SAP SECURITY ADMINISTRATION, SAP GRC, SAP BASIS.
SAP SECUEITY QUESTIONS AND ANSWERS
SAP GRC SECURITY QUESTIONS AND ANSWERS
SAP BASIS QUESTIONS AND ANSWERS
SAP SECURITY AND BASIS TUTORIAL
How To Create Derived Roles in SAP
Get link
Facebook
X
Pinterest
Email
Other Apps
How To Create Derived Roles in SAP
We have seen how to create Single roles, Composite roles and assigning the roles to user master records. In this blog we will see how to create derived roles and assigning these roles to users in SAP.
Difference in the derived roles and deriving roles are the organizational values. The menus and authorizations are same in both the roles. The relation is also called as parent child relationship or master role and derived role.
Derived roles are useful when the organization has spread across the globe. System Administrators can create one master role and can derive several roles based on the company codes.
Procedure for creating Derived Roles:
1. Go to SAP menu-->Administration-->User Maintenance-->Role Maintenance or execute transaction code PFCG
Enter the derived role name and click on create single role tab.
2. Provide short description and long text like manager approvals and ticket number.
3. Enter the derive from role (Parent Role) name.
4. Go to Authorization Tab and enter the profile name manually or choose proposed value. Then click on the change Authorization Data.
5. Enter the organizational levels and click on Save icon.
6. Click on the generate icon to generate the role.
7. Go to the User tab and assign the users manually or select from the list.
8. Click on Save icon to save the role.
Watch demo video on how to create derived role in SAP.
SAP Security: Critical Authorization Objects 1. S_TABU_DIS: This authorization object enables authorization check for displaying or modifying the table content. For accessing the table data, users use SE16, SM30 or SM31 transaction codes. This object contains two fields, DICBERCLS (authorization group) and ACTCT. 2. S_RFC: This authorization object enables authorization check for remote function call to access program modules (function modules). This authorization object contains three fields, RFC_TYPE, RFC_NAME and ACTCT. 3. S_DATASET: This authorization object enable file access at operating system level. This gives permission to access files from ABAP programs. This object contains three fields, File name, Program and Activity. 4. S_ADMI_FCD: This authorization objects enable access to various administrator activities like system monitoring, spool administration, client creations, update administration etc. This object contains one field, system administration functions. 5. S_DE...
How to set auto Logoff for Inactive users in SAP SAP provides an options for logging of inactive users in SAP automatically. Inactive means if there is no activity for a specific period of time. By setting the auto logoff improves the security in the SAP system. The auto logoff options is not active in the system by default. This needs to be activated using the profile parameter called rdisp/gui_auto_logout. The value for this parameter should be set in the form of seconds. The inactive users are logout of the system after the specific time period that is set in the parameter. The SAP system doesn't save the data before auto logoff and it does not popup any prompt before auto logoff. Procedure to set the value in the Profile parameter: Execute transaction code RZ10 Select the DEFAULT profile from the selection menu. Select the Extended maintenance and click on change icon. Click on the create parameter icon as shown below. Enter the new parameter name as rdisp/gui_auto_logout and c...
SAP Security User Information System (SUIM) SAP User Information System (SUIM) is used to get the information about users, authorizations, roles and profiles in SAP system. we can explicitly search for users with critical authorizations and critical roles. SUIM is also used for user, authorizations, role and profile comparisons. We can get the list of transaction codes in particular role. SUIM is also used for displaying change documents for users, roles, role assignments, profiles, authorizations and security policies. Displaying users by their address: Execute SUIM transaction code and select "users by Address Data" under Users menu Or Use report RSUSR002_ADDRESS. Execute this report using SE38 transaction code. Leave the fields empty and click on execute icon. This will display all the users in the system with their address. Below is the output that shows the list of users by their address. Below are the various reports that are used to display the users on various ...
Comments
Post a Comment