0% found this document useful (0 votes)
141 views

Q. SAP Security T-Codes

SAP Security T-codes provide frequently used security transactions such as SU01 for creating and changing users, PFCG for maintaining roles, and SU10 for mass changes. The Firefighter strategy allows users to perform duties outside their normal roles in emergency situations while logging all activities for auditing. Firefighter is a web-based application that automates defining Firefighter IDs, assigning owners and controllers, and logging transactions during firefighting. Firefighter roles include Administrator, Owner, Firefighter, and Controller to control access and audit firefighting task performance.

Uploaded by

asimalamp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views

Q. SAP Security T-Codes

SAP Security T-codes provide frequently used security transactions such as SU01 for creating and changing users, PFCG for maintaining roles, and SU10 for mass changes. The Firefighter strategy allows users to perform duties outside their normal roles in emergency situations while logging all activities for auditing. Firefighter is a web-based application that automates defining Firefighter IDs, assigning owners and controllers, and logging transactions during firefighting. Firefighter roles include Administrator, Owner, Firefighter, and Controller to control access and audit firefighting task performance.

Uploaded by

asimalamp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Q.

SAP Security T-codes


Frequently used security T-codes
SU01 - Create/ Change User SU01 Create/ Change User
PFCG - Maintain Roles
SU10 - Mass Changes
SU01D - Dislay User
SU!M - Reorts
ST01 - Trace
SU"# - $uthori%ation analysis

Q How to create users?
&'ecute transaction SU01 and (ill in all the (ield) *hen creating a ne+ user, you -ust enter an
initial ass+ord (or that user on the .ogon data ta/) $ll other data is otional)
Q What is the difference between USOBX! and USOBT!?
The ta/le US0123C de(ines +hich authori%ation chec4s are to /e er(or-ed +ithin a
transaction and +hich not 5desite authority- chec4 co--and rogra--ed 6) This ta/le also
deter-ines +hich authori%ation chec4s are -aintained in the Pro(ile Generator)
The ta/le US01T3C de(ines (or each transaction and (or each authori%ation o/7ect +hich
de(ault 8alues an authori%ation created (ro- the authori%ation o/7ect should ha8e in the Pro(ile
Generator)
Q What authori"ation are re#uired to create and $aintain user $aster records?
The (ollo+ing authori%ation o/7ects are required to create and -aintain user -aster records9
S3US&R3GRP9 User Master Maintenance9 $ssign user grous
S3US&R3PR09 User Master Maintenance9 $ssign authori%ation ro(ile
S3US&R3$UT9 User Master Maintenance9 Create and -aintain authori%ations
Q %ist &'( User Ty)es
Dialog users are used (or indi8idual user) Chec4 (or e'ired/initial ass+ords) Possi/le to
change your o+n ass+ord) Chec4 (or -ultile dialog logon
$ Ser8ice user - 0nly user ad-inistrators can change the ass+ord) :o chec4 (or e'ired/initial
ass+ords) Multile logon er-itted
Syste- users are not caa/le o( interaction and are used to er(or- certain syste- acti8ities,
such as /ac4ground rocessing, $.&, *or4(lo+, and so on)
$ Re(erence user is, li4e a Syste- user, a general, non-ersonally related, user) $dditional
authori%ations can /e assigned +ithin the syste- using a re(erence user) $ re(erence user (or
additional rights can /e assigned (or e8ery user in the Roles ta/)
Q What is a deri*ed ro+e?
Deri8ed roles re(er to roles that already e'ist) The deri8ed roles inherit the -enu structure and
the (unctions included 5transactions, reorts, *e/ lin4s, and so on6 (ro- the role re(erenced) $
role can only inherit -enus and (unctions i( no transaction codes ha8e /een assigned to it /e(ore)
The higher-le8el role asses on its authori%ations to the deri8ed role as de(ault 8alues +hich can
/e changed a(ter+ards)
0rgani%ational le8el de(initions are not assed on) They -ust /e created ane+ in the inheriting
role) User assign-ents are not assed on either)
Deri8ed roles are an elegant +ay o( -aintaining roles that do not di((er in their (unctionality
5identical -enus and identical
transactions6 /ut ha8e di((erent characteristics +ith regard to the organi%ational le8el) Follo+ this
lin4 (or -ore in(o
Q What is a co$)osite ro+e?
$ co-osite role is a container +hich can collect se8eral di((erent roles) For reasons o( clarity, it
does not -a4e sense and is
there(ore not allo+ed to add co-osite roles to co-osite roles) Co-osite roles are also called
roles)
Co-osite roles do not contain authori%ation data) !( you +ant to change the authori%ations 5that
are reresented /y a co-osite role6, you -ust -aintain the data (or each role o( the co-osite
role)
Creating co-osite roles -a4es sense i( so-e o( your e-loyees need authori%ations (ro-
se8eral roles) !nstead o( adding each user searately to each role required, you can set u a
co-osite role and assign the users to that grou)
The users assigned to a co-osite role are auto-atically assigned to the corresonding
5ele-entary6 roles during co-arison)
Q What does user co$)are do?
!( you are also using the role to generate authori%ation ro(iles, then you should note that the
generated ro(ile is not entered in the user -aster record until the user -aster records ha8e /een
co-ared) ;ou can auto-ate this /y scheduling reort
PFCG3T!M&3D&P&:D&:C; on a daily)
What is ,-.!-, in authori"ation /rou)s
Access to specific tables and reports can be restricted using authorization groups. For
example, if we consider that user 'JOHN' has access browse table using transaction !"#
but as user administrator, $ou want to restrict the access to onl$ "% specific tables. &n A',
these "% tables can be assigned to one authorization group (let's sa$ the authorization
group 'A)*+',. -hen $ou create the role to be assigned to JOHN, $ou assign .alue 'A)*+' in
the authorization group field for authorization ob/ects 01A)20+& and 01A)20*3&. 1his
will ensure that JOHN can browse onl$ these "% tables which belong to authorization group
'A)*+'.
1he same concept applies to reports as well. 1able 14+&4 stores the authorization groups
for all tables while table 1++A1 stores the authorization groups for all reports in A'.
5ou ma$ notice that some tables ha.e no authorization groups 6 which basicall$ means that
an$ user with authorizations to browse tables can browse these tables. 1he user does not
need an$ authorization group in her profile to browse these tables.
5ou ma$ also notice that some tables ha.e an authorization group '7N*7'. '7N*7' is slightl$
better from ha.ing a )3AN8 authorization group since onl$ users with an$ authorization
groups in their profile can access these tables. o, it doesn't matter what authorization
group is specified in the user's profile 6 as long as there is an authorization group in the user
profile, the user can access tables assigned to authorization group '7N*7'.
0irefi/hter Strate/y
The Fire(ighter alication allo+s ersonnel to ta4e resonsi/ility (or tas4s outside their
nor-al 7o/ (unction) Fire(ighting is a ter- descri/ing the a/ility to er(or- tas4s in
e-ergency situations)
Fire(ighter ena/les users to er(or- duties not included in the roles or ro(iles assigned to
their user ids) Fire(ighter ro8ides this e'tended caa/ility to users +hile creating an
auditing layer to -onitor and record Fire(ighter usage)
Fire(ighter is an $1$P/ased and +e//ased alication that auto-ates all acti8ities
related to (ire(ighting, including de(ining o( Fire(ighter !Ds and Fire(ighters, assign-ent
o( Fire(ighter !D 0+ners and Controllers, and the logging o( all transactions e'ecuted
during (ire(ighting)
Fire(ighter ro8ides a solution (or syste-atic handling o( e-ergency situations and at the
sa-e ti-e -anaging the ris4 (or the secial access necessary to resol8e the issue) The
logging o( transactions during the rocess ro8ides the caa/ility to re8ie+ acti8ities
used during an e-ergency situation)
0irefi/hter &o+es'User
To access Fire(ighter user -ust /e assigned a Fire(ighter role)
Ad$inistrator
o Fire(ighter $d-inistrators ha8e co-lete access to the Fire(ighter rogra-)
$d-inistrators are the only Fire(ighter user that can create Fire(ighter !D
ass+ords)
Owner
o 0+ners can assign Fire(ighter !Ds to Fire(ighters < Controllers) *hen accessing
the Fire(ighter rogra- 0+ners only see Fire(ighter !Ds assigned to the- /y the
Fire(ighter $d-inistrator) 0+ners can not assign Fire(ighter !Ds to the-sel8es
in the (ire(ighters ta/le to er(or- (ire(ighting tas4s, another o+ner needs to
assign the-)
0irefi/hter
o Fire(ighters ha8e access to the Fire(ighter !Ds assigned to the- and can use the
Fire(ighter !Ds to er(or- any tas4s er-issi/le /y the Fire(ighter !D roles)
!ontro++ers
o Controllers are resonsi/le (or auditing the usage o( Fire(ighter !Ds /y 8ie+ing
the Fire(ighter .og reort and recei8ing e-ail noti(ication o( Fire(ighter !D
logins)

You might also like