<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security design in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877954#M368982</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identify the roles (using T-Code SUIM)  which has T-code SM31 and object values (02 or 03).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identify users (SUIM) who all been assinged the above roles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either modify the role as per the requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove the authorization (Role for that particular user)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Soma&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: &lt;/P&gt;&lt;P&gt;        soma pradeep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Jan 2007 15:09:22 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-01-08T15:09:22Z</dc:date>
    <item>
      <title>security design</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877952#M368980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gurus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to implement security for tables.i e we have to restrict table access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 05:33:45 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877952#M368980</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-01-08T05:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: security design</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877953#M368981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;      here is the extract from a popular site..  go thru this .. &lt;/P&gt;&lt;P&gt;Critical and custom SAP R/3 tables are restricted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Execute transaction SUIM &lt;/P&gt;&lt;P&gt;Authorization Object: S_TCODE &lt;/P&gt;&lt;P&gt;Transaction Code:  SM31 (enhanced tables maintenance) &lt;/P&gt;&lt;P&gt;Authorization object:  S_TABU_DIS &lt;/P&gt;&lt;P&gt;Activity:  02 AND 03&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Risk: The risk here is that users who have this access, have the ability to maintain table data directly in the production system.  This includes transactional, masterfile, security and configuration data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Execute transaction SUIM&lt;/P&gt;&lt;P&gt;Authorization Object: S_TCODE &lt;/P&gt;&lt;P&gt;Transaction Code:  SM31 &lt;/P&gt;&lt;P&gt; Authorization object: S_TABU_DIS&lt;/P&gt;&lt;P&gt;Activity: 02 AND 03&lt;/P&gt;&lt;P&gt;Authorization Object:  S_TABU_CLI  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identify if custom transactions have references to authorization objects. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Execute transaction code: SE16 &lt;/P&gt;&lt;P&gt;Table name: TSTCA / TSTC &lt;/P&gt;&lt;P&gt;TCODE:  Z* &lt;/P&gt;&lt;P&gt;Check table TSTCA and verified that no Z transactions existed. Verified in table TSTC that the majority were secured by Authorization objects.  Since all transactions are secured by S_Tcode this control is still effective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this will help you.&lt;/P&gt;&lt;P&gt;with br,&lt;/P&gt;&lt;P&gt;Rajesh .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;i&amp;gt;award suitable points&amp;lt;/i&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 06:33:19 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877953#M368981</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-01-08T06:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: security design</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877954#M368982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identify the roles (using T-Code SUIM)  which has T-code SM31 and object values (02 or 03).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identify users (SUIM) who all been assinged the above roles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either modify the role as per the requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove the authorization (Role for that particular user)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Soma&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: &lt;/P&gt;&lt;P&gt;        soma pradeep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 15:09:22 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877954#M368982</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-01-08T15:09:22Z</dc:date>
    </item>
    <item>
      <title>Re: security design</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877955#M368983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;      Do in this way. First you should know which object need to protect table. Here is the object need to protect table &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S_TABU_DIS&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;        Then create ztransaction as custom transaction or parameter transaction of SE16 &lt;/P&gt;&lt;P&gt;Ex: To protect table Mara we we need customized transaction as follows&lt;/P&gt;&lt;P&gt;       Go to SE93 and click Create button add this values&lt;/P&gt;&lt;P&gt;     ZMara_SE16 &lt;/P&gt;&lt;P&gt;   Transaction SE16 as taking properties to this customized transaction&lt;/P&gt;&lt;P&gt;   Assign the object S_TABU_DIS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next &lt;/P&gt;&lt;P&gt;       Go SE54 and create table authorization Group such as "Demotable"&lt;/P&gt;&lt;P&gt;      In Se54 Tcode just click create authorization group it willl go to list of table authozn groups and u will see screen with button "New entry".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      So click to New Entry enter your named authn group for table different companies have different naming  convention ex. sat&lt;/P&gt;&lt;P&gt;next   SAVE it and now you created Authn group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next you need to assign this group to set of table.&lt;/P&gt;&lt;P&gt;         So go to Se16 table enter TDDAT. you will see view of tables and Authn group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next click to create button&lt;/P&gt;&lt;P&gt;         enter authn group and enter the table one by one &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      Example:  Table "MARA"   Authn Group  "sat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     Then SAVE it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assign the t_code to role where user can only access to defined table&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So Inthis way you have protected table. Hope you got the right answer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 18:55:58 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-design/m-p/1877955#M368983</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-03-07T18:55:58Z</dc:date>
    </item>
  </channel>
</rss>

