SlideShare a Scribd company logo
2
Most read
3
Most read
11
Most read
26/01/2017 1Jonathan Eemans JE Consulting
Authorisations in SAP
Best practices
26/01/2017 2
Authorisations in SAP: best practices
1. Role naming conventions
Role naming convention
Lack of naming convention, inconsistent naming convention or inappropriate naming convention is
the most basic mistake that an organisation can make. And this does not just impact the user
administrator (who may not be able to identify with the roles after some time), it adversely impacts
business users as well as auditors. Business users are often not conversant with transaction codes
and authorization objects and rely on the role name and description to understand the role. Without a
good and consistent naming convention, they may struggle to make sense of the roles.
SOLUTION: Define logic naming convention and respect this naming convention at all times.
Example: ZS/C_XX_<Description>/<Job>_YYYY
with S = Single role / C = Composite role
XX = Domain (CA, GL, AP etc.)
<Description> (single role) = Description (GLMAST_MAINT for g/l account maintenance,
GLMAST_DISPL for g/l account display, etc.)
<Job> (composite role) = Job (MMPUR for purchaser, FITR for treasury, FIGEN for
accountants etc.)
YYYY = Master / Organisational unit (MAST if master role, #### for Company 1, etc.)
26/01/2017 3
Authorisations in SAP: best practices
2. Role design
Role design
Use different types of roles correctly.
 Single roles
 Composite roles
 Master / parent roles
 Derived / child roles
SOLUTION: Correctly design roles using authorisation matrix.
26/01/2017 4
Authorisations in SAP: best practices
2. Role design
1. Define single roles
2. Assign single roles to composite roles
3. Define slave roles
4. Assign composite roles to users
26/01/2017 5
Authorisations in SAP: best practices
2. Role design: Master / derived roles
Concept
A derived role has identical attributes (transactions / authorization object values) as it parent
except the values of the organizational level fields (plant, company code, sales organisation
etc. ).
Advantage
Thus maintenance is simplified as only the organisational levels have to be maintained at the
derived role level. This also ensures that there is no opportunity to make mistakes during
authorisation maintenance for the multitude of derived roles and also reduces testing effort for
roles.
26/01/2017 6
Authorisations in SAP: best practices
2. Role design: Master / derived roles
Example
Master role Derived role
Transactions and authorisations Derived role
are maintained in the master role is assigned to
master role
Organisation levels are not assigned
in master role Organisational
levels are assigned
26/01/2017 7
Authorisations in SAP: best practices
3. Maintain authorisation matrix
Authorisation matrix
26/01/2017 8
Authorisations in SAP: best practices
4. Document changes in authorisations
Document changes to authorisation roles
26/01/2017 9
Authorisations in SAP: best practices
5. Non-maintained authorisations
Unmaintained authorisations
Many user administrators leave unmaintained authorisation (i.e. objects with some
unmaintained field values) in the profile. Such unmaintained authorization often become big
nuisance in long run. They are also one of the most common reason behind false positives
raised during authorization review.
SOLUTION: Maintain all authorisation objects in the authorisation profile.
26/01/2017 10
Authorisations in SAP: best practices
Tip 1 for maintaining authorisations: deactivate but keep the standard
When changing authorisation objects the best way is to make a copy, deactivate the standard,
and make changes to the copy.
26/01/2017 11
Authorisations in SAP: best practices
Tip 2 for maintaining authorisations: Read old status and merge with new data
Use option ‘Read old status and merge with new data’
If you have a ‘Standard’ and a ‘Change’, the option ‘Read old status and merge with old data’ will not
insert a new authorisation object.

More Related Content

PPTX
SAP Security & GRC Framework
DOCX
SAP MM Standard Business Processes
PPT
Oracle Fusion & Cloud Applications Overview
PPTX
TRANSFORMATIONAL LEADERSHIP
PPTX
Differences between equity and equality
PPTX
Sap grc process control 10.0
SAP Security & GRC Framework
SAP MM Standard Business Processes
Oracle Fusion & Cloud Applications Overview
TRANSFORMATIONAL LEADERSHIP
Differences between equity and equality
Sap grc process control 10.0

What's hot (20)

DOC
Authorisation Concept In SAP | http://sapdocs.info
DOCX
Sap modules overview and business processes
PPTX
SAP S4 HANA.pptx
PDF
Sap sd
DOCX
SAP Landscape
PPT
SAP Organization Structure
PDF
Availability Check in SAP SD
PDF
Sap Overview pdf
PDF
Business partner-2
 
DOC
Sap security-administration
PPTX
SAP IS Retail Introduction.pptx
PPT
SAP Organization Structure V1.2.ppt
PDF
Sap fi configuration
DOC
How to View/ open/ update/ close SOLMAN tickets
PDF
S4 HANA Business Partner Configuration@Ganesh Tarlana
PPT
Sap Security Workshop
PDF
Fi sd integration with copa
DOCX
Travel management configuration steps
PDF
SAP FICO overview
PDF
Iia los angeles sap security presentation
Authorisation Concept In SAP | http://sapdocs.info
Sap modules overview and business processes
SAP S4 HANA.pptx
Sap sd
SAP Landscape
SAP Organization Structure
Availability Check in SAP SD
Sap Overview pdf
Business partner-2
 
Sap security-administration
SAP IS Retail Introduction.pptx
SAP Organization Structure V1.2.ppt
Sap fi configuration
How to View/ open/ update/ close SOLMAN tickets
S4 HANA Business Partner Configuration@Ganesh Tarlana
Sap Security Workshop
Fi sd integration with copa
Travel management configuration steps
SAP FICO overview
Iia los angeles sap security presentation
Ad

Viewers also liked (20)

PDF
Master data distribution in SAP: implementation guide
PPT
Day5 R3 Basis Security
PPT
6 7-users-authorization
PDF
Best Practices for Ensuring SAP ABAP Code Quality and Security
PPTX
Extensible Authorization for SAP Applications Webinar
PPT
SAP HCM Structural Authorization Overview Presentation
PDF
Sap security tasks
DOC
Step by step exercise for bw 365
PDF
Governance Of Enterprise IT MIA
PPT
How to improve user experience via roles
DOCX
Calculation of optimum cost of transportation of goods from godowns to differ...
PPT
Bluetooth Technology -- detailed explanation
PDF
Enterprise Risk Management Software
PDF
Sappress sap governance risk and compliance
DOCX
Use of network scheduling technique
PPTX
SAP Plaint Maintenance Training in Hyderabad,USA,UK,Canada,Austarlia
PPTX
Bearing design for Turbo Generator- Internship at BHEL
PPTX
SAP HCM authorisations: streamline processes and improve HR data security
PDF
Simplifying SAP Plant Maintenance
PPT
SAP BI 7 security concepts
Master data distribution in SAP: implementation guide
Day5 R3 Basis Security
6 7-users-authorization
Best Practices for Ensuring SAP ABAP Code Quality and Security
Extensible Authorization for SAP Applications Webinar
SAP HCM Structural Authorization Overview Presentation
Sap security tasks
Step by step exercise for bw 365
Governance Of Enterprise IT MIA
How to improve user experience via roles
Calculation of optimum cost of transportation of goods from godowns to differ...
Bluetooth Technology -- detailed explanation
Enterprise Risk Management Software
Sappress sap governance risk and compliance
Use of network scheduling technique
SAP Plaint Maintenance Training in Hyderabad,USA,UK,Canada,Austarlia
Bearing design for Turbo Generator- Internship at BHEL
SAP HCM authorisations: streamline processes and improve HR data security
Simplifying SAP Plant Maintenance
SAP BI 7 security concepts
Ad

Similar to Authorisations in SAP: best practices (20)

PDF
SAP Role Design for Success: 3 Best Practices and Tips
PPTX
SAP Role Desgin for Success Best Practices and Tips
PDF
Formalizing Collaborative Software Development Issues: A Collaborative Work A...
TXT
Sap security bad practices
DOCX
Mitul Jain SAP GRC Security
DOCX
40411923 business-analyst
PDF
Whitepaper: Continuous Compliance in SAP Environments - Happiest Minds
PDF
Continuous Compliance-in-Sap-Environments
PPTX
Role_Based_Permissions_Kick-off_Deck_202203.pptx
DOCX
Requirements management and the business analyst
PPTX
Mcom Ba Training Module 1
PDF
SAP MM Authorization Matrix and User roles.pdf
PDF
Sap implementation
PPT
Mark Foley Agile Methods And The Business Analystc
DOC
Writing Sample 2
PDF
Sap GRC Basic Information | GRC 12 online training
PPTX
How to Become a Business Analyst in 2022: Skills and Salary?
PPTX
Bua 235 bpm-chap 7
PDF
Business analyst
PPS
BPM - The Promise And Challenges
SAP Role Design for Success: 3 Best Practices and Tips
SAP Role Desgin for Success Best Practices and Tips
Formalizing Collaborative Software Development Issues: A Collaborative Work A...
Sap security bad practices
Mitul Jain SAP GRC Security
40411923 business-analyst
Whitepaper: Continuous Compliance in SAP Environments - Happiest Minds
Continuous Compliance-in-Sap-Environments
Role_Based_Permissions_Kick-off_Deck_202203.pptx
Requirements management and the business analyst
Mcom Ba Training Module 1
SAP MM Authorization Matrix and User roles.pdf
Sap implementation
Mark Foley Agile Methods And The Business Analystc
Writing Sample 2
Sap GRC Basic Information | GRC 12 online training
How to Become a Business Analyst in 2022: Skills and Salary?
Bua 235 bpm-chap 7
Business analyst
BPM - The Promise And Challenges

Recently uploaded (20)

PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Introduction to Artificial Intelligence
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
medical staffing services at VALiNTRY
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
System and Network Administration Chapter 2
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
top salesforce developer skills in 2025.pdf
PPTX
Essential Infomation Tech presentation.pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Introduction to Artificial Intelligence
L1 - Introduction to python Backend.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Reimagine Home Health with the Power of Agentic AI​
medical staffing services at VALiNTRY
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Odoo POS Development Services by CandidRoot Solutions
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
System and Network Administration Chapter 2
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
CHAPTER 2 - PM Management and IT Context
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
top salesforce developer skills in 2025.pdf
Essential Infomation Tech presentation.pptx
PTS Company Brochure 2025 (1).pdf.......

Authorisations in SAP: best practices

  • 1. 26/01/2017 1Jonathan Eemans JE Consulting Authorisations in SAP Best practices
  • 2. 26/01/2017 2 Authorisations in SAP: best practices 1. Role naming conventions Role naming convention Lack of naming convention, inconsistent naming convention or inappropriate naming convention is the most basic mistake that an organisation can make. And this does not just impact the user administrator (who may not be able to identify with the roles after some time), it adversely impacts business users as well as auditors. Business users are often not conversant with transaction codes and authorization objects and rely on the role name and description to understand the role. Without a good and consistent naming convention, they may struggle to make sense of the roles. SOLUTION: Define logic naming convention and respect this naming convention at all times. Example: ZS/C_XX_<Description>/<Job>_YYYY with S = Single role / C = Composite role XX = Domain (CA, GL, AP etc.) <Description> (single role) = Description (GLMAST_MAINT for g/l account maintenance, GLMAST_DISPL for g/l account display, etc.) <Job> (composite role) = Job (MMPUR for purchaser, FITR for treasury, FIGEN for accountants etc.) YYYY = Master / Organisational unit (MAST if master role, #### for Company 1, etc.)
  • 3. 26/01/2017 3 Authorisations in SAP: best practices 2. Role design Role design Use different types of roles correctly.  Single roles  Composite roles  Master / parent roles  Derived / child roles SOLUTION: Correctly design roles using authorisation matrix.
  • 4. 26/01/2017 4 Authorisations in SAP: best practices 2. Role design 1. Define single roles 2. Assign single roles to composite roles 3. Define slave roles 4. Assign composite roles to users
  • 5. 26/01/2017 5 Authorisations in SAP: best practices 2. Role design: Master / derived roles Concept A derived role has identical attributes (transactions / authorization object values) as it parent except the values of the organizational level fields (plant, company code, sales organisation etc. ). Advantage Thus maintenance is simplified as only the organisational levels have to be maintained at the derived role level. This also ensures that there is no opportunity to make mistakes during authorisation maintenance for the multitude of derived roles and also reduces testing effort for roles.
  • 6. 26/01/2017 6 Authorisations in SAP: best practices 2. Role design: Master / derived roles Example Master role Derived role Transactions and authorisations Derived role are maintained in the master role is assigned to master role Organisation levels are not assigned in master role Organisational levels are assigned
  • 7. 26/01/2017 7 Authorisations in SAP: best practices 3. Maintain authorisation matrix Authorisation matrix
  • 8. 26/01/2017 8 Authorisations in SAP: best practices 4. Document changes in authorisations Document changes to authorisation roles
  • 9. 26/01/2017 9 Authorisations in SAP: best practices 5. Non-maintained authorisations Unmaintained authorisations Many user administrators leave unmaintained authorisation (i.e. objects with some unmaintained field values) in the profile. Such unmaintained authorization often become big nuisance in long run. They are also one of the most common reason behind false positives raised during authorization review. SOLUTION: Maintain all authorisation objects in the authorisation profile.
  • 10. 26/01/2017 10 Authorisations in SAP: best practices Tip 1 for maintaining authorisations: deactivate but keep the standard When changing authorisation objects the best way is to make a copy, deactivate the standard, and make changes to the copy.
  • 11. 26/01/2017 11 Authorisations in SAP: best practices Tip 2 for maintaining authorisations: Read old status and merge with new data Use option ‘Read old status and merge with new data’ If you have a ‘Standard’ and a ‘Change’, the option ‘Read old status and merge with old data’ will not insert a new authorisation object.