{"id":208,"date":"2011-08-11T10:54:34","date_gmt":"2011-08-11T10:54:34","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=208"},"modified":"2015-05-03T05:27:08","modified_gmt":"2015-05-03T05:27:08","slug":"hr-security-tcodes","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/hr-security-tcodes\/","title":{"rendered":"HR Security Transaction codes"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">This post contains a list of the important SAP HR Security transaction codes which SAP Security consultants need for their routine jobs.<\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\">Important HR Security Transaction Codes<\/span><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<table class=\"easy-table-creator tablesorter\" style=\"width: 100%;\">\n<thead>\n<tr>\n<th>\n<h2><span style=\"color: #4c4c4c;\">Sl No.<\/span><\/h2>\n<\/th>\n<th>\n<h2><span style=\"color: #4c4c4c;\">Transaction code<\/span><\/h2>\n<\/th>\n<th>\n<h2><span style=\"color: #4c4c4c;\">Description<\/span><\/h2>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">1<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0OOSP<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Define PD Profile<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">2<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0OOSB<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Direct assignment of PD Profile to User<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">3<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0OOAW<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Define Evaluation Paths<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">4<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0OOAC<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0HR: Authorization Main Switch<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">5<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0PP01<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Maintain PD Data<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">6<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0PPST<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Structure Evaluation<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">7<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0PPOC<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Create Organizational unit<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">8<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0PPOS<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Display Organizational Plan<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">9<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0PA20<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Display HR Master Data<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">10<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0PA30<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Maintain HR Master Data<\/span><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h3><span style=\"color: #4c4c4c;\">11<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0PO13<\/span><\/h3>\n<\/td>\n<td>\n<h3><span style=\"color: #4c4c4c;\">\u00a0Maintain Positions<\/span><\/h3>\n<\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<td><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/td>\n<td><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/td>\n<td><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tfoot>\n<\/table>\n<p><span style=\"color: #4c4c4c;\">\u00a0<\/span><\/p>\n<p><!--more--><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><br \/>\n<!--more--><\/p>\n<h3><span style=\"color: #e63518;\">Next &#8211; <a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/hr-security-authorization-objects\" target=\"_blank\"><span style=\"color: #e63518;\"><em><span style=\"text-decoration: underline;\">Important SAP HR Security Authorization objects<\/span><\/em><\/span><\/a><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/208"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=208"}],"version-history":[{"count":17,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/208\/revisions"}],"predecessor-version":[{"id":2108,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/208\/revisions\/2108"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}