Showing posts with label SAP SECURITY AUTHORIZATION. Show all posts
Showing posts with label SAP SECURITY AUTHORIZATION. Show all posts

Sunday, 19 July 2015

SUIM Reports/ABAP Reports Required for SAP Security Team


RSUSR000     Currently Active Users    
      
RSUSR002     Users by Complex Selection Criteria

RSUSR002_ADDRESS     Select users by address data

RSUSR003     Check the Passwords status of Users SAP* and DDIC in All Clients

RSUSR004     Restrict User Values to the Following Simple Profiles and Auth. Objects

RSUSR005     List of Users with Critical Authorizations

RSUSR006     Locked Users and Users with Incorrect Logons

RSUSR007     Display Users with Incomplete Address Data

RSUSR008     Critical Combinations of Authorizations at Transaction Start

RSUSR008_009_NEW     List of Users with Critical Authorizations

RSUSR009     List of Users With Critical Authorizations

RSUSR010     Transactions for User, with Profile or Authorization

RSUSR011     Lists of transactions after selection by user, profile or objects

RSUSR012     Search authorizations, profiles and users with specified object values

RSUSR020     Profiles by Complex Selection Criteria

RSUSR030     Authorizations by Complex Selection Criteria

RSUSR040     Authorization Objects by Complex Selection Criteria

RSUSR050     Comparisons

RSUSR060     Where-used lists

RSUSR061     Enter Authorization Fields

RSUSR070     Roles by Complex Selection Criteria

RSUSR080     Users by License Data

RSUSR100     Change Documents for Users

RSUSR101     Change Documents for Profiles

RSUSR102     Change Documents for Authorizations

RSUSR200     List of Users According to Logon Date and Password Change

RSUSR300     Set External Security Name for All Users

RSUSR301     Fill non-checking transactions with auth.object S TCODE

RSUSR302     Delete authorization check on object S TCODE from table TSTCA

RSUSR304     Reload Table TSTCA From Table TSTCA_C

RSUSR400     Test Environment Authorization Checks (SAP Systems Only)

RSUSR401     Report to give all SAPCPIC users profile S_A.CPIC

RSUSR402     Download user data for CA manager from Secude

RSUSR403     Assign Profile S_A.CPIC to User SAPCPIC in Current Client

RSUSR404     Conversion Program for Authorizations of Basis Development Environment

RSUSR405     Reset all user buffers in all clients (uncritical)

RSUSR406     Automatically Generate Profile SAP_ALL

RSUSR406_OLD     Automatically Generate Profile SAP_ALL

RSUSR408     XPRA: Conversion of USOBX-OKFLAG, USOBX-MODIFIED for upgrade tool

RSUSR409     Transfer all translated titles to generated transaction codes

RSUSR421     Clean-up report: TSTC-CINFO if no check in TSTCA

RSUSR500     User Administration: Compare Users in Central System

RSUSR500D     Report RSUSR500D

RSUSR998     Call Reporting Tree Info System

RSUSREXT     Enter Correct SNC Names in Table View VUSREXTID (from SAP R/3 4.5)

RSUSREXTID     Enter Correct SNC Names in Table View VUSREXTID (from SAP R/3 4.5)

RSUSRLOG     Log Display for Central User Administration

RSUSRSCUC     CUA: Synchronization of the Company Addresses

RSUSRSUIM     User Information System

RSUSR_S_USER_SAS     Activate Authorization Object S_USER_SAS

RSUSR_S_USER_SAS_01     Complete Authorization Data for S_USER_SAS in Roles

RSUSR_S_USER_SAS_02     Convert Authorization Defaults

RSUSR_SYSINFO_PROFILE     Report cross-system information/profile

RSUSR_SYSINFO_ROLE     Report cross-system information/role

RSUSR_SYSINFO_ZBV     Report cross-system information/CUM

Wednesday, 15 July 2015

Critical Authorization Objects



S.No
Auth.Object
Description
1
S_TABU_DIS
Used to protect tables using authorization groups with activity

2
S_TABU_CLI
Auth object used to protect cross client tables

3
S_TABU_LIN
Auth object used to tables based on line items

4
S_TABU_NAM
New auth object to table access based on names

5
S_PROGRAM
Used to run ABAP reports/programs via SA38

6
S_DEVELOP
Auth object used to control ABAP objects or debug access

7
S_USER_AGR
Used to control roles

8
S_USER_AUT
Checked during authorization maintenance

9
S_USER_GRP
Used control user groups

10
S_USER_PRO
Used for profile maintenance

11
S_BDC_MONI
Used to protect batch input monitoring

12
S_BTCH_JOB
Used for background job monitoring and administration

13
S_BTCH_ADM
Used for background job administration

14
S_BTCH_NAM
User level control for background job scheduling 

15
S_SPO_ACT
Used for spool administration which controls S_ADMI_FCD

16
S_ADMI_FCD
Basis administration like spool and monitoring

17
S_SPO_PAGE
Used to control name of the o/p device and number of pages

Friday, 28 November 2014

How to Disable Access to INFOTYPE 008 in HR Security



Info type 0008 will enable users to look at others basic pay which is confidential and it required to be protected from users, because we must restrict this access to users who ever have access to HR data.

Here I will tell you how to achieve it.

1. Go to SE16N and check the table TOBJ(Authorization Objects) and enter field value INFTY ad execute

2. Now you can able to see all the authorization objects which is having filed INFTY, so now we need to check which all are tcodes having access to list of authorization objects which is having access to field INFTY
3. Go to table TSTCA in SE16N tcode and enter the list of authorization objects


4. Now execute and you will get a list of tcodes which is having authorization field INFTY, just do a excel work to remove all the duplicate values and you will get list of PA20, PA30, PA40, etc.. HR tcodes

5. That’s it you are almost done and now check who is having access/whom you want to disable access to info type 0008 in HR data by pulling report in SUIM and making changes in the corresponding assigned roles to users.

Hope this document is helpful to you and do share J