<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source System security Model in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913464#M1597897</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;Appreciate your answer. Can you be please elaborate on Data elements. At the moment I am clueless where/what  to start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Jul 2011 21:43:32 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2011-07-01T21:43:32Z</dc:date>
    <item>
      <title>Source System security Model</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913462#M1597895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;We built a datastore object which gets data from two R3 systems. Even master data is loaded from both source systems and compounded with source system. We want to build a security model where each company cannot access other companyu2019s data. For that we built an authorization object with source system ID and created three separate roles. (  one for company A, one for company B and the other for all). &lt;/P&gt;&lt;P&gt;While building queries, if source system ID is not there in the query, it brings the data of both companies. We would like to model in such a way that other company cannot/should not see the data. &lt;/P&gt;&lt;P&gt;Can any one suggest a better security model for this scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 19:48:10 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913462#M1597895</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2011-07-01T19:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: Source System security Model</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913463#M1597896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done this in the past by using data elements which are far more likely to be in most reports e.g. Company Code, Plant.  Assuming that you have different Comp Code, Plant, Sales Org naming in the different systems, then this should be very straightforward to achieve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 20:02:14 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913463#M1597896</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2011-07-01T20:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Source System security Model</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913464#M1597897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;Appreciate your answer. Can you be please elaborate on Data elements. At the moment I am clueless where/what  to start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 21:43:32 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913464#M1597897</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2011-07-01T21:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: Source System security Model</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913465#M1597898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are you not looking at Analysis authorizations? It is pretty easy to manage/restrict authorizations to users. All you have to do is to identify the infoobjects and make them authorization relevant. The same applies to key figures too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the best approach and also helps you to easily manage the authorizations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Raghu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jul 2011 07:53:23 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913465#M1597898</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2011-07-02T07:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Source System security Model</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913466#M1597899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I mean by data elements is things like company code, plant, sales org, etc.  If you are pulling in data from 2 separate systems then these will be key bits of data which will be reported on.  You can then do as Raghu has suggested and base your restrictions against them, assuming that that they are different (i.e. the naming convention for company code is not the same in your 2 source systems). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can still have the concept of company1 role, company2 role and combined role, you just list the restriction elements in each role that will give you the segregation of data visibility.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jul 2011 06:46:15 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913466#M1597899</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2011-07-04T06:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: Source System security Model</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913467#M1597900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@ Raghu. We have upgraded technically from 3.5 to 7.0 recently. We have not yet changed to analysis authorization concept. we are planning to do so in once functional upgrade is done.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jul 2011 18:03:07 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913467#M1597900</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2011-07-05T18:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Source System security Model</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913468#M1597901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@ Alex&lt;/P&gt;&lt;P&gt;Yes..your answer was helpful. we can create a new authorization objects for the key chars like company code, plant etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jul 2011 18:07:38 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/source-system-security-model/m-p/7913468#M1597901</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2011-07-05T18:07:38Z</dc:date>
    </item>
  </channel>
</rss>

