<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security about BAPI's - user access in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-about-bapi-s-user-access/m-p/5245637#M1212059</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We just finished to develop a few BAPI´s in order to access it using a Java Program.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We mark BAPI´s as remote enabled module and we think that we should use a internet user to access the BAPI's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is: how can i certified that that user only access  to the BAPI´s i create. I revised the java code and anyone can use that code to access to another BAPI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell me some comments about this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                         Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                                 João Fernandes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Feb 2009 18:15:52 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2009-02-18T18:15:52Z</dc:date>
    <item>
      <title>Security about BAPI's - user access</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-about-bapi-s-user-access/m-p/5245637#M1212059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We just finished to develop a few BAPI´s in order to access it using a Java Program.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We mark BAPI´s as remote enabled module and we think that we should use a internet user to access the BAPI's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is: how can i certified that that user only access  to the BAPI´s i create. I revised the java code and anyone can use that code to access to another BAPI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell me some comments about this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                         Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                                 João Fernandes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2009 18:15:52 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-about-bapi-s-user-access/m-p/5245637#M1212059</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2009-02-18T18:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Security about BAPI's - user access</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-about-bapi-s-user-access/m-p/5245638#M1212060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to the BAPI development guidelines, it is developer's responsibility to add the authority check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Each BAPI must have all the applicable authorization checks coded inside, so that even if anyone runs the BAPI, they won't be able to get far if they don't have authorization for the business transactions. Naturally, the remote user IDs should have adequate (usually minimum and display-only) authorizations in SAP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2009 22:10:58 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-about-bapi-s-user-access/m-p/5245638#M1212060</guid>
      <dc:creator>Jelena_Perfiljeva</dc:creator>
      <dc:date>2009-02-18T22:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security about BAPI's - user access</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-about-bapi-s-user-access/m-p/5245639#M1212061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that you use JCo to call BAPI from your Java program. JCo uses RFC for this purpose. Hence you have all possibilities of RFC to secure it. You can create a new user for this RFC. This user will have only access to your BAPI (authorization object S_RFC). YOu can get additional information about securing RFC [here.|http://help.sap.com/saphelp_nw04s/helpdata/en/37/1a9b6a338cca448508f3a48d2d1e2d/frameset.htm]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 01:32:43 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-about-bapi-s-user-access/m-p/5245639#M1212061</guid>
      <dc:creator>mvoros</dc:creator>
      <dc:date>2009-02-19T01:32:43Z</dc:date>
    </item>
  </channel>
</rss>

