKRVHLVVXHVIRUZKLFKWKHDGPLQLVWUDWRUKDVWKH
GLVWULEXWLRQULJKWV,QWKLVZD\LWLVSRVVLEOHWRKDYHGLIIHUHQWDGPLQLVWUDWRUVIRUVHOHFWHG

Release 4.6A/B
11–17
Chapter 11: Setting Up Central User Administration
Global User Manager

V\VWHPVLQWKHV\VWHPODQGVFDSH7KHVHDGPLQLVWUDWRUVFDQWKHQRQO\GLVWULEXWHWKHGDWDIRU
ZKLFKWKH\DUHDXWKRUL]HG
7KHIROORZLQJWDEOHGLVSOD\VWKHUHOHYDQWDXWKRUL]DWLRQREMHFWVIRUWKH*OREDO8VHU0DQDJHU

7DVN 2EMHFW $FWLYLW\ 6B86(5B*53 6B86(5B6<6 6B865B$*5

'LVSOD\ 8VHU 0RGHO   8VHUJURXSRI 6\VWHP $FWLY


FUHDWH 8VHUJURXS 'LVSOD\  WKHXVHU 6\VWHPW\SH JURXS
GHOHWH 6\VWHP
8VHUJURXS
DVVLJQPHQW 6\VWHPW\SH
DFWLYJURXS
8VHULQXVHU $VVLJQ  8VHUJURXSRI
JURXSV WKHXVHU
8VHUJURXS
&KDQJH $VVLJQ  6\VWHP
6\VWHPW\SH 6\VWHPW\SH
&UHDWHXVHU &UHDWH  8VHUJURXS
JURXS
0LJUDWH 0LJUDWH  &RPPHQW
HQWHULQJRI
VLQJOH
V\VWHPQRW
SRVVLEOH

'LVWULEXWLQJ'DWDLQWKH*OREDO8VHU0DQDJHU
%HIRUHWKHGLVWULEXWLRQ\RXVKRXOGDOZD\VGLVSOD\WKHGDWDDQGFKHFNLW,QWKHIROORZLQJVWHSVZH
GHPRQVWUDWHKRZWRFKHFNWKHGDWD
 ,QVLGHWKH*OREDO8VHU0DQDJHU
FKRRVH WRGLVSOD\WKHGLVWULEXWLRQ
GDWD 1

 &KHFNLIWKHGDWDIRUWKHXVHUVLVVHW
FRUUHFWO\IRUWKHGLVWULEXWLRQ

2QO\GLVWULEXWHWKHGDWDDIWHU\RXKDYHUDQGRPO\FKHFNHGWKHXVHUGDWD

Authorizations Made Easy


11–18
Chapter 11: Setting Up Central User Administration
Global User Manager

<RXFDQGLVWULEXWHWKHGDWDIURPWKH*OREDO8VHU0DQDJHUPDQXDOO\LPPHGLDWHO\RU
FUHDWHDEDFNJURXQGMREWRGLVWULEXWHWKHGDWD

,PPHGLDWH'LVWULEXWLRQ
 7RWULJJHUWKHGLVWULEXWLRQ
LPPHGLDWHO\FKRRVH 
1
7KHGDWDLVGLVWULEXWHGULJKWDZD\
5HPHPEHUWKDWLWFDQWDNHDZKLOH
XQWLODOOGDWDLVDYDLODEOHLQHYHU\
FOLHQWV\VWHPVLQFHWKHGLVWULEXWLRQ
KDSSHQVDV\QFKURQRXVO\

,PPHGLDWHGLVWULEXWLRQFDQFDXVHDORWRIQHWZRUNWUDIILFLQ\RXUV\VWHPODQGVFDSHDQG
VORZGRZQWKHSHUIRUPDQFHRIV\VWHPV,I\RXZDQWWRDYRLGWKLVVORZGRZQ\RXVKRXOG
VFKHGXOHDUHJXODUEDFNJURXQGMREWRUXQDWQLJKW

'XULQJWKHGLVWULEXWLRQWKHGDWDLVHQWHUHGLQWRWUDQVDFWLRQ68DFFRUGLQJWRWKH
PRGHOLQJLQWKH*OREDO8VHU0DQJHUDQGIURPWKHUHGLVWULEXWHGWRWKHFOLHQWV\VWHPV,Q
WKHFOLHQWV\VWHPRQO\WKHXVHUVDUHFUHDWHGDQGWKHDFWLYLW\JURXSVDVVLJQHG2WKHUGDWD
LVQRWGLVWULEXWHGEXWNHSWLQWKHFHQWUDOV\VWHP7KHUHIRUHLQWUDQVDFWLRQ6&8/\RXFDQ
H[SHFWWRILQGRQO\VRPHORJVQDPHO\WKRVHIRUWKHGLVWULEXWLRQRIWKHDFWLYLW\JURXS
DVVLJQPHQWDQGIRUXVHUVFUHDWHGRUGHOHWHG.

7RUHGXFHWKHGDWDIORZWKDWRFFXUVGXULQJWKHGLVWULEXWLRQRQO\GDWDWKDWKDVFKDQJHG
VLQFHWKHODVWGLVWULEXWLRQLVGLVWULEXWHG

6FKHGXOLQJ%DFNJURXQG'LVWULEXWLRQ
 7RVFKHGXOHDEDFNJURXQGMREIRU
WKHGDWDGLVWULEXWLRQFKRRVH([WUDV
→6FKHGXOHGLVWULEXWLRQ 1

Release 4.6A/B
11–19
Chapter 11: Setting Up Central User Administration
Global User Manager

 &KRRVH 

 ,Q-REQDPHHQWHUDMREQDPH
8
 ,Q-REFODVVHQWHUDSULRULW\IRUWKH
MREFODVV
7 6
 ,Q7DUJHWVHUYHUVHOHFWWKHFHQWUDO
V\VWHPDVWKHWDUJHWV\VWHP
3
 &KRRVH 6WHSWRSODQWKH$%$3 4
SURJUDP56865
5
 &KRRVH 6WDUWFRQGLWLRQWRVFKHGXOH
WKHWLPHIRU\RXUMRE
 &KRRVH 

,I\RXSURFHVVWKHDGPLQLVWUDWLRQRIXVHUGDWDLQWKH*OREDO8VHU0DQDJHUZLWKWKHIRXU
H\HSULQFLSOH\RXVKRXOGEHDZDUHWKDWWKHUHPLJKWEHFRQIOLFWDV\RXFDQQRWFKHFNWKH
GDWDEHIRUHWKHDXWRPDWLFGLVWULEXWLRQ

Authorizations Made Easy


11–20
&KDSWHU 7LSVDQG7URXEOHVKRRWLQJ


&RQWHQWV

Overview ................................................................................................................12–2
Tracing Authorizations with Transaction SU53 .................................................12–2
System Trace Using Transaction ST01 ..............................................................12–4
Analyzing a Written Trace File.............................................................................12–9
Reducing the Scope of Authorization Checks.................................................12–12

12–1
Chapter 12: Tips and Troubleshooting
Overview

2YHUYLHZ

:KHQXVHUVH[HFXWHDWUDQVDFWLRQRUUHSRUWWKDWLVQRWLQFOXGHGLQWKHLUXVHUPHQXWKH\PD\
VHHWKHV\VWHPPHVVDJHVLPLODUWR<RXKDYHQRDXWKRUL]DWLRQIRU7UDQVDFWLRQž7KLVPHVVDJH
PHDQVWKDWHLWKHUWKHLUFXUUHQWDXWKRUL]DWLRQSURILOHGRHVQRWFRQWDLQWKHUHTXLUHG
DXWKRUL]DWLRQWRH[HFXWHWKHWUDQVDFWLRQRUWKHYDOXHVPDLQWDLQHGIRUWKHSURILOH·V
DXWKRUL]DWLRQDUHLQVXIILFLHQW7KHPLVVLQJDXWKRUL]DWLRQVFDQEHGHWHUPLQHGHLWKHUE\
WUDFLQJDXWKRUL]DWLRQVZLWKWUDQVDFWLRQ68 'LVSOD\FKHFNYDOXHVRIDXWKRUL]DWLRQFKHFNVLIQRW
DXWKRUL]HG RUZLWKWKHV\VWHPWUDFHWUDQVDFWLRQ67
7UDQVDFWLRQ68LVLQFOXGHGLQWKHDFWLYLW\JURXS6$3B%&B(1'86(5B$*ZKLFKLV
LQFOXGHGLQWKHXVHUUROHWHPSODWH6$3B(9(5<B(03/2<((
,WLVDOVRDFFHVVLEOHXVLQJWKHPHQXSDWK6\VWHP→8WLOLWLHV→'LVSOD\$XWKRUL]DWLRQ&KHFN
IURPWKHPDLQPHQX

7UDFLQJ$XWKRUL]DWLRQVZLWK7UDQVDFWLRQ68

%\H[HFXWLQJWUDQVDFWLRQ68'LVSOD\FKHFNYDOXHVRIDXWKRUL]DWLRQFKHFNVLIQRWDXWKRUL]HG
IURPWKHXVHUPHQXRUE\HQWHULQJSU53LQWKH&RPPDQGILHOG\RXFDQDWDQ\WLPHDQDO\]H
DQDXWKRUL]DWLRQGHQLHGHUURULQ\RXUVHVVLRQ7UDQVDFWLRQ68FDQEHDFFHVVHGIURPDQ\RI
\RXUVHVVLRQVQRWMXVWWKHRQHZKHUHWKHHUURURFFXUUHG<RXFDQQRWKRZHYHUDQDO\]HDQ
DXWKRUL]DWLRQHUURUIURP\RXURZQVHVVLRQLQDQRWKHUXVHU·VORJRQVHVVLRQ

$WWKHWUDQVDFWLRQVWDUWWUDQVDFWLRQ68LVSURWHFWHGE\DXWKRUL]DWLRQREMHFW6B7&2'(
<RXVKRXOGJLYHDOOXVHUVDFFHVVULJKWVWRWUDQVDFWLRQ687KXVLQFDVHRIDSUREOHP
\RXUKHOSGHVNFDQHDVLO\DQDO\]HSUREOHPVWKDWXVHWUDQVDFWLRQ687UDQVDFWLRQ68LV
LQFOXGHGLQWKHDFWLYLW\JURXS6$3B%&B(1'86(5B$*ZKLFKLVLQFOXGHGLQWKHXVHUUROH
WHPSODWH6$3B(9(5<B(03/2<((

,I\RXDUHXVLQJVWUXFWXUDODXWKRUL]DWLRQV68LVQRWYHU\XVHIXOLIWKHWUDQVDFWLRQZKHUH
\RXDUHUHFHLYLQJPHVVDJHV<RXKDYHQRDXWKRUL]DWLRQIRUžLVDQ+5WUDQVDFWLRQRUD
WUDQVDFWLRQWKDWFDOOV+5REMHFWV68RQO\UHYHDOVWKHODVWDXWKRUL]DWLRQFKHFNIDLOXUH
EDVHGRQWKH$%$3FRGHVWDWHPHQW$XWKRUL]DWLRQ&KHFN+RZHYHUVWUXFWXUDO
DXWKRUL]DWLRQVGRQRWDOZD\VXVHWKH$XWKRUL]DWLRQ&KHFNVWDWHPHQWLQGHWHUPLQLQJ
DFFHVVHV7KHUHIRUHLIH[WHQVLYHVWUXFWXUDODXWKRUL]DWLRQVDUHXVHGWKH6\VWHP7UDFH
WUDQVDFWLRQ67 ZLOOEHRIPRUHEHQHILWWKDQ68

Authorizations Made Easy


12–2
Chapter 12: Tips and Troubleshooting
Tracing Authorizations with Transaction SU53

([DPSOH
,QWKHIROORZLQJH[DPSOHZHGHPRQVWUDWHKRZDXVHUZKRKDVWKHXVHUUROHWHPSODWH
'$7$B(175<B&/(5. ZHFUHDWHGWKLVDFWLYLW\JURXSHDUOLHULQWKHERRN WULHVWRUXQWUDQVDFWLRQ)%
'RFXPHQWFKDQJHV6LQFHWKLVXVHUKDVQRDXWKRUL]DWLRQIRUWKLVWUDQVDFWLRQWKHHUURUPHVVDJH<RXKDYHQR
DXWKRUL]DWLRQIRU7UDQVDFWLRQ)%LVUHFHLYHG7KHXVHUKDVWRXVH68'LVSOD\FKHFNYDOXHVRI
DXWKRUL]DWLRQFKHFNVLIQRWDXWKRUL]HGWRILQGRXWZKDWDXWKRUL]DWLRQLVPLVVLQJ

:HVWDUWZKHUHWKHXVHUKDVDWWHPSWHG
WRUXQWUDQVDFWLRQ)%DQGUHFHLYHVWKH
HUURUPHVVDJH<RXKDYHQRDXWKRUL]DWLRQ
IRU7UDQVDFWLRQ)%
 6WDUWWUDQVDFWLRQ68¥'LVSOD\
FKHFNYDOXHVRIDXWKRUL]DWLRQFKHFNVLI
QRWDXWKRUL]HGIURPWKHXVHUPHQXRU
HQWHUSU53LQWKH&RPPDQGILHOG

Error message

 7KHV\VWHPGLVSOD\VWKHFKHFNHG
DXWKRUL]DWLRQREMHFWWKDWFDXVHGWKH 4
HUURUPHVVDJHZLWKWKH
FRUUHVSRQGLQJILHOGYDOXHV
 $OVRGLVSOD\HGDUH
D 7KHFXUUHQWDXWKRUL]DWLRQLQWKH 2
XVHUVDVVLJQHGDXWKRUL]DWLRQ
This is
SURILOH what is
missing
E 7KHDXWKRUL]DWLRQILHOGYDOXHVIRU
WKLVDXWKRUL]DWLRQ
 7RSULQWWKLVLQIRUPDWLRQFKRRVH
3a
9DOXHV→3ULQW
This is
3b what is
currently
assigned

Release 4.6A/B
12–3
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01

7RDGGWKHPLVVLQJDXWKRUL]DWLRQWRWKHXVHU·VFXUUHQWDXWKRUL]DWLRQSURILOHXVLQJWKH
3URILOH*HQHUDWRU 3* VHHFKDSWHU,QVHUWLQJ0LVVLQJ$XWKRUL]DWLRQV$OVRUHIHUWRWKH
6$31HW²5)URQWHQGQRWHQXPEHUVDQG IRUPHUO\266QRWHV 

6\VWHP7UDFH8VLQJ7UDQVDFWLRQ67

<RXFDQXVHWKHV\VWHPWUDFHWRUHFRUGDXWKRUL]DWLRQFKHFNVLQ\RXURZQVHVVLRQDQGRWKHU
XVHUV·VHVVLRQV6WDUWWUDQVDFWLRQ67 V\VWHPWUDFH DQGUXQWKHWUDQVDFWLRQWKHXVHULV
KDYLQJDXWKRUL]DWLRQSUREOHPVZLWK$VVRRQDV\RXJHWVWXFNVWRS\RXUWUDFH:HXVHWKH
WUDFHIRUDXWKRUL]DWLRQFKHFNVWKRXJKLWLVFDSDEOHRIWUDFLQJPXFKPRUH(YHU\WKLQJ\RX
KDYHGRQHLQWKH56\VWHPWKDWUHTXLUHVDXWKRULW\FKHFNVLVUHFRUGHGLQWKHWUDFHZLWKWKH
REMHFW·VILHOGVDQGWKHWHVWHGYDOXHV

8VLQJ67 V\VWHPWUDFH VHYHUHO\DIIHFWVV\VWHPSHUIRUPDQFH

([DPSOH
,QWKHIROORZLQJH[DPSOHZHGHPRQVWUDWHKRZWKHDGPLQLVWUDWRUFDQFUHDWHDV\VWHPWUDFH
RIDQRWKHUXVHU·VVHVVLRQ8VHU)7$<(+ZKRKDVEHHQDVVLJQHGWKHXVHUUROH
'$7$B(175<B&/(5.LVWU\LQJWRUXQDWUDQVDFWLRQ )% IRUZKLFKKHKDVDXWKRUL]DWLRQ
DQGRQHWUDQVDFWLRQ )% IRUZKLFKKHKDVQRDXWKRUL]DWLRQ$WWKHVDPHWLPHWKH
DGPLQLVWUDWRUXVHVWUDQVDFWLRQ67WRFUHDWHDV\VWHPWUDFHIRUWKHDWWHPSWVRIXVHU
)7$<(+

7RVHWXSWKHV\VWHPWUDFHWUDQVDFWLRQ
 6WDUWWKHWUDQVDFWLRQ67
¥6\VWHP7UDFH

Authorizations Made Easy


12–4
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01

&KHFNWKH7UDFHVWDWXVEHIRUHXVLQJWKHV\VWHPWUDFH,IWKHWUDFHLVDFWLYHGRQRWLQWHUIHUH
EHFDXVHWKHUHLVRQO\RQHWUDFHV\VWHPIRUHDFK5LQVWDQFH
6
 <RXFDQVHHLIDQRWKHUXVHUKDVXVHG
WKHV\VWHPWUDFHDQGZKHQLWKDV
EHHQDFWLYDWHG
 0DQ\GLIIHUHQW7UDFHFRPSRQHQWV
Tip
H[LVWDQGHDFKFDQEHVZLWFKHGRQ
ZLWKLWVRZQIODJ DQGILOWHU  3
tech

 6RPHVHOHFWLRQVDUHGLUHFWO\YLVLEOH
LQWKHFKHFNER[HV(QVXUHWKDWRQO\ 4
WKH$XWKRUL]DWLRQFKHFNFKHFNER[LV
VHOHFWHG 2
 2WKHUWUDFHFRPSRQHQWVHOHFWLRQVDUH
JURXSHGDQGPLJKWFRQWDLQRQO\
SDUWLDOVHOHFWLRQV&KHFNDOO LFRQV 5
WRHQVXUHWKDWQRWKLQJLVVHOHFWHG
 7RUHVWULFWWKHWUDFHWRDVSHFLILFXVHU
RUVHVVLRQFKRRVH(GLW→)LOWHU→
6KDUHG

7KHWUDFHILOH·VQDPHDQGVWRUDJHORFDWLRQLVVKRZQLQWKHILHOG&XUUHQWWUDFHILOH7KHWUDFH
LVDGGHGWRWKHH[LVWLQJILOHXQWLOWKHPD[LPXPILOHVL]HLVUHDFKHG7KHQDQHZILOHQHHGV
WREHFUHDWHG VHHODWHULQWKLVVHFWLRQ 

 (QWHUWKHQDPHRIWKHXVHUIRUZKLFK
\RXZRXOGOLNHWRUXQWKHWUDFH
,QRXUH[DPSOHZHZDQWWRWUDFH 10
XVHU)7$<(+ªVWUDQVDFWLRQV 7

 &KRRVH%DFN

8
11

<RXDOVRKDYHWKHRSWLRQWRILOWHUWKH
GDWDIRUHLWKHUDFHUWDLQWUDQVDFWLRQRU
SURJUDP
 2QWKH6\VWHP7UDFHVFUHHQFKRRVH
(GLW→:ULWHRSWLRQV

Release 4.6A/B
12–5
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01

 7RVDYH\RXUWUDFHRQWKHKDUGGULYH
VHOHFW7UDFH:ULWHWRGLVN
 &KRRVH%DFN

<RXDOVRKDYHWKHRSWLRQWRHLWKHUGHILQHDWLPHIUDPHIRUWKHWUDFHWRUXQRUWRXVHWKH
EXIIHU

 7RVDYH\RXUVHWWLQJVIRUWKHQH[W
WLPH\RXXVHWKHWUDFHFKRRVH(GLW 12
→6HWWLQJV→:ULWHWRGDWDEDVH
14
 <RXUGDWDLVVDYHGZLWKWKH
IROORZLQJVHWWLQJV&OLHQWXVHUQDPH
GHIDXOW
7KHV\VWHPLVQRZUHDG\WREHJLQ
WKHWUDFH$WWKLVWLPHZH
UHFRPPHQGWKDW\RXKDYHWKHXVHU·V
VHVVLRQ\RXZRXOGOLNHWRWUDFHUHDG\
RURSHQDQRWKHUVHVVLRQWRWUDFH
\RXURZQWUDQVDFWLRQ 
 &KRRVH7UDFHRQ

13

7RXVH\RXULQGLYLGXDOVHWWLQJVWKHQH[WWLPH\RXVWDUWWKHWUDFHFKRRVH(GLW→6HWWLQJV
→5HDGIURPGDWDEDVH$OOWKHFKHFNPDUNV\RXVHWZLOODSSHDULQWKHFRUUHVSRQGLQJ
FKHFNER[HV

 &KRRVH<HV
)URPQRZRQHYHU\DFWLRQWKDWXVHU
)7$<(+SHUIRUPVLVUHFRUGHGLQWKH
WUDFH 15

Authorizations Made Easy


12–6
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01

 &KDQJHWRWKHXVHU·VVHVVLRQ\RX
ZDQWWRWUDFH
7KHXVHUVKRXOGQRZUXQWKH
WUDQVDFWLRQV\RXZRXOGOLNHWR
LQYHVWLJDWH,QRXUH[DPSOHZHILUVW
VWDUWWUDQVDFWLRQ)%WKHQ)%
 %HJLQWKHWUDQVDFWLRQ IRUH[DPSOH 17
)%¥'LVSOD\GRFXPHQWV 

7KHWUDQVDFWLRQVWDUWVEHFDXVHXVHU
)7$<(+LVDXWKRUL]HGWRSHUIRUPLW 18

 %HJLQDQRWKHUWUDQVDFWLRQ IRU


H[DPSOHFB04 

6LQFHXVHU)7$<(+LVQRWDXWKRUL]HG
WRSHUIRUP)%KHUHFHLYHGWKH
HUURUPHVVDJH<RXDUHQRWDXWKRUL]HG
WRXVHWUDQVDFWLRQ)%
7KHV\VWHPDOVRMXPSVEDFNWRWKH
XVHUPHQX

Error message

Release 4.6A/B
12–7
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01

 $IWHUFRPSOHWLQJ\RXUV\VWHPWUDFH
VZLWFKEDFNWRWKHRWKHUVHVVLRQWKH
WUDFHVHVVLRQ
20
 &KRRVH 7UDFHRII

 &KRRVH<HVWRVWRSWUDFLQJ
7KHWUDFHLVQRZUHDG\WRDQDO\]H
6HHWKHQH[WVHFWLRQRQKRZWR
DQDO\]HDWUDFH 21

Authorizations Made Easy


12–8
Chapter 12: Tips and Troubleshooting
Analyzing a Written Trace File

$QDO\]LQJD:ULWWHQ7UDFH)LOH

 7RGLVSOD\WKHWUDFHUHVXOWVIURPWKH
6\VWHP7UDFHZLQGRZFKRRVH
)LOHOLVW
1

 6HOHFW\RXUWUDFH

,I\RXVHHPRUHWKDQRQHWUDFHVHOHFWWKH
FRUUHFWRQH7RGHWHUPLQHWKHWUDFH
QDPHVHHWKH7HFK7DONRQSDJH²  2
 &KRRVH $QDO\]H

%HDZDUHWKDWWKHWUDFHILOHFDQEHH[WUHPHO\ODUJH%HSDWLHQWEHFDXVHLWPD\WDNHVRPH
WLPHWRGLVSOD\LW

Release 4.6A/B
12–9
Chapter 12: Tips and Troubleshooting
Analyzing a Written Trace File

 6HOHFWDOOWKHRSWLRQV\RXZDQWWR
FRQVLGHULQ\RXUDQDO\VLV IRU
H[DPSOH7UDFHIRUDXWKRUL]DWLRQ 5
FKHFNV 

,IHYHU\WKLQJLVVHOHFWHGLWPLJKWEH
HDVLHUWRFKRRVH WRGHVHOHFWDOOILUVW 4
DQGWKHQUHVHOHFWRQHRUPRUH
FKHFNER[HV
 8QGHU5HVWULFWLRQVHQWHUWKHGHVLUHG
XVHU
 &KRRVH $QDO\]H
6

 7KHILUVWSDJHRIWKHWUDFHILOH
DSSHDUV%\GHIDXOW:LWKDXWKRULW\
FKHFNVKRXOGEHVHOHFWHG
 6FUROOGRZQXQWLO\RXVHHWKH
WUDQVDFWLRQVWKDWZHUHXVHGE\WKH
XVHU

Authorizations Made Easy


12–10
Chapter 12: Tips and Troubleshooting
Analyzing a Written Trace File

 6LQFHWKHWUDFHOLVWVFDQEHYHU\
ODUJHWKHRXWSXWLVFRPSUHVVHG7KH
1XPEHURIUHFRUGVSULQWHGLVWKH
QXPEHURIOLQHVFXUUHQWO\GLVSOD\HG
 7KHVHOLQHVDSSHDULQWKHER[ HV
DERYHWKH1XPEHURIUHFRUGVSULQWHG
,QRXUH[DPSOHDOOWKH
DXWKRUL]DWLRQVFKHFNHGZLWKWKH 11 12 13
UHTXLUHGILHOGYDOXHVKDYHDSSHDUHG
7KLVLVWKHLQIRUPDWLRQ\RXDUH 10
ORRNLQJIRU
 7KHUHWXUQFRGHIRUHDFKRIWKHVH
DXWKRUL]DWLRQFKHFNVDOVRDSSHDUV
< 7KHUHWXUQFRGHIRU)%LV
ZKLFKPHDQVLWLVRND\ 11 12 13
< 7KHUHWXUQFRGHIRU)%LV
ZKLFKPHDQVWKHFKHFNKDVIDLOHG 10
 7KHWH[WVKRZVWKHREMHFWWKDWZDV 9
FKHFNHG
 7KHODVWLWHPRQWKHOLQHLVWKH
WUDQVDFWLRQFRGHWKDWZDVFKHFNHG

,IWKHUHWXUQFRGHLV
< (TXDOWRWKHDXWKRUL]DWLRQFKHFNLVRND\
< *UHDWHUWKDQWKHDXWKRUL]DWLRQFKHFNLVQRWRND\

Release 4.6A/B
12–11
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

5HGXFLQJWKH6FRSHRI$XWKRUL]DWLRQ&KHFNV
2YHUYLHZ
7KHEDVLVIRUDOOVZLWFKHVLVWKHDFWLYDWLRQRIWKH3*<RXFDQDOVRVZLWFKWKH5)&
6B7&2'(DQGJOREDOGHDFWLYDWLRQVZLWFKHV%DVHGRQWKHVH\RXFDQGHDFWLYDWH
DXWKRUL]DWLRQFKHFNVXVLQJ68,QVLGHWKHDFWLYLW\JURXSV\RXFDQLQDFWLYDWHDXWKRUL]DWLRQ
REMHFWVDQGVHWWKHDFWLYLW\JURXSDQGXVHUDVVLJQPHQWYDOLGLW\SHULRG

AG and AG-User
assignments

SU24 switches

RFC, S_TCODE and


global deactivation switches

Profile Generator
,QWKHIROORZLQJVHFWLRQVZHGHVFULEHWKHVLQJOHOD\HUVLQPRUHGHWDLOV

(QDEOLQJWKH3URILOH*HQHUDWRU
%HIRUHFRQWLQXLQJZLWKWKLVVHFWLRQ\RXQHHGWRKDYHDWOHDVWVHWDQGDFWLYDWHGWKHV\VWHP
SDUDPHWHUDXWKQRBFKHFNBLQBVRPHBFDVHV < GHIDXOWYDOXH DQGUXQ68ZKLFKFRSLHVWKH
6$3FKHFNLQGLFDWRUGHIDXOWVDQGILHOGYDOXHVIURPWDEOH862%7DQG862%;LQWRWKH
FXVWRPHUWDEOHV

(QDEOLQJ'LVDEOLQJ2WKHU6\VWHPZLGH&KHFNV
(QDEOLQJDXWKWFRGHVBQRWBFKHFNHG
5LVQRWIXOO\DWUDQVDFWLRQEDVHGDXWKRUL]DWLRQV\VWHP,WLVDOVRDQREMHFWRULHQWHG
DXWKRUL]DWLRQV\VWHP$EXVLQHVVSURFHVVLQ5FDQEHDFFHVVHGE\VHYHUDOPHFKDQLVPV IRU
H[DPSOHWUDQVDFWLRQFRGH%$3,HWF EXWWUDQVDFWLRQVDUHPRVWFRPPRQ5SURWHFWV
SDUWLFXODUREMHFWVRUSLHFHVRIWKHEXVLQHVVSURFHVVZLWKLQWKHWUDQVDFWLRQ5GHILQHVZKLFK
REMHFWVDUH´VHFXUDEOHµLQWKHVWDQGDUGV\VWHPDQGRQHEXVLQHVVSURFHVVRUWUDQVDFWLRQFRGH
PD\UHTXLUHDFFHVVWRDYDU\LQJQXPEHURISUHGHILQHGREMHFWV+RZHYHU5DOVRXVHVWKH
WUDQVDFWLRQFRGHDVWKH´ILUVWOLQHRIGHIHQVHµWRSUHYHQWVRPHRQHIURPDFFHVVLQJSDUWVRIWKH
V\VWHP,QWKHHYHQWWKDWDXVHUHQWHUVDWUDQVDFWLRQFRGHWRSHUIRUPDWDVNWKHV\VWHP
FKHFNVWKHXVHU·VDXWKRUL]DWLRQREMHFW6B7&2'(WRHQVXUHWKH\KDYHWKHFRUUHFW6B7&2'(
WUDQVDFWLRQFRGHEHIRUHFRQWLQXLQJ,QFHUWDLQFDVHV\RXPD\ZLVKWRHOLPLQDWHWKLV´ILUVW
OLQHRIGHIHQVHµLI\RXILQGLWFXPEHUVRPHWRSURWHFWHDFKDQGHYHU\WUDQVDFWLRQFRGHLQWKH

Authorizations Made Easy


12–12
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

V\VWHP$VVXFK\RXFDQGLVDEOHWKHFKHFNIRU6B7&2'(XVLQJWKHV\VWHPZLGHSURILOH
SDUDPHWHUDXWKWFRGHVBQRWBFKHFNHG,QWKHV\VWHP6B7&2'(LVDFWLYHE\GHIDXOW
(QDEOLQJDXWKUIFBDXWKRULW\BFKHFN
6$3KDVYDVWO\HQKDQFHGLWVXVHRIWKH5)& UHPRWHIXQFWLRQFDOO IXQFWLRQDOLW\LQUHFHQW
UHOHDVHVRIWKH56\VWHP5)&VDUHXVHGWKURXJKRXWWKHV\VWHPVRWKDWRQHSRUWLRQRIWKH
56\VWHPFDQ´FRPPXQLFDWHµZLWKDQRWKHUSDUWRI5 IRUH[DPSOHFUHDWLQJDVDOHV
RUGHUYLDZRUNIORZPD\LQYRNHDQ5)&WRFRPPXQLFDWHWKHLQIRUPDWLRQWKDWLVEHLQJ
SDVVHGLQWRWKHVDOHVRUGHUFUHDWHIXQFWLRQLQZRUNIORZSURFHVVLQJ 5)&·VDUHDOVRFULWLFDOLQ
SHUPLWWLQJV\VWHPVDQGDSSOLFDWLRQVH[WHUQDOWR5 IRUH[DPSOHDZHESDJH WR
FRPPXQLFDWHZLWK5ZLWK%$3,V$V%$3,VXWLOL]H5)&IXQFWLRQDOLW\DXWKRUL]DWLRQ
FKHFNVDUHSHUIRUPHGEDVHGRQWKH%$3,XVHG2QHRI5·VFRUHDSSURDFKHVWRVHFXULQJWKH
5)&IXQFWLRQDOLW\LVWRLQWURGXFHDQRWKHUQHZDXWKRUL]DWLRQREMHFWFDOOHG6B5)&ZKLFK
JLYHVSHRSOHDFFHVVWRSDUWLFXODUJURXSVRI5)&V,QSDUWLFXODUHYHU\5)&EHORQJVWRD
IXQFWLRQJURXS0DQ\5)&VFDQEHORQJWRRQHIXQFWLRQJURXS IRUH[DPSOHWKHIXQFWLRQ
JURXSIRU003XUFKDVH2UGHU3URFHVVLQJ 7KHDXWKRUL]DWLRQREMHFW6B5)&FDQEHUHVWULFWHG
WRJLYHXVHUVDFFHVVWRSDUWLFXODUIXQFWLRQJURXSV+RZHYHUWKHWUHPHQGRXVDPRXQWRI
5)&VLQFRPSOLFDWHVZKLFKIXQFWLRQJURXSV\RXVKRXOGJLYHSHRSOHDFFHVVWR7KHUHIRUH
5SURYLGHVDPHFKDQLVPWRGLVDEOHWKHFKHFNDJDLQVWWKH6B5)&DXWKRUL]DWLRQREMHFWDWD
V\VWHPZLGHOHYHO7KHV\VWHPZLGHSURILOHSDUDPHWHUDXWKUIFBDXWKRULW\BFKHFNFDQEH
FKDQJHGIURPLWVEODQNGHIDXOWWRRQHRIWKHIROORZLQJ
<  1RDXWKRUL]DWLRQFKHFN
<  $XWKRUL]DWLRQFKHFNDFWLYH QRFKHFNIRUVDPHXVHUQRFKHFNIRUVDPHXVHUFRQWH[W
DQG65)&)8*5
<  $XWKRUL]DWLRQFKHFNDFWLYH QRFKHFNIRU65)&)8*5
<  $XWKRUL]DWLRQFKHFNDFWLYH 65)&)8*5DOVRFKHFNHG

*OREDOO\'HDFWLYDWLQJRU$FWLYDWLQJ$XWKRUL]DWLRQ&KHFNV
<RXFDQDOVRJOREDOO\GHDFWLYDWHRUDFWLYDWHDXWKRUL]DWLRQFKHFNVZLWKWUDQVDFWLRQ
$87+B6:,7&+B2%-(&767KHV\VWHPGRHVQRWH[HFXWHDQ\DXWKRUL]DWLRQFKHFNVIRU
GHDFWLYDWHGDXWKRUL]DWLRQREMHFWV<RXKDYHVHYHUDORSWLRQVWRUHDFKWUDQVDFWLRQ
$87+B6:,7&+B2%-(&76<RXFDQXVHWKH,0* VHHVWHS WUDQVDFWLRQSU25 VHHVWHS
RUXVHWUDQVDFWLRQauth_switch_objectsGLUHFWO\

Release 4.6A/B
12–13
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 &KRRVH QH[WWR6ZLWFKRII
DXWKRUL]DWLRQFKHFNVJOREDOO\ RSWLRQDO
DQGFRQWLQXHZLWKVWHS RUHQWHU
su25DQGFRQWLQXHZLWKVWHS 

 ,QWUDQVDFWLRQ68FKRRVH
'HDFWLYDWHDXWKRUL]DWLRQREMHFW
JOREDOO\

Authorizations Made Easy


12–14
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 5HDGWKHLQIRUPDWLRQFDUHIXOO\DQG
FKRRVH 

 'HDFWLYDWHDQDXWKRUL]DWLRQREMHFW 5
E\GHVHOHFWLQJWKHFKHFNER[QH[WWR
LW7KHGHVHOHFWHGOLQHLVKLJKOLJKWHG 6 Tip Tip
LQUHG
 &KRRVH 
 7RDFWLYDWH\RXUGDWDFKRRVH 
 )RUDGHWDLOHGH[SODQDWLRQDERXWWKH
DXWKRUL]DWLRQREMHFWFKRRVH QH[W
WRWKHDXWKRUL]DWLRQREMHFW
4 7

&KRRVH WRVZLWFKWKHWHFKQLFDOQDPHVRQDQG WRVZLWFKWKHWHFKQLFDOQDPHVRII


7RYLHZWKHFRORUOHJHQGFKRRVH 

Release 4.6A/B
12–15
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 <RXUHFHLYHGHWDLOHGLQIRUPDWLRQ
9
DERXWWKHVHOHFWHGDXWKRUL]DWLRQ
REMHFW
 &ORVHWKHZLQGRZWRUHWXUQ
8

:KHQ\RXVDYHDQGDFWLYDWH\RXUGDWDWKHV\VWHPDOVRFKHFNVWKHDXWKRUL]DWLRQREMHFW
6B86(5B2%-
7KHYDOXHVIRUWKHV\VWHPSDUDPHWHUDXWKREMHFWBGLVDEOLQJBDFWLYHFDQEHDQ;RUEODQN7KH
;LQGLFDWHVWKDWWKHSDUDPHWHULVDFWLYHDQGWKHEODQNLQGLFDWHVWKDWLWLVQRW,ILWLVQRW
DFWLYHZLWK68JRWVZLWFKHGRII\RXUFKDQJHVZLOOQRWDIIHFWDQ\WKLQJ+RZHYHUWKH
GHIDXOWYDOXHLVVHWWRDFWLYH

Authorizations Made Easy


12–16
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 $XWKRUL]DWLRQREMHFWVEHJLQQLQJ
ZLWK6BRU3BFDQQRWEHVZLWFKHGRII
,I\RXWU\WRVZLWFKWKRVHREMHFWVRII
DQGVDYHWKHP\RXZLOOUHFHLYHD
ZDUQLQJPHVVDJH

10

 7KHV\VWHPLJQRUHVWKDW\RXKDYH
VZLWFKHGRIIWKRVHDXWKRUL]DWLRQ
REMHFWV 11
 &KRRVH 

12

<RXFDQQRWJOREDOO\GHDFWLYDWHDXWKRUL]DWLRQREMHFWVEHJLQQLQJZLWK6B %DVLV RU3B


+5 LQWUDQVDFWLRQ$87+B6:,7&+B2%-(&76

1RDXWKRUL]DWLRQGDWDLVLQVHUWHGLQWKH3*IRUGHDFWLYDWHGDXWKRUL]DWLRQREMHFWV,QD
UHOHDVHXSJUDGHWKHV\VWHPGRHVQRWGLVSOD\WKHWUDQVDFWLRQVZKHUHDXWKRUL]DWLRQGDWD
ZLOOEHUHSURFHVVHGLIWKHFRUUHVSRQGLQJDXWKRUL]DWLRQREMHFWLVJOREDOO\GHDFWLYDWHG
:KHQ\RXDFWLYDWHSUHYLRXVO\GHDFWLYDWHGDXWKRUL]DWLRQREMHFWV\RXPD\KDYHWR
PDLQWDLQWKHDXWKRUL]DWLRQGDWDIRUPDQ\DFWLYLW\JURXSV
,I\RXDFWLYDWHSUHYLRXVO\GHDFWLYDWHGDXWKRUL]DWLRQREMHFWVWKHVHREMHFWVDUHQRW
FRQWDLQHGLQDQ\DFWLYLW\JURXSV,QWKLVFDVHLQWKHWUDQVDFWLRQ3)&*RQWKH

Release 4.6A/B
12–17
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

$XWKRUL]DWLRQVWDEFKRRVH ([SHUWPRGHIRUSURILOHJHQHUDWLRQWRJHQHUDWHSURILOHVDQGWKH
RSWLRQ5HDGROGVWDWXVDQGPHUJHZLWKWKHQHZGDWD0DLQWDLQDQ\PLVVLQJDXWKRUL]DWLRQ
YDOXHVDQGUHJHQHUDWHWKHSURILOH

3DUDPHWHU7UDQVDFWLRQV
7KHSDUDPHWHUWUDQVDFWLRQVDUHDQH[FHSWLRQWRRWKHUWUDQVDFWLRQV7KHVHWUDQVDFWLRQVZRUN
ZLWKDSRZHUIXOFRUHWUDQVDFWLRQZKLFKLVUHVWULFWHGE\WKHIDFWWKDWWKHLQLWLDOVFUHHQRIWKH
FRUHWUDQVDFWLRQLVILOOHGDQGVNLSSHGLQWKHSDUDPHWHUWUDQVDFWLRQ
<RXFDQQRWH[FOXGHDXWKRUL]DWLRQREMHFWVIURPGLUHFWXVHLQSDUDPHWHUWUDQVDFWLRQVEXWRQO\
ZLWKWKHFRUUHVSRQGLQJFRUHWUDQVDFWLRQ

([DPSOH

3DUDPHWHUWUDQVDFWLRQ )9 0DQDJHPHQWRI'RFXPHQW$UFKLYHV


&RUHWUDQVDFWLRQ 6$5$ $UFKLYH0DQDJHPHQW
7RVHWWKHFKHFNLQGLFDWRURIWUDQVDFWLRQ)9WR1 QRFKHFN \RXQHHGWRFKDQJHWKHFKHFN
LQGLFDWRURIWKHFRUHWUDQVDFWLRQ6$5$<RXFDQILQGWKHQDPHRIWKLVWUDQVDFWLRQLQWKH
ULJKWKDQGFROXPQ7&RGHRYHUYLHZLQWUDQVDFWLRQ68,I\RXGRXEOHFOLFNRQWKH
SDUDPHWHUWUDQVDFWLRQFRGHLQILHOG7&RGHWKHV\VWHPEUDQFKHVGLUHFWO\LQWRWKHFKHFN
LQGLFDWRUPDLQWHQDQFHRIWKHFRUHWUDQVDFWLRQ
,IWKHDXWKRUL]DWLRQREMHFWIRUSDUDPHWHUWUDQVDFWLRQ)9LVVHWWR& FKHFN EXWXQGHUWKH
FRUHWUDQVDFWLRQLWLVVHWWR&0 FKHFNPDLQWDLQ WKHILHOGYDOXHVIRU6$5$ZLOOEH
VXJJHVWHGDVGHIDXOWVLQWKH3*,IWKHDXWKRUL]DWLRQREMHFWLVDOVRVHWWR&0LQ)9WKH
ILHOGYDOXHVPDLQWDLQHGIRU)9ZLOOEHUHFRPPHQGHGDVGHIDXOWVLQWKH3*DQGWKHHQWULHV
IRU6$5$ZLOOEHRYHUZULWWHQ<RXFDQPDLQWDLQRURYHUZULWHWKHILHOGYDOXHVRIWKHFRUH
WUDQVDFWLRQIRUSDUDPHWHUWUDQVDFWLRQVLQ68

'HDFWLYDWLQJ$XWKRUL]DWLRQ&KHFNV8VLQJ68

2SWLRQDO1RUPDOO\\RXGRQRWKDYHWRPDNHDQ\FKDQJHVLQWUDQVDFWLRQ68
+RZHYHULI\RXGRPDNHFKDQJHVLQ68WKHFKDQJHVPXVWEHPDGHLQWKH'(9V\VWHP
DQGWUDQVSRUWHGWRRWKHUV\VWHPV1HYHUPDNHFKDQJHVLQDQ\RWKHUV\VWHP

,QWKH3*\RXKDYHWKHRSWLRQWRGHDFWLYDWHDQGDFWLYDWHDXWKRUL]DWLRQFKHFNVDJDLQVW
GLIIHUHQWDXWKRUL]DWLRQREMHFWV
:KHQHYHU\RXSHUIRUP5WUDQVDFWLRQVPDQ\DXWKRUL]DWLRQREMHFWVDUHFKHFNHGWKDWDULVH
WKURXJKZRUNDUHDVFDOOHGLQWKHEDFNJURXQG)RUWKHDXWKRUL]DWLRQFKHFNVWREHVXFFHVVIXO
WKHXVHUPXVWKDYHWKHDSSURSULDWHDXWKRUL]DWLRQV)RUWKLVUHDVRQPRVWXVHUVUHFHLYHPRUH
DXWKRUL]DWLRQVWKDQQHFHVVDU\OHDGLQJWRDQLQFUHDVHGPDLQWHQDQFHORDG%XWWKHFRUH
WUDQVDFWLRQLVDOZD\VSURWHFWHGE\REMHFW6B7&2'(DQGDXWKRUL]DWLRQFKHFNVWKDWEHORQJWR

Authorizations Made Easy


12–18
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

SXUHEDFNJURXQGIXQFWLRQVDUHGHDFWLYDWHG 7KLVKDVQRWKLQJWRGRZLWKEDFNJURXQG
SURFHVVLQJ 
,Q5PDQ\DXWKRUL]DWLRQREMHFWVJRXQXVHGE\PRVWFXVWRPHUV<RXFDQGHDFWLYDWHWKH
DXWKRUL]DWLRQFKHFNDJDLQVWWKHREMHFWVXVLQJWUDQVDFWLRQ680DLQWDLQFKHFNLQGLFDWRUVIRU
WUDQVDFWLRQFRGHV7KLVGHDFWLYDWLRQUHVXOWVLQFOHDUDXWKRUL]DWLRQSURILOHVDQGEHWWHU
SHUIRUPDQFH
<RXFDQGHDFWLYDWHDXWKRUL]DWLRQFKHFNVIRUDQ\RIWKHIROORZLQJUHDVRQV
< 1RWDOODXWKRUL]DWLRQREMHFWVDUHXVHG IRULQVWDQFH)B/)$B%(.
< 0DQ\DXWKRUL]DWLRQILHOGVKDYHEHHQPDLQWDLQHGZLWKDQDVWHULVN
< $XWKRUL]DWLRQSURILOHVDUHWRRODUJH
< (DFKWUDQVDFWLRQLVFKHFNHGE\6B7&2'(
< 1HHGOHVVDXWKRUL]DWLRQFKHFNVUHGXFHWKHWUDQVDFWLRQSHUIRUPDQFH
7KHIROORZLQJH[DPSOHVLOOXVWUDWHZKHQWRXVH68
< ,IDZDUHKRXVHZRUNHUUHPRYHVJRRGVIURPWKHZDUHKRXVHDQGWKHUHPDLQLQJVWRFN
IDOOVVKRUWRIDFULWLFDOOLPLWWKHV\VWHPWULJJHUVHLWKHUDSXUFKDVLQJRUGHUDSURGXFWLRQ
RUGHURUERWK7KHVHRSHUDWLRQVDUHFDUULHGRXWEHFDXVHRIWKHV\VWHPVHWWLQJVDQG
WKHUHIRUHUHTXLUHQRIXUWKHUDFWLRQVE\ZDUHKRXVHZRUNHUV$FFRUGLQJO\WKHVHZRUNHUV
VKRXOGQRWKDYHDXWKRUL]DWLRQVIRUSXUFKDVHRUSURGXFWLRQRUGHUVVRWKHFKHFNDJDLQVW
WKLVREMHFWVKRXOGEHGHDFWLYDWHG
< $XWKRUL]DWLRQREMHFW)B/)$B%(. 9HQGRU$FFRXQWDXWKRUL]DWLRQ SURWHFWVWKHYHQGRU
PDVWHUUHFRUGVDWDFFRXQWOHYHO7KDWLVZLWKWKLVREMHFWLWLVSRVVLEOHWRGLYLGHWKH
YHQGRUVLQWRJURXSVDQGRQO\DVVLJQWKHDFFRXQWLQJFOHUNWKHPDLQWHQDQFHDXWKRUL]DWLRQ
IRUYHQGRUVIURPDFHUWDLQJURXS,I\RXGRQRWZDQWWRPDNHDQ\DXWKRUL]DWLRQVDWWKLV
OHYHODQGDOORZDOODFFRXQWLQJFOHUNVWRPDLQWDLQDOOYHQGRUVLWLVEHVWWRGHDFWLYDWHWKLV
REMHFW
2QO\LI\RXKDYHVHWWKHFKHFNLQGLFDWRUWR&0 &KHFN0DLQWDLQ ZLOOWKHDXWKRUL]DWLRQ
DQGSUHGHILQHGDXWKRUL]DWLRQILHOGYDOXHVEHGLVSOD\HGIRUFKDQJLQJ

5HGXFLQJWKH6FRSHRI$XWKRUL]DWLRQ&KHFNV
$XWKRUL]DWLRQFKHFNVDUHFDUULHGRXWZKHUHYHUWKH\DUHVSHFLILFDOO\ZULWWHQLQWRWKHVRXUFH
FRGHRIDWUDQVDFWLRQ+RZHYHUZLWKWUDQVDFWLRQ68\RXFDQVHWFKHFNLQGLFDWRUVWR
H[FOXGHFHUWDLQDXWKRUL]DWLRQREMHFWVIURPDXWKRUL]DWLRQFKHFNV<RXFDQH[FOXGHSDUWLFXODU
DXWKRUL]DWLRQFKHFNVHLWKHULQVSHFLILFWUDQVDFWLRQVRU56\VWHPZLGHZLWKRXWFKDQJLQJ
WKHSURJUDPFRGH
%HIRUHWKHDXWKRUL]DWLRQSURILOHLVDXWRPDWLFDOO\JHQHUDWHGXVHWKHFKHFNLQGLFDWRUVWR
FRQWUROZKLFKREMHFWVDSSHDULQWKH3*DQGZKLFKILHOGYDOXHVGLVSOD\

Release 4.6A/B
12–19
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

0DLQWDLQLQJ&KHFN,QGLFDWRUVIRU7UDQVDFWLRQ&RGHV
7RDFFHVVWKHWUDQVDFWLRQIRUPDLQWDLQLQJFKHFNLQGLFDWRUVHQWHUWUDQVDFWLRQSU24LQWKH&RPPDQGILHOGRU
QDYLJDWHXVLQJWKH,0*,QWKHIROORZLQJSURFHGXUHZHVKRZ\RXKRZWRJHWWR0DLQWDLQFKHFNLQGLFDWRU
WUDQVDFWLRQXVLQJWKH,0* WUDQVDFWLRQFRGHSPRO ,I\RXHQWHUSU24GLUHFWO\VWDUWZLWKVWHS
 ,QWKH,0*IROORZWKHPHQXSDWK
%DVLV&RPSRQHQWV→6\VWHP
$GPLQLVWUDWLRQ→8VHUVDQG
$XWKRUL]DWLRQV→0DLQWDLQ
$XWKRUL]DWLRQVDQG3URILOHV8VLQJWKH
3URILOH*HQHUDWRU→:RUNRQ6$3
&KHFN,QGLFDWRUVDQG)LHOG9DOXHVDQG
FKRRVH QH[WWRWKDWOLQH

 6HOHFW&KDQJHWHVWVWDWXV WKLV
WUDQVODWLRQLVLQFRUUHFWWKHWH[W 2
VKRXOGUHDG&KDQJHFKHFNLQGLFDWRU 
 &KRRVH &KRRVH

Authorizations Made Easy


12–20
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 6HOHFW0DLQWDLQFKHFNLQGLFDWRUVIRU
WUDQVDFWLRQFRGHV
 (QWHUHLWKHUDVLQJOHWUDQVDFWLRQFRGH
IRUH[DPSOHMK01 RUDUDQJHRI 6
FRGHVIRUZKLFK\RXZDQWWROLVWWKH 4
FKHFNLQGLFDWRUV 5
 &KRRVH WRH[HFXWH

 6HOHFWWKHDSSURSULDWHWUDQVDFWLRQ LQ
RXUH[DPSOHRQO\RQHLVVKRZQEXW
PRUHWKDQRQHFRXOGDSSHDU 
 &KRRVH &KHFNLQGLFDWRUWRGLVSOD\ 8
WKHFXUUHQWDFWLYHFKHFNLQGLFDWRUV
IRUDXWKRUL]DWLRQREMHFWVLQWKH
VHOHFWHGWUDQVDFWLRQV 7 Tip

,I\RXDUHGHDOLQJZLWKDSDUDPHWHU
WUDQVDFWLRQWKHFRUHWUDQVDFWLRQDSSHDUV
LQWKH7FRGH RULJLQDO FROXPQ)RUPRUH
LQIRUPDWLRQVHH3DUDPHWHU7UDQVDFWLRQV
RQSDJH²

Release 4.6A/B
12–21
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

$OLVWRIDXWKRUL]DWLRQREMHFWV
DSSHDUVLQWKH2EMHFWFROXPQIRUWKH
VHOHFWHGWUDQVDFWLRQLQYROYHGZLWK
WKHFKHFN 9
 &KRRVH )LHOGYDOXHV
1RWH7KHUHDUHWKUHHREMHFWVWKDW
KDYHWKHFKHFNLQGLFDWRUVHWWR&0

7KHWDEOHGLVSOD\HGRQWKHULJKWLV
WDEOH862%;B&

([SODQDWLRQRI&KHFN,QGLFDWRUV
&0 &KHFN0DLQWDLQ
< $QDXWKRUL]DWLRQFKHFNLVFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*FUHDWHVDQDXWKRUL]DWLRQIRUWKLVREMHFWDQGILHOGYDOXHVDUHGLVSOD\HGIRU
FKDQJLQJ
< 'HIDXOWYDOXHVIRUWKLVDXWKRUL]DWLRQFDQEHPDLQWDLQHG
& &KHFN
< $QDXWKRUL]DWLRQFKHFNLVFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWVRILHOGYDOXHVDUHQRW
GLVSOD\HG
< 1RGHIDXOWYDOXHVFDQEHPDLQWDLQHGIRUWKLVDXWKRUL]DWLRQ
1 1RFKHFN
< 7KHDXWKRUL]DWLRQFKHFNDJDLQVWWKLVREMHFWLVGLVDEOHG
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWVRILHOGYDOXHVDUHQRW
GLVSOD\HG
< 1RGHIDXOWYDOXHVFDQEHPDLQWDLQHGIRUWKLVDXWKRUL]DWLRQ
8 8QPDLQWDLQHG
< 1RFKHFNLQGLFDWRULVVHW
< $QDXWKRUL]DWLRQFKHFNLVDOZD\VFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWWKHUHIRUHILHOGYDOXHVDUHQRW
GLVSOD\HG

Authorizations Made Easy


12–22
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

7KHFKHFNLQGLFDWRURIDQDXWKRUL]DWLRQREMHFWLVLPSRUWDQWIRUWKH3*7KH3*RQO\
FUHDWHVDQDXWKRUL]DWLRQIRUDQDXWKRUL]DWLRQREMHFWLIWKHFKHFNLQGLFDWRULVVHWWR
&KHFN0DLQWDLQ &0 3UHGHILQHGYDOXHVIRUWKLVDXWKRUL]DWLRQDUHDOUHDG\PDLQWDLQHGLQ
WKHDXWKRUL]DWLRQRYHUYLHZ<RXFDQRQO\SUHGHILQHDXWKRUL]DWLRQYDOXHVIRUDQREMHFWLI
WKHFKHFNLQGLFDWRULVVHWWR&KHFN0DLQWDLQ &0 

 7KUHHREMHFWVJHWGLVSOD\HGZLWK
SUHGHILQHGYDOXHVVLQFHRQO\WKUHH
REMHFWVKDGWKHFKHFNLQGLFDWRUVHWWR
&KHFN0DLQWDLQ 11
 7RFKDQJHDFKHFNLQGLFDWRUFKRRVH 10
WRWRJJOHEHWZHHQGLVSOD\DQG
FKDQJHPRGH

7KHWDEOHGLVSOD\HGRQWKHULJKWLV
WDEOH8627B&
 (QWHUDWUDQVSRUWDEOHFKDQJHUHTXHVW
QXPEHURUXVH WRFUHDWHDQHZ
RQH
12
 &KRRVH 

13

 7RFKDQJHWKHDXWKRUL]DWLRQILHOG
YDOXHVIRURQHRIWKHREMHFWVFKRRVH
QH[WWRWKHREMHFW·VILHOGQDPH IRU
H[DPSOHWKHREMHFW)B/)$B$33
DQGWKHILHOG$33.= 

14

Release 4.6A/B
12–23
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 6HOHFWWKHGHVLUHGYDOXH IRU


H[DPSOHZHDGGHG))LQDQFLDO
$FFRXQWLQJ 
 &KRRVH 
15

16

 7KHYDOXHZDVDGGHG
 &KRRVH 6$3GHIDXOWVWRFRPSDUH
DQ\FKDQJHV\RXPLJKWKDYHPDGH Tip
18

17

7RGLVSOD\WKHORQJWH[WIRUWKH
DXWKRUL]DWLRQREMHFWFKRRVH
2EMHFWGHVFU
 ,QWKH9DOXH LQWHUYDO FROXPQ 21 22
UHYLHZ\RXUFKDQJHV WKLVLVWDEOH
862%7B&ZKLFKUHSUHVHQWV
FXVWRPHUVHWWLQJV  22

 ,QWKH6$3YDOXH LQWHUYDO FROXPQ 19 20


QRWLFHWKHRULJLQDOO\GHOLYHUHG6$3
GHIDXOWYDOXHV WKLVLVWDEOH862%7 Tip
ZKLFKUHSUHVHQWV6$3GHIDXOWV 
9DOXHVWKDWKDYHFKDQJHGIURPWKH
6$3GHIDXOWVDUHLQFRORU
 7RVDYH\RXUFKDQJHVFKRRVH 
 &KRRVH RU 6$3GHIDXOWVWRKLGH
WKH6$3GHIDXOWYDOXHV

7RVNLS\RXUFKDQJHVFKRRVH IRUWKHDSSURSULDWHYDOXH\RXFKDQJHG

Authorizations Made Easy


12–24
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 &KRRVH WRVZLWFKWRFKDQJHPRGH


IRUWKHFKHFNLQGLFDWRUV
 7RFKDQJHDFKHFNLQGLFDWRUIRUDQ 23
REMHFWFOLFNLQWKHDSSURSLDWH
FROXPQ 81&&0 
1RWLFHKRZWKHFXUVRUFKDQJHVWRDQ
LFRQL]HGKDQGDV\RXPRYHRYHUWKH
FKHFNLQGLFDWRUV 24

,QWKLVH[DPSOHZHFOLFNHGLQWKH1
FROXPQWRVHWWKHFKHFNLQGLFDWRUIRU
REMHFW)B/)$B%(.WR1RFKHFN
26
 7KHFKHFNLQGLFDWRUKDVVXFFHVVIXOO\
EHHQFKDQJHGWR17KHUHIRUH
)B/)$B%(.ZLOOQRORQJHUEH
FKHFNHGLQWUDQVDFWLRQ0.
25
 6HOHFWDQREMHFWDQGFKRRVH
$XWKREMWRYLHZDZKHUHXVHG
OLVW

 <RXKDYHWRGHWHUPLQHDVSHFLILF 27
WUDQVDFWLRQFRGHUDQJH7RVHDUFK
WKURXJKDOOH[LVWLQJWUDQVDFWLRQ
28
FRGHVHQWHUDQDVWHULVN 
 &KRRVH 

Release 4.6A/B
12–25
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 7KHJHQHUDWHGOLVWVKRZVDOO 30
WUDQVDFWLRQVZKHUHWKHVHOHFWHG
DXWKRUL]DWLRQREMHFWLVXVHG
 &KRRVH 
29

 &KRRVH6$3GHIDXOWVWRGLVSOD\WKH
6$3FKHFNLQGLFDWRUGHIDXOWVLQWKH
VDPHOLVW
31

Authorizations Made Easy


12–26
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

%RWKWDEOHHQWULHVLQWDEOHV862%; 36 37
DQG862%;B&QRZDSSHDUIRUWKH
VHOHFWHGWUDQVDFWLRQ LQWKLVH[DPSOH
0.  35
 ,QWKH&KHFN,'FROXPQUHYLHZWKH 32 33
FXUUHQWDFWLYHFKHFNLQGLFDWRUVIRU
WKLVWUDQVDFWLRQ HQWULHVLQWDEOH
862%;B& 
34
 ,QWKH6$3GHIDXOWVFROXPQUHYLHZ
WKH6$3FKHFNLQGLFDWRUVGHIDXOW
YDOXHV HQWULHVLQWDEOH862%; 
 7RVNLS\RXUFKDQJHVFKRRVH WR
UHVHWWRWKH6$3FKHFNLQGLFDWRU
GHIDXOWYDOXHIRUWKLVDXWKRUL]DWLRQ
REMHFW6HWWLQJVWKDWGLIIHUIURP6$3
GHIDXOWVDSSHDULQFRORU
 &KRRVH $XWKREMWRDGGDQHZ
REMHFWIRUFKHFNLQJ7KHUHPXVWDOVR
EHDQ$87+25,7<B&+(&.FDOOLQ
WKLVSURJUDPIRUWKHQHZREMHFW
 &KRRVH 
 &KRRVH 

([FHSWLRQV
$XWKRUL]DWLRQREMHFWVIURPWKH%DVLV 6 DQG+XPDQ5HVRXUFHV0DQDJHPHQW
DSSOLFDWLRQV 3B 3/2* FDQQRWEHH[FOXGHGIURPFKHFNLQJEHFDXVHWKHILHOGYDOXHVIRU
WKHVHREMHFWVPXVWDOZD\VJHWFKHFNHG7UDQVDFWLRQVZKRVHFKHFNLQGLFDWRUFDQQRWEH
FKDQJHGEHFDXVHRIDORFDOORFN (148(8( RUDORFNLQWKHFRUUHFWLRQDQGWUDQVSRUW
V\VWHP IRUREMHFWFDWDORJHQWU\575686.7FRGH! DUHDOVRVKRZQLQFRORU$VKRUW
HUURUPHVVDJHDSSHDUVLQWKHGHVFULSWLRQILHOG

,PSRUWDQW,QIRUPDWLRQ&RQFHUQLQJ3URILOH0DWFKXS$IWHU&KDQJHVLQ68

,I\RXJHQHUDWHGDXWKRUL]DWLRQSURILOHVZLWKWKH3*DIWHUPDNLQJFKDQJHVWRFKHFN
LQGLFDWRUVLQWUDQVDFWLRQVDSURILOHPDWFKXSLVUHTXLUHG HYHQLIWKH3*GRHVQRWLQGLFDWH
WKLVQHHGIRUWKHDSSURSULDWHDXWKRUL]DWLRQSURILOHV 
 $IWHUPDNLQJFKDQJHVWRFKHFNLQGLFDWRUVZLWK68UHPHPEHUWKHWUDQVDFWLRQVWKDW
DUHDIIHFWHGE\WKHFKDQJH
 )LQGRXWLQZKLFKDFWLYLW\JURXSVWKHVHWUDQVDFWLRQVKDYHEHHQVHOHFWHG7RKHOS
LGHQWLI\WKHDSSURSULDWHDFWLYLW\JURXSVFKRRVH7RROV→$GPLQLVWUDWLRQ→8VHU
PDLQWHQDQFH→,QIRUPDWLRQ6\VWHP→$FWLYLW\*URXSV→/LVWRI$FWLYLW\*URXSV$FFRUGLQJ
WR&RPSOH[6HOHFWLRQ&ULWHULD

Release 4.6A/B
12–27
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 ,QWUDQVDFWLRQ3)&*VHOHFWWKHDFWLYLW\JURXSWREHUHJHQHUDWHG<RXFDQQRWVHOHFW
PRUHWKDQRQHDFWLYLW\JURXSDWDWLPH:KHQPDLQWDLQLQJWKHDXWKRUL]DWLRQGDWDEH
VXUHWRVHOHFW ([SHUWPRGHIRUSURILOHJHQHUDWLRQDQGWKHQ5HDGROGVWDWXVDQGPHUJH
ZLWKQHZGDWD
 5HJHQHUDWHWKHSURILOH
 1RXVHUPDVWHUFRPSDULVRQLVUHTXLUHG5HPHPEHUFKDQJHVEHFRPHDFWLYHZLWKWKH
QH[WV\VWHPORJRQ

0DVV&KDQJHRI&KHFN,QGLFDWRUV
<RXFDQDOVRJOREDOO\FKDQJHDXWKRUL]DWLRQFKHFNVIRUDQDXWKRUL]DWLRQREMHFWLQWUDQVDFWLRQV
ZKHUHWKHDXWKRUL]DWLRQREMHFWRFFXUV<RXFDQDOVRVSHFLILFDOO\H[FOXGHLQGLYLGXDO
WUDQVDFWLRQVIURPWKHJOREDOFKDQJH
7RDFFHVVWKHWUDQVDFWLRQWR(GLWFKHFNLQGLFDWRUVLQDOOWUDQVDFWLRQVHQWHUWKHWUDQVDFWLRQSU24
LQWKH&RPPDQGILHOGRUQDYLJDWHXVLQJWKH,0*DVGHVFULEHGLQWKHVHFWLRQEHIRUH,QWKH
IROORZLQJSURFHGXUHZHVKRZKRZWRJHWWR(GLWFKHFNLQGLFDWRUVLQDOOWUDQVDFWLRQVE\
HQWHULQJSU24GLUHFWO\
 ,QWKH&RPPDQGILHOGHQWHU
WUDQVDFWLRQSU24DQGFKRRVH(QWHU
 6HOHFW(GLWFKHFNLQGLFDWRUVLQDOO
WUDQVDFWLRQV 4

 (QWHUWKHGHVLUHG$XWKRUL]DWLRQREMHFW
IRUH[DPSOH)B/)$B%(.
 &KRRVH 
2
$OLVWRIWUDQVDFWLRQVLVGLVSOD\HGRQ
WKHQH[WVFUHHQ7KHHQWHUHG 3
DXWKRUL]DWLRQREMHFWDSSHDUVZLWK
WKHDSSURSULDWHFKHFNLQGLFDWRUSHU
WUDQVDFWLRQ

Authorizations Made Easy


12–28
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 7RDOWHUWKHFKHFNLQGLFDWRUHLWKHUIRU
VHOHFWHGWUDQVDFWLRQVRUJOREDOO\
FKRRVHRQHRIWKHIROORZLQJRSWLRQV
D 6HOHFWWKHWUDQVDFWLRQVIRUZKLFK
5b
\RXZLVKWRFKDQJHWKHFKHFN
LQGLFDWRU
6
E &KRRVH WRVHOHFWDOO
WUDQVDFWLRQVILUVWDQGWKHQ
GHVHOHFWLQGLYLGXDOWUDQVDFWLRQVDV
QHFHVVDU\
7RHQVXUHWKDWWKH3*DFWXDOO\
FUHDWHVDQDXWKRUL]DWLRQZHQHHGWR
FKDQJHWKHFKHFNLQGLFDWRUIRUWKH
DSSURSULDWHDXWKRUL]DWLRQREMHFW 5a
IURP& &KHFN WR&0
&KHFN0DLQWDLQ 
 7RVLPXOWDQHRXVO\FKDQJHWKHFKHFN
LQGLFDWRUVIRUWKHVHOHFWHG
WUDQVDFWLRQVFKDQJHWKHFKHFN
LQGLFDWRULQWKHILUVWOLQHZKLFK
FRQWDLQVWKHQDPHRIWKH
DXWKRUL]DWLRQREMHFWE\FOLFNLQJLQ
WKHFROXPQIRUWKHQHZFKHFN
LQGLFDWRUEHORZ 81&&0 :H
FKRVH&0

7RFKHFNWKHWUDQVDFWLRQH[HFXWHGE\WKHWUDQVDFWLRQFRGHGLVSOD\HGLQFROXPQ7FRGH\RX
FDQFKRRVH QH[WWRWKHWUDQVDFWLRQDQGLWZLOOEHH[HFXWHG

([SODQDWLRQRI&KHFN,QGLFDWRUV

&0 &KHFN0DLQWDLQ
< $QDXWKRUL]DWLRQFKHFNLVFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*FUHDWHVDQDXWKRUL]DWLRQIRUWKLVREMHFWDQGILHOGYDOXHVDUHGLVSOD\HGIRU
FKDQJLQJ
< 'HIDXOWYDOXHVIRUWKLVDXWKRUL]DWLRQFDQEHPDLQWDLQHG
& &KHFN
< $QDXWKRUL]DWLRQFKHFNLVFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWVRILHOGYDOXHVDUHQRW
GLVSOD\HG
< 1RGHIDXOWYDOXHVFDQEHPDLQWDLQHGIRUWKLVDXWKRUL]DWLRQ

Release 4.6A/B
12–29
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

1 1RFKHFN
< 7KHDXWKRUL]DWLRQFKHFNDJDLQVWWKLVREMHFWLVGLVDEOHG
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWVRILHOGYDOXHVDUHQRW
GLVSOD\HG
< 1RGHIDXOWYDOXHVFDQEHPDLQWDLQHGIRUWKLVDXWKRUL]DWLRQ
8 8QPDLQWDLQHG
< 1RFKHFNLQGLFDWRULVVHW
< $QDXWKRUL]DWLRQFKHFNLVDOZD\VFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWWKHUHIRUHILHOGYDOXHVDUHQRW
GLVSOD\HG

7KHFKHFNLQGLFDWRURIDQDXWKRUL]DWLRQREMHFWLVLPSRUWDQWIRUWKH3*7KH3*RQO\
FUHDWHVDQDXWKRUL]DWLRQIRUDQDXWKRUL]DWLRQREMHFWLIWKHFKHFNLQGLFDWRULVVHWWR
&KHFN0DLQWDLQ &0 3UHGHILQHGYDOXHVIRUWKLVDXWKRUL]DWLRQDUHDOUHDG\PDLQWDLQHGLQ
WKHDXWKRUL]DWLRQRYHUYLHZ<RXFDQRQO\SUHGHILQHDXWKRUL]DWLRQYDOXHVIRUDQREMHFWLI
WKHFKHFNLQGLFDWRULVVHWWR&KHFN0DLQWDLQ &0 

 2QO\WKHFKHFNLQGLFDWRUIRUWKH
WUDQVDFWLRQV\RXVHOHFWHGKDYH
FKDQJHG
 2QFHDFKHFNLQGLFDWRULQWKHOLVWLV 8 9
VHWWR&0 &KHFN0DLQWDLQ WKH
)OGYDOXHVEXWWRQDSSHDUV%\
FOLFNLQJWKLVEXWWRQ\RXFDQ
PDLQWDLQWKHDXWKRUL]DWLRQILHOG
YDOXHVRIWKHVHOHFWHGDXWKRUL]DWLRQ
REMHFWIRUDOOWUDQVDFWLRQVZKRVH
FKHFNLQGLFDWRUKDVEHHQVHW
 &KRRVH 6$3GHIDXOWVWRFRPSDUH
WKHFXUUHQWVHWWLQJVZLWKWKH6$3
GHIDXOWV
7

Authorizations Made Easy


12–30
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

 7KHFKDQJHVRIWKHFKHFNLQGLFDWRU
DUHVKRZQLQUHG
7RKLJKOLJKWDOOWUDQVDFWLRQFRGHV Tip
13
WKDWKDYHFKDQJHGFKRRVH(GLW→
&KDQJHV→'LVSOD\LQFRORU
 ,QWKH&KHFN,'FROXPQQRWLFHWKH
FKDQJHV\RXPDGH HQWULHVLQWDEOH 11 12
862%;B& 
 ,QWKH6$3GHIDXOWVFROXPQQRWLFH
WKH6$3FKHFNLQGLFDWRUGHIDXOW
YDOXHV HQWULHVLQ862%; 

10

&KRRVH 6$3GHIDXOWLI\RXZDQWWR
UHVWRUHWKHVHOHFWHGWUDQVDFWLRQVWRWKHLU
RULJLQDOGHOLYHU\VWDWXVVHWE\6$3
'XULQJLQVWDOODWLRQWKLVVWHSUHVWRUHVWKH
FKHFNLQGLFDWRUVDQGILHOGYDOXHVWRWKH
VHWWLQJLQWKH56\VWHP
 &KRRVH &KHFN,'
 &KRRVH<HV

14

([FHSWLRQV
$XWKRUL]DWLRQREMHFWVIURPWKH%DVLV 6 DQG+XPDQ5HVRXUFHV0DQDJHPHQW
DSSOLFDWLRQV 3B 3/2* FDQQRWEHH[FOXGHGIURPFKHFNLQJEHFDXVHWKHILHOGYDOXHVIRU
WKHVHREMHFWVPXVWDOZD\VJHWFKHFNHG

Release 4.6A/B
12–31
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks

,PSRUWDQW,QIRUPDWLRQ&RQFHUQLQJ3URILOH0DWFKXS$IWHU&KDQJHVLQ68
,I\RXJHQHUDWHGDXWKRUL]DWLRQSURILOHVZLWKWKH3*DIWHUPDNLQJFKDQJHVWRFKHFN
LQGLFDWRUVLQWUDQVDFWLRQVDSURILOHPDWFKXSLVUHTXLUHG HYHQLIWKH3*GRHVQRWLQGLFDWH
WKLVQHHGIRUWKHDSSURSULDWHDXWKRUL]DWLRQSURILOHV 
 $IWHUPDNLQJFKDQJHVWRFKHFNLQGLFDWRUVZLWK68UHPHPEHUWKHWUDQVDFWLRQVWKDW
DUHDIIHFWHGE\WKHFKDQJH
 )LQGRXWLQZKLFKDFWLYLW\JURXSVWKHVHWUDQVDFWLRQVKDYHEHHQVHOHFWHG7RKHOS
LGHQWLI\WKHDSSURSULDWHDFWLYLW\JURXSVFKRRVH7RROV→$GPLQLVWUDWLRQ→8VHU
PDLQWHQDQFH→,QIRUPDWLRQ6\VWHP→$FWLYLW\*URXSV→/LVWRI$FWLYLW\*URXSV$FFRUGLQJ
WR&RPSOH[6HOHFWLRQ&ULWHULD
 ,QWUDQVDFWLRQ3)&*VHOHFWWKHDFWLYLW\JURXSWREHUHJHQHUDWHG<RXFDQQRWVHOHFW
PRUHWKDQRQHDFWLYLW\JURXSDWDWLPH:KHQPDLQWDLQLQJWKHDXWKRUL]DWLRQGDWDEH
VXUHWRVHOHFW ([SHUWPRGHIRUSURILOHJHQHUDWLRQDQGWKHQ5HDGROGVWDWXVDQGPHUJH
ZLWKQHZGDWD
 5HJHQHUDWHWKHSURILOH
 1RXVHUPDVWHUFRPSDULVRQLVUHTXLUHG5HPHPEHUWKDWFKDQJHVEHFRPHDFWLYHZLWK
WKHQH[WV\VWHPORJRQ

0DLQWDLQLQJ$XWKRUL]DWLRQVLQWKH$FWLYLW\*URXSV
3OHDVHVHHFKDSWHU$GYDQFHG3URILOH*HQHUDWRU)XQFWLRQDOLW\VLQFHZHGHVFULEHGWKLVWRSLF
WKHUHLQGHWDLO

Authorizations Made Easy


12–32
&KDSWHU 6$36HFXULW\$XGLWDQG

/RJJLQJ

&RQWHQWV

Overview ................................................................................................................13–2
Audit Tools (SM20, SM19, SECR) ........................................................................13–2
Audit Tasks (SM21, STAT, ST03).......................................................................13–19
Logging Changes to User Master Records, Profiles, and Authorizations ....13–29

13–1
Chapter 13: SAP Security Audit and Logging
Overview

2YHUYLHZ

7KHSXUSRVHRIWKLVFKDSWHULVWRPDNH\RXDZDUHRI\RXUUHVSRQVLELOLWLHVDVWKH56\VWHP
DGPLQLVWUDWRU V IRUVHFXULW\ZKLFKLQFOXGHV
< 3URWHFWLQJWKH56\VWHP
< 3UHSDULQJ\RXIRUDFRPSXWHUVHFXULW\DXGLW
*HQHUDOO\WKHV\VWHPDGPLQLVWUDWRULVUHVSRQVLEOHIRUUHVSRQGLQJWRWKHILQGLQJVRIDQ5
6\VWHPDXGLW
,QWKLVFKDSWHU\RXOHDUQKRZWRDQDO\]HDXWKRUL]DWLRQORJJLQJIURPDVHFXULW\SHUVSHFWLYH
<RXOHDUQKRZWRSUHSDUHIRUDW\SLFDOV\VWHPDXGLW
5HIHUWR6\VWHP$GPLQLVWUDWLRQ0DGH(DV\5HOHDVH$%FKDSWHUWKHVHFWLRQ
6HFXULW\$GPLQLVWUDWLRQZKLFKVHUYHGDVWKHEDVLVIRUWKLVFKDSWHU

7KLVFKDSWHULVRQO\LQWHQGHGWRVHUYHDVDQLQWURGXFWLRQWRFRPSXWHUVHFXULW\
&RQVLGHULQJWKHJURZLQJLPSRUWDQFHRIVHFXULW\ZHDGYLVH\RXWRZRUNZLWK\RXU
DXGLWRUVILQDQFHGHSDUWPHQWOHJDOGHSDUWPHQWDQGRWKHUVZKRPLJKWEHDIIHFWHGE\
V\VWHPVHFXULW\

$XGLW7RROV 60606(&5

6HFXULW\$XGLW/RJ 60
:KDW

7KH6HFXULW\$XGLW/RJUHFRUGVWKHVHFXULW\UHODWHGDFWLYLWLHVRIXVHUVLQWKHV\VWHP7KHVH
DFWLYLWLHVLQFOXGHVXFFHVVIXODQGIDLOHG
< 'LDORJORJRQDWWHPSWV
< 5HSRUWDQGWUDQVDFWLRQVWDUWV
< 5)&&3,&ORJRQV
2WKHUHYHQWVZULWWHQWRWKHORJDUH
< /RFNHGWUDQVDFWLRQVRUXVHUV
< &KDQJHGRUGHOHWHG
Π$XWKRUL]DWLRQV
Π$XWKRUL]DWLRQSURILOHV
Π8VHUPDVWHUUHFRUGV
< &KDQJHVWRWKHDXGLWFRQILJXUDWLRQ

Authorizations Made Easy


13–2
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

7KHORJLVFUHDWHGHDFKGD\DQGSUHYLRXVORJVDUHQRWGHOHWHGRURYHUZULWWHQ7KHORJILOHV
FDQEHFRPHQXPHURXVDQGODUJHVRZHUHFRPPHQGWKDWWKHORJVEHSHULRGLFDOO\DUFKLYHG
EHIRUHEHLQJPDQXDOO\SXUJHG

1RWH7KHORJILOHVDUHRSHUDWLQJV\VWHPORJILOHV7UDQVDFWLRQ60 6HFXULW\$XGLW
'HOHWH2OG$XGLW/RJV LVRQHPHFKDQLVPWRSXUJHWKHVHILOHV2WKHURSHUDWLQJV\VWHP
DUFKLYLQJWHFKQLTXHVPD\DOVREHXVHG

$QDXGLWDQDO\VLVUHSRUWFDQEHJHQHUDWHGIURPWKHDXGLWORJV<RXFDQDQDO\]HDORFDO
VHUYHUDUHPRWHVHUYHURUDOOWKHVHUYHUVLQDQ56\VWHP

:K\

7KHLQIRUPDWLRQLQWKHVHFXULW\DXGLWILOHVFDQEHPDQLSXODWHGWRWDLORUWKHDXGLWDQDO\VLV
UHSRUWEDVHGRQFHUWDLQFULWHULD7KHUHSRUWDVVLVWVWKHDGPLQLVWUDWRUWR
< 5HFRQVWUXFWRUDQDO\]HLQFLGHQWV
< ,PSURYHVHFXULW\E\UHFRJQL]LQJLQDGHTXDWHPHDVXUHV
< 7UDFHXQXVXDOXVHUDFWLYLWLHV
< 8QGHUVWDQGWKHLPSDFWRIFKDQJHVWRWUDQVDFWLRQVRUXVHUV

+RZ

7RVWDUWDVHFXULW\DXGLW\RXFDQGRRQHRIWKHIROORZLQJ
< 6HWWKHSURILOHSDUDPHWHUUVDXHQDEOHWR
< '\QDPLFDOO\VWDUWLWXVLQJWUDQVDFWLRQ60 6HHWKHVHFWLRQ6HWWLQJ6HFXULW\$XGLW/RJ
3DUDPHWHUVRQSDJH² 
7KHQXPEHURIDXGLWORJVFUHDWHGE\WKHV\VWHPGHSHQGVRQWKHIROORZLQJ
< <RXPD\FKRRVHWRVHWWKHPD[LPXPVSDFHIRUWKHVHFXULW\DXGLWILOHLQSDUDPHWHU
UVDXPD[BGLVNVSDFHORFDO
$WWKLVSRLQWZKHQWKHOLPLWKDVEHHQUHDFKHGORJJLQJZLOOHQG
< <RXFDQGHILQHWKHVL]HRIDQLQGLYLGXDOVHFXULW\ORJILOHWRILWWKHFKRVHQDUFKLYLQJ
PHGLD
7KLVGHILQLWLRQPHDQVWKDWWKHV\VWHPSURGXFHVVHYHUDOORJILOHVHDFKGD\DQGWKHVHILOHV
FDQEHIRUH[DPSOHDUFKLYHGSHULRGLFDOO\RQWR&'V7KHSURILOHSDUDPHWHULV
UVDXPD[BGLVNVSDFHSHUBILOHDQGWKHPD[LPXPVL]HSHUILOHLV*%

<RXFDQQRWVHWERWKSDUDPHWHUV<RXKDYHWRFKRRVHWKHPHWKRGE\ZKLFKWKHDXGLWILOHV
DUHFUHDWHG

Release 4.6A/B
13–3
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

5XQQLQJWKH$XGLW/RJ
7KLVSURFHGXUHDVVXPHVWKDWWKHDXGLWKDVEHHQUXQQLQJIRUVRPHWLPHDQGWKDWDXGLWORJVKDYHEHHQ
FUHDWHG
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSM20DQGFKRRVH(QWHU RUIURPWKH6$3VWDQGDUGPHQXFKRRVH
7RROV→$GPLQLVWUDWLRQ→0RQLWRU→6HFXULW\$XGLWORJ→60$QDO\VLV 
 2QWKH6\VWHP$XGLW/RJVFUHHQFRPSOHWHWKH
VWHSVEHORZ
D ,Q)URPGDWHWLPHHQWHUIRUH[DPSOH13:00 3
E 8QGHU$XGLWFODVVHVVHOHFW
Π'LDORJORJRQ
2a
Π7UDQVDFWLRQVWDUW
Π5HSRUWVWDUW
2b
 &KRRVH5HUHDGDXGLWORJ
7KLVEXWWRQLVXVHGWRUHDGDORJIRUWKHILUVW
WLPH

7KHVHFXULW\UHSRUWLVGLVSOD\HG
 7RUHYLHZWKHGHWDLOVRIDQDXGLWPHVVDJHVHOHFW 4
DOLQHDQGFKRRVH 

Authorizations Made Easy


13–4
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

'RFXPHQWDWLRQIRUWKHPHVVDJHDQG
WHFKQLFDOGHWDLOVDSSHDUV7KLVGLVSOD\LV
PRVWXVHIXOZKHQGLVSOD\LQJQHJDWLYH
PHVVDJHVVXFKDVIDLOHGORJLQVRUORFNHG
WUDQVDFWLRQV

6HWWLQJ6HFXULW\$XGLW/RJ3DUDPHWHUV 60
:KDW

7KHDXGLWORJSDUDPHWHUVDUHWKHFULWHULDXVHGWRZULWHWKHW\SHVRIDXGLWPHVVDJHVLQWRWKH
DXGLWORJILOH7KHSDUDPHWHUVDUHJURXSHGLQWRDXGLWSURILOHVWKDWFDQEHDFWLYDWHGDWWKH
QH[WV\VWHPVWDUWXS FRQILJXUDWLRQVWDWXV RUDSSOLHG´RQWKHIO\µ G\QDPLFFRQILJXUDWLRQ 

:K\

$XGLWSURILOHVQHHGWREHFUHDWHGILUVWEHIRUHDXGLWORJVFDQEHZULWWHQ7KHVHSURILOHVOLPLW
WKHDPRXQWDQGW\SHRIGDWDZULWWHQLQWRWKHVHFXULW\DXGLWILOHVPDNLQJWKHVXEVHTXHQW
VHFXULW\UHSRUWVPRUHPHDQLQJIXOWRWKHDGPLQLVWUDWRU

+RZ

'HFLGHZKDWWRDXGLWDQGVHWVHOHFWLRQFULWHULDHLWKHUDWWKHGDWDEDVHOHYHORUG\QDPLFDOO\DW
WKHDSSOLFDWLRQVHUYHUOHYHO
< ,IWKHDXGLWFRQILJXUDWLRQLVSHUPDQHQWO\VWRUHGDWWKHGDWDEDVHOHYHODOODSSOLFDWLRQ
VHUYHUVXVHWKHLGHQWLFDOFULWHULDWRVDYHHYHQWVLQWKHDXGLWORJ7KHVHWWLQJVWDNHHIIHFWDW
WKHQH[WDSSOLFDWLRQVHUYHUVWDUW
< $WWKHDSSOLFDWLRQVHUYHUOHYHOKRZHYHUG\QDPLFFKDQJHVFDQEHVHWWRLQGLYLGXDO
DSSOLFDWLRQVHUYHUVDQGGLVWULEXWHGWRWKHHQWLUHV\VWHP
7KHQHZFULWHULDUHPDLQVLQHIIHFWXQWLOWKHVHUYHULVEURXJKWGRZQ
<RXFDQGHILQHXSWRILYHVHWVRIVHOHFWLRQFULWHULDRUILOWHUV7KHV\VWHPSDUDPHWHU
UVDXVHOHFWLRQBVORWVWKDWGHILQHVWKHQXPEHURIILOWHUVKDVDGHIDXOWYDOXHRI<RXFDQ
DFWLYDWHDQDXGLWLQWKHG\QDPLFFRQILJXUDWLRQXVLQJWUDQVDFWLRQ60

Release 4.6A/B
13–5
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSM19DQGFKRRVH(QWHU RUIURPWKH6$3VWDQGDUGPHQXFKRRVH
7RROV→$GPLQLVWUDWLRQ→0RQLWRU→6HFXULW\$XGLWORJ→60&RQILJXUDWLRQ 
&RQILJXUDWLRQVWDWXVUHIHUVWRWKHVWRUDJHRIWKHSDUDPHWHUVLQWKHGDWDEDVH
 &KRRVH 

 (QWHUDSURILOHQDPH IRUH[DPSOHAUDPROF1 
3
 &KRRVH 

 ,QWKLVVFUHHQ\RXPD\VSHFLI\WZRILOWHUJURXSV
DQGGHILQHWKHW\SHVRIDXGLWPHVVDJHVWKDWZLOO
EHZULWWHQLQWRWKHORJ

Authorizations Made Easy


13–6
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

'HILQLQJ)LOWHU*URXS
 &KRRVHWKH)LOWHUWDE
 8QGHU6HOHFWLRQFULWHULD
< (QWHU*LQ&OLHQW
< (QWHU*LQ8VHU1DPHV
 ,Q$XGLW&ODVVHVVHOHFW
< 'LDORJ/RJRQ
< 7UDQVDFWLRQ6WDUW
 8QGHU(YHQWVVHOHFW$OO 6
10
 6HOHFW)LOWHU$FWLYH
7 8 9

'HILQLQJ)LOWHU*URXS
 &KRRVHWKH)LOWHUWDE
7KLVILOWHUWUDFHVWKHUHSRUWVVWDUWHGE\RQHXVHU
 8QGHU6HOHFWLRQFULWHULD
< (QWHU*LQ&OLHQW.
< (QWHUDXVHU,'LQ8VHU1DPHV IRUH[DPSOH
GARYN 
 ,Q$XGLW&ODVVHVVHOHFW5HSRUWVWDUW 11
 8QGHU(YHQWVVHOHFW6HYHUHDQGFULWLFDO 16
15
 'HVHOHFW)LOWHU$FWLYH
7KLVVHWWLQJDOORZV\RXWRVDYHWKHILOWHUVHWWLQJV 12 13 14
EXWGRHVQRWDFWLYDWHWKHP
 &KRRVH'HWDLOVHWWLQJWRGULOOGRZQWRWKHDXGLW
FODVVDQGHYHQWFODVVFDWHJRULHV

Release 4.6A/B
13–7
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 6FUROOGRZQWR5HSRUWVWDUW
1RWLFHWKDWWKHFDWHJRU\LVDXWRPDWLFDOO\FKRVHQ 18
EDVHGRQWKHHDUOLHUVHOHFWLRQRIHYHQWW\SHDQG
DXGLWFODVVW\SH
 &KRRVH 

 7KHJHQHUDOFDWHJRULHVDUHFOHDUHGLQGLFDWLQJ 20
WKDWVHWWLQJVZHUHEURZVHGRUGHILQHGDWWKH
GHWDLOOHYHO
 &KRRVH 

19

Authorizations Made Easy


13–8
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 $V\VWHPPHVVDJHQRWLILHVWKHXVHUWKDWWKH
SURILOHZDVVDYHGVXFFHVVIXOO\
22
 7RDFWLYDWHWKHSURILOHVHOHFW 

21

 7KHSURILOHQDPHQRZDSSHDUVLQWKH$FWLYH
SURILOHILHOG
 $V\VWHPPHVVDJHLQGLFDWHVWKDWWKHSURILOHZLOO
EHDFWLYDWHGZKHQWKHDSSOLFDWLRQVHUYHULV 25
UHVWDUWHG
 7RG\QDPLFDOO\FKDQJHWKHVHOHFWLRQFULWHULDIRU 23
RQHRUPRUHDSSOLFDWLRQVHUYHUVLQDUXQQLQJ
V\VWHPFKRRVHWKH'\QDPLFFRQILJXUDW '\QDPLF
FRQILJXUDWLRQ WDE

24

Release 4.6A/B
13–9
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 ,QWKLVH[DPSOHWKHDXGLWKDVEHHQUXQQLQJIRU
VRPHWLPH LQGLFDWHGE\WKHFXUUHQWILOHVL]H
JUHDWHUWKDQ]HUR EHIRUHEHLQJVWRSSHGEULHIO\
7KHUHG LQWKH6WDW 6WDWXV FROXPQLQGLFDWHV 27
WKDWWKHDXGLWLVLQDFWLYH
 &KRRVH 

26

5XQQLQJDQ$XGLWRQD'LIIHUHQW8VHU

,QWKLVSURFHGXUHZHUXQDQDXGLWRQDGLIIHUHQWXVHUDQGFKHFNDOOWKHUHSRUWVWKDWZHUHVWDUWHG
 2QWKH)LOWHUWDEHQWHU6HOHFWLRQFULWHULD
< (QWHU*LQ&OLHQW
5
< (QWHUDXVHU,'LQ8VHUQDPHV IRUH[DPSOH
Patricia 
 8QGHU$XGLWFODVVHVVHOHFW5HSRUWVWDUW
 8QGHU(YHQWVVHOHFW$OO
 8QGHU)LOWHUVHOHFW)LOWHUDFWLYH
 7RDFWLYDWHFKRRVH 

1 2 3

Authorizations Made Easy


13–10
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 &KRRVH<HV

 $JUHHQ DSSHDUVLQWKH6WDW 6WDWXV FROXPQ


DQGDV\VWHPPHVVDJHLQGLFDWHVWKDWWKH
FRQILJXUDWLRQZDVDFWLYDWHG

$XGLW,QIRUPDWLRQ6\VWHP 6(&5
:KDW

7KH$XGLW,QIRUPDWLRQ6\VWHP $,6 LVGHVLJQHGIRUV\VWHPDQGEXVLQHVVDXGLWVDQGZLOO


OLNHO\EHUXQE\LQWHUQDORUH[WHUQDODXGLWRUV,WSXWVLQRQHSODFHPDQ\RIWKH5VHFXULW\
WRROV7KHFHQWHURIWKH$,6LVWKHDXGLWUHSRUWWUHHVWUXFWXUHGDURXQGDUDQJHRIDXGLWLQJ
IXQFWLRQVDQGGHIDXOWFRQILJXUDWLRQVLQFOXGLQJ
< $XGLWLQJSURFHGXUHVDQGGRFXPHQWDWLRQ
< $XGLWLQJHYDOXDWLRQV
< 'RZQORDGLQJRIDXGLWGDWD
$,6FDQEHHIIHFWLYHO\SRVLWLRQHGDVWKH6$3WRROIRULQWHUQDODXGLWLQJDQGGDWDSURWHFWLRQ
H[WHUQDODXGLWLQJRQJRLQJVHFXULW\FRQWUROFKHFNVLQWHULPDXGLWVSUHSDUDWLRQRI\HDUHQG
FORVLQJVWDWHPHQWV\HDUHQGDXGLWVHWF
$,6XVHVVWDQGDUG5UHSRUWVDQGWUDQVDFWLRQVWRFRQGXFWWKHUHYLHZDQGLVDVWDQGDUG
FRPSRQHQWLQ5HOHDVH$+RZHYHU\RXFDQLPSRUWWKH$,6LQWR\RXUV\VWHPEDFNWR
5HOHDVH'RUKLJKHU)RUPRUHLQIRUPDWLRQRQ$,6DQGLWVDYDLODELOLW\SOHDVHUHIHUWR

Release 4.6A/B
13–11
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

6$31HW²5)URQWHQGQRWHVDQG$,6DOVRSURYLGHVDQLQWHUIDFHWRH[SRUW
GDWDWRDQH[WHUQDODXGLWLQJV\VWHPWKDWDQDO\]HVILQDQFLDOVWDWHPHQWV

:K\

$XGLWRUVH[DPLQHWKHUHVXOWVRIDXWRPDWHGDQGPDQXDOILQDQFLDODQGV\VWHPSURFHGXUHVWR
HQVXUHWKDWWKHUHLVDFKHFNVDQGEDODQFHVLQIUDVWUXFWXUHWRSUHYHQWIUDXGDQGRWKHU
SUREOHPV$,6HQDEOHVWKHDXGLWRUVWRWHVWWUDQVDFWLRQVDQGUXQUHSRUWVGXULQJWKH
LQVSHFWLRQ

+RZ

7RVWDUW$,6FDOOWUDQVDFWLRQSECR7KHUHDUHWZRZD\VWRFRQGXFWDQDXGLW
< &RPSOHWH
< 8VHUGHILQHG

&RPSOHWH$XGLW
:KLOHLWLVQRWSRVVLEOHWRVKRZDOOWKHIXQFWLRQDOLW\RIWKH$,6KHUHZHSURYLGHWKHIROORZLQJVFHQDULRRI
LQYHVWLJDWLRQ
,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSECRDQGFKRRVH(QWHU RUIURPWKH6$3VWDQGDUGPHQXFKRRVH
,QIRUPDWLRQ6\VWHPV→6(&5$XGLW,QIR6\VWHP 
 8QGHU&KRRVHYLHZVHOHFW&RPSOHWHDXGLW
 &KRRVH 
2

$FRPSOHWHDXGLWFRQVLVWVRIDV\VWHPDXGLWDQG
EXVLQHVVDXGLW7KHVWUXFWXUHRQWKLVVFUHHQLV
$XGLWB$OOZLWKDVWDQGDUGYLHZ
 &OLFNWKHQRGHV  WRH[SDQGWKHIROORZLQJ
< 6\VWHP$XGLW
< %XVLQHVV$XGLW
3

Authorizations Made Easy


13–12
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

6\VWHP$XGLW

7KHIROORZLQJH[DPSOHVKRZVKRZWRXVHWKH$,6
 8QGHU6\VWHP$XGLWFOLFNWKHQRGH  QH[WWR
5HSRVLWRU\7DEOHV

 &OLFNWKHQRGH  QH[WWR7DEOH,QIRUPDWLRQ
 &KRRVH QH[WWR'DWD'LFWLRQDU\GLVSOD\

Release 4.6A/B
13–13
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

7KHWUDQVDFWLRQLVH[HFXWHGDQG\RXDUHEURXJKW
WRWKLVVFUHHQ
4
 &KRRVH 

%XVLQHVV$XGLW

 8QGHU%XVLQHVV$XGLWFOLFNWKHQRGH  QH[WWR
&ORVLQJ ),*/ 
 &OLFNWKHQRGH  QH[WWR%DODQFH6KHHW3 /
%DODQFHV
 &OLFNWKHQRGH  QH[WWR%DODQFH6KHHW3 /
<RXFDQH[HFXWHGLIIHUHQWUHSRUWVWRLQVSHFWWKH
ILQDQFLDOEDODQFHV
1
 &KRRVH QH[WWR3URILWDQG/RVV3URMHFWLRQ
2

Authorizations Made Easy


13–14
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 2QWKLVVFUHHQ\RXFDQHQWHUFULWHULDIRU\RXU 6
UHSRUWWKHQFKRRVH 
 &KRRVH  5

8VHU'HILQHG$XGLW
<RXFDQDOVRFRQGXFWDXVHUGHILQHGDXGLWE\FUHDWLQJDYLHZRUVXEVHWRIDFRPSOHWHDXGLW
,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSECRDQGFKRRVH(QWHU RUIURPWKH6$3VWDQGDUGPHQXFKRRVH
,QIRUPDWLRQ6\VWHPV→6(&5$XGLW,QIR6\VWHP 
 6HOHFW8VHUGHILQHGDXGLW
 8QGHU8VHUGHILQHGDXGLWHQWHUDYLHZQDPH IRU
H[DPSOHHQWHUZVUE 
3
 &KRRVH 

1
2

9LHZQDPHVVKRXOGVWDUWZLWK<RU=

Release 4.6A/B
13–15
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 8QGHU1HZYLHZLQ1DPHHQWHUWKHQDPHRIWKH
YLHZ IRUH[DPSOHZVUE 
 8QGHU6HOHFWXVLQJVHOHFW0DQXDO6HOHFWLRQ 4
<RXZLOOVHOHFWWKHSURFHGXUHVWKDWZLOOEH
LQFOXGHGLQWKHYLHZ
 &KRRVH 
:KHQ\RXFUHDWHDYLHZDQGHQWHUDGLIIHUHQW
QDPHLQ1DPHWKHQDPHRIWKHYLHZLVZKDWZDV
HQWHUHGLQWKHPDLQVFUHHQ
5

6
:HZDQWWRLQFOXGHDOOWKHSURFHGXUHVIRUD
V\VWHPDXGLWLQWKLVYLHZ
 6HOHFW6\VWHP$XGLW 8
9
 &KRRVH 
7
 7RJHQHUDWHFKRRVH 

$PHVVDJHLQGLFDWHVWKDWWKHJHQHUDWLRQZDV 10
VXFFHVVIXO
 &KRRVH 

Authorizations Made Easy


13–16
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

 &KRRVH 'LVSOD\WRFKHFNWKHYLHZRIWKLV


VWUXFWXUH

11

 &OLFNRQWKH6\VWHP$XGLWQRGH  WRH[SDQGLW

12

7KHVFUHHQRQWKHULJKWVKRZVDOOWKHSURFHGXUHV
IRUWKH$XGLWB$OOVWUXFWXUHZLWKD=98(YLHZ

Release 4.6A/B
13–17
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)

8VHU6HFXULW\$XGLW-REV
0DQ\RIWKHXVHUVHFXULW\DXGLWMREVSURJUDPVDUHLQFOXGHGDVSDUWRIWKH$,6DVZHOOLQWKH
VWDQGDUG56\VWHP

:KDW

7KHUHDUHVHYHUDOSUHGHILQHG6$3VHFXULW\UHSRUWVLQFOXGLQJ
< 56865 &KHFNIRUGHIDXOWSDVVZRUGRQXVHU,'V6$3 DQG'',&
< 56865 /LVWVXVHUVZLWKFULWLFDODXWKRUL]DWLRQV
< 56865 /LVWVXVHUVZKRDUHORFNHGGXHWRLQFRUUHFWORJRQ
7KLVUHSRUWVKRXOGEHVFKHGXOHGWRUXQHDFKGD\MXVWEHIRUHPLGQLJKW
< 56865 /LVWVXVHUVZLWKLQFRPSOHWHDGGUHVVGDWD
< 56865 /LVWVXVHUVZLWKFULWLFDOFRPELQDWLRQVRIDXWKRUL]DWLRQVRUWUDQVDFWLRQV
< 56865 /LVWVXVHUVZLWKFULWLFDODXWKRUL]DWLRQVZLWKWKHRSWLRQWRVHOHFWWKH
FULWLFDODXWKRUL]DWLRQV
< 56865 /LVWVFKDQJHGRFXPHQWVIRUXVHUVDQGVKRZVFKDQJHVPDGHWRDXVHU·V
VHFXULW\
< 56865 /LVWVFKDQJHGRFXPHQWVIRUSURILOHVDQGVKRZVFKDQJHVPDGHWRVHFXULW\
SURILOHV
< 56865 /LVWVFKDQJHGRFXPHQWVIRUDXWKRUL]DWLRQVDQGVKRZVFKDQJHVPDGHWR
VHFXULW\DXWKRUL]DWLRQV
6RPHRIWKHVHUHSRUWVKDYHSDUDPHWHUWDEOHVWKDWQHHGWREHSURSHUO\PDLQWDLQHGIRUEHVW
XVH5HYLHZDQGDQDO\]HWKHVHUHSRUWVEDVHGRQ\RXUNQRZOHGJHRIWKHFRPSDQ\+RZHYHU
EHDZDUHWKDWVHFXULW\LVVXHVPD\H[LVW,I\RXKDYHDVPDOOFRPSDQ\WKHVHLVVXHVFDQQRWEH
DYRLGHGEHFDXVHRQHSHUVRQRIWHQPXVWZHDUPDQ\GLIIHUHQWKDWV

:K\

<RXUH[WHUQDODXGLWRUVPD\UHTXLUHVRPHRIWKHVHUHSRUWVWREHH[HFXWHGDVSDUWRIWKH
DQQXDOILQDQFLDODXGLW

+RZ

<RXFDQXVHRQHRIWKHIROORZLQJWUDQVDFWLRQVRUPDQQHUV
< 6$ $%$3([HFXWH3URJUDP
7KLVWUDQVDFWLRQRQO\DOORZVWKHSURJUDPWREHH[HFXWHG
< 6( 7KHREMHFWQDYLJDWRU
< 7KH8VHU,QIRUPDWLRQ6\VWHP
2QO\WKH6$PDQQHULVGHVFULEHGEHORZ

Authorizations Made Easy


13–18
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

6$²$%$3([HFXWH3URJUDP

 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSA38DQGFKRRVH(QWHU
 ,Q3URJUDPHQWHUWKHUHSRUW
QDPH 3
 &KRRVH 

1RWHVIRU6SHFLILF5HSRUWV
56865 OLVWVFULWLFDOFRPELQDWLRQVRIDXWKRUL]DWLRQVRUWUDQVDFWLRQV 
< 7KHVHFRPELQDWLRQVDUHPDLQWDLQHGRQWDEOH68.5,
< 'DQJHURXVFRPELQDWLRQVLQFOXGHWKHIROORZLQJWUDQVDFWLRQV
Π5= ZLWKDQ\WKLQJ
Π5= ZLWKDQ\WKLQJ
Π6( ZLWKDQ\WKLQJ
Π68 ZLWKVHFXULW\XVHUVDQGSURILOHV
Π68 ZLWKVHFXULW\XVHUVDQGSURILOHV

$XGLW7DVNV 6067$767

5HYLHZLQJ9DOLGLW\RI1DPHG8VHUV
:KDW

$OOXVHUVZKRKDYHOHIWWKHFRPSDQ\VKRXOGKDYHWKHLU5DFFHVVWHUPLQDWHGLPPHGLDWHO\
%\ORFNLQJRUGHOHWLQJWKHVHXVHU,'V\RXOLPLWDFFHVVWRRQO\WKRVHXVHUVZKRVKRXOGKDYH
DFFHVVWR53HULRGLFUHYLHZDVVXUHVWKDWWKHWDVNRIORFNLQJRUGHOHWLQJKDVEHHQ
FRPSOHWHG

1RWH,IWKH+5PRGXOHLVLPSOHPHQWHGWKHUHDUHPHFKDQLVPVWKDWLQWHJUDWHZLWKWKH
DXWKRUL]DWLRQV\VWHPWRKDYHVXFKFKDQJHVLQXVHUDFFHVVHVRFFXUDXWRPDWLFDOO\

:K\

3URSHUDXGLWFRQWUROUHTXLUHVWKDWDXVHUZKRQRORQJHUKDVDYDOLGEXVLQHVVQHHGWRDFFHVV
5VKRXOGQRWEHDOORZHGWRGRVR

Release 4.6A/B
13–19
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

'HOHWLQJRUORFNLQJWKHVHXVHU,'VDOVRSUHYHQWVDQ\RQHZKRKDGEHHQXVLQJWKHWHUPLQDWHG
XVHU,'IURPDFFHVVLQJWKHV\VWHPZLWKWKDW,'

2QHRIWKHDXGLWSURFHGXUHVWKDW\RXUH[WHUQDODXGLWRUVZLOOXVHLVWRWHVWZKHWKHUDSHUVRQ
ZKRGRHVQRWQHHGWRDFFHVV5KDVDOLYHXVHU,'

+RZ

 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSU01DQGFKRRVH(QWHU
RUIURPWKH6$3VWDQGDUGPHQXFKRRVH7RROV→$GPLQLVWUDWLRQ→8VHUPDLQWHQDQFH→688VHUV 
 &KRRVHSRVVLEOHHQWULHV

 5HYLHZWKHDFWLYHXVHUV
9HULI\WKDWWKHVHXVHUVDUHLQGHHG
YDOLGXVHUV

,QDODUJHFRPSDQ\\RXVKRXOGGR
DUDQGRPDXGLWRQDWOHDVWWZHQW\
XVHUV7KHPLQLPXPQXPEHU
VKRXOGEHGHWHUPLQHGE\\RXU
DXGLWRUV

Authorizations Made Easy


13–20
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

5HYLHZLQJ3URILOHVIRU$FFXUDF\DQG3HUPLVVLRQ&UHHS
:KDW

$SHUPLVVLRQFUHHSLVDQLQFUHPHQWDOLQFUHDVHLQSHUPLVVLRQVJLYHQWRDXVHURYHUWLPH,I
OHIWXQFKHFNHGLQFUHDVHGSHUPLVVLRQVPD\JUDQWDXVHUPRUHDXWKRULW\LQWKHV\VWHPWKDQLV
UHTXLUHGRULQWHQGHG

:K\

8VHUVPD\KDYHXQGHVLUDEOHDXWKRUL]DWLRQ V RUFRPELQDWLRQV

<RXUH[WHUQDODXGLWRUVPD\KDYHDQDXGLWVWHSWRFKHFNIRUSHUPLVVLRQFUHHS

+RZ

<RXFDQFRQGXFWDVSRWDXGLWRI
< ,QGLYLGXDOV
Π5HYLHZWKHVHFXULW\IRUPVIRUDXVHUFRPSDUHWKHVHIRUPVWRWKHDFWLYLW\JURXSVDQG
SURILOHVDVVLJQHGWRWKDWXVHUDQGLQYHVWLJDWHLQFRQVLVWHQFLHV
Π5HYLHZWKHDFWLYLW\JURXSVDQGSURILOHVDVVLJQHGWRWKHLQGLYLGXDOIRUUHDVRQDEOHQHVV

Π5HYLHZWKHLQGLYLGXDOSURILOHVDVVLJQHGIRUFRQWHQWDQGFKHFNWRVHHLIWKHSURILOHKDV
EHHQUHFHQWO\FKDQJHG
< 3URILOHV WUDQVDFWLRQ68 DQGDXWKRUL]DWLRQV WUDQVDFWLRQ68
&KHFNWRVHHLIWKHFKDQJHGDWHLVUHFHQW
<RXFDQDOVRH[HFXWHWKHIROORZLQJDXGLWUHSRUWV
< 56865 XVHUFKDQJHV
< 56865 SURILOHFKDQJHV
< 56865 DXWKRUL]DWLRQFKDQJHV
)RUDGGLWLRQDOLQIRUPDWLRQRQWKHVHUHSRUWVVHHWKH8VHU6HFXULW\$XGLWVHFWLRQRQSDJH²


6\VWHP/RJ 60
7KH56\VWHPORJVDOOV\VWHPHUURUVZDUQLQJVSURFHVVPHVVDJHVLQWKHV\VWHPORJ
6\V/RJ DQGXVHUORFNVGXHWRIDLOHGORJRQDWWHPSWVIURPNQRZQXVHUV7KH6\V/RJZULWHV
WRWZRGLIIHUHQWW\SHVRIORJV
< /RFDO/RJV
< &HQWUDO/RJV

Release 4.6A/B
13–21
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

8VHWKHWUDQVDFWLRQ60WRDFFHVVWKHV\VWHPORJRXWSXWVFUHHQ:LWKWKLVWUDQVDFWLRQ\RXFDQUHDGDQ\RI
WKHPHVVDJHVWKDWDUHFRQWDLQHGLQWKHV\VWHPORJV<RXFDQPRGLI\WKHYLHZWRPHHW\RXUQHHGV$ZLGH
UDQJHRIVHOHFWLRQFULWHULDLVDYDLODEOHWRDQDO\]HWKHV\VWHP
7KHIROORZLQJH[DPSOHVKRZVKRZWRXVHWKHV\VWHPORJIRUPRQLWRULQJVHFXULW\LVVXHVVXFKDVIDLOHGORJRQ
DWWHPSWV
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSM21DQGFKRRVH(QWHU RUFKRRVH7RROV→$GPLQLVWUDWLRQ→
0RQLWRULQJ→6\VWHP/RJ 
 6SHFLI\WKHVHOHFWLRQFULWHULDIRU\RXU
V\VWHPORJDQDO\VLVUHSRUW IRU 4
H[DPSOH)URPGDWHWLPH7RGDWHWLPH
8VHU7UDQVDFWLRQFRGH3URFHVV
3UREOHPFODVVHWF
 2SWLRQDO <RXPD\HQWHUWKH
2
PHVVDJHQXPEHUV IRUH[DPSOHUS-
3 IRUIDLOHGORJRQDWWHPSWVIRU
ORFNHGXVHUVDQGFKRRVH 8VH 3
 &KRRVH WRGLVSOD\WKHV\VWHPORJ
UHSRUW

 2QWKH6\VWHPORJ/RFDO$QDO\VLV
VFUHHQ\RXFDQYLHZWKHV\VWHPORJ
6
DQDO\VLVUHSRUWDQGGULOOGRZQHDFK
LWHPIRUGHWDLO LIQHFHVVDU\ 
 &KRRVH 

Authorizations Made Easy


13–22
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

/RFDO/RJV

(DFK5$SSOLFDWLRQ6HUYHUKDVDORFDOORJWKDWUHFHLYHVDOOWKHPHVVDJHVRXWSXWE\WKLV
VHUYHU6\V/RJUHFRUGVWKHVHPHVVDJHVLQDFLUFXODUILOHRQWKHVHUYHU 7KLVPHDQVWKDWZKHQ
WKLVORJILOHUHDFKHVWKHPD[LPXPSHUPLVVLEOHOHQJWK6\V/RJRYHUZULWHVLWVWDUWLQJRYHU
IURPWKHEHJLQQLQJ 

&HQWUDO/RJV

:HUHFRPPHQGWKDW\RXDOVRPDLQWDLQDFHQWUDOORJILOHRQDVHOHFWHGDSSOLFDWLRQVHUYHU
(DFKLQGLYLGXDODSSOLFDWLRQVHUYHUWKHQVHQGVLWVORFDOORJPHVVDJHVWRWKLVVHUYHU7KH
VHUYHUWKDW\RXGHVLJQDWHWRPDLQWDLQWKHFHQWUDOORJFROOHFWVWKHPHVVDJHVIURPWKHRWKHU
DSSOLFDWLRQVHUYHUVDQGZULWHVWKHVHPHVVDJHVWRWKHFHQWUDOORJ
7KHFHQWUDOORJFRQVLVWVRIWZRILOHVWKHDFWLYHILOHDQGWKHROGILOH WKHORFDWLRQRIWKHDFWLYH
ILOHLVVSHFLILHGLQWKHUVOJFHQWUDOILOH SURILOHSDUDPHWHUWKHORFDWLRQRIWKHROGILOHLVVSHFLILHG
LQWKHUVOJFHQWUDOROGBILOH 
7KHDFWLYHILOHFRQWDLQVWKHFXUUHQWORJ:KHQLWUHDFKHVWKHPD[LPXPVL]HWKHV\VWHP
ZULWHVWRWKHROGORJILOHPDNHVWKHSUHYLRXVO\DFWLYHILOHWKHROGILOHDQGFUHDWHVDQHZ
DFWLYHILOH7KHVZLWFKRFFXUVZKHQWKHVL]HRIWKHDFWLYHORJILOHLVKDOIWKHYDOXHDVVSHFLILHG
LQWKHUVOJPD[BGLVNVSDFHFHQWUDO SDUDPHWHU

6WDWLVWLF5HFRUGVLQ&&06 67$7
7KH&RPSXWHU&HQWHU0RQLWRULQJ6\VWHP &&06 SHUIRUPDQFHDQDO\VLVWRROVZLWKLQ5
ORJVDOO5DFWLYLWLHVFDWHJRUL]HGE\WUDQVDFWLRQDQGXVHULQVWDWLVWLFDOUHFRUGVWKDWFDQEH
XVHIXOIRUDXGLWWUDLOSXUSRVHV<RXFDQDFFHVVWKHVHUHFRUGVZLWKWKHWUDQVDFWLRQ67$7RU
IURPWKH6$3VWDQGDUGPHQX7KLVWUDQVDFWLRQSURYLGHV\RXZLWKWKHGHWDLOHGVWDWLVWLFDO
UHFRUGV LQFOXGLQJXVHUVWDWLVWLFV 

Release 4.6A/B
13–23
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

 ,QWKH&RPPDQGILHOGHQWHU
WUDQVDFWLRQSTATDQGFKRRVH(QWHU
RUIURPWKH6$3VWDQGDUGPHQX
FKRRVH7RROV→$GPLQLVWUDWLRQ
2
0RQLWRU→3HUIRUPDQFH→:RUNORDG
→6WDWLVWLFVUHFRUGV
 3URYLGHWKHGHVLUHGVHOHFWLRQFULWHULD
IRUH[DPSOHE\HQWHULQJFULWHULDIRU
XVHUWUDQVDFWLRQSURJUDPWDVN
W\SHZRUNSURFHVVQXPEHUVWDUW
WLPHHWF 
 &KRRVH WRGLVSOD\WKHVWDWLVWLF
UHFRUGV

7KH:RUNORDG'LVSOD\6WDWLVWLFDO 5
5HFRUGVVFUHHQDSSHDUV
 3ODFHWKHFXUVRULQWKHXVHU
LQIRUPDWLRQDQGGRXEOHFOLFNIRU
IXUWKHUGHWDLOHGLQIRUPDWLRQ
 &KRRVH 

Authorizations Made Easy


13–24
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

67²8VHU3URILOH
7KH&RPSXWHU&HQWHU0RQLWRULQJ6\VWHP &&06 WUDQVDFWLRQ67¥8VHU3URILOHFDQEHXVHGWRFROOHFW
LQIRUPDWLRQDERXW
< 7KHVHUYHUVDQGORJJHGRQXVHUV
< 8VHUDQGVHUYHUVLQXVH
7KHXVHUSURILOHOLVWSURYLGHV\RXZLWKDQRYHUYLHZRIWKHORJJHGRQXVHUVDQGWKHLUDFFXPXODWHGUHVSRQVH
WLPHV7KHGHWDLOVFUHHQVKRZVWKHOLVWRIXVHUVWRJHWKHUZLWKWKHLUGLDORJVWHSVDFWLYLW\DQGUHVSRQVHWLPHV

 ,QWKH&RPPDQGILHOGHQWHU
WUDQVDFWLRQST03DQGFKRRVH(QWHU
RUIURPWKH6$3VWDQGDUGPHQX
FKRRVH$GPLQLVWUDWLRQ→0RQLWRU→
3HUIRUPDQFH→:RUNORDG→67¥ 2
$QDO\VLV 
3
 &KRRVH3HUIRUPDQFHGDWDEDVH
 &KRRVHRQHRIWKHIROORZLQJZKHQ
WKHGLDORJER[DSSHDUV
< 6LQJOHVWDWUHFRUGV
< 7RGD\·VZRUNORDG
< /DVWPLQXWHZRUNORDG
< /RFDODOHUWPRQLWRU

 &KRRVH*RWR→8VHU3URILOHWRREWDLQ
WKH:RUNORDG8VHU3URILOH5HSRUW

Release 4.6A/B
13–25
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

 7KH:RUNORDG8VHU3URILOH5HSRUW
VFUHHQDSSHDUV
 'RXEOHFOLFNRQWKHXVHUQDPHLQWKH
8VHUFROXPQWRREWDLQDGGLWLRQDO
GHWDLOHGLQIRUPDWLRQUHJDUGLQJWKH
WUDQVDFWLRQDFWLYLW\E\XVHULQDOLVW
IRUPDW 6

7KHGHWDLOHGWUDQVDFWLRQLQIRUPDWLRQ 7
DSSHDUVIRUWKHFKRVHQXVHU
 &KRRVH 

Authorizations Made Easy


13–26
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

/RJJLQJRI6SHFLILF$FWLYLWLHV
5ORJVRWKHUVSHFLILFDFWLYLWLHVLQYDULRXVORJV:HGLVFXVVWKHIROORZLQJVSHFLILFORJV
EHORZ
/RJJLQJ&KDQJHVWR7DEOH'DWD
:HUHFRPPHQGWKDW\RXDFWLYDWHWKHORJJLQJRIWDEOHGDWDIRUWKRVHWDEOHVWKDWDUHFULWLFDORU
VXVFHSWLEOHWRDXGLWV$JDLQ\RXPXVWH[SOLFLWO\DFWLYDWHWKLVORJJLQJ1RWHWKHIROORZLQJ
< <RXPXVWVWDUWWKH56\VWHPZLWKWKHUHFFOLHQW SURILOHSDUDPHWHUVHW7KLVSDUDPHWHU
VSHFLILHV5ORJVIRUDOOFOLHQWVRURQO\VSHFLILFFOLHQWV:HUHFRPPHQGVHWWLQJWKLV
SDUDPHWHUWRORJDOOFOLHQWVLQ\RXUSURGXFWLYHV\VWHP
< 6HWWKH/RJGDWDFKDQJHV IODJIRUWKRVHWDEOHVWKDW\RXZDQWWRKDYHORJJHG,IERWKRI
WKHVHFRQGLWLRQVDUHPHWWKHGDWDEDVHORJVWDEOHFKDQJHVLQWKHWDEOH'%7$%357
6HWWLQJWKH/RJGDWDFKDQJHV IODJRQO\GRHVQRWVXIILFHLQUHFRUGLQJWDEOHFKDQJHV\RX
PXVWDOVRVHWWKHUHFFOLHQW SDUDPHWHU <RXFDQYLHZWKHVHORJVZLWKWKHWUDQVDFWLRQ
6&8:LWKLQ55HOHDVH$RUJUHDWHU\RXPD\FDOOUHSRUW56973527IRUWKH
HYDOXDWLRQRIWKHERWK
Π7KHFXVWRPL]LQJREMHFWDQGWDEOHORJGDWDEDVH
Π5HSRUW567%+,67IRUWDEOHDQDO\VLVZLWKKLVWRU\

,IDVWDQGDUGGHOLYHUHG6$3WDEOHLVQRWVHWXSWRSHUPLWORJJLQJRIFKDQJHVDQG\RX
ZLVKWRFKDQJHLWWKHQWKLVDFWLRQLVFRQVLGHUHGDPRGLILFDWLRQWRWKH56\VWHP7R
VHHLIDWDEOHSHUPLWVORJJLQJRIFKDQJHVJRWRWUDQVDFWLRQ6(RU6(DQGORRNDWWKH
GDWDEDVHWDEOH·VWHFKQLFDOVHWWLQJV WKLVLVDEXWWRQLQVLGHRIWKHVFUHHQZKHUHWKHWDEOHLV
GHILQHG DWWKHILHOGFDOOHG/RJGDWDFKDQJHV

 ,QWKH&RPPDQGILHOGHQWHU
WUDQVDFWLRQSCU3DQGFKRRVH(QWHU
 6HOHFW/LVWRIFKDQJHGRFV
3
 &KRRVH WRREWDLQWKHDQDO\VLVRI
WKHFKDQJHGRFXPHQWVOLVWIRUERWK 2
FXVWRPL]LQJREMHFWVDQGWDEOHV

Release 4.6A/B
13–27
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)

 5XQWKH(YDOXDWLRQRIFKDQJHORJV
SURJUDP 56973527IRUWKH
HYDOXDWLRQRIERWKWKHFXVWRPL]LQJ
REMHFWDQGWDEOHORJGDWDEDVH ZLWK 5
WKHDSSURSULDWHVHOHFWLRQFULWHULD
 &KRRVH WRWKHGLVSOD\WKHUHFRUGV

7KHWUDQVDFWLRQLVH[HFXWHGDQG\RX 6
DUHEURXJKWWRWKH(YDOXDWLRQRI
FKDQJHORJVVFUHHQ
 &KRRVH 

Authorizations Made Easy


13–28
Chapter 13: SAP Security Audit and Logging
Logging Changes to User Master Records, Profiles, and Authorizations

/RJJLQJ&KDQJHVWR8VHU0DVWHU5HFRUGV3URILOHVDQG
$XWKRUL]DWLRQV

5ORJVFKDQJHVPDGHE\DXVHUDGPLQLVWUDWRULQQRQWUDQVSDUHQWWDEOHVLQWKHGDWDEDVH
$FFHVVWRWKHVHWDEOHVLVSURWHFWHGE\WKH5DXWKRUL]DWLRQFRQFHSW2QFHWKHVHORJVKDYH
EHHQDUFKLYHGWKH\DUHGHOHWHG'HSHQGLQJRQ\RXUUHOHDVHXVHHLWKHUWKHDXWKRUL]DWLRQ
LQIRV\VWHPRUWUDQVDFWLRQ68WRDFFHVVWKHVHORJV<RXFDQYLHZWKHIROORZLQJFKDQJHV
< &KDQJHVPDGHGLUHFWO\WRDXVHU·VDXWKRUL]DWLRQ
7KHVHDUHFKDQJHVPDGHWRWKHSURILOHOLVWLQWKHXVHU·VPDVWHUUHFRUG7KLVGRHVQRW
LQFOXGHLQGLUHFWFKDQJHVWKDWRFFXUZKHQDXWKRUL]DWLRQVRUSURILOHVDUHFKDQJHG9LHZ
WKHFKDQJHGRFXPHQWVIRUWKHSURILOHVDQGDXWKRUL]DWLRQVWRFKHFNWKRVHFKDQJHV
< &KDQJHVWRWKH
Π8VHUSDVVZRUG KDVKHGUHSUHVHQWDWLRQRQO\
Π8VHUW\SH
Π8VHUJURXS
Π9DOLGLW\SHULRG
Π$FFRXQWQXPEHU
< &KDQJHVPDGHGLUHFWO\WRSURILOHVRUDXWKRUL]DWLRQV
)RUPRUHLQIRUPDWLRQVHH%&8VHUVDQG$XWKRUL]DWLRQV→&UHDWLQJDQG0DLQWDLQLQJ8VHU
0DVWHU5HFRUGV→'LVSOD\LQJ&KDQJH'RFXPHQWV

Release 4.6A/B
13–29
Chapter 13: SAP Security Audit and Logging
Logging Changes to User Master Records, Profiles, and Authorizations

Authorizations Made Easy


13–30
&KDSWHU 8SJUDGH


&RQWHQWV

Before Doing Any Upgrade ..................................................................................14–2


Validation Steps After Upgrading Is Completed................................................14–3
Converting Previously Created SU02 Profiles into Activity Groups ...............14–4
Upgrade from a Release Prior to 3.1x to 4.6 A/B .............................................14–11
Upgrade from Release 3.0F to 4.6 A/B ..............................................................14–12
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B..........................................14–14
Upgrade from Releases 4.0x or 4.5x to 4.6 A/B ...............................................14–22

14–1
Chapter 14: Upgrade
Before Doing Any Upgrade

%HIRUH'RLQJ$Q\8SJUDGH

%HIRUHGRLQJDQ\XSJUDGH\RXVKRXOG
 5HYLHZWKH6$31HW²5)URQWHQGQRWHVIRUWKHYHUVLRQ\RXDUHXSJUDGLQJWR
:KHQVHDUFKLQJ56$31HW²5)URQWHQGQRWHVSHUIRUPVHYHUDOVHDUFKHV)RU
H[DPSOHILUVWVHDUFKRQWKHFRPSRQHQW%&&&086 7KHQVHDUFKRQWKHNH\ZRUGV
authorizationsecurityDQGuser masterIRUWKHUHOHDVH\RXDUHSODQQLQJWR
ZRUNRQ
 5HYLHZUHOHDVHQRWHVUHODWHGWRDXWKRUL]DWLRQVIRUDOOYHUVLRQVEHWZHHQWKHYHUVLRQ\RX
DUHFXUUHQWO\XVLQJDQGWKHYHUVLRQ\RXZLOOEHLPSOHPHQWLQJ)RUH[DPSOHLI\RXDUH
XSJUDGLQJIURP+WR%UHDGWKHUHOHDVHQRWHVIRUYHUVLRQV,$%$
%$DQG%7RUHYLHZWKHUHOHDVHQRWHVFKRRVH+HOS→5HOHDVHQRWHVRQ\RXU
V\VWHP6HOHFWWKH&RPSOHWHOLVW5HODQGWKHQFKRRVHWKHVSHFLILFUHOHDVH\RXZDQWWR
JHWLQIRUPDWLRQRQ,QWKHWUHHVWUXFWXUHWKDWDSSHDUVXVHWKHVHDUFKIXQFWLRQDQG
SHUIRUPDVHDUFKRQWKHZRUGVauthorizationchecksDQGsecurity$OVR\RX
ZLOOZDQWWRUHDGWKHVHFWLRQRQWKHWUHHEHQHDWK%DVLV→&RPSXWHU&HQWHU0DQDJHPHQW
6\VWHP→8VHUVDQG$XWKRUL]DWLRQV5HYLHZWKHUHOHDVHQRWHVEHFDXVHWKH\WHOO\RXZKDW
QHZIXQFWLRQDOLW\LVQRZDYDLODEOHDVZHOODVFKDQJHVWRH[LVWLQJIXQFWLRQDOLW\WKDW\RX
PD\QHHGWRFRQVLGHULQWKHQHZXSJUDGHGHQYLURQPHQW

%HDZDUHWKDWWKHDERYHPHQWLRQHGUHOHDVHQRWHVRQO\WHOO\RXZKDWLVQHZIRUWKHWRRO
LWVHOI,WGRHVQRWWHOO\RXDERXWQHZDXWKRUL]DWLRQVDQGWKHSXUSRVHRIQHZ
DXWKRUL]DWLRQVLQDSSOLFDWLRQV)RULQIRUPDWLRQDERXWQHZDXWKRUL]DWLRQIXQFWLRQDOLW\
DYDLODEOHZLWKLQDSDUWLFXODUDSSOLFDWLRQ\RXPXVWUHDGWKHUHOHDVHQRWHVIRUWKDW
SDUWLFXODUDSSOLFDWLRQ
 'HYLVHDEDFNXSDQGGLVDVWHUUHFRYHU\SODQIRUDXWKRUL]DWLRQV%HUHDOLVWLF,I\RXKDYH
GRQHH[WHQVLYHPRGLILFDWLRQVRUFKDQJHVWRVWDQGDUG6$35ORJLFWKHVHFKDQJHVPD\
FDXVHSUREOHPVDIWHUWKHXSJUDGH<RXPD\ZDQWWRFUHDWHDWHPSRUDU\JURXSRIDFWLYLW\
JURXSVWKDWFDQEHXVHGLQWKHLQWHULPVRRSHUDWLRQVFDQFRQWLQXH'LVFXVV\RXUEDFNXS
SODQZLWKWKHSURMHFWPDQDJHPHQWRUV\VWHPDGPLQLVWUDWRUV$JRRGLGHDLVWRFUHDWH
WKHVHWHPSRUDU\DFWLYLW\JURXSVLPPHGLDWHO\ZKHQ\RXJHWDFFHVVWRWKHQHZV\VWHP
 0DNHFHUWDLQWKDWWKH%DVLVWHDPUHFRJQL]HVDQGDSSURSULDWHO\DOORFDWHVLQWKHXSJUDGH
WLPHOLQHWKDWWKHDXWKRUL]DWLRQSHUVRQLVDQLQWHJUDOSDUWRIWKHXSJUDGHSURFHGXUHDQG
WKDWWKHXSJUDGHIURPDWHFKQLFDOSHUVSHFWLYHLVQRWFRPSOHWHXQWLOWKHDXWKRUL]DWLRQV
SRUWLRQLVDOVRFRPSOHWH
 ,I\RXKDYHPDGHDQ\FKDQJHVZLWK68WKHQLWLVKLJKO\DGYLVDEOHWKDW\RXGRZQORDG
WRDORFDOILOH DQGVDYHRXWVLGHRIWKH56\VWHP WKHFRQWHQWVRIWKHWZRWDEOHV
862%7B&DQG862%;B&IURPWKHYHUVLRQ\RXDUHXSJUDGLQJ7KHVHWDEOHVPD\EH
QHHGHGLQWKHHYHQWWKDWDGLVDVWHUUHFRYHU\QHHGVWREHSHUIRUPHG

Authorizations Made Easy


14–2
Chapter 14: Upgrade
Validation Steps After Upgrading Is Completed

,QWKLVFKDSWHUZHVKRZ\RXWKHVWHSVUHTXLUHGDIWHUDQ56\VWHPXSJUDGH7KLV
LQIRUPDWLRQLVDGYDQWDJHRXVLPPHGLDWHO\DIWHU\RXUXSJUDGH%HVXUHWRUHDGWKLVFKDSWHU
EHIRUHFRQWLQXLQJ\RXUZRUNZLWKWKH3URILOH*HQHUDWRU 3* LQDQHZUHOHDVH
7KHVSHFLILFVWHSVLQYROYHGDIWHUWKHXSJUDGHGHSHQGRQWKHVRXUFHDQGWDUJHWUHOHDVH\RX
DUHFRPLQJIURP

9DOLGDWLRQ6WHSV$IWHU8SJUDGLQJ,V&RPSOHWHG

 ,QVWDOODGGRQFRPSRQHQWVWRWKHXSJUDGHGV\VWHPLIDQ\ DORQJZLWKZKDWHYHU
DXWKRUL]DWLRQVFRPHZLWKWKDWDGGRQFRPSRQHQWIRUH[DPSOHGHGXFWLRQPDQDJHPHQW
FRPSRQHQWV$XGLW,QIRUPDWLRQV\VWHP 
 8SJUDGHWKHUHSRUWWUHHPLJUDWLRQ
7KHGDWDVWUXFWXUHRIWKHUHSRUWWUHHVFKDQJHV7RFRQWLQXHXVLQJ\RXUVHOIFUHDWHGUHSRUW
WUHHVWKH\PXVWEHDGMXVWHGWRWKHFKDQJHGGDWDVWUXFWXUHV7KH6$3SURYLGHGUHSRUW
WUHHVJHQHUDWHLQWRDUHDPHQXVDXWRPDWLFDOO\7KHPLJUDWLRQLVSHUIRUPHGXVLQJWKH
WUDQVDFWLRQ5775((B0,*5$7,217KHWUDQVDFWLRQLVH[HFXWHGLQWKHFOLHQWFRQWDLQLQJ
WKHSURGXFWLRQYHUVLRQVRIWKHUHSRUWWUHHV'XULQJWKHPLJUDWLRQWUDQVDFWLRQFRGHVDUH
DXWRPDWLFDOO\DVVLJQHGIRUDOOUHSRUWVLQDWUHH7KLVPDNHVLWSRVVLEOHWRDGGUHSRUWVWR
WKHXVHUPHQXLQDFWLYLW\JURXSPDLQWHQDQFH,I\RXZDQWWRFUHDWHWUDQVDFWLRQFRGHV
ZLWKDFRPSDQ\VSHFLILFSUHIL[\RXFDQVHWWKLVE\JRLQJWRWKH6$35HIHUHQFH,0*DQG
FKRRVLQJ%DVLV&RPSRQHQWV→6\VWHP$GPLQLVWUDWLRQ→8VHUVDQG$XWKRUL]DWLRQV→6HW
QDPHVSDFHIRUUHSRUWWUHHPLJUDWLRQDQGVSHFLILF,0*DFWLYLWLHV
 9DOLGDWHWKHXVHUPDVWHUUHFRUGVIRUQHZILHOGVZLWKQHZYDOXHVLIQHHGHG 68 
 (QVXUHWKDWWKH3*DQGRWKHUV\VWHPSDUDPHWHUVDUHVHOHFWHGDVUHTXLUHG VHHFKDSWHU
6HWWLQJ8SWKH3URILOH*HQHUDWRU 
 8SJUDGHWKHDFWLYLW\JURXSVZLWKWUDQVDFWLRQ68DQGSHUIRUPVWHSV$WR'
 8VHXVHUPDVWHUUHFRQFLOLDWLRQ WUDQVDFWLRQ3)8' LIQHHGHG
0DNHFHUWDLQWKDW\RXUUHSRUWWUHHVKDYHXSJUDGHGSURSHUO\,IXSJUDGLQJIURP5HOHDVH[
RUEHORZWRVRPHFRUHFKDQJHVKDYHEHHQPDGHWRWKHIXQFWLRQDOLW\DQGSUHVHQWDWLRQRI
UHSRUWWUHHV
,IXSJUDGLQJIURP[RUEHORZWREHDZDUHWKDWWKHUH\RXDUHQRZLQYROYHGLQD
V\VWHPWKDWKDVDORWPRUHIXQFWLRQDOLW\WRGHDOZLWKWKHZRUOG´RXWVLGHµRI57KHVHFDOOV
WKDWZRUNRXWVLGHRI5DUHFRPPRQO\KDQGOHGWKURXJKYHU\VSHFLDOW\SHVRIIXQFWLRQ
PRGXOH$IXQFWLRQPRGXOHEHORQJVWRDIXQFWLRQJURXS7KH6B5)&DXWKRUL]DWLRQREMHFWLV
FULWLFDOLQV\VWHPVPRUHUHFHQWWKDQ[7KLVDXWKRUL]DWLRQREMHFWPD\EHWRWDOO\´VKXWRIIµ
YLDD563$5$0SDUDPHWHUYDOXHEXWZHGRQRWVXJJHVWVKXWWLQJLWRII$VVXFK\RXZLOO
QHHGWRGHDOZLWK6B5)&DIWHUWKHXSJUDGH
)LUVWXSJUDGH\RXU'(9V\VWHP3HUIRUPDOOWKHVWHSVLQ'(9'HWHUPLQHZKDWLVDQGZKDW
LVQRWWUDQVSRUWDEOHWRWKH4$6V\VWHPDQG35'V\VWHP$OPRVWQRWKLQJQHHGVWREHGRQH
GLUHFWO\LQ35'DV\RXVKRXOGEHDEOHWRWUDQVSRUWDOPRVWHYHU\WKLQJIURP'(91RRQH
VKRXOGHYHUDWWHPSWWRXSGDWHDXWKRUL]DWLRQVLQVROHO\35'

Release 4.6 A/B


14–3
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups

7KHXVHUPDVWHUUHFRUGKDVUHPDLQHGUHODWLYHO\WKHVDPHWKURXJKRXWWKHUHOHDVHV+RZHYHU
WKHUHDUHWZRWKLQJVWKDWVKRXOGEHQRWHGLQWUDQVDFWLRQ68
< 2QWKH'HIDXOWVWDEWKHUHDUHWZRQHZILHOGV
Œ 3HUVRQDOWLPH]RQH²7KLVILHOGVKRXOGEHILOOHGLQDIWHUWKHXSJUDGH$VPDOO
FRQYHUVLRQSURJUDPFDQEHZULWWHQWRILOOWKLVILHOG
Œ 'DWHIRUPDW²7KLVQHZILHOGSHUPLWV\RXWRXVHWKHGDWHIRUPDW<<<<00'' EH
DZDUHWKDWVRPHSODFHVLQ5KDYHQRWEHHQFRGHG\HWWRUHFRJQL]HWKLVQHZ
IRUPDW 
< 2QWKH$GGUHVVWDEWKHUHLVDGGUHVVLQIRUPDWLRQDERXWWKHXVHU7KLVDGGUHVV
LQIRUPDWLRQLVOLQNHGWRWKHLQWURGXFHGIXQFWLRQDOLW\IRUWKHFHQWUDODGGUHVV
PDQDJHPHQWFRPSRQHQWRI5

&RQYHUWLQJ3UHYLRXVO\&UHDWHG683URILOHVWR$FWLYLW\
*URXSV

&UHDWLQJDQ$FWLYLW\*URXSIURP0DQXDOO\0DLQWDLQHG3URILOHV
,I\RXFUHDWHGSURILOHVPDQXDOO\XVLQJWUDQVDFWLRQ68\RXFDQFUHDWHDQDFWLYLW\JURXSIURPWKHVH
SURILOHV7KHSURILOHVFDQEHVLQJOHDVZHOODVFRPSRVLWH8VHWUDQVDFWLRQ68 8SJUDGHDQGILUVW
LQVWDOODWLRQ 
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSU25DQGFKRRVH(QWHU
 &KRRVHVWHS&RS\GDWDIURPROG
SURILOHV

Authorizations Made Easy


14–4
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups

 5HDGWKH,PSRUWDQWLQIRUPDWLRQ
ZLQGRZ
 &KRRVH 

7KHV\VWHPSURSRVHVDOOWKHPDQXDOO\
FUHDWHGSURILOHV
 6HOHFWWKHSURILOH\RXZDQWWR Tip
6
FRQYHUWWRDQDFWLYLW\JURXS IRU
H[DPSOH1$)3* 
 &KRRVH 2SWLPL]HG
6HHWKHGRFXPHQWDWLRQIURPWKH 5
,PSRUWDQWLQIRUPDWLRQZLQGRZDERYHIRU
WKHEHQHILWVRIWKLVRSWLRQ

<RXDOVRKDYHWKHRSWLRQWRXVH ,GHQWLFDOWRSURILOHLI\RXZRXOGOLNHWRKDYHWKH
DXWKRUL]DWLRQVGDWDFRQYHUWHGLGHQWLFDOO\LQWKHDFWLYLW\JURXS7KH0HQXWDEZRXOG
UHPDLQHPSW\WKRXJK7KH0HQXWDEDOVRUHPDLQVHPSW\LI\RXFKRRVH 2SWLPL]HG
XQOHVV\RXKDYHGLVFUHWHYDOXHVIRU6B7&2'(LQ\RXUSURILOH*HQHULFYDOXHVVXFKDV6(
RUUDQJHVIURP6¥3DUHLJQRUHG

 &KRRVH<HV

Release 4.6 A/B


14–5
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups

7KH/LVWRIDFWLYLW\JURXSFUHDWHG
VFUHHQDSSHDUV
 'RXEOHFOLFNRQWKHDFWLYLW\JURXS

7KH&KDQJH$FWLYLW\*URXSVVFUHHQ
DSSHDUV7RPDLQWDLQWKHDFWLYLW\
JURXSSHUIRUPWKHIROORZLQJVWHSV
 ,Q'HVFULSWLRQWKHGHVFULSWLRQWKDW
H[LVWHGIRUWKH68FUHDWHGSURILOH
ZLOOGHIDXOWLQWRWKLVILHOG
9

$WWKHWLPHRIWKLVZULWLQJWKH68
FUHDWHGORQJGHVFULSWLRQWH[WZDVQRW
10
FRSLHGLQWRWKHQHZO\FUHDWHG
DFWLYLW\JURXS
 2QWKH'HVFULSWLRQWDESURYLGHD
GHWDLOHGGHVFULSWLRQXQGHU$FWLYLW\
JURXSGHVFULSWLRQ

Authorizations Made Easy


14–6
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups

2QWKH0HQXWDE\RXFDQDGGRWKHU
WUDQVDFWLRQVRUZHEDGGUHVVHV,ILQWKH
PDQXDOO\FUHDWHGSURILOH\RXKDGD
YDOXHLQWKHDXWKRUL]DWLRQREMHFW
6B7&2'(WKHV\VWHPFUHDWHVDPHQX
7KLVPHQXZLOOEHWKHODXQFKSDGIRUWKH
XVHUIRUWKH(DV\$FFHVVPHQX

 2QWKH$XWKRUL]DWLRQVWDEFKRRVH
&KDQJHDXWKRUL]DWLRQGDWD

11

Release 4.6 A/B


14–7
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups

 5HYLHZDOOWUDIILFOLJKWVWKDWDUHQRW 13 15
JUHHQDQGFOLFNRQ WRSODFHYDOXHV
LQWKHILHOG RUFOLFNRQWKHDVWHULVNWR 14
DOORZDOOYDOXHVLQWKLVILHOG 
:KHQDOOYDOXHVDUHFRPSOHWHWKH 12
WUDIILFOLJKWVWXUQJUHHQ
 &KRRVH 
 7RFUHDWHWKHSURILOHFKRRVH 
 &KRRVH 

 2QWKH8VHUWDEFKRRVH
8VHUFRPSDUH&RPSDUHWKHXVHU
PDVWHUUHFRUGWRWUDQVIHUWKH
JHQHUDWHGSURILOHYDOXHVWRWKHXVHU
PDVWHU7KLVUHFRUGPD\GLIIHUIURP
WKHRULJLQDOGHSHQGLQJRQWKH
DGMXVWPHQWVWKDWZHUHPDGH

16

Tip

,IDXVHUZDVDVVLJQHGWRDSURILOHWKHQ
WKHXVHULVDXWRPDWLFDOO\DVVLJQHGWRWKH
MXVWFUHDWHGDFWLYLW\JURXS

Authorizations Made Easy


14–8
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups

5HPRYLQJ8VHU$VVLJQPHQWVIURPWKH2ULJLQDO683URILOH
<RXFDQUHPRYHWKHXVHUDVVLJQPHQWIURPDSURILOHZLWK68RU68,QWKHIROORZLQJSURFHGXUHZH
GHPRQVWUDWHKRZWRUHPRYHDXVHUDVVLJQPHQWIURPDSURILOHWKDWKDVEHHQFUHDWHGZLWKRXWWKH3*
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSU25DQGFKRRVH(QWHU
 &KRRVHVWHS&RS\GDWDIURPROG
SURILOHV

 7RFRQWLQXHFKRRVH 

Release 4.6 A/B


14–9
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups

$OLVWZLWKDOODFWLYHSURILOHDSSHDUV
 6HOHFWWKHSURILOH V IURPZKLFK\RX
ZRXOGOLNHWRUHPRYHWKHXVHU 5
DVVLJQPHQW IRUH[DPSOH1$)B 
 7RGHOHWHWKHDVVLJQPHQWFKRRVH
8VHUDVVLJQPHQWV
4

 &KRRVH<HV

 7KHV\VWHPUHWXUQVWKHDIIHFWHG
XVHUVDQGUHPRYHGSURILOHVWKDW
ZHUHUHPRYHGIURPWKHXVHUPDVWHU 9
UHFRUGV
,IQRXVHUVZHUHDVVLJQHG\RX
UHFHLYHQRPHVVDJH 7

 <RXFDQQRZFKHFNWKHVHOHFWHGXVHU
PDVWHUUHFRUGWRVHHWKDWWKH
DVVLJQPHQWVWRWKHPDQXDOO\FUHDWHG
SURILOHVZHUHUHPRYHG
 &KRRVH WRUHWXUQ

Authorizations Made Easy


14–10
Chapter 14: Upgrade
Upgrading from a Release Prior to 3.1x to 4.6 A/B

8SJUDGLQJIURPD5HOHDVH3ULRUWR[WR$%

5HDGFKDSWHU6HWWLQJXSWKH3URILOH*HQHUDWRUDQGFKDSWHU7LSV 7URXEOHVKRRWLQJLI
< <RXDUHXSJUDGLQJIURPDUHOHDVHSULRUWR*
< ,QWKHUHOHDVHSULRUWR*\RXFRXOGQRWRUGLGQRWXVHWKH3*
< <RXZDQWWRZRUNZLWKWKH3*QRZ
<RXIDFHWZRPDLQTXHVWLRQV
< 'R\RXFRQYHUWWKHDXWKRUL]DWLRQSURILOHVFUHDWHGZLWKWUDQVDFWLRQV68DQG68LQWR
SURILOHVWKDWFDQEHPDLQWDLQHGE\WKH3*"
< 'R\RXUHFUHDWHWKHDXWKRUL]DWLRQSURILOHVIURPVFUDWFKXVLQJWKH3*"
7KHIROORZLQJVHFWLRQVSURYLGHVRPHKLQWVWRDQVZHULQJWKHVHTXHVWLRQV

&RQYHUWLQJ([LVWLQJ$XWKRUL]DWLRQ3URILOHVIRUWKH3URILOH*HQHUDWRU
)LUVWFUHDWHDQGVDYHDQHZDFWLYLW\JURXSIRUHDFKMRE5DWKHUWKDQVHOHFWLQJEXVLQHVV
WUDQVDFWLRQVIURPWKHFRPSDQ\PHQXWUHHFKRRVHWKH$XWKRUL]DWLRQVWDELQWKH&KDQJH
$FWLYLW\*URXSVVFUHHQ7KHQIROORZWKHVWHSVGHVFULEHGLQFKDSWHU,QVHUWLQJ$XWKRUL]DWLRQV
IURPD3URILOH
7KHDGYDQWDJHWRWKLVPHWKRGLVWKDW\RXFDQZRUNZLWKH[LVWLQJZHOOWHVWHGSURILOHV,I
REMHFW6B7&2'(GRHVQRWKDYHDQDXWKRUL]DWLRQPDQXDOO\LQVHUWRQH0DLQWDLQWKH
SHUPLWWHGWUDQVDFWLRQIRUHDFKDFWLYLW\JURXSDVDXWKRUL]DWLRQYDOXHVIRUREMHFW6B7&2'(LQ
WKHSURILOH\RXZLOOJHQHUDWHIRUWKLVDFWLYLW\JURXS<RXFDQRIFRXUVHPDLQWDLQDQDVWHULVN
EXWWKLVLVDGLVDGYDQWDJHEHFDXVHXVHUVZRXOGUHFHLYHPRUHDFFHVVWKDQ\RXZDQWWR
JLYHWKHP7KHRWKHUGLVDGYDQWDJHLVWKDWVLQFHWKHXVHUVSHFLILFPHQXLVPLVVLQJ\RX
FDQQRWUHFUHDWHWKHLQIRUPDWLRQVDYHGLQDQDFWLYLW\JURXS<RXPD\FRQYHUW\RXUROG
SURILOHVDQGZRUNZLWKWKHPXQWLO\RXQHHGWRUHFUHDWHDQGGHOHWHWKHP
6HHDOVR&RQYHUWLQJ3UHYLRXVO\&UHDWHG683URILOHVWR$FWLYLW\*URXSVRQSDJH²

5HFUHDWLQJWKH$XWKRUL]DWLRQ3URILOHVIURP6FUDWFK8VLQJWKH3URILOH
*HQHUDWRU
)ROORZWKHLQVWUXFWLRQVLQFKDSWHU8VHU5ROH7HPSODWHVFKDSWHU$GYDQFHG3URILOH*HQHUDWRU
)XQFWLRQDOLW\DQGFKDSWHU0LVVLQJ$XWKRUL]DWLRQV

Release 4.6 A/B


14–11
Chapter 14: Upgrade
Upgrading from Release 3.0F to 4.6 A/B

8SJUDGLQJIURP5HOHDVH)WR$%

$QXSJUDGHIURP5HOHDVH)WR$LVQRWSRVVLEOHLI\RXXVH5+56XSSRUW
3DFNDJHV)XUWKHULQIRUPDWLRQLVDYDLODEOHLQ6$31HW5)URQWHQGQRWH

$IWHU\RXUXSJUDGHLI\RXFUHDWHDFWLYLW\JURXSVDQGJHQHUDWHSURILOHVLQ5HOHDVH)
ZLWKWKHSUHOLPLQDU\YHUVLRQRIWKH3*WKHQ
 0DNHVXUHWKDWWKHLQVWDQFHSURILOHSDUDPHWHUDXWKQRBFKHFNBLQBVRPHBFDVHVLVVWLOODFWLYH
)ROORZWKHLQVWUXFWLRQVLQFKDSWHUWKHVHFWLRQ&KHFNLQJWKH5HTXLUHG,QVWDQFH3URILOH
3DUDPHWHU,IWKHSDUDPHWHULVLQDFWLYHLWQHHGVWREHDFWLYDWHG
7KH3*LVDOUHDG\DFWLYHLQ5HOHDVHWKRXJK
$SSO\WKHDSSURSULDWHDGYDQFHFRUUHFWLRQVIRU5HOHDVHRUDQ\DYDLODEOH+RW3DFNDJH
E\UHIHUULQJWRFKDSWHUWKHVHFWLRQ$SSO\LQJ$GYDQFH&RUUHFWLRQVWR\RXU56\VWHP
 %HFDXVHWKHFXVWRPHUWDEOHV862%;B&DQG862%7B&ZHUHQRWDSDUWRIWKH5HOHDVH)
YHUVLRQRIWKH3*FRS\WKH6$3GHIDXOWVLQWKHVHFXVWRPHUWDEOHV
7RFRS\WKHVHGHIDXOWVUXQWUDQVDFWLRQ68DQGSHUIRUPWKHVWHSVLQFKDSWHUWKH
VHFWLRQ/RDGLQJWKH862%;B&DQG862%7B&7DEOHV,QWUDQVDFWLRQ68SHUIRUPWKHILUVW
VWHSFDOOHG,QLWLDOO\ILOOWKHFXVWRPHUWDEOHV
$OVRUHDGFKDSWHUWKHVHFWLRQ5HGXFLQJWKH6FRSHRI$XWKRUL]DWLRQ&KHFNVWROHDUQPRUH
DERXWWKHQHZIXQFWLRQDOLW\7KHQGHFLGHZKHWKHU\RXQHHGWRSHUIRUPDGGLWLRQDOVWHSV
RQWKHFKHFNLQGLFDWRUVHWWLQJVIRUWKHWUDQVDFWLRQV\RXDUHXVLQJ
 $IWHUWKHXSJUDGHWR5HOHDVH[DSURILOHPDWFKXSLVUHTXLUHGIRUDOOSURILOHVJHQHUDWHG
LQ5HOHDVH)$IWHUWKHXSJUDGHWKH3*GRHVQRWDXWRPDWLFDOO\LQIRUP\RXWKDWD
FRPSDULVRQLVQHFHVVDU\IRUWKHVHSURILOHV LQWUDQVDFWLRQ3)&*WKHOLJKWRQWKH
$XWKRUL]DWLRQVWDEUHPDLQVJUHHQIRUWKHSURILOHVFUHDWHGLQ5HOHDVH)DQGWUDQVDFWLRQ
683&GRHVQRWLQGLFDWHZKHWKHUDPDWFKXSLVDFWXDOO\UHTXLUHG 1HYHUWKHOHVVWKH6$3
GHIDXOWGDWDIRUFKHFNLQGLFDWRUVDQGILHOGYDOXHVLQWKHQHZUHOHDVHKDVEHHQLPSURYHG
VRWKDWDSURILOHPDWFKXSLVHVVHQWLDOWRHQVXUHSURSHUZRUNLQJSURILOHVDIWHUWKH
XSJUDGH

Authorizations Made Easy


14–12
Chapter 14: Upgrade
Upgrading from Release 3.0F to 4.6 A/B

7RSHUIRUPDSURILOHPDWFKXS
 $FFHVVWKH3* WUDQVDFWLRQPFCG 
 6HOHFWDQDFWLYLW\JURXSFUHDWHGLQ
5HOHDVH<RXFDQRQO\VHOHFW
RQHDFWLYLW\JURXSDWDWLPH VHH
WKHIROORZLQJ7LSV 7ULFNV 

7KLVSURFHGXUHKDVWREHSHUIRUPHG
IRUHDFKDFWLYLW\JURXSVHSDUDWHO\7R
VSHHGXSWKHSURFHVVXVHWUDQVDFWLRQ
683&ZKHUH\RXJHWDOLVWRIDOO
DFWLYLW\JURXSV6HOHFWWKHDFWLYLW\
JURXSWKDWQHHGVWREHPDLQWDLQHGE\
GRXEOHFOLFNLQJRQLW
 &KRRVH &KDQJH
 &KRRVHWKH$XWKRUL]DWLRQVWDE
 &KRRVH ([SHUWPRGHIRUSURILOH
JHQHUDWLRQ

Release 4.6 A/B


14–13
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

 6HOHFW5HDGROGVWDWXVDQGPHUJH
ZLWKQHZGDWDDVWKHFRUUHFW
PDLQWHQDQFHW\SH
 &KRRVH DQGSRVWPDLQWDLQDQ\ 6
RSHQDXWKRUL]DWLRQILHOGVRQWKH
QH[WVFUHHQLIUHTXLUHG 7

'XHWRFKDQJHVLQWKH6$3GHIDXOWVIRUFKHFNLQGLFDWRUVDQGILHOGYDOXHVLQ5HOHDVH[WKH3*PD\
FUHDWHVRPHQHZDXWKRUL]DWLRQV,I\RXVHHQHZDXWKRUL]DWLRQVFUHDWHGZKHUH\RXKDYHDOUHDG\
PDLQWDLQHGDXWKRUL]DWLRQVGHDFWLYDWHRUGHOHWHWKHP
7KHV\VWHPLQFOXGHVWKHQHZUHTXLUHGDXWKRUL]DWLRQVZLWKRXWFKHFNLQJIRUH[LVWLQJRQHV7KLVIHDWXUH
PD\VRXQGXQXVXDOEXWRIIHUVLPSURYHGV\VWHPSHUIRUPDQFH7RSRVWPDLQWDLQDOORSHQDXWKRUL]DWLRQ
ILHOGVIROORZWKHLQVWUXFWLRQVLQFKDSWHU5HJHQHUDWLQJWKH$XWKRUL]DWLRQ3URILOHVDIWHU0DNLQJ&KDQJHV
 $IWHUUHJHQHUDWLQJDOOWKHSURILOHV\RXKDYHFRPSOHWHGWKHXSJUDGHVWHSVIRUDXWKRUL]DWLRQSURILOHV
FUHDWHGLQ5HOHDVH)
1RXVHUPDVWHUFRPSDULVRQLVUHTXLUHGIRUSURILOHVDOUHDG\DVVLJQHGWRXVHUVEXWUHPHPEHUWKDW
FKDQJHVEHFRPHDFWLYHZLWKWKHQH[WV\VWHPORJRQ

8SJUDGHIURP5HOHDVHV*+,WR$%

$IWHUFUHDWLQJDFWLYLW\JURXSVDQGJHQHUDWLQJSURILOHVLQ5HOHDVHV*+,$RU%[ZLWK
WKH3*ZKHQ\RXXSJUDGHWR5HOHDVH[
 0DNHVXUHWKDWWKHLQVWDQFHSURILOHSDUDPHWHUDXWKQRBFKHFNBLQBVRPHBFDVHVLVVWLOODFWLYH
7RGRVRIROORZWKHLQVWUXFWLRQVLQFKDSWHUWKHVHFWLRQ&KHFNLQJWKH5HTXLUHG,QVWDQFH3URILOH3DUDPHWHU
,IWKHSDUDPHWHULVQRWDFWLYHLWQHHGVWREHDFWLYDWHG7KH3*LVVHWWRDFWLYHLQ5HOHDVH
$SSO\WKHDSSURSULDWHDGYDQFHFRUUHFWLRQVIRU5HOHDVHRUDQ\DYDLODEOH+RW3DFNDJHE\UHIHUULQJWR
FKDSWHU$SSO\LQJ$GYDQFH&RUUHFWLRQVWR\RXU56\VWHP
 ,QWKH&RPPDQGILHOGHQWHUWUDQVDFWLRQSU25DQGFKRRVH(QWHU

Authorizations Made Easy


14–14
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

 &KRRVHVWHS$3UHSDUDWLRQ
&RPSDUHZLWK6$3YDOXHV7KLVVWHS
LVXVHGWRSUHSDUHIRUVWHSV%DQG
&

 &KRRVH .

7KLVVWHSPLJKWWDNHVHYHUDO
PLQXWHV.

Release 4.6 A/B


14–15
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

 &KRRVH%&RPSDUHWUDQVDFWLRQV

 &KRRVH 
7KHXSJUDGHUHSRUW\RXVWDUWHGLQ
VWHS$XSGDWHVFXVWRPHUWDEOHV
862%;B&DQG862%7B&EXWGRHV
QRWRYHUZULWHWKHHQWULHV\RX
FKDQJHGLQUHOHDVHVEHIRUH[
,I\RXKDYHQRWFKDQJHGFKHFN
LQGLFDWRUVDQGILHOGYDOXHVZLWK
WUDQVDFWLRQ68LQUHOHDVHVEHIRUH
[\RXZLOOVHHWKHIROORZLQJ
VWDWXVPHVVDJH
<RXGRQRWQHHGWRPDLQWDLQWKH
WUDQVDFWLRQ

Authorizations Made Easy


14–16
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

 ,I\RXPDGHFKDQJHVWKHVHFKDQJHV
ZLOOVWLOOEHDFWLYHDIWHUWKH
XSJUDGH7KHRXWSXWZLOOEHDOLVW
RIDIIHFWHGWUDQVDFWLRQV LQRXUFDVH
LWLV0. 
7 8
 ,QWKHRXWSXWOLVWRIWUDQVDFWLRQV
\RXFDQVHHWKH6WDWXVZKLFKVKRZV
ZKHWKHUDWUDQVDFWLRQKDVDOUHDG\
EHHQFKHFNHG

 6HOHFWDWUDQVDFWLRQZKHUHWKH
FXUUHQWVWDWXVLV7REHFKHFNHG
 &KRRVH 6HWWRFKHFNHGWRVHWWKH 12 11 10
VWDWXVWRFKHFNHGZLWKRXWFKDQJLQJ
DQ\FKHFNLQGLFDWRUVHWWLQJVIRUWKLV
WUDQVDFWLRQ
9
 &KRRVHWKH 7UDQVIHUUHPDLQLQJ
6$3GHIDXOWVEXWWRQWRFKDQJHWKH
FXUUHQWDFWLYHFKHFN,'VHWWLQJWR
WKH6$3GHIDXOWYDOXHDQGWKH
VWDWXVWRFKHFNHG
 &KRRVH &KHFNLQGLFDWRU
 &KRRVH  13 15
,I\RXVDYHZLWKRXWPDNLQJDQ\
FKDQJHVWKHVWDWXVLVDXWRPDWLFDOO\
VHWWRFKHFNHGDQGWKHFKDQJHV
UHPDLQ
 &KRRVHDQ\RWKHUPHQXRSWLRQWR
14
PDNHDGGLWLRQDOFKDQJHVWRWKLV
WUDQVDFWLRQDQGLWVVHWWLQJVIRU
FKHFNLQGLFDWRUVDQGILHOGYDOXHV
 2QFHILQLVKHGFKRRVH 

Release 4.6 A/B


14–17
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

 7KHVWDWXVKDVFKDQJHGWRFKHFNHG
 7RXVHWKH6$3GHIDXOWYDOXHVIRU
DOOWKHWUDQVDFWLRQVWKDW\RXKDYH
QRW\HWPDQXDOO\FKHFNHGFKRRVH 17
WKH 7UDQVIHUUHPDLQLQJ6$3
GHIDXOWVEXWWRQWRFRS\DQ\
UHPDLQLQJ6$3GHIDXOWYDOXHV LQ 16
RXUFDVHZHGRQRWKDYHDQ\
IXUWKHUWUDQVDFWLRQV 

 &KRRVH 

18

 ,I\RXKDGRWKHUWUDQVDFWLRQVDOO 20
WKHLUVWDWXVHVZRXOGKDYHEHHQVHW
WRFKHFNHG
 &KRRVH 

19

Authorizations Made Easy


14–18
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

 &KRRVH&$FWLYLW\JURXSVWREH
FKHFNHG

21

 &KRRVH 
7KHRXWSXWLVDOLVWRIDFWLYLW\
JURXSVWKDWDUHDIIHFWHGE\HLWKHU
FKDQJHV\RXPDGHRUE\FKDQJHV
IURPRXULPSURYHGGHIDXOWGDWD

22

Release 4.6 A/B


14–19
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

 )RUWKHOLVWHGDFWLYLW\JURXSV
FKDQJHVKDYHEHHQPDGHWRFKHFN
LQGLFDWRUVRUGHIDXOWWUDQVDFWLRQ
YDOXHV7KHUHIRUHWKH
FRUUHVSRQGLQJDXWKRUL]DWLRQ
SURILOHVQHHGWREHDGMXVWHG
0DNHVXUH\RXVHOHFWHDFKHQWU\LQ
WKLVOLVW
 'RXEOHFOLFNRQWKHDFWLYLW\JURXS 23
24
\RXZRXOGOLNHWRDGMXVW

 'HSHQGLQJRQWKHFKDQJHV\RXPLJKWKDYHWRPDLQWDLQWKHFRUUHFWRUJDQL]DWLRQDOOHYHO

 3RVWPDLQWDLQDQ\RSHQ
25
DXWKRUL]DWLRQILHOGVLIUHTXLUHG
\HOORZRUUHGOLJKWV 
'XHWRFKDQJHVLQWKH6$3GHIDXOWV
IRUFKHFNLQGLFDWRUVDQGILHOG
YDOXHVWKH3*PD\FUHDWHVRPH
QHZDXWKRUL]DWLRQVLQ5HOHDVH[
<RXZLOOVHHQHZDXWKRUL]DWLRQV
FUHDWHGZKHUH\RXKDYHDOUHDG\ 26
PDLQWDLQHGDXWKRUL]DWLRQV WKHVH
DUHLGHQWLILHGE\WKHRQHVWKDWVD\
1HZ -XVWDFWLYDWHRUGHOHWHWKH
QHZDXWKRUL]DWLRQV7KHV\VWHP
LQFOXGHVWKHQHZUHTXLUHG
DXWKRUL]DWLRQVZLWKRXWFKHFNLQJ
IRUH[LVWLQJRQHVIRUWKHVDPH
DXWKRUL]DWLRQREMHFW7KLVIHDWXUH
PD\VRXQGXQXVXDOEXWKDVPRUH
DGYDQWDJHVWKDQGLVDGYDQWDJHVDQG
DOVRLPSURYHV3*SHUIRUPDQFH
7RSRVWPDLQWDLQDOORSHQDXWKRUL]DWLRQILHOGVIROORZWKHLQVWUXFWLRQVLQFKDSWHUWKHVHFWLRQ
5HJHQHUDWLQJWKH$XWKRUL]DWLRQ3URILOHV$IWHU0DNLQJ&KDQJHV

 $IWHUUHJHQHUDWLQJFKRRVH 
 &RQWLQXHZLWKWKHQH[WHQWU\LQWKHOLVWRIDFWLYLW\JURXSVZLWKWKLVVDPHSURFHGXUHXQWLO\RXKDYH
DGMXVWHGDOODFWLYLW\JURXSV

Authorizations Made Easy


14–20
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

$IWHUFRPSOHWLQJVWHSV$%DQG&\RXKDYHSHUIRUPHGWKHPRVWLPSRUWDQWVWHSVDIWHU
\RXU5HOHDVH$%XSJUDGH
<RXVWLOOQHHGWRSHUIRUPVWHS7UDQVSRUWWKHFXVWRPHUWDEOHVDQGWUDQVSRUWWKHFKDQJHV\RX
PDGHLQVWHSVDQGWR\RXURWKHU5V\VWHPV$OOV\VWHPVPXVWKDYHWKHVDPHVHWWLQJVIRU
FKHFNLQGLFDWRUVDQGILHOGYDOXHV

 &KRRVH''LVSOD\FKDQJHG
WUDQVDFWLRQFRGHV
7KLVUHSRUWOLVWVDOODFWLYLW\JURXSV
ZKHUHWUDQVDFWLRQVKDYHEHHQ
UHSODFHGE\RWKHUWUDQVDFWLRQV7KH
ROGDQGQHZWUDQVDFWLRQVDUHDOVR
GLVSOD\HG<RXFDQFKDQJHWKH
WUDQVDFWLRQFRGHLQWKH
FRUUHVSRQGLQJDFWLYLW\JURXSE\
GRXEOHFOLFNLQJRQWKHHQWU\LQWKH
OLVW

<RXKDYHFRPSOHWHGWKHXSJUDGH 29
VWHSVIRUDXWKRUL]DWLRQSURILOHV
FUHDWHGLQUHOHDVHVSULRUWR[

Release 4.6 A/B


14–21
Chapter 14: Upgrade
Upgrade from Releases 4.0x or 4.5x to 4.6 A/B

8SJUDGHIURP5HOHDVHV[RU[WR$%

,I\RXDUHXSJUDGLQJIURP[RU[WR$%\RXVKRXOGSURFHHGIURPVWHSV$WR'
LQWKHVDPHZD\DVLQWKHVHFWLRQEHIRUH
,QUHVSRQVLELOLWLHVQRORQJHUH[LVW
,I\RXZRUNHGZLWKWKH56\VWHPLQ5HOHDVH[RUUHDGWKH%$XWKRUL]DWLRQV0DGH(DV\
JXLGHERRNWKHQ\RXPD\KDYHZRQGHUHGZKDWKDSSHQHGWRWKHIXQFWLRQDOLW\FDOOHG
´UHVSRQVLELOLWLHVµ,Q5HOHDVHDQGUHVSRQVLELOLWLHVZHUHUHSODFHGE\DFRQFHSWFDOOHG
´GHULYHGDFWLYLW\JURXSVµDQGWKHVHGHULYHGDFWLYLW\JURXSVIXQFWLRQVOLJKWO\GLIIHUHQWIURP
WKHUHVSRQVLELOLWLHV,I\RXXVHGUHVSRQVLELOLWLHVLQDQGXSJUDGHWR\RXU
UHVSRQVLELOLWLHVDUHFRQYHUWHGDXWRPDWLFDOO\LQWRGHULYHGDFWLYLW\JURXSV
)RUGHWDLOHGLQIRUPDWLRQRQGHULYHGDFWLYLW\JURXSVVHHWKHFRUUHVSRQGLQJVHFWLRQLQ
FKDSWHU&RS\LQJDQG'HULYLQJ$FWLYLW\*URXSV

Authorizations Made Easy


14–22
$SSHQGL[$ 6$31HW²5)URQWHQG1RWHV $

&RQWHQWV

Overview ................................................................................................................. A–2


SAPNet – R/3 Frontend Notes............................................................................... A–3

A–1
Appendix A: SAPNet – R/3 Frontend Notes
Overview

2YHUYLHZ

6$31HW²5)URQWHQGQRWHVIRUPHUO\NQRZQDV2QOLQH6HUYLFH6XSSRUW 266 FRQWDLQV


LQIRUPDWLRQUHJDUGLQJNQRZQHUURUV DQGVXEVHTXHQWPHDQVRIDGGUHVVLQJVXFKHUURUV 
VRPHDGYLFHDQGJHQHUDOLQIRUPDWLRQUHODWHGWRWKH56\VWHP,WDOVRVHUYHVDVRQHRIWKH
FRUHPHDQVRIFRPPXQLFDWLQJSUREOHPVZLWK\RXU56\VWHPWRWKH6$35VXSSRUW
VHUYLFHVSRUWLRQRIWKH6$3ZRUOGZLGHRUJDQL]DWLRQ7KHVXSSRUWV\VWHPPDLQWDLQHG
HQWLUHO\E\6$3FRQWDLQVKXQGUHGVRIWKRXVDQGVRI´QRWHVµWKDWDGGUHVVWRSLFVUDQJLQJ
IURP5V\VWHPV5V\VWHPVDQGPDQ\RIWKHDGGRQFRPSRQHQWVWRWKHVHV\VWHPV)RU
PRUHLQIRUPDWLRQDERXWZKDWWKH6$31HW²5)URQWHQGV\VWHPLVSOHDVHUHIHUWR
ZZZVDSFRPDQGJRWRWKH6$31HWVHFWLRQ
7KHQRWHQXPEHUVSURYLGHGLQWKLVDSSHQGL[UHSUHVHQWRQO\DIUDFWLRQRIDOOWKHQRWHVUHODWHG
WRDXWKRUL]DWLRQV$VKXQGUHGVRIQRWHVIRUWKHYDULRXV6$3SURGXFWVDUHFUHDWHGHYHU\GD\
WKLVOLVWLQJRIQRWHVUHSUHVHQWV´DVQDSVKRWLQWLPHµRIWKRVHWKDWH[LVWHGDWWKHWLPHWKLV
ZULWLQJDQGZHUHVHOHFWLYHO\LQFOXGHGKHUH,WLVE\QRPHDQVDFRPSUHKHQVLYHOLVW
1RWHVLQ6$31HW²5)URQWHQGDUHVHSDUDWHGLQPDQ\ZD\V2QHRIWKHPRVWFRPPRQ
ZD\VLVE\WKH´&RPSRQHQWµRU´$SSOLFDWLRQ$UHDµLQWKHV\VWHPWKDWZDVDIIHFWHG7KH
IROORZLQJWDEOHGHVFULEHVVRPHRIWKHPRVWFRPPRQDSSOLFDWLRQDUHDVZKHUHQRWHVPD\EH
IRXQG7KHVHDUHDVFDQEHXVHGWRVHDUFKWKH6$31HW²5)URQWHQGQRWHVGDWDEDVHIRU
DGGLWLRQDOVHFXULW\DGPLQLVWUDWRULQIRUPDWLRQ

$SSOLFDWLRQ$UHD 'HVFULSWLRQ

%&&&0 &RPSXWLQJ&HQWHU0DQDJHPHQW6\VWHP
%&&&0865 8VHUVDQG$XWKRUL]DWLRQV
%&&&0865$'0 8VHUVDQG$XWKRUL]DWLRQV0DLQWHQDQFH
%&&&0865.51 8VHUVDQG$XWKRUL]DWLRQV.HUQHO)XQFWLRQV
%&&&08653)& 3URILOH*HQHUDWRU
%&&7625* :RUNEHQFK&XVWRPL]HU2UJDQL]HU
%&)(66(0 6HVVLRQ0DQDJHU
%&6595(3 5HSRUWLQJ
%&%0720 2UJDQL]DWLRQDO0DQDJHPHQW
%&%072020 2UJDQL]DWLRQDO3ODQ
),$3$3% 3D\PHQW3URJUDP3D\PHQW7UDQVIHU
00,0*)5(3 ,05HSRUWLQJ QR/,6
3$3$;; $OO&RXQWULHV 3HUVRQQHO$GPLQLVWUDWLRQ

Authorizations Made Easy


A–2
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes

(DFKDSSOLFDWLRQDUHDFDQDOVREHVHDUFKHGXVLQJDNH\ZRUGVXFKDVSURILOHJHQHUDWRU3)&*DFWLYLW\JURXS
SUHGHILQHGDFWLYLW\JURXSVDXWKRUL]DWLRQSURILOHXVHU68VHFXULW\DQGVRRQ

6$31HW²5)URQWHQG1RWHV

$VRI'HFHPEHU
/HJHQG
< 5, 5HOHDVHLQGHSHQGHQW
<  $%
< 25 ROGHUUHOHDVHEXWVWLOOYDOXDEOHLQIRUPDWLRQ

6XEMHFW 5HOHDVH 1RWH 7LWOH

$XWKRUL]DWLRQ&KHFN 5,  :KLFKDXWKRUL]DWLRQREMHFWVDUHFKHFNHG


$XWKRUL]DWLRQ 5,  1DPLQJFRQYHQWLRQVIRUDXWKRUL]DWLRQV
$XWKRUL]DWLRQ&KHFN 5,  $XWKRUL]DWLRQFKHFNDVKRUWLQWURGXFWLRQ
$XWKRUL]DWLRQ&RQFHSW 5,  4XHVWLRQVUHJDUGLQJWKHDXWKRUL]DWLRQFRQFHSW
$XWKRUL]DWLRQV 5,  $XWKRUL]DWLRQSURWHFWLRQRI$%$3SURJUDPV
5HSRUWLQJ7UHH
$XWKRUL]DWLRQV7UDFH 5,  7UDFHIXQFWLRQPXOWLSOHXVHUV
'RFXPHQWDWLRQ%DVLV 25  ,QIRIRUFXVWRPHU%DVLV.QRZOHGJH3URGXFWV
.QRZOHGJHZDUH
3URGXFWV
+RW3DFNDJHV 25  ,PSRUWDQW,QIRUPDWLRQDERXW+RW3DFNDJHV
+RW3DFNDJHV  &RQIOLFWVEHWZHHQ6XSSRUW3DFNDJHV/&3V $GGRQV
+RW3DFNDJHV  1HZ+RW3DFNDJHVIRU3URILOH*HQHUDWRU
.QRZOHGJHZDUH 25  4XHVWLRQVDQGDQVZHUVRQWKH5%DVLV.QRZOHGJH
3URGXFWV 3URGXFW&'V
1DPLQJ&RQYHQWLRQV  &XVWRPHUQDPHUDQJHIRU6$3REMHFWV
2UJDQL]DWLRQDO  3'DQG:RUNIORZDSSOLFDWLRQGRQRWUXQFRUUHFWO\
0DQDJHPHQW
266 5,  2665HJLVWUDWLRQ)RUP IRU1RUWK$PHULFD
266 5,  'RFXPHQWDWLRQRQWUDLQLQJLQIRLQWKH266
266 5,  6HDUFKSURFHGXUHIRUQRWHVDQGPHVVDJHVLQ266
266 5,  6$3$PHULFD·V3URGXFWLRQ5HJLVWUDWLRQ)RUP

Release 4.6A/B
A–3
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes

6XEMHFW 5HOHDVH 1RWH 7LWOH

266 5,  6$3/2*21IRU266


266 25  6HUYLFHFRQQHFWLRQV&RPSRVLWHQRWH RYHUYLHZ
266 5,  6WUXFWXUHRIDSSOLFDWLRQDUHDVLQ266
266 5,  8VHUPDLQWHQDQFHDQGFUHDWLRQLQ266IRUFXVWRPHU
266 25  )/&6)HHGEDFNIRUWKH1RWHVZLWKLQWKH2666\VWHP
266 5,  266FRUSRUDWHJURXSIXQFWLRQDOLW\&ROOHFWLYHQRWH
266 5,  &RQILUPDWLRQRI2665HJLVWUDWLRQ
266DQG266 5,  /RJRQWR266 7UDQVDFWLRQ266
266DQG266 5,  266:KDWWRGRLI5ZLOOQRWUXQ
266DQG266 5,  *XLGHOLQHVIRU266 9HUVLRQIRU6$36(59
266DQG266 5,  (DV\WRXVHJXLGHIRU7UDQVDFWLRQ266
266DQG3ULQWLQJ 5,  3ULQW'RZQORDGLQ266
266DQG3ULQWLQJ 5,  'RZQORDGLQJ²3ULQWLQJQRWHVLQ266
3DVVZRUGVLQ5 5,  $QVZHUVRQ´6HFXULW\µ
3DWFKGRZQORDGIURP 5,  $GYDQFHWUDQVSRUWVWRFXVWRPHUV
6$36(59[
3URILOH*HQHUDWRU  3UREOHPVZLWKWDEOH60(1B'$7(6
3URILOH*HQHUDWRU  0LVVLQJDXWKRUL]DWLRQZKHQXVLQJWKH3URILOH*HQHUDWRU
3URILOH*HQHUDWRU  SUREOHPIRUWKH3*
3URILOH*HQHUDWRU 5,  5HJHQHUDWLRQRIDFWLYLW\JURXSVDXWKRUL]DWLRQORVV
3URILOH*HQHUDWRU 5,  0HUJ3URFHVVZLWKDXWKRUL]DWLRQGDWD([SODQDWLRQ
3URILOH*HQHUDWRU 25  7UDQVSRUWLQJ3'REMHFWVE\FOLHQWFRS\
7UDQVSRUW3'REMHFWV
DFWLYLW\JURXSV
5HSRUW5+$8783 25  $FWLYLW\JURXSPDLQWXVHUPDVWHUGDWDFRPSDULVRQ
6$36RIWZDUH&KDQJH 25  6$36RIWZDUH&KDQJH5HJLVWUDWLRQ 66&5
5HJLVWUDWLRQ
6$3B1(: 5,  :KDWGRHVWKHSURILOH6$3B1(:GR"
6$31HW 5,  $FFHVVWRWKH6$31HWVHUYHUZLWK2668VHU,'
6$36(59[ 25  7UDQVIHUULQJFXVWRPHUILOHVWRVDSVHUYZLWKIWS
6HFXULW\LQ5 5,  &RQVHTXHQFHVLQWUDQVSRUWGXULQJSDVVZRUGFKDQJH

Authorizations Made Easy


A–4
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes

6XEMHFW 5HOHDVH 1RWH 7LWOH

6HFXULW\LQ5 5,  'DWDSURWHFWLRQDQGVHFXULW\LQ5


6HFXULW\LQ5 5,  6HFUHF\DQG'DWD6HFXULW\2EOLJDWLRQV
6HFXULW\LQ5$%$3 5,  6HFXULW\DVSHFWVLQ$%$3SURJUDPPLQJ
6HFXULW\LQ5&3,& 5,  6$3&3,&:KHUHDUHSDVVZRUGVYLVLEOH"
6HFXULW\LQ5  &XVWRPHUH[LWVLQ6$3ORJRQ
&XVWRPHU([LW
6HVVLRQ0DQDJHU 25  *HQHUDWLRQRI6HVVLRQ0DQDJHUPHQXVWDNHVWRRORQJ
68 5,  <RXDUHQRWDXWKRUL]HGWR!$QDO\VLV
68 25  68$XWKRUL]DWLRQYDOXHFRQWDLQVVSHFLDOFKDUV
68 25  682EMHFWQDPHRYHUZULWHVREMHFWWH[W
6\VWHP3URILOH 5,  6\VWHPSDUDPHWHUV'HILQHGZKHUH"'LVSOD\HGKRZ"
3DUDPHWHUV
7UDQVSRUWLQJ 5,  7UDQVSRUWLQJSURILOHVDQGDXWKRUL]DWLRQV
7UDQVSRUW 25  7UDQVSRUWSURILOHVDXWKRULQORJRQODQJXDJH
7UDQVSRUW8VHU%XIIHU 5,  $XWKRUL]DWLRQVQRWFXUUHQWDIWHUSURILOHWUDQVSRUW
7UDQVSRUWLQJ$6  $6,PSRUWLQJWUDQVSRUWV
8VHUDGPLQLVWUDWLRQ 5,  8VHUVZLWKODUJHPDVWHUUHFPLVVLQJDXWKRUL]DWLRQV
8VHUDGPLQLVWUDWLRQ  &HQWUDOXVHUGLVWULEXWLRQWRRPDQ\$/(SURFHVVHV
8VHUDGPLQLVWUDWLRQ  &HQ8VHUDGP68/DVWFKDQJHQRWDOZD\VGVSOHG
8VHUDGPLQLVWUDWLRQ  8VHRIZLOGFDUG¶ ·LQDXWKRUL]DWLRQV
8VHU,QIRUPDWLRQ6\VWHP 25  1HZUHSRUWVIRUWKHXVHULQIRUPDWLRQV\VWHP
68,0
8VHU,QIRUPDWLRQ6\VWHP 25  :KHUHXVHGOLVW6XUQDPHVPLVVLQJLQXVHUOLVW
68,0
8VHU6$3 5,  +RZWRDVVLJQDQLGHQWLILHUWR6$3
8VHU6$3 5,  +RZGR,GHOHWHWKHXVHU6$3 "
8VHUVDQG  $XWKRUL]DWLRQ%XIIHULVILOOHGGXULQJHDFKORJRQ
$XWKRUL]DWLRQV.HUQHO
)XQFWLRQV
:RUNEHQFK&XVWRPL]HU  'HYHORSPHQW&ODVV&KDQJHRQO\ZLWKDGPLQ
2UJDQL]HU $XWKRUL]DWLRQ

Release 4.6A/B
A–5
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes

6XEMHFW 5HOHDVH 1RWH 7LWOH

3D\PHQW  ,QFRUUHFWDXWKRUL]DWLRQFKHFNIRUFKHFNPDQDJHPHQW


3URJUDP3D\PHQW
7UDQVIHU
,05HSRUWLQJ QR/,6  0%0%0%632VFKHG$JUHHPHQWGLVSOD\V
$OO&RXQWULHV 3HUVRQQHO  $XWK&KHFNRIQRWLQWHJUDWHGSHUVRQQHOQXPEHUV
$GPLQLVWUDWLRQ
$OO&RXQWULHV 3HUVRQQHO  $XWKRUL]DWLRQOHYHO0LVKDQGOHGLQFRUUHFWO\
$GPLQLVWUDWLRQ

Authorizations Made Easy


A–6
$SSHQGL[% )UHTXHQWO\$VNHG4XHVWLRQV %

&RQWHQWV

Overview ................................................................................................................. B–2


R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................... B–2
Profile Generator Setup......................................................................................... B–3
Working with the PG and Profiles ........................................................................ B–3
Authorization Checks (SU24)................................................................................ B–5
Upgrade Procedure (SU25) ................................................................................... B–7
Including Transactions or Reports ...................................................................... B–7
Missing Authorizations ......................................................................................... B–7
User Administration............................................................................................... B–8
Transporting ........................................................................................................... B–8
Tables...................................................................................................................... B–8

B–1
Appendix B: Frequently Asked Questions
Overview

2YHUYLHZ

7KLVDSSHQGL[FRQWDLQVVRPHRIWKHPRVWIUHTXHQWO\DVNHGTXHVWLRQVDERXW5DQGWKH
3URILOH*HQHUDWRU 3* :HKRSHWKHDQVZHUV
< +HOS\RXWREHWWHUXQGHUVWDQGWKHV\VWHP
< )DFLOLWDWH\RXULPSOHPHQWDWLRQ
< 5HVROYHEDVLFV\VWHPLVVXHV

5,QLWLDO6FUHHQ 6$3(DV\$FFHVV0HQX DQG)DYRULWHV

,IDXVHUKDVVHYHUDODFWLYLW\JURXSVDVVLJQHGWRWKHPZLWKWKHVDPHWUDQVDFWLRQ
FRGHZLOOWKHWUDQVDFWLRQFRGHDSSHDUPXOWLSOHWLPHVRQWKH6$3(DV\$FFHVV
0HQX",VWKHUHDZD\WR´PHUJHµWKHUHSHDWHGWUDQVDFWLRQFRGHV"
7KHWUDQVDFWLRQFRGHZLOOLQGHHGDSSHDUPXOWLSOHWLPHV$WSUHVHQWWKHUHDUHQRPHUJH
FDSDELOLWLHVWRHOLPLQDWHUHSHDWHGWUDQVDFWLRQFRGHV

,IDXVHUKDVPDQ\DFWLYLW\JURXSVRUPDQ\WUDQVDFWLRQFRGHVLVWKHUHDQHIIHFW
RQSHUIRUPDQFH IRUH[DPSOHWKHWLPHIRUWKHILUVWVFUHHQWREHSURFHVVHG "
(DFK´EUDQFKµRU´QRGHµRQWKH6$3(DV\$FFHVVPHQXUHSUHVHQWVLWHPVWKDWDXVHUKDV
DFFHVVWR3HUIRUPDQFHGRHVJRGRZQZLWKDODUJHQXPEHURIQRGHVEXWIURPSUHOLPLQDU\
WHVWLQJE\6$3GHYHORSPHQWJURXSVWKHV\VWHPFDQKDQGOHDQH[WHQVLYHQXPEHUZLWKD
UHDVRQDEOHUHVSRQVHWLPHV PRUHWKDQDXVHUFDQKDQGOHLQDUHDVRQDEOHOLIHWLPH 7KHWHVWLQJ
RIDPHQXEUDQFKQRGHVWUXFWXUHRIQRGHVKDVEHHQVKRZQWRSURYLGHJRRG
UHVSRQVHWLPHV

:KDWKDSSHQHGWRWKH5HSRUW7UHHVLQDQGDUHWKH\LQWKH6$3(DV\$FFHVV
VFUHHQ"
5HSRUW7UHHVLQDUHQRZFOLHQWLQGHSHQGHQW7KH\H[LVWLQWKH6$3(DV\$FFHVVPHQX
5HSRUWLQJWUHHVDQGDUHDPHQXVKDYHEHHQPHUJHGLQIXQFWLRQDOLW\DQGLQRQHWRRO3OHDVH
VHHWKHUHOHDVHQRWHVUHODWHGWRWKLVWRSLF

:LOORQHXVHU IRUH[DPSOHWKH$XWKRUL]DWLRQV$GPLQLVWUDWRU EHDEOHWRYLHZWKH


)DYRULWHVRIDQRWKHUXVHU":LOODXVHUEHDEOHWRDGGDQ\WUDQVDFWLRQFRGHWRWKHLU
IDYRULWHV"
$WSUHVHQWRQHXVHUFDQQRWYLHZWKHIDYRULWHVRIDQRWKHUXVHU$XVHUFDQDGGDQ\
WUDQVDFWLRQFRGHWRWKHLUIDYRULWHV+RZHYHUDXVHUFDQQRWH[HFXWHWKHWUDQVDFWLRQFRGH
XQOHVVWKH\KDYHDSSURSULDWHDXWKRUL]DWLRQV 6B7&2'( WRGRVR)DYRULWHVDWSUHVHQWDUH
QRWYLHZHGE\6$3GHYHORSPHQWDV´VHFXULW\UHOHYDQWµ
,IDXVHUFRSLHVVRPHWUDQVDFWLRQVIURPWKHLUPHQXWRWKHLUIDYRULWHVDQGODWHURQWKHVH
WUDQVDFWLRQVDUHWDNHQRXWRIWKHLUDFWLYLW\JURXSWKHWUDQVDFWLRQVVWLOOUHPDLQLQWKHXVHU·V

Authorizations Made Easy


B–2
Appendix B: Frequently Asked Questions
Profile Generator Setup

IDYRULWHV7KHXVHUZLOOQRWKDYHDXWKRUL]DWLRQVIRUWKHVHWUDQVDFWLRQVDQ\PRUH0DQXDO
PDLQWHQDQFHRIWKHIDYRULWHVLVQHHGHG

3URILOH*HQHUDWRU6HWXS

+RZGRHVWKH$87+25,7<&+(&.ZRUNZLWKWKH3URILOH*HQHUDWRU"
:KHQ$87+25,7<&+(&.LVFDOOHGWKHV\VWHPFKHFNVZKHWKHUWKHV\VWHPSDUDPHWHU
DXWKQRBFKHFNBLQBVRPHBFDVHVLVVHWWR<,IWKHSDUDPHWHULVQRWVHWWR<WKHQRUPDO
$87+25,7<&+(&.LVFRQGXFWHG,IWKHSDUDPHWHULVVHWWR<LWVHDUFKHVIRUDQHQWU\LQ
WDEOH862%;B& UHIHUWRVWUXFWXUH862%;B& ZLWKWKHFXUUHQWWUDQVDFWLRQFRGHDQG
DXWKRUL]DWLRQREMHFW,IQRWKLQJLVIRXQGWKHQRUPDO$87+25,7<&+(&.LVFRQGXFWHG,I
DQHQWU\LVIRXQG DQG862%;B&2.)/$*LVVHWWR1 QRFKHFNLVSHUIRUPHGUHJDUGOHVVRI
WKHDFWXDOXVHUSURILOH,QDOORWKHUFDVHVWKHUHJXODUDXWKRUL]DWLRQFKHFNLVFRQGXFWHGDQG
VXFFHHGVZKHQWKHXVHUSURILOHFRQWDLQVDQDXWKRUL]DWLRQZLWKWKHFRUUHVSRQGLQJ
H[SUHVVLRQVIRUWKHFXUUHQWREMHFW
,QDQHZLQVWDOODWLRQWKHSDUDPHWHULVVHWWR<VLQFHWKH3*LVDOUHDG\DFWLYDWHG)RUPRUH
LQIRUPDWLRQVHHFKDSWHU6HWWLQJXSWKH3URILOH*HQHUDWRU

'R,QHHGWRVKXWGRZQDQGUHVWDUWWKHLQVWDQFHDIWHU,FKDQJHGWKHV\VWHP
SURILOHSDUDPHWHU"
<HV\RXPXVWUHVWDUWWKHLQVWDQFHDIWHUDGGLQJWKHLQVWDQFHSURILOHSDUDPHWHU)RUIXUWKHU
LQIRUPDWLRQRQKRZWKH3*LVVHWXSDQGZKDWVHWWLQJVQHHGWREHSHUIRUPHGVHHFKDSWHU
6HWWLQJXSWKH3URILOH*HQHUDWRU

:RUNLQJZLWKWKH3*DQG3URILOHV

&DQ,LQFOXGHDQH[LVWLQJSURILOHLQDQDFWLYLW\JURXS"
<HV\RXFDQLQFOXGHDQH[LVWLQJSURILOHV VLQJOHDQGFRPSRVLWH LQWRDQDFWLYLW\JURXS
3OHDVHUHIHUWRFKDSWHUWKHVHFWLRQ0DQXDOO\3RVWPDLQWDLQLQJ$XWKRUL]DWLRQV

:K\LVRQO\RQHSURILOHVRPHWLPHVJHQHUDWHG"
7HFKQLFDOO\RQO\DXWKRUL]DWLRQVFDQILWLQWRRQHSURILOHVRVHYHUDOSURILOHVDUHFUHDWHG
IRUODUJHDFWLYLW\JURXSV6LQFHWKHODVWWZRGLJLWVDUHUHTXLUHGIRUWKHLQWHUQDOQXPHUDWRU
RQO\GLJLWVDUHDYDLODEOHIRUWKHSURILOHQDPH

Release 4.6A/B
B–3
Appendix B: Frequently Asked Questions
Working with the PG and Profiles

&DQ,PDQXDOO\FKDQJHJHQHUDWHGSURILOHVIURP3)&*LQ68"
<RXFDQRQO\FKDQJHJHQHUDWHGSURILOHVZLWKWUDQVDFWLRQ3)&*ZKHUH\RXKDYHDOOWKHVDPH
RSWLRQVDVLQWUDQVDFWLRQ687REORFNJHQHUDWHGSURILOHVIRUPDLQWHQDQFHXVH68,Q
RWKHUZRUGVLIWKHSURILOHZDVFUHDWHGDVDUHVXOWRI3)&*\RXFDQQRWFKDQJHLWZLWK68

&DQ,LQFOXGHPDQXDOSURILOHVLQWKH3URILOH*HQHUDWRU"

,QWKH3*FKRRVLQJ(GLW→,QVHUWDXWK→IURPSURILOHLQFOXGHVDOODXWKRUL]DWLRQVIURPD
PDQXDOO\FUHDWHGSURILOHLQDJHQHUDWHGSURILOH7KHVHDXWKRUL]DWLRQVUHPDLQLQPDQXDO
VWDWXVDQGLIWKHDFWLYLW\JURXSFKDQJHVWKHDXWKRUL]DWLRQVUHPDLQXQFKDQJHGZKHQ\RX
FRPSDUHWKHSURILOH+RZHYHU\RXFDQRQO\LQVHUWDXWKRUL]DWLRQVIURPDVLQJOHSURILOH

&DQ,PDQXDOO\HQWHUJHQHUDWHGSURILOHVLQWKHXVHUPDVWHUUHFRUG"
<HVEXWZHGRQRWUHFRPPHQGLWIRUWKHIROORZLQJUHDVRQV
< ,IWKHDFWLYLW\JURXSLVH[WUHPHO\ODUJH RULVLQFUHDVHGE\DODWHUFKDQJH WKH3*
JHQHUDWHVPRUHWKDQRQHDXWKRUL]DWLRQSURILOHDQGDXWRPDWLFDOO\XSGDWHVWKHDIIHFWHG
XVHUPDVWHUVZKLFKKDYHWREHPDQXDOO\LQVHUWHG
< :KHQDVVLJQLQJZLWKWKH3*\RXFDQLQFOXGHWLPHGHSHQGHQFLHVDQGDVVLJQWKHSURILOH
IRUDOLPLWHGWLPHSHULRG

,VLWSRVVLEOHWRFKDQJHWKHSURILOHQDPHODWHU"
<HVRQO\WKHORQJWH[W GHVFULSWLYHWH[W WRDSURILOHFDQEHFKDQJHGZLWKWKH3*ZKLFKGRHV
QRWDIIHFWWKHDXWKRUL]DWLRQVXVHGLQWKLVSURILOH,WLVQRWSRVVLEOHWRPDQXDOO\FKDQJHWKH
WHFKQLFDOSURILOHQDPHRIDJHQHUDWHGSURILOHZLWKWKH3*

&DQ,FRS\DQDFWLYLW\JURXSDQGZLOOWKLVSURFHGXUHDOVRFRS\WKHSURILOH"
<HV\RXFDQFRS\DFWLYLW\JURXSVEXWZKLOHFRS\LQJFKRRVHDGLIIHUHQWQDPHIRUWKHQHZ
DFWLYLW\JURXS7KHDFWLYLW\JURXSWKHDFWLYLWLHVDQGWKHSURILOHGDWDDUHWKHQFRSLHG6HH
FKDSWHUWKHVHFWLRQ&RS\LQJDQG'HULYLQJ$FWLYLW\*URXSVIRUGHWDLOHGLQIRUPDWLRQ

,I,JHQHUDWHDSURILOHWKDWPD\XVHDSUHYLRXVO\EXLOWDXWKRUL]DWLRQZLOOWKH
V\VWHPFUHDWHDQHZRQHRUXVHWKHH[LVWLQJRQH"
(YHU\WLPH\RXJHQHUDWHDQHZSURILOHIRUDQDFWLYLW\JURXSQHZDXWKRUL]DWLRQVDUHFUHDWHG
,WWDNHVORQJHUWRVHDUFKIRUH[LVWLQJDXWKRUL]DWLRQVZLWKWKHVDPHYDOXHVWKDQWRFUHDWHQHZ
RQHV(DFKDXWKRUL]DWLRQFDQRQO\EHXVHGLQRQHDFWLYLW\JURXS

+RZGR,UHVWULFWDFWLYLWLHVE\VSHFLILFWLPHSHULRGV"
(YHQLI\RXGRQRWXVH%&2UJ\RXFDQVWLOOFKRRVHWRDVVLJQDFWLYLW\JURXSVWRXVHUVIRUD
OLPLWHGWLPH7KLVDFWLRQPDNHVVHQVHIRUH[DPSOHZKHQ\RXUFRPSDQ\HQWHUVDQHZILVFDO
\HDU3K\VLFDOLQYHQWRU\DFWLYLWLHVVKRXOGRQO\EHDOORZHGIRUDOLPLWHGSHULRGRIWLPH)RU
IXUWKHULQIRUPDWLRQRQVHWWLQJWLPHOLPLWVUHIHUWRFKDSWHU$VVLJQLQJDFWLYLW\JURXSV

Authorizations Made Easy


B–4
Appendix B: Frequently Asked Questions
Authorization Checks (SU24)

:KLFKWUDQVDFWLRQVDUHXVHGE\WKH3*WRPDLQWDLQDVSHFLILFDXWKRUL]DWLRQ"

2QWKH&KDQJH$FWLYLW\*URXS$XWKRUL]DWLRQVVFUHHQFKRRVH8WLOLWLHV→6HWWLQJV→)RU
2YHUYLHZRI$XWKRUL]DWLRQ2EMHFW8VHWRLPSRUWDQLFRQLQWR\RXUSURILOHWUHH7KLVLFRQ
ZKLFKORRNVOLNHDPRXQWDLQGLVSOD\VWKHWUDQVDFWLRQVIRUZKLFKWKH&KHFNPDLQWDLQIODJLV
VHWIRUWKHREMHFW

$XWKRUL]DWLRQ&KHFNV 68

:KDWGRWKHGLIIHUHQWFKHFNIODJVVWDQGIRU"
&0 &KHFN0DLQWDLQ
< $QDXWKRULW\FKHFNLVFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*FUHDWHVDQDXWKRUL]DWLRQIRUWKLVREMHFWDQGILHOGYDOXHVDUHGLVSOD\HGIRU
FKDQJLQJ
< 'HIDXOWYDOXHVIRUWKLVDXWKRUL]DWLRQFDQEHPDLQWDLQHG
& &KHFN
< $QDXWKRULW\FKHFNLVFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWVRILHOGYDOXHVDUHQRWGLVSOD\HG
< 1RGHIDXOWYDOXHVFDQEHPDLQWDLQHGIRUWKLVDXWKRUL]DWLRQ
1 1RFKHFN
< 7KHDXWKRULW\FKHFNDJDLQVWWKLVREMHFWLVGLVDEOHG
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWVRILHOGYDOXHVDUHQRWGLVSOD\HG
< 1RGHIDXOWYDOXHVFDQEHPDLQWDLQHGIRUWKLVDXWKRUL]DWLRQ
8 8QPDLQWDLQHG
< 1RFKHFNLQGLFDWRULVVHW
< $QDXWKRULW\FKHFNLVDOZD\VFDUULHGRXWDJDLQVWWKLVREMHFW
< 7KH3*GRHVQRWFUHDWHDQDXWKRUL]DWLRQIRUWKLVREMHFWVRILHOGYDOXHVDUHQRWGLVSOD\HG
< 1RGHIDXOWYDOXHVFDQEHPDLQWDLQHGIRUWKLVDXWKRUL]DWLRQ
7ROHDUQPRUHDERXWWUDQVDFWLRQ68SOHDVHVHHFKDSWHUWKHVHFWLRQ5HGXFLQJWKH6FRSHRI
$XWKRUL]DWLRQ&KHFNV

:K\'RHVWKH3URILOH*HQHUDWRU0DLQWDLQ$XWKRUL]DWLRQVIRU0RUH2EMHFWV7KDQ
<RX&DQ6HH"
:LWKWUDQVDFWLRQ68\RXFDQEURZVHWKHHQWULHVRIWDEOHV862%;B&DQG862%7B&7KH
3*XVHVWDEOH862%;B&WRFKHFNIRUWUDQVDFWLRQVLQWKHFRUUHVSRQGLQJDFWLYLW\JURXSV
ZKHUHWKHDXWKRUL]DWLRQREMHFW·VDXWKRUL]DWLRQVDUHWREHPDLQWDLQHG7KHFRUUHVSRQGLQJ
YDOXHVDUHVWRUHGLQWDEOH862%7B&%XWWKHSDUDPHWHUWUDQVDFWLRQVDUHDQH[FHSWLRQ7KHVH
WUDQVDFWLRQVZRUNZLWKDSRZHUIXOFRUHWUDQVDFWLRQUHVWULFWHGE\WKHLQLWLDOVFUHHQRIWKH
FRUHWUDQVDFWLRQWKDWLVILOOHGDQGVNLSSHGLQWKHSDUDPHWHUWUDQVDFWLRQ

Release 4.6A/B
B–5
Appendix B: Frequently Asked Questions
Authorization Checks (SU24)

7KHDXWKRUL]DWLRQFKHFNVDUHFRGHGH[FOXVLYHO\LQWKHFRUHWUDQVDFWLRQ+RZHYHUWKH
DXWKRUL]DWLRQILHOGYDOXHVFDQEHVSHFLILHGPRUHSUHFLVHO\LQWKHSDUDPHWHUWUDQVDFWLRQWKDQ
LQWKHFRUHWUDQVDFWLRQ7KH3*ILUVWPDLQWDLQVWKHDXWKRUL]DWLRQVLQ862%;B&DQG
862%7B&XQGHUWKHSDUDPHWHUWUDQVDFWLRQDQGWKHQOLVWVDXWKRUL]DWLRQVIRUDOO
DXWKRUL]DWLRQREMHFWVLQWKHFRUHWUDQVDFWLRQDVWREHPDLQWDLQHG$VDUHVXOWIRUWKHSDUDPHWHU
WUDQVDFWLRQPRUHDXWKRUL]DWLRQVDUHPDLQWDLQHGWKDQFDQEHVHHQLQ68
)RUH[DPSOHWUDQVDFWLRQ2& ZKLFKPDLQWDLQVH[FKDQJHUDWHV XVHVWKHJHQHUDOWDEOH
PDLQWHQDQFHWUDQVDFWLRQ 60 2QWKHLQLWLDOVFUHHQIRU60HQWHUWKHYLHZQDPH
V_TCURRDQGFKRRVH0DLQWDLQ7KH3*UHDGV68IRU2&DQGPDLQWDLQVDQDXWKRUL]DWLRQ
IRUWKHREMHFW6B7$%8B',6ZLWKWKH&KDQJHDQG'LVSOD\YDOXHVIRUWKHDFWLYLW\DQGWKH)&
YDOXHIRUWKHDXWKRUL]DWLRQJURXS7KH3*DOVRUHDGV68IRUWKHFRUHWUDQVDFWLRQ60
DQGPDLQWDLQVDQDXWKRUL]DWLRQIRU6B7$%8B&/,ZLWKD%/$1.YDOXHEHFDXVHWKLVREMHFWLV
QRWOLVWHGLQ68XQGHU2&

+RZ'R,5HGXFHWKH6FRSHRI$XWKRULW\&KHFNVLQ5"
6HHFKDSWHUWKHVHFWLRQ5HGXFLQJWKH6FRSHRI$XWKRUL]DWLRQ&KHFNVLQWKLVJXLGH

+RZ&DQD&XVWRPHU,QFOXGH,QGLYLGXDO$XWKRUL]DWLRQ&KHFNVLQD7UDQVDFWLRQ"
)RULQGLYLGXDODXWKRUL]DWLRQFKHFNVWKHUHDUHWKHVRFDOOHGILHOGH[LWV7KHVHDUH
HQKDQFHPHQWVWKDW\RXFDQFUHDWHIRUDQ\GDWDHOHPHQWDQGZKHUH\RXFDQLPSOHPHQW\RXU
FKHFNV)LHOGH[LWVDUHDOZD\VUXQLIDILHOGZDVVHOHFWHGRQDVFUHHQIRUWKLVGDWDHOHPHQW
:KHQ\RXFUHDWHWKHILHOGH[LW\RXFDQGHWHUPLQHZKHWKHUWKLVFKHFNVKRXOGEHFDUULHGRXW
< $OZD\V
< 2QO\RQFHUWDLQVFUHHQV
< 2QO\LQFHUWDLQWUDQVDFWLRQV
)RUPRUHLQIRUPDWLRQRQILHOGH[LWVVHHWKHRQOLQHGRFXPHQWDWLRQIRUWUDQVDFWLRQ&02'

:KHQ6WDUWLQJ7UDQVDFWLRQV:KDW6KRXOG,.QRZ$ERXWWKH1HZ$XWKRUL]DWLRQ
&KHFN"
(DFKWLPHDQHZWUDQVDFWLRQLVFDOOHG 00IRUH[DPSOH WKHV\VWHPFKHFNVZKHWKHUWKH
XVHULVDXWKRUL]HGWRVWDUWWKDWWUDQVDFWLRQ 1RFKHFNWDNHVSODFHIRUWKH$%$3FRPPDQG
&$//75$16$&7,21 ,I\RXXVHWKH3*DQGLWVPHQXVWRIRUPDFWLYLW\JURXSVDQ
DXWKRUL]DWLRQIRUREMHFW6B7&2'(LVDXWRPDWLFDOO\GHILQHGIRUHDFKDFWLYLW\JURXS,W
FRQWDLQVWKHH[DFWWUDQVDFWLRQVWKDW\RXVHOHFWHGIRUWKHDFWLYLW\JURXS
,I\RXZDQWWRDOORZWUDQVDFWLRQVWKDW\RXGLGQRWDVVLJQXVLQJWKHDFWLYLW\JURXSPHQX
PDQXDOO\DGGDQDXWKRUL]DWLRQIRUREMHFW6B7&2'(DQGHQWHUWKHPLVVLQJWUDQVDFWLRQV<RX
FDQQRZDYRLGSUREOHPVZKHQ\RXFRPSDUHWKHDXWKRUL]DWLRQGDWD
6B7&2'(LVIRXQGLQWKHREMHFWFODVV1RQDSSOLFDWLRQVSHFLILF$XWKRUL]DWLRQREMHFWV7KH
6B7&'B$//DXWKRUL]DWLRQLVGHOLYHUHGZLWKWKHSURILOH6$3B1(:B(ZKLFKDOORZV\RXWR
H[HFXWHDOOWUDQVDFWLRQV%\JLYLQJUHVWULFWHGDXWKRUL]DWLRQVIRU6B7&2'(WKHXVHU
DGPLQLVWUDWRUFDQUHVWULFWLQGLYLGXDOXVHUVRUXVHUJURXSVWRUHPDLQZLWKLQWKHWUDQVDFWLRQV
WKH\UHTXLUH7KHDXWKRUL]DWLRQFKHFNVGHILQHGE\WKHGHYHORSHUZLWKWUDQVDFWLRQ6(
WUDQVDFWLRQPDLQWHQDQFH RULQWKH$%$3VRXUFHFRGHFRQWLQXHWREHSHUIRUPHG

Authorizations Made Easy


B–6
Appendix B: Frequently Asked Questions
Upgrade Procedure (SU25)

7KHVHDUHWKHDGYDQWDJHVRIWKHQHZDXWKRUL]DWLRQFKHFN
< $JXDUDQWHHWKDWHDFKWUDQVDFWLRQSHUIRUPVDWOHDVWRQHDXWKRUL]DWLRQFKHFN
< $QHDV\ZD\WRGHWHUPLQHZKLFKWUDQVDFWLRQVDXVHUFDQH[HFXWH

8SJUDGH3URFHGXUH 68

,VWKHUHDZD\WRUXQWKH68VWHSVLQ´VLPXODWLRQµRU´WHVWµPRGH"
$WSUHVHQWLWLVQRWSRVVLEOHWRUXQDVLPXODWLRQRUWHVWPRGH

,QFOXGLQJ7UDQVDFWLRQVRU5HSRUWV

+RZFDQ,LQFOXGHLQGLYLGXDODXWKRUL]DWLRQFKHFNVLQWUDQVDFWLRQV"
)RULQGLYLGXDODXWKRUL]DWLRQFKHFNVWKHUHDUHWKHVRFDOOHGILHOGH[LWV7KHVHDUH
HQKDQFHPHQWVWKDW\RXFDQFUHDWHIRUDQ\GDWDHOHPHQWDQGZKHUH\RXFDQLPSOHPHQW\RXU
FKHFNV)LHOGH[LWVDUHDOZD\VUXQLIDILHOGZDVVHOHFWHGRQDVFUHHQIRUWKLVGDWDHOHPHQW
:KHQ\RXFUHDWHWKHILHOGH[LW\RXFDQGHWHUPLQHZKHWKHUWKLVFKHFNVKRXOGDOZD\VEH
FDUULHGRXWRQO\RQFHUWDLQVFUHHQVRULQFHUWDLQWUDQVDFWLRQV)XUWKHUGHWDLOVRQILHOGH[LWV
FDQEHIRXQGLQWKHRQOLQHGRFXPHQWDWLRQIRUWUDQVDFWLRQ&02'127()LHOGH[LWVJHW
LQYRNHGDIWHUWKHXVHUDWWHPSWVWRSURFHVVDSDUWLFXODUVFUHHQ)LHOGH[LWVGRQRWSUHYHQW
XVHUVIURPHQWHULQJDVFUHHQZKLFKFRQWDLQVWKHILHOG$VILHOGH[LWVFDQEHPDGHWREHVFUHHQ
DQGSURJUDPVSHFLILFLWLVSRVVLEOHWKDW6$3FDQGHILQHQHZVFUHHQVDQGSURJUDPVZKLFK
ZLOO HJDIWHUDQXSJUDGH UHQGHUWKHILHOGH[LWDVQRQIXQFWLRQDO)LHOGH[LWVRIVXFKVRUW
PXVWDOZD\VEHFRQVLGHUHGDIWHUDQXSJUDGH

0LVVLQJ$XWKRUL]DWLRQV

:KDWLIDQDXWKRUL]DWLRQLVVWLOOPLVVLQJIRUWKHJHQHUDWHGSURILOHDQGWKHXVHU
JHWVD´1RDXWKRUL]DWLRQµPHVVDJH"
5HPHPEHUWKDWLILPSOHPHQWLQJDQ\SRUWLRQRIWKH+5FRPSRQHQWRIWKH56\VWHPWKHUH
LVDSRVVLELOLW\WRHQDEOHFHUWDLQSDUWVRIWKHDXWKRUL]DWLRQV\VWHPWKDWDUH127UHODWHGWRWKH
SURILOHJHQHUDWRU H[DPSOH,PSOHPHQWLQJ+5VWUXFWXUDODXWKRUL]DWLRQV $VVXFKWKH´1R
DXWKRUL]DWLRQ«µPHVVDJHZRXOGEHFRUUHFWDQGWKHV\VWHPLVQRWLQHUURU,IFRQYLQFHGWKDW
WKHUHLVDQHUURULQWKHV\VWHPFUHDWHDQ6$31HW²5)URQWHQGQRWHWRVSHFLI\WKH
WUDQVDFWLRQDQGWKHSUHFLVHHUURUPHVVDJH SUHIHUDEO\DFRS\RIWKHRXWSXWIURPWUDQVDFWLRQ
68 WKDW\RXLQFOXGHGLQWKHDFWLYLW\JURXS7RFRUUHFWWKHHUURULQ\RXUV\VWHPVHH
FKDSWHUWKHVHFWLRQ0DQXDOO\3RVWPDLQWDLQLQJ$XWKRUL]DWLRQV

Release 4.6A/B
B–7
Appendix B: Frequently Asked Questions
User Administration

8VHU$GPLQLVWUDWLRQ

+RZFDQWKHZRUNLQYROYHGLQPDLQWDLQLQJVHWWLQJXSDXWKRUL]DWLRQVEHGLYLGHGXS
DPRQJVWPXOWLSOHSHRSOH"
6LQFHWKH3*VHOHFWVWKHDXWKRUL]DWLRQREMHFWVLWLVQRORQJHUQHFHVVDU\WRGHFLGHZKR
PDLQWDLQVDXWKRUL]DWLRQVIRUDQREMHFW7KHFKHFNDJDLQVWWKHREMHFW6B86(5B$87LVFDUULHG
RXWRQO\LIWKHDGPLQLVWUDWRUPDQXDOO\LQVHUWVDQDXWKRUL]DWLRQ:LWKDXWKRUL]DWLRQREMHFW
6B86(5B$*5DFKHFNLVSRVVLEOHDWWKHDFWLYLW\JURXSOHYHOWRVHHZKRLVDOORZHGWRVHOHFW
ZKLFKWUDQVDFWLRQIRUWKLVDFWLYLW\JURXS)RUDIXUWKHUFODVVLILFDWLRQLQWRDXWKRUL]DWLRQDQG
DFWLYDWLRQDGPLQLVWUDWRUVHH$GPLQLVWUDWLRQ:KHQ8VLQJWKH3URILOH*HQHUDWRULQWKHRQOLQH
GRFXPHQWDWLRQ

7UDQVSRUWLQJ

'RWKH862%;B&DQG862%7B&QHHGWREHWUDQVSRUWHGEHWZHHQFOLHQWV"
1R7KHVHWDEOHVDUHFOLHQWLQGHSHQGHQW7KH\RQO\QHHGWREHWUDQVSRUWHGEHWZHHQV\VWHPV

,VWKHUHDZD\WRWUDQVSRUWDFWLYLW\JURXSV"
<HV\RXFDQHLWKHUXVHWKHVWDQGDUGWUDQVSRUWFRQQHFWLRQLQWUDQVDFWLRQ3)&*RUXVHPDVV
WUDQVSRUWDFWLYLW\JURXSVLQVLGHWKH3*

'RHVWKHWUDQVSRUWRIDFWLYLW\JURXSVEHWZHHQWZRFOLHQWVLQWKHVDPHV\VWHP
ZRUNZLWKWUDQVDFWLRQ6&&"
<HVDIWHUEHLQJLPSRUWHGWRWKHWDUJHWFOLHQWWKHWUDQVSRUWHGDFWLYLW\JURXSVDUHQRZDFWLYH
DQGGRDSSHDULQWUDQVDFWLRQ3)&*7KLVVWHSZDVQRWSRVVLEOHLQUHOHDVHVEHIRUH%

:KDWLIWKHJHQHUDWHGSURILOHRQO\KDVDXWKRUL]DWLRQVIRUREMHFW6B7&2'("
7KH6$3GHIDXOWWDEOHVPD\QRWKDYHEHHQFRSLHGLQWRWKHFXVWRPHUWDEOHV,I\RXJHWD1R
RUJDQL]DWLRQDOGDWDDYDLODEOHPHVVDJHUXQWUDQVDFWLRQ686HHFKDSWHULQWKLVJXLGHIRU
PRUHLQIRUPDWLRQRQWUDQVDFWLRQ68

7DEOHV

+RZGR,GLVSOD\WKHWUDQVDFWLRQFRGHVWKDWDUHLQFOXGHGLQDQDFWLYLW\JURXS"

5XQWUDQVDFWLRQSE16 7RROV→$%$3:RUNEHQFK→2YHUYLHZ→'DWD%URZVHU 
 (QWHUAGR_TCODESLQWKH7DEOHQDPHILHOG
 'LVSOD\WKHWDEOHFRQWHQWV 7DEOH→WDEOHFRQWHQWV 
 ,QWKHVHOHFWLRQVFUHHQHQWHUWKHDFWLYLW\JURXSQDPHLQWKHILHOG$*5B1$0(

Authorizations Made Easy


B–8
Appendix B: Frequently Asked Questions
Tables

 &KRRVH([HFXWH RUFKRRVH3URJUDP→([HFXWH 
 <RXZLOOUHFHLYHDOLVWZLWKDOOWUDQVDFWLRQFRGHVLQWKDWDFWLYLW\JURXSQDPH

+RZGR,GLVSOD\LQZKLFKDFWLYLW\JURXSDFHUWDLQWUDQVDFWLRQFRGHLVEHLQJXVHG"

5XQWUDQVDFWLRQSE16 7RROV→$%$3:RUNEHQFK→2YHUYLHZ→'DWD%URZVHU 
 (QWHUAGR_TCODESLQWKH7DEOHQDPHILHOG
 'LVSOD\WKHWDEOHFRQWHQWV 7DEOH→WDEOHFRQWHQWV 
 ,QWKHVHOHFWLRQVFUHHQHQWHUWKHWUDQVDFWLRQFRGHLQWKHILHOG7&2'(
 &KRRVH([HFXWH RUFKRRVH3URJUDP→([HFXWH 
 <RXZLOOUHFHLYHDOLVWZLWKDOODFWLYLW\JURXSVQDPHZKHUHWKDWWUDQVDFWLRQFRGHLVEHLQJ
XVHG

+RZGR,GLVSOD\ZKLFKDFWLYLW\JURXSLVXVHGE\ZKLFKXVHU"

5XQWUDQVDFWLRQSE16 7RROV→$%$3:RUNEHQFK→2YHUYLHZ→'DWD%URZVHU 
 (QWHUAGR_USERSLQWKH7DEOHQDPHILHOG
 'LVSOD\WKHWDEOHFRQWHQWV 7DEOH→WDEOHFRQWHQWV 
 ,QWKHVHOHFWLRQVFUHHQHQWHUWKHDFWLYLW\JURXSQDPHLQWKHILHOG7$*5B1$0(
 &KRRVH([HFXWH RUFKRRVH3URJUDP→([HFXWH 
 <RXZLOOUHFHLYHDOLVWZLWKWKHQDPHVRIDOOXVHUVWKDWDUHDVVLJQHGWRWKDWDFWLYLW\JURXS

+RZGR,GLVSOD\ZKLFKXVHULVDVVLJQHGWRZKLFKDFWLYLW\JURXS"

5XQWUDQVDFWLRQSE16 7RROV→$%$3:RUNEHQFK→2YHUYLHZ→'DWD%URZVHU 
 (QWHUAGR_USERSLQWKH7DEOHQDPHILHOG
 'LVSOD\WKHWDEOHFRQWHQWV 7DEOH→WDEOHFRQWHQWV 
 ,QWKHVHOHFWLRQVFUHHQHQWHUWKHQDPHRIWKHXVHULQWKHILHOG81$0(
 &KRRVH([HFXWH RUFKRRVH3URJUDP→([HFXWH 
 <RXZLOOUHFHLYHDOLVWZLWKWKHDOODFWLYLW\JURXSVWKLVXVHULVDVVLJQHGWR

'RHVWKHDXWKRUL]DWLRQREMHFWDOORZDFWLYLWLHVQRWPDLQWDLQHGLQWDEOH7$&7="
7DEOH7$&7=FRQWDLQVDOORZDEOHDFWLYLWLHVIRUDQDXWKRUL]DWLRQREMHFW,I\RXILQGD
WUDQVDFWLRQORRNLQJIRUDQDXWKRUL]DWLRQREMHFWZLWKDQDFWLYLW\WKDWLVQRWPDLQWDLQHGRU
RIIHUHGE\3*PDLQWDLQWKHPLVVLQJDFWLYLW\IRUWKHDSSURSULDWHDXWKRUL]DWLRQREMHFWLQWDEOH
7$&7=ZLWKWUDQVDFWLRQ607KH3*WKHQRIIHUVWKLVYDOXH

Release 4.6A/B
B–9
Appendix B: Frequently Asked Questions
Tables

:KDWLVWKHVWUXFWXUHRIWDEOH862%;B&"

)LHOGQDPH .H\ 'HVFULSWLRQ

1$0( ; 3URJUDPWUDQVDFWLRQIXQFWLRQPRGXOHQDPH
7<3( ; 7\SHRIUHSRUW
2%-(&7 ; 8VHUPDVWHUPDLQWHQDQFHDXWKRUL]DWLRQREMHFW
02',),(5 /DVWFKDQJHGE\
02''$7( 'DWHRIFKDQJH
02'7,0( 7LPHRIFKDQJH
2.)/$* 1 1RDXWKRUL]DWLRQFKHFNV
; $XWKRUL]DWLRQFKHFNVWDNHSODFH
< $XWKRUL]DWLRQFKHFNVWDNHSODFHGHIDXOWYDOXHVLQ862%7B&
8 1RWPDLQWDLQHG

7KH1$0(DQG7<3(ILHOGVLGHQWLI\DWUDQVDFWLRQDQG2%-(&7LGHQWLILHVWKHDXWKRUL]DWLRQ
REMHFW02',),(502''$7(02'7,0(FRQWDLQDGPLQLVWUDWLYHLQIRUPDWLRQDERXWWKH
PRVWUHFHQWFKDQJHV2.)/$*LVLPSRUWDQWEHFDXVHZKHQLWFRQWDLQVWKHYDOXH1QR
DXWKRUL]DWLRQFKHFNLVSHUIRUPHGIRUWKHWUDQVDFWLRQDQGDXWKRUL]DWLRQREMHFW

([DPSOHV
(QWHU1$0( VA017<3( TR2%-(&7 C_STUE_BER2.)/$* N(YHU\
DXWKRUL]DWLRQFKHFN$87+25,7<&+(&.2%-(&7&B678(B%(5,'ZLOOVXFFHHG
UHJDUGOHVVRIWKHXVHU·VDXWKRUL]DWLRQSURILOH
(QWHU1$0( VA017<3( TR2%-(&7 C_DRAW_TCD2.)/$* XRUDQRWKHUYDOXH
!N$QDXWKRUL]DWLRQFKHFN$87+25,7<&+(&.2%-(&7&B'5$:B7&','ZLOO
VXFFHHGRQO\ZKHQWKHXVHU·VDXWKRUL]DWLRQSURILOHFRQWDLQVWKHFRPELQDWLRQRIILHOGVRU
ILHOGFRQWHQWVXQGHU,'

Authorizations Made Easy


B–10
$SSHQGL[& ,PSRUWDQW6\VWHP3URILOH &
3DUDPHWHUV

&RQWHQWV

Incorrect Logons, Default Clients, and Default Start Menu............................... C–2


Setting Password Length and Expiration............................................................ C–2
Specifying Impermissible Passwords ................................................................. C–3
Securing SAP* Against Misuse ............................................................................ C–3
Tracing Authorizations.......................................................................................... C–3
Profile Generator and Transaction SU24............................................................. C–4
User Buffer.............................................................................................................. C–4
No Check on Object S_TCODE............................................................................. C–4
No Check on Certain ABAP Objects .................................................................... C–4
RFC Authority Check ............................................................................................. C–5

C–1
Appendix C: Important System Profile Parameters
Incorrect Logons, Default Clients, and Default Start Menu

,QFRUUHFW/RJRQV'HIDXOW&OLHQWVDQG'HIDXOW6WDUW0HQX

8VHWKHIROORZLQJV\VWHPSURILOHSDUDPHWHUVWRVHWLQFRUUHFWORJRQOLPLWVDQGWKHGHIDXOW
FOLHQW
< /RJLQIDLOVBWRBVHVVLRQBHQG
7KLVSDUDPHWHUGHILQHVWKHQXPEHURIWLPHVDXVHUFDQHQWHUDQLQFRUUHFWSDVVZRUG
EHIRUHWKHV\VWHPWHUPLQDWHVWKHORJRQDWWHPSW7KHGHIDXOWLVWKUHHFKDUDFWHUVEXWWKLV
YDOXHFDQEHVHWWRDQ\QXPEHUEHWZHHQ²
< /RJLQIDLOVBWRBXVHUBORFN
7KLVSDUDPHWHUGHILQHVWKHQXPEHURIWLPHVDXVHUFDQHQWHUDQLQFRUUHFWSDVVZRUG
EHIRUHWKHV\VWHPORFNVWKHXVHUIURPPDNLQJDGGLWLRQDOORJRQDWWHPSWV,IWKHV\VWHP
ORFNVDQHQWU\LVZULWWHQWRWKHV\VWHPORJDQGWKHORFNLVUHOHDVHGDWPLGQLJKW7KH
GHIDXOWLVWLPHVEXWWKLVYDOXHFDQEHVHWWRDQ\YDOXHEHWZHHQ²
< /RJLQIDLOHGBXVHUBDXWRBXQORFN
7KLVSDUDPHWHUXQORFNVXVHUVZKRJRWORFNHGRXWE\ORJJLQJRQLQFRUUHFWO\,IWKH
SDUDPHWHULVVHWWR WKHGHIDXOW GXHWRDSUHYLRXVLQFRUUHFWORJRQDWWHPSWWKHV\VWHP
GRHVQRWFRQVLGHUXVHUVORFNHG7KHORFNVUHPDLQLIWKHSDUDPHWHUYDOXHLV
< /RJLQV\VWHPBFOLHQW
7KLVSDUDPHWHUVSHFLILHVWKHGHIDXOWFOLHQW7KLVFOLHQWLVDXWRPDWLFDOO\ILOOHGLQRQWKH
V\VWHPORJRQVFUHHQ8VHUVFDQHQWHUDGLIIHUHQWFOLHQW
< /RJLQH[WBVHFXULW\
6LQFH5HOHDVH(H[WHUQDOVHFXULW\WRROVVXFKDV.HUEHURVRU6HFXGHKDYHPDQDJHG
56\VWHPDFFHVV,IWKLVSDUDPHWHULVVHWDQDGGLWLRQDOLGHQWLILFDWLRQFDQEHVSHFLILHG
IRUHDFKXVHU LQXVHUPDLQWHQDQFH ZKHUHXVHUVORJRQWRWKHLUVHFXULW\V\VWHP7R
DFWLYDWHVHWWKHYDOXHWR;
< 6WDUWBPHQX
7KLVSDUDPHWHUVSHFLILHVWKHGHIDXOWVWDUWPHQXIRUDOOXVHUVDQGFDQEHRYHUZULWWHQZLWK
WKHXVHUVSHFLILFVWDUWPHQX WUDQVDFWLRQ68 7KHGHIDXOWLV6DQGWKLVYDOXHFDQEH
VHWWRDQ\RWKHUDUHDPHQXFRGH

6HWWLQJ3DVVZRUG/HQJWKDQG([SLUDWLRQ

8VHWKHIROORZLQJV\VWHPSURILOHSDUDPHWHUVWRVSHFLI\WKHPLQLPXPOHQJWKRIDSDVVZRUG
DQGWKHIUHTXHQF\ZLWKZKLFKXVHUVPXVWFKDQJHSDVVZRUGV
< /RJLQPLQBSDVVZRUGBOQJ
7KLVSDUDPHWHUGHILQHVWKHPLQLPXPSDVVZRUGOHQJWK7KHGHIDXOWLVWKUHHFKDUDFWHUV
EXWWKLVYDOXHFDQEHVHWIURPWKUHHWRHLJKWFKDUDFWHUV

Authorizations Made Easy


C–2
Appendix C: Important System Profile Parameters
Specifying Impermissible Passwords

< /RJLQSDVVZRUGBH[SLUDWLRQBWLPH
7KLVSDUDPHWHUGHILQHVWKHQXPEHURIGD\VDIWHUZKLFKDSDVVZRUGPXVWEHFKDQJHG
7KHSDUDPHWHUDOORZVXVHUVWRNHHSWKHLUSDVVZRUGVZLWKRXWWLPHOLPLWDQGOHDYHVWKH
YDOXHVHWWRWKHGHIDXOW

7RPDNHWKHSDUDPHWHUVJOREDOO\HIIHFWLYHLQDQ56\VWHPVHWWKHPLQWKHGHIDXOWSURILOH
'()$8/73)/7RPDNHWKHPLQVWDQFHVSHFLILF\RXPXVWVHWWKHPLQWKHSURILOHVRIHDFK
DSSOLFDWLRQVHUYHULQ\RXU56\VWHP

6SHFLI\LQJ,PSHUPLVVLEOH3DVVZRUGV

7RIRUELGXVHRIDFHUWDLQSDVVZRUGHQWHULWLQWDEOH865<RXFDQPDLQWDLQWKLVWDEOHZLWK
WUDQVDFWLRQ60,Q865\RXPD\DOVRJHQHULFDOO\VSHFLI\SURKLELWHGSDVVZRUGV
7KHUHDUHWZRZLOGFDUGFKDUDFWHUV
< $TXHVWLRQPDUN " PHDQVDVLQJOHFKDUDFWHU
< $QDVWHULVN PHDQVDVHTXHQFHRIDQ\FRPELQDWLRQFKDUDFWHUVRIDQ\OHQJWK
([DPSOHV
<  LQWDEOH865SURKLELWVDQ\SDVVZRUGWKDWEHJLQVZLWKWKHVHTXHQFH
<  SURKLELWVDQ\SDVVZRUGWKDWFRQWDLQVWKHVHTXHQFH
< $%"SURKLELWVSDVVZRUGVWKDWEHJLQZLWK$%DQGKDYHDQDGGLWLRQDOFKDUDFWHUVXFKDV
$%$$%%DQG$%&

6HFXULQJ6$3 $JDLQVW0LVXVH

/RJLQQRBDXWRPDWLFBXVHUBVDS
,IWKHSDUDPHWHULVVHWWRWKHQ6$3 KDVQRVSHFLDOGHIDXOWSURSHUWLHV5HVHWWLQJWKH
SDUDPHWHUWRDOORZVORJLQVZLWKSAP*SDVVZRUGPASSDQGXQUHVWULFWHGV\VWHPDFFHVV
SULYLOHJHV(YHQLI\RXVHWWKHSDUDPHWHUHQVXUHWKDWWKHUHLVDXVHUPDVWHUUHFRUGIRU6$3 
,IDXVHUPDVWHUUHFRUGIRU6$3 H[LVWVLWEHKDYHVOLNHDQRUPDOXVHULVVXEMHFWWR
DXWKRUL]DWLRQFKHFNVDQGLWVSDVVZRUGFDQEHFKDQJHG

7UDFLQJ$XWKRUL]DWLRQV

$XWKFKHFNBYDOXHBZULWHBRQ
%\HQWHULQJWUDQVDFWLRQSU53LQWKH&RPPDQGILHOG\RXFDQDQDO\]HDQDXWKRUL]DWLRQ
GHQLHGHUURUWKDWKDVMXVWRFFXUUHGLQ\RXUVHVVLRQ7KLVIXQFWLRQLVDFWLYHRQO\LI\RXKDYH
VHWWKHV\VWHPSURILOHSDUDPHWHUWRDYDOXHJUHDWHUWKDQ%\GHIDXOWWKHIXQFWLRQLV
LQDFWLYHDQGWKHSDUDPHWHUYDOXHLV

Release 4.6A/B
C–3
Appendix C: Important System Profile Parameters
Profile Generator and Transaction SU24

3URILOH*HQHUDWRUDQG7UDQVDFWLRQ68

$XWKQRBFKHFNBLQBVRPHBFDVHV
%\XVLQJWUDQVDFWLRQSU24\RXFDQDFWLYDWHRUGHDFWLYDWHDXWKRUL]DWLRQFKHFNVIRU
WUDQVDFWLRQV7KLVIXQFWLRQLVDFWLYHRQO\LI\RXVHWWKHV\VWHPSURILOHSDUDPHWHUWR<%\
GHIDXOWWKHIXQFWLRQLVLQDFWLYHDQGWKHSDUDPHWHUYDOXHLV17RDFWLYDWHWKHSDUDPHWHUVHW
WKHYDOXHWR<,I\RXZDQWWRZRUNZLWKWKH3*WKHSDUDPHWHUPXVWEHVHW

8VHU%XIIHU

$XWKDXWKBQXPEHUBLQBXVHUEXIIHU
7RKDYHDJRRGSHUIRUPDQFHLQWKHV\VWHPWKHQDPHVRIDOOWKHDXWKRUL]DWLRQVLQFOXGHGLQD
XVHUPDVWHUIRUDXVHUDUHEXIIHUHGLQDWDEOH,QWKHVWDQGDUGWKLVEXIIHUFDQGHDOZLWKXSWR
DXWKRUL]DWLRQV,IDXVHUKDVPRUHWKDQDXWKRUL]DWLRQVWKHYDOXHFDQEHVHWWR
7KHGHIDXOWYDOXHLVEXWWKLVGHIDXOWYDOXHFDQEHVHWWREHWZHHQ²,IIRUDQ\
UHDVRQ\RXKDYHWRUHVHWWKHXVHUEXIIHUVHH2QOLQH6HUYLFH6\VWHPQRWHDQGIRU
GHWDLOHGLQIRUPDWLRQ

1R&KHFNRQ2EMHFW6B7&2'(

$XWKQRBFKHFNBRQBWFRGH
)URP5HOHDVH(WKHV\VWHPFKHFNVRQREMHFW6B7&2'(,QVSHFLILFLQVWDQFHV\RXFDQWXUQ
WKLVFKHFNRIIEXWWKLVVWHSUHVXOWVLQDELJVHFXULW\ULVNIRU\RXUV\VWHP%\GHIDXOWWKH
IXQFWLRQLVLQDFWLYHDQGWKHSDUDPHWHUYDOXHLV17RVZLWFKWKHFKHFNRIIVHWWKHYDOXHWR<

1R&KHFNRQ&HUWDLQ$%$32EMHFWV

$XWKV\VWHPBDFFHVVBFKHFNBRII
8VHWKLVSDUDPHWHUWRWXUQRIIWKHDXWRPDWLFDXWKRUL]DWLRQFKHFNIRUSDUWLFXODU$%$3
ODQJXDJHHOHPHQWV ILOHRSHUDWLRQV&3,&FDOOVDQGFDOOVWRNHUQHOIXQFWLRQV 7KLVSDUDPHWHU
HQVXUHVWKHGRZQZDUGFRPSDWLELOLW\RIWKH5NHUQHO%\GHIDXOWWKHIXQFWLRQLVLQDFWLYH
YDOXH DQGFKHFNUHPDLQVDFWLYH 7RWXUQWKHFKHFNRIIVHWWKHYDOXHWR

Authorizations Made Easy


C–4
Appendix C: Important System Profile Parameters
RFC Authority Check

5)&$XWKRULW\&KHFN

$XWKUIFBDXWKRULW\BFKHFN
<RXFDQXVHWKLVSDUDPHWHUWRGHWHUPLQHZKHWKHUREMHFW6B5)&LVFKHFNHGGXULQJ5)&FDOOV
< 9DOXH QRFKHFNDJDLQVW6B5)&
< 9DOXH FKHFNDFWLYHEXWQRFKHFNIRU65)&)8*5
< 9DOXH FKHFNDFWLYHDQGFKHFNDJDLQVW65)&)8*5

Release 4.6A/B
C–5
Appendix C: Important System Profile Parameters
RFC Authority Check

Authorizations Made Easy


C–6
*ORVVDU\

7HUP 'HILQLWLRQ

$%$3 $%$3LVDQLQWHUSUHWDWLYHSODWIRUPLQGHSHQGHQWIRXUWKJHQHUDWLRQODQJXDJH
WDLORUHGWRGHYHORSEXVLQHVVDSSOLFDWLRQV7KHODQJXDJHVXSSRUWVVWUXFWXUHG
SURJUDPPLQJDQGFRQWDLQVHOHPHQWVQHFHVVDU\WRFDOOH[WHUQDOUHODWLRQDOGDWDEDVHV
WKURXJKRSHQ64/FDOOVRUGDWDEDVHVSHFLILFQDWLYH64/FDOOV7KHGHYHORSHULVQRW
UHTXLUHGWRNQRZWKHXQGHUO\LQJLQIUDVWUXFWXUH
$%$3 7KH$%$3'HYHORSPHQW:RUNEHQFKSURYLGHVDFRPSOHWHFOLHQWVHUYHUUXQWLPH
'HYHORSPHQW HQYLURQPHQWDQGH[WHQVLYHPDQDJHPHQWDQGWXQLQJWRROV7KH:RUNEHQFKLV6$3·V
:RUNEHQFK LQWHJUDWHGWRROVHWWRGHYHORSHQWHUSULVHZLGHFOLHQWVHUYHUDSSOLFDWLRQV7KLVWRRO
VHWLVSDUWLFXODUO\VXLWHGWR5FXVWRPHUVZKRZDQWWRHQKDQFHVWDQGDUG5
EXVLQHVVDSSOLFDWLRQVZLWKFXVWRPL]HGDGGRQIXQFWLRQDOLW\
7KHPDMRUFRPSRQHQWVRIWKH$%$3'HYHORSPHQW:RUNEHQFKLQFOXGH
< $%$33URJUDPPLQJ/DQJXDJH
< $%$3'LFWLRQDU\
< $%$3(GLWRU
< $%$3)XQFWLRQ/LEUDU\
< 'DWD0RGHOHU
< 55HSRVLWRU\
< 7HVW7RROV6FUHHQ3DLQWHU
< 0HQX3DLQWHU:RUNEHQFK2UJDQL]HU7UDQVSRUW6\VWHP
< 55HSRVLWRU\,QIRUPDWLRQ6\VWHP
7KHZRUNEHQFKLVDOVRDYDLODEOHWRFRPSDQLHVZKRDUHQRW5XVHUVEXWZDQWWKH
EHQHILWVRI6$3·VSURYHQGHYHORSPHQWHQYLURQPHQWIRUWKHLUVRIWZDUHSURMHFWV
$%$3'LFWLRQDU\ 7KH$%$3'LFWLRQDU\DFRPSRQHQWRIWKH'HYHORSPHQW:RUNEHQFKLVDFHQWUDO
LQIRUPDWLRQEDVHIRUDSSOLFDWLRQDQGV\VWHPGDWD7KH'LFWLRQDU\GHVFULEHVWKLV
GDWDIURPDORJLFDOSRLQWRIYLHZDQGVWRUHVLQIRUPDWLRQDERXWKRZWKHGDWDLV
UHSURGXFHGLQWKHXQGHUO\LQJUHODWLRQDOGDWDEDVH7KH$%$3'LFWLRQDU\LVDFWLYH
DQGIXOO\LQWHJUDWHGZLWKWKHRWKHU'HYHORSPHQW:RUNEHQFKWRROV$Q\FKDQJHVWR
WKH'LFWLRQDU\DUHDXWRPDWLFDOO\DQGLPPHGLDWHO\XSGDWHGWKURXJKRXWWKHV\VWHP

G–1
*ORVVDU\

7HUP 'HILQLWLRQ

$%$3(GLWRU 7KH$%$3(GLWRUDFRPSRQHQWRIWKH'HYHORSPHQW:RUNEHQFKSURYLGHVWKH
IROORZLQJIXQFWLRQVWRVXSSRUWWKHDSSOLFDWLRQGHYHORSHU
< 6\QWD[FKHFNZLWKDXWRPDWLFFRUUHFWLRQRIHUURUV
< ,QVHUWLRQRIFRGLQJSDWWHUQVIRUIUHTXHQWO\XVHGLQVWUXFWLRQV
< 1DYLJDWLRQLQWRRWKHUZRUNEHQFKWRROV
< *HQHUDWLRQRIZKHUHXVHGOLVWVIRUDOOGDWDREMHFWV
< 6SOLWVFUHHQHGLWRUZLWKSURJUDPFRPSDULVRQ
$FWLYDWLRQ $QDFWLYDWLRQDGPLQLVWUDWRUDFWLYDWHVDXWKRUL]DWLRQSURILOHVDQGDXWKRUL]DWLRQV
DGPLQLVWUDWRU PDNLQJWKHPHIIHFWLYHLQWKHV\VWHP7KHVHDGPLQLVWUDWRUVFDQRQO\FKDQJHRU
GHOHWHWKHSURILOHVDQGDXWKRUL]DWLRQVVSHFLILHGLQWKHLUDXWKRUL]DWLRQSURILOH
$FWLYHSODQ 7KLVLVWKHSODQYHUVLRQWKDWWKH56\VWHPUHFRJQL]HVDVYDOLGDQGFXUUHQWO\LQ
YHUVLRQ RSHUDWLRQ7KHLQIRUPDWLRQLQWKHDFWLYHSODQYHUVLRQLVXVHGWRSHUIRUPDOOGD\WR
GD\SURFHVVLQJDQGFURVVDSSOLFDWLRQPDLQWHQDQFH
<RXPXVWGHVLJQDWHRQHSODQYHUVLRQDFWLYHLI
< <RXDUHD6$3%XVLQHVV:RUNIORZXVHU
< ,QWHJUDWLRQLVDFWLYHEHWZHHQ3'DQGRWKHU5EXVLQHVVDSSOLFDWLRQVVXFKDV
WKH3*
<RXUVHOHFWHGSODQVKRXOGUHIOHFWWKHDFWXDOVWDWHRIRSHUDWLRQVDW\RXUILUP$Q\
RWKHUSODQYHUVLRQV\RXUFRPSDQ\PDLQWDLQVFDQEHXVHGWRH[SHULPHQWZLWK
GLIIHUHQWRUJDQL]DWLRQDOVFHQDULRV
$FWLYLW\JURXS $QDFWLYLW\JURXSLVDFROOHFWLRQRILQGLYLGXDODFWLYLWLHVWKDWDUHURXWLQHO\
SHUIRUPHGWRJHWKHURUDUHDIILOLDWHGLQVRPHZD\)RUH[DPSOHWKHWUDQVODWLRQ
WDVNVDFWLYLW\JURXSFRXOGLQFOXGHDOOWDVNVUHSRUWVDQGWUDQVDFWLRQVDVVRFLDWHG
ZLWKWUDQVODWLRQ<RXVHWXSDFWLYLW\JURXSVE\OLQNLQJVLQJOHDFWLYLWLHVXQGHUDQ
DFWLYLW\JURXSQDPH$VLQJOHDFWLYLW\PD\EHLQFOXGHGLQPRUHWKDQRQHDFWLYLW\
JURXS
$SSOLFDWLRQ $FRPSXWHUZKHUHWKHDSSOLFDWLRQORJLFDQGDSSOLFDWLRQFRQWUROVHUYLFHVRIWKH5
VHUYHU 6\VWHPUXQ
$XWKRUL]DWLRQ $QDXWKRUL]DWLRQLVWKHDXWKRULW\WRSHUIRUPDSDUWLFXODUDFWLRQLQWKH56\VWHP
(DFKDXWKRUL]DWLRQUHIHUVWRRQHDXWKRUL]DWLRQREMHFWDQGGHILQHVRQHRUPRUH
SRVVLEOHYDOXHVIRUHDFKDXWKRUL]DWLRQILHOGOLVWHGIRUWKDWDXWKRUL]DWLRQREMHFW$
XVHU·VDXWKRUL]DWLRQVDUHFRPELQHGLQDSURILOHWKDWLVHQWHUHGLQWKHXVHU·VPDVWHU
UHFRUG
$XWKRUL]DWLRQ 7KHXVHUUHVSRQVLEOHIRUPDLQWDLQLQJDXWKRUL]DWLRQVDQGDXWKRUL]DWLRQSURILOHVLV
DGPLQLVWUDWRU WKHDXWKRUL]DWLRQDGPLQLVWUDWRU)RUVHFXULW\UHDVRQVWKLVXVHUVKRXOGQRWEH
DXWKRUL]HGWRDFWLYDWHDXWKRUL]DWLRQVDQGSURILOHVRUWRPDLQWDLQXVHUPDVWHU
UHFRUGV2WKHUZLVHRQHXVHUZRXOGVLQJOHKDQGHGO\GHILQHDFWLYDWHDQGDVVLJQ
V\VWHPDFFHVVDXWKRUL]DWLRQV

Authorizations Made Easy


G–2
*ORVVDU\

7HUP 'HILQLWLRQ

$XWKRUL]DWLRQ 7KLVFKHFNGHFLGHVZKHWKHUDXVHULVDXWKRUL]HGWRH[HFXWHDSDUWLFXODUIXQFWLRQ
FKHFN 3URFHVVHVIXQFWLRQVDQGGDWDDFFHVVHVLQWKH56\VWHPFDQRQO\EHSHUIRUPHG
ZKHQXVHUDXWKRUL]DWLRQVKDYHEHHQFKHFNHGLQWKHUHVSHFWLYHV\VWHPDQG
DSSOLFDWLRQSURJUDPV
$XWKRUL]DWLRQ *HQHUDODFFHVVWRDVWDQGDUGGDWDEDVHIRUGLIIHUHQWDSSOLFDWLRQVUHTXLUHVUHOLDEOH
FRQFHSW PHFKDQLVPVGHVLJQHGWRHQVXUHWKHFRQILGHQWLDOLW\RISHUVRQDOLQIRUPDWLRQ$
PXOWLOHYHOJUDGHGDXWKRUL]DWLRQFRQFHSWKDVEHHQVHWXSWRUHJXODWHGDWDDFFHVV
2QO\WKRVHSHRSOHZLWKDFWLYHXVHUPDVWHUUHFRUGVFDQDFFHVVWKHV\VWHP7KH
DXWKRUL]DWLRQFRQFHSWFRYHUVWKHVWUXFWXUHDQGIXQFWLRQDOLW\RIDXWKRUL]DWLRQ
DVVLJQPHQWDQGFKHFNLQJLQWKH56\VWHP$XWKRUL]DWLRQVSURWHFWWKHV\VWHP
IURPXQDXWKRUL]HGDFFHVV
$XWKRUL]DWLRQ 2QHHOHPHQWRIDQDXWKRUL]DWLRQREMHFWLVWKHDXWKRUL]DWLRQILHOG,QDXWKRUL]DWLRQ
ILHOG REMHFWVWKHVHILHOGVUHSUHVHQWYDOXHVIRULQGLYLGXDOV\VWHPHOHPHQWVZKLFK
XQGHUJRDXWKRUL]DWLRQFKHFNLQJWRYHULI\DXVHU·VDXWKRUL]DWLRQ
$XWKRUL]DWLRQ $QDXWKRUL]DWLRQJURXSLVWKHFRPELQHGILHOGVRIWKHDXWKRUL]DWLRQREMHFWV
JURXS 6B'(9(/23 SURJUDPGHYHORSPHQWDQGSURJUDPH[HFXWLRQ DQG6B352*5$0
SURJUDPPDLQWHQDQFH 7KHDXWKRUL]DWLRQJURXSILHOGFRQWDLQVWKHQDPHRID
SURJUDPJURXSWKDWDOORZVXVHUVWRSHUIRUPWKHIROORZLQJRSHUDWLRQV
< ([HFXWHSURJUDPV
< 6FKHGXOHMREVIRUEDFNJURXQGSURFHVVLQJ
< 0DLQWDLQSURJUDPV
< 0DLQWDLQYDULDQWV
:KHQFUHDWLQJDSURJUDP\RXFDQVSHFLI\DQDXWKRUL]DWLRQJURXSDVRQHRIWKH
SURJUDPDWWULEXWHV7KLVVWHSDOORZV\RXWRJURXSSURJUDPVIRUDXWKRUL]DWLRQ
FKHFNLQJ
$XWKRUL]DWLRQ $QRWKHUHOHPHQWRIWKHDXWKRUL]DWLRQFRQFHSWLVWKHDXWKRUL]DWLRQREMHFWWKDWDOORZV
REMHFW \RXWRGHILQHFRPSOH[DXWKRUL]DWLRQV$QDXWKRUL]DWLRQREMHFWJURXSVXSWR
DXWKRUL]DWLRQILHOGVLQDQ´$1'µUHODWLRQVKLSWRFKHFNZKHWKHUDXVHULVDOORZHGWR
SHUIRUPDFHUWDLQDFWLRQ7RSDVVDQDXWKRUL]DWLRQWHVWIRUDQREMHFWWKHXVHUPXVW
VDWLVI\WKHDXWKRUL]DWLRQFKHFNIRUHDFKILHOGLQWKDWREMHFW
$XWKRUL]DWLRQ 7KHDXWKRUL]DWLRQSURILOHLVDQRWKHUHOHPHQWRIWKHDXWKRUL]DWLRQFRQFHSWWKDWJLYHV
SURILOH XVHUVDFFHVVWRWKHV\VWHP7KHSURILOHVFRQWDLQDXWKRUL]DWLRQVLGHQWLILHGE\WKH
DXWKRUL]DWLRQREMHFWDQGWKHDXWKRUL]DWLRQQDPH,IDSURILOHLVVSHFLILHGLQDXVHU
PDVWHUUHFRUGWKHXVHUKDVDOOWKHDXWKRUL]DWLRQVGHILQHGLQWKDWSURILOH
$XWKRUL]DWLRQ 7KLVLVDWUDQVDFWLRQWKDWUHFRUGVDOOWKHUHTXLUHGDXWKRUL]DWLRQREMHFWVLQD
WUDFH SURFHVVLQJVWHS
%DFNJURXQG 7KHEDFNJURXQGSURFHVVLVWKHQRQLQWHUDFWLYHH[HFXWLRQRISURJUDPVZKLFKLQWKH
SURFHVV 56\VWHPDUHKDQGOHGOLNHRQOLQHRSHUDWLRQV%DFNJURXQGSURFHVVHVRIWHQXVH
WKHVDPHSURJUDPVWKDWFRQWUROWKHGLDORJV

Release 4.6A/B 
G–3
*ORVVDU\

7HUP 'HILQLWLRQ

%XVLQHVVSURFHVV %XVLQHVVSURFHVVHVJURXSWDVNVPDGHDFURVVFRVWFHQWHUVLQ\RXUFRPSDQ\7KLV
SURFHVVHQDEOHV\RXWRVWUXFWXUH\RXUFRPSDQ\·VSURFHVVHVE\IXQFWLRQ
([DPSOHVLQFOXGH
< 'HYHORSLQJDSURGXFW
< 'UDZLQJXSDTXRWDWLRQ
< 3XUFKDVLQJDPDWHULDO
< 3URFHVVLQJDQRUGHU
%XVLQHVV 7KLVVXSSRUWSURYLGHGIRUE\WUDQVDFWLRQSURFHVVLQJLQWKH56\VWHPWDNHVLQWR
:RUNIORZ 6$3 DFFRXQWWKHEXVLQHVVHQYLURQPHQWV·QHHGV
&KHFNLQGLFDWRU $FKHFNLQGLFDWRULVVHWWRGHWHUPLQHZKHWKHUDXWKRUL]DWLRQREMHFWVDUH
XQPDLQWDLQHGQRWFKHFNHGFKHFNHGRUFKHFNHGPDLQWDLQHG
&OLHQWVHUYHU 2ZLQJWRWKHVRIWZDUHRULHQWHGFOLHQWVHUYHUDUFKLWHFWXUHRIWKH56\VWHPORJLF
DUFKLWHFWXUHWLHU DQGGDWDRIWKHWKUHHLPSOHPHQWHGOHYHOV³GDWDEDVHDSSOLFDWLRQDQGSUHVHQWDWLRQ
VHUYLFHV³FDQEHGLVWULEXWHGDPRQJGHGLFDWHGVHUYHUV7KHLQGLYLGXDOVHUYLFHVFDQ
EHIOH[LEOHHLWKHUDVFOLHQWVRUVHUYHUVGHSHQGLQJRQWKHWDVNVWREHSHUIRUPHGLQ
HDFKFDVH
&RPSRVLWH $FRPSRVLWHDFWLYLW\JURXSLVDQDFWLYLW\JURXSWKDWFRQWDLQVPXOWLSOHDFWLYLW\
DFWLYLW\JURXSV JURXSV
&XVWRPL]LQJ ,Q6$3WHUPLQRORJ\FXVWRPL]LQJLVWKHLPSOHPHQWDWLRQRIFRQILJXUDWLRQVZLWKLQ
&RQILJXUDWLRQ WKHIOH[LELOLW\RIWKH56\VWHP,WLVWKHEDVLVIRUHYHU\5SURMHFWZKHWKHULWLV
DQLQWURGXFWLRQVXEVHTXHQWSURMHFWVWDJHRUSURFHVVFKDQJH7KHFRQILJXUDWLRQ
LQFOXGHV

< 53URFHGXUH0RGHODSURFHGXUDOJXLGHIRUVWUXFWXULQJD6$3
LPSOHPHQWDWLRQ
< 55HIHUHQFH0RGHOLQWKH%XVLQHVV1DYLJDWRUDJUDSKLFDOGHVFULSWLRQRI
EXVLQHVVSURFHVVHV
< ,PSOHPHQWDWLRQ*XLGH ,0* PHQXOHGSDUDPHWHUVHWWLQJV
< 3URMHFWPDQDJHPHQWWKURXJKXSORDGDQGGRZQORDGIDFLOLWLHVDQGWRDQGIURP
0LFURVRIW3URMHFW
< $PRGHOFRPSDQ\ ,'(6 DIXOO\LQWHJUDWHGDQGSUHFRQILJXUHGV\VWHPXVHGIRU
WUDLQLQJDQGWHVWLQJ
7KHFXVWRPL]LQJWRROVDOVREHORQJWRWKH%XVLQHVV(QJLQHHULQJ:RUNEHQFKDQGDUH
SURYLGHGDWQRH[WUDFKDUJHZLWKWKH56\VWHP$GGRQFXVWRPL]LQJLVGLVFXVVHG
LQWKH$%$3'HYHORSPHQW:RUNEHQFKVHFWLRQ
'DWDEDVHVHUYHU 7KLVLVWKHFRPSXWHUZKHUHDGDWDEDVHLVLQVWDOOHG6SHFLDOO\RSWLPL]HGKDUGZDUH
PD\EHXVHGIRUUXQQLQJGDWDEDVHV

 G–4 Authorizations Made Easy


*ORVVDU\

7HUP 'HILQLWLRQ

'HVNWRS $3&WKDWLVXVHGDVDZRUNVWDWLRQLVFRQVLGHUHGWREHGHVNWRS,GHDOO\WKHGHVNWRS
KDVDFFHVVWRDOOV\VWHPVDQGIXQFWLRQVQHHGHGIRUDXVHUWRPDQDJHDXWKRUL]HG
WDVNV
'\QSUR 6KRUWIRUG\QDPLFSURJUDPDG\QSURFRQVLVWVRIDVFUHHQDQGDVVRFLDWHGSURFHVVLQJ
ORJLFVXFKDVYDOLGDWLRQSURFHGXUHV(DFKG\QSURFRQWUROVH[DFWO\RQHGLDORJVWHS
(DV\$FFHVV0HQX 7KH(DV\$FFHVVPHQXLV6$3·VQHZ*8,IRUZRUNLQJZLWKWKH56\VWHP7KH
(DV\$FFHVPHQXLVEDVHGRQWKHXVHUUROHWHPSODWHWKDWKDVEHHQDVVLJQHGWRDQ
XVHU7KHPHQXFRQWDLQVRQO\WKRVHWUDQVDFWLRQVDQGUHSRUWVWKDWWKHXVHUJRW
DVVLJQHGWKURXJKWKHDFWLYLW\JURXSDVVLJQHGWRKLP7KHUHIRUHWKHXVHUZLOORQO\
VHHWKRVHWUDQVDFWLRQVKHLVDOORZHGWRSHUIRUP
$XVHUFDQFKRRVHEHWZHHQWZRGLIIHUHQWYLHZVRI5
< 7KHFRPSOHWH6$3PHQX
< 7KHXVHUVSHFLILFPHQX
*HQHUDWH 7KLVIXQFWLRQVDYHVDQGDFWLYDWHVDQREMHFW%HIRUHDFWLYDWLQJWKHREMHFWWKHV\VWHP
DXWRPDWLFDOO\SHUIRUPVDFRQVLVWHQF\FKHFN
*66$3, 7KH*66$3,LVWKHVWDQGDUGL]HG6HFXULW\$3,ZLWKDVWDQGDUGFRPPXQLFDWLRQ
PRGHOWRDEVWUDFWIURPWKHLQGLYLGXDOSURGXFWVDQGWKHLUFKDUDFWHULVWLFV7KH
&RPPRQ$XWKHQWLFDWLRQ7HFKQRORJLHV &$7 ZRUNJURXSRIWKH,QWHUQHW
(QJLQHHULQJ7DVN)RUFH ,(7) GHILQHVWKHVWDQGDUGL]DWLRQSURSRVDOV7KH
IXQFWLRQDOVSHFLILFDWLRQRI*66$3,9HUVLRQWKHYHUVLRQVXSSRUWHGE\5LV
FXUUHQWO\DQ,QWHUQHWGUDIW
+XPDQUHVRXUFHV 3HUVRQQHOSODQQLQJDQGGHYHORSPHQWGHDOVZLWKDQWLFLSDWLQJIXWXUHSHUVRQQHO
SODQQLQJ QHHGV3ODQQHUVVKRXOGFRQVLGHUVKRUWPHGLXPDQGORQJWHUPJRDOVZKHQ
FRQVLGHULQJFRPSDQ\SROLF\DQGWKHFRVWVLQYROYHG*RRGKXPDQUHVRXUFHV
SODQQLQJHQVXUHVWKDWWKHFRPSDQ\KDVWKHDSSURSULDWHQXPEHURIHPSOR\HHVZLWK
WKHUHTXLUHGVNLOOVLQWKHFRUUHFWSRVLWLRQ
,0*DFWLYLW\ $Q,PSOHPHQWDWLRQJXLGH ,0* DFWLYLW\LVDQH[SODQDWLRQRIDV\VWHPVHWWLQJ
DFWLYLW\$FWLYLWLHVLQWKH,0*DUHOLQNHGGLUHFWO\WRWKHFRUUHVSRQGLQJFXVWRPL]LQJ
WUDQVDFWLRQVXVHGWRFUHDWHWKHDSSURSULDWHV\VWHPVHWWLQJ<RXFDQXVH,0*
DFWLYLWLHVWRUHFRUGWKHQRWHVWKDWGRFXPHQW\RXUV\VWHPVHWWLQJV<RXFDQDOVREDVH
WKHUHFRUGLQJRUVWDWXVRISURMHFWPDQDJHPHQWLQIRUPDWLRQRQ,0*DFWLYLWLHV
,PSOHPHQWDWLRQ 7KLVSURFHVVLQYROYHVVZLWFKLQJIURPDQH[LVWLQJPDQDJHPHQWV\VWHPDQGEXVLQHVV
SUDFWLFHDQGKDYLQJ5UXQSDUWRIRUWKHHQWLUHEXVLQHVV

Release 4.6A/B 
G–5
*ORVVDU\

7HUP 'HILQLWLRQ

,PSOHPHQWDWLRQ $OVRUHIHUUHGWRDVWKH,0*WKHJXLGHLVDWRROIRUFRQILJXULQJWKH56\VWHPWR
*XLGH PHHWFXVWRPHUUHTXLUHPHQWV)RUHDFKEXVLQHVVDSSOLFDWLRQWKHLPSOHPHQWDWLRQ
JXLGH
< ([SODLQVDOOWKHVWHSVLQWKHLPSOHPHQWDWLRQSURFHVV
< 7HOOV\RXWKH6$3VWDQGDUG IDFWRU\ VHWWLQJV
< 'HVFULEHVV\VWHPFRQILJXUDWLRQZRUN DFWLYLWLHV DQGLQWHUDFWLYHO\RSHQVWKH
DFWLYLWLHV
7KH,0*DUHVWUXFWXUHGDVK\SHUWH[W7KHKLHUDUFKLFDOVWUXFWXUHUHIOHFWVWKH
VWUXFWXUHRIWKH5EXVLQHVVDSSOLFDWLRQFRPSRQHQWVDQGOLVWVDOOWKH
GRFXPHQWDWLRQUHODWHGWRLPSOHPHQWLQJ57KH,0*FRQWDLQVDFWLYHIXQFWLRQV
ZLWKZKLFK\RXFDQ
< 2SHQFXVWRPL]LQJWUDQVDFWLRQV
< :ULWHSURMHFWGRFXPHQWDWLRQ
< 0DLQWDLQVWDWXVLQIRUPDWLRQ
< 6XSSRUW\RXUSURMHFWGRFXPHQWDWLRQZRUNDQGWKHPDQDJHPHQWRI\RXU5
6\VWHPLPSOHPHQWDWLRQ
,PSOHPHQWDWLRQ 7KLVSURMHFWUHODWHVWRWKHLPSOHPHQWDWLRQRIDVSHFLILFJURXSRI5IXQFWLRQVDQG
SURMHFW SURFHVVHVZLWKDFRPPRQJROLYHGDWH
,PSOHPHQWDWLRQ $QLPSOHPHQWDWLRQVWUDWHJ\LVDQDSSURDFKWR5LPSOHPHQWDWLRQ7KHVWUDWHJ\LV
VWUDWHJ\ EDVHGRQORQJWHUPSHUVSHFWLYHVDQGLQFOXGHVDOOVWHSVDFURVVWKHZKROHHQWHUSULVH
SODQQHGLQFRQQHFWLRQZLWKLPSOHPHQWLQJWKH56\VWHP(VWDEOLVKLQJWKLV
VWUDWHJ\LVDQHVVHQWLDOSDUWRISURMHFWSUHSDUDWLRQDQGLPSDFWVWKHVHTXHQFHRI
LPSOHPHQWDWLRQSURMHFWV
,QIRW\SH ,QIRW\SHVDOORZ\RXWRGHVFULEHRUGHILQHWKHGLIIHUHQWDWWULEXWHVWKDWREMHFWVKDYH
:LWKLQSHUVRQQHOGHYHORSPHQW 3' WKHUHDUHPDQ\GLIIHUHQWLQIRW\SHVHDFKRQH
GHVFULELQJDVSHFLILFVHWRIDWWULEXWHV6RPHLQIRW\SHVDSSO\RQO\WRFHUWDLQW\SHVRI
REMHFWVZKLOHRWKHUVFDQEHGHILQHGIRUDQ\W\SHRIREMHFW
,QVWDQFHSURILOH 7KHLQVWDQFHSURILOHFRQWDLQVDSSOLFDWLRQVHUYHUVSHFLILFFRQILJXUDWLRQSDUDPHWHUV
ZKLFKFRPSOHWHWKHVHWYDOXHVRIWKHGHIDXOWSURILOH
-RE $MRELVDJHQHUDOFODVVLILFDWLRQRIZRUNGXWLHVVXFKDVVHFUHWDU\DQGPDQDJHU
0DQ\HPSOR\HHVPD\KDYHWKHVDPHMREFODVVLILFDWLRQ7KDWLVWKHUHFDQEH
VHFUHWDULHVDQGHLJKWPDQDJHUV-REVVKRXOGQRWEHFRQIXVHGZLWKSRVLWLRQV VHH
EHORZ 
0HQX 0HQXVDUHFRQWUROHOHPHQWVRIIHULQJWKHXVHUDUDQJHRIRSWLRQVZKLFKZKHQ
FKRVHQSURPSWVWKHV\VWHPWRH[HFXWHDQDFWLRQ7KHOD\RXWRIWKHPHQXEDUKDV
EHHQGHILQHGIRUHDFK56\VWHPOHYHO0HQXRSWLRQVDUHVHOHFWHGHLWKHUZLWKD
VLQJOHPRXVHFOLFNRUE\SRVLWLRQLQJWKHFXUVRUDQGE\SUHVVLQJ(QWHU

Authorizations Made Easy


G–6
*ORVVDU\

7HUP 'HILQLWLRQ

0HQXEDU $PHQXEDULVWKHEDUDFURVVWKHWRSRIWKHZLQGRZORFDWHGMXVWDERYHWKHVWDQGDUG
WRROEDUV:KHQ\RXFKRRVHDPHQXRSWLRQIURPWKHPHQXEDU\RXRSHQD
GURSGRZQPHQXZLWKGLIIHUHQWFKRLFHV7KHV\VWHPDXWRPDWLFDOO\LQFOXGHVWKH
6\VWHPDQG+HOSPHQXV
1DPHUDQJH 7KHQDPHUDQJHLVDNH\DUHDRIDWDEOH,WHIIHFWLYHO\UHVHUYHVSDUWRIWKHNH\DUHD
RQO\IRUFXVWRPHUVRUIRU6$3
1HWZRUNVHFXULW\ 1HWZRUNVHFXULW\LVDQHWZRUNFRQQHFWLRQFRQILJXUHGWRSURWHFW6$3DQGLWV
FXVWRPHUVIURPSUREOHPVVXFKDVXQDXWKRUL]HGDFFHVVLQKHUHQWWR:$1QHWZRUN
FRQQHFWLRQV
2UJDQL]DWLRQDO 2UJDQL]DWLRQDOOHYHOVDUHKLHUDUFKLFDOOHYHOVZKHUHFHUWDLQGDWDLQDPDWHULDOPDVWHU
OHYHO UHFRUGLVFUHDWHG([DPSOHVRIRUJDQL]DWLRQDOOHYHOVDUHFOLHQWSODQWDQGVWRUDJH
ORFDWLRQ
2QOLQH6HUYLFH 6HH6$31HW²5)URQWHQGQRWHV
6\VWHP
3DVVZRUG $SDVVZRUGLVDXVHUFRGHWKDWFRPSULVHVWKHIROORZLQJHOHPHQWVWKDWXVHUVQHHGWR
ORJRQWRWKHV\VWHP
< 6WULQJRIILJXUHV
< /HWWHUV
< 6SHFLDOFKDUDFWHUVWKDWWKHXVHUPXVWHQWHU
< $XVHU,'
3ODQYHUVLRQ $SODQYHUVLRQLVDGHVLJQDWHGDUHDZKHUH\RXGHSRVLWRUVWRUHVHWVRILQIRUPDWLRQ
:KHQHYHU\RXHQWHUDQ\LQIRUPDWLRQLQ3'\RXPXVWVSHFLI\WKHSODQYHUVLRQ
ZKHUHWKHLQIRUPDWLRQVKRXOGEHNHSW$VLQJOHSODQYHUVLRQFRXOGLQFOXGH
LQIRUPDWLRQIURPDQ\RIWKH3'PRGXOHVVXFKDV2UJDQL]DWLRQDQG3ODQQLQJ
6HPLQDUDQG&RQYHQWLRQRU6KLIW3ODQQLQJ<RXFDQPDLQWDLQPRUHWKDQRQHSODQ
YHUVLRQ7KLVDOORZV\RXWRXVHGLIIHUHQWSODQYHUVLRQVWRUHSUHVHQWGLIIHUHQW
VFHQDULRVIRU\RXUILUP+RZHYHU\RXPXVWGHVLJQDWHRQHSODQYHUVLRQDVWKH
DFWLYHSODQLI\RXDUHD6$3%XVLQHVV:RUNIORZXVHUDQGLILQWHJUDWLRQLVDFWLYH
EHWZHHQ3'DQGRWKHU5EXVLQHVVDSSOLFDWLRQV
3RVLWLRQ 3RVLWLRQVDUHWKHLQGLYLGXDOHPSOR\HHSODFHPHQWVRUDVVLJQPHQWVLQDFRPSDQ\ IRU
H[DPSOHVHFUHWDU\RIPDUNHWLQJRUDVDOHVPDQDJHU %\FUHDWLQJSRVLWLRQVDQG
FUHDWLQJUHODWLRQVKLSVEHWZHHQWKHSRVLWLRQV\RXLGHQWLI\WKHDXWKRULW\VWUXFWXUHRU
FKDLQRIFRPPDQGDW\RXUILUP3RVLWLRQVVKRXOGQRWEHFRQIXVHGZLWKMREV VHH
DERYH 
3UHVHQWDWLRQ $FRPSXWHUXVXDOO\D3&RU0DFLQWRVKXVHGIRUSUHVHQWDWLRQLQWKH56\VWHPLV
VHUYHU FDOOHGDSUHVHQWDWLRQVHUYHU

Release 4.6A/B 
G–7
*ORVVDU\

7HUP 'HILQLWLRQ

3URFHVVIORZYLHZ 7KHSURFHVVIORZYLHZLVRQHRIWKHWZRQDYLJDWLRQSDWKVLQWKH%XVLQHVV1DYLJDWRU
WKHRWKHUEHLQJWKHFRPSRQHQWYLHZ7KHSURFHVVIORZYLHZRIWKH55HIHUHQFH
0RGHOSURYLGHVSURFHVVRULHQWHGDFFHVVWRWKHVFHQDULRVDQGSURFHVVHVLQWKH
0RGHO,WLVDUUDQJHGDVDVWUXFWXUHZLWKWKHIROORZLQJOHYHOV
< (QWHUSULVHDUHDV
< 6FHQDULRSURFHVVHV
< 3URFHVVHV
3URFHVVVHOHFWLRQ 7KHSURFHVVVHOHFWLRQPDWUL[LVDPRGHOW\SHLQWKH55HIHUHQFH0RGHO7KH
PDWUL[ PDWUL[GHVFULEHVWKHDVVLJQPHQWRISURFHVVHVWRVFHQDULRVZKLFKDUHWKHFROXPQVLQ
DSURFHVVVHOHFWLRQPDWUL[3URFHVVHVEHORQJLQJWRDVFHQDULRDUHOLVWHGDQGDVVLJQHG
XQGHUWKDWVFHQDULR FROXPQKHDG 6FHQDULRDQGSURFHVVLFRQVSURYLGHDFFHVVWR
FRUUHVSRQGLQJ(3&V
3URILOH $SURILOHLVDFROOHFWLRQRIDXWKRUL]DWLRQVIRUSDUWLFXODUXVHUJURXSVHQWHUHGLQWKH
XVHUPDVWHUUHFRUG7KHVDPHSURILOHFDQEHDVVLJQHGWRDQ\QXPEHURIXVHUV
7KHUHDUHWZRW\SHVRIDXWKRUL]DWLRQSURILOHV
< 6LPSOHDFROOHFWLRQRIDXWKRUL]DWLRQVIRUDSDUWLFXODUWDVN
< &RPSRVLWHDFROOHFWLRQRIVHYHUDOVLPSOHSURILOHV
3URILOH :KHQDQDFWLYLW\JURXSLVPRGLILHGXVLQJWUDQVDFWLRQ3)&*LWVDVVRFLDWHG
FRPSDULVRQ DXWKRUL]DWLRQSURILOHLVQRWDXWRPDWLFDOO\XSGDWHG7KHXVHUPXVWFDUU\RXWD
SURILOHFRPSDULVRQWRHQVXUHWKDWWKHDXWKRUL]DWLRQVFRQWDLQHGLQWKHDXWKRUL]DWLRQ
SURILOHFRUUHVSRQGZLWKWKHQHZFRQWHQWVRIWKHDFWLYLW\JURXS
3URILOH*HQHUDWRU 7KH3URILOH*HQHUDWRU 3* VXSSRUWVWKHDXWKRUL]DWLRQDGPLQLVWUDWRUVHWWLQJXSWKH
DXWKRUL]DWLRQFRQFHSWDWWKHFXVWRPHUVLWH$FFRUGLQJWRDVHWRIDSSOLFDWLRQ
FRPSRQHQWVFKRVHQE\WKHDGPLQLVWUDWRUWKH3*DXWRPDWLFDOO\FUHDWHVDQ
DXWKRUL]DWLRQSURILOH7KHDGPLQLVWUDWRUFDQWKHQHDVLO\FXVWRPL]HDQGPRGLI\WKH
DXWKRUL]DWLRQVLQWKHSURILOHE\XVLQJVSHFLDOPDLQWHQDQFHWUDQVDFWLRQVRIIHUHGE\
WKH3*
3URJUDPDWWULEXWH $SURSHUW\RIDSURJUDPLVFDOOHGDSURJUDPDWWULEXWH7KHDWWULEXWHVRIDQ$%$3
SURJUDPGHILQHLWVEDVLFFKDUDFWHULVWLFVVRWKDWWKHV\VWHPFDQSURFHVVLWFRUUHFWO\
7KHSURJUDPDWWULEXWHVLQFOXGHWKHIROORZLQJHOHPHQWV
< 3URJUDPWLWOH
< 3URJUDPW\SH
< 3URJUDPVWDWXV
< $XWKRUL]DWLRQJURXS
< 'HYHORSPHQWFODVV

Authorizations Made Easy


G–8
*ORVVDU\

7HUP 'HILQLWLRQ

3XVKEXWWRQ 3XVKEXWWRQVRUEXWWRQVDUHJUDSKLFDOFRQWUROHOHPHQWVWKDW\RXFOLFNRQFHWR
H[HFXWHWKHIXQFWLRQVOLQNHGWRWKHP,QWKH56\VWHP\RXFDQDOVRVWDUW
IXQFWLRQVZLWKWKHNH\ERDUG7RGRWKLVSODFHWKHFXUVRURQWKHEXWWRQDQGSUHVV
HLWKHUWKH(QWHUNH\RU(QWHUEXWWRQ3XVKEXWWRQVPD\FRQWDLQWH[WRUJUDSKLF
V\PEROV
5DGLREXWWRQ 7KHUDGLREXWWRQLVDQRWKHUJUDSKLFDOFRQWUROHOHPHQWWKDWDOORZVWKHXVHUWRVHOHFW
DQLWHPIURPDOLVWRIILHOGV,IWKHXVHULVDOORZHGWRVHOHFWVHYHUDOILHOGVDWRQFH
FKHFNER[HVDUHXVHG
5HOHDVH&KDQJHV <RXFDQJHQHUDWHVSHFLILF,0*IRUUHOHDVHXSJUDGHVRUFKDQJHRYHUV7KHVHJXLGHV
DQG8SJUDGHV FRQWDLQDVSHFLILFOLVWRI,0*DFWLYLWLHVLQFOXGLQJDOOFKDQJHGRUQHZIXQFWLRQVLQ
WKHQHZ5UHOHDVH7KLVIDFLOLWDWHVWKHLPSOHPHQWDWLRQRIUHOHDVHSURMHFWV$OO
UHOHDVHQRWHVFDQDOVREHLPPHGLDWHO\DFFHVVHGIURPWKLVORFDWLRQ
5HSRUW $UHSRUWVHOHFWVGDWDIURPDGDWDEDVHDQGGLVSOD\VLWLQDVWUXFWXUHGIRUPIRU
DQDO\VLV<RXPD\SULQWWKHUHSRUWUHVXOWVRUGLVSOD\WKHPRQOLQH7KHV\VWHPDOVR
SURYLGHVWKHRSWLRQRIVDYLQJWKHVHOHFWHGUHSRUWGDWDWRUHYLHZZLWKRXWKDYLQJWR
UHFUHDWHLW
5HVSRQVLELOLW\ 5HVSRQVLELOLWLHVGLIIHUHQWLDWHDXWKRULW\SURILOHVJHQHUDWHGIURPDFWLYLW\JURXSV
5HVSRQVLELOLWLHVDUHOLQNHGWRDXWKRULW\SURILOHVDQGWRDFWLYLW\JURXSV$QDFWLYLW\
JURXSLVDQREMHFWZKHUH\RXFROOHFWDQXPEHURIV\VWHPDFWLYLWLHV$QDXWKRULW\
SURILOHLVJHQHUDWHGXVLQJ3*ZKLFKGHVLJQDWHVWKHXVHU·VDXWKRULWLHVLQWKHV\VWHP
5HVSRQVLELOLWLHVGRQ·WH[LVWLQDQ\PRUH
6$3%XVLQHVV 6$3%XVLQHVV:RUNIORZ FRPSULVHVWHFKQRORJLHVDQGWRROVWRDXWRPDWLFDOO\
Š

:RUNIORZ FRQWURODQGH[HFXWHFURVVDSSOLFDWLRQSURFHVVHVZKLFKSULPDULO\LQYROYHV
FRRUGLQDWLQJWKH
< 3HUVRQVLQYROYHG
< :RUNVWHSVUHTXLUHG
< 'DWD EXVLQHVVREMHFWV WKDWQHHGWREHSURFHVVHG
2XUSULPDU\JRDOVZLWKWKHZRUNIORZDUHWRUHGXFHWKURXJKSXWWLPHVWRUHGXFHWKH
FRVWVLQYROYHGLQPDQDJLQJEXVLQHVVSURFHVVHVDQGWRLQFUHDVHWUDQVSDUHQF\DQG
TXDOLW\
6$31HW5 7KH6$31HW²5)URQWHQG IRUPHUO\NQRZQDV2QOLQH6HUYLFH6\VWHP SURYLGHVD
)URQWHQGQRWHV GLUHFWFRPPXQLFDWLRQOLQNWR6$3DOORZLQJFXVWRPHUVWRTXLFNO\DQGHIILFLHQWO\
REWDLQSUREOHPVROYLQJLQIRUPDWLRQIRUWKH56\VWHP
6$3VWDQGDUG )URPWKH6$3VWDQGDUGPHQX\RXFDQDFFHVVWKHIXOOUDQJHRI6$3IXQFWLRQV
PHQX

Release 4.6A/B 
G–9
*ORVVDU\

7HUP 'HILQLWLRQ

6$3*8, 6$3*8,LVWKHJUDSKLFDOXVHULQWHUIDFHRIWKH56\VWHP
6$3URXWHU 6$3URXWHULVDVRIWZDUHPRGXOHWKDWDFWVDVSDUWRIDILUHZDOOV\VWHP6$3URXWHU
VLPSOLILHVWKHFRQILJXUDWLRQRIQHWZRUNVHFXULW\DQGWKHURXWLQJRIWUDIILFWRDQG
IURP57KH6$3URXWHUHVWDEOLVKHVDQLQGLUHFWFRQQHFWLRQEHWZHHQWKH5
QHWZRUNDQGDQRXWHUQHWZRUN7KHUHLVUHVWULFWHGDFFHVVWRWKHDSSOLFDWLRQOD\HU
EHWZHHQFOLHQWVRIWZDUHDQGWKH5DSSOLFDWLRQVHUYHU
6FUHHQ $VFUHHQLVHVVHQWLDOO\WKHSULPDU\ZLQGRZRIDVHVVLRQ
6HFXUH1HWZRUN :LWKLQWKHIUDPHZRUNRIWKH6HFXUH1HWZRUN&RPPXQLFDWLRQVSURMHFW6$3LV
&RPPXQLFDWLRQV LPSOHPHQWLQJWKH*66$3,LQ5HQDEOLQJ5WREHLQWHJUDWHGLQWRFRPSDQ\
61& ZLGHQHWZRUNVHFXULW\V\VWHPVVXFKDV.HUEHURVRU6HFX'($VWKH*66$3,LVWKH
VWDQGDUGLQWHUIDFHLQWKHVHFXULW\DUHD6$3RSHUDWHVZLWKDOO*66$3,FRPSOLDQW
VHFXULW\V\VWHPV
6HOHFW 7KLVIXQFWLRQDOORZV\RXWRVHOHFWDQREMHFWIRUIXUWKHUSURFHVVLQJE\SODFLQJWKH
FXUVRURQWKHREMHFWDQGFOLFNLQJRQWKHREMHFW
6HVVLRQ $VHVVLRQLVDZLQGRZZKHUHWKHXVHUSURFHVVHVDFHUWDLQWDVN:KHQ\RXORJRQWR
WKH56\VWHPLWDXWRPDWLFDOO\RSHQVWKHILUVWVHVVLRQEXW\RXFDQVLPXOWDQHRXVO\
RSHQXSWRQLQHVHVVLRQV7KHQXPEHURIWKHFXUUHQWVHVVLRQDSSHDUVLQWKHVWDWXV
EDU
6HVVLRQ0DQDJHU 7KH6HVVLRQ0DQDJHUGRHVQRWH[LVWLQ5HOHDVHDQ\PRUH,WKDVEHHQVXEVWLWXWHG
ZLWKWKH(DV\$FFHVV0HQX
66&5 6$36RIWZDUH&KDQJH5HJLVWUDWLRQ 66&5 LVDSURFHGXUHWKDWUHJLVWHUVDOO
PRGLILFDWLRQVWR55HSRVLWRU\REMHFWVDQGSURYLGHVDQRYHUYLHZRIPRGLILHG5
5HSRVLWRU\REMHFWV6$3PDWFKFRGHVDQGWXQLQJPHDVXUHVIRUH[DPSOHFUHDWLQJ
GDWDEDVHLQGLFHVDQGEXIIHUVDUHQRWUHJLVWHUHGE\66&5
6\VWHPSDUDPHWHU $V\VWHPSDUDPHWHULVWKHEDVLFV\VWHPFRQILJXUDWLRQUHTXLUHGWRHQVXUHVPRRWK
IXQFWLRQLQJRIWKHVRIWZDUH
7DEOH 'DWDFDQEHDUUDQJHGLQWDEOHIRUP$WDEOHFRQVLVWVRIFROXPQV GDWDYDOXHVRIWKH
VDPHW\SH DQGURZV GDWDUHFRUGV )LHOGVLGHQWLI\DUHFRUG
7UDQVDFWLRQ $WUDQVDFWLRQLVDVHULHVRIUHODWHGVWHSVUHTXLUHGWRSHUIRUPDFHUWDLQWDVN
7UDQVDFWLRQFRGH $VHTXHQFHRIIRXUFKDUDFWHUVUHSUHVHQWVD6$3WUDQVDFWLRQ7RFDOODWUDQVDFWLRQLQ
WKH56\VWHP\RXFDQIROORZDQ,0*SDWKRUHQWHUWKHWUDQVDFWLRQFRGHLQWKH
FRPPDQGILHOG)RUH[DPSOH60LVWKHFRGHIRUWKHWDEOHPDLQWHQDQFH
WUDQVDFWLRQ
8VHUPDLQWHQDQFH 8VHUPDLQWHQDQFHWUDQVDFWLRQVDOORZWKHV\VWHPDGPLQLVWUDWRUWRFUHDWHDQG
PDLQWDLQXVHUPDVWHUUHFRUGV7KLVSURFHVVLQFOXGHVJHQHUDWLQJDQGDVVLJQLQJ
DXWKRUL]DWLRQVDQGWKHLUSURILOHV

Authorizations Made Easy


G–10
*ORVVDU\

7HUP 'HILQLWLRQ

8VHUPDVWHU 7KLVUHFRUGFRQWDLQVLPSRUWDQWPDVWHUGDWDIRUDQ56\VWHPXVHU2QO\XVHUV
UHFRUG ZLWKDXVHUPDVWHUUHFRUGFDQORJRQWRWKHV\VWHP$XVHU·VDXWKRUL]DWLRQVDUH
GHILQHGLQWKHXVHUPDVWHUUHFRUG
8VHUUROHWHPSODWH $XVHUUROHWHPSODWHLVDQDFWLYLW\JURXSZKLFKVHUYHVDVWKHEDVLVIRUWKHXVHU
PHQXZKHQDQHQGXVHUORJVRQWR5
9DOLGLW\SHULRG 9DOLGLW\SHULRGVGHILQHWKHOLIHVSDQRIDQREMHFWRULQIRW\SHUHFRUG:KHQFUHDWLQJ
REMHFWVDQGLQIRW\SHUHFRUGVVSHFLI\DYDOLGLW\SHULRGE\SURYLGLQJDVWDUWDQGDQ
HQGGDWH
:RUNSURFHVV 7KHDSSOLFDWLRQVHUYLFHVRIWKH56\VWHPSHUIRUPVSHFLDOZRUNSURFHVVHVVXFKDV
IRUGLDORJSURFHVVLQJXSGDWLQJRIWKHGDWDEDVHDVGLFWDWHGE\FKDQJHGRFXPHQWV
EDFNJURXQGSURFHVVLQJVSRROLQJDQGORFNPDQDJHPHQW:RUNSURFHVVHVFDQEH
DVVLJQHGWRGHGLFDWHGDSSOLFDWLRQVHUYHUV
:RUNEHQFK 7KH:RUNEHQFK2UJDQL]HULVDFHQWUDOPDQDJHPHQWWRROIRUODUJHVFDOHSURMHFW
2UJDQL]HU PDQDJHPHQWWKDWVXSSRUWVLQGLYLGXDOGHYHORSHUVDQGODUJHSURMHFWWHDPV
7UDQVSRUWV\VWHP
7KH2UJDQL]HUDOVRGRHVWKHIROORZLQJ
 2UJDQL]HVUHODWHGSURMHFWFRPSRQHQWVLQWRRUGHUV
 /RFNVWKHFRPSRQHQWVGXULQJGHYHORSPHQW
 6WRUHVDYHUVLRQRIHDFKSURMHFWEHWZHHQWUDQVSRUWV
7KHWUDQVSRUWV\VWHPVXSSRUWVWKHWUDQVIHURIGHYHORSPHQWREMHFWVEHWZHHQ
GLVWULEXWHGV\VWHPVE\FUHDWLQJDQH[WHQVLYHORJUHFRUGLQJRIZKHQDQGZK\HDFK
WUDQVSRUWZDVH[HFXWHGDQGZKRH[HFXWHGLW
:RUNIORZWDVN $ZRUNIORZWDVNLVDPXOWLVWHSWDVNGHILQHGE\WKHFXVWRPHUZKLFKUHIHUHQFHVD
ZRUNIORZGHILQLWLRQ:RUNIORZWDVNV RUJDQL]DWLRQDOPDQDJHPHQWREMHFWW\SH:)
DUHFOLHQWGHSHQGHQWKDYHDYDOLGLW\SHULRGDQGDUHSODQYHUVLRQVSHFLILF
:RUNSODFH 7KHPDLQULJKWWLOHRQWKHVFUHHQZKHUHPRVWZRUNLVSHUIRUPHG ILHOGHQWULHV
VHOHFWLRQVHWF 2QVRPHZLQGRZVWKHZRUNSODFHFRYHUVWKHHQWLUHVFUHHQ
:RUNSODFHPHQX 7KHOHIWWLOHRQWKH6$3(DV\$FFHVVVFUHHQZKHUHHDFKQRGHUHSUHVHQWVGLIIHUHQW
OHYHOVLQWKH56\VWHP7KH8VHUPHQXDQG6$3VWDQGDUGPHQXEXWWRQVSURYLGH
GLIIHUHQWYLHZVRIWKHZRUNSODFHPHQX
:RUNORDG 7KHZRUNORDGPRQLWRUGLVSOD\VWKHGLVWULEXWLRQRIWKHZRUNORDGDFURVVVHUYHUVDQG
PRQLWRU WUDQVDFWLRQV

Release 4.6A/B 
G–11
*ORVVDU\

Authorizations Made Easy


G–12
,QGH[

UHJHQHUDWLQJDXWKRUL]DWLRQGDWD²
WUDQVDFWLRQFRGHVPXOWLSOH%²
A WUDQVSRUWLQJ²²²²²
$%$3 XVHUUROHWHPSODWHV²²
GLFWLRQDU\² ZRUNIORZWDVNV²
REMHFWVQRFKHFN&² $GPLQLVWUDWRU
$FFHOHUDWHG6$3 $6$3 DXWKRUL]DWLRQDGPLQLVWUDWRU²
EXVLQHVVEOXHSULQW² DXWKRUL]DWLRQGDWDDGPLQLVWUDWRU²
JROLYHDQGVXSSRUW² DXWKRUL]DWLRQSURILOHDGPLQLVWUDWRU²
NQRZOHGJHFRUQHU² FKDQJHPDQDJHPHQW²
RYHUYLHZ² *OREDO8VHU0DQDJHU²
SURMHFWSUHSDUDWLRQ² PXOWLSOHDGPLQLVWUDWRUV%²
4 $GE TXHVWLRQVDQGDQVZHUVGDWDEDVH ² SROLFLHVDQGSURFHGXUHV²
UHDOL]DWLRQ² VHWWLQJXSDXWKRUL]DWLRQDGPLQLVWUDWRUV²
URDGPDS²² WKUHHDXWKRUL]DWLRQDGPLQLVWUDWRUVZRUNLQJWRJHWKHU²
$FFHVVSUREOHPV² WLSVIRU²
$FWLYLW\JURXSPDLQWHQDQFH6HHDOVR3URILOH*HQHUDWRU XVHUDGPLQLVWUDWRU²
EDVLFPDLQWHQDQFH²²² $GYDQFHFRUUHFWLRQV
FRPSRVLWHDFWLYLW\JURXSV² DSSO\LQJWR5²
FUHDWLQJDQGFKDQJLQJKLHUDUFK\² $,6 $XGLWLQIRUPDWLRQV\VWHP ²
LQWHUQHWDQGGRFXPHQWOLQNV² $PHULFDQ6$38VHUV*URXS $68* ²
RUJDQL]DWLRQPDQDJHPHQW²² $SSOLFDWLRQ/LQN(QDEOLQJ $/(
UHVSRQVLELOLWLHV² DVVLJQLQJORJLFDOV\VWHPVWRFOLHQWV²
VHOHFWLQJYLHZV² FHQWUDOXVHUDGPLQLVWUDWLRQHQYLURQPHQW²
WUDQVIHUULQJXVHUVIURP,0*SURMHFW² GHILQLQJWDUJHWV\VWHPIRU5)&²
ZRUNIORZ² GLVWULEXWLRQPRGHO²
$FWLYLW\JURXSV ORJLFDOV\VWHPQDPLQJ²
DVVLJQLQJ,0*SURMHFWVRUYLHZV² PRGHOYLHZGLVWULEXWLQJ²
DVVLJQLQJREMHFWV²² RYHUYLHZ²
DVVLJQLQJ3'REMHFWV²²² SDUWQHUSURILOHVFHQWUDOV\VWHP²
DVVLJQLQJWUDQVDFWLRQV² SDUWQHUSURILOHVFOLHQWV\VWHP²
DVVLJQLQJXVHUV²²²² VHWWLQJXSFHQWUDOXVHUDGPLQLVWUDWLRQ²
&203$1<B$//² VHWWLQJXSXVHU²
FRPSDULQJROGDQGFXUUHQWGDWD² $6$36HH$FFHOHUDWHG6$3
FRPSRVLWH6HH&RPSRVLWHDFWLYLW\JURXSV $XGLWV
FRQYHUWHGIURP68SURILOHV² DXGLWLQIRUPDWLRQV\VWHP $,6 WUDQVDFWLRQ6(&5²
FRS\LQJ²²%² EXVLQHVVDXGLWV²
FUHDWLQJ² FRPSOHWH²
FXVWRPL]LQJDFWLYLW\JURXS²² GHOHWHROGDXGLWORJV²
GHOHWLQJ² ILOWHUJURXSV²
GHULYHG6HH'HULYHGDFWLYLW\JURXSV ORJJLQJRIVSHFLILFDFWLYLWLHV²
GLVSOD\LQJWUDQVDFWLRQFRGHV%² RYHUYLHZ²
GLVSOD\LQJXVHUV%² SURILOHUHYLHZIRUDFFXUDF\DQGSHUPLVVLRQFUHHS²
GRFXPHQWDWLRQRQOLQHIRUREMHFWV² UHTXLUHPHQWV²
JHQHUDODXWKRUL]DWLRQV² UHYLHZLQJYDOLGXVHUV²
LQVHUWLQJUHSRUWV² UXQQLQJORJV²
LQVHUWLQJWUDQVDFWLRQV² UXQQLQJRQGLIIHUHQWXVHU²
RYHUYLHZ²² VHFXULW\DXGLWORJ 60 ²
SUHGHILQHG² VHWWLQJORJSDUDPHWHUV²
SURILOHV²²%² VWDWLVWLFUHFRUGVLQ&&06 67$7 ²

I–1
,QGH[

V\VWHPDXGLW² FODVVHV²
V\VWHPORJV 60 ² GHILQLWLRQ²
WDVNV² ILHOGV²
XVHUVHFXULW\DXGLWMREV² KXPDQUHVRXUFHV²²²
XVHUGHILQHG² LQVHUWLQJE\VHOHFWLRQFULWHULD²
$XWKRUL]DWLRQ LQVHUWLQJPDQXDOO\²
DGGLQJPLVVLQJSRVWPDLQWDLQLQJ²² RYHUYLHZ²
DGPLQLVWUDWRU²²²² 6B7&2'(²²²%²&²
DXWKRUL]DWLRQFRQFHSW²²² 6B86(5B2%-²
FKDQJLQJXVLQJXWLOLWLHV² 6B86(5B352²
FKHFNV6HH$XWKRUL]DWLRQFKHFNV WDEOH7$&7=%²
FRPSDULQJROGDQGFXUUHQWGDWD² XQXVHG²
FRPSRQHQWV²
FXVWRPL]LQJ²
HUURUDQDO\VLV68²
B
ILHOGV²² %DFNJURXQG
JHQHUDODVVLJQLQJ² GLVWULEXWLRQ*OREDO8VHU0DQDJHU²
JHQHUDWLQJSURILOHV² XVHUW\SHV²
LQVHUWLQJE\VHOHFWLRQFULWHULD² %DVLFPDLQWHQDQFH²²²
LQVHUWLQJPDQXDOO\²² %DVLV&RPSRQHQWV %&
OLIHF\FOH² DXWKRUL]DWLRQREMHFWV²²²
OLVW6HH$XWKRUL]DWLRQ/LVW XVHUV²
ORJJLQJFKDQJHV² %DWFKGDWDFRPPXQLFDWLRQ %'& ²
QDPLQJFRQYHQWLRQV²²² %DWFKLQSXW6HH%DWFKGDWDFRPPXQLFDWLRQ
REMHFWV6HH$XWKRUL]DWLRQREMHFWV %XVLQHVV$SSOLFDWLRQ3URJUDPPLQJ,QWHUIDFH %$3,V ²
SURILOHV6HH3URILOHV
UHVSRQVLELOLWLHV²
VWUXFWXUDO²
C
WHFKQLFDOQDPHVUHRUJDQL]LQJ² &&06SHUIRUPDQFHDQDO\VLVWRROV²
WHPSODWHVWUDQVSRUWLQJ² &HQWUDOV\VWHP
WLPHGHSHQGHQF\²²²%² PLJUDWLRQRIH[LVWLQJXVHUV²
WUDFLQJHUURUV&² WH[WFRPSDULVRQ²
WUDQVSRUWLQJ² &HQWUDOXVHUDGPLQLVWUDWLRQ
XVHUDGPLQLVWUDWLRQ² $/(HQYLURQPHQW²
$XWKRUL]DWLRQFKHFNV GLVWULEXWLRQPRGHODVVLJQPHQW²
DFWLYDWLQJDQGGHDFWLYDWLQJ²²² *OREDO8VHU0DQDJHU²
FKHFNLQGLFDWRUV6HH&KHFNLQGLFDWRUV PLJUDWLRQRIXVHUVWRFHQWUDOV\VWHP²
GHILQLWLRQ² QRQFHQWUDOXVHUDGPLQLVWUDWLRQ²
HQDEOLQJRUGLVDEOLQJV\VWHPZLGHFKHFNV² RYHUYLHZ[[LY²
LQFOXGLQJLQWUDQVDFWLRQV%²%² SDUWQHUSURILOHVFHQWUDOV\VWHP²
UHGXFLQJVFRSH²² SDUWQHUSURILOHVFOLHQWV\VWHP²
5)&&² VHWWLQJXS²
VWDUWLQJWUDQVDFWLRQV%² WHVWLQJ²
V\VWHPWUDFH67² &HQWUDOXVHUPDLQWHQDQFH
$XWKRUL]DWLRQILHOGV XVHUDVVLJQPHQWV²
GHILQLWLRQ² &KDQJHPDQDJHPHQWDGPLQLVWUDWRU²
PDLQWDLQLQJRSHQILHOGV² &KHFNIODJV6HH&KHFNLQGLFDWRUV
$XWKRUL]DWLRQ/LVW &KHFNLQGLFDWRUV
GHILQLQJXVHUUROHV² DXWKRUL]DWLRQREMHFWV²²
JHQHUDWHGIURP4 $GE²² &KHFN & ²²
RYHUYLHZ² &KHFN0DLQWDLQ &0 ²²²
ZRUNLQJZLWK² GHIDXOWV²
$XWKRUL]DWLRQREMHFWV PDVVFKDQJHV²
DFWLYDWLQJDQGGHDFWLYDWLQJ²²² 1RFKHFN 1 ²²
EDVLV²²² UHSODFLQJVHWWLQJV²
FKHFNLQGLFDWRUV6HH&KHFNLQGLFDWRUV WUDQVDFWLRQFRGHV²
FKHFNLQJ² WUDQVSRUWLQJ²

 Authorizations Made Easy


I–2
,QGH[

W\SHV%² 'RFXPHQWDWLRQ
8QPDLQWDLQHG 8 ²² RQOLQHIRUDFWLYLW\JURXSREMHFWV²
&OLHQWV\VWHPV
GLVWULEXWLRQPRGHO²
*OREDO8VHU0DQDJHU²
E
PDLQWDLQLQJXVHUGDWDILHOGDWWULEXWHV² (DUO\:DWFK²
PLJUDWLQJXVHUVWRFHQWUDOV\VWHP² (DV\$FFHVVPHQX²²²%²
WH[WFRPSDULVRQ² (UURUQRWHVGDWDEDVH²$²
&OLHQWV ([WHUQDOXVHUV
²²² XVHUDGPLQLVWUDWLRQ²
²²²
²²
DVVLJQLQJORJLFDOV\VWHPV²
F
FHQWUDOXVHUDGPLQLVWUDWLRQ² )DYRULWHV
FRS\LQJDFWLYLW\JURXSVEHWZHHQFOLHQWV² DGGLQJDQGGHOHWLQJWUDQVDFWLRQV%²
GHIDXOW&² YLHZLQJ%²
GHIDXOWXVHUV² )LHOGDWWULEXWHV
SDUWHUSURILOHVJHQHUDWHGLQFOLHQWV\VWHP² GHILQLQJLQFOLHQWV\VWHP²
6$3VWDQGDUG² )LHOGGHIDXOWV²
WUDQVSRUWV² )LHOGH[LWV%²
&RPSRVLWHDFWLYLW\JURXSV )LHOGYDOXHV
FUHDWLQJ² FRS\LQJ²
GLVSOD\LQJ² FRS\LQJLQWRFXVWRPHUWDEOHV²
RYHUYLHZ[[LY² UHSODFLQJ²
&RS\LQJ WUDQVSRUWLQJ²
DFWLYLW\JURXSV²%² )LOWHUV
DFWLYLW\JURXSVDQGGHULYLQJ² GHILQLQJILOWHUJURXSVIRUDXGLW²
XVHUUROHWHPSODWHVIRUPRGLILFDWLRQ² )XOODXWKRUL]DWLRQV²
&3,&² LQVHUWLQJ²
&UHDWLQJ
DFWLYLW\JURXS²
FRPSRVLWHDFWLYLW\JURXSV²
G
QHZXVHU FOLHQWVSHFLILF ² *OREDO8VHU0DQDJHU
XVHUUROHWHPSODWHV² DXWKRUL]DWLRQIRU²
&XVWRPL]LQJDXWKRUL]DWLRQV² FRPSRVLWHDFWLYLW\JURXS²²
GLVWULEXWLQJGDWD²
D PRGHOLQJ²
RYHUYLHZ²
'DWDSURWHFWLRQ² VWUXFWXUH²
'',&XVHUV²²² V\VWHPW\SHV²
'HIDXOWV XVHUFUHDWLRQ²
FKDQJLQJ² XVHUJURXSV²
FKHFNLQGLFDWRUV²²² XVLQJ²
FRPSDULQJGDWDZLWK6$3GHIDXOWYDOXHV² *ROLYHSODQ²²
FRS\LQJLQWRFXVWRPHUWDEOHV² SUHSDUDWLRQV²
ILHOGYDOXHV²² WUDQVSRUWLQJDFWLYLW\JURXSV²
UHWUDQVIHUULQJ² WUDQVSRUWLQJDXWKRUL]DWLRQWHPSODWHV²
'HOHWLQJ WUDQVSRUWLQJFKHFNLQGLFDWRUVDQGILHOGYDOXHV²
DFWLYLW\JURXSV² WUDQVSRUWLQJXVHUPDVWHUUHFRUGV²
'HULYHGDFWLYLW\JURXSV²² WUDQVSRUWVEHWZHHQFOLHQWV²
RYHUYLHZ² WUDQVSRUWVEHWZHHQ56\VWHPV²
'HYHORSPHQWV\VWHP '(9 ²
'LDORJ
XVHUW\SHV²
H
'LVWULEXWLRQPRGHO² +HOS
DVVLJQPHQW² HUURUQRWHVGDWDEDVH²$²
'RFXPHQWOLQNV² 6$31HW²5)URQWHQGQRWHV²

Release 4.6A/B 
I–3
,QGH[

+LHUDUFK\ WDEOHGDWD²
FUHDWLQJDQGFKDQJLQJ²
+XPDQ5HVRXUFHV +5
DVVLJQLQJDFWLYLW\JURXSVWR5REMHFWV²
M
DXWKRUL]DWLRQREMHFWV²²² 0DLQWHQDQFHW\SHV²
VXSSRUWSDFNDJHV² 0DQXDOO\LQVHUWLQJDXWKRUL]DWLRQV²
XVHUQDPLQJFRQYHQWLRQV² 0DVVFKDQJHV
FKHFNLQGLFDWRUV²
XVHUV²
I 0DVVFRPSDUH 3)8' ²
,'RFV² 0HQXV
,0*SURMHFWV GHIDXOWVWDUW&²
DVVLJQLQJSURMHFWVRUYLHZVWRDFWLYLW\JURXSV² 0RGHOYLHZ²
WUDQVIHUULQJXVHUV²² GLVWULEXWLQJ²
,PSOHPHQWDWLRQ*XLGH ,0*
SURMHFWV6HH,0*SURMHFWV
,QWHUQDO5XVHUV
N
XVHUDGPLQLVWUDWLRQ² 1DPLQJFRQYHQWLRQV
,QWHUQHW DXWKRUL]DWLRQSURILOHV²
LQVHUWLQJOLQNVLQDFWLYLW\JURXSV² SURILOHVDQGDXWKRUL]DWLRQVJHQHUDWHGZLWK3*²²
,7PDQDJHU² ²
1RFKHFN&²
J
-REUROHV²
O
-REV 2EMHFWFODVVHV²
DVVLJQLQJDFWLYLW\JURXSV² 2EMHFWW\SHV
ZRUNGXWLHV²² $²
&²
2²
K 3²
.QRZOHGJH&RUQHU .& $6$3² 6²
86²
2EMHFWV
L MREV²²
/LQNV RQOLQHGRFXPHQWDWLRQ²
LQVHUWLQJ,QWHUQHWDQGGRFXPHQWOLQNVLQWRDFWLYLW\ RUJDQL]DWLRQDOXQLWV²
JURXSV² SHUVRQ²
/RFNVXVHU² 3HUVRQQHO'HYHORSPHQW 3' 6HH3'REMHFWV
/RJLFDOV\VWHPV² SRVLWLRQV²²
DVVLJQLQJWRFOLHQWV² 5XVHUV²
GLVWULEXWLRQPRGHO² ZRUNFHQWHUV²
QDPLQJ² 2QOLQHGRFXPHQWDWLRQ
/RJRQGDWDILHOGV² GLVSOD\LQJIRUDFWLYLW\JURXSREMHFWV²
/RJRQV 2QOLQH6HUYLFH6\VWHP 266 6HH6$31HW²5)URQWHQG
LQFRUUHFW&² QRWHV
/RJV 2UJDQL]DWLRQPDQDJHPHQW²²
DFWLYLWLHVVSHFLILF² 2UJDQL]DWLRQDO
DXGLW² (QMR\WUDQVDFWLRQSODQ²
FHQWUDO²² OHYHOV²²
FKDQJHVWRXVHUPDVWHUUHFRUGVSURILOHVDQG SODQV²²²
DXWKRUL]DWLRQV² VWUXFWXUHV²
ILOHV² XQLWV²²
ORFDO²² 2666HH6$31HW²5)URQWHQGQRWHV
SURWHFWHGWDEOHV²
UXQQLQJDXGLWORJV²
6\V/RJ²

 Authorizations Made Easy


I–4
,QGH[

P 3URILOHV
DFFXUDF\DQGSHUPLVVLRQFUHHS²
3DUDPHWHUV DGPLQLVWUDWRUVHFXULW\²
DXWKQRBFKHFNBLQBVRPHBFDVHV%² DVVLJQLQJWRQHZXVHUPDVWHUUHFRUG²
DXWKREMHFWBGLVDEOLQJBDFWLYH² DXWKRUL]DWLRQFKHFNV&²
DXWKWFRGHVBQRWBFKHFNHG² DXWKRUL]DWLRQPLVVLQJ%²
DXWKRUL]DWLRQFKHFNV&²&² FKDQJLQJQDPHV%²
ILHOGGHIDXOWV² &203$1<B$//RU´<RXU&RPSDQ\!µ²
ORJRQ&² FRPSDULQJROGDQGFXUUHQWGDWD²²
PDQXDOO\SRVWPDLQWDLQLQJ² FRQYHUWLQJROG68SURILOHVLQWRDFWLYLW\JURXSV²
QDPHV² ²
SDUDPHWHUWUDQVDFWLRQV² FRQYHUWLQJWREHPDLQWDLQDEOHE\WKH3*²
SDVVZRUG&²&² '()$8/73)/&²
6$3 &² GHILQLWLRQ²
V\VWHP² GLVSOD\LQJRYHUYLHZDIWHUJHQHUDWLRQ²
WUDFLQJDXWKRUL]DWLRQV&² HGLWLQJ²
XVHUEXIIHU&² HQWHULQJLQXVHUPDVWHUUHFRUGV²
3DVVZRUGV JHQHUDOULJKWVQRWDVVLJQHG²
EDFNJURXQGXVHUV² JHQHUDWLQJ²²²
FKDQJLQJ² LQVHUWLQJDXWKRUL]DWLRQVIURP²
UHTXLUHPHQWV² ORJJLQJFKDQJHV²
VHWWLQJOHQJWKH[SLUDWLRQ&² PDLQWDLQLQJ²
VSHFLI\LQJLPSHUPLVVLEOH&² PDVVFRPSDUH²
V\VWHP² PDWFKLQJXSDIWHUFKDQJLQJLQ68²²
XVHU²² PDWFKLQJXSDIWHUXSJUDGH²
3'REMHFWV PLJUDWLQJ²
DVVLJQLQJDFWLYLW\JURXSV²²² QDPLQJFRQYHQWLRQV²²²²
3HUPLVVLRQFUHHS² RYHUYLHZ²²
3HUVRQQHO$GPLQLVWUDWLRQ 3$ SDUWQHUSURILOHVFHQWUDOV\VWHP²
XVHUV² SDUWQHUSURILOHVFOLHQWV\VWHP²
3HUVRQQHO'HYHORSPHQW 3' UHFUHDWLQJ²²
DVVLJQLQJDFWLYLW\JURXSVWR3'REMHFWV² UHJHQHUDWLQJDIWHUFKDQJHV²
DVVLJQLQJ3'REMHFWVWRDFWLYLW\JURXSV² UHJHQHUDWLQJQXPEHUDVVLJQPHQW²
3*6HH3URILOH*HQHUDWRU VWDWXVLQGLFDWRUV²
3ODQYHUVLRQ² WUDQVSRUWLQJ²²
3ROLFLHVDQGSURFHGXUHV XSGDWLQJLQXVHUPDVWHUUHFRUG²
VHFXULW\² ZRUNLQJZLWK%²
3RVLWLRQV 3URJUDPV
DVVLJQLQJDFWLYLW\JURXSV² 3)&*B7,0(B'(3(1'(1&<²
REMHFWV²² 56865²
3RVWPDLQWDLQLQJ
PLVVLQJDXWKRUL]DWLRQV²²
XVHUUROHWHPSODWHV²
Q
3UHGHILQHGDFWLYLW\JURXSV6HH8VHUUROHWHPSODWHV 4XDOLW\DVVXUDQFHV\VWHP 4$6 ²²
3URGXFWLRQV\VWHP 35' ² 4XHVWLRQVDQG$QVZHUV'DWDEDVH 4 $GE
3URILOH*HQHUDWRU6HHDOVR$FWLYLW\JURXSPDLQWHQDQFH $XWKRUL]DWLRQ/LVW²
DFWLYDWLQJ² RYHUYLHZ²
$87+25,7<&+(&.%²
FKHFNLQJWKHUHTXLUHGLQVWDQFHSURILOHSDUDPHWHU²
FRPSDULQJROGDQGFXUUHQWGDWD²
R
FRPSRQHQWV² 5HOHDVHQRWHV²
IUHTXHQWO\DVNHGTXHVWLRQV%² 5HPRWHFRQQHFWLRQV
RYHUYLHZ²² VHFXULW\²²
VHWWLQJXS²%² 5HPRWHIXQFWLRQFDOO6HH5)&
VWDUWLQJ² 5HSRUWV
XSJUDGLQJWRQHZUHOHDVH² DVVLJQLQJWRDFWLYLW\JURXSV²
XVHUUROHWHPSODWHV² GRFXPHQWDWLRQ²

Release 4.6A/B 
I–5
,QGH[

3)&*B7,0(B'(3(1'(1&<²² T
UHSRUWWUHHV%²
56865² 7DEOHV
5HVSRQVLELOLWLHV² IUHTXHQWO\DVNHGTXHVWLRQV%²
5)& ORJJLQJFKDQJHVWRGDWD²
DXWKRULW\FKHFN&² ORJVSURWHFWHG²
%$3,V² 68.5,²
FDOOV² 7$&7=%²
FRQQHFWLRQ²² 862%7²²
GHVWLQDWLRQ²² 862%;²²²%²
,'RFV² 865&²
5RDGPDS6HH$FFHOHUDWHG6$3 $6$3 7DUJHWV\VWHP
5ROHV GHILQLQJIRU5)&FDOOV²
XVHUUROHVGHILQLQJ² 7DVNV
PXOWLSOHVWHS²
VLQJOHVWHS²
S 7HFKQLFDOQDPHV
6$3%XVLQHVV:RUNIORZ6HH:RUNIORZ DXWKRUL]DWLRQV²
6$3GHIDXOWV6HH'HIDXOWV 7HPSODWHV
6$3URXWHU FUHDWLQJQHZ²
VHFXULW\²² GHOLYHUHG²
6$3VWDQGDUGPHQX[YLLL² GHOLYHUHGQDPHV²
6$3WHPSODWHV6HH7HPSODWHV LQFOXGLQJUHTXLUHGREMHFWVLQDFWLYLW\JURXSV²
6$3 ²²² LQVHUWLQJDXWKRUL]DWLRQV²²
VHFXULQJDJDLQVWPLVXVH&² LQVHUWLQJLQWRH[LVWLQJDFWLYLW\JURXS²
6$31HW² WUDQVSRUWLQJ²
6$31HW²5)URQWHQGQRWHV ZRUNIORZ²
GDWDEDVH$² 7KUHHV\VWHPHQYLURQPHQW
HUURUQRWHVGDWDEDVH² GHYHORSPHQWV\VWHP '(9 ²
JHWWLQJVXSSRUW² SURGXFWLRQV\VWHP 35' ²
3*KRWSDFNDJHVIRU5HOHDVHV$DQG%² TXDOLW\DVVXUDQFHV\VWHP 4$6 ²
SULQWLQJQRWHV² 7LPHSHULRGV
VHOHFWLYHOLVW$² ORJRQYDOLGIURPYDOLGWRGDWHV²
WHPSODWHQRWHV² UHVWULFWLQJDFWLYLWLHV%²
XSJUDGLQJWRQHZUHOHDVH² XVHUDVVLJQPHQW²²²
6HFXULW\ 7UDFHV
DFWLYLWLHV² DQDO\]LQJWUDFHILOH²
DXGLWV6HH$XGLWV DXWKRUL]DWLRQV&²
ORJJLQJFKDQJHVWRXVHUPDVWHUUHFRUGVSURILOHVDQG GLVSOD\LQJUHVXOWV²
DXWKRUL]DWLRQV² QDPLQJ²
ORJJLQJVSHFLILFDFWLYLWLHV² UHFRUGLQJDXWKRUL]DWLRQFKHFNV²
SHUPLVVLRQFUHHS² 7UDLQLQJFOLHQWV\VWHP 75* ²
SROLFLHVDQGSURFHGXUHV² 7UDQVDFWLRQV
UHYLHZLQJORJV² DVVLJQLQJWRDFWLYLW\JURXSV²
VHFXULW\UHSRUWV² DVVLJQLQJWRUHSRUWV²
VRXUFHVDERXWLPSOHPHQWDWLRQ² $87+B6:,7&+B2%-(&76²
VWUDWHJ\LQWKUHHV\VWHPHQYLURQPHQW² DXWKRUL]DWLRQFKHFNV%²
6WDWLVWLFUHFRUGVDXGLWLQJ² %'²
6WUXFWXUDODXWKRUL]DWLRQV² GHULYHGDFWLYLW\JURXSV²
WURXEOHVKRRWLQJOLPLWDWLRQV² LQVHUWLQJ²
6XSHUXVHUV²²²² PDLQWDLQFKHFNLQGLFDWRUV²
6\V/RJ² PLVVLQJDXWKRUL]DWLRQV²
6\VWHP6HH&HQWUDOV\VWHP&OLHQWV\VWHP7DUJHWV\VWHP 3)&*²
6\VWHPODQGVFDSH 3)8'²
ZLWKH[LVWLQJXVHUV²² 5=²
6\VWHPSDVVZRUGV² 6$²
6\VWHP7UDFH6HH7UDFHV 6$5$²

 Authorizations Made Easy


I–6
,QGH[

6&&²%² DVVLJQLQJXVHUUROHWHPSODWHV²
6&&² DVVLJQPHQWV²²²²
6&&/² DXGLWLQJIRUYDOLGXVHUV²
6&8² DXWKRUL]DWLRQVDQGDXWKRUL]DWLRQSURILOHV²
6&80² EDVLFXVHUGDWD²
6(² EXIIHU²
6(² FKDQJLQJSDVVZRUGV²
6(² FOLHQWVSHFLILF²
6(&5²² FUHDWLQJ²²²
60² GDWHVRIXVHUDVVLJQPHQW²²²
60²² '',&²²²
60²² GHIDXOWV²²
60² (DUO\:DWFK²
60²²%²&² H[WHUQDO²
6352² ILHOGDWWULEXWHVGHILQLQJ²
67² JURXSV[[LY²
67² LQIRUPDWLRQV\VWHP²
67$7² LQWHUQDO5²
68²²²² MREV²
68²²² ORJRQGDWDILHOGGHILQLWLRQV²
68²²² PDVVFKDQJHV²
68²²²%²&² PHQX[YLLL[[LL²²
68²²²²²%² RUJDQL]DWLRQDOXQLWV²
68²²²² SDVVZRUGV²²
683&²²² SRVLWLRQV²
7UDQVSRUWLQJ SURILOHVWUDQVDFWLRQ67²
DFWLYLW\JURXSV²²%² UROHV6HH8VHUUROHV
FKHFNLQGLFDWRUVDQGILHOGYDOXHV² 6$3 ²²²
IUHTXHQWO\DVNHGTXHVWLRQV%² VSHFLDO5XVHUV²
PDVVWUDQVSRUWRIDFWLYLW\JURXSV² VWDWXVGLVSOD\RQWDE²
VLQJOHDFWLYLW\JURXSVXVLQJDFWLYLW\JURXSPDLQWHQDQFH VXSHUXVHUV²²²²
² V\VWHP²²
WHPSODWHV² V\VWHPODQGVFDSH²²
XVHUDVVLJQPHQWV²² WUDQVIHUULQJIURP,0*SURMHFWWRDFWLYLW\JURXS²
XVHUPDVWHUUHFRUGV² XVHUDGPLQLVWUDWLRQ%²
7URXEOHVKRRWLQJ6HHDOVR7UDFHV XVHU,'V²
HUURUDQDO\VLV68² XVHUW\SHV²
8VHUEXIIHUV&²
8VHUPDVWHUUHFRUGV
U DXWKRUL]DWLRQFRQFHSW²²
8SJUDGHV FRPSDULQJDIWHUDFWLYLW\JURXSLPSRUW²
FRQYHUWLQJSUHYLRXVO\FUHDWHG68SURILOHVLQWRDFWLYLW\ FRPSDULQJDIWHUDXWKRUL]DWLRQSURILOHJHQHUDWLRQ²
JURXSV² FRPSDULQJZLWK3*²
SUHSDUDWLRQEHIRUH² GHILQLQJ²
SURFHGXUH 68 %² *OREDO8VHU0DQDJHU²
5HOHDVH)² ORJJLQJFKDQJHV²
5HOHDVHV*+,² PDQXDOO\HQWHULQJJHQHUDWHGSURILOHV%²
5HOHDVHV[RU[² V\VWHPUHFRJQLWLRQRIXVHUV²
UHOHDVHVSULRUWR[² WUDQVSRUWLQJ²²²
UHPRYHXVHUDVVLJQPHQWVIURPRULJLQDO68SURILOH² XSGDWLQJ²
YDOLGDWLRQDIWHUFRPSOHWH² XSGDWLQJSURILOHV²
8VHU 8VHUUROHWHPSODWHV
DFFRXQWV² DVVLJQLQJWRDXVHUXVLQJVKRUWFXW²
DGPLQLVWUDWLRQ²²² DVVLJQLQJXVHUV²²
$/(² FRS\LQJDQGPRGLI\LQJ²
DVVLJQLQJWRDFWLYLW\JURXSV²² FUHDWLQJXVLQJPXOWLSOHVLQJOHDFWLYLW\JURXSV²
DVVLJQLQJWRFXVWRPL]LQJDFWLYLW\JURXSV² FUHDWLQJXVLQJVLQJOHDFWLYLW\JURXSV²

Release 4.6A/B 
I–7
,QGH[

FUHDWLQJ\RXURZQ² &3,&²
FXVWRPL]LQJWHPSODWH² GLDORJ²
PDLQWHQDQFHYLHZVHWWLQJV²
RYHUYLHZ[[LL²²
SRVWPDLQWDLQLQJ²
W
5HOHDVH$² :RUNFHQWHUV²
5HOHDVH%² :RUNIORZ
XVLQJ6$3SURYLGHG² DVVLJQLQJDFWLYLW\JURXSVWR5REMHFWV²
ZRUNLQJZLWK² VDPSOH²
8VHUUROHV WDVNV²²
GHILQLQJ² WHPSODWHV²
JHQHUDWLQJRYHUYLHZ² XVHUV²
8VHUW\SHV :RUNSODFHPHQX[YLLL
EDFNJURXQG²
EDWFKGDWDFRPPXQLFDWLRQ²

 Authorizations Made Easy


I–8

S-ar putea să vă placă și