SAP Authorizations Organisationally restrict table editing permissions

Direkt zum Seiteninhalt
Organisationally restrict table editing permissions
Query Data from Active Directory
SAP*: The SAP* user is part of the SAP kernel, and since it is hard-coded in the SAP system, it does not require a user master set. If there is no user master set for SAP*, anyone can log on to the SAP system after rebooting with this user, as the default password will then apply. The user thus has access to all functions, since Authority Checks in this case do not take effect. You can prevent this behaviour by setting the login/no_automatic_user_sapstar profile parameter to 1. If you want to copy clients, you have to set this parameter to 0 again before you do so, because the user SAP* is required for this. Safeguard measures: Despite the parameter setting, the SAP user should have a user master set in all clients. However, you should remove all profiles and lock the user. In addition, change the password, assign the user to the SUPER user group, and log it with the Security Audit Log.

If you still have problems with the performance of the evaluation, despite the regular archiving and indexing of the modification documents of your user and permission management, this is probably due to the amount of central change documents. In this case, you also need an archiving concept for other key change document data. SAPHinweis 1257133 describes the procedure for creating such a concept.
Schedule PFUD transaction on a regular basis
Employees should only be able to access data relevant to their work, country or accounting area in tables? Set up organisational criteria to ensure this. Do you want users to be able to read or maintain specific tables, but only have access to the table contents that are relevant to them? The S_TABU_DIS and S_TABU_NAM permissions objects allow you to access the tables, but if you want a user to see or maintain only parts of the table, these authorization objects will reach their limits.

Furthermore, the statistical data of other users (user activities, such as executed reports and transactions) should be classified as sensitive, since it may be possible to draw conclusions about work behavior using this data. This data can be displayed using transaction ST03N, for example. Access authorizations to the two types of data mentioned above should be assigned only very restrictively.

Authorizations can also be assigned via "Shortcut for SAP systems".

If you want to know more about SAP authorizations, visit the website www.sap-corner.de.

This authorization should be assigned only very restrictively, for example developers need the authorization however for their daily work.

The User Information System is a powerful tool that allows you to perform various evaluations: - In which roles is the transaction ME23N included? - Which transactions may a specific user execute (see also report RSUSR010)? - Which customer-specific authorization objects exist in the SAP system? - How do two roles differ (see also report RSUSR050)?
SAP Corner
Zurück zum Seiteninhalt