properly maintaining security with pfcg

49
How to Properly Maintain Security using Profile Generator

Upload: satishchowdary

Post on 07-Dec-2015

233 views

Category:

Documents


2 download

DESCRIPTION

Properly Maintaining Security With PFCG

TRANSCRIPT

Page 1: Properly Maintaining Security With PFCG

How to Properly Maintain Security using Profile Generator

Page 2: Properly Maintaining Security With PFCG

Objective

• SAP Security Overview

• Profile Generator Best Practice

• Summary

Page 3: Properly Maintaining Security With PFCG

SAP Security Overview

USER ID, e.g. TTSAN

Security Role

1

Security Role

2

Security Role

3

User

Page 4: Properly Maintaining Security With PFCG

SAP Security Overview

Security Role, e.g. Security Administrator

Profile 1 Profile 2 Profile 3

Page 5: Properly Maintaining Security With PFCG

SAP Security Overview

Profile (Contain up to 150 Authorizations)

Authorization1

Authorization2

Authorization150

Page 6: Properly Maintaining Security With PFCG

SAP Security Overview

Authorization Object 1, e.g. S_TCODE

Field (TCD)

Value (SU01)

Page 7: Properly Maintaining Security With PFCG

SAP Security Overview

Authorization Object 2, e.g. S_USR_GRP

Field (ACTV)

Value (01, 02, 03, 06)

Field (CLASS)

Value (Customer Define)

Page 8: Properly Maintaining Security With PFCG

SAP Security Overview

Authorization Object 2, e.g. S_USR_GRP

Field (ACTV)

Value (01, 02, 06)

Field (CLASS)

Value (HOUSTON)

Page 9: Properly Maintaining Security With PFCG

SAP Security Overview

Authorization Object 2, e.g. S_USR_GRP

Field (ACTV)

Value (03)

Field (CLASS)

Value (*)

Page 10: Properly Maintaining Security With PFCG

SAP Security Overview

Execute “SU01” – Change UserAUTHORITY-CHECK “Authorization1”

Object 1 = “S_TCODE

TCD = “SU01”

Page 11: Properly Maintaining Security With PFCG

SAP Security Overview

ACTV = “02”

Object 2 = “S_USR_GRP

CLASS = “HOUSTO

N”

Execute “SU01” – Change UserAUTHORITY-CHECK “Authorization2”

Page 12: Properly Maintaining Security With PFCG

Profile Generator

Transaction

Page 13: Properly Maintaining Security With PFCG

Profile Generator

Change authorization data

Page 14: Properly Maintaining Security With PFCG

Profile Generator

Expert mode for profile generation

Page 15: Properly Maintaining Security With PFCG

Profile Generator

Delete and recreate profile and authorizations

Page 16: Properly Maintaining Security With PFCG

Profile Generator

Edit old status

Page 17: Properly Maintaining Security With PFCG

Profile Generator

Read old status and merge with new data

Page 18: Properly Maintaining Security With PFCG

SAP Security Overview

Missing Organization Value

$BURKS

Page 19: Properly Maintaining Security With PFCG

Profile Generator

Organizational Level

Page 20: Properly Maintaining Security With PFCG

Profile Generator

Missing Customer Define Value

Page 21: Properly Maintaining Security With PFCG

Profile Generator

No open field

Page 22: Properly Maintaining Security With PFCG

Profile Generator

Authorization Status

Page 23: Properly Maintaining Security With PFCG

Profile Generator

STANDARD - SAP Standard Value

MAINTAIN - Customer Maintained ValueCHANGED - SAP Standard Value maintained by Customer

Authorization Status

MANUALLY – Manually inserted Value

Page 24: Properly Maintaining Security With PFCG

Profile Generator

S_USR_GRP 01, 02, 03, 05, 06, 08, 24

Removing Authorization Value

Page 25: Properly Maintaining Security With PFCG

Profile Generator

Status = Changed

Removing Authorization Value

Page 26: Properly Maintaining Security With PFCG

Profile Generator

New Authorization

Common Security Issue

Page 27: Properly Maintaining Security With PFCG

Profile Generator

Make Copy

Inactive Original

Best Practice

Page 28: Properly Maintaining Security With PFCG

Profile Generator

Make changes to copy

Best Practice

Page 29: Properly Maintaining Security With PFCG

Profile Generator

Best Practice

Changed Authorization without Inactive

Standard

Page 30: Properly Maintaining Security With PFCG

Profile Generator

Best Practice

Double-click to add comment

Page 31: Properly Maintaining Security With PFCG

Profile Generator

M_MATE_MAT(01, 02)

Does making changes to Copied Authorization Applies to all situation?

Page 32: Properly Maintaining Security With PFCG

Profile Generator

Where-Used Icon

Page 33: Properly Maintaining Security With PFCG

Profile Generator

Where-used

MM01 = 01

Page 34: Properly Maintaining Security With PFCG

Profile Generator

Adding Authorization Value

What if you want to add value 03?

Page 35: Properly Maintaining Security With PFCG

Profile Generator

SU53 Errors

What if SU53 indicates that MM01 requires an Activity

of 24?

Page 36: Properly Maintaining Security With PFCG

Profile Generator

Static Value vs. Dynamic Value

Static Value – a value that is required by a transaction no matter who execute it.

Dynamic Value – a customer-defined value such as company code.

Page 37: Properly Maintaining Security With PFCG

Profile Generator

MM01 always requires an Activity

of 01?

Static Value

Page 38: Properly Maintaining Security With PFCG

Profile Generator

Company Code value may vary

from user to user depending on

business restriction.

Dynamic Value

Page 39: Properly Maintaining Security With PFCG

Profile Generator

Static Value vs. Dynamic Value

Static Value – add to USOBT using transaction SU24.

Dynamic Value – add directly to the Authorization or Org. Data.

Page 40: Properly Maintaining Security With PFCG

Profile Generator

Reorganize & Generate

Authorization counter = 1

Page 41: Properly Maintaining Security With PFCG

Profile Generator

Reorganize & Generate

Reorganize

Page 42: Properly Maintaining Security With PFCG

Profile Generator

Reorganize & Generate

Authorization counter = 0

Page 43: Properly Maintaining Security With PFCG

USOBT – SU24

Overview

Page 44: Properly Maintaining Security With PFCG

Profile Generator

1. NEVER modify S_TCODE unless the Role is built manually.

2. Modify Standard delivered authorization:

a. Only modify when there’s a request to REMOVE authorization and IF AND ONLY IF no other transaction is linked to that value. Otherwise, by removing the transaction, it will remove the value.

Summary of Rules and Restrictions

Page 45: Properly Maintaining Security With PFCG

Profile Generator

2. Modify Standard delivered authorization (CONT’D):

b. Always make a copy of the authorization and make changes.

c. Inactive the original authorization.

d. Modify the copied authorization and the status become Changed.

e. Double-click on description of the authorization to document the reason. The same applies to manually inserted authorization.

Summary of Rules and Restrictions

Page 46: Properly Maintaining Security With PFCG

Profile Generator

3. If a Changed authorization exists without an Inactived Standard authorization, delete the Changed authorization.

4. Bogus SU53 check most of the time:

a. S_ADMI_FCD (SM02).

b. S_CTS_ADMI.

c. S_LAYO_ALV (023).

Summary of Rules and Restriction

Page 47: Properly Maintaining Security With PFCG

Profile Generator

Question?

Page 48: Properly Maintaining Security With PFCG

Profile Generator

Contact Information

Thomas TsanSAP Security ArchitectTK Consultants, Inc.Email: [email protected]: (281) 412-6800

Page 49: Properly Maintaining Security With PFCG

Thank you for attending!Please remember to complete and return your evaluation form following this session.

Session Code: [801]