{"id":679,"date":"2012-01-10T02:00:43","date_gmt":"2012-01-10T02:00:43","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=679"},"modified":"2016-03-24T14:37:37","modified_gmt":"2016-03-24T14:37:37","slug":"mass-user-to-role-assignment-using-secatt","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/mass-user-to-role-assignment-using-secatt\/","title":{"rendered":"Mass user to Role assignment using SECATT"},"content":{"rendered":"<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">We have already discussed how to create mass users using SECATT. This is one of those issues which Security Consultants always face during their day to day security activities.<br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> <!--more--><br \/>\nIn this section, we are going to discuss on How to do Mass user to Role assignment using SECATT.<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> It will not be a very tough task if all the users have to be assigned the same roles, which we can easily do using SU10 tcode.<\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<h2><!--more--><\/h2>\n<p>&nbsp;<\/p>\n<h2><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><span style=\"font-family: verdana; color: #0000ff;\">But what if mass users have to be assigned different roles?<\/span><\/h2>\n<p><!--more--><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\">We can use SECATT script for this purpose.<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nBut the main question is &#8211; Can we use SU01 tcode for this script? The answer is a BIG <strong>NO<\/strong>.<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nWe know that SECATT Scripts are screen dependent and it follows the same steps and inserts data at the same place where we insert during recording of the scripts. Hence, if we use SU01 for role assignment to users, SECATT will try to insert the role at the same position again and again and hence it will fail.<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nThen what is the solution?<\/span><br \/>\n<span style=\"color: #4c4c4c;\"> <strong><span style=\"font-family: verdana;\"><br \/>\n<\/span><\/strong><span style=\"font-family: verdana;\">The<\/span><strong><span style=\"font-family: verdana;\"> solution <\/span><\/strong><span style=\"font-family: verdana;\">is using<\/span><strong><span style=\"font-family: verdana;\"> SU10 tcode<\/span><\/strong><span style=\"font-family: verdana;\"> instead of SU<\/span><span style=\"font-family: verdana;\">01. <\/span><\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\"> Lets start with SECATT for mass user to role assignment task.<\/span><br \/>\n<\/span><!--more--><\/p>\n<h3><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/h3>\n<h3><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><span style=\"color: #0000ff;\"><span style=\"font-family: verdana;\">(1) <\/span><span style=\"font-family: verdana;\"><strong>Step 1<\/strong> &#8211; Recording the Tcode Execution<\/span><\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/h3>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">Lets name the script as <\/span><strong style=\"color: #4c4c4c; font-family: verdana;\">Z_MASS_USER_ROLE_ASSIGNMENT <\/strong><span style=\"color: #4c4c4c; font-family: verdana;\">and click create.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-script-name.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-683\" title=\"test script name\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-script-name.jpg\" alt=\"\" width=\"384\" height=\"174\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-script-name.jpg 384w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-script-name-300x135.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-script-name-290x131.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-script-name-150x67.jpg 150w\" sizes=\"(max-width: 384px) 100vw, 384px\" \/><\/a><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> Enter the title as &#8220;Mass User to Role Assignment&#8221;<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Enter Component as &#8220;BC-SEC-USR-ADM&#8221;<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Click Save<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Click Pattern as shown in the figure below<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"><!--more--><!--more--><\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/title.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-684\" title=\"title\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/title.jpg\" alt=\"\" width=\"429\" height=\"373\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/title.jpg 429w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/title-300x260.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/title-290x252.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/title-150x130.jpg 150w\" sizes=\"(max-width: 429px) 100vw, 429px\" \/><\/a><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">The system will then prompt &#8220;Create Object Directory Entry Box&#8221;. Select Local Object.<\/span><\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/local-object.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-685\" title=\"local object\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/local-object.jpg\" alt=\"\" width=\"457\" height=\"257\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/local-object.jpg 457w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/local-object-300x168.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/local-object-290x163.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/local-object-150x84.jpg 150w\" sizes=\"(max-width: 457px) 100vw, 457px\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"color: #4c4c4c;\"><span style=\"font-family: verdana;\"> Now in Insert Statement Dialog window, select <strong>UI Control<\/strong> for Group<\/span>.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Select <strong>TCD (Record) <\/strong>for Command.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"><span style=\"font-family: verdana;\">Select <strong>SU10 <\/strong>for Transaction. Press Enter. The Interface will get populated automatically with <strong>SU10_1.<\/strong><\/span><\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"><span style=\"font-family: verdana;\">Click Continue check mark.<\/span><\/span><\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/UI-Control.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-686\" title=\"UI Control\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/UI-Control.jpg\" alt=\"\" width=\"478\" height=\"173\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/UI-Control.jpg 478w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/UI-Control-300x108.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/UI-Control-290x104.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/UI-Control-150x54.jpg 150w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/><\/a><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">From this step onwards every step is recorded. So we need to be a little careful not to click any option which is not required.<\/span><\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nClicking the continue check mark takes to the User Maintenance (SU10) screen. Follow the steps for assigning a role to a user id and click Save.<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nLets take the example of a user &#8211; <strong>ZTEST<\/strong> and assign a role using SU10 as shown below:<br \/>\n<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> Execute tcode SU10. Gve user id ZTEST and click &#8220;change&#8221;<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">In the next screen, go to &#8220;Roles&#8221; tab. Select the &#8220;Add&#8221; radio button.<br \/>\n<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Add a role and role validity<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Click save<\/span><\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/add-role.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-693\" title=\"add role\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/add-role.jpg\" alt=\"\" width=\"394\" height=\"184\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/add-role.jpg 394w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/add-role-300x140.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/add-role-290x135.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/add-role-150x70.jpg 150w\" sizes=\"(max-width: 394px) 100vw, 394px\" \/><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> Once the user id to role assignment process is over and we have clicked the save button, its time to end the recording. To end the recording, click the <a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/back.jpg\"><span style=\"color: #4c4c4c;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-614\" title=\"back\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/back.jpg\" alt=\"\" width=\"24\" height=\"25\" \/><\/span><\/a>button in SU10 screen. You will be prompted with the &#8220;Recording Ended&#8221; dialog window. Click &#8220;Yes&#8221; as shown below:<\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/recording-ended.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-615\" title=\"recording ended\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/recording-ended.jpg\" alt=\"\" width=\"436\" height=\"100\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/recording-ended.jpg 436w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/recording-ended-300x68.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/recording-ended-290x66.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/recording-ended-150x34.jpg 150w\" sizes=\"(max-width: 436px) 100vw, 436px\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">In the next screen, Click Save to save the recorded test script.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-family: verdana; color: #0000ff;\">(2) <strong>Step 2 &#8211; <\/strong>Creating the Parameters<\/span><\/h3>\n<p><!--more--> <span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">As already discussed during the earlier discussion on SECATT, the next step after &#8220;Recording of tcode execution&#8221; is <strong>Creating the Parameters<\/strong>. Here, the <strong>VALINS<\/strong> (Values that were entered during the recording) are converted to Parameter Values. Lets see how this is done.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> Double click the interface value SU10_1.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">After we double click the above mentioned interface, we get &#8220;Command Interface&#8221; on the right side. In the command interface, there is an option <strong>DYNPRO MODE <a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/dynpro-mode.jpg\"><span style=\"color: #4c4c4c;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-618\" title=\"dynpro mode\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/dynpro-mode.jpg\" alt=\"\" width=\"150\" height=\"20\" \/><\/span><\/a>. <\/strong>Expand this Dynpro Mode by clicking on the arrow on its left.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">On expanding the dynpro mode, we get various sets of screens numbered [1], [2], [3] etc. Expand the 1st [1] set of screen.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"><span style=\"font-family: verdana;\">Double click on <strong>FIELD MODE <\/strong>(as shown in the figure below)<\/span><\/span><\/li>\n<\/ol>\n<div><\/div>\n<div><\/div>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/interface.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-694\" title=\"interface\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/interface.jpg\" alt=\"\" width=\"506\" height=\"258\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/interface.jpg 506w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/interface-300x152.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/interface-290x147.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/interface-150x76.jpg 150w\" sizes=\"(max-width: 506px) 100vw, 506px\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"><span style=\"font-family: verdana;\">On the right side of the screen, we get certain values for interface SU10_1. Double click on the value that was entered during user to role assignment. For example, we had used user id as ZTEST. Double click on the value (ZTEST here).<\/span><\/span><\/li>\n<\/ul>\n<div><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/div>\n<div><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/valin.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-695\" title=\"valin\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/valin.jpg\" alt=\"\" width=\"546\" height=\"249\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/valin.jpg 546w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/valin-300x136.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/valin-290x132.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/valin-150x68.jpg 150w\" sizes=\"(max-width: 546px) 100vw, 546px\" \/><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Double click the VALIN (ZTEST) until we get a blank area with VALIN as shown in the figure below:<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/ztest.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-624\" title=\"ztest\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/ztest.jpg\" alt=\"\" width=\"460\" height=\"176\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/ztest.jpg 460w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/ztest-300x114.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/ztest-290x110.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/ztest-150x57.jpg 150w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">Change &#8216;ZTEST&#8217; to <strong>ZUSERID<\/strong> and click Back button as shown below:<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/zuserid.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-626\" title=\"zuserid\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/zuserid.jpg\" alt=\"\" width=\"363\" height=\"176\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/zuserid.jpg 363w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/zuserid-300x145.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/zuserid-290x140.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/zuserid-150x72.jpg 150w\" sizes=\"(max-width: 363px) 100vw, 363px\" \/><\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">System will prompt with a <strong>Parameter Maintenance <\/strong>dialog window. Select Import and click Yes as shown below:<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/parameter-maintenance.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-627\" title=\"parameter maintenance\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/parameter-maintenance.jpg\" alt=\"\" width=\"485\" height=\"163\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/parameter-maintenance.jpg 485w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/parameter-maintenance-300x100.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/parameter-maintenance-290x97.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/parameter-maintenance-150x50.jpg 150w\" sizes=\"(max-width: 485px) 100vw, 485px\" \/><\/a><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Repeat the same steps for parameter creation for all the values that were entered during recording. Once all the parameters are created, click Save button.<\/span><\/span><\/p>\n<p><!--more--><!--more--><\/p>\n<h3><\/h3>\n<h3><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><span style=\"color: #0000ff;\"><span style=\"font-family: verdana;\">(3) <\/span><span style=\"font-family: verdana;\"><strong>STEP 3 &#8211; <\/strong><\/span><span style=\"font-family: verdana;\">Creating Test Configuration<\/span><\/span><span style=\"color: #0000ff; font-family: verdana;\"><strong><br \/>\n<\/strong><\/span><!--more--> <span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/h3>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> Enter Test Configuration Name and click create icon as shown below:<\/span><\/li>\n<\/ul>\n<div><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-696\" title=\"test config\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config1.jpg\" alt=\"\" width=\"481\" height=\"125\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config1.jpg 481w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config1-300x77.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config1-290x75.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config1-150x38.jpg 150w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> Enter Description of the Test Configuration (Here we have entered configuration as &#8220;Test Configuration for User to Role Assignment&#8221;)<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Enter Component as &#8220;BC-SEC-USR-ADM&#8221;. Click Save.<\/span><\/li>\n<\/ul>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config-title1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-698\" title=\"test config title\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config-title1.jpg\" alt=\"\" width=\"553\" height=\"359\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config-title1.jpg 553w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config-title1-300x194.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config-title1-290x188.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/test-config-title1-150x97.jpg 150w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> System will prompt with &#8220;Create Object Directory Entry&#8221; Dialog window. Click <strong>Local Object.<\/strong><\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Now select &#8220;<strong>Configuration<\/strong>&#8221; tab.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">In the &#8220;Test Script&#8221; text box, enter the Test script name that we had created in the <strong>Step 1. <\/strong>(We had created Test Script <strong>Z_MASS_USER_ROLE_ASSIGNMENT<\/strong>)<\/span><\/li>\n<\/ul>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/configuration1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-699\" title=\"configuration\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/configuration1.jpg\" alt=\"\" width=\"441\" height=\"246\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/configuration1.jpg 441w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/configuration1-300x167.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/configuration1-290x161.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/configuration1-150x83.jpg 150w\" sizes=\"(max-width: 441px) 100vw, 441px\" \/><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> Select <strong>Utilities -&gt; Settings<\/strong><\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Now select <strong>eCATT <\/strong>tab and then <strong>External <\/strong>tab<br \/>\n<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Also set the path for <strong>eCATT Objects, Variants<\/strong> and <strong>WebDynpro<\/strong>. We have set the path to Desktop as shown in the figure below:<\/span><\/li>\n<\/ul>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/external-path.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-640\" title=\"external path\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/external-path.jpg\" alt=\"\" width=\"534\" height=\"224\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/external-path.jpg 534w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/external-path-300x125.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/external-path-290x121.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/external-path-150x62.jpg 150w\" sizes=\"(max-width: 534px) 100vw, 534px\" \/><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> Click Continue check mark<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Now download variants using &#8220;Download Variants&#8221; button as shown below:<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/var-download.jpg\"><br \/>\n<\/a><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/var-download1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-700\" title=\"var download\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/var-download1.jpg\" alt=\"\" width=\"381\" height=\"161\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/var-download1.jpg 381w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/var-download1-300x126.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/var-download1-290x122.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/var-download1-150x63.jpg 150w\" sizes=\"(max-width: 381px) 100vw, 381px\" \/><\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\"> By default it will be downloaded to Desktop as we had set the path for variant download as Desktop in our previous step.<\/span><\/li>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">The system will prompt with &#8220;Download Variant Data&#8221; dialog box. Click Yes:<\/span><\/li>\n<\/ul>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/prompt1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-643\" title=\"prompt1\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/prompt1.jpg\" alt=\"\" width=\"520\" height=\"121\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/prompt1.jpg 520w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/prompt1-300x69.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/prompt1-290x67.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/prompt1-150x34.jpg 150w\" sizes=\"(max-width: 520px) 100vw, 520px\" \/><br \/>\n<\/a><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><span style=\"color: #0000ff;\"><span style=\"font-family: verdana;\">(4) <\/span><span style=\"font-family: verdana;\"><strong>Step 4 &#8211; <\/strong>Updating and Uploading the Variant file<\/span><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--> <\/span> <span style=\"color: #4c4c4c; font-family: verdana;\">The variant file (<strong>VAR_ECTC_Z_MASS_USER_ROLE_ASSIGNMENT.TXT<\/strong>) gets downloaded to the desktop.<\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\">The file is in .txt format. The values present in this file should not be modified. For mass users to role assignment, we need to update this file with the list of users and roles which need to be assigned. The best way to do that is to open this file in .xls format as already discussed earlier (right click on the file and <strong>open with<\/strong> Microsoft excel).<\/span><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nNow update this file with the list of mass roles which need to be assigned to mass users.<br \/>\n<\/span><\/p>\n<p><span style=\"color: #4c4c4c; font-family: verdana;\"><br \/>\nSave the file and make sure that we use it in .txt format in SAP since the script reads .txt format. <\/span><\/p>\n<ul>\n<li><span style=\"color: #4c4c4c; font-family: verdana;\">Click Variants tab and select External Variants\/Path. Select the Variant file and click execute.<\/span><\/li>\n<\/ul>\n<div><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<\/span><\/div>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/exe-variant1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-703\" title=\"exe variant\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/exe-variant1.jpg\" alt=\"\" width=\"558\" height=\"234\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/exe-variant1.jpg 558w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/exe-variant1-300x125.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/exe-variant1-290x121.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/exe-variant1-150x62.jpg 150w\" sizes=\"(max-width: 558px) 100vw, 558px\" \/><\/a><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\n\/\/ < ![CDATA[ google_ad_client = \"ca-pub-1241348474673689\"; \/* All content above *\/ google_ad_slot = \"3293572617\"; google_ad_width = 468; google_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\/\/ < ![CDATA[\n\/\/ < ![CDATA[\n\/\/ ]]><\/script><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Make sure that the variant file is not open while execution. When system prompts to save the configuration, save it.<\/span><\/span><\/p>\n<p><!--more--><\/p>\n<h3><strong><span style=\"color: #0000ff; font-family: verdana;\">Execute the File. Mass users to Role Assignment process starts and ends with a log file.<\/span><\/strong><\/h3>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2012\/01\/log.jpg\"><br \/>\n<\/a><span style=\"color: #ff0000;\"><span style=\"text-decoration: underline;\">Please \u00a0Note<\/span> : Due to Technical changes into SU01\/SU10,\u00a0SECATT\u00a0no longer works for SU01\/SU10 post Netweaver Release 7.3. Please refer to <span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/websmp230.sap-ag.de\/sap(bD1lbiZjPTAwMQ==)\/bc\/bsp\/sno\/ui_entry\/entry.htm?param=69765F6D6F64653D3030312669765F7361706E6F7465735F6E756D6265723D3138363430363226\">SAP Note 1864062<\/a><\/strong><\/span> for more details.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/679"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=679"}],"version-history":[{"count":26,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/679\/revisions"}],"predecessor-version":[{"id":2171,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/679\/revisions\/2171"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}