Within SAP HANA the analytic privileges grant access to specific data like a row-level security or a data point. But before we discuss analytic privileges, we need to understand SAP HANA object privileges. Those privileges do define access to database objects such as views or tables. Hence, before we take care of what data soContinue reading “SAP HANA – Analytic Privileges”
Category Archives: Security Basics
PFCG – Authorization Objects and Authorization Fields
The foundation of ABAP/PFCG authorizations (either at NetWeaver or S/4HANA) is built by ABAP authorization objects. Those objects are being queried, if an (data) access is tried by a user. But how does the system exactly query if a user is authorized? Correct – by checking if the user has got the required authorization objectContinue reading “PFCG – Authorization Objects and Authorization Fields”
Basics – PFCG explained
The central element of learning SAP authorizations is to master the role building via the transaction PFCG (known as Profile Generator). Here you can learn the basics from the roots. For any NetWeaver based system as like ECC, S/4HANA or BusinessWarehouse the role construct is the same. It is based on the PFCG transaction –Continue reading “Basics – PFCG explained”
Basics – Authorization VS. Authentication
Two terms, two meanings. Yet, why are those terms that close in their spelling? Because those are closely related? to confuse? or to distinguish between a noob and a pro? Anyhow – after reading this you will surely be part of the pros. At least considering this word defintion and spelling 😉 Authorization The authorizationContinue reading “Basics – Authorization VS. Authentication”
Basics – Starting Point.
Chronologically, as well as logically, this is your and my starting point. This blog post defines the very basics of an authorization concept based on my professional experience and focuses on practical approaches. Let’s get started! The universe of authorizations is – without exaggeration – endless. Each application, system and every organization requires authorizations beforeContinue reading “Basics – Starting Point.”
