SLT Security
SLT Security
SLT Security
Example Words or characters quoted from the screen. These include field names, screen titles,
pushbuttons labels, menu names, menu paths, and menu options.
Textual cross-references to other documents.
EXAMPLE Technical names of system objects. These include report names, program names,
transaction codes, table names, and key concepts of a programming language when they
are surrounded by body text, for example, SELECT and INCLUDE.
Example Output on the screen. This includes file and directory names and their paths, messages,
names of variables and parameters, source text, and names of installation, upgrade and
database tools.
Example Exact user entry. These are words or characters that you enter in the system exactly as they
appear in the documentation.
<Example> Variable user entry. Angle brackets indicate that you replace these words and characters
with appropriate entries to make entries in the system.
1 Introduction .................................................................................................................................................... 6
1.1 Target Audience ...................................................................................................................................................... 6
1.2 Why Is Security Necessary? ................................................................................................................................... 6
1.3 About this Document .............................................................................................................................................. 6
1.4 Overview of the Main Sections ............................................................................................................................... 6
5 Authorizations .............................................................................................................................................. 15
5.1 Authorization Objects ........................................................................................................................................... 15
5.1.1 S_DMIS................................................................................................................................................... 15
5.1.2 S_DMC_S_R........................................................................................................................................... 16
5.1.3 S_DMIS_SLT .......................................................................................................................................... 16
5.1.4 S_DMIS_MOM ....................................................................................................................................... 16
5.1.5 S_DHCDCACT ....................................................................................................................................... 17
5.1.6 S_DHBASACT........................................................................................................................................ 17
5.1.7 S_DHCDCCDS ....................................................................................................................................... 18
5.1.8 S_DHCDCTAB ....................................................................................................................................... 18
5.1.9 S_DHCDCSTP ....................................................................................................................................... 19
5.2 User Roles .............................................................................................................................................................. 19
5.2.1 User Roles for SAP Landscape Transformation Replication Server ................................................ 19
5.2.2 User Roles for ABAP Source System ..................................................................................................20
5.2.3 User Roles for Non- ABAP Source System .........................................................................................20
5.3 Authorizations in the SAP HANA System............................................................................................................ 22
5.3.1 Option 1: Replicating to SAP HANA System (database connection managed by SAP) ................. 22
5.3.2 Option 2: Replicating to SAP HANA System (database connection not managed by
SAP) ....................................................................................................................................................... 26
5.3.3 Restricting Access to the Source System .......................................................................................... 27
• Technology consultants
• Security consultants
• System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation
Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas
the Security Guides provide information that is relevant for all life cycle phases.
With the increasing use of distributed systems and the Internet for managing business data, the demands on
security are also on the rise. When using a distributed system, you need to be sure that your data and processes
support your business needs without allowing unauthorized access to critical information. User errors,
negligence, or attempted manipulation of your system should not result in loss of information or processing time.
These demands on security apply likewise to SAP Landscape Transformation Replication Server. To assist you in
securing SAP Landscape Transformation Replication Server, we provide this Security Guide.
The Security Guide provides an overview of the security-relevant information that applies to SAP Landscape
Transformation Replication Server. The information in this guide covers the replication of data to an SAP HANA
target system. Information regarding additional target systems, for example ABAP-based SAP systems is
provided in chapter 9.
For more information about SAP LT Replication Server for SAP HANA, see the resources listed in the table below.
Guide Location
For more information about SAP HANA landscape, security, installation and administration, see the resources
listed in the table below.
SAP HANA Landscape, Deployment & Installation http://help.sap.com/hana → Installation and Upgrade
1514967 SAP HANA: Central Note Central SAP Note about SAP HANA
1598623 SAP HANA appliance software: Central Current information about SAP HANA security
Security Note topics
SAP LT Replication Server is a replication technology to provide data from ABAP systems in a SAP HANA
environment. It acts as a key enabler for SAP HANA customers to supply their HANA environment with relevant
data.
The following components are used in the technical system landscape:
• Source system
The source system tracks database changes by using database triggers. It records information about
changes in the logging tables. The read modules transfer the data from the source system to the SAP LT
Replication Server system. The relevant data is read from the application tables.
• Non-ABAP source system
The non-ABAP source system tracks database changes by using database triggers. It records information
about changes in the logging tables. The read modules transfer the data from the non-ABAP source system to
the SAP LT Replication Server system. The relevant data is read from the application tables.
• SAP LT Replication Server system
If the source is an ABAP system, the SAP LT Replication Server system polls the logging tables in the source
system with a remote function call (RFC) connection. If the source system is a non-ABAP system, the SAP LT
Replication Server system polls the logging tables in the non-ABAP source system with a database
connection.
• SAP HANA system
The SAP HANA system contains the SAP HANA database. It is used to store the replicated data. The SAP LT
Replication Server system and the SAP HANA system communicate by means of a database connection.
SAP LT Replication Server can be used for replication from ABAP source systems and non- ABAP source systems
to the HANA system. For ABAP source systems, SAP LT Replication Server can either be installed within the
source system or in a separate ABAP system.
The relevant information required to create the connection between the source system, the SAP LT Replication
Server system, and the SAP HANA system is specified within the SAP LT Replication Server system as a
Configuration. In the SAP LT Replication Server Cockpit (transaction LTRC), you can define a new configuration.
The following figures show the possible technical system landscapes for SAP LT Replication Server.
Option 1 – ABAP Source System with Separate SAP LT Replication Server System
The SAP LT Replication Server system component is installed in the source system. Therefore, the read modules
are located in the source system. Only one external network communication channel is required to connect to the
SAP HANA system.
• For a non-ABAP source system, SAP LT Replication Server needs to be installed in a separate system. In
contrast to a setup with an ABAP source system, the read modules are created in the SAP LT Replication
Server system. To communicate between the SAP LT Replication Server and the non-ABAP source system, a
database connection is used.
Ensure that the database of your non-ABAP source system fulfils all the prerequisites for using SAP LT
Replication Server.
SAP LT Replication Server and the ABAP source system use the user management and authentication
mechanisms provided by the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server.
Therefore, the security recommendations and guidelines for user administration and authentication as described
in the SAP NetWeaver Security Guide [SAP Library] → Application Server ABAP Security Guide also apply to SAP
LT Replication Server and ABAP source systems.
In addition, the following information about user management, administration, and authentication applies to the
source systems and the SAP LT Replication Server system:
The user role SAP_IUUC_REPL_ADMIN is required to use SAP Landscape Transformation Replication
Server. By default, this role does not allow users to view the data that is replicated from the source
system to the target system. However, the authorization object S_DMIS (with activity 29) allows users to
view the data that is being replicated (by means of the replication logging function).
For the replication target, the authorization and authentication mechanisms provided by the SAP HANA
database are used.
The SAP LT Replication Server and the ABAP source system use the authorization concept provided by the SAP
NetWeaver AS ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP
NetWeaver AS Security Guide ABAP also apply to the SAP LT Replication Server.
In SAP NetWeaver, authorizations are assigned to users based on roles.
Note
For more information about how to create roles, see Role Administration (SAP Library)
Specific authorizations apply for each system. To control the actions that a user is authorized to perform,
authorizations for the source system(s) and the SAP LT Replication Server system are available in the user
profiles.
The following SAP NetWeaver based authorization objects are especially important for using the SAP LT
Replication Server:
5.1.1 S_DMIS
Authorization fields:
ACTVT Activity
ACTVT Activity
5.1.3 S_DMIS_SLT
You can use this authorization object to restrict access to specific configurations. To do this, you specify an
authorization group (either when creating a configuration, or after you have created a configuration on the
Administration tab in transaction LTRC). Note if you want to use authorization object S_DMIS_SLT, you have to
add it to the roles for the relevant users manually.
5.1.4 S_DMIS_MOM
Authorization fields:
ACTVT Activity
If you need to check, create, edit, or delete migration objects by using MWB or transaction LTMOM, these
authorizations will be checked.
Only relevant for S/4HANA On-Premise 2020 source systems (or higher).
This authorization object is checked when transferring data from the source system.
Authorization fields:
5.1.6 S_DHBASACT
This authorization object is checked when activities are called in the source system such as determining fields for
ABAP dictionary objects.
Authorization fields:
This authorization object is checked for every CDS views that is accessed in the source system. If access must be
limited to a certain set of CDS views, field DHCDCCDSNM can be used to specify which CDS views can be
accessed.
Authorization fields:
ACTVT Activity
5.1.8 S_DHCDCTAB
This authorization object is checked for every database table that is accessed in the source system. If access
must be limited to a certain set of tables, field DHBASTABNM can be used to specify which tables can be
accessed.
Authorization fields:
ACTVT Activity
This authorization object checks which data transfer scenario is enabled for the source system.
ACTVT Activity
Depending on the system and the support patch level, different roles and authorizations are required for the user.
You can generate roles using the profile generator (transaction PFCG).
You can generate and use the following role to display, change, create, or delete configurations:
SAP_IUUC_REPL_ADMIN
You can generate and use the following role to display configurations only; this role does not permit the creation of
a new configuration, or changes to any settings:
SAP_IUUC_REPL_DISPLAY
Note
With SAP Landscape Transformation Replication Server SP13, new versions of the roles
SAP_IUUC_REPL_ADMIN and SAP_IUUC_REPL_DISPLAY were delivered. If you are upgrading to SP15
from a lower release (not SP13), you must ensure that you have the new versions of these roles in the
relevant clients.
For an ABAP source system, generate and use the following role:
SAP_IUUC_REPL_REMOTE
Note
Do not use the DDIC user. Roles are not generated by default. Grant and generate all roles.
For SAP S/4HANA on-premise source systems (release 2020 or higher), you need to also generate and use the
role SAP_DH_CDC_REMOTE.
SAP_DH_CDC_REMOTE is a template role, which means that some of the fields are empty and values must be
specified for these fields before you generate the role.
For authorization object S_DHCDCCDS, specify values for the following fields:
• DHCDCSBTYP
Specify the value SLT.
• DHCDCCDSRS
Specify the value C1. The value “NO” must only be used if CDS views that are not delivered by SAP or are not
yet released with status C1.
• DHCDCCDSNM
Specify a list of all CDS views that can be accessed in the source system.
For the authorization object S_DHCDCTAB, specify values for the following fields:
• DHCDCSBTYP
Specify the value SLT.
• DHBASTABNM
Specify a list of all database tables that can be accessed in the source system.
For the authorization object S_DHCDCSTP specify the value SLT for the field DHCDCSBTYP.
To establish a secondary database connection from an ABAP system to an external database, the connection
data and the user data of a user are required. This user must be authorized to establish a connection to the
external database The ABAP system connects to a specific schema from the database. To perform the replication
and initially load a specific table from a given schema, the database user must have privileges for the following
actions:
Depending on the specific external database system, the process of granting privileges to a user can vary.
Note
If you want to transfer data from non-ABAP source systems, the relevant user in the SAP Landscape
Transformation Replication Server system needs the role SAP_IUUC_REPL_REMOTE in addition to the
role SAP_IUUC_REPL_ADMIN. Alternatively, you can adjust the role SAP_IUUC_REPL_ADMIN. Ensure
that the following activities for the authorization object S_DMC_S_R are selected:
01 - Create or Generate
33 - Read
34 - Write
40 - Create in DB
41 - Delete in DB
The replicated data is stored in the SAP HANA system. The authorization concept of the SAP HANA database is
used.
Depending on the scenario you have chosen for your replication to SAP HANA, different requirements for
authorizations apply:
The SAP LT Replication Server requires an initial user, which is used to create a database connection from the
SAP LT Replication Server to the SAP HANA system. The database connection is automatically created when you
set up a new configuration.
Create a new user with the following authorizations in the SAP HANA system as described below:
On the tab System Privileges, add the following system privileges:
• CREATE SCHEMA
• ROLE ADMIN
This privilege is required for creating roles for data provisioning and for accessing the schema. This privilege
can be revoked once the configuration has been created.
• USER ADMIN
If you want SAP Landscape Transformation Server to create a new target schema, the system creates the
schema on the HANA database together with the corresponding user. In order to do this, both privileges
CREATE SCHEMA and USER ADMIN are required. The privilege USER ADMIN can be revoked once the
schema has been created.
• CATALOG READ
This privilege is required to read the existing schemas in the SAP HANA database. This prevents a schema
being created that has the same name as an existing schema.
In the SAP HANA system, the table RS_REPLICATION_COMPONENTS contains information about the source
systems connected the SAP HANA system via SAP Landscape Transformation Replication Server. In order to
register a new configuration when one is created, and to deregister a configuration when one is deleted, certain
SQL privileges are required.
When you create the first SAP LT Replication Server configuration for an SAP HANA database, the SQL schema
SYS_REPL is created in the SAP HANA database. If another database user requires access to this configuration
(or configurations created after this one), then you need to assign the system privileges mentioned above to this
user, as well as the following SQL privileges:
On the tab SQL Privileges, add the SQL object SYS_REPL, and select the following privileges:
• EXECUTE
• SELECT
• INSERT
• UPDATE
• DELETE
Note:
You can use the following SQL script to create this user in the SAP HANA system:
The SAP LT Replication Server creates the replication user by using the initial user for this operation. One
replication user is created for each replication schema. The replication user has the same name as the
corresponding schema.
The replication user is used to connect from the SAP LT Replication Server to the SAP HANA system for
replication. The authentication information for the replication user is generated by the SAP LT Replication Server
and stored as a secondary database connection in the SAP LT Replication Server. This means that only the SAP
LT Replication Server can connect as replication user to the SAP HANA system.
The following roles are defined and have authorization on the target schema on the SAP HANA system:
• <REPLICATION SCHEMA>_DATA_PROV
Assign this role to users who configure and monitor the data provisioning process. This role has the right to
select data in the replication schema and to insert values into the RS_ORDER table within the replication
schema.
• <REPLICATION_SCHEMA>_POWER_USER
This role provides full control over the contents of the replication schema.
Note
Assign this role only for urgent operations, such as maintenance operations. The rights granted by this
role allow the user to perform operations that can destroy the consistency of the replicated data.
• <REPLICATION_SCHEMA>_USER_ADMIN
This role provides access to the database stored procedures RS_GRANT_ACCESS and
RS_REVOKE_ACCESS. They are used for fine-grained access control on the replication schema content.
• <REPLICATION_SCHEMA>_SELECT_USER
This role contains select privileges of the entire replication target schema.
Note that the access rights assigned to each of these roles do not include a grant option. This means that users
who have been granted these roles cannot grant the individual privileges to other users and roles. This is due to
the fact that granted privileges depend on the privilege of the granting user: If the granting user is revoked the
privilege, or is entirely dropped, the granted privileges are also revoked.
The following select user role that can be granted to others is automatically created in the schema in the SAP
HANA system:
• <schema>_SELECT_USER_GRANTABLE
Note
Access to the configuration and monitoring tables that start with prefix ‘RS_’ cannot be granted or
revoked by this procedure.
Access to a table is granted by calling the procedure RS_GRANT_ACCESS, which has the following parameters:
Parameter Description
Access to a table is revoked by calling the procedure RS_REVOKE_ACCESS, which has the following parameters:
Calling RS_GRANT_ACCESS and RS_REVOKE ACCESS writes log entries into the table RS_MESSAGES. The
Component field of the RS_MESSAGES table is populated with RS_GRANT_ACCESS or RS_REVOKE_ACCESS
respectively. The following information is logged:
Whereas the schema in the target database is created by SAP LT Replication Server for option 1, for this option
you need to ensure that the database schema (replication schema) that will contain the target tables already
exists.
We recommend creating one replication user for each replication schema. We also recommend that the
replication user has the same name as the corresponding schema.
The replication user is used to connect from the SAP LT Replication Server to the SAP HANA system for
replication. This means that only the SAP LT Replication Server can connect as replication user to the SAP HANA
system.
The replication user needs full access to the target database schema (EXECUTE, SELECT, INSERT, UPDATE, and
DELETE privileges), and has read access to schema SYS.
Note
Your system administrator needs to provide the required authorizations for any users that require access
to replicated tables. SAP LT Replication Server does not create any roles for accessing the replicated
tables.
Important Information
By default, the SAP LT Replication Server system has unrestricted access to all tables in the ABAP-based SAP
source system.
However, there may be situations where you want to restrict the access to data. To do this, you can use table
DMC_C_WL_TABL_OP in the ABAP-based SAP source system. This table is delivered empty, which means that
the SAP LT Replication Server system has unrestricted access to all tables.
In this table, you can specify which remote RFC user can access which tables in the source system. In addition,
you can specify the type of the action that can be performed on the table. The following actions are possible:
If table DMC_C_WL_TABL_OP contains at least one entry, then the system restricts access to data to only those
entries. If you want additional access to data, you need to create additional entries in the table.
If the action READ_METADATA is permitted for a table, and the table has include structures, you must also permit
the action READ_METADATA for the include structures. Note that it is not necessary to permit other actions such
as LOAD_DATA or REPLICATE_DATA for the include structures.
Field Description
Note: If you permit the actions LOAD_DATA or REPLICATE_DATA for a table, then you must also permit the action
READ_METADATA for the table. This is because SAP LT Replication Server needs to read the metadata of a table
before performing the initial load or starting the replication process.
For SAP S/4HANA on-premise source systems (release 2020 or higher), you can restrict access by using the role
SAP_DH_CDC_REMOTE (see section 5.2.2). Field DHCDCCDSNM of authorization object S_DHCDCCDS lists all
CDS views that can be accessed in the source system. Field DHBASTABNM of authorization object S_DHCDCTAB
lists all tables that can be accessed in the source system.
Example 1
In the example outlined in the table below, the SAP LT Replication Server system (specifically user SJOHN) is not
permitted to perform any actions for the source system table SBOOK.
Note that as long as table DMC_C_WL_TABL_OP contains at least one entry, the SAP LT Replication Server
system is not permitted to perform any action for any source system tables. If you want additional access to data,
you need to create additional entries in the table.
Note the SAP LT Replication Server system is connected to the ABAP-based SAP source system by means of an
RFC connection created with the user SJOHN.
SJOHN SBOOK
Example 2
In the example outlined in the table below, the SAP LT Replication Server system (specifically user SJOHN) is
permitted to load data from the source system table SBOOK.
Note the SAP LT Replication Server system is connected to the ABAP-based SAP source system by means of an
RFC connection created with the user SJOHN.
SJOHN SBOOK X X
Example 3
In the example outlined in the table below, the SAP LT Replication Server system (specifically user SJOHN) is
permitted to read metadata from the source system table SBOOK, and also to replicate data from the table.
Note the SAP LT Replication Server system is connected to the ABAP-based SAP source system by means of an
RFC connection created with the user SJOHN.
SJOHN SBOOK X X
Access to ABAP source systems using SAP LT Replication Server takes place exclusively through RFC
connections. For more information about security-relevant information concerning RFC, see the SAP Library on
SAP Help Portal.
For non-ABAP source systems, a database connection has to be established to transfer the data from the source
to the SAP LT Replication Server. For more information, refer to the relevant database vendor documentation.
If any of the participating systems are located in a public network or are connected to a public network, then you
need to establish suitable protection mechanisms such as introducing a firewall.
The SAP LT Replication Server does not come with fixed destinations or user names. The following
communication destinations need to be created:
1. Create a user (type Dialog) in your source system with the role SAP_IUUC_REPL_REMOTE. For SAP
S/4HANA on-premise source systems (release 2020 or higher), also add the role SAP_DH_CDC_REMOTE.
2. Create an RFC connection (type 3 – ABAP) from the SAP LT Replication Server system to the source system
with the created user. If both systems are Unicode, specify this RFC as Unicode.
Note:
Do not use the DDIC user for RFC connection. If the source system and the SAP LT Replication Server are
the same system, also create an RFC connection. Do not use the option NONE.
3. Use the created RFC to define the connection between the ABAP source system and the SAP LT Replication
Server within your new configuration.
To establish a secondary database connection, the user must have the required privileges as described under
User Roles for Non-ABAP Source System.
Use the created database connection to define the connection between the ABAP source system and the SAP LT
Replication Server within your new configuration.
If the database connection from the SAP LT Replication Server system to the SAP HANA system is managed by
SAP LT Replication Server, then the database connection is created automatically.
If the database connection from the SAP LT Replication Server system to the SAP HANA system is not managed
by SAP LT Replication Server, then you need to establish a secondary database connection as described in the
SAP LT Replication Server operations guide and in the application help (https://help.sap.com/sapslt). Note that
the user must have the required privileges as described in section “Authorizations in the SAP HANA System” of
chapter “Authorizations”.
The created database connection is then used to define the connection between the SAP LT Replication Server
and the target database within your new configuration.
For more information about the two options for replicating data to SAP HANA, see the application help at
http://help.sap.com
SAP Landscape Transformation Replication Server uses the logging and tracing capabilities provided by the SAP
NetWeaver AS ABAP platform. For example, the logging of security-related events is handled by the security audit
log (transaction SM19, transaction SM20).
For more information see: SAP NetWeaver Security Guide -> Logging and Tracing.
In the initial screen SAP LT Replication Server Cockpit (transaction LTRC), you can access the SAP LT Replication
Server Change Log by choosing the Change Log button. The change log records all changes triggered by users of
the SAP LT Replication Server application. You can use the change log to view the changes that you are interested
in.
The retention period is the length of time (in days) that the logs are kept in the system. The default retention
period is 60 days. To change the retention period, choose the Settings for Data Retention Period button.
The system displays a dialog box where you can choose one of the following options:
o Data Retention Period Off
If you choose this option, logs are kept in the system indefinitely.
o Data Retention Period On
If you choose this option, you can specify a number of days after which the logs will be deleted from
the system.
If required, you can delete all entries from the change log before a specific date. To do this, choose the Delete
Entries button.
The system displays a dialog box where you can specify a date. The system will delete all changes that were
recorded before this date (changes recorded on the specified date will still be visible).
8.1 Overview
Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance
with general data privacy acts, it is necessary to consider compliance with industry-specific legislation in different
countries. This section describes the specific features and functions that SAP provides to support compliance
with the relevant legal requirements and data privacy.
This section and any other sections in this Security Guide do not give any advice on whether these features and
functions are the best method to support company, industry, regional or country-specific requirements.
Furthermore, this guide does not give any advice or recommendations with regard to additional features that
would be required in a particular environment; decisions related to data protection must be made on a case-by-
case basis and under consideration of the given system landscape and the applicable legal requirements.
Note
In the majority of cases, compliance with data privacy laws is not a product feature.
SAP software supports data privacy by providing security features and specific data-protection-relevant
functions such as functions for the simplified blocking and deletion of personal data.
SAP does not provide legal advice in any form. The definitions and other terms used in this guide are not
taken from any given legal source.
Glossary
Term Definition
Retention period The time period during which data must be available.
End of purpose (EoP) A method of identifying the point in time for a data set
when the processing of personal data is no longer
required for the primary business purpose. After the
EoP has been reached, the data is blocked and can
only be accessed by users with special authorization.
Some basic requirements that support data protection are often referred to as technical and organizational
measures (TOM). The following topics are related to data protection and require appropriate TOMs:
• Access control: Authentication features as described in section User Administration and Authentication.
• Authorizations: Authorization concept as described in section Authorizations.
• Read access logging: As described in section Read Access Logging.
• Transmission control / Communication security: as described in section Network and Communication
Security
• Separation by purpose: Is subject to the organizational model implemented and must be applied as part of the
authorization concept.
Caution
The extent to which data protection is ensured depends on secure system operation. Network security,
security note implementation, adequate logging of system changes, and appropriate usage of the system
are the basic technical requirements for compliance with data privacy legislation and other legislation.
SAP LT Replication Server might transfer data (personal data) that is subject to the data protection laws
applicable in specific countries. Usually, this data is not persisted nor accessible within the SAP LT Replication
Server system. The data is only present in-memory during the replication process.
The only exception to this is the replication logging feature (refer to chapter 8 of the SAP LT Replication Server
Operations Guide). With this feature, the content of replicated tables may be stored in the SAP LT Replication
Server system for a certain amount of time, customizable by the SAP LT Replication Server user. The data is
persisted in a cluster table which means that it cannot be accessed by using database tools such as transaction
SE16.
The customization of the retention period (threshold for deletion) can be configured by using transaction LTRS.
Read access to personal data is partially based on legislation, and it is subject to logging functionality. The Read
Access Logging (RAL) component can be used to monitor and log read access to data and provide information
such as which business users accessed personal data (for example, fields related to bank account data), and
when they did so.
In RAL, you can configure which read-access information to log and under which conditions.
Within SAP LT Replication Server, Read Access Logging has been configured for the Replication Logging feature,
where data replicated from a source system to a target system is temporarily stored in the SAP LT Replication
Server system (refer to chapter 8 of the SAP LT Replication Server Operations Guide). As SAP LT Replication
Server does not know about the content of the tables which are replicated and whether these tables contain
personal data, any access to the temporary storage will be logged if Read Access Logging is activated. The log will
provide information that a certain user accessed data for a certain table.
Prerequisites
Before you can use the delivered RAL configurations, the following prerequisites are met:
• Ensure that your SAP Basis release supports RAL. For more information, see SAP Note 1969086.
• You have enabled RAL in each system client.
More Information
For general information on Read Access Logging, see the product assistance for SAP NetWeaver on SAP Help
Portal at http://help.sap.com/netweaver → SAP NetWeaver Library: Function-Oriented View → System Security
for SAP NetWeaver AS for ABAP Only.
For up-to-date information on the delivered RAL configurations, see SAP Note 1514967.
Once data is extracted from a source table and is moved to a table in the target system, the SAP LT Replication
Server authorization concept no longer applies. That is, data in target tables can be read using functions that are
not part of SAP LT Replication Server, and that lack the authorizations that are in place when SAP LT Replication
Sever reads data from the source system. You must therefore ensure that access to data in the target system is
managed in a secure way.
Data in INDX-like tables is stored in a compressed and raw data format. Data from an INDX-like table cannot be
read in a usual way. Only applications that have specific authorizations can read data from these tables, and write
its data to standard tables in a readable format.
SAP Landscape Transformation Replication Server is such an application. It can transfer data from INDX-like
tables to a standard table in the target system in a readable format.
INDX-like tables can contain data of a personal or sensitive personal nature. This type of table is used extensively
by SAP ERP HCM. Examples of HCM data that is stored in INDX-like tables include payroll and absence data,
though any conceivable type of sensitive data could be stored in these tables. The customer must ensure that the
transparent data extracted from INDX-like tables is protected in a manner that conforms to local data protection
regulations.
An additional consideration for INDX-like tables concerns transaction CNV_INDX_OVERVIEW. If a user has the
authorizations required to use this transaction, they can view the data from INDX-like tables directly. This data
can be highly sensitive, and the environment could be productive. With sufficient authorizations, a user can simply
select an INDX-like table, then an application area such as Payroll Results, and then view individual records
containing, for example, wage type and money amounts for specific personnel numbers.
Since transaction CNV_INDX_OVERVIEW is so critical, there is no standard role that enables a user to use it. In
addition, the authorizations required are very strict and should only be granted to a user that has a specific
requirement to test or analyze an SAP Landscape Transformation Replication Server function. It must be
understood that a user with the required authorizations can then see all the data in the specifically selected INDX-
like table. The following table outlines the required authorizations:
S_TCODE TCD
Depending on how you use SAP Landscape Transformation Replication Server, different authorizations are
required. Different users (with the relevant authorizations) are required to operate SAP Landscape
Transformation Replication Server.
The specifics depend on your scenario. The following sections outline the different users and authorizations
required for the various scenarios.
The user roles required in the different systems are outlined in the following sections.
In order to connect to and retrieve data from the SAP Landscape Transformation Replication Server system by
means of an RFC connection, generate and use the following role:
• SAP_IUUC_REPL_REMOTE
For SAP S/4HANA on-premise source systems (release 2020 or higher), you also need to generate and use the
role SAP_DH_CDC_REMOTE. For more information, see chapter 5.2.2.
To establish a secondary database connection from an ABAP-based system to an external database, the
connection data and user data are required. This user must be authorized to establish a connection to the
external database. The ABAP-based system connects to a specific schema from the database. To perform the
replication and initially load a specific table from a given schema, the database user must have privileges for the
following actions:
Depending on the specific external database system, the process of granting privileges to a user can vary.
In order to create, change, or display configurations, you can generate and use the following role:
• SAP_IUUC_REPL_ADMIN
You can generate and use the following role in order to display configurations only. Note that this role does not
permit the creation of a new configuration, or changes to any settings:
• SAP_IUUC_REPL_DISPLAY
In order to connect to and write data to the ABAP-based SAP target system by means of an RFC connection,
generate and use the following role:
• SAP_IUUC_REPL_REMOTE
The user roles required in the different systems are outlined in the following sections.
In order to connect to the SAP Landscape Transformation Replication Server system by means of an RFC
connection, generate and use the following role:
• SAP_IUUC_REPL_REMOTE
For SAP S/4HANA on-premise source systems (release 2020 or higher), you also need to generate and use the
role SAP_DH_CDC_REMOTE. For more information, see chapter 5.2.2.
In order to create, change, or display configurations, you can generate and use the following role:
• SAP_IUUC_REPL_ADMIN
You can generate and use the following role in order to display configurations only. Note that this role does not
permit the creation of a new configuration, or changes to any settings:
• SAP_IUUC_REPL_DISPLAY
The user must have authorizations to write data to the database and to create objects such as views and
synonyms (depending on the database used).
The source system connects to the ODP framework in the SAP Landscape Transformation Replication Server
system. You have to create an RFC connection from the source system to the SAP Landscape Transformation
Replication Server system (by using transaction SM59). For this connection, use an RFC user with the
role SAP_IUUC_REPL_REMOTE. As the RFC connection to the target system points to the same system that the
SAP Landscape Transformation Replication Server is running on, you can use the connection NONE.
Note
The callback connection is the RFC connection <BW System><Client Number> which is created in the
SAP Landscape Transformation Replication Server system. Ensure that you use the correct user and
password combination as defined in this RFC connection.
The user roles required in the different systems are outlined in the following sections.
In order to connect to the SAP Landscape Transformation Replication Server system by means of an RFC
connection, generate and use the following role:
• SAP_IUUC_REPL_REMOTE
Note
Do not use the DDIC user. Roles are not generated by default; you need to grant and generate all roles.
In order to create, change, or display configurations, you can generate and use the following role for the SAP
Landscape Transformation Replication Server system:
• SAP_IUUC_REPL_ADMIN
You can generate and use the following role in order to display configurations only. Note that this role does not
permit the creation of a new configuration, or changes to any settings:
• SAP_IUUC_REPL_DISPLAY
In order to configure and monitor the data provisioning process in the BW system, generate and use the following
role:
• S_RS_RDEMO
Material Number