<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: regarding authorization objects. in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315816#M794225</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access protection system must ensure that only authorized individuals have access to the system and to particular data. For achieving precise application security concerning authorization and to protect confidential data against unauthorized access it is very important to focus on the use of authorization groups. The authorization group allows extended authorization protection for particular objects. The authorization groups are freely definable. They usually occur in authorization objects ... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw70/helpdata/en/35/26b17fafab52b9e10000009b38f974/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw70/helpdata/en/35/26b17fafab52b9e10000009b38f974/content.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw70/helpdata/en/52/671285439b11d1896f0000e8322d00/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw70/helpdata/en/52/671285439b11d1896f0000e8322d00/content.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw04/helpdata/en/80/1a6859e07211d2acb80000e829fbfe/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw04/helpdata/en/80/1a6859e07211d2acb80000e829fbfe/content.htm&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Jan 2008 06:41:15 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2008-01-23T06:41:15Z</dc:date>
    <item>
      <title>regarding authorization objects.</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315814#M794223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello everyone,&lt;/P&gt;&lt;P&gt;                     plz. tell me, what is authorization group?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 06:31:46 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315814#M794223</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-01-23T06:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: regarding authorization objects.</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315815#M794224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;The authorization group&lt;/STRONG&gt; allows extended authorization protection for particular objects. The authorization groups are freely definable. They usually occur in authorization objects together with an activity.&lt;/P&gt;&lt;P&gt;The table that contains all authorization objects is TOBJ.&lt;/P&gt;&lt;P&gt;The table that contains all activities is TACT.&lt;/P&gt;&lt;P&gt;The table that contains definition of all authorization groups is TBRG.&lt;/P&gt;&lt;P&gt;TBRG -- Contains all authorization groups and gives information about relation between authorization object and authorization group. The description of the authorization groups is defined in table TBRGT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Authorization Object&lt;/STRONG&gt; are used to give authority to the user according to the position he or she is holding the organization unit.&lt;/P&gt;&lt;P&gt;Different roles are assigned to the position of the organization unit and these roles in turn are assigned to the task.&lt;/P&gt;&lt;P&gt;In SAP these task are assigned to the transactions .&lt;/P&gt;&lt;P&gt;So the user is given authorization for the particular transaction.&lt;/P&gt;&lt;P&gt;This way user are controlled from using the data which they are not supposed to accesss.&lt;/P&gt;&lt;P&gt;Sometimes the authorizatio is only to read , that mean user can see the data but cannot change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In some case the user is not eligible to see the data not relevant to his aera . eg. a sales rep in one sales area is not supposed to view the data of another sales area or sales rep.&lt;/P&gt;&lt;P&gt;Even the user might be authorized for a transaction but the usage will be limited to area relevant to his /her work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check these links.&lt;/P&gt;&lt;P&gt;&lt;A class="jive_macro jive_macro_thread" href="https://community.sap.com/" __jive_macro_name="thread" modifiedtitle="true" __default_attr="457870"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://searchsap.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid21_gci1191796,00.html" target="test_blank"&gt;http://searchsap.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid21_gci1191796,00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive_macro jive_macro_thread" href="https://community.sap.com/" __jive_macro_name="thread" modifiedtitle="true" __default_attr="180092"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Maha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 06:35:12 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315815#M794224</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-01-23T06:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: regarding authorization objects.</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315816#M794225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access protection system must ensure that only authorized individuals have access to the system and to particular data. For achieving precise application security concerning authorization and to protect confidential data against unauthorized access it is very important to focus on the use of authorization groups. The authorization group allows extended authorization protection for particular objects. The authorization groups are freely definable. They usually occur in authorization objects ... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw70/helpdata/en/35/26b17fafab52b9e10000009b38f974/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw70/helpdata/en/35/26b17fafab52b9e10000009b38f974/content.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw70/helpdata/en/52/671285439b11d1896f0000e8322d00/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw70/helpdata/en/52/671285439b11d1896f0000e8322d00/content.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw04/helpdata/en/80/1a6859e07211d2acb80000e829fbfe/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw04/helpdata/en/80/1a6859e07211d2acb80000e829fbfe/content.htm&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 06:41:15 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315816#M794225</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-01-23T06:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: regarding authorization objects.</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315817#M794226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vishal, this helps u how to dreate an authorization group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gotot SU21 tcode and create a Class or create an Auth Object under a class in it&lt;/P&gt;&lt;P&gt;see the doc&lt;/P&gt;&lt;P&gt;In general different users will be given different authorizations based on their role in the orgn.&lt;/P&gt;&lt;P&gt;We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.&lt;/P&gt;&lt;P&gt;USe SUIM and SU21 T codes for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means you have to allocate an authorization object in the definition of the transaction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;program an AUTHORITY-CHECK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AUTHORITY-CHECK OBJECT &amp;lt;authorization object&amp;gt;&lt;/P&gt;&lt;P&gt;ID &amp;lt;authority field 1&amp;gt; FIELD &amp;lt;field value 1&amp;gt;.&lt;/P&gt;&lt;P&gt;ID &amp;lt;authority field 2&amp;gt; FIELD &amp;lt;field value 2&amp;gt;.&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ID &amp;lt;authority-field n&amp;gt; FIELD &amp;lt;field value n&amp;gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The OBJECT parameter specifies the authorization object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ID parameter specifies an authorization field (in the authorization object).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The FIELD parameter specifies a value for the authorization field.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You program the authorization check using the ABAP statement AUTHORITY-CHECK.&lt;/P&gt;&lt;P&gt;AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'&lt;/P&gt;&lt;P&gt;ID 'ACTVT' FIELD '02'&lt;/P&gt;&lt;P&gt;ID 'CUSTTYPE' FIELD 'B'.&lt;/P&gt;&lt;P&gt;IF SY-SUBRC 0.&lt;/P&gt;&lt;P&gt;MESSAGE E...&lt;/P&gt;&lt;P&gt;ENDIF.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'S_TRVL_BKS' is a auth. object&lt;/P&gt;&lt;P&gt;ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Authorization concept is somewhat linked with BASIS people.&lt;/P&gt;&lt;P&gt;As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a profile and that profile in turn attached to a particular user.&lt;/P&gt;&lt;P&gt;Take the help of the basis Guy and create and use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kindly reward if found helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers,&lt;/P&gt;&lt;P&gt;Hema.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 06:41:18 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/regarding-authorization-objects/m-p/3315817#M794226</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-01-23T06:41:18Z</dc:date>
    </item>
  </channel>
</rss>

