SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
HOW-TO Use SAP SUIM OR
RSUSR008_009_NEW to Analysing
Critical Authorisations
Leon Ye
Contents
Preface...................................................................................................................................................................2
Access the Program .........................................................................................................................................2
Analysing Users with Critical Authorisations.......................................................................................3
Defining Critical Authorisations ............................................................................................................3
Create a variant.............................................................................................................................................7
Execute the report variant with critical authorisations. .............................................................8
Preface
SAP upgraded SUIM (User Information System) which runs program
RSUSR008_009_NEW as of SAP Web AS 6.20 with the following Support Packages:
SAP Web AS 6.20, as of SAPKB62039
SAP Web AS 6.40, as of SAPKB64003
Access the Program
Transaction SUIM
Choose User
With Critical Authorisations
OR, Use transaction SA38
Use Program RSUSR008_009_NEW.
Both brings the following screen up
Analysing Users with Critical Authorisations
You need first define critical authorisations and then combine the critical authorisations
into a variant then you run the variant.
Defining Critical Authorisations
Choose on the initial screen.
A dialog box appears:
On the left side Dialog Structure it displays four folders, which form two hierarchies:
 Variants for Critical Authorisations → Critical Authorisations
 Critical Authorisation → Authorisation Data
Double click the Critical Authorisation folder and choose
Then you can enter the Critical Authorisation IDs or copy from a spread-sheet (see the
user contributed documentation under ISACA SAP topic). The following screen is based
on the copied information from the SAP Critical Authorisations. Please note that the
colour draw down can only be manually chosen one by one.
Save your entries.
Double click the Authorisation Data folder.
A new view appears.
Choose New Entries.
 Fill out all required fields, with an asterisk (*).
Note the following when filling out the fields:
o All entries within a group must have the same operand AND or OR. The
individual groups are essentially linked with AND. An OR link is not
allowed (error messages will be shown when you run the variant later.
You can fix any errors then).
o You can specify critical data for different authorisation objects within the
same group.
o If you specify a transaction code for an ID, all authorisation data required
to execute the transaction and maintained in transaction SE93 is
automatically entered as critical data, after you have confirmed and
saved the dialog box.
o If you leave the From field empty, the program searches for
authorisations with spaces “” for the specified field and object.
o If you enter an asterisk (*) in the From field, the report searches for full
authorisation for the specified field.
o Any errors in the Authorisation Object fields will be picked up as it will
not allow you to enter an object or value it does not exist, but for
Transactions the system cannot prevent you to put in a non-exist TCODE.
o Individual entries cannot be put into the change request, has to be put in
as NEW ENTRIES.
Example of ZSOS0002
The example above was copied from the spreadsheet:
Save your entries.
Create a variant.
Open the folder Variants for Critical Authorizations, and then choose New
Entries.
Enter the name and description of the variant.
Enter or copy the Authorisation ID and Text into the New Entries
The above IDs were copied from:
Save your entries.
Execute the report variant with critical authorisations.
On the initial screen of the report
Choose For Critical Authorisations
Use the input help to select an existing variant, and choose Execute.
You can also define a report variant, for example, the above screen shot shows the user
group excluded TERMINATED and other user groups which may not be relevant to your
analysis.
You can use SUIM or report RSUSR008_009_NEW to combine the IDs for critical
authorisations in any way, and to create variants with these combinations, for example
for segregation of duties purposes.
Samples segregation of duties for business cycles and system securities will be
published next year.
Relevant documents already published on ISACA SAP Topic include
o How-to SAP Security Optimisation Self-service
o SAP SOS Sample Report
o SAP Critical Authorisations

Mais conteúdo relacionado

Mais procurados

Sap security-administration
Sap security-administrationSap security-administration
Sap security-administrationnanda nanda
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infosapdocs. info
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks ProceduresInprise Group
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and InstructionMart Leepin
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap securityyektek
 
Currency conversion in bi 7.0
Currency conversion in bi 7.0Currency conversion in bi 7.0
Currency conversion in bi 7.0gireesho
 
Functional specification document_template
Functional specification document_templateFunctional specification document_template
Functional specification document_templateIsabel Elaine Leong
 
SAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview PresentationSAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview PresentationKenBowers
 
What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16
What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16
What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16Thomas Demmler
 
Charm workflow for urgent changes while adding node
Charm workflow for urgent changes while adding nodeCharm workflow for urgent changes while adding node
Charm workflow for urgent changes while adding nodeAditya Shivhare
 
100 sap basis_interviwe_questions
100 sap basis_interviwe_questions100 sap basis_interviwe_questions
100 sap basis_interviwe_questionsbhaskarbi
 
12753028 scot-configuration-troubleshooting
12753028 scot-configuration-troubleshooting12753028 scot-configuration-troubleshooting
12753028 scot-configuration-troubleshootingkratos1979
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC FrameworkHarish Sharma
 
OData service from ABAP CDS
OData service from ABAP CDSOData service from ABAP CDS
OData service from ABAP CDSAnil Dasari
 

Mais procurados (20)

Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
Sap security tasks
Sap security tasksSap security tasks
Sap security tasks
 
165373293 sap-security-q
165373293 sap-security-q165373293 sap-security-q
165373293 sap-security-q
 
Easy dms basic process guide
Easy dms basic process guideEasy dms basic process guide
Easy dms basic process guide
 
Authorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.infoAuthorisation Concept In SAP | http://sapdocs.info
Authorisation Concept In SAP | http://sapdocs.info
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
 
SU01 - Background and Instruction
SU01  - Background and InstructionSU01  - Background and Instruction
SU01 - Background and Instruction
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
Currency conversion in bi 7.0
Currency conversion in bi 7.0Currency conversion in bi 7.0
Currency conversion in bi 7.0
 
Functional specification document_template
Functional specification document_templateFunctional specification document_template
Functional specification document_template
 
SAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview PresentationSAP HCM Structural Authorization Overview Presentation
SAP HCM Structural Authorization Overview Presentation
 
What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16
What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16
What’s New in SAP Extended ECM 16 and SAP Archiving and Document Access 16
 
Charm workflow for urgent changes while adding node
Charm workflow for urgent changes while adding nodeCharm workflow for urgent changes while adding node
Charm workflow for urgent changes while adding node
 
100 sap basis_interviwe_questions
100 sap basis_interviwe_questions100 sap basis_interviwe_questions
100 sap basis_interviwe_questions
 
12753028 scot-configuration-troubleshooting
12753028 scot-configuration-troubleshooting12753028 scot-configuration-troubleshooting
12753028 scot-configuration-troubleshooting
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
 
What is sap security
What is sap securityWhat is sap security
What is sap security
 
OData service from ABAP CDS
OData service from ABAP CDSOData service from ABAP CDS
OData service from ABAP CDS
 

Semelhante a How to analyzing sap critical authorizations

Authorization objects a simple guide.doc (1)
Authorization objects   a simple guide.doc (1)Authorization objects   a simple guide.doc (1)
Authorization objects a simple guide.doc (1)Vikram Polinati
 
Sales order report By Payment Type Extension For Magento User Guide
Sales order report By Payment Type Extension For Magento User GuideSales order report By Payment Type Extension For Magento User Guide
Sales order report By Payment Type Extension For Magento User GuideOscprofessionals
 
HCM_Extract_Changes-Only.pdf
HCM_Extract_Changes-Only.pdfHCM_Extract_Changes-Only.pdf
HCM_Extract_Changes-Only.pdfRameshSelvam12
 
Oracle EBS R12 Payroll user manual
Oracle EBS R12 Payroll user manualOracle EBS R12 Payroll user manual
Oracle EBS R12 Payroll user manualFeras Ahmad
 
CRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.doc
CRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.docCRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.doc
CRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.docKrisStone4
 
Processor Refactoring.pdf
Processor Refactoring.pdfProcessor Refactoring.pdf
Processor Refactoring.pdfDavid Harrison
 
KWC Wood Tracking System TimTracker User Guide
KWC Wood Tracking System TimTracker User GuideKWC Wood Tracking System TimTracker User Guide
KWC Wood Tracking System TimTracker User GuideAristotle Boaitey
 
Sap Sd Sample Questions
Sap Sd Sample QuestionsSap Sd Sample Questions
Sap Sd Sample Questionsraheemkhan4u
 
Microsoft 365 Audit Log Reports - M365 Learning Document
Microsoft 365 Audit Log Reports - M365 Learning DocumentMicrosoft 365 Audit Log Reports - M365 Learning Document
Microsoft 365 Audit Log Reports - M365 Learning DocumentLearning SharePoint
 
What's new from 5.5 to 6.3 linked
What's new from 5.5 to 6.3 linkedWhat's new from 5.5 to 6.3 linked
What's new from 5.5 to 6.3 linkedAces, Inc.,
 
ABAP for Beginners - www.sapdocs.info
ABAP for Beginners - www.sapdocs.infoABAP for Beginners - www.sapdocs.info
ABAP for Beginners - www.sapdocs.infosapdocs. info
 
Sap tr um_dm_meter reading entry screen_v1.0
Sap tr um_dm_meter reading entry screen_v1.0Sap tr um_dm_meter reading entry screen_v1.0
Sap tr um_dm_meter reading entry screen_v1.0UF Technology
 
Work Order Level 1
Work Order Level 1Work Order Level 1
Work Order Level 1EMAINT
 
Operational Company creation in AX v1.3
Operational Company creation in AX v1.3Operational Company creation in AX v1.3
Operational Company creation in AX v1.3Shakil Zaman
 

Semelhante a How to analyzing sap critical authorizations (20)

Authorization objects a simple guide.doc (1)
Authorization objects   a simple guide.doc (1)Authorization objects   a simple guide.doc (1)
Authorization objects a simple guide.doc (1)
 
Sales order report By Payment Type Extension For Magento User Guide
Sales order report By Payment Type Extension For Magento User GuideSales order report By Payment Type Extension For Magento User Guide
Sales order report By Payment Type Extension For Magento User Guide
 
HCM_Extract_Changes-Only.pdf
HCM_Extract_Changes-Only.pdfHCM_Extract_Changes-Only.pdf
HCM_Extract_Changes-Only.pdf
 
Oracle EBS R12 Payroll user manual
Oracle EBS R12 Payroll user manualOracle EBS R12 Payroll user manual
Oracle EBS R12 Payroll user manual
 
Clientadmin
ClientadminClientadmin
Clientadmin
 
Cognos Drill through for the ipad
Cognos Drill through for the ipadCognos Drill through for the ipad
Cognos Drill through for the ipad
 
CRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.doc
CRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.docCRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.doc
CRM Territory Management_C06_CRM702_BB_ConfigGuide_EN_XX.doc
 
Processor Refactoring.pdf
Processor Refactoring.pdfProcessor Refactoring.pdf
Processor Refactoring.pdf
 
KWC Wood Tracking System TimTracker User Guide
KWC Wood Tracking System TimTracker User GuideKWC Wood Tracking System TimTracker User Guide
KWC Wood Tracking System TimTracker User Guide
 
Adi manual
Adi manualAdi manual
Adi manual
 
Sap Sd Sample Questions
Sap Sd Sample QuestionsSap Sd Sample Questions
Sap Sd Sample Questions
 
Remedy Presentation
Remedy PresentationRemedy Presentation
Remedy Presentation
 
Microsoft 365 Audit Log Reports - M365 Learning Document
Microsoft 365 Audit Log Reports - M365 Learning DocumentMicrosoft 365 Audit Log Reports - M365 Learning Document
Microsoft 365 Audit Log Reports - M365 Learning Document
 
Df12 Performance Tuning
Df12 Performance TuningDf12 Performance Tuning
Df12 Performance Tuning
 
JIRA How Tos
JIRA How Tos JIRA How Tos
JIRA How Tos
 
What's new from 5.5 to 6.3 linked
What's new from 5.5 to 6.3 linkedWhat's new from 5.5 to 6.3 linked
What's new from 5.5 to 6.3 linked
 
ABAP for Beginners - www.sapdocs.info
ABAP for Beginners - www.sapdocs.infoABAP for Beginners - www.sapdocs.info
ABAP for Beginners - www.sapdocs.info
 
Sap tr um_dm_meter reading entry screen_v1.0
Sap tr um_dm_meter reading entry screen_v1.0Sap tr um_dm_meter reading entry screen_v1.0
Sap tr um_dm_meter reading entry screen_v1.0
 
Work Order Level 1
Work Order Level 1Work Order Level 1
Work Order Level 1
 
Operational Company creation in AX v1.3
Operational Company creation in AX v1.3Operational Company creation in AX v1.3
Operational Company creation in AX v1.3
 

Mais de Anywhere Gondodza SAP.GRC.FI.B.COM.ACC.HONS (MSU) (6)

Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
How to assign sap business planning and consolidation authorizations via the ...
How to assign sap business planning and consolidation authorizations via the ...How to assign sap business planning and consolidation authorizations via the ...
How to assign sap business planning and consolidation authorizations via the ...
 
Exportto excel
Exportto excelExportto excel
Exportto excel
 
166427325 sap-a udit-management
166427325 sap-a udit-management166427325 sap-a udit-management
166427325 sap-a udit-management
 
5182
51825182
5182
 
5182
51825182
5182
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

How to analyzing sap critical authorizations

  • 1. HOW-TO Use SAP SUIM OR RSUSR008_009_NEW to Analysing Critical Authorisations Leon Ye Contents Preface...................................................................................................................................................................2 Access the Program .........................................................................................................................................2 Analysing Users with Critical Authorisations.......................................................................................3 Defining Critical Authorisations ............................................................................................................3 Create a variant.............................................................................................................................................7 Execute the report variant with critical authorisations. .............................................................8
  • 2. Preface SAP upgraded SUIM (User Information System) which runs program RSUSR008_009_NEW as of SAP Web AS 6.20 with the following Support Packages: SAP Web AS 6.20, as of SAPKB62039 SAP Web AS 6.40, as of SAPKB64003 Access the Program Transaction SUIM Choose User With Critical Authorisations OR, Use transaction SA38 Use Program RSUSR008_009_NEW. Both brings the following screen up
  • 3. Analysing Users with Critical Authorisations You need first define critical authorisations and then combine the critical authorisations into a variant then you run the variant. Defining Critical Authorisations Choose on the initial screen. A dialog box appears: On the left side Dialog Structure it displays four folders, which form two hierarchies:  Variants for Critical Authorisations → Critical Authorisations  Critical Authorisation → Authorisation Data Double click the Critical Authorisation folder and choose Then you can enter the Critical Authorisation IDs or copy from a spread-sheet (see the user contributed documentation under ISACA SAP topic). The following screen is based on the copied information from the SAP Critical Authorisations. Please note that the colour draw down can only be manually chosen one by one.
  • 4. Save your entries. Double click the Authorisation Data folder. A new view appears. Choose New Entries.  Fill out all required fields, with an asterisk (*). Note the following when filling out the fields: o All entries within a group must have the same operand AND or OR. The individual groups are essentially linked with AND. An OR link is not
  • 5. allowed (error messages will be shown when you run the variant later. You can fix any errors then). o You can specify critical data for different authorisation objects within the same group. o If you specify a transaction code for an ID, all authorisation data required to execute the transaction and maintained in transaction SE93 is automatically entered as critical data, after you have confirmed and saved the dialog box. o If you leave the From field empty, the program searches for authorisations with spaces “” for the specified field and object. o If you enter an asterisk (*) in the From field, the report searches for full authorisation for the specified field. o Any errors in the Authorisation Object fields will be picked up as it will not allow you to enter an object or value it does not exist, but for Transactions the system cannot prevent you to put in a non-exist TCODE. o Individual entries cannot be put into the change request, has to be put in as NEW ENTRIES. Example of ZSOS0002
  • 6. The example above was copied from the spreadsheet: Save your entries.
  • 7. Create a variant. Open the folder Variants for Critical Authorizations, and then choose New Entries. Enter the name and description of the variant. Enter or copy the Authorisation ID and Text into the New Entries The above IDs were copied from:
  • 8. Save your entries. Execute the report variant with critical authorisations. On the initial screen of the report
  • 9. Choose For Critical Authorisations Use the input help to select an existing variant, and choose Execute. You can also define a report variant, for example, the above screen shot shows the user group excluded TERMINATED and other user groups which may not be relevant to your analysis.
  • 10. You can use SUIM or report RSUSR008_009_NEW to combine the IDs for critical authorisations in any way, and to create variants with these combinations, for example for segregation of duties purposes. Samples segregation of duties for business cycles and system securities will be published next year. Relevant documents already published on ISACA SAP Topic include o How-to SAP Security Optimisation Self-service o SAP SOS Sample Report o SAP Critical Authorisations