{"id":1915,"date":"2014-08-18T02:28:50","date_gmt":"2014-08-18T02:28:50","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=1915"},"modified":"2015-05-03T08:08:07","modified_gmt":"2015-05-03T08:08:07","slug":"evaluation-path","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/evaluation-path\/","title":{"rendered":"Evaluation Path"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Structural authorization profiles use various\u00a0components &#8211; <em>Organizational Management, Personnel Development <\/em>and<em> Training<\/em> <em>and<\/em> <em>Event Management<\/em> to build hierarchies using different types of objects (object types) and different types of relationships. Central elements of this data model used to manage the authorizations for this model effectively\u00a0are\u00a0: objects, relationships and evaluation paths.\u00a0<span style=\"color: #303030;\">An evaluation path describes a relationship chain that exists in a hierarchical structure between the objects. <\/span><\/p>\n<p><span style=\"color: #303030;\">Creation and maintenance of evaluation paths are done via transaction code <strong>OOAW<\/strong>. The path evaluates all objects in the hierarchical structure and tcode <strong>PPST<\/strong> can be used to view the hierarchical report showing all the evaluated objects.<\/span> The evaluation path O-S-P, for example, describes the relationship chain : organizational unit (O) \u2013 position (S) \u2013 person (P) Organizational structure objects:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Organizational Unit (O)<\/li>\n<li>Position (S)<\/li>\n<li>Persons (P)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong><span style=\"text-decoration: underline;\">Mapping an Organizational Structure<\/span><\/strong>:<\/p>\n<p id=\"RTajTvc\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1927\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/08\/img_53f166d3c9af4.png\" alt=\"\" width=\"450\" height=\"392\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/08\/img_53f166d3c9af4.png 701w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/08\/img_53f166d3c9af4-300x261.png 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/08\/img_53f166d3c9af4-290x252.png 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/08\/img_53f166d3c9af4-150x130.png 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #303030;\">A : Bottom up<\/span> B : Top Down The convention A = bottom up and B = top\u00a0down can be taken into account when a relationship between various objects is defined. However, this convention is not a mandatory rule. A combination of start object and evaluation path returns a specific number of objects from an existing hierarchical org structure. This exact combination, or the objects returned by this combination, represents a user&#8217;s structural profile. As we know that organizational structure in an organization may change based on the requirements. Hence, the specific objects and the number of objects which are returned by a structural profile also changes as the organizational structure (under the start object) changes.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Structural authorization profiles use various\u00a0components &#8211; Organizational Management, Personnel Development and Training and Event Management to build hierarchies using different types of objects (object types) and different types of relationships. Central elements of this data model used to manage the authorizations for this model&nbsp;<a class=\"read-more\" href=\"https:\/\/sapsecurityanalyst.com\/WP\/evaluation-path\/\">&hellip;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1915"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=1915"}],"version-history":[{"count":8,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1915\/revisions"}],"predecessor-version":[{"id":1929,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1915\/revisions\/1929"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=1915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}