7 Configuring Authorizations
167
7.1 Authorization Fundamentals
168
7.1.1 What is a Role?
168
7.1.2 What is a Profile?
168
7.1.3 Authorization Objects
169
7.1.4 The Profile Generator
169
7.1.5 Authorization Checks
169
7.1.6 Display Authorization Data
171
7.1.7 The User Buffer
173
7.1.8 Maintain Check Indicators: Transaction SU24
173
7.2 SAP Role Design Concepts
180
7.2.3 Composite Roles
182
7.2.5 Comparison of the Role Design Concepts
183
7.2.6 Why Not Use Enabler Roles?
184
7.2.7 What Impact Does a System Upgrade Have on Roles and Authorizations?
188
7.2.8 Role-Naming Conventions
188
7.3 The Profile Generator
192
7.3.1 Create a Single Role
192
7.3.2 Create a Composite Role
204
7.3.3 Create a Master and Derived Role
207
7.3.4 Overview Status
213
7.3.5 Mass Generation of Profiles
214
7.3.6 Mass Comparison
215
7.3.7 Role Menu Comparison
216
7.3.8 Role Versioning
217
7.4 Assign and Remove Roles
219
7.5 Lock and Unlock Transactions
221
7.6 Transaction SUIM: User Information System
221
7.6.5 Authorization Objects
224
7.6.8 Where-Used Lists
225
7.6.9 Change Documents
225
7.8 Common Standard Profiles
228
7.9 Types of Transactions
229
7.9.1 Dialog Transactions
230
7.9.2 Report Transactions
230
7.9.3 Object-Oriented Transactions
231
7.9.4 Variant Transactions
231
7.9.5 Parameter Transaction
234
7.9.6 Call Transaction in Transaction SE97
237
7.10 Table Authorizations
239
7.10.1 Table Group Authorizations via S_TABU_DIS
240
7.10.2 Table Authorizations via S_TABU_NAM
241
7.10.3 Cross-Client Table Authorizations via S_TABU_CLI
241
7.10.4 Line-Oriented Table Authorizations via S_TABU_LIN
241
7.10.5 Table Authorizations and Auditors
245
7.10.6 Table Views for Database Tables
245
7.11 Printer Authorizations
249
7.12 Other Important Authorization Objects
249
7.12.1 Upload and Download Authorizations
249
7.12.2 Report Authorizations
250
7.12.3 Background Jobs
251
7.12.4 ABAP Workbench
251
7.12.5 Batch Sessions
251
7.12.6 Query Authorizations
251
7.12.7 Remote Function Call Authorizations
252
7.13 Transaction SACF: Switchable Authorizations
253
7.14 Customizing Entries in Tables PRGN_CUST and SSM_CUST
255
7.15 Mass Maintenance of Values within Roles
257
7.16 Upgrading to a New Release
260
7.18 Authorization Redesign and Cleanup
269
7.18.1 Business Impact of Security Redesign
270
7.18.2 Reducing the Business Impact of a Role Redesign Project
270
7.18.3 Gathering Authorization Data
271
7.18.4 Testing Role Changes in Production
272
7.18.5 Automate Role Creation and Testing
273
7.19 Introduction to SAP GRC Access Control
273
7.19.1 Access Risk Analysis
273
7.19.2 Access Request Management
274
7.19.3 Business Role Management
274
7.19.4 Emergency Access Management
275
7.19.5 Segregation of Duties Management Process
275