{"id":592,"date":"2011-12-31T02:10:03","date_gmt":"2011-12-31T02:10:03","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=592"},"modified":"2015-05-03T08:10:43","modified_gmt":"2015-05-03T08:10:43","slug":"secatt","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/secatt\/","title":{"rendered":"SECATT"},"content":{"rendered":"<p style=\"text-align: center;\"><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">In this section we will discuss about <strong>SECATT<\/strong> &#8211; how it can be used for performing mass tasks and hence how it helps in saving a lot of manual effort.<\/span><br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nBut before SECATT can be applied, it is necessary to check and confirm if the client settings in SCC4 allows for executing this transaction.<br \/>\n<\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">This can be checked in tcode SCC4 as shown in the below screen<\/span><br \/>\n<\/span><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/scc4-settings.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-595\" title=\"scc4 settings\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/scc4-settings.jpg\" alt=\"\" width=\"433\" height=\"72\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/scc4-settings.jpg 481w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/scc4-settings-300x49.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/scc4-settings-290x48.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/scc4-settings-150x24.jpg 150w\" sizes=\"(max-width: 433px) 100vw, 433px\" \/><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">There are four processes which need to be followed for successful execution of SECATT:<\/span><\/span><\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><span style=\"color: #0000ff;\"> (1) <strong><span style=\"text-decoration: underline;\">Step 1<\/span> &#8211; <\/strong>Recording the tcode execution<\/span><br \/>\n<\/span><!--more--><\/h3>\n<p style=\"text-align: center;\"><span style=\"color: #4c4c4c; font-family: verdana;\">For this we use the option &#8220;Test Script&#8221; option in SECATT tcode as shown in the figure below:<\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-601\" title=\"process1\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process1.jpg\" alt=\"\" width=\"407\" height=\"220\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process1.jpg 407w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process1-300x162.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process1-290x156.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process1-150x81.jpg 150w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/a><\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Here we execute the necessary tcode for which we are creating the SECATT script and record the steps which are required for successful execution of the tcode. It is important to note that we should be very careful while executing this process and only those steps should be followed which are necessary. Any mistake can result in wrong recording of the script which may lead to failure of SECATT task which we want to complete.<\/span><br \/>\n<\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<h3><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n(2) <strong><span style=\"text-decoration: underline;\">Step 2<\/span> &#8211; <\/strong>Creating the Parameters<br \/>\n<\/span><!--more--><\/h3>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">During the execution of <strong>Step 1<\/strong>, we would have entered certain values for the tcode (e.g. for creation of users through SU01 we would have entered user id, password etc). These values are called<strong> VALINS.<\/strong> These need to be changed to <strong>Parameter Values <\/strong>during this step (<strong>Step 2<\/strong>). We will see how this is done when we start performing the SECATT activity in our later sections where we will show how to create SECATT scripts for various mass tasks.<\/span><strong><br \/>\n<\/strong><br \/>\n<\/span><\/p>\n<h3><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n(3) <strong><span style=\"text-decoration: underline;\">Step 3<\/span> &#8211; <\/strong>Creating Test Configuration<br \/>\n<\/span><!--more--><\/h3>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">Once Test Script has been created and VALINS have been defined, we need to create &#8220;Test Configuration&#8221;. The option &#8220;Test Configuration&#8221; is used for this as shown in the figure below:<\/span><\/p>\n<h3><span style=\"color: #0000ff; font-family: verdana;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-603\" title=\"process3\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process3.jpg\" alt=\"\" width=\"401\" height=\"236\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process3.jpg 401w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process3-300x176.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process3-290x170.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/process3-150x88.jpg 150w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/><\/a><\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><span style=\"color: #0000ff;\"><span style=\"font-family: verdana;\">(4) <\/span><span style=\"font-family: verdana;\"><strong><span style=\"text-decoration: underline;\">Step 4<\/span> &#8211; <\/strong><\/span><span style=\"font-family: verdana;\">Updating and Uploading the Variant file<\/span><\/span><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><!--more--><\/h3>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">Once the Test Configuration is over, a variant file gets created. This file needs to be saved and updated with the new values for the mass creation purpose (e.g. for mass creation of users, this file needs to be updated with list of new user ids, passwords etc.) Once the file is ready, it can be used to perform the mass task. <\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nThis discussion was just to give an overview of the steps which we need to perform while executing SECATT. We will see how these are actually performed in our next sections where we will go through various SECATT related activities.<\/span><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\n\n\/\/ ]]><\/script><br \/>\n<!--more--><\/p>\n<h3><span style=\"color: #e63518;\">You may want to see <a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/mass-user-creation\" target=\"_blank\"><span style=\"color: #e63518;\"><em><span style=\"text-decoration: underline;\">Mass User creation using SECATT<\/span><\/em><\/span><\/a><\/span><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>In this section we will discuss about SECATT &#8211; how it can be used for performing mass tasks and hence how it helps in saving a lot of manual effort. But before SECATT can be applied, it is necessary to check and confirm if the&nbsp;<a class=\"read-more\" href=\"https:\/\/sapsecurityanalyst.com\/WP\/secatt\/\">&hellip;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/592"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=592"}],"version-history":[{"count":22,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/592\/revisions"}],"predecessor-version":[{"id":2115,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/592\/revisions\/2115"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}