S4H - 876 Authorization Concept Template - SAP S4HANA Cloud, Private Edition
S4H - 876 Authorization Concept Template - SAP S4HANA Cloud, Private Edition
S4H - 876 Authorization Concept Template - SAP S4HANA Cloud, Private Edition
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 1 of 65
TABLE OF CONTENTS
1. OBJECTIVES.....................................................................................................................................................5
1.1. OBJECTIVES OF AN AUTHORIZATION CONCEPT.............................................................................................5
1.2. OUT OF SCOPE................................................................................................................................................5
1.3. TARGET GROUPS............................................................................................................................................5
1.4. PHILOSOPHY OF AN AUTHORIZATION CONCEPT............................................................................................6
2. COMPONENTS OF AN AUTHORIZATION CONCEPT............................................................................7
2.1. AUTHORIZATIONS...........................................................................................................................................7
2.2. AUTHORIZATION OBJECT...............................................................................................................................7
2.3. OBJECT CLASS................................................................................................................................................8
2.4. AUTHORIZATION PROFILE..............................................................................................................................8
2.5. APPLICATIONS................................................................................................................................................8
2.5.1. Transaction (S_TCODE)........................................................................................................................8
2.5.2. OData Service (S_SERVICE).................................................................................................................8
2.5.3. Web Dynpro Application (S_START).....................................................................................................8
2.5.4. Remote Function Call (S_RFC).............................................................................................................9
2.6. FIORI SPECIFIC COMPONENTS (FRONT-END).................................................................................................9
2.6.1. Fiori Launchpad (FLP) Catalog............................................................................................................9
2.7. SINGLE ROLES................................................................................................................................................9
2.8. COMPOSITE ROLES.........................................................................................................................................9
2.9. USER MASTER RECORD...............................................................................................................................10
3. STRUCTURE OF THE SAP SYSTEM LANDSCAPE.................................................................................10
3.1. THE 3 TIER SYSTEM LANDSCAPE.................................................................................................................10
3.2. FRONT-END & BACK-END SERVER DEFINITION..........................................................................................10
3.3. DIFFERENT AUTHORIZATIONS IN THE 3-TIER SYSTEM LANDSCAPE............................................................11
4. GUIDELINES FOR SETTING-UP AUTHORIZATIONS...........................................................................12
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 2 of 65
8. RESPONSIBLE PERSONS FOR THE IMPLEMENTATION OF AN AUTHORIZATION CONCEPT
.................................................................................................................................................................................30
8.1. USER ADMINISTRATION (CREATION AND MAINTENANCE OF USERS)...........................................................30
8.2. AUTHORIZATION ADMINISTRATION (MAINTENANCE OF SINGLE AND COMPOSITE ROLES)........................31
8.3. AUTHORIZATION COORDINATION (SPECIFICATION OF THE DEPARTMENT AUTHORIZATION REQUIREMENTS)
............................................................................................................................................................................31
8.4. DATA OWNER...............................................................................................................................................31
9. GUIDELINES FOR USER MASTER RECORDS........................................................................................32
9.1. USER TYPES.................................................................................................................................................32
9.1.1. Dialog Users (Type Dialog).................................................................................................................32
9.1.2. System Users (Type System).................................................................................................................32
9.1.3. Communication Users (Type Communication)....................................................................................32
9.1.4. Service Users (Type Service)................................................................................................................33
9.1.5. Reference Users (Type Reference).......................................................................................................33
9.2. TRAINEES.....................................................................................................................................................33
9.3. EXTERNAL USERS........................................................................................................................................34
9.4. EMERGENCY USER SAPRES.......................................................................................................................34
10. SYSTEM PARAMETER SETTINGS & SECURITY POLICIES............................................................35
10.1. PARAMETERS TO CONTROL THE LOGIN AND PASSWORD PROTECTION.....................................................35
10.1.1. Password Rules..................................................................................................................................35
10.1.1.1. Overview of the SAP standard Rules for Passwords.......................................................................35
10.1.1.2. Password Length.............................................................................................................................35
10.1.1.3. Minimum Number of Digits in Passwords......................................................................................36
10.1.1.4. Minimum Number of Letters in Passwords.....................................................................................36
10.1.1.5. Minimum Number of Lowercase Letters in Passwords...................................................................36
10.1.1.6. Minimum Number of Capital Letters in Passwords........................................................................36
10.1.1.7. Minimum Number of Special Characters in Passwords.................................................................37
10.1.2. Password Changes.............................................................................................................................37
10.1.2.1. Number of Different Characters: Old/New Password....................................................................37
10.1.2.2. Size of Password History.................................................................................................................37
10.1.2.3. Password Must Be Compliant With Current Password Rules........................................................38
10.1.2.4. Password Change Obligation for Single Sign-On (SSO)................................................................38
10.1.3. Logon Restriction...............................................................................................................................38
10.1.3.1. Password Validity Period................................................................................................................38
10.1.3.2. Waiting Time Between Two Password Changes.............................................................................39
10.1.3.3 Password Validity Period of Unused Initial Passwords..................................................................39
10.1.3.4. Validity Period of Unused Productive Passwords (Manual Logon)...............................................39
10.1.3.5. Password Lock................................................................................................................................40
10.1.3.6. Automatic Unlocking of Users........................................................................................................40
10.1.3.7. Restricted Logon to the SAP NetWeaver Application Server..........................................................40
10.1.4. SAP GUI Rules...................................................................................................................................41
10.1.4.1. Multiple Logon................................................................................................................................41
10.1.4.2. Exception Users for the Multiple Logon Lock................................................................................41
10.1.4.3. Logon Failures................................................................................................................................41
10.1.4.4. Automatic Logout............................................................................................................................41
10.1.5. Others.................................................................................................................................................42
10.1.5.1. Define the Properties of SAP*........................................................................................................42
10.1.5.2. Activation of the Security Audit Log...............................................................................................42
10.1.5.3. Define the Character Set Used for Passwords................................................................................43
10.1.5.4. Downward Compatibility of Passwords..........................................................................................44
10.1.5.5. System Standard Clients..................................................................................................................45
10.1.5.6. Possible Logon Languages..............................................................................................................45
10.1.5.7. Standard Logon Language..............................................................................................................45
10.2. PARAMETERS TO CONTROL AUTHORIZATION CHECKS..............................................................................46
10.2.1. Deactivation of Authorization Checks................................................................................................46
10.2.2. Updating the Table USOBX...............................................................................................................46
10.2.3. Authorization Checks SU53 and SU56...............................................................................................46
10.2.4. Number of SU53 Shared Buffer Entries per Work Process...............................................................47
10.2.5. Switching off Authorization Checks for Authorization Objects.........................................................47
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 3 of 65
10.2.6. Authorization Check at RFC..............................................................................................................47
10.2.7. User-Specific Long-Term Authorization Trace..................................................................................48
10.2.8. Controls the Authority Check During Call Transaction....................................................................48
10.2.9. Logging of Data Changes in Tables...................................................................................................49
10.2.10. Alternative Language for Missing Descriptions in the Login Language.........................................50
10.3. SECURITY POLICY......................................................................................................................................51
10.3.1. Security Policy Attributes...................................................................................................................51
10.3.2. Definition of Security Policy Attributes.............................................................................................51
10.3.2.1. Security Policy Attributes for the Definition of Password Rules Dependencies.......................................51
10.3.2.1.1. Check for Use “Prohibited Passwords”.................................................................................................52
10.3.2.1.2. Minimum Password Length...................................................................................................................52
10.3.2.1.3. Minimum Number of Characters in Passwords.....................................................................................52
10.3.2.1.4. Minimum Number of Letters in Passwords...........................................................................................53
10.3.2.1.5. Minimum Number of Lower-Case Letters in Passwords......................................................................53
10.3.2.1.6. Minimum Number of Capital Letters in Passwords..............................................................................53
10.3.2.1.7. Minimum Number of Special Characters in Passwords........................................................................54
10.3.2.2. Security Policy Attribute for the Definition of Password Changes...............................................................54
10.3.2.2.1. Number of Different Characters when Changing..................................................................................54
10.3.2.2.2. Size of the Password History.................................................................................................................55
10.3.2.2.3. Password Change after Rule Changes...................................................................................................55
10.3.2.2.4. Password Change Requirement for Single Sign-On logins...................................................................56
10.3.2.2.5. Interval Regularly, Password Changes..................................................................................................56
10.3.2.2.6. Minimum Waiting Time for Password Change.....................................................................................57
10.3.2.3. Security Policy Attributes for the Definition of Registration Restrictions.................................................57
10.3.2.3.1. Validity of Unused Initial Passwords....................................................................................................57
10.3.2.3.2. Validity of Unused Productive Passwords............................................................................................58
10.3.2.3.3. Maximum Number of Failed Login Attempts.......................................................................................58
10.3.2.3.4. Automatic Unlocking of Users..............................................................................................................59
10.3.2.3.5. Disable Password Logon.......................................................................................................................59
10.3.2.3.6. Disable Ticket Logon............................................................................................................................60
10.3.2.3.7. Restricted Logon to the SAP NetWeaver Application Server...............................................................60
10.3.3. Conversion Table Security Policy Attribute – System Parameters....................................................61
11. EMERGENCY PLAN....................................................................................................................................62
11.1. EMERGENCY USER.....................................................................................................................................62
11.2. AUDITING OF THE EMERGENCY USER........................................................................................................62
12. AUTHORIZATION CONTROLLING........................................................................................................63
12.1. CHANGE HISTORY.......................................................................................................................................63
12.2. LOCKING INACTIVE USERS.........................................................................................................................63
12.3. REVIEW OF AUTHORIZATIONS BY THE LINES OF BUSINESS.......................................................................64
12.4. Review of the Authorization Concept.......................................................................................................64
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 4 of 65
1. OBJECTIVES
First, since personal data is used when using SAP systems, compliance with the
General Data Protection Regulation (GDPR) must be ensured.
Second, the SAP Systems of a company contain a large proportion of the company's
intellectual property, therefore, it is necessary to identify the inherent risks of using
the systems and to mitigate these risks with principals and controls outlined in the au-
thorization concept. Some inherent risks that should be considered, for example, are:
Finally, when complying with the requirements described above, it is important to en-
sure the productivity of the company by providing the required authorizations to the
users.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 5 of 65
1.4. Philosophy of an Authorization Concept
An authorization concept for a company is organized by role-based tasks and func-
tions. Meaning, the guiding principal in an authorization concept is that each User
gets exactly the authorization that they need for their daily business, while ensuring
that there is a segregation of duties.
The Data Owners are responsible for the data (see chapter 8.4). Data Owners are
represented by the responsible persons of each department. They instruct the Autho-
rization Coordinators of their department with the protection of their data (see chapter
8.3.).
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 6 of 65
2. COMPONENTS OF AN AUTHORIZATION CONCEPT
The following picture shows the different components of an Authorization Concept
2.1. Authorizations
An authorization is the permission to perform a certain action in an SAP System
based on a set of values for the individual fields of an Authorization object.
When you create an application, you specify where, how, or whether authorizations
should be checked by the system. The program uses the appropriate syntax to deter-
mine whether the user has enough authorization for a particular activity by comparing
the field values for the Authorization Object specified in the program with the values
contained in the authorizations in that user’s User Master Record.
An authorization can be used to restrict any number of single values or value ranges
for a field or allow all values.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 7 of 65
2.3. Object Class
An Object Class is a collection of special Authorization Objects. In other words, Au-
thorization Objects are divided into classes. An Object Class usually corresponds to
an application area (for example, FI - Financial Accounting, MM – Materials Manage-
ment, HR – Human Resources, etc.).
2.5. Applications
In principle, authorization checks are controlled via Authorization Objects. The rela-
tionship between the respective application and the authorizations required for exe-
cution is shown in the tables provided for this purpose (USOBX_C and USOBT_C).
These can be individually adjusted/extended by the customer via Transaction SU24.
Below, the start Authorization Object for the different application types is described.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 8 of 65
2.5.4. Remote Function Call (S_RFC)
The communication between applications of different systems in the SAP environ-
ment can include both the connection between SAP systems and between SAP and
non-SAP systems. The Remote Function Call (RFC) is the SAP standard interface
for implementing this communication. The RFC calls a function to be executed in a
remote system.
When RFC Function Modules are started, the Authorization Object S_RFC is
checked.
Technical Catalog
A Technical Catalog is a compilation of all apps in a functional area such as SD –
Sales and Distribution, MM – Materials Management, FI - Finance. It serves as a
repository which the customer can use to create role-based or user-based content.
Business Catalog
A Business Catalog is a collection of different applications from one area. It serves as
a template for customer-specific catalogs. For example, Asset Accounting.
Customer-specific Business Catalogs are required for the creation of Single Roles on
the Front-End System and the corresponding roles in the Back-End System.
They contain all necessary application/authorization information (IWSG (Front-End)
and IWSV (Back-End)).
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 9 of 65
2.9. User Master Record
A user can only log on to the system if a User Master Record exists for them. The
Composite Roles assigned in the master record give the user sufficient, although lim-
ited, access to the functions of the SAP System to perform their tasks.
It is possible to assign Composite (and Single) Roles to users for a limited time only.
This functionality is useful, for example, for temporary activities such as inventory ac-
tivities that should only be allowed for a limited time.
The Front-End Server does not have to be operated as a Stand-Alone System but can be run
on the Application Server (Back-End Server) as an embedded Gateway. Default, all SAP S/
4HANA Cloud, private edition is run on an Application Server with embedded Gateways.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 10 of 65
3.3. Different authorizations in the 3-Tier System Landscape
Each system in a 3-Tier Landscape has a different and specific purpose, and as a
result, there are different authorization concepts for each.
Development System
The purpose of the Development System is to carry out the customizing and
development for the entire System Landscape. Therefore, extensive
authorizations are required for users in this system including customizing and
development authorization. Other characteristics of an authorization concept
for a Development System include:
o Roles are always created, or changed, in the Development System and
then distributed to the Quality and Production Systems via the
Transport System application.
o Custom reports (ABAP) must be programmed with all relevant
authorization checks.
o Custom tables must be assigned to the respective Authorization
Groups.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 11 of 65
4. GUIDELINES FOR SETTING-UP AUTHORIZATIONS
Authorization maintenance takes place exclusively via the Profile Generator
(Transaction PFCG).
Roles (both Single and Composite Roles) are created and changed by the System
Administrator, from IT, according to the requirements of the responsible person from
the business department. Thus, the System Administrator is also the Authorization
Administrator for all Modules.
The person in charge of the Line of Business is the Authorization Coordinator for
their area. The Authorization Coordinator has the decision-making authority over the
functional composition of the Single and Composite Roles (and thus also access to
the data and associated business processes) of their area.
Composite Roles are formed by Single Roles. In addition to Single Roles from their
own department, Single Roles from other departments can also be used. Before
using Single Roles from other departments, the Authorization Coordinator of this
department must be contacted to obtain approval for the use of these Single Roles
by the other department.
When creating Single Roles, achieving a high degree of reusability should be taken
into consideration. For this purpose, function blocks of applications, which are
required in different Composite Roles, should be created. For example, it is advisable
to create a general display Single Role (Display Role) for most business departments
per module, in which all non-critical display applications of the module are included.
Therefore, this Single Role can then be reused in each Composite Role of the
department.
When creating Single Roles, the corresponding menu is displayed when the
application is added. This functionality allows users to have User Menus tailored to
their activities. In addition, this functionality simplifies the navigation for the user as
they only see the applications that they have authorizations for and that are relevant.
Self-created applications must be integrated into the Role Menus in a logical position.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 12 of 65
Therefore, missing Authorization Objects are added to the requesting application with
Transaction SU24 (Maintenance of Assignments of Authorization Objects to
Transactions) and can be included in the Single Roles.
An Authorization Trace is the best way to determine which Authorization Objects are
checked with which values when a process (with one or more applications) is exe-
cuted.
Please note that the Authorization Concept will not prevent users who are entrusted with the
authorization to use the system from causing damage due to human error or to wilful destruc-
tion.
The first tool that can be used is Transaction SU53. Transaction SU53 displays a
maximum of 100 failed authorization checks for each user in an SAP System that has
the default system parameter settings (system parameter “auth/su53_buffer_entries”
= 100). However, this tool only displays the failed authorization checks for the last
three hours. If there is a high number of active users and a high amount of failed au-
thorization checks, the number of checks and the period that is covered for a user
may be smaller.
Transaction SU53 also provides an initial overview of failed authorization checks, be-
cause every user has authorization to perform this transaction.
The Authorization Trace result will clearly show which authorization objects and fields
were checked during the end to end process. If, for example, during the Authorization
Trace, the results show that there was no authorization check of the company code
executed, then there is no authorization company code restriction possible to protect
the company code data.
It should be noted, for General Data Protection Regulation (GDPR) compliance, the
Authorization Trace function should not be used without the knowledge and permis-
sion of the user being traced.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 13 of 65
5.2. Additional Implementation of Authorization Checks in Customer
Applications
Authorization Checks should cover most of the business processes, however, if it is
determined that insufficient Authorization Checks are present in self-created applica-
tions, these must be supplemented by the developers of the application.
To do this, the required authorization checks on the corresponding Authorization Ob-
jects, and the required Authorization Fields, must be built into the coding of the appli-
cation.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 14 of 65
6. NAMING CONVENTIONS FOR AUTHORIZATION ENTITIES
To allow for easier solution adoption and enablement for the authorization concept,
Naming Conventions for the authorization concepts is required. The names should
be as descriptive as possible to simplify, for example, the intuitive assignment of
roles to activities and their maintenance.
6.1. Naming Conventions for the User ID (for Internal and External Users)
For the Naming Conventions for the User ID, the User-ID's should be the same
across all applications.
New User-ID's are created company-wide according to the following guideline:
The first digit of the ID is the first letter of the user’s first name and the remain-
ing digits are the user’s complete last name.
1. If the name exceeds the length of the input field, the last name is truncated.
In case of double names, the second letter of the first name is added. Um-
lauts are converted to 7-bit ASCII characters (e.g., ä=ae)
2. For external users, like consultants, the first four digits are used to specify
the external user, (EXT_), followed by the first character of the first name
and the other digits for the last name (the last name is truncated).
Examples:
Simone Mustermann User ID: SMUSTERMANN
Sabine Mustermann User ID: SAMUSTERMANN
Udo Brockhäger User ID: UBROCKHAEGER
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 15 of 65
6.2. Naming Conventions for User Groups
Once the assignment of SAP users to User Groups is complete, the user mainte-
nance can be distributed to different Authorization Coordinators. The User Adminis-
trator assigns specific User Group authorizations to each Authorization Coordinator.
After being assigned a User Group, the Authorization Coordinator can only maintain
the user of their User Group (assign or revoke roles, password change, user lock/un-
lock).
The User Group maintenance is done with the transaction SUGR. This transaction
can only be maintained by the User Administration. The name of the User Group is
as follows:
The first 4 digits start with the company code in which the users nor-
mally work
The fifth digit serves as a separator (_).
The remaining digits, 6-12, serve as a description, and must be chosen
to be as meaningful as possible.
In the case of external users, the user group entered in the user master record is the
department that is responsible for the authorizations of the respective external user.
For example, SAP consultants are assigned to the IT user group and auditors to the
finance user group.
0 0 0 1 __ A B T E I L U
Company code indicators (4 digits)
0001 XYZ
0002 ABC
0003 BCD
0004 CDE
Separator (1 digit)
Department indicators (max. 7 digits)
In addition, subsequent user groups are created for global special users:
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 16 of 65
6.3. Naming Conventions for Composite Roles
The Naming Conventions for Composite Roles follows these principles:
Each composite role begins with the character Y.
The character in the second position indicates the target system for which the
role was developed. For example, the character P stands for the Production
System.
The character 3-5 are a company identification (it could be enhanced by two
country letters like US, DE to specify a country).
This is followed by two or three digits, for characters 6-8, for the identification
of the module, for which the role has been created.
Finally, If the workplace includes no separation, the remaining digits after the
separator (_) are for the description of the Composite Role. If a separation, for
example, at company code or plant level is present, this is described at the
end of the Composite Role and separated from general description through a
separator (_), for example _BUKRS0001 (company code 0001).
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 17 of 65
6.4. Naming Conventions for Single Roles
For the naming conventions for Single Roles, every Single Role begins with the letter
Z. An exception for this principle is the special Single Roles that may also be as-
signed to users directly, for example, cost center roles. For the second character, a
letter to indicate the target system for which the role was developed is used; for ex-
ample, the letter P indicates the Production System. For the character in the third to
the fifth place the company identification (it could be enhanced by two country letters
like US, DE to specify a country) is used. These characters are then followed by two
or three digits for the identification of the module, which indicates the area the in-
serted applications belong to. Finally, the Single Roles description follows the sepa-
rator (_). The description should make it simple for a user to easily identify the func-
tionality (max. 19 digits).
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 18 of 65
Z P XYZ CO _ CONTROLLER _ MASTER _ M
Role indicator (1 digit)
Z Single Role
X Special Single Role
System indicator (1 digit)
P Production system
Q Test system
D Development system
Company indicator (3 digits)
XYZ
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 19 of 65
6.5. Naming Convention of Authorization Profiles
Each Authorization Profile begins with the letter Z (an exception to this are the pro-
files of special Single Roles which begin with X). Followed by the three-digit company
identification. Subsequently, the two-digit or three-digit identification of the module.
The assignment of each module results from the Single Role to which the Authoriza-
tion Profile belongs. The following is a two- or three-digit numbering.
The belonging activity indicator “D” or “M” represents activities (Display or Modify)
from the profile.
Example:
Name of the Single Role: ZPXYZCO_CONTROLLER_MASTER_D
Name of the authorization profile: ZXYZCO000D
Z XYZ CO 001 D
Profile indicator (1 digit)
Z Authorization profile
Company indicator (3 digits)
XYZ
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 20 of 65
6.6. Naming Conventions for Customers Applications
The naming convention for self-created applications is for the development of new
applications as well as for the conversion of reports to applications.
Z BC __ DESCRIPTION
Application indicator (1 digit)
Y ?
Z ?
Module indicator (2 to 3 digits)
BC Basis
CO Controlling
FI Finance Accounting
HCM Payroll
LE Warehousing
MM Material Management
PM Maintenance
XX Across Modules
Delimiter indicator (1 digit)
Application description (15 to 16 digits)
e.g. the name of the report, that is the basis of the
application als
application: Grundlage für die neue
ZBC_RSUSR002
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 21 of 65
6.7. Naming Conventions for Customer Tables or Authorization Groups
The naming convention for self-created tables is the same as for self-created applica-
tions (see chapter 6.6.). During the creation of the tables make sure to assign them
to the appropriate Authorization Groups. Tables that are not assigned to an Autho-
rization Group will be assigned to the group &NC& automatically by system (&NC& =
no authorization group). The consequence is that the critical authorization object
S_TABU_DIS (table maintenance) will need then change authorizations, for example,
for the authorization group &NC&. With these authorizations assigned a user would
be able to get change access to thousands of tables. To eliminate this risk, it is nec-
essary to avoid the assignment of authorizations with authorization group &NC&.
Z CO X
Application indicator (1 digit)
Z Customer´s name space
Module indicator (2 digits)
BC Base
CO Controlling
FI Financial accounting
HC Payroll
LE Warehousing
MM Material Management
PM Maintenance
XX Across Modules
Criticality indicator (1 digit)
X General
C Critical
A Administrator
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 22 of 65
7. CRITICAL AUTHORIZATIONS AND SYSTEM FUNCTIONS
SAP*:
The User SAP* has SAP_ALL-Authorizations assigned. Even if the user is deleted, it
is possible to log in with the standard password, so this user represents a major se-
curity gap. Therefore, the super rights of this User must be withdrawn via the System
Parameters.
DDIC:
The DDIC User has full privileges to manage the repository. During the Installation
and Release-Change Operation the DDIC user is the only one who can make
changes in the Data Dictionary. Only the DDIC user is permitted to make these kinds
of installation and upgrade activities. This means that, for example, activities like the
creation of custom developments with this user are forbidden.
The DDIC User needs to be locked in all systems (if necessary, the user can
be unlocked by the User Administrator).
Assignment made to the user group (XXXX_SUPER).
Standard password needs to be changed.
SAPCPIC:
The SAPCPIC User will be created during system installation and will be used in
ABAP-programs and for EDI utilization. Default privileges are limited to RFC-ac-
cesses.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 23 of 65
7.3. Critical Functions
In the SAP System the following functions are identified as critical and therefore they
either should not be assigned or should only be assigned on a very limited basis in
the Quality or Production Systems:
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 24 of 65
7.3.1. Restrictions of Application Execute Authorizations
Four Authorization Objects are part of the group Application Execute Authorizations.
The respective Authorization Object determines whether a user can execute certain
applications or not. All applications a user needs for their daily work must be regis-
tered in one of these Authorization Objects (depending on the application type). Full
authorizations using a wildcard e.g. „*“ are not allowed for any of these Authorization
Objects. In general, the assignment of system applications and of basis modules to
Users should be very limited in the Production System (in contrast to developers in
the Development Systems).
Application authorizations
Table access is possible using various applications in the system. There are applica-
tions which makes it possible to maintain direct table values (Transactions SM30,
SM31), applications which display table structures (Transactions SE11, SE12) and
applications which display table values (Transactions SE16, SE16N and SE17).
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 25 of 65
Authorization Object S_TABU_NAM
To give access to particular tables the Authorization Object was invented. The Autho-
rization Administrator enters into the Authorization Field “TABLE” the table names of
the tables to which the user needs to have access.
ABAP/4 Programs
When starting up reports with the applications SE38 and SA38 the system does not
check the authorizations to a large extent. The Authorization Check of the Authoriza-
tion Object S_PROGRAM (which is a standard planning practice) will only run if the
report is assigned to an Authorization Group. As this applies to only a small number
of reports it will be possible for a user to execute almost any report if they have au-
thorization to start applications SE38 or SA38. The assignment of application autho-
rizations SE38 and SA38 is extremely critical because those reports make it possible
to create, change or delete data.
For this reason, for each required ABAP/4 program, Report Transactions must be
created with transaction SE93 (Maintain Transaction). This will ensure that the User
only has access to specific reporting/analysis programs.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 26 of 65
Data Browser
Data-Browser Transactions (for example SE16, SE16N, SE16J, SE17) are standard
tools which makes it possible to view tables and their content. It is possible to display
table content and all table field values with their text field values. From the table con-
tent, the User also can also find references to the associated check table contents.
If the users have the Authorization Object S_GUI (with activity 61) assigned, they can
download the displayed table content to their PC’s via the download function.
If direct table access is required Parameter Transactions must be created with trans-
action SE93 (Maintain Transaction).
In the Quality and Production Systems, it must be ensured that Users only have ac-
cess to their own spool requests. If spool requests are more than 30 days old and
have also been processed, they will be deleted by the SAP-Basis team.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 27 of 65
7.3.6. Background Processing
The Batch-Input technique is a method to transfer and/or process data of sequential
databases. The Batch-Input program (transaction controlled) creates a Batch-Input
map. These maps can be processed either in the foreground or in the background.
During a map’s processing run, dialog entries (online transactions) are simulated.
When the map runs in the foreground, the authorizations of the user executing the
foreground run are checked. During the background run, the authorizations of the
user who created the map are checked. Each respective user needs authorizations
for all the embedded applications as well as the authorizations for transaction SM35
and the Authorization Object S_BDC_MONI.
In general, the Batch Input authorization rights need to be limited to specific map
names and to specific areas of responsibility. In addition, it should be noted that there
is a possibility to change the input values when executing in the foreground. That
needs to be considered when creating these authorizations for the online mode.
These authorizations should be assigned in a very limited fashion. This is done via
the Authorization Objects S_BTCH_JOB, S_BTCH_NAM and S_BTCH_ADM.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 28 of 65
7.3.9. System and Client Settings
System authorizations means those functions which are not application-specific, but
which help to manage the Basis functions.
Because of this, it is necessary to set up specifications for the protection of the Pro-
duction System. If there is no protection for the Production System against changes
to customizing and repository objects during its operation, then it is possible that in-
consistencies will occur within the system landscape. Therefore, the Production Sys-
tem needs to be protected against all direct modifications to customizing and/or
repository objects (transaction SCC4). This authorization control is based on table
“T000”. The access to this table should only be allowed to SAP Enterprise Cloud Ser-
vice (ECS). The table “T000” will be assigned to an Authorization Group which is only
available to SAP-Basis. Change history of table changes are required to ensure com-
pliance with audits of the Production system.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 29 of 65
8. RESPONSIBLE PERSONS FOR THE IMPLEMENTATION OF AN
AUTHORIZATION CONCEPT
Not only is the company’s IT department responsible for the Authorization Concept
implementation, but also, all the respective departments are responsible for the im-
plementation of and the compliance with the Authorization Concept.
First and foremost, the respective Data Owner is responsible for the protection of and
compliance with the legal requirements. The Authorization Administrators are respon-
sible for the implementation of the requirements regarding the Role structure and of
the assignment of authorizations according to the specifications of the business de-
partment. The User creation is carried out exclusively by the User Administrators in
the IT department. This division of tasks to different organizations withing the com-
pany ensures a separation of duties in the authorization system.
In the following sections, the tasks of the individual functional areas in the authoriza-
tion system are explained.
The User Administrator has the following tasks and authorizations in the overview:
Create and change user.
Display authorizations and profiles.
Start of the User Information System.
Assign Users to Roles for:
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 30 of 65
8.2. Authorization Administration (Maintenance of Single and Composite Roles)
The tasks of the Authorization Administrators are to create, maintain and delete Sin-
gle and Composite Roles. They have no authorization to change User master
records or to assign Composite Roles.
The Authorization Coordinator has the following tasks and authorizations in the over-
view:
Specification of the role content of their department.
User requirements.
Display authorizations and profiles.
Role assignment of their Composite Roles to users of their department.
Start of the User Information System.
Execute User Master Comparison.
Maintain User Parameters.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 31 of 65
9. Guidelines for User Master Records
For security compliance reasons, it is not allowed to share your Dialog User with
other Users.
During the logon procedures, Users of this type are excluded from the password va-
lidity period check. Passwords of System Users don’t expire. Only User Administra-
tors can change them via transaction SU01. System Users will be assigned to the
user group XXX_SYS (Background User).
During login, a check will start regarding expired / initial passwords. Passwords of
Communication Users expire. Their password can only be changed by User Adminis-
trators (transaction SU01). Due to this fact, the communication at the XYZ enterprise
only happens via technical users of the User Type System User. The User Type
Communication User is accordingly not allowed (see also SAP Note 622464).
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 32 of 65
9.1.4. Service Users (Type Service)
Service Users will be used for anonymous system accesses via an ITS-Service.
Users of the Type Service User are dialog users and are part of an anonymous,
larger user group. Generally, only very restricted authorizations should be assigned.
Only the User Administrator has the possibility to change the password. A multiple lo-
gin is permitted. Due to the requirements described in chapter 9.1.1, the use of Ser-
vice Users is not allowed at the moment.
9.2. Trainees
Trainees will work during their training period in many departments. Many of their
tasks will be done with the support of SAP Systems. For those activities, it is neces-
sary to assign to the trainee the corresponding authorizations, which are relevant for
the department in which the trainee currently works.
To avoid having the trainees get more and more authorizations (while passing
through all departments which are relevant for the training) the following rules must
be considered:
When hiring, a separate User Master Record must be created for each
trainee. The necessary data can be obtained from the personnel department
for trainees, as for all other SAP Dialog Users (see chapter 9.1.1. Dialog
User). The creation of anonymous users for trainees is prohibited.
The authorizations required for the respective training sections must be dis-
cussed and created together with the responsible departments.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 33 of 65
9.3. External Users
External Users include all Users who are not members of the XYZ Enterprise, such
as consultants, auditors, etc.
The application for User Master Record and for authorizations is done through the
same procedure as for all other Users. A restrictive assignment of authorizations
must be ensured.
Generally, there is no SAP_ALL or SAP_NEW assignment to External Users. Also,
only in exceptional cases are External Users assigned authorizations in Production
Systems.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 34 of 65
10. System Parameter settings & Security Policies
In SAP Systems, System Parameters are used to set basic settings for User and for
authorization administration. These parameters are explained below. The values of
the parameters can be checked using the report RSPARAM or transaction RSPF-
PAR. Transactions RZ10 (Administration of Instance Profiles) and RZ11 (Mainte-
nance of System Parameters) are available for parameter administration. The main-
tenance of the parameters is carried out exclusively by the Basis department.
Unlike the System Parameters, which apply across users and clients, Security Poli-
cies (transaction SECPOL) are assigned directly to User Master Records via transac-
tion SU01. This means that it is now possible to set the parameters individually. Most
of the System Parameters that control password rules and logon behavior are set by
the Security Policies. Only for User Master Records which do not have an assigned
Security Policy will the previous System Parameters remain effective.
The following supplementary rules for passwords are preset in the system by default:
First character must not be „!“ or „?“
The first three characters must not be identical
Passwords listed in the table USR40 "Illegal passwords" cannot be used.
The parameter defines the minimum length of a password. The smallest permissible
value is 3, the highest value 40. The maximum value that can be set depends on the
Parameter: login/password_downwards_compatibility - Downwards compatibility of
passwords (see chapter 10.1.5.4.).
SAP-Standard: 10 (Minimum password length= 10 characters)
XYZ Enterprise: 10 (Minimum password length= 10 characters)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 35 of 65
10.1.1.3. Minimum Number of Digits in Passwords
Parameter: login/min_password_digits
This parameter determines the minimum number of digits (0-9) that must be included
in the password. It is effective both when assigning new passwords and when chang-
ing or resetting passwords.
SAP-Standard: 1 (One minimum number of digits required)
XYZ Enterprise: 1 (One minimum number of digits required)
This parameter determines the minimum number of letters (a-z, A-Z) that must be in-
cluded in the password. It is effective when assigning new passwords as well as
when changing or resetting passwords.
SAP-Standard: 1 (One minimum number of ASCII-letter required)
XYZ Enterprise: 1 (One minimum number of ASCII-letter required)
This parameter determines how large the minimum number of lowercase letters (a-z)
must be in the password.
This parameter is checked both when assigning new passwords and when resetting
passwords.
This parameter determines how large the minimum number of capital letters (A-Z) in
the password must be.
This parameter is checked both when assigning new passwords and when resetting
passwords.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 36 of 65
10.1.1.7. Minimum Number of Special Characters in Passwords
Parameter: login/min_password_specials
This parameter determines the minimum number of special characters that must be
included in the password. It is effective when assigning new passwords as well as
when changing or resetting passwords.
The possible special characters also depend on the parameter settings of the param-
eter:
login/password_charset (see chapter 10.1.5.3.)
login/password_downwards_compatibility (see chapter 10.1.5.4.)
SAP-Standard: 1 (One special character required)
XYZ Enterprise: 1 (One special character required)
This parameter allows the administrator to specify the minimum number of characters
in which a new password must differ from the old password when the user changes
their password. This parameter does not work when resetting passwords (-> Initial
password).
SAP-Standard: 1
XYZ Enterprise: 1
This parameter controls the size of the password history. It stores a number of pass-
words determined by the parameter value. The password history is evaluated when a
user chooses a new password: the system rejects the (re-)use of passwords stored
in the password history.
Only passwords chosen by the user (in the course of a previous password change)
are stored in the password history. Passwords assigned by the administrator are not
stored in the password history. When passwords are set by the administrator, there is
no check.
SAP-Standard: 5 (The last 5 passwords are stored)
XYZ Enterprise: 5 (The last 5 passwords are stored)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 37 of 65
10.1.2.3. Password Must Be Compliant With Current Password Rules
Parameter: login/password_compliance_to_current_policy
This parameter can be used to control whether, for example, after a change of pass-
word rules, the new policies are checked directly at the next logon or only at the next
password change.
If the parameter is set to the value 1 and it is determined at logon that the current
password does not comply with the currently valid rules, the user is prompted to
change their password.
For non-password-based logon variants (SSO: SNC, X.509, PAS, logon ticket) it was
not checked until now whether the user has a password which would have to be
changed (possible reasons: password is initial or expired).
With this parameter the desired system behavior can be defined as follows:
Value 0: Password change requirement is ignored (=> downward compatible)
Value 1: Popup with selection 2 or 3 (user decides, default)
Value 2: password change dialog only (input: old & new password)
Value 3: Disable password (automatic, no popup)
SAP-Standard: 1 (Popup with selection 2 or 3)
XYZ Enterprise: 1 (Popup with selection 2 or 3)
This parameter controls how long a password remains valid. After the validity period
has expired, a new password must be assigned by the user. The value can be cho-
sen arbitrarily.
Due to the use of Single Sign-On (SSO) it is possible that this parameter has no
practical use.
SAP-Standard: 182 (Days validity period)
XYZ Enterprise: 182 (Days validity period)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 38 of 65
10.1.3.2. Waiting Time Between Two Password Changes
Parameter: login/password_change_waittime
This parameter can be used to define the time span (measured in days) after which a
user can change their productive password again.
Only password changes by the user are controlled by this parameter.
If the password is set to a new value by an administrator (initial password), the user
must change the password at the next logon (productive password).
Exception: Users of type SERVICE and SYSTEM.
SAP-Standard: 1 (One password change per day is possible)
XYZ Enterprise: 1 (One password change per day is possible)
If the user administrator creates a new User Master Record or sets the password of
an existing User Master Record to a new value, the user must change this so-called
initial password at the next login (to ensure that the password is known only to the
user himself).
With this parameter the maximum time span between the time of password setting or
password reset, and the first login can be defined. After this time period expires, the
message "The initial password has expired" is displayed and the logon is rejected.
Accordingly, a system parameter value of 0 would mean that the initial password
would be valid indefinitely.
Exception: Users of type SERVICE and SYSTEM. Password is valid immediately and
for an unlimited time and can only be changed by the User Administrator (see chap-
ter 9.1.).
SAP-Standard: 7 (Initial password is 7 days valid)
XYZ Enterprise: 7 (Initial password is 7 days valid)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 39 of 65
10.1.3.5. Password Lock
Parameter: login/fails_to_user_lock
This parameter determines how many times the user can enter an incorrect pass-
word before the system blocks further password login attempts for that user.
This does not affect the use of Single Sign On techniques.
Possible values are 1 to 99 inclusive.
SAP-Standard: 3 (Trials)
XYZ Enterprise: 3 (Trials)
This parameter is used to control whether the password lock should be valid only on
the same day it was set (thus limiting the lock to a maximum of 24 hours). Possible
values are 1 (automatic unlocking) and 0 (unlocking required by the User Administra-
tor).
SAP-Standard: 0
XYZ Enterprise: 0
This parameter allows to prevent users from logging on to the Application Server.
The User Administrator determines whether all users should be blocked or only a
certain User Group can logon.
It is also possible to allow only those users who have a specific security policy setting
to logon. Already logged in users are not affected.
Restricted logon is useful if users are to be locked out during system maintenance.
Allowed Values:
Value=0 All users can log on to the system (default)
Value=1 Only certain users should access the system.
Value=2 No user should access the system.
Value=3 The external access of users to the system should be restricted
Value=4 The external access of users to the system should be prevented
If the values 1 and 3 are given, the Security Policy Attribute server_logon_privilege
with the value =1 must be assigned to the respective users via an appropriate Secu-
rity Policy to ensure logon (see also 10.3.2.3.7.)
SAP-Standard: 0
XYZ Enterprise: 0
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 40 of 65
10.1.4. SAP GUI Rules
The parameter controls whether a user may log on to the SAP system more than
once. By default, multiple logons to the system are allowed (value = 0). It is recom-
mended to prohibit multiple logons (value = 1). A user cannot log on to the system
more than once. However, it is still possible to open multiple sessions on one com-
puter.
SAP-Standard: 0
XYZ Enterprise: 0
If the parameter Multiple logon (chapter 10.1.4.1.) has been set to the value 1 and
thus multiple logon has been deactivated in general, this parameter can be used to
name users (e.g. administrators) who can log on to the system more than once. The
usernames must be listed separated by commas (","). Spaces between the user-
names are not allowed.
SAP-Standard:
XYZ Enterprise:
This parameter determines how often the user can enter an incorrect password be-
fore the system disconnects the GUI connection. The parameter value should be
smaller than the value of the password lock parameter login/fails_to_user_lock
(chapter 10.1.3.5.)
Possible values are 1 to 99 inclusive.
SAP-Standard: 3 (Trials)
XYZ Enterprise: 3 (Trials)
This parameter can be used to trigger an automatic logoff of a user if they have not
performed any activities on the system for a longer period of time. However, this will
abort all current work of the user. This can lead to the loss of data that has not yet
been saved. The parameter is to be filled with a value in seconds, where the value 0
stands for a deactivation of the automatic logout. It is recommended to use a pass-
word-protected screen saver with an activation time of 15 minutes instead of auto-
matic logout.
SAP-Standard: 0
XYZ Enterprise: 0
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 41 of 65
10.1.5. Others
This parameter can be used to define the properties of the standard user SAP*.
If the value "0" is set for this parameter, it is possible to perform a new logon with
SAP* and initial password PASS if the user master record of user SAP* is deleted
(chapter 7.2).
It is recommended to withdraw the special rights from the standard user (value=1)
and to change the standard password.
SAP-Standard: 1 (Automatic user SAP* is permitted)
XYZ Enterprise: 1 (Automatic user SAP* is deactivated)
With this parameter the Security Audit Log can be activated (value=1).
By default, the Security Audit Log is deactivated (value=0).
From the point of view of auditing the Security Audit Log should be active. The users
to be monitored and the activities to be monitored must be maintained in the audit
profile (transaction RSAU_CONFIG). The evaluation of the Security Audit Log is
done via transaction RSAU_READ_LOG. The maximum size of the Security Audit
Log is defined by the parameter rsau/max_diskspace/local and should be at least
1.000.000
SAP-Standard: 0
XYZ Enterprise: 1
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 42 of 65
10.1.5.3. Define the Character Set Used for Passwords
Parameter: login/password_charset
This parameter determines the set of characters which may be used to compose a
password:
Value 0: The password may only contain numbers, letters and the following 32
ASCII) special characters exist: !"@ $%&/()=?'`*+~#-_.,;:{[]}\<>|
Value 1: The password may consist of any characters, including national special
characters (e.g. from ISO Latin-1, 8859-1), but all characters that are not in the
above (with login/password_charset = 0) quantity, are mapped to the same (special)
character and are therefore not distinguished. This value is the default value (down-
ward compatible).
Value 2: The password may consist of arbitrary characters; it is internally entered into
the Unicode format UTF-8 converted. If you do not have a Unicode-compatible sys-
tem, but you should note that not all characters may be set can be entered on the lo-
gin screen (restriction due to codepage given by the system language => see SAP
Note 735356).
The system parameter should therefore only be set to the value 2, if it can be en-
sured that all the systems involved can handle the new Support password encoding
SAP-Standard: 1 (Using of any character, incl. special characters)
XYZ Enterprise: 1 (Using of any character, incl. special characters)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 43 of 65
10.1.5.4. Downward Compatibility of Passwords
Parameter: login/password_downwards_compatibility
Value 3: System behavior as for parameter value 2, except that the login is consid-
ered successful (bypassing downward incompatibility problems).
Value 4: System behavior as for parameter value 3, except that no syslog logging is
performed.
Value 5: System only issues downward compatible password hash values. The pa-
rameter setting has the effect that passwords are no longer searched for large- and
lower case. This parameter setting should therefore be avoided wherever possible.
SAP-Standard: 0
XYZ Enterprise: 0
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 44 of 65
10.1.5.5. System Standard Clients
Parameter: login/system_client
This system parameter determines which client is suggested as the system default
client when logging on.
The suggested system standard client can be overwritten by the user.
SAP-Standard: 000 (Client 000 is the system standard client)
XYZ Enterprise: 100 (Client 100 is the system standard client)
This parameter defines the languages for which a login to the application server is al-
lowed. For example, to allow users to log on in German and French, the parameter
setting DF is required. Possible parameter values are all language abbreviations.
SAP-Standard: DE (Logon language: German and English)
XYZ Enterprise: DE (Logon language: German and English)
This parameter defines the default logon language for an Application Server.
This parameter setting also defines the language of the logon screen.
The default logon language must be contained in the parameter "Possible logon lan-
guages" zcsa/installed_languages (Chapter 10.1.5.6.).
SAP-Standard: D (Standard logon language: German)
XYZ Enterprise: D (Standard logon language: German)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 45 of 65
10.2. Parameters to control Authorization Checks
This parameter controls whether the table USOBX is updated. This table contains the
combination of transactions and authorization objects that are validated during a
transaction. The table is delivered by SAP, so that updating the table in a production
system is not recommended. In addition, updating the table results in high perfor-
mance losses.
SAP-Standard: N (There is no updating of the table)
XYZ Enterprise: N (There is no updating of the table)
This parameter can be used to make transactions available for analysis purposes.
Transactions SU53 and SU56 are used to analyze failed authorization checks. In
case of a user buffer overflow, the authorizations for these transactions can be lost.
Therefore, it is useful to exclude these two analysis transactions from the authoriza-
tion check using the named parameter.
SAP-Standard:
XYZ Enterprise: “SU53 SU56“
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 46 of 65
10.2.4. Number of SU53 Shared Buffer Entries per Work Process
Parameter: auth/su53_buffer_entries
This parameter specifies the number of available storage locations in shared memory
for failed authorization checks that can be displayed with transaction SU53.
The parameter is multiplied by the number of work processes defined by the rdisp/
wp_no... parameters.
The result is the number of available storage locations.
This parameter controls whether the authorization check can be switched off global-ly
for individual objects using the AUTH_SWITCH_OBJECTS transaction.
If the value is set to "Y" or not at all, the authorization check can be switched off. The
security of system use is impaired by switching off the authorization check. There-
fore, it is absolutely necessary to set the parameter to the value N.
SAP-Standard: N
XYZ Enterprise: N
This parameter determines whether authorization checks are made against the au-
thorization object S_RFC with regard to Remote Function Call (RFC).
For more information, see SAP Note 2216306.
SAP-Standard: 1
XYZ Enterprise: 1 (Authorization check for RFC is active)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 47 of 65
10.2.7. User-Specific Long-Term Authorization Trace
Parameter: auth/auth_user_trace
This long-term trace collects client- and user-specific authorization data and stores it
in the database.
During the execution of a program, each authorization check is recorded with the
name and type of the running application, the program location, the authorization ob-
ject, the checked authorization values and the result exactly once per user with the
first timestamp.
The trace database table supports the maintenance of authorization default values
and authorizations, especially for users with special tasks or special authorization ob-
jects, e.g. for communication users in RFC scenarios.
Caution:
Activation of the authorization trace without a filter can result in high performance
losses!
SAP-Standard: N
XYZ Enterprise: N
The TCDCOUPLES table is only taken into consideration during Call Transaction
without the addition "WITH / WITHOUT AUTHORITY-CHECK".
SAP-Standard: 2
XYZ Enterprise: 2
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 48 of 65
10.2.9. Logging of Data Changes in Tables
Parameter: rec/client
With this parameter the table logging can be switched on or off client-specifically. De-
pending on the setting of this parameter, the change operations on certain tables
(these must be marked accordingly in the technical settings of the data dictionary us-
ing transaction SE13) are either not logged at all, only in certain clients or in all
clients.
Since tables are to be regarded as outsourced program parts, the table changes of
certain tables must be logged and stored for a period of time. For example, in Ger-
many at least 10 years in accordance with §257 HGB.
SAP Note 112388 contains a list of all tables that are subject to mandatory logging in
accordance with the FI audit guidelines of the DSAG Working Group for Auditing,
Germany.
For these reasons it is recommended to activate logging on the production systems
for all clients (except 000). The logs can be displayed and evaluated using transac-
tion SCU3 (report RSVTPROT). In table DD09L you can see for which tables the log
indicator is set. You can archive the log database using transaction SARA.
Further information can be found in SAP Note 1916.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 49 of 65
10.2.10. Alternative Language for Missing Descriptions in the Login Language
Parameter: zcsa/second_language
If descriptions are not available in the logon language, the system checks whether a
description is available in the "alternative language".
This parameter setting is used, for example, in the User Information System (transac-
tion SUIM) if role descriptions are missing.
Role descriptions of roles created by authorization administrators - those who have
logged on with the logon language German - are displayed without the parameter,
only for users who have the logon language German. For example, users who have
logged on with the English or French logon language cannot see the role descrip-
tions. This changes when the parameter is set to the value D for German. From this
point on the system checks if there are matching texts in the " alternative language"
for the missing texts in the logon language and displays them.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 50 of 65
10.3. Security Policy
Each security policy has a number of security policy attributes that can be used to
control the following behavior:
Password Rules
Password Changes
Logon Restrictions
The individual security attributes can also be described directly by selecting an at-
tribute and then calling the input help in the system.
The sum of the values of the following security policy attributes must not exceed the maxi-
mum password length
(40 respectively 8, if login/password_downwards_compatibility = 5):
MIN_PASSWORD_DIGITS
MIN_PASSWORD_LETTERS respectively the sum of:
MIN_PASSWORD_LOWERCASE and MIN_PASSWORD_UPPERCASE
MIN_PASSWORD_SPECIALS
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 51 of 65
10.3.2.1.1. Check for Use “Prohibited Passwords”
Security Policy Attribute: CHECK_PASSWORD_BLACKLIST
When new passwords are assigned (by the administrator) or when a password is
changed (by the user), the password rules are checked.
One part of the password rules is the check whether the password is in a negative list
("prohibited passwords"). This security policy attribute can be used to specify whether
such a check should be performed.
There are no equivalent system parameters for this Security Policy Attribute.
SAP standard: 1 (evaluation of "prohibited passwords is performed)
This Security Policy Attribute determines the minimum number of digits (0-9) that
must be included in a password.
It is effective both when creating new passwords and when changing or resetting ex-
isting passwords.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 52 of 65
10.3.2.1.4. Minimum Number of Letters in Passwords
Security Policy Attribute: MIN_PASSWORD_LETTERS
This Security Policy Attribute determines the minimum number of ASCII letters (A-Z
and a-z) that must be included in a password.
It is effective when creating new passwords, changing or resetting existing pass-
words.
This Security Policy Attribute determines the minimum number of ASCII lowercase
letters (a - z) that must be included in a password.
It is effective when creating new passwords, changing or resetting existing pass-
words.
This Security Policy Attribute determines the minimum number of ASCII capital let-
ters (A - Z) that must be included in a password.
It is effective when creating new passwords, changing or resetting existing pass-
words.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 53 of 65
10.3.2.1.7. Minimum Number of Special Characters in Passwords
Security Policy Attribute: MIN_PASSWORD_SPECIALS
This Security Policy Attribute determines the minimum number of special characters
that must be included in a password.
Special characters are all characters that are neither digits (0-9) nor ASCII letters (A-
Z or a-z).
This includes national special characters and Unicode characters (if it is a Unicode
system) as well as the ASCII characters:
!"@ $%&/()=?'`*+~#-_.,;:{[]}\<>|
It is effective when creating new passwords, changing or resetting existing pass-
words.
If a user wants to change their password (or was prompted by the system to change
their password), they must enter both the current password and the new password.
The presence of both passwords as plain text information allows to check in how
many characters both differ.
The number of different characters is calculated as follows:
Both character strings are brought to maximum coverage (by rotation) (search for
longest common character string). The number of characters that differ (in some
places) is the number of characters that are searched for.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 54 of 65
10.3.2.2.2. Size of the Password History
Security Policy Attribute: PASSWORD_HISTORY_SIZE
This Security Policy Attribute specifies the size of the password history.
The password history is evaluated when a user chooses a new password. The sys-
tem rejects the (re-)use of passwords stored in the password history. Only passwords
chosen by the user (in the course of a previous password change) are stored in the
password history.
Passwords assigned by the administrator are not stored in the password history.
When setting passwords by the administrator, there is no check whether the new
password to be set has been used by the user before; otherwise the administrator
would get knowledge of the user's old password.
This security policy attribute can be used to control whether the system should check
whether the password used for a password-based logon complies with the current
password rules and whether, if necessary, the user should be prompted to change
the password.
Users of the type 'SERVICE' and 'SYSTEM' are in principle exempt from the pass-
word change obligation and therefore not affected by this regulation.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 55 of 65
10.3.2.2.4. Password Change Requirement for Single Sign-On logins
Security Policy Attribute: PASSWORD_CHANGE_FOR_SSO
When using password-based login, the system checks whether the user's password
needs to be changed (e.g. because the password is initial or has expired).
For non-password-based logon procedures (Single Sign-On (SSO), e.g. using X.509
certificate, logon ticket, SNC, SAML, etc.) it was not checked until now whether the
user has a password which he/she would have to change.
This security policy attribute can be used to define the desired system behavior:
0 = Password change requirement is ignored (downward compatible)
1 = User decides: Change or Delete (default setting)
2 = User must change the password
3 = The password is automatically deleted
This security policy attribute determines whether and after how many days (since the
last password change) the user will be prompted to change the password again.
Users of the type SERVICE and SYSTEM are not affected by this rule; they will
never be prompted to change their password.
If the value is set to 0 the password will not expire and therefore the user will not be
asked to change the Production password.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 56 of 65
10.3.2.2.6. Minimum Waiting Time for Password Change
Security Policy Attribute: MIN_PASSWORD_CHANGE_WAITTIME
This security policy attribute can be used to specify the time span (measured in days)
after which a user can change their password again. Only password changes initi-
ated by the user are considered.
If the password is set to a new value by an administrator, the user must change the
password the next time they log on (except for SERVICE and SYSTEM users).
If the password change is forced by the system (e.g. after a specified period of time
or if a password change is required due to stricter password rules), the password can
also be changed immediately.
If the User Administrator creates a new user account or sets the password of an ex-
isting user account to a new value, the user must change this so-called initial pass-
word at the next logon.
This Security Policy Attribute can be used to specify the maximum time span be-
tween the time of the password (reset) and the next login with the initial password.
After this time period has expired, the message "The initial password has expired" is
displayed and the logon is rejected.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 57 of 65
10.3.2.3.2. Validity of Unused Productive Passwords
Security Policy Attribute: MAX_PASSWORD_IDLE_PRODUCTIVE
If the user changes the password (but not if the password is set by the User Adminis-
trator), a so-called Productive Password is created. This password can be changed
again by the user at the earliest after a definable waiting period.
This Security Policy Attribute can be used to specify the maximum time span
between the time of the last password change and the next logon with this password.
After this time period expires, the message "Password has not been used for a long
time and is therefore deactivated" is displayed and the logon is rejected.
Dependencies
The PASSWORD_CHANGE_INTERVAL Security Policy Attribute specifies the time
period after which the system prompts the user to change their password. It is recom-
mended to set PASSWORD_CHANGE_INTERVAL to a value less than the value of
this Security Policy Attribute (MAX_PASSWORD_IDLE_PRODUCTIVE).
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 58 of 65
10.3.2.3.4. Automatic Unlocking of Users
Security Policy Attribute: PASSWORD_LOCK_EXPIRATION
After exceeding a definable upper limit, a password lock is set. Normally, a password
lock remains in effect indefinitely and must be manually released. However, it is also
possible to set a maximum validity period for password locks.
Allowed values:
0 = Password lock must be explicitly released
1 = Password lock is valid for a maximum of 24 hours (automatic unlocking)
This Security Policy Attribute can be used to prevent users from logging on to the
system with a password.
Allowed values:
0 = Password logon is allowed (if possible)
1 = Password login is disabled (i.e. is not possible)
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 59 of 65
10.3.2.3.6. Disable Ticket Logon
Security Policy Attribute: DISABLE_TICKET_LOGON
This Security Policy Attribute can be used to prevent a user log on to the system us-
ing a logon ticket or an authentication assertion ticket.
Allowed values:
0 = Ticket logon is allowed (if possible)
1 = Logon tickets are rejected (authentication assertion tickets are not affected)
2 = Both logon tickets and authentication assertion tickets are rejected
Dependencies
Whether a user can log on to the system using a logon ticket or an authentication as-
sertion ticket also depends on other factors:
System Parameter login/accept_sso2_ticket must be set to the value 1
Trust relationship with the ticket-issuing system must be established
The ticket must be received within the validity period
This Security Policy Attribute is only relevant if the value of the corresponding Sys-
temp Parameter (SERVER_LOGON_RESTRICTION - see 10.1.3.7) is set to 1 or 3.
In these cases only users who have assigned this attribute with the value 1 have ac-
cess to the system. By default, no privilege is assigned (i.e.: value = 0).
SAP-Standard: 0 (Ticket logon is allowed (if possible))
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 60 of 65
10.3.3. Conversion Table Security Policy Attribute – System Parameters
Password Rules Definition
1 Table USR40
2 In this context, the system parameter login/password_logon_usergroup must also be observed
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 61 of 65
11. Emergency plan
In the event of serious errors in the Productive SAP environment, which cannot be
corrected with the defined authorizations of the individual departments and/or cannot
be reproduced in the SAP Development or Quality Systems, the Emergency Concept
may be activated by skilled persons.
The Emergency Concept may also be activated if the Productive SAP system is not
available and no company SAP Basis employee is available for troubleshooting
within an acceptable time, whereby support from a skilled third party is required (ex-
ternal consultant, SAP, etc.). These third-party users must have extensive authoriza-
tions in the SAP system.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 62 of 65
12. Authorization Controlling
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 63 of 65
12.3. Review of authorizations by the Lines of Business
The Segregation of Duties in user creation, role creation and authorization assign-
ment give the department an important task in checking the assigned authorizations.
The following questions are the focus of attention:
For this purpose, an authorization review must be carried out at least once a year by
the Authorization Coordinator. The authorization review serves to check whether only
authorized users have access to the respective data.
The following issues should be reviewed regularly (at least twice a year):
1. Assignment of illegal roles on the production system (roles created for the de-
velopment or test systems have been assigned to users in the production sys-
tem, recognizable by the abbreviation ZD*, ZQ*, YD* or YQ*).
Check using transaction SUIM or PFCG.
Action: Immediate deletion of the roles.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 64 of 65
4. Missing assignment of self-created tables to Authorization Groups.
Check using Transaction SE54.
Action: Maintain the assignment to the Authorization Groups using transaction
SE54 (authorization group &nc&).
7. Checking the systems for compliance with the System Parameters described
in chapter 10.
Check Report RSPARAM.
Action: Adjust the System Parameters to the guidelines.
8. Checking the Production Systems for the assignment of the Authorization Ob-
ject S_QUERY with Activity 02 (see chapter 7.3.3).
Action: Execute the Report S_BCE_68001422 (Roles by Authorization Val-
ues).
www.sap.com/contactsap
© 2021 SAP SE or an SAP affiliate company. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company.
The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors.
National product specifications may vary.
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable
for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements
accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality
mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality
are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal
obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations.
Readers are cautioned not to place undue reliance on these forward-looking statements, and they should not be relied upon in making purchasing decisions.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other
countries. All other product and service names mentioned are the trademarks of their respective companies. See www.sap.com/trademark for additional trademark information and notices.
SAP Customer - Authorization Concept Template for SAP S/4HANA Cloud, private edition Page 65 of 65