Application Development and Automation Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

Question about the function module (RFC_READ_TABLE)

Former Member
0 Likes
1,597

Dear everyone

Could I ask you a question about the function module (RFC_READ_TABLE)?

I was asked if it's possible to create a report which compares the data between different SAP systems (both production systems).

Now, the easiest way would be to use the function module (RFC_READ_TABLE) within a SAP infoset query (SQ01 type query).

But I heard the rumor that using the function module (RFC_READ_TABLE) is not advisable due to the security reason.

However, I am not exactly sure what sort of security problems this function module can possibly have...

Would you help me on this?

I also would like to know if using "remote enabled module" type function module can always overcome this possible security issue.

Or, are there any points that I need to be careful about even when I use "remote enabled module" function module?

Thank you very much in advance.

Takashi


1 ACCEPTED SOLUTION
Read only

FredericGirod
Active Contributor
0 Likes
1,240

Hi,

if anybody could read the content of a table of your productive server, your authorization control doesn't stop this person. He could read any data, extract the list of the customer, extract the list of price, get the salary of people (if you have HR) ....  

so it's a big issue if you open it

there is a standard transaction that do this for customizing tables : SCU0

regards

Fred

6 REPLIES 6
Read only

FredericGirod
Active Contributor
0 Likes
1,241

Hi,

if anybody could read the content of a table of your productive server, your authorization control doesn't stop this person. He could read any data, extract the list of the customer, extract the list of price, get the salary of people (if you have HR) ....  

so it's a big issue if you open it

there is a standard transaction that do this for customizing tables : SCU0

regards

Fred

Read only

0 Likes
1,240

Dear Fred-san

Thank you very much for your support on this.

But, may I double check about what you mentioned above?

So, what you were mentioning was that if some user executes the query with

the function module (RFC_READ_TABLE), under the following conditions, he can access to

the HR data even when he does not have the authorizations for HR transactions?

<Conditions>

1. the user has the authorization for HR database tables themselves

2. RFC_READ_TABLE is called to retrieve the data from HR database

<example>

Data: LF_HR_TABLE like  DD02L-TABNAME value 'PA0000'.

CALL FUNCTION 'RFC_READ_TABLE'
   EXPORTING
    query_table                = LF_HR_TABLE

  TABLES
   OPTIONS                    =
   fields                     =
   data                       =    .

But then, as long as we call this function module for a non-critical tables such as

VBAP (sales order) or EKKO (purchase order) within our query, it wouldn't seem to be

so security risk to use RFC_READ_TABLE...

Besides, each query (infoset query) has got the concept of user groups, which limits

the access to the queries within the user group.

※If someone does not belong to the user group, he cannot execute the queries within that

   user group, etc

So, my feeling is that even infoset queries does have authorization concept...

Would you give me your thought on this?

I also thank you for your information for SCU0.

That is an interesting transaction

Kind regards,

Takashi

Read only

0 Likes
1,240

Hi,

just a detail, VBAP & EKKO are critical !   if your competitor have this informations, it could determine your price, where your sale your business, where you buy your component and how much, the price .. when ...

so query & RFC_READ...  are very dangerous for authorization

(and with RFC..  you didn't have the concept of organizational data)

regards

Fred

Read only

0 Likes
1,240

Hi, Fred-san

Thank you again for your information on this.

Yes, I agree that the data in VBAP and EKKO are also important, and we shouldn't let

the competitors to have access to those data in our system.

But I was not sure how those competitors can execute the query with RFC_READ_TABLE in our

system...

I mean, they don't even have a SAP account for our system...

So what you were saying was that if someone (=competitors) catches the data which is being

trasfered over internet while our users are executing RFC_READ_TABLE, it would cause a security risk?

Anyhow, I felt that we need to be very very careful for using RFC_READ_TABLE.

So I will not use this function module in the report this time.

Thank you

Takashi

Read only

0 Likes
1,240

Remember, the most of time, Hacking comes from inside

So, if someone could take these informations and go to your competitor ...

regards

Fred

Read only

0 Likes
1,240

Oh, now I understand the risk of using this function module

So it wasn't like someone can eavesdrop the data while if's transfered over

the internet if we use this function module.

Anyhow, I decided not to use this function module this time.

So, the information will be safe with us

Thank you for your help

Kind regards,

Takashi