{"id":1210,"date":"2012-08-28T05:25:37","date_gmt":"2012-08-28T05:25:37","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=1210"},"modified":"2015-05-03T09:29:10","modified_gmt":"2015-05-03T09:29:10","slug":"su25-steps","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/su25-steps\/","title":{"rendered":"SU25 Steps"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">This post is about SAP Security Upgrade (SU25 steps in SAP).<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<strong>Why do we need to upgrade our SAP System?<\/strong><\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">The reason to upgrade SAP system should be driven by &#8220;Business Needs&#8221;. Business should be well aware of the reason as to why it needs to upgrade its system. It should know if the new release brings &#8220;desired functionalities&#8221;. This information can be found in the release note for the specific release. Care should be taken while upgrading the system, because if the upgrade fails, it can affect business operations.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><strong>Let us discuss SU25 steps for SAP Security upgrade:<\/strong><br \/>\n<\/span><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">SU25 is a tcode which is executed during the initial implementation of SAP and also during each time an upgrade takes place. There are 6 different steps in this transaction code, not all of which need to be executed each time SU25 is used. We will be discussing about these steps and also about when a certain step need to be executed. These steps are used to populate the customer tables of the Profile Generator the first time the Profile Generator is used, or update the customer tables after an upgrade (to update check indicators and field values of SU24). The below screenshot shows the steps of SU25:<\/span><br \/>\n<\/span><\/span><\/p>\n<p><script type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\n\n\/\/ ]]><\/script><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/SU25.jpg\"><!--more--><\/a><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/SU25.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1213\" title=\"SU25\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/SU25.jpg\" alt=\"\" width=\"660\" height=\"557\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/SU25.jpg 660w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/SU25-300x253.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/SU25-290x244.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/SU25-150x126.jpg 150w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/SU25.jpg\"><!--more--><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><strong>Step 1<\/strong>: <span style=\"text-decoration: underline;\">Initially fill the customer tables<\/span> &#8211; <span style=\"color: #4c4c4c;\">This step is used if the SU24 customer tables (USOBT_C and USOBX_C) need to be filled with SAP default values from the tables USOBT and USOBX. This is generally done when you use Profile Generator for the first time or when you want to overwrite SU24&#8217;s check indicator and field values with SAP default values.<\/span><br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> <!--more--><\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nSteps 2A to 2D of SU25 are executed if you have used profile generator in an earlier release and you want to compare data with the new SAP default values after an upgrade.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<strong>Step 2<\/strong> : <span style=\"color: #4c4c4c;\">Post-processing the settings after upgrading to a higher Release:<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><strong style=\"color: #0000ff; font-family: verdana;\">Step 2(A)<\/strong><span style=\"color: #0000ff; font-family: verdana;\"> : <\/span><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; font-family: verdana;\">Preparation: Compare with SAP values<\/span><\/span><span style=\"color: #0000ff; font-family: verdana;\"> : <span style=\"color: #4c4c4c;\">This step is used to prepare the\u00a0comparison\u00a0and must be executed first.<\/span><\/span><\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"color: #0000ff; font-family: verdana;\"><strong>Step 2(B)<\/strong> : <span style=\"text-decoration: underline;\">Compare transactions<\/span> : <span style=\"color: #4c4c4c;\">If any change has been made to check indicators or field values in SU24, you can compare these changes with the new SAP default values. The tcodes which have undergone any authorization object level change in new release, will be shown with red traffic light. The authorization objects for those tcodes can be compared for their check indicators and field values. As per the below screenshot, the values are compared for those present in SU24 and those present in SU25 (i.e. proposed by SAP):<\/span><\/span><\/li>\n<\/ul>\n<div><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<div><span style=\"color: #4c4c4c; font-family: verdana;\"><!--more--><\/span><\/div>\n<div><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/Step-2b.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1217\" title=\"Step 2b\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2b.jpg\" alt=\"\" width=\"661\" height=\"45\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2b.jpg 661w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2b-300x20.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2b-290x19.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2b-150x10.jpg 150w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">You can double click on the authorization object for which SAP proposed check indicators and SAP proposed values need to be assigned to SU24.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><\/p>\n<ul>\n<li><strong style=\"color: #0000ff; font-family: verdana;\">Step 2(C)<\/strong><span style=\"color: #0000ff; font-family: verdana;\"> : <\/span><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; font-family: verdana;\">Roles to be checked<\/span><\/span><span style=\"color: #0000ff; font-family: verdana;\"> :<\/span><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\"> This step helps to determine which roles are affected by changes to authorization data. The corresponding authorization profiles need to be edited and regenerated. The affected roles are assigned the status \u201cprofile comparison required\u201d. In case there is a very large number of roles that need to be modified and there is time constraint, the other option can be to assign the profile SAP_NEW. SAP_NEW contains authorizations for all new checks in the existing tcodes. The roles are assigned the status &#8220;profile\u00a0comparison\u00a0required&#8221; and can be modified as and when you get time or when any particular role needs some other change.<\/span> <\/span><span style=\"color: #4c4c4c; font-family: verdana;\"><strong>But this option should generally be avoided and should be used only in case of emergency situations<\/strong> and the profile SAP_NEW should be assigned only to limited number of users.<\/span><\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"color: #0000ff; font-family: verdana;\"><strong>Step 2(D)<\/strong> : <span style=\"text-decoration: underline;\">Display changed transaction codes<\/span> : <span style=\"color: #4c4c4c;\">This step displays the list of those transaction codes which get replaced by one or more other transactions.This step is used to create a list of all roles that contain transactions replaced by one or more other transactions. The list includes the old and new transaction codes. You can replace the transactions in the roles as needed. Double-click the list to go to the role.<\/span><\/span><\/li>\n<\/ul>\n<div><\/div>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/Step-2D.jpg\"><!--more--><\/a><\/span><\/div>\n<div><\/div>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/Step-2D.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-1224\" title=\"Step 2D\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2D.jpg\" alt=\"\" width=\"718\" height=\"85\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2D.jpg 997w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2D-300x35.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2D-290x34.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/08\/Step-2D-150x17.jpg 150w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/a><\/span><\/div>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<strong>Step 3<\/strong> : <span style=\"text-decoration: underline;\">Transport the customer tables<\/span> &#8211; <span style=\"color: #4c4c4c;\">This step of SU25 is used for transporting the changes made in Steps 1, 2A and 2B. Complete customer tables get transported.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"><strong>Steps 4 to 6 are only required for upgrade version which is lower than 4.6C.<\/strong><\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<strong>Step 4<\/strong> : <span style=\"text-decoration: underline;\">Check Indicator (Transaction SU24)<\/span> &#8211; <span style=\"color: #4c4c4c;\">Changes to the check indicators are made in this step. You can also go to step 4 by calling transaction SU24. Authorization check within a transaction can be changed from there. For more details about SU24 concepts, please refer to this <span style=\"color: #e63518;\"><a title=\"SU24 concepts\" href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/su24-concept-in-sap\" target=\"_blank\"><span style=\"color: #e63518;\"><strong>link<\/strong><\/span><\/a><\/span>.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><strong>Step 5<\/strong> : <span style=\"text-decoration: underline;\">Deactivate authorization object globally<\/span> &#8211; <span style=\"color: #4c4c4c;\">In step 5 you can deactivate authorization objects system wide.<\/span><br \/>\n<\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<strong>Step 6<\/strong> : <span style=\"text-decoration: underline;\">Copy data from old profiles<\/span> &#8211; <span style=\"color: #4c4c4c;\">This step is used for creating roles from authorization profiles which you generate manually.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1210"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=1210"}],"version-history":[{"count":28,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1210\/revisions"}],"predecessor-version":[{"id":2142,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1210\/revisions\/2142"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=1210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}