Implementation Guide: BC.E.010L - SAP Security Workbench
Implementation Guide: BC.E.010L - SAP Security Workbench
https://rtl.accenture.com Your way to work faster and smarter BRDC & IDC Central Team
Industrialization Factors
Reduction Factor Analyze 0h Design 0h Build 4h Test 0h
Credential
Obligatory Requirements
SAP Version ECC 5.0 – 6.0 / BI 7.0 / CRM 7.0 Support Package Necessary Package
These other technical goods are used by this one and must be installed before it.
Dependent Tech Install the SWB along with the transport requests.
Goods
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 1
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
Table of Contents
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 2
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
1. General Description
The Security Workbench tool consists of various utilities for automating security tasks. As we all know Security
implementation involves many tasks which are repetitive and manual in nature. Many of these tasks are
automated by Security Workbench Tool to reduce the effort and rework. This also allows lesser experienced team
members to work on the security tasks with minimal training.
This product enables the end-users to proactively and confidently perform common activities in security
administration.
The Security workbench tool is a product that allows you to realize significant benefits quickly and easily. By
improving the use of your existing investment in your ERP application, we allow you to:
We also provide powerful support to reduce deployment and support costs. Finally, all of our solutions are highly
configurable to allow you to set desired behavior as per the requirement.
Please refer to following fact sheet to learn more about Security Workbench & its value proposition.
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 3
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
2. Installation Procedure
2.1. Procurement procedure of the Tool
You can request additional information about SWB by sending an email to [email protected]
Raise a request in the ARTL Portal and attach the request form in that, the Service Support
Desk will respond.
Security Workbench contains two parts in which it works. Both of these parts are required for this tool to work.
They are as follows:
1. SAP Server Part – This part needs to be installed on the SAP server side. It contains the ABAP Code.
2. Client Part – This is the installable for the tool. This installable is installed on all the systems which need
to connect to the SAP system to do the security activities.
Note: For running this tool, a key is required from the Security Workbench team. Please get in touch with
the team to get the required key
• Security Workbench Installation document - This document is also part of the Security Workbench
installation release pack to help with installation procedure of Security Workbench tool.
• Connector Transport Requests - Zip file with name <SID>K9<XXXXX>.zip (where X stands for the
digits of the transport request number. It may differ for different transport request and SID stands for the
system ID. Check with the products team of Accenture as to which SID is needed for which release of
SAP)
• SWB Client Release 4.0.0.0 - Release - 4.0.0.0.zip containing installer for .NET Security Workbench tool
on all the required client machines.
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 4
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
Prerequisites for SWB
• The prerequisites for SAP system are based on the version of SAP we are trying to install Security
Workbench tool on. Follow the corresponding prerequisites as given below:
Web Application Server (WAS) Release 7.00 Support Pack (SP) 09 and above
• For all the client systems in which we want to run the Security Workbench tool, following prerequisites are
required:
o .NET framework 1.0 and 1.1 (Microsoft XP Service Pack 2 has the framework by default)
o Needs Microsoft Office 2003 for sending automated emails and to open the Excel Templates
o The Security Workbench tool uses the Port 3310 to connect to the SAP system. This port needs
to be enabled
Installation Procedure
The installation procedure for the different components of Security Workbench is as follows:
• SAP System
The installer has a ZIP file with name EC2K9<XXXXX>.zip. This ZIP contains the datafile and cofile for transport
requests. Follow the steps laid below to install the transport requests:
a. Login to the OS level of the server into which the Security workbench Utility is to be installed.
b. Place the datafile R9<XXXXX>.<SID> in the usr\sap\trans\data.
c. Place the cofile K9<XXXXX>.<SID> in the folder usr\sap\trans\cofile
d. Login to the SAP GUI of the system. Through STMS import the Transport Request No
<SID>K9<XXXXX> into the system.
Note:
a. If the transport request does not queue up in the import queue, Go to Extra-> Other request-> Add.
From here you can add the transport request manually to the import queue.
b. X stands for the digits of the transport request number. It may differ for different transport request.
c. SID stands for the system ID. Check with the products team of Accenture as to which SID is needed
for which release of SAP system.
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 5
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
d. Transport request for Security Workbench usage with SAP ECC 5.0, ECC 6.0, SAP BI 7.0 and CRM
7.0 are different.
As specified above in the introduction, the Security Workbench tool needs a key to start working. Get in touch with
the Security Workbench team to get one.
After getting the key, follow the steps below to add the License key:
a. After the client tool is installed, run the tool by clicking on the Accenture.SWB shortcut on the desktop
or in Start > All Programs > Accenture.SWB.
b. Once the tool starts, click on the Add New SAP Systems/Hosts link on the main login screen.
c. Now on the Add New Server screen, enter the key, Application Server (IP or host name), System
Number and System Name for the SAP system you want to connect to.
d. Click on Submit button. Once the key is added, come back to login screen and you are done with
adding new server. You can check the just added SID in the System Name drop down list in the User
Login screen.
a. Security Workbench requires some of the authorization objects assigned to the user who is going to
perform the security activities using the Security Workbench tool. These authorization objects are
listed in the attached excel document. Please see that there are two sheets in the excel document
which explains the following:
i. Utility Wise Authorization Objects: This sheet contains the entire authorization object based on
every utility. We can use this to assign the user specific right for particular utilities.
ii. Consolidated Authorization Objects: This set include all the authorization objects for all the
utilities. We can use this to enable user to perform all the actions in Security Workbench tool.
Please access following link for audio – visual demos of Security Workbench. These demos take user
through all the functionalities available with Security Workbench.
https://kx.accenture.com/Repositories/ContributionForm.aspx?path=C15/45/67&mode=Read
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 6
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
3. User Guide
3.1. Component Configuration
Not Applicable.
3.2. Utilization
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 7
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
Find attached in this PDF the following documents. Use Menu View…Navigation Panels…Attachments.
Document Description
BC.E.010L - SWB license form.xls Excel file for license
BC.E.010L - Authorization Objects.xls Authorization Objects
BC.E.010L - Security Workbench Fact Sheet.pdf Security Workbench Fact Sheet
BC.E.010L - SWB_User_Manual_R3.doc User Guide for training of key user in the R3 SAP systems
BC.E.010L - SWB_User_Manual_BI.doc User Guide for training of key user in the BI SAP systems
BC.E.010L - SWB_User_Manual_CRM.doc User Guide for training of key user in the CRM SAP systems
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 8
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/
Implementation Guide
© 2008 Accenture – All Rights Reserved. – Implementation Guide Template v. 2.00 Page 9
This component, containing its documentation and code, is proprietary of Accenture and its use and distribution is restrict.
For further information or other technical goods search, access https://rtl.accenture.com/