{"id":276,"date":"2011-08-20T08:10:15","date_gmt":"2011-08-20T08:10:15","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=276"},"modified":"2015-05-03T09:06:54","modified_gmt":"2015-05-03T09:06:54","slug":"authorization","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/authorization\/","title":{"rendered":"SAP Security Authorization Concepts"},"content":{"rendered":"<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">This post deals with SAP Authorization concepts. Authorization decides what tasks a user can perform. It is here that the system checks as to what the user is &#8220;authorized&#8221; to do.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">SAP Authorization concepts of R\/3 Security is based on roles and authorization profiles which give access to users to perform their tasks. It means that users can perform those tasks whose authorizations have been given to them via the roles assigned to them. User Master Record of a user defines the authorizations assigned to a user.<\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #0000ff;\"><strong>User Master Record<\/strong><\/span> of a user defines the authorizations assigned to a user.<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">User Master Record contains the information related to user e.g. user id, authorization profile etc. User details can be accessed\/created\/managed using the transaction <span style=\"color: #0000ff;\"><strong>SU01<\/strong><\/span>. It is the responsibility of User Administrator\/SAP System Administrator to maintain user master records of users.<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nTransaction <span style=\"color: #0000ff;\"><strong>SU01D<\/strong><\/span>\u00a0is <span style=\"color: #0000ff;\"><strong>Display only<\/strong><\/span> transaction for user details.<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">Transaction code <span style=\"color: #0000ff;\"><strong>PFCG<\/strong> (<strong>Profile Generator<\/strong>)<\/span> is used to create roles. Roles can either be assigned to users via User Tab in PFCG or Roles tab in <span style=\"color: #0000ff;\"><strong>SU01<\/strong><\/span> tcode.<\/span><\/p>\n<p><!--more--><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><\/p>\n<p>&nbsp;<\/p>\n<h3><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/elements-in-sap-authorization\" target=\"_blank\"><span style=\"color: #e63518;\">You may want to have a look at <em>Elements in SAP Authorization<\/em><\/span><\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/276"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=276"}],"version-history":[{"count":30,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/276\/revisions"}],"predecessor-version":[{"id":2132,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/276\/revisions\/2132"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}