<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic regarding the authorization object in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595226#M594380</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   cany any one tell me about authorization object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Aug 2007 04:49:58 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-08-08T04:49:58Z</dc:date>
    <item>
      <title>regarding the authorization object</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595226#M594380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   cany any one tell me about authorization object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2007 04:49:58 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595226#M594380</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-08-08T04:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: regarding the authorization object</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595227#M594381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the profiles of the user who has authorization, then you can use that Transaction see the doc:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general different users will be given different authorizations based on their role in the orgn.&lt;/P&gt;&lt;P&gt;We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.&lt;/P&gt;&lt;P&gt;USe SUIM and SU21 T codes for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means you have to allocate an authorization object in the definition of the transaction. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;program an AUTHORITY-CHECK. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AUTHORITY-CHECK OBJECT &amp;lt;authorization object&amp;gt; &lt;/P&gt;&lt;P&gt;ID &amp;lt;authority field 1&amp;gt; FIELD &amp;lt;field value 1&amp;gt;. &lt;/P&gt;&lt;P&gt;ID &amp;lt;authority field 2&amp;gt; FIELD &amp;lt;field value 2&amp;gt;. &lt;/P&gt;&lt;P&gt;... &lt;/P&gt;&lt;P&gt;ID &amp;lt;authority-field n&amp;gt; FIELD &amp;lt;field value n&amp;gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The OBJECT parameter specifies the authorization object. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ID parameter specifies an authorization field (in the authorization object). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The FIELD parameter specifies a value for the authorization field. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You program the authorization check using the ABAP statement AUTHORITY-CHECK.&lt;/P&gt;&lt;P&gt;AUTHORITY-CHECK OBJECT 'S_TRVL_BKS' &lt;/P&gt;&lt;P&gt;ID 'ACTVT' FIELD '02' &lt;/P&gt;&lt;P&gt;ID 'CUSTTYPE' FIELD 'B'. &lt;/P&gt;&lt;P&gt;IF SY-SUBRC &amp;lt;&amp;gt; 0. &lt;/P&gt;&lt;P&gt;MESSAGE E... &lt;/P&gt;&lt;P&gt;ENDIF. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'S_TRVL_BKS' is a auth. object&lt;/P&gt;&lt;P&gt;ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Authorization concept is somewhat linked with BASIS people.&lt;/P&gt;&lt;P&gt;As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a profile and that profile in turn attached to a particular user.&lt;/P&gt;&lt;P&gt;Take the help of the basis Guy and create and use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Priyanka.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2007 04:54:07 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595227#M594381</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-08-08T04:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: regarding the authorization object</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595228#M594382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SAP Security and Authorization Concepts &lt;/P&gt;&lt;P&gt;R/3 audit review questions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a list of items most commonly reviewed by internal/external auditors when reviewing your R/3 system.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is always a good idea to review this list a couple times a year and to take the appropriate steps to tighten your security.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Review the following :-  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;System security file parameters (TU02) (e.g. password length/format, forced password sessions,  user failures to end  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   session etc.) have been set to ensure confidentiality and integrity of password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security-Parameter-Settings-Documentation &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Setup and modification of user master records follows a specific procedure and is properly approved by management.  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Setup and modification of authorizations and profiles follows a specific procedure and is performed by someone  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   independent of the person responsible for user master record maintenance.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;An appropriate naming convention for profiles, authorizations and authorization objects has been developed to help  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   security maintenance and to comply with required SAP R/3 naming conventions.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;A user master record is created for each user defining a user ID and password. Each user is assigned to a user group, in  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   the user master record, commensurate with their job responsibilities.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Check objects (SU24) have been assigned to key transactions) to restrict access to those transaction.  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Authorization objects and authorizations have been assigned to users based on their job responsibilities.  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Authorization objects and authorizations have been assigned to users ensuring segregation of duties.  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Users can maintain only system tables commensurate with their job responsibilities.  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Validity periods are set for user master records assigned to temporary staff.  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;All in-house developed programs contain authority check statements to ensure that access to the programs are properly  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   secure.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Select a sample of :-  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Changes to user master records, profiles and authorizations and ensure the changes were properly approved.  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   (The changes can be viewed with transaction (SECR).  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Ensure that security administration is properly segregated. At a minimum there should be separate administrators  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   responsible for:  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - User master maintenance. (This process can be further segregated by user group.)  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - User profile development and profile activation. (These processes can be further segregated.)  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Verify that a naming convention has been developed for profiles, authorizations and in-house developed authorization  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   objects to ensure:  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - They can be easily managed.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - They will not be overwritten by a subsequent release upgrade (for Release 2.2 should begin with Y_ or Z_ and for  &lt;/P&gt;&lt;P&gt;     Release 3.0 by Z_ only.)  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Assess through audit information system (SECR) or through a review of table USR02, whether user master records have &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   been properly established and in particular:  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - The SAP_ALL profile is not assigned to any user master records.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - The SAP_NEW profile is not signed to any user master records. Verify that procedures exist for assigning new  &lt;/P&gt;&lt;P&gt;     authorization objects from this profile to users following installation of new SAP releases.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Assess and review of the use of the authorization object S_TABU_DIS and review of table authorization classes  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   (TDDAT)  whether :- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - All system tables are assigned an appropriate authorization class.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - Users are assigned system table maintenance access (Through S_TABU_DIS) based on authorization classes  &lt;/P&gt;&lt;P&gt;     commensurate with their job responsibilities.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Assess and review of the use of the authorization objects S_Program and S_Editor and the review of program classes  &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;   (TRDIR) whether:  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - All programs are assigned the appropriate program class.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - Users are assigned program classes commensurate with their job responsibilities.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI level="1" type="ul"&gt;&lt;P&gt;Ensure through a review of a sample of :- &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - In-house developed programs that the program, code either:  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - Contains an Authority-Check statement referring to an appropriate authorization object and valid set of values;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  or  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  - Contains a program Include statement, where the referred program contains an Authority-Check statement referring to  &lt;/P&gt;&lt;P&gt;     an appropriate authorization object and valid set of values.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think an auditor would want to know what methods you are using to approve who gets what profile and what method you are using to document it so that if you review your documentation you could compare it with what authorization the user currently has and determine if the user has more authorizations (roles) than he has been approved for by the approval system in place. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example.&lt;/P&gt;&lt;P&gt; am using sm01 for locking transaction. but it locks that transaction to all the user. i want to lock the particular transaction to particular user. how can i do it.&lt;/P&gt;&lt;P&gt;please help me. it is very urgent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ans&lt;/P&gt;&lt;P&gt;Restricting T-codes is to be done by auth object S_TCODE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to add this auth object in the respective role of the user for whoom you want to restrict access and in the auth object you can mention the tcodes which he can access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pfcg - to create/edit role&lt;/P&gt;&lt;P&gt;su01 - to create/edit user&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2007 04:54:37 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595228#M594382</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-08-08T04:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: regarding the authorization object</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595229#M594383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization object is used to check the authorization for the user to execute the program&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You create authorization object using tcode su21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Arun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2007 05:03:57 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-the-authorization-object/m-p/2595229#M594383</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-08-08T05:03:57Z</dc:date>
    </item>
  </channel>
</rss>

