50 SAP Authorization Objects Every Security Consultant Should Know (With Real Project Examples) - SAP SECURITY

Practical SAP Security & GRC Tutorials | S/4HANA | SU24 | SU25 | Fiori | GRC

50 SAP Authorization Objects Every Security Consultant Should Know (With Real Project Examples)

 

50 SAP Authorization Objects Every Security Consultant Should Know (With Real Project Examples)

In SAP, authorization objects control what users can do within the system. A transaction alone does not grant access; the user must also have the correct authorization objects with appropriate field values.

For SAP Security consultants, understanding the most commonly used authorization objects is essential for troubleshooting access issues and designing secure roles.

Below are 50 important SAP authorization objects, along with real-world examples from project environments.


1–10: Core System Authorization Objects

1. S_TCODE

Controls access to transaction codes.

Example
User tries to execute FB60 but receives an authorization error.

SU53 shows:

S_TCODE
TCD = FB60

Fix
Add transaction FB60 in the user role in PFCG.


2. S_USER_AGR

Controls role assignment to users.

Example
Security administrator cannot assign roles in SU01.

Authorization missing:

S_USER_AGR
ACTVT = 02

3. S_USER_GRP

Controls which user groups can be maintained.

Example
Admin cannot modify a user belonging to group BASIS.


4. S_USER_PRO

Controls profile assignment.

Often required for advanced security administration.


5. S_USER_AUT

Controls maintenance of user authorizations.


6. S_USER_TCD

Allows execution of transactions through user administration tools.


7. S_RFC

Controls authorization for Remote Function Calls.

Example

User runs integration program but receives error:

RFC authorization missing

Authorization object required:

S_RFC

8. S_PROGRAM

Controls execution of ABAP programs.

Example

User attempts to execute a custom report.

S_PROGRAM
P_ACTION = SUBMIT

9. S_BTCH_JOB

Controls background job processing.

Example

User cannot schedule a job in SM36.


10. S_BTCH_NAM

Controls which users can execute background jobs under another user ID.


11–20: Table and Data Access Authorization Objects

11. S_TABU_DIS

Controls access to table authorization groups.

Example

User attempts table maintenance via SM30.

SU53 shows:

S_TABU_DIS
DICBERCLS = FI

12. S_TABU_NAM

Controls access to specific tables.

Used when table-level security is required.


13. S_TABU_LIN

Provides row-level table authorization.


14. S_DATASET

Controls file access on the application server.

Example

Custom program cannot read server file.


15. S_PATH

Controls logical file path usage.


16. S_GUI

Controls SAP GUI activities.


17. S_ADMI_FCD

Provides powerful system administration functions.

Example

Basis team requires this object for system operations.


18. S_LOG_COM

Controls system log access.


19. S_ARCHIVE

Controls archive management.


20. S_OC_ROLE

Controls organizational management roles.


21–30: Financial Authorization Objects

21. F_BKPF_BUK

Controls document posting by company code.

Example

User can post invoices only for company code 1000.


22. F_BKPF_GSB

Controls business area authorization.


23. F_BKPF_KOA

Controls account type authorization.


24. F_LFA1_APP

Controls vendor master maintenance.


25. F_KNA1_APP

Controls customer master maintenance.


26. F_BSEG_BUK

Controls access to accounting document segments.


27. F_SKA1_BES

Controls G/L account authorization.


28. F_FICA_FCD

Used in contract accounting systems.


29. F_PAYR_BUK

Controls payment authorization.


30. F_REGU_BUK

Controls payment program access.


31–40: Logistics Authorization Objects

31. M_MATE_WRK

Controls material access by plant.

Example

User allowed to manage materials in plant 1000 only.


32. M_MATE_BES

Controls purchasing authorization.


33. M_RECH_WRK

Controls invoice verification by plant.


34. M_EINK_FRG

Controls purchasing release strategy.


35. M_BEST_WRK

Controls purchase order authorization.


36. M_LFRE_WRK

Controls vendor evaluation authorization.


37. V_VBAK_VKO

Controls sales organization access.


38. V_VBAK_AAT

Controls order type authorization.


39. V_KNA1_VKO

Controls customer sales area access.


40. V_LIKP_VST

Controls shipping point authorization.


41–50: Security and Administration Objects

41. S_DEVELOP

Controls access to development objects.

Example

Developer cannot modify program in SE38.


42. S_TRANSPRT

Controls transport requests.


43. S_CTS_ADMI

Controls transport administration.


44. S_SERVICE

Controls SAP service tools.


45. S_SPO_ACT

Controls spool request processing.


46. S_RZL_ADM

Controls workload and system management.


47. S_ICF

Controls access to internet communication framework services.


48. S_WFAR_OBJ

Controls workflow authorization.


49. S_APPL_LOG

Controls application log access.


50. S_ALV_LAYO

Controls ALV layout management.


Conclusion

Understanding authorization objects is fundamental for SAP Security consultants. Transactions alone do not determine system access; the real control lies within authorization objects and their field values.

When troubleshooting access issues in SAP:

  1. Capture the exact error message

  2. Execute SU53 immediately

  3. Verify authorization objects in roles

  4. Check field values and organizational levels

  5. Run authorization trace if needed

Mastering these 50 authorization objects will significantly improve troubleshooting efficiency and help design secure roles in SAP environments.


No comments:

Post a Comment