Sunteți pe pagina 1din 22

SAP R/3 Security Overview Chapter Outline

Part I - Main Elements of an Authorization System Part II - Implementing Security Part III - Profile Generator

Bas5_16.1

Security Concepts

Part I - Main Elements of an Authorization System Outline


SAP R/3 Security Model Hierarchy of Objects User Master Record Authorization Profile Authorization Authorization Object Authorization Field Authorization Checks Authorization Traces Special Logon Users

Bas5_16.2

Security Concepts

Object Hierarchy: User Master Record

User Master Record


contains

Profile

Bas5_16.3

Security Concepts

Example: User Master Record


(transaction: SU01)

Bas5_16.4

Security Concepts

Example: User Master Record


(transaction: SU01) (Continued)

Bas5_16.5

Security Concepts

Object Hierarchy: Authorization Profile

User Master Record

contains

Composite Profile

contains

Simple Profile
contains

Authorization

Bas5_16.6

Security Concepts

Example: Authorization Profiles


(transaction: SU02)

Bas5_16.7

Security Concepts

Example: Authorization Profiles


(transaction: SU02) (Continued)

Bas5_16.8

Security Concepts

Object Hierarchy: Authorization Object


User Master Record

contains

Composite Profile

contains

Simple Profile
contains

Authorization Object
are accessed via

Authorization

Bas5_16.9

Security Concepts

Example: Authorization Objects


(transaction: SU03)

Bas5_16.10

Security Concepts

Object Hierarchy: Authorization


User Master Record

contains

Composite Profile

contains

Simple Profile
contains

Authorization Object
are accessed via

Authorization
contains

Field
Bas5_16.11 Security Concepts

Example: Authorizations
(transaction: SU03)

Bas5_16.12

Security Concepts

Object Hierarchy: Authorization Field


User Master Record

contains

Composite Profile

contains

Simple Profile
contains

Authorization Object
are accessed via

Authorization
contains

Field

Bas5_16.13

Security Concepts

Object Hierarchy: Authorization Field (Continued)


TACT TACTZ TOBJ

Bas5_16.14

Security Concepts

Example: Authorization Fields


(transaction: SU03)

Bas5_16.15

Security Concepts

Illustration: Authorization Checks


Table: TSTC
Transaction Program Name Transaction Program Name Transaction Program Name Transaction Program Name Transaction Program Name Authorization Object Authorization Object Authorization Object Authorization Object Authorization Object

Authorization Object

ABAP/4 Code
... GET KNA1. AUTHORITY-CHECK OBJECT objectname ... ... WRITE KNA1. ...
Bas5_16.16 Security Concepts

Example: Authorization Traces


User Master Record
Authorization Profile

End User
Transaction VF31 Program SD70AV3A
Authorization

Authorization Fields

... GET KNA1. AUTHORITY-CHECK OBJECT objectname ID fieldname1 FIELD fieldvalue1 ... ID fieldnamen FIELD fieldvaluen WRITE KNA1. ...
Bas5_16.17

Authorization Object

Security Concepts

Example: Authorization Traces


(Continued)
User Master Record
Authorization Profile

End User
Transaction VF31 Program SD70AV3A
Authorization

Authorization Fields

... GET KNA1. AUTHORITY-CHECK OBJECT objectname ID fieldname1 FIELD fieldvalue1 ... ID fieldnamen FIELD fieldvaluen WRITE KNA1. ...
Bas5_16.18

Authorization Object

Security Concepts

Special Logon Users: SAP*, DDIC


User SAP*

Materials Management Production Planning

Finance and Controlling

Sales and Distribution

User DDIC

Human Resources

Bas5_16.19

Security Concepts

Special Logon Users: SAPCPIC, EARLYWATCH


User SAPCPIC
Materials Management Production Planning Sales and Distribution Human Resources Finance and Controlling

User EARLYWATCH
Bas5_16.20 Security Concepts

SAP R/3 Basis System Administration Section 5. Chapter 16 Questions

????????

Bas5_16.21

Security Concepts

SAP R/3 Basis System Administration Section 5. Chapter 16 Exercises

Bas5_16.22

Security Concepts

S-ar putea să vă placă și