No RFC (3, H) Connection to the SAP Management of Change system
(ABAP/3- and HTTP/H-Connection)
No RFC Connection to the Occupational Health application of
SAP EHS Management as part of the SAP ERP system
No RFC Connection to the Extended Warehouse Management
system
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 63Note
EHS does not provide any authorizations for:
● SAP Management of Change
● Occupational Health of SAP EHS Management as part of SAP ERP
For detailed information about communication destinations, see Customizing for Environment, Health, and Safety
under Foundation for EHS Integration Specify Destinations for Integration .
13.1.2.2 ICF Security in Environment, Health, and Safety
To use an app in Environment, Health, and Safety, you have to activate the internet communication framework
(ICF) service that is needed for this app.
For general information, see ICF Security [page 19] in the Introduction section.
Incident Management
To use Incident Management apps, proceed as follows:
● In your front-end system, open transaction SICF. Under /default_host/sap/bc/ui5_ui5/sap/, activate
the following UI5 services:
○ repincidents1 (Report Incident)
○ injillanalyss1 (Injuries and Illnesses - Detailed Analysis)
○ incdntanalyss1 (Incidents - Detailed Analysis)
● In your back-end system, open transaction SICF. Under /default_host/sap/bc/webdynpro/sap/,
activate all Web Dynpro services that start with ehhss and ehfnd.
Health and Safety Management
To use Health and Safety Management apps, proceed as follows:
● In your front-end system, open transaction SICF. Under /default_host/sap/bc/ui5_ui5/sap/, activate
the following UI5 services:
○ /sap/bc/ui5_ui5/sap/sbrt_appss1 (Approved Chemicals, Risk Overview)
○ /sap/bc/ui5_ui5/sap/ehschm_reps1 (Chemical Risk Report)
○ /sap/bc/ui5_ui5/sap/ehschm_achs1 (Monitor Approved Chemicals)
○ /sap/bc/ui5_ui5/sap/ehscha_mycs1 (My Chemical Approvals)
○ /sap/bc/ui5_ui5/sap/ehsrisk_lsts1 (Monitor Risks)
○ /sap/bc/ui5_ui5/sap/ehsras_lsts1 (My Risk Assessment Projects)
● In your back-end system, open transaction SICF. Under /default_host/sap/bc/webdynpro/sap/,
activate all Web Dynpro services that start with ehhss and ehfnd.
Security Guide for SAP S/4HANA 1709
64 P U B L I C SAP S/4HANA Business ApplicationsEnvironment Management
To use Environment Management apps, proceed as follows:
● In your back-end system, open transaction SICF. Under /default_host/sap/bc/webdynpro/sap/,
activate all Web Dynpro services that start with ehenv and ehfnd.
13.1.2.3 Data Storage Security
Using Logical Path and File Names to Protect Access to the File System
In Environment, Health, and Safety (EHS), the XML export for Incident Management saves data in files in the file
system. Therefore, it is important to explicitly provide access to the corresponding files in the file system without
allowing access to other directories or files (also known as directory traversal). This is achieved by specifying
logical paths and file names in the system that map to the physical paths and file names. This mapping is validated
at runtime and if access is requested to a directory that does not match a stored mapping, then an error occurs.
The following lists show the logical file names and paths used by EHS and for which programs these file names
and paths apply:
Logical File Names Used
The following logical file name has been created in order to enable the validation of physical file names:
● EHHSS_INCIDENTS_XML
○ Program R_EHHSS_ALL_INC_TO_XML is using this logical file name and parameters used in this context.
Logical Path Names Used
The logical file names listed above all use the logical file path EHHSS_BO_XML_EXPORT_PATH.
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information on data storage security, see the respective chapter in the SAP NetWeaver Security Guide.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 6513.1.2.4 Data Protection
Data protection is very important in the following examples:
● In the incident management process, you have critical person-related information regarding absences or
injuries.
● In the health and safety management process, personal data about the risk assessment lead and the other
persons involved in a risk assessment are displayed.
● In the environment management process, data about persons assigned to, compliance scenarios, and
persons involved in tasks of category Action, is displayed.
Environment, Health, and Safety (EHS) assumes that agreements for storage of personal data are covered in
individual work contracts. This also applies to notifications on initial data storage.
For more generic information, see Data Protection [page 27] in the Introduction section.
13.1.2.4.1 Deletion of Personal Data
Use
The Environment, Health, and Safety (EHS) component might process data (personal data) that is subject to the
data protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data in EHS.
For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at http://
help.sap.com/s4hana_op_1709 under Product Assistance Cross Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
The following tables list the relevant application objects and the available deletion functionality for Incident
Management, Health and Safety Management, and Environment Management.
Application Objects and Available Deletion Functionality in Incident Management
Table 31:
Application Objects Provided Deletion Functionality
Incidents Archiving object EHHSS_INC
Incident Summary Reports Archiving object EHHSS_ISR
For more information about application objects and deletion functionality, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under Product Assistance
Enterprise Business Applications Asset Management Environment, Health, and Safety Incident
Management (EHS-SUS-IM) Data Archiving in Incident Management .
Security Guide for SAP S/4HANA 1709
66 P U B L I C SAP S/4HANA Business ApplicationsApplication Objects and Available Deletion Functionality in Health and Safety Management
Table 32:
Application Objects Provided Deletion Functionality
Risk Revisions Archiving object EHHSS_RSV
Risks Archiving object EHHSS_RSK
Risk Assessments Archiving object EHHSS_RAS
Safety Instructions Archiving object EHHSS_SI
Control Evaluations Archiving object EHHSS_CEVL
Control Inspections Archiving object EHHSS_CINS
Control Replacements Archiving object EHHSS_CRPL
Sampling Campaigns Archiving object EHHSS_SPLC
Samplings Archiving object EHFND_SPLG
Chemical Approvals Archiving object EHFND_CHA
Assignment of Person to Locations Archiving object EHFND_LOCP
Assignment of Person to Jobs Archiving object EHFND_JOBP
Sampled Person Data destruction object EHFND_SPLNG_SAMPLED_PERSON
For more information about application objects and deletion functionality, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under Product Assistance
Enterprise Business Applications Asset Management Environment, Health, and Safety Health and Safety
Management (EHS-SUS-HS) Technical Solution Information . You can find the information under the following
nodes:
● Data Archiving in Health and Safety Management
● Data Destruction in Health an Safety Management
Application Objects and Available Deletion Functionality in Environmental Management
Table 33:
Application Objects Provided Deletion Functionality
Compliance Scenario Actions Archiving object EHENV_SAC
For more information about application objects and deletion functionality, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under Product Assistance
Enterprise Business Applications Asset Management Environment, Health, and Safety Environment
Management (EHS-SUS-EM) Data Archiving in Environment Management .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 67Relevant Applications and Available End of Purpose Checks
In addition to destroying data used for incident management, health and safety management, or environment
management processes, EHS provides end of purpose checks (EoP) for central business partners. These checks
determine whether dependent data for a certain central business partner is still relevant for business activities in
EHS.
The following table lists the registered applications and the function module used for the end of purpose checks in
EHS.
Table 34:
Application End of Purpose Check Further Information
Incident Management (EHS_INC) EHHSS_INC_EOP_CHECK_BP The check determines whether the busi
ness partner is used in:
● Incidents
● Tasks in incidents
Health and Safety (EHS_HS) EHHSS_HS_EOP_CHECK_BP The check determines whether the busi
ness partner is used in:
● Risk assessment projects
● Tasks in risk assessment projects
● Risks
● Control inspections
● Control evaluations
● Control replacements
Health and Safety (EHS_HS_EXPOSURE) EHHSS_EXP_EOP_CHECK_BP The check determines whether the busi
ness partner is assigned to:
● Job positions
● Location positions
● Samplings as sampled person
Environment Management (EHS_ENV) EHENV_EOP_CHECK_BP The check determines whether the busi
ness partner is used in tasks of category
Action.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing
under Cross-Application Components Data Protection Blocking and Unblocking of Data Business
Partner .
Security Guide for SAP S/4HANA 1709
68 P U B L I C SAP S/4HANA Business Applications13.1.2.4.2 Read Access Logging of Personal Data in Incident
Management
Use
In Read Access Logging (RAL), you can configure which read-access information to log and under which
conditions.
SAP delivers sample configurations for applications.
Incident Management logs data of illnesses or injuries that are maintained in the Edit Incident screen (web dynpro
application EHHSS_INC_REC_OIF_V3). Since this information is potentially sensitive and access to this
information is in some cases legally regulated, you can use RAL to log the date when the data was accessed and
by whom.
In the following configurations, the following fields are logged:
Table 35:
Configuration Fields Logged Business Context
Involved Person - Basic Information Logs basic information of the person
● Injured Person Name who is involved in the incident.
● Phone Number
● Email
Role(s)
Incident Type
Privacy Case
Injured on Site
Injured on Duty
Additional Criteria
Fatality
Location of Death
Cause of Death
Statement of Involved Person
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 69Configuration Fields Logged Business Context
Involved Person - Injury-Illness Informa Logs information on the injuries or the ill
tion ● Injured Person Name ness of the person who is involved in the
incident.
● Phone Number
● Email
Classification
Injury/Illness Type
Injury/Illness Description
Body Part
Body Part Description
Body Side
Involved Person - Treatment Information Logs information on the treatment of the
● Injured Person Name person who is involved in the incident.
● Phone Number
● Email
First Physician
Further Treatment Provider
Treatment Beyond First Aid
Emergency Room
Inpatient Overnight
Unconsciousness
Immediate Resuscitation
Comment
To First Aid
To Further Treatment
Involved Person - Reports and Docu Logs the files of reports and documents
ments ● Injured Person Name that are assigned to the involved person.
● Phone Number
● Email
File Name (of report forms)
File Name (of documents)
Security Guide for SAP S/4HANA 1709
70 P U B L I C SAP S/4HANA Business ApplicationsConfiguration Fields Logged Business Context
Incident - Reports and Documents File Name (of report forms) Logs the files of reports and documents
that are assigned to the incident.
Reference (Report forms of person refer
ences)
File Name (of documents)
Reference (documents of person refer
ences)
Further Information
You can find the configurations as described in the Read Access Logging [page 29] chapter.
13.1.2.5 Virus Scanning
The interactive forms of Environment, Health, and Safety (EHS) can contain Java Script. Therefore, Java Script
must be enabled in Adobe Acrobat Reader. In addition, e-mails with PDF attachments that contain Java Script
must not be filtered out in the e-mail inbound and outbound process.
For more generic information see Virus Scanning [page 21] in the Introduction section.
13.1.2.6 Other Security-Relevant Information
The following information is relevant for the security of Environment, Health, and Safety (EHS).
13.1.2.6.1 Dispensable Functions with Impacts on Security
Environment, Health, and Safety (EHS) can be integrated with HR Time Management in Customizing. If the
personnel time management (PT) integration is activated, time data (including absences) from HR is displayed in
the incident. An additional option is available to trigger the creation HR Absences from the incident. For all
actions, HR authorizations are checked.
13.1.2.6.2 Security Settings for the Report Incident App
You use the SAP Cloud Platform, mobile service for SAP Fiori to implement the app Report Incident. For more
information on the security settings of the SAP Cloud Platform, mobile service for SAP Fiori, see the SAP Help
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 71Portal at https://help.sap.com . There, search for SAP Cloud Platform, mobile service for SAP
Fiori User Guide.
13.1.3 Resource Scheduling
13.1.3.1 Authorizations for Resource Scheduling
SAP S/4HANA Asset Management for resource scheduling uses the authorization concept provided by SAP
NetWeaver AS for ABAP. Therefore, the recommendations and guidelines for authorizations as described in the
SAP NetWeaver AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
SAP delivers a standard business role. You can use this role as a template for creating your own role in the front-
end system.
Table 36:
Role Description
SAP_BR_MAINTENANCE_PLANNER_RSH Maintenance Planner - Resource Scheduling
Please note that this business role must be created in the
front-end system.
SAP does not deliver a back-end role for resource scheduling. You must create your own role in the back-end
system using transaction PFCG. To this role, you must assign the relevant authorization objects.
Standard Authorization Objects
The following table shows the security-relevant authorization objects that are used. Please make sure that
authorizations for app users (maintenance planners) are configured according to their role and responsibilities.
Security Guide for SAP S/4HANA 1709
72 P U B L I C SAP S/4HANA Business ApplicationsTable 37:
Authorization Object Description
I_TCODE PM: Transaction Code
This authorization object determines which transactions a
user may perform in the PM area.
Note
Make sure that app users are authorized for transaction
IW38.
I_AUART PM: Order Type
This authorization allows you to control which users have ac
cess to orders and historical orders in a particular plant.
I_BEGRP PM: Authorization Group
You can use this authorization object to control which groups
of master data a user can display, create or change.
I_IWERK PM: Maintenance Planning Plant
Using this authorization object, you can control which users
may edit PM data with which transactions in the planning
plants.
I_INGRP PM: Maintenance Planner Group
You can use this authorization to control which users can dis
play, change or create objects associated with a particular
maintenance planner group.
I_SWERK PM: Maintenance Plant
Using this authorization object, you can control which users
may edit PM data with which transactions in the maintenance
plants.
I_KOSTL PM: Cost Centers
You can use this authorization to control which users can dis
play, change or create objects associated with a particular
cost center.
C_ARPL_ART CIM: Work center category
With this authorization object, you can limit the authorization
to create, change and display work centers depending on the
work center category.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 73Authorization Object Description
C_ARPL_WRK CIM: Work center- plant
With this authorization object, you can restrict:
● The maintenance of work centers/resources, work cen
ter/resourcer hierarchies, and capacities to certain ac
tions (e.g. change or display) in certain plants
● The maintenance of downtimes, independent of plant
C_AFKO_ACT Activities on network header level
Using this authorization object, you control the maintenance
of data for the network header and possible actions at the
header level.
C_AFKO_AWK CIM: Plant for order type of order
This authorization object can be used to limit the maintenance
of production orders with respect to order type and plant.
C_AFKO_DIS Network: MRP Group (Plant) and Transaction Type
With this authorization object, you can limit the maintenance
of networks with regard to MRP controller and plant.
C_AFVG_APL PS: Work Center for Network Activities and Activity Elements
You can use this authorization object to control who can ac
cess activities and activity elements the Project System de
pending on the work center.
C_AFVG_TYP PS: Activity types for network act. and activity elements
You can use this authorization object to control who can ac
cess activities and activity elements in the Project System de
pending on the activity category.
C_TCLA_BKA Authorization for Class Types
This authorization defines access to classes via the class type.
It is checked in all functions that use the classification system
to classify objects or maintain classes
I_QMEL PM/QM: Notification Types
You can use this authorization to control which users can ac
cess notifications of a particular notification type.
Security Guide for SAP S/4HANA 1709
74 P U B L I C SAP S/4HANA Business Applications13.2 Commerce
13.2.1 Commerce Management
13.2.1.1 Convergent Invoicing, Receivables Mngmt and
Payment Handling
The following section provides an overview of the security-relevant information that applies to Convergent
Invoicing and Receivable Management and Payment Handling as part of Contract Accounts Receivable and
Payable (FI-CA).
13.2.1.1.1 Authorizations
Business Roles
The following business roles are provided:
● SAP_BR_APR_MANAGER_FICA (Accounts Payable and Receivable Manager (FI-CA))
● SAP_BR_APR_ACCOUNTANT_FICA (Accounts Payable and Receivable Accountant (FI-CA))
● SAP_BR_INVOICING_SPEC_CINV (Invoicing Specialist (Convergent Invoicing))
● SAP_BR_INVOICING_MANAGER_CINV (Description: Invoicing Manager (Convergent Invoicing))
Standard Authorization Objects
You can easily recognize the authorization objects currently used in Contract Accounts Receivable and Payable
(FI-CA) from their technical name as follows:
1. In the SAP Easy Access menu choose Tools Administration User Maintenance Information System
Authorization Objects By object name .
2. Enter F_KK* in the Authorization Object field and execute your search.
In the result list, you can display the details for each selected authorization object such as authorization fields,
documentation and permitted activities, if defined.
In addition, for the Clarification Processing area, the authorization object S_CFC_AUTH exists; for the
Correspondence area, the authorization object P_CORR; and for prepaid processing, authorization objects exist
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 75that follow the naming convention F_PREP*. You can use Customizing roles to control access to the configuration
of Contract Accounts Receivable and Payable (FI-CA) in the SAP Customizing Implementation Guide (IMG).
13.2.1.1.2 Data Storage Security
Contract Accounts Receivable and Payable (FI-CA) saves data in files in the file system. Therefore, it is important
to explicitly provide access to the corresponding files in the file system without allowing access to other
directories or files (also known as directory traversal). This is achieved by specifying logical paths and file names
in the system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
The following list shows the logical file names and paths used by Contract Accounts Receivable and Payable (FI-
CA) and for which programs these file names and paths apply:
Logical File Names Used in FI-CA and Logical Path Names
The following logical file names have been created in order to enable the validation of physical file names:
Table 38:
Program Logical File Name Used by the Pro Logical Path Name Used by the Pro
gram gram
RFKIBI_FILE00 FICA_DATA_TRANSFER_DIR FICA_DATA_TRANSFER_DIR
RFKIBI_FILEP01
RFKKBI_FILEEDIT
RFKKBIBG
RFKKZEDG
RFKKRLDG
RFKKCMDG
RFKKCRDG
RFKKAVDG
RFKKBIB0
RFKKZE00
RFKKRL00
RFKKCM00
Security Guide for SAP S/4HANA 1709
76 P U B L I C SAP S/4HANA Business ApplicationsRFKKCR00
RFKKAV00
RFKKKA00
RFKKBIT0
RFKKPCSF FI-CA-CARD-DATA-S FI-CA-CARD-DATA-S
RFKKPCDS
RFKKCVSPAY FI-CA-CVS FI-CA-CVS
RFKK_CVSPAY_CONFIRM
RFKKCVSCONFIRMDB
RFKK_CVSPAY_CONFIRM_TEST
RFKK_DOC_EXTR_EXP FI-CA-DOC-EXTRACT-DIR FI-CA-DOC-EXTRACT-DIR
RFKK_DOC_EXTR_AEXP
RFKK_DOC_EXTR_IMP
RFKK_DOC_EXTR_EXTR
RFKK_DOC_EXTR
RFKK_DOC_EXTR_DEL
Class CL_FKK_TEXT_FILE
RFKKBIXBITUPLOAD FI-CA-BI-SAMPLE FI-CA-BI-SAMPLE-DIR
FI-CA-BI-SAMPLE-DIR
RFKKCOL2 FI-CA-COL-SUB FI-CA-COL-SUB
RFKKCOLL
Transaction FP03DM (Mass Activity)
Transaction FPCI (Mass Activity) FI-CA-COL-INFO FI-CA-COL-INFO
RFKKCOPM FI-CA-COL-READ FI-CA-COL-READ
READFILE
RFKKCOPG FI-CA-COL-TEST FI-CA-COL-TEST
RFKKRDI_REPORT FI-CA-RDI FI-CA-RDI
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 77RFKKRDI_REPORT_DIS
SAPFKPY3 FI-CA-DTA-NAME FI-CA-DTA-NAME
RFKKCHK01 FI-CA-CHECKS-EXTRACT FI-CA-CHECKS-EXTRACT
Class CL_FKK_INFCO_SEND FI-CA-INFCO FI-CA-INFCO
RFKKBE_SAL1 FICA_BE_SAL FICA_BE_SAL
RFKKBE_SAL2 FICA_BE_SAL_XML FICA_BE_SAL_XML
RFKK1099 FI-CA-1099 FI-CA-1099
RFKKOP03 FICA_OPEN_ITEMS FICA_OPEN_ITEMS
RFKKOP04
RFKKOP07
RFKKES_SAL1 FICA_TAX_REP_GEN FICA_TAX_REP_GEN
RFKKES_SAL2
RFKKRDI_REPORT FI-CA-RDI FI-CA-RDI
RFKKRDI_REPORT_DIS
Transaction EMIGALL ISMW_FILE ISMW_ROOT
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information about data storage security, see the chapter in the SAP NetWeaver Security Guide.
13.2.1.1.3 Data Protection
Contract Accounts Receivable and Payable (FI-CA) might process data (personal data) that is subject to the data
protection laws applicable in specific countries.
Contract Accounts Receivable and Payable (FI-CA) uses SAP ILM to support the deletion of personal data as
described in the following sections. SAP delivers end of purpose checks for Contract Accounts Receivable and
Payable (FI-CA). You register the end of purpose check (EoP) in the Customizing settings for the blocking and
deletion of the business partner.
Security Guide for SAP S/4HANA 1709
78 P U B L I C SAP S/4HANA Business ApplicationsFor information about the Customizing of blocking and deletion for Contract Accounts Receivable and Payable,
see Configuration: Simplified Blocking and Deletion below. Displaying Blocked Data.
Also, see the sections mentioned below in the Product Assistance of Contract Accounts Receivable and Payable
under Basic Functions SAP Business Partner Blocking and Deleting Personal Data .
Display of Blocked Data
Only if a user has special authorization, is it possible to display blocked business partner master data. However, it
is still not possible to create, change, copy, or perform follow-up activities on this blocked business partner data.
However, FI-CA-specific data relating to a blocked business partner (as for example the contract account) users
can display without having special authorization. For more information, see Displaying Personal Data.
Relevant Application Objects and Available Deletion Functionality
For more information, see the following sections of the application documentation:
● Blocking and Deleting Personal Data
● Deleting Business Partners
● Dealing with Personal Data Outside the Business Partner
Relevant Application Objects and Available EoP functionality
For more information, see section Check for End of Purpose in Contract Accounts Receivable and Payable.
Process Flow
Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM. You choose whether data deletion is required for data stored in archive files or data stored in
the database, also depending on the type of deletion functionality available. You do the following:
1. Run transaction IRMPOL and maintain the required residence and retention policies for the central business
partner (ILM object: CA_BUPA).
2. Run transaction FPDPR_BP_INIT once for existing business partners for which you want to execute the end
of purpose checks. New business partners you create are automatically included in the end of purpose
checks.
3. Run transaction FPDPR1 to prepare the end of purpose check of the central business partner.
The function module MKK_BUPA_EOP_CHECK saved for Contract Accounts Receivable and Payable (FI-CA) in
table BUTEOPFM provides the EoP check result obtained by transaction FPDPR1 to transaction
BUPA_PRE_EOP.
4. Run transaction BUPA_PRE_EOP to enable the end of purpose check function for the central business partner.
Business users can request unblocking of blocked data by using the transaction BUP_REQ_UNBLK.
If you have the needed authorizations, you can unblock data by running the transaction BUPA_PRE_EOP.
You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of Contract Accounts Receivable
and Payable (FI-CA).
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
Define the settings for authorization management under Authorization Management. For more information, see
the Customizing documentation.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 79Define the settings for blocking under Blocking and Unblocking Business Partner . For more information, see the
Customizing documentation.
You configure the settings specific for Contract Accounts Receivable and Payable in the Customizing for Contract
Accounts Receivable and Payable under Technical Settings Data Protection and Data Deletion. For more
information, see the Customizing documentation.
13.2.1.1.4 Payment Card Security According to PCI-DSS
Note
The Payment Card Industry Data Security Standard (PCI-DSS) was jointly developed by major credit card
companies in order to create a set of common industry security requirements for the protection of cardholder
data. Compliance with this standard is relevant for companies processing credit card data. For more
information, see http://www.pcisecuritystandards.org .
The following sections of the security guide support you in implementing payment card security aspects and
outline steps that need to be considered to be compliant with the PCI-DSS.
Please note that the PCI-DSS covers more than the steps and considerations given here. Complying with the
PCI-DSS lies completely within the customer''s responsibility, and we cannot guarantee the customer''s
compliance with the PCI-DSS.
For current information about PCI-DSS in general, see SAP Note 1609917 .
Contract Accounts Receivable and Payable (FI-CA) processes all payment transactions with your business
partners. For this purpose, Contract Accounts Receivable and Payable also processes credit card data. For
processing credit card transactions, Contract Accounts Receivable and Payable follows the rules laid down by the
Payment Card Industry Data Security Standard.
Credit card data arrives in Contract Accounts Receivable in the following ways:
● You receive documents, which already contain credit card data in their supplements, by means of the IDoc
interface or by means of BAPIs.
● You receive payments that already contain credit card data with the payment lot transfer program
(RFKKZE00).
● External payment collectors and external cash desk services transfer credit card data using enterprise
services with the payment to Contract Accounts Receivable and Payable.
● Financial Customer Care transfers credit card data for documents from SAP Customer Relationship
Management using RFC.
● Customers or your employees add credit card data as follows:
○ Employees enter credit card data in the master records of business partners and prepaid accounts.
○ Employees enter payment card data in the Maintain Bank Data (FPP4) transaction.
○ Employees enter credit card data for payments in the cash desk, in the cash journal, in payment
specifications and in promises to pay.
○ Customers enter credit card data online in SAP Biller Direct. SAP Biller Direct transfers the data to
Contract Accounts Receivable and Payable.
● You adopt billable items with payment information using the generated RFC interfaces /1FE/_BIT_CREATE_API.
Security Guide for SAP S/4HANA 1709
80 P U B L I C SAP S/4HANA Business Applications● You create EDRs of the type AMOUNT using function module FKKBI_EDR_AMOUNT_CREATE.
The program for payment (such as the payment run or the cash desk) generates payment documents with
supplements containing the credit card data. Contract Accounts Receivable and Payable transfers this credit card
data to the payment card company or the clearing house using transaction FPPCDS (creation of file) or FPCS
(online transfer).
Contract Accounts Receivable and Payable stores the data as follows:
Table 39:
Object Table(s)
Business Partner Master Record BUT0CC
CCARD
Payments in Payment Lot or Credit Card Lot DFKKZP
Document DFKKOPC
DFKKOPKC
DFKK_PCARD
Payment Data for a Payment Run DPAYH
Payment Data for a Payment Using SAP Biller Direct or Finan DFKKOPC
cial Customer Care
Payment Specifications DFKKIP_GRP
Promises to Pay DFKKPPD_PAY
Master Record of Prepaid Account FKKPREPACC
Billable Items Generated tables:
● /1FE/00PY
● /1FE/01PY
You must restrict the display of the necessary objects by assigning authorizations, while at the same time
ensuring that this authorization protection cannot be circumvented by database programs or customer-specific
ABAP reports.
You can also make additional security settings for payment card data. For more information, see SAP Note
1032588 and the SAP S/4HANA Security Guide for “Payment Card Security”.
Archiving
Only masked credit card information can be archived. Clear text credit card information should not be archived.
Archiving encrypted credit card information is problematic because archived data should not be changed.
Encrypted credit card information has to be re-encrypted with a different key, for example, with key rotation, as
required by PCI-DSS. This change of data is not possible in an archive.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 81In technologies that are agnostic to the semantics of the data, such as Process Integration (PI), ABAP Web
Services, or Forward Error Handling (FEH), archiving has to be disabled. IDocs that contain credit card
information should not be archived.
Interfaces (IDoc/Services)
Caution
According to PCI-DSS, IDoc segments are not allowed to store payment card numbers in clear text. However,
during processing of an IDoc in the IDoc Framework, all values are stored temporarily, including the clear text
credit card number. For more information about how to process your own IDocs containing credit card
information, see the SAP NetWeaver Security Guide under Security Guides for Connectivity and
Interoperability Technologies Security Guide ALE (ALE Applications) in SAP NetWeaver Release 7.30 .
If you exchange data between systems using IDoc messages, and this data contains unencrypted credit card
information, you have to implement access restrictions and a deletion concept at the level of the file system.
Contract Accounts Receivable and Payable processes payment card data in the following interfaces:
Table 40:
Type of Interface Technical Name Description
BAPI BAPI_CTRACPREPAIDACCOUNT_CREA BAPI - FI-CA Prepaid Account: Create
BAPI BAPI_CTRACPREPAIDACCOUNT_CHNG BAPI - FI-CA Prepaid Account: Change
BAPI BAPI_CTRACPREPAIDACCOUNT_GETD BAPI - FI-CA Prepaid Account: Read
Detail Data
BAPI BAPI_CTRACDOCUMENT_CREATE BAPI: FI-CA Post Document
RFC FKK_PREP_PCARD_STORE Prepaid: Store Payment Data in
DFKK_PCARD
RFC Event 1421 (function module Parallel Billing: Call Settlement
FKK_SAMPLE_1421)
RFC FKK_BUPA_MAINTAIN_SINGLE Maintain Business Partner
RFC /1FE/ IDoc:
ALE_CTRACDOCUMENT_CREATE(FI-CA
Post document)
RFC Debugging
Caution
Disable RFC debugging when you process credit card information in a productive system. Do not activate the
Set RFC Trace option in your productive system. If this option is active, the system saves all input data of an
RFC call in clear text to a file. If credit card numbers (PAN) are included in calls to some function module, then
this data would be stored to this file. Since these numbers have to be stored encrypted according to the PCI-
DSS standard, activating this option would result in no longer being PCI compliant.
Forward Error Handling (FEH)
Caution
Disable Forward Error Handling for all services that contain credit card numbers in SAP Customizing.
Card Verification Values (CVV)
Caution
Do not process asynchronous services that contain a card verification code (CAV2, CID, CVC2, CVV2) or their
values.
Please note that in SAP services, these values correspond to the GDT
PaymentCardVerificationValueText. The reason is that the payload of asynchronous services is
persisted in the database until the service is processed and persisting card verification values is not allowed
according to PCI-DSS.
Synchronous services can be processed because their payload is not persisted.
13.2.1.1.5 Other Security-Relevant Information
In Contract Accounts Receivable and Payable (FI-CA), some objects and special activities are protected by special
authorizations. The associated authorization object is F_KK_SOND. See table TFKAUTH (use transaction SM30 to
display) for information on all activities that you can protect with this authorization object.
13.3 Finance
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 8313.3.1 Financial Accounting
Network and Communication Security
Communication with external systems takes place using the standard channels provided by SAP basis
technology:
● Application Link Enabling(ALE)/IDoc
● Standard interfaces to BI, CRM, and SRM systems
● Batch-Input
Ensure that no unauthorized access can take place at the time of data transfer using encryption and with the
help of your network.
● Remote Function Call(RFC) / Business Application Programming Interface (BAPI)
● File Interface
Ensure that no unauthorized access can take place at the time of data transfer using encryption and with the
help of your network.
● SAP Process Integration (PI)
● E-mail, fax
Example
○ Financial Accounting has interfaces to Taxware and Vertex software used for performing tax
calculations.
○ Electronic advance return for tax on sales/purchases:
○ There is an interface for the electronic advance return for tax on sales and purchases using Elster.
Communication takes place by means of XI.
○ You can digitally sign the electronic advance return for tax on sales/purchases.
○ Payments and payment advice notes are dispatched using IDoc, and dunning notices are sent by e-
mail or fax.
Communication Destinations
All the technical users generally available can be used.
Data Storage Security
Many of the Financial Accounting transactions access sensitive data. Access to this kind of data, such as financial
statements, is protected by standard authorization objects.
Security Guide for SAP S/4HANA 1709
84 P U B L I C SAP S/4HANA Business Applications13.3.1.1 Authorizations in Financial Accounting
The following table shows the security-relevant authorization objects that are used by Financial Accounting.
For additional authorization objects that are specific to the components in Financial Accounting (such as FI-GL
and FI-SL), see the corresponding sections of this Security Guide.
Standard Authorization Objects in Financial Accounting
Table 41:
Authorization Object Description
F_WEB_ADRS Display/Change of Address Data via Web Interface
F_KKINTER Authorization for Interest Posting
F_PAYRQ Authorization Object for Payment Requests
F_BKPF_BLA Accounting Document: Authorization for Document Types
F_BKPF_BUK Accounting Document: Authorization for Company Codes
F_BKPF_BUP Accounting Document: Authorization for Posting Periods
F_BKPF_GSB Accounting Document: Authorization for Business Areas
F_BKPF_KOA Accounting Document: Authorization for Account Types
F_BKPF_VW Accounting Document: Display/Change Default Values Docu
ment Type/Posting Key
F_PAYOH_AV Release and Rejection Reasons
F_FBCJ Cash Journal: General Authorization
F_KK_CJROL Cash Journal: Maintenance of Responsibilities
F_KMT_MGMT Account Assignment Model: Authorization for Maintenance
and Use
F_WTMG Withholding Tax Changeover
FOT_B2A_V Admin. Report Electronic Data Transmission to Authorities
FINS_MIG Authorization object for migration to SAP Simple Finance, On-
Premise Edition
FQM_FLOW Authorization object for Financial Quantity Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 8513.3.1.2 Deletion of Personal Data in Financial Accounting
Use
The Financial Accounting (FI) component might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 42:
Application Object Provided Deletion Functionality
FI documents ILM object FI_DOCUMNT (SAP note 2011278 )
Bank statement ILM object FI_ELBANK
Check management ILM object FI_SCHECK
Interest data ● Deletion report RFINTITDEL_DES
● ILM object FI_INTEREST_DESTRUCTION (SAP note
1926249 )
Payment data Deletion report SAPF110R
Payment order Deletion report RFPYORDD
Dunning data ● Deletion report SAPF150R_DES
● ILM object FI_DUNNING_DESTRUCTION (SAP note
1932584 )
Cash Journal data ILM object FI_TCJ_DOC (SAP note 1949312 )
Payment requests ILM object FI_PAYRQ (SAP note 2005535 )
Payment advice data Deletion report RFAVIS20
Error correction system (ECS) ILM object GLE_ECS (SAP note 1900413 )
Down payment chain ILM object /SAPPCE/DP (SAP note 1876387 )
Accounting interface posting data ILM object MM_ACCTIT
Security Guide for SAP S/4HANA 1709
86 P U B L I C SAP S/4HANA Business ApplicationsApplication Object Provided Deletion Functionality
Asset Accounting ILM object AM_ASSET (SAP note 1860049 )
Available Check
Implemented Solution: End of Purpose Check
For more information, see SAP note 2018575 .
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in
Customizing for Cross-Application Components under Data Protection.
13.3.1.3 General Ledger Accounting (FI-GL)
13.3.1.3.1 Authorizations
The following table shows the business roles that are used by the FI-GL component.
Business Roles in General Ledger Accounting
Table 43:
Role Description
SAP_BR_EXTERNAL_AUDITOR External Auditor
SAP_BR_GL_ACCOUNTANT General Ledger Accountant
Standard Authorization Objects
The following table shows the security-relevant authorization objects that are used by the FI-GL component.
Standard Authorizations in General Ledger Accounting
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 87Table 44:
Authorization Object Description
F_ACE_PST Accrual Engine: Accrual Postings
F_ACE_DST Accrual Engine: Accrual Objects
F_INVRPMAT Authorization for Material Journal (Inventory Info System)
F_INVRPWIP Authorization for WIP Journal (Inventory Info System)
GLE_ECS Authorization Check for Changing ECS Items
F_T011 Financial Statements: General Maintenance Authorization
F_BKPF_BES Accounting Document: Account Authorization for G/L Ac
counts
F_FAGL_CV Customizing Versions
F_FAGL_SKF FI: Processing of Statistical Key Figures
F_FAST_CLS Fast Close Authorizations
F_FAGL_LDR General Ledger: Authorization for Ledger
F_FAGL_DRU General Ledger: Authorization for Rule Entries for Validation
F_REORG_PL General Ledger: Authorization for Reorganization
F_FAGL_SEG General Ledger: Authorization for Segment
F_FAGL_SLL General Ledger: Authorization to Switch Leading Ledger
F_RPROC Intercompany Reconciliation: Authorizations
FAGL_INST Customer Enhancements for General Ledger
F_T011_BUK Planning: Authorization for Company Codes
F_SKA1_BUK G/L Account: Authorization for Company Codes
F_SKA1_KTP G/L Account: Authorization for Charts of Accounts
F_SKA1_BES G/L Account: Account Authorization
F_SKA1_AEN G/L Account: Change Authorization for Certain Fields
K_TP_VALU Transfer Price Valuations
Security Guide for SAP S/4HANA 1709
88 P U B L I C SAP S/4HANA Business Applications13.3.1.3.2 Data Storage Security
Logical Path and File Names
The FI-GL component saves data in files in the file system. Therefore, it is important to explicitly provide access to
the corresponding files in the file system without allowing access to other directories or files (also known as
directory traversal). This is achieved by specifying logical paths and file names in the system that map to the
physical paths and file names. This mapping is validated at runtime and if access is requested to a directory that
does not match a stored mapping, then an error occurs.
The following lists show the logical file names and paths used by the FI-GL component. They also show the
programs for which these file names and paths apply.
Logical File Names and Paths for FI-GL and FI-SL
Logical File Names
The following logical file names have been created to enable the validation of physical file names:
● FI_COPY_COMPANY_CODE_DATA_FOR_GENERAL_LEDGER_0X
○ Programs using this logical file name:
○ RFBISA00
○ RFBISA01
○ RFBISA51
○ Parameter used in this context:
○ Program Name
● FI_INFOSYS_TRANSPORT
○ Programs using this logical file name:
○ RGRJTE00
○ RGRLTE00
○ RGRMTE00
○ RGRRTE00
○ RGRSTE00
○ RGRVTE00
○ RGRXTE00
○ RGSSTE00
○ RGSVTE00
○ RGRJTI00
○ RGRMTI00
○ RGSSTI00
○ RGSVTI00
○ Parameter used in this context:
○ Program name
● FI_VALUATION
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 89○ Programs using this logical file name:
○ FAGL_FCV
○ FAGL_FC_VALUATION
○ SAPF100
○ Parameters used in this context:
○ Program name
○ Key date (from the selection screen)
○ Valuation area (from the selection screen) for FAGL_FCV and FAGL_FC_VALUATION
valuation method (from the selection screen) for SAPF100
Logical Path Names
The logical file names listed above all use the logical file path FI_ROOT.
Logical File Names and Paths for FI-GL-IS (Information System)
Logical File Names
The following logical file names have been created to enable the validation of physical file names:
● FI_EXTERNAL
Programs using this logical file name and parameters used in this context:
Table 45:
Program
RFAWVZ58 Program name (SY-REPID) String ''AWV'' Parameter ''Key Date''
RFAWVZ5A Program name (SY-REPID) String ''AWV'' Parameter ''Key Date''
RFAWVZ5P Program name (SY-REPID) String ''AWV''
RFAWVZ5A_NACC Program name (SY-REPID) String ''AWV'' Parameter ''Key Date''
RFAWVZ5P_NACC Program name (SY-REPID) String ''AWV''
RFBIDET0 Program name (SY-REPID) Parameter ''Client''
RFBIKRT0 Program name (SY-REPID) Parameter ''Client''
RFFR0E84 Program name (SY-REPID) Parameter ''Customers/ Parameter ''Key Date''
vendors''
RFFRDDE0 Program name (SY-REPID) Parameter ''Company Code'' Parameter ''Type''
RFFRLIST Program name (SY-REPID)
RFFRMOD1 Program name (SY-REPID)
Security Guide for SAP S/4HANA 1709
90 P U B L I C SAP S/4HANA Business ApplicationsRFIDPTFO Program name (SY-REPID) Concatenated parameters String ''READ'' or ''WRITE''
__
RFLBOX00 Program name (SY-REPID) Parameter ''Procedure'' Parameter ''Input Record
Format''
RFLBOX80 Program name (SY-REPID) Parameter ''Procedure'' Parameter ''Input Record
Format''
RFLBOXIN Program name (SY-REPID) String ''LOCKBOX'' String ''BAI''
RFSBLIW0 Program name (SY-REPID)
● FI_POSTING
Programs using this logical file name and parameters used in this context:
Table 46:
Program
RFBIBLT0 Program name (SY-REPID)
RFEBCK00 Program name (SY-REPID) Parameter ''Document Type'' Parameter ''Session name''
RFEBCKT0 Program name (SY-REPID)
SAPF100A Program name (SY-REPID) Parameter ''Key Date''
● FI_TAX
Programs using this logical file name and parameters used in this context:
Table 47:
Program
RFASLD02 Program name (SY-REPID) Parameter year for ''Report Parameter ''Reporting Quar
ing Quarter'' ter''
RFASLD11 Program name (SY-REPID) Parameter year for ''Report Parameter ''Reporting Quar
ing Quarter'' ter''
RFASLD11B Program name (SY-REPID) Parameter year for ''Report Parameter ''Reporting Quar
ing Quarter'' ter''
RFUMPT00 Program name (SY-REPID) Parameter ''Company Code''
RFUSVB10 Program name (SY-REPID) Parameter ''Posting Date'' Parameter ''Posting Date''
(lower value) (higher value)
RFKQSU30 Program name (SY-REPID)
RFUMPT00 Program name (SY-REPID)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 91RFUSVS12 Program name (SY-REPID) Parameter ''Entity Responsi See note 1
ble''
RFUSVS14 Program name (SY-REPID) Concatenated parameters See note 1
_
RFUVPT00 Program name (SY-REPID) Parameter ''Company Code'' See note 2
Notes:
○ Note 1
If the file specified in the parameter “File for Leasing” is accessed, PARAM_3 contains the value READ;
consequently, the file content is read only and added to the output file.
If the file specified in the parameter “UNIX File for Output” is accessed, PARAM_3 contains the value
“WRITE”.
○ Note 2
If the file listed in the parameter “File Name - Application Server” on the “Periodic File O” tab page is
accessed, PARAM_3 contains the string PERIOD_WRITE.
If the file listed in the parameter “ECSL File Name (AS)” on the “Periodic File O” tab page is accessed,
PARAM_3 contains the string PERIOD_READ.
If the file listed in the parameter “XML File App. OP” on the “Annual File O/P” tab page is accessed,
PARAM_3 contains the string YEAR_READ.
If the file listed in the parameter “File Name - Application Server” on the “Annual File O/P” tab page is
accessed, PARAM_3 contains the string YEAR_WRITE.
● FI_RFASLD12_FILE
Programs using this logical file name and parameters used in this context:
Table 48:
Program
RFASLD02 Program name (SY-CPROG)
Logical Path Names
The logical file names listed above use the following logical file paths:
Table 49:
Logical File Name Logical File Path
FI_EXTERNAL FI_ROOT
FI_POSTING
FI_TAX
FI_RFASLD12_FILE FI_ERVJAB_FILE_PATH
Security Guide for SAP S/4HANA 1709
92 P U B L I C SAP S/4HANA Business Applications13.3.1.4 Accounts Payable Accounting (FI-AP)
Business Roles in Accounts Payable Accounting
Table 50:
Role Description
SAP_BR_AP_ACCOUNTANT Accounts Payable Accountant
SAP_BR_AP_MANAGER Accounts Payable Manager
Authorization Objects That Are Used by Accounts Payable and Accounts
Receivable
Table 51:
Authorization Object Description Customer Vendor G/L Accounts
F_AVIK_BUK Payment Advice Note: X X
Authorization for Com
pany Codes
F_BKPF_BED Accounting Document: X
Account Authorization
for Customers
F_BKPF_BEK Accounting Document: X
Account Authorization
for Vendors
F_BKPF_BES Accounting Document: X
Account Authorization
for G/L Accounts
F_BKPF_BLA Accounting Document: X X X
Authorization for Docu
ment Types
F_BKPF_BUK Accounting Document: X X X
Authorization for Com
pany Codes
F_BKPF_BUP Accounting Document: X X X
Authorization for Post
ing Periods
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 93Authorization Object Description Customer Vendor G/L Accounts
F_BKPF_GSB Accounting Document: X X X
Authorization for Busi
ness Areas
F_BKPF_KOA Accounting Document: X X X
Authorization for Ac
count Types
F_BNKA_BUK Banks: Authorization X X
for Company Codes
F_FAGL_LDR General Ledger: Au X
thorization for Ledger
F_FAGL_SEG General Ledger: Au X
thorization for Seg
ment
F_KNA1_BED Customer: Accounts X
Authorization
F_KNA1_BUK Customer: Authoriza X
tion for Company Co
des
F_KNA1_GEN Customer: Central Data X
F_KNA1_GRP Customer: Accounts X
Group Authorization
F_KNA1_APP Customer: Application X
Authorization
F_LFA1_BEK Vendor: Accounts Au X
thorization
F_LFA1_BUK Vendor: Authorization X
for Company Codes
F_LFA1_GEN Vendor: Central Data X
F_LFA1_GRP Vendor: Accounts X
Group Authorization
F_PAYRQ Authorization Object X X X
for Payment Requests
Security Guide for SAP S/4HANA 1709
94 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description Customer Vendor G/L Accounts
F_PAYR_BUK Check Management: X X
Action Authorization
for Company Codes
F_REGU_BUK Automatic Payment: X X X
Action Authorization
for Company Codes
F_REGU_KOA Automatic Payment: X X X
Action Authorization
for Account Types
F_SKA1_BUK G/L Account: Authori X
zation for Company Co
des
F_STAT_MON Bank Relationship: Sta X X X
tus Monitor authoriza
tions
13.3.1.5 Accounts Receivable Accounting (FI-AR)
Business Roles in Accounts Receivable Accounting
Table 52:
Role Description
SAP_BR_AR_ACCOUNTANT Accounts Receivable Accountant
SAP_BR_AR_MANAGER Accounts Receivable Manager
Authorization Objects That Are Used by Accounts Payable and Accounts
Receivable
Table 53:
Authorization Object Description Customer Vendor G/L Accounts
F_BKPF_BED Accounting Document: X
Account Authorization
for Customers
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 95Authorization Object Description Customer Vendor G/L Accounts
F_BKPF_BEK Accounting Document: X
Account Authorization
for Vendors
F_BKPF_BES Accounting Document: X
Account Authorization
for G/L Accounts
F_BKPF_BLA Accounting Document: X X X
Authorization for Docu
ment Types
F_BKPF_BUK Accounting Document: X X X
Authorization for Com
pany Codes
F_BKPF_BUP Accounting Document: X X X
Authorization for Post
ing Periods
F_BKPF_GSB Accounting Document: X X X
Authorization for Busi
ness Areas
F_BKPF_KOA Accounting Document: X X X
Authorization for Ac
count Types
F_BKPF_VW Accounting Document: X X X
Change Default Values
Document Type/Post
ing Key
F_LFA1_AEN Vendor: Change Au X
thorization for Certain
Fields
F_LFA1_APP Vendor: Application Au X
thorization
F_LFA1_BEK Vendor: Accounts Au X
thorization
F_LFA1_BUK Vendor: Authorization X
for Company Codes
F_LFA1_GEN Vendor: Central Data X
Security Guide for SAP S/4HANA 1709
96 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description Customer Vendor G/L Accounts
F_LFA1_GRP Vendor: Accounts X
Group Authorization
F_KNA1_AEN Customer: Change Au X
thorization for Certain
Fields
F_KNA1_APP Customer: Application X
Authorization
F_KNA1_BED Customer: Accounts X
Authorization
F_KNA1_BUK Customer: Authoriza X
tion for Company Co
des
F_KNA1_GEN Customer: Central Data X
F_KNA1_GRP Customer: Accounts X
Group Authorization
F_KNA1_KGD Customer: Change Au X
thorization for Ac
counts Groups
F_KNB1_ANA Customer: Authoriza X
tion for Account Analy
sis
F_SKA1_AEN G/L Account: Change X
Authorization for Cer
tain Fields
F_SKA1_BES G/L Account: Account X
Authorization
F_SKA1_BUK G/L Account: Authori X
zation for Company Co
des
F_SKA1_KTP G/L Account: Authori X
zation for Charts of Ac
counts
F_IT_ALV Line Item Display: X X
Change and Save Lay
outs
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 97Authorization Object Description Customer Vendor G/L Accounts
F_KMT_MGMT Account Assignment X X
Model: Authorization
for Maintenance and
Use
F_T060_ACT Information System: X X
Account Type/Activity
for Evaluation View
F_AVIK_AVA Payment Advice Note: X X
Authorization for Pay
ment Advice Note
Types
F_AVIK_BUK Payment Advice Note: X X
Authorization for Com
pany Codes
F_BNKA_BUK Banks: Authorization X X
for Company Codes
F_BNKA_MAN Banks: General Mainte X
nance Authorization
F_KNKK_BED Credit Management: X
Accounts Authorization
F_MAHN_BUK. Automatic Dunning: X
Authorization for Com
pany Codes
F_MAHN_KOA Automatic Dunning: X
Authorization for Ac
count Types
F_PAYR_BUK Check Management: X
Action Authorization
for Company Codes
F_REGU_BUK Automatic Payment: X
Action Authorization
for Company Codes
F_REGU_KOA Automatic Payment: X
Action Authorization
for Account Types
Security Guide for SAP S/4HANA 1709
98 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description Customer Vendor G/L Accounts
F_T042_BUK Customizing Payment X
Program: Authorization
for Company Codes
F_BNKA_MAN Banks: General Mainte X
nance Authorization
F_KNKA_AEN Credit Management: X
Change Authorization
for Certain Fields
F_KNKA_KKB Credit Management: X
Authorization for Credit
Control Area
13.3.1.6 Bank Accounting (FI-BL)
Important SAP Notes
For a list of additional security-relevant SAP HotNews and SAP Notes, see the SAP Service Marketplace at http://
service.sap.com/securitynotes.
13.3.1.6.1 Authorizations
The following table shows the standard roles that are used by the FI-BL component.
Standard Roles of Bank Accounting
Table 54:
Role Description
SAP_FI_BL_ACCOUNT_REPORTS Financial Status Information
SAP_FI_BL_BANK_MASTERDAT_DISPL Display Bank Master Data
SAP_FI_BL_BANK_MASTER_DATA Maintain Bank Master Data
SAP_FI_BL_BANK_STATEMENT Process Bank Statement
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 99SAP_FI_BL_BANK_STATEMENT_EXT Process Bank Statement
Note
You require this authorization if you want to use the bank
statement overview. You can only display the bank state
ment overview in the SAP Business Client.
SAP_FI_BL_BILL_OF_EX_PRESENT Presenting a Bill of Exchange
SAP_FI_BL_BILL_OF_EX_REPORTS Reports About Bill of Exchange Position
SAP_FI_BL_CASHED_CHECKS Cashed Checks
SAP_FI_BL_CASH_JOURNAL Cash Journal
SAP_FI_BL_CHECK_DELETE Deletion of Checks
SAP_FI_BL_CHECK_DEPOSIT Check Deposit
SAP_FI_BL_CHECK_MANAGEMENT Check Management
SAP_FI_BL_CHECK_MGMENT_DISPLAY Display Managed Checks
SAP_FI_BL_INTRADAY_STATEMENT Import Intraday Bank Statement Information (USA)
SAP_FI_BL_LOCKBOX Processing of Lockbox - Data
SAP_FI_BL_ONLINE_PAYMENT Execute Online Payments
SAP_FI_BL_PAYMENT_TRANSACTIONS Payment Processing
SAP_FI_BL_PAYME_ADVICE_REPORTS Reports About Payment Advice Notes
SAP_FI_BL_POR_PROCEDURE Incoming Payment Using ISR Procedure (Switzerland)
SAP_FI_BL_RETURNED_BILL_OF_EX Returned Bill of Exchange
Standard Authorization Objects
The following table shows the security-relevant authorization objects that are used by the FI-BL component.
Standard Authorization Objects of Bank Accounting
Table 55:
Authorization Object Description
F_BL_BANK Authorization for house banks and payment methods.
Security Guide for SAP S/4HANA 1709
100 P U B L I C SAP S/4HANA Business ApplicationsF_BNKA_BUK Banks Authorization for Company Codes
F_FBCJ Cash Journal General Authorization
F_FEBB_BUK Bank Account Statement Company Code
F_FEBC_BUK Check Deposit/Lockbox Company Code
F_BNKA_MAN Banks General Maintenance Authorization
F_PAYRQ Authorization object for payment requests
F_PAYR_BUK Check Management: Action authorization for company codes
F_REGU_BUK Automatic payment: Action authorization for company codes
F_REGU_KOA Automatic payment: Action authorization for account types
F_RPCODE Repetitive Code
F_RQRSVIEW Bank Ledger: Viewer for Request Response Messages
F_T042_BUK Customizing Payment Program Authorization for Company
Codes
13.3.1.6.2 Data Storage Security
For information on communication with external systems, see the general part of this Guide under Financial
Accounting [page 84].
Recommendation
When you use the electronic bank statement, SAP strongly advises you run a virus software check on the data
retrieved from the bank in you system before importing the data into the SAP system, as no virus scan is made
by SAP in the electronic bank statement. For more information, see SAP Note 599541 .
Protect Access to the File System with Logical Paths and File Names
The following lists show the logical file names and paths that are used in Bank Accounting, and the programs for
which these file names and paths apply:
Logical File Names Used in Bank Accounting
The following logical file names have been created to enable the validation of physical file names:
● FI_RFEBKAT0_FILE
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 101○ Program using this logical file name:
○ RFEBKAT0
● FI_RFEBKATX_FILE
○ Program using this logical file name:
○ RFEBKATX
● FI_RFEBKAT1_FILE
○ Program using this logical file name:
○ RFEBKAT1
● FI_RFEBEST0_FILE
○ Program using this logical file name:
○ RFEBEST0
● FI_RFEBLBT1_FILE
○ Program using this logical file name:
○ RFEBLBT1
● FI_RFEBLBT2_FILE
○ Program using this logical file name:
○ RFEBLBT2
Parameters used in this context: Program Name
Logical Path Names Used in Bank Accounting
The logical file names listed above all use the logical file path FI_FTE_TEST_FILES.
13.3.1.7 Asset Accounting (FI-AA)
Important SAP Notes
For a list of additional security-relevant SAP HotNews and SAP Notes, see the SAP Support Portal at http://
support.sap.com/securitynotes.
Standard Roles
Table 56:
Role Description
SAP_BR_AA_ACCOUNTANT Asset Accountant
SAP_AUDITOR_BA_FI_AA AIS Fixed Assets
SAP_AUDITOR_BA_FI_AA_A AIS - Fixed Assets (Authorizations)
Security Guide for SAP S/4HANA 1709
102 P U B L I C SAP S/4HANA Business ApplicationsStandard Authorization Objects
For the list of standard authorization objects available for Asset Accounting, see transaction SU21, Object Class
Asset Accounting (AM).
Network and Communication Security
Asset Accounting provides BAPIs for communicating with third-party systems.
Communication Destinations
For workflow tasks, you sometimes need either the WF-BATCH user or a user that you can use for background
steps of this kind. To execute the decision steps required before reaching these background steps, you need a
user that is explicitly assigned.
13.3.1.8 Special Purpose Ledger (FI-SL)
Standard Roles in Special Purpose Ledger
Table 57:
Role Description
SAP_AUDITOR_BA_FI_SL AIS - Special Purpose Ledger
SAP_AUDITOR_BA_FI_SL_A AIS - Special Purpose Ledger (Authorizations)
SAP_FI_SL_ACTUAL_ASSESSMENT Special Purpose Ledger Actual Assessment
SAP_FI_SL_ACTUAL_DISTRIBUTION Special Purpose Ledger Actual Distribution
SAP_FI_SL_ACTUAL_POSTINGS Special Purpose Ledger Actual Postings
SAP_FI_SL_BATCH_JOBS Run Special Purpose Ledger Jobs in Background
SAP_FI_SL_CURRENCY_TRANSLATION Special Purpose Ledger Currency Translation
SAP_FI_SL_DISPLAY_DOCUMENTS Display Special Purpose Ledger Balances and Documents
SAP_FI_SL_DISPLAY_PLAN Display Special Purpose Ledger Plan
SAP_FI_SL_MODIFY_PLAN Modify Special Purpose Ledger Planning
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 103Role Description
SAP_FI_SL_PLAN_ASSESSMENT Edit Plan Assessment
SAP_FI_SL_PLAN_DISTRIBUTION Plan Distribution
SAP_FI_SL_ROLLUP Special Purpose Ledger Rollup
Authorization Objects in Special Purpose Ledger
Table 58:
Object Description
G_022_GACT FI-SL Customizing: Transactions
G_800S_GSE Special Purpose Ledger Sets: Set
G_802G_GSV Special Purpose Ledger Sets: Variable
G_806H_GRJ FI-SL Rollup
G_820_GPL FI-SL Planning: Planning Parameters
G_821S_GSP FI-SL Planning: Distribution Keys
G_880_GRMP FI-SL Customizing: Global Companies
G_881_GRLD FI-SL Customizing: Ledger
G_888_GFGC FI-SL Customizing: Field Movements
G_ADMI_CUS Central Administrative FI-SL Tools
G_ALLOCTN Special Purpose Ledger - Assessment/Distribution
G_GLTP Special Purpose Ledger - Database (Ledger, Record Type,
Version)
G_REPO_GLO FI-SL: Global Reporting (Global Company)
G_REPO_LOC FI-SL: Local Reporting (Company Code)
F_T011_BUK Planning: Authorization for Company Codes
Data Storage Security
Protect access to the file system with logical paths and file names
Security Guide for SAP S/4HANA 1709
104 P U B L I C SAP S/4HANA Business ApplicationsThe Special Purpose Ledger saves data in files in the file system. Therefore, it is important to allow access
explicitly to certain files in the file system without allowing access to other files (also called file traversals). You
achieve this by entering logical paths and file names in the system, which are assigned to the physical paths and
file names. This assignment is validated at runtime. If access to a file is requested that does not match any stored
assignment, then an error occurs.
Access to the file system is protected for the following programs by the logical file name listed.
Table 59:
Program Logical File Name Used by Parameter Used in Context Logical Path Name Used by
the Program the Program
RGRJTE00 FI_INFOSYS_TRANSPORT Program Name FI_ROOT
RGRLTE00
RGRMTE00
RGRRTE00
RGRSTE00
RGRVTE00
RGRXTE00
RGSSTE00
RGSVTE00
RGRJTI00
RGRMTI00
RGSSTI00
RGSVTI00
SAPMGLRV FI_ROLLUP Program Name FI_ROOT
(SY-CPROG)
SAPFGRWE FI_REPORT_WRITER Program Name FI_ROOT
(SY-CPROG – generated pro
gram name)
Activating the Validation of Logical Paths and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default.To activate the validation at runtime, maintain the
physical path using the transactions FILE (client-independent) and SF01 (client-dependent). To determine which
paths are used by your system, you can activate the appropriate settings in the Security Audit Log.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 10513.3.1.9 Corporate Close - Consolidation Foundation
13.3.1.9.1 Authorizations
Standard Roles
The table below shows the standard role that is used by the FIN-RTC component.
Table 60:
Role Description
SAP_BR_CONSLDTN_SPECIALIST Consolidation Specialist
Standard Authorization Objects
The following table shows the security-relevant authorization objects that are used by the FIN-RTC component.
Table 61:
Authorization Object Description
F_RTC_DL0 Authorization for Consolidation Document List
F_RTC_DL1 Authorization for Consolidation Drill-Through Reports
F_RTC_CT0 Authorization for Currency Translation Run
F_RTC_DRR Authorization for Data Release Requests
F_RTC_SU Authorization for Flexible Upload
F_RTC_PL0 Authorization for Period Lock
F_RTC_VR Authorization for Validation Results
F_RTC_RUL Authorization for Validation Rules
F_RTC_MD Authorization for Consolidation Models
F_RTC_ENT Authorization for Consolidation Entities
Security Guide for SAP S/4HANA 1709
106 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
F_RTCAFD Authorization for Additional Financial Data
F_RTC_JD0 Authorization for Displaying Consolidation Journal Entries
F_RTC_DT Authorization for Document Types
F_RTC_FSV Authorization for Financial Statements
F_RTC_MED Authorization for Methods
F_RTC_SEL Authorization for Selections
13.3.1.9.2 Deletion of Personal Data
Use
The Real-Time Consolidation (FIN-RTC) component in SAP S/4HANA might process data (personal data)
that is subject to the data protection laws applicable in specific countries.
Relevant Application Objects and Available Deletion Functionality
Table 62:
Application Provided Deletion Functionality
Consolidation Methods RTC_DPP_METHOD
● Transaction codes RTCTM and RTCRM
● Fiori App Define Validation Methods
Consolidation Models (transaction code RTCMD) RTC_DPP_MODEL
Validation Rules (Fiori app Define Validation Rules) RTC_DPP_VALIDATION_RULE
Data Release Lock (Fiori app Consolidation Data Release RTC_DPP_DATA_RELEASE_LOCK
Monitor)
Data Release Requests RTC_DPP_DATA_RELEASE_REQUEST
● Fiori app Consolidation Data Release Cockpit
● Fiori app Consolidation Data Release Monitor
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 107Application Provided Deletion Functionality
Rule Result Comments (Fiori app Consolidation Data Release RTC_DPP_RULE_RESULT_COMMENTS
Cockpit)
Task Logs (all programs that run currency translation and RTC_DPP_TASK_LOG
post journal entries, for example, transaction code RTCCT and
Fiori app Consolidation Data Release Cockpit)
Note
For the deletion programs mentioned in the table above, you can also Display Records.
Run Deletion Programs
SAP recommends scheduling regular jobs to run the deletion programs using the Define Background Job (SM36)
transaction.
13.3.1.10 Central Finance (FI-CF)
The following functions are available for Central Finance:
Schedule Clean-Up Report in Source System
Data relating to FI/CO documents is temporarily stored in log tables in the source system before it can be
transferred to Central Finance. To delete the temporary information from these tables, a clean-up program
(RFIN_CFIN_CLEANUP) is run and must be scheduled regularly (for example, once a month). In the configuration
of this program, you can define for how many periods a temporarily stored data record is kept before being
deleted by the clean-up program (for example, so that an incorrect posting can be corrected).
Read Access Log for the Application Log
The application log for the Central Finance initial load may contain sensitive, personal data. Therefore, we provide
a read access log for this application log (CFIN_INITIAL_LOAD) for the channel DYNP.
Security Guide for SAP S/4HANA 1709
108 P U B L I C SAP S/4HANA Business Applications13.3.2 Controlling
13.3.2.1 Authorizations
The Controlling component uses the authorization concept provided by the SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply to the Controlling component. The SAP NetWeaver authorization concept is
based on assigning authorizations to users based on roles. For role maintenance, use the profile generator
(transaction PFCG) on the AS ABAP.
Business Roles
The table below shows the business roles that are used by the Controlling component.
Table 63:
Role Description
SAP_BR_OVERHEAD_ACCOUNTANT Cost Accountant - Overhead
SAP_BR_SALES_ACCOUNTANT Cost Accountant - Sales
SAP_BR_PRODN_ACCOUNTANT Cost Accountant - Production
SAP_BR_INVENTORY_ACCOUNTANT Cost Accountant - Inventory
SAP_BR_MANAGER_COST Manager - Finance Info
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by the Controlling component.
Standard Roles in Controlling
Table 64:
Authorization Object Field Value Description
K_CRM_REP (Authorization Check ● SORG (Service Organization) A5 Display reports
for Cost Integration CRM – CO) ● VART (Business Transaction
Type)
● ACTVT (Activity)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 109Authorization Object Field Value Description
K_FPB_EXP (Authorization Object ● EXP_SCEN (Planning Scenario) 02 Change
for Express Planning) ● EXP_INST (Express Planning Assigns authorization to enter data
Instance) and execute express planning.
● ACTVT (Activity)
03 Display
You have the authorization to dis
play external express planning data.
39 Check
Assigns authorization to check ex
press planning data and to approve
or reject the data entered.
K_PVARIANT (Authorization for ● PVARIANT (Screen Variant for Assigns authorization to define
Screen Variants) Manual Actual Postings in CO) posting variants for each business
● VRGNG (Business Transaction) transaction.
K_MLMBDISP (CO Material Ledger: ● BWKEY (Valuation area) Assigns authorization to display the
Display Material Valuation Docu material valuation document.
ment)
K_ML_MTART (CO Material Ledger: ● ACTVT (Activity) 02 Change
Material Type) ● MTART (Material type) Assigns authorization to execute
and post single-level material price
determination and change price de
termination.
03 Display
Assigns authorization to display ma
terial ledger data.
K_ML_VA (CO Material Ledger: Valu ● ACTVT (Activity) 02 Change
ation Area) ● BWKEY (Valuation area) Assigns authorization to perform
multilevel material price determina
tion. However, you also need the au
thorization object K_ML_MTART
(CO Material Ledger: Material Type).
03 Display
Assigns authorization to display ma
terial ledger data and material
ledger documents.
Security Guide for SAP S/4HANA 1709
110 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
16 Execute
Assigns authorization for executing
and displaying materials for the
costing run.
40 Create in DB
45 Allow
Assigns authorization for executing
price determination and closing en
tries.
K_KLPR_VA (CO Material Price ● ACTVT (Activity) 03 Display
Change: Valuation Area) ● BWKEY (Valuation area)
16 Execute
44 Flag
K_CBPR_VA ● KOKRS (Controlling Area) 02 Change
● ACTVT (Activity) Assigns authorization for changing
business process groups.
03 Display
Assigns authorization for displaying
business process groups.
K_CBPR_PLA ● KOKRS (Controlling Area) 02 Change
● PRZNR (Business Process) Assigns authorization for displaying
● ACTVT (Activity) and changing planning of business
processes.
03 Display
Assigns authorization for displaying
planning of business processes.
K_CKPH_SET ● KOKRS (Controlling Area) 02 Change
● ACTVT (Activity) Assigns authorization for changing
cost object groups.
03 Display
Assigns authorization for displaying
cost object groups.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 111Authorization Object Field Value Description
K_ABC ● AUTHAREA (Authorization Area Assigns authorization for mainte
for Business Processes) nance actions in business process
● CO_ACTION (Actions for CO- master data, manual business proc
OM Authorization Check) ess planning, the template, and the
● KSTAR (Cost Element) information system.
K_CSLA_SET ● KOKRS (Controlling Area) 02 Change
● ACTVT (Activity) Assigns authorization for changing
activity type groups.
03 Display
Assigns authorization for displaying
activity type groups.
06 Delete
K_ CSLA (CO-CCA: Activity Types ● KOKRS (Controlling Area) 01 Create or generate
Master) ● ACTVT (Activity) Assigns authorization to create ac
tivity types.
02 Change
Assigns authorization to change ac
tivity types.
03 Display
Assigns authorization to display ac
tivity types.
06 Delete
This is not used at present.
08 Display change documents
Assigns authorization to look at
change documents on the activity
types.
K_CSKS_BUD (CO-CCA: Cost Center ● KOKRS (Controlling Area) 02 Change
Budget Planning) ● KOSTL (Cost Center) Assigns authorization to change the
● ACTVT (Activity) budget of cost centers.
03 Display
Assigns authorization to display the
budget of cost centers.
Security Guide for SAP S/4HANA 1709
112 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
K_ CSKS_SET (CO-CCA: Cost Cen ● KOKRS (Controlling Area) 02 Change
ter Groups) ● ACTVT (Activity) Assigns authorization to change
cost center groups.
03 Display
Assigns authorization to display
cost center groups.
06 Delete
K_ CSKS (CO-CCA: Cost Center ● KOKRS (Controlling Area) 01 Create or generate
Master) ● KOSTL (Cost Center) Assigns authorization to create cost
● ACTVT (Activity) centers.
02 Change
Assigns authorization to change
cost centers.
03 Display
Assigns authorization to display
cost centers.
06 Delete
This is not used at present.
08 Display change documents
Assigns authorization to look at
change documents on cost centers.
63 Activate
Assigns authorization to activate in
active cost centers.
K_ CSKS_PLA (CO-CCA: Cost Cen ● KOKRS (Controlling Area) 02 Change
ter Planning) ● KOSTL (Cost Center) Assigns authorization to change the
● ACTVT (Activity) planning of cost centers.
03 Display
Assigns authorization to display the
planning of cost centers.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 113Authorization Object Field Value Description
K_ CSKA_SET (CO-CCA Cost Ele ● KTOPL (Chart of Accounts) 02 Change
ment Groups) ● ACTVT (Activity) Assigns authorization to change
cost element groups.
03 Display
Assigns authorization to display
cost element groups.
06 Delete
K_ CSKB (CO-CCA: Cost Element ● KOKRS (Controlling Area) 01 Create or generate
Master) ● CO_KAINT (Cost Element Clas Assigns authorization to create cost
sification (Primary/Secondary) elements.
● ACTVT (Activity)
02 Change
Assigns authorization to change
cost elements.
03 Display
Assigns authorization to display
cost elements.
06 Delete
This is not used at present.
08 Display change documents
Assigns authorization to view cost
element change documents.
K_ CSKB_PLA (CO-CCA: Cost Ele ● KOKRS (Controlling Area) 02 Change
ment Planning) ● KSTAR (Cost Element) Assigns authorization to change the
● ACTVT (Activity) planning of cost elements.
03 Display
Assigns authorization to display the
planning of cost elements.
K_CCA (CO-CCA: Gen. Authorization ● RESPAREA (CO-OM Responsi Assigns authorization for the main
Object for Cost Center Accounting) bility Area) tenance of cost center master data,
● CO_ACTION (Actions for CO- manual cost center planning, and
OM Authorization Check) the information system.
● KSTAR (Cost Element)
Security Guide for SAP S/4HANA 1709
114 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
K_REPO_CCA (CO-CCA: Reporting ● KOKRS (Controlling Area) 27 Display totals records
on Cost Centers/Cost Elements) ● KOSTL (Cost Center) Assigns authorization for summary
● KSTAR (Cost Element) record reporting.
● ACTVT (Activity)
28 Display line items
Assigns authorization for line item
reporting.
29 Display saved data Assigns authori
zation for reporting of stored data.
K_KA03_SET (CO-CCA: Statistical ● KOKRS (Controlling Area) 02 Change
Key Figure Groups) ● ACTVT (Activity) Assigns authorization to change
statistical key figure groups.
03 Display
Assigns authorization to display
statistical key figure groups.
K_ORDER (CO-OPA: General authori ● RESPAREA (CO-OM Responsi Assigns authorization for the follow
zation object for internal orders) bility Area) ing actions while working with inter
● AUFART (Order Type) nal orders:
● AUTHPHASE (Internal order au ● Maintenance of order master
thorization: Authorization data
phase) ● Manual order planning
● CO_ACTION (Actions for CO- ● Budgeting of orders
OM Authorization Check) ● Actions in the information sys
● KSTAR (Cost Element) tem
K_AUFK_SET (CO-OPA: Order ● HNAME (Group Name) 02 Change
Groups) ● ACTVT (Activity) Assigns authorization to change or
der groups.
03 Display
Assigns authorization to display au
thorization objects in CO-PA plan
ning.
K_KELP_GP (CO-PA Planning: Inte ● CEERKRS (Operating concern) 16 Execute
grated Planning) ● ACTVT (Activity) Assigns authorization to restrict the
way integrated planning is used.
K_KELP_VER (CO-PA Planning: Plan ● CEVERSI (Plan version (CO- Assigns authorization to process
Version) PA)) plans depending on plan version.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 115Authorization Object Field Value Description
K_KELP_RC (CO-PA Planning: Plan ● CEERKRS (Operating concern) 01 Create or generate Assigns authori
ning Layouts) ● CEFORM (Form) zation to create planning layouts.
● ACTVT (Activity)
02 Change
Assigns authorization to change
planning layouts and plan struc
tures.
03 Display
Assigns authorization to display
planning layouts and plan struc
tures.
21 Transport
Assigns authorization to transport
planning layouts.
60 Import
Assigns authorization to import
planning layouts.
65 Reorganize
Assigns authorization to reorganize
planning layouts.
K_WIP (CO-PC-OBJ: WIP Calcula ● WERKS (PLANT) 02 Change
tion and Results Analysis) ● ACTVT (Activity) Assigns authorization to change the
data for work in process (WIP) cal
culation and results analysis.
03 Display
Assigns authorization to display the
data for WIP calculation and results
analysis.
K_WIP (CO-PC-OBJ: WIP Calcula ● WERKS (PLANT) 02 Change
tion and Results Analysis) ● ACTVT (Activity) Assigns authorization to change the
data for work in process (WIP) cal
culation and results analysis.
03 Display
Assigns authorization to display the
data for WIP calculation and results
analysis.
Security Guide for SAP S/4HANA 1709
116 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
K_WIP_BU (CO-PC-OBJ: WIP Calcu ● BUKRS (Company Code) 02 Change
lation and Results Analysis) ● ACTVT (Activity) Assigns authorization to change
processed objects in WIP calculation
and results analysis.
03 Display
Assigns authorization to display
processed objects in WIP calculation
and results analysis.
K_WIP_PC (CO-PC-OBJ: WIP Calcu ● PRCTR (Profit Center) 02 Change
lation and Results Analysis) ● ACTVT (Activity) Assigns authorization to change
processed objects in WIP calculation
and results analysis.
03 Display
Assigns authorization to display
processed objects in WIP calculation
and results analysis.
K_CBEW (CO-PC: Concurrent Cost ● ACTVT (Activity) 01 Create or generate
ing - Cstg Master Data)
02 Change
03 Display
06 Delete
K_CKPH (CO-PC: Cost Objects) ● KTRAT (Cost Object Category) 01 Create or generate Assigns authori
● ACTVT (Activity) zation to create cost object IDs.
02 Change
Assigns authorization to change
cost object IDs.
03 Display
Assigns authorization to display
cost object IDs.
06 Delete
Assigns authorization to delete cost
object IDs.
72 Plan
A5 Display reports
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 117Authorization Object Field Value Description
K_KEKO (CO-PC: Product Costing) ● KLVAR (Costing Variant) 03 Display
● BUKRS (Company Code) Assigns authorization to display
● ACTVT (Activity) product costing.
06 Delete
Assigns authorization for executing
a reorganization run and for archiv
ing cost estimates.
16 Execute
Assigns authorization for creating
and changing a cost estimate, and
for creating, changing, executing,
and deleting a costing run.
39 Check
K_CKBOB (CO-PC: Product Drill ● WERKS (Plant) 16 Execute
down) ● ACTVT (Activity) Assigns authorization to display a
report that was created with prod
uct drilldown reporting.
A5 Display report
Assigns authorization to carry out
product drilldown reporting.
K_PKSA (CO-PC: Production Cost ● WERKS (Plant) 01 Create or generate
Collector) ● ACTVT (Activity) Assigns authorization to create a
product cost collector in any plant.
02 Change
Assigns authorization to change a
product cost collector in any plant.
03 Display (master data)
Assigns authorization to display a
product cost collector in any plant.
A5 Display reports (cost report)
K_FVMK (CO-PC: Release/Marking - ● BUKRS (Company Code) 43 Release
Product Costing) ● ACTVT (Activity) Assigns authorization to to release
standard cost estimates.
Security Guide for SAP S/4HANA 1709
118 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
44 Flag
Assigns authorization to mark
standard cost estimates.
45 Allow
Assigns authorization to allow mark
ing and releasing of standard cost
estimates.
K_SUM_ORD (CO-PC: Summarization ● IDENT (Hierarchy ID) 03 Display
– Orders) ● KOKRS (Controlling Area) Assigns authorization to display a
● ACTVT (Activity) summary of order costs.
16 Execute
Assigns authorization to summarize
order costs.
A5 Display reports
Assigns authorization to display re
ports for order costs.
K_SUM_PROJ (CO-PC: Summariza ● IDENT (Hierarchy ID) 03 Display
tion – Projects) ● KOKRS (Controlling Area) Assigns authorization to display a
● ACTVT (Activity) summary of project costs.
16 Execute
Assigns authorization to summarize
project costs.
A5 Display reports
Assigns authorization to display re
ports for project costs.
K_TEMPL (CO: Auth. Template ● KOKRS (Controlling Area)
(ABC-allocation, formula planning, ● TPLCLASS (Valid Environ
other)) ments)
● TEMPLATE (Template)
● ACTVT (Activity)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 119Authorization Object Field Value Description
K_VRGNG (CO: Bus. Trans., Actual ● KOKRS (Controlling Area) 01 Create or generate
Postings and Plan/act. Allocations) ● CO_VRGNG (CO Business Trans Assigns authorization to create
action) manual actual cost postings, and al
● ACTVT (Activity) locations of planned and actual
costs, which change the data of a
whole controlling area (or larger
areas).
02 Change
Assigns authorization to change
manual actual cost postings, and al
locations of planned and actual
costs, which change the data of a
whole controlling area (or larger
areas).
03 Display
Assigns authorization to display
manual actual cost postings, and al
locations of planned and actual
costs, which change the data of a
whole controlling area (or larger
areas).
06 Delete
16 Execute
48 Simulate
K_ZBASSL (CO: Calculation base) ● BASSL (Calculation Base for 02 Change
Overheads)
Assigns authorization to change the
● ACTVT (Activity) overhead rate base.
03 Display
Assigns authorization to display the
overhead rate base.
K_ZKALSM (CO: Costing sheet) ● KALSM (Procedure) 02 Change
● ACTVT (Activity) Assigns authorization to change the
costing sheet.
03 Display
Assigns authorization to display the
costing sheet.
Security Guide for SAP S/4HANA 1709
120 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
K_ZENTSL (CO: Credit) ● ENTSL (Credit for overhead) 02 Change
● ACTVT (Activity)
03 Display
K_KMBO_DCT (CO: Document Type ● BUKRS (Company Code) 01 Create or generate
for Manual Funds Reservation) ● KBLART (Doc.Type: Manual Assigns authorization to create
document entry) funds reservations with a particular
● ACTVT (Activity) document type.
02 Change
Assigns authorization to change
funds reservations with a particular
document type.
03 Display
Assigns authorization to display
funds reservations with a particular
document type.
06 Delete
Assigns authorization to reduce
funds reservations with a particular
document type.
24 Archive
Assigns authorization to archive
funds reservations with a particular
document type.
K_KFPP_DCT (CO: Document Type ● KOKRS (Controlling Area) 01 Create or generate
for Transfer Price Agreements) ● KFPBLA (Document type: Assigns authorization to create
Transfer price agreement/allo transfer price agreements with par
cation) ticular document types.
● ACTVT (Activity)
02 Change
Assigns authorization to change
transfer price agreements with par
ticular document types.
03 Display
Assigns authorization to display
transfer price agreements with par
ticular document types.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 121Authorization Object Field Value Description
06 Delete
Assigns authorization to delete
transfer price agreements with par
ticular document types.
24 Archive
Assigns authorization to archive
transfer price agreements with par
ticular document types.
K_KFPI_DCT (CO: Document Type ● KOKRS (Controlling Area) 01 Create or generate
for Transfer Price Allocations) ● KFPBLA (Document type: Assigns authorization to create
Transfer price agreement/allo transfer price allocations with par
cation) ticular document types.
● ACTVT (Activity)
03 Display
Assigns authorization to display
transfer price allocations with par
ticular document types.
06 Delete
Assigns authorization to delete
transfer price allocations with par
ticular document types.
24 Archive
Assigns authorization to archive
transfer price allocations with par
ticular document types.
K_KA_RCS (CO: Drill-down reporting ● CEAPPL (Application class for 01 Create or generate
- line-/column structures) drilldown reporting)
Assigns authorization to create row
● TABLE (Table Name) and column structures for drilldown
● CEFORM (Form) reporting.
● ACTVT (Activity)
02 Change
Assigns authorization to change row
and column structures for drilldown
reporting.
03 Display
Assigns authorization to display row
and column structures for drilldown
reporting.
Security Guide for SAP S/4HANA 1709
122 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
21 Transport
60 Import
65 Reorganize
Assigns authorization to reorganize
row and column structures for drill
down reporting.
K_SUM_CO (CO: General CO Sum ● IDENT (Hierarchy ID) 03 Display
marization Without Classification) ● KOKRS (Controlling Area) Assigns authorization to display
● ACTVT (Activity) general controlling summarization
(without classification).
16 Execute
Assigns authorization to summarize
the costs for the summarization hi
erarchy in the controlling area.
A5 Display reports
Assigns authorization to display a
report for the summarization hierar
chy in the controlling area.
K_KA_RPT (CO: Interactive Drill ● CEAPPL (Application class for 01 Create or generate
down Reporting – Reports) drilldown reporting)
● TABLE (Table Name) 02 Change
● CEREPID (Report) 03 Display
● ACTVT (Activity)
04 Print, edit messages
16 Execute
21 Transport
28 Display line items
29 Display saved data
32 Save
60 Import
61 Export
65 Reorganize
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 123Authorization Object Field Value Description
66 Refresh
L0 All functions
L1 Function range level 1
L2 Function range level 2
K_ORGUNIT (CO: Organizational
Units Used in Actual Postings)
K_ZZUSSL (CO: Overhead) ● ZUSSL (Overhead rate) 02 Change
● ACTVT (Activity) Assigns authorization to change
overhead rates for overheads.
030 Display
Assigns authorization to display
overhead rates for overheads.
K_ZSCHL (CO: Overhead key) ● ZUSSL (Overhead rate) 02 Change
● ACTVT (Activity) Assigns authorization to change the
overhead key for overheads.
03 Display
Assigns authorization to display the
overhead key for overheads.
K_TKA50 (CO: Planner Profiles) ● BRGRU (Authorization Group) 01 Create or generate
● ACTVT (Activity) Assigns authorization to create au
thorization for planner profiles.
02 Change
Assigns authorization to change au
thorization for planner profiles.
03 Display
Assigns authorization to display au
thorization for planner profiles.
06 Delete
16 Execute
Security Guide for SAP S/4HANA 1709
124 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
K_REPO_USR (CO: Reporting / User ● ACTVT (Activity) 02 Change
Settings) ● KUSRGR (Indicator for user Assigns authorization to change
group) user settings for overhead cost con
trolling.
03 Display
Assigns authorization to display
user settings for overhead cost con
trolling.
K_KA_TREC (CO: Summarization ● ACTVT (Activity) 02 Change
Levels) ● CEAPPL (Application class for Assigns authorization to change
drilldown reporting) summarization levels.
● TABLE (Table Name)
03 Display
07 Activate, generate
66 Refresh
Assigns authorization to update
summarization levels.
71 Analyze
Assigns authorization to analyze the
access log.
K_KA09_KVS (CO: Version) ● BRGRU (Authorization Group) 02 Change
● ACTVT (Activity)
03 Display
72 Plan
DP Delete plan
K_KC_PL (EC-BP: Authorization for ● CFASPET (Aspect (application Assigns authorization to create,
Planning Layouts) area)) change, and display planning lay
● CEFORM (Form) outs. It also assigns authorization to
● ACTVT (Activity) display and change plan data.
K_KC_DE (EC-EIS Authorization - ● CFASPET (Aspect (application 01 Create or generate
Entry Layout / Data Entry) area))
Assigns authorization to create
● CEFORM (Form) planning and data entry layouts.
● ACTVT (Activity)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 125Authorization Object Field Value Description
02 Change
Assigns authorization to change
planning and data entry layouts.
03 Display
Assigns authorization to display
planning and data entry layouts.
29 Display saved data
Assigns authorization for the layout
used to display data.
79 Enter
Assigns authorization to enter and
modify data with the layout.
K_ KC_HI (EC-EIS Authorizations ● CFAPPLC (Application class for 01 Create or generate
for Hierarchies) DD objects (not used))
● CFFIENM (Field Name) 02 Change
● CFHVERS (Hierarchy variant) 03 Display
● ACTVT (Activity)
06 Delete
K_ KC_PRC (EC-EIS: Authorization ● CFASPET (Aspect (application 01 Create or generate Assigns authori
for Presentation of Form) area)) zation to create a form.
● CEFORM (Form)
● ACTVT (Activity) 02 Change Assigns authorization to
change a form.
03 Display Assigns authorization to dis
play a form.
16 Execute Assigns authorization to
use a form in the information sys
tem.
K_ KC_DSK (EC-EIS: Authorization ● CFASPET (Aspect (application
for Structures and Key Figures) area))
● CFAPPLC (Application class for
DD objects (not used))
● CFOKCOD (EC-EIS/BP function
code)
● TCD (Transaction Code)
Security Guide for SAP S/4HANA 1709
126 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
K_ KC_DS (EC-EIS: Authorizations ● CFASPET (Aspect (application Assigns authorization for maintain
for Data Structure Maintenance) area)) ing and displaying data structure
● CFKYRSP (Application) and key figures.
● CFOKCOD (EC-EIS/BP function
code)
● TCD (Transaction Code)
K_ KC_DB (EC-EIS: Authorizations ● CFASPET (Aspect (application
for the Data Basis) area))
● CFRECTY (Record type)
● CFVERSO (Data area (previously
version))
● CFPERDE (Period)
● CFVALTY (Value type)
● CFOKCOD (EC-EIS/BP function
code)
● TCD (Transaction Code)
K_ KC_FC (EC-EIS: Function Code ● ACTVT (Activity 01 Create or generate
Authorization)
02 Change
03 Display
06 Delete
16 Execute
K_PCAI_UEB (EC-PCA: Actual Data ● KOKRS (Controlling Area) Assigns authorization to transfer ac
Transfer) tual data.
K_PCAD_UM (EC-PCA: Assessment/ ● GLRRCTY (Record Type) 01 Create or generate
Distribution) ● ACTVT (Activity) Assigns authorization to create cy
cles.
02 Change
Assigns authorization to change cy
cles.
03 Display
Assigns authorization to display cy
cles and to obtain an overview of as
sessments.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 127Authorization Object Field Value Description
06 Delete
Assigns authorization to delete cy
cles.
16 Execute
Assigns authorization to perform as
sessment and distribution.
K_PCAB_DEL (EC-PCA: Delete ● GLRLDNR (Ledger) Assigns authorization to delete
Transaction Data) transaction data for profit centers.
K_PCAF_UEB (EC-PCA: FI Data ● BUKRS (Company Code)
Transfer)
K_PCAL_GEN (EC-PCA: Generate ● KOKRS (Controlling Area) 03 Display
and activate ledger) ● ACTVT (Activity) Assigns authorization to display
ledger settings.
62 Create automatic ledger
Assigns authorization to create au
tomatic ledger.
63 Activate
Assigns authorization to activate
profit center ledger.
64 Generate
Assigns authorization to regenerate
a ledger.
K_PCAM_UEB (EC-PCA: MM Data ● ACTVT (Activity) 90 Copy
Transfer) Assigns authorization to transfer
data from materials management
(MM).
K_PCAP_UEB (EC-PCA: Plan Data ● KOKRS (Controlling Area) Assigns authorization to transfer
Transfer) ● CEVERSN (Version) plan data to profit centers.
● CEGJAHR (Fiscal Year)
K_PCAP_SET (EC-PCA: Planning Hi ● KOKRS (Controlling Area) 01 Create or generate Assigns authori
erarchy) ● ACTVT (Activity) zation to create profit center hierar
chies.
02 Change Assigns authorization to
change profit center hierarchies.
Security Guide for SAP S/4HANA 1709
128 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
03 Display Assigns authorization to dis
play profit center hierarchies.
06 Delete Assigns authorization to de
lete profit center hierarchies.
K_ PCAS_PRC (EC-PCA: Profit Cen ● KOKRS (Controlling Area) 01 Create or generate Assigns authori
ters) ● ACTVT (Activity) zation to create profit centers.
02 Change
Assigns authorization to change
profit centers and time-based fields.
03 Display
Assigns authorization to display
profit centers and the master data
index.
06 Delete
Assigns authorization to delete
profit centers.
21 Transport
Assigns authorization to transport
Customizing settings.
42 Convert to DB
Assigns authorization to convert line
items.
63 Activate
Assigns authorization to activate in
active profit centers.
Activate Assigns authorization to ● KOKRS (Controlling Area) Assigns authorization to realign
activate inactive profit centers. profit center data for retroactive
changes to profit center assign
ments in CO master data.
K_PCA (EC-PCA: Responsibility ● RESPAREA (CO-OM Responsi
Area, Profit Center) bility Area)
● CO_ACTION (Actions for CO-
OM Authroization Check)
● KSTAR (Cost Element)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 129Authorization Object Field Value Description
K_PCAS_UEB (EC-PCA: SD Data ● ACTVT (Activity) 90 Copy
Transfer) Assigns authorization to transfer
data from sales and distribution
(SD).
K_PCAR_SRP (EC-PCA: Standard ● GLRLDNR (Ledger) 02 Change
Reports and Datasets) ● ACTVT (Activity)
07 Activate, generate Assigns authori
zation to generate profit center re
ports.
16 Execute
Assigns authorization to execute
profit center reports.
42 Convert to DB
Assigns authorization to convert
profit center reports.
60 Import
Assigns authorization to import
standard reports and datasets.
61 Export
Assigns authorization to export
standard reports and datasets.
K_PCAR_REP (EC-PCA: Summary ● BUKRS (Company Code) 01 Create or generate
and Line Item Reports) ● PRCTR (Profit Center)
● KSTAR (Cost Element) 02 Change
● ACTVT (Activity) 03 Display Assigns authorization to dis
play documents.
06 Delete
27 Display totals records
Assigns authorization to carry out
reporting of summary records.
28 Display line items
Assigns authorization to carry out
reporting of line items.
Security Guide for SAP S/4HANA 1709
130 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
29 Display saved data
Assigns authorization to display
saved data.
76 Enter
Assigns authorization to create
documents.
K_ML_MGV (Material Ledger: Master ● ACTVT (Activity) 01 Create or generate
Data of Quantity Structure Tool) ● WERKS (Plant)
02 Change
03 Display
K_KEPL_TC (Profit Planning) ● ACTVT (Activity) 02 Change
Assigns authorization to change and
delete plan data.
03 Display
Assigns authorization to display
plan data.
24 Archive
Assigns authorization to archive
plan data.
65 Reorganize
Assigns authorization to reorganize
long texts for plan data.
B3 Derive
Assigns authorization to carry out
characteristic derivation before au
throization checked for CO-PA au
thorizations.
K_KEPL_FR (Profit Planning: Initial ● CEERKRS (Operating concern) 02 Change
Screen) ● ACTVT (Activity)
03 Display
16 Execute
21 Transport
GL General overview
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 131Authorization Object Field Value Description
K_KEI_TC (Profitability Analysis: ● ACTVT (Activity) 01 Create or generate
Actual Data) Assigns authorization to create line
items.
02 Change
Assigns authorization to perform
periodic valuation or top-down ac
tual distribution.
03 Display
Assigns authorization to display line
items.
06 Delete
Assigns authorization to delete the
data in the error file CEERROR.
24 Archive
Assigns authorization to archive line
items.
K_KEKD_TC (Profitability Analysis: ● ACTVT (Activity) 01 Create or generate
Conditions) Assigns authorization to create con
dintion tables and pricing reports.
02 Change
Assigns authorization to change
condintion tables and pricing re
ports.
03 Display
Assigns authorization to display
condintion tables and pricing re
ports.
16 Execute
Assigns authorization to execute
condition lists.
K_KED_UM (Profitability Analysis: ● CEERKRS (Operating concern) 01 Create or generate
Cost Center Assessment) ● CEPLIKZ (Plan/Actual Indica Assigns authorization to create cy
tor) cles.
● ACTVT (Activity)
Security Guide for SAP S/4HANA 1709
132 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
02 Change
Assigns authorization to change and
delete cycles.
03 Display
Assigns authorization to display cy
cles.
16 Execute
Assigns authorization to execute as
sessments.
58 Display takeover
Assigns authorization to display an
overview of cost center assess
ments.
K_KER_TC (Profitability Analysis: ● ACTVT (Activity) 01 Create or generate
Derivation Rule Values)
02 Change
Assigns authorization to change
derivation rules.
03 Display
Assigns authorization to display der
ivation rules.
K_KES_TC (Profitability Analysis: ● ACTVT (Activity) 01 Create or generate
Derivation Strategy)
02 Change
Assigns authorization to change
derivation strategies.
03 Display
Assigns authorization to display der
ivation strategies.
K_KEA_ALE (Profitability Analysis: ● CEERKRS (Operating concern) 01 Create or generate
Distribution) ● ACTVT (Activity)
02 Change
03 Display
16 Execute
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 133Authorization Object Field Value Description
64 Generate
K_KEA_TC (Profitability Analysis: ● ACTVT (Activity) 01 Create or generate Assigns authori
Maintain Operating Concern) zation to create operating concerns.
02 Change
Assigns authorization to change op
erating concerns.
03 Display
Assigns authorization to display op
erating concerns.
06 Delete
Assigns authorization to delete op
erating concerns.
60 Import
Assigns authorization to import op
erating concerns.
67 Translate
Assigns authorization to translate
operating concerns.
D1 Copy
Assigns authorization to copy oper
ating concerns.
K_KEA_NET (Profitability Analysis: ● CEERKRS (Operating concern) 01 Create or generate
Realignments) ● ACTVT (Activity) Assigns authorization to create,
change, and test realignments.
03 Display
Assigns authorization to display and
test realignments.
16 Execute
Assigns authorization to execute re
alignments including scheduling and
starting background jobs.
K_KEA_ERG (Profitability Analysis: ● CEERKRS (Operating concern)
Set Operating Concern)
Security Guide for SAP S/4HANA 1709
134 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
K_KEDT_TC (Profitability Analysis: ● ACTVT (Activity) 02 Change
Transfer Data to CO-PA) Assigns authorization to customize
the transfer of data.
16 Execute Assigns authorization to
transfer external actual data and
plan data and post SD billing data.
58 Display takeover
K_KEB_BER (Profitability Report: ● CEERKRS (Operating concern) 02 Change
Authorization Objects) ● ACTVT (Activity)
03 Display
K_KEB_RC (Profitability Report: ● CEERKRS (Operating concern) 01 Create or generate
Forms) ● CEFORM (Form)
● ACTVT (Activity) 02 Change
03 Display
21 Transport
60 Import
K_KEB_REP (Profitability Report: ● CEERKRS (Operating Concern) 01 Create or generate
Report Name) ● CEREPID (Report) Assigns authorization to create re
● ACTVT (Activity) ports.
02 Change
Assigns authorization to change re
ports including saving the report
structure from the list.
03 Display
Assigns authorization to display re
ports.
04 Print, edit messages
Assigns authorization to print re
ports.
16 Execute
Assigns authorization to execute re
ports.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 135Authorization Object Field Value Description
21 Transport
Assigns authorization to transport
reports.
28 Display line items
Assigns authorization to execute re
ports and display line items from the
report list.
32 Save
Assigns authorization to save the re
port list with data.
60 Import
Assigns authorization to import re
ports from client 000.
61 Export
Assigns authorization to export re
ports.
L0 All functions
L1 Function range level 1
L2 Function range level 2
K_KEB_TC (Profitability Reports) ● ACTVT (Activity) 01 Create or generate
Assigns authorization to create re
ports and change key figure
scheme.
02 Change
Assigns authorization as follows:
● To change and delete reports
● Test monitor for profitability re
ports
● Assign a hierarchy for account-
based CO-PA
● Maintain variables
● Maintain the report tree
Security Guide for SAP S/4HANA 1709
136 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
03 Display
Assigns authorization to display re
ports.
16 Execute
Assigns authorization to execute re
ports.
65 Reorganize
Assigns authorization to reorganize
the following:
● Report data
● Reports
● Forms
● Layouts
66 Refresh
Assigns authorization to update re
ports and schedule variant groups.
B3 Derive
Assigns authorization to carry out
characteristic derivation before au
thorization checks for CO-PA au
thorizations.
K_KC_DB_VS (SAP-EIS Authoriza ● CFASPET (Aspect (application Assigns authorization for the as
tion for Data Basis Version & area)) pect, version, and plan/actual indi
Plan/Act Ind.) ● CFVERSION (Version) cator.
● CFPLANT (Plan/Act. indicator
(EC-EIS/EC-BP))
● CFOKCOD (EC-EIS/BP function
code)
K_KC_PR (SAP-EIS: Authorization ● CFHIEID (User group)
for Presentation) ● CFLFDID (Sequence number
for hierarchical node)
● CFREPID (Report)
● CFJDEST (Stroage place of
SAP-EIS report)
● CFOKCOD (EC-EIS/BP function
code)
● TCD (Transaction Code)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 137Authorization Object Field Value Description
K_KC_PBR (SAP-EIS: Authorization ● CFASPET (Aspect (application 02 Change
for Presentation Objects) area))
Assigns authorization to create and
● ACTVT (Activity) change an authorization object.
03 Display
Assigns authorization to display an
authorization object.
K_TEST (Test) ● ACTVT (Activity)
K_TP_VALU (Transfer Price Valua ● KOKRS (Controlling Area) 02 Change
tions) ● VALUTYP (Valuation View) Assigns authorization to change the
● ACTVT (Activity) valuation view.
03 Display
Assigns authorization to display the
valuation view.
10 Post
The table below shows the security-relevant authorization objects that are used by the Controlling component but
are only needed for industry solutions.
Standard Authorization Objects
Table 65:
Authorization Object Field Value Description
K_PRICE001 (Authorization for ● BUKRS (Company Code) 02 Change
Price Maintenance, Catch Weight ● WERKS (Plant)
Solution) ● CWPRICLABL (Price Type) 03 Display
● ACTVT (Activity)
K_PRS_LS (CO Authorization for ● PRCTR (Profit Center) 02 Change
Prof. Services Lean Staffing) ● ACTVT (Activity)
03 Display
06 Delete
The table below shows the security-relevant authorization objects that are used by the Controlling component but
are only needed for industry solutions.
Standard Authorization Objects
Security Guide for SAP S/4HANA 1709
138 P U B L I C SAP S/4HANA Business ApplicationsTable 66:
Authorization Object Field Value Description
K_PEP (CO Authorization Object for ● ACTVT (Activity) 06 Delete
Period-End Partner (PEP)) Assigns authorization to delete log
entries in the Period-End Partner
(PEP).
13 Execute
K_MLNUSER (CO Material Ledger: In ● BWKEY (Valuation area) Assigns authorization to close the
dividual settlement; (no longer material ledger for specific materials
used)) and display material ledger master
data.
K_MLPUSER (CO Material Ledger: ● BWKEY (Valuation area) Assigns authorization to close the
Plant settlement (no longer used)) material ledger for a plant and carry
out exact analyses of data.
For general information on the authorizations in Controlling, see the documentation for Controlling on the SAP
Help Portal at http://help.sap.com under Methods in Controlling Authorizations and under Accounting
Controlling (CO) Profitability Analysis (CO-PA) Information System Authorization Objects in the Information
System . Information on the authorizations for the Controlling functions in Manager Self-Service (MSS) and for
the role of the Business Unit Analyst (BUA) can be found in this Security Guide under Cross-Application
Components and then Self-Services.
Critical Combinations
The critical combinations for Controlling are as follows:
● The roles for Controlling are based on the area menus rather than on U.S. Sarbanes-Oxley Act compliance.
● The master data folders in each transaction should be assigned to a master data officer rather than to a
controlling end user to ensure the integrity of the data.
● In the planning transaction, authorizations can be assigned to many users.
● In addition to maintaining authorizations for managers, you should consider using the personalization
framework for manager self-service.
The table below shows the roles that also contain authorization for logistics.
Standard Authorization Objects that Contain Authorization for Controlling and Logistics
Table 67:
SAP_EP_RW_CO_KKAM FI - CO - Product Cost by Sales Order
SAP_EP_RW_CO_KKPM FI - CO - Product Cost by Period
SAP_EP_RW_CO_KKSM FI - CO - Product Cost by Order
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 139SAP_EP_RW_CO_CK00 FI - CO - Product Cost Planning
13.3.2.2 Profit Center Accounting (EC-PCA)
Important SAP Notes
The following composite SAP Note contains important information about the security of the Profit Center
Accounting (EC-PCA) component:
Table 68:
Title SAP Note
Composite SAP note: Security of Enterprise Controlling 1518587
Authorizations
Standard Roles
The following table shows the standard roles that are used by the component.
Table 69:
Role Description
SAP_AUDITOR_BA_EC_PCA AIS – Profit Center Accounting
SAP_AUDITOR_BA_EC_PCA_A AIS – Profit Center Accounting (Authorizations)
SAP_EC_PCA_ARCHIVING Profit Center Accounting Archiving
SAP_EC_PCA_MODEL Maintain Cycles for Assessment, Distribution, and Reposting
(EC-PCA)
SAP_EC_PCA_MODEL_TP_DISPLAY Display Transfer Prices
SAP_EC_PCA_MODEL_TP_MAINTAIN Maintain Transfer Prices
SAP_EC_PCA_OBJECT_DISPLAY Display Profit Center Master Data
SAP_EC_PCA_OBJECT_MAINTAIN Maintain Profit Center Master Data
SAP_EC_PCA_PEREND Period-End Closing in Profit Center Accounting
SAP_EC_PCA_PEREND_POSTINGS Data Entry for Profit Center Accounting
Security Guide for SAP S/4HANA 1709
140 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_EC_PCA_PLAN_CLOSING Plan Closing in Profit Center Accounting
SAP_EC_PCA_REPORT Profit Center Accounting – Line Items and Totals Records
SAP_EC_PCA_REPORT1 Profit Center Accounting – Drilldown Reports
SAP_EC_PCA_REPORT2 Profit Center Accounting – Report Painter Reports
SAP_EC_PCA_REPORT3 Profit Center Accounting – Reports from Other Components
Standard Authorization Objects
The following table shows the security-relevant authorization objects that are used by the component.
Table 70:
Authorization Object Description
K_PCA EC-PCA: Responsibility Area, Profit Center
K_PCAB_DEL EC-PCA: Delete Transaction Data
K_PCAD_UM EC-PCA: Assessment/Distribution
K_PCAF_UEB EC-PCA: FI Data Transfer
K_PCAI_UEB EC-PCA: Actual Data Transfer
K_PCAL_GEN EC-PCA: Generate and Activate Ledger
K_PCAM_UEB EC-PCA: MM Data Transfer
K_PCAP_SET EC-PCA: Planning Hierarchy
K_PCAP_UEB EC-PCA: Plan Data Transfer
K_PCAR_REP EC-PCA: Summary and Line Item Reports
K_PCAR_SRP EC-PCA: Standard Reports and Datasets
K_PCAS_PRC EC-PCA: Profit Center
K_PCAS_UEB EC-PCA: SD Data Transfer
K_PCA_REAL EC-PCA: Realignment for PrCtr Assignments to CO Master
Data
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 14113.3.2.3 Network and Communication Security
Controlling is integrated with Microsoft Office . For information on security aspects with Microsoft Office
applications, refer to the documentation of those products.
Communication in Manager Self-Service (MSS) and in the Web Application for the Business Unit Analyst (BUA) is
based on Remote Function Calls (RFCs).
13.3.2.3.1 Communication Destinations
Technical users are required for communication over ALE, for batch reporting, and for third-party providers that
access Controlling data.
13.3.2.4 Joint Venture Accounting
13.3.2.4.1 Authorizations
Standard Roles
The table below shows the standard roles that are used by JVA.
Table 71:
Role Description
SAP_EP_RW_GJVP RW - Joint Venture Accounting
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by JVA.
Table 72:
Authorization Object Description
J_JVA_CUS Joint Venture Accounting: Customizing
J_JVA_JOA Joint Venture Accounting: Joint Operating Agreement Master
Security Guide for SAP S/4HANA 1709
142 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
J_JVA_PRC Joint Venture Accounting: Processing
J_JVA_REP Joint Venture Accounting: Reporting
J_JVA_VNT Joint Venture Accounting: Venture Master
13.3.2.4.2 Communication Channel Security
Table 73:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Front-end client using SAP DIAG All application data For example, passwords,
GUI for Windows to applica business data, credit card in
tion server formation
Front-end client using a Web HTTP(S) All application data For example, passwords,
browser to application server business data, credit card in
formation
Application server to applica RFC, HTTP(S) Integration data Business data, credit card in
tion server formation
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
Recommendation
We strongly recommend using secure protocols (SSL, SNC) whenever possible.
13.3.3 Security Information for Governance, Risk and
Compliance
13.3.3.1 Security Information for International Trade
The following security information applies to SAP for S/4HANA for international trade only.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 14313.3.3.2 Introduction
Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance
with general data privacy regulation, it is necessary to consider compliance with industry-specific legislation in
different countries. SAP provides specific features and functions to support compliance with regards to relevant
legal requirements, including data protection. SAP does not give any advice on whether these features and
functions are the best method to support company, industry, regional, or country-specific requirements.
Furthermore, this information does not give any advice or recommendation in regards to additional features that
would be required in particular IT environments; decisions related to data protection must be made on a case-by-
case basis, under consideration of the given system landscape and the applicable legal requirements.
Note
In the majority of cases, compliance with applicable data protection and privacy laws will not be covered by a
product feature. SAP software supports data protection compliance by providing security features and specific
data protection-relevant functions, such as simplified blocking and deletion of personal data. SAP does not
provide legal advice in any form. Definitions and other terms used in this document are not taken from any
given legal source.
13.3.3.3 Glossary
Table 74:
Term Definition
Personal data Any information relating to an identified or identifiable natural
person ("data subject"). An identifiable natural person is one
who can be identified, directly or indirectly, in particular by
reference to an identifier such as a name, an identification
number, location data, an online identifier or to one or more
factors specific to the physical, physiological, genetic, mental,
economic, cultural, or social identity of that natural person.
Purpose A legal, contractual, or in other form justified reason for the
processing of personal data. The assumption is that any pur
pose has an end that is usually already defined when the pur
pose starts.
Blocking A method of restricting access to data for which the primary
business purpose has ended.
Deletion The irreversible destruction of personal data.
Security Guide for SAP S/4HANA 1709
144 P U B L I C SAP S/4HANA Business ApplicationsTerm Definition
Retention period The period of time between the end of purpose (EoP) for a
data set and when this data set is deleted subject to applica
ble laws. It is a combination of the residence period and the
blocking period.
End of purpose (EoP) A method of identifying the point in time for a data set when
the processing of personal data is no longer required for the
primary business purpose. After the EoP has been reached,
the data is blocked and can only be accessed by users with
special authorization (e.g. tax auditors).
Sensitive personal data A category of personal data that usually includes the following
type of information:
● Special categories of personal data such as data reveal
ing racial or ethnic origin, political opinions, religious or
philosophical beliefs, or trade union membership and the
processing of genetic data, biometric data, data concern
ing health or sex life or sexual orientation
● Personal data subject to professional secrecy
● Personal data relating to criminal or administrative of
fenses
● Personal data concerning insurances and bank or credit
card accounts
Residence period The period of time after the end of purpose (EoP) for a data
set during which the data remains in the database and can be
used in case of subsequent processes related to the original
purpose. At the end of the longest configured residence pe
riod, the data is blocked or deleted. The residence period is
part of the overall retention period.
Where-used check (WUC) A process designed to ensure data integrity in the case of po
tential blocking of business partner data. An application''s
where-used check (WUC) determines if there is any depend
ent data for a certain business partner in the database. If de
pendent data exists, this means the data is still required for
business activities. Therefore, the blocking of business part
ners referenced in the data is prevented.
Consent The action of the data subject confirming that the usage of his
or her personal data shall be allowed for a given purpose. A
consent functionality allows the storage of a consent record in
relation to a specific purpose and shows if a data subject has
granted, withdrawn, or denied consent.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 14513.3.3.4 Read Access Logging
Read Access Logging (RAL) is used to monitor and log read access to sensitive data. This data may be
categorized as sensitive by law, by external company policy, or by internal company policy. These common
questions might be of interest for an application that uses Read Access Logging:
● Who accessed the data of a given business entity, for example a bank account?
● Who accessed personal data, for example of a business partner?
● Which employee accessed personal information, for example religion?
● Which accounts or business partners were accessed by which users?
These questions can be answered using information about who accessed particular data within a specified time
frame. Technically, this means that all remote API and UI infostructures (that access the data) must be enabled
for logging.
Use
In Read Access Logging (RAL), you can configure which read-access information to log and under which
conditions. SAP delivers sample configurations for applications. The application component scenario logs data in
order to describe business processes. You can find the configurations as described in this chapter.
For the following configurations, fields are logged in combination with additional fields in the following buiness
contexts:
Read Access Logging is currently limited to the following channels, however:
● Remote Function Calls (sRFC, aRFC, tRFC, qRFC, bgFRC)
● Dynpro (dynpro fields, ALV Grid, ABAP List, F4)
● Web Dynpro
● Web services
● Gateway (for oData)
13.3.3.5 Deletion of Personal Data
● Simplified Blocking and Deletion: In addition to compliance with the general data protection regulation, it is
necessary to consider compliance with industry-specific legislation in different countries. A typical potential
scenario in certain countries is that personal data shall be deleted after the specified, explicit, and legitimate
purpose for the processing of personal data has ended, but only as long as no other retention periods are
defined in legislation, for example, retention periods for financial documents. Legal requirements in certain
scenarios or countries also often require blocking of data in cases where the specified, explicit, and legitimate
purposes for the processing of this data has ended, but the data has to be retained in the database due to
other legally defined retention periods. In some scenarios, personal data also includes referenced data.
Therefore, the challenge for deletion and blocking is to first handle referenced data and finally other data,
such as business partner data.
● Deletion of personal data: The handling of personal data is subject to applicable laws related to the deletion of
such data at the end of purpose (EoP). If there is no longer a legitimate purpose that requires the use of
Security Guide for SAP S/4HANA 1709
146 P U B L I C SAP S/4HANA Business Applicationspersonal data, it must be deleted. When deleting data in a data set, all referenced objects related to that data
set must be deleted as well. It is also necessary to consider industry-specific legislation in different countries
in addition to general data protection laws. After the expiration of the longest retention period, the data must
be deleted.
The S/4HANA for international trade might process data (personal data) that is subject to the data protection
laws applicable in specific countries as described in SAP Note 1825544 .
To enable even complex scenarios, SAP simplifies existing deletion functionality to cover data objects that are
personal data by default. For this purpose, SAP uses SAP Information Lifecycle Management (ILM) to help you set
up a compliant information lifecycle management process in an efficient and flexible manner. The functions that
support the simplified blocking and deletion of personal data are not delivered in one large implementation, but in
several waves. Scenarios or products that are not specified in SAP Note 1825608 (central Business Partner)
and SAP Note 2007926 (ERP Customer and Vendor) are not yet subject to simplified blocking and deletion.
Nevertheless, it is also possible to destroy personal data for these scenarios or products. In these cases, you have
to use an existing archival or deletion functionality or implement individual retention management of relevant
business data throughout its entire lifecycle. The SAP Information Lifecycle Management (ILM) component
supports the entire software lifecycle including the storage, retention, blocking, and deletion of data.
This product uses SAP ILM to support the deletion of personal data as described in the following sections:
SAP delivers an end of purpose check for the product.
SAP delivers a where-used check (WUC) for the product.
All applications register either an end of purpose check (EOP check) in the Customizing settings for the blocking
and deletion of application data (for example, the customer and vendor master or the business partner) or a WUC.
For information about the Customizing of blocking and deletion for this product, see Configuration: Simplified
Blocking and Deletion.
End of Purpose Check (EoP check)
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. The retention period of data consists of the following phases:
● Phase one: The relevant data is actively used.
● Phase two: The relevant data is actively available in the system.
● Phase three: The relevant data needs to be retained for other reasons.
For example, processing of data is no longer required for the primary business purpose, but to comply with legal
rules for retention, the data must still be available. In phase three, the relevant data is blocked.
Blocking of data prevents the business users of SAP applications from displaying and using data that may include
personal data and is no longer relevant for business activities.
Blocking of data can impact system behavior in the following ways:
● Display: The system does not display blocked data.
● Change: It is not possible to change a business object that contains blocked data.
● Create: It is not possible to create a business object that contains blocked data.
● Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a business
object that contains blocked data.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 147● Search: It is not possible to search for blocked data or to search for a business object using blocked data in
the search criteria.
It is possible to display blocked data if a user has special authorization; however, it is still not possible to create,
change, copy, or perform follow-up activities on blocked data.
Where-Used Check (WUC)
A where-used check is a simple check to ensure data integrity in case of potential blocking. The WUC for this
product checks whether any dependent data for a customer, vendor, or central business partner (cBP) exists in
the respective table. If dependent data exists, that is, if the data is still required for business activities, the system
does not block that specific customer, vendor, or cBP.
If you still want to block the data, the dependent data must be deleted by using the existing archival and deletion
tools or by using another customer-specific solution.
13.3.3.5.1 Deletion of Personal Data in International Trade
International Trade might process data (personal data) that is subject to the data protection laws applicable in
specific countries.
Note
SAP S/4HANA for internalional trade does not use Information SAP Information Lifecycle Management
(ILM) to control the blocking and deletion of personal data. SAP S/4HANA for international trade uses SAP
Business Partner (BP) instead to control the blocking and deletion of personal data.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
defining the settings for blocking. Choose Customizing, then Cross-Application Components under Data
Protection.
13.3.3.5.1.1 Intrastat-Declarations
Personal data of the contact person of the provider of information, for example first name, last name and e-mail
address, is written into Intrastat declaration files to be compliant with the file formats defined by authorities.
These file formats are country-specific and can be changed by authorities at any time.
Intrastat declaration files are saved outside the SAP S/4HANA system. Therefore, the management of those files
and the deletion of personal data in those files must be done outside the SAP S/4HANA system.
Security Guide for SAP S/4HANA 1709
148 P U B L I C SAP S/4HANA Business Applications13.3.3.6 Authorizations in International Trade
International trade uses the authorization concept provided by the SAP NetWeaver for Application Server ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver for
Application Server ABAP also apply.
13.3.3.6.1 Business Catalogs in International Trade
Business catalogs are the central object for UI and authorization assignment to business users and for structuring
and organizing the menu and authorization maintenance. If a user is assigned to a business catalog, he gains
access to all apps included in the catalog and therefore requires the corresponding authorizations.
In On-Premise, business catalogs are defined by customers by composing the relevant apps based on their
specific requirements. Authorizations are determined via the Fiori-PFCG integration when entering the catalog in
the PFCG role menu. SAP delivers business catalogs as templates that customers may copy to create their own
content. To give users access to the apps, must assign them to the Business catalogs.
Business Catalogs
Business Catalog: SAP_SLL_BC_CLS_LEGCTRL
International Trade Classification - Legal Control
Apps
● Manage Control Classes
● Manage Control Groupings
● Classify Products - Legal Control
● Reclassify Products - Legal Control
Business Catalog: SAP_SLL_BC_CLS_CMMDTYCODE
International Trade Classification - Commodity Codes
Apps
● Manage Commodity Codes
● Classify Products – Commodity Codes
● Reclassify Products – Commodity Codes
Business Catalog: SAP_SLL_BC_CLS_ISSRVCCODE
International Trade Classification - Intrastat Service Codes
Apps
● Manage Intrastat Service Codes
● Classify Products – Intrastat Service Codes
● Reclassify Products – Intrastat Service Codes
Business Catalog: SAP_SLL_BC_INTRASTAT_DECLN
Intrastat - Declaration Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 149Apps
● Manage Intrastat Service Codes
● Classify Products – Intrastat Service Codes
● Reclassify Products – Intrastat Service Codes
Business Catalog: SAP_SLL_BC_INTRASTAT_SEL
Intrastat - Selection Report Execution
Apps
● Select Dispatches and Customer Returns
● Select Receipts and Returns to Supplier
Business Catalog: SAP_SLL_BC_LICENSE_MANAGE
International Trade Compliance - License Management
Apps
● Manage Licenses
Business Catalog: SAP_SLL_BC_CMPLCDOC_MANAGE
International Trade Compliance - Document Management
Apps
● Resolve Blocked Documents - Trade Compliance
● Manage Documents - Trade Compliance
13.3.3.6.1.1 Display Business Catalog in International Trade
You can manage authorization fields in PFCG role by using transaction PFCG. The authorization field is used in
Business Partner display catalog.
Business Catalog: SAP_CMD_BC_BP_DISP
Master Data - Business Partner Display
Table 75:
Authorization Object Description Authorization Field
B_BUPA_GRP Authorization Group for Business Part BEGRU
ners
B_BUPA_RLT Business Partner Role RLTYP
Business Partner Display Catalog Used by Intrastat Apps (POI)
If you assign business catalog SAP_SLL_BC_INTRASTAT_DECLN in a backend role, you also assign business
catalog SAP_CMD_BC_BP_DISP in a backend role. Specify business partner role type B_BUPA_RLT with ACTVT =
03 & RLTYP = ''SLLSTL''. ''SLLSTL'' is the contact person created as provider of information.
Business Partner Display Catalog Used by Legal Control Apps
Security Guide for SAP S/4HANA 1709
150 P U B L I C SAP S/4HANA Business ApplicationsIf you assign business catalog SAP_SLL_BC_LICENSE_MANAGE in backend role, you also assign business catalog
SAP_CMD_BC_BP_DISP in a backend role.
.
13.3.3.6.1.2 Manage Authorization for Generic Service in
Business Catalog in International Trade
You can use the generic object services in the business catalog, to restrict application specific authorization fields
by following the documentation below.
13.3.3.6.1.2.1 Generic Object Services (GOS) attachment
service
Integration with attachment service for license master
Manual action required
1. 1. Assign Fiori catalog SAP_SLL_BC_LICENSE_MANAGE to PFCG role in backend.
2. Input value for authorization object S_GOS_ATT manually.
● BOROBJTYPE = ITRLICMSTR
● ACTIVITY = 02 and 06
13.3.3.6.1.2.2 Generic Service - Application Job SU22
Authorization Default
Integration with application job for Intrastat selection reports
Manual action required
1. Assign Fiori catalog to PFCG role.
2. 2Assign authorization default for selection reports.
● Transaction VE01 - Select SD Dispatches and Returns
● • Transaction MEIS - Select MM Receipts and Returns
13.3.3.6.2 Standard Authorization Objects in International
Trade
The following table shows the default authorization objects that you need for international trade.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 151Table 76:
Authorization Object Description
ITM_BUKRS Authorization for Company Code
ITM_LGREG Authorization for Legal Regulation
ITM_LMGM Authorization for Legal Regulation / License Type
/ECRS/RPHD Intrastat Declaration
/ECRS/POIA Provider of Information
/ECRS/SP Selection Program for Intrastat Reporting
ITM_CLS_NC Trade Classification: Auth. for Numbering Scheme Content
ITM_CLS_LR Trade Classification: Authorization for Legal Regulation
ITM_CLS_NS Trade Classification: Authorization for Numbering Scheme
For International Trade apps, you find the following authorization objects in the tables listed below:
Table 77:
Authorization Object App Name
ITM_CLS_NC Classify Products - Commodity Codes
Reclassify Products - Commodity Codes
Classify Products - Intrastat Service Codes
Reclassify Products - Intrastat Service Codes
Table 78:
Authorization Object App Name
ITM_CLS_LR Classify Products - Legal Control
ITM_CLS_NS Reclassify Products - Legal Control
Table 79:
Authorization Object App Name
ITM_CLS_NC Manage Control Classes
Table 80:
Authorization Object App Name
ITM_CLS_LR Manage Control Groupings
Security Guide for SAP S/4HANA 1709
152 P U B L I C SAP S/4HANA Business ApplicationsTable 81:
Authorization Object App Name
ITM_BUKRS Manage Licenses
ITM_LMGM
ITM_LGREG
ITM_CLS_NS
ITM_CLS_NC
S_GOS_ATT
Table 82:
Authorization Object App Name
ITM_BUKRS Resolve Blocked Documents - Trade Compliance
ITM_LGREG
ITM_CLS_NS
ITM_CLS_NC
Table 83:
Authorization Object App Name
ITM_BUKRS Manage Documents - Trade Compliance
ITM_LGREG
ITM_CLS_NS
ITM_CLS_NC
Table 84:
Authorization Object Transaction Name
/ECRS/SP MEIS: Select Receipts, Returns to Supplier
VE01: Select Dispatches, Customer Returns
13.3.3.6.3 Standard Roles in International Trade
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 153Note
For more information about how to create roles, see SAP NetWeaver Security Guide under User
Administration and Authentication.
13.3.3.6.3.1 Frontend Roles (Business Roles) - in International
Trade
International Trade uses the following Business Roles for the Frontend:
Table 85:
Portal Roles Description
SAP_BR_TRD_CLS_SPECIALIST International Trade Classification Specialist
SAP_BR_TRD_CMPLNC_SPECIALIST International Trade Compliance Specialist
SAP_BR_INTRASTAT_SPECIALIST Intrastat Specialist
13.3.3.6.3.2 Backend Roles in International Trade
We do not deliver backend roles. Instead, please integrate generic services into your backend roles (PFCG roles).
See Chapter Generic Object Services (GOS) attachment service.
13.3.4 Treasury and Financial Risk Management
13.3.4.1 SAP Bank Communication Management (incl. SAP
Integration Package for SWIFT)
About this Document
The Security Guide provides an overview of the specific security-relevant information that applies to the SAP Bank
Communication Management including the SAP Integration Package for SWIFT .
Security Guide for SAP S/4HANA 1709
154 P U B L I C SAP S/4HANA Business Applications13.3.4.1.1 Technical System Landscape
Use
SAP Bank Communication Management is responsible for the creation and approval of batches, the payment
status monitor and bank statement monitor. Use of the SAP Integration package for SWIFT is optional ; it provides
a file interface to the Swift Alliance Access/Alliance Gateway (SWIFT is not SAP software and not part of SAP Bank
Communication Management ).
The figure below shows an overview of the technical system landscape for SAP Bank Communication
Management .
For more information about recommended security zone settings, see SAP NetWeaver Security Guide (Complete)
on SAP Service Marketplace at http:// service.sap.com/securityguide .
13.3.4.1.2 User Management
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively have to change their passwords on a regular basis,
but not those users under which background processing jobs run.
The user types that are required for the SAP Bank Communication Management include:
● Individual users
Dialog users are used for SAP GUI for Windows connections.
● Technical users
Communication users are used for XI communication.
Standard Users
The table below shows the standard users that are necessary for operating the SAP Bank Communication
Management .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 155Table 86:
System User ID Type Password Description
SAP Bank Communica For example: Communication user You specify the initial
tion Management BRMXIUSER password during the in
stallation.
The user ID and pass
word are stored in the
XI channel for the con
nection.
XI Integration Server For example: Default user You specify the initial Member of user group
password during the in SWIFT_ADMINISTRA
SWIFTADMIN
stallation. TOR as described in the
SAP Integration
Package for SWIFT
Configuration Guide .
You need to create these users before XI configuration.
Assign role SAP_XI_IS_SERV_USER to user BRMXIUSER and role SWIFT_ADMINSTRATOR to user SWIFTADMIN.
Creation of role SWIFT_ADMINSTRATOR is described in the SAPIntegration Package for SWIFT Configuration
Guide .
13.3.4.1.3 Authorizations
Standard Roles
The table below shows the standard roles that are used by the SAP Bank Communication Management.
Table 87:
Role Description
SAP_XI_IS_SERV_USER Exchange Infrastructure: Integration Server Service User
SWIFT_ADMINSTRATOR Operating SWIFT interface. See Integration Package for
SWIFT Configuration Guide
SAP_BPR_CASH_MANAGER Cash Manager
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by SAP Bank Communication
Management.
Security Guide for SAP S/4HANA 1709
156 P U B L I C SAP S/4HANA Business ApplicationsTable 88:
Authorization Object Description
F_FEBB_BUK Company Code Bank Statement
F_REGU_BUK Automatic Payment: Activity Authorization for Company Co
des
13.3.4.1.4 Communication Destinations
The table below shows an overview of the communication destinations used by SAP Bank Communication
Management .
Table 89:
Destination Delivered Type User, Authorizations
INTEGRATION_SERVER No RFC XIAPPLUSER
Role
SAP_XI_APPL_SERV_USER
LCRSAPRFC No RFC
SAPSLDAPI No RFC
These destinations are not application-specific but they are required for the operation of the Exchange
Infrastructure.
13.3.4.1.5 Data Storage Security
Master and transaction data of SAP Bank Communication Management is saved in the database of the SAP
system in which SAP Bank Communication Management is installed.
Access to this data is restricted through the authorizations for authorization object F_STAT_MON. You can add this
authorization object to the role or user that is used by you for payment medium creation.
Payment order related transaction data is distributed to connected systems using XI, especially if the optional
Integration Package for SWIFT is used.
Access to data on natural persons in particular is subject to data protection requirements and must be restricted
by assigning authorizations.
Using Logical Path and Filenames to Protect Access to the File System
SAP Bank Communication Management saves data in files in the file system. Therefore, it is important to explicitly
provide access to the corresponding files in the file system without allowing access to other directories or files
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 157(also known as directory traversal). This is achieved by specifying logical paths and file names in the system that
map to the physical paths and file names. This mapping is validated at runtime and if access is requested to a
directory that does not match a stored mapping, then an error occurs.
The following lists show the logical file names and paths used by SAP Bank Communication Management and for
which programs these file names and paths apply:
Logical File Names Used in SAP Bank Communication Management
The following logical file names have been created in order to enable the validation of physical file names:
● FI_RFEBKAT0_FILE
○ Program using this logical file name and parameters used in this context:
○ RFEBKAT0
● FI_RFEBKATX_FILE
○ Program using this logical file name and parameters used in this context:
○ RFEBKATX
● FI_RFEBKAT1_FILE
○ Program using this logical file name and parameters used in this context:
○ RFEBKAT1
● FI_RFEBEST0_FILE
○ Program using this logical file name and parameters used in this context:
○ RFEBEST0
● FI_RFEBLBT1_FILE
○ Program using this logical file name and parameters used in this context:
○ RFEBLBT1
● FI_RFEBLBT2_FILE
○ Program using this logical file name and parameters used in this context:
○ RFEBLBT2
Parameters used in this context: Program name
Logical Path Name Used in SAP Bank Communication Management
The logical file names listed above all use the logical file path FI_FTE_TEST_FILES .
13.3.4.2 SAP In-House Cash (FIN-FSCM-IHC)
In the following sections you can find information about the specific security functions for the SAP In-House Cash
(FIN-FSCM-IHC) component.
In addition, you can access further information at the following places:
For information about the specific security functions for the component Bank Customer Accounts (IS-B‑BCA), see
Bank Customer Accounts (BCA) [page 700] in the Banking section.
Reason: SAP In-House Cash (FIN-FSCM-IHC) uses Bank Customer Accounts as the basis for various functions.
Security Guide for SAP S/4HANA 1709
158 P U B L I C SAP S/4HANA Business ApplicationsFor information about the specific security functions for the component Bank Accounting (FI-BL), see the under
Bank Accounting (FI-BL) [page 99] in the Banking section.
Reason: SAP In-House Cash (FIN-FSCM-IHC) uses various functions of Bank Accounting , such as the creation of
data media for central payments.
13.3.4.2.1 Security Aspects of Data, Data Flow and Processes
The following sections show an overview of the data flow in the processes of SAPIn-House Cash .
Note
The appropriate Security Guides apply for all of the external systems that you require when using the SAP In-
House Cash component. Include these Security Guides in your cross-application security concept.
13.3.4.2.1.1 Internal Payments
The figure below shows an overview of internal payments between two subsidiary companies and the transfer of
the balances to the general ledger.
The table below shows the security aspect to be considered for the process step and what mechanism applies.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 159Table 90:
Step Description Security Measure
1 Payment order User type: dialog user or technical user
(IDoc/ALE)
2a Bank statement User type: dialog user or technical user
(IDoc/ALE)
2b Bank statement User type: dialog user or technical user
(IDoc/ALE)
3 General ledger transfer; only relevant if User type: dialog user or technical user
SAP In-House Cash and the head office
are running in two different systems
(IDoc/ALE)
13.3.4.2.1.2 Head Office Payments
The following figure shows an overview of the data flow if the head office takes over the payments for the payables
of a single subsidiary company.
Security Guide for SAP S/4HANA 1709
160 P U B L I C SAP S/4HANA Business ApplicationsThe table below shows the security aspect to be considered for the process step and what mechanism applies.
Table 91:
Step Description Security Measure
1 Payment order User type: dialog user or technical user
(IDoc/ ALE )
2 Payment order User type: dialog user or technical user
(IDoc/ ALE or RFC)
3 Bank statement User type: dialog user or technical user
(IDoc/ ALE )
4 General ledger transfer; only relevant if User type: dialog user or technical user
SAP In-House Cash and the head office
are running in two different systems
(IDoc/ ALE )
Note
The type of communication for the second step depends on your settings. If you have activated the In-House
Cash (Enterprise) (IHC_EP) application, then communication is by RFC. Otherwise it is by IDoc/ ALE . You can
find these settings in Customizing of SAP In-House Cash under Basic Settings → Business Transaction Events/
Event Control → Activate SAP Components .
13.3.4.2.1.3 Central Incoming Payments
The figure below shows an overview of an incoming payment that is intended for a subsidiary company of the
head office.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 161The table below shows the security aspect to be considered for the process step and what mechanism applies.
Table 92:
Step Description Security Measure
1 Incoming payment via bank statement Access authorization via RFC user
(RFC)
2 Bank statement User type: dialog user or technical user
(IDoc/ALE)
3 General ledger transfer; only relevant if User type: dialog user or technical user
SAP In-House Cash and the head office
are running in two different systems
(IDoc/ALE)
13.3.4.2.1.4 Local Payments
The figure below shows an overview of the data flow if a subsidiary company uses the house bank of a different
subsidiary company for its payment that is located in the country of the payment recipient. This avoids having to
make a foreign payment. The process flow is similar to Head Office Payments [page 160] .
Security Guide for SAP S/4HANA 1709
162 P U B L I C SAP S/4HANA Business ApplicationsThe table below shows the security aspect to be considered for the process step and what mechanism applies.
Table 93:
Step Description Security Measure
1 Payment order(IDoc/ALE) User type: dialog user or technical user
2 Payment order(IDoc/ALE) User type: dialog user or technical user
3 Bank statement(IDoc/ALE) User type: dialog user or technical user
4 General ledger transfer; only relevant if User type: dialog user or technical user
SAPIn‑House Cash and the head office
are running in two different sys
tems(IDoc/ALE)
13.3.4.2.2 Authorizations
Standard Roles
The table below shows the standard roles that are used by the SAP In-House Cash component. They contain the
maximum values of the authorizations.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 163Table 94:
Roles Description Comments
SAP_CFM_IHC_SUPERVISOR In-House Cash Supervisor Relevant for CFM 2.0
SAP_FSCM_IHC_SUPERVISOR FSCM In-House Cash Supervisor EA-Finserv 200 onwards
Authorization Objects
The table below shows the security-relevant authorization objects that are used by the SAP In-House Cash
component.
Table 95:
Authorization Objects Description
IHC_ACTION Authorizations for IHC activities
IHC_ROUTE Authorizations in route definition
IHC_CMSTAT Cash Management status of In-House Cash
F_PAYRQ Authorization object for payment requests
See also the Customizing activities in the SAP Customizing Implementation Guide (IMG). To do this, choose
SAP Reference IMG Financial Supply Chain Management In-House Cash Authorization Management. .
13.3.4.3 Cash and Liquidity Management
Network and Communication Security
Communication with external systems is possible using standard interfaces via BAPI, IDoc, and XI.
Communication Destinations
In certain cases, a technical user may be required for the use of BAPIs.
Authorizations
Access is protected by the authorization objects described in Authorizations [page 165].
Security Guide for SAP S/4HANA 1709
164 P U B L I C SAP S/4HANA Business ApplicationsInternet Communication Framework Security (ICF)
You should only activate those services that are needed for the applications running in your system. For more
information, see Internet Communication Framework Security (ICF) [page 179].
Data Storage Security
You can use logical path and file names to protect access to the file system. For more information, see Data
Storage Security [page 180].
13.3.4.3.1 Authorizations
Cash and Liquidity Management uses the authorization concept delivered by SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS ABAP
security guide also apply to Cash and Liquidity Management.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For the
role maintenance for ABAP technology, use the profile generator (transaction PFCG).
Standard Roles
The following table shows the standard role that is used in Cash and Liquidity Management.
Table 96:
Role Description
SAP_BR_CASH_MANAGER Business catalog role for cash managers
SAP_BR_CASH_SPECIALIST Business catalog role for cash specialists
SAP_FIN_ANALIQUIDITYPLAN_APP Back-end role for liquidity plans
SAP_FIN_DEVLIQUIDITYPLAN_APP Back-end role for develop liquidity plans
SAP_FIN_LF90DAYS_SMB_APP Back-end role for liquidity forecast
SAP_FIN_ACF90DAYS_SMB_APP Back-end role for actual cash flow
SAP_SFIN_CASH_MANAGER Role for customers who choose to use SAP NetWeaver Busi
ness Client (NWBC) as the user interface for Bank Relation
ship Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 165Standard Authorization Objects
The following table shows the security-relevant authorization objects that are used in Cash and Liquidity
Management.
Table 97:
Authorization Object Authorization Field Permitted Activities Description
B_BUPA_RLT ACTVT ● 01 Create or generate With this authorization ob
● 02 Change ject, you define which BP
Business Partner: BP Roles
● 03 Display roles can be edited.
RLTYP
BP Role Type
B_BUPR_BZT ACTVT ● 01 Create or generate With this authorization ob
ject, you define which BP with
Business Partner Relation ● 02 Change
specific authorization groups
ships: Relationship Categories ● 03 Display
● 06 Delete can be displayed.
RLTYP
BP Role Type
B_BUPR_GRP ACTVT ● 03 Display With this authorization ob
ject, you establish which rela
Business Partner: Authoriza BERGU tionship categories can be
tion Groups
processed.
CA_POWL POWL_APPID POWL-FCLM-BAM-INBOX-WI Application ID of POWL iView
(as specified in Application
Authorizations for the Personal
Parameters in the iView prop
Object Worklist (POWL) iViews.
erties)
POWL_CAT 03 The user is not allowed to re-
assign queries or change the
query order.
POWL_LSEL It determines if the user is al
lowed to select the layout
style (either one entry in a hy
per-link matrix or one tabstrip
per query) for the POWL
iView
Security Guide for SAP S/4HANA 1709
166 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Authorization Field Permitted Activities Description
POWL_QUERY ● 01 ● 01 The user is allowed to
● 02 create/change/delete
● 03 own queries for all POWL
object types assigned to
him (c.f. customizing ta
bles POWL_TYPE_USR
and POWL_TYPE_ROL).
● 02 the user is only al
lowed to create own
queries on the basis of
admin queries assigned
to him via customizing
tables POWL_TYPE_USR
and POWL_TYPE_ROLre
spectively. (Note: this is
also subjected to the
user - POWL object type
assignments)
● 03 (and other values):
the user is only allowed
to change admin queries
assigned to him with re
spect to the select op
tions restrictions of
those admin queries
(thus creating one own
"derivation" per admin
query transparently)
POWL_RA_AL It determines if the user gains
access to a "Refresh all" but
ton, which triggers a parallel
ized refresh for all queries
which are active on the POWL
iView identified by
POWL_APPLID. Note this may
cause high system load on
the application server group
used for refreshes on this
POWL iView.
POWL_TABLE It determines if the user is al
lowed to personalize the
query result table settings
(define column order, hide
columns, etc.).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 167Authorization Object Authorization Field Permitted Activities Description
F_BNKA_MAN ACTVT ● 01 Create or generate This object controls the au
thorizations for maintaining
Banks: General Maintenance ● 02 Change
Authorization ● 03 Display bank master data.
F_CLM_BAM ACTVT ● 01 Create or generate: This authorization object is
Create new bank ac used for controlling the au
Authorization for Bank Account count master records thorizations of Bank Account
Management
● 02 Change: Change Master Data maintenance.
bank account master re This authorization object is
cords assigned to the standard role
● 03 Display: Display bank Cash Manager by default.
account master records
● 06 Delete: Delete inac
tive bank account mas
ter records
● 31 Confirm: Review bank
account master records
● 63 Activate: Activate a
bank account revision in
dual control mode
● 69 Discard: Close bank
accounts
● C5 Reopen: Reopen a
closed bank account
FCLM_ACTY
Bank Account Type ID
FCLM_BUKRS
Company Code
FCLM_GSBER
Business Area
FCLM_KOKRS
Controlling Area
FCLM_PRCTR
Profit Center
FCLM_SGMT
Segment for Segmental Re
porting
Security Guide for SAP S/4HANA 1709
168 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Authorization Field Permitted Activities Description
F_CLM_BAH2 ACTVT ● 01 Create or generate This authorization object is
used for controlling the au
Bank Account Hierarchy ● 02 Change
● 03 Display thorizations of bank hierar
● 06 Delete chy and bank account group
maintenance.
HIERTYPE
Hierarchy Type
PUBLICHIER
Public Flag for Hierarchy
F_CLM_UP ACTVT 01 Create or generate: Cre This authorization object con
ate or update bank account trols the authorization of us
Authorization for Import and
master data ing the Import and Export
Export Bank Accounts
Bank Accounts tool to create
or update bank account mas
ter data by importing bank
accounts from an XML file.
F_BNKA_MAO ACTVT ● 01 Create or generate This authorization object con
● 02 Change trols the authorizations for
Banks: General Maintenance
Authorization by Country ● 03 Display maintaining bank master
data. The authorizations can
BBANKS be assigned according to the
country.
Bank country
F_STAT_MON BNK_ACT READ Read and display batch This authorization object con
trols in the transactions to
Bank Relationship: Status Mon or batch item.
monitor and approve pay
itor authorizations
ment batches, which batches
the user is allowed to display
or to process.
BNK_RULE
Rule ID
BNK_ITMDET * Display and process on item
level (marked) or only on
Action on item level allowed
batch level (not marked) No
(display, reject, resubmit)
tice that field BNK_ITMDET
determines whether or not
the user is authorized to dis
play, reject, or return single
payments contained in a
batch.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 169Authorization Object Authorization Field Permitted Activities Description
F_BNKA_BUK ACTVT ● 02 Maintain (create or This object controls the au
change) thorizations for maintaining
Banks: Authorization for Com
pany Codes ● 03 Display house banks and bank ac
counts in a company code.
BUKRS
Company code
F_REGU_BUK BUKRSCompany Code Using this authorization ob
ject, you determine which ac
Automatic Payment: Activity FBTCH 23 Maintain tivities are allowed for the
Authorization for Company Co
des Action for Automatic Proce payment program. The object
dures in Financial Accounting consists of the Company
Code and Activity fields.
You can call up the possible
keys for the Activity field
with the Environment
menu option in the request
screen of the payment pro
gram.
F_FEBB_BUK ACTVT ● 03 Display This authorization object
controls the authorizations
Company Code Bank State BUKRS for maintaining bank state
ment
Company code ments in a company code. A
user who would like to display
Bank Statement reports us
ing Cash and Liquidity Man
agement should have Bank
Statement display authoriza
tion. This authorization object
is assigned to the standard
role Cash Manager by default.
F_FDES_BUK ACTVT ● 01 Create or generate With this authorization ob
ject, you can check the au
Cash Management and Fore ● 02 Change
cast: Company Code Memo Re ● 03 Display thorizations to maintain Cash
Management and Forecast
cords BUKRS $GSBER payment advice and planned
items in a company code.
Company code
F_FDES_GSB ACTVT ● 01 Create or generate With this authorization ob
ject, you can check the au
Cash Management and Fore ● 02 Change
cast: Business Area Memo Re ● 03 Display thorizations to maintain Cash
Management and Forecast
cords
payment advice and planned
Security Guide for SAP S/4HANA 1709
170 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Authorization Field Permitted Activities Description
GSBERBusiness Area $GSBER items in a business area (not
business area SPACE).
At this level you define
whether a user may create,
change or display individual
payment advice or planned
items of a business area.
F_FDSB_BUK ACTVT ● 01 Create or generate With this authorization ob
ject, you control the authori
Cash Position: Company Code ● 02 Change
zations to maintain summary
Summary Records ● 03 Display
● 16 Execute records for the cash manage
ment position (Cash Manage
BUKRSCompany Code $BUKRS ment) in a company code.
At this level you define
whether a user may create,
change or display summary
records of a company code.
Display authorization is need
to display the cash manage
ment position of a company
code.
F_FDSB_GSB ACTVT 03 Display This object controls the au
thorizations to maintain the
Cash Position: Business Area GSBERBusiness Area $GSBER summary records for the
Summary Records
cash management position
(Cash Management) in a
business area (except for
business area BLANK).
F_FDSR_BUK ACTVT ● 03 Display With this authorization ob
ject, you control the authori
Liquidity Forecast: Company ● 16 Execute
zations to maintain the liquid
Code Summary Records BUKRSCompany Code $BUKRS ity forecast (Cash Forecast)
summary records in a com
pany code.
At this level you define
whether a user may display
or execute liquidity forecast
summary records of a com
pany code. Display authoriza
tion is necessary for display
ing the liquidity forecast.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 171Authorization Object Authorization Field Permitted Activities Description
F_FDSR_GSB ACTVT ● 03 Display With this authorization ob
ject, you control the authori
Liquidity Forecast: Business GSBERBusiness Area $GSBER zations to maintain the liquid
Area Summary Records
ity forecast (Cash Forecast)
summary records in a busi
ness area (except for busi
ness area BLANK).
At this level you define
whether a user may display
or execute liquidity forecast
summary records of a busi
ness area. Display authoriza
tion is necessary for display
ing the liquidity forecast of a
business area.
F_BKPF_BUK ACTVT ● 03 Display With this authorization ob
ject, you determine in which
Accounting Document: Authori BUKRSCompany Code $BUKRS company codes documents
zation for Company Codes
can be processed. An em
ployee can only call up the
functions for posting if
he/she has this authorization
in at least one company code.
The object consists of the
Company code and Activity
fields. You take the possible
input values for the Activity
field from table TACTZ.
F_KNA1_GEN ACTVT 03 Display This authorization object con
trols which activities are per
Customer: Central Data
mitted for the general data.
The general data consists of
the fields that are independ
ent of the company code and
the sales organization.
F_LFA1_GEN ACTVT 03 Display This authorization object con
trols which activities are per
Vendor: Central Data
mitted for the general data.
The general data consists of
the fields that are independ
ent of the company code and
the sales organization.
Security Guide for SAP S/4HANA 1709
172 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Authorization Field Permitted Activities Description
F_PAYRQ ACTVT ● 01 Create or generate This authorization is used
Authorization Object for Pay ● 02 Change when payment requests are
ment Requests ● 03 Display created, displayed, and re
● 43 Release versed.
The Release (43) activity
is also checked after
corresponding activa
tion according to SAP
Note 2150759.
● 85 Reverse
BUKRS $BUKRS
Company Code
ORIGIN TR-CM-BT
Origin Indicator
F_REGU_KOA KOARTAccount type $KOART Using this authorization ob
ject, you determine which ac
Automatic Payment: Activity FBTCHAction for Automatic tivities are allowed for the
Authorization for Account Procedures in Financial Ac payment program for which
Types counting account types (D for cus
tomer, K for vendor, and S for
G/L accounts). The object
consists of the Account
type and Activity fields.
You can call up the possible
keys for the Activity field
with the Environment
menu option in the request
screen of the payment pro
gram.
FQM_FLOW ACTVT ● 01 Create or generate With this authorization ob
ject, you can control the ac
Financial Quantity Management ● 03 Display
BUKRS ● 06 Delete cess to the data stored in the
Company Code ● 25 Reload One Exposure from Opera
tions hub.
FQM_ORIGAP
Source Application
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 173Authorization Object Authorization Field Permitted Activities Description
S_RS_COMP ACTVT ● 16 Execute With this authorization ob
ject, you can restrict the com
Business Explorer - Compo
ponents that you work with in
nents
the Business Explorer query
definition.
RSINFOAREA 2O-FI InfoArea: Determines which
InfoAreas a given user is al
lowed to process.
RSINFOCUBE 2CILFOBALWLIBAL InfoCube: Determines which
InfoCubes a given user is al
lowed to process.
RSZCOMPTP REP Component type: Determines
which components a given
user is allowed to process.
RSZCOMPID 2CCLFCASTANLYTS Name (ID) of a reporting
component: Determines
which components (accord
ing to name) a given user is
allowed process.
S_RS_COMP1 ACTVT ● 16 Execute With this authorization ob
ject, you can restrict query
Business Explorer - Compo
component authorization
nents: Enhancements to the
with regards to the owner.
Owner
This authorization object is
checked in conjunction with
the authorization object
S_RS_COMP.
RSZCOMPID 2CCLFCASTANLYTS Name (ID) of a reporting
component: Determines
which components (accord
ing to name) a given user is
allowed process.
RSZCOMPTP REP Type of reporting compo
nent: determines which com
ponent types are allowed to
be edited by the user.
RSZOWNER * Reporting component owner:
determines whose compo
nents are allowed to be edited
by the user.
Security Guide for SAP S/4HANA 1709
174 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Authorization Field Permitted Activities Description
S_SERVICE ACTVT ● 16 Execute This authorization object is
automatically checked when
Check at Start of External Serv SRV_NAME ● 84A2886C6DA699EF0F external services are started
ices 0F4083ADC455
Hash value of the external (not yet for all service types).
● C_LFCASTANALYTICS_
service The Profile Generator auto
CDS 0001 matically assigns authoriza
● AB088B10113EAC3BC6 tions if an external service is
349F4E933053 entered in a role menu.
● /SSB/
SMART_BUSINESS_RUN
TIME_SRV 0001
SRV_TYPE TADIR OBJECT Type of the external service
S_RS_AO RSAP_OBJID You can use this authoriza
Authorization for Liquidity Plan Analysis Office Technical tion object to define user au
Name thorizations for using Liquid
ning in Analysis Office
ity Planning in SAP Busines
RSAO_OBJTY sObjects Analysis, edition for
Analysis Client Object Type Microsoft Office.
RSZOWNER
Owner (Person Responsible)
for a Reporting Component
ACTVT ● 01 Create or generate
● 02 Change
● 03 Display
● 06 Delete
● 16 Execute
S_RS_AUTH BIAUTH 0F_AUTH_RP1 This authorization object is
used to make analysis au
BI Analysis Authorizations in
thorizations available in the
Role
SAP NetWeaver standard
roles.
The values in field BIAUTH
are authorization names from
the analysis authorizations.
They can be selected using
input help (F4).
RSBPC_BBPF ACTVT ● 03 Display With this authorization ob
Manage and use BPF ● 16 Execute ject, you can define the au
● 23 Maintain thorizations of business proc
● 16 Execute ess flow.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 175Authorization Object Authorization Field Permitted Activities Description
RSBPC_APPS 0FCLM_LP_ENV
Environment ID
RSBPC_TMPL FCLM_LP_PROCESS
BPF Template ID
RSBPC_ENVM ACTVT ● 03 Display Authorization object that is
Manage environment ● 23 Maintain checked when an environ
ment is viewed or maintained.
RSBPC_APPS 0FCLM_LP_ENV
Environment ID
RSBPC_ID RSBPC_APPS 0FCLM_LP_ENV Authorization object that is
checked when it is necessary
Grant user access to a BPC en Environment ID
to find out whether a user is
vironment
assigned to an environment.
RSBPC_MODL ACTVT ● 03 Display Authorization object that is
Manage model ● 23 Maintain checked when a model is
● A3 Change status viewed or maintained.
RSBPC_APPS 0FCLM_LP_ENV
Environment ID
RSBPC_APPL FCLM_LP_PROCESS
Model ID
RSBPC_TEAM ACTVT ● 03 Display Authorization object that is
Manage team ● 23 Maintain checked when a team is
viewed or maintained.
RSBPC_APPS 0FCLM_LP_ENV
Environment ID
RSBPC_TEAM *
Team ID
RSBPC_USER ACTVT ● 03 Display Authorization object that is
Manage and use User ● 23 Maintain checked when a user is
viewed or maintained.
RSBPC_APPS 0FCLM_LP_ENV
Environment ID
RSBPC_USER *
User ID
Security Guide for SAP S/4HANA 1709
176 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Authorization Field Permitted Activities Description
RSBPC_WKSP ACTVT ● 03 Display With this authorization ob
Manage resource ● 23 Maintain ject, you can define the au
thorizations of resources, in
cluding reports, input forms,
work spaces and so on.
RSBPC_APPS 0FCLM_LP_ENV
BPC: Environment ID
RSBPC_FLDR * Possible values:
BPC: Folder authorization ● PUBLIC: Live report
● NON_PUBLIC: Input form
RSBPC_RSTY * Possible values:
BPC: Resource Type ● LIVE_REPORT: Live re
port
● INPUT_FORM: Input form
● SUB_FOLDER: Subfolder
● EXCEL_INPUT_FORM: In
put form in Microsoft Ex
cel
● EXCEL_REPORT: Report
in Microsoft Excel
● ACTIVITY_WORKSPACE:
Workspace
● LINK: Link
● DASHBOARD: Dashboard
● WORKBOOK: Workbook
● BOOKS: Published books
● DOCUMENT: Assign the
user the authorization to
upload files
● DISTRIBUTION: "Distri
bution" folder under
team folder
● EEXCEL: "EExcel" folder
under public folder for
EPM add-in
● PUBLICATION: "Publica
tion" folder under team
folder
● XLTX: Book template
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 177Authorization Object Authorization Field Permitted Activities Description
S_BTCH_JOB JOBGROUP $JOBGROUP The authorization object con
sists of the authorization
Background Processing: Oper Summary of jobs for a group
fields JOBACTION and
ations on Background Jobs
● DELE JOBGROUP. JOBGROUP
JOBACTION
Delete other users'' must always have the value *.
Job Operations background jobs. Each of these permits the
● LIST user to perform different op
Not used erations on jobs. A user
● MODI WITHOUT ANY specific au
Modify other users'' jobs. thorization for jobs may per
● PLAN form the following actions:
Copy or repeat other ● Schedule jobs for which
users'' jobs the job class is C and
● PROT cannot be changed.
(No check) ● View and change steps
● RELE of his or her own jobs.
Release jobs (including ● Delete his or her own
your own) jobs.
● SHOW ● View the job details of his
Display definitions of or her own jobs.
other users'' jobs
If a user has an authorization
for the object S_BTCH_ADM,
he or she has full authoriza
tion for all jobs of all users.
S_PROGNAM P_ACTION BTCSUBMIT The object is used to supple
ment the start authorization
Generic Program Start User Action in ABAP Pro
check for programs. Authori
gram
zations for this object are
checked exclusively with
method
CL_SABE=>AUTH_CHECK_PR
OGNAM() in the context of
scenarios for switchable au
thorizations (maintenance
transaction SACF). The check
does not take place with each
submit command, but only if
is explicitly called. If the asso
ciated scenario is activated,
all programs are checked in
addition to the existing au
thorization checks (for exam
ple, with authorization
groups). You can assign au
Security Guide for SAP S/4HANA 1709
178 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Authorization Field Permitted Activities Description
P_PROGNAM ● /ATL/ thorizations for the following
F110_SCHEDULE_AFTE activities:
Program Name with Search R_RUN
Help ● Starting a program
● RBNK_PAYM_GRP_N_BA
TCH ● Scheduling a program to
run as a background job.
● SAPF111S
SAPFPAYM_MERGE ● Delete his or her own
jobs.
● SAPFPAYM_SCHEDULE
● Defining variants
13.3.4.3.2 Internet Communication Framework Security (ICF)
You should only activate those services that are needed for the applications running in your system. For Cash and
Liquidity Management, the following services are needed:
● Web Dynpro services
○ WDA_FCLM_BAM_ACC_MASTER
○ WDA_FCLM_BAM_ACC_REVIEW
○ WDA_FCLM_BAM_ADAPT_SIGN
○ WDA_FCLM_BAM_BANK_DATA
○ WDA_FCLM_BAM_CHGREQ
○ WDA_FCLM_BAM_HIERARCHY
○ WDA_FCLM_BAM_HIER_BP
○ WDA_FCLM_BAM_HIER_MAINTAIN
○ WDA_FCLM_BAM_MASS_CHANGE
○ WDA_FCLM_BAM_REVIEW_REPORT
○ WDA_FCLM_BAM_REQOVERVIEW
○ WDA_FCLM_REPORT
○ WDA_FCLM_UPLOAD_DOWNLOAD
○ WDA_FCLM_BAM_SENTITEMS
○ WD_FCLM_FPM_OVP_CFA
○ WD_FCLM_FPM_OVP_FD
○ WD_FCLM_FPM_OVP_FO
● Workflow services
○ ibo_wda_inbox
○ swf_formabsenc
○ swf_workplace
○ UCT_DISPLAY_DOCUMENT
○ UCT_DISPLAY_INBOX
○ UCT_DISPLAY_SIGNOFF
○ UCT_DISPLAY_CHANGE
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 179○ USMD_CREQUEST_PROTOCOL2
○ USMD_SSW_RULE
○ USMD_WF_NAVIGATION
● POWL services
○ POWL
○ POWL_COLLECTOR
○ powl_composite
○ POWL_EASY
○ POWL_ERRORPAGE
○ POWL_MASTER_QUERY
○ POWL_PERS_COMP
Use the transaction SICF to activate these services. If your firewalls use URL filtering, also note the URLs used for
the services and adjust your firewall settings accordingly. For more information about ICF security, see the
respective chapter in the SAP NetWeaver Security Guide.
13.3.4.3.3 Data Storage Security
Using Logical Paths and File Names to Protect Access to the File System
Cash and Liquidity Management saves data in files in the file system. Therefore, it is important to explicitly provide
access to the corresponding files in the file system without allowing access to other directories or files (also
known as directory traversal). This is achieved by specifying logical paths and file names in the system that map
to the physical paths and file names. This mapping is validated at runtime and if access is requested to a directory
that does not match a stored mapping, then an error occurs.
The following list shows the logical paths and file names that are used in Cash and Liquidity Management and the
programs for which these file names and paths apply. The logical paths and file names have been created to
activate the validation of physical file names:
Logical file names used in Cash and Liquidity Management:
● FCLM_CM_MEMO_RECORD_EXPORT
○ Name of the program that uses this logical file name:
RFTS6510_CREATE_STRUCTURE (transaction RFTS6510CS)
○ Parameters used in this context:
No parameters
○ Logical path name:
FCLM_CM_MEMO_RECORD_EXPORT
● FCLM_CM_MEMO_RECORD_IMPORT
○ Name of the program that uses this logical file name:
RFTS6510 (transaction RFTS6510)
○ Parameters used in this context:
No parameters
○ Logical path name:
FCLM_CM_MEMO_RECORD_IMPORT
Security Guide for SAP S/4HANA 1709
180 P U B L I C SAP S/4HANA Business ApplicationsActivating the Validation of Logical Paths and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-dependent). To determine
which paths are used by your system, you can activate the appropriate settings in the Security Audit Log.
13.3.4.3.4 Data Protection
13.3.4.3.4.1 Deletion of Personal Data
Use
Cash and Liquidity Management might process data (personal data) that is subject to the data protection laws
applicable in specific countries.
You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion of personal data.
With Cash and Liquidity Management, SAP provides where-used checks (WUC) for you to identify data that are no
longer in use.
For information about the Customizing of blocking and deletion, see Configuration: Simplified Blocking and
Deletion.
Relevant Application Objects and Available Deletion Functionality
Cash and Liquidity Management itself does not directly use SAP ILM. But the integrated source applications,
which have to comply with retention periods, use SAP ILM to support the deletion of personal data.
Cash and Liquidity Management, however, provides the program Aggregate Flows, which helps to reduce the data
volume in database table FQM_FLOW for One Exposure from Operations.
Table 98:
Application Detailed Description Provided Deletion Functionality
One Exposure from Operations You use this transaction to delete flows FQM_AGGREGATE_FLOWS
with certainty level ACTUAL in One Expo
sure and substitute them with aggrega
tion flows. They then no longer contain
any person-related information.
For more information, see the corre
sponding program documentation.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 181Where-Used Check (WUC)
A where-used check is a simple check to ensure data integrity in case of potential blocking. The checks in Cash
and Liquidity Management check whether any dependent data for a certain business partner exists in the related
tables.
If dependent data exists, that is, if the data is still required for business activities, the system does not block a
certain BP. If you still want to block the data, the dependent data must be deleted by using the existing archiving
and deletion tools or by using any other customer-specific solution.
Relevant Application Objects and Available EoP/WUC functionality
For the following application object, a where-used check (WUC) supporting the blocking of business partner
master data is available:
Table 99:
Application Related Table Implemented Solution (EoP or WUC)
One Exposure from Operations FQM_FLOW WUC with function module
FQM_BUPA_WUC_CHECK
Bank Relationship Management FCLM_BAM_AMD WUC with function module
FCLM_BAM_BNKABP2 FIN_FSCM_CLM_BAM
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business data in Customizing for Cross-
Application Components under Data Protection.
● Define the settings for authorization management under Cross-Application Components Data Protection
Authorization Management .
● Check the following settings for blocking in Customizing for Cross-Application Components under Data
Protection Blocking and Unblocking of Data Business Partner .
○ Under Register Application Names for EoP Check (view V_BUTEOPAPP) you find One Exposure from
Operations (FQM).
○ Under Define Application Function Modules Registered for EoP Check (view V_BUTEOPFM) you find a list of
application function modules. Each application that consumes business partners registered their function
module in this view. These function modules are called by the blocking/unblocking report when
performing the end-of-purpose checks.
○ FQM: Function module FQM_BUPA_WUC_CHECK
○ Bank Account Management: Function module FIN_FSCM_CLM_BAM
For more information about configuration, see the Customizing documentation.
Security Guide for SAP S/4HANA 1709
182 P U B L I C SAP S/4HANA Business Applications13.3.4.4 SAP Treasury and Risk Management
● Network and Communication Security
Communication with external systems is possible using standard interfaces via BAPI, IDoc, XI and BAdIs.
● Communication Destinations
In certain cases a technical user may be required for applying BAPIs.
● Data Storage Security
○ SAP Treasury and Risk Management accesses financial transaction data that can be particularly sensitive.
Access is protected by the authorization objects described in the Authorizations [page 183]section.
○ Using Logical Path and Filenames to Protect Access to the File System [page 204]
● Additional Security-Relevant Information
All authorizations are managed by means of roles and profiles.
In addition you can further increase the system security by making a number of Customizing settings such as
trader authorizations, posting release settings and a lot of other release workflows for objects like hedging
relationships, correspondence objects or exposure positions. However, the authorization check itself must
always be run on the basis of roles and profiles.
13.3.4.4.1 Authorizations
Standard Roles
The table below shows the standard roles that are used by the SAP Treasury and Risk Management.
Table 100:
Role Description
Business Roles for SAP Fiori Launchpad
SAP_BR_TREASURY_RISK_MANAGER Treasury Risk Manager
SAP_BR_TREASURY_SPECIALIST_FOE Treasury Specialist - Front Office
SAP_BR_TREASURY_SPECIALIST_MFOE Treasury Specialist - Middle Office
SAP_BR_TREASURY_SPECIALIST_BOE Treasury Specialist - Back Office
SAP_BR_TREASURY_ACCOUNTANT Treasury Accountant
Roles in Backend
SAP_TRM_ADMINISTRATOR Treasury Administrator
SAP_TRM_DEALER Trader
SAP_TRM_LIMIT_MANAGER Limit Manager
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 183Role Description
SAP_TRM_RISK_CONTROLLER Risk Controller
SAP_TRM_TM_BACKOFFICE_PROCES Back Office Processor
SAP_TRM_TM_FUND_MANAGER Fund Manager
SAP_TRM_TM_STAFF_ACCOUNTANT Staff Accountant
SAP_TRM_TM_TRADE_CONTROLLER Trade Controller
SAP_TRM_TREASURY_MANAGER Treasury Manager
Transaction Roles
Table 101:
Role Description
SAP_AUDITOR_BA_CFM Allows evaluations in Treasury to be collected, structured and
preset.
(AIS – Audit Information System)
The required menu forms part of this role. The relevant au
thorization role is SAP_AUDITOR_BA_CFM_A (AIS – Authoriza
tions for SAP Applications (Excluding HR)).
SAP_AUDITOR_TAX_TR Provides the collection, structuring, and presetting of evalua
tions in Treasury for tax auditing purposes.
(AIS – Audit Information System
The required menu forms part of this role.
Transaction Role)
The relevant authorization roles are
SAP_AUDITOR_TAX_TR_A (AIS – Tax Auditor TR (Authoriza
tions)) and SAP_AUDITOR_TAX_A (AIS – Tax Auditor Central
Functions (Authorizations)).
Authorization Roles
Table 102:
Role Description
SAP_AUDITOR_BA_CFM_A Allows read-only access for the business audit in Treasury
(AIS – Audit Information System) The relevant transaction role is SAP_AUDITOR_BA_CFM (AIS –
Transactions for SAP Applications (Excluding HR)).
SAP_AUDITOR_TAX_TR_A Grants read-only access to tax auditors.
(AIS – Audit Information System) The relevant transaction role is SAP_AUDITOR_TAX_TR (AIS –
Tax Audit Treasury)
An extended authorization check is performed with the roles SAP_AUDITOR_TAX_TR and
SAP_AUDITOR_TAX_TR_A.
Security Guide for SAP S/4HANA 1709
184 P U B L I C SAP S/4HANA Business ApplicationsStandard Authorization Objects
The table below shows the security-relevant authorization objects that are used by the SAP Treasury and Risk
Management (class TRTM Treasury Management).
Standard Authorization Objects
Table 103:
Authorization Object Permitted Activities Description
CMM_ESTIME 01 Create or Generate This authorization object enables you to
restrict who can create, edit, delete, or
02 Change
display exception end-of-day snapshot
03 Display definitions.
06 Delete
CMM_STIME 01 Create or Generate This authorization object enables you to
restrict who can create, edit, delete, or
02 Change
display end-of-day snapshot definitions.
03 Display
06 Delete
T_ASGTTMPL 02 Change
Acct Assignment Templates
IDCFM_FRAM 01 Display Authorization object for amortized cost
function.
Amortized Costs 03 Update
T_RMOB_AUG 01 Create or generate This authorization object controls au
thorization for editing and using different
Application Objects for CFM/Banking 02 Change
settings within CFM/Banking Analysis
Analysis
03 Display (e.g. evaluation type, scenario, portfolio
06 Delete hierarchy).
21 Transport
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 185Authorization Object Permitted Activities Description
T_POS_ASS 01 Create or generate This object checks if the user is allowed
to create, change (delete), or display po
Assign Attributes to Positions 02 Change
sition attributes. These attributes are
03 Display the position’s account assignment refer
ence and the position management pro
cedure.
You can control the authorization for
each Accounting code, valuation area,
and product type.
The check for assignment of the position
management procedure is carried out
when a position is created either man
ually or automatically. The check for as
signment of the account assignment ref
erence is carried out with the first post
ing to the position or when the account
assignment reference is manually as
signed to the position.
T_TLR_REP 02 Change With this authorization object, you de
fine user-specific authorizations for ac
Authorization for Legal Report Type 03 Display
tivities concerning trade repository ob
70 Administer jects.
Use in function:
● Trade Repository Monitor (transac
tion FTR_TARO_MONITOR)
● Update Trade Repository Objects
(transaction FTR_TARO_PROCESS)
● Send Trade Repository Objects
(transaction FTR_TARO_SEND)
● Import Incoming Messages (trans
action FTR_TARO_IMPORT)
● Report
R_TLR_TARO_STATUS_REMARK
Update the Status or the Text in the
Field Remark of TAROs
Security Guide for SAP S/4HANA 1709
186 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_DEAL_PD 01 Create or generate With this authorization object, you deter
mine for a user which functions and ac
Authorization for Product/Transaction 02 Change
tivities he is allowed to execute for a
Types
03 Display product and transaction type within a
06 Delete company code.
16 Execute Use in functions:
38 Perform All transaction of the Transaction Man
agement (Trade, Back Office) of the
43 Release Transaction Manager (FSCM-TRM-TM)
48 Simulate which create or maintain financial trans
actions including the BAPIs.
83 Counterconfirm
85 Reverse
AB Settle
KI Knock In
KO Knock Out
KU Give notice
PR Process Correspondence
PS
VF Expired
T_IGT_DEAL 01 Create or generate With this authorization object, you deter
mine which functions and activities are
Authorization for Product/Transaction 02 Change
allowed for a product and transaction
Types for IGT
03 Display type in a company code for Intragroup
06 Delete transactions [within Edit Intragroup
Transactions (transaction TRIG_IGT)].
10 Post
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 187Authorization Object Permitted Activities Description
T_DEAL_DP 01 Create or generate With this authorization object, you deter
mine which functions and activities are
Authorization for Securities Account 02 Change
allowed for a securities account in a
03 Display company code.
06 Delete Use in functions:
16 Execute ● TRS_SEC_ACC – Edit Securities Ac
43 Release count
● FWDP – Securities Account List
48 Simulate ● TS09 – Define Default Values
85Reverse
PR Process Correspondence
PS
T_DEAL_AG 01 Create or generate With this authorization object, customer
specific authorization checks can be car
Authorization for an Authorization Group 02 Change
ried out if necessary in addition to the
03 Display objects
06 Delete ● T_DEAL_DP
16 Execute ● T_DEAL_PF
● T_DEAL_PD
43 Release Application examples:
48 Simulate ● A trader should only be allowed to
display/process department-re
85 Reverse
lated orders.
PR Process Correspondence ● A clerk should not be allowed to dis
PS play/process an employee loan.
T_EXT_SEC 01 Create or generate Authorization object for maintaining ex
ternal securities account statements
Authorization for external security ac 02 Change
count
03 Display
06 Delete
T_RIGHTS 03 Display The authorization object T_RIGHTS is re
Authorization to Exercise Options 38 Perform quired for exercising security rights in
the securities area of the Transaction
48 Simulate Manager.
85 Reverse The system checks the object T_RIGHTS
in the application function for exercising
security rights (path: Transaction
Manager Securities Trading
Security Right Exercise / Reverse ).
Security Guide for SAP S/4HANA 1709
188 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_BP_USED Prior to calling up the where-used list of
the business partner from dialog mainte
Business Partner: Authorization for
nance, or with incoming telephone calls,
Where-Used List
a check is made as to whether the user
has the authorization to display the use
of a business partner in a particular ap
plication. If this is not the case, the user
is not offered the corresponding applica
tion to see how the business partner is
used.
The partner number and assignment
category fields are requested. The as
signment category defines the applica
tion being used by the business partner
(for example, Real Estate, Money Mar
ket, Loans). The assignment categories
can be displayed with the V_TPR1 view.
T_BP_USEDT
Business Partner: Where-Used List Au
thorization (Decoupling)
T_FTI_LDB You use this authorization object to as
sign authorizations for CFM position
CFM Position Management Reporting
management reporting using logical da
Using Logical Databases
tabases.
T_CML_ARCH 03 Display When you select a transaction, the sys
tem checks whether the function may be
CML: Authorization in Loans Archiving 24 Archive
executed and in which company codes
Area
25 Reload the system is permitted to process
33 Read documents.
56 Display archive
57 Save archive
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 189Authorization Object Permitted Activities Description
T_RMCHAR_V You can use this authorization object to
define for which financial objects a user
Characteristic Values in Risk Manage
can run particular evaluations. The au
ment Reports
thorization is based on characteristic
values.
Defined fields
● Report Category
The report category describes the
business purpose of the analysis
(for example, NPV analysis, gap
analysis). The possible values can
be taken from the fixed values for
domain RMRPTYPE.
● Characteristic
● Value
Note: The checking of the charac
teristics is based on an AND link.
This means that if an entry for the
field Characteristic is not equal to *,
then an additional entry with the
value * has to be defined for each
characteristic for which all values
are permitted.
No hierarchy can be defined with
this authorization object. For exam
ple, this means that is not possible
to give a user authorization for all
product types in company code
001, but then to restrict the authori
zation to certain product types in
company code 002. Any restriction
of the authorization to certain prod
uct types would apply automatically
to company code 001.
Security Guide for SAP S/4HANA 1709
190 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_KAPM_1 01 Create or generate You use this object to define the user au
thorizations for:
Corporate Actions I 02 Change
● Corporate action types
03 Display
● Activities
63 Activate
Use in functions
The object T_KAPM_1 is checked in the
following application functions:
Securities Back Office Corporate
Actions for Corporate action category:
Manually generated
T_KAPM_2 10 Post With this authorization object, you de
fine at the company code level, for which
Corporate Actions II 48 Simulate
corporate actions postings or simulation
85 Reverse runs may be carried out.
Use in functions
Object T_KAPM_2 is checked in the fol
lowing application function:
Securities – Processing: Post other cor
porate actions
T_THXE_ET 01 Create or generate You can use this authorization object to
manage the access in the effectiveness
Effectiveness Tests 02 Change
test part of the Hedge Accounting for
03 Display Positions.
06 Delete Use in functions:
94 Override The system checks whether the user is
authorized to execute the function
based on Company Code, Valuation
Area, Hedging Relationship Category,
Hedging Relationship Profile and
Activitywithin the following functions:
● Manage Hedging Relationships
(transaction TPM100)
● Run Effectiveness Test (transaction
TPM110
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 191Authorization Object Permitted Activities Description
T_TREA_EVA 01 Create or generate With this authorization object, you deter
mine which activities for evaluations on
Execute or Display Evaluation Data on 03 Display
external accounts can be performed by
External Accounts
which users.
Use in functions:
● NPV Calculation for External Ac
count Transactions (transaction:
TREA_EVAL)
● Show Results of Key Figure calcula
tion for External Accounts (transac
tion: TREA_EVAL_SHOW)
T_RIGHTS_D 03 Display
Exercise Rights for Listed Options or Fu 38 Perform
tures
48 Simulate
85 Reverse
T_TEX_POS 02 Change (Change attributes of the ex The authorization object controls which
posure position) activities are allowed for exposure posi
Exposure Position
tions within Exposure Management 2.0.
03 Display (Display exposure position)
59 Distribute (Update exposure position
in the Hedge Accounting for Exposures)
61 Export (Export exposure position to
market place or other function covered
by BAdI)
T_TREA_CA 01 Create With this authorization object, you deter
mine for users which activities they are
External Account 02 Change
allowed to execute for an external ac
03 Display count.
06 Delete Used in functions:
NP Net Payment ● Maintain External Accounts (trans
action TREA_ACC_MNT)
● Create Net Payment (transaction
TREA_PAY)
Security Guide for SAP S/4HANA 1709
192 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_TREA_STA Create or generate With this authorization object, you deter
mine for users which activities for an ex
External Account Statement Change
ternal account statement they are al
Display lowed to execute.
Delete Used in functions:
Release ● Maintain External Account State
ments (transaction
TREA_STA_MNT)
● Upload External Account State
ments (transaction
TREA_STA_UPL)
● Release Line Items (transaction
TREA_RELEASE)
T_BP_DEAL 01 Create or generate The system checks against the authori
zation object Treasury Business Partner:
FS Business Partner: Standing Instruc 02 Change
Standing Instructions when the user calls
tions
03 Display up the standing instructions function.
The system only displays the standing
instructions for which the user is author
ized.
Examples:
● If a user is not authorized to use the
standing instructions function, this
user is unable to branch to the
standing instructions from the busi
ness partner master data screen.
● If a user is only authorized to main
tain transaction authorizations, the
system only displays the corre
sponding tab for transaction au
thorizations when this user calls up
the standing instructions.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 193Authorization Object Permitted Activities Description
T_FGDT_ART 01 Create or generate You can use this authorization object to
define authorizations for the input fields
Generic Transaction: Authorization 02 Change
of the generic transaction. Based on the
Types
03 Display field values, you define which generic
transactions the user is allowed to main
tain. To do this, you have to define an au
thorization type and the names of the
fields to be checked in the Customizing
settings for generic transactions.
Note:
This authorization is optional. You do not
need to assign authorizations if you do
not want to give special protection to a
particular field group, and have not
therefore stored field groups for authori
zation in your Customizing settings.
Procedure
If you want to use this authorization ob
ject, proceed as follows:
● Decide for which fields in the ge
neric transaction you want to assign
authorizations.
● In the Customizing for the generic
transaction, create an authorization
type for these fields.
● Define the authorizations you want
to assign to selected employees.
Use the authorization type you have
created and define the correspond
ing values for the activity and the
selected fields of the generic trans
action.
● Assign the authorizations you have
created to the selected employees
by using the relevant profile.
T_HM_BUK 01 Create or generate Authorization object for the functions of
hedge accounting (E-HA) in the com
Hedge Accounting (E-HA) in Company 02 Change
pany code.
Code
03 Display
06 Delete
Security Guide for SAP S/4HANA 1709
194 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
IDCFM_FRIM 01 Display Authorization object for impairment
function.
Impairment Authorization Object 02 Create
03 Update
F_T_VTBLV 02 Change With this authorization object, you de
fine which limits can be edited.
Limit 03 Display
The object consists of the fields Limit
05 Lock
type and Activity.
43 Release
98 Mark for release
F_T_VTBLR 01 Create or generate This authorization object determines
which activities a user can perform for a
Limit Reservations 02 Change
limit reservation.
03 Display
F_T_VTBLL 01 Create or generate
Limit Transfers 02 Change
03 Display
T_STAM_GAT 01 Create or generate This authorization object enables you to
control the various activities that can be
Master Data: Class Category 02 Change
executed with a security class. You can
03 Display also control the activities according to
06 Delete the product type. You can set up your
system, for example, so that a certain
43 Release employee can change stocks, but can
56 Display archive only display bonds.
57 Save archive Use in function:
Class Data (transaction FWZZ)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 195Authorization Object Permitted Activities Description
T_DEAL_PF 01 Create or generate With this authorization object, you deter
mine which functions and activities are
Portfolio Authorization 02 Change
allowed for a portfolio in a company
03 Display code.
06 Delete
16 Execute
38 Perform
43 Release
48 Simulate
85 Reverse
AB Settle
KI Knock In
KO Knock Out
KS Reverse notice
KU Give notice
PR Process Correspondence
PS
VF Expired
Security Guide for SAP S/4HANA 1709
196 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_PACC_POS 10 Post You use this authorization object to de
termine the company code, product
Position in Futures Account 85 Reverse
type, and futures account for which ac
tivities can be executed that affect the
position.
You use the authorization object for the
following transactions or functions:
● Post Variation Margin: Function A,
Activity 10
● Post Close Margin: Function A, Ac
tivity 10
● Reverse Margin Flows: Function A,
Activity 85
● Manual Posting: Function B, Activity
10
● Reverse Manual Posting: Function
B, Activity 85
● Execute Matching: Function C, Ac
tivity 10
● Reverse Matching: Function C, Ac
tivity 85
T_TEX_REXP 01 Create or generate The authorization object controls, which
activities are allowed for raw exposures
Raw Exposure Create raw exposure
within Exposure Management 2.0.
02 Change
Change attributes of the raw exposure
03 Display
Display raw exposure
06 Delete
Delete a raw exposure (Only if it is unre
leased)
43 Release
Release the raw exposure to exposure
positions
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 197Authorization Object Permitted Activities Description
T_RDB_CVKF With the help of this authorization object
you can specify for which values of a
Results Database: Characteristic Value
characteristic a user may display the val
and Key Figure
ues of a key figure.
The system checks the values of all de
fining characteristics for a certain review
unit (for example, a portfolio hierarchy
node). Authorization for the value * is re
quired for characteristics with no restric
tions (for example, those that do not ap
pear in a portfolio hierarchy or only ap
pear at a lower level).
T_RDB_RDEL This authorization enables you to delete
single records from the results database
Results Database: Delete Single Records
by restricting the deletion to a particular
application. For example, if you want to
delete single records in Market Risk only,
but not those in the Portfolio Analyzer,
you specify the application RA here.
F_TR_MRM_S 01 Create or generate Object F_TR_MRM_S (Scenario
Scenario Maintenance 02 Change maintenance) controls the authoriza
tions for maintaining scenarios in Market
03 Display Risk Management. On this level you de
06 Delete fine whether a user is authorized to cre
ate, change or display a scenario of a
certain scenario type.
Security Guide for SAP S/4HANA 1709
198 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_DEPOT 01 Create or generate With this authorization object, you de
fine which position-changing measures
Securities Account Position 02 Change
may be carried out for the following:
03 Display
● company code
06 Delete ● product category
● securities account
Defined fields
● Company code
● Product type
● Function (D4= Disposition block,
D5= securities account transfer,
D6= securities account cash flow)
● Securities account
● Activity (create, change, display,
delete, reverse)
Note
● Necessary authorization for
Unblock: 06 (delete)
● Necessary authorization for
Manual posting or debit position:
○ Function: Securities ac
count cash flow (D6)
○ Activity: change (02)
● Necessary authorization for
Update securities account
position
○ Function: Securities ac
count cash flow (D6)
○ Activity: change (02)
Use in functions
Object T_DEPOT is checked in the follow
ing functions:
● Securities account transfer
● Securities account position over
view
● Manual posting
● Debit position
● Reversal of debit position / manual
posting
● Update securities account position
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 199Authorization Object Permitted Activities Description
● Posting journal
T_SEC_PRIC ● 03 Display With this authorization object you can
Display Security Price control, for which price types a user has
Security Price Maintenance – Price Type
● 23 Maintain the authorization to display or maintain
Create/Change/Delete Security security prices.
Prices Defined fields
The authorization object has the follow
ing fields:
● S_KURSART Rate/Price Type –
Treasury Instruments
● ACTVT Activity (Display, Maintain)
Use
When you have activated the secur
ity price check in the customizing
under Treasury and Risk
Management Transaction
Manager General Settings
Organization Activate Authority
Check for Security Price Type the
authorization object T_SEC_PRIC is
checked in the following functions:
○ Display security price (transac
tion FW17)
○ Maintain security price (trans
action FW18)
○ Class Master Data (transaction
FWZZ)
F_T_FBNAME 01 Create or generate Treasury: Authorization to call up a func
tion module.
Treasury: Authorization for Asynchro
nous Datafeed
T_TRADER 02 Change Treasury: Authorization for trader
Treasury: Trader Authorization 03 Display
F_T_TRANSB When a transaction is chosen, the sys
tem checks whether the user is author
Treasury: Transaction Authorization
ized to execute the function.
The authorization object is used within
nearly all transactions of the SAP
Treasury and Risk Management.
Security Guide for SAP S/4HANA 1709
200 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_TREA_CA 01 Create With this authorization object, you deter
mine for users which activities they are
External Account 02 Change
allowed to execute for an external ac
03 Display count.
06 Delete Used in functions:
NP Net Payment ● Maintain External Accounts (trans
action TREA_ACC_MNT)
● Create Net Payment (transaction
TREA_PAY)
T_TREA_STA Create or generate With this authorization object, you deter
mine for users which activities for an ex
External Account Statement Change
ternal account statement they are al
Display lowed to execute.
Delete Used in functions:
Release ● Maintain External Account State
ments (transaction
TREA_STA_MNT)
● Upload External Account State
ments (transaction
TREA_STA_UPL)
● Release Line Items (transaction
TREA_RELEASE)
T_DEAL_LC ● LC_ACTVT: With this authorization object, you deter
01 Presentation mine for users which activities they are
02 Document allowed to execute for a trade finance
● LC_FNCTN: transaction.
01 Create
02 Change
03 Display
04 Reverse
05 Accept/Reject
06 Pre-check
07 Send to Bank
08 Settle
T_HDG_AREA ● 02 Change This authorization object enables you to
Obsolete: Hedging Area ● 03 Display restrict who can display or change hedg
ing areas using function Define Hedging
Area (transaction TOE_HEDGING_AREA).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 201Authorization Object Permitted Activities Description
T_TOEHA AUTH_GR: You can create authorization You use this authorization object to con
Hedging Area groups in Customizing for Treasury and trol authorization for maintaining hedg
Risk Management under Define Authori ing areas.
zation Groups for Hedging Areas. Hedg
ing areas have to be assigned to one au
thorization group. In this way, you can
grant authorization for maintaining spe
cific hedging areas.
DGROUP: You use this field to control
which data can be changed or displayed.
Currently, only Hedge Management
Settings and Hedge Accounting Settings
are used.
ACTVT: You use this field to control
which functions can be performed dur
ing hedging area maintenance.
● Create
● Change
● Display
● Create New Version
● Delete Version
● Delete
T_TOESNP AUTH_GR: You can create authorization You use this authorization object to con
Hedge Management: Snapshot groups in Customizing for Treasury and trol authorization for creating or deleting
Risk Management under Define Authori hedging areas
zation Groups for Hedging Areas. Hedg
ing areas have to be assigned to one au
thorization group. In this way, you can
grant authorization for snapshots be
longing to specific hedging areas.
ACTVT: You use this field to control
which of the following functions can be
performed from within the snapshot
function:
● Create
● Delete
● Flag: If the hedging area is set as
relevant for Hedge Accounting, you
can grant users authorization to set
a snapshot as the version that is rel
evant for the day.
Security Guide for SAP S/4HANA 1709
202 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Permitted Activities Description
T_TOE_HMC AUTH_GR: You can create authority With this authority object, you can con
Hedge Management Cockpit groups in Customizing. Hedging areas trol which data can be shown using the
have to be assigned to one authority Hedge Management Cockpit.
group. In this way, you can grant authori
zation for specific hedging areas.
BUKRS: Company code
ACTVT: Display
T_HREL_AUT The authorization object consists of the With this authorization object, you deter
following fields: mine which activities are allowed for a
● Company Code hedging relationship withinHedge
Accounting for Positions (P-HA) in a
● Valuation Area
company code and valuation area.
● Activity
Use in function:
Manage Hedging Relationships (transac
tion TPM100)
The hedge risk category and hedging re
lationship category are not used at the
moment.
(The class of a hedging relationship is
obsolete but cannot be deleted for tech
nical reasons.)
T_TIME_GRI Activities This authorization object enables you to
restrict who can display or change time
Time Pattern 02 Change
patterns using function Define Time
03 Display Pattern (transaction
TOE_TIME_PATTERN).
T_TOE The authorization object consists of the With this authorization object, you can
following fields: restrict who can display snapshots
Obsolete: Hedge Management: Snap
within Hedge Management
shot BUKRS Company Code
CURRENCY Currency
ACTVT Activity
T_RCD ● Recheck With this authorization object, you can
● Release restrict who can recheck, release, or re
● Reject ject blocked sales documents for a risk
check decision using function Risk Check
Decision Management (transaction
FTR_RCD).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 203The table below shows the security-relevant authorization objects that are used by the SAP Treasury and Risk
Management (class FIFinancial Accounting).
Standard Authorization Objects
Table 104:
Authorization Object Permitted Activities Description
F_RPCODE ● Create and change to bring the data Repetitive codes are used to simplify
into the system, processing of recurring payments. Such
Repetitive Code
● Lock and release, to control usabil usage is agreed between the user and
ity, the bank.
● Display, to enable the user to use You should only use the delete function
the function, once you have carefully checked
● Display change documents, to ena
ble you to display the master data and agreed with the bank that it is clear
changes. that a repetitive code is no longer being
used and may be deleted.
A check is made of the authorization ob
ject during among other things repetitive
code maintenance (OT81), with their use
in vendor payment requests (RVND) and
in the fast entry of repetitive payments
(FRFT).
The company code controls the organi
zational unit in which the activities
named can be carried out. The partner
type restricts the activities to those re
petitive codes for which the payee has
the specified type (house bank, vendor
or Treasury business partner are exam
ples).
When you display change documents
you can only restrict to company code.
13.3.4.4.2 Data Storage Security
Using Logical Paths and File Names to Protect Access to the File System
SAP Treasury and Risk Management (FIN-FSCM-TRM) saves data in files in the file system. Therefore, it is
important to explicitly provide access to the corresponding files in the file system without allowing access to other
directories or files (also known as directory traversal). This is achieved by specifying logical paths and file names
in the system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
Security Guide for SAP S/4HANA 1709
204 P U B L I C SAP S/4HANA Business ApplicationsThe following list shows the logical paths and file names that are used in SAP Treasury and Risk Management (FIN-
FSCM-TRM) and the programs for which these file names and paths apply. The logical paths and file names have
been created to activate the validation of physical file names:
Logical file names used in SAP Treasury and Risk Management
● FTRM_FTR_DEALDATA_AMORTIZATION_SCHEDULES_IMPORT
○ Program that uses this logical file name:
○ RFTR_INTF_MAINFLOWS_UPLOAD
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_FTR_DEALDATA_IMPORT.
● FTRM_TCR_MARKETDATA_DF_IMPORT
○ Program that uses this logical file name:
○ RFTBDF06 [function Datafeed: Import External Market Data in Datafeed Notation (transaction
TBD5 )]
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_DF_IMPORT.
● FTRM_TCR_MARKETDATA_DF_SECURITIES_IDS_IMPORT_FOR_CUSTOMIZING
○ Program that uses this logical file name:
○ RFTBDF05 [function Datafeed: Import Security ID Numbers (transaction TBD2 )]
No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_DF_IMPORT.
● FTRM_TCR_MARKETDATA_FF_REQUEST_LIST_EXPORT
○ Program that uses this logical file name:
○ RFTBFF01 [function Market Data File Interface: Generate Rates and Prices Request List (transaction
TBDN )]
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_FF_EXPORT.
● FTRM_TCR_MARKETDATA_FF_IMPORT
○ Program that uses this logical file name:
○ RFTBFF01 [function Market Data File Interface: Import Rates and Prices (transaction TBDM )]
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_FF_IMPORT.
● FTRM_TCR_MARKETDATA_FF_ERRORLOG_EXPORT
○ Program that uses this logical file name:
○ RFTBFF01 [function Market Data File Interface: Import Rates and Prices (transaction TBDM )]
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_FF_EXPORT.
● FTRM_TCR_MARKETDATA_FF_SECURITIES_YEAR_END_PRICES_IMPORT
○ Program that uses this logical file name:
○ RFDWZFF0
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_FF_IMPORT.
● FTRM_TCR_MARKETDATA_FF_STATISTICS_IMPORT
○ Program that uses this logical file name:
○ RFTBFF20 [function Market Data File Interface: Import Statistics Data (transaction TVMD )]
○ No parameters are used in this context:
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 205○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_FF_IMPORT.
● FTRM_TCR_TEMP_TCURC_EXPORT (Treasury: Sequential Output File for TCURC)
○ Program that uses this logical file name:
○ RZKLAODC
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TCR_TEMP_EXPORT.
● FTRM_TCR_TEMP_TCURT_EXPORT (Treasury: Sequential Output File for TCURT)
○ Program that uses this logical file name:
○ RZKLAODT
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_TCR_TEMP_EXPORT.
● FTRM_FTR_RED_SCHEDULE (Treasury: Redemption Schedule Parser)
○ Program that uses this logical file name:
○ FTBAS_SCHEDULE_BATCH_LOAD
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_FTR_RED_SCHEDULE.
● FTRM_AN_LIMIT
○ Program that uses this logical file name:
○ RFTBLBI1 (Batch Input Report for Creating Limits )
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_AN_LIMIT.
● FTRM_AN_INT_LIMIT
○ Program that uses this logical file name:
○ RFTBLBI1 ( Batch Input Report for Creating Limits)
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_AN_INT_LIMIT.
● FTRM_TCR_MARKETDATA_FF_DERIVATIVE_PRICES_ERRORLOG_EXPORT
○ Program that uses this logical file name:
○ RFTBFF30 (Import DTB Derivative Prices: transaction TVDT )
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_FF_EXPORT.
● FTRM_TCR_MARKETDATA_FF_DERIVATIVE_PRICES_IMPORT
○ Program that uses this logical file name:
○ RFTBFF30 (Import DTB Derivative Prices: transaction TVDT )
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_TCR_MARKETDATA_FF_IMPORT.
● FTRM_AN_BATCH_INPUT_DER
○ Programs using this logical file name:
○ RJBDBTC3 (Batch Input for Derivatives )
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_AN_BATCH_INPUT_DER.
● FTRM_AN_BATCH_INPUT_MM
○ Programs using this logical file name:
○ RJBDBTC2 (Batch Input for Derivatives)
○ No parameters are used in this context.
Security Guide for SAP S/4HANA 1709
206 P U B L I C SAP S/4HANA Business Applications○ The logical file name uses the logical file path FTRM_AN_BATCH_INPUT_MM.
● FTRM_AN_BATCH_INPUT_FX
○ Programs using this logical file name:
○ RJBDBTC1 (Batch Input for FX Transactions )
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_AN_BATCH_INPUT_FX.
● FTRM_AN_BATCH_INPUT_ERR_FILE
○ Programs using this logical file name:
○ Include MJBEHF01
○ No parameters are used in this context.
○ The logical file name uses the logical file path FTRM_AN_BATCH_INPUT_ERR_FILE.
● FTRM_TARO_SEND
○ Programs using this logical file name:
○ R_TLR_TARO_SEND
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TARO_SEND (this is where the send program puts
the files to be sent to the repository)
● FTRM_TARO_IMPORT
○ Programs using this logical file name:
○ R_TLR_TARO_IMPORT and R_TLR_TARO_IMPORT_REPORTS
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TARO_IMPORT (this is where the system expects
files sent by the repository)
● FTRM_TARO_ARCHIVE
○ Programs using this logical file name:
○ R_TLR_TARO_IMPORT and R_TLR_TARO_IMPORT_REPORTS
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TARO_ARCHIVE (this is where imported files are
stored if they were successfully imported)
● FTRM_TARO_ERROR
○ Programs using this logical file name:
○ R_TLR_TARO_IMPORT and R_TLR_TARO_IMPORT_REPORTS
○ No parameters are used in this context:
○ The logical file name uses the logical file path FTRM_TARO_ERROR (this is where imported files are
stored if they were NOT successfully imported but caused an error)
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log. For
more information, see about data storage security, see the respective chapter in the SAP NetWeaver Security
Guide.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 20713.3.5 Financial Operations
13.3.5.1 Contract Accounting
13.3.5.1.1 Authorizations
Business Roles
The following business roles are provided:
● SAP_BR_APR_MANAGER_FICA (Accounts Payable and Receivable Manager (FI-CA))
● SAP_BR_APR_ACCOUNTANT_FICA (Accounts Payable and Receivable Accountant (FI-CA))
● SAP_BR_INVOICING_SPEC_CINV (Invoicing Specialist (Convergent Invoicing))
● SAP_BR_INVOICING_MANAGER_CINV (Description: Invoicing Manager (Convergent Invoicing))
Standard Authorization Objects
You can easily recognize the authorization objects currently used in Contract Accounts Receivable and Payable
(FI-CA) from their technical name as follows:
1. In the SAP Easy Access menu choose Tools Administration User Maintenance Information System
Authorization Objects By object name .
2. Enter F_KK* in the Authorization Object field and execute your search.
In the result list, you can display the details for each selected authorization object such as authorization fields,
documentation and permitted activities, if defined.
In addition, for the Clarification Processing area, the authorization object S_CFC_AUTH exists; for the
Correspondence area, the authorization object P_CORR; and for prepaid processing, authorization objects exist
that follow the naming convention F_PREP*. You can use Customizing roles to control access to the configuration
of Contract Accounts Receivable and Payable (FI-CA) in the SAP Customizing Implementation Guide (IMG).
13.3.5.1.2 Data Storage Security
Contract Accounts Receivable and Payable (FI-CA) saves data in files in the file system. Therefore, it is important
to explicitly provide access to the corresponding files in the file system without allowing access to other
directories or files (also known as directory traversal). This is achieved by specifying logical paths and file names
in the system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
Security Guide for SAP S/4HANA 1709
208 P U B L I C SAP S/4HANA Business ApplicationsThe following list shows the logical file names and paths used by Contract Accounts Receivable and Payable (FI-
CA) and for which programs these file names and paths apply:
Logical File Names Used in FI-CA and Logical Path Names
The following logical file names have been created in order to enable the validation of physical file names:
Table 105:
Program Logical File Name Used by the Pro Logical Path Name Used by the Pro
gram gram
RFKIBI_FILE00 FICA_DATA_TRANSFER_DIR FICA_DATA_TRANSFER_DIR
RFKIBI_FILEP01
RFKKBI_FILEEDIT
RFKKBIBG
RFKKZEDG
RFKKRLDG
RFKKCMDG
RFKKCRDG
RFKKAVDG
RFKKBIB0
RFKKZE00
RFKKRL00
RFKKCM00
RFKKCR00
RFKKAV00
RFKKKA00
RFKKBIT0
RFKKPCSF FI-CA-CARD-DATA-S FI-CA-CARD-DATA-S
RFKKPCDS
RFKKCVSPAY FI-CA-CVS FI-CA-CVS
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 209RFKK_CVSPAY_CONFIRM
RFKKCVSCONFIRMDB
RFKK_CVSPAY_CONFIRM_TEST
RFKK_DOC_EXTR_EXP FI-CA-DOC-EXTRACT-DIR FI-CA-DOC-EXTRACT-DIR
RFKK_DOC_EXTR_AEXP
RFKK_DOC_EXTR_IMP
RFKK_DOC_EXTR_EXTR
RFKK_DOC_EXTR
RFKK_DOC_EXTR_DEL
Class CL_FKK_TEXT_FILE
RFKKBIXBITUPLOAD FI-CA-BI-SAMPLE FI-CA-BI-SAMPLE-DIR
FI-CA-BI-SAMPLE-DIR
RFKKCOL2 FI-CA-COL-SUB FI-CA-COL-SUB
RFKKCOLL
Transaction FP03DM (Mass Activity)
Transaction FPCI (Mass Activity) FI-CA-COL-INFO FI-CA-COL-INFO
RFKKCOPM FI-CA-COL-READ FI-CA-COL-READ
READFILE
RFKKCOPG FI-CA-COL-TEST FI-CA-COL-TEST
RFKKRDI_REPORT FI-CA-RDI FI-CA-RDI
RFKKRDI_REPORT_DIS
SAPFKPY3 FI-CA-DTA-NAME FI-CA-DTA-NAME
RFKKCHK01 FI-CA-CHECKS-EXTRACT FI-CA-CHECKS-EXTRACT
Class CL_FKK_INFCO_SEND FI-CA-INFCO FI-CA-INFCO
RFKKBE_SAL1 FICA_BE_SAL FICA_BE_SAL
RFKKBE_SAL2 FICA_BE_SAL_XML FICA_BE_SAL_XML
RFKK1099 FI-CA-1099 FI-CA-1099
Security Guide for SAP S/4HANA 1709
210 P U B L I C SAP S/4HANA Business ApplicationsRFKKOP03 FICA_OPEN_ITEMS FICA_OPEN_ITEMS
RFKKOP04
RFKKOP07
RFKKES_SAL1 FICA_TAX_REP_GEN FICA_TAX_REP_GEN
RFKKES_SAL2
RFKKRDI_REPORT FI-CA-RDI FI-CA-RDI
RFKKRDI_REPORT_DIS
Transaction EMIGALL ISMW_FILE ISMW_ROOT
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information about data storage security, see the chapter in the SAP NetWeaver Security Guide.
13.3.5.1.3 Enterprise Services Security
For general information, see the chapters on Web Services Security in the SAP NetWeaver Security Guide and in
the SAP Process Integration Security Guide.
13.3.5.1.4 Other Security-Relevant Information
In Contract Accounts Receivable and Payable (FI-CA), some objects and special activities are protected by special
authorizations. The associated authorization object is F_KK_SOND. See table TFKAUTH (use transaction SM30 to
display) for information on all activities that you can protect with this authorization object.
13.3.5.2 Settlement Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 21113.3.5.2.1 Authorizations in Settlement Management
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 106:
Authorization Object Field Value Description
W_WBRC_CR Reason for Complaint 01 Create or generate Authorization for complaint
reason
02 Change
03 Display
16 Execute (process com
plaints)
A3 Change status of com
plaints manually
W_WBRK_FKA Settlement Document Type 01 Create or generate Authorization for settlement
document type
02 Change
03 Display
04 Print, edit messages
24 Archive
25 Reload
43 Release (*)
85 Reverse (*)
99 Generate invoice list
W_WBRK_ORG ● Company Code 01 Create or generate Authorization for organiza
● Purchasing Organization tional data
02 Change
● Purchasing Group
● Sales Organization 03 Display
● Distribution Channel 04 Print, edit messages
● Division 24 Archive
25 Reload
43 Release (*)
85 Reverse (*)
99 Generate invoice list
Security Guide for SAP S/4HANA 1709
212 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
WLF_IV Settlement Document List 01 Create or generate Clearing Workbench
Type
03 Display
W_COCO Condition Contract Type 01 Create or generate Authorizations for condition
contract
02 Change
03 Display
04 Print, edit messages
24 Archive
25 Reload
43 Release (*)
66 Refresh (Apply condition
contract retrospectively to
posted invoices)
84 Settle
W_COCO_ORG ● Sales Organization 01 Create or generate Authorizations for condition
● Distribution Channel contract organizational data
02 Change
● Division
● Purchasing Organization 03 Display
● Purchasing Group 04 Print, edit messages
43 Release (*)
84 Settle
(*) To check this activity, you must explicitly activate the check as required.
13.3.5.2.2 Deletion of Personal Data
The Settlement Management (LO-AB) application might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 213Relevant Application Objects and Available Deletion Functionality
Table 107:
Application Object Detailed Description Provided Deletion Functionality
Customer Settlement List See the product assistance for SAP S/ ILM object AB_DOCUMENT assigned to ar
4HANA on the SAP Help Portal at chiving object WBU.
http://help.sap.com/s4hana_op_1709 For more information see the product
under Product Assistance assistance for SAP S/4HANA on the
Enterprise Business Applications SAP Help Portal at
Finance Financial Operations http://help.sap.com/s4hana_op_1709
Settlement Management Document Product Assistance Enterprise
Categories in Settlement Management Business Applications Finance
Customer Settlement List . Financial Operations Settlement
Management Functions for Document
Processing Archiving of Settlement
Management Documents Customer
Settlement Lists (LO-AB) .
Report:
WLF_UPDATE_AB_EOP_FROM_ARCHIVE.
Customer Settlement See the product assistance for SAP S/ ILM object AB_DOCUMENT assigned to ar
4HANA on the SAP Help Portal at chiving object WCI.
http://help.sap.com/s4hana_op_1709 For more information see the product
Product Assistance Enterprise assistance for SAP S/4HANA on the
Business Applications Finance SAP Help Portal at
Financial Operations Settlement http://help.sap.com/s4hana_op_1709
Management Document Categories in Product Assistance Enterprise
Settlement Management Customer Business Applications Finance
Settlement . Financial Operations Settlement
Management Functions for Document
Processing Archiving of Settlement
Management Documents Customer
Settlements (LO-AB) .
Report:
WLF_UPDATE_AB_EOP_FROM_ARCHIVE.
Security Guide for SAP S/4HANA 1709
214 P U B L I C SAP S/4HANA Business ApplicationsApplication Object Detailed Description Provided Deletion Functionality
Supplier Billing Document See the product assistance for SAP S/ ILM object AB_DOCUMENT assigned to ar
4HANA on the SAP Help Portal at chiving object WLF.
http://help.sap.com/s4hana_op_1709 For more information see the product
Product Assistance Enterprise assistance for SAP S/4HANA on the
Business Applications Finance SAP Help Portal at
Financial Operations Settlement http://help.sap.com/s4hana_op_1709
Management Document Categories in Product Assistance Enterprise
Settlement Management Supplier Business Applications Finance
Billing Document . Financial Operations Settlement
Management Functions for Document
Processing Archiving of Settlement
Management Documents Supplier
Billing Documents (LO-AB) .
Report:
WLF_UPDATE_AB_EOP_FROM_ARCHIVE.
Settlement Document List See the product assistance for SAP S/ ILM object AB_DOCUMENT assigned to ar
4HANA on the SAP Help Portal at chiving object WRECH.
http://help.sap.com/s4hana_op_1709 For more information see the product
Product Assistance Enterprise assistance for SAP S/4HANA on the
Business Applications Finance SAP Help Portal at
Financial Operations Settlement http://help.sap.com/s4hana_op_1709
Management Document Categories in Product Assistance Enterprise
Settlement Management Settlement Business Applications Finance
Document List . Financial Operations Settlement
Management Functions for Document
Processing Archiving of Settlement
Management Documents Settlement
Document Lists (LO-AB) .
Report:
WLF_UPDATE_AB_EOP_FROM_ARCHIVE.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 215Application Object Detailed Description Provided Deletion Functionality
Supplier Settlement List See the product assistance for SAP S/ ILM object AB_DOCUMENT assigned to ar
4HANA on the SAP Help Portal at chiving object WREG.
http://help.sap.com/s4hana_op_1709 For more information see the product
Product Assistance Enterprise assistance for SAP S/4HANA on the
Business Applications Finance SAP Help Portal at
Financial Operations Settlement http://help.sap.com/s4hana_op_1709
Management Document Categories in Product Assistance Enterprise
Settlement Management Supplier Business Applications Finance
Settlement List . Financial Operations Settlement
Management Functions for Document
Processing Archiving of Settlement
Management Documents Supplier
Settlement Lists (LO-AB) .
Report:
WLF_UPDATE_AB_EOP_FROM_ARCHIVE.
Expense Settlement See the product assistance for SAP S/ ILM object AB_DOCUMENT assigned to ar
4HANA on the SAP Help Portal at chiving object WSI.
http://help.sap.com/s4hana_op_1709 For more information see the product
Product Assistance Enterprise assistance for SAP S/4HANA on the
Business Applications Finance SAP Help Portal at
Financial Operations Settlement http://help.sap.com/s4hana_op_1709
Management Document Categories in Product Assistance Enterprise
Settlement Management Expense Business Applications Finance
Settlement . Financial Operations Settlement
Management Functions for Document
Processing Archiving of Settlement
Management Documents Expense
Settlements (LO-AB) .
Report:
WLF_UPDATE_AB_EOP_FROM_ARCHIVE.
Security Guide for SAP S/4HANA 1709
216 P U B L I C SAP S/4HANA Business ApplicationsApplication Object Detailed Description Provided Deletion Functionality
Settlement Document See the product assistance for SAP S/ ILM object AB_DOCUMENT assigned to ar
4HANA on the SAP Help Portal at chiving object WZR.
http://help.sap.com/s4hana_op_1709 For more information see the product
Product Assistance Enterprise assistance for SAP S/4HANA on the
Business Applications Finance SAP Help Portal at
Financial Operations Settlement http://help.sap.com/s4hana_op_1709
Management Document Categories in Product Assistance Enterprise
Settlement Management Settlement Business Applications Finance
Document . Financial Operations Settlement
Management Functions for Document
Processing Archiving of Settlement
Management Documents Settlement
Documents (LO-AB) .
Report:
WLF_UPDATE_AB_EOP_FROM_ARCHIVE.
Condition Contract See the product assistance for SAP S/ ILM object WCB_COCO assigned to ar
4HANA on the SAP Help Portal at chiving object WCB_COCO.
http://help.sap.com/s4hana_op_1709 Report:
Product Assistance Enterprise WCB_UPDATE_EOP_FROM_ARCHIVE.
Business Applications Finance
Financial Operations Settlement
Management Condition Contract
Management Condition Contract .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 217Relevant Application Objects and Available EoP/WUC functionality
Table 108:
Application Implemented Solution (EoP or WUC) Further Information
Settlement Management (LO-AB) End of purpose (EoP) check SAP delivers an end of purpose check
for Settlement Management (LO-AB). All
applications register either an end of
purpose (EoP) check in the Customizing
settings for the blocking and deletion of
business partner data or a where-used
check (WUC). For information about the
Customizing of blocking and deletion for
LO-AB, see Configuration: Simplified
Blocking and Deletion.
Configuration: Simplified Blocking and Deletion
You configure the settings the related to the blocking and deletion of customer and supplier master data in
Customizing for Logistics - General under Business Partner Deletion of Customer and Supplier Master Data. .
13.3.6 Real Estate Management
13.3.6.1 Real Estate Management
Authorizations
Standard Roles of Real Estate Management
Table 109:
Role Description
SAP_RE_APPL Real Estate Management (including administration and Cus
tomizing)
SAP_EP_RW_REFX_I AC - Flexible Real Estate Management
SAP_EP_RW_REFX_II AC - Flexible Real Estate Management - support processes
Security Guide for SAP S/4HANA 1709
218 P U B L I C SAP S/4HANA Business ApplicationsNetwork and Communication Security
External heating expenses settlement is available In Real Estate Management. To make this settlement possible,
the necessary files must be generated in the SAP system in an internal SAP format. You then need to send the
data medium to the settlement company.
Trace and Log Files
The change documents provide information on changes to the authorization group and to the person responsible
for the object.
Data Storage Security
Using Logical Paths and File Names to Protect Access to the File System
Flexible Real Estate Management (RE-FX) saves data in files in the file system. Therefore, it is important to
explicitly provide access to the corresponding files in the file system without allowing access to other directories
or files (also known as directory traversal). This is achieved by specifying logical paths and file names in the
system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
The following lists show the logical file names an paths that are used by Flexible Real Estate Management (RE-FX),
and for which programs these file names and paths apply:
Logical File Names Used in Flexible Real Estate Management (RE-FX)
The logical file name REFX_CREATE_TAPE makes it possible to validate physical file names in Flexible Real Estate
Management (RE-FX). The following programs use this logical file name:
● RFRESCMLTAPE
● RFRESCMLTAPECO
● RFRESCSETTLE
● RFRESCSETTLESC
● RFRESCCONTINUE
● RFRESCBOOKING
● RFRESCSETTLCO
● RFRESCCONTINUECO
● RFRESCPOSTCO
Logical Path Names Used in Flexible Real Estate Management (RE-FX)
The logical file names of Flexible Real Estate Management (RE-FX) listed above all use the logical file path
REFX_ROOT.
Activating the Validation of Logical Path and File Names
The logical paths and file names are entered in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 219the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
13.3.6.2 Deletion of Personal Data in RE-FX
Use
The Flexible Real Estate Management (RE-FX) component might process data (personal data) that is
subject to the data protection laws applicable in specific countries. You can use SAP Information Lifecycle
Management (ILM) to control the blocking and deletion of personal data. For more information, see the product
assistance for SAP S/4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product
Assistance Cross Components Data Protection .
Relevant Archiving Objects
Table 110:
Archiving Object Technical Name
Architectural Object REFX_AO
Adjustment Measure REFX_AT
Business Entity REFX_BE
Buildings REFX_BU
Comparative Group of Apartments REFX_CG
Real Estate Contract REFX_CN
Cash Flow of Contracts REFX_CNCF
Joint Liability REFX_JL
Land Register REFX_LR
RE: Move Planning REFX_MP
Notice of Assessment REFX_NA
Contract Offer REFX_OF
Offered Object REFX_OO
Option Rate Determination per Object/Subobject REFX_OR
Security Guide for SAP S/4HANA 1709
220 P U B L I C SAP S/4HANA Business ApplicationsArchiving Object Technical Name
Other Public Register REFX_PE
Participation Group REFX_PG
Parcel of Land REFX_PL
Property REFX_PR
RE Document REFX_RADOC
Parcel Update REFX_RC
Rental Object REFX_RO
Cash Flow of Rental Objects REFX_ROCF
RE Search Request REFX_RR
Reservation REFX_RS
Recurring Reservation REFX_RSREC
Service Charge Settlement REFX_SCSE
Settlement Unit REFX_SU
Correction Object REFX_TC
Available Check
Implemented Solution: End of Purpose (EoP) check
For more information, see SAP Note 2134204 .
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in
Customizing for Cross-Application Components under Data Protection.
13.3.7 Receivables Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 22113.3.7.1 SAP Credit Management
13.3.7.1.1 Technical System Landscape
Use
This figure shows an overview of the technical system landscape for SAP Credit Management.
Figure 3: Technical System Landscape
To exchange messages with external information providers, you have to use the Integration Server. For
accounting systems as well as Sales and Distribution (SD) systems, you can configure the communication either
via the Integration Server or via a point to point connection using Web Services Reliable Messaging (WSRM). The
SAP Business Information Warehouse is connected via Remote Function Call (RFC).
For more information about recommended security zone settings, see SAP NetWeaver Security Guide (Complete)
on SAP Service Marketplace at service.sap.com/securityguide.
For SAP Credit Management the business package for the Credit Manager provides you with portal content so that
you can use the functions from SAP Credit Management in the portal. Security-relevant information about the use
of the portal content is available in the SAP NetWeaver Security Guide for the usage types Enterprise Portal Core
(EPC) and SAP Enterprise Portal (EP) in the portal security guide.
13.3.7.1.2 Security Aspects of Data, Data Flow, and Processes
This figure shows an example of a data flow for the SAP Credit Management application.
Security Guide for SAP S/4HANA 1709
222 P U B L I C SAP S/4HANA Business ApplicationsFigure 4:
This table shows the security aspect to be considered for the process step and what mechanism applies.
Table 111:
Step Description Security Measure
1 User enters order User types: dialog or internet user
2 Credit check request Communication protocol HTTPS or
HTTP
3 Request external rating Communication protocol HTTPS or
HTTP
4 Call up information provider Communication protocol HTTPS or
HTTP
5 Provide external rating Not applicable
6 Use and store external rating Not applicable
7 Credit check response Communication protocol HTTPS or
HTTP
8 Inform user Not applicable
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 22313.3.7.1.3 User Management
Standard Users
This table shows the standard users that are necessary for operating SAP Credit Management.
Table 112:
System User ID Type Password Description
SAP Credit For example, Communication user You specify the initial This is required for
Management, client CREDITXIUSER password during the in communication be
systems stallation. tween SAP Credit
Management and client
The user ID and pass
systems using the XI
word are stored in the
channel.
XI channel for the con
nection.
You need to create this user before XI configuration. Assign both roles SAP_FIN_FSCM_CR_USER and
SAP_XI_IS_SERV_USER to the user. The user and password are added to the XI channel logon data that you
create when you configure your exchange server.
13.3.7.1.4 Authorizations
Business Role
This table shows the business role used by SAP Credit Management.
Table 113:
Role Description
SAP_BR_CREDIT_CONTROLLER Credit Controller
The authorization objects for role SAP_BR_CREDIT_CONTROLLER are described in the following section.
Defining Authorizations
You can control the right of access to SAP Credit Management data by assigning authorizations – separately by
credit segment and activity - to the authorization object F_UKM_SGMT. The fields of this authorization object are:
● Credit Segment
● Activity, with the following definitions:
○ 01 Add or Create
Security Guide for SAP S/4HANA 1709
224 P U B L I C SAP S/4HANA Business Applications○ 02 Change
○ 03 Display
○ 06 Delete
○ 08 Display Change Documents
○ 43 Release
The business role SAP_BR_CREDIT_CONTROLLER is delivered with all authorizations to this authorization object.
You can restrict the access to credit segment-independent master data of SAP Credit Management (for example,
the score) by using the authorization object for business partner roles (B_BUPA_RLT) with the role Business
Partner Credit Management (UKM000).
You can restrict the access to logs (application logs) of SAP Credit Management using the authorization object
S_APPL_LOG. The fields of this authorization object are:
● Application Log Object Name
● Application Log Subobject
● Activity, with the definitions
○ 03 Display
○ 06 Delete
For SAP Credit Management, the following forms are relevant for object name and subobject:
Table 114:
Object Name Subobject Meaning
FIN-FSCM-CR BW-SCORING Transfer of score from BW
FIN-FSCM-CR COMMITMENT Credit exposure update
FIN-FSCM-CR CREDITCHECK Credit check
FIN-FSCM-CR MONITOR Update entries for external credit Infor
mation
FIN-FSCM-CR SEARCH_ID Search ID at credit information provider
FIN-FSCM-CR REPLICATE Replicate FI-CA score
FIN-FSCM-CR EVENTING Log of events occurred
FIN-FSCM-CR-MASS ERROR Logs of mass changes, can be differenti
ERROR_BIG ated by the severity of the error
ERROR_PROG
ERROR_UPD
INFO
STATISTICS
SUCCESS
WARNING
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 225Procedure
You can organize the authorizations of your users as follows:
Table 115:
Activities Authorization Activity
Restrict access to one or more credit F_UKM_SGMT with specified credit seg
segments ment
Edit master data F_UKM_SGMT 01
02
03
Display master data F_UKM_SGMT 03
Delete master data F_UKM_SGMT 06
Display change documents for master F_UKM_SGMT 08
data changes
Release and reject credit limit changes/ F_UKM_SGMT 43
increases requested (dual control princi
ple)
Edit and display master data of SAP B_BUPA_RLT with the business partner
Credit Management role UKM000
Display and/or delete application logs of S_APPL_LOG with the object names and 03
SAP Credit Management subobjects listed above 06
13.3.7.1.5 Communication Destinations
Use
This table shows an overview of the communication destinations used by SAP Credit Management.
Table 116: Connection Destinations when Using the Integration Server
Destination Delivered Type User, Authorizations
INTEGRATION_SERVER No RFC XIAPPLUSER
Role
SAP_XI_APPL_SERV_USER
LCRSAPRFC No RFC
Security Guide for SAP S/4HANA 1709
226 P U B L I C SAP S/4HANA Business ApplicationsDestination Delivered Type User, Authorizations
SAPSLDAPI No RFC
These destinations are not application-specific but they are required for the operation of SAP Process Integration.
For point to point connections via Web Services Reliable Messaging (WSRM), you use the SOA Manager in both
systems to create the logical port and the endpoint.
13.3.7.1.6 Data Storage Security
Use
Master and transaction data of SAP Credit Management are saved in the database of the SAP system in which
SAP Credit Management is installed. They are not distributed to connected systems via XI, however they can be
optionally extracted to SAP Business Information Warehouse.
Access to this data is restricted through the authorizations for authorization object F_UKM_SGMT. Authorizations
for this authorization object are provided for role SAP_FIN_FSCM_CR_USER in the standard delivery; you can copy
the role and adapt it as required. For more information about authorization object F_UKM_SGMT, see the
configuration guide of SAP Credit Management.
Access to data on natural persons in particular is subject to data protection requirements and must be restricted
by assigning authorizations.
13.3.7.1.7 Security-Relevant Logging and Tracing
Use
All changes to the master data of SAP Credit Management are recorded as change documents in the business
partner record. Changes automatically executed by the system as a follow-on process to an event appear under
the name of the communication user if the event was triggered by an XI message.
Example
A credit check is initiated by SD; the system detects that the validity date of the credit limit has expired and
determines a new credit limit on the basis of the Customizing settings.
13.3.7.2 SAP Dispute Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 22713.3.7.2.1 Technical System Landscape
Use
You can use SAP Dispute Management in a one-system scenario or in a multiple-system scenario. If you use SAP
Dispute Management in a one-system scenario, this means that you use SAP Dispute Management in the same
system as Accounts Receivable. In a multiple-system scenario, you run SAP Dispute Management in a separate
system. This communicates with the Accounts Receivable system connected by means of synchronous and
asynchronous BAPI calls and dialog calls.
The figure below shows an overview of the technical system landscape for SAP Dispute Management in a one-
system scenario.
The figure below shows an overview of the technical system landscape for SAP Dispute Management in a multiple-
system scenario.
Security Guide for SAP S/4HANA 1709
228 P U B L I C SAP S/4HANA Business ApplicationsFor SAP Dispute Management, with Business Package for Dispute Manager you can also use portal content to use
the functions of SAP Dispute Management in the portal. For security-relevant information about using the portal
content, see the SAP NetWeaver Security Guide for the usage types Enterprise Portal Core (EPC) and Enterprise
Portal (EP) in the Portal security guide.
13.3.7.2.2 Security Aspects of Data, Data Flow and Processes
The figure below shows an example of the data flow that occurs when you create a dispute case in a multiple-
system scenario:
The table below shows the security aspect to be considered for the process step and what mechanism applies.
Table 117:
Step Description Security Measure
1 User starts FI transaction (for example, User type: dialog user
FB03 for document display orFBL5N for
line item list)
2 Dispute case is created asynchronously User type: technical user or in the case
(IDoc/ALE) of use of the Trusted/Trusting connec
tion, dialog user (see also User Manage
ment [page 230] )
As already mentioned under Technical System Landscape [page 228] , SAP Dispute Management uses BAPI calls
(IDocs) asynchronously for the data flow between the Accounts Receivable system and the Dispute Case
Processing system . The following IDocs are affected:
● Sending system: Accounts Receivable Accounting, receiving system: Dispute Case Processing
○ AttributesChange
○ Create
○ Process
● Sending system: Dispute Case Processing, receiving system: Accounts Receivable Accounting
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 229○ AttributeSynchronize
○ StatusChanged
○ WriteOff
If you are using SAP Dispute Management in a one-system scenario, synchronous BAPI calls are used instead.
13.3.7.2.3 User Management
User Administration Tools
The table below shows the user management tools for SAP DisputeManagement .
Table 118: User Management Tools
Tool Detailed Description Prerequisites
User and role maintenance with For more information, see User and Role
SAPNetWeaver AS ABAP (transactions Administration of Application Server
SU01 and PFCG ) ABAP in the SAP NetWeaver documen
tation.
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that users who perform their tasks interactively have to change their passwords on a regular basis, but not
those users who perform their tasks using background processing.
The user types that are required for SAP Dispute Management include:
● Individual users:
○ For each individual user in your system, you need dialog users for the following purposes:
○ To use the system via SAP GUI for Windows
○ If you use SAPDisputeManagement in a multiple system scenario and the RFC destinations used use a
Trusted/Trusting system relationship, calls to the other system are performed using the current user
from the calling system. Therefore, for each user a valid user must also exist in the target system.
● Technical users:
○ Background users can be used for processing in the background.
○ If you use SAPDisputeManagement in a multiple system scenario and the RFC destinations concerned are
configured such that they do not use a Trusted/Trusting system relationship, you need the following
technical users for the RFC destinations:
○ Communication users are used for synchronous and asynchronous BAPI calls (IDocs).
○ Dialog users are used for dialog calls that take place remotely in the other system.
For more information about these user types, see under User Types in the Security Guide for SAP NetWeaver AS
ABAP .
Security Guide for SAP S/4HANA 1709
230 P U B L I C SAP S/4HANA Business ApplicationsStandard Users
If you use SAP Dispute Management in a multiple system scenario and there is no Trusted/Trusting system
relationship between the systems involved, you have to configure corresponding users for the RFC
communication between the systems involved.
Note that in SAP Dispute Management , asynchronous BAPI calls, synchronous BAPI calls, and dialog calls take
place between the systems involved. There are calls from the Dispute Case Processing system to the system for
Accounts Receivable Accounting and vice versa.
The table below shows the users required if you use SAP Dispute Management in a multiple system scenario and
there is no Trusted/Trusting system relationship between the systems involved.
Table 119: Standard Users
System User ID Type Password Description
System for Dispute Example: ALERE Communication users The user ID and pass These users are used
Case Processing MOTE1_COM word are stored in the when synchronous or
RFC destination for the asynchronous BAPI
connection. methods are called
from the Accounts Re
ceivable system in the
Dispute Case Process
ing system.
System for Dispute Example: ALERE Dialog users The user ID and pass This user is used for di
Case Processing MOTE1_DIA word are stored in the alog calls from the Ac
RFC destination for the counts Receivable Ac
connection. counting system in the
Dispute Case Process
ing system.
Accounts Receivable Example: ALERE Communication users The user ID and pass These users are used
Accounting system MOTE2_COM word are stored in the when synchronous or
RFC destination for the asynchronous BAPI
connection. methods are called
from the Dispute Case
Processing system in
the Accounts Receiva
ble system.
Accounts Receivable Example:ALERE Dialog users The user ID and pass This user is used for di
Accounting system MOTE2_DIA word are stored in the alog calls from the Dis
RFC destination for the pute Case Processing
connection. system in the Accounts
Receivable Accounting
system.
Create the users and enter them in the corresponding RFC destinations. You can assign user IDs as required. The
user IDs above are merely examples.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 23113.3.7.2.4 Authorizations
Standard Roles:
The table below shows the standard roles used by SAP Dispute Management .
Table 120:
Role Description
SAP_FIN_FSCM_DM_USER FSCM Dispute Management - Processor
● One-system and multiple-system scenario Contains the authorizations that an end user requires in Dis
pute Case Processing.
SAP_FIN_FSCM_DM_RFC_COMM RFC user (communication) in Dispute Case Processing
● Multiple-system scenario Contains the authorizations required by a user to call synchro
nous and asynchronous BAPI methods from the Accounts Re
ceivable system in the Dispute Case Processing system.
Examples of such methods are creating dispute cases from
Accounts Receivable and automatically changing dispute
cases using clearing transactions in Accounts Receivable.
SAP_FIN_FSCM_DM_RFC_DIALOG RFC user (dialog) in Dispute Case Processing
● Multiple-system scenario Contains the authorizations for a user with which the DISPLAY
method is called in the Dispute Case Processing system from
the Accounts Receivable system by RFC. The role contains
the authorizations necessary for displaying the dispute case.
SAP_FIN_FSCM_DM_AR_DIALOG Role for Functions of Accounts Receivable
● One-system scenario Contains authorizations required by end users in Dispute
Case Processing so that they can call Accounts Receivable
functions in Dispute Case Processing.
Examples of such functions are including open items in a dis
pute case and navigating from a dispute case to a linked line
item.
SAP_FIN_FSCM_DM_AR_RFC_DIALOG RFC user (dialog) in Accounts Receivable
● Multiple-system scenario Contains the authorizations required by a user to call SAP
Dispute Management dialog methods using RFC from the Dis
pute Case Processing system in the Accounts Receivable sys
tem.
Examples of such methods are including open items in a dis
pute case and navigating from a dispute case to a linked line
item.
Security Guide for SAP S/4HANA 1709
232 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_FIN_FSCM_DM_AR_RFC_COMM RFC user (communication) in Accounts Receivable
● Multiple-system scenario Contains the authorizations required by a user to call SAP
Dispute Management synchronous and asynchronous BAPI
methods from the Dispute Case Processing system in the Ac
counts Receivable system.
Examples of such methods are the automatic write off of dis
pute cases and automatic notification of Accounts Receivable
when confirming and voiding cases.
SAP_FIN_FSCM_DM_DIALOG Role for functions of Dispute Case Processing
● One-system scenario Contains authorizations required by end users in Accounts
Receivable so that they can call Dispute Case Processing
functions in Accounts Receivable.
Examples of such functions are creating/displaying dispute
cases from transactions in Accounts Receivable and automat
ically changing dispute cases using clearing transactions in
Accounts Receivable.
SAP_BC_CM_ADMINISTRATOR Administrator in Case Management
● One-system and multiple-system scenario Since the component Case Management represents the basis
of SAP Dispute Management, you also require special Case
Management authorizations when setting up SAP Dispute
Management. These are included in this role.
13.3.7.2.5 Communication Destinations
Use
The following table shows an overview of the communication destinations used by SAP Dispute Management .
Table 121:
Destination Delivered Type User, Authorizations Description
Example: No RFC Under Authorizations This destination is used
DM2FIN_DIAG [page 232] , you can for dialog calls that take
see the roles for dialog place from the Dispute
users that you need for Case Processing sys
dialog calls that take tem to the Accounts
place from the Dispute Receivable system by
Case Processing sys means of RFC.
tem to the Accounts
Receivable system.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 233Destination Delivered Type User, Authorizations Description
Example: No RFC Under Authorizations This destination is used
DM2FIN_COMM [page 232] , you can for synchronous and
see the roles for com asynchronous (IDocs)
munication users that BAPI calls that take
you need for synchro place from the Dispute
nous and asynchro Case Processing sys
nous BAPI calls that tem to the Accounts
take place from the Dis Receivable system.
pute Case Processing
system to the Accounts
Receivable system.
Example: No RFC Under Authorizations This destination is used
FIN2DM_DIAG [page 232] , you can for dialog calls that take
see the roles for dialog place from the Ac
users that you need for counts Receivable sys
dialog calls that take tem to the Dispute
place from the Ac Case Processing sys
counts Receivable sys tem by means of RFC.
tem to the Dispute
Case Processing sys
tem.
Example: No RFC Under Authorizations This destination is used
FIN2COL_COMM [page 232] , you can for synchronous and
see the roles for com asynchronous (IDocs)
munication users that BAPI calls that take
you need for synchro place from the Ac
nous and asynchro counts Receivable sys
nous BAPI calls that tem to the Dispute
take place from the Ac Case Processing sys
counts Receivable sys tem.
tem to the Dispute
Case Processing sys
tem.
You can assign names for your RFC destinations as required. The names of the RFC destinations used above are
merely examples.
When you set up the RFC destinations for the ALE scenario, check whether the option of trusted/trusting system
relationship is relevant for you. Using an RFC trusted/trusting system relationship between two SAP systems
means that in the case of an RFC (Remote Function Call) from the trusted to the trusting system, no password is
sent for the logon to the trusting system. You can configure the RFC destinations in such a way that the call in the
target system occurs with the current user from the calling system without a password being specified or entered
on the logon screen. This has the following advantages, for example:
● When changes to objects or data are logged in the called system, this logging takes place with the current
user from the calling system. This makes it easier to track changes that occurred through RFC.
Security Guide for SAP S/4HANA 1709
234 P U B L I C SAP S/4HANA Business Applications● You can assign individual authorizations to the users in the called system. As such you can differentiate which
actions or functions are accessible to the user in the called system irrespective of the user.
With this procedure, you must create the users that are to be allowed to execute using RFC functions in the called
system as well. Note that in the ALE scenario of SAP Dispute Management, RFC calls take place from the
Accounts Receivable system to the Dispute Case Processing system and vice versa. A trust relationship between
SAP systems is not mutual. This means that you can choose whether one system is to be designated as trusted
for the other system and vice versa, or whether you want to define the trust relationship only in one direction.
In the Customizing of ALE (Application Link Enabling), you can also define different RFC destinations for dialog
calls, for BAPI calls, and for sending IDocs. As such you can also define an RFC destination for the dialog calls that
use the trusted/trusting system relationship and use the current user from the calling system for the RFC calls in
the target system, whilst you define an RFC destination for BAPI calls and for the sending of IDocs that does not
use the trusted/trusting system relationship and in which you enter a communication user.
Note
Note the following if your Accounts Receivable system is known as a trusted system by the Dispute Case
Processing system and you want to configure the RFC destination used for sending IDocs so that it uses the
trusted/trusting system relationship and the RFC calls in the target system with the current user from the
calling system:
IDocs are sent to the Dispute Case Processing system from the Accounts Receivable system when items are
cleared in the Accounts Receivable system, the clearing of items is reset, or partial payments are executed on
items for which a promise to pay exists for the corresponding invoice. If the corresponding RFC destination
uses the trusted/trusting system relationship, and carries out the call in the target system with the current
user from the calling system, this means that the user triggering the clearing, reset of clearing, or partial
payment must also be defined in the Dispute Case Processing system. You must therefore create all users who
carry out clearings, reversals of clearings, or partial payments in the Accounts Receivable system, and
therefore affect dispute cases, in the Dispute Case Processing system.
13.3.7.2.6 Data Storage Security
Use
Master data, transaction data, and Customizing data of SAP Dispute Management is stored in the database of the
SAP system.
Access to the database is restricted by the authorization objects of SAP Dispute Management . To see the
authorization objects relevant in SAP Dispute Management , see the roles listed under Authorizations [page 232] .
13.3.7.3 SAP Collections Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 23513.3.7.3.1 Technical System Landscape
Use
You can use SAP Collections Management in a one-system scenario or in a multiple-system scenario. If you use
SAP Collections Management in a one-system scenario, this means that you use Collections Management in the
same system as Accounts Receivable. In a multiple-system scenario, you run Collections Management in a
separate system. This communicates with the Accounts Receivable system connected by means of synchronous
and asynchronous RFC calls and dialog calls.
The figure below shows the technical system landscape in a one-system scenario:
The following figure shows the technical system landscape in a multiple-system scenario:
Security Guide for SAP S/4HANA 1709
236 P U B L I C SAP S/4HANA Business ApplicationsIf you connect several FI systems in a multiple-system scenario but have not installed a central system for
processing customer master data, then you can resolve conflicts when assigning numbers with the connection of
Unified Key Mapping Service to SAP NetWeaver Process Integration (UKMS connection to SAP NetWeaver PI).
The figure below shows the technical system landscape in a multiple-system scenario with several FI systems:
For additional information, see the SAP NetWeaver library under Business Services Unified Key Mapping
Service Connection to SAP NetWeaver Process Integration .
13.3.7.3.2 Security Aspects of Data, Data Flow and Processes
The following sections show an overview of the data flow in a multiple-system scenario.
13.3.7.3.2.1 Transfer of Transaction Data
The figure below shows the transfer of transaction data, meaning FI items, from the Accounts Receivable (FI-AR)
system to the Collections Management system. This is data that the system needs for creating the worklists.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 237The table below shows the security aspect to be considered for the process step and what mechanism applies.
Table 122:
Step Description Security Measure
1 The administrator schedules the job. User type: Dialog user
2 Program FDM_COLL_SEND_ITEMS User type: Technical user or, when the
transfers the FI items (IDoc/ALE) Trusted/Trusting connection is used, di
alog user (see also )
Security Guide for SAP S/4HANA 1709
238 P U B L I C SAP S/4HANA Business Applications13.3.7.3.2.2 Processing of Items in the Worklist
The figure below shows how a collection specialist processes an item in his worklist, so creating a promise to pay.
The table below shows the security aspect to be considered for the process step and what mechanism applies.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 239Table 123:
Step Description Security Measure
1 The collection specialist call up the work User type: Dialog user
list (transaction UDM_SPECIALIST)
2 He then navigates to receivables proc User type: Dialog user
essing (synchronous RFC connection)
3 He creates a promise to pay with asyn User type: Technical user or, when the
chronous BAPI (IDoc/ALE) Trusted/Trusting connection is used, di
alog user
13.3.7.3.3 User Management
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that users who perform their tasks interactively have to change their passwords on a regular basis, but not
those users who perform their tasks using background processing.
The user types that are required for SAP Collections Management include:
● Individual users:
○ For each individual user in your system, you need dialog users for the following purposes:
○ To use the system via SAP GUI for Windows
○ If you use SAP Collections Management in a multiple system scenario and the RFC destinations used
use a Trusted/Trusting system relationship, calls to the other system are performed using the
current user from the calling system. Therefore, for each user a valid user must also exist in the
target system.
● Technical users:
○ Background users can be used for processing in the background.
○ If you use SAP Collections Management in a multiple system scenario and the RFC destinations
concerned are configured such that they do not use a Trusted/Trusting system relationship, you need
the following technical users for the RFC destinations:
○ Communication users are used for synchronous and asynchronous BAPI calls (IDocs).
○ Dialog users are used for dialog calls that take place remotely in the other system.
Standard Users
If you use SAP Collections Management in a multiple system scenario and there is no Trusted/Trusting system
relationship between the systems involved, you have to configure corresponding users for the ALE/RFC
communication between the systems involved.
Security Guide for SAP S/4HANA 1709
240 P U B L I C SAP S/4HANA Business ApplicationsNote that in SAP Collections Management, asynchronous BAPI calls (IDocs), synchronous BAPI calls, and dialog
calls take place between the systems involved. There are calls from the Collections Management system to the
system for Accounts Receivable Accounting and vice versa.
The following table shows the standard users required if you use SAP Collections Management in a multiple
system scenario and there is no Trusted/Trusting system relationship between the systems involved.
Table 124:
System User ID Type Password Description
Collections Manage Example: ALE-DIAG1 Dialog users The user ID and pass This user is used for di
ment system word are stored in the alog calls from the Ac
RFC destination for the counts Receivable Ac
connection. counting system in the
Collections Manage
ment system.
Collections Manage Example: ALE-COMM1 Communication users The user ID and pass This user is used for
ment system word are stored in the synchronous BAPI calls
RFC destination for the or asynchronous BAPI
connection. calls (IDocs) from the
Accounts Receivable
Accounting system in
the Collections Man
agement system.
Accounts Receivable Example: ALE-DIAG2 Dialog users The user ID and pass This user is used for di
Accounting system word are stored in the alog calls from the Col
RFC destination for the lections Management
connection. system in the Accounts
Receivable Accounting
system.
Accounts Receivable Example: ALE-COMM2 Communication users The user ID and pass This user is used for
Accounting system word are stored in the synchronous BAPI calls
RFC destination for the or asynchronous BAPI
connection. calls (IDocs) from the
Collections Manage
ment system in the Ac
counts Receivable Ac
counting system.
Create the users required and enter them in the corresponding RFC destinations. You can assign user IDs as
required. The user IDs above are merely examples.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 24113.3.7.3.4 Authorizations
SAP Collections Management uses the authorization concept provided by SAPNetWeaver. Therefore, the security
guidelines and recommendations as described in the SAP NetWeaver AS Security Guide ABAP also apply to SAP
Collections Management .
The SAPNetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance inSAP NetWeaver, use the profile generator (transaction PFCG ).
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles:
Table 125:
Role Description
SAP_FIN_FSCM_COL_SPECIALIST Collection Specialist
● One-system and multiple-system scenario Contains the authorizations that the collection specialist
needs to perform the activities in his task area.
For example:
● Calling the worklist
● Displaying the business partner in SAP Collections
Management
● Navigating to Process Receivables
● Creating contact persons in Collections Management
● Creating promises to pay and dispute cases
● Creating and changing customer contacts
● Creating and changing resubmissions
Security Guide for SAP S/4HANA 1709
242 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_FIN_FSCM_COL_MANAGER Collection Manager
● One-system and multiple-system scenario Contains the authorizations that the collection manager
needs to perform the activities in his task area.
In addition to all authorizations of the collection specialist (role
SAP_FIN_FSCM_COLL_SPECIALIST), this covers the follow
ing actions, for example:
● Definition of collection strategies
● Definition of collection groups
● Assignment of a strategy to a group
● Change the role of the business partner specific to SAP
Collections Management
● Overview of several worklists
● Distribution of worklist items to the collection specialists
SAP_FIN_FSCM_COL_ADMIN Collections Management Administrator
● One-system and multiple-system scenario Contains the authorizations that a user in the Collections
Management system needs to start and monitor programs
that run periodically and preferably in the background.
For example:
● Worklist generation
● Distribution of worklist items to the collection specialists
● Mass change of the role of the business partner specific
to SAP Collections Management
● Monitoring of parallel runs
● Deleting Completed Resubmissions
SAP_FIN_FSCM_COL_DIALOG Role for promise to pay functions
● One-system scenario Contains authorizations required by end users in Accounts
Receivable so that they can call promise to pay functions in
Accounts Receivable.
Examples are:
● Creating, displaying, and changing promises to pay from
receivables processing in Accounts Receivable
● Automatic change of promises to pay as a result of clear
ing transactions in Accounts Receivable
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 243Role Description
SAP_FIN_FSCM_COL_RFC_DIALOG RFC user (dialog) for collections management functions
● Multiple-system scenario Contains authorizations for a user with which dialog methods
are called in the SAP Collections Management system from
the Financial Accounting system by means of RFC.
For example, navigation from receivables processing to the
detail display of the promise to pay or dispute case.
SAP_FIN_FSCM_COL_RFC_COMM RFC user (communication) for collections management
● Multiple-system scenario Contains authorizations for a user with which synchronous
and asynchronous methods are called in the SAP Collections
Management system from the Financial Accounting system.
For example:
● Posting of IDocs with data from Financial Accounting
● Creation of dispute cases, promises to pay, customer
contacts, and resubmissions
● Reading of attributes of dispute cases, promises to pay,
customer contacts, and resubmissions for display in re
ceivables processing
SAP_FIN_FSCM_COL_AR_USER End user in Receivables Processing
● One-system and multiple-system scenario Contains the authorizations required by an end user in receiv
ables processing in Accounts Receivable.
This role is in the Accounts Receivable system.
SAP_FIN_FSCM_COL_AR_RFC_COMM RFC user (communication) in Accounts Receivable
● Multiple-system scenario Contains authorizations for a user with which synchronous
and asynchronous methods are called from the SAP
Collections Management system in the Financial Accounting
system.
An example of such a method is the automatic notification to
Accounts Receivable when promises to pay are confirmed and
voided.
SAP_FIN_FSCM_COL_AR_ADMIN Collections Management Administrator Financial Accounting
● One-system and multiple-system scenario Contains the authorizations that a user in the Accounts Re
ceivable system needs to start and monitor programs that run
periodically and preferably in the background.
For example, the transfer of data relevant for SAP Collections
Management from Accounts Receivable:
● Valuating promises to pay
● Automatic confirmation of promises to pay
Security Guide for SAP S/4HANA 1709
244 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_FIN_FSCM_COL_AR_RFC_DIALOG RFC user (dialog) in Receivables Processing
● Multiple-system scenario Contains the authorizations for a user with which the navigate
to receivables processing from the worklist by means of RFC.
The authorizations permit the following activities:
● Display of invoice data
● Display of payment data
● Display of invoice history
● Creation, change, or display of a contact person
13.3.7.3.5 Communication Destinations
Use
The following table shows an overview of the communication destinations that you need for SAP Collections
Management if you use it in a multiple-system scenario.
Table 126:
Destination Delivered Type User, Authorizations Description
Example: No RFC Under Authorizations This destination is used
COL2FIN_DIAG [page 242] , you can for dialog calls that take
see the roles for dialog place from the Collec
users that you need for tions Management sys
dialog calls that take tem to the Accounts
place from the Collec Receivable system by
tions Management sys means of RFC.
tem to the Accounts
Receivable system.
Example: No RFC Under Authorizations This destination is used
COL2FIN_COMM [page 242] , you can for synchronous and
see the roles for com asynchronous (IDocs)
munication users that BAPI calls that take
you need for synchro place from the Collec
nous and asynchro tions Management sys
nous BAPI calls that tem to the Accounts
take place from the Receivable system.
Collections Manage
ment system to the Ac
counts Receivable sys
tem.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 245Destination Delivered Type User, Authorizations Description
Example: No RFC Under Authorizations This destination is used
FIN2COL_DIAG [page 242] , you can for dialog calls that take
see the roles for dialog place from the Ac
users that you need for counts Receivable sys
dialog calls that take tem to the Collections
place from the Ac Management system
counts Receivable sys by means of RFC.
tem to the Collections
Management system.
Example: No RFC Under Authorizations This destination is used
FIN2COL_COMM [page 242] , you can for synchronous and
see the roles for com asynchronous (IDocs)
munication users that BAPI calls that take
you need for synchro place from the Ac
nous and asynchro counts Receivable sys
nous BAPI calls that tem to the Collections
take place from the Ac Management system.
counts Receivable sys
tem to the Collections
Management system.
Note
If you connect several FI systems in a multiple-system scenario and use the connection of Unified Key Mapping
Service to SAP NetWeaver Process Integration (UKMS connection to SAP NetWeaver PI ) to resolve conflicts
when assigning numbers, you also need to set up the following destinations:
● Calls from the of accounts receivable system to the system of SAP NetWeaver PI (PI system)
● Calls from the Collections Management system to the PI system
Note
For additional information about the security aspects of the CRM Middleware that you can use as a tool
for master data replication, see the Security Guide for SAP Customer Relationship Management .
For additional information, see Customizing of SAP Collections Management under Basic Settings for
Collections Management Business Partners Master Data Distribution for Several FI Systems , if you have
activated business function FSCM Functions 2 (FIN_FSCM_CCD_2).
You can assign names for your RFC destinations as required. The names of the RFC destinations used above are
merely examples.
When you set up the RFC destinations for the ALE scenario, check whether the option of trusted/trusting system
relationship is relevant for you. Using an RFC trusted/trusting system relationship between two SAP systems
means that in the case of an RFC (Remote Function Call) from the trusted to the trusting system, no password is
sent for the logon to the trusting system. You can configure the RFC destinations in such a way that the call in the
Security Guide for SAP S/4HANA 1709
246 P U B L I C SAP S/4HANA Business Applicationstarget system occurs with the current user from the calling system without a password being specified or entered
on the logon screen. This has the following advantages, for example:
● When changes to objects or data are logged in the called system, this logging takes place with the current
user from the calling system. This makes it easier to track changes that occurred through RFC.
● You can assign individual authorizations to the users in the called system. As such you can differentiate which
actions or functions are accessible to the user in the called system irrespective of the user.
With this procedure, you must create the users that are to be allowed to execute using RFC functions in the called
system as well. Note that in the ALE scenario of SAP Collections Management , RFC calls take place from the
Accounts Receivable system to the Collections Management system and vice versa. A trust relationship between
SAP systems is not mutual. This means that you can choose whether one system is to be designated as trusted
for the other system and vice versa, or whether you want to define the trust relationship only in one direction.
In the Customizing of ALE ( Application Link Enabling ), you can also define different RFC destinations for dialog
calls, for BAPI calls, and for sending IDocs. As such you can also define an RFC destination for the dialog calls that
use the trusted/trusting system relationship and use the current user from the calling system for the RFC calls in
the target system, whilst you define an RFC destination for BAPI calls and for the sending of IDocs that does not
use the trusted/trusting system relationship and in which you enter a communication user.
Note
Note the following if your Accounts Receivable system is known as a trusted system by the Collections
Management system and you want to configure the RFC destination used for sending IDocs so that it uses the
trusted/trusting system relationship and carries out the RFC calls in the target system with the current user
from the calling system:
IDocs are sent to the Collections Management system from the Accounts Receivable system when items are
cleared in the Accounts Receivable system, the clearing of items is reset, or partial payments are executed on
items for which a promise to pay exists for the corresponding invoice. If the corresponding RFC destination
uses the trusted/trusting system relationship, and carries out the call in the target system with the current
user from the calling system, this means that the user triggering the clearing, reset of clearing, or partial
payment must also be defined in the Collections Management system. You must therefore create all users who
carry out clearing, resets of clearing, or partial payments in the Accounts Receivable system, and therefore
affect promises to pay, in the Collections Management system.
13.3.8 SAP S/4HANA Financial Closing cockpit
13.3.8.1 Authorizations
The SAP S/4HANA Financial Closing cockpit uses the authorization concept provided by the SAP NetWeaver AS
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply to the SAP S/4HNA Financial Closing cockpit.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 247The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine''s
user administration console on the AS Java.
For more information about how to create roles, go to the SAP Help Portal and search for User and Role
Administration of Application Server ABAP. There, go to Configuration of User and Role Administration Role
Administration
Standard Roles
The table below shows the standard roles that are used by the SAP S/4HANA Financial Closing cockpit.
Table 127: Standard Roles
Role Description
SAP_FCC_ADMIN Authorizations for the template administrator role. This role
can define templates, task lists, and task groups but cannot
execute, schedule, or monitor any tasks.
SAP_FCC_MANAGER Authorizations for the closing manager role. This role can
change task lists and schedule, mass schedule, execute, and
monitor tasks but cannot create task lists from templates.
SAP_FCC_PROCESSOR Authorizations for the task processor role. This role can
schedule, execute, and monitor tasks but cannot maintain
anything.
SAP_FCC_AUDITOR Authorizations for the auditor role. This role can display all ob
jects in the closing but cannot maintain anything.
SAP_FCC_MENU Authorization for accessing the SAP S/4HANAFinancial
Closing cockpit using SAP NetWeaver Business Client
(NWBC).
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by the SAP S/4HANA Financial
Closing cockpit.
Table 128: Standard Authorization Objects
Authorization Object Description
B_FCC_GEN Financial Closing cockpit: Application
Used for authorization check at the application level.
Security Guide for SAP S/4HANA 1709
248 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
B_FCC_TEMP Financial Closing cockpit: Template/Task List/Task Group
Used for authorization check at the template, task list, or task
group level.
B_FCC_ORG Financial Closing cockpit: Organizational Unit
Used for authorization check at the organizational unit level.
B_FCC_TASK Financial Closing cockpit: Task
Used for authorization check at the task level.
Authorizations for Business Intelligence (BI) iViews
BI authorizations are maintained separately from the authorizations in the SAP S/4HANA Financial Closing
cockpit. You need the standard BI authorizations for executing queries.
For more information, go to the SAP Help Portal and search for Data Warehouse Management. There, go to
Authorizations Authorizations for Working with Queries .
13.3.9 Travel Management
13.3.9.1 Travel Management
Authorizations
Table 129: Standard Roles in Travel Management (for Web Dynpro ABAP-Based Applications)
Role Description
SAP_FI_TV_WEB_TRAVELER_2 Traveler
The role contains the authorization profile needed to execute
the applications of the Travel and Expenses Employee Self-
Service (ESS) in SAP NetWeaver Portal.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 249Role Description
SAP_FI_TV_WEB_TRAVELER_EXT_TP Traveler
Users with this role can execute the work center for travelers
and the corresponding applications in NWBC. NWBC calls a
third-party travel planning solution instead of SAP Travel
Planning.
The role contains the authorization profile needed to execute
the applications of the Travel and Expenses ESS in SAP
NetWeaver Portal.
SAP_FI_TV_WEB_ESS_TRAVELER_2 ESS Single Role for Travelers
Users with this role can execute the work center for travelers
and the corresponding applications in NWBC.
This role is integrated into the ESS role for Web Dynpro ABAP-
based applications (SAP_EMPLOYEE_ESS_WDA_1).
SAP_FI_TV_WEB_ASSISTANT_2 Travel Assistant
Users with this role can execute the work center for travel as
sistants and the corresponding applications in NWBC.
The role contains the authorization profile needed to execute
the applications of the Travel and Expenses ESS in SAP
NetWeaver Portal.
SAP_FI_TV_WEB_ESS_ASSISTANT_2 Travel Assistant
Users with this role can execute the work center for travel as
sistants and the corresponding applications in NWBC.
SAP_FI_TV_WEB_APPROVER_2 Approving Manager
Users with this role can execute the work center for approving
managers and the corresponding applications in NWBC.
This role is integrated into the MSS role for Web Dynpro
ABAP-based applications (SAP_MANAGER_MSS_NWBC).
SAP_FI_TV_WEB_POLICY_ADMIN_2 Travel Policy Administrator
Users with this role can execute frequently used Customizing
applications for policy management in NWBC.
Security Guide for SAP S/4HANA 1709
250 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_FI_TV_TIC_AGENT Travel Interaction Center Agent
This role authorizes service agents to run the required trans
actions and Web Dynpro ABAP-based applications in the
Travel Management system from within the Travel Interaction
Center.
The Travel Interaction Center is a Shared Services Center in
SAP Customer Relationship Management (SAP CRM).
Authorization Profiles
The standard system contains the travel profile FI-TV (infotype 0470 of Human Resources Management (HCM)).
Alternatively, you can create the authorization profile by means of organizational assignment using the HR feature
TRVCP.
Authorization Objects
For all general functions, Travel Management uses the authorization object P_TRAVL.
The transfer of results from expense reports to accounting is protected by the authorization object F_TRAVL.
The travel plan status is protected by the authorization object F_TRAVL_S.
Network and Communication Security
In Travel Management, you can set up connections to the following global distribution systems (GDS):
● Amadeus
The partner is responsible for the Gateway.
● Galileo
The partner is responsible for the Gateway.
Alternatively or in addition, you can use SAP NetWeaver Process Integration to set up direct connections to the
following travel service providers:
● Flight reservation systems, for example, low-cost carrier providers
Depending on the partner, communication with the Web services is HTTPS or HTTP based.
● Hotel reservation systems such as HRS
Depending on the partner, communication with the Web services is HTTPS or HTTP based. For the
communication channel, you can make various security settings. For more information, see the Configuration
Guide.
● Rail portals such as Deutsche Bahn (BIBE)
Communication with the Web services is HTTPS based.
Alternatively, instead of using SAP Travel Planning, you can use third-party online booking systems (third-party
travel planning) such as:
● GetThere
Communication with the Web services of GetThere (and of Sabre, if applicable) is HTTPS based.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 251In SAP NetWeaver Portal, you can use Single Sign-On (SSO) to automatically log on the SAP Travel
Management users to a third-party online booking system.
● e-Travel
Communication with the Web services of e-Travel is HTTPS based.
In SAP NetWeaver Portal, you can use SSO to automatically log on the SAP Travel Management users to a
third-party online booking system.
For credit card clearing in Travel Management, you can use SAP NetWeaver Process Integration to set up direct
connections to credit card companies. You agree upon the safeguarding of the connection with the respective
partner. For more information, see SAP Library under Travel Management (FI-TV) Travel Expenses (FI-TV-
COS) Credit Card Clearing .
Data Storage Security
Travel Management transmits credit card information to the named partners. The data in the SAP system cannot
be accessed.
Travel Management supports secure handling of credit card data.
To set up connections to third-party systems, such as reservation systems, you might require company IDs and
user-specific technical passwords, which you can define in Customizing or in user-specific infotypes. In
Customizing, this data is protected by standard authorization objects for Customizing.
Travel Management imports data from files in the file system. Therefore, it is important to explicitly provide
access to the corresponding files in the file system without allowing access to other directories or files (also
known as directory traversal). You do this by specifying logical paths and file names in the system that are
assigned to the physical paths and file names. The system validates the assignment at runtime and issues an
error message if access to a directory is requested that does not match any assignment defined.
13.3.9.2 Deletion of Personal Data in FI-TV
Use
The Travel Management (FI-TV) component might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
For information, see SAP Note 2028594 .
Security Guide for SAP S/4HANA 1709
252 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application and Available WUC functionality
Table 130:
Application Implemented Solution Further Information
Travel Expenses (FI-TV-COS) Where-used check (WUC) SAP Note 2028595
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in
Customizing for Cross-Application Components under Data Protection.
13.4 Manufacturing
13.4.1 Production Engineering
13.4.1.1 Authorizations for Production BOM Management
Production BOM Management uses the authorization concept provided by the SAP NetWeaver for Application
Server ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP
NetWeaver AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 253Standard Roles
SAP delivers the following standard roles covering the most frequent business transactions. You can use these
roles as a template for your own roles.
Table 131:
Role Description
SAP_BR_PRODN_ENG_DISC Production Engineer - Discrete Manufacturing
During the product engineering phase, the product engineer
designs and develops products which involves the designing
of new products or product lines to take advantage of current
process technology and to improve quality and reliability. Or,
an existing product has to be changed due to changing market
or customer requirements. The result of this product phase is
drawings and a list of all the parts required to produce the
product. This list is the bill of material.
This business role is required for discrete manufacturing.
SAP_BR_PRODN_ENG_PROC Production Engineer - Process Manufacturing
The corresponding business role required for the process in
dustry.
SAP_BR_PRODN_ENG_DISC_CAM Production Engineer - Discrete Manufacturing (CAM)
Defines certifications required to work in a work center or
process a certain material to ensure that only certified pro
duction operators perform critical production operations. Also
defines production buyoffs.
SAP_BR_PRODN_ENG_DISC_EME Production Engineer - Discrete Manufacturing (EME)
Translates engineering BOMs into manufacturing BOMs and
creates detailed shop floor routings.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Security Guide for SAP S/4HANA 1709
254 P U B L I C SAP S/4HANA Business ApplicationsTable 132:
Authorization Object Field Value Description
C_STUE_BER ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
06 (Delete)
BEGRU Authorization Group
STLAN 1 (Production) BOM Usage
4 (Plant Maintenance)
STLTY M (Material BOM) BOM Category
C_STUE_NOH NOHIS Authorization to Edit BOMs
without a Change Number
C_STUE_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
CSWRK Plant
C_AENR_BGR ACTVT 22 (Enter, Include, Assign) Activity
BEGRU Authorization Group
C_AENR_ERW ACTVT 22 (Enter, Include, Assign) Activity
AEFUN Change Number Function
AENST Status of Change Number
BEGRU Authorization Group
RLKEY Release Key for Change Mas
ter
C_AENR_RV1 ACTVT 01 (Create or generate) Activity
C_TCLA_BKA KLART 023 (Batch) Class Type
C_DRAD_OBJ ACTVT Activity
DOKAR Document Type
DOKOB STKO_DOC Linked SAP Object
STPO_DOC
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 255Authorization Object Field Value Description
STATUS Document Status
13.4.1.2 Authorizations for Master Recipe/Routing
Management
Process and Master Recipe/Routing Management uses the authorization concept provided by the SAP
NetWeaver for Application Server ABAP. Therefore, the recommendations and guidelines for authorizations as
described in the SAP NetWeaver AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
SAP delivers the following standard roles covering the most frequent business transactions. You can use these
roles as a template for your own roles.
Table 133:
Role Description
SAP_BR_PRODN_ENG_DISC Production Engineer - Discrete Manufacturing
SAP_BR_PRODN_ENG_PROC Production Engineer - Process Manufacturing
SAP_BR_PRODN_ENG_DISC_CAM Production Engineer - Discrete Manufacturing (CAM)
Defines certifications required to work in a work center or
process a certain material to ensure that only certified pro
duction operators perform critical production operations. Also
defines production buyoffs.
SAP_BR_PRODN_ENG_DISC_EME Production Engineer - Discrete Manufacturing (EME)
Translates engineering BOMs into manufacturing BOMs and
creates detailed shop floor routings.
Security Guide for SAP S/4HANA 1709
256 P U B L I C SAP S/4HANA Business ApplicationsStandard Authorization Objects
The table below shows the security-relevant authorization objects that are used for the role:
SAP_BR_PRODN_ENG_DISC (Production Engineer - Discrete Manufacturing).
Table 134:
Authorization Object Field Value Description
C_AENR_BGR ACTVT 22 (Enter, Include, Assign) Activity
BEGRU Authorization Group
C_AENR_ERW ACTVT 22 (Enter, Include, Assign) Activity
AEFUN Change Number Function
AENST Status of Change Number
BEGRU Authorization Group
RLKEY Release Key for Change Mas
ter
C_ARPL_ART AP_ART Work Center Category
C_ARPL_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
C_FVER_WRK ACTVT Activity
WERKS Plant
C_ROUT ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
PLNTY N (Routing) Task List Type
STATU Status
VERWE 1 (Production) Task List Usage
4 (Plant maintenance)
WERKS Plant
C_STUE_BER ACTVT 03 (Display) Activity
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 257Authorization Object Field Value Description
BEGRU Authorization Group
STLAN 1 (Production) BOM Usage
4 (Plant maintenance)
STLTY K (Order BOM) BOM Category
M (Material BOM)
S (Standard BOM)
C_TCLA_BKA KLART 018 (Task List Class) Class Type
019 (Work Center Class)
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used for the role:
SAP_BR_PRODN_ENG_PROC (Production Engineer - Process Manufacturing).
Table 135:
Authorization Object Field Value Description
C_AENR_BGR ACTVT 22 (Enter, Include, Assign) Activity
BEGRU Authorization Group
C_AENR_ERW ACTVT 22 (Enter, Include, Assign) Activity
AEFUN Change Number Function
AENST Status of Change Number
BEGRU Authorization Group
RLKEY Release Key for Change Mas
ter
C_ARPL_ART AP_ART Work Center Category
C_ARPL_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
Security Guide for SAP S/4HANA 1709
258 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
C_FVER_WRK ACTVT Activity
WERKS Plant
C_ROUT ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
PLNTY 2 (Master Recipe) Task List Type
STATU Status
VERWE 1 (Production) Task List Usage
4 (Plant maintenance)
WERKS Plant
C_STUE_BER ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
BEGRU Authorization Group
STLAN 1 (Production) BOM Usage
4 (Plant maintenance)
STLTY D (Document Structure BOM Category
E (Equipment BOM)
K (Order BOM)
M (Material BOM)
S (Standard BOM)
T (Functional Location BOM)
C_STUE_NOH NOHIS Authorization to edit BOMs
without a change number
C_STUE_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
CSWRK Plant
Q_GP_CODE QCODEGRP Code Group
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 259Authorization Object Field Value Description
QKATART Catalog
Q_PLN_FEAT PLNTY Master Recipe Task List Type
13.4.2 Production Planning
13.4.2.1 Authorizations for Material Requirements Planning
Material Requirements Planning uses the authorization concept provided by the SAP NetWeaver for Application
Server ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP
NetWeaver AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
SAP delivers the following standard roles covering the most frequent business transactions. You can use these
roles as a template for your own roles.
Table 136:
Role Description
SAP_BR_MATL_PLNR_EXT_PROC Material Planner - External Procurement
SAP_BR_PRODN_PLNR Production Planner
Security Guide for SAP S/4HANA 1709
260 P U B L I C SAP S/4HANA Business ApplicationsStandard Authorization Objects
The table below shows the security-relevant authorization objects that are used for the roles
SAP_BR_MATL_PLNR (Material Planner - External Procurement) and SAP_BR_PRODN_PLNR (Production
Planner).
Table 137:
Authorization Object Field Value Description
M_MTDI_ORG DISPO MRP Controller (Materialls
Planner)
MDAKT A (MRP: Current Stock/ Activity Types in Materials
Requirements List) Planning
R (MRP: current material
overview)
B (MRP: total planning)
E (MRP: single-item planning)
WERKS Plant
M_PLAF_ORG DISPO MRP Controller (Materialls
Planner)
MDAKT A (MRP: current stock/ Activity Types in Materials
requirements list) Planning
F (MRP: Firm Planned Order)
H (MRP: Create Planned Or
der)
S (MRP: MRP list, coll. dis
play/planned order coll. con
version)
U (MRP: planned order, indi
vidual conversion)
V (MRP: change planned or
der)
WERKS Plant
M_BANF_BSA ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
BSART Purchasing Document Type
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 261Authorization Object Field Value Description
M_BANF_EKG ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKGRP Purchasing Group
M_BANF_EKO ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKORG Purchasing Organization
M_BANF_LGO ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
LGORT Storage Location
M_BANF_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
M_BEST_BSA ACTVT 03 (Display) Activity
BSART Purchasing Document Type
M_BEST_EKG ACTVT 03 (Display)
EKGRP Purchasing Group
M_BEST_EKO ACTVT 03 (Display) Activity
EKORG Purchasing Organization
M_BEST_LGO ACTVT 03 (Display) Activity
WERKS Plant
LGORT Storage Location
M_BEST_WRK ACTVT 03 (Display) Activity
Security Guide for SAP S/4HANA 1709
262 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
WERKS Plant
M_LPET_BSA ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
BSART Purchasing Document Type
M_LPET_EKG ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKGRP Purchasing Group
M_LPET_EKO ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKORG Purchasing Organization
M_LPET_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
C_AFKO_ATY ACTVT 01 (Create or generate) Activity
AUTYP 10 (Production order) Order Category
40 (Process order)
C_AFKO_AWA ACTVT 01 (Create or generate) Activity
AUTYP 10 (Production order) Order Category
40 (Process order)
AUFART Order Type
WERKS Plant
C_AFKO_AWK WERKS Plant
AUFART Order Type
V_VBAK_AAT AUART Sales Document Type
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 263Authorization Object Field Value Description
ACTVT 03 (Display) Activity
M_FCDM_ORG ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
43 (Release)
WERKS Plant
DISPO MRP Controller (Material
Planner)
M_MTDI_ORG MDAKT P (MRP: create planning file Activity types in materials
entry) planning
WERKS Plant
DISPO MRP Controller (Material
Planner)
C_PPBD AKTTYP A (Display) Activity category in transac
tion (Cr/Ch/D)
H (Add)
V (Change)
WERKS Plant
S_PROGRAM P_GROUP PPH_MRP required for sched ABAP Program Authorization
uling MRP runs Group
PP_MRP1 required for sched
uling order conversion runs
P_ACTION BTCSUBMIT (Schedule pro User Action in ABAP Program
grams for background proc
essing)
SUBMIT (Execute ABAP pro
gram)
VARIANT (Edit variants and
execute ABAP program)
Security Guide for SAP S/4HANA 1709
264 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
S_BTCH_JOB JOBACTION DELE (Delete Background Job operations
Jobs)
RELE (Release Jobs (Re
leased Automatically When
Scheduled))
SHOW(Display Job Queue)
JOBGROUP Summary of jobs for a group
13.4.2.2 Authorizations for Production Planning and Detailed
Scheduling
Production Planning and Detailed Scheduling uses the authorization concept provided by the SAP NetWeaver AS
for ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver
AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Table 138:
Role Description
SAP_BR_PRODN_PLNR Production Planner
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 265Table 139:
Authorization Object Description
C_APO_PROD APO Authorization Object: Master Data, Products
C_APO_LOC APO Authorization Object: Master Data, Locations
C_APO_MALO APO Authorization Object: PP/DS, Location Product
C_APO_RES APO Authorization Object: Master Data, Resources
C_APO_RELO APO Authorization Object: PP/DS, Resource
C_APO_RESN APO Authorization Object: Master Data, Resource Network
C_APO_VERS APO Authorization Object: Planning Versions
C_APO_RTO APO Authorization Object: Production Data Structure
C_APO_PPL APO Authorization Object: PP/DS, Production Planner
C_APO_CAL APO Authorization Object: Planning Calendar
C_APO_PCM APO Authorization Object: Production Campaign (Manual)
C_APO_EXPR APO Authorization Object: External Procurement Relationships
C_APO_AMON APO Authorization Object: Alert Monitor
C_APO_SETM APO Authorization Object: Master Data, Setup Matrices
C_APO_SETG APO Authorization Object: Master Data, Setup Groups
C_APO_MATR APO Authorization Object: Rules for Setup Matrix Generation
C_APO_GRPR APO Authorization Object: Rules for Setup Group Generation
C_APO_PPC APO Authorization Object: Production Backflush
C_APO_SSA APO Authorization Object: Release Handling for Sales Scheduling Agreement
13.4.2.3 Data Storage Security
Using Logical Path and File Names to Protect Access to the File System
Production Planning and Detailed Scheduling saves data in files in the file system. Therefore, it is important to
explicitly provide access to the corresponding files in the file system without allowing access to other directories
or files (also known as directory traversal). This is achieved by specifying logical paths and file names in the
system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
Security Guide for SAP S/4HANA 1709
266 P U B L I C SAP S/4HANA Business ApplicationsThe data storage security of SAP NetWeaver and components installed on the base is described in the SAP
NetWeaver Security Guide. All business data in SAP PP/DS is stored in the system database. If SAP LiveCache is
used, some business data is also stored there. This business data is protected by the authorization concept of
SAP NetWeaver and SAP PP/DS. In some special cases, business-relevant data is stored in another location, such
as a file system. The special case is listed below:
Logical File Names Used
The following logical file name has been created in order to enable the validation of physical file names:
● SAP SCM Optimizer
Logical Path Names Used
The logical file names listed above all use the following logical file paths:
● :\usr\SAP\\\log (for Windows)
● \usr\sap\\\log (for Linux)
: Gateway ID on the SAP SCM Optimizer server
: Gateway number
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information, see about data storage security, see the respective chapter in the SAP NetWeaver Security
Guide.
13.4.3 Manufacturing Execution for Discrete Industries
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 26713.4.3.1 Authorizations for Production Processing
Production Processing uses the authorization concept provided by the SAP NetWeaver for Application Server
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
SAP delivers the following standard roles covering the most frequent business transactions. You can use these
roles as a template for your own roles.
Table 140:
Role Description
SAP_BR_PRODN_SUPERVISOR_DISC Production Supervisor - Discrete Manufacturing
SAP_BR_PRODN_SUPERVISOR_PROC Production Supervisor - Process Industry
SAP_BR_PRODN_OPTR_DISC Production Operator - Discrete Manufacturing
SAP_BR_PRODN_OPTR_PROC Production Operator - Process Industry
SAP_BR_PRODN_PROC_SPCLST_CAM Production Process Specialist (CAM)
Assigns certifications to production operators making sure
only certified production operators perform critical produc
tion operations. The process specialist also defines the buyoff
templates.
SAP_BR_PRODN_PROC_SPCLST_EPO Production Process Specialist (EPO)
Defines reason codes, hold codes, defect codes and so on.
SAP_BR_PRODN_SUPRVSR_DISC_CAM Production Supervisor - Discrete Manufacturing (CAM)
Performs buyoffs making sure the product meets quality cri
teria.
SAP_BR_PRODN_SUPRVSR_DISC_EPO Production Supervisor - Discrete Manufacturing (EPO)
Assigns production operators to work centers.
Security Guide for SAP S/4HANA 1709
268 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_BR_PRODN_OPTR_DISC_EPO Production Operator - Discrete Manufacturing (EPO)
Performs production operations as defined in the shop floor
routing and records production progress.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used for the role
SAP_BR_PRODN_SUPERVISOR_DISC Production Supervisor - Discrete Manufacturing.
Table 141:
Authorization Object Description
C_AFFW_TWK CIM: Reworking error records from autom. goods movements
C_AFKO_ATY CIM: Order category
C_AFKO_AWA CIM: Authorization for Prod.Order/Order Type/Plant/Activity
C_AFKO_AWK CIM: Plant for order type of order
C_AFRU_AWK CIM: Confirmation
C_FVER_WRK PP-PI: Production Version - Plant
C_KAPA_ABG CIM: Capacity leveling
M_PLAF_ORG Organization Levels for Planned Order Processing
M_MSEG_BWA Goods Movements: Movement Type
M_MSEG_BWF Goods Receipt for Production Order: Movement Type
M_MSEG_LGO Goods Movements: Storage Location
M_MSEG_WWA Goods Movements: Plant
M_MSEG_WWF Goods Receipt for Production Order: Plant
C_NAV_PROF Navigation Profile
C_TCLA_BKA Authorization for Class Types
S_PROGRAM ABAP: Program Flow Checks
Field: P_GROUP and Value PP_SFC1 required to schedule or
der release runs
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 269Authorization Object Description
S_BTCH_JOB Background Processing: Operations on Background Jobs
M_MTDI_ORG Organizational Levels for Material Requirements Planning
M_MIPA_ORG Updating Backorders
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used for the role
SAP_BR_PRODN_SUPERVISOR_PROC Production Supervisor - Process Industry.
Table 142:
Authorization Object Description
S_BTCH_JOB Background Processing: Operations on Background Jobs
S_PROGRAM ABAP: Program Flow Checks
Field: P_GROUP and Value PP_SFC1 required to schedule or
der release runs
C_KLAH_BKP Authorization for Class Maintenance
C_TCLA_BKA Authorization for Class Types
M_MSEG_BWA Goods Movements: Movement Type
M_MSEG_BWF Goods Receipt for Production Order: Movement Type
M_MSEG_LGO Goods Movements: Storage Location
M_MSEG_WWA Goods Movements: Plant
M_MSEG_WWF Goods Receipt for Production Order: Plant
M_PLAF_ORG Organization Levels for Planned Order Processing
C_AFFW_TWK CIM: Reworking error records from autom. goods movements
C_AFKO_ATY CIM: Order category
C_AFKO_AWA CIM: Authorization for Prod.Order/Order Type/Plant/Activity
C_AFKO_AWK CIM: Plant for order type of order
C_AFRU_AWK CIM: Confirmation
Security Guide for SAP S/4HANA 1709
270 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
C_CREC_WRK PP-PI: Control Recipe - Plant
C_FVER_WRK PP-PI: Production Version - Plant
C_KAPA_ABG CIM: Capacity leveling
C_STUE_BER CS BOM Authorizations
Q_CHAR_PRC Recording Authorization for Insp. Results in an Operation
Q_INSP_FIN Inspection Completion with Open Char./Insp.Pts Req. Conf.
Q_MATERIAL Material Authorization
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used for the roles
SAP_BR_PRODN_OPTR_DISC Production Operator - Discrete Industry and SAP_BR_PRODN_OPTR_PROC
Production Operator - Process Industry.
Table 143:
Authorization Object Description
C_TCAL_BKA Authorization for Class Types
C_NAV_PROF Navigation Profile
M_MSEG_BWA Goods Movements: Movement Type
M_MSEG_BWF Goods Receipt for Production Order: Movement Type
M_MSEG_LGO Goods Movements: Storage Location
M_MSEG_WWA Goods Movements: Plant
M_MSEG_WWF Goods Receipt for Production Order: Plant
C_AFFW_TWK CIM: Reworking error records from autom. goods movements
C_AFKO_ATY CIM: Order category
C_AFKO_AWA CIM: Authorization for Prod.Order/Order Type/Plant/Activity
C_AFKO_AWK CIM: Plant for order type of order
C_CFRU_AAWK CIM: Confirmation
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 271Authorization Object Description
C_FVER_WRK PP-PI: Production Version - Plant
C_KAPA_ABG CIM: Capacity leveling
13.4.3.2 Authorizations for Repetitive Manufacturing
Repetitive Manufacturing uses the authorization concept provided by the SAP NetWeaver for Application Server
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Roles
SAP delivers the following standard roles covering the most frequent business transactions. You can use these
roles as a template for your own roles.
Table 144:
Role Description
SAP_BR_PRODN_SUPERVISOR_RPTV Production Supervisor: Repetitive Manufacturing
SAP_BR_PRODN_OPTR_RPTV Production Operator: Repetitive Manufacturing
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used for the role
SAP_BR_PRODN_SUPERVISOR_RPTV (production supervisor).
Security Guide for SAP S/4HANA 1709
272 P U B L I C SAP S/4HANA Business ApplicationsTable 145:
Authorization Object Field Value Description
C_KAPA_ABG ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
06 (Delete)
16 (Execute)
C_SAFK MDAKT V (MRP: Change planned or Activity types in materials
der) planning
WERKS Plant
T_TCLA_BKA KLART 013 Class type
M_MIPA_ORG ACTVT 03 (Display) Activity
WERKS Plant
The table below shows the security-relevant authorization objects that are used for the role
SAP_BR_PRODN_OPTR_RPTV (production operator).
Table 146:
Authorization Object Field Value Description
C_BACKFL BF_CANCEL X (Yes) Reversing backflushes
BF_CONCLU 1 (Decoupled confirmation) Final postings
2 (Postprocessing)
BF_POST 1 (Post without correction) Authorization for posting/
correcting
2 (Display BOM/routing)
3 (Change BOM/routing)
BF_REPPT 1 (Post previous RPs subse Reporting points (subsequent
quently) posting)
2 (Reset RP quantities)
BF_SCRAP X (Yes) Authorization for the scrap
backflush
BF_TYPE B (Assembly backflush) Backflush types
K (Component backflush)
L (Activity backflush)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 273Authorization Object Field Value Description
LGORT Storage location
WERKS Plant
C_AFFW_TWK AUTYP 10 (PP Production order) Order category
40 (Process order)
WERKS Plant
M_MSEG_BWA ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
BWART 101, 102, 261, 262, 531, 532, Movement Type (Inventory
543, 544, 545, 546 Management)
M_MSEG_BWF ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
BWART 101, 102, 261, 262, 531, 532, Movement Type (Inventory
543, 544, 545, 546 Management)
M_MSEG_LGO ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
LGORT Storage Location
BWART 101, 102, 261, 262, 531, 532, Movement Type (Inventory
543, 544, 545, 546 Management)
M_MSEG_WWA ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
M_MSEG_WWF ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
Security Guide for SAP S/4HANA 1709
274 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
WERKS Plant
C_BCKFLUSH ACTVT 24 (Archive) Activity
31 (Confirm)
A8 (Process mass data)
WERKS Plant
13.4.3.3 Authorizations for Subcontracting and External
Procurement
Subcontracting and External Procurement uses the authorization concept provided by the SAP NetWeaver for
Application Server ABAP. Therefore, the recommendations and guidelines for authorizations as described in the
SAP NetWeaver AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Roles
SAP delivers the following standard roles covering the most frequent business transactions. You can use these
roles as a template for your own roles.
Table 147:
Role Description
SAP_BR_PRODN_PLNR Production Planner
SAP_BR_MATL_PLNR_EXT_PROC Material Planner - External Procurement
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 275Table 148:
Authorization Object Field Value Description
M_MTDI_ORG DISPO MRP Controller (Materialls
Planner)
MDAKT A (MRP: Current Stock/ Activity Types in Materials
Requirements List) Planning
R (MRP: current material
overview)
B (MRP: total planning)
E (MRP: single-item planning)
WERKS Plant
M_PLAF_ORG DISPO MRP Controller (Materialls
Planner)
MDAKT A (MRP: current stock/ Activity Types in Materials
requirements list) Planning
F (MRP: Firm Planned Order)
H (MRP: Create Planned Or
der)
S (MRP: MRP list, coll. dis
play/planned order coll. con
version)
U (MRP: planned order, indi
vidual conversion)
V (MRP: change planned or
der)
WERKS Plant
M_BANF_BSA ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
BSART Purchasing Document Type
M_BANF_EKG ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKGRP Purchasing Group
Security Guide for SAP S/4HANA 1709
276 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
M_BANF_EKO ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKORG Purchasing Organization
M_BANF_LGO ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
LGORT Storage Location
M_BANF_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
M_BEST_BSA ACTVT 03 (Display) Activity
BSART Purchasing Document Type
M_BEST_EKG ACTVT 03 (Display)
EKGRP Purchasing Group
M_BEST_EKO ACTVT 03 (Display) Activity
EKORG Purchasing Organization
M_BEST_LGO ACTVT 03 (Display) Activity
WERKS Plant
LGORT Storage Location
M_BEST_WRK ACTVT 03 (Display) Activity
WERKS Plant
M_LPET_BSA ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 277Authorization Object Field Value Description
BSART Purchasing Document Type
M_LPET_EKG ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKGRP Purchasing Group
M_LPET_EKO ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
EKORG Purchasing Organization
M_LPET_WRK ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
WERKS Plant
C_AFKO_ATY ACTVT 01 (Create or generate) Activity
AUTYP 10 (Production order) Order Category
40 (Process order)
C_AFKO_AWA ACTVT 01 (Create or generate) Activity
AUTYP 10 (Production order) Order Category
40 (Process order)
AUFART Order Type
WERKS Plant
C_AFKO_AWK WERKS Plant
AUFART Order Type
V_VBAK_AAT AUART Sales Document Type
ACTVT 03 (Display) Activity
Security Guide for SAP S/4HANA 1709
278 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
M_FCDM_ORG ACTVT 01 (Create or generate) Activity
02 (Change)
03 (Display)
43 (Release)
WERKS Plant
DISPO MRP Controller (Material
Planner)
M_MTDI_ORG MDAKT P (MRP: create planning file Activity types in materials
entry) planning
WERKS Plant
DISPO MRP Controller (Material
Planner)
C_PPBD AKTTYP A (Display) Activity category in transac
tion (Cr/Ch/D)
H (Add)
V (Change)
WERKS Plant
S_PROGRAM P_GROUP PPH_MRP ABAP Program Authorization
Group
P_ACTION BTCSUBMIT (Schedule pro User Action in ABAP Program
grams for background proc
essing)
SUBMIT (Execute ABAP pro
gram)
VARIANT (Edit variants and
execute ABAP program)
S_BTCH_JOB JOBACTION DELE (Delete Background Job operations
Jobs)
RELE (Release Jobs (Re
leased Automatically When
Scheduled))
SHOW(Display Job Queue)
JOBGROUP Summary of jobs for a group
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 27913.4.3.4 Authorizations for Kanban
Kanban uses the authorization concept provided by the SAP NetWeaver for Application Server ABAP. Therefore,
the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide
ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Roles
SAP delivers the following standard role covering the most frequent business transactions. You can use this role
as a template for your own roles.
Table 149:
Role Description
SAP_BR_PRODN_OPTR_DISC Production Operator - Discrete Manufacturing
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 150:
Authorization Object Description
C_TCAL_BKA Authorization for Class Types
C_NAV_PROF Navigation Profile
M_MSEG_BWA Goods Movements: Movement Type
M_MSEG_BWF Goods Receipt for Production Order: Movement Type
M_MSEG_LGO Goods Movements: Storage Location
M_MSEG_WWA Goods Movements: Plant
M_MSEG_WWF Goods Receipt for Production Order: Plant
Security Guide for SAP S/4HANA 1709
280 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
C_AFFW_TWK CIM: Reworking error records from autom. goods movements
C_AFKO_ATY CIM: Order category
C_AFKO_AWA CIM: Authorization for Prod.Order/Order Type/Plant/Activity
C_AFKO_AWK CIM: Plant for order type of order
C_CFRU_AAWK CIM: Confirmation
C_FVER_WRK PP-PI: Production Version - Plant
C_KAPA_ABG CIM: Capacity leveling
13.4.3.5 Authorizations for Just-in-Time-Processing
Just-in-Time Processing (JIT) uses the authorization concept provided by the SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 151:
Authorization Object Description
C_AUTO_JIT ISAUTO_JIT: Sequenced JIT Calls (seqJC)
C_JIT_CALL PP-FLW JIT Calls
C_JIT_OUT IS-A-JIT: JIT Outbound Calls
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 28113.4.3.6 Deletion of Personal Data (Just-in-Time-Processing)
Use
Just-in-Time-Processing (IS-A-JIT) might process data (personal data) that is subject to the data protection laws
applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking
and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP
Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data
Protection .
Relevant Application Objects and Available Deletion Functionality
Table 152:
Application Provided Deletion Functionality
Just-in-Time-Processing (IS-A-JIT) Archiving Object
JIT_SJCAL
JITO_CALL
ILM Object
JIT_SJCALL
JITO_CALL
Report
DELETE_JIT_VENDOR_CUSTOMER
Relevant Application Objects and Available EoP/WUC functionality
Table 153:
Application Implemented Solution (EoP or WUC) Further Information
Just-in-Time-Processing (IS-A-JIT) WUC Checks tables JITCU
Security Guide for SAP S/4HANA 1709
282 P U B L I C SAP S/4HANA Business ApplicationsConfiguration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
13.4.3.7 Authorizations for Production Backflush
Production Backflush uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore,
the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide
ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 154:
Authorization Object Description
C_BCKFLUSH Automotive: Production backflush
C_APO_PPC APO Authorization Object: Production Backflush
13.4.3.8 Deletion of Personal Data (Production Backflush)
Use
Production Backflush might process data (personal data) that is subject to the data protection laws applicable in
specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion
of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at
http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 283Relevant Application Objects and Available Deletion Functionality
Table 155:
Application Provided Deletion Functionality
Production Backflush (IS-A-PPC) Archiving Object
PP_CONF
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
13.4.4 Quality Management
13.4.4.1 Authorizations in Quality Management
Quality management uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore, the
recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP
also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Security Guide for SAP S/4HANA 1709
284 P U B L I C SAP S/4HANA Business ApplicationsTable 156:
Role Description
SAP_BR_QUALITY_PLANNER Quality Planner
Sets up master data (specification, inspection planning,
FMEA) and advanced quality planning.
SAP_BR_QUALITY_TECHNICIAN Quality Technician
Prepares and executes quality inspections of products and
materials and manages inconsistencies.
SAP_BR_CALIBRATION_TECHNICIAN Calibration Technician
Performs quality inspections for test equipment.
SAP_BR_QUALITY_MANAGER Quality Manager
Leads process-improvement initiatives. Facilitates and leads
team efforts to establish and monitor customer/supplier rela
tions, supports strategic initiatives, and helps develop meas
urement systems to determine organizational improvements.
SAP_BR_QUALITY_ENGINEER Quality Engineer
Supports the quality manager in making sure that the com
pany’s quality and safety compliance goals are met. Makes
usage decisions. Performs statistical analyses of test results.
Coordinates activities within QM.
SAP_BR_QUALITY_ENGINEER_EPO Quality Engineer (EPO)
Analyzes product genealogy and action logs to identify the
root cause of a product issue.
SAP_BR_QUALITY_AUDITOR Quality Auditor
Plans and performs audits.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 157:
Authorization Object Fields Description Comment
AUDIT_AUTH Authorization Group Authorizations in Audit Proc
essing
Activities for Authorizations
Audit Type
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 285Authorization Object Fields Description Comment
Q_TCODE Transaction Code QM Transaction Authorization You use this authorization ob
ject in combination with other
QM authorization objects that
do not have a field for activi
ties assigned. By assigning a
concrete transaction code,
you can distinguish, for exam
ple, between displaying or
changing an object.
Q_CAT_GRP Code Group Catalog Maintenance of Code
Groups and Codes
Catalog
Code Group Status
Q_CAT_SSET Selected Set Catalog Maintenance of Se
lected Sets
Plant
Catalog
Status of Selected Set
Q_CGRP_ACT Activity Catalog of Code Groups and As of 1709
Codes (Including Activity)
Catalog
Code Group
Code Group Status
Q_CSSER_AC Activity Catalog of Selected Sets (In As of 1709
cluding Activity)
Plant
Catalog
Selected Set
Status of Selected Set
Q_GP_CODE Code Group Use of Code Groups
Catalog
Security Guide for SAP S/4HANA 1709
286 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Fields Description Comment
Q_UD_CODE Plant Using Usage Decision Codes
Inspection Lot, Partial Lot,
Single Unit, Interval
Selected Set of the Usage De
cision
Code Group of the Usage De
cision
Usage Decision Code
Q_OC_CODE Plant Use of Usage Decision Codes
for Completion at Operation
Work Center
Level
Selected Set of the Usage De
cision
Code Group of the Usage De
cision
Usage Decision Code
Inspection Lot, Partial Lot,
Single Unit, Interval
Q_INSPMETH Activity for Inspection Method Inspection Method As of 1709
Plant
Authorization Group QM Ba
sic Data
Inspection Method Status
Q_MINSPCHR Activity for Master Inspection Master Inspection Charateris As of 1709
Characteristic tic
Plant
Authorization Group QM Ba
sic Data
Master Inspection Character
istic Status
Q_QIRECPRC Activity Quality Info Record for Pro As of 1709
curement
Plant
Material Authorization Group
for Activities in QM
Q_SMPLPROC Activity Sampling Procedure As of 1709
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 287Authorization Object Fields Description Comment
Q_SMPLSCHM Activity Sampling Scheme As of 1709
Q_DYNMODRL Activity Dynamic Modification Rule As of 1709
Q_MASTERD Authorization Group QM Ba Authorization for Master Data
sic Data
Activity for QM Master Data
Authorizations
Q_STA_QMTB Inspection Method Status Maintain Inspection Methods
Depending on Status
Q_STA_QPMK Master Inspection Character Maintain Master Inspection
istic Status Characteristics Depending on
Status
Q_MATERIAL Material Authorization Group Material Authorization
for Activities in QM
Activity for QM Material Au
thorization
Plant
Q_ROUT Activity Maintain Inspection Plan
Task List Type
Plant
Task List Usage
Status
Q_PLN_FEAT Task List Type Maintaining Task List Charac
teristics for a Task List Type
Q_CP Activity Control Plan Maintenance
Plant
Q_FMEA Authorization Group Authorizations Within FMEA
Processing
Activities for Authorizations
FMEA Type
Security Guide for SAP S/4HANA 1709
288 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Fields Description Comment
Q_INSPLOT Activity for Inspection Lot Inspection Lot As of 1709
Plant
Inspection Type
Material Authorization Group
for Activities in QM
Q_INSPPNT Activity Inspection Point As of 1709
Plant
Name of the Reference Work
Center
Inspection Type
Inspection Point Type
Material Authorization Group
for Activities in QM
Q_INSPRSLT Activity for Inspection Results Inspection Result As of 1709
Plant
Name of the reference work
center
Inspection Type
Material Authorization Group
for Activities in QM
Q_INSPTYPE Plant Inspection Type for the In
spection Lot
Inspection Type
Q_CHAR_PRC Plant Recording Authorization for
Inspection Results in an Oper
Work Center
ation
Initial Status of Inspection
Characteristic (Sample)
Final Status of the Inspection
Characteristic (Sample)
Q_INSP_FIN Plant Inspection Completion with
Open Characteristics for In
Inspection Type
spection Points Usually Re
quiring Confirmation
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 289Authorization Object Fields Description Comment
Q_STCK_CHG Plant Change Stock Posting Fields
in Usage Decision Transac
Stock Type
tions
Authorizations for Stock
Postings
Q_RSLTHSTY Activity for Results History Results History As of 1709
Plant
Q_SPC Plant Change to Control Charts
SPC Criterion
Q_CERT_PRF Certificate Type Maintenance of Certificate
Profiles
Transaction Code
Q_DEFECT Activity Independent Defect As of 1709
Plant
Q_QLEVEL Activity Quality Level As of 1709
Plant
Material Authorization Group
for Activities in QM
Q_QMEL Notification Type Quality Notification Types
Transaction Code
Plant
Q_VORG_MEL Business Transaction Business Process Quality No
tifications
Notification Type
B_NOTIF_EX Notification Type Extended Change of Notifica
tion Type
Activity category in transac
tion (Create/Change/Delete)
Some authorization objects were newly created in 1709, because some existing authorization objects did not
contain any activities. Authorization was checked using the authorization object Q_TCODE (transaction code)
instead, which also needed to be maintained. Since transaction codes are no longer relevant for Fiori apps, the old
authorization objects are gradually being replaced by new authorization objects with activities.
The new authorization objects will replace the old authorization objects in the medium term. The old authorization
objects will be deleted in the future. Until then, they remain valid. That means the new authorization objects are
checked in addition to the old authorization objects.
The following table shows which new authorization object replaces which old authorization objects.
Security Guide for SAP S/4HANA 1709
290 P U B L I C SAP S/4HANA Business ApplicationsTable 158:
New Authorization Object Replaces Following Old Authorization Comment
Objects
Q_CGRP_ACT Q_CAT_GRP und Q_TCODE Authorization for editing code groups
and codes
Q_CSSET_ACT Q_CAT_SSET und Q_TCODE Authorization for editing selection sets
Q_MINSPCHR Q_MASTERD, Q_STA_QPMK und Q_TCODE Authorization for editing master inspec
tion characteristics
Q_INSPMETH Q_MASTERD, Q_STA_QPTB und Q_TCODE Authorization for editing inspection
methods
Q_SMPLPROC Q_TCODE Authorization for editing sampling pro
cedures
Q_DYNMODRL Q_TCODE Authorization for editing dynamic modi
fication rules
Q_QIRECPRC Q_MATERIAL und Q_TCODE Authorization for editing quality info re
cords for procurement
Q_SMPLSCHM Q_TCODE Authorization for editing sampling
schemes
Q_INSPLOT Q_INSPTYPE, Q_MATERIAL und Authorization for editing inspection lots
Q_TCODE
Q_INSPRSLT Q_INSPTYPE, Q_MATERIAL und Authorization for recording inspection
Q_TCODE results
Q_QLEVEL Q_MATERIAL und Q_TCODE Authorization for editing quality levels
Q_INSPPNT Q_TCODE Authorization for editing inspection
points
Critical Combinations
We strongly recommend that you do not grant authorization for results recording and usage decision for the same
inspection lot to one single user.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 29113.4.4.2 Internet Communication Framework Security (ICF)
You should only activate those services that are needed for the applications running in your system. For quality
management the following services are needed for the respective Web Dynpro applications:
● QI_INSPECTIONLOT_DETAIL_APP
● QI_RECORD_RESULTS_APPL
● QI_RECORD_RESULTS_ETI_APPL
Use the transaction SICF to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information about ICF security, see the respective chapter in the SAP NetWeaver Security Guide.
13.4.4.3 Communication Channel Security
The table below shows the communication channels used, the protocol used for the connection, and the type of
data transferred.
Table 159:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Communication with Supplier SOAP Quality notification data
Network Collaboration
Communication with the SOAP, RFC Inspection lot data
Quality Inspection Engine
(QIE) of the Extended
Warehouse Management
(EWM)
Communication exchange of IDoc Quality certificates Digital signature
quality certificates with exter
nal partner
Quality master data replica IDoc Master inspection character
tion istics
Master inspection methods
Codes
Inspection plan
Communication with external RFC, SOAP Inspection lot data
subsystem for inspection
Inspection results
Security Guide for SAP S/4HANA 1709
292 P U B L I C SAP S/4HANA Business ApplicationsCommunication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Communication with external RFC Inspection lot data
subsystem for statistical
Inspection results
process control (SPC)
Communication with SAP RFC, IDoc Inspection lot data
Manufacturing Execution
Inspection results
(ME)
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol. SOAP connections are protected with Web services
security.
Note
We strongly recommend using secure protocols (SSL, SNC) whenever possible.
For more information, see Transport Layer Security and Web Services Security in the SAP NetWeaver Security
Guide.
13.4.4.4 Data Protection
Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance
with general data privacy acts, it is necessary to consider compliance with industry-specific legislation in different
countries. This section describes the specific features and functions that SAP provides to support compliance
with the relevant legal requirements and data privacy.
This section and any other sections in this Security Guide do not give any advice on whether these features and
functions are the best method to support company, industry, regional or country-specific requirements.
Furthermore, this guide does not give any advice or recommendations with regard to additional features that
would be required in a particular environment; decisions related to data protection must be made on a case-by-
case basis and under consideration of the given system landscape and the applicable legal requirements.
Note
In the majority of cases, compliance with data privacy laws is not a product feature.
SAP software supports data privacy by providing security features and specific data-protection-relevant
functions such as functions for the simplified blocking and deletion of personal data.
SAP does not provide legal advice in any form. The definitions and other terms used in this guide are not taken
from any given legal source.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 293Table 160: Glossary
Term Definition
Personal Data Information about an identified or identifiable natural person.
Business purpose A legal, contractual, or in other form justified reason for the
processing of personal data. The assumption is that any pur
pose has an end that is usually already defined when the pur
pose starts.
Blocking A method of restricting access to data for which the primary
business purpose has ended.
Deletion Deletion of personal data so that the data is no longer usable.
Retention period The time period during which data must be available.
End of purpose (EoP) A method of identifying the point in time for a data set when
the processing of personal data is no longer required for the
primary business purpose. After the EoP has been reached,
the data is blocked and can only be accessed by users with
special authorization
Some basic requirements that support data protection are often referred to as technical and organizational
measures (TOM). The following topics are related to data protection and require appropriate TOMs:
● Access control: Authentication features as described in section User Administration and Authentication.
● Authorizations: Authorization concept as described in section Authorizations.
● Read access logging: as described in section Read Access Logging.
● Communication Security: as described in section Network and Communication Security.
● Availability control as described in:
○ Section Data Storage Security
○ SAP NetWeaver Database Administration documentation
○ SAP Business Continuity documentation in the SAP NetWeaver Application Help under Function-
Oriented View Solution Life Cycle Management SAP Business Continuity .
● Separation by purpose: Is subject to the organizational model implemented and must be applied as part of
the authorization concept
Note
The extent to which data protection is ensured depends on secure system operation. Network security,
security note implementation, adequate logging of system changes, and appropriate usage of the system are
the basic technical requirements for compliance with data privacy legislation and other legislation.
Configuration of Data Protection Functions
Certain central functions that support data protection compliance are grouped in Customizing for Cross-
Application Components under Data Protection.
Additional industry-specific, scenario-specific or application-specific configuration might be required. For
information about the application-specific configuration, see the application-specific Customizing in SPRO.
Security Guide for SAP S/4HANA 1709
294 P U B L I C SAP S/4HANA Business Applications13.4.4.4.1 Deletion of Personal Data
The ERP Quality Management application might process data (personal data) that is subject to the data
protection laws applicable in specific countries as described in SAP Note 1825544.
The SAP Information Lifecycle Management (ILM) component supports the entire software lifecycle including the
storage, retention, blocking, and deletion of data. The Quality Management application uses SAP ILM to support
the deletion of personal data as described in the following sections.
SAP delivers an end of purpose check for the Quality Management application.
End of Purpose Check (EoP)
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. The retention period of data consists of the following phases.
● Phase one: The relevant data is actively used.
● Phase two: The relevant data is actively available in the system.
● Phase three: The relevant data needs to be retained for other reasons.
For example, processing of data is no longer required for the primary business purpose, but to comply with
legal rules for retention, the data must still be available. In phase three, the relevant data is blocked.
Blocking of data prevents the business users of SAP applications from displaying and using data that may
include personal data and is no longer relevant for business activities.
Blocking of data can impact system behavior in the following ways:
● Display: The system does not display blocked data.
● Change: It is not possible to change a business object that contains blocked data.
● Create: It is not possible to create a business object that contains blocked data.
● Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a business
object that contains blocked data.
● Search: It is not possible to search for blocked data or to search for a business object using blocked data in
the search criteria.
It is possible to display blocked data if a user has special authorization; however, it is still not possible to create,
change, copy, or perform follow-up activities on blocked data.
For information about the configuration settings required to enable this three-phase based end of purpose check,
see the Process Flow.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 295Table 161: Relevant Application Objects and Available Deletion Functionality
Application Object Detailed Description Provided Deletion Functionality
Inspection Lot The EOP check considers partners (cus Archiving object QM_CONTROL
tomers or vendors):
● that are stored directly in the in
spection lot (table QALS)
● that are available in the worklist of
the transfer table for subsystems
(QIWL)
● that are used in control charts
(QASH)
● that are assigned to a multiple spec
ification (QAOBJMS)
Each inspection lot is checked if the a
customer or supplier is still relevant. If a
customer or vendor is used in several
objects, he is relevant as long as only
one object is not completed. An object is
completed if
● an inspection lot is canceled
● an inspection lot has status All
inspections completed, an usage de
cision was made and stock postings
are completed if the inspection lot is
stock-relevant.
● Control charts are closed.
The following data is relevant for calcu
lating the retention rules and residence
rules (taking the latest date):
● Date of usage decision
● Last change date of the usage deci
sion
● Last change date of the control
chart (if applicable)
You can start report
QM_CVP_EOP_SORT_ARC_CONTROL
to select all data that has already been
archived (backround job due to perform
ance).
Security Guide for SAP S/4HANA 1709
296 P U B L I C SAP S/4HANA Business ApplicationsApplication Object Detailed Description Provided Deletion Functionality
Sample Records Partners are assigned to the drawing of Archiving object QM_SAMPLE
physical samples.
Physical samples are only considered if
there are not part of an order, an inspec
tion lot or a notification since these
physical sample are considered as se
perate business operations and are
checked during the EoP check for the
corresponding object (e.g. notification).
Only ''independent'' physical samples are
checked.
The assigned partners are no longer rel
evant, if a the physical sample is marked
for deletion or marked as no longer exis
tent. Then the latest change date is
taken as basis for the calculation of the
retention and residence rules.
You can start report
QM_CVP_EOP_SORT_ARC_SAMPLE to
select all data that has already been ar
chived (backround job due to perform
ance).
Quality Certificate Only suppliers are relevant. Suppliers Archiving object QM_CERT
are entered directly in the certificate.
A certificate is completed if it has one of
the following statuses:
● Certificate filed and inspected
● Certificate receipt canceled
● Certifcate defective
If you want to send or receive the quality
data of a certificate using EDI, and the in
spection characteristics to be sent have
different descriptions in the vendor and
the customer system you can set up a
partner-specific identification and as
signment of the respective characteris
tics (characteristic mapping). The com
munication partners are defined by Part
ner Type and Partner Number.
For the deletion of the partner-specific
settings and characteristic mappings
you have to run deletion report
RDEL_PARTNER_CHAR.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 297Application Object Detailed Description Provided Deletion Functionality
Failure Mode and Effects Analysis Only business partners on header level Archiving object QM_FMEA
are checked. Business partners entered
for actions are not checked.
It is checked that the FMEA has status
Completed, To Be Archived, or Archived.
You can start report
PLM_FMEA_EOP_AUD_ARC_EXTRACT
to select all data that has already been
archived.
Audit Plans/Audits It is checked that the Audit has status Archiving object PLM_AUD
Completed, To Be Archived, or Archived.
Only audits are taken into account in the
check, but not audit plans or question
lists.
You can start report PLM_AU
DIT_EOP_AUD_ARC_EXTRACT to select
all data that has already been archived.
Table 162: Relevant Application Areas and Available EoP Functionality
Application Implemented Solution Further Information
Quality Management EoP check This includes the business in areas of:
● Quality Planning (QM-PT)
● Quality Inspection (QM-IM)
● Audit Management (CA-AUD)
Process
1. Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM).
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available.
3. You do the following:
1. Run transaction IRMPOL and maintain the required residence and retention policies for the central
business partner (ILM object: CA_BUPA).
2. Run transaction BUPA_PRE_EOP to enable the end of purpose check function for the central business
partner
3. Run transaction IRMPOL and maintain the required residence and retention policies for the customer
master and vendor master in SAP ERP (ILM objects: FI_ACCPAYB, FI_ACCRECV; for ILM objects in QM
see archiving objects above)
4. Run transaction CVP_PRE_EOP to enable the end of purpose check function for the customer master and
vendor master in SAP ERP
4. Business users can request unblocking of blocked data by using the transaction BUP_REQ_UNBLK.
Security Guide for SAP S/4HANA 1709
298 P U B L I C SAP S/4HANA Business Applications5. If you have the needed authorizations, you can unblock data by running the transaction BUPA_PRE_EOP and
CVP_UNBLOCK_MD.
6. You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of Quality Management.
13.4.5 Maintenance Operations
13.4.5.1 Authorizations in Plant Maintenance
Plant Maintenance uses the authorization concept provided by the SAP SAP NetWeaver for Application Server
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Roles
SAP delivers the following standard roles covering the most frequent business transactions. You can use these
roles as a template for your own roles.
Table 163: Roles for Plant Maintenance
Role Description
SAP_BR_MAINTENANCE_TECHNICIAN Maintenance Technician
This role contains all the functions that a maintenance techni
cian requires to carry out their work effectively and safely.
SAP_BR_MAINTENANCE_PLANNER Maintenance Planner
The purpose of this role is to provide the maintenance planner
with a broad range of functions necessary for planning and ex
ecuting maintenance activities.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 29913.5 R&D / Engineering
13.5.1 Product Safety and Stewardship
13.5.1.1 Product Development for Discrete Industries
13.5.1.1.1 Authorizations
Product Development for Discrete Industries uses the authorization concept provided by the SAP NetWeaver AS
for ABAP Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver
AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 164:
Authorization Object Description
C_PPE_PS Integrated Product and Process Engineering (iPPE): PS – iPPE
Interface (Component Assignment)
C_PPE_PSI Integrated Product and Process Engineering (iPPE): PS – iPPE
Interface (Interface)
Security Guide for SAP S/4HANA 1709
300 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
I_CCM_ACT Configuration Control: Allows forced installation/removal
I_CCM_EBOM Configuration Control: Allows the change of Equipment BOMs
I_CCM_STRC Configuration Control: Allows the maintenance of structure
gaps
I_IE4N Configuration Control: Controls the usage of the various IE4N
modes
13.5.1.2 Authorizations in Recycling Administration
Recycling Administration uses the authorization concept provided by the SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Roles
The table below shows the standard roles that are used by Recycling Administration.
Table 165:
Role Description
SAP_EP_ISREA_CM Automatic Role to display ABAP applications for contract han
dling
SAP_EP_ISREA_DEC Automatic Role to display ABAP applications for declarations
SAP_EP_ISREA_INFO Automatic Role to display ABAP applications for the informa
tion system
SAP_EP_ISREA_MD Automatic Role to display ABAP applications for master data
management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 301Role Description
SAP_ISREA_COMPLIANCE_MANAGER Compliance Manager for Recycling
SAP_ISREA_HEAD_SUSTAINABILITY Head of Sustainability and Environment
SAP_ISREA_MASTERDATA_EXPERT Specialist for Recycling Master Data
SAP_ISREA_PACKAGING_ENGINEER Packaging Engineer
SAP_ISREA_SPECIALIST Specialist for Recycling Accounting
com.sap.pct.erp.rea.financial_accountant SAP Enterprise Portal role Financial Accountant
com.sap.pct.erp.rea.person_responsible_masterda SAP Enterprise Portal role Person Responsible Master Data
ta
com.sap.pct.erp.rea.superadmin_masterdata SAP Enterprise Portal role Superadministrator Master Data
com.sap.pct.erp.rea.compliance_manager SAP Enterprise Portal role Compliance Manager
SAP_SR_REA_COMP_MAN_5 Role in SAP Business Client that corresponds to the SAP
Enterprise Portal role Compliance Manager
SAP_SR_REA_FIN_ACCOUNTANT_5 Role in SAP Business Client that corresponds to the SAP
Enterprise Portal role Financial Accountant
SAP_SR_REA_PERS_RESP_MD_5 Role in SAP Business Client that corresponds to the SAP
Enterprise Portal role Person Responsible Master Data
SAP_SR_REA_SUPER_ADMIN_MD_5 Role in SAP Business Client that corresponds to the SAP
Enterprise Portal role Superadministrator Master Data
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by Recycling Administration.
Table 166:
Authorization Object Name Description
/J7L/LDE REA Lean Data Entry Controls the authorizations for the appli
cations for lean data entry
J_7L_CONF REA: Authorization for Configuration Controls the authorizations for the im
port and export of recycling partner
master data
Security Guide for SAP S/4HANA 1709
302 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Name Description
J_7L_VARIA REA: Authorization for Variants Controls the access to master data ob
jects in the Recycling Administration
component depending on the respective
variant
J_7L_CUST REA: Customizing Controls the authorizations for Custom
izing in the Recycling Administration
component
J_7L_INFO REA: Information System Controls the authorizations for the appli
cations in the information system of the
Recycling Administration component
J_7L_PERIO REA: Declarations to Recycling Partners Controls the authorizations for declara
tions
J_7L_INFC REA: Interfaces and Batch Programs Controls the authorizations for pro
grams for mass processing (background
processing)
J_7L_STAMM REA: Master Data Controls the authorizations for editing
master data in the Recycling Administra
tion component
13.5.1.3 Product Compliance for Discrete Industries
13.5.1.3.1 User Administration and Authentication
Product Compliance for Discrete Industries uses the authorization concept provided by SAP NetWeaver.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver Security
Guide also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG).
For more generic information see User Administration and Authentication [page 13] in the Introduction section
13.5.1.3.1.1 User Management
The table below shows the standard users that are necessary for operating Product Compliance for Discrete
Industries. For more generic information, see User Management [page 13] in the Introduction section.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 303Table 167:
User ID Type Password Description
Business processing user Dialog user To be entered Business user of Product
Compliance
E-mail inbound processing Communication user Not needed User to process the incoming
user e-mails of Product
Compliance
Workflow engine batch user Background user Not needed User for the background
processing of workflows in
Product Compliance
You need to create users after the installation. Users are not automatically created during installation. In
consequence, there is no requirement to change user IDs and passwords after the installation.
Note
Several business processes within Product Compliance for Discrete Industries use SAP Business Workflow and
e-mail inbound and outbound processing. It is not recommended that you grant the corresponding system
users (such as WF_BATCH for Workflow System or SAPCONNECT for e-mail inbound processing) all
authorizations of the system (SAP_ALL).
13.5.1.3.1.2 Standard Roles
In Product Compliance for Discrete Industries,you use specific roles in the application to access content. These
roles are designed to support your business processes.
The following roles are delivered:
● Roles for Foundation Processes [page 47]
● Roles for Managing Product Compliance for Discrete Industries [page 305]
Unless shown in the tables below, the roles are delivered without authorization profiles. The authorization profiles
are generated from these roles.
Note
The Product Compliance for Discrete Industries roles that are delivered contain specific configuration such as
object-based navigation (OBN). In consequence, customizing these roles has a certain level of complexity.
Custom roles can be created as follows without losing their specific configuration:
1. Create your custom PFCG role.
2. Copy the menu structure from the SAP_EHSM_MASTER role or the others that are delivered.
3. Generate the authorization profile.
4. Assign the custom role to end users.
Security Guide for SAP S/4HANA 1709
304 P U B L I C SAP S/4HANA Business Applications13.5.1.3.1.2.1 Roles for Foundation Processes
Table 168:
Role Description
SAP_EHSM_MASTER Master PFCG role for Product Compliance for Discrete Indus
tries. This role is intended for use as a copy template for the
menu structures of the end user roles that are currently as
signed.
SAP_EHSM_PROCESS_ADMIN End user role for the person who is technically responsible for
the workflow-based processes of EHS Management. This role
assigns the menu structure in NWBC to the end user and the
necessary authorizations in the S/4HANA system.
This role can receive workflow items.
SAP_EHSM_FND_WF_PERMISSION System user role for the Workflow Engine. This role contains
the additional authorization profiles needed to process the
workflows in the background.
The users who process the workflows in the background
should, in addition to the SAP_EHSM_FND_WF_PERMISSION
role, be assigned the SAP_BC_BMT_WFM_SERV_USER role.
For processing workflows for product compliance for discrete
industries, users should also have the same authorization as
the following roles:
SAP_EHSM_PRC_BASMAT_SPEC
SAP_EHSM_PRC_COMPL_ENG
SAP_EHSM_PRC_COMPONENT_ENG
13.5.1.3.1.2.2 Roles for Managing Product Compliance for
Discrete Industries
Table 169:
Role Description
SAP_EHSM_ADMINISTRATOR Administrator role for the person who monitors changes in
master data for product compliance, compliance objects, and
the application log. This person also corrects data issues, en
ters data for customers and suppliers, and manually imports
incoming documents either from the front-end system or
from an application server.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 305SAP_EHSM_PRC_COMPL_CONSUMER End user role for the compliance consumer. This role can be
adapted for use as four different sub-roles: purchasing agent,
sales and services representative, mechanical engineer, and
electrical engineer. This user role is responsible for maintain
ing awareness of regulations and compliance requirements
and, depending on the purpose, can be responsible for main
taining product knowledge and data, configuring customer or
ders, scheduling service requests, research, and evaluating
product data, or designing, testing and analysis of compo
nents.
SAP_EHSM_PRC_COMPL_MGR End user role for the compliance manager. This user role
monitors compliance-related programs for product lines, and
defines policies and procedures for other departments to en
sure compliance. The compliance manager approves the
manufacturing processes and equipment that will be used in
production, and supervises design compliance.
SAP_EHSM_PRC_COMPL_ENG End user role for the compliance engineer. This user role mon
itors daily operations that contribute to ensuring compliance.
The compliance engineer is responsible for the company com
pliance data set. He or she maintains compliance data in co
operation with the engineering teams, and cooperates with
the compliance manager for up-to-date information about
regulations. This role is involved in material-based and com
ponent-based engineering changes and new product reviews.
SAP_EHSM_PRC_COMPONENT_ENG End user role for the component engineer. This user role se
lects and works with electrical or other components to be in
corporated into future products, and handles management
and documentation of purchased components. The compo
nent engineer approves parts obtained externally, works
closely with vendors, and ensures compliance by following the
established procedures and policies.
SAP_EHSM_PRC_BASMAT_SPEC End user role for the basic material specialist. This user role is
responsible for the selection of appropriate materials and sur
faces for design parts, and approves their release for use. The
basic material specialist decides the specific application of
materials and surfaces, and maintains the material database.
SAP_EHSM_PRC_AUTO_CHANGE_PROC System user role for the automated change processing. This
role contains the authorization profiles needed to determine
compliance information that is affected by a relevant change
and executing the worklist of pending compliance information.
Security Guide for SAP S/4HANA 1709
306 P U B L I C SAP S/4HANA Business ApplicationsSAP_EHSM_PRC_REG_CHG_WLIST_PRO System user role necessary for background processing of
PRC Regulatory Change Worklist Generation (program
R_EHPRC_WL_REGCHG_GENERATE) and PRC Regulatory
Change Worklist Post Processing (program
R_EHPRC_WL_REGCHG_POST_PROC).
SAP_EHSM_PRC_SUPPL_CHNG_PROC This role contains as a suggestion all relevant authorization
data necessary for background processing of PRC Supplier
Change Processing.
Supplier Change Monitor
The program R_EHPRC_PBB_SUPPL_CHNG_MON is executed in
background processing in order to monitor changes in sup
plier to material assignment and to start the workflow Decide
and Prepare for Assessmentif necessary.
SAP_EHSM_PRC_EML_REC System user role for the e-mail recipient. This role contains
the authorization profiles needed to receive and process e-
mails.
SAP_BCV_USER System user role for the display of Business Context Viewer
(BCV). This role contains the authorization profiles and menus
needed to display a BCV side panel and the BCV configura
tion.
SAP_BCV_ADMIN System user role for the administration of Business Context
Viewer (BCV). This role contains the authorization profiles
and menus needed to administrate the BCV configuration.
13.5.1.3.1.3 Standard Authorization Objects
The following security-relevant authorization objects are used in Product Compliance for Discrete Industries:
● Authorization Objects for Foundation Processes [page 51]
● Authorization Objects for Managing Product Compliance [page 308]
● Authorization Objects for Integration [page 62]
13.5.1.3.1.3.1 Authorization Objects for Foundation Processes
Table 170:
Authorization Object Field Value Description
EHFND_CHDC (Change ACTVT 03 (Display) Activity
Document)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 307Authorization Object Field Value Description
BO_NAME EHPRC_COMPLIANCE_DATA Business Object Name
(Compliance Data)
EHFND_WFT (Workflow ACTVT 16 (Execute) Activity
Tools)
TCD All transactions of workflow Transaction Code
tools
EHFND_WFF (Workflow and EHSM_COMP Product Compliance (PRC) Component of Product Safety
Processes) and Stewardship
PURPOSE Process Purpose (see Cus Process Purpose
tomizing activity Specify
Process Definitions)
EHSM_PVAR Process Variant (see Custom Name of Process Variant
izing activity Specify Process
Definitions)
EHSM_PCACT CANCELPROC (Cancel Proc Activity of Task or Process
ess)
EHFND_EXPP (Export Profile) ACTVT 01 (Create, Generate) Activity
EHFND_EXPP Configured Export Profile
EHFND_REGL (Regulatory ACTVT 01 (Create or generate) Activity
List Content)
02 (Change)
03 (Display)
06 (Delete)
13.5.1.3.1.3.2 Authorization Objects for Managing Product
Compliance
Table 171:
Authorization Object Field Value Description
EHPRC_CMWL (Compliance ACTVT 01 (Create or generate) Activity
Management Worklist
02 (Change)
(CMWL))
03 (Display)
06 (Delete)
Security Guide for SAP S/4HANA 1709
308 P U B L I C SAP S/4HANA Business ApplicationsWL_CAT REG_CHG (Follow-Up Regula Worklist Category
tory Change)
EHPRC_CPM (RCS: Cam ACTVT 01 (Create or generate) Activity
paign Usage)
02 (Change)
03 (Display)
EHPRC_OLM1 (RCS: Object ACTVT 01 (Create or generate) Activity
List Usage)
02 (Change)
03 (Display)
EHPRC_OLGR See the Customizing activity Object List Group
Specify Object List Groups un
der Product Safety and
Stewardship Product
Compliance for Discrete
Industries General
Configuration
EHPRC_CDO: RCS: Authori ACTVT 01 Create or generate Activity
zation Object for Compliance
02 Change
Object
03 Display
06 Delete
REQ Compliance Requirement
(Check)
REV_STATUS Compliance Data Revision
Status
CDCATEGORY Compliance Data Category
S_PB_CHIP ACTVT 03 (Display) Activity
(ABAP Page Builder: CHIP) 16 (Execute) Needed for displaying infor
mation on the side panel
CHIP_NAME X-SAP-WDY-CHIP:/BCV/ Web Dynpro ABAP: CHIP ID
CHIP*
X-SAP-WDY-
CHIP:EHPRC_CW_BCV_CHIP
1
EHPRCWDCHIP_SPBN
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 309S_PB_PAGE ACTVT 03 (Display) Activity
(ABAP Page Builder: Page Needed for displaying infor
Configuration) mation on the side panel
CONFIG_ID /BCV/SIDEPANEL Configuration Identification
PERS_SCOPE 1 (User)) Web Dynpro: Personalization
BCV_SPANEL (Execute Side ACTVT 16 (Execute) Activity
Panel)
Needed for displaying infor
mation on the side panel
BCV_CTXKEY EHPRC_COMPL_DATA Context Key
BCV_USAGE (Business Con ACTVT US (Use) Activity
text Viewer usage)
Needed for displaying infor
mation on the side panel
BCV_QRYVW (Query View) ACTVT 03 (Display) Activity
Needed for displaying infor
mation on the side panel
BCV_CTXKEY EHPRC_COMPL_DATA Context Key
BCV_QRYVID ID of Query View
BCV_QUERY ACTVT 03 (Display) Activity
(Query) Needed for displaying infor
mation on the side panel
BCV_CTXKEY EHPRC_COMPL_DATA Context Key
BCV_QRY_ID Query ID
BCV_QUILST (Overview) ACTVT 03 (Display) Activity
Needed for displaying infor
mation on the side panel
BCV_CTXKEY EHPRC_COMPL_DATA Context Key
BCV_QUIKID ID of Overview
13.5.1.3.2 Network and Communication Security
Your network infrastructure is important for protecting your system. Therefore, your network must support the
communication necessary for your business needs without allowing unauthorized access. A well-defined network
topology can eliminate many security threats based on software flaws (at both the operating system level and
Security Guide for SAP S/4HANA 1709
310 P U B L I C SAP S/4HANA Business Applicationsapplication level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, then there is no way for intruders to compromise the machines
and gain access to the backend system’s database or files. Additionally, if users are not able to connect to the
server LAN (local area network), they cannot exploit known bugs and security holes in network services on the
server machines.
The network topology for Product Safety and Stewardship is based on the topology used by the SAP NetWeaver
platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security
Guide also apply here. Details that specifically apply to Product Safety and Stewardship are described in the
following sections:
● Communication Channel Security [page 317]
This topic describes the communication paths and protocols.
● Network Security [page 318]
This topic describes the recommended network topology. It shows the appropriate network segments for the
various client and server components and where to use firewalls for access protection. It also includes a list of
the ports required.
● Communication Destinations [page 319]
This topic describes the information needed for the various communication paths, for example, which users
are used for which communications.
For more information, see the following sections in the SAP NetWeaver Security Guide:
● Network and Communication Security
● Security Guides for Connectivity and Interoperability Technologies
13.5.1.3.2.1 Communication Destinations
The table below shows an overview of the communication destinations used by Product Compliance for Discrete
Industries. For more generic information, see in corresponding chapter in the Introduction section.
Table 172:
Destination Delivered Type Description
No RFC Connection to plant maintenance system
No RFC Connection to business partner system
No RFC Connection to accounting system
No RFC Connection to SAP Product Safety and Stewardship as
part of SAP ERP system
Note
The user in the remote AC system needs to have all authorizations as proposed by the respective EHS user
roles.
For SAP EHS Management as part of SAP ERP, Product Compliance for Discrete Industries does not provide
any authorizations.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 311For detailed information about communication destinations, see Customizing for Environment, Health, and Safety
under Foundation for EHS Integration Specify Destinations for Integration .
13.5.1.3.3 ICF Security in Product Safety and Stewardship
To use an app in Product Safety and Stewardship, you have to activate the internet communication framework
(ICF) service that is needed for this app.
For general information, see ICF Security [page 19] in the Introduction section.
Product Compliance for Discrete Industries
To use Product Compliance for Discrete Industries apps, proceed as follows:
● In your back-end system, open transaction SICF. Under /default_host/sap/bc/webdynpro/sap/,
activate the following Web Dynpro services:
○ that start with EHFND
○ that start with EHPRC
○ POWL
○ IBO_WDA_INBOX
○ WDR_CHIP_PAGE
13.5.1.3.4 Data Storage Security
Using Logical Path and File Names to Protect Access
In Product Compliance for Discrete Industries, several applications save data in files in the file system. The
International Material Data System (IMDS) uses the file system to store downloaded files temporarily, before they
are imported. Additionally, it is possible for users to upload files to the application server manually prior to further
processing. Therefore, it is important to explicitly provide access to the corresponding files in the file system
without allowing access to other directories or files (also known as directory traversal). This is achieved by
specifying logical paths and file names in the system that map to the physical paths and file names. This mapping
is validated at runtime, and, if access is requested to a directory that does not match a stored mapping, an error
occurs.
Security Guide for SAP S/4HANA 1709
312 P U B L I C SAP S/4HANA Business ApplicationsThe following lists show the logical file names and paths used by Product Compliance for Discrete Industries and
for which programs these file names and paths apply:
Logical File Names Used
The following logical file names have been created in order to enable the validation of physical file names:
● EHPRC_IMPORT_DIR
● EHPRC_ERROR_DIR
● EHPRC_ARCHIVE_DIR
For more information, see the Customizing activity Set Up Directory Structure for IMDS.
Logical Path Names Used
The logical file names listed above all use the logical file path EHPRC_HOME_PATH.
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information about data storage security, see the respective chapter in the SAP NetWeaver Security
Guide.
13.5.1.3.5 Virus Scanning
The interactive forms of Product Compliance for Discrete Industries can contain JavaScript. Therefore, JavaScript
must be enabled in Adobe Acrobat Reader. In addition, e-mails with PDF attachments that contain JavaScript
must not be filtered out in the e-mail inbound and outbound process.
For more generic information see Virus Scanning [page 21] in the Introduction section.
13.5.1.4 Product Safety and Stewardship for Process
Industries
This section contains information that is valid for:
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 313● Basic Data and Tools
● Product Safety
● Global Label Management
● Dangerous Goods Management
13.5.1.4.1 Technical System Landscape
Product Safety
Expert is a registering Remote Function Call (RFC) server that reads and writes specification data through RFC
from the SAP system.
Windows Wordprocessor Integration (WWI) is a registering RFC server that generates and prints reports.
Report shipping can be determined centrally in the product safety system, or product safety document data can
be distributed by ALE/IDOC to logistics systems. These logistics systems use their own WWI generation servers
(WWI servers) to print documents.
Dangerous Goods Management
If you use separate logistics systems, dangerous goods data can be transferred to logistics systems by ALE/
IDOC.
Global Label Management
The technical system landscape for Global Label Management consists of the following elements:
● WWI is a registering RFC server. It can contain its own database that is used as a document cache and data
cache.
● Option 1: Label printing is possible with a printer that is connected to a local PC. WWI servers are hosted on a
central WWI server farm. Printing is executed by the SAP spool system or a printer that is connected to a local
PC.
● Option 2: Label printing is executed through print requests. WWI servers are decentralized. Therefore, the
data of the print requests is sent directly to the printer, or the print requests are printed through the SAP
spool system.
● Option 3: Label printing is possible via an extraordinary, distributed approach for product safety. In this case,
plants host their own SAP systems. Document data is maintained centrally and distributed by ALE. Printing is
determined directly or through the SAP spool system.
Security Guide for SAP S/4HANA 1709
314 P U B L I C SAP S/4HANA Business Applications13.5.1.4.2 User Administration and Authentication
Product Safety and Stewardship for Process Industries uses the administration and authentication mechanisms
provided with the SAPNet Weaver platform.
For more generic information see User Administration and Authentication [page 13] in the Introduction section.
13.5.1.4.2.1 Authorizations
Product Safety and Stewardship for Process Industries uses the authorization concept that is provided by SAP
NetWeaver and Microsoft Windows. Therefore, the recommendations and guidelines for authorizations as
described in the SAP NetWeaver Security Guide and the Microsoft Windows Security Guide also apply.
The following objects for authorization objects are used:
● Profiles
● Authorization objects
Profiles
The table below lists the profiles used. You can display all profiles in the profile list (transaction SU02).
Table 173:
Profile Description
B_MASSMAIN Mass maintenance tool
C_A.AV Composite profile for person in charge of work scheduling
C_A.KONSTRUK Composite profile for person in charge of engineering/design
C_AENR_* List of profiles for change management
C_ALL PP: All authorizations for master data/classif. system
C_EHSG List of profiles for Global Label Management
C_EHSH_* Lists of profiles for Product Safety and Stewardship
C_FHMI_* List of profiles for production resources/tools
C_MSTL_* List of profiles for material BOMs
C_PS_* List of profiles for Project Systems
C_ROUT_* List of profiles for task lists
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 315C_SHE_* List of profile for list of profiles for Product Safety and Stew
ardship
E_CS_* List of profiles for EC-CS
I_PM_* List of profiles for Plant Maintenance
M_* List of profiles for Materials Management
Authorization Objects
Table 174:
Object Class Description
CLAS Classification
CV Document Management
EHS Product Safety and Stewardship
LO Logistics - General
Exclusively the authorization objects for the variant configura
tion (character string C_LOVC_*).
MM_G Materials Management – Master Data
MM_S Materials Management – External Services
PM Plant Maintenance
PP Production Planning
Authorization objects for the applications:
● Change management (character string C_AENR_*)
● Task lists (character string C_ROUT*)
● BOMs (character string C_STUE_*)
PS Project System
Note
In WWI and Expert Server Administration (transaction CGSADM) you can create, delete, start, cancel, and
configure the WWI generation servers (WWI servers) and the Expert servers. For Expert, you can upload and
register Expert rules that are used to alter specification data.
SAP recommends that you grant authorization to transactions CG3Z and CG3Y restrictively since they may
allow uploading and downloading any files to or from the application server.
Security Guide for SAP S/4HANA 1709
316 P U B L I C SAP S/4HANA Business Applications13.5.1.4.3 Network and Communication Security
Your network infrastructure is important for protecting your system. Therefore, your network must support the
communication necessary for your business needs without allowing unauthorized access. A well-defined network
topology can eliminate many security threats based on software flaws (at both the operating system level and
application level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, then there is no way for intruders to compromise the machines
and gain access to the backend system’s database or files. Additionally, if users are not able to connect to the
server LAN (local area network), they cannot exploit known bugs and security holes in network services on the
server machines.
The network topology for Product Safety and Stewardship is based on the topology used by the SAP NetWeaver
platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security
Guide also apply here. Details that specifically apply to Product Safety and Stewardship are described in the
following sections:
● Communication Channel Security [page 317]
This topic describes the communication paths and protocols.
● Network Security [page 318]
This topic describes the recommended network topology. It shows the appropriate network segments for the
various client and server components and where to use firewalls for access protection. It also includes a list of
the ports required.
● Communication Destinations [page 319]
This topic describes the information needed for the various communication paths, for example, which users
are used for which communications.
For more information, see the following sections in the SAP NetWeaver Security Guide:
● Network and Communication Security
● Security Guides for Connectivity and Interoperability Technologies
13.5.1.4.3.1 Communication Channel Security
The following table lists the communication paths used by Product Safety and Stewardship for Process Industries,
the protocol used for the connection, and the type of data transferred.
Table 175:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
SAP PS&S for Process Indus RFC Business Partner -
tries Application Server to
SAP BP Application Server
SAP PS&S for Process Indus RFC Plant Maintenance -
tries Application Server to
SAP PM Application Server
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 317SAP Logistics Application RFC Logistics data for Report -
Server to SAP PS&S for Proc Shipping
ess Industries Application
Logistics data for Substance
Server
Volume Tracking
SAP PS&S for Process Indus ALE /IDOC Application data -
tries Application Server to
Dangerous Goods data and
SAP Logistics Application
Reports can be transferred to
Server
logistics systems
SAP Application Server to Ex RFC Application data Substance data may contain
pert Server corporate secrets such as
recipes.
SAP Application Server to RFC Application data, documents Usually MSDS or label data is
WWI generation server (WWI transferred. Depending on the
server) process, incident reports that
contain personal data or cor
porate secrets may also be
transferred.
SAP PS&S for Process Indus RFC Application data: -
tries Application Server to
For Global Label Manage
SAP Logistics Application
ment, material data is trans
Server
ferred from logistics system
to the Product Safety system
Only for Global Label Manage TCP/IP Label data Usually no sensitive data, de
ment systems with many pending on the usage of the
DB-specific protocol
WWI servers: label.
WWI server to SQL database
server
Note
Protect RFC connections with Secure Network Communications (SNC).
Use secure protocols (SSL, SNC) whenever possible.
13.5.1.4.3.2 Network Security
Ports
WWI generation servers (WWI servers) and Expert servers use Remote Function Call (RFC).
Security Guide for SAP S/4HANA 1709
318 P U B L I C SAP S/4HANA Business ApplicationsFor more information, see the document TCP/IP Ports Used by SAP Applications, which is located on the SAP
Service Marketplace at http://service.sap.com/ under Products Database & technology Security
Infrastructure Security .
13.5.1.4.3.3 Communication Destinations
The table below lists the communication destinations that are used by Product Safety and Stewardship for
Process Industries.
For a description of the purpose of the RFC destinations, see the Customizing activities mentioned for Product
Safety and Stewardship for Process Industries.
Table 176:
Destination Delivered Type User, Authorizations Description
Basic Data and No RFC RFC destination for
Business Partner
Tools Basic
Settings Specify
Environment
Parameters
Environment parame
ter DEST_BU
Basic Data and No RFC RFC destination for HR
Tools Basic
Settings Specify
Environment
Parameters
Environment parame
ter DEST_HR
Basic Data and No RFC RFC destination for
Plant Maintenance
Tools Basic
Settings Specify
Environment
Parameters
Environment parame
ter DEST_PM
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 319Basic Data and No RFC RFC destination of
Report Shipping
Tools Basic
Settings Specify
Environment
Parameters
Environment parame
ter DEST_SRE_DS
Basic Data and No RFC RFC destination for
Substance Volume
Tools Basic
Tracking
Settings Specify
Environment
Parameters
Environment parame
ter SVT_EHS_RFCDEST
Basic Data and No RFC Calling user Synchronous genera
tion of reports
Tools Basic
Settings Specify
Environment
Parameters
Environment parame
ter
WWI_GENSERVER_SYN
_DEST
Basic Data and No RFC Configured Background Background generation
Job user See Customiz of reports
Tools Report
ing activity Start WWI
Definition Window Dispatcher in
Wordprocessor Background
Integration (WWI)
Configuration of
Generation PCs
Configuration of
Generation Servers
Manual Configuration
of Generation Servers
Specify Generation
Servers
Maintain the destina
tion
Security Guide for SAP S/4HANA 1709
320 P U B L I C SAP S/4HANA Business ApplicationsGlobal Label No RFC Calling User Print and preview ta
bles in Global Label
Management
Management
Prerequisites for Global
Label Management
Define WWI Settings
Configure WWI
Server for Print
Request Generation
Global Label No RFC Calling User or Config Process print requests
ured background job in Global Label
Management
user Management
Prerequisites for Global
Label Management See Customizing activ
Define WWI Settings ity Background Jobs for
Processing Print
Configure WWI Requests
Server for Print
Request Generation
Basic Data and No RFC Calling User Determine secondary
data for specifications
Tools Basic
with Expert
Settings Manage
User Exits
Basic Data and No RFC Calling User Mass change of specifi
cation data with Easy
Tools Basic
Expert
Settings Specify
Environment
Parameters
Note
The WWI servers and the Expert servers are registering RFC servers.
For more information about setting up RFC destinations, see the Customizing for Product Safety and
Stewardshipunder Basic Data and Tools Tools Expert Set Up RFC Destination.
13.5.1.4.4 Application-Specific Virus Scan Profile (ABAP)
SAP provides an interface for virus scanners to prevent manipulated or malicious files from damaging the system.
To manage the interface and to find out which file types are checked or blocked, use the virus scan profiles. Some
applications rely on default profiles, while others rely on application-specific profiles.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 321To use a virus scanner with the SAP system, you must activate and set up the virus scan interface. During this
process, you also set up the default behavior. Here, SAP also provides the following default profiles:
Table 177:
Application Profile Allowed MIME Types Blocked MIME Types
Product Safety and Steward /CBUI/WWI_REPORT_GEN * -
ship for Process Industries
Global Label Management /CBGLMP_API/ * -
WWI_GET_CONTENT
When the application-specific virus scan profile is activated, this profile has the following impact:
● Documents generated by the WWI generation server (WWI server) are scanned for viruses
● Documents imported into Product Safety and Stewardship for Process Industries are scanned for viruses
13.5.1.4.5 Data Storage Security
For importing or exporting data between two SAP systems or an SAP system and an external system, Product
Safety and Stewardship for Process Industries uses transfer files.
After generating a transfer file either by exporting data or uploading a transfer file from a PC file system, the
transfer file is stored on the application server. If the export is started again or a new file is uploaded form a PC file
system, the transfer file that is stored on the application server will be overwritten.
Note
The transfer file of imported specification data is stored in file substance.dat on the application server. The
transfer file path is configured in logical path EHS_IMP_SUBSTANCES_PATH_2.
Using Logical Path and File Names to Protect Access
When importing or exporting data, Product Safety and Stewardship for Process Industries saves data in files in the
file system. Therefore, it is important to explicitly provide access to the corresponding files in the file system
without allowing access to other directories or files (also known as directory traversal). This is achieved by
specifying logical paths and file names in the system that map to the physical paths and file names. This mapping
is validated at runtime and if access is requested to a directory that does not match a stored mapping, then an
error occurs.
Security Guide for SAP S/4HANA 1709
322 P U B L I C SAP S/4HANA Business ApplicationsThe following lists show the logical file names and paths used when importing or exporting data, and for which
programs these file names and paths apply:
Logical File Names Used in Export and Import
The following logical file names have been created in order to enable the validation of physical file names:
Table 178:
Logical File Names Programs Using these Logical File Names
EHS_EXP_PHRASES_2 Export of Phrase Libraries
EHS_EXP_ PROPERTY_TREE_2 Export of Property Tree
EHS_EXP_SOURCES_2 Export of Sources
EHS_EXP_SUBSTANCES_2 Export of Specification Master Data
EHS_EXP_TEMPLATE_2 Export of Report Templates
EHS_IMP_PHRASES_2 Import of Phrase Libraries
EHS_IMP_ PROPERTY_TREE_2 Import of Property Tree
EHS_IMP_SOURCES_2 Import of Sources
EHS_IMP_SUBSTANCES_2 Import of Specification Master Data
EHS_IMP_TEMPLATE_2 Import of Report Templates
EHS_IMP_REPORT_2 Import of Reports
EHS_FTAPPL_2 Uploade File; Downloade File
Logical Path Names Used During Export and Import
These logical file names use the following logical file path:
Table 179:
Logical File Names Logical Path Names
EHS_EXP_PHRASES_2 EHS_EXP_PHRASES_PATH_2
EHS_EXP_PROPERTY_TREE_2 EHS_EXP_PROPERTY_TREE_PATH_2
EHS_EXP_SOURCES_2 EHS_EXP_SOURCES_PATH_2
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 323EHS_EXP_SUBSTANCES_2 EHS_EXP_SUBSTANCES_PATH_2
EHS_EXP_TEMPLATE_2 EHS_EXP_TEMPLATE_PATH_2
EHS_FTAPPL_2 EHS_FTAPPL_PATH_2
EHS_IMP_PHRASES_2 EHS_IMP_PHRASES_PATH_2
EHS_IMP_PROPERTY_TREE_2 EHS_IMP_PROPERTY_TREE_PATH_2
EHS_IMP_REPORT_2 EHS_IMP_REPORT_PATH_2
EHS_IMP_SOURCES_2 EHS_IMP_SOURCES_PATH_2
EHS_IMP_SUBSTANCES_2 EHS_IMP_SUBSTANCES_PATH_2
EHS_IMP_TEMPLATE_2 EHS_IMP_TEMPLATE_PATH_2
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log
(transaction SM19).
Relevant audit log numbers:
● DUA – EHS-SADM: Service &A on client &B created
● DUB – EHS-SADM: Service &A on client &B started
● DUC – EHS-SADM: Service &A on client &B stopped
● DUD – EHS-SADM: Service &A on client &B stopped
● DUE – EHS-SADM: Configuration of service &A on client &B was changed
● DUF – EHS-SADM: File &A from client &B transferred
● DUG – EHS-SADM: File &A transferred to client &B
13.5.1.4.5.1 Data Storage on WWI Servers and Expert Servers
Windows Wordprocessor Integration (WWI) and Expert read data from the SAP system using Remote Function
Call (RFC), process data, and store the results in the database of the SAP system. That is, the WWI generation
server (WWI server) and the Expert server save configuration data and cached data locally.
Note
Make sure that only as few users as possible can access the Windows servers that run the WWI server and the
Expert server.
Security Guide for SAP S/4HANA 1709
324 P U B L I C SAP S/4HANA Business ApplicationsTo apply access permissions in Windows, execute the following steps for the following folders.
For more information on access control and on security auditing, see the Windows Help.
To configure access control for a local file or folder, proceed as follows:
1. Start the Windows Explorer.
2. In the context menu of the file or the folder that you want to audit, choose Properties, and go to the Security
tab page.
3. Choose Edit.
4. Add or remove the user names and set the permissions for each user.
Note
To improve data storage security, you can apply Windows file system encryption to the folders that hold
sensitive data.
Expert Cache
If you use the specification data cache of Expert, it stores copies of the specification data locally in the Expert
server file system. The root folder of the cache is determined in the registry at HKEY_LOCAL_MACHINE\SOFTWARE
\Wow6432Node\TechniData\EHS-AddOns\CacheRoot.
To protect data, make sure that you set appropriate access permissions on the configured root folder of the
cache. Grant read or write access only to LocalSystem, to administrators and to selected users.
Expert Rules
Apply access permissions to the Expert rules directory. Expert rules are programs that are executed by Expert
altering specification data. Make sure that the rules are not altered by unauthorized users.
The rules are usually stored in the Rules folder of the Expert installation, but each rule can be configured
separately in the Windows Registry. For more information on the paths to the rules files, see
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TechniData\EHS-AddOns\Instances.
Set appropriate access permissions on the Expert rules folder. Grant access only to LocalSystem,to
administrators and to selected users.
WWI Root Directory
WWI temporarily stores data in the Windows file system to process data in the WWI root directory.
If an error occurs, the temporary files might remain in the root directories. We recommend cleaning up the folder
regularly.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 325The path that indicates the WWI root directory depends on the process. For more information about the path,
check the Customizing settings for Product Safety and Stewardship for Process Industries.
● For synchronous generation, check the environment parameter WWI_GENSERVER_SYN_ANCHOR under
Basic Data and Tools Basic Settings Specify Environment Parameters
● For background generation, check the WWI root under Basic Data and Tools Report Definition
Windows Wordprocessor Integration (WWI) Configuration of Generation PCs Configuration of Generation
Servers Manual Configuration of Generation Servers Specify Generation Servers
● For Global Label Management, check the temporary directory for synchronous WWI server under Global
Label Management Set Basic Data and Tools for Global Label Management Make Settings for Basic
Data
● For print request processing in Global Label Management, check HKEY_CLASSES_ROOT\WWIDOCUMENT
\AnchorRoot in the Windows registry.
Grant access on the WWI root folders only to LocalSystem,to administrators and to selected users.
WWI Print Request Cache for Global Label Management
WWI caches templates and generated labels in the Windows file system.
The path that indicates the Windows file system is configured in the WWI.INI file under [DMS]. Set the
appropriate access permissions on the WWI root directories. Grant read or write access only to the WWI user, to
the LocalSystem, to administrators and to selected users.
The database file or database connection is configured under dbConnection in the WWI.INI file: Set appropriate
access permissions on the database file or in the configured database management system. Grant access only to
the WWI user, to LocalSystem,to administrators and to selected users.
13.5.1.4.6 Dispensable Functions with Impacts on Security
You can compile and display system information for Windows Wordprocessor Integration (WWI) as follows:
● You can display system information in the WWI Monitor (transaction CG5Z): In the menu, choose Utilities
Test Server
● In WWI.INI, under [Global], enter as DisableWwiServerInfo the value 1. This prevents external access to the
WWI system information (through the WWI Server Monitor, for example). The default value is 0.
Security Guide for SAP S/4HANA 1709
326 P U B L I C SAP S/4HANA Business Applications13.5.1.4.7 Security for Additional Applications
Windows Authorization for Windows Wordprocessor Integration
Windows Wordprocessor Integration (WWI) requires a Windows user account that is used to run the WWI
generation server services. This is because many printer settings and settings for Microsoft Word are user-
specific.
As an abbreviation, the user account is called WWI user.
● Create a new Windows user. This user is used to execute the WWI generation server (WWI server). The user
can be a local user or a domain user. We recommend creating a local user, for example, WWI-USER. Assign
this user to the Main users group or the Users group. Use a password that does not expire.
● In Microsoft Windows Vista, in Microsoft Windows Server 2008 and higher releases, assign the WWI user to
the administrators group.
● If the user is a domain user, ensure that the profile of the user is local.
● Check the security settings for the user that is used to execute the WWI server:
○ The user must have the Log on as a service authorization. In Microsoft Windows XP, Microsoft Windows
Server 2003 and higher releases, also set this authorization for users of the administrators group. You
can find this authorization in the Control Panel under Administrative Tools Local Security Policy .
Navigate to Local Policies User Rights Assignment . Here, you assign the user privileges to the
guideline Log on as a service.
○ Check the DCOM start authorization and access authorization for Microsoft Word using the
DCOMCNFG.EXE configuration program. For more information, see the SAP Note 580607 .
○ Ensure that the user has write (change) authorization for the WWI root directory. We recommend using a
local directory. The WWI work directory is configured in the Specify Generation Servers Customizing
activity.
○ Make sure that the Microsoft Windows TEMP directory exists. The TEMP directory is configured in
Microsoft Windows under Control Panel System Advanced Environment Variables . There,
check the user variables and system variables TMP and TEMP.
○ Ensure that the user has write (change) authorization for the Microsoft Windows TEMP directory.
For further information, see SAP Note 580586 .
Windows Authorization for Expert
The Expert server service is run as a local system account.
Windows Authorization for Administration Management Server
The Administration Management Server service is run as a local system account.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 32713.5.1.4.8 Security-Relevant Logging and Tracing
Windows Wordprocessor Integration (WWI) and Expert log all processing information in the Windows Application
Event Log. A separate Security Log for WWI and Expert does not exist. For security relevant information from
Windows, check the Windows Security Event Log.
For more information on maintaining a secure environment in Windows servers, check the Microsoft Windows
Security Guide and the Microsoft Security Compliance Manager.
Tracking Configuration Changes
To track configuration changes of WWI and Expert Server Administration that are executed by WWI and Expert
Server Administration (transaction CGSADM), enable the security audit log in the Security Audit (transaction SM19).
Relevant audit log numbers:
● DUA – EHS-SADM: Service &A on client &B created
● DUB – EHS-SADM: Service &A on client &B started
● DUC – EHS-SADM: Service &A on client &B stopped
● DUD – EHS-SADM: Service &A on client &B stopped
● DUE – EHS-SADM: Configuration of service &A on client &B was changed
● DUF – EHS-SADM: File &A from client &B transferred
● DUG – EHS-SADM: File &A transferred to client &B
For more information on configuration changes, change documents are used. Creating change documents in WWI
and Expert Server Administration is enabled by default. To switch off the creation of change documents, set the
environment parameter CGSADM_NO_CHANGE_DOCS in the Specify Environment Parameters Customizing activity
to X.
To display change documents, start the program RSSCD110 (Display change documents (cross-client)) and
choose object class ESSADM.
Tracking Configuration with Windows Features
To track WWI and Expert configuration changes, enable auditing in the Windows file system. For more information
on Access Control and Security Auditing, see the Windows Help.
Before setting up auditing for files and folders, enable object access auditing by defining auditing policy settings
for the object access event category.
To define or modify auditing policy settings for an event category for your local computer, proceed as follows:
1. Choose Control Panel Administrative Tools Local Security Policy.
2. In the console tree, go to Local Policies Audit Policy.
3. 3.In the results pane, choose Audit object access to enable the auditing policy settings.
Security Guide for SAP S/4HANA 1709
328 P U B L I C SAP S/4HANA Business ApplicationsTo configure auditing settings for a local file or folder, proceed as follows:
1. Open Windows Explorer.
2. In the context menu of the file or folder that you want to audit, choose Properties and go to the Security tab
page.
3. Choose Edit, and then choose Advanced.
4. In the Advanced Security Settings go to the Auditing tab page.
To configure auditing settings for a registry key:
1. Open Registry Editor.
2. Go to the registry key.
3. In the context menu of the registry key that you want to audit, choose Permissions.
4. On the Security tab page, choose Advanced.
5. In the Advanced Security Settings, choose the Auditing tab page.
Windows Wordprocessor Integration (WWI)
For WWI, the following files and folders must be covered by change auditing:
● WWI.INI
● SAPRFC.INI
● GRAPHICS
● Registry key: HKEY_CLASSES_ROOT\WWIDOCUMENT
Expert
For Expert, the following files and folders must be covered by change auditing:
● SAPRFC.INI
● RULES
● Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TechniData\EHS-AddOns\Instances
For 32bit systems, omit Wow6432Node
● Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TechniData\EHS-AddOns\Systems
For 32bit systems, omit Wow6432Node
13.5.2 Enterprise Portfolio and Project Management
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 32913.5.2.1 Project System
13.5.2.1.1 Deletion of Personal Data
Use
The Project System might process data (personal data) that is subject to the data protection laws applicable in
specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion
of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at
http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 180:
Application Detailed Description Provided Deletion Functionality
Project System (PS) The archiving objects are used for ar Archiving Objects:
chiving and deleting operative objects ● PS_PROJECT
and standard networks in the Project
● PS_PLAN
System
Relevant Application Objects and Available EoP/WUC functionality
Table 181:
Application Implemented Solution (EoP or WUC) Further Information
Project System (PS) EoP An end of purpose check determines
whether data is still relevant for business
activities based on the retention period
defined for the data. This check is deter
mined based on the date on which the
network activity is set to the closed sta
tus. For more information, refer to sec
tions Process Flow and Configuration:
Simplified Blocking and Deletion.
Security Guide for SAP S/4HANA 1709
330 P U B L I C SAP S/4HANA Business ApplicationsApplication Implemented Solution (EoP or WUC) Further Information
Project System (PS) WUC A where-used check is a simple check to
ensure data integrity in case of potential
blocking. The WUC in application Project
System checks whether any dependent
data exists for:
● A certain customer in RSADD,
VSRSADD_CN, COFP, COER,
QMSM, QMUR, QMEL, IHPA.
● A certain vendor in RSADD,
VSRSADD_CN, AFVC, VSAFVC_CN,
RESB, VS_RESB_CN, COFP, QMSM,
QMUR, QMEL, IHPA.
● A certain contact person in QMSM,
QMUR, IHPA.
● A certain cBP in AD01DLI,
PSACL_TAB.
Note
If dependent data exists, that is, if the
data is still required for business ac
tivities, the system does not block the
corresponding customer, vendor, or
cBP. If you still want to block data,
the dependent data must be deleted
by using the existing archiving and
deletion tools or by using any other
customer-specific solution.
Process Flow
1. Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM).
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available.
3. You do the following:
○ Run transaction IRMPOL and maintain the required residence and retention policies for the central
business partner (ILM object: CA_BUPA).
○ Run transaction BUPA_PRE_EOP to enable the end of purpose check function for the central business
partner.
○ Run transaction IRMPOL and maintain the required residence and retention policies for the customer
master and vendor master (ILM objects: FI_ACCPAYB, FI_ACCRECV, FI_ACCKNVK).
○ Run transaction CVP_PRE_EOP to enable the end of purpose check function for the customer master and
vendor master.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 3314. Business users can request unblocking of blocked data by using the transaction BUP_REQ_UNBLK.
5. If you have the needed authorizations, you can unblock data by running the transaction BUPA_PRE_EOP and
CVP_UNBLOCK_MD.
6. You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of PS.
For information about how to configure blocking and deletion for PS, see Configuration: Simplified Blocking and
Deletion.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in
Customizing for Cross-Application Components under Data Protection .
● Define the settings for authorization management under Data Protection Authorization Management .
For more information, see the Customizing documentation.
● Define the settings for blocking in Customizing for Cross-Application Components under Data
Protection Blocking and Unblocking of Data Business Partner .
● You configure the settings related to the blocking and deletion of customer and vendor master data in
Customizing for:
○ Logistics - General Business Partner Deletion of Customer and Supplier Master Data
13.5.2.2 Commercial Project Management
13.5.2.2.1 Authorizations
The following section provides an overview of the authorizations that apply to Commercial Project Management.
Based on your business needs, you can choose one of the following component combinations as a deployment
option:
Deployment Option Project Workspace Project Cost and Project Issue and SAP BusinessObjects
Revenue Planning Change Management Analysis for Microsoft
Office
Option 1 x x x x
Option 2 x x x
Option 3 x x x
Option 4 x x
The following standard roles and standard authorization objects can be used based on the option you have
deployed.
Standard Roles
Security Guide for SAP S/4HANA 1709
332 P U B L I C SAP S/4HANA Business ApplicationsCommercial Project Management
Role Description
SAP_BPR_CPD_USER_1 Provides Display authorizations for Commercial Project
Management.
Project Workspace
Role Description
SAP_SR_CPD_PWS_USER_1 Provides Display authorizations for Commercial Project
Management.
SAP_SR_CPD_PM_1 Allows the creation, change, and display of commercial
projects and financial plans and provides authorizations to
users working as project managers.
SAP_SR_CPD_PICM_PM_1 Provides Create, Change, and Display authorizations for
objects in Project Issue and Change Management.
SAP_BR_PRJTEAMMEMBER_COMMPRJ Allows team members to use the following Fiori app:
● Commercial Projects: Activities
SAP_BR_PROJECTMGR_COMMPRJ Allows project managers to use the following Fiori apps:
● Commercial Projects: Activities
● Commercial Projects: Multiproject Overview
● Commercial Projects: Single-Project Overview
● Commercial Projects: Billing and Receivables Overview
● Commercial Projects: Procurement Overview
Project Cost and Revenue Planning
Role Description
SAP_SR_CPD_PFP_USER_1 Provides Display authorizations for objects relevant to
Project Cost and Revenue Planning.
SAP_SR_CPD_PM_1 Allows the creation, change, and display of commercial
projects and financial plans. The role provides authorizations
to users working as project managers.
SAP_SR_CPD_PICM_PM_1 Provides Create, Change, and Display authorizations for
objects in Project Issue and Change Management.
Project Issue and Change Management
Role Description
SAP_SR_CPD_PICM_USER_1 Provides Display authorizations for objects in Project Issue
and Change Management.
SAP_SR_CPD_PICM_PM_1 Provides Create, Change, and Display authorizations for
objects in Project Issue and Change Management.
Standard Authorization Objects
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 333Project Workspace
Authorization Object Description
● /CPD/MP Authorization object to determine the kind of activity that a
user can perform on a commercial project (including the
specific areas of a commercial project).
● /CPD/ANLY Authorization object for Analytics.
● /CPD/MC Authorization object for checklist activities.
● /CPD/OAUTH Authorization object to override access control.
Project Cost and Revenue Planning
Authorization Object Description
● /CPD/FPH Authorization object for the financial plan.
● S_TCODE Authorization object that performs a transaction code check
at the start of a transaction.
● S_RS_AUTH BW and AO authorization objects for Project Cost and
● S_RS_COMP Revenue Planning.
● S_RS_COMP1
● S_RS_ALVL Note
● S_RS_PLSE To launch the Excel workbook from a financial plan, the
● S_RS_PC user''s role requires the authorization object S_RS_AO. The
● S_RS_PLSQ DISPLAY activity is required to launch and display the
workbook. Other activities such as CREATE, CHANGE, and
DELETE must only be assigned to users who are
authorized to create, change, or delete workbooks.
Project Issue and Change Management
Authorization Object Description
● PICM_STAT Authorization object to check if the user has the authority to
change lifecycle status of the activity.
● PICM_ISTAT Authorization object to check if the user has the authority to
change lifecycle status of the issue or change request.
● /IAM/OREF Authorization object for reference objects for issue, change
request, and activity.
● IAM_CAT_AC Authorization to restrict access to the worklist object of
Project Issue and Change Management.
● /IAM/AAUTH Authorization object for activity.
● /IAM/ATTMT Authorization object for attachments for issue and activity.
● /IAM/A_ATTR Authorization object for attribute maintenance for activity.
Security Guide for SAP S/4HANA 1709
334 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
● IAM_CODEGR Authorization object for code groups.
● /IAM/TXTTY Authorization object for descriptions.
● /IAM/IAUTH Authorization object for issue requests.
● IAM/A_STAT Authorization object for lifecycle status (activity).
● IAM/I_STAT Authorization object for lifecycle status (issue).
● IAM/A_RLCD Authorization object for role codes in activity.
● IAM/I_RLCD Authorization object for role codes in issue.
● /IAM/CODGR Authorization object for selection of code groups, codes.
13.5.2.2.2 Data Storage Security
In Commercial Project Management, the header data of the financial plan is stored in the database tables of
Project Cost and Revenue Planning.
● Data is saved in the database tables of Project Cost and Revenue Planning when the user explicitly chooses
the Save pushbutton on the financial planning screen.
● The planning data is stored in the BW InfoCube and can be transferred to the S4CORE database tables by the
user.
● Data is saved in the BW InfoCube when the user explicitly chooses the Save Data pushbutton in the Analysis
Office workbook.
● Data is saved in S4CORE database tables when the user explicitly chooses the Transfer Data pushbutton on
the financial planning screen.
13.5.2.2.3 Data Archiving
13.5.2.2.3.1 Archiving Commercial Projects
You can use Archiving Object for Commercial Projects (/CPD/PWS_M) to archive commercial projects that are no
longer needed. Archiving allows you to reduce the load on your database.
Structure
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 335Tables
Table 182: Tables for Commercial Projects
Table Description
/CPD/S_MP_HDR_K Commercial Project Header
/CPD/D_MP_HDR_S Commercial Project Header Short Text
/CPD/D_MP_ITEM Commercial Project Structure Elements
/CPD/D_MP_MEMBER Project Member
/CPD/D_MP_REP_AT Reporting Attribute Node
/CPD/D_MP_RESP Responsibility Node
/CPD/D_MP_STATUS Status Header
/CPD/D_MP_ST_ARV Table for Status Area Version
/CPD/D_MP_ST_HRA Status Header Area
/CPD/D_MP_ST_VHR Status Versions
/CPD/D_MP_TEAM Team
/CPD/D_MP_TEAM_M Team Member Subnode
/CPD/D_MP_TEAM_R Team Role Subnodes
Programs
The following programs are available for /CPD/PWS_M:
● Preprocessing: /CPD/PWS_ARCH_MP_PRE
This program makes the following checks for commercial projects:
If both these conditions are satisfied, the program sets the archiving status of the commercial project to
Archiving in Process (02).
● Write: /CPD/PWS_ARCH_MP_WRITE
This program checks if an object has the status Archiving in Process (02). If the status is 02, the program
archives the object to the archive file.
● Delete: /CPD/PWS_ARCH_MP_DELETE
This program verifies archived files against the data in the database, and deletes all objects in the database
that have been successfully archived.
Information Lifecycle Management (ILM)
Information Lifecycle Management (ILM) allows you to define rules for storing archived business data, set legal
holds on stored data, and destroy the data in adherence to legal requirements.
The ILM object CPD_PWS_M is available for commercial projects and this ILM object allows you to model retention
rules based on the following fields:
● Condition Fields
Security Guide for SAP S/4HANA 1709
336 P U B L I C SAP S/4HANA Business Applications○ Archiving Status
○ Commercial Project Type
○ Organization
● Time Reference Fields
○ End Date
You can use the transaction IRMPOL to define policies and rules for ILM.
Prerequisites
The prerequisites for Retention Management are:
● You have activated the business function ILM
● You have assigned the following objects to an audit area:
○ CPD_PWS_M
More Information
To change the residence time, you can make settings in Customizing for Cross-Application Components under
Processes and Tools for Enterprise Applications Reusable Objects and Functions for BOPF Environment
Archiving Adapter Maintain BO-Specific Residence Periods .
13.5.2.2.3.2 Archiving Financial Plans
You can use Archiving Object for Financial Plans (/CPD/PFP_P) to archive financial plans that are no longer
needed. Archiving allows you to reduce the load on your database.
Structure
Tables
Table 183: Tables for Financial Plans
Table Description
/CPD/D_PFP_PH Plan Header
/CPD/D_PFP_PV Plan Version
/CPD/D_PFP_PS Plan Structure
/CPD/D_PFP_PER Plan Exchange Rate
/CPD/D_PFP_PHTXT Plan Header Text
/BOBF/D_ATF_RT Attachment Root
/BOBF/D_ATF_DO Attachment Document
/BOBF/D_TXCROOT Text Collection Root
/BOBF/D_TXCTXT Text Collection Text
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 337Table Description
/BOBF/D_TXCCON Text Collection Text Content
Programs
The following programs are available for /CPD/PFP_P:
● Preprocessing: /CPD/PFP_ARCH_PH_PRE
This program checks whether a financial plan is ready for archiving. A financial plan is ready for archiving
when:
○ Related financial plan versions have a status that indicates completion.
○ All related change requests and change request alternatives are ready for archiving, with the status as
Archiving in Process (02). This is only applicable if you are also using Project Issue and Change
Management.
○ The financial plan has a status that indicates completion.
If the object is ready, this program sets the status as Archiving in Process (02) in the database.
Note
After the preprocessing program has run, the objects marked for archiving are no longer made available on
the UI. The program also deletes corresponding data from the real-time InfoCube (/CPD/PFP_R01) and
transfers the data into the InfoCube for archiving (/CPD/PFP_C01).
● Write: /CPD/PFP_ARCH_PH_WRITE
This program checks if an object has the status Archiving in Process (02). If the status is 02, the program
archives the object to the archive file.
● Delete: /CPD/PFP_ARCH_PH_DELETE
This program verifies archived files against the data in the database; and deletes all objects in the database
that have been successfully archived.
Information Lifecycle Management (ILM)
Information Lifecycle Management (ILM) allows you to define rules for storing archived business data, set legal
holds on stored data, and destroy the data in adherence to legal requirements.
The ILM object CPD_PFP_P is available for financial plans and this ILM object allows you to model retention rules
based on the following fields:
● Condition Fields
○ Plan Scenario ID
○ Plan Type ID
○ Archiving Status
● Time Reference Fields
○ End Date
You can use the transaction IRMPOL to define policies and rules for ILM.
Prerequisites
The prerequisites for Retention Management are:
● You have activated the business function ILM
Security Guide for SAP S/4HANA 1709
338 P U B L I C SAP S/4HANA Business Applications● You have assigned the following objects to an audit area:
○ CPD_PFP_P
More Information
To change the residence time, you can make settings in Customizing for Cross-Application Components under
Processes and Tools for Enterprise Applications Reusable Objects and Functions for BOPF Environment
Archiving Adapter Maintain BO-Specific Residence Periods .
13.5.2.2.3.3 Archiving Issues and Change Requests
You can use Archiving Object for Issues and Change Requests (/PICM/BO_I) to archive issues and change
requests that are no longer needed. Archiving allows you to reduce the load on your database.
Structure
Tables
Table 184: Tables for Issues and Change Requests
Table Description
/BOBF/D_ATF_DO Document node of attachment folder
/BOBF/D_ATF_RT Root nodes of attachment folder
/BOBF/D_TXCCON Text content
/BOBF/D_TXCROOT Root node of text collection
/BOBF/D_TXCTXT Text
/IAM/D_I_ATT Attachment
/IAM/D_I_DATE Date
/IAM/D_I_DESC Description node
/IAM/D_I_DESC_TX Language-dependent description text node
/IAM/D_I_OBJ_REF Issue reference node
/IAM/D_I_OREF_DT Language-dependent, reference, description text node
/IAM/D_I_PARTY Party node
/IAM/D_I_QTY Quantity
/IAM/D_I_ROOT Root node
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 339Programs
The following programs are available for /PICM/BO_I:
● Preprocessing: /PICM/ARCH_ISSUE_CR_ROOT_PRE
This program checks if an object is ready for archiving by verifying the following conditions:
○ The adherence to the specified residence time
○ The availability of activities for the object
If the object is ready, this program sets the status as Archiving in Process (02) in the database. After the
preprocessing program has run, the objects marked for archiving are no longer made available on the UI.
● Write: /PICM/ARCH_ISSUE_CR_ROOT_WRITE
This program checks if an object has the status Archiving in Process (02). If the status is 02, the program
archives the object to the archive file.
● Delete: /PICM/ARCH_ISSUE_CR_ROOT_DEL
This program verifies archived files against the data in the database; and deletes all objects in the database
that have been successfully archived..
More Information
To change the residence time, you can make settings in Customizing for Cross-Application Components under
Processes and Tools for Enterprise Applications Reusable Objects and Functions for BOPF Environment
Archiving Adapter Maintain BO-Specific Residence Periods .
13.5.2.2.3.4 Archiving Activities
You can use Archiving Object for Activities (/PICM/BO_A) to archive activities that are no longer needed. Archiving
allows you to reduce the load on your database.
Structure
Tables
Table 185: Tables for Activities
Table Description
/BOBF/D_ATF_DO Document node of attachment folder
/BOBF/D_ATF_RT Root nodes of attachment folder
/BOBF/D_TXCCON Text content
/BOBF/D_TXCROOT Root node of text collection
/BOBF/D_TXCTXT Text
/IAM/D_ACT_ATT Attachment
/IAM/D_ACT_DATE Date
/IAM/D_ACT_DESC Description node
Security Guide for SAP S/4HANA 1709
340 P U B L I C SAP S/4HANA Business ApplicationsTable Description
/IAM/D_ACT_DTXT Language-dependent description text node
/IAM/D_ACT_FOA Follow-up action
/IAM/D_ACT_FOA_P Follow-up action parameter
/IAM/D_ACT_OBJ_RF Object reference
/IAM/D_ACT_OREF_DT Language-dependent description texts
/IAM/D_ACT_PARTY Party
/IAM/D_ACT_QTY Activity quantity
Programs
The following programs are available for /PICM/BO_A:
● Preprocessing: /PICM/ARCH_ACTIVITY_ROOT_PPROC
This program checks if an object is ready for archiving by verifying the adherence to the specified residence
time. If the object is ready, this program sets the status as Archiving in Process (02) in the database. After the
preprocessing program has run, the objects marked for archiving are no longer made available on the UI.
● Write: /PICM/ARCH_ACTIVITY_ROOT_WRITE
This program checks if an object has the status Archiving in Process (02). If the status is 02, the program
archives the object to the archive file.
● Delete: /PICM/ARCH_ACTIVITY_ROOT_DEL
This program verifies archived files against the data in the database; and deletes all objects in the database
that have been successfully archived.
More Information
To change the residence time, you can make settings in Customizing for Cross-Application Components under
Processes and Tools for Enterprise Applications Reusable Objects and Functions for BOPF Environment
Archiving Adapter Maintain BO-Specific Residence Periods .
13.5.2.2.3.5 Archiving Checklists Headers and Items
You can use the archiving objects Checklist Headers (/CPD/MC_H) and Checklist Items (/CPD/MC_I) to archive
checklist headers and items that are no longer needed. Archiving allows you to reduce the load on your database.
Structure
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 341Tables
Table 186: Tables for Checklist Headers
Table Description
/BOBF/D_ATF_DO Document node of attachment folder
/BOBF/D_ATF_RT Root nodes of attachment folder
/BOBF/D_TXCCON Text content
/BOBF/D_TXCROOT Root node of text collection
/BOBF/D_TXCTXT Text
/IAM/D_I_ATT Attachment
/IAM/D_I_DATE Date
/IAM/D_I_DESC Description node
/IAM/D_I_DESC_TX Language-dependent description text node
/IAM/D_I_OBJ_REF Issue reference node
/IAM/D_I_OREF_DT Language-dependent, reference, description text node
/IAM/D_I_PARTY Party node
/IAM/D_I_QTY Quantity
/IAM/D_I_ROOT Root node
Table 187: Tables for Checklist Items
Table Description
/BOBF/D_ATF_DO Document node of attachment folder
/BOBF/D_ATF_RT Root nodes of attachment folder
/BOBF/D_TXCCON Text content
/BOBF/D_TXCROOT Root node of text collection
/BOBF/D_TXCTXT Text
/IAM/D_ACT_ATT Attachment
/IAM/D_ACT_DATE Date
/IAM/D_ACT_DESC Description node
/IAM/D_ACT_DTXT Language-dependent description text node
Security Guide for SAP S/4HANA 1709
342 P U B L I C SAP S/4HANA Business ApplicationsTable Description
/IAM/D_ACT_FOA Follow-up action
/IAM/D_ACT_FOA_P Follow-up action parameter
/IAM/D_ACT_OBJ_RF Object reference
/IAM/D_ACT_OREF_DT Language-dependent description texts
/IAM/D_ACT_PARTY Party
/IAM/D_ACT_QTY Activity quantity
Programs
The following programs are available for /CPD/MC_H:
● Preprocessing: /CPD/ARCH_MC_HEADER_PRE
This program checks if an object is ready for archiving by verifying the following conditions:
○ The adherence to the specified residence time
○ The availability of activities for the object
If the object is ready, this program sets the status as Archiving in Process (02) in the database. After the
preprocessing program has run, the objects marked for archiving are no longer made available on the UI.
● Write: /CPD/ARCH_MC_HEADER_WRITE
This program checks if an object has the status Archiving in Process (02). If the status is 02, the program
archives the object to the archive file.
● Delete: /CPD/ARCH_MC_HEADER_DELETE
This program verifies archived files against the data in the database; and deletes all objects in the database
that have been successfully archived..
The following programs are available for /CPD/MC_I:
● Preprocessing: /CPD/ARCH_MC_ITEM_PRE
This program checks if an object is ready for archiving by verifying the adherence to the specified residence
time. If the object is ready, this program sets the status as Archiving in Process (02) in the database. After the
preprocessing program has run, the objects marked for archiving are no longer made available on the UI.
● Write: /CPD/ARCH_MC_ITEM_WRITE
This program checks if an object has the status Archiving in Process (02). If the status is 02, the program
archives the object to the archive file.
● Delete: /CPD/ARCH_MC_IEM_DELETE
This program verifies archived files against the data in the database; and deletes all objects in the database
that have been successfully archived.
Information Lifecycle Management (ILM)
Information Lifecycle Management (ILM) allows you to define rules for storing archived business data, set legal
holds on stored data, and destroy the data in adherence to legal requirements.
The ILM objects CPD_MC_H and CPD_MC_I are available for checklist headers and items respectively, and these
ILM objects allow you to model retention rules based on the following fields:
● Condition Field
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 343○ APPLICATION
● Time Reference Fields
○ Last Changed On
Note
The date of the last change of the checklist headers and items is considered in the time reference field.
Note
When you create retention rules for a checklist item, ensure that the retention time specified does not exceed
the retention time specified for the parent (checklist header).
You can use the transaction IRMPOL to define policies and rules for ILM.
Prerequisites
The prerequisites for Retention Management are:
● You have activated the business function ILM
● You have assigned the following objects to an audit area:
○ o CPD_MC_H
○ o CPD_MC_I
More Information
To change the residence time, you can make settings in Customizing for Cross-Application Components under
Processes and Tools for Enterprise Applications Reusable Objects and Functions for BOPF Environment
Archiving Adapter Maintain BO-Specific Residence Periods .
13.5.2.2.4 Deletion of Personal Data
The Commercial Project Management applications might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data.
Project Workspace
Relevant Application Objects and Available Deletion Function
Application Detailed Description Deletion Function
Project Workspace Project Workspace stores personal The ILM-enabled deletion program for
information of business partners for the commercial projects: /CPD/
Team function. PWS_ARCH_MP_DELETE
Security Guide for SAP S/4HANA 1709
344 P U B L I C SAP S/4HANA Business ApplicationsRelevant Function Modules
Application Function Module Description
Project Workspace Risk /CPD/BUPA_EOP_CHECK You can use this API to check the
Management retention period of business partners.
Project Workspace Risk /CPD/RM_BUPA_EVENT_ARCH1 You can use this API to archive business
Management partners.
Project Workspace Risk /CPD/RM_BUPA_EVENT_DELE1 You can use this API to delete business
Management partners.
Project Workspace /CPD/PWS_WS_BUPA_EOP_CHECK You can use this function module for the
end of purpose check.
Relevant Programs
Application Program Description
Project Workspace /CPD/R_DPP_CONTACT_PERSON_S4H This program is relevant for contact
persons who have been added using the
Create Contact feature in the Define
Commercial Project Types view in
Customizing for Commercial Project
Management Master Data
Commercial Project Make Settings for
Commercial Projects .
When a contact person leaves a
company, to comply with data privacy
and protection rules, you can use this
program to identify all the projects that
this person is assigned to; and then
proceed to delete the contact from all
projects in one go.
Project Cost and Revenue Planning
The Project Cost and Revenue Planning application (CA-CPD-FP) does not use SAP ILM to support the deletion of
personal data since the data required for transactional purposes is stored in a BW InfoCube.
Relevant Application Objects and Available Deletion Function
Application Detailed Description Deletion Function
Project Cost and Revenue Planning Project Cost and Revenue Planning The deletion program /CPD/
stores personal information of business PFP_EMP_DATA_CONSISTENCY checks
partners only when resources are the HR master and delete information
planned together with SAP from the InfoCube, for employee
Multiresource Scheduling (MRS). This records that are not found in the HR
information is then stored in a BW master.
InfoCube, for real-time planning.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 345Project Issue and Change Management
Relevant Application Objects and Available Deletion Function
Application Detailed Description Deletion Function
Project Issue and Change Management Project Issue and Change Management ● The ILM-enabled deletion program
stores personal information of business for issues and change requests: /
partners for the Partner function. PICM/ARCH_ISSUE_CR_ROOT_DEL
● The ILM-enabled deletion program
for activities: /PICM/
ARCH_ACTIVITY_ROOT_DEL
● Function module to check (before
deletion) if business partner is used
in the application: /PICM/
BUPA_EVENT_DELE1
Relevant Function Modules
Application Function Module Description
Project Issue and Change Management /PICM/BUPA_EOP_CHECK You can use this function module for the
end of purpose check.
13.5.2.2.5 Security-Relevant Logging and Tracing
The Project Cost and Revenue Planning application of Commercial Project Management uses the tracing
functions of SAP BusinessObjects Analysis for Microsoft Office (AO) to trace actions performed in the planning
workbook (AO). You can also activate a trace file for Project Cost and Reveue Planning using the Activate Tracing
button on the Financial Planning ribbon. Details of the items are recorded in the trace file
(CACPDFP_TRACE_LOG.log). Note that the file does not record user-specific personal information such as user
name or IP address.
For information about tracing related to Analysis Office, see https://help.sap.com/viewer/p/
SAP_BUSINESSOBJECTS_ANALYSIS_OFFICE Installation, Configuration, Security and Administration
Administrator Guide .
13.5.2.2.6 Other Security-Relevant Information
Before you use the digitally-signed SAP BusinessObjects Analysis for Microsoft Office (AO) workbooks delivered
by Commercial Project Management, you must follow these steps:
Caution
These settings are valid if you want to use the workbooks in a secure way by only enabling digitally-signed
macros. However, if you use custom workbooks or make any changes and save it back to the standard, you
must enable all macros.
Security Guide for SAP S/4HANA 1709
346 P U B L I C SAP S/4HANA Business Applications1. Launch Microsoft Excel
1. Go to File Options Trust Center Settings Macro Settings
2. Choose Disable all macros except digitally signed macros
3. Mark the Trust access to the VBA project object model checkbox
2. Launch the digitally-signed workbook and implement the following steps to add the certificate as a trusted
publisher:
1. A security warning is show in File Info Enable Control
2. Seclect Advanced Options
3. In the next dialog box, select Trust all documents from this publisher
Note
Adding the certificate is a one-time activity
3. Follow these steps to change the default system in the workbook:
1. Go to File Commercial Project Settings
2. In the dialog box, choose Platform
3. Choose Replace System
4. Choose your relevant system in the Replace by System column
5. Save the workbook (with the correct standard workbook name) in the relevant system
13.5.2.3 SAP Portfolio and Project Management
13.5.2.3.1 Authorizations
Authorizations
In Project Management and Portfolio Management, authorizations are controlled in the following ways:
● ABAP authorization objects and roles
This is the standard method for controlling access to transactions and programs in an SAP ABAP system.
Authorizations are combined in an authorization profile that is associated with a role. User administrators can
then assign the corresponding roles via the user master record, so that the user can access the appropriate
transactions for his or her tasks.
● Access control lists
These allow you to add another level of security by controlling authorization at object level. For example, you
can control who has authorization to change a particular project definition.
You can define the menu options in the navigation area using portal content adjustments or PFCG role
Customizing.
● Roles for SAP Fiori apps
To use SAP Fiori Apps, users must be assigned to roles. These roles define which apps are displayed to the
user.
In Project Management only, you can use the following additional authorization mechanisms:
● System administrators can grant access to objects by choosing Portfolio and Project Administration
Project Authorization Administration in the application. This is an exception to the normal process and is
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 347only used if the administrator of the object is not available due to illness, for example. The system sends the
“new” and “old” administrators an e-mail to inform them of the new authorization holder. For more
information, see the Granting Administration Authorization for an Object section of the Configuration Guide for
SAP Portfolio and Project Management.
● System administrators can assign PFCG roles in Customizing for SAP Portfolio and Project Management
under Common Functions Define Superuser Authorizations . This ensures that the maintained PFCG
roles with the selected authorization will be automatically assigned to the corresponding project definition.
Authorizations regarding BAPIs, reports, and (RFC-enabled) function modules:
In SAP Portfolio and Project Management, multiple BAPIs, reports and (RFC-enabled) function modules are
available to create, read, change, edit, update, and delete the data of SAP Portfolio and Project Management.
Additionally, via (RFC-enabled) function modules and reports data is read from the SAP S/4HANA system.
Therefore, using these BAPIs, reports, and function modules access to and manipulation of Portfolio and Project
Management data as well as read access to SAP S/4HANA data is possible. Thus, the authorization for using
these BAPIs, reports, and function modules (via transactions, for example), should be restricted to users who are
intended to have these authorizations and the corresponding access to data.
Authorizations regarding search results
You can use the BAdI BADI_DPR_SEARCH to modify search results. You can filter the result set implementing this
BAdI depending on the specified search helps which exist for each Portfolio and Project Management object.
Thus, you can, for example, hide all results for which the user does not have read authorization from the result list.
In the standard, these results are displayed in the result list, but the user cannot open or display these objects.
Use
SAP Portfolio and Project Management uses the authorization concept provided by SAP NetWeaver for SAP S/
4HANA. Therefore, the recommendations and guidelines for authorizations as described in the Security Guide for
SAP NetWeaver for SAP S/4HANA also apply to SAP Portfolio and Project Management.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
You can maintain the following role authorizations in Project Management and Portfolio Management using the
SAP Profile Generator.
The following PFCG roles of SAP Portfolio and Project Management include authorizations to start the Web
Dynpro ABAP applications (authorization check S_START) for Project Management and Portfolio Management:
● SAP_CPR_USER
● SAP_XRPM_USER
For details see the particular roles in transaction PFCG and choose Authorizations Display Authorization Data
Cross-application Authorization Objects Start Authorization Check for TADIR Objects .
SAP recommends to adapt custom-specific roles accordingly.
Security Guide for SAP S/4HANA 1709
348 P U B L I C SAP S/4HANA Business ApplicationsProject Management Roles
The following single roles are delivered with Project Management:
Table 188:
Role Authorization
SAP_CPR_PROJECT_ADMINISTRATOR Create projects (project definitions).
SAP_CPR_TEMPLATE_ADMINISTRATOR Create, change, read, and delete all templates in Project Man
agement.
SAP_CPR_USER Use Project Management, but no authorization to perform any
activities in a particular project. To do this users need project-
specific authorizations, which can be distributed either di
rectly via ACLs or through their assignment to a role.
This role must be included in every Project Management com
posite role.
SAP_CPR_BCV_USER Project-Management-specific authorization for using BCV
content in resource management.
SAP_BPR_PPM SAP Portfolio and Project Management PFCG role for NW BC
The following composite roles are delivered with Project Management:
Table 189:
Role Authorization
SAP_CPR_DECISON_MAKER Decision maker in Project Management. Contains the role
SAP_CPR_USER.
SAP_CPR_INTERESTED Interested party in Project Management. Contains the role
SAP_CPR_USER.
SAP_CPR_MEMBER Team member in Project Management. Contains the role
SAP_CPR_USER.
SAP_CPR_PROJECT_LEAD Project manager in Project Management. Contains the role
SAP_CPR_PROJECT_ADMINISTRATOR and SAP_CPR_USER
SAP_CPR_BCV_USER_COMP Composite role containing the general role for using BCV
(SAP_BCV_USER) and the Project Management specific role
(SAP_CPR_BCV_USER).
SAP_CPR_TEMPLATE_RESPONSIBLE Project Management template responsible. Contains the roles
SAP_CPR_TEMPLATE_ADMINISTRATOR and SAP_CPR_USER
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 349Role Authorization
SAP_CPR_RESOURCE_MANAGER Resource manage in Project Management. Contains the role
SAP_CPR_USER.
You can use these SAP standard roles or create your own. For more information, see the Activating Single Roles
for Project Management section and the Creating Roles for the Project-Specific Authorization Checks section of the
Configuration Guide for SAP Portfolio and Project Management.
Portfolio Management Roles
For Portfolio Management, the following roles are available:
Table 190:
Roles Authorization
SAP_XRPM_ADMINISTRATOR Super user authorization in Portfolio Management. Used to
create new portfolios. This role also provides the assigned
user full access to all Portfolio Management business objects
in the system.
SAP_XRPM_USER General user in Portfolio Management. All users should be as
signed this role. Has general authorizations to use Portfolio
Management, but no specific object access. This access must
be assigned to the user via ACLs.
SAP_RPM_BCV_USER Portfolio Management specific authorization for BCV content
in Portfolio Management
SAP_RPM_BCV_USER_COMP Composite role containing the general role for using BCV
(SAP_BCV_USER) and the Portfolio Management specific role
(SAP_RPM_BCV_USER).
SAP_BPR_PPM PFCG role for NWBC in SAP Portfolio and Project Manage
ment
You can use these SAP standard roles or create your own. For more information about roles in Portfolio
Management, see the Activating Single Roles for Portfolio Management (PFCG) section and the Creating Roles for
the Portfolio-Specific Authorization Checks section of the Configuration Guide for SAP Portfolio and Project
Management.
Security Guide for SAP S/4HANA 1709
350 P U B L I C SAP S/4HANA Business ApplicationsSAP Fiori Roles
Table 191:
Roles Authorization
SAP_BR_PROJECTMANAGER Project Manager
SAP_BR_PROJECTTEAMMEMBER Project Team Member
SAP_BR_PORTFOLIOMANAGER Project Portfolio Manager
SAP_BR_PROJECT_OFFICE_SPEC Project Management Office Specialist
SAP_BR_PROGRAMMANAGER Program Manager
SAP_BR_PROJECT_RESOURCEMANAGER Project Resource Manager
SAP_BR_PROJECT_STEER_MEMBER Project Steering Committee Member
SAP Fiori roles need to be assigned on the front-end server on which the UIS4HOP1 software component is
installed. For more information and further implementation tasks on the front-end server, see the UI Technology
Guide for SAP S/4HANA.
13.5.2.3.2 Communication Channel Security
Table 192: SAP Portfolio and Project Management Communication Channel Security
Communication Channel Communication Technology Data Transferred Comment/Security Recom
mendation
SAP Portfolio and Project HTTP(S) Files, metadata, and user data
Management front-end (passwords, user names)
(browser) to the SAP NW Ap
plication Server (SAP Net
Weaver AS)
Project Management front- HTTP(S) Files
end (browser) to content or
cache servers
SAP NetWeaver AS to content HTTP(S) Metadata, files
or cache servers
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 351Communication Channel Communication Technology Data Transferred Comment/Security Recom
mendation
SAP NetWeaver AS to other RFC Metadata, files SAP Portfolio and Project
application servers (for exam Management communicates
ple, HR, CO) with 3rd party or SAP S/
4HANA systems to obtain or
create information on object
links between SAP Portfolio
and Project Management and
objects located in the 3rd
party/SAP system. The com
munication to 3rd party sys
tems has to be implemented
at the customer site. The 3rd
party/SAP system never calls
back.
For more information, see the
Setting Up Object Links sec
tion of the Configuration
Guide for SAP Portfolio and
Project Management.
SAP Portfolio and Project RFC Files, metadata
Management to Project Sys
tem (PS) component on a
separate system
SAP Portfolio and Project SAP ALE Files, metadata
Management to SAP HCM on
RFC
a separate system
Note
In SAP Portfolio and Project Management, there is no fixed port for communication and the firewall settings
described in the SAP NetWeaver Security Guide. For more information, see http://help.sap.com/s4hana
SAP S/4HANA SAP NetWeaver for SAP S/4HANA Security Guide Security Guides for SAP NetWeaver
Functional Units Security Guides for the Application Server Security Guides for the AS ABAP SAP
NetWeaver Application Server ABAP Security Guide Protecting Your Productive System (Change and
Transport System) .
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
Recommendation
We strongly recommend using secure protocols (SSL, SNC) whenever possible.
Security Guide for SAP S/4HANA 1709
352 P U B L I C SAP S/4HANA Business ApplicationsFor more information, see http://help.sap.com/s4hana SAP S/4HANA SAP NetWeaver for SAP S/4HANA
Security Guide Network and Communication Security Transport Layer Security .
13.5.2.3.3 Network Security
SAP supports the installation of SAP Portfolio and Project Management within the intranet (for internal
collaboration only).
Installation Scenarios
Scenarios A and B can be used for SAP Portfolio and Project Management:
● Scenario A: No content server
● Scenario B: One hidden content server
Installation scenario B, with one hidden content server, is the installation scenario with the highest level of
security.
Scenario A: No Content Server
In scenario A, the complete installation consists only of SAP Portfolio and Project Management server (SAP
NetWeaver AS).
The server is located in the intranet.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 353Figure 5: Scenario A: No Content Server
Scenario B: One Hidden Content Server
In the second type of installation, one content server is added to the network environment.
For SAP Portfolio and Project Management, the SAP NetWeaver AS and the content server are both located in the
intranet.
Security Guide for SAP S/4HANA 1709
354 P U B L I C SAP S/4HANA Business ApplicationsFigure 6: Scenario B: One Hidden Content Server
13.5.2.3.4 Communication Destinations
For the default SAP Portfolio and Project Management scenarios, no RFC destination pointing to external systems
is required. However, if you are using the Project Management application programming interfaces (APIs) via the
SOAP wrapper, the APIs consist of RFC function modules.
SAP Portfolio and Project Management
● FI/CO integration / Accounting Integration
● Adobe Document Services (ADS)
● Object links to e.g. SAP R/3, SAP ERP
● HR integration
In the following areas, Portfolio Management RFCs are called from an external application:
● Project integration
The Project Management APIs are required for:
● Portfolio Management Integration
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 355● If a user needs to use the APIs they must have the basic RFC authorization for the relevant API function
modules. The SOAP wrapper adheres to the authorization rules that apply if the RFC module is called directly.
The function group name for Project Management is CPR_API.
To view the application-specific and basis authorization objects used in SAP Portfolio and Project Management,
see Authorizations [page 347].
For more information about authorization objects and roles, see http://help.sap.com/s4hana SAP S/4HANA
SAP NetWeaver for SAP S/4HANA Security Guide User Administration and Authentication User
Management Identity Management User and Role Administration of Application Server ABAP AS ABAP
Authorization Concept .
13.5.2.3.5 Internet Communication Framework Security
You should only activate those services that are needed for the applications running in your system. For more
information about the services that are needed for SAP Portfolio and Project Management, see the Activating
Services section of the Configuration Guide for SAP Portfolio and Project Management.
Use the transaction SICF to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information, see http://help.sap.com/s4hana SAP S/4HANA SAP NetWeaver for SAP S/4HANA
Function-Oriented View Application Server Application Server Infrastructure Functions and Tools of SAP
NetWeaver Application Server Connectivity Components of SAP Communication Technology
Communication Between ABAP and Non-ABAP Technologies Internet Communication Framework
Development Server-Side Development Creating and Configuring ICF Services Activating and Deactivating
ICF Services.
For more information about ICF security, see http://help.sap.com/s4hana SAP S/4HANA SAP NetWeaver
for SAP S/4HANA Security Guide Security Guides for Connectivity and Interoperability Technologies
RFC/ICF Security Guide. .
13.5.2.3.6 Data Storage Security
Data Storage
Note
In the default setting for SAP Portfolio and Project Management, data is protected using the ACL concept
already described in Authorizations [page 347]. A Web browser is required for both scenarios. However, no
cookies are used to store data on the front end.
Security Guide for SAP S/4HANA 1709
356 P U B L I C SAP S/4HANA Business ApplicationsData Protection
In SAP Portfolio and Project Management, data is mainly stored on the SAP NetWeaver Application Server (SAP
NetWeaver AS) database. An exception to this is when files are checked out for editing. In this case, files are
stored locally on the user’s hard drive and it is their responsibility to protect the files according to company
security policy.
Depending on which installation scenario you have chosen for SAP Portfolio and Project Management, files might
also be stored on content servers. For information about security measures to be taken in this case, see the
Network Security chapter of this document.
For more information about data protection, see the Data Protection chapter of this document.
13.5.2.3.7 Deletion of Personal Data
Use
SAP Portfolio and Project Management might process data (personal data) that is subject to the data protection
laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the
blocking and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on
the SAP Help Portal at http://help.sap.com/s4hana Product Assistance Cross Components Data
Protection .
Relevant Application Objects and Available Deletion Functionality
Table 193:
Application Detailed Description Provided Deletion Functionality
Portfolio Management For more information, see the Product Archiving Objects:
Assistance documentation for SAP Port ● RPM_PORT (Portfolios)
folio and Project Management under
● RPM_BUCKET (Buckets)
Archiving Portfolio and Project
Management Data. ● RPM_ITEM (Items)
● RPM_COLL (Collections)
● RPM_INIT (Initiatives)
● RPM_REVW (Reviews)
Project Management Archiving Objects:
● CDOCS_CONT (Documents)
● CPROJECTS (Projects)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 357Application Detailed Description Provided Deletion Functionality
Portfolio and Project Management Once a business partner is destructed Deletion program PPM_DPP_DELETE
using the central Business Partner appli
cation, all references of this particular
business partner to objects in Portfolio
Management and Project Management
must be removed.
Run the corresponding deletion program
on a regular basis.
Relevant Application Objects and Available EoP/WUC functionality
Table 194:
Application Implemented solution (EoP or WUC) Further Information
Portfolio and Project Management EoP Checks whether business partner data is
still needed for Portfolio and Project
Management processes.
● If a business partner is still needed:
next check date = initial
● If a business partner is no longer
needed and the end of residence
date is in the future (> today): next
check date = end of residence
● If a business partner is no longer
needed and the end of residence is
reached (<= today): next check
date = initial; start of retention date
is calculated
Use Business Add-In
PPM_BUPA_EOP_CHECK to implement a
customer-specific logic.
Process Flow
1. Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM).
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available.
Security Guide for SAP S/4HANA 1709
358 P U B L I C SAP S/4HANA Business Applications3. You do the following:
○ Run transaction IRMPOL and maintain the required residence and retention policies for the central
business partner (ILM object: CA_BUPA).
○ Run transaction BUPA_PRE_EOP to enable the end of purpose check function for the central business
partner.
4. Business users can request unblocking of blocked data by using the transaction BUP_REQ_UNBLK.
5. If you have the needed authorizations, you can unblock data by running the transaction BUPA_PRE_EOP and
CVP_UNBLOCK_MD.
6. You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of Portfolio and Project
Management.
For information about how to configure blocking and deletion for SAP Portfolio and Project Management, see
Configuration: Simplified Blocking and Deletion.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management under Data Protection Authorization Management .
For more information, see the Customizing documentation.
● Define the settings for blocking in Customizing for Cross-Application Components under Data Protection
Blocking and Unblocking Business Partner .
13.5.2.3.8 Security for Additional Applications
You can only (import or) export data to Microsoft Project if you have the required authorizations, see Access
Control Lists – Import and Export. The protection of this downloaded data is not part of the Project Management
security model. When the user saves the project to his or her hard drive, the system does not perform an
authorization check if somebody else opens the project again in Microsoft Project.
13.5.2.3.9 Other Security-Relevant Information
Import from Microsoft Excel
You can import projects from a Microsoft Excel file to Project Management. This enables you to transfer mass
data in a quick and easy manner.
If you want to restrict the import function, you have to make sure that only allowed users receive authorization for
transaction DPR_DX_PROJECT and report DPR_DX_PROJECT.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 359Moreover, you can import financial and/or capacity data from a Microsoft Excel file to financial and capacity
planning in Portfolio Management. To use this function, you require an ERP system, an appropriate client, user,
and password. This import is only allowed if the required authorization has been granted.
13.5.2.3.10 Security-Relevant Logging and Tracing
Floorplan Manager Message Logging to the Application Log
The Web Dynpro ABAP UI of SAP Portfolio and Project Management uses the Floor Plan Manager (FPM). The FPM
Message Manager has a connection to the ABAP application log and offers the option to write error messages
occurring in the FPM Message Manager also to the application log in the backend. To activate this feature, go to
transaction SAAB and activate the check point group FPM_RUNTIME_MESSAGES for your user or for all users in the
server.
For more information about FPM, see http://www.sdn.sap.com/irj/sdn/nw-ui under Custom UI
Development Web Dynpro ABAP Floorplan Manager (FPM) Developer''s Guide .
For more information about security in the ABAP area, see
● http://help.sap.com/s4hana SAP S/4HANA SAP NetWeaver for SAP S/4HANA Security Guide
Security Guides for SAP NetWeaver Functional Units Security Guides for the AS ABAP SAP NetWeaver
Application Server ABAP Security Guide
● http://help.sap.com/s4hana SAP S/4HANA SAP NetWeaver for SAP S/4HANA Security Guide
Security Guides for SAP NetWeaver Functional Units Security Guides for the Application Server Security
Guides for the AS ABAP SAP NetWeaver Application Server ABAP Security Guide Web Dynpro ABAP
Security Guide
Reports Logging to the Application Log
SAP Portfolio and Project Management logs application errors for background reports to transaction SLG1.
Background reports are executed in the areas of financial integration, migration, import from Microsoft Excel,
versioning, and replace user and resource. You can display these application logs via the objects RPM_DOCUMENT,
RPM_DX, RPM_INTEGRATION, RPM_MIGRATION, RPM_PLANNING, RPM_UC, RPM_VERSIONING, DPR_DX,
DPR_REPLACE_USER_BP.
Logon Attempts
For more information about logon attempts, see http://help.sap.com/s4hana SAP S/4HANA SAP
NetWeaver for SAP S/4HANA Security Guide Security Aspects for Lifecycle Management Auditing and
Logging The Security Audit Log .
Security Guide for SAP S/4HANA 1709
360 P U B L I C SAP S/4HANA Business ApplicationsChange Document
You can use change document to track changes of objects of Project Management and Portfolio Management. If
the function is active, the system also records changes to dependent objects. You can activate the change
document function for the following objects:
● Project Management
○ Checklist templates
○ Project templates
○ Projects
You can activate this function in Customizing for Project Management under Basic Settings Activate
Change Documents.
If the function is active for one of these main objects, changes to dependent objects are also recorded. For
example, if you select the indicator for the object category project, the system records all changes to the
project as well as to the following objects:
○ Project definitions
○ Phases
○ Tasks
○ Mirrored tasks
○ Checklists
○ Checklist items
○ Documents
○ Object links
○ Entity links
○ Business partner favorites
○ Business partner links
○ Roles
○ Approvals
○ Qualifications
○ Collaborations
○ Templates
The system only records changes to database table DPR_DOCUMENT. This table contains unusable document
attributes only.
The important attributes of the documents and files (such as name, location, and size) as well as the file
content are saved to the KPro storage system without the support of a change document function.
Project Management supports versioning for files instead of the change document function. To track the
changes, the user must always create a new document version. However, if he or she always overwrites the
existing version, it is not possible to track the changes.
Project Management supports evaluations for the following objects:
○ Project definitions
○ Phases
○ Tasks
○ Mirrored tasks
○ Checklists
○ Checklist items
○ Object links
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 361○ Entity links
○ Business partner links
○ Roles
● Portfolio Management
○ Portfolio
○ Bucket
○ Initiative
○ Item
○ Decision point
○ Review
○ Collection
○ What-if scenario
○ Relational associations of business objects
○ Financial and capacity category for bucket and item
In the standard system, this function is not activated.
You can activate this function in Customizing for Portfolio Management under Global Customizing
Process and Service Settings Activate Change Document .
The system does not record changes to the following objects:
● Project Management
○ Documents
● Portfolio Management
○ Long texts
○ Comments/notes
○ Documents
○ Financial and capacity planning values
For more information, see http://help.sap.com/s4hana SAP S/4HANA SAP NetWeaver for SAP S/4HANA
Security Guide
● Security Aspects for Lifecycle Management Auditing and Logging
● Security Guides for SAP NetWeaver Functional Units Security Guides for the Application Server Security
Guides for the AS Java SAP NetWeaver Application Server Java Security Guide Tracing and Logging.
13.5.3 Integrated Product Development for Discrete Industries
13.5.3.1 Classification Reuse UI Component
Security Guide for SAP S/4HANA 1709
362 P U B L I C SAP S/4HANA Business Applications13.5.3.1.1 Data Protection
Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance
with general data privacy acts, it is necessary to consider compliance with industry-specific legislation in different
countries. This section describes the specific features and functions that SAP provides to support compliance
with the relevant legal requirements and data privacy.
This section and any other sections in this Security Guide do not give any advice on whether these features and
functions are the best method to support company, industry, regional or country-specific requirements.
Furthermore, this guide does not give any advice or recommendations with regard to additional features that
would be required in a particular environment; decisions related to data protection must be made on a case-by-
case basis and under consideration of the given system landscape and the applicable legal requirements.
Note
In the majority of cases, compliance with data privacy laws is not a product feature.
SAP software supports data privacy by providing security features and specific data-protection-relevant
functions such as functions for the simplified blocking and deletion of personal data.
SAP does not provide legal advice in any form. The definitions and other terms used in this guide are not taken
from any given legal source.
Table 195: Glossary
Term Definition
Personal Data Information about an identified or identifiable natural person.
Business purpose A legal, contractual, or in other form justified reason for the
processing of personal data. The assumption is that any pur
pose has an end that is usually already defined when the pur
pose starts.
Blocking A method of restricting access to data for which the primary
business purpose has ended.
Deletion Deletion of personal data so that the data is no longer usable.
Retention period The time period during which data must be available.
End of purpose (EoP) A method of identifying the point in time for a data set when
the processing of personal data is no longer required for the
primary business purpose. After the EoP has been reached,
the data is blocked and can only be accessed by users with
special authorization
Some basic requirements that support data protection are often referred to as technical and organizational
measures (TOM). The following topics are related to data protection and require appropriate TOMs:
● Access control: Authentication features as described in section User Administration and Authentication.
● Authorizations: Authorization concept as described in section Authorizations.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 363● Read access logging: as described in section Read Access Logging.
● Communication Security: as described in section Network and Communication Security.
● Availability control as described in:
○ Section Data Storage Security
○ SAP NetWeaver Database Administration documentation
○ SAP Business Continuity documentation in the SAP NetWeaver Application Help under Function-
Oriented View Solution Life Cycle Management SAP Business Continuity .
● Separation by purpose: Is subject to the organizational model implemented and must be applied as part of
the authorization concept
Note
The extent to which data protection is ensured depends on secure system operation. Network security,
security note implementation, adequate logging of system changes, and appropriate usage of the system are
the basic technical requirements for compliance with data privacy legislation and other legislation.
Configuration of Data Protection Functions
Certain central functions that support data protection compliance are grouped in Customizing for Cross-
Application Components under Data Protection.
Additional industry-specific, scenario-specific or application-specific configuration might be required. For
information about the application-specific configuration, see the application-specific Customizing in SPRO.
13.5.3.1.1.1 Data Privacy
The Classification Reuse UI Component must not process any sensitive personal data that is subject to the data
protection laws applicable in specific countries as described in SAP Note 1825544 .
Data Archiving and Deletion
Classification and characteristic data is dependent on the business object of the embedding application. You can
only archive or delete classification and characteristic data with the business object of the embedding application,
once the business object reaches its end of purpose. The embedding application is responsible for applying data
protection and privacy rules.
Characteristics Containing Sensitive Personal Data
Characteristics are not intended for storing any sensitive personal data.
Security Guide for SAP S/4HANA 1709
364 P U B L I C SAP S/4HANA Business Applications13.5.3.2 Advanced Variant Configuration
13.5.3.2.1 Data Protection
Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance
with general data privacy acts, it is necessary to consider compliance with industry-specific legislation in different
countries. This section describes the specific features and functions that SAP provides to support compliance
with the relevant legal requirements and data privacy.
This section and any other sections in this Security Guide do not give any advice on whether these features and
functions are the best method to support company, industry, regional or country-specific requirements.
Furthermore, this guide does not give any advice or recommendations with regard to additional features that
would be required in a particular environment; decisions related to data protection must be made on a case-by-
case basis and under consideration of the given system landscape and the applicable legal requirements.
Note
In the majority of cases, compliance with data privacy laws is not a product feature.
SAP software supports data privacy by providing security features and specific data-protection-relevant
functions such as functions for the simplified blocking and deletion of personal data.
SAP does not provide legal advice in any form. The definitions and other terms used in this guide are not taken
from any given legal source.
Table 196: Glossary
Term Definition
Personal Data Information about an identified or identifiable natural person.
Business purpose A legal, contractual, or in other form justified reason for the
processing of personal data. The assumption is that any pur
pose has an end that is usually already defined when the pur
pose starts.
Blocking A method of restricting access to data for which the primary
business purpose has ended.
Deletion Deletion of personal data so that the data is no longer usable.
Retention period The time period during which data must be available.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 365Term Definition
End of purpose (EoP) A method of identifying the point in time for a data set when
the processing of personal data is no longer required for the
primary business purpose. After the EoP has been reached,
the data is blocked and can only be accessed by users with
special authorization
Some basic requirements that support data protection are often referred to as technical and organizational
measures (TOM). The following topics are related to data protection and require appropriate TOMs:
● Access control: Authentication features as described in section User Administration and Authentication.
● Authorizations: Authorization concept as described in section Authorizations.
● Read access logging: as described in section Read Access Logging.
● Communication Security: as described in section Network and Communication Security.
● Availability control as described in:
○ Section Data Storage Security
○ SAP NetWeaver Database Administration documentation
○ SAP Business Continuity documentation in the SAP NetWeaver Application Help under Function-
Oriented View Solution Life Cycle Management SAP Business Continuity .
● Separation by purpose: Is subject to the organizational model implemented and must be applied as part of
the authorization concept
Note
The extent to which data protection is ensured depends on secure system operation. Network security,
security note implementation, adequate logging of system changes, and appropriate usage of the system are
the basic technical requirements for compliance with data privacy legislation and other legislation.
Configuration of Data Protection Functions
Certain central functions that support data protection compliance are grouped in Customizing for Cross-
Application Components under Data Protection.
Additional industry-specific, scenario-specific or application-specific configuration might be required. For
information about the application-specific configuration, see the application-specific Customizing in SPRO.
13.5.3.2.1.1 Data Privacy
The Advanced Variant Configuration UI must not process any personal data or sensitive personal data that is
subject to the data protection laws applicable in specific countries as described in SAP Note 1825544 .
Data Archiving and Deletion
Characteristic data is dependent on the business object of the embedding application. You can only archive or
delete characteristic data with the business object of the embedding application, once the business object
Security Guide for SAP S/4HANA 1709
366 P U B L I C SAP S/4HANA Business Applicationsreaches its end of purpose. The embedding application is responsible for applying data protection and privacy
rules.
Characteristics Containing Sensitive Personal Data
Characteristics are not intended for storing any personal data or sensitive personal data.
13.5.4 Product Lifecycle Management
13.5.4.1 Maintenance, Repair, and Overhaul
13.5.4.1.1 Authorizations (Specification 2000)
Specification 2000 (IS-ADEC-SPC) uses the authorization concept provided by the SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used:
Table 197:
Authorization Object Description
C_ADSPCIP Spec2000: Authorization object
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 36713.5.4.1.2 Deletion of Personal Data (Specification 2000)
Use
Specification 2000 (IS-ADEC-SPC) might process data (personal data) that is subject to the data protection laws
applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking
and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP
Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data
Protection .
Relevant Application Objects and Available Deletion Functionality
Table 198:
Application Provided Deletion Functionality
Specification 2000 (IS-ADEC-SPC) Archiving Object
ADS2KIP_AR
ILM Object
ADS2KIP_AR
Report
AD_SCIP_ILM_DEL_01
Relevant Application Objects and Available EoP/WUC functionality
Table 199:
Application Implemented Solution (EoP or WUC) Further Information
Specification 2000 (IS-ADEC-SPC) EoP Checks tables EDP21, EDP13
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
Security Guide for SAP S/4HANA 1709
368 P U B L I C SAP S/4HANA Business Applications13.5.4.1.3 Deletion of Personal Data (Spare Parts Stock
Calculation)
Use
Spare Parts Stock Calculation (IS-ADEC-SPSC) might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 200:
Application Provided Deletion Functionality
Spare Parts Stock Calculation (IS-ADEC-SPSC) Report
AD_SPSC_ILM_DEL_01
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
13.5.4.1.4 Authorizations (Manufacturer Part Number)
Manufacturer Part Number (MPN) uses the authorization concept provided by the SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 369Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used:
Table 201:
Authorization Object Description
M_PIC_RIC Authorization for MPN Restricted Interchangeability
ADPIC_RIC Authorization object for MPN Restricted Interchangeability
M_PIC_EXCH Authorization for material exchange
13.5.4.1.5 Deletion of Personal Data (MPN)
Use
Manufacturer Part Number (IS-ADEC-MPN) might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available EoP/WUC functionality
Table 202:
Application Implemented Solution (EoP or WUC) Further Information
Manufacturer Part Number (IS-ADEC- EoP Checks table MARA-MFRPN
MPN)
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
Security Guide for SAP S/4HANA 1709
370 P U B L I C SAP S/4HANA Business Applications13.6 Sales
13.6.1 Authorizations in Sales
Sales uses the authorization concept provided by SAP NetWeaver. Therefore, the recommendations and
guidelines for authorizations as described in the SAP NetWeaver Security Guide also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG).
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Business Roles
Business roles denote a role of a persona, for example, Administrator or Internal Sales Representative. They are an
aggregation of the applications relevant for a certain persona.
In SAP S/4HANA, business roles are technically represented by single roles. They exist on the front-end server
and do not contain authorizations. They serve demonstration purposes and trial use cases. You would typically
create your own business roles as single roles or composite roles in the transaction PFCG. Assigning the required
back-end authorizations is a separate step which is performed in the transaction in PFCG of the corresponding
back-end clients.
Sales and Distribution
The following table shows the business roles used by Sales and Distribution (SD) as template roles:
Table 203:
Role Description
SAP_BR_BILLING_CLERK Billing Clerk
SAP_BR_INTERNAL_SALES_REP Internal Sales Representative
SAP_BR_PRICING_SPECIALIST Pricing Specialist
SAP_BR_SALES_MANAGER Sales Manager
SAP_BR_SALES_PROCESS_MANAGER Order-to-Cash Process Manager
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 371Role Description
SAP_BR_RETURNS_REFUND_CLERK Returns and Refund Clerk
Standard Authorization Objects
Sales and Distribution
The following table shows the main security-relevant authorization objects used by Sales and Distribution (SD):
Table 204:
Authorization Object Description
V_KNA1_BRG Customer: Account Authorization for Sales Areas
V_KNA1_VKO Customer: Authorization for Sales Organizations
V_KONH_VKO Condition: Authorization for Sales Organizations
V_KONH_VKS Condition: Authorization for Condition Types
V_VBAK_AAT Sales Document: Authorization for Sales Document Types
V_VBAK_VKO Sales Document: Authorization for Sales Areas
V_VBRK_FKA Billing: Authorization for Billing Types
V_VBRK_VKO Billing: Authorization for Sales Organizations
POC_AUTH Process Observer: Process Instance
POC_DEFN Process Observer: Process Definition
Global Trade Management
The following table shows the security-relevant authorization objects used by Global Trade Management (GTM):
Table 205:
Authorization Object Description
W_WBGT_FIX GTM: Setup of Enhancement Table WBGT
W_WBHK_ORG Trading Contract: Authorization for Organizational Data
W_WBHK_TCT Trading Contract: Authorization for Trading Contract Type
W_WTEW Authorizations for Trading Execution Workbench
WB2_SHD_UI Assignments: Authorization for shadow document types
Security Guide for SAP S/4HANA 1709
372 P U B L I C SAP S/4HANA Business ApplicationsMore Information
For authorization information about Shipping (LE-SHP), see Authorizations in Logistics Execution [page 418].
13.6.2 Communication Channel Security
The information below shows the communication channels used, the protocol used for the connection, and the
type of data transferred.
Connection to an External Global Trade Services System
You can connect Global Trade Management to an external Global Trade Services (GTS) system in order to check
whether the contract data for Global Trade Management adheres to the prevailing legal requirements (import/
export controls, global trade data).
Table 206:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
SAP S/4HANA system – GTS RFC Application data n/a
system
All users in the SAP S/4HANA system can call the functions on the GTS server using an RFC entry. In this RFC
entry, you specify a user that is used uniquely for communication with GTS. Assign this communication user to
the following roles for SAP Compliance Management.
Table 207: Roles for Compliance Management
Role Description
/SAPSLL/LEG_ARCH GTS Archiving
/SAPSLL/LEG_LCE_APP GTS Legal Control Export: Specialist
/SAPSLL/LEG_LCI_APP GTS Legal Control Import: Specialist
/SAPSLL/LEG_SPL_APP GTS Sanctioned Party List: Specialist
/SAPSLL/LEG_SYS_COMM GTS (Technical) System Communication
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol. SOAP connections are protected with Web services
security.
Note
We strongly recommend using secure protocols (SSL, SNC) whenever possible.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 373For more information, see Transport Layer Security and Web Services Security in the SAP NetWeaver Security
Guide.
13.6.3 Deletion of Personal Data
Use
The Sales application might process data (personal data) that is subject to the data protection laws applicable in
specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion
of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at
http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 208:
Application Provided Deletion Functionality
Sales Documents Archiving object SD_VBAK
Billing Documents Archiving object SD_VBRK
Agreements and Related Conditions Archiving object SD_AGREEM
Conditions Archiving object SD_COND
Sales Documents Data destruction object SD_BNAME_VA_DESTRUCTION
Billing Documents Data destruction object SD_BNAME_VF_DESTRUCTION
Empties Management Data destruction object BEV1_EMBD,
Data destruction object BEV1_EMFD
For more information about application objects and deletion functionality, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under Product Assistance
Enterprise Business Applications Sales . You can find the information under the following:
● Data Archiving in Sales and Distribution (SD)
● Data Destruction in Sales and Distribution (SD)
Security Guide for SAP S/4HANA 1709
374 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application Objects and Available EoP Functionality
Table 209:
Application Implemented Solution (EoP or WUC) Further Information
Sales and Distribution (SD) EoP check This includes the business in the areas
of:
● Sales
● Billing
● Outbound Delivery Processing
● Empties Management
Configuration: Simplified Blocking and Deletion
● You configure the settings related to the blocking and deletion of customer and supplier master data in
Customizing under Logistics - General Business Partner Deletion of Customer and Supplier Master
Data .
● You execute the rebuild of retention information in Customizing under Sales and Distribution Data
Transfer, Data Aging, and Archiving Archiving Data Rebuilding of Retention Information in SD .
● You can enhance the EoP check in Customizing under Sales and Distribution System Modifications
Business Add-In BAdI: Enhancements for End of Purpose Check .
13.6.4 Global Trade Management
13.6.4.1 Authorizations
The component Global Trade Management (LO-GT) uses the authorization concept that is provided by SAP
NetWeaver AS for ABAP or AS Java. The security guidelines and policies for authorizations that are described in
SAP NetWeaver AS Security Guide ABAP and SAP NetWeaver AS Security Guide Java are therefore also valid for
this component.
The SAP NetWeaver authorization concept stipulates that authorizations are assigned to users on the basis of
roles. For role maintenance, use the Profile Generator (transactionPFCG) on AS ABAP, and the user
administration console of the User Management Engine on AS Java.
Note
For more information about creating roles, see the respective application help for the role generator and the
user administration console.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 375You can implement the following PFCG standard role for component Global Trade Management:
Table 210:
Description Technical Name
LO - Global Trade Management SAP_EP_LO_WB20N
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 211:
Authorization Object Field Value Description
W_WBHK_ORG Organizational Data 01 Create or generate Trading contract: Authoriza
tion for organizational data
02 Change
03 Display
04 Print, edit messages
07 Activate, generate
24 Archive
25 Reload
43 Release (*)
W_WBHK_TCT Trading Contract Type 01 Create or generate Trading contract: Authoriza
tion for trading contract type
02 Change
03 Display
04 Print, edit messages
07 Activate, generate
24 Archive
25 Reload
43 Release (*)
(*) To check this activity, you must explicitly activate the check as required.
Security Guide for SAP S/4HANA 1709
376 P U B L I C SAP S/4HANA Business Applications13.6.4.2 Network and Communication Security
General
Your network infrastructure is extremely important in protecting your system.
Communication Channel Security
Connection to an SAP FSCM System
For Global Trade Management (EA-GLTRADE), you have the option to use an external SAP FSCM system to create
forward exchange transactions. If you install SAP FSCM on a separate system, you require an RFC connection. If
you install SAP FSCM together with Global Trade Management on one system, no RFC connection is necessary.
Table 212:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
SAP ERP system - SAP FSCM RFC Application data -
system (Financial Supply
Chain Management)
RFC connections can be protected using Secure Network Communications (SNC). For more information about
setting up the RFC connection, and the prerequisites (authorizations), see Customizing for ERP under Logistics
General Global Trade Management Currency Hedging Maintain RFC Destination of CFM System . For more
information about encryption, see the SAP NetWeaver Security Guide in section Network and Communication
Security Transport Layer Security .
Connection to an External Global Trade Services (GTS) System
For Global Trade Management (EA-GLTRADE), you have the option to connect an external GTS system. You can
then check whether the contract data from Global Trade Management corresponds to the existing legal
requirements (import/export control, foreign trade data).
Table 213:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
SAP ERP system - GTS sys RFC Application data -
tem
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 377The call of the functions on the GTS server takes place for all users in the SAP ECC system via an RFC entry. In
this RFC entry, you specify a purely communications user for GTS. Give this communications user the following
roles for SAP Compliance Management:
Table 214:
Role Description
/SAPSLL/LEG_ARCH GTS Archiving
/SAPSLL/LEG_LCE_APP GTS Legal Control Export: Specialist
/SAPSLL/LEG_LCI_APP GTS Legal Control Import: Specialist
/SAPSLL/LEG_SPL_APP GTS Sanctioned Party List: Specialist
/SAPSLL/LEG_SYS_COMM GTS (Technical) System Communication
The RFC connections can be protected using Secure Network Communications (SNC). For more information
about encryption, see the SAP NetWeaver Security Guide in section Network and Communication Security
Transport Layer Security .
13.6.4.3 Deletion of Personal Data
Use
The Global Trade Management (LO-GT) application might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 215:
Application Object Detailed Description Provided Deletion Functionality
Trading Contract Archiving Trading Contract (LO-GT) Archiving object WB2
Report:
WB2_UPDATE_EOP_FROM_ARCHIVE.
Security Guide for SAP S/4HANA 1709
378 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application Objects and Available EoP/WUC functionality
Table 216:
Application Implemented Solution Further Information
Global Trade Management: EoP check This includes the business in the areas
● LO-GT-PM of:
● LO-GT-TE Trading Contract (LO-GT-TC)
● LO-GT-TEW
● LO-GT-TC
Configuration: Simplified Blocking and Deletion
You configure the settings the related to the blocking and deletion of customer and supplier master data in
Customizing for Logistics - General under Business Partner Deletion of Customer and Supplier Master Data. .
13.6.5 Commodity Sales
13.6.5.1 Deletion of Personal Data
Use
Commodity Procurement and Commodity Sales might process data (personal data) that is subject to the data
protection laws applicable in specific countries as described in SAP Note 1825544 .
For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal under Product
Assistance Cross Components Data Protection .
Please note that Commodity Procurement and Commodity Sales do not use SAP Information Lifecycle
Management (ILM).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 379Relevant Application Objects and Available Deletion Functionality
Table 217:
Application Objects Provided Deletion Functionality
BRFplus Decision Table Entries for CPE Formula Assembly See Section BRFplus Decision Table Entries for CPE Formula
Assembly below
Pricing Condition Records in CPE Formula Assembly See section Pricing Conditon Records for CPE Formula Assem
bly below
Records of Versioned Logistics Pricing Data Persistency See section Versioned Logistics Pricing Data Persistency be
low
BRFplus Decision Table Entries for CPE Formula Assembly
In the Commodity Pricing Engine (CPE), the Formula Assembly (FA) is used for logistics document items like sales
order items or purchase order items to create default settings as, for example, the formula ID. These settings
depend on properties of the underlying logistics document such as the vendor/customer, organizational and
material data.
The Business Rules Framework plus (BRFplus) is used to implement rules for entering these settings. To use
decision tables in BRFplus (as recommended by SAP), the required BRFplus content is provided (BRFplus
application, BRFplus functions which use BRFplus decision tables). The standard content includes, for example,
decision tables, which require customer or vendor, material and other input fields, and the formula ID as result
field. Decision tables can contain customer or vendor data, which eventually need to be deleted.
In the deletion report RCPE_BRF01 (Delete BRFplus Decision Table Entries for CPE Formula Assembly) you enter a
selected customer or vendor. When selecting the test mode, the report checks, whether the entered customer or
vendor exists in the system, and whether he is blocked. After this, the report checks all BRFplus decision tables in
BRFplus applications used for the Formula Assembly, and displays the respective row numbers of the BRFplus
decision tables and the column containing the selected customer or vendor. If the Test Mode flag is not set, the
report deletes all entries found, and creates an application log entry for object CMM and subobject DPP_FA_BRF
(transaction SLG1).
The Customizing settings can be found in the SAP Implementation Guide under Sales and Distribution Basic
Functions Commodity Pricing Settings for Formula Assembly Assign BRFplus Application to Pricing
Procedure or Materials Management Purchasing Commodity Pricing Settings for Formula Assembly
Assign BRFplus Application to Pricing Procedure .
Pricing Condition Records in CPE Formula Assembly
1. Precheck
Security Guide for SAP S/4HANA 1709
380 P U B L I C SAP S/4HANA Business ApplicationsCondition records are stored in table /1CN/CVFSAPI0FOR and used for the formula key determination. To
check all tables of the formula assembly for customers or vendors used, enter the prefixes /1CN/CVF for
Commodity Sales and /1CN/CMF for Commodity Procurement.
To check and process pricing conditions for the formula assembly, you can use the transactions
MCPE_FA_GCM (for Commodity Procurement) and VCPE_FA_GCM (for Commodity Sales).
2. Deletion
To delete entries for a selected customer or vendor, perform report RCPE_CT01.
Select, for example, table /1CN/CVFSAPI0FOR as identified in the step before, and enter the customer for a
Commodity Sales-relevant table. When choosing the test mode, the report will display all entries of
table /1CN/CVFSAPI0FOR, which would be deleted.
To display deleted entries, perform transaction SLG1 for object CMM and subobject DDP_FA_AP.
To delete all entries of the selected table , select the Delete complete content indicator.
Note: Condition tables used for the CPE Formula Assembly must allways be selected and processed
individually.
Versioned Logistics Pricing Data Persistency
Transaction CMM_DEL_DOC_VERSIONS allows you to delete all records of the versioned logistic pricing data
persistency (table CMM_VLOGP), which are stored for a certain blocked customer/vendor.
Transaction CMM_DEL_DOC_VERSIONS allows you to update all records of the versioned logistic pricing data
persistency (table CMM_VLOGP), which are stored for a certain blocked customer/vendor in a way that the
identifier of the respective customer/vendor is masked with a blank space.
The authorization to perform this transaction is checked by the authorization object S_TCODE, and explicitly in
the underlying report. It is ensured that, even if the report is performed by transaction SA38, only authorized
experts can execute it. In addition, the authorization object CMM_VLOGP is checked by activity 06 (Delete). This
enables the authorized user to delete records from the versioned logistic pricing data persistency (table
CMM_VLOGP).
Note: It is checked, whether the entered customer is used as Sold-to-Party and/or Ship-to-Party. Records are
deleted and masked accordingly.
This transaction must be performed to mask or to delete records as soon as a certain customer or vendor is
blocked.
Relevant Application Objects and Available EoP/WUC Functionality
Table 218:
Application Implemented Solution (EoP or WUC) Further Information
n/a n/a n/a
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 38113.6.5.2 Information Report
Use
Commodity Procurement and Commodity Sales provide information about stored personal data in the versioned
persistency of logistics pricing data (VLOGP).
Versioned Persistency of Logistics Pricing Data
To display information about stored personal data in in the versioned persistency of logistics pricing data (VLOGP)
of Commodity Procurement and Commodity Sales, run transaction CMM_DEL_DOC_VERSIONS.
The authorization to perform this transaction is checked by the authorization object S_TCODE, and in the
underlying report. It is ensured that, even if the report is launched by transaction SA38, only authorized experts
can execute it.
In case of blocked customers, vendors, business partners, the authorization object B_BUP_PCPT (actvitity 03) is
additionaly checked.
Table 219:
Table / Business Object Archiving Object Personal Data
CMM_VLOGP n/a LIFNR, KUNNR, KUNWE
13.7 Service
13.7.1 Warranty Management
Security Guide for SAP S/4HANA 1709
382 P U B L I C SAP S/4HANA Business Applications13.7.1.1 Authorizations
Warranty (LO-WTY) uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore, the
recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP
also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 220:
Authorization Object Description
C_WTY_ACT Warranty: Actions Authorization Object
C_WTY_OBJ Warranty: Process Object Authorization Object
C_WTY_STAT Warranty: Status Authorization Object
13.7.1.2 Deletion of Personal Data
Use
Warranty (LO-WTY) might process data (personal data) that is subject to the data protection laws applicable in
specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion
of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at
http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 383Relevant Application Objects and Available Deletion Functionality
Table 221:
Application Provided Deletion Functionality
Warranty (LO-WTY) Archiving Object
WTY_CLAIM
ILM Object
WTY_CLAIM
Relevant Application Objects and Available EoP/WUC functionality
Table 222:
Application Implemented Solution (EoP or WUC) Further Information
Warranty (LO-WTY) EoP check Checks tables:
PNWTYH, PNWTYV
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
13.8 Sourcing and Procurement
13.8.1 Authorizations
Front-End Roles
To use the Fiori Launchpad in SAP S/4HANA, you have to apply the SAP S/4HANA role concept based on
business catalogs that are assigned to business roles. For the front-end, the following standard business roles are
available for Sourcing and Procurement. You can use these roles as templates for your own roles. For more
information, see the SAP S/4HANA UI Technology Guide at the SAP Help Portal under http://help.sap.com/
s4hana_op_1709 Product Documentation .
Security Guide for SAP S/4HANA 1709
384 P U B L I C SAP S/4HANA Business ApplicationsTable 223: Business Roles
Role Description
SAP_BR_AP_ACCOUNTANT_PROCUREMT Accounts Payable Accountant - Procurement
SAP_BR_BUYER Strategic Buyer
SAP_BR_EMPLOYEE_PROCUREMENT Employee - Procurement
SSAP_BR_PURCHASER Purchaser
SAP_BR_PURCHASING_MANAGER Purchasing Manager
Back-End Roles
In the back-end, you have to create roles in transaction PFCG and assign business catalogs to the roles. For more
information, see the SAP S/4HANA UI Technology Guide at the SAP Help Portal under http://help.sap.com/
s4hana_op_1709 Product Documentation .
If you have converted your system from SAP ERP to SAP S/4HANA, you may still be accessing transactions via
the SAP Easy Access menu. To support this case, the standard role templates for back-end roles are still available
and are listed below:
Table 224: Back-End Roles (Relevant for System Converted from SAP ERP)
Role Description
SAP_MM_PUR_ADDITIONAL_FUNC Non-Assigned Purchasing Functions
SAP_MM_PUR_ARCHIVE Archive Purchasing Documents
SAP_MM_PUR_ARCHIVE_LISTS Analyses Using the Purchasing Archive
SAP_MM_PUR_CONDITIONS Conditions in Purchasing - Overview
SAP_MM_PUR_CONDITIONS_DISCOUNT Discounts in Purchasing
SAP_MM_PUR_CONDITIONS_PRICES Prices in Purchasing
SAP_MM_PUR_CONFIRMATION Confirmations
SAP_MM_PUR_CONTRACT_LISTS Lists for Outline Agreements
SAP_MM_PUR_CONTRACT_MESSAGE Output Outline Agreements
SAP_MM_PUR_CONTRACT_MESSAGE_MT General Message Maintenance for Outline Agreements
SAP_MM_PUR_CONTRACT_RELEASE Release Outline Agreements
SAP_MM_PUR_CONTRACTING Process Contracts
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 385Role Description
SAP_MM_PUR_DISPLAY_OBJECTS General Display Functions in Purchasing
SAP_MM_PUR_GENERAL General Functions in Purchasing
SAP_MM_PUR_INFORECORD Maintain Purchasing Info Record
SAP_MM_PUR_INFORECORD_LISTS Lists of Purchasing Info Records
SAP_MM_PUR_LIS_GENERAL General Analyses for LIS
SAP_MM_PUR_LIS_SERVICE LIS Analyses for Services
SAP_MM_PUR_LIS_STOCK_MATERIAL LIS Analyses for Stock Material
SAP_MM_PUR_LIS_VE LIS Analyses for Vendor Evaluation
SAP_MM_PUR_LISTS_GENERAL General Analyses in Purchasing
SAP_MM_PUR_MASS_CHANGE Mass Maintenance in Purchasing
SAP_MM_PUR_MESSAGE Output Purchasing Documents
SAP_MM_PUR_MESSAGE_MAINTENANCE General Message Maintenance in Purchasing
SAP_MM_PUR_MPN_AMPL Approved Manufacturer Parts
SAP_MM_PUR_MPN_AMPL_ARCHIVE Archive Approved Manufacturer Parts List
SAP_MM_PUR_NEGOTIATION_LISTS Lists for Purchasing Negotiations
SAP_MM_PUR_PO_RELEASE Release Purchase Orders
SAP_MM_PUR_PR_LISTS Lists of Purchase Requisitions
SAP_MM_PUR_PR_RELEASE Release Purchase Requisitions
SAP_MM_PUR_PURCHASEORDER Process Purchase Orders
SAP_MM_PUR_PURCHASEORDER_LISTS Lists of Purchase Orders
SAP_MM_PUR_PURCHASEREQUISITION Process Purchase Requisitions
SAP_MM_PUR_QUOTA_ARRANGEMENT Maintain Quota Arrangement
SAP_MM_PUR_QUOTA_MAINTENANCE Revise Quota Arrangement
SAP_MM_PUR_QUOTATION Maintain Quotation
SAP_MM_PUR_RFQ Process Request for Quotation
SAP_MM_PUR_RFQ_LISTS Lists of Requests for Quotations
Security Guide for SAP S/4HANA 1709
386 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_MM_PUR_SCHEDULE Maintain Scheduling Agreement Delivery Schedules and Re
leases
SAP_MM_PUR_SCHEDULE_MAINTENANC Administer Scheduling Agreements
SAP_MM_PUR_SCHEDULEAGREEMENT Process Scheduling Agreements
SAP_MM_PUR_SERVICE Service Entry Sheet
SAP_MM_PUR_SERVICE_CONDITIONS Service Conditions for Service
SAP_MM_PUR_SERVICE_LISTS Lists of Service Entry Sheets
SAP_MM_PUR_SERVICE_TRANSFER Data Transfer for Services
SAP_MM_PUR_SOURCE_LIST Maintain Source List
SAP_MM_PUR_SRV_CONDITIONS_GEN Service Conditions for Services (General)
SAP_MM_PUR_SRV_MODEL_SPEC Maintain Model Service Specifications
SAP_MM_PUR_SRV_STANDARD_SPEC Maintain Standard Service Specifications
SAP_MM_PUR_SRV_VENDOR_COND Service Conditions for Vendor
SAP_MM_PUR_SRV_VENDOR_PLANT_CO Service Conditions for Vendor and Plant
SAP_MM_PUR_SUPPLIER_LOGISTICS Logistics information for the vendor on the Internet
SAP_MM_PUR_TAXES Taxes in Purchasing
SAP_MM_PUR_VE Maintain Vendor Evaluation
SAP_MM_PUR_VE_LISTS Lists of Vendor Evaluations
SAP_MM_PUR_VE_MAINTENANCE Vendor Evaluation in the Background
SAP_MM_PUR_VENDOR_PRICE Change Prices for Vendor
SAP_MM_PUR_SOURCE_LIST Maintain Source List
SAP_AUDITOR_BA_MM_PUR This transaction role allows evaluations to be collected, struc
tured, and configured for the audit area:
● Business Audit - Process View
● Purchasing: From Purchase Order to Outgoing Payment
● Purchasing
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 387Role Description
SAP_AUDITOR_BA_MM_PUR_A This role provides read access for the audit area:
● Business Audit - Process View
● Purchasing: From Purchase Order to Outgoing Payment
● Purchasing
SAP_MM_IV_CLERK_BATCH1 Enter Invoices for Verification in the Background
SAP_MM_IV_CLERK_BATCH2 Manual Processing of Invoices Verified in the Background
SAP_MM_IV_CLERK_GRIR_MAINTAIN GR/IR Clearing Account Maintenance
SAP_MM_IV_CLERK_GRIR_MAITAIN GR/IR Clearing Account Maintenance
SAP_MM_IV_CLERK_ONLINE Online Invoice Verification
SAP_MM_IV_CLERK_PARK Park Invoices
SAP_MM_IV_CLERK_RELEASE Invoice Release
SAP_MM_IV_SUPPLIER_FINANCE Settlement Information for Vendor (External Supplier) on the
Internet
SAP_MM_IV_CLERK_AUTO Automatic Settlements
SAP_AUDITOR_BA_MM_IV This transaction role allows evaluations to be collected, struc
tured, and configured for the audit area:
● Business Audit - Individual Account Closing
● Profit and Loss Statement
● Material Expense
SAP_AUDITOR_BA_MM_IV_A This authorization role provides read access for the audit
area:
● Business Audit - Individual Account Closing
● Profit and Loss Statement
● Material Expense
Standard Authorization Objects
The table below shows the security-relevant authorization objects that you can use in SAP S/4HANA when you
create back-end roles. These objects were also used in the above listed standard back-end roles.
Security Guide for SAP S/4HANA 1709
388 P U B L I C SAP S/4HANA Business ApplicationsTable 225:
Authorization Object Description
M_AMPL_ALL Approved Manufacturer Parts List
M_AMPL_WRK Approved Manufacturer Parts List - Plant
M_ANFR_BSA Document Type in RFQ
M_ANFR_EKG Purchasing Group in RFQ
M_ANFR_EKO Purchasing Organization in RFQ
M_ANFR_WRK Plant in RFQ
M_ANFR_LGO Storage Locations in RFQ
M_ANGB_BSA Document Type in Quotation
M_ANGB_EKG Purchasing Group in Quotation
M_ANGB_EKO Purchasing Organization in Quotation
M_ANGB_WRK Plant in Quotation
M_ANGB_LGO Storage Locations in Quotation
M_BANF_BSA Document Type in Purchase Requisition
M_BANF_EKG Purchasing Group in Purchase Requisition
M_BANF_EKO Purchasing Organization in Purchase Requisition
M_BANF_FRG Release Code in Purchase Requisition
M_BANF_WRK Plant in Purchase Requisition
M_BANF_LGO Storage Location in Purchase Requisition
M_BEST_BSA Document Type in Order
M_BEST_EKG Purchasing Group in Purchase Order
M_BEST_EKO Purchasing Organization in Purchase Order
M_BEST_WRK Plant in Purchase Order
M_BEST_LGO Storage Location in Purchase Order
M_EINF_EKG Purchasing Group in Purchasing Info Record
M_EINF_EKO Purchasing Organization in Purchasing Info Record
M_EINF_WRK Plant in Purchasing Info Record
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 389Authorization Object Description
M_EINK_FRG Release Code and Group (Purchasing)
M_LFM1_EKO Purchasing Organization in Vendor Master Record
M_LIBE_EKO Vendor Evaluation
M_LPET_BSA Document Type in Scheduling Agreement Delivery Schedule
M_LPET_EKG Purchasing Group in Scheduling Agreement Delivery Sched
ule
M_LPET_EKO Purchasing Org. in Scheduling Agreement Delivery Schedule
M_LPET_WRK Plant in Scheduling Agreement Delivery Schedule
M_LPET_LGO Storage Location in Scheduling Agreement Delivery Schedule
M_ORDR_EKO Purchasing Organization in Source List
M_ORDR_WRK Plant in Source List
M_QUOT_EKO Purchasing Organization (Quotas)
M_QUOT_WRK Plant (Quotas)
M_RAHM_BSA Document Type in Outline Agreement
M_RAHM_EKG Purchasing Group in Outline Agreement
M_RAHM_EKO Purchasing Organization in Outline Agreement
M_RAHM_WRK Plant in Outline Agreement
M_RAHM_LGO Storage Location in Outline Agreement
M_RAHM_STA Status in Contract
M_SRV_LS Authorization for Maintenance of Service Master
M_SRV_LV Authorization for Maintenance of Model Serv. Specifications
M_SRV_ST Authorization for Maintenance of Standard Service Catalog
S_ME_SYNC Mobile Engine: Synchronization of Offline Applications
V_KONH_EKO Purchasing Organization in Master Condition
M_TEMPLATE Create/Change/Delete Public Templates
M_POIVVEND Read Invoices of a Vendor
Security Guide for SAP S/4HANA 1709
390 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
CMM_MEV_WL CMM: Worklist
CMM_MEV_AD CMM: Accrual Document
M_RECH_BUK Invoices: Company Code
M_RECH_CPY Copy Invoice: Company Code
M_RECH_WRK Invoices: Plant
M_RECH_AKZ Invoices: Accept Invoice Verification Differences Manually
M_RECH_EKG Invoice Release: Purchasing Group
M_RECH_SPG Invoices: Blocking Reasons
M_RECH_UPL Invoice: Upload
F_BKPF_BUK Accounting Document
13.8.2 Data Storage Security
Using Logical Path and File Names to Protect Access to the File System
Materials Management saves data in files in the file system. Therefore, it is important to explicitly provide access
to the corresponding files in the file system without allowing access to other directories or files (also known as
directory traversal). This is achieved by specifying logical paths and file names in the system that map to the
physical paths and file names. This mapping is validated at runtime and if access is requested to a directory that
does not match a stored mapping, then an error occurs.
The following lists show the logical file names and paths used by Materials Management and for which programs
these file names and paths apply:
Logical File Names Used
The following logical file names have been created in order to enable the validation of physical file names:
● MM_PURCHASING_INFORECORDS_NEW
○ Programs using this logical file name and parameters used in this context:
○ RM06IBIS
○ RM06IBIE
● MM_PURCHASING_REQUISITIONS_NEW
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 391○ Programs using this logical file name:
○ RM06BBIS
○ RM06BBIE
● SAP_SOURCING_CUSTOMIZING_DOWNLOAD_FILE
○ Programs using this logical file name:
○ BBP_ES_CUST_DOWNLOAD
Logical Path Names Used
The logical file names MM_PURCHASING_INFORECORDS_NEW and MM_PURCHASING_REQUISITIONS_NEW
use the logical file path MM_PUR_ROOT. The logical file name
SAP_SOURCING_CUSTOMIZING_DOWNLOAD_FILE uses the logical file path
SAP_SOURCING_CUSTOMIZING_DOWNLOAD.
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To add the aliases
for the view V_FILEALIA, use transaction SM31.
For more information, see about data storage security, see the respective chapter in the SAP NetWeaver Security
Guide.
Using Data Storage Security
Check whether the conditions are classified as sensitive data. You can protect conditions with the following
authorization objects:
Table 226:
Authorization Object Description
V_KONH_EKO Purchasing Organization in Master Condition
V_KONH_VKS Condition: Authorization for Condition Types
Security Guide for SAP S/4HANA 1709
392 P U B L I C SAP S/4HANA Business ApplicationsPrices are also potential sensitive data. You can protect the display authority for prices with the value 09 of the
authorization field ACTVT (Activity) of the purchasing document-specific authorization objects listed below:
Table 227:
Authorization Object Description
M_ANFR_BSA Document Type in RFQ
M_ANFR_EKG Purchasing Group in RFQ
M_ANFR_EKO Purchasing Organization in RFQ
M_ANGB_BSA Document Type in Quotation
M_ANGB_EKG Purchasing Group in Quotation
M_ANGB_EKO Purchasing Organization in Quotation
M_BEST_BSA Document Type in Order
M_BEST_EKG Purchasing Group in Purchase Order
M_BEST_EKO Purchasing Organization in Purchase Order
M_BEST_WRK Plant in Purchase Order
M_BEST_LGO Storage Location in Purchase Order
M_LPET_BSA Document Type in Scheduling Agreement Delivery Schedule
M_LPET_EKG Purchasing Group in Scheduling Agreement Delivery Sched
ule
M_LPET_EKO Purchasing Org. in Scheduling Agreement Delivery Schedule
M_RAHM_BSA Document Type in Outline Agreement
M_RAHM_EKG Purchasing Group in Outline Agreement
M_RAHM_EKO Purchasing Organization in Outline Agreement
M_RAHM_WRK Plant in Outline Agreement
M_RAHM_LGO Storage Location in Outline Agreement
13.8.3 Other Security-Relevant Information
Open Catalog Interface
Use
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 393The Open Catalog Interface (OCI) incorporates external product catalogs into SAP S/4HANA applications using
Hyper Text Transfer Protocol (HTTP). This way, the data required to create purchasing document items in SAP S/
4HANA can be transferred directly from the external catalog to the SAP S/4HANA application.
Reason and Prerequisites
SAP S/4HANA and the catalog communicate via HTTP/HTTPS URL parameters. It is possible for an end user to
identify these parameters and also change them using specialized tools. Security depends heavily on the fact
whether the catalogue system resides before or behind the firewall.
Solution
SAP recommends the following to the customers who wish to integrate SAP S/4HANA and catalogs using Open
catalog Interface (OCI):
● Double check the values transferred from the catalogue into the SAP S/4HANA application manually. Check
whether the values are the same one as the one in the catalogue.
● In addition to that, authority checks are happening on SAP S/4HANA side: the application checks whether the
user is allowed to change the data on SAP S/4HANA side which is transferred from the catalogue.
Example: if a price is transferred from the catalogue into the purchasing document, the system checks
whether the user has the authority to change the price in the purchasing document in general.
● To prevent end users from sniffing the catalog login data (User names, password), avoid specifying the login
information in the OCI Catalog configuration in Customizing. Instead, configure the catalog to accept
individual user authentication information from the end user. This can be done in the form of SSO (Single
Sign-On) tools, Digital Certificates or Individual Login Information (User name/password). These features are
dependent upon whether the Catalog provider supports the above mentioned features to logon.
You define the setting for the OCI in Customizing for Materials Management under Purchasing Environment
Data Web Services: ID and Description .
Security-Relevant Logging and Tracing
Use
Purchasing uses change documents to track changes made to purchasing documents. This includes changes to
security-sensitive data such as prices. The following authorization objects specific to purchasing documents allow
the restriction of the visibility of those change documents using the value 08 of the authorization field ACTVT
(Activity):
Table 228:
Authorization Object Description
M_ANFR_BSA Document Type in RFQ
M_ANFR_EKG Purchasing Group in RFQ
M_ANFR_EKO Purchasing Organization in RFQ
M_ANFR_WRK Plant in RFQ
Security Guide for SAP S/4HANA 1709
394 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
M_ANFR_LGO Storage Locations in RFQ
M_ANGB_BSA Document Type in Quotation
M_ANGB_EKG Purchasing Group in Quotation
M_ANGB_EKO Purchasing Organization in Quotation
M_BANF_BSA Document Type in Purchase Requisition
M_BANF_EKG Purchasing Group in Purchase Requisition
M_BANF_EKO Purchasing Organization in Purchase Requisition
M_BANF_FRG Release Code in Purchase Requisition
M_BANF_WRK Plant in Purchase Requisition
M_BANF_LGO Storage Location in Purchase Requisition
M_BEST_BSA Document Type in Order
M_BEST_EKG Purchasing Group in Purchase Order
M_BEST_EKO Purchasing Organization in Purchase Order
M_BEST_WRK Plant in Purchase Order
M_BEST_LGO Storage Location in Purchase Order
M_EINF_EKG Purchasing Group in Purchasing Info Record
M_EINF_EKO Purchasing Organization in Purchasing Info Record
M_EINF_WRK Plant in Purchasing Info Record
M_LFM1_EKO Purchasing Organization in Vendor Master Record
M_LPET_BSA Document Type in Scheduling Agreement Delivery Schedule
M_LPET_EKG Purchasing Group in Scheduling Agreement Delivery Sched
ule
M_LPET_EKO Purchasing Org. in Scheduling Agreement Delivery Schedule
M_ORDR_EKO Purchasing Organization in Source List
M_ORDR_WRK Plant in Source List
M_QUOT_EKO Purchasing Organization (Quotas)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 395Authorization Object Description
M_QUOT_WRK Plant (Quotas)
M_RAHM_BSA Document Type in Outline Agreement
M_RAHM_EKG Purchasing Group in Outline Agreement
M_RAHM_EKO Purchasing Organization in Outline Agreement
M_RAHM_WRK Plant in Outline Agreement
M_RAHM_LGO Storage Location in Outline Agreement
M_RAHM_STA Status in Contract
13.8.4 Deletion of Personal Data
Use
Purchasing (MM-PUR), Invoice Verificaton (MM-IV), and Supplier and Category Management might process data
(personal data) that is subject to the data protection laws applicable in specific countries. You can use SAP
Information Lifecycle Management (ILM) to control the blocking and deletion of personal data.
Business partner master data can be blocked as soon as business activities that use this data are completed and
the residence period for the data has elapsed; after this time, only users with additional authorizations can access
this data. In Sourcing and Procurement, different app types have different ways of allowing authorized users (who
must have the role BR_EXTERNAL_AUDITOR) to display the blocked supliers. For the business documents listed
below, users with this role can choose between the listed options:
Table 229: Blocked Documents and Display Options
Business Document Display Options for Blocked Documents
● Purchase requisition ● Using the "Advanced" or "Professional" versions of the
● Purchase order Fiori apps, if available
● Accessing the corresponding transactions in the SAP
● Purchase contract
● Scheduling agreement Fiori Launchpad via the Me area App Finder SAP
● Shopping cart Menu
● Using the corresponding SAP GUI transactions in the
● Purchasing info record back-end system
If users with the BR_EXTERNAL_AUDITOR role want to display blocked suppliers in the Manage Quota
Arrangements app or in the Manage Supplier Invoices app, they can do so directly in the Fiori app.
In apps of Supplier and Category Management, all entries related to blocked suppliers are displayed as Blocked
Supplier, and all supplier-related links are disabled. Evaluation scorecards for the blocked suppliers are not
displayed in the scorecards list in the Display Scorecards app. The standard Web Dynpro apps can be used to
Security Guide for SAP S/4HANA 1709
396 P U B L I C SAP S/4HANA Business Applicationsdisplay the blocked data. For more information, see the section Supplier and Category Management Deletion
of Personal Data .
When the retention period for data expires, personal data of the business partner can be destroyed completely so
that it can no longer be retrieved. Retention periods must be defined in the customer system.
For more information about blocking of data, see the product assistance for SAP S/4HANA on the SAP Help
Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 230:
Application Object Detailed Description Provided Deletion Functionality
Purchase Requisitions Archiving Purchase Requisitions (MM- Archiving object MM_EBAN
PUR)
Purchasing Documents Archiving Purchasing Documents (MM- Archiving object MM_EKKO
PUR)
Purchasing Info Records Archiving Purchasing Info Records (MM- Archiving object MM_EINA
PUR)
Invoice Documents Archiving Invoice Documents (MM-IV) Archiving object MM_REBEL
For documentation about application objects and deletion functionality, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under Product Assistance
Enterprise Business Applications Sourcing and Procurement Materials Management (MM) Data Archiving
in Materials Management (MM) .
Prerequisite: End of Purpose Check
Before objects can be archived, and end of purpose check must be performed. For more information, see the
product assistance for SAP S/4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under
Product Assistance Enterprise Business Applications Sourcing and Procurement Materials Management
(MM) Data Blocking End of Purpose (EoP) Check for Business Partners in MM-PUR, MM-IM, and MM-IV .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 397Table 231:
Application Implemented Solution (EoP or WUC) Further Information
Materials Management (MM) End of purpose check (EoP) For more information about the end of
purpose check, see the product assis
tance for SAP S/4HANA on the SAP
Help Portal at http://help.sap.com/
s4hana_op_1709 under Product
Assistance Enterprise Business
Applications Sourcing and
Procurement Materials Management
(MM) Data Blocking End of Purpose
(EoP) Check for Business Partners in
MM-PUR, MM-IM, and MM-IV .
Configuration of Simplified Blocking and Deletion
To use SAP Information Lifecycle Management (ILM) to simplify the deletion of application-specific personal data,
you have to do the following:
● Activate the following business functions:
○ ILM-Based Deletion of Business Partner Data (BUPA_ILM_BF)
○ ILM-Based Deletion of Customer and Supplier Master Data (ERP_CVP_ILM_1)
○ Information Lifecycle Management (ILM)
● Perform the necessary customizing settings related to SAP Information Lifecycle Management (ILM) in
Customizing for SAP NetWeaver Application Server Basis Services Information Lifecycle
Management .
● Perform the necessary customizing settings related to the blocking and deletion of business partner master
data in Customizing for Cross-Application Components Data Protection .
● Run transaction ILMARA and maintain and activate the required audit areas for the ILM objects of the
application.
● Run transaction IRMPOL and maintain the required retention policies for the ILM objects of the application.
● Configure the settings related to the blocking and deletion of customer and supplier master data in
Customizing under Logistics - General Business Partner Deletion of Customer and Supplier Master
Data .
See Also
For general information about the deletion of personal data, see the following chapters in the product assistance
for SAP S/4HANA that is available on the SAP Help Portal at http://help.sap.com/s4hana
Product Assistance Cross Components :
● SAP Information Lifecycle Management
● Data Protection Deletion of Business Partner Customer and Supplier Master Data
● Data Protection Configuring Data Protection Features Activating Business Functions
Security Guide for SAP S/4HANA 1709
398 P U B L I C SAP S/4HANA Business Applications13.8.5 Specific Read Access Log Configurations
In Read Access Logging (RAL), you can configure which read-access information to log and under which
conditions.
SAP delivers sample configurations for applications.
Invoice Verification (MM-IV) logs data in order to track who has accessed the bank details in supplier invoices. You
can find the configurations as described in the Read Access Logging [page 29] chapter.
Fields are logged in the following configurations:
Table 232:
Channel Configuration Fields Logged
Dynpro Recording: IBAN
MM_IV/DPP_BANK SWIFT
BANKN
BANKA
SAP Gateway Service ID: IBAN
MM_SUPPLIER_INVOICE_MANAGE SWIFT
BANKN
BANKA
RFC Function modules: ADDRESSDATA-BANK_ACCT
BAPI_INCOMINGINVOICE_CHANGE ADDRESSDATA-BANK_CTRY
BAPI_INCOMINGINVOICE_CREATE ADDRESSDATA-BANK_NO
BAPI_INCOMINGINVOICE_CREATE1
BAPI_INCOMINGINVOICE_PARK
BAPI_INCOMINGINVOICE_SAVE
MRM_XMLBAPI_INCINV_CREATE
RFC Function modules: ADDRESSDATA-BANK_ACCT
BAPI_INCOMINGINVOICE_GETDETAIL ADDRESSDATA-BANK_CTRY
MRM_XMLBAPI_INCINV_GETDETAIL ADDRESSDATA-BANK_NO
RFC Function module: DOC_HEADER_LIST[]-BANKL
MRM_INVOICE_GETLIST DOC_HEADER_LIST[]-BANKN
DOC_HEADER_LIST[]-BANKS
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 399Channel Configuration Fields Logged
Web Service Interface name: SupplierInvoice/BillFromParty/BankAc
SupplierInvoiceERPByIDQueryResp countID
onse_In SupplierInvoice/BillFromParty/BankAc
countStandardID
SupplierInvoice/BillFromParty/BankIn
ternalID
SupplierInvoice/BillFromParty/Bank
Name
Read access logging can be switched on for the following apps of MM-IV:
● Enter Invoice (MIRO)
● Park Invoice (MIR7)
● Display Invoice Document (MIR4)
● Enter Invoice for Invoice Verification in Background (MIRA)
Read access logging can be switched on for the following SAP Fiori apps of MM-IV:
● Manage Supplier Invoices
● Create Supplier Invoice (Advanced)
13.8.6 Ariba Network Integration
If you want to use integration scenarios with the Ariba Network, see chapter “Business Network Integration” at
the end of this guide.
13.8.7 Supplier and Category Management
13.8.7.1 Authorizations
Supplier Information and Master Data uses the authorization concept provided by the SAP NetWeaver AS for
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Security Guide for SAP S/4HANA 1709
400 P U B L I C SAP S/4HANA Business ApplicationsNote
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Table 233:
Role Description
/SRMSMC/CATEGORY_MANAGER Category Manager
/SRMSMC/DNB_REQUESTOR Role for Requesting Reports from D&B
/SRMSMC/EVALUATION_APPRAISER Appraiser
/SRMSMC/ACTIVITY_MANAGER Activity Manager
/SRMSMC/ACTIVITY_PARTICIPANT Participant in Activity
/SRMSMC/QUESTIONNAIRE_MANAGER Questionnaire Manager
/SRMSMC/TRANSLATOR Translator
/SRMSMC/DISPLAY_ALL Display Role for All Objects in Supplier and Category Manage
ment
/SRMSMC/REPORT_EXEC_ADMIN Technical Role with Authorization to Start Reports in Supplier
and Category Management
/SRMSMC/BG_SUP_EVAL_BUYSIDE RFC Background Processing in Supplier Evaluation
We recommend that you do not assign the Appraiser and the Category Manager role to the same person. Under
exceptional circumstances, such as Category Managers filling out questionnaires for other colleagues, you can
grant both roles to the same person.
Note
Please note, that each user has to be assigned to a business partner Employee(I_EMPLOYEE)to have access to
Supplier and Category Management apps. You create a business partner role in the transaction Maintain HR
Master Data and assign it to a user in the transaction User Maintenance .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 401Authorization Objects Specific to Supplier Information and Master Data
The table below shows the security-relevant authorization objects that are specific to Supplier Information and
Master Data:
Table 234:
Authorization Object Field Value Description
/SRMSMC/DB ACTVT Reload Enables users to initiate a
download of up-to-date data
from D&B. Since downloading
data from D&B is subject to
charges, you should assign
this role only to employees
who are aware of this implica
tion.
Enables users to interact with
an instance of a business ob
ject of Supplier Information
and Master Data in a specific
way. The authorization object
is used in the /SRMSMC/
DNB_REQUESTOR role.
/SRMSMC/BO /BOFU/BO /SRMSMC/BO_QNR (Ques As the type of business object
tionnaire) that the user can access, you
/SRMSMC/BO_SEP can specify the values listed.
(Supplier
Evaluation Profile)
/SRMSMC/BO_SES (Supplier
Evaluation Scorecard)
/SRMSMC/BO_SEV (Supplier
Evaluation)
/SRMSMC/BO_SRS (Supplier
Evaluation Response)
/SRMSMC/MO_PUC (Purchas
ing Category)
/SRMSMC/MO_QLIB (Question
Library)
/SRMSMC/BO_ACT (Activity)
/SRMSMC/BO_TSK (Task)
/SRMSMC/MO_BUPA
Security Guide for SAP S/4HANA 1709
402 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
/SRMSMC/AM ACT_TYP Customizing, activity type This authorization object is
used to define authorization
settings for accessing activi
ties in SAP Supplier and Cate
gory Management.
Personalization Object “SLC: PFCG Role Attributes”
The personalization object SLC: PFCG Role Attributes (/SRMSMC/PFCG_ROLE_ATTRIBUTES) offers the following
checkboxes:
● Appraiser Role
● Category Manager Role
● Questionnaire Manager Role
● Activity Manager Role
● Activity Participant Role
Setting one of the above checkboxes in a role has the following effects on users to whom the role has been
assigned:
● The users can perform the activities intended for this role. Note that, in addition to the checkbox in the
personalization object, performing these activities also depends on the authorization objects assigned to the
role.
● Only users for whom the personalization object checkbox is selected are considered during a search, for
example for an appraiser or for a purchaser responsible.
Example:
For a user to be found in a search for a purchaser responsible, the Category Manager Role, the
Questionnaire Manager Role, or the Activity Manager Role checkbox is required, depending on the
process where the search is performed.
13.8.7.2 Internet Communication Framework Security (ICF)
You should only activate those services that are needed for the applications running in your system. For Supplier
Information and Master Data, the following services are needed:
● /sap/bc/ui5_ui5/sap/slc_qnr_resps1
● /sap/bc/ui5_ui5/sap/slc_eval_resps1
● /sap/bc/ui5_ui5/sap/slc_sup_evals1
● /sap/bc/webdynpro/srmsmc/WDA_I_BP_SUPPLIER
● /sap/bc/webdynpro/srmsmc/WDA_I_QNR_OVP
● /sap/bc/webdynpro/srmsmc/WDA_I_SEP_OVP
● /sap/bc/webdynpro/srmsmc/WDA_I_SES
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 403● /sap/bc/webdynpro/srmsmc/WDA_I_SEV_OVP
● /sap/opu/odata/sap/slc_questionnaire_response_srv
● /sap/opu/odata/sap/C_SUPLREVALRSPEVALUATEST_CDS
● /sap/opu/odata/sap/C_SUPLREVALRESPST_CDS
● /sap/bc/webdynpro/srmsmc/wda_puc
● /sap/bc/webdynpro/srmsmc/wda_puc_t
● /sap/bc/webdynpro/srmsmc/WDA_QLB_OVP_MAIN
● /sap/bc/webdynpro/srmsmc/WDA_QLB_OVP_TRNS
● /sap/bc/webdynpro/srmsmc/WDA_QNR_OVP_TRNS
● /sap/bc/webdynpro/srmsmc/wda_sep_ovp_trns
● /sap/bc/webdynpro/srmsmc/wda_act
● /sap/bc/webdynpro/srmsmc/wda_tsk
Use the transaction SICF to activate these services.
For more information about ICF security, see the respective chapter in the SAP NetWeaver Security Guide.
13.8.7.3 Data Storage Security
Cookies
Supplier Information and Master Data uses a Web Dynpro user interfaces. The SAP Web AS must issue cookies
and accept them.
Attachments
You restrict the allowed MIME types and the file size of attachments. You do this in Customizing for Materials
Management under Purchasing Supplier and Category Management for all business processes you want to
use. You can do this in the following Customizing activities:
● Define MIME Types for Attachments
● Define Maximum Size for Attachments
The above listed activities are available under each of the business processes nodes in Customizing.
For information about virus scanning for attachments, see Virus Scanning [page 21] and Application-Specific
Virus Scan Profile (ABAP) [page 404].
13.8.7.4 Application-Specific Virus Scan Profile (ABAP)
SAP provides an interface for virus scanners to prevent manipulated or malicious files from damaging the system.
To manage the interface and what file types are checked or blocked, there are virus scan profiles. Different
applications rely on default profiles or application-specific profiles.
Security Guide for SAP S/4HANA 1709
404 P U B L I C SAP S/4HANA Business ApplicationsThe Web Dynpro user interfaces of Supplier Information and Master Data require that you activate the virus scan
profile /SIHTTP/HTTP_UPLOAD.
You must make the settings for the virus scan profile in Customizing for Materials Management under
Purchasing Supplier and Category Management Virus Scan Interface
For more information about virus scanning, see Virus Scanning [page 21].
13.8.7.5 Deletion of Personal Data
Use
Supplier and Category Management might process data (personal data) that is subject to the data protection laws
applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking
and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP
Help Portal at http://help.sap.com/s4hana Product Assistance
Cross Components Data Protection .
Relevant Application Objects and Available EoP/WUC functionality
Supplier and Category Management uses the standard archiving and deletion functions that are available for the
business partner functionality. Therefore, there is no dedicated end of purpose check (EoP) nor a where-used
check (WUC) for Supplier and Category Management.
Table 235:
Application Provided Deletion Functionality
Supplier and Category Management Transaction used for deletion: SARA
Archiving object relevant for deletion: CA_BUPA
For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at http://
help.sap.com/s4hana Product Assistance Cross Components
Data Protection Archiving .
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of customer and supplier master data in
Customizing under Logistics General Business Partner Deletion of Customer and Supplier Master Data .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 405Display of Blocked Suppliers
If suppliers have been blocked, they can no longer be used in any Supplier and Category Management WebDynpro
applications. The supplier data is not deleted, but it is no longer visible. Any supplier-related entries are displayed
as Blocked Supplier and all supplier-related links are disabled. Evaluation scorecards for the blocked suppliers are
not displayed in the scorecards list in the Display Scorecards app.
This change is relevant for the following apps:
● Manage Activities
● Monitor Tasks
● Manage Templates
Supplier blocking via CDS view functions in the following apps:
● Manage Purchasing Categories
● Display Scorecards
● Quick Create for Procurement-Related Activities
● Open Activities card on the Procurement Overview Page
● Monitor Responses
● Evaluate Suppliers
● Monitor Responses
13.8.8 Integration
13.8.8.1 SAP S/4HANA Procurement Hub Integration
SAP S/4HANA currently supports integration with the SAP ERP back-end systems.
13.8.8.1.1 Direct Connectivity
The SAP S/4HANA hub system communicates with the connected SAP ERP back-end systems through XML
messages using peer-to-peer connectivity options in an asynchronous mode.
Security Guide for SAP S/4HANA 1709
406 P U B L I C SAP S/4HANA Business Applications13.8.8.1.2 Mediated Connectivity
For mediated connectivity, the SAP S/4HANA hub system is connected through SAP NetWeaver PI. The
communication with the connected SAP ERP back-end systems is performed through XML messages in
asynchronous mode.
13.8.8.1.3 Roles and Authorizations in the SAP S/4HANA Hub
System
To process messages coming from the SAP ERP back-end systems, a technical user is needed in the SAP S/
4HANA hub system.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. To
maintain roles for ABAP technology, you use the profile generator (transaction PFCG).
Note
For more information about creating roles, see Role Maintenance.
The table below shows the security-relevant authorization objects that the technical user needs:
Table 236: Roles and Authorizations in the SAP S/4HANA Hub System
Authorization Object Field Value Description
S_RFC RFC_TYPE Function Module Type of RFC object for which
access is to be allowed
RFC_NAME /IWNGW/ Name of RFC object for which
FM_IN_CREATE_NOTIF access is allowed
/IWNGW/
FM_IN_DELETE_NOTIF
ACTVT Execute Activity
S_SERVICE SRV_NAME WS Program, transaction, or
PURCHASEREQUISITIONR function module name
EPLICATIO3/
PURCHASE_REQUISITION
_REPLICATI
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 407Authorization Object Field Value Description
WS
PURCHASEREQUISITIONR
EPLICATION/
PURCHASE_REQUISITION
_REPLICATI
WS
PURCHASEREQUISITIONS
OURCINGNO1/
PURCHASE_REQUISITION
_SOURCING
/AIF/PROC SRV_TYPE Hash Value for Type of check flag and au
External Service thorization for default values
ACTVT Import, Export, Activity
Resubmit
/AIF/NS /MMHUB Namespace
/AIF/IF PRRECOIN, PRSRCNOTIN Interface Name
/AIF/IFVER * Interface Version
/AIF/VNS * Variant Namespace
/AIF/VNAME * Name of Interface Variant
13.8.8.1.4 Roles and Authorizations in the SAP ERP Back-end
System
You can activate Forward Error Handling (FEH) to monitor and process purchase requisitions that fail to copy be
copied to the SAP ERP back-end system.
Users that process entries in FEH need specific authorizations assigned to their users , as well as the following
authorization objects:
Table 237:
Authorization Object Description
S_FEH_INTF Interface-specific authorization for FEH
/SAPPO/FLT Postprocessing Order Filter
Security Guide for SAP S/4HANA 1709
408 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
/SAPPO/ORD Postprocessing Order (DISPLAY and EDIT)
/SAPPO/WLA Assignment of Worklist
13.8.9 Commodity Procurement
13.8.9.1 Deletion of Personal Data
Use
Commodity Procurement and Commodity Sales might process data (personal data) that is subject to the data
protection laws applicable in specific countries as described in SAP Note 1825544 .
For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal under Product
Assistance Cross Components Data Protection .
Please note that Commodity Procurement and Commodity Sales do not use SAP Information Lifecycle
Management (ILM).
Relevant Application Objects and Available Deletion Functionality
Table 238:
Application Objects Provided Deletion Functionality
BRFplus Decision Table Entries for CPE Formula Assembly See Section BRFplus Decision Table Entries for CPE Formula
Assembly below
Pricing Condition Records in CPE Formula Assembly See section Pricing Conditon Records for CPE Formula Assem
bly below
Records of Versioned Logistics Pricing Data Persistency See section Versioned Logistics Pricing Data Persistency be
low
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 409BRFplus Decision Table Entries for CPE Formula Assembly
In the Commodity Pricing Engine (CPE), the Formula Assembly (FA) is used for logistics document items like sales
order items or purchase order items to create default settings as, for example, the formula ID. These settings
depend on properties of the underlying logistics document such as the vendor/customer, organizational and
material data.
The Business Rules Framework plus (BRFplus) is used to implement rules for entering these settings. To use
decision tables in BRFplus (as recommended by SAP), the required BRFplus content is provided (BRFplus
application, BRFplus functions which use BRFplus decision tables). The standard content includes, for example,
decision tables, which require customer or vendor, material and other input fields, and the formula ID as result
field. Decision tables can contain customer or vendor data, which eventually need to be deleted.
In the deletion report RCPE_BRF01 (Delete BRFplus Decision Table Entries for CPE Formula Assembly) you enter a
selected customer or vendor. When selecting the test mode, the report checks, whether the entered customer or
vendor exists in the system, and whether he is blocked. After this, the report checks all BRFplus decision tables in
BRFplus applications used for the Formula Assembly, and displays the respective row numbers of the BRFplus
decision tables and the column containing the selected customer or vendor. If the Test Mode flag is not set, the
report deletes all entries found, and creates an application log entry for object CMM and subobject DPP_FA_BRF
(transaction SLG1).
The Customizing settings can be found in the SAP Implementation Guide under Sales and Distribution Basic
Functions Commodity Pricing Settings for Formula Assembly Assign BRFplus Application to Pricing
Procedure or Materials Management Purchasing Commodity Pricing Settings for Formula Assembly
Assign BRFplus Application to Pricing Procedure .
Pricing Condition Records in CPE Formula Assembly
1. Precheck
Condition records are stored in table /1CN/CVFSAPI0FOR and used for the formula key determination. To
check all tables of the formula assembly for customers or vendors used, enter the prefixes /1CN/CVF for
Commodity Sales and /1CN/CMF for Commodity Procurement.
To check and process pricing conditions for the formula assembly, you can use the transactions
MCPE_FA_GCM (for Commodity Procurement) and VCPE_FA_GCM (for Commodity Sales).
2. Deletion
To delete entries for a selected customer or vendor, perform report RCPE_CT01.
Select, for example, table /1CN/CVFSAPI0FOR as identified in the step before, and enter the customer for a
Commodity Sales-relevant table. When choosing the test mode, the report will display all entries of
table /1CN/CVFSAPI0FOR, which would be deleted.
To display deleted entries, perform transaction SLG1 for object CMM and subobject DDP_FA_AP.
To delete all entries of the selected table , select the Delete complete content indicator.
Note: Condition tables used for the CPE Formula Assembly must allways be selected and processed
individually.
Security Guide for SAP S/4HANA 1709
410 P U B L I C SAP S/4HANA Business ApplicationsVersioned Logistics Pricing Data Persistency
Transaction CMM_DEL_DOC_VERSIONS allows you to delete all records of the versioned logistic pricing data
persistency (table CMM_VLOGP), which are stored for a certain blocked customer/vendor.
Transaction CMM_DEL_DOC_VERSIONS allows you to update all records of the versioned logistic pricing data
persistency (table CMM_VLOGP), which are stored for a certain blocked customer/vendor in a way that the
identifier of the respective customer/vendor is masked with a blank space.
The authorization to perform this transaction is checked by the authorization object S_TCODE, and explicitly in
the underlying report. It is ensured that, even if the report is performed by transaction SA38, only authorized
experts can execute it. In addition, the authorization object CMM_VLOGP is checked by activity 06 (Delete). This
enables the authorized user to delete records from the versioned logistic pricing data persistency (table
CMM_VLOGP).
Note: It is checked, whether the entered customer is used as Sold-to-Party and/or Ship-to-Party. Records are
deleted and masked accordingly.
This transaction must be performed to mask or to delete records as soon as a certain customer or vendor is
blocked.
Relevant Application Objects and Available EoP/WUC Functionality
Table 239:
Application Implemented Solution (EoP or WUC) Further Information
n/a n/a n/a
13.8.9.2 Information Report
Use
Commodity Procurement and Commodity Sales provide information about stored personal data in the versioned
persistency of logistics pricing data (VLOGP).
Versioned Persistency of Logistics Pricing Data
To display information about stored personal data in in the versioned persistency of logistics pricing data (VLOGP)
of Commodity Procurement and Commodity Sales, run transaction CMM_DEL_DOC_VERSIONS.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 411The authorization to perform this transaction is checked by the authorization object S_TCODE, and in the
underlying report. It is ensured that, even if the report is launched by transaction SA38, only authorized experts
can execute it.
In case of blocked customers, vendors, business partners, the authorization object B_BUP_PCPT (actvitity 03) is
additionaly checked.
Table 240:
Table / Business Object Archiving Object Personal Data
CMM_VLOGP n/a LIFNR, KUNNR, KUNWE
13.9 Supply Chain
13.9.1 Deletion of Personal Data (Returnable Packaging
Logistics)
Use
Returnable Packaging Logistics might process data (personal data) that is subject to the data protection laws
applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking
and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP
Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data
Protection .
Security Guide for SAP S/4HANA 1709
412 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application Objects and Available Deletion Functionality
Table 241:
Application Provided Deletion Functionality
Returnable Packaging Logistics (IS-A-RL) Archiving Object
VHURL_AC
VHURL_CP
VHURL_PO
VHURL_ST
VHURL_TR
Destruction Objects
VHURL_CP_DESTRUCTION
VHURL_RR_DESTRUCTION
ILM Objects
VHURL_AC
VHURL_PO
VHURL_ST
VHURL_TR
VHURL_CP_DEST
VHURL_RR_DEST
Relevant Application Objects and Available EoP/WUC functionality
Table 242:
Application Implemented Solution (EoP or WUC) Further Information
Returnable Packaging Logistics (IS-A- EoP check Checks tables:
RL) RLACCT, RLPSHPA, RLPSHP
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection→Blocking and Unblocking of Data→Customer Master/Supplier
Master Deletion.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 41313.9.2 Efficient Logistics and Order Fulfillment
13.9.2.1 Inventory Management
13.9.2.1.1 Authorizations in Inventory Management
Inventory Management uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore,
the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide
ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Table 243:
Role Description
SAP_BR_INVENTORY_MANAGER Inventory Manager
SAP_BR_WAREHOUSE_CLERK Warehouse Clerk
SAP_BR_INVENTORY_ACCOUNTANT Inventory Accountant
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Security Guide for SAP S/4HANA 1709
414 P U B L I C SAP S/4HANA Business ApplicationsTable 244:
Authorization Object Field Description
M_ISEG_WDB Activity Phys. Inv: Difference Posting in Plant
Plant
M_ISEG_WIB Activity Phys. Inv: Phys. Inv Document in Plant
Plant
M_ISEG_WZL Activity Phys. Inv: Count in Plant
Plant
M_ISEG_WZB Activity Phys. Inv: Count and Difference Posting
in Plant
Plant
M_MSEG_BMB Activity Material Documents: Movement Type
Movement Type (Inventory Manage
ment)
M_MBNK_ALL Activity Material Documents: Number Range
Maintenance
M_MSEG_WMB Activity Material Documents: Plant
Plant
M_MRES_BWA Activity Reservations: Movement Type
Movement Type (Inventory Manage
ment)
M_MRES_WWA Activity Reservations: Plant
Plant
M_MWOF_ACT Activity Control for Split Valuation of Value
(MBWO)
M_SKPF_VGA Activity Inventory Sampling: Transaction
Transaction for Inventory Sampling
M_SKPF_WRK Activity Inventory Sampling: Plant
Plant
M_MSEG_BWA Activity Goods Movement: Movement Type
Movement Type (Inventory Manage
ment)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 415Authorization Object Field Description
M_MSEG_LGO Activity Goods Movement: Storage Location
Plant
Storage Location
Movement Type (Inventory Manage
ment)
M_MSEG_WWA Activity Goods Movements: Plant
Plant
M_MSEG_BWF Activity Goods Receipt for Production Order:
Movement Type
Movement Type (Inventory Manage
ment)
M_MSEG_WWF Activity Goods Receipt for Production Order:
Plant
Plant
M_MSEG_BWE Activity Goods Receipt for Purchase Order:
Movement Type
Movement Type (Inventory Manage
ment)
M_MSEG_WWE Activity Goods Receipt for Purchase Order: Plant
Plant
13.9.2.1.2 Deletion of Personal Data
Use
The Materials Management application might process data (personal data) that is subject to the data protection
laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the
blocking and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on
the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data
Protection .
Relevant Application Objects and Available Deletion Functionality
Table 245:
Application Object Detailed Description Provided Deletion Functionality
Physical Inventory Documents Archiving Physical Inventory Documents Archiving object MM_INVBEL
(MM-IM)
Security Guide for SAP S/4HANA 1709
416 P U B L I C SAP S/4HANA Business ApplicationsApplication Object Detailed Description Provided Deletion Functionality
Special Stocks Archiving Special Stock Records (LO- Archiving object MM_SPSTOCK
MD-MM)
Empties Management Archiving of Empties Update Archiving object BEV1_EMFD
Relevant Application Areas and Available EoP Functionality
Table 246:
Application Implemented Solution Further Information
Materials Management (MM) End of purpose check (EoP) This includes the business in the areas
of:
● External Services Management
(MM-SRV)
● Inventory Management (MM-IM)
● Logistics Invoice Verification (MM-
IV)
● Empties Management (MM-PUR-
EM)
For more information about the end of
purpose check, see the product assis
tance for SAP S/4HANA on the SAP
Help Portal at http://help.sap.com/
s4hana_op_1709 under Product
Assistance Enterprise Business
Applications Sourcing and
Procurement Materials Management
(MM) Data Blocking End of Purpose
(EoP) Check for Business Partners in
MM-PUR, MM-IM, and MM-IV .
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management in Customizing for Cross-Application Components under
Data Protection Authorization Management . For more information, see the Customizing
documentation.
● Define the settings for blocking in Customizing for Cross-Application Components under Data Protection
Blocking and Unblocking Business Partner .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 41713.9.2.2 Authorizations in Logistics Execution
Logistics Execution uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore, the
recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP
also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Table 247: Roles for Shipping
Role Description
SAP_BR_SHIPPING_SPECIALIST Coordinates outgoing deliveries and ensures the accurate and
timely shipment of goods to customers.
SAP_BR_RECEIVING_SPECIALIST Coordinates incoming deliveries and ensures that all received
goods are inspected and put away in a timely manner.
Table 248: Roles for Decentralized Warehouse Management and Transportation
Role Description
SAP_LE_TMS_ARCHIVING Archiving of Transportation and Shipment Cost Documents
SAP_LE_TMS_BACKGROUND Background Transactions in Shipment
SAP_LE_TMS_CAPACITY_ANALYSIS Perform Analyses for Utilization and Free Capacity
SAP_LE_TMS_CARRIER_WEB Internet Transactions for the Forwarding Agent
SAP_LE_TMS_CURRENT_ANALYSIS Perform Current Evaluations for Shipments
SAP_LE_TMS_DISPLAY Display Documents in Shipment
SAP_LE_TMS_EXECUTION Execute Planned Shipments
SAP_LE_TMS_EXTERNAL_TPS Interface to External Transportation Planning System
SAP_LE_TMS_MAINTAIN_SCD Create, Process, and Display Shipment Costs
Security Guide for SAP S/4HANA 1709
418 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_LE_TMS_MAINTAIN_SCD_COND Maintain Conditions in Shipment Costs Environment
SAP_LE_TMS_MAINT_SHP_MASTER Maintain Master Data in the Transportation Environment
SAP_LE_TMS_MONITOR_PLANNING Monitor Shipment Planning
SAP_LE_TMS_MONITOR_SHPCOSTS Monitor Shipment Costs Calculation and Settlement
SAP_LE_TMS_OTHERS Other Transportation Transactions (Without Composite Role)
SAP_LE_TMS_PLANNING Create, Change, and Display Shipments
SAP_LE_TMS_RULES Define Rules for Multiple Shipment Creation
SAP_LE_TMS_STATISTIC_ANALYSIS Perform Statistical Analyses for Shipments
SAP_LE_TMS_TP_SERVICE_AGENT Interface for Shipment Planning in Cooperation with Forward
ing Agents
SAP_LE_WMS_APPOINTMENTS Door Appointments
SAP_LE_WMS_CYCLE_COUNTING Perform Cycle Counting in WM
SAP_LE_WMS_INFORMATION Warehouse Information
SAP_LE_WMS_LIS_STATISTICS LIS WM Statistics Data
SAP_LE_WMS_LOAD Workload in Warehouse
SAP_LE_WMS_MONITORING Warehouse Monitoring
SAP_LE_WMS_ONE_TIME_TASK One-Time Tasks in WM
SAP_LE_WMS_PC_PROCESSING Edit Posting Change Notice in WM
SAP_LE_WMS_PHYS_INVENTORY Physical Inventory in WM
SAP_LE_WMS_PHYS_INVENTORY_CNT Physical Inventory Count in WM
SAP_LE_WMS_PHYS_INVENTORY_MON Physical Inventory Analysis and Monitoring in WM
SAP_LE_WMS_QUALITY_MANAGEMENT WM Quality Management
SAP_LE_WMS_R2R3_COUPLING R/2-R/3 Coupling in WM
SAP_LE_WMS_REPLENISHMENT_WMPP Replenishment WM-PP
SAP_LE_WMS_REPLENISH_INTERNAL Internal WM Replenishment
SAP_LE_WMS_RF_ADMIN Administration of Radio Frequency Link in WM
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 419Role Description
SAP_LE_WMS_RF_PROCESSING Radio Frequency (RF) in WM
SAP_LE_WMS_STATISTICS Analysis in WM
SAP_LE_WMS_STOCK_ADJUSTMENTS Stock Adjustment WM-IM
SAP_LE_WMS_TO_EXCEPTION_HANDL Exception Handling of Transfer Orders in WM
SAP_LE_WMS_TO_PREPARATION Transfer Order Processing in WM
SAP_LE_WMS_TR_PROCESSING Transfer Requirement Processing in WM
SAP_LE_WMS_WHSE_MAINTENANCE Warehouse Maintenance
/SAPMP/RTS Controls whether a user can assign reel type for a plant.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 249: Standard Authorization Objects: Decentralized Warehouse Management
Authorization Object Description
L_BWLVS Movement Type in the Warehouse Management System
L_LGNUM Warehouse Number/Storage Type
L_SFUNC Special Functions in Warehouse Management
L_TCODE Transaction Codes in the Warehouse Management System
Table 250: Standard Authorization Objects: Transportation
Authorization Object Description
V_VFKK_FKA Shipment Cost Processing: Auth. for Shipment Cost Type
V_VTTK_SHT Shipment Processing: Authorization for Shipment Type
V_VTTK_TDL Shipment Processing: Authorization for Forwarding Agents
V_VTTK_TDS Shipment Processing: Auth. for Transport Planning Points
V_VTTK_TSA Transportation Proc.: Authorization for Shipment Type Status
Security Guide for SAP S/4HANA 1709
420 P U B L I C SAP S/4HANA Business ApplicationsTable 251: Standard Authorization Objects: Shipping
Authorization Object Description
V_LECI_CKP Checkpoint: Authorization for Checkpoint
V_LIKP_VST Delivery: Authorization for Shipping Points
V_VBSK_GRA Deliveries: Authorization for Delivery Group Type
13.9.2.3 Direct Store Delivery
13.9.2.3.1 Deletion of Personal Data
Use
The Direct Store Delivery application might process data (personal data) that is subject to the data protection
laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the
blocking and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on
the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data
Protection .
Table 252: Relevant Application Objects and Available Deletion Functionality
Application Object Detailed Description Provided Deletion Functionality
Visit List Archiving Visit Lists (LE-DSD) Archiving object /DSD/VL
Settlement Documents Archiving Settlement Documents (LE- Archiving object /DSD/SL
DSD)
DEX Archiving DEX Streams (LE-DSD) Archiving object /DSD/DEX
Route Settlement Data destruction in Route Settlements Destruction object /DSD/
(LE-DSD) HH_RAHD_DESTRUCTION
DSD Connector Data destruction in DSD Connector (LE- Destruction object /DSD/
DSD) ME_TOUR_HD_DESTRUCTION
DSD Loading Data destruction in DSD Loading (LE- Destruction object /DSD/
DSD) SV_LC_HD_DESTRUCTION
Visit Plan Data destruction in Visit Plants (LE- Destruction object /DSD/
DSD) VC_VPH_DESTRUCTION
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 421Application Object Detailed Description Provided Deletion Functionality
Deal Conditions Data destruction in Deal Conditions (LE- Destruction object /DSD/
DSD) PR_HEAD_DESTRUCTION
Relevant Application Objects and Available EoP Functionality
Table 253:
Application Implemented Solution (EoP or WUC) Further Information
Logistics Execution (LE) EoP check This includes the business in the areas
of:
● Direct Store Delivery (Backend)
(LE-DSD)
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management in Customizing for Cross-Application Components under
Data Protection Authorization Management . For more information, see the Customizing
documentation.
● Define the settings for blocking in Customizing for Cross-Application Components under Data Protection
Blocking and Unblocking Business Partner .
13.9.2.4 Internet Communication Framework Security (ICF)
You should only activate those services that are needed for the applications running in your system. For Logistics
Execution, the following services are needed:
● LECI
● VL31W
● VL32W
● VLPODW1
● VLPODW2
Use the transaction SICF to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
Security Guide for SAP S/4HANA 1709
422 P U B L I C SAP S/4HANA Business ApplicationsFor more information about ICF security, see the respective chapter in the SAP NetWeaver Security Guide.
13.9.3 Extended Warehouse Management
13.9.3.1 Authorizations
Extended Warehouse Management (EWM) uses the authorization concept provided by the SAP NetWeaver AS for
ABAP or AS Java. Therefore, the recommendations and guidelines for authorizations as described in the SAP
NetWeaver AS Security Guide ABAP and SAP NetWeaver AS Security Guide Java also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s
user administration console on the AS Java.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Authorization Objects
To gain an overview of the authorization objects for EWM, proceed as follows:
1. Open transaction AUTH_DISPLAY_OBJECTS to display active authorization objects.
2. In the overview, expand the following subtree of authorizations related to EWM.
1. Authorizations Extended Warehouse Management (SCWM)
2. Dock Appointment Scheduling (SCDS)
3. Authorizations SCM Basis (SCMB)
4. Master Data Authorization Objects (SCMD)
If you want to display the technical names of the authorization objects, choose Edit Technical Names
On .
3. If you want to get a detailed description, choose the Information button next to the authorization object you
are interested in.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 423Warehouse-Based Authorization
Warehouse-Specific Field in Authorization Objects
If you have multiple warehouses modelled in EWM, you may need people working in one warehouse to be able to
access data from another warehouse. Many authorization objects in EWM contain a specific authorization field for
this purpose, for example:
● /SCWM/LGNU (Warehouse Number/Warehouse Complex)
This is the most commonly used authorization field. It is used, for example, in EWM monitor authorization
object /SCWM/MO.
● /SCWM/ORG (Location/Organizational Unit)
● /SCMB/LGNU (Warehouse Number/Warehouse Complex)
Warehouse in Customizing or Administration
In other cases, such as in administration or Customizing, EWM does not use specific authorization objects.
Instead, you can use generic authorization objects to limit the access to tables and views, for example:
● S_TABU_NAM (Table Access by Generic Standard Tools)
● S_TABU_LIN (Authorization for Organizational Unit)
Example
The Customizing activity Define Storage Bin Types has the assigned Customizing object /SCWM/T303. The
underlying database table /SCWM/T303 contains field LGNUM (warehouse number) with data element /SCWM/
LGNUM (Warehouse Number/Warehouse Complex). You can use generic authorization objects to limit the access
to tables and views, as follows:
● Use authorization object S_TABU_NAM to limit access to Customizing object /SCWM/T303.
● Use authorization object S_TABU_LIN to limit access based on organizational criteria.
You can also use authorization field ORG_CRIT (Organization Criterion for Key-Specific Authorization) and use
value /SCWM/LGNU (Warehouse Number/Warehouse Complex) to be able to enter a warehouse in
ORG_FIELD1.
For more information, see the documentation of authorization objects S_TABU_NAM and S_TABU_LIN in
transaction SU21.
BRFplus
BRFplus is sometimes used in EWM, for example, in Labor Management. However, BRFplus does not recognize
organizational units such as the warehouse. Therefore, if BRFplus entities should be separated based on
warehouse, you must consider this during the implementation phase so that you can use alternative BRFplus
mechanisms.
For information about the authorization concept of BRFplus, see SAP Library for SAP NetWeaver at https://
help.sap.com/netweaver. In SAP Library, search for Business Rule Framework plus (BRFplus) and then choose
Concepts Authorizations .
Security Guide for SAP S/4HANA 1709
424 P U B L I C SAP S/4HANA Business ApplicationsCritical Combinations
Appointment Planner for Carrier
Note
These authorizations are relevant only if you are using SAP Dock Appointment Scheduling.
SAP Dock Appointment Scheduling offers a collaboration scenario where appointment planners for carriers can
log on to the SAP Dock Appointment Scheduling system, and view and maintain appointments for their carrier.
Since this potentially means that employees of a different company access SAP Dock Appointment Scheduling
from outside the company network, you must put a special focus on authorizations. This kind of user should have
very limited authorizations. As well as this, they should be able to access data of their own carrier only, and not be
able to access other carriers’ data. They should not be able to see internal data, like overall capacities of loading
points. Therefore, you must be very careful and restrictive when assigning roles and authorizations to this kind of
user.
SAP Dock Appointment Scheduling delivers a special authorization field for this.
Note
We recommend that you define, in the roles, the loading points for which a user may view or create
appointments. You can do this in the Loading Point authorization field (/SCWM/DSLP) in the authorization
objects Loading Appointment (/SCWM/DSAP) and Slot (/SCWM/DSSL).
In addition, the authorization field User Process Scope for Dock Appointment Scheduling (/SCWM/DSPS) is very
important. It is available on the Loading Appointment and Slot authorization objects. For appointment planners
for carriers, set this field to Scope for an Appointment Planner for Carrier. This ensures that this user can create
and view appointments only for the carrier that is assigned to him or her. Otherwise such a user could create
appointments for any carrier.
Warehouse Management Monitor: Authorization to Display Batch Execution Data
In the warehouse management monitor (/SCWM/MON), you can execute selections using batch jobs. You can view
the results in the warehouse management monitor. During the selection, the system performs the normal
authorization checks and selects and stores only data for which the user has authorization in the data containers
for the warehouse management monitor. But if these data containers are then displayed by other users, the
system does not perform these authorization checks. Therefore, you should only grant the authorization to
display batch execution data for monitor nodes or users where these checks are not critical.
The authorization object used for the authorization to display batch execution data in the warehouse
management monitor is /SCWM/DATC. For more information about this authorization object and the warehouse
management monitor, see SAP Library for SAP S/4HANA at https://help.sap.com/s4hana . In SAP Library,
choose SAP S/4HANA Enterprise Business Applications Supply Chain Extended Warehouse Management
Monitoring Warehouse Management Monitor .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 425Maintaining Authorizations for Integration with SAP Components
Maintaining Authorizations for Integration of EWM Within Supply Chain
Note
This is not relevant for standalone SAP Dock Appointment Scheduling.
For the integration of EWM within Supply Chain, that is, with Logistics Execution (LE) and Logistics – General
(LO), use the authorization roles for the remote function call (RFC) destination users. For more information about
these roles, see SAP Library for SAP S/4HANA at https://help.sap.com/s4hana . In SAP Library, choose
SAP S/4HANA Enterprise Business Applications Supply Chain Extended Warehouse Management
Roles for Extended Warehouse Management (EWM) .
For the integration from Supply Chain to EWM, for example, the role /SCWM/ERP_EWM_INTEGRATION exists. For
the integration from EWM to Supply Chain, the corresponding RFC users also require the proper authorizations.
For more information, see SAP Note 2081387 .
In some cases, for example, for migration functions like transaction /SCWM/MIG_PRODUCT, the RFC enabled
function module RFC_READ_TABLE is called on the Supply Chain side from EWM. For such scenarios, the
corresponding RFC user requires this authorization. To avoid misuse, you should restrict the tables to be
accessed to a minimum. You can therefore use the authorization objects S_TABU_NAM or S_TABU_DIS.
If you grant the usage of RFC function RFC_READ_TABLE to an RFC user, it is very important that you restrict the
tables that can be accessed to a minimum to avoid misuse.
Maintaining Authorizations for Data Transfer to SAP Business Warehouse
Note
This is not relevant for standalone SAP Dock Appointment Scheduling.
You can exclude DataSources from the extraction to SAP Business Warehouse (SAP BW).
Data that is stored in the extraction structure of this DataSource cannot be transferred to SAP BW.
1. In Customizing for Extended Warehouse Management, choose Integration with Other SAP Components
Data Transfer to Business Warehouse General Settings Limit Authorizations for Extraction .
2. Choose New Entries and choose a DataSource that you want to exclude from the extraction.
3. Choose the SAP BW system for which you want no more data for this DataSource to be extracted.
4. In the Ex. Extr. field, enter whether or not you want to exclude the DataSource from the extraction.
5. Save your entries and specify a transport request.
Maintaining Authorizations for Data Transfer Between Shipping and Receiving (EWM) and SAP
Dock Appointment Scheduling
Note
This is not relevant for standalone SAP Dock Appointment Scheduling.
SAP Dock Appointment Scheduling and Shipping and Receiving (S&R) are two independent components. But it is
also possible to integrate the components, for example, so that the system communicates appointment status
Security Guide for SAP S/4HANA 1709
426 P U B L I C SAP S/4HANA Business Applicationschanges in SAP Dock Appointment Scheduling to S&R and appointment status changes in S&R to SAP Dock
Appointment Scheduling. For more information, see SAP Library for SAP S/4HANA at https://help.sap.com/
s4hana . In SAP Library, choose SAP S/4HANA Enterprise Business Applications Supply Chain
Extended Warehouse Management SAP Dock Appointment Scheduling Integration with SAP EWM .
For integration between SAP Dock Appointment Scheduling and S&R, the system uses queued RFC (qRFC)
technology.
Using Standard Roles for SAP Dock Appointment Scheduling to EWM Integration
For the integration from SAP Dock Appointment Scheduling to S&R, the technical role /SCWM/
DAS_TO_EWM_INTEGRATION is available. It contains the necessary authorizations to update the relevant S&R
objects. The role does not contain any menu entries or transactions, as it is only a technical role for RFC
communication. You must assign this role to the SAP Dock Appointment Scheduling user or RFC user, depending
on if you use RFC communication, with which the integration is done.
Maintaining RFC Authorizations for Internal Communication in EWM
For RFC communication, users usually require the authorizations for authorization object S_RFC. As RFCs are
potential security risks, you should be very restrictive in granting them. In certain cases, EWM also uses RFCs for
internal purposes, for example for parallel processing or for asynchronous communication. For these purposes,
no RFC authorizations have to be granted as these calls are within the SAP S/4HANA system.
EWM also uses specific RFC-enabled function modules, which are used to extract content from qRFCs. For
example, these function modules are used to extract the warehouse number or delivery number from qRFCs.
These function modules do not perform data changes in EWM and also do not return data to a caller. They are
required for delivery processing and for displaying of message queue entries in the warehouse management
monitor.
The function modules are in the following special function groups:
● /SCWM/CORE_MQ_REPLAY (Message Queue Moni: Replay Functions)
● /SCWM/CORE_RF_MQ_REPLAY (Replay Function Modules for RF)
● /SCWM/DELIVERY_MQ_REPLAY (Replay Function Modules for Deliveries)
● /SCWM/ERP_MQ_REPLAY (Replay Function Modules - ERP Interface)
● /SCWM/SR_MQ_REPLAY (Replay Function Modules - S&R)
● /SCWM/VAS_MQ_REPLAY (Replay Function Modules for VAS)
● /SCWM/WC_SERVICE_MQ_REPLAY (Replay Function Modules for Workcenter)
● /SCWM/WAVE_MGMT_MQ_REPLAY (Replay Function Modules for Wave)
If you use the message queue monitor node in the warehouse management monitor, you must add these function
groups to authorization S_RFC. Use the activity Execute (16) and the Function Group (FUGR) type of RFC object.
For delivery and warehouse task processing, for example, confirming and creation of warehouse tasks, you must
add the function group /SCWM/DELIVERY_MQ_REPLAY (Replay Function Modules for Deliveries) to authorization
S_RFC.
These authorizations are already in the standard roles in EWM, so they are only relevant if you create your own
roles.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 42713.9.3.2 Internet Communication Framework Security (ICF)
You should only activate those services that are needed for the applications running in your system. For this area
the following services are needed:
● /sap/bc/gui/sap/its/scwm/rfui
This service can be used, for example, to allow warehouse workers to use transaction /SCWM/RFUI from
mobile applications. The service can be accessed from the SAP console or by using ITS mobile. For more
information, see SAP Library for SAP S/4HANA at https://help.sap.com/s4hana . In SAP Library choose
SAP S/4HANA Enterprise Business Applications Supply Chain Extended Warehouse Management
Radio Frequency Framework Work Processing Using Radio Frequency Resource Management Using Radio
Frequency .
● /sap/bc/webdynpro/scwm/
In this path various Web Dynpro user interfaces (UIs) for Extended Warehouse Management as well as for
SAP Dock Appointment Scheduling are contained.
● /sap/bc/srt/xip/scwm
Contains services which are used for SAP Process Integration communication.
● /sap/bc/srt/rfc/scwm
Contains services which are used for remote function call (RFC) communication. For example,
RFID_AII_EWM which is used to exchange radio frequency identification information with SAP Auto-ID
Infrastructure (SAP AII).
Use the transaction SICF to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information about ICF security, see the respective chapter in the SAP NetWeaver Security Guide.
13.9.3.3 Data Storage Security
Using Logical Path and File Names to Protect Access to the File System
Extended Warehouse Management (EWM) saves data in files in the file system. Therefore, it is important to
explicitly provide access to the corresponding files in the file system without allowing access to other directories
or files (also known as directory traversal). This is achieved by specifying logical paths and file names in the
system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
Security Guide for SAP S/4HANA 1709
428 P U B L I C SAP S/4HANA Business ApplicationsThe following lists show the logical file names and paths used by EWM and for which programs these file names
and paths apply:
Logical File Names Used
The following logical file names have been created in order to enable the validation of physical file names:
● EWM_PI_DOWNLOAD
○ Transactions or programs using this logical file name and parameters used in this context:
○ Transaction /SCWM/PI_DOWNLOAD
○ Program /SCWM/R_PI_STOCK_DWNLD
○ Parameters used in this context:
○ = Warehouse number (CHAR 4)
○ = Counter (NUM2)
○ Logical file path used: EWM_GLOBAL_PATH
Note
The logical filename is fixed and cannot be changed. The logical file contains a physical filename. The
logical file path contains a physical path. The validation and alias definition do not apply for this logical
filename.
● EWM_PI_UPLOAD
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/PI_UPLOAD
○ Program /SCWM/R_PI_FILEUPLD
○ Parameters used in this context:
○ = Warehouse number (CHAR 4)
○ = Creation Date (DATS8)
○ = Counter (NUM2)
○ Logical file path used: EWM_GLOBAL_PATH
Note
The logical filename is fixed and cannot be changed. The logical file contains a physical filename. The
logical file path contains a physical path. The validation and alias definition do not apply for this logical
filename.
● EWM_STOCK_UPLOAD
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/ISU
○ Program /SCWM/R_INITIALSTOCKUPLOAD
○ Parameters used in this context: = Warehouse number (CHAR 4)
○ Logical file path used: EWM_STOCK_UPLOAD_PATH
● EWM_STOBIN_UPLOAD
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 429○ Transactions or programs using this logical file name:
○ Transaction /SCWM/SBUP
○ Program /SCWM/TLAGP_UPLOAD
○ Logical file path used: EWM_STOBIN_UPLOAD_PATH
● EWM_STOBIN_SORT_UPLOAD
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/SRTUP
○ Program /SCWM/TLAGPS_UPLOAD
○ Logical file path used: EWM_STOBIN_SORT_UPLOAD_PATH
● EWM_MS_RESULT
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/MS_RESULT
○ Program /SCWM/R_MS_RESULT_READ
○ Parameters used in this context: = Warehouse number (CHAR 4)
○ Logical file path used: EWM_GLOBAL_PATH
Note
The logical filename is fixed and cannot be changed. The logical file contains a physical filename. The
logical file path contains a physical path. The validation and alias definition do not apply for this logical
filename.
● EWM_ELS_FRML
● EWM_ELS_ST
● EWM_ELS_STE
● EWM_ELS_SEQ
● EWM_ELS_ASS
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/ELS_UPLOAD
○ Program /SCWM/ELS_UPLOAD
○ Logical file path used: EWM_GLOBAL_PATH
Note
The logical filename is fixed and cannot be changed. The logical file contains a physical filename. The
logical file path contains a physical path. The validation and alias definition do not apply for this logical
filename.
● EWM_MS_RESULT
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/PI_SAMP_UPDATE
○ Program /SCWM/PI_SAMP_UPDATE_RESULT
○ Parameters used in this context: = Warehouse number (CHAR 4)
○ Logical file path used: EWM_GLOBAL_PATH
Security Guide for SAP S/4HANA 1709
430 P U B L I C SAP S/4HANA Business ApplicationsNote
The logical filename is fixed and cannot be changed. The logical file contains a physical filename. The
logical file path contains a physical path. The validation and alias definition do not apply for this logical
filename.
● EWM_PRODUCT_UPLOAD
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/MIG_PRODUCT
○ Program /SCWM/R_MIG_PRODUCT
○ Logical file path used: EWM_PRODUCT_UPLOAD_PATH
● EWM_PACKSPEC_UPLOAD
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/MIG_PRODUCT
○ Transaction /SCWM/IPU
○ Program /SCWM/R_MIG_PRODUCT
○ Program /SCWM/R_PS_DATA_LOAD
○ Logical file path used: EWM_PACKSPEC_UPLOAD_PATH
● EWM_PI_COMPL_UPLOAD
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/MIG_PI_COMPL
○ Program /SCWM/R_MIG_PI_COMPL
○ Logical file path used: EWM_PI_COMPL_UPLOAD_PATH
● EWM_TDC_EDGE and EWM_TDC_RSRC
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/TDC_UPLOAD
○ Program /SCWM/TDC_UPLOAD
○ Logical file path used: EWM_GLOBAL_PATH
● EWM_TATT_UPLOAD (Logical File for Upload of Time and Attendance Events)
○ Transactions or programs using this logical file name:
○ Transaction /SCWM/TATT_UPLOAD
○ Program /SCWM/R_LM_TATT_UPLOAD
○ Parameters used in this context: = Warehouse number (CHAR 4)
○ Logical file path used: EWM_GLOBAL_PATH
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information about data storage security, see the respective chapter in the SAP NetWeaver Security
Guide.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 43113.9.3.4 Deletion of Personal Data
Extended Warehouse Management (EWM) might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under Product Assistance Cross
Components Data Protection .
Table 254: Relevant Application Objects and Available Deletion Functionality
Application Detailed Description Provided Deletion Functionality
EWM Warehouse Request Processing Business partner data is stored in the You can delete the objects by using the
(for example, inbound deliveries, out warehouse request. For example: archiving services. The archiving objects
bound delivery orders, and production ● Partner data in the warehouse re are:
material requests) quest header/item ● DLV_INB (Internal Warehouse Re
● Ship-to data and ship-from data quest (Inbound Delivery))
● Owner and entitled-to-dispose data ● DLV_OUT (Internal Warehouse Re
on item level quest (Outbound Delivery))
● DLV_REQ (Warehouse Request from
External Systems)
● DLV_PROD (Production Material Re
quest)
EWM Labor Management The processor is recorded in several You can delete the objects by using the
EWM documents in Labor Management, archiving services. The archiving objects
for example, in warehouse orders and are:
executed workload. ● WME_WO (Warehouse Order)
● WME_EWL (Executed Workload)
● WME_EPD (Performance Document)
● WME_ILT (Indirect Labor Task)
EWM Shipping and Receiving In Shipping and Receiving, business You can delete the objects by using the
partner data may be stored as carrier archiving services. The archiving object
data in transportation units. is WME_TU (TU Activity).
EWM Value-Added Services If you use value-added services (VAS), You can delete the objects by using the
business partner data may be stored as archiving services. The archiving object
owner data or entitled-to-dispose data in is WME_VAS (Value-Added Service Or
VAS orders. der).
EWM Proof of Delivery If you use proof of delivery (transac You can delete by using transaction /
tion /SCWM/POD_IMP), business part SCWM/POD_IMP.
ner data may be stored as carrier data,
entitled-to-dispose data, or processor
data in the proof of delivery object.
Security Guide for SAP S/4HANA 1709
432 P U B L I C SAP S/4HANA Business ApplicationsApplication Detailed Description Provided Deletion Functionality
EWM Stock Data In EWM, stock data may store business You cannot delete directly. You must
partner data as, for example, owner data clear the corresponding stock so that
or entitled-to-dispose data. the stock does not exist anymore by us
ing the Delete Obsolete Table Entries (/
LIME/BACKGROUND_DELETE_EXEC) re
port.
EWM Dock Appointment Scheduling In SAP Dock Appointment Scheduling, You can delete by using the Delete Slots
business partner data may be stored as and Appointments (/SCWM/
carrier data in loading appointments. R_DAS_DELETE) report.
Transportation Management in EWM Business partner data is contained in You can delete the objects by using the
shipment objects and freight document archiving services. The archiving objects
objects. are:
● TM_SHP (Shipment)
● TM_FRD (Freight Document)
EWM Warehouse Billing In Warehouse Billing, snapshots may You can delete billing measurements
contain a business partner. (BOPF object /SCWM/BM) using archiving
object EWM_WBM.
You can delete billing measure requests
(BOPF object /SCWM/WB_BMR) using de
letion report Deletion of WBMR and
WBMS (/SCWM/WB_WBMR_DELETION).
Table 255: Relevant Application Objects and Available EoP/WUC Functionality
Application Implemented Solution (EoP or WUC) Further Information
EWM Warehouse Request Processing A where-used check (WUC) is imple A WUC is done for the following data
(for example, inbound deliveries, out mented for the business partner object. base tables:
bound delivery orders, and production ● /SCDL/DB_BPLOC
material requests)
● /SCDL/DB_EXTNO
● /SCDL/DB_PROCI_O
● /SCDL/DB_PROCI_I
● /SCDL/DB_PROCI_P
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 433Application Implemented Solution (EoP or WUC) Further Information
EWM Labor Management A WUC is implemented for the business A WUC is done for the following data
partner object. base tables:
● /SCWM/EWRKL
● /SCWM/EPD
● /SCWM/WHO
● /SCWM/EPD
For indirect labor tasks, the data is
stored using order document manage
ment (ODM).
The ODM data type is ILT. The corre
sponding header component is ILT with
structure /SCWM/S_ILT_ODM.
EWM Shipping and Receiving A WUC is implemented for the business A WUC is done for the /SCWM/TUNIT da
partner object. tabase table.
EWM Value-Added Services A WUC is implemented for the business The data is stored using ODM. The ODM
partner object. data type is VASO. The corresponding
item component is VASI with structure /
SCWM/S_VAS_ODM_ITM.
EWM Proof of Delivery A WUC is implemented for the business A WUC is done for the SCWM/POD data
partner object. base table.
EWM Stock Data A WUC is implemented for the business A WUC check is done for the following
partner object. database tables:
● /SCWM/STOCK_IW01
● /SCWM/STOCK_IW02
● /SCWM/STOCK_IW03
● /SCWM/STOCK_IW04
EWM Dock Appointment Scheduling A WUC is implemented for the business A WUC is done for the /SCWM/D_DSAPP
partner object. database table.
Security Guide for SAP S/4HANA 1709
434 P U B L I C SAP S/4HANA Business ApplicationsApplication Implemented Solution (EoP or WUC) Further Information
Transportation Management in EWM A WUC is implemented for the business The data is stored using ODM.
partner object. ● For shipments the ODM data type is
TMSH. The corresponding header
component is TSHD with struc
ture /SCMB/
TMDL_ODM_SHP_HDR_STR.
● For freight documents the ODM
data type is TMFR. The correspond
ing header component is TMFH with
structure /SCMB/
TMDL_ODM_FRD_HDR_STR.
Transportation Management in EWM A WUC is implemented for the business A WUC is done for the following tables:
Warehouse Billing partner object. ● /SCWM/D_WB_FDO
● /SCWM/D_WB_PDI
● /SCWM/D_WB_STOCK
● /SCWM/D_WB_WT
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection .
13.9.3.5 Enterprise Services Security
For general information, see the chapters on Web Services Security in the SAP NetWeaver Security Guide and in
the SAP Process Integration Security Guide.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 43513.9.3.6 Other Security-Relevant Information
Security Aspects of Data Flow and Processes
The following table describes some typical processes and communication channels, along with appropriate
security measures:
Table 256:
Process Security Measure
Mobile devices can be connected using HTTP/ITS mobile (it is For more information, see Internet Communication Frame
also possible to use the SAP console). This is done based on work Security (ICF) [page 428].
the Internet Communication Framework (ICF) service for
RFUI.
For certain scenarios, such as connecting automated physical For more information, see the SAP NetWeaver Security Guide.
processes (for example, conveyor systems) using SAP Plant
Connectivity, remote function calls (RFCs) are used. Depend
ing on the scenario, Idocs may also be used (for example,
when warehouse control units are used).
Extended Warehouse Management (EWM) offers the possibil Ensure that only a few people can access these transactions
ity of uploading and downloading data. In many of these trans and that access to the application server file system is re
actions it is possible to either choose a local file system (PC) stricted. You should design logical paths and filenames to re
or files on the application server. strict the access. For more information, see Data Storage Se
curity [page 428].
EWM offers a collaborative scenario for SAP Dock Appoint In this scenario, users outside of the company or firewall may
ment Scheduling. This enables appointment planners for car access the system. For such scenarios, special attention must
riers to access the system using SAP Gateway or Web Dynpro be paid to assigning authorizations to these users, and to the
ABAP technology, for example, from outside the company system setup and how the access from outside the company
network. is granted.
EWM offers a scenario for Warehouse Billing where there is an In this scenario, EWM can extract billing-relevant information
integration with the SAP Transportation Management (SAP from SAP TM and send order and settlement information back
TM) system. to SAP TM. The communication is performed using enterprise
services or Web services.
EWM Fiori apps, for example, for deliveries or returns proc In this scenario, SAP Fiori accesses EWM using SAP Gateway.
essing. For more information, see SAP Library for SAP Fiori.
Security for Additional Applications
Geocoding
EWM can, in some cases, make use of third party geocoding applications, for example, PTV eServer. The software
could be used, for example, to calculate geographical information for the locations or distances for transportation
lanes. To connect to the third party software, this software may require an RFC destination on the EWM side. For
Security Guide for SAP S/4HANA 1709
436 P U B L I C SAP S/4HANA Business Applicationsmore information on geocoding, see SAP Library for SAP S/4HANA at https://help.sap.com/s4hana . In SAP
Library, choose SAP S/4HANA Enterprise Business Applications Supply Chain SCM Basis SCM Basis
Master Data Location . For any security issues regarding the third party application, for example, PTV eServer
software, see the third party documentation.
SAP Plant Connectivity for Scale Integration
EWM can, in some cases, integrate an external scale. The software could be used, for example, to calculate the
weight of a handling unit. A sample implementation exists for this in the Determination of HU Weight Using Scale
(/SCWM/EX_WRKC_UI_GET_WEIGHT) Business Add-In. In this example, the system uses SAP Plant Connectivity to
integrate an external scale. This software may require an RFC destination on the EWM side to connect to SAP
Plant Connectivity.
For information about SAP Plant Connectivity, see SAP Help Portal at https://help.sap.com/pco . For
information about security for SAP Plant Connectivity, see the security guide for SAP Plant Connectivity on SAP
Service Marketplace at https://service.sap.com/securityguides .
13.9.4 Deletion of Personal Data
Use
Location master data may contain personal data that is subject to the data protection laws applicable in specific
countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion of
personal data. For more information, see the product Assistance for SAP S/4HANA on the SAP Help Portal at
http://help.sap.com/s4hana_op_1709 Product Assistance Enterprise Business Applications Manufacturing
Production Planning and Detailed Scheduling Master Data Location Data Protection
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 437Relevant Application Objects and Available Deletion Functionality
Table 257:
Application Detailed Description Provided Deletion Functionality
SCM Location Without ILM You can run the report /SAPAPO/
DELETE_LOCATIONS from the SAP Easy
Access menu, under SAP Menu
Logistics SCM Extended Warehouse
Management SCM Basis Master Data
Location ; select the location, then
choose Extras Delete Location
ILM-enabled SCM Location Refer to What''s New for ILM-related In Destruction object /SCMB/LOC
formation for SCM Location
(SCMB_LOC) ILM object SCMB_LOC
Relevant Application Objects and Available EoP/WUC functionality
Table 258:
Application Implemented Solution (EoP or WUC) Further Information
SCM Location End of Purpose (EoP) check
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of location master data in Customizing for SCM
Extended Warehouse Management under SCM Basis Master Data Location Location Master Data
Deletion .
Security Guide for SAP S/4HANA 1709
438 P U B L I C SAP S/4HANA Business Applications13.9.5 Transportation Management
This section of the Operations Guide for SAP S/4HANA, on-premise edition contains information on operations
tasks specific to Transportation Management.
13.9.5.1 Security Aspects of Data, Data Flow and Processes
E-mail-Based Tendering Scenario
The figure below shows an overview of the e-mail based tendering scenario for Transportation Management (TM).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 439Figure 7: E-Mail-Based Tendering Scenario
Table 259: Steps for E-Mail Based Tendering Scenario
Step Description Security Measure
1 HTML e-mail is created via BCS and sent In Customizing for TM, the use of en
to SMTP server cryption and digital signatures needs to
be enabled. In Customizing for
Transportation Management, choose
Freight Order Management
Tendering Define General Settings for
Tendering 03 – E-mail and SMS
Content E-Mail Security Settings .
Security Guide for SAP S/4HANA 1709
440 P U B L I C SAP S/4HANA Business ApplicationsStep Description Security Measure
2 Proxy applies encryption and digital sig External secure e-mail proxy needs to be
nature to e-mail maintained and activated for the TM sys
tem. For more information, see SAP
Note 149926 . Keys must be ex
changed between the sender and recipi
ent prior to sending the e-mail. We highly
recommend that you set up the policy
for the e-mail proxy in such a way that e-
mails can be sent only if encryption and
digital signatures are enabled. If this is
not possible, for example, due to missing
keys, e-mails must not be sent in an in
secure way.
3 E-mail is decrypted and signature veri The e-mail client of the recipient must
fied for reading support encryption and digital signa
tures, and keys must have been ex
changed beforehand by the sender and
the recipient.
4 Reply is encrypted and signed and sent Refer to step 3
back to TM system
5 Proxy verifies signature and decrypts e- Refer to step 2
mail content
6 Decrypted and verified e-mail is proc Not applicable
essed
Recommendation
To access the TM system externally, we recommend that you define a system alias in the web dispatcher. The
web dispatcher redirects the request to the correct hostname and port so that an external user can use a
hyperlink, which contains the alias, to access the system.
You create a tendering notification e-mail in the TM system. The system sends this e-mail to the carrier with a
hyperlink to the carrier''s worklist in the TM system or in the TM collaboration portal. The hyperlink contains the
system alias instead of the physical hostname and port. To use the alias, ensure that you have implemented
SAP Note 1748036 or 1747651 , and SAP Note 1783590 . Subsequently, you need to specify the
following settings in the TM system:
1. Create an alias in transaction SM59.
2. In the Target Host field, enter the system alias as specified in the web dispatcher.
3. Enter the alias in the 03 E-Mail and SMS Content screen in Customizing for Transportation Management
under Freight Order Management Tendering Define General Settings for Tendering .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 441File Upload Scenario
The figure below shows an overview of the file upload scenario for TM.
Figure 8: File Upload Scenario
The table below shows the security aspects to be considered for the process step and what mechanism applies.
Table 260: Steps for File Upload Scenario
Step Description Security Measure
1 User inserts link to a file he or she wants User needs to be aware of the file he or
to upload she wants to upload
2 HTTPS request is forwarded and file is Not applicable
sent to server
Security Guide for SAP S/4HANA 1709
442 P U B L I C SAP S/4HANA Business ApplicationsStep Description Security Measure
3 File size is checked against system pa Maximum file size needs to be restricted
rameter icm/HTTP/ to secure the server; for more informa
max_request_size_KB; only the tion, see the Security Guide for SAP Net
amount of data specified is forwarded Weaver 7.5 on SAP Service Marketplace
at http://service.sap.com/securityguide
. In the Security Guide, choose
Security Guides for SAP NetWeaver
Functional Units Security Guides for
the Application Server Security Guides
for the AS ABAP Web Dynpro ABAP
Security Guide Security Notes for
FileUpload UI Elements .
4 MIME type of file is checked against The extension of the uploaded file (but
white list not its content) is checked against MIME
type white list; as a prerequisite for using
the white list, SAP Note 1514253
must be implemented.
5 File is checked by virus scan and request Virus scan needs to be active in your
only forwarded if scan is clear system. For more information, see SAP
Library for SAP NetWeaver 7.5 at http://
help.sap.com/nw . In SAP Library,
choose SAP NetWeaver SAP
NetWeaver Library: Function-Oriented
View Security Security Developer
Documentation Secure Programming
Secure Programming – Java Secure
Programming SAP Virus Scan
Interface . We strongly recommend
that you create a virus scan profile with
linkage type All steps successful.
6 File is stored in database Not applicable
7 Information is sent back to user Not applicable
Caution
Only file extensions are compared to the entries in the white list, not the content of the files.
The file upload function can be disabled to prevent users from uploading files to your system. To disable the file
upload function, you must implement SAP Note 1514253 . We recommend that you disable the upload
function if it is not required by your business scenarios.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 443Always ensure that your virus scan is set up and working correctly before enabling file uploads. If your virus
scan is not up and running, do not use the file upload.
For information about uploading TACT rates to TM, see SAP Library for TM at http://help.sap.com/tm . In SAP
Library for TM, choose Master Data Charge Management and Service Product Catalogs Setup of Service
Product Catalogs and Charge Management MD TACT Rates TACT Rate Upload .
13.9.5.2 Authorizations
Transportation Management (TM) uses the authorization concept provided by the SAP NetWeaver AS ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver Application
Server ABAP Security Guide, Java Security Guide, and ABAP and Java Security Guides also apply to TM.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s
user administration console for the AS Java.
Role and Authorization Concept for SAP Transportation Management 9.4
Standard roles and authorization objects are delivered with TM. For more information about the standard roles
and authorization objects and how to use them, see the following section.
Standard Roles
TM contains standard roles that you must copy to create your own roles. For each of the standard roles, a set of
predefined authorization proposals is delivered. Since it is not possible to predefine all authorization values (these
will strongly depend on your specific business and scenarios), you will have to add any missing data to the
proposed authorization values. In some cases, you may have to change the proposed values to your own values.
Caution
We strongly recommend that you always check the delivered authorization proposals carefully.
The list below shows the standard roles that can be used to copy in TM.
● /SCMTMS/BOOKING_AGENT
● /SCMTMS/CAPACITY_MANAGER
● /SCMTMS/CARRIER_SETTLEMENT_SP
● /SCMTMS/CUSTOMER_SERVICE_AGENT
● /SCMTMS/CUSTOMER_SETTLEMENT_SP
● /SCMTMS/DISPATCHER
Security Guide for SAP S/4HANA 1709
444 P U B L I C SAP S/4HANA Business Applications● /SCMTMS/DISPLAY
● /SCMTMS/FREIGHT_CONTRACT_SPEC
● /SCMTMS/PLANNER
● /SCMTMS/SERVICE_PROVIDER
● /SCMTMS/TRANSPORTATION_MGR_V2
● /SCMTMS/PROCESS_ADMINISTRATOR
● /SCMTMS/CAPACITY_MANAGER
● /SCMTMS/COLL_PORTAL
● /TMUI/COLL_PORTAL
● /TMUI/COLL_PORTAL_DEMO
Recommendation
The role /SCMTMS/DISPLAY is designed for an auditor who is able to view all content in a system. For example,
master data and transactional data, such as business documents. The role is not allowed to change any data.
The role can be assigned to users who conduct security or financial audits.
For more information, see SAP Library for SAP Transportation Management 9.4 on SAP Help Portal at http://
help.sap.com/transportationmanagement94 . In SAP Library, choose Basic Functions Roles .
Standard Authorization Objects
For TM, there are two kinds of authorization objects:
● Static checks of the technical business objects along with their nodes and actions, or of organizational data
objects
● Instance-based authorization objects, with which you can check authorization for the specified business
documents or other objects, depending on business-relevant data such as organization information
For instance-based authorization checks, there are two basic concepts. First, you can define authorization values
based on identifiers for all profiles or other objects that cannot be classified any further by specific types, but only
depending on their identifier. Second, you can define authorization values based on category, type, and further
characteristics such as organizational data that can classify business documents beyond their identifier.
Besides the standard activities that can be defined for each authorization object for authorization field ACTVT, you
can also define whole groups of activities for several authorization actions as an activity area. This means that you
can define a distinct activity area, thereby allowing or preventing a whole set of actions related to this area. For
example, you do not have to define all actions relating to subcontracting activities separately for a role, but only to
define the activity area for subcontracting.
For information about authorizations in TM, see SAP Library for TM on SAP Help Portal at http://help.sap.com/
transportationmanagement94 . In SAP Library, choose Basic Functions Authorizations .
If you want to display the authorization objects in TM, on the SAP Easy Access screen, choose Tools ABAP
Workbench Development Other Tools Authorization Objects Objects and open object class SCTS.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 445Note
You can also create your own authorization objects and implement the corresponding checks in BAdIs
Authorization Check and Data Retrieval Before Authorization Check.
For more information, see Customizing for Transportation Management under Business Add-Ins (BAdIs) for
Transportation Management Basic Functions Authorizations .
In TM, you have a special permission object T_TM_ALL. System users who run batch jobs can use this permission
object. To use this permission object, you must have all application specific permissions. Note that if you maintain
this object in a certain role, all other TM permission objects will not be checked for this role anymore.
The table below shows the security-relevant authorization objects from other components that are used by TM.
The list does not include basis authorization objects used for central functions or administration.
Table 261: Standard Non-TM Authorization Objects
Authorization Object Field Value Description
SAP SCM Basis 7.0
/SCMB/PESL ACTVT, USER (06) Delete Define Planning Service Man
ager (PSM) Selection. The au
(34) Write
thorization object enables the
In the USER field, you can en specified user to save and de
ter the user for which you lete his or her selections.
want to execute the activities
in the ACTVT field.
/SCTM/SCU /SCMB/SCU ACTVT Use of supply chain units in
routes.
C_MD_SCU /SCMB/SCU, ACTVT
Business Context Viewer
BCV_USAGE ACTVT (70) Administer (US) Business Context Viewer us
age
BCV_PERS ACTVT Personalize BCV User Inter
BCV_CTXKEY face for Query View
BCV_QRYVID
Business Rules Framework
FDT_OBJECT FDT_ACT You use this authorization ob
FDT_APPL ject to control usage of ob
jects of the specified type in
FDT_OBJTYP BRFplus.
Security Guide for SAP S/4HANA 1709
446 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
FDT_WORKB FDT_WB_ACT This authorization object con
trols whether a user is author
ized to use the BRFplus work
bench and its tools.
APO
C_APO_DEF ACTVT, APO_PLNR, (01) Create or generate APO Authorization Object:
APO_DEFT, APO_DEFN Master Data, Resource Defini
(02) Change
tions
(03) Display
(06) Delete
C_APO_LOC ACTVT, APO_LOC (01) Create or generate APO Authorization Object:
Master Data, Locations
(02) Change
(03) Display
(06) Delete
(16) Execute
(32) Save
C_APO_PROD ACTVT, APO_LOC, APO_PROD (01) Create or generate APO Authorization Object:
Master Data, Products
(02) Change
(03) Display
(06) Delete
(16) Execute
C_APO_RES ACTVT, APO_PLNR, APO_LOC, (01) Create or generate APO Authorization Object:
APO_RES Master Data, Resources
(02) Change
(03) Display
(06) Delete
(16) Execute
EH&S
C_EHSP_TPP ACTVT, LANGUAGE, (02) Change This authorization is checked
ESECATPIN, ESEPHRGRP, in the transactions for phrase
(03) Display
PPSTAT management for entry into
the hit list.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 447Authorization Object Field Value Description
C_SHEP_TPG ACTVT, ESECATPIN, (01) Create or generate This authorization object is
ESEPHRGRP checked in the phrase man
(02) Change
agement transactions when
(03) Display entering and leaving the hit
(59) Distribute list. The activities “change”
and “display” are also
checked here.
M_MATE_DGM ACTVT (01) Create or generate Using the authorization object
M_MATE_DGM, you can pre
(02) Change
vent dangerous goods master
(03) Display data from being displayed or
(06) Delete edited.
(61) Export
(82) Supplement
Formula & Derivation Tool
FDT_OBJECT FDT_APPL, FDT_OBJTYP, (1) Create You use this authorization ob
FDT_ACT ject to control the authoriza
(2) Change
tion to display, create,
(3) Display change, or delete objects in
(4) Delete the Formula & Derivation Tool
(including functions, expres
(5) Activate sions, expression types, fil
ters, and applications).
Human Resources
PLOG PLVAR, OTYPE, INFOTYP, Not applicable The present object is used by
SUBTYP, ISTAT, PPFCODE the authorization check for
PD data.
SAP SCM Optimizer
S_RFC ACTVT, RFC_NAME, RFC_TYPE (16) Execute Required authorization to
start the SAP SCM Optimizer
and use most of the adminis
trator transactions.
SAP Event Management
X_EM_EH ACTVT, /SAPTRX/PN, / (03) Display Event handler authorization
SAPTRX/PV
(10) Post
Security Guide for SAP S/4HANA 1709
448 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
X_EM_EH_CH ACTVT, /SAPTRX/SO (01) Create or generate Event handler changes
(02) Change
(05) Lock
(06) Delete
(63) Activate
(95) Unlock
X_EM_EVM ACTVT, /SAPTRX/CS, / (32) Save the sender code set Event messages
SAPTRX/CD and sender code ID
Cross-Application Authorization Objects
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 449Authorization Object Field Value Description
CA_POWL POWL_APPID, POWL_QUERY, POWL_QUERY: Specifies the authorities for
POWL_CAT, POWL_LSEL, Personal Object Worklist
(01) Users are allowed to cre
POWL_TABLE, POWL_RA_AL (POWL) iViews
ate, change, and delete their
own queries for all POWL ob
ject types assigned to them
(compare with Customizing
tables POWL_TYPE_USR and
POWL_TYPE_ROL).
(02) Users are only allowed to
create their own queries on
the basis of admin queries as
signed to them in Customiz
ing tables POWL_QUERY_USR
and POWL_QUERY_ROL re
spectively. (Note: this is also
subject to the user – POWL
object type assignments.)
(03) (and other values):
Users are only allowed to
change admin queries as
signed to them with respect
to the select options restric
tions of those admin queries
(thus creating a separate
“derivation” for each admin
query transparently)
POWL_CAT:
(01) Users are allowed to cre
ate, change, and delete their
own categories and assign
queries to them.
(02) Users are only allowed to
assign queries to the existing
categories and change the or
der of queries.
(03) (and other values):
Users are not allowed to reas
sign queries or change the
query order. Note: if field
POWL_QUERY is set to 01 or
03, setting POWL_CAT to 03 is
not advisable. Therefore, the
Security Guide for SAP S/4HANA 1709
450 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
value is implicitly set to 02 in
this case.
S_SERVICE SRV_NAME, SRV_TYPE This authorization object is
automatically checked when
external services are started.
This is required for Gateway
Services used by the TM Col
laboration Portal
S_RFCACL RFC_SYSID, (16) Execute Authorization check for RFC
RFC_CLIENT,RFC_USER, users, especially for trusted
RFC_EQUSER, RFC_TCODE, systems. This is required for
RFC_INFO,ACTVT Gateway Services used by the
TM Collaboration Portal.
S_WFAR_OBJ ACTVT (01) Create or generate This authorization object is
OAARCHIV used to control access to ar
chived documents.
OADOKUMENT
OAOBJEKTE
S_ARCHIVE ACTVT This authorization object is
APPLIC used in SAP archiving pro
grams to protect the access
ARCH_OBJ to archive files
B_BUPA_RLT ACTVT With this authorization object
RLTYP you define which BP roles can
be edited.
B_BUPR_BZT ACTVT With this authorization object
RELTYP you establish which relation
ship categories can be proc
essed.
S_DATASET ACTVT You use this object to assign
FILENAME authorizations for accessing
operating system files.
PROGRAM
S_WF_WI TASK_CLASS Authorization object for work
WFACTVT ing with work items in SAP
Business Workflow
WI_TYPE
S_SCD0 ACTVT
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 451Recommendation
To segregate duties using roles and authorization values in TM, we recommend that you restrict the
authorizations of the different roles to the business-related minimum.
With the authorization concept provided by TM, you can restrict authorization based on business document
categories, such as Freight Order or Freight Booking, or on business document types, which you can create for
the supplied business document categories. Furthermore, all critical business-related activities can be
restricted for the different roles. These activities include creating business documents, displaying business
documents or master data, triggering charge calculations, subcontracting freight documents, requesting
customs declarations, and others activities or activity areas for the authorization objects of object class SCTS.
Duties can, therefore, be segregated according to your business and scenarios.
Note that we do not recommend providing one role with full authorization for a business document or process,
so that one role cannot be used, for example, to create and maintain a business document, add charge data to
it, send it to a business partner, and create the invoice for that document. Such activities should be spread over
different roles.
In addition, one user must not be assigned to different roles that would provide full authorization for a business
document or process as described above.
Note
If your scenario contains an approval workflow process, you need to create or maintain user WF-BATCH
accordingly.
For general information about creating and maintaining the WF-BATCH user, see SAP Note 1251255 .
As described in SAP Note 1251255 , you need to also assign a role used for TM to user WF-BATCH. Depending
on your specific scenario, this could be a role created according to role template /SCMTMS/
TRANSPORTATION_MGR_V2, but this can also differ according to your business scenario.
13.9.5.3 Deletion of Personal Data
Use
Transportation Management (TM) might process data (personal data) that is subject to the data protection laws
applicable in specific countries as described in SAP Note 1825544 .
For more information see also the specific notes for TM:
● 2149395 – Deletion and Blocking of cBP in TM
● 2149396 – Simplified Data Deletion based on SAP ILM in TM
The SAP Information Lifecycle Management (ILM) component supports the entire software lifecycle including the
storage, retention, blocking, and deletion of data. TM uses SAP ILM to support the deletion of personal data as
described in the following sections.
Security Guide for SAP S/4HANA 1709
452 P U B L I C SAP S/4HANA Business ApplicationsSAP delivers an end of purpose check for business partners and locations in TM using a two-step approach:
1. The system fills a new data base table with the Start of Retention Time (SoRT) information per business
partner or location business object and application rule variant as soon as a ’completed’ document is saved.
2. The system uses the EoP check to decide whether a business partner or location can be blocked. During the
EoP check, the system determines the SoRT information relevant for that business partner or location from
the database table containing the SoRT information. The SoRT information is required to determine the
relevant ILM policies and to calculate the correct end-of-purpose time depending on the defined ILM policies.
For more information see http://help.sap.com/transportationmanagement94 Transportation Management
Application Help Transportation Management Basic Functions Blocking and Deletion of Personal Data in
TM End-of-Purpose Framework
SAP delivers a where-used check (WUC) for business partners and locations in TM including master data objects
such as transportation charge rates, transportation charge scales, locations, and resources.
TM registers an EoP check in the Customizing settings for the blocking and deletion of business partners and
locations and in addition provides a WUC for business partners and locations. For information about the
Customizing of blocking and deletion for TM, see below, Configuration: Simplified Blocking and Deletion.
Features
End of Purpose (EoP) Check
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. The retention period of data consists of the following phases.
● Phase one: The relevant data is actively used.
● Phase two: The relevant data is actively available in the system.
● Phase three: The relevant data needs to be retained for other reasons.
For example, processing of data is no longer required for the primary business purpose, but to comply with
legal rules for retention, the data must still be available. In phase three, the relevant data is blocked.
Blocking of data prevents the business users of SAP applications from displaying and using data that may
include personal data and is no longer relevant for business activities.
Blocking of data can impact system behavior in the following ways:
● Display: The system does not display personal data of a blocked business partner or location.
● Change: It is not possible to change a completed business document that contains a blocked business partner
or location.
● Create: It is not possible to create a business document using a blocked business partner or location. As soon
as a blocked business partner or location is entered, the system raises a suitable error message.
● Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a business
object that contains blocked data.
● Search: The system does not display blocked data in the result list of search helps. The same is true for
technical queries based on the business object for business partner /SCMTMS/BUPA and the business object
for locations (/SCMTMS/LOCATION).
It is possible to display blocked data if a user has special authorization (SAP_CA_BP_DP_ADMIN). However, it is
still not possible to create, change, copy, or perform follow-up activities on blocked data.
Relevant Application Objects and Available EoP functionality
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 453Table 262:
Application Implemented solution (EoP or WUC) Further information
TM End of Purpose Check (EoP) The End of Purpose check (EoP) for
business partners includes the following
EoP Function Module:
business objects:
/SCMTMS/DPP_EOP_CHECK
● /SCMTMS/BUS_SHARE
● /SCMTMS/CUSTFREIGHTINVREQ
● /SCMTMS/FREIGHTAGREEEMENT
● /SCMTMS/SUPPFREIGHTINVREQ
● /SCMTMS/TOR
● /SCMTMS/TRQ
● /SCMTMS/TAL
● /SCMTMS/WAYBILLNO
The End of Purpose check (EoP) for lo
cations includes the following business
objects
● /SCMTMS/CUSTFREIGHTINVREQ
● /SCMTMS/SUPPFREIGHTINVREQ
● /SCMTMS/TOR
● /SCMTMS/TRQ
TM Where-Used-Check (WUC) In addition to the business objects han
dled in the EoP Check, the Where-Used
Check (WUC) for business partners in
cludes also master data objects such as:
● Transportation Charge Calculation
Sheets
● Transportation Charge Rates
● Transportation Charge Scales
● Locations
● Resources
Process Flow
1. Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM).
○ Run transaction IRMPOL and maintain the required residence and retention policies for the central
business partner (ILM object: CA_BUPA) or location . (ILM object SCMB_LOC).
○ Run transaction IRMPOL and maintain the required retention policies for the ILM objects of TM.
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available.
3. To determine which business partners or locations have reached end of purpose and can be blocked, you do
the following, if you have the necessary authorization:
○ Run transaction BUPA_PRE_EOP to execute the end of purpose check function for the central business
partner.
Security Guide for SAP S/4HANA 1709
454 P U B L I C SAP S/4HANA Business Applications○ Run transaction /SCMB/LOC_PRE_EOP to execute the end of purpose check function for the location.
4. To unblock blocked business partner or location data, you do the following, if you have the necessary
authorization:
○ Request unblocking of blocked business partner data by using the transaction BUP_REQ_UNBLK.
○ You can unblock the requested data by running the transaction BUPA_PRE_EOP.
○ For unblocking location data you can run the transaction /SCMB/LOC_UNBLOCK_MD.
5. You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of TM.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of data in Customizing for Cross-Application
Components under Data Protection.
● Define the settings for authorization management under Data Protection Authorization Management .
For more information, see the Customizing documentation.
● Define the settings for blocking in Customizing for.
○ Business Partner
Cross-Application Components under Data Protection Blocking and Unblocking Business Partner
○ Location
Transportation Management Master Data Transportation Network Location Location Master
Deletion
● Define the Customizing settings for TM. For more information see http://help.sap.com/tm
Transportation Management Application Help Transportation Management (TM) Basic
Functions Blocking and Deletion of Personal Data in TM Customizing Settings for Data Protection and
Privacy
13.9.5.4 Security-Relevant Logging and Tracing
SAP systems have a variety of logs for system administration, monitoring, problem solving, and auditing
purposes. Audits and logs are important for monitoring the security of your system and to track events, in case of
problems.
Note
Auditing and logging for Netweaver component is described in detail in the NetWeaver Security Guide. For more
information, see http://help.sap.com/nw75 . Choose Security Guide Security Aspects for Lifecycle
Management Auditing and Logging .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 455Security Audit Log Triggered by Virus Scan Interface (VSI)
Class CL_VSI automatically creates entries in the Security Audit Log for infections and scan errors found,
together with the following information:
● Profile
● Profile step allowing the detection of the scanner-group
● Kind of virus found, with internal virus ID of the scan engine, if available
● User name and timestamp
The messages logged are located in message class VSCAN using system log messages BU8 and BU9 (created in
transaction SE92). The severities are set to High and Medium respectively. The severity of the audit class is set to
Miscellaneous.
For more information, see Customizing for SAP Supply Chain Management under SAP Web Application Server
System Administration Virus Scan Interface .
Audit Information System (AIS)
Information about auditing and logging for the Audit Information System (AIS) is described in detail in the SAP
NetWeaver 7.5 Security Guide.
For more information, see The Audit Info System (AIS) at http://help.sap.com/nw75 . Choose Security Guide
Security Aspects for Lifecycle Management Auditing and Logging The Audit Info System (AIS)
For more information about security logs for the SAP Gateway, see Logging in SAP Gateway section of the SAP
Gateway Developer Guide for SAP Gateway SP06.
Transportation Management (TM)
Tracing and Logging of Business Objects
In TM, you can log messages raised by business objects in the application log.
In the standard system, logging is deactivated. To activate logging, in Customizing for Transportation
Management, choose Basic Functions User Interface Define Message Settings (note that this has negative
impact on overall system performance; this is why SAP recommends to switch on logging only when required).
To access the application log, on the SAP Easy Access or in SAP NetWeaver Business Client screen, choose
Application Administration Application Log: Display Logs . Alternatively, call transaction SLG1.
For more information, see Application Logging under Logging of Specific Activities in the SAP NetWeaver 7.5
Security Guide on SAP Help at http://help.sap.com/nw .
Activating Change Documents
In TM, you can activate change documents to log changes to master data, business objects, and so on.
Security Guide for SAP S/4HANA 1709
456 P U B L I C SAP S/4HANA Business ApplicationsYou must activate change documents in Customizing before the system can store them. For information about
the objects for which you can activate change documents and where to activate them, see the corresponding
section in the TM documentation:
Table 263:
Object Customizing Path
Location Transportation Management Master Data
Transportation Network Location Activate Change
Documents
Transportation lane Transportation Management Master Data
Transportation Network Transportation Lane Activate
Change Documents
Product SCM Basis Master Data Product Activate Change
Documents
Freight unit Transportation Management Planning Freight Unit
Define Freight Unit Types (Track Changes checkbox)
Freight order Transportation Management Freight Order Management
Freight Order Define Freight Order Types (Track
Changes checkbox)
Freight booking Transportation Management Freight Order Management
Freight Booking Define Freight Booking Types (Track
Changes checkbox)
Freight agreement Transportation Management Master Data Agreements
and Service Products Define Freight Agreement Types
(Track Changes checkbox).
Forwarding agreement Transportation Management Master Data Agreements
and Service Products Define FWA and Service Product
Catalog Types (Track Changes checkbox).
Forwarding order Transportation Management Forwarding Order
Management Forwarding Order Define Forwarding Order
Types (Track Changes checkbox).
Forwarding quotation Transportation Management Forwarding Order
Management Forwarding Quotation Define Forwarding
Quotation Types (Track Changes checkbox).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 457Object Customizing Path
Forwarding settlement Transportation Management Settlement Forwarding
Settlement Define Forwarding Settlement Document
Types (Track Changes checkbox).
Freight settlement Transportation Management Settlement Freight
Settlement Define Freight Settlement Document Types
(Track Changes checkbox).
Order-based transportation requirement Transportation Management Integration ERP Logistics
Integration Order-Based Transportation Requirement
Define Order-Based Transportation Requirement Types
(Track Changes checkbox).
Delivery-based transportation requirement Transportation Management Integration ERP Logistics
Integration Delivery-Based Transportation Requirement
Define Delivery-Based Transportation Requirement Types
Service order Transportation Management Freight Order Management
Service Order Define Service Order Types (Track
Changes checkbox).
SAP SCM Optimizer
For information about the trace and log files for the SAP SCM Optimizer, see the SAP SCM 7.0 Component
Security Guide on SAP Service Marketplace at http://service.sap.com/securityguide .
For more information about the logging and tracing mechanisms from SAP NetWeaver, go to http://
help.sap.com/nw75 . Choose Security Guide Security Aspects for Lifecycle Management Auditing and
Logging .
13.10 Analytics Technology
Security Guide for SAP S/4HANA 1709
458 P U B L I C SAP S/4HANA Business Applications13.10.1 Process Performance Monitoring
13.10.1.1 Process Observer
13.10.1.1.1 Roles for Process Observer
Process Observer uses the authorization concept provided by the SAP NetWeaver for Application Server ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
SAP delivers the following standard roles for Process Observer. You can use these roles as a template for your
own roles.
Table 264:
Role Description
Administration (SAP_POC_ADMINISTRATION) This single role contains all the functions that you need to set
up process monitoring:
● Maintain Customizing
● Implement tracing in the application
● Schedule jobs
● Delete log entries and execute mass deletion of log en
tries
● Update the master registry
● Carry out configuration activities
Define Process (SAP_POC_MODEL) This single role contains all the functions that you need to cre
ate a process definition:
● Define a process
● Define BRFplus rules
● Create a process simulation
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 459Role Description
View Process (SAP_POC_MONITOR) This single role contains all the functions that you need to view
process details in the Process Monitor SAP GUI screen:
● Display process details
Analytics (SAP_POC_ANALYTICS) This single role contains all the functions that you need to ac
cess the process-monitoring-relevant analytics content in the
SAP Business Information Warehouse:
● Display analytics information
Launchpad for Order to Cash Dashboard This single role contains all the functions required to launch
(SAP_BW_POC_O2C_ANALYTICS) the Dashboard for O2C Scenario.
Side Panel for Process Observer Data (SAP_POC_SIDEPANEL) This single role enables the user to see Process Observer data
for standard transactions such as display sales order, display
enquiry etc in a sidepanel using SAP Business Client.
Administration (SAP_POC_ADMIN) This composite role contains all the functions that you need to
set up process monitoring.
Business Process Expert (SAP_POC_BPX) This composite role contains all the functions that you need,
as a business process expert, to set up process definitions:
● Define a process
● Define BRFplus rules
● Create a process simulation
● Display process details
Standard Authorization Object
The basis for all roles used for data security for Process Observer is the authorization object POC_AUTH.
13.11 Enterprise Technology
Security Guide for SAP S/4HANA 1709
460 P U B L I C SAP S/4HANA Business Applications13.11.1 Central Master Data
13.11.1.1 Authorizations and Roles used by Central Master Data
The Central Master Data uses the authorization concept provided by the SAP NetWeaver AS for ABAP or AS Java.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP and SAP NetWeaver AS Security Guide Java also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s
user administration console on the AS Java.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Table 265:
Role Description
SAP_BR_BUPA_MASTER_SPECIALIST Master Data Specialist - Business Partner Data
SAP_BR_PRODMASTER_SPECIALIST Master Data Specialist - Product Data
SAP_BR_BPC_EXPERT Configuration Expert - Business Process Configuration
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 266:
Authorization Object Description
B_BUPA_GRP Business Partner: Authorization Groups
B_BUPA_RLT Business Partner: BP Roles
B_BUPA_BZT Business Partner Relationships: Relationship Categories
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 461Authorization Object Description
F_KNA1_APP Customer: Application Authorization
F_KNA1_BED Customer: Account Authorization
F_KNA1_BUK Customer: Authorization for Company Codes
F_KNA1_GEN Customer: Central Data
F_KNA1_GRP Customer: Account Group Authorization
V_KNA1_BRG Customer: Account Authorization for Sales Areas
V_KNA1_VKO Customer: Authorization for Sales Organizations
F_LFA1_APP Supplier: Application Authorization
F_LFA1_BEK Supplier: Account Authorization
F_LFA1_BUK Supplier: Authorization for Company Codes
F_LFA1_GEN Supplier: Central Data
F_LFA1_GRP Supplier: Account Group Authorization
M_LFM1_EKO Purchasing Organization in Supplier Master Record
13.11.1.2 Deletion of Personal Data
Use
The Central Master Data might process data (personal data) that is subject to the data protection laws
applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking
and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP
Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data
Protection .
Relevant Application Objects and Available Deletion Functionality
Table 267:
Application Provided Deletion Functionality
Business Partner/Customer/Supplier ILM_DESTRUCTION
Security Guide for SAP S/4HANA 1709
462 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application Objects and Available EoP functionality
Table 268:
Application Implemented Solution (EoP or WUC) Further Information
Business Partner/Customer/Supplier EoP check EoP is determined based on the last
change date of the business partner/
customer/supplier master data.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner/customer/supplier master
data in Customizing for Cross-Application Components→Data Protection.
13.11.2 Specific Read Access Log Configurations
Use
In Read Access Logging (RAL), you can configure which read-access information to log and under which
conditions.
SAP delivers sample configurations for applications.
The supplier master data display and maintain log data in order to track the disclosure of the supplier minority
indicator. You can find the configurations as described in the Read Access Logging chapter.
In the following configurations, fields are logged in combination with additional fields, in the following business
contexts:
Table 269:
Configuration Fields Logged Business Context
VEND_MINDK LFB1-MINDK Log access to minority indicator only if
all fields are shown together.
LFB1-LIFNR
LFB1-BUKRS
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 46313.11.3 Legal Content Management
13.11.3.1 Authorizations and Roles Used by Legal Content
Management
Legal Content Management uses the authorization concept provided by the SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Table 270:
Role Description
SAP_BR_ADMINISTRATOR_LCM Administrator - Legal Content Management
SAP_BR_EMPLOYEE_LEGAL_CONTENT Employee - Legal Content Management
SAP_BR_LEGAL_COUNSEL Legal Counsel
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Authorization Object Description
LCM_GEN General Activities
LCM_CTXADM Auth. Obj. for Task in LCM Context Admin. actions
Security Guide for SAP S/4HANA 1709
464 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
LCM_CTXCAT Auth. Obj. for Category in LCM Context
LCMDOCSTMP Auth. object for Stamps in LCM Document
LCMSTMPACT Auth. object for Stamp activities in LCM Document
LCM_DOCACT Auth. object for LCM Document header
LCM_LTACT Auth. Obj. for Task in LCM Legal Transaction Actions
LCM_LTCAT Auth. Obj. for Category in LCM Legal Transaction
LCM_LTENCC Auth. Obj. for Company Code in Legal Transaction
LCM_LTENPO Auth. Obj. for Purchasing organization in Legal transaction
LCM_LTENSO Auth. Obj. for Sales Organization in Legal Transaction
13.11.3.2 Blocking of Personal Data
The Legal Content Management applications might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 under Product Assistance Cross
Components Data Protection .
For Legal Content Management, data protection and privacy (DPP) is implemented for the following data:
● Entity types Customer and Supplier
● External contact type Business Partner
The DPP checks are enabled in DCL files which inherit the authorization of the respective standard DCL files. If the
user uses in a legal transaction the value help for a customer, supplier or business partner, the DCL authorization
check is executed and the blocked data is filtered out from the list that is shown in the value help. If the user
enters a customer, supplier or business partner directly, without using the value help, the Business Object
Processing Framework (BOPF) validation methods check the data against the CDS views and the blocked data is
not displayed.
The same logic is applied in the API. If an API call creates or updates data for a legal transaction, the BOPF
validation is is done based on the DPP authorization checks.
The following field indicates if the legal transaction is blocked:
● IsBusinessPurposeCompleted - if set to X (true)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 465End of Purpose Check
The End of Purpose (EoP) check identifies if all business applications have completed their purpose in use of
master data, so that it can be later blocked. Basically, the check is performed to see if a master data (customer,
supplier or business partner) can be blocked. In Legal Content Management (LCM), the EoP check is reached
when the legal transaction has reached one of the following status:
● Cancelled
● Terminated
● Expired
The central EoP check report calls the LCM modules to check if any business data is in use. And the LCM module
checks the data in legal transaction and returns the respective status back. Whether or not the customer, supplier
or business partner is blocked, is determined based on the following scenarios, which can coexist in the same
installation:
LCM determines the EoP: The business logic is hosted in LCM and as long as any of the data is still in use, it cannot
be removed or blocked.
Configuration
You configure the settings related to the blocking and deletion of customer, supplier, and business partner master
data in Customizing under Cross Application Components Data Protection Blocking and Unblocking of Data
Business Partner . For more information, see the documentation of the respective Customizing activities.
The application name for the EoP check is LCM-LT. You need to configure the blocking for the following objects:
Object Type EoP Check Object
Legal Transaction External contact type / Business LCM_LEGALTR_BUPA_EOP_CHECK
partner
Legal Transaction Entity type / Customer or supplier CL_LCM_LEGALTR_CVP_EOP_CHEC
K
13.11.4 Geographical Enablement Framework
13.11.4.1 Authorizations
The framework uses the authorization concept provided by the SAP NetWeaver Application Server for ABAP and
SAP HANA Platform. Therefore, the recommendations and guidelines for authorizations as described in the SAP
NetWeaver Application Server, ABAP Security Guide and HANA platform also apply to SAP Geographical
Enablement Framework. The SAP authorization concept is based on assigning authorizations to users based on
roles. For role maintenance in application server ABAP (AS ABAP), use the profile generator transaction PFCG in
the backend system.
Security Guide for SAP S/4HANA 1709
466 P U B L I C SAP S/4HANA Business ApplicationsStandard Roles
The table below provides the standard roles that are used by the framework.
Table 271:
Roles Description
sap.gef.data::gef_user Delivered in SAP HANA DU for the SAP Geographical Enable
ment Framework; it provides basic authorization to access the
framework schema in SAP HANA (SAP_GEF). You can assign
this role to SAP_GEF_USER or other reference users that are
created.
sap.gef.data::gef_admin In addition to all the authorizations provided in the gef_user
role, this admin role provides advanced authorizations for ad
ministrative tasks.
For AS ABAP, the PFCG role template, SAP_GEF_USR is delivered. This template provides basic authorizations for
the framework. Other authorization roles, if needed for accessing application data, need to be added to create
PFCG roles for consuming the framework services.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 272:
Authorization Object Field Value
G_GEF_GEOM GEF_BO_ID Business Object ID
GEF_CONTXT Geometry Context ID
ACTVT Activity
13.11.4.2 Internet Communication Framework Security (ICF)
You should only activate the services that are needed for the applications running in your system. For this area the
following services are needed:
● /default_host/sap/ca/GEF/arcgis/rest/services
In this path, the framework can provide services that conform to the specifications of different GIS service
providers, if a custom GIS plug-in is developed and customized. For more information, see the Application
Implementation section in the Geographical Enablement Framework documentation.
● /default_host/sap/ca/GEF/rest/config
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 467In this path, the framework provides configuration information. This service is independent from any GIS
service providers.
● /default_host/sap/bc/ui5_ui5/sap/gef_ui
The UI (Geometry Explorer and Geometry Editor) has been delivered to work with our framework. The UI
starts from this path.
Use transaction SICF to activate these services.
If your firewall(s) uses URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information about ICF security, see the respective chapter in the SAP NetWeaver Security Guide.
13.11.4.3 Data Protection and Privacy
The SAP Geographical Enablement Framework does not collect, store, or process users'' personal data. However,
applications built on it may. Therefore, SAP recommends activating secure session management. We also
recommend that you use SSL to protect the network communications where these security-relevant cookies are
transferred.
Read access logging (RAL) monitors and logs read access to sensitive data, if any. It is required for applications to
comply with legal regulations or public standards such as data privacy. In most cases, applications rely on the
underlying business suite to save sensitive data. Therefore, it is also recommended to refer to the documents of
the underlying platforms and activate the RAL based on the needs.
13.11.4.4 Enterprise Services Security
A technical limitation (tracked in security message 1670119508) has been identified; not all the user controlled
inputs are sufficiently validated or encoded. This may cause security issues like Cross-Site Scripting (XSS).
This issue has been investigated and a solution is being implemented at this time. Contact SAP for the availability
of this solution.
13.11.5 Master Data Governance
13.11.5.1 Authorization Objects and Roles Used by SAP MDG,
Consolidation and Mass Processing
Authorization Objects
SAP MDG, consolidation and mass processing uses the authorization objects listed below.
Security Guide for SAP S/4HANA 1709
468 P U B L I C SAP S/4HANA Business ApplicationsTable 273:
Authorization Object Description
MDC_PROOT [page 471] Consolidation Root Permissions
MDC_PFILT [page 472] Consolidation Cluster Permissions
MDC_MASS [page 472] Mass Update Permissions
MDC_ADMIN [page 473] Administrative permissions
MDC_LOAD [page 474] Load Permissions
MDC_MASSBS [page 475] Mass Maintenance Permissions
B_BUPA_RLT Business Partner: BP Roles
B_BUPA_GRP Business Partner: Authorization Groups
S_BGRFC Authorization Object for NW bgRFC
M_MATE_MAR Material Master: Material Types
M_MATE_MAT Material Master: Materials
M_MATE_WGR Material Master: Material Groups
B_BUPR_BZT Business Partner Relationships: Relationship Categories
C_KLAH_BKL Authorization for Classification
C_TCLA_BKA Authorization for Class Types
C_TCLS_BER Authorization for Org. Areas in Classification System
C_TCLS_MNT Authorization for Characteristics of Org. Area
F_KNA1_BED Customer: Account Authorization
F_KNA1_GEN Customer: Central Data
F_LFA1_BEK Vendor: Account Authorization
F_LFA1_GEN Vendor: Central Data
Caution
To use SAP MDG, consolidation and mass processing in combination with the functions of SAP MDG, central
governance, see the required authorization objects in the documents listed below:
● Authorization Objects and Roles Used by SAP MDG, Central Governance [page 476]
● Master Data Governance for Business Partner (CA-MDG-APP-BP) [page 478]
● Master Data Governance for Supplier (CA-MDG-APP-SUP) [page 479]
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 469● Master Data Governance for Customer (CA-MDG-APP-CUS) [page 481]
● Master Data Governance for Material (CA-MDG-APP-MM) [page 484]
Standard Roles
Table 274:
Frontend Launchpad Role Name
SAP_BR_BUPA_MASTER_SPECIALIST Master Data Specialist - Business Partner Data
SAP_BR_PRODMASTER_SPECIALIST Master Data Specialist - Product Data
SAP_BR_BPC_EXPERT Configuration Expert - Business Process Configuration
Table 275:
Backend Authorization Role Name
SAP_MD_MDC_ADMIN_APP_04 MDG, Consolidation and Mass Processing: Administrator
SAP_MD_MDC_DISP_BP_APP_04 MDG, Consolidation and Mass Processing: Business Partner
Display
SAP_MD_MDC_SPEC_BP_APP_04 MDG, Consolidation and Mass Processing: Business Partner
Special
SAP_MD_MDC_DISP_BP_NOBS_APP_04 MDG, Consolidation and Mass Processing: Business Partner
Non-SAP
SAP_MD_MDC_SPEC_BP_NOBS_APP_04 MDG, Consolidation and Mass Processing: Business Partner
Non-SAP
SAP_MD_MDC_DISP_MM_APP_04 MDG, Consolidation and Mass Processing: Material Display
SAP_MD_MDC_SPEC_MM_APP_04 MDG, Consolidation and Mass Processing: Material Specialist
SAP_MD_MDC_ADM_CUSTOBJ_APP_04 MDG, Consolidation and Mass Processing: Custom Objects
Administrator
SAP_MD_MDC_DISP_CUSTOBJ_APP_04 MDG, Consolidation and Mass Processing: Custom Objects
Displaycustomer
SAP_MD_MDC_SPEC_CUSTOBJ_APP_04 MDG, Consolidation and Mass Processing: Custom Objects
Specialist
Security Guide for SAP S/4HANA 1709
470 P U B L I C SAP S/4HANA Business Applications13.11.5.1.1 MDC_PROOT
Use
This document describes details of the authorization object MDC_PROOT.
Features
The activities listed below are assigned to the authorization object.
Table 276:
Activity Text Authorization
01 Create or generate Create consolidation process
02 Change Run consolidation process
The Start, Retry, Rollback, and Save buttons become active.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
03 Display Display consolidation process
06 Delete Delete consolidation process
The Delete button becomes active.
31 Confirm Continue consolidation process after a process step has been executed
● The Continue button becomes active.
● If the process pauses at a check point, the Continue button stays active only if
the activity 31 Confirm is permitted.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
36 Extended mainte Adjust configuration within the process UI for the current process
nance
The Adjust link is displayed.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 471Activity Text Authorization
37 Accept Continue consolidation process after a matching step that still contains open
match groups
● The Continue button becomes active.
● If the process pauses at a check point and still open match groups exist, the
Continue button stays active only if the activity 37 Accept is permitted.
Caution
In addition, the activity 31 Confirm has to be permitted.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
13.11.5.1.2 MDC_PFILT
Use
This document describes details of the authorization object MDC_PFILT
To create a process you have to select a Source, which is a combination of Source System, Status, and an optional
Source Filter.
Features
The attribute Source Filter MDC_FILTER is assigned to the authorization object: Depending on the permitted value
the processes are displayed in the process list and the sources are displayed in the Sources dialog box during the
process creation.
13.11.5.1.3 MDC_MASS
Use
This document describes details of the authorization object MDC_MASS.
Security Guide for SAP S/4HANA 1709
472 P U B L I C SAP S/4HANA Business ApplicationsFeatures
The activities listed below are assigned to the authorization object.
Table 277:
Activity Text Authorization
01 Create or generate Create mass processes
02 Change Run mass processes
The Start, Retry, Rollback and Save buttons become active.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
03 Display Display mass processes
06 Delete Delete mass processes
The Delete button becomes active.
31 Confirm Continue or rollback mass processes after a process step has been executed.
The Continue button and the Rollback button become active.
Caution
If the process pauses at a check point, the Continue button and the Rollback but
ton stay active only if the activity 31 Confirm is permitted.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
36 Extended mainte Adjust configuration within the process UI for the current process
nance
The Adjust link is displayed.
13.11.5.1.4 MDC_ADMIN
Use
This document describes details of the authorization object MDC_ADMIN
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 473Features
The activities listed below are assigned to the authorization object.
Table 278:
Activity Text Authorization
02 Change Change process parameters in the process UI like:
● Adapter for a process step
● Adapter Configuration
● Check Point
● Data Sources: Selection on Create screen
● Delete Source Data or Keep Source Data: Selection on Create screen
06 Delete Delete processes with an inconsistent status - for example caused by a system er
ror - directly in the UI.
Note
As an alternative you can run the transaction MDC_ADMIN_DELETE in the back
end system to delete processes with an inconsistent status.
60 Import Run the report MDC_BP_TRANSFORM_SOURCE_DATA.
This report transforms customer and vendor data to business partner data during
the data import.
13.11.5.1.5 MDC_LOAD
Use
This document describes details of the authorization object MDC_LOAD
Features
The activities listed below are assigned to the authorization object.
Security Guide for SAP S/4HANA 1709
474 P U B L I C SAP S/4HANA Business ApplicationsTable 279:
Activity Text Authorization
02 Change Change process parameters in the process UI like:
● Adapter for a process step
● Adapter Configuration
● Check Point
06 Delete Delete processes with an inconsistent status - for example caused by a system er
ror - directly in the UI.
Note
As an alternative you can run the transaction MDC_ADMIN_DELETE in the back
end system to delete processes with an inconsistent status.
60 Import Run the report MDC_BP_TRANSFORM_SOURCE_DATA.
This report transforms customer and vendor data to business partner data during
the data import.
13.11.5.1.6 MDC_MASSBS
Use
This document describes details of the authorization object MDC_MASSBS
Features
The activities listed below are assigned to the authorization object.
Table 280:
Activity Text Authorization
02 Change Change process parameters in the process UI like:
● Adapter for a process step
● Adapter Configuration
● Check Point
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 475Activity Text Authorization
06 Delete Delete processes with an inconsistent status - for example caused by a system er
ror - directly in the UI.
Note
As an alternative you can run the transaction MDC_ADMIN_DELETE in the back
end system to delete processes with an inconsistent status.
60 Import Run the report MDC_BP_TRANSFORM_SOURCE_DATA.
This report transforms customer and vendor data to business partner data during
the data import.
13.11.5.2 Authorization Objects and Roles Used by SAP MDG,
Central Governance
Authorization Objects
The following authorization objects are used by all components of Master Data Governance.
Note
To obtain more detailed information about specific authorization objects proceed as follows:
1. Choose SAP Menu Tools ABAP Workbench Development Other Tools Authorization Objects
Objects (Transaction SU21).
2. Select the authorization object using and then choose .
3. On the Display authorization object dialog box choose Display Object Documentation.
Table 281:
Authorization Object Description
MDG_MDF_TR Master Data: Transport
MDG_IDM Key Mapping
USMD_CREQ Change Request
USMD_MDAT Master Data
USMD_MDATH Hierarchies
USMD_UI2 UI Configuration
Security Guide for SAP S/4HANA 1709
476 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
DRF_RECEIVE Authorization for outbound messages for receiver systems
DRF_ADM Create Outbound Messages
CA_POWL Authorization for iViews for personal object worklists
BCV_SPANEL Execute Side Panel
BCV_USAGE Usage of Business Context Viewer
MDG_DEF Data Export
MDG_DIF Data Import
S_DMIS Authority object for SAP SLO Data migration server
Caution
For information about component specific authorization objects, see the corresponding sections:
● Master Data Governance for Business Partner (CA-MDG-APP-BP) [page 478]
● Master Data Governance for Supplier (CA-MDG-APP-SUP) [page 479]
● Master Data Governance for Customer (CA-MDG-APP-CUS) [page 481]
● Master Data Governance for Material (CA-MDG-APP-MM) [page 484]
● Master Data Governance for Financial (CA-MDG-APP-FIN) [page 487]
● Master Data Governance for Custom Objects (CA-MDG-COB) [page 488]
Standard Role
Table 282:
Role Name
SAP_MDG_ADMIN Master Data Governance Administrator
This role contains authorizations needed for administrative tasks and for setting up a base configuration in all
components of Master Data Governance. Some authorizations enable critical activities. If multiple users in your
organization are entrusted with the administration and configuration of Master Data Governance, we recommend
that you split the role into several roles, each with its own set of authorizations. The role does not contain the
authorizations for the respective master data transactions.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 477Enterprise Search
To use the Enterprise Search users have to be assigned to the role SAP_ESH_SEARCH Enterprise Search Hub
(Composite): Authorizations for searching.
13.11.5.2.1 Master Data Governance for Business Partner (CA-
MDG-APP-BP)
Use
Authorization Objects
Master Data Governance for Business Partner mainly uses the authorization objects of the business objects
Business Partner, the authorization objects of the Application Framework for Master Data Governance, and the
authorization objects of the Data Replication Framework.
Table 283:
Authorization Object Description
B_BUPA_GRP Business Partner: Authorization Groups
Note
This authorization object is optional. You need to assign
this authorization object only if master data records are to
be specifically protected.
B_BUPA_RLT Business Partner: BP Roles
B_BUPR_BZT Business Partner Relationships: Relationship Categories
B_CCARD Payment Cards
BCV_QUILST Overview
DC_OBJECT Data Cleansing
BCV_PERS Personalize BCV UI for Query View
BCV_QRYVW Query View
BCV_QUERY Query
BCV_QVWSNA Query View Snapshot
S_START Start Authorization Check for TADIR Objects
Security Guide for SAP S/4HANA 1709
478 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
S_PB_CHIP ABAP Page Builder: CHIP
S_PB_PAGE ABAP Page Builder: Page Configuration
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 476].
Standard Roles
Table 284:
Role Name
SAP_MDGBP_MENU_04 Master Data Governance for Business Partner: Menu
SAP_MDGBP_DISP_04 Master Data Governance for Business Partner: Display
SAP_MDGBP_REQ_04 Master Data Governance for Business Partner: Requester
SAP_MDGBP_SPEC_04 Master Data Governance for Business Partner: Specialist
SAP_MDGBP_STEW_04 Master Data Governance for Business Partner: Data Steward
13.11.5.2.2 Master Data Governance for Supplier (CA-MDG-
APP-SUP)
Use
Authorization Objects
Master Data Governance for Supplier does not have dedicated authorization objects, but instead uses the
authorization objects of the business objects Business Partner and Vendor, the authorization objects of the
Application Framework for Master Data Governance, and the authorization objects of the Data Replication
Framework.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 479Table 285:
Authorization Object Description
B_BUPA_GRP Business Partner: Authorization Groups
Note
This authorization object is optional. You need to assign
this authorization object only if master data records are to
be specifically protected.
B_BUPA_RLT Business Partner: BP Roles
B_BUPR_BZT Business Partner Relationships: Relationship Categories
DC_OBJECT Data Cleansing
F_LFA1_APP Vendor: Application Authorization
F_LFA1_BEK Vendor: Account Authorization
Note
This authorization object is optional. You need to assign
this authorization object only if master data records are to
be specifically protected.
F_LFA1_BUK Vendor: Authorization for Company Codes
F_LFA1_GEN Vendor: Central Data
F_LFA1_GRP Vendor: Account Group Authorization
M_LFM1_EKO Purchasing organization in supplier master data
BCV_PERS Personalize BCV UI for Query View
BCV_QRYVW Query View
BCV_QUERY Query
BCV_QUILST Overview
BCV_QVWSNA Query View Snapshot
S_START Start Authorization Check for TADIR Objects
S_PB_CHIP ABAP Page Builder: CHIP
S_PB_PAGE ABAP Page Builder: Page Configuration
C_DRAD_OBJ Create/Change/Display/Delete Object Link
Security Guide for SAP S/4HANA 1709
480 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
C_DRAW_DOK Authorization for document access
C_DRAW_STA Authorization for document status
C_DRAW_TCD Authorization for document activities
C_DRAW_TCS Status-Dependent Authorizations for Documents
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 476].
Standard Roles
Table 286:
Role Name
SAP_MDGS_MENU_04 Master Data Governance for Supplier: Menu
SAP_MDGS_DISP_06 Master Data Governance for Supplier: Display
SAP_MDGS_REQ_06 Master Data Governance for Supplier: Requester
SAP_MDGS_SPEC_06 Master Data Governance for Supplier: Specialist
SAP_MDGS_STEW_04 Master Data Governance for Supplier: Data Steward
SAP_MDGS_VL_MENU_04 Master Data Governance for Supplier (ERP Vendor UI): Menu
SAP_MDGS_LVC_MENU_04 Master Data Governance for Supplier (Lean Request UI):
Menu
SAP_MDGS_LVC_REQ_04 Master Data Governance for Supplier (Lean Request UI): Re
quester
13.11.5.2.3 Master Data Governance for Customer (CA-MDG-
APP-CUS)
Use
Authorization Objects
Master Data Governance for Customer does not have dedicated authorization objects, but instead uses the
authorization objects of the business objects Business Partner and Customer, the authorization objects of the
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 481Application Framework for Master Data Governance, and the authorization objects of the Data Replication
Framework.
Note
Depending on whether you use the Master Data Governance for Customer on a hub system or on a client
systema different set of authorization objects is required.
Table 287:
Authorization Object Description Hub Client
Sys Sys
tem tem
B_BUPA_GRP Business Partner: Authorization x x
Groups
Note
This authorization object is optional. You need to assign this au
thorization object only if master data records are to be specifi
cally protected.
B_BUPA_RLT Business Partner: BP Roles x x
B_BUPR_BZT Business Partner Relationships: Rela x x
tionship Categories
B_CCARD Payment Cards x x
DC_OBJECT Data Cleansing x
F_KNA1_APP Customer: Application Authorization x x
F_KNA1_BED Customer: Account Authorization x x
Note
This authorization object is optional. You do not need to assign
this authorization object if no master records are to be specifi
cally protected.
F_KNA1_BUK Customer: Authorization for Com x x
pany Codes
F_KNA1_GEN Customer: Central Data x x
F_KNA1_GRP Customer: Account Group Authoriza x x
tion
MDGC_LCOPY Copy Customer Master Data from — x
MDG Hub
Security Guide for SAP S/4HANA 1709
482 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description Hub Client
Sys Sys
tem tem
V_KNA1_BRG Customer: Account Authorization for x x
Sales Areas
V_KNA1_VKO Customer: Authorization for Sales x x
Organizations
BCV_PERS Personalize BCV UI for Query View x x
BCV_QRYVW Query View x x
BCV_QUERY Query x x
BCV_QUILST Overview x x
BCV_QVWSNA Query View Snapshot x x
S_START Start Authorization Check for TADIR x x
Objects
S_PB_CHIP ABAP Page Builder: CHIP x x
S_PB_PAGE ABAP Page Builder: Page Configura x x
tion
C_DRAD_OBJ Create/Change/Display/Delete Ob x x
ject Link
C_DRAW_DOK Authorization for document access x x
C_DRAW_STA Authorization for document status x x
C_DRAW_TCD Authorization for document activities x x
C_DRAW_TCS Status-Dependent Authorizations for x x
Documents
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 476].
Standard Roles
Table 288:
Role Name
SAP_MDGC_MENU_04 Master Data Governance for Customer: Menu
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 483Role Name
SAP_MDGC_DISP_05 Master Data Governance for Customer: Display
SAP_MDGC_REQ_05 Master Data Governance for Customer: Requester
SAP_MDGC_SPEC_05 Master Data Governance for Customer: Specialist
SAP_MDGC_STEW_04 Master Data Governance for Customer: Data Steward
SAP_MDGC_CL_MENU_04 Master Data Governance for Customer (ERP Customer UI):
Menu
SAP_MDGC_LCC_MENU_04 Master Data Governance for Customer (Lean Request UI):
Menu
SAP_MDGC_LCC_REQ_04 Master Data Governance for Customer (Lean Request UI): Re
quester
If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data
Model and define which entity types and attributes are authorization relevant.
13.11.5.2.4 Master Data Governance for Material (CA-MDG-
APP-MM)
Authorization Objects
Master Data Governance for Material does not have dedicated authorization objects, but instead uses, for
example, the authorization objects of the Material Master and the Application Framework for Master Data
Governance.
Table 289:
Authorization Object Description
K_TP_VALU Transfer Price Valuations
M_MATE_MAF Material Master: Material Locks
M_MATE_MAT Material Master: Material
M_MATE_MAR Material Master: Material Type
M_MATE_WGR Material Master: Material Group
M_MATE_STA Material Master: Maintenance Status
M_MATE_MTA Material Master: Change Material Type
Security Guide for SAP S/4HANA 1709
484 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
M_MATE_WRK Material Master: Plant
M_MATE_MAN Material Master: Central Data
M_MATE_NEU Material Master: Create
M_MATE_BUK Material Master: Company Codes
M_MATE_VKO Material Master: Sales Organization/Distribution Channel
M_MATE_LGN Material Master: Warehouse Numbers
C_KLAH_BKL Authorization for Classification
C_KLAH_BSE Authorization for Selection
C_TCLA_BKA Authorization for Class Types
C_DRAD_OBJ Create/Change/Display/Delete Object Link
C_DRAW_DOK Authorization for document access
C_DRAW_TCD Authorization for document activities
C_DRAW_TCS Status-Dependent Authorizations for Documents
C_DRAW_BGR Authorization for authorization groups
C_DRAW_STA Authorization for document status
C_FVER_WRK PP-PI: Production Version - Plant
DRF_RECEIV Authorization for outbound messages for receiver systems
DRF_ADM Create Outbound Messages
PLM_SPUSR Superuser by Object Type
Note
You need this authorization object for the object type
PLM_MAT only if the search object connector of SAP Net
Weaver Enterprise Search is created for the following En
terprise Search software components:
● PLMWUI
● Software components that include PLMWUI
C_AENR_BGR CC Change Master – Authorization Group
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 485Authorization Object Description
C_AENR_ERW CC Eng. Chg. Mgmt. Enhanced Authorization Check
C_AENR_RV1 CC Engineering change mgmt – revision level for material
BCV_QUILST Overview
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 476].
Standard Roles
Table 290:
Role Name
SAP_MDGM_MENU_06 Master Data Governance for Material: Menu
SAP_MDGM_DISP_06 Master Data Governance for Material: Display
SAP_MDGM_REQ_06 Master Data Governance for Material: Requester
SAP_MDGM_SPEC_06 Master Data Governance for Material: Specialist
SAP_MDGM_STEW_06 Master Data Governance for Material: Data Steward
If you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
Security Guide for SAP S/4HANA 1709
486 P U B L I C SAP S/4HANA Business Applications13.11.5.2.5 Master Data Governance for Financials (CA-MDG-
APP-FIN)
Authorization Objects
Table 291:
Authorization Object Description
USMD_DIST Distribution
Note
This authorization object is used if you have not activated
business function MDG_FOUNDATION.
(Switch: FIN_MDM_CORE_SFWS_EHP5)
USMD_EDTN Edition
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 476].
Standard Roles
Table 292:
Role Description
SAP_MDGF_ACC_DISP_07 Master Data Governance for Financials: Accounting Display
SAP_MDGF_ACC_REQ_07 Master Data Governance for Financials: Accounting Requester
SAP_MDGF_ACC_SPEC_07 Master Data Governance for Financials: Accounting Specialist
SAP_MDGF_ACC_STEW_04 Master Data Governance for Financials: Accounting Data
Steward
SAP_MDGF_CO_DISP_04 Master Data Governance for Financials: Controlling Display
SAP_MDGF_CO_REQ_06 Master Data Governance for Financials: Consolidation Re
quester
SAP_MDGF_CO_SPEC_04 Master Data Governance for Financials: Consolidation Spe
cialist
SAP_MDGF_CO_STEW_04 Master Data Governance for Financials: Consolidation Data
Steward
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 487Role Description
SAP_MDGF_CTR_DISP_04 Master Data Governance for Financials: Controlling Display
SAP_MDGF_CTR_REQ_06 Master Data Governance for Financials: Controlling Requester
SAP_MDGF_CTR_SPEC_04 Master Data Governance for Financials: Controlling Specialist
SAP_MDGF_CTR_STEW_04 Master Data Governance for Financials: Controlling Data
Steward
If you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
13.11.5.2.6 Master Data Governance for Custom Objects (CA-
MDG-COB)
Authorization Objects
You can use the following authorization objects for Master Data Governance for Custom Objects.
Table 293:
Authorization Object Description
USMD_DIST Replication
USMD_DM Data Model
USMD_EDTN Edition Type
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 476].
Standard Role
Table 294:
Role Name
SAP_MDGX_MENU_04 Master data governance for self-defined objects
SAP_MDGX_FND_SAMPLE_SF_05 Master Data Governance for Custom Objects - Flight Data
Model (MDG 8.0)
Security Guide for SAP S/4HANA 1709
488 P U B L I C SAP S/4HANA Business ApplicationsIf you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
13.11.5.3 Authorization Objects and Roles Used by SAP MDG,
Master Data Quality
Authorization Objects
SAP MDG, master data quality uses the authorization objects listed below.
Table 295:
Authorization Object Description
MDQ_EVAL [page 489] Evaluation
MDQ_RULREP [page 490] Rule Repository
Caution
To use SAP MDG, master data quality in combination with the functions of SAP MDG, central governance, see
the required authorization objects in the documents listed below:
● Master Data Governance for Material (CA-MDG-APP-MM) [page 484]
Standard Roles
Table 296:
Frontend Launchpad Role Name
SAP_BR_PRODMASTER_STEWARD Master Data Steward - Product Data
SAP_BR_BPC_EXPERT Configuration Expert - Business Process Configuration
13.11.5.3.1 MDQ_EVAL
Use
This document describes details of the authorization object MDQ_EVAL.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 489Features
The activities listed below are assigned to the authorization object.
Table 297:
Activity Text Authorization
01 Create or generate Backend
Enables the creation of evaluation run information (for example by using import API)
Manage Imports
Enables the import of objects with errors
02 Change Backend
Allows updating evaluation run information
Worklist for Products
● Allows status changes for objects with errors
● Allows adding notes for objects with errors
03 Display Backend
Enables reading of evaluation data
Worklist for Products
● Restricts displaying the list of objects with errors
● Enables displaying the details of an evaluation run
● Defines the list of evaluation settings available in the value help
Manage Imports
● Defines the list of evaluation settings available in the value help
● Restricts the list of data imports shown to the end user
06 Delete Backend
Enables the deletion of evaluation data via report MDQ_DELETE_EVALUATION_DATA
13.11.5.3.2 MDQ_RULREP
Use
This document describes details of the authorization object MDQ_RULREP.
Security Guide for SAP S/4HANA 1709
490 P U B L I C SAP S/4HANA Business ApplicationsFeatures
The activities listed below are assigned to the authorization object.
Table 298:
Activity Text Authorization
01 Create or generate Backend
Enables the creation of rule data information
Manage Imports
Enables the import of rule data information
02 Change Backend
Allows updating rule data information
03 Display Manage Imports
● Defines the list of Rule Repositories available in the value help
● Restricts the list of data imports shown to the end user
13.11.5.4 Deletion of Personal Data in Master Data Governance
Use
For personal data processed in the Master Data Governance (MDG) application, you can use SAP Information
Lifecycle Management (ILM) to control the blocking and deletion of personal data. For more information, see the
product assistance for SAP S/4HANA on the SAP Help Portal under Product Assistance Cross Components
Data Protection .
Relevant Application Object
Table 299:
Application Provided Deletion Functionality
MDG Change Requests Archiving object USMD_CR
For more information about the application object, see the product assistance for SAP S/4HANA on the SAP Help
Portal under Product Assistance Cross Components Master Data Governance Data Protection in Master
Data Governance Data Archiving in Master Data Governance .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 491Configuration: Simplified Blocking and Deletion
● You configure the settings related to the blocking and deletion of business partner, customer, and supplier
master data in Customizing under Cross-Application Components Data Protection Deletion of Data
Deletion of Business Partner Data .
● For information on defining ILM rules, see the product assistance for SAP S/4HANA on the SAP Help Portal
under Product Assistance Cross Components SAP Information Lifecycle Management Using ILM
Retention Management in the Application System Editing ILM Policies Editing Retention Rules .
● For information on defining End of Purpose checks, see the product assistance for SAP S/4HANA on the SAP
Help Portal under Product Assistance Cross Components Data Protection Simplified Blocking and
Deletion End of Purpose (EoP) Check .
End of Purpose
Master Data Governance for Business Partner (MDG-BP), Master Data Governance for Supplier (MDG-S), and
Master Data Governance for Customer (MDG-C) are applications that are providing a workflow-based governance
process for business partners. Within this process, the applications MDG-BP, MDG-S, and MDG-C do not store
business partners permanently. In any case, MDG-BP, MDG-S, and MDG-C do not process business partners with
the end of purpose indicator assigned.
For Master Data Governance, consolidation and Master Data Governance, mass processing, we recommend to
use only business partner records that are not selected for End of Purpose (EoP).
The MDG, consolidation application and the MDG, mass processing application do not process business partners
with the end of purpose indicator assigned.
For MDG, consolidation, we recommend to delete source data after the end of the consolidation process.
Storage of Personal Data
All Master Data Governance applications store data only temporarily.
Changes to Personal Data
The system logs changes to personal data using change documents.
Read Access Logging for MDG
For information on read access logging, see Read Access Logging under Data Protection of this Security Guide.
Security Guide for SAP S/4HANA 1709
492 P U B L I C SAP S/4HANA Business ApplicationsEnhancements
● For Master Data Governance for Custom Objects, we do not recommended to enhance personal data in your
own objects. If it is necessary, you need to ensure to archive and delete enhanced data for the End of Purpose
(EoP) goal.
● For Master Data Governance, central governance, we recommend to use backend tables of SAP-BP for
enhancements and enhance the MDG data model accordingly. .
13.12 Country-Specific Authorizations
Business Roles
Business roles denote a role of a persona, for example, General Ledger Accountant, or Cash Specialist. They are
an aggregation of the applications relevant for a certain persona.
Business roles are technically represented by single roles. They exist on the front-end server and do not contain
authorizations. They serve demonstration purposes and trial use cases. You would typically create your own
business roles as single roles or composite roles in the transaction PFCG. Assigning the required back-end
authorizations is a separate step which is performed in the transaction in PFCG of the corresponding back-end
clients.
The following table shows the business roles used as template roles in the relevant countries:
Table 300:
Country Name Business Role (PFCG/BRT) Role Name
Argentina SAP_BR_GL_ACCOUNTANT_AR General Ledger Accountant for Argen
tina
SAP_BR_AR_ACCOUNTANT_AR Accounts Receivable Accountant for Ar
gentina
SAP_BR_AP_ACCOUNTANT_AR Accounts Payable Accountant for Argen
tina
Australia SAP_BR_AP_MANAGER_AU Accounts Payable Manager for Australia
SAP_BR_GL_ACCOUNTANT_AU General Ledger Accountant for Australia
Belgium SAP_BR_AP_MANAGER_BE Accounts Payable Manager for Belgium
SAP_BR_GL_ACCOUNTANT_BE General Ledger Accountant for Belgium
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 493Country Name Business Role (PFCG/BRT) Role Name
Brazil SAP_BR_AR_ACCOUNTANT_BR Accounts Receivable Accountant for
Brazil
SAP_BR_TREASURY_ACCOUNT Treasury Accountant for Brazil
ANT_BR
Bulgaria SAP_BR_AA_ACCOUNTANT_BG Asset Accountant for Bulgaria
SAP_BR_GL_ACCOUNTANT_BG General Ledger Accountant for Bulgaria
Canada SAP_BR_GL_ACCOUNTANT_CA General Ledger Accountant for Canada
Chile SAP_BR_AR_ACCOUNTANT_CL Accounts Receivable Accountant for
Chile
SAP_BR_AP_ACCOUNTANT_CL Accounts Payable Accountant for Chile
SAP_BR_GL_ACCOUNTANT_CL General Ledger Accountant for Chile
SAP_BR_AP_MANAGER_CL Accounts Payable Manager for Chile
China SAP_BR_AP_ACCOUNTANT_CN Accounts Payable Accountant for China
SAP_BR_GL_ACCOUNTANT_CN General Ledger Accountant for China
SAP_BR_AR_ACCOUNTANT_CN Accounts Receivable Accountant for
China
SAP_BR_CASH_SPECIALIST_CN Cash Management Specialist for China
SAP_BR_CASH_MANAGER_CN Cash Manager for China
SAP_BR_AP_ACCOUNT Accounts Payable Accountant – Pro
ANT_PROCMT_CN curement for China
Colombia SAP_BR_AP_ACCOUNTANT_CO Accounts Payable Accountant for Co
lombia
SAP_BR_AP_MANAGER_CO Accounts Payable Manager for Colombia
Croatia SAP_BR_GL_ACCOUNTANT_HR General Ledger Accountant for Croatia
SAP_BR_ACS_AUDITOR_HR Audit Specialist for Croatia
SAP_BR_AR_ACCOUNTANT_HR Accounts Receivable Accountant for
Croatia
Czech Republic SAP_BR_AR_ACCOUNTANT_CZ Accounts Receivable Accountant for
Czech Republic
Security Guide for SAP S/4HANA 1709
494 P U B L I C SAP S/4HANA Business ApplicationsCountry Name Business Role (PFCG/BRT) Role Name
SAP_BR_AP_ACCOUNTANT_CZ Accounts Payable Accountant for Czech
Republic
SAP_BR_GL_ACCOUNTANT_CZ General Ledger Accountant for Czech
Republic
Egypt SAP_BR_GL_ACCOUNTANT_EG General Ledger Accountant for Egypt
SAP_BR_AR_ACCOUNTANT_EG Accounts Receivable Accountant for
Egypt
SAP_BR_AP_ACCOUNTANT_EG Accounts Payable Accountant for Egypt
Estonia SAP_BR_CASH_SPECIALIST_EE Cash Management Specialist for Estonia
SAP_BR_GL_ACCOUNTANT_EE General Ledger Accountant for Estonia
France SAP_BR_AP_MANAGER_FR Accounts Payable Manager for France
SAP_BR_GL_ACCOUNTANT_FR General Ledger Accountant for France
SAP_BR_TREASURY_SPECIAL Treasury Specialist – Back Office for
IST_BOE_FR France
Greece SAP_BR_AA_ACCOUNTANT_GR Asset Accountant for Greece
SAP_BR_CASH_SPECIALIST_GR Cash Management Specialist for Greece
SAP_BR_AR_ACCOUNTANT_GR Accounts Receivable Accountant for
Greece
SAP_BR_GL_ACCOUNTANT_GR General Ledger Accountant for Greece
SAP_BR_ACS_AUDITOR_GR Audit Specialist for Greece
SAP_BR_INVENTORY_ACCOUNT Inventory Accountant for Greece
ANT_GR
SAP_BR_AP_ACCOUNTANT_GR Accounts Payable Accountant for
Greece
SAP_BR_BILLING_CLERK_GR Billing Clerk for Greece
Hungary SAP_BR_GL_ACCOUNTANT_HU General Ledger Accountant for Hungary
SAP_BR_CASH_SPECIALIST_HU Cash Management Specialist for Hun
gary
SAP_BR_TREASURY_SPECIAL Treasury Specialist – Back Office for
IST_BOE_HU Hungary
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 495Country Name Business Role (PFCG/BRT) Role Name
SAP_BR_TREASURY_ACCOUNT Treasury Accountant for Hungary
ANT_HU
India SAP_BR_AP_ACCOUNTANT_IN Accounts Payable Accountant for India
Ireland SAP_BR_AP_MANAGER_IE Accounts Payable Manager for Ireland
SAP_BR_AP_ACCOUNTANT_IE Accounts Payable Accountant for Ire
land
Italy SAP_BR_AA_ACCOUNTANT_IT Asset Accountant for Italy
SAP_BR_GL_ACCOUNTANT_IT General Ledger Accountant for Italy
Japan SAP_BR_AR_ACCOUNTANT_JP Accounts Receivable Accountant for Ja
pan
SAP_BR_AA_ACCOUNTANT_JP Asset Accountant for Japan
SAP_BR_AP_ACCOUNTANT_JP Accounts Payable Accountant for Japan
Kazakhstan SAP_BR_GL_ACCOUNTANT_KZ General Ledger Accountant for Kazakh
stan
SAP_BR_AR_ACCOUNTANT_KZ Accounts Receivable Accountant for Ka
zakhstan
SAP_BR_AP_ACCOUNTANT_KZ Accounts Payable Accountant for Ka
zakhstan
SAP_BR_AA_ACCOUNTANT_KZ Asset Accountant for Kazakhstan
SAP_BR_WAREHOUSE_CLERK_KZ Warehouse Clerk for Kazakhstan
Kuwait SAP_BR_AP_ACCOUNTANT_KW Accounts Payable Accountant for Kuwait
Latvia SAP_BR_CASH_SPECIALIST_LV Cash Management Specialist for Latvia
SAP_BR_GL_ACCOUNTANT_LV General Ledger Accountant for Latvia
Lithuania SAP_BR_AP_ACCOUNTANT_LT Accounts Payable Accountant for Lith
uania
Luxembourg SAP_BR_GL_ACCOUNTANT_LU General Ledger Accountant for Luxem
bourg
Malaysia SAP_BR_AP_MANAGER_MY Accounts Payable Manager for Malaysia
SAP_BR_GL_ACCOUNTANT_MY General Ledger Accountant for Malaysia
Security Guide for SAP S/4HANA 1709
496 P U B L I C SAP S/4HANA Business ApplicationsCountry Name Business Role (PFCG/BRT) Role Name
Mexico SAP_BR_GL_ACCOUNTANT_MX General Ledger Accountant for Mexico
Netherlands SAP_BR_GL_ACCOUNTANT_NL General Ledger Accountant for Nether
lands
Oman SAP_BR_AP_ACCOUNTANT_OM Accounts Payable Accountant for Oman
Peru SAP_BR_AR_ACCOUNTANT_PE Accounts Receivable Accountant for
Peru
SAP_BR_GL_ACCOUNTANT_PE General Ledger Accountant for Peru
SAP_BR_AP_MANAGER_PE Accounts Payable Manager for Peru
SAP_BR_CASH_MANAGER_PE Cash Manager for Peru
Philippines SAP_BR_AP_MANAGER_PH Accounts Payable Manager for Philip
pines
SAP_BR_GL_ACCOUNTANT_PH General Ledger Accountant for Philip
pines
SAP_BR_AR_ACCOUNTANT_PH Accounts Receivable Accountant for
Philippines
Poland SAP_BR_GL_ACCOUNTANT_PL General Ledger Accountant for Poland
SAP_BR_AA_ACCOUNTANT_PL Asset Accountant for Poland
SAP_BR_AP_ACCOUNTANT_PL Accounts Payable Accountant for Po
land
SAP_BR_AR_ACCOUNTANT_PL Accounts Receivable Accountant for Po
land
SAP_BR_CASH_SPECIALIST_PL Cash Management Specialist for Poland
Qatar SAP_BR_AR_ACCOUNTANT_QA Accounts Receivable Accountant for Qa
tar
SAP_BR_AP_ACCOUNTANT_QA Accounts Payable Accountant for Qatar
SAP_BR_GL_ACCOUNTANT_QA General Ledger Accountant for Qatar
Romania SAP_BR_GL_ACCOUNTANT_RO General Ledger Accountant for Romania
SAP_BR_AA_ACCOUNTANT_RO Asset Accountant for Romania
SAP_BR_CASH_SPECIALIST_RO Cash Management Specialist for Roma
nia
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 497Country Name Business Role (PFCG/BRT) Role Name
SAP_BR_AP_ACCOUNTANT_RO Accounts Payable Accountant for Roma
nia
Russia SAP_BR_AP_ACCOUNTANT_RU Accounts Payable Accountant for Rus
sian Federation
SAP_BR_AR_ACCOUNTANT_RU Accounts Receivable Accountant for
Russian Federation
SAP_BR_GL_ACCOUNTANT_RU General Ledger Accountant for Russian
Federation
SAP_BR_AA_ACCOUNTANT_RU Asset Accountant for Russian Federa
tion
SAP_BR_INVENTORY_ACCOUNT Inventory Accountant for Russian Feder
ANT_RU ation
SAP_BR_WAREHOUSE_CLERK_RU Warehouse Clerk for Russian Federation
Serbia SAP_BR_AA_ACCOUNTANT_RS Asset Accountant for Serbia
SAP_BR_GL_ACCOUNTANT_RS General Ledger Accountant for Serbia
SAP_BR_CASH_SPECIALIST_RS Cash Management Specialist for Serbia
SAP_BR_AR_ACCOUNTANT_RS Accounts Receivable Accountant for
Serbia
SAP_BR_AP_ACCOUNTANT_RS Accounts Payable Accountant for Serbia
Singapore SAP_BR_GL_ACCOUNTANT_SG General Ledger Accountant for Singa
pore
Slovakia SAP_BR_CASH_SPECIALIST_SK Cash Management Specialist for Slova
kia
SAP_BR_AR_ACCOUNTANT_SK Accounts Receivable Accountant for Slo
vakia
SAP_BR_AP_ACCOUNTANT_SK Accounts Payable Accountant for Slova
kia
Slovenia SAP_BR_GL_ACCOUNTANT_SI General Ledger Accountant for Slovenia
SAP_BR_AP_ACCOUNTANT_SI Accounts Payable Accountant for Slov
enia
Saudi Arabia SAP_BR_AP_ACCOUNTANT_SA Accounts Payable Accountant for Saudi
Arabia
Security Guide for SAP S/4HANA 1709
498 P U B L I C SAP S/4HANA Business ApplicationsCountry Name Business Role (PFCG/BRT) Role Name
SAP_BR_GL_ACCOUNTANT_SA General Ledger Accountant for Saudi
Arabia
South Korea SAP_BR_AR_ACCOUNTANT_KR Accounts Receivable Accountant for
South Korea
Taiwan SAP_BR_GL_ACCOUNTANT_TW General Ledger Accountant for Taiwan
Thailand SAP_BR_AR_ACCOUNTANT_TH Accounts Receivable Accountant for
Thailand
SAP_BR_GL_ACCOUNTANT_TH General Ledger Accountant for Thailand
SAP_BR_AA_ACCOUNTANT_TH Asset Accountant for Thailand
Turkey SAP_BR_AP_ACCOUNTANT_TR Accounts Payable Accountant for Tur
key
SAP_BR_GL_ACCOUNTANT_TR General Ledger Accountant for Turkey
Ukraine SAP_BR_AP_ACCOUNTANT_UA Accounts Payable Manager for Ukraine
SAP_BR_INVENTORY_ACCOUNT Inventory Accountant for Ukraine
ANT_UA
SAP_BR_AA_ACCOUNTANT_UA Asset Accountant for Ukraine
SAP_BR_AP_ACCOUNTANT_UA Accounts Payable Accountant for Uk
raine
SAP_BR_AR_ACCOUNTANT_UA Accounts Receivable Accountant for Uk
raine
SAP_BR_GL_ACCOUNTANT_UA General Ledger Accountant for Ukraine
United Arab Emirates SAP_BR_AP_ACCOUNTANT_AE Accounts Payable Accountant for United
Arab Emirates
SAP_BR_AR_ACCOUNTANT_AE Accounts Receivable Accountant for
United Arab Emirates
United Kingdom SAP_BR_AP_MANAGER_GB Accounts Payable Manager for United
Kingdom
SAP_BR_AP_ACCOUNTANT_GB Accounts Payable Accountant for United
Kingdom
SAP_BR_CASH_SPECIALIST_GB Cash Management Specialist for United
Kingdom
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 499Country Name Business Role (PFCG/BRT) Role Name
SAP_BR_GL_ACCOUNTANT_GB General Ledger Accountant for United
Kingdom
United States SAP_BR_AP_MANAGER_US Accounts Payable Manager for United
States
SAP_BR_TREASURY_SPECIAL Treasury Specialist – Back Office for
IST_BOE_US United States
Venezuela SAP_BR_GL_ACCOUNTANT_VE General Ledger Accountant for Vene
zuela
SAP_BR_AP_MANAGER_VE Accounts Payable Manager for Vene
zuela
13.13 Human Resources
13.13.1 User Management
Use
User management for Human Resources uses the mechanisms provided by SAP NetWeaver Application Server
(ABAP, Java, or ABAP and Java), for example, tools, user types, and password policies. See the sections below for
an overview of how these mechanisms apply to Human Resources. In addition, there is a list of the standard users
that are necessary for operating Human Resources.
User Administration Tools
The table below shows the tools for user management in Human Resources.
Table 301:
Tool Description
User and role maintenance with SAP NetWeaver AS for ABAP For more information, look for User Administration and Iden
(Transactions SU01 and PFCG) tity Management in ABAP Systems in the documentation of
SAP NetWeaver at http://help.sap.com/netweaver .
Security Guide for SAP S/4HANA 1709
500 P U B L I C SAP S/4HANA Business ApplicationsTool Description
User Management Engine of SAP NetWeaver AS for Java This tool is used for user management of HR portal roles
(business packages).
For more information, look for User Management Engine in the
documentation of SAP NetWeaver at http://help.sap.com/
netweaver .
User Types
It is often necessary to specify different security policies for different types of users. For example, it may be
necessary that individual users who perform tasks interactively have to change their passwords on a regular
basis, but not users who run background processing jobs.
The specific user types that are required for human resources include:
● Individual users
○ Admisnistrator
○ Personnel Administration
○ Benefits Administration
○ Manager
○ Personnel Administration
○ Benefits Administration
○ Compensation Administration
○ Training and Event Management
○ Specialists for
○ Personnel Administration
○ Talent Management
○ Benefits Administration
○ Compensation Administration
○ Training and Event Management
● Technical users
Technical users are required for the following business processes:
○ WF-BATCH user
If you want to use the workflow functions for the different Personnel Management functions, you must
create a WF-BATCH system user in the standard system.
○ Distribution of master data through ALE technology. For more information, see the documentation for the
report RHALEINI ( HR: ALE Distribution of HR Master Data).
○ Compensation Management (PA-CM): For the integration with the Award function, the technical user
requires authorization for the following functions:
○ Call RFC function module HRCM_RFC_LTI_ACCRUALDATA_GET ( Determine awards data for
accumulating accruals)
○ Read the Award infotype (0382), authorization object P_ORGIN
○ Budget Management (PA-PM)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 501○ You use background processing to create commitments in accounting with a RFC connection.
Depending on the process and the system landscape used, it may be necessary to set up a user for
the background processing. You can use your own user (an additional logon is required) or set up a
special commitment engine user.
For more information about these user types, see the Security Guide for SAP NetWeaver Application Server ABAP
under http://help.sap.com/netweaver .
13.13.2 Authorizations
The authorizations topic plays a fundamental role in the area of Human Resources since access to personnel data
must be carefully protected. In SAP Human Resources, there is a two-part concept for setting up authorizations.
You should familiarize yourself with this concept if you use Human Resources components.
Human Resources uses the authorization concept provided by SAP NetWeaver Application Server. Therefore, the
security recommendations and guidelines for authorizations detailed in the Security Guide for SAP NetWeaver AS
ABAP and in the Security Guide for SAP NetWeaver AS Java also apply to Human Resources.
Note
Furthermore, Human Resources has specific structural authorizations for which the organizational
assignment is checked to see whether a user may perform an activity.
For detailed information about authorizations in Human Resources, see SAP Library for SAP S/4HANA Human
Resources and the section Authorizations for Human Resources.
The SAP NetWeaver Application Server authorization concept is based on assigning authorizations to users based
on roles. For role maintenance, use the profile generator (transaction PFCG) on the SAP NetWeaver AS ABAP.
Standard Roles
The table below shows the standard roles that are used by the Personnel Management components listed under
“Description”.
Note
The standard roles for Human Resources components that are described in a separate chapter of this Security
Guide are also in the “Authorizations” section. The same applies to the self-service components Employee Self-
Service [page 556] and Manager Self-Service [page 571] that are also described under Cross-Application
Components Self-Services in this Security Guide.
Table 302: Standard Roles
Role Description
SAP_HR_BN* Roles for the PA-BN (Benefits) component
Security Guide for SAP S/4HANA 1709
502 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_HR_CM* Roles for the PA-CM (Compensation Management) compo
nent
SAP_HR_CP* Roles for the PA-CM-CP (Personnel Cost Planning) compo
nent
SAP_HR_OS* Roles for the PA-OS (Organizational Structure) component
SAP_HR_PA_xx_* Roles for the international versions and country versions of
the PA-PA (Personnel Administration) component
SAP_HR_PA_PF_xx_* Roles for the PA-PF (Pension Schemes) component
SAP_HR_PD* Roles for the PA-PD (Personnel Development) component
SAP_HR_RC* Roles for the PA-RC (Recruitment) component
SAP_HR_REPORTING Role for the Human Resources Analyst
Note
This role is obsolete. We recommend that you no longer
use this role.
SAP_ASR_ADMINISTRATOR Enhancement of the role SAP_HR_PA_xx_* for the HR admin
istrators that use the functions of the component PA-AS (HR
Administrative Services)
For the roles marked with an asterisk (*), several roles exist for each of the components. For roles with xx, where
xx represents the SAP country key, various roles exist for each of the country versions.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by Human Resources.
Note
For more information about the authorization objects for Human Resources, see http://help.sap.com/
s4hana_op_1709 under Product Assistance Enterprise Business Applications Human Resources HR
Tools Authorizations for Human Resources Technical Aspects Authorization Objects .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 503Table 303: Most Important Standard Authorization Objects
Authorization Object Name Description
P_ORGIN HR master data Used to check the authorization for ac
cessing HR infotypes. The checks take
place when HR infotypes are edited or
read.
P_ORGINCON HR master data with context This authorization object consists of the
same fields as the authorization object
P_ORGIN, and also includes the field
PROFL (structural profile). A check using
this object enables user-specific con
texts to be mapped in HR master data.
P_ORGXX HR master data – extended check You can use this object to determine
that other fields are also to be checked.
You can determine whether this check is
to be performed in addition to or as an
alternative to the HR Master Data au
thorization check.
P_P_ORGXXCON HR master data - extended check with This authorization object consists of the
context same fields as the authorization object
P_ORGXX, and also includes the field
PROFL (structural profile). A check using
this object enables user-specific con
texts to be mapped in HR master data
P_TCODE HR: Transaction Code This authorization object checks some
specific SAP Human Resources transac
tions.
PLOG Personnel planning Determines for which types of informa
tion processing a user has authorization.
PLOG_CON Personnel planning with context This authorization object consists of the
same fields as the object PLOG, and also
includes the field PROFL (structural pro
file). The check using this object enables
user-specific contexts to be mapped.
Security Guide for SAP S/4HANA 1709
504 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Name Description
P_ASRCONT Authorization for process content The Authorization for Process Content
object is used by the authorization check
for HR Administrative Services. It checks
the authorization for access to various
process contents and also runs through
the authorization objects that you have
specified in Customizing in the table
T77S0 (see note below). For more infor
mation, see http://help.sap.com/
s4hana_op_1709 under Product
Assistance Enterprise Business
Applications Human Resources
Shared Services HR Administrative
Services (PA-AS) HCM Processes and
Forms and section Authorization Con
cept of HCM Processes and Forms.
P_DEL_PERN Deletion of personnel numbers in live This authorization object is used in the
systems report RPUDELPP and facilitates the de
letion of personnel numbers in live sys
tems. It is used by two roles, one for re
questing the deletion and one for per
forming the deletion. These roles need to
be assigned to two different users (dou
ble verification principle).
P_EICAU Authorization for activity in the Em This authorization object checks the au
ployee Interaction Center thorization for editing EIC activities. For
more information, see http://
help.sap.com/s4hana_op_1709 under
Product Assistance Enterprise
Business Applications Human
Resources Shared Services
Employee Interaction Center (EIC)
General Settings and section Authori
zation Concept for Employee Interaction
Center (EIC).
Note
In Customizing for certain authorization objects, you can specify whether they are to be checked. The table
T77S0 in the Group for Semantic Short Text for PD Plan AUTSW groups all central switches and settings for the
Human Resources authorization check. Note that changes to the settings severely affect your authorization
concept.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 505For more information about changing the main authorization switch, see Customizing for Personnel
Administration and choose Tools Authorization Management .
13.13.3 Security-Relevant Logging and Tracing
Change documents are created for the infotypes of SAP Human Resources, on the basis of which you can trace
changes to infotype data. For more information, see http://help.sap.com/s4hana_op_1709 under Product
Assistance Enterprise Business Applications Human Resources HR Tools in the following sections:
● Creating Change Documents for Personnel Administration Infotypes
● Creation of Change Documents for Personnel Planning Infotypes
13.13.4 Core HR and Payroll
13.13.4.1 Core HR
About This Chapter
This section of the Security Guide provides an overview of security-relevant information for Core HR.
Overview of the Main Sections of This Chapter
The following sections contain the security-relevant information that is specific to Personnel Management:
● Important SAP Notes
This section lists the most important SAP Notes for the security of Personnel Management.
● Authorizations
This section provides an overview of the authorization concept used for Personnel Management.
● Communication Channel Security
This section provides an overview of the communication paths used by Personnel Management and provides
information on how you can best protect them.
● Communication Destinations
This section provides an overview of the communication destination for the components of Personnel
Management and the country-specific components of Personnel Administration.
● Data Storage Security
This section provides an overview of the critical data used by Personnel Management, as well as the security
mechanisms used.
● Security for Additional Applications
Security Guide for SAP S/4HANA 1709
506 P U B L I C SAP S/4HANA Business ApplicationsThis section contains information about temporary sequential (TemSe) data storage, which only temporarily
stores data from country-specific reports from Personnel Administration.
● Other Security-Relevant Information
This section contains information about security-relevant Customizing for infotype records and indicates the
reports that perform database statistics and consistency checks without checking the user''s authorizations.
● Chapter with the security-relevant information for the component HCM Processes and Forms
13.13.4.1.1 Authorizations
Use
The Personnel Management components use the two-part authorization concept from SAP Human Resources.
For more information, see section Authorizations in the S/4HANA Security Guide forHuman Resources section.
Standard Roles
The table below shows the standard roles that are used by the Personnel Management components.
Table 304:
Role Description
SAP_HR_OS* Roles for the PA-OS (Organizational Structure) component
SAP_HR_PA_xx_* Roles for the international versions and country versions of
the component PA-PA (Personnel Administration)
Note
For the roles marked with an asterisk (*), several roles exist for each of the components. For roles with “xx”,
where “xx” represents the SAP country key, various roles exist for each of the country versions.
Standard Authorization Objects
The Personnel Management components use the standard authorization objects from SAP Human Resources.
For more information about the authorization objects for Human Resources, see SAP Library for S/4HANA on
SAP Help Portal at Human Resources HR Tools Authorizations for Human Resources Technical Aspects
Authorization Objects .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 50713.13.4.1.2 Communication Channel Security
Use
The table below shows the communication channels used by Personnel Management , the protocol used for the
connection, and the type of data transferred.
Table 305:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Interface Toolbox (Transac ALE Master data, Benefits data,
tion PU12) Organizational data as de
fined by the user
SAP BW Extractor Program Master data, Organizational
data, Personnel Development
data
SAP CO RFC Cost centers, orders, and so Authorizations for CO objects
on are required here
(for distributed systems)
External Files ASCII Personnel Administration data Applicable only for country
versions Australia and New
Zealand
MS Word Report Interface with SAP Office Integration
NetWeaver
Connection with PDF-based HTTP(S) Person-related data (for ex
print forms for archiving ample, employee photo)
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
Note
If you convert the protocol from HTTP to HTTPS and use PDF-based print forms, see SAP Note 1461447.
For more information, see Transport Layer Security in the SAP NetWeaver Security Guide .
13.13.4.1.3 Communication Destinations
Use
Specific communication destinations are available for the Personnel Management components and Personnel
Administration country-specific components.
Security Guide for SAP S/4HANA 1709
508 P U B L I C SAP S/4HANA Business ApplicationsFeatures
The function group HRPDV_SERVICES contains the following Remote Function Calls (RFCs) for displaying and
updating the position attributes. The communication user requires authorization for the authorization object
S_RFC to execute Remote Function Calls.
Table 306:
Function Group Function Module Description
HRPDV_SERVICES HRPDV_GET_ROOT_OBJECT Gets the root object for the user
HRPDV_ORG_PATHROOTS Root object specification
HRPDV_CREATE_POSITION Creates a new position in the organiza
tional unit
HRPDV_GET_POSITION_ATTR Gets the corresponding position attrib
utes
HRPDV_UPDATE_POSITION_ATTR Updates the corresponding position at
tributes
HRPDV_COPY_POSITION Copies an existing position and the cor
responding attributes several times
HRPDV_DELIMIT_POSITION Delimits an existing position
HRPDV_POSITION_SEARCH Enables a search for positions based on
Object and Data Provider (OADP)
HRPDV_GET_TIME_CONSTRAINTS Gets the time constraints information of
the corresponding position infotypes
and relationships
HRPDV_TRANSFER_EMPLOYEE Enables the conversion of an employee
from one position to another or creates
an additional personnel assignment for
the employee
HRPDV_GET_POSITION_F4_HELPS Returns the input help values for the in
fotype fields Account Assignment and
Employee Subgroup
Benefits (PA-BN)
When evaluating retirement benefits for employees, service-related data is sent to an external system using
IDocs. The Benefits system places the IDocs in a special port. External systems can collect the IDocs from this
port. The external systems evaluate the retirement benefits based on the transferred data and then send them
with an inbound IDoc back to the SAP system.
There are no special functions from the Benefits system side to protect this data.
Compensation Management (PA-CM)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 509The self-service scenario Salary Benchmarking (HRCMP0053) exchanges data with external benchmarking
providers. You communicate synchronously and online using HTTPS protocol (HyperText Transfer Protocol with
SSL).
Personnel Administration
● HR Administrative Services
HR Administrative Services can transfer personal data from SAP E-Recruiting and return data to SAP E-
Recruiting . For more information, see the Security Guide for SAP E-Recruiting under Communication
Destinations .
● Pension Fund (PA-PF)
○ You can create files with SAP List Viewer (ALV) and TemSe ( Temporary Sequential Objects ).
○ There is no encryption of data in the standard SAP system.
13.13.4.1.4 Data Storage Security
The infotypes in Personnel Management contain particularly sensitive data. This data is protected by central
authorization objects.
Note
For more information about authorization objects, see section Authorizations in the S/4HANA security guide
for Human Resources.
Examples of infotypes containing particularly sensitive data:
● International infotypes for Personnel Administration (PA-PA)
○ Personal Data (0002)
○ Basic Pay (0008)
○ Bank Details (0009)
○ Family Member/Dependents (0021)
● Personnel Development (PA-PD)
○ Qualifications
○ Appraisals
● Personnel Cost Planning and Simulation (PA-CP)
○ Planning of Personnel Costs (0666), contains salary-based information
● Management of Global Employees (PA-GE)
○ Compensation Package Offer (0706)
Security Guide for SAP S/4HANA 1709
510 P U B L I C SAP S/4HANA Business ApplicationsOther sensitive Personnel Management data
● Budget Management
The Budget Management component accesses the salary data of employees and displays data from the
Controlling (CO) and Funds Management (FI-FM) components. The standard authorization concept for
Human Resources , Controlling , and Funds Management is used for these processes. The following
authorization objects are also available to protect the data:
○ P_ENCTYPE ( HR: PBC - Financing ): Determines which funds reservation types a user can access and
which activities the user is allowed to perform.
○ P_ENGINE ( HR: Authorization for Automatic Commitment Creation ): Determines which activities a user is
allowed to perform when creating commitments.
● Pension Fund (PA-PF)
Access to salary data, pensions, and benefits entitlements is protected by the following authorization objects:
○ P_ORIGIN ( HR: Master Data )
○ P_CH_CK ( HR-CH: Pension Fund: Account Access )
○ P_NL_PKEV( Bevoegdheidsobject voor PF-gebeurtenissen )
● Personnel Cost Planning (PA-CM-CPand PA-CP)
The old Personnel Cost Planning (PA-CM-CP) and the new Personnel Cost Planning and Simulation (PA-CP)
components both save salary-relevant information to the clusters of the database PCL5. You can control
access rights using the authorization object P_TCODE ( HR: Transaction Code ).
● Employee Interaction Center (PA-EIC)
The EIC Authentication infotype (0816) enables question and response pairs to be saved that an agent of
Employee Interaction Center then uses to identify a calling employee. You can only maintain the infotype with
the Authentication for EIC Employee Self-Service.
● HR Administrative Services (PA-AS)
The personnel file and all process instances are saved with intermediate statuses and history to the Case
Management databases.
13.13.4.1.5 Security for Additional Applications
Personnel Administration country-specific components use several reports that store security-relevant and
sensitive data. This data includes employee data relating to salary, tax, social insurance, pension contributions,
and garnishments.
The data is stored in temporary sequential (TemSe) files and used when printing legal forms, statistics, and
business reports. Access to TemSe is controlled by the authorization object S_TMS_ACT. Data encryption is not
necessary here. For a list of all reports and programs using TemSe, see the Personnel Administration
documentation for your country version.
You can also download data directly from the front-end server (for example, PC/terminal) or application server
without first storing the data records in the TemSe. To do so, you copy the data to a data carrier that you can then
send to the authorities.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 51113.13.4.1.6 Other Security-Relevant Information
Use
Other security-relevant Customizing for infotype records
With the field Access Auth. (Access Authorization) in table V_T582A ( Infotype attributes (Customizing) ), you can
control access to an infotype record depending on whether the record belongs to the area of responsibility of a
person responsible on the current date. For more information, see Customizing for Personnel Management under
Personnel Administration Customizing Procedures Infotypes Infotypes . Note in particular the help for
the Access Authorization field.
Technical utilities without integrated authorization check
The following technical utilities read data without the user''s authorizations being checked. You should therefore
only assign relevant report authorizations to roles containing system administrator functions.
● Reports with the prefix RHDBST*: Database statistics
● Reports with the prefix RHCHECK*: Consistency checks for Organizational Management and Personnel
Development data.
If required, you can use the following reports (developed for SAP internal use) for testing purposes. However, SAP
does not accept any responsibility for these reports:
● Report RPCHKCONSISTENCY: ( Consistency check for HR master data )
● Report RPUSCNTC ( Find Inconsistencies in Time Constraints )
13.13.4.1.7 HCM Processes and Forms
About this Document
This chapter provides an overview of the security-relevant information that applies to HCM Processes and Forms
(PA-AS).
Overview of the Main Sections of This Chapter
The HCM Processes and Forms chapter comprises the following sections:
● Before You Start
This section contains references to other Security Guides that build the foundation for the HCM Processes
and Forms chapter and a list of the most important SAP Notes for HCM Processes and Forms regarding
security.
Security Guide for SAP S/4HANA 1709
512 P U B L I C SAP S/4HANA Business Applications● Authorizations
This section provides an overview of the authorization concept that applies to HCM Processes and Forms.
● Internet Communication Framework Security
This section provides an overview of the Internet Communication Framework (ICF) services that are used by
HCM Processes and Forms.
● Security for Additional Applications
This section provides information on a Business Add-In (BAdI) that can be used for the attachment handling
of HCM Processes and Forms.
● Other Security-Relevant Information
This section provides information on the possibility of protecting the Customizing views of HR Administrative
Services by a using a grouping option for the authorization check to prevent users without authorization from
maintaining person-related data.
13.13.4.1.7.1 Authorizations
Use
HCM Processes and Forms uses the authorization concept provided by the SAP NetWeaver AS for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply to HCM Processes and Forms.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see section Role Administration in the SAP Library for S/
4HANA Identity Management.
Role and Authorization Concept for HCM Processes and Forms
The authorization concept for HCM Processes and Forms is described under the section Authorization Concept of
HCM Processes and Forms in the SAP Library for S/4HANA HCM Processes and Forms.
Standard Roles
The table below shows the standard roles that are used for HCM Processes and Forms authorizations.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 513Table 307: Standard Roles for HCM Processes and Forms
Role Name Description
SAP_ASR_HRADMIN_SR_HCM_CI_3 HR Administrator: NWBC Role This single role contains the authoriza
tions for the HR Administrator role.
SAP_ASR_EMPLOYEE_SR_HCM_CI_3 ESS Single Role for HCM PF Services This single role contains the authoriza
tions for the Employee role in Employee
Self-Service (WDA).
SAP_ASR_EMPLOYEE HR Administrative Services : Employee This single role contains the authoriza
tions for the Employee role in the
Business Package for Employee Self-
Service (up to and including 1.4.1).
SAP_ASR_MANAGER HR Administrative Services : Manager This single role contains the authoriza
tions for the Manager role.
Note
The Employee and Manager roles use HCM Processes and Forms. For security-relevant information regarding
these components, see the sections Employee Self Service and Manager Self Service under Self Services in the
S/4 HANA Security Guide.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by HCM Processes and Forms:
Table 308:
Authorization Object Name Comment
S_RFC Authorization Check for RFC Access
S_SCMG_CAS Case Management: Case These authorization objects manage ac
cess to the Process Object of HCM
S_SCMG_FLN Case Management: Authorization by Processes and Forms.
Field
S_SRMGS_CT Records Management: Authorizations These authorization objects manage ac
for Document Content cess to the digital Personnel File in the
HR Administrator Role.
S_SRMGS_DC Records Management: Authorization for
Documents
S_SRMGS_PR Records Management: Authorizations
for Attributes
Security Guide for SAP S/4HANA 1709
514 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Name Comment
S_SRMSY_CL SAP Records Management : General Au
thorization Object
S_TCODE Transaction Code Check at Transaction
Start
P_ASRCONT Authorization for Process Content This authorization object manages the
rights to start and execute processes
with HCM Processes and Forms.
13.13.4.1.7.2 Internet Communication Framework Security
Use
You should only activate those services that are needed for the applications running in your system. For HCM
Processes and Forms, the following services are needed which you can find under the path
default_host/sap/bc/webdynpro/sap/:
● asr_form_display
● asr_keyword_search
● asr_launchpad
● asr_mass_start_process
● asr_OBJECT_SEARCH
● asr_pa_pd_processes_display
● ars_personnel_file
● asr_processes_display
● ASR_PROCESS_EXECUTE_FPM
● asr_process_select
● ars_profiles_show
● asr_srch_pd_process
Activities
Use the transaction SICF to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 515More Information
For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver Library documentation.
13.13.4.1.7.3 Security for Additional Applications
For the uploading of attachments in HCM Processes and Forms you can use Business Add-In (BAdI)
HRASR00ATTACHMENT_HANDLING for defining the file types allowed and the maximum size of attachments. For
more information, see the BAdI documentation in the S/4HANA system.
13.13.4.1.7.4 Other Security-Relevant Information
Authorizations for the Implementation Guide for HR Administrative Services
The views in the Implementation Guide for HR Administrative Services are protected separately by a grouping for
the authorization check to prevent users without authorization maintaining person-related data. Under the field
name DICBERCLS ( Authorization Group), you can set the following in the authorization object S_TABU_DIS:
● Switch PASC: Authorization check for all views of HR Administrative Services in which no Customizing settings
were made that affect authorization checks for the users of HR Administrative Services.
● Switch PASA: Additional authorization check for the views that may affect the authorization check for users of
HR Administrative Services.
13.13.4.1.8 Personnel & Organization
About This Chapter
This chapter of the Security Guide provides an overview of the security-relevant information for Personnel &
Organization (PA-PAO).
Role and Authorization Concept for Personnel & Organization
The Personnel & Organization component uses the following authorization concepts:
● SAP NetWeaver authorization concept (based on assigning authorizations to users based on roles)
For this purpose, the roles mentioned in section Standard Roles are available as a template. You can copy the
standard roles to the customer name space and adjust them to suit your requirements. You use the profile
generator (transaction PFCG) to maintain roles.
● Structural Authorizations (HCM-specific authorization concept)
Security Guide for SAP S/4HANA 1709
516 P U B L I C SAP S/4HANA Business ApplicationsYou configure structural authorizations in Customizing for Personnel & Organization by choosing the following
path: Security Authorizations Structural Authorizations .
For more information about the structural authorization check, see Structural Authorization Check (in SAP
Library for S/4HANA under Human Resources HR Tools Authorizations for Human Resources ).
Standard Roles
The following standard single roles are available for the Personnel & Organization component: Single Roles for
Personnel & Organization.
Gateway Information
For information on security information for Gateway, please see:
Security Settings in the SAP Gateway
The SAP Gateway Foundation Security Guide available via http://help.sap.com//nw74 Security Information
Security Guide and search for the document SAP NetWeaver Gateway Foundation Security Guide.
13.13.4.2 Payroll (PY)
About This Chapter
This section of the Security Guide provides an overview of security-relevant information for Payroll (PY).
Overview of the Main Sections of This Chapter
The chapter “Payroll” comprises the following main sections:
● Important SAP Notes
This section lists the most important SAP Notes with regard to the security of Payroll.
● User Management
This section provides an overview of the user types required for Payroll.
● Authorizations
This section provides an overview of the authorization concept used for Payroll.
Note also the section Authorizations for Human Resources overall.
● Communication Channel Security
This section provides an overview of the communication paths used by Payroll.
● Data Storage Security
This section provides an overview of the critical data used by Payroll, as well as the security mechanisms
used.
● Security for Third-Party Applications or Additional Applications
This section contains security information that applies for additional applications that are used together with
Payroll (for example, the Interface Toolbox or B2A: Communication with Authorities).
● Country-Specific Features
This section contains additional security-relevant information for some country versions.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 517Note
The information in the chapter “Payroll (PY)” applies for all country versions of Payroll. The country-
specific sections only contain additional country-specific information, if any exists.
13.13.4.2.1 Important SAP Notes
The following table lists the most important SAP Notes with regard to the security of Payroll.
Table 309:
Title SAP Note Comment
Analyzing HR authorizations 902000 Contains general information about au
thorizations in the attachments
Q&A: How to customize Payroll Account 116523 Explains that the display authorizations
ing postings in Rel.4.x for posting to Accounting are controlled
using the report authorizations (that is,
there are no table authorizations)
13.13.4.2.2 User Management
Definition
User management for Payroll uses the mechanisms provided by the SAP Web Application Server ( ABAP), for
example, tools, user types, and password policies. For an overview of how these mechanisms apply for Payroll ,
see the sections below. In addition, there is a list of the standard users that are necessary for operating Payroll .
User Management Tools
The table below shows the tools to use for user management with Payroll .
Table 310: User Management Tools
Tool Detailed Description Prerequisites
User and Role Maintenance (transaction You can use the Role Maintenance trans
PFCG) action PFCG to generate profiles for your
Payroll users.
Security Guide for SAP S/4HANA 1709
518 P U B L I C SAP S/4HANA Business ApplicationsUser Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively have to change their passwords on a regular basis,
but not those users under which background processing jobs run.
The user types required for Payroll include:
● Individual users
○ Administration user
○ Payroll manager
○ Payroll specialist
● Technical users
○ Payroll procedure administrator
○ ALE user for posting payroll results to Accounting
For more information about these user types, see the SAP Web AS ABAP Security Guide under User Types.
13.13.4.2.3 Authorizations
Role Concept and Authorization Concept for Payroll
Payroll uses the authorization concept provided by SAP NetWeaver Application Server for ABAP, which is based
on the assignment of authorizations to users using roles.
The roles named as “standard roles” are available as templates. You can copy the standard roles into the
customer-specific namespace and adjust them to suit your requirements. To maintain roles, you use the Profile
Generator (transaction PFCG).
Standard Roles
The following table shows examples of standard roles that are used by the Payroll component.
Table 311: Standard Roles
Role Description
SAP_HR_PY_xx_PAYROLL-ADM Payroll administrator
SAP_HR_PY_xx_PAYROLL-MANAGER Payroll manager
SAP_HR_PY_xx_PAYROLL-PROC-ADM Payroll procedure administrator
SAP_HR_PY_xx_PAYROLL-SPEC Payroll specialist
SAP_HR_PY_xx_* Roles for mapping country-specific tasks within Payroll
SAP_HR_PY_PAYROLL-LOAN-ADM Loan accounting administrator
xx stands for the country key. For the roles marked with an asterisk (*), additional roles exist for each of the
countries.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 519Standard Authorization Objects
Payroll uses the authorization objects that are usually available for Human Resources. For more information, see
Authorizations .
The following table shows the security-relevant authorization objects that are also used by Payroll .
Table 312: Standard Authorization Objects
Authorization Objects Name Description Additional Information
P_PBSPWE Process Workbench Engine Authorizations for the Proc
(PWE) authorization ess Workbench Engine(PWE)
P_PCLX HR: Cluster Check when accessing HR SAP Library for S/4HANA un
files on the PCLx (x = 1, 2, 3, der Authorizations for
4) databases
Human Resources
Technical Aspects
Authorization Objects
P_PCLX (HR: Cluster)
P_PCR HR: Personnel control record Authorization check for the SAP Library for S/4HANA un
personnel control record der Authorizations for
(transaction PA03)
Human Resources
Technical Aspects
Authorization Objects
P_PCR (HR: Personnel Control
Record)
P_PE01 HR: Authorization for person Authorization check for per SAP Library for S/4HANA un
nel calculation schemes sonnel calculation schemes der Authorizations for
Human Resources
Technical Aspects
Authorization Objects
P_PE01 (HR: Authorization for
Personnel Calculation
Schemas)
P_PE02 HR: Authorization for person Authorization check for per SAP Library for S/4HANA un
nel calculation rule sonnel calculation rules der Authorizations for
Human Resources
Technical Aspects
Authorization Objects
P_PE02 (HR: Authorization for
Personnel Calculation Rule)
Security Guide for SAP S/4HANA 1709
520 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Objects Name Description Additional Information
P_PYEVDOC HR: Posting document Protection of actions on pay SAP Library for S/4HANA un
roll posting documents der Authorizations for
Human Resources
Technical Aspects
Authorization Objects
P_PYEVDOC (HR: Posting
Document)
P_PYEVRUN HR: Posting run Control of actions that are SAP Library for S/4HANA un
possible for posting runs der Authorizations for
Human Resources
Technical Aspects
Authorization Objects
P_PYEVRUN (HR: Posting
Run)
P_OCWBENCH HR: Activities in the Off-Cycle Used for the authorization SAP Library for S/4HANA un
Workbench check in the Off-Cycle Work der Authorizations for
bench.
Human Resources
Technical Aspects
Authorization Objects
P_OCWBENCH (HR: Activities
in the Off-Cycle
Workbench)
S_TMS_ACT Actions on TemSe objects The authorization determines SAP Library for S/4HANA un
who may execute which oper der Authorizations for
ations on which TemSe ob
Human Resources
jects
Technical Aspects
Authorization Objects
S_TMS_ACT (TemSe: Actions
on TemSe Objects)
For documentation about authorization objects, see SAP Library for S/4HANA and choose Human Resources
HR Tools Authorizations for Human Resources Technical Aspects Authorization Objects .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 521Authorizations for Posting Data to Accounting
The authorization check for posting data to Accounting is performed using report authorizations. This means that
the different level of detail of the data comes from calling different reports and can be restricted using
corresponding report authorizations.
When posting data to Accounting, the following authorization checks are made:
● Report RPCIPA00
○ Authorization object S_Program, based on report RPCIPA00
○ Authorization object P_PYEVRUN, based on:
○ Run type PP
○ Run information (simulation, productive)
○ Activity (display)
● Report RPCIPS00
○ Authorization object S_Program, based on report RPCIPS00
○ Authorization object P_PYEVDOC, based on:
○ Company code of document
○ Activity (display of contents of posting document)
● Report RPCIPD00
○ Authorization object S_Program, based on report RPCIPD00
○ Authorization object P_PYEVDOC, based on:
○ Company code of document
○ Activity (display of detailed posting information with data related to personnel number)
For more information, see SAP Note 1235291.
13.13.4.2.4 Communication Channel Security
Use
The table below shows the communication channels used by Payroll , the protocol used for the connection, and
the type of data transferred.
Table 313: Communication Paths
Communication Paths Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Interface Toolbox (Transac ALE, local files Determined by the user Salary data, HR master data
tion PU12)
Display posting runs (transac ALE Data for cost accounting Salary data (accumulated in
tion PCP0) part)
Display documents from Ac ALE Documents from Accounting
counting
Security Guide for SAP S/4HANA 1709
522 P U B L I C SAP S/4HANA Business ApplicationsCommunication Paths Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Data medium files (creation in Local files Files for transfer of bank Salary data
Accounting) transfers to the banks
Display original document for RFC Documents from Accounting Additional salary data from
an external wage component external systems
in infotype External Wage
Components (0579)
RFC connections can be protected using Secure Network Communications (SNC). For more information, see the
SAP NetWeaver Security Guide under Transport Layer Security.
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
In addition, there is also an authorization check for calling the RFC-capable function module itself (CALL
FUNCTION ''AUTHORITY_CHECK_RFC''). For more information, see SAP NetWeaver Library and choose RFC
Programming in ABAP.
For more information about the security of ALE connections, see SAP NetWeaver Security Guide ALE.
13.13.4.2.5 Data Storage Security
Data Storage
The payroll results are saved as compressed to an INDX-like table. In the standard system, access is protected
using the read and write authorizations for the infotypes and the authorizations for the required cluster.
The Payroll data and the posting to Accounting are saved to the databases of SAP NetWeaver Application Server
(AS) ABAP. Payroll uses the standard security concept of SAP NetWeaver AS for ABAP for this.
The payroll results in the table PCL2 are protected using the authorization object P_PCLX.
The posting data is stored in the table PPOIX and other transparent tables. Access to the posting data is regulated
using the report authorizations. For more information, see Authorizations under Payroll.
Caution
Data stored in database tables can be displayed using the transactions SE16 or SE16N even without an
application-specific authorization check. To prevent this, you remove the authorizations for these transactions
in productive systems or adjust them accordingly.
For more information, see SAP NetWeaver Library under Authorization Checks and in SAP NetWeaver
Application Server for ABAP. For the SAP NetWeaver Application Server for ABAP Security Guide, see SAP
Service Marketplace at http://service.sap.com/securityguide .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 523Using Logical Paths and File Names to Protect Access to the File System
Payroll saves data in files in the local file system. Therefore, it is important to assign explicit access to the
corresponding files in the file system without access to other directories or files (also called directory traversal).
This is achieved by entering logical paths and file names in the system that are assigned to the physical paths and
file names. This assignment is validated at runtime. If access to a directory is requested that does not correspond
to a stored assignment, an error occurs.
The following lists show the logical file names and paths that are used by Payroll, and the reports for which these
file names and paths are valid:
Logical File Names and Path Names Used in Payroll
The following logical file names and logical file paths were created using transaction FILE to facilitate the
validation of physical file names:
Table 314:
Logical File Name Reports That Use These Logical File Logical File Path
Names
HR_XX_DIR_RPUFCP01 RPUFCP01 HR_XX_DIR_RPUFCP01
In addition, country-specific logical file names and file paths were created for some country versions. For more
information, see the following sections of the Security Guide:
● Country-Specific Features: Canada
● Country-Specific Features: Germany
● Country-Specific Features: Great Britain
● Country-Specific Features: Non-Profit Organizations
● Country-Specific Features: Singapore
● Country-Specific Features: USA
● Country-Specific Features: Other Countries
Activating Validation of Logical Paths and File Names
These logical paths and file names are specified in the system for the corresponding reports. Due to downward
compatibility reasons, the validation is deactivated by default at runtime. To activate the validation at runtime, you
maintain the physical path using the transactions FILE (client-independent) and SF01 (client-dependent). To
determine which paths are used by your system, you can activate the corresponding settings in the Security Audit
Log.
For more information, see the following:
● Logical File Names
● Protecting Access to the File System
● Security Audit Log
Security Guide for SAP S/4HANA 1709
524 P U B L I C SAP S/4HANA Business Applications13.13.4.2.6 Security for Additional Applications
Display of Documents Using Remote Function Call (RFC)
Posting Data to Accounting
Administrators for Accounting can use the transaction PCP0 ( Display posting runs ) to display posting
documents for Human Resources by choosing Goto Document Overview Goto Accounting Documents .
The administrator requires a user for Human Resources that has the corresponding report authorizations for
posting data to Accounting (see Authorizations under Payroll ). You can also deactivate this option by removing
the corresponding ALE function module.
Conversely, the authorization check for displaying documents from Accounting must be made from the HR
system to Accounting.
External Wage Components
From the External Wage Components infotype (0579), users can display the original document for an external
wage component. The document is displayed using the function module HR_PCIF_SHOW_RECEIPT, which calls
an RFC-capable function module in the external system. This function module then has to perform its own checks.
The function module BAPI_WAGE_COMP_EXT_GET_LIST is used to display a list of data of the External Wage
Components infotype (0579). This uses the function module HR_CHECK_AUTHORITY_INFTY for the
authorization check.
For the detailed view, the function module BAPI_WAGECOMPEXT_GETDETAIL is used. This uses the function
module HR_READ_INFOTYPE for the authorization check.
For more information, see SAP Note 318789.
Interface Toolbox and Outsourcing
The interface toolbox (transaction PU12) uses the cluster IF. It uses the following authorization objects:
● P_PCLX
● P_PCR
● S_TMS_ACT
● P_PBSPWE
Outsourcing uses ALE and local files with file access using transaction AL11. This is controlled using user exits in
the interface toolbox.
In the standard system, Outsourcing uses the logical system FILEPORT. You can use the transaction WE21 to
define customer-specific logical systems.
The XML conversion to IDOC is made using the function module OUT_IDOC_XML_TRANSFORM of the function
group HROT and the function group IDOC_XML1 (RSIDOCWF). The function module GUI_DOWNLOAD (function
group SFES) is also called for the conversion.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 525Communication with Authorities
For more information, see B2A: Communication with Authorities .
TemSe Files
The country versions for Payroll use reports in which sensitive data is displayed. For example, this data can be
from the following sensitive areas:
● Salary
● Tax
● Social insurance
● Pension contributions
● Court orders
This data is saved in temporary sequential (TemSe) files. The TemSe process is used for the following purposes:
● To create and output statutory forms, statistics, and analyses
● To download data for the front end server or application server directly, without storing the data as TemSe
objects beforehand. The data can then be transferred from the front end server or application server to a data
medium that can be transferred to the authorities.
● For posting data to Accounting
Caution
We recommend you no longer use the TemSe process for posting data to Accounting. If you run
Accounting and Human Resources in separate systems, we recommend instead that you use Application
Link Enabling (ALE). For more information, see SAP Notes 560301, 121614, and 125164.
You can control access to the TemSe objects within the SAP ERP system using the authorization object
S_TMS_ACT ( TemSe: Actions on TemSe Objects) . Data encryption is not necessary here.
You can find information about the TemSe objects for your country version in the Payroll documentation for your
country version.
13.13.4.2.6.1 B2A: Communication with Authorities
This section of the Security Guide provides an overview of security-relevant information for B2A: Communication
with Authorities. B2A: Communication with Authorities is based on SAP ERP Central Component and Human
Resources. Therefore, the corresponding sections in the Security Guide also apply for B2A: Communication with
Authorities.
B2A: Communication with Authorities is used by the following country versions:
● Switzerland
For more information, see Country-Specific Features: Switzerland
● Germany
Security Guide for SAP S/4HANA 1709
526 P U B L I C SAP S/4HANA Business ApplicationsFor more information, see B2A: Communication with Authorities (PY-DE-BA).
● Great Britain
For more information, see Country-Specific Features: Great Britain
Underlying Security Guides
Table 315:
Security Guide of Scenario, Application, or Component Path
Secure Store and Forward (SSF) SAP NetWeaver Developers'' Guide in SAP NetWeaver Library
under Secure Store and Forward Mechanism (SSF)
SAP Business Connector (BC) SAP Business Connector Security Guide
SAP NetWeaver Exchange Infrastructure/Process Integration SAP Process Integration (PI) Security Guides
(XI/PI)
For a complete list of available SAP Security Guides, see SAP Service Marketplace at http://service.sap.com/
securityguide .
Important SAP Notes
Currently, there are no security-relevant SAP Notes for B2A.
Authorizations
For more information, see Authorizations.
13.13.4.2.6.1.1 Authorizations
Use
B2A: Communication with Authorities uses the authorization concept provided by SAP NetWeaver AS for ABAP .
Therefore, the security recommendations and guidelines for authorizations as described in the SAP NetWeaver
AS Security Guide ABAP also apply to B2A: Communication with Authorities.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 527Roles and Authorization Concept for B2A: Communication with Authorities
Standard Roles
Currently, there are no application-specific roles available.
Standard Authorization Objects
The following table shows the authorization objects relevant for security used by B2A: Communication with
Authorities.
Table 316: Standard Authorization Objects
Authorization Object Field Value Description
P_B2A (HR-B2A: B2A MOLGA Country Grouping: Unique You use this authorization ob
Manager) identifier for a country, for ex ject to determine the authori
ample, 01 for Germany zation check for B2A Man
ager. You need to maintain
this authorization object only
if you use B2A Manager.
B2A_WERKS Authorization Check – Per
sonnel Area
B2A_BTRTL Authorization Check – Per
sonnel Subarea
SAGRP Area – identifies an applica
tion in Human Resources
DOCTY Document Type – includes
documents of the same type
within an area within the
framework of the B2A func
tions
B2A_ACTIO ● S – Send Messages
● D – Detail View for Mes
sages
● R – Reorganize Mes
sages
● L – Delete Messages
● Z – Convert Status of
Messages
13.13.4.2.7 Country-Specific Features
The following chapters contain information on country-specific features.
Security Guide for SAP S/4HANA 1709
528 P U B L I C SAP S/4HANA Business Applications13.13.4.2.7.1 Country-Specific Features: Australia
Sensitive Data
The Human Resources infotypes often contain sensitive data. This data is protected by central authorization
objects. For the country version for Australia (PY-AU, PA-PA-AU), this affects the tax file number (TFN number) in
the infotype TFN Australia (0227), for example.
More Information
Payroll (PY)
13.13.4.2.7.2 Country-Specific Features: Canada
Data Storage Security
For general information about data storage security in Payroll, see Data Storage Security under Payroll.
The following contains specific information about the logical file names and path names for Payroll Canada (PY-
CA).
Logical File Names Used in Payroll Canada
The following logical file names were created to facilitate the validation of physical file names:
Table 317: Logical File Names and Reports
Logical File Name Reports That Use These Logical File Names
HR_CA_DIR_CRA_XML_FILE_NAME_APPV RPCYERK3_XML
HR_CA_DIR_CRA_XML_FILE_NAME_FEND RPCYERK3_XML
HR_CA_DIR_CRA_XML_SCH_NAME_FEND RPCYERK3_XML
HR_CA_DIR_MRQ_XML_FILE_NAME_APPV RPCYERK3_MRQ_XML
HR_CA_DIR_MRQ_XML_FILE_NAME_FEND RPCYERK3_MRQ_XML
HR_CA_DIR_MRQ_XML_SCH_NAME_APPV RPCYERK3_MRQ_XML
HR_CA_DIR_MRQ_XML_SCH_NAME_FEND RPCYERK3_MRQ_XML
HR_CA_DIR_ROE_FILE_NAME RPCROEK0_DISPLAY_XML
HR_CA_DIR_ROE_FILE_NAME RPCROEK0_XMPORTER
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 529Logical File Name Reports That Use These Logical File Names
HR_CA_DIR_XML_FILE_NAME_FEND RPCXMLK0_VALIDATE
HR_CA_DIR_XML_SCH_NAME_FEND RPCXMLK0_VALIDATE
Logical Path Names Used in Payroll Canada
The logical file names listed above all use the logical file path HR_CA_FILE_PATH.
Particularly Sensitive Data
The Human Resources infotypes often contain sensitive data. This data is protected by central authorization
objects. For the country version for Canada, this includes the social insurance number (SNI number) in the
infotype Personal Data (0002).
More Information
See Payroll (PY) in the S/4HANA Security Guide.
13.13.4.2.7.3 Country-Specific Features: Switzerland
Authorizations
The country version for Switzerland (PA-PA-CH, PY-CH) uses the standard authorization concept used by S/
4HANA. Therefore, the recommendations and guidelines for authorizations as described for S/4HANA also apply
to the country version for Switzerland.
Standard Authorization Objects
The country version for Switzerland uses the security-relevant authorization objects that are available for
Personnel Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
Switzerland.
Security Guide for SAP S/4HANA 1709
530 P U B L I C SAP S/4HANA Business ApplicationsTable 318: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_CH_PK KONNR (Individual PF Account HR-CH: Pension Fund: Ac
Number) count Access (see
AUTGR (HR-CH: Authorization Authorizations for Human
group for PF accounts) Resources Technical
PKKLV (HR-CH: Pension fund : Aspects Authorization
Authorization level for ac Objects P_CH_PK (HR-CH:
count access) Pension Fund: Account
Access) )
For the documentation for the authorization object P_CH_PK, see SAP Library for S/4HANA and choose Human
Resources HR Tools Authorizations for Human Resources Technical Aspects Authorization Objects .
Communication Channel Security
The following table presents the communication paths used by the country version for Switzerland for B2A:
Communication with Authorities, the protocol used by the connection, and the type of data transferred.
Table 319:
Communication Paths Protocol Used Type of Data Transferred Data Requiring Particular
Protection
ELM (Uniform Wage Notifica External communication be Personnel data Personal data
tion Procedure) tween PI* and distributor/
authorities: HTTPS
Internal communication be
tween HR backend system
and PI: RFC Adapter
Internal communication be
tween PI and PI: HTTP(S)
* PI = SAP NetWeaver Exchange Infrastructure/Process Integration (XI/PI)
You can use Secure Network Communications (SNC) to protect RFC connections. The Secure Sockets Layer
protocol (SSL protocol) protects HTTP connections.
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
For more information, see the SAP NetWeaver Security Guide under Transport Layer Security.
For more information about B2A security, see B2A: Communication with Authorities.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 531More Information
See S/4 Security Guide for Human Resources and choosePayroll (PY)
13.13.4.2.7.4 Country-Specific Features: Germany
Authorizations
The country version for Germany (Payroll and/or Personnel Administration) uses the standard authorization
concept used by S/4HANA. Therefore, the recommendations and guidelines for authorizations as described for
S/4HANA also apply to the country version for Germany (PY-DE, PA-PA-DE).
Standard Roles
For information about the standard roles used by Payroll, see Authorizations.
The following table shows the standard roles that the country version for Germany also uses.
Table 320: Standard Roles
Role Description
SAP_AUDITOR_TAX_HR Role HR-DE Audit § 147 AO (Template) for Personnel Adminis
tration Germany (PA-PA-DE)
Standard Authorization Objects
The country version for Germany uses the security-relevant authorization objects that are available for Personnel
Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
Germany.
Security Guide for SAP S/4HANA 1709
532 P U B L I C SAP S/4HANA Business ApplicationsTable 321: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_DBAU_SKV ACTVT ● Add or Create This object is only used in
Construction Pay Germany
HR: DBAU: Construction In ● Display
dustry Germany - Social Fund ● Delete and then only within the
framework of the report for
Procedure
the social fund procedure. A
check is made as to which re
ports are to be run by an ad
ministrator using which pa
rameters or worksteps.
For more information, see
SAP Library for S/4HANA un
der P_DBAU_SKV (HR: DBAU:
Construction Pay Germany –
Social Fund Procedure)
REPID ABAP Report Name: Contains
the name of a report in which
the authorization object is
checked, for example, the
evaluation report for the so
cial fund procedure. The au
thorization granted applies
only to this report.
RZNUM Data Center Number for Con
struction Industry Social Fund
Determines the data center
numbers to which a granted
authorization applies
ZVKAS Social Fund
Determines the social funds
for which a granted authoriza
tion applies
P_DE_BW BEWID Statement Identifier This object determines the
authorization check within
HR-DE: SAPScript State Identifies exactly one state
Statements (with SAPScript)
ments ment within Statements
for German Payroll.
For more information, see
SAP Library for S/4HANA un
der P_DE_BW (HR-DE:
Statements SAPScript)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 533Authorization Object Field Value Description
BSUBJ Functional Area ID for State
ments
Logical subdivision of state
ments according to individual
topics
Values 01–04
BACT ● E = Creation of State
ments
● A = Asynchronous Ar
chiving
● S = Fast Data Entry/Ad-
hoc Query
● D = Create Data Records
● V = Administrate Ar
chived Statements
● Z = Display Archived
Statements
For the documentation for the authorization objects, see SAP Library for S/4HANA and choose Human
Resources HR Tools Authorizations for Human Resources Technical Aspects Authorization Objects .
Data Storage Security
For general information about data storage security in Payroll, see Data Storage Security.
The following contains specific information about the logical file names and path names for Payroll Germany (PY-
DE).
Logical File Names Used in Payroll Germany
The following logical file names and logical file paths were created to facilitate the validation of physical file names:
Table 322: Logical File Names, Reports, and File Paths
Logical File Name Reports That Use These Logical File Logical File Path
Names
HR_DE_DIR_B2A_KK_ZERTLIST RPUSVKD0 HR_DE_B2A_KK_ZERTLIST
HR_DE_DIR_B2A_KK_ZERTREQUEST RPUSVKD0 HR_DE_B2A_KK_ZERTREQUEST
HR_DE_DIR_B2A_KK_ZERTRESPONSE RPUSVKD0 HR_DE_B2A_KK_ZERTRESPONSE
HR_DE_DIR_RBM_IN RPCRBMD0_INBOUND HR_DE_DIR_RBM_IN
Security Guide for SAP S/4HANA 1709
534 P U B L I C SAP S/4HANA Business ApplicationsLogical File Name Reports That Use These Logical File Logical File Path
Names
HR_DE_DIR_RBM_OUT RPCZFADD_INBOUND HR_DE_DIR_RBM_OUT
HR_DE_DIR_RBM_PRO RPCRBMD0_INBOUND HR_DE_DIR_RBM_PRO
HR_DE_DIR_RPCAODD0 RPCAOPD0 HR_DE_TX_DATENUEBERLASSUNG_PFAD
RPCOADD0
HR_DE_DIR_RPCEHBD0 RPCEHBD0 HR_DE_DIR_RPCEHBD0
HR_DE_DIR_RPCEHCD1 RPCEHCD1 HR_DE_DIR_RPCEHCD1
HR_DE_DIR_RPCEHFD0 RPCEHFD0 HR_DE_DIR_RPCEHFD0
HR_DE_DIR_RPCSVGD0 RPCSVGD0 HR_DE_DIR_RPCSVGD0
HR_DE_DIR_RPLEHAD3 RPLEHAD3 HR_DE_DIR_RPLEHAD3
HR_DE_DIR_RPSKGOD0 RPSKGOD0 HR_DE_DIR_RPSKGOD0
HR_DE_DIR_RPSPSDD0 RPSPSDD0 HR_DE_DIR_RPSPSDD0
HR_DE_DIR_RPURZBD0 RPURZBD0 HR_DE_DIR_RPURZBD0
HR_DE_DIR_RPUTXCD0 RPUTXCD0 HR_DE_TX_RPUTXED0_PFAD
HR_DE_DIR_RPUTXED0 RPUTXED0 HR_DE_TX_RPUTXED0_PFAD
HR_DE_DIR_RPUVEODD RPUVEODD HR_DE_DIR_RPUVEODD
HR_DE_DIR_RPUWEDDA RPUWEDDA HR_DE_DIR_RPUWEDDA
HR_DE_DIR_RPUZVCD2 RPUZVCD2 HR_DE_PBSZV2006_NOTIFS
HR_DE_DIR_RPUZVTD2 RPUZVTD2 HR_DE_PBSZV2006_NOTIFS
HR_DE_DIR_RPXKHSD0 RPXKHSD0 HR_DE_DIR_RPXKHSD0
HR_DE_DIR_ZFA_INCOMING RPCZFADD_INBOUND HR_DE_DIR_ZFA_INCOMING
HR_DE_DIR_ZFA_OUTGOING RPCZFADD_INBOUND HR_DE_DIR_ZFA_OUTGOING
HR_DE_DIR_ZFA_PROCESSED RPCZFADD_INBOUND HR_DE_DIR_ZFA_PROCESSED
More Information
See Payroll (PY) under S/4HANA Security Guide Human Resources.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 53513.13.4.2.7.4.1 B2A: Communication with Authorities (PY-DE-
BA)
About This Chapter
This section of the Security Guide provides an overview of security-relevant information for B2A: Communication
with Authorities (PY-DE-BA).
References to Cross Chapters
B2A: Communication with Authorities (PY-DE-BA) is based on S/4HANA, Human Resources, or Personnel
Management. Therefore, the corresponding Security Guides also apply to B2A: Communication with Authorities
(PY-DE-BA). Note in particular the most important sections or specific restrictions that are entered in the
following table.
Underlying Security Guides
Table 323:
Security Guide of Scenario, Application, or Component Path
Secure Store and Forward SAP NetWeaver Developers'' Guide in SAP NetWeaver Library
under Secure Store and Forward Mechanism (SSF)
(SSF)
SAP Business Connector http://service.sap.com/securityguide SAP Business
(BC) Connector Security Guide
SAP NetWeaver Exchange Infrastructure/Process Integration http://service.sap.com/securityguide SAP Process
(XI/PI) Integration (PI) Security Guides
For a complete list of available SAP Security Guides, see SAP Service Marketplace at http://service.sap.com/
securityguide .
Important SAP Notes
Currently, there are no security-relevant SAP Notes for B2A.
Security Guide for SAP S/4HANA 1709
536 P U B L I C SAP S/4HANA Business ApplicationsConfiguration
For information about the general settings for setting up B2A: Communication with Authorities (PY-DE-BA), see
Customizing for Payroll under Payroll: Germany Communication with Authorities (B2A) .
Data Flow and Process
● • ELSTER: The data is encrypted and signed before being transferred from the HR system to the tax
authorities.
● • ELENA: The data is encrypted and signed before being transferred from the HR system to the pension
insurance.
● • SI (DEUEV, …): The data is encrypted and signed before being transferred from the HR system to the health
insurance fund.
Authorizations
For more information, see Authorizations under B2A: Communication with Authorities.
13.13.4.2.7.4.1.1 Communication Channel Security
Use
The following table shows the communication paths that B2A: Communication with Authorities (PY-DE-BA) uses,
the protocol used for the connection, and the type of data transferred.
Table 324:
Communication Paths Protocol Used Type of Data Transferred Data Requiring Particular
Protection
ELSTER HTTP Personnel data Person-related data
Internal: HR system -> Mid
dleware (BC or PI): Communi
cation channel RFC
External: Middleware -> Tax
authorities: Communication
channel HTTP
ELENA HTTP/HTTPS/E-mail Personnel Data Person-related data
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 537Communication Paths Protocol Used Type of Data Transferred Data Requiring Particular
Protection
SI (DEUEV, …) HTTP/E-mail Personnel data Person-related data
ZfA/PRN VPN Personnel data Person-related data
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
For more information, see the SAP NetWeaver Security Guide under Transport Layer Security.
Communication Destinations
The following table provides an overview of the communication destinations that B2A: Communication with
Authorities (PY-DE-BA) uses.
Table 325:
Destination Provided Type Description
HR_DE_ELSTER No RFC Transfer of data for ELSTER
to middleware (BC, XI)
HR_DE_ELENA No HTTP/HTTPS Transfer of data for ELENA to
pension insurance
HR_DE_GKV No HTTP Transfer of data for GKV to
health insurance
Security-Relevant Logging and Tracing
● ELSTER: Tracing for error analysis using BI/BC is possible.
● ELENA: Tracing for error analysis using BC is possible.
● SI (DEUEV, …): Tracing for error analysis using ICM (transaction: SMICM) is possible.
● ZfA/PRN: Tracing for error analysis using ICM (transaction: SMICM) is possible.
Security Guide for SAP S/4HANA 1709
538 P U B L I C SAP S/4HANA Business Applications13.13.4.2.7.5 Country-Specific Features: Denmark
Authorizations
The country version for Denmark (PA-PA-DK, PY-DK) uses the standard authorization concept used by S/4HANA.
Therefore, the recommendations and guidelines for authorizations as described for S/4HANA also apply to the
country version for Denmark.
Standard Authorization Objects
The country version for Denmark uses the security-relevant authorization objects that are available for Personnel
Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
Denmark.
Table 326: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_DK_PBS PBSFIRMA HR_DK (Company Authorization check for PBS
Used for PBS) companies (see P_DK_PBS
(HR-DK: Authorization check
for access to PBS company))
For the documentation for the authorization object P_DK_PBS, see SAP Library for S/4HANA and choose
Human Resources HR Tools Authorizations for Human Resources Technical Aspects Authorization
Objects .
More Information
See Payroll (PY) under S/4HANA Security Guide for Human Resources
13.13.4.2.7.6 Country-Specific Features: Spain
Authorizations
The country version for Spain (PA-PA-ES, PY-ES) uses the standard authorization concept used by S/4HANA.
Therefore, the recommendations and guidelines for authorizations as described for S/4HANA also apply to the
country version for Spain.
Standard Authorization Objects
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 539The country version for Spain uses the security-relevant authorization objects that are available for Personnel
Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
Spain.
Table 327: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_ES_PA_OK INFTY (Infotype) Authorization check for the
SUBTY function codes that are per
(Subtype)
mitted for the HR master data
PES_SPRPS (Lock indicator of the country version for
for HR master record) Spain
PES_FCODE (Function code)
ACTVT (Activity)
More Information
See Payroll (PY) under S/4HANA Security Guide for Human Resources.
13.13.4.2.7.7 Country-Specific Features: Great Britain
Communication Channel Security
The following table presents the communication paths used by the country version for Great Britain (PY-GB, PA-
PA-GB) for B2A: Communication with Authorities, the protocol used by the connection, and the type of data
transferred.
Security Guide for SAP S/4HANA 1709
540 P U B L I C SAP S/4HANA Business ApplicationsTable 328:
Communication Paths Protocol Used Type of Data Transferred Data Requiring Particular
Protection
E-Filing Internal communication be Personnel Data Personal Data
tween HR backend system
and middleware: HTTP(S)
(SAP Business Connector
(BC): TCP/IP or PI*: Proxy)
External communication be
tween middleware and tax au
thorities: HTTP(S)
* PI = SAP NetWeaver Exchange Infrastructure/Process Integration (XI/PI)
HTTP connections are protected using the Secure Sockets Layer (SSL) protocol.
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
For more information, see the SAP NetWeaver Security Guide under Transport Layer Security.
For more information about B2A security, see B2A: Communication with Authorities.
For an introduction and user guide for E-Filing Incoming, see SAP Service Marketplace at http://service.sap.com/
hrgb in the Media Center.
Communication Destinations
You can communicate with the GB Inland Revenue Gateway. The communication channel is encrypted with 128
Bit SSL. The employees'' tax data is transferred via RFC connections and using the protocol HTTPS.
Data Storage Security
For general information about data storage security in Payroll, see Data Storage Security.
The following contains specific information about the logical file names and path names for Payroll Great Britain
(PY-GB).
Logical File Names Used in Payroll Great Britain
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 541The following logical file names were created to facilitate the validation of physical file names:
Table 329: Logical File Names and Reports
Logical File Name Reports That Use These Logical File Names
HR_GB_DIR_RPUASHG0 RPUASHG0
HR_GB_DIR_RPUHESG1 RPUHESG1
HR_GB_DIR_RPUTPSG0 RPUTPSG0
HR_GB_DIR_RPUUSSG0 RPUUSSG0
HR_GB_DIR_RPUUSSG1 RPUUSSG1
Logical Path Names Used in Payroll Great Britain
The logical file names listed above all use the logical file path HR_GB_DIR_FILEPATH.
More Information
See Payroll (PY) under S/4HANA Security Guide for Human Resources
13.13.4.2.7.8 Country-Specific Features: The Netherlands
Authorizations
The country version for The Netherlands (PA-PA-NL, PY-NL) uses the standard authorization concept used by S/
4HANA. Therefore, the recommendations and guidelines for authorizations as described for S/4HANA also apply
to the country version for The Netherlands.
Standard Authorization Objects
The country version for The Netherlands uses the security-relevant authorization objects that are available for
Personnel Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
The Netherlands.
Security Guide for SAP S/4HANA 1709
542 P U B L I C SAP S/4HANA Business ApplicationsTable 330: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_NL_AEDM JUPER (Legal person) HR: Authorization object for
ACTVT Day-one-announcement
(Activity)
P_NL_LA06 JUPER (Legal person) HR: Authorization object for
ACTVT wage return 2006
(Activity)
P_NL_PKAB ACTVT (Activity) Authorization object for PF
Actuarial file
P_NL_PKEV KASSE (Pension Fund) Authorization object for PF
EVENT events
(HR-NL: Event)
PKELV (Authorization level for
reading event)
P_NL_PKFKT PKNL_PKFKT (PK Function) Authorization object for PF
functions
P_NL_PKFXV KASSE (Pension Fund) Authorization object for PF
PKNL_FXVIE function views
(Function view
of fund)
P_NL_PKTB ACTVT (Activity) Authorization object for PF
pay scale calculation
Communication Destinations
You can use the Gemeentelijke Basis Administratie (GBA) interface to upload the inbound data for retirement
pension plan for the country version for The Netherlands.
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 54313.13.4.2.7.9 Country-Specific Features: Italy
Important SAP Notes
The following table presents the most important SAP Notes regarding security for the country version for Italy
(PA-PA-IT, PY-IT).
Table 331:
Title SAP Note Comment
Change of master data in a productive 385319
payroll
Authorizations
The country version for Italy uses the standard authorization concept used by S/4HANA. Therefore, the
recommendations and guidelines for authorizations as described for S/4HANA also apply to the country version
for Italy.
Standard Authorization Objects
The country version for Italy uses the security-relevant authorization objects that are available for Personnel
Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
Country-Specific Authorization Objects
The following table shows the security-relevant authorization objects that are also used in the country version for
Italy.
Table 332: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_IT_UERST P_RESET (Reject posting for Authorization for termination
social insurance) of social insurance (report
RPCUEDI0)
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources
Security Guide for SAP S/4HANA 1709
544 P U B L I C SAP S/4HANA Business Applications13.13.4.2.7.10 Country-Specific Features: Non-Profit
Organizations
Data Storage Security
For general information about data storage security in Payroll, see Data Storage Security.
The following contains specific information about the logical file names and path names for Payroll for Non-Profit
Organizations (PY-NGO).
Logical File Names Used in Payroll for Non-Profit Organizations
The following logical file names were created to facilitate the validation of physical file names:
Table 333: Logical File Names and Reports
Logical File Name Reports That Use These Logical File Names
HR_UNUCMT_LOADER_FILE HUNUCMT_LOADER
Logical Path Names Used in Payroll for Non-Profit Organizations
The logical file names listed above all use the logical file path HR_UN_FILEPATH.
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources
13.13.4.2.7.11 Country-Specific Features: Norway
Authorizations
The country version for Norway (PY-NO, PA-PA-NO) uses the standard authorization concept used by S/4HANA.
Therefore, the recommendations and guidelines for authorizations as described for S/4HANA also apply to the
country version for Norway.
Standard Authorization Objects
The country version for Norway uses the security-relevant authorization objects that are available for Personnel
Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
Norway.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 545Table 334: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_NO_ALTIN ACTVT (Activity) Norway: Authorization to
send data to Altinn Portal
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources.
13.13.4.2.7.12 Country-Specific Features: New Zealand
Sensitive Data
The Human Resources infotypes often contain sensitive data. This data is protected by central authorization
objects. For the country version for New Zealand (PY-NZ, PA-PA-NZ), this affects the employee IRD number in the
infotype IRD Nbr New Zealand (0309). You have the following options for accessing the number:
● Directly using the infotype IRD Nbr New Zealand (0309) with the transaction Maintain HR Master Data (PA30)
● By choosing the IRD Number pushbutton in the infotype Tax New Zealand (0313).
The authorizations required to read or change the IRD number depend on the authorizations in the user profile.
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources.
13.13.4.2.7.13 Country-Specific Features: Russia
Authorizations
The country version for Russia (PA-PA-RU, PY-RU) uses the standard authorization concept used by S/4HANA.
Therefore, the recommendations and guidelines for authorizations as described for S/4HANA also apply to the
country version for Russia.
Standard Authorization Objects
The country version for Russia uses the security-relevant authorization objects that are available for Personnel
Management and Payroll.
Security Guide for SAP S/4HANA 1709
546 P U B L I C SAP S/4HANA Business ApplicationsFor more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
Russia.
Table 335: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_RU_0294C AUTHC (Authorization level) HR-RU: Authorization for
checking records of infotype
0294
P_RU_PKMN HR_RU_EVNT (Count parame Authorization for checking
ter) HR_RU_PF DMS – Package
HR_RU_PKID Manager
(Package type)
HR_RU_REGN (Registration
number)
HR_RU_USER (Name of pro
cessor who changed the ob
ject)
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources.
13.13.4.2.7.14 Country-Specific Features: Saudi Arabia
Authorizations
The country version for Saudi Arabia (PA-PA-SA, PY-SA) uses the standard authorization concept of S/4HANA.
Therefore, the recommendations and guidelines for authorizations as described for S/4HANA also apply to this
country version.
Standard Authorization Group
Authorization group PCSA is provided with this country version.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 54713.13.4.2.7.15 Country-Specific Features: Singapore
Data Storage Security
For general information about data storage security in Payroll, see Data Storage Security.
The following contains specific information about the logical file names and path names for Payroll Singapore (PY-
SG).
Logical File Names Used in Payroll Singapore
The following logical file names were created to facilitate the validation of physical file names:
Table 336: Logical File Names and Reports
Logical File Name Reports That Use These Logical File Names
HR_SG_DIR_NRSFILENAME RPCNRSR0_XML_ALV
Logical Path Names Used in Payroll Singapore
The logical file names listed above all use the logical file path HR_SG_DIR_NRS.
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources.
13.13.4.2.7.16 Country-Specific Features: USA
Important SAP Notes
The following table presents the most important SAP Notes regarding security for the country version for USA
(PA-PA-US, PY-US).
Table 337:
Title SAP Note Comment
Tax Reporter Transaction and Spool Se 430595
curity
Security Guide for SAP S/4HANA 1709
548 P U B L I C SAP S/4HANA Business ApplicationsAuthorizations
The country version for USA uses the standard authorization concept used by S/4HANA. Therefore, the
recommendations and guidelines for authorizations as described for S/4HANA also apply to the country version
for USA.
Standard Authorization Objects
The country version for USA uses the security-relevant authorization objects that are available for Personnel
Management and Payroll.
For more information, see the following:
● Authorizations (Personnel Management)
● Authorizations (Payroll)
The following table shows the security-relevant authorization objects that are also used in the country version for
USA.
Table 338: Country-Specific Authorization Objects
Authorization Object Field Value Description
P_USTR ACTVT (Activity) Authorizations for Tax Report
PERSA (Personnel Area)
BTRTL (Personnel Subarea)
Communication Channel Security
The following table shows the communication paths that the country version for USA uses, the protocol used for
the connection, and the type of data transferred.
Table 339:
Communication Paths Protocol Used Type of Data Transferred Data Requiring Particular
Protection
BSI Tax Factory for tax calcu RFC Tax data for the country ver
lation sion for USA
You can use Secure Network Communications (SNC) to protect RFC connections.
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
For more information, see the SAP NetWeaver Security Guide under Transport Layer Security.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 549Communication Destinations
You can exchange data with local servers or terminals for the VET and EEO reports for the country version for
USA. You can use this function to download files from the application server to a presentation server. You then
receive the text files required by the authorities with the output format .txt. This output format complies with the
law.
The data is not encrypted in the standard system. It is your decision as to the level of encryption that you want to
use if you want to send the data to the Federal Commission or Department of Labor.
The following table presents an overview of the communication destinations that the country version for USA
uses.
Table 340: Communication Destinations
Destination Provided Type Description
BSI For country version for USA RFC with the function module PAYROLL_TAX_CALC_US_50
PAYROLL_TAX_CALC_US PAYROLL_TAX_CALC_US_60
PAYROLL_TAX_CALC_US_70
Data Storage Security
For general information about data storage security in Payroll, see Data Storage Security.
The following contains specific information about the logical file names and path names for Payroll USA (PY-US).
Logical File Names Used in Payroll USA
The following logical file names were created to facilitate the validation of physical file names:
Table 341: Logical File Names and Reports
Logical File Name Reports That Use These Logical File Names
HR_US_TR_XML_SCHEMA RPCTRTU1_XML
Logical Path Names Used in Payroll USA
The logical file names listed above all use the logical file path HR_US_TR.
Particularly Sensitive Data
The Human Resources infotypes often contain sensitive data. This data is protected by central authorization
objects. For the country version for USA, this includes the social security number (SSN number) in the infotype
Personal Data (0002).
Security Guide for SAP S/4HANA 1709
550 P U B L I C SAP S/4HANA Business ApplicationsOther Security-Relevant Information
You can use the interface toolbox (transaction PU12) to update the taxability model. Currently, there are no
special authorizations for this. For more information about the interface toolbox, see section Security for
Additional Applications under Payroll.
You have the following options to prevent unauthorized or unintentional updates of the database PCL4:
● You can use the feature UTXSS to activate and deactivate the authorization checks for the tax report.
● You can use the feature UTXSP to specify codes for spool authorizations depending on the tax company and
the tax class.
For more information, see the documentation of the features in the S/4HANA system.
More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources.
13.13.4.2.7.17 Country-Specific Features: Other Countries
Data Storage Security
For general information about data storage security in Payroll, see Data Storage Security.
The following contains specific information about the logical file names and path names for Payroll for Other
Countries (PY-XX).
Logical File Names Used in Payroll for Other Countries
The following logical file names and logical file paths were created to facilitate the validation of physical file names:
Table 342: Logical File Names, Reports/Function Modules, and File Paths
Logical File Name Reports or Function Modules That Use Logical File Path
These Logical File Names
HR_XX_DIR_B2AFILE Report H99_B2AFILE HR_XX_DIR_B2AFILE
HR_XX_DIR_RPUFCP01 Report RPUFCP01 HR_XX_DIR_RPUFCP01
HR_XX_DIR_RH_CALL_ORGDISPLAY Function module HR_XX_DIR_RH_CALL_ORGDISPLAY
RH_CALL_ORGDISPLAY
HR_XX_DIR_RHMOVE40 Report RHMOVE40 PD_DATASET
HR_OT_FILEPORT Report RPUOTFL0 HR_OT_DIR_FILEPORT
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 551More Information
See Payroll (PY) in the S/4HANA Security Guide for Human Resources.
13.13.4.3 Self-Services
13.13.4.3.1 Important SAP Notes
Definition
This chapter of the Security Guide provides you with information about the following self-service components:
● Business Unit Analyst (BUA)
● Project Self-Services (PSS)
● Higher Education and Research (IS-HER-CSS)
● General Parts (PCUI_GP)
If not stated otherwise, the security settings for user management and authorizations apply to all of the afore-
mentioned components.
The following self-service components have their own sections in this chapter:
● Employee Self-Service
● Manager Self-Service
Note
For these components, all security-relevant information is included in the relevant subsections.
Important SAP Notes
The table below shows important SAP Notes that apply to the security for some Self-Service applications. For
more information about standard roles for assigning authorization in the Self-Service applications, see the
Authorizations section of this Security Guide.
Security Guide for SAP S/4HANA 1709
552 P U B L I C SAP S/4HANA Business ApplicationsTable 343: Important SAP Notes
SAP Note Number Title Comment
846439 PSS: Authorizations and roles for Web This SAP Note contains the authoriza
Dynpro tion objects and the default values de
fined for the Web Dynpro applications
for Project Self-Services (component EP-
PCT-PLM-PSS).
13.13.4.3.2 User Management
Use
User management for Self-Service applications uses the mechanisms provided with the SAP NetWeaver
Application Server , for example, tools, user types, and password policy . For an overview of how these
mechanisms apply for Self-Service applications, see the sections below.
User Administration Tools
The table below shows the tools to use for user management and user administration with the Self-Service
applications.
Table 344: User Management Tools
Tool Detailed Description Prerequisites
User and role maintenance in SAP You can use the Role Maintenance
NetWeaver AS for ABAP (transactions (PFCG) transaction to generate profiles
SU01 and PFCG) for your self-service users.
For more information, see the User and Roles section inSAPLibrary for SAP NetWeaver (see also help.sap.com
Documentation SAPNetWeaver ).
User Types
For information about the user types , see the SAP NetWeaver Application Server ABAP Security Guide.
Recommendation
For portal roles, we recommend that you set up the connection between the portal and the connected systems
( ECC system, J2EE Engine, BW system) such that each individual user has access.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 553Standard Users
Table 345:
Component Standard Users
Project Self-Service No standard users exist in the standard SAP system for these
components.
Business Unit Analyst
Higher Education and Research For information about the standard users for this component,
see the Security Guide for this component.
13.13.4.3.3 Authorizations
Use
The Self-Service applications use the authorization concept provided by SAP NetWeaver Application Server .
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver Security
Guide for ABAP also apply to the Self-Service applications.
The SAP NetWeaver Application Server authorization concept is based on assigning authorizations to users based
on roles. For role maintenance, use the Profile Generator (transaction PFCG). For more information, see Editing
Roles and Authorizations for Web Dynpro Services .
Standard Roles
Business Unit Analyst and Project Self-Services
There are no standard roles for these components.
Higher Education and Research
For information about the standard roles for this component, see the Security Guide for this component.
Standard Authorization Objects
The table below shows the general security-relevant authorization objects that are used by the Self-Service
applications.
Table 346: Standard Authorization Objects for Self-Service Applications:
Authorization Object Field Value Description
Security Guide for SAP S/4HANA 1709
554 P U B L I C SAP S/4HANA Business ApplicationsS_RFC RFC_NAME Depends on service Saves data when the back-
end system is accessed via
RFC from the Web Dynpro
front end.
Higher Education and Research
For information about the standard authorization objects for this component, see the Security Guide for this
component.
Internal Service Request and Personnel Change Requests
For information about standard authorization objects for the Internal Service Request (ISR) and Personnel Change
Requests , see SAP Note 623650.
13.13.4.3.3.1 Maintain Roles and Authorizations for Web
Dynpro Services
Use
You use this procedure to maintain roles, their associated Web Dynpro services, and authorizations.
Procedure
1. In transaction PFCG, create a role or select an existing default role for the component. Choose Create Role or
copy the existing default role.
2. Assign the services you require to the role.
1. On the Menu tab page, choose Authorization Default .
The Service dialog box appears.
2. Select the External Service checkbox.
3. Select WEBDYNPRO as the external service type.
4. In the Service field, select the Web Dynpro service you require.
5. Choose Save.
The authorization objects and default values maintained for the service are then displayed in the menu
tree structure.
In the same manner, select all the Web Dynpro services that you want to use.
3. Assign the required authorizations.
To do this, choose the Authorizations tab page to maintain the authorization objects and values in accordance
with your requirements.
For more detailed information about role maintenance, see Role Maintenance In the Users and Roles section in
SAP Library for SAP NetWeaver (see also help.sap.com Documentation SAP NetWeaver ).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 55513.13.4.3.3.2 Authorizations for Controlling Services (BUA)
The table below shows the standard authorization objects that are used by the controlling services in Business
Unit Analyst (BUA) .
Note
These authorization objects are also used by the controlling services in Business Package for Manager Self-
Service (MSS) .
Table 347:
Authorization Object Description
K_CCA General authorization object for Cost Center Accounting.
Is checked in the relevant Monitor iViews, Master Data iViews,
and Express Planning services.
K_ORDER General authorization object for internal orders.
Is checked in the relevant Monitor iViews, Master Data iViews,
and Express Planning services.
K_PCA Area responsible, Profit Center.
Is checked in the relevant Monitor iViews, Master Data iViews,
and Express Planning services.
K_CSKS_PLA Cost element planning.
Is checked in the relevant Express Planning services.
K_FPB_EXP Authorization object for Express Planning.
This authorization object checks the Express Planning Frame
work call and the planning round call. The actual plan data is
protected by the authorization objects for the individual Ex
press Planning services.
Note
For more information about the fields for the authorization objects K_CCA, K_ORDER, and K_PCA, see SAP
Note 15211.
13.13.4.3.4 Employee Self-Service
About This Document
This chapter provides an overview of the security-relevant information that applies to Employee Self-Service (CA-
ESS).
Security Guide for SAP S/4HANA 1709
556 P U B L I C SAP S/4HANA Business ApplicationsThe following deployment options are available for Employee Self-Service (ESS):
● Business Package for Employee Self-Service (up to and including 1.50)
This Business Package is a “classic” SAP Business Package that runs in the SAP Enterprise Portal. The Portal
role consists of worksets and iViews based on Web Dynpro ABAP technologies.
● Business Package for Employee Self-Service (WDA)
This Business Package also runs in the SAP Enterprise Portal but it has only one workset with one iView that
launches the role structure with the applications maintained in the back-end system. In this business
package, all applications are based on Web Dynpro ABAP technology.
● Employee Self-Service in SAP Business Client for HTML
The role structure of this deployment option is maintained in the back-end system with the SAP role
maintenance transaction PFCG. All applications available with this role are based on Web Dynpro ABAP
technology.
Note
Some parts of the security information in this chapter only apply to individual ESS deployment options. In this
case, you will find a comment explaining for which deployment option this information is valid right at the
beginning of each section. If not stated otherwise, the security information in this chapter applies to all ESS
deployment options.
See also:
● For more information about the roles in SAP Enterprise Portal, see SAP Library for S/4HANA on SAP Help
Portal at Cross-Application Functions in SAP ERP Roles Business Packages (Portal Content) .
● For more information about the roles in SAP Business Client, see SAP Library for S/4HANA on SAP Help
Portal at Cross-Application Functions in SAP ERP Roles Roles in SAP NetWeaver Business Client .
● For more information about SAP Business Client, see SAP Library for SAP NetWeaver on SAP Help Portal at
SAP NetWeaver by Key Capability Application Platform by Key Capability ABAP Technology UI
Technology SAP NetWeaver Business Client .
Overview of the Main Sections of This Chapter
This chapter comprises the following sections with security-related topics specific to Employee Self-Service:
● Before You Start
This section comprises references to other Security Guides that are relevant for Employee Self-Service and a
list of the most important notes for Employee Self-Service regarding security.
● User Administration and Authentication
This section provides an overview of the following user administration and authentication aspects for
Employee Self-Service:
○ User Management
This section contains information about the user types that are required by Employee Self-Service and
standard users for Employee Self-Service.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 557○ Integration into Single Sign-On Environments
This topic describes how the Employee Self-Service supports Single Sign-On mechanisms.
● Authorizations
This section provides an overview of the authorization concept that applies to Employee Self-Service.
● Session Security Protection
This section provides information on activating secure session management.
● Network and Communication Security
This section provides an overview of the communication paths used by Employee Self-Service and the
security mechanisms that apply. It also includes our recommendations for the network topology to restrict
access at the network level:
○ Communication Channel Security
○ Network Security
○ Communication Destinations
● Internet Communication Framework Security
This section provides an overview of the Internet Communication Framework (ICF) services that are used by
Employee Self-Service.
● Security-Relevant Logging and Tracing
This section provides an overview of the logging and tracing mechanisms that apply to Employee Self-Service.
13.13.4.3.4.1 User Administration and Authentication
User management for Employee Self-Service uses the mechanisms provided with the SAP NetWeaver Application
Server for ABAP:
The security recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Application Server for ABAP Security Guide apply for Employee Self-Service (WDA) in SAP NetWeaver
Business Client for HTML apply to the ESS business packages (Business Package for Employee Self-Service) and
Business Package for Employee Self-Service (WDA).
In addition to these guidelines, information about user administration and authentication that specifically applies
to Employee Self-Service is included in the following sections:
● User Management
● Integration into Single Sign-On Environments
13.13.4.3.4.1.1 User Management
Use
User management for Employee Self-Service (WDA) in SAP NetWeaver Business Client for HTML uses the
mechanisms provided with the SAP NetWeaver Application Server for ABAP.
For an overview of how these mechanisms apply to Employee Self-Service, see the sections below.
Security Guide for SAP S/4HANA 1709
558 P U B L I C SAP S/4HANA Business ApplicationsUser Administration Tools
The table below shows the tools to use for user management and user administration with Employee Self-Service.
Table 348: User Management Tools
Tool Detailed Description Comment
User maintenance for ABAP-based sys You use the user maintenance transac Used for all ESS deployment options
tems (transaction SU01) tion to generate users in the ABAP-
based systems and to assign authoriza
tion profiles.
Role maintenance (transaction PFCG) You use the role maintenance transac Used for all ESS deployment options
tion to generate authorization profiles
for your self-service users.
For more information, see User and Role
Administration of AS ABAP.
Note
For the ESS business packages, you must perform user mapping for the users in the ABAP system and the
Portal. For more information, see Assigning Portal Roles to Users.
Caution
Ensure that you give end users general reading permission for the SAP Enterprise Portal. For more information,
see SAP Note 939412 .
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively must change their passwords on a regular basis, but
not those users under which background processing jobs run.
User types that are required for Employee Self-Service include:
● Individual users:
○ Dialog users (Used for SAP GUI for Windows or RFC connections)
○ Internet users (Same policies apply as for dialog users, but used for Internet connections).
● Technical users:
○ Service users .
For more information on these user types, see User Types in the SAP NetWeaver AS ABAP Security Guide.
Note
For the Business Package for Employee Self-Service (up to and including 1.41), we recommend you set up the
connection between the SAP Enterprise Portal and the connected systems (ECC system, J2EE Engine, BW
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 559system) so that each individual user has access. This does not apply to the Business Package for Employee
Self-Service (WDA).
Standard Users
For Employee Self-Service, no standard users are delivered.
13.13.4.3.4.1.2 Integration into Single Sign-On Environments
Use
Employee Self-Service supports the Single Sign-On (SSO) mechanisms provided by SAP NetWeaver. Therefore,
the security recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Security Guide also apply to Employee Self-Service.
For more information about the available authentication mechanisms, see User Authentication and Single Sign-
On in the SAP NetWeaver Library.
Configuration of Web Services with Client Certificates
For ESS applications of the Business Package for Employee Self-Service, the use of client certificates should be
configured for authentication when users access the J2EE Engine using an end-to-end connection. To achieve
this, follow the instructions under Configuring the Use of Client Certificates for Authentication.
13.13.4.3.4.2 Authorizations
Use
Employee Self-Service uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore,
the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide
ABAP also apply to ESS.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see Role Administration.
Security Guide for SAP S/4HANA 1709
560 P U B L I C SAP S/4HANA Business ApplicationsRole and Authorization Concept for Employee Self-Service
Employee Self-Service embraces services from a variety of SAP applications and also uses the authorizations of
these individual components. Most of these services belong to HCM components, see Authorizations for Human
Resources.
Standard Roles
The tables below show the standard roles that are used for authorizations by the Business Package for Employee
Self-Service (up to and including 1.50) and by Employee Self-Service (WDA).
Table 349: Standard Roles for the Business Package for Employee Self-Service
Role Name Description
SAP_ESSUSER_ERP05 Single Role with all Non-Country-Spe Single role that comprises all non coun
cific Functions try-specific functions.
SAP_EMPLOYEE_ERP05_xx ESS ERP05: Country-Specific Functions Single role comprising country-specific
for functions. A separate role exists for each
country version (xx = country ID). The
corresponding composite role is
SAP_EMPLOYEE_ERP05.
SAP_ASR_EMPLOYEE HR Administrative Services: Employee Enhancement of the role
SAP_ESSUSER_ERP05 for the employees
that use the functions of the component
PA-AS (HR Administrative Services) in
the Business Package for Employee Self-
Service (up to and including 1.4.1).
Caution
For the Business Package for Employee Self-Service, you also need SAP Note 857431 for generating the
authorization profiles.
Table 350: Standard Roles for Employee Self-Service (WDA)
Role Name Description
SAP_EMPLOYEE_XX_ESS_WDA_2 ESS International Single Role Authorizations for all international serv
ices in Employee Self-Service (WDA).
For more information about this and all
other Employee Self-Service (WDA)
roles, see Single Roles for Employee Self-
Service (WDA).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 561Role Name Description
SAP_EMPLOYEE_AU_ESS_WDA_1 ESS Single Role for Australia Authorizations for country-specific serv
ices for Australia in Employee Self-Serv
ice (WDA).
SAP_EMPLOYEE_CA_ESS_WDA_2 ESS Single Role for Canada Authorizations for country-specific serv
ices for Canada in Employee Self-Service
(WDA).
SAP_EMPLOYEE_CH_ESS_WDA_1 ESS Single Role for Switzerland Authorizations for country-specific serv
ices for Switzerland in Employee Self-
Service (WDA).
SAP_EMPLOYEE_CN_ESS_WDA_1 ESS Single Role for China Authorizations for country-specific serv
ices for China in Employee Self-Service
(WDA).
SAP_EMPLOYEE_DE_ESS_WDA_1 ESS Single Role for Germany Authorizations for country-specific serv
ices for Germany in Employee Self-Serv
ice (WDA).
SAP_EMPLOYEE_HK_ESS_WDA_1 ESS Single Role for Hong Kong Authorizations for country-specific serv
ices for Hong Kong in Employee Self-
Service (WDA).
SAP_EMPLOYEE_IN_ESS_WDA_2 ESS Single Role for India Authorizations for country-specific serv
ices for India in Employee Self-Service
(WDA).
SAP_EMPLOYEE_JP_ESS_WDA_2 ESS Single Role for Japan Authorizations for country-specific serv
ices for Japan in Employee Self-Service
(WDA).
SAP_EMPLOYEE_MY_ESS_WDA_1 ESS Single Role for Malaysia Authorizations for country-specific serv
ices for Malaysia in Employee Self-Serv
ice (WDA).
SAP_EMPLOYEE_PT_ESS_WDA_1 ESS Single Role for Portugal Authorizations for country-specific serv
ices for Portugal in Employee Self-Serv
ice (WDA).
SAP_EMPLOYEE_SG_ESS_WDA_1 ESS Single Role for Singapore Authorizations for country-specific serv
ices for Singapore in Employee Self-
Service (WDA).
SAP_EMPLOYEE_TH_ESS_WDA_1 ESS Single Role for Thailand Authorizations for country-specific serv
ices for Thailand in Employee Self-Serv
ice (WDA).
Security Guide for SAP S/4HANA 1709
562 P U B L I C SAP S/4HANA Business ApplicationsRole Name Description
SAP_EMPLOYEE_US_ESS_WDA_1 ESS Single Role for the United States Authorizations for country-specific serv
ices for the USA in Employee Self-Serv
ice (WDA).
SAP_FI_TV_WEB_ESS_TRAVELER_2 ESS Single Role for the Traveler Authorizations for ESS services for the
traveler role in Employee Self-Service
(WDA).
SAP_ASR_EMPLOYEE_SR_HCM_CI_3 ESS Single Role for HCM P&F Services Authorizations for international ESS
services from the HR Process and Forms
application in Employee Self-Service
(WDA).
SAP_PM_EMPLOYEE_HCM_CI_1 ESS Single Role for HCM PM Services Authorizations for ESS services from the
Performance Management application in
Employee Self-Service (WDA).
SAP_TMC_EMPLOYEE_6 Employee in Talent Management Authorizations for ESS services from the
Talent Management and Talent
Development application in Employee
Self-Service (WDA). For more informa
tion, see Employee in Talent
Management.
SAP_RCF_ESS_SR_ERC_CI_4 E-Recruiting services for ESS (WDA) Authorizations in SAP E-Recruiting for
employees that use SAP E-Recruiting
services in ESS (WDA).
/SAPSRM/EMPLOYEE_ESS SAP SRM Employee for ESS Authorizations in SAP SRM for employ
ees that use services from Purchasing in
ESS (WDA).
Note
The composite role SAP_EMPLOYEE_ESS_WDA_2, which contains the single roles listed above (except for the
last two roles), is required for Employee Self-Service (WDA) in SAP NetWeaver Business Client for HTML. For
more information on all roles for ESS (WDA), see also Roles in Employee Self-Service (WDA).
Standard Authorization Objects
The following table presents the general authorization objects relevant for security that are used by the Business
Package for Employee Self-Service (up to and including 1.50).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 563Table 351: Standard Authorization Objects for Self-Service Applications
Authorization Object Field Value Description
S_RFC RFC_NAME Depends on service Saves data from RFC access
to Web Dynpro front end to
the back-end system.
Apart from these authorization objects, all Employee Self-Service deployment options use the authorization
objects from the following application areas or application components:
● Human Capital Management
See the S/4HANA Security Guide at Human Capital Management Authorizations .
● SAP E-Recruiting
See the S/4HANA Security Guide at Human Capital Management Talent Management SAP E-Recruiting
Authorizations .
● HCM Processes and Forms
See the S/4HANA Security Guide at Human Capital Management Personnel Administration (PA) HCM
Processes and Forms Authorizations .
● Travel Management
See the S/4HANA Security Guide at Accounting Financial Accounting Travel Management (FI-TV) .
13.13.4.3.4.3 Session Security Protection
Use
To increase security and prevent access to the SAP logon ticket and security session cookie(s), we recommend
activating secure session management.
We also highly recommend using SSL to protect the network communications where these security-relevant
cookies are transferred.
Session Security Protection on the AS ABAP
The following section is relevant for Employee Self-Service (WDA):
To prevent access in javascript or plug-ins to the SAP logon ticket and security session cookies
(SAP_SESSIONID__), activate secure session management. With an existing security session,
users can then start applications that require a user logon without logging on again. When a security session is
ended, the system also ends all applications that are linked to this security session.
Security Guide for SAP S/4HANA 1709
564 P U B L I C SAP S/4HANA Business ApplicationsUse the transaction SICF_SESSIONS to specify the following parameter values shown in the table below in your
AS ABAP system:
Table 352: Session Security Protection Profile Parameters
Profile Parameter Recommended Value Comment
icf/ 0 Client-Dependent
set_HTTPonly_flag_on_cookies
login/ticket_only_by_https 1 Not Client-Dependent
For more information, a list of the relevant profile parameters, and detailed instructions, see Activating HTTP
Security Session Management on AS ABAP in the AS ABAP security documentation.
13.13.4.3.4.4 Network and Communication Security
Your network infrastructure is extremely important in protecting your system. Your network needs to support the
communication necessary for your business needs without allowing unauthorized access. A well-defined network
topology can eliminate many security threats based on software flaws (at both the operating system level and
application level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, then there is no way for intruders to compromise the machines
and gain access to the back-end system’s database or files. Additionally, if users are not able to connect to the
server LAN (local area network), they cannot exploit well-known bugs and security holes in network services on
the server machines.
The network topology for Employee Self-Service is based on the topology used by the SAP NetWeaver platform.
Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security Guide also
apply to Employee Self-Service. Details that specifically apply to Employee Self-Service are described in the
following sections:
● Communication Channel Security
This topic provides an overview of the communication channels used by Employee Self-Service, the protocol
used for the connection, and the type of data transferred.
● Network Security
This topic describes the recommended network topology for Employee Self-Service. It shows the appropriate
network segments for the various client and server components and where to use firewalls for access
protection. It also includes a list of the ports needed to operate Employee Self-Service.
● Communication Destinations
This topic describes the information needed for the various communication paths, for example, which users
are used for which communications.
For more information, see the following sections in the SAP NetWeaver Security Guide:
● Network and Communication Security
● Security Guides for Connectivity and Interoperability Technologies
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 56513.13.4.3.4.4.1 Communication Channel Security
Use
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
For more information, see Transport Layer Security in the SAP NetWeaver Security Guide.
Recommendation
We strongly recommend using secure protocols (SSL, SNC) whenever possible.
SSL connections for Adobe Document Services
For ESS applications to perform security-related functions such as digitally signing PDF documents or launching
of PDF forms, you must set up an SSL connection to the Web service. To achieve this, follow the instructions
under Configuration of the Web Service SSL Connection in the Adobe Document Services Configuration Guide.
13.13.4.3.4.4.2 Network Security
Ports
The Employee Self-Service runs on SAP NetWeaver and uses the port from the AS ABAP (for Employee Self-
Service (WDA)).
For more information, see the topics for AS ABAP Ports in the corresponding SAP NetWeaver Security Guide.
For other components, for example, SAPinst, SAProuter, or the SAP Web Dispatcher, see also the document
TCP/IP Ports Used by SAP Applications, which is located on the SAP Service Marketplace at http://
service.sap.com/ under Products Database & technology Security Infrastructure Security .
13.13.4.3.4.4.3 Communication Destinations
Use
The tables below provide an overview of the communication destinations required for the three Employee Self-
Service deployment options.
Employee Self-Service (WDA) in SAP Business Client for HTML
For this deployment option, you have to maintain RFC connections using the transaction SM59, see also the
following table 1.
Security Guide for SAP S/4HANA 1709
566 P U B L I C SAP S/4HANA Business ApplicationsTable 353: Table 1: Connection Destinations for Employee Self-Service (WDA) in NWBC for HTML
Destination Delivered Type Recommended User Description
Authorizations
SAP_ECC_HumanResou No ABAP connection n/a System alias for the
rces ECC HCM system
SAP_ECC_HumanResou No HTTP connection n/a System alias for the
rces_HTTP ECC HCM system
SAP_SRM No ABAP connection n/a System alias for the
SRM system for Pur
chasing applications
SAP_SRM_HTTP No HTTP connection n/a System alias for the
SRM system for Pur
chasing applications
SAP_EREC_TalentMan No ABAP connection n/a System alias for the
agement SAP E-Recruiting sys
tem
SAP_EREC_TalentMan No HTTP connection n/a System alias for the
agement_HTTP SAP E-Recruiting sys
tem
Business Package for Employee Self-Service (WDA)
For the this deployment option, you have to maintain system aliases in the Portal System Landscape
Administration, see also the following table 2.
Table 354: Table 2: Connection Destinations for the Business Package for Employee Self-Service (WDA)
Destination Delivered Type Recommended User Description
Authorization
SAP_ECC_HumanResou Yes Entry in Portal System n/a System alias for the
rces Landscape Administra ECC HCM system
tion
SAP_SRM Yes Entry in Portal System n/a System alias for the
Landscape Administra SRM system for Pur
tion chasing applications
SAP_EREC_TalentMan Yes Entry in Portal System n/a System alias for the
agement Landscape Administra SAP E-Recruiting sys
tion tem
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 567More Information
For the Business Package for Employee Self-Service (WDA):
● Setting Up the System Landscape
For the Business Package for Employee Self-Service:
● Setting Up the System Landscape
13.13.4.3.4.5 Internet Communication Framework Security
Use
You should only activate those services that are needed for the applications running in your system. For Employee
Self-Service (WDA), the following services are needed which, unless stated otherwise, you can find in the path
default_host/sap/bc/webdynpro/sap/:
For general ESS applications:
● HRESS_A_MENU
● HRESS_A_PERSINFO
● hress_a_payslip
● HRESS_A_TCS
For applications from HCM Processes and Forms (PA-AS):
● asr_form_display
● ars_personnel_file
● asr_processes_display
● ASR_PROCESS_EXECUTE_FPM
For applications from Cross-Application Time Sheet (CA-TS) and Personal Time Management (PT):
● hress_a_cats_1
● hress_a_cats_print
● hress_a_corrections
● hress_a_lea_team_calendar
● hress_a_ptarq_leavreq_appl
● HRESS_A_PTARQ_TIMEACC
● HRESS_A_TIME_DATESEL
● hress_a_time_persel
For applications from Benefits (PA-BN):
● HRESS_A_BEN_PART_OVERVIEW
● HRESS_A_BENEFITS_ENROLLMENT
● HRESS_A_BEN_PRINT_ENRO_FORM
● HRESS_A_BEN_FSA_CLAIMS
Security Guide for SAP S/4HANA 1709
568 P U B L I C SAP S/4HANA Business Applications● HRESS_A_BEN_PRINT_ENRO_FORM
● HRESS_A_BEN_PRINT_CONF_FORM
For applications from Performance Management (PA-PD-PM):
● HAP_CONFIGURATION
● HAP_DOCUMENT_LINK
● HAP_MAIN_DOCUMENT
● HAP_QUALIFICATION_PROFILE
● HAP_START_PAGE_POWL_UI_ESS
● HAP_a_ESS_Startpage
For applications from Travel Management (FI-TV):
● FITE_EXPRESS_EXPENSES
● FITE_REQUEST_DELETE
● FITE_EXPENSES_DELETE
● FITP_PLAN_CANCEL
● FITV_UNLOCK_PERSNO
● FITV_TRIP_FORM
● FITV_ROUTING
● FITP_PROFILE
● FITE_REQUEST
● FITP_PLANNING FITE_EXPENSES
● FITV_POWL_TRIPS
And in the path default_host/sap/bc/bsp/sap/:
● fitv_bsp_pfcg
For applications from Self-Service Procurement (SRM-EBP-SHP) in the path /default_host/sap/bc/
webdynpro/sapsrm/:
● WDA_L_FPM_OIF
● WDA_L_FPM_OVP
● WDA_L_PRINT_PREVIEW
For applications from ERP E-Procurement (MM-PUR-SSP):
● /SRMERP/WDA_I_SC_ESS
● /SRMERP/WDA_I_SC_FS_ESS
● /SRMERP/WDA_I_WSCP
For applications from SAP E-Recruiting (PA-ER):
● All services with the prefix hrrcf in the path /default_host/sap/bc/webdynpro/sap/
● All services in the path /default_host/sap/bc/erecruiting/
● All services with the prefix hrrcf_wd in the path /default_host/sap/bc/bsp/sap/
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 569Note
You activate the services in Customizing for SAP E-Recruiting under Technical Settings User Interfaces
Candidate Front-End Candidate Specify E-Recruiting Services (Web Dynpro ABAP) .
For country-specific applications:
● HRESS_A_PAYINFO
● HRESS_A_REP_AU_PS
● Hress_a_rep_ca_tfr
● HRESS_A_REP_CH_PKB1
● HRESS_A_REP_CH_PKB4
● HRESS_A_REP_CN_CTXD
● HRESS_A_REP_HK_IR56B
● HRESS_A_REP_HK_IR56F
● HRESS_A_REP_HK_IR56G
● HRESS_A_REP_IN_FORM16
● HRESS_A_REP_JP_YEA_DEP
● HRESS_A_REP_JP_YEA_INS
● HRESS_A_REP_JP_YEA_WTS
● HRESS_A_REP_MY_EA
● HRESS_A_REP_MY_PCB2
● HRESS_A_REP_PT_IID
● HRESS_A_REP_SG_IR21
● HRESS_A_REP_SG_IR8A
● HRESS_A_REP_SG_IR8E
● HRESS_A_REP_SG_IR8S
● HR_EA_A_OVERVIEW_EE
● HR_EA_A_OVERVIEW_CU
● HR_EA_A_OVERVIEW_AP
● HR_EA_A_OVERVIEW_TO
● HRESS_A_REP_IN_SSITP
● HRESS_A_CLAIM_IN
● HRESS_A_ITDCL_IN
● HRESS_FWS_EMP_CALENDAR
● ASR_PROCESS_EXECUTE_FPM
Activities
Use the transaction SICF to activate these services.
If your firewalls use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
Security Guide for SAP S/4HANA 1709
570 P U B L I C SAP S/4HANA Business ApplicationsMore Information
For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver Library documentation.
For more information about ICF security, see the RFC/ICF Security Guide.
13.13.4.3.4.6 Leave Request-Specific Virus Scan Profile
(ABAP)
Attackers can abuse a file upload to modify displayed application content or to obtain authentication information
from a legitimate user. Usually, virus scanners are not able to detect files designed for this kind of attack.
For this reason, the standard SAP Virus Scan Interface includes an enhancement option to protect the user
and/or the SAP system from potential attacks.
For more information about the behavior of the virus scanner when default virus scan profiles (VSP) are activated,
see SAP note 1693981 (Unauthorized modification of displayed content).
SAP Leave Request Application (HRESS_A_PTARQ_LEAVREQ_APPL) changes this behavior so that the file types
(EXE, RAR, DLL) are blocked.
When you have created and activated the application-specific virus scan profile (SIHTTP/HTTP_UPLOAD), this
profile produces the following impact: The MIME sniffing check is activated, and the MIME type APPLICATION/
OCTET-STREAMwill be blocked.
13.13.4.3.4.7 Security-Relevant Logging and Tracing
Employee Self-Service relies on the logging and tracing mechanisms from SAP NetWeaver.
For more information, see the following topics:
● For the AS ABAP (relevant for Employee Self-Service (WDA)):
Auditing and Logging
13.13.4.3.5 Manager Self-Service
About This Document
This chapter provides an overview of the security-relevant information that applies to Manager Self-Service (EP-
PCT-MGR).
The following deployment options are available for Manager Self-Service (MSS):
● Business Package for Manager Self-Service
This Business Package is a “classic” SAP Business Package that runs in the SAP Enterprise Portal. The Portal
role consists of worksets and iViews based on Web Dynpro ABAP technologies.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 571● Manager Self-Service in SAP Business Client
The role structure for this deployment option is maintained in the back-end system with the SAP role
maintenance transaction PFCG. All applications available with this role are based on Web Dynpro ABAP
technology.
Note
Some parts of the security information in this chapter only apply to one of the MSS deployment options. In this
case, you will find a comment explaining for which deployment option this information is valid right at the
beginning of each section. If not stated otherwise, the security information in this chapter applies to both MSS
deployment options.
See also:
● For more information about the roles in SAP Enterprise Portal, see SAP Library for S/4HANA on SAP Help
Portal at Cross-Application Functions in SAP ERP Roles Business Packages (Portal Content) .
● For more information about the roles in SAP Business Client, see SAP Library for S/4HANA on SAP Help
Portal Cross-Application Functions in SAP ERP Roles Roles in SAP NetWeaver Business Client .
● For more information about SAP Business Client, see SAP Library for SAP NetWeaver on SAP Help Portal at
http://help.sap.com/netweaver SAP NetWeaver by Key Capability Application Platform by Key
Capability ABAP Technology UI Technology SAP NetWeaver Business Client .
Overview of the Main Sections of This Chapter
This chapter comprises the following sections with security-related topics specific to Manager Self-Service:
● Before You Start
This section comprises references to other Security Guides that are relevant for Manager Self-Service and a
list of the most important notes for Manager Self-Service regarding security.
● User Administration and Authentication
This section provides an overview of the following user administration and authentication aspects for
Manager Self-Service:
○ User Management
This section contains information about the user types that are required by Manager Self-Service and
standard users for Manager Self-Service.
○ Integration into Single Sign-On Environments
This topic describes how the Employee Self-Service supports Single Sign-On mechanisms.
● Authorizations
This section provides an overview of the authorization concept that applies to Manager Self-Service.
● Session Security Protection
This section provides information about activating secure session management, which prevents JavaScript or
plug-ins from accessing the SAP logon ticket or security session cookie(s).
● Network and Communication Security
Security Guide for SAP S/4HANA 1709
572 P U B L I C SAP S/4HANA Business ApplicationsThis section provides an overview of the communication paths used by Manager Self-Service and the security
mechanisms that apply. It also includes our recommendations for the network topology to restrict access at
the network level:
○ Network Security
○ Communication Destinations
● Internet Communication Framework Security
This section provides an overview of the Internet Communication Framework (ICF) services that are used by
Manager Self-Service.
● Security-Relevant Logging and Tracing
This section provides an overview of the logging and tracing mechanisms that apply to Manager Self-Service.
13.13.4.3.5.1 User Administration and Authentication
User management for Manager Self-Service uses the mechanisms provided with the SAP NetWeaver Application
Server for ABAP.
The security recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Application Server for ABAP apply for Manager Self-Service in SAP NetWeaver Business Client.
In addition to these guidelines, information about user administration and authentication that specifically applies
to Manager Self-Service is included in the following sections:
● User Management
● Integration into Single Sign-On Environments
13.13.4.3.5.1.1 User Management
Use
User management for Manager Self-Service uses the mechanisms provided with the SAP NetWeaver Application
Server for ABAP (for example, tools, user types, and password policies).
For an overview of how these mechanisms apply for Manager Self-Service, see the sections below.
User Administration Tools
The table below shows the tools to use for user management and user administration with Manager Self-Service.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 573Table 355: User Management Tools
Tool Detailed Description Comment
User maintenance for ABAP-based sys You use the user maintenance transac Used for both MSS deployment options
tems (transaction SU01) tion to generate users in the ABAP-
based systems.
Role maintenance (transaction PFCG) You use the role maintenance transac Used for both MSS deployment options
tion to generate profiles for your self-
service users.
For more information, see User and Role
Administration of AS ABAP.
Note
For the Business Package for Manager Self-Service, it is necessary to perform user mapping for the users in the
ABAP system and the Portal. For more information, see Assigning Portal Roles to Users.
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively must change their passwords on a regular basis, but
not those users under which background processing jobs run.
The user types that are required for the Manager Self-Service are Individual users:
● Dialog users (Used for SAP GUI for Windows or RFC connections)
● Internet users (Same policies apply as for dialog users, but used for Internet connections).
For more information about these user types, see User Types in the SAP NetWeaver AS for ABAP Security Guide.
Recommendation
For the Business Package for Manager Self-Service, we recommend you set up the connection between the
SAP Enterprise Portal and the connected systems (ECC system, J2EE Engine, BI system) so that each
individual user has access. This does not apply to Manager Self-Service in SAP NWBC. .
Standard Users
For Manager Self-Service, no standard users are delivered.
Security Guide for SAP S/4HANA 1709
574 P U B L I C SAP S/4HANA Business Applications13.13.4.3.5.1.2 Integration into Single Sign-On Environments
Use
Manager Self-Service supports the Single Sign-On (SSO) mechanisms provided by SAP NetWeaver. Therefore,
the security recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Security Guide also apply to Manager Self-Service.
For more information about the available authentication mechanisms, see User Authentication and Single Sign-
On in the SAP NetWeaver Library and section Integration in Single Sign-On Environments in the S/4HANA Security
Guide.
Configuration of Web Services with Client Certificates
For MSS applications of the Business Package for Manager Self-Service, the use of client certificates should be
configured for authentication when users access the J2EE Engine using an end-to-end connection. To achieve
this, follow the instructions under Configuring the Use of Client Certificates for Authentication.
13.13.4.3.5.2 Authorizations
Use
Manager Self-Service uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore,
the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide
ABAP also apply to Manager Self-Service. The SAP NetWeaver authorization concept is based on assigning
authorizations to users based on roles. For role maintenance, use the profile generator (transaction PFCG) on the
AS ABAP.
Note
For more information about how to create roles, see Role Administration.
Role and Authorization Concept for Manager Self-Service
Manager Self-Service embraces services from a variety of SAP applications and also uses the authorizations of
these individual components. Many services belong to HCM components, see Authorizations for Human
Resources.
Recommendation
For Manager Self-Service, we highly recommend that you use the HCM-specific structural authorization check
in addition to the general SAP authorization check. For more information see SAP Library for S/4HANA on SAP
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 575Help Portal at Human Resources HR Tools Authorizations for Human Resources Structural
Authorization Check .
Standard Roles
The table below shows the standard roles that are used for authorizations by Manager Self-Service.
Table 356: Standard Roles for Manager Self-Service
Role Description
SAP_ASR_MANAGER Authorizations for the functions of the PA-AS component (HR
Administrative Services) for line managers in Manager Self-
Service.
SAP_TIME_MGR_XX_ESS_WDA_1 Authorizations for line managers in Manager Self-Service for
services used to approve leave requests and working times
from Employee Self-Service (WDA).
SAP_TMC_MANAGER Authorizations for managers relating to Talent Management
activities.
For more information, see Manager in Talent Management.
The structural authorization profile TMS_MAN_PROF is also
available as a template for the manager.
For more information, see Customizing for Talent
Management and Talent Development under Basic Settings →
Authorizations in Talent Management → Define Structural
Authorizations.
SAP_RCF_MANAGER Authorizations for the Manager role, which enables access to
SAP E-Recruiting from the Portal (Manager Self Service).
SAP_MANAGER_MSS_OTH_NWBC Authorizations for remote system applications including appli
cations from SAP E-Recruiting.
SAP_HR_LSO_HR-MANAGER Authorizations for the applications of the HR Manager Train
ing role of the SAP Learning Solution component.
SAP_HR_LSO_MANAGER Authorizations for the applications of the Manager role of the
SAP Learning Solution component.
SAP_FI_TV_WEB_APPROVER Authorizations for applications of the Travel Approver role of
the SAP Travel Management component.
SAP_HR_CPS_DET_PLAN_L_SR_NWBC Authorizations for applications of the manager role of the Per
sonnel Cost Planning component.
Security Guide for SAP S/4HANA 1709
576 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_SR_MSS_FIN_5 Authorizations for the Financials applications in Manager Self-
Service.
Caution
For the Business Package for Manager Self-Service, you also need SAP Note 844639 for generating the
authorization profiles.
Note
The composite role SAP_MANAGER_MSS_NWBC, which contains the single roles listed above , is required for
Manager Self-Service in SAP NetWeaver Business Client.
Standard Authorization Objects
The following section provides an overview of the security-relevant authorization objects that are used by
Manager Self-Service.
Table 357: Standard Authorization Objects for the Business Package for Manager Self-Service
Authorization Object Field Value Description
S_RFC RFC_NAME Depends on service Saves data from RFC access
to Web Dynpro front end to
the back-end system.
Table 358: Standard Authorization Objects for Controlling Services in MSS (Both Deployment Options)
Authorization Object Description
K_CCA General authorization object for Cost Center Accounting.
Is checked in the relevant Monitor iViews, Master Data iViews,
and Express Planning services.
K_ORDER General authorization object for internal orders.
Is checked in the relevant Monitor iViews, Master Data iViews,
and Express Planning services.
K_PCA Area responsible, Profit Center.
Is checked in the relevant Monitor iViews, Master Data iViews,
and Express Planning services.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 577Authorization Object Description
K_CSKS_PLA Cost element planning.
Is checked in the relevant Express Planning services.
K_FPB_EXP Authorization object for Express Planning.
This authorization object checks the Express Planning Frame
work call and the planning round call. The actual plan data is
protected by the authorization objects for the individual Ex
press Planning services.
Note
For more information about the fields for the authorization objects K_CCA, K_ORDER, and K_PCA, see SAP Note
15211 .
Apart from these authorization objects, both Manager Self-Service deployment options use the authorization
objects from the following application areas or application components:
● Human Capital Management
See the S/4HANA Security Guide at Human Capital Management Authorizations .
● SAP E-Recruiting
See the S/4HANA Security Guide at Human Capital Management Talent Management SAP E-Recruiting
Authorizations .
● HCM Processes and Forms
See the S/4HANA Security Guide at Human Capital Management Personnel Administration (PA) HCM
Processes and Forms Authorizations .
● Travel Management
See the S/4HANA Security Guide at Accounting Financial Accounting Travel Management (FI-TV) .
Authorizations for Business Intelligence (BI) iViews (BP MSS)
For the BI iViews in the Business Package for Manager Self-Service, users need the standard BI authorizations for
executing queries. For more information, see Authorization Check When Executing a Query (in the Data
Warehouse Management section of the documentation for SAP NetWeaver Business Intelligence).
In Human Capital Management, BI queries use a BI variable for personalization. Data is read from the DataStore
object for personalization 0PERS_VAR. If required, you can fill this DataStore Object from structural authorizations
(see Structural Authorizations - Values (0PA_DS02) and Structural Authorizations - Hierarchy (0PA_DS03)).
Security Guide for SAP S/4HANA 1709
578 P U B L I C SAP S/4HANA Business ApplicationsMore Information
For more information, see the SAP Help Portal BI Content documentation for Human Resources at http://
help.sap.com SAP NetWeaver SAP NetWeaver by Key Capability Information Integration by Key
Capability BI Content BI Content 705 Human Resources Organizational Management ODS Objects .
13.13.4.3.5.3 Session Security Protection
Use
To increase security and prevent access to the SAP logon ticket and security session cookie(s), we recommend
activating secure session management.
We also highly recommend using SSL to protect the network communications where these security-relevant
cookies are transferred.
Session Security Protection on the AS ABAP
The following section is relevant for Manager Self-Service in SAP NetWeaver Business Client:
To prevent access in javascript or plug-ins to the SAP logon ticket and security session cookies
(SAP_SESSIONID__), activate secure session management. With an existing security session,
users can then start applications that require a user logon without logging on again. When a security session is
ended, the system also ends all applications that are linked to this security session.
Use the transaction SICF_SESSIONS to specify the following parameter values shown in the table below in your
AS ABAP system:
Table 359: Session Security Protection Profile Parameters
Profile Parameter Recommended Value Comment
icf/ 0 Client-Dependent
set_HTTPonly_flag_on_cookies
login/ticket_only_by_https 1 Not Client-Dependent
For more information, including a list of the relevant profile parameters and detailed instructions, see Activating
HTTP Security Session Management on AS ABAP in the AS ABAP security documentation.
13.13.4.3.5.4 Network and Communication Security
Your network infrastructure is extremely important in protecting your system. Your network needs to support the
communication necessary for your business needs without allowing unauthorized access. A well-defined network
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 579topology can eliminate many security threats based on software flaws (at both the operating system level and
application level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, then there is no way for intruders to compromise the machines
and gain access to the back-end system’s database or files. Additionally, if users are not able to connect to the
server LAN (local area network), they cannot exploit well-known bugs and security holes in network services on
the server machines.
The network topology for Manager Self-Service is based on the topology used by the SAP NetWeaver platform.
Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security Guide also
apply to Manager Self-Service. Details that specifically apply to Manager Self-Service are described in the
following topics:
● Network Security
This topic describes the recommended network topology for Manager Self-Service. It shows the appropriate
network segments for the various client and server components and where to use fire walls for access
protection. It also includes a list of the ports needed to operate Manager Self-Service.
● Communication Destinations
This topic describes the information needed for the various communication paths, for example, which users
are used for which communications.
For more information, see the following sections in the SAP NetWeaver Security Guide:
● Network and Communication Security
● Security Guides for Connectivity and Interoperability Technologies
13.13.4.3.5.4.1 Network Security
Ports
Manager Self-Service runs on SAP NetWeaver and uses the ports from the AS ABAP (for Manager Self-Service in
SAP NWBC).
For more information, see the topic for AS ABAP Ports in the corresponding SAP NetWeaver Security Guides.
For other components, for example, SAPinst, SAProuter, or the SAP Web Dispatcher, see also the document
TCP/IP Ports Used by SAP Applications, which is located on the SAP Service Marketplace at http://
service.sap.com/ under Products Database & technology Security Infrastructure Security .
13.13.4.3.5.4.2 Communication Destinations
The tables below provide an overview of the communication destinations required for the MSS deployment
options.
Security Guide for SAP S/4HANA 1709
580 P U B L I C SAP S/4HANA Business ApplicationsManager Self-Service in SAP Business Client
For this deployment option, you have to maintain RFC connections using the transaction SM59, see also the
following table 1.
Table 360: Table 1: Connection Destinations for Manager Self-Service in SAP Business Client
Destination Delivered Type Recommended User Description
Authorizations
SAP_ECC_HumanResou No ABAP connection n/a System alias for the
rces ECC HCM system
SAP_ECC_HumanResou No HTTP connection n/a System alias for the
rces_HTTP ECC HCM system
SAP_ECC_FINANCIALS No ABAP connection n/a System alias for the
ECC FI system for Fi
nancials applications
SAP_ECC_FINANCIALS No HTTP connection n/a System alias for the
_HTTP ECC FI system for Fi
nancials applications
SAP_EREC_TalentMan No ABAP connection n/a System alias for the
agement SAP E-Recruiting sys
tem
SAP_EREC_TalentMan No HTTP connection n/a System alias for the
agement_HTTP SAP E-Recruiting sys
tem
13.13.4.3.5.5 Internet Communication Framework Security
Use
You should only activate the services needed for the applications running in your system. For Manager Self-
Service in SAP Business Client, the following services are needed which you can find under the path
default_host/sap/bc/webdynpro/sap/:
For applications from the Suite Inbox (CA-EPT-IBO):
● IBO_WDA_INBOX
For applications from HCM Processes and Forms (PA-AS):
● asr_form_display
● asr_mass_start_process
● asr_pa_pd_processes_display
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 581● asr_processes_display
● ASR_PROCESS_EXECUTE_FPM
● asr_process_select
● asr_srch_pd_process
For applications from Cross-Application Time Sheet (CA-TS) and Personal Time Management (PT):
● HRMSS_A_CATS_APPROVAL
● HRESS_A_PTARQ_LEAVREQ_APPL
● HRESS_A_LEA_TEAM_CALENDAR
For applications from Talent Management and Talent Development (PA-TM):
● HRTMC_EMPLOYEE_PROFILE
● HRTMC_LONG_PROFILE
● hrtmc_side_by_side
● HRTMC_TA_ASSESSMENT
● HRTMC_TA_DASHBOARD
● HRTMC_TA_DEV_PLAN
● hrtmc_teamviewer
For applications from Performance Management (PA-PD-PM):
● HAP_MAIN_DOCUMENT
● HAP_START_PAGE_POWL_UI_MSS
● HAP_A_PMP_PIE_CHART
● HAP_A_PMP_GOALS
● HAP_A_PMP_OVERVIEW
● HAP_A_PMP_MAIN
For applications from Enterprise Compensation Management (PA-ECM):
● HCM_ECM_PLANNING_OVERVIEW_OIF
● HCM_ECM_PLANNING_UI_GAF
● HCM_ECM_PROFILE_OIF
● HCM_ECM_SIDEBYSIDE_OIF
● HCM_ECM_TEAMVIEWER_OIF
For applications from Personnel Cost Planning (PA-CP):
● WDA_HCP_DET_PLAN
For applications from SAP Learning Solution (PE-LSO):
● LSO_MANAGE_PARTICIPANTS
● LSO_MANAGE_MANDATORY_ASSIGN
For applications from SAP E-Recruiting (PA-ER):
● default_host/sap/bc/erecruiting/dataoverview
● hrrcf_a_dataoverview
● hrrcf_a_requi_monitor
● hrrcf_a_req_assess
Security Guide for SAP S/4HANA 1709
582 P U B L I C SAP S/4HANA Business Applications● hrrcf_a_tp_assess
● hrrcf_a_qa_mss
● hrrcf_a_substitution_manager
● hrrcf_a_substitution_admin
Note
You activate the services in Customizing for SAP E-Recruiting at Technical Settings User Interfaces
Manager Involvement Specify E-Recruiting Services for MSS .
For applications from Travel Management (FI-TV):
● FITV_POWL_APPROVER
● FITV_TRIP_FORM
● FITV_POWL_PERSONALIZATION
For applications from the Financials (FI) application area:
● QISR_UI_STATUSOVERVIEW
● QISR_UI_STATUSOVERVIEW
● QISR_UI_STATUSOVERVIEW
● FPB_EXP_OVERVIEW
● FCOM_PBC_MONITOR
● FCOM_PBC_MONITOR
● FPB_VARIANCE_MONITOR_OVERVIEW
● FCOM_EQM_MONITOR
● FPB_LINEITEM_MONITOR_OVERVIEW
● FPB_VARIANCE_MONITOR_OVERVIEW
● FPB_LINEITEM_MONITOR_OVERVIEW
● FCOM_EQM_MONITOR
● FCOM_PBC_MONITOR
● FCOM_PBC_MONITOR
● FPB_LINEITEM_MONITOR_OVERVIEW
● FPB_VARIANCE_MONITOR_OVERVIEW
Activities
Use the transaction SICF to activate these services.
If your firewalls use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 583More Information
For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver Library documentation.
For more information about ICF security, see the RFC/ICF Security Guide .
13.13.4.3.5.6 Security-Relevant Logging and Tracing
Manager Self-Service relies on the logging and tracing mechanisms from SAP NetWeaver.
For more information, see the following topics:
● For the AS ABAP (relevant for Manager Self-Service in SAP NetWeaver Business Client):
○ Auditing and Logging
○ Tracing and Logging (for NWBC)
13.13.5 Talent Management
13.13.5.1 SAP E-Recruiting
13.13.5.1.1 Security Aspects of Data Flow and Processes
The following section provides an overview of the data flows in the security-relevant scenarios for SAP E-
Recruiting.
13.13.5.1.1.1 Data Entry by External Candidate in Distributed
System
The figure below provides an overview of the data flow for the following scenario: Data entry by the external
candidate in the distributed system.
Security Guide for SAP S/4HANA 1709
584 P U B L I C SAP S/4HANA Business ApplicationsThe table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 361:
Step Description Security Action
1 External candidate transfers profile data External candidate has to confirm the
and application data data privacy statement.
2 Data transfer Access authorization using RFC user
3 Save data to database Not relevant
4 External candidate uploads attachments Not relevant
5 Virus check (WD ABAP) Standard virus check provided by SAP
NetWeaver Application Server (front-
end server)
6 Data transfer Not relevant
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 585Step Description Security Action
7 Virus check (BAdI) Additional virus check using the BAdI
HRRCF00_DOC_UPLOAD (backend
server) (see Customizing activity BAdI:
Upload Documents)
8 Save data to database Not relevant
13.13.5.1.1.2 Data Entry in Nondistributed System
The figure below provides an overview of the data flow for the following scenario: Data entry in the nondistributed
system.
The data flow is relevant within the framework of the following scenarios:
● The internal or external candidate maintains his or her profile and application.
● The recruiter maintains a candidate''s profile.
● The recruiter or data entry clerk enters an application in the system.
Security Guide for SAP S/4HANA 1709
586 P U B L I C SAP S/4HANA Business ApplicationsThe table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 362:
Step Description Security Action
1 Transfer of data External candidate has to confirm the
data privacy statement.
2 Save data to database Not relevant
3 Transfer of attachments Not relevant
4 Virus check (WD ABAP) Standard virus check provided by SAP
NetWeaver Application Server (front-
end server)
5 Virus check (BAdI) Additional virus check using the BAdI
HRRCF00_DOC_UPLOAD (backend
server) (see Customizing activity BAdI:
Upload Documents)
6 Save data to database Not relevant
13.13.5.1.1.3 Integration of Org. Mgmt/E-Recruiting in
Distributed System
The figure below provides an overview of the data flow for the scenario: Integration of Organizational Management
in SAP E-Recruiting in a distributed system.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 587The table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 363:
Step Description Security Action
1 The recruiter requests data overviews Not relevant
for organizational units, positions, or
jobs.
2 The SAP NetWeaver Application Server Access authorization using RFC user
requests the Organizational Manage
ment data using RFC in the connected
HR system.
3 The HR system transfers the data using XML encryption
XML to the SAP NetWeaver Application
Server.
Security Guide for SAP S/4HANA 1709
588 P U B L I C SAP S/4HANA Business Applications13.13.5.1.1.4 Integration of Org. Mgmt/E-Recruiting in
Integrated System
The figure below provides an overview of the data flow for the scenario: Integration of Organizational Management
in SAP E-Recruiting in an integrated system.
The table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 364:
Step Description Security Action
1 The recruiter requests data overviews Not relevant
for organizational units, positions, or
jobs.
2 The SAP NetWeaver Application Server Not relevant
requests the Organizational Manage
ment data in the integrated HR system.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 589Step Description Security Action
3 The integrated HR system transfers the XML encryption
data using XML to the SAP NetWeaver
Application Server.
13.13.5.1.1.5 Recommendation of Job Posting (Tell a Friend)
The figure below provides an overview of the data flow for the following scenario: The candidate uses the Tell A
Friend function to inform another person about an employment opportunity.
The process runs as described below if you enter the value MAILTO or MAILTO_REGONLY for the parameter
TF_SEND_METHODin Customizing for SAP E-Recruiting under Technical Settings → User Interfaces → Candidate
→ Backend Candidate → Assign Values to Interface Parameters (Web Dynpro ABAP) .
We recommend that you do not use the default delivery TF_SEND_METHOD = '' '' as this means that the e-mails
with the recommendation letter are sent using your e-mail server. As the candidate is responsible for specifying
the recipient and content of the e-mail message to be sent, undesirable content could be sent from the sender
address of your e-mail server.
For more information, see the documentation for the Customizing activity Assign Values to Interface Parameters
(Web Dynpro ABAP) and SAP Note 1390162 .
Security Guide for SAP S/4HANA 1709
590 P U B L I C SAP S/4HANA Business ApplicationsThe table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 365:
Step Name Security Action
1 Trigger Tell a Friend function Not relevant
2 Open local e-mail client The e-mail client (for example, Microsoft
Outlook) is opened locally on the candi
date''s computer. This client (and not the
central e-mail client) then sends the e-
mail. You activate this process using the
parameter TF_SEND_METHODin the
Customizing activity Assign Values to
Interface Parameters (Web Dynpro
ABAP) .
3 Send e-mail Not relevant
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 59113.13.5.1.1.6 Resume Parsing (Candidate, Integrated System)
The figure below provides an overview of the data flow for the following scenario:
The candidate uploads his or her resume as an attachment and then sends it to a third-party vendor for parsing.
The front end and backend for the candidate''s user run on the same system.
Security Guide for SAP S/4HANA 1709
592 P U B L I C SAP S/4HANA Business ApplicationsSecurity Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 593The table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 366:
Step Name Security Action
1 Upload resume as attachment Not relevant
2 Virus check WD ABAP Standard virus check provided by SAP
NetWeaver Application Server (front-
end server)
3 Virus check BAdI Additional virus check using the BAdI
HRRCF00_DOC_UPLOAD (backend
server) (see Customizing activity BAdI:
Upload Documents)
4 Save contents Not relevant
5 Trigger Resume Parsing Not relevant
6 Transfer attachment with resume Not relevant
7 Parse resume For XI-relevant security topics, see
http:service.sap.com/securityguide →
SAP Process Integration (PI) Security
Guides .
8 Transfer HRXML data HRXML coding
9 Save structured data to database Not relevant
10 Trigger profile upload Not relevant
11 Save structured data in profile Not relevant
12 Virus check BAdI Additional virus check using the BAdI
HRRCF00_DOC_UPLOAD (backend
server) (see Customizing activity BAdI:
Upload Documents)
13 Save formatted resume as attachment Not relevant
14 Save contents Not relevant
13.13.5.1.1.7 Resume Parsing (Candidate, Distributed Scenario)
The figure below provides an overview of the data flow for the following scenario: The candidate uploads his or her
resume as an attachment and then sends it to a third-party vendor for parsing. The front end and backend for the
candidate''s user run on different systems.
Security Guide for SAP S/4HANA 1709
594 P U B L I C SAP S/4HANA Business ApplicationsSecurity Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 595The table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 367:
Step Name Security Action
1 Upload resume as attachment Not relevant
2 Virus check WD ABAP Standard virus check provided by SAP
NetWeaver Application Server (front-
end server)
3 Virus check BAdI Additional virus check using the BAdI
HRRCF00_DOC_UPLOAD (backend
server) (see Customizing activity BAdI:
Upload Documents)
4 Save contents Not relevant
5 Trigger Resume Parsing Not relevant
6 Transfer attachment with resume Not relevant
7 Parse resume For XI-relevant security topics, see
http:service.sap.com/securityguide →
SAP Process Integration (PI) Security
Guides .
8 Transfer HRXML data HRXML coding
9 Save structured data to database Not relevant
10 Trigger profile upload Not relevant
11 Save structured data in profile Not relevant
12 Virus check BAdI Additional virus check using the BAdI
HRRCF00_DOC_UPLOAD (backend
server) (see Customizing activity BAdI:
Upload Documents)
13 Save formatted resume as attachment Not relevant
14 Save contents Not relevant
Security Guide for SAP S/4HANA 1709
596 P U B L I C SAP S/4HANA Business Applications13.13.5.1.1.8 Resume Parsing (Recruiter)
The figure below provides an overview of the data flow for the following scenario:
The recruiter uploads a candidate’s resume as an attachment and then sends it to a third-party vendor for
parsing. The data is then transferred to the corresponding fields of the form for the Entry of External Applications
application.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 597Security Guide for SAP S/4HANA 1709
598 P U B L I C SAP S/4HANA Business ApplicationsThe table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 368:
Step Name Security Action
1 Upload resume as attachment Not relevant
2 Virus check WD ABAP Standard virus check provided by SAP
NetWeaver Application Server (front-
end server)
3 Trigger Resume Parsing Not relevant
4 Transfer resume as attachment Not relevant
5 Parse resume For XI-relevant security topics, see
http:service.sap.com/securityguide →
SAP Process Integration (PI) Security
Guides .
6 Transfer HRXML data HRXML coding
7 Save structured data to buffer Not relevant
8 Trigger profile upload Not relevant
9 Save structured data in profile Not relevant
10 Save attachment “Resume” Not relevant
11 Virus check WD ABAP Standard virus check provided by SAP
NetWeaver Application Server (front-
end server)
12 Save contents Not relevant
13 Save attachment “Formatted resume” Not relevant
14 Virus check WD ABAP Standard virus check provided by SAP
NetWeaver Application Server (front-
end server)
15 Save contents Not relevant
13.13.5.1.1.9 Background Check
The figure below provides an overview of the data flow for the following scenario: The recruiter forwards data
regarding a candidate’s education, work experience, or qualifications to an external provider, who then checks
that this data is correct.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 599The table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 369:
Step Name Security Measure
1 Initialize background check Not Relevant
2 Summarize profile data Not Relevant
3 Transfer profile data Not Relevant
4 Request background check For XI-relevant security topics, see: SAP
Process Integration Security Guide
5 Return order ID Not Relevant
6 Initialize request for processing status Not Relevant
7 Transfer request Not Relevant
Security Guide for SAP S/4HANA 1709
600 P U B L I C SAP S/4HANA Business ApplicationsStep Name Security Measure
8 Request processing status For XI-relevant security topics, see: SAP
Process Integration Security Guide
9 Return processing status Not Relevant
10 Initialize request for access URL Not Relevant
11 Transfer request Not Relevant
12 Request URL For XI-relevant security topics, see: SAP
Process Integration Security Guide
13 Access to URL that the third-party ven Not Relevant
dor uses to display the report for the
background check
13.13.5.1.1.10 Registration Process with E-Mail Verification
The figures below provide an overview of a candidate’s registration process with e-mail verification. This is
relevant for persons who want to register their details in the Talent Warehouse or for persons who want to submit
an application for an employment opportunity and who have to register their details first in order to do so. The
process description is divided into two parts in the figures below. The first figure shows the process up to the
point in time when the system sends a confirmation mail for the e-mail address. The second figure shows the
process from the moment that the candidate finds this e-mail in his or her e-mail inbox.
For more information about the registration process, see section Registration with E-Mail Verification in the SAP
Library for S/4HANA under Human Resources Talent Management SAP E-Recruiting (PA-ER) Candidate
Storage of Data in Talent Warehouse Registration . For more information about the application process with
registration at the same time, see section Online Application of Unregistered Candidate in the SAP Library for S/
4HANA under Human Resources Talent Management SAP E-Recruiting (PA-ER) Candidate .
Note
This process is relevant if the switch RECFA VERIF is set in the Customizing activity Set System Parameters .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 601The table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 370:
Step Description Security Action
Optional step The unregistered candidate finds a suita For the unregistered candidate, the sys
ble job posting and submits an applica tem uses the service user that is as
tion for this posting. In this case, the signed to the corresponding ICF service
candidate has to register his or her de in the Customizing activity Specify E-
tails before the application can be sub Recruiting Services (WebDynpro ABAP) .
mitted. (Continue with step 1)
1 The unregistered candidate calls the For the unregistered candidate, the sys
screen page for the registration and en tem uses the service user that is as
ters the data required for the registra signed to the corresponding ICF service
tion in the Talent Warehouse. in the Customizing activity Specify E-
Recruiting Services (WebDynpro ABAP) .
2 The unregistered candidate performs
the registration.
Security Guide for SAP S/4HANA 1709
602 P U B L I C SAP S/4HANA Business ApplicationsStep Description Security Action
3 The system checks the information for
completeness and correctness and, if
applicable, asks the unregistered candi
date to correct the information.
4 The system creates an unverified candi In the Candidate Overview infotype
date. (5102) in the Status of E-Mail Verification
field, the system enters the value 1
( Outstanding ). At the same time, the
system creates a user for the candidate.
5a The system informs the candidate that
the registration process was triggered
and that he or she will receive a confir
mation mail.
5b At the same time, the system sends a If the user does not subsequently con
confirmation mail via the mail server to firm his or her e-mail address, the user
the e-mail address stored by the candi cannot access the Talent Warehouse.
date. This contains a link that the candi
In the Customizing activity Determine
date must use to confirm his or her e-
Rules for Periodic Services , you can
mail address and so complete the regis
specify for how long the link for confirm
tration.
ing the e-mail address is to be valid.
Optional step If the candidate has registered his or her
details as part of submitting an applica
tion, the system now displays the appli
cation wizard. The candidate can com
plete the application but cannot send it
until he or she has confirmed the e-mail
address and completed the registration
process.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 603The table below lists the security aspect that has to be taken into account for the process step and the security
action that is taken.
Table 371:
Step Description Security Action
1 The unverified candidate finds the con In the Customizing activity Determine
firmation mail in his or her e-mail inbox, Rules for Periodic Services , you can
opens the mail, and clicks the link to specify the following (in addition to the
confirm the e-mail address. validity period of the link for the confir
mation):
● Period after which a reminder mail
is sent to the unverified candidate
● Maximum number of possible re
quests for a new confirmation mail
● Option whether candidates can re
quest a new confirmation mail even
though the validity period of the last
confirmation mail sent was ex
ceeded
Security Guide for SAP S/4HANA 1709
604 P U B L I C SAP S/4HANA Business ApplicationsStep Description Security Action
2 The system converts the unverified can In the Candidate Overview infotype
didate into a confirmed candidate. (5102) in the Status of E-Mail Verification
field, the system enters the value 0
( Confirmed ).
3 The candidate is informed about the For security reasons, the confirmation
successful registration. At the same does not contain the password that the
time, the candidate receives a link that user needs to log on to the Talent Ware
he or she can use to log on to the Talent house and which he or she entered on
Warehouse. the registration screen.
Optional step If the candidate registered his or her de To do this, the candidate has to log on to
tails while submitting an application and the Talent Warehouse with his or her
has already created one or more applica user alias and password.
tions, the system displays a link that the
candidate can then use to display a list
of the applications.
Optional step The system displays a list of applications The candidate can now submit applica
that have not yet been sent. The candi tions because his or her e-mail address
date submits an application. has now been confirmed.
Optional step The system set the status of the applica Recruiters can now view the application
tion and the candidacy to In Process . and the candidate profile.
13.13.5.1.1.11 Deregistration and Deletion of External
Candidates
Definition
In SAP E-Recruiting, there is a two-step process to delete a candidate. The first step is deregistering the external
candidate. The second step is deleting the candidate data from the Talent Warehouse.
This document describes how the system handles the candidate’s data in the different scenarios.
Note
If you delete the external candidates via the HRRCF_CAND archiving object and the functions of the SAP
Information Lifecycle Management (ILM) at the same time with the processes described here, data
inconsistencies may occur. For more information, see Destroying Candidate Data Using HRRCF_CAND.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 605Candidates delete their registration themselves
For information about the service, see Deleting the Registration.
If the candidate requests the deletion of his or her own registration, the system performs the following steps:
● The Registration of Candidate Deleted indicator is set in infotype 5102 (Candidate Overview).
● The candidate’s user is locked.
● The workflow ERCCandDerig is triggered. The workflow runs automatically in the background. For information
about which data of the candidate is processed by the workflow, see the documentation for the Workflow for
Deleting a Candidate’s Registration.
The remaining data for the candidate is retained in the database.
Administrator deletes the registration of external candidates
For information about the service, see Deleting Registration of External Candidates.
If the administrator deletes the registration of an external candidate, the system performs the following steps:
● The Registration of Candidate Deleted indicator is set in infotype 5102 (Candidate Overview).
● The workflow ERCCandDerig is triggered. The workflow runs automatically in the background. For information
about which data of the candidate is processed by the workflow, see the documentation for the Workflow for
Deleting a Candidate’s Registration.
The remaining data for the candidate is retained in the database.
Administrator deletes the external candidates
Even after an external candidate is deregistered, the candidate’s data still exists in the system. To delete the
candidate completely from the system, the administrator has to delete the external candidate.
For information about the service, see Deleting External Candidates.
Note
The administrator can only delete candidates for whom there are no applications or assignments with the
status In Process or To Be Hired.
When deleting data, the system also takes into account the legal time limits for retaining data (see the end of
this document).
When the candidates are deleted, the associated business partners are not deleted, but are archived. You can
delete business partners later using the transaction BUPA_ DEL.
If the prerequisites for the deletion are met, the system executes the following steps:
● Deletion of the candidate’s applications and any related objects:
○ HR object Application
Security Guide for SAP S/4HANA 1709
606 P U B L I C SAP S/4HANA Business Applications○ Audit Trails
○ Documents for the application in Knowledge Provider (KPro)
○ Activities
● Deletion of the candidate’s candidacies and any related objects:
○ HR object Candidacy
○ Documents for the candidacy in Knowledge Provider (KPro)
○ Activities
● Deletion of the job agents created by the candidate
● Deletion of the candidate and any related objects:
○ HR object Candidate
○ The candidate’s user in the backend system; in the distributed system, also the candidate’s user in the
front-end system
○ Documents for the candidate in Knowledge Provider (KPro)
○ Activities
Delete External Candidates (report)
Another option for deleting external candidates is to use the RCF _DELETE_EXT_ CAND report.
You call this report in Customizing for SAP E-Recruiting under Tools → Delete External Candidates. For more
information, see the documentation for the Customizing activity.
We recommend you use this report instead of using the Delete External Candidates service as the report enables
you to use multiple selection criteria. In this way, the user can specifically select deregistered candidates, for
example.
The report is otherwise identical to the Delete External Candidates service.
Retention periods for candidate-based data
You enter the retention periods that the report has to take into account in Customizing for SAP E-Recruiting under
Store Legal Periods. For more information, see the documentation of the Customizing activity.
13.13.5.1.1.12 Sending E-Mails Using the Workflow
SAP E-Recruiting uses workflows that send various documents by e-mail.
The table below shows the workflows and lists the e-mails that are sent using the relevant workflows.
Table 372: E-Mails Using Workflows
Workflow Template Description E-Mail Recipient E-Mail Content How E-Mail Is Sent
WS51800042 ERCAdjEntry - - -
WS51900003 ERCSendPwd Candidate Send password Method
WS51900005 ERCStatusChg Candidate Confirmation of receipt Method
of application
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 607Workflow Template Description E-Mail Recipient E-Mail Content How E-Mail Is Sent
Candidate Correspondence: Re Method
jection
Recruiter Notification that appli WF E-Mail
cation is withdrawn
WS51900006 ERCCandDerig Candidate Confirmation that can Method
didate has been dereg
istered
WS51900007 ERCApprReqWD Approver Notification to the ap WF E-Mail
prover
Requester Notification of the deci WF E-Mail
sion
WS51900008 ERCObjCreate Candidate Acknowledge Candi Method
date
Candidate Verification mail Method
WS51900009 ERCActCreate - - -
WS51900010 ERCStatChg_2 Candidate Confirmation of receipt Method
of application
Candidate Correspondence: Re Method
jection
Recruiter Notification that appli WF E-Mail
cation is withdrawn
WS51900011 ERCActCrea_2 - - -
WS51900018 ERCSendVerif Candidate Confirmation mail Method
13.13.5.1.2 User Administration and Authentication
SAP E-Recruiting uses the user management and authentication mechanisms provided with the SAP NetWeaver
platform, in particular the SAP NetWeaver Application Server for ABAP. Therefore, the security recommendations
and guidelines for user administration and authentication as described in the SAP NetWeaver Application Server
for ABAP also apply to SAP E-Recruiting.
In addition to these guidelines, we include information about user administration and authentication that
specifically applies to SAP E-Recruiting in the following topics:
● User Management
This topic lists the tools to use for user management, the types of users required, and the standard users that
are delivered with SAP E-Recruiting.
Security Guide for SAP S/4HANA 1709
608 P U B L I C SAP S/4HANA Business Applications● Integration into Single-Sign-On Environments
This topic describes how SAP E-Recruiting supports Single Sign-On mechanisms.
13.13.5.1.2.1 User Management
Definition
User management for SAPE-Recruiting uses the mechanisms provided by SAP Web Application Server ABAP
such as tools, user types, and password policies. For an overview of how these mechanisms apply for SAPE-
Recruiting, see the sections below.
User Administration Tools
The following table shows the tools to use for user management and user administration for SAPE-Recruiting .
Table 373: User Management Tools
Tool Detailed Description Prerequisites
User and Role Maintenance (transaction You can use the Role Maintenance trans
PFCG) action PFCG to generate profiles for the
SAPE-Recruiting users.
Technical Settings for User Management For more information on user profiles
in SAPE-Recruiting and the roles, see Customizing for SAP
E-Recruiting under Technical Settings
User Administration.
Workflow Settings For more information, see the Customiz You use the SAP Workflow.
ing for SAPE-Recruiting under
Technical Settings Workflow
Workflow in E-Recruiting .
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively have to change their passwords on a regular basis,
but not users who run background processing jobs.
Note
For more information, see the Customizing for SAPE-Recruiting under Technical Settings User
Administration Create Special Users .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 609The user types required for SAPE-Recruiting are:
● Reference user
You can create reference users to simplify authorization maintenance. You assign different roles to each
reference user. If you then assign a reference user to a user, the user inherits all of the reference user’s role
attributes and authorization profile.
● Service user
Some scenarios are accessible for registered users only; other scenarios are also accessible for unregistered
users (registration, job postings, direct application). You must assign a service user to these services so that
an unregistered user can use them.
● Background User for Workflow
To be able to use the workflow functions, you must create a system user (such as WF-BATCH) in the standard
system.
For more information, see the Customizing for SAP E-Recruiting under Technical Settings Workflow
Workflow in E-Recruiting .
In SAP E-Recruiting, you must assign a candidate to this user. To do this, you can use the report
RCF_CREATE_USER, irrespective of whether you run SAP E-Recruiting and the HR system on the same
instance or on different instances.
For more information, see Background User for Workflow under Talent Management SAP E-Recruiting
Authorizations in the S/4HANA Security Guide for Human Resources.
Standard Users
We do not deliver standard users within SAP E-Recruiting.
13.13.5.1.2.2 Integration into Single Sign-On Environments
The most widely-used supported mechanisms are listed below. For a complete list, see the link provided below.
● Secure Network Communications (SNC)
SNC is available for user authentication and provides for an SSO environment when using the SAP GUI for
Windows or Remote Function Calls.
● SAP logon tickets
SAP E-Recruiting supports the use of logon tickets for SSO when using a Web browser as the frontend client.
In this case, users can be issued a logon ticket after they have authenticated themselves with the initial SAP
system. The ticket can then be submitted to other systems (SAP or external systems) as an authentication
token. The user does not need to enter a user ID or password for authentication but can access the system
directly after the system has checked the logon ticket.
● Client certificates
As an alternative to user authentication using a user ID and passwords, users using a Web browser as a
frontend client can also provide X.509 client certificates to use for authentication. In this case, user
authentication is performed on the Web server using the Secure Sockets Layer Protocol (SSL Protocol) and
no passwords have to be transferred. User authorizations are valid in accordance with the authorization
concept in the SAP system.
● Security Assertion Markup Language (SAML) 2.0
Security Guide for SAP S/4HANA 1709
610 P U B L I C SAP S/4HANA Business ApplicationsSAML 2.0 provides a standards-based mechanism for SSO. The primary reason to use SAML 2.0 is to enable
SSO across domains.
SAP E-Recruiting supports the Single Sign-On (SSO) mechanisms provided by SAP NetWeaver. Therefore, the
security recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Security Guide also apply to SAP E-Recruiting.
For more information about the available authentication mechanisms, see User Authentication and Single Sign-On
in the SAP NetWeaver Library.
13.13.5.1.3 Authorizations
SAP E-Recruiting uses the authorization concept provided by SAP NetWeaver AS for ABAP. Therefore, the
recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP
also apply to SAP E-Recruiting .
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on theSAP Web AS ABAP .
Note
For more information about how to create roles, see section Role Administration under Identity Management in
the SAP Library for S/4HANA.
The following section shows the standard roles and the relevant authorization objects that SAP E-Recruiting uses.
These are:
● Background User for Workflow
● Recruiter, Administrator, and Data Entry Clerk
● Manager
● Candidate
Authorization Object S_ICF
We strongly recommend that you use the authorization object S_ICF to safeguard the Web Dynpro applications in
SAP E-Recruiting. For the relevant applications, see the ICF service tree (transaction SICF ) under /
default_host/sap/bc/webdynpro/sap . The names of the applications in SAP E-Recruiting start with ERC for the
recruiter and the administrator, and with HRRCF for the candidate.
You can safeguard each application by entering a character string for it in the SAP Authorization field under
Service Data and using this character string in the field ICF_VALUE of the authorization object S_ICF in the
corresponding user roles. For more information, see the documentation for Authorization Object S_ICF.
For information about services relevant for SAP E-Recruiting in the ICF service tree, see Internet Communication
Framework Security of SAP E-Recruiting .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 61113.13.5.1.3.1 Background User for Workflow
Standard Roles
The table below shows the standard role that SAP E-Recruiting uses for the background user. SAP E-Recruiting
requires this background user for the execution of the workflow. The background user is usually the WF-BATCH
user.
Table 374: Standard Role for the Workflow
Role Description
SAP_RCF_INT_CANDIDATE_SERVER Internal Candidate (Server) under Roles (User Profiles)
This role provides the necessary authorizations for an internal
candidate in SAP E-Recruiting that are required on the back
end system when using a separated system (front-end and
backend on different systems).
You have to create a corresponding candidate for the background user of the workflow. You use the
RCF_CREATE_USER report to do this. For more information, see the Customizing for SAP E-Recruiting under
Technical Settings → Workflow → Workflow in E-Recruiting .
For the background user to be used in SAP E-Recruiting, the background user requires the authorization to make
status changes to the SAP E-Recruiting objects (authorization object P_RCF_STAT) in addition to all of the
authorizations usually assigned to an internal candidate.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by SAP E-Recruiting .
For more information, see section Authorizations for SAP E-Recruiting under Roles (User Profiles) .
Table 375: Standard Authorization Objects
Authorization Object Field Value Description
P_RCF_APPL RCF_APPL SAP E-Recruiting applications Authorization object that
specifies within SAP E-Re
cruiting which SAP E-Recruit
ing applications a user can
call.
The authorization object is
used for the (internal and ex
ternal) candidates'' applica
tions.
Security Guide for SAP S/4HANA 1709
612 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
R_RCF_VIEW RCF_VIEW SAP E-Recruiting data over Authorization object that
views specifies within SAP E-Re
cruiting which data overviews
a user can access.
P_RCF_POOL RCF_POOL The following ways to access Authorization object that
the candidate pool directly specifies within SAP E-Re
are available: cruiting which type of direct
● Status-Independent Ac access a user can have to the
cess to Candidates (DI candidates in the Talent Pool.
RECT_ACC)
● Recognition of Multiple
Applicants
(DUPL_CHECK)
● Maintenance of Candi
date Data
(CAND_MAINT)
P_RCF_STAT OTYPE SAP E-Recruiting objects and Authorization object that
permitted object status specifies within SAP E-Re
RCF_STAT
cruiting the authorization for
status changes to SAP E-Re
cruiting objects (for example,
candidate, application, candi
dacy).
P_RCF_ACT ACTVT ● Activities, processes, and Authorization object that
the following accesses to specifies within SAP E-Re
the activities: cruiting which type of access
● Add or Create a user can have to activities.
● Change An activity in SAP E-Recruit
● Delete ing is therefore identified
through the assigned process
and through the activity type.
13.13.5.1.3.2 Recruiter, Administrator, and Data Entry Clerk
Standard Roles
The following table shows the standard roles that are used by SAP E-Recruiting for recruiters, administrators, and
data entry clerks .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 613Table 376: Standard Roles for Recruiters, Administrators, and Data Entry Clerks
Role Description
SAP _ RCF _REC_ADMIN_ERC_CI_2 Recruiting Administrator (Obsolete)
Administrator for SAP E-Recruiting
Note
This role is obsolete and has been replaced with the role
SAP _ERC_REC_ADMIN_CI_4.
SAP _ RCF _REC_ADMIN_ERC_CI_4 Recruiting Administrator (NWBC) (Obsolete)
You need this role if you want to use the Recruiting Adminis
trator based on SAP Business Client for HTML. The role is a
composite role consisting of the single roles SAP _ RCF
_REC_ADMIN_SR_ERC_CI_4 and SAP _ RCF _REC_AD
MIN_ERC_CI_2.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_REC_ADMIN_CI_4.
SAP _ RCF _REC_ADMIN_SR_ERC_CI_4 Recruiting Administrator (NWBC) (Obsolete)
This role contains the recruiting administrator’s menu for dis
play based on SAP Business Client for HTML.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_REC_ADMIN_CI_4.
SAP _ERC_REC_ADMIN_CI_4 Recruiting Administrator
SAP _ RCF _ DATA _TYPIST_ERC_CI_2 Data Entry Clerk (Obsolete)
The role contains the authorization for minimum data entry
for incoming paper applications.
Note
This role is obsolete and has been replaced with the role
SAP _ RCF _ DATA _TYPIST_ERC_CI_4.
SAP _ RCF _ DATA _TYPIST_ERC_CI_4 Data Entry Clerk
Security Guide for SAP S/4HANA 1709
614 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP _ RCF _RECRUITER_ERC_CI_2 Recruiter (Obsolete)
The role has access to the following data:
● Candidate data: The data is displayed for all candidates
who stored their data in the Talent Pool.
● All publications
● All requisition data
● All application data
● All data for the selection processes
The role also contains the authorization for minimum data en
try for incoming paper applications.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_RECRUITER_CI_4.
SAP _ RCF _RECRUITER_ERC_CI_4 Recruiter (NWBC) (Obsolete)
You need this role if you want to use the Recruiter based on
SAP Business Client for HTML. The role is a composite role
consisting of the single roles SAP _ RCF _RE
CRUITER_SR_ERC_CI_4 and SAP _ RCF _RE
CRUITER_ERC_CI_2.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_RECRUITER_CI_4.
SAP _ RCF _RECRUITER_SR_ERC_CI_4 Recruiter (NWBC) (Obsolete)
This role contains the recruiter’s menu for display based on
SAP Business Client for HTML.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_RECRUITER_CI_4.
SAP _ERC_RECRUITER_CI_4 Recruiter
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 615Role Description
SAP _ RCF _ RES _RECRUITER_ERC_CI_2 Restricted Recruiter (Obsolete)
This role contains the same authorizations as the Recruiter
role. However, restricted recruiters cannot change the status
of requisitions and publications (see authorization object P_
RCF _ STAT ).
Note
This role is available only if you activate the business func
tion HCM _ERC_CI_3.
This role is obsolete and has been replaced with the role
SAP _ERC_ RES _RECRUITER_CI_4.
SAP _ERC_ RES _RECRUITER_CI_4 Restricted Recruiter
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by SAP E-Recruiting .
For more information, see the documentation for SAP E-Recruiting under Authorizations.
Standard Authorization Objects
Table 377:
Authorization Object Field Value Description
P_ RCF _WDUI RCF _APPL SAP E-Recruiting applications Authorization object that
specifies within SAP E-Re
cruiting which SAP E-Recruit
ing application a user can call.
The authorization object is
used for the recruiter''s, ad
ministrator''s, and data entry
clerk''s applications.
R_ RCF _VIEW RCF _VIEW Data Overview Authorization object that
specifies within SAP E-Re
cruiting which data overviews
a user can access.
Security Guide for SAP S/4HANA 1709
616 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
P_ RCF _ POOL RCF _ POOL The following ways to access Authorization object that
the candidate pool directly specifies within SAP E-Re
are available: cruiting which type of direct
● Status-Independent Ac access a user can have to the
cess to Candidates (DI candidates in the Talent Pool.
RECT_ACC)
● Recognition of Multiple
Applicants
(DUPL_CHECK)
● Maintenance of Candi
date Data ( CAND
_MAINT)
P_ RCF _ STAT OTYPE SAP E-Recruiting objects and Authorization object that
permitted object status specifies within SAP E-Re
RCF _ STAT
cruiting the authorization for
making status changes to
SAP E-Recruiting objects (for
example, candidate, applica
tion, candidacy).
P_ RCF _ACT ACTVT ● Add or Create Authorization object that
● Change specifies within SAP E-Re
● Delete cruiting which type of access
a user can have to activities.
An activity in SAP E-Recruit
ing is therefore identified
through the assigned process
and through the activity type.
CA_ POWL POWL _APPID, POWL _ CAT , ● POWL _APPID: ERC- Authorization object that
WORKCENTER specifies the authorizations
POWL _LSEL,
for the Personal Object Work
POWL _QUERY, list ( POWL ) iViews.
POWL _RA_AL,
POWL _TABLE
13.13.5.1.3.3 Manager
Using the Manager Involvement in E-Recruiting business function (Manager Self-Service) affects the two software
components SAP Enterprise Extension HR (EA-HR) and SAP E-Recruiting (ERECRUIT). You have to create an RFC
connection from the HR system (EA-HR) to the E-Recruiting system (ERECRUIT). You store an anonymous
service user (that was defined in the E-Recruiting system) for this RFC connection. The SAP
_RFC_MANAGER_SERVICE role is assigned to the service user.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 617Standard Roles
The following table shows the standard roles that are used by SAP E-Recruiting for managers .
Table 378: Standard Roles for Manager Scenario
Role Description
SAP _ RCF _MANAGER Manager
This role is required so that managers can access SAP E-Re
cruiting from the Portal ( Manager Self Service ).
The manager wants to fill the vacant jobs in his or her area. To
do this, the manager creates requisitions with the status In
Process that are then processed further by recruiters.
The role has access to the following data:
Candidate data: The manager can see only the candidate data
that is assigned to requisitions for which the manager is re
sponsible.
Requisition data and data for selection processes: The man
ager can only see data for which he or she is responsible.
The role also contains the authorization to respond to ques
tionnaires about candidates that are assigned to the relevant
requisitions.
SAP _RFC_MANAGER_SERVICE Service user
This role is required to request a requisition from the HR sys
tem. The service user to which this role is assigned must exist
in the E-Recruiting system.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by SAP E-Recruiting .
For more information, see the documentation for SAP E-Recruiting under Authorizations (Recruitment) .
Table 379: Standard Authorization Objects
Authorization Object Field Value Description
P_ RCF _APPL RCF _APPL SAP E-Recruiting applications Authorization object that
specifies within SAP E-Re
cruiting which SAP E-Recruit
ing applications a user can
call.
Security Guide for SAP S/4HANA 1709
618 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
R_ RCF _VIEW RCF _VIEW SAP E-Recruiting data over Authorization object that
views specifies within SAP E-Re
cruiting which data overviews
a user can access.
P_ RCF _ POOL RCF _ POOL The following ways to access Authorization object that
the candidate pool directly specifies within SAP E-Re
are available: cruiting which type of direct
access a user can have to the
Status-Independent Access
candidates in the Talent Pool.
to Candidates (DIRECT_ACC)
Recognition of Multiple Appli
cants (DUPL_CHECK)
Maintenance of Candidate
Data ( CAND _MAINT)
P_ RCF _ STAT OTYPE SAP E-Recruiting objects and Authorization object that
permitted object status specifies within SAP E-Re
RCF _ STAT
cruiting the authorization for
status changes to SAP E-Re
cruiting objects (for example,
candidate, application, candi
dacy).
P_ RCF _ACT ACTVT Add or Create Authorization object that
specifies within SAP E-Re
Change
cruiting which type of access
Delete a user can have to activities.
An activity in SAP E-Recruit
ing is therefore identified
through the assigned process
and through the activity type.
13.13.5.1.3.4 Candidate
Standard Roles
The table below shows the standard roles that are used by SAP E-Recruiting for candidates .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 619Table 380: Standard Roles for Candidate Scenario
Role Description
SAP _ RCF _UNREG_CANDIDATE_CLIENT Unregistered Candidate (Client) (Obsolete)
This role contains the necessary authorizations for unregis
tered candidates/service users that are required on the front-
end system when using a separated system (front-end and
backend on different systems).
If you execute unregistered scenarios directly on the backend
system, you must also assign this role to the service user in
the backend system.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_ UNR _ CAND _CLIENT_CI_4.
SAP _ERC_ UNR _ CAND _CLIENT_CI_4 Unregistered Candidate (Client)
SAP _ RCF _UNREG_CANDIDATE_SERVER Unregistered Candidate (Server)
This role provides the necessary authorizations for an un
registered candidate/service user in SAP E-Recruiting that
are required on the backend system when using a separated
system (front-end and backend on different systems).
SAP _ RCF _UNREGISTERED_CANDIDATE (Unregistered) Candidate – Service User (Obsolete)
This role provides the necessary authorizations for an un
registered candidate/service user in SAP E-Recruiting that
are required when using the front-end and backend on one
system.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_ UNR _CANDIDATE_CI_4.
SAP _ERC_ UNR _CANDIDATE_CI_4 Unregistered Candidate
Security Guide for SAP S/4HANA 1709
620 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP _ RCF _EXT_CANDIDATE_CLIENT External Candidate (Client) (Obsolete)
This role contains the necessary authorizations for external
candidates that are required on the front-end system when
using a separated system (front-end and backend on different
systems).
Note
This role is obsolete and has been replaced with the role
SAP _ERC_EXT_ CAND _CLIENT_CI_4.
SAP _ERC_EXT_ CAND _CLIENT_CI_4. External Candidate (Client)
SAP _ RCF _EXT_CANDIDATE_SERVER External Candidate (Server)
This role provides the necessary authorizations for an external
candidate in SAP E-Recruiting that are required on the back
end system when using a separated system (front-end and
backend on different systems).
SAP _ RCF _EXTERNAL_CANDIDATE External Candidate (Obsolete)
This role may only display its own data. The role can only see
job postings that you published via publications using the ex
ternal posting channels.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_EXT_CANDIDATE_CI_4.
SAP _ERC_EXT_CANDIDATE_CI_4 External Candidate
SAP _ RCF _ INT _CANDIDATE_CLIENT Internal Candidate (Client) (Obsolete)
This role contains the necessary authorizations for internal
candidates that are required on the front-end system when
using a separated system (front-end and backend on different
systems).
If you allow internal candidates direct access to the backend
system, you must also assign this role to the reference user
for internal candidates in the backend system.
Note
This role is obsolete and has been replaced with the role
SAP _ERC_ INT _ CAND _CLIENT_CI_4.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 621Role Description
SAP _ERC_ INT _ CAND _CLIENT_CI_4 Internal Candidate (Client)
SAP _ RCF _ INT _CANDIDATE_SERVER Internal Candidate (Server)
This role provides the necessary authorizations for an internal
candidate in SAP E-Recruiting that are required on the back
end system when using a separated system (front-end and
backend on different systems).
SAP _ RCF _INTERNAL_CANDIDATE Internal Candidate (Obsolete)
This role may only display its own data. The role can only see
job postings that you published via publications using the in
ternal posting channels.
The role does not have access to the following data:
● Requisition data
● Posting data
● Application data
● Data for the selection process
Note
This role is obsolete and has been replaced with the
role SAP _ERC_ INT _ CAND _CLIENT_CI_4.
SAP _ERC_ INT _ CAND _CLIENT_CI_4 Internal Candidate
SAP _ RCF _ ESS _SR_ERC_CI_4 E-Recruiting Services for ESS (WDA) (Obsolete)
This role contains the authorizations in SAP E-Recruiting for
employees that use E-Recruiting services in ESS WDA (Em
ployee Self-Service Web Dynpro ABAP).
Note
This role is obsolete and has been replaced with the role
SAP _ERC_ INT _ CAND _CLIENT_CI_4.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by SAP E-Recruiting .
For more information, see the documentation for SAP E-Recruiting under Authorizations (Recruitment) .
Security Guide for SAP S/4HANA 1709
622 P U B L I C SAP S/4HANA Business ApplicationsTable 381: Standard Authorization Objects
Authorization Object Field Value Description
P_ RCF _APPL RCF _APPL SAP E-Recruiting applications Authorization object that
specifies within SAP E-Re
cruiting which SAP E-Recruit
ing applications a user can
call.
The authorization object is
used for the (internal and ex
ternal) candidates'' applica
tions.
R_ RCF _VIEW RCF _VIEW SAP E-Recruiting data over Authorization object that
views specifies within SAP E-Re
cruiting which data overviews
a user can access.
P_ RCF _ STAT OTYPE SAP E-Recruiting objects and Authorization object that
permitted object status specifies within SAP E-Re
RCF _ STAT
cruiting the authorization for
making status changes to
SAP E-Recruiting objects (for
example, candidate, applica
tion, candidacy).
P_ RCF _ACT ACTVT ● Add or Create Authorization object that
● Change specifies within SAP E-Re
● Delete cruiting which type of access
a user can have to activities.
An activity in SAP E-Recruit
ing is therefore identified
through the assigned process
and through the activity type.
Table 382: Additional Standard Authorization Objects when Using Candidate Scenario with Front-end and Backend on Separate
Systems
Authorization Object Field Value Description
S_ RCF ACTTV Authorization object for RFC
access
RFC_NAME
(For more information, see
RFC_TYPE
the documentation for
Authorization Object S_RFC .)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 623Authorization Object Field Value Description
S_RFCALC ACTTV Authorization check for RFC
users (for example, Trusted
RFC_CLIENT
System )
RFC_EQUSER
(For more information, see
RFC_ INFO the documentation for
RCF _SYSID Authorization Object
S_RFCACL .)
RCF _TCODE
RCF _USER
S_ICF ICF_FIELD Internet Communication Authorization checks for us
Framework Service ing services in Internet Com
munication Framework
(SICF), for calling remote
function modules using an
RFC destination (SM59), and
for configuring proxy settings
(SICF).
(For more information, see
the documentation for
Authorization Object S_ICF .)
You can use the authorization
object S_ICF to safeguard the
use of RFC destinations and
access to individual SICF
services.
13.13.5.1.4 Session Security Protection
Definition
To prevent access in JavaScript or plug-ins to the SAP logon ticket and security session cookies, we recommend
activating secure session management.
We also highly recommend using SSL to protect the network communications where these security-relevant
cookies are transferred.
Security Guide for SAP S/4HANA 1709
624 P U B L I C SAP S/4HANA Business ApplicationsSession Security Protection on the AS ABAP
To prevent access in JavaScript or plug-ins to the SAP logon ticket and security session cookies
(SAP_SESSIONID__), activate Secure Session Management . With an existing security session,
users can then start applications that require a user logon without logging on again. When a security session is
ended, the system also ends all applications that are linked to this security session.
Use the transaction SICF_SESSIONS to specify the following parameter values shown in the table below in your
AB ABAP system:
Table 383: Session Security Protection Profile Parameters
Profile Parameter Recommended Value Comment
icf/set_HTTPonly_flag_on_cookies 0 Client-dependent
login/ticket_only_by_https 1 Not client-dependent
For more information and detailed instructions, see section Activating HTTP Security Session Management on AS
ABAP in the AS ABAP security documentation.
13.13.5.1.5 Network and Communication Security
Your network infrastructure is extremely important in protecting your system. Your network needs to support the
communication necessary for your business needs without allowing unauthorized access. A well-defined network
topology can eliminate many security threats based on software flaws (at both the operating system and
application level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, then there is no way for intruders to compromise the machines
and gain access to the backend system’s database or files. Additionally, if users are not able to connect to the
server LAN (local area network), they cannot exploit well-known bugs and security holes in network services on
the server machines.
The network topology for SAP E-Recruiting is based on the topology used by the SAP NetWeaver platform.
Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security Guide also
apply to SAP E-Recruiting. Details that specifically apply to SAP E-Recruiting are described in the following topics:
● Communication Channel Security
This topic describes the communication paths and protocols used by SAP E-Recruiting.
● Network Security
This topic describes the recommended network topology for SAP E-Recruiting. It shows the appropriate
network segments for the various client and server components and where to use firewalls for access
protection. It also includes a list of the ports needed to operate SAP E-Recruiting.
● Communication Destinations
This topic describes the information needed for the various communication paths, for example, which users
are used for which communications.
For more information, see the following sections in the SAP NetWeaver Security Guide:
● Network and Communication Security
● Security Aspects for Connectivity and Interoperability
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 62513.13.5.1.5.1 Communication Channel Security
Use
The table below shows the communication channels used by SAP E-Recruiting, the protocol used for the
connection, and the type of data transferred.
Table 384: Communication Paths
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Front-end client that uses DIAG All Customizing data Passwords
SAP GUI for Windows for the
application server
Front-end client that uses a HTTP, HTTPS All application data Passwords, personal data
Web browser for the applica
tion server
We generally recommend you
use HTTPS.
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
For more information, see Transport Layer Security in the SAP NetWeaver Security Guide.
Print
SAP E-Recruiting has numerous options for printing contents. For information about security when printing, see
SNC User’s Guide under http://service.sap.com/security → Security in Detail → Infrastructure Security .
13.13.5.1.5.2 Network Security
Definition
You can operate SAP E-Recruiting in different ways. You can run the front end and backend for candidates’ users
on different systems. You can also operate SAP E-Recruiting and the HR system integrated on one system or on
different instances.
We recommend that you run the front end and backend of candidates’ users on different systems and that you do
not integrate SAP E-Recruiting and the HR system on one system.
Security Guide for SAP S/4HANA 1709
626 P U B L I C SAP S/4HANA Business ApplicationsFirewall Settings
For more information, see Using Firewall Systems for Access Control in the SAP NetWeaver Security Guide.
Ports
SAP E-Recruiting runs on SAP NetWeaver and uses the ports from AS ABAP. For more information, see the topics
for AS ABAP Ports in the corresponding SAP NetWeaver Security Guides.
For other components, for example, SAPinst, SAProuter, or SAP Web Dispatcher, see also the document TCP/IP
Ports Used by SAP Applications, which is located on the SAP Service Marketplace at http://service.sap.com/
under Products Database & technology Security Infrastructure Security .
13.13.5.1.5.3 Communication Destinations
The following sections provide an overview of the communication destinations that are relevant for the user in the
SAP E-Recruiting roles.
13.13.5.1.5.3.1 Communication Destinations (Recruiter,
Administrator, and Data Entry Clerk)
The following table provides an overview of the communication destinations that SAPE-Recruiting uses.
You use the following communication destinations depending on which application you use to manage your HR
master data:
● If you use the SAP GUI transactions to maintain HR master data (for example, transactions PA*),
communication with SAP E-Recruiting runs via RFC connections.
● If you use the HR Administrative Services application, communication with SAP E-Recruiting runs via SAP PI
(Process Integration).
Table 385:
Destination Delivered Type User, Authorizations Description
SAP E-Recruiting to No RFC See Customizing Customizing: SAP E-
SAP Human Resources
Recruiting Applicant
Management
Tracking Activities
Set Up Data Transfer
for New Employees
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 627Destination Delivered Type User, Authorizations Description
From SAP Human Re No RFC See Customizing SAP E-Recruiting
sources Management
Technical Settings
to SAP E-Recruiting
SAP ERP Central
Component (ECC)
Integration Software
Runs on Different
Instances Set Up
Data Transfer from SAP
ECC
From SAP E-Recruiting No RFC See Customizing SAP E-Recruiting
to TREX
Technical Settings
User Administration
Create Special
Users
SAP E-Recruiting
Technical Settings
Search Engine Set
Up Search Engine for E-
Recruiting
From SAP E-Recruiting No XI messages Transfer external can
to HR Administrative didate''s data when hir
Services ing
From HR Administra No XI messages Return personnel num
tive Services to SAP E- ber of former external
Recruiting candidate to SAP E-Re
cruiting
Note
Changes to the HR master data are transferred to SAP E-Recruiting using the master data distribution in the
ALE scenario.
13.13.5.1.5.3.2 Communication Destinations for Manager
Involvement
The following table provides an overview of the communication destinations that SAP E-Recruiting uses for
Manager Involvement.
Security Guide for SAP S/4HANA 1709
628 P U B L I C SAP S/4HANA Business ApplicationsTable 386: Communication Destinations for Manager Involvement (Manager Self-Service)
Destination Delivered Type User, Authorizations Description
From HR system (Man No RFC See Customizing SAP Customizing
ager Self-Service) to Implementation Guide
SAP E-Recruiting → Integration with
Other SAP Components
→ Business Packages /
Functional Packages →
Manager Self Service →
Recruitment → Create
RFC Connection to E-
Recruiting System.
In the HR system, the methods of the CL_IM_HRRCF_REQUI_REQUEST class use the RFC connection to call
function modules in the E-Recruiting system.
The IF_HRASR00 GEN _SERVICE_ADVANCED~FLUSH method transfers information from the requisition request
form to the corresponding infotypes of SAP E-Recruiting.
The methods call the following function modules in the E-Recruiting system:
● HRRCF_MDL_ UIS _ATT_TYPE_ GET
● ERC_SE_REQUI_CREATE_RC
The IF_HRASR00 GEN _SERVICE~ GET _HELP_VALUES method fills the value helps for input fields in the
requisition request form with values from SAP E-Recruiting.
The method calls the following function modules in the E-Recruiting system:
● HRRCF_MDL_ UIS _VH_COMMON
● HRRCF_ GET _MANAGERS_FOR_SUBST
● HRRCF_MDL_VH_EMPLOYMENT_FRACT
● HRRCF_MDL_VH_SALARY_CURRENCY
● HRRCF_MDL_VH_SALARY_RANGE
● HRRCF_MDL_VH_CONTRACT_TYPE
● HRRCF_MDL_ UIS _SUPPORT_GRPS_ GET
The IF_HRASR00 GEN _SERVICE~DO_OPERATIONS method determines the manager''s substitutes in SAP E-
Recruiting. In addition, you can use the method to determine a user in SAP E-Recruiting for a personnel number.
The method calls the following function modules in the E-Recruiting system:
● HRRCF_ GET _MANAGERS_FOR_SUBST
● HRRCF_MDL_ UIS _USER_ GET
● HRRCF_MDL_ UIS _ASSIGNED_ GRP _GET
13.13.5.1.5.3.3 Communication Destinations (Candidates)
The following table provides an overview of the communication destinations that SAP E-Recruiting uses for the
candidate scenario with the front-end and backend on separate systems.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 629Table 387:
Destinations Delivered Type User, Authorizations Description
SAP E-Recruiting No RFC See Customizing SAP E-Recruiting
(front-end) to SAP E-
Technical Settings
Recruiting (backend)
User Interfaces
Candidate Frontend
Candidate Enter RFC
Destination of Receiving
Backend System
You enter the RFC des
tination as a value of
the RECFA UI2BL pa
rameter.
SAP E-Recruiting No RFC See Customizing SAP E-Recruiting
(backend) to SAP E-Re
Technical Settings
cruiting (front-end)
User Interfaces
Candidate Backend
Candidate Specify
System Parameters for
Web Dynpro
You enter the RFC des
tination as a value of
the RECFA BL2UI pa
rameter.
Note that the communication destination "SAP E-Recruiting (front-end) to SAP E-Recruiting (backend)" was
defined as a trusted system connection. In this connection, no users can be stored in the credentials. For more
information, see consulting note 1017866.
13.13.5.1.6 Internet Communication Framework Security
You should only activate those services that are needed for the applications running in your system. For SAP E-
Recruiting, the following services are needed for the relevant roles:
● Administrator and Recruiter
○ All services with the prefix ERC in the path /default_host/sap/bc/webdynpro/sap/
You activate the services in Customizing for SAP E-Recruiting under Technical Settings → User Interfaces
→ Administrator and Recruiter → General Settings → Determine E-Recruiting Services.
● Candidates
○ All services with the prefix hrrcf in the path /default_host/sap/bc/webdynpro/sap/
○ All services in the path /default_host/sap/bc/erecruiting/
Security Guide for SAP S/4HANA 1709
630 P U B L I C SAP S/4HANA Business Applications○ All services with the prefix hrrcf_wd in the path /default_host/sap/bc/bsp/sap/
You activate the services in Customizing for SAP E-Recruiting under Technical Settings → User Interfaces
→ Candidate → Front-End Candidate → Specify E-Recruiting Services (Web Dynpro ABAP).
● Manager (within the framework of Manager Involvement)
○ default_host/sap/bc/erecruiting/dataoverview
○ default_host/sap/bc/webdynpro/sap/hrrcf_a_dataoverview
○ default_host/sap/bc/webdynpro/sap/hrrcf_a_requi_monitor
○ default_host/sap/bc/webdynpro/sap/hrrcf_a_req_assess
○ default_host/sap/bc/webdynpro/sap/hrrcf_a_tp_assess
○ default_host/sap/bc/webdynpro/sap/hrrcf_a_qa_mss
○ default_host/sap/bc/webdynpro/sap/hrrcf_a_substitution_manager
○ default_host/sap/bc/webdynpro/sap/hrrcf_a_substitution_admin
You activate the services in Customizing for SAP E-Recruiting under Technical Settings → User Interfaces
→ Manager Involvement → Specify E-Recruiting Services for MSS.
If your firewall(s) use(s) URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver documentation in SAP
Library.
For more information about ICF security, see the RFC/ICF Security Guide
13.13.5.1.7 Data Storage Security
Data Storage
The SAP E-Recruiting data is saved as follows:
● If you use SAP E-Recruiting integrated with other SAP applications, the data is saved in the SAP Web AS or
SAP ECC databases.
● If you use SAP E-Recruiting as a standalone application, the data is saved directly in the SAP E-Recruiting
databases. You do not require any other databases in addition to this standard.
SAP E-Recruiting stores the data in the following locations:
Table 388:
Data Location
Master Data PD infotype tables
Attachments and user-defined texts Knowledge Provider (KPro)
Search query logs Cluster table PCL _ RCF (SI)
Audit Trails Cluster table PCL _ RCF (SI)
Infotype Log Cluster table PCI_ RCF (IL)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 631Cookies
The application uses a Web browser. The SAP Web AS must issue cookies as well as accepting them.
13.13.5.1.8 Enterprise Services Security
The following chapters in the SAP NetWeaver Security Guide and documentation are relevant for all enterprise
services delivered with SAP E-Recruiting:
● Security Guide Web Services
● Recommended WS Security Scenarios
● SAP Process Integration Security Guide
13.13.5.1.9 Other Security-Relevant Information
Virus Scan when Uploading Attachments
SAP E-Recruiting allows the user to upload files as attachments at various times in the program. Since
attachments can potentially contain viruses, these viruses could enter your system when you upload the
attachments. To reduce this risk as much as possible, we recommend you use an external virus scanner and
restrict the MIME types of the attachments.
In the Virus Scan when Uploading Documents Customizing activity, you activate the virus scan profile /
PAOC_RCF_BL/HTTP_UPLOAD that you use in SAP E-Recruiting to perform a virus check when uploading
attachments. In this way, you can include external virus scanners to increase the security of your system.
You can use the Business Add-In (BAdI) HRRCF00_DOC_UPLOAD to check files that are uploaded as
attachments to the E-Recruiting system. When doing so, you can use the CHECK_ATTACH_FILE_TYPE method to
specify which MIME types are permitted for the attachments. You call the BAdI using the BAdI: Upload Documents
Customizing activity.
Accessing Attachments using Microsoft Internet Explorer
You use Microsoft Internet Explorer and want to view attachments in the browser. Microsoft Internet Explorer
checks the contents of the attachment to determine the file type and to display the attachment correctly ( MIME
Type Sniffing ). Malicious files of an undesirable file type could therefore be displayed in the browser or cause
damage in some other way. To avoid this potential threat to security, deselect MIME Type Sniffing in the security
settings of Microsoft Internet Explorer .
Security Guide for SAP S/4HANA 1709
632 P U B L I C SAP S/4HANA Business Applications13.13.5.1.10 Security-Relevant Logging and Tracing
Application Log
SAP E-Recruiting uses the logging and tracing mechanisms from SAP NetWeaver. SAP E-Recruiting then writes
exceptions in the Application Log. These exceptions can occur due to failed authorization checks, for example,
and are therefore relevant for security.
For information about logging and tracing mechanisms of SAP NetWeaver Application Server (ABAP), see
Auditing and Logging under Application Logging, there is more information about the application log.
You can access the part of the application log specific to SAP E-Recruiting by using the transaction SLG1 (Analyze
Application Log) and entering the parameter Object = HRRCF .
Audit Trail
SAP E-Recruiting creates an audit trail with the candidate profile and search queries. For more information, see
Access Audit Trails.
13.13.5.1.11 Services for Security Lifecycle Management
The following services are available from SAP Active Global Support to assist you in maintaining security in your
SAP systems on an ongoing basis.
Security Chapter in the EarlyWatch Alert (EWA) Report
This service regularly monitors the Security chapter in the EarlyWatch Alert report of your system. It tells you:
● Whether SAP Security Notes have been identified as missing on your system.
In this case, analyze and implement the identified Notes, if possible. If you cannot implement the Notes, the
report should be able to help you decide on how to handle the individual cases.
● Whether an accumulation of critical basis authorizations has been identified.
In this case, verify whether the accumulation of critical basis authorizations is okay for your system. If not,
correct the situation. If you consider the situation okay, you should still check for any significant changes
compared to former EWA reports.
● Whether standard users with default passwords have been identified on your system.
In this case, change the corresponding passwords to non-default values.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 633Security Optimization Service (SOS)
The Security Optimization Service can be used for a more thorough security analysis of your system, including:
● Critical authorizations in detail
● Security-relevant configuration parameters
● Critical users
● Missing security patches
This service is available as a self-service within the SAP Solution Manager or as a remote or on-site service. We
recommend you use it regularly (for example, once a year) and in particular after significant system changes or in
preparation for a system audit.
Security Configuration Validation
The Security Configuration Validation can be used to continuously monitor a system landscape for compliance to
predefined settings, for example, from your company-specific SAP Security Policy. This primarily covers
configuration parameters, but it also covers critical security properties like the existence of a non-trivial Gateway
configuration or making sure standard users do not have default passwords.
Security in the RunSAP Methodology / Secure Operations Standard
With the E2E Solution Operations Standard Security service, a best practice recommendation is available on how
to operate SAP systems and landscapes in a secure manner. It guides you through the most important security
operation areas and links to detailed security information from SAP''s knowledge base wherever appropriate.
Additional Information
For more information about these services, see:
● SAP EarlyWatch Alert: http://service.sap.com/ewa
● SAP Security Optimization Service / Security Notes Report: http://service.sap.com/sos
● Comprehensive list of SAP Security Notes: http://service.sap.com/securitynotes
● Configuration Validation: http://service.sap.com/changecontrol
● RunSAP Roadmap, including the Security and the Secure Operations Standard: http://service.sap.com/
runsap (See the RunSAP chapters 2.6.3, 3.6.3, and 5.6.3.)
13.13.5.2 Performance Management
About This Chapter
Security Guide for SAP S/4HANA 1709
634 P U B L I C SAP S/4HANA Business ApplicationsThis chapter of the Security Guide provides an overview of the security-relevant information for the Performance
Management (PA-PD-PM) application component.
Note
We use the name of the Performance Management to mean the same as the name Objective Setting and
Appraisals. Both names correspond to the technical application component ID PA-PD-PM.
Overview of the Main Sections of This Chapter
The following sections contain the security-relevant information that is specific to “Performance Management”:
● Important SAP Notes
This section provides information on why security is necessary and how the document is used, as well as
references to other Security Guides on which this Security Guide is based.
● Security Aspects for Data, Data Flow, and Processes
This section provides an overview of the security aspects of the most frequently used processes in
Performance Management.
● Authorizations
This section provides an overview of the authorization concept used for Performance Management.
● Network and Communication Security
This section provides an overview of the following aspects:
○ Communication Channel Security
○ Network Security
● Internet Communication Framework Security
This section provides an overview of the services for the Internet Communication Framework (ICF) used by
Performance Management.
● Data Storage Security
This section provides an overview of all critical data used by the scenario, component, and application as well
as the security mechanisms used.
● Other Security-Relevant Information
This section contains information on uploading and displaying attachments.
● Security-Relevant Logging and Tracing
This section provides an overview of the trace and log files that contain security-relevant information and that
enable you to reproduce activities, for example, if there is a security violation.
13.13.5.2.1 Technical System Landscape
Overview of the technical system landscape for Performance Management:
● Front-end system: Web Dynpro for ABAP in applications in Manager Self-Service and Employee Self-Service
● Back-end system: Customizing for the Objective Setting and Appraisals application component (for example,
Customizing for applications using Web Dynpro technology for ABAP).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 635● Back-end system: Transactions for administrators and HR specialists
● Download of Documents from the Back-End System in Knowledge Provider (KPRo)
● Workflow
Example: Sending notifications to mangers or employees
● SAP Interactive Forms by Adobe
For offline processing of the appraisal document (downloading and uploading of appraisal documents).
For more information, see the guide for SAP Interactive Forms by Adobe under SAP Interactive Forms by
Adobe Security Guide.
● Printing of Appraisal Documents
○ SAP Smart Forms
○ PDF-based print form
For more information about the technical system landscape, see the sources listed in the table below.
Table 389:
Topic Guide/Tool Quick link to SAP Service Marketplace
or SDN
Technical description of SAP ERP and Master Guide http://service.sap.com/instguides
basic components such as SAP
NetWeaver
High availability High Availability for SAP Solutions http://sdn.sap.com/irj/sdn/ha
Design of the technical landscape See available documents http://sdn.sap.com/irj/sdn/landscape
design
Security See available documents http://sdn.sap.com/irj/sdn/security
13.13.5.2.2 Security Aspects for Data, Data Flow, and
Processes
In Performance Management, data for the appraisal process are processed as follows:
● For Managers in the Manager Self-Service applications.
For more information about the Manager role, see the S/4HANA Security Guide and choose: Human
Resources Self-Services Manager Self-Service .
● For Employees in the Employee Self-Service applications.
For more information about the Employee role, see the S/4HANA Security Guide and choose Human
Resources Self-Services Employee Self-Service .
Example
Managers as well as employees can work on appraisal documents in the applications (Web Dynpro for ABAP).
The system saves the relevant data to the database. The system saves attachments to files (such as appraisals
by an additional appraiser) in the Knowledge Provider (KPro).
Security Guide for SAP S/4HANA 1709
636 P U B L I C SAP S/4HANA Business Applications13.13.5.2.3 Authorizations
Performance Management uses the authorization concept provided by SAP NetWeaver Application Server for
ABAP (AS ABAP). Therefore, the security recommendations and guidelines for authorizations detailed in the SAP
NetWeaver Security Guide ABAP also apply to Performance Management.
The SAP NetWeaver authorization concept is based on the assignment of authorization to users based on role.
For role maintenance, use the profile generator (transaction: Role Maintenance (PFCG)) on the SAP NetWeaver AS
for ABAP.
Note
For more information about creating roles, see Role Maintenance under Identity Management.
Authorizations for personnel appraisal implemented in Human Resources have a special significance. The
Performance Management application component uses objects from the following components, among others:
● Manager Self-Service
For more information, see Authorizations in Manager Self-Service.
● Employee Self-Service
For more information, see Authorizations in Employee Self-Service.
● Organizational Management
● Personnel Development
● Training and Event Management
● SAP Learning Solution
For more information, see Authorizations in SAP Learning Solution.
The Performance Management application component is therefore subject to the general authorization checks in
the corresponding application component. Furthermore, the object type Person (P) in Performance Management
is of central importance since this object type can be used for appraisers and appraisees (particularly for
personnel appraisals). This means that standard checks for people in the SAP system are also valid for
Performance Management. Furthermore, Performance Management has additional authorization aspects for
controlling authorizations in this application that are realized using specific authorization object and authorization
controlling in the Customizing settings for the appraisal template.
For more information about the authorization checks, see General Authorization Check and Structural
Authorization Check (see SAP Library for S/4HANA and choose Human Resources HR Tools
Authorizations for Human Resources ).
13.13.5.2.3.1 SAP Standard Roles
The following SAP standard roles are used in Performance Management:
PFCG roles for the flexible appraisal process
● SAP_HR_HAP_PMG_ADMIN_SR - Administrator
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 637The authorizations for this role include the following:
○ Applications based on Web Dynpro technology for ABAP, such as Configure User Interfaces for Template
(HAP_CONFIGURATION)
○ Transactions (for example, administrator functions (PHAP_ADMIN_PA), appraisal catalog
(PHAP_CATALOG_PA), Change Appraisal (PHAP_CHANGE_PA), Transport Appraisal Template
(PHAP_TRANSPORT))
● SAP_HR_HAP_PMG_MANAGER_SR - Manager
For example, this role contains the authorizations for applications based on Web Dynpro technology for
ABAP:
○ Appraisal Document (HAP_MAIN_DOCUMENT)
○ Employee Document Overview (HAP_START_PAGE_POWL_UI_MSS)
○ Application based on Web Dynpro technology for ABAP: Creation and Cascading of Team Goals
(HAP_A_PMP_GOALS)
● SAP_HR_HAP_PMG_EMPLOYEE_SR - Employee
For example, this role for employees contains the authorization for applications based on Web Dynpro
technology for ABAP:
○ Appraisal Document (HAP_MAIN_DOCUMENT)
○ Employee Document Overview (HAP_START_PAGE_POWL_UI_ESS)
● SAP_HR_HAP_PMG_GOALS_SR - Specialist for Corporate Goals
This role for applications based on Web Dynpro technology for ABAP contains authorization for the following:
Creation and Cascading of Corporate Goals and Core Values (HAP_A_PMP_GOALS)
PFCG roles for the Predefined Performance Management Process
● SAP_HR_HAP_PMP_ADMIN_SR - Administrator
The authorizations for this role include the following:
○ Applications based on Web Dynpro technology for ABAP (such as the creation wizard for appraisal
templates (HAP_A_TM_CONF), Edit Performance Management Process (HAP_A_PMP_TIMELINE))
○ Transactions (for example, administrator functions (PHAP_ADMIN_PA), appraisal catalog
(PHAP_CATALOG_PA), Change Appraisal (PHAP_CHANGE_PA), Transport Appraisal Template
(PHAP_TRANSPORT))
● SAP_HR_HAP_PMP_MANAGER_SR - Manager
For example, this role for managers contains the authorizations for applications based on Web Dynpro
technology for ABAP:
○ Appraisal Document (HAP_A_PMP_MAIN)
○ Employee Document Overview (HAP_A_PMP_OVERVIEW)
○ Application based on Web Dynpro technology for ABAP: Creation and Cascading of Team Goals
(HAP_A_PMP_OVERVIEW)
● SAP_HR_HAP_PMP_EMPLOYEE_SR - Employee
For example, this role for employees contains the authorization for applications based on Web Dynpro
technology for ABAP:
○ Appraisal Document (HAP_A_PMP_MAIN)
○ Employee Document Overview (HAP_A_PMP_EMPLOYEE)
● SAP_HR_HAP_PMP_GOALS_SR - Specialist for Corporate Goals
This role for applications based on Web Dynpro technology for ABAP contains authorization for the following:
Creation and Cascading of Corporate Goals and Core Values (HAP_A_PMP_GOALS)
Security Guide for SAP S/4HANA 1709
638 P U B L I C SAP S/4HANA Business ApplicationsAdditional PFCG Roles
Note
The following roles are also available in the system: In place of these roles, we recommend you use the roles
listed above.
● SAP_HR_HAP_ADMINISTRATOR
(Administrator – Appraisals and objective setting agreements)
● SAP_HR_HAP_MANAGER
(Manager Flexible – Appraisals and objective setting agreements)
● SAP_HR_HAP_EMPLOYEE
(Employee Flexible – Appraisals and objective setting agreements)
Caution
You can call standard roles with the role maintenance transaction (PFCG). You must copy these standard roles
into a customer-specific namespace for custom implementation to get custom specifications for the roles.
When you enter a new name, note that it may not contain an SAP-specific name (SAP, "_"). This is to ensure
that a clear distinction can be made between customer-specific roles and standard SAP roles.
13.13.5.2.3.2 Overview of Authorization Objects
In Performance Management, the following authorization objects are essential for enabling users to access the
application component for the following roles:
● Transaction authorizations (S_TCODE, P_TCODE)
● Access to HR master data (P_ORGIN/CON, P_PERNR)
● Access to objects in the Personnel Planning database (PLOG)
● Access to appraisals (P_HAP_DOC)
You can control the following for users with named roles using various authorization object fields:
● Activity (display, edit, delete)
● Object set (persons, appraisal templates)
● Content (infotypes)
For more information about structural authorizations, see SAP Library under ERP Central Component
Human Resources Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 63913.13.5.2.3.2.1 Authorization Objects S_TCODE and P_TCODE
Authorization object that is used to check whether a user is authorized to start the different HR transactions. The
transaction code is checked.
Use
Regardless of the application, the authorization object S_TCODE is used to check authorizations for starting the
transactions defined for an application.
The authorization object P_TCODE is used to check the authorization for starting various HR transactions. The
additional check using P_TCODE provides added security for personal data and is therefore used for numerous
transactions in HCM applications (such as PA40, PHAP_CHANGE_PA). The authorization object P_TCODE is not
used in all HR transactions. Generally, it is used in HR applications where HR-specific authorization objects are not
checked when a transaction is called. For more information about this authorization object, see P_TCODE (HR
transaction code). .
Necessary Setting for Performance Management:
Transaction code field: PHAP_*_PA (depending on role, specify exact transaction). For administrators, you must
include transactions starting with OOHAP_*.
For more information about the authorizations, see SAP Library under ERP Central Component Human
Resources Management Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources Management .
13.13.5.2.3.2.2 Authorization object PLOG (Personnel
Planning)
An authorization object that is used to check the authorization for specific fields in the Personnel Management
components (Organizational Management, Personnel Development, Training and Event Management, SAP
Learning Solution, and so on).
Use
Necessary Setting for Performance Management:
INFOTYP: 1000, 1001, 1002, 1048, 5020, 5021, 5022, 5023, 5024, 5025, 5026
Security Guide for SAP S/4HANA 1709
640 P U B L I C SAP S/4HANA Business ApplicationsISTAT: 4, 3
OTYPE: VA, VB, VC
PLVAR: *
PPFCODE: Change for Customizing/Administrators, Display for End-Users
SUBTYP: 0001, 5020, A605, A606, A607, B605, B606, B607
Note
The object types have the following meaning:
● VA = Appraisal template
● VB = Criteria group
● VC = Criterion
The Customizing settings for the appraisal templates are made in the aforementioned infotypes (transaction
PHAP_CATALOG_PA). Therefore, end users must have at least read authorization for these infotypes. If the
appraisal templates include further object types as a result of using free enhancements (such as Add Business
Event Type) or fixed enhancements (such as Add Individual Development Plan Item), additional authorizations are
required for these object types, for example:
● Q = Qualifications
● O = Organizational unit
● S = Position
● C = Job
● D = Course type
● F = Location
● A = Work center
Since individual development plans can also include further standard object types and customer-specific object
types, you must also include these when setting up authorizations according to the particular implementation.
For more information on the authorizations, see the SAP Library under ERP Central Component Human
Resources Management Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources Management .
13.13.5.2.3.2.3 Authorization Object P_HAP_DOC
An authorization object used to check authorizations for accessing appraisal documents.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 641Use
Among other things, the distribution of authorization for appraisal templates and appraisal documents is
controlled using this authorization object. For more information about this authorization object, see P_HAP_DOC
(Appraisal Systems: Appraisal). The P_HAP_DOC authorization object contains the following fields, which are
tested during an authorization check:
Table 390:
Authorization Field Description
ACTVT Activity (display, change, delete)
PLVAR Plan version (usually active plan version 01)
HAP_CAT_G Appraisal category group ID (determines the appraisal cate
gory groups that a user can access). The appraisal category
groups are contained in table T77HAP_C_GRP (process using
transaction OOHAP_CAT_GROUP). For personnel appraisals,
use category group 00000001 (see also SAP Note number
497773).
HAP_CAT Appraisal category ID (determines the appraisal categories
that a user can access). Appraisal categories are customer-
specific and created in transaction PHAP_CATALOG_PA. They
are saved in table T77HAP_C. You can display the numbering
of the categories using transaction OOHAP_CATEGORY.
HAP_TEMPL The appraisal template ID. An appraisal template is customer-
specific and created in transaction PHAP_CATALOG_PA. It is
an object of type VA. In this field, enter the eight-digit object
ID from table HRP1000 of object type VA. This dictates the
appraisal templates a user can access.
PROFL Authorization profile. This field is only used if structural au
thorizations are used. (See Structural Authorizations in Per
formance Management).
Necessary Settings for PM:
ACTVT: *
PLVAR: *
HAP_CAT_G: 00000001 (for personnel appraisals)
HAP_CAT:* HAP_TEMPL:* (restrict by customer if necessary)
PROFL: *
Note
You should not assign the authorization object P_HAP_DOC on its own since it is only effective when used in
combination with other authorization objects. You must assign it together with the authorization objects PLOG
and P_ORGIN(CON). The authorization object PLOG enables users to access appraisal templates and the criteria
Security Guide for SAP S/4HANA 1709
642 P U B L I C SAP S/4HANA Business Applicationsthey contain (see Authorization Object PLOG [page 640]). The authorization object P_ORGIN(CON) enables users
to access HR data (see Authorization Object P_ORGIN / P_ORGINCON). The authorization object P_PERNR is
also required to enable users to access their own HR master data (for example, for ESS scenarios) (see
Authorization Object P_PERNR).
For more information about the authorizations, see SAP Library under ERP Central Component Human
Resources Management Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources Management .
13.13.5.2.3.2.4 Authorization Objects P_ORGIN
An authorization object used to check the authorization for accessing HR master data.
Use
The checks are run when HR infotypes have to be processed or read. In Performance Management, the persons
for whom the user is allowed to process appraisal documents must be authorized via authorization object
P_ORGIN. The authorization check is run here using the following fields:
Table 391:
Authorization Field Description
INFT Infotype
SUBTY Subtype
AUTHC Authorization level (such as read, write, matchcode)
PERSA Personnel area (from infotype 0001)
PERSG Employee group (from infotype 0001)
PERSK Employee subgroup (from infotype 0001)
VDSK1 Organizational key (from infotype 0001)
Necessary Settings for Performance Management:
INFTY: Usually, 0000, 0001, 0002 (depending on the organizational area for which the user is responsible)
SUBTY: *
AUTHC: Read and matchcode
PERSA: (depending on the organizational area for which the user is responsible)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 643PERSG: (depending on the organizational area for which the user is responsible)
PERSK: (depending on the organizational area for which the user is responsible)
VDSK1: (depending on the organizational area for which the user is responsible)
Note
The authorization object P_ORGIN provides the user with the necessary authorizations he or she needs to access
personnel data. This authorization object is mandatory, that is, you cannot define the use of this authorization
object as being optional by activating the structural authorizations in Performance Management (table T77S0,
switch HAP00/AUTHO). Rather, the structural authorizations comprise an additional filter for accessing appraisal
documents for the permitted set of persons (see Structural Authorizations in Performance Management [page
647]). To assign authorizations for accessing infotypes in the authorization object P_ORGIN, you do not need to
assign specific infotypes in Performance Management. From a technical perspective, it is sufficient in
Performance Management if a person is included in the fields PERSA, PERSG, PERSK, VDSK1 in the permitted
amount. However, to ensure consistency for the user (for example, in the display of additional personal data in the
appraisal document, in the search function for persons with particular infotype values for filling out selection
criteria in Performance Management) it is generally beneficial to provide the user with authorizations for the
Actions (0000), Organizational Assignment (0001), and Personal Data (0002) infotypes for the persons for whom
the user is to process appraisal documents. It should not be necessary that a user is able to process a person’s
appraisal document but not read this person’s organizational assignment. Such a requirement is not logical from
the perspective of the process.
For more information on the authorizations, see the SAP Library under ERP Central Component Human
Resources Management Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources Management .
13.13.5.2.3.2.5 Authorization Object P_ORGINCON
An authorization object that is used during the authorization check for HR data. This check takes place when HR
infotypes are edited or read.
Use
You can use this authorization object if structural authorizations are to be checked in context when checking the
authorization to access HR master data. This authorization object is used for the authorization check for
personnel data. This check takes place when HR infotypes are edited or read. This authorization object consists of
the same fields as the authorization object P_ORGIN, and also includes the field PROFL (structural profile).
Running the check against this object enables user-specific contexts (using Organizational Management) to be
depicted in HR master data.
Security Guide for SAP S/4HANA 1709
644 P U B L I C SAP S/4HANA Business ApplicationsFigure 9: Example for context-sensitive authorization checks
The checks are made context-sensitive by controlling the various structural sets of persons to different contexts
as shown in the example above.
The PROFL field determines the structural profiles the user can access for a particular context. These structural
profiles must be assigned to the user in table T77UA.
If you use the Business Add-In (BAdI) HRBAS00_GET_PROFL, you do not need to maintain table T77UA manually.
This BAdI enables you to implement an alternative method for determining structural profiles. The example
source code in the standard system determines the user’s structural profiles by reading the values entered for the
authorization object P_ORGINCON in the user master record.
Structural authorizations in authorization object P_ORGINCON can also be used in combination with structural
authorizations in Performance Management (see structural authorizations in Performance Management).
For more information on the authorizations, see the SAP Library under ERP Central Component Human
Resources Management Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources Management .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 64513.13.5.2.3.2.6 Authorization Object P_PERNR
This authorization object is used to control the user’s access to his or her own personnel number and the related
HR data separately.
Use
The personnel number is assigned to the user in the Communication infotype (0105) (subtype 0001 System User
Name). Access to an employee’s own master data is used primarily in ESS scenarios in which the user is only to
have access to his or her own master data to edit or display this information. To enable access authorizations for
the employee’s own personnel number to be controlled using the authorization object P_PERNR, the main switch
must be activated in table T77S0 (transaction OOAC, switch AUTSW/PERNR). The authorization check is run for
the following fields:
Table 392:
Authorization Field Description
INFTY Infotype
SUBTY Subtype
AUTHC Authorization level (such as read, write, matchcode)
PSIGN Interpretation of own personnel number (I, include own per
sonnel number, E, exclude own personnel number)
Necessary Settings for Performance Management:
INFTY: Dummy–depends on the ESS scenarios used outside of Performance Management.
SUBTY: Dummy–depends on the ESS scenarios used outside of Performance Management.
AUTHC: *
PSIGN: I (include)
Note
If you use the authorization object P_PERNR, the authorization object P_ORGIN/CON is superfluous. That is, a
user who is to be permitted to access his or her own personnel number only (for example, for ESS scenarios), is
given all the authorizations required using the authorization object P_PERNR. Therefore, an additional setting for
the authorization object P_ORGIN/CON is not required. This also applies to Performance Management.
Security Guide for SAP S/4HANA 1709
646 P U B L I C SAP S/4HANA Business ApplicationsFor more information on the authorizations, see the SAP Library under ERP Central Component Human
Resources Management Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources Management .
13.13.5.2.3.3 Structural Authorizations in Performance
Management
Special structural authorizations exist for Performance Management. These authorizations enable you to control
access to appraisal documents for persons from defined areas of Organizational Management.
This extended authorization check (structural, context-sensitive authorizations) is activated using the switch
HAP00/AUTHO in table T77S0. This switch is specific to Performance Management authorizations.
Example
Example A: Structurally controlled access
The standard SAP authorization check assumes that, once defined, the authorizations (such as change
appraisal documents) for a user always apply even when a manager takes on a substituting role for a different
organizational unit. If you activate the extended authorization check, you can dictate that a manager can
change appraisal documents for employees in his or her organizational unit while he or she can only display
appraisal documents for employees in the organizational unit for which he or she is a substitute.
Example
Example B: Structurally controlled access
A user has authorization to read the mini-master record for all employees at a company (P_ORGINCON for
infotypes 0000, 0001, 0002 for structural profile A, which is valid for the entire company). This user can
maintain simultaneously all infotypes for the employees in his or area of responsibility, displayed via a link
between his or her position and the organizational unit for which the user is a substitute (P_ORGINCON for all
infotypes for a structural profile B that is valid for the entire area of responsibility). You can use the
authorization object P_HAP_DOC to enable the user to display and change the appraisal documents for
employees in his or her area of responsibility (structural profile B) and to specify that the user cannot display or
change the appraisal documents for employees with structural profile A.
Example
Example C: Structurally and context-sensitively controlled access
A user has the structural profiles outlined in example B.
● Structural profile A for access across whole company
● Structural profile B for area of responsibility
You can also use the authorization object P_HAP_DOC to create a context-sensitive reference to the permitted
templates. This means the user can see appraisals from a certain appraisal template, such as qualification
checklists, for structural profile A, that is, company-wide. By defining a further setting for the authorization
object P_HAP_DOC, you can give the user authorization to access all appraisal templates (such as objective
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 647setting agreements, assessments of potential, performance appraisals) that exist in his or her area of
responsibility (structural profile B) for the same user.
For more information about structural authorizations, see SAP Library under ERP Central Component
Human Resources Personnel Management Personnel Administration Technical Processes in Personnel
Administration Authorizations for Human Resources .
13.13.5.2.3.3.1 Activating HAP00/AUTHO and Using PA
Infotype Authorizations (P_ORGIN) without
Structural Authorizations
This combination means that structural restrictions are made during authorization checks only for Performance
Management and the associated access to personnel appraisals. This is opposed to Personnel Administration,
where no structural authorization checks are used.
This means that when HAP00/AUTHO is active, a structural profile must be entered in the authorization object
P_HAP_DOC and the user must be entered together with this structural profile in table T77UA.
If, in this authorization object, the value * remains in the Authorization Profile field and the user has not been
entered in table T77UA, the system interprets this value as structural profile ALL. That is, the user has the
authorizations to access the same employee data as defined in the authorization object P_ORGIN. If no value, or
an invalid value, is entered in the Authorization Profile field for the authorization object P_HAP_DOC, the user
cannot access any personnel appraisals (he or she can, however, access the corresponding infotypes in Personnel
Administration).
Access using structural authorizations is only possible in Performance Management when a structural profile has
been entered in the authorization object P_HAP_DOC and the user in entered in table T77UA has a valid entry for
this structural profile.
If this is the case, the structural authorizations function as follows:
● Filter Function
Example
In Personnel Administration, a user has authorization for all employees in employee subgroup AT
Employees. However, the user is to be able to display and process appraisal documents only for those AT
employees who are in his or her area of responsibility. To enable this, the structural profile for the user''s
area of responsibility is entered in the authorization object P_HAP_DOC.
Explanation
The user can only access the personnel appraisals for persons included in his or her structural profile. You
can report on the object that can be accessed using the report RHUSERRELATIONS (up to Release 4.7) or
using table T77UA (as of the Enterprise Release, using the Display Objects function).
This means that structural authorizations for Performance Management work like a filter for people
authorized by P_ORGIN: Users can see and process a certain number of people in Personnel
Administration via authorization object P_ORGIN. The user can display and maintain only those appraisal
documents for persons who are ALSO included in the structural profile of the authorization object
P_HAP_DOC (filter/subset).
Security Guide for SAP S/4HANA 1709
648 P U B L I C SAP S/4HANA Business Applications● Context Sensitivity
Example
For persons in area A, a user is to be able to view and/or edit the appraisal template A, Objective Setting
Agreements, only. For persons in area B, the user is to be able to view and/or edit the appraisal template B,
Qualification Appraisals, only. This means that the user is not able to show or process the B appraisals, or
Qualification Appraisals, for employees from area A.
The role requires two instances of the authorization object P_HAP_DOC that differ in the following fields:
Table 393:
Appraisal Template Field Authorization Profile Field
1. Proficiency Template A: Objective Setting Agree Structural Profile A: Area A
ments
2. Proficiency Template B: Qualification Appraisals Structural Profile B: Area B
Explanation
A distinction is made between the user''s authorizations so that he or she can access different appraisal
templates and perform different activities in appraisal templates for the various areas in Organizational
Management (context sensitive).
Using report RHUSERRELATIONS (up to Release 4.7) or in table T77UA (as of Enterprise Release, Display
Objects function) you can determine the combination of structural profiles possible for the user (that is, for
which persons he or she can access a particular appraisal template and perform specific activities for this
appraisal template).
13.13.5.2.3.3.2 Activating HAP00/AUTHO and Using
P_ORGINCON (with Structural HR
Authorizations)
This setting means that structural authorizations are used to control access to HR master data and personnel
appraisals in Performance Management.
To use the authorization object P_ORGINCON, activate the switch AUTSW/INCON in table T77S0.
You must also enter a structural profile in the authorization object P_ORGINCON and P_HAP_DOC.
The user requires a structural profile for all other object types in Organizational Management that do not belong to
Performance Management but for which the user nevertheless has authorization using the authorization object
PLOG.
In this combination, authorizations between HR master data and appraisals generally work in the same way as
described in Structural Authorizations in Performance Management [page 647]. In addition, further context-
sensitive authorization checks (in combination with structural profiles from Organizational Management) are
possible.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 649If you use both structural, context-sensitive authorization objects P_ORGINCON and P_HAP_DOC, note the
following:
● It is not sufficient to give the user a structural profile using authorization object P_HAP_DOC. To enable the
user to access employee master data, you must also make a setting for the authorization object
P_ORGINCON [page 644] (see also Authorization Object P_HAP_DOC [page 641]).
● You can give the user authorization to access a broader range of HR master data compared with appraisal
documents.
Example
In the profile for P_ORGINCON, a user can access the infotypes 0000, 0001, 0002 for all employees at the
company who belong to the employee subgroup AT. The structural profile ALL in the authorization object
P_ORGINCON (structural profile A) provides the user with this authorization. The user also has a further
instance of the authorization object P_ORGINCON that permits him or her to maintain all infotypes for
employees in his or her area of responsibility (structural profile B for defining the area of responsibility in
Organizational Management).
In the user profile for the authorization object P_HAP_DOC, the user is given authorization to access
appraisal documents for employees in his or her area of responsibility (structural profile B) as opposed to
for the entire company, ''ALL'' profile (structural profile A). This ensures that the user can access the
appraisal documents for employees in his or her area of responsibility but not the appraisal documents for
employees who belong to the employee subgroup AT, which is valid for the whole company.
● If you use the BAdI HRBAS00_GET_PROFL as opposed to maintaining table T77UA manually (see also
Authorization Object P_ORGINCON [page 644]), note that you must also consider the structural profiles from
the authorization object P_HAP_DOC.
13.13.5.2.3.4 Controlling Authorizations and Access Using
Customizing
The following infotypes are displayed in the form of tab pages and control authorization and access:
● Column Access
● Processing
● Roles
13.13.5.2.3.4.1 Tab: Column Access (Infotype 5023)
On this tab page, you make the settings for access to columns within the (part) appraisal process. You specify
display and change authorizations for elements in the appraisal template. You make the following settings:
● You specify the column owner of each separate column group.
You can use an implementation of the BAdI HRHAP00_COL_OWNER to implement customer-specific column
access.
● You specify who is authorized to perform which activities in each phase of the appraisal process and which
columns are to be shown in the appraisal template.
Security Guide for SAP S/4HANA 1709
650 P U B L I C SAP S/4HANA Business ApplicationsYou can only assign authorizations that are dependent on the various phases to either the column owner or all
other participants involved in the appraisal process. You define who has authorization to execute an activity in a
particular phase separately for column owners and all other participants. You can exclude the appraiser from the
setting so that he or she has access in every phase (see example below).
You can define the following column access authorizations, for example:
● Free column access for all participants during the entire appraisal process This setting defines that all
participants can display all part appraisals at any time and make changes to the appraisal document.
● Change or display authorization for column owners only. This setting defines that only column owners can
display a column or make changes in a specific appraisal phase.
● On this tab page you can use input help to define that columns are only to be visible to certain participants in
the individual phases. To do this, choose the value Hide.
The infotype consists of:
● Checkbox: Default
Use input help to select default entries for access authorizations. Click on the Default Access button to
transfer the entries to the Column Access group box.
● Indicator: Changes
You can accept the transferred defaults without restriction or, if necessary, you can change entries in the
individual cells. If you make and save any changes, the changed field is marked with an indicator. This makes it
easier for you to identify whether these settings are default entries.
● Group box: Column Access
In this group box, you make setting for column access.
Example
You depict a part appraisal process with one appraiser (manager), one appraisee (employee), and several part
appraisers (colleagues). In the Part Appraisal column, the Part Appraisee (employee) is the default column
owner. In the Part Appraisal phase, you assign the column owner change authorization and define that all other
participants do not have access during this phase of the part appraisal.
In many cases, you might want the manager to have at least display authorization. You can assign the manager
with the necessary authorizations (for example, Display for Appraiser, Hide for Others) by using input help. This
ensures that the column is not displayed for all other part appraisers and that the appraiser has display
authorization for the part appraisal column.
Note
● The column access defined for the Part Appraisal (PAPP) and Final Appraisal (FAPP) columns is possible
when one of the following columns is present in the appraisal template:
○ In Process
○ Completed
○ Approved
○ Rejected
● The Objective Setting (OBJ0) column comprises all objective setting columns (OBJ* and QBH*). The Part
Appraisal (PAPP) column comprises the Part Appraisal Weighting (PWGT) and Part Appraisal (PAPP)
columns. This is because the SAP system always processes the relevant columns simulataneously.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 651● If, for a particular phase, a user has Change access to the Objective Setting (OBJ0) column, he or she can
use the Free Enhancement function. If this column is not present, the SAP sytem checks whether the user
has Change access to the Final Appraisal (FAPP) column for this phase. If this is the case, the user can use
a Free Enhancement for this phase.
● The column access defined for the Part Appraisal (PAPP) and Final Appraisal (FAPP) columns is possible
when one of the following columns is present in the appraisal template:
○ In Process
○ Completed
○ Approved
○ Rejected
You can use an implementation of the BAdI HRHAP00_COL_ACCESS to define customer-specific column
access.
13.13.5.2.3.4.2 Tab: Processing (Infotype 5025)
● Setting: Self Appraisal Not Allowed
If this setting is activated, a user (that is the user who is logged on) cannot simulataneously perform the role
of appraiser and appraisee.
● Setting: No Authorization Check for Appraiser
If this setting is activated, an authorization check is not performed for the appraiser. This means that even if a
user does not have authorization for the appraiser''s person, he or she can nevertheless display and edit all
appraisal documents that include this appraiser.
Example
An appraiser has access only to the HR master data of employees in the employee subgroup Salaried
Employees. That is, he or she can display and edit the appraisal documents for these employees. However,
these employees can be appraised by an employee from a different employee subgroup (such as Managing
Employees). In this case, the administrator does not have access to the appraiser''s person. To enable the
administrator to nevertheless evaluate and edit appraisal documents for employees in the Employees
subgroup, you use the setting No Authorization Check for Appraiser setting. Consequently, the appraiser''s
data is not checked for authorization and the administrator can also access the appraisal documents of
appraisers in different areas.
● Setting: Processing Archived Appraisal Documents
Archived appraisal documents refer to completed appraisal documents. This setting determines whether
completed appraisal documents can be deleted in transaction PHAP_CHANGE_PA. If you want this to be
possible, select Delete or Reset and Delete. However, if you do not want this to be possible, select Do Not
Reset or Delete.
To enable the user to delete completed appraisal documents in transaction PHAP_CHANGE_PA, he or she
must have the relevant authorization in authorization object P_HAP_DOC (value 06 -Delete).
Regardless of this Customizing setting and the user''s authorizations defined for this setting 06 -Delete, the
user can always delete completed appraisal documents in transaction PHAP_ADMIN_PA provided that he or
she is permitted to use this transaction.
Security Guide for SAP S/4HANA 1709
652 P U B L I C SAP S/4HANA Business Applications13.13.5.2.3.4.3 Tab: Roles (Infotype 5024)
The Roles tab defines which roles in the appraisal templates are to be used for part appraisals.
You can use roles to define the relationship between the part appraiser and appraisee in the appraisal process.
You can edit roles explicitly in the SAP system or have a BAdI (HRHAP00_SELECTION) determine the roles from
the enterprise''s organizational structure.
You can use roles to restrict or control part appraisal authorizations at the level of individual elements. You make
the relevant settings for individual elements in the Customizing settings for the Roles tab. If you do not use the
role Colleague for a particular element in the appraisal template, this element cannot be appraised by the
appraisee''s colleague, for example.
This allows you to differentiate between the manager''s part appraisal authorizations and the employee''s part
appraisal authorizations in relation to part appraisal columns in the same appraisal template.
Caution
The roles to be used in the appraisal process must be selected at category and appraisal-template level.
Example
Roles delivered in the standard system:
● Colleague
The SAP system uses the organizational structure to identify this role. It interprets all employees located
on the same hierarchical level of the organizational structure as colleagues.
Caution
Organizational Management must be implemented.
● Manager
The SAP system uses the organizational structure to identify this role. It interprets the employee with a
managerial function who is located one level higher than the employee in the hierarchical structure as the
manager.
Caution
Organizational Management must be implemented.
● Self
The SAP system identifies this role using the user and, if required user''s personnel number (from the
Communication infotype (0105)). The SAP system can only read the personnel number via the user.
Caution
The Communication infotype (0105) must be available for people.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 65313.13.5.2.3.4.4 BSP-Specific Authorization Checks
For information about the authorizations for the BSP application, see SAP Note 616900 .
13.13.5.2.3.4.5 BAdI for Authorization Checks
The BAdI HRHAP00_AUTHORITY is delivered for extended authorization checks and it can be used as a
customer-specific implementation.
13.13.5.2.4 Network and Communication Security
Your network infrastructure is extremely important in protecting your system. Your network needs to support the
communication necessary for your business needs without allowing unauthorized access. A well-defined network
topology can eliminate many security threats based on software flaws (at both the operating system level and
application level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, then there is no way for intruders to compromise the machines
and gain access to the back-end system’s database or files. Additionally, if users are not able to connect to the
server LAN (local area network), they cannot exploit well-known bugs and security holes in network services on
the server machines.
The network topology for Performance Management is based on the topology used by the SAP NetWeaver
platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security
Guide also apply to Performance Management. Details that specifically apply to Performance Management are
described in the following topics:
● Communication Channel Security
This topic describes the communication paths and protocols used by Performance Management.
● Network Security
This topic describes the recommended network topology for Performance Management. It shows the
appropriate network segments for the various client and server components and where to use firewalls for
access protection It also includes a list of the ports needed to operate Performance Management.
For more information, see the following sections of the SAP NetWeaver Security Guide:
● Network and Communication Security
● Security Aspects for Connectivity and Interoperability
13.13.5.2.4.1 Communication Channel Security
The table below shows the communication paths used by Peformance Management, the protocol used for the
connection, and the type of data transferred.
Security Guide for SAP S/4HANA 1709
654 P U B L I C SAP S/4HANA Business ApplicationsTable 394:
Communication Paths Protocol Used Type of Data Transferred Data Requiring Particular
Protection
Front-end client with SAP GUI DIAG All application data Passwords and personal data
for Windows for the applica
tion server
Front-end client with a Web HTTP, HTTPS All application data Passwords and personal data
browser for the application
server
Upload document HTTP, HTTPS XML document Personal data
SAP Business Information Extractor program Performance Management
Warehouse (SAP BW) data
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
For more information, see the SAP NetWeaver Security Guide under Transport Layer Security.
Printing
Peformance Management provides the options for printing content. For information about security while printing,
see the SNC User''s Guide. You can find this at http://service.sap.com/security by looking under Security in
Detail Infrastructure Security .
13.13.5.2.4.2 Network Security
Ports
Performance Management runs on SAP NetWeaver and uses the ports from the AS ABAP. For more information,
see the topic for AS ABAP Ports in the corresponding SAP NetWeaver Security Guides. For other components, for
example, SAPinst, SAProuter, or the SAP Web Dispatcher, see also the document TCP/IP Ports Used by SAP
Applications, which is located on the SAP Service Marketplace at http://service.sap.com/ under Products
Database & technology Security Infrastructure Security .
13.13.5.2.5 Internet Communication Framework Security
You should only activate those services that are needed for the applications running in your system. For the
Manager and Employee roles in Performance Management, all services with the prefix HAP in the path /
default_host/sap/bc/webdynpro/sap/ are required.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 655● HAP_CONFIGURATION - Configuration
● HAP_DOCUMENT_LINK - Web Dynpro application hap_document_link
● HAP_MAIN_DOCUMENT - Appraisal Document
● HAP_QUALIFICATION_PROFILE - Application for Qualification Profile
● HAP_START_PAGE_POWL_UI_MSS - Web Dynpro application HAP_START_PAGE_POWL_UI_MSS
● HAP_START_PAGE_POWL_UI_ESS - Web Dynpro application HAP_START_PAGE_POWL_UI_ESS
Use the transaction Maintain Services (SICF) to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver documentation in SAP
Library.
For more information about ICF security, see RFC/ICF Security Guide.
13.13.5.2.6 Data Storage Security
HANA
The Performance Management data is saved to the databases of SAP Web Application Server (Web AS) or S/
4HAN Component. You do not need to use any other databases in addition to these standard databases.
Table 395: Performance Management stores the data in the following locations:
Data Storage Location
Appraisal Templates PD infotype tables
Cascaded goals PD infotype tables
Data from appraisal documents HRHAP* tables
Attachments Knowledge Provider (KPro)
Download PDF File system of client
13.13.5.2.7 Other Security-Relevant Information
Access to attachments via Microsoft Internet Explorer
You use Microsoft Internet Explorer and want to display attachments in the browser. To do this, Microsoft Internet
Explorer checks the content of the attachment to determine the file type and display the attachment correctly
( MIME Type Sniffing). In the worst case, it is thus possible that damaging files of an undesired file type are
displayed in the browser or cause damage in another way. To avoid this potential threat to security, deselect
MIME Type Sniffing in the security settings of Microsoft Internet Explorer.
Security Guide for SAP S/4HANA 1709
656 P U B L I C SAP S/4HANA Business Applications13.13.5.2.8 Security-Relevant Logging and Tracing
Performance Management uses logging and tracing mechanisms from SAP NetWeaver in the appraisal
document. These mechanisms are described in detail under Auditing and Logging.
You can specify the following in the appraisal template:
● Do you want data to be logged?
● The specificity of logging of access to appraisal documents
● The specificity of loggingn of changes to appraisal documents
Changes to appraisal templates are logged using change documents.
13.13.5.3 Talent Management and Talent Development
About This Chapter
This chapter of the Security Guide provides an overview of the security-relevant information for Talent
Management and Talent Development (PA-TM).
Overview of the Main Sections of This Chapter
The following sections contain the security-relevant information that is specific to Talent Management and Talent
Development:
● Important SAP Notes
This section lists the most important SAP Notes with regard to the security of Talent Management.
● Authorizations
This section provides an overview of the authorization concept used for Talent Management.
● Network and communication security
This section provides an overview of the following aspects:
○ Communication Channel Security
○ Communication Destinations
● Internet Communication Framework Security
This section provides an overview of the services for the Internet Communication Framework (ICF) used by
Talent Management.
● Data Storage Security
This section provides an overview of the critical data used by Talent Management, as well as the security
mechanisms used.
● Security for Third-Party or Additional Applications
This section contains security information that applies to third-party or additional applications that are
implemented together with Talent Management.
● Other Security-Relevant Information
This section contains information on uploading and displaying attachments.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 65713.13.5.3.1 Authorizations
Use
Talent Management uses the following authorization concepts:
● SAP NetWeaver authorization concept that is based on assigning authorizations to users based on roles
For this purpose, the roles mentioned under Standard Roles are available as a template. You can copy the
standard roles to the customer namespace and adjust them to suit your requirements. You use the profile
generator (transaction PFCG) to maintain roles.
● HR-specific concept for the structural authorization check
For this purpose, the authorization profiles mentioned under Standard Roles are available as a template. You
can use the authorization profiles as an example for creating your own authorization profiles and then assign
these profiles to the relevant users.
For more information about the authorization profiles, see Customizing for Talent Management and Talent
Development and choose Basic Settings Authorizations in Talent Management Define Structural
Authorizations
For more information about the structural authorization check, see section Structural Authorization Check
(see SAP Library for S/4HANA and choose Human Resources HR Tools Authorizations for Human
Resources ).
Role and Authorization Concept for Talent Management
Standard Roles
The table below shows the standard roles and structural authorization profiles that can be used for Talent
Management.
Table 396: Standard Roles and Structural Authorization Profiles
Role Description Structural Authorization Profile
SAP_SR_TMC_TMS_6 Authorizations for talent management Talent Management Specialist:
specialists and talent management su TMS_PROFILE
perusers (see Talent Management
Talent Management Superuser:
Specialist under Single Roles in Talent TMS_ALL
Management)
SAP_SR_TMC_MANAGER_6 Authorizations for managers with regard TMS_MAN_PROF
to Talent Management activities (see
Manager in Talent Management under
Single Roles in Talent Management)
Security Guide for SAP S/4HANA 1709
658 P U B L I C SAP S/4HANA Business ApplicationsRole Description Structural Authorization Profile
SAP_SR_TMC_EMPLOYEE_6 Authorizations for employees with re None
gard to Talent Management activities
(see Employee in Talent Management
under Single Roles in Talent
Management)
For the documentation for the standard roles, see SAP Library for S/4HANA and choose Human Resources
Talent Management Talent Management and Talent Development Roles in Talent Management Single Roles
in Talent Management .
The table below shows the roles that we recommend you no longer use.
Table 397: Roles No Longer Recommended for Use
Role Description Note
SAP_TMC_TALENT_MANA_SPECIALIST Authorizations for talent management This role is obsolete and was replaced by
specialists (see Talent Management the role SAP_SR_TMC_TMS_6.
Specialist under Single Roles in Talent
Management)
SAP_TMC_SUPER_TALENT_MANA_SPEC Authorizations for talent management This role is obsolete and was replaced by
superusers (see Talent Management the role SAP_SR_TMC_TMS_6.
Superuser under Obsolete Single Roles in
Talent Management)
SAP_TMC_MANAGER Authorizations for managers with regard We recommend that you use the role
to Talent Management activities (see SAP_SR_TMC_MANAGER_6 instead of this
Manager in Talent Management under role.
Single Roles in Talent Management)
SAP_TMC_EMPLOYEE Authorizations for employees with re This role is obsolete and was replaced by
gard to Talent Management activities the role SAP_SR_TMC_EMPLOYEE_6.
(see Single Roles in Talent Management)
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by Talent Management.
Table 398: Standard Authorization Objects
Authorization Object Description More Information
B_BUPA_RLT Authorizations for business partner Security Guide for SAP NetWeaver Ap
roles plication Server for ABAP under SAP
Business Partner Secuirty
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 659Authorization Object Description More Information
CA_POWL Authorizations for the personal object SAP Library for S/4HANA under
worklist (POWL) Cross-Application Functions in SAP
ERP Cross-Application Components
Personal Worklist in the section Assign
Authorizations (Standard POWL)
S_RFC Authorization check upon RFC access SAP NetWeaver Security Guide for Re
mote Function Call (RFC) and Internet
Communication Framework (ICF) under
Authorization Object S_RFC
S_WFAR_OBJ ArchiveLink: Authorizations for access SAP NetWeaver Library under SAP
ing documents
NetWeaver by Key Capability
Application Platform by Key Capability
ArchiveLink in the section Authoriza
tions
PLOG Authorization object that checks the au SAP Library for S/4HANA under PLOG
thorization for certain fields of Personnel (Personnel Planning)
Planning components (Organizational
Management, Personnel Development,
Training and Event Management, and so
on)
P_HAP_DOC Authorization object that controls a us SAP Library for S/4HANA under
er''s access to appraisal templates P_HAP_DOC (Appraisal Systems:
Appraisal)
P_ORGIN Authorization object used to check the SAP Library for S/4HANA under
authorization for accessing HR infotypes P_ORGIN (HR: Master Data)
P_TCODE Authorization object used to check SAP Library for S/4HANA under
whether a user is authorized to start var P_TCODE (HR: Transaction Code)
ious HR transactions
P_PERNR Authorization object used if different au SAP Library for S/4HAAN under
thorizations are to be assigned for ac P_PERNR (HR: Master Data - Personnel
cessing a user''s personnel number Number Check)
For the documentation for the authorization objects PLOG, P_HAP_DOC, P_ORGIN, P_TCODE, and P_PERNR, see
SAP Library for S/4HANA and choose Human Resources HR Tools Authorizations for Human Resources
Technical Aspects Authorization Objects .
Critical Combinations
● Talent Review Meetings
Security Guide for SAP S/4HANA 1709
660 P U B L I C SAP S/4HANA Business Applications○ All users that have access to the personal object worklist (POWL) for talent review meetings may create
talent review meetings.
Note
In the standard SAP system, the POWL for talent review meetings is contained in the roles for talent
management specialists for SAP Enterprise Portal and SAP Business Client.
○ Users have display and change authorization for all talent review meetings to which they are assigned as
members of the support team. The POWL for talent review meetings provides users with a list of talent
review meetings, which they can display and edit.
Caution
All members of the support team for a talent review meeting have unrestricted access to all
information available within this talent review meeting (for example, to all assigned managers and
talents, and their profiles). When this information is accessed, there is no additional authorization
check within the talent review meeting.
○ Those users that have display or change authorization for the related infotype record of the Object
infotype (1000) also have display or change authorization for a talent review meeting. The infotype record
is identified by the RM (Talent Review Meeting) object type and the ID of the talent review meeting. Users
that have display authorization for this infotype record can call the talent review meeting in display mode.
Users with change authorization for this infotype record can call the talent review meeting in change
mode.
● Talent Search
○ To be able to use the search, a user must be a talent management specialist with an assigned area of
responsibility. This means that there must be a relationship 741 (Is Responsible For/Is in Area of
Responsibility Of) between the user''s central person (object type CP) and at least one organizational unit
(object type O).
○ In Customizing, for the search fields that you want to use as search criteria, enter the infotype and the
object type, if required, to define which authorization object is used for the authorization check. These
settings specify whether this field is available to a user for selection in the search template and in the
search results.
Example
The user wants to use the talent group as a search criterion and search for all talents that are assigned
to a particular talent group. Therefore, the system checks whether the user has display authorization
for relationship 743 (Has Talent For/Comprises Talent) between the object types CP (Central Person)
and TB (Talent Group). To do so, it checks the authorization for the corresponding subtype of the
infotype Relationships (1001).
For more information, see Customizing for Talent Management and Talent Development and choose
Basic Settings Search Define Search Requests and Search Field Names .
○ In the search results, the system displays only the objects for which the user has authorization through
the authorization object PLOG as well as the corresponding structural authorization. For the object type
CP, the system also checks whether the user has display authorization for the infotype Organizational
Assignment (0001).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 661Note
If more than one person (object type P) is assigned to a central person (CP) (for example, employees in
concurrent employment), it is sufficient for the talent search if the user has display authorization for
one of these persons.
Additional Functions
You can deactivate specific authorization checks that are performed in the standard SAP system when assigning
employees (object type CP (Central Person)) to positions, job families, and talent groups. In the standard SAP
system, when such relationships are created, the system checks whether the user (in this case, the talent
management specialist) has the following authorizations:
● For assigning employees to positions:
Authorizations for
○ Employee (object type CP)
○ Position (object type S)
○ Relationship 740 (Is Successor Of)
● For assigning employees to job families:
Authorizations for
○ Employee (object type CP)
○ Job family (object type JF)
○ Relationship 744 (Has Potential For)
● For assigning employees to talent groups:
Authorizations for
○ Employee (object type CP)
○ Talent group (object type TB)
○ Relationship 743 (Has Talent For)
So that a talent management specialist is also able to create these relationships for employees (object type CP)
for which he or she does not usually have change authorization (because of his or her structural authorization
profile), the authorization check can be deactivated for employees for the respective employee assignment. The
talent management specialist then only needs the change authorization for the object (of the object type Position,
Job Family, or Talent Group) to which he or she wants to assign the employee, and for the relationship.
For more information, see Customizing for Talent Management and Talent Development and choose Basic
Settings Authorizations in Talent Management Deactivate Authorization Check When Assigning Employees .
13.13.5.3.2 Communication Channel Security
The table below shows the communication paths used by Talent Management, the protocol used for the
connection, and the type of data transferred.
Security Guide for SAP S/4HANA 1709
662 P U B L I C SAP S/4HANA Business ApplicationsTable 399:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Front-end client with SAP GUI DIAG Customizing data Passwords
for Windows for the applica
tion server
Front-end client with a Web HTTP(S) Application data Passwords, personal data
browser for the application
server
Front-end client with an SAP HTTP(S) Application data Passwords, personal data
Business Client for the appli
cation server
Connection of PDF-based HTTP(S) Person-related data (such as
print forms to the archive an employee''s photo)
SAP Business Information Extractor program HR master data, organiza
Warehouse (SAP BW) tional data, Talent Manage
ment data
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
Recommendation
We strongly recommend using secure protocols (SSL, SNC) whenever possible.
Note
If you convert the protocol from HTTP to HTTPS and implement PDF-based print forms, see SAP Note 1461447
.
For more information, see Transport Layer Security in the SAP NetWeaver Security Guide.
13.13.5.3.3 Communication Destinations
The table below shows an overview of the communication destinations used by Talent Management.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 663Table 400: Communication Destinations
Destination Delivered Type Users, Authorizations Description
Access to external ap Yes RFCs of the function The following roles re The function group
plications for Talent group quire authorization for HRTMC_SERVICES con
Management HRTMC_SERVICES the authorization ob tains the Remote Func
ject S_RFC to have ac tion Calls for external
cess to external appli applications that can
cations: be used for Succession
● SAP_TMC_TALENT Planning, for example
_MANA_SPECIALI
ST
● SAP_TMC_SUPER_
TALENT_MANA_SP
EC
● SAP_TMC_MANAGE
R
Transfer of talent Yes RFCs of the function To run the report The function group
groups and successor group RPTMC_MIGRATE_SUCC HRSCP_MIGRATION
assignments from SAP HRSCP_MIGRATION ESSIONS or contains the Remote
E-Recruiting to Talent RPTMC_MIGRATE_TALE Function Calls for
Management NT_GROUPS, a user re transferring talent
quires authorization for groups and successor
the authorization ob assignments from SAP
ject S_RFC E-Recruiting to Talent
Management
Transfer of entries Yes RFCs of the function To run the report The function group
from the candidate pro group HRSCP_TP_SYNC HRSCP_TP_SYNC_GET_ HRSCP_TP_SYNC con
file in SAP E-Recruiting EDU_WE_INFO, a user tains the Remote Func
to the talent profile in requires authorization tion Calls for synchro
Talent Management for the authorization nizing the talent profile
object S_RFC in Talent Management
with the candidate pro
file in SAP E-Recruiting
Jump from queries in Yes RFC for transferring the The user requires au
SAP Business Informa MEM_ID from the BW thorization for the au
tion Warehouse (SAP system to the ERP sys thorization object
BW) to the talent pro tem S_RFC
file
Security Guide for SAP S/4HANA 1709
664 P U B L I C SAP S/4HANA Business ApplicationsThe table below shows the function modules that the reports use to transfer data to Talent Management:
Table 401: Function Modules for Transferring Data to Talent Management
Function Group Function Module Used by Report
HRSCP_MIGRATION HRSCP_MIG_SCP_GET_ALL Transfer Successor Assignments to
Talent Management
( RPTMC_MIGRATE_SUCCESSIONS)
HRSCP_MIGRATION HRSCP_MIG_TG_GET_ALL Transfer Talent Groups from E-
Recruiting to Talent Management
( RPTMC_MIGRATE_TALENT_GROUPS)
HRSCP_MIGRATION HRSCP_MIG_TG_GET_DETAILS Transfer Talent Groups from E-
Recruiting to Talent Management
( RPTMC_MIGRATE_TALENT_GROUPS)
HRSCP_MIGRATION HRSCP_MIG_TG_GET_TALENTS Transfer Talent Groups from E-
Recruiting to Talent Management
( RPTMC_MIGRATE_TALENT_GROUPS)
HRSCP_TP_SYNC HRSCP_TP_SYNC_GET_EDU_WE_INFO Synchronization of Talent Profile with
Candidate Profile
( RPTMC_TP_SYNC_EDU_WE_RCF)
13.13.5.3.4 Internet Communication Framework Security
You should only activate those services that are needed for the applications running in your system. For Talent
Management the following services are needed:
● Talent Management Specialist
○ default_host/sap/bc/webdynpro/sap/HRTMC_EMPLOYEE_PROFILE
○ default_host/sap/bc/webdynpro/sap/HRTMC_LONG_PROFILE
○ default_host/sap/bc/webdynpro/sap/hrtmc_rm_maintenance
○ default_host/sap/bc/webdynpro/sap/hrtmc_rm_presentation
○ default_host/sap/bc/webdynpro/sap/hrtmc_search
○ default_host/sap/bc/webdynpro/sap/hrtmc_side_by_side
○ default_host/sap/bc/webdynpro/sap/hrtmc_talent_group
○ default_host/sap/bc/webdynpro/sap/HRTMC_TA_DEV_PLAN
● Manager
○ default_host/sap/bc/webdynpro/sap/HRTMC_EMPLOYEE_PROFILE
○ default_host/sap/bc/webdynpro/sap/HRTMC_LONG_PROFILE
○ default_host/sap/bc/webdynpro/sap/hrtmc_side_by_side
○ default_host/sap/bc/webdynpro/sap/hrtmc_talent_group
○ default_host/sap/bc/webdynpro/sap/HRTMC_TA_ASSESSMENT
○ default_host/sap/bc/webdynpro/sap/HRTMC_TA_DASHBOARD
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 665○ default_host/sap/bc/webdynpro/sap/HRTMC_TA_DEV_PLAN
○ default_host/sap/bc/webdynpro/sap/hrtmc_teamviewer
● Employee
default_host/sap/bc/webdynpro/sap/HRTMC_EMPLOYEE_PROFILE
Use the transaction SICF to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly. For more information, see Activating and Deactivating ICF Services.
For more information about Internet Communication Framework security, see RFC/ICF Security Guide.
13.13.5.3.5 Data Storage Security
Data Storage
The Talent Management data is stored in the SAP NetWeaver Application Server or S/4HANA databases. You do
not need to use any other databases in addition to these standard databases.
Talent Management stores the data in the following locations:
Table 402: Data and Storage Locations
Data Storage Location
Master data, talent assessments HR infotype tables
Attachments, comments, calibration grid icon Knowledge Provider (KPro)
Business partner master data Business partner database
Employee photo ArchiveLink
Cookies
The application uses a Web browser. SAP NetWeaver Application Server must set and accept cookies.
13.13.5.3.6 Security for Additional Applications
You can implement Talent Management together with the product SAP Talent Visualization by Nakisa. SAP Talent
Visualization by Nakisa provides users with a graphical and organization-oriented view of Succession Planning and
the job architecture.
Note
Note that you need to purchase your own license for using the product SAP Talent Visualization by Nakisa.
Security Guide for SAP S/4HANA 1709
666 P U B L I C SAP S/4HANA Business ApplicationsIf you implement SAP Talent Visualization by Nakisa, the roles for the talent management specialist, the talent
management superuser, and the manager need the authorization for the authorization object S_RFC to be able to
access applications that call the HRTMC_SERVICES function group. This function group comprises the Remote
Function Calls (RFCs) for external applications such as SAP Talent Visualization by Nakisa. This authorization is
contained in the standard Talent Management roles. For more information about the standard roles, see
sectionAuthorizations under Talent Management and Talent Development.
For information about the security of SAP Talent Visualization by Nakisa, see the documentation for this product.
The documentation is located on SAP Service Marketplace at http://service.sap.com/instguides SAP
Solution Extensions SAP Talent / Org Visualization by Nakisa .
13.13.5.3.7 Other Security-Relevant Information
Uploading and Displaying Attachments
Uploading Attachments
Talent Management uses the virus scan interface of SAP NetWeaver. You can use this interface to include
external virus scanners to increase the security of your system.
For Talent Management, the virus scan profile /HCM_TMC/DOCUMENT_UPLOAD is available for checking that files
or documents uploaded as attachments do not contain any viruses. This virus scan profile is not active in the
standard SAP system. To activate the virus scan profile, in Customizing for Talent Management and Talent
Development, make the settings under Basic Settings Attachments Define Virus Scan Profiles . In
Customizing for SAP NetWeaver under Application Server System Administration Virus Scan Interface ,
you need to first set up the virus scan interface.
For more information about the virus scan interface, see SAP NetWeaver Library and choose SAP NetWeaver
by Key Capability Security System Security , and the Virus Scan Interface section.
You can also limit the size of files that are uploaded as attachments. To do so, in Customizing for Talent
Management and Talent Development, make the settings under Basic Settings Attachments Assign
Storage Locations and Maximum File Size .
Displaying Attachments Using Microsoft Internet Explorer
If you display attachments in a browser and use Microsoft Internet Explorer for this, Microsoft Internet Explorer
checks the content of the attachment to determine the file type and display the attachment correctly based on the
type (MIME Type Sniffing). In the worst case, it is thus possible that damaging files of an undesired file type are
displayed in the browser or cause damage in another way. To avoid this potential threat to security, deselect
MIME Type Sniffing in the security settings of Microsoft Internet Explorer.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 66713.13.5.4 Enterprise Compensation Management
About This Chapter
This chapter of the Security Guide provides an overview of the security-relevant information for the Enterprise
Compensation Management (PA-EC) application component.
Overview of the Main Sections of This Chapter
The following sections contain the security-relevant information that is specific to “Enterprise Compensation
Management”:
● Important SAP Notes
This section lists the most important SAP Notes with regard to the security of Enterprise Compensation
Management.
● Security Aspects for Data, Data Flow, and Processes
This section provides an overview of the security aspects of the most frequently used processes in Enterprise
Compensation Management.
● Authorizations
This section provides an overview of the authorization concept used for Enterprise Compensation
Management.
● Communication Channel Security
This section describes the communication paths and logs that Enterprise Compensation Management uses.
● Internet Communication Framework Security
This section provides an overview of the services for the Internet Communication Framework (ICF) used by
Enterprise Compensation Management.
● Data Storage Security
This section provides an overview of all critical data used by Enterprise Compensation Management, as well
as the security mechanisms used.
● Security-Relevant Logging and Tracing
This section provides an overview of the trace and log files that contain security-relevant information and that
enable you to reproduce activities, for example, if there is a security violation.
13.13.5.4.1 Security Aspects for Data, Data Flow, and
Processes
Enterprise Compensation Management uses applications based on the following technology:
Role: Manager
● Web Dynpro for ABAP in the applications in Manager Self-Service
● Interactive forms based on Adobe software (Interactive forms) in the Total Compensation Statement and
Compensation Review Statement applications.
For more information, see the guide for SAP Interactive Forms by Adobe under SAP Interactive Forms by
Adobe Security Guide.
Security Guide for SAP S/4HANA 1709
668 P U B L I C SAP S/4HANA Business ApplicationsFor more information about the Manager role, see the S/4HANA Security Guide and choose the following
path: Self-Services Manager Self-Service .
Role: Employee
● Web Dynpro for ABAP in the applications in Employee Self-Service
● Interactive forms based on Adobe software (Interactive forms) in the Total Compensation Statement
application.
For more information, see the guide for SAP Interactive Forms by Adobe under SAP Interactive Forms by
Adobe Security Guide.
For more information about the Employee role, see the S/4HANA Security Guide and choose the following
path: Self-Services Employee Self-Service .
Role: Administrator
● SAP Graphical User Interface (SAP GUI) in Customizing for Enterprise Compensation Management and
administrative reports.
● Business Server Page (BSP) in the Top-Down Budgeting functions
During compensation planning, Enterprise Compensation Management sends e-mails via workflow. For
information about workflow and sending e-mails, see Customizing for Enterprise Compensation Management and
choose Compensation Administration Workflow Settings .
For more information about the settings, see Customizing for Enterprise Compensation Management.
13.13.5.4.2 Authorizations
Use
Enterprise Compensation Management uses the following authorization concepts:
● SAP NetWeaver authorization concept that is based on assigning authorizations to users based on roles
For this, the roles mentioned under “Standard Roles” are available as a template. You can copy the standard
roles to the customer namespace and adjust them to suit your requirements. For role maintenance you use
the profile generator (transaction PFCG).
● HR-specific concept for the general and structural authorization check
For more information about the authorization checks, see General Authorization Check and Structural
Authorization Check (see SAP Library for S/4HANA and choose Human Resources HR Tools
Authorizations for Human Resources ).
Roles and Authorization Concept for Enterprise Compensation Management
Standard Roles
Enterprise Compensation Management does not provide its own standard roles. It uses roles from Manager Self-
Service and Employee Self-Service.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 669For more information, see the following:
● Authorizations in Manager Self-Service.
● Authorizations in Employee Self-Service.
Standard Authorization Objects
Enterprise Compensation Management uses the same standard authorization objects as all of Human Resources.
For more information about the standard authorization objects in Human Resources, see Authorizations. To do
this, choose S/4HANA Security Guide for Human Resources Authorizations .
13.13.5.4.3 Communication Channel Security
The following table shows the communication paths that Enterprise Compensation Management uses, the
protocol used for the connection, and the type of data transferred.
Table 403:
Communication Paths Protocol Used Type of Data Transferred Data Requiring Particular
Protection
Front-end client that uses DIAG All Customizing data Passwords
SAP GUI for Windows as the
application server
Front-end client that uses a HTTP, HTTPS All application data Passwords, personal data
Web browser as the applica
tion server Note
We generally recommend
using HTTPS
SAP Business Information Extractor program HR master data, organiza
Warehouse (SAP BW) tional data, Enterprise Com
pensation Management data
You can use Secure Network Communications (SNC) to protect DIAG and RFC connections. The Secure Sockets
Layer protocol (SSL protocol) protects HTTP connections.
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC) where possible.
For more information, see the SAP NetWeaver Security Guide under Transport Layer Security.
Printing
Enterprise Compesation Management provides a number of options for printing content. For information about
security while printing, see the SNC User''s Guide. You can find this at http://service.sap.com/security by
looking under Security in Detail Infrastructure Security .
Security Guide for SAP S/4HANA 1709
670 P U B L I C SAP S/4HANA Business Applications13.13.5.4.4 Internet Communication Framework Security
You should only activate those services that are needed for the applications running in your system. For the
Manager role in Enterprise Compensation Management, all services with the prefix HCM_ECM in the path /
default_host/sap/bc/webdynpro/sap/ are required.
● HCM_ECM_PLANNING_OVERVIEW_OIF - Compensation Planning Overview
● HCM_ECM_PLANNING_UI_GAF - Planning User Interface
● HCM_ECM_PROFILE_OIF - Compensation Profile
● HCM_ECM_SIDEBYSIDE_OIF - Side-by-Side Comparison
● HCM_ECM_TEAMVIEWER_OIF - Compensation Profile Team Overview
The Administrator role, the services with the prefix HRECM_BDG in the path /default_host/sap/bc/bsp are
only required if you use top-down budgeting for compensation planning.
● HRECM_BDG_CHKRL - Check and Release Budget
● HRECM_BDG_MAINT - Budget Maintenance
● HRECM_BDG_RA_VL - Reassign Budget Value
● HRECM_BDG_SRV - Budgeting Services
● HRECM_BSG_SRV02 - Budget Structure Services
● HRECM_BDG_START - Overview
Use the transaction Maintain Services (SICF) to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information, see Activating and Deactivating ICF Services in the SAP NetWeaver documentation in SAP
Library.
For more information about ICF security, see RFC/ICF Secuirty Guide.
13.13.5.4.5 Data Storage Security
All data for Enterprise Compensation Management is stored in the database of the SAP system. The data is stored
in the Personnel Administration (PA) and Budget Management(PA-PM) application components as well as in the
database tables that govern the processes of Enterprise Compensation Management.
The applications in Enterprise Compensation Management store sensitive, personal data for compensation
planning. The data saved when managing the processes of Enterprise Compensation Management can be deleted
after the compensation review using the report Delete Compensation Planning History Data
(RHECM_DELETE_HISTORY_DATA).
For information about data storage security, see the SAP NetWeaver Security Guide at https://help.sap.com/nw
Release/Language SAP NetWeaver Library Administrator''s Guide SAP NetWeaver Security Guide
Security Guides for the Operating System and Database Platforms .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 67113.13.5.4.6 Security-Relevant Logging and Tracing
Enterprise Compensation Management uses logging and tracing mechanisms from SAP NetWeaver. These
mechanisms are described in detail under Auditing and Logging.
Changes to data in Enterprise Compensation Management that are made within the applications of Enterprise
Compensation Management are logged by the SAP system. The data can be checked with the following reports:
● Display Compensation Planning Changes (RHECM_DISPLAY_CHANGES)
● Display Compensation Planning Progress (RHECM_DISPLAY_PROGRESS)
13.13.6 Time and Attendance Management
13.13.6.1 Personnel Time Management (PT)
Introduction
Note
This guide does not replace the administration or operation guides that are available for productive operations.
Target Audience
● Technology consultants
● System administrators
This document is not included as part of the installation guides, configuration guides, technical operation
manuals, or upgrade guides. Such guides are only relevant for a certain phase of the software lifecycle, whereas
the security guides provide information that is relevant for all lifecycle phases.
Why Is Security Necessary?
With the increasing use of distributed systems and the Internet for managing business data, the demands on
security are also on the rise. When using a distributed system, you need to be sure that your data and processes
support your business needs without allowing unauthorized access to critical information. User errors,
negligence, or attempted manipulation of your system should not result in loss of information or processing time.
These demands on security apply likewise to the SAP Personnel Time Management. To assist you in securing the
SAP Personnel Time Management, we provide this security guide.
Security Guide for SAP S/4HANA 1709
672 P U B L I C SAP S/4HANA Business ApplicationsAbout this Document
This security guide provides an overview of the security-relevant information that applies to the SAP Personnel
Time Management.
Overview of the Main Sections
The security guide comprises the following main sections:
● Before You Start
This section contains information about why security is necessary, how to use this document, and references
to other security guides that build the foundation for this security guide.
● Technical System Landscape
This section provides an overview of the technical components and communication paths that are used by the
SAP Personnel Time Management.
● Security Aspects of Data, Data Flow, and Processes
This section provides an overview of security aspects involved throughout the most widely used processes
within the SAP Personnel Time Management.
● Authorizations
This section provides an overview of the authorization concept that applies to the SAP Personnel Time
Management.
● Session Security Protection
This section provides information about activating secure session management, which prevents JavaScript or
plug-ins from accessing the SAP logon ticket or security session cookie(s).
● Network and Communication Security
This section provides an overview of the communication paths used by the SAP Personnel Time Management
and the security mechanisms that apply. It also includes our recommendations for the network topology to
restrict access at the network level.
● Internet Communication Framework Security
This section provides an overview of the Internet Communication Framework (ICF) services that are used by
the SAP Personnel Time Management.
● Security-Relevant Logging and Tracing
This section provides an overview of the trace and log files that contain security-relevant information, for
example, so you can reproduce activities if a security breach does occur.
13.13.6.1.1 Before You Start
The SAP Personnel Time Management is built using the HR backend system, CRM backend system and SAP
NetWeaver components. Therefore, the corresponding security guides also apply to the SAP Personnel Time
Management.
For a complete list of the available SAP security guides, see SAP Service Marketplace at http://
service.sap.com/securityguide.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 673Important SAP Notes
The most important SAP Notes that apply to the security of the SAP Personnel Time Management are shown in
the table below.
Table 404:
Title SAP Note Comment
Authorization objects of shift planning 496993
Transaction authorization PA61 for shift 500844
planning
PP61: Changeability of ''*'' 1290365
eSOA HCM: Security, Interval Correc 1230915
tions for Leave
ESS MSS LEA: Data anonymization de 1165170
spite authorization
Setting up the HR-PDC interface 647145
For a list of additional security-relevant SAP News and SAP Notes, see also SAP Service Marketplace at http://
service.sap.com/securitynotes.
Additional Information
For more information about specific topics, see the Quick Links as shown in the table below.
Table 405:
Content Quick Link on SAP Service Marketplace or SDN
Security http://sdn.sap.com/irj/sdn/security
Security Guides http://service.sap.com/securityguide
Related SAP Notes http://service.sap.com/notes
http://service.sap.com/securitynotes
Released platforms http://service.sap.com/pam
Network security http://service.sap.com/securityguide
SAP Solution Manager http://service.sap.com/solutionmanager
Security Guide for SAP S/4HANA 1709
674 P U B L I C SAP S/4HANA Business ApplicationsSAP NetWeaver http://sdn.sap.com/irj/sdn/netweaver
13.13.6.1.2 User Management
Use
User management in SAP Personnel Time Management uses the mechanisms provided with the SAP NetWeaver
Application Server for ABAP, for example, tools, user types, and password policies. For an overview of how these
mechanisms apply for SAP Personnel Time Management, see the sections below. In addition, we provide a list of
the standard users required for operating the SAP Personnel Time Management.
User Administration Tools
The table below shows the tools to use for user management and user administration with SAP Personnel Time
Management.
User Management Tools
Table 406:
Tool Detailed Description Prerequisites
User and role maintenance with SAP For more information, see User and Role
NetWeaver AS for ABAP (Transactions Administration of AS ABAP.
SU01, PFCG)
User Types
It is necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively must change their passwords on a regular basis, but
not users who run background processing jobs.
The specific user types that are required for the SAP Personnel Time Management include:
Technical users
● To upload time events from the external time recording system you use the RPTCC106 report ( HR-PDC:
Download Upload Request for Time Events). You normally schedule the report as a background processing
job. For this you require a technical user. The authorizations of the technical user should be based on the
authorizations for the PT80 transaction ( Subsystem Connection). Time events are uploaded from the
subsystem by an IDOC, which stores the time events in the CC1TEV interface table. For the upload, you need a
technical user with authorizations for communication with an SAP system using Application Link Enabling
(ALE) and the relevant table authorizations. The technical user does not require authorizations specific to the
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 675SAP HR solution. You need a technical user with authorizations for the PT45 transaction ( HR-PDC: Post
Person Time Events) for the background processing job that transfers the time events from the interface table
to the relevant Time Management tables.
● You need two types of technical users for BAPIs that store data in one of the following interface tables:
○ PTEXDIR
○ PTEX2000
○ PTEX2003
○ PTEX2010
To fill the interface tables, you need a user with authorizations for ALE communication with an SAP system and
the relevant table authorizations. For the subsequent background processing job to transfer data from the
interface tables to the infotype database tables, you need a technical user with the same authorizations that are
required for the CAT6 transaction ( Transfer Time Data to Time Management).
● For technical users that have read access to the infotypes for the BAPIs, you can use the same authorizations
as contained in the SAP_HR_PT_TIMEADMINISTRATOR role.
13.13.6.1.3 Authorizations
Use
The SAP Personnel Time Management component uses the authorization concept provided by SAP NetWeaver
AS ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver
AS Security Guide ABAP also apply to SAP Personnel Time Management.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the ABAP.
For more information about how to create roles, see Role Administration under Role and Authorization Concept for
SAP Personnel Time Management.
Standard Roles
The table below shows the standard roles that are used by the SAP Personnel Time Management.
Table 407:
Role Description
SAP_HR_PT_SHIFT-PLANNER Shift Planner
SAP_HR_PT_TIME-ADMINISTRATOR Time Administrator
SAP_HR_PT_TIME-LABOR-ANALYST Time and Labor Analyst
SAP_HR_PT_TIME-MGMT-SPECIALIST Time Management Specialist
SAP_HR_PT_TIME-SUPERVISOR Time Supervisor
SAP_ESSUSER_ERP05 Employee Self-Service
Security Guide for SAP S/4HANA 1709
676 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_HR_PT_US_PS_TIME-ADM Time Recording Administrator
This role is used only in the Public Sector in the country ver
sion for the USA
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by SAP Personnel Time
Management.
Table 408:
Authorization Object Field Value Description
P_PERNR AUTHC E, R Used to assign different au
thorizations to users for ac
cessing their own personnel
number. P_PERNR is relevant
for Self-Service Scenarios
(Role SAP_EMPLOYEE)
P_PERNR INFTY 0000, 0001, 0002, 0007, Infotypes required
0416, 2001, 2002, 2003,
2004, 2005, 2006, 2007,
2010, 2011, 2012, 2013
P_ORGIN AUTHC E, R Used during the authorization
check for HR infotypes.
P_ORGIN INFTY 0000, 0001, 0002, 0007, Infotypes required
0416, 2001, 2002, 2003,
2004, 2005, 2006, 2007,
2010, 2011, 2012, 2013
P_PCLX AUTHC W, R Relevant for both Time Evalu
ation and Time Recording.
P_PCLX RELID B1, B2, L1, G1, PC Clusters required
13.13.6.1.4 Data Storage Security
Archiving Objects and Reports
The following tools and reports are available for archiving data:
● Archiving Object: PA_TIME (Time Evaluation Results from Cluster B2)
● Data Writing Report: RPAR5W00
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 677● Data Deletion Report: RPAR5D00
Archiving is done using transactions PU22 and SARA respectively.
Data Deletion Reports
The following tools and reports are available for deleting data:
RPTEXTPT: Using the DELETE option deletes the data already transferred (stored in PA-tables) from the following
interface tables:
● PTEX2000
● PTEX2010
● PTEX2003GEN
● PTEX2003SPEC
RPWI4100: Reorganizes interface table LSHR (Integration to Logistics).
Using Logical Paths and File Names to Protect Access to the File System
Personnel Time Management saves data in files in the local file system. Therefore, it is important to assign explicit
access to the corresponding files in the file system without access to other directories or files (also called
directory traversal). This is achieved by entering logical paths and file names in the system that are assigned to
the physical paths and file names. This assignment is validated at runtime. If access to a directory is requested
that does not correspond to a stored assignment, an error occurs.
The following lists show the logical file names and paths that are used by Personnel Time Management, and the
reports for which these file names and paths are valid. The logical file names and logical file paths were created
using transaction FILE to facilitate the validation of physical file names.
Table 409: Logical File Names and Path Names Used in Personnel Time Management
Logical File Name Reports That Use These Logical File Logical File Path
Names
HR_XX_DIR_RPTEDO00 RPTEDO00 HR_XX_DIR_RPTEDO00
HR_XX_DIR_RPTEUP00 RPTEUP00 HR_XX_DIR_RPTEUP00
HR_XX_DIR_RPTEUP10 RPTEUP10 HR_XX_DIR_RPTEUP10
HR_XX_DIR_RPTEZL00 RPTEZL00 HR_XX_DIR_RPTEZL00
HR_XX_DIR_RPTX2010 RPTX2010 HR_XX_DIR_RPTX2010
HR_XX_DIR_RPWI0000 RPWI0000 HR_XX_DIR_RPWI0000
Security Guide for SAP S/4HANA 1709
678 P U B L I C SAP S/4HANA Business Applications13.13.6.2 Cross-Application Time Sheet (CA-TS)
13.13.6.2.1 User Administration and Authentication
The Cross-Application Time Sheet (CA-TS) uses the user management and authentication mechanisms provided
with the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server for ABAP. Therefore, the
security recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Application Server for ABAP also apply to the Cross-Application Time Sheet (CA-TS) In addition to
these guidelines, we include information about user administration and authentication that specifically applies to
the Cross-Application Time Sheet (CA-TS) in the following topics:
● User Management
This topic lists the tools to use for user management, the types of users required, and the standard users that
are delivered with the Cross-Application Time Sheet (CA-TS).
● Integration into Single Sign-On Environments
This topic describes how the Cross-Application Time Sheet (CA-TS) supports Single Sign-On mechanisms.
13.13.6.2.1.1 User Management
User management for the Cross-Application Time Sheet (CA-TS) uses the mechanisms provided with the SAP
NetWeaver Application Server for ABAP, for example, tools, user types, and password policies. For an overview of
how these mechanisms apply for the Cross-Application Time Sheet (CA-TS), see the sections below.
User Administration Tools
The table below shows the tools to use for user management and user administration with the Cross-Application
Time Sheet (CA-TS).
Table 410: User Management Tools
Tool Detailed Description Prerequisites
User and Role Maintenance (transaction You can use the Role Maintenance trans
PFCG) action PFCG to generate profiles for the
Cross-Application Time Sheet (CA-TS)
users.
For more information, see User and Role
Administration of AS ABAP.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 679Tool Detailed Description Prerequisites
Technical Settings for User Management For more information on user profiles
in Cross-Application Time Sheet (CA- and the roles, see Customizing for Time
TS) Sheet under Settings for All User
Interfaces Authorizations .
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively have to change their passwords on a regular basis,
but not those users under which background processing jobs run.
The user types that are required for the Cross-Application Time Sheet (CA-TS) include:
● Individual users:
○ Dialog users are used to maintain, release, and approve working times. They are used for SAPGUI and WD
ABAP Frontends
● Technical users:
○ System User: Background processing and communication within a system (such as RFC users for ALE,
Workflow). They are used for transferring data to target components, to check data remotely, and to
process workflow items.
○ Communication users are used for scenarios in which CATS BAPIs are called from external systems.
For more information on these user types, see User Types under User Authentication in the SAP NetWeaver
Application Server for ABAP Security Guide.
Standard Users
We do not deliver standard users within Cross-Application Time Sheet (CA-TS).
13.13.6.2.1.2 Integration into Single Sign-On Environments
The most widely-used supported mechanisms are listed below. For a complete list, see the link provided below.
● Secure Network Communications (SNC)
SNC is available for user authentication and provides for a single sign-on (SSO) environment when using the
SAP GUI for Windows or Remote Function Calls.
● SAP logon tickets
Cross-Application Time Sheet (CA-TS) supports the use of logon tickets for SSO when using a Web browser
as the frontend client. In this case, users can be issued a logon ticket after they have authenticated
themselves with the initial SAP system. The ticket can then be submitted to other systems (SAP or external
Security Guide for SAP S/4HANA 1709
680 P U B L I C SAP S/4HANA Business Applicationssystems) as an authentication token. The user does not need to enter a user ID or password for
authentication but can access the system directly after the system has checked the logon ticket.
● Client certificates
As an alternative to user authentication using a user ID and passwords, users using a Web browser as a
frontend client can also provide X.509 client certificates to use for authentication. In this case, user
authentication is performed on the Web server using the Secure Sockets Layer Protocol (SSL Protocol) and
no passwords have to be transferred. User authorizations are valid in accordance with the authorization
concept in the SAP system.
● Security Assertion Markup Language (SAML) 2.0
SAML 2.0 provides a standards-based mechanism for SSO. The primary reason to use SAML 2.0 is to enable
SSO across domains.
The Cross-Application Time Sheet (CA-TS) supports the Single Sign-On (SSO) mechanisms provided by SAP
NetWeaver. Therefore, the security recommendations and guidelines for user administration and authentication
as described in the SAP NetWeaver Secuirty Guide also apply to the Cross-Application Time Sheet (CA-TS).
For more information about the available authentication mechanisms, see user Authentication and Single Sign-On
in the SAP NetWeaver Library.
13.13.6.2.2 Authorizations
Use
The Cross-Application Time Sheet (CA-TS) uses the authorization concept provided by the SAP NetWeaver AS
for ABAP and AS Java. Therefore, the recommendations and guidelines for authorizations as described in the SAP
NetWeaver AS Security Guide ABAP and SAP NetWeaver AS Security Guide Java also apply to the Cross-
Application Time Sheet (CA-TS).
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine''s
user administration console on the AS Java.
Note
For more information about how to create roles, see section Role Administration under the SAP Library for SAP
S/4 HANA Identity Management.
The following section shows the typical scenarios, the relevant roles and the authorization objects that Cross-
Application Time Sheet (CA-TS) uses. These are:
Enter Working Times in Time Sheet
Approve Working Times
Transfer Working Times to Target Components
Role and Authorization Concept for Cross-Application Time Sheet (CA-TS)
Enter Working Times
Standard Roles
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 681The table below shows the standard roles that are used by the Cross-Application Time Sheet (CA-TS).
Table 411:
Role Description
SAP_HR_PT_TIME-ADMINISTRATOR Time Administrator: The Time Administrator role is performed
by employees in the individual departments of a company,
such as secretaries and foremen. Their duties include entering
employees'' documents in the system and reacting to mes
sages from time evaluation.
SAP_EMPLOYEE_WDA_1 (This includes single role SAP_EM Employee Self-Service (WD ABAP): You need this role if you
PLOYEE_XX_ESS_WDA_1 containing authorizations for CATS) want to enable all your company''s employees to record their
working times.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by the Cross-Application Time
Sheet (CA-TS).
Table 412:
Authorization Object Field Value Description
P_PERNR AUTHC E, R Used to assign users different
authorizations for accessing
their own personnel number.
P_PERNR is relevant for Self
Service Scenarios (Role
SAP_EMPLOYEE)
P_PERNR INFTY 0000, 0001, 0002, 0007, Needed infotypes
0315, 0316, 2001, 2002,
2003, 2010
P_ORGIN AUTHC E, R Used during the authorization
check for HR infotypes. P_OR
GIN is relevant for Adminis
trator Scenarios (Role
AP_HR_PT_TIME-ADMINIS
TRATOR, SAP_ISR_RE
TAIL_STORE)
P_ORGIN INFTY 0000, 0001, 0002, 0007, Needed infotypes
0315, 0316, 2001, 2002,
2003, 2010
Security Guide for SAP S/4HANA 1709
682 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
P_PCLX AUTHC R Relevant for both Self Service
and Adminstrator Scenarios,
used when attendance/
absence types are recorded
and to display target hours.
P_PCLX RELID B2, PC Needed clusters
Approve Working Times
Standard Roles
The table below shows the standard roles that are used by the Cross-Application Time Sheet (CA-TS).
Table 413:
Role Description
SAP_HR_PT_TIME-SUPERVISOR The Time Supervisor role is performed by executive employ
ees in the individual departments of a company, such as those
with personnel responsibility, department heads, project man
agers, or foremen.
The Time Supervisor plans and approves leave and alterations
to working times. He or she orders overtime as required, and
regularly monitors the amount of overtime worked in the de
partment. He or she checks and approves employees'' activity
reports, and monitors absence times.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by the Cross-Application Time
Sheet (CA-TS).
Table 414:
Authorization Object Field Value Description
P_ORGIN AUTHC D, R http://help.sap.com/
erp2005_ehp_02/
helpdata/en/
35/26b181afab52b9e100000
09b38f974/content.htmAu
thorizationobject that is
used during the authorization
check for HR infotypes.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 683Authorization Object Field Value Description
P_ORGIN INFTY 0328, 2001, 2002 Needed infotypes
Transfer Working Times to Target Components
Standard Roles
The table below shows the standard roles that are used by the Cross-Application Time Sheet (CA-TS).
Table 415:
Role Description
SAP_HR_PT_TIME-MGMT-SPECIALIST The time management specialist is responsible for the smooth
operation of the time management system. He or she is famil
iar with the technical side of the SAP System. The time man
agement activities for this role include controlling the transfer
of data to other SAP applications, such as the transfer of data
from the SAP Cross-Application Time Sheet.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by the Cross-Application Time
Sheet (CA-TS).
Table 416:
Authorization Object Field Value Description
P_ORGIN No proposal No proposal
P_PERNR No proposal No proposal
PCLX No proposal No proposal
13.13.6.2.3 Session Security Protection
To prevent access in javascript or plug-ins to the SAP logon ticket and security session cookie(s), we recommend
activating secure session management.
We also highly recommend using SSL to protect the network communications where these security-relevant
cookies are transferred.
Security Guide for SAP S/4HANA 1709
684 P U B L I C SAP S/4HANA Business ApplicationsSession Security Protection on the AS ABAP
To prevent access in javascript or plug-ins to the SAP logon ticket and security session cookie(s)
(SAP_SESSIONID__), activate secure session management. With an existing security session, users
can then start applications that require a user logon without logging on again. When a security session is ended,
the system also ends all applications that are linked to this security session.
Use the transaction SICF_SESSIONS to specify the following parameter values shown in the table below in your
AS ABAP system:
Table 417: Session Security Protection Profile Parameters
Profile Parameter Recommended Value Comment
icf/set_HTTPonly_flag_on_cookies 0 Client-Dependent
login/ticket_only_by_https 1 Not Client-Dependent
For more information and detailed instructions, see Activating HTTP Security Session Management on AS ABAP in
the AS ABAP security documentation.
13.13.6.2.4 Network and Communication Security
Your network infrastructure is extremely important in protecting your system. Your network needs to support the
communication necessary for your business needs without allowing unauthorized access. A well-defined network
topology can eliminate many security threats based on software flaws (at both the operating system and
application level), or network attacks such as eavesdropping. If users cannot log on to your application or
database servers at the operating system or database layer, there is no way for intruders to compromise the
machines and gain access to the backend system''s database or files. Additionally, if users are not able to connect
to the server LAN (local area network), they cannot exploit well-known bugs and security holes in network
services on the server machines.
The network topology for the Cross-Application Time Sheet (CA-TS) is based on the topology used by the SAP
NetWeaver platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver
Security Guide also apply to the Cross-Application Time Sheet (CA-TS). Details that specifically apply to the
Cross-Application Time Sheet (CA-TS) are described in the following topics:
● Communication Channel Security
This topic describes the communication paths and protocols used by the Cross-Application Time Sheet (CA-
TS).
● Network Security
This topic describes the recommended network topology for the Cross-Application Time Sheet (CA-TS). It
shows the appropriate network segments for the various client and server components, and where to use
firewalls for access protection. It also includes a list of the ports needed to operate the Cross-Application
Time Sheet (CA-TS).
● Communication Destinations
This topic describes the information needed for the various communication paths, for example, which users
are used for which communications.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 685For more information, see the following sections in the SAP NetWeaver Security Guide:
● Network and Communication Security
● Security Guides for Connectivity and Interoperability Technologies
13.13.6.2.4.1 Communication Channel Security
The table below shows the communication channels used by the Cross-Application Time Sheet (CA-TS), the
protocol used for the connection, and the type of data transferred.
Table 418:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Front-end client that uses DIAG All customizing data, applica Passwords
SAP GUI for Windows for the tion data entered by Non-WD
application server applications
Front-end client that uses a RFC, HTTP(S) Application data entered by Passwords
Web browser for the applica WD applications and Web
We recommend you use
tion server Services
HTTPS.
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer (SSL) protocol.
Note
We strongly recommend using secure protocols (SSL, SNC) whenever possible.
For more information, see Transport Layer Security in the SAP NetWeaver Security Guide.
13.13.6.2.4.2 Network Security
You can operate Cross-Application Time Sheet (CA-TS) in different ways. You can run the Cross-Application Time
Sheet (CA-TS) and the HR system and or cProject system integrated on one system, or on different instances.
Firewall Settings
For more information, see Using Firewall Systems for Access Control in the SAP NetWeaver Security Guide.
For more information, see Using Multiple Network Zones in the SAP NetWeaver Security Guide.
Security Guide for SAP S/4HANA 1709
686 P U B L I C SAP S/4HANA Business ApplicationsPorts
The Cross-Application Time Sheet (CA-TS) runs on SAP NetWeaver and uses the ports from the AS ABAP.
For more information, see the topic for AS ABAP Ports in the corresponding SAP NetWeaver Security Guides.
For other components, for example, SAPinst, SAProuter, or the SAP Web Dispatcher, also see the document
TCP/IP Ports Used by SAP Applications, which is located on the SAP Service Marketplace at http://
service.sap.com/ under Products Database & technology Security Infrastructure Security .
13.13.6.2.4.3 Communication Destinations
Use
The table below shows an overview of the communication destinations used by the Cross-Application Time Sheet
(CA-TS).
Table 419:
Destination Delivered Type User, Authorizations Description
Cross-Application Time No RFC Anonympus dialog user Customizing: Time
Sheet (CA-TS) to Hu specified in connec Sheet → Settings for All
man Resources Man tions between both User
agement systems
Interfaces → Data
Transfer
for Distributed Systems
(ALE)
Cross-Application Time No RFC Anonympus dialog user Customizing: Time
Sheet (CA-TS) to cPro specified in connec Sheet → Settings for All
jects tions between both User Interfaces → Data
systems Transfer
for Distributed Systems
(ALE)
WD Java Frontend to Yes RFC/JCo See Customizing Customizing:
Cross-Application Time Integration with Other
Sheet (CA-TS) SAP Components →
Business Packages /
Functional Packages→
Manager Self Service
(mySAP ERP).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 687Destination Delivered Type User, Authorizations Description
External consumer/ No HTTP(S) and SOAP Specific dialog user Cross-Application Time
external Web UI to messages Sheet (CA-TS) acts as
Cross-Application Time service provider.
Sheet (CA-TS)
13.13.6.2.5 Data Storage Security
The Cross-Application Time Sheet (CA-TS) data is saved in databases of the SAP system as follows:
Table 420:
Data Location
Application Data CATSDB
Attachments and user-defined texts SAPScript storage
Templates CATS_TEMP
Transfer data for HR PTEX2000, PTEX2010, PTEXDIR
Transfer data for CO CATSCO
Transfer data for PS CATSPS
Transfer data for PM CATSPM
Transfer data for MM-SRV CATSMM
Transfer data for cPro DPR_CONF_LI
13.13.6.2.6 Enterprise Services Security
The following chapters in the SAP NetWeaver Security Guide and documentation are relevant for all enterprise
services delivered with Cross-Application Time Sheet (CA-TS):
● Web Services Security
● Recommended WS Security Scenarios
● SAP NetWeaver Process Integration Security Guide
Security Guide for SAP S/4HANA 1709
688 P U B L I C SAP S/4HANA Business Applications13.13.6.2.7 Security-Relevant Logging and Tracing
Cross-Application Time Sheet (CA-TS) relies on the logging and tracing mechanisms from SAP NetWeaver:
● Auditing and Logging
● Tracing and Logging
13.13.6.2.8 Services for Security Lifecycle Management
The following services are available from Active Global Support to assist you in maintaining security in your SAP
systems on an ongoing basis.
Security Chapter in the EarlyWatch Alert (EWA) Report
This service regularly monitors the Security chapter in the EarlyWatch Alert report of your system. It tells you:
● Whether SAP Security Notes have been identified as missing on your system.
In this case, analyze and implement the identified notes, if possible. If you cannot implement the notes, the
report should be able to help you decide on how to handle the individual cases.
● Whether an accumulation of critical basis authorizations has been identified.
In this case, verify whether the accumulation of critical basis authorizations is okay for your system. If not,
correct the situation. If you consider the situation okay, you should still check for any significant changes
compared to former EWA reports.
● Whether standard users with default passwords have been identified on your system.
In this case, change the corresponding passwords to non-default values.
Security Optimization Service (SOS)
The Security Optimization Service can be used for a more thorough security analysis of your system, including:
● Critical authorizations in detail
● Security relevant configuration parameters
● Critical users
● Missing security patches
This service is available as a self service within the SAP Solution Manager or as a remote or on-site service. We
recommend you use it regularly (for example, once a year) and in particular after significant system changes or in
preparation of a system audit.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 689Security Configuration Validation
The Security Configuration Validation can be used to continuously monitor a system landscape for compliance to
predefined settings, for example, from your company-specific SAP Security Policy. This primarily covers
configuration parameters, but it also covers critical security properties like the existence of a non-trivial Gateway
configuration or making sure standard users do not have default passwords.
Security in the RunSAP Methodology / Secure Operations Standard
With the E2E Solution Operations Standard Security service, a best practice recommendation is available on how
to operate SAP systems and landscapes in secure manner. It guides you through the most important security
operation areas and links to detailed security information from SAP''s knowledge base wherever appropriate.
More Information
For more details on these services see
● EarlyWatch Alert: http://service.sap.com/ewa
● Security Optimization Service / Security Notes Report: http://service.sap.com/sos
● Comprehensive list of Security Notes: http://service.sap.com/securitynotes
● Configuration Validation: http://service.sap.com/changecontrol
● RunSAP Roadmap, including the Security and the Secure Operations Standard: http://
service.sap.com/runsap (See the RunSAP chapters 2.6.3, 3.6.3 and 5.6.3)
13.14 SAP S/4HANA LoB Products for specific Industries
13.14.1 Agriculture
13.14.1.1 Agricultural Contract Management
Security Guide for SAP S/4HANA 1709
690 P U B L I C SAP S/4HANA Business Applications13.14.1.1.1 Authorizations
SAP S/4HANA Industry solution for Agricultural Contract Management uses the authorization concept provided
by SAP NetWeaver AS for ABAP. Therefore, the recommendations and guidelines for authorizations as described
in the SAP NetWeaver AS Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used by the Agricultural Contract Management.
Table 421:
Role Description
SAP_BR_MASTER_DATA_ACM Master Data Specialist (ACM)
SAP_BR_OPERATION_CLERK_ACM Operations Clerk (ACM)
SAP_BR_SETTLEMENT_CLERK_ACM Settlement Clerk (ACM)
SAP_BR_TRADER_ACM Trader (ACM)
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by the Agricultural Contract
Management.
Table 422:
Authoriza Field Value Description
tion Object
/ACCGO/ASG ACTVT (Activity) 01 - Add or Create Value Schedule
/ACCGO/LOC (TSW Location) 02 - Change Assignment to TSW
Location
03 - Display
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 691Authoriza Field Value Description
tion Object
/ACCGO/CPE BUKRS (Company Code) 01 - Add or Create Commodity Pricing
WERKS Engine Integration
(Plant) 02 - Change
ACTVT (Activity) 06 – Delete
/ACCGO/DIS ACTVT (Activity) 16 - Execute Online Pricing
Distributions
/ACCGO/GDC ACTVT (Activity) 01 - Add or Create Global Derived
02 - Change Characteristics
03 - Display
/ACCGO/IR BUKRS (Company Code) N/A Invoice Router
WERKS (Plant)
EKORG (Purchasing Organization)
OIJ_LOC (Location ID)
/ACCGO/LIN ACTVT (Activity) 01 - Add or Create Lien
02 - Change
03 - Display
/ACCGO/NEG /ACCGO/NKY (Tree Control: Node Key) 01 - Add or Create Manual Application
ACTVT Workcenter - Node Key
(Activity) 02 - Change
03 - Display
Security Guide for SAP S/4HANA 1709
692 P U B L I C SAP S/4HANA Business ApplicationsAuthoriza Field Value Description
tion Object
/ACCGO/NEY EKORG (Purchasing Organization) Application Activities Manual Application
PRCTR Workcenter - Common
(Profit Center) Example Fields
WERKS (Plant) 01 - Create
VKORG (Sales Organization) 02 - Change
VTWEG (Distribution Channel) 03 - Display
SPART(Division) 04 - Manual Selection of
Contract
BUKRS (Company Code)
05 - Propose Contract
/ACCGO/DTY (Application Document
Type) 06 - Link to Contract, and so on.
/ACCGO/APL (Application Activities) For more information, see the fixed val
ues for the corresponding domain /
/ACCGO/SID (Side) ACCGO/D_APPL_ACTIVITIES.
Side
M - Purchasing
V - Sales/Distribution
/ACCGO/NSS WERKS (Plant) Side Non-Standard Settlement
BUKRS M - Purchasing
(Company Code)
/ACCGO/SID V - Sales/Distribution
(Side)
Non-Standard Settlement Activities
/ACCGO/NSA (Non-Standard
Settlement Activities) 01 - Create Washout
02 - Create Circle
03 - Create Cancellation
04 - Display Washout/Circle
05 - Create Underfill
/ACCGO/OE ACTVT (Activity) 02 - Change Orchestration Framework
03 - Display and Back-to-Back
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 693Authoriza Field Value Description
tion Object
/ACCGO/RRP BUKRS (Company Code) 03 - Display Revenue Recognition and
PRCTR 10 - Post Purchase Realization
(Profit Center)
VKORG (Sales Organization)
EKORG (Purchasing Organization)
ACTVT (Activity)
SPART(Division)
VTWEG (Distribution Channel)
EKGRP (Purchasing Group)
/ACCGO/SPM /ACCGO/APL (Application Activities) Application Activities Contract Application Spot
/ACCGO/DTY Monitor
(Application Document Example
Type) 01 - Create
WERKS (Plant) 02 - Change
03 - Display
04 - Manual Selection of
Contract
05 - Propose Contract
06 - Link to Contract, and so on.
For more information, see the fixed val
ues for the corresponding domain /
ACCGO/D_APPL_ACTIVITIES.
Security Guide for SAP S/4HANA 1709
694 P U B L I C SAP S/4HANA Business ApplicationsAuthoriza Field Value Description
tion Object
/ACCGO/STL BUKRS (Company Code) Side Contract Settlement
TCTYP M - Purchasing
(Trading Contract: Trading
Contract Type) V - Sales/Distribution
WERKS (Plant) Settlement Activities for Authorization
Check
PRCTR (Profit Center)
VKORG (Sales Organization) Example
01 - Create/Generate
VTWEG (Distribution Channel) Settlement
SPART (Division) 02 - Change/Adjust Settlement
EKORG (Purchasing Organization) 03 - Display Settlement
/ACCGO/SID (Side) 04 - Release Settlement
/ACCGO/STL (Settlement Activities for 05 - Approve Settlement
Authorization Check)
06 - Reverse Settlement, and so
on.
For more information, see the fixed val
ues for the corresponding domain /
ACCGO/D_STL_ACTIVITIES.
/ACCGO/TOL ACTVT (Activity) 01 - Add or Create Tolerance Schedule
02 - Change
03 - Display
/ACCGO/UI /ACCGO/NOD (Tree Control: Node Key) N/A Common UI Node Access
/ACCGO/LEF (Tree Control: Leaf Key)
/ACCGO/UIC ACTVT (Activity) Example Set Up Load Data
Capture
01 - Add or Create
02 - Change
03 - Display
04 - Print, edit messages
05 - Lock
06 - Delete, and so on.
For more information, see the permitted
activities for the authorization object /
ACCGO/UIC.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 695Authoriza Field Value Description
tion Object
/ACCGO/UIS WERKS (Plant) LDC Activity Load Data Capture
/ACCGO/UIS (LDC Activity) Example
01 - Create/Change LDC
02 - Display LDC
03 - Create Weights
04 - Change Weights
05 - Create Analysis
06 - Change Analysis, and so on.
For more information, see the fixed val
ues for the corresponding domain /
ACCGO/D_UIS_ACTIVITY.
/ACCGO/VAL ACTVT (Activity) 01 - Add or Create Value Schedule
02 - Change
03 - Display
06 – Delete
/ACCGO/VOL ACTVT (Activity) 01 - Add or Create Volume Schedule
02 - Change
03 - Display
06 – Delete
13.14.2 Automotive
13.14.2.1 Vehicle processes for Wholesale and Retail
Security Guide for SAP S/4HANA 1709
696 P U B L I C SAP S/4HANA Business Applications13.14.2.1.1 Authorizations
Vehicle Processes for Wholesale and Retail uses the authorization concept provided by the SAP NetWeaver AS for
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 423:
Authorization Object Description
C_AUTO_VMS Vehicle Management System (VMS): Controls whether a user
is allowed to execute VMS actions
C_AUTO_DPV Dealer Portal VMS: Controls whether a user is allowed to exe
cute dealer portal functions, for example, create a sales order
without a vehicle
13.14.2.1.2 Deletion of Personal Data
Use
The Vehicle Management System (VMS) might process data (personal data) that is subject to the data protection
laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the
blocking and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on
the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data
Protection .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 697Relevant Application Objects and Available Deletion Functionality
Table 424:
Application Provided Deletion Functionality
Vehicle Management System (IS-A-VMS) Archiving Object
VEHICLE
ILM Object
VEHICLE
Relevant Application Objects and Available EoP/WUC functionality
Table 425:
Application Implemented Solution (EoP or WUC) Further Information
Vehicle Management System (IS-A- EoP Check table
VMS)
VLCVEHICLE
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
13.14.3 Banking
13.14.3.1 SAP Business Partner for Financial Services (FS-BP)
The security policy with SAP Business Partner for Financial Services (FS-BP) is very similar to the security policy
with the central SAP Business Partner (SAP BP).
Security Guide for SAP S/4HANA 1709
698 P U B L I C SAP S/4HANA Business Applications13.14.3.1.1 Authorizations
You create roles in Customizing for SAP Banking under SAP Business Partner for Financial Services General
Settings Business Partner Basic Settings Authorization Management .
The authorization objects are the responsibility of the SAP Business Partner. SAP Financial Customer Information
Management (FS-BP) is only responsible for the following authorization objects:
● T_BP_DEAL (Standing Instructions/Transactions)
You can use this authorization object to control the company code-dependent authorizations for displaying/
creating/changing standing instructions.
There are standing instructions for:
○ Payment details
○ Derived flows
○ Correspondence
○ Transaction authorizations
● B_BUPA_SLV (Selection Variant for Total Commitment)
A selection variant includes various settings for the total commitment (such as which business partner roles
and relationships can be used for the selection, or whether detailed information can be displayed).
If you activate the SACF scenario FSBP_RATINGS (FS-BP:Scenario for Ratings and Credit Standing Data) in the
Workbench for Switchable Authorization Check Scenarios (transaction SACF), the following FS-BP authorization
objects are also available:
● B_BUPA_RAT (Business Partner: Ratings)
You can use this authorization object to check whether a user has the authorization to create, change, display,
or delete rating procedures. For each rating procedure, you can differentiate between an authorization for a
permitted period or an authorization for any period. The prerequisite for this is that you have made the
settings for the periods in Customizing for SAP Banking under SAP Business Partner for Financial Services
Settings for Financial Services General Settings Ratings/Credit Standing Ratings Set Rating
Procedures and Ratings .
● B_BUPA_CRS (Business Partner: Credit Standing Data)
You can use this authorization object to check whether a user has the authorization to display and change
credit standing data.
13.14.3.1.2 Network and Communication Security
In the case of Total Commitment, SAP ERP communicates with other SAP systems (such as Account
Management (FS-AM)). Communication with non-SAP systems is also possible.
Communication takes place using Remote Function Call (RFC).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 69913.14.3.1.2.1 Communication Destinations
Depending on the scenario, an RFC user is required for communication via Remote Function Call (RFC).This user
requires the appropriate authorizations for the target system (such as FS-CML or FS-AM).
13.14.3.1.3 Data Storage Security
The authorization object B_CCARD controls access to the credit card information that is stored in the business
partner. This control falls under the area of responsibility of the central SAP Business Partner.
You can use authorization groups (authorization object B_BUPA_GRP) to protect employee data.
If you activate the SACF scenario FSBP_RATINGS (FS-BP:Scenario for Ratings and Credit Standing Data) in the
Workbench for Switchable Authorization Check Scenarios (transaction SACF), the following FS-BP authorization
objects are also available:
● B_BUPA_RAT (Business Partner: Ratings)
● B_BUPA_CRS (Business Partner: Credit Standing Data)
Related Information
Authorizations [page 699]
13.14.3.2 Bank Customer Accounts (BCA)
13.14.3.2.1 Authorizations
The following standard roles are available in Bank Customer Accounts (BCA):
Table 426:
Role Name
SAP_ISB_ACCOUNTS_ADMIN_AG SAP Banking BCA: Administrator in Account Management
SAP_ISB_ACCOUNTS_ASSISTANT_AG SAP Banking BCA: Assistant in Account Management
SAP_ISB_ACCOUNTS_STAFF_AG SAP Banking BCA: Clerical Staff in Account Management
For more information on authorization management and the authorization objects in Bank Customer Accounts,
see the product assistance documentation, under Enterprise Business Applications Finance SAP Banking
Security Guide for SAP S/4HANA 1709
700 P U B L I C SAP S/4HANA Business ApplicationsBank Customer Accounts (BCA) General Subjects Authorization Administration , and its subtopic
Authorization Objects.
Bank Customer Accounts (BCA) also contains the following business transaction events on the subject of
authorizations:
Table 427:
Business Transaction Event Name
SAMPLE_INTERFACE_00011040 AUTH1 account
SAMPLE_INTERFACE_00011700 Authorization checks/authorization type
SAMPLE_INTERFACE_00010950 Check management
SAMPLE_INTERFACE_00010210 Payment item dialog
SAMPLE_INTERFACE_00010410 Payment order dialog
SAMPLE_INTERFACE_00010411 Standing order dialog
13.14.3.2.2 Network and Communication Security
Bank Customer Accounts (BCA) communicates with the following external systems:
● Payment transaction systems
● Interest income tax
● Financial Accounting (FI) , if Financial Accounting (FI) runs on another system
Encrypt communication with external systems in accordance with the SAP standards.
Communication with all external systems is performed via Remote Function Call (RFC).
13.14.3.2.3 Data Storage Security
The security of sensitive objects such as savings accounts and checking accounts is guaranteed by the general
authorization concept of Bank Customer Accounts (BCA).
For employee accounts, the following security mechanisms are available in addition to the general authorization
concept:
The following special authorization objects
F_EMAC_MTH
F_EMAC_TRN
The following special field modification criterion of the Business Data Toolset (BDT)
FMOD1
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 701This criterion is applied to employee accounts.
Using Logical Path and Filenames to Protect Access to the File System
The Bank Customer Accounts (BCA) application saves data in files in the file system. Therefore, you must provide
access to the corresponding files in the file system without allowing access to other directories or files (also
known as directory traversal).
You can do this by specifying logical paths and file names in the system that map to the physical paths and file
names. The system validates this mapping at runtime and if access is requested to a directory that does not
match a defined mapping, then the system issues and error message.
The following lists the logical file names and paths used by Bank Customer Accounts (BCA) and the programs for
which these file names and paths apply:
Logical File Names Used in This Application
The following logical file names have been created to enable the validation of physical file names:
BKK_PAYMEX_DE_DTA_FILE
Program using this logical file name:
RFBKPAYMEX_DE_DTA
Parameters used in this context: None
BKK_PAYMIN_DE_DTA_FILE
Program using this logical file name:
RFBKPAYMIN_DE_DTA
RFBKPAYMINREST_DE_DTA
RFBKPAYMINREV_DE_DTA
Parameters used in this context: None
Logical File Paths Used in This Application
The logical file name BKK_PAYMEX_DE_DTA_FILE uses the logical file path BKK_PAYMEX_DE_DTA.
The logical file name BKK_PAYMIN_DE_DTA_FILE uses the logical file path BKK_PAYMIN_DE_DTA.
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
Security Guide for SAP S/4HANA 1709
702 P U B L I C SAP S/4HANA Business Applications13.14.3.2.4 Deletion of Personal Data in IS-B-BCA
Use
The Bank Customer Accounts (IS-B-BCA) component might process data (personal data) that is subject to the
data protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 428:
Application Detailed Description Provided Deletion Functionality
BKK For more information, see SAP Note BKK_BUPA_EVENT_EOP_CHECK
2023415 . ILM object FIBA_BUPA
BKK For more information, see Archiving or ILM objects:
Destroying Bank Customer Accounts ● BKKPRENOTE
Data, and SAP Note 2023417 . ● FIBA_ACCNT
● FIBA_EFTEX
● FIBA_EFTIN
● FIBA_ENRCH
● FIBA_EVLIM
● FIBA_HIERA
● FIBA_HOLD
● FIBA_ITEM
● FIBA_ORDER
● FIBA_STORD
● FIBA_TERM
Available Check
Implemented Solution: End of Purpose Check
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 703Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in
Customizing for Cross-Application Components under Data Protection.
13.14.3.2.5 Specific Read Access Log Configurations
Use
In Read Access Logging (RAL), you can configure which read-access information to log and under which
conditions. SAP delivers sample configurations for applications.
The scenario Payment Document Display/Change/Create (Tx WZR(1/2/3)) in Settlement Management (LO-AB)
logs data in order to record any access to banking data related to a customer or a vendor. You can find the
configurations as described in the Read Access Logging [page 29] chapter.
In the following configurations, fields are logged in combination with additional fields, in the following business
contexts:
Table 429:
Configuration Fields Logged Business Context
LOAB_BANK KOMWBRD-BANKL Bank Keys
LOAB_BANK KOMWBRD-BANKN Bank account number
LOAB_BANK KOMWBRD-BANKS Bank country key
LOAB_BANK KOMWBRD-BKONT Bank country key
LOAB_BANK KOMWBRD-BKREF Reference specifications for bank details
LOAB_BANK KOMWBRD-DTAMS Instruction key for data medium ex
change
LOAB_BANK KOMWBRD-DTAWS Indicator for Data Medium Exchange
13.14.3.3 Loans Management (FS-CML)
Security Guide for SAP S/4HANA 1709
704 P U B L I C SAP S/4HANA Business Applications13.14.3.3.1 Authorizations
Authorization management for mortgage loans is based on the existing authorization concept in Loans
Management (FS-CML ).
The authorization check is performed according to the principle of inclusion, that is to say, if a user has
authorization to activate a business transaction, he or she also has authorization to delete it. The authorization for
making a posting includes the authorization for making a cancellation.
If other functions are called from a business transaction, the relevant authorization check is performed in this
business transaction before the other function is accessed. This avoids any termination of the functions that are
being called.
To set up your authorization management for mortgage loans, you can use the following roles included in the
delivery scope:
Table 430:
Role Name Scope
Loans Officer SAP_CML_LOANS_OFFICER ● Create, change, display, delete busi
ness partner
● Collateral value calculation, credit
standing calculation and decision-
making
● Maintain objects and securities
● Create contracts, or transfer from
application or offer
● Enter disbursements
● Process correspondence
● Release loan (colleague or superior)
● Process business operations (such
as charges, individual posting, pay
off)
Credit Analyst SAP_CML_CREDIT_ANALYST ● Create, change, display, delete busi
ness partner
● Maintain loan enquiries, applica
tions and offers
● Calculate credit standing
● Decision-making
● Maintain limits
● Calculate the collateral value
● Maintain objects and securities
Rollover Officer SAP_CML_ROLLOVER_OFFICER ● Loan rollover (individual and mass)
● Process correspondence
● Management of rollover file
● Maintain condition tables
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 705Role Name Scope
Staff Accountant for Loans SAP_CML_STAFF_ACCOUNTANT ● Post transactions
● Clearing
● Create payments
● Post and monitor incoming pay
ments
● Process waivers and write-offs
● Cancellation
● Accrual/deferral
● Valuation
● Generating accounting reports
Manager of Loans Department SAP_CML_DEPARTM_MANAGER ● Release
● Maintain condition tables
● Change limits
● Risk analysis
● Monitor file (rollover or process
management)
● Monitor portfolio and portfolio trend
using reports; reports and queries
Product Administrator SAP_CML_PRODUCT_ADMIN ● Update reference interest rates
● Maintain condition tables
● Maintain new business tables
Technical Administrator SAP_CML_TECHNICAL_ADMIN ● Perform mass runs (such as mass
print run), set status of plan to com
pleted, post planned records
● Currency conversion
● Update reference interest rates and
currency rates
● Reorganization and data archiving
● Define queries, drilldown reporting
forms and reports
● Maintain performance parameters
● Analyze change pointers
● Define export interfaces
You can assign these roles to the users in your company. Do not make any changes to the original roles, as these
changes would be overwritten by the standard settings when the system is upgraded.
If you want to make adjustments, copy these roles. To do so, in the SAP Easy Access menu, choose Tools
Administration User Maintenance Role Administration Roles . Here you can group together authorizations
for consumer loans into your own defined roles, and assign these to users in your departments, for example. In
the first step you maintain the role menu. You can structure this yourself by adding and, if necessary, renaming
files, transactions, and reports. In addition to manually grouping together the relevant transactions, you can also
Security Guide for SAP S/4HANA 1709
706 P U B L I C SAP S/4HANA Business Applicationstransfer these from the SAP menu or another role. You then maintain the authorizations for your role. The system
proposes certain authorizations and their characteristics. You can also add more objects. Then you need to
generate the authorization profile. Finally, you maintain the users who are to have the authorizations contained in
the role. You can also use elements from organizational management, such as position in the organization. The
advantage here is that you do not have to maintain the user assignment individually in each role if a person
changes jobs. You can also use this function in release.
13.14.3.3.2 Network and Communication Security
Loans Management (FS-CML) does not communicate with other systems.
The only exception is the loan origination process. In this process, CRM serves as the entry system, and FS-CML
as the back-end system. Communication takes place by means of XI.
13.14.3.3.3 Data Storage Security
The security of sensitive data in Loans Management (such as loan contracts, consumer loans, collateral values,
credit standing calculations, collateral) is guaranteed by the general authorization concept of Loans Management
(FS-CML).
It is possible to display business partner data from Loans Management. You can use the authorization concept of
central SAP Business Partner to protect this data.
For more information about authorizations and security of data storage in SAP Business Partner, see SAP Service
Marketplace at service.sap.com/securityguide SAP NetWeaver Security Guide Security Guides for the SAP
NetWeaver Products SAP NetWeaver Application Server Security Guide SAP NetWeaver AS Security Guide
for ABAP Technology Security Aspects When Using Business Objects SAP Business Partner Security .
Using Logical Path and Filenames to Protect Access to the File System
The Loans Management (FS CML) application saves data in files in the file system. Therefore, you must provide
access to the corresponding files in the file system without allowing access to other directories or files (also
known as directory traversal).
You can do this by specifying logical paths and file names in the system that map to the physical paths and file
names. The system validates this mapping at runtime and if access is requested to a directory that does not
match a defined mapping, then the system issues and error message.
The following lists the logical file names and paths used by Loans Management (FS CML) and the programs for
which these file names and paths apply:
Logical File Names Used in This Application
The following logical file names have been created to enable the validation of physical file names:
● CML_PAYMENT_US
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 707● Program using this logical file name:
● RFVD_AUTODRAFT_PROCESS
● RFVD_PAY_STOP
● Parameters used in this context: None
● CML_CREDIT_BUREAU
● Program using this logical file name:
● RFVD_CBR_PROCESS
● Parameters used in this context: None
● CML_MIGRATION_OBJECTS_LOGFILE_IN
● Program using this logical file name:
● RFVOBJ01
● Parameters used in this context: None
● CML_MIGRATION_OBJECTS_LOGFILE_OUT
● Program using this logical file name:
● RFVOBJ01
● RFVOBJ01_CREATE_STRUCTURE
● Parameters used in this context: None
● CML_MIGRATION_OBJECTS_PHYSFILE_IN
● Program using this logical file name:
● RFVOBJ01
● Parameters used in this context: None
● CML_MIGRATION_OBJECTS_PHYSFILE_OUT
● Program using this logical file name:
● RFVOBJ01
● RFVOBJ01_CREATE_STRUCTURE
● Parameters used in this context: None
● CML_MIGRATION_COLLATERALS_LOGFILE_IN
● Program using this logical file name:
● RFVSIC01
● Parameters used in this context: None
● CML_MIGRATION_COLLATERALS_LOGFILE_OUT
● Program using this logical file name:
● RFVSIC01
● RFVSIC01_CREATE_STRUCTURE
● Parameters used in this context: None
● CML_MIGRATION_COLLATERALS_PHYSFILE_IN
● Program using this logical file name:
● RFVSIC01
● Parameters used in this context: None
● CML_MIGRATION_COLLATERALS_PHYSFILE_OUT
● Program using this logical file name:
● RFVSIC01
● RFVSIC01_CREATE_STRUCTURE
● Parameters used in this context: None
Security Guide for SAP S/4HANA 1709
708 P U B L I C SAP S/4HANA Business ApplicationsLogical File Paths Used in This Application
● The logical file names CML_PAYMENT_US and CML_CREDIT_BUREAU use the logical file path CML_ROOT.
● The logical file names CML_MIGRATION_OBJECTS_LOGFILE_IN,
CML_MIGRATION_OBJECTS_LOGFILE_OUT, CML_MIGRATION_OBJECTS_PHYSFILE_IN,
CML_MIGRATION_OBJECTS_PHYSFILE_OUT, CML_MIGRATION_COLLATERALS_LOGFILE_IN,
CML_MIGRATION_COLLATERALS_LOGFILE_OUT, CML_MIGRATION_COLLATERALS_PHYSFILE_IN and
CML_MIGRATION_COLLATERALS_PHYSFILE_OUT use the logical file path CML_MIGRATION
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
13.14.3.3.4 Deletion of Personal Data in FS-CML
Use
The Consumer Mortgage Loans (FS-CML) component might process data (personal data) that is subject to the
data protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 431:
Application Object Detailed Description Provided Deletion Functionality
CMLCONTRCT Loan Master Data Archiving object CMLCONTRCT
ILM object CMLCONTRCT
CMLMODCALC Model Calculation Archiving object CMLMODCALC
ILM object CMLMODCALC
CMLCRSTND Credit Standing Calculation Destruction object CML_CRSTAND
CALC_DESTRUCTION
ILM object CML_CRSTANDCALC_DE
STRUCTION
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 709Application Object Detailed Description Provided Deletion Functionality
CMLINTPAR Interested Party Destruction object CML_INTEREST
PARTY_DESTRUCTION
ILM object CML_INTERESTPARTY_DE
STRUCTION
CMLCOLLATE Collaterals Destruction object CMLCOLLATE
ILM object CMLCOLLATE
CMLCOLOBJ Collateral Objects Destruction object CMLCOLOBJ
ILM object CMLCOLOBJ
Relevant Application Objects and Available EoP functionality
Table 432:
Application Object Implemented Solution (End of Purpose Further Information
Check)
CMLCONTRCT Loan Master Data FLBP_CONTR_EVENT_EOP_CHECK
CMLMODCALC Model Calculation FLBP_MODEL
CALC_EVENT_EOP_CHECK
CMLCRSTND Credit Standing Calculation FLBP_CR_STND_EVENT_EOP_CHECK
CMLINTPAR Interested Party FLBP_INT_PAR_EVENT_EOP_CHECKN
CMLCOLLATE Collaterals FLBP_COLLTRL_EVENT_EOP_CHECK
CMLCOLOBJ Collateral Objects FLBP_COLLOBJ_EVENT_EOP_CHECK
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in
Customizing for Cross-Application Components under Data Protection.
13.14.3.4 Collateral Management (CM)
Purpose
Security Guide for SAP S/4HANA 1709
710 P U B L I C SAP S/4HANA Business ApplicationsThe purpose of this guide is to explain the security-specific features built-in for the SAP Collateral Management
( CM ).
To understand the security features provided in CM, you must read the SAP Netweaver Application Server
security guide ( service.sap.com ) that describes the basic security aspects and measures for SAP systems.
13.14.3.4.1 Authorizations
A multitude of standard roles are shipped with SAP Collateral Management ( CM ) in the SAP ECC 6.0. These roles
are of exemplary character. The standard roles must be modified by the Customers based on their requirements.
Note
The Customers must not use the standard roles in their production systems only with some medications. It is
advisable without any modifications. Use the Profile Generator (transaction PFCG) to identify the standard
roles and create additional roles.
The following roles are available in CM for banks:
Table 433:
Role Purpose
SAP_FS_CMS_DISPLAY_ALL Displaying all the entity objects in CM .
SAP_FS_CMS_MAINTAIN_ALL Maintaining (Create, change and display only) all entity ob
jects.
SAP_FS_CMS_MAINTAIN_ALL_PRC Executing all the process related activities in addition to main
tenance of objects
SAP_FS_CMS_CUST_ALL Customizing
SAP_FS_CMS_ADMIN CM administrator role
SAP_FS_CMS_COL_AUDITOR Maintaining all the entity objects and the access to run all the
reports in CM.
SAP_FS_CMS_CREDIT_MANAGER Displaying collateral objects and collateral agreements.
SAP_FS_CMS_CREDIT_RISK_MANAGER Maintaining collateral objects and collateral agreements and
displaying receivables.
SAP_FS_CMS_LIQUIDATION_OFFICER Maintaining liquidation measures.
Authorization Objects in CM
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 711Table 434:
Technical name Name
CMS_PCN_02 Authorization for activities (change request mode)
CMS_PCN_01 Authorization for activities (normal mode)
CMS_OMS1 Authorization for all collateral objects other than real estate
(replace CMS_OMS from ECC 6.0 onwards
CMS_OMS Authorization for all collateral objects other than real estate
(obsolete from ECC 6.0 onwards)
CMS_CAG Authorization object for collateral agreements
CMS_RE Authorization object for real estate objects in CM.
CMS_RBL Authorization object for receivable in CM.
Characteristic Based Authorizations
In the Collateral Management, all the objects must belong to an administration organizational unit. The
authorization objects for collateral objects(real estate and other collateral objects) and collateral agreements are
based on a combination of the administration organizational unit and the entity type(assigned using a process
control key). For receivables, the authorizations are based on the receivable organizational unit, the receivable
status and the product. Authorizations for receivables is valid only for the receivables created in the CM or even
the local copies of the receivables in external credit systems.
Note
For example, you can use the attribute administration organization unit to differentiate between employee ,VIP
and normal customers objects. You can also create objects in these organizational units as characteristics,
which can then also be used to protect application data.
13.14.3.4.2 Network Communication and Security
The table below shows the communication paths used by the SAP Collateral Management ( CM ), the protocol
used for the connections and the type of data transferred.
Table 435:
Communication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
Financial Customer Informa RFC Business partner master data
tion System (FS- Business
Partner)
Security Guide for SAP S/4HANA 1709
712 P U B L I C SAP S/4HANA Business ApplicationsCommunication Path Protocol Used Type of Data Transferred Data Requiring Special Pro
tection
SAP Document Management RFC Document data
System (DMS)
Loans Management (CML) RFC Loan data
SAP Business Information IDoc and RFC Collateral agreements, collat
Warehouse (BIW) eral objects, charges, collat
eral agreement – receivable
assignment and calculations
data
SAP Bank Analyzer ( Basel II) IDoc and RFC Collateral agreements, collat
eral objects, charges, collat
eral agreement – receivable
assignment andcalculations
data
The following RFC connections have to be set up for operating the CM . You are advised not to create the users
belonging to these as dialog users.
● RFC communication with the Tool BW
● RFC communication within the Tool BW
● RFC communication in the context of import methods for the client copy. The relevant authorization objects
are:
● S_TABU_DIS; S_RS_ICUBE; S_RS_ADMWB; S_RS_ISOUR; S_BTCH_ADM; S_ADMI_FCD; S_BTCH_JOB;
S_RS_ODSO; S_RS_ISET
CM provides the following business application programming interfaces (BAPIs) for allowing external systems to
connect to it:
● BAPI_CM_AST_GET_MULTI
● BAPI_CM_CAG_CREATE
● BAPI_CM_CAG_GETDETAIL_MULTI
● BAPI_CM_CAG_GET_BY_RBL
● BAPI_CM_GENLNK_RBL_ON_RBL_01
● BAPI_CM_GENLNK_RBL_ON_RBL_02
● BAPI_CM_SEC_GETDETAIL_MULTI
● BAPI_CM_RE_GETDETAIL_MULTI
● BAPI_CM_RIG_GETDETAIL_MULTI
● BAPI_CM_MOV_GETDETAIL_MULTI
BAPIs are standard SAP interfaces and are important in the technical integration and in exchange of business
data between SAP components and between the SAP and non-SAP components. BAPIs enable you to integrate
these components. They are therefore an important part of developing integration scenarios where multiple
components are connected to each other, either on a local network or on the internet.
BAPIs allow integration at the business level and not at the technical level. This provides for greater stability of the
linkage and independence from the underlying communication technology.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 713The current requirement for BAPIs in CM caters mainly to the migration scenarios. Hence these BAPIs are not
protected by special authorizations. Authorization checks for BAPIs can be provided (in the future releases), if
there are requirements for them.
CM also provides an extensive enhancement concept that offers user exits in the form of Business Add-Ins
(BADIs).
Network Security and Communication Channels
Collateral Management ( CM ) uses the same communication channels that are described in the SAP NetWeaver
AS security guide. No further customer-specific communication channels are provided. Hence the aspects and
actions described in the SAP NetWeaver AS security guide (such as use of SAPRouter in combination with
Firewall, use of Secure Network Communication (SNC), Communication Front-End-Application Server,
connection to the database) also apply for CM .
13.14.3.5 Reserve for Bad Debt (FS-RBD)
13.14.3.5.1 Authorizations
The authorization concept used by Reserve for Bad Debt (RBD) is the same as the SAP authorization concept.
The authorization checks in RBD differentiate between the following dimensions:
● Activities
You use the activity to control what a user is permitted to do.
● Organization
At the level of the RBD-specific objects RBD Area or Organizational Unit, you specify which data the user is
permitted to display or edit in accordance with the activity.
Standard Profiles
Preconfigured standard roles are not shipped with RBD. The following standard profiles are shipped with the SAP
system:
Table 436: Standard Profiles
Role Description
S_A.SYSTEM Access authorizations for the basis system only
Security Guide for SAP S/4HANA 1709
714 P U B L I C SAP S/4HANA Business ApplicationsRole Description
S_A.ADMIN Access authorizations for administration of the operational
SAP system, but without access authorization for the follow
ing areas:
● ABAP/4 Development Workbench
● Maintenance of super users
● Maintenance of standard profiles beginning with “S_A”
S_A.DEVELOP Access authorizations for users who work with ABAP/4 Devel
opment Workbench
S_A.CUSTOMIZ Access authorizations for basis settings in the Customizing
system
S_A.USER Access authorizations for end users (without access authori
zation for SAP work areas)
Authorization Objects
The following authorization objects are shipped with Reserve for Bad Debt (RBD).
Table 437: RBD Authorization Objects
Object Description Authorization Field Authorization Field Authorization Field
Activity RBD Area Organizational Unit
RBD_CUST RBD: Customizing 16(Execute) Not relevant Not relevant
RBD_EDIT RBD: Dialog & Batch 01 (Add or Create) According to Customiz According to Customiz
02 ing (table /IBS/ ing (table /IBS/
(Change)
CRB_RBD_P) CRB_ORGEIN)
03 (Display)
05 (Lock)
10 (Post)
66 (Update)
85 (Reverse)
86 (Transfer Post)
91 (Reactivate)
95 (Unlock)
H1 (Deactivate)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 715Object Description Authorization Field Authorization Field Authorization Field
Activity RBD Area Organizational Unit
RBD_REPO RBD: Reporting Not relevant According to Customiz According to Customiz
ing (table /IBS/ ing (table /IBS/
CRB_RBD_P) CRB_ORGEIN)
/IBX/EDIT IPX: Dialog & Batch 02 (Change) According to Customiz Not relevant
03 ing (table /IBS/
(Display)
CRB_RBD_P)
06 (Delete)
10 (Post)
21 (Transfer Valuation)
23 (Maintain)
41 (Delete on
Database)
43 (Release)
46 (Aggregate
Valuation)
60 (Import)
69 (Delete Valuation)
71 (Analyze)
78 (Assign)
85 (Reverse)
93 (Calculate)
94 (Override)
Caution
For the RBD Area and Organizational Unit authorization fields, you can use the wildcard symbol “*”. If you use
the wildcard symbol, access authorization is not checked for the relevant authorization field.
Example
Description in relation to these authorization objects:
● The assignment of authorization object RBD_CUST with activity 16 gives the user authorization to use the
function RBD Tool Customizing: Duplicate Account Determination (/IBS/MRB_CUST_KTOFI).
● The assignment of authorization object RBD_EDIT with activity 01 and RBD area 0001 enables a user to
display the data for an RBD account in RBD area 0001.
Security Guide for SAP S/4HANA 1709
716 P U B L I C SAP S/4HANA Business Applications● The assignment of authorization object RBD_EDIT with activity 02, RBD area 0002, and organizational unit
London enables a user to change the data for an RBD account in RBD area 0002 that is assigned to the
organizational unit London.
However, if the user is not assigned any other access authorizations, he or she cannot change an RBD
account from RBD area 0002 that is assigned to the organizational unit “Tokyo”.
● The assignment of authorization object RBD_EDIT with activities 02 and 10 and RBD area 0003 enables a
user to create and post planned records for an RBD account in RBD area 0003.
However, a prerequisite for this is that the principle of multiple control for posting planned records (risk
provision proposals) has not been activated in Customizing for RBD.
● The assignment of authorization object RBD_REPO with RBD area “*” and organizational unit “*” allows a
user to display the RBD data for all RBD areas and all organizational units using the reports in the RBD
information system.
Use of RBD Authorization Objects
Table 438: RBD Area Menu, Account Management Folder
Transaction Object (Activity) RBD Area + Organizational Unit
Create RBD Account /IBS/ RBD_EDIT (01) Relevant + Relevant
RB_KTO_INS
Change RBD Account /IBS/ RBD_EDIT (02, 05, 10, 85, 95, H1) Relevant + Relevant
RB_KTO_UPD
Display RBD Account /IBS/ RBD_EDIT (03) Relevant + Relevant
RB_KTO_DIS
Reactivate RBD Account /IBS/ RBD_EDIT (91) Relevant + Relevant
RB_KTO_REACT
Balance Sheet Transfer RBD /IBS/ RBD_EDIT (Not relevant) Not relevant+Not relevant
RB_RECLAS
ECF: Balance Sheet Transfer /IBS/ RBD_EDIT (86) Relevant +Not relevant
RB_ECF_RECLAS
ECF: Contract Reallocation /IBS/ RBD_EDIT (86) Relevant +Not relevant
RB_REALLOC RBD_REPO (Not relevant) Relevant +Not relevant
ECF: Manual Contract Manage RBD_EDIT (01, 02, 03) Relevant +Not relevant
ment /IBS/RB_MANCON
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 717Table 439: RBD Area Menu, Information System Folder
Transaction Object (Activity) RBD Area + Organizational Unit
Worklist - Processor /IBS/ RBD_REPO (Not relevant) Relevant + Relevant
RB_WORKLIST and /IBS/ RBD_EDIT (Not relevant) Not relevant+Not relevant
RB_WORKLIST_SEL
Monitoring - Planned Record RBD_REPO (Not relevant) Not relevant+ Relevant
Change /IBS/RB_MAN_PLAN_CHG RBD_EDIT (Not relevant) Not relevant+ Relevant
Decision Template for Past Analy RBD_REPO (Not relevant) Not relevant+Not relevant
sis /IBS/RB_PROPRES_HGB S_GUI (61) Not relevant+Not relevant
Decision Template for Future Analy RBD_REPO (Not relevant) Not relevant+Not relevant
sis /IBS/RB_PROPRES_IAS S_GUI (61) Not relevant+Not relevant
Decision Template for ECF Proce RBD_REPO (Not relevant) Not relevant+Not relevant
dure /IBS/RB_PROPRES_ECF S_GUI (61) Not relevant+Not relevant
Reporting Function /IBS/ RBD_REPO (Not relevant) Not relevant+Not relevant
RB_REPORTING
Development List /IBS/RB_DEVL RBD_REPO (Not relevant) Relevant + Relevant
Development List per Source System RBD_REPO (Not relevant) Relevant + Relevant
Contract /IBS/RB_DEVL_SINGLE
Individual Document Table - Source Sys Not relevant Not relevant+Not relevant
tem /IBS/MRB_VS_SALDO
Posting Log /IBS/RB_LOG_POST RBD_EDIT (03) Relevant +Not relevant
S_APPL_LOG (03)
● Drilldown Reporting with Referen RBD_REPO (Not relevant) Relevant +Not relevant
ces /IBS/RB_REF
● IRP: Filling Report for ECF
Gate /IBS/RB_ECF_FILL
● IVA: List of Notes for Multiple
Source Systems /IBS/RB_HINTM
Table 440: RBD Area Menu, Flat-Rate Value Adjustment Procedure Folder
Transaction Object (Activity) RBD Area + Organizational Unit
FVA: Fill RBD Gate for FS-CML /IBS/ Not relevant Not relevant+Not relevant
RB_FILL_GATE
Security Guide for SAP S/4HANA 1709
718 P U B L I C SAP S/4HANA Business ApplicationsTransaction Object (Activity) RBD Area + Organizational Unit
FVA: Enrich RBD Gate /IBS/ RBD_REPO (Not relevant) Relevant +Not relevant
RB_GATE_MODIFY
FVA: Update Run /IBS/RB_PWV_UPD RBD_EDIT (10) Relevant +Not relevant
FVA: Update Run (PPF) /IBS/ RBD_EDIT (10) Relevant +Not relevant
RB_PWV_UPD_PPF
Table 441: RBD Area Menu, Periodic Processing Folder
Transaction Object (Activity) RBD Area + Organizational Unit
IVA: Update Run - Past Analysis /IBS/ RBD_EDIT (10) Relevant + Relevant
RB_EWB_UPD
● IVA: Filling Report - Future Analy RBD_EDIT (02) Relevant + Relevant
sis /IBS/RB_IAS_FILL
● IVA: Update Run - Future Analy
sis /IBS/RB_IAS_UPD
● IVA: Update Run - Future Analysis
(PPF) /IBS/RB_IAS_UPD_PPF
● IVA: Unwinding Run - Future Analy
sis /IBS/RB_IAS_UPD_UNW
● IVA: Posting Run - Future Analy RBD_EDIT (10) Relevant + Relevant
sis /IBS/RB_IAS_POST
● IVA: Posting Run - Future Analysis
(PPF) /IBS/RB_IAS_POST_PPF
● IVA: Unwinding Posting Run - Fu
ture Analysis /IBS/
RB_IAS_POST_UNW
● IRP: Filling Report for ECF RBD_EDIT (02) Not relevant+Not relevant
Gate /IBS/RB_ECF_FILL
● IRP: Deletion Report for ECF Not relevant Not relevant+Not relevant
Gate /IBS/RB_ECF_CLEAR
● IRP: ECF Update Run /IBS/ RBD_EDIT (02, 10) Relevant +Not relevant
RB_ECF_UPDATE
● IRP: ECF Update Run (PPF) /IBS/
RB_ECF_UPD_PPF
● IRP: ECF Unwinding Run /IBS/
RB_ECF_UPD_UNW
● IRP: ECF Unwinding Run
(PPF) /IBS/RB_UNW_PPF
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 719Transaction Object (Activity) RBD Area + Organizational Unit
IRP: ECF Creation Process /IBS/ RBD_EDIT (02) Relevant +Not relevant
RB_ECF_A_CREATE
Table 442: RBD Area Menu, Administration Folder
Transaction Object (Activity) RBD Area + Organizational Unit
RBD: Assign Administrator /IBS/ RBD_EDIT (02) Not relevant+Not relevant
RB_ASSIGN_CO
RBD: Automatic Account Crea RBD_REPO (Not relevant) Relevant +Not relevant
tion /IBS/RB_ACC_CREATION
IVA: Initialization - Future Analy RBD_EDIT (02) Relevant + Relevant
sis /IBS/RB_IAS_UPD_INIT
IRP: ECF Initialization Run /IBS/ RBD_EDIT (02, 10) Relevant +Not relevant
RB_ECF_UPD_INIT
IRP: ECF Initialization (PPF) /IBS/ RBD_EDIT (02, 10) Relevant +Not relevant
RB_ECF_INIT_PPF
Table 443: RBD Area Menu, Impairment Processing Extension - Environment Folder
Transaction Object (Activity) RBD Area
Upload Files /IBX/FILE_UPLOAD /IBX/EDIT (60) Not relevant
Maintain Import Data /IBX/IMP_CHNG /IBX/EDIT (43, 60) Not relevant
Main Dialog /IBX/MAIN /IBX/EDIT (03, 10, 94) Not relevant
Restrict Data Selection /IBX/ Not relevant Not relevant
SELECTION
Table 444: RBD Area Menu, Impairment Processing Extension - Processes Folder
Transaction Object (Activity) RBD Area
Start Migration/IBX/MIGRATION /IBX/EDIT (10, 78, 93) Not relevant
Import CSV Files /IBX/IMPORT /IBX/EDIT (60) Not relevant
Refine Imported Data /IBX/ /IBX/EDIT (60, 93) Not relevant
IMP_REFINE
Delete Import Data /IBX/IMP_DELETE /IBX/EDIT (06) Not relevant
Start Impairment Categorization /IBX/ /IBX/EDIT (78) Not relevant
IC_ASSIGN
Security Guide for SAP S/4HANA 1709
720 P U B L I C SAP S/4HANA Business ApplicationsTransaction Object (Activity) RBD Area
Start Impairment Calculation /IBX/ /IBX/EDIT (93) Not relevant
CALCULATION
Delete Open Valuations /IBX/ /IBX/EDIT (69) Not relevant
VALUA_DELETE
Compress Open Valuations /IBX/ /IBX/EDIT (46) Not relevant
VALUA_COMPRESS
Transfer Simulated Valuations /IBX/ /IBX/EDIT (21) Not relevant
VALUA_TRANSFER
Display Logs /IBX/COCKPIT Not relevant Not relevant
Definition of Customer-Specific Roles
The following information is required for the definition of customer-specific roles:
● SAP logon names of all employees who are to work with RBD
● Relevant transactions that are to be executed in the respective role
● Relevant activities that are to be executed within the relevant transactions
● RBD areas and organizational units affected
To avoid having to define a separate role for each employee, we recommend that you form groups of employees
that are permitted to execute the same functions. You can then assign a defined role to all of the employees in the
group.
13.14.3.5.2 Network and Communication Security
Depending on the risk provision method used and analysis horizon, the Reserve for Bad Debt (FS-RBD)
application communicates with the following systems:
● SAP Loans Management for Banking, Suite Edition (FS-CML)
● SAP Deposits Management for Banking, Suite Edition (IS-B-BCA)
● SAP Deposits Management for Banking (FS-AM)
● SAP Collateral Management for Banking, Suite Edition (FS-CMS)
● SAP General Ledger Accounting (FI-GL)
Communication takes place using Remote Function Call (RFC).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 72113.14.3.5.2.1 Communication Destinations
For Remote Function Call (RCF) connections to SAP Deposits Management for Banking (FS-AM), technical users
are required.
These technical users require read authorization, for example, to read balances and account master data.
13.14.3.5.3 Trace and Log Files
Trace or log files are created during processing. These can contain security-relevant information such as master
data, balances, and flow data from source system contracts.
13.14.4 Higher Education and Research
13.14.4.1 Authorizations
The SAP ECC Industry Extension Higher Education & Research component uses the authorization
concept provided by SAP NetWeaver. Therefore, the recommendations and guidelines for authorizations as
described in the SAP NetWeaver Security Guides also apply to the SAP ECC Industry Extension Higher
Education & Research component. The SAP NetWeaver authorization concept is based on assigning
authorizations to users based on roles. For role maintenance, use the profile generator (transaction PFCG) when
using ABAP technology and the User Management Engine''s user administration console when using Java.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used by SAP Student Lifecycle Management (SLCM).
Table 445:
Role Description
Composite Roles
Security Guide for SAP S/4HANA 1709
722 P U B L I C SAP S/4HANA Business ApplicationsRole Description
SAP_CM_ADM_COORDINATOR Admission coordinator
SAP_CM_ADM_OFFICER Admission officer
SAP_CM_ASM_COORDINATOR Assessment coordinator
SAP_CM_ASM_OFFICER Assessment officer
SAP_CM_STREC_COORDINATOR Student records coordinator
SAP_CM_STREC_OFFICER Student records officer
Single Roles
SAP_CM_ACCOUNT_DATA_UPDATE Technical user for automatic update of student account data
after changes to account-relevant student master data
SAP_CM_ADMIN_ACAD_STRUCTURE Administrator for the academic structure (internal single role)
SAP_CM_ADMOFF_STUDYDATA Activities for the admission coordinator
SAP_CM_ADMREGDATA_DISP Display study data
SAP_CM_ALL
SAP_CM_ASMCO_ADDACT Additional activities for the assessment coordinator
SAP_CM_ASMDATA_DISP Display progression and grades
SAP_CM_ASMOFF_ACT Activities for the assessment officer
SAP_CM_STMASTERDATA_DISP Display student master data
SAP_CM_STMASTERDATA_MAINT Edit student master data
SAP_CM_STRCO_ADDACT Additional activities for the student records coordinator
SAP_CM_ASMDATA_DISP Display progression and grades
SAP_CM_ASMOFF_ACT Activities for the assessment officer
SAP_CM_STMASTERDATA_DISP Display student master data
SAP_CM_STMASTERDATA_MAINT Edit student master data
SAP_CM_STRCO_ADDACT Additional activities for the student records coordinator
SAP_CM_STROFF_ACT Activities for the student records coordinator
SAP_CM_MODULEBOOK Module booking (only up to release CM 4.72)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 723Role Description
SAP_CM_REGIST Activities for registration (only up to release CM 4.72)
SAP_CM_STUDENTMASTER Student master data processing (only up to release CM 4.72)
All of the above roles are automatically generated by the system.
Note
SAP_IQ_CAMPUS and SAP_CM_ALL are critical roles because they contain a comprehensive authorization for all
Student Lifecycle Management functions. The following roles are obsolete as of the SAP ECC Industry
Extension Higher Education & Research 6.0 release:
● SAP_IQ_CAMPUS
● SAP_CM_MODULEBOOK
● SAP_CM_REGIST
● SAP_CM_STUDENTMASTER
Standard PFCG Roles in SAP Student Lifecycle Management
If a user does not want to use the portal role, you can choose the PFCG role option. The SLCM application
provides the following PFCG roles:
Table 446:
Name of PFCG Role Relevance to NWBC Relevance to Portal Role
SAP_SR_ACADEMIC_ADVISOR_5 NWBC role for advisor Equivalent to the portal role Academic
Advisor
SAP_SR_UNIVERSITY_INSTRUCTOR_5 NWBC role for university instructor No equivalent portal role available
SAP_SR_STUDENT_5 NWBC role for student Equivalent portal role Student
Once you configured these roles you can access the applications attached to the role using SAP NetWeaver
Business Client. You can use these as entry points to the different applications that can be accessed by the
academic advisor, the instructor or the student.
Security Guide for SAP S/4HANA 1709
724 P U B L I C SAP S/4HANA Business ApplicationsStandard Authorization Objects
If a user does not want to use the portal role, you can choose the PFCG role option. The SLCM application
provides the following PFCG roles:
Table 447:
Authorization Object Description
P_CM_AUDCT Student Lifecycle Management: requirement catalogs
P_CM_AUDIT Audits
P_CM_AUDPR Requirement profile
P_CM_CORR Correspondence
P_CM_FCDOC Student accounting document
P_CM_PROC Activity
P_CM_UCAS Authorization Object Student Lifecycle Management UCAS
(only for Great Britain)
P_CM_UCASR Authorization Object Student Lifecycle Management UCAS
for Reports (only for Great Britain)
P_CM_NLPAY NL Payment Details Authorization Object
P_CM_NLVER NL Verification Authorization Object
Basic Authorizations in SAP Student Lifecycle Management
There are three important authorization objects within SLCM to simplify authorization assignment: :
● S_TCODE
S_TCODE checks whether a user is allowed to start a given transaction. Every time the user starts a menu
command or a transaction code using the command line, the roles assigned to the user are checked to see
whether the user has the authority to execute this transaction.
● PLOG
PLOG checks whether a user is allowed to read, write or insert specific HR Infotypes.
● P_CM_PROC
P_CM_PROC checks whether a user has the authority for a specific Student Lifecycle Management process.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 725Structural Authorizations in SAP Student Lifecycle Management
Structural authorizations enable you to define the set of objects the user is authorized to process. You determine
these objects using evaluation paths. For example, you can define whether the user receives a display
authorization or a maintenance authorization for these objects.
● Evaluation Paths
An evaluation path is an instruction for the system that determines which object types and relationships are
to be included in an evaluation of the organizational plan. It describes the chain of relationships that exist
between objects in a hierarchical structure. The report takes into account only the objects that lie along the
specified evaluation path.
● Organizational Structure
One or more relationships are then used as paths to evaluate structural information in your organizational
plan (relating to the organizational or reporting structures) or matrix organization. The sequence of the
relationships included in the evaluation path is decisive in how the results of the evaluation are displayed.
Note
As functions of other applications areas, for example, Training and Event Management, Notification Processing
or Student Accounting are integrated into SLCM, users also need authorizations for these areas.
Note
SLCM contains a number of single roles, which you can combine with the roles of other application areas to
create composite roles. You can either assign a composite role or individual roles to users.
Authorizations in Business Rule Framework plus (BRFplus)
To handle the BRFplus security, the standard authorizations are available in the BRFplus framework.
For more information, see application help for Business Rule Framework plus (BRFplus) in SAP Library for SAP
NetWeaver on SAP Help Portal at http://help.sap.com/netweaver SAP NetWeaver 7.0 (2004s) SAP
Netweaver 7.0 including Enhancement Package 3 SAP NetWeaver SAP NetWeaver by Key Capability
Application Platform by Key Capability Business Services Business Rule Framework plus (BRFplus)
Concepts Authorizations
13.14.4.2 Deletion of Personal Data
Use
The student administration of the Student Lifecycle Management application might process data (personal
data) that is subject to the data protection laws applicable in specific countries as described in SAP Note
1825544. The SAP Information Lifecycle Management (ILM) component supports the entire software lifecycle
Security Guide for SAP S/4HANA 1709
726 P U B L I C SAP S/4HANA Business Applicationsincluding the storage, retention, blocking, and deletion of data. The Student Lifecycle Management (SLCM)
solution uses SAP ILM to support the blocking and deletion of personal data as described in the following sections.
SAP delivers an end of purpose check (EoP) for the students registered in the SLCM application. SAP delivers a
end-of-purpose check (EOP) for the blocking of business partner data if the SLCM application has a student linked
to a business partner. All applications register either an end of purpose check (EoP) in the Customizing settings
for the blocking and deletion of the business partner data or a where-used check (WUC). n.
You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion of personal data.
For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at http://
help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
End of Purpose Check (EoP)
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. . This check determines whether data is still relevant for business activities based on
the retention period defined for the data. The retention period of data consists of the following phases:
● Phase one: The relevant data is actively used.
● Phase two: The relevant data is actively available in the system.
● Phase three: The relevant data needs to be retained for other reasons.
For example, processing of data is no longer required for the primary business purpose, but to comply with legal
rules for retention, the data must still be available. In phase three, the relevant data is blocked. Blocking of data
prevents the business users of SAP applications from displaying and using data that may include personal data
and is no longer relevant for business activities. Blocking of data can impact system behavior in the following
ways:
● Display: The system does not display blocked data.
● Change: It is not possible to change a business object that contains blocked data.
● Create: It is not possible to create a business object that contains blocked data.
● Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a business
object that contains blocked data.
● Search: It is not possible to search for blocked data or to search for a business object using blocked data in
the search criteria.
It is possible to display blocked data if a user has special authorization; however, it is still not possible to create,
change, copy, or perform follow-up activities on blocked data. For information about the configuration settings
required to enable this three-phase based end of purpose check, see the Process Flow and Configuration:
Simplified Blocking and Deletion.
End of Purpose Check (EoP) in SLCM
The end-of-purpose check for SLCM is a simple check to ensure data integrity in the event of potential blocking. It
checks whether there is any dependent data for a business partner that is a student in the SLCM application and
returns one of the following statuses:
● If the business partner is not a student the system returns status as ‘1’ (No business with business partner).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 727● If the business partner exists as a student in the SLCM system, then the system checks for the SORT (Start of
retention time), and depending on the date,returns the status ‘2’ (business is ongoing ) or ‘3’ (business is
complete).
The system does not block the business partner related to the student if the status is ''3'', business is ongoing .
Relevant Application Objects and Available Deletion Functionality
Table 448:
Application Detailed Description Provided Deletion Functionality
PSCM Student Lifecycle Management: Public HRIQ_ATTDNData Destruction in Stu
Sector Campus Management dent Lifecycle Management
Relevant Application Objects and Available EoP/WUC functionality
Table 449:
Application Implemented Solution (EoP or WUC) Further Information
PSCM EoP implemented EoP checks if the business for the stu
dent and related business partner is
complete or ongoing.
Process Flow
1. Before archiving data, you must first define residence time and retention periods in SAP Information
Lifecycle Management (ILM).
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available.
3. You do the following:
○ Run transaction IRMPOL and enter the required retention policies for the central business partner (ILM
object: CA_BUPA).
○ Run transaction BUPA_PRE_EOP to enable the end of purpose check function for the central business
partner.
○ Run transaction IRMPOL and maintain the required residence and retention policies for the customer
master and vendor master in SAP ERP (ILM objects: HRIQ_STMD).
○ Run transaction CVP_PRE_EOP to enable the end of purpose check function for the customer master and
vendor master in SAP ERP .
4. Business users can request unblocking of blocked data for customers, vendors and central business partners
by using the transaction BUP_REQ_UNBLK.
Security Guide for SAP S/4HANA 1709
728 P U B L I C SAP S/4HANA Business Applications5. 5.If you have the necessary authorizations, you can unblock data by running the transaction BUPA_PRE_EOP
and CVP_UNBLOCK_MD.
6. 6.You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of SLCM.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management under Data Protection Authorization Managemen .
For more information, see the Customizing documentation.
● •Define the settings for blocking in Customizing for Cross-Application Components under Data Protection
Blocking and Unblocking Business Partner
13.14.4.3 Data Storage Security
Data Storage
The data for the application are saved in the database tables. Only the data for academic structure can come from
a file system, the security aspects of which is described in the next section. There is structural authorization and
role based authorization to control access to these data. For more information, see Authorizations.
Using Logical Path and File Names to Protect Access to the File System
The SAP Student Lifecycle Management applications save data in files in the file system. Therefore, provide
access to the corresponding files in the file system without allowing access to other directories or files (also
known as directory traversal). This is achieved by specifying logical paths and file names in the system that map
to the physical paths and file names. This mapping is validated at runtime and if access is requested to a directory
that does not match a stored mapping, then an error occurs.
The following lists show the logical file names and paths used by the Student Lifecycle Management
application and for which programs these file names and paths apply:
Logical File Names Used
The following logical file names have been created in order to enable the validation of physical file names:
● ISHER_WEBCATALOGXML
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 729○ Programs using this logical file name and parameters used in this context:
○ ◦RHIQ_XML_ACADSTRUC (XML Files of Academic Structure)
Logical Path Names Used
The logical file names listed above all use the logical file path ISHER_WEBCATALOG.
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information, see about data storage security, see the respective chapter in the SAP NetWeaver Security
Guide.
13.14.4.4 Read Access Logging (Industry Applications)
Use
In Read Access Logging (RAL), you can configure which read-access information to log and under which
conditions.
Read access to personal data is partially based on legislation, and it is subject to logging functionality. The Read
Access Logging (RAL) component can be used to monitor and log read access to data and provide information
such as which business users accessed personal data (for example, fields related to bank account data), and
when they did so. In RAL, you can configure which read-access information to log and under which conditions.
SAP delivers sample configurations for applications. For more information, see the application-specific chapters
of the Security Guide.
You can display the configurations in the system by performing the following steps:
1. In transaction SRALMANAGER, on the Administration tab page, choose Configuration.
2. Choose the desired channel, for example, WebDynpro.
3. Choose Search.
The system displays the available configurations for the selected channel.
4. Choose Display Configuration for detailed information on the configuration. For specific channels, related
recordings can also be displayed.
Security Guide for SAP S/4HANA 1709
730 P U B L I C SAP S/4HANA Business ApplicationsPrerequisites
Before you can use the delivered RAL configurations, the following prerequisites are met:
● You are using:
○ SAP NetWeaver 7.1 SP0
○ AS ABAP 7.51
○ Kernel 7.45 SP21 and above
○ SAP_UI 7.51 (UI5 1.40)
● The RAL configurations have been activated.
● You have enabled RAL in each system client.
More Information
For general information on Read Access Logging, see the product assistance for SAP NetWeaver on SAP Help
Portal at Start of the navigation path http://help.sap.com/netweaverInformation SAP NetWeaver Library
Function-Oriented View System Security for SAP NetWeaver AS for ABAP Only
13.14.5 Professional Services
13.14.6 Commercial Project Inception and Lean Staffing
The following guide covers the information that you require to operate Commercial Project Inception and Lean
Staffing securely.
13.14.6.1 Introduction
Introduction
Note
This guide does not replace the administration or operation guides that are available for productive operations.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 731Target Audience
● Technology consultants
● System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation
Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas
the Security Guides provide information that is relevant for all life cycle phases.
Why Is Security Necessary?
With the increasing use of distributed systems and the Internet for managing business data, the demands on
security are also on the rise. When using a distributed system, you need to be sure that your data and processes
support your business needs without allowing unauthorized access to critical information. User errors,
negligence, or attempted manipulation on your system should not result in loss of information or processing time.
These demands on security apply likewise to Commercial Project Inception and Lean Staffing. To assist you in
securing Commercial Project Inception and Lean Staffing, we provide this Security Guide.
About this Document
The Security Guide provides an overview of the security-relevant information that applies to Commercial Project
Inception and Lean Staffing .
Overview of the Main Sections
The Security Guide comprises the following main sections:
● Before You Start
This section references to other Security Guides that build the foundation for this Security Guide.
● Authorizations
This section provides an overview of the authorization concept that applies to Commercial Project Inception
and Lean Staffing .
13.14.6.2 Before You Start
It is important that you read and understand the information contained in the Authorizations [page 733] section
that is specific to Commercial Project Inception and Lean Staffing. In addition, you should be aware of the
information listed in the table below:
Security Guide for SAP S/4HANA 1709
732 P U B L I C SAP S/4HANA Business ApplicationsTable 450: Fundamental Security Guides
Scenario, Application or Component Security Guide Most-Relevant Sections or Specific Restrictions
SAP NetWeaver Application Server SAP NetWeaver Security Guide - All sections
SAP ECC SAP ERP Central Component Security Guide - All sections
For a complete list of the available SAP Security Guides, see service.sap.com/securityguide on the SAP Service
Marketplace.
13.14.6.3 User Management and Authentication
SAP ECC Industry Extension Professional Services uses the user management and authentication mechanisms
provided with the SAP NetWeaver platform, particularly the SAP NetWeaver Application Server ABAP .
Consequently, the security recommendations and guidelines for user management and authentication that are
described in the SAP NetWeaver Application Server ABAP Security Guide also apply to SAP ECC Industry
Extension Professional Services .
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively have to change their passwords on a regular basis,
but not those users under which background processing jobs run.
User type required for SAP ECC Industry Extension Professional Services is Dialog user. Dialog users are Individual
users used for SAP GUI for Windows.
13.14.6.4 Authorizations
Use
The business function Commercial Project Inception and Lean Staffing uses the authorization concept provided by
the SAP NetWeaver AS for ABAP. Therefore, the recommendations and guidelines for authorizations as described
in the SAP NetWeaver AS Security Guide ABAP also apply to Commercial Project Inception and Lean Staffing.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Standard Roles
The table below shows the standard roles that are used by Commercial Project Inception and Lean Staffing.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 733Table 451: Standard Roles
Role Description
SAP_SAWE_UNIVERSAL Maintenance of staff assignments and forecasts
SAP_CATS_LEAN_STAFFING Maintenance of cross-application time sheet (Web Dynpro ap
plication)
SAP_BC_EMPLOYEE Access to HCM data (for employee search, for example)
SAP_BPR_INT_SALES_REP_14 Maintenance of assignment objects of type “SD order”
SAP_PS_STRUCT Maintenance of assignment objects of type “project”
SAP_BC_ENDUSER Non-critical basis authorizations for all users
In addition, users must be assigned to:
● the authorization profile K_ORDER for the maintenance of assignment objects of the type “internal order”
● the authorization profile I_PM_ALL for the maintenance of assignment objects of the type “service order”.
Note
As the authorization profiles K_ORDER and I_PM_ALL comprise all available authorizations for internal orders
and service orders respectively, we recommend that you narrow the granted authorization range to suit your
specific requirements.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used by Commercial Project Inception
and Lean Staffing.
Table 452: Standard Authorization Objects
Authorization Object Field Value Description
P_ORGIN and P_PERNR (Au INFTY 0002 The employee search in the
thorization check for HR info Lean Staffing application and
SUBTY
types) in the Lean Staffing reporting
AUTHC R lists only employees for
whose info type 0002 the
user has a read authorization.
PRS_LS_CUS (new) ACTVT 02, 03, 06 The system checks this au
thorization object when staff
assignments to customers
are made.
Security Guide for SAP S/4HANA 1709
734 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
V_PRS_LS_H (new) VKORG VBAK-VKORG The system checks this au
thorization object when staff
VTWEG VBAK-VTWEG
assignments to SD orders are
SPART VBAK-SPART made. The user must be au
KDGRP KNVV-KDGRP thorized for the sales area,
distribution channel, division,
KOSTL VBAK-KOSTL customer group and cost cen
ACTVT 02, 03, 06 ter of the SD order.
V_PRS_LS_I (new) PRCTR VBAP-PRCTR The system checks this au
thorization object when staff
ACTVT 02, 03, 06
assignments to SD orders are
made. The user must be au
thorized for the profit center
of the SD sales document
item.
C_PRPS_LS (new) PS_FKOKR PRPS-FKOKR The system checks this au
thorization object when staff
PS_FKSTL PRPS-FKSTL
assignments to WBS ele
PRCTR PRPS-PRCTR ments are made. The user
ACTVT 02, 03, 06 must be authorized for the
controlling area, cost center
and profit center of the WBS
element.
K_PRS_LS PRCTR AUFK-PRCTR The system checks this au
thorization object when staff
ACTVT 02, 03, 06
assignments to internal or
service orders are made. The
user must be authorized for
the profit center of the order.
PRS_LS_FC EMP_LEVEL Level 1, 2 or 3 See description below.
ACTVT 02, 03, 06
The authorization for staff assignments is based on the assignment object to which it refers; it is independent of
the employee for whom the assignment is made. As shown in the table above, different types of assignment
objects (SD order, project and so on) use different fields for this authorization.
The authorization for forecasting is based on the employee whose time is forecast; it is independent of the
assignment object for which it is made. There are several levels ( EMP_LEVEL) of authorization concerning the
employee:
● Level 1: The user is authorized to change and display own forecasts (the forecasts for the employee ID
contained in the user’s master record).
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 735● Level 2: The user is authorized to change and display forecasts for the members of his or her team (note that
level 2 does not necessarily imply level 1). The team is determined on the basis of the employee ID contained
in the user’s master record, as follows:
● The HCM organizational model is queried (current relationships according to info type 1001, subtype A008;
for details, see method CL_SAWE_API_PROVIDER_FC-> GET_TEAM_OF_EMP). The result of this query is the
same for managers and their assistants.
● You can influence the list of employee IDs returned by this query by adding or removing entries in an
implementation of the Business Add-In (BadI) SAWE_AUTHORITY_CHECK, method TEAM_OF_EMPLOYEE.
● If neither the HCM organizational model nor the BAdI implementation is used, the team does not contain any
employees.
● Level 3: The user is authorized to change and display forecasts for all employees.
The system checks both authorizations (authorization for staff assignments and authorization for forecasting) in
the following cases:
● ACTVT = ‘02’ (change): Checked when the Lean Staffing or Forecasting application is executed in the change
mode (this refers to the UI-based application and to the A2X Enterprise Services).
● ACTVT = ‘03’ (display): Checked when the Lean Staffing or Forecasting application is executed in the display-
only mode.
● ACTVT = ‘06’ (delete): Checked when the deletion of an assignment object triggers the deletion of its staff
assignments and forecasts (without further user interaction).
This is different from the deletion of individual entries in the Lean Staffing and Forecasting applications, because
users who are authorized to delete assignment objects (for example, SD order items) may need this
authorization, even if they do not have authorization to execute the Lean Staffing or Forecasting application.
The authorizations for reporting are based on the specific user group ‘SAWE’, which you can maintain using
transaction SQ03. Users who are authorized to analyze employee assignments, resource consumption, employee
utilization and skill utilization need to be assigned to this user group.
13.14.6.5 Data Storage Security
Use
Commercial Project Inception and Lean Staffing stores additional employee-related data besides data stored in
the HR Master Data database.
The following additional data can be stored in the respective objects (technical table names in parentheses):
• Employee assignment to projects, customer orders, or internal orders (SAWE_D_SA_HDR and
SAWE_D_SA_ITM).
• Employee forecast for the above-mentioned assignments, and also for generic assignments such as training
(SAWE_D_TIME_PS and SAWE_D_TIME_PSI).
For information about access to this data, see Authorization [page 733] .
For more information, see the product assistance for SAP S/4HANA on the SAP Help Portal at http://
help.sap.com/s4hana_op_1709 under Product Assistance Enterprise Business Applications Industries
SAP for Professional Services Lean Staffing Data Archiving in Lean Staffing
Security Guide for SAP S/4HANA 1709
736 P U B L I C SAP S/4HANA Business Applications13.14.6.6 Deletion of Personal Data
Use
The Lean Staffing (IS-PRS-LS) component might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 453:
Application Detailed Description Provided Deletion Functionality
Lean Staffing (IS-PRS-LS) For more information, see the product Archiving object SAWE_SA
assistance for SAP S/4HANA on the
ILM object SAWE_SA
SAP Help Portal at http://help.sap.com/
s4hana_op_1709 under Product Report
SAWE_SA_CLEAN_CANDIDATE_LIST
Assistance Enterprise Business
Applications Industries SAP for
Professional Services Lean Staffing
Data Archiving in Lean Staffing
Relevant Application Objects and Available EoP/WUC functionality
Table 454:
Application Implemented Solution (EoP or WUC) Further Information
Lean Staffing (IS-PRS-LS) End of Purpose (EoP) check Class registered for the EoP check:
CL_WUC_IS_PRS_LS_EOP_CHECK
For more information, see SAP note
2390575 .
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of customer and vendor master data in
Customizing for Logistics - General under Business Partner Deletion of Customer and Vendor Master Data .
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 73713.14.7 Public Sector
13.14.7.1 Finance
13.14.7.1.1 Public Sector Management
Data Storage
Using Logical Paths and File Names to Protect Access to the File System
Public Sector Management stores data in files in the file system. For this reason, it is important to be able to grant
access to the files in the file system explicitly without granting access to other folders or files (also known as folder
traversals). You do this in the system by entering logical paths and file names that are assigned to the physical
paths and file names. This assignment is validated during runtime, whereby an error message is issued whenever
a user tries to access a folder that does not correspond to a stored assignment.
The following lists provide an overview of the logical file names and paths that are used by Public Sector
Management and of the programs for which these file names and paths are valid:
Logical File Names Used in Public Sector Management
The logical file name PSM_EXECUTION_DATA_EXPORT has been created to enable the validation of physical file
names.
The program RFEXBLK0 uses this logical file name.
Logical Path Names Used in Public Sector Management
The above-mentioned logical file name uses the logical file path PSM_ROOT.
Activating the Validation of Logical Paths and File Names
These logical paths and file names are entered in the system for the corresponding programs. For reasons of
downward compatibility, validation is deactivated by default during runtime. To activate validation during runtime,
define the physical path using transactions FILE (across all clients) and SF01 (client-specific). To determine which
paths are used by your system, you can activate the relevant settings in the Security Audit Log.
Security Guide for SAP S/4HANA 1709
738 P U B L I C SAP S/4HANA Business Applications13.14.7.1.1.1 Funds Management
Standard roles for Funds Management (PSM-FM)
Table 455:
Role Name
SAP_IS_PS_CENTRAL_FUNCTION Funds Management Central Function
SAP_IS_PS_PO_CONSUMPTION Postings: Consume Funds
SAP_IS_PS_MD_STRUCTURE Master Data Funds Management: Maintain Structure
SAP_IS_PS_BCS_AVC_TOOLS Availability Control - Tools
SAP_IS_PS_BCS_BUD_TOOLS Budgeting - Tools
SAP_IS_PS_PO_RECONCILE Reconciling Data with Feeder Applications
SAP_IS_PS_BCS_BUD_MAINTENANCE Maintain Budget Data
SAP_IS_PS_BCS_BUD_PLANNING Plan Budget Data
SAP_IS_PS_BCS_DISPLAY Display Budget Values (BCS)
SAP_IS_PS_BCS_STATUS_MAINTAIN Budgeting – Assign Status
SAP_IS_PS_BCS_STRUCT_DEF Maintain Budget Structure
SAP_IS_PS_BCS_STRUCT_TOOLS Budget Structure - Tools
SAP_IS_PS_CASH_DESK Payment at Cash Desk
SAP_IS_PS_CF_CHECK Check Budget Closing
SAP_IS_PS_CF_OI_EXECUTE Carry Forward Consumable Budget
SAP_IS_PS_CF_OI_PREPARE Prepare Carryforward of Consumable Budget
SAP_IS_PS_MD_DISPLAY Funds Management Master Data: Display Functions
SAP_IS_PS_MD_ZUOB Funds Management Master Data: Assignment to CO Struc
tures
SAP_IS_PS_PO_COMMITMENTS Postings: Commit Funds
SAP_IS_PS_PO_CONSUMPTION_DISP Postings: Consumed Funds Display
SAP_IS_PS_PO_FOR Postings: Forecast of Revenue
SAP_IS_PS_PO_TRANSFERS Postings: Transfer Consumable Budget
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 739Role Name
SAP_FI_GL_REORG_MANAGER Reorganization Manager
SAP_FI_GL_REORG_OBJLIST_OWNER Object List Owner
Authorization objects for Funds Management (PSM-FM)
Table 456:
Authorization Object Name
F_FICB_FKR Cash Budget Management/Funds Management FM Area
F_FICB_VER Cash Budget Management/Funds Management Version
F_FICA_FOG Funds Management: Authorization Group of Fund
F_FICA_FSG Funds Management: Authorization Group for Funds Center
F_FICA_SEG Funds Management: Authorization Group for All Funds Cen
ters
F_FICA_SIG Funds Management: Authorization Group Internal Funds Cen
ters
F_FICA_FPG Funds Management: Authorization Group for Commitment
Item
F_FICA_TRG Funds Management: Authorization Groups of FM Acct Assign
ment
F_FMMD_FAR Funds Management: Functional Area (Authorization Group)
F_FMMD_MES Funds Management: Funded Program (Authorization Group)
F_FMMD_BPG F_FMMD_BPG
F_FMMD_FPG Funds Management: Funded Program Sets
F_FICA_FNG Funds Management: Fund Groups
F_FICA_FAG Funds Management: Function Groups
F_FICA_CIG Funds Management: Commitment Item Group
F_FICA_FCG Funds Management: Funds Center Groups
F_FMCA_SHE Clarification Worklist (FMSHERLOCK)
Security Guide for SAP S/4HANA 1709
740 P U B L I C SAP S/4HANA Business ApplicationsSee also the documentation for Funds Management on the SAP Help Portal at help.sap.com S/4 HANA
Accounting Public Sector Management Funds Management Authorizations .
Authorization objects of the Budget Control System (BCS)
Table 457:
Authorization Object Name
F_FMBU_ACC Budgeting: Account Assignment
F_FMBU_STA Budgeting: Status
F_FMBU_KYF Budgeting: Key Figure
F_FMBU_DOC Budgeting: Document Type
F_FMBU_VER Budgeting: Version and Budget Category
You can use the following BAdI to implement enhancements to the authorization concept:
Table 458:
BAdI Name
FM_AUTHORITY_CHECK Enhance Authorization Check in PSM-FM
13.14.7.1.1.2 Grants Management
Standard roles for Grants Management (PSM-GM)
Table 459:
Function Name Function
SAP_FI_GM_GRANT_ANALYST Grants Management: Grant Analyst M aster data maintenance, execution of
reports
SAP_FI_GM_GRANT_MANAGER Grants Management: Grant Manager New entry, check, and approval of mas
ter data, execution of billing program
SAP_FI_GM_PROGRAM_ANALYST Grants Management: Program Analyst Creation of master data, processing of
proposals and budget
SAP_FI_GM_PROGRAM_MANAGER Grants Management: Program Manager Check and approval of proposals and
budget
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 741Function Name Function
SAP_FI_GM_PROJECT_MANAGER Grants Management: Project Manager Management of grants and budget, exe
cution of reports
Authorization Objects for Grants Management (PSM-GM)
Table 460:
Authorization Object Name
F_FIGM_BUD Grants Management: Authority for Budget
F_FIGM_CLS Grants Management: Authority for Class
F_FIGM_GNG GM: Grant Groups
F_FIGM_GNT Grants Management: Authority for Grant
F_FIGM_PRG Grants Management: Authority for Programs
F_FIGM_SCG GM: Sponsored Class Groups
F_FIGM_SPG GM: Sponsored Program Groups
The master data objects and business processes of Grants Management are protected by standard authorization
objects.
US Federal Government uses the authorization concepts of the components that it deploys, such as Funds
Management and Material Management. See also the documentation for Funds Management on the SAP Help
Portal at help.sap.com SAP ERP Central Component Accounting Public Sector Management Funds
Management Authorizations .
You can use the following BAdI to implement enhancements to the authorization concept:
Table 461:
BAdI Name
GM_AUTHORITY_CHECK Grants Management: Authorization Check
GM_BILL_AUTHORITY GM: User Authorization for DP90 in GM
GM_POST_AUTHORITY Grants Management Coding Block Authority Check
13.14.7.1.1.3 Network and Communication Security
Public Sector Management communicates with:
● Human Capital Management (HCM) as part of the scenario Position Budgeting and Control
● Customer Relationship Management (CRM) as part of the scenario Grantor Management
Security Guide for SAP S/4HANA 1709
742 P U B L I C SAP S/4HANA Business ApplicationsThe communication with these internal SAP components takes place per Remote Function Call (RFC). See the
corresponding sections in the RFC/ICF Security Guide on SAP Service Marketplace at service.sap.com/
securityguide SAP NetWeaver Security Guide Security Aspects for Connectivity and Interoperability.
The US Federal Government has both payment and collection outbound interfaces at its disposal for Treasury
Confirmation and Intragovernment Payment and Collections (IPAC). This outbound interface uses payment
methods and flat files.
The inbound interface of the Central Contractor Registration (CCR) uses IDocs.
For registering portal users in the backend system, we recommend that the user is assigned in both the portal and
the backend system. In other words, the user ID of a user in the portal and the backend system should match.
13.14.7.1.1.4 More Security Information
Authorization checks only take place in Public Sector Management and Funds Management when the authorization
group of a master data object is entered. To ensure that an adequate check is carried out, SAP recommends that
you define the affected fields as required entry fields in the field status control. You define this setting in the
implementation guide of Public Sector Management:
● Funds Management-Specific Postings Earmarked Funds and Funds Transfers Field Control for
Earmarked Funds and Funds Transfers DefineField Status Variant /Assign Field Status Variant to
Company Code / Define Field Status Groups
● Actual and Commitment Update/Integration Integration MaintainField Status for Assigning FM Account
Assignments
For more information, see the documentation on Funds Management on the SAP Help Portal at help.sap.com
ERP Central Component Accounting Public Sector Management .
For Grants Management, note the following system settings in the implementation guide of Public Sector
Management,underFunds Management Government Master Data Grant
● GM Grant Control: Field Group for Authorizations
● Maintain Grant Authorization Types
● Maintain Grant Authorization Groups
13.14.7.2 Public Sector Collection and Disbursement
The following security chapter of SAP Public Sector Collection and Disbursement (PSCD) also applies security
information for SAP Tax and Revenue Management (TRM).
13.14.7.2.1 Authorizations
SAP Public Sector Collection and Disbursement (SAP PSCD) and SAP Tax and Revenue Management (SAP TRM)
uses the authorization concept provided by the SAP NetWeaver AS for ABAP or AS Java. Therefore, the
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 743recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP
and SAP NetWeaver AS Security Guide Java also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s
user administration console on the AS Java.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles
The table below shows the standard roles that are used.
Table 462:
Role Description
SAP _FMCA_CA_ ALL Sample role including all transactions for SAP PSCD
SAP _FMCA_CA_ ALL _EHP5_TRM_NWBC Sample role for the SAP NetWeaver Business Client (NWBC)
for SAP TRM
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used for SAP PSCD.
Table 463:
Authorization Object Field Value Description
F_PSDO_BEG BEGRU 01 Document Generation PSCD Document: Authoriza
tion Group for Contract Object
02 Document Changes
03 Document Display
85 Reversal of Documents
and Resetting of a Clearing
F_PSDO_VGT PSOBTYP_PS 01 Document Generation PSCD Document: Contract Ob
ject Type Authorization
02 Document Changes
03 Document Display
85 Reversal of Documents
and Resetting of a Clearing
Security Guide for SAP S/4HANA 1709
744 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
F_PSOB_ATT AUTHTYP_PS 01 Create PSCD Contract Object: Au
thorization Types
02 Change
03 Display
* All Activities
F_PSOB_BEG BEGRU 01 Create or Generate PSCD Contract Object: Au
thorization Group
02 Change
03 Display
06 Delete
08 Display Change Docu
ments
F_PSOB_FDG FLDGR_PS 01 Create or Generate PSCD Contract Object: Field
Groups
02 Change
03 Display
F_PSOB_VGT PSOBTYP_PS 01 Create or Generate PSCD Contract Object: Object
Type Authorization
02 Change
03 Display
06 Delete
08 Display Change Docu
ments
64 Generate
F_FMCA_WOF ABGRD 10 Post PSCD Write Off: Approval for
Write-Off Reason
B5 Display History
F1 Approve
F_FMCA_WOM ACTVT For more information, see PSCD Write-Off: Authorization
transaction SU21. for Mass Approval
F_PSFA_SET F_PSFA_SET 01 Create or Generate PSCD Facts: Authorization for
Fact Sets
02 Change
03 Display
06 Delete
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 745Authorization Object Field Value Description
F_PSFA_TYP F_PSFA_TYP 01 Create or Generate PSCD Facts: Autorization for
Fact Set Parts
02 Change
03 Display
06 Delete
F_PSFA_CAT BEGRU 01 Create or Generate PSCD Facts: Authorization for
Fact Type Parts
02 Change
03 Display
06 Delete
F_FMCA_IPM F_FMCA_IPM F1 Approve PSCD Installment Plan: Au
thorization for Mass Approval
F_KKCOL ACTVT 01 Create or Generate PSCD Co-Liability: Authoriza
tion for Co-Liabilities
02 Change
03 Display
06 Delete
16 Execute
39 Check
AF Prompts
The following authorization objects are only relevant for customers who use SAP Tax and Revenue Management
(TRM) for Public Sector that is based on SAP Public Sector Collection and Disbursement (PSCD).
Table 464:
Authorization Object Field Value Description
F_PSFH_FVW FMCA_PHASE 01 Create or Generate TRM Object: Authorization for
Form Handling and Form View
02 Change
03 Display
06 Delete
F1 Approve
F_PSFH_ REV FMCA_ABTYP 01 Create or Generate TRM Object: Authorization for
Form Handling and Revenue
02 Change
Type
03 Display
06 Delete
F1 Approve
Security Guide for SAP S/4HANA 1709
746 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
F_PSFH_ACT ACTVT 01 Create TRM Object: Authorization for
Form Handling
02 Change
03 Read
F_PSFH_FBT FBTYP 01 Create or Generate TRM Object: Authorization for
Form Handling and Form Bun
02 Change
dle Type
03 Display
06 Delete
F1 Approve
F_PSFH_STA FMCA_FBSTA 01 Create or Generate TRM Object: Authorization for
From Handling and Status
02 Change
03 Display
06 Delete
F1 Approve
F_PSFH_ AMD AMD_ACTION 16 Execute TRM Object: Authorization for
Amendment Actions in the Tax
Officer Work Center
F_FMCA_RLT COREL_TYPE 01 Create or Generate TRM Object: Authorization for
Master Data Relationship Cat
02 Change
egory
03 Display
06 Delete
13.14.7.2.2 Data Storage Security
Using Logical Path and File Names to Protect Access to the File System
The Industry Solution Migration Workbench (ISMW) saves data in files in the file system. Therefore, it is important
to explicitly provide access to the corresponding files in the file system without allowing access to other
directories or files (also known as directory traversal). This is achieved by specifying logical paths and file names
in the system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 747Logical File Names / Path Names Used
The Migration Workbench uses the logical file name ISMW_FILE with the logical file path ISMW_ROOT to enable the
validation of physical file names.
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information, see about data storage security, see the respective chapter in the SAP NetWeaver Security
Guide.
13.14.7.3 Multichannel Foundation for Utilities and Public
Sector (Public Sector)
13.14.7.3.1 Internet Communication Framework Security (ICF)
You should only activate the services that are required by the applications running in your system.
The following services must be activated for Multichannel Foundation for Utilities and Public Sector:
● ERP_FMCA_MC (logon user/current user)
● ERP_FMCA_MC_PUBLIC_SRV
ERP_FMCA_MC_PUBLIC_SRV is to be used for the anonymous payment or anonymous form submission scenario
and needs to be linked to a predefined “SU01” user.
Use transaction SICF to activate these services. If your firewalls use URL filtering, also note the URLs used for the
services and adjust your firewall settings accordingly.
For more information about ICF security, see the relevant chapter in the SAP NetWeaver Security Guide.
13.14.8 Retail
Security Guide for SAP S/4HANA 1709
748 P U B L I C SAP S/4HANA Business Applications13.14.8.1 Network and Communication Security
The following information is relevant for specific SAP S/4HANA Retail solutions. For general information about
network and communication security in SAP S/4HANA, see Network and Communication Security [page 17].
Communication Paths for SAP Forecasting and Replenishment
For information about the security of communication paths for integration with SAP Forecasting and
Replenishment, see the Security Guide for SAP Forecasting and Replenishment on SAP Service Marketplace at
https://service.sap.com/securityguide under SAP Security Guides Industry Solutions SAP for Retail
SAP Forecasting and Replenishment .
Other Communication Paths for SAP S/4HANA Retail
The following table shows the communication paths for all remaining system connections for SAP S/4HANA
Retail solutions.
Table 465: Communication Paths for SAP S/4HANA Retail
Application Communication Path Protocol Used Type of Data Transfer Data Requiring Special
red Protection
Store physical inven SAP S/4HANA – store RFC (or other protocol Application data -
tory system that supports IDocs)
POS interface SAP S/4HANA – POS RFC (or other protocol Application data Credit card information
system that supports IDocs)
Interface to space man SAP S/4HANA – space RFC Application data -
agement systems optimization system
13.14.8.2 Authorizations in Retail
Note
For general information about the authorization concept used by SAP S/4HANA, see User Administration and
Authentication [page 13].
SAP S/4HANA Retail uses the authorization concept provided by the SAP NetWeaver AS ABAP or AS Java.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP and SAP NetWeaver AS Security Guide Java also apply.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 749The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s
user administration console on the AS Java.
Standard Roles
The following table shows the standard roles that are used for SAP S/4HANA Retail for merchandise
management and in SAP S/4HANA for fashion and vertical business solutions.
Table 466:
Role Description
SAP_BR_ADMINISTRATOR_RFM Administrator (Retail)
SAP_BR_ALLOCATOR_RETAIL Allocator (Retail)
SAP_BR_ASSORT_SPECIALIST_RFM Assortment Specialist - Retail
SAP_BR_CAT_MAN_RFM Category Manager (Retail)
SAP_BR_DEMAND_PLANNER_RFM Demand Planner (Retail)
SAP_BR_MD_SPECIALIST_ITEM_RFM Master Data Specialist - Product Data (Retail)
SAP_BR_MD_SPECIALIST_SITE_RFM Master Data Specialist - Location Data (Retail)
SAP_BR_PRICING_SPECIALIST_RFM Pricing Specialist (Retail)
SAP_BR_PROMOTION_SPEC_RFM Promotion Specialist (Retail)
SAP_BR_PURCHASER_RFM Purchaser (Retail)
SAP_BR_RETAIL_STORE_ASSOCIATE Retail Store Associate
SAP_BR_RETAIL_STORE_MANAGER Retail Store Manager
SAP_BR_STORE_DESIGN_MGN_RFM Store Design Manager (Retail)
The following table shows the standard roles that are used for specific SAP S/4HANA for fashion and vertical
business solutions.
Table 467:
Role Description
SAP_BR_INTERNAL_SALES_REP_RET Internal Sales Representative (Retail)
SAP_BR_ORDER_FULFILLMNT_MNGR_R Order Fulfillment Manager (Retail)
Security Guide for SAP S/4HANA 1709
750 P U B L I C SAP S/4HANA Business ApplicationsStandard Authorization Objects
The following table shows the standard authorization objects that are used in SAP S/4HANA Retail and SAP S/
4HANA for fashion and vertical business solutions.
Table 468:
Authorization Object Description
W_ASORT Authorization for assortment maintenance
W_ASORT_ST Authorization for assigning assortments to plants
W_AUFT_BAA Authorization for allocation table type
W_AUFT_BAR Authorization for allocation rule type
W_AUFT_RMB Authorization for allocation table: Display/Reply per plant
W_FRM Authorization for merchandise distribution
W_GROUPTYP Authorization for managing site groupings
W_LISTVERF Authorization to use listing procedure
W_LIST_EAC Authorization to ignore listing errors
W_MARKDOWN Authorization for markdown planning: MTYP, MATCL, SOrg,
DChl
W_PRICATIN Authorization for creating and maintaining PRICAT per pur
chasing group
W_REF_SITE Authorization to clean MMSITEREF table
W_SRS_POS SAP Retail Store authorization for physical inventory in open
store
W_SRS_VKPF SAP Retail Store authorization for daily price maintenance
W_STRU_CHG Authorization to allow changes to structured materials
W_STWB_WRK SAP Retail Store authorization for store
W_VKPR_PLT Authorization for sales price calculation: Distribution channel/
price list
W_VKPR_VKO Authorization for sales price calculation: Distribution channel
W_VKPR_VTL Authorization for sales price calculation: Organizational level
distribution channel and various material groups
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 751Authorization Object Description
W_VKPR_WRK Authorization for sales price calculation: Distribution channel/
plant
W_WAKH_EKO Authorization for promotions: Purchasing organization/
purchasing group
W_WAKH_MAT Authorization for promotions: Material number
W_WAKH_THE Authorization for promotions: Theme
W_WAKH_VKO Authorization for promotions: Sales organization/distribution
channel
W_WBEF_WRK Authorization for sales price revaluation: Distribution chan
nel/plant
W_WIND_TYP Automatic journal entry adjustment: Authorization for journal
entry type
W_WTAD_AM Authorization for additionals monitor
W_WTAD_ASL Authorization for additionals: Supplier/purchase order list
W_WTAD_IR Request additionals IDoc via BAPI call function
W_WTAD_ISU Authorization for status update for additionals IDoc
WLM Assignment of articles for layout modules
WLMLOCLIST Creation of assortments per layout module and store
WLMVREL Release of layout module version
WLMVV Layout module version variants maintenance
WLWBENT Access to layout workbench
WPLGACT Call external space management
WRF_CDT_H Article hierarchy: Horizontal hierarchy maintenance
WRF_CDT_V Article hierarchy: Vertical hierarchy and attribute mainte
nance
WRF_FOLUP Authorization: Follow-up/Replacement material relationships
WRF_GH_AUT Generic hierarchy: Authorization check
W_BUDG_TY Budget type
W_RF_MPA Authorization for markdown profile assignment
Security Guide for SAP S/4HANA 1709
752 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Description
W_RF_WLAY Authorization for layout
C_WRFCHVAL Authorization for characteristic value maintenance
Additional Standard Authorization Objects for Fashion and Vertical Business
The following table shows the standard authorization objects that are used for specific SAP S/4HANA for fashion
and vertical business solutions.
Table 469:
Authorization Object Description
ARUN_WB Authorization for the order allocation run (ARun) workbench
ARUN_LOG Authorization for message logging during the order allocation
run
This authorization is required to perform the order allocation
run in online, batch, and parallel modes.
ARUN_ON Authorization for performing the order allocation run in online
mode
FSH_ATTRB Authorization for the maintenance of article attributes in fash
ion and vertical business (information)
ARUN_CCR Authorization for the consistency check report
C_SGTSETUP Authorization for segmentation setup
C_SGT_DEFT Authorization for default segmentation maintenance
SWB_DISPLA Authorization for Season Workbench
SWB_TREE Authorization to create/edit/delete the tree view in Season
Workbench
SWB_PUR_V Authorization to create/edit/delete the purchasing view in
Season Workbench
SWB_SALE_V Authorization to create/edit/delete the sales view in Season
Workbench
FSH_SRL Authorization for the stock/requirement list for fashion and
vertical business
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 753Authorization Object Description
SWB_PROD_V Authorization to create/edit/delete the production view in
Season Workbench
FSH_ITAARN Authorization for the Insight to Action report
FSH_COD Authorization to create/edit/delete cut-off dates
FSH_DPR Authorization to create/generate/change distribution curve
FSH_QDP Authorization to create/generate/change quantity distribu
tion profile
FSH_MRK Authorization to create/change/display marker information
RFM_PSST Authorization for PSST: Grouping rules and groups
13.14.8.3 Deletion of Personal Data in Retail
SAP S/4HANA Retail solutions might process data (personal data) that is subject to the data protection laws
applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking
and deletion of personal data. For more information, see the product assistance for SAP S/4HANA on SAP Help
Portal at https://help.sap.com/viewer/product/SAP_S4HANA_ON-PREMISE/. Choose a version and then go to
Product Assistance Cross Components Data Protection .
Relevant Application Objects (Data) and Available Deletion Functionality
Table 470:
Application Application Objects Provided Deletion Functionality
Allocation Application-specific data used in the fol Transaction WA09
lowing transactions:
WA01
WA02
WA03
WA04
WA08
WA30
WA35
Security Guide for SAP S/4HANA 1709
754 P U B L I C SAP S/4HANA Business ApplicationsApplication Application Objects Provided Deletion Functionality
Alternate Historical Data Application-specific data used in the fol Transaction MAHD4 can be used to delete
lowing transactions: entries in the Alternate Historical Data
MDRD1 - MDRD3 tables.
MAHD1 - MAHD3 Transaction MDRD4 can be used to delete
delivery relationships.
Article Discontinuation Application-specific data used in the fol ILM object MM_MATNR
lowing transactions:
WRF_DIS_SEL
WRF_DIS_MON
Assortment Application-specific data used in the fol Transaction WSOA4 can be used to delete
lowing transactions: assortments.
WSOA1 Transactions WSOA2/WSOA6 can be used
WSOA2 to delete assortment users (customers).
WSOA3
WSO1
WSO2
WSO3
WSO4
WSO5
Tables:
WRSZ
WLK1
WSOH
Assortment List Application-specific data used in the fol Assortment List Reorganization: report
lowing transactions: RWDPOSRS
WDBM_HPR
WJB5
WBBS
WBBS_ALV
Automatic Document Adjustment Transactions MEI1 - MEI5 ILM object MM_EKKO
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 755Application Application Objects Provided Deletion Functionality
Investment Buying Application-specific data used in the fol Report RWFWW_DELETE_CUSTOMERS
lowing transactions:
WLB1
WLB2
WLB6
Load Building Application-specific data used in the fol Report RWVLB_DELETE_LOGTABLES
lowing transactions:
WLB4
WLB5
WLB7
WLBA
WLBB
WLB13
Merchandise Distribution Application-specific data used in the fol Transaction WA40 can be used to de
lowing transactions: leteFRET entries that have status
WF10 Completed.
WF10A
WF20
WF30
WF60
WF70
Planning Workbench Transaction WWP1 For non-application-specific data, func
tionality is provided by other relevant ap
plications.
POS Interface – Inbound For non-application-specific data, func
tionality is provided by other relevant ap
plications.
POS Interface – Monitor Deletion reports RWPUDTST and
RWPUDLST
POS Interface – Outbound For non-application-specific data, func
tionality is provided by other relevant ap
plications.
Security Guide for SAP S/4HANA 1709
756 P U B L I C SAP S/4HANA Business ApplicationsApplication Application Objects Provided Deletion Functionality
Price Catalog Processing – Inbound W_PRICAT_MAINTAIN Reports:
W_SYNC W_PRICAT_DELETE (Delete Inbound
Price Catalogs)
W_PRICAT_DELPOS (Delete PRICAT
Items)
Price Planning Workbench Reports for the deletion of budgets and
price plans:
RWRF_PPW_BUDG_DELETE
RWRF_PPW_PPD_DELETE
RWRF_PPW_PPD_DELETE_DIRECT
Destruction object:
RWRF_PPW_PPD_DESTRUCTION
Promotions Table WALE ILM objects:
Transaction WAK5 W_PROMO_AD
W_MARKDOWN
Replenishment Application-specific data used in the fol ILM object MM_MATNR
lowing transactions:
WRMO
WR60
Sales Price Calculation Application-specific data used in the fol ILM object W_KALK
lowing transactions:
VKP1-VKP8
VKPB
Site Master Transactions WB01-WB03 ILM object WS_ACSITE
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 757Application Application Objects Provided Deletion Functionality
Subsequent Settlement Application-specific data used in the fol ILM object SD_AGREEM
lowing transactions:
MEB2
MEB3
MEB5
MEB6
MEB8
MEB9
MEBS
MEBB
MEBV
MEB7
MEU3
Tickets and Additionals Application-specific data used in the fol ILM object WTADDI
lowing transactions:
WTAM
WTR1
Vendor Managed Inventory Application-specific data used in the fol Report RWVMI_DELETE_EDMMS
lowing transactions:
WVM1
WVM2
WVM3
WVM4
Relevant Application Objects and Available Deletion Functionality Provided by
Other Applications Used by SAP S/4HANA Retail solutions
● Sales
For information, see Deletion of Personal Data [page 374].
● Sourcing and Procurement
For information, see Deletion of Personal Data [page 396].
● Customer and supplier master data
For information, see Deletion of Personal Data [page 462].
Security Guide for SAP S/4HANA 1709
758 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application Areas and Available EoP/WUC Functionality
Table 471:
Application Solution Implemented for Application- Further Information
Specific Data
Allocation End of purpose (EoP) check CL_ALLOCATION_CV_EOP_CHECK
CVP_IF_APPL_EOP_CHECK~CHECK_PAR
TNERS
Alternate Historical Data not applicable Tables do not contain any customer or
supplier data.
Article Discontinuation not applicable For non-application-specific data, func
tionality is provided by Sourcing and
Procurement.
Assortment not applicable An end of purpose (EoP) check is not
provided because customer and supplier
numbers used in the tables do not indi
cate any business relationships.
Assortment List not applicable An end of purpose (EoP) check is not
provided because supplier numbers
used in the tables do not indicate any
business relationships.
Automatic Document Adjustment not applicable For non-application-specific data, func
tionality is provided by Sourcing and
Procurement.
Investment Buying not applicable For non-application-specific data, func
tionality is provided by Sales.
Load Building not applicable For non-application-specific data, func
tionality is provided by Sales.
Merchandise Distribution End of purpose (EoP) check CL_ALLOCATION_CV_EOP_CHECK
CVP_IF_APPL_EOP_CHECK~CHECK_PAR
TNERS
Planning Workbench not applicable For non-application-specific data, func
tionality is provided by Sales.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 759Application Solution Implemented for Application- Further Information
Specific Data
POS Interface – Inbound not applicable POS interface uses documents that al
ready exist in other SAP applications.
These documents can be archived using
the relevant archiving objects and de
leted using the solutions (and end of
purpose (EoP) checks) provided by the
other SAP applications.
An end of purpose (EoP) check for Cus
tomizing is not provided because part
ner information is stored anonymously
in Customizing tables.
POS Interface – Monitor not applicable POS interface uses documents that al
ready exist in other SAP applications.
These documents can be archived using
the relevant archiving objects and de
leted using the solutions (and end of
purpose (EoP) checks) provided by the
other SAP applications.
POS Interface – Outbound not applicable POS interface uses documents that al
ready exist in other SAP applications.
These documents can be archived using
the relevant archiving objects and de
leted using the solutions (and end of
purpose (EoP) checks) provided by the
other SAP applications.
An end of purpose (EoP) check for log
tables is not provided because partner
information is not shown in the applica
tion at this time, a deletion report exists,
and there is no business need to archive
the log status of data preparation.
Price Catalog Processing – Inbound End of purpose (EoP) check CL_PRICAT_EOP_CHECK_CV
CVP_IF_APPL_EOP_CHECK~CHECK_PAR
TNERS
Price Planning Workbench not applicable An end of purpose (EoP) check is not
provided because supplier numbers in
pricing documents represent supply
source information but do not indicate
any business relationship to the supplier.
Security Guide for SAP S/4HANA 1709
760 P U B L I C SAP S/4HANA Business ApplicationsApplication Solution Implemented for Application- Further Information
Specific Data
Promotions End of purpose (EoP) check CL_PROMOTION_CV_EOP_CHECK
CVP_IF_APPL_EOP_CHECK~CHECK_PAR
TNERS
Replenishment not applicable For non-application-specific data, func
tionality is provided by Sourcing and
Procurement.
Sales Price Calculation not applicable An end of purpose (EoP) check is not
provided because supplier numbers in
pricing documents represent supply
source information but do not indicate
any business relationship to the supplier.
Site Master Where-used check (WUC) CL_T001W_WUC
Subsequent Settlement End of purpose (EoP) check CVP_SD_EOP_CHECK_MM_REBATE
Tickets and Additionals not applicable For non-application-specific data, func
tionality is provided by Sourcing and
Procurement.
Vendor Managed Inventory not applicable For non-application-specific data, func
tionality is provided by Sourcing and
Procurement.
Configuration: Simplified Blocking and Deletion
● You define the settings or authorization management in Customizing for Cross-Application Components
under Data Protection Authorization Management .
For more information, see the Customizing documentation.
● You configure the settings the related to the blocking and deletion of customer and supplier master data in
Customizing for Logistics - General under Business Partner Deletion of Customer and Supplier Master
Data .
13.14.8.4 Payment Card Security According to PCI-DSS
Note
The Payment Card Industry Data Security Standard (PCI-DSS) was jointly developed by major credit card
companies in order to create a set of common industry security requirements for the protection of cardholder
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 761data. Compliance with this standard is relevant for companies processing credit card data. For more
information, see the official website of the PCI Security Standards Council at https://
www.pcisecuritystandards.org .
This section of the security guide supports you in implementing payment card security aspects and outlines steps
that need to be considered to be compliant with the PCI-DSS.
Please note that the PCI-DSS covers more than the following steps and considerations. Complying with the PCI-
DSS lies completely within the customer’s responsibility, and we cannot guarantee the customer’s compliance
with the PCI-DSS.
For current information about PCI-DSS, see also SAP Note 1609917 .
PCI-relevant POS (Point-of-Sale) sales can be processed in SAP S/4HANA Retail for merchandise management
for financial postings and inventory management. Depending on the configuration of the POS solution, the data
transferred to SAP S/4HANA Retail for merchandise management can contain credit card information that needs
to be handled according to the PCI Standard. In this case, the card data has to be encrypted during inbound
processing. The relevant asynchronous communication methods are the IDocs with the message type WPUBON
(Upload Sales Documents per Receipt), and message type WPUTAB (Upload End-of-Day Closing POS).
For more information about Archiving, RFC Debugging, Forward Error Handling (FEH) and Card Verification
Values (CVV), see Payment Card Security According to PCI-DSS [page 80].
Interfaces (IDoc/Services)
Note
Note that IDoc segments cannot store credit card numbers in clear text due to the PCI security standard
compliance. Once an IDoc is being processed within the IDoc Framework, all values are temporarily stored,
including the clear text credit card number.
For more information about how to process customer-specific IDocs containing credit card information, see
the SAP NetWeaver Security Guide under Security Guides for Connectivity and Interoperability Technologies
Security Guide ALE (ALE Applications) Handling Sensitive Data in IDocs in SAP NetWeaver Release 7.50.
Encryption/Decryption and Storage of the Encrypted Number
IDoc Encryption/Encryption process: IDoc data records are sent to the BAdI implementation
IDOC_PCI_ENCR_IM that is used for the PCI DSS inbound IDoc encryption. The process of encrypting the credit
card number starts by identifying the segment with credit card information in the IDoc record structure. The data
from the relevant segments E1WPZ02 and E1WPB06 is mapped to the internal record structure in order to retrieve
the card GUID, the name of the credit card institution number, and the credit card number. After this, the security
level of the credit card institution is verified in Customizing:
● If the security level is set to 2, the credit card number is encrypted.
● If the security level is set to 1, the credit card number is masked.
The card GUID and the encryption type are mapped to the structure for decryption and a message is displayed
that informs the user whether the encryption was successful. After this, the final check for consistency is
performed.
Security Guide for SAP S/4HANA 1709
762 P U B L I C SAP S/4HANA Business ApplicationsDecryption process: The process of decrypting the credit card number starts by identifying the segment in the
IDoc record structure that contains the credit card information. The data from the relevant segments E1WPZ02
and E1WPB06 is mapped to the internal record structure in order to retrieve the card GUID, the type of encryption,
and the credit card number. The encryption type is set to the fixed value 2. The credit card number is decrypted
and a message is displayed that informs the user whether the encryption was successful.
● The BAdI implementation name for PCI DSS inbound IDoc decryption is IDOC_PCI_DECRYPTION_IM.
● One of the IDoc database encryption/decryption (IDOC_DATA_MAPPER, IDOC_DATA_CRYPTION)is called
before saving to the IDoc database and the other after reading from it.
Customizing
Maintain the following settings in Customizing:
● The basic settings for payment cards: In Customizing for SAP Customizing Implementation Guide under
Cross-Application Components Payment Cards Basic Settings Assign Checking Rule .
● The settings for the encryption save mode: Define whether existing GUIDs for credit cards are reused. The
default setting is set to reuse the existing GUID. You can adapt the default with a customer-specific BAdI
implementation, using the enhancement spot ES_WPOS_PCA_SECURITY and the BAdI definition
WPOS_PCA_SECURITY.
● The security settings for the credit card institute: In Customizing for SAP Customizing Implementation Guide
under Cross-Application Components Payment Cards Basic Settings Make Security Settings for
Payment Cards . For an example for security settings for payment cards, refer to the following entries:
○ Security Level:Masked Display and Encrypted When Saved
○ Access Log: Logging of unmasked display
○ Visible Characters for Masking:
At start: 4
At end: 4
● The settings for masking the credit card number: In the customizing table of the transaction
WECRYPTDISPLAY, maintain the settings for the Assignment of Encrypted Segment field as follows:
○ Message Type: WPUBON
○ Segment Type: E1WPB06
○ Field Name: KARTENNR
and
○ Message Type: WPUTAB
○ Segment Type: E1WPZ02
○ Field Name: KARTENNR
13.14.9 Utilities
13.14.9.1 Authorizations
The way that authorization management is organized within a company depends on factors such as the size of the
company and its organizational structure, amongst others. Authorization management must be tailored to each
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 763company''s specific requirements and processes. SAP Utilities uses the authorization concept provided by SAP
NetWeaver for Application Server ABAP. Therefore, the recommendations and guidelines for
authorizations as described in the SAP NetWeaver AS Security Guide ABAP also apply. The SAP
NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The following table provides an overview of the authorization objects available for SAP Utilities, sorted by
component:
Table 472:
Component Authorization Object Description
Regional Structure E_REGIOGRP Authorization Object for Regional Struc
ture Group
Scheduling E_PORTION Authorization Object for Portion
Master Data E_CONTRACT Authorization Object for IS-U Contract
E_CUST_CHG Authorization Object for Maintaining
Sample Customers in IS-U
E_GRID Authorization Object for Grid.
E_INSTLN Authorization object for utility installa
tion.
E_INSTLN2 Authorization Object for Utility Installa
tion – IDEX
E_INSTFACT Installation Facts
E_LOYALACC Authorization Object for Loyalty Account
E_NBSERVI2 Authorization Object for Point of Deliv
ery Service – IDEX
E_NBSERVIC Authorization Object for Point of Deliv
ery Service
Security Guide for SAP S/4HANA 1709
764 P U B L I C SAP S/4HANA Business ApplicationsComponent Authorization Object Description
E_POD Authorization Object for Point of Deliv
ery
E_POD2 Authorization Object for Point of Deliv
ery Transaction – IDEX
E_PREMISE Authorization Object for Premise
E_PROPERTY Authorization object for owner alloca
tion.
Device Management E_CERTIFCT Authorization Object for Device Certifi
cation
E_CONNOBJ Authorization Object for Connection Ob
ject
E_CRFC_CHG Authorization Object for Changing Cer
tification in Device Category
E_DEV_CHNG Authorization Object for Device Modifi
cation
E_DEV_PREL Authorization Object for Changing Vali
dation Relevance of Devices
E_DEV_REL Authorization Object for Device Relation
ships
E_DEVGRP Authorization Object for Device Group
E_DEVLOC Authorization Object for Device Loca
tions
E_INST_REM Authorization Object for Installation, Re
moval, and Replacement
E_LOG_REG Authorization Object for Logical Regis
ters
E_METER_RR Authorization Object for Meter Reading
Results
E_MR_DOC Authorization Object for Meter Reading
Documents and Orders
E_MR_DOC1 Authorization Object for Meter Reading
Documents and Orders
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 765Component Authorization Object Description
E_MR_DOC2 Authorization Object for Meter Reading
Documents w.r.t. Company Code
E_MRD_UNIT Authorization Object for Meter Reading
Unit
E_REG_REL Authorization Object for Register Rela
tionships
E_SAMP_LOT Authorization Object for Sample Lot
E_SEAL_IN Authorization Object for Seal Manage
ment
Energy Data Management E_EDM_PRF2 Authorization Object for Processing
EDM Profiles – IDEX
E_EDM_PROF Authorization Object for Processing
EDM Profiles
E_EDM_SETT EDM Settlement
E_INSTLN3 Authorization Object for Profile Alloca
tion in Utility Installation
E_PROF_IMP Authorization Object for Profile Import
to IS-U EDM
Billing E_B_BIL_PL Authorization Object for Budget Billing
Plan
E_BILL_CL Authorization Object for Billing Class
E_DEV_RATE Authorization Object for Rate Data
E_DISCOUNT Authorization Object for Discount/
Surcharge
E_INSTCALC Authorization Object for Asynchronous
Formula Instance Calculation
E_OPERAND Authorization Object for Operands
E_PRESCL Authorization Object for Price Adjust
ment Clause
E_PRICE1 Authorization Object for Price
E_PRICEUPL Authorization Object for Importing Pri
ces from Excel
Security Guide for SAP S/4HANA 1709
766 P U B L I C SAP S/4HANA Business ApplicationsComponent Authorization Object Description
E_RATE Authorization Object for Rate
E_RATE_CAT Authorization Object for Rate Category
E_RATE_DET Authorization Object for Rate Determi
nation
E_SCHEMA Authorization Object for Schema
E_TRIGGER Authorization Object for Billing Order
E_VARIANT Authorization Object for Variants
Invoicing E_INVOICE Authorization Object for Invoicing Con
tract Accounts
Contract Accounts Receivable and Paya E_DEREG_WO Authorization Object for Write-Off in De
ble regulation Scenarios
Customer Service E_DISC_DOC Authorization Object for Disconnection
Document for Installation
E_ISUEBPP Authorization Object for Activities
(ISU_ABPP)
E_MOVE_IN Authorization Object for Move-In
E_MOVE_OUT Authorization Object for Move-Out
E_PRDOC Authorization Object for Parked Docu
ment
E_REDEMPTN Authorization Object for Redemption
Intercompany Data Exchange E_DRGSCEN Authorization Object for Supply Sce
nario
E_DTX_TASK Authorization Object for Processing
Data Exchange Tasks
E_IDE_CHKT Authorization Object for IDE Check
Framework Tool for Deregulation
E_INV_DOC Authorization Object for Bill Receipt
Document or Payment Advice Note
E_INV_ETHI Authorization Object for Aggregated
Posting to Contract Account of Service
Provider
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 767Component Authorization Object Description
E_SERVPROV Authorization Object for Service Pro
vider
E_SWTDOC Authorization Object for Switch Docu
ment
Advanced Metering Infrastructure E_AMI_EM Authorization Object for IS-U Event Man
agement
E_AMI_IN Authorization Object for AMI Inbound
Confirmation Methods
E_AMI_MON Authorization Object for AMI Monitoring
E_AMI_MSG Authorization Object for Sending Mes
sages
E_AMI_OPST Authorization Object for Operational
State of Advanced Meter
E_AMI_SMDS Authorization Object for AMI Simplified
Master Data Synchronization
E_DISC_AMI Authorization Object for Remote Discon
nection
E_MDUSCONF Authorization Object for MDUS Configu
ration
E_TSCALC Authorization Object for Time Series
Calculation
EAMI_CO_IN Authorization Object for Inbound Confir
mation
ETOUEXCEPT Authorization Object for TOU Exceptions
ETOUEXRESP Authorization Object for TOU Exception
Responses
To display the standard authorization objects for SAP Utilities in your system, proceed as follows:
1. In the SAP menu, choose Tools Administration User Maintenance Authorizations and Profiles
Edit Authorizations Manually
(transaction SU03).
2. Select object class IS_U (Industry Solutions – Utilities) and choose List Authorizations.
Security Guide for SAP S/4HANA 1709
768 P U B L I C SAP S/4HANA Business Applications13.14.9.2 Data Storage Security
Using Logical Path and File Names to Protect Access to the File System
The Industry Solution Migration Workbench (ISMW) saves data in files in the file system. Therefore, it is
important to explicitly provide access to the corresponding files in the file system without allowing access to other
directories or files (also known as directory traversal). This is achieved by specifying logical paths and file names
in the system that map to the physical paths and file names. This mapping is validated at runtime and if access is
requested to a directory that does not match a stored mapping, then an error occurs.
Logical File Names / Path Names Used
The Migration Workbench (ISMW) uses the logical file name ISMW_FILE with the logical file path ISMW_ROOT to
enable the validation of physical file names.
Activating the Validation of Logical Path and File Names
These logical paths and file names are specified in the system for the corresponding programs. For downward
compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain
the physical path using the transactions FILE (client-independent) and SF01 (client-specific). To find out which
paths are being used by your system, you can activate the corresponding settings in the Security Audit Log.
For more information, see about data storage security, see the respective chapter in the SAP NetWeaver
Security Guide.
13.14.9.3 Enterprise Services Security
For general information, see the chapters on Web Services Security in the SAP NetWeaver Security Guide. For
Utilities-specific processes, during which system-to-system communication (A2A communication) takes place
within a system landscape and processes that prepare for market communication with other market participants
as part of intercompany data exchange, note the following:
Note
If, as part of your company-specific processes, you have communication interfaces with other systems, you
must also take their recommended security measures into account.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 769A2A Communication Within a System Landscape
During A2A communication, data is exchanged between an SAP system and an external system. This
communication is based on enterprise services and can flow via a PI system as a data hub or directly between the
respective systems (point-to-point). As identifying parameters, the SAP system uses internal values (such as the
profile number) or parameters that are generally understood in the market (such as external point of delivery IDs).
For information about the security measures relevant to A2A communication, see the SAP NetWeaver Security
Guide. The authorization objects of the respective transactions provide these processes with additional security.
Market Communication in Intercompany Data Exchange
As part of intercompany data exchange, messages are sent from an SAP Utilities system to a PI system or a
comparable upstream system to prepare for market communication with other market participants. The
messages are then converted into a universally valid market format and sent on to other systems. As identifying
parameters, the SAP system uses values that are generally understood in the market (such as external point of
delivery IDs). Communication can take place using enterprise services or IDocs (ALE communication).
For more information about the necessary security measures, see the SAP NetWeaver Security Guide. The
authorization objects of the respective transactions provide these processes with additional security.
13.14.9.4 Deletion of Personal Data
SAP Utilities might process data that is subject to the data protection laws applicable in specific countries as
described in SAP Note 1825544 .
The SAP Information Lifecycle Management (ILM) component supports the entire software lifecycle including the
storage, retention, blocking, and deletion of data. SAP Utilities uses SAP ILM to support the deletion of personal
data. SAP delivers end of purpose checks for SAP Utilities-specific objects.
End of Purpose Check (EoP)
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. The retention period of data consists of the following phases.
● Phase one: The relevant data is actively used.
● Phase two: The relevant data is actively available in the system.
● Phase three: The relevant data needs to be retained for other reasons.
For example, processing of data is no longer required for the primary business purpose, but to comply with
legal rules for retention, the data must still be available. In phase three, the relevant data is blocked. Blocking
of data prevents the business users of SAP applications from displaying and using data that may include
personal data and is no longer relevant for business activities.
Security Guide for SAP S/4HANA 1709
770 P U B L I C SAP S/4HANA Business ApplicationsBlocking of data can impact system behavior in the following ways:
● Display: The system does not display blocked data.
● Change: It is not possible to change a business object that contains blocked data
● Create: It is not possible to create a business object that contains blocked data.
● Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a business
object that contains blocked data.
● Search: It is not possible to search for blocked data or to search for a business object using blocked data in
the search criteria.
It is possible to display blocked data if a user has special authorization; however, it is still not possible to create,
change, copy, or perform follow-up activities on blocked data.
For information about the configuration settings required to enable this three-phase based end of purpose check,
see Process Flow and Configuration: Simplified Blocking and Deletion.
Integration with Other Solutions
The end of purpose checks for SAP Utilities are based on those of the Contract Accounts Receivable and Payable
(FI-CA) solution. You use transaction FPDPR1 in the SAP menu under Contract Accounts Receivable and
Payable Periodic Processing For Data Protection Check If Business Partner Can Be Blocked to check for
which business partners the end of purpose has been reached.
SAP Utilities is also integrated with SAP Sales and Distribution (SD) and SAP Customer Relationship Management
(CRM). Cross-system and cross-application end of purpose checks exist in both cases.
If, for example, a business partner is used in SAP Utilities (as part of SAP ERP) and in SAP CRM, the end of
purpose checks cover both applications so that data for a blocked business partner cannot be accessed in either
application.
Relevant Application Objects and Available Deletion Functionality
SAP Utilities uses SAP ILM to support the deletion of personal data. For more information, see the documentation
for Information Lifecycle Management.
Relevant Application Objects and Available EoP Functionality
The following end of purpose checks exist:
● Check for open contracts without any open items in their contract account
● Check if all invoicing documents have been printed
● Check if all billing documents have been invoiced
● Check if business partner is used in a franchise fee contract
● Check if business partner is used in a loyalty account
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 771● Check if business partner is used as a service provider
● Check if business partner is used as an owner
● Check for open disconnection documents for business partner
● Check if business partner is used in role ISUI (installer)
● Check for open error messages for business partner in CRM replication monitoring
The checks for the SAP Utilities-specific object types are included in the enhancement spot
ISU_DPP_EOP_CHECK. For more information, see the documentation for the Business Add-Ins in the system.
Process Flow
1. Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM).
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available
3. You do the following:
○ Run transaction IRMPOL and maintain the required residence and retention policies for the central
business partner (ILM object: CA_BUPA).
○ Run transaction BUPA_PRE_EOP to enable the end of purpose check function for the central business
partner.
○ Run transaction IRMPOL and maintain the required residence and retention policies for the customer
master and vendor master in SAP ERP (ILM objects: FI_ACCPAYB, FI_ACCRECV, FI_ACCKNVK)
○ Run transaction CVP_PRE_EOP to enable the end of purpose check function for the customer master and
vendor master in SAP ERP.
○ Business users can request unblocking of blocked data by using the transaction BUP_REQ_UNBLK.
○ If you have the needed authorizations, you can unblock data by running the transaction BUPA_PRE_EOP
and CVP_UNBLOCK_MD
○ You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of SAP Utilities.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management under Data Protection Authorization Management
For more information, see the Customizing documentation.
● Define the settings for blocking under Data Protection Blocking and Unblocking Business Partner
13.14.9.5 Read Access Logging
The Read Access Logging (RAL) component can be used to monitor and log read access to data and provide
information such as which business users accessed personal data, for example, of a business partner, and in
which time frame.
In RAL, you can configure which read-access information to log and under which conditions. SAP delivers sample
configurations for applications. In order to use these configurations, save the ZIP attachments from the SAP Note
Security Guide for SAP S/4HANA 1709
772 P U B L I C SAP S/4HANA Business Applications2370371 . Extract these ZIP files and import the RAL configurations using the import function for configurations
in transaction SRALMANAGER.
SAP Utilities logs bank account and social security number.
For more information about Read Access Logging, see the System Security for SAP NetWeaver AS for ABAP Only
guide. You can find this guide using the search at https://help.sap.com/viewer/p/SAP_NETWEAVER_750
13.14.9.6 SAP Waste & Recycling
13.14.9.6.1 Authorizations
Standard Roles
No standard roles are delivered.
Standard Authorization Objects
The tables below show the security-relevant authorization objects, its descriptions, values and detailed
descriptions of its value-ranges.
All Authority Objects
Table 473:
Authorization Object Description
E_BULKY Authorization Object for Bulk Waste Maintenance IS-U Waste
E_CLEAN Authorization Object of IS-U Waste Property
E_CONNOBJ Authorization Object for Connection Object
E_DEVGRP Authorization object for Device Group
E_DEVLOC Authorization Object for Device Locations
E_ELOCDC Authorization Object for Allocating Notes to Container Loc.
E_ELOCEO Auth. Object for Allocating Waste Disposal Obj. to Container
Loc.
E_GCONTRAC Authorization for Guarantor Contract
E_OBJADDR Authorization Object for Object Address
E_PROPERTY Authorization Object for Owner Allocation
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 773Authorization Object Description
E_ROB Authorization Object for Cleaning Object
E_ROUTE Authorization Object for Route Maintenance
E_SERVADDR Authorization Object for Service Address
E_SERVFREQ Authorization Object for Service Frequency
E_SERVLOC Authorization Object for Container Location
E_WDPLANT Authorization Object for Waste Disposal Facility
E_WEIGHCST Authorization Object for Weighing Connection Customizing
E_WEIGHOFL Authorization Object for Offline Weighing
E_WEIGHPRO Authorization Object for Weighing Procedure
E_WORKAREA Authorization Field for WDOC –– Work Areas
Authority Objects and Values
Table 474:
Authorization Object Field Description
E_BULKY ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_CLEAN ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_CONNOBJ ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU Checktable TBRG -----------------
Authorization Group
E_DEVGRP ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_DEVLOC ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU Checktable TBRG -----------------
Authorization Group
E_ELOCDC ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
Security Guide for SAP S/4HANA 1709
774 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Description
E_ELOCEO ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_GCONTRAC ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU Checktable TBRG -----------------
Authorization Group
E_OBJADDR ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU -----------------
Checktable TBRG
Authorization Group
----------------- -----------------
SWERK Checktable T001W Maintenance Plant
E_PROPERTY ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_ROB ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU Checktable TBRG -----------------
Authorization Group
E_ROUTE ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU Checktable TBRG -----------------
Authorization Group
E_SERVADDR ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU Checktable TBRG -----------------
Authorization Group
----------------- -----------------
SWERK Checktable T001W Maintenance Plant
E_SERVFREQ ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
ISU_EWAOBJ -----------------
Service object (see table be
low) Service Frequency Object
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 775Authorization Object Field Description
E_SERVLOC ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
BEGRU Checktable TBRG -----------------
Authorization Group
E_WDPLANT ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_WEIGHCST ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_WEIGHOFL ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_WEIGHPRO ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
E_WORKAREA ISU_ACTIVT 1-9 (see table below) Activity regarding authoriza
tion in IS-U
----------------- -----------------
ISU_EWAWA -----------------
Checktable
EWA_WDOC_WAREA Waste Disposal Order Cock
pit: Work Area
Ranges of Values from Authority Object ISU_ACTIVT
Table 475:
Value Range Description
1 Display
2 Change
3 Create
4 Delete
5 Change History
6 Reverse
7 Check
8 Execute
9 Display in List
Ranges of Values from Authority Object ISU_EWAOBJ
Security Guide for SAP S/4HANA 1709
776 P U B L I C SAP S/4HANA Business ApplicationsTable 476:
Value Range Description
AREA Property
BEH Container
ROB Cleaning Object
ROUTE Route
SERVLOC Container Location
SDORDER Sales Document
ANLAGE Container Allocation
BULK Bulk Waste
13.14.9.6.2 Internet Communication Framework Security
You should only activate those services that are needed for the applications running in your system. For SAP
Waste and Recycling the service EHWV_WASTE is needed. Use the transaction SICF to activate the service.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information about Internet Communication Framework Services, see the SAP NetWeaver 7.5
Connectivity guide. You can find this guide by searching for Activating and Deactivating ICF Services
at https://help.sap.com/viewer/p/SAP_NETWEAVER_750.
13.14.9.6.3 Deletion of Personal Data
SAP Waste and Recycling might process data that is subject to the data protection laws applicable in specific
countries as described in SAP Note 1825544.
The SAP Information Lifecycle Management (ILM) component supports the entire software lifecycle including the
storage, retention, blocking, and deletion of data. SAP Waste and Recycling uses SAP ILM to support the deletion
of personal data as described in the following sections.
SAP delivers an end of purpose check and WUC for SAP Waste and Recycling.
All applications register either an end of purpose check (EoP) in the Customizing settings for the blocking and
deletion of the customer, vendor and central business partner.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 777End of Purpose Check (EoP)
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. The retention period of data consists of the following phases:
● Phase one: The relevant data is actively used.
● Phase two: The relevant data is actively available in the system.
● Phase three: The relevant data needs to be retained for other reasons.
For example, processing of data is no longer required for the primary business purpose, but to comply with
legal rules for retention, the data must still be available. In phase three, the relevant data is blocked.
Blocking of data prevents the business users of SAP applications from displaying and using data that may
include personal data and is no longer relevant for business activities.
Blocking of data can impact system behavior in the following ways:
● Display: The system does not display blocked data.
● Change: It is not possible to change a business object that contains blocked data.
● Create: It is not possible to create a business object that contains blocked data.
● Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a business
object that contains blocked data.
● Search: It is not possible to search for blocked data or to search for a business object using blocked data in
the search criteria.
It is possible to display blocked data if a user has special authorization; however, it is still not possible to create,
change, copy, or perform follow-up activities on blocked data.
For information about the configuration settings required to enable this three-phase based end of purpose check,
see Process Flow and Configuration: Simplified Blocking and Deletion.
Integration with Other Solutions
In the majority of cases, different installed applications run interdependently as shown in following graphic.
Relevant Application Objects and Available Deletion Functionality
SAP Utilities uses SAP ILM to support the deletion of personal data. For more information, see the documentation
for Information Lifecycle Management at https://help.sap.com.
Table 477: Deletion Functionality
Application Description Deletion Functionality
Transaction EWAORDER Standard application for changing waste ILM object ISU_EORDER
disposal orders
Security Guide for SAP S/4HANA 1709
778 P U B L I C SAP S/4HANA Business ApplicationsApplication Description Deletion Functionality
Transaction EWAWA01 Standard application for maintaining sin ILM object ISU_WPROC
gle position weighing processes
Transaction EWAWA_MULTI Standard application for maintaining ILM object ISU_MWPROC
multi position weighing processes
Transaction ELOC Maintaining service time slices for con ILM Object ISU_SERVFQ
tainers
Relevant Application Objects and Available EoP/WUC Functionality
The following end of purpose checks exist:
● Check for customer and vendor assignments for waste disposal facilities
● Check for partner assignment of bulky orders
The checks for the SAP Waste and Recycling object types can be enhanced in the enhancement spot
EEWA_BF_DPP. For more information, see the documentation for the Business Add-Ins in the system.
Process Flow
1. Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM).
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available.
3. You do the following:
○ Run transaction IRMPOL and maintain the required residence and retention policies for the central
business partner (ILM object: CA_BUPA).
○ Run transaction BUPA_PRE_EOP to enable the end of purpose check function for the central business
partner.
○ Run transaction IRMPOL and maintain the required residence and retention policies for the customer
master and vendor master in SAP ERP (ILM objects: ISU_ROUTE, ISU_SERVFQ, ISU_WPROC).
○ Run transaction CVP_PRE_EOP to enable the end of purpose check function for the customer master and
vendor master in SAP ERP.
4. Business users can request unblocking of blocked data by using the transaction BUP_REQ_UNBLK.
5. If you have the needed authorizations, you can unblock data by running the transaction BUPA_PRE_EOP and
CVP_UNBLOCK_MD.
6. You delete data by using the transaction ILM_DESTRUCTION for the ILM objects of .
For information about how to configure blocking and deletion for , see
Configuration: Simplified Blocking and Deletion.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 779Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management in under Data Protection Authorization Management. For
more information, see the Customizing documentation.
● Define the settings for blocking in Customizing for Cross-Application Components under Data Protection
Blocking and Unblocking Business Partner .
13.14.9.7 Multichannel Foundation for Utilities and Public
Sector
13.14.9.7.1 Authorizations
The Multichannel Foundation for Utilities and Public Sector solution uses the authorization concept provided by
the SAP NetWeaver Application Server for ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver Application
Server ABAP Security Guide also apply to the Multichannel Foundation for Utilities and Public Sector solution. The
SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator transaction on the Application Server ABAP (AS ABAP).
Reference Role Templates and Authorizations in SAP CRM
You create a reference user (UMC_REF_USR) during system installation. The reference user provides the
necessary authorizations for each online user. This means the reference user can access data in the back end
systems and Gateway.
PFCG role templates (SAP_CRM_UMC_ODATA and SAP_ISU_UMC_ODATA for SAP CRM and SAP S/4HANA,
respectively) are delivered with SAP CRM and SAP S/4HANA, which can be used (together with role templates
delivered by Gateway, for example, /IWBEP/RT_USS_INTUSR) to create the PFCG role for the reference user.
Reference Role Templates and Authorizations in SAP S/4HANA
For SAP S/4HANA, the PFCG role template (SAP_ISU_UMC_ODATA) is delivered with the SAP S/4HANA system,
which can be used together with role templates delivered by Gateway, for example, /IWBEP/RT_USS_INTUSR to
create the PFCG role for the reference user.
Security Guide for SAP S/4HANA 1709
780 P U B L I C SAP S/4HANA Business ApplicationsService Role Templates and Authorizations in SAP CRM
In addition to the reference user, you create a service user (UMC_SRV_USR) during installation. The service user is
responsible for creating the application users. Since the service user is used for anonymous logon, the user
should be granted minimum authorizations.
PFCG role templates (SAP_CRM_UMC_SRV and SAP_ISU_UMC_SRV for SAP CRM and SAP S/4HANA, respectively)
are delivered in SAP CRM and SAP S/4HANA systems, which can be used (together with role templates delivered
by Gateway, for example, /IWBEP/RT_USS_SRVUSR) to create the PFCG role for the service user.
For more information, see the SAP Help Portal at:http://help.sap.com/nwgateway SAP Gateway Security
Guide Authorizations in the SAP System Roles in the SAP Gateway Landscape .
Service Roles and Authorizations in SAP S/4HANA
For SAP SAP S/4HANA, the PFCG role template SAP_ISU_UMC_SRV is delivered in SAP S/4HANA system, which
can be used together with role templates delivered by Gateway, for example, /IWBEP/RT_USS_SRVUSR to create
the PFCG role for the service user.
Creating and Assigning Roles in SAP CRM
To create the required users (UMC_SRV_USR, UMC_REF_USR), you must perform the following steps in SAP S/
4HANA, SAP CRM, and the Gateway systems.
Note
In role maintenance, choose Utilities Templates to display the available templates, copy templates
delivered by SAP, change the copies, and create templates for yourself. You will need the authorization User
Master Record Maintenance: User Groups (S_USER_GRP) with value * in the fields CLASS and ACTVT. SAP
template names start with the letter S; therefore, templates that you create must not start with S.
You require administrator authorizations to create roles and users, and to assign roles to users.
1. Create a role and enter a description.
2. Insert the authorizations using the role templates.
Depending on the system and the role type, you can combine different role templates; see the following table:
Table 478:
Templates SAP CRM System SAP S/4 HANA System Gateway
UMC_SRV_USR SAP_CRM_UMC_SRV SAP_ISU_UMC_SRV /IWFND/RT_GW_USR
/IWBEP/RT_USS_SRVUSR /IWBEP/RT_USS_SRVUSR /IWBEP/RT_USS_SRVUSR
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 781Templates SAP CRM System SAP S/4 HANA System Gateway
UMC_REF_USR SAP_CRM_UMC_ODATA SAP_ISU_UMC_ODATA /IWBEP/RT_USS_INTUSR
/IWBEP/RT_USS_INTUSR /IWBEP/RT_USS_INTUSR
Note
Add additional required authorization objects /IWFND/SRV, S_SECPOL and S_TCODE
3. You must manually add authorization object CRM_IUPROC to the reference user in the SAP CRM system. The
recommendation is to add activity 16 (execute) on all the processes (*) as shown below:
4. Verify and edit the authorizations, if necessary.
For the UMC_SRV_USR, check role access to the following services (authorization object: S_SERVICE):
○ Activate OData Services in the Gateway system.
○ CRM_UTILITIES_UMC_URM (SAP CRM and Gateway)
○ CRM_UTILITIES_UMC_PUBLIC_SRV (SAP CRM and Gateway)
○ /IWBEP/USERMANAGEMENT (SAP CRM and Gateway)
For the UMC_REF_USR, check role access to the following services (authorization object: S_SERVICE):
○ Activate OData Services in the Gateway system.
○ CRM_UTILITIES_UMC (for SAP CRM system and Gateway)
○ ERP_UTILITIES_UMC (for SAP S/4HANA system and Gateway)
○ /IWBEP/USERMANAGEMENT (for SAP CRM system and Gateway)
This is especially true when some function enhancements are carried out.
5. Generate the authorizations.
A profile is automatically generated for the role.
6. Assign the role to users (UMC_SRV_USR, UMC_REF_USR) and run a user master comparison to enter the
generated profile into the user master record.
Creating and Assigning Roles in SAP S/4HANA
To create the required users (UMC_SRV_USR, and UMC_REF_USR), you must perform the following steps in SAP S/
4HANA and the Gateway systems.
Note
In role maintenance, choose Utilities Templates to display the available templates, copy templates
delivered by SAP, change the copies, and create templates for yourself. You will need the authorization User
Master Record Maintenance: User Groups (S_USER_GRP) with value * in the fields CLASS and ACTVT. SAP
template names start with the letter S; therefore, templates that you create must not start with S.
You require administrator authorizations to create roles and users, as well as to assign roles to users.
1. Create a role and enter a description.
2. Insert the authorizations using the role templates.
Security Guide for SAP S/4HANA 1709
782 P U B L I C SAP S/4HANA Business ApplicationsDepending on the system and the role type, you can combine different role templates; see the following table:
Table 479:
Templates SAP S/4HANA System Gateway System
UMC_SRV_USR SAP_ISU_UMC_SRV /IWFND/RT_GW_USR
/IWBEP/RT_USS_SRVUSR /IWBEP/RT_USS_SRVUSR
UMC_REF_USR SAP_ISU_UMC_ODATA /IWBEP/RT_USS_INTUSR
/IWBEP/RT_USS_INTUSR
Note
Add additional required authorization objects /WFND/SRV, S_SECPOL and S_TCODE
3. Verify and edit the authorizations, if necessary.
For the UMC_SRV_USR, check role access to the following services (authorization object: S_SERVICE):
○ ERP_UTILITIES_UMC_URM (SAP S/4HANA and Gateway)
○ /IWBEP/USERMANAGEMENT (SAP S/4HANA and Gateway): This only applies to the standalone SAP ERP
scenario
For the UMC_REF_USR, check role access to the following services (authorization object: S_SERVICE):
○ ERP_UTILITIES_UMC (for SAP S/4HANA system and Gateway)
○ /IWBEP/USERMANAGEMENT (for SAP S/4HANA system and Gateway)
This is especially true when some function enhancements are carried out.
4. Generate the authorizations.
A profile is automatically generated for the role.
5. assign the role to users (UMC_SRV_USR, UMC_REF_USR) and run a user master comparison to enter the
generated profile into the user master record.
Related Information
Gateway Security Guide
See http://help.sap.com/nwgateway
User and Role Administration for SAP NetWeaver AS for ABAP
See http://help.sap.com/netweaver under Identity Management
Authorization Templates
See http://help.sap.com/netweaver , under System Administration Tasks Authorizations Maintaining
Authorizations
Setting up Authorizations with Role Maintenance
See http://help.sap.com/netweaver , under System Administration TasksAuthorizationsMaintaining
Authorizations
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 78313.14.9.7.2 Internet Communication Framework Security (ICF)
Security for the Multichannel Foundation for Utilities and Public Sector solution consists of SAP Gateway OData
services and HTML5/SAP UI5-based Web-enabled content managed by the Internet Communication Framework
(ICF) (transaction SICF).
You must activate the ICF services required for the applications you want to use.
Note
You can also activate these services during the technical configuration.
The Multichannel Foundation for Utilities and Public Sector solution relies on the following services in SAP CRM:
● UMCUI5: An HTML5/SAP UI5-based Web-enabled interface to access the OData services
● CRM_UTILITIES_UMC: OData services from the SAP CRM system
● CRM_UTILITIES_UMC_URM: Multichannel Foundation for Utilities and Public Sector extension of the SAP
Gateway USERREQUESTMANAGEMENT OData service
● CRM_UTILITIES_UMC_PUBLIC_SRV: Anonymous OData Service for products in SAP CRM
● ERP_UTILITIES_UMC_URM (logon user UMC_SRV_USR): OData services from the SAP S/4HANA system
In addition, the application also uses service USERMANAGEMENT from SAP Gateway.
The Multichannel Foundation for Utilities and Public Sector ERP stand-alone solution relies on the following
services:
● ERP_ISU_UMC (logon user/current user): Multichannel Foundation for Utilities and Public Sector extension of
the Gateway USERREQUESTMANAGEMENT OData Service
● ERP_UTILITIES_UMC: OData services from the SAP S/4HANA system
● ERP_ISU_UMC_PUBLIC (logon user UMC_SRV_USR)
In addition, the application also uses the service USERMANAGEMENT from SAP Gateway.
Related Information
RFC/ICF Security Guide
See http://help.sap.com/netweaver under SAP NetWeaver 7.0 Including Enhancement Package 1 SAP
NetWeaver Security Guide Security Guides for Connectivity and Interoperability .
13.14.10 SAP for Insurance
Note that the following security information applies to SAP Claims Management (FS-CM) only and not to other
SAP for Insurance solutions.
Security Guide for SAP S/4HANA 1709
784 P U B L I C SAP S/4HANA Business Applications13.14.10.1 SAP Claims Management
13.14.10.1.1 Authorizations
SAP Claims Management uses the authorization concept provided by the SAP NetWeaver for Application Server
ABAP. The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles.
For role maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Standard Roles
SAP Claims Management uses the following PFCG roles:
Table 480:
PFCG Role Description
SAP_ICL_CLAIM_HANDLER Role for claim handling
SAP_ICL_CLAIM_VIEWER Role for claim display
SAP_ICL_CLAIM_CUSTOMIZING Role for customizing
SAP_ICL_CLAIM_AUTHORIZATION Role for payments, reserves, subrogation
SAP_ICL_CLAIM_PROCUREMENT Role for procurement
SAP_ICL_CLAIM_BATCH Role for background processing
SAP_BR_INS_CLAIMS_HANDLER Role for general claim handling particularly using backend
transactions
SAP_BR_INS_CLAIMS_SUPERVISOR Role for claim processing team overview
SAP_BR_INS_CUSTOMER_SERVICE Role for claim creation
SAP Claims Management uses the following portal roles:
Table 481:
Portal Role Description
Claim Center Agent (Insurance) The portal role is delivered in Business Package for Center
(com.sap.pct.isins.ccagent.claim_center_agent) Agent (Insurance) 1.30.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 785Portal Role Description
Claim Handler (Insurance) This portal role has the additional authorization to create and
(com.sap.pct.isins.clmhandl.claim_handler) release payments up to a specific amount. The amount is de
fined in Customizing of the backend system.
The portal role is delivered in Business Package for Claim
Handler (Insurance) 1.30.
The following Web Dynpro ABAP applications are embedded in these portal roles:
● Claims Search: icl_wd_claimsearchapp_ui
● Claims Summary: icl_wd_claimsummary_ui
● Post Proc FROI (Post Processing of First Report of Injury): icl_wd_postprocfroi_ui
Standard Authorization Objects
General List
You can find a list with all standard authorization objects in the SAP Help Portal at http://help.sap.com/
insurance-cm under Application Help Claims Management Claim Administration of the Claims
Management System Authorizations in the Claims Management System .
Authorization Objects for Use of Enterprise Search
You can find the relevant authorization objects in the in the SAP Help Portal at http://help.sap.com/insurance-cm
under Application Help Claims Management Claim Administration of the Claims Management System
Search Using Enterprise Search , chapter Integration.
Authorization Objects for Use of BRFplus
You can find the relevant authorization objects in the in the SAP Help Portal at http://help.sap.com/insurance-cm
under Application Help Claims Management Claim Structuring Business Processes Business Rule
Framework plus (BRFplus) Authorizations for Using BRFplus .
13.14.10.1.2 Data Storage Security
Using Logical Path and File Names to Protect Access to the File System
SAP Claims Management save data in files in the file system. Therefore, it is important to explicitly provide access
to the corresponding files in the file system without allowing access to other directories or files (also known as
directory traversal). This is achieved by specifying logical paths and file names in the system that map to the
physical paths and file names. This mapping is validated at runtime and if access is requested to a directory that
does not match a stored mapping, then an error occurs.
Security Guide for SAP S/4HANA 1709
786 P U B L I C SAP S/4HANA Business ApplicationsThe following list shows the logical file names and paths used by SAP Claims Management and for which
programs these file names and paths apply:
Logical File Names Used in SAP Claims Management
The following logical file names have been created in order to enable the validation of physical file names:
● ICLVEH
○ Program using this logical file name and parameters used in this context: ICL_VEHCATALOG_UPLOAD
○ Customizing path: SAP Insurance Claims Management Claim Business Settings Damaged
Objects/Diagnoses Damaged Objects/Injured Persons Import Catalog for Insured Objects
● ICLDIAG
○ Program using this logical file name and parameters used in this context: ICL_DIAG_UPLOAD
○ Customizing path: SAP Insurance Claims Management Claim Business Settings Damaged
Objects/Diagnoses Damaged Objects/Injured Persons Diagnoses Import Diagnosis Groups and
Diagnoses
● ICLSUPPL
○ Program using this logical file name and parameters used in this context: ICL_ICLCLAIMDATA_UPLOAD
● ICLDI
○ Program using this logical file name and parameters used in this context: ICL_DATA_UP_DOWNLOAD
Activating the Validation of Logical Path and File Names
These logical paths and file names, as well as any subdirectories, are specified in the system for the
corresponding programs. For downward compatibility, the validation at runtime is deactivated by default. To
activate the validation at runtime, maintain the physical path using the transactions FILE (client-independent)
and SF01 (client-specific). To find out which paths are being used by your system, you can activate the
corresponding settings in the Security Audit Log.
13.14.10.1.3 Data Protection
13.14.10.1.3.1 User Consent
It is the responsibility of insurance companies themselves to obtain the consent of all of their business partners
with regard to the use of their personal data.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 78713.14.10.1.3.2 Read Access Logging
In Read Access Logging, you can configure which read-access information to log and under which conditions. In
the following table, you can find the configurations (shipped with SAP Claims Management), the fields are logged,
and the relevant business context:
Table 482:
Configuration Fields Logged Business Context
ICL_SSN ● Tax Number Category (field SAP Claims Management logs tax data.
TAXTYPE in for instance table
ICLC_ICL_BP_MINI_SCREEN-) Note
● Business Partner Tax Number In the Mini Business Partner the tax
(TAXNUM) number is only logged if the user has
selected the tax number category
US1.
ICL_BANK ● Bank details ID (BKEXT) SAP Claims Management logs bank ac
● Bank country key (BANKS) count data.
● Bank Key (BANKL)
● Bank account number (BANKN)
● IBAN (IBAN)
ICL_HEALTH The fields in the following categories are SAP Claims Management logs health
logged: data.
● Claim item groupings and the rele
vant items with subclaim type, cov
erage, coverage type, benefit type,
benefits catalog
● Diagnosis
● Procedures
● Tooth notation and eyeglass pre
scription
● Level of care
● Suspension of care
● Insured persons and claimant
● Facts capture
● Payments
For Read Access Logging of health data, you have to activate specific views in Customizing for SAP Insurance
under Claims Management Claim Technical Settings Data Protection Read Access Logging Activate
Specific Views for Read Access Logging .
13.14.10.1.3.3 Deletion of Personal Data
SAP Claims Management might process data (personal data) that is subject to the data protection laws applicable
in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and
Security Guide for SAP S/4HANA 1709
788 P U B L I C SAP S/4HANA Business Applicationsdeletion of personal data. For more information, see the product assistance for SAP S/4HANA on the SAP Help
Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 483:
Application Object Provided Deletion Functionality
Archiving of Claims ILM Object ICLCLAIM (see SAP Note 1976123 )
(Archiving Object ICLCLAIM) )
Archiving of Claim Bundles ILM Object ICLECCEVT (see SAP Note 1976123 )
(Archiving Object ICLECCEVT)
Archiving of Subclaims ILM Object ICLSUBCL
(Archiving Object ICLSUBCL)
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management in Customizing for Cross-Application Components under
Data Protection Authorization Management . For more information, see the Customizing
documentation.
● Define the settings for blocking in Customizing for Cross-Application Components under Data Protection
Blocking and Unblocking Business Partner .
You configure the settings related to the blocking and deletion of customer master data in Customizing for SAP
Insurance under Claims Management Claim Technical Settings Archiving .
13.14.10.1.3.4 Change Log
In order to log personal data in FS-CM, you can use the following standard function of FS-CM:
● Log of changes in a claim and in a claim bundle
When you are processing a claim or a claim bundle, you can view a structured overview showing the changes
in the relevant claim or claim bundle. To call up the structured change overview, choose Tools Claim
Changes (Overview) in claim processing, or Tools Bundle Changes (Overview) in claim bundle
processing. In the next dialog screen you see the overview tree with the changes that have been made.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 789For more information, see Application Help of SAP Claims Management under Claim Administration of
the Claims Management System Display of Changes in Claim and Claim Bundle .
Note
Changes of business partner data will be locked in the business partner system since business partner data
cannot be locked in FS-CM.
13.14.10.2 SAP Statutory Reporting for Insurance
13.14.10.2.1 Deletion of Personal Data in FS-SR
Use
The Statutory Reporting (FS-SR) might process data (personal data) that is subject to the data protection laws
applicable in specific countries. The business partners in the statutory reports can only be legal entities (in
German: juristische Personen), not natural persons. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data in the applications providing the data, for example, in Loans
Management (FS-CML). For more information, see the product assistance for SAP S/4HANA on the SAP Help
Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross Components Data Protection .
In FS-SR, business partner data can only be deleted manually, using deletion reports.
Relevant Application Objects and Available Deletion Functionality
Table 484:
Application Object Detailed Description Provided Deletion Functionality
Ledger Data Table For more information, see SAP Note ● Transaction ISSR_NB2
2304306 . ● Transaction ISSR_MIG5
Stored List Transaction ISSR_OUT_ALV
Business Partner Change List Transaction ISSR_DEL_CNS_GPCH
Security Guide for SAP S/4HANA 1709
790 P U B L I C SAP S/4HANA Business Applications13.14.11 Oil and Gas
13.14.11.1 Upstream Operations Management
13.14.11.1.1 Authorizations
SAP Oil & Gas uses the authorization concept provided by the SAP NetWeaver AS for ABAP. Therefore, the
recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP
also applies.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Standard Roles - Backend
SAP delivers standard roles covering the most frequent business transactions. You can use these roles as a
template for your own roles.
In Oil & Gas, PFCG delta roles are used to access content in the application. To make the end-user role complete
these roles must be used along with other roles delivered by SAP. Example roles are included in the table below.
These roles are designed to support your IS-OIL business processes. The following roles are delivered:
Software Component IS-PRA
Table 485:
Role Description
SAP_UPS_ALLOC_RES_APP SAP Upstream Allocation Results
SAP_UPS_ALLOC_STAT_APP SAP Upstream Network Allocation Status
SAP_UPS_BULKUPLOAD_APP SAP UPS Upload Production Data
SAP_UPS_DEFER_EVT_APP SAP Upstream View Deferment Events Application Role
SAP_UPS_DEFER_RES_APP SAP Upstream Analyze Deferment Application Role
SAP_UPS_DEFER_WOEVT_APP SAP Upstream Deferment Events for Work Orders Application
Role
SAP_UPS_DTIMPORT SAP Upstream Operations Management Data Import Role
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 791SAP_SR_UOM_S4 NWBC Upstream Operations Management Role
SAP_UPS_FC_ACCESS_APP SAP UOM Manage Access
SAP_UPS_FC_CALFCST_APP SAP UOM Calculate Forecast
SAP_UPS_FC_GTHDATA_APP SAP UOM Gather Data
SAP_UPS_FC_MNGPROJ_APP SAP UOM Manage Projects
SAP_UPS_FC_RESULTS_APP SAP UOM View Forecasting Results
SAP_UPS_FDC_APP SAP Upstream Field Data
SAP_UPS_FIXERRORS_APP SAP Upstream Fix Errors
SAP_UPS_MNGHIER_APP SAP UPS Manage Hierarchy
SAP_UPS_FC_APFCST_APP SAP UOM Approve and Publish Forecast
Roles and Standard Authorization Objects
Deferment
Roles
● SAP_UPS_DEFER_EVT_APP: SAP Upstream View Deferment Events Application Role
● SAP_UPS_DEFER_RES_APP: SAP Upstream Analyze Deferment Application Role
● SAP_UPS_DEFER_WOEVT_APP: SAP Upstream Deferment Events for Work Orders Application Role
Authorization Objects
The table below shows the security-relevant authorization objects used in the Deferment area of Upstream
Operations Management product in SAP Oil & Gas:
Security Guide for SAP S/4HANA 1709
792 P U B L I C SAP S/4HANA Business ApplicationsTable 486:
Authorization Object Field Value Description
GHO_ALLOC GHO_ACTVT (Activity in Op 01 Allocation Run/Results Authorization Object for OPM
erations Performance) Activities
02 Allocation Rules
03 Capture Measurements
(Actual, Plan, Theoretical)
04 Well Test / PQ Curve
05 Chemical Analysis
06 Prior period notification
07 Maintenance Retrieval Hi
erarchy
08 Simulation / Planning
09 Reset prior period notifica
tion
10 Deferment App Result
11 Allocation App Result
12 FDC App Deferment Event
13 Allocation Pre-Processing
14 Deferment Event Mainte
nance
15 Deferment Event Mainte
nance for Work Orders
GHO_D_EVT ACTVT (Activity) 01 Create or generate Authorization Objects for De
ferment Events
02 Change
03 Display
06 Delete
GHO_STATUS (UOM Record APRD Approved
Status)
EROR Error
PROV Provisional
PUBL Published
REDY Default Audit Compari
son Record
VERF Verified
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 793Authorization Object Field Value Description
GHO_NO ACTVT (Activity) 01 Create or generate Authorization Object for Net
work Objects
02 Change
03 Display
06 Delete
GHO_NO_ID (Network object
name)
GHO_PN ACTVT (Activity) 01 Create or generate Authorization Object for Pro
duction network
02 Change
03 Display
06 Delete
GHO_PN_ID (Production net
work name )
Allocation
Roles
● SAP_UPS_ALLOC_RES_APP: SAP Upstream Allocation Results
● SAP_UPS_ALLOC_STAT_APP: SAP Upstream Network Allocation Status
Authorization Objects
The table below shows the security-relevant authorization objects used in the Allocation area of Upstream
Operations Management product in SAP Oil & Gas:
Security Guide for SAP S/4HANA 1709
794 P U B L I C SAP S/4HANA Business ApplicationsTable 487:
Authorization Object Field Value Description
GHO_ALLOC GHO_ACTVT (Activity in Op 01 Allocation Run/Results Authorization Object for OPM
erations Performance) Activities
02 Allocation Rules
03 Capture Measurements
(Actual, Plan, Theoretical)
04 Well Test / PQ Curve
05 Chemical Analysis
06 Prior period notification
07 Maintenance Retrieval Hi
erarchy
08 Simulation / Planning
09 Reset prior period notifica
tion
10 Deferment App Result
11 Allocation App Result
12 FDC App Deferment Event
13 Allocation Pre-Processing
14 Deferment Event Mainte
nance
15 Deferment Event Mainte
nance for Work Orders
GHO_A_RES GHO_ACTION APPV Approve Authorization Object for Allo
cation Results
PUBD Publish
SUBM Submit for Approval
VRFY Verify
GHO_PN_ID (Production net
work name )
GHO_STATUS (UOM Record APRD Approved
Status)
EROR Error
PROV Provisional
PUBL Published
REDY Default Audit Compari
son Record
VERF Verified
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 795Authorization Object Field Value Description
GHO_PN ACTVT (Activity) 01 Create or generate Authorization Object for Pro
duction network
02 Change
03 Display
06 Delete
GHO_PN_ID (Production net
work name )
Field Data Capture
Roles
● SAP_UPS_FDC_APP: SAP Upstream Field Data
● SAP_UPS_FIXERRORS_APP: SAP Upstream Fix Errors
Authorization Objects
The table below shows the security-relevant authorization objects used in the Field Data Capture area of
Upstream Operations Management product in SAP Oil & Gas:
Security Guide for SAP S/4HANA 1709
796 P U B L I C SAP S/4HANA Business ApplicationsTable 488:
Authorization Object Field Value Description
GHO_ALLOC GHO_ACTVT (Activity in Op 01 Allocation Run/Results Authorization Object for OPM
erations Performance) Activities
02 Allocation Rules
03 Capture Measurements
(Actual, Plan, Theoretical)
04 Well Test / PQ Curve
05 Chemical Analysis
06 Prior period notification
07 Maintenance Retrieval Hi
erarchy
08 Simulation / Planning
09 Reset prior period notifica
tion
10 Deferment App Result
11 Allocation App Result
12 FDC App Deferment Event
13 Allocation Pre-Processing
14 Deferment Event Mainte
nance
15 Deferment Event Mainte
nance for Work Orders
GHO_FDC ACTVT (Activity) 01 Create or generate Authorization Objects for
Field Data Capture
02 Change
03 Display
06 Delete
GHO_STATUS (UOM Record APRD Approved
Status)
EROR Error
PROV Provisional
PUBL Published
REDY Default Audit Compari
son Record
VERF Verified
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 797Authorization Object Field Value Description
GHO_NO ACTVT (Activity) 01 Create or generate Authorization Object for Net
work Objects
02 Change
03 Display
06 Delete
GHO_NO_ID (Network object
name)
GHO_PN ACTVT (Activity) 01 Create or generate Authorization Object for Pro
duction network
02 Change
03 Display
06 Delete
GHO_PN_ID (Production net
work name )
Forecasting
Roles
● SAP_UPS_MNGHIER_APP: SAP UPS Manage Hierarchy
● SAP_UPS_FC_MNGPROJ_APP: SAP UPS Manage Forecast Projects
● SAP_UPS_FC_ACCESS_APP: SAP UPS Manage Forecast Access
● SAP_UPS_FC_GTHDATA_APP: SAP UPS Gather Forecast Data
● SAP_UPS_FC_CALFCST_APP: SAP UPS Calculate Forecast
● SAP_UPS_FC_RESULTS_APP: SAP UPS View Forecast Results
● SAP_UPS_FC_APFCST_APP: SAP UPS Approve and Publish Forecast
Authorization Objects
The table below shows the security-relevant authorization objects used in the Forecasting area of Upstream
Operations Management product in SAP Oil & Gas:
Table 489:
Authorization Object Field Value Description
GHO_FC_HI ACTVT (Activity) 01 Add or Create Authorization Obj for Hierar
chy Maintenance in Forecast
02 Change ing
03 Display
B_USERST_T ACTVT (Activity) 01 Add or Create Status Management: Set/
Delete User Status using
06 Delete
Transaction
OBTYP (Object Category)
Security Guide for SAP S/4HANA 1709
798 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
BERSL (Authorization key)
STSMA (Status Profile)
B_USERSTAT ACTVT (Activity) 01 Add or Create Authorization Object for Net
work Objects
06 Delete
OBTYP (Object Category)
BERSL (Authorization key)
STSMA (Status Profile)
GHO_FC_PR ACTVT (Activity) 01 Add or Create Authorization Object for
Project in Forecasting
S_BTCH_JOB JOBACTION (Job operations) RELE Release Jobs (Released Background Processing: Op
Automatically When Sched erations on Background Jobs
uled)
JOBGROUP (Summary of
jobs for a group)
MDG_DIF ACTVT (Activity) 16 Execute Data Import
67 Translate
MDG_OBJTYP (Business Ob
ject Type)
Data Import Framework
Roles
● SAP_UPS_DTIMPORT: SAP Upstream Operations Management Data Import Role
● SAP_UPS_BULKUPLOAD_APP: SAP UPS Upload Production Data
Authorization Objects
The table below shows the security-relevant authorization objects used in the Data Import Framework area of
Upstream Operations Management product in SAP Oil & Gas:
Table 490:
Authorization Object Field Value Description
MDG_DIF ACTVT (Activity) 16 Execute Data Import
67 Translate
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 799Authorization Object Field Value Description
MDG_OBJTYP(Business Ob DM_EVENT UOM: Import De
ject Type) ferment Events
FD_METER UOM : FDC Meter
Reading Data
Critical Combinations
Roles Creation in PFCG
1. Standard role: SAP_UPS_DEFER_RES_APP
2. Copy the standard role to a new role and change the authorization as per required by the user .
For Example: Role created is: Z_RES_CREATE
Authorizations provided to the role to view particular production network (HK_PN) and to create and display
the event for this particular production network.
So the user to which this role would be assigned, will only be able to see View/Create the event for this
particular production network.
3. Assign the same to the user.
4. Log in with the same user in the application.
5. Create event for the same.
Standard Fiori Business Roles
The table below shows the standard Fiori business roles used in Upstream Operations Management product in
SAP Oil & Gas:
Software Component UIS4HOP1 - UI for S/4HANA On Premise
Table 491:
Role Description
SAP_BR_BUSINESS_ANALYST_IOG Business Analyst (IOG)
SAP_BR_DEFERMENT_ANALYST_IOG Deferment Analyst (IOG)
SAP_BR_FC_ANALYST_PROD_IOG Forecast Analyst - Production (IOG)
SAP_BR_FIELD_OPERATOR_IOG Field Operator (IOG)
SAP_BR_FORECAST_MANAGER_IOG Forecast Manager (IOG)
SAP_BR_FORECAST_SPECIALIST_IOG Forecast Specialist (IOG)
Security Guide for SAP S/4HANA 1709
800 P U B L I C SAP S/4HANA Business ApplicationsSAP_BR_HYDROCARBON_ANALYST_IOG Hydrocarbon Analyst (IOG)
SAP_BR_PROD_DATA_SPEC_IOG Production Data Specialist (IOG)
13.14.11.1.2 Internet Communication Framework Security (ICF)
● For Oil and Gas, Upstream Operations Management (UOM) module the following services are needed:
○ Allocation
○ GHO_WDA_ALLOC_MC_OIF (Capture Measurements)
○ GHO_WDA_ALLOC_RESULTS_OIF (Display Allocation Results)
○ GHO_WDA_ALLOC_RULES_OIF (Process Allocation Rules)
○ GHO_WDA_ALLOC_MRH_OIF (Process MRH Rules)
○ Network Object
○ o GHO_WDA_NETOBJ_OIF (Create a Network Object)
○ o GHO_WDA_NETOBJ_OIF (Change a Network Object)
○ o GHO_WDA_NETOBJ_OIF (Display a Network Object)
○ o GHO_WDA_OG_ENTITY (Create an Oil & Gas Entity)
○ o GHO_WDA_OG_ENTITY (Change an Oil & Gas Entity)
○ o GHO_WDA_OG_ENTITY (Display an Oil & Gas Entity)
● Ownership
○ Division of Interest
○ GHO_WDA_OWN_OIF (Create a Division of Interest (DOI)
○ GHO_WDA_OWN_OIF (Change a Division of Interest (DOI)
○ GHO_WDA_OWN_OIF (Display a Division of Interest (DOI)
○ GHO_WDA_OWN_NET_ASG_OIF (Assign a Division of Interest to Network Objects)
○ Scale Method
○ GHO_WDA_OWN_SM_OIF (Create a Sliding Scale Method)
○ GHO_WDA_OWN_SM_OIF (Change a Sliding Scale Method)
○ GHO_WDA_OWN_SM_OIF (Display a Sliding Scale Method)
○ Business Partner
○ Process Business Partner
○ Owner Transfer Request
○ GHO_WDA_OWN_TRO_GAF (Create an Owner Request)
○ GHO_WDA_OWN_TRO_GAF (Change an Owner Request)
○ GHO_WDA_OWN_TRO_GAF (Display an Owner Request)
○ Reports (Display Only)
○ GHO_WDA_OWN_RPT_OIF (Oil & Gas Business Partner Report)
○ GHO_WDA_OWN_RPT_OIF (Division of Interest Owners)
○ GHO_WDA_OWN_RPT_OIF (Well Completions Assigned to Division of Interest)
○ GHO_WDA_OWN_RPT_OIF (Division of Interest History Report)
○ GHO_WDA_OWN_RPT_OIF (Ownership Entitlement Results)
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 801● Network Modeling
○ GHO_NETWORK_OIF (Model a Production Network Structure)
○ GHO_NETWORK_OIF (Display a Production Network Structure)
For running SAP Fiori applications for Upstream Operations Management please activate some of the common
SICF node. These SICF node needs to be activated on the front end server (SAP NetWeaver Gateway).
Activate the following SICF nodes specific to Upstream Operations Management Fiori Applications:
● UIS4HOP1 - UI for S/4HANA On Premise
○ /sap/bc/ui5_ui5/sap/ups_alloc_ress1
○ /sap/bc/ui5_ui5/sap/ups_alloc_stas1
○ /sap/bc/ui5_ui5/sap/ups_blkuploads1
○ /sap/bc/ui5_ui5/sap/ups_commonss1
○ /sap/bc/ui5_ui5/sap/ups_defer_evts1
○ /sap/bc/ui5_ui5/sap/ups_defer_ress1
○ /sap/bc/ui5_ui5/sap/ups_def_woevts1
○ /sap/bc/ui5_ui5/sap/ups_fc_accesss1
○ /sap/bc/ui5_ui5/sap/ups_fc_apfcsts1
○ /sap/bc/ui5_ui5/sap/ups_fc_calfcts1
○ /sap/bc/ui5_ui5/sap/ups_fc_cmpress1
○ /sap/bc/ui5_ui5/sap/ups_fc_ghdatas1
○ /sap/bc/ui5_ui5/sap/ups_fc_mngpros1
○ /sap/bc/ui5_ui5/sap/ups_fc_results1
○ /sap/bc/ui5_ui5/sap/ups_fdcs1
○ /sap/bc/ui5_ui5/sap/ups_fixerrorss1
○ /sap/bc/ui5_ui5/sap/ups_mnghiers1
● Activate the following SICF nodes of OData services being used by Fiori applications:
○ /sap/opu/odata/sap/ups_bulk_upld
○ /sap/opu/odata/sap/ups_common
○ /sap/opu/odata/sap/ups_def_event
○ /sap/opu/odata/sap/ups_def_result
○ /sap/opu/odata/sap/ups_def_work_order
○ /sap/opu/odata/sap/ups_fc_appr_pub
○ /sap/opu/odata/sap/ups_fc_calc_fcst
○ /sap/opu/odata/sap/ups_fc_gatherdata
○ /sap/opu/odata/sap/ups_fc_mng_access
○ /sap/opu/odata/sap/ups_fc_mng_project
○ /sap/opu/odata/sap/ups_fc_view_res
○ /sap/opu/odata/sap/ups_field_data_capture
○ /sap/opu/odata/sap/ups_fix_error
○ /sap/opu/odata/sap/ups_hca_result
○ /sap/opu/odata/sap/ups_hca_status
○ /sap/opu/odata/sap/ups_mng_hierarchy
Security Guide for SAP S/4HANA 1709
802 P U B L I C SAP S/4HANA Business Applications13.14.11.1.3 Other Security-Relevant Information
The following table shows an overview of the data flow in UOM in a two system DMZ environment. Data access is
separated from the presentation layer, which is running on the second machine. The UI is accessed using HTTP or
HTTPs.
Table 492:
Step Description Security Measure
User Interface: FPM-based ABAP Web Data requests, updates, and actions are ABAP WebDypro, unified rendering, ac
Dynpro with Unified Rendering triggered from the UI. cess using HTTP or HTTPS
PLM UI Framework Infrastructure for communication be
tween GUIBBs/WebDynpro context and
SPI connector
SPI Connector (DMZ System) Acting like a proxy for the back end SPI Metadata is read from back end only
connector.
RFC RFC based data transfer between DMZ Protocol switch to RFC; White list for ta
system and ERP back end system; ble based data transfer; Sync with meta
xstring based data transfer data model in connector
SPI Connector (Back End System) A standardized interface that is used to Validation against metadata definition
transfer data from the application serv during data transfer
ice provider to the UI framework con
sumer.
Application Service Provider Implementation Additional metadata definition
13.14.11.2 IS-OIL Downstream
13.14.11.2.1 Authorizations
SAP Oil & Gas uses the authorization concept provided by the SAP NetWeaver AS for ABAP or AS Java. Therefore,
the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide
ABAP and SAP NetWeaver AS Security Guide Java also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s
user administration console on the AS Java.
Note
For more information about how to create roles, see the SAP NetWeaver Security Guide under User
Administration and Authentication.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 803Standard Roles
SAP delivers standard roles covering the most frequent business transactions. You can use these roles as a
template for your own roles.
In Oil & Gas, PFCG delta roles are used to access content in the application. To make the end-user role complete
these roles must be used along with other roles delivered by SAP. Example roles are included in the table below.
These roles are designed to support your IS-OIL business processes. The following roles are delivered:
Table 493:
Role Description
SAP_BR_SHIPPING_SPECIALIST_IOG This role is enhanced to support IS-OIL business processes
and must be used along with other roles delivered by SAP. For
example, SAP_BR_SHIPPING_SPECIALIST. This role includes
Transportation and Distribution shipment processing, master
data maintenance for shipment, shipment processing and
Transportation Scheduler Workbench operations.
SAP_BR_INVENTORY_MANAGER_IOG This role is enhanced to support IS-OIL business processes
and must be used along with other roles delivered by SAP. For
example, SAP_BR_INVENTORY_MANAGER. This role man
ages inventory with respect to quantity and value. It also in
cludes IS-OIL specific Quantity Conversion Interface (QCI)
and tank management related tasks.
SAP_BR_BILLING_CLERK_IOG This role is enhanced to support IS-OIL business processes
and must be used along with other roles delivered by SAP. For
example, SAP_BR_BILLING_CLERK.. This role is used mostly
for IS-OIL specific exchanges netting related tasks.
SAP_BR_SUPPLYCHAIN_MANAGER_IOG This role is enhanced to support IS-OIL business processes
and must be used along with other roles delivered by SAP. For
example, SAP_BR_PURCHASING_MANAGER, SAP_BR_PUR
CHASER, SAP_BR_INTERNAL_SALES_REP.The Supply Chain
Manager role is primarily responsible for ensuring proper sup
ply of hydrocarbons downstream of the Oil & Gas value chain.
This role is also responsible for handling the exchange busi
ness for refined products with exchange partners.
Security Guide for SAP S/4HANA 1709
804 P U B L I C SAP S/4HANA Business ApplicationsSAP_BR_TRANSP_SCHDLR_IOG This role is enhanced to support IS-OIL business processes
and must be used along with other roles delivered by SAP. For
example, SAP_BR_PURCHASING_MANAGER,
SAP_BR_SALES_MANAGER, SAP_BR_CONTRACT_MAN
AGER_CC . The transportation scheduler schedules as well as
execute hydrocarbon logistics movements along the supply
chain. The scheduler is responsible for multiple terminals
and/or transport systems as well as multiple crude or finished
products. As part of the job, the scheduler schedules primarily
bulk shipments, usually in planning cycles like weekly/
monthly cycles. The scheduling includes vessels, barges, rail,
truck, and pipeline for crude, feed stocks and refined prod
ucts.
SAP_BR_PRICING_SPECIALIST_IOG This is an IS-OIL role for pricing.
The pricing specialist is responsible to Create Price, Change
Price, Mass change of prices, and Mass Creation of prices.
Sets up the price lists for preparation and issue the price lists
for execution. Keeps the prices consistent across different
channels. Checks compliance of prices according to guide
lines for example, discount policy. Receives price data from
stakeholders for example, for a campaign or from product or
marketing manager. Views global market price quotes for oil
products in the system and can also modify these price
quotes in system based on prior approvals. Is responsible for
creation of F&A pricing based on the price quotes that are
available in system, Requests price data from business units
and provides information for the (customer) data specialist.
Also gives the proposal for relevant product. In addition to
that, also triggers configuration changes (for example, collab
orate with IT), trigger creation/completion/correction of ma
terial master data, and trigger price approval. And also gives
the notification to purchaser/production planner in case of
poor availability.
SAP_BR_TERMINAL_OPERATOR_IOG The terminal operator is responsible for safely operating all
terminal equipment in connection with receiving, storing,
transferring, and loading of petroleum products through
trucks, rail cars, water vessels, barges. Is also responsible for
tank farm operations, pipeline receipts, response boat opera
tion, testing of products and documentation of results, main
tenance of terminal equipment, carrier scheduling, prepara
tion of various terminal reports and general maintenance and
upkeep of the facility.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 805Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used.
Table 494:
Authorization Object Field Value Description
O_OIJ_NOM OIJ_NOMTYP Display If you are authorized for a par
ticular transport system, , lo
OIJ_TSYST
cation only then the you can
OIJ_SHPR view/change the event data in
OIJ_CARR Mass Change Event Fiori App.
OIJ_LOC
O_OIJ_NOM OIJ_NOMTYP Change If you are authorized for a par
ticular nomination type, trans
OIJ_TSYST
port system, shipper, carrier
OIJ_SHPR and location only then the you
OIJ_CARR can view/change the nomina
tion data in the Nomination
OIJ_LOC Fiori app.
O_OIJ6_INV OIJ_LOC Display If you are authorized for par
ticular location and material
MATNR
for which you are running the
BWTAR regional inventory only then
data/inventory data is dis
played in the Regional Inven
tory Fiori app.
O_O3DEFA WERKS Determines which activities
are allowed for O3DEFAULTS
O_OI0_TCD TCD This object controls which Oil
downstream transactions the
user may access. The field
values are identical to the
transaction code.
O_OIA_EXG OIA_EXGTYP Create or generate Determines which activities
are allowed for maintenance
BUKRS Change
of Exchange Headers and as
Display signment of sales and pur
Print chasing contracts.
Edit messages
Security Guide for SAP S/4HANA 1709
806 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
O_OIA_LIA OIA_UPEDOC Create Determines which activities
are allowed for maintenance
BUKRS Display
of Exchange Logical Inventory
Create or generate Adjustments.
Display
O_OIA_NDOC BUKRS Create or generate Determines which activities
are allowed for maintenance
Change
of the Exchange Netting docu
Display ment.
Print, edit messages
Lock
O_OIF_PBL OIF_PBLTYP Create or generate Determines which activities
are allowed for maintenance
OIRB_AUTGR Change
of Business Locations.
Display
O_OIG_SHP BETRVORG Determines which activities
are allowed for maintenance
TPLST
of certain shipments. The
OIG_SHTYPE shipments are determined by
shipment type and transpor
tation planning point.
O_OIG_SPT VSTEL Determines if:
The assignment of deliveries
to TD shipments according to
the shipping point of the deliv
eries is allowed or not.
The user can change deliver
ies when in the TD shipments
function, according to the
shipping point of the deliver
ies, or whether this is not al
lowed.
O_OIJ_3WP OIJ_3WPACT Create This authorization object is
checked whenever a user tries
Change
to access the 3WP transac
Display tion.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 807Authorization Object Field Value Description
O_OIJ_LOCN OIJ_LOCTYP Create or generate This authorization object is
used to authorize maintaining
Change
locations in Trader''s and
Display Schedulers Workbench. The
locations are determined by
the location type.
O_OIJ_NMST OIJ_NOMTYP Activate/Deactivate This authorization object is
checked whenever a status
Display
code is activated or deacti
vated.
O_OIJ_NOM OIJ_NOMST Create or generate
Change
Display
Print, edit messages
Lock
O_OIJ_NOMA OIJ_NOMTYP Create or generate This authorization object is
checked whenever a user tries
OIJ_NOMST Change
to access the nomination
Display data.
O_OIJ_NOMI VSART Create or generate This authorization object is
used to authorize mainte
WERKS Change
nance of nominations in Trad
Display er''s and Schedulers Work
bench.
The nominations are created
with reference to a transport
system.
O_OIJ_PROL KTOKD Create or generate This authorization object is
used to authorize maintaining
KTOKK Change
partner role assignments in
WERKS Display Trader''s and Schedulers
LGORT Print, edit messages Workbench.
Lock The TSW partner roles are de
termined by the vendor grp,
cust. grp. and the plant and
storage location attached to a
role type at a location or
transport system.
Security Guide for SAP S/4HANA 1709
808 P U B L I C SAP S/4HANA Business ApplicationsAuthorization Object Field Value Description
O_OIJ_SPTP OIJ_SPTYPE Change Determines which activities
(Display or Change) are al
OIJ_SIMTYP Display
lowed for different Stock Pro
jection Types (SP types).
O_OIJ_TCKT OIJ_NOMTYP Create or generate
OIJ_TSYST Change
OIJ_SHPR Display
OIJ_CARR Print, edit messages
OIJ_LOC Lock
O_OIJ_TKT OIJ_TKTTYP Create This authorization object is
checked whenever a user tries
Change
to access the Ticket Data
Display
Delete
Retrieve from archive
Rebook
Reverse
O_OIJ_TSYS VSART Create This authorization object is
used to authorize maintaining
WERKS Change
transport system in Trader''s
Display and Schedulers Workbench.
The transport systems are de
termined by the shipping type
O_OIR_PBLD OIF_PBLTYP Create or generate Determines whether a user is
authorized to view a specific
OIRA_RNBT Change
business location master data
OIF_DTSECT Display section on a detailed business
type level.
O_OIR_PBLG OIF_PBLTYP Create or generate Determines whether a user is
authorized to view a specific
OIF_DTSECT Change
business location master data
Display section on a detailed business
Print, edit messages type level.
Lock
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 809Authorization Object Field Value Description
O_OIRB_PBL OIF_PBLTYP Create or generate
OIRB_AUTGR Change
OIRA_RNBT Display
O_OIJ_IPW ACTVT Create or generate Provides access to create, de
lete, view and publish simula
Change tions.
Display
Delete
OIB_PHYINV WERKS Create or generate Provides access to capture
the real time physical inven
ACTVT Change
tory data for the plants they
Display are authorized to.
Print, edit messages
Delete
Discard
13.14.11.2.2 Internet Communication Framework Security (ICF)
You should only activate those services that are needed for the applications running in your system. For the Fiori
apps My Nominations , Regional Inventory View and Mass Change Events in the TSW area, following services are
needed:
● TSW_MYNOMINATIONS_SRV_01
● TSW_REGIONAL_INVENTORY_SRV_01
● TSW_MYEVENTS_SRV
Use the transaction SICF to activate these services.
If your firewall(s) use URL filtering, also note the URLs used for the services and adjust your firewall settings
accordingly.
For more information about ICF security, see the respective chapter in the SAP NetWeaver Security Guide.
13.14.11.2.3 Deletion of Personal Data
The IS-OIL Downstream might process data that is subject to the data protection laws applicable in specific
countries as described in SAP Note 1825544.
The SAP Information Lifecycle Management (ILM) component supports the entire software lifecycle including the
storage, retention, blocking, and deletion of data. The IS-OIL Downstream uses SAP ILM to support the deletion of
personal data as described in the following sections.
Security Guide for SAP S/4HANA 1709
810 P U B L I C SAP S/4HANA Business Applications● SAP delivers an end of purpose check for the IS-OIL Downstream
● SAP delivers a where-used check (WUC) for the IS-OIL Downstream
All applications register either an end of purpose check (EoP) in the Customizing settings for the blocking and
deletion of the customer and vendor master or a WUC. For information about the Customizing of blocking and
deletion for IS-OIL Downstream application , see Configuration: Simplified Blocking and Deletion.
End of Purpose Check (EoP)
An end of purpose check determines whether data is still relevant for business activities based on the retention
period defined for the data. The retention period of data consists of the following phases.
● Phase one: The relevant data is actively used.
● Phase two: The relevant data is actively available in the system.
● Phase three: The relevant data needs to be retained for other reasons.
For example, processing of data is no longer required for the primary business purpose, but to comply with
legal rules for retention, the data must still be available. In phase three, the relevant data is blocked. Blocking
of data prevents the business users of SAP applications from displaying and using data that may include
personal data and is no longer relevant for business activities.
Blocking of data can impact system behavior in the following ways:
● Display: The system does not display blocked data.
● Change: It is not possible to change a business object that contains blocked data
● Create: It is not possible to create a business object that contains blocked data.
● Copy/Follow-Up: It is not possible to copy a business object or perform follow-up activities for a business
object that contains blocked data.
● Search: It is not possible to search for blocked data or to search for a business object using blocked data in
the search criteria.
It is possible to display blocked data if a user has special authorization; however, it is still not possible to create,
change, copy, or perform follow-up activities on blocked data.
For information about the configuration settings required to enable this three-phase based end of purpose check,
see Process Flow and Configuration: Simplified Blocking and Deletion.
Integration with Other Solutions
In the majority of cases, different installed applications run interdependently as shown in following graphic.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 811An example of an application that uses central master data is an SAP for Healthcare (IS-H) application that uses
the purchase order data stored in Financial Accounting (FI) or Controlling (CO).
Security Guide for SAP S/4HANA 1709
812 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application Objects and Available Deletion Functionality
Table 495:
Application Detailed Description Provided Deletion Functionality
IS-OIL Downstream The customer/vendor blocking report ILM Enabled Archiving objects:
will check the consuming application to OIG_DRIVER
determine end of purpose of the cus
tomer/vendor. OIG_VEHCLE
In an IS-OIL system, in addition to the OIG_TPUNIT
EOP checks performed by SD,MM ,FI ap OIJ_NOMIN
plication the checks for usage of the cus
tomer/vendor in IS-OIL Downstream ap OIJ_TICKET
plication has to be made. IS_OIFSPBL
The IS-OIL application has to register it Data Destruction objects:
self under the customer master data and
vendor master data as consuming appli OIJ_SCHED_DESTRUCTION
cations that need to be checked for EoP . OIJ_PARTNER_DESTRUCTION
EOP. Check logic in IS-OIL will be deliv
ered in the class CVP_OIL_EOP_CHECK. OIA_EXGDOCU_DESTRUCTION
OIL_TAS_TPI_DESTRUCTION
Decoupled TSW TSW_ECC The customer/vendor blocking report ILM Enabled Archiving objects:
will check the consuming application to OIG_VEHCLE
determine end of purpose of the cus
tomer/vendor. OIG_TPUNIT
In a Decoupled TSW scenario , the OIJ_NOMIN
checks for usage of customer/vendor in OIJ_TICKET
TSW application specific documents like
nomination is made. IS_OIFSPBL
The TSW_ECC application has to register Data Destruction objects:
itself under the customer master data OIJ_SCHED_DESTRUCTION
and vendor master data as consuming
applications that need to be checked for OIJ_PARTNER_DESTRUCTION
EoP . EOP Check logic in TSW_ECC will
be delivered in the class
CVP_TSW_ECC_CHECK.
Process Flow
1. Before archiving data, you must define residence time and retention periods in SAP Information Lifecycle
Management (ILM).
○ Run transaction IRMPOL and maintain the required residence and retention policies for the customer
master and vendor master in SAP ERP (ILM objects: FI_ACCPAYB, FI_ACCRECV, FI_ACCKNVK).
○ Run transactionIRMPOL and maintain the required retention policies for the ILM objects of IS OIL
Downstream, application or Decoupled TSW .
2. You choose whether data deletion is required for data stored in archive files or data stored in the database,
also depending on the type of deletion functionality available
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 8133. To determine which business partners have reached end of purpose and can be blocked, you do the following:
○ Run transaction CVP_PRE_EOP to execute the end of purpose check function for the customer master
and vendor master in SAP ERP.
4. To unblock blocked business partner data, you do the following
○ Request unblocking of blocked data by using the transaction BUP_REQ_UNBLK.
○ If you have the needed authorization for unblocking business partner data, you can unblock the requested
data by running the transaction CVP_UNBLOCK_MD for customer master data and vendor master data in
SAP ERP.
5. You delete data by using the transactionILM_DESTRUCTION for the ILM objects of IS OIL Downstreamor
Decoupled TSW.
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components under Data Protection.
● Define the settings for authorization management under Data Protection Authorization Management
For more information, see the Customizing documentation.
● Define the settings for blocking under Data Protection Blocking and Unblocking Business Partner
13.14.11.2.4 Read Access Logging
If no trace or log is stored that records which business users have accessed data, it is difficult to track the
person(s) responsible for any data leaks to the outside world. The Read Access Logging (RAL) component can be
used to monitor and log read access to data and provide information such as which business users accessed
personal data, for example, of a business partner, and in which time frame.
In RAL, you can configure which read-access information to log and under which conditions.
For more information, see Read Access Logging in the documentation for SAP NetWeaver on the SAP Help Portal
under http://help.sap.com .
13.14.12 Engineering, Construction, and Operations
13.14.12.1 Equipment and Tools Management
Security Guide for SAP S/4HANA 1709
814 P U B L I C SAP S/4HANA Business Applications13.14.12.1.1 Authorizations
Equipment and Tools Management (ETM) uses the authorization concept provided by the SAP NetWeaver AS for
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS
Security Guide ABAP also apply.
The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role
maintenance, use the profile generator (transaction PFCG) on the AS ABAP.
Note
For more information about how to create roles, see the NetWeaver Security Guide under User Administration
and Authentication.
Standard Authorization Objects
The table below shows the security-relevant authorization objects that are used:
Table 496:
Authorization Object Description
J_3GBLART Authorizations for document types
J_3GEQART2 CEM – Equipment Types for Document Category 2
J_3GEMPGR2 CEM - Recipient Groups, Document Category 2
J_3GBEWTP2 CEM – Transaction Types, Document Category 2
J_3GACTVT CEM Allowed Activities
J_3GABRLST Call CEM Settlement List for Organizational Units
J_3GDISPGR MRP Group in Equipment
J_3GDBER Planning Area in Recipient
J_3G_TCODE Transaction Code
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 81513.14.12.1.2 Deletion of Personal Data
Use
Equipment and Tools Management (ETM) might process data (personal data) that is subject to the data
protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to
control the blocking and deletion of personal data. For more information, see the product assistance for SAP S/
4HANA on the SAP Help Portal at http://help.sap.com/s4hana_op_1709 Product Assistance Cross
Components Data Protection .
Relevant Application Objects and Available Deletion Functionality
Table 497:
Application Provided Deletion Functionality
Equipment and Tools Management (IS-ADEC-ETM) Archiving Object
/SAPCEM01
/SAPCEM02
/SAPCEM03
/SAPCEM04
/SAPCEM05
/SAPCEM06
/SAPCEM07
ILM Object
SAPCEM_01
SAPCEM_02
SAPCEM_07
Security Guide for SAP S/4HANA 1709
816 P U B L I C SAP S/4HANA Business ApplicationsRelevant Application Objects and Available EoP/WUC functionality
Table 498:
Application Implemented Solution (EoP or WUC) Further Information
Equipment and Tools Management (IS- EoP Checks tables /SAPCEM/BDPO,
ADEC-ETM) J_3GBELP
Configuration: Simplified Blocking and Deletion
You configure the settings related to the blocking and deletion of business partner master data in Customizing for
Cross-Application Components→Data Protection.
Security Guide for SAP S/4HANA 1709
SAP S/4HANA Business Applications P U B L I C 81714 Business Network Integration
SAP S/4HANA currently supports integration scenarios with the Ariba Network (including Ariba Sourcing via the
Ariba Network), and with SAP Fieldglass.
14.1 Security Aspects for Connectivity Types
In all of the connectivity types described below, only the on-premise system opens the connection to the Cloud,
thus supporting the highest level of security. A proxy or reverse proxy in the demilitarized zone (DMZ) is not
required.
The SAP S/4HANA system communicates with the business networks through the HTTPS protocol, encrypting
transmitted data.
Direct Connectivity
For direct connectivity, SAP S/4HANA always opens the connection by executing the following actions:
● SAP S/4HANA pushes cXML messages to the business networks (synchronous)
● The Polling Agent in SAP S/4HANA fetches pending messages from the business networks (synchronous)
Mediated Connectivity
For mediated connectivity, the SAP S/4HANA system connects through SAP PI. The connection functions as
follows:
● SAP S/4HANA pushes cXML messages to SAP PI (asynchronous)
● The Ariba Network Adapter for SAP NetWeaver triggers its Polling Agent to fetch pending cXML messages
from Ariba Network. The Polling Agent in the PI adapter then pushes the cXML messages to the SAP S/
4HANA system (asynchronous).
If SAP S/4HANA communicates with Ariba Network through SAP PI, there are no special security requirements.
Note
For mediated connectivity, Ariba provides information on how to communicate with Ariba Network in the Ariba
Network Adapter for SAP NetWeaver Setup Guide. You can contact Ariba for more information.
Security Guide for SAP S/4HANA 1709
818 P U B L I C Business Network Integration14.2 Direct Connectivity: SAP S/4HANA as Client
When sending a cXML message to a business network, the sender must authenticate itself:
● SAP Fieldglass supports authentication by client certificate.
● Ariba Network offers authentication with client certificate or with shared secret password. Both
authentication methods are also supported by SAP S/4HANA. For more information about the authentication
methods on Ariba Network, contact SAP Ariba.
Note
Communication with the Ariba Network and with SAP Fieldglass is based on HTTPS. For HTTPS SSL
encryption, SAP Cryptographic Library is required. For information about installing the SAP Cryptographic
Library, search for “The SAP Cryptographic Library Installation Package” in the documentation of SAP
NetWeaver at http://help.sap.com/nw.
Authentication with Client Certificate (Ariba Network Only)
For authentication with client certificate it is strongly recommended that you use the latest version of the SAP
Cryptographic Library (SAPCRYPTOLIB). For more information about latest SAP Cryptographic Library versions,
bugs, and fixes see SAP Note 455033 .
Note
Only certificates in Personal Security Environment (PSE) format can be imported. Certificates in other formats
must first be converted to PSE format. The conversion can be done using the command line tool SAPGENPSE.
The tool can be installed with SAP Cryptographic Library installation package.
For example, to convert from P12 (Public-Key Cryptography Standards) format to PSE format, enter the
following command line:
sapgenpse import_p12 -v -r -p
Setting up authentication with client certificate includes the following steps:
1. Get the client certificate from a Certification Authority (CA) that is trusted by Ariba.
2. Import the private key of the certificate into the SAP S/4HANA system by using Trust Manager (transaction
STRUST).
1. To store the client certificate in SAP S/4HANA, you have to create a new Client Identity in Trust Manager.
Proceed as follows:
1. Choose Environment SSL Client Identities , enter ARIBA as the identity name and Ariba
Network Client as the description.
2. Save your entries.
2. Import the private key of the certificate in Trust Manager. Proceed as follows:
1. Select the created ARIBA SSL Client ID and choose PSE Import to import the PSE file.
2. Enter the password for the certificate, if required.
Security Guide for SAP S/4HANA 1709
Business Network Integration P U B L I C 8193. Save your PSE file by choosing PSE Save as SSL Client , and enter ARIBA as the SSL Client.
4. Navigate to the Own Certificate group box on the Trust Manager screen, and double-click the
certificate to add it to the certificate list. The certificate is now shown in Trust Manager in Certificate
List.
3. Import the root certificate into the SAP S/4HANA system by using Trust Manager. Proceed as follows:
1. Double-click the SSL Client Identity ARIBA that you have created.
2. Navigate to the Certificate group box and choose Import certificate. Add the imported certificate to the
certificate list by clicking Add to Certificate List.
4. For HTTPS SSL encryption, obtain the server certificate from Ariba. Proceed as follows:
1. Go to buyer.ariba.com.
2. Download the certificate using your browser.
For example, if you are using Internet Explorer, choose View Security Report View Certificates .
On the Details tab page, choose Copy to File and export it in the Base-64 encoded X.509 format.
3. Import the server certificate into the SAP S/4HANA system using Trust Manager.
4. Double click the ARIBA SSL Client ID that you have created.
5. Navigate to the Certificate group box and choose Import certificate. Add the imported certificate to the
certificate list by clicking Add to Certificate List.
5. To activate the changes, restart the Internet Communication Manager (ICM) using transaction SMICM and
choose Administration ICM Restart Yes . For more information, search for the phrase Using the
ICM Monitor in the documentation of SAP NetWeaver at help.sap.com.
6. Configure the Web services in SOA Manager (transaction SOAMANAGER). Find the following consumer proxies:
○ cXMLSynchronousOutboundAdapterMessage_Out (CO_ARBFND_PRX_OADP_OUT)
○ cXMLGetPendingDataRequest_Out (CO_ARBFND_PRX_GPDQ_OUT)
In the Details of Consumer Proxy group box, navigate to the Configurations tab page and select the logical
port. In the Configuration of Logical Port group box, navigate to the Consumer Security tab page, choose the X.
509 SSL Client Certificate radio button, and enter Ariba in the SSL Client PSE of transaction STRUST field.
7. For Ariba Network: In the profile of your account on Ariba Network, select the Certificate authentication
method in the cXML setup and enter the public key of the certificate.
Authentication with User and Password
To set up authentication with a user and a password, proceed as follows:
1. Maintain the user and the password in the Define Credentials and Endpoints for Ariba Network Customizing
activity or in the Define Credentials for SAP Fieldglass Customizing activity, respectively.
The password is stored in the secure storage of your SAP S/4HANA system. SAP S/4HANA supports
passwords with a maximum length of 36 characters.
Note
According to security requirements, passwords must not be written to logs, protocols, or traces.
Therefore, the password is not visible in transactions such as SRT_MONI where the XML message
monitoring and tracing takes place, as business users can also have authorization for the message
monitoring transactions. However, when activating an Internet Communication Framework (ICF) recording
using transaction SICF, the system logs the password in the corresponding ICF trace. ICF recording is only
intended for administrators and requires the S_ADMI_FCD authorization.
Security Guide for SAP S/4HANA 1709
820 P U B L I C Business Network IntegrationAriba Network integration only: For authentication with shared secret password, the shared secret
password has to be provided in the Sender element of the cXML payload.
2. For HTTPS SSL encryption, obtain the server certificate from the business network. Proceed as follows:
1. Go to buyer.ariba.com or to fieldglass.net, respectively.
2. Download the certificate using your browser.
For example, if you are using Internet Explorer, choose View Security Report . Choose View
Certificates. On the Details tab page, choose Copy to File and export the certificate in the Base-64
encoded X.509 format.
3. Import the server certificate into the SAP S/4HANA system using Trust Manager.
4. Double-click the SSL Client SSL Client (Anonymous) node.
Navigate to the Certificate group box and choose Import certificate. Add the imported certificate to the
certificate list by clicking Add to Certificate List.
3. To activate the changes, restart the Internet Communication Manager (ICM) using transaction SMICM and
choose Administration ICM Restart Yes .
4. In the profile of your account in the Ariba Network, select the shared secret authentication method in the
cXML setup.
14.3 Direct Connectivity: SAP S/4HANA as Server
No proxy or reverse proxy is required. The asynchronous inbound application service interfaces are called either
internally in the SAP S/4HANA system or by SAP PI.
14.4 Roles and Authorizations (Ariba Network)
A technical user is required in the SAP S/4HANA system to process messages coming from the Ariba Network.
This user must not have the SAP_ALL authorization. Assign the following roles to this user:
● SAP_ARBFND_INTEGRATION
The authorization object ARBFND_ARB is required to execute reports and to process inbound messages. This
object can be added by assigning the role SAP_ARBFND_INTEGRATION.
● Process Purchase Orders (SAP_MM_PUR_PURCHASEORDER)
This role provides authorization for purchase orders and is required to process incoming messages that
update purchase orders.
● Process Inbound Deliveries (SAP_LE_INB_DEL_PROCESSING).
This role provides authorization for inbound deliveries and is required to process incoming messages that
create inbound deliveries with receiving point.
● Enter Invoices for Verification in the Background (SAP_MM_IV_CLERK_BATCH1)
This role provides authorization to post or park incoming invoice documents in the background. Alternatively,
you can assign any other role that contains the authorization object M_RECH_WRK.
Security Guide for SAP S/4HANA 1709
Business Network Integration P U B L I C 821Depending on whether you use direct or mediated connectivity, you also have to assign one of the following roles:
● For direct connectivity:
Web Service Consumer (SAP_BC_WEBSERVICE_CONSUMER)
This role is required for using Web service protocol to communicate in direct connectivity.
● For mediated connectivity:
Exchange Infrastructure: Service User for Application Systems (SAP_XI_APPL_SERV_USER)
This role is required to communicate through XI protocol in mediated connectivity.
To make sure the corresponding profiles are available and active, you must generate the role profiles using
transaction PFCG.
14.5 Roles and Authorizations (SAP Fieldglass)
A technical user is required in the SAP S/4HANA system to process messages coming from SAP Fieldglass. This
user must not have the SAP_ALL authorization. Instead, you have to do the following:
1. Create a role that contains the authorization object ARBFND_FG, enter your SAP Fieldglass buyer company
code in the field FG_BUY_CC, and assign this role to the technical user.
2. Assign the role Enter Invoices for Verification in the Background (SAP_MM_IV_CLERK_BATCH1) to the
technical user. This role provides authorization to post or park incoming invoice documents in the
background. Alternatively, you can assign any other role that contains the authorization object M_RECH_WRK.
3. Depending on whether you use direct or mediated connectivity, you also have to assign one of the following
roles:
○ For direct connectivity:
Web Service Consumer (SAP_BC_WEBSERVICE_CONSUMER)
This role is required for using Web service protocol to communicate in direct connectivity.
○ For mediated connectivity:
Exchange Infrastructure: Service User for Application Systems (SAP_XI_APPL_SERV_USER)
This role is required to communicate through XI protocol in mediated connectivity.
To make sure the corresponding profiles are available and active, you must generate the role profiles using
transaction PFCG.
Security Guide for SAP S/4HANA 1709
822 P U B L I C Business Network Integration15 Session Security Protection
Secure Session Management
To increase security and prevent access to the SAP logon ticket and security session cookie(s), we recommend
activating secure session management. We also highly recommend using SSL to protect the network
communications where these security-relevant cookies are transferred.
Session Security Protection on the AS ABAP
For SAP NetWeaver version 7.0 and higher, it is recommended to activate HTTP security session management
using transaction SICF_SESSIONS. In particular it is recommended to activate extra protection of security-related
cookies.
The HttpOnly flag instructs the browser to deny access to the cookie through client side script. As a result, even if
a cross-site scripting (XSS) flaw exists, and a user accidentally accesses a link that exploits this flaw, the browser
will not reveal the cookie to a third party.
The Secure flag tells the browser to send the cookie only if the request is being sent over a secure channel such as
HTTPS. This helps protect the cookie from being passed over unencrypted requests.
These additional flags are configured through the following profile parameters:
Table 499:
Profile Parameter Recommended Value Description Comment
icf/ 0 Add HttpOnly flag Client-dependent
set_HTTPonly_flag_on_cook
ies
login/ticket_only_by_https 1 Add Secure flag Not client-dependent
For more information, a list of the relevant profile parameters, and detailed instructions, see Activating HTTP
Security Session Management on AS ABAP in the AS ABAP security documentation.
Security Guide for SAP S/4HANA 1709
Session Security Protection P U B L I C 823Important Disclaimers and Legal Information
Coding Samples
Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system
environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and
completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP
intentionally or by SAP''s gross negligence.
Accessibility
The information contained in the SAP documentation represents SAP''s current view of accessibility criteria as of the date of publication; it is in no way intended to be a
binding guideline on how to ensure accessibility of software products. SAP in particular disclaims any liability in relation to this document. This disclaimer, however, does
not apply in cases of willful misconduct or gross negligence of SAP. Furthermore, this document does not result in any direct or indirect contractual obligations of SAP.
Gender-Neutral Language
As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales
person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not
exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible.
Internet Hyperlinks
The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not
warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages
caused by the use of related information unless damages have been caused by SAP''s gross negligence or willful misconduct. All links are categorized for transparency
(see: http://help.sap.com/disclaimer).
Security Guide for SAP S/4HANA 1709
824 P U B L I C Important Disclaimers and Legal InformationSecurity Guide for SAP S/4HANA 1709
Important Disclaimers and Legal Information P U B L I C 825go.sap.com/registration/
contact.html
© 2017 SAP SE or an SAP affiliate company. All rights reserved.
No part of this publication may be reproduced or transmitted in any
form or for any purpose without the express permission of SAP SE
or an SAP affiliate company. The information contained herein may
be changed without prior notice.
Some software products marketed by SAP SE and its distributors
contain proprietary software components of other software
vendors. National product specifications may vary.
These materials are provided by SAP SE or an SAP affiliate company
for informational purposes only, without representation or warranty
of any kind, and SAP or its affiliated companies shall not be liable for
errors or omissions with respect to the materials. The only
warranties for SAP or SAP affiliate company products and services
are those that are set forth in the express warranty statements
accompanying such products and services, if any. Nothing herein
should be construed as constituting an additional warranty.
SAP and other SAP products and services mentioned herein as well
as their respective logos are trademarks or registered trademarks
of SAP SE (or an SAP affiliate company) in Germany and other
countries. All other product and service names mentioned are the
trademarks of their respective companies.
Please see http://www.sap.com/corporate-en/legal/copyright/
index.epx for additional trademark information and notices.">