{"id":472,"date":"2011-10-29T16:00:12","date_gmt":"2011-10-29T16:00:12","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=472"},"modified":"2021-06-28T05:15:42","modified_gmt":"2021-06-28T05:15:42","slug":"roles","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/roles\/","title":{"rendered":"Roles"},"content":{"rendered":"<p><!--more--><br \/>\n<span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\">In this post we have discussed about concepts of SAP Roles and Profiles.\u00a0As we discussed earlier, roles are like containers which contain authorization objects, tcodes etc. Roles are created via PFCG tcode and when roles are generated, we get authorization profiles.<\/span><br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c;\"><!--more--><br \/>\nThese roles are added to users via SU01 tcode or PFCG tcode. When they get added with a proper validity period, the authorization profiles get assigned to users. These authorization profiles provide the necessary authorization.<br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c;\"><!--more--><br \/>\nBelow screenshot shows user to role assignment options via SU01 and PFCG tcodes respectively:<br \/>\n<\/span><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/su01_role.jpg\"><!--more--><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-477\" title=\"su01_role\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/su01_role.jpg\" alt=\"\" width=\"576\" height=\"399\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/su01_role.jpg 576w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/su01_role-300x207.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/su01_role-290x200.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/su01_role-150x103.jpg 150w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #0000ff;\"><br \/>\n<span style=\"text-decoration: underline; color: #4c4c4c;\">Let us create a role using PFCG:<\/span><\/span><br \/>\n<span style=\"color: #4c4c4c;\"><!--more--><br \/>\nLet us name the role as ZTEST123 (As a good practice, we should always use names which begin with Y or Z while creating any role). Click on &#8220;Single Role&#8221; button to create a single role (We will discuss about various role types later).\u00a0Let the role description be &#8220;Test role&#8221;.<br \/>\n<\/span><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> In the next screen, we see various tabs: Description, Menu, Authorization, User etc.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #4c4c4c;\">In the Description Tab, on the right side there is a text box labelled as &#8220;Derive from Role&#8221;. This text box comes into picture when the role being created is a derived role of some master role. We will discuss about this in details when we go through various role types.<\/span><br \/>\n<!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> At the bottom of the description tab, there is a &#8220;Long Text&#8221; field. This field is not a mandatory field, but we should use this to maintain information related to role creation tickets and role updation reasons etc. This will be helpful for audit purpose.<br \/>\n<\/span><!--more--><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/description.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-481\" title=\"description\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/description.jpg\" alt=\"\" width=\"582\" height=\"370\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/description.jpg 582w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/description-300x190.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/description-290x184.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/description-150x95.jpg 150w\" sizes=\"auto, (max-width: 582px) 100vw, 582px\" \/><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #0000ff;\"><br \/>\n<span style=\"color: #4c4c4c;\">The next tab is &#8220;<strong>Menu<\/strong>&#8221; Tab.<\/span><br \/>\n<\/span><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> In this tab, we get the option to assign tcodes to roles. Apart from tcodes, we can also add reports, queries, URLs etc.<br \/>\n<\/span><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> Let us add tcodes-su56, su01, va03, su56 to the role.<br \/>\n<\/span><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> To do this, click on &#8220;Transaction&#8221; button in the Menu Tab and add the tcodes in the &#8220;Assign Transactions&#8221; dialog window.<br \/>\n<\/span><!--more--><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/menu.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-483\" title=\"menu\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/menu.jpg\" alt=\"\" width=\"402\" height=\"289\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/menu.jpg 402w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/menu-300x215.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/menu-290x208.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/menu-150x107.jpg 150w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/><!--more--><\/a><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/menu.jpg\"><br \/>\n<\/a><\/p>\n<p><span style=\"color: #4c4c4c;\">Next we come to the next tab-&#8220;Authorizations&#8221;. It is from this tab that gives the option to maintain authorizations and generate profile.<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #4c4c4c;\">In the &#8220;Authorizations&#8221; tab screen, we find options to maintain &#8220;Profile Name&#8221; and &#8220;Maintain Authorization Data and Maintain Profiles&#8221;. See below figure:<\/span><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorizations_tab.jpg\"><!--more--><\/a><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorizations_tab.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-485\" title=\"authorizations_tab\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorizations_tab.jpg\" alt=\"\" width=\"543\" height=\"447\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorizations_tab.jpg 543w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorizations_tab-300x246.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorizations_tab-290x238.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorizations_tab-150x123.jpg 150w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">In the label &#8220;Profile Name&#8221; we can give our own profile name (as I have given ztest123) or we can leave it blank. In case we leave it blank, the system will automatically create a profile name with naming convention &#8220;<span style=\"color: #0000ff;\">T-&lt;First and Last character of SID&gt;xxxxxx<\/span>&#8220;<\/span><br \/>\n<span style=\"color: #4c4c4c;\"><!--more--><br \/>\nNext we need to maintain authorization data and generate profile. For this we can either click on either &#8220;Change Authorization Data&#8221; or &#8220;Expert Mode for Profile Generation&#8221;.<\/span><br \/>\n<span style=\"color: #4c4c4c;\"><!--more--><br \/>\nNote: Expert Mode is mandatory when a SU24 change is made. We will discuss about Expert mode in details when we discuss SU24 later.<\/span><br \/>\n<span style=\"color: #0000ff;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> After we get in the next screen-to maintain authorization data, click on <strong>Utilities-&gt;Technical names on<\/strong><\/span><br \/>\n<\/span><!--more--><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/utilities.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-487\" title=\"utilities\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/utilities.jpg\" alt=\"\" width=\"487\" height=\"284\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/utilities.jpg 487w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/utilities-300x174.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/utilities-290x169.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/utilities-150x87.jpg 150w\" sizes=\"auto, (max-width: 487px) 100vw, 487px\" \/><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #0000ff;\"><br \/>\n<span style=\"color: #4c4c4c;\">This option helps us to see the technical names of authorization objects and authorization classes.<\/span><br \/>\n<\/span><!--more--><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorization.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-489\" title=\"authorization\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorization.jpg\" alt=\"\" width=\"859\" height=\"272\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorization.jpg 859w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorization-300x94.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorization-290x91.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorization-150x47.jpg 150w\" sizes=\"auto, (max-width: 859px) 100vw, 859px\" \/><!--more--><\/a><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/10\/authorization.jpg\"><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\">In the above screen we maintain authorization for roles. After the authorizations are maintained, we generate the profile using &#8220;Generate&#8221; button at the top or by pressing &#8220;Shift+F5&#8221;.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><!--more--><\/span><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><\/p>\n<p>&nbsp;<\/p>\n<h3><em><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/?page_id=524\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #e63518;\">Our Next Post is on Authority-Check statements. <\/span><\/a><\/em><\/h3>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-472","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=472"}],"version-history":[{"count":23,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/472\/revisions"}],"predecessor-version":[{"id":2578,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/472\/revisions\/2578"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}