SF Migrating To RBP Impl en
SF Migrating To RBP Impl en
10 Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
10.1 How can you check the permissions assigned to a user?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
10.2 How can you run an ad hoc report?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
10.3 How do you run a user search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
10.4 Running the RBP Diagnosis Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
The most recent changes made to this guide are listed below.
Q4 2018
The following table summarizes changes to this guide for the Q4 2018 release.
We've added Migration Tool Document. The migration tool can be used to start Choose an RBP Migration Strategy [page
the process of RBP migration. The sec 7]Migrating to RBP Using the Migra
tion that has been added is called "Mi tion Tool [page 39]
grating to RBP Using the Migration Tool".
Q3 2018
The following table summarizes changes to this guide for the Q3 2018 release.
We've updated the topics in this guide for We've added Configuration Check Tool Each check tool for RBP is described in
the topic "RBP Configuration Checks".
accuracy. information to the "Testing RBP" section.
Q2 2018
The following table summarizes changes to this guide for the Q2 2018 release.
In the section Preparing for Migration The steps to prepare have been broken
and topic Steps to Prepare for Migration into tables that indicate when you, the
we've streamlined the content. customer, must provide information and
the tasks that will be done on your behalf
by customer support.
Enable RBP in the Admin Center Enabling RBP can now also be done in
the Admin Center with Super Admin cre
dentials. We've added procedures and
prerequisites on how to do this.
Q1 2018
The following table summarizes changes to this guide for the Q1 2018 release.
Restructured the guide to streamline the This guide now contains sections for
RBP migration guidance. each stage of the RBP migration. The in
structions in this guide have also been
updated with additional information.
Q4 2017
The following table summarizes changes to this guide for the Q4 2017 release.
Initial publication of this guide to custom This migration guide is now available for
ers. customers. Configuring certain aspects
of Role-Based Permissions is still largely
done through Provisioning, which, as a
customer, you cannot access. Please
contact SAP Cloud Support (CS) to com
plete any tasks in Provisioning.
Role-Based Permissions (RBP) control access to the SAP SuccessFactors application and controls what users can
see and edit. RBP is a suite wide-authorization concept, which applies to most modules. Use this topic to
understand RBP migration and for things to consider during the migration process.
This guide provides instructions and recommendations for any customer still using the legacy security permissions
model, or non-RBP customers, who are required to migrate to Role-Based Permissions (RBP). We encourage you to
use the RBP Migration Tool to perform your migration but if you feel you need assistance to complete the migration
process, you can engage with an Implementation Partner. To learn more about how to engage with an
Implementation Partner, go to the link below: Choosing an Implementation Consultant
You can use this guide to determine the complexity of your migration, based on your product implementation, and
you can use this guide to plan your migration strategy. Use the following topic to analyze the complexity of your
RBP product migration: Assess Your Security Model Complexity
Note
RBP migration is not an automated process. It requires downtime, so plan accordingly. This document focuses
on migrating your existing permissions only.
Related Information
You can migrate to role-based permissions using the migration tool, manually without the migration tool, or using
an implementation partner. Choose a strategy based on the needs of your system.
When you choose to migrate using the When you manually migrate, meaning, If you would like to engage with an imple
RBP migration tool, you'll have access to you choose to migrate without the use of mentation consultant use the following
predefined role templates. These role the migration tool, you can manually cre document to learn how to engage with a
templates may include default access ate the necessary groups and roles consultant: Engage with an Implementa
groups, default target groups and some needed for your system and assign role- tion Partner [page 16]
default role-based permissions. based permissions. For information
about how to manually migrate to RBP,
From the migration tool you'll have the
use the following document: What are
ability to create and assign groups to the
Role-Based Permissions? [page 54]
predefined roles in the tool and to map
some of your legacy permissions to RBP.
Note
For information about how to use the
Ensure that you read prerequisites
RBP Migration Tool, use the following
document: Migrating to RBP Using the and recommendations prior to be
Migration Tool [page 39] ginning your RBP migration process.
Note
The migration tool will help you get
started with your migration by help
ing you to map some of your legacy
permission to RBP. You can also use
the tool to add any additional RBP to
your roles directly from the tool.
Note
Ensure that you read prerequisites
and recommendations prior to be
ginning your RBP migration process.
Related Information
Review each topic in this section carefully to ensure that you understand the prerequisites and recommendations,
and to assess whether or not you need an implementation partner.
This overview provides a quick glimpse of the RBP migration processes. Read through each description and
complete the tasks within each phase to complete your migration. This image is interactive. You can hover over
each section for a description of its phase and click the image to go directly to that section in this document.
To help you evaluate your migration process, each product security model can be categorized as simple or
complex. Use this section to evaluate your product migration complexity.
Role-Based Permissions migration is required for all customers that do not currently have the RBP security model
implemented and is required for all customers who wish to use the SAP SuccessFactors Data Protection and
Privacy features, such as Data Purge and Data Subject Information Report.
The security model tables below provide guidance on how to determine if your security model is considered simple
or complex. If your security model is described as Simple, you should be able to complete your RBP migration on
your own, using the migration tool. If your security model is described as Complex, you may still have the ability to
compete the migration on your own, using the migration tool. However, you can engage with your Implementation
Partner if you feel the migration is to complex.
Please use the following questions to help you to determine if your security model is simple or complex. If you
answer Yes to any of the following four questions, for the products listed in the tables below, then your security
model is considered complex.
● Do you require assistance to understand how to create groups and map them to roles?
● Do your roles require multiple levels of depth in the relationship hierarchy?
● Do you need to create a specific role for the one or more role types that have different permissions?
● Do you need assistance configuring custom dynamic group filters?
This table contains a snapshot of each product and its security model assessment. Scroll further to find your products and the
details about the product's security model. *Asterisks in the table indicate that the product can be considered Simple or
Complex.
*Analytics *Analytics
Performance Management
Platform
Presentations
*Workforce Analytics
Analytics
The bulleted lists below specify which features you will have access to after RBP is configured.
Tiles/Dashboard, Standard Reports and Online Report De Tiles/Dashboard, Standard Reports and Online Report De
signer (ORD) signer (ORD)
● Access to specific dashboards and reports. Your security model is complex if:
● Access to target populations the user will be able to report
● you have target population/group settings, which will im
on.
pact dataset availability within Ad Hoc Reporting and On
● Reporting is done within HR with little to no self-servicing line Report Designer. (For example, the Succession MDF
reporting access to other groups outside of HR. (For ex Position reporting schema is used and has specific target
ample, managers or employees). population/group criteria.)
● you have target population/group settings which will im
pact dataset availability within Advanced Reporting.
Calibration
The bulleted lists below specify which features you will have access to after RBP is configured.
The bulleted lists below specify which features you will have access to after RBP is configured.
The bulleted lists below specify which features you will have access to after RBP is configured.
Note
If the data model does not have specific XML code for standard elements an engagement will be required.
● Variable Pay Individual Review must remain as legacy permission in the data model or the VRP view will not be accessible.
Custom Reports
The bulleted lists below specify which features you will have access to after RBP is configured.
Custom Reports
Your security model is complex if you have had any custom reports created. Please identify these custom reports prior to the
migration. These reports are not compatible with Role-Based Permissions and will need to be re-created.
Note
We recommend that you engage with an Implementation Partner.
The bulleted lists below specify which features you will have access to after RBP is configured.
Goal Management
The bulleted lists below specify which features you will have access to after RBP is configured.
Learning
The bulleted lists below specify which features you will have access to after RBP is configured.
Mobile
The bulleted lists below specify which features you will have access to after RBP is configured.
● Mobile Access
● Access to Enable Mobile Features
● Manage Mobile Users
● Enable User Search for All Employees
The bulleted lists below specify which features you will have access to after RBP is configured.
Platform/Foundation
The bulleted lists below specify which features you will have access to after RBP is configured.
● Admin Center
Presentations
The bulleted lists below specify which features you will have access to after RBP is configured.
Recruiting Management
The bulleted lists below specify which features you will have access to after RBP is configured.
The bulleted lists below specify which features you will have access to after RBP is configured.
Workforce Analytics
Workforce Analytics is made available only to employees who Your security model is complex if:
have data access to all organizational units.
● you have made Workforce Analytics available to HR Busi
ness Partners that only have access to the business area
they manage.
● you have had any custom reports created. Please identify
them prior to the migration. These reports are not com
patible with Role-Based Permissions and will need to be
re-created.
Note
We recommend that you engage with an Implementa
tion Partner.
Related Information
Review and perform each prerequisite on this page before starting the RBP migration process.
Prerequisites
The following is a list of prerequisites that must be met before migrating to Role-Based Permissions (RBP). Review
this list carefully:
● For customers who wish to migrate to Role-Based Permissions (RBP), it is essential that you fully understand
how Role-Based Permissions work. For this reason, it is necessary that you take the Role-Based Permissions
training. You can access this course through the SAP Learning Hub, the course is called SAP SuccessFactors
Foundations Administration - HR800e (e-Learning). Within this course, Unit 6 contains specific information
dedicated to RBP training. Please see the SAP SuccessFactors HCM Global Training webpage for more
information. That webpage is linked in the Related Information section below.
For login instructions, please review the SuccessFactors Admin Learning Center (SFALC) guide: SFALC
Access Guide
● Review the Assess Your Security Model Complexity section, in this guide, to determine if an implementation
partner is recommended or if you can migrate to RBP without this engagement.
● You must enable role-based permissions. You can enable role-based permissions in your system by following
the instructions in the topic Enable Role-Based Permissions.
Related Information
Observe the recommendations in this topic for tasks that you may want to perform before starting your migration.
Recommendations
● Allow enough time and resources to complete and test the migration (on your own or with an Implementation
Partner) as well as ample time to complete the project in both your non-productive (e.g., sandbox,
development, test, preview) and productive instances. Check out the Related Information section below learn
how to find an implementation partner.
Note
RBP migration is not an automated process. It will require downtime, so you'll need to plan accordingly. It's
required that you create a RBP Migration Request for both non-productive (e.g., sandbox, development,
test, preview) and productive instances, when migrating without an Implementation Partner. When
requesting to have Role-Based Permissions enabled in the production instance, the Instance Sync will not
be automatically requested. However, you can request that Instance Sync is enabled when you request to
have RBP enabled.
An incident will be required for SAP Cloud Support (CS) to enable RBP. For more information about how to
create a support incident, please see the Knowledge Base Article (KBA) in the Related Links section below.
● Listen to the prerecorded webinar for Role-Based Permission Migration linked below.
Related Information
If an Implementation Partner engagement is recommended, please contact your SAP SuccessFactors Account
Representative to provide you guidance on next steps.
For more information about Implementation Partner (SAP/Partner) engagements, see this page in the SAP
SuccessFactors Community. Choosing an Implementation Consultant
Before migrating to role-based permissions, complete the tasks outlined in these topics, such as reviewing your
existing permissions, gathering and documenting permission requirements, and creating support tickets to begin
your migration. When defining the configuration, consider the best practices regarding maintenance and
performance.
Complete the preplanning steps defined this process map to begin your migration. When you've completed these
steps, begin the tasks outlined in Prepare Your Instance for Migration.
Hover over each step in the image for a description. Click on each phase for more information.
The steps to prepare for your migration should occur before you enable role-based permissions in your system.
These steps will help you to thoroughly understand your current security system permissions.
When preparing to migrate, your project should begin with a clearly defined plan. To begin defining your project
plan, start by reviewing the permissions that you have defined in your current security model, including the roles
that you need to create and the permissions that are needed for your user groups. In this phase of your migration,
it’s very important that you perform the following steps in order and as they are presented and consider best
practices regarding maintenance and performance.
Reviewing your current permissions is critical to your RBP migration process. Use the task outlined in this topic to
understand your non-RBP instance.
Context
Each migration project team needs to understand the permissions that currently exist and document those
permissions. Identifying the roles and permissions from the old framework will provide the team with the
foundation to build out the plan to migrate to RBP. There are two ways to identify existing permissions. You can
identify existing permissions through comparison, as described in the second step or you can create a Security
Permissions Report, as described in the first step.
Procedure
Before you migrate an instance from the old permission framework to RBP, create a security permission report
to review your current permissions.
1. From the Admin Center, select Set User Permissions Security Permissions Report .
2. Check all reports listed and click Submit.
3. Once reports are completed, they are available for download in the following location: Admin Center
Reports Scheduled Reports
This report lists individual permissions.
4. Sort and filter the reports so that you're grouping the permissions that you want to set up as roles.
Similarly, sort and filter the reports so that you're grouping the employees that you want to set up as
groups.
5. Leveraging your existing groups, define each group. That is, define who should have access to whom.
6. Leveraging your existing roles, define each role. That is, define what data and functionality should be
accessed by who.
Comparing your current permissions, as described in this step, can be done in addition to creating security
report. If necessary, you can perform both tasks to ensure that you've thoroughly gathered your permission
requirements. However, in cases where you don't have the option to create security reports, you can use this
task to assess your permission needs. Use the example below to understand how the comparison check can be
used.
1. Leveraging your existing groups, define groups, that is who should have access to whom.
2. Leveraging your existing roles, define roles, that is what data and functionality should be accessed by who.
As defined in your group definitions.
3. Create a tab in the RBP workbook to show how you've mapped the groups to the roles.
4. Add the roles and groups to the RBP workbook.
Note
We suggest that you complete a comparison for each role by taking screenshots prior to enabling RBP. The
following are examples of legacy permission comparisons in Live Profile. You should view Profile, Scorecard
and History permissions on all the existing roles.
Example Image
Note
The following displays are examples only and the im
ages may appear differently in your system.
Example Description
Note
The following displays are examples only and the im
ages may appear differently in your system.
Example Description
Note
The following displays are examples only and the im
ages may appear differently in your system.
Example Description
It's important that you have a conceptual understanding of role-based permissions and how they control access to
the data in your solution. We recommend that you take the training described on this page.
Context
Complete the Role-Based Permissions training in Unit 6 of the Introduction to SAP SuccessFactors
Administration - HR800e (e-Learning) course. See the Prerequisites and Recommendations section in this
guide for more details. (See the Prerequisites and Recommendations linked in the Related Information section
below.)
Note
Log into the SAP SuccessFactors Community and SAP Learning Hub to gain access to the course.
Procedure
1. Select the training link in the Related Information section to find the SAP SuccessFactors RBP training.
2. Select the Enter Here! link to the SuccessFactors Administrator Learning Center (SFLAC).
3. Select Foundations. Here, you'll find the HR800e (e-Learning) course.
4. Select the HR800e (e-Learning)link and go to Unit 6 - Role-Based Permissions.
Related Information
Review your current product permissions, they will help you to gather the requirements needed for SAP
SuccessFactors Role-Based Permissions migration.
Context
Work with the subject matter experts, within your company, for each of the SAP SuccessFactors products that you
have deployed. Determine the roles, the permissions those roles require, and who would be granted these roles.
Procedure
1. Starting with the five most basic roles, gather requirements using the following best practices and
recommendations:
Every company has a set of generic, basic roles, such as Manager or HR Manager. These roles tend to have
similar permissions. The list of the five basic (generic) roles includes their typical permissions. Use this list to
start the requirements discussion with your team. These roles do not require specific groups and some roles
might be split up into more specific roles. For example, your company does not have a single manager role, but
one manager role for each region because in each region they are allowed to see different data.
Note
This document does not provide instructions for complex security models.
○ Avoid redundancy
○ Do not allow overlap between roles
○ Limit the number of roles and groups
○ Use meaningful naming conventions
○ Define a governance that covers how changes to RBP will be handled in the future
○ The Diagnosis Tool section in this guide provides information on how to run RBP checks and maintain
good system performance. This tool provides a report that highlights all potential risks for the specific RBP
configuration settings. Note that you will need to create an incident ticket to have CS run this tool for you.
See the Diagnosis Tool section in this guide for more details. (See the Diagnosis Tool link in the Related
Links section below.)
Use the workbook to document the requirements you gathered in the previous step.
Context
After gathering requirements based on your current permission model, use your workbook to document those
requirements for your migration process.
Procedure
Related Information
Review the sections outlined in this topic to create your project plan.
Context
Create a project plan to keep track of your RBP migration process. Read through the following sections of this
document as you create your project plan:
Related Information
Creating your test scripts will help you to test your RBP configuration.
Context
Before copying your RBP configuration to production, you'll need to test your permissions, groups and roles.
Procedure
Create test scripts. You will test and validate against the requirements.
When you've completed the previous steps, you are ready to begin performing your migration.
Context
The list tasks below will help you understand which you are required to initiate.
Procedure
○ Instance Refresh (scheduling may take 2-4 weeks). See the Incident Creation Instructions section in this
guide for more details. (See the Incident Creation Instructions link in the Related Links section below.)
○ Customer is required to open an incident ticket.
○ SAP Cloud Support (CS) enables Role-Based Permissions in the non-productive instance. (This includes
Instance Sync).
○ Customer is required to open an incident ticket.
○ Customer configures Role-Based Permissions in the non-productive instance.
○ Customer performs validation in the non-productive instance.
○ SAP Cloud Support enables Role-Based Permissions in the productive instance.
○ Customer is required to open an incident ticket.
○ Customer copies the configuration from the non-productive instance to the productive instance using Instance
Sync.
○ Customer performs validation in the productive instance.
○ Cutover Execution: Customer verification. Role-Based Permissions Migration is complete.
Next Steps
When you've completed the tasks in the prerequisites and recommendations topics and the tasks outlined in Steps
to Prepare for RBP Migration, continue to the topic, Migrating to RBP.
Related Information
When you implement and configure Role-Based Permissions (RBP), this is performed first on a non-productive
instance (e.g., sandbox, development, test, or preview). Only after successful testing, should you copy the
configuration to the production instance. For this reason, it is very important that the non-productive instance and
the production instance contain the same data. This sections covers the following topics: Requesting an Instance
Refresh, AssessYour Instance Types, and Creating Incidents for RBP Migration.
Assessing the differences between your sandbox, development, test, or preview instances is an import task in your
RBP migration process.
Remember, RBP is completely data dependent. When you migrate RBP, you'll need to first migrate your test
instance. Only after successful testing you copy the configuration to the production instance. For this reason, it is
very important that test instance and production instance contain the same data.
Prior to requesting the instance refresh, account for any differences in your non-productive (e.g., sandbox,
development, test, or preview) instances. The instance refresh overwritten, Account for these differences prior to
performing the instance refresh. For example, if you implement a new Performance Management form, you need to
first extract the XML and save it, because it will be overwritten and lost once the refresh is completed.
● Refresh the employee data file in the test instance with production data.
● Discuss internally, if there are data changes coming that would affect the ability to permission correctly (for
example organizational restructures). If so, the data must be available in the test instance if you want to add it
to your permissions now. In addition, the data will need to be in the production instance by the time the
permissions are ready to be copied to the production instance.
● Are more features enabled in the production instance than in the test instance?
● Does the non-productive (e.g., sandbox, development, test, or preview) instance and production instance
contain differences that would affect the ability to set permissions correctly?
● Are there more features enabled in the productive (or production) instance than in the non-productive instance
or vice versa?
Your RBP migration requires that you create incidences to initiate RBP Migration and to request an instance refresh
for your test and production environments.
Context
During the RBP migration project, you will need to open three incidents:
Procedure
1. From the SAP ONE Support Launchpad, enter an incident with the title: RBP Migration Request
Choose the appropriate incident description that you'll use to create the necessary incidents for your
migration. If you are migrating for reasons related to Data Privacy and Protection, choose a description from
the table that contains the keyword GDPR. If you are migrating for reasons unrelated to Data Privacy, choose a
description does not contain GDPR.
The incident is required so that SAP Cloud Support (CS) can enable RBP the initial setup.
Incident Descriptions for NON- Data Privacy and Protec Incident Descriptions for Data Privacy and Protection Mi
tion Migrations gration (GDPR)
RBP Migration: Instance Refresh RBP Migration for GDPR: Instance Refresh
RBP Migration: Run RBP Diagnosis Tool RBP Migration for GDPR: Run RBP Diagnosis Tool
Note
If you are a PE/SPRAC customer, enter and incident with following title: RBP Migration – PE/SPRAC
3. In your incident, provide the name and email address of your Account Representative, CEE, and CSM (if
applicable).
Account Representative First Name, Last Name, and email address (Required)
Note
If you do not have a CSM, enter No CSM in this field.
Services Sales Executive First and Last Name and email address (Required)
Are you concerned about data protection and privacy and Yes - The incident that you create must have the proper
does your organization plan to leverage data protection description entered. This incident will have a high priority
and privacy functionality? and has been evaluated
No – The RBP Migration will take place before the Fiori ini
tative and prioritized appropriately
6. Security Complexity can be broken down into Simple or Complex. For more information, see the topic
Assessing Your Security Model Complexity, linked below.
Complex
7. In your incident, include the Username and Password for Cloud Support to use for your RBP migration
project. This information would be for one the System Administrators that is already uploaded into (both
production and non-productive instances).
Note
Ask the customer to confirm that this user has been granted all administrative privileges. (If this has
not been completed, the customer MUST complete prior to enabling RBP). If the customer has SSO
enabled request that Manage Support Access is enabled.
The username and password for your super admin user is required for RBP migration
8. In your incident, include the Username and Password for Cloud Support to use for your RBP migration
project. This information would be for one the System Administrators that is already uploaded into (both
production and non-productive instances).
The username and password for your super admin user is required for RBP migration
Note
Confirm that this user has been granted all administrative privileges. (If this has not been completed,
you MUST grant administrative privileges prior to enabling RBP)
Beyond the bullet list above, for any other questions or queries, CS will instruct you to attain an
Implementation Partner engagement to help with your migration.
SAP Cloud Support will Grant Permissions, Create Groups, and will then link them together. This table lists the
various RBP tasks that CS will complete:
Note
Starting with Everyone is a de
fault or placeholder at the be
ginning of this process. The
customer should consider
modifying this Target Group
selection after the handover
from CS.
Note
There are three types of adminis
trators for each customer instance:
Note
The role-based permissions concept assumes that there are just a few users per company with the ability
to manage role-based permissions. Typically, you want to keep the number of people able to maintain
permissions as limited as possible as there should be no need to update them frequently.
○ The Super Administrator (sometimes referred to as Super User) is the only user who is allowed to log
on to the system after RBP is enabled. The Super Administrator can grant other users the right to
manage role-based permissions. As a Super Administrator, you can grant permissions to manage
Note
Any follow up questions or concerns need to be discussed with an Implementation Partner for further
evaluation.
Related Information
Request the instance refresh in advance, scheduling can take up to four weeks.
Context
Planning is important as it can take additional time for an Instance Refresh to complete, depending on the modules
that are deployed or the resources available for validation, scheduling may take 2-4 weeks. Your request will be
submitted to refresh the production instance to the non-productive (e.g., sandbox, development, test, or preview)
instances. This refresh is completed to ensure that testing is consistent post-RBP implementation.
Note
If you have completed an Instance Refresh within the last two months, this step can be skipped.
Go the SAP ONE Support Launchpad to create an incident to request an instance refresh:
○ Create a RBP Migration Request by logging in to the SAP ONE Support Launchpad https://
launchpad.support.sap.com/ . See the Creating Incidents for RBP Migration section for more information.
○ Note
If you have SAP SuccessFactors HCM Suite and Learning integrated, then you need to create an incident to
have both refreshed. See the following Knowledge Base Articles (KBA):
Related Information
As a super admin, you can enable role-based permissions using the admin center. Use this section to learn how to
enable RBP and understand the pre-requisites to this performing task.
As a super administrator, you can enable role-based permissions. Enabling RBP disables your current security
permissions model allowing you to begin setting up RBP in your system. If you need to disable RBP for testing
purposes, you can disable RBP and your legacy permissions will reactivate in the system.
Enabling RBP requires that you have a super admin who can access the Platform Feature Settings page. This user
will allow you to grant RBP access to other administrators in your system. Ensure that you have a super admin to
begin the tasks in sections that follow.
● Super Admin User - You must have a super admin user. If you do not, contact customer support to have one
created on your behalf.
● RBP Admin User - You will create this administrator during the process of enabling RBP and you'll have the
ability to give RBP admin permissions to your super admin, or to another administrator in your system.
Separating the super admin and RBP admin privileges can help to ensure that one user does not have
complete authority in the system.
Note
Platform Feature Settings Permission - Once RBP is enabled, in order to disable RBP, the super admin must be
granted the Platform Feature Settings permission in the RBP environment.
Using your super admin credentials, you can enable RBP from the Platform Feature Settings in the Admin Center.
Context
The assumption of this task is that you have a working super admin user. If you do not have a super admin, contact
Customer Support to have one created in Provisioning. If you are unsure who your super admin is or of their
credentials, contact customer support to reset this user's credentials.
Procedure
This will disable your current permission settings and enable role-base permissions.
Related Information
Prerequisites
Procedure
1. Log in to your system with admin credentials. For example, this user might be called SAP Admin.
If you do not have super admin credentials, contact customer support to have one created for you.
2. Go to Admin Center and search for Manage Role-Based Permission Access. to grant RBP management access
to your super admin or to another admin in your system.
The list of users displayed represent everyone in your system who has access to RBP.
3. Select Add User and use the keyword search to find the user you'd like give RBP access to.
4. Select the user's name and click Grant Permission.
5. Log out.
6. Log in.
At this point your chosen administrator has the ability to create groups and roles using RBP.
The Platform Feature Settings page allows you to enable or disable RBP. You must give an administrator access to
this page so they can implement RBP in your system.
Context
In your previous security model, the super admin had access to the Platform Feature Settings page. Now, in your
RBP environment, the super admin must be given access to this page once again.
Procedure
When testing RBP, you can disable your RBP security model without losing your settings.
Context
When implementing RBP in your test or production environments, you can disable RBP as needed. Disabling and
enabling RBP does not delete your previous permissions model settings or your RBP settings.
Procedure
This will disable your RBP permission settings and enable your previous permissions model.
4. Click Save.
Your security permissions revert to your previous permission model and your settings remain intact.
The Role-Based Permissions Migration Tool helps you to begin the process of migrating to RBP. The tool allows you
to create some of the most commonly used roles in RBP and assign permissions to those roles based on your
legacy permissions. This tool can also be used to directly add additional role-based permissions.
Note
It's important to understand that since this tool is used to guide you through the migration process, the
sequence of steps used to migrate with this tool are specific to the RBP Migration Tool.
Note
If you have not defined any groups for RBP, you can create groups using the migration tool and use those
groups to grant access to the roles you created in the tool. You can also update any default rules already
associated with the role.
Note
Until you publish a role template, it remains in draft mode. You can have five role templates in draft at one
time. After creating five role drafts, you must publish at least one role in order to create another role.
The RBP migration tool uses your legacy permission structure to help you enable and map some of your legacy
permissions to role-based permissions. This tool is intended to assist small organizations who wish to create a
small set of roles in their system. It's also intended as a starting point for larger organizations to help you get
started with your RBP migration.
Note
The migration tool will help you get started, ensure that you refer to the section: Migrating to RBP, to manage
your RBP migration.
To help determine if the migration tool can help you with your RBP migration, you should answer yes to the
following questions.
● Do you need create and add permissions to the following roles? (User Login, Everyone (All Employee),
Employee (Self), Manager, Second Manager, Matrix Manager, HR Manager
● When assigning permissions using a relationship hiearchy, do you require only a single relationship between
the reporting lines of granted and target users?
For example, does the target or granted user have a relationship of employee to the HR manager.
Note
We recommend that you seek an implementation engagement when migrating Compensation and Recruiting.
Related Information
To perform your RBP migration outside of the migration tool, use the instructions described in the Migrating to RBP
section: Migrating to RBP [page 54]
The first step in migrating to role-based permissions is to select the permission role template that you wish to
create in your system.
Context
Using the migration tool, you'll need to create roles, choosing from those supported in the migration tool.
Procedure
At this point, you can rename the role template you've selected.
3. Select Ok
The role the is now in draft mode and you can update the details of this role in the migration tool until its
published.
Note
You can have up to five role templates in draft at once, at that point in order to create other roles, you must
publish at least one role.
Next Steps
The RBP migration tool supports creation of some of the basic roles that you'll need in your system. Some of these
roles contain default permissions and default group assignments that you can update and customize.
Supported Roles
The migration tool contains some predefined role templates that you can use to get started when defining the roles
you'll need for your migration.
Note
When making changes to role templates, ensure that your descriptions are also updated.
Everyone(All Employee) ● Live Profile Access Everyone (All Employee) All (Employee
● Organization Chart Navi
gation Permission†
● Company Info Access†
● User Search†
● Employee Data
Assign Additional
Permissions Employee
Data
Assign Additional
Permissions Employee
Data
Second Manager (Optional None All Second Managers All Second Reports
Role)
The second step in the RBP Migration Tool workflow is to assign permissions to the role. Each role template comes
with some default role-based permissions, but you'll need to add additional permissions to your roles in order to
complete its definition and control access to your system.
Context
On the Assign Permissions screen, you'll see a list of legacy permissions and the categories they belong to. The
legacy permissions listed represent a subset of the possible permissions in your system that you can migrate.
Based on the products you have deployed in your system, choose the legacy permissions that you want to map to
role-based permissions.
Procedure
1. After you've selected a role template, you can map legacy permissions to the role by selecting Assign
Pemissions.
2. From the Administrative Privileges section, slide the toggle to the Yes position, for the permissions you want to
map to RBP.
After you've chosen the administrative and user legacy permissions to map to RBP, you may also want to
directly assign some role-based permissions to the role that you're defining. You can add role-based
permissions directly to your role by selecting Assign Additional Permissions.
4. When you've added your permissions to the role, click Next.
For example, the Everyone (all) role might have the Live Profile permission mapped from legacy permissions to
role-based permissions as shown in the display.
Next Steps
Related Information
The RBP Migration tool maps the following legacy permissions to role-based permissions.
Manage Calibration Manage Permission for Executive Review Manage Permission for Executive Review
Managing Development Import Learning Administrator and Edu Import User Relationship for Learning
cational Representative Administrator and Educational Represen
tative
Import Learning Activity by Web Service Import Learning Activity by web service
Admin Career Development Plan Export Admin Career Development Plan Export
Data Data
Career Development Plan Access (CDP) Career Development Plan (CDP) Access Career Development Plan (CDP) Access
Permission Permission
Career Development Plan (CDP) Learn Career Development Plan (CDP) Learn
ing Activity Mass Add ing Activity Mass Add
Career Worksheet Suggested Roles Ac Career Worksheet Suggested Roles Ac
cess Permission cess Permission
Admin Access to Forms OData API Admin Access to Forms OData API
Manage Objective Execution Manage Configuration of Objective Exe Manage Configuration of Objective Exe
cution cution
Mass Create Form Instances (Launch Mass Create Form Instances (Launch
forms now) forms now)
Schedule Mass Form Creation (Launch Schedule Mass Form Creation (Launch
forms later) forms later)
Manage Talent Card Manage Talent Card Configuration Manage Talent Card Configuration
Ad Hoc Report Builder Standard Reports Ad Hoc Report Builder Standard Reports
Bin (Employee Central Customers Only) Bin (Employee Central Customers Only)
Thresholds Thresholds
Trending Trending
Calibration Calibration
Calibration Calibration
System Properties Import Extended User Information Import Extended User Information
After you've assigned permissions to the role you created, you'll need to define who will have access to the
permissions contained in the role. You can do that by adding a rule to the role. A rule contains a group of users who
you want to have access to the functionality given by the role. In some cases that rule will be required to contain a
target group; a group for whom users granted the role can perform actions upon other users. If you need to define
an RBP access group, select Define Group and use the link to the Dynamic Group document to understand the
steps required to complete this task.
Context
The role you're creating may contain at least one rule by default and this rule may contain one group and one target
group. You can edit or remove this rule or you can add additional rules. A rule will contain at least one access group
but may also contain a target group. If you haven't defined any groups in your system, you'll need to select Define
Groups.
To add a rule, refer to the following topic: Assigning Permissions to a Role [page 50]
4. If you need to define groups in order to complete step 3, select Define Group.
To define a group, refer to the following topic: Creating Dynamic Permission Groups [page 59]
5. After you've assigned groups and target groups to the role, click Next.
For example, a rule for your role templates may contain multiple groups separated by a comma with a target
group as shown in the display below.
After creating groups and roles, you'll need to assign permission roles to your employee groups.
Procedure
1. In the Permission Settings section, click the Permission button to specify the permission you want to assign to
the role. The Permission Settings window opens.
2. On the left side of the page, you'll see the different permission categories. Click a permission category to reveal
the different permissions.
Next Steps
Dynamic permission groups are generated automatically when the attributes of employees match the group
selection criteria. Administrators can create and manage dynamic permission groups for both employees and
external users.
Procedure
The available user types vary depending on how your system is configured. Possible values may include:
Note
The External Learning User option is only available if you have Learning enabled in your system.
When defining a dynamic group for an external learning user, you can identify an External Source Channel to
complete the criteria for inclusion. This allows external learning users to be defined based on the source of
origin. The external source channel is only available to SAP SuccessFactors Learning customers. The External
Learning User must be enabled in Provisioning for external learner and external source channel to be available.
Tip
When defining External Learning User groups in your system, it is recommended that you do not create
more than 50 groups.
5. Choose the group selection criteria from the People Pool, in the Choose Group Members section.
Depending on the complexity of your permission group selection criteria, you can choose multiple people
pools.
6. In the Search Results screen, enter a search term or click the search, to display all available values.
For some categories, a smaller pop-up window appears where you can enter additional values or information,
such as Time Zone settings. If you select the Team View category, you can use hierarchical relationships to
specify the group. This allows you to apply rules such as: everybody in Carla Grant's team, all levels deep.
7. Make your selection and click Done.
8. If you want to add another condition for defining the people pool, click Add another category and choose a
category and item. If you use two or more categories, this functions as an AND operation, that is, only users are
selected who meet all selection criteria.
Example
If you want to create a group of sales employees working in the US, you would need to choose the category
Department and select Sales. You add a second category Country and select USA.
9. Complex group definitions may require you to use multiple people pools. If you use two or more people pools,
these people pools functions as an OR operation, that is, all users are selected who fulfill the selection criteria
of at least one pool.
Click Add another People Pool and then add categories and items.
Example
You have two different offices: An office in Chicago and an office in Boston. Each office has a Sales team and
a Finance team. You only want to include Sales employees from the Chicago office and Finance employees
from the Boston office. You'll need to create two separate pools then.
Note
10. If there are employees you'd like to exclude from the Permission Group definition, select them in the Exclude
these people from the group section.
After you've assigned permissions to your role and granted the role to your groups, you can review the role-based
permissions that you have enabled for the role.
The legacy permissions that you have mapped to role-based permission and any additional role-based permissions
that you've added to your role are ready for review and publishing. You can view your list of permissions that require
a target population and those that do not require a target population. You can also review any rules that you've
defined for this role. When you're satisfied with the role details, select Publish.
When the role is published you can manage it using Manage Permission Roles in the Admin Center.
When you've completed this process for all the roles you wish to create, you can test your implementation and
ultimately copy your configurations to production by reviewing the following:
● Testing Your Role-Based Permissions: Testing Your Role-Based Permissions [page 75]
● Check Tool: Check your RBP configurations: Using the Check Tool [page 79]
● Copying configuration to the production Instance: Copying Configuration to the Production Instance [page
87]
When you've complete your prerequisites and prepration steps to RBP migration, use this section to learn how to
create your groups and roles and to grant permission.
The RBP security authorization model uses groups and roles to organize employees (groups) and permissions
(roles) to control access to your system; By organizing employees into groups and permissions into roles you can
assign a group of employees the same set of permissions by assigning them a role.
Note
RBP is approved for organizations with up to 300,000 employees. We will continue to raise this bar in the
future. When in doubt, contact customer support.
Role-based permissions contain three main elements: Permission Groups, Permission Roles, and Target
Populations. Permission groups are a set of employees who share certain attributes such as City or Job Code and
require access to a similar set of tasks within your system. Roles are defined as a set of permissions. You can assign
the permission roles, you define, to a permission group and if the role requires that you define a target population,
meaning a group to perform tasks for, you'll assign the target population when you define the role.
Target populations are groups that are assigned to permission roles when the permission granted is performed on
behalf of other employees.
Tip
We recommend that you create groups before creating roles so that during role creation, you can select the
group for which to grant the role. In addition, you’ll need defined groups for roles that require a target
population.
Permission groups are used to define groups of employees who share specific attributes. You can use various
attributes to select the group members, for example a user's department, country, or job code.
Example
There might be a permission group called "Human Resources in US", which lists all US-based employees who
work in the HR department. To define this group, you would specify that users must match the selection criteria
"Country = United States" and "Department = HR".
Note
The attributes or selection criteria that are available for defining groups are configurable.
In RBP, you can assign permission roles to permission groups. In addition, you use groups to define the target
population a granted user has access to.
Example
The group "Human Resources in US" might have access to the group "US Employees".
Groups configured with criteria other than specific user names are called dynamic (as opposed to static),
which means that the assignment of employees into and out of a group is automated. For example, a group of
granted users can be “All employees in the Sales department”. As employees are transferred into and out of the
sales department, their permissions will automatically adjust. This automation will save you time and money.
This is especially beneficial for large organizations that need higher levels of administrative efficiency.
Static permission groups are created and modified by adding individual user names to a group using an excel
spreadsheet. They store a static list of users instead of a list based on dynamically generated criteria. Changing
user information does not modify group members, you must redefine group members by importing an updated
spreadsheet.
Procedure
4. Download a blank CSV template after you've chosen an import type. The Full Replace template has two column
headers, GROUPNAME and USERID. The Delta Replace has an additional Action column.
5. For each user that you add to a group, add the group name to the GROUPNAME column and user's ID to the
USERID column.
Note
For new users, you can create user IDs in the upload file.
Character encoding of your file should be Unicode(UTF-8). The maximum file size is 20MB. If your import
file exceeds 20MB, you can either split the file into several smaller files or request Professional Services to
modify the system configuration file.
If your file has errors, they display at the top of the Import Static Group window.
Note
For one group type, a maximum of two jobs can run at the same time.
Results
After the upload completes, the system sends you a notification with success or error messages. Successfully
created groups display in the group list after refreshing your system.
You can add members to a static group in your system or by importing an excel file to your system.
Procedure
Although you add members to a static group using a spreadsheet, you can delete static group members using the
system.
Procedure
Results
Deleted members will no longer have access to the tasks or data of the group.
Dynamic permission groups are generated automatically when the attributes of employees match the group
selection criteria. Administrators can create and manage dynamic permission groups for both employees and
external users.
Procedure
The available user types vary depending on how your system is configured. Possible values may include:
○ Employee (default)
○ External Learning User
The External Learning User option is only available if you have Learning enabled in your system.
When defining a dynamic group for an external learning user, you can identify an External Source Channel to
complete the criteria for inclusion. This allows external learning users to be defined based on the source of
origin. The external source channel is only available to SAP SuccessFactors Learning customers. The External
Learning User must be enabled in Provisioning for external learner and external source channel to be available.
Tip
When defining External Learning User groups in your system, it is recommended that you do not create
more than 50 groups.
5. Choose the group selection criteria from the People Pool, in the Choose Group Members section.
Depending on the complexity of your permission group selection criteria, you can choose multiple people
pools.
6. In the Search Results screen, enter a search term or click the search, to display all available values.
For some categories, a smaller pop-up window appears where you can enter additional values or information,
such as Time Zone settings. If you select the Team View category, you can use hierarchical relationships to
specify the group. This allows you to apply rules such as: everybody in Carla Grant's team, all levels deep.
7. Make your selection and click Done.
8. If you want to add another condition for defining the people pool, click Add another category and choose a
category and item. If you use two or more categories, this functions as an AND operation, that is, only users are
selected who meet all selection criteria.
Example
If you want to create a group of sales employees working in the US, you would need to choose the category
Department and select Sales. You add a second category Country and select USA.
9. Complex group definitions may require you to use multiple people pools. If you use two or more people pools,
these people pools functions as an OR operation, that is, all users are selected who fulfill the selection criteria
of at least one pool.
Click Add another People Pool and then add categories and items.
Example
You have two different offices: An office in Chicago and an office in Boston. Each office has a Sales team and
a Finance team. You only want to include Sales employees from the Chicago office and Finance employees
from the Boston office. You'll need to create two separate pools then.
Note
10. If there are employees you'd like to exclude from the Permission Group definition, select them in the Exclude
these people from the group section.
11. If you want to prevent the group being updated automatically when new employees match the selection
criteria, click Lock group.
You can edit, copy, and delete static or dynamic permission groups. For dynamic groups, you can also view the
group's change history.
Context
Note
Procedure
1. Go to the Admin Center Tools and search for Manage Permission Groups.
2. In the Manage Permission Groups screen, click the Take Action dropdown menu next to the permission group
you want to modify.
3. Choose the desired action.
RBP uses permission roles to group a set of permissions. After grouping the permissions into a role, you can assign
the role to a group of users, granting them access to certain tasks and features in your system.
Permission roles consist of a set of permissions that give employees access rights to an employee or a group of
employees. As such an employee or a group that has been granted with a permission role has access to certain
Role-based permissions allow you to grant a role to a specific employee, a manager, a group, or to all employees in
the company. The roles can provide very granular permissions, as this example illustrates:
Example
There may be roles such as "HR Compensation and Benefits Manager", "HR Manager for Sales", and "HR
Learning and Development Manager". While all three are HR managers, their roles have been distinctly carved
out — one handling compensation and benefits, another handling the sales team, and the third handling
Learning and Development.
When your permissions roles consist of one or more permissions that require a target population, you'll need to
specify a target to complete creation of the role. Roles that require a target population will contain a permission
that gives a group access to perform actions or view information for other employees.
Example
A Manager may have a role where one permission allows the manager to modify the salary for all of their direct
reports. In this example, the manager's direct reports represent the target population needed for the
permission role.
Note
Permission roles contain a group of permissions that you can grant to an employee or a group of employees known
as the Granted Users Circle. In general, it's best practice to define your user groups before defining your permission
roles.
Procedure
After this role is successfully created, the new role will be listed on the Permission Role List page.
6. Click Save Changes.
Results
You have a permission role and you can now add permission and assign it to a group.
Next Steps
After you've created a permission role, you'll need to assign permissions to the new role.
After creating groups and roles, you'll need to assign permission roles to your employee groups.
Procedure
1. In the Permission Settings section, click the Permission button to specify the permission you want to assign to
the role. The Permission Settings window opens.
3. Select the checkboxes next to the permissions you'd like to grant to the role.
4. Click the Done button when you finish marking your selections.
5. Click Save Changes.
Next Steps
You can edit, copy, or delete a permission role, view a summary of a permission role, and view its change history.
Context
When you copy a role, only the permissions get copied over. You will need to manually grant employees access to
this new role.
1. Go to the Admin Center Tools and search for Manage Permission Groups.
2. In the Permission Role List screen, click the Take Action dropdown menu next to the permission role you want
to modify.
3. Choose the desired action.
Role-based permissions support the role of External User and allows the External Learner User limited access to
complete specific tasks or training.
The external user role can be granted to the Everyone (External Learner) group. Permissions for the external user
role can be set to grant access to SAP Jam and SAP SuccessFactors Login, Learning modules, and Mobile.
For complete details about External Learning, please refer to the Offering Learning to the Extended Enterprise
guide.
If you have external users, consider creating a management system for them so that you can maintain their access.
When you have external users in your extended enterprise, your plan for maintaining them should include: resetting
user passwords, granting access, and so on. In most cases, you manage external users as you do any other users.
One exception is target populations. External users can be a unique target population. For example, if you want to
manage external users in learning, you must add All (External Learning) to the target population of users managed
by the administrator.
Create a role mapping for external users so that users who log in through SAP SuccessFactors Learning sites are
granted the correct permissions.
Prerequisites
Procedure
You can select additional permissions. For example, you can grant the external users access to SAP Jam.
9. Click Done.
You can assign a permission role to everyone or to a subset of employees, determined by permission groups, target
populations, or by relationships. When defining a role in RBP, you can assign the role to a group that you've created
or you can assign roles based on hierarchical relationships. Some roles will require that you also assign target
● Permission groups: You assign a permission role to a defined group of users. However, relationships can also
play a role here as you can define that the granted user's managers have the same permissions. You can also
define how many levels up in the hierarchy you want this permission to be granted.
Note
If you want to grant a role to a named user, you first have to create a group and add the user to this group.
Then you can grant the role to the just created group.
● Target Population: Depending on the permissions included in the role, you might also have to define the target
population. Not all permissions require you to define a target population. For example, if the permission
includes just the access to an application (such as the Learning Access Permission), there is no need to add a
target group. For certain permissions, in the Permission settings screen, a target population must be defined.
This is identified by the "t" icon next to the permission name with the following text displayed: t= Target needs
to be defined.
Note
A target population for an external Learning user can be defined two ways:
○ Select Everyone (External Learner)
○ Select Target population of: and click Select, to select groups
● Relationships: Access groups can be defined using relationships (for example, manager-employee
relationship) that are derived from the job relationship object. These relationships can be hierarchical or non-
hierarchical. You can find more information in the following chapter Using Relationships to Grant Permissions
[page 71].
If you allow the respective managers to have the same permissions, this may have a negative impact on the
performance. The hierarchy then has to be checked whenever such a manager tries to access an element
which was permissioned this way.
After creating your roles, you must assign the role to a group of employees. This ensures that employees are given
access the permissions they need to perform their tasks.
Procedure
You can allow managers to have the same permissions and define how many levels up in the hierarchy you want
this permission to be granted. However, allowing respective managers to have the same permissions may have
a negative impact on the performance. The hierarchy then has to be checked whenever such a manager tries to
access an element which was permissioned this way.
7. Exclude Granted Users:
For some permissions, it might be necessary to exclude the granted users from applying the permissions on
themselves. For this, select Exclude Granted User from having the permission access to themselves.
Example
If the role grants permission to edit the salary, you want to prevent the members of this permission group
to be able to edit their own salary as well.
8. Click Done to assign this role to the defined users. You are taken back to the Permission Role Detail page.
9. Click Save Changes to complete creating the role.
Next Steps
Target populations are assigned to roles that require tasks to be performed on behalf of another employee.
Context
Target populations allow you to give employees such as managers and administrators access to data or tasks that
need to be maintained for other employees. Depending on the permissions included in the role, you may need to
define the target population. Not all permissions require you to define a target population. For example, if the
permission includes just the access to an application (such as the Learning Access Permission), there is no need to
add a target group. For certain permissions, in the Permission settings screen, a target population must be
defined. This is identified by the "t" icon next to the permission name with the following text displayed: t= Target
needs to be defined.
Procedure
6. Click Select to select the target groups that you want to assign to this permission role.
7. Exclude Granted Users:
For some permissions, it might be necessary to exclude the granted users from applying the permissions on
themselves. For this, select Exclude Granted User from having the permission access to themselves.
Example
If the role grants permission to edit the salary, you want to prevent the members of this permission group
to be able to edit their own salary as well.
8. Click Done to assign this role to the defined users. You are taken back to the Permission Role Detail page.
9. Click Save Changes to complete creating the role.
There are relationships that can be specified through employee fields, and managed through tools, like the
employee data.
General Relationship Types: Hierarchical relationships are characterized by a reporting line between the granted
user and the target user. These are relationships between employees and their managers, and employees and their
second managers or alternate managers. Non-hierarchical relationships on the other hand are single-level
relationships. These include the relationship of an employee to the HR manager, the matrix manager and custom
manager. While each employee can have only one Manager, one Second Manager and one HR Manager, they can
have multiple Matrix Managers and Custom Managers.
Employee Central Only: If employees have global assignments (that is, a job in another country), they have both a
home manager and a host manager. In addition, they have a home HR manager and a host HR manager. All
managers need to have access to both the home jobs of the employees as well as to the host jobs of the employees.
This is covered by the following additional relationship types for global assignments:
Custom Manager
After defining permission roles, you can use relationships to establish access to those roles instead of permission
access groups.
Context
Using relationships to grant access permissions gives you the added ability to define access and target populations
using your organizations hierarchy.
Procedure
Note
If you allow the respective managers to have the same permissions, this may have a negative impact on the
performance. The hierarchy then has to be checked whenever such a manager tries to access an element,
which was permissioned this way.
Depending on the permissions included in the role, you might also have to define the target population. Not all
permissions require you to define a target population. For example, if the permission includes just the access to
an application (such as the Learning Access Permission), there is no need to add a target group. For certain
permissions, in the Permission settings screen, a target population must be defined. This is identified by the
"t" icon next to the permission name with the following text displayed: t= Target needs to be defined.
○ Target Population: A target population for an external Learning user can be defined two ways:
○ Select Everyone (External Learner)
○ Select Target population of: and check the checkbox to Select... to define the group
For some permissions, it might be necessary to exclude the granted users from applying the permissions on
themselves. For this, select Exclude Granted User from having the permission access to themselves.
Example
If the role grants permission to edit the salary, you want to prevent the members of this permission group
to be able to edit their own salary as well.
8. Click Done to assign this role to the defined users. You are taken back to the Permission Role Detail page.
9. Click Save Changes to complete creating the role.
Understand how to use hiearchy depth when assigning permissions to your users.
When granting permissions using hierarchical relationships, you can specify how many levels down to go in the
hierarchy for the target population. For example, you can indicate that Managers can see performance ratings on
their direct reports (1 level deep), or allow it to go deeper into their team, that is 2 levels down or all levels.
When granting permissions to non-hierarchical relationships (HR, Matrix and Custom Managers), you can follow
this non-hierarchical relationship for only one level. Beyond the first level, you can cross over to the standard
manager hierarchy if desired to go deeper.
● 1 Level Deep: Matrix Managers can view ratings information for their Matrix Reports.
● 2 Levels Deep: Matrix Managers can view ratings information for their Matrix Reports and the Direct Reports of
their Matrix Reports.
● All Levels Deep: Matrix Managers can view ratings information for their Matrix Reports (1 level deep) and the
Direct Reports, all levels deep of the manager hierarchy of their Matrix Reports.
The following graphic illustrates the different hierarchical depths you can specify when you use the Matrix Manager
relationship:
After you have set up all groups and roles and granted the roles, you must test the permissions thoroughly to find
out whether the employees have access to everything they need.
You can only conduct reliable tests if the data is complete in the non-productive instance (e.g., sandbox,
development, test, or preview). Otherwise, roles which require dedicated groups cannot be tested. If the data is not
there to populate the granted users group or the target users group, the tests will fail. One approach is to update
the non-productive instance with production data. However, if this is not possible due to data protection reasons, a
set of real sample data is required to conduct valid testing.
Another approach is to test roles that do not require specific groups, but which make use of relationships. In this
case, you need to test users for all hierarchy levels, such as Manager, HR Manager, and Employee. Next, check the
hierarchy, and log on as a specific test user and verify the permissions.
Reports help to troubleshoot and understand the permissions that have been configured. Ad Hoc reports are an
aggregate of all the RBP data in your system. You can access this info and share it using the following output
formats: PDF, Excel, PPT, and CSV.
Ad hoc reporting can help you to understand your role-based permissions configuration.
Context
Remember
As a customer, you do not have access to Provisioning. To complete tasks in Provisioning, contact your
Implementation Partner. If you are no longer working with an Implementation Partner, contact SAP Cloud
Support.
1. Log on to the Provisioning tool and go to Company Settings Additional Adhoc Sub domain Schemas
Configuration .
2. When ad hoc reports are enabled, go to Analytics Reporting Ad Hoc Reports . You can create the
following reports:
○ RBP User to Role Report
○ RBP Permission to User Report
○ RBP User to Group Report
○ Permission Roles Report
Context
Once Role-Based Permissions are enabled and Cloud Support has created the Super Admin role, complete the
following task to grant access to RBP ad hoc reporting.
Procedure
The permission role screen will show the role name and description.
3. On the Permission Role Detail screen, select Permissions.
4. When the Permission Settings screen displays, select Report Permissions from the list.
5. When the report permissions displays, enable Create Reports and Run Reports by selecting the check boxes.
6. For Ceate Reports and Run Reports permissions, select Other.
7. When the list of reports activates, multi select following reports:
Context
Setting up this permissions report gives you configuration information for all your configured permissions.
Procedure
To access Reporting the admin user must have the necessary permissions granted.
2. Select the RBP Permission to User Report.
Context
Running this report, allows you to specify a permission to be filtered for and can help you identify how the
permission was granted to a user.
Procedure
On the By My Selection tab, choose Select All and mark the checkbox User Prompted.
4. Click Done and save your changes.
Use the check tool to find potential problems and errors in your configuration before you call support about an
issue.
Prerequisites
Assign Access Check Tool and Allow Configuration Export to your role in Role Based Permissions (RBP).
Procedure
1. Go to Admin Center.
2. In the tools search field, type Check Tool.
3. In Application, select the application you want to check.
Tip
For example, to run checks for Time Off, select Time Off.
Tip
To understand what a check does, right click the Check ID. The system then displays some information on
the check.
6. Click Run Checks to check your applications for the checks you selected.
Next Steps
Evaluate the results and resolve the issues. If you encounter an error you cannot resolve, contact Support by
creating a ticket.
After you run checks in the check tool, it returns the results of the check so that you can resolve issues that it
found.
To see the results of the checks, look in the Results column. If you run the checks multiple times to see how you are
resolving issues, look in the Previous Result column to compare the current results to previous results.
Result Action
No issues found If the tool cannot find issues, you see a green check mark the Result.
Issues found If the tool finds issues, it reports the number of issues and a yellow warning icon or a red alarm
icon.
● The yellow icon indicates a low severity issue. The system proposes a solution.
● The red icon indicates a high severity issue. You must take action, which could include creat
ing a Support ticket.
The SAP SuccessFactors check tool helps you identify and resolve issues when your system doesn’t work as you
expect.
If your SAP SuccessFactors applications are behaving in unexpected ways, it is likely that it has a configuration or
data conflict: you have some data that is inconsistent or a configuration error. The check tool quickly identifies
these types of problems so that you can avoid support tickets. You might still need to create a support ticket if the
problem is severe, but even in severe cases, the check tool can save you time because it can export the results of
the check and your configuration for support. The support engineer, therefore, can identify the issue more quickly.
● A list of issues in your configuration or data and the severity of each issue.
● A solution or recommendation to address the issue.
When the check tool reports a serious issue, you might need to contact Support. You can create a Support ticket
from within the check tool.
Prerequisites
Run the check tool. You can find the check tool by going to Admin Center Check Tool . You create the ticket
from the results page of the tool
1. On the results page, look in the Result column for the errors you want to report on.
You usually contact Support for high severity issues not low severity issues.
2. Click the error in the result to open the Detailed Result.
Note
If you cannot click the error, expand the list of checks from the Description column, and then click the error
from the Result column.
The Everyone group contains all employees in your system and is automatically created when RBP has been
enabled by your super admin. If the Everyone group has not been created in your system, you may experience
errors when attempting to create groups for other users in your system. The CheckEveryoneGroup test validates
that the Everyone group exists.
When you run this check, if the result is true, the Result section of the Check Tool displays the names of the User
Types that do not have the Everyone group. This may be either the Employee or External Learner user type.
CheckEveryoneGroup Verify if the Everyone Group Exists Since the Everyone group is created
when you enable RBP in your system,
disable RBP and enable RBP.
The CheckRoleRuleAccessGroupUser test validates if your system contains roles that exist without access
permission users or groups.
In your system, each role should contain access users or groups. When users or groups have not been assigned to
a role, run time exceptions may occur. These exceptions can occur anytime the system tries to execute access
permissions in your system.
When you run this check, if the result is true, the Result section of the Check Tool displays the names of the roles
that do not have access users or groups assigned to the role.
CheckRoleRuleAccessGroupUser Verify if Roles Exist that are not Associ Execute any of the following solutions if
ated with Access Permission Groups or you have errors in your system after run
Users ning this check.
The CheckRoleRuleTargetGroup test validates if there are any roles in your system where target population hasn't
been defined.
Roles in your system contain some permissions that require target population to be defined and other permissions
that do not require target groups. For permissions that require a target group, you must define a target group for
the role. When you don’t define a target group, you may experience errors in your system when the system
attempts to calculate target group permissions.
When you run this check, if the result is true, the Result section of the Check Tool displays the names of the roles
that do not have target groups assigned to the role.
CheckRoleRuleTargetGroup Verify if Roles Exist Without Target Popu Execute any of the proposed recommen
lation Defined. dations below for the roles listed in Re
sults section:
The CheckAccessGroupNameLength test validates if the total length of access group names that are associated
with a rule exceeds 1000 characters.
When you associate rules to your roles it’s important that you do not exceed 1000 characters for each rule. While a
rule can contain several groups and a role can contain several rules, each rule should not contain 1000 or more
group name characters. Meaning, the names of your groups, for each rule should not exceed 1000 characters.
Access groups with 1000 or more characters may cause errors or slow down your system.
When you run this check, if the result is true, the Result section of the Check Tool displays the names of the roles
that contain 1000 or more characters in total length.
CheckAccessGroupNameLength Verify if the Access Group Names Associ Execute any of the following solutions if
ated with a Rule Exceeds 1000 Charac you have errors in your system after run
ters. ning this check.
Rules are defined by determining which permission roles you’ll assign to your groups or users. From the Permission
Role Detail screen in your system, each rule is represented by a row that contains your list of granted users or
groups and the associated target group. Depending on the complexity of the roles and access or target group
assignments, your roles could have various combinations of access and target group rules.
From your permission role detail screen, where you manage your permission roles, each row represents a rule and
each rule can have multiple access and target group associations, as detailed in the display.
The CheckTargetGroupNameLength test validates if the total length of target group names that are associated with
a rule exceeds 1000 characters for a role.
When you associate rules to your roles it’s important that you do not exceed 1000 characters for each rule. While a
rule can contain several groups and a role can contain several rules, each rule should not contain 1000 characters
or more target group name characters. Meaning the names of your targer groups for each rule should not exceed
1000 characters. Target groups with 1000 or more characters may cause errors in your system.
When you run this check, if the result is true, the Result section of the Check Tool displays the names of the roles
that contain target group names with 1000 or more characters in total length.
CheckTargetGroupNameLength Verify if the target group names associ Execute following solution if you have er
ated with a rule exceeds 1000 characters rors in your system after running this
check.
The CheckUserPermissions test verifies if there are employees in your system who have been granted the same
permission more than 30 times.
When employees in your system are granted with the same permission multiple times by granting them roles that
contain duplicated permissions, it may cause your system some issues, such as system slowdowns or errors.
When you run this check, if the result is true, the Result section of the Check Tool displays the user names,
permission names, the number of times the user has been granted the permission, and the role names associated
with the permission. Additionally, by clicking the user names, you can review more records that are associated with
each user.
CheckUserPermissions Verify if a user has been granted the Execute any of the following solutions if
same permission more than 30 times you have errors in your system after run
ning this check.
The CheckRulePerRole test validates if there are more than 100 rules associated with a role.
Rules are defined when you assign access groups and target groups to a role. While you might have several rules
defined for one role, it’s important to ensure that the number of rules for a role does not exceed 100. That means,
ensure that each row that defines access and target groups does not exceed 100 rules. When defining group access
rules for the roles in your system, it’s most efficient to break up rules otherwise, you may experience issues in your
system.
CheckRulePerRole Verify if the number of rules associated Execute any of the following solutions if
with a role exceeds 100 you have errors in your system after run
ning this check.
Rules are defined by determining which permission roles you’ll assign to your groups or users. From the Permission
Role Detail screen in your system, each rule is represented by a row that contains your list of granted users or
groups and the associated target group. Depending on the complexity of the roles and access or target group
assignments, your roles could have various combinations of access and target group rules.
From your permission role detail screen, where you manage your permission roles, each row represents a rule and
each rule can have multiple access and target group associations, as detailed in the display.
After the tests are complete and all issues are resolved, you need to copy the RBP configuration to the production
instance.
Access the Instance Sync tool through the Admin Center. This tool allows RBP Roles and Groups to be copied
across data centers. If you do not see this in the Admin Center, an Incident ticket needs to be opened, to enable
Instance Sync.
Note
Note: The customer will provide one Username to SAP Cloud Support (CS). This Username will be added to the
Granted Group and is the Username that should be used when trying to access Instance Sync.
Note
The permission must be enabled in the Source and Target instance for successful Instance Sync. In
addition, The Instance Sync Admin must exist in both Source and Target Instance.
○ If the sync was not successful, you will see in the UI that the Failed Count has been updated.
○ In the downloaded report, you will see the reason for the failure - for example, the user does not exist in
the target instance.
5. If the test run was successful, then choose Run Sync Now to actually copy the groups and roles.
For more information about how to use these tools, please refer to the Instance Sync: Implementation and
Administration Guide.
If Instance Sync does not work properly, manual migration will be required.
● The user (username) who created the group in the source instance must also be a user in the target instance
for the sync of the groups to be successful.
● You are asked if you want to overwrite the existing groups in the target instance. If you choose not to overwrite
and there is a group in the target instance with the same name, the group will not copy to target instance.
● To successfully copy roles, you first have to sync all attached groups with the target instance.
● Templates, families, roles, picklists and further data associated with the roles in the source instance need to
exist in the target instance for roles to be successful
The purpose of the Role-Based Permissions (RBP) workbook is to act as a Record of Configuration for RBP. (The
workbook is not meant to provide full information on all RBP features and functionalities.
During implementation and beyond, we strongly encourage you to record the actual configuration, along with your
decisions and changes, in the Notes section following each area in the RBP Configuration Workbook.
You can access the RBP Configuration Workbook at this link. RBP Configuration Workbook
This image represents an example of what it looks like to map legacy permissions to RBP:
Context
If you find that users have access to applications or data they should not have, we recommend the following steps:
Procedure
1. Run the View User Permission report to determine how - through which role - the permission was granted to
the employees. For details see How can you check the permissions assigned to a user? [page 91]
2. If that does not clarify how/why they have that permission or creates concern about where else this permission
is visible, then use the RBP Permission to User Report with the Single Permission Filter to validate what other
groups have access to this permission. For details see How can you run an ad hoc report? [page 92]
Procedure
1. Go to Administration Tools.
2. In the Manage Employees portlet, select Set User Permissions.
3. In the Set User Permissions section, select View User Permissions.
4. In the Advanced Search, enter the user name.
5. Click View Permission next to the user name.
A list of permissions is displayed along with the roles that grant those permissions.
Context
Procedure
3. On the Execute Permission to User… screen, open the Take Action menu and choose Edit.
4. Choose By My Selection and select the permission you are interested in.
User Role Search can search the roles granted to specific users for a specific permission and a target user. When
some users get some permissions on some target users that should not be granted, the administrator can use this
tool to find which role grants the permission so they can update the permission settings.
● This tool does not support MDF RBP permission as search criteria.
● This tool does not support Inactive Internal User or TBH user to be selected as Target User.
● This tool does not support External User.
1. Go to Administration Tools.
2. In the Manage Employees portlet, select Set User Permissions.
3. In the Set User Permissions section, select User Role Search.
4. In the Selection session of the tool, enter Access Users. You can select at most 2 access users.
6. Click Search Roles Button. The search result will display all roles that grant this permission and target user to
the access users. If the target user field is empty, the search result will not consider target user. If a result you
expect to see is not showing up, it may be because there are back-end update jobs still running.
7. On the Result session, you can click on the role name to see role detail. On the role detail page, the grant rules
that grant the selected access user and target user will be highlighted in the “Grant this role to …” session.
You can use User Role Search to quickly search for and compare permission roles assigned to specified users in
role-based permissions.
1. Go to Administration Tools.
2. In the Manage Employees portlet, select Set User Permissions.
3. In the Set User Permissions section, select User Role Search.
4. In the Selection session of the tool, enter the Access Users whose roles you are comparing.
5. Click Search Roles Button. The search result will display which roles, if any, grant the specified permission to
either user. In the following example, you can see that both of the selected access users have permission to
view address data.
6. If a user does not have the specified permission, it is indicated as "no result." In the following example, you can
see that the user "cgrant" has permission to view "Impact of Loss" data, due to her roles as a manager and
administrator. The user "jreed" is not assigned to any role that allows him to view this information.
7. You can also specify one target user, in order to see whether either of the two access users has the specified
permission for the specified target. In the following example, you can see that although both user "cgrant" and
user "dsharp" are managers, only user "cgrant" has permission to view "Impact of Loss" data for user
"vstokes". This is because, in this example, the manager role has a target permission group of "All Direct
The Role-Based Permissions (RBP) Diagnosis Tool generates a report, in one click, that highlights potential risks for
the specific RBP configuration settings in the test and production instances.
This tool is available once RBP functionality is enabled on the Provisioning screen. The tool's Run button is
displayed in this section of the provisioning screen and is not accessible by customers.
SAP Cloud Support (CS), Professional Services, or Implementation Partners can click the Run button to perform
back-end checks on the Role and Group configurations in the customer instance. Upon completion, the report
automatically opens in a new browser window. The information contained in the report can be shared among
internal SAP SuccessFactors teams to determine improvements to the RBP configuration settings.
Remember
As a customer, you do not have access to Provisioning. To complete tasks in Provisioning, contact your
Implementation Partner. If you are no longer working with an Implementation Partner, contact SAP Cloud
Support.
● Description: Report name for a specific type of back-end system RBP check.
● ResultSet: Counts and USERS_SYS_ID information gathered during the check. If this column is empty for a
row, then there are no particular concerns for this check. If the column has an entry in a row, then see the
suggestion notes.
● Suggestion: Hard coded suggestions with best practices for solving potential configuration errors.
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your agreements
with SAP) to this:
● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such links, you
agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax and
phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of example
code unless damages have been caused by SAP's gross negligence or willful misconduct.
Gender-Related Language
We try not to use gender-specific word forms and formulations. As appropriate for context and readability, SAP may use masculine word forms to refer to all genders.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.