{"id":1813,"date":"2014-02-16T09:37:13","date_gmt":"2014-02-16T09:37:13","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=1813"},"modified":"2015-05-03T07:59:15","modified_gmt":"2015-05-03T07:59:15","slug":"structural-authorization","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/structural-authorization\/","title":{"rendered":"Structural Authorization"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Structural authorizations are used to restrict access to organizational structures. It controls access to data stored in time dependent structures like Org Structure, Qualification Catalog etc.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1815 aligncenter\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_530073750dc8b.png\" alt=\"\" width=\"680\" height=\"500\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_530073750dc8b.png 680w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_530073750dc8b-300x220.png 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_530073750dc8b-290x213.png 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_530073750dc8b-150x110.png 150w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/p>\n<p><span style=\"line-height: 1.5em;\">Structural authorizations are used to restrict users to access a part of the organizational structure.<\/span><\/p>\n<p><span style=\"line-height: 1.5em;\">\u00a0Combination of Standard authorization and Structural authorization is used for better Security over HR data. Hence, \u00a0a<\/span>\u00a0user\u2019s overall profile is determined from the intersection of his or her structural or general authorization profiles.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1817 aligncenter\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_5300772e88adf.png\" alt=\"\" width=\"704\" height=\"340\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_5300772e88adf.png 1005w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_5300772e88adf-300x145.png 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_5300772e88adf-290x140.png 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/02\/img_5300772e88adf-150x72.png 150w\" sizes=\"(max-width: 704px) 100vw, 704px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Transaction code <strong>OOAC<\/strong>\u00a0(table T77S0) is used for switching on the Structural authorization main switch. Option AUTSW <strong>ORGPD<\/strong> can be set to <strong>1,2,34<\/strong>. Switching it to <strong>0<\/strong> deactivates it.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-decoration: underline;\">Table<strong> T77S0<\/strong> Main Switches<\/span>:<\/p>\n<p>AUTSW <strong>ORGIN<\/strong> (HR: Master Data) &#8211;\u00a0Authorization main switch that controls whether the P_ORGIN authorization object should be used in the authorization check.<\/p>\n<ul>\n<li>\u00a0To activate the authorization check &#8211; Set the switch to value 1<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"line-height: 1.5em;\">AUTSW <strong>ORGXX<\/strong> (HR: Master Data \u2013 Extended Check) &#8211;\u00a0Authorization main switch that controls whether the P_ORGXX authorization object should be used in the authorization check.<\/span><\/p>\n<ul>\n<li>\u00a0To activate the authorization check &#8211; Set the switch to value 1<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>AUTSW <strong>ADAYS<\/strong> (Tolerance Time for Authorization Check) &#8211;\u00a0Authorization main switch that is used to specify the tolerance time of the authorization check in the event of an organizational change.<br \/>\nThis Switch to used to set the duration (in terms of days) for which an administrator can access the data outside his or her own authorization in case of an organizational change.<br \/>\nAUTSW <strong>PERNR<\/strong> (HR: Master Data \u2013 Personnel Number Check) &#8211;\u00a0Authorization main switch that controls whether the P_PERNR authorization object should be used in the authorization check.<\/p>\n<ul>\n<li>In the standard system, this switch is set to 1. To deactivate the authorization checks on the personnel number assigned to a user, set the switch to 0.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"line-height: 1.5em;\">AUTSW <\/span><strong style=\"line-height: 1.5em;\">APPRO<\/strong><span style=\"line-height: 1.5em;\"> (HR: Test Procedures) &#8211;\u00a0Authorization main switch that controls whether test procedures should be used.<\/span><\/p>\n<p>Test procedures can be used if certain entries are to be checked centrally and should not be changeable after the check without further action.<\/p>\n<ul>\n<li>In the standard system, this switch is set to 0. To activate the test procedures, set the switch to 1.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>AUTSW <strong>ORGPD<\/strong> (HR: Structural Authorization Check) &#8211;\u00a0Authorization main switch that controls whether the organizational structure should also be included in the authorization check in Personnel administration.<span style=\"line-height: 1.5em;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Structural authorizations are used to restrict access to organizational structures. It controls access to data stored in time dependent structures like Org Structure, Qualification Catalog etc. Structural authorizations are used to restrict users to access a part of the organizational structure. \u00a0Combination of Standard&nbsp;<a class=\"read-more\" href=\"https:\/\/sapsecurityanalyst.com\/WP\/structural-authorization\/\">&hellip;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1813"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=1813"}],"version-history":[{"count":10,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1813\/revisions"}],"predecessor-version":[{"id":1825,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1813\/revisions\/1825"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=1813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}