<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic UME security vs ABAP security object level in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868575#M673004</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We installed Virsa Compliance Calibrator &amp;amp; Access Enforcer and trying to configure security in UME to control user access so that besides action level security, we need further restriction on for example, Functional Area, cost center &amp;amp; department access. Does UME have lower level authorization restriction capabilities similar to that of ABAP authorization object level security? If not, how can we utilize ABAP Virsa security objects to control JAVA front end access?&lt;/P&gt;&lt;P&gt;Your advice is much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Oct 2007 15:10:32 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2007-10-03T15:10:32Z</dc:date>
    <item>
      <title>UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868575#M673004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We installed Virsa Compliance Calibrator &amp;amp; Access Enforcer and trying to configure security in UME to control user access so that besides action level security, we need further restriction on for example, Functional Area, cost center &amp;amp; department access. Does UME have lower level authorization restriction capabilities similar to that of ABAP authorization object level security? If not, how can we utilize ABAP Virsa security objects to control JAVA front end access?&lt;/P&gt;&lt;P&gt;Your advice is much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2007 15:10:32 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868575#M673004</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-03T15:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868576#M673005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jessica,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why do you want to go so granular in AE and CC? Are you concerned of the reports that are generated from CC.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since Virsa is not built like the ABAP backend, you can only manage the GRC roles at the UME level.  You will have the different roles in the UME for administrator, reporter, viewer, approver, and such.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2007 16:00:12 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868576#M673005</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-03T16:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868577#M673006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gabriel,&lt;/P&gt;&lt;P&gt;Thanks for replying, we need to go so granular because we have many different business units and our roles are built and grouped per BU so that each business unit BPO can only make AE requests, do reporting risks &amp;amp; approve for roles that they own.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jessica&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2007 16:24:25 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868577#M673006</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-03T16:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868578#M673007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jessica,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your comment &amp;lt;i&amp;gt;"...each business unit BPO can only make AE requests, do reporting risks &amp;amp; approve for roles that they own."&amp;lt;/i&amp;gt;, can you tell me how your organization goes about actually assigning security?  Does the BPO make the request then Security Admins assign the role, or what is your process?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sandy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2007 20:34:44 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868578#M673007</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-03T20:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868579#M673008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sandy,&lt;/P&gt;&lt;P&gt;Yes BPO submit user and role change requests for their own business units only. For example Finance department has a set of roles that only assigned to their group and Sales department has their own set of roles. Each business unit has a BPO and when creating request can only view and select their roles to change. Security Admin(third party) checks for SOD using an existing tool and processes the request if no SODs exists. Security requests also need to tie to cost centre for request cost distribution. &lt;/P&gt;&lt;P&gt;We are exploring using ABAP side of VIRSA authorization objects but not sure how to link AE front end to the ABAP authorization check.  &lt;/P&gt;&lt;P&gt;We added a custom field 'Cost Centre' in AE configuration. Do you or anyone know where we can add user exits in VIRSA to populate custom fields?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2007 21:28:37 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868579#M673008</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-03T21:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868580#M673009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CC 5.2 does not have the object level security restrictions possible in the ABAP version, and it is not possible to use ABAP objects to secure JAVA access.  As SAP continues to develop the 5.x version of the product, I am sure they will continue to close the gaps between the ABAP and JAVA versions of the product in future releases.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have heard that SAP GRC does not push existing 4.0 customers to 5.0, 5.1, or 5.2 because they are aware of these functionality gaps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2007 04:18:34 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868580#M673009</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-04T04:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868581#M673010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AE 5.2 provides a field mapping capability that allows you to map AE fields (including custom fields) to SU01 fields.  This is located at Configuration -&amp;gt; Provisioning -&amp;gt; Field Mapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Documentation is sparse on this functionality so be sure to perform adequate testing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2007 04:25:50 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868581#M673010</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-04T04:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: UME security vs ABAP security object level</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868582#M673011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not aware of a way to limit requestor access (you can request anything visible); however, you can provide direction by populating an attribute field (i.e. company) with valid company values for each role.  When a requestor searches for a role, if they filter by the appropriate company, they will only see valid roles for the request.  I did, however, point the request authentification towards a 'fake LDAP'.  This prevents individuals without specific UME credentials from submitting a request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you can restrict approvers using a custom approver/determinator.  In my case, I wanted to use a combination of "role" and "usergroup" to determine approver, rather than use one approver set for all requests.  I have implemented and confirmed this works.  The unfortunate side affect, is that you have to maintain a seperate file for this custom A/D (which you have to refer to /append for any request for role approver information).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2007 18:25:02 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/ume-security-vs-abap-security-object-level/m-p/2868582#M673011</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2007-10-09T18:25:02Z</dc:date>
    </item>
  </channel>
</rss>

