Sap Security Authorizations
Sap Security Authorizations
Sap Security Authorizations
Administration
Contents
1.0 Introduction...............................................................................................................2
2.0 SAP Security Components – The Big Picture ............................................................2
2.1 SAP Authorization Concept...................................................................................3
2.2 Composite Profiles ................................................................................................4
2.3 User Ids.................................................................................................................4
2.4 Authorizations .......................................................................................................4
3.0 Security Configuration in SAP...................................................................................4
3.1 User Authentication...............................................................................................4
3.2 Creating and Assigning Authorization Profiles.......................................................5
3.3 Auditing and Monitoring .......................................................................................6
3.4 Administration and Maintenance ...........................................................................9
1.0 Introduction
SAP has done nothing less than change the entire systems landscape for
enterprises. The benefits it can bring have led to widespread adoption across the
globe. One of the key benefits SAP brings to an enterprise is the ability to
integrate the data both within the enterprise, and between it and it’s partners /
competitors. In many cases organizations today are both partners and
competitors at the same time. Think of wholesalers and distributors, SAP and
Oracle, AT&T and BT, or two oil giants who have an upstream joint venture.
These companies use SAP to integrate process between themselves for their
mutual benefit. This ability to integrate, however, brings with it a particular risk –
that of exposing their data to the un-authorized outside world.
Entire companies have been built up around highly guarded intellectual property
and process secrets ... and could easily fall if this was breached. Therefore,
keeping the security of the organization intact is one of the vital aspects of any
SAP implementation.
Figure 1
The scope of this article is SAP Application Security, which can be achieved with
the help of SAP’s BASIS security application through the concept of
authorization.
The SAP authorization concept is based upon the logical relationship between a
user ID and the range of system authorizations with which it can be associated.
The architecture of the authorization system is based upon the utilization of
several individuals but related logical components: Profiles, Objects, Fields, and
Authorizations. The user ID refers exclusively to profiles. Each profile grants a
set of specific system access authorizations to user. Figure 2 illustrates the
hierarchical authorization concept in SAP.
Figure 2
User ids allow access to SAP applications. Each user must have a corresponding
profile specifically assigned. In many situations, multiple composite profiles can
be assigned to a user ID, depending on the role(s) an individual user is
responsible for, in the business processes.
2.4 Authorizations
Authorizations are the key building blocks of SAP security. Authorization is the
process of assigning values to fields present in authorization objects. In SAP,
access to all system functionality is achieved through a complex array of
authorizations. Sometimes users find that they lack the necessary authorizations
to perform a certain function in the system, in which case the message: "You are
not authorized..." is displayed at the bottom of the screen.
Note: Profile Generator can be retroactively installed in SAP versions 3.0f and above.
The authorization objects can be selected using the SAP Profile Generator.
Administrators can automatically generate authorization profiles for function-
specific access to SAP users after configuring initial settings.
Activity Groups contain simple profiles and usually represent employee or job
roles. They are user-defined and allow administrator to organize and maintain
system activities. Activity group when used as an information database reduces
data entry time. Administrators can define activity groups in two steps:
Security implementation with the new Profile Generator is based on the creation
of activity groups or a collection of linked or associated activities, such as tasks,
reports, and transactions.
Instruction 1: A dealer activity group should be created. Name this activity group
as Dealer.
Following this procedure will ensure complete functional access to the new user
using the system as Dealer.
Figure 3
For example, if a SAP administrator wants to check for unrecognizable user Ids
or the users trying to use non-permitted transactions, administrator can execute
transaction AL08 and review user activity.
Instruction Set
Instruction Set
• As a final step, check that the secret super user has been created (with a
different user ID and password). All of the authorizations assigned to SAP*
should then be removed (an empty profile list followed by a password
change.
The concept of SAP security is flexible as well as complex. SAP has a multi-
layered integrated framework. To ensure adequate protection, security measures
must be factored into all layers of the SAP infrastructure. With client/server
architecture, SAP systems include many components that exchange information,
each of which constitutes a layer of the SAP security infrastructure. Security is
often not a priority in an implementation and as a result, the default security is not
strong. SAP security functionality could be enhanced using various measures as
discussed above.