$XWKRUL]DWLRQV�0DGH�(DV\
8VHU�5ROH�7HPSODWHV�DQG�*HQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV
Release 4.6A/B
SAP Labs, Inc.
Palo Alto, California
&RS\ULJKW
������E\�6$3�$*��$OO�ULJKWV�UHVHUYHG�
1HLWKHU�WKLV�GRFXPHQWDWLRQ�QRU�DQ\�SDUW�RI�LW�PD\�EH�FRSLHG�RU�UHSURGXFHG�LQ�DQ\�IRUP�RU�E\�DQ\�PHDQV�RUWUDQVODWHG�LQWR�DQRWKHU�ODQJXDJH��ZLWKRXW�WKH�SULRU�FRQVHQW�RI�6$3�$*�
6$3�$*�PDNHV�QR�ZDUUDQWLHV�RU�UHSUHVHQWDWLRQV�ZLWK�UHVSHFW�WR�WKH�FRQWHQW�KHUHRI�DQG�VSHFLILFDOO\�GLVFODLPVDQ\�LPSOLHG�ZDUUDQWLHV�RI�PHUFKDQWDELOLW\�RU�ILWQHVV�IRU�DQ\�SDUWLFXODU�SXUSRVH��6$3�$*�DVVXPHV�QRUHVSRQVLELOLW\�IRU�DQ\�HUURUV�WKDW�PD\�DSSHDU�LQ�WKLV�GRFXPHQW��7KH�LQIRUPDWLRQ�FRQWDLQHG�LQ�WKLV�GRFXPHQW�LVVXEMHFW�WR�FKDQJH�ZLWKRXW�QRWLFH��6$3�$*�UHVHUYHV�WKH�ULJKW�WR�PDNH�DQ\�VXFK�FKDQJHV�ZLWKRXW�REOLJDWLRQ�WRQRWLI\�DQ\�SHUVRQ�RI�VXFK�UHYLVLRQ�RU�FKDQJHV��6$3�$*�PDNHV�QR�FRPPLWPHQW�WR�NHHS�WKH�LQIRUPDWLRQFRQWDLQHG�KHUHLQ�XS�WR�GDWH�
7UDGHPDUNV
6$3��WKH�6$3�ORJR��5����5����$%$3��DQG�RWKHU�6$3�UHODWHG�SURGXFWV�PHQWLRQHG�KHUHLQ�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�6$3�$*��$OO�RWKHU�SURGXFWV�PHQWLRQHG�LQ�WKLV�GRFXPHQW�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�WKHLU�UHVSHFWLYH�FRPSDQLHV�
6LPSOLILFDWLRQ�*URXS6$3�/DEV��,QF������'HHU�&UHHN�5RDG3DOR�$OWR��&$������
ZZZ�VDSODEV�FRP�VLPSOHVLPSOLI\�U�#VDS�FRP
3ULQWHG�LQ�WKH�8QLWHG�6WDWHV�RI�$PHULFD�,6%1�������������;
7KLV�ERRN�XVHV�(FR)/(;�OD\�IODW�ELQGLQJ��:LWK�WKLV�OD\�IODW�IHDWXUH³GHYHORSHG�E\DQG�H[FOXVLYHO\�DYDLODEOH�DW�-RKQVRQ�3ULQWLQJ�6HUYLFH��-36�³\RX�FDQ�RSHQ�WKLV�ERRNDQG�NHHS�LW�RSHQ�ZLWKRXW�LW�VQDSSLQJ�VKXW�RQ�\RX��<RX�QHHG�QRW�ZRUU\�DERXWEUHDNLQJ�WKH�VSLQH��(FR)/(;�PDNHV�ERRNV�OLNH�WKLV�RQH�HDVLHU�WR�XVH�
&RQWHQWV�DW�D�*ODQFH
Authorizations Made Easy iii
$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL
,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y
:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L
&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�
&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3�����������������������������������������������������������������²�
&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�����������������������������������������������������²�
&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ�������������������������������������������������������������������������²�
&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�
&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�
&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�
&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�
&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV ���������������������������������������������������������������²�
&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�
&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�
&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�
&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�����������������������������������������������������²�
&KDSWHU���� 8SJUDGH �������������������������������������������������������������������������������������������²�
$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�
$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�
$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�
*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�
,QGH[ ������������������������������������������������������������������������������������������������������,²�
iv
'HWDLOHG�7DEOH�RI�&RQWHQWV
Authorizations Made Easy v
$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL
,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y
What Is this Book About? ................................................................................... xviWho Should Read this Book?............................................................................. xviHow to Use this Guide ........................................................................................ xviiConventions......................................................................................................... xvii
:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L
Overview............................................................................................................... xxiiUser Role Templates........................................................................................... xxiiFlexible User Menus............................................................................................ xxiiComposite Activity Groups............................................................................... xxivUser Groups........................................................................................................ xxivCentral User Administration ............................................................................. xxiv
&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�
Overview............................................................................................................... 1–2The Authorization Concept ................................................................................ 1–4Authorization Object .............................................................................................. 1–5Authorization Object Fields ................................................................................... 1–6Authorizations........................................................................................................ 1–6Authorization Profiles ............................................................................................ 1–7
Naming Convention for Authorization Profiles........................................................ 1–7User Master Records ............................................................................................ 1–7Authorization Checks ............................................................................................ 1–8Activating and Deactivating Authorization Checks in Transactions...................... 1–8SAP* and DDIC Users ......................................................................................... 1–8What Is the Profile Generator? .......................................................................... 1–9Components of the Profile Generator ................................................................. 1–10
Activity Groups...................................................................................................... 1–10Composite Activity Groups ................................................................................... 1–10Derived Activity Groups ........................................................................................ 1–10User Assignment .................................................................................................. 1–10
Generating the Profiles........................................................................................ 1–10What Is an Activity Group? .............................................................................. 1–12Activity Group Assignments ................................................................................ 1–12
R/3 login user IDs ............................................................................................... 1–12Jobs ..................................................................................................................... 1–12Positions.............................................................................................................. 1–13Organizational units ........................................................................................... 1–13
What Is a User Role Template?.......................................................................... 1–13
Detailed Table of Contents
Authorizations Made Easyvi
R/3 Tools for Security Implementation ...........................................................1–14Case Study: Security Strategy in a Three-System Environment ................. 1–15Development System (DEV) ...............................................................................1–15Quality Assurance System (QAS) ....................................................................... 1–17
Training Client System (TRG)...............................................................................1–17Production System (PRD) ...................................................................................1–18Setting Up the Authorization Administrators.................................................1–19How the Administrators Work Together ..............................................................1–21Policies and Procedures...................................................................................1–21User Administration .............................................................................................1–21
Policies ..................................................................................................................1–21Procedures............................................................................................................1–22Roles and Responsibilities ....................................................................................1–22
System Security...................................................................................................1–23Policies ..................................................................................................................1–23Procedures............................................................................................................1–23Roles and Responsibilities ....................................................................................1–24
Auditing Requirements.....................................................................................1–24
&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3 �����������������������������������������������������������������²�
Overview............................................................................................................... 2–2ASAP Roadmap ................................................................................................... 2–2Authorizations in the Roadmap Structure .............................................................2–4Knowledge Corner...............................................................................................2–5Questions and Answers Database (Q&Adb) .................................................... 2–6What Is the Q&Adb?..............................................................................................2–6How to Work with the Q&Adb................................................................................ 2–6How to Generate the Authorization List from the Q&Adb ..................................... 2–6Authorization List ................................................................................................2–6What Is the Authorization List?..............................................................................2–6How to Work with the Authorization List................................................................ 2–7
Generate Authorization List from the Q&Adb..........................................................2–7Define User Roles ...................................................................................................2–8Generate User Roles Overview ..............................................................................2–9Build User Roles .....................................................................................................2–9
&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU �����������������������������������������������������²�
Overview...............................................................................................................3–2Confirming that the Profile Generator Is Active............................................... 3–2Checking the Required Instance Profile Parameter..............................................3–2Loading the USOBX_C and USOBT_C tables ..................................................3–4Initial Copying of SAP Defaults into the Customer Tables (SU25) .......................3–4Transporting the Defaults ...................................................................................... 3–6Getting Support from the SAPNet – R/3 Frontend Notes................................ 3–7Accessing the Error Notes Database ....................................................................3–7Printing Important SAPNet – R/3 Frontend Notes ................................................ 3–8Applying Advance Corrections to Your R/3 System.............................................. 3–8
&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ �������������������������������������������������������������������������²�
Overview...............................................................................................................4–2System Users ....................................................................................................... 4–2
Detailed Table of Contents
Release 4.6A/B YLLvii
External R/3 Users ................................................................................................ 4–3Internal R/3 Users ................................................................................................. 4–3
Dialog...................................................................................................................... 4–3Batch Data Communication.................................................................................... 4–3Background............................................................................................................. 4–3CPIC ....................................................................................................................... 4–4
Special R/3 Users.................................................................................................. 4–4SAP* ....................................................................................................................... 4–4DDIC ....................................................................................................................... 4–4EarlyWatch ............................................................................................................. 4–4
Creating Users ...................................................................................................... 4–5User Groups......................................................................................................... 4–5Authorizations and Authorization Profiles....................................................... 4–6Mass Operations ................................................................................................. 4–6Creating a New User (Client-Specific)............................................................... 4–7Changing a User’s Password........................................................................... 4–10Password Requirements ..................................................................................... 4–11User Information System.................................................................................. 4–12
&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�
Overview............................................................................................................... 5–2What Are User Role Templates? ....................................................................... 5–2User Menu ............................................................................................................ 5–2How to Work with User Role Templates ........................................................... 5–3Starting Activity Group Maintenance (PFCG) ....................................................... 5–4Using the SAP-Provided User Role Templates .................................................... 5–4Copying and Modifying SAP-Provided User Role Templates............................. 5–10Create your own User Role Templates............................................................... 5–22Creating Composite Activity Groups ................................................................... 5–32Tips for an Administrator ................................................................................. 5–35Available User Role Templates........................................................................ 5–40Release 4.6A....................................................................................................... 5–40Release 4.6B....................................................................................................... 5–44
&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�
Overview............................................................................................................... 6–2Selecting Views/Types in Activity Group Maintenance .................................. 6–2Exploring Advanced Profile Generator Functionality ..................................... 6–3Creating and Changing the Hierarchy................................................................... 6–4
Inserting Transactions ............................................................................................ 6–5Inserting Internet and Document Links ............................................................... 6–10Inserting Reports ................................................................................................. 6–12Displaying the Online Documentation for Activity Group Objects ...................... 6–15Copying and Deriving Activity Groups...........................................................6–16Basics on Duplicating Activity Groups ................................................................ 6–16Copying Activity Groups...................................................................................... 6–17Deriving Activity Groups...................................................................................... 6–17Selecting Workflow Tasks................................................................................ 6–21What You Should Know About Workflow............................................................ 6–21Deleting Activity Groups ..................................................................................6–24
Detailed Table of Contents
Authorizations Made Easyviii
Postmaintaining User Role Templates............................................................6–25Different Settings for the Maintenance View.......................................................6–25Maintaining and Generating the Authorization Profiles................................6–26Displaying an Overview of Generated Profiles .............................................. 6–30Regenerating Authorization Profiles After Making Changes ....................... 6–32Using Utilities to Change Generated Authorizations .................................... 6–36Merging Authorizations........................................................................................6–36Reorganizing Technical Names of Authorizations .............................................. 6–37Customizing Authorizations.............................................................................6–38Assigning IMG Projects or Project Views to Activity Groups ..............................6–38
&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�
Overview...............................................................................................................7–2Transports Between Clients............................................................................... 7–2Transports Between R/3 Systems ..................................................................... 7–3Transporting Activity Groups ............................................................................ 7–3Transporting Single Activity Groups Using the Activity Group Maintenance
Transaction........................................................................................................7–4Mass Transport of Activity Groups ........................................................................ 7–6Transporting Check Indicators and Field Values ............................................7–8Transporting Authorization Templates ............................................................. 7–8Transporting User Master Records ................................................................... 7–8
&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�
Manually Postmaintaining Authorizations........................................................ 8–2When to Insert Missing Authorizations?................................................................8–2
Case #1: Authorization Is Missing for Related Transactions ..................................8–2Case #2: The Generated Profile Does Not Assign Any General Rights to the
User ....................................................................................................................8–2Case #3: Cannot Select Transaction SU53 from the Menu in PFCG.....................8–2
How to Insert Missing Authorizations ....................................................................8–3Manually Inserting Authorizations.....................................................................8–3Using Selection Criteria .........................................................................................8–4Inserting Manually.................................................................................................. 8–6Inserting Authorizations from Templates .........................................................8–7Creating a New Template......................................................................................8–7Inserting Authorizations from a Template ........................................................... 8–10Inserting Authorizations from a Profile...........................................................8–12Inserting Full Authorizations: Profile “<YourCompany>” ............................ 8–15
&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV����������������������������������������������������������������²�
Overview............................................................................................................... 9–2Assigning Users to Activity Groups.................................................................. 9–3Assigning Activity Groups to Users.................................................................. 9–6Assigning PD Objects to Activity Groups ........................................................ 9–7Assigning Activity Groups to PD Objects ...................................................... 9–10Transferring Users from an IMG Project to an Activity Group..................... 9–13Updating Profiles in the User Master Records............................................... 9–15
Detailed Table of Contents
Release 4.6A/B L[ix
Comparing User Master Data from Within Transaction PFCG........................... 9–15Profile Comparisons Using Mass Compare (PFUD)........................................... 9–18Report PFCG_TIME_DEPENDENCY to Schedule Time Dependency.............. 9–19Creating a Sample Organizational Plan.......................................................... 9–21Using the Classic R/3 Transaction...................................................................... 9–22Using the Enjoy Transaction ............................................................................... 9–27Structural Authorizations ................................................................................. 9–28
&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�
Overview............................................................................................................. 10–2Setting Up an ALE User.................................................................................... 10–3Naming Logical Systems.................................................................................. 10–5Assigning Logical Systems to Clients............................................................ 10–8Defining Target System for RFC Calls .......................................................... 10–10Distribution Model........................................................................................... 10–13Generating Partner Profiles in the Central System ..................................... 10–16Distributing Model View ................................................................................. 10–17Generating Partner Profiles in the Client System........................................ 10–18
&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�
Overview............................................................................................................. 11–2Assigning the Central User Administration Distribution Model .................. 11–2Testing Central User Administration .............................................................. 11–3Migrating Existing Users to the Central System............................................ 11–7Defining Field Attributes for User Maintenance ............................................ 11–9Global User Manager ...................................................................................... 11–10Structure of the Global User Manager .............................................................. 11–12Using the Global User Manager........................................................................ 11–12
System Landscape with Existing Users ............................................................. 11–12System Landscape Without Existing Users........................................................ 11–13User Creation...................................................................................................... 11–14
Defining System Types and User Groups......................................................... 11–14Modeling with the Global User Manager........................................................... 11–16Authorization for the Global User Manager....................................................... 11–17Distributing Data in the Global User Manager .................................................. 11–18
Immediate Distribution........................................................................................ 11–19Scheduling Background Distribution................................................................... 11–19
&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�
Overview............................................................................................................. 12–2Tracing Authorizations with Transaction SU53............................................. 12–2System Trace Using Transaction ST01........................................................... 12–4Analyzing a Written Trace File ......................................................................... 12–9Reducing the Scope of Authorization Checks............................................. 12–12Overview............................................................................................................ 12–12Enabling the Profile Generator.......................................................................... 12–12Enabling/Disabling Other System-wide Checks ............................................... 12–12
Detailed Table of Contents
Authorizations Made Easyx
Enabling auth/tcodes_not_checked ....................................................................12–12Enabling auth/rfc_authority_check......................................................................12–13Globally Deactivating or Activating Authorization Checks ..................................12–13Parameter Transactions......................................................................................12–18
Deactivating Authorization Checks Using SU24 ...............................................12–18Reducing the Scope of Authorization Checks................................................... 12–19
Maintaining Check Indicators for Transaction Codes .........................................12–20Mass Change of Check Indicators ......................................................................12–28Maintaining Authorizations in the Activity Groups...............................................12–32
&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�������������������������������������������������� ��²�
Overview.............................................................................................................13–2Audit Tools (SM20, SM19, SECR) .................................................................... 13–2Security Audit Log (SM20)...................................................................................13–2
Running the Audit Log...........................................................................................13–4Setting Security Audit Log Parameters (SM19) ..................................................13–5
Defining Filter Group 1 ..........................................................................................13–7Defining Filter Group 2 ..........................................................................................13–7
Audit Information System (SECR).....................................................................13–11Complete Audit....................................................................................................13–12User-Defined Audit..............................................................................................13–16
User Security Audit Jobs ...................................................................................13–18Audit Tasks (SM21, STAT, ST03) ...................................................................13–20Reviewing Validity of Named Users ..................................................................13–20Reviewing Profiles for Accuracy and Permission Creep................................... 13–21System Log (SM21)........................................................................................... 13–22Statistic Records in CCMS (STAT) ................................................................... 13–24ST03 – User Profile ........................................................................................... 13–26Logging of Specific Activities............................................................................. 13–28
Logging Changes to Table Data .........................................................................13–28
Logging Changes to User Master Records, Profiles, and Authorizations 13–30
&KDSWHU���� 8SJUDGH ���������������������������������������������������������������������������������������� ��²�
Before Doing Any Upgrade .............................................................................. 14–2Validation Steps After Upgrading Is Completed ............................................ 14–3Converting Previously Created SU02 Profiles to Activity Groups............... 14–4Creating an Activity Group from Manually Maintained Profiles...........................14–4Removing User Assignments from the Original SU02 Profile............................. 14–9Upgrading from a Release Prior to 3.1x to 4.6 A/B ......................................14–11Converting Existing Authorization Profiles for the Profile Generator ................14–11Re-creating the Authorization Profiles from Scratch Using the Profile
Generator ...................................................................................................... 14–11Upgrading from Release 3.0F to 4.6 A/B.......................................................14–12Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B...................................... 14–14Upgrade from Releases 4.0x or 4.5x to 4.6 A/B............................................ 14–22
$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�
Overview...............................................................................................................A–2SAPNet – R/3 Frontend Notes ............................................................................A–3
Detailed Table of Contents
Release 4.6A/B [Lxi
$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�
Overview...............................................................................................................B–2R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................B–2Profile Generator Setup......................................................................................B–3Working with the PG and Profiles .....................................................................B–3Authorization Checks (SU24).............................................................................B–5Upgrade Procedure (SU25) ................................................................................B–7Including Transactions or Reports ...................................................................B–7Missing Authorizations.......................................................................................B–7User Administration ............................................................................................B–8Transporting ........................................................................................................B–8Tables ...................................................................................................................B–8
$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�
Incorrect Logons, Default Clients, and Default Start Menu............................C–2Setting Password Length and Expiration.........................................................C–2Specifying Impermissible Passwords...............................................................C–3Securing SAP* Against Misuse..........................................................................C–3Tracing Authorizations .......................................................................................C–3Profile Generator and Transaction SU24..........................................................C–4User Buffer ...........................................................................................................C–4No Check on Object S_TCODE..........................................................................C–4No Check on Certain ABAP Objects .................................................................C–4RFC Authority Check ..........................................................................................C–5
*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�
,QGH[ ������������������������������������������������������������������������������������������������������,²�
Detailed Table of Contents
Authorizations Made Easyxii
xiii
�$FNQRZOHGJPHQWV
,�ZLVK�WR�H[SUHVV�DSSUHFLDWLRQ�WR�WKH�IROORZLQJ�LQGLYLGXDOV�ZKR�SURYLGHG�WLPH��PDWHULDO��H[SHUWLVH��DQGUHVRXUFHV�WR�KHOS�PDNH�WKLV�JXLGHERRN�SRVVLEOH��LQ�DOSKDEHWLFDO�RUGHU��
6$3�$*� 1RUPDQ�'H�/HHXZ��0DWKLDV�.LQ]OHU��(UZLQ�5RMHZVNL��0DUNXV�6FKPLGW��+HLNR�6WRFN�6YHQ�6FKZHULQ�:HQ]HO��7KRUVWHQ�9LHWK
6$3�$PHULFD� 0DULD�*UHJJ��´&DVSHUµ�:DL�)X�.DQ��'DQLHO�%HQMDPLQ�)LJ�=DLGVSLQHU
6$3�/DEV� $QLO�-DLQ��-RKQ�.DQFOLHU��2OLYHU�0DLQND��*DU\�1DND\DPD��.XUW�:ROI
1LKDG�$O�)WD\HK6$3�/DEV��,QF�������
Acknowledgments
Authorizations Made Easyxivxiv
xv
,QWURGXFWLRQ
&RQWHQWV
What Is this Book About? .......................................................................................xvi
Who Should Read this Book?.................................................................................xvi
How to Use this Guide............................................................................................xvii
Conventions ............................................................................................................xvii
Introduction
What Is this Book About?
Authorizations Made Easyxvixvi
:KDW�,V�WKLV�%RRN�$ERXW"
7KLV�JXLGHERRN�LV�GHVLJQHG�WR�KHOS�\RX�VHW�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�LQ�WKHFXVWRPHU�V\VWHP�XVLQJ�WKH�3URILOH�*HQHUDWRU��3*���,W�H[SODLQV�ZKDW�\RX�QHHG�WR�NQRZ�WRSHUIRUP�WKLV�WDVN�DQG�KHOSV�\RX�XVH�WKH�VWDQGDUG�WRROV�SURYLGHG�ZLWK�\RXU�V\VWHP�
7KLV�ERRN�GRHV�QRW�FRYHU�DXWKRUL]DWLRQV�IRU�DGG�RQ�FRPSRQHQWV�RU�1HZ�'LPHQVLRQSURGXFWV��,W�DOVR�GRHV�QRW�FRYHU�,QWHUQHW�UHODWHG�DXWKRUL]DWLRQV��HQFU\SWLRQ��DXWKHQWLFDWLRQ�DQG�FUHGLW�FDUG�VHFXULW\��
7KLV�JXLGH�UHIHUV�WR�5HOHDVH����$�%�RI�WKH�6$3�5���6\VWHP��$OO�VFUHHQVKRWV�DUH�IURP�5HOHDVH���$�XQOHVV�RWKHUZLVH�QRWHG�
7KH�VWUXFWXUH�RI�WKLV�JXLGHERRN�PDWFKHV�WKH�VHWXS�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW��SURJUHVVLQJIURP�D�QHZ�5���LQVWDOODWLRQ�DOO�WKH�ZD\�WR�DQ�XSJUDGH��,I�\RX�XSJUDGH�IURP�DQ�ROGHU�UHOHDVHVHH�FKDSWHU�����8SJUDGH��IRU�PRUH�LQIRUPDWLRQ�
7KH�JUDSKLF�EHORZ�SURYLGHV�DQ�URXJK�RYHUYLHZ�DERXW�WKH�5���DXWKRUL]DWLRQ�F\FOH��)RU�DPRUH�GHWDLOHG�LQIRUPDWLRQ�RQ�WKH�DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�VHH�FKDSWHU����5��6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�
Authorizations ScopingPreparing the R/3 Environment
and Preparation for Go-LiveProduction
Phase
Upgrade +Ongoing
Development
ImplementationEvaluation Operations andContinuous Improvement
7KLV�JXLGH�SURYLGHV�\RX�ZLWK�WKH�IROORZLQJ�< 7KH�ELJ�SLFWXUH��VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ�5���< 7DVNV�\RX�QHHG�WR�SHUIRUP�GXULQJ�DQG�DIWHU�LQVWDOODWLRQ�RI�5���WR�IDFLOLWDWH�WKH�XVH�RI�WKH
3*< 7DVNV�\RX�QHHG�WR�SHUIRUP�DIWHU�DQ�XSJUDGH�RI�WKH�5���6\VWHP< $OO�WKH�HVVHQWLDO�VWHSV�IRU�VHFXULW\�LPSOHPHQWDWLRQ�XVLQJ�WKH�3*�DQG�&HQWUDO�8VHU
$GPLQLVWUDWLRQ< 7DVNV�WR�SUHSDUH�IRU�JRLQJ�OLYH< $SSHQGL[HV�ZLWK�WKH�PRVW�LPSRUWDQW�6$31HW�²�5���)URQWHQG�QRWHV�IRU�DXWKRUL]DWLRQV
DQG�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�
:KR�6KRXOG�5HDG�WKLV�%RRN"
7KLV�JXLGH�ZDV�GHVLJQHG�IRU�WKH�IROORZLQJ�SHRSOH�XVLQJ�WKH�3*�HLWKHU�LQ�DQ�LPSOHPHQWDWLRQSURMHFW�RU�DV�DQ�RQJRLQJ�UHIHUHQFH�< %DVLV�&RQVXOWDQWV�ZKR�LQVWDOO�5���DQG�VHW�XS�WKH�VHFXULW\�DW�FXVWRPHU�VLWHV
Introduction
How to Use this Guide
Release 4.6A/B xviixvii
< $SSOLFDWLRQ�&RQVXOWDQWV�ZKR�ZDQW�WR�VWDUW�XVLQJ�WKH�3*�DV�WKH�EDVLV�IRU�WKHLU�FXVWRPHUVHFXULW\�LPSOHPHQWDWLRQ
< &XVWRPHU�,7�DQG�KHOS�GHVN�SHUVRQQHO
+RZ�WR�8VH�WKLV�*XLGH
'HSHQGLQJ�RQ�\RXU�JHQHUDO�6$3�DQG�DXWKRUL]DWLRQ�VSHFLILF�NQRZOHGJH��VWDUW�ZLWK�WKHIROORZLQJ�VHFWLRQV�< ,I�\RX�KDYH�OLWWOH�RU�QR�NQRZOHGJH�FRQFHUQLQJ�VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ
5����VWDUW�ZLWK�FKDSWHU����5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�< (YHU\RQH��HYHQ�WKH�H[SHUWV��VKRXOG�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�
)DPLOLDULW\�ZLWK�WKLV�FKDSWHU�HQVXUHV�D�FRPSOHWH�VHWXS�EHIRUH�\RX�DFWXDOO\�VWDUW�ZRUNLQJZLWK�WKH�3*�
< ,I�\RX�KDYH�DOUHDG\�XVHG�WKH�3*�LQ�5HOHDVH����)����*����+����$����%����$�RU����%�ZHVWURQJO\�UHFRPPHQG�WKDW�\RX�UHDG�WKH�FKDSWHU�:KDWªV�1HZ�LQ�5HOHDVH�����DQG�WKHDSSURSULDWH�VHFWLRQ�LQ�FKDSWHU�����8SJUDGH��,Q�WKLV�FKDSWHU��ZH�GLVFXVV�WKH�VWHSV�WR�EHSHUIRUPHG�EHIRUH�\RX�FRQWLQXH�ZRUNLQJ�ZLWK�WKH�3*�DIWHU�DQ�5���6\VWHP�XSJUDGH��:HSURYLGH�LQIRUPDWLRQ�IRU�D�VPRRWK�WUDQVLWLRQ�WR�\RXU�QH[W�UHOHDVH�
< 5HDG�FKDSWHUV��²��DW�OHDVW�RQFH�IRU�LQIRUPDWLRQ�UHODWHG�WR�WKH�LPSOHPHQWDWLRQ�RI�VHFXULW\DQG�XVLQJ�WKH�3URILOH�*HQHUDWRU��$IWHU�WKDW��\RX�FDQ�EURZVH�WKH�FKDSWHUV�RQ�SHUIRUPLQJVSHFLILF�WDVNV�
< %HIRUH�WUDQVSRUWLQJ�DFWLYLW\�JURXSV��UHDG�FKDSWHU����3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�FDUHIXOO\�
< &KDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�KHOSV�VROYH�RQJRLQJ�DXWKRUL]DWLRQ�SUREOHPV�RQFH\RX�JR�OLYH�
&HUWDLQ�WHUPLQRORJ\��XVHU�LQIRUPDWLRQ��DQG�VSHFLDO�LFRQV�DUH�XVHG�WKURXJKRXW�WKLV�JXLGH�7KH�IROORZLQJ�VHFWLRQV�H[SODLQ�KRZ�WR�LGHQWLI\�DQG�XVH�WKHVH�KHOSIXO�IHDWXUHV�
&RQYHQWLRQV
,Q�WKH�WDEOH�EHORZ��\RX�ZLOO�ILQG�VRPH�RI�WKH�WH[W�FRQYHQWLRQV�XVHG�WKURXJKRXW�WKLV�JXLGH�
&ROXPQ�7LWOH &ROXPQ�7LWOH
6DQV�VHULI�LWDOLF 6FUHHQ�QDPHV�RU�RQ�VFUHHQ�REMHFWV��EXWWRQV�ILHOGV��VFUHHQ�WH[W��HWF��
Monospace 8VHU�LQSXW��WH[W�WKH�XVHU�W\SHV�YHUEDWLP�
1DPH��→��1DPH� 0HQX�VHOHFWLRQ�1DPH��LV�WKH�PHQX�QDPH�DQG�1DPH��LV�WKH�LWHP�RQ�WKH�PHQX
Introduction
Conventions
Authorizations Made Easyxviiixviii
6DPSOH�5���5HOHDVH�����6FUHHQ
♦�$SSOLFDWLRQ�WRROEDU�
7KH�VFUHHQVKRWV�VKRZQ�LQ�WKLV�JXLGH�DUH�EDVHG�RQ�IXOO�XVHU�DXWKRUL]DWLRQ��6$3B$//��'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��VRPH�RI�WKH�EXWWRQV�RQ�\RXU�DSSOLFDWLRQ�WRROEDU�PD\QRW�EH�DYDLODEOH�
♣�:RUNSODFH�PHQX�
'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��\RXU�ZRUNSODFH�PHQX�PD\�ORRN�GLIIHUHQW�IURPVFUHHQVKRWV�LQ�WKLV�JXLGH�ZKLFK�DUH�EDVHG�RQ�6$3B$//��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUGPHQX�EXWWRQV�SURYLGH�GLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�
,Q�WKLV�JXLGHERRN�\RX�OHDUQ�KRZ�WR�EXLOG�XVHU�PHQXV�
1RWH��,Q�WKLV�JXLGHERRN��ZH�VKRZ�WKH�WHFKQLFDO�QDPHV�RI�HDFK�WUDQVDFWLRQ��7R�PDWFK�RXUVHWWLQJV��FKRRVH�([WUDV�→�6HWWLQJV�DQG�VHOHFW�6KRZ�WHFKQLFDO�QDPHV�
Menu Bar
Screen Title
♦ Application Toolbar
♣ Workplace Menu
Status Bar
Standard Toolbar
User menu
SAP standard menu
Workplace
Introduction
Conventions
Release 4.6A/B xixxix
6SHFLDO�,FRQV
7KURXJKRXW�WKLV�JXLGH�VSHFLDO�LFRQV�LQGLFDWH�LPSRUWDQW�PHVVDJHV��%HORZ�DUH�EULHIH[SODQDWLRQV�RI�HDFK�LFRQ�
([HUFLVH�FDXWLRQ�ZKHQ�SHUIRUPLQJ�WKLV�WDVN�RU�VWHS��$Q�H[SODQDWLRQ�RI�ZK\�\RX�VKRXOG�EHFDUHIXO�LV�LQFOXGHG�
7KLV�LQIRUPDWLRQ�KHOSV�\RX�XQGHUVWDQG�WKH�WRSLF�LQ�JUHDWHU�GHWDLO��,W�LV�QRW�QHFHVVDU\�WRNQRZ�WKLV�LQIRUPDWLRQ�WR�SHUIRUP�WKH�WDVN�
7KHVH�PHVVDJHV�SURYLGH�KHOSIXO�KLQWV�DQG�VKRUWFXWV�WR�PDNH�\RXU�ZRUN�IDVWHU�DQG�HDVLHU�
Introduction
Conventions
Authorizations Made Easyxx xx
xxi
:KDW·V�1HZ�LQ�5HOHDVH����
&RQWHQWV
Overview ..................................................................................................................xxii
User Role Templates...............................................................................................xxii
Flexible User Menus ...............................................................................................xxii
Composite Activity Groups...................................................................................xxiv
User Groups ...........................................................................................................xxiv
Central User Administration .................................................................................xxiv
What’s New in Release 4.6
Overview
Authorizations Made Easyxxiixxii
2YHUYLHZ
7KLV�FKDSWHU�SURYLGHV�D�EULHI�GHVFULSWLRQ�RI�WKH�QHZ�IXQFWLRQDOLW\�LQ�DXWKRUL]DWLRQ�UHODWHGWRSLFV�LQ�WKH�5���5HOHDVH�����
)RU�VWHS�E\�VWHS�SURFHGXUHV�DQG�GHWDLOHG�LQIRUPDWLRQ�RQ�VSHFLILF�WRSLFV��SOHDVH�VHH�WKHDSSURSULDWH�FKDSWHUV��DV�UHIHUHQFHG�
)RU�WKH�ODWHVW�LQIRUPDWLRQ��\RX�VKRXOG�DOZD\V�FKHFN�WKH�UHOHDVH�QRWHV�IRU�5HOHDVH�����
8VHU�5ROH�7HPSODWHV
:LWK�5HOHDVH����$�6$3�GHOLYHUV�RYHU�����XVHU�UROH�WHPSODWHV��7KH�XVHU�UROH�WHPSODWHV�DUHSUHGHILQHG�DFWLYLW\�JURXSV�FRQVLVWLQJ�RI�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��<RX�KDYHWKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�< 8VH�DV�GHOLYHUHG< &RS\�DQG�FKDQJH�WKHP�WR�VXLW�\RXU�QHHGV< &UHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�IURP�VFUDWFK
2QFH�XVHUV�DUH�DVVLJQHG�WR�RQH�RU�PRUH�DFWLYLW\�JURXSV�DQG�ORJ�RQWR�WKH�V\VWHP��WKH\�VHHWKHLU�XVHU�PHQX��$V�VKRZQ�LQ�WKH�JUDSKLF�RQ�WKH�QH[W�SDJH��WKLV�XVHU�PHQX�FRQWDLQV�RQO\WKRVH�LWHPV��VXFK�DV�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��WKH\�QHHG�WR�SHUIRUP�WKHLUGDLO\�WDVNV��8VHUV�FDQ�DOVR�DGG�WKHLU�PRVW�IUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�)DYRULWHV�PHQXIRU�TXLFNHU�DFFHVV�
)OH[LEOH�8VHU�0HQXV
$V�RI�5HOHDVH����$��WKH�V\VWHP�GLVSOD\V�D�VSHFLILF�XVHU�PHQX�LQ�WKH�IRUP�RI�D�WUHH�DIWHU�XVHUVORJ�RQ�WR�WKH�V\VWHP��VHH�JUDSKLF�RQ�QH[W�SDJH���7KLV�XVHU�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROHWHPSODWH�RU�DFWLYLW\�JURXS�WKH�XVHU�LV�DVVLJQHG�WR��8VHUV�QR�ORQJHU�KDYH�WR�QDYLJDWH�WKURXJKXQQHFHVVDU\�5���IXQFWLRQV�IRU�ZKLFK�WKH\�KDYH�QR�DXWKRUL]DWLRQ��7KH�FRPSDQ\�PHQX�LV�QRORQJHU�DYDLODEOH�DV�RI�5HOHDVH����$�
:KHQ�D�IXQFWLRQ�LV�VHOHFWHG��LW�VWDUWV�LQ�WKH�VDPH�VHVVLRQ��UHSODFLQJ�WKH�XVHU�PHQX�ZLWK�WKHH[HFXWHG�IXQFWLRQ��:KHQ�D�XVHU�H[LWV�D�WUDQVDFWLRQ�RU�VWDUWV�D�QHZ�VHVVLRQ��WKH�VSHFLILF�XVHUPHQX�DXWRPDWLFDOO\�UHDSSHDUV�
$ORQJ�ZLWK�WKH�XVHU�PHQXV��\RX�FDQ�GLVSOD\�D�FRPSOHWH�YLHZ�RI�DOO�IXQFWLRQV�GHOLYHUHG�E\6$3�XVLQJ�WKH�6$3�VWDQGDUG�PHQX��7KLV�FRPSOHWH�YLHZ�GLVSOD\V�DXWRPDWLFDOO\�LI�QR�XVHU
What’s New in Release 4.6
Flexible User Menus
Release 4.6A/B xxiiixxiii
PHQXV�KDYH�EHHQ�GHILQHG�RU�LI�WKH�DGPLQLVWUDWRU�KDV�FKRVHQ�WKLV�RSWLRQ�ZKHQ�GHILQLQJ�QHZXVHU�PHQXV�
8VHU�0HQX�([DPSOH
+HUH�DUH�VRPH�H[DPSOHV�RI�GHOLYHUHG�DFWLYLW\�JURXSV�
%DVLV 0LVFHOODQHRXV
$XWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU &2��6DOHV�PDQDJHU
$XWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU &2��+HDG�RI�FRQWUROOLQJ
8VHU�DGPLQLVWUDWRU ),��$FFRXQWV�SD\DEOH�DFFRXQWDQW
6\VWHP�DGPLQLVWUDWRU ),��$FFRXQWV�UHFHLYDEOH�DFFRXQWDQW
%DFNJURXQG�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��:RUNHU
'DWDEDVH�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��2SHUDWRU
&XVWRPL]LQJ�SURMHFW�PHPEHU 00��$FFRXQWV�SD\DEOH�FOHUN
What’s New in Release 4.6
Composite Activity Groups
Authorizations Made Easyxxivxxiv
&RPSRVLWH�$FWLYLW\�*URXSV
$V�RI�5HOHDVH����$�LW�LV�SRVVLEOH�WR�FUHDWH�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�D�FROOHFWLRQ�RI�RWKHUDFWLYLW\�JURXSV��7KLV�DFWLYLW\�JURXS�LV�FDOOHG�D�FRPSRVLWH�DFWLYLW\�JURXS��&RPSRVLWH�DFWLYLW\JURXSV�FRQWDLQ�RQO\�RWKHU�DFWLYLW\�JURXSV�DQG�QR�DXWKRUL]DWLRQ�GDWD�
8VHU�*URXSV
,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��7KH�FDWHJRU\�8VHUJURXS�FDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ�
&HQWUDO�8VHU�$GPLQLVWUDWLRQ
,I�D�V\VWHP�JURXS�FRQVLVWV�RI�GLIIHUHQW�5���6\VWHPV�ZLWK�PXOWLSOH�FOLHQWV��WKHQ�WKH�VDPHXVHUV�DUH�FUHDWHG�VHYHUDO�WLPHV�LQ�HYHU\�FOLHQW�DQG�DVVLJQHG�WR�DFWLYLW\�JURXSV��&HQWUDO�8VHU$GPLQLVWUDWLRQ�LV�GHVLJQHG�WR�FDUU\�RXW�WKHVH�WDVNV�LQ�D�FHQWUDO�V\VWHP�DQG�WKHQ�GLVWULEXWHWKLV�GDWD�WR�DOO�V\VWHPV�LQ�WKH�V\VWHP�JURXS�
7KH�*OREDO�8VHU�0DQDJHU�SURYLGHV�WKH�V\VWHP�DGPLQLVWUDWRU�ZLWK�DQ�RYHUYLHZ�RI�WKH�XVHUV�H[LVWLQJ�XVHU�JURXSV��WKH�V\VWHPV�LQ�WKH�V\VWHP�JURXS��DQG�WKH�DFWLYLW\�JURXSV��%\�VLPSO\XVLQJ�GUDJ�DQG�GURS��WKH�V\VWHP�DGPLQLVWUDWRU�FDQ�PDNH�FKDQJHV�LQ�WKH�RYHUYLHZ��7KHVHFKDQJHV�WDNH�HIIHFW�DIWHU�GLVWULEXWLRQ�WR�GHSHQGHQW�V\VWHPV�
1–1
&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH
$XWKRUL]DWLRQ�&RQFHSW
&RQWHQWV
Overview ..................................................................................................................1–2
The Authorization Concept ....................................................................................1–4
SAP* and DDIC Users .............................................................................................1–8
What Is the Profile Generator? ..............................................................................1–9
What Is an Activity Group? ..................................................................................1–12
R/3 Tools for Security Implementation ...............................................................1–14
Case Study: Security Strategy in a Three-System Environment .....................1–15
Setting Up the Authorization Administrators.....................................................1–19
Policies and Procedures ......................................................................................1–21
Auditing Requirements ........................................................................................1–24
��
Chapter 1: R/3 System Security and the Authorization Concept
Overview
Authorizations Made Easy1–2
2YHUYLHZ
,Q�WKLV�FKDSWHU�ZH�H[SODLQ�WKH�VHWXS�DQG�PDLQWHQDQFH�RI�WKH�5���DXWKRUL]DWLRQ�FRQFHSWWKURXJK�WKH�FRPSOHWH�5���OLIHF\FOH�
7KH�JUDSKLF�EHORZ�LOOXVWUDWHV�WKH�5���DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�LQ�YDULRXVVWDJHV�RI�WKH�LPSOHPHQWDWLRQ�
Description ofauth. concept
Info gathering
Strategy,Definition
SU25Upgrade
Authorizations Scoping Preparing the R/3 Environmentand Preparation for Go-Live
ProductionPhase
Upgrade +Ongoing
Development
Setting upthe profilegenerator
Roadmap,+ structure
Q&Adb (4.6B)
Authorizationlist (AL.xls)
Preparation for Going live,Transporting (AG, user,templates,…)
User role templates
Setting up ALE
ASAP
Setting up Central User Admnistration
Global usermanager
IMG
SU25 First installation
3 methods of usinguser role templates: - Use as is - Copy + change - Create own
Description how to workwith user role templates (AG)(which exists, how to use,customizing, creating, etc.)
Upgrade
3.x-4.x Õ 4.6
Miscellaneous
Tips & Troubleshoot.
Infosystem.
SAPNet -R/3Frontend notes (formerly OSS)
Useradmin.
R/3Users
ImplementationEvaluation Operations andContinuous Improvement
SecurityAudit
7RROV�WR�6XSSRUW�WKH�5���$XWKRUL]DWLRQ�&\FOH
7KH�JXLGHERRN�LV�GLYLGHG�LQWR�IRXU�VHSDUDWH�SKDVHV�
< $XWKRUL]DWLRQ�6FRSLQJ��FKDSWHU������< 3UHSDULQJ�WKH�5���(QYLURQPHQW�DQG�3UHSDUDWLRQ�IRU�*R�/LYH��FKDSWHU�����������������������������< 3URGXFWLRQ�3KDVH���FKDSWHU����������������< 8SJUDGH�DQG�2QJRLQJ�'HYHORSPHQW��FKDSWHU����
:H�EHJLQ�ZLWK�WKH�5���DXWKRUL]DWLRQ�FRQFHSW�DQG�WKH�DXWKRUL]DWLRQ�GHVLJQ�VR�\RX�FDQ�PHHWUHTXLUHPHQWV�VXFK�DV�PD[LPXP�VHFXULW\��HDV\�XVHU�PDLQWHQDQFH��DQG�VXIILFLHQW�SULYLOHJHVIRU�HQG�XVHUV�WR�IXOILOO�WKHLU�MRE�GXWLHV��7KH�DXWKRUL]DWLRQ�FRQFHSW�GHILQHV�WKH�IXQFWLRQV�WR�EHFDUULHG�RXW�LQ�YDULRXV�RUJDQL]DWLRQDO�XQLWV�E\�SHRSOH�LQ�VSHFLILF�SRVLWLRQV��7KH�FRQFHSW�DOVRH[WHQGV�WKH�5���RQOLQH�GRFXPHQWDWLRQ�RQ�DXWKRUL]DWLRQV�DQG�SURILOHV�UHTXLUHG�IRU�WKHYDULRXV�HQWHUSULVH�DUHDV�
,PSOHPHQWLQJ�D�PXOWLOHYHO�FOLHQW�VHUYHU�HQYLURQPHQW�RQ�:$1V�SURYLGHV�JUHDW�IOH[LELOLW\�%XW��LQ�WKLV�HQYLURQPHQW��KLJKO\�VHQVLWLYH�GDWD�DQG�SURJUDPV�DUH�DW�D�JUHDWHU�ULVN�RI�EHLQJORVW��PDQLSXODWHG��DQG�VSLHG�XSRQ�WKDQ�LQ�D�FRQYHQWLRQDO�PDLQIUDPH�HQYLURQPHQW��(YHQZLWK�ORFDO�RSHUDWLRQ��WKLV�ULVN�DSSOLHV�WR�DOO�WKUHH�OD\HUV��3UHVHQWDWLRQ��$SSOLFDWLRQ��DQG'DWDEDVH��DQG�EHFRPHV�HYHQ�PRUH�DFXWH�WKDQ�:$1V�
Chapter 1: R/3 System Security and the Authorization Concept
Overview
Release 4.6A/B1–3
7KH�IROORZLQJ�JUDSKLF�VKRZV�KRZ�5���FRYHUV�WKH�DVSHFWV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\�
FRYHUHG�LQ�
$XWKRUL]DWLRQV�0DGH�(DV\
$XWKRUL]DWLRQ�&RQFHSW�LQ�5��� 'DWD�SURWHFWLRQ�
DW�GDWDEDVH�OHYHO
3URWHFWLRQ�DW�FRPPXQLFDWLRQ�OHYHO
,QWHJULW\�FKHFN
$FFHVV�SURWHFWLRQ
'DWD�EDFNXS
5
5
SAP SAP
'DWD�3URWHFWLRQ�DQG�6HFXULW\
7R�PHHW�WKH�KLJK�GHPDQGV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\��6$3�SURYLGHV�WKH�IROORZLQJ�5��VHFXULW\�PHFKDQLVPV�< $XWKRUL]DWLRQ�FRQFHSW��WKLV�JXLGHERRN�GLVFXVVHV�DQ�DXWKRUL]DWLRQ�GHVLJQ�XVLQJ�WKH
3URILOH�*HQHUDWRU�< $FFHVV�SURWHFWLRQ�DQG�DXWKHQWLFDWLRQ�RXWVLGH�RI�5����LQFOXGLQJ�DXWKRUL]DWLRQV�EHWZHHQ
:HE�EDVHG�DSSOLFDWLRQV�DQG�5����QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 3URWHFWLRQ�DW�QHWZRUN�FRPPXQLFDWLRQ�OHYHO��QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 'DWD�SURWHFWLRQ�DW�GDWDEDVH�OHYHO��QRW�GLVFXVVHG�LQ�WKH�JXLGH�
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept
Authorizations Made Easy1–4
7KH�$XWKRUL]DWLRQ�&RQFHSW
7KH�FRQFHSW�RI�DXWKRUL]DWLRQV�LQ�WKH�5���6\VWHP�LQFOXGHV�WKH�IROORZLQJ�< 3URILOH�*HQHUDWRU< /RFNLQJ�DQG�XQORFNLQJ�WUDQVDFWLRQV< /RFNHG�UHFRUGV< 6WUXFWXUDO�DXWKRUL]DWLRQV��1RW�GLVFXVVHG�LQ�WKLV�YHUVLRQ��VHH�$XWKRUL]DWLRQV�0DGH�(DV\
JXLGHERRN�����$�%�IRU�LQIRUPDWLRQ��< 'DWD�HQFU\SWLRQ��QRW�GLVFXVVHG�LQ�WKLV�ERRN�< /RFNLQJ�V\VWHP�IRU�FKDQJHV
7KH�5���DXWKRUL]DWLRQ�FRQFHSW�SHUPLWV�WKH�DVVLJQPHQW�RI�JHQHUDO�DQG�RU�ILQHO\�GHWDLOHGXVHU�DXWKRUL]DWLRQV��7KHVH�DVVLJQPHQWV�FDQ�UHDFK�GRZQ�WR�WKH�WUDQVDFWLRQ��ILHOG��DQG�ILHOGYDOXH�OHYHO��7KHVH�DXWKRUL]DWLRQV�DUH�FHQWUDOO\�DGPLQLVWHUHG�LQ�XVHU�PDVWHU�UHFRUGV�DQG�PRVWDOORZ�WKH�KDQGOLQJ�RI�FHUWDLQ�5���FRPSRQHQWV�DSSOLFDEOH�WR�VSHFLILF�RSHUDWLRQV��$FWLRQV�E\�DXVHU�PD\�UHTXLUH�VHYHUDO�DXWKRUL]DWLRQV��)RU�H[DPSOH��WR�FKDQJH�D�PDWHULDO�PDVWHU�UHFRUG�DXWKRUL]DWLRQV�DUH�UHTXLUHG�IRU�WKH�< 7UDQVDFWLRQ�´FKDQJHµ< 6SHFLILF�PDWHULDO< *HQHUDO�DXWKRUL]DWLRQ�WR�ZRUN�ZLWKLQ�WKH�FRPSDQ\�FRGH
7KH�UHVXOWLQJ�UHODWLRQVKLSV�FDQ�EHFRPH�YHU\�FRPSOH[��7R�PHHW�WKHVH�UHTXLUHPHQWV��WKH�5��DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�LPSOHPHQWHG�DV�D�IRUP�RI�SVHXGR�REMHFW�RULHQWHG�FRQFHSWZLWK�FRPSOHWH�DXWKRUL]DWLRQ�REMHFWV��(DFK�DXWKRUL]DWLRQ�REMHFW�LV�D�FRPELQDWLRQ�RIDXWKRUL]DWLRQ�ILHOGV��$Q�DXWKRUL]DWLRQ�DOZD\V�UHIHUV�WR�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�FDQFRQWDLQ�LQWHUYDOV�IRU�WKH�ILHOG�YDOXHV��$XWKRUL]DWLRQ�FKHFNV�SURWHFW�WKH�IXQFWLRQV�RU�REMHFWV\RX�FKRRVH��6WDQGDUG�GHOLYHUHG�5���KDV�DXWKRUL]DWLRQ�FKHFNV�HPEHGGHG�LQ�WKH�SURJUDPORJLF��3URJUDPPHUV�KDYH�WR�GHFLGH�ZKLFK�DVSHFWV�RI�WKHLU�SURJUDPPHG�IXQFWLRQDOLW\�VKRXOGEH�FKHFNHG�DQG�KRZ�WKH�FKHFN�VKRXOG�EH�FRQGXFWHG�
$XWKRUL]DWLRQ�DGPLQLVWUDWRUV�FUHDWH�DXWKRUL]DWLRQV�WKDW�DUH�DVVLJQHG�WR�XVHUV�LQ�FROOHFWLRQVFDOOHG�SURILOHV��7KH�3URILOH�*HQHUDWRU��3*��XVXDOO\�JHQHUDWHV�DXWKRUL]DWLRQV�DQGDXWKRUL]DWLRQ�SURILOHV��DOWKRXJK�DXWKRUL]DWLRQV�FDQ�DOVR�EH�PDQXDOO\�LQVHUWHG�LQWR�D�SURILOH�
7KH�IROORZLQJ�JUDSKLF�VKRZV�WKH�DXWKRUL]DWLRQ�FRPSRQHQWV�DQG�H[SODLQV�WKHLU�UHODWLRQVKLS�
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept
Release 4.6A/B1–5
)�,
��/RQJ�WH[W��7HFKQ��QDPH
��)LHOG��)LHOG�YDOXH
*HQHUDWHG�IURP�3*
-RKQ�([DPSOH�6$3�����
$P\�$Q\ZKHUH�6$3�����
+�5
2EMHFW�&ODVV $XWKRUL]DWLRQ2EMHFW
$XWKRUL]DWLRQ 3URILOH 8VHU
��/RQJ�WH[W��7HFKQ��QDPH
��/RQJ�WH[W��7HFKQ��QDPH
*HQHUDWHG�IURP�3*
��)LHOG��)LHOG�YDOXH
��)LHOG��)LHOG�YDOXH
��)LHOG��)LHOG�YDOXH
6$3�$XWKRUL]DWLRQ�&RQFHSW
$XWKRUL]DWLRQ�2EMHFW
$V�VKRZQ�LQ�WKH�JUDSKLF�´6$3�$XWKRUL]DWLRQ�&RQFHSWµ�DERYH��REMHFWV�DOORZ�FRPSOH[�XVHUDXWKRUL]DWLRQ�FKHFNV��$Q�DXWKRUL]DWLRQ�REMHFW�ZRUNV�DV�D�WHPSODWH�IRU�D�WR�EH�GHILQHGDXWKRUL]DWLRQ�DQG�FRQWDLQV�D�PD[LPXP�RI�WHQ�ILHOGV�SHU�REMHFW��8VHUV�PD\�RQO\�FRQGXFW�DQDFWLYLW\�LI�WKH\�VDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKH�DXWKRUL]DWLRQ�GHILQHG�RQ�DVSHFLILF�DXWKRUL]DWLRQ�REMHFW�
$XWKRUL]DWLRQ�REMHFWV�DUH�JURXSHG�LQ�DQ�REMHFW�FODVV��VXFK�DV�)LQDQFLDO�$FFRXQWLQJ�RU+XPDQ�5HVRXUFHV��$XWKRUL]DWLRQ�REMHFWV�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→$%$3�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�2EMHFWV��%HFDXVHDXWKRUL]DWLRQ�REMHFWV�DUH�FOLHQW�LQGHSHQGHQW�DQG�GHILQHG�LQ�WKH�$%$3�:RUNEHQFK�GHYHORSHUV�DQG�SURJUDPPHUV�DUH�JHQHUDOO\�UHVSRQVLEOH�IRU�FUHDWLQJ�QHZ�DXWKRUL]DWLRQREMHFWV�
&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQG�ZDQW�WR�LQFOXGH$87+25,7<�&+(&.�FDOOV�RU�QHZ�DXWKRUL]DWLRQ�REMHFWV��<RX�FDQ�RQO\�FKDQJH�RU�GHOHWHDXWKRUL]DWLRQ�REMHFWV�DGGHG�E\�\RXU�FRPSDQ\��5���DXWKRUL]DWLRQ�REMHFWV�PD\�QRW�EH�GHOHWHGRU�FKDQJHG��7R�FKDQJH�DQ�REMHFW��\RX�PXVW�ILUVW�GHOHWH�DOO�DXWKRUL]DWLRQV�ZLWK�ZKLFK�LW�LVDVVRFLDWHG�
$Q�$87+25,7<�&+(&.�LV�DQ�$%$3�FRPPDQG�
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept
Authorizations Made Easy1–6
$XWKRUL]DWLRQ�2EMHFW�)LHOGV
$XWKRUL]DWLRQ�ILHOGV�IRU�DQ�REMHFW�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→�$%$3'HYHORSPHQW�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�)LHOGV�
7KH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�DUH�OLQNHG�WR�GDWD�HOHPHQWV�LQ�WKH�6$3�$%$3'LFWLRQDU\��7KH�SHUPLVVLEOH�YDOXHV�FRQVWLWXWH�DQ�DXWKRUL]DWLRQ��:KHQ�DQ�DXWKRUL]DWLRQFKHFN�WDNHV�SODFH��WKH�V\VWHP�FKHFNV�WKH�YDOXHV�\RX�KDYH�VSHFLILHG�LQ�DQ�DXWKRUL]DWLRQDJDLQVW�WKRVH�UHTXLUHG�WR�FDUU\�RXW�WKH�DFWLRQ��8VHUV�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH\VDWLVI\�WKH�FRQGLWLRQV�IRU�HYHU\�ILHOG�GHILQHG�IRU�D�VSHFLILF�DXWKRUL]DWLRQ�REMHFW�
8VLQJ�WKH�DXWKRUL]DWLRQ�PDLQWHQDQFH�IXQFWLRQV��GHILQH�DOO�DXWKRUL]DWLRQ�ILHOGV�LQ�WKH�V\VWHPGHYHORSPHQW�HQYLURQPHQW��&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQGWKH�QHZ�V\VWHP�HOHPHQWV�DUH�VXEMHFWHG�WR�DXWKRUL]DWLRQ�FKHFNV�
$XWKRUL]DWLRQV
$Q�DXWKRUL]DWLRQ�DOORZV�\RX�WR�FDUU\�RXW�DQ�5���WDVN�EDVHG�RQ�D�VHW�RI�ILHOG�YDOXHV�LQ�DQDXWKRUL]DWLRQ�REMHFW��(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�H[DFWO\�RQH�DXWKRUL]DWLRQ�REMHFW�DQGGHILQHV�WKH�SHUPLWWHG�YDOXH�UDQJH�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�RI�WKLV�DXWKRUL]DWLRQ�REMHFW�$XWKRUL]DWLRQV�DUH�XVHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�DV�SURILOHV�
%\�WKHPVHOYHV��DXWKRUL]DWLRQV�GR�QRW�H[LVW��7KH\�RQO\�KDYH�PHDQLQJ�LQVLGH�D�SURILOH�
)LHOG 9DOXH
&XVWRPHU�W\SH��&8677<3(�
$FWLYLW\��$&797� ��
([SODQDWLRQ�� � �DOO�SRVVLEOH�YDOXHV����� �GLVSOD\
$XWKRUL]DWLRQV�DUH�XVHG�WR�VSHFLI\�SHUPLWWHG�YDOXHV�IRU�WKH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�7KHUH�PD\�EH�RQH�RU�PRUH�YDOXHV�IRU�HDFK�ILHOG��$XWKRUL]DWLRQV�DOORZ�\RX�WR�GHWHUPLQH�WKHQXPEHU�RI�VSHFLILF�YDOXHV�RU�YDOXH�UDQJHV�IRU�D�ILHOG��$OO�YDOXHV�RU�HPSW\�ILHOGV�FDQ�EHSHUPLVVLEOH�YDOXHV��&KDQJHV�DIIHFW�DOO�XVHUV�ZKRVH�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKDWDXWKRUL]DWLRQ��7KH�5���DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�PDLQWDLQ�DXWKRUL]DWLRQVDXWRPDWLFDOO\��XVLQJ�WKH�3*��RU�PDQXDOO\��2QFH�WKH�DXWKRUL]DWLRQ�LV�DFWLYDWHG��FKDQJHV�DIIHFWDOO�XVHUV�ZKLFK�FRQWDLQ�WKH�SURILOH�ZLWK�WKH�DFWLYDWHG�DXWKRUL]DWLRQ�
2QFH�JHQHUDWHG��DXWKRUL]DWLRQV�DQG�SURILOHV�FUHDWHG�ZLWK�WKH�3*�DUH�DXWRPDWLFDOO\DFWLYDWHG��,I�\RX�PDQXDOO\�FUHDWH�DQG�PDLQWDLQ�DXWKRUL]DWLRQV�DQG�SURILOHV��\RX�PXVW�DOVRPDQXDOO\�DFWLYDWH�WKHP��*HQHUDWHG�SURILOHV�DQG�DXWKRUL]DWLRQV�FDQQRW�EH�PDLQWDLQHGPDQXDOO\�ZLWK�WKH�FRQYHQWLRQDO�PDLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68����+RZHYHU��ZHGR�QRW�UHFRPPHQG�WKH�XVH�RI�WKHVH�WUDQVDFWLRQV�IRU�SURILOH�DQG�XVHU�DGPLQLVWUDWLRQDQ\PRUH��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�
Chapter 1: R/3 System Security and the Authorization Concept
The Authorization Concept
Release 4.6A/B1–7
$XWKRUL]DWLRQ�3URILOHV
8VHU�DXWKRUL]DWLRQV�DUH�QRW�GLUHFWO\�DVVLJQHG�ZLWK�WKH�3*�WR�WKH�XVHU�PDVWHU�UHFRUGV�,QVWHDG��WKHVH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�DV�DXWKRUL]DWLRQ�SURILOHV��7KH�DXWKRUL]DWLRQDGPLQLVWUDWRU�FDQ�FUHDWH�DXWKRUL]DWLRQ�SURILOHV�PDQXDOO\�RU�DXWRPDWLFDOO\�
&KDQJHV�DIIHFW�DOO�XVHUV�WR�ZKRP�WKLV�SURILOH�LV�DVVLJQHG�DQG�WDNH�HIIHFW�RQO\�ZKHQ�WKH�XVHUORJV�RQ��8VHUV�ZKR�DUH�ORJJHG�RQ�ZKHQ�WKH�FKDQJH�WDNHV�SODFH�UHPDLQ�XQDIIHFWHG�GXULQJWKHLU�FXUUHQW�VHVVLRQ��EXW�ZKHQ�WKH\�ORJ�RQ�DJDLQ��WKHLU�SURILOH�FKDQJHV�DFFRUGLQJO\��$�XVHU·VDXWKRUL]DWLRQV�DUH�ORDGHG�LQWR�WKH�XVHU�EXIIHU�RQO\�ZKHQ�WKH\�ORJ�RQ�
<RX�FDQQRW�XVH�WKH�DXWKRUL]DWLRQ�SURILOH�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�PDQXDOO\PDQLSXODWH�WKH�3*�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV��$OWKRXJK�WHFKQLFDOO\�SRVVLEOH��QHYHUFUHDWH�D�SURILOH�WKDW�FRQWDLQV�ERWK�PDQXDOO\�DQG�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV�RUSURILOHV��:H�QR�ORQJHU�UHFRPPHQG�WKH�XVH�RI�WUDQVDFWLRQ�68���IRU�SURILOH�DQG�XVHUDGPLQLVWUDWLRQ��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�
1DPLQJ�&RQYHQWLRQ�IRU�$XWKRUL]DWLRQ�3URILOHV
$XWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�D�7�PD\�FRQWDLQ�FULWLFDO��6B86(5 ��DXWKRUL]DWLRQREMHFWV��$OVR��XVH�WKH�3*�WR�H[FOXGH�IXUWKHU�DXWKRUL]DWLRQ�REMHFWV��IRU�H[DPSOH��+5�GDWD�IURP�WKH�SURILOH�
1RWH�WKDW�ZH�DUH�WDONLQJ�DERXW�DXWKRUL]DWLRQ�SURILOHV�QRW�DFWLYLW\�JURXSV�
:KHQ�\RX�ILUVW�VDYH�WKH�DXWKRUL]DWLRQ�SURILOHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH�7KH�V\VWHP�SURSRVHV�D�QDPH�IRU�WKH�SURILOH��KRZHYHU��RQO\�WKH�ILUVW����FKDUDFWHUV��WKHSURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHV�JHQHUDWHG�GHSHQGV�RQ�WKHQXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXP�RI�����DXWKRUL]DWLRQV�ILW�LQWRD�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ�����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,WKDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKH�SURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV��SRVLWLRQV���DQG�����DUH�XVHG�DV�D�FRXQWHU�
7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�SURILOHV�DQG�WKRVH�SURILOHV�VXSSOLHG�E\�6$3�\RX�VKRXOG�QRW�XVH�DQ\�QDPH�WKDW�KDV�DQ�XQGHUVFRUH�LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QRRWKHU�UHVWULFWLRQV�RQ�WKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�WR�QRWH���������7KHUHIRUH��LI\RXU�FRPSDQ\�KDV�LWV�RZQ�QDPLQJ�FRQYHQWLRQV��\RX�DUH�DOORZHG�WR�RYHUZULWH�WKHSURSRVHG�QDPH�
7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��:KHQ�PRUH�WKDQRQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW��WKH�ODVW�WZR�SODFHV�DUH�XVHG�DV�D�FRXQWHU��%DVHGRQ�WKH�QDPH�IRU�WKH�DXWKRUL]DWLRQ�SURILOH��WKH�WHFKQLFDO�QDPHV�IRU�WKH�DXWKRUL]DWLRQV�WR�EHFUHDWHG�VWDUW�ZLWK�D�7�DQG�FRPSULVH�WKH�LQWHUQDO�QXPEHU�RI�WKH�DFWLYLW\�JURXS�DQG�WZR�HQGGLJLWV�LQ�WKH�UDQJH���²�����7������������LV�D�VDPSOH�DXWKRUL]DWLRQ�QDPH��
8VHU�0DVWHU�5HFRUGV
0DVWHU�UHFRUGV�HQDEOH�WKH�XVHU�WR�ORJ�RQ�WR�WKH�5���6\VWHP�DQG�DOORZ�OLPLWHG�DFFHVV�WR�WKHIXQFWLRQV�DQG�REMHFWV��7KH�XVHU�DGPLQLVWUDWRU�PDLQWDLQV�XVHU�PDVWHU�UHFRUGV�E\�FKRRVLQJ7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV�
Chapter 1: R/3 System Security and the Authorization Concept
SAP* and DDIC Users
Authorizations Made Easy1–8
$XWKRUL]DWLRQ�&KHFNV
7R�FRQGXFW�DQ�DXWKRUL]DWLRQ�FKHFN��WKLV�FKHFN�PXVW�EH�LQFOXGHG�LQ�WKH�WUDQVDFWLRQ·V�VRXUFHFRGH��'XULQJ�WKH�FKHFN��WKH�V\VWHP�FRPSDUHV�DXWKRUL]DWLRQ�SURILOH�YDOXHV��DVVLJQHG�E\�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU��WR�WKH�YDOXHV�QHHGHG�WR�FDUU\�RXW�D�SURJUDP�VSHFLILHG�DFWLRQ��$XVHU�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH�DXWKRUL]DWLRQ�FKHFN�LV�VXFFHVVIXO�IRU�HYHU\�ILHOG�LQWKH�DXWKRUL]DWLRQ�REMHFW�
$XWKRUL]DWLRQ�FKHFNV�DUH�WULJJHUHG�E\�WKH�$%$3�$87+25,7<�&+(&.�VWDWHPHQW��7KHSURJUDPPHU�VSHFLILHV�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�UHTXLUHG�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQILHOG��7KH�$87+25,7<�&+(&.�WKHQ�YHULILHV�LI�D�XVHU�KDV�DXWKRUL]DWLRQ�DQG�LI�WKLVDXWKRUL]DWLRQ�LV�IURP�WKH�XVHU�PDVWHU�UHFRUG��7KH�FKHFN�LV�VXFFHVVIXO�LI�DQ�DXWKRUL]DWLRQ�LVIRXQG�WKDW�FRQWDLQV�WKH�YDOXHV�VSHFLILHG�LQ�WKH�$87+25,7<�&+(&.�
:KHQ�5���WUDQVDFWLRQV�DUH�H[HFXWHG��VLQFH�WKH�WUDQVDFWLRQ�FDOOV�RWKHU�ZRUN�DUHDV�LQ�WKHEDFNJURXQG��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�RIWHQ�FKHFNHG��)RU�WKHVH�FKHFNV�WR�EHVXFFHVVIXO��WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��$XWKRUL]DWLRQ�FKHFNV�FDQ�EHGLVDEOHG�E\�VHWWLQJ�FKHFN�LQGLFDWRUV�LQ�WUDQVDFWLRQ�68���RU�E\�VZLWFKLQJ�RII�REMHFWV�JOREDOO\�
$FWLYDWLQJ�DQG�'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�LQ�7UDQVDFWLRQV
,W�LV�SRVVLEOH�WKDW�XVHUV�UHFHLYH�PRUH�DXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHGPDLQWHQDQFH�ORDG��$XWKRUL]DWLRQ�FKHFNV�DUH�FRQGXFWHG�ZKHUHYHU�WKH\�DUH�ZULWWHQ�LQWR�DWUDQVDFWLRQ·V�VRXUFH�FRGH��2QO\�E\�XVLQJ�WKH�3*�FDQ�FKHFN�LQGLFDWRUV�EH�VHW�WR�H[FOXGH�< &HUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRULW\�FKHFNV< 6SHFLILF�DXWKRUL]DWLRQ�FKHFNV�LQ�VSHFLILF�WUDQVDFWLRQV< $Q�DXWKRUL]DWLRQ�REMHFW�IURP�EHLQJ�FKHFNHG
$OO�RI�WKHVH�DGMXVWPHQWV�DUH�SRVVLEOH�ZLWKRXW�DOWHULQJ�WKH�SURJUDP�FRGH��3ULRU�WRDXWRPDWLFDOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOH��XVH�WKH�FKHFN�LQGLFDWRUV�WR�FRQWURO�ZKLFKREMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�DUH�GLVSOD\HG��6$3�GHOLYHUV�D�GHIDXOW�FKHFNLQGLFDWRU�VHWWLQJ�ZLWK�5����)RU�PRUH�LQIRUPDWLRQ�UHIHU�WR�FKDSWHU�����7LSV�DQG7URXEOHVKRRWLQJ��WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�
6$3 �DQG�'',&�8VHUV
'XULQJ�\RXU�5���LQVWDOODWLRQ��FOLHQWV�����������DQG�����DUH�FUHDWHG��,Q�FOLHQWV�����DQG�����WZR�VSHFLDO�XVHUV�DUH�GHILQHG��EXW�QR�VSHFLDO�XVHU�LV�FUHDWHG�LQ�FOLHQW������6LQFH�WKHVH�XVHUVKDYH�VWDQGDUG�QDPHV�DQG�SDVVZRUGV��\RX�QHHG�WR�VHFXUH�WKHVH�XVHUV�IURP�XQDXWKRUL]HGXVDJH��WKH�(DUO\:DWFK�DQG�&3,&�XVHUV�DUH�QRW�FRYHUHG�LQ�WKLV�ERRN��
7KH�WZR�VSHFLDO�5���XVHUV�DUH�< 6$3
'HILQHG�DV�WKH�VWDQGDUG�5���VXSHUXVHU��6$3 �GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG�5DWKHU��LW�
Chapter 1: R/3 System Security and the Authorization Concept
What Is the Profile Generator?
Release 4.6A/B1–9
� ,V�GHILQHG�LQ�WKH�V\VWHP�FRGH� +DV�D�GHIDXOW�SDVVZRUG��PASS�� +DV�XQOLPLWHG�V\VWHP�DFFHVV�DXWKRUL]DWLRQV
:KHQ�\RX�LQVWDOO�5����D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�LQ�FOLHQWV�����DQG�����ZLWK�WKHLQLWLDO�SDVVZRUG�06071992��6$3 �XVHU�PDVWHU�UHFRUG�GHDFWLYDWHV�6$3 ªV�VSHFLDOSURSHUWLHV��7R�SUHYHQW�6$3 �PLVXVH��FKDQJH�WKH�SDVVZRUG��:H�UHFRPPHQG��KRZHYHU�WKDW�\RX�GHDFWLYDWH�6$3 �DQG�GHILQH�\RXU�RZQ�VXSHUXVHU�
< '',&
7KLV�XVHU�LV�WKH�PDLQWHQDQFH�XVHU�IRU�WKH�$%$3�'LFWLRQDU\�DQG�VRIWZDUH�ORJLVWLFV��7KHXVHU�PDVWHU�UHFRUG�IRU�'',&�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����DQG�KDV�WKHGHIDXOW�SDVVZRUG�19920706��6\VWHP�FRGH�WHVWLQJ�DOORZV�'',&�VSHFLDO�SULYLOHJHV�IRUFHUWDLQ�RSHUDWLRQV��)RU�H[DPSOH��'',&�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�GXULQJ�DQXSJUDGH��7R�SUHYHQW�'',&�PLVXVH��FKDQJH�WKH�SDVVZRUG�
8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�6$3 �DQG�'',&�SDVVZRUGV�KDYHEHHQ�FKDQJHG��7KLV�UHSRUW�LV�UHVWULFWHG�WR�XVHUV�ZKR�EHORQJ�WR�WKH�XVHU�JURXS�683(5�ZLWKDFWLYLW\����DQG�FOLHQW�DGPLQLVWUDWLRQ�
:KDW�,V�WKH�3URILOH�*HQHUDWRU"
6$3·V�3URILOH�*HQHUDWRU��3*��KHOSV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FUHDWH��JHQHUDWH��DQGDVVLJQ�DXWKRUL]DWLRQ�SURILOHV��)LUVW�UHOHDVHG�ZLWK����*��WKH�3*�DFFHOHUDWHV�5��LPSOHPHQWDWLRQ�E\�VLPSOLI\LQJ�WKH�WDVN�RI�VHWWLQJ�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KHDGPLQLVWUDWRU�RQO\�QHHGV�WR�FRQILJXUH�WKH�FXVWRPHU�VSHFLILF�VHWWLQJV��WKH�3*�PDQDJHV�RWKHUWDVNV��VXFK�DV�VHOHFWLQJ�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�FRQVLGHUDWLRQ��7KH�3*�LV�IXOO\LQWHJUDWHG�ZLWK�5���DQG�LV�DYDLODEOH�RQ�DOO�5���VXSSRUWHG�SODWIRUPV��7KH�3*�UHSUHVHQWV�\HWDQRWKHU�LPSURYHPHQW�RI�6$3·V�WRRO�EDVHG�VXSSRUW�DQG�D�UHGXFWLRQ�LQ�5���LPSOHPHQWDWLRQWLPH�
7KH�3*�LV�DQ�DSSURDFK�WR�GHILQLQJ�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KH�DGPLQLVWUDWRU�QRORQJHU�XVHV�WKH�DXWKRUL]DWLRQ�REMHFWV�WR�GHILQH�WKH�DXWKRUL]DWLRQV�IRU�YDULRXV�XVHU�JURXSV�LQVWHDG��DXWKRUL]DWLRQ�SURILOHV�DUH�EXLOW�DURXQG�WKH�IXQFWLRQV�WR�EH�SHUIRUPHG�LQ�5����%DVHGRQ�WKH�IXQFWLRQV�VHOHFWHG��WKH�3*�SLFNV�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�DQG�JURXSV�WKHPLQ�D�QHZ�DXWKRUL]DWLRQ�SURILOH�
8VLQJ�IXQFWLRQV�WR�GHILQH�DXWKRUL]DWLRQ�SURILOHV�< 6SHHGV�XS�WKH�SURFHVV< 'HILQHV�DXWKRUL]DWLRQ�SURILOHV< 6LPSOLILHV�DGPLQLVWUDWRU�XVHU�FRPPXQLFDWLRQ��DOORZLQJ�ERWK�WKH�DGPLQLVWUDWRU�DQG
XVHUV�WR�XVH�WKH�VDPH�5���IXQFWLRQ�WHUPLQRORJ\
7R�XVH�WKH�3*��\RX�ILUVW�KDYH�WR�VHW�LW�XS��7KH�RQH�WLPH�VHW�XS�LQYROYHV�WKH�IROORZLQJ�VWHSV��� &KHFN�LI�WKH�6$3�5���6\VWHP�SDUDPHWHU�LV�VHW�FRUUHFWO\�WR�DFWLYH�
Chapter 1: R/3 System Security and the Authorization Concept
What Is the Profile Generator?
Authorizations Made Easy1–10
�� 8VH�68���WR�LQLWLDOL]H�WKH�WDEOHV�862%7B&�DQG�862%;B&��DQG�WKHQ�FXVWRPL]H�WKHP�LIGHVLUHG��
)RU�GHWDLOHG�LQIRUPDWLRQ��SOHDVH�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�
2QFH�WKH�3*�LV�VHW�XS��\RX�FDQ�ZRUN�ZLWK�LW��%HIRUH�ZRUNLQJ�ZLWK�ZLWK�WKH�3*��LW�LV�XVHIXO�WRXQGHUVWDQG�LWV�FRPSRQHQWV�
&RPSRQHQWV�RI�WKH�3URILOH�*HQHUDWRU
7KH�3*�KDV�WKH�IROORZLQJ�FRPSRQHQWV�
$FWLYLW\�*URXSV
$Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�5���WUDQVDFWLRQV��DXWKRUL]DWLRQV��DQG�DGGLWLRQDO�REMHFWV�<RX�FDQ�DVVLJQ�DQ�DFWLYLW\�JURXS�WR�DV�PDQ\�XVHUV�DV�\RX�ZDQW��<RX�FDQ�FUHDWH��GLVSOD\�FKDQJH��FRS\��DQG�WUDQVSRUW�DFWLYLW\�JURXSV�
&RPSRVLWH�$FWLYLW\�*URXSV
&RPSRVLWH�DFWLYLW\�JURXSV�DUH�PDGH�XS�RI�D�FROOHFWLRQ�RI�DFWLYLW\�JURXSV��7KH�XVHUV�DVVLJQHGWR�D�FRPSRVLWH�DFWLYLW\�JURXS�DUH�DXWRPDWLFDOO\�DGGHG�WR�WKH�DFWLYLW\�JURXSV�GXULQJ�DFRPSDULVRQ��&RPSRVLWH�DFWLYLW\�JURXSV�WKHPVHOYHV�GR�QRW�FRQWDLQ�DQ\�DXWKRUL]DWLRQ�GDWD�,QVWHDG�RI�KDYLQJ�WR�DVVLJQ�HDFK�XVHU�WR�HDFK�DFWLYLW\�JURXS��\RX�FDQ�VHW�XS�D�FRPSRVLWHDFWLYLW\�JURXS�DQG�WKHQ�DVVLJQ�WKH�XVHUV�WR�WKLV�JURXS�
'HULYHG�$FWLYLW\�*URXSV
<RX�FDQ�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH�ZKHQ�FUHDWLQJ�D�QHZ�RQH��7KH�V\VWHPWUDQVIHUV�WKH�WUDQVDFWLRQV�LQ�RQH�DFWLYLW\�JURXS�WR�D�QHZ�DFWLYLW\�JURXS³RQH�WKDW�UHPDLQVGHSHQGHQW�RQ�WKH�ILUVW��<RX�FDQ�GLVSOD\�WKH�KLHUDUFK\�RI�WKH�DFWLYLW\�JURXSV�WKDW�LQKHULWWUDQVDFWLRQV�IURP�HDFK�RWKHU�E\�FKRRVLQJ�$FWLYLW\�JURXS�→�:KHUH�XVHG�OLVW�
:LWK�DQ�DFWLYLW\�JURXS�GHULYHG�IURP�D�GLIIHUHQW�DFWLYLW\�JURXS��\RX�FDQQRW�HQWHUWUDQVDFWLRQV�GLUHFWO\��<RX�FDQQRW�UHVHW�WKH�GHILQLWLRQ�RI�WKH�LQLWLDO�DFWLYLW\�JURXS�IURP�ZKLFKWKH�GHULYHG�DFWLYLW\�JURXS�LQKHULWHG�LWV�WUDQVDFWLRQV��3DVVLQJ�RQ�WUDQVDFWLRQV�RQO\�UHIHUV�WRWKH�PHQX�VHOHFWLRQ�DQG�QRW�WR�WKH�DXWKRUL]DWLRQV��<RX�PXVW�PDLQWDLQ�DXWKRUL]DWLRQVVHSDUDWHO\�LQ�HDFK�DFWLYLW\�JURXS��WKHVH�DUH�QRW�SDVVHG�RQ��,W�LV�DOVR�SRVVLEOH�WR�WUDQVIHU�WKHDXWKRUL]DWLRQ�GDWD�RI�WKH�SUHYLRXV�DFWLYLW\�JURXS�WR�WKH�GHULYHG�DFWLYLW\�JURXS�DV�D�FRS\�
8VHU�$VVLJQPHQW
8VHUV�FDQ�EH�DVVLJQHG�WR�VLQJOH�DFWLYLW\�JURXSV�RU�WR�FRPSRVLWH�DFWLYLW\�JURXSV�ZKLFK�PRVWO\UHSUHVHQW�MRE�UROHV��8VHUV�WKDW�\RX�DVVLJQ�WR�DQ�DFWLYLW\�JURXS�PD\�H[HFXWH�WKH�WUDQVDFWLRQV�UHSRUWV��RU�DQ\�RWKHU�WDVN�LQ�WKH�DFWLYLW\�JURXS�ZLWK�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQV�
*HQHUDWLQJ�WKH�3URILOHV
7KH�DGPLQLVWUDWRU�FKRRVHV�WKH�VSHFLILF�PHQX�SDWKV�DQG�IXQFWLRQV�IRU�HDFK�XVHU�JURXS��7KLVVHOHFWLRQ�GHWHUPLQHV�WKH�5���DFWLYLWLHV�WKDW�XVHUV�LQ�HDFK�XVHU�JURXS�DUH�DXWKRUL]HG�WRSHUIRUP�
8VLQJ�WKH�VHOHFWHG�WUDQVDFWLRQ�FRGHV��WKH�3*�GHWHUPLQHV�WKH�DIIHFWHG�DXWKRUL]DWLRQ�REMHFWV�7R�VLPSOLI\�WKH�FUHDWLRQ�RI�VXEVHTXHQW�LQGLYLGXDO�DXWKRUL]DWLRQ�SURILOHV��5���FRQWDLQV
Chapter 1: R/3 System Security and the Authorization Concept
What Is the Profile Generator?
Release 4.6A/B1–11
GHIDXOW�YDOXHV�IRU�PDQ\�DXWKRUL]DWLRQ�ILHOGV�LQ�VSHFLILF�DXWKRUL]DWLRQ�REMHFWV��)RU�H[DPSOH�RQH�SRVVLEOH�DFFHVV�UHVWULFWLRQ�PLJKW�EH�WKH�GHIDXOW�YDOXH�'LVSOD\��OLPLWLQJ�WKH�XVHU�WRGLVSOD\�PRGH�RQ�FHUWDLQ�WUDQVDFWLRQV�
$GGLWLRQDOO\��WKH�3*�LGHQWLILHV�WKH�RUJDQL]DWLRQDO�OHYHOV�WKDW�SOD\�D�UROH�LQ�WKH�H[WUDFWHGDXWKRUL]DWLRQ�REMHFWV�DQG�FOHDUO\�GLVSOD\V�WKHVH�OHYHOV�IRU�WKH�DGPLQLVWUDWRU��7KHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�PD\�KDYH�WR�LQWHUYHQH�DQG�PDQXDOO\�GHILQH�WKH�OHYHOV�WR�ZKLFKWKH�XVHUV�QHHG�DFFHVV��IRU�H[DPSOH��WKH�FRPSDQ\�FRGH��
7KH�3*�WKHQ�SODFHV�WKH�VSHFLILHG�OHYHOV�LQ�WKH�DXWKRUL]DWLRQ�REMHFWV��$W�WKLV�SRLQW��D�ORW�RIDXWKRUL]DWLRQ�REMHFW�ILHOGV�IRU�WKH�QHZ�DXWKRUL]DWLRQ�SURILOH�KDYH�EHHQ�ILOOHG��KRZHYHU�WKHUHDUH�VWLOO�ILHOGV�WKDW�QHHG�WR�EH�PDLQWDLQHG��7KH�DXWKRUL]DWLRQ�REMHFWV�DUH�GLVSOD\HGKLHUDUFKLFDOO\�LQ�D�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�DGPLQLVWUDWRU�PD\�DGMXVW�WKHUHPDLQLQJ�YDOXHV��VXFK�DV�PDWHULDO�W\SH��RUGHU�W\SH��HWF�
:LWKLQ�WKLV�PDLQWHQDQFH�WUDQVDFWLRQ��WKH�DGPLQLVWUDWRU�FDQ�HDVLO\�QDYLJDWH�IURP�WKHRYHUYLHZ�VFUHHQ�WR�WKH�ORZHVW�GLVSOD\�OHYHO��WKH�DXWKRUL]DWLRQV�DQG�WKHLU�ILHOGV��DQG�GLUHFWO\DVVLJQ�WKH�YDOXHV��*HQHUDOO\��SHUPLVVLEOH�YDOXHV�FDQ�DOVR�EH�DVVLJQHG�DW�KLJKHU�OHYHOV��7KHIROORZLQJ�XWLOLWLHV�WR�VSHFLI\�WKH�YDOXHV�DUH�DYDLODEOH�DW�HYHU\�OHYHO�RI�WKH�KLHUDUFKLFDOGLVSOD\�< 9DOXH�VHOHFWLRQ�IURP�OLVWV< &KHFNER[HV�IRU�VLPSOH�DFWLYLW\�VHOHFWLRQ< 'HOHWH�DQG�FRS\�IXQFWLRQV
,I�DGPLQLVWUDWRUV�GHWHUPLQH�WKDW�QR�IXUWKHU�DXWKRUL]DWLRQ�UHVWULFWLRQV�DUH�QHFHVVDU\�RQ�DFHUWDLQ�OHYHO��E\�FKRRVLQJ�D�EXWWRQ��WKH�3*�ILOOV�LQ�WKH�UHPDLQLQJ�YDOXHV�
)LQDOO\��DQRWKHU�PHQX�LWHP�LQ�WKH�V\VWHP�DVVLJQV�WKH�XVHUV�WR�WKH�5���IXQFWLRQV��,Q�WKLVSURFHVV��WKH�3*�DXWRPDWLFDOO\�FRSLHV�DOO�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOHV�WR�WKH�XVHUPDVWHU�UHFRUG��2I�FRXUVH��XVHUV�FDQ�EH�DVVLJQHG�PXOWLSOH�VHOHFWLRQV��ZKLFK�PHDQV�WKDWFHUWDLQ�JHQHUDO�DXWKRUL]DWLRQV�QHHG�WR�EH�PDLQWDLQHG�RQO\�RQFH�DQG�DUH�DYDLODEOH�IRUDVVLJQPHQW�WR�DOO�V\VWHP�XVHUV�
,QWHJUDWLQJ�WKH�3*�LQ�5���DOVR�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�DFFHVV�WKH�GRFXPHQWDWLRQ�RQHYHU\�DXWKRUL]DWLRQ�REMHFW�GLUHFWO\�IURP�WKH�3*��)XUWKHUPRUH��WKH�3*�FDQ�OLVW�DOO�5��IXQFWLRQV�WKDW�FKHFN�D�VSHFLILF�DXWKRUL]DWLRQ�
5HTXLUHPHQWV�DQG�$YDLODELOLW\7KH�3*�UXQV�RQ�DOO�VXSSRUWHG�SODWIRUPV�DQG�KDV�EHHQ�DYDLODEOH�VLQFH�5HOHDVH����*�IRUJHQHUDO�FXVWRPHU�XVH��6WDUWLQJ�ZLWK�5HOHDVH������LW�LV�DOUHDG\�DFWLYDWHG�IRU�XVH�
Chapter 1: R/3 System Security and the Authorization Concept
What Is an Activity Group?
Authorizations Made Easy1–12
:KDW�,V�DQ�$FWLYLW\�*URXS"
7KH�SURFHVV�RI�VHFXULW\�LPSOHPHQWDWLRQ�ZLWK�WKH�3*�LV�EDVHG�RQ�WKH�FUHDWLRQ�RI�DFWLYLW\JURXSV�RU�D�FROOHFWLRQ�RI�OLQNHG�RU�DVVRFLDWHG�DFWLYLWLHV��VXFK�DV�WDVNV��UHSRUWV��DQGWUDQVDFWLRQV��$Q�DFWLYLW\�JURXS�LV�D�´GDWD�FRQWDLQHUµ�IRU�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQSURILOHV�DQG�XVXDOO\�UHSUHVHQWV�D�MRE�UROH�LQ�\RXU�FRPSDQ\���+RZHYHU��FXVWRPHUV�RIWHQGHILQH�DFWLYLW\�JURXSV�VRPHZKDW�GLIIHUHQWO\��$V�VXFK��WKHUH�LV�QR�RQH�FRQFUHWH�GHILQLWLRQ�RIDQ�DFWLYLW\�JURXS��RWKHU�WKDQ�LW�LV�D�GDWD�FRQWDLQHU�IRU�DXWKRUL]DWLRQV��
$FWLYLW\�JURXSV�DUH�GHILQHG�E\�WKH�FXVWRPHU�SHUIRUPLQJ�WKH�LPSOHPHQWDWLRQ�DQG�DOORZV\VWHPDWLF�RUJDQL]DWLRQ�DQG�HIILFLHQW�PDLQWHQDQFH�RI�V\VWHP�DFWLYLWLHV�
7KH�6$3�%XVLQHVV�:RUNIORZ��3HUVRQQHO�3ODQQLQJ�DQG�'HYHORSPHQW�DV�ZHOO�DV�WKH�5HSRUW:ULWHU�DQG�RWKHU�UHSRUWLQJ�WRROV�DUH�WLJKWO\�OLQNHG�ZLWK�WKH�3*��6$3�%XVLQHVV�:RUNIORZLQFOXGHV�ZRUNIORZ�WDVNV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS��8VHUV�DVVLJQHG�ZLWK�DFFHVVWR�D�SDUWLFXODU�DFWLYLW\�JURXS�UHDOO\�FRPH�IURP�WKH�+5�3HUVRQQHO�3ODQQLQJ�DQG'HYHORSPHQW�IXQFWLRQDOLW\��)XUWKHUPRUH��WKH�SODQ�YHUVLRQ�WKDW�LV�XVHG�LQ�+5�3HUVRQQHO3ODQQLQJ�DQG�'HYHORSPHQW�LV�WKH�VDPH�SODQ�YHUVLRQ�XVHG�E\�WKH�3*�DQG�:RUNIORZ�
8VLQJ�DQ�DFWLYLW\�JURXS�DV�DQ�LQIRUPDWLRQ�GDWDEDVH�UHGXFHV�GDWD�HQWU\�WLPH��6HOHFW�WKHFULWHULD��VXFK�DV�DFFHVV�ULJKWV��DQG�GLYLGH�WKH�DFWLYLWLHV�LQWR�DSSURSULDWH�JURXSV��)RU�H[DPSOH�\RX�FRXOG�GHFLGH�WR�JURXS�DFWLYLWLHV�E\�VXEMHFW�PDWWHU��VXFK�DV�SHUVRQQHO��SD\UROO��RUEXGJHWLQJ��2U��\RX�FRXOG�JURXS�DFWLYLWLHV�E\�MRE�FODVVHV��VXFK�DV�WUDQVODWLRQ�DFWLYLWLHV�FRPSXWHU�SURJUDPPHU�DFWLYLWLHV��RU�VHFUHWDULDO�DFWLYLWLHV��<RX�FRXOG�DOVR�VHW�XS�DFRPELQDWLRQ�RI�VXEMHFW�PDWWHU�DQG�MRE�RULHQWHG�DFWLYLW\�JURXSV��$IWHU�VHWWLQJ�XS�DFWLYLW\JURXSV��\RX�FDQ�DVVLJQ�WKHP�WR�YDULRXV�5���REMHFWV�
$FWLYLW\�*URXS�$VVLJQPHQWV
$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�PDQ\�XVHUV��2QH�XVHU�FDQ�DOVR�EH�DVVLJQHG�WR�PDQ\DFWLYLW\�JURXSV�
$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�WKH�IROORZLQJ�W\SHV�RI�XVHUV�
5���ORJLQ�XVHU�,'V
$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�UHFRJQL]HG�E\�WKH�5���6\VWHP�DQG�LV�DOORZHG�WR�ORJ�RQ�)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�RIWKH�%DVLV�FRPSRQHQW�
-REV
$�MRE�UHSUHVHQWV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF��0DQ\�HPSOR\HHV�LQ�\RXU�FRPSDQ\�PD\�KROG�WKHVDPH�MRE�FODVVLILFDWLRQ���)RU�H[DPSOH��WKHUH�PLJKW�EH����SHRSOH�ZKRVH�MRE�LV�DGPLQLVWUDWLYHDVVLVWDQW���3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKDW�MRE��8QOHVV�WKH�DFWLYLW\JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKH�ULJKWV�QHHGHG�WR�ZRUN�ZLWK�6$3RIILFH��EHFDUHIXO�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV�
Chapter 1: R/3 System Security and the Authorization Concept
What Is an Activity Group?
Release 4.6A/B1–13
3RVLWLRQV
$�SRVLWLRQ�UHSUHVHQWV�DQ�HPSOR\HH·V�XQLTXH��LQGLYLGXDO�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWKMREV��<RX�FDQ�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DQ�DOPRVW�FRPSOHWHO\�SRVLWLRQ�RULHQWHGIDVKLRQ��$OO�WKH�DFFHVV�ULJKWV�DUH�WKHQ�OLQNHG�WR�WKH�SRVLWLRQ��VR�LW�GRHV�QRW�PDWWHU�ZKR�ILOOVWKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��DQG�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG��WKHDXWKRUL]DWLRQ�SURILOH�DXWRPDWLFDOO\�FKDQJHV�
2UJDQL]DWLRQDO�XQLWV
2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�DQ\�RUJDQL]DWLRQDO�HQWLW\�WKDW�SHUIRUPV�D�VSHFLILHG�VHW�RIIXQFWLRQV�ZLWKLQ�D�FRPSDQ\��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV�GLYLVLRQV��GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDOVWUXFWXUH�DW�\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSVDPRQJ�WKH�XQLWV��$Q\RQH�ZKR�LV�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWVWKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�RUJDQL]DWLRQDO�XQLW�
([DPSOHV�RI�XQLWV�LQFOXGH�< 6XEVLGLDULHV< 'LYLVLRQV< 'HSDUWPHQWV< *URXSV< 6SHFLDO�SURMHFW�WHDPV
8QOHVV�WKH�DFWLYLW\�JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��EH�FDUHIXO�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�RUJDQL]DWLRQDO�XQLWV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WREH�IDLUO\�VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�LWV�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��:KHQ�H[FHSWLRQV�RFFXU�IRU�MREV�RUSRVLWLRQV��FUHDWH�DGGLWLRQDO�DFWLYLW\�JURXSV�IRU�WKHP��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RUSRVLWLRQ��LW�PD\�EH�EHVW�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�MREV�RU�SRVLWLRQV�FRQFHUQHG��%\FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�EHWZHHQ�WKH�XQLWV��\RXLGHQWLI\�\RXU�FRPSDQ\·V�RUJDQL]DWLRQDO�VWUXFWXUH�
:KDW�,V�D�8VHU�5ROH�7HPSODWH"
8VHU�UROH�WHPSODWHV�DUH�DFWLYLW\�JURXSV�LQ�WKH�VWDQGDUG�5���6\VWHP��GHOLYHUHG�E\�6$3��WKDWDOUHDG\�FRQWDLQ�WUDQVDFWLRQV�DQG�UHSRUWV�IURP�DOO�DSSOLFDWLRQ�DUHDV��7KHVH�XVHU�UROHWHPSODWHV�DUH�UHDG\�WR�XVH��<RX�KDYH�WKH�RSWLRQ�WR�XVH�D�XVHU�UROH�WHPSODWH�DV�LV�RU�FRS\�DQGFKDQJH�LW�WR�\RXU�QHHGV��,I�XVHUV�DUH�DVVLJQHG�WR�D�MRE�UROH�DQG�WKH\�ORJ�RQ�WR�WKH�V\VWHP�WKH\�RQO\�VHH�WKRVH�WDVNV�WKH\�DUH�DOORZHG�WR�SHUIRUP�
Chapter 1: R/3 System Security and the Authorization Concept
R/3 Tools for Security Implementation
Authorizations Made Easy1–14
5���7RROV�IRU�6HFXULW\�,PSOHPHQWDWLRQ
,QIRUPDWLRQ�6RXUFH /RFDWLRQ
2YHUYLHZ�RI�LPSRUWDQW�6$31HW�¥�5��)URQWHQG�QRWHV��IRUPHUO\�266�
$SSHQGL[�$
)UHTXHQWO\�DVNHG�TXHVWLRQV��)$4� $SSHQGL[�%
2YHUYLHZ�RI�V\VWHP�SURILOH�SDUDPHWHUV $SSHQGL[�&
/LEUDU\�2QOLQH�'RFXPHQWDWLRQ &KRRVH�+HOS�→�5���OLEUDU\�→�%DVLV�→�&RPSXWHU�&HQWHU0DQDJHPHQW�6\VWHP�→��8VHUV�DQG�$XWKRUL]DWLRQV
5HOHDVH�,QIRUPDWLRQ &KRRVH�+HOS�→�5HOHDVH�QRWHV�
5���6HFXULW\�*XLGH 1RWH������
5HSRUW�'RFXPHQWDWLRQ 5HSRUW�GRFXPHQWDWLRQ�FDQ�EH�DFFHVVHG�IURP�WKH�VHOHFWLRQVFUHHQ�E\�HLWKHU�FKRRVLQJ�+HOS�→�([WHQGHG�+HOS�RU�6\VWHP�→6HUYLFHV�→�5HSRUWLQJ��HQWHULQJ�WKH�UHSRUW�QDPH��DQG�WKHQVHOHFWLQJ�*RWR�→�'RFXPHQWDWLRQ�
7UDLQLQJ�FRXUVHV 6HH�6$31HW�IRU�FXUUHQW�FRXUVHV��KWWS���ZZZ�VDS�FRP
�*ORVVDU\&KRRVH�+HOS�→�5���OLEUDU\�→�*ORVVDU\�IRU�WKH�HQWLUH�JORVVDU\�RUFKRRVH�+HOS�→�*ORVVDU\�IRU�D�FRQWH[W�VHQVLWLYH�JORVVDU\�
�&RQWH[W�6HQVLWLYH�+HOS0RYH�WKH�FXUVRU�WR�D�ILHOG�RU�WR�D�V\VWHP�PHVVDJH�DQGSUHVV�)��
�.QRZOHGJH�3URGXFWV1RWH������
�$%$3�:RUNEHQFK�'RFXVHW1RWH������
�6$31HW
6$31HW�LV�DQ�LQWHUQHW�VHUYLFH�WKDW�EULQJV�QHZ�LQIRUPDWLRQ�DQGFRPPXQLFDWLRQ�FKDQQHOV�EHWZHHQ�6$3�DQG�LWV�FXVWRPHUV��/RJRQ�E\�HQWHULQJ��KWWS���ZZZ�VDS�FRP��RQ�DQ�LQWHUQHW�EURZVHU�DQGFOLFN�WKH�3DUWQHU�&XVWRPHU�EXWWRQ��&OLFN�)UHTXHQW�XVHUV�DQG�HQWHU\RXU�6$31HW�¥�5���)URQWHQG�QRWH��IRUPHUO\�266��SDVVZRUG�
��6$3�/DEV��6LPSOLILFDWLRQ*URXS
6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�KWWS���ZZZ�VDSODEV�FRP�DXWK�IRUXSGDWHV��EHWD�UHOHDVHV�RI�QHZ�JXLGHERRNV��DGGLWLRQDOLQIRUPDWLRQ��SUHGHILQHG�DFWLYLW\�JURXSV��JXLGHERRNV�IRUSUHYLRXV�UHOHDVHV��HWF�
�$FFHOHUDWHG6$3�5RDGPDS�$6$3�
7KH�$6$3�,PSOHPHQWDWLRQ�5RDGPDS�UHFRPPHQGV�XVLQJ�WKH3*�LQ�LWV�DXWKRUL]DWLRQ�GHVLJQ�SURSRVDO��<RX�FDQ�DOVR�ILQG�OLQNVWR�WKLV�JXLGHERRN�IURP�GLIIHUHQW�ORFDWLRQV�LQ�WKH�URDGPDSVWUXFWXUH��,QVLGH�$6$3��FKRRVH�,PSOHPHQWDWLRQ�5RDGPDS�→3KDVH����5HDOL]DWLRQ�→�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment
Release 4.6A/B1–15
&DVH�6WXG\��6HFXULW\�6WUDWHJ\�LQ�D�7KUHH�6\VWHP
(QYLURQPHQW
'HYHORSPHQW�6\VWHP��'(9�
R/3R/3
SAP
R/3R/3
SAP
R/3R/3
SAP
'(9 4$6 35'
'(9�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW
:KHQ�WKH�GHYHORSPHQW�V\VWHP��'(9��LV�ILUVW�LQVWDOOHG��SURMHFW�PHPEHUV�LQFOXGLQJFRQILJXUDWRUV��GHYHORSHUV��V\VWHP�DGPLQLVWUDWRUV��DQG�UHFHQW�WUDLQHHV�FRPSULVH�WKH�EXON�RI5���XVHUV��6$3�UHFRPPHQGV�WKH�XVH�RI�MRE�UROH�WHPSODWHV��$V�WKH�5���SURMHFW�SURJUHVVHV�WKH�QHHG�WR�OLPLW�XVHU�DFFHVV�LQFUHDVHV��,Q�JHQHUDO��'(9�V\VWHP�XVHUV�KDYH�PRUH�DFFHVV�WKDQTXDOLW\�DVVXUDQFH���4$6��RU�SURGXFWLRQ���35'��V\VWHP�XVHUV�
$V�FRQILJXUDWLRQ�LV�GRQH�LQ�'(9�\RX�FDQ�QRZ�XVH�WKH�QHZ�IXQFWLRQDOLW\�RI�FXVWRPL]LQJDFWLYLW\�JURXSV�WR�HQVXUH�WKDW�SHRSOH�DUH�FRQILJXULQJ�RQO\�WKHLU�RZQ�SDUW�RI�WKH�V\VWHP��3OHDVH�UHDG�FKDSWHU���IRU�GHWDLOHG�LQIRUPDWLRQ�RQ�FXVWRPL]LQJ�DXWKRUL]DWLRQV��
7UHDW�VXSHUXVHU�DFFRXQWV�OLNH�´URRWµ�LQ�81,;��7KH��<RXU&RPSDQ\!B$//�SURILOH�OLPLWV�ULVNRQ�WKH�'(9�V\VWHP��6\VWHP�PDOIXQFWLRQV�GXH�WR�H[FHVVLYH�DFFHVV�FDQ�DOVR�FDXVH�SURMHFWGHYHORSPHQW�GHOD\V�
<RX�QRZ�FRQWURO�ZKR�FUHDWHV�DQG�PDLQWDLQV�< 8VHUV< 3URILOHV< $XWKRUL]DWLRQV
<RX�DOVR�HOLPLQDWH�DWWHPSWV�WR�< /RFN�WUDQVDFWLRQV< 'HOHWH�XVHU�VHVVLRQV< 6WRS�ZRUN�SURFHVVHV
7KLV�FRQWURO�PDLQWDLQV�WKH�V\VWHP·V�LQWHJULW\�DQG�VWDELOLW\��8VLQJ�WKH�3*��WKH�DXWKRUL]DWLRQDGPLQLVWUDWRU�GHYHORSV�HQG�XVHU�SURILOHV�DQG�DXWKRUL]DWLRQV�LQ�WKH�'(9�V\VWHP��7KHVHSURILOHV�DQG�DXWKRUL]DWLRQV�ZLOO�EH�WUDQVSRUWHG�WR�WKH�4$6�V\VWHP�IRU�ILQDO�WHVWLQJ�EHIRUHPRYLQJ�WR�35'��7KH�HQG�XVHU�PDVWHU�UHFRUGV�DUH�XVXDOO\�FUHDWHG�LQ�35'�FORVHU�WR�WKH�JR�OLYHGDWH��7KH�DFWLYLW\�JURXSV��WRJHWKHU�ZLWK�WKH�WUDQVSRUWHG�DXWKRUL]DWLRQ�GDWD��DUH�DVVLJQHG�WRWKH�HQG�XVHUV�DV�UHTXLUHG�LQ�35'��:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment
Authorizations Made Easy1–16
WKH�DXWKRUL]DWLRQ�SURILOHV��7KHVH�SURILOHV�GR�QRW�QHHG�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�LI�XVHUV�DUH�DOUHDG\�DVVLJQHG��6HH�FKDSWHU���IRU�PRUH�LQIRUPDWLRQDERXW�WUDQVSRUWLQJ�
0DLQWDLQLQJ�GRFXPHQWDWLRQ�LV�DOVR�LPSRUWDQW�EHFDXVH�LW�< +HOSV�IXWXUH�SURMHFW�UROORXWV�SURFHHG�VPRRWKO\< ,V�HVVHQWLDO�WR�SDVV�VHFXULW\�DGPLQLVWUDWLYH�IXQFWLRQV�WR�RWKHU�SURMHFW�PHPEHUV< ,V�UHTXLUHG�E\�DXGLWRUV
7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�FOLHQW�FRS\�DGPLQLVWUDWRUV�:KHQ�QHZ�FOLHQWV�DUH�FUHDWHG��DFWLYLW\�JURXSV�DUH�QRW�DXWRPDWLFDOO\�FRSLHG��6LQFH�XVHUV�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�DUH�DOO�FOLHQW�GHSHQGHQW��WKH�FOLHQWFRS\�DGPLQLVWUDWRU�DOVR�QHHGV�WR�NQRZ�ZKLFK�XVHU�PDVWHU�UHFRUGV�WR�FRS\��6HH�FKDSWHU���IRUPRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�
7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�DOVR�ZRUN�FORVHO\�ZLWK�WKRVH�LQ�\RXU�FRPSDQ\�WKDWIXQFWLRQ�DV�FKDQJH�PDQDJHPHQW�DGPLQLVWUDWRUV��%RWK�DGPLQLVWUDWRUV�DUH�LPSRUWDQW�SURMHFWFRQWURO�SRLQWV��7KH�V\VWHP�ODQGVFDSH��FOLHQW�ODQGVFDSH��DQG�FOLHQW�UROHV�VKRXOG�EH�FOHDUO\GHILQHG�DQG�SUHVHQWHG�WR�WKH�SURMHFW�WHDP��'HYHORSPHQW�FODVVHV�DQG�DXWKRUL]DWLRQ�JURXSVVKRXOG�EH�HVWDEOLVKHG�IRU�DOO�QHZ�GHYHORSPHQW��$OO�DGPLQLVWUDWRUV�VKRXOG�FRPSOHWHDSSURSULDWH�6$3·V�WUDLQLQJ�FRXUVHV�IRU�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�WKH\�DUH�WU\LQJ�WR�VHWXS��:H�UHFRPPHQG�WKDW�\RX�DWWHQG�FRXUVHV�DQG�ZRUNVKRSV�LPPHGLDWHO\�DIWHU�WKH�LQLWLDOLQVWDOODWLRQ�RI�\RXU�5���6\VWHP�
1H[W��WKHVH�DGPLQLVWUDWRUV�VKRXOG�FRQGXFW�D�SURMHFW�VSHFLILF�ZRUNVKRS�WR�ERWK�UHYLHZ�WKHV\VWHP�DQG�FOLHQW�ODQGVFDSH��DQG�GLVFXVV�WKH�IROORZLQJ�FRQWURO�SRLQWV�< :KHQ�GHYHORSPHQW�UHTXHVWV�ZLOO�PRYH< 7R�ZKLFK�FOLHQWV�WKHVH�UHTXHVWV�ZLOO�PRYH< :KRVH�VLJQDWXUHV�ZLOO�EH�UHTXLUHG�DORQJ�WKH�ZD\
7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�GHYHORSHUV�WR�HQIRUFH�VHFXULW\VWDQGDUGV�IRU�QHZ�$%$3�SURJUDPV�DQG�WUDQVDFWLRQV��ZKLFK�FDQ�EH�HQIRUFHG�WKURXJK&KDQJH�0DQDJHPHQW��$OO�QHZ�FXVWRPHU�ZULWWHQ�FRGHV�VKRXOG�EH�DVVLJQHG�WR�DQDXWKRUL]DWLRQ�JURXS��ZLWK�WUDQVDFWLRQ�6(���DQG�6(����WKH�$%$3�HGLWRU�DWWULEXWHV�VFUHHQ�8QSURWHFWHG�FXVWRPHU�ZULWWHQ�SURJUDPV�DQG�WUDQVDFWLRQV�LQ�35'�DOZD\V�SUHVHQW�SUREOHPV�
7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�LQYROYH�WKH�FRUSRUDWH�DXGLWRUV�DW�WKLV�MXQFWXUH�
:H�UHFRPPHQG�LQYROYLQJ�WKH�FRUSRUDWH�DXGLWRUV�XS�IURQW�VR�WKHLU�UHTXLUHPHQWV�DUHLQFRUSRUDWHG�LQ�WKH�GHYHORSPHQW�HIIRUWV��,W�LV�DOZD\V�XQSOHDVDQW�WR�DXGLW�SRVW�OLYHSURMHFWV��,Q�WKH�ZRUVW�FDVH�VFHQDULR��SURMHFWV�VKRXOG�EH�KDOWHG�XQWLO�DXGLWRU�UHTXLUHPHQWVDUH�PHW��DQG�DW�D�PLQLPXP��DOO�RI�WKH�RULJLQDO�GHYHORSPHQW�ZRUN�PD\�KDYH�WR�EH�UHYLVHG�
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment
Release 4.6A/B1–17
4XDOLW\�$VVXUDQFH�6\VWHP��4$6�
R/3R/3
SAP
R/3R/3
SAP
R/3R/3
SAP
'(9 4$6 35'
4$6�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW
:KHQ�WKH�4$6�V\VWHP�DQG�FOLHQW�DUH�FUHDWHG��WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�VWDUWWUDQVSRUWLQJ�WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP��WDEOH�862%;B&��WHPSODWHV�DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��IURP�WKH�'(9�V\VWHP�WR�WKH�4$6�V\VWHP�VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$XWKRUL]DWLRQ�SURILOHV�IRU�LPSRUWHG�DFWLYLW\�JURXSV�QRORQJHU�QHHG�WR�EH�UHJHQHUDWHG��VLQFH�WKH�V\VWHP�FDQ�GR�WKLV�DXWRPDWLFDOO\�QRZ��%HIRUHPRYLQJ�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�GDWD�WR�35'��D�ILQDO�WHVWLQJ�SODQ�VKRXOG�EHSURGXFHG�
)RU�H[DPSOH��DQ�),�SURMHFW�WHDP�PHPEHU�PD\�XVH�D�VDPSOH�DFFRXQWV�SD\DEOH�XVHU�,'�WR�< &RQILUP�WKDW�WKH�XVHU�KDV�DFFHVV�WR�WKH�VSHFLILF�WUDQVDFWLRQV�JRYHUQHG�E\�HDFK�DFWLYLW\
JURXS�WR�ZKLFK�WKH�XVHU�LV�DVVLJQHG�< (QVXUH�WKDW�WKHVH�WUDQVDFWLRQV�PDWFK�WKH�FRPSDQ\�GHILQHG�UROH�IRU�DFFRXQWV�SD\DEOH�< 9HULI\�WKDW�WKH�VDPSOH�XVHU�,'�GRHV�QRW�KDYH�DFFHVV�WR�XQDXWKRUL]HG�WUDQVDFWLRQV�
6RPH�VLWHV�FRQGXFW�D�GD\�LQ�WKH�OLIH�WHVW�DV�SDUW�RI�WKHLU�JR�OLYH�SODQ��ZKHUH�HQG�XVHUV�ORJ�RQWR�D�SUHSURGXFWLRQ�HQYLURQPHQW�DQG�VLPXODWH�UHDO�SURGXFWLRQ��7KLV�SURFHVV�LV�DQ�H[FHOOHQWZD\�RI�WHVWLQJ�WKH�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�
7UDLQLQJ�&OLHQW�6\VWHP��75*�
:KLOH�PDQ\�FXVWRPHUV�GR�QRW�SXW�WKHLU�WUDLQLQJ�HQYLURQPHQW�RQ�DQRWKHU�V\VWHP�HQWLUHO\�PDQ\�GR��<RX�QHHG�WR�VHW�XS�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WKH�WUDLQLQJ�V\VWHP�DV�ZHOO�7KH�DSSURSULDWH�DXWKRUL]DWLRQ�VHWXS�FDQQRW�EH�GHWHUPLQHG�ZLWKRXW�ILUVW�NQRZLQJ�IURPZKHUH�WKH�GDWD�WKDW�DSSHDUV�LQ�WKH�WUDLQLQJ�V\VWHP�FRPHV�IURP��RU�KRZ�WKH�V\VWHP�DQGWUDLQLQJ�FOLHQW�ZHUH�FUHDWHG���)RU�H[DPSOH��LI�WKH�WUDLQLQJ�V\VWHP�LV�D�FRS\�RI�WKH�SURGXFWLRQHQYLURQPHQW�RU�D�FRS\�RI�WKH�FOLHQW�ZKHUH�FRQYHUVLRQV�DQG�LQWHUIDFHV�ZHUH�LQLWLDOO\�WHVWHG��LWPD\�EH�SRVVLEOH�WKDW�WKH�WUDLQLQJ�V\VWHP�FRQWDLQV�VHQVLWLYH�LQIRUPDWLRQ�VXFK�DV�VRFLDOVHFXULW\�QXPEHUV��FRQYHUWHG�SD\UROO�LQIRUPDWLRQ��DGGUHVVHV��HWF�
Chapter 1: R/3 System Security and the Authorization Concept
Case Study: Security Strategy in a Three-System Environment
Authorizations Made Easy1–18
3URGXFWLRQ�6\VWHP��35'�
R/3R/3
SAP
R/3R/3
SAP
R/3R/3
SAP
'(9 4$6 35'
35'�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW
2QFH�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�IXOO\�WHVWHG�LQ�4$6��DQG�HQGXVHU�DQG�SURMHFW�WHDP�DSSURYDO�KDV�EHHQ�SURYLGHG��WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQV\VWHP��WDEOH�862%;B&��WHPSODWHV��DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��DUHPRYHG�WR�35'��VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$FWXDO�HQG�XVHU�,'V�FDQ�EH�FUHDWHG��$IRUP�WKDW�LQFOXGHV�DOO�RI�WKH�SHUWLQHQW�LQIRUPDWLRQ�IRU�XVHU�,'�FUHDWLRQ��DORQJ�ZLWK�WKHSURSHU�VLJQDWXUHV��LV�GHYHORSHG�DQG�GLVWULEXWHG�WR�WKH�GHSDUWPHQWV�
7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�EH�D�SDUW�RI�WKH�JR�OLYH�SODQ��7KH�ILUVW�GD\V�RI�JRLQJ�OLYH�DUH�KHFWLF��DQG�WKHUH�VKRXOG�EH�D�SURFHGXUH�WR�UHSRUW�DFFHVV�SUREOHPV�LQ�SURGXFWLRQ��7KHKHOS�GHVN�LV�D�JRRG�IRFDO�SRLQW��:KHQ�XVHUV�KDYH�DFFHVV�SUREOHPV��IRU�H[DPSOH��ZKHQ�XVHUVVHH�WKH�PHVVDJH��1R�DXWKRUL]DWLRQ�IRU�WUDQVDFWLRQ�;;;;���WKH\�VKRXOG�H[HFXWH�WUDQVDFWLRQ68���WR�REWDLQ�WKH�DXWKRUL]DWLRQ�UHTXLUHG�IRU�WKLV�WUDQVDFWLRQ���5HPHPEHU��VLQFH����+�WUDQVDFWLRQ�68���LV�DOVR�SURWHFWHG�E\�REMHFW�6B7&2'(��6HH�FKDSWHU����,QVHUWLQJ�0LVVLQJ$XWKRUL]DWLRQV��IRU�PRUH�GHWDLOV���$�VFUHHQ�SULQW�VKRXOG�EH�VHQW�WR�WKH�KHOS�GHVN�DQG�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�IRU�HYDOXDWLRQ��2QFH�WKH�DSSOLFDWLRQ�DUHD�RZQHU�DSSURYHV�WKHDGGLWLRQDO�DFFHVV��LW�LV�DVVLJQHG�WR�WKH�XVHU��$GGLWLRQDO�DFFHVV�PHDQV�WKDW�WKH�DFWLYLW\�JURXSVPLJKW�EH�FKDQJHG�RU�WKDW�D�PLVVLQJ�DXWKRUL]DWLRQ�REMHFW�PD\�QHHG�WR�EH�PDQXDOO\�LQVHUWHGLQ�WKH�DXWKRUL]DWLRQ�SURILOHV�
7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�VWDUW�SODQQLQJ�IRU�RWKHU�SURMHFW�SKDVHV��7KLV�PD\LQFOXGH�RWKHU�UROORXWV�WR�GLIIHUHQW�ORFDWLRQV��GLIIHUHQW�SODQWV��GLIIHUHQW�PRGXOHV��RU�5��XSJUDGHV��$OO�RI�WKHVH�UROORXWV�VKRXOG�LQYROYH�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�
Chapter 1: R/3 System Security and the Authorization Concept
Setting Up the Authorization Administrators
Release 4.6A/B1–19
6HWWLQJ�8S�WKH�$XWKRUL]DWLRQ�$GPLQLVWUDWRUV
:H�UHFRPPHQG�\RX�GLYLGH�WKH�V\VWHP�DGPLQLVWUDWLRQ�WDVNV��DV�VKRZQ�LQ�WKH�JUDSKLF�EHORZ�WR�HQVXUH�JUHDWHU�V\VWHP�VHFXULW\��)RU�FRPSDQLHV�WKDW�KDYH�VHYHUDO�SHRSOH�GHYRWHG�WR�WKHDXWKRUL]DWLRQV�FRPSRQHQW�RI�5����WKLV�GLYLVLRQ�PDNHV�JRRG�VHQVH��6$3�VXSSRUWV�WKLVDSSURDFK�ZLWK�WKH�XVHU�UROH�WHPSODWHV�IRU�WKHVH�DGPLQLVWUDWRUV��,Q�WKH�VWDQGDUG�5���6\VWHP\RX�FDQ�ILQG�WKH�IROORZLQJ�WHPSODWHV�
$GPLQLVWUDWRU 8VHU�5ROH�7HPSODWH
$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU 6$3B%&B$87+B'$7$B$'0,1B$*
$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU 6$3B%&B$87+B352),/(B$'0,1B$*
8VHU�$GPLQLVWUDWRU 6$3B%&B86(5B$'0,1B$*
6XSHU�8VHU
8VHU�$GPLQLVWUDWRU
$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU
$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU
- Maintain user master records - Assign activity groups to users - Assign profiles to users (T ONLY) - Display auth. and profiles - Call user information system
- Maintain activity groups - Within activity groups: - Change authorizations (T ONLY) - Generate profiles (T ONLY) - Execute transaction information- Call user information system
- Maintain activity groups - Within activity groups: -Change transaction selection - Change authorization data- Call user information system
SAP
Organizing Authorization Administration
)RU�FRPSDQLHV�ZLWK�YHU\�IHZ�SHRSOH�LQYROYHG�LQ�VHWWLQJ�XS�DQG�PDLQWDLQLQJ�DXWKRUL]DWLRQV�GLYLGLQJ�XS�VXFK�WDVNV�FRPSOLFDWHV�WKH�SURFHVV�RI�FUHDWLQJ�DQG�PDLQWDLQLQJ�WKHDXWKRUL]DWLRQV�FRPSRQHQW��<RX�VKRXOG�DOVR�GHFLGH�ZKHWKHU�PDLQWHQDQFH�RI�XVHUV��DFWLYLW\JURXSV��DXWKRUL]DWLRQ�SURILOH��DQG�DXWKRUL]DWLRQV�VKRXOG�EH�FHQWUDOL]HG�RU�GHFHQWUDOL]HG��:HUHFRPPHQG�FHQWUDOL]LQJ�PDLQWHQDQFH�XQWLO�\RXU�JR�OLYH�GDWH�DQG�ILUVW�UROORXW��&HQWUDOL]HGDGPLQLVWUDWRUV�KDYH�D�EHWWHU�XQGHUVWDQGLQJ�RI�ZKDW�LV�LQYROYHG�LQ�D�UROORXW��DQG�FHQWUDOL]LQJWKH�DGPLQLVWUDWLYH�WDVNV�HVWDEOLVKHV�QDPLQJ�VWDQGDUGV��%\�WKH�ILUVW�UROORXW��DOO�DGPLQLVWUDWLYHIXQFWLRQV�VKRXOG�EH�GRFXPHQWHG�DQG�FDQ�WKHQ�EH�GHFHQWUDOL]HG�
Chapter 1: R/3 System Security and the Authorization Concept
Setting Up the Authorization Administrators
Authorizations Made Easy1–20
&RQYHUVHO\��ZKHQ�WKH�DGPLQLVWUDWLYH�IXQFWLRQV�DUH�GHFHQWUDOL]HG�XS�IURQW��DGPLQLVWUDWRUVXVH�GLIIHUHQW�QDPLQJ�VWDQGDUGV�IRU�WKHLU�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQGDXWKRUL]DWLRQV��DQG�GLIIHUHQW�DSSURDFKHV�WR�LPSOHPHQWLQJ�VHFXULW\��,I�HDFK�DGPLQLVWUDWRUFUHDWHV�KLV�RU�KHU�RZQ�VWDQGDUGV��HYHU\WKLQJ�KDV�WR�EH�UHQDPHG�RQFH�WKH�DXWKRUL]DWLRQLPSOHPHQWDWLRQ�LV�VWDQGDUGL]HG�
7KH�VXSHUXVHU�VHWV�XS�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�IRU�DGPLQLVWUDWRUV�LQD�GHSDUWPHQW��D�FRVW�FHQWHU��DQG�RWKHU�RUJDQL]DWLRQDO�XQLWV��:LWKLQ�DQ�DUHD��DGPLQLVWUDWLYHWDVNV�DUH�GLYLGHG�EHWZHHQ�WKH�XVHU�DGPLQLVWUDWRU��DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU��DQGDXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU��7KH�IROORZLQJ�LV�D�OLVW�RI�HDFK�DGPLQLVWUDWRU·V�WDVNV�DQGUHVSRQVLELOLWLHV�< 8VHU�$GPLQLVWUDWRU
� &UHDWLQJ�DQG�FKDQJLQJ�XVHUV� $VVLJQLQJ�XVHUV�WR�DFWLYLW\�JURXSV� $VVLJQLQJ�SURILOHV�EHJLQQLQJ�ZLWK�7�WR�XVHUV��RU�IROORZLQJ�\RXU�RZQ�QDPLQJ
FRQYHQWLRQ�� 'LVSOD\LQJ�DXWKRUL]DWLRQV�DQG�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP
'LVSOD\LQJ�RU�FKDQJLQJ�DFWLYLW\�JURXS�GDWD�DQG�FKDQJLQJ�RU�JHQHUDWLQJ�SURILOHV�VKRXOGQRW�EH�SHUPLWWHG�IRU�XVHU�DGPLQLVWUDWRUV�
< $XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU� 'LVSOD\LQJ�XVHUV� &UHDWLQJ�DQG�FKDQJLQJ�DFWLYLW\�JURXSV� &KDQJLQJ�WKH�WUDQVDFWLRQ�VHOHFWLRQ�DQG�DXWKRUL]DWLRQ�GDWD�LQ�DFWLYLW\�JURXSV� 'LVSOD\LQJ�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP
&KDQJLQJ�XVHUV�DQG�JHQHUDWLQJ�SURILOHV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRUV�
< $XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU� 'LVSOD\LQJ�DFWLYLW\�JURXSV�DQG�WKHLU�GDWD��DQG�XVHUV� *HQHUDWLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�7�EDVHG�RQ
H[LVWLQJ�DFWLYLW\�JURXSV��RU�UHVSHFWLYHO\�IROORZLQJ�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP
7KH�IROORZLQJ�WDVNV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRUV�� &KDQJLQJ�XVHUV� &KDQJLQJ�DFWLYLW\�JURXS�GDWD� *HQHUDWLQJ�DXWKRUL]DWLRQ�SURILOHV�FRQWDLQLQJ�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK
6B86(5
Chapter 1: R/3 System Security and the Authorization Concept
Policies and Procedures
Release 4.6A/B1–21
+RZ�WKH�$GPLQLVWUDWRUV�:RUN�7RJHWKHU
7KH�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU�< &UHDWHV�DQ�DFWLYLW\�JURXS< &KRRVHV�WUDQVDFWLRQV< 0DLQWDLQV�DXWKRUL]DWLRQ�GDWD
:LWKRXW�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�WR�JHQHUDWH�WKH�SURILOH��WKH�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRU�VDYHV�WKH�SURILOH�DQG�DFFHSWV�WKH�GHIDXOW�SURILOH�QDPH�7��RU�D�QDPH�WKDWIROORZV�\RXU�QDPLQJ�FRQYHQWLRQ�
7KH�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU�< &DOOV�WUDQVDFWLRQ�PFCG< 6HOHFWV�WKH�'LVSOD\�PRGH�WR�FKHFN�WKH�GDWD< *HQHUDWHV�WKH�DXWKRUL]DWLRQ�SURILOHV
)LQDOO\��WKH�XVHU�DGPLQLVWUDWRU�DVVLJQV�WKH�DFWLYLW\�JURXS�WR�D�XVHU�RU�D�3'�REMHFW��VXFK�DV�DSRVLWLRQ��DQG�XSGDWHV�WKH�XVHU�PDVWHU�UHFRUG��7KH�DXWKRUL]DWLRQ�SURILOH�LV�WKHQ�DGGHG�WR�WKHXVHU�PDVWHU�UHFRUG�
3ROLFLHV�DQG�3URFHGXUHV
7KH�IROORZLQJ�VKRZV�D�VDPSOH�RI�SROLFLHV�DQG�SURFHGXUHV��KRZHYHU�IRU�\RXU�FRPSDQ\�LWPLJKW�EH�GLIIHUHQW�
8VHU�$GPLQLVWUDWLRQ
3ROLFLHV
< 6XSHUXVHUV�6$3 �DQG�'',&� 7KHUH�LV�QR�XVHU�6$3 �DQG�'',&�LQ�DQ\�FOLHQW�ZLWKRXW�D�SDVVZRUG�� 7KH�6$3 �XVHU�KDV�QR�DXWKRUL]DWLRQV�
< 8VHU�QDPLQJ�FRQYHQWLRQ
$OO�XVHUV�DUH�DVVLJQHG�QDPHV�LGHQWLFDO�WR�WKHLU�HPSOR\HH�,'�QXPEHUV��SHUVRQQHOQXPEHUV��
< 8VHU�PDLQWHQDQFH� 7KH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW�KDV�WR�UHFHLYH�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW
)RUP��ZLWK�H�PDLO��VLJQHG�E\�WKH�XVHU·V�DSSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�� $OO�SURILOHV�WKDW�WKH�XVHU�UHTXLUHV�PXVW�EH�VSHFLILFDOO\�OLVWHG�RQ�WKH�UHTXHVW�IRUP��7KH
IRUP�PXVW�LQGLFDWH�ZKHWKHU�WKH�XVHU�LV�WHPSRUDU\�RU�SHUPDQHQW�� )RU�WHPSRUDU\�HPSOR\HHV��DQ�DFFRXQW�H[SLUDWLRQ�GDWH�PXVW�EH�LQFOXGHG�
< 8VHU�OHDYLQJ�WKH�FRPSDQ\�� 7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�ILOOHG�RXW�DQG�VLJQHG�E\�WKH�DSSOLFDWLRQ
GHSDUWPHQW�PDQDJHU��� $�FRS\�RI�WKLV�IRUP�PXVW�EH�VHQW�WR�+5�GHSDUWPHQW�
Chapter 1: R/3 System Security and the Authorization Concept
Policies and Procedures
Authorizations Made Easy1–22
�� 7KH�+5�GHSDUWPHQW�PDQDJHU�PXVW�VLJQ�WKH�UHTXHVW�IRU�GHOHWLRQ��� 7KLV�PDQDJHU�VHQGV�WKH�VLJQHG�FRS\�EDFN�WR�WKH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW��� $OO�HPSOR\HH�PDVWHU�UHFRUG�LQIRUPDWLRQ��LQFOXGLQJ�LQWHUQDO�SRVW�RIILFH��PXVW�EH
GHOHWHG�
3URFHGXUHV
< 6XSHUXVHUV�6$3 �DQG�'',&� 6$3 �LV�XVHG�RQO\�IRU�FOLHQW�FRSLHV�� 3VHXGR�VXSHUXVHUV�DUH�FUHDWHG�LQ�HDFK�FOLHQW�ZLWK�WKH�6$3B$//�SURILOH�� 7KH�SDVVZRUG�LV�FKDQJHG�HYHU\�PRQWK�
7KLV�FDQ�EH�GHWHUPLQHG�ZLWK�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�ORJLQ�SDVVZRUGBH[SLUDWLRQBWLPH��VHH�DSSHQGL[�&�IRU�WKH�OLVW�RI�V\VWHP�SURILOHSDUDPHWHUV��
� 8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�SDVVZRUGV�IRU�6$3 �DQG�'',&KDYH�EHHQ�FKDQJHG�IURP�WKH�GHIDXOWV�
< 8VHU�QDPLQJ�FRQYHQWLRQ
7KH�DSSOLFDWLRQ�PDQDJHU�PXVW�FRQWDFW�WKH�+5�GHSDUWPHQW�DQG�UHFHLYH�WKH�QHZHPSOR\HH�,'�QXPEHU��7KLV�,'�QXPEHU�LV�HQWHUHG�LQWR�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUPZKHUH�LQGLFDWHG�
< 8VHU�PDLQWHQDQFH
7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�PDLOHG�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�
< 8VHU�OHDYLQJ�WKH�FRPSDQ\
7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�VHQW�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�DQG�WR�WKH�+5�GHSDUWPHQW�PDQDJHU��7KH�+5�GHSDUWPHQWPDQDJHU�PXVW�VLJQ�WKH�IRUP�DQG�UHWXUQ�WKH�VLJQHG�FRS\�WR�WKH�V\VWHP�DGPLQLVWUDWLRQGHSDUWPHQW�
5ROHV�DQG�5HVSRQVLELOLWLHV
7DVN 5ROH
0DLQWDLQLQJ�VXSHUXVHUV 6\VWHP�DGPLQLVWUDWRU
0DLQWDLQLQJ�QDPLQJ�FRQYHQWLRQV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�+5GHSDUWPHQW
0DLQWDLQLQJ�XVHUV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU
0DLQWDLQLQJ�XVHUV�OHDYLQJ�FRPSDQ\ $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU�+5�GHSDUWPHQW
Chapter 1: R/3 System Security and the Authorization Concept
Policies and Procedures
Release 4.6A/B1–23
6\VWHP�6HFXULW\
3ROLFLHV
< ,7�0DQDJHU
7KH�,7�0DQDJHU��ZKR�LV�UHVSRQVLEOH�IRU�DOO�DVSHFWV�RI�V\VWHP�VHFXULW\��PXVW�UHYLHZ�WKHVHFXULW\�VWUDWHJ\�HYHU\�WZR�PRQWKV�
< 6XSHUXVHUV
)RU�UHYLVLRQ�DQG�VHFXULW\�SXUSRVHV��WKH�VXSHUXVHU�6$3 �ZLOO�QRW�EH�XVHG�IRU�V\VWHPPDLQWHQDQFH��$OO�PDLQWHQDQFH�KDV�WR�EH�SHUIRUPHG�ZLWK�QHZO\�GHILQHG�VXSHUXVHUV�
< 6\VWHP�SDVVZRUGV6\VWHP�SDVVZRUGV��'%�XVHU�VDSU���2�6��XVHU��6,'!$'0��'',&��PXVW�EH�FKDQJHG�HYHU\IRXU�ZHHNV��,Q�FDVH�RI�DQ�HPHUJHQF\��SDVVZRUG�DFFHVV�PXVW�EH�HQVXUHG�
< 8VHU�SDVVZRUGV7R�SURWHFW�WKH�V\VWHP�IURP�XQDXWKRUL]HG�DFFHVV��PDNH�XVHUV�FKDQJH�WKHLU�SDVVZRUGHYHU\�IRXU�ZHHNV��$�PLQLPXP�SDVVZRUG�OHQJWK�RI�VL[�FKDUDFWHUV�LV�UHTXLUHG��$IWHU�WKUHHXQVXFFHVVIXO�ORJRQ�DWWHPSWV�WKH�DFFRXQW�ZLOO�EH�ORFNHG�
< 6$3�FRQQHFWLRQ7KH�FRQQHFWLRQ�WR�6$3�LV�RSHQHG�RQO\�IRU�D�VHUYLFH�VHVVLRQ��7KHVH�FRQQHFWLRQV�DUH6$31HW�¥�5���)URQWHQG�QRWHV��IRUPHUO\�266���(DUO\�:DWFK��DQG�5HPRWH�&RQVXOWLQJ�&RQQHFWLRQ�WR�6$3�FDQ�RQO\�EH�RSHQHG�IURP�WKH�FXVWRPHU�VLWH��&RQQHFWLRQV�KDYH�WR�EHPRQLWRUHG�ZLWK�DQ�DSSURSULDWH�WRRO�
< 6$3URXWHU6$3URXWHU��D�6$3�VXSSOLHG�WRRO�IRU�VHFXULQJ�5���DFFHVV��LV�QHFHVVDU\�IRU�FRQQHFWLQJ�WR6$3�V\VWHPV�
< 5HPRWH�FRQQHFWLRQV)RU�H[WHUQDO�FRQQHFWLRQV��PRELOH�HQG�XVHUV���IL[HG�,3�DGGUHVVHV�DUH�DVVLJQHG��2QHH[SOLFLW�HQWU\�SHU�H[WHUQDO�FRQQHFWLRQ�LV�PDLQWDLQHG�LQ�WKH�SHUPLVVLRQ�OLVW�IRU�6$3�URXWHU�
3URFHGXUHV
< ,7�0DQDJHU
(YHU\�WZR�PRQWKV��WKH�,7�PDQDJHU�DQG�WKH�V\VWHP�DGPLQLVWUDWRU�VKRXOG�UHYLHZ�V\VWHPVHFXULW\�
< 6XSHUXVHUV
7KH�6$3B$//�SURILOH�LV�UHPRYHG�IURP�WKH�XVHU�6$3 ��DQG�WKH�6$3 �XVHU�LV�ORFNHG��$OOPDLQWHQDQFH�WDVNV�DUH�SHUIRUPHG�XVLQJ�DFFRXQWV�ZLWK�WKH�6$3B$//�SURILOH�
< 6\VWHP�SDVVZRUGV7KH�V\VWHP�DGPLQLVWUDWRU�FKDQJHV�WKH�V\VWHP�SDVVZRUGV�HYHU\�IRXU�ZHHNV��7KH�V\VWHPDGPLQLVWUDWRU�PXVW�ZULWH�GRZQ�WKH�FXUUHQW�SDVVZRUGV�DQG�SODFH�WKHP�LQ�D�VHDOHGHQYHORSH��ZKLFK�PXVW�EH�VWRUHG�LQ�WKH�GDWD�VDIH�DQG�EH�DFFHVVLEOH�LQ�FDVH�RI�HPHUJHQF\�8VH�UHSRUW�56865����WR�FKHFN�LI�V\VWHP�SDVVZRUGV�KDYH�EHHQ�FKDQJHG�
Chapter 1: R/3 System Security and the Authorization Concept
Auditing Requirements
Authorizations Made Easy1–24
< 8VHU�SDVVZRUGV8VHUV�PXVW�FKDQJH�WKHLU�SDVVZRUGV�HYHU\�IRXU�ZHHNV�E\�VHWWLQJ�WKH�DSSURSULDWHSDUDPHWHUV�LQ�WKH�'()$8/7�SURILOH��7KLV�VWHS�HQVXUHV�WKDW�WKH�VHWWLQJV�DUH�YDOLG�LQ�WKHHQWLUH�V\VWHP��7KH�PLQLPXP�QXPEHU�RI�FKDUDFWHUV�IRU�D�SDVVZRUG�LV�VL[��DQG�WKHLQWUXGHU�ORFNRXW�FRXQW�LV�VHW�WR�WKUHH�
< 6$3�FRQQHFWLRQ$�FRQQHFWLRQ�EHWZHHQ�6$3�DQG�WKH�FXVWRPHU�LV�HVWDEOLVKHG�E\�VWDUWLQJ�6$3�URXWHU�LQ�WKHFXVWRPHU�QHWZRUN�DQG�VWDUWLQJ��IRU�H[DPSOH��6$3�*8,�IRU�DQ�6$31HW�²�5���)URQWHQGQRWH�FRQQHFWLRQ�
< 6$3�URXWHU6$3�URXWHU�LV�VWDUWHG�DQG�VWRSSHG�RQFH�D�GD\�WR�HQVXUH�WKHUH�LV�QR�RSHQ�FRQQHFWLRQV�
< 5HPRWH�FRQQHFWLRQV)RU�UHPRWH�XVHUV��GHGLFDWHG�,3�DGGUHVVHV�DUH�PDLQWDLQHG��7KHVH�DGGUHVVHV�PXVW�DOVR�EHPDLQWDLQHG�LQ�WKH�6$352877$%�WR�PDNH�VXUH�WKDW�XQDXWKRUL]HG�XVHUV�GR�QRW�ORJ�RQ�WR5���
5ROHV�DQG�5HVSRQVLELOLWLHV
7DVN 5ROH
'HILQLQJ�DQG�PDLQWDLQLQJ�6$352877$% 6\VWHP�DGPLQLVWUDWRU
0RQLWRULQJ�RSHQ�FRQQHFWLRQV 2SHUDWRU
6KXWWLQJ�GRZQ�UHVWDUWLQJ�6$3�URXWHU�GDLO\ 2SHUDWRU
5HYLHZLQJ�VHFXULW\�VWUDWHJ\ ,7�PDQDJHU
&KDQJLQJ�V\VWHP�SDVVZRUGV 6\VWHP�DGPLQLVWUDWRU
$XGLWLQJ�5HTXLUHPHQWV
,Q�5���WKHUH�DUH�VHYHUDO�DUHDV�UHODWHG�WR�DXGLWLQJ�< 3URFHVV�FRQWUROV< &KDQJH�PDQDJHPHQW< $XWKRUL]DWLRQ�LPSOHPHQWDWLRQ< 81,;< 'DWDEDVH
<RXU�VLWH�PD\�KDYH�DGGLWLRQDO�DXGLWLQJ�UHTXLUHPHQWV��1XPHURXV�FRPSDQLHV�KDYHLPSOHPHQWHG�H[FHOOHQW�DXGLWLQJ�SURFHGXUHV�EDVHG�RQ�VWDQGDUG�6$3�WRROV�DQG�FXVWRPHU�EXLOWWRROV��$PHULFDV·�6$3�8VHUV·�*URXS��$68*��,QWHUQDO�&RQWUROV�DQG�6HFXULW\�RIIHUV�WKH�EHVWLQIRUPDWLRQ�RQ�KRZ�RWKHU�FRPSDQLHV�KDYH�KDQGOHG�DXGLWLQJ�LQ�5����)RU�PRUH�LQIRUPDWLRQ�RQ�$68*�VHH�KWWS���ZZZ�DVXJ�FRP���)RU�PRUH�LQIRUPDWLRQ�RQ�DXGLWLQJ�VHH�FKDSWHU�����6$36HFXULW\�$XGLW�DQG�/RJJLQJ�
2–1
&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3
&RQWHQWV
Overview ..................................................................................................................2–2
ASAP Roadmap.......................................................................................................2–2
Knowledge Corner ..................................................................................................2–5
Questions and Answers Database (Q&Adb) ........................................................2–6
Authorization List....................................................................................................2–6
��
Chapter 2: Authorizations and ASAP
Overview
Authorizations Made Easy2–2
2YHUYLHZ
$FFHOHUDWHG6$3��$6$3��LV�6$3·V�FRPSUHKHQVLYH�LPSOHPHQWDWLRQ�VROXWLRQ�WR�VWUHDPOLQH�5��SURMHFWV��$6$3�LQWHJUDWHV�WKUHH�FRPSRQHQWV��WKH�$6$3�5RDGPDS��7RROV��DQG�5���6HUYLFH�DQG7UDLQLQJ��ZKLFK�ZRUN�LQ�FRQMXQFWLRQ�WR�VXSSRUW�WKH�UDSLG�DQG�HIILFLHQW�LPSOHPHQWDWLRQ�RIWKH�5���6\VWHP�< $FFHOHUDWHG6$3�5RDGPDS�GHOLYHUV�D�SURFHVV�RULHQWHG��FOHDU�DQG�FRQFLVH�SURMHFW�SODQ�WR
SURYLGH�VWHS�E\�VWHS�GLUHFWLRQ�WKURXJKRXW�\RXU�LPSOHPHQWDWLRQ�RI�5���< 7RROV�LQFOXGHV�$6$3�VSHFLILF�WRROV�WR�VXSSRUW�SURMHFW�PDQDJHPHQW��TXHVWLRQQDLUHV�IRU
WKH�EXVLQHVV�SURFHVV�FRQVXOWDQWV�DQG�QXPHURXV�WHFKQLFDO�JXLGHERRNV�DQG�FKHFNOLVWV�< 5���6HUYLFHV�DQG�7UDLQLQJ�LQFOXGHV�DOO�FRQVXOWLQJ��WUDLQLQJ��DQG�VXSSRUW�VHUYLFHV��IRU
H[DPSOH��KRWOLQH��(DUO\:DWFK��UHPRWH�XSJUDGHV�RU�DUFKLYLQJ��HWF����7KHVH�SURGXFWV�KHOSWR�VWDQGDUGL]H�FHUWDLQ�WDVNV�WR�SHUIRUP�WKHP�DV�TXLFNO\�DV�SRVVLEOH�
,Q�UHVSHFW�WR�DXWKRUL]DWLRQV��$6$3�GHVFULEHV�WKH�SURFHVV�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�FRQFHSW�:KLOH�WKLV�JXLGHERRN�KHOSV�\RX�LQ�WKH�WHFKQLFDO�LPSOHPHQWDWLRQ�RI�DXWKRUL]DWLRQV�$6$3GHVFULEHV�WKH�VHWXS�RI�DQ�DXWKRUL]DWLRQ�FRQFHSW�IURP�D�PHWKRGLFDO�DQG�RUJDQL]DWLRQDO�YLHZSRLQW��%\�IROORZLQJ�WKH�VWHSV�RI�$6$3�5RDGPDS��\RX�FDQ�HVWDEOLVK�\RXU�DXWKRUL]DWLRQFRQFHSW�ZLWK�D�SURYHQ�LPSOHPHQWDWLRQ�SURFHVV��7KH�.QRZOHGJH�&RUQHU�SURYLGHV�\RX�ZLWKWRROV�WKDW�KHOS�\RX�WR�DFFHOHUDWH�WKH�DXWKRUL]DWLRQ�LPSOHPHQWDWLRQ�
,Q�WKLV�FKDSWHU��ZH�EULHIO\�GLVFXVV�KRZ�WR�ZRUN�ZLWK�$6$3�DQG�ZKDW�LW�FRQWDLQV�LQ�UHJDUGVWR�DXWKRUL]DWLRQV��:H�H[SODLQ�KRZ�WR�DFFHVV�WKH�$6$3�FRPSRQHQWV�FRQWDLQLQJDXWKRUL]DWLRQ�UHODWHG�UHVRXUFHV�UDWKHU�WKDQ�GLVFXVVLQJ�WKH�FRQWHQWV�WKHPVHOYHV�
$6$3�5RDGPDS
7KH�$6$3�5RDGPDS�VWUXFWXUH�LV�GLYLGHG�LQWR�GLIIHUHQW�OHYHOV�< 3KDVH< :RUN�SDFNDJH< $FWLYLW\< 7DVN
2Q�WKH�KLJKHVW�OHYHO��WKH�$6$3�5RDGPDS�FRQVLVWV�RI�ILYH�SKDVHV��DV�IROORZV�
Chapter 2: Authorizations and ASAP
ASAP Roadmap
Release 4.6A/B2–3
�� 3URMHFW�3UHSDUDWLRQ,Q�WKLV�SKDVH��\RX�PDNH�VXUH�DOO�GHFLVLRQ�PDNHUV�DUH�RQ�ERDUG�IRU�\RXU�5��LPSOHPHQWDWLRQ�DQG�JDWKHU�\RXU�LQWHUQDO�DQG�H[WHUQDO�LPSOHPHQWDWLRQ�WHDP�
�� %XVLQHVV�%OXHSULQW&UHDWH�WKH�%XVLQHVV�%OXHSULQW�GRFXPHQWLQJ�\RXU�FRPSDQ\·V�EXVLQHVV�UHTXLUHPHQWV��7KH%XVLQHVV�%OXHSULQW�LV�D�YLVXDO�PRGHO�RI�\RXU�EXVLQHVV·�IXWXUH�VWDWH�DIWHU�\RX·YHLPSOHPHQWHG�WKH�5���6\VWHP��,W�DOORZV�\RXU�SURMHFW�WHDP�WR�FOHDUO\�GHILQH�\RXU�VFRSH�DQG�RQO\�IRFXV�RQ�WKH�5���SURFHVVHV�QHHGHG�WR�UXQ�\RXU�EXVLQHVV�
�� 5HDOL]DWLRQ,Q�WKLV�SKDVH��\RXU�LPSOHPHQWDWLRQ�WHDP�FRQILJXUHV�DQG�ILQH�WXQHV�WKH�5���6\VWHP�
�� )LQDO�3UHSDUDWLRQ7HVW�DOO�LQWHUIDFHV��WUDLQ�DOO�HQG�XVHUV��DQG�PLJUDWH�\RXU�EXVLQHVV�GDWD�WR�\RXU�5��6\VWHP�
�� *R�/LYH��6XSSRUW,Q�WKLV�SKDVH��JR�OLYH�ZLWK�5����<RX�HVWDEOLVK�SURFHGXUHV�DQG�PHDVXUHPHQWV�WR�UHYLHZWKH�EHQHILWV�RI�\RXU�5���LQYHVWPHQW�RQ�DQ�RQJRLQJ�EDVLV��6$3�VXSSRUW�DQG�VHUYLFHVDVVXUH�WKDW�\RXU�V\VWHP�FRQWLQXHV�WR�UXQ�VPRRWKO\��FOHDQO\��DQG�HIILFLHQWO\�
8VHU�DQG�DXWKRUL]DWLRQ�PDQDJHPHQW�LV�FRYHUHG�LQ�WKH�5HDOL]DWLRQ�SKDVH�RI�WKH�$6$35RDGPDS��,Q�WKH�ZRUN�SDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW��\RX�ILQG�D�GHVFULSWLRQ�RI�WKHPHWKRGRORJ\�WR�VHW�XS�DQ�DXWKRUL]DWLRQV�FRQFHSW��)ROORZ�WKH�VWHSV�EHORZ�
User and authorizationmanagement is coveredin phase 3, Realization
Chapter 2: Authorizations and ASAP
ASAP Roadmap
Authorizations Made Easy2–4
$XWKRUL]DWLRQV�LQ�WKH�5RDGPDS�6WUXFWXUH
�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�
�� 2Q�WKH�5RDGPDS�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH,PSOHPHQWDWLRQ�5RDGPDS�→��5HDOL]DWLRQ�→��(VWDEOLVK$XWKRUL]DWLRQ�&RQFHSW�
�� 2Q�WKH�ULJKW�VLGH��DQ�H[SODQDWLRQ�RIWKH�FRQWHQWV�DSSHDUV�IRU�WKH�QRGHVHOHFWHG�RQ�WKH�OHIW�
1RWH��'XH�WR�VWUXFWXUDO�GLIIHUHQFHV�LQ�WKH�$6$3�URDGPDS�EHWZHHQ�$6$3�5HOHDVH����$�DQG����%��WKHQXPEHU�RI�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�LV�HLWKHU������LQ�$6$3�5HOHDVH����$�RU������LQ$6$3�5HOHDVH����%�
7KH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�FRQWDLQV�WKUHH�DFWLYLWLHV��ZKLFK�DUH�
�� &UHDWH�$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ
�� ,PSOHPHQW�$XWKRUL]DWLRQ�&RQFHSW
�� 9DOLGDWH�$XWKRUL]DWLRQ�&RQFHSW
7R�DFFHVV�WKH�DFWLYLWLHV�EHORQJLQJ�WR�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�IROORZ�WKH�VWHSVEHORZ�
�� &KRRVH�WKH�ILUVW�DFWLYLW\��&UHDWH$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ��WR�JHWDQ�RYHUYLHZ�DERXW�WKH�WDVNV�WKLVDFWLYLW\�FRQWDLQV�
2
3
1
Chapter 2: Authorizations and ASAP
Knowledge Corner
Release 4.6A/B2–5
�� :RUN�\RXU�ZD\�WKURXJK�WKHGLIIHUHQW�WDVNV�
�� :KHQ�\RX�ILQLVK�WKHVH�WDVNV�FRQWLQXH�ZLWK�WKH�QH[W�DFWLYLW\�DQGLWV�WDVNV�
.QRZOHGJH�&RUQHU
7KH�.QRZOHGJH�&RUQHU��.&��LV�D�FROOHFWLRQ�RI�UHVRXUFHV�WKDW�KHOSV�\RX�WR�DFFHOHUDWH�WKH�5��LPSOHPHQWDWLRQ��,Q�RUGHU�WR�DFFHVV�DOO�DYDLODEOH�DXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROV�LQ�WKH�.QRZOHGJH&RUQHU��IROORZ�WKH�VWHSV�EHORZ�
�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�
�� 2Q�WKH�.&�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH�6$33URGXFWV�→��&URVV�$SSOLFDWLRQ�→$XWKRUL]DWLRQV�
�� 7KH�XSSHU�ULJKW�WLOH�VKRZV�DQH[SODQDWLRQ�RI�WKH�FRQWHQWV�IURP�WKHOHIW�
�� 7KH�ORZHU�ULJKW�WLOH�VKRZV�DOODXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROVDYDLODEOH�LQ�WKH�.&�
2
3
2
4
Chapter 2: Authorizations and ASAP
Questions and Answers Database (Q&Adb)
Authorizations Made Easy2–6
4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�
:KDW�,V�WKH�4$GE"
7KH�4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE��LV�D�WRRO�WKDW�KHOSV�\RX�WR�DQDO\]H�DQGGHWHUPLQH�WKH�VFDOH�DQG�VFRSH�RI�\RXU�V\VWHP�LPSOHPHQWDWLRQ�GXULQJ�WKH�%XVLQHVV�%OXHSULQWSKDVH�RI�DQ�$6$3�LPSOHPHQWDWLRQ�SURMHFW��,Q�WKH�4$GE��DOO�SURFHVVHV�WKDW�FDQ�EHLPSOHPHQWHG�LQ�WKH�5���6\VWHP�DUH�GLVSOD\HG�LQ�D�WUHH�FDOOHG�WKH�UHIHUHQFH�VWUXFWXUH��:KLOHGHILQLQJ�WKH�%XVLQHVV�%OXHSULQW��\RX�DUH�VHWWLQJ�WKH�EXVLQHVV�SURFHVVHV�LQ�VFRSH�WKDW�\RX�DLPWR�LPSOHPHQW�ZLWK�WKH�5���6\VWHP�
$V�RI�$6$3�5HOHDVH����%��\RX�FDQ�FUHDWH�XVHU�UROHV�LQ�WKH�4$GE�DQG�DVVLJQ�WKH�SURFHVVHVWR�EH�LPSOHPHQWHG�WR�WKHVH�UROHV��7KLV�LQIRUPDWLRQ�LV�ODWHU�SDVVHG�WR�WKH�$XWKRUL]DWLRQ�/LVWZKHUH�\RX�FDQ�FRPSOHWH�WKH�XVHU�UROH�GHILQLWLRQ�
+RZ�WR�:RUN�ZLWK�WKH�4$GE
)RU�GHWDLOV�RQ�KRZ�WR�FUHDWH�DQG�PDLQWDLQ�XVHU�UROHV�ZLWKLQ�WKH�4$GE��VHH�WKH�4$GERQOLQH�KHOS�
+RZ�WR�*HQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE
,Q�RUGHU�WR�UHILQH�WKH�XVHU�UROHV�WKDW�\RX�KDYH�GHILQHG�LQ�WKH�4$GE��\RX�FDQ�JHQHUDWH�WKH$XWKRUL]DWLRQ�/LVW��'XULQJ�WKH�JHQHUDWLRQ�RI�WKH�$XWKRUL]DWLRQ�/LVW��ERWK�WKH�SURFHVVHV�VHW�LQVFRSH�DQG�WKH�GHILQHG�XVHU�UROHV�DUH�WUDQVIHUUHG�WR�WKH�$XWKRUL]DWLRQ�/LVW��)RU�GHWDLOV�RQKRZ�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE��VHH�WKH�4$GE�RQOLQH�KHOS�
$XWKRUL]DWLRQ�/LVW
:KDW�,V�WKH�$XWKRUL]DWLRQ�/LVW"
7KH�$XWKRUL]DWLRQ�/LVW�LV�DQ�([FHO�ZRUNVKHHW�WKDW�KHOSV�\RX�WR�PRGHO�\RXU�XVHU�UROHV�SULRUWR�WKH�LPSOHPHQWDWLRQ�LQ�WKH�5���6\VWHP��8VLQJ�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FDQ�GHVLJQ�XVHUUROHV�LQ�DQ�HDUO\�V\VWHP�LPSOHPHQWDWLRQ�SKDVH�HYHQ�ZLWKRXW�KDYLQJ�LQVWDOOHG�5���
,Q�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FUHDWH�XVHU�UROHV�DQG�GHILQH�WKH�WUDQVDFWLRQV�DVVRFLDWHG�ZLWKWKHVH�UROHV��7R�PRGHO�WKH�XVHU�UROHV��WKH�$XWKRUL]DWLRQ�/LVW�SURYLGHV�\RX�WZR�GLIIHUHQWYLHZV�< 3URFHVV�YLHZ
7KH�SURFHVV�YLHZ��5ROHV�'HVLJQ���4$GE�VFRSH�WDE��LV�JHQHUDWHG�IURP�WKH�4$GE�DQGFRQWDLQV�WKH�SURFHVVHV�WKDW�KDYH�EHHQ�VHW�LQ�VFRSH�GXULQJ�WKH�%XVLQHVV�%OXHSULQW�SKDVH�$OO�SURFHVVHV�DUH�GLVSOD\HG�LQ�WKH�VDPH�KLHUDUFK\�DV�LQ�WKH�UHIHUHQFH�VWUXFWXUH�RI�WKH4$GE��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WKH�SURFHVVHV�WR�LQFOXGH�WKHP�LQ�WKHXVHU�UROHV�
Chapter 2: Authorizations and ASAP
Authorization List
Release 4.6A/B2–7
< 0HQX�YLHZ
,Q�WKH�PHQX�YLHZ��5ROHV�'HVLJQ�¥�6$3�PHQX�WDE���DOO�WUDQVDFWLRQV�LQ�WKH�VWDQGDUG�6$3PHQX�DUH�GLVSOD\HG��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WUDQVDFWLRQV�IURP�WKH�6$3PHQX�WR�LQFOXGH�WKHP�LQ�\RXU�XVHU�UROHV�
$IWHU�FRPSOHWLQJ�WKH�PRGHOLQJ�RI�XVHU�UROHV��\RX�FDQ�JHQHUDWH�DQ�RYHUYLHZ�RI�DOOWUDQVDFWLRQV�LQFOXGHG�LQ�HDFK�XVHU�UROH�
+RZ�WR�:RUN�ZLWK�WKH�$XWKRUL]DWLRQ�/LVW
7R�XVH�WKH�$XWKRUL]DWLRQ�/LVW�IRU�WKH�GHVLJQ�DQG�LPSOHPHQWDWLRQ�RI�\RXU�DXWKRUL]DWLRQFRQFHSW��IROORZ�WKH�VWHSV�EHORZ�
�� *HQHUDWH�DXWKRUL]DWLRQ�OLVW�IURP�WKH�4$GE
�� 'HILQH�XVHU�UROHV
�� *HQHUDWH�XVHU�UROHV�RYHUYLHZ
�� %XLOG�XVHU�UROHV
*HQHUDWH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE
7R�ZRUN�ZLWK�SURFHVV�YLHZ��\RX�QHHG�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE�3URFHHG�DV�GHVFULEHG�LQ�WKH�4$GE�RQOLQH�KHOS�
(YHQ�LI�\RX�GR�QRW�ZRUN�ZLWK�WKH�4$GE��\RX�FDQ�XVH�WKH�$XWKRUL]DWLRQ�/LVW��7KH�WHPSODWHFDQ�EH�IRXQG�LQ�WKH�$6$3�.QRZOHGJH�&RUQHU��+RZHYHU��WKH�SURFHVV�YLHZ�ZLOO�EH�HPSW\��WKXV\RX�FDQ�GHILQH�\RXU�XVHU�UROHV�RQO\�YLD�WKH�PHQX�YLHZ�
Chapter 2: Authorizations and ASAP
Authorization List
Authorizations Made Easy2–8
'HILQH�8VHU�5ROHV
7R�GHILQH�D�XVHU�UROH��\RX�QHHG�WR�FUHDWH�D�XVHU�UROH�DQG�DVVLJQ�SURFHVVHV�RU�WUDQVDFWLRQV�WR�WKDW�XVHU�UROH�
�� 2SHQ�WKH�$XWKRUL]DWLRQ�/LVW�
�� (QWHU�%XVLQHVV�$UHD�DQG�5ROH1DPH�IRU�WKH�XVHU�UROH�WKDW\RX�ZDQW�WR�FUHDWH�
�� 0DUN�WKH�GHVLUHG�WUDQVDFWLRQV�
&KRRVH�&OLFN�KHUH�IRU�LQVWUXFWLRQVWR�JHW�DQ�H[SODQDWLRQ�RQ�WKHIXQFWLRQDOLW\�RI�WKH�$XWKRUL]DWLRQ/LVW�
7KH�FRPSOHWH�IXQFWLRQDOLW\�RI�WKH$XWKRUL]DWLRQ�/LVW�LV�GHVFULEHG�LQWKH�KHOS�ZLQGRZ�VKRZQ�WR�WKHULJKW�
2
3
Tip
Chapter 2: Authorizations and ASAP
Authorization List
Release 4.6A/B2–9
*HQHUDWH�8VHU�5ROHV�2YHUYLHZ
7R�JHQHUDWH�WKH�XVHU�UROHV�RYHUYLHZ�IURP�WKH�$XWKRUL]DWLRQ�/LVW�
�� 6HOHFW�WKH�7�&RGHV�SHU�5ROH�WDE�
�� &KRRVH�*HQHUDWH�2YHUYLHZ�WRFUHDWH�IRU�HDFK�XVHU�UROH�D�OLVWRI�WUDQVDFWLRQV�DVVLJQHG�WRWKDW�UROH�
�� )RU�DOO�XVHU�UROHV��WKH�VHOHFWHGWUDQVDFWLRQV�DUH�VXPPDUL]HGLQ�WKH�$XWKRUL]DWLRQ�/LVW�
(YHU\�WLPH�\RX�PDNH�FKDQJHV�WR�WKH�UROHV�RU�FUHDWH�QHZ�UROHV�WKH�7�&RGHV�SHU�5ROHRYHUYLHZ�QHHGV�WR�EH�UHJHQHUDWHG�
%XLOG�8VHU�5ROHV
8VLQJ�WKH�3*��FUHDWH�DOO�WKH�VLQJOH�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�UHTXLUHG�WR�LPSOHPHQW�WKHXVHU�UROHV�GHILQHG�LQ�WKH�$XWKRUL]DWLRQ�/LVW�
1
2
Chapter 2: Authorizations and ASAP
Authorization List
Authorizations Made Easy2–10
3–1
&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH
*HQHUDWRU
&RQWHQWV
Overview ..................................................................................................................3–2
Confirming that the Profile Generator Is Active ..................................................3–2
Loading the USOBX_C and USOBT_C tables ......................................................3–4
Getting Support from the SAPNet – R/3 Frontend Notes....................................3–7
��
Chapter 3: Setting Up the Profile Generator
Overview
Authorizations Made Easy3–2
2YHUYLHZ
�8VLQJ�WKH�3URILOH�*HQHUDWRU��3*��LQ�5HOHDVH����[�PDNHV�VHQVH�IRU�QHZ�FXVWRPHUV�MXVWVWDUWLQJ�WKHLU�5���SURMHFW�DQG�FXUUHQW�FXVWRPHUV�ZLWK�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�LQ�DQHDUOLHU�5���UHOHDVH��0DLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68���DUH�QR�ORQJHU�UHTXLUHG��DQGFXVWRPHUV�ZKR�KDYH�SUHYLRXVO\�EHHQ�XVLQJ�WKLV�PHWKRG�VKRXOG�IDPLOLDUL]H�WKHPVHOYHV�ZLWKWKH�3*��,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWKRXW�WKH�3*��6$3�RIIHUV�\RX�DZD\�WR�PLJUDWH�WKHVH�SURILOHV�WR�WKH�3*�
)RU�LQIRUPDWLRQ�RQ�XSJUDGLQJ�WR�5HOHDVH�����IURP�D�SUHYLRXV�UHOHDVH��VHH�FKDSWHU����8SJUDGH�
6HWWLQJ�XS�WKH�3*�LQ����[�FRQVLVWV�RI�WZR�VWHSV�
�� &RQILUPLQJ�WKDW�WKH�3*�LV�DFWLYH�
�� /RDGLQJ�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��
&RQILUPLQJ�WKDW�WKH�3URILOH�*HQHUDWRU�,V�$FWLYH
:LWK�5���5HOHDVH������WKH�3*�LV�DOUHDG\�DFWLYDWHG��<RX�GR�QRW�KDYH�WR�VHW�WKH�V\VWHPSDUDPHWHU�LQ�WKH�5���LQVWDQFH�SURILOH�LI�\RX�KDYH�LQVWDOOHG�WKH�5���5HOHDVH�����DV�D�QHZV\VWHP��7KH�GHIDXOW�YDOXH�LV�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<�
&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU
,I�\RX�DUH�QRW�VXUH�ZKHWKHU�WKH�3*�LV�DFWLYDWHG��\RX�FDQ�FKHFN�WKH�LQVWDQFH�SURILOHSDUDPHWHU��7KH�IROORZLQJ�SURFHGXUH�VKRZV�\RX�KRZ�WR�FKHFN�LI�\RXU�SURILOH�SDUDPHWHU�LV�VHWFRUUHFWO\�DQG�DFWLYH��7R�FKHFN�LI�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�LV�VHW�FRUUHFWO\��UXQ�WKH�UHSRUW563$5$0�DV�VKRZ�EHORZ�
Chapter 3: Setting Up the Profile Generator
Confirming that the Profile Generator Is Active
Release 4.6A/B3–3
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�SA38�DQG�FKRRVH�(QWHU��RU�FKRRVH 6\VWHP�→�6HUYLFHV�→�5HSRUWLQJ��
�� (QWHU�RSPARAM�LQ�WKH�3URJUDPILHOG�
�� &KRRVH�([HFXWH�
$�OLVW�RI�SDUDPHWHU�QDPHV�DSSHDUV�ZLWK�FRUUHVSRQGLQJ�XVHU�GHILQHG�YDOXHV��7KH�SDUDPHWHUQDPHV�DUH�SURYLGHG�LQ�YDULDEOH�IRUP��$W�UXQWLPH��WKHVH�YDULDEOHV�DUH�UHSODFHG�ZLWK�DFWXDOYDOXHV��8VHU�GHILQHG�YDOXHV�DUH�WKH�DFWXDO�YDOXHV�RI�WKH�LQGLYLGXDO�SDUDPHWHUV�
�� ,I�DFWLYH��WKH�SURILOH�SDUDPHWHUIRU�WKH�3*�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�GLVSOD\HG�DV�D�<�LQWKH�WKLUG�FROXPQ�
8VH�WKH� �LFRQ�WR�VHDUFK�IRU�WKH�HQWU\�auth/no_check_in_some_cases�LQ�WKH�OLVW�LI�\RXGR�QRW�VHH�LW�ULJKW�DZD\�
,I�WKH�YDOXH�<�IRU�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�QRWGLVSOD\HG��\RX�PXVW�ILUVW�FKDQJH�WKH�LQVWDQFH�SURILOH�DQG�WKHQ�UHERRW�WKH�5���LQVWDQFH�)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�GR�WKLV��VHH�FKDSWHU�����8SJUDGH�
2
3
4
Tip
Chapter 3: Setting Up the Profile Generator
Loading the USOBX_C and USOBT_C tables
Authorizations Made Easy3–4
/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV
/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV�LV�DFFRPSOLVKHG�LQ�WZR�VWHSV��� ,QLWLDO�FRS\LQJ�RI�6$3�GHIDXOWV�LQWR�WKH�FXVWRPHU�WDEOHV�� 7UDQVSRUWLQJ�WKH�GHIDXOWV�
,QLWLDO�&RS\LQJ�RI�6$3�'HIDXOWV�LQWR�WKH�&XVWRPHU�7DEOHV��68���
8VLQJ�WUDQVDFWLRQ�68����&RS\�LQLWLDO�GHIDXOWV���FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV��WDEOHV�862%;�DQG�862%7�7KLV�VWHS�LPSRUWV�WKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWV�IRU�WKH�DXWKRUL]DWLRQ�REMHFWV�ZLWKLQ�D�WUDQVDFWLRQ�DQGWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�3*�LQWR�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&��:H�GLVFXVV�KRZ�WRHGLW�WKHVH�YDOXHV�XVLQJ�WUDQVDFWLRQ�68���LQ�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SPRO�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�WUHH��FKRRVH�7RROV�→�$FFHOHUDWHG6$3�→�&XVWRPL]LQJ�→�(GLW�3URMHFW��
�� &KRRVH� �6$3�5HIHUHQFH�,0*�
�� ,Q�WKH�,0*��RSHQ�%DVLV�&RPSRQHQWV→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUVDQG�$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ3URILOH�*HQHUDWRU�DQG�FKRRVH� �QH[WWR�:RUN�RQ�6$3�&KHFN�,QGLFDWRUV�DQG)LHOG�9DOXHV�
7R�UHDFK�WKH�3URILOH�*HQHUDWRU��8SJUDGHDQG�)LUVW�,QVWDOODWLRQ�VFUHHQ�\RX�PD\DOWHUQDWLYHO\�XVH�WUDQVDFWLRQ�SU25�
3
Chapter 3: Setting Up the Profile Generator
Loading the USOBX_C and USOBT_C tables
Release 4.6A/B3–5
�� 2Q�WKH�QH[W�VFUHHQ�VHOHFW�&RS\�6$3�WHVW�VWDWXVHV�DQG�ILHOG�YDOXHV��WKLV�WUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&RS\�6$3�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV��
�� &KRRVH� �QH[W�WR����,QLWLDOO\�ILOO�WKHFXVWRPHU�WDEOHV��LI�\RX�KDYH�QRWSUHYLRXVO\�ZRUNHG�ZLWK�WKH�3*�RULI�\RX�ZDQW�WR�UHWUDQVIHU�DOO�6$3GHIDXOW�YDOXHV��7KLV�VWHS�PD\�WDNHVHYHUDO�PLQXWHV�
,I�\RX�KDYH�QRW�SUHYLRXVO\�ZRUNHGZLWK�WKH�3*�RU�\RX�ZDQW�WR�UHWUDQVIHUDOO�6$3�GHIDXOW�YDOXHV��XVH����,QLWLDOO\ILOO�WKH�FXVWRPHU�WDEOHV�IXQFWLRQ�XQGHU,QVWDOOLQJ�WKH�3URILOH�*HQHUDWRU�
,I�\RX�KDYH�DOUHDG\�ZRUNHG�ZLWK�WKH3*�DQG�ZDQW�WR�FRPSDUH�\RXU�GDWDZLWK�WKH�6$3�GHIDXOW�YDOXHV��VHHFKDSWHU�����8SJUDGH�
�� $�ZDUQLQJ�PHVVDJH�DSSHDUV�RQ�D�GLDORJ�ER[��5HDG�LW�FDUHIXOO\�DQG�FKRRVH� �
5
6
Chapter 3: Setting Up the Profile Generator
Loading the USOBX_C and USOBT_C tables
Authorizations Made Easy3–6
7UDQVSRUWLQJ�WKH�'HIDXOWV
�� &KRRVH� �QH[W�WR����7UDQVSRUW�WKHFXVWRPHU�WDEOHV�WR�WUDQVSRUW�WKH�3*FXVWRPHU�WDEOHV��862%;B&�DQG862%7B&��
$W�WKLV�WLPH�SHUIRUP�RQO\�VWHSV��DQG����'R�QRW�UXQ�VWHSV��$�WKURXJK�'�\HW��6HH�FKDSWHU�����8SJUDGH�IRUPRUH�LQIRUPDWLRQ�
1RWH�WKDW�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��DUH�FRPSOHWHO\�WUDQVSRUWHG��$OOFKDQJHV�WR�DXWKRUL]DWLRQ�FKHFNV�WKDW�ZHUH�PDGH�LQ�WKLV�WUDQVDFWLRQ�RU�LQ�68���DUH�DOVRWUDQVSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��7KLV�VWHS�UHSODFHV�DOO�WKH�ILHOG�YDOXH�DQG�FKHFN�LQGLFDWRUVHWWLQJV�LQ�WKH�WDUJHW�V\VWHP�
1R�DFWLYLW\�JURXSV�RU�DXWKRUL]DWLRQ�SURILOHV�DUH�WUDQVSRUWHG�LQ�WKLV�VWHS��7R�WUDQVSRUW�QHZO\JHQHUDWHG�DFWLYLW\�JURXSV��XVH�WKH�DFWLYLW\�JURXS�WUDQVSRUW�FRQQHFWLRQ�
�� &KRRVH� �DIWHU�WKH�UHSRUW�LV�ILQLVKHG�
�� &KRRVH� �RQ�WKH�IROORZLQJ�VFUHHQ�WR�ILQLVK�WKH�SURFHGXUH�
7
Chapter 3: Setting Up the Profile Generator
Getting Support from the SAPNet – R/3 Frontend Notes
Release 4.6A/B3–7
*HWWLQJ�6XSSRUW�IURP�WKH�6$31HW�²�5���)URQWHQG�1RWHV
$�VPRRWK�VHFXULW\�LPSOHPHQWDWLRQ�RI�\RXU�SURMHFW�LV�LPSRUWDQW��7KH�WRS�SULRULWLHV�RI�WKH6$31HW�²�5���)URQWHQG�1RWHV��IRUPHUO\�266��DUH�WR�VXSSRUW�\RXU�ZRUN�DQG�VSHHG�XS�\RXULPSOHPHQWDWLRQ��7KH�6$31HW�²�5���)URQWHQG�QRWHV�DUH�DQ�HDV\�WR�XVH��GLUHFWFRPPXQLFDWLRQ�OLQN�WR�6$3�VR�\RX�FDQ�TXLFNO\�DQG�HIILFLHQWO\�REWDLQ�SUREOHP�VROYLQJLQIRUPDWLRQ��6$31HW�²�5���)URQWHQG�QRWHV�JLYHV�\RX�D�IDVWHU�UHVSRQVH�WLPH�E\�DOORZLQJ�\RXWR�E\SDVV�WKH�6$3�KHOS�GHVN�DQG�HQWHU�SUREOHPV�GLUHFWO\�LQWR�RXU�GDWDEDVH�
%\�HQWHULQJ�SUREOHPV�RU�LQTXLULHV�GLUHFWO\�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��\RX�FDQ�< 7DNH�DGYDQWDJH�RI�5���VHUYLFHV��UHJDUGOHVV�RI�WKH�DYDLODELOLW\�DQG�ZRUNORDG�RI�WKH
UHVSRQVLEOH�KHOS�GHVN�SHUVRQQHO< 4XLFNO\�UHSRUW�\RXU�SUREOHPV< 'LUHFWO\�VXEPLW�\RXU�SUREOHPV�WR�ILUVW�OHYHO�FXVWRPHU�VHUYLFH�IRU�SURFHVVLQJ
$FFHVVLQJ�WKH�(UURU�1RWHV�'DWDEDVH
6$31HW�²�5���)URQWHQG�QRWHV�DFWLYHO\�LQYROYHV�\RX�LQ�WKH�SUREOHP�VROYLQJ�SURFHVV�E\JLYLQJ�\RX�GLUHFW�DFFHVV�WR�6$3·V�LQWHUDFWLYH�(UURU�1RWHV�GDWDEDVH��7KLV�GDWDEDVH�FRQWDLQVHUURU�OLVWLQJV�DQG�VROXWLRQV�WR�FRPPRQ�V\VWHP�SUREOHPV��:LWK�WKH�6$31HW�²�5���)URQWHQGQRWHV��\RX�FDQ�YLHZ�WKHVH�VROXWLRQV�ZLWKRXW�VXEPLWWLQJ�D�SUREOHP�PHVVDJH�WR�ILUVW�OHYHOFXVWRPHU�VHUYLFH��'LUHFW�DFFHVV�WR�WKH�(UURU�1RWHV�GDWDEDVH��ZLWK�WKH�6$31HW�²�5��)URQWHQG�QRWHV��DOVR�SURYLGHV�KHOSIXO�WLSV�RQ�DYRLGLQJ�SRWHQWLDO�SUREOHPV�
1RZ�LV�D�JRRG�WLPH�WR�ORRN�DW�WKH�6$31HW�²�5���)URQWHQG�QRWHV�OLVWHG�LQ�DSSHQGL[�$�7KHVH�QRWHV�KHOS�\RX�SUHSDUH�IRU�IXUWKHU�5���VHFXULW\�VHWXS�WDVNV�
<RX�VKRXOG�DOVR�ORRN�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LI�DQ\�H[SHULHQFHV�RFFXUWKDW�DUH�QRW�FRYHUHG�E\�WKLV�JXLGHERRN�
7R�XVH�6$31HW�¥�5���)URQWHQG�QRWHV�
�� &RQWDFW�\RXU�V\VWHP�DGPLQLVWUDWRU�IRU�DQ\�IXUWKHU�LQIRUPDWLRQ�DERXW�WKH�6$31HW�²5���)URQWHQG�QRWHV��
�� )LQG�RXW�ZKR�DOUHDG\�KDV�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LQ�\RXUFRPSDQ\�
�� 0DNH�VXUH�\RX�KDYH�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��
�� /RJ�RQ�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�DQG�EURZVH�WKURXJK�WKH�6$31HW�²�5��)URQWHQG�QRWHV�LQ�DSSHQGL[�$�
Chapter 3: Setting Up the Profile Generator
Getting Support from the SAPNet – R/3 Frontend Notes
Authorizations Made Easy3–8
3ULQWLQJ�,PSRUWDQW�6$31HW�²�5���)URQWHQG�1RWHV
6LQFH�ZH�UHIHU�WR�FHUWDLQ�6$31HW�²�5���)URQWHQG�QRWHV�LQ�WKLV�JXLGHERRN��SOHDVH�OHDUQ�KRZWR�SULQW�D�QRWH�SURSHUO\��7KH�SULQW�IXQFWLRQ�LV�QRW�VXSSRUWHG�LQ�6$31HW�²�5���)URQWHQGQRWHV��VR�\RX�PXVW�ILUVW�GRZQORDG�WKH�QRWH�DQG�SULQW�LW�ORFDOO\��5HDG�QRWHV�������DQG������WR�IDPLOLDUL]H�\RXUVHOI�ZLWK�GRZQORDGLQJ�DQG�SULQWLQJ�WKH�QRWHV��%HIRUH�\RX�FRQWLQXH��SULQWRXW�WKH�QRWHV�LQ�DSSHQGL[�$�DQG�NHHS�WKHP�DV�KDQG\�UHIHUHQFH�WRROV�
$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�<RXU�5���6\VWHP
$GYDQFH�FRUUHFWLRQV�VKRXOG�EH�DSSOLHG�RQO\�ZLWK�WKH�DSSURYDO�RI�WKH�%DVLV�6\VWHP$GPLQLVWUDWRU�
7KH�5���6\VWHP�QHHGV�FHUWDLQ�FRUUHFWLRQV�WR�SHUIRUP�SURSHUO\��7R�DSSO\�WKHVH�FRUUHFWLRQV�LQDGYDQFH��UHIHU�WR�6$31HW�²�5���)URQWHQG�QRWH�������IRU�WKH�DYDLODELOLW\�RI�WKH�3*�KRWSDFNDJHV�IRU�5HOHDVHV����$�DQG����%�
4–1
&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ
&RQWHQWV
Overview ..................................................................................................................4–2
System Users ..........................................................................................................4–2
User Groups ............................................................................................................4–5
Authorizations and Authorization Profiles...........................................................4–6
Mass Operations .....................................................................................................4–6
Creating a New User (Client-Specific)...................................................................4–7
Changing a User’s Password ..............................................................................4–10
User Information System .....................................................................................4–12
��
Chapter 4: User Administration
Overview
Authorizations Made Easy4–2
2YHUYLHZ
<RX�KDYH�WZR�RSWLRQV�WR�VHW�XS�\RXU�XVHU�DGPLQLVWUDWLRQ�< &HQWUDO�8VHU�$GPLQLVWUDWLRQ< &OLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ
,Q�WKLV�FKDSWHU��ZH�RQO\�GHVFULEH�WKH�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��,I�\RX�DUH�XVLQJ�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ��VHH�FKDSWHU�����6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�PRUHLQIRUPDWLRQ�
5���DOORZV�\RX�WR�GHILQH�DQG�PDLQWDLQ�XVHUV�DQG�XVHU�DXWKRUL]DWLRQV�E\�JLYLQJ�\RX�SUHFLVHFRQWURO�RYHU�XVHU�DFFHVV��7KH�GHILQLWLRQ�DQG�YDOLGDWLRQ�RI�DXWKRUL]DWLRQ�WHFKQRORJ\�LVLQWHJUDWHG�LQWR�WKH�6$3�GHYHORSPHQW�HQYLURQPHQW�DQG�LV�HDVLO\�DGGHG�WR�FXVWRPHUPRGXOHV�
$OWKRXJK�XVHU�DGPLQLVWUDWLRQ�LV�DQ�RQJRLQJ�SURFHVV��\RX�VKRXOG�QRW�DGPLQLVWHU�\RXU�XVHUVLQ�D�SURGXFWLYH�HQYLURQPHQW��3HUIRUP�XVHU�DGPLQLVWUDWLRQ�WDVNV�LQ�\RXU�'(9�V\VWHP��:KHQ\RX�WUDQVSRUW�WKH�DFWLYLW\�JURXSV��WKH�XVHUV�DUH�DOVR�WUDQVSRUWHG�WKURXJK�WKH�4$6�WR�\RXU35'�V\VWHP��ZKHQHYHU�XVHUV�DQG�DXWKRUL]DWLRQ�REMHFWV�DUH�< &UHDWHG< 'HOHWHG< &KDQJHG< 0RQLWRUHG
+RZHYHU��\RX�PLJKW�KDYH�GLIIHUHQW�XVHUV�LQ�WKH�'(9�DQG�4$6�V\VWHP�WKDW�\RX�GR�QRW�QHHGLQ�\RXU�35'�V\VWHP�ODWHU��IRU�H[DPSOH�D�GHYHORSHU���$Q�DGPLQLVWUDWRU·V�UROH�LQ�WKLV�SURFHVVYDULHV�GHSHQGLQJ�RQ�KRZ�XVHU�DGPLQLVWUDWLRQ�WDVNV�DUH�GHOHJDWHG�
(YHQ�LI�\RX�DUH�XVLQJ�WKH�+5�PRGXOH��XVHU�DGPLQLVWUDWLRQ�VWLOO�QHHGV�WR�EH�VHW�XS��EXWPDLQWHQDQFH�LQ�WKH�ORQJ�UXQ�LQFOXGHV�RWKHU�IDFHWV�
6\VWHP�8VHUV
,Q�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��XVHUV�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFK�FOLHQW�LQ\RXU�V\VWHP��$�XVHU�GHILQLWLRQ�KDV�PDQ\�RI�WKH�IROORZLQJ�FRPSRQHQWV�< %DVLF�XVHU�GDWD
� 1DPH� 3DVVZRUG� $GGUHVV� &RPSDQ\�LQIRUPDWLRQ
Chapter 4: User Administration
System Users
Release 4.6A/B4–3
< 8VHU�GHIDXOWV� /RJRQ�ODQJXDJH� 'HIDXOW�SULQWHU� 'DWH�DQG�GHFLPDO�IRUPDWV� 'HIDXOW�WLPH�]RQH
< 8VHU�SURILOH�LQIRUPDWLRQ� 3DUWV�RI�5���D�XVHU�FDQ�DFFHVV� 8VHU�JURXSV� $FWLYH�DQG�H[SLUDWLRQ�GDWHV�RI�D�XVHU·V�DFFRXQW
7KHUH�DUH�WZR�ZD\V�WR�FUHDWH�XVHUV��)LUVW��IURP�VFUDWFK��E\�GHILQLQJ�WKH�YDULRXV�XVHUFRPSRQHQWV��DQG�VHFRQG��E\�FRS\LQJ�DQ�H[LVWLQJ�XVHU��:KHQ�FRS\LQJ�DQ�H[LVWLQJ�XVHU��\RXPD\�DOVR�FRS\�WKH�GHIDXOWV��DGGUHVV��DQG�PHPRU\�SDUDPHWHU�VHWWLQJV�
([WHUQDO�5���8VHUV
([WHUQDO�XVHUV�LQFOXGH�WKRVH�FUHDWHG�IRU�:LQGRZV�17�DFWLYLWLHV��IRU�H[DPSOH�6$36,'!DGP��DGPLQLVWUDWRU��DQG�6$36HUYLFH��6$36,'!��DQG�GDWDEDVH�FRQQHFWLRQV�6$35���GDWDEDVH�DGPLQLVWUDWRU��DQG�64/�XVHUV��
,QWHUQDO�5���8VHUV
,QWHUQDO�XVHUV�DUH�FUHDWHG�DQG�PDLQWDLQHG�LQ�5����(DFK�XVHU�LV�DVVLJQHG�D�XVHU�W\SH�ZKLFKFRQWUROV�KRZ�WKH�XVHU�LQWHUDFWV�ZLWK�5���
,QWHUQDO�XVHU�W\SHV�LQFOXGH�< 'LDORJ< %DWFK�'DWD�&RPPXQLFDWLRQ��%'&�< %DFNJURXQG< &3,&
'LDORJ
7KH�GLDORJ�XVHU�W\SH�KDQGOHV�RQOLQH�WUDQVDFWLRQV�DQG�DSSOLHV�WR�PRVW�XVHUV�LQ�D�FRPSDQ\�'LDORJ�XVHUV�PD\�ORJ�RQ�DQG�LQWHUDFWLYHO\�ZRUN�ZLWK�5����7KHVH�XVHUV�DUH�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV�DQG�UHTXLUH�DXWKRUL]DWLRQ�SURILOHV�DQG�SDVVZRUGV��$OWKRXJK�LW�LV�QRWUHTXLUHG��GLDORJ�XVHUV�VKRXOG�EH�DVVLJQHG�WR�D�XVHU�JURXS�
%DWFK�'DWD�&RPPXQLFDWLRQ
7KH�EDWFK�GDWD�FRPPXQLFDWLRQ��%'&�RU�EDWFK�LQSXW��XVHU�W\SH�LV�XVHG�IRU�DXWKRUL]DWLRQFKHFNV�ZKHQ�SURFHVVLQJ�D�EDWFK�LQSXW�VHVVLRQ��7KHVH�XVHUV�FDQQRW�ORJ�RQ�RU�ZRUNLQWHUDFWLYHO\�DQG�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�
%DFNJURXQG
7KH�EDFNJURXQG�XVHU�W\SH�UXQV�EDFNJURXQG�MREV��7KHVH�XVHUV�FDQQRW�ORJ�RQ�DQG�ZRUNLQWHUDFWLYHO\��7KH�DGPLQLVWUDWRU�FDQ�FUHDWH�EDFNJURXQG�XVHUV�ZLWK�WKH�QHFHVVDU\DXWKRUL]DWLRQV�WR�SHUIRUP�D�VHULHV�RI�WDVNV��7R�GHILQH�WKH�EDFNJURXQG�MREV��FKDQJH�WKH�XVHUILHOG�WR�WKH�EDFNJURXQG�XVHU�QDPH�\RX�FUHDWHG��$OO�DXWKRUL]DWLRQ�FKHFNV�JR�DJDLQVW�WKH
Chapter 4: User Administration
System Users
Authorizations Made Easy4–4
EDFNJURXQG�XVHU�UDWKHU�WKDQ�WKH�XVHU�FUHDWLQJ�WKH�MRE��$OWKRXJK�EDFNJURXQG�XVHUV�DUHXQDIIHFWHG�E\�SDVVZRUG�FRQWURO�SDUDPHWHUV��IRU�H[DPSOH�SDVVZRUG�H[SLUDWLRQV�RU�FKDUDFWHUOHQJWK���WKHVH�XVHUV�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�
&3,&
7KH�&3,&�XVHU�LV�GHOLYHUHG�LQ�FOLHQW�����ZLWK�QR�DXWKRUL]DWLRQV�DQG�ORJV�RQ�XVLQJ�WKH�&3,&LQWHUIDFH��7KLV�LQWHUIDFH�GRHV�QRW�ZRUN�LQWHUDFWLYHO\�ZLWK�5����7KH�&3,&�XVHU�UHFHLYHV�UHWXUQFRGHV�IURP�H[WHUQDO�SURJUDPV�DQG�WKH�VWDWLVWLF�FROOHFWRUV��UHIHU�WR�6$31HW�²�5���)URQWHQGQRWH��������6$3&3,&�LV�QR�ORQJHU�UHTXLUHG�IRU�WKH�WUDQVDFWLRQ�60���
7KH�&3,&�XVHU�UHTXLUHV�DQ�DXWKRUL]DWLRQ�WR�SHUIRUP�WKH�QHFHVVDU\�DFWLYLWLHV�LQ�5���DQG�LVVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�
6SHFLDO�5���8VHUV
6$3
,Q�FOLHQWV�����DQG������WKH�5���6\VWHP�LQFOXGHV�WKH�GHIDXOW�VXSHUXVHU�6$3 ��'XULQJLQVWDOODWLRQ��D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�IRU�6$3 ���+RZHYHU��6$3 �LV�SURJUDPPHG�LQ5���DQG�GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG��$IWHU�LQVWDOODWLRQ��RQFH�WKH�6$3 �XVHU�PDVWHUUHFRUG�EHFRPHV�DYDLODEOH��XVH�WKH�SDVVZRUG�06071992��,I�WKH�6$3 �XVHU�PDVWHU�UHFRUG�LVGHOHWHG�DQG�D�XVHU�ORJV�RQ�DJDLQ�DV�SAP*��ZLWK�WKH�LQLWLDO�SDVVZRUG�PASS��WKHQ�6$3 �LV�QRWVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�DQG�KDV�WKH�SDVVZRUG�PASS��ZKLFK�FDQQRW�EH�FKDQJHG�
'',&
7KH�'',&�XVHU�PDLQWDLQV�WKH�$%$3�'LFWLRQDU\�DQG�WKH�VRIWZDUH�ORJLVWLFV��$�'',&�XVHUPDVWHU�UHFRUG�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����ZKHQ�5���LV�LQVWDOOHG�DQG�KDVVWDQGDUG�SDVVZRUG�19920706��7KLV�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�WR�5���GXULQJ�D�QHZUHOHDVH�LQVWDOODWLRQ��3URWHFW�WKH�'',&�XVHU�IURP�XQDXWKRUL]HG�DFFHVV�E\�FKDQJLQJ�WKH�LQLWLDOSDVVZRUG�LQ�FOLHQWV�����DQG������7KLV�XVHU�LV�UHTXLUHG�IRU�FHUWDLQ�LQVWDOODWLRQ�DQG�VHWXSWDVNV��VR�LW�VKRXOG�QRW�EH�GHOHWHG�
(DUO\:DWFK
7KH�(DUO\:DWFK�XVHU�LV�RQO\�GHOLYHUHG�LQ�FOLHQW�����ZLWK�WKH�LQLWLDO�SDVVZRUG�SUPPORT�$FFHVV�LV�OLPLWHG�WR�PRQLWRULQJ�DQG�SHUIRUPDQFH�GDWD��7KH�(DUO\:DWFK�XVHU�LV�XVHG�E\6$3·V�(DUO\:DWFK�H[SHUWV��7KLV�XVHU�VKRXOG�QRW�EH�GHOHWHG��DQG�WKH�SDVVZRUG�VKRXOG�EHFKDQJHG��(DUO\:DWFK�VKRXOG�QRW�EH�XVHG�IRU�DQ\�SXUSRVH�RWKHU�WKDQ�(DUO\:DWFK�IXQFWLRQV�
Chapter 4: User Administration
User Groups
Release 4.6A/B4–5
&UHDWLQJ�8VHUV
,I�\RX�GR�QRW�XVH�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IXQFWLRQ��WKH�XVHU�PDVWHU�UHFRUGV�DQGDXWKRUL]DWLRQ�FRPSRQHQWV�DUH�FOLHQW�VSHFLILF�DQG�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFKV\VWHP�FOLHQW�
8VHUV�DUH�FUHDWHG�HLWKHU�IURP�VFUDWFK��XVLQJ�WUDQVDFWLRQ�68����RU�IURP�D�FRS\�RI�DQ�H[LVWLQJXVHU�E\�< 8VLQJ�WUDQVDFWLRQ�68��
< &UHDWLQJ�D�WHPSODWH�XVHU< &RS\LQJ�LW�WR�RWKHU�VLPLODU�XVHUV< 0DQXDOO\�HQWHULQJ�HDFK�SDVVZRUG
7KH�KLHUDUFKLFDO�VHFXULW\�HIIHFW�RI�XVHU�JURXSV�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�GLVWULEXWH�XVHUPDLQWHQDQFH�WDVNV�DQG�PDLQWDLQ�KLJK�VHFXULW\��:LWKLQ�D�VSHFLILF�JURXS��VHFXULW\�WDVNV�FDQ�EHGLVWULEXWHG�LQ�VXFK�D�ZD\�WKDW�WKUHH�SHRSOH�DUH�UHTXLUHG�WR�FUHDWH�XVHUV�DQG�PDQDJH�DFWLYLW\JURXSV�DQG�DXWKRUL]DWLRQV��7KXV��XVHU�DQG�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�FDQ�RQO\�FRPSOHWHFHUWDLQ�SDUWV�RI�WKH�UHTXLUHG�WDVNV��7KLV�SURFHVV�HQVXUHV�WKDW�QR�RQH�SHUVRQ�FDQ�FLUFXPYHQW5��·V�DXWKRUL]DWLRQ�VFKHPH��,I�D�FRPSDQ\�KDV�D�FHQWUDOL]HG�RUJDQL]DWLRQDO�VWUXFWXUH��DOOPDLQWHQDQFH�WDVNV�PD\�QHHG�WR�EH�SHUIRUPHG�E\�D�VLQJOH�XVHU��WKH�VR�FDOOHG�VXSHUXVHU�
7R�DOORZ�XVHUV�WR�VHH�WKHLU�RZQ�XVHU�PDVWHU�UHFRUGV��XVH�WUDQVDFWLRQ�68��'�
)RU�VHFXULW\�UHDVRQV��WKH�UHVSRQVLELOLW\�IRU�WKH�IROORZLQJ�PDLQWHQDQFH�WDVNV�VKRXOG�EHGLVWULEXWHG�DPRQJ�WKUHH�GLIIHUHQW�DGPLQLVWUDWRUV��VHH�FKDSWHU���IRU�DGGLWLRQDOLQIRUPDWLRQ��
8VHU�*URXSV
,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��1RWH�WKDW�RQH�JURXSLV�VWLOO�WKH�SULPDU\�JURXS�IRU�WKH�DXWKRUL]DWLRQ�FKHFN��7KLV�LV�WKH�JURXS�WKDW�DSSHDUV�LQ�WKHWRS�ILHOG�RQ�WKH�/RJRQ�GDWD�WDE�LQ�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�FDWHJRU\�8VHU�JURXSFDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��WKXV�LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ��<RX�PD\�XVH�DQ\�QDPLQJ�FRQYHQWLRQ�
8VHU�JURXSV�HQDEOH�WKH�DGPLQLVWUDWRU�WR�SURYLGH�DSSOLFDWLRQ�PDQDJHUV�ZLWK�WKH�ULJKWVUHTXLUHG�WR�FRQWURO�WKHLU�XVHUV��7KXV��WKHVH�PDQDJHUV�FDQ�FRQWURO�DOO�XVHUV�LQ�WKHLU�XVHUJURXSV�DQG�XVHUV�QRW�\HW�DVVLJQHG�WR�D�XVHU�JURXS��+RZHYHU��DSSOLFDWLRQ�PDQDJHUV�FDQQRWFKDQJH�XVHUV�LQ�RWKHU�XVHU�JURXSV�
$OWKRXJK�D�XVHU�JURXS�DIILOLDWLRQ�LV�QRW�UHTXLUHG�ZKHQ�\RX�FUHDWH�XVHUV��WKLV�DIILOLDWLRQ�LVQHFHVVDU\�WR�GHOHJDWH�XVHU�PDLQWHQDQFH�WDVNV�WR�DSSOLFDWLRQ�PDQDJHUV�DQG�VWDII��/DWHU��ZHVKRZ�KRZ�WR�GLVWULEXWH�XVHU�DGPLQLVWUDWLRQ�WDVNV�WR�WKH�DSSURSULDWH�DSSOLFDWLRQ�SHUVRQQHO�
Chapter 4: User Administration
Authorizations and Authorization Profiles
Authorizations Made Easy4–6
8VHU�JURXSV�DUH�QRUPDOO\�EDVHG�RQ�WKH�UHTXLUHPHQWV�GLFWDWHG�E\�WKH�GLIIHUHQW�DSSOLFDWLRQJURXSV��7KH�QXPEHU�RI�XVHUV�LQ�HDFK�XVHU�JURXS�DOVR�LQIOXHQFHV�WKHVH�JURXSV��6LQFH�XVHUJURXSV�GLVWULEXWH�XVHU�DGPLQLVWUDWLYH�WDVNV��\RXU�XVHU�JURXSV�ZLOO�EH�EDVHG�RQ�WKH�DYDLODEOHRUJDQL]DWLRQDO�VXSSRUW�VWUXFWXUH��$�IHZ�WKLQJV�WR�UHPHPEHU�ZKHQ�ZRUNLQJ�ZLWK�XVHUJURXSV�DUH�WKDW�
< 8VHU�JURXSV�DUH�FUHDWHG�ZLWK�WUDQVDFWLRQ�68*5��7RROV�→�$GPLQLVWUDWLRQ�→�8VHU0DLQWHQDQFH�→�0DLQWDLQ�8VHUV�*URXSV��
< 8VHU�JURXSV�DIIHFW�QRWKLQJ�XQWLO�\RX�VHW�XS�\RXU�JURXS�DGPLQLVWUDWRUV�ZLWKLQ�D�XVHUJURXS�
< (DFK�XVHU�FDQ�EHORQJ�WR�PDQ\�XVHU�JURXSV�< 8VHU�JURXSV�FDQ�EH�PDLQWDLQHG�EHIRUH�WKH\�DUH�DVVLJQHG�WR�XVHUV�
$XWKRUL]DWLRQV�DQG�$XWKRUL]DWLRQ�3URILOHV
$XWKRUL]DWLRQ�SURILOHV�DOORZ�\RX�WR�RUJDQL]H�DFFHVV�SULYLOHJHV�E\�WDVN�RU�MRE�IXQFWLRQ�6SHFLILFDOO\��WKLV�SURILOH�FRQWDLQV�WKH�DFFHVV�SULYLOHJHV�QHHGHG�WR�SHUIRUP�SDUWLFXODU�MREV�VXFK�DV�GDWD�HQWU\�RU�DSSOLFDWLRQ�PDLQWHQDQFH��7R�DXWKRUL]H�D�XVHU�IRU�D�MRE��\RX�RQO\�QHHGWR�JLYH�WKH�XVHU�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOH��7KH�3URILOH�*HQHUDWRU��3*�VLPSOLILHV�WKH�WDVN�RI�VHWWLQJ�XS�DXWKRUL]DWLRQ�SURILOHV�
0DVV�2SHUDWLRQV
7KH�5���6\VWHP�SURYLGHV�VHYHUDO�XWLOLWLHV�WR�DGPLQLVWHU�DOO��RU�D�VHOHFWHG�VHW��RI�XVHUV�&KDQJHV�PDGH�IRU�RQH�XVHU�LQ�XVHU�DGPLQLVWUDWLRQ�FDQ�DOVR�EH�PDGH�IRU�D�ODUJH�QXPEHU�RIXVHUV�DOO�DW�RQFH��<RX�FDQ�FKDQJH�ORJRQ�GDWD��GHIDXOW�YDOXHV��SDUDPHWHUV��DFWLYLW\�JURXSV�DQG�SURILOHV�IRU�D�SDUWLFXODU�VHW�RI�XVHUV��IRU�H[DPSOH��DOO�XVHUV�RI�D�XVHU�JURXS��
7R�DFFHVV�WKH�PDVV�FKDQJHV�VFUHHQ��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QYLURQPHQW�→�0DVVFKDQJHV�
,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��E\�PDNLQJ�PDVV�FKDQJHV�LQ�WKH�FHQWUDOV\VWHP���WKH�SURILOHV�DQG�DFWLYLW\�JURXSV�DUH�GLVSOD\HG�DFFRUGLQJ�WR�WKH�UHOHYDQW�V\VWHP�
7KH�PDVV�FKDQJH�IXQFWLRQV�RQ�WKH�LQLWLDO�VFUHHQ�DIIHFW�WKH�XVHU�GDWD�RI�DOO�GLVSOD\HG�XVHUV�XQOHVV�\RX�KDYH�VHOHFWHG�VSHFLILF�XVHUV�
)RU�HYHU\�FKDQJH�RQ�WKH�$GGUHVV��/RJRQ�GDWD��DQG�'HIDXOW�YDOXHV�WDEV��\RX�PXVW�FKRRVH&KDQJH��7KLV�HQVXUHV�WKDW�\RXU�FKDQJHV��VXFK�DV�GHOHWLRQ�RI�ILHOG�FRQWHQWV��WDNH�HIIHFW�IRUWKH�FRUUHVSRQGLQJ�ILHOGV�
Chapter 4: User Administration
Creating a New User (Client-Specific)
Release 4.6A/B4–7
&UHDWLQJ�D�1HZ�8VHU��&OLHQW�6SHFLILF�
'R�QRW�FUHDWH�RU�FKDQJH�XVHUV�LQ�FOLHQWV�����RU������7R�FUHDWH�RWKHU�QHZ�FOLHQWV��PDNH�D�FRS\�RIFOLHQW������VWDQGDUG�6$3�FOLHQW��
�� /RJ�RQ�WR�WKH�6$3�FOLHQW�ZKHUH�\RX�ZLVK�WR�FUHDWH�D�QHZ�XVHU�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→8VHU�PDLQWHQDQFH�→�8VHUV��
�� ,Q�WKH�8VHU�ILHOG� HQWHU�WKH�QHZ�XVHUQDPH�
�� &KRRVH� �
�� (QWHU�WKH�UHTXLUHG�GDWD�LQWR�WKHILHOGV��<RX�FDQ�DOZD\V�FRPH�EDFNDQG�FKDQJH�WKH�GDWD�ODWHU�
�� &KRRVH�WKH�/RJRQ�GDWD�WDE�
7KH�EXWWRQ�2WKHU�FRPPXQLFDWLRQ��OLQNV�\RX�WR�WKH�FHQWUDO�DGGUHVVDGPLQLVWUDWLRQ�IXQFWLRQDOLW\��7KLVIXQFWLRQDOLW\�LV�QRW�FRYHUHG�LQ�WKLVERRN�
3
4
5
6
Tip
Chapter 4: User Administration
Creating a New User (Client-Specific)
Authorizations Made Easy4–8
�� (QWHU�DQ�,QLWLDO�SDVVZRUG��IRUH[DPSOH��init)�ZKLFK�WKH�XVHUXVHV�IRU�WKH�ILUVW�ORJ�RQ��'XULQJ�WKDWILUVW�ORJRQ��WKH�XVHU�FKRRVHV�D�QHZSDVVZRUG�
�� 5HHQWHU�WKH�SDVVZRUG�WR�YHULI\�WKHVSHOOLQJ�LQ�WKH�ILHOG�5HSHDW�SDVVZRUG�
�� <RX�PD\�HGLW�RWKHU�/RJRQ�GDWDILHOGV��VXFK�DV�8VHU�JURXS�RU�8VHUW\SH�DV�QHHGHG��VHH�WKH�7HFK7DONEHORZ��
��� &KRRVH�WKH�'HIDXOWV�WDE�
/RJRQ�'DWD�)LHOG�'HILQLWLRQV
8VHU�JURXS�IRU�DXWKRUL]DWLRQ�FKHFN
$VVLJQLQJ�XVHUV�WR�JURXSV�DOORZV�WKH�XVHU�PDLQWHQDQFH�WDVN�WR�EH�GLVWULEXWHG�DPRQJ�VHYHUDOXVHU�DGPLQLVWUDWRUV��<RX�FDQ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV�
9DOLG�IURP�9DOLG�WR
7KHVH�ILHOGV�DUH�XVHIXO�LI�\RX�DUH�FUHDWLQJ�D�WHPSRUDU\�XVHU��VXFK�DV�D�FRQWUDFWRU��7RLPPHGLDWHO\�DFWLYDWH�WKH�XVHU��OHDYH�WKH�9DOLG�IURP�ILHOG�EODQN��)RU�D�XVHU�ZLWK�QR�DQWLFLSDWHGWHUPLQDWLRQ�GDWH��OHDYH�WKH�9DOLG�WR�ILHOG�EODQN��ZKLFK�DOORZV�LQGHILQLWH�DFFHVV�
$FFRXQWLQJ�QXPEHU
7KLV�ILHOG�LV�IRU�D�IUHHO\�VHOHFWDEOH�DFFRXQWLQJ�QDPH�RU�QXPEHU��,I�\RX�XVH�WKH�6$3�DFFRXQWLQJV\VWHP��WKH�XVHU·V�V\VWHP�XVDJH�LV�DVVLJQHG�WR�WKLV�DFFRXQW��7KH�DFFRXQWLQJ�QDPH�RU�QXPEHUPD\�EH�XQLTXH�WR�HDFK�XVHU�RU�FDQ�EH�VKDUHG�DPRQJ�JURXSV�RI�XVHUV�
&RVW�&HQWHU
8VH�WKLV�ILHOG�IRU�WKH�XVHU·V�FRVW�FHQWHU�QXPEHU�
'LDORJ
6HOHFW�WKLV�XVHU�W\SH�IRU�QRUPDO�GLDORJ�XVHUV�
%'&
:KHQ�\RX�SURFHVV�D�EDWFK�LQSXW�VHVVLRQ��VHOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�RQO\�XVHG�IRUWKH�DXWKRUL]DWLRQ�FKHFN�
87
9
10
Chapter 4: User Administration
Creating a New User (Client-Specific)
Release 4.6A/B4–9
%DFNJURXQG
6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�EDWFK�UXQV�
&3,&
6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�&3,�&�FDOOV�
��� <RX�PD\�HLWKHU�HQWHU�D�6WDUW0HQXRU�OHDYH�WKH�ILHOG�EODQN�
��� (QWHU�D�ODQJXDJH�FRGH�LQ�WKH�/RJRQODQJXDJH�ILHOG�
��� (QWHU�D�GHIDXOW�2XWSXW'HYLFH��WKHSULQWHU�RU�ILOH�WR�ZKLFK�WKH�XVHU�ZLOODXWRPDWLFDOO\�SULQW��
��� :H�UHFRPPHQG�VHOHFWLQJ�2XWSXWLPPHGLDWHO\�DQG�'HOHWH�DIWHU�RXWSXW�
2XWSXW�LPPHGLDWHO\�UHOHDVHV�VSRROUHTXHVWV��2WKHUZLVH��VSRRO�UHTXHVWVVWD\�LQ�WKH�VSRRO�V\VWHP�XQWLOPDQXDOO\�UHOHDVHG��7KH�'HOHWH�DIWHURXWSXW�RSWLRQ�SUHYHQWV�VSRROUHTXHVWV�IURP�EHLQJ�UHWDLQHG�DIWHUSULQWLQJ�
��� 6HOHFW�WKH�GHVLUHG�'HFLPDO�QRWDWLRQDQG�'DWH�IRUPDW�
��� &KRRVH� �
)RU�HDFK�XVHU��ILHOG�GHIDXOWV�RU�SDUDPHWHUV�VWRUH�GHIDXOW�YDOXHV�IRU�5���ILHOGV��:KHQ�D�ILHOG�LVGLVSOD\HG��WKH�SDUDPHWHU·V�YDOXH��LI�DQ\��LV�D�GHIDXOW�YDOXH��8VHU�SDUDPHWHUV�DUH�RSWLRQDO�DQGGR�QRW�\HW�QHHG�WR�EH�GHILQHG�
7R�DVVLJQ�DQ�DXWKRUL]DWLRQ�SURILOH�WR�\RXU�QHZ�XVHU�PDVWHU�UHFRUG�
�� 6HOHFW�D�XVHU�UROH�WHPSODWH�RU�FUHDWH�DQ�DFWLYLW\�JURXS�\RXUVHOI�
�� *HQHUDWH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXSV�
�� $VVLJQ�DFWLYLW\�JURXSV�WR�QHZ�XVHUV�DQG�WUDQVIHU�SURILOHV�
)RU�PRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV��VHH�FKDSWHU���3UHSDULQJ�WKH�5��(QYLURQPHQW�IRU�*R�/LYH�
15
11
12
14
13
17
Chapter 4: User Administration
Changing a User’s Password
Authorizations Made Easy4–10
&KDQJLQJ�D�8VHU·V�3DVVZRUG
8VHUV�FDQ�FKDQJH�WKHLU�RZQ�SDVVZRUGV�DQG�DGPLQLVWUDWRUV�FDQ�FKDQJH�DQ\�XVHU·V�SDVVZRUG�8VHUV�PD\�RQO\�FKDQJH�WKHLU�SDVVZRUGV�RQFH�D�GD\��KRZHYHU��DQ�DGPLQLVWUDWRU�FDQ�FKDQJHSDVVZRUGV�ZKHQHYHU�UHTXLUHG��$Q�DGPLQLVWUDWRU�PD\�QHHG�WR�FKDQJH�SDVVZRUGV�DIWHU�DQHZ�LQVWDOODWLRQ��ZKHQ�WKH�GHIDXOW�SDVVZRUG�VKRXOG�EH�FKDQJHG�IRU�VHFXULW\�SXUSRVHV���RUZKHQ�XVHUV�ORVH�RU�IRUJHW�WKHLU�SDVVZRUGV��:KHQ�DQ�DGPLQLVWUDWRU�FKDQJHV�D�SDVVZRUG��WKHQHZ�SDVVZRUG�LV�RQO\�WHPSRUDU\��$W�WKH�QH[W�ORJRQ��WKH�XVHU�HQWHUV�WKLV�SDVVZRUG�DQG�WKHQVHOHFWV�D�SHUPDQHQW�RQH��5HIHU�WR�WKH�WDEOH�3DVVZRUG�5HTXLUHPHQWV�RQ�WKH�QH[W�SDJH�IRUSDVVZRUG�UHTXLUHPHQWV�
,I�\RX�GR�QRW�XVH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��WKH�XVHUV�DUH�FOLHQW�VSHFLILF��%HIRUHSURFHHGLQJ��EH�VXUH�WKDW�\RX�DUH�ORJJHG�RQ�WR�WKH�6$3�FOLHQW�WKDW�FRQWDLQV�WKH�XVHU�ZKRVHSDVVZRUG�\RX�ZDQW�WR�FKDQJH�
�� 7R�FKDQJH�D�XVHU·V�SDVVZRUG��LQ�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��
�� ,Q�8VHU��HQWHU�WKH�QDPH�RI�WKH�XVHUZKRVH�SDVVZRUG�\RX�ZRXOG�OLNH�WRFKDQJH�
�� &KRRVH� �
�� (QWHU�WKH�QHZ�LQLWLDO�SDVVZRUG��IRUH[DPSOH��init��DQG�UHHQWHU�WKHSDVVZRUG�IRU�YHULILFDWLRQ�LQ�WKHQH[W�OLQH�
�� &KRRVH� �&RS\�WR�FKDQJH�WKHSDVVZRUG�
3
2
4
5
Chapter 4: User Administration
Changing a User’s Password
Release 4.6A/B4–11
3DVVZRUG�5HTXLUHPHQWV
7KH�IROORZLQJ�WDEOH�OLVWV�WKH�SDVVZRUG�UHTXLUHPHQWV��$GGLWLRQDOO\��LW�ZLOO�KHOS�\RXGHWHUPLQH�LI�WKHVH�UHTXLUHPHQWV�FDQ�EH�FXVWRPL]HG��$SSHQGL[�&�DOVR�OLVWV�LPSRUWDQW�V\VWHPSURILOH�SDUDPHWHUV�WR�FXVWRPL]H�SDVVZRUG�VHWWLQJV�
3DVVZRUG�5HTXLUHPHQWV 'HIDXOW 2SWLRQV
0LQLPXP�OHQJWK�LV�WKUHH�FKDUDFWHUV 0LQLPXP�OHQJWK�FDQEH�LQFUHDVHG�
([SLUDWLRQ 3DVVZRUG�PXVWQRW�EH�FKDQJHG
1XPEHU�RI�GD\V�DIWHUZKLFK�D�SDVVZRUGPXVW�EH�FKDQJHG�FDQEH�VHW�
3DVVZRUG�PD\�QRW�EH�VHW�WR�DQ\�YDOXHLQ�D�ORFNRXW�OLVW
1R�SDVVZRUGVDUH�EORFNHGRWKHU�WKDQ�3$66DQG�6$3
&DQ�EH�FXVWRPL]HG�
)LUVW�FKDUDFWHU�PD\�QRW�EH�DQH[FODPDWLRQ�SRLQW�����RU�TXHVWLRQ�PDUN�"��
)L[HG�LQ�WKH�5��6\VWHP
)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�DSSHDU�LQWKH�VDPH�VHTXHQFH�LQ�WKH�XVHU�,'�
)L[HG�LQ�WKH�5��6\VWHP
)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�EHLGHQWLFDO�
)L[HG�LQ�WKH�5��6\VWHP
6SDFH�FKDUDFWHU�QRW�DOORZHG�ZLWKLQ�ILUVWWKUHH�FKDUDFWHUV�
)L[HG�LQ�WKH�5��6\VWHP
3DVVZRUG�PD\�QRW�EH�PASS�RU�SAP*� )L[HG�LQ�WKH�5��6\VWHP
$Q\�NH\ERDUG�FKDUDFWHU�LV�DOORZHG�LQ�DSDVVZRUG��3DVVZRUGV�DUH�QRW�FDVH�VHQVLWLYH��QR�GLVWLQFWLRQ�LV�PDGHEHWZHHQ�XSSHU��DQG�ORZHUFDVH�OHWWHUV�
)L[HG�LQ�WKH�5��6\VWHP
8VHUV�FDQ�FKDQJH�WKHLU�SDVVZRUGV�RQO\RQFH�D�GD\��7KLV�UHVWULFWLRQ�GRHV�QRWDSSO\�WR�XVHU�DGPLQLVWUDWRUV�
)L[HG�LQ�WKH�5��6\VWHP
$�SDVVZRUG�PD\�QRW�EH�FKDQJHG�EDFNWR�D�XVHU·V�SUHYLRXV�ILYH�SDVVZRUGV�7KLV�UHVWULFWLRQ�GRHV�QRW�DSSO\�WR�XVHUDGPLQLVWUDWRUV�
)L[HG�LQ�WKH�5��6\VWHP
Chapter 4: User Administration
User Information System
Authorizations Made Easy4–12
8VHU�,QIRUPDWLRQ�6\VWHP
,Q�WKH�8VHU�,QIRUPDWLRQ�6\VWHP��\RX�KDYH�WKH�RSWLRQ�WR�UXQ�GLIIHUHQW�UHSRUWV�WR�REWDLQLQIRUPDWLRQ�RQ�DOO�UHODWHG�GDWD�FRQFHUQLQJ�XVHUV��7KHVH�UHSRUWV�DUH�DOO�LQWHJUDWHG�LQ�WKHPHQX�WUHH�DQG�FDQ�EH�VWDUWHG�GLUHFWO\�IURP�WKHUH�
,QIRUPDWLRQ�LV�DYDLODEOH�IRU�WKH�IROORZLQJ�FDWHJRULHV�< 8VHU< 3URILOHV< $XWKRUL]DWLRQ�REMHFWV< $XWKRUL]DWLRQV< $FWLYLW\�JURXSV< 7UDQVDFWLRQV< &RPSDULVRQV< :KHUH�XVHG�OLVW< &KDQJH�GRFXPHQWV
5HWULHYLQJ�WKH�LQIRUPDWLRQ�LV�EDVLFDOO\�WKH�VDPH�IRU�DOO�FDWHJRULHV��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�LW�ZRUNV��7R�JHW�LQIRUPDWLRQ�IRU�D�GLIIHUHQW�FDWHJRU\��UXQ�WKHFRUUHVSRQGLQJ�UHSRUW�ZLWK�\RXU�VSHFLILF�UHTXLUHPHQWV�
Chapter 4: User Administration
User Information System
Release 4.6A/B
([DPSOH��)LQG�RXW�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQ�D�VSHFLILF�WUDQVDFWLRQ�
�� ,Q�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP��,QWKLV�PHQX�DUHD�WKHUH�DUH�VHYHUDO�GLIIHUHQW�UHSRUWV�WR�FKRRVH�IURP��7R�VHH�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQD�SDUWLFXODU�WUDQVDFWLRQ��\RX�PD\�FKRRVH�DQ\�WUDQVDFWLRQ�FRGH�\RX�DUH�LQWHUHVWHG�LQ�
�� ,Q�WKH�,QIRUPDWLRQ�6\VWHP�PHQXDUHD��GRXEOH�FOLFN�%\�WUDQVDFWLRQDXWKRUL]DWLRQV�
�� (QWHU�D�WUDQVDFWLRQ�FRGH�WRGHWHUPLQH�ZKLFK�XVHUV�KDYH�DFFHVVWR�WKDW�WUDQVDFWLRQ��IRU�H[DPSOH�FB01��
�� &KRRVH� �WR�VWDUW�WKH�UHSRUW�
�� $�WDEOH�DSSHDUV�OLVWLQJ�DOO�WKH�XVHUVDOORZHG�WR�UXQ�WKDW�WUDQVDFWLRQ�
�� &KRRVH� �LI�\RX�ZLVK�WR�UHWXUQDQG�UHYLHZ�D�GLIIHUHQW�WUDQVDFWLRQFRGH�
2
3
6
5
4
;
4–13
;;;;;;
Chapter 4: User Administration
User Information System
Authorizations Made Easy4–14
5–1
&KDSWHU��� 8VHU�5ROH�7HPSODWHV
&RQWHQWV
Overview ..................................................................................................................5–2
What Are User Role Templates? ...........................................................................5–2
User Menu................................................................................................................5–2
How to Work with User Role Templates ...............................................................5–3
Tips for an Administrator .....................................................................................5–35
Available User Role Templates............................................................................5–40
��
Chapter 5: User Role Templates
Overview
Authorizations Made Easy5–2
2YHUYLHZ
,Q�WKLV�FKDSWHU��ZH�GHVFULEH�KRZ�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�DQG�VHW�XS�\RXU�DFWLYLW\JURXSV��)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�ZLWK�WKH�DFWLYLW\�JURXSV�DQG�XVHU�UROHWHPSODWHV�ZLWK�WKH�3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�
:KDW�$UH�8VHU�5ROH�7HPSODWHV"
6$3�GHOLYHUV�PRUH�WKDQ�����XVHU�UROH�WHPSODWHV��IRUPHUO\�NQRZQ�DV�SUHGHILQHG�DFWLYLW\JURXSV���ZKLFK�FDQ�EH�GLUHFWO\�DVVLJQHG�WR�XVHUV��7KHVH�XVHU�UROH�WHPSODWHV�FRQVLVW�RIFRPSRVLWH�DFWLYLW\�JURXSV�RU�VLQJOH�DFWLYLW\�JURXSV�ZKLFK�DUH�SUHGHILQHG�ZLWK�WUDQVDFWLRQVDQG�DXWKRUL]DWLRQV��7KHVH�DFWLYLW\�JURXSV�DUH�FUHDWHG�E\�DSSOLFDWLRQ�FRQVXOWDQWV�LQFRQMXQFWLRQ�ZLWK�FXVWRPHUV�WR�IXOILOO�WKH�PRVW�VWULQJHQW�UHTXLUHPHQWV��8VHU�UROHV�DUHDVVLJQHG�LQGLYLGXDO�XVHUV��:KHQ�XVHUV�ORJ�RQ�WR�WKH�5���6\VWHP�WKH\�RQO\�VHH�WKH�SDUW�RI�WKH6$3�PHQX�ZKLFK�LV�UHTXLUHG�WR�IXOILOO�WKHLU�UROH�WDVNV��7KLV�LQGLYLGXDO�PHQX�LV�FDOOHG�WKHXVHU�PHQX��8VHUV�FDQ�DUUDQJH�WKH�VWUXFWXUH�RI�WKHLU�PHQX�DQG�KDYH�WKH�RSWLRQ�WR�DGGIUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�SHUVRQDO�IDYRULWHV�IROGHU��7KH\�FDQ�DOVR�DGG�ZHE�OLQNV�DQGOLQNV�WR�ORFDO�GRFXPHQWV��IRU�H[DPSOH�0LFURVRIW�:RUG�RU�([FHO�ILOHV�
7R�ZRUN�ZLWK�WKHVH�XVHU�UROH�WHPSODWHV��XVH�WKH�WUDQVDFWLRQ�3)&*�ZKLFK�LV�NQRZQ�DV�WKH3URILOH�*HQHUDWRU��3*���7KH�XVHU�UROH�WHPSODWHV�DUH�VWDQGDUG�GHOLYHUHG�DFWLYLW\�JURXSV�ILOOHGZLWK�GDWD��$OO�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�VWDUW�ZLWK�6$3B���$FWLYLW\�JURXSV�DUHXVHG�E\�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��7KH�ILUVW�SULRULW\�LV�WR�VHOHFW�WUDQVDFWLRQVDQG�UHSRUWV��7KLV�LQIRUPDWLRQ��WUDQVDFWLRQV�FRGHV��PHQX�SDWKV��UHSRUW�QDPHV��HWF���LV�VDYHGLQ�DQ�DFWLYLW\�JURXS��ZKLFK�VHUYHV�DV�D�GDWDEDVH�WR�KHOS�WKH�3*�GHWHUPLQH�WKH�QHFHVVDU\DXWKRUL]DWLRQV�DQG�JHQHUDWH�WKH�SURILOH�V��
<RX�PD\�VHW�XS�DV�PDQ\�DFWLYLW\�JURXSV�DV�\RXU�FRPSDQ\�UHTXLUHV��$�VLQJOH�DFWLYLW\��DWUDQVDFWLRQ��UHSRUW��RU�WDVN��FDQ�EH�LQFOXGHG�LQ�PDQ\�GLIIHUHQW�DFWLYLW\�JURXSV��DQG�DQDFWLYLW\�JURXS�FDQ�LQFOXGH�DV�PDQ\�VLQJOH�DFWLYLWLHV�DV�QHHGHG�
7R�VDYH�WLPH��6$3�SURYLGHV�XVHU�UROH�WHPSODWHV�VR�\RX�GR�QRW�KDYH�WR�FUHDWH�DOO�DFWLYLW\JURXSV�RQ�\RXU�RZQ��+RZHYHU��\RX�PD\�VWLOO�FUHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�RU�PRGLI\�WKHRQHV�6$3�GHOLYHUV�
8VHU�0HQX
8VHUV�RQO\�VHH�WKH�WUDQVDFWLRQV�WKH\�DUH�DOORZHG�WR�H[HFXWH�LQ�WKH�V\VWHP³WKRVH�GHILQHG�LQWKH�DFWLYLW\�JURXS�DVVLJQHG�WR�WKHP�
,Q�WKH�IROORZLQJ�H[DPSOH��WKH�XVHU�PHQX�IRU�WKH�XVHU�UROH�WHPSODWH�´4XDOLW\�0DQDJHUµ�LVVKRZQ��7KH�6$3�(DV\�$FFHVV�PHQX�VHUYHV�DV�WKH�LQGLYLGXDOL]HG�XVHU�PHQX��7KH�PHQX
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–3
VWUXFWXUH�LV�H[DFWO\�ZKDW�WKH�4XDOLW\�0DQDJHU�VHHV�ZKHQ�ORJJHG�RQ�WR�5����,Q�RXU�H[DPSOH�ZH�KDYH�DVVLJQHG�RQO\�RQH�DFWLYLW\�JURXS��RI�FRXUVH�\RX�FDQ�DVVLJQ�PDQ\�PRUH�
��������An example user menu using the user role template SAP_BC_CAT_QUALITYMANAGER_AG
<RX�FDQ�VWLOO�VZLWFK�WR�WKH�FRPSOHWH�6$3�VWDQGDUG�PHQX�XVLQJ� ��WKRXJK�WKH�XVHU�LV�QRWDXWKRUL]HG�WR�UXQ�HYHU\�WUDQVDFWLRQ�LQ�WKH�VWDQGDUG�PHQX��7R�UHWXUQ�WR�WKH�XVHU�PHQX�FKRRVH� �
+RZ�WR�:RUN�ZLWK�8VHU�5ROH�7HPSODWHV
7KHUH�DUH�GLIIHUHQW�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��<RX�PD\�HLWKHU�< 8VH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�DV�LV< &RS\�DQG�PRGLI\�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV< &UHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV
,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�H[SODLQ�HDFK�RSWLRQ�DQG�SURYLGH�WKH�EDVLF�NQRZOHGJH�\RX�QHHGWR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��,I�\RX�QHHG�PRUH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUNZLWK�WKH�XVHU�UROH�WHPSODWHV��UHIHU�WR�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�
7KH�WRRO�XVHG�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV�DQG�DFWLYLW\�JURXSV�UHVSHFWLYHO\�LV�WKH3URILOH�*HQHUDWRU��3*���8VH�WKH�WUDQVDFWLRQ�PFCG�IRU�WKH�3*�
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–4
6WDUWLQJ�$FWLYLW\�*URXS�0DLQWHQDQFH��3)&*�
6WDUW�WKH�3URILOH�*HQHUDWRU��3*��E\�RQH�RI�WKH�IROORZLQJ�PHWKRGV�IURP�WKH�6$3�(DV\�$FFHVVVFUHHQ�
< &KRRVH� �&UHDWH�0HQX
< (QWHU�WKH�WUDQVDFWLRQ�PFCG�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH�(QWHU
< &KRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�3)&*�¥�$FWLYLW\�JURXSV
7KHQ�\RX�FDQ�VWDUW�ZRUNLQJ�ZLWK�WKH�XVHU�UROH�WHPSODWHV�
8VLQJ�WKH�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV
7R�XVH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�MXVW�DVVLJQ�WKH�XVHU�UROH�WHPSODWH�WR�D�XVHU�:KHQ�WKDW�XVHU�ORJV�RQ�WR�WKH�V\VWHP��D�VSHFLILF�XVHU�UROH�PHQX�DSSHDUV�
7R�DVVLJQ�XVHU�UROH�WHPSODWHV��\RX�KDYH�WZR�RSWLRQV�< 8VH�WKH�3*��VHOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��JHQHUDWH�LW��DVVLJQ�LW�WR�D�XVHU��DQG�GR�D
XVHU�FRPSDUH��7KH�IROORZLQJ�H[DPSOH�H[SODLQV�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�XVLQJWKH�3*�
< 8VH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�DVVLJQ�WKH�GHVLUHG�XVHU�UROH�WHPSODWHV�WR�DVSHFLILF�XVHU��6HH�FKDSWHU����$VVLJQLQJ�$FWLYLW\�*URXSV�
([DPSOH�
+RZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU��IRU�H[DPSOH�WKH�4XDOLW\�0DQDJHU�XVLQJ�WKH�3URILOH*HQHUDWRU�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B%&B&$7B4XDOLW\PDQDJHUB$*��
�� &KRRVH� �&KDQJH�
<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�WKDW�FDQ�FRQWDLQ�PXOWLSOH�DFWLYLW\JURXSV�
2
Tip
3
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–5
�� &KRRVH�WKH�0HQX�WDE�WR�UHYLHZ�WKHWUDQVDFWLRQV�DVVLJQHG�WR�WKLV�DFWLYLW\JURXS�
,Q�WKH�6$3�GHOLYHUHG�DFWLYLW\�JURXSV\RX�DOZD\V�VHH�DQ�$FWLYLW\�JURXSGHVFULSWLRQ�RI�WKH�FRQWHQW�IRU�WKH�VHOHFWHGDFWLYLW\�JURXS��<RX�FDQ�DOVR�DGG�\RXURZQ�GHVFULSWLRQ�
�� 7KH�HQG�XVHU�ZLOO�VHH�WKH�IROGHUV�DQGWUDQVDFWLRQV�DV�WKH\�DSSHDU�LQ�WKH$FWLYLW\�JURXS�PHQX�
�� <RX�FDQ�FKDQJH�WKH�RUGHU�RI�DQ\LWHP�E\�VHOHFWLQJ�LW�DQG�XVLQJ� �DQG�WR�PRYH�LW�XS�DQG�GRZQ�
�� 6HOHFW�WKH�$XWKRUL]DWLRQV�WDE�WRJHQHUDWH�WKLV�DFWLYLW\�JURXS�
7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKH�SURILOH�LV�QRW�JHQHUDWHG\HW�
4
Tip
76
5
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–6
�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�
�� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH� FKRRVH� .
��� &KRRVH� �
8
9
10
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–7
��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHUWR�WKLV�DFWLYLW\�JURXS�
7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�LV�DVVLJQHG�\HW�
6WDWXV�'LVSOD\�RQ�WKH�7DE
7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�
�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU
PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FRPSRVLWH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�
11
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–8
��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�
7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHGLQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU,'��,Q�WKH�WZR�DGGLWLRQDO�FROXPQV��)URP�WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW��<RX�FDQ�GHOHWH�WKH�XVHU,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDORQH�LQ�IURQW�RI�D�VHOHFWHG�XVHU�,'�XVLQJ�
7R�JHW�DGGLWLRQDO�LQIRUPDWLRQ�RQDVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �
��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�
2Q�WKH�&RPSDUH�8VHU�0DVWHU�5HFRUG�RI$FWLYLW\�*URXS�VFUHHQ��QRWH�WKH�VWDWXV�RIWKH�XVHU�PDVWHU�UHFRUG��,W�VD\V��8VHUPDVWHU�UHFRUG�KDV�QRW�\HW�EHHQ�FRPSOHWHO\FRPSDUHG��7KHUHIRUH�SHUIRUP�FRPSOHWHFRPSDUH�LQ�VWHS����
��� &KRRVH� �&RPSOHWH�FRPSDUH�
12
13
14
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–9
��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�ZLOO�VHH�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIURP�WKH�VHOHFWHG�DFWLYLW\�JURXS�
7KH�SURFHVV�LV�QRZ�FRPSOHWH�
:KHQ�WKH�XVHU�)7$<(+�ORJV�LQ��WKHVFUHHQ�WR�WKH�ULJKW�DSSHDUV�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�6$3B%&B&$7B48$/,7<0$1$*(5B$*��KDV�EHHQ�DVVLJQHG�WR�)7$<(+�
$V�\RX�FDQ�VHH��WKH�PHQX�LV�VLPLODU�WRWKH�RQH�FUHDWHG�LQ�WKH�3*�
15
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–10
&RS\LQJ�DQG�0RGLI\LQJ�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV
,I�\RX�DUH�QRW�FRPSOHWHO\�VDWLVILHG�ZLWK�WKH�FRQWHQW�RI�DQ�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWH�\RX�FDQ�PRGLI\�WKH�WHPSODWH��:H�UHFRPPHQG�WKDW�\RX�ILUVW�FRS\�WKH�DFWLYLW\�JURXS�DQG�WKHQPDNH�DQ\�FKDQJHV�WR�WKH�QHZO\�FUHDWHG�FRS\��&RS\LQJ�ILUVW�HQVXUHV�WKDW�\RX�NHHS�WKHRULJLQDO�6$3�WHPSODWH�LQWDFW��'RFXPHQW�WKH�FKDQJHV�\RX�PDNH�WR�WKH�VWDQGDUG�
,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FRS\�DQ�H[LVWLQJ�DFWLYLW\�JURXS��PRGLI\�LW��DQG�DVVLJQ�LWWR�D�XVHU�
,I�\RX�ZDQW�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�
([DPSOH�
7KH�IROORZLQJ�H[DPSOH�GHPRQVWUDWHV�KRZ�WR�FRS\�DQG�UHQDPH�WKH�XVHU�UROH�WHPSODWH�IRUWKH�$FFRXQWV�3D\DEOH�$FFRXQWDQW��ZH�ZLOO�XVH�´$FFRXQWV�3D\DEOH�$FFRXQWDQWµ�YDULDQW��:H�DVVXPH�WKDW�RQO\�RQH�FRPSDQ\�FRGH�ZLOO�EH�XVHG��VR�ZH�GHOHWH�WKH�IROGHU�&URVV�&RPSDQ\�&RGH�7UDQVDFWLRQ��DV�ZHOO�DV�%LOO�RI�([FKDQJH�DQG�5HMHFW�3DUNHG�'RFXPHQWV�)XUWKHUPRUH��ZH�DGG�WZR�WUDQVDFWLRQV³05+5�(QWHU�,QYRLFH�DQG�05+*�(QWHU�&UHGLW0HPR³LQWR�WKH�IROGHU�,QYRLFH�FUHGLW�PHPR��)LQDOO\��ZH�DVVLJQ�WKH�QHZ�DFWLYLW\�JURXS),B$3B$&&2817$17B9$5,$17B$*�WR�D�XVHU�XVLQJ�WKH�3*�DQG�GHPRQVWUDWH�ZKDW�WKLVXVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B),B$3B$&&2817$17�B$*��
�� &KRRVH� �WR�FRS\�WKH�DFWLYLW\JURXS�
�� (QWHU�D�QDPH�IRU�WKH�QHZ�DFWLYLW\JURXS�
�� &KRRVH� �&RS\�VHOHFWLYHO\�WR�GHFLGHZKDW�REMHFWV�\RX�ZRXOG�OLNH�WR�FRS\ZLWK�WKH�DFWLYLW\�JURXS�
4
5
3
2
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–11
�� &KRRVH� �ZLWKRXW�VHOHFWLQJDQ\WKLQJ��<RX�VKRXOG�FRS\�WKHDFWLYLW\�JURXS�ZLWKRXW�WKH�XVHUDVVLJQPHQW�
�� &KRRVH� �&KDQJH�WR�PRGLI\�WKH�QHZDFWLYLW\�JURXS�
�� (QWHU�D�VKRUW�GHVFULSWLRQ�IRU�\RXUQHZ�DFWLYLW\�JURXS�LQ�WKH�'HVFULSWLRQILHOG�
�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�IUHH�WH[W�GHVFULSWLRQ�
��� &KRRVH�WKH�0HQX�WDE� 8
9
7
6
10
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–12
1RZ�\RX�VHH�WKH�PHQX�RI�WKHRULJLQDO�DFWLYLW\�JURXS�LQ�WKH�QHZDFWLYLW\�JURXS��2SHQ�WKH�GHVLUHGIROGHU�ZKHUH�\RX�ZDQW�WR�PRGLI\�RUGHOHWH�WUDQVDFWLRQV��,Q�RXU�H[DPSOH�ZH�ZRXOG�OLNH�WR�GHOHWH�WUDQVDFWLRQ)%9��DQG�WKH�IROGHUV�&URVV�FRPSDQ\FRGH�WUDQVDFWLRQ�DQG�%LOO�RI�H[FKDQJHXQGHU�WKH�3D\PHQW�DQG�FOHDULQJ�QRGH�
��� 6HOHFW�)%9��¥�5HMHFW�
��� 7R�GHOHWH�WKH�WUDQVDFWLRQ��FKRRVH� �
7R�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV��FKRRVH��,I�WKH\�DUH�WXUQHG�RQ��WKH�LFRQ
FKDQJHV�WR� �
��� 6HOHFW�WKH�&URVV�FRPSDQ\�FRGHWUDQVDFWLRQ�OLQH�DQG�FKRRVH� �
��� 6HOHFW�WKH�%LOO�RI�H[FKDQJH�OLQH�DQGFKRRVH� �
11
12
Tip
13
14
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–13
��� 7R�LQVHUW�D�QHZ�WUDQVDFWLRQ�FRGHPDQXDOO\��VHOHFW�WKH�IROGHU�LQ�ZKLFK\RX�ZRXOG�OLNH�WKDW�WUDQVDFWLRQ�WRDSSHDU�DQG�FKRRVH� �7UDQVDFWLRQ�IRU�H[DPSOH��ZH�ZRXOG�OLNH�WR�HQWHUWKH�WUDQVDFWLRQ�(QWHU�,QYRLFH�LQWR�WKHIROGHU�,QYRLFH�FUHGLW�PHPR��
��� (QWHU�WKH�WUDQVDFWLRQ�FRGH�LQWR�WKH7UDQVDFWLRQ�FRGH�ILHOG��,I�\RX�SUHVV(QWHU��WKH�WH[W�RI�WKH�WUDQVDFWLRQ�FRGHZLOO�DSSHDU�LQ�WKH�7H[W�FROXPQ�
��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�WRWUDQVIHU�WKH�WUDQVDFWLRQ�LQWR�WKHDFWLYLW\�JURXS�PHQX�
15
17
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–14
,I�\RX�ZRXOG�OLNH�WR�FKDQJH�WKH�SRVLWLRQRI�WKH�WUDQVDFWLRQ�LQ�WKH�KLHUDUFK\��VHOHFWWKH�WUDQVDFWLRQ�DQG�XVH�WKH� �WRPRYH�WKH�WUDQVDFWLRQ�GRZQ�RU�XS�
��� ,I�\RX�GR�QRW�NQRZ�WKH�WUDQVDFWLRQFRGH�DQG�ZRXOG�UDWKHU�VHOHFW�WKHWUDQVDFWLRQ�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX�
:H�UHFRPPHQG�\RX�VWD\�ZLWK�RQH�RSWLRQ��(LWKHU�HQWHU�WKH�WUDQVDFWLRQ�PDQXDOO\�RU�HQWHULW�WKURXJK�RQH�RI�WKH�PHQXV��6$3�PHQX��DFWLYLW\�JURXS��RU�DUHD�PHQX���,I�\RX�FKRRVH�WRHQWHU�IURP�WKH�PHQX��WKH�PHQX�SDWK�ZLOO�EH�WUDQVIHUUHG�WR�WKH�DFWLYLW\�JURXS�PHQX�DVZHOO�
18
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–15
��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�FRGH�LW�LV�SRVVLEOH�WR�VHOHFW�PRUH�WKDQRQH��
��� &KRRVH� �7UDQVIHU�WR�WUDQVIHU�WKHWUDQVDFWLRQ�LQWR�DFWLYLW\�JURXSPHQX�
7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�RU�RIIFKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKHWHFKQLFDO�QDPH�RI�WKH�WUDQVDFWLRQ��VFUROOWR�WKH�ULJKW�ZKHUH�LW�LV�VKRZQ�
7KH�WUDQVDFWLRQ�LV�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�PHQX�DQG�LQFOXGHVWKH�FRPSOHWH�PHQX�SDWK�IURP�WKH6$3�PHQX�
��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�DQGPRYH�LW�WR�WKH�GHVLUHG�SRVLWLRQ�E\HLWKHU�< 'UDJ�DQG�GURS
< �RU�
< �0RYH�QRGH
,Q�WKLV�H[DPSOH��ZH�XVHG�GUDJ�DQGGURS�
20
21
19
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–16
��� 7R�GHOHWH�WKH�OHIW�PHQX�SDWK�IURPWKH�MXVW�LQVHUWHG�WUDQVDFWLRQ��VFUROOGRZQ�WR�WKH�PHQX�SDWK�WKDW�EHJLQVZLWK�6$3�5���6\VWHP�
��� 6HOHFW�WKH�GHVLUHG�IROGHU�DQG�FKRRVH�WR�GHOHWH�WKH�IROGHU�DQG�WKH
FRPSOHWH�VWUXFWXUH�EHORZ�LW�
22
23
We moved the transaction into thefolder Invoice/credit memo, below thetransaction MRHR-Enter Invoice�
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–17
$IWHU�\RX�ILQLVK�GHOHWLQJ�DQGLQVHUWLQJ�WUDQVDFWLRQV��PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�WUDQVDFWLRQV�LQWKLV�DFWLYLW\�JURXS�
��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�
��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWDWR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�
,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VHOHFW�H[SOLFLWO\�WKH�RSWLRQ�ZLWKZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�
24
25
Tip
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–18
1RZ�DGMXVW�WKH�DXWKRUL]DWLRQV�WR\RXU�VSHFLILF�QHHGV��2SHQ�WKHGHVLUHG�IROGHU�DQG�FKHFN�RU�FKDQJHWKH�YDOXHV�
,Q�WKLV�H[DPSOH��ZH�DUH�QRW�FKDQJLQJDQ\WKLQJ�EHFDXVH�HYHU\WKLQJ�IURPWKH�FRSLHG�DFWLYLW\�JURXS�LV�FRUUHFW�
)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�KRZ�WRZRUN�ZLWK�WKH�DXWKRUL]DWLRQ�ILHOGV�VHH�FKDSWHU����$GYDQFHG�3URILOH*HQHUDWRU�)XQFWLRQDOLW\�
��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �
([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV
�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�H[LVW�ZLWKRXW�YDOXHV�WKDW�DUH�QRW�RUJDQL]DWLRQDO
OHYHOV�
��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�
��� 7R�FRQWLQXH��FKRRVH� �
1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV
:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�
7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�
7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�
27
28
26
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–19
'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���
6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������
��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�
$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�
��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�
7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�
29
30
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–20
6WDWXV�'LVSOD\�RQ�WKH�7DE
7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�
�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU
PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�
��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�FDQ�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�
��� ,Q�WKH�)URP�DQG�WR��FROXPQ�\RX�FDQHQWHU�WKH�GDWH�UDQJH�IRU�KRZ�ORQJWKH�XVHU�LV�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�
��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�
7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �
)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �
��� &KRRVH� �&RPSOHWH�FRPSDUH�
31
33
32
34
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–21
,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�
��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�
:KHQ�ORJJLQJ�RQ�WR�5����WKH�XVHUZLOO�VHH�D�VSHFLILF�XVHU�PHQX�ZLWKRQO\�WKRVH�WUDQVDFWLRQV�IURP�WKHVHOHFWHG�DFWLYLW\�JURXS�
7KLV�LV�WKH�VFUHHQ�D�XVHU�VHHV�ZKHQORJJLQJ�RQ�WR�WKH�V\VWHP�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�),B$3B$&&2817$17B9$5,$17B$*��KDV�EHHQ�DVVLJQHG�WR�WKDW�XVHU�
$V�\RX�FDQ�VHH��WKH�PHQX�ORRNV�WKHVDPH�DV�WKDW�FUHDWHG�LQ�WKH�3*�
tip
35
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–22
&UHDWH�\RXU�RZQ�8VHU�5ROH�7HPSODWHV
,I�\RX�QHHG�XVHU�UROH�WHPSODWHV�LQ�DGGLWLRQ�WR�WKH�RQHV�6$3�GHOLYHUV��\RX�FDQ�FUHDWH�\RXURZQ�DFWLYLW\�JURXS�
,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FUHDWH�DQ�DFWLYLW\�JURXS��VHOHFW�WUDQVDFWLRQ�FRGHV�JHQHUDWH�WKH�DXWKRUL]DWLRQV��DQG�DVVLJQ�WKHP�WR�D�XVHU�
,I�\RX�ZRXOG�OLNH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�
([DPSOH�
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS�DQGWKHUHIRUH�WKH�XVHU�UROH�WHPSODWH�IRU�D�GDWD�HQWU\�FOHUN��$W�WKH�HQG��ZH�DVVLJQ�WKH�QHZDFWLYLW\�JURXS��ZKLFK�ZH�QDPH�),B$3B'$7$B(175<B&/(5.B$*�WR�D�XVHU�ZLWK�WKH�3*DQG�GHPRQVWUDWH�ZKDW�WKLV�XVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_ENTRY_CLERK��
�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�
<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�ZKLFK�FDQ�FRQWDLQ�PXOWLSOHDFWLYLW\�JURXSV��6HH�&UHDWLQJ�&RPSRVLWH$FWLYLW\�*URXSV�RQ�SDJH��²���
2
3
Tip
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–23
�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�
�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�
�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�
�� &KRRVH�WKH�0HQX�WDE�WR�VHOHFW�WKHWUDQVDFWLRQV�IRU�WKH�DFWLYLW\�JURXS�
7KHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�WUDQVDFWLRQV�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�DVVLJQ�DWUDQVDFWLRQ�E\�GRLQJ�RQH�RI�WKH�IROORZLQJ�
< (QWHULQJ�LW�GLUHFWO\��RQO\�WKH�WUDQVDFWLRQ�ZLWKRXW�WKH�PHQX�SDWK�LV�DGGHG�< 6HOHFWLQJ�LW�IURP�WKH�6$3�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�DUHD�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�
,Q�WKLV�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�WUDQVDFWLRQ�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DQG�KRZ�WRLQVHUW�WKH�WUDQVDFWLRQ�FRGH�GLUHFWO\��7KH�RWKHU�RSWLRQV�ZRUN�DFFRUGLQJO\�
:H�ZRXOG�OLNH�WR�LQVHUW�WKH�WUDQVDFWLRQV�IRU�´FUHDWLQJ�YHQGRU�LQYRLFHV�FUHGLW�PHPRµ��)%����DQG´GLVSOD\LQJ�GRFXPHQWVµ��)%����ZLWK�WKH�VDPH�PHQX�SDWK�DV�LW�LV�LQ�WKH�DFWLYLW\�JURXS�IRU�WKH�´DFFRXQWVSD\DEOH�DFFRXQWDQWµ��6$3B),B$3$&&2817B$*��
�� &KRRVH� �)URP�DFWLYLW\�JURXS�
,I�\RX�ZRXOG�OLNH�WR�VHOHFW�WKHWUDQVDFWLRQ�FRGH�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX��7KHQIROORZ�WKH�VDPH�SURFHGXUH�
�� ,Q�WKH�IROORZLQJ�VFUHHQ��VHOHFW�WKHDFWLYLW\�JURXS6$3B),B$3B$&&2817$17B$*�
��� &KRRVH�(QWHU�
8
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–24
��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQV��)RUH[DPSOH��ZH�VHOHFWHG�< 6FKHGXOH�0DQDJHU< �&UHDWH�YHQGRU�LQYRLFHV�FUHGLW�PHPRV
�XQGHU�(QWU\�→�,QYRLFH�FUHGLWPHPR�
< 'LVSOD\�GRFXPHQW��XQGHU�(QWU\�→,QYRLFH�FUHGLW�PHPR�
< 'LVSOD\�YHQGRU��XQGHU�$FFRXQWPDVWHU�GDWD�
��� 7R�DGG�WKH�VHOHFWHG�WUDQVDFWLRQV�WRWKH�DFWLYLW\�JURXS�PHQX��FKRRVH�$GG�
7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG�RII��FKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKH�WHFKQLFDOQDPH�RI�WKH�WUDQVDFWLRQ��VFUROO�IDUWKHU�WR�WKH�ULJKW�
,I�\RX�RSHQ�WKH�IROGHUV��\RX�FDQ�VHHKRZ�WKH�WUDQVDFWLRQV�DQG�SDWKV�KDYHEHHQ�LQVHUWHG��7KH\�DSSHDU�LQ�WKH8VHU�PHQX�LQ�H[DFWO\�WKH�VDPH�ZD\DV�GHILQHG�LQ�WKH�3*�
7KH�QH[W�WUDQVDFWLRQV�WR�LQVHUW�DUH)%���DQG�)%����)RU�WKRVHWUDQVDFWLRQV��ZH�ZLOO�FUHDWH�D�QHZIROGHU�FDOOHG�8VHU�VHWWLQJV�
��� 7R�FUHDWH�D�QHZ�IROGHU��FKRRVH�DQG�HQWHU�WKH�QHZ�QDPH�IRU�WKHIROGHU��LQ�H[DPSOH��8VHU�VHWWLQJV��
7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQGRII�FKRRVH� �RU� ��7KH�WHFKQLFDO�QDPHVDSSHDU�LQ�IURQW�RI�WKH�WUDQVDFWLRQ�FRGHWH[W�
11
12
13
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–25
��� 7R�PRYH�WKH�IROGHU�WR�WKH�HQG�RI�WKHPHQX��KLJKOLJKW�WKH�IROGHU�\RX�ZDQWWR�PRYH�DQG�FKRRVH� �WR�PRYH�LWGRZQ�
��� 7R�HQWHU�WKH�WUDQVDFWLRQV��FKRRVH�7UDQVDFWLRQ�
��� (QWHU�WKH�GHVLUHG�WUDQVDFWLRQV��IRUH[DPSOH��FB00�DQG�FB07���7KHGHVFULSWLRQ�WH[W�IRU�WKH�WUDQVDFWLRQFRGH�DSSHDUV�LQ�ULJKW�FROXPQ�
��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�
$IWHU�\RX�VHOHFW�DOO�WKH�WUDQVDFWLRQVQHFHVVDU\��IRU�H[DPSOH��IRU�WKH�'DWD(QWU\�&OHUN��
��� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�
��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�
14 15
16
17
18
19
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–26
��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�GDWD�FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�
,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLILFDOO\�VHOHFW�WKH�RSWLRQZLWK�ZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�
,I�QHFHVVDU\��WKH�'HILQH�2UJDQL]DWLRQDO/HYHOV�GLDORJ�ER[�DSSHDUV��7KLVVFUHHQ�XVXDOO\�SRSV�XS�WKH�ILUVW�WLPH\RX�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�
8VH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHGHVLUHG�YDOXHV�RU�YDOXH�UDQJH�
��� ,Q�WKLV�H[DPSOH��ZH�VHOHFWHG�)XOODXWKRUL]DWLRQ�IRU�WKH�RUJDQL]DWLRQDOOHYHOV�
��� &KRRVH�6DYH�
&RPSDQ\�FRGHV��EXVLQHVV�DUHDV��DQG�SODQWV�DUH�H[DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV��<RXFDQ�GLVSOD\�DQG�PDLQWDLQ�D�OLVW�RI�H[LVWLQJ�OHYHOV�ZLWK�WUDQVDFWLRQ�6832�
20
Tip
2221
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–27
2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKH�DXWKRUL]DWLRQGDWD�DSSHDUV�KLHUDUFKLFDOO\�
7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKH�ILUVWOHYHO��EOXH���8QGHUQHDWK�\RX�ILQG�< 2EMHFW�FODVVHV� �SXUSOH< $XWKRUL]DWLRQ�REMHFW� �JUHHQ< $XWKRUL]DWLRQ� �\HOORZ< $XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH
��� 7R�PDLQWDLQ�WKH�DFWLYLW\��FOLFN�WKH$FWLYLW\�YDOXH�ILHOG�
([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV
�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO
OHYHOV�
��� 6HOHFW�WKH�GHVLUHG�DXWKRUL]DWLRQ��IRUH[DPSOH��'LVSOD\��
��� 7R�WUDQVIHU��FKRRVH� �
��� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ, WR�PDLQWDLQ�WKH�$XWKRUL]DWLRQ�JURXS��FOLFN�WKH$XWKRUL]DWLRQ�JURXS�YDOXH�ILHOG�
23
24
25
26
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–28
��� (QWHU�RU�VHOHFW�WKH�GHVLUHG�YDOXH��ZHFKRRVH�)XOO�DXWKRUL]DWLRQ��
��� 7R�WUDQVIHU��FKRRVH� �
3URFHHG�ZLWK�DOO�RSHQ�ILHOGV�LQ�WKH�VDPHZD\�XQWLO�DOO�OLJKWV�VZLWFK�WR�JUHHQ�
��� &KRRVH� �
��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �
��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�
��� 7R�FRQWLQXH��FKRRVH� �
1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV
:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�
7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�
31
30
29
32
27
28
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–29
7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������
��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�
,I�\RX�FKRRVH� �DQG�IRUJHW�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�VKRZV�\RX�WKHVWDWXV�DQG�UHPLQGV�\RX�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS�
33
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–30
$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�
��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�
7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�
6WDWXV�'LVSOD\�RQ�WKH�7DE
7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�
�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU
PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�
��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�
��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�
��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�
34
3536
37
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–31
7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �
)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �
��� �&KRRVH� �&RPSOHWH�FRPSDUH�
,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�
��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�VHHV�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIRU�WKH�VHOHFWHG�DFWLYLW\�JURXS�
38
39
Tip
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–32
7KH�XVHU�VHHV�WKH�6$3�(DV\�$FFHVV�¥�8VHUPHQX�IRU��XVHUªV�QDPH!�ZKHQ�ORJJLQJLQWR�5���DIWHU�WKH�DVVLJQPHQW�RI�WKHDFWLYLW\�JURXS��LQ�WKLV�H[DPSOH��WKH�XVHUPHQX�IURP�),B$3B'$7$B(175<B&/(5.��
8VHUV�FDQ�PDLQWDLQ�WKHLU�RZQ�IDYRULWHVDQG�LQVHUW�OLQNV�WR�WKHLU�PHQX��6HHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�IRU�GHWDLOV�
&UHDWLQJ�&RPSRVLWH�$FWLYLW\�*URXSV
,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�GHVFULEHG�KRZ�WR�FUHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV�XVLQJ�VLQJOH�DFWLYLW\JURXSV��<RX�DOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�FRPSRVLWH�DFWLYLW\�JURXSV��ZKLFK�FRQVLVW�RI�PXOWLSOH�VLQJOHDFWLYLW\�JURXSV��,Q�WKRVH�FRPSRVLWH�DFWLYLW\�JURXSV��\RX�FDQQRW�DVVLJQ�WUDQVDFWLRQV�GLUHFWO\��<RX�KDYH�WRHQWHU�VLQJOH�WUDQVDFWLRQV�LQWR�VHSDUDWH�DFWLYLW\�JURXSV�DQG�WKHQ�DVVLJQ�WKRVH�DFWLYLW\�JURXSV�WR�FRPSRVLWHDFWLYLW\�JURXS�
,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FRPSRVLWH�DFWLYLW\�JURXS�WKDW�LQFOXGHV�WKUHHVLQJOH�DFWLYLW\�JURXSV�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 8QGHU�7\SH��VHOHFW�&RPSRVLWH�DFWLYLW\JURXS�
�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_MANAGER��
�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�
3
4
2
Chapter 5: User Role Templates
How to Work with User Role Templates
Release 4.6A/B5–33
�� ,Q�'HVFULSWLRQ� HQWHU�D�VKRUWGHVFULSWLRQ�
�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�
�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�
�� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�WRVHOHFW�WKH�DFWLYLW\�JURXSV�IRU�WKLVFRPSRVLWH�DFWLYLW\�JURXS�
�� 6HOHFW� �WR�LQVHUW�WKH�DFWLYLW\JURXSV�
<RX�FDQ�RQO\�LQVHUW�DFWLYLW\�JURXSV�LQWRFRPSRVLWH�DFWLYLW\�JURXSV��,W�LV�QRWSRVVLEOH�WR�DVVLJQ�RWKHU�FRPSRVLWHDFWLYLW\�JURXSV�RU�VLQJOH�WUDQVDFWLRQV�WRD�FRPSRVLWH�DFWLYLW\�JURXS�
��� 6HOHFW�WKH�DFWLYLW\�JURXSV�WKDW�\RXZRXOG�OLNH�WR�LQFOXGH�LQ�WKHFRPSRVLWH�DFWLYLW\�JURXS�
��� &KRRVH� �
8
6
7
5
9
10
11
Chapter 5: User Role Templates
How to Work with User Role Templates
Authorizations Made Easy5–34
7KH�DFWLYLW\�JURXSV�KDYH�EHHQLQVHUWHG�
��� &KRRVH�WKH�0HQX�WDE�WR�FKHFN�WKDW\RX�FDQQRW�PDLQWDLQ�WKH�PHQX�IRUWKH�FRPSRVLWH�DFWLYLW\�JURXS�
��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�XVHUV�
��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�
��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�
��� $IWHU�HQWHULQJ�DOO�XVHUV��FKRRVH�8VHUFRPSDUH�
12
13
1415
16
Chapter 5: User Role Templates
Tips for an Administrator
Release 4.6A/B5–35
7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� ��DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �
)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �
<RX�DUH�QRZ�ILQLVKHG�FUHDWLQJ�D�FRPSRVLWH�DFWLYLW\�JURXS�DQG�DVVLJQLQJ�WKLV�WR�D�XVHU��:KHQXVHUV�ORJ�RQ�WR�WKH�5���6\VWHP��WKHLU�PHQX�ZLOO�FRQWDLQ�WKH�WUDQVDFWLRQV�RI�WKH�WKUHH�LQVHUWHGDFWLYLW\�JURXSV�IURP�RXU�H[DPSOH�
7LSV�IRU�DQ�$GPLQLVWUDWRU
$V�DQ�DGPLQLVWUDWRU�ZLWK�VSHFLDO�DXWKRUL]DWLRQV��\RX�FDQ�KDYH�D�VKRUWFXW�IRU�DVVLJQLQJ�XVHUUROHV�WR�D�XVHU�ZLWKRXW�JRLQJ�LQWR�WUDQVDFWLRQ�3)&*�RU�68���
7R�VHH�DQG�SHUIRUP�WKH�VKRUWFXW��\RX�QHHG�DFFHVV�WR�WUDQVDFWLRQ�FRGH�3)&*��7KH�ILHOG�YDOXHVQHHG�WR�EH�VHW�WR�IXOO�DXWKRUL]DWLRQ�� ��LQ�WKH�DXWKRUL]DWLRQ�REMHFWV�6B86(5B352�6B86(5B*53��6B86(5B$87�DV�VKRZ�LQ�WKH�WDEOH�EHORZ�
$XWKRUL]DWLRQ�REMHFW�6B86(5B352
�$FWLYLW\
�$XWK��SURILOH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��352),/(�
$XWKRUL]DWLRQ�REMHFW�6B86(5B*53
�$FWLYLW\
�8VHU�JURXS�LQ�XVHU�PDVWHU�PDLQWHQDQFH��&/$66�
$XWKRUL]DWLRQ�REMHFW�6B86(5B$87
�$FWLYLW\
�$XWKRUL]DWLRQ�QDPH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��$87+�
�$XWK��REMHFW�LQ�XVHU�PDVWHU�PDLQWHQDQFH��2%-(&7�
� �IXOO�DXWKRUL]DWLRQ
Chapter 5: User Role Templates
Tips for an Administrator
Authorizations Made Easy5–36
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU�XVLQJ�WKLV�VKRUWFXW�
�� 2Q�WKH�6$3�(DV\�$FFHVV�VFUHHQ�FKRRVH� �2WKHU�PHQX�
7KH�PHQX�ZLOO�RQO\�EH�GLVSOD\HG�LQWKLV�ZD\�LI�WKH�VHWWLQJV�IRU�WKHDXWKRUL]DWLRQ�REMHFWV�DUH�VHW�DVGHVFULEHG�LQ�WKH�WDEOH�RQ�WKHSUHYLRXV�SDJH�
�� 6HOHFW�WKH�XVHU�UROH�WHPSODWH�WKDW\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�D�XVHU�
�� &KRRVH� �
'HSHQGLQJ�RQ�\RXU�VHWWLQJV��WKHZLQGRZ�PLJKW�ORRN�GLIIHUHQW��EXW�LWSURYLGHV�WKH�VDPH�IXQFWLRQDOLW\�
1
2
3
Chapter 5: User Role Templates
Tips for an Administrator
Release 4.6A/B5–37
�� 7KH�VWUXFWXUH�RI�WKH�XVHU�UROHWHPSODWH�DSSHDUV�WKH�VDPH�ZD\�DQHQG�XVHU�VHHV�LW�ODWHU�
�� )RU�DQ�RYHUYLHZ�RI�ZKDW�WKLV�XVHUUROH�WHPSODWH�FRYHUV��FKRRVH�'RFXPHQWDWLRQ�
�� 7KH�GHVFULSWLRQ�DERXW�WKH�VHOHFWHGXVHU�UROH�WHPSODWH�LV�PDLQWDLQHG�LQWKH�DFWLYLW\�JURXS�GHVFULSWLRQ�ILHOGLQ�WKH�3*�
�� &KRRVH� �
4
5
6
7
Chapter 5: User Role Templates
Tips for an Administrator
Authorizations Made Easy5–38
�� 7R�DVVLJQ�D�XVHU�WR�WKLV�XVHU�UROHWHPSODWH��FKRRVH�$VVLJQ�XVHUV�
�� ,Q�WKH�$VVLJQ�XVHUV�ZLQGRZ��HQWHU�WKHXVHUV�QDPH�GLUHFWO\�RU�XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�XVHU�IURP�D�OLVW�
��� &KRRVH� �
��� 7R�JHQHUDWH�WKH�SURILOH�IRU�WKHDFWLYLW\�JURXS��FKRRVH�<HV�
8
9
10
11
Chapter 5: User Role Templates
Tips for an Administrator
Release 4.6A/B5–39
��� 7KH�VHOHFWHG�XVHU�KDV�EHHQ�DVVLJQHGWR�WKH�XVHU�UROH�WHPSODWH�DQG�WKHGDWD�ZDV�VDYHG�
��� &KRRVH� �RU�UHSHDW�WKH�VWHSV�IRU�DQHZ�DVVLJQPHQW�
12
13
Chapter 5: User Role Templates
Available User Role Templates
Authorizations Made Easy5–40
$YDLODEOH�8VHU�5ROH�7HPSODWHV
,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�H[SODLQHG�KRZ�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV��7KLV�VHFWLRQ�SURYLGHV�DQRYHUYLHZ�RI�WKH�XVHU�UROH�WHPSODWHV�GHOLYHUHG�ZLWK�5����VRUWHG�E\�DSSOLFDWLRQ�DUHD�
(DFK�XVHU�UROH�WHPSODWH�FRQWDLQV�D�< 6KRUW�GHILQLWLRQ�RI�WKH�UROH�DQG�DQ�RYHUYLHZ�RI�WDVNV< 5ROH�EDVHG�PHQX< &RPSOHWHO\�PDLQWDLQHG�DXWKRUL]DWLRQ�SURILOH�DFFRUGLQJ�WR�WKH�IXQFWLRQDOLW\�DFFHVVLEOH
5HOHDVH����$
7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DUH�DYDLODEOH�ZLWK�5���5HOHDVH����$�DQG�DUH�GLVWULEXWHG�DV�DFWLYLW\JURXSV�
$UHD�&URVV�$SSOLFDWLRQ� $UHD�/RJLVWLFV�([HFXWLRQ�
$XGLWRU 7UDQVSRUW�&RVW�0DQDJHU
'DWD�3URWHFWLRQ�$XGLWRU 7UDQVSRUW�&RVW�&OHUN
$XGLWRU�+5 :DUHKRXVH�:RUNHU
$XGLWRU�6\VWHP :DUHKRXVH�0DQDJHU
6SHFLDOLVW�'DWD�7UDQVIHU :DUHKRXVH�&OHUN
$UHD�0DWHULDOV�0DQDJHPHQW�3URFXUHPHQW� /RJLVWLFV�0DQDJHU
5HTXLVLWLRQHU /RJLVWLFV�&OHUN
053�FRQWUROOHU 7UDQVSRUW�3ODQQHU
%X\HU 7UDQVSRUW�0DQDJHU
*5�&OHUN 7UDQVSRUW�&OHUN
6(�&OHUN 6KLSSLQJ�0DQDJHU
*/�%X\HU 6KLSSLQJ�&OHUN
,9�&OHUN 3URMHFW�0DQDJHPHQW
3URGXFWLRQ�3ODQQLQJ 3URMHFW�0DQDJHU�&�
33�2SHUDWRU 3URMHFW�0DQDJHU�7�
33�3URGXFW�0DQDJHU :RUN�3DFNDJH�5HVSRQVLEOH
33�6XSHUYLVRU ,QYHVWPHQW�0DQDJHPHQW
.DQEDQ�&RQWUROOHU ,QYHVWPHQWV�$QDO\VW
053�&RQWUROOHU ,QYHVWPHQWV�0DQDJHU
5HS��0DQXIDFWXUHU ,QYHVWPHQWV�3ODQHU��25�
,QYHVWPHQWV�3ODQHU��35�
6HWWOH�6SHFLDOLVW
Chapter 5: User Role Templates
Available User Role Templates
Release 4.6A/B5–41
8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�
%DVLV���'HYHORSPHQW 4XDOLW\�0DQDJHPHQW
$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU &HUWLILFDWH
$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU (TXLSPHQW�0DQDJHU
6\VWHP�$GPLQLVWUDWRU ,QVSHFWLRQ�0DQDJHU
%DWFK�$GPLQLVWUDWRU ,QVSHFWLRQ�3ODQHU
$GPLQLVWUDWRU 3UREOHP�$XWKRU
3URFHVV�&RQWUROOHU 3UREOHP�3URFHVVRU
:RUNIORZ�'HYHORSHU 4XDOLW\�$QDO\VW
:RUNIORZ�3URFHVV�&RQWUROOHU 4XDOLW\�(QJLQHHU
4XDOLW\�0DQDJHU 4XDOLW\�,QVSHFWRU
7UDQVSRUW�0DQDJHU 6XSSRUW�/LQH�/HYHO��
&XVWRPL]LQJ�3URMHFW�0HPEHU 6XSSRUW�/LQH�/HYHO��
'DWDEDVH�$GPLQLVWUDWRU 6DOHV��'LVWULEXWLRQ
$%$3�'HYHORSHU 2UGHU�3URFHVVLQJ�&OHUN
'HYHORSPHQW�0DQDJHU 6DOHV�5HSUHVHQWDWLYH
'RFXPHQWDWLRQ�'HYHORSHU 6DOHV�0DQDJHU
3URMHFW�0DQDJHU &RQWUROOLQJ
(QGXVHU�3URILOH 3ODQQLQJ�$FWLYLW\�&RRUGLQDWRU
(YHU\�(PSOR\HH 6HQLRU�&RVWPDQDJHU
$/(�$GPLQLVWUDWRU 0DQDJHULDO�$FFRXQWDQW
$/(�'HYHORSHU 6DOHV�0DQDJHU
$GPLQLVWUDWRU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW )LQDQFH�0DQDJHPHQW
3URMHFW�/HDGHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�&OHUN
8VHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�$FFRXQWDQW
6$3VFULSW�3RZHU�8VHU 6WDII�$FFRXQWDQW
6SRRO�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�$FFRXQWDQW
$UFKLYHOLQN�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�6XSHUYLVRU
$UFKLYHOLQN�8VHU $FFRXQWV�3D\DEOH�$FFRXQWDQW
7HFKQLFDO�(QJLQHHU $FFRXQWV�3D\DEOH�6XSHUYLVRU
8VHU�$GPLQVWUDWRU &DVK�0DQDJHU
%XVLQHVV�:RUNSODFH�IRU�DOO�8VHUV &UHGLW�0DQDJHU
$GPLQLVWUDWRU $FFRXQWLQJ�6XSHUYLVRU
&RQWUROOHU 3URILW�&HQWHU�$FFRXQWLQJ
,PSOHPHQWDWLRQV�7HDP 3URILW�&HQWHU�&RQWUROOHU
3URILW�&HQWHU�0DQDJHU
Chapter 5: User Role Templates
Available User Role Templates
Authorizations Made Easy5–42
8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�
7UDYHO�0DQDJHPHQW 5HDO�(VWDWH
7UDYHO�$GPLQLVWUDWRU &RQWUROOHU�DQG�0DQDJHU
7UDYHO�$SSURYLQJ�PDQDJHU 5HQW�$GMXVWPHQW�&OHUN
7UDYHO�6\VWHP�PDQDJHU 6&6�&OHUN
7UDYHO�$VVLVWDQW 7HQDQW�&OHUN
7UDYHOHU 7HQDQW�5HQWDO�&OHUN
7UHDVXU\ +XPDQ�5HVRXUFHV
$GPLQLVWUDWRU $GPLQLVWUDWLYH�&OHUN
&UHGLW�$QDO\VW $GPLQLVWUDWLYH�&OHUN�%HQHILWV
'HSDUWPHQW�0DQDJHU�/RDQV $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ
/RDQV�2IILFHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW
5ROORYHU�2IILFHU %HQHILWV�6SHFLDOLVW
6WDII�$FFRXQWDQW &RPSHQVDWLRQ�6SHFLDOLVW
%DFNRIILFH�3URFHVV /LQH�0DQDJHU�%HQHILWV
&DVKPDQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW
&RQWUROOHU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ
)XQG�0DQDJHU /LQH�0DQDJHU�$SSUDLVDO�6\VWHP
5LVN�&RQWUROOHU /LQH�0DQDJHU�5RRP�5HVHUYDWLRQV
6WDII�$FFRXQWDQW +5�0DQDJHU
7UDGH�&RQWUROOHU +5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW
7UDGHU +5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ
7UHDVXU\�0DQDJHU +5�0DQDJHU�$SSUDLVDO�6\VWHP
3URGXFW�'DWD�0DQDJHPHQW +5�0DQDJHU�5RRP�5HVHUYDWLRQV
'HVLJQHU +5�0DQDJHU�&RPSHQVDWLRQ
:RUN�3UHSDUHU $GPLQLVWUDWLYH�&OHUN
)RUHLJQ�7UDGH $GPLQLVWUDWLYH�&OHUN�%HQHILWV
&RQ��([SRUW�&RQWURO�0DQDJHU $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ
*RY��3HULRG�0DQDJHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW
/RFDO�'RF��3D\PHQW�0DQDJHU %HQHILWV�6SHFLDOLVW
3UHIHUHQFH�PDQDJHU &RPSHQVDWLRQ�6SHFLDOLVW
3UR��([SRUW�0DQDJHU /LQH�0DQDJHU�%HQHILWV
3UR��,PSRUW�0DQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW
6XSHUYLVRU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ
/LQH�0DQDJHU�$SSUDLVDO�6\VWHP
/LQH�0DQDJHU�5RRP�5HVHUYDWLRQV
+5�0DQDJHU
Chapter 5: User Role Templates
Available User Role Templates
Release 4.6A/B5–43
8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�
+5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW 3D\UROO�6SHFLDOLVW�*HUPDQ\
+5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ 3D\UROO�6SHFLDOLVW�'DQPDUN
+5�0DQDJHU�$SSUDLVDO�6\VWHP 3D\UROO�6SHFLDOLVW�6SDLQ
+5�0DQDJHU�5RRP�5HVHUYDWLRQV 3D\UROO�6SHFLDOLVW�)UDQFH
+5�0DQDJHU�&RPSHQVDWLRQ 3D\UROO�6SHFLDOLVW�*UHDW�%ULWDLQ
,QFHQWLYH�:DJHV�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�+RQJ�.RQJ
7LPH�5HFRUGLQJ�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�,QGRQHVLD
6SHFLDOLVW�2SHUDWLRQVSODQQHU 3D\UROO�6SHFLDOLVW�,UHODQG
3D\UROO�&OHUN 3D\UROO�6SHFLDOLVW�-DSDQ
3D\UROO�&OHUN�$XVWULD 3D\UROO�6SHFLDOLVW�0H[LFR
3D\UROO�&OHUN�%HOJLXP 3D\UROO�6SHFLDOLVW�0DOD\VLD
3D\UROO�&OHUN�&DQDGD 3D\UROO�6SHFLDOLVW�1HWKHUODQGV
3D\UROO�&OHUN�*HUPDQ\ 3D\UROO�6SHFLDOLVW�1RUZD\
3D\UROO�&OHUN�6SDLQ 3D\UROO�6SHFLDOLVW�1HZ�=HDODQG
3D\UROO�&OHUN�*UHDW�%ULWDLQ 3D\UROO�6SHFLDOLVW�3KLOLSSLQHV
3D\UROO�&OHUN�,QGRQHVLD 3D\UROO�6SHFLDOLVW�3RUWXJDO
3D\UROO�&OHUN�0H[LFR 3D\UROO�6SHFLDOLVW�6ZHGHQ
3D\UROO�&OHUN�0DOD\VLD 3D\UROO�6SHFLDOLVW�6LJQDSRUH
3D\UROO�&OHUN�1HWKHUODQGV 3D\UROO�6SHFLDOLVW�7KDLODQG
3D\UROO�&OHUN�1RUZD\ 3D\UROO�6SHFLDOLVW�7DLZDQ
3D\UROO�&OHUN�1HZ�=HDODQG 3D\UROO�6SHFLDOLVW�86$
3D\UROO�&OHUN�3KLOLSSLQHV 3D\UROO�6SHFLDOLVW�6RXWK�$IULFD
3D\UROO�&OHUN�3RUWXJDO 5HFUXLWHU
3D\UROO�&OHUN�6LJQDSRUH 6\VWHP�$GPLQLVWUDWRU
3D\UROO�&OHUN�7DLZDQ 6\VWHP�$GPLQLVWUDWRU�$UJHQWLQLD
3D\UROO�&OHUN�86$ 6\VWHP�$GPLQLVWUDWRU�$XVWULD
3D\UROO�&OHUN�9HQH]XHOD 6\VWHP�$GPLQLVWUDWRU�$XVWUDOLD
3D\UROO�&OHUN�6RXWK$IULFD 6\VWHP�$GPLQLVWUDWRU�%HOJLXP
3D\UROO�6SHFLDOLVW 6\VWHP�$GPLQLVWUDWRU�%UDVLO
3D\UROO�6SHFLDOLVW�$UJHQWLQLD 6\VWHP�$GPLQLVWUDWRU�&DQDGD
3D\UROO�6SHFLDOLVW�$XVWULD 6\VWHP�$GPLQLVWUDWRU�6XLVVH
3D\UROO�6SHFLDOLVW�$XVWUDOLD 6\VWHP�$GPLQLVWUDWRU�*HUPDQ\
3D\UROO�6SHFLDOLVW�%HOJLHQ 6\VWHP�$GPLQLVWUDWRU�'DQPDUN
3D\UROO�6SHFLDOLVW�%UDVLO 6\VWHP�$GPLQLVWUDWRU�6SDLQ
3D\UROO�6SHFLDOLVW�&DQDGD 6\VWHP�$GPLQLVWUDWRU�)UDQFH
3D\UROO�6SHFLDOLVW�6XLVVH 6\VWHP�$GPLQLVWUDWRU�*UHDW�%ULWDLQ
Chapter 5: User Role Templates
Available User Role Templates
Authorizations Made Easy5–44
8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�
6\VWHP�$GPLQLVWUDWRU�+RQJ�.RQJ 6\VWHP�$GPLQLVWUDWRU�2UJDQL]DWLRQDO�0DQDJHPHQW
6\VWHP�$GPLQLVWUDWRU�,QGRQHVLD 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�$GPLQLVWUDWLRQ
6\VWHP�$GPLQLVWUDWRU�,UHODQG 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�&RVW�3ODQQLQJ
6\VWHP�$GPLQLVWUDWRU�-DSDQ 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�'HYHORSPHQW
6\VWHP�$GPLQLVWUDWRU�0DOD\VLD 6\VWHP�$GPLQLVWUDWRU�$SSUDLVDO�6\VWHP
6\VWHP�$GPLQLVWUDWRU�1HWKHUODQGV 6\VWHP�$GPLQLVWUDWRU�7UDLQLQJ�DQG�(YHQWV
6\VWHP�$GPLQLVWUDWRU�1RUZD\ 6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV
6\VWHP�$GPLQLVWUDWRU�1HZ�=HDODQG 6\VWHP�$GPLQLVWUDWRU�3D\UROO
6\VWHP�$GPLQLVWUDWRU�3KLOLSSLQHV 6\VWHP�$GPLQLVWUDWRU�5HFUXLWPHQW
6\VWHP�$GPLQLVWUDWRU�3RUWXJDO 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN
6\VWHP�$GPLQLVWUDWRU�6ZHGHQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��3HUVRQQHO�'HYHORSPHQW
6\VWHP�$GPLQLVWUDWRU�6LJQDSRUH 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��$SSUDLVDO�6\VWHP
6\VWHP�$GPLQLVWUDWRU�7KDLODQG 7UDLQLQJ�DQG�'HYHOSP��&OHUN��7UDLQLQJ�DQG�(YHQW�0DQDJHPHQW
6\VWHP�$GPLQLVWUDWRU�7DLZDQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��5RRP�5HVHUYDWLRQ
6\VWHP�$GPLQLVWUDWRU�86$ 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��3HUVRQQHO�'HYHORSPHQW
6\VWHP�$GPLQLVWUDWRU�,QWHUQDWLRQDO 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��$SSUDLVDO�6\VWHP
6\VWHP�$GPLQLVWUDWRU�6RXWK�$IULFD 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��7UDLQLQJ
6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��5RRP�5HVHUYDWLRQ
6\VWHP�$GPLQLVWUDWRU�%HQHILWV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW
6\VWHP�$GPLQLVWUDWRU�&RPSHQVDWLRQ
5HOHDVH����%
7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DYDLODEOH�ZLWK�5���5HOHDVH����%�DUH�LQ�DGGLWLRQ�WR�WKH�H[LVWLQJ�IURP5HOHDVH����$�DV�VKRZQ�DERYH�
%DVLV +XPDQ�5HVRXUFHV
$%$3�'HYHORSHU ,QFHQWLYH�:DJHV�&OHUN
$OH�$GPLQLVWUDWRU ,QFHQWLYH�:DJHV�6SHFLDOLVW
$/(�'HYHORSHUV 7LPH�5HFRUGLQJ�$GPLQLVWUDWRU
0DVWHU�'DWD�'LVWULEXWLRQ 7LPH�5HFRUGLQJ�6SHFLDOLVW
$FFRXQWLQJ�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�&OHUN
+5�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�6SHFLDOLVW
/RJLVWLFV�0DVWHU�'DWD�'LVWULEXWLRQ 0DWHULDO�0DVWHU
)LQDQFH�PDQDJHPHQW %X\LQJ
),��$GYDQFH�3D\HU�IRU�7ULS�$GYDQFHV
Chapter 5: User Role Templates
Available User Role Templates
Release 4.6A/B5–45
8VHU�5ROH�7HPSODWHV����%��FRQWLQXHG�
5HWDLO 0DLQWHQDQFH�RI�6DOHV�3ULFH�&DOFXODWLRQV
$OORFDWLRQ�7DEOH 3ULFLQJ�(QYLURQPHQW
$VVRUWPHQW�0DQDJHPHQW 6DOHV�3ULFH�&DOFXODWLRQV��6WUDWHJLF�
5HWDLO�6WRFN�3ODQQHU 3URPRWLRQ�0DQDJHPHQW
2UGHU�2SWLPL]LQJ 6WRUH�0DQDJHU
3HULVKDEOHV�3ODQQLQJ 7ULJJHULQJ�DQG�&RQWUROOLQJ�0HUFKDQGLVH�3URFXUHPHQW�LQ�D�6WRUH
&DWHJRU\�0DQDJHU *DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU
&ODVVLILFDWLRQ 6WRUH�*RRGV�5HFHLSWV�,VVXHV�DQG�,QYHQWRU\
0DLQWHQDQFH�RI�3XUFKDVH�3ULFH�&RQGLWLRQV 0DQDJHPHQW�RI�,QVWRUH�3HUVRQQHO
0DLQWHQDQFH�RI�6DOHV�3ULFH�&RQGLWLRQV ,QVWRUH�3ODQQLQJ�DQG�&RQWURO
*RRGV�5HFHLSW 6DOHV�$FWLYLWLHV�LQ�D�6WRUH
*RRGV�5HFHLSW�$VVRFLDWH 6DOHV�'HSDUWPHQW�0DQDJHU�LQ�D�6WRUH
,QWHUQDO�:DUHKRXVH�+DQGOLQJ 6WRUH�$VVRFLDWH�8VLQJ�6$3�5HWDLO�6WRUH
:DUHKRXVH�0DQDJHU 6HWWOHPHQW�RI�&XVWRPHU�$UUDQJHPHQWV
6KLSSLQJ�$VVRFLDWH 0DLQWHQDQFH�RI�&XVWRPHU�$UUDQJHPHQWV
:DUHKRXVH�:RUNHU 6HWWOHPHQW�RI�9HQGRU�$UUDQJHPHQWV
5HWDLO�%X\HU 0DLQWHQDQFH�RI�9HQGRU�$UUDQJHPHQWV
%X\LQJ�$FWLYLWLHV 7UDQVSRUWDWLRQ�0DQDJHU
*DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU 7UDQVSRUWDWLRQ�3ODQQHU
,QYRLFH�9HULILFDWLRQ�&OHUN /RJLVWLFV�([HFXWLRQ
9HULILFDWLRQ�RI�,QYRLFHV 6KLSSLQJ�&OHUN
$UFKLYLQJ�RI�,QYRLFHV 6KLSSLQJ�0DQDJHU
)XQFWLRQV�LQ�WKH�,QYRLFH�9HULILFDWLRQ�(QYLURQPHQW 3ODQLQJ�6\VWHPV
&RRUGLQDWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW 'LVSOD\�DQG�0DLQWDLQ�:RUN�&HQWHU�0DVWHU�'DWD
([HFXWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW�3ODQQLQJ 6DOHV�3ULFH�9DOXDWLRQ
0HUFKDQGLVH�&DWHJRU\�+LHUDUFK\�&UHDWLRQ
5HTXLUHPHQWV�3ODQQLQJ
Chapter 5: User Role Templates
Available User Role Templates
Authorizations Made Easy5–46
6–1
&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU
)XQFWLRQDOLW\
&RQWHQWV
Overview ..................................................................................................................6–2
Selecting Views/Types in Activity Group Maintenance ......................................6–2
Exploring Advanced Profile Generator Functionality .........................................6–3
Copying and Deriving Activity Groups...............................................................6–16
Selecting Workflow Tasks....................................................................................6–21
Deleting Activity Groups ......................................................................................6–24
Postmaintaining User Role Templates ...............................................................6–25
Maintaining and Generating the Authorization Profiles....................................6–26
Displaying an Overview of Generated Profiles ..................................................6–30
Regenerating Authorization Profiles After Making Changes ...........................6–32
Using Utilities to Change Generated Authorizations ........................................6–36
Customizing Authorizations ................................................................................6–38
��
Chapter 6: Advanced Profile Generator Functionality
Overview
6–2
2YHUYLHZ
,Q�DGGLWLRQ�WR�WKH�WKUHH�PHWKRGV�RI�XVLQJ�WKH�XVHU�UROH�WHPSODWHV��WKH�3URILOH�*HQHUDWRU��3*�SURYLGHV�DGGLWLRQDO�RSWLRQDO�IXQFWLRQDOLW\�
,Q�WKLV�FKDSWHU��ZH�H[SODLQ�PRUH�RI�WKH�YDVW�IXQFWLRQDOLW\�RI�WKH�3*��([DPSOHV�VKRZ�KRZ�WRHQKDQFH�WKH�XVH�RI�\RXU�XVHU�UROH�WHPSODWHV�
6HOHFWLQJ�9LHZV�7\SHV�LQ�$FWLYLW\�*URXS�0DLQWHQDQFH
Views
Possible entries
Authorizations Made Easy
,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�ZLQGRZ��WUDQVDFWLRQ�3)&*���\RX�FDQ�WRJJOH�EHWZHHQGLIIHUHQW�YLHZV�DQG�W\SHV��)RU�YLHZV�\RX�FDQ�FKRRVH�< %DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV�< 2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ�
)RU�W\SHV�\RX�FDQ�FKRRVH�< $FWLYLW\�JURXS< &RPSRVLWH�DFWLYLW\�JURXS
7KHVH�YLHZV�DQG�W\SHV�DUH�GHVFULEHG�LQ�WKH�IROORZLQJ�VHFWLRQV�
%DVLF�0DLQWHQDQFH
6HOHFW�%DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��WR�FUHDWH�DFWLYLW\�JURXSV�DQG�DVVLJQWKHVH�JURXSV�WR�XVHUV�
2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�
6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ��WR�FUHDWH�DFWLYLW\�JURXSV�DQGDVVLJQ�WKHVH�DFWLYLW\�JURXSV�WR�5���XVHUV�RU�3'�REMHFWV��2YHUYLHZ�JLYHV�\RX�IXOO�DFFHVV�WR�DOODFWLYLW\�JURXS�PDLQWHQDQFH�IXQFWLRQV��LQFOXGLQJ�RUJDQL]DWLRQ�PDQDJHPHQW�DQG�WKH�UHODWHGWLPH�GHSHQGHQFLHV��)RU�H[DPSOH��ZKHQ�\RX�DUH�FUHDWLQJ�RU�FKDQJLQJ�DQ�DFWLYLW\�JURXS��\RXFDQ�RQO\�OLQN�ZRUNIORZ�WDVNV�WR�DQ�DFWLYLW\�JURXS�LQ�2YHUYLHZ�
Types
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Release 4.6A/B6–3
$FWLYLW\�*URXS
6HOHFW�$FWLYLW\�JURXS�WR�GLVSOD\�DOO�DYDLODEOH�DFWLYLW\�JURXSV��LQFOXGLQJ�FRPSRVLWH�DFWLYLW\JURXSV�ZKHQ�\RX�VHOHFW�SRVVLEOH�HQWULHV�
&RPSRVLWH�$FWLYLW\�*URXS
6HOHFW�&RPSRVLWH�DFWLYLW\�JURXSV�WR�GLVSOD\�RQO\�FRPSRVLWH�DFWLYLW\�JURXSV�ZKHQ�\RX�VHOHFWSRVVLEOH�HQWULHV�
([SORULQJ�$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\
,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHVFULEHG�WKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROHWHPSODWHV��<RX�DFWXDOO\�KDYH�PRUH�RSWLRQV�ZKHQ�ZRUNLQJ�ZLWK�WKH�DFWLYLW\�JURXSV�DQG3URILOH�*HQHUDWRU��3*���)RU�H[DPSOH��WKHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\JURXS³\RX�FDQ�FUHDWH�\RXU�RZQ�KLHUDUFK\�ZLWK�FXVWRPL]HG�IROGHUV��QDPHV��DQG�OLQNV�IRUWKH�XVHU�UROH�WHPSODWHV�\RX�FUHDWH�
2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��VHH�EHORZ���D�VHULHV�RI�EXWWRQV�DURXQG�WKH�DVVLJQHGWUDQVDFWLRQV�SURYLGH�GLIIHUHQW�IXQFWLRQDOLW\�
Creating or changing thehierarchy (folders, names,order)
Inserting transactions andreports manually or fromdifferent existing menus
Additional activities(moving object in hierarchy,translating, displayingtechnical names, ordisplaying objectdocumentation)
Inserting Internet anddocument links
Select a system whereyou would like thesetransactions to beexecuted
Displaying reportinformation
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Authorizations Made Easy6–4
&UHDWLQJ�DQG�&KDQJLQJ�WKH�+LHUDUFK\
<RX�FDQ�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\�JURXS�E\�HLWKHU�< &UHDWLQJ�\RXU�RZQ�KLHUDUFK\< 0RYLQJ�REMHFWV�LQWR�WKH�H[LVWLQJ�KLHUDUFK\�DQG�UHQDPLQJ�WKHP�WR�VXLW�\RXU�QHHGV
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�IROGHU��JLYH�LW�D�QHZ�QDPH��DQG�PRYH�LW�LQWR�WKHKLHUDUFK\�
:H�ZDQW�WR�FUHDWH�D�QHZ�IROGHU�DQG�FDOO�LW�´%X\HUµ�XQGHU�0DVWHU�'DWD�→�9HQGRU�LQ�WKH�DFWLYLW\�JURXS00B%8<(5B$*�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�
�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�VHOHFW�WKH�KLHUDUFK\�OHYHO�XQGHUZKLFK�\RX�ZDQW�WR�LQVHUW�WKH�IROGHU�IRU�H[DPSOH��9HQGRU�LQ00B%8<(5B$*��
�� &KRRVH� �
�� (QWHU�WKH�QDPH�RI�WKH�QHZ�IROGHU�
�� &KRRVH� �5
3
4
6
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Release 4.6A/B6–5
�� 7KH�QHZ�IROGHU�LV�SODFHG�RQH�OHYHOEHORZ�WKH�VHOHFWHG�IROGHU�LQ�WKHKLHUDUFK\��7R�PRYH�LW�XS�RU�GRZQ�XVH�WKH�DUURZV� �RU�XVH�GUDJ�DQG�GURS�
7R�FKDQJH�WKH�WH[W�RI�WKH�QRGH��VHOHFW�LWDQG�HQWHU�WKH�QHZ�QDPH�
<RX�QHHG�WR�EH�FHUWDLQ�KRZ�\RX�FKDQJH�\RXU�PHQXV��EHFDXVH�LI�WKH�RULJLQDO�5���PHQXSDWK�FKDQJHV��\RX�PLJKW�QRW�EH�DEOH�WR�ILQG�\RXU�VHOHFWHG�WUDQVDFWLRQ�LQ�WKH�VDPHSRVLWLRQ�DV�EHIRUH�
,QVHUWLQJ�7UDQVDFWLRQV
:H�FRQWLQXH�IURP�WKH�VWHS�DERYH�WR�VKRZ�KRZ�WR�LQVHUW�WUDQVDFWLRQV�XQGHU�WKH�QHZO\�FUHDWHG�IROGHU�
,I�\RX�NQRZ�WKH�WUDQVDFWLRQ�FRGH��\RX�FDQ�LQVHUW�LW�PDQXDOO\�E\�FKRRVLQJ� �7UDQVDFWLRQ�DQG�HQWHULQJ�WKHWUDQVDFWLRQ�FRGH��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�IRU�GHWDLOV��
7R�VHOHFW�WKH�WUDQVDFWLRQ�IURP�D�PHQX��FKRRVH�RQH�RI�WKH�IROORZLQJ�EXWWRQV�
�)URP�WKH�6$3�PHQX��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�
�)URP�DFWLYLW\�JURXS
�)URP�DUHD�PHQX
7
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Authorizations Made Easy6–6
�� &KRRVH�IURP�ZKHUH�\RX�ZRXOG�OLNHWR�LQVHUW�WKH�WUDQVDFWLRQ��LQ�WKLVH[DPSOH��ZH�FKRVH� �)URP�DFWLYLW\JURXS��
,I�\RX�LQVHUW�WUDQVDFWLRQV�IURP�DGLIIHUHQW�PHQX��WKH�FRPSOHWH�PHQX�SDWKIURP�WKDW�VRXUFH�ZLOO�EH�DGGHG�
�� 6HOHFW�WKH�DFWLYLW\�JURXS�IURP�ZKHUH\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKHWUDQVDFWLRQ�FRGH��<RX�QHHG�WR�NQRZZKDW�DFWLYLW\�JURXS�FRQWDLQV�WKLVWUDQVDFWLRQ��:H�VHOHFWHG6$3B00B*/B%8<(5B$*�
�� &KRRVH� �
2
3
1
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Release 4.6A/B6–7
7KH�PHQX�VWUXFWXUH�RI�WKH�VHOHFWHGDFWLYLW\�JURXS�DSSHDUV�
�� 2SHQ�WKH�GHVLUHG�KLHUDUFK\�OHYHODQG�VHOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�V��
7R�VLPSOLI\�\RXU�VHDUFK��WXUQ�RQ�WKHWHFKQLFDO�QDPHV�E\�FKRRVLQJ� �
�� &KRRVH� �$GG�WR�WUDQVIHU�WKHWUDQVDFWLRQV�WR�\RXU�DFWLYLW\�JURXS�7KH�FRPSOHWH�PHQX�SDWK��LQ�WKLVFDVH��9HQGRU�→�%X\HU�ZLWK�DFWLYLW\JURXSV�&UHDWH��&KDQJH��DQG�'LVSOD\�LV�WUDQVIHUUHG�
$IWHU�WKH�FRPSOHWH�PHQX�SDWK�LVLQVHUWHG��\RX�KDYH�WKH�RSWLRQ�WRUHQDPH�LW�DQG�PRYH�WKH�LQVHUWHGWUDQVDFWLRQV�WR�WKH�GHVLUHG�SRVLWLRQXVLQJ�GUDJ�DQG�GURS�RU�0RYH�QRGH�
�� 6HOHFW�WKH�WUDQVDFWLRQ�WR�EH�PRYHG�
�� &KRRVH� �0RYH�QRGH�RU�XVH�GUDJ�DQG�GURS�WR�PRYH�LW�
4
5
6
7
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Authorizations Made Easy6–8
�� 6HOHFW�WKH�GHVLUHG�IROGHU��IRUH[DPSOH��%X\HU��
�� &KRRVH� �
7KH�WUDQVDFWLRQ�KDV�EHHQ�PRYHG�
'R�WKH�VDPH�IRU�WKH�RWKHUWUDQVDFWLRQV�XQWLO�DOO�DUH�LQ�WKH�ULJKWIROGHU�
��� 6HOHFW�WKH�PHQX�HQWU\�WKDW�ZDVWUDQVIHUUHG��IRU�H[DPSOH�9HQGRU��
��� &KRRVH� �WR�GHOHWH�WKH�HQWU\�
8
9
11
10
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Release 4.6A/B6–9
7KH�WUDQVDFWLRQV�KDYH�EHHQ�PRYHGDQG�WKH�QRGH�KDV�EHHQ�GHOHWHG�
$IWHU�LQVHUWLQJ�DOO�WKH�GHVLUHGWUDQVDFWLRQV��\RX�KDYH�WR�JHQHUDWHWKH�DFWLYLW\�JURXS�DQG�DVVLJQ�XVHUV�
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Authorizations Made Easy6–10
,QVHUWLQJ�,QWHUQHW�DQG�'RFXPHQW�/LQNV
<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�OLQNV³IRU�H[DPSOH�0LFURVRIW�:RUG��([FHO�GRFXPHQWV�RU�,QWHUQHW�VLWHV³WR�DQDFWLYLW\�JURXS�VR�WKDW�WKHVH�OLQNV�ZLOO�EH�DYDLODEOH�WR�DOO�HQG�XVHUV�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS��(QG�XVHUVDOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�WKHLU�RZQ�OLQNV�ODWHU�RQ�WKHLU�(DV\�$FFHVV�VFUHHQ��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�DGG�D�OLQN�WR�D�ORFDO�0LFURVRIW�([FHO�VSUHDGVKHHW�DQG�D�ZHE�SDJH��:H�DUH�JRLQJ�WR�XVH�WKH�DFWLYLW\�JURXSIURP�DERYH�DQG�ZLOO�LQVHUW�D�IROGHU�FDOOHG�,QIRUPDWLRQ�VRXUFH�DV�D�SUHUHTXLVLWH�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�
�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSVZLQGRZ��VHOHFW�WKH�SRVLWLRQ�ZKHUH\RX�ZRXOG�OLNH�WR�LQVHUW�WKHGRFXPHQW�OLQN��IRU�H[DPSOH��WKHIROGHU�,QIRUPDWLRQ�VRXUFH��
�� &KRRVH� �:HE�DGGUHVV�1RWH��(YHQ�LI�\RX�ZDQW�WR�LQVHUW�DGRFXPHQW�OLQN��\RX�PXVW�XVH�WKH
�:HE�DGGUHVV�EXWWRQ�
�� (QWHU�WKH�WH[W�IRU�WKH�OLQN�LQ�WKH�7H[WILHOG�
�� (QWHU�WKH�SDWK�WR�WKH�GRFXPHQW�RUXVH�SRVVLEOH�HQWULHV�WR�VHOHFW�LW�
�� &KRRVH� �
7KH�GRFXPHQW�FDQ�EH�D�ORFDO�GRFXPHQW�RU�D�GRFXPHQW�IURP�WKH�QHWZRUN��1RWH�WKDWQDPHV�IRU�GLIIHUHQW�KDUG�GULYHV�PD\�EH�GLIIHUHQW�
34
56
7
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Release 4.6A/B6–11
�� 7KH�OLQN�WR�WKH�([FHO�VSUHDGVKHHW�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VDQ�LFRQ�WKDW�UHSUHVHQWV�WKHGRFXPHQW�W\SH�
�� &KRRVH� �:HE�DGGUHVV�WR�LQVHUW�WKH,QWHUQHW�OLQN�
��� ,Q�7H[W��HQWHU�WKH�WH[W�IRU�WKH�OLQN�
��� ,Q�:HE�DGGUHVV�RU�ILOH��HQWHU�WKH�85/OLQN�WR�WKH�GHVLUHG�SDJH�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�D�VDYHG�85/�
��� &KRRVH� �
��� 7KH�OLQN�WR�WKH�,QWHUQHW�SDJH�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VWKH�LFRQ� �IRU�,QWHUQHW�OLQNV�
8
9
13
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Authorizations Made Easy6–12
,QVHUWLQJ�5HSRUWV
1HDUO\�HYHU\�UHSRUW�LQ�WKH�V\VWHP�KDV�D�WUDQVDFWLRQ�DVVLJQHG�WR�LW��7KHUHIRUH�\RX�FDQ�VHOHFWDQ\�UHSRUW�DQG�DXWKRUL]H�XVHUV�MXVW�IRU�FHUWDLQ�UHSRUWV��7KHUH�DUH�GLIIHUHQW�RSWLRQV�WR�DVVLJQ�DUHSRUW�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�VHOHFW�IURP�HLWKHU�< $%$3�UHSRUW< 6$3�TXHU\< 7UDQVDFWLRQ�ZLWK�YDULDQW< 5HSRUW:ULWHU< 'ULOOGRZQ< 5HS�SRUWIROLR
1RW�RQO\�FDQ�\RX�DVVLJQ�UHSRUWV�WR�WKH�PHQX�WKDW�DUH�SURYLGHG�E\�6$3�WKDW�DOUHDG\�KDYH�DWUDQVDFWLRQ��EXW�LW�LV�DOVR�SRVVLEOH�WR�DVVLJQ�VHOI�GHYHORSHG�UHSRUWV�ZLWK�WKLV�IXQFWLRQDOLW\�:KHQ�\RX�DVVLJQ�D�VHOI�GHYHORSHG�UHSRUW��\RX�FDQ�FUHDWH�D�WUDQVDFWLRQ�FRGH�WR�WKH�UHSRUWZKHQ�DGGLQJ�LW�WR�WKH�PHQX�
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�RQO\�RQH�PHWKRG��WKH�RWKHUV�DUH�VLPLODU��
([DPSOH�
:H�VHOHFW�WKH�UHSRUW�'XH�'DWH�$QDO\VLV�IRU�2SHQ�,WHPV�IURP�WKH�DSSOLFDWLRQ�FODVV�),��$FFRXQWV�SD\DEOH�DQGDVVLJQ�LW�WR�D�IROGHU�FDOOHG�5HSRUWV�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�
�� 2Q�WKH�0HQX�WDE��VHOHFW�WKH�IROGHUZKHUH�\RX�ZRXOG�OLNH�WR�LQVHUW�WKHUHSRUW�
�� &KRRVH� �5HSRUW�3
4
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Release 4.6A/B6–13
,Q�RXU�H[DPSOH��ZH�GHPRQVWUDWHKRZ�WR�VHOHFW�D�UHSRUW�IURP�WKHDSSOLFDWLRQ�FODVV�
�� &KRRVH�'ULOOGRZQ�
,I�\RX�H[SDQG�WKH�SRSXS�XVLQJ� �WRGLVSOD\�RWKHU�RSWLRQV��\RX�FDQ�FKRRVHZKHWKHU�WR�DVVLJQ�\RXU�RZQ�WUDQVDFWLRQFRGH�RU�GHVFULSWLRQ�WR�WKH�UHSRUW��RUJHQHUDWH�WKH�WUDQVDFWLRQ�FRGHDXWRPDWLFDOO\�DQG�DGRSW�WKH�UHSRUWWUDQVDFWLRQ�
��� 6HOHFW�WKH�GHVLUHG�FODVV�IURP�WKH�OLVW�
�� &KRRVH�(QWHU�
'HSHQGLQJ�RQ�ZKDW�\RX�VHOHFWHG��WKHIROORZLQJ�ZLQGRZ��RU�ZLQGRZV��IRUVWHSV��²��PLJKW�GLIIHU�
�� 6HOHFW�WKH�GHVLUHG�UHSRUW�W\SH�
�� &KRRVH� �
��� &KRRVH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHUHSRUW�
5
6
8
9
10
Tip
7
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Authorizations Made Easy6–14
��� 6HOHFW�WKH�GHVLUHG�UHSRUW�IURP�WKH�KLWOLVW�
��� &KRRVH� �
��� &KRRVH� �
��� &KRRVH� �
��� 7R�VDYH�\RXU�ZRUN��FKRRVH� �
7KH�UHSRUW�KDV�EHHQ�DVVLJQHG�
,I�\RX�GHFLGHG�WR�JLYH�WKH�UHSRUW�DGLIIHUHQW�QDPH�DQG�GHVFULSWLRQ��WKH�QHZLQIRUPDWLRQ�ZRXOG�EH�GLVSOD\HG�LQ�WKHPHQX�LQVWHDG�
11
14
12
13
15
Chapter 6: Advanced Profile Generator Functionality
Exploring Advanced Profile Generator Functionality
Release 4.6A/B6–15
'LVSOD\LQJ�WKH�2QOLQH�'RFXPHQWDWLRQ�IRU�$FWLYLW\�*URXS�2EMHFWV
<RX�PD\�UHYLHZ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�QHDUO\�HYHU\�REMHFW�LQ�WKH�DFWLYLW\�JURXS�VWUXFWXUH��LIDYDLODEOH���,I�\RX�DUH�QRW�VXUH�DERXW�D�FHUWDLQ�WUDQVDFWLRQ��LQVWHDG�RI�JRLQJ�WKURXJK�WKH�RQOLQHGRFXPHQWDWLRQ��MXVW�PDUN�LW�LQ�WKH�VWUXFWXUH�DQG�FKRRVH� �'LVSOD\�GRFXPHQWDWLRQ��7KH�DGYDQWDJH�RI�WKLVPHWKRG�LV�\RX�GR�QRW�QHHG�WR�NQRZ�ZKDW�DUHD�\RXU�REMHFW�EHORQJV�WR�
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZRXOG�OLNH�WR�NQRZ�PRUH�DERXW�WKH�WUDQVDFWLRQ�0(���&UHDWH�SXUFKDVH�RUGHU�
�� 6HOHFW�WKH�REMHFW�IRU�ZKLFK�\RX�ZDQWWR�UHDG�WKH�GRFXPHQWDWLRQ�
�� &KRRVH� �'LVSOD\�GRFXPHQWDWLRQ�
�� 7KH�GRFXPHQWDWLRQ�EURZVHU�DSSHDUVZLWK�WKH�RQOLQH�GRFXPHQWDWLRQ�IRUWKH�VHOHFWHG�REMHFW�
'HSHQGLQJ�RQ�KRZ�\RX�VHW�XS�\RXURQOLQH�GRFXPHQWDWLRQ��WKH�EURZVHUPLJKW�ORRN�GLIIHUHQW�
3
1
2
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups
Authorizations Made Easy6–16
&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV
%DVLFV�RQ�'XSOLFDWLQJ�$FWLYLW\�*URXSV
,W�LV�DFFHSWDEOH�WR�XWLOL]H�RQO\�DFWLYLW\�JURXSV�LQ�\RXU�LPSOHPHQWDWLRQ�DQG�FUHDWH�WKHP�DVQHHGHG��+RZHYHU��6$3�SURYLGHV�WZR�PHWKRGV�WR�PDNH�DFWLYLW\�JURXS�PDLQWHQDQFH�HDVLHU�
7KHVH�WZR�FRUH�PHWKRGV�LQFOXGH�< &RS\LQJ�DFWLYLW\�JURXSV< 8VLQJ�GHULYHG�RU�LQKHULWHG�DFWLYLW\�JURXSV
7KH�GLDJUDP�EHORZ�SURYLGHV�DQ�RYHUYLHZ�RI�ZKDW�WR�H[SHFW�IURP�WKRVH�RSWLRQV�
���7KH�JUHHQ�FLUFOH�LQGLFDWHV�WKDW�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�
���7KH�UHG�;�LQGLFDWHV�WKDW�QR�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�
&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWKRXW�D�XVHU
'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU
'HVFULSWLRQ
$FWLYLW\�JURXS $FWLYLW\BJURXSB�
2ULJLQDO�DFWLYLW\�JURXS
$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�
copy WITHOUT user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU
7KH�FRS\��DFWLYLW\BJURXSB���FRQWDLQV�WKH�VDPHLQIRUPDWLRQ�DV�DFWLYLW\BJURXSB��H[FHSW�WKH�XVHU�
'HVFULSWLRQ
$FWLYLW\�JURXS $FWLYLW\BJURXSB�
&RSLHG�DFWLYLW\�JURXS
&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWK�D�XVHU
'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU
'HVFULSWLRQ
$FWLYLW\�JURXS $FWLYLW\BJURXSB�
2ULJLQDO�DFWLYLW\�JURXS
$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�
copy WITH user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU
'HVFULSWLRQ
$FWLYLW\�JURXS $FWLYLW\BJURXSB�
&RSLHG�DFWLYLW\�JURXS
7KH�FRS\��DFWLYLW\BJURXSB���LV�LGHQWLFDO�WRDFWLYLW\BJURXSB��
7KHUH�LV�QR�OLQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQG�DFWLYLW\BJURXSB��DIWHU�WKH�FRS\�SURFHVV�LVSHUIRUPHG�LQ�WKH�WZR�FDVHV�DERYH�
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups
Release 4.6A/B6–17
'HULYLQJ�DQ�DFWLYLW\�JURXS
'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU
'HVFULSWLRQ
$FWLYLW\�JURXS $FWLYLW\BJURXSB�
2ULJLQDO�DFWLYLW\�JURXS
'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU
'HVFULSWLRQ
$FWLYLW\�JURXS $FWLYLW\BJURXSB�
'HULYHG�DFWLYLW\�JURXS
Derive activity group
7KLV�LV�WKH�GHULYHG�DFWLYLW\�JURXS��$OO�WUDQVDFWLRQVIURP�WKH�RULJLQDO�DFWLYLW\�JURXSV�DUH�DOVR�LQ�WKLVRQH��<RX�FDQ�QRW�DGG�DQ\�LWHPV�WR�WKH�PHQX�7KH�DXWKRUL]DWLRQ�YDOXHV�QHHG�WR�EH�PDLQWDLQHG�
:H�DUH�JRLQJ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS��DFWLYLW\BJURXSB���IURP�$FWLYLW\BJURXSB��E\�XVLQJ�7UDQVDFWLRQ�,QKHULWDQFH�
7UDQVDFWLRQ�,QKHULWDQFH7UDQVDFWLRQ�,QKHULWDQFH
'HULYH�IURP�DFWLYLW\�JURXS 'HULYH�IURP�DFWLYLW\�JURXS
$FWLYLW\BJURXSB�
2ULJLQDO�DFWLYLW\�JURXS
$GGLQJ�WUDQVDFWLRQ�FRGHV�WR�DFWLYLW\BJURXSB��DIWHU�DFWLYLW\BJURXSB��LV�FUHDWHG�RU�JHQHUDWHG�DXWRPDWLFDOO\�LPSDFWV�DFWLYLW\BJURXSB���/LQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQGDFWLYLW\BJURXSB��LV�DOZD\V�XSGDWHG�DXWRPDWLFDOO\�ZKHQ�DFWLYLW\BJURXSB��KDV�QHZ�WUDQVDFWLRQFRGHV�DGGHG�WR�LW�
&RS\LQJ�$FWLYLW\�*URXSV
$V�VKRZQ�LQ�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV��FRS\LQJPHDQV�WKDW�\RX�UHSURGXFH�DQ�H[LVWLQJ�DFWLYLW\�JURXS��<RX�FDQ�FKRRVH�ZKHWKHU�RU�QRW�\RXZDQW�WR�FRS\�WKH�XVHU�DVVLJQPHQW�ZLWK�WKLV�DFWLYLW\�JURXS�
2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�ZKLFK�\RXZRXOG�OLNH�WR�FRS\�RU�VHOHFW�LW�E\�XVLQJ�SRVVLEOH�HQWULHV��7KHQ�FKRRVH� �WR�FRS\�LW��2Q�WKHIROORZLQJ�VFUHHQ��HQWHU�WKH�QHZ�QDPH�IRU�WKH�FRSLHG�DFWLYLW\�JURXS��)RU�D�PRUH�GHWDLOHGGHVFULSWLRQ��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV�
'HULYLQJ�$FWLYLW\�*URXSV
'HULYLQJ�DQ�DFWLYLW\�JURXS��DOVR�FDOOHG�WUDQVDFWLRQ�LQKHULWDQFH��PHDQV�\RX�FDQ�XVH�DQH[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH��(VVHQWLDOO\��WKH�V\VWHP�WUDQVIHUV�WKH�WUDQVDFWLRQV�IURPDQ�H[LVWLQJ�DFWLYLW\�JURXS��7KLV�SURFHVV�RI�GHULYLQJ�RQH�DFWLYLW\�JURXS�IURP�DQRWKHU�LV�RQO\SRVVLEOH�LI�\RX�KDYH�QRW�\HW�DVVLJQHG�DQ\�WUDQVDFWLRQV�WR�WKH�QHZ�DFWLYLW\�JURXS��7KHSUHYLRXV�DFWLYLW\�JURXS�SDVVHV�RQ�DOO�LWV�WUDQVDFWLRQV�WR�WKH�DFWLYLW\�JURXS�GHSHQGHQW�RQ�LW��,I\RX�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�LV�HDV\�WR�PDLQWDLQ�FRQVLVWHQF\�EHWZHHQ�DFFHVV�WRWUDQVDFWLRQ�FRGHV�
,I�\RX�DUH�JRLQJ�WR�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�GRHV�QRW�PDNH�PXFK�VHQVH�WR�XVHWHPSODWHV�RU�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQV�ZLWK�WKH�RULJLQDO�DFWLYLW\�JURXS��2QO\�WKHWUDQVDFWLRQ�FRGHV�DUH�SDVVHG�DORQJ�WR�WKH�GHULYHG�DFWLYLW\�JURXS��7KH�PDQXDOO\�LQVHUWHGDXWKRUL]DWLRQV�DQG�WHPSODWHV�LQ�DFWLYLW\�JURXS���ZLOO�QRW�EH�FRSLHG�LQWR�DFWLYLW\�JURXS���QRU�ZLOO�WKH�OLQNDJH�EH�PDLQWDLQHG�LI�PDQXDOO\�LQVHUWHG�LQ�DFWLYLW\�JURXS����
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups
Authorizations Made Easy6–18
$V�RI�5HOHDVH����%��LW�LV�DOVR�SRVVLEOH�WR�DGMXVW�DQG�JHQHUDWH�WKH�SURILOHV�IRU�DOO�DFWLYLW\JURXSV�GHULYHG�IURP�WKH�RULJLQDO�DFWLYLW\�JURXS��$OO�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLV�DFWLYLW\JURXS�LV�SDVVHG�WR�WKH�GHULYHG�DFWLYLW\�JURXSV��H[FHSW�IRU�WKH�RUJDQL]DWLRQDO�OHYHOV��7KHRUJDQL]DWLRQDO�OHYHOV�RI�WKH�GHULYHG�DFWLYLW\�JURXSV�UHPDLQ�XQFKDQJHG��7KH�GDWD�IRU�WKHFRUUHVSRQGLQJ�RUJDQL]DWLRQDO�OHYHO�LV�RQO\�SDVVHG�LI�QR�GDWD�KDV�EHHQ�PDLQWDLQHG�IRU�WKHRUJDQL]DWLRQDO�OHYHO�LQ�D�GHULYHG�DFWLYLW\�JURXS�
7R�H[HFXWH�WKLV�DFWLRQ��\RX�QHHG�IXOO�DXWKRUL]DWLRQ�IRU�WKH�REMHFW�6B86(5B9$/�DV�ZHOO�DV�WKHDXWKRUL]DWLRQ�WR�FKDQJH�WKH�GHULYHG�DFWLYLW\�JURXSV�
7R�DFFHVV�WKLV�IXQFWLRQDOLW\��FKRRVH�$XWKRUL]DWLRQV�→��$GMXVW�GHULYHG�DFWLYLW\�JURXSV�RQ�WKH&KDQJH�$XWKRUL]DWLRQ�'DWD�VFUHHQ�RI�WKH�RULJLQDO�DFWLYLW\�JURXS�
([DPSOH��8VDJH�RI�'HULYHG�$FWLYLW\�*URXSV
$�PDQDJHU�ZDQWV�KHU�VWDII�WR�EH�DEOH�WR�DFFHVV�DOO�WKH�WUDQVDFWLRQV�WKDW�VKH�FDQ��+RZHYHU�KHU�HPSOR\HHV�DUH�QRW�WR�KDYH�DOO�WKH�IXQFWLRQDOLW\�WKDW�HDFK�WUDQVDFWLRQ�RIIHUV�$V�VXFK��ZH�FRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG��0$1$*(5�$�$&&(66�ZLWK�WKHWUDQVDFWLRQ�FRGHV��:H�ZRXOG�DOVR�PDLQWDLQ�DOO�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKLVDFWLYLW\�JURXS��7KHQ�ZH�ZRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�(03/2<((6�0$1$*(5�$�DQG�XVH�0$1$*(5�$�$&&(66�DV�WKH�GHULYHG�DFWLYLW\�JURXS��2Q�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS·V�GHVFULSWLRQ�VFUHHQ�RI�WUDQVDFWLRQ�3)&*��LQ�WKH�ILHOG�'LYHUW$FWLYLW\�*URXS��ZH�ZRXOG�SODFH�0$1$*(5�$�$&&(66���6LQFH�RQO\�WKH�WUDQVDFWLRQV�DUHFRSLHG�LQWR�WKH�´PHQXµ��GHULYHG�IURP�0$1$*(5�$�$&&(66���ZH�VWLOO�QHHG�WR�PDLQWDLQWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��HQWHU�WKH�QDPH�IRU�\RXU�QHZDFWLYLW\�JURXS�LQ�WKH�$FWLYLW\�JURXSILHOG�
�� &KRRVH� �&UHDWH�2
3
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups
Release 4.6A/B6–19
�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�
�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�ORQJ�GHVFULSWLRQ�
�� 8QGHU�7UDQVDFWLRQ�LQKHULWDQFH��VHOHFWDQ�DFWLYLW\�JURXS�IURP�ZKLFK�\RXZDQW�WR�LQKHULW�WKH�WUDQVDFWLRQV��E\HLWKHU�HQWHULQJ�WKH�QDPH�LQ�WKH'HULYH�IURP�DFWLYLW\�JURXS�ILHOG�RU�E\XVLQJ�SRVVLEOH�HQWULHV�
�� &KRRVH�<HV�
7
4
5
6
Chapter 6: Advanced Profile Generator Functionality
Copying and Deriving Activity Groups
Authorizations Made Easy6–20
�� &KRRVH� �
�� 7R�UHYLHZ�WKH�LQKHULWHG�WUDQVDFWLRQV�FKRRVH�WKH�0HQX�WDE�
$OO�WKH�WUDQVDFWLRQV�IURP�\RXURULJLQDO�DFWLYLW\�JURXS�KDYH�EHHQLQKHULWHG��7KH�PHQX�LV�JRLQJ�WR�ORRNWKH�VDPH�IRU�WKH�XVHU�DV�\RX�GHILQHGLW�KHUH�
1RZ�\RX�FDQ�PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�
8
9
Chapter 6: Advanced Profile Generator Functionality
Selecting Workflow Tasks
Release 4.6A/B6–21
6HOHFWLQJ�:RUNIORZ�7DVNV
:KDW�<RX�6KRXOG�.QRZ�$ERXW�:RUNIORZ
7KLV�VHFWLRQ�SURYLGHV�D�VWHS�E\�VWHS�VDPSOH�6$3�%XVLQHVV�:RUNIORZ�DQG�DQ�H[SODQDWLRQ�RIZKDW�\RX�VKRXOG�NQRZ�DERXW�WDVNV�EHIRUH�\RX�DVVLJQ�WKHP�WR�\RXU�DFWLYLW\�JURXS�
7DVNV�DUH�XVHG�WR�H[SHGLWH�D�EXVLQHVV�SURFHGXUH��$�WDVN�FDQ�EH�HLWKHU�D�VLQJOH�VWHS�WDVN�RU�DPXOWL�VWHS�WDVN��,Q�WKH�IROORZLQJ�H[DPSOH��FUHDWLQJ�WKH�5HTXHVW�IRU�/HDYH�IRUP�DQG�WKHQFKHFNLQJ�WKLV�UHTXHVW�DUH�ERWK�VLQJOH�VWHS�WDVNV��7KH�SURFHGXUH�IRU�SURFHVVLQJ�D�5HTXHVW�IRU/HDYH�IRUP�LV�D�PXOWL�VWHS�WDVN��FRQVLVWLQJ�RI�VHYHUDO�FRPELQHG�VLQJOH�VWHS�WDVNV�
7KHUH�DUH�GLIIHUHQFHV�EHWZHHQ�WKH�VLQJOH�VWHS�VWDQGDUG�WDVNV�DQG�WKH�PXOWL�VWHS�ZRUNIORZWHPSODWHV��6WDQGDUG�WDVNV�DUH�WKH�VLQJOH�VWHS�WDVNV�XVHG�LQ�6$3·V�ZRUNIORZ�WHPSODWHV��0DQ\VWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�DUH�SURYLGHG�E\�6$3�DQG�VKRXOG�QRW�EH�FKDQJHG�E\FXVWRPHUV��&XVWRPHUV�FDQ��KRZHYHU��FRS\�DQG�PRGLI\�WKHVH�WHPSODWHV�WR�FUHDWH�WKHLU�RZQVWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�
:RUNIORZ�REMHFWV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS
6WDQGDUG�WDVNV��76� 76�²�FOLHQW�LQGHSHQGHQW
:RUNIORZ�WHPSODWHV��:6� :6���FOLHQW
([DPSOH��6DPSOH�:RUNIORZ�IRU�D�1RWLILFDWLRQ�$EVHQFH
7KLV�SURFHVV�EHJLQV�ZKHQ�DQ�HPSOR\HH�VXEPLWV�D�FRPSOHWHG�5HTXHVW�IRU�/HDYH�IRUP��7KLVIRUP�LV�DXWRPDWLFDOO\�IRUZDUGHG�WR�WKH�HPSOR\HH·V�VXSHUYLVRU��,I�WKH�VXSHUYLVRU�DSSURYHVWKH�UHTXHVW��WKH�HPSOR\HH�LV�LQIRUPHG�DQG�WKH�ZRUNIORZ�HQGV��,I�WKH�VXSHUYLVRU�UHMHFWV�WKHUHTXHVW��WKH�HPSOR\HH�PXVW�GHFLGH�ZKHWKHU�KH�RU�VKH�VKRXOG�WR�UHYLVH�WKH�UHTXHVW��RUZLWKGUDZ�LW�FRPSOHWHO\��,I�WKH�HPSOR\HH�GHFLGHV�WR�UHYLVH�WKH�UHTXHVW��WKH�IRUP�LVDXWRPDWLFDOO\�UHWXUQHG�WR�WKH�HPSOR\HH·V�LQER[��DQG�WKH�ZRUNIORZ�EHJLQV�DJDLQ�
,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�DVVLJQ�WKH�VWDQGDUG�WDVN�&RQILUPDWLRQ�RI�/HDYH5HTXHVW�WR�WKH�DFWLYLW\�JURXS�),�6XSHUYLVRU�
Chapter 6: Advanced Profile Generator Functionality
Selecting Workflow Tasks
Authorizations Made Easy6–22
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�2YHUYLHZ��2UJDQL]DWLRQ0DQDJHPHQW�DQG�ZRUNIORZ��
�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�:RUNIORZ�WDE�
�� &KRRVH� �:RUNIORZ�WDVNV�
7KH�:RUNIORZ�WDE�LV�RQO\�GLVSOD\HG�LI�\RX�VHOHFWHG�2YHUYLHZ��2UJDQL]DWLRQ�0DQDJHPHQW�DQGZRUNIORZ��DW�WKH�EHJLQQLQJ�RI�WUDQVDFWLRQ�3)&*��,I�\RX�GR�QRW�VHH�WKLV�WDE��WKH�YLHZ�%DVLFPDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��ZDV�SUREDEO\�VHOHFWHG�RQ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�VFUHHQ�
�� &KRRVH� �WR�DGG�D�WDVN�
�� 6HOHFW�WKH�GHVLUHG�WDVN�W\SH��IRUH[DPSOH��6WDQGDUG�WDVN��
�� &KRRVH� �
$OWKRXJK�WKH�RSWLRQV�:RUNIORZ�WDVN�DQG�7DVN�VWLOO�DSSHDU��WKH\�DUH�QR�ORQJHU�XVHG�RUVXSSRUWHG�
�� &KRRVH� �WR�FRQWLQXH�
3
4
7
6
5
8
Chapter 6: Advanced Profile Generator Functionality
Selecting Workflow Tasks
Release 4.6A/B6–23
�� 6HOHFW�WKH�GHVLUHG�LWHP��IRU�H[DPSOH�&RQILUPDWLRQ�RI�/HDYH�5HTXHVW��
��� &KRRVH� �
��� &KRRVH�WKH�FRUUHFW�WLPH�SHULRG�IRUWKH�DVVLJQPHQW�
��� &KRRVH� �
��� &KRRVH� �
7KH�VHOHFWHG�WDVN�LV�QRZ�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��(YHU\RQH�WRZKRP�WKLV�DFWLYLW\�JURXS�ZLOO�EHDVVLJQHG�FDQ�FRQILUP�WKH�OHDYHUHTXHVW�LQ�WKH�GHILQHG�WLPH�SHULRG�
9
10
1112
13
Chapter 6: Advanced Profile Generator Functionality
Deleting Activity Groups
Authorizations Made Easy6–24
'HOHWLQJ�$FWLYLW\�*URXSV
:KHQ�\RX�GHOHWH�DQ�DFWLYLW\�JURXS��WKH�V\VWHP�DXWRPDWLFDOO\�GHOHWHV�DQ\�DVVLJQPHQWVH[LVWLQJ�EHWZHHQ�WKH�DFWLYLW\�JURXS�DQG�5���XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDOXQLWV�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� ,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�WKH�DFWLYLW\�JURXS�\RXZRXOG�OLNH�WR�GHOHWH�E\�HLWKHUHQWHULQJ�WKH�QDPH�LQ�WKH�$FWLYLW\JURXS�ILHOG�RU�FKRRVLQJ�SRVVLEOHHQWULHV�
�� &KRRVH� �WR�GHOHWH�WKH�DFWLYLW\JURXS�
�� &KRRVH�<HV�
9HULI\�WKDW�\RXU�DFWLYLW\�JURXS�ZDVDFWXDOO\�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVWFRPSOHWHG�HDUOLHU��2WKHUZLVH�WKHGHOHWLRQ�FDQQRW�EH�WUDQVSRUWHG�
�� &KRRVH� �
7KH�FKRVHQ�DFWLYLW\�JURXS�DQG�DOO�WKHFRUUHVSRQGLQJ�DVVLJQPHQWV�KDYHQRZ�EHHQ�GHOHWHG��7KH�DXWKRUL]DWLRQSURILOHV³LQFOXGLQJ�WKHDXWKRUL]DWLRQV�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS³DUH�DOVR�GHOHWHG�
2
3
4
5
Chapter 6: Advanced Profile Generator Functionality
Postmaintaining User Role Templates
Release 4.6A/B6–25
3RVWPDLQWDLQLQJ�8VHU�5ROH�7HPSODWHV
7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��\RX�PXVW�ILUVW�FUHDWH�RU�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHPRQVWUDWHG�KRZ�WR�XVH�WKH�XVHU�UROH�WHPSODWHV�DQGJHQHUDWHG�WKH�UHODWHG�DXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV��,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WRSRVWPDLQWDLQ�H[LVWLQJ�DFWLYLW\�JURXSV�LQ�JUHDWHU�GHWDLO�
2QFH�\RX�KDYH�GHILQHG�DQ�DFWLYLW\�JURXS��XVH�WKH�3URILOH�*HQHUDWRU��3*��WR�DXWRPDWLFDOO\JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��$XWKRUL]DWLRQV�DXWRPDWLFDOO\�JHQHUDWHG�IRU�DFWLYLW\JURXSV�XVH�6$3�VXSSOLHG�GDWD�VR�WKDW�PRVW�ILHOGV�DUH�DOUHDG\�ILOOHG�ZLWK�SURSRVHG�YDOXHV�
7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH�
�� 6WDUW�WKH�JHQHUDWLRQ�SURFHVV�
�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOV�
�� 3RVWHGLW�WKH�DXWKRUL]DWLRQV�DQG�RUJDQL]DWLRQDO�OHYHOV�
7KH�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�DOUHDG\�KDYH�VRPH�DXWKRUL]DWLRQ�GDWD��$OO�RSHQDXWKRUL]DWLRQ�ILHOGV�DQG�RUJDQL]DWLRQDO�OHYHOV�VXFK�DV�FRPSDQ\�FRGHV��EXVLQHVV�DUHDV��RUSODQWV�KDYH�WKH�DVWHULVNV�� ���IRU�IXOO�DXWKRUL]DWLRQ�DVVLJQHG��EXW�WKH�SURILOHV�DUH�QRWJHQHUDWHG�\HW�
'LIIHUHQW�6HWWLQJV�IRU�WKH�0DLQWHQDQFH�9LHZ
<RX�KDYH�GLIIHUHQW�RSWLRQV�WR�GLVSOD\�VHYHUDO�EXWWRQV�LQ�WKH�WUHH�VWUXFWXUH�IRU�WKH�PDLQWHQDQFH�SURFHVV�
7R�DFFHVV�WKH�VHOHFWLRQ�VFUHHQ��VWDUW�WKH�3*�DQG�JR�WR�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��2Q�WKH$XWKRUL]DWLRQV�WDE��FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD��&KRRVH�8WLOLWLHV�→�6HWWLQJV�WR�JHW�WR�WKH�'HILQH6HWWLQJV�IRU�8VHU�ZLQGRZ�
'LIIHUHQW�EXWWRQV�VLPSOLI\�\RXU�ZRUN��,QWKH�WUHH�VWUXFWXUH�\RX�VHH�
�²�2YHUYLHZ�RI�DXWKRUL]DWLRQ�REMHFW�XVH
�²�0HUJLQJ�VHYHUDO�DXWKRUL]DWLRQV
�²�&RS\LQJ�DXWKRUL]DWLRQ
�²�'HOHWLQJ�ILHOG�FRQWHQWV
7KH�WHFKQLFDO�QDPH�LV�GLVSOD\HG�DW�WKH�HQGRI�WKH�FRUUHVSRQGLQJ�OLQH�
6DYH�\RXU�VHWWLQJV�DIWHU�WKH�VHOHFWLRQ�
)RU�IXUWKHU�H[SODQDWLRQ�RI�WKH�LFRQV��FKRRVH�RQ�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles
Authorizations Made Easy6–26
0DLQWDLQLQJ�DQG�*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV
,Q�WKLV�VHFWLRQ��ZH�DVVXPH�WKH�DFWLYLW\�JURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�DQG�VDYHG��:H�VKRZ�KRZ�WRJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WRPDLQWDLQ�DQG�FKRRVH� �&KDQJH��IRUH[DPSOH��00B%8<(5B$*��
�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�
�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�
7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQSURILOHV�KDYH�EHHQ�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS��<RX�FDQ�DOVR�VHH�WKHVWDWXV�IRU�WKH�DXWKRUL]DWLRQ�SURILOH�LQWKH�,QIRUPDWLRQ�RQ�DXWKRUL]DWLRQ�SURILOHER[�
2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKHDXWKRUL]DWLRQV�GDWD�DSSHDUVKLHUDUFKLFDOO\�
7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKHILUVW�OHYHO��KLJKOLJKWHG�LQ�EOXH��8QGHUQHDWK�\RX�ILQG�OLQHVKLJKOLJKWHG�DV�IROORZV�< �2EMHFW�FODVVHV� �RUDQJH< �$XWKRUL]DWLRQ�REMHFW� �JUHHQ< �$XWKRUL]DWLRQ� �\HOORZ< �$XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH
7R�YLHZ�WKH�OHJHQG�IRU�WKH�LFRQVDQG�FRORUV�FKRRVH� �
�� 7R�PDLQWDLQ�RU�FKDQJH�WKH�DFWLYLW\�GRXEOH�FOLFN�RQ�WKH�HQWU\�QH[W�WR�WKHDFWLYLW\�ILHOG�
5
Tip
4
Tip
3
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles
Release 4.6A/B6–27
7R�GLVSOD\�DOO�VHOHFWHG�WUDQVDFWLRQV�WKDW�FKHFN�WKLV�DXWKRUL]DWLRQ�REMHFW�IRU�WKH�XQGHUO\LQJDFWLYLW\�JURXS��FKRRVH� �
([SODQDWLRQ�RI�WKH�OLJKWV��*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO
OHYHOV�
�� 6HOHFW�RU�GHVHOHFW�DOO�GHVLUHG�YDOXHVIRU�WKH�DFWLYLW\��\RX�FDQ�XVH�)XOODXWKRUL]DWLRQ��
�� 7R�WUDQVIHU�\RXU�VHOHFWLRQ��FKRRVH�
�� 7R�PDLQWDLQ�WKH�YDOXHV�IRU�WKH�RSHQDXWKRUL]DWLRQV��FOLFN�QH[W�WR�WKHDXWKRUL]DWLRQ�ILHOG�QDPH�
�� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�
)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\�
��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �
9
7
6
8
10
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles
Authorizations Made Easy6–28
$IWHU�PDLQWDLQLQJ�WKH�DFWLYLW\�DQGWKH�ILHOG�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�WKH�OLJKW�FKDQJHV�IURP�\HOORZ�WRJUHHQ�
��� 7R�PDLQWDLQ�WKH�PLVVLQJRUJDQL]DWLRQDO�OHYHOV��FOLFN�RQ�WKHILHOG�QH[W�WR�WKH�DXWKRUL]DWLRQ�ILHOGQDPH��IRU�H[DPSOH��&RPSDQ\�&RGHXQGHU�WKH�REMHFW�$XWKRUL]DWLRQ�IRU&RPSDQ\�&RGHV��
��� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�
�)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\��
��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �
$IWHU�PDLQWDLQLQJ�WKH�PLVVLQJ�GDWDIRU�WKLV�RUJDQL]DWLRQDO�OHYHO��WKH�OLJKWFKDQJHV�IURP�UHG�WR�JUHHQ�
3URFHHG�ZLWK�WKH�RWKHU�RSHQ�ILHOGV�LQWKH�VDPH�ZD\�XQWLO�DOO�OLJKWV�KDYHFKDQJHG�WR�JUHHQ�
��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �
7R�DVVLJQ�IXOO�DXWKRUL]DWLRQV�WR�DOO�RSHQILHOGV��FOLFN�RQ�WKH�\HOORZ�OLJKW�DW�WKHWRS��QH[W�WR�WKH�DFWLYLW\�JURXS�
11
12
13
14
Tip
Chapter 6: Advanced Profile Generator Functionality
Maintaining and Generating the Authorization Profiles
Release 4.6A/B6–29
5HPHPEHU�WR�PDLQWDLQ�HDFK�RSHQ�DXWKRUL]DWLRQ�ILHOG�ZLWK�D�VXLWDEOH�YDOXH��)RU�VRPHDXWKRUL]DWLRQV��HQWHU�D�VXLWDEOH�YDOXH�LQ�$XWKRUL]DWLRQ�JURXS��,I�\RX�DUH�QRW�VXUH�RI�DVXLWDEOH�YDOXH��XVH�WKH�DVWHULVN�� ��WR�DVVLJQ�RYHUDOO�DXWKRUL]DWLRQ�IRU�XQPDLQWDLQHG�ILHOGV�5HPHPEHU�WKDW�\RX�FDQ�DOZD\V�FKDQJH�YDOXHV�ODWHU�
:KHQ�DOO�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�DQG�\RX�KDYH�VDYHG�\RXUFKDQJHV��JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH�
��� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQV�FKRRVH� �
7KH�V\VWHP�JHQHUDWHV�DQ�DXWKRUL]DWLRQ�IRU�HDFK�DXWKRUL]DWLRQ�LQ�WKH�WUHH�DQG�DQDXWKRUL]DWLRQ�SURILOH�IRU�WKH�DFWLYLW\�JURXS�WKDW�DSSOLHV�WR�WKH�HQWLUH�WUHH�
��� 7KH�$VVLJQ�3URILOH�1DPH�IRU�*HQHUDWHG$XWKRUL]DWLRQ�3URILOH�GLDORJ�ER[DSSHDUV��7KH�V\VWHP�VXJJHVWV7B�LQWHUQDO�QXPEHU!�DV�WKH�GHIDXOWSURILOH�QDPH�
��� &KRRVH� �
7KH�VKRUW�SURILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU��+RZHYHU��WKH�ORQJ�WH[W�IRU�WKH�SURILOH�FDQEH�FKDQJHG�DW�DQ\�WLPH�
1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�$XWKRUL]DWLRQV�*HQHUDWHG�ZLWKWKH�3*
:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�
7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�
15
16
17
Chapter 6: Advanced Profile Generator Functionality
Displaying an Overview of Generated Profiles
Authorizations Made Easy6–30
7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZR�GLJLWVDUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHWKHQ�QDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������
7KH�DXWKRUL]DWLRQ�REMHFW�6B86(5B352�LV�FKHFNHG�GXULQJ�DXWKRUL]DWLRQ�PDLQWHQDQFH��7KHREMHFW�LV�GHILQHG�ZLWK�WKH�IROORZLQJ�ILHOGV��$XWKRUL]DWLRQ�SURILOH�DQG�$FWLYLW\��,Q$XWKRUL]DWLRQ�SURILOH��HQWHU�WKH�DXWKRUL]DWLRQ�SURILOHV�WKDW�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRUFDQ�PDLQWDLQ�RU�WKDW�XVHU�DGPLQLVWUDWRUV�FDQ�DVVLJQ�WR�WKHLU�XVHUV��,Q�$FWLYLW\��\RX�FDQOLPLW�ZKDW�WKH�DGPLQLVWUDWRU�LV�DOORZHG�WR�GR�
,I�\RX�ZDQW�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�ZKR�FDQ�PDLQWDLQ�RQO\�FHUWDLQSURILOHV��VHW�XS�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�
'LVSOD\LQJ�DQ�2YHUYLHZ�RI�*HQHUDWHG�3URILOHV
$IWHU�VXFFHVVIXOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOHV��WR�ILQG�RXW�KRZ�PDQ\�SURILOHV�ZHUHJHQHUDWHG��\RX�KDYH�WR�NQRZ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$PD[LPXP�RI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��ZLWK�WKH�ODVW�WZR�GLJLWV�XVHG�DV�D�FRXQWHU�
,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKH�DGGLWLRQDOSURILOHV�DUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�RULJLQDO�SURILOH·V�XVHUV��7KH�XVHU�PDVWHU�RI�WKLVXVHU�LV�DXWRPDWLFDOO\�XSGDWHG�
,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GLVSOD\�WKH�RYHUYLHZ�RI�WKH�JHQHUDWHGSURILOHV�IRU�WKH�DFWLYLW\�JURXS�6$3B$//B',63/$<B$*��ZKLFK�FRQWDLQ�WKH�DXWKRUL]DWLRQ�WRGLVSOD\�´HYHU\WKLQJµ�H[FHSW�IRU�+5�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZRXOG�OLNH�WR�YLHZ��IRU�H[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�
�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�
�� &KRRVH� �&KDQJH�$XWKRUL]DWLRQ�'DWD�
Chapter 6: Advanced Profile Generator Functionality
Displaying an Overview of Generated Profiles
Release 4.6A/B6–31
�� &KRRVH�$XWKRUL]DWLRQV�→�3URILOH2YHUYLHZ�
,I�WKH�JHQHUDWHG�DXWKRUL]DWLRQSURILOHV�DUH�DOUHDG\�DFWLYH��WKH�GLDORJER[�SURYLGHV�DQ�RYHUYLHZ�RI�WKHFXUUHQW�SURILOH�ZLWK�SURILOH�QDPH�ORQJ�WH[W��DQG�WKH�VWDWXV�RI�WKHYHUVLRQ�
5
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes
Authorizations Made Easy6–32
5HJHQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ
&KDQJHV
:KHQ�DQ�DFWLYLW\�JURXS�LV�FKDQJHG��IRU�H[DPSOH�DIWHU�\RX�DGG�WUDQVDFWLRQV��UHJHQHUDWH�LWVDXWKRUL]DWLRQ�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*�
)RU�WKH�IROORZLQJ�H[DPSOH��ZH�KDYH�WDNHQ�WKH�DFWLYLW\�JURXS�00B%8<(5B$*�DGGHG�VRPHWUDQVDFWLRQV�DQG�VDYHG�WKH�FKDQJHV��1RZ�ZH�KDYH�VRPH�PRUH�DXWKRUL]DWLRQV�WKDW�QHHG�WR�EHPDLQWDLQHG�DQG�WKH�DFWLYLW\�JURXS�QHHGV�WR�EH�UHJHQHUDWHG�
:KHQ�\RX�FKDQJH�DQ�DFWLYLW\�JURXS��WKH�VWDWXV�RQ�WKH�$XWKRUL]DWLRQV�WDE�LQGLFDWHV�ZKHWKHUD�SURILOH�LV�FXUUHQW�RU�QRW��,I�WKH�GLVSOD\�VKRZV�D�UHG�RU�\HOORZ�OLJKW��WKH�SURILOH�LV�QRWFXUUHQW��7KH�VWDWXV�WH[W�RQ�WKH�VFUHHQ�H[SODLQV�ZK\�WKH�SURILOH�LV�QRW�FXUUHQW�< 5HG�OLJKW�DQG�WKH�WH[W�3URILOH�FRPSDULVRQ�UHTXLUHG
7KH�PHQX�KDV�EHHQ�FKDQJHG�VLQFH�WKH�SURILOH�ZDV�ODVW�JHQHUDWHG��7KHUHIRUH�WKH�SURILOHLV�QRW�FXUUHQW�DQG�WKH�DXWKRUL]DWLRQ�SURILOHV�QHHGV�WR�EH�UHJHQHUDWHG��<RX�PD\�DOVRKDYH�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�
< <HOORZ�OLJKW
7KH�SURILOH�KDV�EHHQ�FKDQJHG�DQG�VDYHG�VLQFH�LW�ZDV�ODVW�JHQHUDWHG��WKH�SURILOH�LV�QRWFXUUHQW�DQ\PRUH��DQG�WKH�DXWKRUL]DWLRQ�SURILOH�QHHGV�WR�EH�UHJHQHUDWHG�
< ,I�\RX�DUH�XQVXUH�ZKHWKHU�DQ�DXWKRUL]DWLRQ�SURILOHV�VKRXOG�EH�UHJHQHUDWHG�
1��5XQ�WUDQVDFWLRQ�SUPC�2��6HOHFW�$OVR�DFW��JUSV�WR�EH�DGMXVWHG�3��&KRRVH� �WR�H[HFXWH�WKH�WUDQVDFWLRQ�
7KH�V\VWHP�JHQHUDWHV�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�ZLWK�H[LVWLQJ�DXWKRUL]DWLRQ�GDWD�LQ�WKHV\VWHP��$FWLYLW\�JURXSV�LQ�UHG�QHHG�WR�EH�UHJHQHUDWHG�DIWHU�SRVWPDLQWDLQLQJ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��6HOHFW�RQH�RI�WKHVH�DFWLYLW\�JURXSV�DQG�FKRRVH�0DLQWDLQ�SURILOH��)URPSUPC��FDOO�WUDQVDFWLRQ�PFCG�DQG�SURFHHG�DV�GHVFULEHG�EHORZ�
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes
Release 4.6A/B6–33
3UHUHTXLVLWH��<RX�PXVW�PDNH�FKDQJHV�WRDQ�DFWLYLW\�JURXS�DQG�VDYH�WKHP�EHIRUH\RX�FDQ�UHJHQHUDWH�DXWKRUL]DWLRQSURILOHV�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�
�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�
,Q�H[SHUW�PRGH��\RX�FDQ�VHOHFW�H[SOLFLWO\WKH�RSWLRQ�ZLWK�ZKLFK�\RX�ZDQW�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�YDOXHV��7KLVRSWLRQ�LV�DXWRPDWLFDOO\�VHW�FRUUHFWO\�LQQRUPDO�PRGH�
�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWKQHZ�GDWD�
�� &KRRVH� �
2SWLRQV�RQ�WKH�'HILQH�0DLQWHQDQFH�7\SH�VFUHHQ�< 'HOHWH�DQG�UHFUHDWH�SURILOH�DQG�DXWKRUL]DWLRQV
$OO�DXWKRUL]DWLRQV�DUH�UH�FUHDWHG��9DOXHV�WKDW�KDYH�SUHYLRXVO\�EHHQ�PDLQWDLQHG�FKDQJHG��RU�HQWHUHG�PDQXDOO\�DUH�ORVW��2QO\�WKH�PDLQWDLQHG�YDOXHV�IRU�RUJDQL]DWLRQDOOHYHOV�UHPDLQ�
< (GLW�ROG�VWDWXV
<RX�FDQ�HGLW�WKH�DXWKRUL]DWLRQ�SURILOH�\RX�SUHYLRXVO\�PDLQWDLQHG�ZLWK�LWV�ROG�YDOXHV�,W�LV�QRW�ZRUWK�HGLWLQJ�LI�WKH�DVVLJQPHQW�RI�WUDQVDFWLRQV�WR�DFWLYLW\�JURXSV�KDVFKDQJHG�
< 5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�QHZ�GDWD
7KH�3*�FRPSDUHV�WKH�ROG�DQG�FXUUHQW�GDWD�IURP�WKH�DFWLYLW\�JURXS��7KLV�FKRLFH�LV�WKHEHVW�RSWLRQ�LI�WKH�DFWLYLW\�JURXS�KDV�FKDQJHG��8QFKDQJHG�GDWD�LV�PDUNHG�DV�2OG��QHZGDWD�DV�1HZ�
3
4
5
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes
Authorizations Made Easy6–34
:H�DGGHG�D�IHZ�WUDQVDFWLRQV�WR�WKHDFWLYLW\�JURXS��7KH�SUHYLRXVO\PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUHNHSW��:KHQ�QHZ�RUJDQL]DWLRQDO�OHYHOVDUH�DGGHG��WKH\�PXVW�EH�PDLQWDLQHG�
�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOVZLWK�WKH�ULJKW�YDOXHV��RU�FKRRVH�)XOODXWKRUL]DWLRQ�WR�ILOO�DOO�EODQNV�ZLWKDVWHULVNV�� ���:H�FKRVH�)XOODXWKRUL]DWLRQ�LQ�RXU�H[DPSOH��
�� &KRRVH� �
2OG�DXWKRUL]DWLRQV�DUH�PDUNHG�2OG�QHZ�DXWKRUL]DWLRQV�DUH�PDUNHG�1HZ�
�� 0DLQWDLQ�WKH�RSHQ�ILHOGV�DVGHVFULEHG�LQ�0DLQWDLQLQJ�DQG*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHVRQ�SDJH��²���
�� &KRRVH� �
6
7
8
9
Chapter 6: Advanced Profile Generator Functionality
Regenerating Authorization Profiles After Making Changes
Release 4.6A/B6–35
3OHDVH�NHHS�WKH�IROORZLQJ�LQ�PLQG�ZKHQ�PDNLQJ�WKH�SRVW�FKDQJH�FRPSDULVRQ�< 3UHYLRXVO\�PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUH�NHSW��,I�QHZ�RUJDQL]DWLRQDO�OHYHOV�DUH
DGGHG��\RX�PXVW�PDLQWDLQ�WKHVH�OHYHOV�< ,I�DXWKRUL]DWLRQV�ZLWKLQ�DQ�DXWKRUL]DWLRQ�REMHFW�KDYH�FKDQJHG��\RX�QHHG�WR�H[HFXWH
WKH�FRPSDULVRQ�PDQXDOO\��<RX�PXVW�GHFLGH�ZKHWKHU�WR�NHHS�WKH�ROG�PRGLILHG�GDWD�RUXVH�WKH�FXUUHQW�GDWD��'HOHWH�RU�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�\RX�QR�ORQJHU�UHTXLUH�
< 0DLQWDLQHG�DXWKRUL]DWLRQV�DUH�FRQILJXUHG�ZLWK�WKH�YDOXHV�\RX�PDLQWDLQHG�IRU�WKHP�)RU�H[DPSOH��IRU�DXWKRUL]DWLRQ�JURXS�������FHUWDLQ�DFWLYLWLHV��,QVHUW��&KDQJH��DQG'LVSOD\��DQG�PDLQWDLQHG�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�WUDQVDFWLRQV�DUHUHTXLUHG��\RX�PDLQWDLQHG�WKH�YDOXH�IRU�DXWKRUL]DWLRQ�JURXS���&KDQJH�WKH�DFWLYLW\JURXS�VR�WKDW�WKH�IROORZLQJ�DFWLYLWLHV�DULVH��&KDQJH��'LVSOD\��DQG�'HOHWH��7KH�YDOXH�����LV�FRSLHG�IRU�WKH�DXWKRUL]DWLRQ�JURXS�IRU�&KDQJH�DQG�'LVSOD\��WKHVH�DFWLYLWLHV�ZHUHDOUHDG\�PDLQWDLQHG���7KH�,QVHUW�RSWLRQ�GLVDSSHDUV��)RU�WKH�'HOHWH�DFWLYLW\��PDLQWDLQ�WKHDXWKRUL]DWLRQ�JURXS�DJDLQ��VLQFH�WKLV�JURXS�ZDV�QRW�PDLQWDLQHG�LQ�WKH�ROG�SURILOH·VVWDWXV�
< :KHUHYHU�WKH�1HZ�DWWULEXWH�DSSHDUV��FKHFN�LI�WKH�QHZ�DXWKRUL]DWLRQV�PDNH�VHQVH��\RXFDQ�FRPSDUH�WKHP�PDQXDOO\�ZLWK�WKH�ROG�YDOXHV��
< 0DQXDOO\�HQWHUHG�DXWKRUL]DWLRQV�DUH�QRW�GHOHWHG�7KH�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�DUH�DOZD\V�DXWRPDWLFDOO\�ILOOHG�ZLWKWKH�FXUUHQW�WUDQVDFWLRQ�IURP�WKH�DFWLYLW\�JURXS��EXW�KDYH�WKH�DWWULEXWH�2OG�
:KHQ�WKHUH�DUH�RQO\�JUHHQ�OLJKWV�LQ�WKHWUHH��WKHUH�DUH�QR�PRUH�RSHQDXWKRUL]DWLRQ�ILHOGV�WR�PDLQWDLQ�
��� &KRRVH� �WR�UHJHQHUDWH�WKH�H[LVWLQJDXWKRUL]DWLRQ�SURILOHV�
$IWHU�WKH�UHJHQHUDWLRQ�RI�WKHDXWKRUL]DWLRQ�SURILOHV�LV�ILQLVKHG�\RX�FDQ�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�
10
Chapter 6: Advanced Profile Generator Functionality
Using Utilities to Change Generated Authorizations
Authorizations Made Easy6–36
8VLQJ�8WLOLWLHV�WR�&KDQJH�*HQHUDWHG�$XWKRUL]DWLRQV
7KHUH�DUH�WZR�RSWLRQV�WR�DOWHU�WKH�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV��7KHVH�RSWLRQV�DUH�IRXQG�LQWUDQVDFWLRQ�3)&*��XQGHU�WKH�8WLOLWLHV�PHQX�LQ�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ�
0HUJLQJ�$XWKRUL]DWLRQV
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�
�� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�
�� &KRRVH�8WLOLWLHV�→�0HUJHDXWKRUL]DWLRQV�
�� 7KH�V\VWHP�DXWRPDWLFDOO\VXPPDUL]HV�DOO�SRVVLEOHDXWKRUL]DWLRQV�DQG�WKH�UHVXOWDSSHDUV�LQ�D�V\VWHP�PHVVDJH�
,Q�RXU�H[DPSOH��WKH�VWDWXV�EDU�VKRZVWKDW�ILYH�DXWKRUL]DWLRQV�KDYHFRPELQHG�ZLWK�RWKHUV�
4
5
Chapter 6: Advanced Profile Generator Functionality
Using Utilities to Change Generated Authorizations
Release 4.6A/B6–37
5HRUJDQL]LQJ�7HFKQLFDO�1DPHV�RI�$XWKRUL]DWLRQV
7KH�WHFKQLFDO�QDPH�RI�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�DQG�DWZR�GLJLW�QXPEHU�EHWZHHQ����DQG����
7��LQWHUQDO�QXPEHU!QQ��IRU�H[DPSOH��7�����������
,I�WKH�DXWKRUL]DWLRQ�SURILOHV�FKDQJHG�DV�D�UHVXOW�RI�FKDQJHV�LQ�WKH�DSSURSULDWH�DFWLYLW\�JURXS��UHRUJDQL]H�WKHQXPEHUV�WR�DYRLG�QXPEHU�DVVLJQPHQW�SUREOHPV��7KH�IROORZLQJ�SURFHGXUH�UHVWDUWV�WKH�QXPEHU�DVVLJQPHQWIURP�����:KHQHYHU�\RX�JHQHUDWH�D�QHZ�DXWKRUL]DWLRQ�SURILOH��WKLV�UHRUJDQL]DWLRQ�LV�DXWRPDWLFDOO\�WDNHQLQWR�DFFRXQW�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�
�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�
�� &KRRVH�8WLOLWLHV�→�5HRUJDQL]H�
7KH�V\VWHP�DXWRPDWLFDOO\UHRUJDQL]HV�WKH�ILQDO�GLJLWV�RI�WKHDXWKRUL]DWLRQV�WHFKQLFDO�QDPHV�DQGWKH�UHVXOW�DSSHDUV�LQ�D�V\VWHPPHVVDJH��IRU�H[DPSOH��$XWKRUL]DWLRQVZHUH�UHRUJDQL]HG��
4
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations
Authorizations Made Easy6–38
&XVWRPL]LQJ�$XWKRUL]DWLRQV
6$3�GHOLYHUV�D�XVHU�UROH�WHPSODWH�IRU�WKH�&XVWRPL]LQJ�3URMHFW�0HPEHU��ZKLFK�LV�FDOOHG6$3B%&B&86B&86720,=(5B$*��7KLV�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�DQ\�SHUVRQ�GRLQJ�FXVWRPL]LQJ�LQ5����,Q�DGGLWLRQ��\RX�FDQ�DVVLJQ�SURMHFWV�RU�YLHZV�RI�WKH�,PSOHPHQWDWLRQ�*XLGH��,0*��WR�DQ�DFWLYLW\�JURXS�7KH�DLP�RI�WKLV�DVVLJQPHQW�LV�WR�JHQHUDWH�DXWKRUL]DWLRQV�IRU�DQG�DVVLJQ�XVHUV�WR�VSHFLILF�,0*�DFWLYLWLHV��7KDWLQVXUHV�WKDW�XVHUV�DUH�RQO\�DOORZHG�WR�SHUIRUP�WDVNV�LQ�WKHLU�FXVWRPL]LQJ�SURMHFW�DQG�QRW�LQ�DQ\�RWKHU�:KHQ�\RX�JHQHUDWH�SURILOHV��LW�DOVR�JHQHUDWHV�WKH�DXWKRUL]DWLRQV�QHFHVVDU\�WR�H[HFXWH�DOO�DFWLYLWLHV�LQ�WKHDVVLJQHG�,0*�SURMHFWV�RU�SURMHFW�YLHZV�
$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV
,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FXVWRPL]LQJ�DFWLYLW\�JURXS�IRU�D�40FXVWRPL]LQJ�SURMHFW��7KHUHIRUH��ZH�ZLOO�FUHDWH�D�QHZ�DFWLYLW\�JURXS�FDOOHG�40B&86720,=,1*�DQG�DVVLJQWKH�40�FXVWRPL]LQJ�SURMHFW�WR�LW��<RX�FDQ�DVVLJQ�GLIIHUHQW�SURMHFW�YLHZV�LI�DYDLODEOH�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�DQDPH�IRU�\RXU�QHZ�DFWLYLW\�JURXS�
�� &KRRVH� �&UHDWH�
3
2
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations
Release 4.6A/B6–39
�� (QWHU�D�VKRUW�GHVFULSWLRQ�LQ�WKH'HVFULSWLRQ�ILHOG�
�� (QWHU�D�ORQJ�WH[W�GHVFULSWLRQ�IRU�WKHDFWLYLW\�JURXS��RSWLRQDO��
�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�
�� &KRRVH�WKH�0HQX�WDE�
�� &KRRVH�8WLOLWLHV�→�&XVWRPL]LQJ�DXWK�
<RX�FDQ�VHH�WKH�VWDWXV�RI�WKH�DFWLYLW\JURXS�LQ�WKH�GLDORJ�ER[�
�� &KRRVH� �$GG�WR�DVVLJQ�DFXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZWR�WKH�DFWLYLW\�JURXS�
��� 6HOHFW�,0*�SURMHFW�RU�,0*�SURMHFWYLHZ��GHSHQGLQJ�RQ�ZKDW�\RX�ZRXOGOLNH�WR�DVVLJQ��,Q�RXU�H[DPSOH��ZHDVVLJQHG�DQ�,0*�SURMHFW�
��� &KRRVH� �
��� 6HOHFW�WKH�GHVLUHG�SURMHFW�RU�SURMHFWYLHZ��LQ�WKLV�H[DPSOH��ZH�VHOHFWHGWKH�SURMHFW�40B&86720��
��� &KRRVH� �
��� &KRRVH� �WR�FRQWLQXH�
4
5
6
7
8
9
10
11
12
13
14Tip
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations
Authorizations Made Easy6–40
7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW
2Q�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQV�VFUHHQ��LI�WKHUH�DUH�XVHUV�DVVLJQHG�WR�WKH�,0*�SURMHFWWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�WKLV�DFWLYLW\�JURXS��FKRRVH� �8VHU��7KLV�DFWLRQ�FRSLHV�WKHXVHUV�IURP�WKH�,0*�SURMHFW�WR�WKH�DFWLYLW\�JURXS�
1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�FKDQJHV�DUH�PDGH�LQ�WKH�,0*SURMHFW�DGPLQLVWUDWLRQ�
7KH�V\VWHP�DXWRPDWLFDOO\GHWHUPLQHV�WKH�WUDQVDFWLRQ�FRGHVDQG�DGGLWLRQDO�DXWKRUL]DWLRQ�REMHFWVWKDW�DUH�UHTXLUHG�WR�PDLQWDLQ�WKHWDEOHV�IRU�WKLV�,0*�SURMHFW�RU�SURMHFWYLHZ��DQG�LPSRUWV�WKHP�LQWR�WKHDFWLYLW\�JURXS�
��� 7R�VDYH�\RXU�DFWLYLW\�JURXS��FKRRVH�
<RX�FDQQRW�PDQXDOO\�DVVLJQWUDQVDFWLRQV�WR�WKLV�DFWLYLW\�JURXS�QRUFDQ�\RX�VHOHFW�DQ\�IURP�WKH�6$3�PHQX�1RWH�WKDW�WKH�EXWWRQV�WR�GR�WKLV�KDYHYDQLVKHG�
15
Tip
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations
Release 4.6A/B6–41
��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�WRFRQWLQXH�WKH�JHQHUDWLRQ�SURFHVV�
��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�
,I�QHFHVVDU\��WKH�GLDORJ�ER[�'HILQH2UJ��/HYHOV�DSSHDUV�
��� (QWHU�WKH�DSSURSULDWH�GDWD��<RX�FDQJLYH�IXOO�DXWKRUL]DWLRQV�E\�FKRRVLQJ)XOO�DXWKRUL]DWLRQ�LQ�WKH�ORZHU�ULJKWFRUQHU�
��� &KRRVH� �
16
17
18
19
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations
Authorizations Made Easy6–42
��� 0DLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV�LQGLFDWHG�E\�WKH�\HOORZ�OLJKW
�DV�GHVFULEHG�HDUOLHU�LQ�WKLVERRN��,Q�RXU�H[DPSOH��ZH�FKRVH�IXOODXWKRUL]DWLRQ�E\�FOLFNLQJ�RQ�WKHXSSHU�PRVW�\HOORZ�OLJKW�
,I�\RX�FKRRVH�IXOO�DXWKRUL]DWLRQV��DFRQILUPDWLRQ�VFUHHQ�DSSHDUV�
��� &KRRVH� �WR�FRQWLQXH�
$OO�RSHQ�DXWKRUL]DWLRQV�DUH�ILOOHGZKHQ�DOO�WKH�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�
��� 6DYH�WKH�DFWLYLW\�JURXS�
20
21
22
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations
Release 4.6A/B6–43
��� 2Q�WKH�$VVLJQ�3URILOH�1DPH�IRU*HQHUDWHG�$XWKRUL]DWLRQ�3URILOH�VFUHHQ�\RX�KDYH�WKH�RSWLRQ�WR�FKDQJH�WKH3URILOH�QDPH��<RX�ZLOO�QRW�EH�DEOH�WRFKDQJH�LW�ODWHU�
��� &KRRVH� �
��� 7R�JHQHUDWH�WKH�DFWLYLW\�JURXS�FKRRVH� �
��� 7R�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�FKRRVH� �
<RX�KDYH�QRZ�FUHDWHG�D�FXVWRPL]LQJDFWLYLW\�JURXS�DQG�DVVLJQHGDXWKRUL]DWLRQ�GDWD�WR�LW�
,I�WKHUH�DUH�QR�XVHUV�DVVLJQHG�WR�WKHVHOHFWHG�,0*�SURMHFW�RU�LI�\RX�FKRVHQRW�WR�FRS\�WKHP�WR�WKH�DFWLYLW\JURXS�LQ�DQ�HDUOLHU�VWHS��\RX�VWLOOKDYH�WR�GR�VR��&KRRVH�WKH�8VHUV�WDEWR�DVVLJQ�XVHUV�WR�WKH�DFWLYLW\�JURXS�DV�GHPRQVWUDWHG�LQ�FKDSWHUV���DQG���
23
24
25
26
Chapter 6: Advanced Profile Generator Functionality
Customizing Authorizations
Authorizations Made Easy6–44
,I�WKH�,0*�SURMHFW�KDV�FKDQJHG��\RX�VKRXOG�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLVDFWLYLW\�JURXS��7KH�ILUVW�VWHS�LV�WR�FKRRVH� �5HIUHVK�RQ�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQVGLDORJ�ER[��VHH�VWHS����RQ�SDJH��²�����7KLV�DFWLRQ�UHFDOFXODWHV�WKH�WUDQVDFWLRQ�FRGHV��<RXPXVW�WKHQ�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�
7R�DVVLJQ�XVHUV�WR�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��\RX�FDQ�WUDQVIHU�WKH�XVHUV�WKDW�DUHDOUHDG\�DVVLJQHG�WR�WKH�FXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZ��<RX�FDQ�DOVR�DVVLJQ�DQ\�RWKHUXVHU�WR�WKLV�FXVWRPL]LQJ�DFWLYLW\�JURXS�
<RX�VKRXOG�FRQVLGHU�XVLQJ�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWH6$3B%&B&86B&86720,=(5B$*�IRU�HYHU\�FXVWRPL]LQJ�SURMHFW�PHPEHU�
7–1
&KDSWHU��� 3UHSDULQJ�WKH�5��
(QYLURQPHQW�IRU�*R�/LYH
&RQWHQWV
Overview ..................................................................................................................7–2
Transports Between Clients ..................................................................................7–2
Transports Between R/3 Systems.........................................................................7–3
Transporting Activity Groups ................................................................................7–3
Transporting Check Indicators and Field Values ................................................7–8
Transporting Authorization Templates.................................................................7–8
Transporting User Master Records.......................................................................7–8
��
Chapter 7: Preparing the R/3 Environment for Go-Live
Overview
Authorizations Made Easy7–2
2YHUYLHZ
:KHQ�\RX�ILQLVK�XVLQJ�RQH�RI�WKH�WKUHH�SRVVLEOH�PHWKRGV�IRU�ZRUNLQJ�ZLWK�XVHU�UROHWHPSODWHV³DQG�\RX�KDYH�PDLQWDLQHG�DQG�JHQHUDWHG�DOO�QHFHVVDU\�DXWKRUL]DWLRQV³\RX�FDQSUHSDUH�IRU�JR�OLYH��3UHSDUDWLRQ�PHDQV�WKDW�\RX�KDYH�WR�WUDQVSRUW�HYHU\WKLQJ�\RX�KDYHFUHDWHG�LQ�\RXU�'(9�V\VWHP�WR�\RXU�4$6�V\VWHP��DQG�ILQDOO\�WR�\RXU�35'�V\VWHP��VHHFKDSWHU���RQ�WKH�WKUHH�V\VWHP�HQYLURQPHQW��
<RX�FDQ�WUDQVSRUW�HLWKHU�EHWZHHQ�FOLHQWV��ZLWKLQ�DQ�5���6\VWHP��RU�EHWZHHQ�5���6\VWHPV�'HSHQGLQJ�RQ�WKH�W\SH�RI�WUDQVSRUW��\RX�FDQ�WUDQVSRUW�WKH�IROORZLQJ�LWHPV�< $FWLYLW\�JURXSV< &RPSRVLWH�DFWLYLW\�JURXSV< $XWKRUL]DWLRQ�SURILOH�GDWD< $XWKRUL]DWLRQ�GDWD< 8VHU�PDVWHU�UHFRUGV
7UDQVSRUWV�%HWZHHQ�&OLHQWV
7KH�LWHPV�LQ�WKH�OLVW�DERYH�DUH�FOLHQW�GHSHQGHQW��7KHUHIRUH��VHSDUDWH�UHFRUGV��DFWLYLW\�JURXSV�SURILOHV��DQG�DXWKRUL]DWLRQV�PXVW�EH�PDLQWDLQHG�IRU�HDFK�5���FOLHQW��7UDQVDFWLRQ�6&&/��7RROV→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ�→�&OLHQW�&RS\�→�6&&/�¥�/RFDO&RS\���ZKLFK�PXVW�EH�UXQ�IURP�WKH�WDUJHW�FOLHQW��WUDQVSRUWV�XVHU�PDVWHU�UHFRUGV�DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�EHWZHHQ�FOLHQWV��$V�RI�5HOHDVH����$��DFWLYLW\JURXSV�DUH�FRSLHG�ZLWK�&XVWRPL]LQJ�
:KHQ�\RX�FDUU\�RXW�D�WUDQVSRUW��DOO�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�LQ�WKHWDUJHW�V\VWHP�ZLWK�WKH�VDPH�QDPHV�DV�LWHPV�LQ�WKH�WUDQVSRUW�ZLOO�EH�RYHUZULWWHQ�7KHUHIRUH��GR�QRW�XVH�6&&/�LI�\RXU�WDUJHW�FOLHQW�FRQWDLQV�DXWKRUL]DWLRQV�DQG�XVHU�PDVWHUUHFRUGV�WKDW�\RX�ZDQW�WR�NHHS��2QO\�XVH�6&&/�WR�FUHDWH�D�QHZ�FOLHQW�ZLWK�WKH�REMHFWV6$3B&867��XVHUV�ZLOO�EH�NHSW��RU�6$3B8&86��XVHUV�FRPH�IURP�WKH�VRXUFH�FOLHQW��
6LQFH�DFWLYLW\�JURXSV�EHORQJ�WR�&XVWRPL]LQJ��WKH\�DUH�FRSLHG�DXWRPDWLFDOO\�GXULQJ�FOLHQWFRS\��,W�LV�DOVR�SRVVLEOH�WR�FRS\�WKHP�PDQXDOO\��VHH�EHORZ��
7KH�WUDQVDFWLRQ�GRFXPHQWDWLRQ�FRQWDLQV�DGGLWLRQDO�LQIRUPDWLRQ�DERXW�WKH�QHFHVVDU\DXWKRUL]DWLRQV��8VH�WUDQVDFWLRQ�6&&���7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ�→�6SHFLDO�)XQFWLRQV�→�6&&��¥�&RS\�7UDQVSRUW�5HTXHVW��WR�PDQXDOO\�FRS\DFWLYLW\�JURXSV�EHWZHHQ�H[LVWLQJ�FOLHQWV�
Chapter 7: Preparing the R/3 Environment for Go-Live
Transports Between R/3 Systems
Release 4.6A/B7–3
7R�FRS\�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV�
�� &UHDWH�D�WUDQVSRUW�UHTXHVW�ZLWK�WKH�DSSURSULDWH�DFWLYLW\�JURXSV�
�� ,I�\RX�XVH�WUDQVDFWLRQ�6&&���GR�QRW�UHOHDVH�WKH�WUDQVSRUW�
7UDQVDFWLRQ�6&&��ZRUNV�ZLWK�UHOHDVHG�DQG�XQUHOHDVHG�WUDQVSRUWV�
�� /RJ�RQ�WR�WKH�RWKHU�FOLHQW�
�� 5XQ�WUDQVDFWLRQ�6&&��
�� &KRRVH�WKH�6RXUFH�FOLHQW�DQG�7UDQVSRUW�UHTXHVW�LQFOXGLQJ�WKH�WDVN�QXPEHU�
�� ([HFXWH�
7KH�DFWLYLW\�JURXS�V��VKRXOG�QRZ�EH�DFWLYH�LQ�WUDQVDFWLRQ�3)&*�
:KHQ�\RX�WUDQVSRUW�XVLQJ�6&&���WKH�UHSRUW�WUHH�LQVLGH�WKH�DFWLYLW\�JURXS�LV�WUDQVSRUWHG�EXW�QRW�WKH�UHSRUW�WUHH�LWVHOI��<RX�KDYH�WR�WUDQVSRUW�WKH�UHSRUW�WUHH�EHIRUHKDQG��$OVRUHPHPEHU�WKDW�UHSRUW�WUHHV�DUH�FOLHQW�GHSHQGHQW�
7UDQVSRUWV�%HWZHHQ�5���6\VWHPV
<RX�FDQ�WUDQVSRUW�DXWKRUL]DWLRQ�FRPSRQHQWV��DFWLYLW\�JURXSV��DQG�XVHU�PDVWHU�UHFRUGVEHWZHHQ�5���6\VWHPV��&RPSRQHQWV�PD\�EH�WUDQVSRUWHG�LQGHSHQGHQWO\�RU�ZLWK�DOO�RI�WKHLUDVVRFLDWHG�DXWKRUL]DWLRQV�
7UDQVSRUWLQJ�$FWLYLW\�*URXSV
:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV�WKH�DXWKRUL]DWLRQ�SURILOHV��7KHSURILOHV�QR�ORQJHU�KDYH�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�LQ�WUDQVDFWLRQ�683&�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�
2QFH�\RX�KDYH�HQWHUHG�WKH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUW�UHTXHVW��\RX�VKRXOG�QRW�PDNH�DQ\PRUH�FKDQJHV�WR�WKH�DXWKRUL]DWLRQ�SURILOHV�RI�WKDW�DFWLYLW\�JURXS��,I�\RX�FKDQJH�SURILOHV�RUJHQHUDWH�WKHP�IRU�WKH�ILUVW�WLPH��\RX�VKRXOG�HQWHU�WKH�ZKROH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUWUHTXHVW�DJDLQ�
7KH�DFWLYLW\�JURXSV�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVW�FDQ�EH�GLVSOD\HG�ZLWK�WUDQVDFWLRQ�6(���
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups
Authorizations Made Easy7–4
7UDQVSRUWLQJ�6LQJOH�$FWLYLW\�*URXSV�8VLQJ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�7UDQVDFWLRQ
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� (QWHU�WKH�DFWLYLW\�JURXS�\RX�ZRXOGOLNH�WR�WUDQVSRUW�RU�VHOHFW�LW�XVLQJSRVVLEOH�HQWULHV�
�� &KRRVH� �WR�WUDQVSRUW�WKH�DFWLYLW\JURXS�
�� &KRRVH� �WR�FRQWLQXH�
�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�
�� &KRRVH� �
2
3
5
6
4
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups
Release 4.6A/B7–5
<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�
,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�
,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.
�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVWV��FUHDWH�D�QHZ�RQHXVLQJ� �
�� &KRRVH� �
�� <RX�FDQ�XVH�WUDQVDFWLRQ�6(���WR�GLVSOD\�\RXU�FXVWRPL]LQJ�WUDQVSRUW�UHTXHVWV�
��� 7R�LPSRUW�WKH�UHTXHVW�ZLWK�WKH�GDWD��ORJ�RQ�WR�WKH�FOLHQW�\RX�ZRXOG�OLNH�WR�LPSRUW�WKH�GDWD�WR�DQGH[HFXWH�WUDQVDFWLRQ�6&&���VHH�7UDQVSRUW�%HWZHHQ�&OLHQWV��VWHSV��²��RQ�SDJH��²���
7
8
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups
Authorizations Made Easy7–6
0DVV�7UDQVSRUW�RI�$FWLYLW\�*URXSV
7R�WUDQVSRUW�D�VHW�RI�DFWLYLW\�JURXSV�DOO�DW�RQFH��XVH�WKH�PDVV�WUDQVSRUW�IXQFWLRQ�LQVLGH�WKH�3*�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��FKRRVH�(QYLURQPHQW�→�0DVVWUDQVSRUW�
�� (QWHU�WKH�ILUVW�DQG�ODVW�DFWLYLW\�JURXSRI�WKH�UDQJH�WKDW�\RX�ZRXOG�OLNH�WRWUDQVSRUW��<RX�FDQ�DOVR�XVH�SRVVLEOHHQWULHV�IRU�D�OLVW�RI�DOO�H[LVWLQJ�DFWLYLW\JURXSV�
,Q�WKLV�H[DPSOH��ZH�FKRVH�DOO�DFWLYLW\JURXSV�IURP),B$3B'DWDB(QWU\B&OHUN�WR40B0DQDJHUB$VVLWDQW�
�� &KRRVH� �
�� &KRRVH� �WR�FRQWLQXH�
3
4
2
5
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Activity Groups
Release 4.6A/B7–7
�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�
�� &KRRVH� �
<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�
,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�
,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.
�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVW��FUHDWH�D�QHZ�RQHXVLQJ� �
�� &KRRVH� �
8VHU�0DVWHU�5HFRUG�&RPSDULVRQ�$IWHU�,PSRUW�LQWR�WKH�7DUJHW�6\VWHP
2QFH�WKH�DFWLYLW\�JURXSV�KDYH�EHHQ�LPSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��\RX�VKRXOG�FRPSDUHWKH�XVHU�PDVWHU�UHFRUGV�RI�WKH�DFWLYLW\�JURXSV�FRQFHUQHG��([HFXWH�WKLV�FRPSDULVRQ�XVLQJUHSRUW�3)&*B7,0(B'(3(1'(1&<��ZKLFK�\RX�VKRXOG�VFKHGXOH�SHULRGLFDOO\�
,I�\RX�GR�QRW�ZDQW�WR�ZDLW�XQWLO�WKDW�UHSRUW�UXQV�DQG�ZDQW�WKH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHWV\VWHP�WR�EH�LPPHGLDWHO\�FRQVLVWHQW��FRPSDUH�WKH�DFWLYLW\�JURXSV�E\�FKRRVLQJ�(QYLURQPHQW→�0DVV�FRPSDUH�LQ�WUDQVDFWLRQ�3)&*��,Q�WKH�$FWLYLW\�JURXS�ILHOG��FKRRVH�WKH�DFWLYLW\�JURXSVFRQFHUQHG��6HOHFW�&RPSOHWH�FRPSDUH�LQ�WKH�6HOHFWLRQ�RI�DFWLRQ�ILHOG�DQG�VWDUW�WKH�UHSRUW�E\FKRRVLQJ�WKH� ��7KH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHW�V\VWHP�DUH�WKHQ�PDGH�FRQVLVWHQW�
6
7
8
9
Chapter 7: Preparing the R/3 Environment for Go-Live
Transporting Check Indicators and Field Values
Authorizations Made Easy7–8
7UDQVSRUWLQJ�&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV
:LWK�WUDQVDFWLRQ�68���\RX�FDQ�FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV�FRQFHUQLQJ�FKHFN�LQGLFDWRUV�ILHOG�YDOXHV��DQG�WDEOHV�862%;�DQG�862%7��7KLV�SURFHGXUH�LPSRUWV�ERWK�WKH�6$3�FKHFNLQGLFDWRU�GHIDXOWV�IRU�DXWKRUL]DWLRQ�REMHFWV�LQ�D�WUDQVDFWLRQ��DQG�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�WKH�3*�LQWR�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�
:KHWKHU�\RX�UXQ�WUDQVDFWLRQ�68���LQLWLDOO\��RU�FKDQJH�WKH�GHIDXOWV�ODWHU�ZLWK�WUDQVDFWLRQ68����WKH�SURFHVV�LV�UHFRUGHG�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��%\�FDUU\LQJ�RXW�WKHFRUUHVSRQGLQJ�WUDQVSRUW�UHTXHVW��\RX�GLVWULEXWH�\RXU�FKHFN�LQGLFDWRUV�LQ�WKH�V\VWHP�
7KH��7UDQVDFWLRQ�QDPH!�FRUUHVSRQGV�WR�QRUPDO�6$3�WUDQVDFWLRQ�QDPHV��VXFK�DV�9$����7KHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�DUH�LQFOXGHG�LQ�WKH�WUDQVSRUW��&KHFN�LQGLFDWRUV�DUH�VDYHG�LQWDEOH�862%;B&�DQG�ILHOG�YDOXHV�IRU�WKH�3*�DUH�VDYHG�LQ�WDEOH�862%7B&�
7UDQVSRUWLQJ�$XWKRUL]DWLRQ�7HPSODWHV
$IWHU�DQ�XSJUDGH��DOO�6$3�GHOLYHUHG�WHPSODWHV�ZLOO�EH�LGHQWLFDO�LQ�DOO�V\VWHPV��<RX�FDQQRWFKDQJH�WKHVH�WHPSODWHV��\RX�FDQ�RQO\�FRS\�DQG�DOWHU�WKHP��<RX�FDQ��KRZHYHU��FUHDWH�\RXURZQ�WHPSODWHV��DV�GHVFULEHG�HDUOLHU�LQ�WKLV�ERRN��:KHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��XQOLNH6$3�GHIDXOW�FKDQJHV��WHPSODWH�FKDQJHV�DUH�QRW�DXWRPDWLFDOO\�SDVVHG�RQ�WR�WKH�DSSURSULDWHDXWKRUL]DWLRQ�SURILOH�V��ZKHUH�WKH�WHPSODWH�ZDV�LQVHUWHG��2QFH�\RX�KDYH�FKDQJHG�DWHPSODWH�WKDW�ZDV�SUHYLRXVO\�LQVHUWHG�LQ�DQ�DXWKRUL]DWLRQ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��\RXPXVW�PDQXDOO\�XSGDWH�WKDW�SURILOH�ZLWK�WKH�VDPH�FKDQJHV�WKDW�ZHUH�PDGH�WR�WKH�WHPSODWH�&KDQJHV�WR�\RXU�RZQ�WHPSODWHV�DUH�UHFRUGHG�E\�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��7RFDUU\�RXW�WKH�WUDQVSRUW�UHTXHVW��REMHFWV�LQ�WKH�UHTXHVW�PXVW�FRQWDLQ�WKH�IROORZLQJ�V\QWD[�
R3TR SUSP <Template Name>
7UDQVSRUWLQJ�8VHU�0DVWHU�5HFRUGV
7R�WUDQVSRUW�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�FOLHQWV��UXQ�WKH�FOLHQW�FRS\�WUDQVDFWLRQ�SCCL�7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ��→�&OLHQW�&RS\�→�6&&/�¥/RFDO�&RS\��DQG�VHOHFW�SURILOH�6$3B86(5��)RU�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�5��6\VWHPV��XVH�WUDQVDFWLRQ�SCC8��7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ��→�&OLHQW�7UDQVSRUW�→�6&&����&OLHQW�7UDQVSRUW��ZLWK�SURILOH�6$3B86(5�
8–1
&KDSWHU��� ,QVHUWLQJ�0LVVLQJ
$XWKRUL]DWLRQV
&RQWHQWV
Manually Postmaintaining Authorizations ...........................................................8–2
Manually Inserting Authorizations ........................................................................8–3
Inserting Authorizations from Templates.............................................................8–7
Inserting Authorizations from a Profile ..............................................................8–12
Inserting Full Authorizations: Profile “<YourCompany>” ................................8–15
��
Chapter 8: Inserting Missing Authorizations
Manually Postmaintaining Authorizations
Authorizations Made Easy8–2
0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV
$OWKRXJK�WKH�3URILOH�*HQHUDWRU��3*�EXLOGV�DXWKRUL]DWLRQ�SURILOHV��LW�PD\�VRPHWLPHV�EHQHFHVVDU\�WR�LQVHUW�D�PLVVLQJ�DXWKRUL]DWLRQ�RU�WR�DGMXVW�D�ILHOG�YDOXH��7KH�SURFHVV�RIPDLQWDLQLQJ�3*·V�VXJJHVWHG�DXWKRUL]DWLRQV��DV�GHULYHG�IURP�WKH�WUDQVDFWLRQV�VHOHFWHG�IRU�DQDFWLYLW\�JURXS��LV�FDOOHG�SRVWPDLQWDLQLQJ�DXWKRUL]DWLRQV��0DQXDO�SRVWPDLQWHQDQFH�PD\�EHQHFHVVDU\�LQ�WKH�SDUDPHWHU�DQG�YDULDQW�WUDQVDFWLRQV��DQG�GXULQJ�WKH�XSJUDGH�
:KHQ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV"
6KRZQ�EHORZ�DUH�VRPH�RI�WKH�W\SLFDO�FDVHV�ZKHUH�\RX�PXVW�PDQXDOO\�LQFOXGHDXWKRUL]DWLRQV�
&DVH�����$XWKRUL]DWLRQ�,V�0LVVLQJ�IRU�5HODWHG�7UDQVDFWLRQV
$OWKRXJK�WKH�3*�DVVLJQV�D�SDUWLFXODU�SURILOH�WR�D�XVHU��LW�LV�SRVVLEOH�WKDW�WKH�VDPH�XVHU�PD\UHFHLYH�WKH�HUURU�PHVVDJH�´<RX�DUH�QRW�DXWKRUL]HG�µ�ZKHQ�DWWHPSWLQJ�WR�XVH�D�UHODWHGWUDQVDFWLRQ�
7R�DGGUHVV�WKH�DXWKRUL]DWLRQ�VHWWLQJV�IRU�WKH�UHODWHG�WUDQVDFWLRQ��GR�WKH�IROORZLQJ�
�� 8VH�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG��WR�VHHWKH�ODVW�DXWKRUL]DWLRQ�FKHFN�WKDW�IDLOHG��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ��WR�OHDUQKRZ�WR�XVH�WUDQVDFWLRQ�68����
�� &KHFN�WKH�UHODWHG�WUDQVDFWLRQ�WR�FRQILUP�LI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�FKHFNHG�
�� &KHFN�WKH�JHQHUDWHG�SURILOH�WR�FRQILUP�LI�WKH�DXWKRUL]DWLRQ�IRU�WKH�UHODWHG�WUDQVDFWLRQ�LVLQFRUUHFWO\�VHW�
�� 8VH�WUDQVDFWLRQ�68���WR�FKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�LQ�WKHGHVLUHG�WUDQVDFWLRQ��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�WR�OHDUQ�KRZ�WR�XVHWUDQVDFWLRQ�68����
&DVH�����7KH�*HQHUDWHG�3URILOH�'RHV�1RW�$VVLJQ�$Q\�*HQHUDO�5LJKWV�WR�WKH
8VHU
6LQFH�EDVLF�DXWKRUL]DWLRQV�DUH�VR�JHQHUDO��LW�LV�QRW�SUDFWLFDO�WR�LQFOXGH�WKHP�LQ�LQGLYLGXDOWUDQVDFWLRQV�
7R�LPSURYH�V\VWHP�SHUIRUPDQFH��WKRXJK�XQXVXDO�IURP�DQ�DXWKRUL]DWLRQV�VWDQGSRLQW��< 5���GRHV�QRW�FKHFN�LI�DQ�DXWKRUL]DWLRQ�LV�QHHGHG�IRU�DQ�H[LVWLQJ�WUDQVDFWLRQ< 1HZ�DXWKRUL]DWLRQV�DUH�DGGHG�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�DXWKRUL]DWLRQV7KH�V\VWHP�SURYLGHV�WKH�IXQFWLRQDOLW\�WR�VXPPDUL]H�DXWKRUL]DWLRQV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW�
&DVH�����&DQQRW�6HOHFW�7UDQVDFWLRQ�68���IURP�WKH�0HQX�LQ�3)&*
6$3�UHFRPPHQGV�LQFOXGLQJ�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WUDQVDFWLRQ�68���LQ�HDFKDXWKRUL]DWLRQ�SURILOH��7KHVH�DXWKRUL]DWLRQV�JXDUDQWHH�WKDW�LI�XVHUV�JHW�DQ�HUURU�PHVVDJH��IRU
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations
Release 4.6A/B8–3
H[DPSOH��´<RX�DUH�QRW�DXWKRUL]HG«�µ�´1R�DXWKRUL]DWLRQ�IRU«µ�RU�DQ\�PHVVDJH�UHJDUGLQJDQ�DXWKRUL]DWLRQ�SUREOHP���WKH�KHOS�GHVN�FDQ�PRUH�HDVLO\�DVVLVW�WKHP��7KH�DFWLYLW\�JURXS6$3B%&B(1'86(5B$*�DOUHDG\�FRQWDLQV�WKH�DXWKRUL]DWLRQ�IRU�68����7KLV�DFWLYLW\�JURXS�LVDOVR�LQFOXGHG�LQ�WKH�FRPSRVLWH�DFWLYLW\�JURXS�6$3B%&B(9(5<B(03/2<((�
+RZ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV
<RX�PD\�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�< 0DQXDOO\< )URP�D�WHPSODWH< )URP�D�SURILOH< %\�LQVHUWLQJ�FRPSOHWH�DXWKRUL]DWLRQV
0DQXDOO\�,QVHUWLQJ�$XWKRUL]DWLRQV
8VLQJ�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG���\RX�FDQILQG�RXW�LI�DQ�DXWKRUL]DWLRQ�FKHFN�IRU�\RXU�WUDQVDFWLRQ�LV�PLVVLQJ��7UDQVDFWLRQ�68���LV�RQO\RQH�RI�WKH�ZD\V�WR�GHWHUPLQH�PLVVLQJ�DXWKRUL]DWLRQV��6RPHWLPHV��WUDFHV�DUH�PRUH�XVHIXOEHFDXVH�WKH\�DUH�PRUH�DFFXUDWH�DQG�FRPSOHWH³SDUWLFXODUO\�ZKHQ�GHDOLQJ�ZLWK�+5DXWKRUL]DWLRQ�SUREOHPV��,GHQWLI\�WKH�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�ILHOGYDOXHV��7KHQ�PDQXDOO\�LQVHUW�WKH�PLVVLQJ�DXWKRUL]DWLRQ�
<RX�FDQ�XVH�WKH�IROORZLQJ�WZR�RSWLRQV�WR�LQVHUW�DXWKRUL]DWLRQV�< 6HOHFWLRQ�FULWHULD��FKRRVH�IURP�DXWKRUL]DWLRQV�VRUWHG�E\�FODVV�< 0DQXDOO\��LI�\RX�NQRZ�WKH�REMHFW��RU�FDQ�FKRRVH�IURP�DQ�REMHFW�OLVW�
7R�DVVLJQ�JHQHUDO�DXWKRUL]DWLRQV��FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�< &UHDWH�D�VHSDUDWH�DFWLYLW\�JURXS�FRQWDLQLQJ�RQO\�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�
SULQWLQJ���DQG�DVVLJQ�WKLV�DFWLYLW\�JURXS�WR�DOO�XVHUV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�SULQW�WR�SDUWLFXODU�SULQWHUV��$�JHQHULF�SULQWLQJ�DXWKRUL]DWLRQ�FDQ�EH�DVVLJQHG�*HQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKHVH�DFWLYLW\�JURXSV�DQG�DVVLJQ�WKH�SURILOHV�WRWKH�XVHUV�
< ,QFOXGH�WKH�UHTXLUHG�REMHFWV�LQ�WKH�DFWLYLW\�JURXS�E\�XVLQJ�6$3�WHPSODWHV��RU�\RXU�RZQWHPSODWHV�E\�PDLQWDLQLQJ�DQ\�PLVVLQJ�ILHOG�HQWULHV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�EH�DVVLJQHG�WR�VSHFLILF�SULQWHUV�
< 6$3�DOUHDG\�GHOLYHUV�DFWLYLW\�JURXSV�ZLWK�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�6$3B%&B(9(5<B(03/2<((�DQG�6$3B%&B(1'86(5�
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations
Authorizations Made Easy8–4
8VLQJ�6HOHFWLRQ�&ULWHULD
<RX�FDQ�XVH�VHOHFWLRQ�FULWHULD�WR�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�
�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�
�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�
2Q�VFUHHQ��\RX�FDQ�VHH�WKH�FXUUHQWO\LQFOXGHG�DXWKRUL]DWLRQ�FODVVHV�IRUWKH�VHOHFWHG�DFWLYLW\�JURXS�
�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZRXOG�OLNH�WRLQVHUW��VRUWHG�E\�FODVV��
,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQREMHFW�\RX�ZRXOG�OLNH�WR�LQVHUWPDQXDOO\��FKRRVH� �0DQXDOO\�DQG�HQWHUWKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQGVHOHFW�LW�IURP�D�OLVW��VHH�H[DPSOH�VKRZQEHORZ��
4
3
5
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations
Release 4.6A/B8–5
�� ([SDQG�WKH�REMHFW�FODVVHV�DQG�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��
�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHGHVLUHG�DXWKRUL]DWLRQ�REMHFWV�
�� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�
�� &KRRVH�,QVHUW�FKRVHQ�
��� 7KH�VHOHFWHG�DXWKRUL]DWLRQ�REMHFWVDUH�WUDQVIHUUHG�EDFN�WR�WKHDXWKRUL]DWLRQ�FODVVHV�IRU�WKH�JLYHQDFWLYLW\�JURXS��7KH�V\VWHP�FUHDWHV�DQHZ�DXWKRUL]DWLRQ�IRU�HDFKDXWKRUL]DWLRQ�REMHFW��7KH�\HOORZOLJKW�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQILHOG�YDOXHV�DUH�PDLQWDLQHG�
��� 7KH�V\VWHP�VWDWXV�LV�GLVSOD\HG�DV0DQXDOO\��ZKLFK�PHDQV�WKDW�WKHUHDUH�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQVLQ�WKLV�REMHFW�FODVV�
��� &KRRVH� �2SHQ�WR�GLVSOD\�DOO�RSHQDXWKRUL]DWLRQ�ILHOGV�
6
7
8
9
10 11
12
Chapter 8: Inserting Missing Authorizations
Manually Inserting Authorizations
Authorizations Made Easy8–6
��� 0DLQWDLQ�WKH�DSSURSULDWH�YDOXHV�IRUWKH�RSHQ�DXWKRUL]DWLRQ�SURILOHV�
��� 6DYH�DQG�JHQHUDWH�WKH�DFWLYLW\JURXS�
,QVHUWLQJ�0DQXDOO\
,I�\RX�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZRXOG�OLNH�WR�LQVHUW��SHUIRUP�WKH�IROORZLQJ�VWHSV�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�
�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�
�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�
�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH� �0DQXDOO\�
�� (QWHU�WKH�DXWKRUL]DWLRQ�REMHFW�RUFKRRVH�SRVVLEOH�HQWULHV�
�� &KRRVH� �
13
14
4
3
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates
Release 4.6A/B8–7
,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�7HPSODWHV
*HQHUDWHG�SURILOHV�GR�QRW�DXWRPDWLFDOO\�JUDQW�DQ\�JHQHUDO�ULJKWV�WR�< 3ULQW< /RJ�RQ�WR�6$31HW�²�5���)URQWHQG�QRWHV< 8VH�WUDQVDFWLRQ�68��
< 'HEXJ��YLHZ�RQO\�
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZLOO�ILUVW�FUHDWH�D�QHZ�WHPSODWH�DQG�WKHQ�LQVHUW�WKH�WHPSODWH�LQWR�DQ�H[LVWLQJDFWLYLW\�JURXS�
&UHDWLQJ�D�1HZ�7HPSODWH
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��FKRRVH�(QYLURQPHQW�→�&KHFN�LQGLFDWRU�
�� 6HOHFW�(GLW�DXWKRUL]DWLRQ�WHPSODWHV�
�� &KRRVH� �
�� &KRRVH� �
7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�WHPSODWHV�DQG�WKH�6$3�GHOLYHUHGWHPSODWHV��GR�QRW�XVH�QDPHV�IRU�\RXU�WHPSODWHV�WKDW�EHJLQ�ZLWK�6�RU�-��)RU�DGGLWLRQDOLQIRUPDWLRQ��VHH�6$31HW�²�5���)URQWHQG�QRWH�������DQG�ORRN�IRU�WUDQVSRUW�REMHFW�5�756863�
7HPSODWH�FKDQJHV�DUH�QRW�SDVVHG�RQ�ZKHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��7KDW�LV��LI�\RX
3
4
5
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates
Authorizations Made Easy8–8
FKDQJH�D�WHPSODWH�WKDW�\RX�DOUHDG\�LQVHUWHG�LQWR�DQ�DFWLYLW\�JURXS��WKHUH�LV�QR�LQGLFDWRULQ�WKH�DFWLYLW\�JURXS�WR�VKRZ�WKDW�WKH�LQVHUWHG�WHPSODWH�KDV�FKDQJHG�
�� (QWHU�WKH�WHPSODWH�QDPH�DQG�D�VKRUWGHVFULSWLRQ�
�� &KRRVH� �
�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZDQW�WR�LQVHUW�VRUWHG�E\�FODVV��
,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZDQW�WR�LQVHUW�PDQXDOO\��\RX�FDQFKRRVH� �0DQXDO�LQSXW�DQG�HQWHU�WKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQG�VHOHFW�LW�IURP�DOLVW��
�� ([SDQG�WKH�REMHFW�FODVVHV�WR�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��
6
7
9
8Tip
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates
Release 4.6A/B8–9
��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�\RX�ZDQW�WRLQVHUW�
��� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�
��� &KRRVH�,QVHUW�FKRVHQ�
��� 0DLQWDLQ�DOO�WKH�DSSURSULDWH�YDOXHVIRU�WKH�DXWKRUL]DWLRQ�ILHOGV��IRUH[DPSOH��ZH�FKRVH�)XOODXWKRUL]DWLRQ��
��� &KRRVH� �
��� &KRRVH� �
7KH�WHPSODWH�QRZ�DSSHDUV�LQ�WKHWHPSODWH�OLVW�DQG�LV�UHDG\�IRU�XVH�
��� &KRRVH� �
11
12
13
14 15
16
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates
Authorizations Made Easy8–10
,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�7HPSODWH
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�D�WHPSODWH��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�
�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�
�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�
�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�WHPSODWH� 5
4
3
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from Templates
Release 4.6A/B8–11
�� 6HOHFW�WKH�WHPSODWH�\RX�ZDQW�WRLQFOXGH��IRU�H[DPSOH��35,17,1*WHPSODWH��
0XOWLSOH�WHPSODWH�VHOHFWLRQV�DUHSRVVLEOH�
�� &KRRVH� �
7KH�WHPSODWH�ZDV�LQVHUWHG�DQGPDUNHG�ZLWK�VWDWXV�0DQXDOO\��7KHJUHHQ�OLJKW�LQGLFDWHV�WKDW�WKHDXWKRUL]DWLRQ�ILHOGV�DUH�PDLQWDLQHG�
�� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �
,I�\RX�LQVHUWHG�D�WHPSODWH�ZLWK�DXWKRUL]DWLRQ�ILHOGV�WKDW�DUH�QRW�PDLQWDLQHG��WKH�LQGLFDWRUOLJKWV�DSSHDU�DV�\HOORZ�RU�UHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��%HIRUH�SURFHHGLQJ��\RXPXVW�ILUVW�SRVWPDLQWDLQ�DOO�RSHQ�ILHOGV�
6
7
8
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from a Profile
Authorizations Made Easy8–12
,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�3URILOH
,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�XVLQJ�WUDQVDFWLRQV�68���DQG�68����\RX�FDQ�LQVHUW�WKHVHDXWKRUL]DWLRQV�SURILOHV�LQWR�WKH�OLVW�RI�WKH�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�
0LJUDWLQJ�3URILOHV�&UHDWHG�ZLWK�7UDQVDFWLRQV�68���DQG�68��1RWH�WKDW�QR�DFWLYLW\�JURXS�LQIRUPDWLRQ��VXFK�DV�WUDQVDFWLRQ�FRGHV�DXWRPDWLFDOO\PDLQWDLQHG�IRU�REMHFW�6B7&2'(��FDQ�EH�UHJHQHUDWHG�IRU�LQVHUWHG�SURILOHV��7KH�WHFKQLTXHEHORZ�RQO\�DOORZV�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���WR�PLJUDWH�WR�VXFKSURILOHV�DQG�ODWHU�EH�PDLQWDLQHG�ZLWK�WKH�3*��7KHUH�LV�QR�ZD\�WR�UH�FUHDWH�WKH�DSSURSULDWHDFWLYLW\�JURXS�LQIRUPDWLRQ�
7KLV�PHDQV�WKDW�HYHU\WKLQJ�XQGHU�WKH�0HQX�WDE�ZLOO�EH�XQFKDQJHG�LI�68���SURILOHV�DUHFRSLHG�LQWR�WKH�DFWLYLW\�JURXS�+RZHYHU�ZLWK�����\RX�KDYH�QRZ�WKH�RSWLRQ�WR�PLJUDWH�SURILOHV�FUHDWHG�ZLWK�68���DQG68���LQWR�DFWLYLW\�JURXSV��6HH�FKDSWHU�����WKH�VHFWLRQ�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68��3URILOHV�LQWR�$FWLYLW\�*URXSV�
,Q�FHUWDLQ�FLUFXPVWDQFHV��\RX�PD\�ILUVW�FUHDWH�D�WHPSODWH�IURP�\RXU�SURILOH�DQG�WKHQ�LQVHUWWKH�WHPSODWH��7HPSODWHV�DUH�UHXVDEOH�DQG�HDV\�WR�LQVHUW�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�WKH�DXWKRUL]DWLRQ��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from a Profile
Release 4.6A/B8–13
�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�
�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�
,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLI\�WKH�RSWLRQ�ZLWK�ZKLFK\RX�ZDQW�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQYDOXHV��7KLV�RSWLRQ�LV�DXWRPDWLFDOO\�VHWFRUUHFWO\�LQ�QRUPDO�PRGH�
�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�SURILOH�
�� (QWHU�WKH�SURILOH�QDPH�RU�XVH�SRVVLEOHHQWULHV�
�� &KRRVH� �
,I�\RX�LQFOXGH�D�SURILOH�WKDW�LQFOXGHV�WKH�REMHFW�6B7&2'(��LW�GRHV�QRW�DGG�WKH�WUDQVDFWLRQFRGH�WR�WKH�PHQX�SRUWLRQ�RI�WKH�DFWLYLW\�JURXS�GHILQLWLRQ�
5
6
4
7
3
Tip
Chapter 8: Inserting Missing Authorizations
Inserting Authorizations from a Profile
Authorizations Made Easy8–14
�� 6HOHFW�WKH�GHVLUHG�SURILOH�IURP�WKHOLVW�RI�SURILOHV�
�� &KRRVH� �
<RXU�GLDORJ�ER[�PD\�ORRN�GLIIHUHQW��7KHDSSHDUDQFH�GHSHQGV�RQ�WKH�VHWWLQJV�IRUSRVVLEOH�HQWULHV�XQGHU�+HOS�→�6HWWLQJV�→3RVVLEOH�HQWULHV�→�6HWWLQJV�
��� 7KH�VHOHFWHG�SURILOH�LV�WUDQVIHUUHG�
��� &KRRVH� �
��� $OO�WKH�DXWKRUL]DWLRQV�LQ�WKH�VHOHFWHGSURILOH�DUH�WUDQVIHUUHG�DQG�PDUNHGZLWK�WKH�VWDWXV�0DQXDOO\��7KH�JUHHQOLJKW�LQGLFDWHV�WKDW�WKH�SURILOH�LVPDLQWDLQHG�
,I�\RX�LQVHUW�DXWKRUL]DWLRQV�IURP�DSURILOH�ZLWK�QRQPDLQWDLQHGDXWKRUL]DWLRQ�ILHOGV��WKH�UHG�OLJKWDSSHDUV�DQG�\RX�KDYH�WR�SRVWPDLQWDLQDOO�RSHQ�ILHOGV�EHIRUH�SURFHHGLQJ�
��� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �
8
9
10
11
12
13
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”
Release 4.6A/B8–15
,QVHUWLQJ�)XOO�$XWKRUL]DWLRQV��3URILOH�´�<RXU&RPSDQ\!µ
,Q�WKH�IROORZLQJ�H[DPSOH��\RX�OHDUQ�KRZ�WR�FUHDWH�D�QHZ�SURILOH�FDOOHG�&203B$//��ZKHUH�´&203µ�VWDQGVIRU�\RXU�FRPSDQ\�QDPH��7KLV�SURILOH�ZLOO�EH�PRGHOHG�DIWHU�6$3B$//��EXW�ZLWK�WKH�VXSHUXVHU�DXWKRUL]DWLRQUHPRYHG��7KHUHIRUH��ZH�ZLOO�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�&203$1<B$//�DQG�LQFOXGH�WKH�SURILOH&203B$//�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� (QWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS\RX�ZDQW�WR�FUHDWH��IRU�H[DPSOH�COMPANY_ALL��
�� &KRRVH� �&UHDWH�
�� ,Q�WKH�'HVFULSWLRQ�ILHOG��HQWHU�DGHVFULSWLRQ�IRU�WKH�DFWLYLW\�JURXS�
�� &KRRVH� �WR�VDYH�WKH�DFWLYLW\�JURXS�
�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�
2
3
4
5
6
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”
Authorizations Made Easy8–16
�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�
�� &KRRVH� �'R�QRW�VHOHFW�WHPSODWHV�
7KH�V\VWHP�GLVSOD\V�WKH�&KRRVH�7HPSODWHZLQGRZ�EHFDXVH�ZH�FKRVH�WKH$XWKRUL]DWLRQV�WDE�ZLWKRXW�VHOHFWLQJ�DQ\WUDQVDFWLRQV�
�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)XOO�DXWKRUL]DWLRQ�
7
8
9
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”
Release 4.6A/B8–17
��� &KRRVH�<HV�
7KH�LQVHUWLRQ�GRHV�QRW�LQFOXGH�DGG�RQ�FRPSRQHQWV��H[FHSW�GHGXFWLRQ�PDQDJHPHQW�DGG�RQ�FRPSRQHQWV�
��� &KRRVH� �WR�FRQWLQXH�
��� &OLFN�RQ�WKH�QRGH�IRU�WKH�REMHFW�FODVV%DVLV��$GPLQLVWUDWLRQ�WR�RSHQ�LW�
11
10
12
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”
Authorizations Made Easy8–18
��� ,Q�WKH�6\VWHP�$XWKRUL]DWLRQV�OLQH�FKRRVH� �WR�GHDFWLYDWH�WKH�REMHFW�7KH�DXWKRUL]DWLRQ�REMHFW�6\VWHP$XWKRUL]DWLRQV��6B$'0,B)&'��LVQRZ�LQDFWLYH�DQG�ZLOO�QRW�EHJHQHUDWHG�LQWR�WKH�DXWKRUL]DWLRQSURILOH�IRU�&203B$//�
��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�WKDW�EHJLQ�ZLWK$XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\*URXSV�
��� &KRRVH� �LQ�IURQW�RI�WKH�IROORZLQJDXWKRUL]DWLRQ�REMHFWV�WR�GHDFWLYDWHWKHP�< $XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\
�*URXSV��6B86(5B$*5�< 8VHU�0DVWHU�0DLQWHQDQFH�
�$XWKRUL]DWLRQV��6B86(5B$87+�< 8VHU�0DVWHU�0DLQWHQDQFH��8VHU
�*URXSV��6B86(5B*53�< 8VHU�0DVWHU�0DLQWHQDQFH�
�$XWKRUL]DWLRQ�3URILOH�6B86(5B352�
< 8VHU�0DVWHU�0DLQWHQDQFH�6\VWHP�IRU�&HQWUDO�8VHU0DLQWHQDQFH��6B86(5B6<6�
< 7UDQVDFWLRQ�$VVLJQPHQW�RI7UDQVDFWLRQV�WR�$FWLYLW\�*URXSV�6B86(5B7&'�
��� 2QFH�\RX�KDYH�GHDFWLYDWHG�WKHVH�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV�IRU�\RXU�DXWKRUL]DWLRQ�SURILOH��VHOHFWDQG�GHDFWLYDWH�RWKHU�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV��LI�QHHGHG�
��� &KRRVH�2UJDQL]DWLRQDO�OHYHOV�
13
14
15
17
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”
Release 4.6A/B8–19
��� &KRRVH�)XOO�DXWKRUL]DWLRQ�IRU�WKHRUJDQL]DWLRQDO�OHYHOV��7KH�DVWHULVNV� ��ZLOO�EH�LQVHUWHG�LQ�DOO�WKH�RSHQILHOGV�
��� &KRRVH� �
��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �
��� <RX�FDQ�JLYH�WKH�QHZ�SURILOH�WKHVDPH�QDPH�DQG�GHVFULSWLRQ�DV�WKHDFWLYLW\�JURXS��IRU�H[DPSOH�COMP_ALL��
��� &KRRVH� �WR�JHQHUDWH�WKHDXWKRUL]DWLRQ�SURILOH�V��
18
19
21
22
Chapter 8: Inserting Missing Authorizations
Inserting Full Authorizations: Profile “<YourCompany>”
Authorizations Made Easy8–20
��� 7R�YLHZ�DOO�WKH�FUHDWHG�SURILOHV�FKRRVH�$XWKRUL]DWLRQV�→�3URILOHRYHUYLHZ�
��� 7KH�2YHUYLHZ�RI�*HQHUDWHG�3URILOHVVFUHHQ�OLVWV�DOO�WKH�JHQHUDWHGDXWKRUL]DWLRQ�SURILOHV�
��� &KRRVH� �WR�FRQWLQXH�
23
24
25
9–1
&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV
&RQWHQWV
Overview ..................................................................................................................9–2
Assigning Users to Activity Groups .....................................................................9–3
Assigning Activity Groups to Users .....................................................................9–6
Assigning PD Objects to Activity Groups ............................................................9–7
Assigning Activity Groups to PD Objects ..........................................................9–10
Transferring Users from an IMG Project to an Activity Group.........................9–13
Updating Profiles in the User Master Records ..................................................9–15
Creating a Sample Organizational Plan..............................................................9–21
Structural Authorizations.....................................................................................9–28
��
Chapter 9: Assigning Activity Groups
Overview
Authorizations Made Easy9–2
2YHUYLHZ
7KH�QHZ�6$3�(DV\�$FFHVV�XVHU�PHQX�LV�WKH�XVHU�VSHFLILF�SRLQW�RI�HQWU\�LQWR�WKH�5���6\VWHP�'HSHQGLQJ�RQ�WKH�DVVLJQHG�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXSV��WKH�XVHU�PHQX�ORRNVGLIIHUHQW�IRU�HDFK�XVHU��7KH�XVHU�PHQX�FRQWDLQV�RQO\�WKRVH�LWHPV³VXFK�DV�WUDQVDFWLRQV�UHSRUWV��DQG�ZHE�DGGUHVVHV³WKDW�WKH�DVVLJQHG�DFWLYLW\�JURXSV�FRQWDLQ�DQG�WKHUHIRUH�RQO\WKRVH�WDVNV�QHHGHG�WR�SHUIRUP�WKH�GDLO\�ZRUN�
'HSHQGLQJ�RQ�WKH�DUHD�RI�WKH�V\VWHP�\RX�ZRUN�LQ��DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV�VXFK�DV�XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV��DIIHFWV�WKH�IROORZLQJ�DUHDV�< ,Q�%XVLQHVV�:RUNIORZ��WKHVH�DVVLJQPHQWV�GHWHUPLQH�WKH�V\VWHP�WDVNV�D�XVHU�FDQ�SHUIRUP
�IRU�ZRUNIORZ�XVHUV��LW�LV�PDQGDWRU\�WR�RQO\�LQFOXGH�WDVNV�LQ�DFWLYLW\�JURXSV��< ,Q�+XPDQ�5HVRXUFHV��WKHVH�DVVLJQPHQWV�VHUYH�DV�KLJKO\�GHWDLOHG�REMHFW�GHVFULSWLRQV��IRU
MRE��SRVLWLRQ��GHVFULSWLRQV��HWF���
7KH�VDPH�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�VHYHUDO�GLIIHUHQW�REMHFWV��$�VLQJOH�REMHFW�PD\�DOVREH�UHODWHG�WR�VHYHUDO�GLIIHUHQW�DFWLYLW\�JURXSV��7KH�GLIIHUHQW�DFWLYLW\�JURXSV�DVVLJQHG�WR�DQREMHFW�DUH�WRJHWKHU�UHIHUUHG�WR�DV�WKH�REMHFW·V�DFWLYLW\�SURILOH��7KH�YDULRXV�5���REMHFWV�DUH�< 5���XVHUV�²�2EMHFW�W\SH�86
$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�� 5HFRJQL]HG�E\�5��� $OORZHG�WR�ORJ�RQ� $OORZHG�WR�SHUIRUP�VSHFLILHG�V\VWHP�DFWLYLWLHV
)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�%DVLVFRPSRQHQW�RI�WKH�XVHU�PDVWHU�UHFRUG�
< :RUN�FHQWHU���2EMHFW�W\SH�$
$�ZRUN�FHQWHU�LGHQWLILHV�D�ORFDWLRQ�ZKHUH�ZRUN�LV�FDUULHG�RXW��$�ORFDWLRQ�FDQ�UHSUHVHQW�DJHRJUDSKLF�ORFDWLRQ��VXFK�DV�WKH�3KLODGHOSKLD�EUDQFK�RIILFH�RU�WKH�6LQJDSRUH�VXEVLGLDU\�RU�LW�FDQ�EH�PRUH�SUHFLVH��)RU�H[DPSOH��LW�FDQ�LGHQWLI\�D�VSHFLILF�ZRUNVWDWLRQ�ZLWK�FHUWDLQPDWHULDOV�DQG�HTXLSPHQW��RQ�D�VSHFLILF�IORRU�RI�D�VSHFLILF�EXLOGLQJ��:RUN�FHQWHUV�FDQ�EHXVHG�ZLWK�MREV�DQG�WDVNV�WR�FUHDWH�FRPSUHKHQVLYH�MRE�GHVFULSWLRQV��7KH�MRE�LGHQWLILHV�WKHMRE�FODVVLILFDWLRQ��WKH�WDVNV�LQGLFDWH�WKH�W\SHV�RI�GXWLHV�SHUIRUPHG��DQG�WKH�ZRUN�FHQWHULGHQWLILHV�ZKHUH�WKH�WDVNV�DUH�FDUULHG�RXW�
< -RE���2EMHFW�W\SH�&
$�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��RU�LQVWUXFWRU��0DQ\�HPSOR\HHV�PD\�KROG�WKH�VDPH�MRE��IRUH[DPSOH��WKHUH�PLJKW�EH����HPSOR\HHV�ZRUNLQJ�DV�HQJLQHHUV���-REV�DUH�QRUPDOO\�XVHG�WRFUHDWH�SRVLWLRQV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV�DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�MRE��8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKRVH�UHTXLUHG�WR�ZRUN�ZLWK�6$3�RIILFH��XVH�FDUH�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSVWR�MREV�
Chapter 9: Assigning Activity Groups
Assigning Users to Activity Groups
Release 4.6A/B9–3
< 2UJDQL]DWLRQDO�XQLW���2EMHFW�W\SH�2
2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�RUJDQL]DWLRQDO�HQWLWLHV�GHVLJQDWHG�WR�SHUIRUP�D�VSHFLILHGVHW�RI�IXQFWLRQV��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV��GLYLVLRQV�GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDO�VWUXFWXUH�DW\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�DPRQJ�WKHXQLWV��$Q�HPSOR\HH�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWV�WKHLQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�XQLW�
8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��XVH�FDUH�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WR�EH�IDLUO\VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�WKHLU�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��,I�H[FHSWLRQV�RFFXU��FUHDWHDGGLWLRQDO�DFWLYLW\�JURXSV��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RU�SRVLWLRQ��LW�PD\�EH�EHVWWR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�VSHFLILF�MREV�RU�SRVLWLRQV�
< 3HUVRQ���2EMHFW�W\SH�3
$�SHUVRQ�< 3RVLWLRQ���2EMHFW�W\SH�6
$�SRVLWLRQ�UHSUHVHQWV�D�XQLTXH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��WKH�PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHGZLWK�MREV�DQG�DUH�XVXDOO\�FUHDWHG�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�SRVLWLRQDXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�SRVLWLRQ�7KLV�SURFHVV�DOORZV�\RX�WR�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DOPRVW�D�FRPSOHWHO\SRVLWLRQ�RULHQWHG�IDVKLRQ��6LQFH�DOO�RI�WKH�DFFHVV�ULJKWV�DUH�QRZ�OLQNHG�WR�WKH�SRVLWLRQ��LWGRHV�QRW�PDWWHU�ZKR�ILOOV�WKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��WKH�DXWKRUL]DWLRQSURILOH�DXWRPDWLFDOO\�FKDQJHV�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG�
$VVLJQLQJ�$FWLYLW\�*URXSV
0DNH�VXUH�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�WKH�VSHFLILF�SRVLWLRQ�WKDW�ZLOO�UHFHLYH�DQDXWKRUL]DWLRQ�SURILOH��,I�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�D�MRE��DOO�RI�WKH�SRVLWLRQVFUHDWHG�IURP�WKDW�MRE�ZLOO�LQKHULW�WKH�DFWLYLW\�JURXS�DQG�LWV�DXWKRUL]DWLRQ�SURILOH�V��
$VVLJQLQJ�8VHUV�WR�$FWLYLW\�*URXSV
$OWKRXJK�ZH�DOUHDG\�GHPRQVWUDWHG�LQ�FKDSWHU����8VHU�5ROH�7HPSODWHV��KRZ�WR�DVVLJQ�D�XVHU�WRD�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXS�XVLQJ�WKH�3*��ZH�ZLOO�GHPRQVWUDWH�LW�KHUH�LQ�PRUHGHWDLO�
7KH�IROORZLQJ�PHWKRG�LV�UHFRPPHQGHG�LI�\RX�ZDQW�WR�DVVLJQ�PRUH�XVHUV�WR�D�VSHFLILFDFWLYLW\�JURXS�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WR�DQ�HPSOR\HH�DQG�FKRRVH� �&KDQJH�
Chapter 9: Assigning Activity Groups
Assigning Users to Activity Groups
Authorizations Made Easy9–4
�� &KRRVH�WKH�8VHU�WDE�
�� (QWHU�WKH�XVHU�,'�LQ�WKH�8VHU�,'�ILHOG�
<RX�FDQ�LQFOXGH�XVHU�,'V�E\�RQH�RIWKH�IROORZLQJ�PHWKRGV�< (QWHU�WKH�XVHU�,'�GLUHFWO\�< 0DNH�D�VHOHFWLRQ�IURP�WKH�SRVVLEOH
HQWULHV�OLVW�< 8VH�PXOWLSOH�VHOHFWLRQ�IURP�D
VHOHFWLRQ�OLVW�E\�FKRRVLQJ�6HOHFWLRQ��6HH�WKH�IROORZLQJ�7LSV
�7ULFNV�
�� 7R�VDYH�\RXU�DVVLJQPHQW��FKRRVH� �
%\�XVLQJ�WKH�EXWWRQ�� �6HOHFWLRQ��\RX�FDQ�LQFOXGHVHYHUDO�XVHUV��IRU�H[DPSOH��DOO�XVHUV�LQ�D�SDUWLFXODUXVHU�JURXS�RU�DOO�XVHUV�LQ�WKH�5���6\VWHP���6HOHFW�WKHGHVLUHG�XVHU�DQG�FKRRVH� �
,I�\RX�FDQQRW�ILQG�WKH�UHTXLUHG�XVHU�RU�LI�\RX�ZDQW�WRFKRRVH�WKH�XVHU�WKURXJK�D�XVHU�JURXS�
D� &KRRVH� �
E� 2Q�WKH�([HFXWH�YDOXH�UHVWULFWLRQ�ZLQGRZ��ILQG�WKHXVHU�E\�HLWKHU�< (QWHULQJ�WKH�ILUVW�OHWWHU�V��RI�WKH�XVHU�QDPH�DQG
DQ�DVWHULVN�� ��WR�H[SDQG�VHOHFWLRQ�OLVW< 8VLQJ�WKH�8VHU�JURXS�ILHOG�WR�ILQG�WKH�XVHU
WKURXJK�WKHLU�XVHU�JURXS
F� &KRRVH� �
G� 6HOHFW�WKH�XVHU�
,W�LV�SRVVLEOH�WR�VHOHFW�VHYHUDO�XVHUV�
H� &KRRVH� �
a
3
4
b
c
Tip
d
e
Chapter 9: Assigning Activity Groups
Assigning Users to Activity Groups
Release 4.6A/B9–5
�� 7KH�FKRVHQ�XVHU�V��DSSHDU�LQ�WKH8VHU�,'�DQG�8VHU�QDPH�FROXPQV�
�� ,Q�WKH�)URP�DQG�WR�FROXPQV��UHVWULFWWKH�VWDUW�DQG�HQG�GDWH�RI�WKH�XVHUDVVLJQPHQW�
7KH�V\VWHP�HQWHUV�E\�GHIDXOW�WKHFXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�DQG�����������DV�WKH�HQG�GDWH�
�� &KRRVH� �WR�VDYH�\RXU�VHOHFWLRQ�
�� &KRRVH� �8VHU�FRPSDUH�
6WDWXV�'LVSOD\�RQ�WKH�7DE
7KH�VWDWXV�GLVSOD\�RQ�WKH�8VHU�WDE�GLVSOD\V�ZKHWKHU�RU�QRW�XVHUV�DUH�DOUHDG\�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��,I�WKH�GLVSOD\�DSSHDUV�LQ�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVWRQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��,I�\HOORZ��LW�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQDVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�
7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV
,I�\RX�DOVR�XVH�WKH�DFWLYLW\�JURXS�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��WKHQ�\RX�VKRXOGQRWH�WKDW�WKH�JHQHUDWHG�SURILOH�LV�QRW�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�XQWLO�WKH�XVHUPDVWHU�UHFRUGV�KDYH�EHHQ�FRPSDUHG��:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS�WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG�����������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WR�UHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKHDVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�D�WHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKHV\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKH�XVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKHXVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW�3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH�\RX�VKRXOG�VFKHGXOH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKHPRUQLQJ��WR�UXQ�LQ�WKH�EDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUWFRPSDUHV�WKH�XVHU�PDVWHU�UHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQVIRU�WKH�XVHU�PDVWHU�UHFRUGV��7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHUDVVLJQPHQWV�DQG�HQWHUV�DXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�DVVLJQPHQWV�
6 7
8
9
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to Users
Authorizations Made Easy9–6
$VVLJQLQJ�$FWLYLW\�*URXSV�WR�8VHUV
<RX�FDQ�DOVR�DVVLJQ�XVHU�UROH�WHPSODWHV�RU�DFWLYLW\�JURXSV�WR�XVHUV�XVLQJ�WUDQVDFWLRQ�68���¥�8VHUV��,I�\RXZRXOG�OLNH�WR�DVVLJQ�VHYHUDO�DFWLYLW\�JURXSV�WR�RQH�XVHU�WKLV�LV�D�PRUH�HIILFLHQW�ZD\�IRU�WKH�DVVLJQPHQW�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��
�� (QWHU�WKH�QDPH�RI�WKH�XVHU�WR�ZKRP\RX�ZRXOG�OLNH�WR�DVVLJQ�WKH�DFWLYLW\JURXS��RU�XVH�SRVVLEOH�HQWULHV�
�� &KRRVH� �
�� 6HOHFW�DOO�WKH�GHVLUHG�DFWLYLW\�JURXSVE\�HQWHULQJ�WKH�FRUUHFW�QDPHV��RU�XVHSRVVLEOH�HQWULHV�
�� (QWHU�WKH�FRUUHFW�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW�
�� &KRRVH� �WR�VDYH�\RXU�DVVLJQPHQW�
7R�VHH�WKH�FRUUHVSRQGLQJ�SURILOHV��VHOHFWWKH�3URILOHV�WDE�
3
5
6
4
Tip
2
Chapter 9: Assigning Activity Groups
Assigning PD Objects to Activity Groups
Release 4.6A/B9–7
$OO�FKDQJHV�KDYH�EHHQ�VDYHG�WR�WKHXVHU�PDVWHU�UHFRUG�
5HPHPEHU��DV�ORQJ�DV�DQ�DFWLYLW\�JURXS�LV�DVVLJQHG�WR�DQ�5���XVHU��\RX�FDQ�FKDQJH�WKLVDFWLYLW\�JURXS�DQG�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV�DV�RIWHQ�DV�\RX�ZDQW�ZLWKRXWXSGDWLQJ�WKH�XVHU�PDVWHU�UHFRUG�
,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKHVH�SURILOHVDUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�XVHUV�WR�ZKRP�WKH�ROG�SURILOH�EHORQJHG��7KH�XVHUPDVWHU�RI�WKLV�XVHU�DXWRPDWLFDOO\�JHWV�XSGDWHG�
$VVLJQLQJ�3'�2EMHFWV�WR�$FWLYLW\�*URXSV
<RX�FDQ�DVVLJQ�3'�REMHFWV�VXFK�DV�SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV�WR�DFWLYLW\�JURXSV��8VLQJWUDQVDFWLRQ�PFCG��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�JHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQVWDE�VKRXOG�EH�JUHHQ��
&UHDWH�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ
7R�DVVLJQ�3'�REMHFWV�WR�DFWLYLW\�JURXSV��\RXU�V\VWHP�PXVW�KDYH�DQ�RUJDQL]DWLRQDO�SODQ��,I\RX�KDYH�QRW�FUHDWHG�RQH�IRU�\RXU�FRPSDQ\�EXW�\RX�ZDQW�WR�WHVW�WKLV�IXQFWLRQDOLW\��VHH&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ�RQ�SDJH��²���
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�DFWLYLW\�JURXS�WR�EH�DVVLJQHG�WR�D�3'�REMHFW�
�� 6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�PDQDJHPHQW�DQG�ZRUNIORZ��
�� &KRRVH� �&KDQJH�
Chapter 9: Assigning Activity Groups
Assigning PD Objects to Activity Groups
Authorizations Made Easy9–8
�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�
�� &KRRVH� 2UJDQL]DWLRQDO�0��
�� 7R�FUHDWH�WKH�DVVLJQPHQW , FKRRVH� �
�� 6HOHFW�WKH�REMHFW�WR�EH�DVVLJQHG��IRUH[DPSOH��3RVLWLRQ��
�� &KRRVH� �
��� &KRRVH� �WR�JHW�D�OLVW�RI�SRVLWLRQV�
��� )URP�WKH�OLVW�RI�SRVLWLRQV��VHOHFW�WKHSRVLWLRQ�\RX�ZRXOG�OLNH�WR�DVVLJQ�WRWKH�VHOHFWHG�DFWLYLW\�JURXS��PRUHWKDQ�RQH�SRVLWLRQ�PD\�EH�VHOHFWHG��
��� &KRRVH� �
6
9
8
7
10
11
12
5
Chapter 9: Assigning Activity Groups
Assigning PD Objects to Activity Groups
Release 4.6A/B9–9
��� (QWHU�WKH�WLPH�SHULRG�IRU�WKHUHODWLRQVKLS�
��� &KRRVH� �WR�FUHDWH�WKH�UHODWLRQVKLS�
7KH�UHODWLRQVKLS�LV�HVWDEOLVKHG�
��� 8QGHU�WKH�DFWLYLW\�JURXS�\RX�FDQ�VHHWKH�DVVLJQHG�SRVLWLRQ��8QGHU�WKHSRVLWLRQ�\RX�FDQ�VHH�WKH�DVVLJQHGXVHU�
��� 7R�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VRWKDW�WKH�DSSURSULDWH�SURILOHV�DUHLQVHUWHG�LQWR�WKLV�UHFRUG��FKRRVH� �
<RX�KDYH�WKH�RSWLRQ�WR�VHOHFW�EHWZHHQ�GLIIHUHQW�YLHZV�IRU�WKH�DVVLJQPHQW��)URP�WKHPHQX�EDU��FKRRVH�9LHZ�DQG�WKHQ�VHOHFW�DQ\�RI�WKH�IROORZLQJ�PHQX�RSWLRQV��.H\�$EEUHYLDWLRQ��2EMHFW�SHULRG��5HODWLRQVKLS�SHULRG��8VHUV�RQO\�
7KH�DVVLJQPHQW�LV�VDYHG�DQG�WKHXVHU�PDVWHU�GDWD�XSGDWHG�
13
14
15
16
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to PD Objects
Authorizations Made Easy9–10
$VVLJQLQJ�$FWLYLW\�*URXSV�WR�3'�2EMHFWV
<RX�FDQ�DVVLJQ�DFWLYLW\�JURXSV�WR�3'�REMHFWV��8VLQJ�WKH�3*��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQJHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQV�WDE�VKRXOG�EH�JUHHQ��
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�ppom_old�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�WKH�+XPDQ�UHVRXUFHV�→�2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�PRGH�→�6LPSOH�PDLQWHQDQFH�→3320B2/'�¥�FKDQJH��
�� (QWHU�WKH�RUJDQL]DWLRQDO�XQLW��RU�XVHSRVVLEOH�HQWULHV�
�� &KRRVH�7��6WUXFWXUH�6HDUFK�WR�VHOHFWWKH�RUJDQL]DWLRQDO�XQLW�XVLQJ�DVWUXFWXUDO�VHDUFK�
�� 6HOHFW�WKH�DSSURSULDWH�URRWRUJDQL]DWLRQDO�XQLW��,Q�WKLV�H[DPSOH�ZH�FKRVH�WKH�URRW�RUJDQL]DWLRQDOXQLW�IURP�WKH�VDPSOH�RUJDQL]DWLRQDOSODQ�
�� &KRRVH� �
5
2
3
4
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to PD Objects
Release 4.6A/B9–11
�� 7KH�VHOHFWHG�RUJDQL]DWLRQDO�SODQDSSHDUV�LQ�WKH�2UJDQL]DWLRQDO�XQLWILHOG�
�� &KRRVH� �
�� &KRRVH�6WDII�DVVLJQPHQWV�
�� ([SDQG�WKH�XQLWV�DQG�VHOHFW�WKH�RQHWR�ZKLFK�\RX�ZRXOG�OLNH�WR�DVVLJQWKH�DFWLYLW\�JURXS��IRU�H[DPSOH�%X\HU��
��� &KRRVH�7DVN�SURILOH�
6
7
8
9
10
Chapter 9: Assigning Activity Groups
Assigning Activity Groups to PD Objects
Authorizations Made Easy9–12
��� 2Q�WKH�7DVN�3URILOH�&KDQJH�VFUHHQ�VHOHFW�WKH�SRVLWLRQ�WR�ZKLFK�\RXZRXOG�OLNH�WR�DVVLJQ�DQ�DFWLYLW\JURXS�
��� &KRRVH� �$FWLYLW\�JURXS�
��� (QWHU�WKH�ILUVW�OHWWHU�RI�WKH�DFWLYLW\JURXS�\RX�ZRXOG�OLNH�WR�DVVLJQ�RUOHDYH�WKH�DVWHULVNV�� ��LQ�WKH�ILHOG�WRJHW�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�
��� &KRRVH� �
��� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZLVK�WRDVVLJQ��PXOWLSOH�VHOHFWLRQV�DUHSRVVLEOH��
��� &KRRVH� �
��� 7R�YHULI\�WKH�DVVLJQPHQW��FKRRVH� �
7KH�DVVLJQPHQW�EHWZHHQ�WKH�SRVLWLRQDQG�WKH�DFWLYLW\�JURXS�KDV�EHHQ�VDYHG�
7R�PDNH�FKDQJHV�WR�WKH�DVVLJQHGDFWLYLW\�JURXS��VHOHFW�WKH�DFWLYLW\�JURXSDQG�FKRRVH�*RWR�→�$FWLYLW\�JURXS�
7KH�QH[W�VWHS�LV�WR�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VR�WKDW�WKH�DSSURSULDWH�SURILOHV�DUH�LQVHUWHG�LQWR�WKHXVHU�PDVWHU�UHFRUG�DQG�DVVLJQHG�WR�WKH�RUJDQL]DWLRQDO�XQLWV�
11
12
13
14
15
16
17
Chapter 9: Assigning Activity Groups
Transferring Users from an IMG Project to an Activity Group
Release 4.6A/B9–13
7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW�WR�DQ�$FWLYLW\
*URXS
,I�\RX�DVVLJQHG�XVHUV��UHVRXUFHV��WR�DQ�,0*�SURMHFW�LQ�WKH�SURMHFW�PDQDJHPHQW��DQG�GLG�QRWFRS\�WKH�XVHU�DVVLJQPHQW�ZKHQ�FUHDWLQJ�WKH�FXVWRPL]LQJ�DXWKRUL]DWLRQV��\RX�FDQ�WUDQVIHUWKHVH�XVHUV�WR�WKH�DFWLYLW\�JURXS�XVLQJ�WKH�IROORZLQJ�SURFHGXUH�
1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�\RX�PDNH�FKDQJHV�LQ�WKH�,0*�SURMHFWDGPLQLVWUDWLRQ�
)RU�WKH�IROORZLQJ�H[DPSOH��ZH�DVVXPH�WKDW�< $Q�,0*�SURMHFW�ZLWK�DW�OHDVW�RQH�DVVLJQHG�XVHU�H[LVWV< <RX�DVVLJQHG�DQ�,0*�SURMHFW�RU�SURMHFW�YLHZ�WR�WKH�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH
VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�< <RX�PDLQWDLQHG�WKH�DXWKRUL]DWLRQV�IRU�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH
VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�
7R�WUDQVIHU�XVHUV�IURP�DQ�,0*�SURMHFW�WR�DQ�DFWLYLW\�JURXS�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS�WR�ZKLFK�\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKH�XVHU�IURPDQ�,0*�SURMHFW��IRU�H[DPSOH��40B&86720,=,1*���DQG�FKRRVH� �&KDQJH�
�� &KRRVH�WKH�0HQX�WDE�
�� &KRRVH�8WLOLWLHV�→&XVWRPL]LQJ�DXWK� 4
Chapter 9: Assigning Activity Groups
Transferring Users from an IMG Project to an Activity Group
Authorizations Made Easy9–14
�� &KRRVH� �8VHU�
�� 6HOHFW�WKH�XVHUV�\RX�ZRXOG�OLNH�WRDVVLJQ�
�� &KRRVH� �
$OO�VHOHFWHG�XVHUV�ZLOO�EH�WUDQVIHUUHGE\�GHIDXOW�
�� &KRRVH� �
�� &KRRVH�WKH�8VHU�WDE�
��� &KRRVH� 8VHU�FRPSDUH�
$V�FXVWRPL]LQJ�LV�SURMHFW�UHODWHG�DQGUXQV�IRU�D�OLPLWHG�SHULRG��\RX�VKRXOGPDLQWDLQ�WKH�HQG�GDWH�IRU�WKH�XVHU�LQ�WKHXVHU�DVVLJQPHQW��7LPH�UHVWULFWLRQVSUHYHQW�XVHUV�ZKR�DUH�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�IURP�KDYLQJDXWKRUL]DWLRQ�IRU�WKH�DVVLJQHG�SURMHFWVRU�SURMHFW�YLHZV�DIWHU�WKH�FXVWRPL]LQJSURMHFW�LV�FRPSOHWH�
��� &KRRVH� �&RPSOHWH�FRPSDUH�
5
6
7
8
9
10
11
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records
Release 4.6A/B9–15
7KH�XVHUV�IURP�WKH�FXVWRPL]LQJSURMHFW�DUH�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�
8SGDWLQJ�3URILOHV�LQ�WKH�8VHU�0DVWHU�5HFRUGV
7KLV�VHFWLRQ�GHVFULEHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�UHSRUW�3)&*B7,0(�'(3(1'(1&<�WRXSGDWH�XVHU�PDVWHU�UHFRUGV��5HPHPEHU�WKDW�DFWLYLW\�JURXSV��WKHLU�DVVLJQPHQW�WR�XVHU�PDVWHUUHFRUGV��RU�3'�REMHFWV�FDQ�EH�GHOLPLWHG�
7R�HQVXUH�WKDW�RQO\�YDOLG�DXWKRUL]DWLRQ�SURILOHV�UHPDLQ�LQ�WKH�XVHU�PDVWHU�UHFRUG�HDFK�GD\�FRQGXFW�GDLO\�SURILOH�FRPSDULVRQV��)RU�WKH�FKDQJHV�LQ�WKH�XVHU�PDVWHU�UHFRUG�WR�EH�HIIHFWLYH�WKLV�FRPSDULVRQ�PXVW�WDNH�SODFH�EHIRUH�WKH�XVHU�ORJV�RQ�
7R�FRQGXFW�D�FRPSDULVRQ��\RX�FDQ�HLWKHU�< &RPSDUH�WKH�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*
< 8VH�PDVV�FRPSDUH�ZLWKLQ�WKH�3*��(QYLURQPHQW�→�0DVV�FRPSDUH�
< 5XQ�UHSRUW�3)*&B7,0(B'(3(1'(1&<�LQ�D�EDFNJURXQG�MRE�EHIRUH�WKH�VWDUW�RI�HDFKGD\
7KHVH�RSWLRQV�DUH�GLVFXVVHG�LQ�WKH�IROORZLQJ�WKUHH�VHFWLRQV�
&RPSDULQJ�8VHU�0DVWHU�'DWD�IURP�:LWKLQ�7UDQVDFWLRQ�3)&*
$�FRPSDULVRQ�RI�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*�LPPHGLDWHO\�XSGDWHV�DVSHFLILF�XVHU�PDVWHU�DIWHU�FUHDWLQJ�DQ�DVVLJQPHQW�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�DQ�DFWLYLW\�JURXS�IRU�ZKLFK�\RX�ZRXOG�OLNH�WR�XSGDWH�WKH�XVHU�PDVWHU�GDWD�DQGFKRRVH� �&KDQJH�
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records
Authorizations Made Easy9–16
�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�
�� ,Q�WKH�8VHU�,'�FROXPQ��HQWHU�D�XVHU,'�RU�VHOHFW�LW�IURP�D�OLVW�XVLQJSRVVLEOH�HQWULHV�
�� (QWHU�D�YDOLGLW\�SHULRG�
�� &KRRVH� �8VHU�FRPSDUH�
6WDWXV�'LVSOD\�RQ�WKH�8VHU�7DE7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�WHOOV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS��,I�WKHLQGLFDWRU�LV�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS�,I�\HOORZ��WKLV�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKHXVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�
�� &KRRVH� �&RPSOHWH�FRPSDUH�
7KH�H[SHUW�PRGH�GLVSOD\V�H[DFWO\�ZKLFK�SURILOHV�ZHUH�LQVHUWHG�DQG�UHPRYHG�IRU�HDFKXVHU��$V�\RX�KDYH�WKH�RSWLRQ�WR�UHVWULFW�WKH�VHOHFWLRQ�RI�WKH�SURILOHV�IRU�SURFHVVLQJ��WKHVWDWXV�RI�8VHU�FRPSDUH�LV�QRW�VZLWFKHG�WR�JUHHQ��7KLV�VWDWXV�LV�RQO\�WKH�FDVH�LI�WKHFRPSDULVRQ�LV�H[HFXWHG�E\�FKRRVLQJ� �&RPSOHWH�FRPSDUH��,I�\RX�FKRRVH� �([SHUW�PRGH�IRUFRPSDUH��WKH�VWDWXV�LV�QRW�VHW�WR�JUHHQ�
�� ,I�\RX�KDYH�QRW�VDYHG�WKH�DFWLYLW\JURXS�\HW��FKRRVH�<HV�
45
6
7Tip
8
3
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records
Release 4.6A/B9–17
�� 7KH�JUHHQ�OLJKW�RQ�8VHU�FRPSDUHLQGLFDWHV�WKDW�WKH�FRPSDULVRQ�LVFRPSOHWH�
1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�
9
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records
Authorizations Made Easy9–18
3URILOH�&RPSDULVRQV�8VLQJ�0DVV�&RPSDUH��3)8'�
)RU�SURILOH�FRPSDULVRQ�ZLWKLQ�WKH�3*��\RX�FDQ�XVH�WKH�PDVV�FRPSDUH�IXQFWLRQ�UHJXODUO\�WR�FKHFN�IRUEDFNJURXQG�MRE�HUURUV�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��
�� &KRRVH�WKH�DFWLYLW\�JURXSV�\RXZRXOG�OLNH�WR�UHFRQFLOH�
�� 6HOHFW�RQH�RI�WKH�IROORZLQJ�DFWLRQV�< 6FKHGXOH�RU�FKHFN�MRE�IRU�IXOO
UHFRQFLOLDWLRQ�VHH�WKH�QH[W�VHFWLRQ�
< 0DQXDO�VHOHFWLRQ�RI�SURILOHV�IRU�VHOHFWHG�SURILOHV�
< &RPSOHWH�FRPSDUH�WR�DGMXVW�XVHU�PDVWHU�UHFRUGV�IRUDOO�DFWLYLW\�JURXSV�
�� 8QGHU�2SWLRQV��VHOHFW�WKH�GHVLUHGVHWWLQJV��ZH�VHOHFWHG�DOO��
�� ,I�\RX�ZRXOG�OLNH�WR�UHFRQFLOH�ZLWKRUJDQL]DWLRQDO�PDQDJHPHQW��VHOHFW5HFRQFLOH�ZLWK�+5�2UJDQL]DWLRQDO0DQDJHPHQW�
�� &KRRVH� �
7KH�IROORZLQJ�ZLQGRZ�RQO\�DSSHDUV�LI�\RX�VHOHFW�WKH�RSWLRQ�0DQXDO�VHOHFWLRQ�RI�SURILOHV�LQVWHS����EHFDXVH�WKH�VWDWXV�IRU�WKH�FRPSOHWH�FRPSDUH�KDV�QRW�EHHQ�VHW��,I�\RX�OHDYH�WKHGHIDXOW�YDOXH��ZKLFK�LV�&RPSOHWH�FRPSDUH��\RX�ZLOO�QRW�JHW�WKH�IROORZLQJ�ZLQGRZ��EHFDXVHWKH�VWDWXV�ZLOO�DOUHDG\�EH�VHW�FRUUHFWO\�IRU�WKH�3*�
�� &KRRVH� �
6
2
3
4
5
7
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records
Release 4.6A/B9–19
�� &KRRVH� �8VHU�PDVWHU�UHFRUG�
7KH�XVHU�PDVWHU�UHFRUGV�KDYH�EHHQVXFFHVVIXOO\�XSGDWHG�
1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�
5HSRUW�3)&*B7,0(B'(3(1'(1&<�WR�6FKHGXOH�7LPH�'HSHQGHQF\
7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV
:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWHDV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG������������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WRUHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKH�DVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�DWHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKH�V\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKHXVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKH�XVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH��\RX�VKRXOG�VFKHGXOH�UHSRUW3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKH�PRUQLQJ��WR�UXQ�LQ�WKHEDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUW�FRPSDUHV�WKH�XVHU�PDVWHUUHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQV�IRU�WKH�XVHU�PDVWHU�UHFRUGV�7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHU�DVVLJQPHQWV�DQG�HQWHUVDXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�XVHU�DVVLJQPHQWV�
,I�WKH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�UXQV�HYHU\�QLJKW��WKH�DXWKRUL]DWLRQ�SURILOHV�LQ�WKHXVHU�PDVWHU�ZLOO�EH�XSGDWHG�HDFK�PRUQLQJ��7KH�EHVW�SURFHGXUH�LV�WR�VFKHGXOH�WKLV�UHSRUW�LQ�DSHULRGLF�EDFNJURXQG�MRE�
8
Chapter 9: Assigning Activity Groups
Updating Profiles in the User Master Records
Authorizations Made Easy9–20
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��
�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��VHOHFW�WKHGHVLUHG�DFWLYLW\�JURXS�
�� 6HOHFW�6FKHGXOH�RU�FKHFN�MRE�IRU�IXOOUHFRQFLOLDWLRQ�
�� &KRRVH� �
�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�RUOHDYH�WKH�GHIDXOW�
�� 8QGHU�6WDUW�GDWH��VHOHFW�WKH�GDWH�DQGWLPH�\RX�ZDQW�WKH�UHSRUW�WR�VWDUWDXWRPDWLFDOO\�
�� &KRRVH� �([HFXWH�
4
3
2
5
6
7
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan
Release 4.6A/B9–21
�� &KRRVH .
�� (QWHU�D�MRE�QDPH�RU�OHDYH�WKHGHIDXOW�
��� (QWHU�D�MRE�FODVV��SULRULW\��
��� &KRRVH� �
7KH�MRE�ZL]DUG�KHOSV�\RX�WR�GHILQH�D�MREXVLQJ�VWHS�E\�VWHS�GLDORJ�VFUHHQV�WRJXLGH�\RX�WKURXJK�WKH�SURFHVV��2Q�WKHODVW�VFUHHQ��\RX�VHH�D�VXPPDU\�RI�ZKDW\RX�KDYH�GHILQHG�EHIRUH�\RX�VDYH�
&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ
<RX�KDYH�WZR�RSWLRQV�WR�FUHDWH�DQ�RUJDQL]DWLRQDO�SODQ�< 7KH�FODVVLF�5���WUDQVDFWLRQ��PPOC_OLD�< 7KH�(QMR\�WUDQVDFWLRQ��PPOCE�
%RWK�FDQ�EH�IRXQG�LQ�WKH�2UJDQL]DWLRQDO�PDQDJHPHQW�XQGHU�+XPDQ�5HVRXUFHV�LQ�WKH�6$3VWDQGDUG�PHQX�
,Q�WKH�IROORZLQJ�VHFWLRQ��ZH�GHVFULEH�WKH�VWHSV�WR�FUHDWH�D�VDPSOH�RUJDQL]DWLRQDO�SODQ�IRUWHVWLQJ��7KLV�SODQ�LV�QRW�FRPSOHWH��EXW�VKRZV�WKH�UHTXLUHG�HOHPHQWV�
8
910
11
Tip
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan
Authorizations Made Easy9–22
8VLQJ�WKH�&ODVVLF�5���7UDQVDFWLRQ
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOC_OLD�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�0RGH�→�6LPSOH�0DLQWHQDQFH�→�332&B2/'�&UHDWH��
A�URRW�RUJDQL]DWLRQDO�XQLW��WKHKLJKHVW�OHYHO�LQ�DQ�RUJDQL]DWLRQDOVWUXFWXUH��QHHGV�WR�EH�FUHDWHG��7KHQEXLOG�XS�WKH�RUJDQL]DWLRQDO�VWUXFWXUHIURP�WKH�URRW�RUJDQL]DWLRQDO�XQLW�
�� (QWHU�WKH�VKRUW�DQG�ORQJ�QDPH�IRUWKH�URRW�RUJDQL]DWLRQDO�XQLW�
�� &KRRVH� �
�� ,Q�WKH�5HTXHVW�ILHOG��XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�FKDQJH�UHTXHVW��,IQRQH�H[LVWV�\HW��XVH� �WR�FUHDWH�RQH�
�� &KRRVH� �
�,Q�WKH�IROORZLQJ�VWHSV��ZH�ZLOO�QRWVKRZ�WKLV�GLDORJ�ER[�DQ\PRUH��,I�LWGRHV�DSSHDU��SURFHHG�LQ�WKH�VDPHZD\�DV�KHUH��
�� &KRRVH� �WR�FUHDWH�WKHRUJDQL]DWLRQDO�XQLWV�WKDW�IROORZ�\RXUURRW�XQLW�
2
3
4
5
6
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan
Release 4.6A/B9–23
�� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWVXQGHU�\RXU�URRW�XQLW�
�� &KRRVH� �
�� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW�DQGFKRRVH� �WR�HQWHU�WKH�QH[W�OHYHO�
��� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWXQGHU�WKH�VHOHFWHG�OHYHO��IRUH[DPSOH��6XEVLGLDU\�$�*HUPDQ\��
��� &KRRVH� �
��� &KRRVH�6WDII�DVVLJQPHQW�
7
8
9
10
11
12
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan
Authorizations Made Easy9–24
7KH�6WDII�$VVLJQPHQWV���&KDQJHZLQGRZ�DOORZV�\RX�WR�LGHQWLI\�WKHIXQGDPHQWDO�VWDIILQJ�GHWDLOVUHTXLUHG�IRU�DQ�RUJDQL]DWLRQDO�SODQ�7KLV�VWHS�LV�DFKLHYHG�E\�FUHDWLQJMREV��DQG�SRVLWLRQV��DQG�E\�DVVLJQLQJKROGHUV�WR�SRVLWLRQV�
��� &KRRVH�(GLW�→�&UHDWH�→�-REV�
-REV�DUH�RQH�RI�WKH�REMHFWV�WKDW�PDNH�XS�DQ�RUJDQL]DWLRQDO�SODQ��$�MRE�LV�D�JHQHUDOFODVVLILFDWLRQ��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW��FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF�<RX�PD\�FUHDWH�DV�PDQ\�MREV�DV�\RX�ZDQW��2QFH�D�MRE�LV�FUHDWHG��GHVFULEH�LWV�DWWULEXWHV�E\GHILQLQJ�LQIRW\SHV��$Q�HPSOR\HH�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV�DQG�SURSHUWLHV�RI�WKH�MRE��SRVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��
��� (QWHU�WKH�MRE�LQIRUPDWLRQ�
��� &KRRVH� �
��� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW��WKHQFKRRVH� �3RVLWLRQV�
13
14
15
16
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan
Release 4.6A/B9–25
��� &KRRVH�SRVVLEOH�HQWULHV�IRU�$EEU�
3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQWV�ZLWKLQ�D�FRPSDQ\��IRU�H[DPSOH�
< 6DOHV�PDQDJHU< 0DUNHWLQJ�DVVLVWDQW< -XQLRU�PDQXIDFWXULQJ�HQJLQHHU%\�FUHDWLQJ�SRVLWLRQV�DQG�UHODWLRQVKLSV�DPRQJ�WKH�GLIIHUHQW�SRVLWLRQV��\RX�FDQ�LGHQWLI\WKH�UHSRUWLQJ�VWUXFWXUH�DW�\RXU�ILUP��3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV�
��� 6HOHFW�WKH�$EEUHYLDWLRQ�DQG�1DPH�WDE�
��� &KRRVH� �
��� 6HOHFW�WKH�DSSURSULDWH�MRE�
��� &KRRVH� �
��� 8QGHU�3RVLWLRQ� HQWHU�D�GHVFULSWLRQ�RIWKH�SRVLWLRQ�LQ�WKH�DSSURSULDWHILHOGV�
��� &KRRVH� �
17
18
19
21
20
22
23
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan
Authorizations Made Easy9–26
5HSHDW�VWHSV���²���WR�FUHDWHDGGLWLRQDO�SRVLWLRQV�
��� 6HOHFW�D�SRVLWLRQ�DQG�FKRRVH�$VVLJQKROGHU�
$VVLJQ�KROGHUV�ZKHQ�\RX�ZDQW�WRLGHQWLI\�ZKR�RFFXSLHV��RU�ILOOV��DVSHFLILF�SRVLWLRQ�
,Q�6LPSOH�0DLQWHQDQFH��DVVLJQ�HLWKHUDQ�HPSOR\HH�RU�5���XVHU�WR�DSRVLWLRQ��:RUNIORZ�XVHUV�DVVLJQ�5��XVHUV�WR�SRVLWLRQV��3HUVRQQHODGPLQLVWUDWLRQ�XVHUV�DVVLJQHPSOR\HHV�WR�SRVLWLRQV�
��� &KRRVH�SRVVLEOH�HQWULHV�WR�GLVSOD\�WKHOLVW�RI�5���XVHUV�DOUHDG\�LQ�\RXUV\VWHP�
��� 6HOHFW�WKH�FRUUHFW�XVHU�RI�WKH�SRVLWLRQIURP�WKH�OLVW�
��� &KRRVH� �
��� (QWHU�WKH�YDOLGLW\�SHULRG�RI�WKHDVVLJQPHQW�
��� &KRRVH� �
24
25
27
26
28
29
Chapter 9: Assigning Activity Groups
Creating a Sample Organizational Plan
Release 4.6A/B9–27
5HSHDW�VWHSV���²���WR�DVVLJQ�DGGLWLRQDOKROGHUV�WR�SRVLWLRQV�
7KH�RUJDQL]DWLRQDO�SODQ�LV�QRZ�FUHDWHG�7R�JHW�D�JUDSKLFDO�RYHUYLHZ��FRQWLQXHZLWK�WKH�IROORZLQJ�VWHSV�
��� 6HOHFW�WKH�URRW�RUJDQL]DWLRQDO�XQLW�
��� &KRRVH� �WR�GLVSOD\�WKH�6WUXFWXUDO*UDSKLFV�
8VLQJ�WKH�(QMR\�7UDQVDFWLRQ
7KH�SURFHGXUH�WR�FUHDWH�WKH�RUJDQL]DWLRQDO�SODQ�XVLQJ�WKH�(QMR\�WUDQVDFWLRQ�LV�EDVLFDOO\�WKH�VDPH�DV�WKHFRPPRQ�5���VW\OH��7KH�RQO\�GLIIHUHUHQFH�LV�WKDW�DOO�WKH�SURFHGXUHV�DUH�GLVSOD\HG�DQG�SHUIRUPHG�RQ�RQHVFUHHQ�
$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�(QMR\�IXQFWLRQDOLW\�ZDV�VWLOO�XQGHU�GHYHORSPHQW��7KHUHIRUH��ZH�RQO\SURYLGH�WKH�VFUHHQ�EHORZ�ZKLFK�\RX�FDQ�UHDFK�WKH�IROORZLQJ�ZD\�
,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOCE�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�2UJDQL]DWLRQDO�SODQ�→�2UJDQL]DWLRQ�DQG�6WDIILQJ�→�&UHDWH�.
+HUH�\RX�HQWHU�WKH�QHZ�2UJDQL]DWLRQDOXQLW�DQG�DOO�WKH�RWKHU�GDWD��DV�ZHGHVFULEH�XVLQJ�WKH�FRPPRQ�5���VW\OH�
31
30
Chapter 9: Assigning Activity Groups
Structural Authorizations
Authorizations Made Easy9–28
6WUXFWXUDO�$XWKRUL]DWLRQV
6WUXFWXUDO�DXWKRUL]DWLRQV�DUH�QRW�FRYHUHG�LQ�WKLV�JXLGH��+RZHYHU��LI�\RX�QHHG�LQIRUPDWLRQRQ�VWUXFWXUDO�DXWKRUL]DWLRQV��UHIHU�WR�WKH�$XWKRUL]DWLRQV�0DGH�(DV\�JXLGHERRN��5HOHDVH����$�%��FKDSWHU����6WUXFWXUDO�$XWKRUL]DWLRQV��7KLV�FKDSWHU�FDQ�DOVR�EH�GRZQORDGHG�IURP�WKH6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�DW�KWWS���ZZZ�VDSODEV�FRP�DXWK�
10–1
&KDSWHU���� 6HWWLQJ�8S�WKH�$/(
(QYLURQPHQW�IRU�&HQWUDO�8VHU
$GPLQLVWUDWLRQ
&RQWHQWV
Overview ................................................................................................................10–2
Setting Up an ALE User........................................................................................10–3
Naming Logical Systems .....................................................................................10–5
Assigning Logical Systems to Clients................................................................10–8
Defining Target System for RFC Calls ..............................................................10–10
Distribution Model ..............................................................................................10–13
Generating Partner Profiles in the Central System .........................................10–16
Distributing Model View .....................................................................................10–17
Generating Partner Profiles in the Client System............................................10–18
����
Chapter 10: Setting Up the ALE Environment for Central User Administration
Overview
Authorizations Made Easy10–2
2YHUYLHZ
&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QHZ�WR�5HOHDVH������,Q�HDUOLHU�UHOHDVHV�XVHU�PDVWHU�UHFRUGVZHUH�FUHDWHG�LQ�HDFK�FOLHQW�DQG�HDFK�V\VWHP�WKH�XVHU�ORJJHG�RQ�WR��IRU�H[DPSOH��'(9��4$6�35'��HWF����(DFK�XVHU�PDVWHU�UHFRUG�IRU�WKH�VDPH�XVHU�ZDV�LQGHSHQGHQW�RI�RWKHU�XVHU�PDVWHUUHFRUGV��,I�D�XVHU�ZDV�FKDQJHG�LQ�RQH�FOLHQW��WKHQ�WKH�VDPH�XVHU�KDG�WR�EH�FKDQJHG�LQ�DOORWKHU�FOLHQWV�DQG�V\VWHPV�PDQXDOO\��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�UHGXFHV�WKH�PDLQWHQDQFHDQG�V\QFKURQL]DWLRQ�LVVXHV�IDFHG�E\�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�
7KH�FRUH�FRQFHSW�EHKLQG�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�WR�GHVLJQDWH�RQH�FOLHQW�LQ�RQHV\VWHP�DV�WKH�UHSRVLWRU\�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV��7KLV�FOLHQW�V\VWHP�LV�GHVLJQDWHG�DVWKH�VHQGHU��$OO�RWKHU�FOLHQWV�LQ�RWKHU�V\VWHPV�DUH�GHVLJQDWHG�DV�UHFHLYHUV��$SSOLFDWLRQ�/LQN(QDEOLQJ��$/(��LV�5��·V�WHFKQRORJ\�WR�HQDEOH�GDWD�H[FKDQJH�EHWZHHQ�GLIIHUHQW�V\VWHPV�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�XVHU�GDWD�EHWZHHQ�FHQWUDO�DQG�FOLHQW�V\VWHPV�
7KLV�FKDSWHU�GLVFXVVHV�KRZ�WR�VHW�XS�$/(�IRU�XVH�ZLWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��7KHQH[W�FKDSWHU�GLVFXVVHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�
6HWWLQJ�XS�$/(�PXVW�EH�GRQH�WRJHWKHU�ZLWK�D�V\VWHP�DGPLQLVWUDWRU�RU�WKH�SHUVRQ�ZKR�ILUVWVHW�XS�WKH�FOLHQWV��,Q�VHWWLQJ�XS�$/(��WKH�HQWLUH�FOLHQW·V�GHILQLWLRQ�ZLOO�EH�FKDQJHG�DQG�WKLVPXVW�QRW�EH�GRQH�ZLWKRXW�WKH�FRQVHQW�RI�WKH�V\VWHP�DGPLQLVWUDWRU�
'XULQJ�WKH�LQVWDOODWLRQ�RI�DQ�$/(�HQYLURQPHQW��\RX�PXVW�IROORZ�HYHU\�VWHS�IRU�DOO�FOLHQW�V\VWHPV�WR�EH�LQWHJUDWHG�LQWR�RQH�XVHU�DFFRXQW��7KLV�XVHU�DFFRXQW�QHHGV�WR�KDYH�V\VWHPDGPLQLVWUDWRU�ULJKWV��(DFK�FOLHQW�V\VWHP�FRPELQDWLRQ�LV�UHFRJQL]HG�E\�$/(�DV�D�ORJLFDOV\VWHP�
6HWWLQJ�XS�DQ�$/(�HQYLURQPHQW�DOORZV�\RX�WR�GLVWULEXWH�GDWD�EHWZHHQ�ORJLFDO�V\VWHPV�DQGNHHS�WKLV�GDWD�FRQVLVWHQW��7KH�V\VWHPV�RI�DQ�$/(�HQYLURQPHQW�DUH�RQO\�ORRVHO\�OLQNHG��7KHGDWD�LV�EHLQJ�H[FKDQJHG�DV\QFKURQRXVO\��ZKLFK�LQVXUHV�WKDW�WKH�GDWD�ZLOO�EH�UHFHLYHG�E\�WKHUHFLSLHQW�V\VWHP�HYHQ�LI�WKH�UHFHLYLQJ�V\VWHP�LV�WXUQHG�RII�DW�WKH�WLPH�RI�VHQGLQJ�6\QFKURQRXV�FRQQHFWLRQV�DUH�RQO\�EHLQJ�XVHG�WR�UHDG�GDWD�E\�$/(�
Chapter 10: Setting Up the ALE Environment for Central User Administration
Setting Up an ALE User
Release 4.6A/B10–3
7KH�JUDSKLF�RQ�WKH�ULJKWVKRZV�DQ�$/(�HQYLURQPHQWIRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ�
2QH�V\VWHP�QHHGV�WR�EHGHILQHG�DV�WKH�FHQWUDOV\VWHP��7KH�OLQNV�UXQ�IURPWKH�FHQWUDO�V\VWHP�WR�WKHFOLHQW�V\VWHPV�ZKHUH�WKHFHQWUDO�V\VWHP�VHUYHV�DV�WKHKXE�
7KH�FOLHQW�V\VWHPV�DUH�QRWGLUHFWO\�OLQNHG�WR�HDFKRWKHU�
6HWWLQJ�8S�DQ�$/(�8VHU
)RU�LQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQ�DOO�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�\RX�QHHG�D�XVHU�DFFRXQW��8VHG�IRULQWHUQDO�FRPPXQLFDWLRQ��WKLV�XVHU�DFFRXQW�LV�QRW�XVHG�LQ�GLDORJ�PRGH��7KH�XVHU�QHHGV�WR�KDYH�WKH�VDPHXVHU�QDPH�DQG�SDVVZRUG�IRU�DOO�WKH�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQGFKRRVH�(QWHU�
�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHLQWHUQDO�XVHU�
�� 7R�FUHDWH�WKH�XVHU��FKRRVH� �2
3
Chapter 10: Setting Up the ALE Environment for Central User Administration
Setting Up an ALE User
Authorizations Made Easy10–4
�� 2Q�WKH�$GGUHVV�WDE��VSHFLI\�DW�OHDVWWKH�ODVW�QDPH�RI�WKH�XVHU�
�� &KRRVH�WKH�/RJRQ�GDWD�WDE�
�� 8QGHU�3DVVZRUG��HQWHU�DQ�LQLWLDOSDVVZRUG�
�� 5HSHDW�WKH�LQLWLDO�SDVVZRUG�
�� 8QGHU�8VHU�W\SH��VHOHFW�&3,&�
:H�UHFRPPHQG�\RX�XVH�WKH�XVHU�W\SH&3,&��VLQFH�VXFK�D�V\VWHP�XVHU�FDQQRWORJ�RQ�WR�5���XVLQJ�D�GLDORJ�ZLQGRZ�7KLV�XVHU�FDQ�RQO\�EH�XVHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQV\VWHPV��+RZHYHU��LW�LV�SRVVLEOH�WR�XVHD�GLDORJ�XVHU�IRU�WKLV�FRPPXQLFDWLRQ�
�� &KRRVH�3URILOHV�WDE�
4
5
67
8
9
Chapter 10: Setting Up the ALE Environment for Central User Administration
Naming Logical Systems
Release 4.6A/B10–5
��� ,Q�WKH�3URIO��FROXPQ��HQWHU�WKH�SURILOHSAP_ALL�
��� 7R�VDYH�WKH�XVHU��FKRRVH� �
��� 5HSHDW�VWHSV��²���IRU�DOO�FOLHQWV�\RXZDQW�WR�VHW�XS�IRU�WKH�$/(HQYLURQPHQW�
1DPLQJ�/RJLFDO�6\VWHPV
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SALE�DQG�FKRRVH�(QWHU�
�� ([SDQG�WKH�QRGHV�IRU�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV�
�� &KRRVH� �QH[W�WR�WKH�,0*�DFWLYLW\1DPH�/RJLFDO�6\VWHP�
�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �
4
10
11
2
3
Chapter 10: Setting Up the ALE Environment for Central User Administration
Naming Logical Systems
Authorizations Made Easy10–6
7KH�GDWD�IRU�WKH�ORJLFDO�V\VWHPV�LV�VWRUHG�LQ�D�FOLHQW�LQGHSHQGHQW�WDEOH��7KHUHIRUH�LW�LVYDOLG�IRU�DOO�FOLHQWV�LQ�DQ�5���6\VWHP��,I�\RXU�$/(�HQYLURQPHQW�FRQVLVWV�RQO\�RI�ORJLFDOV\VWHPV�LQ�RQH�5���6\VWHP��\RX�QHHG�WR�GHILQH�WKH�ORJLFDO�V\VWHPV�RQO\�RQFH��,I�\RX�DUHXVLQJ�PXOWLSOH�5���6\VWHPV��DOO�ORJLFDO�V\VWHPV�QHHG�WR�EH�VHW�XS�LQ�HYHU\�LQVWDQFH�
$�WDEOH�DSSHDUV�ZLWK�DOO�GHILQHGORJLFDO�V\VWHPV�IRU�WKH�GDWDGLVWULEXWLRQ�RI�\RXU�FHQWUDO�5��V\VWHP�
�� 7R�DGG�QHZ�ORJLFDO�V\VWHPV�LQWR�WKHOLVW��FKRRVH�1HZ�HQWULHV�
�� ,Q�WKH�FROXPQ�/RJ�6\VWHP��HQWHU�DVKRUW�QDPH�LQ�FDSLWDO�OHWWHUV�WKDW\RX�ZRXOG�OLNH�WKH�V\VWHP�WR�EHLGHQWLILHG�DV�LQ�WKH�$/(HQYLURQPHQW��(QWHU�D�FOHDUGHVFULSWLRQ�LQ�WKH�1DPH�FROXPQ�IRUWKH�ORJLFDO�V\VWHP�
�� $IWHU�HQWHULQJ�DOO�WKH�ORJLFDOV\VWHPV��FKRRVH� �WR�VDYH�\RXUGDWD�
5HPHPEHU�WR�HQWHU��LI�DYDLODEOH��DOOORJLFDO�V\VWHPV�WKDW�DUH�QRW�SDUW�RI�WKHDFWXDO�5���6\VWHPV��$OO�ORJLFDO�V\VWHPVQHHG�WR�EH�GHILQHG�LQ�HYHU\�5���6\VWHPRI�WKH�$/(�HQYLURQPHQW�
5
7
6
Chapter 10: Setting Up the ALE Environment for Central User Administration
Naming Logical Systems
Release 4.6A/B10–7
:H�UHFRPPHQG�\RX�QDPH�WKH�V\VWHP�XVLQJ�D�FRPELQDWLRQ�RI�WKH�V\VWHP�QDPH�DQG�FOLHQWQXPEHU��IRU�H[DPSOH��IRU�V\VWHP�%,=�ZLWK�WKH�FOLHQW�����WKH�QDPH�%,=&/17�����
(QWHU�\RXU�WUDQVSRUW�UHTXHVW�IRU�WKHDERYH�HQWHUHG�GDWD�
�� ,I�\RX�DOUHDG\�KDYH�D�WUDQVSRUWUHTXHVW�LQ�WKLV�V\VWHP��FKRRVH�2ZQUHTXHVW�DQG�VHOHFW�LW�IURP�WKH�OLVW�DQG&RQWLQXH�ZLWK�VWHS����
�� ,I�\RX�GR�QRW�KDYH�D�WUDQVSRUWUHTXHVW�\HW�RU�ZRXOG�OLNH�WR�FUHDWH�DQHZ�RQH��FKRRVH� �
D� ,Q�6KRUW�GHVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�IRU�WKH�WUDQVSRUWUHTXHVW�
E� &KRRVH� �
7KH�V\VWHP�VXJJHVWV�D�FRXQWLQJQXPEHU�IRU�WKH�UHTXHVW�
��� &KRRVH� �WR�HQWHU�WKH�WUDQVSRUWUHTXHVW�
,I�\RXU�ORJLFDO�V\VWHP�LV�H[FOXVLYHO\�LQ�RQH�5���6\VWHP��WKH�QDPLQJ�SURFHVV�LV�QRZFRPSOHWH�
,I�\RXU�ORJLFDO�V\VWHPV�DUH�LQ�GLIIHUHQW�5���6\VWHPV��\RX�KDYH�WR�UHSHDW�VWHSV��²���IRUHDFK�5���6\VWHP��$OO�ORJLFDO�V\VWHPV�QHHG�WR�EH�GHILQHG�LQ�DOO�5���6\VWHPV�RI�WKH�$/(HQYLURQPHQW�
89
9a
9b
10
Chapter 10: Setting Up the ALE Environment for Central User Administration
Assigning Logical Systems to Clients
Authorizations Made Easy10–8
$OWKRXJK�\RX�QDPHG�WKH�ORJLFDO�V\VWHPV��\RX�KDYH�QRW�\HW�OLQNHG�WKH�ORJLFDO�V\VWHPV�WRWKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�
$VVLJQLQJ�/RJLFDO�6\VWHPV�WR�&OLHQWV
$IWHU�QDPLQJ�WKH�ORJLFDO�V\VWHPV��WKH�QH[W�VWHS�LV�WR�DVVLJQ�ORJLFDO�V\VWHPV�WR�FOLHQWV��,Q�WKLV�VHFWLRQ��ZH�OLQNWKH�QHZO\�QDPHG�ORJLFDO�V\VWHPV�WR�WKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�
�� )URP�WKH�ODVW�VFUHHQ�RI�WKH�SUHYLRXV�VHFWLRQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�
�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�$VVLJQ�/RJLFDO�6\VWHP�WR&OLHQW�
�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �WRFRQWLQXH�
2
3
Chapter 10: Setting Up the ALE Environment for Central User Administration
Release 4.6A/B10–9
$�OLVW�RI�DYDLODEOH�FOLHQWV�LQ�WKLV�5��6\VWHP�DSSHDUV�
�� 6HOHFW�WKH�FOLHQW�WR�ZKLFK�\RX�ZDQWWR�DVVLJQ�D�ORJLFDO�V\VWHP�QDPH�DQGLQWHJUDWH�LQWR�WKH�$/(�HQYLURQPHQW�
�� &KRRVH� �
�� (QWHU�D�GHVFULSWLRQ�IRU�WKH�FOLHQW��LIQHFHVVDU\�
�� 7R�DVVLJQ�D�ORJLFDO�V\VWHP�WR�WKDWFOLHQW��HQWHU�WKH�ORJLFDO�V\VWHP�LQXSSHUFDVH�
�� &KRRVH� �
�� 2Q�WKH�QH[W�ZLQGRZ��FKRRVH� �WRSURFHHG��<RX�ZLOO�UHFHLYH�D�PHVVDJHWKDW�\RXU�GDWD�KDV�EHHQ�VDYHG�
��� 7R�DVVLJQ�DQRWKHU�ORJLFDO�V\VWHP�WR�DFOLHQW��FKRRVH� �DQG�UHSHDW�VWHSV��²��
7R�DVVLJQ�D�FOLHQW�RI�D�GLIIHUHQW�5���6\VWHP�WR�D�ORJLFDO�V\VWHP��ORJ�RQ�WR�WKDW�5��6\VWHP��VWDUW�WUDQVDFWLRQ�SALE��DQG�UHSHDW�VWHSV��²��
4
5
6
7
8
Chapter 10: Setting Up the ALE Environment for Central User Administration
Defining Target System for RFC Calls
Authorizations Made Easy10–10
'HILQLQJ�7DUJHW�6\VWHP�IRU�5)&�&DOOV
$IWHU�DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV��\RX�PXVW�GHILQH�WKH�WDUJHW�V\VWHP�IRU�5)&�FDOOV�
�� )URP�WKH�&KDQJH�9LHZ�§&OLHQWV¨��'HWDLOV�VFUHHQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�
�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�6\VWHPV�LQ1HWZRUN��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�'HILQH�7DUJHW�6\VWHPV�IRU�5)&FDOOV�
�� &KRRVH�&UHDWH�
$Q�5)&�GHVWLQDWLRQ�LV�DOZD\V�FUHDWHGIURP�WKH�FOLHQW�ZKHUH�\RX�DUH�FXUUHQWO\ORJJHG�RQ��7R�GHILQH�DQ�5)&FRQQHFWLRQ�IURP�FOLHQW�����WR�FOLHQW�����\RX�PXVW�EH�ORJJHG�RQ�WR�FOLHQW�����5)&�FRQQHFWLRQV�IRU�WKH�&HQWUDO�8VHU$GPLQLVWUDWLRQ�DOZD\V�QHHG�D�EDFN�DQG�IRUWK�FRQQHFWLRQ��7R�GHILQH�WKH5)&�FRQQHFWLRQ�FRPSOHWHO\��\RX�DOVRQHHG�WR�EH�ORJJHG�RQ�WR�FOLHQW�����DQGVHW�XS�FOLHQW�����DV�WKH�5)&�FRQQHFWLRQ�
3
2
Chapter 10: Setting Up the ALE Environment for Central User Administration
Defining Target System for RFC Calls
Release 4.6A/B10–11
�� ,Q�5)&�GHVWLQDWLRQ��HQWHU�WKH�QDPH�RIWKH�ORJLFDO�V\WHP�WR�ZKLFK�\RX�ZDQWWR�GHILQH�D�5)&�FRQQHFWLRQ�IURP\RXU�FXUUHQW�V\VWHP��5HPHPEHU�WRXVH�XSSHUFDVH�
�� ,Q�&RQQHFWLRQ�W\SH��HQWHU�3��GHIDXOWYDOXH���LI�LW�LV�D�FRQQHFWLRQ�WR�DQRWKHU5���6\VWHP�
�� 8QGHU�'HVFULSWLRQ��HQWHU�D�GHWDLOHGGHVFULSWLRQ�IRU�WKH�5)&�GHVWLQDWLRQ�
�� ,Q�&OLHQW��HQWHU�WKH�QXPEHU�RI�WKHWDUJHW�FOLHQW�
�� ,Q�WKH�8VHU�DQG�3DVVZRUG�ILHOG��HQWHUWKH�XVHU�DQG�WKH�FRUUHVSRQGLQJSDVVZRUG�\RX�VSHFLILHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�RI�WKHV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�
�� 7R�VDYH�\RXU�GDWD��FKRRVH� �
4
5
6
7
8
9
Chapter 10: Setting Up the ALE Environment for Central User Administration
Defining Target System for RFC Calls
Authorizations Made Easy10–12
7KH�PHVVDJH�'HVWLQDWLRQ��;;;;VDYHG�DSSHDUV�
1HZ�RSWLRQV�DSSHDU�RQ�VFUHHQ��<RXFDQ�QRZ�FKRRVH�WR�XVH�D�ORDGGLVWULEXWLRQ��UHFRPPHQGHG���,I�\RXGR�QRW�ZDQW�WR�XVH�WKH�ORDGGLVWULEXWLRQ��VNLS�DKHDG�WR�VWHS����
��� 6HOHFW�<HV�IRU�/RDG�GLVWULE�
��� ,Q�7DUJHW�KRVW��HQWHU�WKH�QXPEHU�RIWKH�PHVVDJH�VHUYHU��6HH�WKH�7LSV�7ULFNV�EHORZ�
��� ,Q�6\VWHP�QXPEHU��HQWHU�WKH�V\VWHPQXPEHU�RI�WKH�PHVVDJH�VHUYHU��6HHWKH�7LSV��7ULFNV�EHORZ�
7R�ILQG�WKH�QDPH�RI�WKH�PHVVDJH�VHUYHURI�WKH�WDUJHW�KRVW��JR�WR�WKH�WDUJHWV\VWHP�DQG�VWDUW�WUDQVDFWLRQ�RZ03�8VXDOO\�\RX�ZLOO�VHH�D�OLVW�ZLWK�VHYHUDOVHUYHU�QDPHV��7KH�FRUUHFW�PHVVDJHVHUYHU�LV�WKH�RQH�WKDW�KDV�DQ�0�OLVWHG�LQWKH�6HUYLFHV�FROXPQ��7KH�QDPH�RI�WKHPHVVDJH�VHUYHU�DSSHDUV�DV�WKH�ILUVW�SDUWRI�WKH�6HUYHU�QDPH��LQ�IURQW�RI�WKHXQGHUVFRUH��7KH�ODVW�WZR�GLJLWV�RI�WKH6HUYHU�QDPH�UHSUHVHQW�WKH�V\VWHPQXPEHU�
��� 7R�VDYH�\RXU�GDWD��FKRRVH� �
$�VWDWXV�PHVVDJH�DSSHDUV�VD\LQJ�'HVWLQDWLRQ�;;;;�VDYHG�
��� &KRRVH�7HVW�FRQQHFWLRQ�WR�WHVW�LI�WKHFRQQHFWLRQ�ZRUNV�FRUUHFWO\�
1011 12
13
14
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distribution Model
Release 4.6A/B10–13
$�FRUUHFW�FRQQHFWLRQ�WHVW�ORRNV�OLNHWKH�VFUHHQ�WR�WKH�ULJKW�
$�WHVW�ZLWK�5HPRWH�ORJLQ�ZRXOG�QRWZRUN�LI�\RX�XVHG�WKH�6\VWHP�XVHU��&3,&�IRU�WKH�FRQQHFWLRQ��,I�\RX�XVHG�D�'LDORJXVHU��\RX�FDQ�XVH�5HPRWH�/RJLQ�IRU�DQDGGLWLRQDO�WHVW�FRQQHFWLRQ�
7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�WKH�VDPH�5���6\VWHP��FKRRVH� �WZLFH�DQG�UHSHDW�VWHSV��²���
7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�D�GLIIHUHQW�5���6\VWHP��ORJ�RQ�WR�WKDW�V\VWHP��VWDUW�WUDQVDFWLRQSALE,�DQG�UHSHDW�VWHSV��²���
'LVWULEXWLRQ�0RGHO
7KH�GLVWULEXWLRQ�PRGHO�GHVFULEHV�WKH�$/(�PHVVDJH�IORZ�EHWZHHQ�ORJLFDO�V\VWHPV�
�� /RJ�RQ�WR�WKH�FHQWUDO�V\VWHP�RI�WKH�$/(�HQYLURQPHQW�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU�
�� &KRRVH� �WR�VZLWFK�EHWZHHQGLVSOD\�DQG�HGLW�PRGH�
3
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distribution Model
Authorizations Made Easy10–14
�� &KRRVH� �&UHDWH�PRGHO�YLHZ�
�� ,Q�6KRUW�WH[W��HQWHU�D�VKRUWGHVFULSWLRQ�
�� ,Q�7HFKQLFDO�QDPH��HQWHU�D�WHFKQLFDOQDPH�IRU�WKH�PRGHO�YLHZ�
�� &KRRVH� �
�� &KRRVH �LQ�IURQW�RI�0RGHO�YLHZV�WRUHFHLYH�D�OLVW�RI�DOO�PRGHO�YLHZV�LQFOXGLQJ�WKH�RQH�\RX�MXVW�FUHDWHG�
�� 6HOHFW�WKH�MXVW�FUHDWHG�PRGHO�YLHZ�7KH�HQWU\�ZLOO�EH�KLJKOLJKWHG�
��� &KRRVH� �$GG�%$3,�
7R�GLVWULEXWH�WKH�GDWD��\RX�KDYH�WR�GHILQH�WZR�PHWKRGV�IRU�WKH�QHZO\�FUHDWHG�GLVWULEXWLRQPRGHO��:LWKLQ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�RQH�RI�WKH�PHWKRGV�LV�IRU�WKH�GLVWULEXWLRQ�RIWKH�XVHU��DQG�RQH�IRU�WKH�FRPSDQ\��7KHVH�PHWKRGV�DUH�UHDOL]HG�WKURXJK�%$3,V��%XVLQHVV$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��
4
56
7
8
9
10
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distribution Model
Release 4.6A/B10–15
��� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHGGLVWULEXWLRQ�PRGHO�
��� ,Q�6HQGHU�FOLHQW��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�
��� ,Q�5HFHLYHU�VHUYHU��HQWHU�WKH�WKHORJLFDO�V\VWHP�QDPH�RI�WKH�FOLHQWV\VWHP�
��� ,Q�2EM�QDPH�LQWHUIDFH��HQWHU�WKH�REMHFWUSER��QRWH�WKDW�WKLV�HQWU\�LV�FDVH�VHQVLWLYH��
��� ,Q�0HWKRG��HQWHU�Clone��QRWH�WKDWWKLV�HQWU\�LV�FDVH�VHQVLWLYH��
��� &KRRVH� �
��� 5HSHDW�VWHS���²���WR�DGG�D�PHWKRGIRU�WKH�FRPSDQ\�DGGUHVV��(QWHUUserCompany�LQ�VWHS����LQVWHDG�RIUSER��QRWH�WKDW�WKH�HQWU\�LV�FDVH�VHQVLWLYH��
��� &KRRVH� �
,I�WKHUH�DUH�PRUH�WKDQ�WZR�V\VWHPV�LQ�\RXU�SODQQHG�$/(�HQYLURQPHQW��UHSHDW���²���IRUDOO�RWKHU�FOLHQW�V\VWHPV�
��� 7R�VDYH�WKH�GDWD��FKRRVH� �
,I�\RX�H[SDQG�WKH�PRGHO�YLHZFRPSOHWHO\�XVLQJ ��\RXU�PRGHOYLHZ�IRU�D�WZR�V\VWHP�$/(HQYLURQPHQW�VKRXOG�ORRN�OLNH�WKHVFUHHQ�WR�WKH�ULJKW�
11
1213
1415
16
18
17
19
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Central System
Authorizations Made Easy10–16
*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&HQWUDO�6\VWHP
3ULRU�WR�WKH�JHQHUDWLRQ�RI�WKH�SDUWQHU�SURILOHV��ZKLFK�VHWV�WKH�FRQGLWLRQV�IRU�WKH�HOHFWURQLF�GDWD�H[FKDQJH�LQWKH�$/(�HQYLURQPHQW��\RX�ILUVW�FKRRVH�WKH�SDUDPHWHUV�LQ�WKH�FXUUHQW�PRGHO�YLHZ�DV�GHVFULEHG�EHORZ�
�� 2Q�WKH�'LVWULEXWLRQ�0RGHO�&KDQJHGVFUHHQ��FKRRVH�(QYLURQPHQW�→*HQHUDWH�3DUWQHU�3URILOHV�
�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�OHWWHUV�
�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FOLHQW�V\VWHP�
,I�WKHUH�DUH�PRUH�FOLHQW�V\VWHPV�LQ�\RXU$/(�HQYLURQPHQW��VHOHFW�WKRVH�ORJLFDOV\VWHPV�XVLQJ� �
�� &KRRVH� �
7R�LPSURYH�SHUIRUPDQFH��\RX�FDQ�VHOHFW�XQGHU�3DFNHWVL]H�KRZ�PDQ\�,'RFV��GDWDFRQWDLQHU�H[FKDQJH�EHWZHHQ�5���6\VWHPV��ZLOO�EH�VHQW�IRU�HDFK�5)&�SURFHVV��7KHVXJJHVWHG�YDOXH�RI�����,'RFV�LV�D�FRPSURPLVH�WR�NHHS�WKH�QXPEHU�RI�GLDORJ�SURFHVVHVGRZQ�DQG�DW�WKH�VDPH�WLPH��TXLFNO\�SURFHVV�FKDQJHV��7R�LQFUHDVH�WKH�SHUIRUPDQFH�FKRRVH�D�VPDOOHU�QXPEHU�RI�,'RFV�WR�EH�VHQW�IRU�HYHU\�5)&�SURFHVV�
1
23
4
Tip
Chapter 10: Setting Up the ALE Environment for Central User Administration
Distributing Model View
Release 4.6A/B10–17
�� <RX�UHFHLYH�WKH�3URWRFRO�IRUJHQHUDWLQJ�SDUWQHU�SURILOH��&KHFN�LI�WKHSDUWQHU�SURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�
�� &KRRVH� �WZLFH�WR�UHWXUQ�WR�WKHVWDUW�VFUHHQ�LQ�%'���
'LVWULEXWLQJ�0RGHO�9LHZ
�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�
�� &KRRVH�(GLW�→��0RGHO�YLHZ�→'LVWULEXWH�
$�OLVW�DSSHDUV�ZLWK�DOO�H[LVWLQJ�FOLHQWV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�WRZKLFK�WKH�PRGHO�YLHZ�QHHGV�WR�EHGLVWULEXWHG�
�� 6HOHFW�WKH�GHVLUHG�V\VWHP�
�� &KRRVH� �
6
1
2
3
5
4
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Client System
Authorizations Made Easy10–18
<RX�UHFHLYH�D�ORJ�LI�WKH�PRGHO�YLHZKDV�EHHQ�FUHDWHG�LQ�WKH�FOLHQW�V\VWHP�
7R�FKHFN�LI�WKH�PRGHO�YLHZ�KDV�EHHQ�HVWDEOLVKHG�IRU�WKH�FOLHQW�V\VWHP��SHUIRUP�WKHIROORZLQJ�VWHSV�
�� /RJ�RQ�WR�WKH�GHVLUHG�FOLHQW�V\VWHP��� 6WDUW�WUDQVDFWLRQ�SCUA��� (QWHU�WKH�WHFKQLFDO�QDPH�RI�WKH�PRGHO�YLHZ�
�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\�VWUXFWXUH�
*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&OLHQW�6\VWHP
�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU.
�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�
�� &KRRVH�(QYLURQPHQW�→�*HQHUDWH3DUWQHU�3URILOHV�
4
3
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Client System
Release 4.6A/B10–19
�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�
�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�
:LWK�WKLV�HQWU\��\RX�HVWDEOLVK�WKHSDUWQHU�SURILOH�IRU�WKH�UHWXUQFRQHFWLRQ�IURP�WKH�FOLHQW�V\VWHP�WRWKH�FHQWUDO�V\VWHP�
�� &KRRVH� �
<RX�UHFHLYH�WKH�3URWRFRO�IRU�JHQHUDWLQJSDUWQHU�SURILOH��&KHFN�LI�WKH�SDUWQHUSURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�
5HSHDW�VWHSV��²��IRU�DOO�FOLHQWV\VWHPV��LI�QHFFHVVDU\�
<RX�KDYH�QRZ�VHW�XS�WKH�FRPSOHWH�$/(�HQYLURQPHQW�
56
7
Chapter 10: Setting Up the ALE Environment for Central User Administration
Generating Partner Profiles in the Client System
Authorizations Made Easy10–20
11–1
&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU
$GPLQLVWUDWLRQ
&RQWHQWV
Overview ................................................................................................................11–2
Assigning the Central User Administration Distribution Model ......................11–2
Testing Central User Administration ..................................................................11–3
Migrating Existing Users to the Central System................................................11–7
Defining Field Attributes for User Maintenance ................................................11–9
Global User Manager ..........................................................................................11–10
����
Chapter 11: Setting Up Central User Administration
Overview
Authorizations Made Easy11–2
2YHUYLHZ
:LWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�\RX�FDQ�UHGXFH�WKH�V\VWHP�DGPLQLVWUDWRU·V�HIIRUW�WR�PDLQWDLQ�XVHUV�LQ�WKH5���HQYLURQPHQW��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�DOORZV�\RX�WR�PDLQWDLQ�WKH�XVHUV�FHQWUDOO\�LQ�RQH�V\VWHP�7KH�LQIRUPDWLRQ�LV�WKHQ�DXWRPDWLFDOO\�GLVWULEXWHG�WR�WKH�GHSHQGHQW�V\VWHPV�
7R�VHW�XS�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��ZH�DVVXPH�WKDW�\RX�XVH�RQH�XVHU�DFFRXQW�WKDW�KDV�V\VWHPDGPLQLVWUDWRU�DXWKRUL]DWLRQV�IRU�WKH�FRPSOHWH�V\VWHP�HQYLURQPHQW�
7R�VHW�XS�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IRU�\RXU�5���6\VWHP�JURXS��\RX�QHHG�WR�VHWXS�WKH�$/(�HQYLURQPHQW��DV�GHVFULEHG�LQ�FKDSWHU�����6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�\RXU�FHQWUDO�V\VWHP��7KLV�FHQWUDO�V\VWHP�PXVW�QRZ�EH�VHWXS�IRU�WKH�XVHU�PDLQWHQDQFH�
$VVLJQLQJ�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�'LVWULEXWLRQ
0RGHO
�� /RJ�RQ�WR�\RXU�FHQWUDO�V\VWHP�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�
�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�GLVWULEXWLRQ�PRGHO�DVFUHDWHG�IRU�WKH�$/(�HQYLURQPHQW�
7KH�PRGHO�\RX�FKRRVH�KHUH�LV�WKH�EDVLVIRU�WKH�GLVWULEXWLRQ�RI�XVHU�GDWD�LQ�\RXU$/(�HQYLURQPHQW�
�� &KRRVH� �
6DYLQJ�WKH�PRGHO�DVVLJQPHQW�IRU�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�WKHFRPSOHWH�GLVWULEXWLRQ�PRGHO�WR�DOO�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��\RX�FDQ�QRORQJHU�FUHDWH�D�XVHU�LQ�WKH�FOLHQW�V\VWHP��)URP�WKLV�SRLQW�IRUZDUG��D�V\VWHP�LV�GHILQHG�DVWKH�FHQWUDO�V\VWHP�DQG�WKH�RWKHU�V\VWHPV�DV�FOLHQW�V\VWHPV�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�
3
4
Chapter 11: Setting Up Central User Administration
Testing Central User Administration
Release 4.6A/B11–3
&KHFN�LI�WKH�PRGHO�KDV�EHHQ�DVVLJQHG�DVWKH�FOLHQW�V\VWHP�
�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�7KH�GLVWULEXWLRQ�PRGHO�LV�HQWHUHGDXWRPDWLFDOO\�
�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\VWUXFWXUH�
$�FRPSOHWH�YLHZ�RI�WKH�PRGHOVWUXFWXUH�DSSHDUV�
,I�\RX�GR�QRW�VHH�DQ\�VWUXFWXUH��LW�FRXOGEH�EHFDXVH�WKH�GDWD�KDV�EHHQ�GLVWULEXWHGDV\QFKURQRXVO\��,I�WKLV�LV�WKH�FDVH��JREDFN�WR�WKH�VWDUW�VFUHHQ�RI�WUDQVDFWLRQSCUA��ZDLW�IRU�WZR�PLQXWHV��DQG�UHSHDWVWHS���
7HVWLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ
�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�
�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHWHVW�XVHU�
�� &KRRVH� �
7
2
3
Chapter 11: Setting Up Central User Administration
Testing Central User Administration
Authorizations Made Easy11–4
�� 2Q�WKH�$GGUHVV�WDE��HQWHU�DW�OHDVW�DODVW�QDPH�
�� &KRRVH�WKH�/RJRQ�GDWD�WDE�
�� (QWHU�DQ�,QLWLDO�SDVVZRUG�IRU�WKH�WHVWXVHU��<RX�PXVW�FKDQJH�WKH�LQLWLDOSDVVZRUG�DW�ILUVW�ORJRQ�WR�WKH�5��6\VWHP�
�� 5HHQWHU�WKH�LQLWLDO�SDVVZRUG�
�� &KRRVH�WKH�6\VWHPV�WDE�
5
4
6 7
8
Chapter 11: Setting Up Central User Administration
Testing Central User Administration
Release 4.6A/B11–5
�� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�WKHORJLFDO�QDPHV�RI�WKH�FHQWUDO�V\VWHPDQG�RI�DOO�WKH�FOLHQW�V\VWHPV�LQ�WKHV\VWHPV�WDEOH�
��� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�
��� &KRRVH�7H[W�FRPSDULVRQ�IURP�FKLOGV\V�
$�WH[W�FRPSDULVRQ�LV�QHHGHG�WR�SURYLGHWKH�FHQWUDO�V\VWHP�ZLWK�DYDLODEOHDFWLYLW\�JURXSV�IURP�WKH�FOLHQW�V\VWHP�2QO\�LI�WKLV�VWHS�KDV�EHHQ�SHUIRUPHGFDQ�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHPVEH�GLVSOD\HG�DQG�VHOHFWHG�LQ�WKH�FHQWUDOV\VWHP�XVLQJ�SRVVLEOH�HQWULHV��,W�LV�DOVRSRVVLEOH�WR�DVVLJQ�DFWLYLW\�JURXSVPDQXDOO\�IURP�WKH�FOLHQW�V\VWHPZLWKRXW�WKH�WH[W�FRPSDULVRQ�
��� 5HDG�WKH�GLDORJ�ZLQGRZ�DQG�FKRRVH�WR�FRQWLQXH�
9
10
11
Chapter 11: Setting Up Central User Administration
Testing Central User Administration
Authorizations Made Easy11–6
$VVLJQ�DQ�DFWLYLW\�JURXS�WR�WKH�WHVW�XVHULQ�HYHU\�ORJLFDO�V\VWHP�RI�WKH�V\VWHPJURXS�
��� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�DOO�WKHORJLFDO�V\VWHPV�
��� ,Q�WKH�$FWLY�FROXPQ��HQWHU�WKHDFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WRWKH�WHVW�XVHU�LQ�WKH�FRUUHVSRQGLQJV\VWHP��IRU�WHVW�SXUSRVHV��LW�LVHQRXJK�WR�DVVLJQ�RQH�DFWLYLW\�JURXSSHU�V\VWHP��
��� &KRRVH� �
6DYLQJ�VWDUWV�WKH�GLVWULEXWLRQ�SURFHVVDXWRPDWLFDOO\��7KH�XVHU�LV�FUHDWHG�ZLWKWKH�DFWLYLW\�JURXS�DVVLJQPHQW�LQ�HYHU\GHILQHG�V\VWHP�
7KH�XVHU�PDLQWHQDQFH�MXPSV�EDFN�WRWKH�VWDUW�VFUHHQ�RI�68���
<RX�UHFHLYH�WKH�PHVVDJH�8VHU���ZDVVDYHG��<RX�FDQ�QRZ�FKHFN�LI�WKH�XVHUGDWD�KDV�EHHQ�GLVWULEXWHG�FRUUHFWO\�
��� &KRRVH�(QYLURQPHQW�→�'LVWULEXWLRQORJ��WUDQVDFWLRQ�SCUL��
13 14
15
16
Chapter 11: Setting Up Central User Administration
Migrating Existing Users to the Central System
Release 4.6A/B11–7
$�VHULHV�RI�EXWWRQV�SURYLGHV�DFFHVV�WRGLIIHUHQW�ORJ�GLVSOD\V�
,I�\RX�FKRRVH�6\VWHP�UHSRUWV��\RX�UHFHLYHWKH�XVHU�VWDWXV�VRUWHG�E\�FOLHQW�V\VWHPV�,I�\RX�H[SDQG�WKH�WUHH��\RX�UHFHLYH�WKHXVHUV�RI�WKH�FOLHQW�V\VWHPV�
$Q�RYHUYLHZ�DERXW�(UURUV��:DUQLQJV�6XFFHVVIXO��DQG�1HZ�XQFRQILUPHGGLVWULEXWLRQV�LV�GLVSOD\HG��8QFRQILUPHGGLVWULEXWLRQV�FRXOG�UHVXOW�IURP�D�IDXOW\5)&�FRQQHFWLRQ�
0LJUDWLQJ�([LVWLQJ�8VHUV�WR�WKH�&HQWUDO�6\VWHP
,I�\RX�DOUHDG\�VHW�XS�XVHU�DFFRXQWV�LQ�WKH�FOLHQW�V\VWHPV��WKHVH�XVHUV�QHHG�WR�EH�PLJUDWHG�WR�WKH�FHQWUDOV\VWHP��,I�WKLV�DFWLRQ�KDV�DOUHDG\�EHHQ�SHUIRUPHG��\RX�FDQ�PDLQWDLQ�WKH�XVHU�GDWD�FHQWUDOO\�
�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SCUG�DQG�FKRRVH�(QWHU�
�� 6HOHFW�WKH�FOLHQW�V\VWHP�IURP�ZKHUH�\RX�ZRXOG�OLNH�WR�PLJUDWH�WKH�XVHU�GDWD�
�� &KRRVH�7UDQVIHU�XVHUV�
3
Chapter 11: Setting Up Central User Administration
Migrating Existing Users to the Central System
Authorizations Made Easy11–8
2Q�WKH�1HZ�XVHUV�WDE��\RX�FDQ�VHH�DOOXVHU�DFFRXQWV�DYDLODEOH�LQ�WKH�FOLHQWV\VWHP��EXW�QRW�LQ�WKH�FHQWUDO�V\VWHP�<RX�FDQ�PLJUDWH�DOO�WKHVH�XVHUV�LQWR�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ�
�� 7R�VHOHFW�DOO��FKRRVH� �
�� &KRRVH� �7UDQVIHU�XVHUV�
�� &KRRVH�WKH�,GHQWLFDO�XVHUV�WDE�
2Q�WKH�,GHQWLFDO�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�LGHQWLFDO�ILUVW�DQG�ODVWQDPHV�LQ�WKH�FOLHQW�DQG�FHQWUDO�V\VWHPDUH�GLVSOD\HG��$OO�RI�WKHVH�XVHUV�FDQ�EHPLJUDWHG�WR�&HQWUDO�8VHU$GPLQLVWUDWLRQ��7KH\�ZLOO�DOVR�JHW�WKHFOLHQW�V\VWHP�DVVLJQHG�LQ�&HQWUDO�8VHU$GPLQLVWUDWLRQ�
�� 7R�VHOHFW�DOO��FKRRVH� �
�� &KRRVH� �7UDQVIHU�XVHUV�
�� &KRRVH�WKH�'LIIHUHQW�XVHUV�WDE�
2Q�WKH�'LIIHUHQW�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�WKH�VDPH�XVHU�,'��EXWZLWK�QDPHV�WKDW�DUH�GLIIHUHQW�LQ�WKHFOLHQW�RU�FHQWUDO�V\VWHP��DUH�GLVSOD\HG�
��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FHQWUDOV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�
D� 6HOHFW�WKH�GHVLUHG�HQWU\�
E� &KRRVH� �7UDQVIHU�XVHUV�
��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FOLHQWV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�
D� (QWHU�WKH�VDPH�QDPH�LQ�WKHFHQWUDO�V\VWHP�DV�LW�LV�GLVSOD\HGLQ�WKH�FOLHQW�V\VWHP��7KH�XVHU�LVQRZ�GLVSOD\HG�XQGHU�WKH,GHQWLFDO�XVHUV�WDE�
E� 6HOHFW�WKH�GHVLUHG�HQWU\�
F� &KRRVH� �7UDQVIHU�XVHUV�
4 5
7 8
6
9
10b
10a
Chapter 11: Setting Up Central User Administration
Defining Field Attributes for User Maintenance
Release 4.6A/B11–9
,I�WKH�GLIIHUHQW�QDPHV�UHVXOW�IURP�GHDOLQJ�ZLWK�WZR�GLIIHUHQW�SHUVRQV��\RX�KDYH�WR�FKDQJH�WKH�XVHU�QDPHVXVLQJ�SU01�HLWKHU�LQ�WKH�FHQWUDO�RU�FOLHQW�V\VWHP��7KH�XVHU�QDPH�RI�WKH�FOLHQW�V\VWHP�FDQ�EH�IRXQG�RQ�WKH1HZ�XVHUV�WDE�DIWHUZDUGV�
2Q�WKH�$OUHDG\�FHQWUDO�XVHU�WDE��DOO�XVHUDFFRXQWV�DUH�GLVSOD\HG�WKDW�KDYH�EHHQPLJUDWHG�XVLQJ�RQH�RI�WKH�DERYH�VWHSV�RU�KDYH�EHHQ�FUHDWHG�LQ�WKH�FHQWUDOV\VWHP�RI�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�
'HILQLQJ�)LHOG�$WWULEXWHV�IRU�8VHU�0DLQWHQDQFH
$OWKRXJK�LW�LV�QR�ORQJHU�SRVVLEOH�WR�FUHDWH�XVHUV�LQ�WKH�FOLHQW�V\VWHP��\RX�FDQ�PDLQWDLQ�DOUHDG\�H[LVWLQJ�XVHUGDWD�LQ�WKH�FOLHQW�V\VWHP��7KHUHIRUH��LW�LV�XVHIXO�WR�GHILQH��DW�WKH�ILHOG�OHYHO��LI�DQG�KRZ�WKLV�GDWD�VKRXOG�EHPDLQWDLQHG��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�ILHOG�DWWULEXWHV�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUM�DQG�FKRRVH�(QWHU�
�� $OORFDWH�RQ�DOO�WDEV�IRU�HDFK�ILHOG�WKHDWWULEXWHV�GHVFULEHG�LQ�WKH�WDEOHEHORZ��1RW�DOO�DWWULEXWHV�FDQ�EHVHOHFWHG�IRU�HYHU\�ILHOG�
�� &KRRVH� �
3
2
Chapter 11: Setting Up Central User Administration
Global User Manager
Authorizations Made Easy11–10
$WWULEXWH 'HVFULSWLRQ
*OREDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�LVGLVWULEXWHG�IURP�WKHUH�LQWR�WKH�FOLHQW�V\VWHPV�
/RFDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FOLHQW�V\VWHP�DQG�LV�QRWGLVWULEXWHG�
3URSRVDO 'XULQJ�WKH�FUHDWLRQ�RI�D�XVHU��WKH�VXJJHVWHG�YDOXH�LV�PDLQWDLQHG�DQGWKHQ�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��WKH�GDWD�LVPDLQWDLQHG�RQO\�ORFDOO\��,I�D�QHZ�FOLHQW�V\VWHP�LV�FRQQHFWHG�WR�&HQWUDO8VHU�$GPLQLVWUDWLRQ��WKH�SURSRVHG�YDOXH�LV�GLVWULEXWHG�WR�WKLV�V\VWHP�,I�WKH�SURSRVHG�YDOXH�LV�FKDQJHG�LQ�WKH�FHQWUDO�V\VWHP��LW�LV�RQO\GLVWULEXWHG�WR�WKH�QHZ�V\VWHPV��$OUHDG\�H[LVWLQJ�V\VWHPV�DUH�QRWDIIHFWHG�
5HW9DO 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DV�ZHOO�DV�WKHFOLHQW�V\VWHP��7KH�FKDQJHV�PDGH�LQ�WKH�FOLHQW�V\VWHP�DUH�UHGLVWULEXWHGWR�WKH�FHQWUDO�V\VWHP��)URP�WKHUH��WKH�GDWD�LV�GLVWULEXWHG�WR�DOO�RWKHUFOLHQW�V\VWHPV�
(YHU\ZKHUH 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�WKH�FOLHQWV\VWHP��7KH�FKDQJHV�LQ�WKH�FOLHQW�V\VWHP�DUH�QRW�GLVWULEXWHG�DQ\ZKHUH�7KH�FKDQJHV�DIIHFW�RQO\�WKLV�FOLHQW�V\VWHP�
7KH�LQVWDOODWLRQ�RI�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QRZ�FRPSOHWH�
*OREDO�8VHU�0DQDJHU
7KH�*OREDO�8VHU�0DQDJHU�LV�DQ�RSWLRQDO�WRRO�WKDW�VLPSOLILHV�\RXU�ZRUN�ZLWK�&HQWUDO�8VHU$GPLQLVWUDWLRQ��<RX�FDQ�VWLOO�XVH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�DQG�WKH�3URILOH�*HQHUDWRU�3*��WR�DVVLJQ�XVHUV�DQG�DFWLYLW\�JURXSV�
<RX�QRZ�KDYH�WKH�RSWLRQ�WR�XVH�GLIIHUHQW�JURXSLQJ�W\SHV�RQ�WKH�XVHU�DQG�V\VWHP�OHYHO�ZLWKWKH�*OREDO�8VHU�0DQDJHU��7KH�JURXSLQJ�LV�FDUULHG�RXW�WKURXJK�XVHU�JURXSV�RQ�WKH�XVHU�OHYHODQG�WKURXJK�V\VWHP�W\SHV�IRU�WKH�V\VWHP�
7KHVH�PDLQWHQDQFH�RSWLRQV�DUH�FRPELQHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�VLQFH�WKHUH�DUHXVXDOO\�QR�FKDQJHV�WR�RWKHU�GDWD�LQ�WKH�XVHU�PDVWHU�GDWD�DIWHU�WKH�FUHDWLRQ�RI�WKH�XVHU�+RZHYHU��V\VWHP�DQG�DXWKRUL]DWLRQ�DVVLJQPHQWV�DUH�DQ�RQJRLQJ�SURFHVV�
,I�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�VHWWLQJ�XS�WKH�XVHU�GDWD��GR�QRW�GLVWULEXWH�WKH�XVHUGDWD�XVLQJ�WKH�*OREDO�8VHU�0DQDJHU��(YHU\WKLQJ�WKDW�LV�QRW�GHILQHG�LQ�WKH�*OREDO�8VHU0DQDJHU�ZLOO�EH�GHOHWHG�LQ�WKH�WDUJHW�V\VWHP�
Chapter 11: Setting Up Central User Administration
Global User Manager
Release 4.6A/B11–11
,W�LV�QRW�SRVVLEOH�WR�DVVLJQ�DXWKRUL]DWLRQ�SURILOHV�GLUHFWO\�WR�XVHUV�RU�XVHU�JURXSV�ZLWK�WKH*OREDO�8VHU�0DQDJHU��7KH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�WKURXJK�DFWLYLW\�JURXSV��,I�\RXZDQW�WR�FUHDWH�DQ�DFWLYLW\�JURXS�DXWRPDWLFDOO\�IURP�DQ�H[LVWLQJ�DXWKRUL]DWLRQ�SURILOH��XVHWUDQVDFWLRQ�SU25��VWHS����&RS\�GDWD�IURP�ROG�SURILOHV�
7KH�PDLQ�DGYDQWDJH�RI�WKH�*OREDO�8VHU�0DQDJHU�LV�WKDW�\RX�QHYHU�KDYH�WR�YLHZ�WKHFRPSOHWH�V\VWHP�ODQGVFDSH�WR�DVVLJQ�DXWKRUL]DWLRQV��,Q�HYHU\�WDVN��\RX�RQO\�ORRN�DW�D�VPDOOSDUW�RI�WKH�FRPSOHWH�ODQGVFDSH��7KH�GLDJUDP�EHORZ�VKRZV�WKDW�\RX�RQO\�ORRN�DW�WZR�VLGHV�RIWKH�DVVLJQPHQW�WULDQJOH�
6RXUFH 7DUJHW
8VHU�8VHU�JURXS 6\VWHP�6\VWHP�W\SH
6\VWHP�6\VWHP�W\SH $FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS
$FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS 8VHU�8VHU�JURXS
7R�PRGHO�D�FRPSOHWH�DVVLJQPHQW�IRU�GLVWULEXWLRQ�LQ�WKH�WDUJHW�V\VWHPV�\RX�QHHG�WR�FUHDWHD�FORVHG�WULDQJOH�IRU�WKDW�DVVLJQPHQW�DV�VKRZQ�LQ�WKH�JUDSKLF�DERYH��7R�UHGXFH�WKHFRPSOH[LW\�RI�WKLV�SURFHVV��WKH�*OREDO�8VHU�0DQDJHU�LV�VHW�XS�LQ�VXFK�D�ZD\�WKDW�\RXRQO\�KDYH�WR�DVVLJQ�WKH�RWKHU�WZR�DQJOHV��2QFH�\RX�KDYH�FRPSOHWHG�HDFK�RI�WKH�WKUHHDQJOHV��WKH�DVVLJQPHQWV�DUH�FRPSOHWH�
Chapter 11: Setting Up Central User Administration
Global User Manager
Authorizations Made Easy11–12
6WUXFWXUH�RI�WKH�*OREDO�8VHU�0DQDJHU
7KH�*OREDO�8VHU�0DQDJHU�FDQ�RQO\�EH�XVHG�LQ�WKH�FHQWUDO�V\VWHP�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�
7R�VWDUW�WKH�*OREDO�8VHU�0DQDJHU��HQWHU�WUDQVDFWLRQ�SUUM�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH(QWHU�
On the left tile, all usersand user groups in thesystem environment aredisplayed.
In the middle tile, all thesystems and systemgroups are displayed.
On the right tile, all activitygroups and compositeactivity groups in thesystem environment aredisplayed.
7R�GLVSOD\�WKH�DFWLYLW\�JURXSV�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHP��LQ�WKH*OREDO�8VHU�0DQDJHU�FKRRVH�([WUDV�→�6\VWHP�FRPSDULVRQ��$OWHUQDWLYHO\��\RX�FDQ�SHUIRUPWKH�7H[W�FRPSDULVRQ�IRU�FKLOG�V\V��RQ�WKH�$FWLYLW\�JURXSV�WDE�LQ�XVHU�PDLQWHQDQFH�WUDQVDFWLRQSU01��DV�GHVFULEHG�HDUOLHU���1RWH�WKDW�LW�PD\�WDNH�VRPH�WLPH�IRU�WKH�GDWD�WR�EHFRPHDYDLODEOH�VLQFH�LW�LV�GLVWULEXWHG�DV\QFKURQRXVO\�
8VLQJ�WKH�*OREDO�8VHU�0DQDJHU
7KH�XVH�RI�WKH�*OREDO�8VHU�0DQDJHU�GHSHQGV�RQ�ZKHWKHU�RU�QRW�WKHUH�ZHUH�XVHUV�LQ�\RXUV\VWHP�ODQGVFDSH�EHIRUH�WKH�LQVWDOODWLRQ�RI�FHQWUDO�XVHU�PDQDJHPHQW�
,I�XVHUV�DOUHDG\�H[LVW��LW�LV�DGYLVDEOH�WR�PLJUDWH�WKDW�XVHU�PDVWHU�GDWD�LQWR�WKH�*OREDO�8VHU0DQDJHU��7KLV�HQVXUHV�WKDW�WKH�XVHU�GDWD�ZLOO�QRW�EH�GHOHWHG�ZLWK�WKH�ILUVW�GLVWULEXWLRQ�
6\VWHP�/DQGVFDSH�ZLWK�([LVWLQJ�8VHUV
,I�\RX�ZDQW�WR�XVH�WKH�*OREDO�8VHU�0DQDJHU�LQ�D�V\VWHP�ODQGVFDSH�ZLWK�DQ�H[LVWLQJ�DQGSURGXFWLYH�XVHU��SURFHHG�DV�GHVFULEHG�EHORZ�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SUUM�DQG�FKRRVH�(QWHU�
�� )URP�WKH�VWDQGDUG�PHQX�EDU�
Chapter 11: Setting Up Central User Administration
Global User Manager
Release 4.6A/B11–13
< &KRRVH�([WUDV�→�0LJUDWLRQ�→�8VHU�WR�GLVSOD\�WKH�FXUUHQW�VWDWXV�RI�XVHU�PDVWHUUHFRUGV�LQ�DOO�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�
< &KRRVH�([WUDV�→�0LJUDWLRQ�→�$FWLYLW\�JURXSV�WR�DVVLJQ�DFWLYLW\�JURXSV�DXWRPDWLFDOO\LQ�WKH�YDOLG�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�
7KH�GDWD�LV�RQO\�XSGDWHG�RQ�WKH�VLQJOH�XVHU�OHYHO�ZLWK�WKH�FXUUHQW�VWDWXV�LQ�WKH�*OREDO�8VHU0DQDJHU�DIWHU�WKH�PLJUDWLRQ��'R�QRW�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHU�JURXSV�DQG�V\VWHPW\SHV�LI�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�WKH�PLJUDWLRQ�
�
$FWLYLW\�JURXSV�VKRXOG�EH�QDPHG�FOHDUO\�LQ�WKH�V\VWHP�ODQGVFDSH��7KH�V\VWHP�ODQGVFDSHDFWV�OLNH�D�VLQJOH�V\VWHP��7KHUHIRUH�DQ�DFWLYLW\�JURXS�VKRXOG�RQO\�H[LVW�RQFH�LQ�WKLV�V\VWHP�,I�DQ�DFWLYLW\�JURXS�ZLWK�WKH�VDPH�QDPH�H[LVWV�LQ�PXOWLSOH�V\VWHPV�LQ�WKH�V\VWHPODQGVFDSH��LW�ZLOO�DSSHDU�PXOWLSOH�WLPHV�LQ�WKH�DFWLYLW\�JURXS�OLVW�LQ�WKH�*OREDO�8VHU0DQDJHU�
,Q�WKH�*OREDO�8VHU�0DQDJHU�\RX�FDQ�FUHDWH�DVVLJQPHQWV�RQ�WKH�VLQJOH�XVHU�OHYHO��DV�ZHOO�DVRQ�WKH�XVHU�JURXS�OHYHO��7KLV�DELOLW\�PD\�OHDG�WR�XQZDQWHG�HIIHFWV�DIWHU�D�XVHU�PLJUDWLRQ�
)RU�H[DPSOH��\RX�PLJUDWHG�DOO�GHYHORSHUV�LQ�\RXU�V\VWHP�LQWR�WKH�*OREDO�8VHU�0DQDJHU�DVGHVFULEHG�DERYH��7KHQ�\RX�GHILQHG�D�XVHU�JURXS�IRU�DOO�GHYHORSHUV�WKDW�FRQWDLQV�WKH�VDPHDXWKRUL]DWLRQV�WKDW�\RX�GHILQHG�HDUOLHU�RQ�WKH�VLQJOH�XVHU�OHYHO��,I�\RX�DVVLJQ�DOO�GHYHORSHUVWR�WKDW�XVHU�JURXS��LW�ZRXOG�OHDG�WR�D�GRXEOH�DVVLJQPHQW�RI�WKH�VDPH�DXWKRUL]DWLRQV��,I�\RXGHOHWHG�WKH�DVVLJQPHQW�RI�RQH�XVHU�WR�WKLV�XVHU�JURXS��WKLV�XVHU�ZRXOG�VWLOO�KDYH�WKHDXWKRUL]DWLRQV�RQ�WKH�VLQJOH�XVHU�OHYHO��7KHUHIRUH��\RX�PXVW�GHOHWH�WKH�DVVLJQPHQW�WR�WKHVLQJOH�XVHU�OHYHO�DV�VRRQ�DV�\RX�DVVLJQ�WKH�XVHU�WR�D�XVHU�JURXS�DIWHU�WKH�PLJUDWLRQ��7KHVLQJOH�XVHU�DVVLJQPHQW�VKRXOG�EH�XVHG�WR�JLYH�D�XVHU�DGGLWLRQDO�DXWKRUL]DWLRQV�WKDW�GHYLDWHIURP�WKH�VWDQGDUG�
6\VWHP�/DQGVFDSH�:LWKRXW�([LVWLQJ�8VHUV
,I�\RX�KDYH�QR�H[LVWLQJ�XVHUV�LQ�\RXU�V\VWHP�ODQGVFDSH��WKH�PLJUDWLRQ�RI�WKH�XVHU�PDVWHUGDWD�GRHV�QRW�DSSO\��<RX�FDQ�LPPHGLDWHO\�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHUV�LQ�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQG�FUHDWH�WKH�DXWKRUL]DWLRQ�DVVLJQPHQWV�LQ�WKH�V\VWHPODQGVFDSH�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU��(YHU\�XVHU�RQO\�QHHGV�WR�EH�FUHDWHG�RQFH�LQ�WKHFHQWUDO�V\VWHP��DQG�PLJKW�JHW�DVVLJQHG�WR�RWKHU�V\VWHPV�ZLWK�WKH�KHOS�RI�WKH�*OREDO�8VHU0DQDJHU��7KH�FUHDWLRQ�RI�WKDW�XVHU�LQ�WKH�RWKHU�V\VWHPV��DQG�WKH�DVVLJQPHQW�WR�WKH�DFWLYLW\JURXSV�WDNHV�SODFH�DXWRPDWLFDOO\�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU�
Chapter 11: Setting Up Central User Administration
Global User Manager
Authorizations Made Easy11–14
8VHU�&UHDWLRQ
�� &UHDWH�D�XVHU�LQ�WUDQVDFWLRQ�68���DVXVXDO��VHH�FKDSWHU���IRU�GHWDLOHGLQIRUPDWLRQ��
�� (QWHU�D�8VHU�JURXS�RQ�WKH�*URXSV�WDEIRU�WKH�FXUUHQW�XVHU��LI�WKLV�XVHUJURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�LQWKH�*OREDO�8VHU�0DQDJHU���<RX�ZLOOQRW�QHHG�WR�PDNH�WKDW�DVVLJQPHQW�LQWKH�*OREDO�8VHU�0DQDJHU�DQ\PRUH�
<RX�VKRXOG�RQO\�FUHDWH�DVVLJQPHQWV�RQ�WKH�6\VWHPV�DQG�$FWLYL��DFWLYLW\�JURXSV��WDEV�LI\RX�DUH�FHUWDLQ�WKLV�DVVLJQPHQW�LV�RQO\�YDOLG�IRU�WKH�VLQJOH�XVHU��2WKHUZLVH��FUHDWH�WKHDVVLJQPHQWV�IRU�XVHU�JURXSV�LQ�WKH�*OREDO�8VHU�0DQDJHU�
$OO�GDWD�HQWHUHG�LQ�WUDQVDFWLRQ�68���LV�DOVR�DYDLODEOH�LQ�WKH�*OREDO�8VHU�0DQDJHU��$OODVVLJQPHQWV�FUHDWHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�DUH�DOVR�DYDLODEOH�LQ�WUDQVDFWLRQ�SU01�
'HILQLQJ�6\VWHP�7\SHV�DQG�8VHU�*URXSV
:H�QRZ�GHPRQVWUDWH�KRZ�WR�JURXS�PXOWLSOH�V\VWHPV�LQWR�D�V\VWHP�JURXS�
�� &KRRVH� �QH[W�WR�6\VWHP�7\SHV�WRFUHDWH�D�V\VWHP�W\SH�
�� ,Q�6\VWHP�W\SH��HQWHU�D�QDPH�IRU�WKHV\VWHP�W\SH�
�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�V\VWHP�W\SH�
�� &KRRVH� �WR�FUHDWH�WKH�V\VWHP�W\SH�
2
1
23
4
Chapter 11: Setting Up Central User Administration
Global User Manager
Release 4.6A/B11–15
�� 7KH�QHZ�V\VWHP�W\SH�DSSHDUV�LQ�WKHOLVW�
�� 7R�DVVLJQ�D�V\VWHP�WR�WKH�MXVW�FUHDWHGV\VWHP�W\SH��VHOHFW�WKH�GHVLUHGV\VWHP�IURP�WKH�6\VWHPV�OLVW��0RYH�LWXVLQJ�GUDJ�DQG�GURS�LQWR�WKH�QHZV\VWHP�W\SH��LQ�RXU�H[DPSOH'(9(/��
�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\V\VWHP�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DV\VWHP�W\SH�
2QH�V\VWHP�FDQ�EH�DVVLJQHG�WR�RQO\�RQH�V\VWHP�JURXS��$�XVHU�FDQ�EH�DVVLJQHG�WRGLIIHUHQW�XVHU�JURXSV�
,Q�WKH�IROORZLQJ�VWHSV��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�D�XVHU�JURXS�
�� &KRRVH� �QH[W�WR�8VHU�JURXSV�
�� ,Q�8VHU�JURXS��HQWHU�D�QDPH�IRU�WKH8VHU�JURXS�
�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�XVHU�JURXS�
�� &KRRVH� �WR�FUHDWH�WKH�XVHU�JURXS�
2
6
1
5
3
4
Chapter 11: Setting Up Central User Administration
Global User Manager
Authorizations Made Easy11–16
�� 7KH�QHZ�XVHU�JURXS�DSSHDUV�LQ�WKHOLVW�
�� 7R�DVVLJQ�D�XVHU�WR�WKH�MXVW�FUHDWHGXVHU�JURXS��VHOHFW�WKH�GHVLUHG�XVHUIURP�WKH�8VHUV�OLVW��0RYH�LW�XVLQJGUDJ�DQG�GURS�LQWR�WKH�QHZ�XVHUJURXS��LQ�RXU�H[DPSOH��'(9(/23��
�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\�XVHUWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DXVHU�JURXS�
0RGHOLQJ�ZLWK�WKH�*OREDO�8VHU�0DQDJHU
,Q�WKH�IROORZLQJ�SURFHGXUH�ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�WKH�FRUUHFW�V\VWHPV�DQG�DFWLYLW\�JURXSV�WR�D�XVHUJURXS�
�� 6HOHFW�WKH�MXVW�FUHDWHG�XVHU�JURXS�
�� &KRRVH� �WR�GLVSOD\�WKHDVVLJQPHQWV�
�� <RX�UHFHLYH�WKH�FXUUHQW�VWDWXV�RI�WKHV\VWHP�V\VWHP�W\SH�DQG�DFWLYLW\JURXS�DVVLJQPHQWV�IRU�WKH�VHOHFWHGXVHU�JURXS��,Q�RXU�H[DPSOH��ZH�KDYHPDGH�QR�DVVLJQPHQWV�IRU�WKH�XVHUJURXS�'(9(/23��7KHUHIRUH��QRDVVLJQPHQWV�DSSHDU��MXVW�WKH�IROGHUV�
56
1
2
3 3
Chapter 11: Setting Up Central User Administration
Global User Manager
Release 4.6A/B11–17
�� 7R�DVVLJQ�D�V\VWHP�RU�V\VWHP�W\SH�WRD�XVHU�JURXS��VHOHFW�WKH�GHVLUHGV\VWHP�RU�V\VWHP�W\SH�IURP�WKH6\VWHPV�RU�6\VWHP�W\SHV�OLVW�DQG�PRYHLW�XVLQJ�GUDJ�DQG�GURS�LQWR�WKHGHVLUHG�IROGHU��IRU�H[DPSOH��D�IROGHUEHORQJLQJ�WR�$VVLJQPHQW�WR�8VHUJURXS�'(9(/23��
�� 7R�DVVLJQ�DFWLYLW\�JURXSV�RUFRPSRVLWH�DFWLYLW\�JURXSV�WR�WKHXVHU�JURXS��SURFHHG�ZLWK�WKH�VDPHSURFHGXUH�
7R�UHGXFH�WKH�QXPEHU�RI�GLVSOD\HG�HQWULHV�LQ�D�OLVW��IRU�WKH�XVHU��DFWLYLW\�JURXS��HWF���FKRRVH�WKH�VHOHFWLRQ�LFRQ�QH[W�WR�WKH�GHVLUHG�HQWU\�
5HPHPEHU�WKDW�DFFRUGLQJ�WR�WKH�DVVLJQPHQW�WULDQJOH�VKRZQ�HDUOLHU��\RX�KDYH�RQO\�GHILQHGWZR�RI�WKH�WKUHH�DQJOHV�VR�IDU��,Q�WKH�H[DPSOH�DERYH��ZH�IRFXVHG�RQ�WKH�XVHU�JURXS�WRDVVLJQ�V\VWHPV�DQG�DFWLYLW\�JURXSV��:KDW�LV�PLVVLQJ�LV�WKH�DVVLJQPHQW�EHWZHHQ�DFWLYLW\JURXSV�DQG�V\VWHPV��,I�\RX�PLJUDWHG�WKH�DFWLYLW\�JURXSV��WKH�DVVLJQPHQW�KDV�EHHQSHUIRUPHG�DXWRPDWLFDOO\�DQG�WKH�WULDQJOH�LV�FRPSOHWH��,I�QRW��\RX�KDYH�WR�GHILQH�WKHDVVLJQPHQW�IRU�HYHU\�DFWLYLW\�JURXS�
<RX�KDYH�WKH�RSWLRQ�WR�GLVSOD\�DQG�PDLQWDLQ�DVVLJQPHQWV�IURP�HYHU\�FRUQHU�RI�WKHWULDQJOH��,I�\RX�GLVSOD\�WKH�DVVLJQPHQWV�RI�DQ�DFWLYLW\�JURXS��WKHQ�\RX�FDQ�PDLQWDLQ�WKHV\VWHP�DQG�XVHU�JURXSV�IRU�WKDW�DFWLYLW\�JURXS��,I�\RX�GLVSOD\�WKH�DVVLJQPHQW�RI�D�V\VWHPW\SH��WKHQ�\RX�FDQ�GHILQH�WKH�XVHU�DQG�DFWLYLW\�JURXSV�WKDW�DUH�YDOLG�IRU�WKLV�V\VWHP�W\SH�
$XWKRUL]DWLRQ�IRU�WKH�*OREDO�8VHU�0DQDJHU
:LWK�WKH�*OREDO�8VHU�0DQJHU��\RX�KDYH�WKH�RSWLRQ�WR�PDLQWDLQ�XVHUV�DQG�DOO�WKHLUDXWKRUL]DWLRQV�LQ�HYHU\�V\VWHP�IURP�WKH�FHQWUDO�V\VWHP�RI�WKH�V\VWHP�ODQGVFDSH��7KLV�RSWLRQFDQ�EH�YHU\�XVHIXO��EXW�DOVR�YHU\�SUREOHPDWLF�LI�XVHG�LQFRUUHFWO\��)RU�H[DPSOH��DOO�XVHUV�LQ�DV\VWHP�W\SH�FRXOG�EH�GHOHWHG�YHU\�HDVLO\��7KHUHIRUH��LW�LV�YHU\�LPSRUWDQW�WR�SD\�FDUHIXODWWHQWLRQ�WR�WKH�DXWKRUL]DWLRQV�RI�WKH�PRGHOHU�DQG�DGPLQLVWUDWRU�RI�WKH�*OREDO�8VHU0DQDJHU�
:H�UHFRPPHQG�\RX�XVH�WKH�IRXU�H\H�SULQFLSOH��ZKHUH�RQH�DGPLQLVWUDWRU�PRGHOV�WKHDVVLJQPHQWV�DQG�DQRWKHU�FKHFNV�WKRVH�DVVLJQPHQWV�EHIRUH�WKH�GDWD�LV�GLVWULEXWHG��7KHPRGHOLQJ�LV�WKH�XQFULWLFDO�SDUW��EHFDXVH�QR�GDWD�LV�EHLQJ�FKDQJHG�LQ�WKH�FOLHQW�V\VWHPV��7KLVKDSSHQV�RQO\�GXULQJ�WKH�GLVWULEXWLRQ�
7KH�GLVWULEXWLRQ�RQO\�WDNHV�SODFH�RQ�WKRVH�LVVXHV�IRU�ZKLFK�WKH�DGPLQLVWUDWRU�KDV�WKHGLVWULEXWLRQ�ULJKWV��,Q�WKLV�ZD\��LW�LV�SRVVLEOH�WR�KDYH�GLIIHUHQW�DGPLQLVWUDWRUV�IRU�VHOHFWHG
54
Chapter 11: Setting Up Central User Administration
Global User Manager
Authorizations Made Easy11–18
V\VWHPV�LQ�WKH�V\VWHP�ODQGVFDSH��7KHVH�DGPLQLVWUDWRUV�FDQ�WKHQ�RQO\�GLVWULEXWH�WKH�GDWD�IRUZKLFK�WKH\�DUH�DXWKRUL]HG�
7KH�IROORZLQJ�WDEOH�GLVSOD\V�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�WKH�*OREDO�8VHU�0DQDJHU�
7DVN 2EMHFW $FWLYLW\ 6B86(5B*53 6B86(5B6<6 6B865B$*5
'LVSOD\�FUHDWH�GHOHWHDVVLJQPHQW
8VHU8VHU�JURXS6\VWHP6\VWHP�W\SHDFWLY��JURXS
0RGHO������'LVSOD\�����
8VHU�JURXS�RIWKH�XVHU
8VHU�JURXS
6\VWHP6\VWHP�W\SH
$FWLY�JURXS
8VHU�LQ�XVHUJURXSV
$VVLJQ����� 8VHU�JURXS�RIWKH�XVHU
8VHU�JURXS
&KDQJH6\VWHP�W\SH
$VVLJQ����� 6\VWHP6\VWHP�W\SH
&UHDWH�XVHUJURXS
&UHDWH����� 8VHU�JURXS
0LJUDWH 0LJUDWH����� �&RPPHQW�HQWHULQJ�RIVLQJOHV\VWHP�QRWSRVVLEOH
'LVWULEXWLQJ�'DWD�LQ�WKH�*OREDO�8VHU�0DQDJHU
%HIRUH�WKH�GLVWULEXWLRQ��\RX�VKRXOG�DOZD\V�GLVSOD\�WKH�GDWD�DQG�FKHFN�LW��,Q�WKH�IROORZLQJ�VWHSV��ZHGHPRQVWUDWH�KRZ�WR�FKHFN�WKH�GDWD�
�� ,QVLGH�WKH�*OREDO�8VHU�0DQDJHU�FKRRVH� �WR�GLVSOD\�WKH�GLVWULEXWLRQGDWD�
�� &KHFN�LI�WKH�GDWD�IRU�WKH�XVHUV�LV�VHWFRUUHFWO\�IRU�WKH�GLVWULEXWLRQ�
2QO\�GLVWULEXWH�WKH�GDWD�DIWHU�\RX�KDYH�UDQGRPO\�FKHFNHG�WKH�XVHU�GDWD�
1
Chapter 11: Setting Up Central User Administration
Global User Manager
Release 4.6A/B11–19
<RX�FDQ�GLVWULEXWH�WKH�GDWD�IURP�WKH�*OREDO�8VHU�0DQDJHU�PDQXDOO\�LPPHGLDWHO\�RUFUHDWH�D�EDFNJURXQG�MRE�WR�GLVWULEXWH�WKH�GDWD�
,PPHGLDWH�'LVWULEXWLRQ
�� 7R�WULJJHU�WKH�GLVWULEXWLRQLPPHGLDWHO\��FKRRVH� �
7KH�GDWD�LV�GLVWULEXWHG�ULJKW�DZD\�5HPHPEHU�WKDW�LW�FDQ�WDNH�D�ZKLOHXQWLO�DOO�GDWD�LV�DYDLODEOH�LQ�HYHU\FOLHQW�V\VWHP��VLQFH�WKH�GLVWULEXWLRQKDSSHQV�DV\QFKURQRXVO\�
,PPHGLDWH�GLVWULEXWLRQ�FDQ�FDXVH�D�ORW�RI�QHWZRUN�WUDIILF�LQ�\RXU�V\VWHP�ODQGVFDSH�DQGVORZ�GRZQ�WKH�SHUIRUPDQFH�RI�V\VWHPV��,I�\RX�ZDQW�WR�DYRLG�WKLV�VORZGRZQ��\RX�VKRXOGVFKHGXOH�D�UHJXODU�EDFNJURXQG�MRE�WR�UXQ�DW�QLJKW�
'XULQJ�WKH�GLVWULEXWLRQ��WKH�GDWD�LV�HQWHUHG�LQWR�WUDQVDFWLRQ�68���DFFRUGLQJ�WR�WKHPRGHOLQJ�LQ�WKH�*OREDO�8VHU�0DQJHU��DQG�IURP�WKHUH�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��,QWKH�FOLHQW�V\VWHP��RQO\�WKH�XVHUV�DUH�FUHDWHG�DQG�WKH�DFWLYLW\�JURXSV�DVVLJQHG��2WKHU�GDWDLV�QRW�GLVWULEXWHG��EXW�NHSW�LQ�WKH�FHQWUDO�V\VWHP��7KHUHIRUH��LQ�WUDQVDFWLRQ�6&8/�\RX�FDQH[SHFW�WR�ILQG�RQO\�VRPH�ORJV��QDPHO\�WKRVH�IRU�WKH�GLVWULEXWLRQ�RI�WKH�DFWLYLW\�JURXSDVVLJQPHQW�DQG�IRU�XVHUV�FUHDWHG�RU�GHOHWHG.
7R�UHGXFH�WKH�GDWD�IORZ�WKDW�RFFXUV�GXULQJ�WKH�GLVWULEXWLRQ��RQO\�GDWD�WKDW�KDV�FKDQJHGVLQFH�WKH�ODVW�GLVWULEXWLRQ�LV�GLVWULEXWHG�
6FKHGXOLQJ�%DFNJURXQG�'LVWULEXWLRQ
�� 7R�VFKHGXOH�D�EDFNJURXQG�MRE�IRUWKH�GDWD�GLVWULEXWLRQ��FKRRVH�([WUDV→�6FKHGXOH�GLVWULEXWLRQ�
1
1
Chapter 11: Setting Up Central User Administration
Global User Manager
Authorizations Made Easy11–20
�� &KRRVH� �
�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�
�� ,Q�-RE�FODVV��HQWHU�D�SULRULW\�IRU�WKHMRE�FODVV�
�� ,Q�7DUJHW�VHUYHU��VHOHFW�WKH�FHQWUDOV\VWHP�DV�WKH�WDUJHW�V\VWHP�
�� &KRRVH� �6WHS�WR�SODQ�WKH�$%$3SURJUDP�56865����
�� &KRRVH� �6WDUW�FRQGLWLRQ�WR�VFKHGXOHWKH�WLPH�IRU�\RXU�MRE�
�� &KRRVH� �
,I�\RX�SURFHVV�WKH�DGPLQLVWUDWLRQ�RI�XVHU�GDWD�LQ�WKH�*OREDO�8VHU�0DQDJHU�ZLWK�WKH�IRXU�H\H�SULQFLSOH��\RX�VKRXOG�EH�DZDUH�WKDW�WKHUH�PLJKW�EH�FRQIOLFW��DV�\RX�FDQQRW�FKHFN�WKHGDWD�EHIRUH�WKH�DXWRPDWLF�GLVWULEXWLRQ�
2
34
5
67
8
12–1
&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ
&RQWHQWV
Overview ................................................................................................................12–2
Tracing Authorizations with Transaction SU53 .................................................12–2
System Trace Using Transaction ST01 ..............................................................12–4
Analyzing a Written Trace File.............................................................................12–9
Reducing the Scope of Authorization Checks.................................................12–12
����
Chapter 12: Tips and Troubleshooting
Overview
Authorizations Made Easy12–2
2YHUYLHZ
:KHQ�XVHUV�H[HFXWH�D�WUDQVDFWLRQ�RU�UHSRUW�WKDW�LV�QRW�LQFOXGHG�LQ�WKHLU�XVHU�PHQX��WKH\�PD\VHH�WKH�V\VWHP�PHVVDJH�VLPLODU�WR��<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ���7KLV�PHVVDJHPHDQV�WKDW�HLWKHU�WKHLU�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�GRHV�QRW�FRQWDLQ�WKH�UHTXLUHGDXWKRUL]DWLRQ�WR�H[HFXWH�WKH�WUDQVDFWLRQ��RU�WKH�YDOXHV�PDLQWDLQHG�IRU�WKH�SURILOH·VDXWKRUL]DWLRQ�DUH�LQVXIILFLHQW��7KH�PLVVLQJ�DXWKRUL]DWLRQV�FDQ�EH�GHWHUPLQHG�HLWKHU�E\WUDFLQJ�DXWKRUL]DWLRQV�ZLWK�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRWDXWKRUL]HG��RU�ZLWK�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�67���
7UDQVDFWLRQ�68���LV�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*��ZKLFK�LVLQFOXGHG�LQ�WKH�XVHU�UROH�WHPSODWH�6$3B(9(5<B(03/2<((�
,W�LV�DOVR�DFFHVVLEOH�XVLQJ�WKH�PHQX�SDWK�6\VWHP�→�8WLOLWLHV�→�'LVSOD\�$XWKRUL]DWLRQ�&KHFNIURP�WKH�PDLQ�PHQX�
7UDFLQJ�$XWKRUL]DWLRQV�ZLWK�7UDQVDFWLRQ�68��
%\�H[HFXWLQJ�WUDQVDFWLRQ�68�����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HGIURP�WKH�XVHU�PHQX�RU�E\�HQWHULQJ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DW�DQ\�WLPH�DQDO\]HDQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�LQ�\RXU�VHVVLRQ��7UDQVDFWLRQ�68���FDQ�EH�DFFHVVHG�IURP�DQ\�RI\RXU�VHVVLRQV��QRW�MXVW�WKH�RQH�ZKHUH�WKH�HUURU�RFFXUUHG��<RX�FDQQRW��KRZHYHU��DQDO\]H�DQDXWKRUL]DWLRQ�HUURU�IURP�\RXU�RZQ�VHVVLRQ�LQ�DQRWKHU�XVHU·V�ORJRQ�VHVVLRQ�
$W�WKH�WUDQVDFWLRQ�VWDUW��WUDQVDFWLRQ�68���LV�SURWHFWHG�E\�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�<RX�VKRXOG�JLYH�DOO�XVHUV�DFFHVV�ULJKWV�WR�WUDQVDFWLRQ�68����7KXV��LQ�FDVH�RI�D�SUREOHP�\RXU�KHOS�GHVN�FDQ�HDVLO\�DQDO\]H�SUREOHPV�WKDW�XVH�WUDQVDFWLRQ�68����7UDQVDFWLRQ�68���LVLQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*�ZKLFK�LV�LQFOXGHG�LQ�WKH�XVHU�UROHWHPSODWH�6$3B(9(5<B(03/2<((�
,I�\RX�DUH�XVLQJ�VWUXFWXUDO�DXWKRUL]DWLRQV��68���LV�QRW�YHU\�XVHIXO�LI�WKH�WUDQVDFWLRQ�ZKHUH\RX�DUH�UHFHLYLQJ�PHVVDJHV�<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU��LV�DQ�+5�WUDQVDFWLRQ�RU�DWUDQVDFWLRQ�WKDW�FDOOV�+5�REMHFWV��68���RQO\�UHYHDOV�WKH�ODVW�DXWKRUL]DWLRQ�FKHFN�IDLOXUHEDVHG�RQ�WKH�$%$3�FRGH�VWDWHPHQW�$XWKRUL]DWLRQ�&KHFN��+RZHYHU��VWUXFWXUDODXWKRUL]DWLRQV�GR�QRW�DOZD\V�XVH�WKH�$XWKRUL]DWLRQ�&KHFN�VWDWHPHQW�LQ�GHWHUPLQLQJDFFHVVHV��7KHUHIRUH��LI�H[WHQVLYH�VWUXFWXUDO�DXWKRUL]DWLRQV�DUH�XVHG��WKH�6\VWHP�7UDFH�WUDQVDFWLRQ�67����ZLOO�EH�RI�PRUH�EHQHILW�WKDQ�68���
Chapter 12: Tips and Troubleshooting
Tracing Authorizations with Transaction SU53
Release 4.6A/B12–3
([DPSOH�
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�D�XVHU��ZKR�KDV�WKH�XVHU�UROH�WHPSODWH'$7$B(175<B&/(5.��ZH�FUHDWHG�WKLV�DFWLYLW\�JURXS�HDUOLHU�LQ�WKH�ERRN���WULHV�WR�UXQ�WUDQVDFWLRQ�)%����'RFXPHQW�FKDQJHV��6LQFH�WKLV�XVHU�KDV�QR�DXWKRUL]DWLRQ�IRU�WKLV�WUDQVDFWLRQ��WKH�HUURU�PHVVDJH�<RX�KDYH�QRDXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ�)%���LV�UHFHLYHG��7KH�XVHU�KDV�WR�XVH�68�����'LVSOD\�FKHFN�YDOXHV�RIDXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG�WR�ILQG�RXW�ZKDW�DXWKRUL]DWLRQ�LV�PLVVLQJ�
:H�VWDUW�ZKHUH�WKH�XVHU�KDV�DWWHPSWHGWR�UXQ�WUDQVDFWLRQ�)%���DQG�UHFHLYHV�WKHHUURU�PHVVDJH��<RX�KDYH�QR�DXWKRUL]DWLRQIRU�7UDQVDFWLRQ�)%���
�� 6WDUW�WUDQVDFWLRQ�68���¥�'LVSOD\FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI�QRW�DXWKRUL]HG�IURP�WKH�XVHU�PHQX��RUHQWHU�SU53�LQ�WKH�&RPPDQG�ILHOG�
�� 7KH�V\VWHP�GLVSOD\V�WKH�FKHFNHGDXWKRUL]DWLRQ�REMHFW�WKDW�FDXVHG�WKHHUURU�PHVVDJH�ZLWK�WKHFRUUHVSRQGLQJ�ILHOG�YDOXHV�
�� $OVR�GLVSOD\HG�DUH�
D� 7KH�FXUUHQW�DXWKRUL]DWLRQ�LQ�WKHXVHUV�DVVLJQHG�DXWKRUL]DWLRQSURILOH�
E� 7KH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRUWKLV�DXWKRUL]DWLRQ�
�� 7R�SULQW�WKLV�LQIRUPDWLRQ��FKRRVH9DOXHV�→�3ULQW�
1
2
3a
3b
4
This iswhat ismissing
This iswhat iscurrentlyassigned
Error message
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01
Authorizations Made Easy12–4
7R�DGG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�WR�WKH�XVHU·V�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�XVLQJ�WKH3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV��$OVR�UHIHU�WR�WKH6$31HW�²�5���)URQWHQG�QRWH�QXPEHUV�������DQG��������IRUPHUO\�266�QRWHV��
6\VWHP�7UDFH�8VLQJ�7UDQVDFWLRQ�67��
<RX�FDQ�XVH�WKH�V\VWHP�WUDFH�WR�UHFRUG�DXWKRUL]DWLRQ�FKHFNV�LQ�\RXU�RZQ�VHVVLRQ�DQG�RWKHUXVHUV·�VHVVLRQV��6WDUW�WUDQVDFWLRQ�67����V\VWHP�WUDFH��DQG�UXQ�WKH�WUDQVDFWLRQ�WKH�XVHU�LVKDYLQJ�DXWKRUL]DWLRQ�SUREOHPV�ZLWK��$V�VRRQ�DV�\RX�JHW�VWXFN��VWRS�\RXU�WUDFH��:H�XVH�WKHWUDFH�IRU�DXWKRUL]DWLRQ�FKHFNV�WKRXJK�LW�LV�FDSDEOH�RI�WUDFLQJ�PXFK�PRUH��(YHU\WKLQJ�\RXKDYH�GRQH�LQ�WKH�5���6\VWHP�WKDW�UHTXLUHV�DXWKRULW\�FKHFNV�LV�UHFRUGHG�LQ�WKH�WUDFH�ZLWK�WKHREMHFW·V�ILHOGV�DQG�WKH�WHVWHG�YDOXHV�
8VLQJ�67����V\VWHP�WUDFH��VHYHUHO\�DIIHFWV�V\VWHP�SHUIRUPDQFH�
([DPSOH�
,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WKH�DGPLQLVWUDWRU�FDQ�FUHDWH�D�V\VWHP�WUDFHRI�DQRWKHU�XVHU·V�VHVVLRQ��8VHU�)7$<(+��ZKR�KDV�EHHQ�DVVLJQHG�WKH�XVHU�UROH'$7$B(175<B&/(5.��LV�WU\LQJ�WR�UXQ�D�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�DXWKRUL]DWLRQDQG�RQH�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�QR�DXWKRUL]DWLRQ��$W�WKH�VDPH�WLPH��WKHDGPLQLVWUDWRU�XVHV�WUDQVDFWLRQ�67���WR�FUHDWH�D�V\VWHP�WUDFH�IRU�WKH�DWWHPSWV�RI�XVHU)7$<(+�
7R�VHW�XS�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�
�� 6WDUW�WKH�WUDQVDFWLRQ�67��¥�6\VWHP�7UDFH�
1
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01
Release 4.6A/B12–5
&KHFN�WKH�7UDFH�VWDWXV�EHIRUH�XVLQJ�WKH�V\VWHP�WUDFH��,I�WKH�WUDFH�LV�DFWLYH��GR�QRW�LQWHUIHUH�EHFDXVH�WKHUH�LV�RQO\�RQH�WUDFH�V\VWHP�IRU�HDFK�5���LQVWDQFH�
�� <RX�FDQ�VHH�LI�DQRWKHU�XVHU�KDV�XVHGWKH�V\VWHP�WUDFH�DQG�ZKHQ�LW�KDVEHHQ�DFWLYDWHG�
�� 0DQ\�GLIIHUHQW�7UDFH�FRPSRQHQWVH[LVW�DQG�HDFK�FDQ�EH�VZLWFKHG�RQZLWK�LWV�RZQ�IODJ��DQG�ILOWHU��
�� 6RPH�VHOHFWLRQV�DUH�GLUHFWO\�YLVLEOHLQ�WKH�FKHFNER[HV��(QVXUH�WKDW�RQO\WKH�$XWKRUL]DWLRQ�FKHFN�FKHFNER[�LVVHOHFWHG�
�� 2WKHU�WUDFH�FRPSRQHQW�VHOHFWLRQV�DUHJURXSHG�DQG�PLJKW�FRQWDLQ�RQO\SDUWLDO�VHOHFWLRQV��&KHFN�DOO� LFRQVWR�HQVXUH�WKDW�QRWKLQJ�LV�VHOHFWHG�
�� 7R�UHVWULFW�WKH�WUDFH�WR�D�VSHFLILF�XVHURU�VHVVLRQ��FKRRVH�(GLW�→�)LOWHU�→6KDUHG�
7KH�WUDFH�ILOH·V�QDPH�DQG�VWRUDJH�ORFDWLRQ�LV�VKRZQ�LQ�WKH�ILHOG�&XUUHQW�WUDFH�ILOH��7KH�WUDFHLV�DGGHG�WR�WKH�H[LVWLQJ�ILOH�XQWLO�WKH�PD[LPXP�ILOH�VL]H�LV�UHDFKHG��7KHQ�D�QHZ�ILOH�QHHGVWR�EH�FUHDWHG��VHH�ODWHU�LQ�WKLV�VHFWLRQ��
�� (QWHU�WKH�QDPH�RI�WKH�XVHU�IRU�ZKLFK\RX�ZRXOG�OLNH�WR�UXQ�WKH�WUDFH�,Q�RXU�H[DPSOH�ZH�ZDQW�WR�WUDFHXVHU�)7$<(+ªV�WUDQVDFWLRQV�
�� &KRRVH�%DFN�
<RX�DOVR�KDYH�WKH�RSWLRQ�WR�ILOWHU�WKHGDWD�IRU�HLWKHU�D�FHUWDLQ�WUDQVDFWLRQ�RUSURJUDP�
�� 2Q�WKH�6\VWHP�7UDFH�VFUHHQ��FKRRVH(GLW�→�:ULWH�RSWLRQV�
2
3
4
5
6
tech
Tip
7
8
10
11
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01
Authorizations Made Easy12–6
��� 7R�VDYH�\RXU�WUDFH�RQ�WKH�KDUG�GULYH�VHOHFW�7UDFH��:ULWH�WR�GLVN�
��� &KRRVH�%DFN�
<RX�DOVR�KDYH�WKH�RSWLRQ�WR�HLWKHU�GHILQH�D�WLPH�IUDPH�IRU�WKH�WUDFH�WR�UXQ�RU�WR�XVH�WKHEXIIHU�
��� 7R�VDYH�\RXU�VHWWLQJV�IRU�WKH�QH[WWLPH�\RX�XVH�WKH�WUDFH��FKRRVH�(GLW→�6HWWLQJV�→�:ULWH�WR�GDWDEDVH�
��� <RXU�GDWD�LV�VDYHG�ZLWK�WKHIROORZLQJ�VHWWLQJV��&OLHQW��XVHUQDPH�GHIDXOW�
7KH�V\VWHP�LV�QRZ�UHDG\�WR�EHJLQWKH�WUDFH��$W�WKLV�WLPH��ZHUHFRPPHQG�WKDW�\RX�KDYH�WKH�XVHU·VVHVVLRQ�\RX�ZRXOG�OLNH�WR�WUDFH�UHDG\�RU�RSHQ�DQRWKHU�VHVVLRQ�WR�WUDFH\RXU�RZQ�WUDQVDFWLRQ��
��� &KRRVH�7UDFH�RQ�
7R�XVH�\RXU�LQGLYLGXDO�VHWWLQJV�WKH�QH[W�WLPH�\RX�VWDUW�WKH�WUDFH��FKRRVH�(GLW�→�6HWWLQJV→�5HDG�IURP�GDWDEDVH��$OO�WKH�FKHFNPDUNV�\RX�VHW�ZLOO�DSSHDU�LQ�WKH�FRUUHVSRQGLQJFKHFNER[HV�
��� &KRRVH�<HV�
)URP�QRZ�RQ�HYHU\�DFWLRQ�WKDW�XVHU)7$<(+�SHUIRUPV�LV�UHFRUGHG�LQ�WKHWUDFH�
12
13
14
15
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01
Release 4.6A/B12–7
��� &KDQJH�WR�WKH�XVHU·V�VHVVLRQ�\RXZDQW�WR�WUDFH�
7KH�XVHU�VKRXOG�QRZ�UXQ�WKHWUDQVDFWLRQV�\RX�ZRXOG�OLNH�WRLQYHVWLJDWH��,Q�RXU�H[DPSOH��ZH�ILUVWVWDUW�WUDQVDFWLRQ�)%����WKHQ�)%���
��� %HJLQ�WKH�WUDQVDFWLRQ��IRU�H[DPSOH�)%���¥�'LVSOD\�GRFXPHQWV��
7KH�WUDQVDFWLRQ�VWDUWV�EHFDXVH�XVHU)7$<(+�LV�DXWKRUL]HG�WR�SHUIRUP�LW�
��� %HJLQ�DQRWKHU�WUDQVDFWLRQ��IRUH[DPSOH��FB04��
6LQFH�XVHU�)7$<(+�LV�QRW�DXWKRUL]HGWR�SHUIRUP�)%����KH�UHFHLYHG�WKHHUURU�PHVVDJH��<RX�DUH�QRW�DXWKRUL]HGWR�XVH�WUDQVDFWLRQ�)%���
7KH�V\VWHP�DOVR�MXPSV�EDFN�WR�WKHXVHU�PHQX�
17
18
Error message
Chapter 12: Tips and Troubleshooting
System Trace Using Transaction ST01
Authorizations Made Easy12–8
��� $IWHU�FRPSOHWLQJ�\RXU�V\VWHP�WUDFH�VZLWFK�EDFN�WR�WKH�RWKHU�VHVVLRQ��WKHWUDFH�VHVVLRQ�
��� &KRRVH� �7UDFH�RII�
��� &KRRVH�<HV�WR�VWRS�WUDFLQJ�
7KH�WUDFH�LV�QRZ�UHDG\�WR�DQDO\]H�6HH�WKH�QH[W�VHFWLRQ�RQ�KRZ�WRDQDO\]H�D�WUDFH�
20
21
Chapter 12: Tips and Troubleshooting
Analyzing a Written Trace File
Release 4.6A/B12–9
$QDO\]LQJ�D�:ULWWHQ�7UDFH�)LOH
�� 7R�GLVSOD\�WKH�WUDFH�UHVXOWV��IURP�WKH6\VWHP�7UDFH�ZLQGRZ��FKRRVH�)LOH�OLVW�
�� 6HOHFW�\RXU�WUDFH�
,I�\RX�VHH�PRUH�WKDQ�RQH�WUDFH��VHOHFW�WKHFRUUHFW�RQH��7R�GHWHUPLQH�WKH�WUDFHQDPH��VHH�WKH�7HFK7DON�RQ�SDJH���²���
�� &KRRVH� �$QDO\]H�
%H�DZDUH�WKDW�WKH�WUDFH�ILOH�FDQ�EH�H[WUHPHO\�ODUJH��%H�SDWLHQW�EHFDXVH�LW�PD\�WDNH�VRPHWLPH�WR�GLVSOD\�LW�
2
3
1
Chapter 12: Tips and Troubleshooting
Analyzing a Written Trace File
Authorizations Made Easy12–10
�� 6HOHFW�DOO�WKH�RSWLRQV�\RX�ZDQW�WRFRQVLGHU�LQ�\RXU�DQDO\VLV��IRUH[DPSOH��7UDFH�IRU�DXWKRUL]DWLRQFKHFNV��
,I�HYHU\WKLQJ�LV�VHOHFWHG��LW�PLJKW�EHHDVLHU�WR�FKRRVH� �WR�GHVHOHFW�DOO�ILUVWDQG�WKHQ�UHVHOHFW�RQH�RU�PRUHFKHFNER[HV�
�� 8QGHU�5HVWULFWLRQV��HQWHU�WKH�GHVLUHGXVHU�
�� &KRRVH� $QDO\]H�
�� 7KH�ILUVW�SDJH�RI�WKH�WUDFH�ILOHDSSHDUV��%\�GHIDXOW��:LWK�DXWKRULW\FKHFN�VKRXOG�EH�VHOHFWHG�
�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHWUDQVDFWLRQV�WKDW�ZHUH�XVHG�E\�WKHXVHU�
7
4
5
6
Chapter 12: Tips and Troubleshooting
Analyzing a Written Trace File
Release 4.6A/B12–11
�� 6LQFH�WKH�WUDFH�OLVWV�FDQ�EH�YHU\ODUJH��WKH�RXWSXW�LV�FRPSUHVVHG��7KH1XPEHU�RI�UHFRUGV�SULQWHG�LV�WKHQXPEHU�RI�OLQHV�FXUUHQWO\�GLVSOD\HG�
��� 7KHVH�OLQHV�DSSHDU�LQ�WKH�ER[�HV�DERYH�WKH�1XPEHU�RI�UHFRUGV�SULQWHG�,Q�RXU�H[DPSOH��DOO�WKHDXWKRUL]DWLRQV�FKHFNHG�ZLWK�WKHUHTXLUHG�ILHOG�YDOXHV�KDYH�DSSHDUHG�7KLV�LV�WKH�LQIRUPDWLRQ�\RX�DUHORRNLQJ�IRU�
��� 7KH�UHWXUQ�FRGH�IRU�HDFK�RI�WKHVHDXWKRUL]DWLRQ�FKHFNV�DOVR�DSSHDUV�< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�LW�LV�RND\�
< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�WKH�FKHFN�KDV�IDLOHG�
��� 7KH�WH[W�VKRZV�WKH�REMHFW�WKDW�ZDVFKHFNHG�
��� 7KH�ODVW�LWHP�RQ�WKH�OLQH�LV�WKHWUDQVDFWLRQ�FRGH�WKDW�ZDV�FKHFNHG�
,I�WKH�UHWXUQ�FRGH�LV�
< (TXDO�WR����WKH�DXWKRUL]DWLRQ�FKHFN�LV�RND\< *UHDWHU�WKDQ����WKH�DXWKRUL]DWLRQ�FKHFN�LV�QRW�RND\
9
10
11
10
11 12 13
12 13
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–12
5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV
2YHUYLHZ
7KH�EDVLV�IRU�DOO�VZLWFKHV�LV�WKH�DFWLYDWLRQ�RI�WKH�3*��<RX�FDQ�DOVR�VZLWFK�WKH�5)&�6B7&2'(��DQG�JOREDO�GHDFWLYDWLRQ�VZLWFKHV��%DVHG�RQ�WKHVH��\RX�FDQ�GHDFWLYDWHDXWKRUL]DWLRQ�FKHFNV�XVLQJ�68����,QVLGH�WKH�DFWLYLW\�JURXSV�\RX�FDQ�LQDFWLYDWH�DXWKRUL]DWLRQREMHFWV�DQG�VHW�WKH�DFWLYLW\�JURXS�DQG�XVHU�DVVLJQPHQW�YDOLGLW\�SHULRG�
Profile Generator
RFC, S_TCODE and global deactivation switches
SU24 switches
AG and AG-User assignments
,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�GHVFULEH�WKH�VLQJOH�OD\HUV�LQ�PRUH�GHWDLOV�
(QDEOLQJ�WKH�3URILOH�*HQHUDWRU
%HIRUH�FRQWLQXLQJ�ZLWK�WKLV�VHFWLRQ��\RX�QHHG�WR�KDYH�DW�OHDVW�VHW�DQG�DFWLYDWHG�WKH�V\VWHPSDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<��GHIDXOW�YDOXH���DQG�UXQ�68���ZKLFK�FRSLHV�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�DQG�ILHOG�YDOXHV�IURP�WDEOH�862%7�DQG�862%;�LQWR�WKHFXVWRPHU�WDEOHV�
(QDEOLQJ�'LVDEOLQJ�2WKHU�6\VWHP�ZLGH�&KHFNV
(QDEOLQJ�DXWK�WFRGHVBQRWBFKHFNHG
5���LV�QRW�IXOO\�D�WUDQVDFWLRQ�EDVHG�DXWKRUL]DWLRQ�V\VWHP��,W�LV�DOVR�DQ�REMHFW�RULHQWHGDXWKRUL]DWLRQ�V\VWHP��$�EXVLQHVV�SURFHVV�LQ�5���FDQ�EH�DFFHVVHG�E\�VHYHUDO�PHFKDQLVPV��IRUH[DPSOH��WUDQVDFWLRQ�FRGH��%$3,��HWF����EXW�WUDQVDFWLRQV�DUH�PRVW�FRPPRQ��5���SURWHFWVSDUWLFXODU�REMHFWV�RU�SLHFHV�RI�WKH�EXVLQHVV�SURFHVV�ZLWKLQ�WKH�WUDQVDFWLRQ��5���GHILQHV�ZKLFKREMHFWV�DUH�´VHFXUDEOHµ�LQ�WKH�VWDQGDUG�V\VWHP��DQG�RQH�EXVLQHVV�SURFHVV�RU�WUDQVDFWLRQ�FRGHPD\�UHTXLUH�DFFHVV�WR�D�YDU\LQJ�QXPEHU�RI�SUHGHILQHG�REMHFWV��+RZHYHU��5���DOVR�XVHV�WKHWUDQVDFWLRQ�FRGH�DV�WKH�´ILUVW�OLQH�RI�GHIHQVHµ�WR�SUHYHQW�VRPHRQH�IURP�DFFHVVLQJ�SDUWV�RI�WKHV\VWHP��,Q�WKH�HYHQW�WKDW�D�XVHU�HQWHUV�D�WUDQVDFWLRQ�FRGH�WR�SHUIRUP�D�WDVN��WKH�V\VWHPFKHFNV�WKH�XVHU·V�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�WR�HQVXUH�WKH\�KDYH�WKH�FRUUHFW�6B7&2'(WUDQVDFWLRQ�FRGH�EHIRUH�FRQWLQXLQJ��,Q�FHUWDLQ�FDVHV��\RX�PD\�ZLVK�WR�HOLPLQDWH�WKLV�´ILUVWOLQH�RI�GHIHQVHµ�LI�\RX�ILQG�LW�FXPEHUVRPH�WR�SURWHFW�HDFK�DQG�HYHU\�WUDQVDFWLRQ�FRGH�LQ�WKH
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–13
V\VWHP��$V�VXFK��\RX�FDQ�GLVDEOH�WKH�FKHFN�IRU�6B7&2'(�XVLQJ�WKH�V\VWHP�ZLGH�SURILOHSDUDPHWHU�DXWK�WFRGHVBQRWBFKHFNHG��,Q�WKH�V\VWHP��6B7&2'(�LV�DFWLYH�E\�GHIDXOW�
(QDEOLQJ�DXWK�UIFBDXWKRULW\BFKHFN
6$3�KDV�YDVWO\�HQKDQFHG�LWV�XVH�RI�WKH�5)&��UHPRWH�IXQFWLRQ�FDOO��IXQFWLRQDOLW\�LQ�UHFHQWUHOHDVHV�RI�WKH�5���6\VWHP��5)&V�DUH�XVHG�WKURXJKRXW�WKH�V\VWHP�VR�WKDW�RQH�SRUWLRQ�RI�WKH5���6\VWHP�FDQ�´FRPPXQLFDWHµ�ZLWK�DQRWKHU�SDUW�RI�5����IRU�H[DPSOH��FUHDWLQJ�D�VDOHVRUGHU�YLD�ZRUNIORZ�PD\�LQYRNH�DQ�5)&�WR�FRPPXQLFDWH�WKH�LQIRUPDWLRQ�WKDW�LV�EHLQJSDVVHG�LQWR�WKH�VDOHV�RUGHU�FUHDWH�IXQFWLRQ�LQ�ZRUNIORZ�SURFHVVLQJ���5)&·V�DUH�DOVR�FULWLFDO�LQSHUPLWWLQJ�V\VWHPV�DQG�DSSOLFDWLRQV�H[WHUQDO�WR�5����IRU�H[DPSOH��D�ZHE�SDJH��WRFRPPXQLFDWH�ZLWK�5���ZLWK�%$3,V��$V�%$3,V�XWLOL]H�5)&�IXQFWLRQDOLW\��DXWKRUL]DWLRQFKHFNV�DUH�SHUIRUPHG�EDVHG�RQ�WKH�%$3,�XVHG��2QH�RI�5��·V�FRUH�DSSURDFKHV�WR�VHFXULQJ�WKH5)&�IXQFWLRQDOLW\�LV�WR�LQWURGXFH�DQRWKHU�QHZ�DXWKRUL]DWLRQ�REMHFW�FDOOHG�6B5)&�ZKLFKJLYHV�SHRSOH�DFFHVV�WR�SDUWLFXODU�JURXSV�RI�5)&V��,Q�SDUWLFXODU��HYHU\�5)&�EHORQJV�WR�DIXQFWLRQ�JURXS��0DQ\�5)&V�FDQ�EHORQJ�WR�RQH�IXQFWLRQ�JURXS��IRU�H[DPSOH��WKH�IXQFWLRQJURXS�IRU�00�3XUFKDVH�2UGHU�3URFHVVLQJ���7KH�DXWKRUL]DWLRQ�REMHFW�6B5)&�FDQ�EH�UHVWULFWHGWR�JLYH�XVHUV�DFFHVV�WR�SDUWLFXODU�IXQFWLRQ�JURXSV��+RZHYHU��WKH�WUHPHQGRXV�DPRXQW�RI5)&V�LQ�����FRPSOLFDWHV�ZKLFK�IXQFWLRQ�JURXSV�\RX�VKRXOG�JLYH�SHRSOH�DFFHVV�WR��7KHUHIRUH�5���SURYLGHV�D�PHFKDQLVP�WR�GLVDEOH�WKH�FKHFN�DJDLQVW�WKH�6B5)&�DXWKRUL]DWLRQ�REMHFW�DW�DV\VWHP�ZLGH�OHYHO��7KH�V\VWHP�ZLGH�SURILOH�SDUDPHWHU�DXWK�UIFBDXWKRULW\BFKHFN�FDQ�EHFKDQJHG�IURP�LWV�EODQN�GHIDXOW�WR�RQH�RI�WKH�IROORZLQJ�< �� �1R�DXWKRUL]DWLRQ�FKHFN< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�VDPH�XVHU��QR�FKHFN�IRU�VDPH�XVHU�FRQWH[W
DQG�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��65)&�)8*5�DOVR�FKHFNHG�
*OREDOO\�'HDFWLYDWLQJ�RU�$FWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV
<RX�FDQ�DOVR�JOREDOO\�GHDFWLYDWH�RU�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�ZLWK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��7KH�V\VWHP�GRHV�QRW�H[HFXWH�DQ\�DXWKRUL]DWLRQ�FKHFNV�IRUGHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��<RX�KDYH�VHYHUDO�RSWLRQV�WR�UHDFK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��<RX�FDQ�XVH�WKH�,0*��VHH�VWHS�����WUDQVDFWLRQ�SU25��VHH�VWHS���RU�XVH�WUDQVDFWLRQ�auth_switch_objects�GLUHFWO\�
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–14
�� &KRRVH� �QH[W�WR�6ZLWFK�RIIDXWKRUL]DWLRQ�FKHFNV�JOREDOO\��RSWLRQDO�DQG�FRQWLQXH�ZLWK�VWHS����RU�HQWHUsu25�DQG�FRQWLQXH�ZLWK�VWHS����
�� ,Q�WUDQVDFWLRQ�68����FKRRVH����'HDFWLYDWH�DXWKRUL]DWLRQ�REMHFW
JOREDOO\�
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–15
�� 5HDG�WKH�LQIRUPDWLRQ�FDUHIXOO\�DQGFKRRVH� �
�� 'HDFWLYDWH�DQ�DXWKRUL]DWLRQ�REMHFWE\�GHVHOHFWLQJ�WKH�FKHFNER[�QH[W�WRLW��7KH�GHVHOHFWHG�OLQH�LV�KLJKOLJKWHGLQ�UHG�
�� &KRRVH� �
�� 7R�DFWLYDWH�\RXU�GDWD��FKRRVH� �
�� )RU�D�GHWDLOHG�H[SODQDWLRQ�DERXW�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH� �QH[WWR�WKH�DXWKRUL]DWLRQ�REMHFW�
&KRRVH� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RII�7R�YLHZ�WKH�FRORU�OHJHQG��FKRRVH� �
6 Tip
5
3
4 7
Tip
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–16
�� <RX�UHFHLYH�GHWDLOHG�LQIRUPDWLRQDERXW�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�
�� &ORVH�WKH�ZLQGRZ�WR�UHWXUQ�
:KHQ�\RX�VDYH�DQG�DFWLYDWH�\RXU�GDWD��WKH�V\VWHP�DOVR�FKHFNV�WKH�DXWKRUL]DWLRQ�REMHFW6B86(5B2%-�
7KH�YDOXHV�IRU�WKH�V\VWHP�SDUDPHWHU�DXWK�REMHFWBGLVDEOLQJBDFWLYH�FDQ�EH�DQ�;�RU�EODQN��7KH;�LQGLFDWHV�WKDW�WKH�SDUDPHWHU�LV�DFWLYH�DQG�WKH�EODQN�LQGLFDWHV�WKDW�LW�LV�QRW��,I�LW�LV�QRWDFWLYH��ZLWK�68���JRW�VZLWFKHG�RII��\RXU�FKDQJHV�ZLOO�QRW�DIIHFW�DQ\WKLQJ��+RZHYHU��WKHGHIDXOW�YDOXH�LV�VHW�WR�DFWLYH�
8
9
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–17
��� $XWKRUL]DWLRQ�REMHFWV�EHJLQQLQJZLWK�6B�RU�3B�FDQQRW�EH�VZLWFKHG�RII�
,I�\RX�WU\�WR�VZLWFK�WKRVH�REMHFWV�RIIDQG�VDYH�WKHP��\RX�ZLOO�UHFHLYH�DZDUQLQJ�PHVVDJH�
��� 7KH�V\VWHP�LJQRUHV�WKDW�\RX�KDYHVZLWFKHG�RII�WKRVH�DXWKRUL]DWLRQREMHFWV�
��� &KRRVH� �
<RX�FDQQRW�JOREDOO\�GHDFWLYDWH�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK�6B��%DVLV��RU�3B�+5��LQ�WUDQVDFWLRQ�$87+B6:,7&+B2%-(&76�
1R�DXWKRUL]DWLRQ�GDWD�LV�LQVHUWHG�LQ�WKH�3*�IRU�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��,Q�DUHOHDVH�XSJUDGH��WKH�V\VWHP�GRHV�QRW�GLVSOD\�WKH�WUDQVDFWLRQV�ZKHUH�DXWKRUL]DWLRQ�GDWDZLOO�EH�UHSURFHVVHG�LI�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�REMHFW�LV�JOREDOO\�GHDFWLYDWHG�
:KHQ�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��\RX�PD\�KDYH�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�IRU�PDQ\�DFWLYLW\�JURXSV�
,I�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��WKHVH�REMHFWV�DUH�QRWFRQWDLQHG�LQ�DQ\�DFWLYLW\�JURXSV��,Q�WKLV�FDVH��LQ�WKH�WUDQVDFWLRQ�3)&*�RQ�WKH
10
12
11
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–18
$XWKRUL]DWLRQV�WDE��FKRRVH� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�WR�JHQHUDWH�SURILOHV�DQG�WKHRSWLRQ�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�WKH�QHZ�GDWD��0DLQWDLQ�DQ\�PLVVLQJ�DXWKRUL]DWLRQYDOXHV�DQG�UHJHQHUDWH�WKH�SURILOH�
3DUDPHWHU�7UDQVDFWLRQV
7KH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ�WR�RWKHU�WUDQVDFWLRQV��7KHVH�WUDQVDFWLRQV�ZRUNZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��ZKLFK�LV�UHVWULFWHG�E\�WKH�IDFW�WKDW�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�
<RX�FDQQRW�H[FOXGH�DXWKRUL]DWLRQ�REMHFWV�IURP�GLUHFW�XVH�LQ�SDUDPHWHU�WUDQVDFWLRQV��EXW�RQO\ZLWK�WKH�FRUUHVSRQGLQJ�FRUH�WUDQVDFWLRQ�
([DPSOH�
3DUDPHWHU�WUDQVDFWLRQ� �)��9��0DQDJHPHQW�RI�'RFXPHQW�$UFKLYHV�
&RUH�WUDQVDFWLRQ� �6$5$��$UFKLYH�0DQDJHPHQW�
7R�VHW�WKH�FKHFN�LQGLFDWRU�RI�WUDQVDFWLRQ�)��9�WR�1��QR�FKHFN���\RX�QHHG�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�RI�WKH�FRUH�WUDQVDFWLRQ�6$5$��<RX�FDQ�ILQG�WKH�QDPH�RI�WKLV�WUDQVDFWLRQ�LQ�WKHULJKW�KDQG�FROXPQ�7&RGH�RYHUYLHZ�LQ�WUDQVDFWLRQ�68����,I�\RX�GRXEOH�FOLFN�RQ�WKHSDUDPHWHU�WUDQVDFWLRQ�FRGH�LQ�ILHOG�7&RGH��WKH�V\VWHP�EUDQFKHV�GLUHFWO\�LQWR�WKH�FKHFNLQGLFDWRU�PDLQWHQDQFH�RI�WKH�FRUH�WUDQVDFWLRQ�
,I�WKH�DXWKRUL]DWLRQ�REMHFW�IRU�SDUDPHWHU�WUDQVDFWLRQ�)��9�LV�VHW�WR�&��FKHFN���EXW�XQGHU�WKHFRUH�WUDQVDFWLRQ�LW�LV�VHW�WR�&0��FKHFN�PDLQWDLQ���WKH�ILHOG�YDOXHV�IRU�6$5$�ZLOO�EHVXJJHVWHG�DV�GHIDXOWV�LQ�WKH�3*��,I�WKH�DXWKRUL]DWLRQ�REMHFW�LV�DOVR�VHW�WR�&0�LQ�)��9��WKHILHOG�YDOXHV�PDLQWDLQHG�IRU�)��9�ZLOO�EH�UHFRPPHQGHG�DV�GHIDXOWV�LQ�WKH�3*��DQG�WKH�HQWULHVIRU�6$5$�ZLOO�EH�RYHUZULWWHQ��<RX�FDQ�PDLQWDLQ�RU�RYHUZULWH�WKH�ILHOG�YDOXHV�RI�WKH�FRUHWUDQVDFWLRQ�IRU�SDUDPHWHU�WUDQVDFWLRQV�LQ�68���
'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�8VLQJ�68��
2SWLRQDO��1RUPDOO\�\RX�GR�QRW�KDYH�WR�PDNH�DQ\�FKDQJHV�LQ�WUDQVDFWLRQ�68���
+RZHYHU��LI�\RX�GR�PDNH�FKDQJHV�LQ�68����WKH�FKDQJHV�PXVW�EH�PDGH�LQ�WKH�'(9�V\VWHPDQG�WUDQVSRUWHG�WR�RWKHU�V\VWHPV��1HYHU�PDNH�FKDQJHV�LQ�DQ\�RWKHU�V\VWHP�
,Q�WKH�3*��\RX�KDYH�WKH�RSWLRQ�WR�GHDFWLYDWH�DQG�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�DJDLQVWGLIIHUHQW�DXWKRUL]DWLRQ�REMHFWV�
:KHQHYHU�\RX�SHUIRUP�5���WUDQVDFWLRQV��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG�WKDW�DULVHWKURXJK�ZRUN�DUHDV�FDOOHG�LQ�WKH�EDFNJURXQG��)RU�WKH�DXWKRUL]DWLRQ�FKHFNV�WR�EH�VXFFHVVIXO�WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��)RU�WKLV�UHDVRQ��PRVW�XVHUV�UHFHLYH�PRUHDXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHG�PDLQWHQDQFH�ORDG��%XW�WKH�FRUHWUDQVDFWLRQ�LV�DOZD\V�SURWHFWHG�E\�REMHFW�6B7&2'(��DQG�DXWKRUL]DWLRQ�FKHFNV�WKDW�EHORQJ�WR
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–19
SXUH�EDFNJURXQG�IXQFWLRQV�DUH�GHDFWLYDWHG���7KLV�KDV�QRWKLQJ�WR�GR�ZLWK�EDFNJURXQGSURFHVVLQJ��
,Q�5����PDQ\�DXWKRUL]DWLRQ�REMHFWV�JR�XQXVHG�E\�PRVW�FXVWRPHUV��<RX�FDQ�GHDFWLYDWH�WKHDXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKH�REMHFWV�XVLQJ�WUDQVDFWLRQ�68�����0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV��7KLV�GHDFWLYDWLRQ�UHVXOWV�LQ�FOHDU�DXWKRUL]DWLRQ�SURILOHV�DQG�EHWWHUSHUIRUPDQFH�
<RX�FDQ�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ\�RI�WKH�IROORZLQJ�UHDVRQV�< 1RW�DOO�DXWKRUL]DWLRQ�REMHFWV�DUH�XVHG��IRU�LQVWDQFH��)B/)$�B%(.�< 0DQ\�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG�ZLWK�DQ�DVWHULVN�� �< $XWKRUL]DWLRQ�SURILOHV�DUH�WRR�ODUJH< (DFK�WUDQVDFWLRQ�LV�FKHFNHG�E\�6B7&2'(< 1HHGOHVV�DXWKRUL]DWLRQ�FKHFNV�UHGXFH�WKH�WUDQVDFWLRQ�SHUIRUPDQFH
7KH�IROORZLQJ�H[DPSOHV�LOOXVWUDWH�ZKHQ�WR�XVH�68���< ,I�D�ZDUHKRXVH�ZRUNHU�UHPRYHV�JRRGV�IURP�WKH�ZDUHKRXVH��DQG�WKH�UHPDLQLQJ�VWRFN
IDOOV�VKRUW�RI�D�FULWLFDO�OLPLW��WKH�V\VWHP�WULJJHUV�HLWKHU�D�SXUFKDVLQJ�RUGHU��D�SURGXFWLRQRUGHU��RU�ERWK��7KHVH�RSHUDWLRQV�DUH�FDUULHG�RXW�EHFDXVH�RI�WKH�V\VWHP�VHWWLQJV�DQGWKHUHIRUH�UHTXLUH�QR�IXUWKHU�DFWLRQV�E\�ZDUHKRXVH�ZRUNHUV��$FFRUGLQJO\��WKHVH�ZRUNHUVVKRXOG�QRW�KDYH�DXWKRUL]DWLRQV�IRU�SXUFKDVH�RU�SURGXFWLRQ�RUGHUV��VR�WKH�FKHFN�DJDLQVWWKLV�REMHFW�VKRXOG�EH�GHDFWLYDWHG�
< $XWKRUL]DWLRQ�REMHFW�)B/)$�B%(.��9HQGRU��$FFRXQW�DXWKRUL]DWLRQ��SURWHFWV�WKH�YHQGRUPDVWHU�UHFRUGV�DW�DFFRXQW�OHYHO��7KDW�LV��ZLWK�WKLV�REMHFW��LW�LV�SRVVLEOH�WR�GLYLGH�WKHYHQGRUV�LQWR�JURXSV�DQG�RQO\�DVVLJQ�WKH�DFFRXQWLQJ�FOHUN�WKH�PDLQWHQDQFH�DXWKRUL]DWLRQIRU�YHQGRUV�IURP�D�FHUWDLQ�JURXS��,I�\RX�GR�QRW�ZDQW�WR�PDNH�DQ\�DXWKRUL]DWLRQV�DW�WKLVOHYHO�DQG�DOORZ�DOO�DFFRXQWLQJ�FOHUNV�WR�PDLQWDLQ�DOO�YHQGRUV��LW�LV�EHVW�WR�GHDFWLYDWH�WKLVREMHFW�
2QO\�LI�\RX�KDYH�VHW�WKH�FKHFN�LQGLFDWRU�WR�&0��&KHFN�0DLQWDLQ���ZLOO�WKH�DXWKRUL]DWLRQDQG�SUHGHILQHG�DXWKRUL]DWLRQ�ILHOG�YDOXHV�EH�GLVSOD\HG�IRU�FKDQJLQJ�
5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV
$XWKRUL]DWLRQ�FKHFNV�DUH�FDUULHG�RXW�ZKHUHYHU�WKH\�DUH�VSHFLILFDOO\�ZULWWHQ�LQWR�WKH�VRXUFHFRGH�RI�D�WUDQVDFWLRQ��+RZHYHU��ZLWK�WUDQVDFWLRQ�68���\RX�FDQ�VHW�FKHFN�LQGLFDWRUV�WRH[FOXGH�FHUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRUL]DWLRQ�FKHFNV��<RX�FDQ�H[FOXGH�SDUWLFXODUDXWKRUL]DWLRQ�FKHFNV�HLWKHU�LQ�VSHFLILF�WUDQVDFWLRQV�RU�5���6\VWHP�ZLGH��ZLWKRXW�FKDQJLQJWKH�SURJUDP�FRGH�
%HIRUH�WKH�DXWKRUL]DWLRQ�SURILOH�LV�DXWRPDWLFDOO\�JHQHUDWHG��XVH�WKH�FKHFN�LQGLFDWRUV�WRFRQWURO�ZKLFK�REMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�GLVSOD\�
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–20
0DLQWDLQLQJ�&KHFN�,QGLFDWRUV�IRU�7UDQVDFWLRQ�&RGHV
7R�DFFHVV�WKH�WUDQVDFWLRQ�IRU�PDLQWDLQLQJ�FKHFN�LQGLFDWRUV��HQWHU�WUDQVDFWLRQ�SU24�LQ�WKH�&RPPDQG�ILHOG��RUQDYLJDWH�XVLQJ�WKH�,0*��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�\RX�KRZ�WR�JHW�WR�0DLQWDLQ�FKHFN�LQGLFDWRUWUDQVDFWLRQ�XVLQJ�WKH�,0*��WUDQVDFWLRQ�FRGH�SPRO���,I�\RX�HQWHU�SU24�GLUHFWO\��VWDUW�ZLWK�VWHS���
�� ,Q�WKH�,0*�IROORZ�WKH�PHQX�SDWK%DVLV�&RPSRQHQWV�→�6\VWHP$GPLQLVWUDWLRQ�→�8VHUV�DQG$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ�WKH3URILOH�*HQHUDWRU�→�:RUN�RQ�6$3&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV�DQGFKRRVH� �QH[W�WR�WKDW�OLQH�
�� 6HOHFW�&KDQJH�WHVW�VWDWXV��WKLVWUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&KDQJH�FKHFN�LQGLFDWRU��
�� &KRRVH� �&KRRVH�
1
2
3
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–21
�� 6HOHFW�0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV�
�� (QWHU�HLWKHU�D�VLQJOH�WUDQVDFWLRQ�FRGH�IRU�H[DPSOH�MK01��RU�D�UDQJH�RIFRGHV�IRU�ZKLFK�\RX�ZDQW�WR�OLVW�WKHFKHFN�LQGLFDWRUV�
�� &KRRVH� �WR�H[HFXWH�
�� 6HOHFW�WKH�DSSURSULDWH�WUDQVDFWLRQ��LQRXU�H[DPSOH��RQO\�RQH�LV�VKRZQ��EXWPRUH�WKDQ�RQH�FRXOG�DSSHDU��
�� &KRRVH� �&KHFN�LQGLFDWRU�WR�GLVSOD\WKH�FXUUHQW�DFWLYH�FKHFN�LQGLFDWRUVIRU�DXWKRUL]DWLRQ�REMHFWV�LQ�WKHVHOHFWHG�WUDQVDFWLRQV�
,I�\RX�DUH�GHDOLQJ�ZLWK�D�SDUDPHWHUWUDQVDFWLRQ��WKH�FRUH�WUDQVDFWLRQ�DSSHDUVLQ�WKH�7FRGH��RULJLQDO��FROXPQ��)RU�PRUHLQIRUPDWLRQ��VHH�3DUDPHWHU�7UDQVDFWLRQVRQ�SDJH���²���
4
5
6
7
8
Tip
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–22
$�OLVW�RI�DXWKRUL]DWLRQ�REMHFWVDSSHDUV�LQ�WKH�2EMHFW�FROXPQ�IRU�WKHVHOHFWHG�WUDQVDFWLRQ�LQYROYHG�ZLWKWKH�FKHFN�
�� &KRRVH� �)LHOG�YDOXHV�
1RWH��7KHUH�DUH�WKUHH�REMHFWV�WKDWKDYH�WKH�FKHFN�LQGLFDWRU�VHW�WR�&0�
7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�862%;B&�
([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV
&0� �&KHFN�0DLQWDLQ
< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU
FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�
&� �&KHFN
< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW
GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�
1� �1R�FKHFN
< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW
GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�
8� �8QPDLQWDLQHG
< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW
GLVSOD\HG�
9
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–23
7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��
��� 7KUHH�REMHFWV�JHW�GLVSOD\HG�ZLWKSUHGHILQHG�YDOXHV��VLQFH�RQO\�WKUHHREMHFWV�KDG�WKH�FKHFN�LQGLFDWRU�VHW�WR&KHFN�0DLQWDLQ�
��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU��FKRRVH�WR�WRJJOH�EHWZHHQ�GLVSOD\�DQG
FKDQJH�PRGH�
7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�8627B&�
��� (QWHU�D�WUDQVSRUWDEOH�FKDQJH�UHTXHVWQXPEHU��RU�XVH� �WR�FUHDWH�D�QHZRQH�
��� &KRRVH� �
��� 7R�FKDQJH�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�RQH�RI�WKH�REMHFWV��FKRRVH�QH[W�WR�WKH�REMHFW·V�ILHOG�QDPH��IRU
H[DPSOH��WKH�REMHFW�)B/)$�B$33DQG�WKH�ILHOG�$33.=��
10
11
12
13
14
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–24
��� 6HOHFW�WKH�GHVLUHG�YDOXH��IRUH[DPSOH��ZH�DGGHG�)�)LQDQFLDO$FFRXQWLQJ��
��� &KRRVH� �
��� 7KH�YDOXH�ZDV�DGGHG�
��� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHDQ\�FKDQJHV�\RX�PLJKW�KDYH�PDGH�
7R�GLVSOD\�WKH�ORQJ�WH[W�IRU�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH�2EMHFW�GHVFU�
��� ,Q�WKH�9DOXH��LQWHUYDO��FROXPQ�UHYLHZ�\RXU�FKDQJHV��WKLV�LV�WDEOH862%7B&��ZKLFK�UHSUHVHQWVFXVWRPHU�VHWWLQJV��
��� ,Q�WKH�6$3�YDOXH��LQWHUYDO��FROXPQ�QRWLFH�WKH�RULJLQDOO\�GHOLYHUHG�6$3GHIDXOW�YDOXHV��WKLV�LV�WDEOH�862%7�ZKLFK�UHSUHVHQWV�6$3�GHIDXOWV��9DOXHV�WKDW�KDYH�FKDQJHG�IURP�WKH6$3�GHIDXOWV�DUH�LQ�FRORU�
��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �
��� &KRRVH� �RU� �6$3�GHIDXOWV�WR�KLGHWKH�6$3�GHIDXOW�YDOXHV�
7R�VNLS�\RXU�FKDQJHV��FKRRVH� �IRU�WKH�DSSURSULDWH�YDOXH�\RX�FKDQJHG�
15
16
17
18 Tip
19 20
Tip
21 22
22
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–25
��� &KRRVH� �WR�VZLWFK�WR�FKDQJH�PRGHIRU�WKH�FKHFN�LQGLFDWRUV�
��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU�IRU�DQREMHFW��FOLFN�LQ�WKH�DSSURSLDWHFROXPQ��8��1��&��&0��
1RWLFH�KRZ�WKH�FXUVRU�FKDQJHV�WR�DQLFRQL]HG�KDQG�DV�\RX�PRYH�RYHU�WKHFKHFN�LQGLFDWRUV�
,Q�WKLV�H[DPSOH��ZH�FOLFNHG�LQ�WKH�1FROXPQ�WR�VHW�WKH�FKHFN�LQGLFDWRU�IRUREMHFW�)B/)$�B%(.�WR�1R�FKHFN�
��� 7KH�FKHFN�LQGLFDWRU�KDV�VXFFHVVIXOO\EHHQ�FKDQJHG�WR�1��7KHUHIRUH�)B/)$�B%(.�ZLOO�QR�ORQJHU�EHFKHFNHG�LQ�WUDQVDFWLRQ�0.���
��� 6HOHFW�DQ�REMHFW�DQG�FKRRVH�$XWK��REM��WR�YLHZ�D�ZKHUH�XVHG
OLVW�
��� <RX�KDYH�WR�GHWHUPLQH�D�VSHFLILFWUDQVDFWLRQ�FRGH�UDQJH��7R�VHDUFKWKURXJK�DOO�H[LVWLQJ�WUDQVDFWLRQFRGHV��HQWHU�DQ�DVWHULVN�� ��
��� &KRRVH� �
24
23
26
25
27
28
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–26
��� 7KH�JHQHUDWHG�OLVW�VKRZV�DOOWUDQVDFWLRQV�ZKHUH�WKH�VHOHFWHGDXWKRUL]DWLRQ�REMHFW�LV�XVHG�
��� &KRRVH� �
��� &KRRVH�6$3�GHIDXOWV�WR�GLVSOD\�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�LQ�WKHVDPH�OLVW�
29
30
31
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–27
%RWK�WDEOH�HQWULHV�LQ�WDEOHV�862%;DQG�862%;B&�QRZ�DSSHDU�IRU�WKHVHOHFWHG�WUDQVDFWLRQ��LQ�WKLV�H[DPSOH�0.����
��� ,Q�WKH�&KHFN�,'�FROXPQ��UHYLHZ�WKHFXUUHQW�DFWLYH�FKHFN�LQGLFDWRUV�IRUWKLV�WUDQVDFWLRQ��HQWULHV�LQ�WDEOH862%;B&��
��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��UHYLHZWKH�6$3�FKHFN�LQGLFDWRUV�GHIDXOWYDOXHV��HQWULHV�LQ�WDEOH�862%;��
��� 7R�VNLS�\RXU�FKDQJHV��FKRRVH� �WRUHVHW�WR�WKH�6$3�FKHFN�LQGLFDWRUGHIDXOW�YDOXH�IRU�WKLV�DXWKRUL]DWLRQREMHFW��6HWWLQJV�WKDW�GLIIHU�IURP�6$3GHIDXOWV�DSSHDU�LQ�FRORU�
��� &KRRVH� �$XWK��REM��WR�DGG�D�QHZREMHFW�IRU�FKHFNLQJ��7KHUH�PXVW�DOVREH�DQ�$87+25,7<B&+(&.�FDOO�LQWKLV�SURJUDP�IRU�WKH�QHZ�REMHFW�
��� &KRRVH� �
��� &KRRVH� �
([FHSWLRQV
$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG��7UDQVDFWLRQV�ZKRVH�FKHFN�LQGLFDWRU�FDQQRW�EHFKDQJHG�EHFDXVH�RI�D�ORFDO�ORFN��(148(8(��RU�D�ORFN�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUWV\VWHP��IRU�REMHFW�FDWDORJ�HQWU\�5�75�686.��7FRGH!��DUH�DOVR�VKRZQ�LQ�FRORU��$�VKRUWHUURU�PHVVDJH�DSSHDUV�LQ�WKH�GHVFULSWLRQ�ILHOG�
,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��
,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��
�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�
�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�
32 33
34
36 37
35
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–28
�� ,Q�WUDQVDFWLRQ�3)&*�VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�
�� 5HJHQHUDWH�WKH�SURILOH�
�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU��FKDQJHV�EHFRPH�DFWLYH�ZLWK�WKHQH[W�V\VWHP�ORJRQ�
0DVV�&KDQJH�RI�&KHFN�,QGLFDWRUV
<RX�FDQ�DOVR�JOREDOO\�FKDQJH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LQ�WUDQVDFWLRQVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW�RFFXUV��<RX�FDQ�DOVR�VSHFLILFDOO\�H[FOXGH�LQGLYLGXDOWUDQVDFWLRQV�IURP�WKH�JOREDO�FKDQJH�
7R�DFFHVV�WKH�WUDQVDFWLRQ�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV��HQWHU�WKH�WUDQVDFWLRQ�SU24LQ�WKH�&RPPDQG�ILHOG��RU�QDYLJDWH�XVLQJ�WKH�,0*�DV�GHVFULEHG�LQ�WKH�VHFWLRQ�EHIRUH��,Q�WKHIROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�JHW�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV�E\HQWHULQJ�SU24�GLUHFWO\�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SU24�DQG�FKRRVH�(QWHU�
�� 6HOHFW�(GLW�FKHFN�LQGLFDWRUV�LQ�DOOWUDQVDFWLRQV�
�� (QWHU�WKH�GHVLUHG�$XWKRUL]DWLRQ�REMHFW�IRU�H[DPSOH��)B/)$B%(.�
�� &KRRVH� �
$�OLVW�RI�WUDQVDFWLRQV�LV�GLVSOD\HG�RQWKH�QH[W�VFUHHQ��7KH�HQWHUHGDXWKRUL]DWLRQ�REMHFW�DSSHDUV�ZLWKWKH�DSSURSULDWH�FKHFN�LQGLFDWRU�SHUWUDQVDFWLRQ�
2
3
4
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–29
�� 7R�DOWHU�WKH�FKHFN�LQGLFDWRU�HLWKHU�IRUVHOHFWHG�WUDQVDFWLRQV�RU�JOREDOO\�FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�
D� 6HOHFW�WKH�WUDQVDFWLRQV�IRU�ZKLFK\RX�ZLVK�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�
E� &KRRVH� �WR�VHOHFW�DOOWUDQVDFWLRQV�ILUVW�DQG�WKHQGHVHOHFW�LQGLYLGXDO�WUDQVDFWLRQV�DVQHFHVVDU\�
7R�HQVXUH�WKDW�WKH�3*�DFWXDOO\FUHDWHV�DQ�DXWKRUL]DWLRQ��ZH�QHHG�WRFKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKHDSSURSULDWH�DXWKRUL]DWLRQ�REMHFWIURP�&��&KHFN��WR�&0�&KHFN�0DLQWDLQ��
�� 7R�VLPXOWDQHRXVO\�FKDQJH�WKH�FKHFNLQGLFDWRUV�IRU�WKH�VHOHFWHGWUDQVDFWLRQV��FKDQJH�WKH�FKHFNLQGLFDWRU�LQ�WKH�ILUVW�OLQH��ZKLFKFRQWDLQV�WKH�QDPH�RI�WKHDXWKRUL]DWLRQ�REMHFW��E\�FOLFNLQJ�LQWKH�FROXPQ�IRU�WKH�QHZ�FKHFNLQGLFDWRU�EHORZ��8��1��&��&0���:HFKRVH�&0�
7R�FKHFN�WKH�WUDQVDFWLRQ�H[HFXWHG�E\�WKH�WUDQVDFWLRQ�FRGH�GLVSOD\HG�LQ�FROXPQ�7FRGH��\RXFDQ�FKRRVH� �QH[W�WR�WKH�WUDQVDFWLRQ�DQG�LW�ZLOO�EH�H[HFXWHG�
([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV
&0� �&KHFN�0DLQWDLQ
< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU
FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�
&� �&KHFN
< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW
GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�
5a
5b
6
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–30
1� �1R�FKHFN
< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW
GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�
8� �8QPDLQWDLQHG
< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW
GLVSOD\HG�
7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��
�� 2QO\�WKH�FKHFN�LQGLFDWRU�IRU�WKHWUDQVDFWLRQV�\RX�VHOHFWHG�KDYHFKDQJHG�
�� 2QFH�D�FKHFN�LQGLFDWRU�LQ�WKH�OLVW�LVVHW�WR�&0��&KHFN�0DLQWDLQ���WKH�)OG�YDOXHV�EXWWRQ�DSSHDUV��%\
FOLFNLQJ�WKLV�EXWWRQ��\RX�FDQPDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�RI�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�IRU�DOO�WUDQVDFWLRQV�ZKRVHFKHFN�LQGLFDWRU�KDV�EHHQ�VHW�
�� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHWKH�FXUUHQW�VHWWLQJV�ZLWK�WKH�6$3GHIDXOWV�
98
7
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Release 4.6A/B12–31
��� 7KH�FKDQJHV�RI�WKH�FKHFN�LQGLFDWRUDUH�VKRZQ�LQ�UHG�
7R�KLJKOLJKW�DOO�WUDQVDFWLRQ�FRGHVWKDW�KDYH�FKDQJHG��FKRRVH�(GLW�→&KDQJHV�→�'LVSOD\�LQ�FRORU�
��� ,Q�WKH�&KHFN�,'�FROXPQ��QRWLFH�WKHFKDQJHV�\RX�PDGH��HQWULHV�LQ�WDEOH862%;B&��
��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��QRWLFHWKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWYDOXHV��HQWULHV�LQ�862%;��
&KRRVH� �6$3�GHIDXOW�LI�\RX�ZDQW�WRUHVWRUH�WKH�VHOHFWHG�WUDQVDFWLRQV�WR�WKHLURULJLQDO�GHOLYHU\�VWDWXV�VHW�E\�6$3�'XULQJ�LQVWDOODWLRQ��WKLV�VWHS�UHVWRUHV�WKHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�WR�WKHVHWWLQJ�LQ�WKH�5���6\VWHP�
��� &KRRVH� �&KHFN�,'�
��� &KRRVH�<HV�
([FHSWLRQV
$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG�
10
11 12
13Tip
14
Chapter 12: Tips and Troubleshooting
Reducing the Scope of Authorization Checks
Authorizations Made Easy12–32
,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��
,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��
�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�
�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�
�� ,Q�WUDQVDFWLRQ�3)&*��VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�
�� 5HJHQHUDWH�WKH�SURILOH�
�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU�WKDW�FKDQJHV�EHFRPH�DFWLYH�ZLWKWKH�QH[W�V\VWHP�ORJRQ�
0DLQWDLQLQJ�$XWKRUL]DWLRQV�LQ�WKH�$FWLYLW\�*URXSV
3OHDVH�VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��VLQFH�ZH�GHVFULEHG�WKLV�WRSLFWKHUH�LQ�GHWDLO�
13–1
&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG
/RJJLQJ
&RQWHQWV
Overview ................................................................................................................13–2
Audit Tools (SM20, SM19, SECR) ........................................................................13–2
Audit Tasks (SM21, STAT, ST03).......................................................................13–19
Logging Changes to User Master Records, Profiles, and Authorizations ....13–29
����
Chapter 13: SAP Security Audit and Logging
Overview
Authorizations Made Easy13–2
2YHUYLHZ
7KH�SXUSRVH�RI�WKLV�FKDSWHU�LV�WR�PDNH�\RX�DZDUH�RI�\RXU�UHVSRQVLELOLWLHV�DV�WKH�5���6\VWHPDGPLQLVWUDWRU�V��IRU�VHFXULW\��ZKLFK�LQFOXGHV�< 3URWHFWLQJ�WKH�5���6\VWHP< 3UHSDULQJ�\RX�IRU�D�FRPSXWHU�VHFXULW\�DXGLW
*HQHUDOO\��WKH�V\VWHP�DGPLQLVWUDWRU�LV�UHVSRQVLEOH�IRU�UHVSRQGLQJ�WR�WKH�ILQGLQJV�RI�DQ�5��6\VWHP�DXGLW�
,Q�WKLV�FKDSWHU��\RX�OHDUQ�KRZ�WR�DQDO\]H�DXWKRUL]DWLRQ�ORJJLQJ�IURP�D�VHFXULW\�SHUVSHFWLYH�<RX�OHDUQ�KRZ�WR�SUHSDUH�IRU�D�W\SLFDO�V\VWHP�DXGLW�
5HIHU�WR�6\VWHP�$GPLQLVWUDWLRQ�0DGH�(DV\��5HOHDVH����$�%��FKDSWHU�����WKH�VHFWLRQ6HFXULW\�$GPLQLVWUDWLRQ��ZKLFK�VHUYHG�DV�WKH�EDVLV�IRU�WKLV�FKDSWHU�
7KLV�FKDSWHU�LV�RQO\�LQWHQGHG�WR�VHUYH�DV�DQ�LQWURGXFWLRQ�WR�FRPSXWHU�VHFXULW\�&RQVLGHULQJ�WKH�JURZLQJ�LPSRUWDQFH�RI�VHFXULW\��ZH�DGYLVH�\RX�WR�ZRUN�ZLWK�\RXUDXGLWRUV��ILQDQFH�GHSDUWPHQW��OHJDO�GHSDUWPHQW��DQG�RWKHUV�ZKR�PLJKW�EH�DIIHFWHG�E\V\VWHP�VHFXULW\�
$XGLW�7RROV��60����60����6(&5�
6HFXULW\�$XGLW�/RJ��60���
:KDW
7KH�6HFXULW\�$XGLW�/RJ�UHFRUGV�WKH�VHFXULW\�UHODWHG�DFWLYLWLHV�RI�XVHUV�LQ�WKH�V\VWHP��7KHVHDFWLYLWLHV�LQFOXGH�VXFFHVVIXO�DQG�IDLOHG�< 'LDORJ�ORJRQ�DWWHPSWV< 5HSRUW�DQG�WUDQVDFWLRQ�VWDUWV< 5)&�&3,&�ORJRQV2WKHU�HYHQWV�ZULWWHQ�WR�WKH�ORJ�DUH�< /RFNHG�WUDQVDFWLRQV�RU�XVHUV< &KDQJHG�RU�GHOHWHG�
� $XWKRUL]DWLRQV� $XWKRUL]DWLRQ�SURILOHV� 8VHU�PDVWHU�UHFRUGV
< &KDQJHV�WR�WKH�DXGLW�FRQILJXUDWLRQ
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–3
7KH�ORJ�LV�FUHDWHG�HDFK�GD\��DQG�SUHYLRXV�ORJV�DUH�QRW�GHOHWHG�RU�RYHUZULWWHQ��7KH�ORJ�ILOHVFDQ�EHFRPH�QXPHURXV�DQG�ODUJH��VR�ZH�UHFRPPHQG�WKDW�WKH�ORJV�EH�SHULRGLFDOO\�DUFKLYHGEHIRUH�EHLQJ�PDQXDOO\�SXUJHG�
1RWH��7KH�ORJ�ILOHV�DUH�RSHUDWLQJ�V\VWHP�ORJ�ILOHV��7UDQVDFWLRQ�60����6HFXULW\�$XGLW�'HOHWH�2OG�$XGLW�/RJV��LV�RQH�PHFKDQLVP�WR�SXUJH�WKHVH�ILOHV��2WKHU�RSHUDWLQJ�V\VWHPDUFKLYLQJ�WHFKQLTXHV�PD\�DOVR�EH�XVHG�
$Q�DXGLW�DQDO\VLV�UHSRUW�FDQ�EH�JHQHUDWHG�IURP�WKH�DXGLW�ORJV��<RX�FDQ�DQDO\]H�D�ORFDOVHUYHU��D�UHPRWH�VHUYHU��RU�DOO�WKH�VHUYHUV�LQ�DQ�5���6\VWHP�
:K\
7KH�LQIRUPDWLRQ�LQ�WKH�VHFXULW\�DXGLW�ILOHV�FDQ�EH�PDQLSXODWHG�WR�WDLORU�WKH�DXGLW�DQDO\VLVUHSRUW�EDVHG�RQ�FHUWDLQ�FULWHULD��7KH�UHSRUW�DVVLVWV�WKH�DGPLQLVWUDWRU�WR�< 5HFRQVWUXFW�RU�DQDO\]H�LQFLGHQWV< ,PSURYH�VHFXULW\�E\�UHFRJQL]LQJ�LQDGHTXDWH�PHDVXUHV< 7UDFH�XQXVXDO�XVHU�DFWLYLWLHV< 8QGHUVWDQG�WKH�LPSDFW�RI�FKDQJHV�WR�WUDQVDFWLRQV�RU�XVHUV
+RZ
7R�VWDUW�D�VHFXULW\�DXGLW��\RX�FDQ�GR�RQH�RI�WKH�IROORZLQJ�< 6HW�WKH�SURILOH�SDUDPHWHU�UVDX�HQDEOH�WR��< '\QDPLFDOO\�VWDUW�LW�XVLQJ�WUDQVDFWLRQ�60����6HH�WKH�VHFWLRQ�6HWWLQJ�6HFXULW\�$XGLW�/RJ
3DUDPHWHUV�RQ�SDJH���²���
7KH�QXPEHU�RI�DXGLW�ORJV�FUHDWHG�E\�WKH�V\VWHP�GHSHQGV�RQ�WKH�IROORZLQJ�< <RX�PD\�FKRRVH�WR�VHW�WKH�PD[LPXP�VSDFH�IRU�WKH�VHFXULW\�DXGLW�ILOH�LQ�SDUDPHWHU
UVDX�PD[BGLVNVSDFH�ORFDO�$W�WKLV�SRLQW��ZKHQ�WKH�OLPLW�KDV�EHHQ�UHDFKHG��ORJJLQJ�ZLOO�HQG�
< <RX�FDQ�GHILQH�WKH�VL]H�RI�DQ�LQGLYLGXDO�VHFXULW\�ORJ�ILOH�WR�ILW�WKH�FKRVHQ�DUFKLYLQJPHGLD�7KLV�GHILQLWLRQ�PHDQV�WKDW�WKH�V\VWHP�SURGXFHV�VHYHUDO�ORJ�ILOHV�HDFK�GD\��DQG�WKHVH�ILOHVFDQ�EH��IRU�H[DPSOH��DUFKLYHG�SHULRGLFDOO\�RQWR�&'V��7KH�SURILOH�SDUDPHWHU�LVUVDX�PD[BGLVNVSDFH�SHUBILOH�DQG�WKH�PD[LPXP�VL]H�SHU�ILOH�LV���*%�
<RX�FDQQRW�VHW�ERWK�SDUDPHWHUV��<RX�KDYH�WR�FKRRVH�WKH�PHWKRG�E\�ZKLFK�WKH�DXGLW�ILOHVDUH�FUHDWHG�
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–4
5XQQLQJ�WKH�$XGLW�/RJ
7KLV�SURFHGXUH�DVVXPHV�WKDW�WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRU�VRPH�WLPH�DQG�WKDW�DXGLW�ORJV�KDYH�EHHQFUHDWHG�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM20�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���$QDO\VLV��
�� 2Q�WKH�6\VWHP�$XGLW�/RJ�VFUHHQ��FRPSOHWH�WKHVWHSV�EHORZ�
D� ,Q�)URP�GDWH�WLPH��HQWHU�IRU�H[DPSOH��13:00
E� 8QGHU�$XGLW�FODVVHV��VHOHFW�� 'LDORJ�ORJRQ� 7UDQVDFWLRQ�VWDUW� 5HSRUW�VWDUW
�� &KRRVH�5H�UHDG�DXGLW�ORJ�
7KLV�EXWWRQ�LV�XVHG�WR�UHDG�D�ORJ�IRU�WKH�ILUVWWLPH�
7KH�VHFXULW\�UHSRUW�LV�GLVSOD\HG�
�� 7R�UHYLHZ�WKH�GHWDLOV�RI�DQ�DXGLW�PHVVDJH��VHOHFWD�OLQH�DQG�FKRRVH� �
2b
2a
3
4
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–5
'RFXPHQWDWLRQ�IRU�WKH�PHVVDJH�DQGWHFKQLFDO�GHWDLOV�DSSHDUV��7KLV�GLVSOD\�LVPRVW�XVHIXO�ZKHQ�GLVSOD\LQJ�QHJDWLYHPHVVDJHV�VXFK�DV�IDLOHG�ORJLQV�RU�ORFNHGWUDQVDFWLRQV�
6HWWLQJ�6HFXULW\�$XGLW�/RJ�3DUDPHWHUV��60���
:KDW
7KH�DXGLW�ORJ�SDUDPHWHUV�DUH�WKH�FULWHULD�XVHG�WR�ZULWH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�LQWR�WKHDXGLW�ORJ�ILOH��7KH�SDUDPHWHUV�DUH�JURXSHG�LQWR�DXGLW�SURILOHV�WKDW�FDQ�EH�DFWLYDWHG�DW�WKHQH[W�V\VWHP�VWDUWXS��FRQILJXUDWLRQ�VWDWXV��RU�DSSOLHG�´RQ�WKH�IO\µ��G\QDPLF�FRQILJXUDWLRQ��
:K\
$XGLW�SURILOHV�QHHG�WR�EH�FUHDWHG�ILUVW�EHIRUH�DXGLW�ORJV�FDQ�EH�ZULWWHQ��7KHVH�SURILOHV�OLPLWWKH�DPRXQW�DQG�W\SH�RI�GDWD�ZULWWHQ�LQWR�WKH�VHFXULW\�DXGLW�ILOHV��PDNLQJ�WKH�VXEVHTXHQWVHFXULW\�UHSRUWV�PRUH�PHDQLQJIXO�WR�WKH�DGPLQLVWUDWRU�
+RZ
'HFLGH�ZKDW�WR�DXGLW�DQG�VHW�VHOHFWLRQ�FULWHULD�HLWKHU�DW�WKH�GDWDEDVH�OHYHO�RU�G\QDPLFDOO\�DWWKH�DSSOLFDWLRQ�VHUYHU�OHYHO�< ,I�WKH�DXGLW�FRQILJXUDWLRQ�LV�SHUPDQHQWO\�VWRUHG�DW�WKH�GDWDEDVH�OHYHO��DOO�DSSOLFDWLRQ
VHUYHUV�XVH�WKH�LGHQWLFDO�FULWHULD�WR�VDYH�HYHQWV�LQ�WKH�DXGLW�ORJ��7KH�VHWWLQJV�WDNH�HIIHFW�DWWKH�QH[W�DSSOLFDWLRQ�VHUYHU�VWDUW�
< $W�WKH�DSSOLFDWLRQ�VHUYHU�OHYHO��KRZHYHU��G\QDPLF�FKDQJHV�FDQ�EH�VHW�WR�LQGLYLGXDODSSOLFDWLRQ�VHUYHUV�DQG�GLVWULEXWHG�WR�WKH�HQWLUH�V\VWHP�7KH�QHZ�FULWHULD�UHPDLQV�LQ�HIIHFW�XQWLO�WKH�VHUYHU�LV�EURXJKW�GRZQ�
<RX�FDQ�GHILQH�XS�WR�ILYH�VHWV�RI�VHOHFWLRQ�FULWHULD�RU�ILOWHUV��7KH�V\VWHP�SDUDPHWHU�UVDX�VHOHFWLRQBVORWV��WKDW�GHILQHV�WKH�QXPEHU�RI�ILOWHUV�KDV�D�GHIDXOW�YDOXH�RI����<RX�FDQDFWLYDWH�DQ�DXGLW�LQ�WKH�G\QDPLF�FRQILJXUDWLRQ�XVLQJ�WUDQVDFWLRQ�60���
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–6
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM19�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���&RQILJXUDWLRQ��
&RQILJXUDWLRQ�VWDWXV�UHIHUV�WR�WKH�VWRUDJH�RI�WKH�SDUDPHWHUV�LQ�WKH�GDWDEDVH�
�� &KRRVH� �
�� (QWHU�D�SURILOH�QDPH��IRU�H[DPSOH��AUDPROF1��
�� &KRRVH� �
�� ,Q�WKLV�VFUHHQ��\RX�PD\�VSHFLI\�WZR�ILOWHU�JURXSVDQG�GHILQH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�WKDW�ZLOOEH�ZULWWHQ�LQWR�WKH�ORJ�
2
5
4
3
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–7
'HILQLQJ�)LOWHU�*URXS��
�� &KRRVH�WKH�)LOWHU���WDE�
�� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�*�LQ�8VHU�1DPHV�
�� ,Q�$XGLW�&ODVVHV��VHOHFW�< 'LDORJ�/RJRQ< 7UDQVDFWLRQ�6WDUW
�� 8QGHU�(YHQWV��VHOHFW�$OO�
��� 6HOHFW�)LOWHU�$FWLYH�
'HILQLQJ�)LOWHU�*URXS��
��� &KRRVH�WKH�)LOWHU���WDE�
7KLV�ILOWHU�WUDFHV�WKH�UHSRUWV�VWDUWHG�E\�RQH�XVHU�
��� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW.< (QWHU�D�XVHU�,'�LQ�8VHU�1DPHV��IRU�H[DPSOH�
GARYN��
��� ,Q�$XGLW�&ODVVHV��VHOHFW�5HSRUW�VWDUW�
��� 8QGHU�(YHQWV��VHOHFW�6HYHUH�DQG�FULWLFDO�
��� 'HVHOHFW�)LOWHU�$FWLYH�
7KLV�VHWWLQJ�DOORZV�\RX�WR�VDYH�WKH�ILOWHU�VHWWLQJV�EXW�GRHV�QRW�DFWLYDWH�WKHP�
��� &KRRVH�'HWDLO�VHWWLQJ�WR�GULOO�GRZQ�WR�WKH�DXGLWFODVV�DQG�HYHQW�FODVV�FDWHJRULHV�
7 8 9
10
12 13 14
1516
6
11
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–8
��� 6FUROO�GRZQ�WR�5HSRUW�VWDUW�
1RWLFH�WKDW�WKH�FDWHJRU\�LV�DXWRPDWLFDOO\�FKRVHQEDVHG�RQ�WKH�HDUOLHU�VHOHFWLRQ�RI�HYHQW�W\SH�DQGDXGLW�FODVV�W\SH�
��� &KRRVH� �
��� 7KH�JHQHUDO�FDWHJRULHV�DUH�FOHDUHG�LQGLFDWLQJWKDW�VHWWLQJV�ZHUH�EURZVHG�RU�GHILQHG�DW�WKHGHWDLO�OHYHO�
��� &KRRVH� �
20
18
19
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–9
��� $�V\VWHP�PHVVDJH�QRWLILHV�WKH�XVHU�WKDW�WKHSURILOH�ZDV�VDYHG�VXFFHVVIXOO\�
��� 7R�DFWLYDWH�WKH�SURILOH��VHOHFW� �
��� 7KH�SURILOH�QDPH�QRZ�DSSHDUV�LQ�WKH�$FWLYHSURILOH�ILHOG�
��� $�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKH�SURILOH�ZLOOEH�DFWLYDWHG�ZKHQ�WKH�DSSOLFDWLRQ�VHUYHU�LVUHVWDUWHG�
��� 7R�G\QDPLFDOO\�FKDQJH�WKH�VHOHFWLRQ�FULWHULD�IRURQH�RU�PRUH�DSSOLFDWLRQ�VHUYHUV�LQ�D�UXQQLQJV\VWHP��FKRRVH�WKH�'\QDPLF�FRQILJXUDW��'\QDPLFFRQILJXUDWLRQ��WDE�
21
22
23
24
25
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–10
��� ,Q�WKLV�H[DPSOH��WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRUVRPH�WLPH��LQGLFDWHG�E\�WKH�FXUUHQW�ILOH�VL]HJUHDWHU�WKDQ�]HUR��EHIRUH�EHLQJ�VWRSSHG�EULHIO\�7KH�UHG� �LQ�WKH�6WDW���6WDWXV��FROXPQ�LQGLFDWHVWKDW�WKH�DXGLW�LV�LQDFWLYH�
��� &KRRVH� �
5XQQLQJ�DQ�$XGLW�RQ�D�'LIIHUHQW�8VHU
,Q�WKLV�SURFHGXUH��ZH�UXQ�DQ�DXGLW�RQ�D�GLIIHUHQW�XVHU�DQG�FKHFN�DOO�WKH�UHSRUWV�WKDW�ZHUH�VWDUWHG�
�� 2Q�WKH�)LOWHU�WDE��HQWHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�D�XVHU�,'�LQ�8VHU�QDPHV��IRU�H[DPSOH�
Patricia��
�� 8QGHU�$XGLW�FODVVHV��VHOHFW�5HSRUW�VWDUW�
�� 8QGHU�(YHQWV��VHOHFW�$OO�
�� 8QGHU�)LOWHU����VHOHFW�)LOWHU�DFWLYH�
�� 7R�DFWLYDWH��FKRRVH� �
27
1 2 3
4
5
26
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–11
�� &KRRVH�<HV�
�� $�JUHHQ� �DSSHDUV�LQ�WKH�6WDW���6WDWXV��FROXPQDQG�D�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKHFRQILJXUDWLRQ�ZDV�DFWLYDWHG�
$XGLW�,QIRUPDWLRQ�6\VWHP��6(&5�
:KDW
7KH�$XGLW�,QIRUPDWLRQ�6\VWHP��$,6��LV�GHVLJQHG�IRU�V\VWHP�DQG�EXVLQHVV�DXGLWV�DQG�ZLOOOLNHO\�EH�UXQ�E\�LQWHUQDO�RU�H[WHUQDO�DXGLWRUV��,W�SXWV�LQ�RQH�SODFH�PDQ\�RI�WKH�5���VHFXULW\WRROV��7KH�FHQWHU�RI�WKH�$,6�LV�WKH�DXGLW�UHSRUW�WUHH��VWUXFWXUHG�DURXQG�D�UDQJH�RI�DXGLWLQJIXQFWLRQV�DQG�GHIDXOW�FRQILJXUDWLRQV�LQFOXGLQJ�< $XGLWLQJ�SURFHGXUHV�DQG�GRFXPHQWDWLRQ< $XGLWLQJ�HYDOXDWLRQV< 'RZQORDGLQJ�RI�DXGLW�GDWD
$,6�FDQ�EH�HIIHFWLYHO\�SRVLWLRQHG�DV�WKH�6$3�WRRO�IRU�LQWHUQDO�DXGLWLQJ�DQG�GDWD�SURWHFWLRQ�H[WHUQDO�DXGLWLQJ��RQJRLQJ�VHFXULW\�FRQWURO�FKHFNV��LQWHULP�DXGLWV��SUHSDUDWLRQ�RI�\HDU�HQGFORVLQJ�VWDWHPHQWV��\HDU�HQG�DXGLWV��HWF�
$,6�XVHV�VWDQGDUG�5���UHSRUWV�DQG�WUDQVDFWLRQV�WR�FRQGXFW�WKH�UHYLHZ�DQG�LV�D�VWDQGDUGFRPSRQHQW�LQ�5HOHDVH����$��+RZHYHU��\RX�FDQ�LPSRUW�WKH�$,6�LQWR�\RXU�V\VWHP�EDFN�WR5HOHDVH����'�RU�KLJKHU��)RU�PRUH�LQIRUPDWLRQ�RQ�$,6�DQG�LWV�DYDLODELOLW\��SOHDVH�UHIHU�WR
7
6
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–12
6$31HW�²�5���)URQWHQG�QRWHV�������DQG���������$,6�DOVR�SURYLGHV�DQ�LQWHUIDFH�WR�H[SRUWGDWD�WR�DQ�H[WHUQDO�DXGLWLQJ�V\VWHP�WKDW�DQDO\]HV�ILQDQFLDO�VWDWHPHQWV�
:K\
$XGLWRUV�H[DPLQH�WKH�UHVXOWV�RI�DXWRPDWHG�DQG�PDQXDO�ILQDQFLDO�DQG�V\VWHP�SURFHGXUHV�WRHQVXUH�WKDW�WKHUH�LV�D�FKHFNV�DQG�EDODQFHV�LQIUDVWUXFWXUH�WR�SUHYHQW�IUDXG�DQG�RWKHUSUREOHPV��$,6�HQDEOHV�WKH�DXGLWRUV�WR�WHVW�WUDQVDFWLRQV�DQG�UXQ�UHSRUWV�GXULQJ�WKHLQVSHFWLRQ�
+RZ
7R�VWDUW�$,6��FDOO�WUDQVDFWLRQ�SECR��7KHUH�DUH�WZR�ZD\V�WR�FRQGXFW�DQ�DXGLW�< &RPSOHWH< 8VHU�GHILQHG
&RPSOHWH�$XGLW
:KLOH�LW�LV�QRW�SRVVLEOH�WR�VKRZ�DOO�WKH�IXQFWLRQDOLW\�RI�WKH�$,6�KHUH��ZH�SURYLGH�WKH�IROORZLQJ�VFHQDULR�RILQYHVWLJDWLRQ�
,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV�→�6(&5�$XGLW�,QIR�6\VWHP��
�� 8QGHU�&KRRVH�YLHZ��VHOHFW�&RPSOHWH�DXGLW�
�� &KRRVH� �
$�FRPSOHWH�DXGLW�FRQVLVWV�RI�D�V\VWHP�DXGLW�DQGEXVLQHVV�DXGLW��7KH�VWUXFWXUH�RQ�WKLV�VFUHHQ�LV$XGLWB$OO�ZLWK�D�VWDQGDUG�YLHZ�
�� &OLFN�WKH�QRGHV�����WR�H[SDQG�WKH�IROORZLQJ�< 6\VWHP�$XGLW< %XVLQHVV�$XGLW
1
2
3
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–13
6\VWHP�$XGLW
7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�$,6�
�� 8QGHU�6\VWHP�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR5HSRVLWRU\���7DEOHV�
�� &OLFN�WKH�QRGH�����QH[W�WR�7DEOH�,QIRUPDWLRQ�
�� &KRRVH� �QH[W�WR�'DWD�'LFWLRQDU\�GLVSOD\�
1
2
3
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–14
7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RX�DUH�EURXJKWWR�WKLV�VFUHHQ�
�� &KRRVH� �
%XVLQHVV�$XGLW
�� 8QGHU�%XVLQHVV�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR&ORVLQJ��),�*/��
�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�%DODQFHV�
�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�<RX�FDQ�H[HFXWH�GLIIHUHQW�UHSRUWV�WR�LQVSHFW�WKHILQDQFLDO�EDODQFHV�
�� &KRRVH� �QH[W�WR�3URILW�DQG�/RVV�3URMHFWLRQ� 1
2
3
4
4
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–15
�� 2Q�WKLV�VFUHHQ��\RX�FDQ�HQWHU�FULWHULD�IRU�\RXUUHSRUW��WKHQ�FKRRVH� �
�� &KRRVH� �
8VHU�'HILQHG�$XGLW
<RX�FDQ�DOVR�FRQGXFW�D�XVHU�GHILQHG�DXGLW�E\�FUHDWLQJ�D�YLHZ�RU�VXEVHW�RI�D�FRPSOHWH�DXGLW�
,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV→�6(&5�$XGLW�,QIR�6\VWHP��
�� 6HOHFW�8VHU�GHILQHG�DXGLW�
�� 8QGHU�8VHU�GHILQHG�DXGLW��HQWHU�D�YLHZ�QDPH��IRUH[DPSOH��HQWHU�ZVUE��
�� &KRRVH� �
9LHZ�QDPHV�VKRXOG�VWDUW�ZLWK�<�RU�=�
12
6
3
5
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–16
�� 8QGHU�1HZ�YLHZ��LQ�1DPH��HQWHU�WKH�QDPH�RI�WKHYLHZ��IRU�H[DPSOH��ZVUE��
�� 8QGHU�6HOHFW�XVLQJ��VHOHFW�0DQXDO�6HOHFWLRQ�<RX�ZLOO�VHOHFW�WKH�SURFHGXUHV�WKDW�ZLOO�EHLQFOXGHG�LQ�WKH�YLHZ�
�� &KRRVH� �
:KHQ�\RX�FUHDWH�D�YLHZ�DQG�HQWHU�D�GLIIHUHQWQDPH�LQ�1DPH��WKH�QDPH�RI�WKH�YLHZ�LV�ZKDW�ZDVHQWHUHG�LQ�WKH�PDLQ�VFUHHQ�
:H�ZDQW�WR�LQFOXGH�DOO�WKH�SURFHGXUHV�IRU�DV\VWHP�DXGLW�LQ�WKLV�YLHZ�
�� 6HOHFW�6\VWHP�$XGLW�
�� &KRRVH� �
�� 7R�JHQHUDWH��FKRRVH� �
$�PHVVDJH�LQGLFDWHV�WKDW�WKH�JHQHUDWLRQ�ZDVVXFFHVVIXO�
��� &KRRVH� �
6
5
4
9
7
10
8
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Release 4.6A/B13–17
��� &KRRVH� �'LVSOD\�WR�FKHFN�WKH�YLHZ�RI�WKLVVWUXFWXUH�
��� &OLFN�RQ�WKH�6\VWHP�$XGLW�QRGH�����WR�H[SDQG�LW�
7KH�VFUHHQ�RQ�WKH�ULJKW�VKRZV�DOO�WKH�SURFHGXUHVIRU�WKH�$XGLWB$OO�VWUXFWXUH�ZLWK�D�=98(�YLHZ�
11
12
Chapter 13: SAP Security Audit and Logging
Audit Tools (SM20, SM19, SECR)
Authorizations Made Easy13–18
8VHU�6HFXULW\�$XGLW�-REV
0DQ\�RI�WKH�XVHU�VHFXULW\�DXGLW�MREV�SURJUDPV�DUH�LQFOXGHG�DV�SDUW�RI�WKH�$,6��DV�ZHOO�LQ�WKHVWDQGDUG�5���6\VWHP�
:KDW
7KHUH�DUH�VHYHUDO�SUHGHILQHG�6$3�VHFXULW\�UHSRUWV��LQFOXGLQJ�< 56865��� &KHFN�IRU�GHIDXOW�SDVVZRUG�RQ�XVHU�,'V�6$3 �DQG�'',&
< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�XVHUV�ZKR�DUH�ORFNHG�GXH�WR�LQFRUUHFW�ORJRQ
7KLV�UHSRUW�VKRXOG�EH�VFKHGXOHG�WR�UXQ�HDFK�GD\��MXVW�EHIRUH�PLGQLJKW�< 56865��� /LVWV�XVHUV�ZLWK�LQFRPSOHWH�DGGUHVV�GDWD< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV��ZLWK�WKH�RSWLRQ�WR�VHOHFW�WKH
FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�XVHUV�DQG�VKRZV�FKDQJHV�PDGH�WR�D�XVHU·V
VHFXULW\< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�SURILOHV�DQG�VKRZV�FKDQJHV�PDGH�WR�VHFXULW\
SURILOHV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�DXWKRUL]DWLRQV�DQG�VKRZV�FKDQJHV�PDGH�WR
VHFXULW\�DXWKRUL]DWLRQV
6RPH�RI�WKHVH�UHSRUWV�KDYH�SDUDPHWHU�WDEOHV�WKDW�QHHG�WR�EH�SURSHUO\�PDLQWDLQHG�IRU�EHVWXVH��5HYLHZ�DQG�DQDO\]H�WKHVH�UHSRUWV�EDVHG�RQ�\RXU�NQRZOHGJH�RI�WKH�FRPSDQ\��+RZHYHU�EH�DZDUH�WKDW�VHFXULW\�LVVXHV�PD\�H[LVW��,I�\RX�KDYH�D�VPDOO�FRPSDQ\��WKHVH�LVVXHV�FDQQRW�EHDYRLGHG�EHFDXVH�RQH�SHUVRQ�RIWHQ�PXVW�ZHDU�PDQ\�GLIIHUHQW�KDWV�
:K\
<RXU�H[WHUQDO�DXGLWRUV�PD\�UHTXLUH�VRPH�RI�WKHVH�UHSRUWV�WR�EH�H[HFXWHG�DV�SDUW�RI�WKHDQQXDO�ILQDQFLDO�DXGLW�
+RZ
<RX�FDQ�XVH�RQH�RI�WKH�IROORZLQJ�WUDQVDFWLRQV�RU�PDQQHUV�< 6$����$%$3��([HFXWH�3URJUDP�
7KLV�WUDQVDFWLRQ�RQO\�DOORZV�WKH�SURJUDP�WR�EH�H[HFXWHG�< 6(����7KH�REMHFW�QDYLJDWRU�
< 7KH�8VHU�,QIRUPDWLRQ�6\VWHP�2QO\�WKH�6$���PDQQHU�LV�GHVFULEHG�EHORZ�
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Release 4.6A/B13–19
6$���²�$%$3��([HFXWH�3URJUDP
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SA38�DQG�FKRRVH�(QWHU�
�� ,Q�3URJUDP��HQWHU�WKH�UHSRUWQDPH�
�� &KRRVH� �
�1RWHV�IRU�6SHFLILF�5HSRUWV
56865�����OLVWV�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV��< 7KHVH�FRPELQDWLRQV�DUH�PDLQWDLQHG�RQ�WDEOH�68.5,�< 'DQJHURXV�FRPELQDWLRQV�LQFOXGH�WKH�IROORZLQJ�WUDQVDFWLRQV�
� 5=����ZLWK�DQ\WKLQJ�� 5=����ZLWK�DQ\WKLQJ�� 6(�� �ZLWK�DQ\WKLQJ�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�
$XGLW�7DVNV��60����67$7��67���
5HYLHZLQJ�9DOLGLW\�RI�1DPHG�8VHUV
:KDW
$OO�XVHUV�ZKR�KDYH�OHIW�WKH�FRPSDQ\�VKRXOG�KDYH�WKHLU�5���DFFHVV�WHUPLQDWHG�LPPHGLDWHO\�%\�ORFNLQJ�RU�GHOHWLQJ�WKHVH�XVHU�,'V��\RX�OLPLW�DFFHVV�WR�RQO\�WKRVH�XVHUV�ZKR�VKRXOG�KDYHDFFHVV�WR�5����3HULRGLF�UHYLHZ�DVVXUHV�WKDW�WKH�WDVN�RI�ORFNLQJ�RU�GHOHWLQJ�KDV�EHHQFRPSOHWHG�
1RWH��,I�WKH�+5�PRGXOH�LV�LPSOHPHQWHG��WKHUH�DUH�PHFKDQLVPV�WKDW�LQWHJUDWH�ZLWK�WKHDXWKRUL]DWLRQ�V\VWHP�WR�KDYH�VXFK�FKDQJHV�LQ�XVHU�DFFHVVHV�RFFXU�DXWRPDWLFDOO\�
:K\
3URSHU�DXGLW�FRQWURO�UHTXLUHV�WKDW�D�XVHU�ZKR�QR�ORQJHU�KDV�D�YDOLG�EXVLQHVV�QHHG�WR�DFFHVV5���VKRXOG�QRW�EH�DOORZHG�WR�GR�VR�
3
2
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Authorizations Made Easy13–20
'HOHWLQJ�RU�ORFNLQJ�WKHVH�XVHU�,'V�DOVR�SUHYHQWV�DQ\RQH�ZKR�KDG�EHHQ�XVLQJ�WKH�WHUPLQDWHGXVHU�,'�IURP�DFFHVVLQJ�WKH�V\VWHP�ZLWK�WKDW�,'�
2QH�RI�WKH�DXGLW�SURFHGXUHV�WKDW�\RXU�H[WHUQDO�DXGLWRUV�ZLOO�XVH�LV�WR�WHVW�ZKHWKHU�D�SHUVRQZKR�GRHV�QRW�QHHG�WR�DFFHVV�5���KDV�D�OLYH�XVHU�,'�
+RZ
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�68���8VHUV��
�� &KRRVH�SRVVLEOH�HQWULHV�
�� 5HYLHZ�WKH�DFWLYH�XVHUV�
9HULI\�WKDW�WKHVH�XVHUV�DUH�LQGHHGYDOLG�XVHUV�
,Q�D�ODUJH�FRPSDQ\��\RX�VKRXOG�GRD�UDQGRP�DXGLW�RQ�DW�OHDVW�WZHQW\XVHUV��7KH�PLQLPXP�QXPEHUVKRXOG�EH�GHWHUPLQHG�E\�\RXUDXGLWRUV�
2
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Release 4.6A/B13–21
5HYLHZLQJ�3URILOHV�IRU�$FFXUDF\�DQG�3HUPLVVLRQ�&UHHS
:KDW
$�SHUPLVVLRQ�FUHHS�LV�DQ�LQFUHPHQWDO�LQFUHDVH�LQ�SHUPLVVLRQV�JLYHQ�WR�D�XVHU�RYHU�WLPH��,IOHIW�XQFKHFNHG��LQFUHDVHG�SHUPLVVLRQV�PD\�JUDQW�D�XVHU�PRUH�DXWKRULW\�LQ�WKH�V\VWHP�WKDQ�LVUHTXLUHG�RU�LQWHQGHG�
:K\
8VHUV�PD\�KDYH�XQGHVLUDEOH�DXWKRUL]DWLRQ�V��RU�FRPELQDWLRQV�
<RXU�H[WHUQDO�DXGLWRUV�PD\�KDYH�DQ�DXGLW�VWHS�WR�FKHFN�IRU�SHUPLVVLRQ�FUHHS�
+RZ
<RX�FDQ�FRQGXFW�D�VSRW�DXGLW�RI�< ,QGLYLGXDOV
� 5HYLHZ�WKH�VHFXULW\�IRUPV�IRU�D�XVHU��FRPSDUH�WKHVH�IRUPV�WR�WKH�DFWLYLW\�JURXSV�DQGSURILOHV�DVVLJQHG�WR�WKDW�XVHU��DQG�LQYHVWLJDWH�LQFRQVLVWHQFLHV�
� 5HYLHZ�WKH�DFWLYLW\�JURXSV�DQG�SURILOHV�DVVLJQHG�WR�WKH�LQGLYLGXDO�IRU�UHDVRQDEOHQHVV�
� 5HYLHZ�WKH�LQGLYLGXDO�SURILOHV�DVVLJQHG�IRU�FRQWHQW�DQG�FKHFN�WR�VHH�LI�WKH�SURILOH�KDVEHHQ�UHFHQWO\�FKDQJHG�
< 3URILOHV��WUDQVDFWLRQ�68����DQG�DXWKRUL]DWLRQV��WUDQVDFWLRQ�68���&KHFN�WR�VHH�LI�WKH�FKDQJH�GDWH�LV�UHFHQW�
<RX�FDQ�DOVR�H[HFXWH�WKH�IROORZLQJ�DXGLW�UHSRUWV�< 56865�����XVHU�FKDQJHV�< 56865�����SURILOH�FKDQJHV�< 56865�����DXWKRUL]DWLRQ�FKDQJHV�
)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�WKHVH�UHSRUWV��VHH�WKH�8VHU�6HFXULW\�$XGLW�VHFWLRQ�RQ�SDJH���²���
6\VWHP�/RJ��60���
7KH�5���6\VWHP�ORJV�DOO�V\VWHP�HUURUV��ZDUQLQJV��SURFHVV�PHVVDJHV�LQ�WKH�V\VWHP�ORJ�6\V/RJ���DQG�XVHU�ORFNV�GXH�WR�IDLOHG�ORJ�RQ�DWWHPSWV�IURP�NQRZQ�XVHUV��7KH�6\V/RJ�ZULWHVWR�WZR�GLIIHUHQW�W\SHV�RI�ORJV�< /RFDO�/RJV< &HQWUDO�/RJV
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Authorizations Made Easy13–22
8VH�WKH�WUDQVDFWLRQ�60���WR�DFFHVV�WKH�V\VWHP�ORJ�RXWSXW�VFUHHQ��:LWK�WKLV�WUDQVDFWLRQ��\RX�FDQ�UHDG�DQ\�RIWKH�PHVVDJHV�WKDW�DUH�FRQWDLQHG�LQ�WKH�V\VWHP�ORJV��<RX�FDQ�PRGLI\�WKH�YLHZ�WR�PHHW�\RXU�QHHGV��$�ZLGHUDQJH�RI�VHOHFWLRQ�FULWHULD�LV�DYDLODEOH�WR�DQDO\]H�WKH�V\VWHP�
7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�V\VWHP�ORJ�IRU�PRQLWRULQJ�VHFXULW\�LVVXHV�VXFK�DV�IDLOHG�ORJRQDWWHPSWV�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM21�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV→�$GPLQLVWUDWLRQ�→0RQLWRULQJ�→�6\VWHP�/RJ��
�� 6SHFLI\�WKH�VHOHFWLRQ�FULWHULD�IRU�\RXUV\VWHP�ORJ�DQDO\VLV�UHSRUW��IRUH[DPSOH��)URP�GDWH�WLPH��7R�GDWH�WLPH�8VHU��7UDQVDFWLRQ�FRGH��3URFHVV�3UREOHP�FODVV��HWF�
�� �2SWLRQDO��<RX�PD\�HQWHU�WKHPHVVDJH�QXPEHUV��IRU�H[DPSOH��US-3��IRU�IDLOHG�ORJRQ�DWWHPSWV�IRUORFNHG�XVHUV��DQG�FKRRVH� �8VH�
�� &KRRVH� �WR�GLVSOD\�WKH�V\VWHP�ORJUHSRUW�
�� 2Q�WKH�6\VWHP�ORJ��/RFDO�$QDO\VLVVFUHHQ��\RX�FDQ�YLHZ�WKH�V\VWHP�ORJDQDO\VLV�UHSRUW�DQG�GULOO�GRZQ�HDFKLWHP�IRU�GHWDLO��LI�QHFHVVDU\��
�� &KRRVH� �
6
2
3
4
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Release 4.6A/B13–23
/RFDO�/RJV
(DFK�5���$SSOLFDWLRQ�6HUYHU�KDV�D�ORFDO�ORJ�WKDW�UHFHLYHV�DOO�WKH�PHVVDJHV�RXWSXW�E\�WKLVVHUYHU��6\V/RJ�UHFRUGV�WKHVH�PHVVDJHV�LQ�D�FLUFXODU�ILOH�RQ�WKH�VHUYHU���7KLV�PHDQV�WKDW�ZKHQWKLV�ORJ�ILOH�UHDFKHV�WKH�PD[LPXP�SHUPLVVLEOH�OHQJWK��6\V/RJ�RYHUZULWHV�LW��VWDUWLQJ�RYHUIURP�WKH�EHJLQQLQJ��
&HQWUDO�/RJV
:H�UHFRPPHQG�WKDW�\RX�DOVR�PDLQWDLQ�D�FHQWUDO�ORJ�ILOH�RQ�D�VHOHFWHG�DSSOLFDWLRQ�VHUYHU�(DFK�LQGLYLGXDO�DSSOLFDWLRQ�VHUYHU�WKHQ�VHQGV�LWV�ORFDO�ORJ�PHVVDJHV�WR�WKLV�VHUYHU��7KHVHUYHU�WKDW�\RX�GHVLJQDWH�WR�PDLQWDLQ�WKH�FHQWUDO�ORJ�FROOHFWV�WKH�PHVVDJHV�IURP�WKH�RWKHUDSSOLFDWLRQ�VHUYHUV�DQG�ZULWHV�WKHVH�PHVVDJHV�WR�WKH�FHQWUDO�ORJ�
7KH�FHQWUDO�ORJ�FRQVLVWV�RI�WZR�ILOHV��WKH�DFWLYH�ILOH�DQG�WKH�ROG�ILOH��WKH�ORFDWLRQ�RI�WKH�DFWLYHILOH�LV�VSHFLILHG�LQ�WKH�UVOJ�FHQWUDO�ILOH SURILOH�SDUDPHWHU��WKH�ORFDWLRQ�RI�WKH�ROG�ILOH�LV�VSHFLILHGLQ�WKH�UVOJ�FHQWUDO�ROGBILOH��
7KH�DFWLYH�ILOH�FRQWDLQV�WKH�FXUUHQW�ORJ��:KHQ�LW�UHDFKHV�WKH�PD[LPXP�VL]H��WKH�V\VWHPZULWHV�WR�WKH�ROG�ORJ�ILOH��PDNHV�WKH�SUHYLRXVO\�DFWLYH�ILOH�WKH�ROG�ILOH��DQG�FUHDWHV�D�QHZDFWLYH�ILOH��7KH�VZLWFK�RFFXUV�ZKHQ�WKH�VL]H�RI�WKH�DFWLYH�ORJ�ILOH�LV�KDOI�WKH�YDOXH�DV�VSHFLILHGLQ�WKH�UVOJ�PD[BGLVNVSDFH�FHQWUDO SDUDPHWHU�
6WDWLVWLF�5HFRUGV�LQ�&&06��67$7�
7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06��SHUIRUPDQFH�DQDO\VLV�WRROV�ZLWKLQ�5��ORJV�DOO�5���DFWLYLWLHV�FDWHJRUL]HG�E\�WUDQVDFWLRQ�DQG�XVHU�LQ�VWDWLVWLFDO�UHFRUGV�WKDW�FDQ�EHXVHIXO�IRU�DXGLW�WUDLO�SXUSRVHV��<RX�FDQ�DFFHVV�WKHVH�UHFRUGV�ZLWK�WKH�WUDQVDFWLRQ�67$7�RUIURP�WKH�6$3�VWDQGDUG�PHQX��7KLV�WUDQVDFWLRQ�SURYLGHV�\RX�ZLWK�WKH�GHWDLOHG�VWDWLVWLFDOUHFRUGV��LQFOXGLQJ�XVHU�VWDWLVWLFV��
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Authorizations Made Easy13–24
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�STAT�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ0RQLWRU�→�3HUIRUPDQFH�→�:RUNORDG→�6WDWLVWLFV�UHFRUGV��
�� 3URYLGH�WKH�GHVLUHG�VHOHFWLRQ�FULWHULD�IRU�H[DPSOH��E\�HQWHULQJ�FULWHULD�IRUXVHU��WUDQVDFWLRQ��SURJUDP��WDVNW\SH��ZRUN�SURFHVV�QXPEHU��VWDUW�WLPH��HWF���
�� &KRRVH� �WR�GLVSOD\�WKH�VWDWLVWLFUHFRUGV�
7KH�:RUNORDG��'LVSOD\�6WDWLVWLFDO5HFRUGV�VFUHHQ�DSSHDUV�
�� 3ODFH�WKH�FXUVRU�LQ�WKH�XVHU�LQIRUPDWLRQ�DQG�GRXEOH�FOLFN�IRUIXUWKHU�GHWDLOHG�LQIRUPDWLRQ�
�� &KRRVH� �
5
2
3
4
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Release 4.6A/B13–25
67���²�8VHU�3URILOH
7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06���WUDQVDFWLRQ�67���¥�8VHU�3URILOH��FDQ�EH�XVHG�WR�FROOHFWLQIRUPDWLRQ�DERXW�< 7KH�VHUYHUV�DQG�ORJJHG�RQ�XVHUV< 8VHU�DQG�VHUYHUV�LQ�XVH
7KH�XVHU�SURILOH�OLVW�SURYLGHV�\RX�ZLWK�DQ�RYHUYLHZ�RI�WKH�ORJJHG�RQ�XVHUV�DQG�WKHLU�DFFXPXODWHG�UHVSRQVHWLPHV��7KH�GHWDLO�VFUHHQ�VKRZV�WKH�OLVW�RI�XVHUV�WRJHWKHU�ZLWK�WKHLU�GLDORJ�VWHSV�DFWLYLW\�DQG�UHVSRQVH�WLPHV�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�ST03�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�$GPLQLVWUDWLRQ�→�0RQLWRU�→3HUIRUPDQFH�→�:RUNORDG�→�67���¥$QDO\VLV��
�� &KRRVH�3HUIRUPDQFH�GDWDEDVH�
�� &KRRVH�RQH�RI�WKH�IROORZLQJ�ZKHQWKH�GLDORJ�ER[�DSSHDUV�< 6LQJOH�VWDW��UHFRUGV< 7RGD\·V�ZRUNORDG< /DVW�PLQXWH�ZRUNORDG< /RFDO�DOHUW�PRQLWRU
�� &KRRVH�*RWR�→�8VHU�3URILOH�WR�REWDLQWKH�:RUNORDG��8VHU�3URILOH�5HSRUW�
2
3
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Authorizations Made Easy13–26
�� 7KH�:RUNORDG��8VHU�3URILOH�5HSRUWVFUHHQ�DSSHDUV�
�� 'RXEOH�FOLFN�RQ�WKH�XVHU�QDPH�LQ�WKH8VHU�FROXPQ�WR�REWDLQ�DGGLWLRQDOGHWDLOHG�LQIRUPDWLRQ�UHJDUGLQJ�WKHWUDQVDFWLRQ�DFWLYLW\�E\�XVHU�LQ�D�OLVWIRUPDW�
7KH�GHWDLOHG�WUDQVDFWLRQ�LQIRUPDWLRQDSSHDUV�IRU�WKH�FKRVHQ�XVHU�
�� &KRRVH� �
7
6
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Release 4.6A/B13–27
/RJJLQJ�RI�6SHFLILF�$FWLYLWLHV
5���ORJV�RWKHU�VSHFLILF�DFWLYLWLHV�LQ�YDULRXV�ORJV��:H�GLVFXVV�WKH�IROORZLQJ�VSHFLILF�ORJVEHORZ�
/RJJLQJ�&KDQJHV�WR�7DEOH�'DWD
:H�UHFRPPHQG�WKDW�\RX�DFWLYDWH�WKH�ORJJLQJ�RI�WDEOH�GDWD�IRU�WKRVH�WDEOHV�WKDW�DUH�FULWLFDO�RUVXVFHSWLEOH�WR�DXGLWV��$JDLQ��\RX�PXVW�H[SOLFLWO\�DFWLYDWH�WKLV�ORJJLQJ��1RWH�WKH�IROORZLQJ�< <RX�PXVW�VWDUW�WKH�5���6\VWHP�ZLWK�WKH�UHF�FOLHQW SURILOH�SDUDPHWHU�VHW��7KLV�SDUDPHWHU
VSHFLILHV�5���ORJV�IRU�DOO�FOLHQWV�RU�RQO\�VSHFLILF�FOLHQWV��:H�UHFRPPHQG�VHWWLQJ�WKLVSDUDPHWHU�WR�ORJ�DOO�FOLHQWV�LQ�\RXU�SURGXFWLYH�V\VWHP�
< 6HW�WKH�/RJ�GDWD�FKDQJHV IODJ�IRU�WKRVH�WDEOHV�WKDW�\RX�ZDQW�WR�KDYH�ORJJHG��,I�ERWK�RIWKHVH�FRQGLWLRQV�DUH�PHW��WKH�GDWDEDVH�ORJV�WDEOH�FKDQJHV�LQ�WKH�WDEOH�'%7$%357��6HWWLQJ�WKH�/RJ�GDWD�FKDQJHV IODJ�RQO\�GRHV�QRW�VXIILFH�LQ�UHFRUGLQJ�WDEOH�FKDQJHV��\RXPXVW�DOVR�VHW�WKH�UHF�FOLHQW SDUDPHWHU���<RX�FDQ�YLHZ�WKHVH�ORJV�ZLWK�WKH�WUDQVDFWLRQ6&8���:LWKLQ�5���5HOHDVH����$�RU�JUHDWHU��\RX�PD\�FDOO�UHSRUW�56973527�IRU�WKHHYDOXDWLRQ�RI�WKH�ERWK�� 7KH�FXVWRPL]LQJ�REMHFW�DQG�WDEOH�ORJ�GDWDEDVH� 5HSRUW�567%+,67�IRU�WDEOH�DQDO\VLV�ZLWK�KLVWRU\
,I�D�VWDQGDUG�GHOLYHUHG�6$3�WDEOH�LV�QRW�VHW�XS�WR�SHUPLW�ORJJLQJ�RI�FKDQJHV�DQG�\RXZLVK�WR�FKDQJH�LW��WKHQ�WKLV�DFWLRQ�LV�FRQVLGHUHG�D�PRGLILFDWLRQ�WR�WKH�5���6\VWHP��7RVHH�LI�D�WDEOH�SHUPLWV�ORJJLQJ�RI�FKDQJHV��JR�WR�WUDQVDFWLRQ�6(���RU�6(���DQG�ORRN�DW�WKHGDWDEDVH�WDEOH·V�WHFKQLFDO�VHWWLQJV��WKLV�LV�D�EXWWRQ�LQVLGH�RI�WKH�VFUHHQ�ZKHUH�WKH�WDEOH�LVGHILQHG��DW�WKH�ILHOG�FDOOHG�/RJ�GDWD�FKDQJHV�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCU3�DQG�FKRRVH�(QWHU�
�� 6HOHFW�/LVW�RI�FKDQJH�GRFV�
�� &KRRVH� �WR�REWDLQ�WKH�DQDO\VLV�RIWKH�FKDQJH�GRFXPHQWV�OLVW�IRU�ERWKFXVWRPL]LQJ�REMHFWV�DQG�WDEOHV�
2
3
Chapter 13: SAP Security Audit and Logging
Audit Tasks (SM21, STAT, ST03)
Authorizations Made Easy13–28
�� 5XQ�WKH�(YDOXDWLRQ�RI�FKDQJH�ORJVSURJUDP��56973527�IRU�WKHHYDOXDWLRQ�RI�ERWK�WKH�FXVWRPL]LQJREMHFW�DQG�WDEOH�ORJ�GDWDEDVH��ZLWKWKH�DSSURSULDWH�VHOHFWLRQ�FULWHULD�
�� &KRRVH� �WR�WKH�GLVSOD\�WKH�UHFRUGV�
7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RXDUH�EURXJKW�WR�WKH�(YDOXDWLRQ�RIFKDQJH�ORJV�VFUHHQ�
�� &KRRVH� �
5
6
Chapter 13: SAP Security Audit and Logging
Logging Changes to User Master Records, Profiles, and Authorizations
Release 4.6A/B13–29
/RJJLQJ�&KDQJHV�WR�8VHU�0DVWHU�5HFRUGV��3URILOHV��DQG
$XWKRUL]DWLRQV
5���ORJV�FKDQJHV�PDGH�E\�D�XVHU�DGPLQLVWUDWRU�LQ�QRQWUDQVSDUHQW�WDEOHV�LQ�WKH�GDWDEDVH�$FFHVV�WR�WKHVH�WDEOHV�LV�SURWHFWHG�E\�WKH�5���DXWKRUL]DWLRQ�FRQFHSW��2QFH�WKHVH�ORJV�KDYHEHHQ�DUFKLYHG��WKH\�DUH�GHOHWHG��'HSHQGLQJ�RQ�\RXU�UHOHDVH��XVH�HLWKHU�WKH�DXWKRUL]DWLRQLQIRV\VWHP�RU�WUDQVDFWLRQ�68���WR�DFFHVV�WKHVH�ORJV��<RX�FDQ�YLHZ�WKH�IROORZLQJ�FKDQJHV�< &KDQJHV�PDGH�GLUHFWO\�WR�D�XVHU·V�DXWKRUL]DWLRQ
7KHVH�DUH�FKDQJHV�PDGH�WR�WKH�SURILOH�OLVW�LQ�WKH�XVHU·V�PDVWHU�UHFRUG��7KLV�GRHV�QRWLQFOXGH�LQGLUHFW�FKDQJHV�WKDW�RFFXU�ZKHQ�DXWKRUL]DWLRQV�RU�SURILOHV�DUH�FKDQJHG��9LHZWKH�FKDQJH�GRFXPHQWV�IRU�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�WR�FKHFN�WKRVH�FKDQJHV�
< &KDQJHV�WR�WKH�� 8VHU�SDVVZRUG��KDVKHG�UHSUHVHQWDWLRQ�RQO\�� 8VHU�W\SH� 8VHU�JURXS� 9DOLGLW\�SHULRG� $FFRXQW�QXPEHU
< &KDQJHV�PDGH�GLUHFWO\�WR�SURILOHV�RU�DXWKRUL]DWLRQV�
)RU�PRUH�LQIRUPDWLRQ��VHH�%&�8VHUV�DQG�$XWKRUL]DWLRQV�→�&UHDWLQJ�DQG�0DLQWDLQLQJ�8VHU0DVWHU�5HFRUGV�→�'LVSOD\LQJ�&KDQJH�'RFXPHQWV�
Chapter 13: SAP Security Audit and Logging
Logging Changes to User Master Records, Profiles, and Authorizations
Authorizations Made Easy13–30
14–1
&KDSWHU���� 8SJUDGH
&RQWHQWV
Before Doing Any Upgrade ..................................................................................14–2
Validation Steps After Upgrading Is Completed................................................14–3
Converting Previously Created SU02 Profiles into Activity Groups ...............14–4
Upgrade from a Release Prior to 3.1x to 4.6 A/B .............................................14–11
Upgrade from Release 3.0F to 4.6 A/B..............................................................14–12
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B..........................................14–14
Upgrade from Releases 4.0x or 4.5x to 4.6 A/B ...............................................14–22
����
Chapter 14: Upgrade
Before Doing Any Upgrade
Authorizations Made Easy14–2
%HIRUH�'RLQJ�$Q\�8SJUDGH
%HIRUH�GRLQJ�DQ\�XSJUDGH��\RX�VKRXOG�
�� 5HYLHZ�WKH�6$31HW�²�5���)URQWHQG�QRWHV�IRU�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ�WR�:KHQ�VHDUFKLQJ�5���6$31HW�²�5���)URQWHQG�QRWHV��SHUIRUP�VHYHUDO�VHDUFKHV��)RUH[DPSOH��ILUVW�VHDUFK�RQ�WKH�FRPSRQHQW�%&�&&0�86 ��7KHQ�VHDUFK�RQ�WKH�NH\�ZRUGVauthorization��security��DQG�user master�IRU�WKH�UHOHDVH�\RX�DUH�SODQQLQJ�WRZRUN�RQ�
�� 5HYLHZ�UHOHDVH�QRWHV�UHODWHG�WR�DXWKRUL]DWLRQV�IRU�DOO�YHUVLRQV�EHWZHHQ�WKH�YHUVLRQ�\RXDUH�FXUUHQWO\�XVLQJ�DQG�WKH�YHUVLRQ�\RX�ZLOO�EH�LPSOHPHQWLQJ��)RU�H[DPSOH��LI�\RX�DUHXSJUDGLQJ�IURP����+�WR����%��UHDG�WKH�UHOHDVH�QRWHV�IRU�YHUVLRQV����,�����$�����%�����$����%�����$��DQG����%��7R�UHYLHZ�WKH�UHOHDVH�QRWHV��FKRRVH�+HOS�→�5HOHDVH�QRWHV�RQ�\RXUV\VWHP��6HOHFW�WKH�&RPSOHWH�OLVW�5HO������DQG�WKHQ�FKRRVH�WKH�VSHFLILF�UHOHDVH�\RX�ZDQW�WRJHW�LQIRUPDWLRQ�RQ��,Q�WKH�WUHH�VWUXFWXUH�WKDW�DSSHDUV��XVH�WKH�VHDUFK�IXQFWLRQ�DQGSHUIRUP�D�VHDUFK�RQ�WKH�ZRUGV�authorization��checks��DQG�security��$OVR��\RXZLOO�ZDQW�WR�UHDG�WKH�VHFWLRQ�RQ�WKH�WUHH�EHQHDWK�%DVLV�→�&RPSXWHU�&HQWHU�0DQDJHPHQW6\VWHP�→�8VHUV�DQG�$XWKRUL]DWLRQV��5HYLHZ�WKH�UHOHDVH�QRWHV�EHFDXVH�WKH\�WHOO�\RX�ZKDWQHZ�IXQFWLRQDOLW\�LV�QRZ�DYDLODEOH��DV�ZHOO�DV�FKDQJHV�WR�H[LVWLQJ�IXQFWLRQDOLW\�WKDW�\RXPD\�QHHG�WR�FRQVLGHU�LQ�WKH�QHZ�XSJUDGHG�HQYLURQPHQW�
%H�DZDUH�WKDW�WKH�DERYH�PHQWLRQHG�UHOHDVH�QRWHV�RQO\�WHOO�\RX�ZKDW�LV�QHZ�IRU�WKH�WRROLWVHOI��,W�GRHV�QRW�WHOO�\RX�DERXW�QHZ�DXWKRUL]DWLRQV�DQG�WKH�SXUSRVH�RI�QHZDXWKRUL]DWLRQV�LQ�DSSOLFDWLRQV��)RU�LQIRUPDWLRQ�DERXW�QHZ�DXWKRUL]DWLRQ�IXQFWLRQDOLW\DYDLODEOH�ZLWKLQ�D�SDUWLFXODU�DSSOLFDWLRQ��\RX�PXVW�UHDG�WKH�UHOHDVH�QRWHV�IRU�WKDWSDUWLFXODU�DSSOLFDWLRQ�
�� 'HYLVH�D�EDFNXS�DQG�GLVDVWHU�UHFRYHU\�SODQ�IRU�DXWKRUL]DWLRQV��%H�UHDOLVWLF��,I�\RX�KDYHGRQH�H[WHQVLYH�PRGLILFDWLRQV�RU�FKDQJHV�WR�VWDQGDUG�6$3�5���ORJLF��WKHVH�FKDQJHV�PD\FDXVH�SUREOHPV�DIWHU�WKH�XSJUDGH��<RX�PD\�ZDQW�WR�FUHDWH�D�WHPSRUDU\�JURXS�RI�DFWLYLW\JURXSV�WKDW�FDQ�EH�XVHG�LQ�WKH�LQWHULP�VR�RSHUDWLRQV�FDQ�FRQWLQXH��'LVFXVV�\RXU�EDFNXSSODQ�ZLWK�WKH�SURMHFW�PDQDJHPHQW�RU�V\VWHP�DGPLQLVWUDWRUV��$�JRRG�LGHD�LV�WR�FUHDWHWKHVH�WHPSRUDU\�DFWLYLW\�JURXSV�LPPHGLDWHO\�ZKHQ�\RX�JHW�DFFHVV�WR�WKH�QHZ�V\VWHP�
�� 0DNH�FHUWDLQ�WKDW�WKH�%DVLV�WHDP�UHFRJQL]HV�DQG�DSSURSULDWHO\�DOORFDWHV�LQ�WKH�XSJUDGHWLPHOLQH�WKDW�WKH�DXWKRUL]DWLRQ�SHUVRQ�LV�DQ�LQWHJUDO�SDUW�RI�WKH�XSJUDGH�SURFHGXUH��DQGWKDW�WKH�XSJUDGH��IURP�D�WHFKQLFDO�SHUVSHFWLYH��LV�QRW�FRPSOHWH�XQWLO�WKH�DXWKRUL]DWLRQVSRUWLRQ�LV�DOVR�FRPSOHWH�
�� ,I�\RX�KDYH�PDGH�DQ\�FKDQJHV�ZLWK�68����WKHQ�LW�LV�KLJKO\�DGYLVDEOH�WKDW�\RX�GRZQORDGWR�D�ORFDO�ILOH��DQG�VDYH�RXWVLGH�RI�WKH�5���6\VWHP��WKH�FRQWHQWV�RI�WKH�WZR�WDEOHV862%7B&�DQG�862%;B&�IURP�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ��7KHVH�WDEOHV�PD\�EHQHHGHG�LQ�WKH�HYHQW�WKDW�D�GLVDVWHU�UHFRYHU\�QHHGV�WR�EH�SHUIRUPHG�
Chapter 14: Upgrade
Validation Steps After Upgrading Is Completed
Release 4.6 A/B14–3
,Q�WKLV�FKDSWHU��ZH�VKRZ�\RX�WKH�VWHSV�UHTXLUHG�DIWHU�DQ�5���6\VWHP�XSJUDGH��7KLVLQIRUPDWLRQ�LV�DGYDQWDJHRXV�LPPHGLDWHO\�DIWHU�\RXU�XSJUDGH��%H�VXUH�WR�UHDG�WKLV�FKDSWHUEHIRUH�FRQWLQXLQJ�\RXU�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU��3*��LQ�D�QHZ�UHOHDVH�
7KH�VSHFLILF�VWHSV�LQYROYHG�DIWHU�WKH�XSJUDGH�GHSHQG�RQ�WKH�VRXUFH�DQG�WDUJHW�UHOHDVH�\RXDUH�FRPLQJ�IURP�
9DOLGDWLRQ�6WHSV�$IWHU�8SJUDGLQJ�,V�&RPSOHWHG
�� ,QVWDOO�DGG�RQ�FRPSRQHQWV�WR�WKH�XSJUDGHG�V\VWHP��LI�DQ\��DORQJ�ZLWK�ZKDWHYHUDXWKRUL]DWLRQV�FRPH�ZLWK�WKDW�DGG�RQ�FRPSRQHQW��IRU�H[DPSOH�GHGXFWLRQ�PDQDJHPHQWFRPSRQHQWV��$XGLW�,QIRUPDWLRQ�V\VWHP��
�� 8SJUDGH�WKH�UHSRUW�WUHH�PLJUDWLRQ�
7KH�GDWD�VWUXFWXUH�RI�WKH�UHSRUW�WUHHV�FKDQJHV��7R�FRQWLQXH�XVLQJ�\RXU�VHOI�FUHDWHG�UHSRUWWUHHV��WKH\�PXVW�EH�DGMXVWHG�WR�WKH�FKDQJHG�GDWD�VWUXFWXUHV��7KH�6$3�SURYLGHG�UHSRUWWUHHV�JHQHUDWH�LQWR�DUHD�PHQXV�DXWRPDWLFDOO\��7KH�PLJUDWLRQ�LV�SHUIRUPHG�XVLQJ�WKHWUDQVDFWLRQ�5775((B0,*5$7,21��7KH�WUDQVDFWLRQ�LV�H[HFXWHG�LQ�WKH�FOLHQW�FRQWDLQLQJWKH�SURGXFWLRQ�YHUVLRQV�RI�WKH�UHSRUW�WUHHV��'XULQJ�WKH�PLJUDWLRQ��WUDQVDFWLRQ�FRGHV�DUHDXWRPDWLFDOO\�DVVLJQHG�IRU�DOO�UHSRUWV�LQ�D�WUHH��7KLV�PDNHV�LW�SRVVLEOH�WR�DGG�UHSRUWV�WRWKH�XVHU�PHQX�LQ�DFWLYLW\�JURXS�PDLQWHQDQFH��,I�\RX�ZDQW�WR�FUHDWH�WUDQVDFWLRQ�FRGHVZLWK�D�FRPSDQ\�VSHFLILF�SUHIL[��\RX�FDQ�VHW�WKLV�E\�JRLQJ�WR�WKH�6$3�5HIHUHQFH�,0*�DQGFKRRVLQJ�%DVLV�&RPSRQHQWV�→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUV�DQG�$XWKRUL]DWLRQV�→�6HWQDPHVSDFH�IRU�UHSRUW�WUHH�PLJUDWLRQ�DQG�VSHFLILF�,0*�DFWLYLWLHV�
�� 9DOLGDWH�WKH�XVHU�PDVWHU�UHFRUGV�IRU�QHZ�ILHOGV�ZLWK�QHZ�YDOXHV��LI�QHHGHG��68����
�� (QVXUH�WKDW�WKH�3*�DQG�RWKHU�V\VWHP�SDUDPHWHUV�DUH�VHOHFWHG�DV�UHTXLUHG��VHH�FKDSWHU���6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU��
�� 8SJUDGH�WKH�DFWLYLW\�JURXSV�ZLWK�WUDQVDFWLRQ�68���DQG�SHUIRUP�VWHSV��$�WR��'�
�� 8VH�XVHU�PDVWHU�UHFRQFLOLDWLRQ��WUDQVDFWLRQ�3)8'���LI�QHHGHG
0DNH�FHUWDLQ�WKDW�\RXU�UHSRUW�WUHHV�KDYH�XSJUDGHG�SURSHUO\��,I�XSJUDGLQJ�IURP�5HOHDVH����[RU�EHORZ�WR������VRPH�FRUH�FKDQJHV�KDYH�EHHQ�PDGH�WR�WKH�IXQFWLRQDOLW\�DQG�SUHVHQWDWLRQ�RIUHSRUW�WUHHV�
,I�XSJUDGLQJ�IURP����[�RU�EHORZ�WR������EH�DZDUH�WKDW�WKHUH�\RX�DUH�QRZ�LQYROYHG�LQ�DV\VWHP�WKDW�KDV�D�ORW�PRUH�IXQFWLRQDOLW\�WR�GHDO�ZLWK�WKH�ZRUOG�´RXWVLGHµ�RI�5����7KHVH�FDOOVWKDW�ZRUN�RXWVLGH�RI�5���DUH�FRPPRQO\�KDQGOHG�WKURXJK�YHU\�VSHFLDO�W\SHV�RI�IXQFWLRQPRGXOH��$�IXQFWLRQ�PRGXOH�EHORQJV�WR�D�IXQFWLRQ�JURXS��7KH�6B5)&�DXWKRUL]DWLRQ�REMHFW�LVFULWLFDO�LQ�V\VWHPV�PRUH�UHFHQW�WKDQ����[��7KLV�DXWKRUL]DWLRQ�REMHFW�PD\�EH�WRWDOO\�´VKXW�RIIµYLD�D�563$5$0�SDUDPHWHU�YDOXH��EXW�ZH�GR�QRW�VXJJHVW�VKXWWLQJ�LW�RII��$V�VXFK��\RX�ZLOOQHHG�WR�GHDO�ZLWK�6B5)&�DIWHU�WKH�XSJUDGH�
)LUVW�XSJUDGH�\RXU�'(9�V\VWHP��3HUIRUP�DOO�WKH�VWHSV�LQ�'(9��'HWHUPLQH�ZKDW�LV�DQG�ZKDWLV�QRW�WUDQVSRUWDEOH�WR�WKH�4$6�V\VWHP�DQG�35'�V\VWHP��$OPRVW�QRWKLQJ�QHHGV�WR�EH�GRQHGLUHFWO\�LQ�35'�DV�\RX�VKRXOG�EH�DEOH�WR�WUDQVSRUW�DOPRVW�HYHU\WKLQJ�IURP�'(9��1R�RQHVKRXOG�HYHU�DWWHPSW�WR�XSGDWH�DXWKRUL]DWLRQV�LQ�VROHO\�35'�
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups
Authorizations Made Easy14–4
7KH�XVHU�PDVWHU�UHFRUG�KDV�UHPDLQHG�UHODWLYHO\�WKH�VDPH�WKURXJKRXW�WKH�UHOHDVHV��+RZHYHU�WKHUH�DUH�WZR�WKLQJV�WKDW�VKRXOG�EH�QRWHG�LQ�WUDQVDFWLRQ�68���< 2Q�WKH�'HIDXOWV�WDE��WKHUH�DUH�WZR�QHZ�ILHOGV�
� 3HUVRQDO�WLPH�]RQH�²�7KLV�ILHOG�VKRXOG�EH�ILOOHG�LQ�DIWHU�WKH�XSJUDGH��$�VPDOOFRQYHUVLRQ�SURJUDP�FDQ�EH�ZULWWHQ�WR�ILOO�WKLV�ILHOG�
� 'DWH�IRUPDW�²�7KLV�QHZ�ILHOG�SHUPLWV�\RX�WR�XVH�WKH�GDWH�IRUPDW�<<<<�00�''��EHDZDUH�WKDW�VRPH�SODFHV�LQ�5���KDYH�QRW�EHHQ�FRGHG�\HW�WR�UHFRJQL]H�WKLV�QHZIRUPDW��
< 2Q�WKH�$GGUHVV�WDE��WKHUH�LV�DGGUHVV�LQIRUPDWLRQ�DERXW�WKH�XVHU��7KLV�DGGUHVVLQIRUPDWLRQ�LV�OLQNHG�WR�WKH�����LQWURGXFHG�IXQFWLRQDOLW\�IRU�WKH�FHQWUDO�DGGUHVVPDQDJHPHQW�FRPSRQHQW�RI�5���
&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\
*URXSV
&UHDWLQJ�DQ�$FWLYLW\�*URXS�IURP�0DQXDOO\�0DLQWDLQHG�3URILOHV
,I�\RX�FUHDWHG�SURILOHV�PDQXDOO\�XVLQJ�WUDQVDFWLRQ�68����\RX�FDQ�FUHDWH�DQ�DFWLYLW\�JURXS�IURP�WKHVHSURILOHV��7KH�SURILOHV�FDQ�EH�VLQJOH��DV�ZHOO�DV�FRPSRVLWH��8VH�WUDQVDFWLRQ�68����8SJUDGH�DQG�ILUVWLQVWDOODWLRQ��
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�
�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�
2
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups
Release 4.6 A/B14–5
�� 5HDG�WKH�,PSRUWDQW�LQIRUPDWLRQZLQGRZ�
�� &KRRVH� �
7KH�V\VWHP�SURSRVHV�DOO�WKH�PDQXDOO\FUHDWHG�SURILOHV�
�� 6HOHFW�WKH�SURILOH�\RX�ZDQW�WRFRQYHUW�WR�DQ�DFWLYLW\�JURXS��IRUH[DPSOH��1$)�3*�����
�� &KRRVH� �2SWLPL]HG�
6HH�WKH�GRFXPHQWDWLRQ�IURP�WKH,PSRUWDQW�LQIRUPDWLRQ�ZLQGRZ�DERYH�IRUWKH�EHQHILWV�RI�WKLV�RSWLRQ�
<RX�DOVR�KDYH�WKH�RSWLRQ�WR�XVH� �,GHQWLFDO�WR�SURILOH�LI�\RX�ZRXOG�OLNH�WR�KDYH�WKHDXWKRUL]DWLRQV�GDWD�FRQYHUWHG�LGHQWLFDOO\�LQ�WKH�DFWLYLW\�JURXS��7KH�0HQX�WDE�ZRXOGUHPDLQ�HPSW\�WKRXJK��7KH�0HQX�WDE�DOVR�UHPDLQV�HPSW\�LI�\RX�FKRRVH� �2SWLPL]HG�XQOHVV�\RX�KDYH�GLVFUHWH�YDOXHV�IRU�6B7&2'(�LQ�\RXU�SURILOH��*HQHULF�YDOXHV�VXFK�DV�6( RU�UDQJHV�IURP�6¥3�DUH�LJQRUHG�
�� &KRRVH�<HV�
4
5
6
7
Tip
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups
Authorizations Made Easy14–6
7KH�/LVW�RI�DFWLYLW\�JURXS�FUHDWHGVFUHHQ�DSSHDUV�
�� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS�
7KH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQDSSHDUV��7R�PDLQWDLQ�WKH�DFWLYLW\JURXS��SHUIRUP�WKH�IROORZLQJ�VWHSV�
�� ,Q�'HVFULSWLRQ��WKH�GHVFULSWLRQ�WKDWH[LVWHG�IRU�WKH�68���FUHDWHG�SURILOHZLOO�GHIDXOW�LQWR�WKLV�ILHOG�
$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�68���FUHDWHG�ORQJ�GHVFULSWLRQ�WH[W�ZDV�QRWFRSLHG�LQWR�WKH�QHZO\�FUHDWHGDFWLYLW\�JURXS�
��� 2Q�WKH�'HVFULSWLRQ�WDE��SURYLGH�DGHWDLOHG�GHVFULSWLRQ�XQGHU�$FWLYLW\JURXS�GHVFULSWLRQ�
8
9
10
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups
Release 4.6 A/B14–7
2Q�WKH�0HQX�WDE��\RX�FDQ�DGG�RWKHUWUDQVDFWLRQV��RU�ZHE�DGGUHVVHV��,I�LQ�WKHPDQXDOO\�FUHDWHG�SURILOH�\RX�KDG�DYDOXH�LQ�WKH�DXWKRUL]DWLRQ�REMHFW6B7&2'(��WKH�V\VWHP�FUHDWHV�D�PHQX�7KLV�PHQX�ZLOO�EH�WKH�ODXQFK�SDG�IRU�WKHXVHU�IRU�WKH�(DV\�$FFHVV�PHQX�
��� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�
11
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups
Authorizations Made Easy14–8
��� 5HYLHZ�DOO�WUDIILF�OLJKWV�WKDW�DUH�QRWJUHHQ�DQG�FOLFN�RQ� �WR�SODFH�YDOXHVLQ�WKH�ILHOG��RU�FOLFN�RQ�WKH�DVWHULVN�WRDOORZ�DOO�YDOXHV�LQ�WKLV�ILHOG��
:KHQ�DOO�YDOXHV�DUH�FRPSOHWH��WKHWUDIILF�OLJKWV�WXUQ�JUHHQ�
��� &KRRVH� �
��� 7R�FUHDWH�WKH�SURILOH��FKRRVH� �
��� &KRRVH� �
��� 2Q�WKH�8VHU�WDE��FKRRVH�8VHU�FRPSDUH��&RPSDUH�WKH�XVHU
PDVWHU�UHFRUG�WR�WUDQVIHU�WKHJHQHUDWHG�SURILOH�YDOXHV�WR�WKH�XVHUPDVWHU��7KLV�UHFRUG�PD\�GLIIHU�IURPWKH�RULJLQDO��GHSHQGLQJ�RQ�WKHDGMXVWPHQWV�WKDW�ZHUH�PDGH�
,I�D�XVHU�ZDV�DVVLJQHG�WR�D�SURILOH��WKHQWKH�XVHU�LV�DXWRPDWLFDOO\�DVVLJQHG�WR�WKHMXVW�FUHDWHG�DFWLYLW\�JURXS�
13
14
15
12
16
Tip
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups
Release 4.6 A/B14–9
5HPRYLQJ�8VHU�$VVLJQPHQWV�IURP�WKH�2ULJLQDO�68���3URILOH
<RX�FDQ�UHPRYH�WKH�XVHU�DVVLJQPHQW�IURP�D�SURILOH�ZLWK�68���RU�68����,Q�WKH�IROORZLQJ��SURFHGXUH��ZHGHPRQVWUDWH�KRZ�WR�UHPRYH�D�XVHU�DVVLJQPHQW�IURP�D�SURILOH�WKDW�KDV�EHHQ�FUHDWHG�ZLWKRXW�WKH�3*�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�
�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�
�� 7R�FRQWLQXH��FKRRVH� �
2
3
Chapter 14: Upgrade
Converting Previously Created SU02 Profiles to Activity Groups
Authorizations Made Easy14–10
$�OLVW�ZLWK�DOO�DFWLYH�SURILOH�DSSHDUV�
�� 6HOHFW�WKH�SURILOH�V��IURP�ZKLFK�\RXZRXOG�OLNH�WR�UHPRYH�WKH�XVHUDVVLJQPHQW��IRU�H[DPSOH��1$)B�����
�� 7R�GHOHWH�WKH�DVVLJQPHQW��FKRRVH�8VHU�DVVLJQPHQWV�
�� &KRRVH�<HV�
�� 7KH�V\VWHP�UHWXUQV�WKH�DIIHFWHGXVHUV�DQG�UHPRYHG�SURILOHV�WKDWZHUH�UHPRYHG�IURP�WKH�XVHU�PDVWHUUHFRUGV�
,I�QR�XVHUV�ZHUH�DVVLJQHG��\RXUHFHLYH�QR�PHVVDJH�
�� <RX�FDQ�QRZ�FKHFN�WKH�VHOHFWHG�XVHUPDVWHU�UHFRUG�WR�VHH�WKDW�WKHDVVLJQPHQWV�WR�WKH�PDQXDOO\�FUHDWHGSURILOHV�ZHUH�UHPRYHG�
�� &KRRVH� �WR�UHWXUQ�
4
5
6
7
9
Chapter 14: Upgrade
Upgrading from a Release Prior to 3.1x to 4.6 A/B
Release 4.6 A/B14–11
8SJUDGLQJ�IURP�D�5HOHDVH�3ULRU�WR����[�WR�����$�%
5HDG�FKDSWHU����6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�DQG�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�LI�< <RX�DUH�XSJUDGLQJ�IURP�D�UHOHDVH�SULRU�WR����*< ,Q�WKH�UHOHDVH�SULRU�WR����*��\RX�FRXOG�QRW�RU�GLG�QRW�XVH�WKH�3*< <RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*�QRZ
<RX�IDFH�WZR�PDLQ�TXHVWLRQV�< 'R�\RX�FRQYHUW�WKH�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���LQWR
SURILOHV�WKDW�FDQ�EH�PDLQWDLQHG�E\�WKH�3*"< 'R�\RX�UH�FUHDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IURP�VFUDWFK�XVLQJ�WKH�3*"
7KH�IROORZLQJ�VHFWLRQV�SURYLGH�VRPH�KLQWV�WR�DQVZHULQJ�WKHVH�TXHVWLRQV�
&RQYHUWLQJ�([LVWLQJ�$XWKRUL]DWLRQ�3URILOHV�IRU�WKH�3URILOH�*HQHUDWRU
)LUVW��FUHDWH�DQG�VDYH�D�QHZ�DFWLYLW\�JURXS�IRU�HDFK�MRE��5DWKHU�WKDQ�VHOHFWLQJ�EXVLQHVVWUDQVDFWLRQV�IURP�WKH�FRPSDQ\�PHQX�WUHH��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�LQ�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ��7KHQ�IROORZ�WKH�VWHSV�GHVFULEHG�LQ�FKDSWHU����,QVHUWLQJ�$XWKRUL]DWLRQVIURP�D�3URILOH�
7KH�DGYDQWDJH�WR�WKLV�PHWKRG�LV�WKDW�\RX�FDQ�ZRUN�ZLWK�H[LVWLQJ��ZHOO�WHVWHG�SURILOHV��,IREMHFW�6B7&2'(�GRHV�QRW�KDYH�DQ�DXWKRUL]DWLRQ��PDQXDOO\�LQVHUW�RQH��0DLQWDLQ�WKHSHUPLWWHG�WUDQVDFWLRQ�IRU�HDFK�DFWLYLW\�JURXS�DV�DXWKRUL]DWLRQ�YDOXHV�IRU�REMHFW�6B7&2'(�LQWKH�SURILOH�\RX�ZLOO�JHQHUDWH�IRU�WKLV�DFWLYLW\�JURXS��<RX�FDQ��RI�FRXUVH��PDLQWDLQ�DQ�DVWHULVN� ���EXW�WKLV�LV�D�GLVDGYDQWDJH��EHFDXVH�XVHUV�ZRXOG�UHFHLYH�PRUH�DFFHVV�WKDQ�\RX�ZDQW�WRJLYH�WKHP��7KH�RWKHU�GLVDGYDQWDJH�LV�WKDW�VLQFH�WKH�XVHU�VSHFLILF�PHQX�LV�PLVVLQJ��\RXFDQQRW�UH�FUHDWH�WKH�LQIRUPDWLRQ�VDYHG�LQ�DQ�DFWLYLW\�JURXS��<RX�PD\�FRQYHUW�\RXU�ROGSURILOHV�DQG�ZRUN�ZLWK�WKHP�XQWLO�\RX�QHHG�WR�UH�FUHDWH�DQG�GHOHWH�WKHP�
6HH�DOVR�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\�*URXSV�RQ�SDJH���²��
5H�FUHDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�IURP�6FUDWFK�8VLQJ�WKH�3URILOH*HQHUDWRU
)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU���8VHU�5ROH�7HPSODWHV��FKDSWHU���$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\��DQG�FKDSWHU���0LVVLQJ�$XWKRUL]DWLRQV�
Chapter 14: Upgrade
Upgrading from Release 3.0F to 4.6 A/B
Authorizations Made Easy14–12
8SJUDGLQJ�IURP�5HOHDVH����)�WR�����$�%
$Q�XSJUDGH�IURP�5HOHDVH����)�WR����$�LV�QRW�SRVVLEOH�LI�\RX�XVH�5���+5�6XSSRUW3DFNDJHV��)XUWKHU�LQIRUPDWLRQ�LV�DYDLODEOH�LQ�6$31HW���5���)URQWHQG�QRWH��������
$IWHU�\RXU�����XSJUDGH��LI�\RX�FUHDWH�DFWLYLW\�JURXSV�DQG�JHQHUDWH�SURILOHV�LQ�5HOHDVH����)ZLWK�WKH�SUHOLPLQDU\�YHUVLRQ�RI�WKH�3*��WKHQ�
�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�
)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH3DUDPHWHU��,I�WKH�SDUDPHWHU�LV�LQDFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG�
7KH�3*�LV�DOUHDG\�DFWLYH�LQ�5HOHDVH�����WKRXJK�
$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJHE\�UHIHUULQJ�WR�FKDSWHU����WKH�VHFWLRQ�$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�
�� %HFDXVH�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�ZHUH�QRW�D�SDUW�RI�WKH�5HOHDVH����)YHUVLRQ�RI�WKH�3*��FRS\�WKH�6$3�GHIDXOWV�LQ�WKHVH�FXVWRPHU�WDEOHV�
7R�FRS\�WKHVH�GHIDXOWV��UXQ�WUDQVDFWLRQ�68���DQG�SHUIRUP�WKH�VWHSV�LQ�FKDSWHU����WKHVHFWLRQ�/RDGLQJ�WKH�862%;B&�DQG�862%7B&�7DEOHV��,Q�WUDQVDFWLRQ�68����SHUIRUP�WKH�ILUVWVWHS�FDOOHG�,QLWLDOO\�ILOO�WKH�FXVWRPHU�WDEOHV�
$OVR�UHDG�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�WR�OHDUQ�PRUHDERXW�WKH�QHZ�IXQFWLRQDOLW\��7KHQ�GHFLGH�ZKHWKHU�\RX�QHHG�WR�SHUIRUP�DGGLWLRQDO�VWHSVRQ�WKH�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKH�WUDQVDFWLRQV�\RX�DUH�XVLQJ�
�� $IWHU�WKH�XSJUDGH�WR�5HOHDVH����[��D�SURILOH�PDWFKXS�LV�UHTXLUHG�IRU�DOO�SURILOHV�JHQHUDWHGLQ�5HOHDVH����)��$IWHU�WKH�XSJUDGH��WKH�3*�GRHV�QRW�DXWRPDWLFDOO\�LQIRUP�\RX�WKDW�DFRPSDULVRQ�LV�QHFHVVDU\�IRU�WKHVH�SURILOHV��LQ�WUDQVDFWLRQ�3)&*��WKH�OLJKW�RQ�WKH$XWKRUL]DWLRQV�WDE�UHPDLQV�JUHHQ�IRU�WKH�SURILOHV�FUHDWHG�LQ�5HOHDVH����)��DQG�WUDQVDFWLRQ683&�GRHV�QRW�LQGLFDWH�ZKHWKHU�D�PDWFKXS�LV�DFWXDOO\�UHTXLUHG���1HYHUWKHOHVV��WKH�6$3GHIDXOW�GDWD�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�WKH�QHZ�UHOHDVH�KDV�EHHQ�LPSURYHG�VR�WKDW�D�SURILOH�PDWFKXS�LV�HVVHQWLDO�WR�HQVXUH�SURSHU�ZRUNLQJ�SURILOHV�DIWHU�WKHXSJUDGH�
Chapter 14: Upgrade
Upgrading from Release 3.0F to 4.6 A/B
Release 4.6 A/B14–13
7R�SHUIRUP�D�SURILOH�PDWFKXS�
�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��
�� 6HOHFW�DQ�DFWLYLW\�JURXS�FUHDWHG�LQ5HOHDVH������<RX�FDQ�RQO\�VHOHFWRQH�DFWLYLW\�JURXS�DW�D�WLPH��VHHWKH�IROORZLQJ�7LSV��7ULFNV��
7KLV�SURFHGXUH�KDV�WR�EH�SHUIRUPHGIRU�HDFK�DFWLYLW\�JURXS�VHSDUDWHO\��7RVSHHG�XS�WKH�SURFHVV��XVH�WUDQVDFWLRQ683&�ZKHUH�\RX�JHW�D�OLVW�RI�DOODFWLYLW\�JURXSV��6HOHFW�WKH�DFWLYLW\JURXS�WKDW�QHHGV�WR�EH�PDLQWDLQHG�E\GRXEOH�FOLFNLQJ�RQ�LW�
�� &KRRVH� &KDQJH�
�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�
�� &KRRVH� �([SHUW�PRGH�IRU�SURILOHJHQHUDWLRQ�
3
4
5
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Authorizations Made Easy14–14
�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�DV�WKH�FRUUHFWPDLQWHQDQFH�W\SH�
�� &KRRVH� �DQG�SRVWPDLQWDLQ�DQ\RSHQ�DXWKRUL]DWLRQ�ILHOGV�RQ�WKHQH[W�VFUHHQ��LI�UHTXLUHG�
'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWV�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�5HOHDVH����[��WKH�3*�PD\FUHDWH�VRPH�QHZ�DXWKRUL]DWLRQV��,I�\RX�VHH�QHZ�DXWKRUL]DWLRQV�FUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��GHDFWLYDWH�RU�GHOHWH�WKHP�
7KH�V\VWHP�LQFOXGHV�WKH�QHZ�UHTXLUHG�DXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�RQHV��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO�EXW�RIIHUV�LPSURYHG�V\VWHP�SHUIRUPDQFH��7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�DIWHU�0DNLQJ�&KDQJHV�
�� $IWHU�UHJHQHUDWLQJ�DOO�WKH�SURILOHV��\RX�KDYH�FRPSOHWHG�WKH�XSJUDGH�VWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�5HOHDVH����)�
1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG�IRU�SURILOHV�DOUHDG\�DVVLJQHG�WR�XVHUV��EXW�UHPHPEHU�WKDWFKDQJHV�EHFRPH�DFWLYH�ZLWK�WKH�QH[W�V\VWHP�ORJRQ�
8SJUDGH�IURP�5HOHDVHV����*�����+�����,�WR�����$�%
$IWHU�FUHDWLQJ�DFWLYLW\�JURXSV�DQG�JHQHUDWLQJ�SURILOHV�LQ�5HOHDVHV����*�����+�����,�����$�RU����%�����[�ZLWKWKH�3*��ZKHQ�\RX�XSJUDGH�WR�5HOHDVH����[�
�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�
7R�GR�VR��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU�,I�WKH�SDUDPHWHU�LV�QRW�DFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG��7KH�3*�LV�VHW�WR�DFWLYH�LQ�5HOHDVH�����
$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJH�E\�UHIHUULQJ�WRFKDSWHU����$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�
�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�
6
7
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Release 4.6 A/B14–15
�� &KRRVH�VWHS��$��3UHSDUDWLRQ�&RPSDUH�ZLWK�6$3�YDOXHV��7KLV�VWHSLV�XVHG�WR�SUHSDUH�IRU�VWHSV��%�DQG�&�
�� &KRRVH .
7KLV�VWHS�PLJKW�WDNH�VHYHUDOPLQXWHV.
3
4
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Authorizations Made Easy14–16
�� &KRRVH��%��&RPSDUH�WUDQVDFWLRQV�
�� &KRRVH� �
7KH�XSJUDGH�UHSRUW�\RX�VWDUWHG�LQVWHS��$��XSGDWHV�FXVWRPHU�WDEOHV862%;B&�DQG�862%7B&��EXW�GRHVQRW�RYHUZULWH�WKH�HQWULHV�\RXFKDQJHG�LQ�UHOHDVHV�EHIRUH����[�
,I�\RX�KDYH�QRW�FKDQJHG�FKHFNLQGLFDWRUV�DQG�ILHOG�YDOXHV�ZLWKWUDQVDFWLRQ�68���LQ�UHOHDVHV�EHIRUH���[��\RX�ZLOO�VHH�WKH�IROORZLQJVWDWXV�PHVVDJH�
<RX�GR�QRW�QHHG�WR�PDLQWDLQ�WKHWUDQVDFWLRQ�
5
6
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Release 4.6 A/B14–17
�� ,I�\RX�PDGH�FKDQJHV��WKHVH�FKDQJHVZLOO�VWLOO�EH�DFWLYH�DIWHU�WKHXSJUDGH��7KH�RXWSXW�ZLOO�EH�D�OLVWRI�DIIHFWHG�WUDQVDFWLRQV��LQ�RXU�FDVHLW�LV�0.����
�� ,Q�WKH�RXWSXW�OLVW�RI�WUDQVDFWLRQV�\RX�FDQ�VHH�WKH�6WDWXV�ZKLFK�VKRZVZKHWKHU�D�WUDQVDFWLRQ�KDV�DOUHDG\EHHQ�FKHFNHG�
�� 6HOHFW�D�WUDQVDFWLRQ�ZKHUH�WKHFXUUHQW�VWDWXV�LV�7R�EH�FKHFNHG�
��� &KRRVH� �6HW�WR�FKHFNHG�WR�VHW�WKHVWDWXV�WR�FKHFNHG�ZLWKRXW�FKDQJLQJDQ\�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKLVWUDQVDFWLRQ�
��� &KRRVH�WKH� �7UDQVIHU�UHPDLQLQJ6$3�GHIDXOWV�EXWWRQ�WR�FKDQJH�WKHFXUUHQW�DFWLYH�FKHFN�,'�VHWWLQJ�WRWKH�6$3�GHIDXOW�YDOXH�DQG�WKHVWDWXV�WR�FKHFNHG�
��� &KRRVH� �&KHFN�LQGLFDWRU�
��� &KRRVH� �
,I�\RX�VDYH�ZLWKRXW�PDNLQJ�DQ\FKDQJHV��WKH�VWDWXV�LV�DXWRPDWLFDOO\VHW�WR�FKHFNHG��DQG�WKH�FKDQJHVUHPDLQ�
��� &KRRVH�DQ\�RWKHU�PHQX�RSWLRQ�WRPDNH�DGGLWLRQDO�FKDQJHV�WR�WKLVWUDQVDFWLRQ�DQG�LWV�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�
��� 2QFH�ILQLVKHG��FKRRVH� �
7 8
9
1012 11
13 15
14
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Authorizations Made Easy14–18
��� 7KH�VWDWXV�KDV�FKDQJHG�WR�FKHFNHG�
��� 7R�XVH�WKH�6$3�GHIDXOW�YDOXHV�IRUDOO�WKH�WUDQVDFWLRQV�WKDW�\RX�KDYHQRW�\HW�PDQXDOO\�FKHFNHG��FKRRVHWKH� �7UDQVIHU�UHPDLQLQJ�6$3GHIDXOWV�EXWWRQ�WR�FRS\�DQ\UHPDLQLQJ�6$3�GHIDXOW�YDOXHV��LQRXU�FDVH��ZH�GR�QRW�KDYH�DQ\IXUWKHU�WUDQVDFWLRQV��
��� &KRRVH� �
��� ,I�\RX�KDG�RWKHU�WUDQVDFWLRQV�DOOWKHLU�VWDWXVHV�ZRXOG�KDYH�EHHQ�VHWWR�FKHFNHG�
��� &KRRVH� �
16
17
18
19
20
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Release 4.6 A/B14–19
��� &KRRVH��&��$FWLYLW\�JURXSV�WR�EHFKHFNHG�
��� &KRRVH� �
7KH�RXWSXW�LV�D�OLVW�RI�DFWLYLW\JURXSV�WKDW�DUH�DIIHFWHG�E\�HLWKHUFKDQJHV�\RX�PDGH�RU�E\�FKDQJHVIURP�RXU�LPSURYHG�GHIDXOW�GDWD�
22
21
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Authorizations Made Easy14–20
��� )RU�WKH�OLVWHG�DFWLYLW\�JURXSV�FKDQJHV�KDYH�EHHQ�PDGH�WR�FKHFNLQGLFDWRUV�RU�GHIDXOW�WUDQVDFWLRQYDOXHV��7KHUHIRUH��WKHFRUUHVSRQGLQJ�DXWKRUL]DWLRQSURILOHV�QHHG�WR�EH�DGMXVWHG�
0DNH�VXUH�\RX�VHOHFW�HDFK�HQWU\�LQWKLV�OLVW�
��� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS\RX�ZRXOG�OLNH�WR�DGMXVW�
��� 'HSHQGLQJ�RQ�WKH�FKDQJHV��\RX�PLJKW�KDYH�WR�PDLQWDLQ�WKH�FRUUHFW�RUJDQL]DWLRQDO�OHYHO�
��� 3RVWPDLQWDLQ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��LI�UHTXLUHG�\HOORZ�RU�UHG�OLJKWV��
'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWVIRU�FKHFN�LQGLFDWRUV�DQG�ILHOGYDOXHV��WKH�3*�PD\�FUHDWH�VRPHQHZ�DXWKRUL]DWLRQV�LQ�5HOHDVH����[�<RX�ZLOO�VHH�QHZ�DXWKRUL]DWLRQVFUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��WKHVHDUH�LGHQWLILHG�E\�WKH�RQHV�WKDW�VD\1HZ���-XVW�DFWLYDWH��RU�GHOHWH��WKHQHZ�DXWKRUL]DWLRQV��7KH�V\VWHPLQFOXGHV�WKH�QHZ�UHTXLUHGDXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJIRU�H[LVWLQJ�RQHV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO��EXW�KDV�PRUHDGYDQWDJHV�WKDQ�GLVDGYDQWDJHV�DQGDOVR�LPSURYHV�3*�SHUIRUPDQFH�
7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQ�ILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ�&KDQJHV�
��� $IWHU�UHJHQHUDWLQJ��FKRRVH� �
��� &RQWLQXH�ZLWK�WKH�QH[W�HQWU\�LQ�WKH�OLVW�RI�DFWLYLW\�JURXSV�ZLWK�WKLV�VDPH�SURFHGXUH�XQWLO�\RX�KDYHDGMXVWHG�DOO�DFWLYLW\�JURXSV�
23
26
24
25
Chapter 14: Upgrade
Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B
Release 4.6 A/B14–21
$IWHU�FRPSOHWLQJ�VWHSV��$���%��DQG��&��\RX�KDYH�SHUIRUPHG�WKH�PRVW�LPSRUWDQW�VWHSV�DIWHU\RXU�5HOHDVH�����$�%�XSJUDGH�
<RX�VWLOO�QHHG�WR�SHUIRUP�VWHS����7UDQVSRUW�WKH�FXVWRPHU�WDEOHV��DQG�WUDQVSRUW�WKH�FKDQJHV�\RXPDGH�LQ�VWHSV���DQG���WR�\RXU�RWKHU�5���V\VWHPV��$OO�V\VWHPV�PXVW�KDYH�WKH�VDPH�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�
��� &KRRVH��'��'LVSOD\�FKDQJHGWUDQVDFWLRQ�FRGHV�
7KLV�UHSRUW�OLVWV�DOO�DFWLYLW\�JURXSVZKHUH�WUDQVDFWLRQV�KDYH�EHHQUHSODFHG�E\�RWKHU�WUDQVDFWLRQV��7KHROG�DQG�QHZ�WUDQVDFWLRQV�DUH�DOVRGLVSOD\HG��<RX�FDQ�FKDQJH�WKHWUDQVDFWLRQ�FRGH�LQ�WKHFRUUHVSRQGLQJ�DFWLYLW\�JURXS�E\GRXEOH�FOLFNLQJ�RQ�WKH�HQWU\�LQ�WKHOLVW�
<RX�KDYH�FRPSOHWHG�WKH�XSJUDGHVWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�UHOHDVHV�SULRU�WR����[�
29
Chapter 14: Upgrade
Upgrade from Releases 4.0x or 4.5x to 4.6 A/B
Authorizations Made Easy14–22
8SJUDGH�IURP�5HOHDVHV����[�RU����[�WR�����$�%
,I�\RX�DUH�XSJUDGLQJ�IURP����[�RU����[�WR�����$�%��\RX�VKRXOG�SURFHHG�IURP�VWHSV��$�WR��'LQ�WKH�VDPH�ZD\�DV�LQ�WKH�VHFWLRQ�EHIRUH�
,Q������UHVSRQVLELOLWLHV�QR�ORQJHU�H[LVW
,I�\RX�ZRUNHG�ZLWK�WKH�5���6\VWHP�LQ�5HOHDVH����[�RU�UHDG�WKH����%�$XWKRUL]DWLRQV�0DGH�(DV\JXLGHERRN��WKHQ�\RX�PD\�KDYH�ZRQGHUHG�ZKDW�KDSSHQHG�WR�WKH�IXQFWLRQDOLW\�FDOOHG´UHVSRQVLELOLWLHV�µ�,Q�5HOHDVH�����DQG������UHVSRQVLELOLWLHV�ZHUH�UHSODFHG�E\�D�FRQFHSW�FDOOHG´GHULYHG�DFWLYLW\�JURXSVµ�DQG�WKHVH�GHULYHG�DFWLYLW\�JURXSV�IXQFWLRQ�VOLJKWO\�GLIIHUHQW�IURPWKH�����UHVSRQVLELOLWLHV��,I�\RX�XVHG�UHVSRQVLELOLWLHV�LQ�����DQG�XSJUDGH�WR������\RXUUHVSRQVLELOLWLHV�DUH�FRQYHUWHG�DXWRPDWLFDOO\�LQWR�GHULYHG�DFWLYLW\�JURXSV�
)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�GHULYHG�DFWLYLW\�JURXSV��VHH�WKH�FRUUHVSRQGLQJ�VHFWLRQ�LQFKDSWHU����&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�
A–1
$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV
&RQWHQWV
Overview ................................................................................................................. A–2
SAPNet – R/3 Frontend Notes............................................................................... A–3
$$
Appendix A: SAPNet – R/3 Frontend Notes
Overview
Authorizations Made EasyA–2
2YHUYLHZ
6$31HW�²�5���)URQWHQG�QRWHV��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6XSSRUW��266���FRQWDLQVLQIRUPDWLRQ�UHJDUGLQJ�NQRZQ�HUURUV��DQG�VXEVHTXHQW�PHDQV�RI�DGGUHVVLQJ�VXFK�HUURUV��VRPH�DGYLFH��DQG�JHQHUDO�LQIRUPDWLRQ�UHODWHG�WR�WKH�5���6\VWHP��,W�DOVR�VHUYHV�DV�RQH�RI�WKHFRUH�PHDQV�RI�FRPPXQLFDWLQJ�SUREOHPV�ZLWK�\RXU�5���6\VWHP�WR�WKH�6$3�5���VXSSRUWVHUYLFHV�SRUWLRQ�RI�WKH�6$3�ZRUOGZLGH�RUJDQL]DWLRQ��7KH�VXSSRUW�V\VWHP��PDLQWDLQHGHQWLUHO\�E\�6$3��FRQWDLQV�KXQGUHGV�RI�WKRXVDQGV�RI�´QRWHVµ�WKDW�DGGUHVV�WRSLFV�UDQJLQJIURP�5���V\VWHPV��5���V\VWHPV���DQG�PDQ\�RI�WKH�DGG�RQ�FRPSRQHQWV�WR�WKHVH�V\VWHPV��)RUPRUH�LQIRUPDWLRQ�DERXW�ZKDW�WKH�6$31HW�²�5���)URQWHQG�V\VWHP�LV��SOHDVH�UHIHU�WRZZZ�VDS�FRP�DQG�JR�WR�WKH�6$31HW�VHFWLRQ�
7KH�QRWH�QXPEHUV�SURYLGHG�LQ�WKLV�DSSHQGL[�UHSUHVHQW�RQO\�D�IUDFWLRQ�RI�DOO�WKH�QRWHV�UHODWHGWR�DXWKRUL]DWLRQV��$V�KXQGUHGV�RI�QRWHV�IRU�WKH�YDULRXV�6$3�SURGXFWV�DUH�FUHDWHG�HYHU\�GD\�WKLV�OLVWLQJ�RI�QRWHV�UHSUHVHQWV�´D�VQDSVKRW�LQ�WLPHµ�RI�WKRVH�WKDW�H[LVWHG�DW�WKH�WLPH�WKLVZULWLQJ�DQG�ZHUH�VHOHFWLYHO\�LQFOXGHG�KHUH��,W�LV�E\�QR�PHDQV�D�FRPSUHKHQVLYH�OLVW�
1RWHV�LQ�6$31HW�²�5���)URQWHQG�DUH�VHSDUDWHG�LQ�PDQ\�ZD\V��2QH�RI�WKH�PRVW�FRPPRQZD\V�LV�E\�WKH�´&RPSRQHQWµ�RU�´$SSOLFDWLRQ�$UHDµ�LQ�WKH�V\VWHP�WKDW�ZDV�DIIHFWHG��7KHIROORZLQJ�WDEOH�GHVFULEHV�VRPH�RI�WKH�PRVW�FRPPRQ�DSSOLFDWLRQ�DUHDV�ZKHUH�QRWHV�PD\�EHIRXQG��7KHVH�DUHDV�FDQ�EH�XVHG�WR�VHDUFK�WKH�6$31HW�²�5���)URQWHQG�QRWHV�GDWDEDVH�IRUDGGLWLRQDO�VHFXULW\�DGPLQLVWUDWRU�LQIRUPDWLRQ
$SSOLFDWLRQ�$UHD 'HVFULSWLRQ
%&�&&0 &RPSXWLQJ�&HQWHU�0DQDJHPHQW�6\VWHP
%&�&&0�865 8VHUV�DQG�$XWKRUL]DWLRQV
%&�&&0�865�$'0 8VHUV�DQG�$XWKRUL]DWLRQV�0DLQWHQDQFH
%&�&&0�865�.51 8VHUV�DQG�$XWKRUL]DWLRQV�.HUQHO�)XQFWLRQV
%&�&&0�865�3)& 3URILOH�*HQHUDWRU
%&�&76�25* :RUNEHQFK�&XVWRPL]HU�2UJDQL]HU
%&�)(6�6(0 6HVVLRQ�0DQDJHU
%&�659�5(3 5HSRUWLQJ
%&�%07�20 2UJDQL]DWLRQDO�0DQDJHPHQW
%&�%07�20�20 2UJDQL]DWLRQDO�3ODQ
),�$3�$3�% 3D\PHQW�3URJUDP�3D\PHQW�7UDQVIHU
00�,0�*)�5(3 ,0�5HSRUWLQJ��QR�/,6�
3$�3$�;; $OO�&RXQWULHV��3HUVRQQHO�$GPLQLVWUDWLRQ�
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes
Release 4.6A/BA–3
(DFK�DSSOLFDWLRQ�DUHD�FDQ�DOVR�EH�VHDUFKHG�XVLQJ�D�NH\ZRUG�VXFK�DV�SURILOH�JHQHUDWRU��3)&*��DFWLYLW\�JURXS�SUHGHILQHG�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ��SURILOH��XVHU��68����VHFXULW\�DQG�VR�RQ�
6$31HW�²�5���)URQWHQG�1RWHV
�$V�RI�'HFHPEHU������
/HJHQG�< 5,� �5HOHDVH�LQGHSHQGHQW< � ����$������%< 25� �ROGHU�UHOHDVH��EXW�VWLOO�YDOXDEOH�LQIRUPDWLRQ
6XEMHFW 5HOHDVH 1RWH 7LWOH
$XWKRUL]DWLRQ�&KHFN 5, ����� :KLFK�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG
$XWKRUL]DWLRQ 5, ����� 1DPLQJ�FRQYHQWLRQV�IRU�DXWKRUL]DWLRQV
$XWKRUL]DWLRQ�&KHFN 5, ����� $XWKRUL]DWLRQ�FKHFN���D�VKRUW�LQWURGXFWLRQ
$XWKRUL]DWLRQ�&RQFHSW 5, ����� 4XHVWLRQV�UHJDUGLQJ�WKH�DXWKRUL]DWLRQ�FRQFHSW
$XWKRUL]DWLRQV�5HSRUWLQJ�7UHH
5, ���� $XWKRUL]DWLRQ�SURWHFWLRQ�RI�$%$3���SURJUDPV
$XWKRUL]DWLRQV��7UDFH 5, ����� 7UDFH�IXQFWLRQ��PXOWLSOH�XVHUV
'RFXPHQWDWLRQ��%DVLV.QRZOHGJHZDUH3URGXFWV
25 ����� ,QIR�IRU�FXVWRPHU���%DVLV�.QRZOHGJH�3URGXFWV
+RW�3DFNDJHV 25 ����� ,PSRUWDQW�,QIRUPDWLRQ�DERXW�+RW�3DFNDJHV
+RW�3DFNDJHV ����� &RQIOLFWV�EHWZHHQ�6XSSRUW�3DFNDJHV�/&3V��$GG�RQV
+RW�3DFNDJHV ����� 1HZ�+RW�3DFNDJHV�IRU�3URILOH�*HQHUDWRU
.QRZOHGJHZDUH3URGXFWV
25 ����� 4XHVWLRQV�DQG�DQVZHUV�RQ�WKH�5���%DVLV�.QRZOHGJH3URGXFW�&'V
1DPLQJ�&RQYHQWLRQV ����� &XVWRPHU�QDPH�UDQJH�IRU�6$3�REMHFWV
2UJDQL]DWLRQDO0DQDJHPHQW
����� 3'�DQG�:RUNIORZ�DSSOLFDWLRQ�GR�QRW�UXQ�FRUUHFWO\
266 5, ����� 266�5HJLVWUDWLRQ�)RUP��IRU�1RUWK�$PHULFD�
266 5, ����� 'RFXPHQWDWLRQ�RQ�WUDLQLQJ�LQIR�LQ�WKH�266
266 5, ����� 6HDUFK�SURFHGXUH�IRU�QRWHV�DQG�PHVVDJHV�LQ�266
266 5, ����� 6$3�$PHULFD·V�3URGXFWLRQ�5HJLVWUDWLRQ�)RUP
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes
Authorizations Made EasyA–4
6XEMHFW 5HOHDVH 1RWH 7LWOH
266 5, ����� 6$3/2*21�IRU�266
266 25 ����� 6HUYLFH�FRQQHFWLRQV��&RPSRVLWH�QRWH��RYHUYLHZ�
266 5, ����� 6WUXFWXUH�RI�DSSOLFDWLRQ�DUHDV�LQ�266
266 5, ����� 8VHU�PDLQWHQDQFH�DQG�FUHDWLRQ�LQ�266�IRU�FXVWRPHU
266 25 ����� )/&6�)HHGEDFN�IRU�WKH�1RWHV�ZLWKLQ�WKH�266�6\VWHP
266 5, ����� 266�FRUSRUDWH�JURXS�IXQFWLRQDOLW\��&ROOHFWLYH�QRWH
266 5, ����� &RQILUPDWLRQ�RI�266�5HJLVWUDWLRQ
266�DQG�266� 5, ����� /RJ�RQ�WR�266��7UDQVDFWLRQ�266��
266�DQG�266� 5, ����� 266���:KDW�WR�GR�LI�5���ZLOO�QRW�UXQ
266�DQG�266� 5, ����� *XLGHOLQHV�IRU�266���9HUVLRQ�IRU�6$36(59��
266�DQG�266� 5, ����� (DV\�WR�XVH�JXLGH�IRU�7UDQVDFWLRQ�266�
266�DQG�3ULQWLQJ 5, ����� 3ULQW���'RZQORDG�LQ�266
266�DQG�3ULQWLQJ 5, ����� 'RZQORDGLQJ�²�3ULQWLQJ�QRWHV�LQ�266
3DVVZRUGV�LQ�5�� 5, ���� $QVZHUV�RQ�´6HFXULW\µ
3DWFK�GRZQORDG�IURP6$36(59[
5, ����� $GYDQFH�WUDQVSRUWV�WR�FXVWRPHUV
3URILOH�*HQHUDWRU ����� 3UREOHPV�ZLWK�WDEOH�60(1B'$7(6
3URILOH�*HQHUDWRU ����� 0LVVLQJ�DXWKRUL]DWLRQ�ZKHQ�XVLQJ�WKH�3URILOH�*HQHUDWRU
3URILOH�*HQHUDWRU ����� ��SUREOHP�IRU�WKH�3*
3URILOH�*HQHUDWRU 5, ������ 5HJHQHUDWLRQ�RI�DFWLYLW\�JURXSV�DXWKRUL]DWLRQ�ORVV
3URILOH�*HQHUDWRU 5, ������ 0HUJ��3URFHVV�ZLWK�DXWKRUL]DWLRQ�GDWD��([SODQDWLRQ
3URILOH�*HQHUDWRU�7UDQVSRUW�3'�REMHFWV�DFWLYLW\�JURXSV�
25 ����� 7UDQVSRUWLQJ�3'�REMHFWV�E\�FOLHQW�FRS\
5HSRUW�5+$8783� 25 ����� $FWLYLW\�JURXS�PDLQW���XVHU�PDVWHU�GDWD�FRPSDULVRQ
6$3�6RIWZDUH�&KDQJH5HJLVWUDWLRQ
25 ����� 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5�
6$3B1(: 5, ����� :KDW�GRHV�WKH�SURILOH�6$3B1(:�GR"
6$31HW 5, ����� $FFHVV�WR�WKH�6$31HW�VHUYHU�ZLWK�266�8VHU�,'
6$36(59[ 25 ����� 7UDQVIHUULQJ�FXVWRPHU�ILOHV�WR�VDSVHUY��ZLWK�IWS
6HFXULW\�LQ�5�� 5, ����� &RQVHTXHQFHV�LQ�WUDQVSRUW�GXULQJ�SDVVZRUG�FKDQJH
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes
Release 4.6A/BA–5
6XEMHFW 5HOHDVH 1RWH 7LWOH
6HFXULW\�LQ�5�� 5, ����� 'DWD�SURWHFWLRQ�DQG�VHFXULW\�LQ�5��
6HFXULW\�LQ�5�� 5, ����� 6HFUHF\�DQG�'DWD�6HFXULW\�2EOLJDWLRQV
6HFXULW\�LQ�5����$%$3 5, ����� 6HFXULW\�DVSHFWV�LQ�$%$3���SURJUDPPLQJ
6HFXULW\�LQ�5����&3,�& 5, ����� 6$3&3,&��:KHUH�DUH�SDVVZRUGV�YLVLEOH"
6HFXULW\�LQ�5���
&XVWRPHU�([LW
����� &XVWRPHU�H[LWV�LQ�6$3�ORJ�RQ
6HVVLRQ�0DQDJHU 25 ����� *HQHUDWLRQ�RI�6HVVLRQ�0DQDJHU�PHQXV�WDNHV�WRR�ORQJ
68�� 5, ����� <RX�DUH�QRW�DXWKRUL]HG�WR�����!�$QDO\VLV
68�� 25 ����� 68����$XWKRUL]DWLRQ�YDOXH�FRQWDLQV�VSHFLDO�FKDUV
68�� 25 ����� 68����2EMHFW�QDPH�RYHUZULWHV�REMHFW�WH[W
6\VWHP�3URILOH3DUDPHWHUV
5, ����� 6\VWHP�SDUDPHWHUV��'HILQHG�ZKHUH"�'LVSOD\HG�KRZ"
7UDQVSRUWLQJ 5, ����� 7UDQVSRUWLQJ�SURILOHV�DQG�DXWKRUL]DWLRQV
7UDQVSRUW 25 ����� 7UDQVSRUW�SURILOHV��DXWKRU���LQ�ORJRQ�ODQJXDJH
7UDQVSRUW��8VHU�%XIIHU 5, ����� $XWKRUL]DWLRQV�QRW�FXUUHQW�DIWHU�SURILOH�WUDQVSRUW
7UDQVSRUWLQJ��$6���� ����� $6������,PSRUWLQJ�WUDQVSRUWV
8VHU�DGPLQLVWUDWLRQ 5, ����� 8VHUV�ZLWK�ODUJH�PDVWHU�UHF��PLVVLQJ�DXWKRUL]DWLRQV
8VHU�DGPLQLVWUDWLRQ ������ &HQWUDO�XVHU�GLVWULEXWLRQ��WRR�PDQ\�$/(�SURFHVVHV
8VHU�DGPLQLVWUDWLRQ ������ &HQ��8VHU�DGP���68���/DVW�FKDQJH�QRW�DOZD\V�GVSOHG�
8VHU�DGPLQLVWUDWLRQ ������ 8VH�RI�ZLOGFDUG�¶ ·�LQ�DXWKRUL]DWLRQV
8VHU�,QIRUPDWLRQ�6\VWHP�68,0�
25 ����� 1HZ�UHSRUWV�IRU�WKH�XVHU�LQIRUPDWLRQ�V\VWHP
8VHU�,QIRUPDWLRQ�6\VWHP�68,0�
25 ����� :KHUH�XVHG�OLVW��6XUQDPHV�PLVVLQJ�LQ�XVHU�OLVW
8VHU�6$3 5, ���� +RZ�WR�DVVLJQ�DQ�LGHQWLILHU�WR�6$3
8VHU�6$3 5, ���� +RZ�GR�,�GHOHWH�WKH�XVHU�6$3 "
8VHUV�DQG$XWKRUL]DWLRQV�.HUQHO)XQFWLRQV
������ $XWKRUL]DWLRQ�%XIIHU�LV�ILOOHG�GXULQJ�HDFK�ORJRQ
:RUNEHQFK�&XVWRPL]HU2UJDQL]HU
������ 'HYHORSPHQW�&ODVV�&KDQJH�RQO\�ZLWK�DGPLQ�$XWKRUL]DWLRQ
Appendix A: SAPNet – R/3 Frontend Notes
SAPNet – R/3 Frontend Notes
Authorizations Made EasyA–6
6XEMHFW 5HOHDVH 1RWH 7LWOH
3D\PHQW3URJUDP�3D\PHQW7UDQVIHU
������ ,QFRUUHFW�DXWKRUL]DWLRQ�FKHFN�IRU�FKHFN�PDQDJHPHQW
,0�5HSRUWLQJ��QR�/,6� ������ 0%����0%���0%�6��32�VFKHG��$JUHHPHQW�GLVSOD\V
$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�
������ $XWK��&KHFN�RI�QRW�LQWHJUDWHG�SHUVRQQHO�QXPEHUV
$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�
������ $XWKRUL]DWLRQ�OHYHO�0�LV�KDQGOHG�LQFRUUHFWO\
B–1
$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV
&RQWHQWV
Overview ................................................................................................................. B–2
R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................... B–2
Profile Generator Setup......................................................................................... B–3
Working with the PG and Profiles ........................................................................ B–3
Authorization Checks (SU24)................................................................................ B–5
Upgrade Procedure (SU25) ................................................................................... B–7
Including Transactions or Reports ...................................................................... B–7
Missing Authorizations ......................................................................................... B–7
User Administration............................................................................................... B–8
Transporting ........................................................................................................... B–8
Tables...................................................................................................................... B–8
%%
Appendix B: Frequently Asked Questions
Overview
Authorizations Made EasyB–2
2YHUYLHZ
7KLV�DSSHQGL[�FRQWDLQV�VRPH�RI�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�DERXW�5���DQG�WKH3URILOH�*HQHUDWRU��3*���:H�KRSH�WKH�DQVZHUV�< +HOS�\RX�WR�EHWWHU�XQGHUVWDQG�WKH�V\VWHP< )DFLOLWDWH�\RXU�LPSOHPHQWDWLRQ< 5HVROYH�EDVLF�V\VWHP�LVVXHV
5���,QLWLDO�6FUHHQ��6$3�(DV\�$FFHVV�0HQX��DQG�)DYRULWHV
,I�D�XVHU�KDV�VHYHUDO�DFWLYLW\�JURXSV�DVVLJQHG�WR�WKHP�ZLWK�WKH�VDPH�WUDQVDFWLRQ
FRGH��ZLOO�WKH�WUDQVDFWLRQ�FRGH�DSSHDU�PXOWLSOH�WLPHV�RQ�WKH�6$3�(DV\�$FFHVV
0HQX"�,V�WKHUH�D�ZD\�WR�´PHUJHµ�WKH�UHSHDWHG�WUDQVDFWLRQ�FRGHV"
7KH�WUDQVDFWLRQ�FRGH�ZLOO�LQGHHG�DSSHDU�PXOWLSOH�WLPHV��$W�SUHVHQW��WKHUH�DUH�QR�PHUJHFDSDELOLWLHV�WR�HOLPLQDWH�UHSHDWHG�WUDQVDFWLRQ�FRGHV�
,I�D�XVHU�KDV�PDQ\�DFWLYLW\�JURXSV�RU�PDQ\�WUDQVDFWLRQ�FRGHV��LV�WKHUH�DQ�HIIHFW
RQ�SHUIRUPDQFH��IRU�H[DPSOH��WKH�WLPH�IRU�WKH�ILUVW�VFUHHQ�WR�EH�SURFHVVHG�"
(DFK�´EUDQFKµ�RU�´QRGHµ�RQ�WKH�6$3�(DV\�$FFHVV�PHQX�UHSUHVHQWV�LWHPV�WKDW�D�XVHU�KDVDFFHVV�WR��3HUIRUPDQFH�GRHV�JR�GRZQ�ZLWK�D�ODUJH�QXPEHU�RI�QRGHV��EXW�IURP�SUHOLPLQDU\WHVWLQJ�E\�6$3�GHYHORSPHQW�JURXSV��WKH�V\VWHP�FDQ�KDQGOH�DQ�H[WHQVLYH�QXPEHU�ZLWK�DUHDVRQDEOH�UHVSRQVH�WLPHV��PRUH�WKDQ�D�XVHU�FDQ�KDQGOH�LQ�D�UHDVRQDEOH�OLIHWLPH���7KH�WHVWLQJRI�D�PHQX�EUDQFK�QRGH�VWUXFWXUH�RI��������QRGHV�KDV�EHHQ�VKRZQ�WR�SURYLGH�JRRGUHVSRQVH�WLPHV�
:KDW�KDSSHQHG�WR�WKH�5HSRUW�7UHHV�LQ�����DQG�DUH�WKH\�LQ�WKH�6$3�(DV\�$FFHVV
VFUHHQ"
5HSRUW�7UHHV�LQ�����DUH�QRZ�FOLHQW�LQGHSHQGHQW��7KH\�H[LVW�LQ�WKH�6$3�(DV\�$FFHVV�PHQX�5HSRUWLQJ�WUHHV�DQG�DUHD�PHQXV�KDYH�EHHQ�PHUJHG�LQ�IXQFWLRQDOLW\�DQG�LQ�RQH�WRRO��3OHDVHVHH�WKH�UHOHDVH�QRWHV�UHODWHG�WR�WKLV�WRSLF�
:LOO�RQH�XVHU��IRU�H[DPSOH��WKH�$XWKRUL]DWLRQV�$GPLQLVWUDWRU��EH�DEOH�WR�YLHZ�WKH
)DYRULWHV�RI�DQRWKHU�XVHU"�:LOO�D�XVHU�EH�DEOH�WR�DGG�DQ\�WUDQVDFWLRQ�FRGH�WR�WKHLU
IDYRULWHV"
$W�SUHVHQW��RQH�XVHU�FDQQRW�YLHZ�WKH�IDYRULWHV�RI�DQRWKHU�XVHU��$�XVHU�FDQ�DGG�DQ\WUDQVDFWLRQ�FRGH�WR�WKHLU�IDYRULWHV��+RZHYHU��D�XVHU�FDQQRW�H[HFXWH�WKH�WUDQVDFWLRQ�FRGHXQOHVV�WKH\�KDYH�DSSURSULDWH�DXWKRUL]DWLRQV��6B7&2'(��WR�GR�VR��)DYRULWHV��DW�SUHVHQW��DUHQRW�YLHZHG�E\�6$3�GHYHORSPHQW��DV�´VHFXULW\�UHOHYDQW�µ
,I�D�XVHU�FRSLHV�VRPH�WUDQVDFWLRQV�IURP�WKHLU�PHQX�WR�WKHLU�IDYRULWHV�DQG�ODWHU�RQ�WKHVHWUDQVDFWLRQV�DUH�WDNHQ�RXW�RI�WKHLU�DFWLYLW\�JURXS��WKH�WUDQVDFWLRQV�VWLOO�UHPDLQ�LQ�WKH�XVHU·V
Appendix B: Frequently Asked Questions
Profile Generator Setup
Release 4.6A/BB–3
IDYRULWHV��7KH�XVHU�ZLOO�QRW�KDYH�DXWKRUL]DWLRQV�IRU�WKHVH�WUDQVDFWLRQV�DQ\PRUH��0DQXDOPDLQWHQDQFH�RI�WKH�IDYRULWHV�LV�QHHGHG�
3URILOH�*HQHUDWRU�6HWXS
+RZ�GRHV�WKH�$87+25,7<�&+(&.�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU"
:KHQ�$87+25,7<�&+(&.�LV�FDOOHG��WKH�V\VWHP�FKHFNV�ZKHWKHU�WKH�V\VWHP�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VHW�WR�<��,I�WKH�SDUDPHWHU�LV�QRW�VHW�WR�<��WKH�QRUPDO$87+25,7<�&+(&.�LV�FRQGXFWHG��,I�WKH�SDUDPHWHU�LV�VHW�WR�<��LW�VHDUFKHV�IRU�DQ�HQWU\�LQWDEOH�862%;B&��UHIHU�WR�VWUXFWXUH�862%;B&��ZLWK�WKH�FXUUHQW�WUDQVDFWLRQ�FRGH�DQGDXWKRUL]DWLRQ�REMHFW��,I�QRWKLQJ�LV�IRXQG��WKH�QRUPDO�$87+25,7<�&+(&.�LV�FRQGXFWHG��,IDQ�HQWU\�LV�IRXQG��DQG�862%;B&�2.)/$*�LV�VHW�WR�1���QR�FKHFN�LV�SHUIRUPHG��UHJDUGOHVV�RIWKH�DFWXDO�XVHU�SURILOH��,Q�DOO�RWKHU�FDVHV��WKH�UHJXODU�DXWKRUL]DWLRQ�FKHFN�LV�FRQGXFWHG�DQGVXFFHHGV�ZKHQ�WKH�XVHU�SURILOH�FRQWDLQV�DQ�DXWKRUL]DWLRQ�ZLWK�WKH�FRUUHVSRQGLQJH[SUHVVLRQV�IRU�WKH�FXUUHQW�REMHFW�
,Q�D�QHZ�LQVWDOODWLRQ�WKH�SDUDPHWHU�LV�VHW�WR�<��VLQFH�WKH�3*�LV�DOUHDG\�DFWLYDWHG��)RU�PRUHLQIRUPDWLRQ��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�
'R�,�QHHG�WR�VKXW�GRZQ�DQG�UHVWDUW�WKH�LQVWDQFH�DIWHU�,�FKDQJHG�WKH�V\VWHP
SURILOH�SDUDPHWHU"
<HV��\RX�PXVW�UHVWDUW�WKH�LQVWDQFH�DIWHU�DGGLQJ�WKH�LQVWDQFH�SURILOH�SDUDPHWHU��)RU�IXUWKHULQIRUPDWLRQ�RQ�KRZ�WKH�3*�LV�VHW�XS�DQG�ZKDW�VHWWLQJV�QHHG�WR�EH�SHUIRUPHG��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�
:RUNLQJ�ZLWK�WKH�3*�DQG�3URILOHV
&DQ�,�LQFOXGH�DQ�H[LVWLQJ�SURILOH�LQ�DQ�DFWLYLW\�JURXS"
<HV��\RX�FDQ�LQFOXGH�DQ�H[LVWLQJ�SURILOHV��VLQJOH�DQG�FRPSRVLWH��LQWR�DQ�DFWLYLW\�JURXS�3OHDVH�UHIHU�WR�FKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�
:K\�LV�RQO\�RQH�SURILOH�VRPHWLPHV�JHQHUDWHG"
7HFKQLFDOO\��RQO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�RQH�SURILOH��VR�VHYHUDO�SURILOHV�DUH�FUHDWHGIRU�ODUJH�DFWLYLW\�JURXSV��6LQFH�WKH�ODVW�WZR�GLJLWV�DUH�UHTXLUHG�IRU�WKH�LQWHUQDO�QXPHUDWRU�RQO\����GLJLWV�DUH�DYDLODEOH�IRU�WKH�SURILOH�QDPH�
Appendix B: Frequently Asked Questions
Working with the PG and Profiles
Authorizations Made EasyB–4
&DQ�,�PDQXDOO\�FKDQJH�JHQHUDWHG�SURILOHV�IURP�3)&*�LQ�68��"
<RX�FDQ�RQO\�FKDQJH�JHQHUDWHG�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*��ZKHUH�\RX�KDYH�DOO�WKH�VDPHRSWLRQV�DV�LQ�WUDQVDFWLRQ�68����7R�EORFN�JHQHUDWHG�SURILOHV�IRU�PDLQWHQDQFH��XVH�68����,QRWKHU�ZRUGV��LI�WKH�SURILOH�ZDV�FUHDWHG�DV�D�UHVXOW�RI�3)&*��\RX�FDQQRW�FKDQJH�LW�ZLWK�68���
&DQ�,�LQFOXGH�PDQXDO�SURILOHV�LQ�WKH�3URILOH�*HQHUDWRU"
,Q�WKH�3*��FKRRVLQJ�(GLW�→�,QVHUW�DXWK��→�IURP�SURILOH�LQFOXGHV�DOO�DXWKRUL]DWLRQV�IURP�DPDQXDOO\�FUHDWHG�SURILOH�LQ�D�JHQHUDWHG�SURILOH��7KHVH�DXWKRUL]DWLRQV�UHPDLQ�LQ�PDQXDOVWDWXV�DQG��LI�WKH�DFWLYLW\�JURXS�FKDQJHV��WKH�DXWKRUL]DWLRQV�UHPDLQ�XQFKDQJHG�ZKHQ�\RXFRPSDUH�WKH�SURILOH��+RZHYHU��\RX�FDQ�RQO\�LQVHUW�DXWKRUL]DWLRQV�IURP�D�VLQJOH�SURILOH�
&DQ�,�PDQXDOO\�HQWHU�JHQHUDWHG�SURILOHV�LQ�WKH�XVHU�PDVWHU�UHFRUG"
<HV��EXW�ZH�GR�QRW�UHFRPPHQG�LW�IRU�WKH�IROORZLQJ�UHDVRQV�< ,I�WKH�DFWLYLW\�JURXS�LV�H[WUHPHO\�ODUJH��RU�LV�LQFUHDVHG�E\�D�ODWHU�FKDQJH���WKH�3*
JHQHUDWHV�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�SURILOH�DQG�DXWRPDWLFDOO\�XSGDWHV�WKH�DIIHFWHGXVHU�PDVWHUV��ZKLFK�KDYH�WR�EH�PDQXDOO\�LQVHUWHG�
< :KHQ�DVVLJQLQJ�ZLWK�WKH�3*��\RX�FDQ�LQFOXGH�WLPH�GHSHQGHQFLHV�DQG�DVVLJQ�WKH�SURILOHIRU�D�OLPLWHG�WLPH�SHULRG�
,V�LW�SRVVLEOH�WR�FKDQJH�WKH�SURILOH�QDPH�ODWHU"
<HV��RQO\�WKH�ORQJ�WH[W��GHVFULSWLYH�WH[W��WR�D�SURILOH�FDQ�EH�FKDQJHG�ZLWK�WKH�3*��ZKLFK�GRHVQRW�DIIHFW�WKH�DXWKRUL]DWLRQV�XVHG�LQ�WKLV�SURILOH��,W�LV�QRW�SRVVLEOH�WR�PDQXDOO\�FKDQJH�WKHWHFKQLFDO�SURILOH�QDPH�RI�D�JHQHUDWHG�SURILOH�ZLWK�WKH�3*�
&DQ�,�FRS\�DQ�DFWLYLW\�JURXS��DQG�ZLOO�WKLV�SURFHGXUH�DOVR�FRS\�WKH�SURILOH"
<HV��\RX�FDQ�FRS\�DFWLYLW\�JURXSV��EXW�ZKLOH�FRS\LQJ��FKRRVH�D�GLIIHUHQW�QDPH�IRU�WKH�QHZDFWLYLW\�JURXS��7KH�DFWLYLW\�JURXS��WKH�DFWLYLWLHV��DQG�WKH�SURILOH�GDWD�DUH�WKHQ�FRSLHG��6HHFKDSWHU����WKH�VHFWLRQ�&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�IRU�GHWDLOHG�LQIRUPDWLRQ�
,I�,�JHQHUDWH�D�SURILOH�WKDW�PD\�XVH�D�SUHYLRXVO\�EXLOW�DXWKRUL]DWLRQ��ZLOO�WKH
V\VWHP�FUHDWH�D�QHZ�RQH�RU�XVH�WKH�H[LVWLQJ�RQH"
(YHU\�WLPH�\RX�JHQHUDWH�D�QHZ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��QHZ�DXWKRUL]DWLRQV�DUH�FUHDWHG�,W�WDNHV�ORQJHU�WR�VHDUFK�IRU�H[LVWLQJ�DXWKRUL]DWLRQV�ZLWK�WKH�VDPH�YDOXHV�WKDQ�WR�FUHDWH�QHZRQHV��(DFK�DXWKRUL]DWLRQ�FDQ�RQO\�EH�XVHG�LQ�RQH�DFWLYLW\�JURXS�
+RZ�GR�,�UHVWULFW�DFWLYLWLHV�E\�VSHFLILF�WLPH�SHULRGV"
(YHQ�LI�\RX�GR�QRW�XVH�%&�2UJ��\RX�FDQ�VWLOO�FKRRVH�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�XVHUV�IRU�DOLPLWHG�WLPH��7KLV�DFWLRQ�PDNHV�VHQVH��IRU�H[DPSOH��ZKHQ�\RXU�FRPSDQ\�HQWHUV�D�QHZ�ILVFDO\HDU��3K\VLFDO�LQYHQWRU\�DFWLYLWLHV�VKRXOG�RQO\�EH�DOORZHG�IRU�D�OLPLWHG�SHULRG�RI�WLPH��)RUIXUWKHU�LQIRUPDWLRQ�RQ�VHWWLQJ�WLPH�OLPLWV��UHIHU�WR�FKDSWHU����$VVLJQLQJ�DFWLYLW\�JURXSV�
Appendix B: Frequently Asked Questions
Authorization Checks (SU24)
Release 4.6A/BB–5
:KLFK�WUDQVDFWLRQV�DUH�XVHG�E\�WKH�3*�WR�PDLQWDLQ�D�VSHFLILF�DXWKRUL]DWLRQ"
2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH�8WLOLWLHV�→�6HWWLQJV�→�)RU2YHUYLHZ�RI�$XWKRUL]DWLRQ�2EMHFW�8VH��WR�LPSRUW�DQ�LFRQ�LQWR�\RXU�SURILOH�WUHH��7KLV�LFRQ�ZKLFK�ORRNV�OLNH�D�PRXQWDLQ��GLVSOD\V�WKH�WUDQVDFWLRQV�IRU�ZKLFK�WKH�&KHFN�PDLQWDLQ�IODJ�LVVHW�IRU�WKH�REMHFW�
$XWKRUL]DWLRQ�&KHFNV��68���
:KDW�GR�WKH�GLIIHUHQW�FKHFN�IODJV�VWDQG�IRU"
&0��&KHFN�0DLQWDLQ�
< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW�DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU
FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�
&��&KHFN�
< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�
1��1R�FKHFN�
< 7KH�DXWKRULW\�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�
8��8QPDLQWDLQHG�
< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRULW\�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�
7R�OHDUQ�PRUH�DERXW�WUDQVDFWLRQ�68����SOHDVH�VHH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI$XWKRUL]DWLRQ�&KHFNV�
:K\�'RHV�WKH�3URILOH�*HQHUDWRU�0DLQWDLQ�$XWKRUL]DWLRQV�IRU�0RUH�2EMHFWV�7KDQ
<RX�&DQ�6HH"
:LWK�WUDQVDFWLRQ�68���\RX�FDQ�EURZVH�WKH�HQWULHV�RI�WDEOHV�862%;B&�DQG�862%7B&��7KH3*�XVHV�WDEOH�862%;B&�WR�FKHFN�IRU�WUDQVDFWLRQV�LQ�WKH�FRUUHVSRQGLQJ�DFWLYLW\�JURXSVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW·V�DXWKRUL]DWLRQV�DUH�WR�EH�PDLQWDLQHG��7KH�FRUUHVSRQGLQJYDOXHV�DUH�VWRUHG�LQ�WDEOH�862%7B&��%XW��WKH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ��7KHVHWUDQVDFWLRQV�ZRUN�ZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��UHVWULFWHG�E\�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�WKDW�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�
Appendix B: Frequently Asked Questions
Authorization Checks (SU24)
Authorizations Made EasyB–6
7KH�DXWKRUL]DWLRQ�FKHFNV�DUH�FRGHG�H[FOXVLYHO\�LQ�WKH�FRUH�WUDQVDFWLRQ��+RZHYHU��WKHDXWKRUL]DWLRQ�ILHOG�YDOXHV�FDQ�EH�VSHFLILHG�PRUH�SUHFLVHO\�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�WKDQLQ�WKH�FRUH�WUDQVDFWLRQ��7KH�3*�ILUVW�PDLQWDLQV�WKH�DXWKRUL]DWLRQV�LQ�862%;B&�DQG862%7B&�XQGHU�WKH�SDUDPHWHU�WUDQVDFWLRQ��DQG�WKHQ�OLVWV�DXWKRUL]DWLRQV�IRU�DOODXWKRUL]DWLRQ�REMHFWV�LQ�WKH�FRUH�WUDQVDFWLRQ�DV�WR�EH�PDLQWDLQHG��$V�D�UHVXOW��IRU�WKH�SDUDPHWHUWUDQVDFWLRQ��PRUH�DXWKRUL]DWLRQV�DUH�PDLQWDLQHG�WKDQ�FDQ�EH�VHHQ�LQ�68���
)RU�H[DPSOH��WUDQVDFWLRQ�2&����ZKLFK�PDLQWDLQV�H[FKDQJH�UDWHV��XVHV�WKH�JHQHUDO�WDEOHPDLQWHQDQFH�WUDQVDFWLRQ��60�����2Q�WKH�LQLWLDO�VFUHHQ�IRU�60����HQWHU�WKH�YLHZ�QDPHV_TCURR�DQG�FKRRVH�0DLQWDLQ��7KH�3*�UHDGV�68���IRU�2&���DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQIRU�WKH�REMHFW�6B7$%8B',6�ZLWK�WKH�&KDQJH�DQG�'LVSOD\�YDOXHV�IRU�WKH�DFWLYLW\�DQG�WKH�)&��YDOXH�IRU�WKH�DXWKRUL]DWLRQ�JURXS��7KH�3*�DOVR�UHDGV�68���IRU�WKH�FRUH�WUDQVDFWLRQ�60��DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQ�IRU�6B7$%8B&/,�ZLWK�D�%/$1.�YDOXH��EHFDXVH�WKLV�REMHFW�LVQRW�OLVWHG�LQ�68���XQGHU�2&���
+RZ�'R�,�5HGXFH�WKH�6FRSH�RI�$XWKRULW\�&KHFNV�LQ�5��"
6HH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�LQ�WKLV�JXLGH�
+RZ�&DQ�D�&XVWRPHU�,QFOXGH�,QGLYLGXDO�$XWKRUL]DWLRQ�&KHFNV�LQ�D�7UDQVDFWLRQ"
)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�EH�FDUULHG�RXW�< $OZD\V< 2QO\�RQ�FHUWDLQ�VFUHHQV< 2QO\�LQ�FHUWDLQ�WUDQVDFWLRQV
)RU�PRUH�LQIRUPDWLRQ�RQ�ILHOG�H[LWV��VHH�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'�
:KHQ�6WDUWLQJ�7UDQVDFWLRQV��:KDW�6KRXOG�,�.QRZ�$ERXW�WKH�1HZ�$XWKRUL]DWLRQ
&KHFN"
(DFK�WLPH�D�QHZ�WUDQVDFWLRQ�LV�FDOOHG��00����IRU�H[DPSOH���WKH�V\VWHP�FKHFNV�ZKHWKHU�WKHXVHU�LV�DXWKRUL]HG�WR�VWDUW�WKDW�WUDQVDFWLRQ���1R�FKHFN�WDNHV�SODFH�IRU�WKH�$%$3�FRPPDQG&$//�75$16$&7,21���,I�\RX�XVH�WKH�3*�DQG�LWV�PHQXV�WR�IRUP�DFWLYLW\�JURXSV��DQDXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(�LV�DXWRPDWLFDOO\�GHILQHG�IRU�HDFK�DFWLYLW\�JURXS��,WFRQWDLQV�WKH�H[DFW�WUDQVDFWLRQV�WKDW�\RX�VHOHFWHG�IRU�WKH�DFWLYLW\�JURXS�
,I�\RX�ZDQW�WR�DOORZ�WUDQVDFWLRQV�WKDW�\RX�GLG�QRW�DVVLJQ�XVLQJ�WKH�DFWLYLW\�JURXS�PHQX�PDQXDOO\�DGG�DQ�DXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(��DQG�HQWHU�WKH�PLVVLQJ�WUDQVDFWLRQV��<RXFDQ�QRZ�DYRLG�SUREOHPV�ZKHQ�\RX�FRPSDUH�WKH�DXWKRUL]DWLRQ�GDWD�
6B7&2'(�LV�IRXQG�LQ�WKH�REMHFW�FODVV�1RQDSSOLFDWLRQ�VSHFLILF�$XWKRUL]DWLRQ�REMHFWV��7KH6B7&'B$//�DXWKRUL]DWLRQ�LV�GHOLYHUHG�ZLWK�WKH�SURILOH�6$3B1(:B��(��ZKLFK�DOORZV�\RX�WRH[HFXWH�DOO�WUDQVDFWLRQV��%\�JLYLQJ�UHVWULFWHG�DXWKRUL]DWLRQV�IRU�6B7&2'(��WKH�XVHUDGPLQLVWUDWRU�FDQ�UHVWULFW�LQGLYLGXDO�XVHUV�RU�XVHU�JURXSV�WR�UHPDLQ�ZLWKLQ�WKH�WUDQVDFWLRQVWKH\�UHTXLUH��7KH�DXWKRUL]DWLRQ�FKHFNV�GHILQHG�E\�WKH�GHYHORSHU�ZLWK�WUDQVDFWLRQ�6(���WUDQVDFWLRQ�PDLQWHQDQFH���RU�LQ�WKH�$%$3�VRXUFH�FRGH��FRQWLQXH�WR�EH�SHUIRUPHG�
Appendix B: Frequently Asked Questions
Upgrade Procedure (SU25)
Release 4.6A/BB–7
7KHVH�DUH�WKH�DGYDQWDJHV�RI�WKH�QHZ�DXWKRUL]DWLRQ�FKHFN�< $�JXDUDQWHH�WKDW�HDFK�WUDQVDFWLRQ�SHUIRUPV�DW�OHDVW�RQH�DXWKRUL]DWLRQ�FKHFN< $Q�HDV\�ZD\�WR�GHWHUPLQH�ZKLFK�WUDQVDFWLRQV�D�XVHU�FDQ�H[HFXWH
8SJUDGH�3URFHGXUH��68���
,V�WKHUH�D�ZD\�WR�UXQ�WKH�68���VWHSV�LQ�´VLPXODWLRQµ�RU�´WHVWµ�PRGH"
$W�SUHVHQW��LW�LV�QRW�SRVVLEOH�WR�UXQ�D�VLPXODWLRQ�RU�WHVW�PRGH�
,QFOXGLQJ�7UDQVDFWLRQV�RU�5HSRUWV
+RZ�FDQ�,�LQFOXGH�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV�LQ�WUDQVDFWLRQV"
)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�DOZD\V�EHFDUULHG�RXW�RQO\�RQ�FHUWDLQ�VFUHHQV�RU�LQ�FHUWDLQ�WUDQVDFWLRQV��)XUWKHU�GHWDLOV�RQ�ILHOG�H[LWVFDQ�EH�IRXQG�LQ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'��127(��)LHOG�H[LWV�JHWLQYRNHG�DIWHU�WKH�XVHU�DWWHPSWV�WR�SURFHVV�D�SDUWLFXODU�VFUHHQ��)LHOG�H[LWV�GR�QRW�SUHYHQWXVHUV�IURP�HQWHULQJ�D�VFUHHQ�ZKLFK�FRQWDLQV�WKH�ILHOG��$V�ILHOG�H[LWV�FDQ�EH�PDGH�WR�EH�VFUHHQDQG�SURJUDP�VSHFLILF��LW�LV�SRVVLEOH�WKDW�6$3�FDQ�GHILQH�QHZ�VFUHHQV�DQG�SURJUDPV�ZKLFKZLOO��H�J��DIWHU�DQ�XSJUDGH��UHQGHU�WKH�ILHOG�H[LW�DV�QRQ�IXQFWLRQDO��)LHOG�H[LWV�RI�VXFK�VRUWPXVW�DOZD\V�EH�FRQVLGHUHG�DIWHU�DQ�XSJUDGH�
0LVVLQJ�$XWKRUL]DWLRQV
:KDW�LI�DQ�DXWKRUL]DWLRQ�LV�VWLOO�PLVVLQJ�IRU�WKH�JHQHUDWHG�SURILOH��DQG�WKH�XVHU
JHWV�D�´1R�DXWKRUL]DWLRQ���µ�PHVVDJH"
5HPHPEHU�WKDW�LI�LPSOHPHQWLQJ�DQ\�SRUWLRQ�RI�WKH�+5�FRPSRQHQW�RI�WKH�5���6\VWHP��WKHUHLV�D�SRVVLELOLW\�WR�HQDEOH�FHUWDLQ�SDUWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP�WKDW�DUH�127�UHODWHG�WR�WKHSURILOH�JHQHUDWRU��H[DPSOH��,PSOHPHQWLQJ�+5�VWUXFWXUDO�DXWKRUL]DWLRQV���$V�VXFK��WKH�´1RDXWKRUL]DWLRQ«�µ�PHVVDJH�ZRXOG�EH�FRUUHFW�DQG�WKH�V\VWHP�LV�QRW�LQ�HUURU��,I�FRQYLQFHG�WKDWWKHUH�LV�DQ�HUURU�LQ�WKH�V\VWHP��FUHDWH�DQ�6$31HW�²�5���)URQWHQG�QRWH�WR�VSHFLI\�WKHWUDQVDFWLRQ�DQG�WKH�SUHFLVH�HUURU�PHVVDJH��SUHIHUDEO\�D�FRS\�RI�WKH�RXWSXW�IURP�WUDQVDFWLRQ68����WKDW�\RX�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS��7R�FRUUHFW�WKH�HUURU�LQ�\RXU�V\VWHP��VHHFKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�
Appendix B: Frequently Asked Questions
User Administration
Authorizations Made EasyB–8
8VHU�$GPLQLVWUDWLRQ
+RZ�FDQ�WKH�ZRUN�LQYROYHG�LQ�PDLQWDLQLQJ�VHWWLQJ�XS�DXWKRUL]DWLRQV�EH�GLYLGHG�XS
DPRQJVW�PXOWLSOH�SHRSOH"
6LQFH�WKH�3*�VHOHFWV�WKH�DXWKRUL]DWLRQ�REMHFWV��LW�LV�QR�ORQJHU�QHFHVVDU\�WR�GHFLGH�ZKRPDLQWDLQV�DXWKRUL]DWLRQV�IRU�DQ�REMHFW��7KH�FKHFN�DJDLQVW�WKH�REMHFW�6B86(5B$87�LV�FDUULHGRXW�RQO\�LI�WKH�DGPLQLVWUDWRU�PDQXDOO\�LQVHUWV�DQ�DXWKRUL]DWLRQ��:LWK�DXWKRUL]DWLRQ�REMHFW6B86(5B$*5��D�FKHFN�LV�SRVVLEOH�DW�WKH�DFWLYLW\�JURXS�OHYHO�WR�VHH�ZKR�LV�DOORZHG�WR�VHOHFWZKLFK�WUDQVDFWLRQ�IRU�WKLV�DFWLYLW\�JURXS��)RU�D�IXUWKHU�FODVVLILFDWLRQ�LQWR�DXWKRUL]DWLRQ�DQGDFWLYDWLRQ�DGPLQLVWUDWRU��VHH�$GPLQLVWUDWLRQ�:KHQ�8VLQJ�WKH�3URILOH�*HQHUDWRU�LQ�WKH�RQOLQHGRFXPHQWDWLRQ�
7UDQVSRUWLQJ
'R�WKH�862%;B&�DQG�862%7B&�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�FOLHQWV"
1R��7KHVH�WDEOHV�DUH�FOLHQW�LQGHSHQGHQW��7KH\�RQO\�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�V\VWHPV�
,V�WKHUH�D�ZD\�WR�WUDQVSRUW�DFWLYLW\�JURXSV"
<HV��\RX�FDQ�HLWKHU�XVH�WKH�VWDQGDUG�WUDQVSRUW�FRQQHFWLRQ�LQ�WUDQVDFWLRQ�3)&*�RU�XVH�PDVV�WUDQVSRUW�DFWLYLW\�JURXSV�LQVLGH�WKH�3*�
'RHV�WKH�WUDQVSRUW�RI�DFWLYLW\�JURXSV�EHWZHHQ�WZR�FOLHQWV��LQ�WKH�VDPH�V\VWHP�
ZRUN�ZLWK�WUDQVDFWLRQ�6&&�"
<HV��DIWHU�EHLQJ�LPSRUWHG�WR�WKH�WDUJHW�FOLHQW��WKH�WUDQVSRUWHG�DFWLYLW\�JURXSV�DUH�QRZ�DFWLYHDQG�GR�DSSHDU�LQ�WUDQVDFWLRQ�3)&*��7KLV�VWHS�ZDV�QRW�SRVVLEOH�LQ�UHOHDVHV�EHIRUH����%�
:KDW�LI�WKH�JHQHUDWHG�SURILOH�RQO\�KDV�DXWKRUL]DWLRQV�IRU�REMHFW�6B7&2'("
7KH�6$3�GHIDXOW�WDEOHV�PD\�QRW�KDYH�EHHQ�FRSLHG�LQWR�WKH�FXVWRPHU�WDEOHV��,I�\RX�JHW�D�1RRUJDQL]DWLRQDO�GDWD�DYDLODEOH�PHVVDJH��UXQ�WUDQVDFWLRQ�68����6HH�FKDSWHU���LQ�WKLV�JXLGH�IRUPRUH�LQIRUPDWLRQ�RQ�WUDQVDFWLRQ�68���
7DEOHV
+RZ�GR�,�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV�WKDW�DUH�LQFOXGHG�LQ�DQ�DFWLYLW\�JURXS"
5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��
�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�
�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��
�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�$*5B1$0(�
Appendix B: Frequently Asked Questions
Tables
Release 4.6A/BB–9
�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��
�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�WUDQVDFWLRQ�FRGHV�LQ�WKDW�DFWLYLW\�JURXS�QDPH�
+RZ�GR�,�GLVSOD\�LQ�ZKLFK�DFWLYLW\�JURXS�D�FHUWDLQ�WUDQVDFWLRQ�FRGH�LV�EHLQJ�XVHG"
5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��
�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�
�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��
�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKH�ILHOG�7&2'(�
�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��
�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�DFWLYLW\�JURXSV�QDPH�ZKHUH�WKDW�WUDQVDFWLRQ�FRGH�LV�EHLQJXVHG�
+RZ�GR�,�GLVSOD\�ZKLFK�DFWLYLW\�JURXS�LV�XVHG�E\�ZKLFK�XVHU"
5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��
�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�
�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��
�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�7$*5B1$0(�
�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��
�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�QDPHV�RI�DOO�XVHUV�WKDW�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�
+RZ�GR�,�GLVSOD\�ZKLFK�XVHU�LV�DVVLJQHG�WR�ZKLFK�DFWLYLW\�JURXS"
5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��
�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�
�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��
�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�XVHU�LQ�WKH�ILHOG�81$0(�
�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��
�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�DOO�DFWLYLW\�JURXSV�WKLV�XVHU�LV�DVVLJQHG�WR�
'RHV�WKH�DXWKRUL]DWLRQ�REMHFW�DOORZ�DFWLYLWLHV�QRW�PDLQWDLQHG�LQ�WDEOH�7$&7="
7DEOH�7$&7=�FRQWDLQV�DOORZDEOH�DFWLYLWLHV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW��,I�\RX�ILQG�DWUDQVDFWLRQ�ORRNLQJ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�ZLWK�DQ�DFWLYLW\�WKDW�LV�QRW�PDLQWDLQHG�RURIIHUHG�E\�3*��PDLQWDLQ�WKH�PLVVLQJ�DFWLYLW\�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�REMHFW�LQ�WDEOH7$&7=�ZLWK�WUDQVDFWLRQ�60����7KH�3*�WKHQ�RIIHUV�WKLV�YDOXH�
Appendix B: Frequently Asked Questions
Tables
Authorizations Made EasyB–10
:KDW�LV�WKH�VWUXFWXUH�RI�WDEOH�862%;B&"
)LHOG�QDPH .H\ 'HVFULSWLRQ
1$0( ; 3URJUDP�WUDQVDFWLRQ�IXQFWLRQ�PRGXOH�QDPH
7<3( ; 7\SH�RI�UHSRUW
2%-(&7 ; 8VHU�PDVWHU�PDLQWHQDQFH��DXWKRUL]DWLRQ�REMHFW
02',),(5 /DVW�FKDQJHG�E\
02''$7( 'DWH�RI�FKDQJH
02'7,0( 7LPH�RI�FKDQJH
2.)/$* 1� �1R�DXWKRUL]DWLRQ�FKHFNV;� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH<� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH��GHIDXOW�YDOXHV�LQ�862%7B&8� �1RW�PDLQWDLQHG
7KH�1$0(�DQG�7<3(�ILHOGV�LGHQWLI\�D�WUDQVDFWLRQ��DQG�2%-(&7�LGHQWLILHV�WKH�DXWKRUL]DWLRQREMHFW��02',),(5��02''$7(��02'7,0(�FRQWDLQ�DGPLQLVWUDWLYH�LQIRUPDWLRQ�DERXW�WKHPRVW�UHFHQW�FKDQJHV��2.)/$*�LV�LPSRUWDQW�EHFDXVH�ZKHQ�LW�FRQWDLQV�WKH�YDOXH�1��QRDXWKRUL]DWLRQ�FKHFN�LV�SHUIRUPHG�IRU�WKH�WUDQVDFWLRQ�DQG�DXWKRUL]DWLRQ�REMHFW�
([DPSOHV
(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_STUE_BER��2.)/$*� �N��(YHU\DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B678(B%(5�,'����ZLOO�VXFFHHG�UHJDUGOHVV�RI�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�
(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_DRAW_TCD��2.)/$*� �X�RU�DQRWKHU�YDOXH�!�N��$Q�DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B'5$:B7&'�,'����ZLOOVXFFHHG�RQO\�ZKHQ�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKH�FRPELQDWLRQ�RI�ILHOGV�RUILHOG�FRQWHQWV��XQGHU�,'�
C–1
$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH
3DUDPHWHUV
&RQWHQWV
Incorrect Logons, Default Clients, and Default Start Menu............................... C–2
Setting Password Length and Expiration............................................................ C–2
Specifying Impermissible Passwords ................................................................. C–3
Securing SAP* Against Misuse ............................................................................ C–3
Tracing Authorizations.......................................................................................... C–3
Profile Generator and Transaction SU24............................................................. C–4
User Buffer.............................................................................................................. C–4
No Check on Object S_TCODE............................................................................. C–4
No Check on Certain ABAP Objects .................................................................... C–4
RFC Authority Check............................................................................................. C–5
&&
Appendix C: Important System Profile Parameters
Incorrect Logons, Default Clients, and Default Start Menu
Authorizations Made EasyC–2
,QFRUUHFW�/RJRQV��'HIDXOW�&OLHQWV��DQG�'HIDXOW�6WDUW�0HQX
8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VHW�LQFRUUHFW�ORJRQ�OLPLWV�DQG�WKH�GHIDXOWFOLHQW�< /RJLQ�IDLOVBWRBVHVVLRQBHQG
7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�WHUPLQDWHV�WKH�ORJRQ�DWWHPSW��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV��EXW�WKLVYDOXH�FDQ�EH�VHW�WR�DQ\�QXPEHU�EHWZHHQ��²���
< /RJLQ�IDLOVBWRBXVHUBORFN
7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�ORFNV�WKH�XVHU�IURP�PDNLQJ�DGGLWLRQDO�ORJRQ�DWWHPSWV��,I�WKH�V\VWHPORFNV��DQ�HQWU\�LV�ZULWWHQ�WR�WKH�V\VWHP�ORJ��DQG�WKH�ORFN�LV�UHOHDVHG�DW�PLGQLJKW��7KHGHIDXOW�LV����WLPHV��EXW�WKLV�YDOXH�FDQ�EH�VHW�WR�DQ\�YDOXH�EHWZHHQ��²���
< /RJLQ�IDLOHGBXVHUBDXWRBXQORFN
7KLV�SDUDPHWHU�XQORFNV�XVHUV�ZKR�JRW�ORFNHG�RXW�E\�ORJJLQJ�RQ�LQFRUUHFWO\��,I�WKHSDUDPHWHU�LV�VHW�WR����WKH�GHIDXOW���GXH�WR�D�SUHYLRXV�LQFRUUHFW�ORJRQ�DWWHPSW��WKH�V\VWHPGRHV�QRW�FRQVLGHU�XVHUV�ORFNHG��7KH�ORFNV�UHPDLQ�LI�WKH�SDUDPHWHU�YDOXH�LV���
< /RJLQ�V\VWHPBFOLHQW
7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�FOLHQW��7KLV�FOLHQW�LV�DXWRPDWLFDOO\�ILOOHG�LQ�RQ�WKHV\VWHP�ORJRQ�VFUHHQ��8VHUV�FDQ�HQWHU�D�GLIIHUHQW�FOLHQW�
< /RJLQ�H[WBVHFXULW\
6LQFH�5HOHDVH����(��H[WHUQDO�VHFXULW\�WRROV�VXFK�DV�.HUEHURV�RU�6HFXGH�KDYH�PDQDJHG5���6\VWHP�DFFHVV��,I�WKLV�SDUDPHWHU�LV�VHW��DQ�DGGLWLRQDO�LGHQWLILFDWLRQ�FDQ�EH�VSHFLILHGIRU�HDFK�XVHU��LQ�XVHU�PDLQWHQDQFH��ZKHUH�XVHUV�ORJ�RQ�WR�WKHLU�VHFXULW\�V\VWHP��7RDFWLYDWH��VHW�WKH�YDOXH�WR�;�
< 6WDUWBPHQX
7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�VWDUW�PHQX�IRU�DOO�XVHUV�DQG�FDQ�EH�RYHUZULWWHQ�ZLWKWKH�XVHU�VSHFLILF�VWDUW�PHQX��WUDQVDFWLRQ�68�����7KH�GHIDXOW�LV�6�����DQG�WKLV�YDOXH�FDQ�EHVHW�WR�DQ\�RWKHU�DUHD�PHQX�FRGH�
6HWWLQJ�3DVVZRUG�/HQJWK�DQG�([SLUDWLRQ
8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VSHFLI\�WKH�PLQLPXP�OHQJWK�RI�D�SDVVZRUGDQG�WKH�IUHTXHQF\�ZLWK�ZKLFK�XVHUV�PXVW�FKDQJH�SDVVZRUGV�< /RJLQ�PLQBSDVVZRUGBOQJ
7KLV�SDUDPHWHU�GHILQHV�WKH�PLQLPXP�SDVVZRUG�OHQJWK��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV�EXW�WKLV�YDOXH�FDQ�EH�VHW�IURP�WKUHH�WR�HLJKW�FKDUDFWHUV�
Appendix C: Important System Profile Parameters
Specifying Impermissible Passwords
Release 4.6A/BC–3
< /RJLQ�SDVVZRUGBH[SLUDWLRQBWLPH
7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�GD\V�DIWHU�ZKLFK�D�SDVVZRUG�PXVW�EH�FKDQJHG�7KH�SDUDPHWHU�DOORZV�XVHUV�WR�NHHS�WKHLU�SDVVZRUGV�ZLWKRXW�WLPH�OLPLW�DQG�OHDYHV�WKHYDOXH�VHW�WR�WKH�GHIDXOW����
7R�PDNH�WKH�SDUDPHWHUV�JOREDOO\�HIIHFWLYH�LQ�DQ�5���6\VWHP��VHW�WKHP�LQ�WKH�GHIDXOW�SURILOH�'()$8/7�3)/��7R�PDNH�WKHP�LQVWDQFH�VSHFLILF��\RX�PXVW�VHW�WKHP�LQ�WKH�SURILOHV�RI�HDFKDSSOLFDWLRQ�VHUYHU�LQ�\RXU�5���6\VWHP�
6SHFLI\LQJ�,PSHUPLVVLEOH�3DVVZRUGV
7R�IRUELG�XVH�RI�D�FHUWDLQ�SDVVZRUG��HQWHU�LW�LQ�WDEOH�865����<RX�FDQ�PDLQWDLQ�WKLV�WDEOH�ZLWKWUDQVDFWLRQ�60����,Q�865����\RX�PD\�DOVR�JHQHULFDOO\�VSHFLI\�SURKLELWHG�SDVVZRUGV�
7KHUH�DUH�WZR�ZLOG�FDUG�FKDUDFWHUV�< $�TXHVWLRQ�PDUN��"��PHDQV�D�VLQJOH�FKDUDFWHU�< $Q�DVWHULVN�� ��PHDQV�D�VHTXHQFH�RI�DQ\�FRPELQDWLRQ�FKDUDFWHUV�RI�DQ\�OHQJWK�
([DPSOHV�< ��� �LQ�WDEOH�865���SURKLELWV�DQ\�SDVVZRUG�WKDW�EHJLQV�ZLWK�WKH�VHTXHQFH�����< ��� �SURKLELWV�DQ\�SDVVZRUG�WKDW�FRQWDLQV�WKH�VHTXHQFH�����< $%"�SURKLELWV�SDVVZRUGV�WKDW�EHJLQ�ZLWK�$%�DQG�KDYH�DQ�DGGLWLRQDO�FKDUDFWHU��VXFK�DV
$%$��$%%��DQG�$%&�
6HFXULQJ�6$3 �$JDLQVW�0LVXVH
/RJLQ�QRBDXWRPDWLFBXVHUBVDS
,I�WKH�SDUDPHWHU�LV�VHW�WR����WKHQ�6$3 �KDV�QR�VSHFLDO�GHIDXOW�SURSHUWLHV��5HVHWWLQJ�WKHSDUDPHWHU�WR���DOORZV�ORJLQV�ZLWK�SAP*��SDVVZRUG�PASS��DQG�XQUHVWULFWHG�V\VWHP�DFFHVVSULYLOHJHV��(YHQ�LI�\RX�VHW�WKH�SDUDPHWHU��HQVXUH�WKDW�WKHUH�LV�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �,I�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �H[LVWV��LW�EHKDYHV�OLNH�D�QRUPDO�XVHU��LV�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV��DQG�LWV�SDVVZRUG�FDQ�EH�FKDQJHG�
7UDFLQJ�$XWKRUL]DWLRQV
$XWK�FKHFNBYDOXHBZULWHBRQ
%\�HQWHULQJ�WUDQVDFWLRQ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DQDO\]H�DQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�WKDW�KDV�MXVW�RFFXUUHG�LQ�\RXU�VHVVLRQ��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�KDYHVHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�D�YDOXH�JUHDWHU�WKDQ����%\�GHIDXOW��WKH�IXQFWLRQ�LVLQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV���
Appendix C: Important System Profile Parameters
Profile Generator and Transaction SU24
Authorizations Made EasyC–4
3URILOH�*HQHUDWRU�DQG�7UDQVDFWLRQ�68��
$XWK�QRBFKHFNBLQBVRPHBFDVHV
%\�XVLQJ�WUDQVDFWLRQ�SU24��\RX�FDQ�DFWLYDWH�RU�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRUWUDQVDFWLRQV��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�VHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�<��%\GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�DFWLYDWH�WKH�SDUDPHWHU��VHWWKH�YDOXH�WR�<��,I�\RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*��WKH�SDUDPHWHU�PXVW�EH�VHW�
8VHU�%XIIHU
$XWK�DXWKBQXPEHUBLQBXVHUEXIIHU
7R�KDYH�D�JRRG�SHUIRUPDQFH�LQ�WKH�V\VWHP��WKH�QDPHV�RI�DOO�WKH�DXWKRUL]DWLRQV�LQFOXGHG�LQ�DXVHU�PDVWHU�IRU�D�XVHU�DUH�EXIIHUHG�LQ�D�WDEOH��,Q�WKH�VWDQGDUG��WKLV�EXIIHU�FDQ�GHDO�ZLWK�XS�WR������DXWKRUL]DWLRQV��,I�D�XVHU�KDV�PRUH�WKDQ�������DXWKRUL]DWLRQV�WKH�YDOXH�FDQ�EH�VHW�WR������7KH�GHIDXOW�YDOXH�LV������EXW�WKLV�GHIDXOW�YDOXH�FDQ�EH�VHW�WR�EHWZHHQ��²������,I�IRU�DQ\UHDVRQ�\RX�KDYH�WR�UHVHW�WKH�XVHU�EXIIHU��VHH�2QOLQH�6HUYLFH�6\VWHP�QRWH�������DQG�������IRUGHWDLOHG�LQIRUPDWLRQ�
1R�&KHFN�RQ�2EMHFW�6B7&2'(
$XWK�QRBFKHFNBRQBWFRGH
)URP�5HOHDVH����(��WKH�V\VWHP�FKHFNV�RQ�REMHFW�6B7&2'(��,Q�VSHFLILF�LQVWDQFHV��\RX�FDQ�WXUQWKLV�FKHFN�RII��EXW�WKLV�VWHS�UHVXOWV�LQ�D�ELJ�VHFXULW\�ULVN�IRU�\RXU�V\VWHP��%\�GHIDXOW��WKHIXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�VZLWFK�WKH�FKHFN�RII�VHW�WKH�YDOXH�WR�<�
1R�&KHFN�RQ�&HUWDLQ�$%$3�2EMHFWV
$XWK�V\VWHPBDFFHVVBFKHFNBRII
8VH�WKLV�SDUDPHWHU�WR�WXUQ�RII�WKH�DXWRPDWLF�DXWKRUL]DWLRQ�FKHFN�IRU�SDUWLFXODU�$%$3ODQJXDJH�HOHPHQWV��ILOH�RSHUDWLRQV��&3,&�FDOOV��DQG�FDOOV�WR�NHUQHO�IXQFWLRQV���7KLV�SDUDPHWHUHQVXUHV�WKH�GRZQZDUG�FRPSDWLELOLW\�RI�WKH�5���NHUQHO��%\�GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH�YDOXH� ���DQG�FKHFN�UHPDLQV�DFWLYH���7R�WXUQ�WKH�FKHFN�RII��VHW�WKH�YDOXH�WR���
Appendix C: Important System Profile Parameters
RFC Authority Check
Release 4.6A/BC–5
5)&�$XWKRULW\�&KHFN
$XWK�UIFBDXWKRULW\BFKHFN
<RX�FDQ�XVH�WKLV�SDUDPHWHU�WR�GHWHUPLQH�ZKHWKHU�REMHFW�6B5)&�LV�FKHFNHG�GXULQJ�5)&�FDOOV�< 9DOXH� ����QR�FKHFN�DJDLQVW�6B5)&< 9DOXH� ����FKHFN�DFWLYH�EXW�QR�FKHFN�IRU�65)&�)8*5
< 9DOXH� ����FKHFN�DFWLYH�DQG�FKHFN�DJDLQVW�65)&�)8*5
Appendix C: Important System Profile Parameters
RFC Authority Check
Authorizations Made EasyC–6
G–1
*ORVVDU\
7HUP 'HILQLWLRQ
$%$3 $%$3�LV�DQ�LQWHUSUHWDWLYH��SODWIRUP�LQGHSHQGHQW��IRXUWK�JHQHUDWLRQ�ODQJXDJHWDLORUHG�WR�GHYHORS�EXVLQHVV�DSSOLFDWLRQV��7KH�ODQJXDJH�VXSSRUWV�VWUXFWXUHGSURJUDPPLQJ�DQG�FRQWDLQV�HOHPHQWV�QHFHVVDU\�WR�FDOO�H[WHUQDO�UHODWLRQDO�GDWDEDVHVWKURXJK�RSHQ�64/�FDOOV�RU�GDWDEDVH�VSHFLILF�QDWLYH�64/�FDOOV��7KH�GHYHORSHU�LV�QRWUHTXLUHG�WR�NQRZ�WKH�XQGHUO\LQJ�LQIUDVWUXFWXUH�
$%$3'HYHORSPHQW:RUNEHQFK
7KH�$%$3�'HYHORSPHQW�:RUNEHQFK�SURYLGHV�D�FRPSOHWH�FOLHQW�VHUYHU�UXQWLPHHQYLURQPHQW�DQG�H[WHQVLYH�PDQDJHPHQW�DQG�WXQLQJ�WRROV��7KH�:RUNEHQFK�LV�6$3·VLQWHJUDWHG�WRRO�VHW�WR�GHYHORS�HQWHUSULVH�ZLGH�FOLHQW�VHUYHU�DSSOLFDWLRQV��7KLV�WRRO�VHW�LV�SDUWLFXODUO\�VXLWHG�WR�5���FXVWRPHUV�ZKR�ZDQW�WR�HQKDQFH�VWDQGDUG�5��EXVLQHVV�DSSOLFDWLRQV�ZLWK�FXVWRPL]HG��DGG�RQ�IXQFWLRQDOLW\�
7KH�PDMRU�FRPSRQHQWV�RI�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�LQFOXGH�< $%$3�3URJUDPPLQJ�/DQJXDJH< $%$3�'LFWLRQDU\< $%$3�(GLWRU< $%$3�)XQFWLRQ�/LEUDU\< 'DWD�0RGHOHU< 5���5HSRVLWRU\< 7HVW�7RROV��6FUHHQ�3DLQWHU< 0HQX�3DLQWHU��:RUNEHQFK�2UJDQL]HU�7UDQVSRUW�6\VWHP< 5���5HSRVLWRU\�,QIRUPDWLRQ�6\VWHP7KH�ZRUNEHQFK�LV�DOVR�DYDLODEOH�WR�FRPSDQLHV�ZKR�DUH�QRW�5���XVHUV��EXW�ZDQW�WKHEHQHILWV�RI�6$3·V�SURYHQ�GHYHORSPHQW�HQYLURQPHQW�IRU�WKHLU�VRIWZDUH�SURMHFWV�
$%$3�'LFWLRQDU\ 7KH�$%$3�'LFWLRQDU\��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��LV�D�FHQWUDOLQIRUPDWLRQ�EDVH�IRU�DSSOLFDWLRQ�DQG�V\VWHP�GDWD��7KH�'LFWLRQDU\�GHVFULEHV�WKLVGDWD�IURP�D�ORJLFDO�SRLQW�RI�YLHZ�DQG�VWRUHV�LQIRUPDWLRQ�DERXW�KRZ�WKH�GDWD�LVUHSURGXFHG�LQ�WKH�XQGHUO\LQJ�UHODWLRQDO�GDWDEDVH��7KH�$%$3�'LFWLRQDU\�LV�DFWLYHDQG�IXOO\�LQWHJUDWHG�ZLWK�WKH�RWKHU�'HYHORSPHQW�:RUNEHQFK�WRROV��$Q\�FKDQJHV�WRWKH�'LFWLRQDU\�DUH�DXWRPDWLFDOO\�DQG�LPPHGLDWHO\�XSGDWHG�WKURXJKRXW�WKH�V\VWHP�
*ORVVDU\
Authorizations Made EasyG–2
7HUP 'HILQLWLRQ
$%$3�(GLWRU 7KH�$%$3�(GLWRU��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��SURYLGHV�WKHIROORZLQJ�IXQFWLRQV�WR�VXSSRUW�WKH�DSSOLFDWLRQ�GHYHORSHU�< 6\QWD[�FKHFN�ZLWK�DXWRPDWLF�FRUUHFWLRQ�RI�HUURUV< ,QVHUWLRQ�RI�FRGLQJ�SDWWHUQV�IRU�IUHTXHQWO\�XVHG�LQVWUXFWLRQV< 1DYLJDWLRQ�LQWR�RWKHU�ZRUNEHQFK�WRROV< *HQHUDWLRQ�RI�ZKHUH�XVHG�OLVWV�IRU�DOO�GDWD�REMHFWV< 6SOLW�VFUHHQ�HGLWRU�ZLWK�SURJUDP�FRPSDULVRQ
$FWLYDWLRQDGPLQLVWUDWRU
$Q�DFWLYDWLRQ�DGPLQLVWUDWRU�DFWLYDWHV�DXWKRUL]DWLRQ�SURILOHV�DQG�DXWKRUL]DWLRQV�PDNLQJ�WKHP�HIIHFWLYH�LQ�WKH�V\VWHP��7KHVH�DGPLQLVWUDWRUV�FDQ�RQO\�FKDQJH�RUGHOHWH�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�VSHFLILHG�LQ�WKHLU�DXWKRUL]DWLRQ�SURILOH�
$FWLYH�SODQYHUVLRQ
7KLV�LV�WKH�SODQ�YHUVLRQ�WKDW�WKH�5���6\VWHP�UHFRJQL]HV�DV�YDOLG�DQG�FXUUHQWO\�LQRSHUDWLRQ��7KH�LQIRUPDWLRQ�LQ�WKH�DFWLYH�SODQ�YHUVLRQ�LV�XVHG�WR�SHUIRUP�DOO�GD\�WR�GD\�SURFHVVLQJ�DQG�FURVV�DSSOLFDWLRQ�PDLQWHQDQFH�
<RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DFWLYH�LI�< <RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU< ,QWHJUDWLRQ�LV�DFWLYH�EHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV��VXFK�DV
WKH�3*
<RXU�VHOHFWHG�SODQ�VKRXOG�UHIOHFW�WKH�DFWXDO�VWDWH�RI�RSHUDWLRQV�DW�\RXU�ILUP��$Q\RWKHU�SODQ�YHUVLRQV�\RXU�FRPSDQ\�PDLQWDLQV�FDQ�EH�XVHG�WR�H[SHULPHQW�ZLWKGLIIHUHQW�RUJDQL]DWLRQDO�VFHQDULRV�
$FWLYLW\�JURXS $Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�LQGLYLGXDO�DFWLYLWLHV�WKDW�DUH�URXWLQHO\SHUIRUPHG�WRJHWKHU�RU�DUH�DIILOLDWHG�LQ�VRPH�ZD\���)RU�H[DPSOH��WKH�WUDQVODWLRQWDVNV�DFWLYLW\�JURXS�FRXOG�LQFOXGH�DOO�WDVNV��UHSRUWV��DQG�WUDQVDFWLRQV�DVVRFLDWHGZLWK�WUDQVODWLRQ��<RX�VHW�XS�DFWLYLW\�JURXSV�E\�OLQNLQJ�VLQJOH�DFWLYLWLHV�XQGHU�DQDFWLYLW\�JURXS�QDPH��$�VLQJOH�DFWLYLW\�PD\�EH�LQFOXGHG�LQ�PRUH�WKDQ�RQH�DFWLYLW\JURXS�
$SSOLFDWLRQVHUYHU
$�FRPSXWHU�ZKHUH�WKH�DSSOLFDWLRQ�ORJLF�DQG�DSSOLFDWLRQ�FRQWURO�VHUYLFHV�RI�WKH�5��6\VWHP�UXQ�
$XWKRUL]DWLRQ $Q�DXWKRUL]DWLRQ�LV�WKH�DXWKRULW\�WR�SHUIRUP�D�SDUWLFXODU�DFWLRQ�LQ�WKH�5���6\VWHP�(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�RQH�DXWKRUL]DWLRQ�REMHFW�DQG�GHILQHV�RQH�RU�PRUHSRVVLEOH�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�OLVWHG�IRU�WKDW�DXWKRUL]DWLRQ�REMHFW��$XVHU·V�DXWKRUL]DWLRQV�DUH�FRPELQHG�LQ�D�SURILOH�WKDW�LV�HQWHUHG�LQ�WKH�XVHU·V�PDVWHUUHFRUG�
$XWKRUL]DWLRQDGPLQLVWUDWRU
7KH�XVHU�UHVSRQVLEOH�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�LVWKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU��)RU�VHFXULW\�UHDVRQV��WKLV�XVHU�VKRXOG�QRW�EHDXWKRUL]HG�WR�DFWLYDWH�DXWKRUL]DWLRQV�DQG�SURILOHV�RU�WR�PDLQWDLQ�XVHU�PDVWHUUHFRUGV��2WKHUZLVH��RQH�XVHU�ZRXOG�VLQJOH�KDQGHGO\�GHILQH��DFWLYDWH��DQG�DVVLJQV\VWHP�DFFHVV�DXWKRUL]DWLRQV�
*ORVVDU\
Release 4.6A/B �G–3
7HUP 'HILQLWLRQ
$XWKRUL]DWLRQFKHFN
7KLV�FKHFN�GHFLGHV�ZKHWKHU�D�XVHU�LV�DXWKRUL]HG�WR�H[HFXWH�D�SDUWLFXODU�IXQFWLRQ�3URFHVVHV��IXQFWLRQV��DQG�GDWD�DFFHVVHV�LQ�WKH�5���6\VWHP�FDQ�RQO\�EH�SHUIRUPHGZKHQ�XVHU�DXWKRUL]DWLRQV�KDYH�EHHQ�FKHFNHG�LQ�WKH�UHVSHFWLYH�V\VWHP�DQGDSSOLFDWLRQ�SURJUDPV�
$XWKRUL]DWLRQFRQFHSW
*HQHUDO�DFFHVV�WR�D�VWDQGDUG�GDWDEDVH�IRU�GLIIHUHQW�DSSOLFDWLRQV�UHTXLUHV�UHOLDEOHPHFKDQLVPV�GHVLJQHG�WR�HQVXUH�WKH�FRQILGHQWLDOLW\�RI�SHUVRQDO�LQIRUPDWLRQ��$PXOWLOHYHO��JUDGHG�DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�VHW�XS�WR�UHJXODWH�GDWD�DFFHVV�2QO\�WKRVH�SHRSOH�ZLWK�DFWLYH�XVHU�PDVWHU�UHFRUGV�FDQ�DFFHVV�WKH�V\VWHP��7KHDXWKRUL]DWLRQ�FRQFHSW�FRYHUV�WKH�VWUXFWXUH�DQG�IXQFWLRQDOLW\�RI�DXWKRUL]DWLRQDVVLJQPHQW�DQG�FKHFNLQJ�LQ�WKH�5���6\VWHP��$XWKRUL]DWLRQV�SURWHFW�WKH�V\VWHPIURP�XQDXWKRUL]HG�DFFHVV�
$XWKRUL]DWLRQILHOG
2QH�HOHPHQW�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�DXWKRUL]DWLRQ�ILHOG��,Q�DXWKRUL]DWLRQREMHFWV��WKHVH�ILHOGV�UHSUHVHQW�YDOXHV�IRU�LQGLYLGXDO�V\VWHP�HOHPHQWV��ZKLFKXQGHUJR�DXWKRUL]DWLRQ�FKHFNLQJ�WR�YHULI\�D�XVHU·V�DXWKRUL]DWLRQ�
$XWKRUL]DWLRQJURXS
$Q�DXWKRUL]DWLRQ�JURXS�LV�WKH�FRPELQHG�ILHOGV�RI�WKH�DXWKRUL]DWLRQ�REMHFWV6B'(9(/23��SURJUDP�GHYHORSPHQW�DQG�SURJUDP�H[HFXWLRQ��DQG�6B352*5$0�SURJUDP�PDLQWHQDQFH���7KH�DXWKRUL]DWLRQ�JURXS�ILHOG�FRQWDLQV�WKH�QDPH�RI�DSURJUDP�JURXS�WKDW�DOORZV�XVHUV�WR�SHUIRUP�WKH�IROORZLQJ�RSHUDWLRQV�< ([HFXWH�SURJUDPV< 6FKHGXOH�MREV�IRU�EDFNJURXQG�SURFHVVLQJ< 0DLQWDLQ�SURJUDPV< 0DLQWDLQ�YDULDQWV
:KHQ�FUHDWLQJ�D�SURJUDP��\RX�FDQ�VSHFLI\�DQ�DXWKRUL]DWLRQ�JURXS�DV�RQH�RI�WKHSURJUDP�DWWULEXWHV��7KLV�VWHS�DOORZV�\RX�WR�JURXS�SURJUDPV�IRU�DXWKRUL]DWLRQFKHFNLQJ�
$XWKRUL]DWLRQREMHFW
$QRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�LV�WKH�DXWKRUL]DWLRQ�REMHFW�WKDW�DOORZV\RX�WR�GHILQH�FRPSOH[�DXWKRUL]DWLRQV��$Q�DXWKRUL]DWLRQ�REMHFW�JURXSV�XS�WR���DXWKRUL]DWLRQ�ILHOGV�LQ�DQ�´$1'µ�UHODWLRQVKLS�WR�FKHFN�ZKHWKHU�D�XVHU�LV�DOORZHG�WRSHUIRUP�D�FHUWDLQ�DFWLRQ��7R�SDVV�DQ�DXWKRUL]DWLRQ�WHVW�IRU�DQ�REMHFW��WKH�XVHU�PXVWVDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKDW�REMHFW�
$XWKRUL]DWLRQSURILOH
7KH�DXWKRUL]DWLRQ�SURILOH�LV�DQRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�WKDW�JLYHVXVHUV�DFFHVV�WR�WKH�V\VWHP��7KH�SURILOHV�FRQWDLQ�DXWKRUL]DWLRQV�LGHQWLILHG�E\�WKHDXWKRUL]DWLRQ�REMHFW�DQG�WKH�DXWKRUL]DWLRQ�QDPH��,I�D�SURILOH�LV�VSHFLILHG�LQ�D�XVHUPDVWHU�UHFRUG��WKH�XVHU�KDV�DOO�WKH�DXWKRUL]DWLRQV�GHILQHG�LQ�WKDW�SURILOH�
$XWKRUL]DWLRQWUDFH
7KLV�LV�D�WUDQVDFWLRQ�WKDW�UHFRUGV�DOO�WKH�UHTXLUHG�DXWKRUL]DWLRQ�REMHFWV�LQ�DSURFHVVLQJ�VWHS�
%DFNJURXQGSURFHVV
7KH�EDFNJURXQG�SURFHVV�LV�WKH�QRQLQWHUDFWLYH�H[HFXWLRQ�RI�SURJUDPV��ZKLFK�LQ�WKH5���6\VWHP��DUH�KDQGOHG�OLNH�RQOLQH�RSHUDWLRQV��%DFNJURXQG�SURFHVVHV�RIWHQ�XVHWKH�VDPH�SURJUDPV�WKDW�FRQWURO�WKH�GLDORJV�
*ORVVDU\
Authorizations Made Easy� G–4
7HUP 'HILQLWLRQ
%XVLQHVV�SURFHVV %XVLQHVV�SURFHVVHV�JURXS�WDVNV�PDGH�DFURVV�FRVW�FHQWHUV�LQ�\RXU�FRPSDQ\��7KLVSURFHVV�HQDEOHV�\RX�WR�VWUXFWXUH�\RXU�FRPSDQ\·V�SURFHVVHV�E\�IXQFWLRQ�
([DPSOHV�LQFOXGH�< 'HYHORSLQJ�D�SURGXFW< 'UDZLQJ�XS�D�TXRWDWLRQ< 3XUFKDVLQJ�D�PDWHULDO< 3URFHVVLQJ�DQ�RUGHU
%XVLQHVV:RUNIORZ��6$3�
7KLV�VXSSRUW��SURYLGHG�IRU�E\�WUDQVDFWLRQ�SURFHVVLQJ�LQ�WKH�5���6\VWHP��WDNHV�LQWRDFFRXQW�WKH�EXVLQHVV�HQYLURQPHQWV·�QHHGV�
&KHFN�LQGLFDWRU $�FKHFN�LQGLFDWRU�LV�VHW�WR�GHWHUPLQH�ZKHWKHU�DXWKRUL]DWLRQ�REMHFWV�DUHXQPDLQWDLQHG��QRW�FKHFNHG��FKHFNHG��RU�FKHFNHG�PDLQWDLQHG�
&OLHQW�VHUYHUDUFKLWHFWXUH����WLHU
2ZLQJ�WR�WKH�VRIWZDUH�RULHQWHG�FOLHQW�VHUYHU�DUFKLWHFWXUH�RI�WKH�5���6\VWHP��ORJLFDQG�GDWD�RI�WKH�WKUHH�LPSOHPHQWHG�OHYHOV³GDWDEDVH��DSSOLFDWLRQ��DQG�SUHVHQWDWLRQVHUYLFHV³FDQ�EH�GLVWULEXWHG�DPRQJ�GHGLFDWHG�VHUYHUV��7KH�LQGLYLGXDO�VHUYLFHV�FDQEH�IOH[LEOH��HLWKHU�DV�FOLHQWV�RU�VHUYHUV��GHSHQGLQJ�RQ�WKH�WDVNV�WR�EH�SHUIRUPHG�LQHDFK�FDVH�
&RPSRVLWHDFWLYLW\�JURXSV
$�FRPSRVLWH�DFWLYLW\�JURXS�LV�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�PXOWLSOH�DFWLYLW\JURXSV�
&XVWRPL]LQJ�&RQILJXUDWLRQ
,Q�6$3�WHUPLQRORJ\��FXVWRPL]LQJ�LV�WKH�LPSOHPHQWDWLRQ�RI�FRQILJXUDWLRQV�ZLWKLQWKH�IOH[LELOLW\�RI�WKH�5���6\VWHP��,W�LV�WKH�EDVLV�IRU�HYHU\�5���SURMHFW��ZKHWKHU�LW�LVDQ�LQWURGXFWLRQ��VXEVHTXHQW�SURMHFW�VWDJH��RU�SURFHVV�FKDQJH��7KH�FRQILJXUDWLRQLQFOXGHV�
< 5���3URFHGXUH�0RGHO��D�SURFHGXUDO�JXLGH�IRU�VWUXFWXULQJ�D�6$3LPSOHPHQWDWLRQ
< 5���5HIHUHQFH�0RGHO�LQ�WKH�%XVLQHVV�1DYLJDWRU��D�JUDSKLFDO�GHVFULSWLRQ�RIEXVLQHVV�SURFHVVHV
< ,PSOHPHQWDWLRQ�*XLGH��,0*���PHQX�OHG�SDUDPHWHU�VHWWLQJV< 3URMHFW�PDQDJHPHQW�WKURXJK�XSORDG�DQG�GRZQORDG�IDFLOLWLHV�DQG�WR�DQG�IURP
0LFURVRIW�3URMHFW< $�PRGHO�FRPSDQ\��,'(6���D�IXOO\�LQWHJUDWHG�DQG�SUHFRQILJXUHG�V\VWHP�XVHG�IRU
WUDLQLQJ�DQG�WHVWLQJ
7KH�FXVWRPL]LQJ�WRROV�DOVR�EHORQJ�WR�WKH�%XVLQHVV�(QJLQHHULQJ�:RUNEHQFK�DQG�DUHSURYLGHG�DW�QR�H[WUD�FKDUJH�ZLWK�WKH�5���6\VWHP��$GG�RQ�FXVWRPL]LQJ�LV�GLVFXVVHGLQ�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�VHFWLRQ�
'DWDEDVH�VHUYHU 7KLV�LV�WKH�FRPSXWHU�ZKHUH�D�GDWDEDVH�LV�LQVWDOOHG��6SHFLDOO\�RSWLPL]HG�KDUGZDUHPD\�EH�XVHG�IRU�UXQQLQJ�GDWDEDVHV�
*ORVVDU\
Release 4.6A/B �G–5
7HUP 'HILQLWLRQ
'HVNWRS $�3&�WKDW�LV�XVHG�DV�D�ZRUNVWDWLRQ�LV�FRQVLGHUHG�WR�EH�GHVNWRS��,GHDOO\��WKH�GHVNWRSKDV�DFFHVV�WR�DOO�V\VWHPV�DQG�IXQFWLRQV�QHHGHG�IRU�D�XVHU�WR�PDQDJH�DXWKRUL]HGWDVNV�
'\QSUR 6KRUW�IRU�G\QDPLF�SURJUDP��D�G\QSUR�FRQVLVWV�RI�D�VFUHHQ�DQG�DVVRFLDWHG�SURFHVVLQJORJLF��VXFK�DV�YDOLGDWLRQ�SURFHGXUHV��(DFK�G\QSUR�FRQWUROV�H[DFWO\�RQH�GLDORJ�VWHS�
(DV\�$FFHVV�0HQX 7KH�(DV\�$FFHVV�PHQX�LV�6$3·V�QHZ�*8,�IRU�ZRUNLQJ�ZLWK�WKH�5���6\VWHP��7KH(DV\�$FFHV�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROH�WHPSODWH�WKDW�KDV�EHHQ�DVVLJQHG�WR�DQXVHU��7KH�PHQX�FRQWDLQV�RQO\�WKRVH�WUDQVDFWLRQV�DQG�UHSRUWV�WKDW�WKH�XVHU�JRWDVVLJQHG�WKURXJK�WKH�DFWLYLW\�JURXS�DVVLJQHG�WR�KLP��7KHUHIRUH�WKH�XVHU�ZLOO�RQO\VHH�WKRVH�WUDQVDFWLRQV�KH�LV�DOORZHG�WR�SHUIRUP�
$�XVHU�FDQ�FKRRVH�EHWZHHQ�WZR�GLIIHUHQW�YLHZV�RI�5���< 7KH�FRPSOHWH�6$3�PHQX< 7KH�XVHU�VSHFLILF�PHQX
*HQHUDWH 7KLV�IXQFWLRQ�VDYHV�DQG�DFWLYDWHV�DQ�REMHFW��%HIRUH�DFWLYDWLQJ�WKH�REMHFW��WKH�V\VWHPDXWRPDWLFDOO\�SHUIRUPV�D�FRQVLVWHQF\�FKHFN�
*66�$3, 7KH�*66�$3,�LV�WKH�VWDQGDUGL]HG�6HFXULW\�$3,�ZLWK�D�VWDQGDUG�FRPPXQLFDWLRQPRGHO�WR�DEVWUDFW�IURP�WKH�LQGLYLGXDO�SURGXFWV�DQG�WKHLU�FKDUDFWHULVWLFV��7KH&RPPRQ�$XWKHQWLFDWLRQ�7HFKQRORJLHV��&$7��ZRUN�JURXS�RI�WKH�,QWHUQHW(QJLQHHULQJ�7DVN�)RUFH��,(7)��GHILQHV�WKH�VWDQGDUGL]DWLRQ�SURSRVDOV��7KHIXQFWLRQDO�VSHFLILFDWLRQ�RI�*66�$3,�9HUVLRQ����WKH�YHUVLRQ�VXSSRUWHG�E\�5����LVFXUUHQWO\�DQ�,QWHUQHW�GUDIW�
+XPDQ�UHVRXUFHVSODQQLQJ
3HUVRQQHO�SODQQLQJ�DQG�GHYHORSPHQW�GHDOV�ZLWK�DQWLFLSDWLQJ�IXWXUH�SHUVRQQHOQHHGV��3ODQQHUV�VKRXOG�FRQVLGHU�VKRUW���PHGLXP���DQG�ORQJ�WHUP�JRDOV�ZKHQFRQVLGHULQJ�FRPSDQ\�SROLF\�DQG�WKH�FRVWV�LQYROYHG��*RRG�KXPDQ�UHVRXUFHVSODQQLQJ�HQVXUHV�WKDW�WKH�FRPSDQ\�KDV�WKH�DSSURSULDWH�QXPEHU�RI�HPSOR\HHV�ZLWKWKH�UHTXLUHG�VNLOOV�LQ�WKH�FRUUHFW�SRVLWLRQ�
,0*�DFWLYLW\ $Q�,PSOHPHQWDWLRQ�JXLGH��,0*��DFWLYLW\�LV�DQ�H[SODQDWLRQ�RI�D�V\VWHP�VHWWLQJDFWLYLW\��$FWLYLWLHV�LQ�WKH�,0*�DUH�OLQNHG�GLUHFWO\�WR�WKH�FRUUHVSRQGLQJ�FXVWRPL]LQJWUDQVDFWLRQV��XVHG�WR�FUHDWH�WKH�DSSURSULDWH�V\VWHP�VHWWLQJ��<RX�FDQ�XVH�,0*DFWLYLWLHV�WR�UHFRUG�WKH�QRWHV�WKDW�GRFXPHQW�\RXU�V\VWHP�VHWWLQJV��<RX�FDQ�DOVR�EDVHWKH�UHFRUGLQJ�RU�VWDWXV�RI�SURMHFW�PDQDJHPHQW�LQIRUPDWLRQ�RQ�,0*�DFWLYLWLHV�
,PSOHPHQWDWLRQ 7KLV�SURFHVV�LQYROYHV�VZLWFKLQJ�IURP�DQ�H[LVWLQJ�PDQDJHPHQW�V\VWHP�DQG�EXVLQHVVSUDFWLFH�DQG�KDYLQJ�5���UXQ�SDUW�RI��RU�WKH�HQWLUH��EXVLQHVV�
*ORVVDU\
Authorizations Made EasyG–6
7HUP 'HILQLWLRQ
,PSOHPHQWDWLRQ*XLGH
$OVR�UHIHUUHG�WR�DV�WKH�,0*��WKH�JXLGH�LV�D�WRRO�IRU�FRQILJXULQJ�WKH�5���6\VWHP�WRPHHW�FXVWRPHU�UHTXLUHPHQWV��)RU�HDFK�EXVLQHVV�DSSOLFDWLRQ��WKH�LPSOHPHQWDWLRQJXLGH�< ([SODLQV�DOO�WKH�VWHSV�LQ�WKH�LPSOHPHQWDWLRQ�SURFHVV< 7HOOV�\RX�WKH�6$3�VWDQGDUG��IDFWRU\��VHWWLQJV< 'HVFULEHV�V\VWHP�FRQILJXUDWLRQ�ZRUN��DFWLYLWLHV��DQG�LQWHUDFWLYHO\�RSHQV�WKH
DFWLYLWLHV
7KH�,0*�DUH�VWUXFWXUHG�DV�K\SHUWH[W��7KH�KLHUDUFKLFDO�VWUXFWXUH�UHIOHFWV�WKHVWUXFWXUH�RI�WKH�5���EXVLQHVV�DSSOLFDWLRQ�FRPSRQHQWV�DQG�OLVWV�DOO�WKHGRFXPHQWDWLRQ�UHODWHG�WR�LPSOHPHQWLQJ�5����7KH�,0*�FRQWDLQV�DFWLYH�IXQFWLRQVZLWK�ZKLFK�\RX�FDQ�< 2SHQ�FXVWRPL]LQJ�WUDQVDFWLRQV< :ULWH�SURMHFW�GRFXPHQWDWLRQ< 0DLQWDLQ�VWDWXV�LQIRUPDWLRQ< 6XSSRUW�\RXU�SURMHFW�GRFXPHQWDWLRQ�ZRUN�DQG�WKH�PDQDJHPHQW�RI�\RXU�5��
6\VWHP�LPSOHPHQWDWLRQ�
,PSOHPHQWDWLRQSURMHFW
7KLV�SURMHFW�UHODWHV�WR�WKH�LPSOHPHQWDWLRQ�RI�D�VSHFLILF�JURXS�RI�5���IXQFWLRQV�DQGSURFHVVHV�ZLWK�D�FRPPRQ�JR�OLYH�GDWH�
,PSOHPHQWDWLRQVWUDWHJ\
$Q�LPSOHPHQWDWLRQ�VWUDWHJ\�LV�DQ�DSSURDFK�WR�5���LPSOHPHQWDWLRQ��7KH�VWUDWHJ\�LVEDVHG�RQ�ORQJ�WHUP�SHUVSHFWLYHV�DQG�LQFOXGHV�DOO�VWHSV�DFURVV�WKH�ZKROH�HQWHUSULVHSODQQHG�LQ�FRQQHFWLRQ�ZLWK�LPSOHPHQWLQJ�WKH�5���6\VWHP��(VWDEOLVKLQJ�WKLVVWUDWHJ\�LV�DQ�HVVHQWLDO�SDUW�RI�SURMHFW�SUHSDUDWLRQ�DQG�LPSDFWV�WKH�VHTXHQFH�RILPSOHPHQWDWLRQ�SURMHFWV�
,QIRW\SH ,QIRW\SHV�DOORZ�\RX�WR�GHVFULEH��RU�GHILQH�WKH�GLIIHUHQW�DWWULEXWHV�WKDW�REMHFWV�KDYH�:LWKLQ�SHUVRQQHO�GHYHORSPHQW��3'��WKHUH�DUH�PDQ\�GLIIHUHQW�LQIRW\SHV��HDFK�RQHGHVFULELQJ�D�VSHFLILF�VHW�RI�DWWULEXWHV��6RPH�LQIRW\SHV�DSSO\�RQO\�WR�FHUWDLQ�W\SHV�RIREMHFWV��ZKLOH�RWKHUV�FDQ�EH�GHILQHG�IRU�DQ\�W\SH�RI�REMHFW�
,QVWDQFH�SURILOH 7KH�LQVWDQFH�SURILOH�FRQWDLQV�DSSOLFDWLRQ�VHUYHU�VSHFLILF�FRQILJXUDWLRQ�SDUDPHWHUV�ZKLFK�FRPSOHWH�WKH�VHW�YDOXHV�RI�WKH�GHIDXOW�SURILOH�
-RE $�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�VHFUHWDU\�DQG�PDQDJHU�0DQ\�HPSOR\HHV�PD\�KDYH�WKH�VDPH�MRE�FODVVLILFDWLRQ��7KDW�LV��WKHUH�FDQ�EH���VHFUHWDULHV�DQG�HLJKW�PDQDJHUV��-REV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�SRVLWLRQV��VHHEHORZ��
0HQX 0HQXV�DUH�FRQWURO�HOHPHQWV��RIIHULQJ�WKH�XVHU�D�UDQJH�RI�RSWLRQV�ZKLFK��ZKHQFKRVHQ��SURPSWV�WKH�V\VWHP�WR�H[HFXWH�DQ�DFWLRQ��7KH�OD\RXW�RI�WKH�PHQX�EDU�KDVEHHQ�GHILQHG�IRU�HDFK�5���6\VWHP�OHYHO��0HQX�RSWLRQV�DUH�VHOHFWHG�HLWKHU�ZLWK�DVLQJOH�PRXVH�FOLFN�RU�E\�SRVLWLRQLQJ�WKH�FXUVRU�DQG�E\�SUHVVLQJ�(QWHU�
*ORVVDU\
Release 4.6A/B �G–7
7HUP 'HILQLWLRQ
0HQX�EDU $�PHQX�EDU�LV�WKH�EDU�DFURVV�WKH�WRS�RI�WKH�ZLQGRZ�ORFDWHG�MXVW�DERYH�WKH�VWDQGDUGWRROEDUV��:KHQ�\RX�FKRRVH�D�PHQX�RSWLRQ�IURP�WKH�PHQX�EDU��\RX�RSHQ�DGURSGRZQ�PHQX�ZLWK�GLIIHUHQW�FKRLFHV��7KH�V\VWHP�DXWRPDWLFDOO\�LQFOXGHV�WKH6\VWHP�DQG�+HOS�PHQXV�
1DPH�UDQJH 7KH�QDPH�UDQJH�LV�D�NH\�DUHD�RI�D�WDEOH��,W�HIIHFWLYHO\�UHVHUYHV�SDUW�RI�WKH�NH\�DUHDRQO\�IRU�FXVWRPHUV�RU�IRU�6$3�
1HWZRUN�VHFXULW\ 1HWZRUN�VHFXULW\�LV�D�QHWZRUN�FRQQHFWLRQ�FRQILJXUHG�WR�SURWHFW�6$3�DQG�LWVFXVWRPHUV�IURP�SUREOHPV��VXFK�DV�XQDXWKRUL]HG�DFFHVV�LQKHUHQW�WR�:$1�QHWZRUNFRQQHFWLRQV�
2UJDQL]DWLRQDOOHYHO
2UJDQL]DWLRQDO�OHYHOV�DUH�KLHUDUFKLFDO�OHYHOV�ZKHUH�FHUWDLQ�GDWD�LQ�D�PDWHULDO�PDVWHUUHFRUG�LV�FUHDWHG��([DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV�DUH�FOLHQW��SODQW��DQG�VWRUDJHORFDWLRQ�
2QOLQH�6HUYLFH6\VWHP
6HH�6$31HW�²�5���)URQWHQG�QRWHV
3DVVZRUG $�SDVVZRUG�LV�D�XVHU�FRGH�WKDW�FRPSULVHV�WKH�IROORZLQJ�HOHPHQWV�WKDW�XVHUV�QHHG�WRORJRQ�WR�WKH�V\VWHP�< 6WULQJ�RI�ILJXUHV< /HWWHUV< 6SHFLDO�FKDUDFWHUV�WKDW�WKH�XVHU�PXVW�HQWHU< $�XVHU�,'
3ODQ�YHUVLRQ $�SODQ�YHUVLRQ�LV�D�GHVLJQDWHG�DUHD�ZKHUH�\RX�GHSRVLW��RU�VWRUH��VHWV�RI�LQIRUPDWLRQ�:KHQHYHU�\RX�HQWHU�DQ\�LQIRUPDWLRQ�LQ�3'��\RX�PXVW�VSHFLI\�WKH�SODQ�YHUVLRQZKHUH�WKH�LQIRUPDWLRQ�VKRXOG�EH�NHSW��$�VLQJOH�SODQ�YHUVLRQ�FRXOG�LQFOXGHLQIRUPDWLRQ�IURP�DQ\�RI�WKH�3'�PRGXOHV��VXFK�DV�2UJDQL]DWLRQ�DQG�3ODQQLQJ�6HPLQDU�DQG�&RQYHQWLRQ��RU�6KLIW�3ODQQLQJ��<RX�FDQ�PDLQWDLQ�PRUH�WKDQ�RQH�SODQYHUVLRQ���7KLV�DOORZV�\RX�WR�XVH�GLIIHUHQW�SODQ�YHUVLRQV�WR�UHSUHVHQW�GLIIHUHQWVFHQDULRV�IRU�\RXU�ILUP��+RZHYHU��\RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DV�WKHDFWLYH�SODQ�LI�\RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU�DQG�LI�LQWHJUDWLRQ�LV�DFWLYHEHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV�
3RVLWLRQ 3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�SODFHPHQWV�RU�DVVLJQPHQWV�LQ�D�FRPSDQ\��IRUH[DPSOH��VHFUHWDU\�RI�PDUNHWLQJ�RU�D�VDOHV�PDQDJHU���%\�FUHDWLQJ�SRVLWLRQV�DQGFUHDWLQJ�UHODWLRQVKLSV�EHWZHHQ�WKH�SRVLWLRQV��\RX�LGHQWLI\�WKH�DXWKRULW\�VWUXFWXUH�RUFKDLQ�RI�FRPPDQG�DW�\RXU�ILUP��3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�MREV��VHHDERYH��
3UHVHQWDWLRQVHUYHU
$�FRPSXWHU��XVXDOO\�D�3&�RU�0DFLQWRVK��XVHG�IRU�SUHVHQWDWLRQ�LQ�WKH�5���6\VWHP�LVFDOOHG�D�SUHVHQWDWLRQ�VHUYHU�
*ORVVDU\
Authorizations Made EasyG–8
7HUP 'HILQLWLRQ
3URFHVV�IORZ�YLHZ 7KH�SURFHVV�IORZ�YLHZ�LV�RQH�RI�WKH�WZR�QDYLJDWLRQ�SDWKV�LQ�WKH�%XVLQHVV�1DYLJDWRU�WKH�RWKHU�EHLQJ�WKH�FRPSRQHQW�YLHZ��7KH�SURFHVV�IORZ�YLHZ�RI�WKH�5���5HIHUHQFH0RGHO�SURYLGHV�SURFHVV�RULHQWHG�DFFHVV�WR�WKH�VFHQDULRV�DQG�SURFHVVHV�LQ�WKH0RGHO��,W�LV�DUUDQJHG�DV�D�VWUXFWXUH�ZLWK�WKH�IROORZLQJ�OHYHOV�< (QWHUSULVH�DUHDV< 6FHQDULR�SURFHVVHV< 3URFHVVHV
3URFHVV�VHOHFWLRQPDWUL[
7KH�SURFHVV�VHOHFWLRQ�PDWUL[�LV�D�PRGHO�W\SH�LQ�WKH�5���5HIHUHQFH�0RGHO��7KHPDWUL[�GHVFULEHV�WKH�DVVLJQPHQW�RI�SURFHVVHV�WR�VFHQDULRV��ZKLFK�DUH�WKH�FROXPQV�LQD�SURFHVV�VHOHFWLRQ�PDWUL[��3URFHVVHV�EHORQJLQJ�WR�D�VFHQDULR�DUH�OLVWHG�DQG�DVVLJQHGXQGHU�WKDW�VFHQDULR��FROXPQ�KHDG���6FHQDULR�DQG�SURFHVV�LFRQV�SURYLGH�DFFHVV�WRFRUUHVSRQGLQJ�(3&V�
3URILOH $�SURILOH�LV�D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�SDUWLFXODU�XVHU�JURXSV��HQWHUHG�LQ�WKHXVHU�PDVWHU�UHFRUG��7KH�VDPH�SURILOH�FDQ�EH�DVVLJQHG�WR�DQ\�QXPEHU�RI�XVHUV�
7KHUH�DUH�WZR�W\SHV�RI�DXWKRUL]DWLRQ�SURILOHV�< 6LPSOH��D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�D�SDUWLFXODU�WDVN< &RPSRVLWH��D�FROOHFWLRQ�RI�VHYHUDO�VLPSOH�SURILOHV
3URILOHFRPSDULVRQ
:KHQ�DQ�DFWLYLW\�JURXS�LV�PRGLILHG�XVLQJ�WUDQVDFWLRQ�3)&*��LWV�DVVRFLDWHGDXWKRUL]DWLRQ�SURILOH�LV�QRW�DXWRPDWLFDOO\�XSGDWHG��7KH�XVHU�PXVW�FDUU\�RXW�DSURILOH�FRPSDULVRQ�WR�HQVXUH�WKDW�WKH�DXWKRUL]DWLRQV�FRQWDLQHG�LQ�WKH�DXWKRUL]DWLRQSURILOH�FRUUHVSRQG�ZLWK�WKH�QHZ�FRQWHQWV�RI�WKH�DFWLYLW\�JURXS�
3URILOH�*HQHUDWRU 7KH�3URILOH�*HQHUDWRU��3*��VXSSRUWV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VHWWLQJ�XS�WKHDXWKRUL]DWLRQ�FRQFHSW�DW�WKH�FXVWRPHU�VLWH��$FFRUGLQJ�WR�D�VHW�RI�DSSOLFDWLRQFRPSRQHQWV�FKRVHQ�E\�WKH�DGPLQLVWUDWRU��WKH�3*�DXWRPDWLFDOO\�FUHDWHV�DQDXWKRUL]DWLRQ�SURILOH��7KH�DGPLQLVWUDWRU�FDQ�WKHQ�HDVLO\�FXVWRPL]H�DQG�PRGLI\�WKHDXWKRUL]DWLRQV�LQ�WKH�SURILOH�E\�XVLQJ�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQV�RIIHUHG�E\WKH�3*�
3URJUDP�DWWULEXWH $�SURSHUW\�RI�D�SURJUDP�LV�FDOOHG�D�SURJUDP�DWWULEXWH��7KH�DWWULEXWHV�RI�DQ�$%$3SURJUDP�GHILQH�LWV�EDVLF�FKDUDFWHULVWLFV��VR�WKDW�WKH�V\VWHP�FDQ�SURFHVV�LW�FRUUHFWO\�7KH�SURJUDP�DWWULEXWHV�LQFOXGH�WKH�IROORZLQJ�HOHPHQWV�< 3URJUDP�WLWOH< 3URJUDP�W\SH< 3URJUDP�VWDWXV< $XWKRUL]DWLRQ�JURXS< 'HYHORSPHQW�FODVV
*ORVVDU\
Release 4.6A/B �G–9
7HUP 'HILQLWLRQ
3XVK�EXWWRQ 3XVK�EXWWRQV��RU�EXWWRQV��DUH�JUDSKLFDO�FRQWURO�HOHPHQWV�WKDW�\RX�FOLFN�RQFH�WRH[HFXWH�WKH�IXQFWLRQV�OLQNHG�WR�WKHP��,Q�WKH�5���6\VWHP��\RX�FDQ�DOVR�VWDUWIXQFWLRQV�ZLWK�WKH�NH\ERDUG��7R�GR�WKLV��SODFH�WKH�FXUVRU�RQ�WKH�EXWWRQ�DQG�SUHVVHLWKHU�WKH�(QWHU�NH\�RU�(QWHU�EXWWRQ��3XVK�EXWWRQV�PD\�FRQWDLQ�WH[W�RU�JUDSKLFV\PEROV�
5DGLR�EXWWRQ 7KH�UDGLR�EXWWRQ�LV�DQRWKHU�JUDSKLFDO�FRQWURO�HOHPHQW�WKDW�DOORZV�WKH�XVHU�WR�VHOHFWDQ�LWHP�IURP�D�OLVW�RI�ILHOGV��,I�WKH�XVHU�LV�DOORZHG�WR�VHOHFW�VHYHUDO�ILHOGV�DW�RQFH�FKHFNER[HV�DUH�XVHG�
5HOHDVH�&KDQJHVDQG�8SJUDGHV
<RX�FDQ�JHQHUDWH�VSHFLILF�,0*�IRU�UHOHDVH�XSJUDGHV�RU�FKDQJHRYHUV��7KHVH�JXLGHVFRQWDLQ�D�VSHFLILF�OLVW�RI�,0*�DFWLYLWLHV��LQFOXGLQJ�DOO�FKDQJHG�RU�QHZ�IXQFWLRQV�LQWKH�QHZ�5���UHOHDVH��7KLV�IDFLOLWDWHV�WKH�LPSOHPHQWDWLRQ�RI�UHOHDVH�SURMHFWV��$OOUHOHDVH�QRWHV�FDQ�DOVR�EH�LPPHGLDWHO\�DFFHVVHG�IURP�WKLV�ORFDWLRQ�
5HSRUW $�UHSRUW�VHOHFWV�GDWD�IURP�D�GDWDEDVH�DQG�GLVSOD\V�LW�LQ�D�VWUXFWXUHG�IRUP�IRUDQDO\VLV��<RX�PD\�SULQW�WKH�UHSRUW�UHVXOWV�RU�GLVSOD\�WKHP�RQOLQH��7KH�V\VWHP�DOVRSURYLGHV�WKH�RSWLRQ�RI�VDYLQJ�WKH�VHOHFWHG�UHSRUW�GDWD��WR�UHYLHZ�ZLWKRXW�KDYLQJ�WRUH�FUHDWH�LW�
5HVSRQVLELOLW\ 5HVSRQVLELOLWLHV�GLIIHUHQWLDWH�DXWKRULW\�SURILOHV�JHQHUDWHG�IURP�DFWLYLW\�JURXSV�5HVSRQVLELOLWLHV�DUH�OLQNHG�WR�DXWKRULW\�SURILOHV�DQG�WR�DFWLYLW\�JURXSV��$Q�DFWLYLW\JURXS�LV�DQ�REMHFW�ZKHUH�\RX�FROOHFW�D�QXPEHU�RI�V\VWHP�DFWLYLWLHV��$Q�DXWKRULW\SURILOH�LV�JHQHUDWHG�XVLQJ�3*��ZKLFK�GHVLJQDWHV�WKH�XVHU·V�DXWKRULWLHV�LQ�WKH�V\VWHP�5HVSRQVLELOLWLHV�GRQ·W�H[LVW�LQ�����DQ\�PRUH�
6$3�%XVLQHVV:RUNIORZ
6$3�%XVLQHVV�:RUNIORZ������FRPSULVHV�WHFKQRORJLHV�DQG�WRROV�WR�DXWRPDWLFDOO\FRQWURO�DQG�H[HFXWH�FURVV�DSSOLFDWLRQ�SURFHVVHV��ZKLFK�SULPDULO\�LQYROYHVFRRUGLQDWLQJ�WKH�< 3HUVRQV�LQYROYHG< :RUN�VWHSV�UHTXLUHG< 'DWD��EXVLQHVV�REMHFWV��WKDW�QHHG�WR�EH�SURFHVVHG
2XU�SULPDU\�JRDOV�ZLWK�WKH�ZRUNIORZ�DUH�WR�UHGXFH�WKURXJKSXW�WLPHV��WR�UHGXFH�WKHFRVWV�LQYROYHG�LQ�PDQDJLQJ�EXVLQHVV�SURFHVVHV��DQG�WR�LQFUHDVH�WUDQVSDUHQF\�DQGTXDOLW\�
6$31HW���5��)URQWHQG�QRWHV
7KH�6$31HW�²�5���)URQWHQG��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6\VWHP��SURYLGHV�DGLUHFW�FRPPXQLFDWLRQ�OLQN�WR�6$3��DOORZLQJ�FXVWRPHUV�WR�TXLFNO\�DQG�HIILFLHQWO\REWDLQ�SUREOHP�VROYLQJ�LQIRUPDWLRQ�IRU�WKH�5���6\VWHP�
6$3�VWDQGDUGPHQX
)URP�WKH�6$3�VWDQGDUG�PHQX��\RX�FDQ�DFFHVV�WKH�IXOO�UDQJH�RI�6$3�IXQFWLRQV�
*ORVVDU\
Authorizations Made EasyG–10
7HUP 'HILQLWLRQ
6$3�*8, 6$3�*8,�LV�WKH�JUDSKLFDO�XVHU�LQWHUIDFH�RI�WKH�5���6\VWHP�
6$3�URXWHU 6$3�URXWHU�LV�D�VRIWZDUH�PRGXOH�WKDW�DFWV�DV�SDUW�RI�D�ILUHZDOO�V\VWHP��6$3�URXWHUVLPSOLILHV�WKH�FRQILJXUDWLRQ�RI�QHWZRUN�VHFXULW\�DQG�WKH�URXWLQJ�RI�WUDIILF�WR�DQGIURP�5����7KH�6$3�URXWHU�HVWDEOLVKHV�DQ�LQGLUHFW�FRQQHFWLRQ�EHWZHHQ�WKH�5��QHWZRUN�DQG�DQ�RXWHU�QHWZRUN��7KHUH�LV�UHVWULFWHG�DFFHVV�WR�WKH�DSSOLFDWLRQ�OD\HUEHWZHHQ�FOLHQW�VRIWZDUH�DQG�WKH�5���DSSOLFDWLRQ�VHUYHU�
6FUHHQ $�VFUHHQ�LV��HVVHQWLDOO\��WKH�SULPDU\�ZLQGRZ�RI�D�VHVVLRQ�
6HFXUH�1HWZRUN&RPPXQLFDWLRQV�61&�
:LWKLQ�WKH�IUDPHZRUN�RI�WKH�6HFXUH�1HWZRUN�&RPPXQLFDWLRQV�SURMHFW��6$3�LVLPSOHPHQWLQJ�WKH�*66�$3,�LQ�5����HQDEOLQJ�5���WR�EH�LQWHJUDWHG�LQWR�FRPSDQ\�ZLGH�QHWZRUN�VHFXULW\�V\VWHPV��VXFK�DV�.HUEHURV�RU�6HFX'(��$V�WKH�*66�$3,�LV�WKHVWDQGDUG�LQWHUIDFH�LQ�WKH�VHFXULW\�DUHD��6$3�RSHUDWHV�ZLWK�DOO�*66�$3,�FRPSOLDQWVHFXULW\�V\VWHPV�
6HOHFW 7KLV�IXQFWLRQ�DOORZV�\RX�WR�VHOHFW�DQ�REMHFW�IRU�IXUWKHU�SURFHVVLQJ�E\�SODFLQJ�WKHFXUVRU�RQ�WKH�REMHFW�DQG�FOLFNLQJ�RQ�WKH�REMHFW�
6HVVLRQ $�VHVVLRQ�LV�D�ZLQGRZ�ZKHUH�WKH�XVHU�SURFHVVHV�D�FHUWDLQ�WDVN��:KHQ�\RX�ORJ�RQ�WRWKH�5���6\VWHP��LW�DXWRPDWLFDOO\�RSHQV�WKH�ILUVW�VHVVLRQ��EXW�\RX�FDQ�VLPXOWDQHRXVO\RSHQ�XS�WR�QLQH�VHVVLRQV��7KH�QXPEHU�RI�WKH�FXUUHQW�VHVVLRQ�DSSHDUV�LQ�WKH�VWDWXVEDU�
6HVVLRQ�0DQDJHU 7KH�6HVVLRQ�0DQDJHU�GRHV�QRW�H[LVW�LQ�5HOHDVH�����DQ\PRUH��,W�KDV�EHHQ�VXEVWLWXWHGZLWK�WKH�(DV\�$FFHVV�0HQX�
66&5 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5��LV�D�SURFHGXUH�WKDW�UHJLVWHUV�DOOPRGLILFDWLRQV�WR�5���5HSRVLWRU\�REMHFWV�DQG�SURYLGHV�DQ�RYHUYLHZ�RI�PRGLILHG�5��5HSRVLWRU\�REMHFWV��6$3�PDWFKFRGHV�DQG�WXQLQJ�PHDVXUHV��IRU�H[DPSOH��FUHDWLQJGDWDEDVH�LQGLFHV�DQG�EXIIHUV��DUH�QRW�UHJLVWHUHG�E\�66&5�
6\VWHP�SDUDPHWHU $�V\VWHP�SDUDPHWHU�LV�WKH�EDVLF�V\VWHP�FRQILJXUDWLRQ�UHTXLUHG�WR�HQVXUH�VPRRWKIXQFWLRQLQJ�RI�WKH�VRIWZDUH�
7DEOH 'DWD�FDQ�EH�DUUDQJHG�LQ�WDEOH�IRUP��$�WDEOH�FRQVLVWV�RI�FROXPQV��GDWD�YDOXHV�RI�WKHVDPH�W\SH��DQG�URZV��GDWD�UHFRUGV���)LHOGV�LGHQWLI\�D�UHFRUG�
7UDQVDFWLRQ $�WUDQVDFWLRQ�LV�D�VHULHV�RI�UHODWHG�VWHSV�UHTXLUHG�WR�SHUIRUP�D�FHUWDLQ�WDVN�
7UDQVDFWLRQ�FRGH $�VHTXHQFH�RI�IRXU�FKDUDFWHUV�UHSUHVHQWV�D�6$3�WUDQVDFWLRQ��7R�FDOO�D�WUDQVDFWLRQ�LQWKH�5���6\VWHP��\RX�FDQ�IROORZ�DQ�,0*�SDWK�RU�HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKHFRPPDQG�ILHOG��)RU�H[DPSOH��60���LV�WKH�FRGH�IRU�WKH�WDEOH�PDLQWHQDQFHWUDQVDFWLRQ�
8VHU�PDLQWHQDQFH 8VHU�PDLQWHQDQFH�WUDQVDFWLRQV�DOORZ�WKH�V\VWHP�DGPLQLVWUDWRU�WR�FUHDWH�DQGPDLQWDLQ�XVHU�PDVWHU�UHFRUGV��7KLV�SURFHVV�LQFOXGHV�JHQHUDWLQJ�DQG�DVVLJQLQJDXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV�
*ORVVDU\
Release 4.6A/B ��G–11
7HUP 'HILQLWLRQ
8VHU�PDVWHUUHFRUG
7KLV�UHFRUG�FRQWDLQV�LPSRUWDQW�PDVWHU�GDWD�IRU�DQ�5���6\VWHP�XVHU��2QO\�XVHUVZLWK�D�XVHU�PDVWHU�UHFRUG�FDQ�ORJRQ�WR�WKH�V\VWHP��$�XVHU·V�DXWKRUL]DWLRQV�DUHGHILQHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�
8VHU�UROH�WHPSODWH $�XVHU�UROH�WHPSODWH�LV�DQ�DFWLYLW\�JURXS�ZKLFK�VHUYHV�DV�WKH�EDVLV�IRU�WKH�XVHUPHQX�ZKHQ�DQ�HQG�XVHU�ORJV�RQ�WR�5���
9DOLGLW\�SHULRG 9DOLGLW\�SHULRGV�GHILQH�WKH�OLIH�VSDQ�RI�DQ�REMHFW�RU�LQIRW\SH�UHFRUG��:KHQ�FUHDWLQJREMHFWV�DQG�LQIRW\SH�UHFRUGV��VSHFLI\�D�YDOLGLW\�SHULRG�E\�SURYLGLQJ�D�VWDUW�DQG�DQHQG�GDWH�
:RUN�SURFHVV 7KH�DSSOLFDWLRQ�VHUYLFHV�RI�WKH�5���6\VWHP�SHUIRUP�VSHFLDO�ZRUN�SURFHVVHV��VXFK�DVIRU�GLDORJ�SURFHVVLQJ��XSGDWLQJ�RI�WKH�GDWDEDVH�DV�GLFWDWHG�E\�FKDQJH�GRFXPHQWV�EDFNJURXQG�SURFHVVLQJ��VSRROLQJ��DQG�ORFN�PDQDJHPHQW��:RUN�SURFHVVHV�FDQ�EHDVVLJQHG�WR�GHGLFDWHG�DSSOLFDWLRQ�VHUYHUV�
:RUNEHQFK2UJDQL]HU�7UDQVSRUW�V\VWHP
7KH�:RUNEHQFK�2UJDQL]HU�LV�D�FHQWUDO�PDQDJHPHQW�WRRO�IRU�ODUJH�VFDOH�SURMHFWPDQDJHPHQW�WKDW�VXSSRUWV�LQGLYLGXDO�GHYHORSHUV�DQG�ODUJH�SURMHFW�WHDPV�
7KH�2UJDQL]HU�DOVR�GRHV�WKH�IROORZLQJ�
�� 2UJDQL]HV�UHODWHG�SURMHFW�FRPSRQHQWV�LQWR�RUGHUV
�� /RFNV�WKH�FRPSRQHQWV�GXULQJ�GHYHORSPHQW
�� 6WRUHV�D�YHUVLRQ�RI�HDFK�SURMHFW�EHWZHHQ�WUDQVSRUWV
7KH�WUDQVSRUW�V\VWHP�VXSSRUWV�WKH�WUDQVIHU�RI�GHYHORSPHQW�REMHFWV�EHWZHHQGLVWULEXWHG�V\VWHPV�E\�FUHDWLQJ�DQ�H[WHQVLYH�ORJ�UHFRUGLQJ�RI�ZKHQ�DQG�ZK\�HDFKWUDQVSRUW�ZDV�H[HFXWHG�DQG�ZKR�H[HFXWHG�LW�
:RUNIORZ�WDVN $�ZRUNIORZ�WDVN�LV�D�PXOWLVWHS�WDVN�GHILQHG�E\�WKH�FXVWRPHU��ZKLFK�UHIHUHQFHV�DZRUNIORZ�GHILQLWLRQ��:RUNIORZ�WDVNV��RUJDQL]DWLRQDO�PDQDJHPHQW�REMHFW�W\SH�:)�DUH�FOLHQW�GHSHQGHQW��KDYH�D�YDOLGLW\�SHULRG��DQG�DUH�SODQ�YHUVLRQ�VSHFLILF�
:RUNSODFH 7KH�PDLQ�ULJKW�WLOH�RQ�WKH�VFUHHQ�ZKHUH�PRVW�ZRUN�LV�SHUIRUPHG��ILHOG�HQWULHV�VHOHFWLRQV��HWF����2Q�VRPH�ZLQGRZV��WKH�ZRUNSODFH�FRYHUV�WKH�HQWLUH�VFUHHQ�
:RUNSODFH�PHQX 7KH�OHIW�WLOH�RQ�WKH�6$3�(DV\�$FFHVV�VFUHHQ�ZKHUH�HDFK�QRGH�UHSUHVHQWV�GLIIHUHQWOHYHOV�LQ�WKH�5���6\VWHP��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUG�PHQX�EXWWRQV�SURYLGHGLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�
:RUNORDGPRQLWRU
7KH�ZRUNORDG�PRQLWRU�GLVSOD\V�WKH�GLVWULEXWLRQ�RI�WKH�ZRUNORDG�DFURVV�VHUYHUV�DQGWUDQVDFWLRQV�
*ORVVDU\
Authorizations Made EasyG–12
I–1
,QGH[
A$%$3
GLFWLRQDU\���²�REMHFWV��QR�FKHFN��&²�
$FFHOHUDWHG6$3��$6$3�EXVLQHVV�EOXHSULQW���²�JR�OLYH�DQG�VXSSRUW���²�NQRZOHGJH�FRUQHU���²�RYHUYLHZ���²�SURMHFW�SUHSDUDWLRQ���²�4$GE��TXHVWLRQV�DQG�DQVZHUV�GDWDEDVH����²�UHDOL]DWLRQ���²�URDGPDS���²�����²�
$FFHVV�SUREOHPV���²��$FWLYLW\�JURXS�PDLQWHQDQFH��6HH�DOVR�3URILOH�*HQHUDWRU
EDVLF�PDLQWHQDQFH���²����²����²��FRPSRVLWH�DFWLYLW\�JURXSV���²�FUHDWLQJ�DQG�FKDQJLQJ�KLHUDUFK\���²�LQWHUQHW�DQG�GRFXPHQW�OLQNV���²��RUJDQL]DWLRQ�PDQDJHPHQW���²����²��UHVSRQVLELOLWLHV����²��VHOHFWLQJ�YLHZV���²�WUDQVIHUULQJ�XVHUV�IURP�,0*�SURMHFW���²��ZRUNIORZ���²��
$FWLYLW\�JURXSVDVVLJQLQJ�,0*�SURMHFWV�RU�YLHZV���²��DVVLJQLQJ�REMHFWV���²����²�DVVLJQLQJ�3'�REMHFWV���²����²����²��DVVLJQLQJ�WUDQVDFWLRQV���²��DVVLJQLQJ�XVHUV���²�����²����²����²�&203$1<B$//���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRVLWH��6HH�&RPSRVLWH�DFWLYLW\�JURXSVFRQYHUWHG�IURP�68���SURILOHV����²�FRS\LQJ���²�����²����%²�FUHDWLQJ���²��FXVWRPL]LQJ�DFWLYLW\�JURXS���²�����²��GHOHWLQJ���²��GHULYHG��6HH�'HULYHG�DFWLYLW\�JURXSVGLVSOD\LQJ�WUDQVDFWLRQ�FRGHV��%²�GLVSOD\LQJ�XVHUV��%²�GRFXPHQWDWLRQ�RQOLQH�IRU�REMHFWV���²��JHQHUDO�DXWKRUL]DWLRQV���²�LQVHUWLQJ�UHSRUWV���²��LQVHUWLQJ�WUDQVDFWLRQV���²�RYHUYLHZ���²�����²��SUHGHILQHG���²��SURILOHV���²�����²����%²�
UHJHQHUDWLQJ�DXWKRUL]DWLRQ�GDWD���²��WUDQVDFWLRQ�FRGHV��PXOWLSOH��%²�WUDQVSRUWLQJ���²����²����²����²����²�XVHU�UROH�WHPSODWHV���²����²�ZRUNIORZ�WDVNV���²��
$GPLQLVWUDWRUDXWKRUL]DWLRQ�DGPLQLVWUDWRU���²�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU���²��DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU���²��FKDQJH�PDQDJHPHQW���²��*OREDO�8VHU�0DQDJHU����²��PXOWLSOH�DGPLQLVWUDWRUV��%²�SROLFLHV�DQG�SURFHGXUHV���²��VHWWLQJ�XS�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV���²��WKUHH�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�ZRUNLQJ�WRJHWKHU���²��WLSV�IRU���²��XVHU�DGPLQLVWUDWRU���²��
$GYDQFH�FRUUHFWLRQVDSSO\LQJ�WR�5�����²�
$,6��$XGLW�LQIRUPDWLRQ�V\VWHP�����²��$PHULFDQ�6$3�8VHUV�*URXS��$68*����²��$SSOLFDWLRQ�/LQN�(QDEOLQJ��$/(�
DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ�HQYLURQPHQW����²�GHILQLQJ�WDUJHW�V\VWHP�IRU�5)&����²��GLVWULEXWLRQ�PRGHO����²��ORJLFDO�V\VWHP�QDPLQJ����²�PRGHO�YLHZ��GLVWULEXWLQJ����²��RYHUYLHZ����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�VHWWLQJ�XS�XVHU����²�
$6$3��6HH�$FFHOHUDWHG6$3$XGLWV
DXGLW�LQIRUPDWLRQ�V\VWHP��$,6���WUDQVDFWLRQ�6(&5����²��EXVLQHVV�DXGLWV����²��FRPSOHWH����²��GHOHWH�ROG�DXGLW�ORJV����²�ILOWHU�JURXSV����²�ORJJLQJ�RI�VSHFLILF�DFWLYLWLHV����²��RYHUYLHZ����²�SURILOH�UHYLHZ�IRU�DFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��UHTXLUHPHQWV���²��UHYLHZLQJ�YDOLG�XVHUV����²��UXQQLQJ�ORJV����²�UXQQLQJ�RQ�GLIIHUHQW�XVHU����²��VHFXULW\�DXGLW�ORJ��60�������²�VHWWLQJ�ORJ�SDUDPHWHUV����²�VWDWLVWLF�UHFRUGV�LQ�&&06��67$7�����²��
,QGH[
Authorizations Made Easy�I–2
V\VWHP�DXGLW����²��V\VWHP�ORJV��60�������²��WDVNV����²��XVHU�VHFXULW\�DXGLW�MREV����²��XVHU�GHILQHG����²��
$XWKRUL]DWLRQDGGLQJ�PLVVLQJ��SRVWPDLQWDLQLQJ���²����²�DGPLQLVWUDWRU���²����²�����²�����²��DXWKRUL]DWLRQ�FRQFHSW���²����²�����²��FKDQJLQJ�XVLQJ�XWLOLWLHV���²��FKHFNV��6HH�$XWKRUL]DWLRQ�FKHFNVFRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²�FXVWRPL]LQJ���²��HUURU�DQDO\VLV��68������²�ILHOGV���²����²�JHQHUDO��DVVLJQLQJ���²�JHQHUDWLQJ�SURILOHV���²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²����²�OLIHF\FOH���²�OLVW��6HH�$XWKRUL]DWLRQ�/LVWORJJLQJ�FKDQJHV����²��QDPLQJ�FRQYHQWLRQV���²�����²�����²��REMHFWV��6HH�$XWKRUL]DWLRQ�REMHFWVSURILOHV��6HH�3URILOHVUHVSRQVLELOLWLHV����²��VWUXFWXUDO���²��WHFKQLFDO�QDPHV��UHRUJDQL]LQJ���²��WHPSODWHV��WUDQVSRUWLQJ���²�WLPH�GHSHQGHQF\���²����²�����²����%²�WUDFLQJ�HUURUV��&²�WUDQVSRUWLQJ���²�XVHU�DGPLQLVWUDWLRQ���²�
$XWKRUL]DWLRQ�FKHFNVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ���²�����²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVGHILQLWLRQ���²�HQDEOLQJ�RU�GLVDEOLQJ�V\VWHP�ZLGH�FKHFNV����²��LQFOXGLQJ�LQ�WUDQVDFWLRQV��%²���%²�UHGXFLQJ�VFRSH����²������²��5)&��&²�VWDUWLQJ�WUDQVDFWLRQV��%²�V\VWHP�WUDFH��67������²�
$XWKRUL]DWLRQ�ILHOGVGHILQLWLRQ���²�PDLQWDLQLQJ�RSHQ�ILHOGV���²��
$XWKRUL]DWLRQ�/LVWGHILQLQJ�XVHU�UROHV���²�JHQHUDWHG�IURP�4$GE���²����²�RYHUYLHZ���²�ZRUNLQJ�ZLWK���²�
$XWKRUL]DWLRQ�REMHFWVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ����²������²������²��EDVLV����²������²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVFKHFNLQJ����²��
FODVVHV���²�GHILQLWLRQ���²�ILHOGV���²�KXPDQ�UHVRXUFHV����²������²������²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²�RYHUYLHZ���²�6B7&2'(���²������²�����²����%²���&²�6B86(5B2%-����²��6B86(5B352���²��WDEOH�7$&7=��%²�XQXVHG����²��
B%DFNJURXQG
GLVWULEXWLRQ��*OREDO�8VHU�0DQDJHU����²��XVHU�W\SHV���²�
%DVLF�PDLQWHQDQFH���²����²����²��%DVLV�&RPSRQHQWV��%&�
DXWKRUL]DWLRQ�REMHFWV����²������²������²��XVHUV���²�
%DWFK�GDWD�FRPPXQLFDWLRQ��%'&����²�%DWFK�LQSXW��6HH�%DWFK�GDWD�FRPPXQLFDWLRQ%XVLQHVV�$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��%$3,V�����²��
C&&06�SHUIRUPDQFH�DQDO\VLV�WRROV����²��&HQWUDO�V\VWHP
PLJUDWLRQ�RI�H[LVWLQJ�XVHUV����²�WH[W�FRPSDULVRQ����²�
&HQWUDO�XVHU�DGPLQLVWUDWLRQ$/(�HQYLURQPHQW����²�GLVWULEXWLRQ�PRGHO�DVVLJQPHQW����²�*OREDO�8VHU�0DQDJHU����²��PLJUDWLRQ�RI�XVHUV�WR�FHQWUDO�V\VWHP����²�QRQFHQWUDO�XVHU�DGPLQLVWUDWLRQ���²�RYHUYLHZ��[[LY����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS����²�WHVWLQJ����²�
&HQWUDO�XVHU�PDLQWHQDQFHXVHU�DVVLJQPHQWV���²�
&KDQJH�PDQDJHPHQW�DGPLQLVWUDWRU���²��&KHFN�IODJV��6HH�&KHFN�LQGLFDWRUV&KHFN�LQGLFDWRUV
DXWKRUL]DWLRQ�REMHFWV����²������²��&KHFN��&�����²������²��&KHFN�0DLQWDLQ��&0�����²������²������²��GHIDXOWV���²�PDVV�FKDQJHV����²��1R�FKHFN��1�����²������²��UHSODFLQJ�VHWWLQJV���²�WUDQVDFWLRQ�FRGHV����²��WUDQVSRUWLQJ���²�
,QGH[
Release 4.6A/B �I–3
W\SHV��%²�8QPDLQWDLQHG��8�����²������²��
&OLHQW�V\VWHPVGLVWULEXWLRQ�PRGHO����²�*OREDO�8VHU�0DQDJHU����²��PDLQWDLQLQJ�XVHU�GDWD��ILHOG�DWWULEXWHV����²�PLJUDWLQJ�XVHUV�WR�FHQWUDO�V\VWHP����²�WH[W�FRPSDULVRQ����²�
&OLHQWV������²����²����²�������²����²����²�������²����²�DVVLJQLQJ�ORJLFDO�V\VWHPV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�FRS\LQJ�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV���²�GHIDXOW��&²�GHIDXOW�XVHUV���²�SDUWHU�SURILOHV�JHQHUDWHG�LQ�FOLHQW�V\VWHP����²��6$3�VWDQGDUG���²�WUDQVSRUWV���²�
&RPSRVLWH�DFWLYLW\�JURXSVFUHDWLQJ���²��GLVSOD\LQJ���²�RYHUYLHZ��[[LY���²��
&RS\LQJDFWLYLW\�JURXSV���²����%²�DFWLYLW\�JURXSV�DQG�GHULYLQJ���²��XVHU�UROH�WHPSODWHV�IRU�PRGLILFDWLRQ���²��
&3,&���²�&UHDWLQJ
DFWLYLW\�JURXS���²��FRPSRVLWH�DFWLYLW\�JURXSV���²��QHZ�XVHU��FOLHQW�VSHFLILF����²�XVHU�UROH�WHPSODWHV���²��
&XVWRPL]LQJ�DXWKRUL]DWLRQV���²��
D'DWD�SURWHFWLRQ���²�'',&�XVHUV���²����²�����²�'HIDXOWV
FKDQJLQJ���²�FKHFN�LQGLFDWRUV���²����²�����²��FRPSDULQJ�GDWD�ZLWK�6$3�GHIDXOW�YDOXHV���²�FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�ILHOG�YDOXHV���²����²�UHWUDQVIHUULQJ���²�
'HOHWLQJDFWLYLW\�JURXSV���²��
'HULYHG�DFWLYLW\�JURXSV���²�����²��RYHUYLHZ���²��
'HYHORSPHQW�V\VWHP��'(9����²��'LDORJ
XVHU�W\SHV���²�'LVWULEXWLRQ�PRGHO����²��
DVVLJQPHQW����²�'RFXPHQW�OLQNV���²��
'RFXPHQWDWLRQRQOLQH�IRU�DFWLYLW\�JURXS�REMHFWV���²��
E(DUO\:DWFK���²�(DV\�$FFHVV�PHQX���²����²�����²���%²�(UURU�QRWHV�GDWDEDVH���²���$²�([WHUQDO�XVHUV
XVHU�DGPLQLVWUDWLRQ���²�
F)DYRULWHV
DGGLQJ�DQG�GHOHWLQJ�WUDQVDFWLRQV��%²�YLHZLQJ��%²�
)LHOG�DWWULEXWHVGHILQLQJ�LQ�FOLHQW�V\VWHP����²�
)LHOG�GHIDXOWV���²�)LHOG�H[LWV��%²�)LHOG�YDOXHV
FRS\LQJ����²��FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�UHSODFLQJ���²�WUDQVSRUWLQJ���²�
)LOWHUVGHILQLQJ�ILOWHU�JURXSV�IRU�DXGLW����²�
)XOO�DXWKRUL]DWLRQV���²��LQVHUWLQJ���²��
G*OREDO�8VHU�0DQDJHU
DXWKRUL]DWLRQ�IRU����²��FRPSRVLWH�DFWLYLW\�JURXS����²������²��GLVWULEXWLQJ�GDWD����²��PRGHOLQJ����²��RYHUYLHZ����²��VWUXFWXUH����²��V\VWHP�W\SHV����²��XVHU�FUHDWLRQ����²��XVHU�JURXSV����²��XVLQJ����²��
*R�OLYH�SODQ���²�����²�SUHSDUDWLRQV���²�WUDQVSRUWLQJ�DFWLYLW\�JURXSV���²�WUDQVSRUWLQJ�DXWKRUL]DWLRQ�WHPSODWHV���²�WUDQVSRUWLQJ�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV���²�WUDQVSRUWV�EHWZHHQ�FOLHQWV���²�WUDQVSRUWV�EHWZHHQ�5���6\VWHPV���²�
H+HOS
HUURU�QRWHV�GDWDEDVH���²���$²�6$31HW�²�5���)URQWHQG�QRWHV���²�
,QGH[
Authorizations Made Easy�I–4
+LHUDUFK\FUHDWLQJ�DQG�FKDQJLQJ���²�
+XPDQ�5HVRXUFHV��+5�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�DXWKRUL]DWLRQ�REMHFWV����²������²������²��VXSSRUW�SDFNDJHV����²��XVHU�QDPLQJ�FRQYHQWLRQV���²��
I,'RFV����²��,0*�SURMHFWV
DVVLJQLQJ�SURMHFWV�RU�YLHZV�WR�DFWLYLW\�JURXSV���²��WUDQVIHUULQJ�XVHUV���²�����²��
,PSOHPHQWDWLRQ�*XLGH��,0*�SURMHFWV��6HH�,0*�SURMHFWV
,QWHUQDO�5���XVHUVXVHU�DGPLQLVWUDWLRQ���²�
,QWHUQHWLQVHUWLQJ�OLQNV�LQ�DFWLYLW\�JURXSV���²��
,7�PDQDJHU���²��
J-RE�UROHV���²��-REV
DVVLJQLQJ�DFWLYLW\�JURXSV���²��ZRUN�GXWLHV���²����²��
K.QRZOHGJH�&RUQHU��.&���$6$3���²�
L/LQNV
LQVHUWLQJ�,QWHUQHW�DQG�GRFXPHQW�OLQNV�LQWR�DFWLYLW\JURXSV���²��
/RFNV��XVHU����²��/RJLFDO�V\VWHPV����²�
DVVLJQLQJ�WR�FOLHQWV����²�GLVWULEXWLRQ�PRGHO����²��QDPLQJ����²�
/RJRQ�GDWD�ILHOGV���²�/RJRQV
LQFRUUHFW��&²�/RJV
DFWLYLWLHV��VSHFLILF����²��DXGLW����²�FHQWUDO����²������²��FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG
DXWKRUL]DWLRQV����²��ILOHV����²�ORFDO����²������²��SURWHFWHG�WDEOHV����²��UXQQLQJ�DXGLW�ORJV����²�6\V/RJ����²��
WDEOH�GDWD����²��
M0DLQWHQDQFH�W\SHV���²��0DQXDOO\�LQVHUWLQJ�DXWKRUL]DWLRQV���²�0DVV�FKDQJHV
FKHFN�LQGLFDWRUV����²��XVHUV���²�
0DVV�FRPSDUH��3)8'����²��0HQXV
GHIDXOW�VWDUW��&²�0RGHO�YLHZ����²�
GLVWULEXWLQJ����²��
N1DPLQJ�FRQYHQWLRQV
DXWKRUL]DWLRQ�SURILOHV���²�SURILOHV�DQG�DXWKRUL]DWLRQV�JHQHUDWHG�ZLWK�3*���²�����²���
�²��1R�FKHFN��&²�
O2EMHFW�FODVVHV���²�2EMHFW�W\SHV
$���²�&���²�2���²�3���²�6���²�86���²�
2EMHFWVMREV���²����²��RQOLQH�GRFXPHQWDWLRQ���²��RUJDQL]DWLRQDO�XQLWV���²�SHUVRQ���²�3HUVRQQHO�'HYHORSPHQW��3'���6HH�3'�REMHFWVSRVLWLRQV���²����²��5���XVHUV���²�ZRUN�FHQWHUV���²�
2QOLQH�GRFXPHQWDWLRQGLVSOD\LQJ�IRU�DFWLYLW\�JURXS�REMHFWV���²��
2QOLQH�6HUYLFH�6\VWHP��266���6HH�6$31HW�²�5���)URQWHQGQRWHV
2UJDQL]DWLRQ�PDQDJHPHQW���²����²��2UJDQL]DWLRQDO
(QMR\�WUDQVDFWLRQ�SODQ���²��OHYHOV���²�����²��SODQV���²����²�����²��VWUXFWXUHV���²��XQLWV���²�����²�
266��6HH�6$31HW�²�5���)URQWHQG�QRWHV
,QGH[
Release 4.6A/B �I–5
P3DUDPHWHUV
DXWK�QRBFKHFNBLQBVRPHBFDVHV��%²�DXWK�REMHFWBGLVDEOLQJBDFWLYH����²��DXWK�WFRGHVBQRWBFKHFNHG����²��DXWKRUL]DWLRQ�FKHFNV��&²���&²�ILHOG�GHIDXOWV���²�ORJRQ��&²�PDQXDOO\�SRVWPDLQWDLQLQJ���²�QDPHV���²�SDUDPHWHU�WUDQVDFWLRQV����²��SDVVZRUG��&²���&²�6$3 ��&²�V\VWHP����²��WUDFLQJ�DXWKRUL]DWLRQV��&²�XVHU�EXIIHU��&²�
3DVVZRUGVEDFNJURXQG�XVHUV���²�FKDQJLQJ���²��UHTXLUHPHQWV���²��VHWWLQJ�OHQJWK��H[SLUDWLRQ��&²�VSHFLI\LQJ�LPSHUPLVVLEOH��&²�V\VWHP���²��XVHU���²�����²��
3'�REMHFWVDVVLJQLQJ�DFWLYLW\�JURXSV���²����²����²��
3HUPLVVLRQ�FUHHS����²��3HUVRQQHO�$GPLQLVWUDWLRQ��3$�
XVHUV���²��3HUVRQQHO�'HYHORSPHQW��3'�
DVVLJQLQJ�DFWLYLW\�JURXSV�WR�3'�REMHFWV���²��DVVLJQLQJ�3'�REMHFWV�WR�DFWLYLW\�JURXSV���²�
3*��6HH�3URILOH�*HQHUDWRU3ODQ�YHUVLRQ���²��3ROLFLHV�DQG�SURFHGXUHV
VHFXULW\���²��3RVLWLRQV
DVVLJQLQJ�DFWLYLW\�JURXSV���²��REMHFWV���²����²��
3RVWPDLQWDLQLQJPLVVLQJ�DXWKRUL]DWLRQV���²����²�XVHU�UROH�WHPSODWHV���²��
3UHGHILQHG�DFWLYLW\�JURXSV��6HH�8VHU�UROH�WHPSODWHV3URGXFWLRQ�V\VWHP��35'����²��3URILOH�*HQHUDWRU��6HH�DOVR�$FWLYLW\�JURXS�PDLQWHQDQFH
DFWLYDWLQJ���²�$87+25,7<�&+(&.��%²�FKHFNLQJ�WKH�UHTXLUHG�LQVWDQFH�SURILOH�SDUDPHWHU���²�FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²��IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�RYHUYLHZ���²����²�VHWWLQJ�XS���²���%²�VWDUWLQJ���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�XVHU�UROH�WHPSODWHV���²�
3URILOHVDFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��DGPLQLVWUDWRU��VHFXULW\���²��DVVLJQLQJ�WR�QHZ�XVHU�PDVWHU�UHFRUG���²�DXWKRUL]DWLRQ�FKHFNV��&²�DXWKRUL]DWLRQ�PLVVLQJ��%²�FKDQJLQJ�QDPHV��%²�&203$1<B$//�RU�´�<RXU&RPSDQ\!µ���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²�����²��FRQYHUWLQJ�ROG�68���SURILOHV�LQWR�DFWLYLW\�JURXSV����²��
��²��FRQYHUWLQJ�WR�EH�PDLQWDLQDEOH�E\�WKH�3*����²��'()$8/7�3)/��&²�GHILQLWLRQ���²�GLVSOD\LQJ�RYHUYLHZ�DIWHU�JHQHUDWLRQ���²��HGLWLQJ���²��HQWHULQJ�LQ�XVHU�PDVWHU�UHFRUGV���²�JHQHUDO�ULJKWV�QRW�DVVLJQHG���²�JHQHUDWLQJ���²�����²�����²��LQVHUWLQJ�DXWKRUL]DWLRQV�IURP���²��ORJJLQJ�FKDQJHV����²��PDLQWDLQLQJ���²��PDVV�FRPSDUH���²��PDWFKLQJ�XS�DIWHU�FKDQJLQJ�LQ�68������²������²��PDWFKLQJ�XS�DIWHU�XSJUDGH����²��PLJUDWLQJ���²��QDPLQJ�FRQYHQWLRQV���²����²�����²�����²��RYHUYLHZ���²����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��UH�FUHDWLQJ���²������²��UHJHQHUDWLQJ�DIWHU�FKDQJHV���²��UHJHQHUDWLQJ�QXPEHU�DVVLJQPHQW���²��VWDWXV�LQGLFDWRUV���²��WUDQVSRUWLQJ���²����²�XSGDWLQJ�LQ�XVHU�PDVWHU�UHFRUG���²��ZRUNLQJ�ZLWK��%²�
3URJUDPV3)&*B7,0(B'(3(1'(1&<���²��56865������²��
Q4XDOLW\�DVVXUDQFH�V\VWHP��4$6����²�����²��4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�
$XWKRUL]DWLRQ�/LVW���²�RYHUYLHZ���²�
R5HOHDVH�QRWHV����²�5HPRWH�FRQQHFWLRQV
VHFXULW\���²�����²��5HPRWH�IXQFWLRQ�FDOO��6HH�5)&5HSRUWV
DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��GRFXPHQWDWLRQ���²��
,QGH[
Authorizations Made Easy�I–6
3)&*B7,0(B'(3(1'(1&<���²�����²��UHSRUW�WUHHV��%²�56865������²��
5HVSRQVLELOLWLHV����²��5)&
DXWKRULW\�FKHFN��&²�%$3,V����²��FDOOV����²��FRQQHFWLRQ����²������²�GHVWLQDWLRQ����²������²��,'RFV����²��
5RDGPDS��6HH�$FFHOHUDWHG6$3��$6$3�5ROHV
XVHU�UROHV��GHILQLQJ���²�
S6$3�%XVLQHVV�:RUNIORZ��6HH�:RUNIORZ6$3�GHIDXOWV��6HH�'HIDXOWV6$3�URXWHU
VHFXULW\���²�����²��6$3�VWDQGDUG�PHQX��[YLLL���²�����6$3�WHPSODWHV��6HH�7HPSODWHV6$3 ���²����²�����²�
VHFXULQJ�DJDLQVW�PLVXVH��&²�6$31HW���²��6$31HW�²�5���)URQWHQG�QRWHV
GDWDEDVH��$²�HUURU�QRWHV�GDWDEDVH���²�JHWWLQJ�VXSSRUW���²�3*�KRW�SDFNDJHV�IRU�5HOHDVHV����$�DQG����%���²�SULQWLQJ�QRWHV���²�VHOHFWLYH�OLVW��$²�WHPSODWH�QRWHV���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�
6HFXULW\DFWLYLWLHV����²�DXGLWV��6HH�$XGLWVORJJLQJ�FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG
DXWKRUL]DWLRQV����²��ORJJLQJ�VSHFLILF�DFWLYLWLHV����²��SHUPLVVLRQ�FUHHS����²��SROLFLHV�DQG�SURFHGXUHV���²��UHYLHZLQJ�ORJV����²��VHFXULW\�UHSRUWV����²��VRXUFHV�DERXW�LPSOHPHQWDWLRQ���²��VWUDWHJ\�LQ�WKUHH�V\VWHP�HQYLURQPHQW���²��
6WDWLVWLF�UHFRUGV��DXGLWLQJ����²��6WUXFWXUDO�DXWKRUL]DWLRQV���²��
WURXEOHVKRRWLQJ�OLPLWDWLRQV����²�6XSHUXVHUV���²����²�����²�����²��6\V/RJ����²��6\VWHP��6HH�&HQWUDO�V\VWHP��&OLHQW�V\VWHP��7DUJHW�V\VWHP6\VWHP�ODQGVFDSH
ZLWK�H[LVWLQJ�XVHUV����²������²��6\VWHP�SDVVZRUGV���²��6\VWHP�7UDFH��6HH�7UDFHV
T7DEOHV
IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�ORJJLQJ�FKDQJHV�WR�GDWD����²��ORJV�SURWHFWHG����²��68.5,����²��7$&7=��%²�862%7���²����²�862%;���²����²�����²����%²��865����&²�
7DUJHW�V\VWHPGHILQLQJ�IRU�5)&�FDOOV����²��
7DVNVPXOWLSOH�VWHS���²��VLQJOH�VWHS���²��
7HFKQLFDO�QDPHVDXWKRUL]DWLRQV���²��
7HPSODWHVFUHDWLQJ�QHZ���²�GHOLYHUHG���²�GHOLYHUHG�QDPHV���²�LQFOXGLQJ�UHTXLUHG�REMHFWV�LQ�DFWLYLW\�JURXSV���²�LQVHUWLQJ�DXWKRUL]DWLRQV���²����²��LQVHUWLQJ�LQWR�H[LVWLQJ�DFWLYLW\�JURXS���²�WUDQVSRUWLQJ���²�ZRUNIORZ���²��
7KUHH�V\VWHP�HQYLURQPHQWGHYHORSPHQW�V\VWHP��'(9����²��SURGXFWLRQ�V\VWHP��35'����²��TXDOLW\�DVVXUDQFH�V\VWHP��4$6����²��
7LPH�SHULRGVORJRQ�YDOLG�IURP�YDOLG�WR�GDWHV���²�UHVWULFWLQJ�DFWLYLWLHV��%²�XVHU�DVVLJQPHQW���²����²�����²��
7UDFHVDQDO\]LQJ�WUDFH�ILOH����²�DXWKRUL]DWLRQV��&²�GLVSOD\LQJ�UHVXOWV����²�QDPLQJ����²�UHFRUGLQJ�DXWKRUL]DWLRQ�FKHFNV����²�
7UDLQLQJ�FOLHQW�V\VWHP��75*����²��7UDQVDFWLRQV
DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��DVVLJQLQJ�WR�UHSRUWV���²��$87+B6:,7&+B2%-(&76����²��DXWKRUL]DWLRQ�FKHFNV��%²�%'������²��GHULYHG�DFWLYLW\�JURXSV���²��LQVHUWLQJ���²�PDLQWDLQ�FKHFN�LQGLFDWRUV����²��PLVVLQJ�DXWKRUL]DWLRQV���²�3)&*���²��3)8'���²��5=������²��6$������²��6$5$����²��
,QGH[
Release 4.6A/B �I–7
6&&����²���%²�6&&����²�6&&/���²�6&8�����²��6&80����²�6(������²��6(�����²��6(������²��6(&5����²������²��60������²�60������²�����²�60������²�����²�60������²��60�����²����²���%²���&²�6352����²��67������²�67������²��67$7����²��68�����²����²�����²������²��68�����²����²������²��68�����²����²������²��68�����²����²�����²����%²���&²�68�����²����²�����²������²������²���%²�68�����²�����²����²�����²�683&���²�����²�����²��
7UDQVSRUWLQJDFWLYLW\�JURXSV���²����²���%²�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�PDVV�WUDQVSRUW�RI�DFWLYLW\�JURXSV���²�VLQJOH�DFWLYLW\�JURXSV�XVLQJ�DFWLYLW\�JURXS�PDLQWHQDQFH�
�²�WHPSODWHV���²�XVHU�DVVLJQPHQWV���²����²�XVHU�PDVWHU�UHFRUGV���²�
7URXEOHVKRRWLQJ��6HH�DOVR�7UDFHVHUURU�DQDO\VLV��68������²�
U8SJUDGHV
FRQYHUWLQJ�SUHYLRXVO\�FUHDWHG�68���SURILOHV�LQWR�DFWLYLW\JURXSV����²�
SUHSDUDWLRQ�EHIRUH����²�SURFHGXUH��68�����%²�5HOHDVH����)����²��5HOHDVHV����*�����+�����,����²��5HOHDVHV����[�RU����[����²��UHOHDVHV�SULRU�WR����[����²��UHPRYH�XVHU�DVVLJQPHQWV�IURP�RULJLQDO�68���SURILOH����²�YDOLGDWLRQ�DIWHU�FRPSOHWH����²�
8VHUDFFRXQWV����²�DGPLQLVWUDWLRQ���²�����²�����²�$/(����²�DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²����²�DVVLJQLQJ�WR�FXVWRPL]LQJ�DFWLYLW\�JURXSV���²��
DVVLJQLQJ�XVHU�UROH�WHPSODWHV���²�DVVLJQPHQWV���²�����²����²�����²�DXGLWLQJ�IRU�YDOLG�XVHUV����²��DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV���²�EDVLF�XVHU�GDWD���²�EXIIHU���²�FKDQJLQJ�SDVVZRUGV���²��FOLHQW�VSHFLILF���²��FUHDWLQJ���²����²�����²��GDWHV�RI�XVHU�DVVLJQPHQW���²����²�����²��'',&���²����²�����²�GHIDXOWV���²����²�(DUO\:DWFK���²�H[WHUQDO���²�ILHOG�DWWULEXWHV��GHILQLQJ����²�JURXSV��[[LY���²�LQIRUPDWLRQ�V\VWHP���²��LQWHUQDO�5�����²�MREV���²��ORJRQ�GDWD�ILHOG�GHILQLWLRQV���²�PDVV�FKDQJHV���²�PHQX��[YLLL��[[LL���²����²�����RUJDQL]DWLRQDO�XQLWV���²��SDVVZRUGV���²�����²��SRVLWLRQV���²��SURILOHV��WUDQVDFWLRQ�67������²��UROHV��6HH�8VHU�UROHV6$3 ���²����²�����²�VSHFLDO�5���XVHUV���²�VWDWXV�GLVSOD\�RQ�WDE���²�VXSHUXVHUV���²����²�����²�����²��V\VWHP���²����²�V\VWHP�ODQGVFDSH����²������²��WUDQVIHUULQJ�IURP�,0*�SURMHFW�WR�DFWLYLW\�JURXS���²��XVHU�DGPLQLVWUDWLRQ��%²�XVHU�,'V���²��XVHU�W\SHV���²�
8VHU�EXIIHUV��&²�8VHU�PDVWHU�UHFRUGV
DXWKRUL]DWLRQ�FRQFHSW���²����²�FRPSDULQJ�DIWHU�DFWLYLW\�JURXS�LPSRUW���²�FRPSDULQJ�DIWHU�DXWKRUL]DWLRQ�SURILOH�JHQHUDWLRQ���²�FRPSDULQJ�ZLWK�3*���²��GHILQLQJ���²�*OREDO�8VHU�0DQDJHU����²��ORJJLQJ�FKDQJHV����²��PDQXDOO\�HQWHULQJ�JHQHUDWHG�SURILOHV��%²�V\VWHP�UHFRJQLWLRQ�RI�XVHUV���²�WUDQVSRUWLQJ���²����²����²�XSGDWLQJ���²�XSGDWLQJ�SURILOHV���²��
8VHU�UROH�WHPSODWHVDVVLJQLQJ�WR�D�XVHU�XVLQJ�VKRUWFXW���²��DVVLJQLQJ�XVHUV���²����²�FRS\LQJ�DQG�PRGLI\LQJ���²��FUHDWLQJ�XVLQJ�PXOWLSOH�VLQJOH�DFWLYLW\�JURXSV���²��FUHDWLQJ�XVLQJ�VLQJOH�DFWLYLW\�JURXSV���²��
,QGH[
Authorizations Made Easy�I–8
FUHDWLQJ�\RXU�RZQ���²��FXVWRPL]LQJ�WHPSODWH���²��PDLQWHQDQFH�YLHZ�VHWWLQJV���²��RYHUYLHZ��[[LL���²�����²�SRVWPDLQWDLQLQJ���²��5HOHDVH����$���²��5HOHDVH����%���²��XVLQJ�6$3�SURYLGHG���²�ZRUNLQJ�ZLWK���²�
8VHU�UROHVGHILQLQJ���²�JHQHUDWLQJ�RYHUYLHZ���²�
8VHU�W\SHVEDFNJURXQG���²�EDWFK�GDWD�FRPPXQLFDWLRQ���²�
&3,&���²�GLDORJ���²�
W:RUN�FHQWHUV���²�:RUNIORZ
DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�VDPSOH���²��WDVNV���²�����²��WHPSODWHV���²��XVHUV���²��
:RUNSODFH�PHQX��[YLLL