{"id":1138,"date":"2012-08-12T01:26:07","date_gmt":"2012-08-12T01:26:07","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=1138"},"modified":"2013-11-09T03:13:25","modified_gmt":"2013-11-09T03:13:25","slug":"img-authorization","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/img-authorization\/","title":{"rendered":"IMG Authorization"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">The requirement to create config roles (IMG Authorization) based on various SAP Functional modules often keeps coming. Here, we will create a config role which provides SAP function module specific IMG Authorization using tcode SPRO_ADMIN.<\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nFor creating function module specific IMG Authorization, we will create a config role which gives access to Sales and Distribution Basic Functions Pricing tcodes.<br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> <!--more--><\/span><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\"><!--more--><\/span><br \/>\n<span style=\"color: #4c4c4c;\"> The first step to create a module specific config role is to create an IMG Project. IMG Project can be created using tcode<\/span> <strong>SPRO_ADMIN<\/strong>.<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Execute tcode <strong>SPRO_ADMIN<\/strong> and click on <strong>create<\/strong> as shown below. Since we are creating IMG Project for SD role, lets give the Project Name <strong>SD<\/strong>. The following screenshot shows how this can be done.<\/span><\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1139\" title=\"Customizing: Project Administration\" alt=\"\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/1.jpg\" width=\"419\" height=\"243\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/1.jpg 419w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/1-300x173.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/1-290x168.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/1-150x86.jpg 150w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/a><br \/>\n<\/span><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Give the project title as <strong>SD Project<\/strong> and click on save:<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/create-project.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1140\" title=\"create project\" alt=\"\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/create-project.jpg\" width=\"376\" height=\"221\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/create-project.jpg 376w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/create-project-300x176.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/create-project-290x170.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/create-project-150x88.jpg 150w\" sizes=\"(max-width: 376px) 100vw, 376px\" \/><\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">Now go to the Scope tab and specify project scope.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/specify-project-scope.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1141\" title=\"specify project scope\" alt=\"\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/specify-project-scope.jpg\" width=\"377\" height=\"280\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/specify-project-scope.jpg 377w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/specify-project-scope-300x222.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/specify-project-scope-290x215.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/specify-project-scope-150x111.jpg 150w\" sizes=\"(max-width: 377px) 100vw, 377px\" \/><\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">System will prompt with &#8220;Select IMG Nodes&#8221; popup. Go to Sales and Distribution; expand it and select the node for which role needs to be created. In this example we have selected the SD node<\/span> <strong>Basic Functions -&gt; Pricing<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><strong><\/strong><!--more--><br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Select-IMG-Nodes.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1142\" title=\"Select IMG Nodes\" alt=\"\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Select-IMG-Nodes.jpg\" width=\"450\" height=\"197\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Select-IMG-Nodes.jpg 450w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Select-IMG-Nodes-300x131.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Select-IMG-Nodes-290x126.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Select-IMG-Nodes-150x65.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">Generate the Project.<\/span><br \/>\n<\/span><br \/>\n<script type=\"text\/javascript\">\/\/ <![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\/\/ <![CDATA[\n\n\/\/ ]]><\/script><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">Now go to PFCG tcode. Give a <strong>new<\/strong> role name and navigate to Menu Tab. We should go for a new role because the menu tab should not have any tcode assigned to the role for config role creation.<\/span><\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">Select menu option<\/span> <strong><span style=\"text-decoration: underline;\">U<\/span>tilities-&gt;<span style=\"text-decoration: underline;\">C<\/span>ustomizing auth<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Customizing-auth.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1143\" title=\"Customizing auth\" alt=\"\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Customizing-auth.jpg\" width=\"378\" height=\"271\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Customizing-auth.jpg 378w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Customizing-auth-300x215.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Customizing-auth-290x207.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Customizing-auth-150x107.jpg 150w\" sizes=\"(max-width: 378px) 100vw, 378px\" \/><\/a><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">Select IMG Project \u2013 SD<\/span><br \/>\n<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Go to the PFCG Role authorization tab and maintain authorization objects. Take care to see that the object <strong>S_TABU_DIS<\/strong> gives display access to those tables which you would not want the user to change. Also take care of <strong>S_USER*<\/strong> authorization objects. These objects give critical accesses which are generally restricted to Basis and Security teams only.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1138"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=1138"}],"version-history":[{"count":17,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1138\/revisions"}],"predecessor-version":[{"id":1787,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1138\/revisions\/1787"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=1138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}