<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAP-Authorization Revamp in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-authorization-revamp/m-p/10841983#M1884777</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Shaik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a simple to determine. Yes it is technical to map user through to org value by tables:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AGR_USERS is user to roles but the user might have composite roles (could exclude them) based on the role type and confirm with AGR_AGRS table)&lt;/LI&gt;&lt;LI&gt;AGR_1252 - Org Values&lt;/LI&gt;&lt;LI&gt;AGR_1251 - Obtain the Org Fields where inheritance may be broken&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with joining these two tables is that organisational values depend entirely on the authorisation they are part of. &lt;SPAN style="font-size: 10pt;"&gt;Really the join is AGR_1251 to AGR_1252 to include that context.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What it means when you remove the authorisation is that you are getting all potential org values the user has but not how they are restricted. This means you might have situations such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Display all data roles - asterisk or all potential values entered in the role&lt;/LI&gt;&lt;LI&gt;Modify roles (posting/master data) - limit to specific org values&lt;/LI&gt;&lt;LI&gt;Potentially broken inheritance (you'll need the AGR_1251 table for that) &lt;/LI&gt;&lt;LI&gt;Modify roles that are not restricted on a specific org value that other roles would&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I'm sure I haven't covered all the scenarios. But what will happen is they will all be merged together and you'll lose the context in your analysis of how much access to the org data the user truly has.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The examples I list are potential situations if you mention the need to rebuild security. If you are at the stage of performing a massive clean up and rationalising design then there is a good chance you will have other technical issues in the build the further skews your analysis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had managed to use a role convention and build and provisioning rules to limit users to certain areas of the business, then you might be able to rely on this analysis to an extent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Colleen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Jan 2015 12:19:41 GMT</pubDate>
    <dc:creator>Colleen</dc:creator>
    <dc:date>2015-01-20T12:19:41Z</dc:date>
    <item>
      <title>SAP-Authorization Revamp</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-authorization-revamp/m-p/10841981#M1884775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a activity planned (in planning stage) for ECC PRD system Authorization revamp for all the users (approx. 950 users).&lt;/P&gt;&lt;P&gt;The activity planned is to streamline all the authorization a users is having from multiple roles into 1 single role.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So require details with respect to Org-Values, how we can extract these Org-values from multiple roles for the single user, &lt;/P&gt;&lt;P&gt;(e.g. as while creating a new role for a single user, who have 200+ roles, where Org-value may vary from role-to-role) &lt;/P&gt;&lt;P&gt;&amp;amp; other limitations if any with respect to limitation of Profiles can be assigned to a user, total objects in roles/profiles, single/derive role, GRC limits etc..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So please suggest the plan to extract the users/roles/t codes/Object_values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Shaik Maideen A&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2015 02:12:18 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/sap-authorization-revamp/m-p/10841981#M1884775</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2015-01-20T02:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: SAP-Authorization Revamp</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-authorization-revamp/m-p/10841982#M1884776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Shaik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use table AGR_1251 to check the Org-Values for specific roles. You just have to write the role name (AGR_NAME) and the Org-Value object (FIELD) on the selection screen and you will get the Org-Values on the field 'LOW'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2015 08:29:56 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/sap-authorization-revamp/m-p/10841982#M1884776</guid>
      <dc:creator>magexposito</dc:creator>
      <dc:date>2015-01-20T08:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: SAP-Authorization Revamp</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/sap-authorization-revamp/m-p/10841983#M1884777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Shaik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a simple to determine. Yes it is technical to map user through to org value by tables:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AGR_USERS is user to roles but the user might have composite roles (could exclude them) based on the role type and confirm with AGR_AGRS table)&lt;/LI&gt;&lt;LI&gt;AGR_1252 - Org Values&lt;/LI&gt;&lt;LI&gt;AGR_1251 - Obtain the Org Fields where inheritance may be broken&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with joining these two tables is that organisational values depend entirely on the authorisation they are part of. &lt;SPAN style="font-size: 10pt;"&gt;Really the join is AGR_1251 to AGR_1252 to include that context.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What it means when you remove the authorisation is that you are getting all potential org values the user has but not how they are restricted. This means you might have situations such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Display all data roles - asterisk or all potential values entered in the role&lt;/LI&gt;&lt;LI&gt;Modify roles (posting/master data) - limit to specific org values&lt;/LI&gt;&lt;LI&gt;Potentially broken inheritance (you'll need the AGR_1251 table for that) &lt;/LI&gt;&lt;LI&gt;Modify roles that are not restricted on a specific org value that other roles would&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I'm sure I haven't covered all the scenarios. But what will happen is they will all be merged together and you'll lose the context in your analysis of how much access to the org data the user truly has.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The examples I list are potential situations if you mention the need to rebuild security. If you are at the stage of performing a massive clean up and rationalising design then there is a good chance you will have other technical issues in the build the further skews your analysis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had managed to use a role convention and build and provisioning rules to limit users to certain areas of the business, then you might be able to rely on this analysis to an extent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Colleen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2015 12:19:41 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/sap-authorization-revamp/m-p/10841983#M1884777</guid>
      <dc:creator>Colleen</dc:creator>
      <dc:date>2015-01-20T12:19:41Z</dc:date>
    </item>
  </channel>
</rss>

