SAP Security Basic Tcodes
SAP Security Basic Tcodes
Step 1 - Copy SAP Data: Copies SAP-provided authorization checks Critical Authorization in SAP
(SU24 proposals) from a previous version to the current version.
Step 2a - Compare SAP Data: Compares and displays changes in SAP- S_TABU_DIS -Used to protect tables using authorization groups with activity.
S_TABU_CLI - Auth object used to protect cross client tables.
provided default values for authorization objects.
S_TABU_NAM - New auth object to table access based on names.
Step 2b - Adjust Proposals: Allows modifications to SAP-provided
S_PROGRAM - Used to run ABAP reports/programs via SA38.
default values for authorization objects based on new or changed SAP
S_DEVELOP - Auth object used to control ABAP objects or debug access.
data. S_USER_AGR - Used to control roles.
Step 2c - Update Customer Tables: Automatically updates customer S_USER_AUT - Checked during authorization maintenance.
authorization tables with changes made to default values. S_USER_GRP - Used control user groups.
Step 2d - meant to check if SAP has introduced new transactions in S_USER_PRO - Used for profile maintenance.
place of any existing transactions. (ECC to S4 Upgrade – important) S_BDC_MONI - Used to protect batch input monitoring.
Step 3 - Mass Generation of Profiles: Regenerates authorization profiles S_BTCH_JOB - Used for background job monitoring and administration.
for roles that were affected by changes to authorization proposals. S_BTCH_ADM - Used for background job administration.
Step 4 - Upgrade Post Activities: Performs post-upgrade activities, such S_BTCH_NAM - User level control for background job scheduling
as manual adjustments to authorization objects or roles. S_ADMI_FCD - Basis administration like spool and monitoring