0% found this document useful (0 votes)
103 views9 pages

Implementation Guide: BC.E.010L - SAP Security Workbench

Uploaded by

anil m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views9 pages

Implementation Guide: BC.E.010L - SAP Security Workbench

Uploaded by

anil m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Implementation Guide

Reusable Technical Library

https://rtl.accenture.com Your way to work faster and smarter BRDC & IDC Central Team

Tech Goods BC.E.010L – SAP Security Workbench Version 4.0.0.0


The Security Workbench tool consists of various utilities for automating security
Description
tasks of SAP.
Category Tools Target Region Global Industry
Contributor Sachin Saraf Reviewer Sachin Saraf

Industrialization Factors
Reduction Factor Analyze 0h Design 0h Build 4h Test 0h
Credential

Obligatory Requirements
SAP Version ECC 5.0 – 6.0 / BI 7.0 / CRM 7.0 Support Package Necessary Package
These other technical goods are used by this one and must be installed before it.
Dependent Tech Install the SWB along with the transport requests.
Goods

Last Change Description


Version Modified in Responsible Modification
1.00 24.Nov.2008 Sachin Saraf Component Creation
2.00 27 Feb 2009 Sachin Saraf Component Creation
3.00 22 July 2009 Sachin Saraf Component Creation
3.1 18 Dec 2009 Sachin Saraf Component Creation
4.0 16 Aug 2010 Sachin Saraf Component Creation

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 1
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide

Table of Contents

1. General Description ..................................................................................................................... 3


2. Installation Procedure .................................................................................................................. 4
2.1. Procurement procedure of the Tool ...................................................................................................... 4
2.2. Raising a request in the ARTL Portal .................................................................................................... 4
2.3. Technical Configuration ........................................................................................................................ 4
2.4. Component Inventory ............................................................................................................................ 4
2.5. Example Program ................................................................................................................................. 6
3. User Guide .................................................................................................................................. 7
3.1. Component Configuration ..................................................................................................................... 7
3.2. Utilization ............................................................................................................................................... 7
3.3. Error Handling ....................................................................................................................................... 7
4. Attachment Guide Content .......................................................................................................... 8
5. Version Change Log .................................................................................................................... 9

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 2
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide

1. General Description

The Security Workbench tool consists of various utilities for automating security tasks. As we all know Security
implementation involves many tasks which are repetitive and manual in nature. Many of these tasks are
automated by Security Workbench Tool to reduce the effort and rework. This also allows lesser experienced team
members to work on the security tasks with minimal training.

This product enables the end-users to proactively and confidently perform common activities in security
administration.

The Security workbench tool is a product that allows you to realize significant benefits quickly and easily. By
improving the use of your existing investment in your ERP application, we allow you to:

• Improve Operational Quality


• Cut Operational Costs
• Reduce the effort and rework
• Tool can be handled by lesser experience members with minimal training
• Minimize effort in rolling out new features, users, and security changes

We also provide powerful support to reduce deployment and support costs. Finally, all of our solutions are highly
configurable to allow you to set desired behavior as per the requirement.

Please refer to following fact sheet to learn more about Security Workbench & its value proposition.

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 3
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide

2. Installation Procedure
2.1. Procurement procedure of the Tool

For use by Accenture Personnel


1. Fill the request form attached to this document. This form has the licensing information.
2. Take an approval from Program Director / Senior Executive for using this tool.
3. Confirm about whether a Non Disclosure Agreement is in place with the clients

For sharing / selling to Clients


1. In this case, there are additional legal/contractual requirements
2. This is done on case to case basis and may need further discussions.

You can request additional information about SWB by sending an email to [email protected]

Raise a request in the ARTL Portal and attach the request form in that, the Service Support
Desk will respond.

2.2. Raising a request in the ARTL Portal

1. Type the URL of the ARTL Portal (https://rtl.accenture.com).


2. Enter enterprise id and password and click Enter.
3. Click on the Support link in the top right corner.
4. The ARTL Support Desk window opens as a pop up.
5. Enter details of the issue. Click on the Browse button to attach any file (e.g.: a screenshot of the error).
6. Click Submit to create the request.
7. The same information is also sent to the user via an e-mail.

2.3. Technical Configuration

Security Workbench contains two parts in which it works. Both of these parts are required for this tool to work.
They are as follows:

1. SAP Server Part – This part needs to be installed on the SAP server side. It contains the ABAP Code.
2. Client Part – This is the installable for the tool. This installable is installed on all the systems which need
to connect to the SAP system to do the security activities.

Note: For running this tool, a key is required from the Security Workbench team. Please get in touch with
the team to get the required key

2.4. Component Inventory

• Security Workbench Installation document - This document is also part of the Security Workbench
installation release pack to help with installation procedure of Security Workbench tool.
• Connector Transport Requests - Zip file with name <SID>K9<XXXXX>.zip (where X stands for the
digits of the transport request number. It may differ for different transport request and SID stands for the
system ID. Check with the products team of Accenture as to which SID is needed for which release of
SAP)
• SWB Client Release 4.0.0.0 - Release - 4.0.0.0.zip containing installer for .NET Security Workbench tool
on all the required client machines.

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 4
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
Prerequisites for SWB
• The prerequisites for SAP system are based on the version of SAP we are trying to install Security
Workbench tool on. Follow the corresponding prerequisites as given below:

SAP ECC 6.0 - The Software component releases and as follows:

Software Component Release Levels Supported


SAP_ABA 700 Till 0019
SAP_BASIS 700 Till 0019

Web Application Server (WAS) Release 7.00 Support Pack (SP) 09 and above

SAP CRM 7.0

• The Software component releases and as follows:

Software Component Release Levels Supported


SAP_ABA 701 Till 0005
SAP_BASIS 701 Till 0005

• For all the client systems in which we want to run the Security Workbench tool, following prerequisites are
required:

o .NET framework 1.0 and 1.1 (Microsoft XP Service Pack 2 has the framework by default)
o Needs Microsoft Office 2003 for sending automated emails and to open the Excel Templates
o The Security Workbench tool uses the Port 3310 to connect to the SAP system. This port needs
to be enabled

Installation Procedure
The installation procedure for the different components of Security Workbench is as follows:

• SAP System

The installer has a ZIP file with name EC2K9<XXXXX>.zip. This ZIP contains the datafile and cofile for transport
requests. Follow the steps laid below to install the transport requests:

a. Login to the OS level of the server into which the Security workbench Utility is to be installed.
b. Place the datafile R9<XXXXX>.<SID> in the usr\sap\trans\data.
c. Place the cofile K9<XXXXX>.<SID> in the folder usr\sap\trans\cofile
d. Login to the SAP GUI of the system. Through STMS import the Transport Request No
<SID>K9<XXXXX> into the system.

Note:

a. If the transport request does not queue up in the import queue, Go to Extra-> Other request-> Add.
From here you can add the transport request manually to the import queue.
b. X stands for the digits of the transport request number. It may differ for different transport request.
c. SID stands for the system ID. Check with the products team of Accenture as to which SID is needed
for which release of SAP system.

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 5
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
d. Transport request for Security Workbench usage with SAP ECC 5.0, ECC 6.0, SAP BI 7.0 and CRM
7.0 are different.

• .NET client Installation

The following are the steps to be followed:


a. Open the zip file name Release-4.0.0.0.zip containing the Security Workbench installer files.
b. Extract the zip files at any location. This creates 3 files at the location where you have extracted the
zip.
c. Double click on the file named Accenture.SWB.Setup.msi.
d. Once you double click, installation window comes up. Click on Next button.
e. On the following window, select the location where you wish to install the application.
f. Click on Next button.
g. Confirm the installation again by clicking on Next button.
h. The installation starts and once it’s finished, click on Finish button.
i. The Security Workbench .NET tool is installed on the client machines.

• License Key Registration

As specified above in the introduction, the Security Workbench tool needs a key to start working. Get in touch with
the Security Workbench team to get one.

After getting the key, follow the steps below to add the License key:
a. After the client tool is installed, run the tool by clicking on the Accenture.SWB shortcut on the desktop
or in Start > All Programs > Accenture.SWB.
b. Once the tool starts, click on the Add New SAP Systems/Hosts link on the main login screen.
c. Now on the Add New Server screen, enter the key, Application Server (IP or host name), System
Number and System Name for the SAP system you want to connect to.
d. Click on Submit button. Once the key is added, come back to login screen and you are done with
adding new server. You can check the just added SID in the System Name drop down list in the User
Login screen.

• Authorization Objects for SAP System for Security Workbench

a. Security Workbench requires some of the authorization objects assigned to the user who is going to
perform the security activities using the Security Workbench tool. These authorization objects are
listed in the attached excel document. Please see that there are two sheets in the excel document
which explains the following:
i. Utility Wise Authorization Objects: This sheet contains the entire authorization object based on
every utility. We can use this to assign the user specific right for particular utilities.
ii. Consolidated Authorization Objects: This set include all the authorization objects for all the
utilities. We can use this to enable user to perform all the actions in Security Workbench tool.

2.5. Example Program

Please access following link for audio – visual demos of Security Workbench. These demos take user
through all the functionalities available with Security Workbench.

https://kx.accenture.com/Repositories/ContributionForm.aspx?path=C15/45/67&mode=Read

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 6
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide

3. User Guide
3.1. Component Configuration

Not Applicable.

3.2. Utilization

Refer to the attached User Guide Document

3.3. Error Handling

Refer to the User Guide.

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 7
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide

4. Attachment Guide Content

Find attached in this PDF the following documents. Use Menu View…Navigation Panels…Attachments.

Document Description
BC.E.010L - SWB license form.xls Excel file for license
BC.E.010L - Authorization Objects.xls Authorization Objects
BC.E.010L - Security Workbench Fact Sheet.pdf Security Workbench Fact Sheet
BC.E.010L - SWB_User_Manual_R3.doc User Guide for training of key user in the R3 SAP systems
BC.E.010L - SWB_User_Manual_BI.doc User Guide for training of key user in the BI SAP systems
BC.E.010L - SWB_User_Manual_CRM.doc User Guide for training of key user in the CRM SAP systems

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 8
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide

5. Version Change Log

Version Modified in Responsible Modification


1.00 24.Nov.2008 Sachin Saraf Component Creation
2.00 27 Feb 2009 Sachin Saraf Component Creation
3.00 22 July 2009 Sachin Saraf Component Creation
3.1 18 Dec 2009 Sachin Saraf Component Creation
4.0 16 Aug 2010 Sachin Saraf Component Creation

© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 9
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/

You might also like