SAP Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

SAP: SID, Client, Instance

SID: System Identifier

3 letters

AAA -- HPE, HDE, HQE

AAN --- HP1, HQ1, HD1

NNA --- 11D, 11Q, 11P

ANA --- H1D, H1Q, H1P

DEV QAS PRD

IT users IT users IT users

Business/End users Business/End users

FUT: Functional unit/user testing (Developers/functional team)

QAT: Quality acceptance testing (Functional people from Business)

UAT: User acceptance testing (Business/End users)

ECC – DEV, QAS, PRD

HR – DE1, QE1, PE1

GRC- GD1, GQ1, GP1

Client: 000, 001, 066, 030, 060

000 – Standard/Golden Client – SAP standard data.

001 – Copy of Golden Client

066 – Early Watch

030 – Standard data + customize data


ECC 6.0 EHP 4-- current ECC version 2030

GRC

BI

S4 HANA

SOLMAN

HANA STUDIO

SOLMAN
HR
CRM, SRM, IBP, IDM….

S4 HANA 2.0

ECC:
Versions of SAP
 4.6 C
 4.7 EE
 ECC 5.0 - Enterprise core/central component.
 ECC 6.0 EHP 1, EHP 2,3,4,5,6,7,8…
Flavours in SAP:

SAP Flavours
 IDES -- Training System (000, 001, 066, 800)
 Non IDES -- Real time system (000, 001, 066, 100)
Projects:
 Implementation
 Support
 Upgrade
 Roll out
 Migration

Default users in SAP (Standard users in SAP)


 SAP*
 DDIC
 EARLYWATCH

USER 000 001 066


SAP* YES YES YES
DDIC YES YES NO
EARLYWATCH NO NO YES

 SAP* ---- 06071992


 DDIC ---- 19920706
 EARLYWATCH --- support
 SAP* ----- pass (other than 3 default clients (000, 001, 066))

Powerful Profiles:
 SAP_ALL
 SAP_NEW
 S_A.DEVELOP
 S_A.CUSTOMIZ
 S_A.SYSTEM
SAP ECC 6.0 EHP7 -- EHP 8
Instance: 00 to 99

HPE 030 00 + HPE 030 01 + HPE 030 + 02

T-code: will give permissions to perform an activity in SAP system


T-codes are minimum 4 letters maximum 10 mostly 4 letters.

 T-codes
 Tables
 Reports

SU01: User Administration


USER CREATION
USER CHANGE
USER DELETION
LOCK/UNOCK
PASSWORD RESET
COPY USER
User Types:
 Dialog: All human users are called as Dialog users.
Password policy & License applicable
GUI Login possible.
Multiple logins possible.

 Service : FFID’s are Service users


Password policy & License are not applicable
GUI Login possible. Multiple logins not possible.

 System: for RFC connections, Background jobs and system


workflows.
Password policy & License are not applicable
GUI Login not possible. Communicate b/w SAP to SAP

 Communication: for RFC connections, Background jobs and


system workflows.
Password policy & License are not applicable
GUI Login not possible. Communicate b/w SAP to SAP, SAP
to Non SAP.

 Reference: To provide additional access to profile exceeded


user.
Password policy & License are not applicable
GUI Login not possible.
RFC : Remote function call
SAP System RFC SAP COMM RFC NON SAP (JAVA)

S4HCLNT800--------- ABCCLNT800 -------- JAVCLNT123

SNC: Enable SSO to user.


SSO: Single Sign On

Security roles & Responsibilities:


User Administration
Role Administration
Troubleshooting authorization issues
Reports extraction based on the client requirement
Audit support
Day to Day tickets support

/n to open new session with closing existing screen


/o open new session without closing the current session
/nex exit from the sap

SU01: User Administration


SU01D: Display user
SU0,SU1,SU2,SU3….End user t-codes
SUGR: To create user groups in SAP
SU10 : Mass User Administration
SUIM : System Information
SE16 : Table browser/ Data browser
SU53: Last missing authorization check

TABLES: Data Browser in SAP – SE16/SE16N


User Admin Tables:
USR02: User Last logon data info
USR03: User address data info
USR04: User Profile info
USR05: User parameter info
USGRP: list of user groups in system
USGRP_USER: Users vs user groups
USR06: User license data
USR21 & ADR6: user mail address
TSTC: List of all the t-codes in the system
TACT: List of all the activities in the system.

UFLAG (Lock Status) values in SAP:


0: User not locked
64: Admin Lock
128: Incorrect logons lock
192: Incorrect + admin lock

USR40: Illegal Passwords


SM30: To modify the table.
SM04: List of all the active users in the current server/instance.
AL08: List of all the active users in all the servers/instances.

Role Administration: PFCG


 Role Creation
 Role modification
 Role Deletion
Role Types:
 Single Role -- > Y or Z---> ZS:
 Composite Role ZC: Contains single roles.
 Master/Derived Role ZM/ZD:

Authentication: Gives permissions to Login.


Authorization: Gives Permission to perform an activity.
Single Role: Contains T-codes, authorization Objects, fields &
Values.
Composite Role:
 Contains Single & Derived Roles.
 Doesn’t have any authorizations & Profiles.
 We can’t add Comp role to comp role.
 We should not add Master role to Comp role.
Master/Derived: We use this Master role for same job function
but different job locations.
 We should not assign master role to user.
 We should only assign Derived role to user.
Single Role concept:-
ZS_LEN_MGR_HYD – VA01, GS01, HYD
ZS_LEN_MGR_BAN – VA01, GS01, BAN
ZS_LEN_MGR_KOL – VA01, GS01, KOL
ZS_LEN_MGR_MUM – VA01, GS01, MUM
ZS_LEN_MGR_CHN – VA01, GS01, CHN
Master role: T-codes, authorization objects, fields & Values.
Derived role: T-codes, authorization objects, fields & Values
and we maintain Org values.
ZM_LEN_MGR_ALL – VA01, GS01, GST1
ZD_LEN_MGR_HYD01 – VA01, GS01, GST1, 01
ZD_LEN_MGR_HYD02 – VA01, GS01, GST1, 02
ZD_LEN_MGR_BAN – VA01, GS01, GST1, 03
ZD_LEN_MGR_KOL – VA01, GS01, GST1
ZD_LEN_MGR_MUM – VA01, GS01, GST1
ZD_LEN_MGR_CHN – VA01, GS01, GST1
Lenovo store: Manager, Ass manager

SAP Hierarchy:
System
Client
User
Role
Profile
Object Class
Authorization Object Authorization Hierarchy
Fields
Values

SU24:
Role MENU:
System will check objects assigned to t-code
Add t-code SE16 in role Menu.
like below

Authorization tab in role: Objects


pulled from SU24 which are
maintained as YES S_TABU_DIS - YES
S_TABU_DIS S_TABU_NAM - YES
S_TABU_NAM S_TABU_LIN - NO
SU56: Reset user buffer

SU01 User Buffer DATABAS


PFCG, SU01 , PFCG SU01
PFCG, SU10, SUGR

Authorization concept:
Authorization Object: are control user activities.

Activities:
01-Create
02-Change
03-Display
04-Print
05-Lock/Unlock
06-Delete
16- Execute
22- Enter, Include, Assign
78 – Assign.
S_USER_GRP S_USER_AGR S_USER_PRO

User creation Role Creation Profile related tasks

Role change : S_USER_AGR ACTVT: 02


Profile assign : S_USER_PRO ACTVT: 22, 78
User Delete : S_USER_GRP ACTVT:06
USER ROLE assign: S_USER_AGR ACVT: 22,

Create a user admin role with only lock/unlock and password


reset. Z_USER_ADMIN_RES
SU01
Traffic Signals in PFCG:
MENU Tab:
GREEN: T-codes are added
RED : T-codes not added

Authorizations Tab:
GREEN: Profiles generated
YELLOW: Profiles partially maintained
RED: Profiles not generated

USER Tab:
GREEN: Users assigned to role
YELLOW: User comparison required
RED: Users not assigned

Inside the Authorization Tab:


GREEN: Values are maintained
YELLOW: Values not maintained
RED: Org values not maintained
Authorization Status:
 Standard
 Maintained
 Changed
 Manually

Standard: Fields & Values Are Proposed By SAP


Maintained: Fields Proposed By SAP
Values Maintained By User
Changed: Fields & Values Proposed By SAP
Values Changed By User
Manually: Fields & Values Are Proposed By User

Tables related to Role Admin:


AGR_USERS: Role vs Users
AGR_TCODES: Role vs t-codes
AGR_AGRS: Single role v composite role
AGR_DEFINE: Master role vs Derived role
AGR_1251: Role vs Authorization Objects & Values
AGR_1252: Role vs Org values
AGR_PROF: Role VS Profiles
Reports: SA38: To execute reports
SE38: To View & edit the report.
 RSUSR200
 RSUSR003
 RSUSR405
 RSAUDITC
SU22, SU24, SU25
Troubleshooting Authorization Issues: SU53, ST01,
STAUTHTRACE:
TABLE Security:
Transport concept:
Real time process for user admin & role admin.

TOBJ: stores authorization objects. (Table)


TOBC: stores objects class. (Table)
SU21: To see all the authorization objects.

Imp authorization objects:


S_TCODE
S_USER_AUT
S_USER_GRP
S_USER_AGR
S_USER_SYS
S_USER_PRO
S_GUI: It will give download & upload access in SAP
S_RFC: RFC authorizations
S_DEVELOP
S_PROGRAM
ABAP team need developer key access
Code Build: Developer key access.
Standard object change: Object key access.
DEVACCESS: stores all developer keys
ADIRACESS: Stores all Objects keys.

SU25: To copy SU22 data to SU24 & Upgrade activities


SU22: Standard authorization data
USOBX: T-codes, authorization objects.
USOBT: T-codes, authorization objects, fields & Values.
SU24: Standard authorization + Custom Authorization data.
SU22 SU24
USOBX USOBX_C
USOBT SU25 USOBT_C

USOBX_C: T-codes, authorization objects.


USOBT_C: T-codes, authorization objects, fields & Values.
Check Indicators:
 Check
 Do not check
Check Proposals:
 Yes
 Yes without values
 No
 New/unmaintained

Expert Mode:
 Delete & recreate profile & authorization.
 Edit old status
 Read old status & merge with new data

PFCGMASVAL: Mass role changes


SUPC: Mass role generation
PFUD: Mass user Comparison & delete invalid assignments
EWZ5: Mass lock/unlock users.

Troubleshooting Authorization Issues: SU53, ST01,


STAUTHTRACE:

SU53: Last missing authorization check


ST01: authorization trace for Users (Missing & Successful)
STAUTHTRACE: System wide trace for User (Missing &
Successful)
RC values in Trace:
 RC=0 : Authorization Successful
 RC=4 : Object available with different values
 RC=12: Object itself is missing

Table Security: TDDAT, DD02L, SE54


 S_TABU_DIS: To restrict table access to user at Auth group
level.
 S_TABU_NAM: To restrict table access to user at table
level.
 S_TABU_LIN: To restrict table access at line level
 S_TABU_CLI: To restrict table access at Client level.
Z_TABLE – Auth Group : USR02, AGR_AGRS, TSTC, RSECVAL
SC, SA Z_TABLE

USR01, TSTC ZUSR01


USR02 ZTSTC

&NC&: Stores the tables which are not part of any authorization
group
Background Jobs:
SM36: To schedule Background Job
SM37: To monitor Background Job

PFCG_TIME_DEPENDENCY:
 MASS user comparison
 Remove invalid role assignments
PRGN_COMPRESS_TIMES:
 It removes all expired roles
 Compress the roles validity

Dialog
BACKGROUND
ENQUEUE
SPOOL
Update

DD D DD D B B B U S E

Transport: To Move changes from one system to another system.


SE01, SE09, SE10.
Workbench: Standard sap data changes. Exp: SU24 changes,
Table modifications.
Customize: Stores customize data. Exp: roles
DEV QAS PRD
Z_SEC_01 su01 Z_SEC_01 su01 Z_SEC_01 su01
ZC_SEC_01 del delete delete
GRCK900102 GRCK900102 GRCK900102

GRCK900102 GRCK900102

DEVCLNT100 ------ QASCLNT100


Role Deletion Process:
 Add Role ZC_SEC_01 into TR
 Delete the role
 Release the TR
 Move TR -- QA-- PRD

SM01_DEV/SM01_CUS: To Lock/Unlock T-code.


SM59: To Create RFC connection. S_RFC, S_RFCACL
SIDCLNT-client number
GRCCLNT400

What will happen when user execute a T-code?


 T-code available in TSTC or not
 T-code locked or not (SM01_DEV/SM01_CUS)
 T-code is available in S_TCODE or not
 Authorization Objects related to T-code
 Authority check in t-code.
What will happen when we add t-code in role?
 System will check SU24 changes for that particular T-code
vs objects.
SU01
S_USER_GRP, S_USER_PRO, S_USER_AUT,
S_USER_AGR, S_USER_SYS, S_USER_SAS.
 Pull all the authorization objects to the role.

User Creation Process: (Service Now (SNOW) or Remedy)


 User will raise the ticket in SNOW
 Ticket will go to Manager approval
 Ticket comes to security queue once Manger approved
 Security team verify the User details & roles
 Security team verify the role owner for roles in role matrix
 Security team will send mail to role owner.
 Based on role owner approval we will provide access to
user in SU01
 Credentials will be shared to user separately.
Role Creation or Change process: (Service Now (SNOW) or
Remedy).
 Requestor will raise the ticket in SNOW
 Ticket will go to Manager approval
 Ticket comes to security queue once Manger approved
 Security team verify the role change details & roles
 Security team verify the role owner for the role in role
matrix.
 Security team will send mail to role owner.
 Based on role owner approval we will start security changes
in development system.
 We need to check the role dependency
 Start the changes in Dev system
 Create the TR request and release the TR
 Contact Basis to Move the TR from DEV to QAS.
 Ask user to perform UAT (User acceptance test) in QAS
system and ask user to provide the UAT signoff.
 Contact Basis to Move the TR from QAS to PRD.
 We will inform the requestor and close the ticket.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy