50 SAP Authorization Objects Every Security Consultant Should Know (With Real Project Examples)
In SAP, authorization objects control what users can do within the system. A transaction alone does not grant access; the user must also have the correct authorization objects with appropriate field values.
For SAP Security consultants, understanding the most commonly used authorization objects is essential for troubleshooting access issues and designing secure roles.
Below are 50 important SAP authorization objects, along with real-world examples from project environments.
1–10: Core System Authorization Objects
1. S_TCODE
Controls access to transaction codes.
Example
User tries to execute FB60 but receives an authorization error.
SU53 shows:
S_TCODE
TCD = FB60
Fix
Add transaction FB60 in the user role in PFCG.
2. S_USER_AGR
Controls role assignment to users.
Example
Security administrator cannot assign roles in SU01.
Authorization missing:
S_USER_AGR
ACTVT = 02
3. S_USER_GRP
Controls which user groups can be maintained.
Example
Admin cannot modify a user belonging to group BASIS.
4. S_USER_PRO
Controls profile assignment.
Often required for advanced security administration.
5. S_USER_AUT
Controls maintenance of user authorizations.
6. S_USER_TCD
Allows execution of transactions through user administration tools.
7. S_RFC
Controls authorization for Remote Function Calls.
Example
User runs integration program but receives error:
RFC authorization missing
Authorization object required:
S_RFC
8. S_PROGRAM
Controls execution of ABAP programs.
Example
User attempts to execute a custom report.
S_PROGRAM
P_ACTION = SUBMIT
9. S_BTCH_JOB
Controls background job processing.
Example
User cannot schedule a job in SM36.
10. S_BTCH_NAM
Controls which users can execute background jobs under another user ID.
11–20: Table and Data Access Authorization Objects
11. S_TABU_DIS
Controls access to table authorization groups.
Example
User attempts table maintenance via SM30.
SU53 shows:
S_TABU_DIS
DICBERCLS = FI
12. S_TABU_NAM
Controls access to specific tables.
Used when table-level security is required.
13. S_TABU_LIN
Provides row-level table authorization.
14. S_DATASET
Controls file access on the application server.
Example
Custom program cannot read server file.
15. S_PATH
Controls logical file path usage.
16. S_GUI
Controls SAP GUI activities.
17. S_ADMI_FCD
Provides powerful system administration functions.
Example
Basis team requires this object for system operations.
18. S_LOG_COM
Controls system log access.
19. S_ARCHIVE
Controls archive management.
20. S_OC_ROLE
Controls organizational management roles.
21–30: Financial Authorization Objects
21. F_BKPF_BUK
Controls document posting by company code.
Example
User can post invoices only for company code 1000.
22. F_BKPF_GSB
Controls business area authorization.
23. F_BKPF_KOA
Controls account type authorization.
24. F_LFA1_APP
Controls vendor master maintenance.
25. F_KNA1_APP
Controls customer master maintenance.
26. F_BSEG_BUK
Controls access to accounting document segments.
27. F_SKA1_BES
Controls G/L account authorization.
28. F_FICA_FCD
Used in contract accounting systems.
29. F_PAYR_BUK
Controls payment authorization.
30. F_REGU_BUK
Controls payment program access.
31–40: Logistics Authorization Objects
31. M_MATE_WRK
Controls material access by plant.
Example
User allowed to manage materials in plant 1000 only.
32. M_MATE_BES
Controls purchasing authorization.
33. M_RECH_WRK
Controls invoice verification by plant.
34. M_EINK_FRG
Controls purchasing release strategy.
35. M_BEST_WRK
Controls purchase order authorization.
36. M_LFRE_WRK
Controls vendor evaluation authorization.
37. V_VBAK_VKO
Controls sales organization access.
38. V_VBAK_AAT
Controls order type authorization.
39. V_KNA1_VKO
Controls customer sales area access.
40. V_LIKP_VST
Controls shipping point authorization.
41–50: Security and Administration Objects
41. S_DEVELOP
Controls access to development objects.
Example
Developer cannot modify program in SE38.
42. S_TRANSPRT
Controls transport requests.
43. S_CTS_ADMI
Controls transport administration.
44. S_SERVICE
Controls SAP service tools.
45. S_SPO_ACT
Controls spool request processing.
46. S_RZL_ADM
Controls workload and system management.
47. S_ICF
Controls access to internet communication framework services.
48. S_WFAR_OBJ
Controls workflow authorization.
49. S_APPL_LOG
Controls application log access.
50. S_ALV_LAYO
Controls ALV layout management.
Conclusion
Understanding authorization objects is fundamental for SAP Security consultants. Transactions alone do not determine system access; the real control lies within authorization objects and their field values.
When troubleshooting access issues in SAP:
Capture the exact error message
Execute SU53 immediately
Verify authorization objects in roles
Check field values and organizational levels
Run authorization trace if needed
Mastering these 50 authorization objects will significantly improve troubleshooting efficiency and help design secure roles in SAP environments.

No comments:
Post a Comment