Basic Understanding of Roles and Authorization
Basic Understanding of Roles and Authorization
Basic Understanding of Roles and Authorization
Many of the Functional Consultants face issues in understanding what are the Roles and what are
Authorizations in SAP. This is a document which would help people who are curious to know what is
exactly the concept behind this and how does it work.
Functional Consultants have a lot of questions in mind regarding this concept and one of the main
questions here is why should Functional Consultants worry about Roles and Authorization when it is a job
of BASIS team.
Well, to answer this, it is not solely a job of BASIS team rather it is also like other activities, it an
integrated activity which should be performed by both BASIS team and Functional team.
BASIS team have a know how about the User Management, Roles Creation, Profile Creation, Roles and
Profile assignment, Authorization assignments etc. but main concern in most of the cases arises when
the below questions are unanswered by BASIS team:
and many more such questions cannot be answered by BASIS team. Hence, it becomes the role of a
Functional Consultant to guide them with the exact process flow and exact organizational chart.
Explaining with a small example here, suppose we have a maintenance team as below:
Now, Functional Consultant is very well aware that for Supervisor would require only the transactions
related to Notifications (say IW21, IW22, IW28, IW29 etc), Maintenance In-charge would require some of
the notification related transactions (say IW22, IW28, IW29) and also order related transactions (IW31,
IW32, IW38, IW39 etc) and the Head of the department would require notifications and order transactions
(say IW28, IW29, IW38, IW39) and also along with this he require special permissions like releasing
orders, approving permits, technical completions etc.
Looking from BASIS teams perspective they are not clear with these requirements and they thus cannot
take the decision for this and should be provided by Functional Consultants.
But, the main issue in most of the cases arises when Functional Consultants are not aware about the
concept of Roles and Authorizations.
Hereby, this document will explain the basic concept of Roles and Authorizations:
1. Transaction Codes
2. Profile
3. Authorization Objects
4. Organization level
Authorization objects are actually defined in programs that are executed for any particular transactions.
We can also create custom authorization objects for any particular transaction (generally custom
transaction).
Organization level: This defines actually the organizational elements in SAP for ex: Company Code, Plant,
Planning Plant, Purchase organization, Sales organization, Work Centers, etc.
Suppose we take an example of creating a role for Maintenance In-charges in a particular industry who
are responsible for different maintenance plants. Consider the Scenario as under:
Company = C1, Maintenance Plants = M1, M2, M3 and M4 (Hence assuming 4 Shift In-charges).
As mentioned before, Maintenance In-charge will have rights to following transactions IW22, IW23,
IW28, IW29, IW31, IW32, IW38 and IW39 but he will not have rights to release the Maintenance order.
Hence, considering the above situation, we will create a common Master role for all 4 Maintenance In-
charges say ZMPM_MAIN_IN_CHARGE_ROLE (Here the role name starts with ZMPM to make us
understand that it is a Z Master Role for Plant Maintenance ) with transaction mentioned above with all
rights (with value *) inside the transactions but only restricting release of Maintenance order with the
help of authorization object I_VORG_ORD and removing value: BFRE and field: BETRVORG but with all any
organizational level (say plant) assignment.
Now based on this Master Role we have to create derived Roles for all 4 Maintenance In-charges
individually say for first Maintenance In-Charge we create a derived
role ZDPM_MAIN_IN_CHARGE_ROLE_MI1 referring the above Master
Role ZMPM_MAIN_IN_CHARGE_ROLE.
This will copy all the transactions and authorization objects from Master Role but will not copy the
organizational level assignments which we have assigned in Master Role. Hence, we need to maintain
the organizational level for the derived role (say PlantP1). Here once we save (& Generate) the Master as
well as Derived Role we can assign this role to the User ID for the particular Maintenance In-charge.
Roles and Authorizations Concept
Use
For Management of Internal Controls (MIC), a large number of frequently
changing people need to perform tasks in a variety of functions.
Consequently, a special roles and authorizations concept has been created
for this purpose. Besides the general SAP standard roles that are edited by
the system administrator in transaction PFCG, there are also MIC-specific
roles comprising a variety of delivered tasks. These MIC-specific roles and
their respective tasks allow you to manage the detailed authorizations and the
workflow between those involved.
Features
For information about the general standard roles delivered with MIC,
see Standard Roles and Authorization Objects.
The MIC-specific roles refine the authorizations delivered in the standard
role Management of Internal Controls - Business User
(SAP_CGV_MIC_BUSINESS_USER). An MIC-specific role consists of
different tasks with authorizations attached. You can specify which tasks
belong to which role. For more information, see Editing MIC-Specific Roles.
The assignment of am MIC-specific role to one or more persons is dependent
on an object (for example, an organizational unit). The assignment is
performed in a Web application by different persons throughout the
organization hierarchy. The power user triggers this process for the highest
level of the organization hierarchy. For more information, see Assigning Roles to
Persons.
To ensure the segregation of duties so that the same person is not
authorized to perform an assessment as well as the validation of that
assessment, for example, you can define conflict groups. You include in a
conflict group any tasks that must not be performed by the same person. You
can use these conflict groups to run a check to establish whether the defined
segregation of duties is actually reflected in the system. For more information,
see Segregation of Duties.
Activities
1. The system administrator copies the delivered standard
role Management of Internal Controls All Authorizations
(SAP_CGV_MIC_ALL), makes any necessary adjustments, and assigns
the adjusted copy of the standard role to the MIC power user.
2. The power user edits the MIC-specific roles.
3. The power user defines conflict groups.
4. The power user starts the role assignment procedure in the navigational
area on the start page.
5. The power user checks whether the segregation of duties defined in the
conflict groups is enforced by the system.
The architecture of the authorization system is based upon the utilization of several
individuals but related logical components: Profiles, Objects, Fields, and
Authorizations.
The user ID refers exclusively to profiles. Each profile grants a set of specific system
access authorizations to user.
Composite Profiles
Composite profiles refer to the various employee roles available in the corporation
(for instance: Purchasing / Receiving Clerk or Accounts Agent). As the name
suggests, composite profiles may contain multiple user IDs necessary to perform all
the business operations associated with a particular role. A composite profile may
encapsulate another composite profile(s).
In practice, a model composite profile should be recognized for each possible role in
the organization, which may be used to produce hybrid composite profiles. The over
existence of the hybrids can defy the very purpose of composite profiles and they
should be created only when specific needs arise.
User Ids
User ids allow access to SAP applications. Each user must have a corresponding
profile specifically assigned. In many situations, multiple composite profiles can be
assigned to a user ID, depending on the role(s) an individual user is responsible for, in
the business processes.
Authorizations
Authorizations are the key building blocks of SAP security. Authorization is the
process of assigning values to fields present in authorization objects.
An authorization process may ask for second associated authorization process which
in turn asks for third and so on. For example, the task of paying a vendor invoice may
require 10 different authorizations.