authorizations made easy

392

Click here to load reader

Upload: anon-158998

Post on 29-Dec-2014

6.403 views

Category:

Documents


40 download

DESCRIPTION

User Role Templates and Generating Authorization Profiles in SAP Release 4.6A/B

TRANSCRIPT

Page 1: Authorizations Made Easy

$XWKRUL]DWLRQV�0DGH�(DV\

8VHU�5ROH�7HPSODWHV�DQG�*HQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV

Release 4.6A/B

SAP Labs, Inc.

Palo Alto, California

Page 2: Authorizations Made Easy

&RS\ULJKW

������E\�6$3�$*��$OO�ULJKWV�UHVHUYHG�

1HLWKHU�WKLV�GRFXPHQWDWLRQ�QRU�DQ\�SDUW�RI�LW�PD\�EH�FRSLHG�RU�UHSURGXFHG�LQ�DQ\�IRUP�RU�E\�DQ\�PHDQV�RUWUDQVODWHG�LQWR�DQRWKHU�ODQJXDJH��ZLWKRXW�WKH�SULRU�FRQVHQW�RI�6$3�$*�

6$3�$*�PDNHV�QR�ZDUUDQWLHV�RU�UHSUHVHQWDWLRQV�ZLWK�UHVSHFW�WR�WKH�FRQWHQW�KHUHRI�DQG�VSHFLILFDOO\�GLVFODLPVDQ\�LPSOLHG�ZDUUDQWLHV�RI�PHUFKDQWDELOLW\�RU�ILWQHVV�IRU�DQ\�SDUWLFXODU�SXUSRVH��6$3�$*�DVVXPHV�QRUHVSRQVLELOLW\�IRU�DQ\�HUURUV�WKDW�PD\�DSSHDU�LQ�WKLV�GRFXPHQW��7KH�LQIRUPDWLRQ�FRQWDLQHG�LQ�WKLV�GRFXPHQW�LVVXEMHFW�WR�FKDQJH�ZLWKRXW�QRWLFH��6$3�$*�UHVHUYHV�WKH�ULJKW�WR�PDNH�DQ\�VXFK�FKDQJHV�ZLWKRXW�REOLJDWLRQ�WRQRWLI\�DQ\�SHUVRQ�RI�VXFK�UHYLVLRQ�RU�FKDQJHV��6$3�$*�PDNHV�QR�FRPPLWPHQW�WR�NHHS�WKH�LQIRUPDWLRQFRQWDLQHG�KHUHLQ�XS�WR�GDWH�

7UDGHPDUNV

6$3��WKH�6$3�ORJR��5����5����$%$3��DQG�RWKHU�6$3�UHODWHG�SURGXFWV�PHQWLRQHG�KHUHLQ�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�6$3�$*��$OO�RWKHU�SURGXFWV�PHQWLRQHG�LQ�WKLV�GRFXPHQW�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�WKHLU�UHVSHFWLYH�FRPSDQLHV�

6LPSOLILFDWLRQ�*URXS6$3�/DEV��,QF������'HHU�&UHHN�5RDG3DOR�$OWR��&$������

ZZZ�VDSODEV�FRP�VLPSOHVLPSOLI\�U�#VDS�FRP

3ULQWHG�LQ�WKH�8QLWHG�6WDWHV�RI�$PHULFD�,6%1�������������;

7KLV�ERRN�XVHV�(FR)/(;�OD\�IODW�ELQGLQJ��:LWK�WKLV�OD\�IODW�IHDWXUH³GHYHORSHG�E\DQG�H[FOXVLYHO\�DYDLODEOH�DW�-RKQVRQ�3ULQWLQJ�6HUYLFH��-36�³\RX�FDQ�RSHQ�WKLV�ERRNDQG�NHHS�LW�RSHQ�ZLWKRXW�LW�VQDSSLQJ�VKXW�RQ�\RX��<RX�QHHG�QRW�ZRUU\�DERXWEUHDNLQJ�WKH�VSLQH��(FR)/(;�PDNHV�ERRNV�OLNH�WKLV�RQH�HDVLHU�WR�XVH�

Page 3: Authorizations Made Easy

&RQWHQWV�DW�D�*ODQFH

Authorizations Made Easy iii

$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL

,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y

:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3�����������������������������������������������������������������²�

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�����������������������������������������������������²�

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ�������������������������������������������������������������������������²�

&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�

&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV ���������������������������������������������������������������²�

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�����������������������������������������������������²�

&KDSWHU���� 8SJUDGH �������������������������������������������������������������������������������������������²�

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�

*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�

,QGH[ ������������������������������������������������������������������������������������������������������,²�

Page 4: Authorizations Made Easy

iv

Page 5: Authorizations Made Easy

'HWDLOHG�7DEOH�RI�&RQWHQWV

Authorizations Made Easy v

$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL

,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y

What Is this Book About? ................................................................................... xviWho Should Read this Book?............................................................................. xviHow to Use this Guide ........................................................................................ xviiConventions......................................................................................................... xvii

:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L

Overview............................................................................................................... xxiiUser Role Templates........................................................................................... xxiiFlexible User Menus............................................................................................ xxiiComposite Activity Groups............................................................................... xxivUser Groups........................................................................................................ xxivCentral User Administration ............................................................................. xxiv

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�

Overview............................................................................................................... 1–2The Authorization Concept ................................................................................ 1–4Authorization Object .............................................................................................. 1–5Authorization Object Fields ................................................................................... 1–6Authorizations........................................................................................................ 1–6Authorization Profiles ............................................................................................ 1–7

Naming Convention for Authorization Profiles........................................................ 1–7User Master Records ............................................................................................ 1–7Authorization Checks ............................................................................................ 1–8Activating and Deactivating Authorization Checks in Transactions...................... 1–8SAP* and DDIC Users ......................................................................................... 1–8What Is the Profile Generator? .......................................................................... 1–9Components of the Profile Generator ................................................................. 1–10

Activity Groups...................................................................................................... 1–10Composite Activity Groups ................................................................................... 1–10Derived Activity Groups ........................................................................................ 1–10User Assignment .................................................................................................. 1–10

Generating the Profiles........................................................................................ 1–10What Is an Activity Group? .............................................................................. 1–12Activity Group Assignments ................................................................................ 1–12

R/3 login user IDs ............................................................................................... 1–12Jobs ..................................................................................................................... 1–12Positions.............................................................................................................. 1–13Organizational units ........................................................................................... 1–13

What Is a User Role Template?.......................................................................... 1–13

Page 6: Authorizations Made Easy

Detailed Table of Contents

Authorizations Made Easyvi

R/3 Tools for Security Implementation ...........................................................1–14Case Study: Security Strategy in a Three-System Environment ................. 1–15Development System (DEV) ...............................................................................1–15Quality Assurance System (QAS) ....................................................................... 1–17

Training Client System (TRG)...............................................................................1–17Production System (PRD) ...................................................................................1–18Setting Up the Authorization Administrators.................................................1–19How the Administrators Work Together ..............................................................1–21Policies and Procedures...................................................................................1–21User Administration .............................................................................................1–21

Policies ..................................................................................................................1–21Procedures............................................................................................................1–22Roles and Responsibilities ....................................................................................1–22

System Security...................................................................................................1–23Policies ..................................................................................................................1–23Procedures............................................................................................................1–23Roles and Responsibilities ....................................................................................1–24

Auditing Requirements.....................................................................................1–24

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3 �����������������������������������������������������������������²�

Overview............................................................................................................... 2–2ASAP Roadmap ................................................................................................... 2–2Authorizations in the Roadmap Structure .............................................................2–4Knowledge Corner...............................................................................................2–5Questions and Answers Database (Q&Adb) .................................................... 2–6What Is the Q&Adb?..............................................................................................2–6How to Work with the Q&Adb................................................................................ 2–6How to Generate the Authorization List from the Q&Adb ..................................... 2–6Authorization List ................................................................................................2–6What Is the Authorization List?..............................................................................2–6How to Work with the Authorization List................................................................ 2–7

Generate Authorization List from the Q&Adb..........................................................2–7Define User Roles ...................................................................................................2–8Generate User Roles Overview ..............................................................................2–9Build User Roles .....................................................................................................2–9

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU �����������������������������������������������������²�

Overview...............................................................................................................3–2Confirming that the Profile Generator Is Active............................................... 3–2Checking the Required Instance Profile Parameter..............................................3–2Loading the USOBX_C and USOBT_C tables ..................................................3–4Initial Copying of SAP Defaults into the Customer Tables (SU25) .......................3–4Transporting the Defaults ...................................................................................... 3–6Getting Support from the SAPNet – R/3 Frontend Notes................................ 3–7Accessing the Error Notes Database ....................................................................3–7Printing Important SAPNet – R/3 Frontend Notes ................................................ 3–8Applying Advance Corrections to Your R/3 System.............................................. 3–8

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ �������������������������������������������������������������������������²�

Overview...............................................................................................................4–2System Users ....................................................................................................... 4–2

Page 7: Authorizations Made Easy

Detailed Table of Contents

Release 4.6A/B YLLvii

External R/3 Users ................................................................................................ 4–3Internal R/3 Users ................................................................................................. 4–3

Dialog...................................................................................................................... 4–3Batch Data Communication.................................................................................... 4–3Background............................................................................................................. 4–3CPIC ....................................................................................................................... 4–4

Special R/3 Users.................................................................................................. 4–4SAP* ....................................................................................................................... 4–4DDIC ....................................................................................................................... 4–4EarlyWatch ............................................................................................................. 4–4

Creating Users ...................................................................................................... 4–5User Groups......................................................................................................... 4–5Authorizations and Authorization Profiles....................................................... 4–6Mass Operations ................................................................................................. 4–6Creating a New User (Client-Specific)............................................................... 4–7Changing a User’s Password........................................................................... 4–10Password Requirements ..................................................................................... 4–11User Information System.................................................................................. 4–12

&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�

Overview............................................................................................................... 5–2What Are User Role Templates? ....................................................................... 5–2User Menu ............................................................................................................ 5–2How to Work with User Role Templates ........................................................... 5–3Starting Activity Group Maintenance (PFCG) ....................................................... 5–4Using the SAP-Provided User Role Templates .................................................... 5–4Copying and Modifying SAP-Provided User Role Templates............................. 5–10Create your own User Role Templates............................................................... 5–22Creating Composite Activity Groups ................................................................... 5–32Tips for an Administrator ................................................................................. 5–35Available User Role Templates........................................................................ 5–40Release 4.6A....................................................................................................... 5–40Release 4.6B....................................................................................................... 5–44

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�

Overview............................................................................................................... 6–2Selecting Views/Types in Activity Group Maintenance .................................. 6–2Exploring Advanced Profile Generator Functionality ..................................... 6–3Creating and Changing the Hierarchy................................................................... 6–4

Inserting Transactions ............................................................................................ 6–5Inserting Internet and Document Links ............................................................... 6–10Inserting Reports ................................................................................................. 6–12Displaying the Online Documentation for Activity Group Objects ...................... 6–15Copying and Deriving Activity Groups...........................................................6–16Basics on Duplicating Activity Groups ................................................................ 6–16Copying Activity Groups...................................................................................... 6–17Deriving Activity Groups...................................................................................... 6–17Selecting Workflow Tasks................................................................................ 6–21What You Should Know About Workflow............................................................ 6–21Deleting Activity Groups ..................................................................................6–24

Page 8: Authorizations Made Easy

Detailed Table of Contents

Authorizations Made Easyviii

Postmaintaining User Role Templates............................................................6–25Different Settings for the Maintenance View.......................................................6–25Maintaining and Generating the Authorization Profiles................................6–26Displaying an Overview of Generated Profiles .............................................. 6–30Regenerating Authorization Profiles After Making Changes ....................... 6–32Using Utilities to Change Generated Authorizations .................................... 6–36Merging Authorizations........................................................................................6–36Reorganizing Technical Names of Authorizations .............................................. 6–37Customizing Authorizations.............................................................................6–38Assigning IMG Projects or Project Views to Activity Groups ..............................6–38

&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�

Overview...............................................................................................................7–2Transports Between Clients............................................................................... 7–2Transports Between R/3 Systems ..................................................................... 7–3Transporting Activity Groups ............................................................................ 7–3Transporting Single Activity Groups Using the Activity Group Maintenance

Transaction........................................................................................................7–4Mass Transport of Activity Groups ........................................................................ 7–6Transporting Check Indicators and Field Values ............................................7–8Transporting Authorization Templates ............................................................. 7–8Transporting User Master Records ................................................................... 7–8

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�

Manually Postmaintaining Authorizations........................................................ 8–2When to Insert Missing Authorizations?................................................................8–2

Case #1: Authorization Is Missing for Related Transactions ..................................8–2Case #2: The Generated Profile Does Not Assign Any General Rights to the

User ....................................................................................................................8–2Case #3: Cannot Select Transaction SU53 from the Menu in PFCG.....................8–2

How to Insert Missing Authorizations ....................................................................8–3Manually Inserting Authorizations.....................................................................8–3Using Selection Criteria .........................................................................................8–4Inserting Manually.................................................................................................. 8–6Inserting Authorizations from Templates .........................................................8–7Creating a New Template......................................................................................8–7Inserting Authorizations from a Template ........................................................... 8–10Inserting Authorizations from a Profile...........................................................8–12Inserting Full Authorizations: Profile “<YourCompany>” ............................ 8–15

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV����������������������������������������������������������������²�

Overview............................................................................................................... 9–2Assigning Users to Activity Groups.................................................................. 9–3Assigning Activity Groups to Users.................................................................. 9–6Assigning PD Objects to Activity Groups ........................................................ 9–7Assigning Activity Groups to PD Objects ...................................................... 9–10Transferring Users from an IMG Project to an Activity Group..................... 9–13Updating Profiles in the User Master Records............................................... 9–15

Page 9: Authorizations Made Easy

Detailed Table of Contents

Release 4.6A/B L[ix

Comparing User Master Data from Within Transaction PFCG........................... 9–15Profile Comparisons Using Mass Compare (PFUD)........................................... 9–18Report PFCG_TIME_DEPENDENCY to Schedule Time Dependency.............. 9–19Creating a Sample Organizational Plan.......................................................... 9–21Using the Classic R/3 Transaction...................................................................... 9–22Using the Enjoy Transaction ............................................................................... 9–27Structural Authorizations ................................................................................. 9–28

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�

Overview............................................................................................................. 10–2Setting Up an ALE User.................................................................................... 10–3Naming Logical Systems.................................................................................. 10–5Assigning Logical Systems to Clients............................................................ 10–8Defining Target System for RFC Calls .......................................................... 10–10Distribution Model........................................................................................... 10–13Generating Partner Profiles in the Central System ..................................... 10–16Distributing Model View ................................................................................. 10–17Generating Partner Profiles in the Client System........................................ 10–18

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�

Overview............................................................................................................. 11–2Assigning the Central User Administration Distribution Model .................. 11–2Testing Central User Administration .............................................................. 11–3Migrating Existing Users to the Central System............................................ 11–7Defining Field Attributes for User Maintenance ............................................ 11–9Global User Manager ...................................................................................... 11–10Structure of the Global User Manager .............................................................. 11–12Using the Global User Manager........................................................................ 11–12

System Landscape with Existing Users ............................................................. 11–12System Landscape Without Existing Users........................................................ 11–13User Creation...................................................................................................... 11–14

Defining System Types and User Groups......................................................... 11–14Modeling with the Global User Manager........................................................... 11–16Authorization for the Global User Manager....................................................... 11–17Distributing Data in the Global User Manager .................................................. 11–18

Immediate Distribution........................................................................................ 11–19Scheduling Background Distribution................................................................... 11–19

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�

Overview............................................................................................................. 12–2Tracing Authorizations with Transaction SU53............................................. 12–2System Trace Using Transaction ST01........................................................... 12–4Analyzing a Written Trace File ......................................................................... 12–9Reducing the Scope of Authorization Checks............................................. 12–12Overview............................................................................................................ 12–12Enabling the Profile Generator.......................................................................... 12–12Enabling/Disabling Other System-wide Checks ............................................... 12–12

Page 10: Authorizations Made Easy

Detailed Table of Contents

Authorizations Made Easyx

Enabling auth/tcodes_not_checked ....................................................................12–12Enabling auth/rfc_authority_check......................................................................12–13Globally Deactivating or Activating Authorization Checks ..................................12–13Parameter Transactions......................................................................................12–18

Deactivating Authorization Checks Using SU24 ...............................................12–18Reducing the Scope of Authorization Checks................................................... 12–19

Maintaining Check Indicators for Transaction Codes .........................................12–20Mass Change of Check Indicators ......................................................................12–28Maintaining Authorizations in the Activity Groups...............................................12–32

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�������������������������������������������������� ��²�

Overview.............................................................................................................13–2Audit Tools (SM20, SM19, SECR) .................................................................... 13–2Security Audit Log (SM20)...................................................................................13–2

Running the Audit Log...........................................................................................13–4Setting Security Audit Log Parameters (SM19) ..................................................13–5

Defining Filter Group 1 ..........................................................................................13–7Defining Filter Group 2 ..........................................................................................13–7

Audit Information System (SECR).....................................................................13–11Complete Audit....................................................................................................13–12User-Defined Audit..............................................................................................13–16

User Security Audit Jobs ...................................................................................13–18Audit Tasks (SM21, STAT, ST03) ...................................................................13–20Reviewing Validity of Named Users ..................................................................13–20Reviewing Profiles for Accuracy and Permission Creep................................... 13–21System Log (SM21)........................................................................................... 13–22Statistic Records in CCMS (STAT) ................................................................... 13–24ST03 – User Profile ........................................................................................... 13–26Logging of Specific Activities............................................................................. 13–28

Logging Changes to Table Data .........................................................................13–28

Logging Changes to User Master Records, Profiles, and Authorizations 13–30

&KDSWHU���� 8SJUDGH ���������������������������������������������������������������������������������������� ��²�

Before Doing Any Upgrade .............................................................................. 14–2Validation Steps After Upgrading Is Completed ............................................ 14–3Converting Previously Created SU02 Profiles to Activity Groups............... 14–4Creating an Activity Group from Manually Maintained Profiles...........................14–4Removing User Assignments from the Original SU02 Profile............................. 14–9Upgrading from a Release Prior to 3.1x to 4.6 A/B ......................................14–11Converting Existing Authorization Profiles for the Profile Generator ................14–11Re-creating the Authorization Profiles from Scratch Using the Profile

Generator ...................................................................................................... 14–11Upgrading from Release 3.0F to 4.6 A/B.......................................................14–12Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B...................................... 14–14Upgrade from Releases 4.0x or 4.5x to 4.6 A/B............................................ 14–22

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�

Overview...............................................................................................................A–2SAPNet – R/3 Frontend Notes ............................................................................A–3

Page 11: Authorizations Made Easy

Detailed Table of Contents

Release 4.6A/B [Lxi

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�

Overview...............................................................................................................B–2R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................B–2Profile Generator Setup......................................................................................B–3Working with the PG and Profiles .....................................................................B–3Authorization Checks (SU24).............................................................................B–5Upgrade Procedure (SU25) ................................................................................B–7Including Transactions or Reports ...................................................................B–7Missing Authorizations.......................................................................................B–7User Administration ............................................................................................B–8Transporting ........................................................................................................B–8Tables ...................................................................................................................B–8

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�

Incorrect Logons, Default Clients, and Default Start Menu............................C–2Setting Password Length and Expiration.........................................................C–2Specifying Impermissible Passwords...............................................................C–3Securing SAP* Against Misuse..........................................................................C–3Tracing Authorizations .......................................................................................C–3Profile Generator and Transaction SU24..........................................................C–4User Buffer ...........................................................................................................C–4No Check on Object S_TCODE..........................................................................C–4No Check on Certain ABAP Objects .................................................................C–4RFC Authority Check ..........................................................................................C–5

*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�

,QGH[ ������������������������������������������������������������������������������������������������������,²�

Page 12: Authorizations Made Easy

Detailed Table of Contents

Authorizations Made Easyxii

Page 13: Authorizations Made Easy

xiii

�$FNQRZOHGJPHQWV

,�ZLVK�WR�H[SUHVV�DSSUHFLDWLRQ�WR�WKH�IROORZLQJ�LQGLYLGXDOV�ZKR�SURYLGHG�WLPH��PDWHULDO��H[SHUWLVH��DQGUHVRXUFHV�WR�KHOS�PDNH�WKLV�JXLGHERRN�SRVVLEOH��LQ�DOSKDEHWLFDO�RUGHU��

6$3�$*� 1RUPDQ�'H�/HHXZ��0DWKLDV�.LQ]OHU��(UZLQ�5RMHZVNL��0DUNXV�6FKPLGW��+HLNR�6WRFN�6YHQ�6FKZHULQ�:HQ]HO��7KRUVWHQ�9LHWK

6$3�$PHULFD� 0DULD�*UHJJ��´&DVSHUµ�:DL�)X�.DQ��'DQLHO�%HQMDPLQ�)LJ�=DLGVSLQHU

6$3�/DEV� $QLO�-DLQ��-RKQ�.DQFOLHU��2OLYHU�0DLQND��*DU\�1DND\DPD��.XUW�:ROI

1LKDG�$O�)WD\HK6$3�/DEV��,QF�������

Page 14: Authorizations Made Easy

Acknowledgments

Authorizations Made Easyxivxiv

Page 15: Authorizations Made Easy

xv

,QWURGXFWLRQ

&RQWHQWV

What Is this Book About? .......................................................................................xvi

Who Should Read this Book?.................................................................................xvi

How to Use this Guide............................................................................................xvii

Conventions ............................................................................................................xvii

Page 16: Authorizations Made Easy

Introduction

What Is this Book About?

Authorizations Made Easyxvixvi

:KDW�,V�WKLV�%RRN�$ERXW"

7KLV�JXLGHERRN�LV�GHVLJQHG�WR�KHOS�\RX�VHW�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�LQ�WKHFXVWRPHU�V\VWHP�XVLQJ�WKH�3URILOH�*HQHUDWRU��3*���,W�H[SODLQV�ZKDW�\RX�QHHG�WR�NQRZ�WRSHUIRUP�WKLV�WDVN�DQG�KHOSV�\RX�XVH�WKH�VWDQGDUG�WRROV�SURYLGHG�ZLWK�\RXU�V\VWHP�

7KLV�ERRN�GRHV�QRW�FRYHU�DXWKRUL]DWLRQV�IRU�DGG�RQ�FRPSRQHQWV�RU�1HZ�'LPHQVLRQSURGXFWV��,W�DOVR�GRHV�QRW�FRYHU�,QWHUQHW�UHODWHG�DXWKRUL]DWLRQV��HQFU\SWLRQ��DXWKHQWLFDWLRQ�DQG�FUHGLW�FDUG�VHFXULW\��

7KLV�JXLGH�UHIHUV�WR�5HOHDVH����$�%�RI�WKH�6$3�5���6\VWHP��$OO�VFUHHQVKRWV�DUH�IURP�5HOHDVH���$�XQOHVV�RWKHUZLVH�QRWHG�

7KH�VWUXFWXUH�RI�WKLV�JXLGHERRN�PDWFKHV�WKH�VHWXS�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW��SURJUHVVLQJIURP�D�QHZ�5���LQVWDOODWLRQ�DOO�WKH�ZD\�WR�DQ�XSJUDGH��,I�\RX�XSJUDGH�IURP�DQ�ROGHU�UHOHDVHVHH�FKDSWHU�����8SJUDGH��IRU�PRUH�LQIRUPDWLRQ�

7KH�JUDSKLF�EHORZ�SURYLGHV�DQ�URXJK�RYHUYLHZ�DERXW�WKH�5���DXWKRUL]DWLRQ�F\FOH��)RU�DPRUH�GHWDLOHG�LQIRUPDWLRQ�RQ�WKH�DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�VHH�FKDSWHU����5��6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�

Authorizations ScopingPreparing the R/3 Environment

and Preparation for Go-LiveProduction

Phase

Upgrade +Ongoing

Development

ImplementationEvaluation Operations andContinuous Improvement

7KLV�JXLGH�SURYLGHV�\RX�ZLWK�WKH�IROORZLQJ�< 7KH�ELJ�SLFWXUH��VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ�5���< 7DVNV�\RX�QHHG�WR�SHUIRUP�GXULQJ�DQG�DIWHU�LQVWDOODWLRQ�RI�5���WR�IDFLOLWDWH�WKH�XVH�RI�WKH

3*< 7DVNV�\RX�QHHG�WR�SHUIRUP�DIWHU�DQ�XSJUDGH�RI�WKH�5���6\VWHP< $OO�WKH�HVVHQWLDO�VWHSV�IRU�VHFXULW\�LPSOHPHQWDWLRQ�XVLQJ�WKH�3*�DQG�&HQWUDO�8VHU

$GPLQLVWUDWLRQ< 7DVNV�WR�SUHSDUH�IRU�JRLQJ�OLYH< $SSHQGL[HV�ZLWK�WKH�PRVW�LPSRUWDQW�6$31HW�²�5���)URQWHQG�QRWHV�IRU�DXWKRUL]DWLRQV

DQG�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�

:KR�6KRXOG�5HDG�WKLV�%RRN"

7KLV�JXLGH�ZDV�GHVLJQHG�IRU�WKH�IROORZLQJ�SHRSOH�XVLQJ�WKH�3*�HLWKHU�LQ�DQ�LPSOHPHQWDWLRQSURMHFW�RU�DV�DQ�RQJRLQJ�UHIHUHQFH�< %DVLV�&RQVXOWDQWV�ZKR�LQVWDOO�5���DQG�VHW�XS�WKH�VHFXULW\�DW�FXVWRPHU�VLWHV

Page 17: Authorizations Made Easy

Introduction

How to Use this Guide

Release 4.6A/B xviixvii

< $SSOLFDWLRQ�&RQVXOWDQWV�ZKR�ZDQW�WR�VWDUW�XVLQJ�WKH�3*�DV�WKH�EDVLV�IRU�WKHLU�FXVWRPHUVHFXULW\�LPSOHPHQWDWLRQ

< &XVWRPHU�,7�DQG�KHOS�GHVN�SHUVRQQHO

+RZ�WR�8VH�WKLV�*XLGH

'HSHQGLQJ�RQ�\RXU�JHQHUDO�6$3�DQG�DXWKRUL]DWLRQ�VSHFLILF�NQRZOHGJH��VWDUW�ZLWK�WKHIROORZLQJ�VHFWLRQV�< ,I�\RX�KDYH�OLWWOH�RU�QR�NQRZOHGJH�FRQFHUQLQJ�VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ

5����VWDUW�ZLWK�FKDSWHU����5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�< (YHU\RQH��HYHQ�WKH�H[SHUWV��VKRXOG�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�

)DPLOLDULW\�ZLWK�WKLV�FKDSWHU�HQVXUHV�D�FRPSOHWH�VHWXS�EHIRUH�\RX�DFWXDOO\�VWDUW�ZRUNLQJZLWK�WKH�3*�

< ,I�\RX�KDYH�DOUHDG\�XVHG�WKH�3*�LQ�5HOHDVH����)����*����+����$����%����$�RU����%�ZHVWURQJO\�UHFRPPHQG�WKDW�\RX�UHDG�WKH�FKDSWHU�:KDWªV�1HZ�LQ�5HOHDVH�����DQG�WKHDSSURSULDWH�VHFWLRQ�LQ�FKDSWHU�����8SJUDGH��,Q�WKLV�FKDSWHU��ZH�GLVFXVV�WKH�VWHSV�WR�EHSHUIRUPHG�EHIRUH�\RX�FRQWLQXH�ZRUNLQJ�ZLWK�WKH�3*�DIWHU�DQ�5���6\VWHP�XSJUDGH��:HSURYLGH�LQIRUPDWLRQ�IRU�D�VPRRWK�WUDQVLWLRQ�WR�\RXU�QH[W�UHOHDVH�

< 5HDG�FKDSWHUV��²��DW�OHDVW�RQFH�IRU�LQIRUPDWLRQ�UHODWHG�WR�WKH�LPSOHPHQWDWLRQ�RI�VHFXULW\DQG�XVLQJ�WKH�3URILOH�*HQHUDWRU��$IWHU�WKDW��\RX�FDQ�EURZVH�WKH�FKDSWHUV�RQ�SHUIRUPLQJVSHFLILF�WDVNV�

< %HIRUH�WUDQVSRUWLQJ�DFWLYLW\�JURXSV��UHDG�FKDSWHU����3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�FDUHIXOO\�

< &KDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�KHOSV�VROYH�RQJRLQJ�DXWKRUL]DWLRQ�SUREOHPV�RQFH\RX�JR�OLYH�

&HUWDLQ�WHUPLQRORJ\��XVHU�LQIRUPDWLRQ��DQG�VSHFLDO�LFRQV�DUH�XVHG�WKURXJKRXW�WKLV�JXLGH�7KH�IROORZLQJ�VHFWLRQV�H[SODLQ�KRZ�WR�LGHQWLI\�DQG�XVH�WKHVH�KHOSIXO�IHDWXUHV�

&RQYHQWLRQV

,Q�WKH�WDEOH�EHORZ��\RX�ZLOO�ILQG�VRPH�RI�WKH�WH[W�FRQYHQWLRQV�XVHG�WKURXJKRXW�WKLV�JXLGH�

&ROXPQ�7LWOH &ROXPQ�7LWOH

6DQV�VHULI�LWDOLF 6FUHHQ�QDPHV�RU�RQ�VFUHHQ�REMHFWV��EXWWRQV�ILHOGV��VFUHHQ�WH[W��HWF��

Monospace 8VHU�LQSXW��WH[W�WKH�XVHU�W\SHV�YHUEDWLP�

1DPH��→��1DPH� 0HQX�VHOHFWLRQ�1DPH��LV�WKH�PHQX�QDPH�DQG�1DPH��LV�WKH�LWHP�RQ�WKH�PHQX

Page 18: Authorizations Made Easy

Introduction

Conventions

Authorizations Made Easyxviiixviii

6DPSOH�5���5HOHDVH�����6FUHHQ

♦�$SSOLFDWLRQ�WRROEDU�

7KH�VFUHHQVKRWV�VKRZQ�LQ�WKLV�JXLGH�DUH�EDVHG�RQ�IXOO�XVHU�DXWKRUL]DWLRQ��6$3B$//��'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��VRPH�RI�WKH�EXWWRQV�RQ�\RXU�DSSOLFDWLRQ�WRROEDU�PD\QRW�EH�DYDLODEOH�

♣�:RUNSODFH�PHQX�

'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��\RXU�ZRUNSODFH�PHQX�PD\�ORRN�GLIIHUHQW�IURPVFUHHQVKRWV�LQ�WKLV�JXLGH�ZKLFK�DUH�EDVHG�RQ�6$3B$//��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUGPHQX�EXWWRQV�SURYLGH�GLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�

,Q�WKLV�JXLGHERRN�\RX�OHDUQ�KRZ�WR�EXLOG�XVHU�PHQXV�

1RWH��,Q�WKLV�JXLGHERRN��ZH�VKRZ�WKH�WHFKQLFDO�QDPHV�RI�HDFK�WUDQVDFWLRQ��7R�PDWFK�RXUVHWWLQJV��FKRRVH�([WUDV�→�6HWWLQJV�DQG�VHOHFW�6KRZ�WHFKQLFDO�QDPHV�

Menu Bar

Screen Title

♦ Application Toolbar

♣ Workplace Menu

Status Bar

Standard Toolbar

User menu

SAP standard menu

Workplace

Page 19: Authorizations Made Easy

Introduction

Conventions

Release 4.6A/B xixxix

6SHFLDO�,FRQV

7KURXJKRXW�WKLV�JXLGH�VSHFLDO�LFRQV�LQGLFDWH�LPSRUWDQW�PHVVDJHV��%HORZ�DUH�EULHIH[SODQDWLRQV�RI�HDFK�LFRQ�

([HUFLVH�FDXWLRQ�ZKHQ�SHUIRUPLQJ�WKLV�WDVN�RU�VWHS��$Q�H[SODQDWLRQ�RI�ZK\�\RX�VKRXOG�EHFDUHIXO�LV�LQFOXGHG�

7KLV�LQIRUPDWLRQ�KHOSV�\RX�XQGHUVWDQG�WKH�WRSLF�LQ�JUHDWHU�GHWDLO��,W�LV�QRW�QHFHVVDU\�WRNQRZ�WKLV�LQIRUPDWLRQ�WR�SHUIRUP�WKH�WDVN�

7KHVH�PHVVDJHV�SURYLGH�KHOSIXO�KLQWV�DQG�VKRUWFXWV�WR�PDNH�\RXU�ZRUN�IDVWHU�DQG�HDVLHU�

Page 20: Authorizations Made Easy

Introduction

Conventions

Authorizations Made Easyxx xx

Page 21: Authorizations Made Easy

xxi

:KDW·V�1HZ�LQ�5HOHDVH����

&RQWHQWV

Overview ..................................................................................................................xxii

User Role Templates...............................................................................................xxii

Flexible User Menus ...............................................................................................xxii

Composite Activity Groups...................................................................................xxiv

User Groups ...........................................................................................................xxiv

Central User Administration .................................................................................xxiv

Page 22: Authorizations Made Easy

What’s New in Release 4.6

Overview

Authorizations Made Easyxxiixxii

2YHUYLHZ

7KLV�FKDSWHU�SURYLGHV�D�EULHI�GHVFULSWLRQ�RI�WKH�QHZ�IXQFWLRQDOLW\�LQ�DXWKRUL]DWLRQ�UHODWHGWRSLFV�LQ�WKH�5���5HOHDVH�����

)RU�VWHS�E\�VWHS�SURFHGXUHV�DQG�GHWDLOHG�LQIRUPDWLRQ�RQ�VSHFLILF�WRSLFV��SOHDVH�VHH�WKHDSSURSULDWH�FKDSWHUV��DV�UHIHUHQFHG�

)RU�WKH�ODWHVW�LQIRUPDWLRQ��\RX�VKRXOG�DOZD\V�FKHFN�WKH�UHOHDVH�QRWHV�IRU�5HOHDVH�����

8VHU�5ROH�7HPSODWHV

:LWK�5HOHDVH����$�6$3�GHOLYHUV�RYHU�����XVHU�UROH�WHPSODWHV��7KH�XVHU�UROH�WHPSODWHV�DUHSUHGHILQHG�DFWLYLW\�JURXSV�FRQVLVWLQJ�RI�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��<RX�KDYHWKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�< 8VH�DV�GHOLYHUHG< &RS\�DQG�FKDQJH�WKHP�WR�VXLW�\RXU�QHHGV< &UHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�IURP�VFUDWFK

2QFH�XVHUV�DUH�DVVLJQHG�WR�RQH�RU�PRUH�DFWLYLW\�JURXSV�DQG�ORJ�RQWR�WKH�V\VWHP��WKH\�VHHWKHLU�XVHU�PHQX��$V�VKRZQ�LQ�WKH�JUDSKLF�RQ�WKH�QH[W�SDJH��WKLV�XVHU�PHQX�FRQWDLQV�RQO\WKRVH�LWHPV��VXFK�DV�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��WKH\�QHHG�WR�SHUIRUP�WKHLUGDLO\�WDVNV��8VHUV�FDQ�DOVR�DGG�WKHLU�PRVW�IUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�)DYRULWHV�PHQXIRU�TXLFNHU�DFFHVV�

)OH[LEOH�8VHU�0HQXV

$V�RI�5HOHDVH����$��WKH�V\VWHP�GLVSOD\V�D�VSHFLILF�XVHU�PHQX�LQ�WKH�IRUP�RI�D�WUHH�DIWHU�XVHUVORJ�RQ�WR�WKH�V\VWHP��VHH�JUDSKLF�RQ�QH[W�SDJH���7KLV�XVHU�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROHWHPSODWH�RU�DFWLYLW\�JURXS�WKH�XVHU�LV�DVVLJQHG�WR��8VHUV�QR�ORQJHU�KDYH�WR�QDYLJDWH�WKURXJKXQQHFHVVDU\�5���IXQFWLRQV�IRU�ZKLFK�WKH\�KDYH�QR�DXWKRUL]DWLRQ��7KH�FRPSDQ\�PHQX�LV�QRORQJHU�DYDLODEOH�DV�RI�5HOHDVH����$�

:KHQ�D�IXQFWLRQ�LV�VHOHFWHG��LW�VWDUWV�LQ�WKH�VDPH�VHVVLRQ��UHSODFLQJ�WKH�XVHU�PHQX�ZLWK�WKHH[HFXWHG�IXQFWLRQ��:KHQ�D�XVHU�H[LWV�D�WUDQVDFWLRQ�RU�VWDUWV�D�QHZ�VHVVLRQ��WKH�VSHFLILF�XVHUPHQX�DXWRPDWLFDOO\�UHDSSHDUV�

$ORQJ�ZLWK�WKH�XVHU�PHQXV��\RX�FDQ�GLVSOD\�D�FRPSOHWH�YLHZ�RI�DOO�IXQFWLRQV�GHOLYHUHG�E\6$3�XVLQJ�WKH�6$3�VWDQGDUG�PHQX��7KLV�FRPSOHWH�YLHZ�GLVSOD\V�DXWRPDWLFDOO\�LI�QR�XVHU

Page 23: Authorizations Made Easy

What’s New in Release 4.6

Flexible User Menus

Release 4.6A/B xxiiixxiii

PHQXV�KDYH�EHHQ�GHILQHG�RU�LI�WKH�DGPLQLVWUDWRU�KDV�FKRVHQ�WKLV�RSWLRQ�ZKHQ�GHILQLQJ�QHZXVHU�PHQXV�

8VHU�0HQX�([DPSOH

+HUH�DUH�VRPH�H[DPSOHV�RI�GHOLYHUHG�DFWLYLW\�JURXSV�

%DVLV 0LVFHOODQHRXV

$XWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU &2��6DOHV�PDQDJHU

$XWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU &2��+HDG�RI�FRQWUROOLQJ

8VHU�DGPLQLVWUDWRU ),��$FFRXQWV�SD\DEOH�DFFRXQWDQW

6\VWHP�DGPLQLVWUDWRU ),��$FFRXQWV�UHFHLYDEOH�DFFRXQWDQW

%DFNJURXQG�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��:RUNHU

'DWDEDVH�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��2SHUDWRU

&XVWRPL]LQJ�SURMHFW�PHPEHU 00��$FFRXQWV�SD\DEOH�FOHUN

Page 24: Authorizations Made Easy

What’s New in Release 4.6

Composite Activity Groups

Authorizations Made Easyxxivxxiv

&RPSRVLWH�$FWLYLW\�*URXSV

$V�RI�5HOHDVH����$�LW�LV�SRVVLEOH�WR�FUHDWH�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�D�FROOHFWLRQ�RI�RWKHUDFWLYLW\�JURXSV��7KLV�DFWLYLW\�JURXS�LV�FDOOHG�D�FRPSRVLWH�DFWLYLW\�JURXS��&RPSRVLWH�DFWLYLW\JURXSV�FRQWDLQ�RQO\�RWKHU�DFWLYLW\�JURXSV�DQG�QR�DXWKRUL]DWLRQ�GDWD�

8VHU�*URXSV

,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��7KH�FDWHJRU\�8VHUJURXS�FDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

&HQWUDO�8VHU�$GPLQLVWUDWLRQ

,I�D�V\VWHP�JURXS�FRQVLVWV�RI�GLIIHUHQW�5���6\VWHPV�ZLWK�PXOWLSOH�FOLHQWV��WKHQ�WKH�VDPHXVHUV�DUH�FUHDWHG�VHYHUDO�WLPHV�LQ�HYHU\�FOLHQW�DQG�DVVLJQHG�WR�DFWLYLW\�JURXSV��&HQWUDO�8VHU$GPLQLVWUDWLRQ�LV�GHVLJQHG�WR�FDUU\�RXW�WKHVH�WDVNV�LQ�D�FHQWUDO�V\VWHP�DQG�WKHQ�GLVWULEXWHWKLV�GDWD�WR�DOO�V\VWHPV�LQ�WKH�V\VWHP�JURXS�

7KH�*OREDO�8VHU�0DQDJHU�SURYLGHV�WKH�V\VWHP�DGPLQLVWUDWRU�ZLWK�DQ�RYHUYLHZ�RI�WKH�XVHUV�H[LVWLQJ�XVHU�JURXSV��WKH�V\VWHPV�LQ�WKH�V\VWHP�JURXS��DQG�WKH�DFWLYLW\�JURXSV��%\�VLPSO\XVLQJ�GUDJ�DQG�GURS��WKH�V\VWHP�DGPLQLVWUDWRU�FDQ�PDNH�FKDQJHV�LQ�WKH�RYHUYLHZ��7KHVHFKDQJHV�WDNH�HIIHFW�DIWHU�GLVWULEXWLRQ�WR�GHSHQGHQW�V\VWHPV�

Page 25: Authorizations Made Easy

1–1

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH

$XWKRUL]DWLRQ�&RQFHSW

&RQWHQWV

Overview ..................................................................................................................1–2

The Authorization Concept ....................................................................................1–4

SAP* and DDIC Users .............................................................................................1–8

What Is the Profile Generator? ..............................................................................1–9

What Is an Activity Group? ..................................................................................1–12

R/3 Tools for Security Implementation ...............................................................1–14

Case Study: Security Strategy in a Three-System Environment .....................1–15

Setting Up the Authorization Administrators.....................................................1–19

Policies and Procedures ......................................................................................1–21

Auditing Requirements ........................................................................................1–24

��

Page 26: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Overview

Authorizations Made Easy1–2

2YHUYLHZ

,Q�WKLV�FKDSWHU�ZH�H[SODLQ�WKH�VHWXS�DQG�PDLQWHQDQFH�RI�WKH�5���DXWKRUL]DWLRQ�FRQFHSWWKURXJK�WKH�FRPSOHWH�5���OLIHF\FOH�

7KH�JUDSKLF�EHORZ�LOOXVWUDWHV�WKH�5���DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�LQ�YDULRXVVWDJHV�RI�WKH�LPSOHPHQWDWLRQ�

Description ofauth. concept

Info gathering

Strategy,Definition

SU25Upgrade

Authorizations Scoping Preparing the R/3 Environmentand Preparation for Go-Live

ProductionPhase

Upgrade +Ongoing

Development

Setting upthe profilegenerator

Roadmap,+ structure

Q&Adb (4.6B)

Authorizationlist (AL.xls)

Preparation for Going live,Transporting (AG, user,templates,…)

User role templates

Setting up ALE

ASAP

Setting up Central User Admnistration

Global usermanager

IMG

SU25 First installation

3 methods of usinguser role templates: - Use as is - Copy + change - Create own

Description how to workwith user role templates (AG)(which exists, how to use,customizing, creating, etc.)

Upgrade

3.x-4.x Õ 4.6

Miscellaneous

Tips & Troubleshoot.

Infosystem.

SAPNet -R/3Frontend notes (formerly OSS)

Useradmin.

R/3Users

ImplementationEvaluation Operations andContinuous Improvement

SecurityAudit

7RROV�WR�6XSSRUW�WKH�5���$XWKRUL]DWLRQ�&\FOH

7KH�JXLGHERRN�LV�GLYLGHG�LQWR�IRXU�VHSDUDWH�SKDVHV�

< $XWKRUL]DWLRQ�6FRSLQJ��FKDSWHU������< 3UHSDULQJ�WKH�5���(QYLURQPHQW�DQG�3UHSDUDWLRQ�IRU�*R�/LYH��FKDSWHU�����������������������������< 3URGXFWLRQ�3KDVH���FKDSWHU����������������< 8SJUDGH�DQG�2QJRLQJ�'HYHORSPHQW��FKDSWHU����

:H�EHJLQ�ZLWK�WKH�5���DXWKRUL]DWLRQ�FRQFHSW�DQG�WKH�DXWKRUL]DWLRQ�GHVLJQ�VR�\RX�FDQ�PHHWUHTXLUHPHQWV�VXFK�DV�PD[LPXP�VHFXULW\��HDV\�XVHU�PDLQWHQDQFH��DQG�VXIILFLHQW�SULYLOHJHVIRU�HQG�XVHUV�WR�IXOILOO�WKHLU�MRE�GXWLHV��7KH�DXWKRUL]DWLRQ�FRQFHSW�GHILQHV�WKH�IXQFWLRQV�WR�EHFDUULHG�RXW�LQ�YDULRXV�RUJDQL]DWLRQDO�XQLWV�E\�SHRSOH�LQ�VSHFLILF�SRVLWLRQV��7KH�FRQFHSW�DOVRH[WHQGV�WKH�5���RQOLQH�GRFXPHQWDWLRQ�RQ�DXWKRUL]DWLRQV�DQG�SURILOHV�UHTXLUHG�IRU�WKHYDULRXV�HQWHUSULVH�DUHDV�

,PSOHPHQWLQJ�D�PXOWLOHYHO�FOLHQW�VHUYHU�HQYLURQPHQW�RQ�:$1V�SURYLGHV�JUHDW�IOH[LELOLW\�%XW��LQ�WKLV�HQYLURQPHQW��KLJKO\�VHQVLWLYH�GDWD�DQG�SURJUDPV�DUH�DW�D�JUHDWHU�ULVN�RI�EHLQJORVW��PDQLSXODWHG��DQG�VSLHG�XSRQ�WKDQ�LQ�D�FRQYHQWLRQDO�PDLQIUDPH�HQYLURQPHQW��(YHQZLWK�ORFDO�RSHUDWLRQ��WKLV�ULVN�DSSOLHV�WR�DOO�WKUHH�OD\HUV��3UHVHQWDWLRQ��$SSOLFDWLRQ��DQG'DWDEDVH��DQG�EHFRPHV�HYHQ�PRUH�DFXWH�WKDQ�:$1V�

Page 27: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Overview

Release 4.6A/B1–3

7KH�IROORZLQJ�JUDSKLF�VKRZV�KRZ�5���FRYHUV�WKH�DVSHFWV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\�

FRYHUHG�LQ�

$XWKRUL]DWLRQV�0DGH�(DV\

$XWKRUL]DWLRQ�&RQFHSW�LQ�5��� 'DWD�SURWHFWLRQ�

DW�GDWDEDVH�OHYHO

3URWHFWLRQ�DW�FRPPXQLFDWLRQ�OHYHO

,QWHJULW\�FKHFN

$FFHVV�SURWHFWLRQ

'DWD�EDFNXS

5

5

SAP SAP

'DWD�3URWHFWLRQ�DQG�6HFXULW\

7R�PHHW�WKH�KLJK�GHPDQGV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\��6$3�SURYLGHV�WKH�IROORZLQJ�5��VHFXULW\�PHFKDQLVPV�< $XWKRUL]DWLRQ�FRQFHSW��WKLV�JXLGHERRN�GLVFXVVHV�DQ�DXWKRUL]DWLRQ�GHVLJQ�XVLQJ�WKH

3URILOH�*HQHUDWRU�< $FFHVV�SURWHFWLRQ�DQG�DXWKHQWLFDWLRQ�RXWVLGH�RI�5����LQFOXGLQJ�DXWKRUL]DWLRQV�EHWZHHQ

:HE�EDVHG�DSSOLFDWLRQV�DQG�5����QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 3URWHFWLRQ�DW�QHWZRUN�FRPPXQLFDWLRQ�OHYHO��QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 'DWD�SURWHFWLRQ�DW�GDWDEDVH�OHYHO��QRW�GLVFXVVHG�LQ�WKH�JXLGH�

Page 28: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Authorizations Made Easy1–4

7KH�$XWKRUL]DWLRQ�&RQFHSW

7KH�FRQFHSW�RI�DXWKRUL]DWLRQV�LQ�WKH�5���6\VWHP�LQFOXGHV�WKH�IROORZLQJ�< 3URILOH�*HQHUDWRU< /RFNLQJ�DQG�XQORFNLQJ�WUDQVDFWLRQV< /RFNHG�UHFRUGV< 6WUXFWXUDO�DXWKRUL]DWLRQV��1RW�GLVFXVVHG�LQ�WKLV�YHUVLRQ��VHH�$XWKRUL]DWLRQV�0DGH�(DV\

JXLGHERRN�����$�%�IRU�LQIRUPDWLRQ��< 'DWD�HQFU\SWLRQ��QRW�GLVFXVVHG�LQ�WKLV�ERRN�< /RFNLQJ�V\VWHP�IRU�FKDQJHV

7KH�5���DXWKRUL]DWLRQ�FRQFHSW�SHUPLWV�WKH�DVVLJQPHQW�RI�JHQHUDO�DQG�RU�ILQHO\�GHWDLOHGXVHU�DXWKRUL]DWLRQV��7KHVH�DVVLJQPHQWV�FDQ�UHDFK�GRZQ�WR�WKH�WUDQVDFWLRQ��ILHOG��DQG�ILHOGYDOXH�OHYHO��7KHVH�DXWKRUL]DWLRQV�DUH�FHQWUDOO\�DGPLQLVWHUHG�LQ�XVHU�PDVWHU�UHFRUGV�DQG�PRVWDOORZ�WKH�KDQGOLQJ�RI�FHUWDLQ�5���FRPSRQHQWV�DSSOLFDEOH�WR�VSHFLILF�RSHUDWLRQV��$FWLRQV�E\�DXVHU�PD\�UHTXLUH�VHYHUDO�DXWKRUL]DWLRQV��)RU�H[DPSOH��WR�FKDQJH�D�PDWHULDO�PDVWHU�UHFRUG�DXWKRUL]DWLRQV�DUH�UHTXLUHG�IRU�WKH�< 7UDQVDFWLRQ�´FKDQJHµ< 6SHFLILF�PDWHULDO< *HQHUDO�DXWKRUL]DWLRQ�WR�ZRUN�ZLWKLQ�WKH�FRPSDQ\�FRGH

7KH�UHVXOWLQJ�UHODWLRQVKLSV�FDQ�EHFRPH�YHU\�FRPSOH[��7R�PHHW�WKHVH�UHTXLUHPHQWV��WKH�5��DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�LPSOHPHQWHG�DV�D�IRUP�RI�SVHXGR�REMHFW�RULHQWHG�FRQFHSWZLWK�FRPSOHWH�DXWKRUL]DWLRQ�REMHFWV��(DFK�DXWKRUL]DWLRQ�REMHFW�LV�D�FRPELQDWLRQ�RIDXWKRUL]DWLRQ�ILHOGV��$Q�DXWKRUL]DWLRQ�DOZD\V�UHIHUV�WR�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�FDQFRQWDLQ�LQWHUYDOV�IRU�WKH�ILHOG�YDOXHV��$XWKRUL]DWLRQ�FKHFNV�SURWHFW�WKH�IXQFWLRQV�RU�REMHFWV\RX�FKRRVH��6WDQGDUG�GHOLYHUHG�5���KDV�DXWKRUL]DWLRQ�FKHFNV�HPEHGGHG�LQ�WKH�SURJUDPORJLF��3URJUDPPHUV�KDYH�WR�GHFLGH�ZKLFK�DVSHFWV�RI�WKHLU�SURJUDPPHG�IXQFWLRQDOLW\�VKRXOGEH�FKHFNHG�DQG�KRZ�WKH�FKHFN�VKRXOG�EH�FRQGXFWHG�

$XWKRUL]DWLRQ�DGPLQLVWUDWRUV�FUHDWH�DXWKRUL]DWLRQV�WKDW�DUH�DVVLJQHG�WR�XVHUV�LQ�FROOHFWLRQVFDOOHG�SURILOHV��7KH�3URILOH�*HQHUDWRU��3*��XVXDOO\�JHQHUDWHV�DXWKRUL]DWLRQV�DQGDXWKRUL]DWLRQ�SURILOHV��DOWKRXJK�DXWKRUL]DWLRQV�FDQ�DOVR�EH�PDQXDOO\�LQVHUWHG�LQWR�D�SURILOH�

7KH�IROORZLQJ�JUDSKLF�VKRZV�WKH�DXWKRUL]DWLRQ�FRPSRQHQWV�DQG�H[SODLQV�WKHLU�UHODWLRQVKLS�

Page 29: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Release 4.6A/B1–5

)�,

��/RQJ�WH[W��7HFKQ��QDPH

��)LHOG��)LHOG�YDOXH

*HQHUDWHG�IURP�3*

-RKQ�([DPSOH�6$3�����

$P\�$Q\ZKHUH�6$3�����

+�5

2EMHFW�&ODVV $XWKRUL]DWLRQ2EMHFW

$XWKRUL]DWLRQ 3URILOH 8VHU

��/RQJ�WH[W��7HFKQ��QDPH

��/RQJ�WH[W��7HFKQ��QDPH

*HQHUDWHG�IURP�3*

��)LHOG��)LHOG�YDOXH

��)LHOG��)LHOG�YDOXH

��)LHOG��)LHOG�YDOXH

6$3�$XWKRUL]DWLRQ�&RQFHSW

$XWKRUL]DWLRQ�2EMHFW

$V�VKRZQ�LQ�WKH�JUDSKLF�´6$3�$XWKRUL]DWLRQ�&RQFHSWµ�DERYH��REMHFWV�DOORZ�FRPSOH[�XVHUDXWKRUL]DWLRQ�FKHFNV��$Q�DXWKRUL]DWLRQ�REMHFW�ZRUNV�DV�D�WHPSODWH�IRU�D�WR�EH�GHILQHGDXWKRUL]DWLRQ�DQG�FRQWDLQV�D�PD[LPXP�RI�WHQ�ILHOGV�SHU�REMHFW��8VHUV�PD\�RQO\�FRQGXFW�DQDFWLYLW\�LI�WKH\�VDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKH�DXWKRUL]DWLRQ�GHILQHG�RQ�DVSHFLILF�DXWKRUL]DWLRQ�REMHFW�

$XWKRUL]DWLRQ�REMHFWV�DUH�JURXSHG�LQ�DQ�REMHFW�FODVV��VXFK�DV�)LQDQFLDO�$FFRXQWLQJ�RU+XPDQ�5HVRXUFHV��$XWKRUL]DWLRQ�REMHFWV�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→$%$3�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�2EMHFWV��%HFDXVHDXWKRUL]DWLRQ�REMHFWV�DUH�FOLHQW�LQGHSHQGHQW�DQG�GHILQHG�LQ�WKH�$%$3�:RUNEHQFK�GHYHORSHUV�DQG�SURJUDPPHUV�DUH�JHQHUDOO\�UHVSRQVLEOH�IRU�FUHDWLQJ�QHZ�DXWKRUL]DWLRQREMHFWV�

&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQG�ZDQW�WR�LQFOXGH$87+25,7<�&+(&.�FDOOV�RU�QHZ�DXWKRUL]DWLRQ�REMHFWV��<RX�FDQ�RQO\�FKDQJH�RU�GHOHWHDXWKRUL]DWLRQ�REMHFWV�DGGHG�E\�\RXU�FRPSDQ\��5���DXWKRUL]DWLRQ�REMHFWV�PD\�QRW�EH�GHOHWHGRU�FKDQJHG��7R�FKDQJH�DQ�REMHFW��\RX�PXVW�ILUVW�GHOHWH�DOO�DXWKRUL]DWLRQV�ZLWK�ZKLFK�LW�LVDVVRFLDWHG�

$Q�$87+25,7<�&+(&.�LV�DQ�$%$3�FRPPDQG�

Page 30: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Authorizations Made Easy1–6

$XWKRUL]DWLRQ�2EMHFW�)LHOGV

$XWKRUL]DWLRQ�ILHOGV�IRU�DQ�REMHFW�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→�$%$3'HYHORSPHQW�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�)LHOGV�

7KH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�DUH�OLQNHG�WR�GDWD�HOHPHQWV�LQ�WKH�6$3�$%$3'LFWLRQDU\��7KH�SHUPLVVLEOH�YDOXHV�FRQVWLWXWH�DQ�DXWKRUL]DWLRQ��:KHQ�DQ�DXWKRUL]DWLRQFKHFN�WDNHV�SODFH��WKH�V\VWHP�FKHFNV�WKH�YDOXHV�\RX�KDYH�VSHFLILHG�LQ�DQ�DXWKRUL]DWLRQDJDLQVW�WKRVH�UHTXLUHG�WR�FDUU\�RXW�WKH�DFWLRQ��8VHUV�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH\VDWLVI\�WKH�FRQGLWLRQV�IRU�HYHU\�ILHOG�GHILQHG�IRU�D�VSHFLILF�DXWKRUL]DWLRQ�REMHFW�

8VLQJ�WKH�DXWKRUL]DWLRQ�PDLQWHQDQFH�IXQFWLRQV��GHILQH�DOO�DXWKRUL]DWLRQ�ILHOGV�LQ�WKH�V\VWHPGHYHORSPHQW�HQYLURQPHQW��&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQGWKH�QHZ�V\VWHP�HOHPHQWV�DUH�VXEMHFWHG�WR�DXWKRUL]DWLRQ�FKHFNV�

$XWKRUL]DWLRQV

$Q�DXWKRUL]DWLRQ�DOORZV�\RX�WR�FDUU\�RXW�DQ�5���WDVN�EDVHG�RQ�D�VHW�RI�ILHOG�YDOXHV�LQ�DQDXWKRUL]DWLRQ�REMHFW��(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�H[DFWO\�RQH�DXWKRUL]DWLRQ�REMHFW�DQGGHILQHV�WKH�SHUPLWWHG�YDOXH�UDQJH�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�RI�WKLV�DXWKRUL]DWLRQ�REMHFW�$XWKRUL]DWLRQV�DUH�XVHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�DV�SURILOHV�

%\�WKHPVHOYHV��DXWKRUL]DWLRQV�GR�QRW�H[LVW��7KH\�RQO\�KDYH�PHDQLQJ�LQVLGH�D�SURILOH�

)LHOG 9DOXH

&XVWRPHU�W\SH��&8677<3(�

$FWLYLW\��$&797� ��

([SODQDWLRQ�� � �DOO�SRVVLEOH�YDOXHV����� �GLVSOD\

$XWKRUL]DWLRQV�DUH�XVHG�WR�VSHFLI\�SHUPLWWHG�YDOXHV�IRU�WKH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�7KHUH�PD\�EH�RQH�RU�PRUH�YDOXHV�IRU�HDFK�ILHOG��$XWKRUL]DWLRQV�DOORZ�\RX�WR�GHWHUPLQH�WKHQXPEHU�RI�VSHFLILF�YDOXHV�RU�YDOXH�UDQJHV�IRU�D�ILHOG��$OO�YDOXHV�RU�HPSW\�ILHOGV�FDQ�EHSHUPLVVLEOH�YDOXHV��&KDQJHV�DIIHFW�DOO�XVHUV�ZKRVH�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKDWDXWKRUL]DWLRQ��7KH�5���DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�PDLQWDLQ�DXWKRUL]DWLRQVDXWRPDWLFDOO\��XVLQJ�WKH�3*��RU�PDQXDOO\��2QFH�WKH�DXWKRUL]DWLRQ�LV�DFWLYDWHG��FKDQJHV�DIIHFWDOO�XVHUV�ZKLFK�FRQWDLQ�WKH�SURILOH�ZLWK�WKH�DFWLYDWHG�DXWKRUL]DWLRQ�

2QFH�JHQHUDWHG��DXWKRUL]DWLRQV�DQG�SURILOHV�FUHDWHG�ZLWK�WKH�3*�DUH�DXWRPDWLFDOO\DFWLYDWHG��,I�\RX�PDQXDOO\�FUHDWH�DQG�PDLQWDLQ�DXWKRUL]DWLRQV�DQG�SURILOHV��\RX�PXVW�DOVRPDQXDOO\�DFWLYDWH�WKHP��*HQHUDWHG�SURILOHV�DQG�DXWKRUL]DWLRQV�FDQQRW�EH�PDLQWDLQHGPDQXDOO\�ZLWK�WKH�FRQYHQWLRQDO�PDLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68����+RZHYHU��ZHGR�QRW�UHFRPPHQG�WKH�XVH�RI�WKHVH�WUDQVDFWLRQV�IRU�SURILOH�DQG�XVHU�DGPLQLVWUDWLRQDQ\PRUH��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�

Page 31: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Release 4.6A/B1–7

$XWKRUL]DWLRQ�3URILOHV

8VHU�DXWKRUL]DWLRQV�DUH�QRW�GLUHFWO\�DVVLJQHG�ZLWK�WKH�3*�WR�WKH�XVHU�PDVWHU�UHFRUGV�,QVWHDG��WKHVH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�DV�DXWKRUL]DWLRQ�SURILOHV��7KH�DXWKRUL]DWLRQDGPLQLVWUDWRU�FDQ�FUHDWH�DXWKRUL]DWLRQ�SURILOHV�PDQXDOO\�RU�DXWRPDWLFDOO\�

&KDQJHV�DIIHFW�DOO�XVHUV�WR�ZKRP�WKLV�SURILOH�LV�DVVLJQHG�DQG�WDNH�HIIHFW�RQO\�ZKHQ�WKH�XVHUORJV�RQ��8VHUV�ZKR�DUH�ORJJHG�RQ�ZKHQ�WKH�FKDQJH�WDNHV�SODFH�UHPDLQ�XQDIIHFWHG�GXULQJWKHLU�FXUUHQW�VHVVLRQ��EXW�ZKHQ�WKH\�ORJ�RQ�DJDLQ��WKHLU�SURILOH�FKDQJHV�DFFRUGLQJO\��$�XVHU·VDXWKRUL]DWLRQV�DUH�ORDGHG�LQWR�WKH�XVHU�EXIIHU�RQO\�ZKHQ�WKH\�ORJ�RQ�

<RX�FDQQRW�XVH�WKH�DXWKRUL]DWLRQ�SURILOH�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�PDQXDOO\PDQLSXODWH�WKH�3*�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV��$OWKRXJK�WHFKQLFDOO\�SRVVLEOH��QHYHUFUHDWH�D�SURILOH�WKDW�FRQWDLQV�ERWK�PDQXDOO\�DQG�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV�RUSURILOHV��:H�QR�ORQJHU�UHFRPPHQG�WKH�XVH�RI�WUDQVDFWLRQ�68���IRU�SURILOH�DQG�XVHUDGPLQLVWUDWLRQ��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�

1DPLQJ�&RQYHQWLRQ�IRU�$XWKRUL]DWLRQ�3URILOHV

$XWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�D�7�PD\�FRQWDLQ�FULWLFDO��6B86(5 ��DXWKRUL]DWLRQREMHFWV��$OVR��XVH�WKH�3*�WR�H[FOXGH�IXUWKHU�DXWKRUL]DWLRQ�REMHFWV��IRU�H[DPSOH��+5�GDWD�IURP�WKH�SURILOH�

1RWH�WKDW�ZH�DUH�WDONLQJ�DERXW�DXWKRUL]DWLRQ�SURILOHV�QRW�DFWLYLW\�JURXSV�

:KHQ�\RX�ILUVW�VDYH�WKH�DXWKRUL]DWLRQ�SURILOHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH�7KH�V\VWHP�SURSRVHV�D�QDPH�IRU�WKH�SURILOH��KRZHYHU��RQO\�WKH�ILUVW����FKDUDFWHUV��WKHSURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHV�JHQHUDWHG�GHSHQGV�RQ�WKHQXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXP�RI�����DXWKRUL]DWLRQV�ILW�LQWRD�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ�����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,WKDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKH�SURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV��SRVLWLRQV���DQG�����DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�SURILOHV�DQG�WKRVH�SURILOHV�VXSSOLHG�E\�6$3�\RX�VKRXOG�QRW�XVH�DQ\�QDPH�WKDW�KDV�DQ�XQGHUVFRUH�LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QRRWKHU�UHVWULFWLRQV�RQ�WKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�WR�QRWH���������7KHUHIRUH��LI\RXU�FRPSDQ\�KDV�LWV�RZQ�QDPLQJ�FRQYHQWLRQV��\RX�DUH�DOORZHG�WR�RYHUZULWH�WKHSURSRVHG�QDPH�

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��:KHQ�PRUH�WKDQRQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW��WKH�ODVW�WZR�SODFHV�DUH�XVHG�DV�D�FRXQWHU��%DVHGRQ�WKH�QDPH�IRU�WKH�DXWKRUL]DWLRQ�SURILOH��WKH�WHFKQLFDO�QDPHV�IRU�WKH�DXWKRUL]DWLRQV�WR�EHFUHDWHG�VWDUW�ZLWK�D�7�DQG�FRPSULVH�WKH�LQWHUQDO�QXPEHU�RI�WKH�DFWLYLW\�JURXS�DQG�WZR�HQGGLJLWV�LQ�WKH�UDQJH���²�����7������������LV�D�VDPSOH�DXWKRUL]DWLRQ�QDPH��

8VHU�0DVWHU�5HFRUGV

0DVWHU�UHFRUGV�HQDEOH�WKH�XVHU�WR�ORJ�RQ�WR�WKH�5���6\VWHP�DQG�DOORZ�OLPLWHG�DFFHVV�WR�WKHIXQFWLRQV�DQG�REMHFWV��7KH�XVHU�DGPLQLVWUDWRU�PDLQWDLQV�XVHU�PDVWHU�UHFRUGV�E\�FKRRVLQJ7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV�

Page 32: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

SAP* and DDIC Users

Authorizations Made Easy1–8

$XWKRUL]DWLRQ�&KHFNV

7R�FRQGXFW�DQ�DXWKRUL]DWLRQ�FKHFN��WKLV�FKHFN�PXVW�EH�LQFOXGHG�LQ�WKH�WUDQVDFWLRQ·V�VRXUFHFRGH��'XULQJ�WKH�FKHFN��WKH�V\VWHP�FRPSDUHV�DXWKRUL]DWLRQ�SURILOH�YDOXHV��DVVLJQHG�E\�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU��WR�WKH�YDOXHV�QHHGHG�WR�FDUU\�RXW�D�SURJUDP�VSHFLILHG�DFWLRQ��$XVHU�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH�DXWKRUL]DWLRQ�FKHFN�LV�VXFFHVVIXO�IRU�HYHU\�ILHOG�LQWKH�DXWKRUL]DWLRQ�REMHFW�

$XWKRUL]DWLRQ�FKHFNV�DUH�WULJJHUHG�E\�WKH�$%$3�$87+25,7<�&+(&.�VWDWHPHQW��7KHSURJUDPPHU�VSHFLILHV�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�UHTXLUHG�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQILHOG��7KH�$87+25,7<�&+(&.�WKHQ�YHULILHV�LI�D�XVHU�KDV�DXWKRUL]DWLRQ�DQG�LI�WKLVDXWKRUL]DWLRQ�LV�IURP�WKH�XVHU�PDVWHU�UHFRUG��7KH�FKHFN�LV�VXFFHVVIXO�LI�DQ�DXWKRUL]DWLRQ�LVIRXQG�WKDW�FRQWDLQV�WKH�YDOXHV�VSHFLILHG�LQ�WKH�$87+25,7<�&+(&.�

:KHQ�5���WUDQVDFWLRQV�DUH�H[HFXWHG��VLQFH�WKH�WUDQVDFWLRQ�FDOOV�RWKHU�ZRUN�DUHDV�LQ�WKHEDFNJURXQG��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�RIWHQ�FKHFNHG��)RU�WKHVH�FKHFNV�WR�EHVXFFHVVIXO��WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��$XWKRUL]DWLRQ�FKHFNV�FDQ�EHGLVDEOHG�E\�VHWWLQJ�FKHFN�LQGLFDWRUV�LQ�WUDQVDFWLRQ�68���RU�E\�VZLWFKLQJ�RII�REMHFWV�JOREDOO\�

$FWLYDWLQJ�DQG�'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�LQ�7UDQVDFWLRQV

,W�LV�SRVVLEOH�WKDW�XVHUV�UHFHLYH�PRUH�DXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHGPDLQWHQDQFH�ORDG��$XWKRUL]DWLRQ�FKHFNV�DUH�FRQGXFWHG�ZKHUHYHU�WKH\�DUH�ZULWWHQ�LQWR�DWUDQVDFWLRQ·V�VRXUFH�FRGH��2QO\�E\�XVLQJ�WKH�3*�FDQ�FKHFN�LQGLFDWRUV�EH�VHW�WR�H[FOXGH�< &HUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRULW\�FKHFNV< 6SHFLILF�DXWKRUL]DWLRQ�FKHFNV�LQ�VSHFLILF�WUDQVDFWLRQV< $Q�DXWKRUL]DWLRQ�REMHFW�IURP�EHLQJ�FKHFNHG

$OO�RI�WKHVH�DGMXVWPHQWV�DUH�SRVVLEOH�ZLWKRXW�DOWHULQJ�WKH�SURJUDP�FRGH��3ULRU�WRDXWRPDWLFDOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOH��XVH�WKH�FKHFN�LQGLFDWRUV�WR�FRQWURO�ZKLFKREMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�DUH�GLVSOD\HG��6$3�GHOLYHUV�D�GHIDXOW�FKHFNLQGLFDWRU�VHWWLQJ�ZLWK�5����)RU�PRUH�LQIRUPDWLRQ�UHIHU�WR�FKDSWHU�����7LSV�DQG7URXEOHVKRRWLQJ��WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�

6$3 �DQG�'',&�8VHUV

'XULQJ�\RXU�5���LQVWDOODWLRQ��FOLHQWV�����������DQG�����DUH�FUHDWHG��,Q�FOLHQWV�����DQG�����WZR�VSHFLDO�XVHUV�DUH�GHILQHG��EXW�QR�VSHFLDO�XVHU�LV�FUHDWHG�LQ�FOLHQW������6LQFH�WKHVH�XVHUVKDYH�VWDQGDUG�QDPHV�DQG�SDVVZRUGV��\RX�QHHG�WR�VHFXUH�WKHVH�XVHUV�IURP�XQDXWKRUL]HGXVDJH��WKH�(DUO\:DWFK�DQG�&3,&�XVHUV�DUH�QRW�FRYHUHG�LQ�WKLV�ERRN��

7KH�WZR�VSHFLDO�5���XVHUV�DUH�< 6$3

'HILQHG�DV�WKH�VWDQGDUG�5���VXSHUXVHU��6$3 �GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG�5DWKHU��LW�

Page 33: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Release 4.6A/B1–9

� ,V�GHILQHG�LQ�WKH�V\VWHP�FRGH� +DV�D�GHIDXOW�SDVVZRUG��PASS�� +DV�XQOLPLWHG�V\VWHP�DFFHVV�DXWKRUL]DWLRQV

:KHQ�\RX�LQVWDOO�5����D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�LQ�FOLHQWV�����DQG�����ZLWK�WKHLQLWLDO�SDVVZRUG�06071992��6$3 �XVHU�PDVWHU�UHFRUG�GHDFWLYDWHV�6$3 ªV�VSHFLDOSURSHUWLHV��7R�SUHYHQW�6$3 �PLVXVH��FKDQJH�WKH�SDVVZRUG��:H�UHFRPPHQG��KRZHYHU�WKDW�\RX�GHDFWLYDWH�6$3 �DQG�GHILQH�\RXU�RZQ�VXSHUXVHU�

< '',&

7KLV�XVHU�LV�WKH�PDLQWHQDQFH�XVHU�IRU�WKH�$%$3�'LFWLRQDU\�DQG�VRIWZDUH�ORJLVWLFV��7KHXVHU�PDVWHU�UHFRUG�IRU�'',&�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����DQG�KDV�WKHGHIDXOW�SDVVZRUG�19920706��6\VWHP�FRGH�WHVWLQJ�DOORZV�'',&�VSHFLDO�SULYLOHJHV�IRUFHUWDLQ�RSHUDWLRQV��)RU�H[DPSOH��'',&�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�GXULQJ�DQXSJUDGH��7R�SUHYHQW�'',&�PLVXVH��FKDQJH�WKH�SDVVZRUG�

8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�6$3 �DQG�'',&�SDVVZRUGV�KDYHEHHQ�FKDQJHG��7KLV�UHSRUW�LV�UHVWULFWHG�WR�XVHUV�ZKR�EHORQJ�WR�WKH�XVHU�JURXS�683(5�ZLWKDFWLYLW\����DQG�FOLHQW�DGPLQLVWUDWLRQ�

:KDW�,V�WKH�3URILOH�*HQHUDWRU"

6$3·V�3URILOH�*HQHUDWRU��3*��KHOSV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FUHDWH��JHQHUDWH��DQGDVVLJQ�DXWKRUL]DWLRQ�SURILOHV��)LUVW�UHOHDVHG�ZLWK����*��WKH�3*�DFFHOHUDWHV�5��LPSOHPHQWDWLRQ�E\�VLPSOLI\LQJ�WKH�WDVN�RI�VHWWLQJ�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KHDGPLQLVWUDWRU�RQO\�QHHGV�WR�FRQILJXUH�WKH�FXVWRPHU�VSHFLILF�VHWWLQJV��WKH�3*�PDQDJHV�RWKHUWDVNV��VXFK�DV�VHOHFWLQJ�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�FRQVLGHUDWLRQ��7KH�3*�LV�IXOO\LQWHJUDWHG�ZLWK�5���DQG�LV�DYDLODEOH�RQ�DOO�5���VXSSRUWHG�SODWIRUPV��7KH�3*�UHSUHVHQWV�\HWDQRWKHU�LPSURYHPHQW�RI�6$3·V�WRRO�EDVHG�VXSSRUW�DQG�D�UHGXFWLRQ�LQ�5���LPSOHPHQWDWLRQWLPH�

7KH�3*�LV�DQ�DSSURDFK�WR�GHILQLQJ�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KH�DGPLQLVWUDWRU�QRORQJHU�XVHV�WKH�DXWKRUL]DWLRQ�REMHFWV�WR�GHILQH�WKH�DXWKRUL]DWLRQV�IRU�YDULRXV�XVHU�JURXSV�LQVWHDG��DXWKRUL]DWLRQ�SURILOHV�DUH�EXLOW�DURXQG�WKH�IXQFWLRQV�WR�EH�SHUIRUPHG�LQ�5����%DVHGRQ�WKH�IXQFWLRQV�VHOHFWHG��WKH�3*�SLFNV�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�DQG�JURXSV�WKHPLQ�D�QHZ�DXWKRUL]DWLRQ�SURILOH�

8VLQJ�IXQFWLRQV�WR�GHILQH�DXWKRUL]DWLRQ�SURILOHV�< 6SHHGV�XS�WKH�SURFHVV< 'HILQHV�DXWKRUL]DWLRQ�SURILOHV< 6LPSOLILHV�DGPLQLVWUDWRU�XVHU�FRPPXQLFDWLRQ��DOORZLQJ�ERWK�WKH�DGPLQLVWUDWRU�DQG

XVHUV�WR�XVH�WKH�VDPH�5���IXQFWLRQ�WHUPLQRORJ\

7R�XVH�WKH�3*��\RX�ILUVW�KDYH�WR�VHW�LW�XS��7KH�RQH�WLPH�VHW�XS�LQYROYHV�WKH�IROORZLQJ�VWHSV��� &KHFN�LI�WKH�6$3�5���6\VWHP�SDUDPHWHU�LV�VHW�FRUUHFWO\�WR�DFWLYH�

Page 34: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Authorizations Made Easy1–10

�� 8VH�68���WR�LQLWLDOL]H�WKH�WDEOHV�862%7B&�DQG�862%;B&��DQG�WKHQ�FXVWRPL]H�WKHP�LIGHVLUHG��

)RU�GHWDLOHG�LQIRUPDWLRQ��SOHDVH�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�

2QFH�WKH�3*�LV�VHW�XS��\RX�FDQ�ZRUN�ZLWK�LW��%HIRUH�ZRUNLQJ�ZLWK�ZLWK�WKH�3*��LW�LV�XVHIXO�WRXQGHUVWDQG�LWV�FRPSRQHQWV�

&RPSRQHQWV�RI�WKH�3URILOH�*HQHUDWRU

7KH�3*�KDV�WKH�IROORZLQJ�FRPSRQHQWV�

$FWLYLW\�*URXSV

$Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�5���WUDQVDFWLRQV��DXWKRUL]DWLRQV��DQG�DGGLWLRQDO�REMHFWV�<RX�FDQ�DVVLJQ�DQ�DFWLYLW\�JURXS�WR�DV�PDQ\�XVHUV�DV�\RX�ZDQW��<RX�FDQ�FUHDWH��GLVSOD\�FKDQJH��FRS\��DQG�WUDQVSRUW�DFWLYLW\�JURXSV�

&RPSRVLWH�$FWLYLW\�*URXSV

&RPSRVLWH�DFWLYLW\�JURXSV�DUH�PDGH�XS�RI�D�FROOHFWLRQ�RI�DFWLYLW\�JURXSV��7KH�XVHUV�DVVLJQHGWR�D�FRPSRVLWH�DFWLYLW\�JURXS�DUH�DXWRPDWLFDOO\�DGGHG�WR�WKH�DFWLYLW\�JURXSV�GXULQJ�DFRPSDULVRQ��&RPSRVLWH�DFWLYLW\�JURXSV�WKHPVHOYHV�GR�QRW�FRQWDLQ�DQ\�DXWKRUL]DWLRQ�GDWD�,QVWHDG�RI�KDYLQJ�WR�DVVLJQ�HDFK�XVHU�WR�HDFK�DFWLYLW\�JURXS��\RX�FDQ�VHW�XS�D�FRPSRVLWHDFWLYLW\�JURXS�DQG�WKHQ�DVVLJQ�WKH�XVHUV�WR�WKLV�JURXS�

'HULYHG�$FWLYLW\�*URXSV

<RX�FDQ�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH�ZKHQ�FUHDWLQJ�D�QHZ�RQH��7KH�V\VWHPWUDQVIHUV�WKH�WUDQVDFWLRQV�LQ�RQH�DFWLYLW\�JURXS�WR�D�QHZ�DFWLYLW\�JURXS³RQH�WKDW�UHPDLQVGHSHQGHQW�RQ�WKH�ILUVW��<RX�FDQ�GLVSOD\�WKH�KLHUDUFK\�RI�WKH�DFWLYLW\�JURXSV�WKDW�LQKHULWWUDQVDFWLRQV�IURP�HDFK�RWKHU�E\�FKRRVLQJ�$FWLYLW\�JURXS�→�:KHUH�XVHG�OLVW�

:LWK�DQ�DFWLYLW\�JURXS�GHULYHG�IURP�D�GLIIHUHQW�DFWLYLW\�JURXS��\RX�FDQQRW�HQWHUWUDQVDFWLRQV�GLUHFWO\��<RX�FDQQRW�UHVHW�WKH�GHILQLWLRQ�RI�WKH�LQLWLDO�DFWLYLW\�JURXS�IURP�ZKLFKWKH�GHULYHG�DFWLYLW\�JURXS�LQKHULWHG�LWV�WUDQVDFWLRQV��3DVVLQJ�RQ�WUDQVDFWLRQV�RQO\�UHIHUV�WRWKH�PHQX�VHOHFWLRQ�DQG�QRW�WR�WKH�DXWKRUL]DWLRQV��<RX�PXVW�PDLQWDLQ�DXWKRUL]DWLRQVVHSDUDWHO\�LQ�HDFK�DFWLYLW\�JURXS��WKHVH�DUH�QRW�SDVVHG�RQ��,W�LV�DOVR�SRVVLEOH�WR�WUDQVIHU�WKHDXWKRUL]DWLRQ�GDWD�RI�WKH�SUHYLRXV�DFWLYLW\�JURXS�WR�WKH�GHULYHG�DFWLYLW\�JURXS�DV�D�FRS\�

8VHU�$VVLJQPHQW

8VHUV�FDQ�EH�DVVLJQHG�WR�VLQJOH�DFWLYLW\�JURXSV�RU�WR�FRPSRVLWH�DFWLYLW\�JURXSV�ZKLFK�PRVWO\UHSUHVHQW�MRE�UROHV��8VHUV�WKDW�\RX�DVVLJQ�WR�DQ�DFWLYLW\�JURXS�PD\�H[HFXWH�WKH�WUDQVDFWLRQV�UHSRUWV��RU�DQ\�RWKHU�WDVN�LQ�WKH�DFWLYLW\�JURXS�ZLWK�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQV�

*HQHUDWLQJ�WKH�3URILOHV

7KH�DGPLQLVWUDWRU�FKRRVHV�WKH�VSHFLILF�PHQX�SDWKV�DQG�IXQFWLRQV�IRU�HDFK�XVHU�JURXS��7KLVVHOHFWLRQ�GHWHUPLQHV�WKH�5���DFWLYLWLHV�WKDW�XVHUV�LQ�HDFK�XVHU�JURXS�DUH�DXWKRUL]HG�WRSHUIRUP�

8VLQJ�WKH�VHOHFWHG�WUDQVDFWLRQ�FRGHV��WKH�3*�GHWHUPLQHV�WKH�DIIHFWHG�DXWKRUL]DWLRQ�REMHFWV�7R�VLPSOLI\�WKH�FUHDWLRQ�RI�VXEVHTXHQW�LQGLYLGXDO�DXWKRUL]DWLRQ�SURILOHV��5���FRQWDLQV

Page 35: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Release 4.6A/B1–11

GHIDXOW�YDOXHV�IRU�PDQ\�DXWKRUL]DWLRQ�ILHOGV�LQ�VSHFLILF�DXWKRUL]DWLRQ�REMHFWV��)RU�H[DPSOH�RQH�SRVVLEOH�DFFHVV�UHVWULFWLRQ�PLJKW�EH�WKH�GHIDXOW�YDOXH�'LVSOD\��OLPLWLQJ�WKH�XVHU�WRGLVSOD\�PRGH�RQ�FHUWDLQ�WUDQVDFWLRQV�

$GGLWLRQDOO\��WKH�3*�LGHQWLILHV�WKH�RUJDQL]DWLRQDO�OHYHOV�WKDW�SOD\�D�UROH�LQ�WKH�H[WUDFWHGDXWKRUL]DWLRQ�REMHFWV�DQG�FOHDUO\�GLVSOD\V�WKHVH�OHYHOV�IRU�WKH�DGPLQLVWUDWRU��7KHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�PD\�KDYH�WR�LQWHUYHQH�DQG�PDQXDOO\�GHILQH�WKH�OHYHOV�WR�ZKLFKWKH�XVHUV�QHHG�DFFHVV��IRU�H[DPSOH��WKH�FRPSDQ\�FRGH��

7KH�3*�WKHQ�SODFHV�WKH�VSHFLILHG�OHYHOV�LQ�WKH�DXWKRUL]DWLRQ�REMHFWV��$W�WKLV�SRLQW��D�ORW�RIDXWKRUL]DWLRQ�REMHFW�ILHOGV�IRU�WKH�QHZ�DXWKRUL]DWLRQ�SURILOH�KDYH�EHHQ�ILOOHG��KRZHYHU�WKHUHDUH�VWLOO�ILHOGV�WKDW�QHHG�WR�EH�PDLQWDLQHG��7KH�DXWKRUL]DWLRQ�REMHFWV�DUH�GLVSOD\HGKLHUDUFKLFDOO\�LQ�D�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�DGPLQLVWUDWRU�PD\�DGMXVW�WKHUHPDLQLQJ�YDOXHV��VXFK�DV�PDWHULDO�W\SH��RUGHU�W\SH��HWF�

:LWKLQ�WKLV�PDLQWHQDQFH�WUDQVDFWLRQ��WKH�DGPLQLVWUDWRU�FDQ�HDVLO\�QDYLJDWH�IURP�WKHRYHUYLHZ�VFUHHQ�WR�WKH�ORZHVW�GLVSOD\�OHYHO��WKH�DXWKRUL]DWLRQV�DQG�WKHLU�ILHOGV��DQG�GLUHFWO\DVVLJQ�WKH�YDOXHV��*HQHUDOO\��SHUPLVVLEOH�YDOXHV�FDQ�DOVR�EH�DVVLJQHG�DW�KLJKHU�OHYHOV��7KHIROORZLQJ�XWLOLWLHV�WR�VSHFLI\�WKH�YDOXHV�DUH�DYDLODEOH�DW�HYHU\�OHYHO�RI�WKH�KLHUDUFKLFDOGLVSOD\�< 9DOXH�VHOHFWLRQ�IURP�OLVWV< &KHFNER[HV�IRU�VLPSOH�DFWLYLW\�VHOHFWLRQ< 'HOHWH�DQG�FRS\�IXQFWLRQV

,I�DGPLQLVWUDWRUV�GHWHUPLQH�WKDW�QR�IXUWKHU�DXWKRUL]DWLRQ�UHVWULFWLRQV�DUH�QHFHVVDU\�RQ�DFHUWDLQ�OHYHO��E\�FKRRVLQJ�D�EXWWRQ��WKH�3*�ILOOV�LQ�WKH�UHPDLQLQJ�YDOXHV�

)LQDOO\��DQRWKHU�PHQX�LWHP�LQ�WKH�V\VWHP�DVVLJQV�WKH�XVHUV�WR�WKH�5���IXQFWLRQV��,Q�WKLVSURFHVV��WKH�3*�DXWRPDWLFDOO\�FRSLHV�DOO�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOHV�WR�WKH�XVHUPDVWHU�UHFRUG��2I�FRXUVH��XVHUV�FDQ�EH�DVVLJQHG�PXOWLSOH�VHOHFWLRQV��ZKLFK�PHDQV�WKDWFHUWDLQ�JHQHUDO�DXWKRUL]DWLRQV�QHHG�WR�EH�PDLQWDLQHG�RQO\�RQFH�DQG�DUH�DYDLODEOH�IRUDVVLJQPHQW�WR�DOO�V\VWHP�XVHUV�

,QWHJUDWLQJ�WKH�3*�LQ�5���DOVR�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�DFFHVV�WKH�GRFXPHQWDWLRQ�RQHYHU\�DXWKRUL]DWLRQ�REMHFW�GLUHFWO\�IURP�WKH�3*��)XUWKHUPRUH��WKH�3*�FDQ�OLVW�DOO�5��IXQFWLRQV�WKDW�FKHFN�D�VSHFLILF�DXWKRUL]DWLRQ�

5HTXLUHPHQWV�DQG�$YDLODELOLW\7KH�3*�UXQV�RQ�DOO�VXSSRUWHG�SODWIRUPV�DQG�KDV�EHHQ�DYDLODEOH�VLQFH�5HOHDVH����*�IRUJHQHUDO�FXVWRPHU�XVH��6WDUWLQJ�ZLWK�5HOHDVH������LW�LV�DOUHDG\�DFWLYDWHG�IRU�XVH�

Page 36: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

What Is an Activity Group?

Authorizations Made Easy1–12

:KDW�,V�DQ�$FWLYLW\�*URXS"

7KH�SURFHVV�RI�VHFXULW\�LPSOHPHQWDWLRQ�ZLWK�WKH�3*�LV�EDVHG�RQ�WKH�FUHDWLRQ�RI�DFWLYLW\JURXSV�RU�D�FROOHFWLRQ�RI�OLQNHG�RU�DVVRFLDWHG�DFWLYLWLHV��VXFK�DV�WDVNV��UHSRUWV��DQGWUDQVDFWLRQV��$Q�DFWLYLW\�JURXS�LV�D�´GDWD�FRQWDLQHUµ�IRU�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQSURILOHV�DQG�XVXDOO\�UHSUHVHQWV�D�MRE�UROH�LQ�\RXU�FRPSDQ\���+RZHYHU��FXVWRPHUV�RIWHQGHILQH�DFWLYLW\�JURXSV�VRPHZKDW�GLIIHUHQWO\��$V�VXFK��WKHUH�LV�QR�RQH�FRQFUHWH�GHILQLWLRQ�RIDQ�DFWLYLW\�JURXS��RWKHU�WKDQ�LW�LV�D�GDWD�FRQWDLQHU�IRU�DXWKRUL]DWLRQV��

$FWLYLW\�JURXSV�DUH�GHILQHG�E\�WKH�FXVWRPHU�SHUIRUPLQJ�WKH�LPSOHPHQWDWLRQ�DQG�DOORZV\VWHPDWLF�RUJDQL]DWLRQ�DQG�HIILFLHQW�PDLQWHQDQFH�RI�V\VWHP�DFWLYLWLHV�

7KH�6$3�%XVLQHVV�:RUNIORZ��3HUVRQQHO�3ODQQLQJ�DQG�'HYHORSPHQW�DV�ZHOO�DV�WKH�5HSRUW:ULWHU�DQG�RWKHU�UHSRUWLQJ�WRROV�DUH�WLJKWO\�OLQNHG�ZLWK�WKH�3*��6$3�%XVLQHVV�:RUNIORZLQFOXGHV�ZRUNIORZ�WDVNV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS��8VHUV�DVVLJQHG�ZLWK�DFFHVVWR�D�SDUWLFXODU�DFWLYLW\�JURXS�UHDOO\�FRPH�IURP�WKH�+5�3HUVRQQHO�3ODQQLQJ�DQG'HYHORSPHQW�IXQFWLRQDOLW\��)XUWKHUPRUH��WKH�SODQ�YHUVLRQ�WKDW�LV�XVHG�LQ�+5�3HUVRQQHO3ODQQLQJ�DQG�'HYHORSPHQW�LV�WKH�VDPH�SODQ�YHUVLRQ�XVHG�E\�WKH�3*�DQG�:RUNIORZ�

8VLQJ�DQ�DFWLYLW\�JURXS�DV�DQ�LQIRUPDWLRQ�GDWDEDVH�UHGXFHV�GDWD�HQWU\�WLPH��6HOHFW�WKHFULWHULD��VXFK�DV�DFFHVV�ULJKWV��DQG�GLYLGH�WKH�DFWLYLWLHV�LQWR�DSSURSULDWH�JURXSV��)RU�H[DPSOH�\RX�FRXOG�GHFLGH�WR�JURXS�DFWLYLWLHV�E\�VXEMHFW�PDWWHU��VXFK�DV�SHUVRQQHO��SD\UROO��RUEXGJHWLQJ��2U��\RX�FRXOG�JURXS�DFWLYLWLHV�E\�MRE�FODVVHV��VXFK�DV�WUDQVODWLRQ�DFWLYLWLHV�FRPSXWHU�SURJUDPPHU�DFWLYLWLHV��RU�VHFUHWDULDO�DFWLYLWLHV��<RX�FRXOG�DOVR�VHW�XS�DFRPELQDWLRQ�RI�VXEMHFW�PDWWHU�DQG�MRE�RULHQWHG�DFWLYLW\�JURXSV��$IWHU�VHWWLQJ�XS�DFWLYLW\JURXSV��\RX�FDQ�DVVLJQ�WKHP�WR�YDULRXV�5���REMHFWV�

$FWLYLW\�*URXS�$VVLJQPHQWV

$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�PDQ\�XVHUV��2QH�XVHU�FDQ�DOVR�EH�DVVLJQHG�WR�PDQ\DFWLYLW\�JURXSV�

$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�WKH�IROORZLQJ�W\SHV�RI�XVHUV�

5���ORJLQ�XVHU�,'V

$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�UHFRJQL]HG�E\�WKH�5���6\VWHP�DQG�LV�DOORZHG�WR�ORJ�RQ�)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�RIWKH�%DVLV�FRPSRQHQW�

-REV

$�MRE�UHSUHVHQWV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF��0DQ\�HPSOR\HHV�LQ�\RXU�FRPSDQ\�PD\�KROG�WKHVDPH�MRE�FODVVLILFDWLRQ���)RU�H[DPSOH��WKHUH�PLJKW�EH����SHRSOH�ZKRVH�MRE�LV�DGPLQLVWUDWLYHDVVLVWDQW���3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKDW�MRE��8QOHVV�WKH�DFWLYLW\JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKH�ULJKWV�QHHGHG�WR�ZRUN�ZLWK�6$3RIILFH��EHFDUHIXO�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV�

Page 37: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

What Is an Activity Group?

Release 4.6A/B1–13

3RVLWLRQV

$�SRVLWLRQ�UHSUHVHQWV�DQ�HPSOR\HH·V�XQLTXH��LQGLYLGXDO�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWKMREV��<RX�FDQ�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DQ�DOPRVW�FRPSOHWHO\�SRVLWLRQ�RULHQWHGIDVKLRQ��$OO�WKH�DFFHVV�ULJKWV�DUH�WKHQ�OLQNHG�WR�WKH�SRVLWLRQ��VR�LW�GRHV�QRW�PDWWHU�ZKR�ILOOVWKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��DQG�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG��WKHDXWKRUL]DWLRQ�SURILOH�DXWRPDWLFDOO\�FKDQJHV�

2UJDQL]DWLRQDO�XQLWV

2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�DQ\�RUJDQL]DWLRQDO�HQWLW\�WKDW�SHUIRUPV�D�VSHFLILHG�VHW�RIIXQFWLRQV�ZLWKLQ�D�FRPSDQ\��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV�GLYLVLRQV��GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDOVWUXFWXUH�DW�\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSVDPRQJ�WKH�XQLWV��$Q\RQH�ZKR�LV�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWVWKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�RUJDQL]DWLRQDO�XQLW�

([DPSOHV�RI�XQLWV�LQFOXGH�< 6XEVLGLDULHV< 'LYLVLRQV< 'HSDUWPHQWV< *URXSV< 6SHFLDO�SURMHFW�WHDPV

8QOHVV�WKH�DFWLYLW\�JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��EH�FDUHIXO�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�RUJDQL]DWLRQDO�XQLWV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WREH�IDLUO\�VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�LWV�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��:KHQ�H[FHSWLRQV�RFFXU�IRU�MREV�RUSRVLWLRQV��FUHDWH�DGGLWLRQDO�DFWLYLW\�JURXSV�IRU�WKHP��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RUSRVLWLRQ��LW�PD\�EH�EHVW�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�MREV�RU�SRVLWLRQV�FRQFHUQHG��%\FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�EHWZHHQ�WKH�XQLWV��\RXLGHQWLI\�\RXU�FRPSDQ\·V�RUJDQL]DWLRQDO�VWUXFWXUH�

:KDW�,V�D�8VHU�5ROH�7HPSODWH"

8VHU�UROH�WHPSODWHV�DUH�DFWLYLW\�JURXSV�LQ�WKH�VWDQGDUG�5���6\VWHP��GHOLYHUHG�E\�6$3��WKDWDOUHDG\�FRQWDLQ�WUDQVDFWLRQV�DQG�UHSRUWV�IURP�DOO�DSSOLFDWLRQ�DUHDV��7KHVH�XVHU�UROHWHPSODWHV�DUH�UHDG\�WR�XVH��<RX�KDYH�WKH�RSWLRQ�WR�XVH�D�XVHU�UROH�WHPSODWH�DV�LV�RU�FRS\�DQGFKDQJH�LW�WR�\RXU�QHHGV��,I�XVHUV�DUH�DVVLJQHG�WR�D�MRE�UROH�DQG�WKH\�ORJ�RQ�WR�WKH�V\VWHP�WKH\�RQO\�VHH�WKRVH�WDVNV�WKH\�DUH�DOORZHG�WR�SHUIRUP�

Page 38: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

R/3 Tools for Security Implementation

Authorizations Made Easy1–14

5���7RROV�IRU�6HFXULW\�,PSOHPHQWDWLRQ

,QIRUPDWLRQ�6RXUFH /RFDWLRQ

2YHUYLHZ�RI�LPSRUWDQW�6$31HW�¥�5��)URQWHQG�QRWHV��IRUPHUO\�266�

$SSHQGL[�$

)UHTXHQWO\�DVNHG�TXHVWLRQV��)$4� $SSHQGL[�%

2YHUYLHZ�RI�V\VWHP�SURILOH�SDUDPHWHUV $SSHQGL[�&

/LEUDU\�2QOLQH�'RFXPHQWDWLRQ &KRRVH�+HOS�→�5���OLEUDU\�→�%DVLV�→�&RPSXWHU�&HQWHU0DQDJHPHQW�6\VWHP�→��8VHUV�DQG�$XWKRUL]DWLRQV

5HOHDVH�,QIRUPDWLRQ &KRRVH�+HOS�→�5HOHDVH�QRWHV�

5���6HFXULW\�*XLGH 1RWH������

5HSRUW�'RFXPHQWDWLRQ 5HSRUW�GRFXPHQWDWLRQ�FDQ�EH�DFFHVVHG�IURP�WKH�VHOHFWLRQVFUHHQ�E\�HLWKHU�FKRRVLQJ�+HOS�→�([WHQGHG�+HOS�RU�6\VWHP�→6HUYLFHV�→�5HSRUWLQJ��HQWHULQJ�WKH�UHSRUW�QDPH��DQG�WKHQVHOHFWLQJ�*RWR�→�'RFXPHQWDWLRQ�

7UDLQLQJ�FRXUVHV 6HH�6$31HW�IRU�FXUUHQW�FRXUVHV��KWWS���ZZZ�VDS�FRP

�*ORVVDU\&KRRVH�+HOS�→�5���OLEUDU\�→�*ORVVDU\�IRU�WKH�HQWLUH�JORVVDU\�RUFKRRVH�+HOS�→�*ORVVDU\�IRU�D�FRQWH[W�VHQVLWLYH�JORVVDU\�

�&RQWH[W�6HQVLWLYH�+HOS0RYH�WKH�FXUVRU�WR�D�ILHOG�RU�WR�D�V\VWHP�PHVVDJH�DQGSUHVV�)��

�.QRZOHGJH�3URGXFWV1RWH������

�$%$3�:RUNEHQFK�'RFXVHW1RWH������

�6$31HW

6$31HW�LV�DQ�LQWHUQHW�VHUYLFH�WKDW�EULQJV�QHZ�LQIRUPDWLRQ�DQGFRPPXQLFDWLRQ�FKDQQHOV�EHWZHHQ�6$3�DQG�LWV�FXVWRPHUV��/RJRQ�E\�HQWHULQJ��KWWS���ZZZ�VDS�FRP��RQ�DQ�LQWHUQHW�EURZVHU�DQGFOLFN�WKH�3DUWQHU�&XVWRPHU�EXWWRQ��&OLFN�)UHTXHQW�XVHUV�DQG�HQWHU\RXU�6$31HW�¥�5���)URQWHQG�QRWH��IRUPHUO\�266��SDVVZRUG�

��6$3�/DEV��6LPSOLILFDWLRQ*URXS

6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�KWWS���ZZZ�VDSODEV�FRP�DXWK�IRUXSGDWHV��EHWD�UHOHDVHV�RI�QHZ�JXLGHERRNV��DGGLWLRQDOLQIRUPDWLRQ��SUHGHILQHG�DFWLYLW\�JURXSV��JXLGHERRNV�IRUSUHYLRXV�UHOHDVHV��HWF�

�$FFHOHUDWHG6$3�5RDGPDS�$6$3�

7KH�$6$3�,PSOHPHQWDWLRQ�5RDGPDS�UHFRPPHQGV�XVLQJ�WKH3*�LQ�LWV�DXWKRUL]DWLRQ�GHVLJQ�SURSRVDO��<RX�FDQ�DOVR�ILQG�OLQNVWR�WKLV�JXLGHERRN�IURP�GLIIHUHQW�ORFDWLRQV�LQ�WKH�URDGPDSVWUXFWXUH��,QVLGH�$6$3��FKRRVH�,PSOHPHQWDWLRQ�5RDGPDS�→3KDVH����5HDOL]DWLRQ�→�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�

Page 39: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Release 4.6A/B1–15

&DVH�6WXG\��6HFXULW\�6WUDWHJ\�LQ�D�7KUHH�6\VWHP

(QYLURQPHQW

'HYHORSPHQW�6\VWHP��'(9�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

'(9�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

:KHQ�WKH�GHYHORSPHQW�V\VWHP��'(9��LV�ILUVW�LQVWDOOHG��SURMHFW�PHPEHUV�LQFOXGLQJFRQILJXUDWRUV��GHYHORSHUV��V\VWHP�DGPLQLVWUDWRUV��DQG�UHFHQW�WUDLQHHV�FRPSULVH�WKH�EXON�RI5���XVHUV��6$3�UHFRPPHQGV�WKH�XVH�RI�MRE�UROH�WHPSODWHV��$V�WKH�5���SURMHFW�SURJUHVVHV�WKH�QHHG�WR�OLPLW�XVHU�DFFHVV�LQFUHDVHV��,Q�JHQHUDO��'(9�V\VWHP�XVHUV�KDYH�PRUH�DFFHVV�WKDQTXDOLW\�DVVXUDQFH���4$6��RU�SURGXFWLRQ���35'��V\VWHP�XVHUV�

$V�FRQILJXUDWLRQ�LV�GRQH�LQ�'(9�\RX�FDQ�QRZ�XVH�WKH�QHZ�IXQFWLRQDOLW\�RI�FXVWRPL]LQJDFWLYLW\�JURXSV�WR�HQVXUH�WKDW�SHRSOH�DUH�FRQILJXULQJ�RQO\�WKHLU�RZQ�SDUW�RI�WKH�V\VWHP��3OHDVH�UHDG�FKDSWHU���IRU�GHWDLOHG�LQIRUPDWLRQ�RQ�FXVWRPL]LQJ�DXWKRUL]DWLRQV��

7UHDW�VXSHUXVHU�DFFRXQWV�OLNH�´URRWµ�LQ�81,;��7KH��<RXU&RPSDQ\!B$//�SURILOH�OLPLWV�ULVNRQ�WKH�'(9�V\VWHP��6\VWHP�PDOIXQFWLRQV�GXH�WR�H[FHVVLYH�DFFHVV�FDQ�DOVR�FDXVH�SURMHFWGHYHORSPHQW�GHOD\V�

<RX�QRZ�FRQWURO�ZKR�FUHDWHV�DQG�PDLQWDLQV�< 8VHUV< 3URILOHV< $XWKRUL]DWLRQV

<RX�DOVR�HOLPLQDWH�DWWHPSWV�WR�< /RFN�WUDQVDFWLRQV< 'HOHWH�XVHU�VHVVLRQV< 6WRS�ZRUN�SURFHVVHV

7KLV�FRQWURO�PDLQWDLQV�WKH�V\VWHP·V�LQWHJULW\�DQG�VWDELOLW\��8VLQJ�WKH�3*��WKH�DXWKRUL]DWLRQDGPLQLVWUDWRU�GHYHORSV�HQG�XVHU�SURILOHV�DQG�DXWKRUL]DWLRQV�LQ�WKH�'(9�V\VWHP��7KHVHSURILOHV�DQG�DXWKRUL]DWLRQV�ZLOO�EH�WUDQVSRUWHG�WR�WKH�4$6�V\VWHP�IRU�ILQDO�WHVWLQJ�EHIRUHPRYLQJ�WR�35'��7KH�HQG�XVHU�PDVWHU�UHFRUGV�DUH�XVXDOO\�FUHDWHG�LQ�35'�FORVHU�WR�WKH�JR�OLYHGDWH��7KH�DFWLYLW\�JURXSV��WRJHWKHU�ZLWK�WKH�WUDQVSRUWHG�DXWKRUL]DWLRQ�GDWD��DUH�DVVLJQHG�WRWKH�HQG�XVHUV�DV�UHTXLUHG�LQ�35'��:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV

Page 40: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Authorizations Made Easy1–16

WKH�DXWKRUL]DWLRQ�SURILOHV��7KHVH�SURILOHV�GR�QRW�QHHG�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�LI�XVHUV�DUH�DOUHDG\�DVVLJQHG��6HH�FKDSWHU���IRU�PRUH�LQIRUPDWLRQDERXW�WUDQVSRUWLQJ�

0DLQWDLQLQJ�GRFXPHQWDWLRQ�LV�DOVR�LPSRUWDQW�EHFDXVH�LW�< +HOSV�IXWXUH�SURMHFW�UROORXWV�SURFHHG�VPRRWKO\< ,V�HVVHQWLDO�WR�SDVV�VHFXULW\�DGPLQLVWUDWLYH�IXQFWLRQV�WR�RWKHU�SURMHFW�PHPEHUV< ,V�UHTXLUHG�E\�DXGLWRUV

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�FOLHQW�FRS\�DGPLQLVWUDWRUV�:KHQ�QHZ�FOLHQWV�DUH�FUHDWHG��DFWLYLW\�JURXSV�DUH�QRW�DXWRPDWLFDOO\�FRSLHG��6LQFH�XVHUV�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�DUH�DOO�FOLHQW�GHSHQGHQW��WKH�FOLHQWFRS\�DGPLQLVWUDWRU�DOVR�QHHGV�WR�NQRZ�ZKLFK�XVHU�PDVWHU�UHFRUGV�WR�FRS\��6HH�FKDSWHU���IRUPRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�DOVR�ZRUN�FORVHO\�ZLWK�WKRVH�LQ�\RXU�FRPSDQ\�WKDWIXQFWLRQ�DV�FKDQJH�PDQDJHPHQW�DGPLQLVWUDWRUV��%RWK�DGPLQLVWUDWRUV�DUH�LPSRUWDQW�SURMHFWFRQWURO�SRLQWV��7KH�V\VWHP�ODQGVFDSH��FOLHQW�ODQGVFDSH��DQG�FOLHQW�UROHV�VKRXOG�EH�FOHDUO\GHILQHG�DQG�SUHVHQWHG�WR�WKH�SURMHFW�WHDP��'HYHORSPHQW�FODVVHV�DQG�DXWKRUL]DWLRQ�JURXSVVKRXOG�EH�HVWDEOLVKHG�IRU�DOO�QHZ�GHYHORSPHQW��$OO�DGPLQLVWUDWRUV�VKRXOG�FRPSOHWHDSSURSULDWH�6$3·V�WUDLQLQJ�FRXUVHV�IRU�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�WKH\�DUH�WU\LQJ�WR�VHWXS��:H�UHFRPPHQG�WKDW�\RX�DWWHQG�FRXUVHV�DQG�ZRUNVKRSV�LPPHGLDWHO\�DIWHU�WKH�LQLWLDOLQVWDOODWLRQ�RI�\RXU�5���6\VWHP�

1H[W��WKHVH�DGPLQLVWUDWRUV�VKRXOG�FRQGXFW�D�SURMHFW�VSHFLILF�ZRUNVKRS�WR�ERWK�UHYLHZ�WKHV\VWHP�DQG�FOLHQW�ODQGVFDSH��DQG�GLVFXVV�WKH�IROORZLQJ�FRQWURO�SRLQWV�< :KHQ�GHYHORSPHQW�UHTXHVWV�ZLOO�PRYH< 7R�ZKLFK�FOLHQWV�WKHVH�UHTXHVWV�ZLOO�PRYH< :KRVH�VLJQDWXUHV�ZLOO�EH�UHTXLUHG�DORQJ�WKH�ZD\

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�GHYHORSHUV�WR�HQIRUFH�VHFXULW\VWDQGDUGV�IRU�QHZ�$%$3�SURJUDPV�DQG�WUDQVDFWLRQV��ZKLFK�FDQ�EH�HQIRUFHG�WKURXJK&KDQJH�0DQDJHPHQW��$OO�QHZ�FXVWRPHU�ZULWWHQ�FRGHV�VKRXOG�EH�DVVLJQHG�WR�DQDXWKRUL]DWLRQ�JURXS��ZLWK�WUDQVDFWLRQ�6(���DQG�6(����WKH�$%$3�HGLWRU�DWWULEXWHV�VFUHHQ�8QSURWHFWHG�FXVWRPHU�ZULWWHQ�SURJUDPV�DQG�WUDQVDFWLRQV�LQ�35'�DOZD\V�SUHVHQW�SUREOHPV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�LQYROYH�WKH�FRUSRUDWH�DXGLWRUV�DW�WKLV�MXQFWXUH�

:H�UHFRPPHQG�LQYROYLQJ�WKH�FRUSRUDWH�DXGLWRUV�XS�IURQW�VR�WKHLU�UHTXLUHPHQWV�DUHLQFRUSRUDWHG�LQ�WKH�GHYHORSPHQW�HIIRUWV��,W�LV�DOZD\V�XQSOHDVDQW�WR�DXGLW�SRVW�OLYHSURMHFWV��,Q�WKH�ZRUVW�FDVH�VFHQDULR��SURMHFWV�VKRXOG�EH�KDOWHG�XQWLO�DXGLWRU�UHTXLUHPHQWVDUH�PHW��DQG�DW�D�PLQLPXP��DOO�RI�WKH�RULJLQDO�GHYHORSPHQW�ZRUN�PD\�KDYH�WR�EH�UHYLVHG�

Page 41: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Release 4.6A/B1–17

4XDOLW\�$VVXUDQFH�6\VWHP��4$6�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

4$6�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

:KHQ�WKH�4$6�V\VWHP�DQG�FOLHQW�DUH�FUHDWHG��WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�VWDUWWUDQVSRUWLQJ�WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP��WDEOH�862%;B&��WHPSODWHV�DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��IURP�WKH�'(9�V\VWHP�WR�WKH�4$6�V\VWHP�VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$XWKRUL]DWLRQ�SURILOHV�IRU�LPSRUWHG�DFWLYLW\�JURXSV�QRORQJHU�QHHG�WR�EH�UHJHQHUDWHG��VLQFH�WKH�V\VWHP�FDQ�GR�WKLV�DXWRPDWLFDOO\�QRZ��%HIRUHPRYLQJ�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�GDWD�WR�35'��D�ILQDO�WHVWLQJ�SODQ�VKRXOG�EHSURGXFHG�

)RU�H[DPSOH��DQ�),�SURMHFW�WHDP�PHPEHU�PD\�XVH�D�VDPSOH�DFFRXQWV�SD\DEOH�XVHU�,'�WR�< &RQILUP�WKDW�WKH�XVHU�KDV�DFFHVV�WR�WKH�VSHFLILF�WUDQVDFWLRQV�JRYHUQHG�E\�HDFK�DFWLYLW\

JURXS�WR�ZKLFK�WKH�XVHU�LV�DVVLJQHG�< (QVXUH�WKDW�WKHVH�WUDQVDFWLRQV�PDWFK�WKH�FRPSDQ\�GHILQHG�UROH�IRU�DFFRXQWV�SD\DEOH�< 9HULI\�WKDW�WKH�VDPSOH�XVHU�,'�GRHV�QRW�KDYH�DFFHVV�WR�XQDXWKRUL]HG�WUDQVDFWLRQV�

6RPH�VLWHV�FRQGXFW�D�GD\�LQ�WKH�OLIH�WHVW�DV�SDUW�RI�WKHLU�JR�OLYH�SODQ��ZKHUH�HQG�XVHUV�ORJ�RQWR�D�SUHSURGXFWLRQ�HQYLURQPHQW�DQG�VLPXODWH�UHDO�SURGXFWLRQ��7KLV�SURFHVV�LV�DQ�H[FHOOHQWZD\�RI�WHVWLQJ�WKH�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�

7UDLQLQJ�&OLHQW�6\VWHP��75*�

:KLOH�PDQ\�FXVWRPHUV�GR�QRW�SXW�WKHLU�WUDLQLQJ�HQYLURQPHQW�RQ�DQRWKHU�V\VWHP�HQWLUHO\�PDQ\�GR��<RX�QHHG�WR�VHW�XS�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WKH�WUDLQLQJ�V\VWHP�DV�ZHOO�7KH�DSSURSULDWH�DXWKRUL]DWLRQ�VHWXS�FDQQRW�EH�GHWHUPLQHG�ZLWKRXW�ILUVW�NQRZLQJ�IURPZKHUH�WKH�GDWD�WKDW�DSSHDUV�LQ�WKH�WUDLQLQJ�V\VWHP�FRPHV�IURP��RU�KRZ�WKH�V\VWHP�DQGWUDLQLQJ�FOLHQW�ZHUH�FUHDWHG���)RU�H[DPSOH��LI�WKH�WUDLQLQJ�V\VWHP�LV�D�FRS\�RI�WKH�SURGXFWLRQHQYLURQPHQW�RU�D�FRS\�RI�WKH�FOLHQW�ZKHUH�FRQYHUVLRQV�DQG�LQWHUIDFHV�ZHUH�LQLWLDOO\�WHVWHG��LWPD\�EH�SRVVLEOH�WKDW�WKH�WUDLQLQJ�V\VWHP�FRQWDLQV�VHQVLWLYH�LQIRUPDWLRQ�VXFK�DV�VRFLDOVHFXULW\�QXPEHUV��FRQYHUWHG�SD\UROO�LQIRUPDWLRQ��DGGUHVVHV��HWF�

Page 42: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Authorizations Made Easy1–18

3URGXFWLRQ�6\VWHP��35'�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

35'�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

2QFH�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�IXOO\�WHVWHG�LQ�4$6��DQG�HQGXVHU�DQG�SURMHFW�WHDP�DSSURYDO�KDV�EHHQ�SURYLGHG��WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQV\VWHP��WDEOH�862%;B&��WHPSODWHV��DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��DUHPRYHG�WR�35'��VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$FWXDO�HQG�XVHU�,'V�FDQ�EH�FUHDWHG��$IRUP�WKDW�LQFOXGHV�DOO�RI�WKH�SHUWLQHQW�LQIRUPDWLRQ�IRU�XVHU�,'�FUHDWLRQ��DORQJ�ZLWK�WKHSURSHU�VLJQDWXUHV��LV�GHYHORSHG�DQG�GLVWULEXWHG�WR�WKH�GHSDUWPHQWV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�EH�D�SDUW�RI�WKH�JR�OLYH�SODQ��7KH�ILUVW�GD\V�RI�JRLQJ�OLYH�DUH�KHFWLF��DQG�WKHUH�VKRXOG�EH�D�SURFHGXUH�WR�UHSRUW�DFFHVV�SUREOHPV�LQ�SURGXFWLRQ��7KHKHOS�GHVN�LV�D�JRRG�IRFDO�SRLQW��:KHQ�XVHUV�KDYH�DFFHVV�SUREOHPV��IRU�H[DPSOH��ZKHQ�XVHUVVHH�WKH�PHVVDJH��1R�DXWKRUL]DWLRQ�IRU�WUDQVDFWLRQ�;;;;���WKH\�VKRXOG�H[HFXWH�WUDQVDFWLRQ68���WR�REWDLQ�WKH�DXWKRUL]DWLRQ�UHTXLUHG�IRU�WKLV�WUDQVDFWLRQ���5HPHPEHU��VLQFH����+�WUDQVDFWLRQ�68���LV�DOVR�SURWHFWHG�E\�REMHFW�6B7&2'(��6HH�FKDSWHU����,QVHUWLQJ�0LVVLQJ$XWKRUL]DWLRQV��IRU�PRUH�GHWDLOV���$�VFUHHQ�SULQW�VKRXOG�EH�VHQW�WR�WKH�KHOS�GHVN�DQG�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�IRU�HYDOXDWLRQ��2QFH�WKH�DSSOLFDWLRQ�DUHD�RZQHU�DSSURYHV�WKHDGGLWLRQDO�DFFHVV��LW�LV�DVVLJQHG�WR�WKH�XVHU��$GGLWLRQDO�DFFHVV�PHDQV�WKDW�WKH�DFWLYLW\�JURXSVPLJKW�EH�FKDQJHG�RU�WKDW�D�PLVVLQJ�DXWKRUL]DWLRQ�REMHFW�PD\�QHHG�WR�EH�PDQXDOO\�LQVHUWHGLQ�WKH�DXWKRUL]DWLRQ�SURILOHV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�VWDUW�SODQQLQJ�IRU�RWKHU�SURMHFW�SKDVHV��7KLV�PD\LQFOXGH�RWKHU�UROORXWV�WR�GLIIHUHQW�ORFDWLRQV��GLIIHUHQW�SODQWV��GLIIHUHQW�PRGXOHV��RU�5��XSJUDGHV��$OO�RI�WKHVH�UROORXWV�VKRXOG�LQYROYH�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�

Page 43: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Setting Up the Authorization Administrators

Release 4.6A/B1–19

6HWWLQJ�8S�WKH�$XWKRUL]DWLRQ�$GPLQLVWUDWRUV

:H�UHFRPPHQG�\RX�GLYLGH�WKH�V\VWHP�DGPLQLVWUDWLRQ�WDVNV��DV�VKRZQ�LQ�WKH�JUDSKLF�EHORZ�WR�HQVXUH�JUHDWHU�V\VWHP�VHFXULW\��)RU�FRPSDQLHV�WKDW�KDYH�VHYHUDO�SHRSOH�GHYRWHG�WR�WKHDXWKRUL]DWLRQV�FRPSRQHQW�RI�5����WKLV�GLYLVLRQ�PDNHV�JRRG�VHQVH��6$3�VXSSRUWV�WKLVDSSURDFK�ZLWK�WKH�XVHU�UROH�WHPSODWHV�IRU�WKHVH�DGPLQLVWUDWRUV��,Q�WKH�VWDQGDUG�5���6\VWHP\RX�FDQ�ILQG�WKH�IROORZLQJ�WHPSODWHV�

$GPLQLVWUDWRU 8VHU�5ROH�7HPSODWH

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU 6$3B%&B$87+B'$7$B$'0,1B$*

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU 6$3B%&B$87+B352),/(B$'0,1B$*

8VHU�$GPLQLVWUDWRU 6$3B%&B86(5B$'0,1B$*

6XSHU�8VHU

8VHU�$GPLQLVWUDWRU

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU

- Maintain user master records - Assign activity groups to users - Assign profiles to users (T ONLY) - Display auth. and profiles - Call user information system

- Maintain activity groups - Within activity groups: - Change authorizations (T ONLY) - Generate profiles (T ONLY) - Execute transaction information- Call user information system

- Maintain activity groups - Within activity groups: -Change transaction selection - Change authorization data- Call user information system

SAP

Organizing Authorization Administration

)RU�FRPSDQLHV�ZLWK�YHU\�IHZ�SHRSOH�LQYROYHG�LQ�VHWWLQJ�XS�DQG�PDLQWDLQLQJ�DXWKRUL]DWLRQV�GLYLGLQJ�XS�VXFK�WDVNV�FRPSOLFDWHV�WKH�SURFHVV�RI�FUHDWLQJ�DQG�PDLQWDLQLQJ�WKHDXWKRUL]DWLRQV�FRPSRQHQW��<RX�VKRXOG�DOVR�GHFLGH�ZKHWKHU�PDLQWHQDQFH�RI�XVHUV��DFWLYLW\JURXSV��DXWKRUL]DWLRQ�SURILOH��DQG�DXWKRUL]DWLRQV�VKRXOG�EH�FHQWUDOL]HG�RU�GHFHQWUDOL]HG��:HUHFRPPHQG�FHQWUDOL]LQJ�PDLQWHQDQFH�XQWLO�\RXU�JR�OLYH�GDWH�DQG�ILUVW�UROORXW��&HQWUDOL]HGDGPLQLVWUDWRUV�KDYH�D�EHWWHU�XQGHUVWDQGLQJ�RI�ZKDW�LV�LQYROYHG�LQ�D�UROORXW��DQG�FHQWUDOL]LQJWKH�DGPLQLVWUDWLYH�WDVNV�HVWDEOLVKHV�QDPLQJ�VWDQGDUGV��%\�WKH�ILUVW�UROORXW��DOO�DGPLQLVWUDWLYHIXQFWLRQV�VKRXOG�EH�GRFXPHQWHG�DQG�FDQ�WKHQ�EH�GHFHQWUDOL]HG�

Page 44: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Setting Up the Authorization Administrators

Authorizations Made Easy1–20

&RQYHUVHO\��ZKHQ�WKH�DGPLQLVWUDWLYH�IXQFWLRQV�DUH�GHFHQWUDOL]HG�XS�IURQW��DGPLQLVWUDWRUVXVH�GLIIHUHQW�QDPLQJ�VWDQGDUGV�IRU�WKHLU�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQGDXWKRUL]DWLRQV��DQG�GLIIHUHQW�DSSURDFKHV�WR�LPSOHPHQWLQJ�VHFXULW\��,I�HDFK�DGPLQLVWUDWRUFUHDWHV�KLV�RU�KHU�RZQ�VWDQGDUGV��HYHU\WKLQJ�KDV�WR�EH�UHQDPHG�RQFH�WKH�DXWKRUL]DWLRQLPSOHPHQWDWLRQ�LV�VWDQGDUGL]HG�

7KH�VXSHUXVHU�VHWV�XS�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�IRU�DGPLQLVWUDWRUV�LQD�GHSDUWPHQW��D�FRVW�FHQWHU��DQG�RWKHU�RUJDQL]DWLRQDO�XQLWV��:LWKLQ�DQ�DUHD��DGPLQLVWUDWLYHWDVNV�DUH�GLYLGHG�EHWZHHQ�WKH�XVHU�DGPLQLVWUDWRU��DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU��DQGDXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU��7KH�IROORZLQJ�LV�D�OLVW�RI�HDFK�DGPLQLVWUDWRU·V�WDVNV�DQGUHVSRQVLELOLWLHV�< 8VHU�$GPLQLVWUDWRU

� &UHDWLQJ�DQG�FKDQJLQJ�XVHUV� $VVLJQLQJ�XVHUV�WR�DFWLYLW\�JURXSV� $VVLJQLQJ�SURILOHV�EHJLQQLQJ�ZLWK�7�WR�XVHUV��RU�IROORZLQJ�\RXU�RZQ�QDPLQJ

FRQYHQWLRQ�� 'LVSOD\LQJ�DXWKRUL]DWLRQV�DQG�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

'LVSOD\LQJ�RU�FKDQJLQJ�DFWLYLW\�JURXS�GDWD�DQG�FKDQJLQJ�RU�JHQHUDWLQJ�SURILOHV�VKRXOGQRW�EH�SHUPLWWHG�IRU�XVHU�DGPLQLVWUDWRUV�

< $XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU� 'LVSOD\LQJ�XVHUV� &UHDWLQJ�DQG�FKDQJLQJ�DFWLYLW\�JURXSV� &KDQJLQJ�WKH�WUDQVDFWLRQ�VHOHFWLRQ�DQG�DXWKRUL]DWLRQ�GDWD�LQ�DFWLYLW\�JURXSV� 'LVSOD\LQJ�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

&KDQJLQJ�XVHUV�DQG�JHQHUDWLQJ�SURILOHV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRUV�

< $XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU� 'LVSOD\LQJ�DFWLYLW\�JURXSV�DQG�WKHLU�GDWD��DQG�XVHUV� *HQHUDWLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�7�EDVHG�RQ

H[LVWLQJ�DFWLYLW\�JURXSV��RU�UHVSHFWLYHO\�IROORZLQJ�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

7KH�IROORZLQJ�WDVNV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRUV�� &KDQJLQJ�XVHUV� &KDQJLQJ�DFWLYLW\�JURXS�GDWD� *HQHUDWLQJ�DXWKRUL]DWLRQ�SURILOHV�FRQWDLQLQJ�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK

6B86(5

Page 45: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Release 4.6A/B1–21

+RZ�WKH�$GPLQLVWUDWRUV�:RUN�7RJHWKHU

7KH�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU�< &UHDWHV�DQ�DFWLYLW\�JURXS< &KRRVHV�WUDQVDFWLRQV< 0DLQWDLQV�DXWKRUL]DWLRQ�GDWD

:LWKRXW�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�WR�JHQHUDWH�WKH�SURILOH��WKH�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRU�VDYHV�WKH�SURILOH�DQG�DFFHSWV�WKH�GHIDXOW�SURILOH�QDPH�7��RU�D�QDPH�WKDWIROORZV�\RXU�QDPLQJ�FRQYHQWLRQ�

7KH�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU�< &DOOV�WUDQVDFWLRQ�PFCG< 6HOHFWV�WKH�'LVSOD\�PRGH�WR�FKHFN�WKH�GDWD< *HQHUDWHV�WKH�DXWKRUL]DWLRQ�SURILOHV

)LQDOO\��WKH�XVHU�DGPLQLVWUDWRU�DVVLJQV�WKH�DFWLYLW\�JURXS�WR�D�XVHU�RU�D�3'�REMHFW��VXFK�DV�DSRVLWLRQ��DQG�XSGDWHV�WKH�XVHU�PDVWHU�UHFRUG��7KH�DXWKRUL]DWLRQ�SURILOH�LV�WKHQ�DGGHG�WR�WKHXVHU�PDVWHU�UHFRUG�

3ROLFLHV�DQG�3URFHGXUHV

7KH�IROORZLQJ�VKRZV�D�VDPSOH�RI�SROLFLHV�DQG�SURFHGXUHV��KRZHYHU�IRU�\RXU�FRPSDQ\�LWPLJKW�EH�GLIIHUHQW�

8VHU�$GPLQLVWUDWLRQ

3ROLFLHV

< 6XSHUXVHUV�6$3 �DQG�'',&� 7KHUH�LV�QR�XVHU�6$3 �DQG�'',&�LQ�DQ\�FOLHQW�ZLWKRXW�D�SDVVZRUG�� 7KH�6$3 �XVHU�KDV�QR�DXWKRUL]DWLRQV�

< 8VHU�QDPLQJ�FRQYHQWLRQ

$OO�XVHUV�DUH�DVVLJQHG�QDPHV�LGHQWLFDO�WR�WKHLU�HPSOR\HH�,'�QXPEHUV��SHUVRQQHOQXPEHUV��

< 8VHU�PDLQWHQDQFH� 7KH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW�KDV�WR�UHFHLYH�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW

)RUP��ZLWK�H�PDLO��VLJQHG�E\�WKH�XVHU·V�DSSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�� $OO�SURILOHV�WKDW�WKH�XVHU�UHTXLUHV�PXVW�EH�VSHFLILFDOO\�OLVWHG�RQ�WKH�UHTXHVW�IRUP��7KH

IRUP�PXVW�LQGLFDWH�ZKHWKHU�WKH�XVHU�LV�WHPSRUDU\�RU�SHUPDQHQW�� )RU�WHPSRUDU\�HPSOR\HHV��DQ�DFFRXQW�H[SLUDWLRQ�GDWH�PXVW�EH�LQFOXGHG�

< 8VHU�OHDYLQJ�WKH�FRPSDQ\�� 7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�ILOOHG�RXW�DQG�VLJQHG�E\�WKH�DSSOLFDWLRQ

GHSDUWPHQW�PDQDJHU��� $�FRS\�RI�WKLV�IRUP�PXVW�EH�VHQW�WR�+5�GHSDUWPHQW�

Page 46: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Authorizations Made Easy1–22

�� 7KH�+5�GHSDUWPHQW�PDQDJHU�PXVW�VLJQ�WKH�UHTXHVW�IRU�GHOHWLRQ��� 7KLV�PDQDJHU�VHQGV�WKH�VLJQHG�FRS\�EDFN�WR�WKH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW��� $OO�HPSOR\HH�PDVWHU�UHFRUG�LQIRUPDWLRQ��LQFOXGLQJ�LQWHUQDO�SRVW�RIILFH��PXVW�EH

GHOHWHG�

3URFHGXUHV

< 6XSHUXVHUV�6$3 �DQG�'',&� 6$3 �LV�XVHG�RQO\�IRU�FOLHQW�FRSLHV�� 3VHXGR�VXSHUXVHUV�DUH�FUHDWHG�LQ�HDFK�FOLHQW�ZLWK�WKH�6$3B$//�SURILOH�� 7KH�SDVVZRUG�LV�FKDQJHG�HYHU\�PRQWK�

7KLV�FDQ�EH�GHWHUPLQHG�ZLWK�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�ORJLQ�SDVVZRUGBH[SLUDWLRQBWLPH��VHH�DSSHQGL[�&�IRU�WKH�OLVW�RI�V\VWHP�SURILOHSDUDPHWHUV��

� 8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�SDVVZRUGV�IRU�6$3 �DQG�'',&KDYH�EHHQ�FKDQJHG�IURP�WKH�GHIDXOWV�

< 8VHU�QDPLQJ�FRQYHQWLRQ

7KH�DSSOLFDWLRQ�PDQDJHU�PXVW�FRQWDFW�WKH�+5�GHSDUWPHQW�DQG�UHFHLYH�WKH�QHZHPSOR\HH�,'�QXPEHU��7KLV�,'�QXPEHU�LV�HQWHUHG�LQWR�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUPZKHUH�LQGLFDWHG�

< 8VHU�PDLQWHQDQFH

7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�PDLOHG�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�

< 8VHU�OHDYLQJ�WKH�FRPSDQ\

7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�VHQW�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�DQG�WR�WKH�+5�GHSDUWPHQW�PDQDJHU��7KH�+5�GHSDUWPHQWPDQDJHU�PXVW�VLJQ�WKH�IRUP�DQG�UHWXUQ�WKH�VLJQHG�FRS\�WR�WKH�V\VWHP�DGPLQLVWUDWLRQGHSDUWPHQW�

5ROHV�DQG�5HVSRQVLELOLWLHV

7DVN 5ROH

0DLQWDLQLQJ�VXSHUXVHUV 6\VWHP�DGPLQLVWUDWRU

0DLQWDLQLQJ�QDPLQJ�FRQYHQWLRQV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�+5GHSDUWPHQW

0DLQWDLQLQJ�XVHUV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU

0DLQWDLQLQJ�XVHUV�OHDYLQJ�FRPSDQ\ $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU�+5�GHSDUWPHQW

Page 47: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Release 4.6A/B1–23

6\VWHP�6HFXULW\

3ROLFLHV

< ,7�0DQDJHU

7KH�,7�0DQDJHU��ZKR�LV�UHVSRQVLEOH�IRU�DOO�DVSHFWV�RI�V\VWHP�VHFXULW\��PXVW�UHYLHZ�WKHVHFXULW\�VWUDWHJ\�HYHU\�WZR�PRQWKV�

< 6XSHUXVHUV

)RU�UHYLVLRQ�DQG�VHFXULW\�SXUSRVHV��WKH�VXSHUXVHU�6$3 �ZLOO�QRW�EH�XVHG�IRU�V\VWHPPDLQWHQDQFH��$OO�PDLQWHQDQFH�KDV�WR�EH�SHUIRUPHG�ZLWK�QHZO\�GHILQHG�VXSHUXVHUV�

< 6\VWHP�SDVVZRUGV6\VWHP�SDVVZRUGV��'%�XVHU�VDSU���2�6��XVHU��6,'!$'0��'',&��PXVW�EH�FKDQJHG�HYHU\IRXU�ZHHNV��,Q�FDVH�RI�DQ�HPHUJHQF\��SDVVZRUG�DFFHVV�PXVW�EH�HQVXUHG�

< 8VHU�SDVVZRUGV7R�SURWHFW�WKH�V\VWHP�IURP�XQDXWKRUL]HG�DFFHVV��PDNH�XVHUV�FKDQJH�WKHLU�SDVVZRUGHYHU\�IRXU�ZHHNV��$�PLQLPXP�SDVVZRUG�OHQJWK�RI�VL[�FKDUDFWHUV�LV�UHTXLUHG��$IWHU�WKUHHXQVXFFHVVIXO�ORJRQ�DWWHPSWV�WKH�DFFRXQW�ZLOO�EH�ORFNHG�

< 6$3�FRQQHFWLRQ7KH�FRQQHFWLRQ�WR�6$3�LV�RSHQHG�RQO\�IRU�D�VHUYLFH�VHVVLRQ��7KHVH�FRQQHFWLRQV�DUH6$31HW�¥�5���)URQWHQG�QRWHV��IRUPHUO\�266���(DUO\�:DWFK��DQG�5HPRWH�&RQVXOWLQJ�&RQQHFWLRQ�WR�6$3�FDQ�RQO\�EH�RSHQHG�IURP�WKH�FXVWRPHU�VLWH��&RQQHFWLRQV�KDYH�WR�EHPRQLWRUHG�ZLWK�DQ�DSSURSULDWH�WRRO�

< 6$3URXWHU6$3URXWHU��D�6$3�VXSSOLHG�WRRO�IRU�VHFXULQJ�5���DFFHVV��LV�QHFHVVDU\�IRU�FRQQHFWLQJ�WR6$3�V\VWHPV�

< 5HPRWH�FRQQHFWLRQV)RU�H[WHUQDO�FRQQHFWLRQV��PRELOH�HQG�XVHUV���IL[HG�,3�DGGUHVVHV�DUH�DVVLJQHG��2QHH[SOLFLW�HQWU\�SHU�H[WHUQDO�FRQQHFWLRQ�LV�PDLQWDLQHG�LQ�WKH�SHUPLVVLRQ�OLVW�IRU�6$3�URXWHU�

3URFHGXUHV

< ,7�0DQDJHU

(YHU\�WZR�PRQWKV��WKH�,7�PDQDJHU�DQG�WKH�V\VWHP�DGPLQLVWUDWRU�VKRXOG�UHYLHZ�V\VWHPVHFXULW\�

< 6XSHUXVHUV

7KH�6$3B$//�SURILOH�LV�UHPRYHG�IURP�WKH�XVHU�6$3 ��DQG�WKH�6$3 �XVHU�LV�ORFNHG��$OOPDLQWHQDQFH�WDVNV�DUH�SHUIRUPHG�XVLQJ�DFFRXQWV�ZLWK�WKH�6$3B$//�SURILOH�

< 6\VWHP�SDVVZRUGV7KH�V\VWHP�DGPLQLVWUDWRU�FKDQJHV�WKH�V\VWHP�SDVVZRUGV�HYHU\�IRXU�ZHHNV��7KH�V\VWHPDGPLQLVWUDWRU�PXVW�ZULWH�GRZQ�WKH�FXUUHQW�SDVVZRUGV�DQG�SODFH�WKHP�LQ�D�VHDOHGHQYHORSH��ZKLFK�PXVW�EH�VWRUHG�LQ�WKH�GDWD�VDIH�DQG�EH�DFFHVVLEOH�LQ�FDVH�RI�HPHUJHQF\�8VH�UHSRUW�56865����WR�FKHFN�LI�V\VWHP�SDVVZRUGV�KDYH�EHHQ�FKDQJHG�

Page 48: Authorizations Made Easy

Chapter 1: R/3 System Security and the Authorization Concept

Auditing Requirements

Authorizations Made Easy1–24

< 8VHU�SDVVZRUGV8VHUV�PXVW�FKDQJH�WKHLU�SDVVZRUGV�HYHU\�IRXU�ZHHNV�E\�VHWWLQJ�WKH�DSSURSULDWHSDUDPHWHUV�LQ�WKH�'()$8/7�SURILOH��7KLV�VWHS�HQVXUHV�WKDW�WKH�VHWWLQJV�DUH�YDOLG�LQ�WKHHQWLUH�V\VWHP��7KH�PLQLPXP�QXPEHU�RI�FKDUDFWHUV�IRU�D�SDVVZRUG�LV�VL[��DQG�WKHLQWUXGHU�ORFNRXW�FRXQW�LV�VHW�WR�WKUHH�

< 6$3�FRQQHFWLRQ$�FRQQHFWLRQ�EHWZHHQ�6$3�DQG�WKH�FXVWRPHU�LV�HVWDEOLVKHG�E\�VWDUWLQJ�6$3�URXWHU�LQ�WKHFXVWRPHU�QHWZRUN�DQG�VWDUWLQJ��IRU�H[DPSOH��6$3�*8,�IRU�DQ�6$31HW�²�5���)URQWHQGQRWH�FRQQHFWLRQ�

< 6$3�URXWHU6$3�URXWHU�LV�VWDUWHG�DQG�VWRSSHG�RQFH�D�GD\�WR�HQVXUH�WKHUH�LV�QR�RSHQ�FRQQHFWLRQV�

< 5HPRWH�FRQQHFWLRQV)RU�UHPRWH�XVHUV��GHGLFDWHG�,3�DGGUHVVHV�DUH�PDLQWDLQHG��7KHVH�DGGUHVVHV�PXVW�DOVR�EHPDLQWDLQHG�LQ�WKH�6$352877$%�WR�PDNH�VXUH�WKDW�XQDXWKRUL]HG�XVHUV�GR�QRW�ORJ�RQ�WR5���

5ROHV�DQG�5HVSRQVLELOLWLHV

7DVN 5ROH

'HILQLQJ�DQG�PDLQWDLQLQJ�6$352877$% 6\VWHP�DGPLQLVWUDWRU

0RQLWRULQJ�RSHQ�FRQQHFWLRQV 2SHUDWRU

6KXWWLQJ�GRZQ�UHVWDUWLQJ�6$3�URXWHU�GDLO\ 2SHUDWRU

5HYLHZLQJ�VHFXULW\�VWUDWHJ\ ,7�PDQDJHU

&KDQJLQJ�V\VWHP�SDVVZRUGV 6\VWHP�DGPLQLVWUDWRU

$XGLWLQJ�5HTXLUHPHQWV

,Q�5���WKHUH�DUH�VHYHUDO�DUHDV�UHODWHG�WR�DXGLWLQJ�< 3URFHVV�FRQWUROV< &KDQJH�PDQDJHPHQW< $XWKRUL]DWLRQ�LPSOHPHQWDWLRQ< 81,;< 'DWDEDVH

<RXU�VLWH�PD\�KDYH�DGGLWLRQDO�DXGLWLQJ�UHTXLUHPHQWV��1XPHURXV�FRPSDQLHV�KDYHLPSOHPHQWHG�H[FHOOHQW�DXGLWLQJ�SURFHGXUHV�EDVHG�RQ�VWDQGDUG�6$3�WRROV�DQG�FXVWRPHU�EXLOWWRROV��$PHULFDV·�6$3�8VHUV·�*URXS��$68*��,QWHUQDO�&RQWUROV�DQG�6HFXULW\�RIIHUV�WKH�EHVWLQIRUPDWLRQ�RQ�KRZ�RWKHU�FRPSDQLHV�KDYH�KDQGOHG�DXGLWLQJ�LQ�5����)RU�PRUH�LQIRUPDWLRQ�RQ�$68*�VHH�KWWS���ZZZ�DVXJ�FRP���)RU�PRUH�LQIRUPDWLRQ�RQ�DXGLWLQJ�VHH�FKDSWHU�����6$36HFXULW\�$XGLW�DQG�/RJJLQJ�

Page 49: Authorizations Made Easy

2–1

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3

&RQWHQWV

Overview ..................................................................................................................2–2

ASAP Roadmap.......................................................................................................2–2

Knowledge Corner ..................................................................................................2–5

Questions and Answers Database (Q&Adb) ........................................................2–6

Authorization List....................................................................................................2–6

��

Page 50: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

Overview

Authorizations Made Easy2–2

2YHUYLHZ

$FFHOHUDWHG6$3��$6$3��LV�6$3·V�FRPSUHKHQVLYH�LPSOHPHQWDWLRQ�VROXWLRQ�WR�VWUHDPOLQH�5��SURMHFWV��$6$3�LQWHJUDWHV�WKUHH�FRPSRQHQWV��WKH�$6$3�5RDGPDS��7RROV��DQG�5���6HUYLFH�DQG7UDLQLQJ��ZKLFK�ZRUN�LQ�FRQMXQFWLRQ�WR�VXSSRUW�WKH�UDSLG�DQG�HIILFLHQW�LPSOHPHQWDWLRQ�RIWKH�5���6\VWHP�< $FFHOHUDWHG6$3�5RDGPDS�GHOLYHUV�D�SURFHVV�RULHQWHG��FOHDU�DQG�FRQFLVH�SURMHFW�SODQ�WR

SURYLGH�VWHS�E\�VWHS�GLUHFWLRQ�WKURXJKRXW�\RXU�LPSOHPHQWDWLRQ�RI�5���< 7RROV�LQFOXGHV�$6$3�VSHFLILF�WRROV�WR�VXSSRUW�SURMHFW�PDQDJHPHQW��TXHVWLRQQDLUHV�IRU

WKH�EXVLQHVV�SURFHVV�FRQVXOWDQWV�DQG�QXPHURXV�WHFKQLFDO�JXLGHERRNV�DQG�FKHFNOLVWV�< 5���6HUYLFHV�DQG�7UDLQLQJ�LQFOXGHV�DOO�FRQVXOWLQJ��WUDLQLQJ��DQG�VXSSRUW�VHUYLFHV��IRU

H[DPSOH��KRWOLQH��(DUO\:DWFK��UHPRWH�XSJUDGHV�RU�DUFKLYLQJ��HWF����7KHVH�SURGXFWV�KHOSWR�VWDQGDUGL]H�FHUWDLQ�WDVNV�WR�SHUIRUP�WKHP�DV�TXLFNO\�DV�SRVVLEOH�

,Q�UHVSHFW�WR�DXWKRUL]DWLRQV��$6$3�GHVFULEHV�WKH�SURFHVV�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�FRQFHSW�:KLOH�WKLV�JXLGHERRN�KHOSV�\RX�LQ�WKH�WHFKQLFDO�LPSOHPHQWDWLRQ�RI�DXWKRUL]DWLRQV�$6$3GHVFULEHV�WKH�VHWXS�RI�DQ�DXWKRUL]DWLRQ�FRQFHSW�IURP�D�PHWKRGLFDO�DQG�RUJDQL]DWLRQDO�YLHZSRLQW��%\�IROORZLQJ�WKH�VWHSV�RI�$6$3�5RDGPDS��\RX�FDQ�HVWDEOLVK�\RXU�DXWKRUL]DWLRQFRQFHSW�ZLWK�D�SURYHQ�LPSOHPHQWDWLRQ�SURFHVV��7KH�.QRZOHGJH�&RUQHU�SURYLGHV�\RX�ZLWKWRROV�WKDW�KHOS�\RX�WR�DFFHOHUDWH�WKH�DXWKRUL]DWLRQ�LPSOHPHQWDWLRQ�

,Q�WKLV�FKDSWHU��ZH�EULHIO\�GLVFXVV�KRZ�WR�ZRUN�ZLWK�$6$3�DQG�ZKDW�LW�FRQWDLQV�LQ�UHJDUGVWR�DXWKRUL]DWLRQV��:H�H[SODLQ�KRZ�WR�DFFHVV�WKH�$6$3�FRPSRQHQWV�FRQWDLQLQJDXWKRUL]DWLRQ�UHODWHG�UHVRXUFHV�UDWKHU�WKDQ�GLVFXVVLQJ�WKH�FRQWHQWV�WKHPVHOYHV�

$6$3�5RDGPDS

7KH�$6$3�5RDGPDS�VWUXFWXUH�LV�GLYLGHG�LQWR�GLIIHUHQW�OHYHOV�< 3KDVH< :RUN�SDFNDJH< $FWLYLW\< 7DVN

2Q�WKH�KLJKHVW�OHYHO��WKH�$6$3�5RDGPDS�FRQVLVWV�RI�ILYH�SKDVHV��DV�IROORZV�

Page 51: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

ASAP Roadmap

Release 4.6A/B2–3

�� 3URMHFW�3UHSDUDWLRQ,Q�WKLV�SKDVH��\RX�PDNH�VXUH�DOO�GHFLVLRQ�PDNHUV�DUH�RQ�ERDUG�IRU�\RXU�5��LPSOHPHQWDWLRQ�DQG�JDWKHU�\RXU�LQWHUQDO�DQG�H[WHUQDO�LPSOHPHQWDWLRQ�WHDP�

�� %XVLQHVV�%OXHSULQW&UHDWH�WKH�%XVLQHVV�%OXHSULQW�GRFXPHQWLQJ�\RXU�FRPSDQ\·V�EXVLQHVV�UHTXLUHPHQWV��7KH%XVLQHVV�%OXHSULQW�LV�D�YLVXDO�PRGHO�RI�\RXU�EXVLQHVV·�IXWXUH�VWDWH�DIWHU�\RX·YHLPSOHPHQWHG�WKH�5���6\VWHP��,W�DOORZV�\RXU�SURMHFW�WHDP�WR�FOHDUO\�GHILQH�\RXU�VFRSH�DQG�RQO\�IRFXV�RQ�WKH�5���SURFHVVHV�QHHGHG�WR�UXQ�\RXU�EXVLQHVV�

�� 5HDOL]DWLRQ,Q�WKLV�SKDVH��\RXU�LPSOHPHQWDWLRQ�WHDP�FRQILJXUHV�DQG�ILQH�WXQHV�WKH�5���6\VWHP�

�� )LQDO�3UHSDUDWLRQ7HVW�DOO�LQWHUIDFHV��WUDLQ�DOO�HQG�XVHUV��DQG�PLJUDWH�\RXU�EXVLQHVV�GDWD�WR�\RXU�5��6\VWHP�

�� *R�/LYH��6XSSRUW,Q�WKLV�SKDVH��JR�OLYH�ZLWK�5����<RX�HVWDEOLVK�SURFHGXUHV�DQG�PHDVXUHPHQWV�WR�UHYLHZWKH�EHQHILWV�RI�\RXU�5���LQYHVWPHQW�RQ�DQ�RQJRLQJ�EDVLV��6$3�VXSSRUW�DQG�VHUYLFHVDVVXUH�WKDW�\RXU�V\VWHP�FRQWLQXHV�WR�UXQ�VPRRWKO\��FOHDQO\��DQG�HIILFLHQWO\�

8VHU�DQG�DXWKRUL]DWLRQ�PDQDJHPHQW�LV�FRYHUHG�LQ�WKH�5HDOL]DWLRQ�SKDVH�RI�WKH�$6$35RDGPDS��,Q�WKH�ZRUN�SDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW��\RX�ILQG�D�GHVFULSWLRQ�RI�WKHPHWKRGRORJ\�WR�VHW�XS�DQ�DXWKRUL]DWLRQV�FRQFHSW��)ROORZ�WKH�VWHSV�EHORZ�

User and authorizationmanagement is coveredin phase 3, Realization

Page 52: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

ASAP Roadmap

Authorizations Made Easy2–4

$XWKRUL]DWLRQV�LQ�WKH�5RDGPDS�6WUXFWXUH

�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�

�� 2Q�WKH�5RDGPDS�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH,PSOHPHQWDWLRQ�5RDGPDS�→��5HDOL]DWLRQ�→��(VWDEOLVK$XWKRUL]DWLRQ�&RQFHSW�

�� 2Q�WKH�ULJKW�VLGH��DQ�H[SODQDWLRQ�RIWKH�FRQWHQWV�DSSHDUV�IRU�WKH�QRGHVHOHFWHG�RQ�WKH�OHIW�

1RWH��'XH�WR�VWUXFWXUDO�GLIIHUHQFHV�LQ�WKH�$6$3�URDGPDS�EHWZHHQ�$6$3�5HOHDVH����$�DQG����%��WKHQXPEHU�RI�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�LV�HLWKHU������LQ�$6$3�5HOHDVH����$�RU������LQ$6$3�5HOHDVH����%�

7KH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�FRQWDLQV�WKUHH�DFWLYLWLHV��ZKLFK�DUH�

�� &UHDWH�$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ

�� ,PSOHPHQW�$XWKRUL]DWLRQ�&RQFHSW

�� 9DOLGDWH�$XWKRUL]DWLRQ�&RQFHSW

7R�DFFHVV�WKH�DFWLYLWLHV�EHORQJLQJ�WR�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�IROORZ�WKH�VWHSVEHORZ�

�� &KRRVH�WKH�ILUVW�DFWLYLW\��&UHDWH$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ��WR�JHWDQ�RYHUYLHZ�DERXW�WKH�WDVNV�WKLVDFWLYLW\�FRQWDLQV�

2

3

1

Page 53: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

Knowledge Corner

Release 4.6A/B2–5

�� :RUN�\RXU�ZD\�WKURXJK�WKHGLIIHUHQW�WDVNV�

�� :KHQ�\RX�ILQLVK�WKHVH�WDVNV�FRQWLQXH�ZLWK�WKH�QH[W�DFWLYLW\�DQGLWV�WDVNV�

.QRZOHGJH�&RUQHU

7KH�.QRZOHGJH�&RUQHU��.&��LV�D�FROOHFWLRQ�RI�UHVRXUFHV�WKDW�KHOSV�\RX�WR�DFFHOHUDWH�WKH�5��LPSOHPHQWDWLRQ��,Q�RUGHU�WR�DFFHVV�DOO�DYDLODEOH�DXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROV�LQ�WKH�.QRZOHGJH&RUQHU��IROORZ�WKH�VWHSV�EHORZ�

�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�

�� 2Q�WKH�.&�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH�6$33URGXFWV�→��&URVV�$SSOLFDWLRQ�→$XWKRUL]DWLRQV�

�� 7KH�XSSHU�ULJKW�WLOH�VKRZV�DQH[SODQDWLRQ�RI�WKH�FRQWHQWV�IURP�WKHOHIW�

�� 7KH�ORZHU�ULJKW�WLOH�VKRZV�DOODXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROVDYDLODEOH�LQ�WKH�.&�

2

3

2

4

Page 54: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

Questions and Answers Database (Q&Adb)

Authorizations Made Easy2–6

4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�

:KDW�,V�WKH�4$GE"

7KH�4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE��LV�D�WRRO�WKDW�KHOSV�\RX�WR�DQDO\]H�DQGGHWHUPLQH�WKH�VFDOH�DQG�VFRSH�RI�\RXU�V\VWHP�LPSOHPHQWDWLRQ�GXULQJ�WKH�%XVLQHVV�%OXHSULQWSKDVH�RI�DQ�$6$3�LPSOHPHQWDWLRQ�SURMHFW��,Q�WKH�4$GE��DOO�SURFHVVHV�WKDW�FDQ�EHLPSOHPHQWHG�LQ�WKH�5���6\VWHP�DUH�GLVSOD\HG�LQ�D�WUHH�FDOOHG�WKH�UHIHUHQFH�VWUXFWXUH��:KLOHGHILQLQJ�WKH�%XVLQHVV�%OXHSULQW��\RX�DUH�VHWWLQJ�WKH�EXVLQHVV�SURFHVVHV�LQ�VFRSH�WKDW�\RX�DLPWR�LPSOHPHQW�ZLWK�WKH�5���6\VWHP�

$V�RI�$6$3�5HOHDVH����%��\RX�FDQ�FUHDWH�XVHU�UROHV�LQ�WKH�4$GE�DQG�DVVLJQ�WKH�SURFHVVHVWR�EH�LPSOHPHQWHG�WR�WKHVH�UROHV��7KLV�LQIRUPDWLRQ�LV�ODWHU�SDVVHG�WR�WKH�$XWKRUL]DWLRQ�/LVWZKHUH�\RX�FDQ�FRPSOHWH�WKH�XVHU�UROH�GHILQLWLRQ�

+RZ�WR�:RUN�ZLWK�WKH�4$GE

)RU�GHWDLOV�RQ�KRZ�WR�FUHDWH�DQG�PDLQWDLQ�XVHU�UROHV�ZLWKLQ�WKH�4$GE��VHH�WKH�4$GERQOLQH�KHOS�

+RZ�WR�*HQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE

,Q�RUGHU�WR�UHILQH�WKH�XVHU�UROHV�WKDW�\RX�KDYH�GHILQHG�LQ�WKH�4$GE��\RX�FDQ�JHQHUDWH�WKH$XWKRUL]DWLRQ�/LVW��'XULQJ�WKH�JHQHUDWLRQ�RI�WKH�$XWKRUL]DWLRQ�/LVW��ERWK�WKH�SURFHVVHV�VHW�LQVFRSH�DQG�WKH�GHILQHG�XVHU�UROHV�DUH�WUDQVIHUUHG�WR�WKH�$XWKRUL]DWLRQ�/LVW��)RU�GHWDLOV�RQKRZ�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE��VHH�WKH�4$GE�RQOLQH�KHOS�

$XWKRUL]DWLRQ�/LVW

:KDW�,V�WKH�$XWKRUL]DWLRQ�/LVW"

7KH�$XWKRUL]DWLRQ�/LVW�LV�DQ�([FHO�ZRUNVKHHW�WKDW�KHOSV�\RX�WR�PRGHO�\RXU�XVHU�UROHV�SULRUWR�WKH�LPSOHPHQWDWLRQ�LQ�WKH�5���6\VWHP��8VLQJ�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FDQ�GHVLJQ�XVHUUROHV�LQ�DQ�HDUO\�V\VWHP�LPSOHPHQWDWLRQ�SKDVH�HYHQ�ZLWKRXW�KDYLQJ�LQVWDOOHG�5���

,Q�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FUHDWH�XVHU�UROHV�DQG�GHILQH�WKH�WUDQVDFWLRQV�DVVRFLDWHG�ZLWKWKHVH�UROHV��7R�PRGHO�WKH�XVHU�UROHV��WKH�$XWKRUL]DWLRQ�/LVW�SURYLGHV�\RX�WZR�GLIIHUHQWYLHZV�< 3URFHVV�YLHZ

7KH�SURFHVV�YLHZ��5ROHV�'HVLJQ���4$GE�VFRSH�WDE��LV�JHQHUDWHG�IURP�WKH�4$GE�DQGFRQWDLQV�WKH�SURFHVVHV�WKDW�KDYH�EHHQ�VHW�LQ�VFRSH�GXULQJ�WKH�%XVLQHVV�%OXHSULQW�SKDVH�$OO�SURFHVVHV�DUH�GLVSOD\HG�LQ�WKH�VDPH�KLHUDUFK\�DV�LQ�WKH�UHIHUHQFH�VWUXFWXUH�RI�WKH4$GE��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WKH�SURFHVVHV�WR�LQFOXGH�WKHP�LQ�WKHXVHU�UROHV�

Page 55: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

Authorization List

Release 4.6A/B2–7

< 0HQX�YLHZ

,Q�WKH�PHQX�YLHZ��5ROHV�'HVLJQ�¥�6$3�PHQX�WDE���DOO�WUDQVDFWLRQV�LQ�WKH�VWDQGDUG�6$3PHQX�DUH�GLVSOD\HG��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WUDQVDFWLRQV�IURP�WKH�6$3PHQX�WR�LQFOXGH�WKHP�LQ�\RXU�XVHU�UROHV�

$IWHU�FRPSOHWLQJ�WKH�PRGHOLQJ�RI�XVHU�UROHV��\RX�FDQ�JHQHUDWH�DQ�RYHUYLHZ�RI�DOOWUDQVDFWLRQV�LQFOXGHG�LQ�HDFK�XVHU�UROH�

+RZ�WR�:RUN�ZLWK�WKH�$XWKRUL]DWLRQ�/LVW

7R�XVH�WKH�$XWKRUL]DWLRQ�/LVW�IRU�WKH�GHVLJQ�DQG�LPSOHPHQWDWLRQ�RI�\RXU�DXWKRUL]DWLRQFRQFHSW��IROORZ�WKH�VWHSV�EHORZ�

�� *HQHUDWH�DXWKRUL]DWLRQ�OLVW�IURP�WKH�4$GE

�� 'HILQH�XVHU�UROHV

�� *HQHUDWH�XVHU�UROHV�RYHUYLHZ

�� %XLOG�XVHU�UROHV

*HQHUDWH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE

7R�ZRUN�ZLWK�SURFHVV�YLHZ��\RX�QHHG�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE�3URFHHG�DV�GHVFULEHG�LQ�WKH�4$GE�RQOLQH�KHOS�

(YHQ�LI�\RX�GR�QRW�ZRUN�ZLWK�WKH�4$GE��\RX�FDQ�XVH�WKH�$XWKRUL]DWLRQ�/LVW��7KH�WHPSODWHFDQ�EH�IRXQG�LQ�WKH�$6$3�.QRZOHGJH�&RUQHU��+RZHYHU��WKH�SURFHVV�YLHZ�ZLOO�EH�HPSW\��WKXV\RX�FDQ�GHILQH�\RXU�XVHU�UROHV�RQO\�YLD�WKH�PHQX�YLHZ�

Page 56: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

Authorization List

Authorizations Made Easy2–8

'HILQH�8VHU�5ROHV

7R�GHILQH�D�XVHU�UROH��\RX�QHHG�WR�FUHDWH�D�XVHU�UROH�DQG�DVVLJQ�SURFHVVHV�RU�WUDQVDFWLRQV�WR�WKDW�XVHU�UROH�

�� 2SHQ�WKH�$XWKRUL]DWLRQ�/LVW�

�� (QWHU�%XVLQHVV�$UHD�DQG�5ROH1DPH�IRU�WKH�XVHU�UROH�WKDW\RX�ZDQW�WR�FUHDWH�

�� 0DUN�WKH�GHVLUHG�WUDQVDFWLRQV�

&KRRVH�&OLFN�KHUH�IRU�LQVWUXFWLRQVWR�JHW�DQ�H[SODQDWLRQ�RQ�WKHIXQFWLRQDOLW\�RI�WKH�$XWKRUL]DWLRQ/LVW�

7KH�FRPSOHWH�IXQFWLRQDOLW\�RI�WKH$XWKRUL]DWLRQ�/LVW�LV�GHVFULEHG�LQWKH�KHOS�ZLQGRZ�VKRZQ�WR�WKHULJKW�

2

3

Tip

Page 57: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

Authorization List

Release 4.6A/B2–9

*HQHUDWH�8VHU�5ROHV�2YHUYLHZ

7R�JHQHUDWH�WKH�XVHU�UROHV�RYHUYLHZ�IURP�WKH�$XWKRUL]DWLRQ�/LVW�

�� 6HOHFW�WKH�7�&RGHV�SHU�5ROH�WDE�

�� &KRRVH�*HQHUDWH�2YHUYLHZ�WRFUHDWH�IRU�HDFK�XVHU�UROH�D�OLVWRI�WUDQVDFWLRQV�DVVLJQHG�WRWKDW�UROH�

�� )RU�DOO�XVHU�UROHV��WKH�VHOHFWHGWUDQVDFWLRQV�DUH�VXPPDUL]HGLQ�WKH�$XWKRUL]DWLRQ�/LVW�

(YHU\�WLPH�\RX�PDNH�FKDQJHV�WR�WKH�UROHV�RU�FUHDWH�QHZ�UROHV�WKH�7�&RGHV�SHU�5ROHRYHUYLHZ�QHHGV�WR�EH�UHJHQHUDWHG�

%XLOG�8VHU�5ROHV

8VLQJ�WKH�3*��FUHDWH�DOO�WKH�VLQJOH�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�UHTXLUHG�WR�LPSOHPHQW�WKHXVHU�UROHV�GHILQHG�LQ�WKH�$XWKRUL]DWLRQ�/LVW�

1

2

Page 58: Authorizations Made Easy

Chapter 2: Authorizations and ASAP

Authorization List

Authorizations Made Easy2–10

Page 59: Authorizations Made Easy

3–1

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH

*HQHUDWRU

&RQWHQWV

Overview ..................................................................................................................3–2

Confirming that the Profile Generator Is Active ..................................................3–2

Loading the USOBX_C and USOBT_C tables ......................................................3–4

Getting Support from the SAPNet – R/3 Frontend Notes....................................3–7

��

Page 60: Authorizations Made Easy

Chapter 3: Setting Up the Profile Generator

Overview

Authorizations Made Easy3–2

2YHUYLHZ

�8VLQJ�WKH�3URILOH�*HQHUDWRU��3*��LQ�5HOHDVH����[�PDNHV�VHQVH�IRU�QHZ�FXVWRPHUV�MXVWVWDUWLQJ�WKHLU�5���SURMHFW�DQG�FXUUHQW�FXVWRPHUV�ZLWK�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�LQ�DQHDUOLHU�5���UHOHDVH��0DLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68���DUH�QR�ORQJHU�UHTXLUHG��DQGFXVWRPHUV�ZKR�KDYH�SUHYLRXVO\�EHHQ�XVLQJ�WKLV�PHWKRG�VKRXOG�IDPLOLDUL]H�WKHPVHOYHV�ZLWKWKH�3*��,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWKRXW�WKH�3*��6$3�RIIHUV�\RX�DZD\�WR�PLJUDWH�WKHVH�SURILOHV�WR�WKH�3*�

)RU�LQIRUPDWLRQ�RQ�XSJUDGLQJ�WR�5HOHDVH�����IURP�D�SUHYLRXV�UHOHDVH��VHH�FKDSWHU����8SJUDGH�

6HWWLQJ�XS�WKH�3*�LQ����[�FRQVLVWV�RI�WZR�VWHSV�

�� &RQILUPLQJ�WKDW�WKH�3*�LV�DFWLYH�

�� /RDGLQJ�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��

&RQILUPLQJ�WKDW�WKH�3URILOH�*HQHUDWRU�,V�$FWLYH

:LWK�5���5HOHDVH������WKH�3*�LV�DOUHDG\�DFWLYDWHG��<RX�GR�QRW�KDYH�WR�VHW�WKH�V\VWHPSDUDPHWHU�LQ�WKH�5���LQVWDQFH�SURILOH�LI�\RX�KDYH�LQVWDOOHG�WKH�5���5HOHDVH�����DV�D�QHZV\VWHP��7KH�GHIDXOW�YDOXH�LV�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<�

&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU

,I�\RX�DUH�QRW�VXUH�ZKHWKHU�WKH�3*�LV�DFWLYDWHG��\RX�FDQ�FKHFN�WKH�LQVWDQFH�SURILOHSDUDPHWHU��7KH�IROORZLQJ�SURFHGXUH�VKRZV�\RX�KRZ�WR�FKHFN�LI�\RXU�SURILOH�SDUDPHWHU�LV�VHWFRUUHFWO\�DQG�DFWLYH��7R�FKHFN�LI�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�LV�VHW�FRUUHFWO\��UXQ�WKH�UHSRUW563$5$0�DV�VKRZ�EHORZ�

Page 61: Authorizations Made Easy

Chapter 3: Setting Up the Profile Generator

Confirming that the Profile Generator Is Active

Release 4.6A/B3–3

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�SA38�DQG�FKRRVH�(QWHU��RU�FKRRVH 6\VWHP�→�6HUYLFHV�→�5HSRUWLQJ��

�� (QWHU�RSPARAM�LQ�WKH�3URJUDPILHOG�

�� &KRRVH�([HFXWH�

$�OLVW�RI�SDUDPHWHU�QDPHV�DSSHDUV�ZLWK�FRUUHVSRQGLQJ�XVHU�GHILQHG�YDOXHV��7KH�SDUDPHWHUQDPHV�DUH�SURYLGHG�LQ�YDULDEOH�IRUP��$W�UXQWLPH��WKHVH�YDULDEOHV�DUH�UHSODFHG�ZLWK�DFWXDOYDOXHV��8VHU�GHILQHG�YDOXHV�DUH�WKH�DFWXDO�YDOXHV�RI�WKH�LQGLYLGXDO�SDUDPHWHUV�

�� ,I�DFWLYH��WKH�SURILOH�SDUDPHWHUIRU�WKH�3*�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�GLVSOD\HG�DV�D�<�LQWKH�WKLUG�FROXPQ�

8VH�WKH� �LFRQ�WR�VHDUFK�IRU�WKH�HQWU\�auth/no_check_in_some_cases�LQ�WKH�OLVW�LI�\RXGR�QRW�VHH�LW�ULJKW�DZD\�

,I�WKH�YDOXH�<�IRU�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�QRWGLVSOD\HG��\RX�PXVW�ILUVW�FKDQJH�WKH�LQVWDQFH�SURILOH�DQG�WKHQ�UHERRW�WKH�5���LQVWDQFH�)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�GR�WKLV��VHH�FKDSWHU�����8SJUDGH�

2

3

4

Tip

Page 62: Authorizations Made Easy

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Authorizations Made Easy3–4

/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV

/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV�LV�DFFRPSOLVKHG�LQ�WZR�VWHSV��� ,QLWLDO�FRS\LQJ�RI�6$3�GHIDXOWV�LQWR�WKH�FXVWRPHU�WDEOHV�� 7UDQVSRUWLQJ�WKH�GHIDXOWV�

,QLWLDO�&RS\LQJ�RI�6$3�'HIDXOWV�LQWR�WKH�&XVWRPHU�7DEOHV��68���

8VLQJ�WUDQVDFWLRQ�68����&RS\�LQLWLDO�GHIDXOWV���FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV��WDEOHV�862%;�DQG�862%7�7KLV�VWHS�LPSRUWV�WKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWV�IRU�WKH�DXWKRUL]DWLRQ�REMHFWV�ZLWKLQ�D�WUDQVDFWLRQ�DQGWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�3*�LQWR�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&��:H�GLVFXVV�KRZ�WRHGLW�WKHVH�YDOXHV�XVLQJ�WUDQVDFWLRQ�68���LQ�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SPRO�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�WUHH��FKRRVH�7RROV�→�$FFHOHUDWHG6$3�→�&XVWRPL]LQJ�→�(GLW�3URMHFW��

�� &KRRVH� �6$3�5HIHUHQFH�,0*�

�� ,Q�WKH�,0*��RSHQ�%DVLV�&RPSRQHQWV→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUVDQG�$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ3URILOH�*HQHUDWRU�DQG�FKRRVH� �QH[WWR�:RUN�RQ�6$3�&KHFN�,QGLFDWRUV�DQG)LHOG�9DOXHV�

7R�UHDFK�WKH�3URILOH�*HQHUDWRU��8SJUDGHDQG�)LUVW�,QVWDOODWLRQ�VFUHHQ�\RX�PD\DOWHUQDWLYHO\�XVH�WUDQVDFWLRQ�SU25�

3

Page 63: Authorizations Made Easy

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Release 4.6A/B3–5

�� 2Q�WKH�QH[W�VFUHHQ�VHOHFW�&RS\�6$3�WHVW�VWDWXVHV�DQG�ILHOG�YDOXHV��WKLV�WUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&RS\�6$3�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV��

�� &KRRVH� �QH[W�WR����,QLWLDOO\�ILOO�WKHFXVWRPHU�WDEOHV��LI�\RX�KDYH�QRWSUHYLRXVO\�ZRUNHG�ZLWK�WKH�3*�RULI�\RX�ZDQW�WR�UHWUDQVIHU�DOO�6$3GHIDXOW�YDOXHV��7KLV�VWHS�PD\�WDNHVHYHUDO�PLQXWHV�

,I�\RX�KDYH�QRW�SUHYLRXVO\�ZRUNHGZLWK�WKH�3*�RU�\RX�ZDQW�WR�UHWUDQVIHUDOO�6$3�GHIDXOW�YDOXHV��XVH����,QLWLDOO\ILOO�WKH�FXVWRPHU�WDEOHV�IXQFWLRQ�XQGHU,QVWDOOLQJ�WKH�3URILOH�*HQHUDWRU�

,I�\RX�KDYH�DOUHDG\�ZRUNHG�ZLWK�WKH3*�DQG�ZDQW�WR�FRPSDUH�\RXU�GDWDZLWK�WKH�6$3�GHIDXOW�YDOXHV��VHHFKDSWHU�����8SJUDGH�

�� $�ZDUQLQJ�PHVVDJH�DSSHDUV�RQ�D�GLDORJ�ER[��5HDG�LW�FDUHIXOO\�DQG�FKRRVH� �

5

6

Page 64: Authorizations Made Easy

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Authorizations Made Easy3–6

7UDQVSRUWLQJ�WKH�'HIDXOWV

�� &KRRVH� �QH[W�WR����7UDQVSRUW�WKHFXVWRPHU�WDEOHV�WR�WUDQVSRUW�WKH�3*FXVWRPHU�WDEOHV��862%;B&�DQG862%7B&��

$W�WKLV�WLPH�SHUIRUP�RQO\�VWHSV��DQG����'R�QRW�UXQ�VWHSV��$�WKURXJK�'�\HW��6HH�FKDSWHU�����8SJUDGH�IRUPRUH�LQIRUPDWLRQ�

1RWH�WKDW�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��DUH�FRPSOHWHO\�WUDQVSRUWHG��$OOFKDQJHV�WR�DXWKRUL]DWLRQ�FKHFNV�WKDW�ZHUH�PDGH�LQ�WKLV�WUDQVDFWLRQ�RU�LQ�68���DUH�DOVRWUDQVSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��7KLV�VWHS�UHSODFHV�DOO�WKH�ILHOG�YDOXH�DQG�FKHFN�LQGLFDWRUVHWWLQJV�LQ�WKH�WDUJHW�V\VWHP�

1R�DFWLYLW\�JURXSV�RU�DXWKRUL]DWLRQ�SURILOHV�DUH�WUDQVSRUWHG�LQ�WKLV�VWHS��7R�WUDQVSRUW�QHZO\JHQHUDWHG�DFWLYLW\�JURXSV��XVH�WKH�DFWLYLW\�JURXS�WUDQVSRUW�FRQQHFWLRQ�

�� &KRRVH� �DIWHU�WKH�UHSRUW�LV�ILQLVKHG�

�� &KRRVH� �RQ�WKH�IROORZLQJ�VFUHHQ�WR�ILQLVK�WKH�SURFHGXUH�

7

Page 65: Authorizations Made Easy

Chapter 3: Setting Up the Profile Generator

Getting Support from the SAPNet – R/3 Frontend Notes

Release 4.6A/B3–7

*HWWLQJ�6XSSRUW�IURP�WKH�6$31HW�²�5���)URQWHQG�1RWHV

$�VPRRWK�VHFXULW\�LPSOHPHQWDWLRQ�RI�\RXU�SURMHFW�LV�LPSRUWDQW��7KH�WRS�SULRULWLHV�RI�WKH6$31HW�²�5���)URQWHQG�1RWHV��IRUPHUO\�266��DUH�WR�VXSSRUW�\RXU�ZRUN�DQG�VSHHG�XS�\RXULPSOHPHQWDWLRQ��7KH�6$31HW�²�5���)URQWHQG�QRWHV�DUH�DQ�HDV\�WR�XVH��GLUHFWFRPPXQLFDWLRQ�OLQN�WR�6$3�VR�\RX�FDQ�TXLFNO\�DQG�HIILFLHQWO\�REWDLQ�SUREOHP�VROYLQJLQIRUPDWLRQ��6$31HW�²�5���)URQWHQG�QRWHV�JLYHV�\RX�D�IDVWHU�UHVSRQVH�WLPH�E\�DOORZLQJ�\RXWR�E\SDVV�WKH�6$3�KHOS�GHVN�DQG�HQWHU�SUREOHPV�GLUHFWO\�LQWR�RXU�GDWDEDVH�

%\�HQWHULQJ�SUREOHPV�RU�LQTXLULHV�GLUHFWO\�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��\RX�FDQ�< 7DNH�DGYDQWDJH�RI�5���VHUYLFHV��UHJDUGOHVV�RI�WKH�DYDLODELOLW\�DQG�ZRUNORDG�RI�WKH

UHVSRQVLEOH�KHOS�GHVN�SHUVRQQHO< 4XLFNO\�UHSRUW�\RXU�SUREOHPV< 'LUHFWO\�VXEPLW�\RXU�SUREOHPV�WR�ILUVW�OHYHO�FXVWRPHU�VHUYLFH�IRU�SURFHVVLQJ

$FFHVVLQJ�WKH�(UURU�1RWHV�'DWDEDVH

6$31HW�²�5���)URQWHQG�QRWHV�DFWLYHO\�LQYROYHV�\RX�LQ�WKH�SUREOHP�VROYLQJ�SURFHVV�E\JLYLQJ�\RX�GLUHFW�DFFHVV�WR�6$3·V�LQWHUDFWLYH�(UURU�1RWHV�GDWDEDVH��7KLV�GDWDEDVH�FRQWDLQVHUURU�OLVWLQJV�DQG�VROXWLRQV�WR�FRPPRQ�V\VWHP�SUREOHPV��:LWK�WKH�6$31HW�²�5���)URQWHQGQRWHV��\RX�FDQ�YLHZ�WKHVH�VROXWLRQV�ZLWKRXW�VXEPLWWLQJ�D�SUREOHP�PHVVDJH�WR�ILUVW�OHYHOFXVWRPHU�VHUYLFH��'LUHFW�DFFHVV�WR�WKH�(UURU�1RWHV�GDWDEDVH��ZLWK�WKH�6$31HW�²�5��)URQWHQG�QRWHV��DOVR�SURYLGHV�KHOSIXO�WLSV�RQ�DYRLGLQJ�SRWHQWLDO�SUREOHPV�

1RZ�LV�D�JRRG�WLPH�WR�ORRN�DW�WKH�6$31HW�²�5���)URQWHQG�QRWHV�OLVWHG�LQ�DSSHQGL[�$�7KHVH�QRWHV�KHOS�\RX�SUHSDUH�IRU�IXUWKHU�5���VHFXULW\�VHWXS�WDVNV�

<RX�VKRXOG�DOVR�ORRN�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LI�DQ\�H[SHULHQFHV�RFFXUWKDW�DUH�QRW�FRYHUHG�E\�WKLV�JXLGHERRN�

7R�XVH�6$31HW�¥�5���)URQWHQG�QRWHV�

�� &RQWDFW�\RXU�V\VWHP�DGPLQLVWUDWRU�IRU�DQ\�IXUWKHU�LQIRUPDWLRQ�DERXW�WKH�6$31HW�²5���)URQWHQG�QRWHV��

�� )LQG�RXW�ZKR�DOUHDG\�KDV�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LQ�\RXUFRPSDQ\�

�� 0DNH�VXUH�\RX�KDYH�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��

�� /RJ�RQ�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�DQG�EURZVH�WKURXJK�WKH�6$31HW�²�5��)URQWHQG�QRWHV�LQ�DSSHQGL[�$�

Page 66: Authorizations Made Easy

Chapter 3: Setting Up the Profile Generator

Getting Support from the SAPNet – R/3 Frontend Notes

Authorizations Made Easy3–8

3ULQWLQJ�,PSRUWDQW�6$31HW�²�5���)URQWHQG�1RWHV

6LQFH�ZH�UHIHU�WR�FHUWDLQ�6$31HW�²�5���)URQWHQG�QRWHV�LQ�WKLV�JXLGHERRN��SOHDVH�OHDUQ�KRZWR�SULQW�D�QRWH�SURSHUO\��7KH�SULQW�IXQFWLRQ�LV�QRW�VXSSRUWHG�LQ�6$31HW�²�5���)URQWHQGQRWHV��VR�\RX�PXVW�ILUVW�GRZQORDG�WKH�QRWH�DQG�SULQW�LW�ORFDOO\��5HDG�QRWHV�������DQG������WR�IDPLOLDUL]H�\RXUVHOI�ZLWK�GRZQORDGLQJ�DQG�SULQWLQJ�WKH�QRWHV��%HIRUH�\RX�FRQWLQXH��SULQWRXW�WKH�QRWHV�LQ�DSSHQGL[�$�DQG�NHHS�WKHP�DV�KDQG\�UHIHUHQFH�WRROV�

$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�<RXU�5���6\VWHP

$GYDQFH�FRUUHFWLRQV�VKRXOG�EH�DSSOLHG�RQO\�ZLWK�WKH�DSSURYDO�RI�WKH�%DVLV�6\VWHP$GPLQLVWUDWRU�

7KH�5���6\VWHP�QHHGV�FHUWDLQ�FRUUHFWLRQV�WR�SHUIRUP�SURSHUO\��7R�DSSO\�WKHVH�FRUUHFWLRQV�LQDGYDQFH��UHIHU�WR�6$31HW�²�5���)URQWHQG�QRWH�������IRU�WKH�DYDLODELOLW\�RI�WKH�3*�KRWSDFNDJHV�IRU�5HOHDVHV����$�DQG����%�

Page 67: Authorizations Made Easy

4–1

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ

&RQWHQWV

Overview ..................................................................................................................4–2

System Users ..........................................................................................................4–2

User Groups ............................................................................................................4–5

Authorizations and Authorization Profiles...........................................................4–6

Mass Operations .....................................................................................................4–6

Creating a New User (Client-Specific)...................................................................4–7

Changing a User’s Password ..............................................................................4–10

User Information System .....................................................................................4–12

��

Page 68: Authorizations Made Easy

Chapter 4: User Administration

Overview

Authorizations Made Easy4–2

2YHUYLHZ

<RX�KDYH�WZR�RSWLRQV�WR�VHW�XS�\RXU�XVHU�DGPLQLVWUDWLRQ�< &HQWUDO�8VHU�$GPLQLVWUDWLRQ< &OLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ

,Q�WKLV�FKDSWHU��ZH�RQO\�GHVFULEH�WKH�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��,I�\RX�DUH�XVLQJ�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ��VHH�FKDSWHU�����6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�PRUHLQIRUPDWLRQ�

5���DOORZV�\RX�WR�GHILQH�DQG�PDLQWDLQ�XVHUV�DQG�XVHU�DXWKRUL]DWLRQV�E\�JLYLQJ�\RX�SUHFLVHFRQWURO�RYHU�XVHU�DFFHVV��7KH�GHILQLWLRQ�DQG�YDOLGDWLRQ�RI�DXWKRUL]DWLRQ�WHFKQRORJ\�LVLQWHJUDWHG�LQWR�WKH�6$3�GHYHORSPHQW�HQYLURQPHQW�DQG�LV�HDVLO\�DGGHG�WR�FXVWRPHUPRGXOHV�

$OWKRXJK�XVHU�DGPLQLVWUDWLRQ�LV�DQ�RQJRLQJ�SURFHVV��\RX�VKRXOG�QRW�DGPLQLVWHU�\RXU�XVHUVLQ�D�SURGXFWLYH�HQYLURQPHQW��3HUIRUP�XVHU�DGPLQLVWUDWLRQ�WDVNV�LQ�\RXU�'(9�V\VWHP��:KHQ\RX�WUDQVSRUW�WKH�DFWLYLW\�JURXSV��WKH�XVHUV�DUH�DOVR�WUDQVSRUWHG�WKURXJK�WKH�4$6�WR�\RXU35'�V\VWHP��ZKHQHYHU�XVHUV�DQG�DXWKRUL]DWLRQ�REMHFWV�DUH�< &UHDWHG< 'HOHWHG< &KDQJHG< 0RQLWRUHG

+RZHYHU��\RX�PLJKW�KDYH�GLIIHUHQW�XVHUV�LQ�WKH�'(9�DQG�4$6�V\VWHP�WKDW�\RX�GR�QRW�QHHGLQ�\RXU�35'�V\VWHP�ODWHU��IRU�H[DPSOH�D�GHYHORSHU���$Q�DGPLQLVWUDWRU·V�UROH�LQ�WKLV�SURFHVVYDULHV�GHSHQGLQJ�RQ�KRZ�XVHU�DGPLQLVWUDWLRQ�WDVNV�DUH�GHOHJDWHG�

(YHQ�LI�\RX�DUH�XVLQJ�WKH�+5�PRGXOH��XVHU�DGPLQLVWUDWLRQ�VWLOO�QHHGV�WR�EH�VHW�XS��EXWPDLQWHQDQFH�LQ�WKH�ORQJ�UXQ�LQFOXGHV�RWKHU�IDFHWV�

6\VWHP�8VHUV

,Q�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��XVHUV�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFK�FOLHQW�LQ\RXU�V\VWHP��$�XVHU�GHILQLWLRQ�KDV�PDQ\�RI�WKH�IROORZLQJ�FRPSRQHQWV�< %DVLF�XVHU�GDWD

� 1DPH� 3DVVZRUG� $GGUHVV� &RPSDQ\�LQIRUPDWLRQ

Page 69: Authorizations Made Easy

Chapter 4: User Administration

System Users

Release 4.6A/B4–3

< 8VHU�GHIDXOWV� /RJRQ�ODQJXDJH� 'HIDXOW�SULQWHU� 'DWH�DQG�GHFLPDO�IRUPDWV� 'HIDXOW�WLPH�]RQH

< 8VHU�SURILOH�LQIRUPDWLRQ� 3DUWV�RI�5���D�XVHU�FDQ�DFFHVV� 8VHU�JURXSV� $FWLYH�DQG�H[SLUDWLRQ�GDWHV�RI�D�XVHU·V�DFFRXQW

7KHUH�DUH�WZR�ZD\V�WR�FUHDWH�XVHUV��)LUVW��IURP�VFUDWFK��E\�GHILQLQJ�WKH�YDULRXV�XVHUFRPSRQHQWV��DQG�VHFRQG��E\�FRS\LQJ�DQ�H[LVWLQJ�XVHU��:KHQ�FRS\LQJ�DQ�H[LVWLQJ�XVHU��\RXPD\�DOVR�FRS\�WKH�GHIDXOWV��DGGUHVV��DQG�PHPRU\�SDUDPHWHU�VHWWLQJV�

([WHUQDO�5���8VHUV

([WHUQDO�XVHUV�LQFOXGH�WKRVH�FUHDWHG�IRU�:LQGRZV�17�DFWLYLWLHV��IRU�H[DPSOH�6$36,'!DGP��DGPLQLVWUDWRU��DQG�6$36HUYLFH��6$36,'!��DQG�GDWDEDVH�FRQQHFWLRQV�6$35���GDWDEDVH�DGPLQLVWUDWRU��DQG�64/�XVHUV��

,QWHUQDO�5���8VHUV

,QWHUQDO�XVHUV�DUH�FUHDWHG�DQG�PDLQWDLQHG�LQ�5����(DFK�XVHU�LV�DVVLJQHG�D�XVHU�W\SH�ZKLFKFRQWUROV�KRZ�WKH�XVHU�LQWHUDFWV�ZLWK�5���

,QWHUQDO�XVHU�W\SHV�LQFOXGH�< 'LDORJ< %DWFK�'DWD�&RPPXQLFDWLRQ��%'&�< %DFNJURXQG< &3,&

'LDORJ

7KH�GLDORJ�XVHU�W\SH�KDQGOHV�RQOLQH�WUDQVDFWLRQV�DQG�DSSOLHV�WR�PRVW�XVHUV�LQ�D�FRPSDQ\�'LDORJ�XVHUV�PD\�ORJ�RQ�DQG�LQWHUDFWLYHO\�ZRUN�ZLWK�5����7KHVH�XVHUV�DUH�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV�DQG�UHTXLUH�DXWKRUL]DWLRQ�SURILOHV�DQG�SDVVZRUGV��$OWKRXJK�LW�LV�QRWUHTXLUHG��GLDORJ�XVHUV�VKRXOG�EH�DVVLJQHG�WR�D�XVHU�JURXS�

%DWFK�'DWD�&RPPXQLFDWLRQ

7KH�EDWFK�GDWD�FRPPXQLFDWLRQ��%'&�RU�EDWFK�LQSXW��XVHU�W\SH�LV�XVHG�IRU�DXWKRUL]DWLRQFKHFNV�ZKHQ�SURFHVVLQJ�D�EDWFK�LQSXW�VHVVLRQ��7KHVH�XVHUV�FDQQRW�ORJ�RQ�RU�ZRUNLQWHUDFWLYHO\�DQG�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

%DFNJURXQG

7KH�EDFNJURXQG�XVHU�W\SH�UXQV�EDFNJURXQG�MREV��7KHVH�XVHUV�FDQQRW�ORJ�RQ�DQG�ZRUNLQWHUDFWLYHO\��7KH�DGPLQLVWUDWRU�FDQ�FUHDWH�EDFNJURXQG�XVHUV�ZLWK�WKH�QHFHVVDU\DXWKRUL]DWLRQV�WR�SHUIRUP�D�VHULHV�RI�WDVNV��7R�GHILQH�WKH�EDFNJURXQG�MREV��FKDQJH�WKH�XVHUILHOG�WR�WKH�EDFNJURXQG�XVHU�QDPH�\RX�FUHDWHG��$OO�DXWKRUL]DWLRQ�FKHFNV�JR�DJDLQVW�WKH

Page 70: Authorizations Made Easy

Chapter 4: User Administration

System Users

Authorizations Made Easy4–4

EDFNJURXQG�XVHU�UDWKHU�WKDQ�WKH�XVHU�FUHDWLQJ�WKH�MRE��$OWKRXJK�EDFNJURXQG�XVHUV�DUHXQDIIHFWHG�E\�SDVVZRUG�FRQWURO�SDUDPHWHUV��IRU�H[DPSOH�SDVVZRUG�H[SLUDWLRQV�RU�FKDUDFWHUOHQJWK���WKHVH�XVHUV�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

&3,&

7KH�&3,&�XVHU�LV�GHOLYHUHG�LQ�FOLHQW�����ZLWK�QR�DXWKRUL]DWLRQV�DQG�ORJV�RQ�XVLQJ�WKH�&3,&LQWHUIDFH��7KLV�LQWHUIDFH�GRHV�QRW�ZRUN�LQWHUDFWLYHO\�ZLWK�5����7KH�&3,&�XVHU�UHFHLYHV�UHWXUQFRGHV�IURP�H[WHUQDO�SURJUDPV�DQG�WKH�VWDWLVWLF�FROOHFWRUV��UHIHU�WR�6$31HW�²�5���)URQWHQGQRWH��������6$3&3,&�LV�QR�ORQJHU�UHTXLUHG�IRU�WKH�WUDQVDFWLRQ�60���

7KH�&3,&�XVHU�UHTXLUHV�DQ�DXWKRUL]DWLRQ�WR�SHUIRUP�WKH�QHFHVVDU\�DFWLYLWLHV�LQ�5���DQG�LVVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

6SHFLDO�5���8VHUV

6$3

,Q�FOLHQWV�����DQG������WKH�5���6\VWHP�LQFOXGHV�WKH�GHIDXOW�VXSHUXVHU�6$3 ��'XULQJLQVWDOODWLRQ��D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�IRU�6$3 ���+RZHYHU��6$3 �LV�SURJUDPPHG�LQ5���DQG�GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG��$IWHU�LQVWDOODWLRQ��RQFH�WKH�6$3 �XVHU�PDVWHUUHFRUG�EHFRPHV�DYDLODEOH��XVH�WKH�SDVVZRUG�06071992��,I�WKH�6$3 �XVHU�PDVWHU�UHFRUG�LVGHOHWHG�DQG�D�XVHU�ORJV�RQ�DJDLQ�DV�SAP*��ZLWK�WKH�LQLWLDO�SDVVZRUG�PASS��WKHQ�6$3 �LV�QRWVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�DQG�KDV�WKH�SDVVZRUG�PASS��ZKLFK�FDQQRW�EH�FKDQJHG�

'',&

7KH�'',&�XVHU�PDLQWDLQV�WKH�$%$3�'LFWLRQDU\�DQG�WKH�VRIWZDUH�ORJLVWLFV��$�'',&�XVHUPDVWHU�UHFRUG�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����ZKHQ�5���LV�LQVWDOOHG�DQG�KDVVWDQGDUG�SDVVZRUG�19920706��7KLV�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�WR�5���GXULQJ�D�QHZUHOHDVH�LQVWDOODWLRQ��3URWHFW�WKH�'',&�XVHU�IURP�XQDXWKRUL]HG�DFFHVV�E\�FKDQJLQJ�WKH�LQLWLDOSDVVZRUG�LQ�FOLHQWV�����DQG������7KLV�XVHU�LV�UHTXLUHG�IRU�FHUWDLQ�LQVWDOODWLRQ�DQG�VHWXSWDVNV��VR�LW�VKRXOG�QRW�EH�GHOHWHG�

(DUO\:DWFK

7KH�(DUO\:DWFK�XVHU�LV�RQO\�GHOLYHUHG�LQ�FOLHQW�����ZLWK�WKH�LQLWLDO�SDVVZRUG�SUPPORT�$FFHVV�LV�OLPLWHG�WR�PRQLWRULQJ�DQG�SHUIRUPDQFH�GDWD��7KH�(DUO\:DWFK�XVHU�LV�XVHG�E\6$3·V�(DUO\:DWFK�H[SHUWV��7KLV�XVHU�VKRXOG�QRW�EH�GHOHWHG��DQG�WKH�SDVVZRUG�VKRXOG�EHFKDQJHG��(DUO\:DWFK�VKRXOG�QRW�EH�XVHG�IRU�DQ\�SXUSRVH�RWKHU�WKDQ�(DUO\:DWFK�IXQFWLRQV�

Page 71: Authorizations Made Easy

Chapter 4: User Administration

User Groups

Release 4.6A/B4–5

&UHDWLQJ�8VHUV

,I�\RX�GR�QRW�XVH�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IXQFWLRQ��WKH�XVHU�PDVWHU�UHFRUGV�DQGDXWKRUL]DWLRQ�FRPSRQHQWV�DUH�FOLHQW�VSHFLILF�DQG�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFKV\VWHP�FOLHQW�

8VHUV�DUH�FUHDWHG�HLWKHU�IURP�VFUDWFK��XVLQJ�WUDQVDFWLRQ�68����RU�IURP�D�FRS\�RI�DQ�H[LVWLQJXVHU�E\�< 8VLQJ�WUDQVDFWLRQ�68��

< &UHDWLQJ�D�WHPSODWH�XVHU< &RS\LQJ�LW�WR�RWKHU�VLPLODU�XVHUV< 0DQXDOO\�HQWHULQJ�HDFK�SDVVZRUG

7KH�KLHUDUFKLFDO�VHFXULW\�HIIHFW�RI�XVHU�JURXSV�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�GLVWULEXWH�XVHUPDLQWHQDQFH�WDVNV�DQG�PDLQWDLQ�KLJK�VHFXULW\��:LWKLQ�D�VSHFLILF�JURXS��VHFXULW\�WDVNV�FDQ�EHGLVWULEXWHG�LQ�VXFK�D�ZD\�WKDW�WKUHH�SHRSOH�DUH�UHTXLUHG�WR�FUHDWH�XVHUV�DQG�PDQDJH�DFWLYLW\JURXSV�DQG�DXWKRUL]DWLRQV��7KXV��XVHU�DQG�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�FDQ�RQO\�FRPSOHWHFHUWDLQ�SDUWV�RI�WKH�UHTXLUHG�WDVNV��7KLV�SURFHVV�HQVXUHV�WKDW�QR�RQH�SHUVRQ�FDQ�FLUFXPYHQW5��·V�DXWKRUL]DWLRQ�VFKHPH��,I�D�FRPSDQ\�KDV�D�FHQWUDOL]HG�RUJDQL]DWLRQDO�VWUXFWXUH��DOOPDLQWHQDQFH�WDVNV�PD\�QHHG�WR�EH�SHUIRUPHG�E\�D�VLQJOH�XVHU��WKH�VR�FDOOHG�VXSHUXVHU�

7R�DOORZ�XVHUV�WR�VHH�WKHLU�RZQ�XVHU�PDVWHU�UHFRUGV��XVH�WUDQVDFWLRQ�68��'�

)RU�VHFXULW\�UHDVRQV��WKH�UHVSRQVLELOLW\�IRU�WKH�IROORZLQJ�PDLQWHQDQFH�WDVNV�VKRXOG�EHGLVWULEXWHG�DPRQJ�WKUHH�GLIIHUHQW�DGPLQLVWUDWRUV��VHH�FKDSWHU���IRU�DGGLWLRQDOLQIRUPDWLRQ��

8VHU�*URXSV

,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��1RWH�WKDW�RQH�JURXSLV�VWLOO�WKH�SULPDU\�JURXS�IRU�WKH�DXWKRUL]DWLRQ�FKHFN��7KLV�LV�WKH�JURXS�WKDW�DSSHDUV�LQ�WKHWRS�ILHOG�RQ�WKH�/RJRQ�GDWD�WDE�LQ�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�FDWHJRU\�8VHU�JURXSFDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��WKXV�LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ��<RX�PD\�XVH�DQ\�QDPLQJ�FRQYHQWLRQ�

8VHU�JURXSV�HQDEOH�WKH�DGPLQLVWUDWRU�WR�SURYLGH�DSSOLFDWLRQ�PDQDJHUV�ZLWK�WKH�ULJKWVUHTXLUHG�WR�FRQWURO�WKHLU�XVHUV��7KXV��WKHVH�PDQDJHUV�FDQ�FRQWURO�DOO�XVHUV�LQ�WKHLU�XVHUJURXSV�DQG�XVHUV�QRW�\HW�DVVLJQHG�WR�D�XVHU�JURXS��+RZHYHU��DSSOLFDWLRQ�PDQDJHUV�FDQQRWFKDQJH�XVHUV�LQ�RWKHU�XVHU�JURXSV�

$OWKRXJK�D�XVHU�JURXS�DIILOLDWLRQ�LV�QRW�UHTXLUHG�ZKHQ�\RX�FUHDWH�XVHUV��WKLV�DIILOLDWLRQ�LVQHFHVVDU\�WR�GHOHJDWH�XVHU�PDLQWHQDQFH�WDVNV�WR�DSSOLFDWLRQ�PDQDJHUV�DQG�VWDII��/DWHU��ZHVKRZ�KRZ�WR�GLVWULEXWH�XVHU�DGPLQLVWUDWLRQ�WDVNV�WR�WKH�DSSURSULDWH�DSSOLFDWLRQ�SHUVRQQHO�

Page 72: Authorizations Made Easy

Chapter 4: User Administration

Authorizations and Authorization Profiles

Authorizations Made Easy4–6

8VHU�JURXSV�DUH�QRUPDOO\�EDVHG�RQ�WKH�UHTXLUHPHQWV�GLFWDWHG�E\�WKH�GLIIHUHQW�DSSOLFDWLRQJURXSV��7KH�QXPEHU�RI�XVHUV�LQ�HDFK�XVHU�JURXS�DOVR�LQIOXHQFHV�WKHVH�JURXSV��6LQFH�XVHUJURXSV�GLVWULEXWH�XVHU�DGPLQLVWUDWLYH�WDVNV��\RXU�XVHU�JURXSV�ZLOO�EH�EDVHG�RQ�WKH�DYDLODEOHRUJDQL]DWLRQDO�VXSSRUW�VWUXFWXUH��$�IHZ�WKLQJV�WR�UHPHPEHU�ZKHQ�ZRUNLQJ�ZLWK�XVHUJURXSV�DUH�WKDW�

< 8VHU�JURXSV�DUH�FUHDWHG�ZLWK�WUDQVDFWLRQ�68*5��7RROV�→�$GPLQLVWUDWLRQ�→�8VHU0DLQWHQDQFH�→�0DLQWDLQ�8VHUV�*URXSV��

< 8VHU�JURXSV�DIIHFW�QRWKLQJ�XQWLO�\RX�VHW�XS�\RXU�JURXS�DGPLQLVWUDWRUV�ZLWKLQ�D�XVHUJURXS�

< (DFK�XVHU�FDQ�EHORQJ�WR�PDQ\�XVHU�JURXSV�< 8VHU�JURXSV�FDQ�EH�PDLQWDLQHG�EHIRUH�WKH\�DUH�DVVLJQHG�WR�XVHUV�

$XWKRUL]DWLRQV�DQG�$XWKRUL]DWLRQ�3URILOHV

$XWKRUL]DWLRQ�SURILOHV�DOORZ�\RX�WR�RUJDQL]H�DFFHVV�SULYLOHJHV�E\�WDVN�RU�MRE�IXQFWLRQ�6SHFLILFDOO\��WKLV�SURILOH�FRQWDLQV�WKH�DFFHVV�SULYLOHJHV�QHHGHG�WR�SHUIRUP�SDUWLFXODU�MREV�VXFK�DV�GDWD�HQWU\�RU�DSSOLFDWLRQ�PDLQWHQDQFH��7R�DXWKRUL]H�D�XVHU�IRU�D�MRE��\RX�RQO\�QHHGWR�JLYH�WKH�XVHU�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOH��7KH�3URILOH�*HQHUDWRU��3*�VLPSOLILHV�WKH�WDVN�RI�VHWWLQJ�XS�DXWKRUL]DWLRQ�SURILOHV�

0DVV�2SHUDWLRQV

7KH�5���6\VWHP�SURYLGHV�VHYHUDO�XWLOLWLHV�WR�DGPLQLVWHU�DOO��RU�D�VHOHFWHG�VHW��RI�XVHUV�&KDQJHV�PDGH�IRU�RQH�XVHU�LQ�XVHU�DGPLQLVWUDWLRQ�FDQ�DOVR�EH�PDGH�IRU�D�ODUJH�QXPEHU�RIXVHUV�DOO�DW�RQFH��<RX�FDQ�FKDQJH�ORJRQ�GDWD��GHIDXOW�YDOXHV��SDUDPHWHUV��DFWLYLW\�JURXSV�DQG�SURILOHV�IRU�D�SDUWLFXODU�VHW�RI�XVHUV��IRU�H[DPSOH��DOO�XVHUV�RI�D�XVHU�JURXS��

7R�DFFHVV�WKH�PDVV�FKDQJHV�VFUHHQ��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QYLURQPHQW�→�0DVVFKDQJHV�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��E\�PDNLQJ�PDVV�FKDQJHV�LQ�WKH�FHQWUDOV\VWHP���WKH�SURILOHV�DQG�DFWLYLW\�JURXSV�DUH�GLVSOD\HG�DFFRUGLQJ�WR�WKH�UHOHYDQW�V\VWHP�

7KH�PDVV�FKDQJH�IXQFWLRQV�RQ�WKH�LQLWLDO�VFUHHQ�DIIHFW�WKH�XVHU�GDWD�RI�DOO�GLVSOD\HG�XVHUV�XQOHVV�\RX�KDYH�VHOHFWHG�VSHFLILF�XVHUV�

)RU�HYHU\�FKDQJH�RQ�WKH�$GGUHVV��/RJRQ�GDWD��DQG�'HIDXOW�YDOXHV�WDEV��\RX�PXVW�FKRRVH&KDQJH��7KLV�HQVXUHV�WKDW�\RXU�FKDQJHV��VXFK�DV�GHOHWLRQ�RI�ILHOG�FRQWHQWV��WDNH�HIIHFW�IRUWKH�FRUUHVSRQGLQJ�ILHOGV�

Page 73: Authorizations Made Easy

Chapter 4: User Administration

Creating a New User (Client-Specific)

Release 4.6A/B4–7

&UHDWLQJ�D�1HZ�8VHU��&OLHQW�6SHFLILF�

'R�QRW�FUHDWH�RU�FKDQJH�XVHUV�LQ�FOLHQWV�����RU������7R�FUHDWH�RWKHU�QHZ�FOLHQWV��PDNH�D�FRS\�RIFOLHQW������VWDQGDUG�6$3�FOLHQW��

�� /RJ�RQ�WR�WKH�6$3�FOLHQW�ZKHUH�\RX�ZLVK�WR�FUHDWH�D�QHZ�XVHU�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→8VHU�PDLQWHQDQFH�→�8VHUV��

�� ,Q�WKH�8VHU�ILHOG� HQWHU�WKH�QHZ�XVHUQDPH�

�� &KRRVH� �

�� (QWHU�WKH�UHTXLUHG�GDWD�LQWR�WKHILHOGV��<RX�FDQ�DOZD\V�FRPH�EDFNDQG�FKDQJH�WKH�GDWD�ODWHU�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

7KH�EXWWRQ�2WKHU�FRPPXQLFDWLRQ��OLQNV�\RX�WR�WKH�FHQWUDO�DGGUHVVDGPLQLVWUDWLRQ�IXQFWLRQDOLW\��7KLVIXQFWLRQDOLW\�LV�QRW�FRYHUHG�LQ�WKLVERRN�

3

4

5

6

Tip

Page 74: Authorizations Made Easy

Chapter 4: User Administration

Creating a New User (Client-Specific)

Authorizations Made Easy4–8

�� (QWHU�DQ�,QLWLDO�SDVVZRUG��IRUH[DPSOH��init)�ZKLFK�WKH�XVHUXVHV�IRU�WKH�ILUVW�ORJ�RQ��'XULQJ�WKDWILUVW�ORJRQ��WKH�XVHU�FKRRVHV�D�QHZSDVVZRUG�

�� 5HHQWHU�WKH�SDVVZRUG�WR�YHULI\�WKHVSHOOLQJ�LQ�WKH�ILHOG�5HSHDW�SDVVZRUG�

�� <RX�PD\�HGLW�RWKHU�/RJRQ�GDWDILHOGV��VXFK�DV�8VHU�JURXS�RU�8VHUW\SH�DV�QHHGHG��VHH�WKH�7HFK7DONEHORZ��

��� &KRRVH�WKH�'HIDXOWV�WDE�

/RJRQ�'DWD�)LHOG�'HILQLWLRQV

8VHU�JURXS�IRU�DXWKRUL]DWLRQ�FKHFN

$VVLJQLQJ�XVHUV�WR�JURXSV�DOORZV�WKH�XVHU�PDLQWHQDQFH�WDVN�WR�EH�GLVWULEXWHG�DPRQJ�VHYHUDOXVHU�DGPLQLVWUDWRUV��<RX�FDQ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV�

9DOLG�IURP�9DOLG�WR

7KHVH�ILHOGV�DUH�XVHIXO�LI�\RX�DUH�FUHDWLQJ�D�WHPSRUDU\�XVHU��VXFK�DV�D�FRQWUDFWRU��7RLPPHGLDWHO\�DFWLYDWH�WKH�XVHU��OHDYH�WKH�9DOLG�IURP�ILHOG�EODQN��)RU�D�XVHU�ZLWK�QR�DQWLFLSDWHGWHUPLQDWLRQ�GDWH��OHDYH�WKH�9DOLG�WR�ILHOG�EODQN��ZKLFK�DOORZV�LQGHILQLWH�DFFHVV�

$FFRXQWLQJ�QXPEHU

7KLV�ILHOG�LV�IRU�D�IUHHO\�VHOHFWDEOH�DFFRXQWLQJ�QDPH�RU�QXPEHU��,I�\RX�XVH�WKH�6$3�DFFRXQWLQJV\VWHP��WKH�XVHU·V�V\VWHP�XVDJH�LV�DVVLJQHG�WR�WKLV�DFFRXQW��7KH�DFFRXQWLQJ�QDPH�RU�QXPEHUPD\�EH�XQLTXH�WR�HDFK�XVHU�RU�FDQ�EH�VKDUHG�DPRQJ�JURXSV�RI�XVHUV�

&RVW�&HQWHU

8VH�WKLV�ILHOG�IRU�WKH�XVHU·V�FRVW�FHQWHU�QXPEHU�

'LDORJ

6HOHFW�WKLV�XVHU�W\SH�IRU�QRUPDO�GLDORJ�XVHUV�

%'&

:KHQ�\RX�SURFHVV�D�EDWFK�LQSXW�VHVVLRQ��VHOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�RQO\�XVHG�IRUWKH�DXWKRUL]DWLRQ�FKHFN�

87

9

10

Page 75: Authorizations Made Easy

Chapter 4: User Administration

Creating a New User (Client-Specific)

Release 4.6A/B4–9

%DFNJURXQG

6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�EDWFK�UXQV�

&3,&

6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�&3,�&�FDOOV�

��� <RX�PD\�HLWKHU�HQWHU�D�6WDUW0HQXRU�OHDYH�WKH�ILHOG�EODQN�

��� (QWHU�D�ODQJXDJH�FRGH�LQ�WKH�/RJRQODQJXDJH�ILHOG�

��� (QWHU�D�GHIDXOW�2XWSXW'HYLFH��WKHSULQWHU�RU�ILOH�WR�ZKLFK�WKH�XVHU�ZLOODXWRPDWLFDOO\�SULQW��

��� :H�UHFRPPHQG�VHOHFWLQJ�2XWSXWLPPHGLDWHO\�DQG�'HOHWH�DIWHU�RXWSXW�

2XWSXW�LPPHGLDWHO\�UHOHDVHV�VSRROUHTXHVWV��2WKHUZLVH��VSRRO�UHTXHVWVVWD\�LQ�WKH�VSRRO�V\VWHP�XQWLOPDQXDOO\�UHOHDVHG��7KH�'HOHWH�DIWHURXWSXW�RSWLRQ�SUHYHQWV�VSRROUHTXHVWV�IURP�EHLQJ�UHWDLQHG�DIWHUSULQWLQJ�

��� 6HOHFW�WKH�GHVLUHG�'HFLPDO�QRWDWLRQDQG�'DWH�IRUPDW�

��� &KRRVH� �

)RU�HDFK�XVHU��ILHOG�GHIDXOWV�RU�SDUDPHWHUV�VWRUH�GHIDXOW�YDOXHV�IRU�5���ILHOGV��:KHQ�D�ILHOG�LVGLVSOD\HG��WKH�SDUDPHWHU·V�YDOXH��LI�DQ\��LV�D�GHIDXOW�YDOXH��8VHU�SDUDPHWHUV�DUH�RSWLRQDO�DQGGR�QRW�\HW�QHHG�WR�EH�GHILQHG�

7R�DVVLJQ�DQ�DXWKRUL]DWLRQ�SURILOH�WR�\RXU�QHZ�XVHU�PDVWHU�UHFRUG�

�� 6HOHFW�D�XVHU�UROH�WHPSODWH�RU�FUHDWH�DQ�DFWLYLW\�JURXS�\RXUVHOI�

�� *HQHUDWH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXSV�

�� $VVLJQ�DFWLYLW\�JURXSV�WR�QHZ�XVHUV�DQG�WUDQVIHU�SURILOHV�

)RU�PRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV��VHH�FKDSWHU���3UHSDULQJ�WKH�5��(QYLURQPHQW�IRU�*R�/LYH�

15

11

12

14

13

17

Page 76: Authorizations Made Easy

Chapter 4: User Administration

Changing a User’s Password

Authorizations Made Easy4–10

&KDQJLQJ�D�8VHU·V�3DVVZRUG

8VHUV�FDQ�FKDQJH�WKHLU�RZQ�SDVVZRUGV�DQG�DGPLQLVWUDWRUV�FDQ�FKDQJH�DQ\�XVHU·V�SDVVZRUG�8VHUV�PD\�RQO\�FKDQJH�WKHLU�SDVVZRUGV�RQFH�D�GD\��KRZHYHU��DQ�DGPLQLVWUDWRU�FDQ�FKDQJHSDVVZRUGV�ZKHQHYHU�UHTXLUHG��$Q�DGPLQLVWUDWRU�PD\�QHHG�WR�FKDQJH�SDVVZRUGV�DIWHU�DQHZ�LQVWDOODWLRQ��ZKHQ�WKH�GHIDXOW�SDVVZRUG�VKRXOG�EH�FKDQJHG�IRU�VHFXULW\�SXUSRVHV���RUZKHQ�XVHUV�ORVH�RU�IRUJHW�WKHLU�SDVVZRUGV��:KHQ�DQ�DGPLQLVWUDWRU�FKDQJHV�D�SDVVZRUG��WKHQHZ�SDVVZRUG�LV�RQO\�WHPSRUDU\��$W�WKH�QH[W�ORJRQ��WKH�XVHU�HQWHUV�WKLV�SDVVZRUG�DQG�WKHQVHOHFWV�D�SHUPDQHQW�RQH��5HIHU�WR�WKH�WDEOH�3DVVZRUG�5HTXLUHPHQWV�RQ�WKH�QH[W�SDJH�IRUSDVVZRUG�UHTXLUHPHQWV�

,I�\RX�GR�QRW�XVH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��WKH�XVHUV�DUH�FOLHQW�VSHFLILF��%HIRUHSURFHHGLQJ��EH�VXUH�WKDW�\RX�DUH�ORJJHG�RQ�WR�WKH�6$3�FOLHQW�WKDW�FRQWDLQV�WKH�XVHU�ZKRVHSDVVZRUG�\RX�ZDQW�WR�FKDQJH�

�� 7R�FKDQJH�D�XVHU·V�SDVVZRUG��LQ�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��

�� ,Q�8VHU��HQWHU�WKH�QDPH�RI�WKH�XVHUZKRVH�SDVVZRUG�\RX�ZRXOG�OLNH�WRFKDQJH�

�� &KRRVH� �

�� (QWHU�WKH�QHZ�LQLWLDO�SDVVZRUG��IRUH[DPSOH��init��DQG�UHHQWHU�WKHSDVVZRUG�IRU�YHULILFDWLRQ�LQ�WKHQH[W�OLQH�

�� &KRRVH� �&RS\�WR�FKDQJH�WKHSDVVZRUG�

3

2

4

5

Page 77: Authorizations Made Easy

Chapter 4: User Administration

Changing a User’s Password

Release 4.6A/B4–11

3DVVZRUG�5HTXLUHPHQWV

7KH�IROORZLQJ�WDEOH�OLVWV�WKH�SDVVZRUG�UHTXLUHPHQWV��$GGLWLRQDOO\��LW�ZLOO�KHOS�\RXGHWHUPLQH�LI�WKHVH�UHTXLUHPHQWV�FDQ�EH�FXVWRPL]HG��$SSHQGL[�&�DOVR�OLVWV�LPSRUWDQW�V\VWHPSURILOH�SDUDPHWHUV�WR�FXVWRPL]H�SDVVZRUG�VHWWLQJV�

3DVVZRUG�5HTXLUHPHQWV 'HIDXOW 2SWLRQV

0LQLPXP�OHQJWK�LV�WKUHH�FKDUDFWHUV 0LQLPXP�OHQJWK�FDQEH�LQFUHDVHG�

([SLUDWLRQ 3DVVZRUG�PXVWQRW�EH�FKDQJHG

1XPEHU�RI�GD\V�DIWHUZKLFK�D�SDVVZRUGPXVW�EH�FKDQJHG�FDQEH�VHW�

3DVVZRUG�PD\�QRW�EH�VHW�WR�DQ\�YDOXHLQ�D�ORFNRXW�OLVW

1R�SDVVZRUGVDUH�EORFNHGRWKHU�WKDQ�3$66DQG�6$3

&DQ�EH�FXVWRPL]HG�

)LUVW�FKDUDFWHU�PD\�QRW�EH�DQH[FODPDWLRQ�SRLQW�����RU�TXHVWLRQ�PDUN�"��

)L[HG�LQ�WKH�5��6\VWHP

)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�DSSHDU�LQWKH�VDPH�VHTXHQFH�LQ�WKH�XVHU�,'�

)L[HG�LQ�WKH�5��6\VWHP

)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�EHLGHQWLFDO�

)L[HG�LQ�WKH�5��6\VWHP

6SDFH�FKDUDFWHU�QRW�DOORZHG�ZLWKLQ�ILUVWWKUHH�FKDUDFWHUV�

)L[HG�LQ�WKH�5��6\VWHP

3DVVZRUG�PD\�QRW�EH�PASS�RU�SAP*� )L[HG�LQ�WKH�5��6\VWHP

$Q\�NH\ERDUG�FKDUDFWHU�LV�DOORZHG�LQ�DSDVVZRUG��3DVVZRUGV�DUH�QRW�FDVH�VHQVLWLYH��QR�GLVWLQFWLRQ�LV�PDGHEHWZHHQ�XSSHU��DQG�ORZHUFDVH�OHWWHUV�

)L[HG�LQ�WKH�5��6\VWHP

8VHUV�FDQ�FKDQJH�WKHLU�SDVVZRUGV�RQO\RQFH�D�GD\��7KLV�UHVWULFWLRQ�GRHV�QRWDSSO\�WR�XVHU�DGPLQLVWUDWRUV�

)L[HG�LQ�WKH�5��6\VWHP

$�SDVVZRUG�PD\�QRW�EH�FKDQJHG�EDFNWR�D�XVHU·V�SUHYLRXV�ILYH�SDVVZRUGV�7KLV�UHVWULFWLRQ�GRHV�QRW�DSSO\�WR�XVHUDGPLQLVWUDWRUV�

)L[HG�LQ�WKH�5��6\VWHP

Page 78: Authorizations Made Easy

Chapter 4: User Administration

User Information System

Authorizations Made Easy4–12

8VHU�,QIRUPDWLRQ�6\VWHP

,Q�WKH�8VHU�,QIRUPDWLRQ�6\VWHP��\RX�KDYH�WKH�RSWLRQ�WR�UXQ�GLIIHUHQW�UHSRUWV�WR�REWDLQLQIRUPDWLRQ�RQ�DOO�UHODWHG�GDWD�FRQFHUQLQJ�XVHUV��7KHVH�UHSRUWV�DUH�DOO�LQWHJUDWHG�LQ�WKHPHQX�WUHH�DQG�FDQ�EH�VWDUWHG�GLUHFWO\�IURP�WKHUH�

,QIRUPDWLRQ�LV�DYDLODEOH�IRU�WKH�IROORZLQJ�FDWHJRULHV�< 8VHU< 3URILOHV< $XWKRUL]DWLRQ�REMHFWV< $XWKRUL]DWLRQV< $FWLYLW\�JURXSV< 7UDQVDFWLRQV< &RPSDULVRQV< :KHUH�XVHG�OLVW< &KDQJH�GRFXPHQWV

5HWULHYLQJ�WKH�LQIRUPDWLRQ�LV�EDVLFDOO\�WKH�VDPH�IRU�DOO�FDWHJRULHV��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�LW�ZRUNV��7R�JHW�LQIRUPDWLRQ�IRU�D�GLIIHUHQW�FDWHJRU\��UXQ�WKHFRUUHVSRQGLQJ�UHSRUW�ZLWK�\RXU�VSHFLILF�UHTXLUHPHQWV�

Page 79: Authorizations Made Easy

Chapter 4: User Administration

User Information System

Release 4.6A/B

([DPSOH��)LQG�RXW�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQ�D�VSHFLILF�WUDQVDFWLRQ�

�� ,Q�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP��,QWKLV�PHQX�DUHD�WKHUH�DUH�VHYHUDO�GLIIHUHQW�UHSRUWV�WR�FKRRVH�IURP��7R�VHH�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQD�SDUWLFXODU�WUDQVDFWLRQ��\RX�PD\�FKRRVH�DQ\�WUDQVDFWLRQ�FRGH�\RX�DUH�LQWHUHVWHG�LQ�

�� ,Q�WKH�,QIRUPDWLRQ�6\VWHP�PHQXDUHD��GRXEOH�FOLFN�%\�WUDQVDFWLRQDXWKRUL]DWLRQV�

�� (QWHU�D�WUDQVDFWLRQ�FRGH�WRGHWHUPLQH�ZKLFK�XVHUV�KDYH�DFFHVVWR�WKDW�WUDQVDFWLRQ��IRU�H[DPSOH�FB01��

�� &KRRVH� �WR�VWDUW�WKH�UHSRUW�

�� $�WDEOH�DSSHDUV�OLVWLQJ�DOO�WKH�XVHUVDOORZHG�WR�UXQ�WKDW�WUDQVDFWLRQ�

�� &KRRVH� �LI�\RX�ZLVK�WR�UHWXUQDQG�UHYLHZ�D�GLIIHUHQW�WUDQVDFWLRQFRGH�

2

3

6

5

4

;

4–13

;;;;;;

Page 80: Authorizations Made Easy

Chapter 4: User Administration

User Information System

Authorizations Made Easy4–14

Page 81: Authorizations Made Easy

5–1

&KDSWHU��� 8VHU�5ROH�7HPSODWHV

&RQWHQWV

Overview ..................................................................................................................5–2

What Are User Role Templates? ...........................................................................5–2

User Menu................................................................................................................5–2

How to Work with User Role Templates ...............................................................5–3

Tips for an Administrator .....................................................................................5–35

Available User Role Templates............................................................................5–40

��

Page 82: Authorizations Made Easy

Chapter 5: User Role Templates

Overview

Authorizations Made Easy5–2

2YHUYLHZ

,Q�WKLV�FKDSWHU��ZH�GHVFULEH�KRZ�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�DQG�VHW�XS�\RXU�DFWLYLW\JURXSV��)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�ZLWK�WKH�DFWLYLW\�JURXSV�DQG�XVHU�UROHWHPSODWHV�ZLWK�WKH�3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�

:KDW�$UH�8VHU�5ROH�7HPSODWHV"

6$3�GHOLYHUV�PRUH�WKDQ�����XVHU�UROH�WHPSODWHV��IRUPHUO\�NQRZQ�DV�SUHGHILQHG�DFWLYLW\JURXSV���ZKLFK�FDQ�EH�GLUHFWO\�DVVLJQHG�WR�XVHUV��7KHVH�XVHU�UROH�WHPSODWHV�FRQVLVW�RIFRPSRVLWH�DFWLYLW\�JURXSV�RU�VLQJOH�DFWLYLW\�JURXSV�ZKLFK�DUH�SUHGHILQHG�ZLWK�WUDQVDFWLRQVDQG�DXWKRUL]DWLRQV��7KHVH�DFWLYLW\�JURXSV�DUH�FUHDWHG�E\�DSSOLFDWLRQ�FRQVXOWDQWV�LQFRQMXQFWLRQ�ZLWK�FXVWRPHUV�WR�IXOILOO�WKH�PRVW�VWULQJHQW�UHTXLUHPHQWV��8VHU�UROHV�DUHDVVLJQHG�LQGLYLGXDO�XVHUV��:KHQ�XVHUV�ORJ�RQ�WR�WKH�5���6\VWHP�WKH\�RQO\�VHH�WKH�SDUW�RI�WKH6$3�PHQX�ZKLFK�LV�UHTXLUHG�WR�IXOILOO�WKHLU�UROH�WDVNV��7KLV�LQGLYLGXDO�PHQX�LV�FDOOHG�WKHXVHU�PHQX��8VHUV�FDQ�DUUDQJH�WKH�VWUXFWXUH�RI�WKHLU�PHQX�DQG�KDYH�WKH�RSWLRQ�WR�DGGIUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�SHUVRQDO�IDYRULWHV�IROGHU��7KH\�FDQ�DOVR�DGG�ZHE�OLQNV�DQGOLQNV�WR�ORFDO�GRFXPHQWV��IRU�H[DPSOH�0LFURVRIW�:RUG�RU�([FHO�ILOHV�

7R�ZRUN�ZLWK�WKHVH�XVHU�UROH�WHPSODWHV��XVH�WKH�WUDQVDFWLRQ�3)&*�ZKLFK�LV�NQRZQ�DV�WKH3URILOH�*HQHUDWRU��3*���7KH�XVHU�UROH�WHPSODWHV�DUH�VWDQGDUG�GHOLYHUHG�DFWLYLW\�JURXSV�ILOOHGZLWK�GDWD��$OO�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�VWDUW�ZLWK�6$3B���$FWLYLW\�JURXSV�DUHXVHG�E\�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��7KH�ILUVW�SULRULW\�LV�WR�VHOHFW�WUDQVDFWLRQVDQG�UHSRUWV��7KLV�LQIRUPDWLRQ��WUDQVDFWLRQV�FRGHV��PHQX�SDWKV��UHSRUW�QDPHV��HWF���LV�VDYHGLQ�DQ�DFWLYLW\�JURXS��ZKLFK�VHUYHV�DV�D�GDWDEDVH�WR�KHOS�WKH�3*�GHWHUPLQH�WKH�QHFHVVDU\DXWKRUL]DWLRQV�DQG�JHQHUDWH�WKH�SURILOH�V��

<RX�PD\�VHW�XS�DV�PDQ\�DFWLYLW\�JURXSV�DV�\RXU�FRPSDQ\�UHTXLUHV��$�VLQJOH�DFWLYLW\��DWUDQVDFWLRQ��UHSRUW��RU�WDVN��FDQ�EH�LQFOXGHG�LQ�PDQ\�GLIIHUHQW�DFWLYLW\�JURXSV��DQG�DQDFWLYLW\�JURXS�FDQ�LQFOXGH�DV�PDQ\�VLQJOH�DFWLYLWLHV�DV�QHHGHG�

7R�VDYH�WLPH��6$3�SURYLGHV�XVHU�UROH�WHPSODWHV�VR�\RX�GR�QRW�KDYH�WR�FUHDWH�DOO�DFWLYLW\JURXSV�RQ�\RXU�RZQ��+RZHYHU��\RX�PD\�VWLOO�FUHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�RU�PRGLI\�WKHRQHV�6$3�GHOLYHUV�

8VHU�0HQX

8VHUV�RQO\�VHH�WKH�WUDQVDFWLRQV�WKH\�DUH�DOORZHG�WR�H[HFXWH�LQ�WKH�V\VWHP³WKRVH�GHILQHG�LQWKH�DFWLYLW\�JURXS�DVVLJQHG�WR�WKHP�

,Q�WKH�IROORZLQJ�H[DPSOH��WKH�XVHU�PHQX�IRU�WKH�XVHU�UROH�WHPSODWH�´4XDOLW\�0DQDJHUµ�LVVKRZQ��7KH�6$3�(DV\�$FFHVV�PHQX�VHUYHV�DV�WKH�LQGLYLGXDOL]HG�XVHU�PHQX��7KH�PHQX

Page 83: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–3

VWUXFWXUH�LV�H[DFWO\�ZKDW�WKH�4XDOLW\�0DQDJHU�VHHV�ZKHQ�ORJJHG�RQ�WR�5����,Q�RXU�H[DPSOH�ZH�KDYH�DVVLJQHG�RQO\�RQH�DFWLYLW\�JURXS��RI�FRXUVH�\RX�FDQ�DVVLJQ�PDQ\�PRUH�

��������An example user menu using the user role template SAP_BC_CAT_QUALITYMANAGER_AG

<RX�FDQ�VWLOO�VZLWFK�WR�WKH�FRPSOHWH�6$3�VWDQGDUG�PHQX�XVLQJ� ��WKRXJK�WKH�XVHU�LV�QRWDXWKRUL]HG�WR�UXQ�HYHU\�WUDQVDFWLRQ�LQ�WKH�VWDQGDUG�PHQX��7R�UHWXUQ�WR�WKH�XVHU�PHQX�FKRRVH� �

+RZ�WR�:RUN�ZLWK�8VHU�5ROH�7HPSODWHV

7KHUH�DUH�GLIIHUHQW�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��<RX�PD\�HLWKHU�< 8VH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�DV�LV< &RS\�DQG�PRGLI\�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV< &UHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV

,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�H[SODLQ�HDFK�RSWLRQ�DQG�SURYLGH�WKH�EDVLF�NQRZOHGJH�\RX�QHHGWR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��,I�\RX�QHHG�PRUH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUNZLWK�WKH�XVHU�UROH�WHPSODWHV��UHIHU�WR�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

7KH�WRRO�XVHG�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV�DQG�DFWLYLW\�JURXSV�UHVSHFWLYHO\�LV�WKH3URILOH�*HQHUDWRU��3*���8VH�WKH�WUDQVDFWLRQ�PFCG�IRU�WKH�3*�

Page 84: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–4

6WDUWLQJ�$FWLYLW\�*URXS�0DLQWHQDQFH��3)&*�

6WDUW�WKH�3URILOH�*HQHUDWRU��3*��E\�RQH�RI�WKH�IROORZLQJ�PHWKRGV�IURP�WKH�6$3�(DV\�$FFHVVVFUHHQ�

< &KRRVH� �&UHDWH�0HQX

< (QWHU�WKH�WUDQVDFWLRQ�PFCG�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH�(QWHU

< &KRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�3)&*�¥�$FWLYLW\�JURXSV

7KHQ�\RX�FDQ�VWDUW�ZRUNLQJ�ZLWK�WKH�XVHU�UROH�WHPSODWHV�

8VLQJ�WKH�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV

7R�XVH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�MXVW�DVVLJQ�WKH�XVHU�UROH�WHPSODWH�WR�D�XVHU�:KHQ�WKDW�XVHU�ORJV�RQ�WR�WKH�V\VWHP��D�VSHFLILF�XVHU�UROH�PHQX�DSSHDUV�

7R�DVVLJQ�XVHU�UROH�WHPSODWHV��\RX�KDYH�WZR�RSWLRQV�< 8VH�WKH�3*��VHOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��JHQHUDWH�LW��DVVLJQ�LW�WR�D�XVHU��DQG�GR�D

XVHU�FRPSDUH��7KH�IROORZLQJ�H[DPSOH�H[SODLQV�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�XVLQJWKH�3*�

< 8VH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�DVVLJQ�WKH�GHVLUHG�XVHU�UROH�WHPSODWHV�WR�DVSHFLILF�XVHU��6HH�FKDSWHU����$VVLJQLQJ�$FWLYLW\�*URXSV�

([DPSOH�

+RZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU��IRU�H[DPSOH�WKH�4XDOLW\�0DQDJHU�XVLQJ�WKH�3URILOH*HQHUDWRU�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B%&B&$7B4XDOLW\PDQDJHUB$*��

�� &KRRVH� �&KDQJH�

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�WKDW�FDQ�FRQWDLQ�PXOWLSOH�DFWLYLW\JURXSV�

2

Tip

3

Page 85: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–5

�� &KRRVH�WKH�0HQX�WDE�WR�UHYLHZ�WKHWUDQVDFWLRQV�DVVLJQHG�WR�WKLV�DFWLYLW\JURXS�

,Q�WKH�6$3�GHOLYHUHG�DFWLYLW\�JURXSV\RX�DOZD\V�VHH�DQ�$FWLYLW\�JURXSGHVFULSWLRQ�RI�WKH�FRQWHQW�IRU�WKH�VHOHFWHGDFWLYLW\�JURXS��<RX�FDQ�DOVR�DGG�\RXURZQ�GHVFULSWLRQ�

�� 7KH�HQG�XVHU�ZLOO�VHH�WKH�IROGHUV�DQGWUDQVDFWLRQV�DV�WKH\�DSSHDU�LQ�WKH$FWLYLW\�JURXS�PHQX�

�� <RX�FDQ�FKDQJH�WKH�RUGHU�RI�DQ\LWHP�E\�VHOHFWLQJ�LW�DQG�XVLQJ� �DQG�WR�PRYH�LW�XS�DQG�GRZQ�

�� 6HOHFW�WKH�$XWKRUL]DWLRQV�WDE�WRJHQHUDWH�WKLV�DFWLYLW\�JURXS�

7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKH�SURILOH�LV�QRW�JHQHUDWHG\HW�

4

Tip

76

5

Page 86: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–6

�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�

�� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH� FKRRVH� .

��� &KRRVH� �

8

9

10

Page 87: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–7

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHUWR�WKLV�DFWLYLW\�JURXS�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�LV�DVVLJQHG�\HW�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FRPSRVLWH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�

11

Page 88: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–8

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHGLQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU,'��,Q�WKH�WZR�DGGLWLRQDO�FROXPQV��)URP�WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW��<RX�FDQ�GHOHWH�WKH�XVHU,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDORQH�LQ�IURQW�RI�D�VHOHFWHG�XVHU�,'�XVLQJ�

7R�JHW�DGGLWLRQDO�LQIRUPDWLRQ�RQDVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

2Q�WKH�&RPSDUH�8VHU�0DVWHU�5HFRUG�RI$FWLYLW\�*URXS�VFUHHQ��QRWH�WKH�VWDWXV�RIWKH�XVHU�PDVWHU�UHFRUG��,W�VD\V��8VHUPDVWHU�UHFRUG�KDV�QRW�\HW�EHHQ�FRPSOHWHO\FRPSDUHG��7KHUHIRUH�SHUIRUP�FRPSOHWHFRPSDUH�LQ�VWHS����

��� &KRRVH� �&RPSOHWH�FRPSDUH�

12

13

14

Page 89: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–9

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�ZLOO�VHH�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIURP�WKH�VHOHFWHG�DFWLYLW\�JURXS�

7KH�SURFHVV�LV�QRZ�FRPSOHWH�

:KHQ�WKH�XVHU�)7$<(+�ORJV�LQ��WKHVFUHHQ�WR�WKH�ULJKW�DSSHDUV�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�6$3B%&B&$7B48$/,7<0$1$*(5B$*��KDV�EHHQ�DVVLJQHG�WR�)7$<(+�

$V�\RX�FDQ�VHH��WKH�PHQX�LV�VLPLODU�WRWKH�RQH�FUHDWHG�LQ�WKH�3*�

15

Page 90: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–10

&RS\LQJ�DQG�0RGLI\LQJ�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV

,I�\RX�DUH�QRW�FRPSOHWHO\�VDWLVILHG�ZLWK�WKH�FRQWHQW�RI�DQ�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWH�\RX�FDQ�PRGLI\�WKH�WHPSODWH��:H�UHFRPPHQG�WKDW�\RX�ILUVW�FRS\�WKH�DFWLYLW\�JURXS�DQG�WKHQPDNH�DQ\�FKDQJHV�WR�WKH�QHZO\�FUHDWHG�FRS\��&RS\LQJ�ILUVW�HQVXUHV�WKDW�\RX�NHHS�WKHRULJLQDO�6$3�WHPSODWH�LQWDFW��'RFXPHQW�WKH�FKDQJHV�\RX�PDNH�WR�WKH�VWDQGDUG�

,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FRS\�DQ�H[LVWLQJ�DFWLYLW\�JURXS��PRGLI\�LW��DQG�DVVLJQ�LWWR�D�XVHU�

,I�\RX�ZDQW�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

([DPSOH�

7KH�IROORZLQJ�H[DPSOH�GHPRQVWUDWHV�KRZ�WR�FRS\�DQG�UHQDPH�WKH�XVHU�UROH�WHPSODWH�IRUWKH�$FFRXQWV�3D\DEOH�$FFRXQWDQW��ZH�ZLOO�XVH�´$FFRXQWV�3D\DEOH�$FFRXQWDQWµ�YDULDQW��:H�DVVXPH�WKDW�RQO\�RQH�FRPSDQ\�FRGH�ZLOO�EH�XVHG��VR�ZH�GHOHWH�WKH�IROGHU�&URVV�&RPSDQ\�&RGH�7UDQVDFWLRQ��DV�ZHOO�DV�%LOO�RI�([FKDQJH�DQG�5HMHFW�3DUNHG�'RFXPHQWV�)XUWKHUPRUH��ZH�DGG�WZR�WUDQVDFWLRQV³05+5�(QWHU�,QYRLFH�DQG�05+*�(QWHU�&UHGLW0HPR³LQWR�WKH�IROGHU�,QYRLFH�FUHGLW�PHPR��)LQDOO\��ZH�DVVLJQ�WKH�QHZ�DFWLYLW\�JURXS),B$3B$&&2817$17B9$5,$17B$*�WR�D�XVHU�XVLQJ�WKH�3*�DQG�GHPRQVWUDWH�ZKDW�WKLVXVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B),B$3B$&&2817$17�B$*��

�� &KRRVH� �WR�FRS\�WKH�DFWLYLW\JURXS�

�� (QWHU�D�QDPH�IRU�WKH�QHZ�DFWLYLW\JURXS�

�� &KRRVH� �&RS\�VHOHFWLYHO\�WR�GHFLGHZKDW�REMHFWV�\RX�ZRXOG�OLNH�WR�FRS\ZLWK�WKH�DFWLYLW\�JURXS�

4

5

3

2

Page 91: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–11

�� &KRRVH� �ZLWKRXW�VHOHFWLQJDQ\WKLQJ��<RX�VKRXOG�FRS\�WKHDFWLYLW\�JURXS�ZLWKRXW�WKH�XVHUDVVLJQPHQW�

�� &KRRVH� �&KDQJH�WR�PRGLI\�WKH�QHZDFWLYLW\�JURXS�

�� (QWHU�D�VKRUW�GHVFULSWLRQ�IRU�\RXUQHZ�DFWLYLW\�JURXS�LQ�WKH�'HVFULSWLRQILHOG�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�IUHH�WH[W�GHVFULSWLRQ�

��� &KRRVH�WKH�0HQX�WDE� 8

9

7

6

10

Page 92: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–12

1RZ�\RX�VHH�WKH�PHQX�RI�WKHRULJLQDO�DFWLYLW\�JURXS�LQ�WKH�QHZDFWLYLW\�JURXS��2SHQ�WKH�GHVLUHGIROGHU�ZKHUH�\RX�ZDQW�WR�PRGLI\�RUGHOHWH�WUDQVDFWLRQV��,Q�RXU�H[DPSOH�ZH�ZRXOG�OLNH�WR�GHOHWH�WUDQVDFWLRQ)%9��DQG�WKH�IROGHUV�&URVV�FRPSDQ\FRGH�WUDQVDFWLRQ�DQG�%LOO�RI�H[FKDQJHXQGHU�WKH�3D\PHQW�DQG�FOHDULQJ�QRGH�

��� 6HOHFW�)%9��¥�5HMHFW�

��� 7R�GHOHWH�WKH�WUDQVDFWLRQ��FKRRVH� �

7R�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV��FKRRVH��,I�WKH\�DUH�WXUQHG�RQ��WKH�LFRQ

FKDQJHV�WR� �

��� 6HOHFW�WKH�&URVV�FRPSDQ\�FRGHWUDQVDFWLRQ�OLQH�DQG�FKRRVH� �

��� 6HOHFW�WKH�%LOO�RI�H[FKDQJH�OLQH�DQGFKRRVH� �

11

12

Tip

13

14

Page 93: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–13

��� 7R�LQVHUW�D�QHZ�WUDQVDFWLRQ�FRGHPDQXDOO\��VHOHFW�WKH�IROGHU�LQ�ZKLFK\RX�ZRXOG�OLNH�WKDW�WUDQVDFWLRQ�WRDSSHDU�DQG�FKRRVH� �7UDQVDFWLRQ�IRU�H[DPSOH��ZH�ZRXOG�OLNH�WR�HQWHUWKH�WUDQVDFWLRQ�(QWHU�,QYRLFH�LQWR�WKHIROGHU�,QYRLFH�FUHGLW�PHPR��

��� (QWHU�WKH�WUDQVDFWLRQ�FRGH�LQWR�WKH7UDQVDFWLRQ�FRGH�ILHOG��,I�\RX�SUHVV(QWHU��WKH�WH[W�RI�WKH�WUDQVDFWLRQ�FRGHZLOO�DSSHDU�LQ�WKH�7H[W�FROXPQ�

��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�WRWUDQVIHU�WKH�WUDQVDFWLRQ�LQWR�WKHDFWLYLW\�JURXS�PHQX�

15

17

Page 94: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–14

,I�\RX�ZRXOG�OLNH�WR�FKDQJH�WKH�SRVLWLRQRI�WKH�WUDQVDFWLRQ�LQ�WKH�KLHUDUFK\��VHOHFWWKH�WUDQVDFWLRQ�DQG�XVH�WKH� �WRPRYH�WKH�WUDQVDFWLRQ�GRZQ�RU�XS�

��� ,I�\RX�GR�QRW�NQRZ�WKH�WUDQVDFWLRQFRGH�DQG�ZRXOG�UDWKHU�VHOHFW�WKHWUDQVDFWLRQ�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX�

:H�UHFRPPHQG�\RX�VWD\�ZLWK�RQH�RSWLRQ��(LWKHU�HQWHU�WKH�WUDQVDFWLRQ�PDQXDOO\�RU�HQWHULW�WKURXJK�RQH�RI�WKH�PHQXV��6$3�PHQX��DFWLYLW\�JURXS��RU�DUHD�PHQX���,I�\RX�FKRRVH�WRHQWHU�IURP�WKH�PHQX��WKH�PHQX�SDWK�ZLOO�EH�WUDQVIHUUHG�WR�WKH�DFWLYLW\�JURXS�PHQX�DVZHOO�

18

Page 95: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–15

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�FRGH�LW�LV�SRVVLEOH�WR�VHOHFW�PRUH�WKDQRQH��

��� &KRRVH� �7UDQVIHU�WR�WUDQVIHU�WKHWUDQVDFWLRQ�LQWR�DFWLYLW\�JURXSPHQX�

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�RU�RIIFKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKHWHFKQLFDO�QDPH�RI�WKH�WUDQVDFWLRQ��VFUROOWR�WKH�ULJKW�ZKHUH�LW�LV�VKRZQ�

7KH�WUDQVDFWLRQ�LV�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�PHQX�DQG�LQFOXGHVWKH�FRPSOHWH�PHQX�SDWK�IURP�WKH6$3�PHQX�

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�DQGPRYH�LW�WR�WKH�GHVLUHG�SRVLWLRQ�E\HLWKHU�< 'UDJ�DQG�GURS

< �RU�

< �0RYH�QRGH

,Q�WKLV�H[DPSOH��ZH�XVHG�GUDJ�DQGGURS�

20

21

19

Page 96: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–16

��� 7R�GHOHWH�WKH�OHIW�PHQX�SDWK�IURPWKH�MXVW�LQVHUWHG�WUDQVDFWLRQ��VFUROOGRZQ�WR�WKH�PHQX�SDWK�WKDW�EHJLQVZLWK�6$3�5���6\VWHP�

��� 6HOHFW�WKH�GHVLUHG�IROGHU�DQG�FKRRVH�WR�GHOHWH�WKH�IROGHU�DQG�WKH

FRPSOHWH�VWUXFWXUH�EHORZ�LW�

22

23

We moved the transaction into thefolder Invoice/credit memo, below thetransaction MRHR-Enter Invoice�

Page 97: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–17

$IWHU�\RX�ILQLVK�GHOHWLQJ�DQGLQVHUWLQJ�WUDQVDFWLRQV��PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�WUDQVDFWLRQV�LQWKLV�DFWLYLW\�JURXS�

��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWDWR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VHOHFW�H[SOLFLWO\�WKH�RSWLRQ�ZLWKZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�

24

25

Tip

Page 98: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–18

1RZ�DGMXVW�WKH�DXWKRUL]DWLRQV�WR\RXU�VSHFLILF�QHHGV��2SHQ�WKHGHVLUHG�IROGHU�DQG�FKHFN�RU�FKDQJHWKH�YDOXHV�

,Q�WKLV�H[DPSOH��ZH�DUH�QRW�FKDQJLQJDQ\WKLQJ�EHFDXVH�HYHU\WKLQJ�IURPWKH�FRSLHG�DFWLYLW\�JURXS�LV�FRUUHFW�

)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�KRZ�WRZRUN�ZLWK�WKH�DXWKRUL]DWLRQ�ILHOGV�VHH�FKDSWHU����$GYDQFHG�3URILOH*HQHUDWRU�)XQFWLRQDOLW\�

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV

�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�H[LVW�ZLWKRXW�YDOXHV�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�

��� 7R�FRQWLQXH��FKRRVH� �

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�

27

28

26

Page 99: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–19

'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���

6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�

$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�

29

30

Page 100: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–20

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�FDQ�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR��FROXPQ�\RX�FDQHQWHU�WKH�GDWH�UDQJH�IRU�KRZ�ORQJWKH�XVHU�LV�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �

��� &KRRVH� �&RPSOHWH�FRPSDUH�

31

33

32

34

Page 101: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–21

,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�

:KHQ�ORJJLQJ�RQ�WR�5����WKH�XVHUZLOO�VHH�D�VSHFLILF�XVHU�PHQX�ZLWKRQO\�WKRVH�WUDQVDFWLRQV�IURP�WKHVHOHFWHG�DFWLYLW\�JURXS�

7KLV�LV�WKH�VFUHHQ�D�XVHU�VHHV�ZKHQORJJLQJ�RQ�WR�WKH�V\VWHP�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�),B$3B$&&2817$17B9$5,$17B$*��KDV�EHHQ�DVVLJQHG�WR�WKDW�XVHU�

$V�\RX�FDQ�VHH��WKH�PHQX�ORRNV�WKHVDPH�DV�WKDW�FUHDWHG�LQ�WKH�3*�

tip

35

Page 102: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–22

&UHDWH�\RXU�RZQ�8VHU�5ROH�7HPSODWHV

,I�\RX�QHHG�XVHU�UROH�WHPSODWHV�LQ�DGGLWLRQ�WR�WKH�RQHV�6$3�GHOLYHUV��\RX�FDQ�FUHDWH�\RXURZQ�DFWLYLW\�JURXS�

,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FUHDWH�DQ�DFWLYLW\�JURXS��VHOHFW�WUDQVDFWLRQ�FRGHV�JHQHUDWH�WKH�DXWKRUL]DWLRQV��DQG�DVVLJQ�WKHP�WR�D�XVHU�

,I�\RX�ZRXOG�OLNH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS�DQGWKHUHIRUH�WKH�XVHU�UROH�WHPSODWH�IRU�D�GDWD�HQWU\�FOHUN��$W�WKH�HQG��ZH�DVVLJQ�WKH�QHZDFWLYLW\�JURXS��ZKLFK�ZH�QDPH�),B$3B'$7$B(175<B&/(5.B$*�WR�D�XVHU�ZLWK�WKH�3*DQG�GHPRQVWUDWH�ZKDW�WKLV�XVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_ENTRY_CLERK��

�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�ZKLFK�FDQ�FRQWDLQ�PXOWLSOHDFWLYLW\�JURXSV��6HH�&UHDWLQJ�&RPSRVLWH$FWLYLW\�*URXSV�RQ�SDJH��²���

2

3

Tip

Page 103: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–23

�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�0HQX�WDE�WR�VHOHFW�WKHWUDQVDFWLRQV�IRU�WKH�DFWLYLW\�JURXS�

7KHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�WUDQVDFWLRQV�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�DVVLJQ�DWUDQVDFWLRQ�E\�GRLQJ�RQH�RI�WKH�IROORZLQJ�

< (QWHULQJ�LW�GLUHFWO\��RQO\�WKH�WUDQVDFWLRQ�ZLWKRXW�WKH�PHQX�SDWK�LV�DGGHG�< 6HOHFWLQJ�LW�IURP�WKH�6$3�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�DUHD�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�

,Q�WKLV�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�WUDQVDFWLRQ�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DQG�KRZ�WRLQVHUW�WKH�WUDQVDFWLRQ�FRGH�GLUHFWO\��7KH�RWKHU�RSWLRQV�ZRUN�DFFRUGLQJO\�

:H�ZRXOG�OLNH�WR�LQVHUW�WKH�WUDQVDFWLRQV�IRU�´FUHDWLQJ�YHQGRU�LQYRLFHV�FUHGLW�PHPRµ��)%����DQG´GLVSOD\LQJ�GRFXPHQWVµ��)%����ZLWK�WKH�VDPH�PHQX�SDWK�DV�LW�LV�LQ�WKH�DFWLYLW\�JURXS�IRU�WKH�´DFFRXQWVSD\DEOH�DFFRXQWDQWµ��6$3B),B$3$&&2817B$*��

�� &KRRVH� �)URP�DFWLYLW\�JURXS�

,I�\RX�ZRXOG�OLNH�WR�VHOHFW�WKHWUDQVDFWLRQ�FRGH�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX��7KHQIROORZ�WKH�VDPH�SURFHGXUH�

�� ,Q�WKH�IROORZLQJ�VFUHHQ��VHOHFW�WKHDFWLYLW\�JURXS6$3B),B$3B$&&2817$17B$*�

��� &KRRVH�(QWHU�

8

Page 104: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–24

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQV��)RUH[DPSOH��ZH�VHOHFWHG�< 6FKHGXOH�0DQDJHU< �&UHDWH�YHQGRU�LQYRLFHV�FUHGLW�PHPRV

�XQGHU�(QWU\�→�,QYRLFH�FUHGLWPHPR�

< 'LVSOD\�GRFXPHQW��XQGHU�(QWU\�→,QYRLFH�FUHGLW�PHPR�

< 'LVSOD\�YHQGRU��XQGHU�$FFRXQWPDVWHU�GDWD�

��� 7R�DGG�WKH�VHOHFWHG�WUDQVDFWLRQV�WRWKH�DFWLYLW\�JURXS�PHQX��FKRRVH�$GG�

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG�RII��FKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKH�WHFKQLFDOQDPH�RI�WKH�WUDQVDFWLRQ��VFUROO�IDUWKHU�WR�WKH�ULJKW�

,I�\RX�RSHQ�WKH�IROGHUV��\RX�FDQ�VHHKRZ�WKH�WUDQVDFWLRQV�DQG�SDWKV�KDYHEHHQ�LQVHUWHG��7KH\�DSSHDU�LQ�WKH8VHU�PHQX�LQ�H[DFWO\�WKH�VDPH�ZD\DV�GHILQHG�LQ�WKH�3*�

7KH�QH[W�WUDQVDFWLRQV�WR�LQVHUW�DUH)%���DQG�)%����)RU�WKRVHWUDQVDFWLRQV��ZH�ZLOO�FUHDWH�D�QHZIROGHU�FDOOHG�8VHU�VHWWLQJV�

��� 7R�FUHDWH�D�QHZ�IROGHU��FKRRVH�DQG�HQWHU�WKH�QHZ�QDPH�IRU�WKHIROGHU��LQ�H[DPSOH��8VHU�VHWWLQJV��

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQGRII�FKRRVH� �RU� ��7KH�WHFKQLFDO�QDPHVDSSHDU�LQ�IURQW�RI�WKH�WUDQVDFWLRQ�FRGHWH[W�

11

12

13

Page 105: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–25

��� 7R�PRYH�WKH�IROGHU�WR�WKH�HQG�RI�WKHPHQX��KLJKOLJKW�WKH�IROGHU�\RX�ZDQWWR�PRYH�DQG�FKRRVH� �WR�PRYH�LWGRZQ�

��� 7R�HQWHU�WKH�WUDQVDFWLRQV��FKRRVH�7UDQVDFWLRQ�

��� (QWHU�WKH�GHVLUHG�WUDQVDFWLRQV��IRUH[DPSOH��FB00�DQG�FB07���7KHGHVFULSWLRQ�WH[W�IRU�WKH�WUDQVDFWLRQFRGH�DSSHDUV�LQ�ULJKW�FROXPQ�

��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�

$IWHU�\RX�VHOHFW�DOO�WKH�WUDQVDFWLRQVQHFHVVDU\��IRU�H[DPSOH��IRU�WKH�'DWD(QWU\�&OHUN��

��� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

14 15

16

17

18

19

Page 106: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–26

��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�GDWD�FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLILFDOO\�VHOHFW�WKH�RSWLRQZLWK�ZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�

,I�QHFHVVDU\��WKH�'HILQH�2UJDQL]DWLRQDO/HYHOV�GLDORJ�ER[�DSSHDUV��7KLVVFUHHQ�XVXDOO\�SRSV�XS�WKH�ILUVW�WLPH\RX�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

8VH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHGHVLUHG�YDOXHV�RU�YDOXH�UDQJH�

��� ,Q�WKLV�H[DPSOH��ZH�VHOHFWHG�)XOODXWKRUL]DWLRQ�IRU�WKH�RUJDQL]DWLRQDOOHYHOV�

��� &KRRVH�6DYH�

&RPSDQ\�FRGHV��EXVLQHVV�DUHDV��DQG�SODQWV�DUH�H[DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV��<RXFDQ�GLVSOD\�DQG�PDLQWDLQ�D�OLVW�RI�H[LVWLQJ�OHYHOV�ZLWK�WUDQVDFWLRQ�6832�

20

Tip

2221

Page 107: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–27

2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKH�DXWKRUL]DWLRQGDWD�DSSHDUV�KLHUDUFKLFDOO\�

7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKH�ILUVWOHYHO��EOXH���8QGHUQHDWK�\RX�ILQG�< 2EMHFW�FODVVHV� �SXUSOH< $XWKRUL]DWLRQ�REMHFW� �JUHHQ< $XWKRUL]DWLRQ� �\HOORZ< $XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH

��� 7R�PDLQWDLQ�WKH�DFWLYLW\��FOLFN�WKH$FWLYLW\�YDOXH�ILHOG�

([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV

�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

��� 6HOHFW�WKH�GHVLUHG�DXWKRUL]DWLRQ��IRUH[DPSOH��'LVSOD\��

��� 7R�WUDQVIHU��FKRRVH� �

��� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ, WR�PDLQWDLQ�WKH�$XWKRUL]DWLRQ�JURXS��FOLFN�WKH$XWKRUL]DWLRQ�JURXS�YDOXH�ILHOG�

23

24

25

26

Page 108: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–28

��� (QWHU�RU�VHOHFW�WKH�GHVLUHG�YDOXH��ZHFKRRVH�)XOO�DXWKRUL]DWLRQ��

��� 7R�WUDQVIHU��FKRRVH� �

3URFHHG�ZLWK�DOO�RSHQ�ILHOGV�LQ�WKH�VDPHZD\�XQWLO�DOO�OLJKWV�VZLWFK�WR�JUHHQ�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�

��� 7R�FRQWLQXH��FKRRVH� �

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

31

30

29

32

27

28

Page 109: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–29

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�

,I�\RX�FKRRVH� �DQG�IRUJHW�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�VKRZV�\RX�WKHVWDWXV�DQG�UHPLQGV�\RX�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS�

33

Page 110: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–30

$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

34

3536

37

Page 111: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–31

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �

��� �&KRRVH� �&RPSOHWH�FRPSDUH�

,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�VHHV�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIRU�WKH�VHOHFWHG�DFWLYLW\�JURXS�

38

39

Tip

Page 112: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–32

7KH�XVHU�VHHV�WKH�6$3�(DV\�$FFHVV�¥�8VHUPHQX�IRU��XVHUªV�QDPH!�ZKHQ�ORJJLQJLQWR�5���DIWHU�WKH�DVVLJQPHQW�RI�WKHDFWLYLW\�JURXS��LQ�WKLV�H[DPSOH��WKH�XVHUPHQX�IURP�),B$3B'$7$B(175<B&/(5.��

8VHUV�FDQ�PDLQWDLQ�WKHLU�RZQ�IDYRULWHVDQG�LQVHUW�OLQNV�WR�WKHLU�PHQX��6HHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�IRU�GHWDLOV�

&UHDWLQJ�&RPSRVLWH�$FWLYLW\�*URXSV

,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�GHVFULEHG�KRZ�WR�FUHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV�XVLQJ�VLQJOH�DFWLYLW\JURXSV��<RX�DOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�FRPSRVLWH�DFWLYLW\�JURXSV��ZKLFK�FRQVLVW�RI�PXOWLSOH�VLQJOHDFWLYLW\�JURXSV��,Q�WKRVH�FRPSRVLWH�DFWLYLW\�JURXSV��\RX�FDQQRW�DVVLJQ�WUDQVDFWLRQV�GLUHFWO\��<RX�KDYH�WRHQWHU�VLQJOH�WUDQVDFWLRQV�LQWR�VHSDUDWH�DFWLYLW\�JURXSV�DQG�WKHQ�DVVLJQ�WKRVH�DFWLYLW\�JURXSV�WR�FRPSRVLWHDFWLYLW\�JURXS�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FRPSRVLWH�DFWLYLW\�JURXS�WKDW�LQFOXGHV�WKUHHVLQJOH�DFWLYLW\�JURXSV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 8QGHU�7\SH��VHOHFW�&RPSRVLWH�DFWLYLW\JURXS�

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_MANAGER��

�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�

3

4

2

Page 113: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–33

�� ,Q�'HVFULSWLRQ� HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�WRVHOHFW�WKH�DFWLYLW\�JURXSV�IRU�WKLVFRPSRVLWH�DFWLYLW\�JURXS�

�� 6HOHFW� �WR�LQVHUW�WKH�DFWLYLW\JURXSV�

<RX�FDQ�RQO\�LQVHUW�DFWLYLW\�JURXSV�LQWRFRPSRVLWH�DFWLYLW\�JURXSV��,W�LV�QRWSRVVLEOH�WR�DVVLJQ�RWKHU�FRPSRVLWHDFWLYLW\�JURXSV�RU�VLQJOH�WUDQVDFWLRQV�WRD�FRPSRVLWH�DFWLYLW\�JURXS�

��� 6HOHFW�WKH�DFWLYLW\�JURXSV�WKDW�\RXZRXOG�OLNH�WR�LQFOXGH�LQ�WKHFRPSRVLWH�DFWLYLW\�JURXS�

��� &KRRVH� �

8

6

7

5

9

10

11

Page 114: Authorizations Made Easy

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–34

7KH�DFWLYLW\�JURXSV�KDYH�EHHQLQVHUWHG�

��� &KRRVH�WKH�0HQX�WDE�WR�FKHFN�WKDW\RX�FDQQRW�PDLQWDLQ�WKH�PHQX�IRUWKH�FRPSRVLWH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�XVHUV�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��FKRRVH�8VHUFRPSDUH�

12

13

1415

16

Page 115: Authorizations Made Easy

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–35

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� ��DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �

<RX�DUH�QRZ�ILQLVKHG�FUHDWLQJ�D�FRPSRVLWH�DFWLYLW\�JURXS�DQG�DVVLJQLQJ�WKLV�WR�D�XVHU��:KHQXVHUV�ORJ�RQ�WR�WKH�5���6\VWHP��WKHLU�PHQX�ZLOO�FRQWDLQ�WKH�WUDQVDFWLRQV�RI�WKH�WKUHH�LQVHUWHGDFWLYLW\�JURXSV�IURP�RXU�H[DPSOH�

7LSV�IRU�DQ�$GPLQLVWUDWRU

$V�DQ�DGPLQLVWUDWRU�ZLWK�VSHFLDO�DXWKRUL]DWLRQV��\RX�FDQ�KDYH�D�VKRUWFXW�IRU�DVVLJQLQJ�XVHUUROHV�WR�D�XVHU�ZLWKRXW�JRLQJ�LQWR�WUDQVDFWLRQ�3)&*�RU�68���

7R�VHH�DQG�SHUIRUP�WKH�VKRUWFXW��\RX�QHHG�DFFHVV�WR�WUDQVDFWLRQ�FRGH�3)&*��7KH�ILHOG�YDOXHVQHHG�WR�EH�VHW�WR�IXOO�DXWKRUL]DWLRQ�� ��LQ�WKH�DXWKRUL]DWLRQ�REMHFWV�6B86(5B352�6B86(5B*53��6B86(5B$87�DV�VKRZ�LQ�WKH�WDEOH�EHORZ�

$XWKRUL]DWLRQ�REMHFW�6B86(5B352

�$FWLYLW\

�$XWK��SURILOH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��352),/(�

$XWKRUL]DWLRQ�REMHFW�6B86(5B*53

�$FWLYLW\

�8VHU�JURXS�LQ�XVHU�PDVWHU�PDLQWHQDQFH��&/$66�

$XWKRUL]DWLRQ�REMHFW�6B86(5B$87

�$FWLYLW\

�$XWKRUL]DWLRQ�QDPH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��$87+�

�$XWK��REMHFW�LQ�XVHU�PDVWHU�PDLQWHQDQFH��2%-(&7�

� �IXOO�DXWKRUL]DWLRQ

Page 116: Authorizations Made Easy

Chapter 5: User Role Templates

Tips for an Administrator

Authorizations Made Easy5–36

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU�XVLQJ�WKLV�VKRUWFXW�

�� 2Q�WKH�6$3�(DV\�$FFHVV�VFUHHQ�FKRRVH� �2WKHU�PHQX�

7KH�PHQX�ZLOO�RQO\�EH�GLVSOD\HG�LQWKLV�ZD\�LI�WKH�VHWWLQJV�IRU�WKHDXWKRUL]DWLRQ�REMHFWV�DUH�VHW�DVGHVFULEHG�LQ�WKH�WDEOH�RQ�WKHSUHYLRXV�SDJH�

�� 6HOHFW�WKH�XVHU�UROH�WHPSODWH�WKDW\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�D�XVHU�

�� &KRRVH� �

'HSHQGLQJ�RQ�\RXU�VHWWLQJV��WKHZLQGRZ�PLJKW�ORRN�GLIIHUHQW��EXW�LWSURYLGHV�WKH�VDPH�IXQFWLRQDOLW\�

1

2

3

Page 117: Authorizations Made Easy

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–37

�� 7KH�VWUXFWXUH�RI�WKH�XVHU�UROHWHPSODWH�DSSHDUV�WKH�VDPH�ZD\�DQHQG�XVHU�VHHV�LW�ODWHU�

�� )RU�DQ�RYHUYLHZ�RI�ZKDW�WKLV�XVHUUROH�WHPSODWH�FRYHUV��FKRRVH�'RFXPHQWDWLRQ�

�� 7KH�GHVFULSWLRQ�DERXW�WKH�VHOHFWHGXVHU�UROH�WHPSODWH�LV�PDLQWDLQHG�LQWKH�DFWLYLW\�JURXS�GHVFULSWLRQ�ILHOGLQ�WKH�3*�

�� &KRRVH� �

4

5

6

7

Page 118: Authorizations Made Easy

Chapter 5: User Role Templates

Tips for an Administrator

Authorizations Made Easy5–38

�� 7R�DVVLJQ�D�XVHU�WR�WKLV�XVHU�UROHWHPSODWH��FKRRVH�$VVLJQ�XVHUV�

�� ,Q�WKH�$VVLJQ�XVHUV�ZLQGRZ��HQWHU�WKHXVHUV�QDPH�GLUHFWO\�RU�XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�XVHU�IURP�D�OLVW�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH�IRU�WKHDFWLYLW\�JURXS��FKRRVH�<HV�

8

9

10

11

Page 119: Authorizations Made Easy

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–39

��� 7KH�VHOHFWHG�XVHU�KDV�EHHQ�DVVLJQHGWR�WKH�XVHU�UROH�WHPSODWH�DQG�WKHGDWD�ZDV�VDYHG�

��� &KRRVH� �RU�UHSHDW�WKH�VWHSV�IRU�DQHZ�DVVLJQPHQW�

12

13

Page 120: Authorizations Made Easy

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–40

$YDLODEOH�8VHU�5ROH�7HPSODWHV

,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�H[SODLQHG�KRZ�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV��7KLV�VHFWLRQ�SURYLGHV�DQRYHUYLHZ�RI�WKH�XVHU�UROH�WHPSODWHV�GHOLYHUHG�ZLWK�5����VRUWHG�E\�DSSOLFDWLRQ�DUHD�

(DFK�XVHU�UROH�WHPSODWH�FRQWDLQV�D�< 6KRUW�GHILQLWLRQ�RI�WKH�UROH�DQG�DQ�RYHUYLHZ�RI�WDVNV< 5ROH�EDVHG�PHQX< &RPSOHWHO\�PDLQWDLQHG�DXWKRUL]DWLRQ�SURILOH�DFFRUGLQJ�WR�WKH�IXQFWLRQDOLW\�DFFHVVLEOH

5HOHDVH����$

7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DUH�DYDLODEOH�ZLWK�5���5HOHDVH����$�DQG�DUH�GLVWULEXWHG�DV�DFWLYLW\JURXSV�

$UHD�&URVV�$SSOLFDWLRQ� $UHD�/RJLVWLFV�([HFXWLRQ�

$XGLWRU 7UDQVSRUW�&RVW�0DQDJHU

'DWD�3URWHFWLRQ�$XGLWRU 7UDQVSRUW�&RVW�&OHUN

$XGLWRU�+5 :DUHKRXVH�:RUNHU

$XGLWRU�6\VWHP :DUHKRXVH�0DQDJHU

6SHFLDOLVW�'DWD�7UDQVIHU :DUHKRXVH�&OHUN

$UHD�0DWHULDOV�0DQDJHPHQW�3URFXUHPHQW� /RJLVWLFV�0DQDJHU

5HTXLVLWLRQHU /RJLVWLFV�&OHUN

053�FRQWUROOHU 7UDQVSRUW�3ODQQHU

%X\HU 7UDQVSRUW�0DQDJHU

*5�&OHUN 7UDQVSRUW�&OHUN

6(�&OHUN 6KLSSLQJ�0DQDJHU

*/�%X\HU 6KLSSLQJ�&OHUN

,9�&OHUN 3URMHFW�0DQDJHPHQW

3URGXFWLRQ�3ODQQLQJ 3URMHFW�0DQDJHU�&�

33�2SHUDWRU 3URMHFW�0DQDJHU�7�

33�3URGXFW�0DQDJHU :RUN�3DFNDJH�5HVSRQVLEOH

33�6XSHUYLVRU ,QYHVWPHQW�0DQDJHPHQW

.DQEDQ�&RQWUROOHU ,QYHVWPHQWV�$QDO\VW

053�&RQWUROOHU ,QYHVWPHQWV�0DQDJHU

5HS��0DQXIDFWXUHU ,QYHVWPHQWV�3ODQHU��25�

,QYHVWPHQWV�3ODQHU��35�

6HWWOH�6SHFLDOLVW

Page 121: Authorizations Made Easy

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–41

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

%DVLV���'HYHORSPHQW 4XDOLW\�0DQDJHPHQW

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU &HUWLILFDWH

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU (TXLSPHQW�0DQDJHU

6\VWHP�$GPLQLVWUDWRU ,QVSHFWLRQ�0DQDJHU

%DWFK�$GPLQLVWUDWRU ,QVSHFWLRQ�3ODQHU

$GPLQLVWUDWRU 3UREOHP�$XWKRU

3URFHVV�&RQWUROOHU 3UREOHP�3URFHVVRU

:RUNIORZ�'HYHORSHU 4XDOLW\�$QDO\VW

:RUNIORZ�3URFHVV�&RQWUROOHU 4XDOLW\�(QJLQHHU

4XDOLW\�0DQDJHU 4XDOLW\�,QVSHFWRU

7UDQVSRUW�0DQDJHU 6XSSRUW�/LQH�/HYHO��

&XVWRPL]LQJ�3URMHFW�0HPEHU 6XSSRUW�/LQH�/HYHO��

'DWDEDVH�$GPLQLVWUDWRU 6DOHV��'LVWULEXWLRQ

$%$3�'HYHORSHU 2UGHU�3URFHVVLQJ�&OHUN

'HYHORSPHQW�0DQDJHU 6DOHV�5HSUHVHQWDWLYH

'RFXPHQWDWLRQ�'HYHORSHU 6DOHV�0DQDJHU

3URMHFW�0DQDJHU &RQWUROOLQJ

(QGXVHU�3URILOH 3ODQQLQJ�$FWLYLW\�&RRUGLQDWRU

(YHU\�(PSOR\HH 6HQLRU�&RVWPDQDJHU

$/(�$GPLQLVWUDWRU 0DQDJHULDO�$FFRXQWDQW

$/(�'HYHORSHU 6DOHV�0DQDJHU

$GPLQLVWUDWRU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW )LQDQFH�0DQDJHPHQW

3URMHFW�/HDGHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�&OHUN

8VHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�$FFRXQWDQW

6$3VFULSW�3RZHU�8VHU 6WDII�$FFRXQWDQW

6SRRO�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�$FFRXQWDQW

$UFKLYHOLQN�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�6XSHUYLVRU

$UFKLYHOLQN�8VHU $FFRXQWV�3D\DEOH�$FFRXQWDQW

7HFKQLFDO�(QJLQHHU $FFRXQWV�3D\DEOH�6XSHUYLVRU

8VHU�$GPLQVWUDWRU &DVK�0DQDJHU

%XVLQHVV�:RUNSODFH�IRU�DOO�8VHUV &UHGLW�0DQDJHU

$GPLQLVWUDWRU $FFRXQWLQJ�6XSHUYLVRU

&RQWUROOHU 3URILW�&HQWHU�$FFRXQWLQJ

,PSOHPHQWDWLRQV�7HDP 3URILW�&HQWHU�&RQWUROOHU

3URILW�&HQWHU�0DQDJHU

Page 122: Authorizations Made Easy

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–42

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

7UDYHO�0DQDJHPHQW 5HDO�(VWDWH

7UDYHO�$GPLQLVWUDWRU &RQWUROOHU�DQG�0DQDJHU

7UDYHO�$SSURYLQJ�PDQDJHU 5HQW�$GMXVWPHQW�&OHUN

7UDYHO�6\VWHP�PDQDJHU 6&6�&OHUN

7UDYHO�$VVLVWDQW 7HQDQW�&OHUN

7UDYHOHU 7HQDQW�5HQWDO�&OHUN

7UHDVXU\ +XPDQ�5HVRXUFHV

$GPLQLVWUDWRU $GPLQLVWUDWLYH�&OHUN

&UHGLW�$QDO\VW $GPLQLVWUDWLYH�&OHUN�%HQHILWV

'HSDUWPHQW�0DQDJHU�/RDQV $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ

/RDQV�2IILFHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW

5ROORYHU�2IILFHU %HQHILWV�6SHFLDOLVW

6WDII�$FFRXQWDQW &RPSHQVDWLRQ�6SHFLDOLVW

%DFNRIILFH�3URFHVV /LQH�0DQDJHU�%HQHILWV

&DVKPDQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

&RQWUROOHU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

)XQG�0DQDJHU /LQH�0DQDJHU�$SSUDLVDO�6\VWHP

5LVN�&RQWUROOHU /LQH�0DQDJHU�5RRP�5HVHUYDWLRQV

6WDII�$FFRXQWDQW +5�0DQDJHU

7UDGH�&RQWUROOHU +5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

7UDGHU +5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

7UHDVXU\�0DQDJHU +5�0DQDJHU�$SSUDLVDO�6\VWHP

3URGXFW�'DWD�0DQDJHPHQW +5�0DQDJHU�5RRP�5HVHUYDWLRQV

'HVLJQHU +5�0DQDJHU�&RPSHQVDWLRQ

:RUN�3UHSDUHU $GPLQLVWUDWLYH�&OHUN

)RUHLJQ�7UDGH $GPLQLVWUDWLYH�&OHUN�%HQHILWV

&RQ��([SRUW�&RQWURO�0DQDJHU $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ

*RY��3HULRG�0DQDJHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW

/RFDO�'RF��3D\PHQW�0DQDJHU %HQHILWV�6SHFLDOLVW

3UHIHUHQFH�PDQDJHU &RPSHQVDWLRQ�6SHFLDOLVW

3UR��([SRUW�0DQDJHU /LQH�0DQDJHU�%HQHILWV

3UR��,PSRUW�0DQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

6XSHUYLVRU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

/LQH�0DQDJHU�$SSUDLVDO�6\VWHP

/LQH�0DQDJHU�5RRP�5HVHUYDWLRQV

+5�0DQDJHU

Page 123: Authorizations Made Easy

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–43

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

+5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW 3D\UROO�6SHFLDOLVW�*HUPDQ\

+5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ 3D\UROO�6SHFLDOLVW�'DQPDUN

+5�0DQDJHU�$SSUDLVDO�6\VWHP 3D\UROO�6SHFLDOLVW�6SDLQ

+5�0DQDJHU�5RRP�5HVHUYDWLRQV 3D\UROO�6SHFLDOLVW�)UDQFH

+5�0DQDJHU�&RPSHQVDWLRQ 3D\UROO�6SHFLDOLVW�*UHDW�%ULWDLQ

,QFHQWLYH�:DJHV�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�+RQJ�.RQJ

7LPH�5HFRUGLQJ�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�,QGRQHVLD

6SHFLDOLVW�2SHUDWLRQVSODQQHU 3D\UROO�6SHFLDOLVW�,UHODQG

3D\UROO�&OHUN 3D\UROO�6SHFLDOLVW�-DSDQ

3D\UROO�&OHUN�$XVWULD 3D\UROO�6SHFLDOLVW�0H[LFR

3D\UROO�&OHUN�%HOJLXP 3D\UROO�6SHFLDOLVW�0DOD\VLD

3D\UROO�&OHUN�&DQDGD 3D\UROO�6SHFLDOLVW�1HWKHUODQGV

3D\UROO�&OHUN�*HUPDQ\ 3D\UROO�6SHFLDOLVW�1RUZD\

3D\UROO�&OHUN�6SDLQ 3D\UROO�6SHFLDOLVW�1HZ�=HDODQG

3D\UROO�&OHUN�*UHDW�%ULWDLQ 3D\UROO�6SHFLDOLVW�3KLOLSSLQHV

3D\UROO�&OHUN�,QGRQHVLD 3D\UROO�6SHFLDOLVW�3RUWXJDO

3D\UROO�&OHUN�0H[LFR 3D\UROO�6SHFLDOLVW�6ZHGHQ

3D\UROO�&OHUN�0DOD\VLD 3D\UROO�6SHFLDOLVW�6LJQDSRUH

3D\UROO�&OHUN�1HWKHUODQGV 3D\UROO�6SHFLDOLVW�7KDLODQG

3D\UROO�&OHUN�1RUZD\ 3D\UROO�6SHFLDOLVW�7DLZDQ

3D\UROO�&OHUN�1HZ�=HDODQG 3D\UROO�6SHFLDOLVW�86$

3D\UROO�&OHUN�3KLOLSSLQHV 3D\UROO�6SHFLDOLVW�6RXWK�$IULFD

3D\UROO�&OHUN�3RUWXJDO 5HFUXLWHU

3D\UROO�&OHUN�6LJQDSRUH 6\VWHP�$GPLQLVWUDWRU

3D\UROO�&OHUN�7DLZDQ 6\VWHP�$GPLQLVWUDWRU�$UJHQWLQLD

3D\UROO�&OHUN�86$ 6\VWHP�$GPLQLVWUDWRU�$XVWULD

3D\UROO�&OHUN�9HQH]XHOD 6\VWHP�$GPLQLVWUDWRU�$XVWUDOLD

3D\UROO�&OHUN�6RXWK$IULFD 6\VWHP�$GPLQLVWUDWRU�%HOJLXP

3D\UROO�6SHFLDOLVW 6\VWHP�$GPLQLVWUDWRU�%UDVLO

3D\UROO�6SHFLDOLVW�$UJHQWLQLD 6\VWHP�$GPLQLVWUDWRU�&DQDGD

3D\UROO�6SHFLDOLVW�$XVWULD 6\VWHP�$GPLQLVWUDWRU�6XLVVH

3D\UROO�6SHFLDOLVW�$XVWUDOLD 6\VWHP�$GPLQLVWUDWRU�*HUPDQ\

3D\UROO�6SHFLDOLVW�%HOJLHQ 6\VWHP�$GPLQLVWUDWRU�'DQPDUN

3D\UROO�6SHFLDOLVW�%UDVLO 6\VWHP�$GPLQLVWUDWRU�6SDLQ

3D\UROO�6SHFLDOLVW�&DQDGD 6\VWHP�$GPLQLVWUDWRU�)UDQFH

3D\UROO�6SHFLDOLVW�6XLVVH 6\VWHP�$GPLQLVWUDWRU�*UHDW�%ULWDLQ

Page 124: Authorizations Made Easy

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–44

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

6\VWHP�$GPLQLVWUDWRU�+RQJ�.RQJ 6\VWHP�$GPLQLVWUDWRU�2UJDQL]DWLRQDO�0DQDJHPHQW

6\VWHP�$GPLQLVWUDWRU�,QGRQHVLD 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�$GPLQLVWUDWLRQ

6\VWHP�$GPLQLVWUDWRU�,UHODQG 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�&RVW�3ODQQLQJ

6\VWHP�$GPLQLVWUDWRU�-DSDQ 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�0DOD\VLD 6\VWHP�$GPLQLVWUDWRU�$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�1HWKHUODQGV 6\VWHP�$GPLQLVWUDWRU�7UDLQLQJ�DQG�(YHQWV

6\VWHP�$GPLQLVWUDWRU�1RUZD\ 6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV

6\VWHP�$GPLQLVWUDWRU�1HZ�=HDODQG 6\VWHP�$GPLQLVWUDWRU�3D\UROO

6\VWHP�$GPLQLVWUDWRU�3KLOLSSLQHV 6\VWHP�$GPLQLVWUDWRU�5HFUXLWPHQW

6\VWHP�$GPLQLVWUDWRU�3RUWXJDO 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN

6\VWHP�$GPLQLVWUDWRU�6ZHGHQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�6LJQDSRUH 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�7KDLODQG 7UDLQLQJ�DQG�'HYHOSP��&OHUN��7UDLQLQJ�DQG�(YHQW�0DQDJHPHQW

6\VWHP�$GPLQLVWUDWRU�7DLZDQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��5RRP�5HVHUYDWLRQ

6\VWHP�$GPLQLVWUDWRU�86$ 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�,QWHUQDWLRQDO 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�6RXWK�$IULFD 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��7UDLQLQJ

6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��5RRP�5HVHUYDWLRQ

6\VWHP�$GPLQLVWUDWRU�%HQHILWV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW

6\VWHP�$GPLQLVWUDWRU�&RPSHQVDWLRQ

5HOHDVH����%

7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DYDLODEOH�ZLWK�5���5HOHDVH����%�DUH�LQ�DGGLWLRQ�WR�WKH�H[LVWLQJ�IURP5HOHDVH����$�DV�VKRZQ�DERYH�

%DVLV +XPDQ�5HVRXUFHV

$%$3�'HYHORSHU ,QFHQWLYH�:DJHV�&OHUN

$OH�$GPLQLVWUDWRU ,QFHQWLYH�:DJHV�6SHFLDOLVW

$/(�'HYHORSHUV 7LPH�5HFRUGLQJ�$GPLQLVWUDWRU

0DVWHU�'DWD�'LVWULEXWLRQ 7LPH�5HFRUGLQJ�6SHFLDOLVW

$FFRXQWLQJ�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�&OHUN

+5�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�6SHFLDOLVW

/RJLVWLFV�0DVWHU�'DWD�'LVWULEXWLRQ 0DWHULDO�0DVWHU

)LQDQFH�PDQDJHPHQW %X\LQJ

),��$GYDQFH�3D\HU�IRU�7ULS�$GYDQFHV

Page 125: Authorizations Made Easy

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–45

8VHU�5ROH�7HPSODWHV����%��FRQWLQXHG�

5HWDLO 0DLQWHQDQFH�RI�6DOHV�3ULFH�&DOFXODWLRQV

$OORFDWLRQ�7DEOH 3ULFLQJ�(QYLURQPHQW

$VVRUWPHQW�0DQDJHPHQW 6DOHV�3ULFH�&DOFXODWLRQV��6WUDWHJLF�

5HWDLO�6WRFN�3ODQQHU 3URPRWLRQ�0DQDJHPHQW

2UGHU�2SWLPL]LQJ 6WRUH�0DQDJHU

3HULVKDEOHV�3ODQQLQJ 7ULJJHULQJ�DQG�&RQWUROOLQJ�0HUFKDQGLVH�3URFXUHPHQW�LQ�D�6WRUH

&DWHJRU\�0DQDJHU *DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU

&ODVVLILFDWLRQ 6WRUH�*RRGV�5HFHLSWV�,VVXHV�DQG�,QYHQWRU\

0DLQWHQDQFH�RI�3XUFKDVH�3ULFH�&RQGLWLRQV 0DQDJHPHQW�RI�,QVWRUH�3HUVRQQHO

0DLQWHQDQFH�RI�6DOHV�3ULFH�&RQGLWLRQV ,QVWRUH�3ODQQLQJ�DQG�&RQWURO

*RRGV�5HFHLSW 6DOHV�$FWLYLWLHV�LQ�D�6WRUH

*RRGV�5HFHLSW�$VVRFLDWH 6DOHV�'HSDUWPHQW�0DQDJHU�LQ�D�6WRUH

,QWHUQDO�:DUHKRXVH�+DQGOLQJ 6WRUH�$VVRFLDWH�8VLQJ�6$3�5HWDLO�6WRUH

:DUHKRXVH�0DQDJHU 6HWWOHPHQW�RI�&XVWRPHU�$UUDQJHPHQWV

6KLSSLQJ�$VVRFLDWH 0DLQWHQDQFH�RI�&XVWRPHU�$UUDQJHPHQWV

:DUHKRXVH�:RUNHU 6HWWOHPHQW�RI�9HQGRU�$UUDQJHPHQWV

5HWDLO�%X\HU 0DLQWHQDQFH�RI�9HQGRU�$UUDQJHPHQWV

%X\LQJ�$FWLYLWLHV 7UDQVSRUWDWLRQ�0DQDJHU

*DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU 7UDQVSRUWDWLRQ�3ODQQHU

,QYRLFH�9HULILFDWLRQ�&OHUN /RJLVWLFV�([HFXWLRQ

9HULILFDWLRQ�RI�,QYRLFHV 6KLSSLQJ�&OHUN

$UFKLYLQJ�RI�,QYRLFHV 6KLSSLQJ�0DQDJHU

)XQFWLRQV�LQ�WKH�,QYRLFH�9HULILFDWLRQ�(QYLURQPHQW 3ODQLQJ�6\VWHPV

&RRUGLQDWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW 'LVSOD\�DQG�0DLQWDLQ�:RUN�&HQWHU�0DVWHU�'DWD

([HFXWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW�3ODQQLQJ 6DOHV�3ULFH�9DOXDWLRQ

0HUFKDQGLVH�&DWHJRU\�+LHUDUFK\�&UHDWLRQ

5HTXLUHPHQWV�3ODQQLQJ

Page 126: Authorizations Made Easy

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–46

Page 127: Authorizations Made Easy

6–1

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU

)XQFWLRQDOLW\

&RQWHQWV

Overview ..................................................................................................................6–2

Selecting Views/Types in Activity Group Maintenance ......................................6–2

Exploring Advanced Profile Generator Functionality .........................................6–3

Copying and Deriving Activity Groups...............................................................6–16

Selecting Workflow Tasks....................................................................................6–21

Deleting Activity Groups ......................................................................................6–24

Postmaintaining User Role Templates ...............................................................6–25

Maintaining and Generating the Authorization Profiles....................................6–26

Displaying an Overview of Generated Profiles ..................................................6–30

Regenerating Authorization Profiles After Making Changes ...........................6–32

Using Utilities to Change Generated Authorizations ........................................6–36

Customizing Authorizations ................................................................................6–38

��

Page 128: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Overview

6–2

2YHUYLHZ

,Q�DGGLWLRQ�WR�WKH�WKUHH�PHWKRGV�RI�XVLQJ�WKH�XVHU�UROH�WHPSODWHV��WKH�3URILOH�*HQHUDWRU��3*�SURYLGHV�DGGLWLRQDO�RSWLRQDO�IXQFWLRQDOLW\�

,Q�WKLV�FKDSWHU��ZH�H[SODLQ�PRUH�RI�WKH�YDVW�IXQFWLRQDOLW\�RI�WKH�3*��([DPSOHV�VKRZ�KRZ�WRHQKDQFH�WKH�XVH�RI�\RXU�XVHU�UROH�WHPSODWHV�

6HOHFWLQJ�9LHZV�7\SHV�LQ�$FWLYLW\�*URXS�0DLQWHQDQFH

Views

Possible entries

Authorizations Made Easy

,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�ZLQGRZ��WUDQVDFWLRQ�3)&*���\RX�FDQ�WRJJOH�EHWZHHQGLIIHUHQW�YLHZV�DQG�W\SHV��)RU�YLHZV�\RX�FDQ�FKRRVH�< %DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV�< 2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ�

)RU�W\SHV�\RX�FDQ�FKRRVH�< $FWLYLW\�JURXS< &RPSRVLWH�DFWLYLW\�JURXS

7KHVH�YLHZV�DQG�W\SHV�DUH�GHVFULEHG�LQ�WKH�IROORZLQJ�VHFWLRQV�

%DVLF�0DLQWHQDQFH

6HOHFW�%DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��WR�FUHDWH�DFWLYLW\�JURXSV�DQG�DVVLJQWKHVH�JURXSV�WR�XVHUV�

2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�

6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ��WR�FUHDWH�DFWLYLW\�JURXSV�DQGDVVLJQ�WKHVH�DFWLYLW\�JURXSV�WR�5���XVHUV�RU�3'�REMHFWV��2YHUYLHZ�JLYHV�\RX�IXOO�DFFHVV�WR�DOODFWLYLW\�JURXS�PDLQWHQDQFH�IXQFWLRQV��LQFOXGLQJ�RUJDQL]DWLRQ�PDQDJHPHQW�DQG�WKH�UHODWHGWLPH�GHSHQGHQFLHV��)RU�H[DPSOH��ZKHQ�\RX�DUH�FUHDWLQJ�RU�FKDQJLQJ�DQ�DFWLYLW\�JURXS��\RXFDQ�RQO\�OLQN�ZRUNIORZ�WDVNV�WR�DQ�DFWLYLW\�JURXS�LQ�2YHUYLHZ�

Types

Page 129: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–3

$FWLYLW\�*URXS

6HOHFW�$FWLYLW\�JURXS�WR�GLVSOD\�DOO�DYDLODEOH�DFWLYLW\�JURXSV��LQFOXGLQJ�FRPSRVLWH�DFWLYLW\JURXSV�ZKHQ�\RX�VHOHFW�SRVVLEOH�HQWULHV�

&RPSRVLWH�$FWLYLW\�*URXS

6HOHFW�&RPSRVLWH�DFWLYLW\�JURXSV�WR�GLVSOD\�RQO\�FRPSRVLWH�DFWLYLW\�JURXSV�ZKHQ�\RX�VHOHFWSRVVLEOH�HQWULHV�

([SORULQJ�$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\

,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHVFULEHG�WKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROHWHPSODWHV��<RX�DFWXDOO\�KDYH�PRUH�RSWLRQV�ZKHQ�ZRUNLQJ�ZLWK�WKH�DFWLYLW\�JURXSV�DQG3URILOH�*HQHUDWRU��3*���)RU�H[DPSOH��WKHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\JURXS³\RX�FDQ�FUHDWH�\RXU�RZQ�KLHUDUFK\�ZLWK�FXVWRPL]HG�IROGHUV��QDPHV��DQG�OLQNV�IRUWKH�XVHU�UROH�WHPSODWHV�\RX�FUHDWH�

2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��VHH�EHORZ���D�VHULHV�RI�EXWWRQV�DURXQG�WKH�DVVLJQHGWUDQVDFWLRQV�SURYLGH�GLIIHUHQW�IXQFWLRQDOLW\�

Creating or changing thehierarchy (folders, names,order)

Inserting transactions andreports manually or fromdifferent existing menus

Additional activities(moving object in hierarchy,translating, displayingtechnical names, ordisplaying objectdocumentation)

Inserting Internet anddocument links

Select a system whereyou would like thesetransactions to beexecuted

Displaying reportinformation

Page 130: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–4

&UHDWLQJ�DQG�&KDQJLQJ�WKH�+LHUDUFK\

<RX�FDQ�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\�JURXS�E\�HLWKHU�< &UHDWLQJ�\RXU�RZQ�KLHUDUFK\< 0RYLQJ�REMHFWV�LQWR�WKH�H[LVWLQJ�KLHUDUFK\�DQG�UHQDPLQJ�WKHP�WR�VXLW�\RXU�QHHGV

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�IROGHU��JLYH�LW�D�QHZ�QDPH��DQG�PRYH�LW�LQWR�WKHKLHUDUFK\�

:H�ZDQW�WR�FUHDWH�D�QHZ�IROGHU�DQG�FDOO�LW�´%X\HUµ�XQGHU�0DVWHU�'DWD�→�9HQGRU�LQ�WKH�DFWLYLW\�JURXS00B%8<(5B$*�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�VHOHFW�WKH�KLHUDUFK\�OHYHO�XQGHUZKLFK�\RX�ZDQW�WR�LQVHUW�WKH�IROGHU�IRU�H[DPSOH��9HQGRU�LQ00B%8<(5B$*��

�� &KRRVH� �

�� (QWHU�WKH�QDPH�RI�WKH�QHZ�IROGHU�

�� &KRRVH� �5

3

4

6

Page 131: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–5

�� 7KH�QHZ�IROGHU�LV�SODFHG�RQH�OHYHOEHORZ�WKH�VHOHFWHG�IROGHU�LQ�WKHKLHUDUFK\��7R�PRYH�LW�XS�RU�GRZQ�XVH�WKH�DUURZV� �RU�XVH�GUDJ�DQG�GURS�

7R�FKDQJH�WKH�WH[W�RI�WKH�QRGH��VHOHFW�LWDQG�HQWHU�WKH�QHZ�QDPH�

<RX�QHHG�WR�EH�FHUWDLQ�KRZ�\RX�FKDQJH�\RXU�PHQXV��EHFDXVH�LI�WKH�RULJLQDO�5���PHQXSDWK�FKDQJHV��\RX�PLJKW�QRW�EH�DEOH�WR�ILQG�\RXU�VHOHFWHG�WUDQVDFWLRQ�LQ�WKH�VDPHSRVLWLRQ�DV�EHIRUH�

,QVHUWLQJ�7UDQVDFWLRQV

:H�FRQWLQXH�IURP�WKH�VWHS�DERYH�WR�VKRZ�KRZ�WR�LQVHUW�WUDQVDFWLRQV�XQGHU�WKH�QHZO\�FUHDWHG�IROGHU�

,I�\RX�NQRZ�WKH�WUDQVDFWLRQ�FRGH��\RX�FDQ�LQVHUW�LW�PDQXDOO\�E\�FKRRVLQJ� �7UDQVDFWLRQ�DQG�HQWHULQJ�WKHWUDQVDFWLRQ�FRGH��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�IRU�GHWDLOV��

7R�VHOHFW�WKH�WUDQVDFWLRQ�IURP�D�PHQX��FKRRVH�RQH�RI�WKH�IROORZLQJ�EXWWRQV�

�)URP�WKH�6$3�PHQX��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�

�)URP�DFWLYLW\�JURXS

�)URP�DUHD�PHQX

7

Page 132: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–6

�� &KRRVH�IURP�ZKHUH�\RX�ZRXOG�OLNHWR�LQVHUW�WKH�WUDQVDFWLRQ��LQ�WKLVH[DPSOH��ZH�FKRVH� �)URP�DFWLYLW\JURXS��

,I�\RX�LQVHUW�WUDQVDFWLRQV�IURP�DGLIIHUHQW�PHQX��WKH�FRPSOHWH�PHQX�SDWKIURP�WKDW�VRXUFH�ZLOO�EH�DGGHG�

�� 6HOHFW�WKH�DFWLYLW\�JURXS�IURP�ZKHUH\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKHWUDQVDFWLRQ�FRGH��<RX�QHHG�WR�NQRZZKDW�DFWLYLW\�JURXS�FRQWDLQV�WKLVWUDQVDFWLRQ��:H�VHOHFWHG6$3B00B*/B%8<(5B$*�

�� &KRRVH� �

2

3

1

Page 133: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–7

7KH�PHQX�VWUXFWXUH�RI�WKH�VHOHFWHGDFWLYLW\�JURXS�DSSHDUV�

�� 2SHQ�WKH�GHVLUHG�KLHUDUFK\�OHYHODQG�VHOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�V��

7R�VLPSOLI\�\RXU�VHDUFK��WXUQ�RQ�WKHWHFKQLFDO�QDPHV�E\�FKRRVLQJ� �

�� &KRRVH� �$GG�WR�WUDQVIHU�WKHWUDQVDFWLRQV�WR�\RXU�DFWLYLW\�JURXS�7KH�FRPSOHWH�PHQX�SDWK��LQ�WKLVFDVH��9HQGRU�→�%X\HU�ZLWK�DFWLYLW\JURXSV�&UHDWH��&KDQJH��DQG�'LVSOD\�LV�WUDQVIHUUHG�

$IWHU�WKH�FRPSOHWH�PHQX�SDWK�LVLQVHUWHG��\RX�KDYH�WKH�RSWLRQ�WRUHQDPH�LW�DQG�PRYH�WKH�LQVHUWHGWUDQVDFWLRQV�WR�WKH�GHVLUHG�SRVLWLRQXVLQJ�GUDJ�DQG�GURS�RU�0RYH�QRGH�

�� 6HOHFW�WKH�WUDQVDFWLRQ�WR�EH�PRYHG�

�� &KRRVH� �0RYH�QRGH�RU�XVH�GUDJ�DQG�GURS�WR�PRYH�LW�

4

5

6

7

Page 134: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–8

�� 6HOHFW�WKH�GHVLUHG�IROGHU��IRUH[DPSOH��%X\HU��

�� &KRRVH� �

7KH�WUDQVDFWLRQ�KDV�EHHQ�PRYHG�

'R�WKH�VDPH�IRU�WKH�RWKHUWUDQVDFWLRQV�XQWLO�DOO�DUH�LQ�WKH�ULJKWIROGHU�

��� 6HOHFW�WKH�PHQX�HQWU\�WKDW�ZDVWUDQVIHUUHG��IRU�H[DPSOH�9HQGRU��

��� &KRRVH� �WR�GHOHWH�WKH�HQWU\�

8

9

11

10

Page 135: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–9

7KH�WUDQVDFWLRQV�KDYH�EHHQ�PRYHGDQG�WKH�QRGH�KDV�EHHQ�GHOHWHG�

$IWHU�LQVHUWLQJ�DOO�WKH�GHVLUHGWUDQVDFWLRQV��\RX�KDYH�WR�JHQHUDWHWKH�DFWLYLW\�JURXS�DQG�DVVLJQ�XVHUV�

Page 136: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–10

,QVHUWLQJ�,QWHUQHW�DQG�'RFXPHQW�/LQNV

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�OLQNV³IRU�H[DPSOH�0LFURVRIW�:RUG��([FHO�GRFXPHQWV�RU�,QWHUQHW�VLWHV³WR�DQDFWLYLW\�JURXS�VR�WKDW�WKHVH�OLQNV�ZLOO�EH�DYDLODEOH�WR�DOO�HQG�XVHUV�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS��(QG�XVHUVDOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�WKHLU�RZQ�OLQNV�ODWHU�RQ�WKHLU�(DV\�$FFHVV�VFUHHQ��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�DGG�D�OLQN�WR�D�ORFDO�0LFURVRIW�([FHO�VSUHDGVKHHW�DQG�D�ZHE�SDJH��:H�DUH�JRLQJ�WR�XVH�WKH�DFWLYLW\�JURXSIURP�DERYH�DQG�ZLOO�LQVHUW�D�IROGHU�FDOOHG�,QIRUPDWLRQ�VRXUFH�DV�D�SUHUHTXLVLWH�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSVZLQGRZ��VHOHFW�WKH�SRVLWLRQ�ZKHUH\RX�ZRXOG�OLNH�WR�LQVHUW�WKHGRFXPHQW�OLQN��IRU�H[DPSOH��WKHIROGHU�,QIRUPDWLRQ�VRXUFH��

�� &KRRVH� �:HE�DGGUHVV�1RWH��(YHQ�LI�\RX�ZDQW�WR�LQVHUW�DGRFXPHQW�OLQN��\RX�PXVW�XVH�WKH

�:HE�DGGUHVV�EXWWRQ�

�� (QWHU�WKH�WH[W�IRU�WKH�OLQN�LQ�WKH�7H[WILHOG�

�� (QWHU�WKH�SDWK�WR�WKH�GRFXPHQW�RUXVH�SRVVLEOH�HQWULHV�WR�VHOHFW�LW�

�� &KRRVH� �

7KH�GRFXPHQW�FDQ�EH�D�ORFDO�GRFXPHQW�RU�D�GRFXPHQW�IURP�WKH�QHWZRUN��1RWH�WKDWQDPHV�IRU�GLIIHUHQW�KDUG�GULYHV�PD\�EH�GLIIHUHQW�

34

56

7

Page 137: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–11

�� 7KH�OLQN�WR�WKH�([FHO�VSUHDGVKHHW�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VDQ�LFRQ�WKDW�UHSUHVHQWV�WKHGRFXPHQW�W\SH�

�� &KRRVH� �:HE�DGGUHVV�WR�LQVHUW�WKH,QWHUQHW�OLQN�

��� ,Q�7H[W��HQWHU�WKH�WH[W�IRU�WKH�OLQN�

��� ,Q�:HE�DGGUHVV�RU�ILOH��HQWHU�WKH�85/OLQN�WR�WKH�GHVLUHG�SDJH�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�D�VDYHG�85/�

��� &KRRVH� �

��� 7KH�OLQN�WR�WKH�,QWHUQHW�SDJH�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VWKH�LFRQ� �IRU�,QWHUQHW�OLQNV�

8

9

13

Page 138: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–12

,QVHUWLQJ�5HSRUWV

1HDUO\�HYHU\�UHSRUW�LQ�WKH�V\VWHP�KDV�D�WUDQVDFWLRQ�DVVLJQHG�WR�LW��7KHUHIRUH�\RX�FDQ�VHOHFWDQ\�UHSRUW�DQG�DXWKRUL]H�XVHUV�MXVW�IRU�FHUWDLQ�UHSRUWV��7KHUH�DUH�GLIIHUHQW�RSWLRQV�WR�DVVLJQ�DUHSRUW�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�VHOHFW�IURP�HLWKHU�< $%$3�UHSRUW< 6$3�TXHU\< 7UDQVDFWLRQ�ZLWK�YDULDQW< 5HSRUW:ULWHU< 'ULOOGRZQ< 5HS�SRUWIROLR

1RW�RQO\�FDQ�\RX�DVVLJQ�UHSRUWV�WR�WKH�PHQX�WKDW�DUH�SURYLGHG�E\�6$3�WKDW�DOUHDG\�KDYH�DWUDQVDFWLRQ��EXW�LW�LV�DOVR�SRVVLEOH�WR�DVVLJQ�VHOI�GHYHORSHG�UHSRUWV�ZLWK�WKLV�IXQFWLRQDOLW\�:KHQ�\RX�DVVLJQ�D�VHOI�GHYHORSHG�UHSRUW��\RX�FDQ�FUHDWH�D�WUDQVDFWLRQ�FRGH�WR�WKH�UHSRUWZKHQ�DGGLQJ�LW�WR�WKH�PHQX�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�RQO\�RQH�PHWKRG��WKH�RWKHUV�DUH�VLPLODU��

([DPSOH�

:H�VHOHFW�WKH�UHSRUW�'XH�'DWH�$QDO\VLV�IRU�2SHQ�,WHPV�IURP�WKH�DSSOLFDWLRQ�FODVV�),��$FFRXQWV�SD\DEOH�DQGDVVLJQ�LW�WR�D�IROGHU�FDOOHG�5HSRUWV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�0HQX�WDE��VHOHFW�WKH�IROGHUZKHUH�\RX�ZRXOG�OLNH�WR�LQVHUW�WKHUHSRUW�

�� &KRRVH� �5HSRUW�3

4

Page 139: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–13

,Q�RXU�H[DPSOH��ZH�GHPRQVWUDWHKRZ�WR�VHOHFW�D�UHSRUW�IURP�WKHDSSOLFDWLRQ�FODVV�

�� &KRRVH�'ULOOGRZQ�

,I�\RX�H[SDQG�WKH�SRSXS�XVLQJ� �WRGLVSOD\�RWKHU�RSWLRQV��\RX�FDQ�FKRRVHZKHWKHU�WR�DVVLJQ�\RXU�RZQ�WUDQVDFWLRQFRGH�RU�GHVFULSWLRQ�WR�WKH�UHSRUW��RUJHQHUDWH�WKH�WUDQVDFWLRQ�FRGHDXWRPDWLFDOO\�DQG�DGRSW�WKH�UHSRUWWUDQVDFWLRQ�

��� 6HOHFW�WKH�GHVLUHG�FODVV�IURP�WKH�OLVW�

�� &KRRVH�(QWHU�

'HSHQGLQJ�RQ�ZKDW�\RX�VHOHFWHG��WKHIROORZLQJ�ZLQGRZ��RU�ZLQGRZV��IRUVWHSV��²��PLJKW�GLIIHU�

�� 6HOHFW�WKH�GHVLUHG�UHSRUW�W\SH�

�� &KRRVH� �

��� &KRRVH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHUHSRUW�

5

6

8

9

10

Tip

7

Page 140: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–14

��� 6HOHFW�WKH�GHVLUHG�UHSRUW�IURP�WKH�KLWOLVW�

��� &KRRVH� �

��� &KRRVH� �

��� &KRRVH� �

��� 7R�VDYH�\RXU�ZRUN��FKRRVH� �

7KH�UHSRUW�KDV�EHHQ�DVVLJQHG�

,I�\RX�GHFLGHG�WR�JLYH�WKH�UHSRUW�DGLIIHUHQW�QDPH�DQG�GHVFULSWLRQ��WKH�QHZLQIRUPDWLRQ�ZRXOG�EH�GLVSOD\HG�LQ�WKHPHQX�LQVWHDG�

11

14

12

13

15

Page 141: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–15

'LVSOD\LQJ�WKH�2QOLQH�'RFXPHQWDWLRQ�IRU�$FWLYLW\�*URXS�2EMHFWV

<RX�PD\�UHYLHZ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�QHDUO\�HYHU\�REMHFW�LQ�WKH�DFWLYLW\�JURXS�VWUXFWXUH��LIDYDLODEOH���,I�\RX�DUH�QRW�VXUH�DERXW�D�FHUWDLQ�WUDQVDFWLRQ��LQVWHDG�RI�JRLQJ�WKURXJK�WKH�RQOLQHGRFXPHQWDWLRQ��MXVW�PDUN�LW�LQ�WKH�VWUXFWXUH�DQG�FKRRVH� �'LVSOD\�GRFXPHQWDWLRQ��7KH�DGYDQWDJH�RI�WKLVPHWKRG�LV�\RX�GR�QRW�QHHG�WR�NQRZ�ZKDW�DUHD�\RXU�REMHFW�EHORQJV�WR�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZRXOG�OLNH�WR�NQRZ�PRUH�DERXW�WKH�WUDQVDFWLRQ�0(���&UHDWH�SXUFKDVH�RUGHU�

�� 6HOHFW�WKH�REMHFW�IRU�ZKLFK�\RX�ZDQWWR�UHDG�WKH�GRFXPHQWDWLRQ�

�� &KRRVH� �'LVSOD\�GRFXPHQWDWLRQ�

�� 7KH�GRFXPHQWDWLRQ�EURZVHU�DSSHDUVZLWK�WKH�RQOLQH�GRFXPHQWDWLRQ�IRUWKH�VHOHFWHG�REMHFW�

'HSHQGLQJ�RQ�KRZ�\RX�VHW�XS�\RXURQOLQH�GRFXPHQWDWLRQ��WKH�EURZVHUPLJKW�ORRN�GLIIHUHQW�

3

1

2

Page 142: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–16

&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV

%DVLFV�RQ�'XSOLFDWLQJ�$FWLYLW\�*URXSV

,W�LV�DFFHSWDEOH�WR�XWLOL]H�RQO\�DFWLYLW\�JURXSV�LQ�\RXU�LPSOHPHQWDWLRQ�DQG�FUHDWH�WKHP�DVQHHGHG��+RZHYHU��6$3�SURYLGHV�WZR�PHWKRGV�WR�PDNH�DFWLYLW\�JURXS�PDLQWHQDQFH�HDVLHU�

7KHVH�WZR�FRUH�PHWKRGV�LQFOXGH�< &RS\LQJ�DFWLYLW\�JURXSV< 8VLQJ�GHULYHG�RU�LQKHULWHG�DFWLYLW\�JURXSV

7KH�GLDJUDP�EHORZ�SURYLGHV�DQ�RYHUYLHZ�RI�ZKDW�WR�H[SHFW�IURP�WKRVH�RSWLRQV�

���7KH�JUHHQ�FLUFOH�LQGLFDWHV�WKDW�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�

���7KH�UHG�;�LQGLFDWHV�WKDW�QR�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�

&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWKRXW�D�XVHU

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�

copy WITHOUT user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

7KH�FRS\��DFWLYLW\BJURXSB���FRQWDLQV�WKH�VDPHLQIRUPDWLRQ�DV�DFWLYLW\BJURXSB��H[FHSW�WKH�XVHU�

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

&RSLHG�DFWLYLW\�JURXS

&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWK�D�XVHU

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�

copy WITH user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

&RSLHG�DFWLYLW\�JURXS

7KH�FRS\��DFWLYLW\BJURXSB���LV�LGHQWLFDO�WRDFWLYLW\BJURXSB��

7KHUH�LV�QR�OLQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQG�DFWLYLW\BJURXSB��DIWHU�WKH�FRS\�SURFHVV�LVSHUIRUPHG�LQ�WKH�WZR�FDVHV�DERYH�

Page 143: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Release 4.6A/B6–17

'HULYLQJ�DQ�DFWLYLW\�JURXS

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

'HULYHG�DFWLYLW\�JURXS

Derive activity group

7KLV�LV�WKH�GHULYHG�DFWLYLW\�JURXS��$OO�WUDQVDFWLRQVIURP�WKH�RULJLQDO�DFWLYLW\�JURXSV�DUH�DOVR�LQ�WKLVRQH��<RX�FDQ�QRW�DGG�DQ\�LWHPV�WR�WKH�PHQX�7KH�DXWKRUL]DWLRQ�YDOXHV�QHHG�WR�EH�PDLQWDLQHG�

:H�DUH�JRLQJ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS��DFWLYLW\BJURXSB���IURP�$FWLYLW\BJURXSB��E\�XVLQJ�7UDQVDFWLRQ�,QKHULWDQFH�

7UDQVDFWLRQ�,QKHULWDQFH7UDQVDFWLRQ�,QKHULWDQFH

'HULYH�IURP�DFWLYLW\�JURXS 'HULYH�IURP�DFWLYLW\�JURXS

$FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$GGLQJ�WUDQVDFWLRQ�FRGHV�WR�DFWLYLW\BJURXSB��DIWHU�DFWLYLW\BJURXSB��LV�FUHDWHG�RU�JHQHUDWHG�DXWRPDWLFDOO\�LPSDFWV�DFWLYLW\BJURXSB���/LQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQGDFWLYLW\BJURXSB��LV�DOZD\V�XSGDWHG�DXWRPDWLFDOO\�ZKHQ�DFWLYLW\BJURXSB��KDV�QHZ�WUDQVDFWLRQFRGHV�DGGHG�WR�LW�

&RS\LQJ�$FWLYLW\�*URXSV

$V�VKRZQ�LQ�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV��FRS\LQJPHDQV�WKDW�\RX�UHSURGXFH�DQ�H[LVWLQJ�DFWLYLW\�JURXS��<RX�FDQ�FKRRVH�ZKHWKHU�RU�QRW�\RXZDQW�WR�FRS\�WKH�XVHU�DVVLJQPHQW�ZLWK�WKLV�DFWLYLW\�JURXS�

2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�ZKLFK�\RXZRXOG�OLNH�WR�FRS\�RU�VHOHFW�LW�E\�XVLQJ�SRVVLEOH�HQWULHV��7KHQ�FKRRVH� �WR�FRS\�LW��2Q�WKHIROORZLQJ�VFUHHQ��HQWHU�WKH�QHZ�QDPH�IRU�WKH�FRSLHG�DFWLYLW\�JURXS��)RU�D�PRUH�GHWDLOHGGHVFULSWLRQ��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV�

'HULYLQJ�$FWLYLW\�*URXSV

'HULYLQJ�DQ�DFWLYLW\�JURXS��DOVR�FDOOHG�WUDQVDFWLRQ�LQKHULWDQFH��PHDQV�\RX�FDQ�XVH�DQH[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH��(VVHQWLDOO\��WKH�V\VWHP�WUDQVIHUV�WKH�WUDQVDFWLRQV�IURPDQ�H[LVWLQJ�DFWLYLW\�JURXS��7KLV�SURFHVV�RI�GHULYLQJ�RQH�DFWLYLW\�JURXS�IURP�DQRWKHU�LV�RQO\SRVVLEOH�LI�\RX�KDYH�QRW�\HW�DVVLJQHG�DQ\�WUDQVDFWLRQV�WR�WKH�QHZ�DFWLYLW\�JURXS��7KHSUHYLRXV�DFWLYLW\�JURXS�SDVVHV�RQ�DOO�LWV�WUDQVDFWLRQV�WR�WKH�DFWLYLW\�JURXS�GHSHQGHQW�RQ�LW��,I\RX�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�LV�HDV\�WR�PDLQWDLQ�FRQVLVWHQF\�EHWZHHQ�DFFHVV�WRWUDQVDFWLRQ�FRGHV�

,I�\RX�DUH�JRLQJ�WR�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�GRHV�QRW�PDNH�PXFK�VHQVH�WR�XVHWHPSODWHV�RU�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQV�ZLWK�WKH�RULJLQDO�DFWLYLW\�JURXS��2QO\�WKHWUDQVDFWLRQ�FRGHV�DUH�SDVVHG�DORQJ�WR�WKH�GHULYHG�DFWLYLW\�JURXS��7KH�PDQXDOO\�LQVHUWHGDXWKRUL]DWLRQV�DQG�WHPSODWHV�LQ�DFWLYLW\�JURXS���ZLOO�QRW�EH�FRSLHG�LQWR�DFWLYLW\�JURXS���QRU�ZLOO�WKH�OLQNDJH�EH�PDLQWDLQHG�LI�PDQXDOO\�LQVHUWHG�LQ�DFWLYLW\�JURXS����

Page 144: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–18

$V�RI�5HOHDVH����%��LW�LV�DOVR�SRVVLEOH�WR�DGMXVW�DQG�JHQHUDWH�WKH�SURILOHV�IRU�DOO�DFWLYLW\JURXSV�GHULYHG�IURP�WKH�RULJLQDO�DFWLYLW\�JURXS��$OO�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLV�DFWLYLW\JURXS�LV�SDVVHG�WR�WKH�GHULYHG�DFWLYLW\�JURXSV��H[FHSW�IRU�WKH�RUJDQL]DWLRQDO�OHYHOV��7KHRUJDQL]DWLRQDO�OHYHOV�RI�WKH�GHULYHG�DFWLYLW\�JURXSV�UHPDLQ�XQFKDQJHG��7KH�GDWD�IRU�WKHFRUUHVSRQGLQJ�RUJDQL]DWLRQDO�OHYHO�LV�RQO\�SDVVHG�LI�QR�GDWD�KDV�EHHQ�PDLQWDLQHG�IRU�WKHRUJDQL]DWLRQDO�OHYHO�LQ�D�GHULYHG�DFWLYLW\�JURXS�

7R�H[HFXWH�WKLV�DFWLRQ��\RX�QHHG�IXOO�DXWKRUL]DWLRQ�IRU�WKH�REMHFW�6B86(5B9$/�DV�ZHOO�DV�WKHDXWKRUL]DWLRQ�WR�FKDQJH�WKH�GHULYHG�DFWLYLW\�JURXSV�

7R�DFFHVV�WKLV�IXQFWLRQDOLW\��FKRRVH�$XWKRUL]DWLRQV�→��$GMXVW�GHULYHG�DFWLYLW\�JURXSV�RQ�WKH&KDQJH�$XWKRUL]DWLRQ�'DWD�VFUHHQ�RI�WKH�RULJLQDO�DFWLYLW\�JURXS�

([DPSOH��8VDJH�RI�'HULYHG�$FWLYLW\�*URXSV

$�PDQDJHU�ZDQWV�KHU�VWDII�WR�EH�DEOH�WR�DFFHVV�DOO�WKH�WUDQVDFWLRQV�WKDW�VKH�FDQ��+RZHYHU�KHU�HPSOR\HHV�DUH�QRW�WR�KDYH�DOO�WKH�IXQFWLRQDOLW\�WKDW�HDFK�WUDQVDFWLRQ�RIIHUV�$V�VXFK��ZH�FRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG��0$1$*(5�$�$&&(66�ZLWK�WKHWUDQVDFWLRQ�FRGHV��:H�ZRXOG�DOVR�PDLQWDLQ�DOO�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKLVDFWLYLW\�JURXS��7KHQ�ZH�ZRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�(03/2<((6�0$1$*(5�$�DQG�XVH�0$1$*(5�$�$&&(66�DV�WKH�GHULYHG�DFWLYLW\�JURXS��2Q�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS·V�GHVFULSWLRQ�VFUHHQ�RI�WUDQVDFWLRQ�3)&*��LQ�WKH�ILHOG�'LYHUW$FWLYLW\�*URXS��ZH�ZRXOG�SODFH�0$1$*(5�$�$&&(66���6LQFH�RQO\�WKH�WUDQVDFWLRQV�DUHFRSLHG�LQWR�WKH�´PHQXµ��GHULYHG�IURP�0$1$*(5�$�$&&(66���ZH�VWLOO�QHHG�WR�PDLQWDLQWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��HQWHU�WKH�QDPH�IRU�\RXU�QHZDFWLYLW\�JURXS�LQ�WKH�$FWLYLW\�JURXSILHOG�

�� &KRRVH� �&UHDWH�2

3

Page 145: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Release 4.6A/B6–19

�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�ORQJ�GHVFULSWLRQ�

�� 8QGHU�7UDQVDFWLRQ�LQKHULWDQFH��VHOHFWDQ�DFWLYLW\�JURXS�IURP�ZKLFK�\RXZDQW�WR�LQKHULW�WKH�WUDQVDFWLRQV��E\HLWKHU�HQWHULQJ�WKH�QDPH�LQ�WKH'HULYH�IURP�DFWLYLW\�JURXS�ILHOG�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

�� &KRRVH�<HV�

7

4

5

6

Page 146: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–20

�� &KRRVH� �

�� 7R�UHYLHZ�WKH�LQKHULWHG�WUDQVDFWLRQV�FKRRVH�WKH�0HQX�WDE�

$OO�WKH�WUDQVDFWLRQV�IURP�\RXURULJLQDO�DFWLYLW\�JURXS�KDYH�EHHQLQKHULWHG��7KH�PHQX�LV�JRLQJ�WR�ORRNWKH�VDPH�IRU�WKH�XVHU�DV�\RX�GHILQHGLW�KHUH�

1RZ�\RX�FDQ�PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�

8

9

Page 147: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Release 4.6A/B6–21

6HOHFWLQJ�:RUNIORZ�7DVNV

:KDW�<RX�6KRXOG�.QRZ�$ERXW�:RUNIORZ

7KLV�VHFWLRQ�SURYLGHV�D�VWHS�E\�VWHS�VDPSOH�6$3�%XVLQHVV�:RUNIORZ�DQG�DQ�H[SODQDWLRQ�RIZKDW�\RX�VKRXOG�NQRZ�DERXW�WDVNV�EHIRUH�\RX�DVVLJQ�WKHP�WR�\RXU�DFWLYLW\�JURXS�

7DVNV�DUH�XVHG�WR�H[SHGLWH�D�EXVLQHVV�SURFHGXUH��$�WDVN�FDQ�EH�HLWKHU�D�VLQJOH�VWHS�WDVN�RU�DPXOWL�VWHS�WDVN��,Q�WKH�IROORZLQJ�H[DPSOH��FUHDWLQJ�WKH�5HTXHVW�IRU�/HDYH�IRUP�DQG�WKHQFKHFNLQJ�WKLV�UHTXHVW�DUH�ERWK�VLQJOH�VWHS�WDVNV��7KH�SURFHGXUH�IRU�SURFHVVLQJ�D�5HTXHVW�IRU/HDYH�IRUP�LV�D�PXOWL�VWHS�WDVN��FRQVLVWLQJ�RI�VHYHUDO�FRPELQHG�VLQJOH�VWHS�WDVNV�

7KHUH�DUH�GLIIHUHQFHV�EHWZHHQ�WKH�VLQJOH�VWHS�VWDQGDUG�WDVNV�DQG�WKH�PXOWL�VWHS�ZRUNIORZWHPSODWHV��6WDQGDUG�WDVNV�DUH�WKH�VLQJOH�VWHS�WDVNV�XVHG�LQ�6$3·V�ZRUNIORZ�WHPSODWHV��0DQ\VWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�DUH�SURYLGHG�E\�6$3�DQG�VKRXOG�QRW�EH�FKDQJHG�E\FXVWRPHUV��&XVWRPHUV�FDQ��KRZHYHU��FRS\�DQG�PRGLI\�WKHVH�WHPSODWHV�WR�FUHDWH�WKHLU�RZQVWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�

:RUNIORZ�REMHFWV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS

6WDQGDUG�WDVNV��76� 76�²�FOLHQW�LQGHSHQGHQW

:RUNIORZ�WHPSODWHV��:6� :6���FOLHQW

([DPSOH��6DPSOH�:RUNIORZ�IRU�D�1RWLILFDWLRQ�$EVHQFH

7KLV�SURFHVV�EHJLQV�ZKHQ�DQ�HPSOR\HH�VXEPLWV�D�FRPSOHWHG�5HTXHVW�IRU�/HDYH�IRUP��7KLVIRUP�LV�DXWRPDWLFDOO\�IRUZDUGHG�WR�WKH�HPSOR\HH·V�VXSHUYLVRU��,I�WKH�VXSHUYLVRU�DSSURYHVWKH�UHTXHVW��WKH�HPSOR\HH�LV�LQIRUPHG�DQG�WKH�ZRUNIORZ�HQGV��,I�WKH�VXSHUYLVRU�UHMHFWV�WKHUHTXHVW��WKH�HPSOR\HH�PXVW�GHFLGH�ZKHWKHU�KH�RU�VKH�VKRXOG�WR�UHYLVH�WKH�UHTXHVW��RUZLWKGUDZ�LW�FRPSOHWHO\��,I�WKH�HPSOR\HH�GHFLGHV�WR�UHYLVH�WKH�UHTXHVW��WKH�IRUP�LVDXWRPDWLFDOO\�UHWXUQHG�WR�WKH�HPSOR\HH·V�LQER[��DQG�WKH�ZRUNIORZ�EHJLQV�DJDLQ�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�DVVLJQ�WKH�VWDQGDUG�WDVN�&RQILUPDWLRQ�RI�/HDYH5HTXHVW�WR�WKH�DFWLYLW\�JURXS�),�6XSHUYLVRU�

Page 148: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Authorizations Made Easy6–22

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�2YHUYLHZ��2UJDQL]DWLRQ0DQDJHPHQW�DQG�ZRUNIORZ��

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�:RUNIORZ�WDE�

�� &KRRVH� �:RUNIORZ�WDVNV�

7KH�:RUNIORZ�WDE�LV�RQO\�GLVSOD\HG�LI�\RX�VHOHFWHG�2YHUYLHZ��2UJDQL]DWLRQ�0DQDJHPHQW�DQGZRUNIORZ��DW�WKH�EHJLQQLQJ�RI�WUDQVDFWLRQ�3)&*��,I�\RX�GR�QRW�VHH�WKLV�WDE��WKH�YLHZ�%DVLFPDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��ZDV�SUREDEO\�VHOHFWHG�RQ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�VFUHHQ�

�� &KRRVH� �WR�DGG�D�WDVN�

�� 6HOHFW�WKH�GHVLUHG�WDVN�W\SH��IRUH[DPSOH��6WDQGDUG�WDVN��

�� &KRRVH� �

$OWKRXJK�WKH�RSWLRQV�:RUNIORZ�WDVN�DQG�7DVN�VWLOO�DSSHDU��WKH\�DUH�QR�ORQJHU�XVHG�RUVXSSRUWHG�

�� &KRRVH� �WR�FRQWLQXH�

3

4

7

6

5

8

Page 149: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Release 4.6A/B6–23

�� 6HOHFW�WKH�GHVLUHG�LWHP��IRU�H[DPSOH�&RQILUPDWLRQ�RI�/HDYH�5HTXHVW��

��� &KRRVH� �

��� &KRRVH�WKH�FRUUHFW�WLPH�SHULRG�IRUWKH�DVVLJQPHQW�

��� &KRRVH� �

��� &KRRVH� �

7KH�VHOHFWHG�WDVN�LV�QRZ�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��(YHU\RQH�WRZKRP�WKLV�DFWLYLW\�JURXS�ZLOO�EHDVVLJQHG�FDQ�FRQILUP�WKH�OHDYHUHTXHVW�LQ�WKH�GHILQHG�WLPH�SHULRG�

9

10

1112

13

Page 150: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Deleting Activity Groups

Authorizations Made Easy6–24

'HOHWLQJ�$FWLYLW\�*URXSV

:KHQ�\RX�GHOHWH�DQ�DFWLYLW\�JURXS��WKH�V\VWHP�DXWRPDWLFDOO\�GHOHWHV�DQ\�DVVLJQPHQWVH[LVWLQJ�EHWZHHQ�WKH�DFWLYLW\�JURXS�DQG�5���XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDOXQLWV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�WKH�DFWLYLW\�JURXS�\RXZRXOG�OLNH�WR�GHOHWH�E\�HLWKHUHQWHULQJ�WKH�QDPH�LQ�WKH�$FWLYLW\JURXS�ILHOG�RU�FKRRVLQJ�SRVVLEOHHQWULHV�

�� &KRRVH� �WR�GHOHWH�WKH�DFWLYLW\JURXS�

�� &KRRVH�<HV�

9HULI\�WKDW�\RXU�DFWLYLW\�JURXS�ZDVDFWXDOO\�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVWFRPSOHWHG�HDUOLHU��2WKHUZLVH�WKHGHOHWLRQ�FDQQRW�EH�WUDQVSRUWHG�

�� &KRRVH� �

7KH�FKRVHQ�DFWLYLW\�JURXS�DQG�DOO�WKHFRUUHVSRQGLQJ�DVVLJQPHQWV�KDYHQRZ�EHHQ�GHOHWHG��7KH�DXWKRUL]DWLRQSURILOHV³LQFOXGLQJ�WKHDXWKRUL]DWLRQV�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS³DUH�DOVR�GHOHWHG�

2

3

4

5

Page 151: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Postmaintaining User Role Templates

Release 4.6A/B6–25

3RVWPDLQWDLQLQJ�8VHU�5ROH�7HPSODWHV

7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��\RX�PXVW�ILUVW�FUHDWH�RU�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHPRQVWUDWHG�KRZ�WR�XVH�WKH�XVHU�UROH�WHPSODWHV�DQGJHQHUDWHG�WKH�UHODWHG�DXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV��,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WRSRVWPDLQWDLQ�H[LVWLQJ�DFWLYLW\�JURXSV�LQ�JUHDWHU�GHWDLO�

2QFH�\RX�KDYH�GHILQHG�DQ�DFWLYLW\�JURXS��XVH�WKH�3URILOH�*HQHUDWRU��3*��WR�DXWRPDWLFDOO\JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��$XWKRUL]DWLRQV�DXWRPDWLFDOO\�JHQHUDWHG�IRU�DFWLYLW\JURXSV�XVH�6$3�VXSSOLHG�GDWD�VR�WKDW�PRVW�ILHOGV�DUH�DOUHDG\�ILOOHG�ZLWK�SURSRVHG�YDOXHV�

7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH�

�� 6WDUW�WKH�JHQHUDWLRQ�SURFHVV�

�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOV�

�� 3RVWHGLW�WKH�DXWKRUL]DWLRQV�DQG�RUJDQL]DWLRQDO�OHYHOV�

7KH�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�DOUHDG\�KDYH�VRPH�DXWKRUL]DWLRQ�GDWD��$OO�RSHQDXWKRUL]DWLRQ�ILHOGV�DQG�RUJDQL]DWLRQDO�OHYHOV�VXFK�DV�FRPSDQ\�FRGHV��EXVLQHVV�DUHDV��RUSODQWV�KDYH�WKH�DVWHULVNV�� ���IRU�IXOO�DXWKRUL]DWLRQ�DVVLJQHG��EXW�WKH�SURILOHV�DUH�QRWJHQHUDWHG�\HW�

'LIIHUHQW�6HWWLQJV�IRU�WKH�0DLQWHQDQFH�9LHZ

<RX�KDYH�GLIIHUHQW�RSWLRQV�WR�GLVSOD\�VHYHUDO�EXWWRQV�LQ�WKH�WUHH�VWUXFWXUH�IRU�WKH�PDLQWHQDQFH�SURFHVV�

7R�DFFHVV�WKH�VHOHFWLRQ�VFUHHQ��VWDUW�WKH�3*�DQG�JR�WR�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��2Q�WKH$XWKRUL]DWLRQV�WDE��FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD��&KRRVH�8WLOLWLHV�→�6HWWLQJV�WR�JHW�WR�WKH�'HILQH6HWWLQJV�IRU�8VHU�ZLQGRZ�

'LIIHUHQW�EXWWRQV�VLPSOLI\�\RXU�ZRUN��,QWKH�WUHH�VWUXFWXUH�\RX�VHH�

�²�2YHUYLHZ�RI�DXWKRUL]DWLRQ�REMHFW�XVH

�²�0HUJLQJ�VHYHUDO�DXWKRUL]DWLRQV

�²�&RS\LQJ�DXWKRUL]DWLRQ

�²�'HOHWLQJ�ILHOG�FRQWHQWV

7KH�WHFKQLFDO�QDPH�LV�GLVSOD\HG�DW�WKH�HQGRI�WKH�FRUUHVSRQGLQJ�OLQH�

6DYH�\RXU�VHWWLQJV�DIWHU�WKH�VHOHFWLRQ�

)RU�IXUWKHU�H[SODQDWLRQ�RI�WKH�LFRQV��FKRRVH�RQ�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�

Page 152: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Authorizations Made Easy6–26

0DLQWDLQLQJ�DQG�*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV

,Q�WKLV�VHFWLRQ��ZH�DVVXPH�WKH�DFWLYLW\�JURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�DQG�VDYHG��:H�VKRZ�KRZ�WRJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WRPDLQWDLQ�DQG�FKRRVH� �&KDQJH��IRUH[DPSOH��00B%8<(5B$*��

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQSURILOHV�KDYH�EHHQ�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS��<RX�FDQ�DOVR�VHH�WKHVWDWXV�IRU�WKH�DXWKRUL]DWLRQ�SURILOH�LQWKH�,QIRUPDWLRQ�RQ�DXWKRUL]DWLRQ�SURILOHER[�

2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKHDXWKRUL]DWLRQV�GDWD�DSSHDUVKLHUDUFKLFDOO\�

7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKHILUVW�OHYHO��KLJKOLJKWHG�LQ�EOXH��8QGHUQHDWK�\RX�ILQG�OLQHVKLJKOLJKWHG�DV�IROORZV�< �2EMHFW�FODVVHV� �RUDQJH< �$XWKRUL]DWLRQ�REMHFW� �JUHHQ< �$XWKRUL]DWLRQ� �\HOORZ< �$XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH

7R�YLHZ�WKH�OHJHQG�IRU�WKH�LFRQVDQG�FRORUV�FKRRVH� �

�� 7R�PDLQWDLQ�RU�FKDQJH�WKH�DFWLYLW\�GRXEOH�FOLFN�RQ�WKH�HQWU\�QH[W�WR�WKHDFWLYLW\�ILHOG�

5

Tip

4

Tip

3

Page 153: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Release 4.6A/B6–27

7R�GLVSOD\�DOO�VHOHFWHG�WUDQVDFWLRQV�WKDW�FKHFN�WKLV�DXWKRUL]DWLRQ�REMHFW�IRU�WKH�XQGHUO\LQJDFWLYLW\�JURXS��FKRRVH� �

([SODQDWLRQ�RI�WKH�OLJKWV��*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

�� 6HOHFW�RU�GHVHOHFW�DOO�GHVLUHG�YDOXHVIRU�WKH�DFWLYLW\��\RX�FDQ�XVH�)XOODXWKRUL]DWLRQ��

�� 7R�WUDQVIHU�\RXU�VHOHFWLRQ��FKRRVH�

�� 7R�PDLQWDLQ�WKH�YDOXHV�IRU�WKH�RSHQDXWKRUL]DWLRQV��FOLFN�QH[W�WR�WKHDXWKRUL]DWLRQ�ILHOG�QDPH�

�� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\�

��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �

9

7

6

8

10

Page 154: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Authorizations Made Easy6–28

$IWHU�PDLQWDLQLQJ�WKH�DFWLYLW\�DQGWKH�ILHOG�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�WKH�OLJKW�FKDQJHV�IURP�\HOORZ�WRJUHHQ�

��� 7R�PDLQWDLQ�WKH�PLVVLQJRUJDQL]DWLRQDO�OHYHOV��FOLFN�RQ�WKHILHOG�QH[W�WR�WKH�DXWKRUL]DWLRQ�ILHOGQDPH��IRU�H[DPSOH��&RPSDQ\�&RGHXQGHU�WKH�REMHFW�$XWKRUL]DWLRQ�IRU&RPSDQ\�&RGHV��

��� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

�)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\��

��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �

$IWHU�PDLQWDLQLQJ�WKH�PLVVLQJ�GDWDIRU�WKLV�RUJDQL]DWLRQDO�OHYHO��WKH�OLJKWFKDQJHV�IURP�UHG�WR�JUHHQ�

3URFHHG�ZLWK�WKH�RWKHU�RSHQ�ILHOGV�LQWKH�VDPH�ZD\�XQWLO�DOO�OLJKWV�KDYHFKDQJHG�WR�JUHHQ�

��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �

7R�DVVLJQ�IXOO�DXWKRUL]DWLRQV�WR�DOO�RSHQILHOGV��FOLFN�RQ�WKH�\HOORZ�OLJKW�DW�WKHWRS��QH[W�WR�WKH�DFWLYLW\�JURXS�

11

12

13

14

Tip

Page 155: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Release 4.6A/B6–29

5HPHPEHU�WR�PDLQWDLQ�HDFK�RSHQ�DXWKRUL]DWLRQ�ILHOG�ZLWK�D�VXLWDEOH�YDOXH��)RU�VRPHDXWKRUL]DWLRQV��HQWHU�D�VXLWDEOH�YDOXH�LQ�$XWKRUL]DWLRQ�JURXS��,I�\RX�DUH�QRW�VXUH�RI�DVXLWDEOH�YDOXH��XVH�WKH�DVWHULVN�� ��WR�DVVLJQ�RYHUDOO�DXWKRUL]DWLRQ�IRU�XQPDLQWDLQHG�ILHOGV�5HPHPEHU�WKDW�\RX�FDQ�DOZD\V�FKDQJH�YDOXHV�ODWHU�

:KHQ�DOO�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�DQG�\RX�KDYH�VDYHG�\RXUFKDQJHV��JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH�

��� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQV�FKRRVH� �

7KH�V\VWHP�JHQHUDWHV�DQ�DXWKRUL]DWLRQ�IRU�HDFK�DXWKRUL]DWLRQ�LQ�WKH�WUHH�DQG�DQDXWKRUL]DWLRQ�SURILOH�IRU�WKH�DFWLYLW\�JURXS�WKDW�DSSOLHV�WR�WKH�HQWLUH�WUHH�

��� 7KH�$VVLJQ�3URILOH�1DPH�IRU�*HQHUDWHG$XWKRUL]DWLRQ�3URILOH�GLDORJ�ER[DSSHDUV��7KH�V\VWHP�VXJJHVWV7B�LQWHUQDO�QXPEHU!�DV�WKH�GHIDXOWSURILOH�QDPH�

��� &KRRVH� �

7KH�VKRUW�SURILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU��+RZHYHU��WKH�ORQJ�WH[W�IRU�WKH�SURILOH�FDQEH�FKDQJHG�DW�DQ\�WLPH�

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�$XWKRUL]DWLRQV�*HQHUDWHG�ZLWKWKH�3*

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

15

16

17

Page 156: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Displaying an Overview of Generated Profiles

Authorizations Made Easy6–30

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZR�GLJLWVDUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHWKHQ�QDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

7KH�DXWKRUL]DWLRQ�REMHFW�6B86(5B352�LV�FKHFNHG�GXULQJ�DXWKRUL]DWLRQ�PDLQWHQDQFH��7KHREMHFW�LV�GHILQHG�ZLWK�WKH�IROORZLQJ�ILHOGV��$XWKRUL]DWLRQ�SURILOH�DQG�$FWLYLW\��,Q$XWKRUL]DWLRQ�SURILOH��HQWHU�WKH�DXWKRUL]DWLRQ�SURILOHV�WKDW�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRUFDQ�PDLQWDLQ�RU�WKDW�XVHU�DGPLQLVWUDWRUV�FDQ�DVVLJQ�WR�WKHLU�XVHUV��,Q�$FWLYLW\��\RX�FDQOLPLW�ZKDW�WKH�DGPLQLVWUDWRU�LV�DOORZHG�WR�GR�

,I�\RX�ZDQW�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�ZKR�FDQ�PDLQWDLQ�RQO\�FHUWDLQSURILOHV��VHW�XS�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�

'LVSOD\LQJ�DQ�2YHUYLHZ�RI�*HQHUDWHG�3URILOHV

$IWHU�VXFFHVVIXOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOHV��WR�ILQG�RXW�KRZ�PDQ\�SURILOHV�ZHUHJHQHUDWHG��\RX�KDYH�WR�NQRZ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$PD[LPXP�RI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��ZLWK�WKH�ODVW�WZR�GLJLWV�XVHG�DV�D�FRXQWHU�

,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKH�DGGLWLRQDOSURILOHV�DUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�RULJLQDO�SURILOH·V�XVHUV��7KH�XVHU�PDVWHU�RI�WKLVXVHU�LV�DXWRPDWLFDOO\�XSGDWHG�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GLVSOD\�WKH�RYHUYLHZ�RI�WKH�JHQHUDWHGSURILOHV�IRU�WKH�DFWLYLW\�JURXS�6$3B$//B',63/$<B$*��ZKLFK�FRQWDLQ�WKH�DXWKRUL]DWLRQ�WRGLVSOD\�´HYHU\WKLQJµ�H[FHSW�IRU�+5�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZRXOG�OLNH�WR�YLHZ��IRU�H[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�$XWKRUL]DWLRQ�'DWD�

Page 157: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Displaying an Overview of Generated Profiles

Release 4.6A/B6–31

�� &KRRVH�$XWKRUL]DWLRQV�→�3URILOH2YHUYLHZ�

,I�WKH�JHQHUDWHG�DXWKRUL]DWLRQSURILOHV�DUH�DOUHDG\�DFWLYH��WKH�GLDORJER[�SURYLGHV�DQ�RYHUYLHZ�RI�WKHFXUUHQW�SURILOH�ZLWK�SURILOH�QDPH�ORQJ�WH[W��DQG�WKH�VWDWXV�RI�WKHYHUVLRQ�

5

Page 158: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Authorizations Made Easy6–32

5HJHQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ

&KDQJHV

:KHQ�DQ�DFWLYLW\�JURXS�LV�FKDQJHG��IRU�H[DPSOH�DIWHU�\RX�DGG�WUDQVDFWLRQV��UHJHQHUDWH�LWVDXWKRUL]DWLRQ�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*�

)RU�WKH�IROORZLQJ�H[DPSOH��ZH�KDYH�WDNHQ�WKH�DFWLYLW\�JURXS�00B%8<(5B$*�DGGHG�VRPHWUDQVDFWLRQV�DQG�VDYHG�WKH�FKDQJHV��1RZ�ZH�KDYH�VRPH�PRUH�DXWKRUL]DWLRQV�WKDW�QHHG�WR�EHPDLQWDLQHG�DQG�WKH�DFWLYLW\�JURXS�QHHGV�WR�EH�UHJHQHUDWHG�

:KHQ�\RX�FKDQJH�DQ�DFWLYLW\�JURXS��WKH�VWDWXV�RQ�WKH�$XWKRUL]DWLRQV�WDE�LQGLFDWHV�ZKHWKHUD�SURILOH�LV�FXUUHQW�RU�QRW��,I�WKH�GLVSOD\�VKRZV�D�UHG�RU�\HOORZ�OLJKW��WKH�SURILOH�LV�QRWFXUUHQW��7KH�VWDWXV�WH[W�RQ�WKH�VFUHHQ�H[SODLQV�ZK\�WKH�SURILOH�LV�QRW�FXUUHQW�< 5HG�OLJKW�DQG�WKH�WH[W�3URILOH�FRPSDULVRQ�UHTXLUHG

7KH�PHQX�KDV�EHHQ�FKDQJHG�VLQFH�WKH�SURILOH�ZDV�ODVW�JHQHUDWHG��7KHUHIRUH�WKH�SURILOHLV�QRW�FXUUHQW�DQG�WKH�DXWKRUL]DWLRQ�SURILOHV�QHHGV�WR�EH�UHJHQHUDWHG��<RX�PD\�DOVRKDYH�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�

< <HOORZ�OLJKW

7KH�SURILOH�KDV�EHHQ�FKDQJHG�DQG�VDYHG�VLQFH�LW�ZDV�ODVW�JHQHUDWHG��WKH�SURILOH�LV�QRWFXUUHQW�DQ\PRUH��DQG�WKH�DXWKRUL]DWLRQ�SURILOH�QHHGV�WR�EH�UHJHQHUDWHG�

< ,I�\RX�DUH�XQVXUH�ZKHWKHU�DQ�DXWKRUL]DWLRQ�SURILOHV�VKRXOG�EH�UHJHQHUDWHG�

1��5XQ�WUDQVDFWLRQ�SUPC�2��6HOHFW�$OVR�DFW��JUSV�WR�EH�DGMXVWHG�3��&KRRVH� �WR�H[HFXWH�WKH�WUDQVDFWLRQ�

7KH�V\VWHP�JHQHUDWHV�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�ZLWK�H[LVWLQJ�DXWKRUL]DWLRQ�GDWD�LQ�WKHV\VWHP��$FWLYLW\�JURXSV�LQ�UHG�QHHG�WR�EH�UHJHQHUDWHG�DIWHU�SRVWPDLQWDLQLQJ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��6HOHFW�RQH�RI�WKHVH�DFWLYLW\�JURXSV�DQG�FKRRVH�0DLQWDLQ�SURILOH��)URPSUPC��FDOO�WUDQVDFWLRQ�PFCG�DQG�SURFHHG�DV�GHVFULEHG�EHORZ�

Page 159: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Release 4.6A/B6–33

3UHUHTXLVLWH��<RX�PXVW�PDNH�FKDQJHV�WRDQ�DFWLYLW\�JURXS�DQG�VDYH�WKHP�EHIRUH\RX�FDQ�UHJHQHUDWH�DXWKRUL]DWLRQSURILOHV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�

,Q�H[SHUW�PRGH��\RX�FDQ�VHOHFW�H[SOLFLWO\WKH�RSWLRQ�ZLWK�ZKLFK�\RX�ZDQW�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�YDOXHV��7KLVRSWLRQ�LV�DXWRPDWLFDOO\�VHW�FRUUHFWO\�LQQRUPDO�PRGH�

�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWKQHZ�GDWD�

�� &KRRVH� �

2SWLRQV�RQ�WKH�'HILQH�0DLQWHQDQFH�7\SH�VFUHHQ�< 'HOHWH�DQG�UHFUHDWH�SURILOH�DQG�DXWKRUL]DWLRQV

$OO�DXWKRUL]DWLRQV�DUH�UH�FUHDWHG��9DOXHV�WKDW�KDYH�SUHYLRXVO\�EHHQ�PDLQWDLQHG�FKDQJHG��RU�HQWHUHG�PDQXDOO\�DUH�ORVW��2QO\�WKH�PDLQWDLQHG�YDOXHV�IRU�RUJDQL]DWLRQDOOHYHOV�UHPDLQ�

< (GLW�ROG�VWDWXV

<RX�FDQ�HGLW�WKH�DXWKRUL]DWLRQ�SURILOH�\RX�SUHYLRXVO\�PDLQWDLQHG�ZLWK�LWV�ROG�YDOXHV�,W�LV�QRW�ZRUWK�HGLWLQJ�LI�WKH�DVVLJQPHQW�RI�WUDQVDFWLRQV�WR�DFWLYLW\�JURXSV�KDVFKDQJHG�

< 5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�QHZ�GDWD

7KH�3*�FRPSDUHV�WKH�ROG�DQG�FXUUHQW�GDWD�IURP�WKH�DFWLYLW\�JURXS��7KLV�FKRLFH�LV�WKHEHVW�RSWLRQ�LI�WKH�DFWLYLW\�JURXS�KDV�FKDQJHG��8QFKDQJHG�GDWD�LV�PDUNHG�DV�2OG��QHZGDWD�DV�1HZ�

3

4

5

Page 160: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Authorizations Made Easy6–34

:H�DGGHG�D�IHZ�WUDQVDFWLRQV�WR�WKHDFWLYLW\�JURXS��7KH�SUHYLRXVO\PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUHNHSW��:KHQ�QHZ�RUJDQL]DWLRQDO�OHYHOVDUH�DGGHG��WKH\�PXVW�EH�PDLQWDLQHG�

�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOVZLWK�WKH�ULJKW�YDOXHV��RU�FKRRVH�)XOODXWKRUL]DWLRQ�WR�ILOO�DOO�EODQNV�ZLWKDVWHULVNV�� ���:H�FKRVH�)XOODXWKRUL]DWLRQ�LQ�RXU�H[DPSOH��

�� &KRRVH� �

2OG�DXWKRUL]DWLRQV�DUH�PDUNHG�2OG�QHZ�DXWKRUL]DWLRQV�DUH�PDUNHG�1HZ�

�� 0DLQWDLQ�WKH�RSHQ�ILHOGV�DVGHVFULEHG�LQ�0DLQWDLQLQJ�DQG*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHVRQ�SDJH��²���

�� &KRRVH� �

6

7

8

9

Page 161: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Release 4.6A/B6–35

3OHDVH�NHHS�WKH�IROORZLQJ�LQ�PLQG�ZKHQ�PDNLQJ�WKH�SRVW�FKDQJH�FRPSDULVRQ�< 3UHYLRXVO\�PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUH�NHSW��,I�QHZ�RUJDQL]DWLRQDO�OHYHOV�DUH

DGGHG��\RX�PXVW�PDLQWDLQ�WKHVH�OHYHOV�< ,I�DXWKRUL]DWLRQV�ZLWKLQ�DQ�DXWKRUL]DWLRQ�REMHFW�KDYH�FKDQJHG��\RX�QHHG�WR�H[HFXWH

WKH�FRPSDULVRQ�PDQXDOO\��<RX�PXVW�GHFLGH�ZKHWKHU�WR�NHHS�WKH�ROG�PRGLILHG�GDWD�RUXVH�WKH�FXUUHQW�GDWD��'HOHWH�RU�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�\RX�QR�ORQJHU�UHTXLUH�

< 0DLQWDLQHG�DXWKRUL]DWLRQV�DUH�FRQILJXUHG�ZLWK�WKH�YDOXHV�\RX�PDLQWDLQHG�IRU�WKHP�)RU�H[DPSOH��IRU�DXWKRUL]DWLRQ�JURXS�������FHUWDLQ�DFWLYLWLHV��,QVHUW��&KDQJH��DQG'LVSOD\��DQG�PDLQWDLQHG�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�WUDQVDFWLRQV�DUHUHTXLUHG��\RX�PDLQWDLQHG�WKH�YDOXH�IRU�DXWKRUL]DWLRQ�JURXS���&KDQJH�WKH�DFWLYLW\JURXS�VR�WKDW�WKH�IROORZLQJ�DFWLYLWLHV�DULVH��&KDQJH��'LVSOD\��DQG�'HOHWH��7KH�YDOXH�����LV�FRSLHG�IRU�WKH�DXWKRUL]DWLRQ�JURXS�IRU�&KDQJH�DQG�'LVSOD\��WKHVH�DFWLYLWLHV�ZHUHDOUHDG\�PDLQWDLQHG���7KH�,QVHUW�RSWLRQ�GLVDSSHDUV��)RU�WKH�'HOHWH�DFWLYLW\��PDLQWDLQ�WKHDXWKRUL]DWLRQ�JURXS�DJDLQ��VLQFH�WKLV�JURXS�ZDV�QRW�PDLQWDLQHG�LQ�WKH�ROG�SURILOH·VVWDWXV�

< :KHUHYHU�WKH�1HZ�DWWULEXWH�DSSHDUV��FKHFN�LI�WKH�QHZ�DXWKRUL]DWLRQV�PDNH�VHQVH��\RXFDQ�FRPSDUH�WKHP�PDQXDOO\�ZLWK�WKH�ROG�YDOXHV��

< 0DQXDOO\�HQWHUHG�DXWKRUL]DWLRQV�DUH�QRW�GHOHWHG�7KH�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�DUH�DOZD\V�DXWRPDWLFDOO\�ILOOHG�ZLWKWKH�FXUUHQW�WUDQVDFWLRQ�IURP�WKH�DFWLYLW\�JURXS��EXW�KDYH�WKH�DWWULEXWH�2OG�

:KHQ�WKHUH�DUH�RQO\�JUHHQ�OLJKWV�LQ�WKHWUHH��WKHUH�DUH�QR�PRUH�RSHQDXWKRUL]DWLRQ�ILHOGV�WR�PDLQWDLQ�

��� &KRRVH� �WR�UHJHQHUDWH�WKH�H[LVWLQJDXWKRUL]DWLRQ�SURILOHV�

$IWHU�WKH�UHJHQHUDWLRQ�RI�WKHDXWKRUL]DWLRQ�SURILOHV�LV�ILQLVKHG�\RX�FDQ�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�

10

Page 162: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Using Utilities to Change Generated Authorizations

Authorizations Made Easy6–36

8VLQJ�8WLOLWLHV�WR�&KDQJH�*HQHUDWHG�$XWKRUL]DWLRQV

7KHUH�DUH�WZR�RSWLRQV�WR�DOWHU�WKH�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV��7KHVH�RSWLRQV�DUH�IRXQG�LQWUDQVDFWLRQ�3)&*��XQGHU�WKH�8WLOLWLHV�PHQX�LQ�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ�

0HUJLQJ�$XWKRUL]DWLRQV

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�8WLOLWLHV�→�0HUJHDXWKRUL]DWLRQV�

�� 7KH�V\VWHP�DXWRPDWLFDOO\VXPPDUL]HV�DOO�SRVVLEOHDXWKRUL]DWLRQV�DQG�WKH�UHVXOWDSSHDUV�LQ�D�V\VWHP�PHVVDJH�

,Q�RXU�H[DPSOH��WKH�VWDWXV�EDU�VKRZVWKDW�ILYH�DXWKRUL]DWLRQV�KDYHFRPELQHG�ZLWK�RWKHUV�

4

5

Page 163: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Using Utilities to Change Generated Authorizations

Release 4.6A/B6–37

5HRUJDQL]LQJ�7HFKQLFDO�1DPHV�RI�$XWKRUL]DWLRQV

7KH�WHFKQLFDO�QDPH�RI�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�DQG�DWZR�GLJLW�QXPEHU�EHWZHHQ����DQG����

7��LQWHUQDO�QXPEHU!QQ��IRU�H[DPSOH��7�����������

,I�WKH�DXWKRUL]DWLRQ�SURILOHV�FKDQJHG�DV�D�UHVXOW�RI�FKDQJHV�LQ�WKH�DSSURSULDWH�DFWLYLW\�JURXS��UHRUJDQL]H�WKHQXPEHUV�WR�DYRLG�QXPEHU�DVVLJQPHQW�SUREOHPV��7KH�IROORZLQJ�SURFHGXUH�UHVWDUWV�WKH�QXPEHU�DVVLJQPHQWIURP�����:KHQHYHU�\RX�JHQHUDWH�D�QHZ�DXWKRUL]DWLRQ�SURILOH��WKLV�UHRUJDQL]DWLRQ�LV�DXWRPDWLFDOO\�WDNHQLQWR�DFFRXQW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�8WLOLWLHV�→�5HRUJDQL]H�

7KH�V\VWHP�DXWRPDWLFDOO\UHRUJDQL]HV�WKH�ILQDO�GLJLWV�RI�WKHDXWKRUL]DWLRQV�WHFKQLFDO�QDPHV�DQGWKH�UHVXOW�DSSHDUV�LQ�D�V\VWHPPHVVDJH��IRU�H[DPSOH��$XWKRUL]DWLRQVZHUH�UHRUJDQL]HG��

4

Page 164: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–38

&XVWRPL]LQJ�$XWKRUL]DWLRQV

6$3�GHOLYHUV�D�XVHU�UROH�WHPSODWH�IRU�WKH�&XVWRPL]LQJ�3URMHFW�0HPEHU��ZKLFK�LV�FDOOHG6$3B%&B&86B&86720,=(5B$*��7KLV�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�DQ\�SHUVRQ�GRLQJ�FXVWRPL]LQJ�LQ5����,Q�DGGLWLRQ��\RX�FDQ�DVVLJQ�SURMHFWV�RU�YLHZV�RI�WKH�,PSOHPHQWDWLRQ�*XLGH��,0*��WR�DQ�DFWLYLW\�JURXS�7KH�DLP�RI�WKLV�DVVLJQPHQW�LV�WR�JHQHUDWH�DXWKRUL]DWLRQV�IRU�DQG�DVVLJQ�XVHUV�WR�VSHFLILF�,0*�DFWLYLWLHV��7KDWLQVXUHV�WKDW�XVHUV�DUH�RQO\�DOORZHG�WR�SHUIRUP�WDVNV�LQ�WKHLU�FXVWRPL]LQJ�SURMHFW�DQG�QRW�LQ�DQ\�RWKHU�:KHQ�\RX�JHQHUDWH�SURILOHV��LW�DOVR�JHQHUDWHV�WKH�DXWKRUL]DWLRQV�QHFHVVDU\�WR�H[HFXWH�DOO�DFWLYLWLHV�LQ�WKHDVVLJQHG�,0*�SURMHFWV�RU�SURMHFW�YLHZV�

$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV

,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FXVWRPL]LQJ�DFWLYLW\�JURXS�IRU�D�40FXVWRPL]LQJ�SURMHFW��7KHUHIRUH��ZH�ZLOO�FUHDWH�D�QHZ�DFWLYLW\�JURXS�FDOOHG�40B&86720,=,1*�DQG�DVVLJQWKH�40�FXVWRPL]LQJ�SURMHFW�WR�LW��<RX�FDQ�DVVLJQ�GLIIHUHQW�SURMHFW�YLHZV�LI�DYDLODEOH�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�DQDPH�IRU�\RXU�QHZ�DFWLYLW\�JURXS�

�� &KRRVH� �&UHDWH�

3

2

Page 165: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–39

�� (QWHU�D�VKRUW�GHVFULSWLRQ�LQ�WKH'HVFULSWLRQ�ILHOG�

�� (QWHU�D�ORQJ�WH[W�GHVFULSWLRQ�IRU�WKHDFWLYLW\�JURXS��RSWLRQDO��

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�0HQX�WDE�

�� &KRRVH�8WLOLWLHV�→�&XVWRPL]LQJ�DXWK�

<RX�FDQ�VHH�WKH�VWDWXV�RI�WKH�DFWLYLW\JURXS�LQ�WKH�GLDORJ�ER[�

�� &KRRVH� �$GG�WR�DVVLJQ�DFXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZWR�WKH�DFWLYLW\�JURXS�

��� 6HOHFW�,0*�SURMHFW�RU�,0*�SURMHFWYLHZ��GHSHQGLQJ�RQ�ZKDW�\RX�ZRXOGOLNH�WR�DVVLJQ��,Q�RXU�H[DPSOH��ZHDVVLJQHG�DQ�,0*�SURMHFW�

��� &KRRVH� �

��� 6HOHFW�WKH�GHVLUHG�SURMHFW�RU�SURMHFWYLHZ��LQ�WKLV�H[DPSOH��ZH�VHOHFWHGWKH�SURMHFW�40B&86720��

��� &KRRVH� �

��� &KRRVH� �WR�FRQWLQXH�

4

5

6

7

8

9

10

11

12

13

14Tip

Page 166: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–40

7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW

2Q�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQV�VFUHHQ��LI�WKHUH�DUH�XVHUV�DVVLJQHG�WR�WKH�,0*�SURMHFWWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�WKLV�DFWLYLW\�JURXS��FKRRVH� �8VHU��7KLV�DFWLRQ�FRSLHV�WKHXVHUV�IURP�WKH�,0*�SURMHFW�WR�WKH�DFWLYLW\�JURXS�

1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�FKDQJHV�DUH�PDGH�LQ�WKH�,0*SURMHFW�DGPLQLVWUDWLRQ�

7KH�V\VWHP�DXWRPDWLFDOO\GHWHUPLQHV�WKH�WUDQVDFWLRQ�FRGHVDQG�DGGLWLRQDO�DXWKRUL]DWLRQ�REMHFWVWKDW�DUH�UHTXLUHG�WR�PDLQWDLQ�WKHWDEOHV�IRU�WKLV�,0*�SURMHFW�RU�SURMHFWYLHZ��DQG�LPSRUWV�WKHP�LQWR�WKHDFWLYLW\�JURXS�

��� 7R�VDYH�\RXU�DFWLYLW\�JURXS��FKRRVH�

<RX�FDQQRW�PDQXDOO\�DVVLJQWUDQVDFWLRQV�WR�WKLV�DFWLYLW\�JURXS�QRUFDQ�\RX�VHOHFW�DQ\�IURP�WKH�6$3�PHQX�1RWH�WKDW�WKH�EXWWRQV�WR�GR�WKLV�KDYHYDQLVKHG�

15

Tip

Page 167: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–41

��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�WRFRQWLQXH�WKH�JHQHUDWLRQ�SURFHVV�

��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,I�QHFHVVDU\��WKH�GLDORJ�ER[�'HILQH2UJ��/HYHOV�DSSHDUV�

��� (QWHU�WKH�DSSURSULDWH�GDWD��<RX�FDQJLYH�IXOO�DXWKRUL]DWLRQV�E\�FKRRVLQJ)XOO�DXWKRUL]DWLRQ�LQ�WKH�ORZHU�ULJKWFRUQHU�

��� &KRRVH� �

16

17

18

19

Page 168: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–42

��� 0DLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV�LQGLFDWHG�E\�WKH�\HOORZ�OLJKW

�DV�GHVFULEHG�HDUOLHU�LQ�WKLVERRN��,Q�RXU�H[DPSOH��ZH�FKRVH�IXOODXWKRUL]DWLRQ�E\�FOLFNLQJ�RQ�WKHXSSHU�PRVW�\HOORZ�OLJKW�

,I�\RX�FKRRVH�IXOO�DXWKRUL]DWLRQV��DFRQILUPDWLRQ�VFUHHQ�DSSHDUV�

��� &KRRVH� �WR�FRQWLQXH�

$OO�RSHQ�DXWKRUL]DWLRQV�DUH�ILOOHGZKHQ�DOO�WKH�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�

��� 6DYH�WKH�DFWLYLW\�JURXS�

20

21

22

Page 169: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–43

��� 2Q�WKH�$VVLJQ�3URILOH�1DPH�IRU*HQHUDWHG�$XWKRUL]DWLRQ�3URILOH�VFUHHQ�\RX�KDYH�WKH�RSWLRQ�WR�FKDQJH�WKH3URILOH�QDPH��<RX�ZLOO�QRW�EH�DEOH�WRFKDQJH�LW�ODWHU�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�DFWLYLW\�JURXS�FKRRVH� �

��� 7R�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�FKRRVH� �

<RX�KDYH�QRZ�FUHDWHG�D�FXVWRPL]LQJDFWLYLW\�JURXS�DQG�DVVLJQHGDXWKRUL]DWLRQ�GDWD�WR�LW�

,I�WKHUH�DUH�QR�XVHUV�DVVLJQHG�WR�WKHVHOHFWHG�,0*�SURMHFW�RU�LI�\RX�FKRVHQRW�WR�FRS\�WKHP�WR�WKH�DFWLYLW\JURXS�LQ�DQ�HDUOLHU�VWHS��\RX�VWLOOKDYH�WR�GR�VR��&KRRVH�WKH�8VHUV�WDEWR�DVVLJQ�XVHUV�WR�WKH�DFWLYLW\�JURXS�DV�GHPRQVWUDWHG�LQ�FKDSWHUV���DQG���

23

24

25

26

Page 170: Authorizations Made Easy

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–44

,I�WKH�,0*�SURMHFW�KDV�FKDQJHG��\RX�VKRXOG�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLVDFWLYLW\�JURXS��7KH�ILUVW�VWHS�LV�WR�FKRRVH� �5HIUHVK�RQ�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQVGLDORJ�ER[��VHH�VWHS����RQ�SDJH��²�����7KLV�DFWLRQ�UHFDOFXODWHV�WKH�WUDQVDFWLRQ�FRGHV��<RXPXVW�WKHQ�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�

7R�DVVLJQ�XVHUV�WR�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��\RX�FDQ�WUDQVIHU�WKH�XVHUV�WKDW�DUHDOUHDG\�DVVLJQHG�WR�WKH�FXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZ��<RX�FDQ�DOVR�DVVLJQ�DQ\�RWKHUXVHU�WR�WKLV�FXVWRPL]LQJ�DFWLYLW\�JURXS�

<RX�VKRXOG�FRQVLGHU�XVLQJ�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWH6$3B%&B&86B&86720,=(5B$*�IRU�HYHU\�FXVWRPL]LQJ�SURMHFW�PHPEHU�

Page 171: Authorizations Made Easy

7–1

&KDSWHU��� 3UHSDULQJ�WKH�5��

(QYLURQPHQW�IRU�*R�/LYH

&RQWHQWV

Overview ..................................................................................................................7–2

Transports Between Clients ..................................................................................7–2

Transports Between R/3 Systems.........................................................................7–3

Transporting Activity Groups ................................................................................7–3

Transporting Check Indicators and Field Values ................................................7–8

Transporting Authorization Templates.................................................................7–8

Transporting User Master Records.......................................................................7–8

��

Page 172: Authorizations Made Easy

Chapter 7: Preparing the R/3 Environment for Go-Live

Overview

Authorizations Made Easy7–2

2YHUYLHZ

:KHQ�\RX�ILQLVK�XVLQJ�RQH�RI�WKH�WKUHH�SRVVLEOH�PHWKRGV�IRU�ZRUNLQJ�ZLWK�XVHU�UROHWHPSODWHV³DQG�\RX�KDYH�PDLQWDLQHG�DQG�JHQHUDWHG�DOO�QHFHVVDU\�DXWKRUL]DWLRQV³\RX�FDQSUHSDUH�IRU�JR�OLYH��3UHSDUDWLRQ�PHDQV�WKDW�\RX�KDYH�WR�WUDQVSRUW�HYHU\WKLQJ�\RX�KDYHFUHDWHG�LQ�\RXU�'(9�V\VWHP�WR�\RXU�4$6�V\VWHP��DQG�ILQDOO\�WR�\RXU�35'�V\VWHP��VHHFKDSWHU���RQ�WKH�WKUHH�V\VWHP�HQYLURQPHQW��

<RX�FDQ�WUDQVSRUW�HLWKHU�EHWZHHQ�FOLHQWV��ZLWKLQ�DQ�5���6\VWHP��RU�EHWZHHQ�5���6\VWHPV�'HSHQGLQJ�RQ�WKH�W\SH�RI�WUDQVSRUW��\RX�FDQ�WUDQVSRUW�WKH�IROORZLQJ�LWHPV�< $FWLYLW\�JURXSV< &RPSRVLWH�DFWLYLW\�JURXSV< $XWKRUL]DWLRQ�SURILOH�GDWD< $XWKRUL]DWLRQ�GDWD< 8VHU�PDVWHU�UHFRUGV

7UDQVSRUWV�%HWZHHQ�&OLHQWV

7KH�LWHPV�LQ�WKH�OLVW�DERYH�DUH�FOLHQW�GHSHQGHQW��7KHUHIRUH��VHSDUDWH�UHFRUGV��DFWLYLW\�JURXSV�SURILOHV��DQG�DXWKRUL]DWLRQV�PXVW�EH�PDLQWDLQHG�IRU�HDFK�5���FOLHQW��7UDQVDFWLRQ�6&&/��7RROV→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ�→�&OLHQW�&RS\�→�6&&/�¥�/RFDO&RS\���ZKLFK�PXVW�EH�UXQ�IURP�WKH�WDUJHW�FOLHQW��WUDQVSRUWV�XVHU�PDVWHU�UHFRUGV�DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�EHWZHHQ�FOLHQWV��$V�RI�5HOHDVH����$��DFWLYLW\JURXSV�DUH�FRSLHG�ZLWK�&XVWRPL]LQJ�

:KHQ�\RX�FDUU\�RXW�D�WUDQVSRUW��DOO�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�LQ�WKHWDUJHW�V\VWHP�ZLWK�WKH�VDPH�QDPHV�DV�LWHPV�LQ�WKH�WUDQVSRUW�ZLOO�EH�RYHUZULWWHQ�7KHUHIRUH��GR�QRW�XVH�6&&/�LI�\RXU�WDUJHW�FOLHQW�FRQWDLQV�DXWKRUL]DWLRQV�DQG�XVHU�PDVWHUUHFRUGV�WKDW�\RX�ZDQW�WR�NHHS��2QO\�XVH�6&&/�WR�FUHDWH�D�QHZ�FOLHQW�ZLWK�WKH�REMHFWV6$3B&867��XVHUV�ZLOO�EH�NHSW��RU�6$3B8&86��XVHUV�FRPH�IURP�WKH�VRXUFH�FOLHQW��

6LQFH�DFWLYLW\�JURXSV�EHORQJ�WR�&XVWRPL]LQJ��WKH\�DUH�FRSLHG�DXWRPDWLFDOO\�GXULQJ�FOLHQWFRS\��,W�LV�DOVR�SRVVLEOH�WR�FRS\�WKHP�PDQXDOO\��VHH�EHORZ��

7KH�WUDQVDFWLRQ�GRFXPHQWDWLRQ�FRQWDLQV�DGGLWLRQDO�LQIRUPDWLRQ�DERXW�WKH�QHFHVVDU\DXWKRUL]DWLRQV��8VH�WUDQVDFWLRQ�6&&���7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ�→�6SHFLDO�)XQFWLRQV�→�6&&��¥�&RS\�7UDQVSRUW�5HTXHVW��WR�PDQXDOO\�FRS\DFWLYLW\�JURXSV�EHWZHHQ�H[LVWLQJ�FOLHQWV�

Page 173: Authorizations Made Easy

Chapter 7: Preparing the R/3 Environment for Go-Live

Transports Between R/3 Systems

Release 4.6A/B7–3

7R�FRS\�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV�

�� &UHDWH�D�WUDQVSRUW�UHTXHVW�ZLWK�WKH�DSSURSULDWH�DFWLYLW\�JURXSV�

�� ,I�\RX�XVH�WUDQVDFWLRQ�6&&���GR�QRW�UHOHDVH�WKH�WUDQVSRUW�

7UDQVDFWLRQ�6&&��ZRUNV�ZLWK�UHOHDVHG�DQG�XQUHOHDVHG�WUDQVSRUWV�

�� /RJ�RQ�WR�WKH�RWKHU�FOLHQW�

�� 5XQ�WUDQVDFWLRQ�6&&��

�� &KRRVH�WKH�6RXUFH�FOLHQW�DQG�7UDQVSRUW�UHTXHVW�LQFOXGLQJ�WKH�WDVN�QXPEHU�

�� ([HFXWH�

7KH�DFWLYLW\�JURXS�V��VKRXOG�QRZ�EH�DFWLYH�LQ�WUDQVDFWLRQ�3)&*�

:KHQ�\RX�WUDQVSRUW�XVLQJ�6&&���WKH�UHSRUW�WUHH�LQVLGH�WKH�DFWLYLW\�JURXS�LV�WUDQVSRUWHG�EXW�QRW�WKH�UHSRUW�WUHH�LWVHOI��<RX�KDYH�WR�WUDQVSRUW�WKH�UHSRUW�WUHH�EHIRUHKDQG��$OVRUHPHPEHU�WKDW�UHSRUW�WUHHV�DUH�FOLHQW�GHSHQGHQW�

7UDQVSRUWV�%HWZHHQ�5���6\VWHPV

<RX�FDQ�WUDQVSRUW�DXWKRUL]DWLRQ�FRPSRQHQWV��DFWLYLW\�JURXSV��DQG�XVHU�PDVWHU�UHFRUGVEHWZHHQ�5���6\VWHPV��&RPSRQHQWV�PD\�EH�WUDQVSRUWHG�LQGHSHQGHQWO\�RU�ZLWK�DOO�RI�WKHLUDVVRFLDWHG�DXWKRUL]DWLRQV�

7UDQVSRUWLQJ�$FWLYLW\�*URXSV

:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV�WKH�DXWKRUL]DWLRQ�SURILOHV��7KHSURILOHV�QR�ORQJHU�KDYH�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�LQ�WUDQVDFWLRQ�683&�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�

2QFH�\RX�KDYH�HQWHUHG�WKH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUW�UHTXHVW��\RX�VKRXOG�QRW�PDNH�DQ\PRUH�FKDQJHV�WR�WKH�DXWKRUL]DWLRQ�SURILOHV�RI�WKDW�DFWLYLW\�JURXS��,I�\RX�FKDQJH�SURILOHV�RUJHQHUDWH�WKHP�IRU�WKH�ILUVW�WLPH��\RX�VKRXOG�HQWHU�WKH�ZKROH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUWUHTXHVW�DJDLQ�

7KH�DFWLYLW\�JURXSV�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVW�FDQ�EH�GLVSOD\HG�ZLWK�WUDQVDFWLRQ�6(���

Page 174: Authorizations Made Easy

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Authorizations Made Easy7–4

7UDQVSRUWLQJ�6LQJOH�$FWLYLW\�*URXSV�8VLQJ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�7UDQVDFWLRQ

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� (QWHU�WKH�DFWLYLW\�JURXS�\RX�ZRXOGOLNH�WR�WUDQVSRUW�RU�VHOHFW�LW�XVLQJSRVVLEOH�HQWULHV�

�� &KRRVH� �WR�WUDQVSRUW�WKH�DFWLYLW\JURXS�

�� &KRRVH� �WR�FRQWLQXH�

�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�

�� &KRRVH� �

2

3

5

6

4

Page 175: Authorizations Made Easy

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Release 4.6A/B7–5

<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�

,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.

�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVWV��FUHDWH�D�QHZ�RQHXVLQJ� �

�� &KRRVH� �

�� <RX�FDQ�XVH�WUDQVDFWLRQ�6(���WR�GLVSOD\�\RXU�FXVWRPL]LQJ�WUDQVSRUW�UHTXHVWV�

��� 7R�LPSRUW�WKH�UHTXHVW�ZLWK�WKH�GDWD��ORJ�RQ�WR�WKH�FOLHQW�\RX�ZRXOG�OLNH�WR�LPSRUW�WKH�GDWD�WR�DQGH[HFXWH�WUDQVDFWLRQ�6&&���VHH�7UDQVSRUW�%HWZHHQ�&OLHQWV��VWHSV��²��RQ�SDJH��²���

7

8

Page 176: Authorizations Made Easy

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Authorizations Made Easy7–6

0DVV�7UDQVSRUW�RI�$FWLYLW\�*URXSV

7R�WUDQVSRUW�D�VHW�RI�DFWLYLW\�JURXSV�DOO�DW�RQFH��XVH�WKH�PDVV�WUDQVSRUW�IXQFWLRQ�LQVLGH�WKH�3*�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��FKRRVH�(QYLURQPHQW�→�0DVVWUDQVSRUW�

�� (QWHU�WKH�ILUVW�DQG�ODVW�DFWLYLW\�JURXSRI�WKH�UDQJH�WKDW�\RX�ZRXOG�OLNH�WRWUDQVSRUW��<RX�FDQ�DOVR�XVH�SRVVLEOHHQWULHV�IRU�D�OLVW�RI�DOO�H[LVWLQJ�DFWLYLW\JURXSV�

,Q�WKLV�H[DPSOH��ZH�FKRVH�DOO�DFWLYLW\JURXSV�IURP),B$3B'DWDB(QWU\B&OHUN�WR40B0DQDJHUB$VVLWDQW�

�� &KRRVH� �

�� &KRRVH� �WR�FRQWLQXH�

3

4

2

5

Page 177: Authorizations Made Easy

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Release 4.6A/B7–7

�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�

�� &KRRVH� �

<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�

,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.

�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVW��FUHDWH�D�QHZ�RQHXVLQJ� �

�� &KRRVH� �

8VHU�0DVWHU�5HFRUG�&RPSDULVRQ�$IWHU�,PSRUW�LQWR�WKH�7DUJHW�6\VWHP

2QFH�WKH�DFWLYLW\�JURXSV�KDYH�EHHQ�LPSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��\RX�VKRXOG�FRPSDUHWKH�XVHU�PDVWHU�UHFRUGV�RI�WKH�DFWLYLW\�JURXSV�FRQFHUQHG��([HFXWH�WKLV�FRPSDULVRQ�XVLQJUHSRUW�3)&*B7,0(B'(3(1'(1&<��ZKLFK�\RX�VKRXOG�VFKHGXOH�SHULRGLFDOO\�

,I�\RX�GR�QRW�ZDQW�WR�ZDLW�XQWLO�WKDW�UHSRUW�UXQV�DQG�ZDQW�WKH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHWV\VWHP�WR�EH�LPPHGLDWHO\�FRQVLVWHQW��FRPSDUH�WKH�DFWLYLW\�JURXSV�E\�FKRRVLQJ�(QYLURQPHQW→�0DVV�FRPSDUH�LQ�WUDQVDFWLRQ�3)&*��,Q�WKH�$FWLYLW\�JURXS�ILHOG��FKRRVH�WKH�DFWLYLW\�JURXSVFRQFHUQHG��6HOHFW�&RPSOHWH�FRPSDUH�LQ�WKH�6HOHFWLRQ�RI�DFWLRQ�ILHOG�DQG�VWDUW�WKH�UHSRUW�E\FKRRVLQJ�WKH� ��7KH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHW�V\VWHP�DUH�WKHQ�PDGH�FRQVLVWHQW�

6

7

8

9

Page 178: Authorizations Made Easy

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Check Indicators and Field Values

Authorizations Made Easy7–8

7UDQVSRUWLQJ�&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV

:LWK�WUDQVDFWLRQ�68���\RX�FDQ�FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV�FRQFHUQLQJ�FKHFN�LQGLFDWRUV�ILHOG�YDOXHV��DQG�WDEOHV�862%;�DQG�862%7��7KLV�SURFHGXUH�LPSRUWV�ERWK�WKH�6$3�FKHFNLQGLFDWRU�GHIDXOWV�IRU�DXWKRUL]DWLRQ�REMHFWV�LQ�D�WUDQVDFWLRQ��DQG�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�WKH�3*�LQWR�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�

:KHWKHU�\RX�UXQ�WUDQVDFWLRQ�68���LQLWLDOO\��RU�FKDQJH�WKH�GHIDXOWV�ODWHU�ZLWK�WUDQVDFWLRQ68����WKH�SURFHVV�LV�UHFRUGHG�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��%\�FDUU\LQJ�RXW�WKHFRUUHVSRQGLQJ�WUDQVSRUW�UHTXHVW��\RX�GLVWULEXWH�\RXU�FKHFN�LQGLFDWRUV�LQ�WKH�V\VWHP�

7KH��7UDQVDFWLRQ�QDPH!�FRUUHVSRQGV�WR�QRUPDO�6$3�WUDQVDFWLRQ�QDPHV��VXFK�DV�9$����7KHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�DUH�LQFOXGHG�LQ�WKH�WUDQVSRUW��&KHFN�LQGLFDWRUV�DUH�VDYHG�LQWDEOH�862%;B&�DQG�ILHOG�YDOXHV�IRU�WKH�3*�DUH�VDYHG�LQ�WDEOH�862%7B&�

7UDQVSRUWLQJ�$XWKRUL]DWLRQ�7HPSODWHV

$IWHU�DQ�XSJUDGH��DOO�6$3�GHOLYHUHG�WHPSODWHV�ZLOO�EH�LGHQWLFDO�LQ�DOO�V\VWHPV��<RX�FDQQRWFKDQJH�WKHVH�WHPSODWHV��\RX�FDQ�RQO\�FRS\�DQG�DOWHU�WKHP��<RX�FDQ��KRZHYHU��FUHDWH�\RXURZQ�WHPSODWHV��DV�GHVFULEHG�HDUOLHU�LQ�WKLV�ERRN��:KHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��XQOLNH6$3�GHIDXOW�FKDQJHV��WHPSODWH�FKDQJHV�DUH�QRW�DXWRPDWLFDOO\�SDVVHG�RQ�WR�WKH�DSSURSULDWHDXWKRUL]DWLRQ�SURILOH�V��ZKHUH�WKH�WHPSODWH�ZDV�LQVHUWHG��2QFH�\RX�KDYH�FKDQJHG�DWHPSODWH�WKDW�ZDV�SUHYLRXVO\�LQVHUWHG�LQ�DQ�DXWKRUL]DWLRQ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��\RXPXVW�PDQXDOO\�XSGDWH�WKDW�SURILOH�ZLWK�WKH�VDPH�FKDQJHV�WKDW�ZHUH�PDGH�WR�WKH�WHPSODWH�&KDQJHV�WR�\RXU�RZQ�WHPSODWHV�DUH�UHFRUGHG�E\�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��7RFDUU\�RXW�WKH�WUDQVSRUW�UHTXHVW��REMHFWV�LQ�WKH�UHTXHVW�PXVW�FRQWDLQ�WKH�IROORZLQJ�V\QWD[�

R3TR SUSP <Template Name>

7UDQVSRUWLQJ�8VHU�0DVWHU�5HFRUGV

7R�WUDQVSRUW�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�FOLHQWV��UXQ�WKH�FOLHQW�FRS\�WUDQVDFWLRQ�SCCL�7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ��→�&OLHQW�&RS\�→�6&&/�¥/RFDO�&RS\��DQG�VHOHFW�SURILOH�6$3B86(5��)RU�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�5��6\VWHPV��XVH�WUDQVDFWLRQ�SCC8��7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ��→�&OLHQW�7UDQVSRUW�→�6&&����&OLHQW�7UDQVSRUW��ZLWK�SURILOH�6$3B86(5�

Page 179: Authorizations Made Easy

8–1

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ

$XWKRUL]DWLRQV

&RQWHQWV

Manually Postmaintaining Authorizations ...........................................................8–2

Manually Inserting Authorizations ........................................................................8–3

Inserting Authorizations from Templates.............................................................8–7

Inserting Authorizations from a Profile ..............................................................8–12

Inserting Full Authorizations: Profile “<YourCompany>” ................................8–15

��

Page 180: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Manually Postmaintaining Authorizations

Authorizations Made Easy8–2

0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV

$OWKRXJK�WKH�3URILOH�*HQHUDWRU��3*�EXLOGV�DXWKRUL]DWLRQ�SURILOHV��LW�PD\�VRPHWLPHV�EHQHFHVVDU\�WR�LQVHUW�D�PLVVLQJ�DXWKRUL]DWLRQ�RU�WR�DGMXVW�D�ILHOG�YDOXH��7KH�SURFHVV�RIPDLQWDLQLQJ�3*·V�VXJJHVWHG�DXWKRUL]DWLRQV��DV�GHULYHG�IURP�WKH�WUDQVDFWLRQV�VHOHFWHG�IRU�DQDFWLYLW\�JURXS��LV�FDOOHG�SRVWPDLQWDLQLQJ�DXWKRUL]DWLRQV��0DQXDO�SRVWPDLQWHQDQFH�PD\�EHQHFHVVDU\�LQ�WKH�SDUDPHWHU�DQG�YDULDQW�WUDQVDFWLRQV��DQG�GXULQJ�WKH�XSJUDGH�

:KHQ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV"

6KRZQ�EHORZ�DUH�VRPH�RI�WKH�W\SLFDO�FDVHV�ZKHUH�\RX�PXVW�PDQXDOO\�LQFOXGHDXWKRUL]DWLRQV�

&DVH�����$XWKRUL]DWLRQ�,V�0LVVLQJ�IRU�5HODWHG�7UDQVDFWLRQV

$OWKRXJK�WKH�3*�DVVLJQV�D�SDUWLFXODU�SURILOH�WR�D�XVHU��LW�LV�SRVVLEOH�WKDW�WKH�VDPH�XVHU�PD\UHFHLYH�WKH�HUURU�PHVVDJH�´<RX�DUH�QRW�DXWKRUL]HG�µ�ZKHQ�DWWHPSWLQJ�WR�XVH�D�UHODWHGWUDQVDFWLRQ�

7R�DGGUHVV�WKH�DXWKRUL]DWLRQ�VHWWLQJV�IRU�WKH�UHODWHG�WUDQVDFWLRQ��GR�WKH�IROORZLQJ�

�� 8VH�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG��WR�VHHWKH�ODVW�DXWKRUL]DWLRQ�FKHFN�WKDW�IDLOHG��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ��WR�OHDUQKRZ�WR�XVH�WUDQVDFWLRQ�68����

�� &KHFN�WKH�UHODWHG�WUDQVDFWLRQ�WR�FRQILUP�LI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�FKHFNHG�

�� &KHFN�WKH�JHQHUDWHG�SURILOH�WR�FRQILUP�LI�WKH�DXWKRUL]DWLRQ�IRU�WKH�UHODWHG�WUDQVDFWLRQ�LVLQFRUUHFWO\�VHW�

�� 8VH�WUDQVDFWLRQ�68���WR�FKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�LQ�WKHGHVLUHG�WUDQVDFWLRQ��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�WR�OHDUQ�KRZ�WR�XVHWUDQVDFWLRQ�68����

&DVH�����7KH�*HQHUDWHG�3URILOH�'RHV�1RW�$VVLJQ�$Q\�*HQHUDO�5LJKWV�WR�WKH

8VHU

6LQFH�EDVLF�DXWKRUL]DWLRQV�DUH�VR�JHQHUDO��LW�LV�QRW�SUDFWLFDO�WR�LQFOXGH�WKHP�LQ�LQGLYLGXDOWUDQVDFWLRQV�

7R�LPSURYH�V\VWHP�SHUIRUPDQFH��WKRXJK�XQXVXDO�IURP�DQ�DXWKRUL]DWLRQV�VWDQGSRLQW��< 5���GRHV�QRW�FKHFN�LI�DQ�DXWKRUL]DWLRQ�LV�QHHGHG�IRU�DQ�H[LVWLQJ�WUDQVDFWLRQ< 1HZ�DXWKRUL]DWLRQV�DUH�DGGHG�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�DXWKRUL]DWLRQV7KH�V\VWHP�SURYLGHV�WKH�IXQFWLRQDOLW\�WR�VXPPDUL]H�DXWKRUL]DWLRQV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW�

&DVH�����&DQQRW�6HOHFW�7UDQVDFWLRQ�68���IURP�WKH�0HQX�LQ�3)&*

6$3�UHFRPPHQGV�LQFOXGLQJ�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WUDQVDFWLRQ�68���LQ�HDFKDXWKRUL]DWLRQ�SURILOH��7KHVH�DXWKRUL]DWLRQV�JXDUDQWHH�WKDW�LI�XVHUV�JHW�DQ�HUURU�PHVVDJH��IRU

Page 181: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Release 4.6A/B8–3

H[DPSOH��´<RX�DUH�QRW�DXWKRUL]HG«�µ�´1R�DXWKRUL]DWLRQ�IRU«µ�RU�DQ\�PHVVDJH�UHJDUGLQJDQ�DXWKRUL]DWLRQ�SUREOHP���WKH�KHOS�GHVN�FDQ�PRUH�HDVLO\�DVVLVW�WKHP��7KH�DFWLYLW\�JURXS6$3B%&B(1'86(5B$*�DOUHDG\�FRQWDLQV�WKH�DXWKRUL]DWLRQ�IRU�68����7KLV�DFWLYLW\�JURXS�LVDOVR�LQFOXGHG�LQ�WKH�FRPSRVLWH�DFWLYLW\�JURXS�6$3B%&B(9(5<B(03/2<((�

+RZ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV

<RX�PD\�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�< 0DQXDOO\< )URP�D�WHPSODWH< )URP�D�SURILOH< %\�LQVHUWLQJ�FRPSOHWH�DXWKRUL]DWLRQV

0DQXDOO\�,QVHUWLQJ�$XWKRUL]DWLRQV

8VLQJ�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG���\RX�FDQILQG�RXW�LI�DQ�DXWKRUL]DWLRQ�FKHFN�IRU�\RXU�WUDQVDFWLRQ�LV�PLVVLQJ��7UDQVDFWLRQ�68���LV�RQO\RQH�RI�WKH�ZD\V�WR�GHWHUPLQH�PLVVLQJ�DXWKRUL]DWLRQV��6RPHWLPHV��WUDFHV�DUH�PRUH�XVHIXOEHFDXVH�WKH\�DUH�PRUH�DFFXUDWH�DQG�FRPSOHWH³SDUWLFXODUO\�ZKHQ�GHDOLQJ�ZLWK�+5DXWKRUL]DWLRQ�SUREOHPV��,GHQWLI\�WKH�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�ILHOGYDOXHV��7KHQ�PDQXDOO\�LQVHUW�WKH�PLVVLQJ�DXWKRUL]DWLRQ�

<RX�FDQ�XVH�WKH�IROORZLQJ�WZR�RSWLRQV�WR�LQVHUW�DXWKRUL]DWLRQV�< 6HOHFWLRQ�FULWHULD��FKRRVH�IURP�DXWKRUL]DWLRQV�VRUWHG�E\�FODVV�< 0DQXDOO\��LI�\RX�NQRZ�WKH�REMHFW��RU�FDQ�FKRRVH�IURP�DQ�REMHFW�OLVW�

7R�DVVLJQ�JHQHUDO�DXWKRUL]DWLRQV��FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�< &UHDWH�D�VHSDUDWH�DFWLYLW\�JURXS�FRQWDLQLQJ�RQO\�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�

SULQWLQJ���DQG�DVVLJQ�WKLV�DFWLYLW\�JURXS�WR�DOO�XVHUV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�SULQW�WR�SDUWLFXODU�SULQWHUV��$�JHQHULF�SULQWLQJ�DXWKRUL]DWLRQ�FDQ�EH�DVVLJQHG�*HQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKHVH�DFWLYLW\�JURXSV�DQG�DVVLJQ�WKH�SURILOHV�WRWKH�XVHUV�

< ,QFOXGH�WKH�UHTXLUHG�REMHFWV�LQ�WKH�DFWLYLW\�JURXS�E\�XVLQJ�6$3�WHPSODWHV��RU�\RXU�RZQWHPSODWHV�E\�PDLQWDLQLQJ�DQ\�PLVVLQJ�ILHOG�HQWULHV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�EH�DVVLJQHG�WR�VSHFLILF�SULQWHUV�

< 6$3�DOUHDG\�GHOLYHUV�DFWLYLW\�JURXSV�ZLWK�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�6$3B%&B(9(5<B(03/2<((�DQG�6$3B%&B(1'86(5�

Page 182: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Authorizations Made Easy8–4

8VLQJ�6HOHFWLRQ�&ULWHULD

<RX�FDQ�XVH�VHOHFWLRQ�FULWHULD�WR�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

2Q�VFUHHQ��\RX�FDQ�VHH�WKH�FXUUHQWO\LQFOXGHG�DXWKRUL]DWLRQ�FODVVHV�IRUWKH�VHOHFWHG�DFWLYLW\�JURXS�

�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZRXOG�OLNH�WRLQVHUW��VRUWHG�E\�FODVV��

,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQREMHFW�\RX�ZRXOG�OLNH�WR�LQVHUWPDQXDOO\��FKRRVH� �0DQXDOO\�DQG�HQWHUWKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQGVHOHFW�LW�IURP�D�OLVW��VHH�H[DPSOH�VKRZQEHORZ��

4

3

5

Page 183: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Release 4.6A/B8–5

�� ([SDQG�WKH�REMHFW�FODVVHV�DQG�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��

�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHGHVLUHG�DXWKRUL]DWLRQ�REMHFWV�

�� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�

�� &KRRVH�,QVHUW�FKRVHQ�

��� 7KH�VHOHFWHG�DXWKRUL]DWLRQ�REMHFWVDUH�WUDQVIHUUHG�EDFN�WR�WKHDXWKRUL]DWLRQ�FODVVHV�IRU�WKH�JLYHQDFWLYLW\�JURXS��7KH�V\VWHP�FUHDWHV�DQHZ�DXWKRUL]DWLRQ�IRU�HDFKDXWKRUL]DWLRQ�REMHFW��7KH�\HOORZOLJKW�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQILHOG�YDOXHV�DUH�PDLQWDLQHG�

��� 7KH�V\VWHP�VWDWXV�LV�GLVSOD\HG�DV0DQXDOO\��ZKLFK�PHDQV�WKDW�WKHUHDUH�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQVLQ�WKLV�REMHFW�FODVV�

��� &KRRVH� �2SHQ�WR�GLVSOD\�DOO�RSHQDXWKRUL]DWLRQ�ILHOGV�

6

7

8

9

10 11

12

Page 184: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Authorizations Made Easy8–6

��� 0DLQWDLQ�WKH�DSSURSULDWH�YDOXHV�IRUWKH�RSHQ�DXWKRUL]DWLRQ�SURILOHV�

��� 6DYH�DQG�JHQHUDWH�WKH�DFWLYLW\JURXS�

,QVHUWLQJ�0DQXDOO\

,I�\RX�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZRXOG�OLNH�WR�LQVHUW��SHUIRUP�WKH�IROORZLQJ�VWHSV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH� �0DQXDOO\�

�� (QWHU�WKH�DXWKRUL]DWLRQ�REMHFW�RUFKRRVH�SRVVLEOH�HQWULHV�

�� &KRRVH� �

13

14

4

3

Page 185: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–7

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�7HPSODWHV

*HQHUDWHG�SURILOHV�GR�QRW�DXWRPDWLFDOO\�JUDQW�DQ\�JHQHUDO�ULJKWV�WR�< 3ULQW< /RJ�RQ�WR�6$31HW�²�5���)URQWHQG�QRWHV< 8VH�WUDQVDFWLRQ�68��

< 'HEXJ��YLHZ�RQO\�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZLOO�ILUVW�FUHDWH�D�QHZ�WHPSODWH�DQG�WKHQ�LQVHUW�WKH�WHPSODWH�LQWR�DQ�H[LVWLQJDFWLYLW\�JURXS�

&UHDWLQJ�D�1HZ�7HPSODWH

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��FKRRVH�(QYLURQPHQW�→�&KHFN�LQGLFDWRU�

�� 6HOHFW�(GLW�DXWKRUL]DWLRQ�WHPSODWHV�

�� &KRRVH� �

�� &KRRVH� �

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�WHPSODWHV�DQG�WKH�6$3�GHOLYHUHGWHPSODWHV��GR�QRW�XVH�QDPHV�IRU�\RXU�WHPSODWHV�WKDW�EHJLQ�ZLWK�6�RU�-��)RU�DGGLWLRQDOLQIRUPDWLRQ��VHH�6$31HW�²�5���)URQWHQG�QRWH�������DQG�ORRN�IRU�WUDQVSRUW�REMHFW�5�756863�

7HPSODWH�FKDQJHV�DUH�QRW�SDVVHG�RQ�ZKHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��7KDW�LV��LI�\RX

3

4

5

Page 186: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Authorizations Made Easy8–8

FKDQJH�D�WHPSODWH�WKDW�\RX�DOUHDG\�LQVHUWHG�LQWR�DQ�DFWLYLW\�JURXS��WKHUH�LV�QR�LQGLFDWRULQ�WKH�DFWLYLW\�JURXS�WR�VKRZ�WKDW�WKH�LQVHUWHG�WHPSODWH�KDV�FKDQJHG�

�� (QWHU�WKH�WHPSODWH�QDPH�DQG�D�VKRUWGHVFULSWLRQ�

�� &KRRVH� �

�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZDQW�WR�LQVHUW�VRUWHG�E\�FODVV��

,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZDQW�WR�LQVHUW�PDQXDOO\��\RX�FDQFKRRVH� �0DQXDO�LQSXW�DQG�HQWHU�WKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQG�VHOHFW�LW�IURP�DOLVW��

�� ([SDQG�WKH�REMHFW�FODVVHV�WR�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��

6

7

9

8Tip

Page 187: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–9

��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�\RX�ZDQW�WRLQVHUW�

��� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�

��� &KRRVH�,QVHUW�FKRVHQ�

��� 0DLQWDLQ�DOO�WKH�DSSURSULDWH�YDOXHVIRU�WKH�DXWKRUL]DWLRQ�ILHOGV��IRUH[DPSOH��ZH�FKRVH�)XOODXWKRUL]DWLRQ��

��� &KRRVH� �

��� &KRRVH� �

7KH�WHPSODWH�QRZ�DSSHDUV�LQ�WKHWHPSODWH�OLVW�DQG�LV�UHDG\�IRU�XVH�

��� &KRRVH� �

11

12

13

14 15

16

Page 188: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Authorizations Made Easy8–10

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�7HPSODWH

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�D�WHPSODWH��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�WHPSODWH� 5

4

3

Page 189: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–11

�� 6HOHFW�WKH�WHPSODWH�\RX�ZDQW�WRLQFOXGH��IRU�H[DPSOH��35,17,1*WHPSODWH��

0XOWLSOH�WHPSODWH�VHOHFWLRQV�DUHSRVVLEOH�

�� &KRRVH� �

7KH�WHPSODWH�ZDV�LQVHUWHG�DQGPDUNHG�ZLWK�VWDWXV�0DQXDOO\��7KHJUHHQ�OLJKW�LQGLFDWHV�WKDW�WKHDXWKRUL]DWLRQ�ILHOGV�DUH�PDLQWDLQHG�

�� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �

,I�\RX�LQVHUWHG�D�WHPSODWH�ZLWK�DXWKRUL]DWLRQ�ILHOGV�WKDW�DUH�QRW�PDLQWDLQHG��WKH�LQGLFDWRUOLJKWV�DSSHDU�DV�\HOORZ�RU�UHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��%HIRUH�SURFHHGLQJ��\RXPXVW�ILUVW�SRVWPDLQWDLQ�DOO�RSHQ�ILHOGV�

6

7

8

Page 190: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Authorizations Made Easy8–12

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�3URILOH

,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�XVLQJ�WUDQVDFWLRQV�68���DQG�68����\RX�FDQ�LQVHUW�WKHVHDXWKRUL]DWLRQV�SURILOHV�LQWR�WKH�OLVW�RI�WKH�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�

0LJUDWLQJ�3URILOHV�&UHDWHG�ZLWK�7UDQVDFWLRQV�68���DQG�68��1RWH�WKDW�QR�DFWLYLW\�JURXS�LQIRUPDWLRQ��VXFK�DV�WUDQVDFWLRQ�FRGHV�DXWRPDWLFDOO\PDLQWDLQHG�IRU�REMHFW�6B7&2'(��FDQ�EH�UHJHQHUDWHG�IRU�LQVHUWHG�SURILOHV��7KH�WHFKQLTXHEHORZ�RQO\�DOORZV�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���WR�PLJUDWH�WR�VXFKSURILOHV�DQG�ODWHU�EH�PDLQWDLQHG�ZLWK�WKH�3*��7KHUH�LV�QR�ZD\�WR�UH�FUHDWH�WKH�DSSURSULDWHDFWLYLW\�JURXS�LQIRUPDWLRQ�

7KLV�PHDQV�WKDW�HYHU\WKLQJ�XQGHU�WKH�0HQX�WDE�ZLOO�EH�XQFKDQJHG�LI�68���SURILOHV�DUHFRSLHG�LQWR�WKH�DFWLYLW\�JURXS�+RZHYHU�ZLWK�����\RX�KDYH�QRZ�WKH�RSWLRQ�WR�PLJUDWH�SURILOHV�FUHDWHG�ZLWK�68���DQG68���LQWR�DFWLYLW\�JURXSV��6HH�FKDSWHU�����WKH�VHFWLRQ�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68��3URILOHV�LQWR�$FWLYLW\�*URXSV�

,Q�FHUWDLQ�FLUFXPVWDQFHV��\RX�PD\�ILUVW�FUHDWH�D�WHPSODWH�IURP�\RXU�SURILOH�DQG�WKHQ�LQVHUWWKH�WHPSODWH��7HPSODWHV�DUH�UHXVDEOH�DQG�HDV\�WR�LQVHUW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�WKH�DXWKRUL]DWLRQ��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�

Page 191: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Release 4.6A/B8–13

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLI\�WKH�RSWLRQ�ZLWK�ZKLFK\RX�ZDQW�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQYDOXHV��7KLV�RSWLRQ�LV�DXWRPDWLFDOO\�VHWFRUUHFWO\�LQ�QRUPDO�PRGH�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�SURILOH�

�� (QWHU�WKH�SURILOH�QDPH�RU�XVH�SRVVLEOHHQWULHV�

�� &KRRVH� �

,I�\RX�LQFOXGH�D�SURILOH�WKDW�LQFOXGHV�WKH�REMHFW�6B7&2'(��LW�GRHV�QRW�DGG�WKH�WUDQVDFWLRQFRGH�WR�WKH�PHQX�SRUWLRQ�RI�WKH�DFWLYLW\�JURXS�GHILQLWLRQ�

5

6

4

7

3

Tip

Page 192: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Authorizations Made Easy8–14

�� 6HOHFW�WKH�GHVLUHG�SURILOH�IURP�WKHOLVW�RI�SURILOHV�

�� &KRRVH� �

<RXU�GLDORJ�ER[�PD\�ORRN�GLIIHUHQW��7KHDSSHDUDQFH�GHSHQGV�RQ�WKH�VHWWLQJV�IRUSRVVLEOH�HQWULHV�XQGHU�+HOS�→�6HWWLQJV�→3RVVLEOH�HQWULHV�→�6HWWLQJV�

��� 7KH�VHOHFWHG�SURILOH�LV�WUDQVIHUUHG�

��� &KRRVH� �

��� $OO�WKH�DXWKRUL]DWLRQV�LQ�WKH�VHOHFWHGSURILOH�DUH�WUDQVIHUUHG�DQG�PDUNHGZLWK�WKH�VWDWXV�0DQXDOO\��7KH�JUHHQOLJKW�LQGLFDWHV�WKDW�WKH�SURILOH�LVPDLQWDLQHG�

,I�\RX�LQVHUW�DXWKRUL]DWLRQV�IURP�DSURILOH�ZLWK�QRQPDLQWDLQHGDXWKRUL]DWLRQ�ILHOGV��WKH�UHG�OLJKWDSSHDUV�DQG�\RX�KDYH�WR�SRVWPDLQWDLQDOO�RSHQ�ILHOGV�EHIRUH�SURFHHGLQJ�

��� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �

8

9

10

11

12

13

Page 193: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–15

,QVHUWLQJ�)XOO�$XWKRUL]DWLRQV��3URILOH�´�<RXU&RPSDQ\!µ

,Q�WKH�IROORZLQJ�H[DPSOH��\RX�OHDUQ�KRZ�WR�FUHDWH�D�QHZ�SURILOH�FDOOHG�&203B$//��ZKHUH�´&203µ�VWDQGVIRU�\RXU�FRPSDQ\�QDPH��7KLV�SURILOH�ZLOO�EH�PRGHOHG�DIWHU�6$3B$//��EXW�ZLWK�WKH�VXSHUXVHU�DXWKRUL]DWLRQUHPRYHG��7KHUHIRUH��ZH�ZLOO�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�&203$1<B$//�DQG�LQFOXGH�WKH�SURILOH&203B$//�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� (QWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS\RX�ZDQW�WR�FUHDWH��IRU�H[DPSOH�COMPANY_ALL��

�� &KRRVH� �&UHDWH�

�� ,Q�WKH�'HVFULSWLRQ�ILHOG��HQWHU�DGHVFULSWLRQ�IRU�WKH�DFWLYLW\�JURXS�

�� &KRRVH� �WR�VDYH�WKH�DFWLYLW\�JURXS�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

2

3

4

5

6

Page 194: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–16

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH� �'R�QRW�VHOHFW�WHPSODWHV�

7KH�V\VWHP�GLVSOD\V�WKH�&KRRVH�7HPSODWHZLQGRZ�EHFDXVH�ZH�FKRVH�WKH$XWKRUL]DWLRQV�WDE�ZLWKRXW�VHOHFWLQJ�DQ\WUDQVDFWLRQV�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)XOO�DXWKRUL]DWLRQ�

7

8

9

Page 195: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–17

��� &KRRVH�<HV�

7KH�LQVHUWLRQ�GRHV�QRW�LQFOXGH�DGG�RQ�FRPSRQHQWV��H[FHSW�GHGXFWLRQ�PDQDJHPHQW�DGG�RQ�FRPSRQHQWV�

��� &KRRVH� �WR�FRQWLQXH�

��� &OLFN�RQ�WKH�QRGH�IRU�WKH�REMHFW�FODVV%DVLV��$GPLQLVWUDWLRQ�WR�RSHQ�LW�

11

10

12

Page 196: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–18

��� ,Q�WKH�6\VWHP�$XWKRUL]DWLRQV�OLQH�FKRRVH� �WR�GHDFWLYDWH�WKH�REMHFW�7KH�DXWKRUL]DWLRQ�REMHFW�6\VWHP$XWKRUL]DWLRQV��6B$'0,B)&'��LVQRZ�LQDFWLYH�DQG�ZLOO�QRW�EHJHQHUDWHG�LQWR�WKH�DXWKRUL]DWLRQSURILOH�IRU�&203B$//�

��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�WKDW�EHJLQ�ZLWK$XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\*URXSV�

��� &KRRVH� �LQ�IURQW�RI�WKH�IROORZLQJDXWKRUL]DWLRQ�REMHFWV�WR�GHDFWLYDWHWKHP�< $XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\

�*URXSV��6B86(5B$*5�< 8VHU�0DVWHU�0DLQWHQDQFH�

�$XWKRUL]DWLRQV��6B86(5B$87+�< 8VHU�0DVWHU�0DLQWHQDQFH��8VHU

�*URXSV��6B86(5B*53�< 8VHU�0DVWHU�0DLQWHQDQFH�

�$XWKRUL]DWLRQ�3URILOH�6B86(5B352�

< 8VHU�0DVWHU�0DLQWHQDQFH�6\VWHP�IRU�&HQWUDO�8VHU0DLQWHQDQFH��6B86(5B6<6�

< 7UDQVDFWLRQ�$VVLJQPHQW�RI7UDQVDFWLRQV�WR�$FWLYLW\�*URXSV�6B86(5B7&'�

��� 2QFH�\RX�KDYH�GHDFWLYDWHG�WKHVH�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV�IRU�\RXU�DXWKRUL]DWLRQ�SURILOH��VHOHFWDQG�GHDFWLYDWH�RWKHU�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV��LI�QHHGHG�

��� &KRRVH�2UJDQL]DWLRQDO�OHYHOV�

13

14

15

17

Page 197: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–19

��� &KRRVH�)XOO�DXWKRUL]DWLRQ�IRU�WKHRUJDQL]DWLRQDO�OHYHOV��7KH�DVWHULVNV� ��ZLOO�EH�LQVHUWHG�LQ�DOO�WKH�RSHQILHOGV�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

��� <RX�FDQ�JLYH�WKH�QHZ�SURILOH�WKHVDPH�QDPH�DQG�GHVFULSWLRQ�DV�WKHDFWLYLW\�JURXS��IRU�H[DPSOH�COMP_ALL��

��� &KRRVH� �WR�JHQHUDWH�WKHDXWKRUL]DWLRQ�SURILOH�V��

18

19

21

22

Page 198: Authorizations Made Easy

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–20

��� 7R�YLHZ�DOO�WKH�FUHDWHG�SURILOHV�FKRRVH�$XWKRUL]DWLRQV�→�3URILOHRYHUYLHZ�

��� 7KH�2YHUYLHZ�RI�*HQHUDWHG�3URILOHVVFUHHQ�OLVWV�DOO�WKH�JHQHUDWHGDXWKRUL]DWLRQ�SURILOHV�

��� &KRRVH� �WR�FRQWLQXH�

23

24

25

Page 199: Authorizations Made Easy

9–1

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV

&RQWHQWV

Overview ..................................................................................................................9–2

Assigning Users to Activity Groups .....................................................................9–3

Assigning Activity Groups to Users .....................................................................9–6

Assigning PD Objects to Activity Groups ............................................................9–7

Assigning Activity Groups to PD Objects ..........................................................9–10

Transferring Users from an IMG Project to an Activity Group.........................9–13

Updating Profiles in the User Master Records ..................................................9–15

Creating a Sample Organizational Plan..............................................................9–21

Structural Authorizations.....................................................................................9–28

��

Page 200: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Overview

Authorizations Made Easy9–2

2YHUYLHZ

7KH�QHZ�6$3�(DV\�$FFHVV�XVHU�PHQX�LV�WKH�XVHU�VSHFLILF�SRLQW�RI�HQWU\�LQWR�WKH�5���6\VWHP�'HSHQGLQJ�RQ�WKH�DVVLJQHG�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXSV��WKH�XVHU�PHQX�ORRNVGLIIHUHQW�IRU�HDFK�XVHU��7KH�XVHU�PHQX�FRQWDLQV�RQO\�WKRVH�LWHPV³VXFK�DV�WUDQVDFWLRQV�UHSRUWV��DQG�ZHE�DGGUHVVHV³WKDW�WKH�DVVLJQHG�DFWLYLW\�JURXSV�FRQWDLQ�DQG�WKHUHIRUH�RQO\WKRVH�WDVNV�QHHGHG�WR�SHUIRUP�WKH�GDLO\�ZRUN�

'HSHQGLQJ�RQ�WKH�DUHD�RI�WKH�V\VWHP�\RX�ZRUN�LQ��DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV�VXFK�DV�XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV��DIIHFWV�WKH�IROORZLQJ�DUHDV�< ,Q�%XVLQHVV�:RUNIORZ��WKHVH�DVVLJQPHQWV�GHWHUPLQH�WKH�V\VWHP�WDVNV�D�XVHU�FDQ�SHUIRUP

�IRU�ZRUNIORZ�XVHUV��LW�LV�PDQGDWRU\�WR�RQO\�LQFOXGH�WDVNV�LQ�DFWLYLW\�JURXSV��< ,Q�+XPDQ�5HVRXUFHV��WKHVH�DVVLJQPHQWV�VHUYH�DV�KLJKO\�GHWDLOHG�REMHFW�GHVFULSWLRQV��IRU

MRE��SRVLWLRQ��GHVFULSWLRQV��HWF���

7KH�VDPH�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�VHYHUDO�GLIIHUHQW�REMHFWV��$�VLQJOH�REMHFW�PD\�DOVREH�UHODWHG�WR�VHYHUDO�GLIIHUHQW�DFWLYLW\�JURXSV��7KH�GLIIHUHQW�DFWLYLW\�JURXSV�DVVLJQHG�WR�DQREMHFW�DUH�WRJHWKHU�UHIHUUHG�WR�DV�WKH�REMHFW·V�DFWLYLW\�SURILOH��7KH�YDULRXV�5���REMHFWV�DUH�< 5���XVHUV�²�2EMHFW�W\SH�86

$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�� 5HFRJQL]HG�E\�5��� $OORZHG�WR�ORJ�RQ� $OORZHG�WR�SHUIRUP�VSHFLILHG�V\VWHP�DFWLYLWLHV

)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�%DVLVFRPSRQHQW�RI�WKH�XVHU�PDVWHU�UHFRUG�

< :RUN�FHQWHU���2EMHFW�W\SH�$

$�ZRUN�FHQWHU�LGHQWLILHV�D�ORFDWLRQ�ZKHUH�ZRUN�LV�FDUULHG�RXW��$�ORFDWLRQ�FDQ�UHSUHVHQW�DJHRJUDSKLF�ORFDWLRQ��VXFK�DV�WKH�3KLODGHOSKLD�EUDQFK�RIILFH�RU�WKH�6LQJDSRUH�VXEVLGLDU\�RU�LW�FDQ�EH�PRUH�SUHFLVH��)RU�H[DPSOH��LW�FDQ�LGHQWLI\�D�VSHFLILF�ZRUNVWDWLRQ�ZLWK�FHUWDLQPDWHULDOV�DQG�HTXLSPHQW��RQ�D�VSHFLILF�IORRU�RI�D�VSHFLILF�EXLOGLQJ��:RUN�FHQWHUV�FDQ�EHXVHG�ZLWK�MREV�DQG�WDVNV�WR�FUHDWH�FRPSUHKHQVLYH�MRE�GHVFULSWLRQV��7KH�MRE�LGHQWLILHV�WKHMRE�FODVVLILFDWLRQ��WKH�WDVNV�LQGLFDWH�WKH�W\SHV�RI�GXWLHV�SHUIRUPHG��DQG�WKH�ZRUN�FHQWHULGHQWLILHV�ZKHUH�WKH�WDVNV�DUH�FDUULHG�RXW�

< -RE���2EMHFW�W\SH�&

$�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��RU�LQVWUXFWRU��0DQ\�HPSOR\HHV�PD\�KROG�WKH�VDPH�MRE��IRUH[DPSOH��WKHUH�PLJKW�EH����HPSOR\HHV�ZRUNLQJ�DV�HQJLQHHUV���-REV�DUH�QRUPDOO\�XVHG�WRFUHDWH�SRVLWLRQV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV�DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�MRE��8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKRVH�UHTXLUHG�WR�ZRUN�ZLWK�6$3�RIILFH��XVH�FDUH�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSVWR�MREV�

Page 201: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Release 4.6A/B9–3

< 2UJDQL]DWLRQDO�XQLW���2EMHFW�W\SH�2

2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�RUJDQL]DWLRQDO�HQWLWLHV�GHVLJQDWHG�WR�SHUIRUP�D�VSHFLILHGVHW�RI�IXQFWLRQV��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV��GLYLVLRQV�GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDO�VWUXFWXUH�DW\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�DPRQJ�WKHXQLWV��$Q�HPSOR\HH�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWV�WKHLQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�XQLW�

8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��XVH�FDUH�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WR�EH�IDLUO\VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�WKHLU�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��,I�H[FHSWLRQV�RFFXU��FUHDWHDGGLWLRQDO�DFWLYLW\�JURXSV��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RU�SRVLWLRQ��LW�PD\�EH�EHVWWR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�VSHFLILF�MREV�RU�SRVLWLRQV�

< 3HUVRQ���2EMHFW�W\SH�3

$�SHUVRQ�< 3RVLWLRQ���2EMHFW�W\SH�6

$�SRVLWLRQ�UHSUHVHQWV�D�XQLTXH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��WKH�PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHGZLWK�MREV�DQG�DUH�XVXDOO\�FUHDWHG�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�SRVLWLRQDXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�SRVLWLRQ�7KLV�SURFHVV�DOORZV�\RX�WR�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DOPRVW�D�FRPSOHWHO\SRVLWLRQ�RULHQWHG�IDVKLRQ��6LQFH�DOO�RI�WKH�DFFHVV�ULJKWV�DUH�QRZ�OLQNHG�WR�WKH�SRVLWLRQ��LWGRHV�QRW�PDWWHU�ZKR�ILOOV�WKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��WKH�DXWKRUL]DWLRQSURILOH�DXWRPDWLFDOO\�FKDQJHV�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG�

$VVLJQLQJ�$FWLYLW\�*URXSV

0DNH�VXUH�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�WKH�VSHFLILF�SRVLWLRQ�WKDW�ZLOO�UHFHLYH�DQDXWKRUL]DWLRQ�SURILOH��,I�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�D�MRE��DOO�RI�WKH�SRVLWLRQVFUHDWHG�IURP�WKDW�MRE�ZLOO�LQKHULW�WKH�DFWLYLW\�JURXS�DQG�LWV�DXWKRUL]DWLRQ�SURILOH�V��

$VVLJQLQJ�8VHUV�WR�$FWLYLW\�*URXSV

$OWKRXJK�ZH�DOUHDG\�GHPRQVWUDWHG�LQ�FKDSWHU����8VHU�5ROH�7HPSODWHV��KRZ�WR�DVVLJQ�D�XVHU�WRD�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXS�XVLQJ�WKH�3*��ZH�ZLOO�GHPRQVWUDWH�LW�KHUH�LQ�PRUHGHWDLO�

7KH�IROORZLQJ�PHWKRG�LV�UHFRPPHQGHG�LI�\RX�ZDQW�WR�DVVLJQ�PRUH�XVHUV�WR�D�VSHFLILFDFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WR�DQ�HPSOR\HH�DQG�FKRRVH� �&KDQJH�

Page 202: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Authorizations Made Easy9–4

�� &KRRVH�WKH�8VHU�WDE�

�� (QWHU�WKH�XVHU�,'�LQ�WKH�8VHU�,'�ILHOG�

<RX�FDQ�LQFOXGH�XVHU�,'V�E\�RQH�RIWKH�IROORZLQJ�PHWKRGV�< (QWHU�WKH�XVHU�,'�GLUHFWO\�< 0DNH�D�VHOHFWLRQ�IURP�WKH�SRVVLEOH

HQWULHV�OLVW�< 8VH�PXOWLSOH�VHOHFWLRQ�IURP�D

VHOHFWLRQ�OLVW�E\�FKRRVLQJ�6HOHFWLRQ��6HH�WKH�IROORZLQJ�7LSV

�7ULFNV�

�� 7R�VDYH�\RXU�DVVLJQPHQW��FKRRVH� �

%\�XVLQJ�WKH�EXWWRQ�� �6HOHFWLRQ��\RX�FDQ�LQFOXGHVHYHUDO�XVHUV��IRU�H[DPSOH��DOO�XVHUV�LQ�D�SDUWLFXODUXVHU�JURXS�RU�DOO�XVHUV�LQ�WKH�5���6\VWHP���6HOHFW�WKHGHVLUHG�XVHU�DQG�FKRRVH� �

,I�\RX�FDQQRW�ILQG�WKH�UHTXLUHG�XVHU�RU�LI�\RX�ZDQW�WRFKRRVH�WKH�XVHU�WKURXJK�D�XVHU�JURXS�

D� &KRRVH� �

E� 2Q�WKH�([HFXWH�YDOXH�UHVWULFWLRQ�ZLQGRZ��ILQG�WKHXVHU�E\�HLWKHU�< (QWHULQJ�WKH�ILUVW�OHWWHU�V��RI�WKH�XVHU�QDPH�DQG

DQ�DVWHULVN�� ��WR�H[SDQG�VHOHFWLRQ�OLVW< 8VLQJ�WKH�8VHU�JURXS�ILHOG�WR�ILQG�WKH�XVHU

WKURXJK�WKHLU�XVHU�JURXS

F� &KRRVH� �

G� 6HOHFW�WKH�XVHU�

,W�LV�SRVVLEOH�WR�VHOHFW�VHYHUDO�XVHUV�

H� &KRRVH� �

a

3

4

b

c

Tip

d

e

Page 203: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Release 4.6A/B9–5

�� 7KH�FKRVHQ�XVHU�V��DSSHDU�LQ�WKH8VHU�,'�DQG�8VHU�QDPH�FROXPQV�

�� ,Q�WKH�)URP�DQG�WR�FROXPQV��UHVWULFWWKH�VWDUW�DQG�HQG�GDWH�RI�WKH�XVHUDVVLJQPHQW�

7KH�V\VWHP�HQWHUV�E\�GHIDXOW�WKHFXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�DQG�����������DV�WKH�HQG�GDWH�

�� &KRRVH� �WR�VDYH�\RXU�VHOHFWLRQ�

�� &KRRVH� �8VHU�FRPSDUH�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�8VHU�WDE�GLVSOD\V�ZKHWKHU�RU�QRW�XVHUV�DUH�DOUHDG\�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��,I�WKH�GLVSOD\�DSSHDUV�LQ�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVWRQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��,I�\HOORZ��LW�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQDVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�

7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV

,I�\RX�DOVR�XVH�WKH�DFWLYLW\�JURXS�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��WKHQ�\RX�VKRXOGQRWH�WKDW�WKH�JHQHUDWHG�SURILOH�LV�QRW�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�XQWLO�WKH�XVHUPDVWHU�UHFRUGV�KDYH�EHHQ�FRPSDUHG��:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS�WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG�����������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WR�UHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKHDVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�D�WHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKHV\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKH�XVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKHXVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW�3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH�\RX�VKRXOG�VFKHGXOH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKHPRUQLQJ��WR�UXQ�LQ�WKH�EDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUWFRPSDUHV�WKH�XVHU�PDVWHU�UHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQVIRU�WKH�XVHU�PDVWHU�UHFRUGV��7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHUDVVLJQPHQWV�DQG�HQWHUV�DXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�DVVLJQPHQWV�

6 7

8

9

Page 204: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to Users

Authorizations Made Easy9–6

$VVLJQLQJ�$FWLYLW\�*URXSV�WR�8VHUV

<RX�FDQ�DOVR�DVVLJQ�XVHU�UROH�WHPSODWHV�RU�DFWLYLW\�JURXSV�WR�XVHUV�XVLQJ�WUDQVDFWLRQ�68���¥�8VHUV��,I�\RXZRXOG�OLNH�WR�DVVLJQ�VHYHUDO�DFWLYLW\�JURXSV�WR�RQH�XVHU�WKLV�LV�D�PRUH�HIILFLHQW�ZD\�IRU�WKH�DVVLJQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��

�� (QWHU�WKH�QDPH�RI�WKH�XVHU�WR�ZKRP\RX�ZRXOG�OLNH�WR�DVVLJQ�WKH�DFWLYLW\JURXS��RU�XVH�SRVVLEOH�HQWULHV�

�� &KRRVH� �

�� 6HOHFW�DOO�WKH�GHVLUHG�DFWLYLW\�JURXSVE\�HQWHULQJ�WKH�FRUUHFW�QDPHV��RU�XVHSRVVLEOH�HQWULHV�

�� (QWHU�WKH�FRUUHFW�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW�

�� &KRRVH� �WR�VDYH�\RXU�DVVLJQPHQW�

7R�VHH�WKH�FRUUHVSRQGLQJ�SURILOHV��VHOHFWWKH�3URILOHV�WDE�

3

5

6

4

Tip

2

Page 205: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Release 4.6A/B9–7

$OO�FKDQJHV�KDYH�EHHQ�VDYHG�WR�WKHXVHU�PDVWHU�UHFRUG�

5HPHPEHU��DV�ORQJ�DV�DQ�DFWLYLW\�JURXS�LV�DVVLJQHG�WR�DQ�5���XVHU��\RX�FDQ�FKDQJH�WKLVDFWLYLW\�JURXS�DQG�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV�DV�RIWHQ�DV�\RX�ZDQW�ZLWKRXWXSGDWLQJ�WKH�XVHU�PDVWHU�UHFRUG�

,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKHVH�SURILOHVDUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�XVHUV�WR�ZKRP�WKH�ROG�SURILOH�EHORQJHG��7KH�XVHUPDVWHU�RI�WKLV�XVHU�DXWRPDWLFDOO\�JHWV�XSGDWHG�

$VVLJQLQJ�3'�2EMHFWV�WR�$FWLYLW\�*URXSV

<RX�FDQ�DVVLJQ�3'�REMHFWV�VXFK�DV�SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV�WR�DFWLYLW\�JURXSV��8VLQJWUDQVDFWLRQ�PFCG��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�JHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQVWDE�VKRXOG�EH�JUHHQ��

&UHDWH�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ

7R�DVVLJQ�3'�REMHFWV�WR�DFWLYLW\�JURXSV��\RXU�V\VWHP�PXVW�KDYH�DQ�RUJDQL]DWLRQDO�SODQ��,I\RX�KDYH�QRW�FUHDWHG�RQH�IRU�\RXU�FRPSDQ\�EXW�\RX�ZDQW�WR�WHVW�WKLV�IXQFWLRQDOLW\��VHH&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ�RQ�SDJH��²���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�WR�EH�DVVLJQHG�WR�D�3'�REMHFW�

�� 6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�PDQDJHPHQW�DQG�ZRUNIORZ��

�� &KRRVH� �&KDQJH�

Page 206: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Authorizations Made Easy9–8

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�

�� &KRRVH� 2UJDQL]DWLRQDO�0��

�� 7R�FUHDWH�WKH�DVVLJQPHQW , FKRRVH� �

�� 6HOHFW�WKH�REMHFW�WR�EH�DVVLJQHG��IRUH[DPSOH��3RVLWLRQ��

�� &KRRVH� �

��� &KRRVH� �WR�JHW�D�OLVW�RI�SRVLWLRQV�

��� )URP�WKH�OLVW�RI�SRVLWLRQV��VHOHFW�WKHSRVLWLRQ�\RX�ZRXOG�OLNH�WR�DVVLJQ�WRWKH�VHOHFWHG�DFWLYLW\�JURXS��PRUHWKDQ�RQH�SRVLWLRQ�PD\�EH�VHOHFWHG��

��� &KRRVH� �

6

9

8

7

10

11

12

5

Page 207: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Release 4.6A/B9–9

��� (QWHU�WKH�WLPH�SHULRG�IRU�WKHUHODWLRQVKLS�

��� &KRRVH� �WR�FUHDWH�WKH�UHODWLRQVKLS�

7KH�UHODWLRQVKLS�LV�HVWDEOLVKHG�

��� 8QGHU�WKH�DFWLYLW\�JURXS�\RX�FDQ�VHHWKH�DVVLJQHG�SRVLWLRQ��8QGHU�WKHSRVLWLRQ�\RX�FDQ�VHH�WKH�DVVLJQHGXVHU�

��� 7R�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VRWKDW�WKH�DSSURSULDWH�SURILOHV�DUHLQVHUWHG�LQWR�WKLV�UHFRUG��FKRRVH� �

<RX�KDYH�WKH�RSWLRQ�WR�VHOHFW�EHWZHHQ�GLIIHUHQW�YLHZV�IRU�WKH�DVVLJQPHQW��)URP�WKHPHQX�EDU��FKRRVH�9LHZ�DQG�WKHQ�VHOHFW�DQ\�RI�WKH�IROORZLQJ�PHQX�RSWLRQV��.H\�$EEUHYLDWLRQ��2EMHFW�SHULRG��5HODWLRQVKLS�SHULRG��8VHUV�RQO\�

7KH�DVVLJQPHQW�LV�VDYHG�DQG�WKHXVHU�PDVWHU�GDWD�XSGDWHG�

13

14

15

16

Page 208: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Authorizations Made Easy9–10

$VVLJQLQJ�$FWLYLW\�*URXSV�WR�3'�2EMHFWV

<RX�FDQ�DVVLJQ�DFWLYLW\�JURXSV�WR�3'�REMHFWV��8VLQJ�WKH�3*��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQJHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQV�WDE�VKRXOG�EH�JUHHQ��

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�ppom_old�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�WKH�+XPDQ�UHVRXUFHV�→�2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�PRGH�→�6LPSOH�PDLQWHQDQFH�→3320B2/'�¥�FKDQJH��

�� (QWHU�WKH�RUJDQL]DWLRQDO�XQLW��RU�XVHSRVVLEOH�HQWULHV�

�� &KRRVH�7��6WUXFWXUH�6HDUFK�WR�VHOHFWWKH�RUJDQL]DWLRQDO�XQLW�XVLQJ�DVWUXFWXUDO�VHDUFK�

�� 6HOHFW�WKH�DSSURSULDWH�URRWRUJDQL]DWLRQDO�XQLW��,Q�WKLV�H[DPSOH�ZH�FKRVH�WKH�URRW�RUJDQL]DWLRQDOXQLW�IURP�WKH�VDPSOH�RUJDQL]DWLRQDOSODQ�

�� &KRRVH� �

5

2

3

4

Page 209: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Release 4.6A/B9–11

�� 7KH�VHOHFWHG�RUJDQL]DWLRQDO�SODQDSSHDUV�LQ�WKH�2UJDQL]DWLRQDO�XQLWILHOG�

�� &KRRVH� �

�� &KRRVH�6WDII�DVVLJQPHQWV�

�� ([SDQG�WKH�XQLWV�DQG�VHOHFW�WKH�RQHWR�ZKLFK�\RX�ZRXOG�OLNH�WR�DVVLJQWKH�DFWLYLW\�JURXS��IRU�H[DPSOH�%X\HU��

��� &KRRVH�7DVN�SURILOH�

6

7

8

9

10

Page 210: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Authorizations Made Easy9–12

��� 2Q�WKH�7DVN�3URILOH�&KDQJH�VFUHHQ�VHOHFW�WKH�SRVLWLRQ�WR�ZKLFK�\RXZRXOG�OLNH�WR�DVVLJQ�DQ�DFWLYLW\JURXS�

��� &KRRVH� �$FWLYLW\�JURXS�

��� (QWHU�WKH�ILUVW�OHWWHU�RI�WKH�DFWLYLW\JURXS�\RX�ZRXOG�OLNH�WR�DVVLJQ�RUOHDYH�WKH�DVWHULVNV�� ��LQ�WKH�ILHOG�WRJHW�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�

��� &KRRVH� �

��� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZLVK�WRDVVLJQ��PXOWLSOH�VHOHFWLRQV�DUHSRVVLEOH��

��� &KRRVH� �

��� 7R�YHULI\�WKH�DVVLJQPHQW��FKRRVH� �

7KH�DVVLJQPHQW�EHWZHHQ�WKH�SRVLWLRQDQG�WKH�DFWLYLW\�JURXS�KDV�EHHQ�VDYHG�

7R�PDNH�FKDQJHV�WR�WKH�DVVLJQHGDFWLYLW\�JURXS��VHOHFW�WKH�DFWLYLW\�JURXSDQG�FKRRVH�*RWR�→�$FWLYLW\�JURXS�

7KH�QH[W�VWHS�LV�WR�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VR�WKDW�WKH�DSSURSULDWH�SURILOHV�DUH�LQVHUWHG�LQWR�WKHXVHU�PDVWHU�UHFRUG�DQG�DVVLJQHG�WR�WKH�RUJDQL]DWLRQDO�XQLWV�

11

12

13

14

15

16

17

Page 211: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Transferring Users from an IMG Project to an Activity Group

Release 4.6A/B9–13

7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW�WR�DQ�$FWLYLW\

*URXS

,I�\RX�DVVLJQHG�XVHUV��UHVRXUFHV��WR�DQ�,0*�SURMHFW�LQ�WKH�SURMHFW�PDQDJHPHQW��DQG�GLG�QRWFRS\�WKH�XVHU�DVVLJQPHQW�ZKHQ�FUHDWLQJ�WKH�FXVWRPL]LQJ�DXWKRUL]DWLRQV��\RX�FDQ�WUDQVIHUWKHVH�XVHUV�WR�WKH�DFWLYLW\�JURXS�XVLQJ�WKH�IROORZLQJ�SURFHGXUH�

1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�\RX�PDNH�FKDQJHV�LQ�WKH�,0*�SURMHFWDGPLQLVWUDWLRQ�

)RU�WKH�IROORZLQJ�H[DPSOH��ZH�DVVXPH�WKDW�< $Q�,0*�SURMHFW�ZLWK�DW�OHDVW�RQH�DVVLJQHG�XVHU�H[LVWV< <RX�DVVLJQHG�DQ�,0*�SURMHFW�RU�SURMHFW�YLHZ�WR�WKH�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH

VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�< <RX�PDLQWDLQHG�WKH�DXWKRUL]DWLRQV�IRU�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH

VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�

7R�WUDQVIHU�XVHUV�IURP�DQ�,0*�SURMHFW�WR�DQ�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS�WR�ZKLFK�\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKH�XVHU�IURPDQ�,0*�SURMHFW��IRU�H[DPSOH��40B&86720,=,1*���DQG�FKRRVH� �&KDQJH�

�� &KRRVH�WKH�0HQX�WDE�

�� &KRRVH�8WLOLWLHV�→&XVWRPL]LQJ�DXWK� 4

Page 212: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Transferring Users from an IMG Project to an Activity Group

Authorizations Made Easy9–14

�� &KRRVH� �8VHU�

�� 6HOHFW�WKH�XVHUV�\RX�ZRXOG�OLNH�WRDVVLJQ�

�� &KRRVH� �

$OO�VHOHFWHG�XVHUV�ZLOO�EH�WUDQVIHUUHGE\�GHIDXOW�

�� &KRRVH� �

�� &KRRVH�WKH�8VHU�WDE�

��� &KRRVH� 8VHU�FRPSDUH�

$V�FXVWRPL]LQJ�LV�SURMHFW�UHODWHG�DQGUXQV�IRU�D�OLPLWHG�SHULRG��\RX�VKRXOGPDLQWDLQ�WKH�HQG�GDWH�IRU�WKH�XVHU�LQ�WKHXVHU�DVVLJQPHQW��7LPH�UHVWULFWLRQVSUHYHQW�XVHUV�ZKR�DUH�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�IURP�KDYLQJDXWKRUL]DWLRQ�IRU�WKH�DVVLJQHG�SURMHFWVRU�SURMHFW�YLHZV�DIWHU�WKH�FXVWRPL]LQJSURMHFW�LV�FRPSOHWH�

��� &KRRVH� �&RPSOHWH�FRPSDUH�

5

6

7

8

9

10

11

Page 213: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–15

7KH�XVHUV�IURP�WKH�FXVWRPL]LQJSURMHFW�DUH�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�

8SGDWLQJ�3URILOHV�LQ�WKH�8VHU�0DVWHU�5HFRUGV

7KLV�VHFWLRQ�GHVFULEHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�UHSRUW�3)&*B7,0(�'(3(1'(1&<�WRXSGDWH�XVHU�PDVWHU�UHFRUGV��5HPHPEHU�WKDW�DFWLYLW\�JURXSV��WKHLU�DVVLJQPHQW�WR�XVHU�PDVWHUUHFRUGV��RU�3'�REMHFWV�FDQ�EH�GHOLPLWHG�

7R�HQVXUH�WKDW�RQO\�YDOLG�DXWKRUL]DWLRQ�SURILOHV�UHPDLQ�LQ�WKH�XVHU�PDVWHU�UHFRUG�HDFK�GD\�FRQGXFW�GDLO\�SURILOH�FRPSDULVRQV��)RU�WKH�FKDQJHV�LQ�WKH�XVHU�PDVWHU�UHFRUG�WR�EH�HIIHFWLYH�WKLV�FRPSDULVRQ�PXVW�WDNH�SODFH�EHIRUH�WKH�XVHU�ORJV�RQ�

7R�FRQGXFW�D�FRPSDULVRQ��\RX�FDQ�HLWKHU�< &RPSDUH�WKH�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*

< 8VH�PDVV�FRPSDUH�ZLWKLQ�WKH�3*��(QYLURQPHQW�→�0DVV�FRPSDUH�

< 5XQ�UHSRUW�3)*&B7,0(B'(3(1'(1&<�LQ�D�EDFNJURXQG�MRE�EHIRUH�WKH�VWDUW�RI�HDFKGD\

7KHVH�RSWLRQV�DUH�GLVFXVVHG�LQ�WKH�IROORZLQJ�WKUHH�VHFWLRQV�

&RPSDULQJ�8VHU�0DVWHU�'DWD�IURP�:LWKLQ�7UDQVDFWLRQ�3)&*

$�FRPSDULVRQ�RI�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*�LPPHGLDWHO\�XSGDWHV�DVSHFLILF�XVHU�PDVWHU�DIWHU�FUHDWLQJ�DQ�DVVLJQPHQW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�DQ�DFWLYLW\�JURXS�IRU�ZKLFK�\RX�ZRXOG�OLNH�WR�XSGDWH�WKH�XVHU�PDVWHU�GDWD�DQGFKRRVH� �&KDQJH�

Page 214: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–16

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�

�� ,Q�WKH�8VHU�,'�FROXPQ��HQWHU�D�XVHU,'�RU�VHOHFW�LW�IURP�D�OLVW�XVLQJSRVVLEOH�HQWULHV�

�� (QWHU�D�YDOLGLW\�SHULRG�

�� &KRRVH� �8VHU�FRPSDUH�

6WDWXV�'LVSOD\�RQ�WKH�8VHU�7DE7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�WHOOV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS��,I�WKHLQGLFDWRU�LV�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS�,I�\HOORZ��WKLV�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKHXVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�

�� &KRRVH� �&RPSOHWH�FRPSDUH�

7KH�H[SHUW�PRGH�GLVSOD\V�H[DFWO\�ZKLFK�SURILOHV�ZHUH�LQVHUWHG�DQG�UHPRYHG�IRU�HDFKXVHU��$V�\RX�KDYH�WKH�RSWLRQ�WR�UHVWULFW�WKH�VHOHFWLRQ�RI�WKH�SURILOHV�IRU�SURFHVVLQJ��WKHVWDWXV�RI�8VHU�FRPSDUH�LV�QRW�VZLWFKHG�WR�JUHHQ��7KLV�VWDWXV�LV�RQO\�WKH�FDVH�LI�WKHFRPSDULVRQ�LV�H[HFXWHG�E\�FKRRVLQJ� �&RPSOHWH�FRPSDUH��,I�\RX�FKRRVH� �([SHUW�PRGH�IRUFRPSDUH��WKH�VWDWXV�LV�QRW�VHW�WR�JUHHQ�

�� ,I�\RX�KDYH�QRW�VDYHG�WKH�DFWLYLW\JURXS�\HW��FKRRVH�<HV�

45

6

7Tip

8

3

Page 215: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–17

�� 7KH�JUHHQ�OLJKW�RQ�8VHU�FRPSDUHLQGLFDWHV�WKDW�WKH�FRPSDULVRQ�LVFRPSOHWH�

1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�

9

Page 216: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–18

3URILOH�&RPSDULVRQV�8VLQJ�0DVV�&RPSDUH��3)8'�

)RU�SURILOH�FRPSDULVRQ�ZLWKLQ�WKH�3*��\RX�FDQ�XVH�WKH�PDVV�FRPSDUH�IXQFWLRQ�UHJXODUO\�WR�FKHFN�IRUEDFNJURXQG�MRE�HUURUV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��

�� &KRRVH�WKH�DFWLYLW\�JURXSV�\RXZRXOG�OLNH�WR�UHFRQFLOH�

�� 6HOHFW�RQH�RI�WKH�IROORZLQJ�DFWLRQV�< 6FKHGXOH�RU�FKHFN�MRE�IRU�IXOO

UHFRQFLOLDWLRQ�VHH�WKH�QH[W�VHFWLRQ�

< 0DQXDO�VHOHFWLRQ�RI�SURILOHV�IRU�VHOHFWHG�SURILOHV�

< &RPSOHWH�FRPSDUH�WR�DGMXVW�XVHU�PDVWHU�UHFRUGV�IRUDOO�DFWLYLW\�JURXSV�

�� 8QGHU�2SWLRQV��VHOHFW�WKH�GHVLUHGVHWWLQJV��ZH�VHOHFWHG�DOO��

�� ,I�\RX�ZRXOG�OLNH�WR�UHFRQFLOH�ZLWKRUJDQL]DWLRQDO�PDQDJHPHQW��VHOHFW5HFRQFLOH�ZLWK�+5�2UJDQL]DWLRQDO0DQDJHPHQW�

�� &KRRVH� �

7KH�IROORZLQJ�ZLQGRZ�RQO\�DSSHDUV�LI�\RX�VHOHFW�WKH�RSWLRQ�0DQXDO�VHOHFWLRQ�RI�SURILOHV�LQVWHS����EHFDXVH�WKH�VWDWXV�IRU�WKH�FRPSOHWH�FRPSDUH�KDV�QRW�EHHQ�VHW��,I�\RX�OHDYH�WKHGHIDXOW�YDOXH��ZKLFK�LV�&RPSOHWH�FRPSDUH��\RX�ZLOO�QRW�JHW�WKH�IROORZLQJ�ZLQGRZ��EHFDXVHWKH�VWDWXV�ZLOO�DOUHDG\�EH�VHW�FRUUHFWO\�IRU�WKH�3*�

�� &KRRVH� �

6

2

3

4

5

7

Page 217: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–19

�� &KRRVH� �8VHU�PDVWHU�UHFRUG�

7KH�XVHU�PDVWHU�UHFRUGV�KDYH�EHHQVXFFHVVIXOO\�XSGDWHG�

1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�

5HSRUW�3)&*B7,0(B'(3(1'(1&<�WR�6FKHGXOH�7LPH�'HSHQGHQF\

7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV

:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWHDV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG������������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WRUHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKH�DVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�DWHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKH�V\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKHXVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKH�XVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH��\RX�VKRXOG�VFKHGXOH�UHSRUW3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKH�PRUQLQJ��WR�UXQ�LQ�WKHEDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUW�FRPSDUHV�WKH�XVHU�PDVWHUUHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQV�IRU�WKH�XVHU�PDVWHU�UHFRUGV�7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHU�DVVLJQPHQWV�DQG�HQWHUVDXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�XVHU�DVVLJQPHQWV�

,I�WKH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�UXQV�HYHU\�QLJKW��WKH�DXWKRUL]DWLRQ�SURILOHV�LQ�WKHXVHU�PDVWHU�ZLOO�EH�XSGDWHG�HDFK�PRUQLQJ��7KH�EHVW�SURFHGXUH�LV�WR�VFKHGXOH�WKLV�UHSRUW�LQ�DSHULRGLF�EDFNJURXQG�MRE�

8

Page 218: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–20

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��VHOHFW�WKHGHVLUHG�DFWLYLW\�JURXS�

�� 6HOHFW�6FKHGXOH�RU�FKHFN�MRE�IRU�IXOOUHFRQFLOLDWLRQ�

�� &KRRVH� �

�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�RUOHDYH�WKH�GHIDXOW�

�� 8QGHU�6WDUW�GDWH��VHOHFW�WKH�GDWH�DQGWLPH�\RX�ZDQW�WKH�UHSRUW�WR�VWDUWDXWRPDWLFDOO\�

�� &KRRVH� �([HFXWH�

4

3

2

5

6

7

Page 219: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–21

�� &KRRVH .

�� (QWHU�D�MRE�QDPH�RU�OHDYH�WKHGHIDXOW�

��� (QWHU�D�MRE�FODVV��SULRULW\��

��� &KRRVH� �

7KH�MRE�ZL]DUG�KHOSV�\RX�WR�GHILQH�D�MREXVLQJ�VWHS�E\�VWHS�GLDORJ�VFUHHQV�WRJXLGH�\RX�WKURXJK�WKH�SURFHVV��2Q�WKHODVW�VFUHHQ��\RX�VHH�D�VXPPDU\�RI�ZKDW\RX�KDYH�GHILQHG�EHIRUH�\RX�VDYH�

&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ

<RX�KDYH�WZR�RSWLRQV�WR�FUHDWH�DQ�RUJDQL]DWLRQDO�SODQ�< 7KH�FODVVLF�5���WUDQVDFWLRQ��PPOC_OLD�< 7KH�(QMR\�WUDQVDFWLRQ��PPOCE�

%RWK�FDQ�EH�IRXQG�LQ�WKH�2UJDQL]DWLRQDO�PDQDJHPHQW�XQGHU�+XPDQ�5HVRXUFHV�LQ�WKH�6$3VWDQGDUG�PHQX�

,Q�WKH�IROORZLQJ�VHFWLRQ��ZH�GHVFULEH�WKH�VWHSV�WR�FUHDWH�D�VDPSOH�RUJDQL]DWLRQDO�SODQ�IRUWHVWLQJ��7KLV�SODQ�LV�QRW�FRPSOHWH��EXW�VKRZV�WKH�UHTXLUHG�HOHPHQWV�

8

910

11

Tip

Page 220: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–22

8VLQJ�WKH�&ODVVLF�5���7UDQVDFWLRQ

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOC_OLD�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�0RGH�→�6LPSOH�0DLQWHQDQFH�→�332&B2/'�&UHDWH��

A�URRW�RUJDQL]DWLRQDO�XQLW��WKHKLJKHVW�OHYHO�LQ�DQ�RUJDQL]DWLRQDOVWUXFWXUH��QHHGV�WR�EH�FUHDWHG��7KHQEXLOG�XS�WKH�RUJDQL]DWLRQDO�VWUXFWXUHIURP�WKH�URRW�RUJDQL]DWLRQDO�XQLW�

�� (QWHU�WKH�VKRUW�DQG�ORQJ�QDPH�IRUWKH�URRW�RUJDQL]DWLRQDO�XQLW�

�� &KRRVH� �

�� ,Q�WKH�5HTXHVW�ILHOG��XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�FKDQJH�UHTXHVW��,IQRQH�H[LVWV�\HW��XVH� �WR�FUHDWH�RQH�

�� &KRRVH� �

�,Q�WKH�IROORZLQJ�VWHSV��ZH�ZLOO�QRWVKRZ�WKLV�GLDORJ�ER[�DQ\PRUH��,I�LWGRHV�DSSHDU��SURFHHG�LQ�WKH�VDPHZD\�DV�KHUH��

�� &KRRVH� �WR�FUHDWH�WKHRUJDQL]DWLRQDO�XQLWV�WKDW�IROORZ�\RXUURRW�XQLW�

2

3

4

5

6

Page 221: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–23

�� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWVXQGHU�\RXU�URRW�XQLW�

�� &KRRVH� �

�� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW�DQGFKRRVH� �WR�HQWHU�WKH�QH[W�OHYHO�

��� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWXQGHU�WKH�VHOHFWHG�OHYHO��IRUH[DPSOH��6XEVLGLDU\�$�*HUPDQ\��

��� &KRRVH� �

��� &KRRVH�6WDII�DVVLJQPHQW�

7

8

9

10

11

12

Page 222: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–24

7KH�6WDII�$VVLJQPHQWV���&KDQJHZLQGRZ�DOORZV�\RX�WR�LGHQWLI\�WKHIXQGDPHQWDO�VWDIILQJ�GHWDLOVUHTXLUHG�IRU�DQ�RUJDQL]DWLRQDO�SODQ�7KLV�VWHS�LV�DFKLHYHG�E\�FUHDWLQJMREV��DQG�SRVLWLRQV��DQG�E\�DVVLJQLQJKROGHUV�WR�SRVLWLRQV�

��� &KRRVH�(GLW�→�&UHDWH�→�-REV�

-REV�DUH�RQH�RI�WKH�REMHFWV�WKDW�PDNH�XS�DQ�RUJDQL]DWLRQDO�SODQ��$�MRE�LV�D�JHQHUDOFODVVLILFDWLRQ��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW��FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF�<RX�PD\�FUHDWH�DV�PDQ\�MREV�DV�\RX�ZDQW��2QFH�D�MRE�LV�FUHDWHG��GHVFULEH�LWV�DWWULEXWHV�E\GHILQLQJ�LQIRW\SHV��$Q�HPSOR\HH�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV�DQG�SURSHUWLHV�RI�WKH�MRE��SRVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��

��� (QWHU�WKH�MRE�LQIRUPDWLRQ�

��� &KRRVH� �

��� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW��WKHQFKRRVH� �3RVLWLRQV�

13

14

15

16

Page 223: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–25

��� &KRRVH�SRVVLEOH�HQWULHV�IRU�$EEU�

3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQWV�ZLWKLQ�D�FRPSDQ\��IRU�H[DPSOH�

< 6DOHV�PDQDJHU< 0DUNHWLQJ�DVVLVWDQW< -XQLRU�PDQXIDFWXULQJ�HQJLQHHU%\�FUHDWLQJ�SRVLWLRQV�DQG�UHODWLRQVKLSV�DPRQJ�WKH�GLIIHUHQW�SRVLWLRQV��\RX�FDQ�LGHQWLI\WKH�UHSRUWLQJ�VWUXFWXUH�DW�\RXU�ILUP��3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV�

��� 6HOHFW�WKH�$EEUHYLDWLRQ�DQG�1DPH�WDE�

��� &KRRVH� �

��� 6HOHFW�WKH�DSSURSULDWH�MRE�

��� &KRRVH� �

��� 8QGHU�3RVLWLRQ� HQWHU�D�GHVFULSWLRQ�RIWKH�SRVLWLRQ�LQ�WKH�DSSURSULDWHILHOGV�

��� &KRRVH� �

17

18

19

21

20

22

23

Page 224: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–26

5HSHDW�VWHSV���²���WR�FUHDWHDGGLWLRQDO�SRVLWLRQV�

��� 6HOHFW�D�SRVLWLRQ�DQG�FKRRVH�$VVLJQKROGHU�

$VVLJQ�KROGHUV�ZKHQ�\RX�ZDQW�WRLGHQWLI\�ZKR�RFFXSLHV��RU�ILOOV��DVSHFLILF�SRVLWLRQ�

,Q�6LPSOH�0DLQWHQDQFH��DVVLJQ�HLWKHUDQ�HPSOR\HH�RU�5���XVHU�WR�DSRVLWLRQ��:RUNIORZ�XVHUV�DVVLJQ�5��XVHUV�WR�SRVLWLRQV��3HUVRQQHODGPLQLVWUDWLRQ�XVHUV�DVVLJQHPSOR\HHV�WR�SRVLWLRQV�

��� &KRRVH�SRVVLEOH�HQWULHV�WR�GLVSOD\�WKHOLVW�RI�5���XVHUV�DOUHDG\�LQ�\RXUV\VWHP�

��� 6HOHFW�WKH�FRUUHFW�XVHU�RI�WKH�SRVLWLRQIURP�WKH�OLVW�

��� &KRRVH� �

��� (QWHU�WKH�YDOLGLW\�SHULRG�RI�WKHDVVLJQPHQW�

��� &KRRVH� �

24

25

27

26

28

29

Page 225: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–27

5HSHDW�VWHSV���²���WR�DVVLJQ�DGGLWLRQDOKROGHUV�WR�SRVLWLRQV�

7KH�RUJDQL]DWLRQDO�SODQ�LV�QRZ�FUHDWHG�7R�JHW�D�JUDSKLFDO�RYHUYLHZ��FRQWLQXHZLWK�WKH�IROORZLQJ�VWHSV�

��� 6HOHFW�WKH�URRW�RUJDQL]DWLRQDO�XQLW�

��� &KRRVH� �WR�GLVSOD\�WKH�6WUXFWXUDO*UDSKLFV�

8VLQJ�WKH�(QMR\�7UDQVDFWLRQ

7KH�SURFHGXUH�WR�FUHDWH�WKH�RUJDQL]DWLRQDO�SODQ�XVLQJ�WKH�(QMR\�WUDQVDFWLRQ�LV�EDVLFDOO\�WKH�VDPH�DV�WKHFRPPRQ�5���VW\OH��7KH�RQO\�GLIIHUHUHQFH�LV�WKDW�DOO�WKH�SURFHGXUHV�DUH�GLVSOD\HG�DQG�SHUIRUPHG�RQ�RQHVFUHHQ�

$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�(QMR\�IXQFWLRQDOLW\�ZDV�VWLOO�XQGHU�GHYHORSPHQW��7KHUHIRUH��ZH�RQO\SURYLGH�WKH�VFUHHQ�EHORZ�ZKLFK�\RX�FDQ�UHDFK�WKH�IROORZLQJ�ZD\�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOCE�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�2UJDQL]DWLRQDO�SODQ�→�2UJDQL]DWLRQ�DQG�6WDIILQJ�→�&UHDWH�.

+HUH�\RX�HQWHU�WKH�QHZ�2UJDQL]DWLRQDOXQLW�DQG�DOO�WKH�RWKHU�GDWD��DV�ZHGHVFULEH�XVLQJ�WKH�FRPPRQ�5���VW\OH�

31

30

Page 226: Authorizations Made Easy

Chapter 9: Assigning Activity Groups

Structural Authorizations

Authorizations Made Easy9–28

6WUXFWXUDO�$XWKRUL]DWLRQV

6WUXFWXUDO�DXWKRUL]DWLRQV�DUH�QRW�FRYHUHG�LQ�WKLV�JXLGH��+RZHYHU��LI�\RX�QHHG�LQIRUPDWLRQRQ�VWUXFWXUDO�DXWKRUL]DWLRQV��UHIHU�WR�WKH�$XWKRUL]DWLRQV�0DGH�(DV\�JXLGHERRN��5HOHDVH����$�%��FKDSWHU����6WUXFWXUDO�$XWKRUL]DWLRQV��7KLV�FKDSWHU�FDQ�DOVR�EH�GRZQORDGHG�IURP�WKH6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�DW�KWWS���ZZZ�VDSODEV�FRP�DXWK�

Page 227: Authorizations Made Easy

10–1

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(

(QYLURQPHQW�IRU�&HQWUDO�8VHU

$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................10–2

Setting Up an ALE User........................................................................................10–3

Naming Logical Systems .....................................................................................10–5

Assigning Logical Systems to Clients................................................................10–8

Defining Target System for RFC Calls ..............................................................10–10

Distribution Model ..............................................................................................10–13

Generating Partner Profiles in the Central System .........................................10–16

Distributing Model View .....................................................................................10–17

Generating Partner Profiles in the Client System............................................10–18

����

Page 228: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Overview

Authorizations Made Easy10–2

2YHUYLHZ

&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QHZ�WR�5HOHDVH������,Q�HDUOLHU�UHOHDVHV�XVHU�PDVWHU�UHFRUGVZHUH�FUHDWHG�LQ�HDFK�FOLHQW�DQG�HDFK�V\VWHP�WKH�XVHU�ORJJHG�RQ�WR��IRU�H[DPSOH��'(9��4$6�35'��HWF����(DFK�XVHU�PDVWHU�UHFRUG�IRU�WKH�VDPH�XVHU�ZDV�LQGHSHQGHQW�RI�RWKHU�XVHU�PDVWHUUHFRUGV��,I�D�XVHU�ZDV�FKDQJHG�LQ�RQH�FOLHQW��WKHQ�WKH�VDPH�XVHU�KDG�WR�EH�FKDQJHG�LQ�DOORWKHU�FOLHQWV�DQG�V\VWHPV�PDQXDOO\��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�UHGXFHV�WKH�PDLQWHQDQFHDQG�V\QFKURQL]DWLRQ�LVVXHV�IDFHG�E\�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�

7KH�FRUH�FRQFHSW�EHKLQG�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�WR�GHVLJQDWH�RQH�FOLHQW�LQ�RQHV\VWHP�DV�WKH�UHSRVLWRU\�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV��7KLV�FOLHQW�V\VWHP�LV�GHVLJQDWHG�DVWKH�VHQGHU��$OO�RWKHU�FOLHQWV�LQ�RWKHU�V\VWHPV�DUH�GHVLJQDWHG�DV�UHFHLYHUV��$SSOLFDWLRQ�/LQN(QDEOLQJ��$/(��LV�5��·V�WHFKQRORJ\�WR�HQDEOH�GDWD�H[FKDQJH�EHWZHHQ�GLIIHUHQW�V\VWHPV�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�XVHU�GDWD�EHWZHHQ�FHQWUDO�DQG�FOLHQW�V\VWHPV�

7KLV�FKDSWHU�GLVFXVVHV�KRZ�WR�VHW�XS�$/(�IRU�XVH�ZLWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��7KHQH[W�FKDSWHU�GLVFXVVHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

6HWWLQJ�XS�$/(�PXVW�EH�GRQH�WRJHWKHU�ZLWK�D�V\VWHP�DGPLQLVWUDWRU�RU�WKH�SHUVRQ�ZKR�ILUVWVHW�XS�WKH�FOLHQWV��,Q�VHWWLQJ�XS�$/(��WKH�HQWLUH�FOLHQW·V�GHILQLWLRQ�ZLOO�EH�FKDQJHG�DQG�WKLVPXVW�QRW�EH�GRQH�ZLWKRXW�WKH�FRQVHQW�RI�WKH�V\VWHP�DGPLQLVWUDWRU�

'XULQJ�WKH�LQVWDOODWLRQ�RI�DQ�$/(�HQYLURQPHQW��\RX�PXVW�IROORZ�HYHU\�VWHS�IRU�DOO�FOLHQW�V\VWHPV�WR�EH�LQWHJUDWHG�LQWR�RQH�XVHU�DFFRXQW��7KLV�XVHU�DFFRXQW�QHHGV�WR�KDYH�V\VWHPDGPLQLVWUDWRU�ULJKWV��(DFK�FOLHQW�V\VWHP�FRPELQDWLRQ�LV�UHFRJQL]HG�E\�$/(�DV�D�ORJLFDOV\VWHP�

6HWWLQJ�XS�DQ�$/(�HQYLURQPHQW�DOORZV�\RX�WR�GLVWULEXWH�GDWD�EHWZHHQ�ORJLFDO�V\VWHPV�DQGNHHS�WKLV�GDWD�FRQVLVWHQW��7KH�V\VWHPV�RI�DQ�$/(�HQYLURQPHQW�DUH�RQO\�ORRVHO\�OLQNHG��7KHGDWD�LV�EHLQJ�H[FKDQJHG�DV\QFKURQRXVO\��ZKLFK�LQVXUHV�WKDW�WKH�GDWD�ZLOO�EH�UHFHLYHG�E\�WKHUHFLSLHQW�V\VWHP�HYHQ�LI�WKH�UHFHLYLQJ�V\VWHP�LV�WXUQHG�RII�DW�WKH�WLPH�RI�VHQGLQJ�6\QFKURQRXV�FRQQHFWLRQV�DUH�RQO\�EHLQJ�XVHG�WR�UHDG�GDWD�E\�$/(�

Page 229: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Setting Up an ALE User

Release 4.6A/B10–3

7KH�JUDSKLF�RQ�WKH�ULJKWVKRZV�DQ�$/(�HQYLURQPHQWIRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

2QH�V\VWHP�QHHGV�WR�EHGHILQHG�DV�WKH�FHQWUDOV\VWHP��7KH�OLQNV�UXQ�IURPWKH�FHQWUDO�V\VWHP�WR�WKHFOLHQW�V\VWHPV�ZKHUH�WKHFHQWUDO�V\VWHP�VHUYHV�DV�WKHKXE�

7KH�FOLHQW�V\VWHPV�DUH�QRWGLUHFWO\�OLQNHG�WR�HDFKRWKHU�

6HWWLQJ�8S�DQ�$/(�8VHU

)RU�LQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQ�DOO�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�\RX�QHHG�D�XVHU�DFFRXQW��8VHG�IRULQWHUQDO�FRPPXQLFDWLRQ��WKLV�XVHU�DFFRXQW�LV�QRW�XVHG�LQ�GLDORJ�PRGH��7KH�XVHU�QHHGV�WR�KDYH�WKH�VDPHXVHU�QDPH�DQG�SDVVZRUG�IRU�DOO�WKH�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQGFKRRVH�(QWHU�

�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHLQWHUQDO�XVHU�

�� 7R�FUHDWH�WKH�XVHU��FKRRVH� �2

3

Page 230: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Setting Up an ALE User

Authorizations Made Easy10–4

�� 2Q�WKH�$GGUHVV�WDE��VSHFLI\�DW�OHDVWWKH�ODVW�QDPH�RI�WKH�XVHU�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

�� 8QGHU�3DVVZRUG��HQWHU�DQ�LQLWLDOSDVVZRUG�

�� 5HSHDW�WKH�LQLWLDO�SDVVZRUG�

�� 8QGHU�8VHU�W\SH��VHOHFW�&3,&�

:H�UHFRPPHQG�\RX�XVH�WKH�XVHU�W\SH&3,&��VLQFH�VXFK�D�V\VWHP�XVHU�FDQQRWORJ�RQ�WR�5���XVLQJ�D�GLDORJ�ZLQGRZ�7KLV�XVHU�FDQ�RQO\�EH�XVHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQV\VWHPV��+RZHYHU��LW�LV�SRVVLEOH�WR�XVHD�GLDORJ�XVHU�IRU�WKLV�FRPPXQLFDWLRQ�

�� &KRRVH�3URILOHV�WDE�

4

5

67

8

9

Page 231: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Release 4.6A/B10–5

��� ,Q�WKH�3URIO��FROXPQ��HQWHU�WKH�SURILOHSAP_ALL�

��� 7R�VDYH�WKH�XVHU��FKRRVH� �

��� 5HSHDW�VWHSV��²���IRU�DOO�FOLHQWV�\RXZDQW�WR�VHW�XS�IRU�WKH�$/(HQYLURQPHQW�

1DPLQJ�/RJLFDO�6\VWHPV

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SALE�DQG�FKRRVH�(QWHU�

�� ([SDQG�WKH�QRGHV�IRU�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV�

�� &KRRVH� �QH[W�WR�WKH�,0*�DFWLYLW\1DPH�/RJLFDO�6\VWHP�

�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �

4

10

11

2

3

Page 232: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Authorizations Made Easy10–6

7KH�GDWD�IRU�WKH�ORJLFDO�V\VWHPV�LV�VWRUHG�LQ�D�FOLHQW�LQGHSHQGHQW�WDEOH��7KHUHIRUH�LW�LVYDOLG�IRU�DOO�FOLHQWV�LQ�DQ�5���6\VWHP��,I�\RXU�$/(�HQYLURQPHQW�FRQVLVWV�RQO\�RI�ORJLFDOV\VWHPV�LQ�RQH�5���6\VWHP��\RX�QHHG�WR�GHILQH�WKH�ORJLFDO�V\VWHPV�RQO\�RQFH��,I�\RX�DUHXVLQJ�PXOWLSOH�5���6\VWHPV��DOO�ORJLFDO�V\VWHPV�QHHG�WR�EH�VHW�XS�LQ�HYHU\�LQVWDQFH�

$�WDEOH�DSSHDUV�ZLWK�DOO�GHILQHGORJLFDO�V\VWHPV�IRU�WKH�GDWDGLVWULEXWLRQ�RI�\RXU�FHQWUDO�5��V\VWHP�

�� 7R�DGG�QHZ�ORJLFDO�V\VWHPV�LQWR�WKHOLVW��FKRRVH�1HZ�HQWULHV�

�� ,Q�WKH�FROXPQ�/RJ�6\VWHP��HQWHU�DVKRUW�QDPH�LQ�FDSLWDO�OHWWHUV�WKDW\RX�ZRXOG�OLNH�WKH�V\VWHP�WR�EHLGHQWLILHG�DV�LQ�WKH�$/(HQYLURQPHQW��(QWHU�D�FOHDUGHVFULSWLRQ�LQ�WKH�1DPH�FROXPQ�IRUWKH�ORJLFDO�V\VWHP�

�� $IWHU�HQWHULQJ�DOO�WKH�ORJLFDOV\VWHPV��FKRRVH� �WR�VDYH�\RXUGDWD�

5HPHPEHU�WR�HQWHU��LI�DYDLODEOH��DOOORJLFDO�V\VWHPV�WKDW�DUH�QRW�SDUW�RI�WKHDFWXDO�5���6\VWHPV��$OO�ORJLFDO�V\VWHPVQHHG�WR�EH�GHILQHG�LQ�HYHU\�5���6\VWHPRI�WKH�$/(�HQYLURQPHQW�

5

7

6

Page 233: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Release 4.6A/B10–7

:H�UHFRPPHQG�\RX�QDPH�WKH�V\VWHP�XVLQJ�D�FRPELQDWLRQ�RI�WKH�V\VWHP�QDPH�DQG�FOLHQWQXPEHU��IRU�H[DPSOH��IRU�V\VWHP�%,=�ZLWK�WKH�FOLHQW�����WKH�QDPH�%,=&/17�����

(QWHU�\RXU�WUDQVSRUW�UHTXHVW�IRU�WKHDERYH�HQWHUHG�GDWD�

�� ,I�\RX�DOUHDG\�KDYH�D�WUDQVSRUWUHTXHVW�LQ�WKLV�V\VWHP��FKRRVH�2ZQUHTXHVW�DQG�VHOHFW�LW�IURP�WKH�OLVW�DQG&RQWLQXH�ZLWK�VWHS����

�� ,I�\RX�GR�QRW�KDYH�D�WUDQVSRUWUHTXHVW�\HW�RU�ZRXOG�OLNH�WR�FUHDWH�DQHZ�RQH��FKRRVH� �

D� ,Q�6KRUW�GHVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�IRU�WKH�WUDQVSRUWUHTXHVW�

E� &KRRVH� �

7KH�V\VWHP�VXJJHVWV�D�FRXQWLQJQXPEHU�IRU�WKH�UHTXHVW�

��� &KRRVH� �WR�HQWHU�WKH�WUDQVSRUWUHTXHVW�

,I�\RXU�ORJLFDO�V\VWHP�LV�H[FOXVLYHO\�LQ�RQH�5���6\VWHP��WKH�QDPLQJ�SURFHVV�LV�QRZFRPSOHWH�

,I�\RXU�ORJLFDO�V\VWHPV�DUH�LQ�GLIIHUHQW�5���6\VWHPV��\RX�KDYH�WR�UHSHDW�VWHSV��²���IRUHDFK�5���6\VWHP��$OO�ORJLFDO�V\VWHPV�QHHG�WR�EH�GHILQHG�LQ�DOO�5���6\VWHPV�RI�WKH�$/(HQYLURQPHQW�

89

9a

9b

10

Page 234: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Assigning Logical Systems to Clients

Authorizations Made Easy10–8

$OWKRXJK�\RX�QDPHG�WKH�ORJLFDO�V\VWHPV��\RX�KDYH�QRW�\HW�OLQNHG�WKH�ORJLFDO�V\VWHPV�WRWKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�

$VVLJQLQJ�/RJLFDO�6\VWHPV�WR�&OLHQWV

$IWHU�QDPLQJ�WKH�ORJLFDO�V\VWHPV��WKH�QH[W�VWHS�LV�WR�DVVLJQ�ORJLFDO�V\VWHPV�WR�FOLHQWV��,Q�WKLV�VHFWLRQ��ZH�OLQNWKH�QHZO\�QDPHG�ORJLFDO�V\VWHPV�WR�WKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�

�� )URP�WKH�ODVW�VFUHHQ�RI�WKH�SUHYLRXV�VHFWLRQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�

�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�$VVLJQ�/RJLFDO�6\VWHP�WR&OLHQW�

�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �WRFRQWLQXH�

2

3

Page 235: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Release 4.6A/B10–9

$�OLVW�RI�DYDLODEOH�FOLHQWV�LQ�WKLV�5��6\VWHP�DSSHDUV�

�� 6HOHFW�WKH�FOLHQW�WR�ZKLFK�\RX�ZDQWWR�DVVLJQ�D�ORJLFDO�V\VWHP�QDPH�DQGLQWHJUDWH�LQWR�WKH�$/(�HQYLURQPHQW�

�� &KRRVH� �

�� (QWHU�D�GHVFULSWLRQ�IRU�WKH�FOLHQW��LIQHFHVVDU\�

�� 7R�DVVLJQ�D�ORJLFDO�V\VWHP�WR�WKDWFOLHQW��HQWHU�WKH�ORJLFDO�V\VWHP�LQXSSHUFDVH�

�� &KRRVH� �

�� 2Q�WKH�QH[W�ZLQGRZ��FKRRVH� �WRSURFHHG��<RX�ZLOO�UHFHLYH�D�PHVVDJHWKDW�\RXU�GDWD�KDV�EHHQ�VDYHG�

��� 7R�DVVLJQ�DQRWKHU�ORJLFDO�V\VWHP�WR�DFOLHQW��FKRRVH� �DQG�UHSHDW�VWHSV��²��

7R�DVVLJQ�D�FOLHQW�RI�D�GLIIHUHQW�5���6\VWHP�WR�D�ORJLFDO�V\VWHP��ORJ�RQ�WR�WKDW�5��6\VWHP��VWDUW�WUDQVDFWLRQ�SALE��DQG�UHSHDW�VWHSV��²��

4

5

6

7

8

Page 236: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Authorizations Made Easy10–10

'HILQLQJ�7DUJHW�6\VWHP�IRU�5)&�&DOOV

$IWHU�DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV��\RX�PXVW�GHILQH�WKH�WDUJHW�V\VWHP�IRU�5)&�FDOOV�

�� )URP�WKH�&KDQJH�9LHZ�§&OLHQWV¨��'HWDLOV�VFUHHQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�

�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�6\VWHPV�LQ1HWZRUN��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�'HILQH�7DUJHW�6\VWHPV�IRU�5)&FDOOV�

�� &KRRVH�&UHDWH�

$Q�5)&�GHVWLQDWLRQ�LV�DOZD\V�FUHDWHGIURP�WKH�FOLHQW�ZKHUH�\RX�DUH�FXUUHQWO\ORJJHG�RQ��7R�GHILQH�DQ�5)&FRQQHFWLRQ�IURP�FOLHQW�����WR�FOLHQW�����\RX�PXVW�EH�ORJJHG�RQ�WR�FOLHQW�����5)&�FRQQHFWLRQV�IRU�WKH�&HQWUDO�8VHU$GPLQLVWUDWLRQ�DOZD\V�QHHG�D�EDFN�DQG�IRUWK�FRQQHFWLRQ��7R�GHILQH�WKH5)&�FRQQHFWLRQ�FRPSOHWHO\��\RX�DOVRQHHG�WR�EH�ORJJHG�RQ�WR�FOLHQW�����DQGVHW�XS�FOLHQW�����DV�WKH�5)&�FRQQHFWLRQ�

3

2

Page 237: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Release 4.6A/B10–11

�� ,Q�5)&�GHVWLQDWLRQ��HQWHU�WKH�QDPH�RIWKH�ORJLFDO�V\WHP�WR�ZKLFK�\RX�ZDQWWR�GHILQH�D�5)&�FRQQHFWLRQ�IURP\RXU�FXUUHQW�V\VWHP��5HPHPEHU�WRXVH�XSSHUFDVH�

�� ,Q�&RQQHFWLRQ�W\SH��HQWHU�3��GHIDXOWYDOXH���LI�LW�LV�D�FRQQHFWLRQ�WR�DQRWKHU5���6\VWHP�

�� 8QGHU�'HVFULSWLRQ��HQWHU�D�GHWDLOHGGHVFULSWLRQ�IRU�WKH�5)&�GHVWLQDWLRQ�

�� ,Q�&OLHQW��HQWHU�WKH�QXPEHU�RI�WKHWDUJHW�FOLHQW�

�� ,Q�WKH�8VHU�DQG�3DVVZRUG�ILHOG��HQWHUWKH�XVHU�DQG�WKH�FRUUHVSRQGLQJSDVVZRUG�\RX�VSHFLILHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�RI�WKHV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�

�� 7R�VDYH�\RXU�GDWD��FKRRVH� �

4

5

6

7

8

9

Page 238: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Authorizations Made Easy10–12

7KH�PHVVDJH�'HVWLQDWLRQ��;;;;VDYHG�DSSHDUV�

1HZ�RSWLRQV�DSSHDU�RQ�VFUHHQ��<RXFDQ�QRZ�FKRRVH�WR�XVH�D�ORDGGLVWULEXWLRQ��UHFRPPHQGHG���,I�\RXGR�QRW�ZDQW�WR�XVH�WKH�ORDGGLVWULEXWLRQ��VNLS�DKHDG�WR�VWHS����

��� 6HOHFW�<HV�IRU�/RDG�GLVWULE�

��� ,Q�7DUJHW�KRVW��HQWHU�WKH�QXPEHU�RIWKH�PHVVDJH�VHUYHU��6HH�WKH�7LSV�7ULFNV�EHORZ�

��� ,Q�6\VWHP�QXPEHU��HQWHU�WKH�V\VWHPQXPEHU�RI�WKH�PHVVDJH�VHUYHU��6HHWKH�7LSV��7ULFNV�EHORZ�

7R�ILQG�WKH�QDPH�RI�WKH�PHVVDJH�VHUYHURI�WKH�WDUJHW�KRVW��JR�WR�WKH�WDUJHWV\VWHP�DQG�VWDUW�WUDQVDFWLRQ�RZ03�8VXDOO\�\RX�ZLOO�VHH�D�OLVW�ZLWK�VHYHUDOVHUYHU�QDPHV��7KH�FRUUHFW�PHVVDJHVHUYHU�LV�WKH�RQH�WKDW�KDV�DQ�0�OLVWHG�LQWKH�6HUYLFHV�FROXPQ��7KH�QDPH�RI�WKHPHVVDJH�VHUYHU�DSSHDUV�DV�WKH�ILUVW�SDUWRI�WKH�6HUYHU�QDPH��LQ�IURQW�RI�WKHXQGHUVFRUH��7KH�ODVW�WZR�GLJLWV�RI�WKH6HUYHU�QDPH�UHSUHVHQW�WKH�V\VWHPQXPEHU�

��� 7R�VDYH�\RXU�GDWD��FKRRVH� �

$�VWDWXV�PHVVDJH�DSSHDUV�VD\LQJ�'HVWLQDWLRQ�;;;;�VDYHG�

��� &KRRVH�7HVW�FRQQHFWLRQ�WR�WHVW�LI�WKHFRQQHFWLRQ�ZRUNV�FRUUHFWO\�

1011 12

13

14

Page 239: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Release 4.6A/B10–13

$�FRUUHFW�FRQQHFWLRQ�WHVW�ORRNV�OLNHWKH�VFUHHQ�WR�WKH�ULJKW�

$�WHVW�ZLWK�5HPRWH�ORJLQ�ZRXOG�QRWZRUN�LI�\RX�XVHG�WKH�6\VWHP�XVHU��&3,&�IRU�WKH�FRQQHFWLRQ��,I�\RX�XVHG�D�'LDORJXVHU��\RX�FDQ�XVH�5HPRWH�/RJLQ�IRU�DQDGGLWLRQDO�WHVW�FRQQHFWLRQ�

7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�WKH�VDPH�5���6\VWHP��FKRRVH� �WZLFH�DQG�UHSHDW�VWHSV��²���

7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�D�GLIIHUHQW�5���6\VWHP��ORJ�RQ�WR�WKDW�V\VWHP��VWDUW�WUDQVDFWLRQSALE,�DQG�UHSHDW�VWHSV��²���

'LVWULEXWLRQ�0RGHO

7KH�GLVWULEXWLRQ�PRGHO�GHVFULEHV�WKH�$/(�PHVVDJH�IORZ�EHWZHHQ�ORJLFDO�V\VWHPV�

�� /RJ�RQ�WR�WKH�FHQWUDO�V\VWHP�RI�WKH�$/(�HQYLURQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU�

�� &KRRVH� �WR�VZLWFK�EHWZHHQGLVSOD\�DQG�HGLW�PRGH�

3

Page 240: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Authorizations Made Easy10–14

�� &KRRVH� �&UHDWH�PRGHO�YLHZ�

�� ,Q�6KRUW�WH[W��HQWHU�D�VKRUWGHVFULSWLRQ�

�� ,Q�7HFKQLFDO�QDPH��HQWHU�D�WHFKQLFDOQDPH�IRU�WKH�PRGHO�YLHZ�

�� &KRRVH� �

�� &KRRVH �LQ�IURQW�RI�0RGHO�YLHZV�WRUHFHLYH�D�OLVW�RI�DOO�PRGHO�YLHZV�LQFOXGLQJ�WKH�RQH�\RX�MXVW�FUHDWHG�

�� 6HOHFW�WKH�MXVW�FUHDWHG�PRGHO�YLHZ�7KH�HQWU\�ZLOO�EH�KLJKOLJKWHG�

��� &KRRVH� �$GG�%$3,�

7R�GLVWULEXWH�WKH�GDWD��\RX�KDYH�WR�GHILQH�WZR�PHWKRGV�IRU�WKH�QHZO\�FUHDWHG�GLVWULEXWLRQPRGHO��:LWKLQ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�RQH�RI�WKH�PHWKRGV�LV�IRU�WKH�GLVWULEXWLRQ�RIWKH�XVHU��DQG�RQH�IRU�WKH�FRPSDQ\��7KHVH�PHWKRGV�DUH�UHDOL]HG�WKURXJK�%$3,V��%XVLQHVV$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��

4

56

7

8

9

10

Page 241: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Release 4.6A/B10–15

��� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHGGLVWULEXWLRQ�PRGHO�

��� ,Q�6HQGHU�FOLHQW��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�

��� ,Q�5HFHLYHU�VHUYHU��HQWHU�WKH�WKHORJLFDO�V\VWHP�QDPH�RI�WKH�FOLHQWV\VWHP�

��� ,Q�2EM�QDPH�LQWHUIDFH��HQWHU�WKH�REMHFWUSER��QRWH�WKDW�WKLV�HQWU\�LV�FDVH�VHQVLWLYH��

��� ,Q�0HWKRG��HQWHU�Clone��QRWH�WKDWWKLV�HQWU\�LV�FDVH�VHQVLWLYH��

��� &KRRVH� �

��� 5HSHDW�VWHS���²���WR�DGG�D�PHWKRGIRU�WKH�FRPSDQ\�DGGUHVV��(QWHUUserCompany�LQ�VWHS����LQVWHDG�RIUSER��QRWH�WKDW�WKH�HQWU\�LV�FDVH�VHQVLWLYH��

��� &KRRVH� �

,I�WKHUH�DUH�PRUH�WKDQ�WZR�V\VWHPV�LQ�\RXU�SODQQHG�$/(�HQYLURQPHQW��UHSHDW���²���IRUDOO�RWKHU�FOLHQW�V\VWHPV�

��� 7R�VDYH�WKH�GDWD��FKRRVH� �

,I�\RX�H[SDQG�WKH�PRGHO�YLHZFRPSOHWHO\�XVLQJ ��\RXU�PRGHOYLHZ�IRU�D�WZR�V\VWHP�$/(HQYLURQPHQW�VKRXOG�ORRN�OLNH�WKHVFUHHQ�WR�WKH�ULJKW�

11

1213

1415

16

18

17

19

Page 242: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Central System

Authorizations Made Easy10–16

*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&HQWUDO�6\VWHP

3ULRU�WR�WKH�JHQHUDWLRQ�RI�WKH�SDUWQHU�SURILOHV��ZKLFK�VHWV�WKH�FRQGLWLRQV�IRU�WKH�HOHFWURQLF�GDWD�H[FKDQJH�LQWKH�$/(�HQYLURQPHQW��\RX�ILUVW�FKRRVH�WKH�SDUDPHWHUV�LQ�WKH�FXUUHQW�PRGHO�YLHZ�DV�GHVFULEHG�EHORZ�

�� 2Q�WKH�'LVWULEXWLRQ�0RGHO�&KDQJHGVFUHHQ��FKRRVH�(QYLURQPHQW�→*HQHUDWH�3DUWQHU�3URILOHV�

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�OHWWHUV�

�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FOLHQW�V\VWHP�

,I�WKHUH�DUH�PRUH�FOLHQW�V\VWHPV�LQ�\RXU$/(�HQYLURQPHQW��VHOHFW�WKRVH�ORJLFDOV\VWHPV�XVLQJ� �

�� &KRRVH� �

7R�LPSURYH�SHUIRUPDQFH��\RX�FDQ�VHOHFW�XQGHU�3DFNHWVL]H�KRZ�PDQ\�,'RFV��GDWDFRQWDLQHU�H[FKDQJH�EHWZHHQ�5���6\VWHPV��ZLOO�EH�VHQW�IRU�HDFK�5)&�SURFHVV��7KHVXJJHVWHG�YDOXH�RI�����,'RFV�LV�D�FRPSURPLVH�WR�NHHS�WKH�QXPEHU�RI�GLDORJ�SURFHVVHVGRZQ�DQG�DW�WKH�VDPH�WLPH��TXLFNO\�SURFHVV�FKDQJHV��7R�LQFUHDVH�WKH�SHUIRUPDQFH�FKRRVH�D�VPDOOHU�QXPEHU�RI�,'RFV�WR�EH�VHQW�IRU�HYHU\�5)&�SURFHVV�

1

23

4

Tip

Page 243: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distributing Model View

Release 4.6A/B10–17

�� <RX�UHFHLYH�WKH�3URWRFRO�IRUJHQHUDWLQJ�SDUWQHU�SURILOH��&KHFN�LI�WKHSDUWQHU�SURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�

�� &KRRVH� �WZLFH�WR�UHWXUQ�WR�WKHVWDUW�VFUHHQ�LQ�%'���

'LVWULEXWLQJ�0RGHO�9LHZ

�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�

�� &KRRVH�(GLW�→��0RGHO�YLHZ�→'LVWULEXWH�

$�OLVW�DSSHDUV�ZLWK�DOO�H[LVWLQJ�FOLHQWV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�WRZKLFK�WKH�PRGHO�YLHZ�QHHGV�WR�EHGLVWULEXWHG�

�� 6HOHFW�WKH�GHVLUHG�V\VWHP�

�� &KRRVH� �

6

1

2

3

5

4

Page 244: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Authorizations Made Easy10–18

<RX�UHFHLYH�D�ORJ�LI�WKH�PRGHO�YLHZKDV�EHHQ�FUHDWHG�LQ�WKH�FOLHQW�V\VWHP�

7R�FKHFN�LI�WKH�PRGHO�YLHZ�KDV�EHHQ�HVWDEOLVKHG�IRU�WKH�FOLHQW�V\VWHP��SHUIRUP�WKHIROORZLQJ�VWHSV�

�� /RJ�RQ�WR�WKH�GHVLUHG�FOLHQW�V\VWHP��� 6WDUW�WUDQVDFWLRQ�SCUA��� (QWHU�WKH�WHFKQLFDO�QDPH�RI�WKH�PRGHO�YLHZ�

�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\�VWUXFWXUH�

*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&OLHQW�6\VWHP

�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU.

�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�

�� &KRRVH�(QYLURQPHQW�→�*HQHUDWH3DUWQHU�3URILOHV�

4

3

Page 245: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Release 4.6A/B10–19

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�

�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�

:LWK�WKLV�HQWU\��\RX�HVWDEOLVK�WKHSDUWQHU�SURILOH�IRU�WKH�UHWXUQFRQHFWLRQ�IURP�WKH�FOLHQW�V\VWHP�WRWKH�FHQWUDO�V\VWHP�

�� &KRRVH� �

<RX�UHFHLYH�WKH�3URWRFRO�IRU�JHQHUDWLQJSDUWQHU�SURILOH��&KHFN�LI�WKH�SDUWQHUSURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�

5HSHDW�VWHSV��²��IRU�DOO�FOLHQWV\VWHPV��LI�QHFFHVVDU\�

<RX�KDYH�QRZ�VHW�XS�WKH�FRPSOHWH�$/(�HQYLURQPHQW�

56

7

Page 246: Authorizations Made Easy

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Authorizations Made Easy10–20

Page 247: Authorizations Made Easy

11–1

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU

$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................11–2

Assigning the Central User Administration Distribution Model ......................11–2

Testing Central User Administration ..................................................................11–3

Migrating Existing Users to the Central System................................................11–7

Defining Field Attributes for User Maintenance ................................................11–9

Global User Manager ..........................................................................................11–10

����

Page 248: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Overview

Authorizations Made Easy11–2

2YHUYLHZ

:LWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�\RX�FDQ�UHGXFH�WKH�V\VWHP�DGPLQLVWUDWRU·V�HIIRUW�WR�PDLQWDLQ�XVHUV�LQ�WKH5���HQYLURQPHQW��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�DOORZV�\RX�WR�PDLQWDLQ�WKH�XVHUV�FHQWUDOO\�LQ�RQH�V\VWHP�7KH�LQIRUPDWLRQ�LV�WKHQ�DXWRPDWLFDOO\�GLVWULEXWHG�WR�WKH�GHSHQGHQW�V\VWHPV�

7R�VHW�XS�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��ZH�DVVXPH�WKDW�\RX�XVH�RQH�XVHU�DFFRXQW�WKDW�KDV�V\VWHPDGPLQLVWUDWRU�DXWKRUL]DWLRQV�IRU�WKH�FRPSOHWH�V\VWHP�HQYLURQPHQW�

7R�VHW�XS�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IRU�\RXU�5���6\VWHP�JURXS��\RX�QHHG�WR�VHWXS�WKH�$/(�HQYLURQPHQW��DV�GHVFULEHG�LQ�FKDSWHU�����6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�\RXU�FHQWUDO�V\VWHP��7KLV�FHQWUDO�V\VWHP�PXVW�QRZ�EH�VHWXS�IRU�WKH�XVHU�PDLQWHQDQFH�

$VVLJQLQJ�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�'LVWULEXWLRQ

0RGHO

�� /RJ�RQ�WR�\RXU�FHQWUDO�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�GLVWULEXWLRQ�PRGHO�DVFUHDWHG�IRU�WKH�$/(�HQYLURQPHQW�

7KH�PRGHO�\RX�FKRRVH�KHUH�LV�WKH�EDVLVIRU�WKH�GLVWULEXWLRQ�RI�XVHU�GDWD�LQ�\RXU$/(�HQYLURQPHQW�

�� &KRRVH� �

6DYLQJ�WKH�PRGHO�DVVLJQPHQW�IRU�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�WKHFRPSOHWH�GLVWULEXWLRQ�PRGHO�WR�DOO�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��\RX�FDQ�QRORQJHU�FUHDWH�D�XVHU�LQ�WKH�FOLHQW�V\VWHP��)URP�WKLV�SRLQW�IRUZDUG��D�V\VWHP�LV�GHILQHG�DVWKH�FHQWUDO�V\VWHP�DQG�WKH�RWKHU�V\VWHPV�DV�FOLHQW�V\VWHPV�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

3

4

Page 249: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Release 4.6A/B11–3

&KHFN�LI�WKH�PRGHO�KDV�EHHQ�DVVLJQHG�DVWKH�FOLHQW�V\VWHP�

�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�7KH�GLVWULEXWLRQ�PRGHO�LV�HQWHUHGDXWRPDWLFDOO\�

�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\VWUXFWXUH�

$�FRPSOHWH�YLHZ�RI�WKH�PRGHOVWUXFWXUH�DSSHDUV�

,I�\RX�GR�QRW�VHH�DQ\�VWUXFWXUH��LW�FRXOGEH�EHFDXVH�WKH�GDWD�KDV�EHHQ�GLVWULEXWHGDV\QFKURQRXVO\��,I�WKLV�LV�WKH�FDVH��JREDFN�WR�WKH�VWDUW�VFUHHQ�RI�WUDQVDFWLRQSCUA��ZDLW�IRU�WZR�PLQXWHV��DQG�UHSHDWVWHS���

7HVWLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ

�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�

�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHWHVW�XVHU�

�� &KRRVH� �

7

2

3

Page 250: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Authorizations Made Easy11–4

�� 2Q�WKH�$GGUHVV�WDE��HQWHU�DW�OHDVW�DODVW�QDPH�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

�� (QWHU�DQ�,QLWLDO�SDVVZRUG�IRU�WKH�WHVWXVHU��<RX�PXVW�FKDQJH�WKH�LQLWLDOSDVVZRUG�DW�ILUVW�ORJRQ�WR�WKH�5��6\VWHP�

�� 5HHQWHU�WKH�LQLWLDO�SDVVZRUG�

�� &KRRVH�WKH�6\VWHPV�WDE�

5

4

6 7

8

Page 251: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Release 4.6A/B11–5

�� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�WKHORJLFDO�QDPHV�RI�WKH�FHQWUDO�V\VWHPDQG�RI�DOO�WKH�FOLHQW�V\VWHPV�LQ�WKHV\VWHPV�WDEOH�

��� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�

��� &KRRVH�7H[W�FRPSDULVRQ�IURP�FKLOGV\V�

$�WH[W�FRPSDULVRQ�LV�QHHGHG�WR�SURYLGHWKH�FHQWUDO�V\VWHP�ZLWK�DYDLODEOHDFWLYLW\�JURXSV�IURP�WKH�FOLHQW�V\VWHP�2QO\�LI�WKLV�VWHS�KDV�EHHQ�SHUIRUPHGFDQ�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHPVEH�GLVSOD\HG�DQG�VHOHFWHG�LQ�WKH�FHQWUDOV\VWHP�XVLQJ�SRVVLEOH�HQWULHV��,W�LV�DOVRSRVVLEOH�WR�DVVLJQ�DFWLYLW\�JURXSVPDQXDOO\�IURP�WKH�FOLHQW�V\VWHPZLWKRXW�WKH�WH[W�FRPSDULVRQ�

��� 5HDG�WKH�GLDORJ�ZLQGRZ�DQG�FKRRVH�WR�FRQWLQXH�

9

10

11

Page 252: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Authorizations Made Easy11–6

$VVLJQ�DQ�DFWLYLW\�JURXS�WR�WKH�WHVW�XVHULQ�HYHU\�ORJLFDO�V\VWHP�RI�WKH�V\VWHPJURXS�

��� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�DOO�WKHORJLFDO�V\VWHPV�

��� ,Q�WKH�$FWLY�FROXPQ��HQWHU�WKHDFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WRWKH�WHVW�XVHU�LQ�WKH�FRUUHVSRQGLQJV\VWHP��IRU�WHVW�SXUSRVHV��LW�LVHQRXJK�WR�DVVLJQ�RQH�DFWLYLW\�JURXSSHU�V\VWHP��

��� &KRRVH� �

6DYLQJ�VWDUWV�WKH�GLVWULEXWLRQ�SURFHVVDXWRPDWLFDOO\��7KH�XVHU�LV�FUHDWHG�ZLWKWKH�DFWLYLW\�JURXS�DVVLJQPHQW�LQ�HYHU\GHILQHG�V\VWHP�

7KH�XVHU�PDLQWHQDQFH�MXPSV�EDFN�WRWKH�VWDUW�VFUHHQ�RI�68���

<RX�UHFHLYH�WKH�PHVVDJH�8VHU���ZDVVDYHG��<RX�FDQ�QRZ�FKHFN�LI�WKH�XVHUGDWD�KDV�EHHQ�GLVWULEXWHG�FRUUHFWO\�

��� &KRRVH�(QYLURQPHQW�→�'LVWULEXWLRQORJ��WUDQVDFWLRQ�SCUL��

13 14

15

16

Page 253: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Migrating Existing Users to the Central System

Release 4.6A/B11–7

$�VHULHV�RI�EXWWRQV�SURYLGHV�DFFHVV�WRGLIIHUHQW�ORJ�GLVSOD\V�

,I�\RX�FKRRVH�6\VWHP�UHSRUWV��\RX�UHFHLYHWKH�XVHU�VWDWXV�VRUWHG�E\�FOLHQW�V\VWHPV�,I�\RX�H[SDQG�WKH�WUHH��\RX�UHFHLYH�WKHXVHUV�RI�WKH�FOLHQW�V\VWHPV�

$Q�RYHUYLHZ�DERXW�(UURUV��:DUQLQJV�6XFFHVVIXO��DQG�1HZ�XQFRQILUPHGGLVWULEXWLRQV�LV�GLVSOD\HG��8QFRQILUPHGGLVWULEXWLRQV�FRXOG�UHVXOW�IURP�D�IDXOW\5)&�FRQQHFWLRQ�

0LJUDWLQJ�([LVWLQJ�8VHUV�WR�WKH�&HQWUDO�6\VWHP

,I�\RX�DOUHDG\�VHW�XS�XVHU�DFFRXQWV�LQ�WKH�FOLHQW�V\VWHPV��WKHVH�XVHUV�QHHG�WR�EH�PLJUDWHG�WR�WKH�FHQWUDOV\VWHP��,I�WKLV�DFWLRQ�KDV�DOUHDG\�EHHQ�SHUIRUPHG��\RX�FDQ�PDLQWDLQ�WKH�XVHU�GDWD�FHQWUDOO\�

�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SCUG�DQG�FKRRVH�(QWHU�

�� 6HOHFW�WKH�FOLHQW�V\VWHP�IURP�ZKHUH�\RX�ZRXOG�OLNH�WR�PLJUDWH�WKH�XVHU�GDWD�

�� &KRRVH�7UDQVIHU�XVHUV�

3

Page 254: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Migrating Existing Users to the Central System

Authorizations Made Easy11–8

2Q�WKH�1HZ�XVHUV�WDE��\RX�FDQ�VHH�DOOXVHU�DFFRXQWV�DYDLODEOH�LQ�WKH�FOLHQWV\VWHP��EXW�QRW�LQ�WKH�FHQWUDO�V\VWHP�<RX�FDQ�PLJUDWH�DOO�WKHVH�XVHUV�LQWR�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

�� 7R�VHOHFW�DOO��FKRRVH� �

�� &KRRVH� �7UDQVIHU�XVHUV�

�� &KRRVH�WKH�,GHQWLFDO�XVHUV�WDE�

2Q�WKH�,GHQWLFDO�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�LGHQWLFDO�ILUVW�DQG�ODVWQDPHV�LQ�WKH�FOLHQW�DQG�FHQWUDO�V\VWHPDUH�GLVSOD\HG��$OO�RI�WKHVH�XVHUV�FDQ�EHPLJUDWHG�WR�&HQWUDO�8VHU$GPLQLVWUDWLRQ��7KH\�ZLOO�DOVR�JHW�WKHFOLHQW�V\VWHP�DVVLJQHG�LQ�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

�� 7R�VHOHFW�DOO��FKRRVH� �

�� &KRRVH� �7UDQVIHU�XVHUV�

�� &KRRVH�WKH�'LIIHUHQW�XVHUV�WDE�

2Q�WKH�'LIIHUHQW�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�WKH�VDPH�XVHU�,'��EXWZLWK�QDPHV�WKDW�DUH�GLIIHUHQW�LQ�WKHFOLHQW�RU�FHQWUDO�V\VWHP��DUH�GLVSOD\HG�

��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FHQWUDOV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�

D� 6HOHFW�WKH�GHVLUHG�HQWU\�

E� &KRRVH� �7UDQVIHU�XVHUV�

��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FOLHQWV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�

D� (QWHU�WKH�VDPH�QDPH�LQ�WKHFHQWUDO�V\VWHP�DV�LW�LV�GLVSOD\HGLQ�WKH�FOLHQW�V\VWHP��7KH�XVHU�LVQRZ�GLVSOD\HG�XQGHU�WKH,GHQWLFDO�XVHUV�WDE�

E� 6HOHFW�WKH�GHVLUHG�HQWU\�

F� &KRRVH� �7UDQVIHU�XVHUV�

4 5

7 8

6

9

10b

10a

Page 255: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Defining Field Attributes for User Maintenance

Release 4.6A/B11–9

,I�WKH�GLIIHUHQW�QDPHV�UHVXOW�IURP�GHDOLQJ�ZLWK�WZR�GLIIHUHQW�SHUVRQV��\RX�KDYH�WR�FKDQJH�WKH�XVHU�QDPHVXVLQJ�SU01�HLWKHU�LQ�WKH�FHQWUDO�RU�FOLHQW�V\VWHP��7KH�XVHU�QDPH�RI�WKH�FOLHQW�V\VWHP�FDQ�EH�IRXQG�RQ�WKH1HZ�XVHUV�WDE�DIWHUZDUGV�

2Q�WKH�$OUHDG\�FHQWUDO�XVHU�WDE��DOO�XVHUDFFRXQWV�DUH�GLVSOD\HG�WKDW�KDYH�EHHQPLJUDWHG�XVLQJ�RQH�RI�WKH�DERYH�VWHSV�RU�KDYH�EHHQ�FUHDWHG�LQ�WKH�FHQWUDOV\VWHP�RI�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

'HILQLQJ�)LHOG�$WWULEXWHV�IRU�8VHU�0DLQWHQDQFH

$OWKRXJK�LW�LV�QR�ORQJHU�SRVVLEOH�WR�FUHDWH�XVHUV�LQ�WKH�FOLHQW�V\VWHP��\RX�FDQ�PDLQWDLQ�DOUHDG\�H[LVWLQJ�XVHUGDWD�LQ�WKH�FOLHQW�V\VWHP��7KHUHIRUH��LW�LV�XVHIXO�WR�GHILQH��DW�WKH�ILHOG�OHYHO��LI�DQG�KRZ�WKLV�GDWD�VKRXOG�EHPDLQWDLQHG��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�ILHOG�DWWULEXWHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUM�DQG�FKRRVH�(QWHU�

�� $OORFDWH�RQ�DOO�WDEV�IRU�HDFK�ILHOG�WKHDWWULEXWHV�GHVFULEHG�LQ�WKH�WDEOHEHORZ��1RW�DOO�DWWULEXWHV�FDQ�EHVHOHFWHG�IRU�HYHU\�ILHOG�

�� &KRRVH� �

3

2

Page 256: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–10

$WWULEXWH 'HVFULSWLRQ

*OREDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�LVGLVWULEXWHG�IURP�WKHUH�LQWR�WKH�FOLHQW�V\VWHPV�

/RFDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FOLHQW�V\VWHP�DQG�LV�QRWGLVWULEXWHG�

3URSRVDO 'XULQJ�WKH�FUHDWLRQ�RI�D�XVHU��WKH�VXJJHVWHG�YDOXH�LV�PDLQWDLQHG�DQGWKHQ�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��WKH�GDWD�LVPDLQWDLQHG�RQO\�ORFDOO\��,I�D�QHZ�FOLHQW�V\VWHP�LV�FRQQHFWHG�WR�&HQWUDO8VHU�$GPLQLVWUDWLRQ��WKH�SURSRVHG�YDOXH�LV�GLVWULEXWHG�WR�WKLV�V\VWHP�,I�WKH�SURSRVHG�YDOXH�LV�FKDQJHG�LQ�WKH�FHQWUDO�V\VWHP��LW�LV�RQO\GLVWULEXWHG�WR�WKH�QHZ�V\VWHPV��$OUHDG\�H[LVWLQJ�V\VWHPV�DUH�QRWDIIHFWHG�

5HW9DO 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DV�ZHOO�DV�WKHFOLHQW�V\VWHP��7KH�FKDQJHV�PDGH�LQ�WKH�FOLHQW�V\VWHP�DUH�UHGLVWULEXWHGWR�WKH�FHQWUDO�V\VWHP��)URP�WKHUH��WKH�GDWD�LV�GLVWULEXWHG�WR�DOO�RWKHUFOLHQW�V\VWHPV�

(YHU\ZKHUH 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�WKH�FOLHQWV\VWHP��7KH�FKDQJHV�LQ�WKH�FOLHQW�V\VWHP�DUH�QRW�GLVWULEXWHG�DQ\ZKHUH�7KH�FKDQJHV�DIIHFW�RQO\�WKLV�FOLHQW�V\VWHP�

7KH�LQVWDOODWLRQ�RI�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QRZ�FRPSOHWH�

*OREDO�8VHU�0DQDJHU

7KH�*OREDO�8VHU�0DQDJHU�LV�DQ�RSWLRQDO�WRRO�WKDW�VLPSOLILHV�\RXU�ZRUN�ZLWK�&HQWUDO�8VHU$GPLQLVWUDWLRQ��<RX�FDQ�VWLOO�XVH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�DQG�WKH�3URILOH�*HQHUDWRU�3*��WR�DVVLJQ�XVHUV�DQG�DFWLYLW\�JURXSV�

<RX�QRZ�KDYH�WKH�RSWLRQ�WR�XVH�GLIIHUHQW�JURXSLQJ�W\SHV�RQ�WKH�XVHU�DQG�V\VWHP�OHYHO�ZLWKWKH�*OREDO�8VHU�0DQDJHU��7KH�JURXSLQJ�LV�FDUULHG�RXW�WKURXJK�XVHU�JURXSV�RQ�WKH�XVHU�OHYHODQG�WKURXJK�V\VWHP�W\SHV�IRU�WKH�V\VWHP�

7KHVH�PDLQWHQDQFH�RSWLRQV�DUH�FRPELQHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�VLQFH�WKHUH�DUHXVXDOO\�QR�FKDQJHV�WR�RWKHU�GDWD�LQ�WKH�XVHU�PDVWHU�GDWD�DIWHU�WKH�FUHDWLRQ�RI�WKH�XVHU�+RZHYHU��V\VWHP�DQG�DXWKRUL]DWLRQ�DVVLJQPHQWV�DUH�DQ�RQJRLQJ�SURFHVV�

,I�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�VHWWLQJ�XS�WKH�XVHU�GDWD��GR�QRW�GLVWULEXWH�WKH�XVHUGDWD�XVLQJ�WKH�*OREDO�8VHU�0DQDJHU��(YHU\WKLQJ�WKDW�LV�QRW�GHILQHG�LQ�WKH�*OREDO�8VHU0DQDJHU�ZLOO�EH�GHOHWHG�LQ�WKH�WDUJHW�V\VWHP�

Page 257: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–11

,W�LV�QRW�SRVVLEOH�WR�DVVLJQ�DXWKRUL]DWLRQ�SURILOHV�GLUHFWO\�WR�XVHUV�RU�XVHU�JURXSV�ZLWK�WKH*OREDO�8VHU�0DQDJHU��7KH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�WKURXJK�DFWLYLW\�JURXSV��,I�\RXZDQW�WR�FUHDWH�DQ�DFWLYLW\�JURXS�DXWRPDWLFDOO\�IURP�DQ�H[LVWLQJ�DXWKRUL]DWLRQ�SURILOH��XVHWUDQVDFWLRQ�SU25��VWHS����&RS\�GDWD�IURP�ROG�SURILOHV�

7KH�PDLQ�DGYDQWDJH�RI�WKH�*OREDO�8VHU�0DQDJHU�LV�WKDW�\RX�QHYHU�KDYH�WR�YLHZ�WKHFRPSOHWH�V\VWHP�ODQGVFDSH�WR�DVVLJQ�DXWKRUL]DWLRQV��,Q�HYHU\�WDVN��\RX�RQO\�ORRN�DW�D�VPDOOSDUW�RI�WKH�FRPSOHWH�ODQGVFDSH��7KH�GLDJUDP�EHORZ�VKRZV�WKDW�\RX�RQO\�ORRN�DW�WZR�VLGHV�RIWKH�DVVLJQPHQW�WULDQJOH�

6RXUFH 7DUJHW

8VHU�8VHU�JURXS 6\VWHP�6\VWHP�W\SH

6\VWHP�6\VWHP�W\SH $FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS

$FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS 8VHU�8VHU�JURXS

7R�PRGHO�D�FRPSOHWH�DVVLJQPHQW�IRU�GLVWULEXWLRQ�LQ�WKH�WDUJHW�V\VWHPV�\RX�QHHG�WR�FUHDWHD�FORVHG�WULDQJOH�IRU�WKDW�DVVLJQPHQW�DV�VKRZQ�LQ�WKH�JUDSKLF�DERYH��7R�UHGXFH�WKHFRPSOH[LW\�RI�WKLV�SURFHVV��WKH�*OREDO�8VHU�0DQDJHU�LV�VHW�XS�LQ�VXFK�D�ZD\�WKDW�\RXRQO\�KDYH�WR�DVVLJQ�WKH�RWKHU�WZR�DQJOHV��2QFH�\RX�KDYH�FRPSOHWHG�HDFK�RI�WKH�WKUHHDQJOHV��WKH�DVVLJQPHQWV�DUH�FRPSOHWH�

Page 258: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–12

6WUXFWXUH�RI�WKH�*OREDO�8VHU�0DQDJHU

7KH�*OREDO�8VHU�0DQDJHU�FDQ�RQO\�EH�XVHG�LQ�WKH�FHQWUDO�V\VWHP�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

7R�VWDUW�WKH�*OREDO�8VHU�0DQDJHU��HQWHU�WUDQVDFWLRQ�SUUM�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH(QWHU�

On the left tile, all usersand user groups in thesystem environment aredisplayed.

In the middle tile, all thesystems and systemgroups are displayed.

On the right tile, all activitygroups and compositeactivity groups in thesystem environment aredisplayed.

7R�GLVSOD\�WKH�DFWLYLW\�JURXSV�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHP��LQ�WKH*OREDO�8VHU�0DQDJHU�FKRRVH�([WUDV�→�6\VWHP�FRPSDULVRQ��$OWHUQDWLYHO\��\RX�FDQ�SHUIRUPWKH�7H[W�FRPSDULVRQ�IRU�FKLOG�V\V��RQ�WKH�$FWLYLW\�JURXSV�WDE�LQ�XVHU�PDLQWHQDQFH�WUDQVDFWLRQSU01��DV�GHVFULEHG�HDUOLHU���1RWH�WKDW�LW�PD\�WDNH�VRPH�WLPH�IRU�WKH�GDWD�WR�EHFRPHDYDLODEOH�VLQFH�LW�LV�GLVWULEXWHG�DV\QFKURQRXVO\�

8VLQJ�WKH�*OREDO�8VHU�0DQDJHU

7KH�XVH�RI�WKH�*OREDO�8VHU�0DQDJHU�GHSHQGV�RQ�ZKHWKHU�RU�QRW�WKHUH�ZHUH�XVHUV�LQ�\RXUV\VWHP�ODQGVFDSH�EHIRUH�WKH�LQVWDOODWLRQ�RI�FHQWUDO�XVHU�PDQDJHPHQW�

,I�XVHUV�DOUHDG\�H[LVW��LW�LV�DGYLVDEOH�WR�PLJUDWH�WKDW�XVHU�PDVWHU�GDWD�LQWR�WKH�*OREDO�8VHU0DQDJHU��7KLV�HQVXUHV�WKDW�WKH�XVHU�GDWD�ZLOO�QRW�EH�GHOHWHG�ZLWK�WKH�ILUVW�GLVWULEXWLRQ�

6\VWHP�/DQGVFDSH�ZLWK�([LVWLQJ�8VHUV

,I�\RX�ZDQW�WR�XVH�WKH�*OREDO�8VHU�0DQDJHU�LQ�D�V\VWHP�ODQGVFDSH�ZLWK�DQ�H[LVWLQJ�DQGSURGXFWLYH�XVHU��SURFHHG�DV�GHVFULEHG�EHORZ�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SUUM�DQG�FKRRVH�(QWHU�

�� )URP�WKH�VWDQGDUG�PHQX�EDU�

Page 259: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–13

< &KRRVH�([WUDV�→�0LJUDWLRQ�→�8VHU�WR�GLVSOD\�WKH�FXUUHQW�VWDWXV�RI�XVHU�PDVWHUUHFRUGV�LQ�DOO�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

< &KRRVH�([WUDV�→�0LJUDWLRQ�→�$FWLYLW\�JURXSV�WR�DVVLJQ�DFWLYLW\�JURXSV�DXWRPDWLFDOO\LQ�WKH�YDOLG�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

7KH�GDWD�LV�RQO\�XSGDWHG�RQ�WKH�VLQJOH�XVHU�OHYHO�ZLWK�WKH�FXUUHQW�VWDWXV�LQ�WKH�*OREDO�8VHU0DQDJHU�DIWHU�WKH�PLJUDWLRQ��'R�QRW�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHU�JURXSV�DQG�V\VWHPW\SHV�LI�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�WKH�PLJUDWLRQ�

$FWLYLW\�JURXSV�VKRXOG�EH�QDPHG�FOHDUO\�LQ�WKH�V\VWHP�ODQGVFDSH��7KH�V\VWHP�ODQGVFDSHDFWV�OLNH�D�VLQJOH�V\VWHP��7KHUHIRUH�DQ�DFWLYLW\�JURXS�VKRXOG�RQO\�H[LVW�RQFH�LQ�WKLV�V\VWHP�,I�DQ�DFWLYLW\�JURXS�ZLWK�WKH�VDPH�QDPH�H[LVWV�LQ�PXOWLSOH�V\VWHPV�LQ�WKH�V\VWHPODQGVFDSH��LW�ZLOO�DSSHDU�PXOWLSOH�WLPHV�LQ�WKH�DFWLYLW\�JURXS�OLVW�LQ�WKH�*OREDO�8VHU0DQDJHU�

,Q�WKH�*OREDO�8VHU�0DQDJHU�\RX�FDQ�FUHDWH�DVVLJQPHQWV�RQ�WKH�VLQJOH�XVHU�OHYHO��DV�ZHOO�DVRQ�WKH�XVHU�JURXS�OHYHO��7KLV�DELOLW\�PD\�OHDG�WR�XQZDQWHG�HIIHFWV�DIWHU�D�XVHU�PLJUDWLRQ�

)RU�H[DPSOH��\RX�PLJUDWHG�DOO�GHYHORSHUV�LQ�\RXU�V\VWHP�LQWR�WKH�*OREDO�8VHU�0DQDJHU�DVGHVFULEHG�DERYH��7KHQ�\RX�GHILQHG�D�XVHU�JURXS�IRU�DOO�GHYHORSHUV�WKDW�FRQWDLQV�WKH�VDPHDXWKRUL]DWLRQV�WKDW�\RX�GHILQHG�HDUOLHU�RQ�WKH�VLQJOH�XVHU�OHYHO��,I�\RX�DVVLJQ�DOO�GHYHORSHUVWR�WKDW�XVHU�JURXS��LW�ZRXOG�OHDG�WR�D�GRXEOH�DVVLJQPHQW�RI�WKH�VDPH�DXWKRUL]DWLRQV��,I�\RXGHOHWHG�WKH�DVVLJQPHQW�RI�RQH�XVHU�WR�WKLV�XVHU�JURXS��WKLV�XVHU�ZRXOG�VWLOO�KDYH�WKHDXWKRUL]DWLRQV�RQ�WKH�VLQJOH�XVHU�OHYHO��7KHUHIRUH��\RX�PXVW�GHOHWH�WKH�DVVLJQPHQW�WR�WKHVLQJOH�XVHU�OHYHO�DV�VRRQ�DV�\RX�DVVLJQ�WKH�XVHU�WR�D�XVHU�JURXS�DIWHU�WKH�PLJUDWLRQ��7KHVLQJOH�XVHU�DVVLJQPHQW�VKRXOG�EH�XVHG�WR�JLYH�D�XVHU�DGGLWLRQDO�DXWKRUL]DWLRQV�WKDW�GHYLDWHIURP�WKH�VWDQGDUG�

6\VWHP�/DQGVFDSH�:LWKRXW�([LVWLQJ�8VHUV

,I�\RX�KDYH�QR�H[LVWLQJ�XVHUV�LQ�\RXU�V\VWHP�ODQGVFDSH��WKH�PLJUDWLRQ�RI�WKH�XVHU�PDVWHUGDWD�GRHV�QRW�DSSO\��<RX�FDQ�LPPHGLDWHO\�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHUV�LQ�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQG�FUHDWH�WKH�DXWKRUL]DWLRQ�DVVLJQPHQWV�LQ�WKH�V\VWHPODQGVFDSH�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU��(YHU\�XVHU�RQO\�QHHGV�WR�EH�FUHDWHG�RQFH�LQ�WKHFHQWUDO�V\VWHP��DQG�PLJKW�JHW�DVVLJQHG�WR�RWKHU�V\VWHPV�ZLWK�WKH�KHOS�RI�WKH�*OREDO�8VHU0DQDJHU��7KH�FUHDWLRQ�RI�WKDW�XVHU�LQ�WKH�RWKHU�V\VWHPV��DQG�WKH�DVVLJQPHQW�WR�WKH�DFWLYLW\JURXSV�WDNHV�SODFH�DXWRPDWLFDOO\�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU�

Page 260: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–14

8VHU�&UHDWLRQ

�� &UHDWH�D�XVHU�LQ�WUDQVDFWLRQ�68���DVXVXDO��VHH�FKDSWHU���IRU�GHWDLOHGLQIRUPDWLRQ��

�� (QWHU�D�8VHU�JURXS�RQ�WKH�*URXSV�WDEIRU�WKH�FXUUHQW�XVHU��LI�WKLV�XVHUJURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�LQWKH�*OREDO�8VHU�0DQDJHU���<RX�ZLOOQRW�QHHG�WR�PDNH�WKDW�DVVLJQPHQW�LQWKH�*OREDO�8VHU�0DQDJHU�DQ\PRUH�

<RX�VKRXOG�RQO\�FUHDWH�DVVLJQPHQWV�RQ�WKH�6\VWHPV�DQG�$FWLYL��DFWLYLW\�JURXSV��WDEV�LI\RX�DUH�FHUWDLQ�WKLV�DVVLJQPHQW�LV�RQO\�YDOLG�IRU�WKH�VLQJOH�XVHU��2WKHUZLVH��FUHDWH�WKHDVVLJQPHQWV�IRU�XVHU�JURXSV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

$OO�GDWD�HQWHUHG�LQ�WUDQVDFWLRQ�68���LV�DOVR�DYDLODEOH�LQ�WKH�*OREDO�8VHU�0DQDJHU��$OODVVLJQPHQWV�FUHDWHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�DUH�DOVR�DYDLODEOH�LQ�WUDQVDFWLRQ�SU01�

'HILQLQJ�6\VWHP�7\SHV�DQG�8VHU�*URXSV

:H�QRZ�GHPRQVWUDWH�KRZ�WR�JURXS�PXOWLSOH�V\VWHPV�LQWR�D�V\VWHP�JURXS�

�� &KRRVH� �QH[W�WR�6\VWHP�7\SHV�WRFUHDWH�D�V\VWHP�W\SH�

�� ,Q�6\VWHP�W\SH��HQWHU�D�QDPH�IRU�WKHV\VWHP�W\SH�

�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�V\VWHP�W\SH�

�� &KRRVH� �WR�FUHDWH�WKH�V\VWHP�W\SH�

2

1

23

4

Page 261: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–15

�� 7KH�QHZ�V\VWHP�W\SH�DSSHDUV�LQ�WKHOLVW�

�� 7R�DVVLJQ�D�V\VWHP�WR�WKH�MXVW�FUHDWHGV\VWHP�W\SH��VHOHFW�WKH�GHVLUHGV\VWHP�IURP�WKH�6\VWHPV�OLVW��0RYH�LWXVLQJ�GUDJ�DQG�GURS�LQWR�WKH�QHZV\VWHP�W\SH��LQ�RXU�H[DPSOH'(9(/��

�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\V\VWHP�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DV\VWHP�W\SH�

2QH�V\VWHP�FDQ�EH�DVVLJQHG�WR�RQO\�RQH�V\VWHP�JURXS��$�XVHU�FDQ�EH�DVVLJQHG�WRGLIIHUHQW�XVHU�JURXSV�

,Q�WKH�IROORZLQJ�VWHSV��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�D�XVHU�JURXS�

�� &KRRVH� �QH[W�WR�8VHU�JURXSV�

�� ,Q�8VHU�JURXS��HQWHU�D�QDPH�IRU�WKH8VHU�JURXS�

�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�XVHU�JURXS�

�� &KRRVH� �WR�FUHDWH�WKH�XVHU�JURXS�

2

6

1

5

3

4

Page 262: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–16

�� 7KH�QHZ�XVHU�JURXS�DSSHDUV�LQ�WKHOLVW�

�� 7R�DVVLJQ�D�XVHU�WR�WKH�MXVW�FUHDWHGXVHU�JURXS��VHOHFW�WKH�GHVLUHG�XVHUIURP�WKH�8VHUV�OLVW��0RYH�LW�XVLQJGUDJ�DQG�GURS�LQWR�WKH�QHZ�XVHUJURXS��LQ�RXU�H[DPSOH��'(9(/23��

�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\�XVHUWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DXVHU�JURXS�

0RGHOLQJ�ZLWK�WKH�*OREDO�8VHU�0DQDJHU

,Q�WKH�IROORZLQJ�SURFHGXUH�ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�WKH�FRUUHFW�V\VWHPV�DQG�DFWLYLW\�JURXSV�WR�D�XVHUJURXS�

�� 6HOHFW�WKH�MXVW�FUHDWHG�XVHU�JURXS�

�� &KRRVH� �WR�GLVSOD\�WKHDVVLJQPHQWV�

�� <RX�UHFHLYH�WKH�FXUUHQW�VWDWXV�RI�WKHV\VWHP�V\VWHP�W\SH�DQG�DFWLYLW\JURXS�DVVLJQPHQWV�IRU�WKH�VHOHFWHGXVHU�JURXS��,Q�RXU�H[DPSOH��ZH�KDYHPDGH�QR�DVVLJQPHQWV�IRU�WKH�XVHUJURXS�'(9(/23��7KHUHIRUH��QRDVVLJQPHQWV�DSSHDU��MXVW�WKH�IROGHUV�

56

1

2

3 3

Page 263: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–17

�� 7R�DVVLJQ�D�V\VWHP�RU�V\VWHP�W\SH�WRD�XVHU�JURXS��VHOHFW�WKH�GHVLUHGV\VWHP�RU�V\VWHP�W\SH�IURP�WKH6\VWHPV�RU�6\VWHP�W\SHV�OLVW�DQG�PRYHLW�XVLQJ�GUDJ�DQG�GURS�LQWR�WKHGHVLUHG�IROGHU��IRU�H[DPSOH��D�IROGHUEHORQJLQJ�WR�$VVLJQPHQW�WR�8VHUJURXS�'(9(/23��

�� 7R�DVVLJQ�DFWLYLW\�JURXSV�RUFRPSRVLWH�DFWLYLW\�JURXSV�WR�WKHXVHU�JURXS��SURFHHG�ZLWK�WKH�VDPHSURFHGXUH�

7R�UHGXFH�WKH�QXPEHU�RI�GLVSOD\HG�HQWULHV�LQ�D�OLVW��IRU�WKH�XVHU��DFWLYLW\�JURXS��HWF���FKRRVH�WKH�VHOHFWLRQ�LFRQ�QH[W�WR�WKH�GHVLUHG�HQWU\�

5HPHPEHU�WKDW�DFFRUGLQJ�WR�WKH�DVVLJQPHQW�WULDQJOH�VKRZQ�HDUOLHU��\RX�KDYH�RQO\�GHILQHGWZR�RI�WKH�WKUHH�DQJOHV�VR�IDU��,Q�WKH�H[DPSOH�DERYH��ZH�IRFXVHG�RQ�WKH�XVHU�JURXS�WRDVVLJQ�V\VWHPV�DQG�DFWLYLW\�JURXSV��:KDW�LV�PLVVLQJ�LV�WKH�DVVLJQPHQW�EHWZHHQ�DFWLYLW\JURXSV�DQG�V\VWHPV��,I�\RX�PLJUDWHG�WKH�DFWLYLW\�JURXSV��WKH�DVVLJQPHQW�KDV�EHHQSHUIRUPHG�DXWRPDWLFDOO\�DQG�WKH�WULDQJOH�LV�FRPSOHWH��,I�QRW��\RX�KDYH�WR�GHILQH�WKHDVVLJQPHQW�IRU�HYHU\�DFWLYLW\�JURXS�

<RX�KDYH�WKH�RSWLRQ�WR�GLVSOD\�DQG�PDLQWDLQ�DVVLJQPHQWV�IURP�HYHU\�FRUQHU�RI�WKHWULDQJOH��,I�\RX�GLVSOD\�WKH�DVVLJQPHQWV�RI�DQ�DFWLYLW\�JURXS��WKHQ�\RX�FDQ�PDLQWDLQ�WKHV\VWHP�DQG�XVHU�JURXSV�IRU�WKDW�DFWLYLW\�JURXS��,I�\RX�GLVSOD\�WKH�DVVLJQPHQW�RI�D�V\VWHPW\SH��WKHQ�\RX�FDQ�GHILQH�WKH�XVHU�DQG�DFWLYLW\�JURXSV�WKDW�DUH�YDOLG�IRU�WKLV�V\VWHP�W\SH�

$XWKRUL]DWLRQ�IRU�WKH�*OREDO�8VHU�0DQDJHU

:LWK�WKH�*OREDO�8VHU�0DQJHU��\RX�KDYH�WKH�RSWLRQ�WR�PDLQWDLQ�XVHUV�DQG�DOO�WKHLUDXWKRUL]DWLRQV�LQ�HYHU\�V\VWHP�IURP�WKH�FHQWUDO�V\VWHP�RI�WKH�V\VWHP�ODQGVFDSH��7KLV�RSWLRQFDQ�EH�YHU\�XVHIXO��EXW�DOVR�YHU\�SUREOHPDWLF�LI�XVHG�LQFRUUHFWO\��)RU�H[DPSOH��DOO�XVHUV�LQ�DV\VWHP�W\SH�FRXOG�EH�GHOHWHG�YHU\�HDVLO\��7KHUHIRUH��LW�LV�YHU\�LPSRUWDQW�WR�SD\�FDUHIXODWWHQWLRQ�WR�WKH�DXWKRUL]DWLRQV�RI�WKH�PRGHOHU�DQG�DGPLQLVWUDWRU�RI�WKH�*OREDO�8VHU0DQDJHU�

:H�UHFRPPHQG�\RX�XVH�WKH�IRXU�H\H�SULQFLSOH��ZKHUH�RQH�DGPLQLVWUDWRU�PRGHOV�WKHDVVLJQPHQWV�DQG�DQRWKHU�FKHFNV�WKRVH�DVVLJQPHQWV�EHIRUH�WKH�GDWD�LV�GLVWULEXWHG��7KHPRGHOLQJ�LV�WKH�XQFULWLFDO�SDUW��EHFDXVH�QR�GDWD�LV�EHLQJ�FKDQJHG�LQ�WKH�FOLHQW�V\VWHPV��7KLVKDSSHQV�RQO\�GXULQJ�WKH�GLVWULEXWLRQ�

7KH�GLVWULEXWLRQ�RQO\�WDNHV�SODFH�RQ�WKRVH�LVVXHV�IRU�ZKLFK�WKH�DGPLQLVWUDWRU�KDV�WKHGLVWULEXWLRQ�ULJKWV��,Q�WKLV�ZD\��LW�LV�SRVVLEOH�WR�KDYH�GLIIHUHQW�DGPLQLVWUDWRUV�IRU�VHOHFWHG

54

Page 264: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–18

V\VWHPV�LQ�WKH�V\VWHP�ODQGVFDSH��7KHVH�DGPLQLVWUDWRUV�FDQ�WKHQ�RQO\�GLVWULEXWH�WKH�GDWD�IRUZKLFK�WKH\�DUH�DXWKRUL]HG�

7KH�IROORZLQJ�WDEOH�GLVSOD\V�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�WKH�*OREDO�8VHU�0DQDJHU�

7DVN 2EMHFW $FWLYLW\ 6B86(5B*53 6B86(5B6<6 6B865B$*5

'LVSOD\�FUHDWH�GHOHWHDVVLJQPHQW

8VHU8VHU�JURXS6\VWHP6\VWHP�W\SHDFWLY��JURXS

0RGHO������'LVSOD\�����

8VHU�JURXS�RIWKH�XVHU

8VHU�JURXS

6\VWHP6\VWHP�W\SH

$FWLY�JURXS

8VHU�LQ�XVHUJURXSV

$VVLJQ����� 8VHU�JURXS�RIWKH�XVHU

8VHU�JURXS

&KDQJH6\VWHP�W\SH

$VVLJQ����� 6\VWHP6\VWHP�W\SH

&UHDWH�XVHUJURXS

&UHDWH����� 8VHU�JURXS

0LJUDWH 0LJUDWH����� �&RPPHQW�HQWHULQJ�RIVLQJOHV\VWHP�QRWSRVVLEOH

'LVWULEXWLQJ�'DWD�LQ�WKH�*OREDO�8VHU�0DQDJHU

%HIRUH�WKH�GLVWULEXWLRQ��\RX�VKRXOG�DOZD\V�GLVSOD\�WKH�GDWD�DQG�FKHFN�LW��,Q�WKH�IROORZLQJ�VWHSV��ZHGHPRQVWUDWH�KRZ�WR�FKHFN�WKH�GDWD�

�� ,QVLGH�WKH�*OREDO�8VHU�0DQDJHU�FKRRVH� �WR�GLVSOD\�WKH�GLVWULEXWLRQGDWD�

�� &KHFN�LI�WKH�GDWD�IRU�WKH�XVHUV�LV�VHWFRUUHFWO\�IRU�WKH�GLVWULEXWLRQ�

2QO\�GLVWULEXWH�WKH�GDWD�DIWHU�\RX�KDYH�UDQGRPO\�FKHFNHG�WKH�XVHU�GDWD�

1

Page 265: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–19

<RX�FDQ�GLVWULEXWH�WKH�GDWD�IURP�WKH�*OREDO�8VHU�0DQDJHU�PDQXDOO\�LPPHGLDWHO\�RUFUHDWH�D�EDFNJURXQG�MRE�WR�GLVWULEXWH�WKH�GDWD�

,PPHGLDWH�'LVWULEXWLRQ

�� 7R�WULJJHU�WKH�GLVWULEXWLRQLPPHGLDWHO\��FKRRVH� �

7KH�GDWD�LV�GLVWULEXWHG�ULJKW�DZD\�5HPHPEHU�WKDW�LW�FDQ�WDNH�D�ZKLOHXQWLO�DOO�GDWD�LV�DYDLODEOH�LQ�HYHU\FOLHQW�V\VWHP��VLQFH�WKH�GLVWULEXWLRQKDSSHQV�DV\QFKURQRXVO\�

,PPHGLDWH�GLVWULEXWLRQ�FDQ�FDXVH�D�ORW�RI�QHWZRUN�WUDIILF�LQ�\RXU�V\VWHP�ODQGVFDSH�DQGVORZ�GRZQ�WKH�SHUIRUPDQFH�RI�V\VWHPV��,I�\RX�ZDQW�WR�DYRLG�WKLV�VORZGRZQ��\RX�VKRXOGVFKHGXOH�D�UHJXODU�EDFNJURXQG�MRE�WR�UXQ�DW�QLJKW�

'XULQJ�WKH�GLVWULEXWLRQ��WKH�GDWD�LV�HQWHUHG�LQWR�WUDQVDFWLRQ�68���DFFRUGLQJ�WR�WKHPRGHOLQJ�LQ�WKH�*OREDO�8VHU�0DQJHU��DQG�IURP�WKHUH�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��,QWKH�FOLHQW�V\VWHP��RQO\�WKH�XVHUV�DUH�FUHDWHG�DQG�WKH�DFWLYLW\�JURXSV�DVVLJQHG��2WKHU�GDWDLV�QRW�GLVWULEXWHG��EXW�NHSW�LQ�WKH�FHQWUDO�V\VWHP��7KHUHIRUH��LQ�WUDQVDFWLRQ�6&8/�\RX�FDQH[SHFW�WR�ILQG�RQO\�VRPH�ORJV��QDPHO\�WKRVH�IRU�WKH�GLVWULEXWLRQ�RI�WKH�DFWLYLW\�JURXSDVVLJQPHQW�DQG�IRU�XVHUV�FUHDWHG�RU�GHOHWHG.

7R�UHGXFH�WKH�GDWD�IORZ�WKDW�RFFXUV�GXULQJ�WKH�GLVWULEXWLRQ��RQO\�GDWD�WKDW�KDV�FKDQJHGVLQFH�WKH�ODVW�GLVWULEXWLRQ�LV�GLVWULEXWHG�

6FKHGXOLQJ�%DFNJURXQG�'LVWULEXWLRQ

�� 7R�VFKHGXOH�D�EDFNJURXQG�MRE�IRUWKH�GDWD�GLVWULEXWLRQ��FKRRVH�([WUDV→�6FKHGXOH�GLVWULEXWLRQ�

1

1

Page 266: Authorizations Made Easy

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–20

�� &KRRVH� �

�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�

�� ,Q�-RE�FODVV��HQWHU�D�SULRULW\�IRU�WKHMRE�FODVV�

�� ,Q�7DUJHW�VHUYHU��VHOHFW�WKH�FHQWUDOV\VWHP�DV�WKH�WDUJHW�V\VWHP�

�� &KRRVH� �6WHS�WR�SODQ�WKH�$%$3SURJUDP�56865����

�� &KRRVH� �6WDUW�FRQGLWLRQ�WR�VFKHGXOHWKH�WLPH�IRU�\RXU�MRE�

�� &KRRVH� �

,I�\RX�SURFHVV�WKH�DGPLQLVWUDWLRQ�RI�XVHU�GDWD�LQ�WKH�*OREDO�8VHU�0DQDJHU�ZLWK�WKH�IRXU�H\H�SULQFLSOH��\RX�VKRXOG�EH�DZDUH�WKDW�WKHUH�PLJKW�EH�FRQIOLFW��DV�\RX�FDQQRW�FKHFN�WKHGDWD�EHIRUH�WKH�DXWRPDWLF�GLVWULEXWLRQ�

2

34

5

67

8

Page 267: Authorizations Made Easy

12–1

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ

&RQWHQWV

Overview ................................................................................................................12–2

Tracing Authorizations with Transaction SU53 .................................................12–2

System Trace Using Transaction ST01 ..............................................................12–4

Analyzing a Written Trace File.............................................................................12–9

Reducing the Scope of Authorization Checks.................................................12–12

����

Page 268: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Overview

Authorizations Made Easy12–2

2YHUYLHZ

:KHQ�XVHUV�H[HFXWH�D�WUDQVDFWLRQ�RU�UHSRUW�WKDW�LV�QRW�LQFOXGHG�LQ�WKHLU�XVHU�PHQX��WKH\�PD\VHH�WKH�V\VWHP�PHVVDJH�VLPLODU�WR��<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ���7KLV�PHVVDJHPHDQV�WKDW�HLWKHU�WKHLU�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�GRHV�QRW�FRQWDLQ�WKH�UHTXLUHGDXWKRUL]DWLRQ�WR�H[HFXWH�WKH�WUDQVDFWLRQ��RU�WKH�YDOXHV�PDLQWDLQHG�IRU�WKH�SURILOH·VDXWKRUL]DWLRQ�DUH�LQVXIILFLHQW��7KH�PLVVLQJ�DXWKRUL]DWLRQV�FDQ�EH�GHWHUPLQHG�HLWKHU�E\WUDFLQJ�DXWKRUL]DWLRQV�ZLWK�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRWDXWKRUL]HG��RU�ZLWK�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�67���

7UDQVDFWLRQ�68���LV�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*��ZKLFK�LVLQFOXGHG�LQ�WKH�XVHU�UROH�WHPSODWH�6$3B(9(5<B(03/2<((�

,W�LV�DOVR�DFFHVVLEOH�XVLQJ�WKH�PHQX�SDWK�6\VWHP�→�8WLOLWLHV�→�'LVSOD\�$XWKRUL]DWLRQ�&KHFNIURP�WKH�PDLQ�PHQX�

7UDFLQJ�$XWKRUL]DWLRQV�ZLWK�7UDQVDFWLRQ�68��

%\�H[HFXWLQJ�WUDQVDFWLRQ�68�����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HGIURP�WKH�XVHU�PHQX�RU�E\�HQWHULQJ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DW�DQ\�WLPH�DQDO\]HDQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�LQ�\RXU�VHVVLRQ��7UDQVDFWLRQ�68���FDQ�EH�DFFHVVHG�IURP�DQ\�RI\RXU�VHVVLRQV��QRW�MXVW�WKH�RQH�ZKHUH�WKH�HUURU�RFFXUUHG��<RX�FDQQRW��KRZHYHU��DQDO\]H�DQDXWKRUL]DWLRQ�HUURU�IURP�\RXU�RZQ�VHVVLRQ�LQ�DQRWKHU�XVHU·V�ORJRQ�VHVVLRQ�

$W�WKH�WUDQVDFWLRQ�VWDUW��WUDQVDFWLRQ�68���LV�SURWHFWHG�E\�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�<RX�VKRXOG�JLYH�DOO�XVHUV�DFFHVV�ULJKWV�WR�WUDQVDFWLRQ�68����7KXV��LQ�FDVH�RI�D�SUREOHP�\RXU�KHOS�GHVN�FDQ�HDVLO\�DQDO\]H�SUREOHPV�WKDW�XVH�WUDQVDFWLRQ�68����7UDQVDFWLRQ�68���LVLQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*�ZKLFK�LV�LQFOXGHG�LQ�WKH�XVHU�UROHWHPSODWH�6$3B(9(5<B(03/2<((�

,I�\RX�DUH�XVLQJ�VWUXFWXUDO�DXWKRUL]DWLRQV��68���LV�QRW�YHU\�XVHIXO�LI�WKH�WUDQVDFWLRQ�ZKHUH\RX�DUH�UHFHLYLQJ�PHVVDJHV�<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU��LV�DQ�+5�WUDQVDFWLRQ�RU�DWUDQVDFWLRQ�WKDW�FDOOV�+5�REMHFWV��68���RQO\�UHYHDOV�WKH�ODVW�DXWKRUL]DWLRQ�FKHFN�IDLOXUHEDVHG�RQ�WKH�$%$3�FRGH�VWDWHPHQW�$XWKRUL]DWLRQ�&KHFN��+RZHYHU��VWUXFWXUDODXWKRUL]DWLRQV�GR�QRW�DOZD\V�XVH�WKH�$XWKRUL]DWLRQ�&KHFN�VWDWHPHQW�LQ�GHWHUPLQLQJDFFHVVHV��7KHUHIRUH��LI�H[WHQVLYH�VWUXFWXUDO�DXWKRUL]DWLRQV�DUH�XVHG��WKH�6\VWHP�7UDFH�WUDQVDFWLRQ�67����ZLOO�EH�RI�PRUH�EHQHILW�WKDQ�68���

Page 269: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Tracing Authorizations with Transaction SU53

Release 4.6A/B12–3

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�D�XVHU��ZKR�KDV�WKH�XVHU�UROH�WHPSODWH'$7$B(175<B&/(5.��ZH�FUHDWHG�WKLV�DFWLYLW\�JURXS�HDUOLHU�LQ�WKH�ERRN���WULHV�WR�UXQ�WUDQVDFWLRQ�)%����'RFXPHQW�FKDQJHV��6LQFH�WKLV�XVHU�KDV�QR�DXWKRUL]DWLRQ�IRU�WKLV�WUDQVDFWLRQ��WKH�HUURU�PHVVDJH�<RX�KDYH�QRDXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ�)%���LV�UHFHLYHG��7KH�XVHU�KDV�WR�XVH�68�����'LVSOD\�FKHFN�YDOXHV�RIDXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG�WR�ILQG�RXW�ZKDW�DXWKRUL]DWLRQ�LV�PLVVLQJ�

:H�VWDUW�ZKHUH�WKH�XVHU�KDV�DWWHPSWHGWR�UXQ�WUDQVDFWLRQ�)%���DQG�UHFHLYHV�WKHHUURU�PHVVDJH��<RX�KDYH�QR�DXWKRUL]DWLRQIRU�7UDQVDFWLRQ�)%���

�� 6WDUW�WUDQVDFWLRQ�68���¥�'LVSOD\FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI�QRW�DXWKRUL]HG�IURP�WKH�XVHU�PHQX��RUHQWHU�SU53�LQ�WKH�&RPPDQG�ILHOG�

�� 7KH�V\VWHP�GLVSOD\V�WKH�FKHFNHGDXWKRUL]DWLRQ�REMHFW�WKDW�FDXVHG�WKHHUURU�PHVVDJH�ZLWK�WKHFRUUHVSRQGLQJ�ILHOG�YDOXHV�

�� $OVR�GLVSOD\HG�DUH�

D� 7KH�FXUUHQW�DXWKRUL]DWLRQ�LQ�WKHXVHUV�DVVLJQHG�DXWKRUL]DWLRQSURILOH�

E� 7KH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRUWKLV�DXWKRUL]DWLRQ�

�� 7R�SULQW�WKLV�LQIRUPDWLRQ��FKRRVH9DOXHV�→�3ULQW�

1

2

3a

3b

4

This iswhat ismissing

This iswhat iscurrentlyassigned

Error message

Page 270: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–4

7R�DGG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�WR�WKH�XVHU·V�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�XVLQJ�WKH3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV��$OVR�UHIHU�WR�WKH6$31HW�²�5���)URQWHQG�QRWH�QXPEHUV�������DQG��������IRUPHUO\�266�QRWHV��

6\VWHP�7UDFH�8VLQJ�7UDQVDFWLRQ�67��

<RX�FDQ�XVH�WKH�V\VWHP�WUDFH�WR�UHFRUG�DXWKRUL]DWLRQ�FKHFNV�LQ�\RXU�RZQ�VHVVLRQ�DQG�RWKHUXVHUV·�VHVVLRQV��6WDUW�WUDQVDFWLRQ�67����V\VWHP�WUDFH��DQG�UXQ�WKH�WUDQVDFWLRQ�WKH�XVHU�LVKDYLQJ�DXWKRUL]DWLRQ�SUREOHPV�ZLWK��$V�VRRQ�DV�\RX�JHW�VWXFN��VWRS�\RXU�WUDFH��:H�XVH�WKHWUDFH�IRU�DXWKRUL]DWLRQ�FKHFNV�WKRXJK�LW�LV�FDSDEOH�RI�WUDFLQJ�PXFK�PRUH��(YHU\WKLQJ�\RXKDYH�GRQH�LQ�WKH�5���6\VWHP�WKDW�UHTXLUHV�DXWKRULW\�FKHFNV�LV�UHFRUGHG�LQ�WKH�WUDFH�ZLWK�WKHREMHFW·V�ILHOGV�DQG�WKH�WHVWHG�YDOXHV�

8VLQJ�67����V\VWHP�WUDFH��VHYHUHO\�DIIHFWV�V\VWHP�SHUIRUPDQFH�

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WKH�DGPLQLVWUDWRU�FDQ�FUHDWH�D�V\VWHP�WUDFHRI�DQRWKHU�XVHU·V�VHVVLRQ��8VHU�)7$<(+��ZKR�KDV�EHHQ�DVVLJQHG�WKH�XVHU�UROH'$7$B(175<B&/(5.��LV�WU\LQJ�WR�UXQ�D�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�DXWKRUL]DWLRQDQG�RQH�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�QR�DXWKRUL]DWLRQ��$W�WKH�VDPH�WLPH��WKHDGPLQLVWUDWRU�XVHV�WUDQVDFWLRQ�67���WR�FUHDWH�D�V\VWHP�WUDFH�IRU�WKH�DWWHPSWV�RI�XVHU)7$<(+�

7R�VHW�XS�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�

�� 6WDUW�WKH�WUDQVDFWLRQ�67��¥�6\VWHP�7UDFH�

1

Page 271: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Release 4.6A/B12–5

&KHFN�WKH�7UDFH�VWDWXV�EHIRUH�XVLQJ�WKH�V\VWHP�WUDFH��,I�WKH�WUDFH�LV�DFWLYH��GR�QRW�LQWHUIHUH�EHFDXVH�WKHUH�LV�RQO\�RQH�WUDFH�V\VWHP�IRU�HDFK�5���LQVWDQFH�

�� <RX�FDQ�VHH�LI�DQRWKHU�XVHU�KDV�XVHGWKH�V\VWHP�WUDFH�DQG�ZKHQ�LW�KDVEHHQ�DFWLYDWHG�

�� 0DQ\�GLIIHUHQW�7UDFH�FRPSRQHQWVH[LVW�DQG�HDFK�FDQ�EH�VZLWFKHG�RQZLWK�LWV�RZQ�IODJ��DQG�ILOWHU��

�� 6RPH�VHOHFWLRQV�DUH�GLUHFWO\�YLVLEOHLQ�WKH�FKHFNER[HV��(QVXUH�WKDW�RQO\WKH�$XWKRUL]DWLRQ�FKHFN�FKHFNER[�LVVHOHFWHG�

�� 2WKHU�WUDFH�FRPSRQHQW�VHOHFWLRQV�DUHJURXSHG�DQG�PLJKW�FRQWDLQ�RQO\SDUWLDO�VHOHFWLRQV��&KHFN�DOO� LFRQVWR�HQVXUH�WKDW�QRWKLQJ�LV�VHOHFWHG�

�� 7R�UHVWULFW�WKH�WUDFH�WR�D�VSHFLILF�XVHURU�VHVVLRQ��FKRRVH�(GLW�→�)LOWHU�→6KDUHG�

7KH�WUDFH�ILOH·V�QDPH�DQG�VWRUDJH�ORFDWLRQ�LV�VKRZQ�LQ�WKH�ILHOG�&XUUHQW�WUDFH�ILOH��7KH�WUDFHLV�DGGHG�WR�WKH�H[LVWLQJ�ILOH�XQWLO�WKH�PD[LPXP�ILOH�VL]H�LV�UHDFKHG��7KHQ�D�QHZ�ILOH�QHHGVWR�EH�FUHDWHG��VHH�ODWHU�LQ�WKLV�VHFWLRQ��

�� (QWHU�WKH�QDPH�RI�WKH�XVHU�IRU�ZKLFK\RX�ZRXOG�OLNH�WR�UXQ�WKH�WUDFH�,Q�RXU�H[DPSOH�ZH�ZDQW�WR�WUDFHXVHU�)7$<(+ªV�WUDQVDFWLRQV�

�� &KRRVH�%DFN�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�ILOWHU�WKHGDWD�IRU�HLWKHU�D�FHUWDLQ�WUDQVDFWLRQ�RUSURJUDP�

�� 2Q�WKH�6\VWHP�7UDFH�VFUHHQ��FKRRVH(GLW�→�:ULWH�RSWLRQV�

2

3

4

5

6

tech

Tip

7

8

10

11

Page 272: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–6

��� 7R�VDYH�\RXU�WUDFH�RQ�WKH�KDUG�GULYH�VHOHFW�7UDFH��:ULWH�WR�GLVN�

��� &KRRVH�%DFN�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�HLWKHU�GHILQH�D�WLPH�IUDPH�IRU�WKH�WUDFH�WR�UXQ�RU�WR�XVH�WKHEXIIHU�

��� 7R�VDYH�\RXU�VHWWLQJV�IRU�WKH�QH[WWLPH�\RX�XVH�WKH�WUDFH��FKRRVH�(GLW→�6HWWLQJV�→�:ULWH�WR�GDWDEDVH�

��� <RXU�GDWD�LV�VDYHG�ZLWK�WKHIROORZLQJ�VHWWLQJV��&OLHQW��XVHUQDPH�GHIDXOW�

7KH�V\VWHP�LV�QRZ�UHDG\�WR�EHJLQWKH�WUDFH��$W�WKLV�WLPH��ZHUHFRPPHQG�WKDW�\RX�KDYH�WKH�XVHU·VVHVVLRQ�\RX�ZRXOG�OLNH�WR�WUDFH�UHDG\�RU�RSHQ�DQRWKHU�VHVVLRQ�WR�WUDFH\RXU�RZQ�WUDQVDFWLRQ��

��� &KRRVH�7UDFH�RQ�

7R�XVH�\RXU�LQGLYLGXDO�VHWWLQJV�WKH�QH[W�WLPH�\RX�VWDUW�WKH�WUDFH��FKRRVH�(GLW�→�6HWWLQJV→�5HDG�IURP�GDWDEDVH��$OO�WKH�FKHFNPDUNV�\RX�VHW�ZLOO�DSSHDU�LQ�WKH�FRUUHVSRQGLQJFKHFNER[HV�

��� &KRRVH�<HV�

)URP�QRZ�RQ�HYHU\�DFWLRQ�WKDW�XVHU)7$<(+�SHUIRUPV�LV�UHFRUGHG�LQ�WKHWUDFH�

12

13

14

15

Page 273: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Release 4.6A/B12–7

��� &KDQJH�WR�WKH�XVHU·V�VHVVLRQ�\RXZDQW�WR�WUDFH�

7KH�XVHU�VKRXOG�QRZ�UXQ�WKHWUDQVDFWLRQV�\RX�ZRXOG�OLNH�WRLQYHVWLJDWH��,Q�RXU�H[DPSOH��ZH�ILUVWVWDUW�WUDQVDFWLRQ�)%����WKHQ�)%���

��� %HJLQ�WKH�WUDQVDFWLRQ��IRU�H[DPSOH�)%���¥�'LVSOD\�GRFXPHQWV��

7KH�WUDQVDFWLRQ�VWDUWV�EHFDXVH�XVHU)7$<(+�LV�DXWKRUL]HG�WR�SHUIRUP�LW�

��� %HJLQ�DQRWKHU�WUDQVDFWLRQ��IRUH[DPSOH��FB04��

6LQFH�XVHU�)7$<(+�LV�QRW�DXWKRUL]HGWR�SHUIRUP�)%����KH�UHFHLYHG�WKHHUURU�PHVVDJH��<RX�DUH�QRW�DXWKRUL]HGWR�XVH�WUDQVDFWLRQ�)%���

7KH�V\VWHP�DOVR�MXPSV�EDFN�WR�WKHXVHU�PHQX�

17

18

Error message

Page 274: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–8

��� $IWHU�FRPSOHWLQJ�\RXU�V\VWHP�WUDFH�VZLWFK�EDFN�WR�WKH�RWKHU�VHVVLRQ��WKHWUDFH�VHVVLRQ�

��� &KRRVH� �7UDFH�RII�

��� &KRRVH�<HV�WR�VWRS�WUDFLQJ�

7KH�WUDFH�LV�QRZ�UHDG\�WR�DQDO\]H�6HH�WKH�QH[W�VHFWLRQ�RQ�KRZ�WRDQDO\]H�D�WUDFH�

20

21

Page 275: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Release 4.6A/B12–9

$QDO\]LQJ�D�:ULWWHQ�7UDFH�)LOH

�� 7R�GLVSOD\�WKH�WUDFH�UHVXOWV��IURP�WKH6\VWHP�7UDFH�ZLQGRZ��FKRRVH�)LOH�OLVW�

�� 6HOHFW�\RXU�WUDFH�

,I�\RX�VHH�PRUH�WKDQ�RQH�WUDFH��VHOHFW�WKHFRUUHFW�RQH��7R�GHWHUPLQH�WKH�WUDFHQDPH��VHH�WKH�7HFK7DON�RQ�SDJH���²���

�� &KRRVH� �$QDO\]H�

%H�DZDUH�WKDW�WKH�WUDFH�ILOH�FDQ�EH�H[WUHPHO\�ODUJH��%H�SDWLHQW�EHFDXVH�LW�PD\�WDNH�VRPHWLPH�WR�GLVSOD\�LW�

2

3

1

Page 276: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Authorizations Made Easy12–10

�� 6HOHFW�DOO�WKH�RSWLRQV�\RX�ZDQW�WRFRQVLGHU�LQ�\RXU�DQDO\VLV��IRUH[DPSOH��7UDFH�IRU�DXWKRUL]DWLRQFKHFNV��

,I�HYHU\WKLQJ�LV�VHOHFWHG��LW�PLJKW�EHHDVLHU�WR�FKRRVH� �WR�GHVHOHFW�DOO�ILUVWDQG�WKHQ�UHVHOHFW�RQH�RU�PRUHFKHFNER[HV�

�� 8QGHU�5HVWULFWLRQV��HQWHU�WKH�GHVLUHGXVHU�

�� &KRRVH� $QDO\]H�

�� 7KH�ILUVW�SDJH�RI�WKH�WUDFH�ILOHDSSHDUV��%\�GHIDXOW��:LWK�DXWKRULW\FKHFN�VKRXOG�EH�VHOHFWHG�

�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHWUDQVDFWLRQV�WKDW�ZHUH�XVHG�E\�WKHXVHU�

7

4

5

6

Page 277: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Release 4.6A/B12–11

�� 6LQFH�WKH�WUDFH�OLVWV�FDQ�EH�YHU\ODUJH��WKH�RXWSXW�LV�FRPSUHVVHG��7KH1XPEHU�RI�UHFRUGV�SULQWHG�LV�WKHQXPEHU�RI�OLQHV�FXUUHQWO\�GLVSOD\HG�

��� 7KHVH�OLQHV�DSSHDU�LQ�WKH�ER[�HV�DERYH�WKH�1XPEHU�RI�UHFRUGV�SULQWHG�,Q�RXU�H[DPSOH��DOO�WKHDXWKRUL]DWLRQV�FKHFNHG�ZLWK�WKHUHTXLUHG�ILHOG�YDOXHV�KDYH�DSSHDUHG�7KLV�LV�WKH�LQIRUPDWLRQ�\RX�DUHORRNLQJ�IRU�

��� 7KH�UHWXUQ�FRGH�IRU�HDFK�RI�WKHVHDXWKRUL]DWLRQ�FKHFNV�DOVR�DSSHDUV�< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�LW�LV�RND\�

< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�WKH�FKHFN�KDV�IDLOHG�

��� 7KH�WH[W�VKRZV�WKH�REMHFW�WKDW�ZDVFKHFNHG�

��� 7KH�ODVW�LWHP�RQ�WKH�OLQH�LV�WKHWUDQVDFWLRQ�FRGH�WKDW�ZDV�FKHFNHG�

,I�WKH�UHWXUQ�FRGH�LV�

< (TXDO�WR����WKH�DXWKRUL]DWLRQ�FKHFN�LV�RND\< *UHDWHU�WKDQ����WKH�DXWKRUL]DWLRQ�FKHFN�LV�QRW�RND\

9

10

11

10

11 12 13

12 13

Page 278: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–12

5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV

2YHUYLHZ

7KH�EDVLV�IRU�DOO�VZLWFKHV�LV�WKH�DFWLYDWLRQ�RI�WKH�3*��<RX�FDQ�DOVR�VZLWFK�WKH�5)&�6B7&2'(��DQG�JOREDO�GHDFWLYDWLRQ�VZLWFKHV��%DVHG�RQ�WKHVH��\RX�FDQ�GHDFWLYDWHDXWKRUL]DWLRQ�FKHFNV�XVLQJ�68����,QVLGH�WKH�DFWLYLW\�JURXSV�\RX�FDQ�LQDFWLYDWH�DXWKRUL]DWLRQREMHFWV�DQG�VHW�WKH�DFWLYLW\�JURXS�DQG�XVHU�DVVLJQPHQW�YDOLGLW\�SHULRG�

Profile Generator

RFC, S_TCODE and global deactivation switches

SU24 switches

AG and AG-User assignments

,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�GHVFULEH�WKH�VLQJOH�OD\HUV�LQ�PRUH�GHWDLOV�

(QDEOLQJ�WKH�3URILOH�*HQHUDWRU

%HIRUH�FRQWLQXLQJ�ZLWK�WKLV�VHFWLRQ��\RX�QHHG�WR�KDYH�DW�OHDVW�VHW�DQG�DFWLYDWHG�WKH�V\VWHPSDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<��GHIDXOW�YDOXH���DQG�UXQ�68���ZKLFK�FRSLHV�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�DQG�ILHOG�YDOXHV�IURP�WDEOH�862%7�DQG�862%;�LQWR�WKHFXVWRPHU�WDEOHV�

(QDEOLQJ�'LVDEOLQJ�2WKHU�6\VWHP�ZLGH�&KHFNV

(QDEOLQJ�DXWK�WFRGHVBQRWBFKHFNHG

5���LV�QRW�IXOO\�D�WUDQVDFWLRQ�EDVHG�DXWKRUL]DWLRQ�V\VWHP��,W�LV�DOVR�DQ�REMHFW�RULHQWHGDXWKRUL]DWLRQ�V\VWHP��$�EXVLQHVV�SURFHVV�LQ�5���FDQ�EH�DFFHVVHG�E\�VHYHUDO�PHFKDQLVPV��IRUH[DPSOH��WUDQVDFWLRQ�FRGH��%$3,��HWF����EXW�WUDQVDFWLRQV�DUH�PRVW�FRPPRQ��5���SURWHFWVSDUWLFXODU�REMHFWV�RU�SLHFHV�RI�WKH�EXVLQHVV�SURFHVV�ZLWKLQ�WKH�WUDQVDFWLRQ��5���GHILQHV�ZKLFKREMHFWV�DUH�´VHFXUDEOHµ�LQ�WKH�VWDQGDUG�V\VWHP��DQG�RQH�EXVLQHVV�SURFHVV�RU�WUDQVDFWLRQ�FRGHPD\�UHTXLUH�DFFHVV�WR�D�YDU\LQJ�QXPEHU�RI�SUHGHILQHG�REMHFWV��+RZHYHU��5���DOVR�XVHV�WKHWUDQVDFWLRQ�FRGH�DV�WKH�´ILUVW�OLQH�RI�GHIHQVHµ�WR�SUHYHQW�VRPHRQH�IURP�DFFHVVLQJ�SDUWV�RI�WKHV\VWHP��,Q�WKH�HYHQW�WKDW�D�XVHU�HQWHUV�D�WUDQVDFWLRQ�FRGH�WR�SHUIRUP�D�WDVN��WKH�V\VWHPFKHFNV�WKH�XVHU·V�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�WR�HQVXUH�WKH\�KDYH�WKH�FRUUHFW�6B7&2'(WUDQVDFWLRQ�FRGH�EHIRUH�FRQWLQXLQJ��,Q�FHUWDLQ�FDVHV��\RX�PD\�ZLVK�WR�HOLPLQDWH�WKLV�´ILUVWOLQH�RI�GHIHQVHµ�LI�\RX�ILQG�LW�FXPEHUVRPH�WR�SURWHFW�HDFK�DQG�HYHU\�WUDQVDFWLRQ�FRGH�LQ�WKH

Page 279: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–13

V\VWHP��$V�VXFK��\RX�FDQ�GLVDEOH�WKH�FKHFN�IRU�6B7&2'(�XVLQJ�WKH�V\VWHP�ZLGH�SURILOHSDUDPHWHU�DXWK�WFRGHVBQRWBFKHFNHG��,Q�WKH�V\VWHP��6B7&2'(�LV�DFWLYH�E\�GHIDXOW�

(QDEOLQJ�DXWK�UIFBDXWKRULW\BFKHFN

6$3�KDV�YDVWO\�HQKDQFHG�LWV�XVH�RI�WKH�5)&��UHPRWH�IXQFWLRQ�FDOO��IXQFWLRQDOLW\�LQ�UHFHQWUHOHDVHV�RI�WKH�5���6\VWHP��5)&V�DUH�XVHG�WKURXJKRXW�WKH�V\VWHP�VR�WKDW�RQH�SRUWLRQ�RI�WKH5���6\VWHP�FDQ�´FRPPXQLFDWHµ�ZLWK�DQRWKHU�SDUW�RI�5����IRU�H[DPSOH��FUHDWLQJ�D�VDOHVRUGHU�YLD�ZRUNIORZ�PD\�LQYRNH�DQ�5)&�WR�FRPPXQLFDWH�WKH�LQIRUPDWLRQ�WKDW�LV�EHLQJSDVVHG�LQWR�WKH�VDOHV�RUGHU�FUHDWH�IXQFWLRQ�LQ�ZRUNIORZ�SURFHVVLQJ���5)&·V�DUH�DOVR�FULWLFDO�LQSHUPLWWLQJ�V\VWHPV�DQG�DSSOLFDWLRQV�H[WHUQDO�WR�5����IRU�H[DPSOH��D�ZHE�SDJH��WRFRPPXQLFDWH�ZLWK�5���ZLWK�%$3,V��$V�%$3,V�XWLOL]H�5)&�IXQFWLRQDOLW\��DXWKRUL]DWLRQFKHFNV�DUH�SHUIRUPHG�EDVHG�RQ�WKH�%$3,�XVHG��2QH�RI�5��·V�FRUH�DSSURDFKHV�WR�VHFXULQJ�WKH5)&�IXQFWLRQDOLW\�LV�WR�LQWURGXFH�DQRWKHU�QHZ�DXWKRUL]DWLRQ�REMHFW�FDOOHG�6B5)&�ZKLFKJLYHV�SHRSOH�DFFHVV�WR�SDUWLFXODU�JURXSV�RI�5)&V��,Q�SDUWLFXODU��HYHU\�5)&�EHORQJV�WR�DIXQFWLRQ�JURXS��0DQ\�5)&V�FDQ�EHORQJ�WR�RQH�IXQFWLRQ�JURXS��IRU�H[DPSOH��WKH�IXQFWLRQJURXS�IRU�00�3XUFKDVH�2UGHU�3URFHVVLQJ���7KH�DXWKRUL]DWLRQ�REMHFW�6B5)&�FDQ�EH�UHVWULFWHGWR�JLYH�XVHUV�DFFHVV�WR�SDUWLFXODU�IXQFWLRQ�JURXSV��+RZHYHU��WKH�WUHPHQGRXV�DPRXQW�RI5)&V�LQ�����FRPSOLFDWHV�ZKLFK�IXQFWLRQ�JURXSV�\RX�VKRXOG�JLYH�SHRSOH�DFFHVV�WR��7KHUHIRUH�5���SURYLGHV�D�PHFKDQLVP�WR�GLVDEOH�WKH�FKHFN�DJDLQVW�WKH�6B5)&�DXWKRUL]DWLRQ�REMHFW�DW�DV\VWHP�ZLGH�OHYHO��7KH�V\VWHP�ZLGH�SURILOH�SDUDPHWHU�DXWK�UIFBDXWKRULW\BFKHFN�FDQ�EHFKDQJHG�IURP�LWV�EODQN�GHIDXOW�WR�RQH�RI�WKH�IROORZLQJ�< �� �1R�DXWKRUL]DWLRQ�FKHFN< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�VDPH�XVHU��QR�FKHFN�IRU�VDPH�XVHU�FRQWH[W

DQG�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��65)&�)8*5�DOVR�FKHFNHG�

*OREDOO\�'HDFWLYDWLQJ�RU�$FWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV

<RX�FDQ�DOVR�JOREDOO\�GHDFWLYDWH�RU�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�ZLWK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��7KH�V\VWHP�GRHV�QRW�H[HFXWH�DQ\�DXWKRUL]DWLRQ�FKHFNV�IRUGHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��<RX�KDYH�VHYHUDO�RSWLRQV�WR�UHDFK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��<RX�FDQ�XVH�WKH�,0*��VHH�VWHS�����WUDQVDFWLRQ�SU25��VHH�VWHS���RU�XVH�WUDQVDFWLRQ�auth_switch_objects�GLUHFWO\�

Page 280: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–14

�� &KRRVH� �QH[W�WR�6ZLWFK�RIIDXWKRUL]DWLRQ�FKHFNV�JOREDOO\��RSWLRQDO�DQG�FRQWLQXH�ZLWK�VWHS����RU�HQWHUsu25�DQG�FRQWLQXH�ZLWK�VWHS����

�� ,Q�WUDQVDFWLRQ�68����FKRRVH����'HDFWLYDWH�DXWKRUL]DWLRQ�REMHFW

JOREDOO\�

Page 281: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–15

�� 5HDG�WKH�LQIRUPDWLRQ�FDUHIXOO\�DQGFKRRVH� �

�� 'HDFWLYDWH�DQ�DXWKRUL]DWLRQ�REMHFWE\�GHVHOHFWLQJ�WKH�FKHFNER[�QH[W�WRLW��7KH�GHVHOHFWHG�OLQH�LV�KLJKOLJKWHGLQ�UHG�

�� &KRRVH� �

�� 7R�DFWLYDWH�\RXU�GDWD��FKRRVH� �

�� )RU�D�GHWDLOHG�H[SODQDWLRQ�DERXW�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH� �QH[WWR�WKH�DXWKRUL]DWLRQ�REMHFW�

&KRRVH� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RII�7R�YLHZ�WKH�FRORU�OHJHQG��FKRRVH� �

6 Tip

5

3

4 7

Tip

Page 282: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–16

�� <RX�UHFHLYH�GHWDLOHG�LQIRUPDWLRQDERXW�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�

�� &ORVH�WKH�ZLQGRZ�WR�UHWXUQ�

:KHQ�\RX�VDYH�DQG�DFWLYDWH�\RXU�GDWD��WKH�V\VWHP�DOVR�FKHFNV�WKH�DXWKRUL]DWLRQ�REMHFW6B86(5B2%-�

7KH�YDOXHV�IRU�WKH�V\VWHP�SDUDPHWHU�DXWK�REMHFWBGLVDEOLQJBDFWLYH�FDQ�EH�DQ�;�RU�EODQN��7KH;�LQGLFDWHV�WKDW�WKH�SDUDPHWHU�LV�DFWLYH�DQG�WKH�EODQN�LQGLFDWHV�WKDW�LW�LV�QRW��,I�LW�LV�QRWDFWLYH��ZLWK�68���JRW�VZLWFKHG�RII��\RXU�FKDQJHV�ZLOO�QRW�DIIHFW�DQ\WKLQJ��+RZHYHU��WKHGHIDXOW�YDOXH�LV�VHW�WR�DFWLYH�

8

9

Page 283: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–17

��� $XWKRUL]DWLRQ�REMHFWV�EHJLQQLQJZLWK�6B�RU�3B�FDQQRW�EH�VZLWFKHG�RII�

,I�\RX�WU\�WR�VZLWFK�WKRVH�REMHFWV�RIIDQG�VDYH�WKHP��\RX�ZLOO�UHFHLYH�DZDUQLQJ�PHVVDJH�

��� 7KH�V\VWHP�LJQRUHV�WKDW�\RX�KDYHVZLWFKHG�RII�WKRVH�DXWKRUL]DWLRQREMHFWV�

��� &KRRVH� �

<RX�FDQQRW�JOREDOO\�GHDFWLYDWH�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK�6B��%DVLV��RU�3B�+5��LQ�WUDQVDFWLRQ�$87+B6:,7&+B2%-(&76�

1R�DXWKRUL]DWLRQ�GDWD�LV�LQVHUWHG�LQ�WKH�3*�IRU�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��,Q�DUHOHDVH�XSJUDGH��WKH�V\VWHP�GRHV�QRW�GLVSOD\�WKH�WUDQVDFWLRQV�ZKHUH�DXWKRUL]DWLRQ�GDWDZLOO�EH�UHSURFHVVHG�LI�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�REMHFW�LV�JOREDOO\�GHDFWLYDWHG�

:KHQ�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��\RX�PD\�KDYH�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�IRU�PDQ\�DFWLYLW\�JURXSV�

,I�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��WKHVH�REMHFWV�DUH�QRWFRQWDLQHG�LQ�DQ\�DFWLYLW\�JURXSV��,Q�WKLV�FDVH��LQ�WKH�WUDQVDFWLRQ�3)&*�RQ�WKH

10

12

11

Page 284: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–18

$XWKRUL]DWLRQV�WDE��FKRRVH� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�WR�JHQHUDWH�SURILOHV�DQG�WKHRSWLRQ�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�WKH�QHZ�GDWD��0DLQWDLQ�DQ\�PLVVLQJ�DXWKRUL]DWLRQYDOXHV�DQG�UHJHQHUDWH�WKH�SURILOH�

3DUDPHWHU�7UDQVDFWLRQV

7KH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ�WR�RWKHU�WUDQVDFWLRQV��7KHVH�WUDQVDFWLRQV�ZRUNZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��ZKLFK�LV�UHVWULFWHG�E\�WKH�IDFW�WKDW�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�

<RX�FDQQRW�H[FOXGH�DXWKRUL]DWLRQ�REMHFWV�IURP�GLUHFW�XVH�LQ�SDUDPHWHU�WUDQVDFWLRQV��EXW�RQO\ZLWK�WKH�FRUUHVSRQGLQJ�FRUH�WUDQVDFWLRQ�

([DPSOH�

3DUDPHWHU�WUDQVDFWLRQ� �)��9��0DQDJHPHQW�RI�'RFXPHQW�$UFKLYHV�

&RUH�WUDQVDFWLRQ� �6$5$��$UFKLYH�0DQDJHPHQW�

7R�VHW�WKH�FKHFN�LQGLFDWRU�RI�WUDQVDFWLRQ�)��9�WR�1��QR�FKHFN���\RX�QHHG�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�RI�WKH�FRUH�WUDQVDFWLRQ�6$5$��<RX�FDQ�ILQG�WKH�QDPH�RI�WKLV�WUDQVDFWLRQ�LQ�WKHULJKW�KDQG�FROXPQ�7&RGH�RYHUYLHZ�LQ�WUDQVDFWLRQ�68����,I�\RX�GRXEOH�FOLFN�RQ�WKHSDUDPHWHU�WUDQVDFWLRQ�FRGH�LQ�ILHOG�7&RGH��WKH�V\VWHP�EUDQFKHV�GLUHFWO\�LQWR�WKH�FKHFNLQGLFDWRU�PDLQWHQDQFH�RI�WKH�FRUH�WUDQVDFWLRQ�

,I�WKH�DXWKRUL]DWLRQ�REMHFW�IRU�SDUDPHWHU�WUDQVDFWLRQ�)��9�LV�VHW�WR�&��FKHFN���EXW�XQGHU�WKHFRUH�WUDQVDFWLRQ�LW�LV�VHW�WR�&0��FKHFN�PDLQWDLQ���WKH�ILHOG�YDOXHV�IRU�6$5$�ZLOO�EHVXJJHVWHG�DV�GHIDXOWV�LQ�WKH�3*��,I�WKH�DXWKRUL]DWLRQ�REMHFW�LV�DOVR�VHW�WR�&0�LQ�)��9��WKHILHOG�YDOXHV�PDLQWDLQHG�IRU�)��9�ZLOO�EH�UHFRPPHQGHG�DV�GHIDXOWV�LQ�WKH�3*��DQG�WKH�HQWULHVIRU�6$5$�ZLOO�EH�RYHUZULWWHQ��<RX�FDQ�PDLQWDLQ�RU�RYHUZULWH�WKH�ILHOG�YDOXHV�RI�WKH�FRUHWUDQVDFWLRQ�IRU�SDUDPHWHU�WUDQVDFWLRQV�LQ�68���

'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�8VLQJ�68��

2SWLRQDO��1RUPDOO\�\RX�GR�QRW�KDYH�WR�PDNH�DQ\�FKDQJHV�LQ�WUDQVDFWLRQ�68���

+RZHYHU��LI�\RX�GR�PDNH�FKDQJHV�LQ�68����WKH�FKDQJHV�PXVW�EH�PDGH�LQ�WKH�'(9�V\VWHPDQG�WUDQVSRUWHG�WR�RWKHU�V\VWHPV��1HYHU�PDNH�FKDQJHV�LQ�DQ\�RWKHU�V\VWHP�

,Q�WKH�3*��\RX�KDYH�WKH�RSWLRQ�WR�GHDFWLYDWH�DQG�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�DJDLQVWGLIIHUHQW�DXWKRUL]DWLRQ�REMHFWV�

:KHQHYHU�\RX�SHUIRUP�5���WUDQVDFWLRQV��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG�WKDW�DULVHWKURXJK�ZRUN�DUHDV�FDOOHG�LQ�WKH�EDFNJURXQG��)RU�WKH�DXWKRUL]DWLRQ�FKHFNV�WR�EH�VXFFHVVIXO�WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��)RU�WKLV�UHDVRQ��PRVW�XVHUV�UHFHLYH�PRUHDXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHG�PDLQWHQDQFH�ORDG��%XW�WKH�FRUHWUDQVDFWLRQ�LV�DOZD\V�SURWHFWHG�E\�REMHFW�6B7&2'(��DQG�DXWKRUL]DWLRQ�FKHFNV�WKDW�EHORQJ�WR

Page 285: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–19

SXUH�EDFNJURXQG�IXQFWLRQV�DUH�GHDFWLYDWHG���7KLV�KDV�QRWKLQJ�WR�GR�ZLWK�EDFNJURXQGSURFHVVLQJ��

,Q�5����PDQ\�DXWKRUL]DWLRQ�REMHFWV�JR�XQXVHG�E\�PRVW�FXVWRPHUV��<RX�FDQ�GHDFWLYDWH�WKHDXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKH�REMHFWV�XVLQJ�WUDQVDFWLRQ�68�����0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV��7KLV�GHDFWLYDWLRQ�UHVXOWV�LQ�FOHDU�DXWKRUL]DWLRQ�SURILOHV�DQG�EHWWHUSHUIRUPDQFH�

<RX�FDQ�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ\�RI�WKH�IROORZLQJ�UHDVRQV�< 1RW�DOO�DXWKRUL]DWLRQ�REMHFWV�DUH�XVHG��IRU�LQVWDQFH��)B/)$�B%(.�< 0DQ\�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG�ZLWK�DQ�DVWHULVN�� �< $XWKRUL]DWLRQ�SURILOHV�DUH�WRR�ODUJH< (DFK�WUDQVDFWLRQ�LV�FKHFNHG�E\�6B7&2'(< 1HHGOHVV�DXWKRUL]DWLRQ�FKHFNV�UHGXFH�WKH�WUDQVDFWLRQ�SHUIRUPDQFH

7KH�IROORZLQJ�H[DPSOHV�LOOXVWUDWH�ZKHQ�WR�XVH�68���< ,I�D�ZDUHKRXVH�ZRUNHU�UHPRYHV�JRRGV�IURP�WKH�ZDUHKRXVH��DQG�WKH�UHPDLQLQJ�VWRFN

IDOOV�VKRUW�RI�D�FULWLFDO�OLPLW��WKH�V\VWHP�WULJJHUV�HLWKHU�D�SXUFKDVLQJ�RUGHU��D�SURGXFWLRQRUGHU��RU�ERWK��7KHVH�RSHUDWLRQV�DUH�FDUULHG�RXW�EHFDXVH�RI�WKH�V\VWHP�VHWWLQJV�DQGWKHUHIRUH�UHTXLUH�QR�IXUWKHU�DFWLRQV�E\�ZDUHKRXVH�ZRUNHUV��$FFRUGLQJO\��WKHVH�ZRUNHUVVKRXOG�QRW�KDYH�DXWKRUL]DWLRQV�IRU�SXUFKDVH�RU�SURGXFWLRQ�RUGHUV��VR�WKH�FKHFN�DJDLQVWWKLV�REMHFW�VKRXOG�EH�GHDFWLYDWHG�

< $XWKRUL]DWLRQ�REMHFW�)B/)$�B%(.��9HQGRU��$FFRXQW�DXWKRUL]DWLRQ��SURWHFWV�WKH�YHQGRUPDVWHU�UHFRUGV�DW�DFFRXQW�OHYHO��7KDW�LV��ZLWK�WKLV�REMHFW��LW�LV�SRVVLEOH�WR�GLYLGH�WKHYHQGRUV�LQWR�JURXSV�DQG�RQO\�DVVLJQ�WKH�DFFRXQWLQJ�FOHUN�WKH�PDLQWHQDQFH�DXWKRUL]DWLRQIRU�YHQGRUV�IURP�D�FHUWDLQ�JURXS��,I�\RX�GR�QRW�ZDQW�WR�PDNH�DQ\�DXWKRUL]DWLRQV�DW�WKLVOHYHO�DQG�DOORZ�DOO�DFFRXQWLQJ�FOHUNV�WR�PDLQWDLQ�DOO�YHQGRUV��LW�LV�EHVW�WR�GHDFWLYDWH�WKLVREMHFW�

2QO\�LI�\RX�KDYH�VHW�WKH�FKHFN�LQGLFDWRU�WR�&0��&KHFN�0DLQWDLQ���ZLOO�WKH�DXWKRUL]DWLRQDQG�SUHGHILQHG�DXWKRUL]DWLRQ�ILHOG�YDOXHV�EH�GLVSOD\HG�IRU�FKDQJLQJ�

5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV

$XWKRUL]DWLRQ�FKHFNV�DUH�FDUULHG�RXW�ZKHUHYHU�WKH\�DUH�VSHFLILFDOO\�ZULWWHQ�LQWR�WKH�VRXUFHFRGH�RI�D�WUDQVDFWLRQ��+RZHYHU��ZLWK�WUDQVDFWLRQ�68���\RX�FDQ�VHW�FKHFN�LQGLFDWRUV�WRH[FOXGH�FHUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRUL]DWLRQ�FKHFNV��<RX�FDQ�H[FOXGH�SDUWLFXODUDXWKRUL]DWLRQ�FKHFNV�HLWKHU�LQ�VSHFLILF�WUDQVDFWLRQV�RU�5���6\VWHP�ZLGH��ZLWKRXW�FKDQJLQJWKH�SURJUDP�FRGH�

%HIRUH�WKH�DXWKRUL]DWLRQ�SURILOH�LV�DXWRPDWLFDOO\�JHQHUDWHG��XVH�WKH�FKHFN�LQGLFDWRUV�WRFRQWURO�ZKLFK�REMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�GLVSOD\�

Page 286: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–20

0DLQWDLQLQJ�&KHFN�,QGLFDWRUV�IRU�7UDQVDFWLRQ�&RGHV

7R�DFFHVV�WKH�WUDQVDFWLRQ�IRU�PDLQWDLQLQJ�FKHFN�LQGLFDWRUV��HQWHU�WUDQVDFWLRQ�SU24�LQ�WKH�&RPPDQG�ILHOG��RUQDYLJDWH�XVLQJ�WKH�,0*��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�\RX�KRZ�WR�JHW�WR�0DLQWDLQ�FKHFN�LQGLFDWRUWUDQVDFWLRQ�XVLQJ�WKH�,0*��WUDQVDFWLRQ�FRGH�SPRO���,I�\RX�HQWHU�SU24�GLUHFWO\��VWDUW�ZLWK�VWHS���

�� ,Q�WKH�,0*�IROORZ�WKH�PHQX�SDWK%DVLV�&RPSRQHQWV�→�6\VWHP$GPLQLVWUDWLRQ�→�8VHUV�DQG$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ�WKH3URILOH�*HQHUDWRU�→�:RUN�RQ�6$3&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV�DQGFKRRVH� �QH[W�WR�WKDW�OLQH�

�� 6HOHFW�&KDQJH�WHVW�VWDWXV��WKLVWUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&KDQJH�FKHFN�LQGLFDWRU��

�� &KRRVH� �&KRRVH�

1

2

3

Page 287: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–21

�� 6HOHFW�0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV�

�� (QWHU�HLWKHU�D�VLQJOH�WUDQVDFWLRQ�FRGH�IRU�H[DPSOH�MK01��RU�D�UDQJH�RIFRGHV�IRU�ZKLFK�\RX�ZDQW�WR�OLVW�WKHFKHFN�LQGLFDWRUV�

�� &KRRVH� �WR�H[HFXWH�

�� 6HOHFW�WKH�DSSURSULDWH�WUDQVDFWLRQ��LQRXU�H[DPSOH��RQO\�RQH�LV�VKRZQ��EXWPRUH�WKDQ�RQH�FRXOG�DSSHDU��

�� &KRRVH� �&KHFN�LQGLFDWRU�WR�GLVSOD\WKH�FXUUHQW�DFWLYH�FKHFN�LQGLFDWRUVIRU�DXWKRUL]DWLRQ�REMHFWV�LQ�WKHVHOHFWHG�WUDQVDFWLRQV�

,I�\RX�DUH�GHDOLQJ�ZLWK�D�SDUDPHWHUWUDQVDFWLRQ��WKH�FRUH�WUDQVDFWLRQ�DSSHDUVLQ�WKH�7FRGH��RULJLQDO��FROXPQ��)RU�PRUHLQIRUPDWLRQ��VHH�3DUDPHWHU�7UDQVDFWLRQVRQ�SDJH���²���

4

5

6

7

8

Tip

Page 288: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–22

$�OLVW�RI�DXWKRUL]DWLRQ�REMHFWVDSSHDUV�LQ�WKH�2EMHFW�FROXPQ�IRU�WKHVHOHFWHG�WUDQVDFWLRQ�LQYROYHG�ZLWKWKH�FKHFN�

�� &KRRVH� �)LHOG�YDOXHV�

1RWH��7KHUH�DUH�WKUHH�REMHFWV�WKDWKDYH�WKH�FKHFN�LQGLFDWRU�VHW�WR�&0�

7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�862%;B&�

([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV

&0� �&KHFN�0DLQWDLQ

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&� �&KHFN

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

1� �1R�FKHFN

< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8� �8QPDLQWDLQHG

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�

9

Page 289: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–23

7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��

��� 7KUHH�REMHFWV�JHW�GLVSOD\HG�ZLWKSUHGHILQHG�YDOXHV��VLQFH�RQO\�WKUHHREMHFWV�KDG�WKH�FKHFN�LQGLFDWRU�VHW�WR&KHFN�0DLQWDLQ�

��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU��FKRRVH�WR�WRJJOH�EHWZHHQ�GLVSOD\�DQG

FKDQJH�PRGH�

7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�8627B&�

��� (QWHU�D�WUDQVSRUWDEOH�FKDQJH�UHTXHVWQXPEHU��RU�XVH� �WR�FUHDWH�D�QHZRQH�

��� &KRRVH� �

��� 7R�FKDQJH�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�RQH�RI�WKH�REMHFWV��FKRRVH�QH[W�WR�WKH�REMHFW·V�ILHOG�QDPH��IRU

H[DPSOH��WKH�REMHFW�)B/)$�B$33DQG�WKH�ILHOG�$33.=��

10

11

12

13

14

Page 290: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–24

��� 6HOHFW�WKH�GHVLUHG�YDOXH��IRUH[DPSOH��ZH�DGGHG�)�)LQDQFLDO$FFRXQWLQJ��

��� &KRRVH� �

��� 7KH�YDOXH�ZDV�DGGHG�

��� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHDQ\�FKDQJHV�\RX�PLJKW�KDYH�PDGH�

7R�GLVSOD\�WKH�ORQJ�WH[W�IRU�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH�2EMHFW�GHVFU�

��� ,Q�WKH�9DOXH��LQWHUYDO��FROXPQ�UHYLHZ�\RXU�FKDQJHV��WKLV�LV�WDEOH862%7B&��ZKLFK�UHSUHVHQWVFXVWRPHU�VHWWLQJV��

��� ,Q�WKH�6$3�YDOXH��LQWHUYDO��FROXPQ�QRWLFH�WKH�RULJLQDOO\�GHOLYHUHG�6$3GHIDXOW�YDOXHV��WKLV�LV�WDEOH�862%7�ZKLFK�UHSUHVHQWV�6$3�GHIDXOWV��9DOXHV�WKDW�KDYH�FKDQJHG�IURP�WKH6$3�GHIDXOWV�DUH�LQ�FRORU�

��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �

��� &KRRVH� �RU� �6$3�GHIDXOWV�WR�KLGHWKH�6$3�GHIDXOW�YDOXHV�

7R�VNLS�\RXU�FKDQJHV��FKRRVH� �IRU�WKH�DSSURSULDWH�YDOXH�\RX�FKDQJHG�

15

16

17

18 Tip

19 20

Tip

21 22

22

Page 291: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–25

��� &KRRVH� �WR�VZLWFK�WR�FKDQJH�PRGHIRU�WKH�FKHFN�LQGLFDWRUV�

��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU�IRU�DQREMHFW��FOLFN�LQ�WKH�DSSURSLDWHFROXPQ��8��1��&��&0��

1RWLFH�KRZ�WKH�FXUVRU�FKDQJHV�WR�DQLFRQL]HG�KDQG�DV�\RX�PRYH�RYHU�WKHFKHFN�LQGLFDWRUV�

,Q�WKLV�H[DPSOH��ZH�FOLFNHG�LQ�WKH�1FROXPQ�WR�VHW�WKH�FKHFN�LQGLFDWRU�IRUREMHFW�)B/)$�B%(.�WR�1R�FKHFN�

��� 7KH�FKHFN�LQGLFDWRU�KDV�VXFFHVVIXOO\EHHQ�FKDQJHG�WR�1��7KHUHIRUH�)B/)$�B%(.�ZLOO�QR�ORQJHU�EHFKHFNHG�LQ�WUDQVDFWLRQ�0.���

��� 6HOHFW�DQ�REMHFW�DQG�FKRRVH�$XWK��REM��WR�YLHZ�D�ZKHUH�XVHG

OLVW�

��� <RX�KDYH�WR�GHWHUPLQH�D�VSHFLILFWUDQVDFWLRQ�FRGH�UDQJH��7R�VHDUFKWKURXJK�DOO�H[LVWLQJ�WUDQVDFWLRQFRGHV��HQWHU�DQ�DVWHULVN�� ��

��� &KRRVH� �

24

23

26

25

27

28

Page 292: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–26

��� 7KH�JHQHUDWHG�OLVW�VKRZV�DOOWUDQVDFWLRQV�ZKHUH�WKH�VHOHFWHGDXWKRUL]DWLRQ�REMHFW�LV�XVHG�

��� &KRRVH� �

��� &KRRVH�6$3�GHIDXOWV�WR�GLVSOD\�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�LQ�WKHVDPH�OLVW�

29

30

31

Page 293: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–27

%RWK�WDEOH�HQWULHV�LQ�WDEOHV�862%;DQG�862%;B&�QRZ�DSSHDU�IRU�WKHVHOHFWHG�WUDQVDFWLRQ��LQ�WKLV�H[DPSOH�0.����

��� ,Q�WKH�&KHFN�,'�FROXPQ��UHYLHZ�WKHFXUUHQW�DFWLYH�FKHFN�LQGLFDWRUV�IRUWKLV�WUDQVDFWLRQ��HQWULHV�LQ�WDEOH862%;B&��

��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��UHYLHZWKH�6$3�FKHFN�LQGLFDWRUV�GHIDXOWYDOXHV��HQWULHV�LQ�WDEOH�862%;��

��� 7R�VNLS�\RXU�FKDQJHV��FKRRVH� �WRUHVHW�WR�WKH�6$3�FKHFN�LQGLFDWRUGHIDXOW�YDOXH�IRU�WKLV�DXWKRUL]DWLRQREMHFW��6HWWLQJV�WKDW�GLIIHU�IURP�6$3GHIDXOWV�DSSHDU�LQ�FRORU�

��� &KRRVH� �$XWK��REM��WR�DGG�D�QHZREMHFW�IRU�FKHFNLQJ��7KHUH�PXVW�DOVREH�DQ�$87+25,7<B&+(&.�FDOO�LQWKLV�SURJUDP�IRU�WKH�QHZ�REMHFW�

��� &KRRVH� �

��� &KRRVH� �

([FHSWLRQV

$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG��7UDQVDFWLRQV�ZKRVH�FKHFN�LQGLFDWRU�FDQQRW�EHFKDQJHG�EHFDXVH�RI�D�ORFDO�ORFN��(148(8(��RU�D�ORFN�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUWV\VWHP��IRU�REMHFW�FDWDORJ�HQWU\�5�75�686.��7FRGH!��DUH�DOVR�VKRZQ�LQ�FRORU��$�VKRUWHUURU�PHVVDJH�DSSHDUV�LQ�WKH�GHVFULSWLRQ�ILHOG�

,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��

,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��

�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�

�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�

32 33

34

36 37

35

Page 294: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–28

�� ,Q�WUDQVDFWLRQ�3)&*�VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�

�� 5HJHQHUDWH�WKH�SURILOH�

�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU��FKDQJHV�EHFRPH�DFWLYH�ZLWK�WKHQH[W�V\VWHP�ORJRQ�

0DVV�&KDQJH�RI�&KHFN�,QGLFDWRUV

<RX�FDQ�DOVR�JOREDOO\�FKDQJH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LQ�WUDQVDFWLRQVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW�RFFXUV��<RX�FDQ�DOVR�VSHFLILFDOO\�H[FOXGH�LQGLYLGXDOWUDQVDFWLRQV�IURP�WKH�JOREDO�FKDQJH�

7R�DFFHVV�WKH�WUDQVDFWLRQ�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV��HQWHU�WKH�WUDQVDFWLRQ�SU24LQ�WKH�&RPPDQG�ILHOG��RU�QDYLJDWH�XVLQJ�WKH�,0*�DV�GHVFULEHG�LQ�WKH�VHFWLRQ�EHIRUH��,Q�WKHIROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�JHW�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV�E\HQWHULQJ�SU24�GLUHFWO\�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SU24�DQG�FKRRVH�(QWHU�

�� 6HOHFW�(GLW�FKHFN�LQGLFDWRUV�LQ�DOOWUDQVDFWLRQV�

�� (QWHU�WKH�GHVLUHG�$XWKRUL]DWLRQ�REMHFW�IRU�H[DPSOH��)B/)$B%(.�

�� &KRRVH� �

$�OLVW�RI�WUDQVDFWLRQV�LV�GLVSOD\HG�RQWKH�QH[W�VFUHHQ��7KH�HQWHUHGDXWKRUL]DWLRQ�REMHFW�DSSHDUV�ZLWKWKH�DSSURSULDWH�FKHFN�LQGLFDWRU�SHUWUDQVDFWLRQ�

2

3

4

Page 295: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–29

�� 7R�DOWHU�WKH�FKHFN�LQGLFDWRU�HLWKHU�IRUVHOHFWHG�WUDQVDFWLRQV�RU�JOREDOO\�FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�

D� 6HOHFW�WKH�WUDQVDFWLRQV�IRU�ZKLFK\RX�ZLVK�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�

E� &KRRVH� �WR�VHOHFW�DOOWUDQVDFWLRQV�ILUVW�DQG�WKHQGHVHOHFW�LQGLYLGXDO�WUDQVDFWLRQV�DVQHFHVVDU\�

7R�HQVXUH�WKDW�WKH�3*�DFWXDOO\FUHDWHV�DQ�DXWKRUL]DWLRQ��ZH�QHHG�WRFKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKHDSSURSULDWH�DXWKRUL]DWLRQ�REMHFWIURP�&��&KHFN��WR�&0�&KHFN�0DLQWDLQ��

�� 7R�VLPXOWDQHRXVO\�FKDQJH�WKH�FKHFNLQGLFDWRUV�IRU�WKH�VHOHFWHGWUDQVDFWLRQV��FKDQJH�WKH�FKHFNLQGLFDWRU�LQ�WKH�ILUVW�OLQH��ZKLFKFRQWDLQV�WKH�QDPH�RI�WKHDXWKRUL]DWLRQ�REMHFW��E\�FOLFNLQJ�LQWKH�FROXPQ�IRU�WKH�QHZ�FKHFNLQGLFDWRU�EHORZ��8��1��&��&0���:HFKRVH�&0�

7R�FKHFN�WKH�WUDQVDFWLRQ�H[HFXWHG�E\�WKH�WUDQVDFWLRQ�FRGH�GLVSOD\HG�LQ�FROXPQ�7FRGH��\RXFDQ�FKRRVH� �QH[W�WR�WKH�WUDQVDFWLRQ�DQG�LW�ZLOO�EH�H[HFXWHG�

([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV

&0� �&KHFN�0DLQWDLQ

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&� �&KHFN

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

5a

5b

6

Page 296: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–30

1� �1R�FKHFN

< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8� �8QPDLQWDLQHG

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�

7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��

�� 2QO\�WKH�FKHFN�LQGLFDWRU�IRU�WKHWUDQVDFWLRQV�\RX�VHOHFWHG�KDYHFKDQJHG�

�� 2QFH�D�FKHFN�LQGLFDWRU�LQ�WKH�OLVW�LVVHW�WR�&0��&KHFN�0DLQWDLQ���WKH�)OG�YDOXHV�EXWWRQ�DSSHDUV��%\

FOLFNLQJ�WKLV�EXWWRQ��\RX�FDQPDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�RI�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�IRU�DOO�WUDQVDFWLRQV�ZKRVHFKHFN�LQGLFDWRU�KDV�EHHQ�VHW�

�� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHWKH�FXUUHQW�VHWWLQJV�ZLWK�WKH�6$3GHIDXOWV�

98

7

Page 297: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–31

��� 7KH�FKDQJHV�RI�WKH�FKHFN�LQGLFDWRUDUH�VKRZQ�LQ�UHG�

7R�KLJKOLJKW�DOO�WUDQVDFWLRQ�FRGHVWKDW�KDYH�FKDQJHG��FKRRVH�(GLW�→&KDQJHV�→�'LVSOD\�LQ�FRORU�

��� ,Q�WKH�&KHFN�,'�FROXPQ��QRWLFH�WKHFKDQJHV�\RX�PDGH��HQWULHV�LQ�WDEOH862%;B&��

��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��QRWLFHWKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWYDOXHV��HQWULHV�LQ�862%;��

&KRRVH� �6$3�GHIDXOW�LI�\RX�ZDQW�WRUHVWRUH�WKH�VHOHFWHG�WUDQVDFWLRQV�WR�WKHLURULJLQDO�GHOLYHU\�VWDWXV�VHW�E\�6$3�'XULQJ�LQVWDOODWLRQ��WKLV�VWHS�UHVWRUHV�WKHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�WR�WKHVHWWLQJ�LQ�WKH�5���6\VWHP�

��� &KRRVH� �&KHFN�,'�

��� &KRRVH�<HV�

([FHSWLRQV

$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG�

10

11 12

13Tip

14

Page 298: Authorizations Made Easy

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–32

,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��

,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��

�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�

�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�

�� ,Q�WUDQVDFWLRQ�3)&*��VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�

�� 5HJHQHUDWH�WKH�SURILOH�

�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU�WKDW�FKDQJHV�EHFRPH�DFWLYH�ZLWKWKH�QH[W�V\VWHP�ORJRQ�

0DLQWDLQLQJ�$XWKRUL]DWLRQV�LQ�WKH�$FWLYLW\�*URXSV

3OHDVH�VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��VLQFH�ZH�GHVFULEHG�WKLV�WRSLFWKHUH�LQ�GHWDLO�

Page 299: Authorizations Made Easy

13–1

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG

/RJJLQJ

&RQWHQWV

Overview ................................................................................................................13–2

Audit Tools (SM20, SM19, SECR) ........................................................................13–2

Audit Tasks (SM21, STAT, ST03).......................................................................13–19

Logging Changes to User Master Records, Profiles, and Authorizations ....13–29

����

Page 300: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Overview

Authorizations Made Easy13–2

2YHUYLHZ

7KH�SXUSRVH�RI�WKLV�FKDSWHU�LV�WR�PDNH�\RX�DZDUH�RI�\RXU�UHVSRQVLELOLWLHV�DV�WKH�5���6\VWHPDGPLQLVWUDWRU�V��IRU�VHFXULW\��ZKLFK�LQFOXGHV�< 3URWHFWLQJ�WKH�5���6\VWHP< 3UHSDULQJ�\RX�IRU�D�FRPSXWHU�VHFXULW\�DXGLW

*HQHUDOO\��WKH�V\VWHP�DGPLQLVWUDWRU�LV�UHVSRQVLEOH�IRU�UHVSRQGLQJ�WR�WKH�ILQGLQJV�RI�DQ�5��6\VWHP�DXGLW�

,Q�WKLV�FKDSWHU��\RX�OHDUQ�KRZ�WR�DQDO\]H�DXWKRUL]DWLRQ�ORJJLQJ�IURP�D�VHFXULW\�SHUVSHFWLYH�<RX�OHDUQ�KRZ�WR�SUHSDUH�IRU�D�W\SLFDO�V\VWHP�DXGLW�

5HIHU�WR�6\VWHP�$GPLQLVWUDWLRQ�0DGH�(DV\��5HOHDVH����$�%��FKDSWHU�����WKH�VHFWLRQ6HFXULW\�$GPLQLVWUDWLRQ��ZKLFK�VHUYHG�DV�WKH�EDVLV�IRU�WKLV�FKDSWHU�

7KLV�FKDSWHU�LV�RQO\�LQWHQGHG�WR�VHUYH�DV�DQ�LQWURGXFWLRQ�WR�FRPSXWHU�VHFXULW\�&RQVLGHULQJ�WKH�JURZLQJ�LPSRUWDQFH�RI�VHFXULW\��ZH�DGYLVH�\RX�WR�ZRUN�ZLWK�\RXUDXGLWRUV��ILQDQFH�GHSDUWPHQW��OHJDO�GHSDUWPHQW��DQG�RWKHUV�ZKR�PLJKW�EH�DIIHFWHG�E\V\VWHP�VHFXULW\�

$XGLW�7RROV��60����60����6(&5�

6HFXULW\�$XGLW�/RJ��60���

:KDW

7KH�6HFXULW\�$XGLW�/RJ�UHFRUGV�WKH�VHFXULW\�UHODWHG�DFWLYLWLHV�RI�XVHUV�LQ�WKH�V\VWHP��7KHVHDFWLYLWLHV�LQFOXGH�VXFFHVVIXO�DQG�IDLOHG�< 'LDORJ�ORJRQ�DWWHPSWV< 5HSRUW�DQG�WUDQVDFWLRQ�VWDUWV< 5)&�&3,&�ORJRQV2WKHU�HYHQWV�ZULWWHQ�WR�WKH�ORJ�DUH�< /RFNHG�WUDQVDFWLRQV�RU�XVHUV< &KDQJHG�RU�GHOHWHG�

� $XWKRUL]DWLRQV� $XWKRUL]DWLRQ�SURILOHV� 8VHU�PDVWHU�UHFRUGV

< &KDQJHV�WR�WKH�DXGLW�FRQILJXUDWLRQ

Page 301: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–3

7KH�ORJ�LV�FUHDWHG�HDFK�GD\��DQG�SUHYLRXV�ORJV�DUH�QRW�GHOHWHG�RU�RYHUZULWWHQ��7KH�ORJ�ILOHVFDQ�EHFRPH�QXPHURXV�DQG�ODUJH��VR�ZH�UHFRPPHQG�WKDW�WKH�ORJV�EH�SHULRGLFDOO\�DUFKLYHGEHIRUH�EHLQJ�PDQXDOO\�SXUJHG�

1RWH��7KH�ORJ�ILOHV�DUH�RSHUDWLQJ�V\VWHP�ORJ�ILOHV��7UDQVDFWLRQ�60����6HFXULW\�$XGLW�'HOHWH�2OG�$XGLW�/RJV��LV�RQH�PHFKDQLVP�WR�SXUJH�WKHVH�ILOHV��2WKHU�RSHUDWLQJ�V\VWHPDUFKLYLQJ�WHFKQLTXHV�PD\�DOVR�EH�XVHG�

$Q�DXGLW�DQDO\VLV�UHSRUW�FDQ�EH�JHQHUDWHG�IURP�WKH�DXGLW�ORJV��<RX�FDQ�DQDO\]H�D�ORFDOVHUYHU��D�UHPRWH�VHUYHU��RU�DOO�WKH�VHUYHUV�LQ�DQ�5���6\VWHP�

:K\

7KH�LQIRUPDWLRQ�LQ�WKH�VHFXULW\�DXGLW�ILOHV�FDQ�EH�PDQLSXODWHG�WR�WDLORU�WKH�DXGLW�DQDO\VLVUHSRUW�EDVHG�RQ�FHUWDLQ�FULWHULD��7KH�UHSRUW�DVVLVWV�WKH�DGPLQLVWUDWRU�WR�< 5HFRQVWUXFW�RU�DQDO\]H�LQFLGHQWV< ,PSURYH�VHFXULW\�E\�UHFRJQL]LQJ�LQDGHTXDWH�PHDVXUHV< 7UDFH�XQXVXDO�XVHU�DFWLYLWLHV< 8QGHUVWDQG�WKH�LPSDFW�RI�FKDQJHV�WR�WUDQVDFWLRQV�RU�XVHUV

+RZ

7R�VWDUW�D�VHFXULW\�DXGLW��\RX�FDQ�GR�RQH�RI�WKH�IROORZLQJ�< 6HW�WKH�SURILOH�SDUDPHWHU�UVDX�HQDEOH�WR��< '\QDPLFDOO\�VWDUW�LW�XVLQJ�WUDQVDFWLRQ�60����6HH�WKH�VHFWLRQ�6HWWLQJ�6HFXULW\�$XGLW�/RJ

3DUDPHWHUV�RQ�SDJH���²���

7KH�QXPEHU�RI�DXGLW�ORJV�FUHDWHG�E\�WKH�V\VWHP�GHSHQGV�RQ�WKH�IROORZLQJ�< <RX�PD\�FKRRVH�WR�VHW�WKH�PD[LPXP�VSDFH�IRU�WKH�VHFXULW\�DXGLW�ILOH�LQ�SDUDPHWHU

UVDX�PD[BGLVNVSDFH�ORFDO�$W�WKLV�SRLQW��ZKHQ�WKH�OLPLW�KDV�EHHQ�UHDFKHG��ORJJLQJ�ZLOO�HQG�

< <RX�FDQ�GHILQH�WKH�VL]H�RI�DQ�LQGLYLGXDO�VHFXULW\�ORJ�ILOH�WR�ILW�WKH�FKRVHQ�DUFKLYLQJPHGLD�7KLV�GHILQLWLRQ�PHDQV�WKDW�WKH�V\VWHP�SURGXFHV�VHYHUDO�ORJ�ILOHV�HDFK�GD\��DQG�WKHVH�ILOHVFDQ�EH��IRU�H[DPSOH��DUFKLYHG�SHULRGLFDOO\�RQWR�&'V��7KH�SURILOH�SDUDPHWHU�LVUVDX�PD[BGLVNVSDFH�SHUBILOH�DQG�WKH�PD[LPXP�VL]H�SHU�ILOH�LV���*%�

<RX�FDQQRW�VHW�ERWK�SDUDPHWHUV��<RX�KDYH�WR�FKRRVH�WKH�PHWKRG�E\�ZKLFK�WKH�DXGLW�ILOHVDUH�FUHDWHG�

Page 302: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–4

5XQQLQJ�WKH�$XGLW�/RJ

7KLV�SURFHGXUH�DVVXPHV�WKDW�WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRU�VRPH�WLPH�DQG�WKDW�DXGLW�ORJV�KDYH�EHHQFUHDWHG�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM20�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���$QDO\VLV��

�� 2Q�WKH�6\VWHP�$XGLW�/RJ�VFUHHQ��FRPSOHWH�WKHVWHSV�EHORZ�

D� ,Q�)URP�GDWH�WLPH��HQWHU�IRU�H[DPSOH��13:00

E� 8QGHU�$XGLW�FODVVHV��VHOHFW�� 'LDORJ�ORJRQ� 7UDQVDFWLRQ�VWDUW� 5HSRUW�VWDUW

�� &KRRVH�5H�UHDG�DXGLW�ORJ�

7KLV�EXWWRQ�LV�XVHG�WR�UHDG�D�ORJ�IRU�WKH�ILUVWWLPH�

7KH�VHFXULW\�UHSRUW�LV�GLVSOD\HG�

�� 7R�UHYLHZ�WKH�GHWDLOV�RI�DQ�DXGLW�PHVVDJH��VHOHFWD�OLQH�DQG�FKRRVH� �

2b

2a

3

4

Page 303: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–5

'RFXPHQWDWLRQ�IRU�WKH�PHVVDJH�DQGWHFKQLFDO�GHWDLOV�DSSHDUV��7KLV�GLVSOD\�LVPRVW�XVHIXO�ZKHQ�GLVSOD\LQJ�QHJDWLYHPHVVDJHV�VXFK�DV�IDLOHG�ORJLQV�RU�ORFNHGWUDQVDFWLRQV�

6HWWLQJ�6HFXULW\�$XGLW�/RJ�3DUDPHWHUV��60���

:KDW

7KH�DXGLW�ORJ�SDUDPHWHUV�DUH�WKH�FULWHULD�XVHG�WR�ZULWH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�LQWR�WKHDXGLW�ORJ�ILOH��7KH�SDUDPHWHUV�DUH�JURXSHG�LQWR�DXGLW�SURILOHV�WKDW�FDQ�EH�DFWLYDWHG�DW�WKHQH[W�V\VWHP�VWDUWXS��FRQILJXUDWLRQ�VWDWXV��RU�DSSOLHG�´RQ�WKH�IO\µ��G\QDPLF�FRQILJXUDWLRQ��

:K\

$XGLW�SURILOHV�QHHG�WR�EH�FUHDWHG�ILUVW�EHIRUH�DXGLW�ORJV�FDQ�EH�ZULWWHQ��7KHVH�SURILOHV�OLPLWWKH�DPRXQW�DQG�W\SH�RI�GDWD�ZULWWHQ�LQWR�WKH�VHFXULW\�DXGLW�ILOHV��PDNLQJ�WKH�VXEVHTXHQWVHFXULW\�UHSRUWV�PRUH�PHDQLQJIXO�WR�WKH�DGPLQLVWUDWRU�

+RZ

'HFLGH�ZKDW�WR�DXGLW�DQG�VHW�VHOHFWLRQ�FULWHULD�HLWKHU�DW�WKH�GDWDEDVH�OHYHO�RU�G\QDPLFDOO\�DWWKH�DSSOLFDWLRQ�VHUYHU�OHYHO�< ,I�WKH�DXGLW�FRQILJXUDWLRQ�LV�SHUPDQHQWO\�VWRUHG�DW�WKH�GDWDEDVH�OHYHO��DOO�DSSOLFDWLRQ

VHUYHUV�XVH�WKH�LGHQWLFDO�FULWHULD�WR�VDYH�HYHQWV�LQ�WKH�DXGLW�ORJ��7KH�VHWWLQJV�WDNH�HIIHFW�DWWKH�QH[W�DSSOLFDWLRQ�VHUYHU�VWDUW�

< $W�WKH�DSSOLFDWLRQ�VHUYHU�OHYHO��KRZHYHU��G\QDPLF�FKDQJHV�FDQ�EH�VHW�WR�LQGLYLGXDODSSOLFDWLRQ�VHUYHUV�DQG�GLVWULEXWHG�WR�WKH�HQWLUH�V\VWHP�7KH�QHZ�FULWHULD�UHPDLQV�LQ�HIIHFW�XQWLO�WKH�VHUYHU�LV�EURXJKW�GRZQ�

<RX�FDQ�GHILQH�XS�WR�ILYH�VHWV�RI�VHOHFWLRQ�FULWHULD�RU�ILOWHUV��7KH�V\VWHP�SDUDPHWHU�UVDX�VHOHFWLRQBVORWV��WKDW�GHILQHV�WKH�QXPEHU�RI�ILOWHUV�KDV�D�GHIDXOW�YDOXH�RI����<RX�FDQDFWLYDWH�DQ�DXGLW�LQ�WKH�G\QDPLF�FRQILJXUDWLRQ�XVLQJ�WUDQVDFWLRQ�60���

Page 304: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–6

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM19�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���&RQILJXUDWLRQ��

&RQILJXUDWLRQ�VWDWXV�UHIHUV�WR�WKH�VWRUDJH�RI�WKH�SDUDPHWHUV�LQ�WKH�GDWDEDVH�

�� &KRRVH� �

�� (QWHU�D�SURILOH�QDPH��IRU�H[DPSOH��AUDPROF1��

�� &KRRVH� �

�� ,Q�WKLV�VFUHHQ��\RX�PD\�VSHFLI\�WZR�ILOWHU�JURXSVDQG�GHILQH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�WKDW�ZLOOEH�ZULWWHQ�LQWR�WKH�ORJ�

2

5

4

3

Page 305: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–7

'HILQLQJ�)LOWHU�*URXS��

�� &KRRVH�WKH�)LOWHU���WDE�

�� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�*�LQ�8VHU�1DPHV�

�� ,Q�$XGLW�&ODVVHV��VHOHFW�< 'LDORJ�/RJRQ< 7UDQVDFWLRQ�6WDUW

�� 8QGHU�(YHQWV��VHOHFW�$OO�

��� 6HOHFW�)LOWHU�$FWLYH�

'HILQLQJ�)LOWHU�*URXS��

��� &KRRVH�WKH�)LOWHU���WDE�

7KLV�ILOWHU�WUDFHV�WKH�UHSRUWV�VWDUWHG�E\�RQH�XVHU�

��� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW.< (QWHU�D�XVHU�,'�LQ�8VHU�1DPHV��IRU�H[DPSOH�

GARYN��

��� ,Q�$XGLW�&ODVVHV��VHOHFW�5HSRUW�VWDUW�

��� 8QGHU�(YHQWV��VHOHFW�6HYHUH�DQG�FULWLFDO�

��� 'HVHOHFW�)LOWHU�$FWLYH�

7KLV�VHWWLQJ�DOORZV�\RX�WR�VDYH�WKH�ILOWHU�VHWWLQJV�EXW�GRHV�QRW�DFWLYDWH�WKHP�

��� &KRRVH�'HWDLO�VHWWLQJ�WR�GULOO�GRZQ�WR�WKH�DXGLWFODVV�DQG�HYHQW�FODVV�FDWHJRULHV�

7 8 9

10

12 13 14

1516

6

11

Page 306: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–8

��� 6FUROO�GRZQ�WR�5HSRUW�VWDUW�

1RWLFH�WKDW�WKH�FDWHJRU\�LV�DXWRPDWLFDOO\�FKRVHQEDVHG�RQ�WKH�HDUOLHU�VHOHFWLRQ�RI�HYHQW�W\SH�DQGDXGLW�FODVV�W\SH�

��� &KRRVH� �

��� 7KH�JHQHUDO�FDWHJRULHV�DUH�FOHDUHG�LQGLFDWLQJWKDW�VHWWLQJV�ZHUH�EURZVHG�RU�GHILQHG�DW�WKHGHWDLO�OHYHO�

��� &KRRVH� �

20

18

19

Page 307: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–9

��� $�V\VWHP�PHVVDJH�QRWLILHV�WKH�XVHU�WKDW�WKHSURILOH�ZDV�VDYHG�VXFFHVVIXOO\�

��� 7R�DFWLYDWH�WKH�SURILOH��VHOHFW� �

��� 7KH�SURILOH�QDPH�QRZ�DSSHDUV�LQ�WKH�$FWLYHSURILOH�ILHOG�

��� $�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKH�SURILOH�ZLOOEH�DFWLYDWHG�ZKHQ�WKH�DSSOLFDWLRQ�VHUYHU�LVUHVWDUWHG�

��� 7R�G\QDPLFDOO\�FKDQJH�WKH�VHOHFWLRQ�FULWHULD�IRURQH�RU�PRUH�DSSOLFDWLRQ�VHUYHUV�LQ�D�UXQQLQJV\VWHP��FKRRVH�WKH�'\QDPLF�FRQILJXUDW��'\QDPLFFRQILJXUDWLRQ��WDE�

21

22

23

24

25

Page 308: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–10

��� ,Q�WKLV�H[DPSOH��WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRUVRPH�WLPH��LQGLFDWHG�E\�WKH�FXUUHQW�ILOH�VL]HJUHDWHU�WKDQ�]HUR��EHIRUH�EHLQJ�VWRSSHG�EULHIO\�7KH�UHG� �LQ�WKH�6WDW���6WDWXV��FROXPQ�LQGLFDWHVWKDW�WKH�DXGLW�LV�LQDFWLYH�

��� &KRRVH� �

5XQQLQJ�DQ�$XGLW�RQ�D�'LIIHUHQW�8VHU

,Q�WKLV�SURFHGXUH��ZH�UXQ�DQ�DXGLW�RQ�D�GLIIHUHQW�XVHU�DQG�FKHFN�DOO�WKH�UHSRUWV�WKDW�ZHUH�VWDUWHG�

�� 2Q�WKH�)LOWHU�WDE��HQWHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�D�XVHU�,'�LQ�8VHU�QDPHV��IRU�H[DPSOH�

Patricia��

�� 8QGHU�$XGLW�FODVVHV��VHOHFW�5HSRUW�VWDUW�

�� 8QGHU�(YHQWV��VHOHFW�$OO�

�� 8QGHU�)LOWHU����VHOHFW�)LOWHU�DFWLYH�

�� 7R�DFWLYDWH��FKRRVH� �

27

1 2 3

4

5

26

Page 309: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–11

�� &KRRVH�<HV�

�� $�JUHHQ� �DSSHDUV�LQ�WKH�6WDW���6WDWXV��FROXPQDQG�D�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKHFRQILJXUDWLRQ�ZDV�DFWLYDWHG�

$XGLW�,QIRUPDWLRQ�6\VWHP��6(&5�

:KDW

7KH�$XGLW�,QIRUPDWLRQ�6\VWHP��$,6��LV�GHVLJQHG�IRU�V\VWHP�DQG�EXVLQHVV�DXGLWV�DQG�ZLOOOLNHO\�EH�UXQ�E\�LQWHUQDO�RU�H[WHUQDO�DXGLWRUV��,W�SXWV�LQ�RQH�SODFH�PDQ\�RI�WKH�5���VHFXULW\WRROV��7KH�FHQWHU�RI�WKH�$,6�LV�WKH�DXGLW�UHSRUW�WUHH��VWUXFWXUHG�DURXQG�D�UDQJH�RI�DXGLWLQJIXQFWLRQV�DQG�GHIDXOW�FRQILJXUDWLRQV�LQFOXGLQJ�< $XGLWLQJ�SURFHGXUHV�DQG�GRFXPHQWDWLRQ< $XGLWLQJ�HYDOXDWLRQV< 'RZQORDGLQJ�RI�DXGLW�GDWD

$,6�FDQ�EH�HIIHFWLYHO\�SRVLWLRQHG�DV�WKH�6$3�WRRO�IRU�LQWHUQDO�DXGLWLQJ�DQG�GDWD�SURWHFWLRQ�H[WHUQDO�DXGLWLQJ��RQJRLQJ�VHFXULW\�FRQWURO�FKHFNV��LQWHULP�DXGLWV��SUHSDUDWLRQ�RI�\HDU�HQGFORVLQJ�VWDWHPHQWV��\HDU�HQG�DXGLWV��HWF�

$,6�XVHV�VWDQGDUG�5���UHSRUWV�DQG�WUDQVDFWLRQV�WR�FRQGXFW�WKH�UHYLHZ�DQG�LV�D�VWDQGDUGFRPSRQHQW�LQ�5HOHDVH����$��+RZHYHU��\RX�FDQ�LPSRUW�WKH�$,6�LQWR�\RXU�V\VWHP�EDFN�WR5HOHDVH����'�RU�KLJKHU��)RU�PRUH�LQIRUPDWLRQ�RQ�$,6�DQG�LWV�DYDLODELOLW\��SOHDVH�UHIHU�WR

7

6

Page 310: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–12

6$31HW�²�5���)URQWHQG�QRWHV�������DQG���������$,6�DOVR�SURYLGHV�DQ�LQWHUIDFH�WR�H[SRUWGDWD�WR�DQ�H[WHUQDO�DXGLWLQJ�V\VWHP�WKDW�DQDO\]HV�ILQDQFLDO�VWDWHPHQWV�

:K\

$XGLWRUV�H[DPLQH�WKH�UHVXOWV�RI�DXWRPDWHG�DQG�PDQXDO�ILQDQFLDO�DQG�V\VWHP�SURFHGXUHV�WRHQVXUH�WKDW�WKHUH�LV�D�FKHFNV�DQG�EDODQFHV�LQIUDVWUXFWXUH�WR�SUHYHQW�IUDXG�DQG�RWKHUSUREOHPV��$,6�HQDEOHV�WKH�DXGLWRUV�WR�WHVW�WUDQVDFWLRQV�DQG�UXQ�UHSRUWV�GXULQJ�WKHLQVSHFWLRQ�

+RZ

7R�VWDUW�$,6��FDOO�WUDQVDFWLRQ�SECR��7KHUH�DUH�WZR�ZD\V�WR�FRQGXFW�DQ�DXGLW�< &RPSOHWH< 8VHU�GHILQHG

&RPSOHWH�$XGLW

:KLOH�LW�LV�QRW�SRVVLEOH�WR�VKRZ�DOO�WKH�IXQFWLRQDOLW\�RI�WKH�$,6�KHUH��ZH�SURYLGH�WKH�IROORZLQJ�VFHQDULR�RILQYHVWLJDWLRQ�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV�→�6(&5�$XGLW�,QIR�6\VWHP��

�� 8QGHU�&KRRVH�YLHZ��VHOHFW�&RPSOHWH�DXGLW�

�� &KRRVH� �

$�FRPSOHWH�DXGLW�FRQVLVWV�RI�D�V\VWHP�DXGLW�DQGEXVLQHVV�DXGLW��7KH�VWUXFWXUH�RQ�WKLV�VFUHHQ�LV$XGLWB$OO�ZLWK�D�VWDQGDUG�YLHZ�

�� &OLFN�WKH�QRGHV�����WR�H[SDQG�WKH�IROORZLQJ�< 6\VWHP�$XGLW< %XVLQHVV�$XGLW

1

2

3

Page 311: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–13

6\VWHP�$XGLW

7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�$,6�

�� 8QGHU�6\VWHP�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR5HSRVLWRU\���7DEOHV�

�� &OLFN�WKH�QRGH�����QH[W�WR�7DEOH�,QIRUPDWLRQ�

�� &KRRVH� �QH[W�WR�'DWD�'LFWLRQDU\�GLVSOD\�

1

2

3

Page 312: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–14

7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RX�DUH�EURXJKWWR�WKLV�VFUHHQ�

�� &KRRVH� �

%XVLQHVV�$XGLW

�� 8QGHU�%XVLQHVV�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR&ORVLQJ��),�*/��

�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�%DODQFHV�

�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�<RX�FDQ�H[HFXWH�GLIIHUHQW�UHSRUWV�WR�LQVSHFW�WKHILQDQFLDO�EDODQFHV�

�� &KRRVH� �QH[W�WR�3URILW�DQG�/RVV�3URMHFWLRQ� 1

2

3

4

4

Page 313: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–15

�� 2Q�WKLV�VFUHHQ��\RX�FDQ�HQWHU�FULWHULD�IRU�\RXUUHSRUW��WKHQ�FKRRVH� �

�� &KRRVH� �

8VHU�'HILQHG�$XGLW

<RX�FDQ�DOVR�FRQGXFW�D�XVHU�GHILQHG�DXGLW�E\�FUHDWLQJ�D�YLHZ�RU�VXEVHW�RI�D�FRPSOHWH�DXGLW�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV→�6(&5�$XGLW�,QIR�6\VWHP��

�� 6HOHFW�8VHU�GHILQHG�DXGLW�

�� 8QGHU�8VHU�GHILQHG�DXGLW��HQWHU�D�YLHZ�QDPH��IRUH[DPSOH��HQWHU�ZVUE��

�� &KRRVH� �

9LHZ�QDPHV�VKRXOG�VWDUW�ZLWK�<�RU�=�

12

6

3

5

Page 314: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–16

�� 8QGHU�1HZ�YLHZ��LQ�1DPH��HQWHU�WKH�QDPH�RI�WKHYLHZ��IRU�H[DPSOH��ZVUE��

�� 8QGHU�6HOHFW�XVLQJ��VHOHFW�0DQXDO�6HOHFWLRQ�<RX�ZLOO�VHOHFW�WKH�SURFHGXUHV�WKDW�ZLOO�EHLQFOXGHG�LQ�WKH�YLHZ�

�� &KRRVH� �

:KHQ�\RX�FUHDWH�D�YLHZ�DQG�HQWHU�D�GLIIHUHQWQDPH�LQ�1DPH��WKH�QDPH�RI�WKH�YLHZ�LV�ZKDW�ZDVHQWHUHG�LQ�WKH�PDLQ�VFUHHQ�

:H�ZDQW�WR�LQFOXGH�DOO�WKH�SURFHGXUHV�IRU�DV\VWHP�DXGLW�LQ�WKLV�YLHZ�

�� 6HOHFW�6\VWHP�$XGLW�

�� &KRRVH� �

�� 7R�JHQHUDWH��FKRRVH� �

$�PHVVDJH�LQGLFDWHV�WKDW�WKH�JHQHUDWLRQ�ZDVVXFFHVVIXO�

��� &KRRVH� �

6

5

4

9

7

10

8

Page 315: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–17

��� &KRRVH� �'LVSOD\�WR�FKHFN�WKH�YLHZ�RI�WKLVVWUXFWXUH�

��� &OLFN�RQ�WKH�6\VWHP�$XGLW�QRGH�����WR�H[SDQG�LW�

7KH�VFUHHQ�RQ�WKH�ULJKW�VKRZV�DOO�WKH�SURFHGXUHVIRU�WKH�$XGLWB$OO�VWUXFWXUH�ZLWK�D�=98(�YLHZ�

11

12

Page 316: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–18

8VHU�6HFXULW\�$XGLW�-REV

0DQ\�RI�WKH�XVHU�VHFXULW\�DXGLW�MREV�SURJUDPV�DUH�LQFOXGHG�DV�SDUW�RI�WKH�$,6��DV�ZHOO�LQ�WKHVWDQGDUG�5���6\VWHP�

:KDW

7KHUH�DUH�VHYHUDO�SUHGHILQHG�6$3�VHFXULW\�UHSRUWV��LQFOXGLQJ�< 56865��� &KHFN�IRU�GHIDXOW�SDVVZRUG�RQ�XVHU�,'V�6$3 �DQG�'',&

< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�XVHUV�ZKR�DUH�ORFNHG�GXH�WR�LQFRUUHFW�ORJRQ

7KLV�UHSRUW�VKRXOG�EH�VFKHGXOHG�WR�UXQ�HDFK�GD\��MXVW�EHIRUH�PLGQLJKW�< 56865��� /LVWV�XVHUV�ZLWK�LQFRPSOHWH�DGGUHVV�GDWD< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV��ZLWK�WKH�RSWLRQ�WR�VHOHFW�WKH

FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�XVHUV�DQG�VKRZV�FKDQJHV�PDGH�WR�D�XVHU·V

VHFXULW\< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�SURILOHV�DQG�VKRZV�FKDQJHV�PDGH�WR�VHFXULW\

SURILOHV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�DXWKRUL]DWLRQV�DQG�VKRZV�FKDQJHV�PDGH�WR

VHFXULW\�DXWKRUL]DWLRQV

6RPH�RI�WKHVH�UHSRUWV�KDYH�SDUDPHWHU�WDEOHV�WKDW�QHHG�WR�EH�SURSHUO\�PDLQWDLQHG�IRU�EHVWXVH��5HYLHZ�DQG�DQDO\]H�WKHVH�UHSRUWV�EDVHG�RQ�\RXU�NQRZOHGJH�RI�WKH�FRPSDQ\��+RZHYHU�EH�DZDUH�WKDW�VHFXULW\�LVVXHV�PD\�H[LVW��,I�\RX�KDYH�D�VPDOO�FRPSDQ\��WKHVH�LVVXHV�FDQQRW�EHDYRLGHG�EHFDXVH�RQH�SHUVRQ�RIWHQ�PXVW�ZHDU�PDQ\�GLIIHUHQW�KDWV�

:K\

<RXU�H[WHUQDO�DXGLWRUV�PD\�UHTXLUH�VRPH�RI�WKHVH�UHSRUWV�WR�EH�H[HFXWHG�DV�SDUW�RI�WKHDQQXDO�ILQDQFLDO�DXGLW�

+RZ

<RX�FDQ�XVH�RQH�RI�WKH�IROORZLQJ�WUDQVDFWLRQV�RU�PDQQHUV�< 6$����$%$3��([HFXWH�3URJUDP�

7KLV�WUDQVDFWLRQ�RQO\�DOORZV�WKH�SURJUDP�WR�EH�H[HFXWHG�< 6(����7KH�REMHFW�QDYLJDWRU�

< 7KH�8VHU�,QIRUPDWLRQ�6\VWHP�2QO\�WKH�6$���PDQQHU�LV�GHVFULEHG�EHORZ�

Page 317: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–19

6$���²�$%$3��([HFXWH�3URJUDP

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SA38�DQG�FKRRVH�(QWHU�

�� ,Q�3URJUDP��HQWHU�WKH�UHSRUWQDPH�

�� &KRRVH� �

�1RWHV�IRU�6SHFLILF�5HSRUWV

56865�����OLVWV�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV��< 7KHVH�FRPELQDWLRQV�DUH�PDLQWDLQHG�RQ�WDEOH�68.5,�< 'DQJHURXV�FRPELQDWLRQV�LQFOXGH�WKH�IROORZLQJ�WUDQVDFWLRQV�

� 5=����ZLWK�DQ\WKLQJ�� 5=����ZLWK�DQ\WKLQJ�� 6(�� �ZLWK�DQ\WKLQJ�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�

$XGLW�7DVNV��60����67$7��67���

5HYLHZLQJ�9DOLGLW\�RI�1DPHG�8VHUV

:KDW

$OO�XVHUV�ZKR�KDYH�OHIW�WKH�FRPSDQ\�VKRXOG�KDYH�WKHLU�5���DFFHVV�WHUPLQDWHG�LPPHGLDWHO\�%\�ORFNLQJ�RU�GHOHWLQJ�WKHVH�XVHU�,'V��\RX�OLPLW�DFFHVV�WR�RQO\�WKRVH�XVHUV�ZKR�VKRXOG�KDYHDFFHVV�WR�5����3HULRGLF�UHYLHZ�DVVXUHV�WKDW�WKH�WDVN�RI�ORFNLQJ�RU�GHOHWLQJ�KDV�EHHQFRPSOHWHG�

1RWH��,I�WKH�+5�PRGXOH�LV�LPSOHPHQWHG��WKHUH�DUH�PHFKDQLVPV�WKDW�LQWHJUDWH�ZLWK�WKHDXWKRUL]DWLRQ�V\VWHP�WR�KDYH�VXFK�FKDQJHV�LQ�XVHU�DFFHVVHV�RFFXU�DXWRPDWLFDOO\�

:K\

3URSHU�DXGLW�FRQWURO�UHTXLUHV�WKDW�D�XVHU�ZKR�QR�ORQJHU�KDV�D�YDOLG�EXVLQHVV�QHHG�WR�DFFHVV5���VKRXOG�QRW�EH�DOORZHG�WR�GR�VR�

3

2

Page 318: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–20

'HOHWLQJ�RU�ORFNLQJ�WKHVH�XVHU�,'V�DOVR�SUHYHQWV�DQ\RQH�ZKR�KDG�EHHQ�XVLQJ�WKH�WHUPLQDWHGXVHU�,'�IURP�DFFHVVLQJ�WKH�V\VWHP�ZLWK�WKDW�,'�

2QH�RI�WKH�DXGLW�SURFHGXUHV�WKDW�\RXU�H[WHUQDO�DXGLWRUV�ZLOO�XVH�LV�WR�WHVW�ZKHWKHU�D�SHUVRQZKR�GRHV�QRW�QHHG�WR�DFFHVV�5���KDV�D�OLYH�XVHU�,'�

+RZ

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�68���8VHUV��

�� &KRRVH�SRVVLEOH�HQWULHV�

�� 5HYLHZ�WKH�DFWLYH�XVHUV�

9HULI\�WKDW�WKHVH�XVHUV�DUH�LQGHHGYDOLG�XVHUV�

,Q�D�ODUJH�FRPSDQ\��\RX�VKRXOG�GRD�UDQGRP�DXGLW�RQ�DW�OHDVW�WZHQW\XVHUV��7KH�PLQLPXP�QXPEHUVKRXOG�EH�GHWHUPLQHG�E\�\RXUDXGLWRUV�

2

Page 319: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–21

5HYLHZLQJ�3URILOHV�IRU�$FFXUDF\�DQG�3HUPLVVLRQ�&UHHS

:KDW

$�SHUPLVVLRQ�FUHHS�LV�DQ�LQFUHPHQWDO�LQFUHDVH�LQ�SHUPLVVLRQV�JLYHQ�WR�D�XVHU�RYHU�WLPH��,IOHIW�XQFKHFNHG��LQFUHDVHG�SHUPLVVLRQV�PD\�JUDQW�D�XVHU�PRUH�DXWKRULW\�LQ�WKH�V\VWHP�WKDQ�LVUHTXLUHG�RU�LQWHQGHG�

:K\

8VHUV�PD\�KDYH�XQGHVLUDEOH�DXWKRUL]DWLRQ�V��RU�FRPELQDWLRQV�

<RXU�H[WHUQDO�DXGLWRUV�PD\�KDYH�DQ�DXGLW�VWHS�WR�FKHFN�IRU�SHUPLVVLRQ�FUHHS�

+RZ

<RX�FDQ�FRQGXFW�D�VSRW�DXGLW�RI�< ,QGLYLGXDOV

� 5HYLHZ�WKH�VHFXULW\�IRUPV�IRU�D�XVHU��FRPSDUH�WKHVH�IRUPV�WR�WKH�DFWLYLW\�JURXSV�DQGSURILOHV�DVVLJQHG�WR�WKDW�XVHU��DQG�LQYHVWLJDWH�LQFRQVLVWHQFLHV�

� 5HYLHZ�WKH�DFWLYLW\�JURXSV�DQG�SURILOHV�DVVLJQHG�WR�WKH�LQGLYLGXDO�IRU�UHDVRQDEOHQHVV�

� 5HYLHZ�WKH�LQGLYLGXDO�SURILOHV�DVVLJQHG�IRU�FRQWHQW�DQG�FKHFN�WR�VHH�LI�WKH�SURILOH�KDVEHHQ�UHFHQWO\�FKDQJHG�

< 3URILOHV��WUDQVDFWLRQ�68����DQG�DXWKRUL]DWLRQV��WUDQVDFWLRQ�68���&KHFN�WR�VHH�LI�WKH�FKDQJH�GDWH�LV�UHFHQW�

<RX�FDQ�DOVR�H[HFXWH�WKH�IROORZLQJ�DXGLW�UHSRUWV�< 56865�����XVHU�FKDQJHV�< 56865�����SURILOH�FKDQJHV�< 56865�����DXWKRUL]DWLRQ�FKDQJHV�

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�WKHVH�UHSRUWV��VHH�WKH�8VHU�6HFXULW\�$XGLW�VHFWLRQ�RQ�SDJH���²���

6\VWHP�/RJ��60���

7KH�5���6\VWHP�ORJV�DOO�V\VWHP�HUURUV��ZDUQLQJV��SURFHVV�PHVVDJHV�LQ�WKH�V\VWHP�ORJ�6\V/RJ���DQG�XVHU�ORFNV�GXH�WR�IDLOHG�ORJ�RQ�DWWHPSWV�IURP�NQRZQ�XVHUV��7KH�6\V/RJ�ZULWHVWR�WZR�GLIIHUHQW�W\SHV�RI�ORJV�< /RFDO�/RJV< &HQWUDO�/RJV

Page 320: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–22

8VH�WKH�WUDQVDFWLRQ�60���WR�DFFHVV�WKH�V\VWHP�ORJ�RXWSXW�VFUHHQ��:LWK�WKLV�WUDQVDFWLRQ��\RX�FDQ�UHDG�DQ\�RIWKH�PHVVDJHV�WKDW�DUH�FRQWDLQHG�LQ�WKH�V\VWHP�ORJV��<RX�FDQ�PRGLI\�WKH�YLHZ�WR�PHHW�\RXU�QHHGV��$�ZLGHUDQJH�RI�VHOHFWLRQ�FULWHULD�LV�DYDLODEOH�WR�DQDO\]H�WKH�V\VWHP�

7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�V\VWHP�ORJ�IRU�PRQLWRULQJ�VHFXULW\�LVVXHV�VXFK�DV�IDLOHG�ORJRQDWWHPSWV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM21�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV→�$GPLQLVWUDWLRQ�→0RQLWRULQJ�→�6\VWHP�/RJ��

�� 6SHFLI\�WKH�VHOHFWLRQ�FULWHULD�IRU�\RXUV\VWHP�ORJ�DQDO\VLV�UHSRUW��IRUH[DPSOH��)URP�GDWH�WLPH��7R�GDWH�WLPH�8VHU��7UDQVDFWLRQ�FRGH��3URFHVV�3UREOHP�FODVV��HWF�

�� �2SWLRQDO��<RX�PD\�HQWHU�WKHPHVVDJH�QXPEHUV��IRU�H[DPSOH��US-3��IRU�IDLOHG�ORJRQ�DWWHPSWV�IRUORFNHG�XVHUV��DQG�FKRRVH� �8VH�

�� &KRRVH� �WR�GLVSOD\�WKH�V\VWHP�ORJUHSRUW�

�� 2Q�WKH�6\VWHP�ORJ��/RFDO�$QDO\VLVVFUHHQ��\RX�FDQ�YLHZ�WKH�V\VWHP�ORJDQDO\VLV�UHSRUW�DQG�GULOO�GRZQ�HDFKLWHP�IRU�GHWDLO��LI�QHFHVVDU\��

�� &KRRVH� �

6

2

3

4

Page 321: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–23

/RFDO�/RJV

(DFK�5���$SSOLFDWLRQ�6HUYHU�KDV�D�ORFDO�ORJ�WKDW�UHFHLYHV�DOO�WKH�PHVVDJHV�RXWSXW�E\�WKLVVHUYHU��6\V/RJ�UHFRUGV�WKHVH�PHVVDJHV�LQ�D�FLUFXODU�ILOH�RQ�WKH�VHUYHU���7KLV�PHDQV�WKDW�ZKHQWKLV�ORJ�ILOH�UHDFKHV�WKH�PD[LPXP�SHUPLVVLEOH�OHQJWK��6\V/RJ�RYHUZULWHV�LW��VWDUWLQJ�RYHUIURP�WKH�EHJLQQLQJ��

&HQWUDO�/RJV

:H�UHFRPPHQG�WKDW�\RX�DOVR�PDLQWDLQ�D�FHQWUDO�ORJ�ILOH�RQ�D�VHOHFWHG�DSSOLFDWLRQ�VHUYHU�(DFK�LQGLYLGXDO�DSSOLFDWLRQ�VHUYHU�WKHQ�VHQGV�LWV�ORFDO�ORJ�PHVVDJHV�WR�WKLV�VHUYHU��7KHVHUYHU�WKDW�\RX�GHVLJQDWH�WR�PDLQWDLQ�WKH�FHQWUDO�ORJ�FROOHFWV�WKH�PHVVDJHV�IURP�WKH�RWKHUDSSOLFDWLRQ�VHUYHUV�DQG�ZULWHV�WKHVH�PHVVDJHV�WR�WKH�FHQWUDO�ORJ�

7KH�FHQWUDO�ORJ�FRQVLVWV�RI�WZR�ILOHV��WKH�DFWLYH�ILOH�DQG�WKH�ROG�ILOH��WKH�ORFDWLRQ�RI�WKH�DFWLYHILOH�LV�VSHFLILHG�LQ�WKH�UVOJ�FHQWUDO�ILOH SURILOH�SDUDPHWHU��WKH�ORFDWLRQ�RI�WKH�ROG�ILOH�LV�VSHFLILHGLQ�WKH�UVOJ�FHQWUDO�ROGBILOH��

7KH�DFWLYH�ILOH�FRQWDLQV�WKH�FXUUHQW�ORJ��:KHQ�LW�UHDFKHV�WKH�PD[LPXP�VL]H��WKH�V\VWHPZULWHV�WR�WKH�ROG�ORJ�ILOH��PDNHV�WKH�SUHYLRXVO\�DFWLYH�ILOH�WKH�ROG�ILOH��DQG�FUHDWHV�D�QHZDFWLYH�ILOH��7KH�VZLWFK�RFFXUV�ZKHQ�WKH�VL]H�RI�WKH�DFWLYH�ORJ�ILOH�LV�KDOI�WKH�YDOXH�DV�VSHFLILHGLQ�WKH�UVOJ�PD[BGLVNVSDFH�FHQWUDO SDUDPHWHU�

6WDWLVWLF�5HFRUGV�LQ�&&06��67$7�

7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06��SHUIRUPDQFH�DQDO\VLV�WRROV�ZLWKLQ�5��ORJV�DOO�5���DFWLYLWLHV�FDWHJRUL]HG�E\�WUDQVDFWLRQ�DQG�XVHU�LQ�VWDWLVWLFDO�UHFRUGV�WKDW�FDQ�EHXVHIXO�IRU�DXGLW�WUDLO�SXUSRVHV��<RX�FDQ�DFFHVV�WKHVH�UHFRUGV�ZLWK�WKH�WUDQVDFWLRQ�67$7�RUIURP�WKH�6$3�VWDQGDUG�PHQX��7KLV�WUDQVDFWLRQ�SURYLGHV�\RX�ZLWK�WKH�GHWDLOHG�VWDWLVWLFDOUHFRUGV��LQFOXGLQJ�XVHU�VWDWLVWLFV��

Page 322: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–24

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�STAT�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ0RQLWRU�→�3HUIRUPDQFH�→�:RUNORDG→�6WDWLVWLFV�UHFRUGV��

�� 3URYLGH�WKH�GHVLUHG�VHOHFWLRQ�FULWHULD�IRU�H[DPSOH��E\�HQWHULQJ�FULWHULD�IRUXVHU��WUDQVDFWLRQ��SURJUDP��WDVNW\SH��ZRUN�SURFHVV�QXPEHU��VWDUW�WLPH��HWF���

�� &KRRVH� �WR�GLVSOD\�WKH�VWDWLVWLFUHFRUGV�

7KH�:RUNORDG��'LVSOD\�6WDWLVWLFDO5HFRUGV�VFUHHQ�DSSHDUV�

�� 3ODFH�WKH�FXUVRU�LQ�WKH�XVHU�LQIRUPDWLRQ�DQG�GRXEOH�FOLFN�IRUIXUWKHU�GHWDLOHG�LQIRUPDWLRQ�

�� &KRRVH� �

5

2

3

4

Page 323: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–25

67���²�8VHU�3URILOH

7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06���WUDQVDFWLRQ�67���¥�8VHU�3URILOH��FDQ�EH�XVHG�WR�FROOHFWLQIRUPDWLRQ�DERXW�< 7KH�VHUYHUV�DQG�ORJJHG�RQ�XVHUV< 8VHU�DQG�VHUYHUV�LQ�XVH

7KH�XVHU�SURILOH�OLVW�SURYLGHV�\RX�ZLWK�DQ�RYHUYLHZ�RI�WKH�ORJJHG�RQ�XVHUV�DQG�WKHLU�DFFXPXODWHG�UHVSRQVHWLPHV��7KH�GHWDLO�VFUHHQ�VKRZV�WKH�OLVW�RI�XVHUV�WRJHWKHU�ZLWK�WKHLU�GLDORJ�VWHSV�DFWLYLW\�DQG�UHVSRQVH�WLPHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�ST03�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�$GPLQLVWUDWLRQ�→�0RQLWRU�→3HUIRUPDQFH�→�:RUNORDG�→�67���¥$QDO\VLV��

�� &KRRVH�3HUIRUPDQFH�GDWDEDVH�

�� &KRRVH�RQH�RI�WKH�IROORZLQJ�ZKHQWKH�GLDORJ�ER[�DSSHDUV�< 6LQJOH�VWDW��UHFRUGV< 7RGD\·V�ZRUNORDG< /DVW�PLQXWH�ZRUNORDG< /RFDO�DOHUW�PRQLWRU

�� &KRRVH�*RWR�→�8VHU�3URILOH�WR�REWDLQWKH�:RUNORDG��8VHU�3URILOH�5HSRUW�

2

3

Page 324: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–26

�� 7KH�:RUNORDG��8VHU�3URILOH�5HSRUWVFUHHQ�DSSHDUV�

�� 'RXEOH�FOLFN�RQ�WKH�XVHU�QDPH�LQ�WKH8VHU�FROXPQ�WR�REWDLQ�DGGLWLRQDOGHWDLOHG�LQIRUPDWLRQ�UHJDUGLQJ�WKHWUDQVDFWLRQ�DFWLYLW\�E\�XVHU�LQ�D�OLVWIRUPDW�

7KH�GHWDLOHG�WUDQVDFWLRQ�LQIRUPDWLRQDSSHDUV�IRU�WKH�FKRVHQ�XVHU�

�� &KRRVH� �

7

6

Page 325: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–27

/RJJLQJ�RI�6SHFLILF�$FWLYLWLHV

5���ORJV�RWKHU�VSHFLILF�DFWLYLWLHV�LQ�YDULRXV�ORJV��:H�GLVFXVV�WKH�IROORZLQJ�VSHFLILF�ORJVEHORZ�

/RJJLQJ�&KDQJHV�WR�7DEOH�'DWD

:H�UHFRPPHQG�WKDW�\RX�DFWLYDWH�WKH�ORJJLQJ�RI�WDEOH�GDWD�IRU�WKRVH�WDEOHV�WKDW�DUH�FULWLFDO�RUVXVFHSWLEOH�WR�DXGLWV��$JDLQ��\RX�PXVW�H[SOLFLWO\�DFWLYDWH�WKLV�ORJJLQJ��1RWH�WKH�IROORZLQJ�< <RX�PXVW�VWDUW�WKH�5���6\VWHP�ZLWK�WKH�UHF�FOLHQW SURILOH�SDUDPHWHU�VHW��7KLV�SDUDPHWHU

VSHFLILHV�5���ORJV�IRU�DOO�FOLHQWV�RU�RQO\�VSHFLILF�FOLHQWV��:H�UHFRPPHQG�VHWWLQJ�WKLVSDUDPHWHU�WR�ORJ�DOO�FOLHQWV�LQ�\RXU�SURGXFWLYH�V\VWHP�

< 6HW�WKH�/RJ�GDWD�FKDQJHV IODJ�IRU�WKRVH�WDEOHV�WKDW�\RX�ZDQW�WR�KDYH�ORJJHG��,I�ERWK�RIWKHVH�FRQGLWLRQV�DUH�PHW��WKH�GDWDEDVH�ORJV�WDEOH�FKDQJHV�LQ�WKH�WDEOH�'%7$%357��6HWWLQJ�WKH�/RJ�GDWD�FKDQJHV IODJ�RQO\�GRHV�QRW�VXIILFH�LQ�UHFRUGLQJ�WDEOH�FKDQJHV��\RXPXVW�DOVR�VHW�WKH�UHF�FOLHQW SDUDPHWHU���<RX�FDQ�YLHZ�WKHVH�ORJV�ZLWK�WKH�WUDQVDFWLRQ6&8���:LWKLQ�5���5HOHDVH����$�RU�JUHDWHU��\RX�PD\�FDOO�UHSRUW�56973527�IRU�WKHHYDOXDWLRQ�RI�WKH�ERWK�� 7KH�FXVWRPL]LQJ�REMHFW�DQG�WDEOH�ORJ�GDWDEDVH� 5HSRUW�567%+,67�IRU�WDEOH�DQDO\VLV�ZLWK�KLVWRU\

,I�D�VWDQGDUG�GHOLYHUHG�6$3�WDEOH�LV�QRW�VHW�XS�WR�SHUPLW�ORJJLQJ�RI�FKDQJHV�DQG�\RXZLVK�WR�FKDQJH�LW��WKHQ�WKLV�DFWLRQ�LV�FRQVLGHUHG�D�PRGLILFDWLRQ�WR�WKH�5���6\VWHP��7RVHH�LI�D�WDEOH�SHUPLWV�ORJJLQJ�RI�FKDQJHV��JR�WR�WUDQVDFWLRQ�6(���RU�6(���DQG�ORRN�DW�WKHGDWDEDVH�WDEOH·V�WHFKQLFDO�VHWWLQJV��WKLV�LV�D�EXWWRQ�LQVLGH�RI�WKH�VFUHHQ�ZKHUH�WKH�WDEOH�LVGHILQHG��DW�WKH�ILHOG�FDOOHG�/RJ�GDWD�FKDQJHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCU3�DQG�FKRRVH�(QWHU�

�� 6HOHFW�/LVW�RI�FKDQJH�GRFV�

�� &KRRVH� �WR�REWDLQ�WKH�DQDO\VLV�RIWKH�FKDQJH�GRFXPHQWV�OLVW�IRU�ERWKFXVWRPL]LQJ�REMHFWV�DQG�WDEOHV�

2

3

Page 326: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–28

�� 5XQ�WKH�(YDOXDWLRQ�RI�FKDQJH�ORJVSURJUDP��56973527�IRU�WKHHYDOXDWLRQ�RI�ERWK�WKH�FXVWRPL]LQJREMHFW�DQG�WDEOH�ORJ�GDWDEDVH��ZLWKWKH�DSSURSULDWH�VHOHFWLRQ�FULWHULD�

�� &KRRVH� �WR�WKH�GLVSOD\�WKH�UHFRUGV�

7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RXDUH�EURXJKW�WR�WKH�(YDOXDWLRQ�RIFKDQJH�ORJV�VFUHHQ�

�� &KRRVH� �

5

6

Page 327: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Logging Changes to User Master Records, Profiles, and Authorizations

Release 4.6A/B13–29

/RJJLQJ�&KDQJHV�WR�8VHU�0DVWHU�5HFRUGV��3URILOHV��DQG

$XWKRUL]DWLRQV

5���ORJV�FKDQJHV�PDGH�E\�D�XVHU�DGPLQLVWUDWRU�LQ�QRQWUDQVSDUHQW�WDEOHV�LQ�WKH�GDWDEDVH�$FFHVV�WR�WKHVH�WDEOHV�LV�SURWHFWHG�E\�WKH�5���DXWKRUL]DWLRQ�FRQFHSW��2QFH�WKHVH�ORJV�KDYHEHHQ�DUFKLYHG��WKH\�DUH�GHOHWHG��'HSHQGLQJ�RQ�\RXU�UHOHDVH��XVH�HLWKHU�WKH�DXWKRUL]DWLRQLQIRV\VWHP�RU�WUDQVDFWLRQ�68���WR�DFFHVV�WKHVH�ORJV��<RX�FDQ�YLHZ�WKH�IROORZLQJ�FKDQJHV�< &KDQJHV�PDGH�GLUHFWO\�WR�D�XVHU·V�DXWKRUL]DWLRQ

7KHVH�DUH�FKDQJHV�PDGH�WR�WKH�SURILOH�OLVW�LQ�WKH�XVHU·V�PDVWHU�UHFRUG��7KLV�GRHV�QRWLQFOXGH�LQGLUHFW�FKDQJHV�WKDW�RFFXU�ZKHQ�DXWKRUL]DWLRQV�RU�SURILOHV�DUH�FKDQJHG��9LHZWKH�FKDQJH�GRFXPHQWV�IRU�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�WR�FKHFN�WKRVH�FKDQJHV�

< &KDQJHV�WR�WKH�� 8VHU�SDVVZRUG��KDVKHG�UHSUHVHQWDWLRQ�RQO\�� 8VHU�W\SH� 8VHU�JURXS� 9DOLGLW\�SHULRG� $FFRXQW�QXPEHU

< &KDQJHV�PDGH�GLUHFWO\�WR�SURILOHV�RU�DXWKRUL]DWLRQV�

)RU�PRUH�LQIRUPDWLRQ��VHH�%&�8VHUV�DQG�$XWKRUL]DWLRQV�→�&UHDWLQJ�DQG�0DLQWDLQLQJ�8VHU0DVWHU�5HFRUGV�→�'LVSOD\LQJ�&KDQJH�'RFXPHQWV�

Page 328: Authorizations Made Easy

Chapter 13: SAP Security Audit and Logging

Logging Changes to User Master Records, Profiles, and Authorizations

Authorizations Made Easy13–30

Page 329: Authorizations Made Easy

14–1

&KDSWHU���� 8SJUDGH

&RQWHQWV

Before Doing Any Upgrade ..................................................................................14–2

Validation Steps After Upgrading Is Completed................................................14–3

Converting Previously Created SU02 Profiles into Activity Groups ...............14–4

Upgrade from a Release Prior to 3.1x to 4.6 A/B .............................................14–11

Upgrade from Release 3.0F to 4.6 A/B..............................................................14–12

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B..........................................14–14

Upgrade from Releases 4.0x or 4.5x to 4.6 A/B ...............................................14–22

����

Page 330: Authorizations Made Easy

Chapter 14: Upgrade

Before Doing Any Upgrade

Authorizations Made Easy14–2

%HIRUH�'RLQJ�$Q\�8SJUDGH

%HIRUH�GRLQJ�DQ\�XSJUDGH��\RX�VKRXOG�

�� 5HYLHZ�WKH�6$31HW�²�5���)URQWHQG�QRWHV�IRU�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ�WR�:KHQ�VHDUFKLQJ�5���6$31HW�²�5���)URQWHQG�QRWHV��SHUIRUP�VHYHUDO�VHDUFKHV��)RUH[DPSOH��ILUVW�VHDUFK�RQ�WKH�FRPSRQHQW�%&�&&0�86 ��7KHQ�VHDUFK�RQ�WKH�NH\�ZRUGVauthorization��security��DQG�user master�IRU�WKH�UHOHDVH�\RX�DUH�SODQQLQJ�WRZRUN�RQ�

�� 5HYLHZ�UHOHDVH�QRWHV�UHODWHG�WR�DXWKRUL]DWLRQV�IRU�DOO�YHUVLRQV�EHWZHHQ�WKH�YHUVLRQ�\RXDUH�FXUUHQWO\�XVLQJ�DQG�WKH�YHUVLRQ�\RX�ZLOO�EH�LPSOHPHQWLQJ��)RU�H[DPSOH��LI�\RX�DUHXSJUDGLQJ�IURP����+�WR����%��UHDG�WKH�UHOHDVH�QRWHV�IRU�YHUVLRQV����,�����$�����%�����$����%�����$��DQG����%��7R�UHYLHZ�WKH�UHOHDVH�QRWHV��FKRRVH�+HOS�→�5HOHDVH�QRWHV�RQ�\RXUV\VWHP��6HOHFW�WKH�&RPSOHWH�OLVW�5HO������DQG�WKHQ�FKRRVH�WKH�VSHFLILF�UHOHDVH�\RX�ZDQW�WRJHW�LQIRUPDWLRQ�RQ��,Q�WKH�WUHH�VWUXFWXUH�WKDW�DSSHDUV��XVH�WKH�VHDUFK�IXQFWLRQ�DQGSHUIRUP�D�VHDUFK�RQ�WKH�ZRUGV�authorization��checks��DQG�security��$OVR��\RXZLOO�ZDQW�WR�UHDG�WKH�VHFWLRQ�RQ�WKH�WUHH�EHQHDWK�%DVLV�→�&RPSXWHU�&HQWHU�0DQDJHPHQW6\VWHP�→�8VHUV�DQG�$XWKRUL]DWLRQV��5HYLHZ�WKH�UHOHDVH�QRWHV�EHFDXVH�WKH\�WHOO�\RX�ZKDWQHZ�IXQFWLRQDOLW\�LV�QRZ�DYDLODEOH��DV�ZHOO�DV�FKDQJHV�WR�H[LVWLQJ�IXQFWLRQDOLW\�WKDW�\RXPD\�QHHG�WR�FRQVLGHU�LQ�WKH�QHZ�XSJUDGHG�HQYLURQPHQW�

%H�DZDUH�WKDW�WKH�DERYH�PHQWLRQHG�UHOHDVH�QRWHV�RQO\�WHOO�\RX�ZKDW�LV�QHZ�IRU�WKH�WRROLWVHOI��,W�GRHV�QRW�WHOO�\RX�DERXW�QHZ�DXWKRUL]DWLRQV�DQG�WKH�SXUSRVH�RI�QHZDXWKRUL]DWLRQV�LQ�DSSOLFDWLRQV��)RU�LQIRUPDWLRQ�DERXW�QHZ�DXWKRUL]DWLRQ�IXQFWLRQDOLW\DYDLODEOH�ZLWKLQ�D�SDUWLFXODU�DSSOLFDWLRQ��\RX�PXVW�UHDG�WKH�UHOHDVH�QRWHV�IRU�WKDWSDUWLFXODU�DSSOLFDWLRQ�

�� 'HYLVH�D�EDFNXS�DQG�GLVDVWHU�UHFRYHU\�SODQ�IRU�DXWKRUL]DWLRQV��%H�UHDOLVWLF��,I�\RX�KDYHGRQH�H[WHQVLYH�PRGLILFDWLRQV�RU�FKDQJHV�WR�VWDQGDUG�6$3�5���ORJLF��WKHVH�FKDQJHV�PD\FDXVH�SUREOHPV�DIWHU�WKH�XSJUDGH��<RX�PD\�ZDQW�WR�FUHDWH�D�WHPSRUDU\�JURXS�RI�DFWLYLW\JURXSV�WKDW�FDQ�EH�XVHG�LQ�WKH�LQWHULP�VR�RSHUDWLRQV�FDQ�FRQWLQXH��'LVFXVV�\RXU�EDFNXSSODQ�ZLWK�WKH�SURMHFW�PDQDJHPHQW�RU�V\VWHP�DGPLQLVWUDWRUV��$�JRRG�LGHD�LV�WR�FUHDWHWKHVH�WHPSRUDU\�DFWLYLW\�JURXSV�LPPHGLDWHO\�ZKHQ�\RX�JHW�DFFHVV�WR�WKH�QHZ�V\VWHP�

�� 0DNH�FHUWDLQ�WKDW�WKH�%DVLV�WHDP�UHFRJQL]HV�DQG�DSSURSULDWHO\�DOORFDWHV�LQ�WKH�XSJUDGHWLPHOLQH�WKDW�WKH�DXWKRUL]DWLRQ�SHUVRQ�LV�DQ�LQWHJUDO�SDUW�RI�WKH�XSJUDGH�SURFHGXUH��DQGWKDW�WKH�XSJUDGH��IURP�D�WHFKQLFDO�SHUVSHFWLYH��LV�QRW�FRPSOHWH�XQWLO�WKH�DXWKRUL]DWLRQVSRUWLRQ�LV�DOVR�FRPSOHWH�

�� ,I�\RX�KDYH�PDGH�DQ\�FKDQJHV�ZLWK�68����WKHQ�LW�LV�KLJKO\�DGYLVDEOH�WKDW�\RX�GRZQORDGWR�D�ORFDO�ILOH��DQG�VDYH�RXWVLGH�RI�WKH�5���6\VWHP��WKH�FRQWHQWV�RI�WKH�WZR�WDEOHV862%7B&�DQG�862%;B&�IURP�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ��7KHVH�WDEOHV�PD\�EHQHHGHG�LQ�WKH�HYHQW�WKDW�D�GLVDVWHU�UHFRYHU\�QHHGV�WR�EH�SHUIRUPHG�

Page 331: Authorizations Made Easy

Chapter 14: Upgrade

Validation Steps After Upgrading Is Completed

Release 4.6 A/B14–3

,Q�WKLV�FKDSWHU��ZH�VKRZ�\RX�WKH�VWHSV�UHTXLUHG�DIWHU�DQ�5���6\VWHP�XSJUDGH��7KLVLQIRUPDWLRQ�LV�DGYDQWDJHRXV�LPPHGLDWHO\�DIWHU�\RXU�XSJUDGH��%H�VXUH�WR�UHDG�WKLV�FKDSWHUEHIRUH�FRQWLQXLQJ�\RXU�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU��3*��LQ�D�QHZ�UHOHDVH�

7KH�VSHFLILF�VWHSV�LQYROYHG�DIWHU�WKH�XSJUDGH�GHSHQG�RQ�WKH�VRXUFH�DQG�WDUJHW�UHOHDVH�\RXDUH�FRPLQJ�IURP�

9DOLGDWLRQ�6WHSV�$IWHU�8SJUDGLQJ�,V�&RPSOHWHG

�� ,QVWDOO�DGG�RQ�FRPSRQHQWV�WR�WKH�XSJUDGHG�V\VWHP��LI�DQ\��DORQJ�ZLWK�ZKDWHYHUDXWKRUL]DWLRQV�FRPH�ZLWK�WKDW�DGG�RQ�FRPSRQHQW��IRU�H[DPSOH�GHGXFWLRQ�PDQDJHPHQWFRPSRQHQWV��$XGLW�,QIRUPDWLRQ�V\VWHP��

�� 8SJUDGH�WKH�UHSRUW�WUHH�PLJUDWLRQ�

7KH�GDWD�VWUXFWXUH�RI�WKH�UHSRUW�WUHHV�FKDQJHV��7R�FRQWLQXH�XVLQJ�\RXU�VHOI�FUHDWHG�UHSRUWWUHHV��WKH\�PXVW�EH�DGMXVWHG�WR�WKH�FKDQJHG�GDWD�VWUXFWXUHV��7KH�6$3�SURYLGHG�UHSRUWWUHHV�JHQHUDWH�LQWR�DUHD�PHQXV�DXWRPDWLFDOO\��7KH�PLJUDWLRQ�LV�SHUIRUPHG�XVLQJ�WKHWUDQVDFWLRQ�5775((B0,*5$7,21��7KH�WUDQVDFWLRQ�LV�H[HFXWHG�LQ�WKH�FOLHQW�FRQWDLQLQJWKH�SURGXFWLRQ�YHUVLRQV�RI�WKH�UHSRUW�WUHHV��'XULQJ�WKH�PLJUDWLRQ��WUDQVDFWLRQ�FRGHV�DUHDXWRPDWLFDOO\�DVVLJQHG�IRU�DOO�UHSRUWV�LQ�D�WUHH��7KLV�PDNHV�LW�SRVVLEOH�WR�DGG�UHSRUWV�WRWKH�XVHU�PHQX�LQ�DFWLYLW\�JURXS�PDLQWHQDQFH��,I�\RX�ZDQW�WR�FUHDWH�WUDQVDFWLRQ�FRGHVZLWK�D�FRPSDQ\�VSHFLILF�SUHIL[��\RX�FDQ�VHW�WKLV�E\�JRLQJ�WR�WKH�6$3�5HIHUHQFH�,0*�DQGFKRRVLQJ�%DVLV�&RPSRQHQWV�→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUV�DQG�$XWKRUL]DWLRQV�→�6HWQDPHVSDFH�IRU�UHSRUW�WUHH�PLJUDWLRQ�DQG�VSHFLILF�,0*�DFWLYLWLHV�

�� 9DOLGDWH�WKH�XVHU�PDVWHU�UHFRUGV�IRU�QHZ�ILHOGV�ZLWK�QHZ�YDOXHV��LI�QHHGHG��68����

�� (QVXUH�WKDW�WKH�3*�DQG�RWKHU�V\VWHP�SDUDPHWHUV�DUH�VHOHFWHG�DV�UHTXLUHG��VHH�FKDSWHU���6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU��

�� 8SJUDGH�WKH�DFWLYLW\�JURXSV�ZLWK�WUDQVDFWLRQ�68���DQG�SHUIRUP�VWHSV��$�WR��'�

�� 8VH�XVHU�PDVWHU�UHFRQFLOLDWLRQ��WUDQVDFWLRQ�3)8'���LI�QHHGHG

0DNH�FHUWDLQ�WKDW�\RXU�UHSRUW�WUHHV�KDYH�XSJUDGHG�SURSHUO\��,I�XSJUDGLQJ�IURP�5HOHDVH����[RU�EHORZ�WR������VRPH�FRUH�FKDQJHV�KDYH�EHHQ�PDGH�WR�WKH�IXQFWLRQDOLW\�DQG�SUHVHQWDWLRQ�RIUHSRUW�WUHHV�

,I�XSJUDGLQJ�IURP����[�RU�EHORZ�WR������EH�DZDUH�WKDW�WKHUH�\RX�DUH�QRZ�LQYROYHG�LQ�DV\VWHP�WKDW�KDV�D�ORW�PRUH�IXQFWLRQDOLW\�WR�GHDO�ZLWK�WKH�ZRUOG�´RXWVLGHµ�RI�5����7KHVH�FDOOVWKDW�ZRUN�RXWVLGH�RI�5���DUH�FRPPRQO\�KDQGOHG�WKURXJK�YHU\�VSHFLDO�W\SHV�RI�IXQFWLRQPRGXOH��$�IXQFWLRQ�PRGXOH�EHORQJV�WR�D�IXQFWLRQ�JURXS��7KH�6B5)&�DXWKRUL]DWLRQ�REMHFW�LVFULWLFDO�LQ�V\VWHPV�PRUH�UHFHQW�WKDQ����[��7KLV�DXWKRUL]DWLRQ�REMHFW�PD\�EH�WRWDOO\�´VKXW�RIIµYLD�D�563$5$0�SDUDPHWHU�YDOXH��EXW�ZH�GR�QRW�VXJJHVW�VKXWWLQJ�LW�RII��$V�VXFK��\RX�ZLOOQHHG�WR�GHDO�ZLWK�6B5)&�DIWHU�WKH�XSJUDGH�

)LUVW�XSJUDGH�\RXU�'(9�V\VWHP��3HUIRUP�DOO�WKH�VWHSV�LQ�'(9��'HWHUPLQH�ZKDW�LV�DQG�ZKDWLV�QRW�WUDQVSRUWDEOH�WR�WKH�4$6�V\VWHP�DQG�35'�V\VWHP��$OPRVW�QRWKLQJ�QHHGV�WR�EH�GRQHGLUHFWO\�LQ�35'�DV�\RX�VKRXOG�EH�DEOH�WR�WUDQVSRUW�DOPRVW�HYHU\WKLQJ�IURP�'(9��1R�RQHVKRXOG�HYHU�DWWHPSW�WR�XSGDWH�DXWKRUL]DWLRQV�LQ�VROHO\�35'�

Page 332: Authorizations Made Easy

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–4

7KH�XVHU�PDVWHU�UHFRUG�KDV�UHPDLQHG�UHODWLYHO\�WKH�VDPH�WKURXJKRXW�WKH�UHOHDVHV��+RZHYHU�WKHUH�DUH�WZR�WKLQJV�WKDW�VKRXOG�EH�QRWHG�LQ�WUDQVDFWLRQ�68���< 2Q�WKH�'HIDXOWV�WDE��WKHUH�DUH�WZR�QHZ�ILHOGV�

� 3HUVRQDO�WLPH�]RQH�²�7KLV�ILHOG�VKRXOG�EH�ILOOHG�LQ�DIWHU�WKH�XSJUDGH��$�VPDOOFRQYHUVLRQ�SURJUDP�FDQ�EH�ZULWWHQ�WR�ILOO�WKLV�ILHOG�

� 'DWH�IRUPDW�²�7KLV�QHZ�ILHOG�SHUPLWV�\RX�WR�XVH�WKH�GDWH�IRUPDW�<<<<�00�''��EHDZDUH�WKDW�VRPH�SODFHV�LQ�5���KDYH�QRW�EHHQ�FRGHG�\HW�WR�UHFRJQL]H�WKLV�QHZIRUPDW��

< 2Q�WKH�$GGUHVV�WDE��WKHUH�LV�DGGUHVV�LQIRUPDWLRQ�DERXW�WKH�XVHU��7KLV�DGGUHVVLQIRUPDWLRQ�LV�OLQNHG�WR�WKH�����LQWURGXFHG�IXQFWLRQDOLW\�IRU�WKH�FHQWUDO�DGGUHVVPDQDJHPHQW�FRPSRQHQW�RI�5���

&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\

*URXSV

&UHDWLQJ�DQ�$FWLYLW\�*URXS�IURP�0DQXDOO\�0DLQWDLQHG�3URILOHV

,I�\RX�FUHDWHG�SURILOHV�PDQXDOO\�XVLQJ�WUDQVDFWLRQ�68����\RX�FDQ�FUHDWH�DQ�DFWLYLW\�JURXS�IURP�WKHVHSURILOHV��7KH�SURILOHV�FDQ�EH�VLQJOH��DV�ZHOO�DV�FRPSRVLWH��8VH�WUDQVDFWLRQ�68����8SJUDGH�DQG�ILUVWLQVWDOODWLRQ��

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�

2

Page 333: Authorizations Made Easy

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–5

�� 5HDG�WKH�,PSRUWDQW�LQIRUPDWLRQZLQGRZ�

�� &KRRVH� �

7KH�V\VWHP�SURSRVHV�DOO�WKH�PDQXDOO\FUHDWHG�SURILOHV�

�� 6HOHFW�WKH�SURILOH�\RX�ZDQW�WRFRQYHUW�WR�DQ�DFWLYLW\�JURXS��IRUH[DPSOH��1$)�3*�����

�� &KRRVH� �2SWLPL]HG�

6HH�WKH�GRFXPHQWDWLRQ�IURP�WKH,PSRUWDQW�LQIRUPDWLRQ�ZLQGRZ�DERYH�IRUWKH�EHQHILWV�RI�WKLV�RSWLRQ�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�XVH� �,GHQWLFDO�WR�SURILOH�LI�\RX�ZRXOG�OLNH�WR�KDYH�WKHDXWKRUL]DWLRQV�GDWD�FRQYHUWHG�LGHQWLFDOO\�LQ�WKH�DFWLYLW\�JURXS��7KH�0HQX�WDE�ZRXOGUHPDLQ�HPSW\�WKRXJK��7KH�0HQX�WDE�DOVR�UHPDLQV�HPSW\�LI�\RX�FKRRVH� �2SWLPL]HG�XQOHVV�\RX�KDYH�GLVFUHWH�YDOXHV�IRU�6B7&2'(�LQ�\RXU�SURILOH��*HQHULF�YDOXHV�VXFK�DV�6( RU�UDQJHV�IURP�6¥3�DUH�LJQRUHG�

�� &KRRVH�<HV�

4

5

6

7

Tip

Page 334: Authorizations Made Easy

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–6

7KH�/LVW�RI�DFWLYLW\�JURXS�FUHDWHGVFUHHQ�DSSHDUV�

�� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS�

7KH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQDSSHDUV��7R�PDLQWDLQ�WKH�DFWLYLW\JURXS��SHUIRUP�WKH�IROORZLQJ�VWHSV�

�� ,Q�'HVFULSWLRQ��WKH�GHVFULSWLRQ�WKDWH[LVWHG�IRU�WKH�68���FUHDWHG�SURILOHZLOO�GHIDXOW�LQWR�WKLV�ILHOG�

$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�68���FUHDWHG�ORQJ�GHVFULSWLRQ�WH[W�ZDV�QRWFRSLHG�LQWR�WKH�QHZO\�FUHDWHGDFWLYLW\�JURXS�

��� 2Q�WKH�'HVFULSWLRQ�WDE��SURYLGH�DGHWDLOHG�GHVFULSWLRQ�XQGHU�$FWLYLW\JURXS�GHVFULSWLRQ�

8

9

10

Page 335: Authorizations Made Easy

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–7

2Q�WKH�0HQX�WDE��\RX�FDQ�DGG�RWKHUWUDQVDFWLRQV��RU�ZHE�DGGUHVVHV��,I�LQ�WKHPDQXDOO\�FUHDWHG�SURILOH�\RX�KDG�DYDOXH�LQ�WKH�DXWKRUL]DWLRQ�REMHFW6B7&2'(��WKH�V\VWHP�FUHDWHV�D�PHQX�7KLV�PHQX�ZLOO�EH�WKH�ODXQFK�SDG�IRU�WKHXVHU�IRU�WKH�(DV\�$FFHVV�PHQX�

��� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

11

Page 336: Authorizations Made Easy

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–8

��� 5HYLHZ�DOO�WUDIILF�OLJKWV�WKDW�DUH�QRWJUHHQ�DQG�FOLFN�RQ� �WR�SODFH�YDOXHVLQ�WKH�ILHOG��RU�FOLFN�RQ�WKH�DVWHULVN�WRDOORZ�DOO�YDOXHV�LQ�WKLV�ILHOG��

:KHQ�DOO�YDOXHV�DUH�FRPSOHWH��WKHWUDIILF�OLJKWV�WXUQ�JUHHQ�

��� &KRRVH� �

��� 7R�FUHDWH�WKH�SURILOH��FKRRVH� �

��� &KRRVH� �

��� 2Q�WKH�8VHU�WDE��FKRRVH�8VHU�FRPSDUH��&RPSDUH�WKH�XVHU

PDVWHU�UHFRUG�WR�WUDQVIHU�WKHJHQHUDWHG�SURILOH�YDOXHV�WR�WKH�XVHUPDVWHU��7KLV�UHFRUG�PD\�GLIIHU�IURPWKH�RULJLQDO��GHSHQGLQJ�RQ�WKHDGMXVWPHQWV�WKDW�ZHUH�PDGH�

,I�D�XVHU�ZDV�DVVLJQHG�WR�D�SURILOH��WKHQWKH�XVHU�LV�DXWRPDWLFDOO\�DVVLJQHG�WR�WKHMXVW�FUHDWHG�DFWLYLW\�JURXS�

13

14

15

12

16

Tip

Page 337: Authorizations Made Easy

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–9

5HPRYLQJ�8VHU�$VVLJQPHQWV�IURP�WKH�2ULJLQDO�68���3URILOH

<RX�FDQ�UHPRYH�WKH�XVHU�DVVLJQPHQW�IURP�D�SURILOH�ZLWK�68���RU�68����,Q�WKH�IROORZLQJ��SURFHGXUH��ZHGHPRQVWUDWH�KRZ�WR�UHPRYH�D�XVHU�DVVLJQPHQW�IURP�D�SURILOH�WKDW�KDV�EHHQ�FUHDWHG�ZLWKRXW�WKH�3*�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�

�� 7R�FRQWLQXH��FKRRVH� �

2

3

Page 338: Authorizations Made Easy

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–10

$�OLVW�ZLWK�DOO�DFWLYH�SURILOH�DSSHDUV�

�� 6HOHFW�WKH�SURILOH�V��IURP�ZKLFK�\RXZRXOG�OLNH�WR�UHPRYH�WKH�XVHUDVVLJQPHQW��IRU�H[DPSOH��1$)B�����

�� 7R�GHOHWH�WKH�DVVLJQPHQW��FKRRVH�8VHU�DVVLJQPHQWV�

�� &KRRVH�<HV�

�� 7KH�V\VWHP�UHWXUQV�WKH�DIIHFWHGXVHUV�DQG�UHPRYHG�SURILOHV�WKDWZHUH�UHPRYHG�IURP�WKH�XVHU�PDVWHUUHFRUGV�

,I�QR�XVHUV�ZHUH�DVVLJQHG��\RXUHFHLYH�QR�PHVVDJH�

�� <RX�FDQ�QRZ�FKHFN�WKH�VHOHFWHG�XVHUPDVWHU�UHFRUG�WR�VHH�WKDW�WKHDVVLJQPHQWV�WR�WKH�PDQXDOO\�FUHDWHGSURILOHV�ZHUH�UHPRYHG�

�� &KRRVH� �WR�UHWXUQ�

4

5

6

7

9

Page 339: Authorizations Made Easy

Chapter 14: Upgrade

Upgrading from a Release Prior to 3.1x to 4.6 A/B

Release 4.6 A/B14–11

8SJUDGLQJ�IURP�D�5HOHDVH�3ULRU�WR����[�WR�����$�%

5HDG�FKDSWHU����6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�DQG�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�LI�< <RX�DUH�XSJUDGLQJ�IURP�D�UHOHDVH�SULRU�WR����*< ,Q�WKH�UHOHDVH�SULRU�WR����*��\RX�FRXOG�QRW�RU�GLG�QRW�XVH�WKH�3*< <RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*�QRZ

<RX�IDFH�WZR�PDLQ�TXHVWLRQV�< 'R�\RX�FRQYHUW�WKH�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���LQWR

SURILOHV�WKDW�FDQ�EH�PDLQWDLQHG�E\�WKH�3*"< 'R�\RX�UH�FUHDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IURP�VFUDWFK�XVLQJ�WKH�3*"

7KH�IROORZLQJ�VHFWLRQV�SURYLGH�VRPH�KLQWV�WR�DQVZHULQJ�WKHVH�TXHVWLRQV�

&RQYHUWLQJ�([LVWLQJ�$XWKRUL]DWLRQ�3URILOHV�IRU�WKH�3URILOH�*HQHUDWRU

)LUVW��FUHDWH�DQG�VDYH�D�QHZ�DFWLYLW\�JURXS�IRU�HDFK�MRE��5DWKHU�WKDQ�VHOHFWLQJ�EXVLQHVVWUDQVDFWLRQV�IURP�WKH�FRPSDQ\�PHQX�WUHH��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�LQ�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ��7KHQ�IROORZ�WKH�VWHSV�GHVFULEHG�LQ�FKDSWHU����,QVHUWLQJ�$XWKRUL]DWLRQVIURP�D�3URILOH�

7KH�DGYDQWDJH�WR�WKLV�PHWKRG�LV�WKDW�\RX�FDQ�ZRUN�ZLWK�H[LVWLQJ��ZHOO�WHVWHG�SURILOHV��,IREMHFW�6B7&2'(�GRHV�QRW�KDYH�DQ�DXWKRUL]DWLRQ��PDQXDOO\�LQVHUW�RQH��0DLQWDLQ�WKHSHUPLWWHG�WUDQVDFWLRQ�IRU�HDFK�DFWLYLW\�JURXS�DV�DXWKRUL]DWLRQ�YDOXHV�IRU�REMHFW�6B7&2'(�LQWKH�SURILOH�\RX�ZLOO�JHQHUDWH�IRU�WKLV�DFWLYLW\�JURXS��<RX�FDQ��RI�FRXUVH��PDLQWDLQ�DQ�DVWHULVN� ���EXW�WKLV�LV�D�GLVDGYDQWDJH��EHFDXVH�XVHUV�ZRXOG�UHFHLYH�PRUH�DFFHVV�WKDQ�\RX�ZDQW�WRJLYH�WKHP��7KH�RWKHU�GLVDGYDQWDJH�LV�WKDW�VLQFH�WKH�XVHU�VSHFLILF�PHQX�LV�PLVVLQJ��\RXFDQQRW�UH�FUHDWH�WKH�LQIRUPDWLRQ�VDYHG�LQ�DQ�DFWLYLW\�JURXS��<RX�PD\�FRQYHUW�\RXU�ROGSURILOHV�DQG�ZRUN�ZLWK�WKHP�XQWLO�\RX�QHHG�WR�UH�FUHDWH�DQG�GHOHWH�WKHP�

6HH�DOVR�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\�*URXSV�RQ�SDJH���²��

5H�FUHDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�IURP�6FUDWFK�8VLQJ�WKH�3URILOH*HQHUDWRU

)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU���8VHU�5ROH�7HPSODWHV��FKDSWHU���$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\��DQG�FKDSWHU���0LVVLQJ�$XWKRUL]DWLRQV�

Page 340: Authorizations Made Easy

Chapter 14: Upgrade

Upgrading from Release 3.0F to 4.6 A/B

Authorizations Made Easy14–12

8SJUDGLQJ�IURP�5HOHDVH����)�WR�����$�%

$Q�XSJUDGH�IURP�5HOHDVH����)�WR����$�LV�QRW�SRVVLEOH�LI�\RX�XVH�5���+5�6XSSRUW3DFNDJHV��)XUWKHU�LQIRUPDWLRQ�LV�DYDLODEOH�LQ�6$31HW���5���)URQWHQG�QRWH��������

$IWHU�\RXU�����XSJUDGH��LI�\RX�FUHDWH�DFWLYLW\�JURXSV�DQG�JHQHUDWH�SURILOHV�LQ�5HOHDVH����)ZLWK�WKH�SUHOLPLQDU\�YHUVLRQ�RI�WKH�3*��WKHQ�

�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�

)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH3DUDPHWHU��,I�WKH�SDUDPHWHU�LV�LQDFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG�

7KH�3*�LV�DOUHDG\�DFWLYH�LQ�5HOHDVH�����WKRXJK�

$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJHE\�UHIHUULQJ�WR�FKDSWHU����WKH�VHFWLRQ�$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�

�� %HFDXVH�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�ZHUH�QRW�D�SDUW�RI�WKH�5HOHDVH����)YHUVLRQ�RI�WKH�3*��FRS\�WKH�6$3�GHIDXOWV�LQ�WKHVH�FXVWRPHU�WDEOHV�

7R�FRS\�WKHVH�GHIDXOWV��UXQ�WUDQVDFWLRQ�68���DQG�SHUIRUP�WKH�VWHSV�LQ�FKDSWHU����WKHVHFWLRQ�/RDGLQJ�WKH�862%;B&�DQG�862%7B&�7DEOHV��,Q�WUDQVDFWLRQ�68����SHUIRUP�WKH�ILUVWVWHS�FDOOHG�,QLWLDOO\�ILOO�WKH�FXVWRPHU�WDEOHV�

$OVR�UHDG�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�WR�OHDUQ�PRUHDERXW�WKH�QHZ�IXQFWLRQDOLW\��7KHQ�GHFLGH�ZKHWKHU�\RX�QHHG�WR�SHUIRUP�DGGLWLRQDO�VWHSVRQ�WKH�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKH�WUDQVDFWLRQV�\RX�DUH�XVLQJ�

�� $IWHU�WKH�XSJUDGH�WR�5HOHDVH����[��D�SURILOH�PDWFKXS�LV�UHTXLUHG�IRU�DOO�SURILOHV�JHQHUDWHGLQ�5HOHDVH����)��$IWHU�WKH�XSJUDGH��WKH�3*�GRHV�QRW�DXWRPDWLFDOO\�LQIRUP�\RX�WKDW�DFRPSDULVRQ�LV�QHFHVVDU\�IRU�WKHVH�SURILOHV��LQ�WUDQVDFWLRQ�3)&*��WKH�OLJKW�RQ�WKH$XWKRUL]DWLRQV�WDE�UHPDLQV�JUHHQ�IRU�WKH�SURILOHV�FUHDWHG�LQ�5HOHDVH����)��DQG�WUDQVDFWLRQ683&�GRHV�QRW�LQGLFDWH�ZKHWKHU�D�PDWFKXS�LV�DFWXDOO\�UHTXLUHG���1HYHUWKHOHVV��WKH�6$3GHIDXOW�GDWD�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�WKH�QHZ�UHOHDVH�KDV�EHHQ�LPSURYHG�VR�WKDW�D�SURILOH�PDWFKXS�LV�HVVHQWLDO�WR�HQVXUH�SURSHU�ZRUNLQJ�SURILOHV�DIWHU�WKHXSJUDGH�

Page 341: Authorizations Made Easy

Chapter 14: Upgrade

Upgrading from Release 3.0F to 4.6 A/B

Release 4.6 A/B14–13

7R�SHUIRUP�D�SURILOH�PDWFKXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�DQ�DFWLYLW\�JURXS�FUHDWHG�LQ5HOHDVH������<RX�FDQ�RQO\�VHOHFWRQH�DFWLYLW\�JURXS�DW�D�WLPH��VHHWKH�IROORZLQJ�7LSV��7ULFNV��

7KLV�SURFHGXUH�KDV�WR�EH�SHUIRUPHGIRU�HDFK�DFWLYLW\�JURXS�VHSDUDWHO\��7RVSHHG�XS�WKH�SURFHVV��XVH�WUDQVDFWLRQ683&�ZKHUH�\RX�JHW�D�OLVW�RI�DOODFWLYLW\�JURXSV��6HOHFW�WKH�DFWLYLW\JURXS�WKDW�QHHGV�WR�EH�PDLQWDLQHG�E\GRXEOH�FOLFNLQJ�RQ�LW�

�� &KRRVH� &KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �([SHUW�PRGH�IRU�SURILOHJHQHUDWLRQ�

3

4

5

Page 342: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–14

�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�DV�WKH�FRUUHFWPDLQWHQDQFH�W\SH�

�� &KRRVH� �DQG�SRVWPDLQWDLQ�DQ\RSHQ�DXWKRUL]DWLRQ�ILHOGV�RQ�WKHQH[W�VFUHHQ��LI�UHTXLUHG�

'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWV�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�5HOHDVH����[��WKH�3*�PD\FUHDWH�VRPH�QHZ�DXWKRUL]DWLRQV��,I�\RX�VHH�QHZ�DXWKRUL]DWLRQV�FUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��GHDFWLYDWH�RU�GHOHWH�WKHP�

7KH�V\VWHP�LQFOXGHV�WKH�QHZ�UHTXLUHG�DXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�RQHV��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO�EXW�RIIHUV�LPSURYHG�V\VWHP�SHUIRUPDQFH��7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�DIWHU�0DNLQJ�&KDQJHV�

�� $IWHU�UHJHQHUDWLQJ�DOO�WKH�SURILOHV��\RX�KDYH�FRPSOHWHG�WKH�XSJUDGH�VWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�5HOHDVH����)�

1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG�IRU�SURILOHV�DOUHDG\�DVVLJQHG�WR�XVHUV��EXW�UHPHPEHU�WKDWFKDQJHV�EHFRPH�DFWLYH�ZLWK�WKH�QH[W�V\VWHP�ORJRQ�

8SJUDGH�IURP�5HOHDVHV����*�����+�����,�WR�����$�%

$IWHU�FUHDWLQJ�DFWLYLW\�JURXSV�DQG�JHQHUDWLQJ�SURILOHV�LQ�5HOHDVHV����*�����+�����,�����$�RU����%�����[�ZLWKWKH�3*��ZKHQ�\RX�XSJUDGH�WR�5HOHDVH����[�

�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�

7R�GR�VR��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU�,I�WKH�SDUDPHWHU�LV�QRW�DFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG��7KH�3*�LV�VHW�WR�DFWLYH�LQ�5HOHDVH�����

$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJH�E\�UHIHUULQJ�WRFKDSWHU����$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

6

7

Page 343: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–15

�� &KRRVH�VWHS��$��3UHSDUDWLRQ�&RPSDUH�ZLWK�6$3�YDOXHV��7KLV�VWHSLV�XVHG�WR�SUHSDUH�IRU�VWHSV��%�DQG�&�

�� &KRRVH .

7KLV�VWHS�PLJKW�WDNH�VHYHUDOPLQXWHV.

3

4

Page 344: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–16

�� &KRRVH��%��&RPSDUH�WUDQVDFWLRQV�

�� &KRRVH� �

7KH�XSJUDGH�UHSRUW�\RX�VWDUWHG�LQVWHS��$��XSGDWHV�FXVWRPHU�WDEOHV862%;B&�DQG�862%7B&��EXW�GRHVQRW�RYHUZULWH�WKH�HQWULHV�\RXFKDQJHG�LQ�UHOHDVHV�EHIRUH����[�

,I�\RX�KDYH�QRW�FKDQJHG�FKHFNLQGLFDWRUV�DQG�ILHOG�YDOXHV�ZLWKWUDQVDFWLRQ�68���LQ�UHOHDVHV�EHIRUH���[��\RX�ZLOO�VHH�WKH�IROORZLQJVWDWXV�PHVVDJH�

<RX�GR�QRW�QHHG�WR�PDLQWDLQ�WKHWUDQVDFWLRQ�

5

6

Page 345: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–17

�� ,I�\RX�PDGH�FKDQJHV��WKHVH�FKDQJHVZLOO�VWLOO�EH�DFWLYH�DIWHU�WKHXSJUDGH��7KH�RXWSXW�ZLOO�EH�D�OLVWRI�DIIHFWHG�WUDQVDFWLRQV��LQ�RXU�FDVHLW�LV�0.����

�� ,Q�WKH�RXWSXW�OLVW�RI�WUDQVDFWLRQV�\RX�FDQ�VHH�WKH�6WDWXV�ZKLFK�VKRZVZKHWKHU�D�WUDQVDFWLRQ�KDV�DOUHDG\EHHQ�FKHFNHG�

�� 6HOHFW�D�WUDQVDFWLRQ�ZKHUH�WKHFXUUHQW�VWDWXV�LV�7R�EH�FKHFNHG�

��� &KRRVH� �6HW�WR�FKHFNHG�WR�VHW�WKHVWDWXV�WR�FKHFNHG�ZLWKRXW�FKDQJLQJDQ\�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKLVWUDQVDFWLRQ�

��� &KRRVH�WKH� �7UDQVIHU�UHPDLQLQJ6$3�GHIDXOWV�EXWWRQ�WR�FKDQJH�WKHFXUUHQW�DFWLYH�FKHFN�,'�VHWWLQJ�WRWKH�6$3�GHIDXOW�YDOXH�DQG�WKHVWDWXV�WR�FKHFNHG�

��� &KRRVH� �&KHFN�LQGLFDWRU�

��� &KRRVH� �

,I�\RX�VDYH�ZLWKRXW�PDNLQJ�DQ\FKDQJHV��WKH�VWDWXV�LV�DXWRPDWLFDOO\VHW�WR�FKHFNHG��DQG�WKH�FKDQJHVUHPDLQ�

��� &KRRVH�DQ\�RWKHU�PHQX�RSWLRQ�WRPDNH�DGGLWLRQDO�FKDQJHV�WR�WKLVWUDQVDFWLRQ�DQG�LWV�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�

��� 2QFH�ILQLVKHG��FKRRVH� �

7 8

9

1012 11

13 15

14

Page 346: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–18

��� 7KH�VWDWXV�KDV�FKDQJHG�WR�FKHFNHG�

��� 7R�XVH�WKH�6$3�GHIDXOW�YDOXHV�IRUDOO�WKH�WUDQVDFWLRQV�WKDW�\RX�KDYHQRW�\HW�PDQXDOO\�FKHFNHG��FKRRVHWKH� �7UDQVIHU�UHPDLQLQJ�6$3GHIDXOWV�EXWWRQ�WR�FRS\�DQ\UHPDLQLQJ�6$3�GHIDXOW�YDOXHV��LQRXU�FDVH��ZH�GR�QRW�KDYH�DQ\IXUWKHU�WUDQVDFWLRQV��

��� &KRRVH� �

��� ,I�\RX�KDG�RWKHU�WUDQVDFWLRQV�DOOWKHLU�VWDWXVHV�ZRXOG�KDYH�EHHQ�VHWWR�FKHFNHG�

��� &KRRVH� �

16

17

18

19

20

Page 347: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–19

��� &KRRVH��&��$FWLYLW\�JURXSV�WR�EHFKHFNHG�

��� &KRRVH� �

7KH�RXWSXW�LV�D�OLVW�RI�DFWLYLW\JURXSV�WKDW�DUH�DIIHFWHG�E\�HLWKHUFKDQJHV�\RX�PDGH�RU�E\�FKDQJHVIURP�RXU�LPSURYHG�GHIDXOW�GDWD�

22

21

Page 348: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–20

��� )RU�WKH�OLVWHG�DFWLYLW\�JURXSV�FKDQJHV�KDYH�EHHQ�PDGH�WR�FKHFNLQGLFDWRUV�RU�GHIDXOW�WUDQVDFWLRQYDOXHV��7KHUHIRUH��WKHFRUUHVSRQGLQJ�DXWKRUL]DWLRQSURILOHV�QHHG�WR�EH�DGMXVWHG�

0DNH�VXUH�\RX�VHOHFW�HDFK�HQWU\�LQWKLV�OLVW�

��� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS\RX�ZRXOG�OLNH�WR�DGMXVW�

��� 'HSHQGLQJ�RQ�WKH�FKDQJHV��\RX�PLJKW�KDYH�WR�PDLQWDLQ�WKH�FRUUHFW�RUJDQL]DWLRQDO�OHYHO�

��� 3RVWPDLQWDLQ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��LI�UHTXLUHG�\HOORZ�RU�UHG�OLJKWV��

'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWVIRU�FKHFN�LQGLFDWRUV�DQG�ILHOGYDOXHV��WKH�3*�PD\�FUHDWH�VRPHQHZ�DXWKRUL]DWLRQV�LQ�5HOHDVH����[�<RX�ZLOO�VHH�QHZ�DXWKRUL]DWLRQVFUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��WKHVHDUH�LGHQWLILHG�E\�WKH�RQHV�WKDW�VD\1HZ���-XVW�DFWLYDWH��RU�GHOHWH��WKHQHZ�DXWKRUL]DWLRQV��7KH�V\VWHPLQFOXGHV�WKH�QHZ�UHTXLUHGDXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJIRU�H[LVWLQJ�RQHV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO��EXW�KDV�PRUHDGYDQWDJHV�WKDQ�GLVDGYDQWDJHV�DQGDOVR�LPSURYHV�3*�SHUIRUPDQFH�

7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQ�ILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ�&KDQJHV�

��� $IWHU�UHJHQHUDWLQJ��FKRRVH� �

��� &RQWLQXH�ZLWK�WKH�QH[W�HQWU\�LQ�WKH�OLVW�RI�DFWLYLW\�JURXSV�ZLWK�WKLV�VDPH�SURFHGXUH�XQWLO�\RX�KDYHDGMXVWHG�DOO�DFWLYLW\�JURXSV�

23

26

24

25

Page 349: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–21

$IWHU�FRPSOHWLQJ�VWHSV��$���%��DQG��&��\RX�KDYH�SHUIRUPHG�WKH�PRVW�LPSRUWDQW�VWHSV�DIWHU\RXU�5HOHDVH�����$�%�XSJUDGH�

<RX�VWLOO�QHHG�WR�SHUIRUP�VWHS����7UDQVSRUW�WKH�FXVWRPHU�WDEOHV��DQG�WUDQVSRUW�WKH�FKDQJHV�\RXPDGH�LQ�VWHSV���DQG���WR�\RXU�RWKHU�5���V\VWHPV��$OO�V\VWHPV�PXVW�KDYH�WKH�VDPH�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�

��� &KRRVH��'��'LVSOD\�FKDQJHGWUDQVDFWLRQ�FRGHV�

7KLV�UHSRUW�OLVWV�DOO�DFWLYLW\�JURXSVZKHUH�WUDQVDFWLRQV�KDYH�EHHQUHSODFHG�E\�RWKHU�WUDQVDFWLRQV��7KHROG�DQG�QHZ�WUDQVDFWLRQV�DUH�DOVRGLVSOD\HG��<RX�FDQ�FKDQJH�WKHWUDQVDFWLRQ�FRGH�LQ�WKHFRUUHVSRQGLQJ�DFWLYLW\�JURXS�E\GRXEOH�FOLFNLQJ�RQ�WKH�HQWU\�LQ�WKHOLVW�

<RX�KDYH�FRPSOHWHG�WKH�XSJUDGHVWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�UHOHDVHV�SULRU�WR����[�

29

Page 350: Authorizations Made Easy

Chapter 14: Upgrade

Upgrade from Releases 4.0x or 4.5x to 4.6 A/B

Authorizations Made Easy14–22

8SJUDGH�IURP�5HOHDVHV����[�RU����[�WR�����$�%

,I�\RX�DUH�XSJUDGLQJ�IURP����[�RU����[�WR�����$�%��\RX�VKRXOG�SURFHHG�IURP�VWHSV��$�WR��'LQ�WKH�VDPH�ZD\�DV�LQ�WKH�VHFWLRQ�EHIRUH�

,Q������UHVSRQVLELOLWLHV�QR�ORQJHU�H[LVW

,I�\RX�ZRUNHG�ZLWK�WKH�5���6\VWHP�LQ�5HOHDVH����[�RU�UHDG�WKH����%�$XWKRUL]DWLRQV�0DGH�(DV\JXLGHERRN��WKHQ�\RX�PD\�KDYH�ZRQGHUHG�ZKDW�KDSSHQHG�WR�WKH�IXQFWLRQDOLW\�FDOOHG´UHVSRQVLELOLWLHV�µ�,Q�5HOHDVH�����DQG������UHVSRQVLELOLWLHV�ZHUH�UHSODFHG�E\�D�FRQFHSW�FDOOHG´GHULYHG�DFWLYLW\�JURXSVµ�DQG�WKHVH�GHULYHG�DFWLYLW\�JURXSV�IXQFWLRQ�VOLJKWO\�GLIIHUHQW�IURPWKH�����UHVSRQVLELOLWLHV��,I�\RX�XVHG�UHVSRQVLELOLWLHV�LQ�����DQG�XSJUDGH�WR������\RXUUHVSRQVLELOLWLHV�DUH�FRQYHUWHG�DXWRPDWLFDOO\�LQWR�GHULYHG�DFWLYLW\�JURXSV�

)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�GHULYHG�DFWLYLW\�JURXSV��VHH�WKH�FRUUHVSRQGLQJ�VHFWLRQ�LQFKDSWHU����&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�

Page 351: Authorizations Made Easy

A–1

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV

&RQWHQWV

Overview ................................................................................................................. A–2

SAPNet – R/3 Frontend Notes............................................................................... A–3

$$

Page 352: Authorizations Made Easy

Appendix A: SAPNet – R/3 Frontend Notes

Overview

Authorizations Made EasyA–2

2YHUYLHZ

6$31HW�²�5���)URQWHQG�QRWHV��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6XSSRUW��266���FRQWDLQVLQIRUPDWLRQ�UHJDUGLQJ�NQRZQ�HUURUV��DQG�VXEVHTXHQW�PHDQV�RI�DGGUHVVLQJ�VXFK�HUURUV��VRPH�DGYLFH��DQG�JHQHUDO�LQIRUPDWLRQ�UHODWHG�WR�WKH�5���6\VWHP��,W�DOVR�VHUYHV�DV�RQH�RI�WKHFRUH�PHDQV�RI�FRPPXQLFDWLQJ�SUREOHPV�ZLWK�\RXU�5���6\VWHP�WR�WKH�6$3�5���VXSSRUWVHUYLFHV�SRUWLRQ�RI�WKH�6$3�ZRUOGZLGH�RUJDQL]DWLRQ��7KH�VXSSRUW�V\VWHP��PDLQWDLQHGHQWLUHO\�E\�6$3��FRQWDLQV�KXQGUHGV�RI�WKRXVDQGV�RI�´QRWHVµ�WKDW�DGGUHVV�WRSLFV�UDQJLQJIURP�5���V\VWHPV��5���V\VWHPV���DQG�PDQ\�RI�WKH�DGG�RQ�FRPSRQHQWV�WR�WKHVH�V\VWHPV��)RUPRUH�LQIRUPDWLRQ�DERXW�ZKDW�WKH�6$31HW�²�5���)URQWHQG�V\VWHP�LV��SOHDVH�UHIHU�WRZZZ�VDS�FRP�DQG�JR�WR�WKH�6$31HW�VHFWLRQ�

7KH�QRWH�QXPEHUV�SURYLGHG�LQ�WKLV�DSSHQGL[�UHSUHVHQW�RQO\�D�IUDFWLRQ�RI�DOO�WKH�QRWHV�UHODWHGWR�DXWKRUL]DWLRQV��$V�KXQGUHGV�RI�QRWHV�IRU�WKH�YDULRXV�6$3�SURGXFWV�DUH�FUHDWHG�HYHU\�GD\�WKLV�OLVWLQJ�RI�QRWHV�UHSUHVHQWV�´D�VQDSVKRW�LQ�WLPHµ�RI�WKRVH�WKDW�H[LVWHG�DW�WKH�WLPH�WKLVZULWLQJ�DQG�ZHUH�VHOHFWLYHO\�LQFOXGHG�KHUH��,W�LV�E\�QR�PHDQV�D�FRPSUHKHQVLYH�OLVW�

1RWHV�LQ�6$31HW�²�5���)URQWHQG�DUH�VHSDUDWHG�LQ�PDQ\�ZD\V��2QH�RI�WKH�PRVW�FRPPRQZD\V�LV�E\�WKH�´&RPSRQHQWµ�RU�´$SSOLFDWLRQ�$UHDµ�LQ�WKH�V\VWHP�WKDW�ZDV�DIIHFWHG��7KHIROORZLQJ�WDEOH�GHVFULEHV�VRPH�RI�WKH�PRVW�FRPPRQ�DSSOLFDWLRQ�DUHDV�ZKHUH�QRWHV�PD\�EHIRXQG��7KHVH�DUHDV�FDQ�EH�XVHG�WR�VHDUFK�WKH�6$31HW�²�5���)URQWHQG�QRWHV�GDWDEDVH�IRUDGGLWLRQDO�VHFXULW\�DGPLQLVWUDWRU�LQIRUPDWLRQ

$SSOLFDWLRQ�$UHD 'HVFULSWLRQ

%&�&&0 &RPSXWLQJ�&HQWHU�0DQDJHPHQW�6\VWHP

%&�&&0�865 8VHUV�DQG�$XWKRUL]DWLRQV

%&�&&0�865�$'0 8VHUV�DQG�$XWKRUL]DWLRQV�0DLQWHQDQFH

%&�&&0�865�.51 8VHUV�DQG�$XWKRUL]DWLRQV�.HUQHO�)XQFWLRQV

%&�&&0�865�3)& 3URILOH�*HQHUDWRU

%&�&76�25* :RUNEHQFK�&XVWRPL]HU�2UJDQL]HU

%&�)(6�6(0 6HVVLRQ�0DQDJHU

%&�659�5(3 5HSRUWLQJ

%&�%07�20 2UJDQL]DWLRQDO�0DQDJHPHQW

%&�%07�20�20 2UJDQL]DWLRQDO�3ODQ

),�$3�$3�% 3D\PHQW�3URJUDP�3D\PHQW�7UDQVIHU

00�,0�*)�5(3 ,0�5HSRUWLQJ��QR�/,6�

3$�3$�;; $OO�&RXQWULHV��3HUVRQQHO�$GPLQLVWUDWLRQ�

Page 353: Authorizations Made Easy

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Release 4.6A/BA–3

(DFK�DSSOLFDWLRQ�DUHD�FDQ�DOVR�EH�VHDUFKHG�XVLQJ�D�NH\ZRUG�VXFK�DV�SURILOH�JHQHUDWRU��3)&*��DFWLYLW\�JURXS�SUHGHILQHG�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ��SURILOH��XVHU��68����VHFXULW\�DQG�VR�RQ�

6$31HW�²�5���)URQWHQG�1RWHV

�$V�RI�'HFHPEHU������

/HJHQG�< 5,� �5HOHDVH�LQGHSHQGHQW< � ����$������%< 25� �ROGHU�UHOHDVH��EXW�VWLOO�YDOXDEOH�LQIRUPDWLRQ

6XEMHFW 5HOHDVH 1RWH 7LWOH

$XWKRUL]DWLRQ�&KHFN 5, ����� :KLFK�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG

$XWKRUL]DWLRQ 5, ����� 1DPLQJ�FRQYHQWLRQV�IRU�DXWKRUL]DWLRQV

$XWKRUL]DWLRQ�&KHFN 5, ����� $XWKRUL]DWLRQ�FKHFN���D�VKRUW�LQWURGXFWLRQ

$XWKRUL]DWLRQ�&RQFHSW 5, ����� 4XHVWLRQV�UHJDUGLQJ�WKH�DXWKRUL]DWLRQ�FRQFHSW

$XWKRUL]DWLRQV�5HSRUWLQJ�7UHH

5, ���� $XWKRUL]DWLRQ�SURWHFWLRQ�RI�$%$3���SURJUDPV

$XWKRUL]DWLRQV��7UDFH 5, ����� 7UDFH�IXQFWLRQ��PXOWLSOH�XVHUV

'RFXPHQWDWLRQ��%DVLV.QRZOHGJHZDUH3URGXFWV

25 ����� ,QIR�IRU�FXVWRPHU���%DVLV�.QRZOHGJH�3URGXFWV

+RW�3DFNDJHV 25 ����� ,PSRUWDQW�,QIRUPDWLRQ�DERXW�+RW�3DFNDJHV

+RW�3DFNDJHV ����� &RQIOLFWV�EHWZHHQ�6XSSRUW�3DFNDJHV�/&3V��$GG�RQV

+RW�3DFNDJHV ����� 1HZ�+RW�3DFNDJHV�IRU�3URILOH�*HQHUDWRU

.QRZOHGJHZDUH3URGXFWV

25 ����� 4XHVWLRQV�DQG�DQVZHUV�RQ�WKH�5���%DVLV�.QRZOHGJH3URGXFW�&'V

1DPLQJ�&RQYHQWLRQV ����� &XVWRPHU�QDPH�UDQJH�IRU�6$3�REMHFWV

2UJDQL]DWLRQDO0DQDJHPHQW

����� 3'�DQG�:RUNIORZ�DSSOLFDWLRQ�GR�QRW�UXQ�FRUUHFWO\

266 5, ����� 266�5HJLVWUDWLRQ�)RUP��IRU�1RUWK�$PHULFD�

266 5, ����� 'RFXPHQWDWLRQ�RQ�WUDLQLQJ�LQIR�LQ�WKH�266

266 5, ����� 6HDUFK�SURFHGXUH�IRU�QRWHV�DQG�PHVVDJHV�LQ�266

266 5, ����� 6$3�$PHULFD·V�3URGXFWLRQ�5HJLVWUDWLRQ�)RUP

Page 354: Authorizations Made Easy

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Authorizations Made EasyA–4

6XEMHFW 5HOHDVH 1RWH 7LWOH

266 5, ����� 6$3/2*21�IRU�266

266 25 ����� 6HUYLFH�FRQQHFWLRQV��&RPSRVLWH�QRWH��RYHUYLHZ�

266 5, ����� 6WUXFWXUH�RI�DSSOLFDWLRQ�DUHDV�LQ�266

266 5, ����� 8VHU�PDLQWHQDQFH�DQG�FUHDWLRQ�LQ�266�IRU�FXVWRPHU

266 25 ����� )/&6�)HHGEDFN�IRU�WKH�1RWHV�ZLWKLQ�WKH�266�6\VWHP

266 5, ����� 266�FRUSRUDWH�JURXS�IXQFWLRQDOLW\��&ROOHFWLYH�QRWH

266 5, ����� &RQILUPDWLRQ�RI�266�5HJLVWUDWLRQ

266�DQG�266� 5, ����� /RJ�RQ�WR�266��7UDQVDFWLRQ�266��

266�DQG�266� 5, ����� 266���:KDW�WR�GR�LI�5���ZLOO�QRW�UXQ

266�DQG�266� 5, ����� *XLGHOLQHV�IRU�266���9HUVLRQ�IRU�6$36(59��

266�DQG�266� 5, ����� (DV\�WR�XVH�JXLGH�IRU�7UDQVDFWLRQ�266�

266�DQG�3ULQWLQJ 5, ����� 3ULQW���'RZQORDG�LQ�266

266�DQG�3ULQWLQJ 5, ����� 'RZQORDGLQJ�²�3ULQWLQJ�QRWHV�LQ�266

3DVVZRUGV�LQ�5�� 5, ���� $QVZHUV�RQ�´6HFXULW\µ

3DWFK�GRZQORDG�IURP6$36(59[

5, ����� $GYDQFH�WUDQVSRUWV�WR�FXVWRPHUV

3URILOH�*HQHUDWRU ����� 3UREOHPV�ZLWK�WDEOH�60(1B'$7(6

3URILOH�*HQHUDWRU ����� 0LVVLQJ�DXWKRUL]DWLRQ�ZKHQ�XVLQJ�WKH�3URILOH�*HQHUDWRU

3URILOH�*HQHUDWRU ����� ��SUREOHP�IRU�WKH�3*

3URILOH�*HQHUDWRU 5, ������ 5HJHQHUDWLRQ�RI�DFWLYLW\�JURXSV�DXWKRUL]DWLRQ�ORVV

3URILOH�*HQHUDWRU 5, ������ 0HUJ��3URFHVV�ZLWK�DXWKRUL]DWLRQ�GDWD��([SODQDWLRQ

3URILOH�*HQHUDWRU�7UDQVSRUW�3'�REMHFWV�DFWLYLW\�JURXSV�

25 ����� 7UDQVSRUWLQJ�3'�REMHFWV�E\�FOLHQW�FRS\

5HSRUW�5+$8783� 25 ����� $FWLYLW\�JURXS�PDLQW���XVHU�PDVWHU�GDWD�FRPSDULVRQ

6$3�6RIWZDUH�&KDQJH5HJLVWUDWLRQ

25 ����� 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5�

6$3B1(: 5, ����� :KDW�GRHV�WKH�SURILOH�6$3B1(:�GR"

6$31HW 5, ����� $FFHVV�WR�WKH�6$31HW�VHUYHU�ZLWK�266�8VHU�,'

6$36(59[ 25 ����� 7UDQVIHUULQJ�FXVWRPHU�ILOHV�WR�VDSVHUY��ZLWK�IWS

6HFXULW\�LQ�5�� 5, ����� &RQVHTXHQFHV�LQ�WUDQVSRUW�GXULQJ�SDVVZRUG�FKDQJH

Page 355: Authorizations Made Easy

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Release 4.6A/BA–5

6XEMHFW 5HOHDVH 1RWH 7LWOH

6HFXULW\�LQ�5�� 5, ����� 'DWD�SURWHFWLRQ�DQG�VHFXULW\�LQ�5��

6HFXULW\�LQ�5�� 5, ����� 6HFUHF\�DQG�'DWD�6HFXULW\�2EOLJDWLRQV

6HFXULW\�LQ�5����$%$3 5, ����� 6HFXULW\�DVSHFWV�LQ�$%$3���SURJUDPPLQJ

6HFXULW\�LQ�5����&3,�& 5, ����� 6$3&3,&��:KHUH�DUH�SDVVZRUGV�YLVLEOH"

6HFXULW\�LQ�5���

&XVWRPHU�([LW

����� &XVWRPHU�H[LWV�LQ�6$3�ORJ�RQ

6HVVLRQ�0DQDJHU 25 ����� *HQHUDWLRQ�RI�6HVVLRQ�0DQDJHU�PHQXV�WDNHV�WRR�ORQJ

68�� 5, ����� <RX�DUH�QRW�DXWKRUL]HG�WR�����!�$QDO\VLV

68�� 25 ����� 68����$XWKRUL]DWLRQ�YDOXH�FRQWDLQV�VSHFLDO�FKDUV

68�� 25 ����� 68����2EMHFW�QDPH�RYHUZULWHV�REMHFW�WH[W

6\VWHP�3URILOH3DUDPHWHUV

5, ����� 6\VWHP�SDUDPHWHUV��'HILQHG�ZKHUH"�'LVSOD\HG�KRZ"

7UDQVSRUWLQJ 5, ����� 7UDQVSRUWLQJ�SURILOHV�DQG�DXWKRUL]DWLRQV

7UDQVSRUW 25 ����� 7UDQVSRUW�SURILOHV��DXWKRU���LQ�ORJRQ�ODQJXDJH

7UDQVSRUW��8VHU�%XIIHU 5, ����� $XWKRUL]DWLRQV�QRW�FXUUHQW�DIWHU�SURILOH�WUDQVSRUW

7UDQVSRUWLQJ��$6���� ����� $6������,PSRUWLQJ�WUDQVSRUWV

8VHU�DGPLQLVWUDWLRQ 5, ����� 8VHUV�ZLWK�ODUJH�PDVWHU�UHF��PLVVLQJ�DXWKRUL]DWLRQV

8VHU�DGPLQLVWUDWLRQ ������ &HQWUDO�XVHU�GLVWULEXWLRQ��WRR�PDQ\�$/(�SURFHVVHV

8VHU�DGPLQLVWUDWLRQ ������ &HQ��8VHU�DGP���68���/DVW�FKDQJH�QRW�DOZD\V�GVSOHG�

8VHU�DGPLQLVWUDWLRQ ������ 8VH�RI�ZLOGFDUG�¶ ·�LQ�DXWKRUL]DWLRQV

8VHU�,QIRUPDWLRQ�6\VWHP�68,0�

25 ����� 1HZ�UHSRUWV�IRU�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

8VHU�,QIRUPDWLRQ�6\VWHP�68,0�

25 ����� :KHUH�XVHG�OLVW��6XUQDPHV�PLVVLQJ�LQ�XVHU�OLVW

8VHU�6$3 5, ���� +RZ�WR�DVVLJQ�DQ�LGHQWLILHU�WR�6$3

8VHU�6$3 5, ���� +RZ�GR�,�GHOHWH�WKH�XVHU�6$3 "

8VHUV�DQG$XWKRUL]DWLRQV�.HUQHO)XQFWLRQV

������ $XWKRUL]DWLRQ�%XIIHU�LV�ILOOHG�GXULQJ�HDFK�ORJRQ

:RUNEHQFK�&XVWRPL]HU2UJDQL]HU

������ 'HYHORSPHQW�&ODVV�&KDQJH�RQO\�ZLWK�DGPLQ�$XWKRUL]DWLRQ

Page 356: Authorizations Made Easy

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Authorizations Made EasyA–6

6XEMHFW 5HOHDVH 1RWH 7LWOH

3D\PHQW3URJUDP�3D\PHQW7UDQVIHU

������ ,QFRUUHFW�DXWKRUL]DWLRQ�FKHFN�IRU�FKHFN�PDQDJHPHQW

,0�5HSRUWLQJ��QR�/,6� ������ 0%����0%���0%�6��32�VFKHG��$JUHHPHQW�GLVSOD\V

$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�

������ $XWK��&KHFN�RI�QRW�LQWHJUDWHG�SHUVRQQHO�QXPEHUV

$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�

������ $XWKRUL]DWLRQ�OHYHO�0�LV�KDQGOHG�LQFRUUHFWO\

Page 357: Authorizations Made Easy

B–1

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV

&RQWHQWV

Overview ................................................................................................................. B–2

R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................... B–2

Profile Generator Setup......................................................................................... B–3

Working with the PG and Profiles ........................................................................ B–3

Authorization Checks (SU24)................................................................................ B–5

Upgrade Procedure (SU25) ................................................................................... B–7

Including Transactions or Reports ...................................................................... B–7

Missing Authorizations ......................................................................................... B–7

User Administration............................................................................................... B–8

Transporting ........................................................................................................... B–8

Tables...................................................................................................................... B–8

%%

Page 358: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Overview

Authorizations Made EasyB–2

2YHUYLHZ

7KLV�DSSHQGL[�FRQWDLQV�VRPH�RI�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�DERXW�5���DQG�WKH3URILOH�*HQHUDWRU��3*���:H�KRSH�WKH�DQVZHUV�< +HOS�\RX�WR�EHWWHU�XQGHUVWDQG�WKH�V\VWHP< )DFLOLWDWH�\RXU�LPSOHPHQWDWLRQ< 5HVROYH�EDVLF�V\VWHP�LVVXHV

5���,QLWLDO�6FUHHQ��6$3�(DV\�$FFHVV�0HQX��DQG�)DYRULWHV

,I�D�XVHU�KDV�VHYHUDO�DFWLYLW\�JURXSV�DVVLJQHG�WR�WKHP�ZLWK�WKH�VDPH�WUDQVDFWLRQ

FRGH��ZLOO�WKH�WUDQVDFWLRQ�FRGH�DSSHDU�PXOWLSOH�WLPHV�RQ�WKH�6$3�(DV\�$FFHVV

0HQX"�,V�WKHUH�D�ZD\�WR�´PHUJHµ�WKH�UHSHDWHG�WUDQVDFWLRQ�FRGHV"

7KH�WUDQVDFWLRQ�FRGH�ZLOO�LQGHHG�DSSHDU�PXOWLSOH�WLPHV��$W�SUHVHQW��WKHUH�DUH�QR�PHUJHFDSDELOLWLHV�WR�HOLPLQDWH�UHSHDWHG�WUDQVDFWLRQ�FRGHV�

,I�D�XVHU�KDV�PDQ\�DFWLYLW\�JURXSV�RU�PDQ\�WUDQVDFWLRQ�FRGHV��LV�WKHUH�DQ�HIIHFW

RQ�SHUIRUPDQFH��IRU�H[DPSOH��WKH�WLPH�IRU�WKH�ILUVW�VFUHHQ�WR�EH�SURFHVVHG�"

(DFK�´EUDQFKµ�RU�´QRGHµ�RQ�WKH�6$3�(DV\�$FFHVV�PHQX�UHSUHVHQWV�LWHPV�WKDW�D�XVHU�KDVDFFHVV�WR��3HUIRUPDQFH�GRHV�JR�GRZQ�ZLWK�D�ODUJH�QXPEHU�RI�QRGHV��EXW�IURP�SUHOLPLQDU\WHVWLQJ�E\�6$3�GHYHORSPHQW�JURXSV��WKH�V\VWHP�FDQ�KDQGOH�DQ�H[WHQVLYH�QXPEHU�ZLWK�DUHDVRQDEOH�UHVSRQVH�WLPHV��PRUH�WKDQ�D�XVHU�FDQ�KDQGOH�LQ�D�UHDVRQDEOH�OLIHWLPH���7KH�WHVWLQJRI�D�PHQX�EUDQFK�QRGH�VWUXFWXUH�RI��������QRGHV�KDV�EHHQ�VKRZQ�WR�SURYLGH�JRRGUHVSRQVH�WLPHV�

:KDW�KDSSHQHG�WR�WKH�5HSRUW�7UHHV�LQ�����DQG�DUH�WKH\�LQ�WKH�6$3�(DV\�$FFHVV

VFUHHQ"

5HSRUW�7UHHV�LQ�����DUH�QRZ�FOLHQW�LQGHSHQGHQW��7KH\�H[LVW�LQ�WKH�6$3�(DV\�$FFHVV�PHQX�5HSRUWLQJ�WUHHV�DQG�DUHD�PHQXV�KDYH�EHHQ�PHUJHG�LQ�IXQFWLRQDOLW\�DQG�LQ�RQH�WRRO��3OHDVHVHH�WKH�UHOHDVH�QRWHV�UHODWHG�WR�WKLV�WRSLF�

:LOO�RQH�XVHU��IRU�H[DPSOH��WKH�$XWKRUL]DWLRQV�$GPLQLVWUDWRU��EH�DEOH�WR�YLHZ�WKH

)DYRULWHV�RI�DQRWKHU�XVHU"�:LOO�D�XVHU�EH�DEOH�WR�DGG�DQ\�WUDQVDFWLRQ�FRGH�WR�WKHLU

IDYRULWHV"

$W�SUHVHQW��RQH�XVHU�FDQQRW�YLHZ�WKH�IDYRULWHV�RI�DQRWKHU�XVHU��$�XVHU�FDQ�DGG�DQ\WUDQVDFWLRQ�FRGH�WR�WKHLU�IDYRULWHV��+RZHYHU��D�XVHU�FDQQRW�H[HFXWH�WKH�WUDQVDFWLRQ�FRGHXQOHVV�WKH\�KDYH�DSSURSULDWH�DXWKRUL]DWLRQV��6B7&2'(��WR�GR�VR��)DYRULWHV��DW�SUHVHQW��DUHQRW�YLHZHG�E\�6$3�GHYHORSPHQW��DV�´VHFXULW\�UHOHYDQW�µ

,I�D�XVHU�FRSLHV�VRPH�WUDQVDFWLRQV�IURP�WKHLU�PHQX�WR�WKHLU�IDYRULWHV�DQG�ODWHU�RQ�WKHVHWUDQVDFWLRQV�DUH�WDNHQ�RXW�RI�WKHLU�DFWLYLW\�JURXS��WKH�WUDQVDFWLRQV�VWLOO�UHPDLQ�LQ�WKH�XVHU·V

Page 359: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Profile Generator Setup

Release 4.6A/BB–3

IDYRULWHV��7KH�XVHU�ZLOO�QRW�KDYH�DXWKRUL]DWLRQV�IRU�WKHVH�WUDQVDFWLRQV�DQ\PRUH��0DQXDOPDLQWHQDQFH�RI�WKH�IDYRULWHV�LV�QHHGHG�

3URILOH�*HQHUDWRU�6HWXS

+RZ�GRHV�WKH�$87+25,7<�&+(&.�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU"

:KHQ�$87+25,7<�&+(&.�LV�FDOOHG��WKH�V\VWHP�FKHFNV�ZKHWKHU�WKH�V\VWHP�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VHW�WR�<��,I�WKH�SDUDPHWHU�LV�QRW�VHW�WR�<��WKH�QRUPDO$87+25,7<�&+(&.�LV�FRQGXFWHG��,I�WKH�SDUDPHWHU�LV�VHW�WR�<��LW�VHDUFKHV�IRU�DQ�HQWU\�LQWDEOH�862%;B&��UHIHU�WR�VWUXFWXUH�862%;B&��ZLWK�WKH�FXUUHQW�WUDQVDFWLRQ�FRGH�DQGDXWKRUL]DWLRQ�REMHFW��,I�QRWKLQJ�LV�IRXQG��WKH�QRUPDO�$87+25,7<�&+(&.�LV�FRQGXFWHG��,IDQ�HQWU\�LV�IRXQG��DQG�862%;B&�2.)/$*�LV�VHW�WR�1���QR�FKHFN�LV�SHUIRUPHG��UHJDUGOHVV�RIWKH�DFWXDO�XVHU�SURILOH��,Q�DOO�RWKHU�FDVHV��WKH�UHJXODU�DXWKRUL]DWLRQ�FKHFN�LV�FRQGXFWHG�DQGVXFFHHGV�ZKHQ�WKH�XVHU�SURILOH�FRQWDLQV�DQ�DXWKRUL]DWLRQ�ZLWK�WKH�FRUUHVSRQGLQJH[SUHVVLRQV�IRU�WKH�FXUUHQW�REMHFW�

,Q�D�QHZ�LQVWDOODWLRQ�WKH�SDUDPHWHU�LV�VHW�WR�<��VLQFH�WKH�3*�LV�DOUHDG\�DFWLYDWHG��)RU�PRUHLQIRUPDWLRQ��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�

'R�,�QHHG�WR�VKXW�GRZQ�DQG�UHVWDUW�WKH�LQVWDQFH�DIWHU�,�FKDQJHG�WKH�V\VWHP

SURILOH�SDUDPHWHU"

<HV��\RX�PXVW�UHVWDUW�WKH�LQVWDQFH�DIWHU�DGGLQJ�WKH�LQVWDQFH�SURILOH�SDUDPHWHU��)RU�IXUWKHULQIRUPDWLRQ�RQ�KRZ�WKH�3*�LV�VHW�XS�DQG�ZKDW�VHWWLQJV�QHHG�WR�EH�SHUIRUPHG��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�

:RUNLQJ�ZLWK�WKH�3*�DQG�3URILOHV

&DQ�,�LQFOXGH�DQ�H[LVWLQJ�SURILOH�LQ�DQ�DFWLYLW\�JURXS"

<HV��\RX�FDQ�LQFOXGH�DQ�H[LVWLQJ�SURILOHV��VLQJOH�DQG�FRPSRVLWH��LQWR�DQ�DFWLYLW\�JURXS�3OHDVH�UHIHU�WR�FKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�

:K\�LV�RQO\�RQH�SURILOH�VRPHWLPHV�JHQHUDWHG"

7HFKQLFDOO\��RQO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�RQH�SURILOH��VR�VHYHUDO�SURILOHV�DUH�FUHDWHGIRU�ODUJH�DFWLYLW\�JURXSV��6LQFH�WKH�ODVW�WZR�GLJLWV�DUH�UHTXLUHG�IRU�WKH�LQWHUQDO�QXPHUDWRU�RQO\����GLJLWV�DUH�DYDLODEOH�IRU�WKH�SURILOH�QDPH�

Page 360: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Working with the PG and Profiles

Authorizations Made EasyB–4

&DQ�,�PDQXDOO\�FKDQJH�JHQHUDWHG�SURILOHV�IURP�3)&*�LQ�68��"

<RX�FDQ�RQO\�FKDQJH�JHQHUDWHG�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*��ZKHUH�\RX�KDYH�DOO�WKH�VDPHRSWLRQV�DV�LQ�WUDQVDFWLRQ�68����7R�EORFN�JHQHUDWHG�SURILOHV�IRU�PDLQWHQDQFH��XVH�68����,QRWKHU�ZRUGV��LI�WKH�SURILOH�ZDV�FUHDWHG�DV�D�UHVXOW�RI�3)&*��\RX�FDQQRW�FKDQJH�LW�ZLWK�68���

&DQ�,�LQFOXGH�PDQXDO�SURILOHV�LQ�WKH�3URILOH�*HQHUDWRU"

,Q�WKH�3*��FKRRVLQJ�(GLW�→�,QVHUW�DXWK��→�IURP�SURILOH�LQFOXGHV�DOO�DXWKRUL]DWLRQV�IURP�DPDQXDOO\�FUHDWHG�SURILOH�LQ�D�JHQHUDWHG�SURILOH��7KHVH�DXWKRUL]DWLRQV�UHPDLQ�LQ�PDQXDOVWDWXV�DQG��LI�WKH�DFWLYLW\�JURXS�FKDQJHV��WKH�DXWKRUL]DWLRQV�UHPDLQ�XQFKDQJHG�ZKHQ�\RXFRPSDUH�WKH�SURILOH��+RZHYHU��\RX�FDQ�RQO\�LQVHUW�DXWKRUL]DWLRQV�IURP�D�VLQJOH�SURILOH�

&DQ�,�PDQXDOO\�HQWHU�JHQHUDWHG�SURILOHV�LQ�WKH�XVHU�PDVWHU�UHFRUG"

<HV��EXW�ZH�GR�QRW�UHFRPPHQG�LW�IRU�WKH�IROORZLQJ�UHDVRQV�< ,I�WKH�DFWLYLW\�JURXS�LV�H[WUHPHO\�ODUJH��RU�LV�LQFUHDVHG�E\�D�ODWHU�FKDQJH���WKH�3*

JHQHUDWHV�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�SURILOH�DQG�DXWRPDWLFDOO\�XSGDWHV�WKH�DIIHFWHGXVHU�PDVWHUV��ZKLFK�KDYH�WR�EH�PDQXDOO\�LQVHUWHG�

< :KHQ�DVVLJQLQJ�ZLWK�WKH�3*��\RX�FDQ�LQFOXGH�WLPH�GHSHQGHQFLHV�DQG�DVVLJQ�WKH�SURILOHIRU�D�OLPLWHG�WLPH�SHULRG�

,V�LW�SRVVLEOH�WR�FKDQJH�WKH�SURILOH�QDPH�ODWHU"

<HV��RQO\�WKH�ORQJ�WH[W��GHVFULSWLYH�WH[W��WR�D�SURILOH�FDQ�EH�FKDQJHG�ZLWK�WKH�3*��ZKLFK�GRHVQRW�DIIHFW�WKH�DXWKRUL]DWLRQV�XVHG�LQ�WKLV�SURILOH��,W�LV�QRW�SRVVLEOH�WR�PDQXDOO\�FKDQJH�WKHWHFKQLFDO�SURILOH�QDPH�RI�D�JHQHUDWHG�SURILOH�ZLWK�WKH�3*�

&DQ�,�FRS\�DQ�DFWLYLW\�JURXS��DQG�ZLOO�WKLV�SURFHGXUH�DOVR�FRS\�WKH�SURILOH"

<HV��\RX�FDQ�FRS\�DFWLYLW\�JURXSV��EXW�ZKLOH�FRS\LQJ��FKRRVH�D�GLIIHUHQW�QDPH�IRU�WKH�QHZDFWLYLW\�JURXS��7KH�DFWLYLW\�JURXS��WKH�DFWLYLWLHV��DQG�WKH�SURILOH�GDWD�DUH�WKHQ�FRSLHG��6HHFKDSWHU����WKH�VHFWLRQ�&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�IRU�GHWDLOHG�LQIRUPDWLRQ�

,I�,�JHQHUDWH�D�SURILOH�WKDW�PD\�XVH�D�SUHYLRXVO\�EXLOW�DXWKRUL]DWLRQ��ZLOO�WKH

V\VWHP�FUHDWH�D�QHZ�RQH�RU�XVH�WKH�H[LVWLQJ�RQH"

(YHU\�WLPH�\RX�JHQHUDWH�D�QHZ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��QHZ�DXWKRUL]DWLRQV�DUH�FUHDWHG�,W�WDNHV�ORQJHU�WR�VHDUFK�IRU�H[LVWLQJ�DXWKRUL]DWLRQV�ZLWK�WKH�VDPH�YDOXHV�WKDQ�WR�FUHDWH�QHZRQHV��(DFK�DXWKRUL]DWLRQ�FDQ�RQO\�EH�XVHG�LQ�RQH�DFWLYLW\�JURXS�

+RZ�GR�,�UHVWULFW�DFWLYLWLHV�E\�VSHFLILF�WLPH�SHULRGV"

(YHQ�LI�\RX�GR�QRW�XVH�%&�2UJ��\RX�FDQ�VWLOO�FKRRVH�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�XVHUV�IRU�DOLPLWHG�WLPH��7KLV�DFWLRQ�PDNHV�VHQVH��IRU�H[DPSOH��ZKHQ�\RXU�FRPSDQ\�HQWHUV�D�QHZ�ILVFDO\HDU��3K\VLFDO�LQYHQWRU\�DFWLYLWLHV�VKRXOG�RQO\�EH�DOORZHG�IRU�D�OLPLWHG�SHULRG�RI�WLPH��)RUIXUWKHU�LQIRUPDWLRQ�RQ�VHWWLQJ�WLPH�OLPLWV��UHIHU�WR�FKDSWHU����$VVLJQLQJ�DFWLYLW\�JURXSV�

Page 361: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Authorization Checks (SU24)

Release 4.6A/BB–5

:KLFK�WUDQVDFWLRQV�DUH�XVHG�E\�WKH�3*�WR�PDLQWDLQ�D�VSHFLILF�DXWKRUL]DWLRQ"

2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH�8WLOLWLHV�→�6HWWLQJV�→�)RU2YHUYLHZ�RI�$XWKRUL]DWLRQ�2EMHFW�8VH��WR�LPSRUW�DQ�LFRQ�LQWR�\RXU�SURILOH�WUHH��7KLV�LFRQ�ZKLFK�ORRNV�OLNH�D�PRXQWDLQ��GLVSOD\V�WKH�WUDQVDFWLRQV�IRU�ZKLFK�WKH�&KHFN�PDLQWDLQ�IODJ�LVVHW�IRU�WKH�REMHFW�

$XWKRUL]DWLRQ�&KHFNV��68���

:KDW�GR�WKH�GLIIHUHQW�FKHFN�IODJV�VWDQG�IRU"

&0��&KHFN�0DLQWDLQ�

< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW�DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&��&KHFN�

< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

1��1R�FKHFN�

< 7KH�DXWKRULW\�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8��8QPDLQWDLQHG�

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRULW\�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

7R�OHDUQ�PRUH�DERXW�WUDQVDFWLRQ�68����SOHDVH�VHH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI$XWKRUL]DWLRQ�&KHFNV�

:K\�'RHV�WKH�3URILOH�*HQHUDWRU�0DLQWDLQ�$XWKRUL]DWLRQV�IRU�0RUH�2EMHFWV�7KDQ

<RX�&DQ�6HH"

:LWK�WUDQVDFWLRQ�68���\RX�FDQ�EURZVH�WKH�HQWULHV�RI�WDEOHV�862%;B&�DQG�862%7B&��7KH3*�XVHV�WDEOH�862%;B&�WR�FKHFN�IRU�WUDQVDFWLRQV�LQ�WKH�FRUUHVSRQGLQJ�DFWLYLW\�JURXSVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW·V�DXWKRUL]DWLRQV�DUH�WR�EH�PDLQWDLQHG��7KH�FRUUHVSRQGLQJYDOXHV�DUH�VWRUHG�LQ�WDEOH�862%7B&��%XW��WKH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ��7KHVHWUDQVDFWLRQV�ZRUN�ZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��UHVWULFWHG�E\�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�WKDW�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�

Page 362: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Authorization Checks (SU24)

Authorizations Made EasyB–6

7KH�DXWKRUL]DWLRQ�FKHFNV�DUH�FRGHG�H[FOXVLYHO\�LQ�WKH�FRUH�WUDQVDFWLRQ��+RZHYHU��WKHDXWKRUL]DWLRQ�ILHOG�YDOXHV�FDQ�EH�VSHFLILHG�PRUH�SUHFLVHO\�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�WKDQLQ�WKH�FRUH�WUDQVDFWLRQ��7KH�3*�ILUVW�PDLQWDLQV�WKH�DXWKRUL]DWLRQV�LQ�862%;B&�DQG862%7B&�XQGHU�WKH�SDUDPHWHU�WUDQVDFWLRQ��DQG�WKHQ�OLVWV�DXWKRUL]DWLRQV�IRU�DOODXWKRUL]DWLRQ�REMHFWV�LQ�WKH�FRUH�WUDQVDFWLRQ�DV�WR�EH�PDLQWDLQHG��$V�D�UHVXOW��IRU�WKH�SDUDPHWHUWUDQVDFWLRQ��PRUH�DXWKRUL]DWLRQV�DUH�PDLQWDLQHG�WKDQ�FDQ�EH�VHHQ�LQ�68���

)RU�H[DPSOH��WUDQVDFWLRQ�2&����ZKLFK�PDLQWDLQV�H[FKDQJH�UDWHV��XVHV�WKH�JHQHUDO�WDEOHPDLQWHQDQFH�WUDQVDFWLRQ��60�����2Q�WKH�LQLWLDO�VFUHHQ�IRU�60����HQWHU�WKH�YLHZ�QDPHV_TCURR�DQG�FKRRVH�0DLQWDLQ��7KH�3*�UHDGV�68���IRU�2&���DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQIRU�WKH�REMHFW�6B7$%8B',6�ZLWK�WKH�&KDQJH�DQG�'LVSOD\�YDOXHV�IRU�WKH�DFWLYLW\�DQG�WKH�)&��YDOXH�IRU�WKH�DXWKRUL]DWLRQ�JURXS��7KH�3*�DOVR�UHDGV�68���IRU�WKH�FRUH�WUDQVDFWLRQ�60��DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQ�IRU�6B7$%8B&/,�ZLWK�D�%/$1.�YDOXH��EHFDXVH�WKLV�REMHFW�LVQRW�OLVWHG�LQ�68���XQGHU�2&���

+RZ�'R�,�5HGXFH�WKH�6FRSH�RI�$XWKRULW\�&KHFNV�LQ�5��"

6HH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�LQ�WKLV�JXLGH�

+RZ�&DQ�D�&XVWRPHU�,QFOXGH�,QGLYLGXDO�$XWKRUL]DWLRQ�&KHFNV�LQ�D�7UDQVDFWLRQ"

)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�EH�FDUULHG�RXW�< $OZD\V< 2QO\�RQ�FHUWDLQ�VFUHHQV< 2QO\�LQ�FHUWDLQ�WUDQVDFWLRQV

)RU�PRUH�LQIRUPDWLRQ�RQ�ILHOG�H[LWV��VHH�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'�

:KHQ�6WDUWLQJ�7UDQVDFWLRQV��:KDW�6KRXOG�,�.QRZ�$ERXW�WKH�1HZ�$XWKRUL]DWLRQ

&KHFN"

(DFK�WLPH�D�QHZ�WUDQVDFWLRQ�LV�FDOOHG��00����IRU�H[DPSOH���WKH�V\VWHP�FKHFNV�ZKHWKHU�WKHXVHU�LV�DXWKRUL]HG�WR�VWDUW�WKDW�WUDQVDFWLRQ���1R�FKHFN�WDNHV�SODFH�IRU�WKH�$%$3�FRPPDQG&$//�75$16$&7,21���,I�\RX�XVH�WKH�3*�DQG�LWV�PHQXV�WR�IRUP�DFWLYLW\�JURXSV��DQDXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(�LV�DXWRPDWLFDOO\�GHILQHG�IRU�HDFK�DFWLYLW\�JURXS��,WFRQWDLQV�WKH�H[DFW�WUDQVDFWLRQV�WKDW�\RX�VHOHFWHG�IRU�WKH�DFWLYLW\�JURXS�

,I�\RX�ZDQW�WR�DOORZ�WUDQVDFWLRQV�WKDW�\RX�GLG�QRW�DVVLJQ�XVLQJ�WKH�DFWLYLW\�JURXS�PHQX�PDQXDOO\�DGG�DQ�DXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(��DQG�HQWHU�WKH�PLVVLQJ�WUDQVDFWLRQV��<RXFDQ�QRZ�DYRLG�SUREOHPV�ZKHQ�\RX�FRPSDUH�WKH�DXWKRUL]DWLRQ�GDWD�

6B7&2'(�LV�IRXQG�LQ�WKH�REMHFW�FODVV�1RQDSSOLFDWLRQ�VSHFLILF�$XWKRUL]DWLRQ�REMHFWV��7KH6B7&'B$//�DXWKRUL]DWLRQ�LV�GHOLYHUHG�ZLWK�WKH�SURILOH�6$3B1(:B��(��ZKLFK�DOORZV�\RX�WRH[HFXWH�DOO�WUDQVDFWLRQV��%\�JLYLQJ�UHVWULFWHG�DXWKRUL]DWLRQV�IRU�6B7&2'(��WKH�XVHUDGPLQLVWUDWRU�FDQ�UHVWULFW�LQGLYLGXDO�XVHUV�RU�XVHU�JURXSV�WR�UHPDLQ�ZLWKLQ�WKH�WUDQVDFWLRQVWKH\�UHTXLUH��7KH�DXWKRUL]DWLRQ�FKHFNV�GHILQHG�E\�WKH�GHYHORSHU�ZLWK�WUDQVDFWLRQ�6(���WUDQVDFWLRQ�PDLQWHQDQFH���RU�LQ�WKH�$%$3�VRXUFH�FRGH��FRQWLQXH�WR�EH�SHUIRUPHG�

Page 363: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Upgrade Procedure (SU25)

Release 4.6A/BB–7

7KHVH�DUH�WKH�DGYDQWDJHV�RI�WKH�QHZ�DXWKRUL]DWLRQ�FKHFN�< $�JXDUDQWHH�WKDW�HDFK�WUDQVDFWLRQ�SHUIRUPV�DW�OHDVW�RQH�DXWKRUL]DWLRQ�FKHFN< $Q�HDV\�ZD\�WR�GHWHUPLQH�ZKLFK�WUDQVDFWLRQV�D�XVHU�FDQ�H[HFXWH

8SJUDGH�3URFHGXUH��68���

,V�WKHUH�D�ZD\�WR�UXQ�WKH�68���VWHSV�LQ�´VLPXODWLRQµ�RU�´WHVWµ�PRGH"

$W�SUHVHQW��LW�LV�QRW�SRVVLEOH�WR�UXQ�D�VLPXODWLRQ�RU�WHVW�PRGH�

,QFOXGLQJ�7UDQVDFWLRQV�RU�5HSRUWV

+RZ�FDQ�,�LQFOXGH�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV�LQ�WUDQVDFWLRQV"

)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�DOZD\V�EHFDUULHG�RXW�RQO\�RQ�FHUWDLQ�VFUHHQV�RU�LQ�FHUWDLQ�WUDQVDFWLRQV��)XUWKHU�GHWDLOV�RQ�ILHOG�H[LWVFDQ�EH�IRXQG�LQ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'��127(��)LHOG�H[LWV�JHWLQYRNHG�DIWHU�WKH�XVHU�DWWHPSWV�WR�SURFHVV�D�SDUWLFXODU�VFUHHQ��)LHOG�H[LWV�GR�QRW�SUHYHQWXVHUV�IURP�HQWHULQJ�D�VFUHHQ�ZKLFK�FRQWDLQV�WKH�ILHOG��$V�ILHOG�H[LWV�FDQ�EH�PDGH�WR�EH�VFUHHQDQG�SURJUDP�VSHFLILF��LW�LV�SRVVLEOH�WKDW�6$3�FDQ�GHILQH�QHZ�VFUHHQV�DQG�SURJUDPV�ZKLFKZLOO��H�J��DIWHU�DQ�XSJUDGH��UHQGHU�WKH�ILHOG�H[LW�DV�QRQ�IXQFWLRQDO��)LHOG�H[LWV�RI�VXFK�VRUWPXVW�DOZD\V�EH�FRQVLGHUHG�DIWHU�DQ�XSJUDGH�

0LVVLQJ�$XWKRUL]DWLRQV

:KDW�LI�DQ�DXWKRUL]DWLRQ�LV�VWLOO�PLVVLQJ�IRU�WKH�JHQHUDWHG�SURILOH��DQG�WKH�XVHU

JHWV�D�´1R�DXWKRUL]DWLRQ���µ�PHVVDJH"

5HPHPEHU�WKDW�LI�LPSOHPHQWLQJ�DQ\�SRUWLRQ�RI�WKH�+5�FRPSRQHQW�RI�WKH�5���6\VWHP��WKHUHLV�D�SRVVLELOLW\�WR�HQDEOH�FHUWDLQ�SDUWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP�WKDW�DUH�127�UHODWHG�WR�WKHSURILOH�JHQHUDWRU��H[DPSOH��,PSOHPHQWLQJ�+5�VWUXFWXUDO�DXWKRUL]DWLRQV���$V�VXFK��WKH�´1RDXWKRUL]DWLRQ«�µ�PHVVDJH�ZRXOG�EH�FRUUHFW�DQG�WKH�V\VWHP�LV�QRW�LQ�HUURU��,I�FRQYLQFHG�WKDWWKHUH�LV�DQ�HUURU�LQ�WKH�V\VWHP��FUHDWH�DQ�6$31HW�²�5���)URQWHQG�QRWH�WR�VSHFLI\�WKHWUDQVDFWLRQ�DQG�WKH�SUHFLVH�HUURU�PHVVDJH��SUHIHUDEO\�D�FRS\�RI�WKH�RXWSXW�IURP�WUDQVDFWLRQ68����WKDW�\RX�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS��7R�FRUUHFW�WKH�HUURU�LQ�\RXU�V\VWHP��VHHFKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�

Page 364: Authorizations Made Easy

Appendix B: Frequently Asked Questions

User Administration

Authorizations Made EasyB–8

8VHU�$GPLQLVWUDWLRQ

+RZ�FDQ�WKH�ZRUN�LQYROYHG�LQ�PDLQWDLQLQJ�VHWWLQJ�XS�DXWKRUL]DWLRQV�EH�GLYLGHG�XS

DPRQJVW�PXOWLSOH�SHRSOH"

6LQFH�WKH�3*�VHOHFWV�WKH�DXWKRUL]DWLRQ�REMHFWV��LW�LV�QR�ORQJHU�QHFHVVDU\�WR�GHFLGH�ZKRPDLQWDLQV�DXWKRUL]DWLRQV�IRU�DQ�REMHFW��7KH�FKHFN�DJDLQVW�WKH�REMHFW�6B86(5B$87�LV�FDUULHGRXW�RQO\�LI�WKH�DGPLQLVWUDWRU�PDQXDOO\�LQVHUWV�DQ�DXWKRUL]DWLRQ��:LWK�DXWKRUL]DWLRQ�REMHFW6B86(5B$*5��D�FKHFN�LV�SRVVLEOH�DW�WKH�DFWLYLW\�JURXS�OHYHO�WR�VHH�ZKR�LV�DOORZHG�WR�VHOHFWZKLFK�WUDQVDFWLRQ�IRU�WKLV�DFWLYLW\�JURXS��)RU�D�IXUWKHU�FODVVLILFDWLRQ�LQWR�DXWKRUL]DWLRQ�DQGDFWLYDWLRQ�DGPLQLVWUDWRU��VHH�$GPLQLVWUDWLRQ�:KHQ�8VLQJ�WKH�3URILOH�*HQHUDWRU�LQ�WKH�RQOLQHGRFXPHQWDWLRQ�

7UDQVSRUWLQJ

'R�WKH�862%;B&�DQG�862%7B&�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�FOLHQWV"

1R��7KHVH�WDEOHV�DUH�FOLHQW�LQGHSHQGHQW��7KH\�RQO\�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�V\VWHPV�

,V�WKHUH�D�ZD\�WR�WUDQVSRUW�DFWLYLW\�JURXSV"

<HV��\RX�FDQ�HLWKHU�XVH�WKH�VWDQGDUG�WUDQVSRUW�FRQQHFWLRQ�LQ�WUDQVDFWLRQ�3)&*�RU�XVH�PDVV�WUDQVSRUW�DFWLYLW\�JURXSV�LQVLGH�WKH�3*�

'RHV�WKH�WUDQVSRUW�RI�DFWLYLW\�JURXSV�EHWZHHQ�WZR�FOLHQWV��LQ�WKH�VDPH�V\VWHP�

ZRUN�ZLWK�WUDQVDFWLRQ�6&&�"

<HV��DIWHU�EHLQJ�LPSRUWHG�WR�WKH�WDUJHW�FOLHQW��WKH�WUDQVSRUWHG�DFWLYLW\�JURXSV�DUH�QRZ�DFWLYHDQG�GR�DSSHDU�LQ�WUDQVDFWLRQ�3)&*��7KLV�VWHS�ZDV�QRW�SRVVLEOH�LQ�UHOHDVHV�EHIRUH����%�

:KDW�LI�WKH�JHQHUDWHG�SURILOH�RQO\�KDV�DXWKRUL]DWLRQV�IRU�REMHFW�6B7&2'("

7KH�6$3�GHIDXOW�WDEOHV�PD\�QRW�KDYH�EHHQ�FRSLHG�LQWR�WKH�FXVWRPHU�WDEOHV��,I�\RX�JHW�D�1RRUJDQL]DWLRQDO�GDWD�DYDLODEOH�PHVVDJH��UXQ�WUDQVDFWLRQ�68����6HH�FKDSWHU���LQ�WKLV�JXLGH�IRUPRUH�LQIRUPDWLRQ�RQ�WUDQVDFWLRQ�68���

7DEOHV

+RZ�GR�,�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV�WKDW�DUH�LQFOXGHG�LQ�DQ�DFWLYLW\�JURXS"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�$*5B1$0(�

Page 365: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Tables

Release 4.6A/BB–9

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�WUDQVDFWLRQ�FRGHV�LQ�WKDW�DFWLYLW\�JURXS�QDPH�

+RZ�GR�,�GLVSOD\�LQ�ZKLFK�DFWLYLW\�JURXS�D�FHUWDLQ�WUDQVDFWLRQ�FRGH�LV�EHLQJ�XVHG"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKH�ILHOG�7&2'(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�DFWLYLW\�JURXSV�QDPH�ZKHUH�WKDW�WUDQVDFWLRQ�FRGH�LV�EHLQJXVHG�

+RZ�GR�,�GLVSOD\�ZKLFK�DFWLYLW\�JURXS�LV�XVHG�E\�ZKLFK�XVHU"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�7$*5B1$0(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�QDPHV�RI�DOO�XVHUV�WKDW�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�

+RZ�GR�,�GLVSOD\�ZKLFK�XVHU�LV�DVVLJQHG�WR�ZKLFK�DFWLYLW\�JURXS"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�XVHU�LQ�WKH�ILHOG�81$0(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�DOO�DFWLYLW\�JURXSV�WKLV�XVHU�LV�DVVLJQHG�WR�

'RHV�WKH�DXWKRUL]DWLRQ�REMHFW�DOORZ�DFWLYLWLHV�QRW�PDLQWDLQHG�LQ�WDEOH�7$&7="

7DEOH�7$&7=�FRQWDLQV�DOORZDEOH�DFWLYLWLHV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW��,I�\RX�ILQG�DWUDQVDFWLRQ�ORRNLQJ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�ZLWK�DQ�DFWLYLW\�WKDW�LV�QRW�PDLQWDLQHG�RURIIHUHG�E\�3*��PDLQWDLQ�WKH�PLVVLQJ�DFWLYLW\�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�REMHFW�LQ�WDEOH7$&7=�ZLWK�WUDQVDFWLRQ�60����7KH�3*�WKHQ�RIIHUV�WKLV�YDOXH�

Page 366: Authorizations Made Easy

Appendix B: Frequently Asked Questions

Tables

Authorizations Made EasyB–10

:KDW�LV�WKH�VWUXFWXUH�RI�WDEOH�862%;B&"

)LHOG�QDPH .H\ 'HVFULSWLRQ

1$0( ; 3URJUDP�WUDQVDFWLRQ�IXQFWLRQ�PRGXOH�QDPH

7<3( ; 7\SH�RI�UHSRUW

2%-(&7 ; 8VHU�PDVWHU�PDLQWHQDQFH��DXWKRUL]DWLRQ�REMHFW

02',),(5 /DVW�FKDQJHG�E\

02''$7( 'DWH�RI�FKDQJH

02'7,0( 7LPH�RI�FKDQJH

2.)/$* 1� �1R�DXWKRUL]DWLRQ�FKHFNV;� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH<� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH��GHIDXOW�YDOXHV�LQ�862%7B&8� �1RW�PDLQWDLQHG

7KH�1$0(�DQG�7<3(�ILHOGV�LGHQWLI\�D�WUDQVDFWLRQ��DQG�2%-(&7�LGHQWLILHV�WKH�DXWKRUL]DWLRQREMHFW��02',),(5��02''$7(��02'7,0(�FRQWDLQ�DGPLQLVWUDWLYH�LQIRUPDWLRQ�DERXW�WKHPRVW�UHFHQW�FKDQJHV��2.)/$*�LV�LPSRUWDQW�EHFDXVH�ZKHQ�LW�FRQWDLQV�WKH�YDOXH�1��QRDXWKRUL]DWLRQ�FKHFN�LV�SHUIRUPHG�IRU�WKH�WUDQVDFWLRQ�DQG�DXWKRUL]DWLRQ�REMHFW�

([DPSOHV

(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_STUE_BER��2.)/$*� �N��(YHU\DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B678(B%(5�,'����ZLOO�VXFFHHG�UHJDUGOHVV�RI�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�

(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_DRAW_TCD��2.)/$*� �X�RU�DQRWKHU�YDOXH�!�N��$Q�DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B'5$:B7&'�,'����ZLOOVXFFHHG�RQO\�ZKHQ�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKH�FRPELQDWLRQ�RI�ILHOGV�RUILHOG�FRQWHQWV��XQGHU�,'�

Page 367: Authorizations Made Easy

C–1

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH

3DUDPHWHUV

&RQWHQWV

Incorrect Logons, Default Clients, and Default Start Menu............................... C–2

Setting Password Length and Expiration............................................................ C–2

Specifying Impermissible Passwords ................................................................. C–3

Securing SAP* Against Misuse ............................................................................ C–3

Tracing Authorizations.......................................................................................... C–3

Profile Generator and Transaction SU24............................................................. C–4

User Buffer.............................................................................................................. C–4

No Check on Object S_TCODE............................................................................. C–4

No Check on Certain ABAP Objects .................................................................... C–4

RFC Authority Check............................................................................................. C–5

&&

Page 368: Authorizations Made Easy

Appendix C: Important System Profile Parameters

Incorrect Logons, Default Clients, and Default Start Menu

Authorizations Made EasyC–2

,QFRUUHFW�/RJRQV��'HIDXOW�&OLHQWV��DQG�'HIDXOW�6WDUW�0HQX

8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VHW�LQFRUUHFW�ORJRQ�OLPLWV�DQG�WKH�GHIDXOWFOLHQW�< /RJLQ�IDLOVBWRBVHVVLRQBHQG

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�WHUPLQDWHV�WKH�ORJRQ�DWWHPSW��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV��EXW�WKLVYDOXH�FDQ�EH�VHW�WR�DQ\�QXPEHU�EHWZHHQ��²���

< /RJLQ�IDLOVBWRBXVHUBORFN

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�ORFNV�WKH�XVHU�IURP�PDNLQJ�DGGLWLRQDO�ORJRQ�DWWHPSWV��,I�WKH�V\VWHPORFNV��DQ�HQWU\�LV�ZULWWHQ�WR�WKH�V\VWHP�ORJ��DQG�WKH�ORFN�LV�UHOHDVHG�DW�PLGQLJKW��7KHGHIDXOW�LV����WLPHV��EXW�WKLV�YDOXH�FDQ�EH�VHW�WR�DQ\�YDOXH�EHWZHHQ��²���

< /RJLQ�IDLOHGBXVHUBDXWRBXQORFN

7KLV�SDUDPHWHU�XQORFNV�XVHUV�ZKR�JRW�ORFNHG�RXW�E\�ORJJLQJ�RQ�LQFRUUHFWO\��,I�WKHSDUDPHWHU�LV�VHW�WR����WKH�GHIDXOW���GXH�WR�D�SUHYLRXV�LQFRUUHFW�ORJRQ�DWWHPSW��WKH�V\VWHPGRHV�QRW�FRQVLGHU�XVHUV�ORFNHG��7KH�ORFNV�UHPDLQ�LI�WKH�SDUDPHWHU�YDOXH�LV���

< /RJLQ�V\VWHPBFOLHQW

7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�FOLHQW��7KLV�FOLHQW�LV�DXWRPDWLFDOO\�ILOOHG�LQ�RQ�WKHV\VWHP�ORJRQ�VFUHHQ��8VHUV�FDQ�HQWHU�D�GLIIHUHQW�FOLHQW�

< /RJLQ�H[WBVHFXULW\

6LQFH�5HOHDVH����(��H[WHUQDO�VHFXULW\�WRROV�VXFK�DV�.HUEHURV�RU�6HFXGH�KDYH�PDQDJHG5���6\VWHP�DFFHVV��,I�WKLV�SDUDPHWHU�LV�VHW��DQ�DGGLWLRQDO�LGHQWLILFDWLRQ�FDQ�EH�VSHFLILHGIRU�HDFK�XVHU��LQ�XVHU�PDLQWHQDQFH��ZKHUH�XVHUV�ORJ�RQ�WR�WKHLU�VHFXULW\�V\VWHP��7RDFWLYDWH��VHW�WKH�YDOXH�WR�;�

< 6WDUWBPHQX

7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�VWDUW�PHQX�IRU�DOO�XVHUV�DQG�FDQ�EH�RYHUZULWWHQ�ZLWKWKH�XVHU�VSHFLILF�VWDUW�PHQX��WUDQVDFWLRQ�68�����7KH�GHIDXOW�LV�6�����DQG�WKLV�YDOXH�FDQ�EHVHW�WR�DQ\�RWKHU�DUHD�PHQX�FRGH�

6HWWLQJ�3DVVZRUG�/HQJWK�DQG�([SLUDWLRQ

8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VSHFLI\�WKH�PLQLPXP�OHQJWK�RI�D�SDVVZRUGDQG�WKH�IUHTXHQF\�ZLWK�ZKLFK�XVHUV�PXVW�FKDQJH�SDVVZRUGV�< /RJLQ�PLQBSDVVZRUGBOQJ

7KLV�SDUDPHWHU�GHILQHV�WKH�PLQLPXP�SDVVZRUG�OHQJWK��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV�EXW�WKLV�YDOXH�FDQ�EH�VHW�IURP�WKUHH�WR�HLJKW�FKDUDFWHUV�

Page 369: Authorizations Made Easy

Appendix C: Important System Profile Parameters

Specifying Impermissible Passwords

Release 4.6A/BC–3

< /RJLQ�SDVVZRUGBH[SLUDWLRQBWLPH

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�GD\V�DIWHU�ZKLFK�D�SDVVZRUG�PXVW�EH�FKDQJHG�7KH�SDUDPHWHU�DOORZV�XVHUV�WR�NHHS�WKHLU�SDVVZRUGV�ZLWKRXW�WLPH�OLPLW�DQG�OHDYHV�WKHYDOXH�VHW�WR�WKH�GHIDXOW����

7R�PDNH�WKH�SDUDPHWHUV�JOREDOO\�HIIHFWLYH�LQ�DQ�5���6\VWHP��VHW�WKHP�LQ�WKH�GHIDXOW�SURILOH�'()$8/7�3)/��7R�PDNH�WKHP�LQVWDQFH�VSHFLILF��\RX�PXVW�VHW�WKHP�LQ�WKH�SURILOHV�RI�HDFKDSSOLFDWLRQ�VHUYHU�LQ�\RXU�5���6\VWHP�

6SHFLI\LQJ�,PSHUPLVVLEOH�3DVVZRUGV

7R�IRUELG�XVH�RI�D�FHUWDLQ�SDVVZRUG��HQWHU�LW�LQ�WDEOH�865����<RX�FDQ�PDLQWDLQ�WKLV�WDEOH�ZLWKWUDQVDFWLRQ�60����,Q�865����\RX�PD\�DOVR�JHQHULFDOO\�VSHFLI\�SURKLELWHG�SDVVZRUGV�

7KHUH�DUH�WZR�ZLOG�FDUG�FKDUDFWHUV�< $�TXHVWLRQ�PDUN��"��PHDQV�D�VLQJOH�FKDUDFWHU�< $Q�DVWHULVN�� ��PHDQV�D�VHTXHQFH�RI�DQ\�FRPELQDWLRQ�FKDUDFWHUV�RI�DQ\�OHQJWK�

([DPSOHV�< ��� �LQ�WDEOH�865���SURKLELWV�DQ\�SDVVZRUG�WKDW�EHJLQV�ZLWK�WKH�VHTXHQFH�����< ��� �SURKLELWV�DQ\�SDVVZRUG�WKDW�FRQWDLQV�WKH�VHTXHQFH�����< $%"�SURKLELWV�SDVVZRUGV�WKDW�EHJLQ�ZLWK�$%�DQG�KDYH�DQ�DGGLWLRQDO�FKDUDFWHU��VXFK�DV

$%$��$%%��DQG�$%&�

6HFXULQJ�6$3 �$JDLQVW�0LVXVH

/RJLQ�QRBDXWRPDWLFBXVHUBVDS

,I�WKH�SDUDPHWHU�LV�VHW�WR����WKHQ�6$3 �KDV�QR�VSHFLDO�GHIDXOW�SURSHUWLHV��5HVHWWLQJ�WKHSDUDPHWHU�WR���DOORZV�ORJLQV�ZLWK�SAP*��SDVVZRUG�PASS��DQG�XQUHVWULFWHG�V\VWHP�DFFHVVSULYLOHJHV��(YHQ�LI�\RX�VHW�WKH�SDUDPHWHU��HQVXUH�WKDW�WKHUH�LV�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �,I�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �H[LVWV��LW�EHKDYHV�OLNH�D�QRUPDO�XVHU��LV�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV��DQG�LWV�SDVVZRUG�FDQ�EH�FKDQJHG�

7UDFLQJ�$XWKRUL]DWLRQV

$XWK�FKHFNBYDOXHBZULWHBRQ

%\�HQWHULQJ�WUDQVDFWLRQ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DQDO\]H�DQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�WKDW�KDV�MXVW�RFFXUUHG�LQ�\RXU�VHVVLRQ��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�KDYHVHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�D�YDOXH�JUHDWHU�WKDQ����%\�GHIDXOW��WKH�IXQFWLRQ�LVLQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV���

Page 370: Authorizations Made Easy

Appendix C: Important System Profile Parameters

Profile Generator and Transaction SU24

Authorizations Made EasyC–4

3URILOH�*HQHUDWRU�DQG�7UDQVDFWLRQ�68��

$XWK�QRBFKHFNBLQBVRPHBFDVHV

%\�XVLQJ�WUDQVDFWLRQ�SU24��\RX�FDQ�DFWLYDWH�RU�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRUWUDQVDFWLRQV��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�VHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�<��%\GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�DFWLYDWH�WKH�SDUDPHWHU��VHWWKH�YDOXH�WR�<��,I�\RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*��WKH�SDUDPHWHU�PXVW�EH�VHW�

8VHU�%XIIHU

$XWK�DXWKBQXPEHUBLQBXVHUEXIIHU

7R�KDYH�D�JRRG�SHUIRUPDQFH�LQ�WKH�V\VWHP��WKH�QDPHV�RI�DOO�WKH�DXWKRUL]DWLRQV�LQFOXGHG�LQ�DXVHU�PDVWHU�IRU�D�XVHU�DUH�EXIIHUHG�LQ�D�WDEOH��,Q�WKH�VWDQGDUG��WKLV�EXIIHU�FDQ�GHDO�ZLWK�XS�WR������DXWKRUL]DWLRQV��,I�D�XVHU�KDV�PRUH�WKDQ�������DXWKRUL]DWLRQV�WKH�YDOXH�FDQ�EH�VHW�WR������7KH�GHIDXOW�YDOXH�LV������EXW�WKLV�GHIDXOW�YDOXH�FDQ�EH�VHW�WR�EHWZHHQ��²������,I�IRU�DQ\UHDVRQ�\RX�KDYH�WR�UHVHW�WKH�XVHU�EXIIHU��VHH�2QOLQH�6HUYLFH�6\VWHP�QRWH�������DQG�������IRUGHWDLOHG�LQIRUPDWLRQ�

1R�&KHFN�RQ�2EMHFW�6B7&2'(

$XWK�QRBFKHFNBRQBWFRGH

)URP�5HOHDVH����(��WKH�V\VWHP�FKHFNV�RQ�REMHFW�6B7&2'(��,Q�VSHFLILF�LQVWDQFHV��\RX�FDQ�WXUQWKLV�FKHFN�RII��EXW�WKLV�VWHS�UHVXOWV�LQ�D�ELJ�VHFXULW\�ULVN�IRU�\RXU�V\VWHP��%\�GHIDXOW��WKHIXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�VZLWFK�WKH�FKHFN�RII�VHW�WKH�YDOXH�WR�<�

1R�&KHFN�RQ�&HUWDLQ�$%$3�2EMHFWV

$XWK�V\VWHPBDFFHVVBFKHFNBRII

8VH�WKLV�SDUDPHWHU�WR�WXUQ�RII�WKH�DXWRPDWLF�DXWKRUL]DWLRQ�FKHFN�IRU�SDUWLFXODU�$%$3ODQJXDJH�HOHPHQWV��ILOH�RSHUDWLRQV��&3,&�FDOOV��DQG�FDOOV�WR�NHUQHO�IXQFWLRQV���7KLV�SDUDPHWHUHQVXUHV�WKH�GRZQZDUG�FRPSDWLELOLW\�RI�WKH�5���NHUQHO��%\�GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH�YDOXH� ���DQG�FKHFN�UHPDLQV�DFWLYH���7R�WXUQ�WKH�FKHFN�RII��VHW�WKH�YDOXH�WR���

Page 371: Authorizations Made Easy

Appendix C: Important System Profile Parameters

RFC Authority Check

Release 4.6A/BC–5

5)&�$XWKRULW\�&KHFN

$XWK�UIFBDXWKRULW\BFKHFN

<RX�FDQ�XVH�WKLV�SDUDPHWHU�WR�GHWHUPLQH�ZKHWKHU�REMHFW�6B5)&�LV�FKHFNHG�GXULQJ�5)&�FDOOV�< 9DOXH� ����QR�FKHFN�DJDLQVW�6B5)&< 9DOXH� ����FKHFN�DFWLYH�EXW�QR�FKHFN�IRU�65)&�)8*5

< 9DOXH� ����FKHFN�DFWLYH�DQG�FKHFN�DJDLQVW�65)&�)8*5

Page 372: Authorizations Made Easy

Appendix C: Important System Profile Parameters

RFC Authority Check

Authorizations Made EasyC–6

Page 373: Authorizations Made Easy

G–1

*ORVVDU\

7HUP 'HILQLWLRQ

$%$3 $%$3�LV�DQ�LQWHUSUHWDWLYH��SODWIRUP�LQGHSHQGHQW��IRXUWK�JHQHUDWLRQ�ODQJXDJHWDLORUHG�WR�GHYHORS�EXVLQHVV�DSSOLFDWLRQV��7KH�ODQJXDJH�VXSSRUWV�VWUXFWXUHGSURJUDPPLQJ�DQG�FRQWDLQV�HOHPHQWV�QHFHVVDU\�WR�FDOO�H[WHUQDO�UHODWLRQDO�GDWDEDVHVWKURXJK�RSHQ�64/�FDOOV�RU�GDWDEDVH�VSHFLILF�QDWLYH�64/�FDOOV��7KH�GHYHORSHU�LV�QRWUHTXLUHG�WR�NQRZ�WKH�XQGHUO\LQJ�LQIUDVWUXFWXUH�

$%$3'HYHORSPHQW:RUNEHQFK

7KH�$%$3�'HYHORSPHQW�:RUNEHQFK�SURYLGHV�D�FRPSOHWH�FOLHQW�VHUYHU�UXQWLPHHQYLURQPHQW�DQG�H[WHQVLYH�PDQDJHPHQW�DQG�WXQLQJ�WRROV��7KH�:RUNEHQFK�LV�6$3·VLQWHJUDWHG�WRRO�VHW�WR�GHYHORS�HQWHUSULVH�ZLGH�FOLHQW�VHUYHU�DSSOLFDWLRQV��7KLV�WRRO�VHW�LV�SDUWLFXODUO\�VXLWHG�WR�5���FXVWRPHUV�ZKR�ZDQW�WR�HQKDQFH�VWDQGDUG�5��EXVLQHVV�DSSOLFDWLRQV�ZLWK�FXVWRPL]HG��DGG�RQ�IXQFWLRQDOLW\�

7KH�PDMRU�FRPSRQHQWV�RI�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�LQFOXGH�< $%$3�3URJUDPPLQJ�/DQJXDJH< $%$3�'LFWLRQDU\< $%$3�(GLWRU< $%$3�)XQFWLRQ�/LEUDU\< 'DWD�0RGHOHU< 5���5HSRVLWRU\< 7HVW�7RROV��6FUHHQ�3DLQWHU< 0HQX�3DLQWHU��:RUNEHQFK�2UJDQL]HU�7UDQVSRUW�6\VWHP< 5���5HSRVLWRU\�,QIRUPDWLRQ�6\VWHP7KH�ZRUNEHQFK�LV�DOVR�DYDLODEOH�WR�FRPSDQLHV�ZKR�DUH�QRW�5���XVHUV��EXW�ZDQW�WKHEHQHILWV�RI�6$3·V�SURYHQ�GHYHORSPHQW�HQYLURQPHQW�IRU�WKHLU�VRIWZDUH�SURMHFWV�

$%$3�'LFWLRQDU\ 7KH�$%$3�'LFWLRQDU\��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��LV�D�FHQWUDOLQIRUPDWLRQ�EDVH�IRU�DSSOLFDWLRQ�DQG�V\VWHP�GDWD��7KH�'LFWLRQDU\�GHVFULEHV�WKLVGDWD�IURP�D�ORJLFDO�SRLQW�RI�YLHZ�DQG�VWRUHV�LQIRUPDWLRQ�DERXW�KRZ�WKH�GDWD�LVUHSURGXFHG�LQ�WKH�XQGHUO\LQJ�UHODWLRQDO�GDWDEDVH��7KH�$%$3�'LFWLRQDU\�LV�DFWLYHDQG�IXOO\�LQWHJUDWHG�ZLWK�WKH�RWKHU�'HYHORSPHQW�:RUNEHQFK�WRROV��$Q\�FKDQJHV�WRWKH�'LFWLRQDU\�DUH�DXWRPDWLFDOO\�DQG�LPPHGLDWHO\�XSGDWHG�WKURXJKRXW�WKH�V\VWHP�

Page 374: Authorizations Made Easy

*ORVVDU\

Authorizations Made EasyG–2

7HUP 'HILQLWLRQ

$%$3�(GLWRU 7KH�$%$3�(GLWRU��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��SURYLGHV�WKHIROORZLQJ�IXQFWLRQV�WR�VXSSRUW�WKH�DSSOLFDWLRQ�GHYHORSHU�< 6\QWD[�FKHFN�ZLWK�DXWRPDWLF�FRUUHFWLRQ�RI�HUURUV< ,QVHUWLRQ�RI�FRGLQJ�SDWWHUQV�IRU�IUHTXHQWO\�XVHG�LQVWUXFWLRQV< 1DYLJDWLRQ�LQWR�RWKHU�ZRUNEHQFK�WRROV< *HQHUDWLRQ�RI�ZKHUH�XVHG�OLVWV�IRU�DOO�GDWD�REMHFWV< 6SOLW�VFUHHQ�HGLWRU�ZLWK�SURJUDP�FRPSDULVRQ

$FWLYDWLRQDGPLQLVWUDWRU

$Q�DFWLYDWLRQ�DGPLQLVWUDWRU�DFWLYDWHV�DXWKRUL]DWLRQ�SURILOHV�DQG�DXWKRUL]DWLRQV�PDNLQJ�WKHP�HIIHFWLYH�LQ�WKH�V\VWHP��7KHVH�DGPLQLVWUDWRUV�FDQ�RQO\�FKDQJH�RUGHOHWH�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�VSHFLILHG�LQ�WKHLU�DXWKRUL]DWLRQ�SURILOH�

$FWLYH�SODQYHUVLRQ

7KLV�LV�WKH�SODQ�YHUVLRQ�WKDW�WKH�5���6\VWHP�UHFRJQL]HV�DV�YDOLG�DQG�FXUUHQWO\�LQRSHUDWLRQ��7KH�LQIRUPDWLRQ�LQ�WKH�DFWLYH�SODQ�YHUVLRQ�LV�XVHG�WR�SHUIRUP�DOO�GD\�WR�GD\�SURFHVVLQJ�DQG�FURVV�DSSOLFDWLRQ�PDLQWHQDQFH�

<RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DFWLYH�LI�< <RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU< ,QWHJUDWLRQ�LV�DFWLYH�EHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV��VXFK�DV

WKH�3*

<RXU�VHOHFWHG�SODQ�VKRXOG�UHIOHFW�WKH�DFWXDO�VWDWH�RI�RSHUDWLRQV�DW�\RXU�ILUP��$Q\RWKHU�SODQ�YHUVLRQV�\RXU�FRPSDQ\�PDLQWDLQV�FDQ�EH�XVHG�WR�H[SHULPHQW�ZLWKGLIIHUHQW�RUJDQL]DWLRQDO�VFHQDULRV�

$FWLYLW\�JURXS $Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�LQGLYLGXDO�DFWLYLWLHV�WKDW�DUH�URXWLQHO\SHUIRUPHG�WRJHWKHU�RU�DUH�DIILOLDWHG�LQ�VRPH�ZD\���)RU�H[DPSOH��WKH�WUDQVODWLRQWDVNV�DFWLYLW\�JURXS�FRXOG�LQFOXGH�DOO�WDVNV��UHSRUWV��DQG�WUDQVDFWLRQV�DVVRFLDWHGZLWK�WUDQVODWLRQ��<RX�VHW�XS�DFWLYLW\�JURXSV�E\�OLQNLQJ�VLQJOH�DFWLYLWLHV�XQGHU�DQDFWLYLW\�JURXS�QDPH��$�VLQJOH�DFWLYLW\�PD\�EH�LQFOXGHG�LQ�PRUH�WKDQ�RQH�DFWLYLW\JURXS�

$SSOLFDWLRQVHUYHU

$�FRPSXWHU�ZKHUH�WKH�DSSOLFDWLRQ�ORJLF�DQG�DSSOLFDWLRQ�FRQWURO�VHUYLFHV�RI�WKH�5��6\VWHP�UXQ�

$XWKRUL]DWLRQ $Q�DXWKRUL]DWLRQ�LV�WKH�DXWKRULW\�WR�SHUIRUP�D�SDUWLFXODU�DFWLRQ�LQ�WKH�5���6\VWHP�(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�RQH�DXWKRUL]DWLRQ�REMHFW�DQG�GHILQHV�RQH�RU�PRUHSRVVLEOH�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�OLVWHG�IRU�WKDW�DXWKRUL]DWLRQ�REMHFW��$XVHU·V�DXWKRUL]DWLRQV�DUH�FRPELQHG�LQ�D�SURILOH�WKDW�LV�HQWHUHG�LQ�WKH�XVHU·V�PDVWHUUHFRUG�

$XWKRUL]DWLRQDGPLQLVWUDWRU

7KH�XVHU�UHVSRQVLEOH�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�LVWKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU��)RU�VHFXULW\�UHDVRQV��WKLV�XVHU�VKRXOG�QRW�EHDXWKRUL]HG�WR�DFWLYDWH�DXWKRUL]DWLRQV�DQG�SURILOHV�RU�WR�PDLQWDLQ�XVHU�PDVWHUUHFRUGV��2WKHUZLVH��RQH�XVHU�ZRXOG�VLQJOH�KDQGHGO\�GHILQH��DFWLYDWH��DQG�DVVLJQV\VWHP�DFFHVV�DXWKRUL]DWLRQV�

Page 375: Authorizations Made Easy

*ORVVDU\

Release 4.6A/B �G–3

7HUP 'HILQLWLRQ

$XWKRUL]DWLRQFKHFN

7KLV�FKHFN�GHFLGHV�ZKHWKHU�D�XVHU�LV�DXWKRUL]HG�WR�H[HFXWH�D�SDUWLFXODU�IXQFWLRQ�3URFHVVHV��IXQFWLRQV��DQG�GDWD�DFFHVVHV�LQ�WKH�5���6\VWHP�FDQ�RQO\�EH�SHUIRUPHGZKHQ�XVHU�DXWKRUL]DWLRQV�KDYH�EHHQ�FKHFNHG�LQ�WKH�UHVSHFWLYH�V\VWHP�DQGDSSOLFDWLRQ�SURJUDPV�

$XWKRUL]DWLRQFRQFHSW

*HQHUDO�DFFHVV�WR�D�VWDQGDUG�GDWDEDVH�IRU�GLIIHUHQW�DSSOLFDWLRQV�UHTXLUHV�UHOLDEOHPHFKDQLVPV�GHVLJQHG�WR�HQVXUH�WKH�FRQILGHQWLDOLW\�RI�SHUVRQDO�LQIRUPDWLRQ��$PXOWLOHYHO��JUDGHG�DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�VHW�XS�WR�UHJXODWH�GDWD�DFFHVV�2QO\�WKRVH�SHRSOH�ZLWK�DFWLYH�XVHU�PDVWHU�UHFRUGV�FDQ�DFFHVV�WKH�V\VWHP��7KHDXWKRUL]DWLRQ�FRQFHSW�FRYHUV�WKH�VWUXFWXUH�DQG�IXQFWLRQDOLW\�RI�DXWKRUL]DWLRQDVVLJQPHQW�DQG�FKHFNLQJ�LQ�WKH�5���6\VWHP��$XWKRUL]DWLRQV�SURWHFW�WKH�V\VWHPIURP�XQDXWKRUL]HG�DFFHVV�

$XWKRUL]DWLRQILHOG

2QH�HOHPHQW�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�DXWKRUL]DWLRQ�ILHOG��,Q�DXWKRUL]DWLRQREMHFWV��WKHVH�ILHOGV�UHSUHVHQW�YDOXHV�IRU�LQGLYLGXDO�V\VWHP�HOHPHQWV��ZKLFKXQGHUJR�DXWKRUL]DWLRQ�FKHFNLQJ�WR�YHULI\�D�XVHU·V�DXWKRUL]DWLRQ�

$XWKRUL]DWLRQJURXS

$Q�DXWKRUL]DWLRQ�JURXS�LV�WKH�FRPELQHG�ILHOGV�RI�WKH�DXWKRUL]DWLRQ�REMHFWV6B'(9(/23��SURJUDP�GHYHORSPHQW�DQG�SURJUDP�H[HFXWLRQ��DQG�6B352*5$0�SURJUDP�PDLQWHQDQFH���7KH�DXWKRUL]DWLRQ�JURXS�ILHOG�FRQWDLQV�WKH�QDPH�RI�DSURJUDP�JURXS�WKDW�DOORZV�XVHUV�WR�SHUIRUP�WKH�IROORZLQJ�RSHUDWLRQV�< ([HFXWH�SURJUDPV< 6FKHGXOH�MREV�IRU�EDFNJURXQG�SURFHVVLQJ< 0DLQWDLQ�SURJUDPV< 0DLQWDLQ�YDULDQWV

:KHQ�FUHDWLQJ�D�SURJUDP��\RX�FDQ�VSHFLI\�DQ�DXWKRUL]DWLRQ�JURXS�DV�RQH�RI�WKHSURJUDP�DWWULEXWHV��7KLV�VWHS�DOORZV�\RX�WR�JURXS�SURJUDPV�IRU�DXWKRUL]DWLRQFKHFNLQJ�

$XWKRUL]DWLRQREMHFW

$QRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�LV�WKH�DXWKRUL]DWLRQ�REMHFW�WKDW�DOORZV\RX�WR�GHILQH�FRPSOH[�DXWKRUL]DWLRQV��$Q�DXWKRUL]DWLRQ�REMHFW�JURXSV�XS�WR���DXWKRUL]DWLRQ�ILHOGV�LQ�DQ�´$1'µ�UHODWLRQVKLS�WR�FKHFN�ZKHWKHU�D�XVHU�LV�DOORZHG�WRSHUIRUP�D�FHUWDLQ�DFWLRQ��7R�SDVV�DQ�DXWKRUL]DWLRQ�WHVW�IRU�DQ�REMHFW��WKH�XVHU�PXVWVDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKDW�REMHFW�

$XWKRUL]DWLRQSURILOH

7KH�DXWKRUL]DWLRQ�SURILOH�LV�DQRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�WKDW�JLYHVXVHUV�DFFHVV�WR�WKH�V\VWHP��7KH�SURILOHV�FRQWDLQ�DXWKRUL]DWLRQV�LGHQWLILHG�E\�WKHDXWKRUL]DWLRQ�REMHFW�DQG�WKH�DXWKRUL]DWLRQ�QDPH��,I�D�SURILOH�LV�VSHFLILHG�LQ�D�XVHUPDVWHU�UHFRUG��WKH�XVHU�KDV�DOO�WKH�DXWKRUL]DWLRQV�GHILQHG�LQ�WKDW�SURILOH�

$XWKRUL]DWLRQWUDFH

7KLV�LV�D�WUDQVDFWLRQ�WKDW�UHFRUGV�DOO�WKH�UHTXLUHG�DXWKRUL]DWLRQ�REMHFWV�LQ�DSURFHVVLQJ�VWHS�

%DFNJURXQGSURFHVV

7KH�EDFNJURXQG�SURFHVV�LV�WKH�QRQLQWHUDFWLYH�H[HFXWLRQ�RI�SURJUDPV��ZKLFK�LQ�WKH5���6\VWHP��DUH�KDQGOHG�OLNH�RQOLQH�RSHUDWLRQV��%DFNJURXQG�SURFHVVHV�RIWHQ�XVHWKH�VDPH�SURJUDPV�WKDW�FRQWURO�WKH�GLDORJV�

Page 376: Authorizations Made Easy

*ORVVDU\

Authorizations Made Easy� G–4

7HUP 'HILQLWLRQ

%XVLQHVV�SURFHVV %XVLQHVV�SURFHVVHV�JURXS�WDVNV�PDGH�DFURVV�FRVW�FHQWHUV�LQ�\RXU�FRPSDQ\��7KLVSURFHVV�HQDEOHV�\RX�WR�VWUXFWXUH�\RXU�FRPSDQ\·V�SURFHVVHV�E\�IXQFWLRQ�

([DPSOHV�LQFOXGH�< 'HYHORSLQJ�D�SURGXFW< 'UDZLQJ�XS�D�TXRWDWLRQ< 3XUFKDVLQJ�D�PDWHULDO< 3URFHVVLQJ�DQ�RUGHU

%XVLQHVV:RUNIORZ��6$3�

7KLV�VXSSRUW��SURYLGHG�IRU�E\�WUDQVDFWLRQ�SURFHVVLQJ�LQ�WKH�5���6\VWHP��WDNHV�LQWRDFFRXQW�WKH�EXVLQHVV�HQYLURQPHQWV·�QHHGV�

&KHFN�LQGLFDWRU $�FKHFN�LQGLFDWRU�LV�VHW�WR�GHWHUPLQH�ZKHWKHU�DXWKRUL]DWLRQ�REMHFWV�DUHXQPDLQWDLQHG��QRW�FKHFNHG��FKHFNHG��RU�FKHFNHG�PDLQWDLQHG�

&OLHQW�VHUYHUDUFKLWHFWXUH����WLHU

2ZLQJ�WR�WKH�VRIWZDUH�RULHQWHG�FOLHQW�VHUYHU�DUFKLWHFWXUH�RI�WKH�5���6\VWHP��ORJLFDQG�GDWD�RI�WKH�WKUHH�LPSOHPHQWHG�OHYHOV³GDWDEDVH��DSSOLFDWLRQ��DQG�SUHVHQWDWLRQVHUYLFHV³FDQ�EH�GLVWULEXWHG�DPRQJ�GHGLFDWHG�VHUYHUV��7KH�LQGLYLGXDO�VHUYLFHV�FDQEH�IOH[LEOH��HLWKHU�DV�FOLHQWV�RU�VHUYHUV��GHSHQGLQJ�RQ�WKH�WDVNV�WR�EH�SHUIRUPHG�LQHDFK�FDVH�

&RPSRVLWHDFWLYLW\�JURXSV

$�FRPSRVLWH�DFWLYLW\�JURXS�LV�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�PXOWLSOH�DFWLYLW\JURXSV�

&XVWRPL]LQJ�&RQILJXUDWLRQ

,Q�6$3�WHUPLQRORJ\��FXVWRPL]LQJ�LV�WKH�LPSOHPHQWDWLRQ�RI�FRQILJXUDWLRQV�ZLWKLQWKH�IOH[LELOLW\�RI�WKH�5���6\VWHP��,W�LV�WKH�EDVLV�IRU�HYHU\�5���SURMHFW��ZKHWKHU�LW�LVDQ�LQWURGXFWLRQ��VXEVHTXHQW�SURMHFW�VWDJH��RU�SURFHVV�FKDQJH��7KH�FRQILJXUDWLRQLQFOXGHV�

< 5���3URFHGXUH�0RGHO��D�SURFHGXUDO�JXLGH�IRU�VWUXFWXULQJ�D�6$3LPSOHPHQWDWLRQ

< 5���5HIHUHQFH�0RGHO�LQ�WKH�%XVLQHVV�1DYLJDWRU��D�JUDSKLFDO�GHVFULSWLRQ�RIEXVLQHVV�SURFHVVHV

< ,PSOHPHQWDWLRQ�*XLGH��,0*���PHQX�OHG�SDUDPHWHU�VHWWLQJV< 3URMHFW�PDQDJHPHQW�WKURXJK�XSORDG�DQG�GRZQORDG�IDFLOLWLHV�DQG�WR�DQG�IURP

0LFURVRIW�3URMHFW< $�PRGHO�FRPSDQ\��,'(6���D�IXOO\�LQWHJUDWHG�DQG�SUHFRQILJXUHG�V\VWHP�XVHG�IRU

WUDLQLQJ�DQG�WHVWLQJ

7KH�FXVWRPL]LQJ�WRROV�DOVR�EHORQJ�WR�WKH�%XVLQHVV�(QJLQHHULQJ�:RUNEHQFK�DQG�DUHSURYLGHG�DW�QR�H[WUD�FKDUJH�ZLWK�WKH�5���6\VWHP��$GG�RQ�FXVWRPL]LQJ�LV�GLVFXVVHGLQ�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�VHFWLRQ�

'DWDEDVH�VHUYHU 7KLV�LV�WKH�FRPSXWHU�ZKHUH�D�GDWDEDVH�LV�LQVWDOOHG��6SHFLDOO\�RSWLPL]HG�KDUGZDUHPD\�EH�XVHG�IRU�UXQQLQJ�GDWDEDVHV�

Page 377: Authorizations Made Easy

*ORVVDU\

Release 4.6A/B �G–5

7HUP 'HILQLWLRQ

'HVNWRS $�3&�WKDW�LV�XVHG�DV�D�ZRUNVWDWLRQ�LV�FRQVLGHUHG�WR�EH�GHVNWRS��,GHDOO\��WKH�GHVNWRSKDV�DFFHVV�WR�DOO�V\VWHPV�DQG�IXQFWLRQV�QHHGHG�IRU�D�XVHU�WR�PDQDJH�DXWKRUL]HGWDVNV�

'\QSUR 6KRUW�IRU�G\QDPLF�SURJUDP��D�G\QSUR�FRQVLVWV�RI�D�VFUHHQ�DQG�DVVRFLDWHG�SURFHVVLQJORJLF��VXFK�DV�YDOLGDWLRQ�SURFHGXUHV��(DFK�G\QSUR�FRQWUROV�H[DFWO\�RQH�GLDORJ�VWHS�

(DV\�$FFHVV�0HQX 7KH�(DV\�$FFHVV�PHQX�LV�6$3·V�QHZ�*8,�IRU�ZRUNLQJ�ZLWK�WKH�5���6\VWHP��7KH(DV\�$FFHV�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROH�WHPSODWH�WKDW�KDV�EHHQ�DVVLJQHG�WR�DQXVHU��7KH�PHQX�FRQWDLQV�RQO\�WKRVH�WUDQVDFWLRQV�DQG�UHSRUWV�WKDW�WKH�XVHU�JRWDVVLJQHG�WKURXJK�WKH�DFWLYLW\�JURXS�DVVLJQHG�WR�KLP��7KHUHIRUH�WKH�XVHU�ZLOO�RQO\VHH�WKRVH�WUDQVDFWLRQV�KH�LV�DOORZHG�WR�SHUIRUP�

$�XVHU�FDQ�FKRRVH�EHWZHHQ�WZR�GLIIHUHQW�YLHZV�RI�5���< 7KH�FRPSOHWH�6$3�PHQX< 7KH�XVHU�VSHFLILF�PHQX

*HQHUDWH 7KLV�IXQFWLRQ�VDYHV�DQG�DFWLYDWHV�DQ�REMHFW��%HIRUH�DFWLYDWLQJ�WKH�REMHFW��WKH�V\VWHPDXWRPDWLFDOO\�SHUIRUPV�D�FRQVLVWHQF\�FKHFN�

*66�$3, 7KH�*66�$3,�LV�WKH�VWDQGDUGL]HG�6HFXULW\�$3,�ZLWK�D�VWDQGDUG�FRPPXQLFDWLRQPRGHO�WR�DEVWUDFW�IURP�WKH�LQGLYLGXDO�SURGXFWV�DQG�WKHLU�FKDUDFWHULVWLFV��7KH&RPPRQ�$XWKHQWLFDWLRQ�7HFKQRORJLHV��&$7��ZRUN�JURXS�RI�WKH�,QWHUQHW(QJLQHHULQJ�7DVN�)RUFH��,(7)��GHILQHV�WKH�VWDQGDUGL]DWLRQ�SURSRVDOV��7KHIXQFWLRQDO�VSHFLILFDWLRQ�RI�*66�$3,�9HUVLRQ����WKH�YHUVLRQ�VXSSRUWHG�E\�5����LVFXUUHQWO\�DQ�,QWHUQHW�GUDIW�

+XPDQ�UHVRXUFHVSODQQLQJ

3HUVRQQHO�SODQQLQJ�DQG�GHYHORSPHQW�GHDOV�ZLWK�DQWLFLSDWLQJ�IXWXUH�SHUVRQQHOQHHGV��3ODQQHUV�VKRXOG�FRQVLGHU�VKRUW���PHGLXP���DQG�ORQJ�WHUP�JRDOV�ZKHQFRQVLGHULQJ�FRPSDQ\�SROLF\�DQG�WKH�FRVWV�LQYROYHG��*RRG�KXPDQ�UHVRXUFHVSODQQLQJ�HQVXUHV�WKDW�WKH�FRPSDQ\�KDV�WKH�DSSURSULDWH�QXPEHU�RI�HPSOR\HHV�ZLWKWKH�UHTXLUHG�VNLOOV�LQ�WKH�FRUUHFW�SRVLWLRQ�

,0*�DFWLYLW\ $Q�,PSOHPHQWDWLRQ�JXLGH��,0*��DFWLYLW\�LV�DQ�H[SODQDWLRQ�RI�D�V\VWHP�VHWWLQJDFWLYLW\��$FWLYLWLHV�LQ�WKH�,0*�DUH�OLQNHG�GLUHFWO\�WR�WKH�FRUUHVSRQGLQJ�FXVWRPL]LQJWUDQVDFWLRQV��XVHG�WR�FUHDWH�WKH�DSSURSULDWH�V\VWHP�VHWWLQJ��<RX�FDQ�XVH�,0*DFWLYLWLHV�WR�UHFRUG�WKH�QRWHV�WKDW�GRFXPHQW�\RXU�V\VWHP�VHWWLQJV��<RX�FDQ�DOVR�EDVHWKH�UHFRUGLQJ�RU�VWDWXV�RI�SURMHFW�PDQDJHPHQW�LQIRUPDWLRQ�RQ�,0*�DFWLYLWLHV�

,PSOHPHQWDWLRQ 7KLV�SURFHVV�LQYROYHV�VZLWFKLQJ�IURP�DQ�H[LVWLQJ�PDQDJHPHQW�V\VWHP�DQG�EXVLQHVVSUDFWLFH�DQG�KDYLQJ�5���UXQ�SDUW�RI��RU�WKH�HQWLUH��EXVLQHVV�

Page 378: Authorizations Made Easy

*ORVVDU\

Authorizations Made EasyG–6

7HUP 'HILQLWLRQ

,PSOHPHQWDWLRQ*XLGH

$OVR�UHIHUUHG�WR�DV�WKH�,0*��WKH�JXLGH�LV�D�WRRO�IRU�FRQILJXULQJ�WKH�5���6\VWHP�WRPHHW�FXVWRPHU�UHTXLUHPHQWV��)RU�HDFK�EXVLQHVV�DSSOLFDWLRQ��WKH�LPSOHPHQWDWLRQJXLGH�< ([SODLQV�DOO�WKH�VWHSV�LQ�WKH�LPSOHPHQWDWLRQ�SURFHVV< 7HOOV�\RX�WKH�6$3�VWDQGDUG��IDFWRU\��VHWWLQJV< 'HVFULEHV�V\VWHP�FRQILJXUDWLRQ�ZRUN��DFWLYLWLHV��DQG�LQWHUDFWLYHO\�RSHQV�WKH

DFWLYLWLHV

7KH�,0*�DUH�VWUXFWXUHG�DV�K\SHUWH[W��7KH�KLHUDUFKLFDO�VWUXFWXUH�UHIOHFWV�WKHVWUXFWXUH�RI�WKH�5���EXVLQHVV�DSSOLFDWLRQ�FRPSRQHQWV�DQG�OLVWV�DOO�WKHGRFXPHQWDWLRQ�UHODWHG�WR�LPSOHPHQWLQJ�5����7KH�,0*�FRQWDLQV�DFWLYH�IXQFWLRQVZLWK�ZKLFK�\RX�FDQ�< 2SHQ�FXVWRPL]LQJ�WUDQVDFWLRQV< :ULWH�SURMHFW�GRFXPHQWDWLRQ< 0DLQWDLQ�VWDWXV�LQIRUPDWLRQ< 6XSSRUW�\RXU�SURMHFW�GRFXPHQWDWLRQ�ZRUN�DQG�WKH�PDQDJHPHQW�RI�\RXU�5��

6\VWHP�LPSOHPHQWDWLRQ�

,PSOHPHQWDWLRQSURMHFW

7KLV�SURMHFW�UHODWHV�WR�WKH�LPSOHPHQWDWLRQ�RI�D�VSHFLILF�JURXS�RI�5���IXQFWLRQV�DQGSURFHVVHV�ZLWK�D�FRPPRQ�JR�OLYH�GDWH�

,PSOHPHQWDWLRQVWUDWHJ\

$Q�LPSOHPHQWDWLRQ�VWUDWHJ\�LV�DQ�DSSURDFK�WR�5���LPSOHPHQWDWLRQ��7KH�VWUDWHJ\�LVEDVHG�RQ�ORQJ�WHUP�SHUVSHFWLYHV�DQG�LQFOXGHV�DOO�VWHSV�DFURVV�WKH�ZKROH�HQWHUSULVHSODQQHG�LQ�FRQQHFWLRQ�ZLWK�LPSOHPHQWLQJ�WKH�5���6\VWHP��(VWDEOLVKLQJ�WKLVVWUDWHJ\�LV�DQ�HVVHQWLDO�SDUW�RI�SURMHFW�SUHSDUDWLRQ�DQG�LPSDFWV�WKH�VHTXHQFH�RILPSOHPHQWDWLRQ�SURMHFWV�

,QIRW\SH ,QIRW\SHV�DOORZ�\RX�WR�GHVFULEH��RU�GHILQH�WKH�GLIIHUHQW�DWWULEXWHV�WKDW�REMHFWV�KDYH�:LWKLQ�SHUVRQQHO�GHYHORSPHQW��3'��WKHUH�DUH�PDQ\�GLIIHUHQW�LQIRW\SHV��HDFK�RQHGHVFULELQJ�D�VSHFLILF�VHW�RI�DWWULEXWHV��6RPH�LQIRW\SHV�DSSO\�RQO\�WR�FHUWDLQ�W\SHV�RIREMHFWV��ZKLOH�RWKHUV�FDQ�EH�GHILQHG�IRU�DQ\�W\SH�RI�REMHFW�

,QVWDQFH�SURILOH 7KH�LQVWDQFH�SURILOH�FRQWDLQV�DSSOLFDWLRQ�VHUYHU�VSHFLILF�FRQILJXUDWLRQ�SDUDPHWHUV�ZKLFK�FRPSOHWH�WKH�VHW�YDOXHV�RI�WKH�GHIDXOW�SURILOH�

-RE $�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�VHFUHWDU\�DQG�PDQDJHU�0DQ\�HPSOR\HHV�PD\�KDYH�WKH�VDPH�MRE�FODVVLILFDWLRQ��7KDW�LV��WKHUH�FDQ�EH���VHFUHWDULHV�DQG�HLJKW�PDQDJHUV��-REV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�SRVLWLRQV��VHHEHORZ��

0HQX 0HQXV�DUH�FRQWURO�HOHPHQWV��RIIHULQJ�WKH�XVHU�D�UDQJH�RI�RSWLRQV�ZKLFK��ZKHQFKRVHQ��SURPSWV�WKH�V\VWHP�WR�H[HFXWH�DQ�DFWLRQ��7KH�OD\RXW�RI�WKH�PHQX�EDU�KDVEHHQ�GHILQHG�IRU�HDFK�5���6\VWHP�OHYHO��0HQX�RSWLRQV�DUH�VHOHFWHG�HLWKHU�ZLWK�DVLQJOH�PRXVH�FOLFN�RU�E\�SRVLWLRQLQJ�WKH�FXUVRU�DQG�E\�SUHVVLQJ�(QWHU�

Page 379: Authorizations Made Easy

*ORVVDU\

Release 4.6A/B �G–7

7HUP 'HILQLWLRQ

0HQX�EDU $�PHQX�EDU�LV�WKH�EDU�DFURVV�WKH�WRS�RI�WKH�ZLQGRZ�ORFDWHG�MXVW�DERYH�WKH�VWDQGDUGWRROEDUV��:KHQ�\RX�FKRRVH�D�PHQX�RSWLRQ�IURP�WKH�PHQX�EDU��\RX�RSHQ�DGURSGRZQ�PHQX�ZLWK�GLIIHUHQW�FKRLFHV��7KH�V\VWHP�DXWRPDWLFDOO\�LQFOXGHV�WKH6\VWHP�DQG�+HOS�PHQXV�

1DPH�UDQJH 7KH�QDPH�UDQJH�LV�D�NH\�DUHD�RI�D�WDEOH��,W�HIIHFWLYHO\�UHVHUYHV�SDUW�RI�WKH�NH\�DUHDRQO\�IRU�FXVWRPHUV�RU�IRU�6$3�

1HWZRUN�VHFXULW\ 1HWZRUN�VHFXULW\�LV�D�QHWZRUN�FRQQHFWLRQ�FRQILJXUHG�WR�SURWHFW�6$3�DQG�LWVFXVWRPHUV�IURP�SUREOHPV��VXFK�DV�XQDXWKRUL]HG�DFFHVV�LQKHUHQW�WR�:$1�QHWZRUNFRQQHFWLRQV�

2UJDQL]DWLRQDOOHYHO

2UJDQL]DWLRQDO�OHYHOV�DUH�KLHUDUFKLFDO�OHYHOV�ZKHUH�FHUWDLQ�GDWD�LQ�D�PDWHULDO�PDVWHUUHFRUG�LV�FUHDWHG��([DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV�DUH�FOLHQW��SODQW��DQG�VWRUDJHORFDWLRQ�

2QOLQH�6HUYLFH6\VWHP

6HH�6$31HW�²�5���)URQWHQG�QRWHV

3DVVZRUG $�SDVVZRUG�LV�D�XVHU�FRGH�WKDW�FRPSULVHV�WKH�IROORZLQJ�HOHPHQWV�WKDW�XVHUV�QHHG�WRORJRQ�WR�WKH�V\VWHP�< 6WULQJ�RI�ILJXUHV< /HWWHUV< 6SHFLDO�FKDUDFWHUV�WKDW�WKH�XVHU�PXVW�HQWHU< $�XVHU�,'

3ODQ�YHUVLRQ $�SODQ�YHUVLRQ�LV�D�GHVLJQDWHG�DUHD�ZKHUH�\RX�GHSRVLW��RU�VWRUH��VHWV�RI�LQIRUPDWLRQ�:KHQHYHU�\RX�HQWHU�DQ\�LQIRUPDWLRQ�LQ�3'��\RX�PXVW�VSHFLI\�WKH�SODQ�YHUVLRQZKHUH�WKH�LQIRUPDWLRQ�VKRXOG�EH�NHSW��$�VLQJOH�SODQ�YHUVLRQ�FRXOG�LQFOXGHLQIRUPDWLRQ�IURP�DQ\�RI�WKH�3'�PRGXOHV��VXFK�DV�2UJDQL]DWLRQ�DQG�3ODQQLQJ�6HPLQDU�DQG�&RQYHQWLRQ��RU�6KLIW�3ODQQLQJ��<RX�FDQ�PDLQWDLQ�PRUH�WKDQ�RQH�SODQYHUVLRQ���7KLV�DOORZV�\RX�WR�XVH�GLIIHUHQW�SODQ�YHUVLRQV�WR�UHSUHVHQW�GLIIHUHQWVFHQDULRV�IRU�\RXU�ILUP��+RZHYHU��\RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DV�WKHDFWLYH�SODQ�LI�\RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU�DQG�LI�LQWHJUDWLRQ�LV�DFWLYHEHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV�

3RVLWLRQ 3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�SODFHPHQWV�RU�DVVLJQPHQWV�LQ�D�FRPSDQ\��IRUH[DPSOH��VHFUHWDU\�RI�PDUNHWLQJ�RU�D�VDOHV�PDQDJHU���%\�FUHDWLQJ�SRVLWLRQV�DQGFUHDWLQJ�UHODWLRQVKLSV�EHWZHHQ�WKH�SRVLWLRQV��\RX�LGHQWLI\�WKH�DXWKRULW\�VWUXFWXUH�RUFKDLQ�RI�FRPPDQG�DW�\RXU�ILUP��3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�MREV��VHHDERYH��

3UHVHQWDWLRQVHUYHU

$�FRPSXWHU��XVXDOO\�D�3&�RU�0DFLQWRVK��XVHG�IRU�SUHVHQWDWLRQ�LQ�WKH�5���6\VWHP�LVFDOOHG�D�SUHVHQWDWLRQ�VHUYHU�

Page 380: Authorizations Made Easy

*ORVVDU\

Authorizations Made EasyG–8

7HUP 'HILQLWLRQ

3URFHVV�IORZ�YLHZ 7KH�SURFHVV�IORZ�YLHZ�LV�RQH�RI�WKH�WZR�QDYLJDWLRQ�SDWKV�LQ�WKH�%XVLQHVV�1DYLJDWRU�WKH�RWKHU�EHLQJ�WKH�FRPSRQHQW�YLHZ��7KH�SURFHVV�IORZ�YLHZ�RI�WKH�5���5HIHUHQFH0RGHO�SURYLGHV�SURFHVV�RULHQWHG�DFFHVV�WR�WKH�VFHQDULRV�DQG�SURFHVVHV�LQ�WKH0RGHO��,W�LV�DUUDQJHG�DV�D�VWUXFWXUH�ZLWK�WKH�IROORZLQJ�OHYHOV�< (QWHUSULVH�DUHDV< 6FHQDULR�SURFHVVHV< 3URFHVVHV

3URFHVV�VHOHFWLRQPDWUL[

7KH�SURFHVV�VHOHFWLRQ�PDWUL[�LV�D�PRGHO�W\SH�LQ�WKH�5���5HIHUHQFH�0RGHO��7KHPDWUL[�GHVFULEHV�WKH�DVVLJQPHQW�RI�SURFHVVHV�WR�VFHQDULRV��ZKLFK�DUH�WKH�FROXPQV�LQD�SURFHVV�VHOHFWLRQ�PDWUL[��3URFHVVHV�EHORQJLQJ�WR�D�VFHQDULR�DUH�OLVWHG�DQG�DVVLJQHGXQGHU�WKDW�VFHQDULR��FROXPQ�KHDG���6FHQDULR�DQG�SURFHVV�LFRQV�SURYLGH�DFFHVV�WRFRUUHVSRQGLQJ�(3&V�

3URILOH $�SURILOH�LV�D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�SDUWLFXODU�XVHU�JURXSV��HQWHUHG�LQ�WKHXVHU�PDVWHU�UHFRUG��7KH�VDPH�SURILOH�FDQ�EH�DVVLJQHG�WR�DQ\�QXPEHU�RI�XVHUV�

7KHUH�DUH�WZR�W\SHV�RI�DXWKRUL]DWLRQ�SURILOHV�< 6LPSOH��D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�D�SDUWLFXODU�WDVN< &RPSRVLWH��D�FROOHFWLRQ�RI�VHYHUDO�VLPSOH�SURILOHV

3URILOHFRPSDULVRQ

:KHQ�DQ�DFWLYLW\�JURXS�LV�PRGLILHG�XVLQJ�WUDQVDFWLRQ�3)&*��LWV�DVVRFLDWHGDXWKRUL]DWLRQ�SURILOH�LV�QRW�DXWRPDWLFDOO\�XSGDWHG��7KH�XVHU�PXVW�FDUU\�RXW�DSURILOH�FRPSDULVRQ�WR�HQVXUH�WKDW�WKH�DXWKRUL]DWLRQV�FRQWDLQHG�LQ�WKH�DXWKRUL]DWLRQSURILOH�FRUUHVSRQG�ZLWK�WKH�QHZ�FRQWHQWV�RI�WKH�DFWLYLW\�JURXS�

3URILOH�*HQHUDWRU 7KH�3URILOH�*HQHUDWRU��3*��VXSSRUWV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VHWWLQJ�XS�WKHDXWKRUL]DWLRQ�FRQFHSW�DW�WKH�FXVWRPHU�VLWH��$FFRUGLQJ�WR�D�VHW�RI�DSSOLFDWLRQFRPSRQHQWV�FKRVHQ�E\�WKH�DGPLQLVWUDWRU��WKH�3*�DXWRPDWLFDOO\�FUHDWHV�DQDXWKRUL]DWLRQ�SURILOH��7KH�DGPLQLVWUDWRU�FDQ�WKHQ�HDVLO\�FXVWRPL]H�DQG�PRGLI\�WKHDXWKRUL]DWLRQV�LQ�WKH�SURILOH�E\�XVLQJ�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQV�RIIHUHG�E\WKH�3*�

3URJUDP�DWWULEXWH $�SURSHUW\�RI�D�SURJUDP�LV�FDOOHG�D�SURJUDP�DWWULEXWH��7KH�DWWULEXWHV�RI�DQ�$%$3SURJUDP�GHILQH�LWV�EDVLF�FKDUDFWHULVWLFV��VR�WKDW�WKH�V\VWHP�FDQ�SURFHVV�LW�FRUUHFWO\�7KH�SURJUDP�DWWULEXWHV�LQFOXGH�WKH�IROORZLQJ�HOHPHQWV�< 3URJUDP�WLWOH< 3URJUDP�W\SH< 3URJUDP�VWDWXV< $XWKRUL]DWLRQ�JURXS< 'HYHORSPHQW�FODVV

Page 381: Authorizations Made Easy

*ORVVDU\

Release 4.6A/B �G–9

7HUP 'HILQLWLRQ

3XVK�EXWWRQ 3XVK�EXWWRQV��RU�EXWWRQV��DUH�JUDSKLFDO�FRQWURO�HOHPHQWV�WKDW�\RX�FOLFN�RQFH�WRH[HFXWH�WKH�IXQFWLRQV�OLQNHG�WR�WKHP��,Q�WKH�5���6\VWHP��\RX�FDQ�DOVR�VWDUWIXQFWLRQV�ZLWK�WKH�NH\ERDUG��7R�GR�WKLV��SODFH�WKH�FXUVRU�RQ�WKH�EXWWRQ�DQG�SUHVVHLWKHU�WKH�(QWHU�NH\�RU�(QWHU�EXWWRQ��3XVK�EXWWRQV�PD\�FRQWDLQ�WH[W�RU�JUDSKLFV\PEROV�

5DGLR�EXWWRQ 7KH�UDGLR�EXWWRQ�LV�DQRWKHU�JUDSKLFDO�FRQWURO�HOHPHQW�WKDW�DOORZV�WKH�XVHU�WR�VHOHFWDQ�LWHP�IURP�D�OLVW�RI�ILHOGV��,I�WKH�XVHU�LV�DOORZHG�WR�VHOHFW�VHYHUDO�ILHOGV�DW�RQFH�FKHFNER[HV�DUH�XVHG�

5HOHDVH�&KDQJHVDQG�8SJUDGHV

<RX�FDQ�JHQHUDWH�VSHFLILF�,0*�IRU�UHOHDVH�XSJUDGHV�RU�FKDQJHRYHUV��7KHVH�JXLGHVFRQWDLQ�D�VSHFLILF�OLVW�RI�,0*�DFWLYLWLHV��LQFOXGLQJ�DOO�FKDQJHG�RU�QHZ�IXQFWLRQV�LQWKH�QHZ�5���UHOHDVH��7KLV�IDFLOLWDWHV�WKH�LPSOHPHQWDWLRQ�RI�UHOHDVH�SURMHFWV��$OOUHOHDVH�QRWHV�FDQ�DOVR�EH�LPPHGLDWHO\�DFFHVVHG�IURP�WKLV�ORFDWLRQ�

5HSRUW $�UHSRUW�VHOHFWV�GDWD�IURP�D�GDWDEDVH�DQG�GLVSOD\V�LW�LQ�D�VWUXFWXUHG�IRUP�IRUDQDO\VLV��<RX�PD\�SULQW�WKH�UHSRUW�UHVXOWV�RU�GLVSOD\�WKHP�RQOLQH��7KH�V\VWHP�DOVRSURYLGHV�WKH�RSWLRQ�RI�VDYLQJ�WKH�VHOHFWHG�UHSRUW�GDWD��WR�UHYLHZ�ZLWKRXW�KDYLQJ�WRUH�FUHDWH�LW�

5HVSRQVLELOLW\ 5HVSRQVLELOLWLHV�GLIIHUHQWLDWH�DXWKRULW\�SURILOHV�JHQHUDWHG�IURP�DFWLYLW\�JURXSV�5HVSRQVLELOLWLHV�DUH�OLQNHG�WR�DXWKRULW\�SURILOHV�DQG�WR�DFWLYLW\�JURXSV��$Q�DFWLYLW\JURXS�LV�DQ�REMHFW�ZKHUH�\RX�FROOHFW�D�QXPEHU�RI�V\VWHP�DFWLYLWLHV��$Q�DXWKRULW\SURILOH�LV�JHQHUDWHG�XVLQJ�3*��ZKLFK�GHVLJQDWHV�WKH�XVHU·V�DXWKRULWLHV�LQ�WKH�V\VWHP�5HVSRQVLELOLWLHV�GRQ·W�H[LVW�LQ�����DQ\�PRUH�

6$3�%XVLQHVV:RUNIORZ

6$3�%XVLQHVV�:RUNIORZ������FRPSULVHV�WHFKQRORJLHV�DQG�WRROV�WR�DXWRPDWLFDOO\FRQWURO�DQG�H[HFXWH�FURVV�DSSOLFDWLRQ�SURFHVVHV��ZKLFK�SULPDULO\�LQYROYHVFRRUGLQDWLQJ�WKH�< 3HUVRQV�LQYROYHG< :RUN�VWHSV�UHTXLUHG< 'DWD��EXVLQHVV�REMHFWV��WKDW�QHHG�WR�EH�SURFHVVHG

2XU�SULPDU\�JRDOV�ZLWK�WKH�ZRUNIORZ�DUH�WR�UHGXFH�WKURXJKSXW�WLPHV��WR�UHGXFH�WKHFRVWV�LQYROYHG�LQ�PDQDJLQJ�EXVLQHVV�SURFHVVHV��DQG�WR�LQFUHDVH�WUDQVSDUHQF\�DQGTXDOLW\�

6$31HW���5��)URQWHQG�QRWHV

7KH�6$31HW�²�5���)URQWHQG��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6\VWHP��SURYLGHV�DGLUHFW�FRPPXQLFDWLRQ�OLQN�WR�6$3��DOORZLQJ�FXVWRPHUV�WR�TXLFNO\�DQG�HIILFLHQWO\REWDLQ�SUREOHP�VROYLQJ�LQIRUPDWLRQ�IRU�WKH�5���6\VWHP�

6$3�VWDQGDUGPHQX

)URP�WKH�6$3�VWDQGDUG�PHQX��\RX�FDQ�DFFHVV�WKH�IXOO�UDQJH�RI�6$3�IXQFWLRQV�

Page 382: Authorizations Made Easy

*ORVVDU\

Authorizations Made EasyG–10

7HUP 'HILQLWLRQ

6$3�*8, 6$3�*8,�LV�WKH�JUDSKLFDO�XVHU�LQWHUIDFH�RI�WKH�5���6\VWHP�

6$3�URXWHU 6$3�URXWHU�LV�D�VRIWZDUH�PRGXOH�WKDW�DFWV�DV�SDUW�RI�D�ILUHZDOO�V\VWHP��6$3�URXWHUVLPSOLILHV�WKH�FRQILJXUDWLRQ�RI�QHWZRUN�VHFXULW\�DQG�WKH�URXWLQJ�RI�WUDIILF�WR�DQGIURP�5����7KH�6$3�URXWHU�HVWDEOLVKHV�DQ�LQGLUHFW�FRQQHFWLRQ�EHWZHHQ�WKH�5��QHWZRUN�DQG�DQ�RXWHU�QHWZRUN��7KHUH�LV�UHVWULFWHG�DFFHVV�WR�WKH�DSSOLFDWLRQ�OD\HUEHWZHHQ�FOLHQW�VRIWZDUH�DQG�WKH�5���DSSOLFDWLRQ�VHUYHU�

6FUHHQ $�VFUHHQ�LV��HVVHQWLDOO\��WKH�SULPDU\�ZLQGRZ�RI�D�VHVVLRQ�

6HFXUH�1HWZRUN&RPPXQLFDWLRQV�61&�

:LWKLQ�WKH�IUDPHZRUN�RI�WKH�6HFXUH�1HWZRUN�&RPPXQLFDWLRQV�SURMHFW��6$3�LVLPSOHPHQWLQJ�WKH�*66�$3,�LQ�5����HQDEOLQJ�5���WR�EH�LQWHJUDWHG�LQWR�FRPSDQ\�ZLGH�QHWZRUN�VHFXULW\�V\VWHPV��VXFK�DV�.HUEHURV�RU�6HFX'(��$V�WKH�*66�$3,�LV�WKHVWDQGDUG�LQWHUIDFH�LQ�WKH�VHFXULW\�DUHD��6$3�RSHUDWHV�ZLWK�DOO�*66�$3,�FRPSOLDQWVHFXULW\�V\VWHPV�

6HOHFW 7KLV�IXQFWLRQ�DOORZV�\RX�WR�VHOHFW�DQ�REMHFW�IRU�IXUWKHU�SURFHVVLQJ�E\�SODFLQJ�WKHFXUVRU�RQ�WKH�REMHFW�DQG�FOLFNLQJ�RQ�WKH�REMHFW�

6HVVLRQ $�VHVVLRQ�LV�D�ZLQGRZ�ZKHUH�WKH�XVHU�SURFHVVHV�D�FHUWDLQ�WDVN��:KHQ�\RX�ORJ�RQ�WRWKH�5���6\VWHP��LW�DXWRPDWLFDOO\�RSHQV�WKH�ILUVW�VHVVLRQ��EXW�\RX�FDQ�VLPXOWDQHRXVO\RSHQ�XS�WR�QLQH�VHVVLRQV��7KH�QXPEHU�RI�WKH�FXUUHQW�VHVVLRQ�DSSHDUV�LQ�WKH�VWDWXVEDU�

6HVVLRQ�0DQDJHU 7KH�6HVVLRQ�0DQDJHU�GRHV�QRW�H[LVW�LQ�5HOHDVH�����DQ\PRUH��,W�KDV�EHHQ�VXEVWLWXWHGZLWK�WKH�(DV\�$FFHVV�0HQX�

66&5 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5��LV�D�SURFHGXUH�WKDW�UHJLVWHUV�DOOPRGLILFDWLRQV�WR�5���5HSRVLWRU\�REMHFWV�DQG�SURYLGHV�DQ�RYHUYLHZ�RI�PRGLILHG�5��5HSRVLWRU\�REMHFWV��6$3�PDWFKFRGHV�DQG�WXQLQJ�PHDVXUHV��IRU�H[DPSOH��FUHDWLQJGDWDEDVH�LQGLFHV�DQG�EXIIHUV��DUH�QRW�UHJLVWHUHG�E\�66&5�

6\VWHP�SDUDPHWHU $�V\VWHP�SDUDPHWHU�LV�WKH�EDVLF�V\VWHP�FRQILJXUDWLRQ�UHTXLUHG�WR�HQVXUH�VPRRWKIXQFWLRQLQJ�RI�WKH�VRIWZDUH�

7DEOH 'DWD�FDQ�EH�DUUDQJHG�LQ�WDEOH�IRUP��$�WDEOH�FRQVLVWV�RI�FROXPQV��GDWD�YDOXHV�RI�WKHVDPH�W\SH��DQG�URZV��GDWD�UHFRUGV���)LHOGV�LGHQWLI\�D�UHFRUG�

7UDQVDFWLRQ $�WUDQVDFWLRQ�LV�D�VHULHV�RI�UHODWHG�VWHSV�UHTXLUHG�WR�SHUIRUP�D�FHUWDLQ�WDVN�

7UDQVDFWLRQ�FRGH $�VHTXHQFH�RI�IRXU�FKDUDFWHUV�UHSUHVHQWV�D�6$3�WUDQVDFWLRQ��7R�FDOO�D�WUDQVDFWLRQ�LQWKH�5���6\VWHP��\RX�FDQ�IROORZ�DQ�,0*�SDWK�RU�HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKHFRPPDQG�ILHOG��)RU�H[DPSOH��60���LV�WKH�FRGH�IRU�WKH�WDEOH�PDLQWHQDQFHWUDQVDFWLRQ�

8VHU�PDLQWHQDQFH 8VHU�PDLQWHQDQFH�WUDQVDFWLRQV�DOORZ�WKH�V\VWHP�DGPLQLVWUDWRU�WR�FUHDWH�DQGPDLQWDLQ�XVHU�PDVWHU�UHFRUGV��7KLV�SURFHVV�LQFOXGHV�JHQHUDWLQJ�DQG�DVVLJQLQJDXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV�

Page 383: Authorizations Made Easy

*ORVVDU\

Release 4.6A/B ��G–11

7HUP 'HILQLWLRQ

8VHU�PDVWHUUHFRUG

7KLV�UHFRUG�FRQWDLQV�LPSRUWDQW�PDVWHU�GDWD�IRU�DQ�5���6\VWHP�XVHU��2QO\�XVHUVZLWK�D�XVHU�PDVWHU�UHFRUG�FDQ�ORJRQ�WR�WKH�V\VWHP��$�XVHU·V�DXWKRUL]DWLRQV�DUHGHILQHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�

8VHU�UROH�WHPSODWH $�XVHU�UROH�WHPSODWH�LV�DQ�DFWLYLW\�JURXS�ZKLFK�VHUYHV�DV�WKH�EDVLV�IRU�WKH�XVHUPHQX�ZKHQ�DQ�HQG�XVHU�ORJV�RQ�WR�5���

9DOLGLW\�SHULRG 9DOLGLW\�SHULRGV�GHILQH�WKH�OLIH�VSDQ�RI�DQ�REMHFW�RU�LQIRW\SH�UHFRUG��:KHQ�FUHDWLQJREMHFWV�DQG�LQIRW\SH�UHFRUGV��VSHFLI\�D�YDOLGLW\�SHULRG�E\�SURYLGLQJ�D�VWDUW�DQG�DQHQG�GDWH�

:RUN�SURFHVV 7KH�DSSOLFDWLRQ�VHUYLFHV�RI�WKH�5���6\VWHP�SHUIRUP�VSHFLDO�ZRUN�SURFHVVHV��VXFK�DVIRU�GLDORJ�SURFHVVLQJ��XSGDWLQJ�RI�WKH�GDWDEDVH�DV�GLFWDWHG�E\�FKDQJH�GRFXPHQWV�EDFNJURXQG�SURFHVVLQJ��VSRROLQJ��DQG�ORFN�PDQDJHPHQW��:RUN�SURFHVVHV�FDQ�EHDVVLJQHG�WR�GHGLFDWHG�DSSOLFDWLRQ�VHUYHUV�

:RUNEHQFK2UJDQL]HU�7UDQVSRUW�V\VWHP

7KH�:RUNEHQFK�2UJDQL]HU�LV�D�FHQWUDO�PDQDJHPHQW�WRRO�IRU�ODUJH�VFDOH�SURMHFWPDQDJHPHQW�WKDW�VXSSRUWV�LQGLYLGXDO�GHYHORSHUV�DQG�ODUJH�SURMHFW�WHDPV�

7KH�2UJDQL]HU�DOVR�GRHV�WKH�IROORZLQJ�

�� 2UJDQL]HV�UHODWHG�SURMHFW�FRPSRQHQWV�LQWR�RUGHUV

�� /RFNV�WKH�FRPSRQHQWV�GXULQJ�GHYHORSPHQW

�� 6WRUHV�D�YHUVLRQ�RI�HDFK�SURMHFW�EHWZHHQ�WUDQVSRUWV

7KH�WUDQVSRUW�V\VWHP�VXSSRUWV�WKH�WUDQVIHU�RI�GHYHORSPHQW�REMHFWV�EHWZHHQGLVWULEXWHG�V\VWHPV�E\�FUHDWLQJ�DQ�H[WHQVLYH�ORJ�UHFRUGLQJ�RI�ZKHQ�DQG�ZK\�HDFKWUDQVSRUW�ZDV�H[HFXWHG�DQG�ZKR�H[HFXWHG�LW�

:RUNIORZ�WDVN $�ZRUNIORZ�WDVN�LV�D�PXOWLVWHS�WDVN�GHILQHG�E\�WKH�FXVWRPHU��ZKLFK�UHIHUHQFHV�DZRUNIORZ�GHILQLWLRQ��:RUNIORZ�WDVNV��RUJDQL]DWLRQDO�PDQDJHPHQW�REMHFW�W\SH�:)�DUH�FOLHQW�GHSHQGHQW��KDYH�D�YDOLGLW\�SHULRG��DQG�DUH�SODQ�YHUVLRQ�VSHFLILF�

:RUNSODFH 7KH�PDLQ�ULJKW�WLOH�RQ�WKH�VFUHHQ�ZKHUH�PRVW�ZRUN�LV�SHUIRUPHG��ILHOG�HQWULHV�VHOHFWLRQV��HWF����2Q�VRPH�ZLQGRZV��WKH�ZRUNSODFH�FRYHUV�WKH�HQWLUH�VFUHHQ�

:RUNSODFH�PHQX 7KH�OHIW�WLOH�RQ�WKH�6$3�(DV\�$FFHVV�VFUHHQ�ZKHUH�HDFK�QRGH�UHSUHVHQWV�GLIIHUHQWOHYHOV�LQ�WKH�5���6\VWHP��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUG�PHQX�EXWWRQV�SURYLGHGLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�

:RUNORDGPRQLWRU

7KH�ZRUNORDG�PRQLWRU�GLVSOD\V�WKH�GLVWULEXWLRQ�RI�WKH�ZRUNORDG�DFURVV�VHUYHUV�DQGWUDQVDFWLRQV�

Page 384: Authorizations Made Easy

*ORVVDU\

Authorizations Made EasyG–12

Page 385: Authorizations Made Easy

I–1

,QGH[

A$%$3

GLFWLRQDU\���²�REMHFWV��QR�FKHFN��&²�

$FFHOHUDWHG6$3��$6$3�EXVLQHVV�EOXHSULQW���²�JR�OLYH�DQG�VXSSRUW���²�NQRZOHGJH�FRUQHU���²�RYHUYLHZ���²�SURMHFW�SUHSDUDWLRQ���²�4$GE��TXHVWLRQV�DQG�DQVZHUV�GDWDEDVH����²�UHDOL]DWLRQ���²�URDGPDS���²�����²�

$FFHVV�SUREOHPV���²��$FWLYLW\�JURXS�PDLQWHQDQFH��6HH�DOVR�3URILOH�*HQHUDWRU

EDVLF�PDLQWHQDQFH���²����²����²��FRPSRVLWH�DFWLYLW\�JURXSV���²�FUHDWLQJ�DQG�FKDQJLQJ�KLHUDUFK\���²�LQWHUQHW�DQG�GRFXPHQW�OLQNV���²��RUJDQL]DWLRQ�PDQDJHPHQW���²����²��UHVSRQVLELOLWLHV����²��VHOHFWLQJ�YLHZV���²�WUDQVIHUULQJ�XVHUV�IURP�,0*�SURMHFW���²��ZRUNIORZ���²��

$FWLYLW\�JURXSVDVVLJQLQJ�,0*�SURMHFWV�RU�YLHZV���²��DVVLJQLQJ�REMHFWV���²����²�DVVLJQLQJ�3'�REMHFWV���²����²����²��DVVLJQLQJ�WUDQVDFWLRQV���²��DVVLJQLQJ�XVHUV���²�����²����²����²�&203$1<B$//���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRVLWH��6HH�&RPSRVLWH�DFWLYLW\�JURXSVFRQYHUWHG�IURP�68���SURILOHV����²�FRS\LQJ���²�����²����%²�FUHDWLQJ���²��FXVWRPL]LQJ�DFWLYLW\�JURXS���²�����²��GHOHWLQJ���²��GHULYHG��6HH�'HULYHG�DFWLYLW\�JURXSVGLVSOD\LQJ�WUDQVDFWLRQ�FRGHV��%²�GLVSOD\LQJ�XVHUV��%²�GRFXPHQWDWLRQ�RQOLQH�IRU�REMHFWV���²��JHQHUDO�DXWKRUL]DWLRQV���²�LQVHUWLQJ�UHSRUWV���²��LQVHUWLQJ�WUDQVDFWLRQV���²�RYHUYLHZ���²�����²��SUHGHILQHG���²��SURILOHV���²�����²����%²�

UHJHQHUDWLQJ�DXWKRUL]DWLRQ�GDWD���²��WUDQVDFWLRQ�FRGHV��PXOWLSOH��%²�WUDQVSRUWLQJ���²����²����²����²����²�XVHU�UROH�WHPSODWHV���²����²�ZRUNIORZ�WDVNV���²��

$GPLQLVWUDWRUDXWKRUL]DWLRQ�DGPLQLVWUDWRU���²�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU���²��DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU���²��FKDQJH�PDQDJHPHQW���²��*OREDO�8VHU�0DQDJHU����²��PXOWLSOH�DGPLQLVWUDWRUV��%²�SROLFLHV�DQG�SURFHGXUHV���²��VHWWLQJ�XS�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV���²��WKUHH�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�ZRUNLQJ�WRJHWKHU���²��WLSV�IRU���²��XVHU�DGPLQLVWUDWRU���²��

$GYDQFH�FRUUHFWLRQVDSSO\LQJ�WR�5�����²�

$,6��$XGLW�LQIRUPDWLRQ�V\VWHP�����²��$PHULFDQ�6$3�8VHUV�*URXS��$68*����²��$SSOLFDWLRQ�/LQN�(QDEOLQJ��$/(�

DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ�HQYLURQPHQW����²�GHILQLQJ�WDUJHW�V\VWHP�IRU�5)&����²��GLVWULEXWLRQ�PRGHO����²��ORJLFDO�V\VWHP�QDPLQJ����²�PRGHO�YLHZ��GLVWULEXWLQJ����²��RYHUYLHZ����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�VHWWLQJ�XS�XVHU����²�

$6$3��6HH�$FFHOHUDWHG6$3$XGLWV

DXGLW�LQIRUPDWLRQ�V\VWHP��$,6���WUDQVDFWLRQ�6(&5����²��EXVLQHVV�DXGLWV����²��FRPSOHWH����²��GHOHWH�ROG�DXGLW�ORJV����²�ILOWHU�JURXSV����²�ORJJLQJ�RI�VSHFLILF�DFWLYLWLHV����²��RYHUYLHZ����²�SURILOH�UHYLHZ�IRU�DFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��UHTXLUHPHQWV���²��UHYLHZLQJ�YDOLG�XVHUV����²��UXQQLQJ�ORJV����²�UXQQLQJ�RQ�GLIIHUHQW�XVHU����²��VHFXULW\�DXGLW�ORJ��60�������²�VHWWLQJ�ORJ�SDUDPHWHUV����²�VWDWLVWLF�UHFRUGV�LQ�&&06��67$7�����²��

Page 386: Authorizations Made Easy

,QGH[

Authorizations Made Easy�I–2

V\VWHP�DXGLW����²��V\VWHP�ORJV��60�������²��WDVNV����²��XVHU�VHFXULW\�DXGLW�MREV����²��XVHU�GHILQHG����²��

$XWKRUL]DWLRQDGGLQJ�PLVVLQJ��SRVWPDLQWDLQLQJ���²����²�DGPLQLVWUDWRU���²����²�����²�����²��DXWKRUL]DWLRQ�FRQFHSW���²����²�����²��FKDQJLQJ�XVLQJ�XWLOLWLHV���²��FKHFNV��6HH�$XWKRUL]DWLRQ�FKHFNVFRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²�FXVWRPL]LQJ���²��HUURU�DQDO\VLV��68������²�ILHOGV���²����²�JHQHUDO��DVVLJQLQJ���²�JHQHUDWLQJ�SURILOHV���²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²����²�OLIHF\FOH���²�OLVW��6HH�$XWKRUL]DWLRQ�/LVWORJJLQJ�FKDQJHV����²��QDPLQJ�FRQYHQWLRQV���²�����²�����²��REMHFWV��6HH�$XWKRUL]DWLRQ�REMHFWVSURILOHV��6HH�3URILOHVUHVSRQVLELOLWLHV����²��VWUXFWXUDO���²��WHFKQLFDO�QDPHV��UHRUJDQL]LQJ���²��WHPSODWHV��WUDQVSRUWLQJ���²�WLPH�GHSHQGHQF\���²����²�����²����%²�WUDFLQJ�HUURUV��&²�WUDQVSRUWLQJ���²�XVHU�DGPLQLVWUDWLRQ���²�

$XWKRUL]DWLRQ�FKHFNVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ���²�����²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVGHILQLWLRQ���²�HQDEOLQJ�RU�GLVDEOLQJ�V\VWHP�ZLGH�FKHFNV����²��LQFOXGLQJ�LQ�WUDQVDFWLRQV��%²���%²�UHGXFLQJ�VFRSH����²������²��5)&��&²�VWDUWLQJ�WUDQVDFWLRQV��%²�V\VWHP�WUDFH��67������²�

$XWKRUL]DWLRQ�ILHOGVGHILQLWLRQ���²�PDLQWDLQLQJ�RSHQ�ILHOGV���²��

$XWKRUL]DWLRQ�/LVWGHILQLQJ�XVHU�UROHV���²�JHQHUDWHG�IURP�4$GE���²����²�RYHUYLHZ���²�ZRUNLQJ�ZLWK���²�

$XWKRUL]DWLRQ�REMHFWVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ����²������²������²��EDVLV����²������²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVFKHFNLQJ����²��

FODVVHV���²�GHILQLWLRQ���²�ILHOGV���²�KXPDQ�UHVRXUFHV����²������²������²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²�RYHUYLHZ���²�6B7&2'(���²������²�����²����%²���&²�6B86(5B2%-����²��6B86(5B352���²��WDEOH�7$&7=��%²�XQXVHG����²��

B%DFNJURXQG

GLVWULEXWLRQ��*OREDO�8VHU�0DQDJHU����²��XVHU�W\SHV���²�

%DVLF�PDLQWHQDQFH���²����²����²��%DVLV�&RPSRQHQWV��%&�

DXWKRUL]DWLRQ�REMHFWV����²������²������²��XVHUV���²�

%DWFK�GDWD�FRPPXQLFDWLRQ��%'&����²�%DWFK�LQSXW��6HH�%DWFK�GDWD�FRPPXQLFDWLRQ%XVLQHVV�$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��%$3,V�����²��

C&&06�SHUIRUPDQFH�DQDO\VLV�WRROV����²��&HQWUDO�V\VWHP

PLJUDWLRQ�RI�H[LVWLQJ�XVHUV����²�WH[W�FRPSDULVRQ����²�

&HQWUDO�XVHU�DGPLQLVWUDWLRQ$/(�HQYLURQPHQW����²�GLVWULEXWLRQ�PRGHO�DVVLJQPHQW����²�*OREDO�8VHU�0DQDJHU����²��PLJUDWLRQ�RI�XVHUV�WR�FHQWUDO�V\VWHP����²�QRQFHQWUDO�XVHU�DGPLQLVWUDWLRQ���²�RYHUYLHZ��[[LY����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS����²�WHVWLQJ����²�

&HQWUDO�XVHU�PDLQWHQDQFHXVHU�DVVLJQPHQWV���²�

&KDQJH�PDQDJHPHQW�DGPLQLVWUDWRU���²��&KHFN�IODJV��6HH�&KHFN�LQGLFDWRUV&KHFN�LQGLFDWRUV

DXWKRUL]DWLRQ�REMHFWV����²������²��&KHFN��&�����²������²��&KHFN�0DLQWDLQ��&0�����²������²������²��GHIDXOWV���²�PDVV�FKDQJHV����²��1R�FKHFN��1�����²������²��UHSODFLQJ�VHWWLQJV���²�WUDQVDFWLRQ�FRGHV����²��WUDQVSRUWLQJ���²�

Page 387: Authorizations Made Easy

,QGH[

Release 4.6A/B �I–3

W\SHV��%²�8QPDLQWDLQHG��8�����²������²��

&OLHQW�V\VWHPVGLVWULEXWLRQ�PRGHO����²�*OREDO�8VHU�0DQDJHU����²��PDLQWDLQLQJ�XVHU�GDWD��ILHOG�DWWULEXWHV����²�PLJUDWLQJ�XVHUV�WR�FHQWUDO�V\VWHP����²�WH[W�FRPSDULVRQ����²�

&OLHQWV������²����²����²�������²����²����²�������²����²�DVVLJQLQJ�ORJLFDO�V\VWHPV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�FRS\LQJ�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV���²�GHIDXOW��&²�GHIDXOW�XVHUV���²�SDUWHU�SURILOHV�JHQHUDWHG�LQ�FOLHQW�V\VWHP����²��6$3�VWDQGDUG���²�WUDQVSRUWV���²�

&RPSRVLWH�DFWLYLW\�JURXSVFUHDWLQJ���²��GLVSOD\LQJ���²�RYHUYLHZ��[[LY���²��

&RS\LQJDFWLYLW\�JURXSV���²����%²�DFWLYLW\�JURXSV�DQG�GHULYLQJ���²��XVHU�UROH�WHPSODWHV�IRU�PRGLILFDWLRQ���²��

&3,&���²�&UHDWLQJ

DFWLYLW\�JURXS���²��FRPSRVLWH�DFWLYLW\�JURXSV���²��QHZ�XVHU��FOLHQW�VSHFLILF����²�XVHU�UROH�WHPSODWHV���²��

&XVWRPL]LQJ�DXWKRUL]DWLRQV���²��

D'DWD�SURWHFWLRQ���²�'',&�XVHUV���²����²�����²�'HIDXOWV

FKDQJLQJ���²�FKHFN�LQGLFDWRUV���²����²�����²��FRPSDULQJ�GDWD�ZLWK�6$3�GHIDXOW�YDOXHV���²�FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�ILHOG�YDOXHV���²����²�UHWUDQVIHUULQJ���²�

'HOHWLQJDFWLYLW\�JURXSV���²��

'HULYHG�DFWLYLW\�JURXSV���²�����²��RYHUYLHZ���²��

'HYHORSPHQW�V\VWHP��'(9����²��'LDORJ

XVHU�W\SHV���²�'LVWULEXWLRQ�PRGHO����²��

DVVLJQPHQW����²�'RFXPHQW�OLQNV���²��

'RFXPHQWDWLRQRQOLQH�IRU�DFWLYLW\�JURXS�REMHFWV���²��

E(DUO\:DWFK���²�(DV\�$FFHVV�PHQX���²����²�����²���%²�(UURU�QRWHV�GDWDEDVH���²���$²�([WHUQDO�XVHUV

XVHU�DGPLQLVWUDWLRQ���²�

F)DYRULWHV

DGGLQJ�DQG�GHOHWLQJ�WUDQVDFWLRQV��%²�YLHZLQJ��%²�

)LHOG�DWWULEXWHVGHILQLQJ�LQ�FOLHQW�V\VWHP����²�

)LHOG�GHIDXOWV���²�)LHOG�H[LWV��%²�)LHOG�YDOXHV

FRS\LQJ����²��FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�UHSODFLQJ���²�WUDQVSRUWLQJ���²�

)LOWHUVGHILQLQJ�ILOWHU�JURXSV�IRU�DXGLW����²�

)XOO�DXWKRUL]DWLRQV���²��LQVHUWLQJ���²��

G*OREDO�8VHU�0DQDJHU

DXWKRUL]DWLRQ�IRU����²��FRPSRVLWH�DFWLYLW\�JURXS����²������²��GLVWULEXWLQJ�GDWD����²��PRGHOLQJ����²��RYHUYLHZ����²��VWUXFWXUH����²��V\VWHP�W\SHV����²��XVHU�FUHDWLRQ����²��XVHU�JURXSV����²��XVLQJ����²��

*R�OLYH�SODQ���²�����²�SUHSDUDWLRQV���²�WUDQVSRUWLQJ�DFWLYLW\�JURXSV���²�WUDQVSRUWLQJ�DXWKRUL]DWLRQ�WHPSODWHV���²�WUDQVSRUWLQJ�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV���²�WUDQVSRUWV�EHWZHHQ�FOLHQWV���²�WUDQVSRUWV�EHWZHHQ�5���6\VWHPV���²�

H+HOS

HUURU�QRWHV�GDWDEDVH���²���$²�6$31HW�²�5���)URQWHQG�QRWHV���²�

Page 388: Authorizations Made Easy

,QGH[

Authorizations Made Easy�I–4

+LHUDUFK\FUHDWLQJ�DQG�FKDQJLQJ���²�

+XPDQ�5HVRXUFHV��+5�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�DXWKRUL]DWLRQ�REMHFWV����²������²������²��VXSSRUW�SDFNDJHV����²��XVHU�QDPLQJ�FRQYHQWLRQV���²��

I,'RFV����²��,0*�SURMHFWV

DVVLJQLQJ�SURMHFWV�RU�YLHZV�WR�DFWLYLW\�JURXSV���²��WUDQVIHUULQJ�XVHUV���²�����²��

,PSOHPHQWDWLRQ�*XLGH��,0*�SURMHFWV��6HH�,0*�SURMHFWV

,QWHUQDO�5���XVHUVXVHU�DGPLQLVWUDWLRQ���²�

,QWHUQHWLQVHUWLQJ�OLQNV�LQ�DFWLYLW\�JURXSV���²��

,7�PDQDJHU���²��

J-RE�UROHV���²��-REV

DVVLJQLQJ�DFWLYLW\�JURXSV���²��ZRUN�GXWLHV���²����²��

K.QRZOHGJH�&RUQHU��.&���$6$3���²�

L/LQNV

LQVHUWLQJ�,QWHUQHW�DQG�GRFXPHQW�OLQNV�LQWR�DFWLYLW\JURXSV���²��

/RFNV��XVHU����²��/RJLFDO�V\VWHPV����²�

DVVLJQLQJ�WR�FOLHQWV����²�GLVWULEXWLRQ�PRGHO����²��QDPLQJ����²�

/RJRQ�GDWD�ILHOGV���²�/RJRQV

LQFRUUHFW��&²�/RJV

DFWLYLWLHV��VSHFLILF����²��DXGLW����²�FHQWUDO����²������²��FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG

DXWKRUL]DWLRQV����²��ILOHV����²�ORFDO����²������²��SURWHFWHG�WDEOHV����²��UXQQLQJ�DXGLW�ORJV����²�6\V/RJ����²��

WDEOH�GDWD����²��

M0DLQWHQDQFH�W\SHV���²��0DQXDOO\�LQVHUWLQJ�DXWKRUL]DWLRQV���²�0DVV�FKDQJHV

FKHFN�LQGLFDWRUV����²��XVHUV���²�

0DVV�FRPSDUH��3)8'����²��0HQXV

GHIDXOW�VWDUW��&²�0RGHO�YLHZ����²�

GLVWULEXWLQJ����²��

N1DPLQJ�FRQYHQWLRQV

DXWKRUL]DWLRQ�SURILOHV���²�SURILOHV�DQG�DXWKRUL]DWLRQV�JHQHUDWHG�ZLWK�3*���²�����²���

�²��1R�FKHFN��&²�

O2EMHFW�FODVVHV���²�2EMHFW�W\SHV

$���²�&���²�2���²�3���²�6���²�86���²�

2EMHFWVMREV���²����²��RQOLQH�GRFXPHQWDWLRQ���²��RUJDQL]DWLRQDO�XQLWV���²�SHUVRQ���²�3HUVRQQHO�'HYHORSPHQW��3'���6HH�3'�REMHFWVSRVLWLRQV���²����²��5���XVHUV���²�ZRUN�FHQWHUV���²�

2QOLQH�GRFXPHQWDWLRQGLVSOD\LQJ�IRU�DFWLYLW\�JURXS�REMHFWV���²��

2QOLQH�6HUYLFH�6\VWHP��266���6HH�6$31HW�²�5���)URQWHQGQRWHV

2UJDQL]DWLRQ�PDQDJHPHQW���²����²��2UJDQL]DWLRQDO

(QMR\�WUDQVDFWLRQ�SODQ���²��OHYHOV���²�����²��SODQV���²����²�����²��VWUXFWXUHV���²��XQLWV���²�����²�

266��6HH�6$31HW�²�5���)URQWHQG�QRWHV

Page 389: Authorizations Made Easy

,QGH[

Release 4.6A/B �I–5

P3DUDPHWHUV

DXWK�QRBFKHFNBLQBVRPHBFDVHV��%²�DXWK�REMHFWBGLVDEOLQJBDFWLYH����²��DXWK�WFRGHVBQRWBFKHFNHG����²��DXWKRUL]DWLRQ�FKHFNV��&²���&²�ILHOG�GHIDXOWV���²�ORJRQ��&²�PDQXDOO\�SRVWPDLQWDLQLQJ���²�QDPHV���²�SDUDPHWHU�WUDQVDFWLRQV����²��SDVVZRUG��&²���&²�6$3 ��&²�V\VWHP����²��WUDFLQJ�DXWKRUL]DWLRQV��&²�XVHU�EXIIHU��&²�

3DVVZRUGVEDFNJURXQG�XVHUV���²�FKDQJLQJ���²��UHTXLUHPHQWV���²��VHWWLQJ�OHQJWK��H[SLUDWLRQ��&²�VSHFLI\LQJ�LPSHUPLVVLEOH��&²�V\VWHP���²��XVHU���²�����²��

3'�REMHFWVDVVLJQLQJ�DFWLYLW\�JURXSV���²����²����²��

3HUPLVVLRQ�FUHHS����²��3HUVRQQHO�$GPLQLVWUDWLRQ��3$�

XVHUV���²��3HUVRQQHO�'HYHORSPHQW��3'�

DVVLJQLQJ�DFWLYLW\�JURXSV�WR�3'�REMHFWV���²��DVVLJQLQJ�3'�REMHFWV�WR�DFWLYLW\�JURXSV���²�

3*��6HH�3URILOH�*HQHUDWRU3ODQ�YHUVLRQ���²��3ROLFLHV�DQG�SURFHGXUHV

VHFXULW\���²��3RVLWLRQV

DVVLJQLQJ�DFWLYLW\�JURXSV���²��REMHFWV���²����²��

3RVWPDLQWDLQLQJPLVVLQJ�DXWKRUL]DWLRQV���²����²�XVHU�UROH�WHPSODWHV���²��

3UHGHILQHG�DFWLYLW\�JURXSV��6HH�8VHU�UROH�WHPSODWHV3URGXFWLRQ�V\VWHP��35'����²��3URILOH�*HQHUDWRU��6HH�DOVR�$FWLYLW\�JURXS�PDLQWHQDQFH

DFWLYDWLQJ���²�$87+25,7<�&+(&.��%²�FKHFNLQJ�WKH�UHTXLUHG�LQVWDQFH�SURILOH�SDUDPHWHU���²�FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²��IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�RYHUYLHZ���²����²�VHWWLQJ�XS���²���%²�VWDUWLQJ���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�XVHU�UROH�WHPSODWHV���²�

3URILOHVDFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��DGPLQLVWUDWRU��VHFXULW\���²��DVVLJQLQJ�WR�QHZ�XVHU�PDVWHU�UHFRUG���²�DXWKRUL]DWLRQ�FKHFNV��&²�DXWKRUL]DWLRQ�PLVVLQJ��%²�FKDQJLQJ�QDPHV��%²�&203$1<B$//�RU�´�<RXU&RPSDQ\!µ���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²�����²��FRQYHUWLQJ�ROG�68���SURILOHV�LQWR�DFWLYLW\�JURXSV����²��

��²��FRQYHUWLQJ�WR�EH�PDLQWDLQDEOH�E\�WKH�3*����²��'()$8/7�3)/��&²�GHILQLWLRQ���²�GLVSOD\LQJ�RYHUYLHZ�DIWHU�JHQHUDWLRQ���²��HGLWLQJ���²��HQWHULQJ�LQ�XVHU�PDVWHU�UHFRUGV���²�JHQHUDO�ULJKWV�QRW�DVVLJQHG���²�JHQHUDWLQJ���²�����²�����²��LQVHUWLQJ�DXWKRUL]DWLRQV�IURP���²��ORJJLQJ�FKDQJHV����²��PDLQWDLQLQJ���²��PDVV�FRPSDUH���²��PDWFKLQJ�XS�DIWHU�FKDQJLQJ�LQ�68������²������²��PDWFKLQJ�XS�DIWHU�XSJUDGH����²��PLJUDWLQJ���²��QDPLQJ�FRQYHQWLRQV���²����²�����²�����²��RYHUYLHZ���²����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��UH�FUHDWLQJ���²������²��UHJHQHUDWLQJ�DIWHU�FKDQJHV���²��UHJHQHUDWLQJ�QXPEHU�DVVLJQPHQW���²��VWDWXV�LQGLFDWRUV���²��WUDQVSRUWLQJ���²����²�XSGDWLQJ�LQ�XVHU�PDVWHU�UHFRUG���²��ZRUNLQJ�ZLWK��%²�

3URJUDPV3)&*B7,0(B'(3(1'(1&<���²��56865������²��

Q4XDOLW\�DVVXUDQFH�V\VWHP��4$6����²�����²��4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�

$XWKRUL]DWLRQ�/LVW���²�RYHUYLHZ���²�

R5HOHDVH�QRWHV����²�5HPRWH�FRQQHFWLRQV

VHFXULW\���²�����²��5HPRWH�IXQFWLRQ�FDOO��6HH�5)&5HSRUWV

DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��GRFXPHQWDWLRQ���²��

Page 390: Authorizations Made Easy

,QGH[

Authorizations Made Easy�I–6

3)&*B7,0(B'(3(1'(1&<���²�����²��UHSRUW�WUHHV��%²�56865������²��

5HVSRQVLELOLWLHV����²��5)&

DXWKRULW\�FKHFN��&²�%$3,V����²��FDOOV����²��FRQQHFWLRQ����²������²�GHVWLQDWLRQ����²������²��,'RFV����²��

5RDGPDS��6HH�$FFHOHUDWHG6$3��$6$3�5ROHV

XVHU�UROHV��GHILQLQJ���²�

S6$3�%XVLQHVV�:RUNIORZ��6HH�:RUNIORZ6$3�GHIDXOWV��6HH�'HIDXOWV6$3�URXWHU

VHFXULW\���²�����²��6$3�VWDQGDUG�PHQX��[YLLL���²�����6$3�WHPSODWHV��6HH�7HPSODWHV6$3 ���²����²�����²�

VHFXULQJ�DJDLQVW�PLVXVH��&²�6$31HW���²��6$31HW�²�5���)URQWHQG�QRWHV

GDWDEDVH��$²�HUURU�QRWHV�GDWDEDVH���²�JHWWLQJ�VXSSRUW���²�3*�KRW�SDFNDJHV�IRU�5HOHDVHV����$�DQG����%���²�SULQWLQJ�QRWHV���²�VHOHFWLYH�OLVW��$²�WHPSODWH�QRWHV���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�

6HFXULW\DFWLYLWLHV����²�DXGLWV��6HH�$XGLWVORJJLQJ�FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG

DXWKRUL]DWLRQV����²��ORJJLQJ�VSHFLILF�DFWLYLWLHV����²��SHUPLVVLRQ�FUHHS����²��SROLFLHV�DQG�SURFHGXUHV���²��UHYLHZLQJ�ORJV����²��VHFXULW\�UHSRUWV����²��VRXUFHV�DERXW�LPSOHPHQWDWLRQ���²��VWUDWHJ\�LQ�WKUHH�V\VWHP�HQYLURQPHQW���²��

6WDWLVWLF�UHFRUGV��DXGLWLQJ����²��6WUXFWXUDO�DXWKRUL]DWLRQV���²��

WURXEOHVKRRWLQJ�OLPLWDWLRQV����²�6XSHUXVHUV���²����²�����²�����²��6\V/RJ����²��6\VWHP��6HH�&HQWUDO�V\VWHP��&OLHQW�V\VWHP��7DUJHW�V\VWHP6\VWHP�ODQGVFDSH

ZLWK�H[LVWLQJ�XVHUV����²������²��6\VWHP�SDVVZRUGV���²��6\VWHP�7UDFH��6HH�7UDFHV

T7DEOHV

IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�ORJJLQJ�FKDQJHV�WR�GDWD����²��ORJV�SURWHFWHG����²��68.5,����²��7$&7=��%²�862%7���²����²�862%;���²����²�����²����%²��865����&²�

7DUJHW�V\VWHPGHILQLQJ�IRU�5)&�FDOOV����²��

7DVNVPXOWLSOH�VWHS���²��VLQJOH�VWHS���²��

7HFKQLFDO�QDPHVDXWKRUL]DWLRQV���²��

7HPSODWHVFUHDWLQJ�QHZ���²�GHOLYHUHG���²�GHOLYHUHG�QDPHV���²�LQFOXGLQJ�UHTXLUHG�REMHFWV�LQ�DFWLYLW\�JURXSV���²�LQVHUWLQJ�DXWKRUL]DWLRQV���²����²��LQVHUWLQJ�LQWR�H[LVWLQJ�DFWLYLW\�JURXS���²�WUDQVSRUWLQJ���²�ZRUNIORZ���²��

7KUHH�V\VWHP�HQYLURQPHQWGHYHORSPHQW�V\VWHP��'(9����²��SURGXFWLRQ�V\VWHP��35'����²��TXDOLW\�DVVXUDQFH�V\VWHP��4$6����²��

7LPH�SHULRGVORJRQ�YDOLG�IURP�YDOLG�WR�GDWHV���²�UHVWULFWLQJ�DFWLYLWLHV��%²�XVHU�DVVLJQPHQW���²����²�����²��

7UDFHVDQDO\]LQJ�WUDFH�ILOH����²�DXWKRUL]DWLRQV��&²�GLVSOD\LQJ�UHVXOWV����²�QDPLQJ����²�UHFRUGLQJ�DXWKRUL]DWLRQ�FKHFNV����²�

7UDLQLQJ�FOLHQW�V\VWHP��75*����²��7UDQVDFWLRQV

DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��DVVLJQLQJ�WR�UHSRUWV���²��$87+B6:,7&+B2%-(&76����²��DXWKRUL]DWLRQ�FKHFNV��%²�%'������²��GHULYHG�DFWLYLW\�JURXSV���²��LQVHUWLQJ���²�PDLQWDLQ�FKHFN�LQGLFDWRUV����²��PLVVLQJ�DXWKRUL]DWLRQV���²�3)&*���²��3)8'���²��5=������²��6$������²��6$5$����²��

Page 391: Authorizations Made Easy

,QGH[

Release 4.6A/B �I–7

6&&����²���%²�6&&����²�6&&/���²�6&8�����²��6&80����²�6(������²��6(�����²��6(������²��6(&5����²������²��60������²�60������²�����²�60������²�����²�60������²��60�����²����²���%²���&²�6352����²��67������²�67������²��67$7����²��68�����²����²�����²������²��68�����²����²������²��68�����²����²������²��68�����²����²�����²����%²���&²�68�����²����²�����²������²������²���%²�68�����²�����²����²�����²�683&���²�����²�����²��

7UDQVSRUWLQJDFWLYLW\�JURXSV���²����²���%²�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�PDVV�WUDQVSRUW�RI�DFWLYLW\�JURXSV���²�VLQJOH�DFWLYLW\�JURXSV�XVLQJ�DFWLYLW\�JURXS�PDLQWHQDQFH�

�²�WHPSODWHV���²�XVHU�DVVLJQPHQWV���²����²�XVHU�PDVWHU�UHFRUGV���²�

7URXEOHVKRRWLQJ��6HH�DOVR�7UDFHVHUURU�DQDO\VLV��68������²�

U8SJUDGHV

FRQYHUWLQJ�SUHYLRXVO\�FUHDWHG�68���SURILOHV�LQWR�DFWLYLW\JURXSV����²�

SUHSDUDWLRQ�EHIRUH����²�SURFHGXUH��68�����%²�5HOHDVH����)����²��5HOHDVHV����*�����+�����,����²��5HOHDVHV����[�RU����[����²��UHOHDVHV�SULRU�WR����[����²��UHPRYH�XVHU�DVVLJQPHQWV�IURP�RULJLQDO�68���SURILOH����²�YDOLGDWLRQ�DIWHU�FRPSOHWH����²�

8VHUDFFRXQWV����²�DGPLQLVWUDWLRQ���²�����²�����²�$/(����²�DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²����²�DVVLJQLQJ�WR�FXVWRPL]LQJ�DFWLYLW\�JURXSV���²��

DVVLJQLQJ�XVHU�UROH�WHPSODWHV���²�DVVLJQPHQWV���²�����²����²�����²�DXGLWLQJ�IRU�YDOLG�XVHUV����²��DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV���²�EDVLF�XVHU�GDWD���²�EXIIHU���²�FKDQJLQJ�SDVVZRUGV���²��FOLHQW�VSHFLILF���²��FUHDWLQJ���²����²�����²��GDWHV�RI�XVHU�DVVLJQPHQW���²����²�����²��'',&���²����²�����²�GHIDXOWV���²����²�(DUO\:DWFK���²�H[WHUQDO���²�ILHOG�DWWULEXWHV��GHILQLQJ����²�JURXSV��[[LY���²�LQIRUPDWLRQ�V\VWHP���²��LQWHUQDO�5�����²�MREV���²��ORJRQ�GDWD�ILHOG�GHILQLWLRQV���²�PDVV�FKDQJHV���²�PHQX��[YLLL��[[LL���²����²�����RUJDQL]DWLRQDO�XQLWV���²��SDVVZRUGV���²�����²��SRVLWLRQV���²��SURILOHV��WUDQVDFWLRQ�67������²��UROHV��6HH�8VHU�UROHV6$3 ���²����²�����²�VSHFLDO�5���XVHUV���²�VWDWXV�GLVSOD\�RQ�WDE���²�VXSHUXVHUV���²����²�����²�����²��V\VWHP���²����²�V\VWHP�ODQGVFDSH����²������²��WUDQVIHUULQJ�IURP�,0*�SURMHFW�WR�DFWLYLW\�JURXS���²��XVHU�DGPLQLVWUDWLRQ��%²�XVHU�,'V���²��XVHU�W\SHV���²�

8VHU�EXIIHUV��&²�8VHU�PDVWHU�UHFRUGV

DXWKRUL]DWLRQ�FRQFHSW���²����²�FRPSDULQJ�DIWHU�DFWLYLW\�JURXS�LPSRUW���²�FRPSDULQJ�DIWHU�DXWKRUL]DWLRQ�SURILOH�JHQHUDWLRQ���²�FRPSDULQJ�ZLWK�3*���²��GHILQLQJ���²�*OREDO�8VHU�0DQDJHU����²��ORJJLQJ�FKDQJHV����²��PDQXDOO\�HQWHULQJ�JHQHUDWHG�SURILOHV��%²�V\VWHP�UHFRJQLWLRQ�RI�XVHUV���²�WUDQVSRUWLQJ���²����²����²�XSGDWLQJ���²�XSGDWLQJ�SURILOHV���²��

8VHU�UROH�WHPSODWHVDVVLJQLQJ�WR�D�XVHU�XVLQJ�VKRUWFXW���²��DVVLJQLQJ�XVHUV���²����²�FRS\LQJ�DQG�PRGLI\LQJ���²��FUHDWLQJ�XVLQJ�PXOWLSOH�VLQJOH�DFWLYLW\�JURXSV���²��FUHDWLQJ�XVLQJ�VLQJOH�DFWLYLW\�JURXSV���²��

Page 392: Authorizations Made Easy

,QGH[

Authorizations Made Easy�I–8

FUHDWLQJ�\RXU�RZQ���²��FXVWRPL]LQJ�WHPSODWH���²��PDLQWHQDQFH�YLHZ�VHWWLQJV���²��RYHUYLHZ��[[LL���²�����²�SRVWPDLQWDLQLQJ���²��5HOHDVH����$���²��5HOHDVH����%���²��XVLQJ�6$3�SURYLGHG���²�ZRUNLQJ�ZLWK���²�

8VHU�UROHVGHILQLQJ���²�JHQHUDWLQJ�RYHUYLHZ���²�

8VHU�W\SHVEDFNJURXQG���²�EDWFK�GDWD�FRPPXQLFDWLRQ���²�

&3,&���²�GLDORJ���²�

W:RUN�FHQWHUV���²�:RUNIORZ

DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�VDPSOH���²��WDVNV���²�����²��WHPSODWHV���²��XVHUV���²��

:RUNSODFH�PHQX��[YLLL