<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Finding Authorization Objects and values for a given user in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387953#M188792</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done this at a few clients.  The following are some of the steps I have taken.  Also we do set the trace on the harder to find items and really have not noticed a system drain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.  I use SE80 to search the program code for auth calls.  You can do a search on &lt;STRONG&gt;auth&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;2.  If your programs are calling and BDC sessions then the transaction code run in the BDC session and the related auth objects will be needed.&lt;/P&gt;&lt;P&gt;3.  Once you have done the first two then you can set up a test ID and have the user invoke the programs by using SA38 and see if it hits any auth errors this way.&lt;/P&gt;&lt;P&gt;4.  What I would also do before doing number 3 is set up a trace for the day and compare it to what I have found.  Just need to be cautious when doing traces on an SAP_ALL ID because it will hit on optional auths that you may not really need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I think of anything else I will let you know but I have been real successfully in preventing the need for SAP_ALL in communication IDs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh most truely communication IDs will need auths such as S_RFC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 Jul 2006 22:22:31 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2006-07-20T22:22:31Z</dc:date>
    <item>
      <title>Finding Authorization Objects and values for a given user</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387952#M188791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We currently are in the process of removing SAP_ALL/SAP_NEW access from a few of our communication ids. Our Security team is asking us to come up with a list of the authorization objects and their values that the id is hitting in each system. We do not want to use tracing, such as ST01, for this because it is very resource intensive. We also have a list of all the programs that the id is running as well. Could you please suggest ways to gather this information? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Sarah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2006 21:03:41 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387952#M188791</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2006-07-20T21:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Finding Authorization Objects and values for a given user</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387953#M188792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done this at a few clients.  The following are some of the steps I have taken.  Also we do set the trace on the harder to find items and really have not noticed a system drain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.  I use SE80 to search the program code for auth calls.  You can do a search on &lt;STRONG&gt;auth&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;2.  If your programs are calling and BDC sessions then the transaction code run in the BDC session and the related auth objects will be needed.&lt;/P&gt;&lt;P&gt;3.  Once you have done the first two then you can set up a test ID and have the user invoke the programs by using SA38 and see if it hits any auth errors this way.&lt;/P&gt;&lt;P&gt;4.  What I would also do before doing number 3 is set up a trace for the day and compare it to what I have found.  Just need to be cautious when doing traces on an SAP_ALL ID because it will hit on optional auths that you may not really need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I think of anything else I will let you know but I have been real successfully in preventing the need for SAP_ALL in communication IDs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh most truely communication IDs will need auths such as S_RFC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2006 22:22:31 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387953#M188792</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2006-07-20T22:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: Finding Authorization Objects and values for a given user</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387954#M188793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The s_rfc authorizations and values it hits AND also requires will depend on the setting of your parameter auth/rfc_authority_check and whether you are using trusted RFC, in which case the check is suppressed in some cases.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can (without performance problems) trace the incoming successfull RFC calls via the security audit log (SM19).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In higher releases you can also trace the call transactions committed via SM20 (communication ID's do not realy need any s_tcode but would typically need authorizations for the objects the tcode checks).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have lots of time, you can check which function module within the funtion groups was called and from where it came by checking the RFC profiles in ST03N. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ID's are performing submit statements then you will also find these programs listed in transaction STAT for about a day or so after they were submitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ID's are calling routines on the operating system or datasets in the file system then the documentation in SU21 -&amp;gt; S_DATASET / S_PATH / S_C_FUNCT / S_LOG_COM might also be worth visiting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also agree with Mary, that a code review and some negative testing is what you would ultimatly like to be doing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jul 2006 08:35:35 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387954#M188793</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2006-07-21T08:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: Finding Authorization Objects and values for a given user</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387955#M188794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also check whether you got any predefined profiles &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are planning to give access to a communication &lt;/P&gt;&lt;P&gt;between R/3 and BW &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_BI-WHM_RFC&lt;/P&gt;&lt;P&gt;S_BI-WX_RFC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and sometimes I try to assign the roles whatever the dialog user well enough to deal with issue and add S_RFC,etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously what Mary said are to be followed if you want to restrict very well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nandan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jul 2006 21:55:25 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/finding-authorization-objects-and-values-for-a-given-user/m-p/1387955#M188794</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2006-07-27T21:55:25Z</dc:date>
    </item>
  </channel>
</rss>

