Authorizations Made Easy

Post on 29-Dec-2014

6,387 views 40 download

description

User Role Templates and Generating Authorization Profiles in SAP Release 4.6A/B

transcript

$XWKRUL]DWLRQV�0DGH�(DV\

8VHU�5ROH�7HPSODWHV�DQG�*HQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV

Release 4.6A/B

SAP Labs, Inc.

Palo Alto, California

&RS\ULJKW

������E\�6$3�$*��$OO�ULJKWV�UHVHUYHG�

1HLWKHU�WKLV�GRFXPHQWDWLRQ�QRU�DQ\�SDUW�RI�LW�PD\�EH�FRSLHG�RU�UHSURGXFHG�LQ�DQ\�IRUP�RU�E\�DQ\�PHDQV�RUWUDQVODWHG�LQWR�DQRWKHU�ODQJXDJH��ZLWKRXW�WKH�SULRU�FRQVHQW�RI�6$3�$*�

6$3�$*�PDNHV�QR�ZDUUDQWLHV�RU�UHSUHVHQWDWLRQV�ZLWK�UHVSHFW�WR�WKH�FRQWHQW�KHUHRI�DQG�VSHFLILFDOO\�GLVFODLPVDQ\�LPSOLHG�ZDUUDQWLHV�RI�PHUFKDQWDELOLW\�RU�ILWQHVV�IRU�DQ\�SDUWLFXODU�SXUSRVH��6$3�$*�DVVXPHV�QRUHVSRQVLELOLW\�IRU�DQ\�HUURUV�WKDW�PD\�DSSHDU�LQ�WKLV�GRFXPHQW��7KH�LQIRUPDWLRQ�FRQWDLQHG�LQ�WKLV�GRFXPHQW�LVVXEMHFW�WR�FKDQJH�ZLWKRXW�QRWLFH��6$3�$*�UHVHUYHV�WKH�ULJKW�WR�PDNH�DQ\�VXFK�FKDQJHV�ZLWKRXW�REOLJDWLRQ�WRQRWLI\�DQ\�SHUVRQ�RI�VXFK�UHYLVLRQ�RU�FKDQJHV��6$3�$*�PDNHV�QR�FRPPLWPHQW�WR�NHHS�WKH�LQIRUPDWLRQFRQWDLQHG�KHUHLQ�XS�WR�GDWH�

7UDGHPDUNV

6$3��WKH�6$3�ORJR��5����5����$%$3��DQG�RWKHU�6$3�UHODWHG�SURGXFWV�PHQWLRQHG�KHUHLQ�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�6$3�$*��$OO�RWKHU�SURGXFWV�PHQWLRQHG�LQ�WKLV�GRFXPHQW�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�WKHLU�UHVSHFWLYH�FRPSDQLHV�

6LPSOLILFDWLRQ�*URXS6$3�/DEV��,QF������'HHU�&UHHN�5RDG3DOR�$OWR��&$������

ZZZ�VDSODEV�FRP�VLPSOHVLPSOLI\�U�#VDS�FRP

3ULQWHG�LQ�WKH�8QLWHG�6WDWHV�RI�$PHULFD�,6%1�������������;

7KLV�ERRN�XVHV�(FR)/(;�OD\�IODW�ELQGLQJ��:LWK�WKLV�OD\�IODW�IHDWXUH³GHYHORSHG�E\DQG�H[FOXVLYHO\�DYDLODEOH�DW�-RKQVRQ�3ULQWLQJ�6HUYLFH��-36�³\RX�FDQ�RSHQ�WKLV�ERRNDQG�NHHS�LW�RSHQ�ZLWKRXW�LW�VQDSSLQJ�VKXW�RQ�\RX��<RX�QHHG�QRW�ZRUU\�DERXWEUHDNLQJ�WKH�VSLQH��(FR)/(;�PDNHV�ERRNV�OLNH�WKLV�RQH�HDVLHU�WR�XVH�

&RQWHQWV�DW�D�*ODQFH

Authorizations Made Easy iii

$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL

,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y

:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3�����������������������������������������������������������������²�

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�����������������������������������������������������²�

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ�������������������������������������������������������������������������²�

&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�

&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV ���������������������������������������������������������������²�

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�����������������������������������������������������²�

&KDSWHU���� 8SJUDGH �������������������������������������������������������������������������������������������²�

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�

*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�

,QGH[ ������������������������������������������������������������������������������������������������������,²�

iv

'HWDLOHG�7DEOH�RI�&RQWHQWV

Authorizations Made Easy v

$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL

,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y

What Is this Book About? ................................................................................... xviWho Should Read this Book?............................................................................. xviHow to Use this Guide ........................................................................................ xviiConventions......................................................................................................... xvii

:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L

Overview............................................................................................................... xxiiUser Role Templates........................................................................................... xxiiFlexible User Menus............................................................................................ xxiiComposite Activity Groups............................................................................... xxivUser Groups........................................................................................................ xxivCentral User Administration ............................................................................. xxiv

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�

Overview............................................................................................................... 1–2The Authorization Concept ................................................................................ 1–4Authorization Object .............................................................................................. 1–5Authorization Object Fields ................................................................................... 1–6Authorizations........................................................................................................ 1–6Authorization Profiles ............................................................................................ 1–7

Naming Convention for Authorization Profiles........................................................ 1–7User Master Records ............................................................................................ 1–7Authorization Checks ............................................................................................ 1–8Activating and Deactivating Authorization Checks in Transactions...................... 1–8SAP* and DDIC Users ......................................................................................... 1–8What Is the Profile Generator? .......................................................................... 1–9Components of the Profile Generator ................................................................. 1–10

Activity Groups...................................................................................................... 1–10Composite Activity Groups ................................................................................... 1–10Derived Activity Groups ........................................................................................ 1–10User Assignment .................................................................................................. 1–10

Generating the Profiles........................................................................................ 1–10What Is an Activity Group? .............................................................................. 1–12Activity Group Assignments ................................................................................ 1–12

R/3 login user IDs ............................................................................................... 1–12Jobs ..................................................................................................................... 1–12Positions.............................................................................................................. 1–13Organizational units ........................................................................................... 1–13

What Is a User Role Template?.......................................................................... 1–13

Detailed Table of Contents

Authorizations Made Easyvi

R/3 Tools for Security Implementation ...........................................................1–14Case Study: Security Strategy in a Three-System Environment ................. 1–15Development System (DEV) ...............................................................................1–15Quality Assurance System (QAS) ....................................................................... 1–17

Training Client System (TRG)...............................................................................1–17Production System (PRD) ...................................................................................1–18Setting Up the Authorization Administrators.................................................1–19How the Administrators Work Together ..............................................................1–21Policies and Procedures...................................................................................1–21User Administration .............................................................................................1–21

Policies ..................................................................................................................1–21Procedures............................................................................................................1–22Roles and Responsibilities ....................................................................................1–22

System Security...................................................................................................1–23Policies ..................................................................................................................1–23Procedures............................................................................................................1–23Roles and Responsibilities ....................................................................................1–24

Auditing Requirements.....................................................................................1–24

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3 �����������������������������������������������������������������²�

Overview............................................................................................................... 2–2ASAP Roadmap ................................................................................................... 2–2Authorizations in the Roadmap Structure .............................................................2–4Knowledge Corner...............................................................................................2–5Questions and Answers Database (Q&Adb) .................................................... 2–6What Is the Q&Adb?..............................................................................................2–6How to Work with the Q&Adb................................................................................ 2–6How to Generate the Authorization List from the Q&Adb ..................................... 2–6Authorization List ................................................................................................2–6What Is the Authorization List?..............................................................................2–6How to Work with the Authorization List................................................................ 2–7

Generate Authorization List from the Q&Adb..........................................................2–7Define User Roles ...................................................................................................2–8Generate User Roles Overview ..............................................................................2–9Build User Roles .....................................................................................................2–9

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU �����������������������������������������������������²�

Overview...............................................................................................................3–2Confirming that the Profile Generator Is Active............................................... 3–2Checking the Required Instance Profile Parameter..............................................3–2Loading the USOBX_C and USOBT_C tables ..................................................3–4Initial Copying of SAP Defaults into the Customer Tables (SU25) .......................3–4Transporting the Defaults ...................................................................................... 3–6Getting Support from the SAPNet – R/3 Frontend Notes................................ 3–7Accessing the Error Notes Database ....................................................................3–7Printing Important SAPNet – R/3 Frontend Notes ................................................ 3–8Applying Advance Corrections to Your R/3 System.............................................. 3–8

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ �������������������������������������������������������������������������²�

Overview...............................................................................................................4–2System Users ....................................................................................................... 4–2

Detailed Table of Contents

Release 4.6A/B YLLvii

External R/3 Users ................................................................................................ 4–3Internal R/3 Users ................................................................................................. 4–3

Dialog...................................................................................................................... 4–3Batch Data Communication.................................................................................... 4–3Background............................................................................................................. 4–3CPIC ....................................................................................................................... 4–4

Special R/3 Users.................................................................................................. 4–4SAP* ....................................................................................................................... 4–4DDIC ....................................................................................................................... 4–4EarlyWatch ............................................................................................................. 4–4

Creating Users ...................................................................................................... 4–5User Groups......................................................................................................... 4–5Authorizations and Authorization Profiles....................................................... 4–6Mass Operations ................................................................................................. 4–6Creating a New User (Client-Specific)............................................................... 4–7Changing a User’s Password........................................................................... 4–10Password Requirements ..................................................................................... 4–11User Information System.................................................................................. 4–12

&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�

Overview............................................................................................................... 5–2What Are User Role Templates? ....................................................................... 5–2User Menu ............................................................................................................ 5–2How to Work with User Role Templates ........................................................... 5–3Starting Activity Group Maintenance (PFCG) ....................................................... 5–4Using the SAP-Provided User Role Templates .................................................... 5–4Copying and Modifying SAP-Provided User Role Templates............................. 5–10Create your own User Role Templates............................................................... 5–22Creating Composite Activity Groups ................................................................... 5–32Tips for an Administrator ................................................................................. 5–35Available User Role Templates........................................................................ 5–40Release 4.6A....................................................................................................... 5–40Release 4.6B....................................................................................................... 5–44

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�

Overview............................................................................................................... 6–2Selecting Views/Types in Activity Group Maintenance .................................. 6–2Exploring Advanced Profile Generator Functionality ..................................... 6–3Creating and Changing the Hierarchy................................................................... 6–4

Inserting Transactions ............................................................................................ 6–5Inserting Internet and Document Links ............................................................... 6–10Inserting Reports ................................................................................................. 6–12Displaying the Online Documentation for Activity Group Objects ...................... 6–15Copying and Deriving Activity Groups...........................................................6–16Basics on Duplicating Activity Groups ................................................................ 6–16Copying Activity Groups...................................................................................... 6–17Deriving Activity Groups...................................................................................... 6–17Selecting Workflow Tasks................................................................................ 6–21What You Should Know About Workflow............................................................ 6–21Deleting Activity Groups ..................................................................................6–24

Detailed Table of Contents

Authorizations Made Easyviii

Postmaintaining User Role Templates............................................................6–25Different Settings for the Maintenance View.......................................................6–25Maintaining and Generating the Authorization Profiles................................6–26Displaying an Overview of Generated Profiles .............................................. 6–30Regenerating Authorization Profiles After Making Changes ....................... 6–32Using Utilities to Change Generated Authorizations .................................... 6–36Merging Authorizations........................................................................................6–36Reorganizing Technical Names of Authorizations .............................................. 6–37Customizing Authorizations.............................................................................6–38Assigning IMG Projects or Project Views to Activity Groups ..............................6–38

&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�

Overview...............................................................................................................7–2Transports Between Clients............................................................................... 7–2Transports Between R/3 Systems ..................................................................... 7–3Transporting Activity Groups ............................................................................ 7–3Transporting Single Activity Groups Using the Activity Group Maintenance

Transaction........................................................................................................7–4Mass Transport of Activity Groups ........................................................................ 7–6Transporting Check Indicators and Field Values ............................................7–8Transporting Authorization Templates ............................................................. 7–8Transporting User Master Records ................................................................... 7–8

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�

Manually Postmaintaining Authorizations........................................................ 8–2When to Insert Missing Authorizations?................................................................8–2

Case #1: Authorization Is Missing for Related Transactions ..................................8–2Case #2: The Generated Profile Does Not Assign Any General Rights to the

User ....................................................................................................................8–2Case #3: Cannot Select Transaction SU53 from the Menu in PFCG.....................8–2

How to Insert Missing Authorizations ....................................................................8–3Manually Inserting Authorizations.....................................................................8–3Using Selection Criteria .........................................................................................8–4Inserting Manually.................................................................................................. 8–6Inserting Authorizations from Templates .........................................................8–7Creating a New Template......................................................................................8–7Inserting Authorizations from a Template ........................................................... 8–10Inserting Authorizations from a Profile...........................................................8–12Inserting Full Authorizations: Profile “<YourCompany>” ............................ 8–15

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV����������������������������������������������������������������²�

Overview............................................................................................................... 9–2Assigning Users to Activity Groups.................................................................. 9–3Assigning Activity Groups to Users.................................................................. 9–6Assigning PD Objects to Activity Groups ........................................................ 9–7Assigning Activity Groups to PD Objects ...................................................... 9–10Transferring Users from an IMG Project to an Activity Group..................... 9–13Updating Profiles in the User Master Records............................................... 9–15

Detailed Table of Contents

Release 4.6A/B L[ix

Comparing User Master Data from Within Transaction PFCG........................... 9–15Profile Comparisons Using Mass Compare (PFUD)........................................... 9–18Report PFCG_TIME_DEPENDENCY to Schedule Time Dependency.............. 9–19Creating a Sample Organizational Plan.......................................................... 9–21Using the Classic R/3 Transaction...................................................................... 9–22Using the Enjoy Transaction ............................................................................... 9–27Structural Authorizations ................................................................................. 9–28

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�

Overview............................................................................................................. 10–2Setting Up an ALE User.................................................................................... 10–3Naming Logical Systems.................................................................................. 10–5Assigning Logical Systems to Clients............................................................ 10–8Defining Target System for RFC Calls .......................................................... 10–10Distribution Model........................................................................................... 10–13Generating Partner Profiles in the Central System ..................................... 10–16Distributing Model View ................................................................................. 10–17Generating Partner Profiles in the Client System........................................ 10–18

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�

Overview............................................................................................................. 11–2Assigning the Central User Administration Distribution Model .................. 11–2Testing Central User Administration .............................................................. 11–3Migrating Existing Users to the Central System............................................ 11–7Defining Field Attributes for User Maintenance ............................................ 11–9Global User Manager ...................................................................................... 11–10Structure of the Global User Manager .............................................................. 11–12Using the Global User Manager........................................................................ 11–12

System Landscape with Existing Users ............................................................. 11–12System Landscape Without Existing Users........................................................ 11–13User Creation...................................................................................................... 11–14

Defining System Types and User Groups......................................................... 11–14Modeling with the Global User Manager........................................................... 11–16Authorization for the Global User Manager....................................................... 11–17Distributing Data in the Global User Manager .................................................. 11–18

Immediate Distribution........................................................................................ 11–19Scheduling Background Distribution................................................................... 11–19

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�

Overview............................................................................................................. 12–2Tracing Authorizations with Transaction SU53............................................. 12–2System Trace Using Transaction ST01........................................................... 12–4Analyzing a Written Trace File ......................................................................... 12–9Reducing the Scope of Authorization Checks............................................. 12–12Overview............................................................................................................ 12–12Enabling the Profile Generator.......................................................................... 12–12Enabling/Disabling Other System-wide Checks ............................................... 12–12

Detailed Table of Contents

Authorizations Made Easyx

Enabling auth/tcodes_not_checked ....................................................................12–12Enabling auth/rfc_authority_check......................................................................12–13Globally Deactivating or Activating Authorization Checks ..................................12–13Parameter Transactions......................................................................................12–18

Deactivating Authorization Checks Using SU24 ...............................................12–18Reducing the Scope of Authorization Checks................................................... 12–19

Maintaining Check Indicators for Transaction Codes .........................................12–20Mass Change of Check Indicators ......................................................................12–28Maintaining Authorizations in the Activity Groups...............................................12–32

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�������������������������������������������������� ��²�

Overview.............................................................................................................13–2Audit Tools (SM20, SM19, SECR) .................................................................... 13–2Security Audit Log (SM20)...................................................................................13–2

Running the Audit Log...........................................................................................13–4Setting Security Audit Log Parameters (SM19) ..................................................13–5

Defining Filter Group 1 ..........................................................................................13–7Defining Filter Group 2 ..........................................................................................13–7

Audit Information System (SECR).....................................................................13–11Complete Audit....................................................................................................13–12User-Defined Audit..............................................................................................13–16

User Security Audit Jobs ...................................................................................13–18Audit Tasks (SM21, STAT, ST03) ...................................................................13–20Reviewing Validity of Named Users ..................................................................13–20Reviewing Profiles for Accuracy and Permission Creep................................... 13–21System Log (SM21)........................................................................................... 13–22Statistic Records in CCMS (STAT) ................................................................... 13–24ST03 – User Profile ........................................................................................... 13–26Logging of Specific Activities............................................................................. 13–28

Logging Changes to Table Data .........................................................................13–28

Logging Changes to User Master Records, Profiles, and Authorizations 13–30

&KDSWHU���� 8SJUDGH ���������������������������������������������������������������������������������������� ��²�

Before Doing Any Upgrade .............................................................................. 14–2Validation Steps After Upgrading Is Completed ............................................ 14–3Converting Previously Created SU02 Profiles to Activity Groups............... 14–4Creating an Activity Group from Manually Maintained Profiles...........................14–4Removing User Assignments from the Original SU02 Profile............................. 14–9Upgrading from a Release Prior to 3.1x to 4.6 A/B ......................................14–11Converting Existing Authorization Profiles for the Profile Generator ................14–11Re-creating the Authorization Profiles from Scratch Using the Profile

Generator ...................................................................................................... 14–11Upgrading from Release 3.0F to 4.6 A/B.......................................................14–12Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B...................................... 14–14Upgrade from Releases 4.0x or 4.5x to 4.6 A/B............................................ 14–22

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�

Overview...............................................................................................................A–2SAPNet – R/3 Frontend Notes ............................................................................A–3

Detailed Table of Contents

Release 4.6A/B [Lxi

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�

Overview...............................................................................................................B–2R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................B–2Profile Generator Setup......................................................................................B–3Working with the PG and Profiles .....................................................................B–3Authorization Checks (SU24).............................................................................B–5Upgrade Procedure (SU25) ................................................................................B–7Including Transactions or Reports ...................................................................B–7Missing Authorizations.......................................................................................B–7User Administration ............................................................................................B–8Transporting ........................................................................................................B–8Tables ...................................................................................................................B–8

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�

Incorrect Logons, Default Clients, and Default Start Menu............................C–2Setting Password Length and Expiration.........................................................C–2Specifying Impermissible Passwords...............................................................C–3Securing SAP* Against Misuse..........................................................................C–3Tracing Authorizations .......................................................................................C–3Profile Generator and Transaction SU24..........................................................C–4User Buffer ...........................................................................................................C–4No Check on Object S_TCODE..........................................................................C–4No Check on Certain ABAP Objects .................................................................C–4RFC Authority Check ..........................................................................................C–5

*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�

,QGH[ ������������������������������������������������������������������������������������������������������,²�

Detailed Table of Contents

Authorizations Made Easyxii

xiii

�$FNQRZOHGJPHQWV

,�ZLVK�WR�H[SUHVV�DSSUHFLDWLRQ�WR�WKH�IROORZLQJ�LQGLYLGXDOV�ZKR�SURYLGHG�WLPH��PDWHULDO��H[SHUWLVH��DQGUHVRXUFHV�WR�KHOS�PDNH�WKLV�JXLGHERRN�SRVVLEOH��LQ�DOSKDEHWLFDO�RUGHU��

6$3�$*� 1RUPDQ�'H�/HHXZ��0DWKLDV�.LQ]OHU��(UZLQ�5RMHZVNL��0DUNXV�6FKPLGW��+HLNR�6WRFN�6YHQ�6FKZHULQ�:HQ]HO��7KRUVWHQ�9LHWK

6$3�$PHULFD� 0DULD�*UHJJ��´&DVSHUµ�:DL�)X�.DQ��'DQLHO�%HQMDPLQ�)LJ�=DLGVSLQHU

6$3�/DEV� $QLO�-DLQ��-RKQ�.DQFOLHU��2OLYHU�0DLQND��*DU\�1DND\DPD��.XUW�:ROI

1LKDG�$O�)WD\HK6$3�/DEV��,QF�������

Acknowledgments

Authorizations Made Easyxivxiv

xv

,QWURGXFWLRQ

&RQWHQWV

What Is this Book About? .......................................................................................xvi

Who Should Read this Book?.................................................................................xvi

How to Use this Guide............................................................................................xvii

Conventions ............................................................................................................xvii

Introduction

What Is this Book About?

Authorizations Made Easyxvixvi

:KDW�,V�WKLV�%RRN�$ERXW"

7KLV�JXLGHERRN�LV�GHVLJQHG�WR�KHOS�\RX�VHW�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�LQ�WKHFXVWRPHU�V\VWHP�XVLQJ�WKH�3URILOH�*HQHUDWRU��3*���,W�H[SODLQV�ZKDW�\RX�QHHG�WR�NQRZ�WRSHUIRUP�WKLV�WDVN�DQG�KHOSV�\RX�XVH�WKH�VWDQGDUG�WRROV�SURYLGHG�ZLWK�\RXU�V\VWHP�

7KLV�ERRN�GRHV�QRW�FRYHU�DXWKRUL]DWLRQV�IRU�DGG�RQ�FRPSRQHQWV�RU�1HZ�'LPHQVLRQSURGXFWV��,W�DOVR�GRHV�QRW�FRYHU�,QWHUQHW�UHODWHG�DXWKRUL]DWLRQV��HQFU\SWLRQ��DXWKHQWLFDWLRQ�DQG�FUHGLW�FDUG�VHFXULW\��

7KLV�JXLGH�UHIHUV�WR�5HOHDVH����$�%�RI�WKH�6$3�5���6\VWHP��$OO�VFUHHQVKRWV�DUH�IURP�5HOHDVH���$�XQOHVV�RWKHUZLVH�QRWHG�

7KH�VWUXFWXUH�RI�WKLV�JXLGHERRN�PDWFKHV�WKH�VHWXS�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW��SURJUHVVLQJIURP�D�QHZ�5���LQVWDOODWLRQ�DOO�WKH�ZD\�WR�DQ�XSJUDGH��,I�\RX�XSJUDGH�IURP�DQ�ROGHU�UHOHDVHVHH�FKDSWHU�����8SJUDGH��IRU�PRUH�LQIRUPDWLRQ�

7KH�JUDSKLF�EHORZ�SURYLGHV�DQ�URXJK�RYHUYLHZ�DERXW�WKH�5���DXWKRUL]DWLRQ�F\FOH��)RU�DPRUH�GHWDLOHG�LQIRUPDWLRQ�RQ�WKH�DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�VHH�FKDSWHU����5��6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�

Authorizations ScopingPreparing the R/3 Environment

and Preparation for Go-LiveProduction

Phase

Upgrade +Ongoing

Development

ImplementationEvaluation Operations andContinuous Improvement

7KLV�JXLGH�SURYLGHV�\RX�ZLWK�WKH�IROORZLQJ�< 7KH�ELJ�SLFWXUH��VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ�5���< 7DVNV�\RX�QHHG�WR�SHUIRUP�GXULQJ�DQG�DIWHU�LQVWDOODWLRQ�RI�5���WR�IDFLOLWDWH�WKH�XVH�RI�WKH

3*< 7DVNV�\RX�QHHG�WR�SHUIRUP�DIWHU�DQ�XSJUDGH�RI�WKH�5���6\VWHP< $OO�WKH�HVVHQWLDO�VWHSV�IRU�VHFXULW\�LPSOHPHQWDWLRQ�XVLQJ�WKH�3*�DQG�&HQWUDO�8VHU

$GPLQLVWUDWLRQ< 7DVNV�WR�SUHSDUH�IRU�JRLQJ�OLYH< $SSHQGL[HV�ZLWK�WKH�PRVW�LPSRUWDQW�6$31HW�²�5���)URQWHQG�QRWHV�IRU�DXWKRUL]DWLRQV

DQG�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�

:KR�6KRXOG�5HDG�WKLV�%RRN"

7KLV�JXLGH�ZDV�GHVLJQHG�IRU�WKH�IROORZLQJ�SHRSOH�XVLQJ�WKH�3*�HLWKHU�LQ�DQ�LPSOHPHQWDWLRQSURMHFW�RU�DV�DQ�RQJRLQJ�UHIHUHQFH�< %DVLV�&RQVXOWDQWV�ZKR�LQVWDOO�5���DQG�VHW�XS�WKH�VHFXULW\�DW�FXVWRPHU�VLWHV

Introduction

How to Use this Guide

Release 4.6A/B xviixvii

< $SSOLFDWLRQ�&RQVXOWDQWV�ZKR�ZDQW�WR�VWDUW�XVLQJ�WKH�3*�DV�WKH�EDVLV�IRU�WKHLU�FXVWRPHUVHFXULW\�LPSOHPHQWDWLRQ

< &XVWRPHU�,7�DQG�KHOS�GHVN�SHUVRQQHO

+RZ�WR�8VH�WKLV�*XLGH

'HSHQGLQJ�RQ�\RXU�JHQHUDO�6$3�DQG�DXWKRUL]DWLRQ�VSHFLILF�NQRZOHGJH��VWDUW�ZLWK�WKHIROORZLQJ�VHFWLRQV�< ,I�\RX�KDYH�OLWWOH�RU�QR�NQRZOHGJH�FRQFHUQLQJ�VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ

5����VWDUW�ZLWK�FKDSWHU����5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�< (YHU\RQH��HYHQ�WKH�H[SHUWV��VKRXOG�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�

)DPLOLDULW\�ZLWK�WKLV�FKDSWHU�HQVXUHV�D�FRPSOHWH�VHWXS�EHIRUH�\RX�DFWXDOO\�VWDUW�ZRUNLQJZLWK�WKH�3*�

< ,I�\RX�KDYH�DOUHDG\�XVHG�WKH�3*�LQ�5HOHDVH����)����*����+����$����%����$�RU����%�ZHVWURQJO\�UHFRPPHQG�WKDW�\RX�UHDG�WKH�FKDSWHU�:KDWªV�1HZ�LQ�5HOHDVH�����DQG�WKHDSSURSULDWH�VHFWLRQ�LQ�FKDSWHU�����8SJUDGH��,Q�WKLV�FKDSWHU��ZH�GLVFXVV�WKH�VWHSV�WR�EHSHUIRUPHG�EHIRUH�\RX�FRQWLQXH�ZRUNLQJ�ZLWK�WKH�3*�DIWHU�DQ�5���6\VWHP�XSJUDGH��:HSURYLGH�LQIRUPDWLRQ�IRU�D�VPRRWK�WUDQVLWLRQ�WR�\RXU�QH[W�UHOHDVH�

< 5HDG�FKDSWHUV��²��DW�OHDVW�RQFH�IRU�LQIRUPDWLRQ�UHODWHG�WR�WKH�LPSOHPHQWDWLRQ�RI�VHFXULW\DQG�XVLQJ�WKH�3URILOH�*HQHUDWRU��$IWHU�WKDW��\RX�FDQ�EURZVH�WKH�FKDSWHUV�RQ�SHUIRUPLQJVSHFLILF�WDVNV�

< %HIRUH�WUDQVSRUWLQJ�DFWLYLW\�JURXSV��UHDG�FKDSWHU����3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�FDUHIXOO\�

< &KDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�KHOSV�VROYH�RQJRLQJ�DXWKRUL]DWLRQ�SUREOHPV�RQFH\RX�JR�OLYH�

&HUWDLQ�WHUPLQRORJ\��XVHU�LQIRUPDWLRQ��DQG�VSHFLDO�LFRQV�DUH�XVHG�WKURXJKRXW�WKLV�JXLGH�7KH�IROORZLQJ�VHFWLRQV�H[SODLQ�KRZ�WR�LGHQWLI\�DQG�XVH�WKHVH�KHOSIXO�IHDWXUHV�

&RQYHQWLRQV

,Q�WKH�WDEOH�EHORZ��\RX�ZLOO�ILQG�VRPH�RI�WKH�WH[W�FRQYHQWLRQV�XVHG�WKURXJKRXW�WKLV�JXLGH�

&ROXPQ�7LWOH &ROXPQ�7LWOH

6DQV�VHULI�LWDOLF 6FUHHQ�QDPHV�RU�RQ�VFUHHQ�REMHFWV��EXWWRQV�ILHOGV��VFUHHQ�WH[W��HWF��

Monospace 8VHU�LQSXW��WH[W�WKH�XVHU�W\SHV�YHUEDWLP�

1DPH��→��1DPH� 0HQX�VHOHFWLRQ�1DPH��LV�WKH�PHQX�QDPH�DQG�1DPH��LV�WKH�LWHP�RQ�WKH�PHQX

Introduction

Conventions

Authorizations Made Easyxviiixviii

6DPSOH�5���5HOHDVH�����6FUHHQ

♦�$SSOLFDWLRQ�WRROEDU�

7KH�VFUHHQVKRWV�VKRZQ�LQ�WKLV�JXLGH�DUH�EDVHG�RQ�IXOO�XVHU�DXWKRUL]DWLRQ��6$3B$//��'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��VRPH�RI�WKH�EXWWRQV�RQ�\RXU�DSSOLFDWLRQ�WRROEDU�PD\QRW�EH�DYDLODEOH�

♣�:RUNSODFH�PHQX�

'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��\RXU�ZRUNSODFH�PHQX�PD\�ORRN�GLIIHUHQW�IURPVFUHHQVKRWV�LQ�WKLV�JXLGH�ZKLFK�DUH�EDVHG�RQ�6$3B$//��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUGPHQX�EXWWRQV�SURYLGH�GLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�

,Q�WKLV�JXLGHERRN�\RX�OHDUQ�KRZ�WR�EXLOG�XVHU�PHQXV�

1RWH��,Q�WKLV�JXLGHERRN��ZH�VKRZ�WKH�WHFKQLFDO�QDPHV�RI�HDFK�WUDQVDFWLRQ��7R�PDWFK�RXUVHWWLQJV��FKRRVH�([WUDV�→�6HWWLQJV�DQG�VHOHFW�6KRZ�WHFKQLFDO�QDPHV�

Menu Bar

Screen Title

♦ Application Toolbar

♣ Workplace Menu

Status Bar

Standard Toolbar

User menu

SAP standard menu

Workplace

Introduction

Conventions

Release 4.6A/B xixxix

6SHFLDO�,FRQV

7KURXJKRXW�WKLV�JXLGH�VSHFLDO�LFRQV�LQGLFDWH�LPSRUWDQW�PHVVDJHV��%HORZ�DUH�EULHIH[SODQDWLRQV�RI�HDFK�LFRQ�

([HUFLVH�FDXWLRQ�ZKHQ�SHUIRUPLQJ�WKLV�WDVN�RU�VWHS��$Q�H[SODQDWLRQ�RI�ZK\�\RX�VKRXOG�EHFDUHIXO�LV�LQFOXGHG�

7KLV�LQIRUPDWLRQ�KHOSV�\RX�XQGHUVWDQG�WKH�WRSLF�LQ�JUHDWHU�GHWDLO��,W�LV�QRW�QHFHVVDU\�WRNQRZ�WKLV�LQIRUPDWLRQ�WR�SHUIRUP�WKH�WDVN�

7KHVH�PHVVDJHV�SURYLGH�KHOSIXO�KLQWV�DQG�VKRUWFXWV�WR�PDNH�\RXU�ZRUN�IDVWHU�DQG�HDVLHU�

Introduction

Conventions

Authorizations Made Easyxx xx

xxi

:KDW·V�1HZ�LQ�5HOHDVH����

&RQWHQWV

Overview ..................................................................................................................xxii

User Role Templates...............................................................................................xxii

Flexible User Menus ...............................................................................................xxii

Composite Activity Groups...................................................................................xxiv

User Groups ...........................................................................................................xxiv

Central User Administration .................................................................................xxiv

What’s New in Release 4.6

Overview

Authorizations Made Easyxxiixxii

2YHUYLHZ

7KLV�FKDSWHU�SURYLGHV�D�EULHI�GHVFULSWLRQ�RI�WKH�QHZ�IXQFWLRQDOLW\�LQ�DXWKRUL]DWLRQ�UHODWHGWRSLFV�LQ�WKH�5���5HOHDVH�����

)RU�VWHS�E\�VWHS�SURFHGXUHV�DQG�GHWDLOHG�LQIRUPDWLRQ�RQ�VSHFLILF�WRSLFV��SOHDVH�VHH�WKHDSSURSULDWH�FKDSWHUV��DV�UHIHUHQFHG�

)RU�WKH�ODWHVW�LQIRUPDWLRQ��\RX�VKRXOG�DOZD\V�FKHFN�WKH�UHOHDVH�QRWHV�IRU�5HOHDVH�����

8VHU�5ROH�7HPSODWHV

:LWK�5HOHDVH����$�6$3�GHOLYHUV�RYHU�����XVHU�UROH�WHPSODWHV��7KH�XVHU�UROH�WHPSODWHV�DUHSUHGHILQHG�DFWLYLW\�JURXSV�FRQVLVWLQJ�RI�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��<RX�KDYHWKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�< 8VH�DV�GHOLYHUHG< &RS\�DQG�FKDQJH�WKHP�WR�VXLW�\RXU�QHHGV< &UHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�IURP�VFUDWFK

2QFH�XVHUV�DUH�DVVLJQHG�WR�RQH�RU�PRUH�DFWLYLW\�JURXSV�DQG�ORJ�RQWR�WKH�V\VWHP��WKH\�VHHWKHLU�XVHU�PHQX��$V�VKRZQ�LQ�WKH�JUDSKLF�RQ�WKH�QH[W�SDJH��WKLV�XVHU�PHQX�FRQWDLQV�RQO\WKRVH�LWHPV��VXFK�DV�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��WKH\�QHHG�WR�SHUIRUP�WKHLUGDLO\�WDVNV��8VHUV�FDQ�DOVR�DGG�WKHLU�PRVW�IUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�)DYRULWHV�PHQXIRU�TXLFNHU�DFFHVV�

)OH[LEOH�8VHU�0HQXV

$V�RI�5HOHDVH����$��WKH�V\VWHP�GLVSOD\V�D�VSHFLILF�XVHU�PHQX�LQ�WKH�IRUP�RI�D�WUHH�DIWHU�XVHUVORJ�RQ�WR�WKH�V\VWHP��VHH�JUDSKLF�RQ�QH[W�SDJH���7KLV�XVHU�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROHWHPSODWH�RU�DFWLYLW\�JURXS�WKH�XVHU�LV�DVVLJQHG�WR��8VHUV�QR�ORQJHU�KDYH�WR�QDYLJDWH�WKURXJKXQQHFHVVDU\�5���IXQFWLRQV�IRU�ZKLFK�WKH\�KDYH�QR�DXWKRUL]DWLRQ��7KH�FRPSDQ\�PHQX�LV�QRORQJHU�DYDLODEOH�DV�RI�5HOHDVH����$�

:KHQ�D�IXQFWLRQ�LV�VHOHFWHG��LW�VWDUWV�LQ�WKH�VDPH�VHVVLRQ��UHSODFLQJ�WKH�XVHU�PHQX�ZLWK�WKHH[HFXWHG�IXQFWLRQ��:KHQ�D�XVHU�H[LWV�D�WUDQVDFWLRQ�RU�VWDUWV�D�QHZ�VHVVLRQ��WKH�VSHFLILF�XVHUPHQX�DXWRPDWLFDOO\�UHDSSHDUV�

$ORQJ�ZLWK�WKH�XVHU�PHQXV��\RX�FDQ�GLVSOD\�D�FRPSOHWH�YLHZ�RI�DOO�IXQFWLRQV�GHOLYHUHG�E\6$3�XVLQJ�WKH�6$3�VWDQGDUG�PHQX��7KLV�FRPSOHWH�YLHZ�GLVSOD\V�DXWRPDWLFDOO\�LI�QR�XVHU

What’s New in Release 4.6

Flexible User Menus

Release 4.6A/B xxiiixxiii

PHQXV�KDYH�EHHQ�GHILQHG�RU�LI�WKH�DGPLQLVWUDWRU�KDV�FKRVHQ�WKLV�RSWLRQ�ZKHQ�GHILQLQJ�QHZXVHU�PHQXV�

8VHU�0HQX�([DPSOH

+HUH�DUH�VRPH�H[DPSOHV�RI�GHOLYHUHG�DFWLYLW\�JURXSV�

%DVLV 0LVFHOODQHRXV

$XWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU &2��6DOHV�PDQDJHU

$XWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU &2��+HDG�RI�FRQWUROOLQJ

8VHU�DGPLQLVWUDWRU ),��$FFRXQWV�SD\DEOH�DFFRXQWDQW

6\VWHP�DGPLQLVWUDWRU ),��$FFRXQWV�UHFHLYDEOH�DFFRXQWDQW

%DFNJURXQG�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��:RUNHU

'DWDEDVH�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��2SHUDWRU

&XVWRPL]LQJ�SURMHFW�PHPEHU 00��$FFRXQWV�SD\DEOH�FOHUN

What’s New in Release 4.6

Composite Activity Groups

Authorizations Made Easyxxivxxiv

&RPSRVLWH�$FWLYLW\�*URXSV

$V�RI�5HOHDVH����$�LW�LV�SRVVLEOH�WR�FUHDWH�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�D�FROOHFWLRQ�RI�RWKHUDFWLYLW\�JURXSV��7KLV�DFWLYLW\�JURXS�LV�FDOOHG�D�FRPSRVLWH�DFWLYLW\�JURXS��&RPSRVLWH�DFWLYLW\JURXSV�FRQWDLQ�RQO\�RWKHU�DFWLYLW\�JURXSV�DQG�QR�DXWKRUL]DWLRQ�GDWD�

8VHU�*URXSV

,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��7KH�FDWHJRU\�8VHUJURXS�FDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

&HQWUDO�8VHU�$GPLQLVWUDWLRQ

,I�D�V\VWHP�JURXS�FRQVLVWV�RI�GLIIHUHQW�5���6\VWHPV�ZLWK�PXOWLSOH�FOLHQWV��WKHQ�WKH�VDPHXVHUV�DUH�FUHDWHG�VHYHUDO�WLPHV�LQ�HYHU\�FOLHQW�DQG�DVVLJQHG�WR�DFWLYLW\�JURXSV��&HQWUDO�8VHU$GPLQLVWUDWLRQ�LV�GHVLJQHG�WR�FDUU\�RXW�WKHVH�WDVNV�LQ�D�FHQWUDO�V\VWHP�DQG�WKHQ�GLVWULEXWHWKLV�GDWD�WR�DOO�V\VWHPV�LQ�WKH�V\VWHP�JURXS�

7KH�*OREDO�8VHU�0DQDJHU�SURYLGHV�WKH�V\VWHP�DGPLQLVWUDWRU�ZLWK�DQ�RYHUYLHZ�RI�WKH�XVHUV�H[LVWLQJ�XVHU�JURXSV��WKH�V\VWHPV�LQ�WKH�V\VWHP�JURXS��DQG�WKH�DFWLYLW\�JURXSV��%\�VLPSO\XVLQJ�GUDJ�DQG�GURS��WKH�V\VWHP�DGPLQLVWUDWRU�FDQ�PDNH�FKDQJHV�LQ�WKH�RYHUYLHZ��7KHVHFKDQJHV�WDNH�HIIHFW�DIWHU�GLVWULEXWLRQ�WR�GHSHQGHQW�V\VWHPV�

1–1

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH

$XWKRUL]DWLRQ�&RQFHSW

&RQWHQWV

Overview ..................................................................................................................1–2

The Authorization Concept ....................................................................................1–4

SAP* and DDIC Users .............................................................................................1–8

What Is the Profile Generator? ..............................................................................1–9

What Is an Activity Group? ..................................................................................1–12

R/3 Tools for Security Implementation ...............................................................1–14

Case Study: Security Strategy in a Three-System Environment .....................1–15

Setting Up the Authorization Administrators.....................................................1–19

Policies and Procedures ......................................................................................1–21

Auditing Requirements ........................................................................................1–24

��

Chapter 1: R/3 System Security and the Authorization Concept

Overview

Authorizations Made Easy1–2

2YHUYLHZ

,Q�WKLV�FKDSWHU�ZH�H[SODLQ�WKH�VHWXS�DQG�PDLQWHQDQFH�RI�WKH�5���DXWKRUL]DWLRQ�FRQFHSWWKURXJK�WKH�FRPSOHWH�5���OLIHF\FOH�

7KH�JUDSKLF�EHORZ�LOOXVWUDWHV�WKH�5���DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�LQ�YDULRXVVWDJHV�RI�WKH�LPSOHPHQWDWLRQ�

Description ofauth. concept

Info gathering

Strategy,Definition

SU25Upgrade

Authorizations Scoping Preparing the R/3 Environmentand Preparation for Go-Live

ProductionPhase

Upgrade +Ongoing

Development

Setting upthe profilegenerator

Roadmap,+ structure

Q&Adb (4.6B)

Authorizationlist (AL.xls)

Preparation for Going live,Transporting (AG, user,templates,…)

User role templates

Setting up ALE

ASAP

Setting up Central User Admnistration

Global usermanager

IMG

SU25 First installation

3 methods of usinguser role templates: - Use as is - Copy + change - Create own

Description how to workwith user role templates (AG)(which exists, how to use,customizing, creating, etc.)

Upgrade

3.x-4.x Õ 4.6

Miscellaneous

Tips & Troubleshoot.

Infosystem.

SAPNet -R/3Frontend notes (formerly OSS)

Useradmin.

R/3Users

ImplementationEvaluation Operations andContinuous Improvement

SecurityAudit

7RROV�WR�6XSSRUW�WKH�5���$XWKRUL]DWLRQ�&\FOH

7KH�JXLGHERRN�LV�GLYLGHG�LQWR�IRXU�VHSDUDWH�SKDVHV�

< $XWKRUL]DWLRQ�6FRSLQJ��FKDSWHU������< 3UHSDULQJ�WKH�5���(QYLURQPHQW�DQG�3UHSDUDWLRQ�IRU�*R�/LYH��FKDSWHU�����������������������������< 3URGXFWLRQ�3KDVH���FKDSWHU����������������< 8SJUDGH�DQG�2QJRLQJ�'HYHORSPHQW��FKDSWHU����

:H�EHJLQ�ZLWK�WKH�5���DXWKRUL]DWLRQ�FRQFHSW�DQG�WKH�DXWKRUL]DWLRQ�GHVLJQ�VR�\RX�FDQ�PHHWUHTXLUHPHQWV�VXFK�DV�PD[LPXP�VHFXULW\��HDV\�XVHU�PDLQWHQDQFH��DQG�VXIILFLHQW�SULYLOHJHVIRU�HQG�XVHUV�WR�IXOILOO�WKHLU�MRE�GXWLHV��7KH�DXWKRUL]DWLRQ�FRQFHSW�GHILQHV�WKH�IXQFWLRQV�WR�EHFDUULHG�RXW�LQ�YDULRXV�RUJDQL]DWLRQDO�XQLWV�E\�SHRSOH�LQ�VSHFLILF�SRVLWLRQV��7KH�FRQFHSW�DOVRH[WHQGV�WKH�5���RQOLQH�GRFXPHQWDWLRQ�RQ�DXWKRUL]DWLRQV�DQG�SURILOHV�UHTXLUHG�IRU�WKHYDULRXV�HQWHUSULVH�DUHDV�

,PSOHPHQWLQJ�D�PXOWLOHYHO�FOLHQW�VHUYHU�HQYLURQPHQW�RQ�:$1V�SURYLGHV�JUHDW�IOH[LELOLW\�%XW��LQ�WKLV�HQYLURQPHQW��KLJKO\�VHQVLWLYH�GDWD�DQG�SURJUDPV�DUH�DW�D�JUHDWHU�ULVN�RI�EHLQJORVW��PDQLSXODWHG��DQG�VSLHG�XSRQ�WKDQ�LQ�D�FRQYHQWLRQDO�PDLQIUDPH�HQYLURQPHQW��(YHQZLWK�ORFDO�RSHUDWLRQ��WKLV�ULVN�DSSOLHV�WR�DOO�WKUHH�OD\HUV��3UHVHQWDWLRQ��$SSOLFDWLRQ��DQG'DWDEDVH��DQG�EHFRPHV�HYHQ�PRUH�DFXWH�WKDQ�:$1V�

Chapter 1: R/3 System Security and the Authorization Concept

Overview

Release 4.6A/B1–3

7KH�IROORZLQJ�JUDSKLF�VKRZV�KRZ�5���FRYHUV�WKH�DVSHFWV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\�

FRYHUHG�LQ�

$XWKRUL]DWLRQV�0DGH�(DV\

$XWKRUL]DWLRQ�&RQFHSW�LQ�5��� 'DWD�SURWHFWLRQ�

DW�GDWDEDVH�OHYHO

3URWHFWLRQ�DW�FRPPXQLFDWLRQ�OHYHO

,QWHJULW\�FKHFN

$FFHVV�SURWHFWLRQ

'DWD�EDFNXS

5

5

SAP SAP

'DWD�3URWHFWLRQ�DQG�6HFXULW\

7R�PHHW�WKH�KLJK�GHPDQGV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\��6$3�SURYLGHV�WKH�IROORZLQJ�5��VHFXULW\�PHFKDQLVPV�< $XWKRUL]DWLRQ�FRQFHSW��WKLV�JXLGHERRN�GLVFXVVHV�DQ�DXWKRUL]DWLRQ�GHVLJQ�XVLQJ�WKH

3URILOH�*HQHUDWRU�< $FFHVV�SURWHFWLRQ�DQG�DXWKHQWLFDWLRQ�RXWVLGH�RI�5����LQFOXGLQJ�DXWKRUL]DWLRQV�EHWZHHQ

:HE�EDVHG�DSSOLFDWLRQV�DQG�5����QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 3URWHFWLRQ�DW�QHWZRUN�FRPPXQLFDWLRQ�OHYHO��QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 'DWD�SURWHFWLRQ�DW�GDWDEDVH�OHYHO��QRW�GLVFXVVHG�LQ�WKH�JXLGH�

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Authorizations Made Easy1–4

7KH�$XWKRUL]DWLRQ�&RQFHSW

7KH�FRQFHSW�RI�DXWKRUL]DWLRQV�LQ�WKH�5���6\VWHP�LQFOXGHV�WKH�IROORZLQJ�< 3URILOH�*HQHUDWRU< /RFNLQJ�DQG�XQORFNLQJ�WUDQVDFWLRQV< /RFNHG�UHFRUGV< 6WUXFWXUDO�DXWKRUL]DWLRQV��1RW�GLVFXVVHG�LQ�WKLV�YHUVLRQ��VHH�$XWKRUL]DWLRQV�0DGH�(DV\

JXLGHERRN�����$�%�IRU�LQIRUPDWLRQ��< 'DWD�HQFU\SWLRQ��QRW�GLVFXVVHG�LQ�WKLV�ERRN�< /RFNLQJ�V\VWHP�IRU�FKDQJHV

7KH�5���DXWKRUL]DWLRQ�FRQFHSW�SHUPLWV�WKH�DVVLJQPHQW�RI�JHQHUDO�DQG�RU�ILQHO\�GHWDLOHGXVHU�DXWKRUL]DWLRQV��7KHVH�DVVLJQPHQWV�FDQ�UHDFK�GRZQ�WR�WKH�WUDQVDFWLRQ��ILHOG��DQG�ILHOGYDOXH�OHYHO��7KHVH�DXWKRUL]DWLRQV�DUH�FHQWUDOO\�DGPLQLVWHUHG�LQ�XVHU�PDVWHU�UHFRUGV�DQG�PRVWDOORZ�WKH�KDQGOLQJ�RI�FHUWDLQ�5���FRPSRQHQWV�DSSOLFDEOH�WR�VSHFLILF�RSHUDWLRQV��$FWLRQV�E\�DXVHU�PD\�UHTXLUH�VHYHUDO�DXWKRUL]DWLRQV��)RU�H[DPSOH��WR�FKDQJH�D�PDWHULDO�PDVWHU�UHFRUG�DXWKRUL]DWLRQV�DUH�UHTXLUHG�IRU�WKH�< 7UDQVDFWLRQ�´FKDQJHµ< 6SHFLILF�PDWHULDO< *HQHUDO�DXWKRUL]DWLRQ�WR�ZRUN�ZLWKLQ�WKH�FRPSDQ\�FRGH

7KH�UHVXOWLQJ�UHODWLRQVKLSV�FDQ�EHFRPH�YHU\�FRPSOH[��7R�PHHW�WKHVH�UHTXLUHPHQWV��WKH�5��DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�LPSOHPHQWHG�DV�D�IRUP�RI�SVHXGR�REMHFW�RULHQWHG�FRQFHSWZLWK�FRPSOHWH�DXWKRUL]DWLRQ�REMHFWV��(DFK�DXWKRUL]DWLRQ�REMHFW�LV�D�FRPELQDWLRQ�RIDXWKRUL]DWLRQ�ILHOGV��$Q�DXWKRUL]DWLRQ�DOZD\V�UHIHUV�WR�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�FDQFRQWDLQ�LQWHUYDOV�IRU�WKH�ILHOG�YDOXHV��$XWKRUL]DWLRQ�FKHFNV�SURWHFW�WKH�IXQFWLRQV�RU�REMHFWV\RX�FKRRVH��6WDQGDUG�GHOLYHUHG�5���KDV�DXWKRUL]DWLRQ�FKHFNV�HPEHGGHG�LQ�WKH�SURJUDPORJLF��3URJUDPPHUV�KDYH�WR�GHFLGH�ZKLFK�DVSHFWV�RI�WKHLU�SURJUDPPHG�IXQFWLRQDOLW\�VKRXOGEH�FKHFNHG�DQG�KRZ�WKH�FKHFN�VKRXOG�EH�FRQGXFWHG�

$XWKRUL]DWLRQ�DGPLQLVWUDWRUV�FUHDWH�DXWKRUL]DWLRQV�WKDW�DUH�DVVLJQHG�WR�XVHUV�LQ�FROOHFWLRQVFDOOHG�SURILOHV��7KH�3URILOH�*HQHUDWRU��3*��XVXDOO\�JHQHUDWHV�DXWKRUL]DWLRQV�DQGDXWKRUL]DWLRQ�SURILOHV��DOWKRXJK�DXWKRUL]DWLRQV�FDQ�DOVR�EH�PDQXDOO\�LQVHUWHG�LQWR�D�SURILOH�

7KH�IROORZLQJ�JUDSKLF�VKRZV�WKH�DXWKRUL]DWLRQ�FRPSRQHQWV�DQG�H[SODLQV�WKHLU�UHODWLRQVKLS�

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Release 4.6A/B1–5

)�,

��/RQJ�WH[W��7HFKQ��QDPH

��)LHOG��)LHOG�YDOXH

*HQHUDWHG�IURP�3*

-RKQ�([DPSOH�6$3�����

$P\�$Q\ZKHUH�6$3�����

+�5

2EMHFW�&ODVV $XWKRUL]DWLRQ2EMHFW

$XWKRUL]DWLRQ 3URILOH 8VHU

��/RQJ�WH[W��7HFKQ��QDPH

��/RQJ�WH[W��7HFKQ��QDPH

*HQHUDWHG�IURP�3*

��)LHOG��)LHOG�YDOXH

��)LHOG��)LHOG�YDOXH

��)LHOG��)LHOG�YDOXH

6$3�$XWKRUL]DWLRQ�&RQFHSW

$XWKRUL]DWLRQ�2EMHFW

$V�VKRZQ�LQ�WKH�JUDSKLF�´6$3�$XWKRUL]DWLRQ�&RQFHSWµ�DERYH��REMHFWV�DOORZ�FRPSOH[�XVHUDXWKRUL]DWLRQ�FKHFNV��$Q�DXWKRUL]DWLRQ�REMHFW�ZRUNV�DV�D�WHPSODWH�IRU�D�WR�EH�GHILQHGDXWKRUL]DWLRQ�DQG�FRQWDLQV�D�PD[LPXP�RI�WHQ�ILHOGV�SHU�REMHFW��8VHUV�PD\�RQO\�FRQGXFW�DQDFWLYLW\�LI�WKH\�VDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKH�DXWKRUL]DWLRQ�GHILQHG�RQ�DVSHFLILF�DXWKRUL]DWLRQ�REMHFW�

$XWKRUL]DWLRQ�REMHFWV�DUH�JURXSHG�LQ�DQ�REMHFW�FODVV��VXFK�DV�)LQDQFLDO�$FFRXQWLQJ�RU+XPDQ�5HVRXUFHV��$XWKRUL]DWLRQ�REMHFWV�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→$%$3�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�2EMHFWV��%HFDXVHDXWKRUL]DWLRQ�REMHFWV�DUH�FOLHQW�LQGHSHQGHQW�DQG�GHILQHG�LQ�WKH�$%$3�:RUNEHQFK�GHYHORSHUV�DQG�SURJUDPPHUV�DUH�JHQHUDOO\�UHVSRQVLEOH�IRU�FUHDWLQJ�QHZ�DXWKRUL]DWLRQREMHFWV�

&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQG�ZDQW�WR�LQFOXGH$87+25,7<�&+(&.�FDOOV�RU�QHZ�DXWKRUL]DWLRQ�REMHFWV��<RX�FDQ�RQO\�FKDQJH�RU�GHOHWHDXWKRUL]DWLRQ�REMHFWV�DGGHG�E\�\RXU�FRPSDQ\��5���DXWKRUL]DWLRQ�REMHFWV�PD\�QRW�EH�GHOHWHGRU�FKDQJHG��7R�FKDQJH�DQ�REMHFW��\RX�PXVW�ILUVW�GHOHWH�DOO�DXWKRUL]DWLRQV�ZLWK�ZKLFK�LW�LVDVVRFLDWHG�

$Q�$87+25,7<�&+(&.�LV�DQ�$%$3�FRPPDQG�

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Authorizations Made Easy1–6

$XWKRUL]DWLRQ�2EMHFW�)LHOGV

$XWKRUL]DWLRQ�ILHOGV�IRU�DQ�REMHFW�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→�$%$3'HYHORSPHQW�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�)LHOGV�

7KH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�DUH�OLQNHG�WR�GDWD�HOHPHQWV�LQ�WKH�6$3�$%$3'LFWLRQDU\��7KH�SHUPLVVLEOH�YDOXHV�FRQVWLWXWH�DQ�DXWKRUL]DWLRQ��:KHQ�DQ�DXWKRUL]DWLRQFKHFN�WDNHV�SODFH��WKH�V\VWHP�FKHFNV�WKH�YDOXHV�\RX�KDYH�VSHFLILHG�LQ�DQ�DXWKRUL]DWLRQDJDLQVW�WKRVH�UHTXLUHG�WR�FDUU\�RXW�WKH�DFWLRQ��8VHUV�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH\VDWLVI\�WKH�FRQGLWLRQV�IRU�HYHU\�ILHOG�GHILQHG�IRU�D�VSHFLILF�DXWKRUL]DWLRQ�REMHFW�

8VLQJ�WKH�DXWKRUL]DWLRQ�PDLQWHQDQFH�IXQFWLRQV��GHILQH�DOO�DXWKRUL]DWLRQ�ILHOGV�LQ�WKH�V\VWHPGHYHORSPHQW�HQYLURQPHQW��&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQGWKH�QHZ�V\VWHP�HOHPHQWV�DUH�VXEMHFWHG�WR�DXWKRUL]DWLRQ�FKHFNV�

$XWKRUL]DWLRQV

$Q�DXWKRUL]DWLRQ�DOORZV�\RX�WR�FDUU\�RXW�DQ�5���WDVN�EDVHG�RQ�D�VHW�RI�ILHOG�YDOXHV�LQ�DQDXWKRUL]DWLRQ�REMHFW��(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�H[DFWO\�RQH�DXWKRUL]DWLRQ�REMHFW�DQGGHILQHV�WKH�SHUPLWWHG�YDOXH�UDQJH�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�RI�WKLV�DXWKRUL]DWLRQ�REMHFW�$XWKRUL]DWLRQV�DUH�XVHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�DV�SURILOHV�

%\�WKHPVHOYHV��DXWKRUL]DWLRQV�GR�QRW�H[LVW��7KH\�RQO\�KDYH�PHDQLQJ�LQVLGH�D�SURILOH�

)LHOG 9DOXH

&XVWRPHU�W\SH��&8677<3(�

$FWLYLW\��$&797� ��

([SODQDWLRQ�� � �DOO�SRVVLEOH�YDOXHV����� �GLVSOD\

$XWKRUL]DWLRQV�DUH�XVHG�WR�VSHFLI\�SHUPLWWHG�YDOXHV�IRU�WKH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�7KHUH�PD\�EH�RQH�RU�PRUH�YDOXHV�IRU�HDFK�ILHOG��$XWKRUL]DWLRQV�DOORZ�\RX�WR�GHWHUPLQH�WKHQXPEHU�RI�VSHFLILF�YDOXHV�RU�YDOXH�UDQJHV�IRU�D�ILHOG��$OO�YDOXHV�RU�HPSW\�ILHOGV�FDQ�EHSHUPLVVLEOH�YDOXHV��&KDQJHV�DIIHFW�DOO�XVHUV�ZKRVH�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKDWDXWKRUL]DWLRQ��7KH�5���DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�PDLQWDLQ�DXWKRUL]DWLRQVDXWRPDWLFDOO\��XVLQJ�WKH�3*��RU�PDQXDOO\��2QFH�WKH�DXWKRUL]DWLRQ�LV�DFWLYDWHG��FKDQJHV�DIIHFWDOO�XVHUV�ZKLFK�FRQWDLQ�WKH�SURILOH�ZLWK�WKH�DFWLYDWHG�DXWKRUL]DWLRQ�

2QFH�JHQHUDWHG��DXWKRUL]DWLRQV�DQG�SURILOHV�FUHDWHG�ZLWK�WKH�3*�DUH�DXWRPDWLFDOO\DFWLYDWHG��,I�\RX�PDQXDOO\�FUHDWH�DQG�PDLQWDLQ�DXWKRUL]DWLRQV�DQG�SURILOHV��\RX�PXVW�DOVRPDQXDOO\�DFWLYDWH�WKHP��*HQHUDWHG�SURILOHV�DQG�DXWKRUL]DWLRQV�FDQQRW�EH�PDLQWDLQHGPDQXDOO\�ZLWK�WKH�FRQYHQWLRQDO�PDLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68����+RZHYHU��ZHGR�QRW�UHFRPPHQG�WKH�XVH�RI�WKHVH�WUDQVDFWLRQV�IRU�SURILOH�DQG�XVHU�DGPLQLVWUDWLRQDQ\PRUH��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Release 4.6A/B1–7

$XWKRUL]DWLRQ�3URILOHV

8VHU�DXWKRUL]DWLRQV�DUH�QRW�GLUHFWO\�DVVLJQHG�ZLWK�WKH�3*�WR�WKH�XVHU�PDVWHU�UHFRUGV�,QVWHDG��WKHVH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�DV�DXWKRUL]DWLRQ�SURILOHV��7KH�DXWKRUL]DWLRQDGPLQLVWUDWRU�FDQ�FUHDWH�DXWKRUL]DWLRQ�SURILOHV�PDQXDOO\�RU�DXWRPDWLFDOO\�

&KDQJHV�DIIHFW�DOO�XVHUV�WR�ZKRP�WKLV�SURILOH�LV�DVVLJQHG�DQG�WDNH�HIIHFW�RQO\�ZKHQ�WKH�XVHUORJV�RQ��8VHUV�ZKR�DUH�ORJJHG�RQ�ZKHQ�WKH�FKDQJH�WDNHV�SODFH�UHPDLQ�XQDIIHFWHG�GXULQJWKHLU�FXUUHQW�VHVVLRQ��EXW�ZKHQ�WKH\�ORJ�RQ�DJDLQ��WKHLU�SURILOH�FKDQJHV�DFFRUGLQJO\��$�XVHU·VDXWKRUL]DWLRQV�DUH�ORDGHG�LQWR�WKH�XVHU�EXIIHU�RQO\�ZKHQ�WKH\�ORJ�RQ�

<RX�FDQQRW�XVH�WKH�DXWKRUL]DWLRQ�SURILOH�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�PDQXDOO\PDQLSXODWH�WKH�3*�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV��$OWKRXJK�WHFKQLFDOO\�SRVVLEOH��QHYHUFUHDWH�D�SURILOH�WKDW�FRQWDLQV�ERWK�PDQXDOO\�DQG�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV�RUSURILOHV��:H�QR�ORQJHU�UHFRPPHQG�WKH�XVH�RI�WUDQVDFWLRQ�68���IRU�SURILOH�DQG�XVHUDGPLQLVWUDWLRQ��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�

1DPLQJ�&RQYHQWLRQ�IRU�$XWKRUL]DWLRQ�3URILOHV

$XWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�D�7�PD\�FRQWDLQ�FULWLFDO��6B86(5 ��DXWKRUL]DWLRQREMHFWV��$OVR��XVH�WKH�3*�WR�H[FOXGH�IXUWKHU�DXWKRUL]DWLRQ�REMHFWV��IRU�H[DPSOH��+5�GDWD�IURP�WKH�SURILOH�

1RWH�WKDW�ZH�DUH�WDONLQJ�DERXW�DXWKRUL]DWLRQ�SURILOHV�QRW�DFWLYLW\�JURXSV�

:KHQ�\RX�ILUVW�VDYH�WKH�DXWKRUL]DWLRQ�SURILOHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH�7KH�V\VWHP�SURSRVHV�D�QDPH�IRU�WKH�SURILOH��KRZHYHU��RQO\�WKH�ILUVW����FKDUDFWHUV��WKHSURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHV�JHQHUDWHG�GHSHQGV�RQ�WKHQXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXP�RI�����DXWKRUL]DWLRQV�ILW�LQWRD�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ�����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,WKDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKH�SURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV��SRVLWLRQV���DQG�����DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�SURILOHV�DQG�WKRVH�SURILOHV�VXSSOLHG�E\�6$3�\RX�VKRXOG�QRW�XVH�DQ\�QDPH�WKDW�KDV�DQ�XQGHUVFRUH�LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QRRWKHU�UHVWULFWLRQV�RQ�WKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�WR�QRWH���������7KHUHIRUH��LI\RXU�FRPSDQ\�KDV�LWV�RZQ�QDPLQJ�FRQYHQWLRQV��\RX�DUH�DOORZHG�WR�RYHUZULWH�WKHSURSRVHG�QDPH�

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��:KHQ�PRUH�WKDQRQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW��WKH�ODVW�WZR�SODFHV�DUH�XVHG�DV�D�FRXQWHU��%DVHGRQ�WKH�QDPH�IRU�WKH�DXWKRUL]DWLRQ�SURILOH��WKH�WHFKQLFDO�QDPHV�IRU�WKH�DXWKRUL]DWLRQV�WR�EHFUHDWHG�VWDUW�ZLWK�D�7�DQG�FRPSULVH�WKH�LQWHUQDO�QXPEHU�RI�WKH�DFWLYLW\�JURXS�DQG�WZR�HQGGLJLWV�LQ�WKH�UDQJH���²�����7������������LV�D�VDPSOH�DXWKRUL]DWLRQ�QDPH��

8VHU�0DVWHU�5HFRUGV

0DVWHU�UHFRUGV�HQDEOH�WKH�XVHU�WR�ORJ�RQ�WR�WKH�5���6\VWHP�DQG�DOORZ�OLPLWHG�DFFHVV�WR�WKHIXQFWLRQV�DQG�REMHFWV��7KH�XVHU�DGPLQLVWUDWRU�PDLQWDLQV�XVHU�PDVWHU�UHFRUGV�E\�FKRRVLQJ7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV�

Chapter 1: R/3 System Security and the Authorization Concept

SAP* and DDIC Users

Authorizations Made Easy1–8

$XWKRUL]DWLRQ�&KHFNV

7R�FRQGXFW�DQ�DXWKRUL]DWLRQ�FKHFN��WKLV�FKHFN�PXVW�EH�LQFOXGHG�LQ�WKH�WUDQVDFWLRQ·V�VRXUFHFRGH��'XULQJ�WKH�FKHFN��WKH�V\VWHP�FRPSDUHV�DXWKRUL]DWLRQ�SURILOH�YDOXHV��DVVLJQHG�E\�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU��WR�WKH�YDOXHV�QHHGHG�WR�FDUU\�RXW�D�SURJUDP�VSHFLILHG�DFWLRQ��$XVHU�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH�DXWKRUL]DWLRQ�FKHFN�LV�VXFFHVVIXO�IRU�HYHU\�ILHOG�LQWKH�DXWKRUL]DWLRQ�REMHFW�

$XWKRUL]DWLRQ�FKHFNV�DUH�WULJJHUHG�E\�WKH�$%$3�$87+25,7<�&+(&.�VWDWHPHQW��7KHSURJUDPPHU�VSHFLILHV�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�UHTXLUHG�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQILHOG��7KH�$87+25,7<�&+(&.�WKHQ�YHULILHV�LI�D�XVHU�KDV�DXWKRUL]DWLRQ�DQG�LI�WKLVDXWKRUL]DWLRQ�LV�IURP�WKH�XVHU�PDVWHU�UHFRUG��7KH�FKHFN�LV�VXFFHVVIXO�LI�DQ�DXWKRUL]DWLRQ�LVIRXQG�WKDW�FRQWDLQV�WKH�YDOXHV�VSHFLILHG�LQ�WKH�$87+25,7<�&+(&.�

:KHQ�5���WUDQVDFWLRQV�DUH�H[HFXWHG��VLQFH�WKH�WUDQVDFWLRQ�FDOOV�RWKHU�ZRUN�DUHDV�LQ�WKHEDFNJURXQG��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�RIWHQ�FKHFNHG��)RU�WKHVH�FKHFNV�WR�EHVXFFHVVIXO��WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��$XWKRUL]DWLRQ�FKHFNV�FDQ�EHGLVDEOHG�E\�VHWWLQJ�FKHFN�LQGLFDWRUV�LQ�WUDQVDFWLRQ�68���RU�E\�VZLWFKLQJ�RII�REMHFWV�JOREDOO\�

$FWLYDWLQJ�DQG�'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�LQ�7UDQVDFWLRQV

,W�LV�SRVVLEOH�WKDW�XVHUV�UHFHLYH�PRUH�DXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHGPDLQWHQDQFH�ORDG��$XWKRUL]DWLRQ�FKHFNV�DUH�FRQGXFWHG�ZKHUHYHU�WKH\�DUH�ZULWWHQ�LQWR�DWUDQVDFWLRQ·V�VRXUFH�FRGH��2QO\�E\�XVLQJ�WKH�3*�FDQ�FKHFN�LQGLFDWRUV�EH�VHW�WR�H[FOXGH�< &HUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRULW\�FKHFNV< 6SHFLILF�DXWKRUL]DWLRQ�FKHFNV�LQ�VSHFLILF�WUDQVDFWLRQV< $Q�DXWKRUL]DWLRQ�REMHFW�IURP�EHLQJ�FKHFNHG

$OO�RI�WKHVH�DGMXVWPHQWV�DUH�SRVVLEOH�ZLWKRXW�DOWHULQJ�WKH�SURJUDP�FRGH��3ULRU�WRDXWRPDWLFDOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOH��XVH�WKH�FKHFN�LQGLFDWRUV�WR�FRQWURO�ZKLFKREMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�DUH�GLVSOD\HG��6$3�GHOLYHUV�D�GHIDXOW�FKHFNLQGLFDWRU�VHWWLQJ�ZLWK�5����)RU�PRUH�LQIRUPDWLRQ�UHIHU�WR�FKDSWHU�����7LSV�DQG7URXEOHVKRRWLQJ��WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�

6$3 �DQG�'',&�8VHUV

'XULQJ�\RXU�5���LQVWDOODWLRQ��FOLHQWV�����������DQG�����DUH�FUHDWHG��,Q�FOLHQWV�����DQG�����WZR�VSHFLDO�XVHUV�DUH�GHILQHG��EXW�QR�VSHFLDO�XVHU�LV�FUHDWHG�LQ�FOLHQW������6LQFH�WKHVH�XVHUVKDYH�VWDQGDUG�QDPHV�DQG�SDVVZRUGV��\RX�QHHG�WR�VHFXUH�WKHVH�XVHUV�IURP�XQDXWKRUL]HGXVDJH��WKH�(DUO\:DWFK�DQG�&3,&�XVHUV�DUH�QRW�FRYHUHG�LQ�WKLV�ERRN��

7KH�WZR�VSHFLDO�5���XVHUV�DUH�< 6$3

'HILQHG�DV�WKH�VWDQGDUG�5���VXSHUXVHU��6$3 �GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG�5DWKHU��LW�

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Release 4.6A/B1–9

� ,V�GHILQHG�LQ�WKH�V\VWHP�FRGH� +DV�D�GHIDXOW�SDVVZRUG��PASS�� +DV�XQOLPLWHG�V\VWHP�DFFHVV�DXWKRUL]DWLRQV

:KHQ�\RX�LQVWDOO�5����D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�LQ�FOLHQWV�����DQG�����ZLWK�WKHLQLWLDO�SDVVZRUG�06071992��6$3 �XVHU�PDVWHU�UHFRUG�GHDFWLYDWHV�6$3 ªV�VSHFLDOSURSHUWLHV��7R�SUHYHQW�6$3 �PLVXVH��FKDQJH�WKH�SDVVZRUG��:H�UHFRPPHQG��KRZHYHU�WKDW�\RX�GHDFWLYDWH�6$3 �DQG�GHILQH�\RXU�RZQ�VXSHUXVHU�

< '',&

7KLV�XVHU�LV�WKH�PDLQWHQDQFH�XVHU�IRU�WKH�$%$3�'LFWLRQDU\�DQG�VRIWZDUH�ORJLVWLFV��7KHXVHU�PDVWHU�UHFRUG�IRU�'',&�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����DQG�KDV�WKHGHIDXOW�SDVVZRUG�19920706��6\VWHP�FRGH�WHVWLQJ�DOORZV�'',&�VSHFLDO�SULYLOHJHV�IRUFHUWDLQ�RSHUDWLRQV��)RU�H[DPSOH��'',&�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�GXULQJ�DQXSJUDGH��7R�SUHYHQW�'',&�PLVXVH��FKDQJH�WKH�SDVVZRUG�

8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�6$3 �DQG�'',&�SDVVZRUGV�KDYHEHHQ�FKDQJHG��7KLV�UHSRUW�LV�UHVWULFWHG�WR�XVHUV�ZKR�EHORQJ�WR�WKH�XVHU�JURXS�683(5�ZLWKDFWLYLW\����DQG�FOLHQW�DGPLQLVWUDWLRQ�

:KDW�,V�WKH�3URILOH�*HQHUDWRU"

6$3·V�3URILOH�*HQHUDWRU��3*��KHOSV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FUHDWH��JHQHUDWH��DQGDVVLJQ�DXWKRUL]DWLRQ�SURILOHV��)LUVW�UHOHDVHG�ZLWK����*��WKH�3*�DFFHOHUDWHV�5��LPSOHPHQWDWLRQ�E\�VLPSOLI\LQJ�WKH�WDVN�RI�VHWWLQJ�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KHDGPLQLVWUDWRU�RQO\�QHHGV�WR�FRQILJXUH�WKH�FXVWRPHU�VSHFLILF�VHWWLQJV��WKH�3*�PDQDJHV�RWKHUWDVNV��VXFK�DV�VHOHFWLQJ�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�FRQVLGHUDWLRQ��7KH�3*�LV�IXOO\LQWHJUDWHG�ZLWK�5���DQG�LV�DYDLODEOH�RQ�DOO�5���VXSSRUWHG�SODWIRUPV��7KH�3*�UHSUHVHQWV�\HWDQRWKHU�LPSURYHPHQW�RI�6$3·V�WRRO�EDVHG�VXSSRUW�DQG�D�UHGXFWLRQ�LQ�5���LPSOHPHQWDWLRQWLPH�

7KH�3*�LV�DQ�DSSURDFK�WR�GHILQLQJ�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KH�DGPLQLVWUDWRU�QRORQJHU�XVHV�WKH�DXWKRUL]DWLRQ�REMHFWV�WR�GHILQH�WKH�DXWKRUL]DWLRQV�IRU�YDULRXV�XVHU�JURXSV�LQVWHDG��DXWKRUL]DWLRQ�SURILOHV�DUH�EXLOW�DURXQG�WKH�IXQFWLRQV�WR�EH�SHUIRUPHG�LQ�5����%DVHGRQ�WKH�IXQFWLRQV�VHOHFWHG��WKH�3*�SLFNV�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�DQG�JURXSV�WKHPLQ�D�QHZ�DXWKRUL]DWLRQ�SURILOH�

8VLQJ�IXQFWLRQV�WR�GHILQH�DXWKRUL]DWLRQ�SURILOHV�< 6SHHGV�XS�WKH�SURFHVV< 'HILQHV�DXWKRUL]DWLRQ�SURILOHV< 6LPSOLILHV�DGPLQLVWUDWRU�XVHU�FRPPXQLFDWLRQ��DOORZLQJ�ERWK�WKH�DGPLQLVWUDWRU�DQG

XVHUV�WR�XVH�WKH�VDPH�5���IXQFWLRQ�WHUPLQRORJ\

7R�XVH�WKH�3*��\RX�ILUVW�KDYH�WR�VHW�LW�XS��7KH�RQH�WLPH�VHW�XS�LQYROYHV�WKH�IROORZLQJ�VWHSV��� &KHFN�LI�WKH�6$3�5���6\VWHP�SDUDPHWHU�LV�VHW�FRUUHFWO\�WR�DFWLYH�

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Authorizations Made Easy1–10

�� 8VH�68���WR�LQLWLDOL]H�WKH�WDEOHV�862%7B&�DQG�862%;B&��DQG�WKHQ�FXVWRPL]H�WKHP�LIGHVLUHG��

)RU�GHWDLOHG�LQIRUPDWLRQ��SOHDVH�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�

2QFH�WKH�3*�LV�VHW�XS��\RX�FDQ�ZRUN�ZLWK�LW��%HIRUH�ZRUNLQJ�ZLWK�ZLWK�WKH�3*��LW�LV�XVHIXO�WRXQGHUVWDQG�LWV�FRPSRQHQWV�

&RPSRQHQWV�RI�WKH�3URILOH�*HQHUDWRU

7KH�3*�KDV�WKH�IROORZLQJ�FRPSRQHQWV�

$FWLYLW\�*URXSV

$Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�5���WUDQVDFWLRQV��DXWKRUL]DWLRQV��DQG�DGGLWLRQDO�REMHFWV�<RX�FDQ�DVVLJQ�DQ�DFWLYLW\�JURXS�WR�DV�PDQ\�XVHUV�DV�\RX�ZDQW��<RX�FDQ�FUHDWH��GLVSOD\�FKDQJH��FRS\��DQG�WUDQVSRUW�DFWLYLW\�JURXSV�

&RPSRVLWH�$FWLYLW\�*URXSV

&RPSRVLWH�DFWLYLW\�JURXSV�DUH�PDGH�XS�RI�D�FROOHFWLRQ�RI�DFWLYLW\�JURXSV��7KH�XVHUV�DVVLJQHGWR�D�FRPSRVLWH�DFWLYLW\�JURXS�DUH�DXWRPDWLFDOO\�DGGHG�WR�WKH�DFWLYLW\�JURXSV�GXULQJ�DFRPSDULVRQ��&RPSRVLWH�DFWLYLW\�JURXSV�WKHPVHOYHV�GR�QRW�FRQWDLQ�DQ\�DXWKRUL]DWLRQ�GDWD�,QVWHDG�RI�KDYLQJ�WR�DVVLJQ�HDFK�XVHU�WR�HDFK�DFWLYLW\�JURXS��\RX�FDQ�VHW�XS�D�FRPSRVLWHDFWLYLW\�JURXS�DQG�WKHQ�DVVLJQ�WKH�XVHUV�WR�WKLV�JURXS�

'HULYHG�$FWLYLW\�*URXSV

<RX�FDQ�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH�ZKHQ�FUHDWLQJ�D�QHZ�RQH��7KH�V\VWHPWUDQVIHUV�WKH�WUDQVDFWLRQV�LQ�RQH�DFWLYLW\�JURXS�WR�D�QHZ�DFWLYLW\�JURXS³RQH�WKDW�UHPDLQVGHSHQGHQW�RQ�WKH�ILUVW��<RX�FDQ�GLVSOD\�WKH�KLHUDUFK\�RI�WKH�DFWLYLW\�JURXSV�WKDW�LQKHULWWUDQVDFWLRQV�IURP�HDFK�RWKHU�E\�FKRRVLQJ�$FWLYLW\�JURXS�→�:KHUH�XVHG�OLVW�

:LWK�DQ�DFWLYLW\�JURXS�GHULYHG�IURP�D�GLIIHUHQW�DFWLYLW\�JURXS��\RX�FDQQRW�HQWHUWUDQVDFWLRQV�GLUHFWO\��<RX�FDQQRW�UHVHW�WKH�GHILQLWLRQ�RI�WKH�LQLWLDO�DFWLYLW\�JURXS�IURP�ZKLFKWKH�GHULYHG�DFWLYLW\�JURXS�LQKHULWHG�LWV�WUDQVDFWLRQV��3DVVLQJ�RQ�WUDQVDFWLRQV�RQO\�UHIHUV�WRWKH�PHQX�VHOHFWLRQ�DQG�QRW�WR�WKH�DXWKRUL]DWLRQV��<RX�PXVW�PDLQWDLQ�DXWKRUL]DWLRQVVHSDUDWHO\�LQ�HDFK�DFWLYLW\�JURXS��WKHVH�DUH�QRW�SDVVHG�RQ��,W�LV�DOVR�SRVVLEOH�WR�WUDQVIHU�WKHDXWKRUL]DWLRQ�GDWD�RI�WKH�SUHYLRXV�DFWLYLW\�JURXS�WR�WKH�GHULYHG�DFWLYLW\�JURXS�DV�D�FRS\�

8VHU�$VVLJQPHQW

8VHUV�FDQ�EH�DVVLJQHG�WR�VLQJOH�DFWLYLW\�JURXSV�RU�WR�FRPSRVLWH�DFWLYLW\�JURXSV�ZKLFK�PRVWO\UHSUHVHQW�MRE�UROHV��8VHUV�WKDW�\RX�DVVLJQ�WR�DQ�DFWLYLW\�JURXS�PD\�H[HFXWH�WKH�WUDQVDFWLRQV�UHSRUWV��RU�DQ\�RWKHU�WDVN�LQ�WKH�DFWLYLW\�JURXS�ZLWK�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQV�

*HQHUDWLQJ�WKH�3URILOHV

7KH�DGPLQLVWUDWRU�FKRRVHV�WKH�VSHFLILF�PHQX�SDWKV�DQG�IXQFWLRQV�IRU�HDFK�XVHU�JURXS��7KLVVHOHFWLRQ�GHWHUPLQHV�WKH�5���DFWLYLWLHV�WKDW�XVHUV�LQ�HDFK�XVHU�JURXS�DUH�DXWKRUL]HG�WRSHUIRUP�

8VLQJ�WKH�VHOHFWHG�WUDQVDFWLRQ�FRGHV��WKH�3*�GHWHUPLQHV�WKH�DIIHFWHG�DXWKRUL]DWLRQ�REMHFWV�7R�VLPSOLI\�WKH�FUHDWLRQ�RI�VXEVHTXHQW�LQGLYLGXDO�DXWKRUL]DWLRQ�SURILOHV��5���FRQWDLQV

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Release 4.6A/B1–11

GHIDXOW�YDOXHV�IRU�PDQ\�DXWKRUL]DWLRQ�ILHOGV�LQ�VSHFLILF�DXWKRUL]DWLRQ�REMHFWV��)RU�H[DPSOH�RQH�SRVVLEOH�DFFHVV�UHVWULFWLRQ�PLJKW�EH�WKH�GHIDXOW�YDOXH�'LVSOD\��OLPLWLQJ�WKH�XVHU�WRGLVSOD\�PRGH�RQ�FHUWDLQ�WUDQVDFWLRQV�

$GGLWLRQDOO\��WKH�3*�LGHQWLILHV�WKH�RUJDQL]DWLRQDO�OHYHOV�WKDW�SOD\�D�UROH�LQ�WKH�H[WUDFWHGDXWKRUL]DWLRQ�REMHFWV�DQG�FOHDUO\�GLVSOD\V�WKHVH�OHYHOV�IRU�WKH�DGPLQLVWUDWRU��7KHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�PD\�KDYH�WR�LQWHUYHQH�DQG�PDQXDOO\�GHILQH�WKH�OHYHOV�WR�ZKLFKWKH�XVHUV�QHHG�DFFHVV��IRU�H[DPSOH��WKH�FRPSDQ\�FRGH��

7KH�3*�WKHQ�SODFHV�WKH�VSHFLILHG�OHYHOV�LQ�WKH�DXWKRUL]DWLRQ�REMHFWV��$W�WKLV�SRLQW��D�ORW�RIDXWKRUL]DWLRQ�REMHFW�ILHOGV�IRU�WKH�QHZ�DXWKRUL]DWLRQ�SURILOH�KDYH�EHHQ�ILOOHG��KRZHYHU�WKHUHDUH�VWLOO�ILHOGV�WKDW�QHHG�WR�EH�PDLQWDLQHG��7KH�DXWKRUL]DWLRQ�REMHFWV�DUH�GLVSOD\HGKLHUDUFKLFDOO\�LQ�D�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�DGPLQLVWUDWRU�PD\�DGMXVW�WKHUHPDLQLQJ�YDOXHV��VXFK�DV�PDWHULDO�W\SH��RUGHU�W\SH��HWF�

:LWKLQ�WKLV�PDLQWHQDQFH�WUDQVDFWLRQ��WKH�DGPLQLVWUDWRU�FDQ�HDVLO\�QDYLJDWH�IURP�WKHRYHUYLHZ�VFUHHQ�WR�WKH�ORZHVW�GLVSOD\�OHYHO��WKH�DXWKRUL]DWLRQV�DQG�WKHLU�ILHOGV��DQG�GLUHFWO\DVVLJQ�WKH�YDOXHV��*HQHUDOO\��SHUPLVVLEOH�YDOXHV�FDQ�DOVR�EH�DVVLJQHG�DW�KLJKHU�OHYHOV��7KHIROORZLQJ�XWLOLWLHV�WR�VSHFLI\�WKH�YDOXHV�DUH�DYDLODEOH�DW�HYHU\�OHYHO�RI�WKH�KLHUDUFKLFDOGLVSOD\�< 9DOXH�VHOHFWLRQ�IURP�OLVWV< &KHFNER[HV�IRU�VLPSOH�DFWLYLW\�VHOHFWLRQ< 'HOHWH�DQG�FRS\�IXQFWLRQV

,I�DGPLQLVWUDWRUV�GHWHUPLQH�WKDW�QR�IXUWKHU�DXWKRUL]DWLRQ�UHVWULFWLRQV�DUH�QHFHVVDU\�RQ�DFHUWDLQ�OHYHO��E\�FKRRVLQJ�D�EXWWRQ��WKH�3*�ILOOV�LQ�WKH�UHPDLQLQJ�YDOXHV�

)LQDOO\��DQRWKHU�PHQX�LWHP�LQ�WKH�V\VWHP�DVVLJQV�WKH�XVHUV�WR�WKH�5���IXQFWLRQV��,Q�WKLVSURFHVV��WKH�3*�DXWRPDWLFDOO\�FRSLHV�DOO�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOHV�WR�WKH�XVHUPDVWHU�UHFRUG��2I�FRXUVH��XVHUV�FDQ�EH�DVVLJQHG�PXOWLSOH�VHOHFWLRQV��ZKLFK�PHDQV�WKDWFHUWDLQ�JHQHUDO�DXWKRUL]DWLRQV�QHHG�WR�EH�PDLQWDLQHG�RQO\�RQFH�DQG�DUH�DYDLODEOH�IRUDVVLJQPHQW�WR�DOO�V\VWHP�XVHUV�

,QWHJUDWLQJ�WKH�3*�LQ�5���DOVR�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�DFFHVV�WKH�GRFXPHQWDWLRQ�RQHYHU\�DXWKRUL]DWLRQ�REMHFW�GLUHFWO\�IURP�WKH�3*��)XUWKHUPRUH��WKH�3*�FDQ�OLVW�DOO�5��IXQFWLRQV�WKDW�FKHFN�D�VSHFLILF�DXWKRUL]DWLRQ�

5HTXLUHPHQWV�DQG�$YDLODELOLW\7KH�3*�UXQV�RQ�DOO�VXSSRUWHG�SODWIRUPV�DQG�KDV�EHHQ�DYDLODEOH�VLQFH�5HOHDVH����*�IRUJHQHUDO�FXVWRPHU�XVH��6WDUWLQJ�ZLWK�5HOHDVH������LW�LV�DOUHDG\�DFWLYDWHG�IRU�XVH�

Chapter 1: R/3 System Security and the Authorization Concept

What Is an Activity Group?

Authorizations Made Easy1–12

:KDW�,V�DQ�$FWLYLW\�*URXS"

7KH�SURFHVV�RI�VHFXULW\�LPSOHPHQWDWLRQ�ZLWK�WKH�3*�LV�EDVHG�RQ�WKH�FUHDWLRQ�RI�DFWLYLW\JURXSV�RU�D�FROOHFWLRQ�RI�OLQNHG�RU�DVVRFLDWHG�DFWLYLWLHV��VXFK�DV�WDVNV��UHSRUWV��DQGWUDQVDFWLRQV��$Q�DFWLYLW\�JURXS�LV�D�´GDWD�FRQWDLQHUµ�IRU�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQSURILOHV�DQG�XVXDOO\�UHSUHVHQWV�D�MRE�UROH�LQ�\RXU�FRPSDQ\���+RZHYHU��FXVWRPHUV�RIWHQGHILQH�DFWLYLW\�JURXSV�VRPHZKDW�GLIIHUHQWO\��$V�VXFK��WKHUH�LV�QR�RQH�FRQFUHWH�GHILQLWLRQ�RIDQ�DFWLYLW\�JURXS��RWKHU�WKDQ�LW�LV�D�GDWD�FRQWDLQHU�IRU�DXWKRUL]DWLRQV��

$FWLYLW\�JURXSV�DUH�GHILQHG�E\�WKH�FXVWRPHU�SHUIRUPLQJ�WKH�LPSOHPHQWDWLRQ�DQG�DOORZV\VWHPDWLF�RUJDQL]DWLRQ�DQG�HIILFLHQW�PDLQWHQDQFH�RI�V\VWHP�DFWLYLWLHV�

7KH�6$3�%XVLQHVV�:RUNIORZ��3HUVRQQHO�3ODQQLQJ�DQG�'HYHORSPHQW�DV�ZHOO�DV�WKH�5HSRUW:ULWHU�DQG�RWKHU�UHSRUWLQJ�WRROV�DUH�WLJKWO\�OLQNHG�ZLWK�WKH�3*��6$3�%XVLQHVV�:RUNIORZLQFOXGHV�ZRUNIORZ�WDVNV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS��8VHUV�DVVLJQHG�ZLWK�DFFHVVWR�D�SDUWLFXODU�DFWLYLW\�JURXS�UHDOO\�FRPH�IURP�WKH�+5�3HUVRQQHO�3ODQQLQJ�DQG'HYHORSPHQW�IXQFWLRQDOLW\��)XUWKHUPRUH��WKH�SODQ�YHUVLRQ�WKDW�LV�XVHG�LQ�+5�3HUVRQQHO3ODQQLQJ�DQG�'HYHORSPHQW�LV�WKH�VDPH�SODQ�YHUVLRQ�XVHG�E\�WKH�3*�DQG�:RUNIORZ�

8VLQJ�DQ�DFWLYLW\�JURXS�DV�DQ�LQIRUPDWLRQ�GDWDEDVH�UHGXFHV�GDWD�HQWU\�WLPH��6HOHFW�WKHFULWHULD��VXFK�DV�DFFHVV�ULJKWV��DQG�GLYLGH�WKH�DFWLYLWLHV�LQWR�DSSURSULDWH�JURXSV��)RU�H[DPSOH�\RX�FRXOG�GHFLGH�WR�JURXS�DFWLYLWLHV�E\�VXEMHFW�PDWWHU��VXFK�DV�SHUVRQQHO��SD\UROO��RUEXGJHWLQJ��2U��\RX�FRXOG�JURXS�DFWLYLWLHV�E\�MRE�FODVVHV��VXFK�DV�WUDQVODWLRQ�DFWLYLWLHV�FRPSXWHU�SURJUDPPHU�DFWLYLWLHV��RU�VHFUHWDULDO�DFWLYLWLHV��<RX�FRXOG�DOVR�VHW�XS�DFRPELQDWLRQ�RI�VXEMHFW�PDWWHU�DQG�MRE�RULHQWHG�DFWLYLW\�JURXSV��$IWHU�VHWWLQJ�XS�DFWLYLW\JURXSV��\RX�FDQ�DVVLJQ�WKHP�WR�YDULRXV�5���REMHFWV�

$FWLYLW\�*URXS�$VVLJQPHQWV

$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�PDQ\�XVHUV��2QH�XVHU�FDQ�DOVR�EH�DVVLJQHG�WR�PDQ\DFWLYLW\�JURXSV�

$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�WKH�IROORZLQJ�W\SHV�RI�XVHUV�

5���ORJLQ�XVHU�,'V

$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�UHFRJQL]HG�E\�WKH�5���6\VWHP�DQG�LV�DOORZHG�WR�ORJ�RQ�)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�RIWKH�%DVLV�FRPSRQHQW�

-REV

$�MRE�UHSUHVHQWV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF��0DQ\�HPSOR\HHV�LQ�\RXU�FRPSDQ\�PD\�KROG�WKHVDPH�MRE�FODVVLILFDWLRQ���)RU�H[DPSOH��WKHUH�PLJKW�EH����SHRSOH�ZKRVH�MRE�LV�DGPLQLVWUDWLYHDVVLVWDQW���3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKDW�MRE��8QOHVV�WKH�DFWLYLW\JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKH�ULJKWV�QHHGHG�WR�ZRUN�ZLWK�6$3RIILFH��EHFDUHIXO�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV�

Chapter 1: R/3 System Security and the Authorization Concept

What Is an Activity Group?

Release 4.6A/B1–13

3RVLWLRQV

$�SRVLWLRQ�UHSUHVHQWV�DQ�HPSOR\HH·V�XQLTXH��LQGLYLGXDO�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWKMREV��<RX�FDQ�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DQ�DOPRVW�FRPSOHWHO\�SRVLWLRQ�RULHQWHGIDVKLRQ��$OO�WKH�DFFHVV�ULJKWV�DUH�WKHQ�OLQNHG�WR�WKH�SRVLWLRQ��VR�LW�GRHV�QRW�PDWWHU�ZKR�ILOOVWKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��DQG�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG��WKHDXWKRUL]DWLRQ�SURILOH�DXWRPDWLFDOO\�FKDQJHV�

2UJDQL]DWLRQDO�XQLWV

2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�DQ\�RUJDQL]DWLRQDO�HQWLW\�WKDW�SHUIRUPV�D�VSHFLILHG�VHW�RIIXQFWLRQV�ZLWKLQ�D�FRPSDQ\��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV�GLYLVLRQV��GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDOVWUXFWXUH�DW�\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSVDPRQJ�WKH�XQLWV��$Q\RQH�ZKR�LV�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWVWKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�RUJDQL]DWLRQDO�XQLW�

([DPSOHV�RI�XQLWV�LQFOXGH�< 6XEVLGLDULHV< 'LYLVLRQV< 'HSDUWPHQWV< *URXSV< 6SHFLDO�SURMHFW�WHDPV

8QOHVV�WKH�DFWLYLW\�JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��EH�FDUHIXO�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�RUJDQL]DWLRQDO�XQLWV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WREH�IDLUO\�VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�LWV�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��:KHQ�H[FHSWLRQV�RFFXU�IRU�MREV�RUSRVLWLRQV��FUHDWH�DGGLWLRQDO�DFWLYLW\�JURXSV�IRU�WKHP��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RUSRVLWLRQ��LW�PD\�EH�EHVW�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�MREV�RU�SRVLWLRQV�FRQFHUQHG��%\FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�EHWZHHQ�WKH�XQLWV��\RXLGHQWLI\�\RXU�FRPSDQ\·V�RUJDQL]DWLRQDO�VWUXFWXUH�

:KDW�,V�D�8VHU�5ROH�7HPSODWH"

8VHU�UROH�WHPSODWHV�DUH�DFWLYLW\�JURXSV�LQ�WKH�VWDQGDUG�5���6\VWHP��GHOLYHUHG�E\�6$3��WKDWDOUHDG\�FRQWDLQ�WUDQVDFWLRQV�DQG�UHSRUWV�IURP�DOO�DSSOLFDWLRQ�DUHDV��7KHVH�XVHU�UROHWHPSODWHV�DUH�UHDG\�WR�XVH��<RX�KDYH�WKH�RSWLRQ�WR�XVH�D�XVHU�UROH�WHPSODWH�DV�LV�RU�FRS\�DQGFKDQJH�LW�WR�\RXU�QHHGV��,I�XVHUV�DUH�DVVLJQHG�WR�D�MRE�UROH�DQG�WKH\�ORJ�RQ�WR�WKH�V\VWHP�WKH\�RQO\�VHH�WKRVH�WDVNV�WKH\�DUH�DOORZHG�WR�SHUIRUP�

Chapter 1: R/3 System Security and the Authorization Concept

R/3 Tools for Security Implementation

Authorizations Made Easy1–14

5���7RROV�IRU�6HFXULW\�,PSOHPHQWDWLRQ

,QIRUPDWLRQ�6RXUFH /RFDWLRQ

2YHUYLHZ�RI�LPSRUWDQW�6$31HW�¥�5��)URQWHQG�QRWHV��IRUPHUO\�266�

$SSHQGL[�$

)UHTXHQWO\�DVNHG�TXHVWLRQV��)$4� $SSHQGL[�%

2YHUYLHZ�RI�V\VWHP�SURILOH�SDUDPHWHUV $SSHQGL[�&

/LEUDU\�2QOLQH�'RFXPHQWDWLRQ &KRRVH�+HOS�→�5���OLEUDU\�→�%DVLV�→�&RPSXWHU�&HQWHU0DQDJHPHQW�6\VWHP�→��8VHUV�DQG�$XWKRUL]DWLRQV

5HOHDVH�,QIRUPDWLRQ &KRRVH�+HOS�→�5HOHDVH�QRWHV�

5���6HFXULW\�*XLGH 1RWH������

5HSRUW�'RFXPHQWDWLRQ 5HSRUW�GRFXPHQWDWLRQ�FDQ�EH�DFFHVVHG�IURP�WKH�VHOHFWLRQVFUHHQ�E\�HLWKHU�FKRRVLQJ�+HOS�→�([WHQGHG�+HOS�RU�6\VWHP�→6HUYLFHV�→�5HSRUWLQJ��HQWHULQJ�WKH�UHSRUW�QDPH��DQG�WKHQVHOHFWLQJ�*RWR�→�'RFXPHQWDWLRQ�

7UDLQLQJ�FRXUVHV 6HH�6$31HW�IRU�FXUUHQW�FRXUVHV��KWWS���ZZZ�VDS�FRP

�*ORVVDU\&KRRVH�+HOS�→�5���OLEUDU\�→�*ORVVDU\�IRU�WKH�HQWLUH�JORVVDU\�RUFKRRVH�+HOS�→�*ORVVDU\�IRU�D�FRQWH[W�VHQVLWLYH�JORVVDU\�

�&RQWH[W�6HQVLWLYH�+HOS0RYH�WKH�FXUVRU�WR�D�ILHOG�RU�WR�D�V\VWHP�PHVVDJH�DQGSUHVV�)��

�.QRZOHGJH�3URGXFWV1RWH������

�$%$3�:RUNEHQFK�'RFXVHW1RWH������

�6$31HW

6$31HW�LV�DQ�LQWHUQHW�VHUYLFH�WKDW�EULQJV�QHZ�LQIRUPDWLRQ�DQGFRPPXQLFDWLRQ�FKDQQHOV�EHWZHHQ�6$3�DQG�LWV�FXVWRPHUV��/RJRQ�E\�HQWHULQJ��KWWS���ZZZ�VDS�FRP��RQ�DQ�LQWHUQHW�EURZVHU�DQGFOLFN�WKH�3DUWQHU�&XVWRPHU�EXWWRQ��&OLFN�)UHTXHQW�XVHUV�DQG�HQWHU\RXU�6$31HW�¥�5���)URQWHQG�QRWH��IRUPHUO\�266��SDVVZRUG�

��6$3�/DEV��6LPSOLILFDWLRQ*URXS

6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�KWWS���ZZZ�VDSODEV�FRP�DXWK�IRUXSGDWHV��EHWD�UHOHDVHV�RI�QHZ�JXLGHERRNV��DGGLWLRQDOLQIRUPDWLRQ��SUHGHILQHG�DFWLYLW\�JURXSV��JXLGHERRNV�IRUSUHYLRXV�UHOHDVHV��HWF�

�$FFHOHUDWHG6$3�5RDGPDS�$6$3�

7KH�$6$3�,PSOHPHQWDWLRQ�5RDGPDS�UHFRPPHQGV�XVLQJ�WKH3*�LQ�LWV�DXWKRUL]DWLRQ�GHVLJQ�SURSRVDO��<RX�FDQ�DOVR�ILQG�OLQNVWR�WKLV�JXLGHERRN�IURP�GLIIHUHQW�ORFDWLRQV�LQ�WKH�URDGPDSVWUXFWXUH��,QVLGH�$6$3��FKRRVH�,PSOHPHQWDWLRQ�5RDGPDS�→3KDVH����5HDOL]DWLRQ�→�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Release 4.6A/B1–15

&DVH�6WXG\��6HFXULW\�6WUDWHJ\�LQ�D�7KUHH�6\VWHP

(QYLURQPHQW

'HYHORSPHQW�6\VWHP��'(9�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

'(9�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

:KHQ�WKH�GHYHORSPHQW�V\VWHP��'(9��LV�ILUVW�LQVWDOOHG��SURMHFW�PHPEHUV�LQFOXGLQJFRQILJXUDWRUV��GHYHORSHUV��V\VWHP�DGPLQLVWUDWRUV��DQG�UHFHQW�WUDLQHHV�FRPSULVH�WKH�EXON�RI5���XVHUV��6$3�UHFRPPHQGV�WKH�XVH�RI�MRE�UROH�WHPSODWHV��$V�WKH�5���SURMHFW�SURJUHVVHV�WKH�QHHG�WR�OLPLW�XVHU�DFFHVV�LQFUHDVHV��,Q�JHQHUDO��'(9�V\VWHP�XVHUV�KDYH�PRUH�DFFHVV�WKDQTXDOLW\�DVVXUDQFH���4$6��RU�SURGXFWLRQ���35'��V\VWHP�XVHUV�

$V�FRQILJXUDWLRQ�LV�GRQH�LQ�'(9�\RX�FDQ�QRZ�XVH�WKH�QHZ�IXQFWLRQDOLW\�RI�FXVWRPL]LQJDFWLYLW\�JURXSV�WR�HQVXUH�WKDW�SHRSOH�DUH�FRQILJXULQJ�RQO\�WKHLU�RZQ�SDUW�RI�WKH�V\VWHP��3OHDVH�UHDG�FKDSWHU���IRU�GHWDLOHG�LQIRUPDWLRQ�RQ�FXVWRPL]LQJ�DXWKRUL]DWLRQV��

7UHDW�VXSHUXVHU�DFFRXQWV�OLNH�´URRWµ�LQ�81,;��7KH��<RXU&RPSDQ\!B$//�SURILOH�OLPLWV�ULVNRQ�WKH�'(9�V\VWHP��6\VWHP�PDOIXQFWLRQV�GXH�WR�H[FHVVLYH�DFFHVV�FDQ�DOVR�FDXVH�SURMHFWGHYHORSPHQW�GHOD\V�

<RX�QRZ�FRQWURO�ZKR�FUHDWHV�DQG�PDLQWDLQV�< 8VHUV< 3URILOHV< $XWKRUL]DWLRQV

<RX�DOVR�HOLPLQDWH�DWWHPSWV�WR�< /RFN�WUDQVDFWLRQV< 'HOHWH�XVHU�VHVVLRQV< 6WRS�ZRUN�SURFHVVHV

7KLV�FRQWURO�PDLQWDLQV�WKH�V\VWHP·V�LQWHJULW\�DQG�VWDELOLW\��8VLQJ�WKH�3*��WKH�DXWKRUL]DWLRQDGPLQLVWUDWRU�GHYHORSV�HQG�XVHU�SURILOHV�DQG�DXWKRUL]DWLRQV�LQ�WKH�'(9�V\VWHP��7KHVHSURILOHV�DQG�DXWKRUL]DWLRQV�ZLOO�EH�WUDQVSRUWHG�WR�WKH�4$6�V\VWHP�IRU�ILQDO�WHVWLQJ�EHIRUHPRYLQJ�WR�35'��7KH�HQG�XVHU�PDVWHU�UHFRUGV�DUH�XVXDOO\�FUHDWHG�LQ�35'�FORVHU�WR�WKH�JR�OLYHGDWH��7KH�DFWLYLW\�JURXSV��WRJHWKHU�ZLWK�WKH�WUDQVSRUWHG�DXWKRUL]DWLRQ�GDWD��DUH�DVVLJQHG�WRWKH�HQG�XVHUV�DV�UHTXLUHG�LQ�35'��:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Authorizations Made Easy1–16

WKH�DXWKRUL]DWLRQ�SURILOHV��7KHVH�SURILOHV�GR�QRW�QHHG�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�LI�XVHUV�DUH�DOUHDG\�DVVLJQHG��6HH�FKDSWHU���IRU�PRUH�LQIRUPDWLRQDERXW�WUDQVSRUWLQJ�

0DLQWDLQLQJ�GRFXPHQWDWLRQ�LV�DOVR�LPSRUWDQW�EHFDXVH�LW�< +HOSV�IXWXUH�SURMHFW�UROORXWV�SURFHHG�VPRRWKO\< ,V�HVVHQWLDO�WR�SDVV�VHFXULW\�DGPLQLVWUDWLYH�IXQFWLRQV�WR�RWKHU�SURMHFW�PHPEHUV< ,V�UHTXLUHG�E\�DXGLWRUV

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�FOLHQW�FRS\�DGPLQLVWUDWRUV�:KHQ�QHZ�FOLHQWV�DUH�FUHDWHG��DFWLYLW\�JURXSV�DUH�QRW�DXWRPDWLFDOO\�FRSLHG��6LQFH�XVHUV�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�DUH�DOO�FOLHQW�GHSHQGHQW��WKH�FOLHQWFRS\�DGPLQLVWUDWRU�DOVR�QHHGV�WR�NQRZ�ZKLFK�XVHU�PDVWHU�UHFRUGV�WR�FRS\��6HH�FKDSWHU���IRUPRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�DOVR�ZRUN�FORVHO\�ZLWK�WKRVH�LQ�\RXU�FRPSDQ\�WKDWIXQFWLRQ�DV�FKDQJH�PDQDJHPHQW�DGPLQLVWUDWRUV��%RWK�DGPLQLVWUDWRUV�DUH�LPSRUWDQW�SURMHFWFRQWURO�SRLQWV��7KH�V\VWHP�ODQGVFDSH��FOLHQW�ODQGVFDSH��DQG�FOLHQW�UROHV�VKRXOG�EH�FOHDUO\GHILQHG�DQG�SUHVHQWHG�WR�WKH�SURMHFW�WHDP��'HYHORSPHQW�FODVVHV�DQG�DXWKRUL]DWLRQ�JURXSVVKRXOG�EH�HVWDEOLVKHG�IRU�DOO�QHZ�GHYHORSPHQW��$OO�DGPLQLVWUDWRUV�VKRXOG�FRPSOHWHDSSURSULDWH�6$3·V�WUDLQLQJ�FRXUVHV�IRU�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�WKH\�DUH�WU\LQJ�WR�VHWXS��:H�UHFRPPHQG�WKDW�\RX�DWWHQG�FRXUVHV�DQG�ZRUNVKRSV�LPPHGLDWHO\�DIWHU�WKH�LQLWLDOLQVWDOODWLRQ�RI�\RXU�5���6\VWHP�

1H[W��WKHVH�DGPLQLVWUDWRUV�VKRXOG�FRQGXFW�D�SURMHFW�VSHFLILF�ZRUNVKRS�WR�ERWK�UHYLHZ�WKHV\VWHP�DQG�FOLHQW�ODQGVFDSH��DQG�GLVFXVV�WKH�IROORZLQJ�FRQWURO�SRLQWV�< :KHQ�GHYHORSPHQW�UHTXHVWV�ZLOO�PRYH< 7R�ZKLFK�FOLHQWV�WKHVH�UHTXHVWV�ZLOO�PRYH< :KRVH�VLJQDWXUHV�ZLOO�EH�UHTXLUHG�DORQJ�WKH�ZD\

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�GHYHORSHUV�WR�HQIRUFH�VHFXULW\VWDQGDUGV�IRU�QHZ�$%$3�SURJUDPV�DQG�WUDQVDFWLRQV��ZKLFK�FDQ�EH�HQIRUFHG�WKURXJK&KDQJH�0DQDJHPHQW��$OO�QHZ�FXVWRPHU�ZULWWHQ�FRGHV�VKRXOG�EH�DVVLJQHG�WR�DQDXWKRUL]DWLRQ�JURXS��ZLWK�WUDQVDFWLRQ�6(���DQG�6(����WKH�$%$3�HGLWRU�DWWULEXWHV�VFUHHQ�8QSURWHFWHG�FXVWRPHU�ZULWWHQ�SURJUDPV�DQG�WUDQVDFWLRQV�LQ�35'�DOZD\V�SUHVHQW�SUREOHPV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�LQYROYH�WKH�FRUSRUDWH�DXGLWRUV�DW�WKLV�MXQFWXUH�

:H�UHFRPPHQG�LQYROYLQJ�WKH�FRUSRUDWH�DXGLWRUV�XS�IURQW�VR�WKHLU�UHTXLUHPHQWV�DUHLQFRUSRUDWHG�LQ�WKH�GHYHORSPHQW�HIIRUWV��,W�LV�DOZD\V�XQSOHDVDQW�WR�DXGLW�SRVW�OLYHSURMHFWV��,Q�WKH�ZRUVW�FDVH�VFHQDULR��SURMHFWV�VKRXOG�EH�KDOWHG�XQWLO�DXGLWRU�UHTXLUHPHQWVDUH�PHW��DQG�DW�D�PLQLPXP��DOO�RI�WKH�RULJLQDO�GHYHORSPHQW�ZRUN�PD\�KDYH�WR�EH�UHYLVHG�

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Release 4.6A/B1–17

4XDOLW\�$VVXUDQFH�6\VWHP��4$6�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

4$6�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

:KHQ�WKH�4$6�V\VWHP�DQG�FOLHQW�DUH�FUHDWHG��WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�VWDUWWUDQVSRUWLQJ�WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP��WDEOH�862%;B&��WHPSODWHV�DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��IURP�WKH�'(9�V\VWHP�WR�WKH�4$6�V\VWHP�VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$XWKRUL]DWLRQ�SURILOHV�IRU�LPSRUWHG�DFWLYLW\�JURXSV�QRORQJHU�QHHG�WR�EH�UHJHQHUDWHG��VLQFH�WKH�V\VWHP�FDQ�GR�WKLV�DXWRPDWLFDOO\�QRZ��%HIRUHPRYLQJ�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�GDWD�WR�35'��D�ILQDO�WHVWLQJ�SODQ�VKRXOG�EHSURGXFHG�

)RU�H[DPSOH��DQ�),�SURMHFW�WHDP�PHPEHU�PD\�XVH�D�VDPSOH�DFFRXQWV�SD\DEOH�XVHU�,'�WR�< &RQILUP�WKDW�WKH�XVHU�KDV�DFFHVV�WR�WKH�VSHFLILF�WUDQVDFWLRQV�JRYHUQHG�E\�HDFK�DFWLYLW\

JURXS�WR�ZKLFK�WKH�XVHU�LV�DVVLJQHG�< (QVXUH�WKDW�WKHVH�WUDQVDFWLRQV�PDWFK�WKH�FRPSDQ\�GHILQHG�UROH�IRU�DFFRXQWV�SD\DEOH�< 9HULI\�WKDW�WKH�VDPSOH�XVHU�,'�GRHV�QRW�KDYH�DFFHVV�WR�XQDXWKRUL]HG�WUDQVDFWLRQV�

6RPH�VLWHV�FRQGXFW�D�GD\�LQ�WKH�OLIH�WHVW�DV�SDUW�RI�WKHLU�JR�OLYH�SODQ��ZKHUH�HQG�XVHUV�ORJ�RQWR�D�SUHSURGXFWLRQ�HQYLURQPHQW�DQG�VLPXODWH�UHDO�SURGXFWLRQ��7KLV�SURFHVV�LV�DQ�H[FHOOHQWZD\�RI�WHVWLQJ�WKH�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�

7UDLQLQJ�&OLHQW�6\VWHP��75*�

:KLOH�PDQ\�FXVWRPHUV�GR�QRW�SXW�WKHLU�WUDLQLQJ�HQYLURQPHQW�RQ�DQRWKHU�V\VWHP�HQWLUHO\�PDQ\�GR��<RX�QHHG�WR�VHW�XS�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WKH�WUDLQLQJ�V\VWHP�DV�ZHOO�7KH�DSSURSULDWH�DXWKRUL]DWLRQ�VHWXS�FDQQRW�EH�GHWHUPLQHG�ZLWKRXW�ILUVW�NQRZLQJ�IURPZKHUH�WKH�GDWD�WKDW�DSSHDUV�LQ�WKH�WUDLQLQJ�V\VWHP�FRPHV�IURP��RU�KRZ�WKH�V\VWHP�DQGWUDLQLQJ�FOLHQW�ZHUH�FUHDWHG���)RU�H[DPSOH��LI�WKH�WUDLQLQJ�V\VWHP�LV�D�FRS\�RI�WKH�SURGXFWLRQHQYLURQPHQW�RU�D�FRS\�RI�WKH�FOLHQW�ZKHUH�FRQYHUVLRQV�DQG�LQWHUIDFHV�ZHUH�LQLWLDOO\�WHVWHG��LWPD\�EH�SRVVLEOH�WKDW�WKH�WUDLQLQJ�V\VWHP�FRQWDLQV�VHQVLWLYH�LQIRUPDWLRQ�VXFK�DV�VRFLDOVHFXULW\�QXPEHUV��FRQYHUWHG�SD\UROO�LQIRUPDWLRQ��DGGUHVVHV��HWF�

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Authorizations Made Easy1–18

3URGXFWLRQ�6\VWHP��35'�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

35'�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

2QFH�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�IXOO\�WHVWHG�LQ�4$6��DQG�HQGXVHU�DQG�SURMHFW�WHDP�DSSURYDO�KDV�EHHQ�SURYLGHG��WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQV\VWHP��WDEOH�862%;B&��WHPSODWHV��DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��DUHPRYHG�WR�35'��VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$FWXDO�HQG�XVHU�,'V�FDQ�EH�FUHDWHG��$IRUP�WKDW�LQFOXGHV�DOO�RI�WKH�SHUWLQHQW�LQIRUPDWLRQ�IRU�XVHU�,'�FUHDWLRQ��DORQJ�ZLWK�WKHSURSHU�VLJQDWXUHV��LV�GHYHORSHG�DQG�GLVWULEXWHG�WR�WKH�GHSDUWPHQWV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�EH�D�SDUW�RI�WKH�JR�OLYH�SODQ��7KH�ILUVW�GD\V�RI�JRLQJ�OLYH�DUH�KHFWLF��DQG�WKHUH�VKRXOG�EH�D�SURFHGXUH�WR�UHSRUW�DFFHVV�SUREOHPV�LQ�SURGXFWLRQ��7KHKHOS�GHVN�LV�D�JRRG�IRFDO�SRLQW��:KHQ�XVHUV�KDYH�DFFHVV�SUREOHPV��IRU�H[DPSOH��ZKHQ�XVHUVVHH�WKH�PHVVDJH��1R�DXWKRUL]DWLRQ�IRU�WUDQVDFWLRQ�;;;;���WKH\�VKRXOG�H[HFXWH�WUDQVDFWLRQ68���WR�REWDLQ�WKH�DXWKRUL]DWLRQ�UHTXLUHG�IRU�WKLV�WUDQVDFWLRQ���5HPHPEHU��VLQFH����+�WUDQVDFWLRQ�68���LV�DOVR�SURWHFWHG�E\�REMHFW�6B7&2'(��6HH�FKDSWHU����,QVHUWLQJ�0LVVLQJ$XWKRUL]DWLRQV��IRU�PRUH�GHWDLOV���$�VFUHHQ�SULQW�VKRXOG�EH�VHQW�WR�WKH�KHOS�GHVN�DQG�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�IRU�HYDOXDWLRQ��2QFH�WKH�DSSOLFDWLRQ�DUHD�RZQHU�DSSURYHV�WKHDGGLWLRQDO�DFFHVV��LW�LV�DVVLJQHG�WR�WKH�XVHU��$GGLWLRQDO�DFFHVV�PHDQV�WKDW�WKH�DFWLYLW\�JURXSVPLJKW�EH�FKDQJHG�RU�WKDW�D�PLVVLQJ�DXWKRUL]DWLRQ�REMHFW�PD\�QHHG�WR�EH�PDQXDOO\�LQVHUWHGLQ�WKH�DXWKRUL]DWLRQ�SURILOHV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�VWDUW�SODQQLQJ�IRU�RWKHU�SURMHFW�SKDVHV��7KLV�PD\LQFOXGH�RWKHU�UROORXWV�WR�GLIIHUHQW�ORFDWLRQV��GLIIHUHQW�SODQWV��GLIIHUHQW�PRGXOHV��RU�5��XSJUDGHV��$OO�RI�WKHVH�UROORXWV�VKRXOG�LQYROYH�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�

Chapter 1: R/3 System Security and the Authorization Concept

Setting Up the Authorization Administrators

Release 4.6A/B1–19

6HWWLQJ�8S�WKH�$XWKRUL]DWLRQ�$GPLQLVWUDWRUV

:H�UHFRPPHQG�\RX�GLYLGH�WKH�V\VWHP�DGPLQLVWUDWLRQ�WDVNV��DV�VKRZQ�LQ�WKH�JUDSKLF�EHORZ�WR�HQVXUH�JUHDWHU�V\VWHP�VHFXULW\��)RU�FRPSDQLHV�WKDW�KDYH�VHYHUDO�SHRSOH�GHYRWHG�WR�WKHDXWKRUL]DWLRQV�FRPSRQHQW�RI�5����WKLV�GLYLVLRQ�PDNHV�JRRG�VHQVH��6$3�VXSSRUWV�WKLVDSSURDFK�ZLWK�WKH�XVHU�UROH�WHPSODWHV�IRU�WKHVH�DGPLQLVWUDWRUV��,Q�WKH�VWDQGDUG�5���6\VWHP\RX�FDQ�ILQG�WKH�IROORZLQJ�WHPSODWHV�

$GPLQLVWUDWRU 8VHU�5ROH�7HPSODWH

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU 6$3B%&B$87+B'$7$B$'0,1B$*

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU 6$3B%&B$87+B352),/(B$'0,1B$*

8VHU�$GPLQLVWUDWRU 6$3B%&B86(5B$'0,1B$*

6XSHU�8VHU

8VHU�$GPLQLVWUDWRU

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU

- Maintain user master records - Assign activity groups to users - Assign profiles to users (T ONLY) - Display auth. and profiles - Call user information system

- Maintain activity groups - Within activity groups: - Change authorizations (T ONLY) - Generate profiles (T ONLY) - Execute transaction information- Call user information system

- Maintain activity groups - Within activity groups: -Change transaction selection - Change authorization data- Call user information system

SAP

Organizing Authorization Administration

)RU�FRPSDQLHV�ZLWK�YHU\�IHZ�SHRSOH�LQYROYHG�LQ�VHWWLQJ�XS�DQG�PDLQWDLQLQJ�DXWKRUL]DWLRQV�GLYLGLQJ�XS�VXFK�WDVNV�FRPSOLFDWHV�WKH�SURFHVV�RI�FUHDWLQJ�DQG�PDLQWDLQLQJ�WKHDXWKRUL]DWLRQV�FRPSRQHQW��<RX�VKRXOG�DOVR�GHFLGH�ZKHWKHU�PDLQWHQDQFH�RI�XVHUV��DFWLYLW\JURXSV��DXWKRUL]DWLRQ�SURILOH��DQG�DXWKRUL]DWLRQV�VKRXOG�EH�FHQWUDOL]HG�RU�GHFHQWUDOL]HG��:HUHFRPPHQG�FHQWUDOL]LQJ�PDLQWHQDQFH�XQWLO�\RXU�JR�OLYH�GDWH�DQG�ILUVW�UROORXW��&HQWUDOL]HGDGPLQLVWUDWRUV�KDYH�D�EHWWHU�XQGHUVWDQGLQJ�RI�ZKDW�LV�LQYROYHG�LQ�D�UROORXW��DQG�FHQWUDOL]LQJWKH�DGPLQLVWUDWLYH�WDVNV�HVWDEOLVKHV�QDPLQJ�VWDQGDUGV��%\�WKH�ILUVW�UROORXW��DOO�DGPLQLVWUDWLYHIXQFWLRQV�VKRXOG�EH�GRFXPHQWHG�DQG�FDQ�WKHQ�EH�GHFHQWUDOL]HG�

Chapter 1: R/3 System Security and the Authorization Concept

Setting Up the Authorization Administrators

Authorizations Made Easy1–20

&RQYHUVHO\��ZKHQ�WKH�DGPLQLVWUDWLYH�IXQFWLRQV�DUH�GHFHQWUDOL]HG�XS�IURQW��DGPLQLVWUDWRUVXVH�GLIIHUHQW�QDPLQJ�VWDQGDUGV�IRU�WKHLU�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQGDXWKRUL]DWLRQV��DQG�GLIIHUHQW�DSSURDFKHV�WR�LPSOHPHQWLQJ�VHFXULW\��,I�HDFK�DGPLQLVWUDWRUFUHDWHV�KLV�RU�KHU�RZQ�VWDQGDUGV��HYHU\WKLQJ�KDV�WR�EH�UHQDPHG�RQFH�WKH�DXWKRUL]DWLRQLPSOHPHQWDWLRQ�LV�VWDQGDUGL]HG�

7KH�VXSHUXVHU�VHWV�XS�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�IRU�DGPLQLVWUDWRUV�LQD�GHSDUWPHQW��D�FRVW�FHQWHU��DQG�RWKHU�RUJDQL]DWLRQDO�XQLWV��:LWKLQ�DQ�DUHD��DGPLQLVWUDWLYHWDVNV�DUH�GLYLGHG�EHWZHHQ�WKH�XVHU�DGPLQLVWUDWRU��DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU��DQGDXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU��7KH�IROORZLQJ�LV�D�OLVW�RI�HDFK�DGPLQLVWUDWRU·V�WDVNV�DQGUHVSRQVLELOLWLHV�< 8VHU�$GPLQLVWUDWRU

� &UHDWLQJ�DQG�FKDQJLQJ�XVHUV� $VVLJQLQJ�XVHUV�WR�DFWLYLW\�JURXSV� $VVLJQLQJ�SURILOHV�EHJLQQLQJ�ZLWK�7�WR�XVHUV��RU�IROORZLQJ�\RXU�RZQ�QDPLQJ

FRQYHQWLRQ�� 'LVSOD\LQJ�DXWKRUL]DWLRQV�DQG�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

'LVSOD\LQJ�RU�FKDQJLQJ�DFWLYLW\�JURXS�GDWD�DQG�FKDQJLQJ�RU�JHQHUDWLQJ�SURILOHV�VKRXOGQRW�EH�SHUPLWWHG�IRU�XVHU�DGPLQLVWUDWRUV�

< $XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU� 'LVSOD\LQJ�XVHUV� &UHDWLQJ�DQG�FKDQJLQJ�DFWLYLW\�JURXSV� &KDQJLQJ�WKH�WUDQVDFWLRQ�VHOHFWLRQ�DQG�DXWKRUL]DWLRQ�GDWD�LQ�DFWLYLW\�JURXSV� 'LVSOD\LQJ�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

&KDQJLQJ�XVHUV�DQG�JHQHUDWLQJ�SURILOHV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRUV�

< $XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU� 'LVSOD\LQJ�DFWLYLW\�JURXSV�DQG�WKHLU�GDWD��DQG�XVHUV� *HQHUDWLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�7�EDVHG�RQ

H[LVWLQJ�DFWLYLW\�JURXSV��RU�UHVSHFWLYHO\�IROORZLQJ�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

7KH�IROORZLQJ�WDVNV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRUV�� &KDQJLQJ�XVHUV� &KDQJLQJ�DFWLYLW\�JURXS�GDWD� *HQHUDWLQJ�DXWKRUL]DWLRQ�SURILOHV�FRQWDLQLQJ�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK

6B86(5

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Release 4.6A/B1–21

+RZ�WKH�$GPLQLVWUDWRUV�:RUN�7RJHWKHU

7KH�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU�< &UHDWHV�DQ�DFWLYLW\�JURXS< &KRRVHV�WUDQVDFWLRQV< 0DLQWDLQV�DXWKRUL]DWLRQ�GDWD

:LWKRXW�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�WR�JHQHUDWH�WKH�SURILOH��WKH�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRU�VDYHV�WKH�SURILOH�DQG�DFFHSWV�WKH�GHIDXOW�SURILOH�QDPH�7��RU�D�QDPH�WKDWIROORZV�\RXU�QDPLQJ�FRQYHQWLRQ�

7KH�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU�< &DOOV�WUDQVDFWLRQ�PFCG< 6HOHFWV�WKH�'LVSOD\�PRGH�WR�FKHFN�WKH�GDWD< *HQHUDWHV�WKH�DXWKRUL]DWLRQ�SURILOHV

)LQDOO\��WKH�XVHU�DGPLQLVWUDWRU�DVVLJQV�WKH�DFWLYLW\�JURXS�WR�D�XVHU�RU�D�3'�REMHFW��VXFK�DV�DSRVLWLRQ��DQG�XSGDWHV�WKH�XVHU�PDVWHU�UHFRUG��7KH�DXWKRUL]DWLRQ�SURILOH�LV�WKHQ�DGGHG�WR�WKHXVHU�PDVWHU�UHFRUG�

3ROLFLHV�DQG�3URFHGXUHV

7KH�IROORZLQJ�VKRZV�D�VDPSOH�RI�SROLFLHV�DQG�SURFHGXUHV��KRZHYHU�IRU�\RXU�FRPSDQ\�LWPLJKW�EH�GLIIHUHQW�

8VHU�$GPLQLVWUDWLRQ

3ROLFLHV

< 6XSHUXVHUV�6$3 �DQG�'',&� 7KHUH�LV�QR�XVHU�6$3 �DQG�'',&�LQ�DQ\�FOLHQW�ZLWKRXW�D�SDVVZRUG�� 7KH�6$3 �XVHU�KDV�QR�DXWKRUL]DWLRQV�

< 8VHU�QDPLQJ�FRQYHQWLRQ

$OO�XVHUV�DUH�DVVLJQHG�QDPHV�LGHQWLFDO�WR�WKHLU�HPSOR\HH�,'�QXPEHUV��SHUVRQQHOQXPEHUV��

< 8VHU�PDLQWHQDQFH� 7KH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW�KDV�WR�UHFHLYH�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW

)RUP��ZLWK�H�PDLO��VLJQHG�E\�WKH�XVHU·V�DSSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�� $OO�SURILOHV�WKDW�WKH�XVHU�UHTXLUHV�PXVW�EH�VSHFLILFDOO\�OLVWHG�RQ�WKH�UHTXHVW�IRUP��7KH

IRUP�PXVW�LQGLFDWH�ZKHWKHU�WKH�XVHU�LV�WHPSRUDU\�RU�SHUPDQHQW�� )RU�WHPSRUDU\�HPSOR\HHV��DQ�DFFRXQW�H[SLUDWLRQ�GDWH�PXVW�EH�LQFOXGHG�

< 8VHU�OHDYLQJ�WKH�FRPSDQ\�� 7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�ILOOHG�RXW�DQG�VLJQHG�E\�WKH�DSSOLFDWLRQ

GHSDUWPHQW�PDQDJHU��� $�FRS\�RI�WKLV�IRUP�PXVW�EH�VHQW�WR�+5�GHSDUWPHQW�

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Authorizations Made Easy1–22

�� 7KH�+5�GHSDUWPHQW�PDQDJHU�PXVW�VLJQ�WKH�UHTXHVW�IRU�GHOHWLRQ��� 7KLV�PDQDJHU�VHQGV�WKH�VLJQHG�FRS\�EDFN�WR�WKH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW��� $OO�HPSOR\HH�PDVWHU�UHFRUG�LQIRUPDWLRQ��LQFOXGLQJ�LQWHUQDO�SRVW�RIILFH��PXVW�EH

GHOHWHG�

3URFHGXUHV

< 6XSHUXVHUV�6$3 �DQG�'',&� 6$3 �LV�XVHG�RQO\�IRU�FOLHQW�FRSLHV�� 3VHXGR�VXSHUXVHUV�DUH�FUHDWHG�LQ�HDFK�FOLHQW�ZLWK�WKH�6$3B$//�SURILOH�� 7KH�SDVVZRUG�LV�FKDQJHG�HYHU\�PRQWK�

7KLV�FDQ�EH�GHWHUPLQHG�ZLWK�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�ORJLQ�SDVVZRUGBH[SLUDWLRQBWLPH��VHH�DSSHQGL[�&�IRU�WKH�OLVW�RI�V\VWHP�SURILOHSDUDPHWHUV��

� 8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�SDVVZRUGV�IRU�6$3 �DQG�'',&KDYH�EHHQ�FKDQJHG�IURP�WKH�GHIDXOWV�

< 8VHU�QDPLQJ�FRQYHQWLRQ

7KH�DSSOLFDWLRQ�PDQDJHU�PXVW�FRQWDFW�WKH�+5�GHSDUWPHQW�DQG�UHFHLYH�WKH�QHZHPSOR\HH�,'�QXPEHU��7KLV�,'�QXPEHU�LV�HQWHUHG�LQWR�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUPZKHUH�LQGLFDWHG�

< 8VHU�PDLQWHQDQFH

7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�PDLOHG�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�

< 8VHU�OHDYLQJ�WKH�FRPSDQ\

7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�VHQW�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�DQG�WR�WKH�+5�GHSDUWPHQW�PDQDJHU��7KH�+5�GHSDUWPHQWPDQDJHU�PXVW�VLJQ�WKH�IRUP�DQG�UHWXUQ�WKH�VLJQHG�FRS\�WR�WKH�V\VWHP�DGPLQLVWUDWLRQGHSDUWPHQW�

5ROHV�DQG�5HVSRQVLELOLWLHV

7DVN 5ROH

0DLQWDLQLQJ�VXSHUXVHUV 6\VWHP�DGPLQLVWUDWRU

0DLQWDLQLQJ�QDPLQJ�FRQYHQWLRQV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�+5GHSDUWPHQW

0DLQWDLQLQJ�XVHUV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU

0DLQWDLQLQJ�XVHUV�OHDYLQJ�FRPSDQ\ $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU�+5�GHSDUWPHQW

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Release 4.6A/B1–23

6\VWHP�6HFXULW\

3ROLFLHV

< ,7�0DQDJHU

7KH�,7�0DQDJHU��ZKR�LV�UHVSRQVLEOH�IRU�DOO�DVSHFWV�RI�V\VWHP�VHFXULW\��PXVW�UHYLHZ�WKHVHFXULW\�VWUDWHJ\�HYHU\�WZR�PRQWKV�

< 6XSHUXVHUV

)RU�UHYLVLRQ�DQG�VHFXULW\�SXUSRVHV��WKH�VXSHUXVHU�6$3 �ZLOO�QRW�EH�XVHG�IRU�V\VWHPPDLQWHQDQFH��$OO�PDLQWHQDQFH�KDV�WR�EH�SHUIRUPHG�ZLWK�QHZO\�GHILQHG�VXSHUXVHUV�

< 6\VWHP�SDVVZRUGV6\VWHP�SDVVZRUGV��'%�XVHU�VDSU���2�6��XVHU��6,'!$'0��'',&��PXVW�EH�FKDQJHG�HYHU\IRXU�ZHHNV��,Q�FDVH�RI�DQ�HPHUJHQF\��SDVVZRUG�DFFHVV�PXVW�EH�HQVXUHG�

< 8VHU�SDVVZRUGV7R�SURWHFW�WKH�V\VWHP�IURP�XQDXWKRUL]HG�DFFHVV��PDNH�XVHUV�FKDQJH�WKHLU�SDVVZRUGHYHU\�IRXU�ZHHNV��$�PLQLPXP�SDVVZRUG�OHQJWK�RI�VL[�FKDUDFWHUV�LV�UHTXLUHG��$IWHU�WKUHHXQVXFFHVVIXO�ORJRQ�DWWHPSWV�WKH�DFFRXQW�ZLOO�EH�ORFNHG�

< 6$3�FRQQHFWLRQ7KH�FRQQHFWLRQ�WR�6$3�LV�RSHQHG�RQO\�IRU�D�VHUYLFH�VHVVLRQ��7KHVH�FRQQHFWLRQV�DUH6$31HW�¥�5���)URQWHQG�QRWHV��IRUPHUO\�266���(DUO\�:DWFK��DQG�5HPRWH�&RQVXOWLQJ�&RQQHFWLRQ�WR�6$3�FDQ�RQO\�EH�RSHQHG�IURP�WKH�FXVWRPHU�VLWH��&RQQHFWLRQV�KDYH�WR�EHPRQLWRUHG�ZLWK�DQ�DSSURSULDWH�WRRO�

< 6$3URXWHU6$3URXWHU��D�6$3�VXSSOLHG�WRRO�IRU�VHFXULQJ�5���DFFHVV��LV�QHFHVVDU\�IRU�FRQQHFWLQJ�WR6$3�V\VWHPV�

< 5HPRWH�FRQQHFWLRQV)RU�H[WHUQDO�FRQQHFWLRQV��PRELOH�HQG�XVHUV���IL[HG�,3�DGGUHVVHV�DUH�DVVLJQHG��2QHH[SOLFLW�HQWU\�SHU�H[WHUQDO�FRQQHFWLRQ�LV�PDLQWDLQHG�LQ�WKH�SHUPLVVLRQ�OLVW�IRU�6$3�URXWHU�

3URFHGXUHV

< ,7�0DQDJHU

(YHU\�WZR�PRQWKV��WKH�,7�PDQDJHU�DQG�WKH�V\VWHP�DGPLQLVWUDWRU�VKRXOG�UHYLHZ�V\VWHPVHFXULW\�

< 6XSHUXVHUV

7KH�6$3B$//�SURILOH�LV�UHPRYHG�IURP�WKH�XVHU�6$3 ��DQG�WKH�6$3 �XVHU�LV�ORFNHG��$OOPDLQWHQDQFH�WDVNV�DUH�SHUIRUPHG�XVLQJ�DFFRXQWV�ZLWK�WKH�6$3B$//�SURILOH�

< 6\VWHP�SDVVZRUGV7KH�V\VWHP�DGPLQLVWUDWRU�FKDQJHV�WKH�V\VWHP�SDVVZRUGV�HYHU\�IRXU�ZHHNV��7KH�V\VWHPDGPLQLVWUDWRU�PXVW�ZULWH�GRZQ�WKH�FXUUHQW�SDVVZRUGV�DQG�SODFH�WKHP�LQ�D�VHDOHGHQYHORSH��ZKLFK�PXVW�EH�VWRUHG�LQ�WKH�GDWD�VDIH�DQG�EH�DFFHVVLEOH�LQ�FDVH�RI�HPHUJHQF\�8VH�UHSRUW�56865����WR�FKHFN�LI�V\VWHP�SDVVZRUGV�KDYH�EHHQ�FKDQJHG�

Chapter 1: R/3 System Security and the Authorization Concept

Auditing Requirements

Authorizations Made Easy1–24

< 8VHU�SDVVZRUGV8VHUV�PXVW�FKDQJH�WKHLU�SDVVZRUGV�HYHU\�IRXU�ZHHNV�E\�VHWWLQJ�WKH�DSSURSULDWHSDUDPHWHUV�LQ�WKH�'()$8/7�SURILOH��7KLV�VWHS�HQVXUHV�WKDW�WKH�VHWWLQJV�DUH�YDOLG�LQ�WKHHQWLUH�V\VWHP��7KH�PLQLPXP�QXPEHU�RI�FKDUDFWHUV�IRU�D�SDVVZRUG�LV�VL[��DQG�WKHLQWUXGHU�ORFNRXW�FRXQW�LV�VHW�WR�WKUHH�

< 6$3�FRQQHFWLRQ$�FRQQHFWLRQ�EHWZHHQ�6$3�DQG�WKH�FXVWRPHU�LV�HVWDEOLVKHG�E\�VWDUWLQJ�6$3�URXWHU�LQ�WKHFXVWRPHU�QHWZRUN�DQG�VWDUWLQJ��IRU�H[DPSOH��6$3�*8,�IRU�DQ�6$31HW�²�5���)URQWHQGQRWH�FRQQHFWLRQ�

< 6$3�URXWHU6$3�URXWHU�LV�VWDUWHG�DQG�VWRSSHG�RQFH�D�GD\�WR�HQVXUH�WKHUH�LV�QR�RSHQ�FRQQHFWLRQV�

< 5HPRWH�FRQQHFWLRQV)RU�UHPRWH�XVHUV��GHGLFDWHG�,3�DGGUHVVHV�DUH�PDLQWDLQHG��7KHVH�DGGUHVVHV�PXVW�DOVR�EHPDLQWDLQHG�LQ�WKH�6$352877$%�WR�PDNH�VXUH�WKDW�XQDXWKRUL]HG�XVHUV�GR�QRW�ORJ�RQ�WR5���

5ROHV�DQG�5HVSRQVLELOLWLHV

7DVN 5ROH

'HILQLQJ�DQG�PDLQWDLQLQJ�6$352877$% 6\VWHP�DGPLQLVWUDWRU

0RQLWRULQJ�RSHQ�FRQQHFWLRQV 2SHUDWRU

6KXWWLQJ�GRZQ�UHVWDUWLQJ�6$3�URXWHU�GDLO\ 2SHUDWRU

5HYLHZLQJ�VHFXULW\�VWUDWHJ\ ,7�PDQDJHU

&KDQJLQJ�V\VWHP�SDVVZRUGV 6\VWHP�DGPLQLVWUDWRU

$XGLWLQJ�5HTXLUHPHQWV

,Q�5���WKHUH�DUH�VHYHUDO�DUHDV�UHODWHG�WR�DXGLWLQJ�< 3URFHVV�FRQWUROV< &KDQJH�PDQDJHPHQW< $XWKRUL]DWLRQ�LPSOHPHQWDWLRQ< 81,;< 'DWDEDVH

<RXU�VLWH�PD\�KDYH�DGGLWLRQDO�DXGLWLQJ�UHTXLUHPHQWV��1XPHURXV�FRPSDQLHV�KDYHLPSOHPHQWHG�H[FHOOHQW�DXGLWLQJ�SURFHGXUHV�EDVHG�RQ�VWDQGDUG�6$3�WRROV�DQG�FXVWRPHU�EXLOWWRROV��$PHULFDV·�6$3�8VHUV·�*URXS��$68*��,QWHUQDO�&RQWUROV�DQG�6HFXULW\�RIIHUV�WKH�EHVWLQIRUPDWLRQ�RQ�KRZ�RWKHU�FRPSDQLHV�KDYH�KDQGOHG�DXGLWLQJ�LQ�5����)RU�PRUH�LQIRUPDWLRQ�RQ�$68*�VHH�KWWS���ZZZ�DVXJ�FRP���)RU�PRUH�LQIRUPDWLRQ�RQ�DXGLWLQJ�VHH�FKDSWHU�����6$36HFXULW\�$XGLW�DQG�/RJJLQJ�

2–1

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3

&RQWHQWV

Overview ..................................................................................................................2–2

ASAP Roadmap.......................................................................................................2–2

Knowledge Corner ..................................................................................................2–5

Questions and Answers Database (Q&Adb) ........................................................2–6

Authorization List....................................................................................................2–6

��

Chapter 2: Authorizations and ASAP

Overview

Authorizations Made Easy2–2

2YHUYLHZ

$FFHOHUDWHG6$3��$6$3��LV�6$3·V�FRPSUHKHQVLYH�LPSOHPHQWDWLRQ�VROXWLRQ�WR�VWUHDPOLQH�5��SURMHFWV��$6$3�LQWHJUDWHV�WKUHH�FRPSRQHQWV��WKH�$6$3�5RDGPDS��7RROV��DQG�5���6HUYLFH�DQG7UDLQLQJ��ZKLFK�ZRUN�LQ�FRQMXQFWLRQ�WR�VXSSRUW�WKH�UDSLG�DQG�HIILFLHQW�LPSOHPHQWDWLRQ�RIWKH�5���6\VWHP�< $FFHOHUDWHG6$3�5RDGPDS�GHOLYHUV�D�SURFHVV�RULHQWHG��FOHDU�DQG�FRQFLVH�SURMHFW�SODQ�WR

SURYLGH�VWHS�E\�VWHS�GLUHFWLRQ�WKURXJKRXW�\RXU�LPSOHPHQWDWLRQ�RI�5���< 7RROV�LQFOXGHV�$6$3�VSHFLILF�WRROV�WR�VXSSRUW�SURMHFW�PDQDJHPHQW��TXHVWLRQQDLUHV�IRU

WKH�EXVLQHVV�SURFHVV�FRQVXOWDQWV�DQG�QXPHURXV�WHFKQLFDO�JXLGHERRNV�DQG�FKHFNOLVWV�< 5���6HUYLFHV�DQG�7UDLQLQJ�LQFOXGHV�DOO�FRQVXOWLQJ��WUDLQLQJ��DQG�VXSSRUW�VHUYLFHV��IRU

H[DPSOH��KRWOLQH��(DUO\:DWFK��UHPRWH�XSJUDGHV�RU�DUFKLYLQJ��HWF����7KHVH�SURGXFWV�KHOSWR�VWDQGDUGL]H�FHUWDLQ�WDVNV�WR�SHUIRUP�WKHP�DV�TXLFNO\�DV�SRVVLEOH�

,Q�UHVSHFW�WR�DXWKRUL]DWLRQV��$6$3�GHVFULEHV�WKH�SURFHVV�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�FRQFHSW�:KLOH�WKLV�JXLGHERRN�KHOSV�\RX�LQ�WKH�WHFKQLFDO�LPSOHPHQWDWLRQ�RI�DXWKRUL]DWLRQV�$6$3GHVFULEHV�WKH�VHWXS�RI�DQ�DXWKRUL]DWLRQ�FRQFHSW�IURP�D�PHWKRGLFDO�DQG�RUJDQL]DWLRQDO�YLHZSRLQW��%\�IROORZLQJ�WKH�VWHSV�RI�$6$3�5RDGPDS��\RX�FDQ�HVWDEOLVK�\RXU�DXWKRUL]DWLRQFRQFHSW�ZLWK�D�SURYHQ�LPSOHPHQWDWLRQ�SURFHVV��7KH�.QRZOHGJH�&RUQHU�SURYLGHV�\RX�ZLWKWRROV�WKDW�KHOS�\RX�WR�DFFHOHUDWH�WKH�DXWKRUL]DWLRQ�LPSOHPHQWDWLRQ�

,Q�WKLV�FKDSWHU��ZH�EULHIO\�GLVFXVV�KRZ�WR�ZRUN�ZLWK�$6$3�DQG�ZKDW�LW�FRQWDLQV�LQ�UHJDUGVWR�DXWKRUL]DWLRQV��:H�H[SODLQ�KRZ�WR�DFFHVV�WKH�$6$3�FRPSRQHQWV�FRQWDLQLQJDXWKRUL]DWLRQ�UHODWHG�UHVRXUFHV�UDWKHU�WKDQ�GLVFXVVLQJ�WKH�FRQWHQWV�WKHPVHOYHV�

$6$3�5RDGPDS

7KH�$6$3�5RDGPDS�VWUXFWXUH�LV�GLYLGHG�LQWR�GLIIHUHQW�OHYHOV�< 3KDVH< :RUN�SDFNDJH< $FWLYLW\< 7DVN

2Q�WKH�KLJKHVW�OHYHO��WKH�$6$3�5RDGPDS�FRQVLVWV�RI�ILYH�SKDVHV��DV�IROORZV�

Chapter 2: Authorizations and ASAP

ASAP Roadmap

Release 4.6A/B2–3

�� 3URMHFW�3UHSDUDWLRQ,Q�WKLV�SKDVH��\RX�PDNH�VXUH�DOO�GHFLVLRQ�PDNHUV�DUH�RQ�ERDUG�IRU�\RXU�5��LPSOHPHQWDWLRQ�DQG�JDWKHU�\RXU�LQWHUQDO�DQG�H[WHUQDO�LPSOHPHQWDWLRQ�WHDP�

�� %XVLQHVV�%OXHSULQW&UHDWH�WKH�%XVLQHVV�%OXHSULQW�GRFXPHQWLQJ�\RXU�FRPSDQ\·V�EXVLQHVV�UHTXLUHPHQWV��7KH%XVLQHVV�%OXHSULQW�LV�D�YLVXDO�PRGHO�RI�\RXU�EXVLQHVV·�IXWXUH�VWDWH�DIWHU�\RX·YHLPSOHPHQWHG�WKH�5���6\VWHP��,W�DOORZV�\RXU�SURMHFW�WHDP�WR�FOHDUO\�GHILQH�\RXU�VFRSH�DQG�RQO\�IRFXV�RQ�WKH�5���SURFHVVHV�QHHGHG�WR�UXQ�\RXU�EXVLQHVV�

�� 5HDOL]DWLRQ,Q�WKLV�SKDVH��\RXU�LPSOHPHQWDWLRQ�WHDP�FRQILJXUHV�DQG�ILQH�WXQHV�WKH�5���6\VWHP�

�� )LQDO�3UHSDUDWLRQ7HVW�DOO�LQWHUIDFHV��WUDLQ�DOO�HQG�XVHUV��DQG�PLJUDWH�\RXU�EXVLQHVV�GDWD�WR�\RXU�5��6\VWHP�

�� *R�/LYH��6XSSRUW,Q�WKLV�SKDVH��JR�OLYH�ZLWK�5����<RX�HVWDEOLVK�SURFHGXUHV�DQG�PHDVXUHPHQWV�WR�UHYLHZWKH�EHQHILWV�RI�\RXU�5���LQYHVWPHQW�RQ�DQ�RQJRLQJ�EDVLV��6$3�VXSSRUW�DQG�VHUYLFHVDVVXUH�WKDW�\RXU�V\VWHP�FRQWLQXHV�WR�UXQ�VPRRWKO\��FOHDQO\��DQG�HIILFLHQWO\�

8VHU�DQG�DXWKRUL]DWLRQ�PDQDJHPHQW�LV�FRYHUHG�LQ�WKH�5HDOL]DWLRQ�SKDVH�RI�WKH�$6$35RDGPDS��,Q�WKH�ZRUN�SDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW��\RX�ILQG�D�GHVFULSWLRQ�RI�WKHPHWKRGRORJ\�WR�VHW�XS�DQ�DXWKRUL]DWLRQV�FRQFHSW��)ROORZ�WKH�VWHSV�EHORZ�

User and authorizationmanagement is coveredin phase 3, Realization

Chapter 2: Authorizations and ASAP

ASAP Roadmap

Authorizations Made Easy2–4

$XWKRUL]DWLRQV�LQ�WKH�5RDGPDS�6WUXFWXUH

�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�

�� 2Q�WKH�5RDGPDS�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH,PSOHPHQWDWLRQ�5RDGPDS�→��5HDOL]DWLRQ�→��(VWDEOLVK$XWKRUL]DWLRQ�&RQFHSW�

�� 2Q�WKH�ULJKW�VLGH��DQ�H[SODQDWLRQ�RIWKH�FRQWHQWV�DSSHDUV�IRU�WKH�QRGHVHOHFWHG�RQ�WKH�OHIW�

1RWH��'XH�WR�VWUXFWXUDO�GLIIHUHQFHV�LQ�WKH�$6$3�URDGPDS�EHWZHHQ�$6$3�5HOHDVH����$�DQG����%��WKHQXPEHU�RI�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�LV�HLWKHU������LQ�$6$3�5HOHDVH����$�RU������LQ$6$3�5HOHDVH����%�

7KH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�FRQWDLQV�WKUHH�DFWLYLWLHV��ZKLFK�DUH�

�� &UHDWH�$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ

�� ,PSOHPHQW�$XWKRUL]DWLRQ�&RQFHSW

�� 9DOLGDWH�$XWKRUL]DWLRQ�&RQFHSW

7R�DFFHVV�WKH�DFWLYLWLHV�EHORQJLQJ�WR�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�IROORZ�WKH�VWHSVEHORZ�

�� &KRRVH�WKH�ILUVW�DFWLYLW\��&UHDWH$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ��WR�JHWDQ�RYHUYLHZ�DERXW�WKH�WDVNV�WKLVDFWLYLW\�FRQWDLQV�

2

3

1

Chapter 2: Authorizations and ASAP

Knowledge Corner

Release 4.6A/B2–5

�� :RUN�\RXU�ZD\�WKURXJK�WKHGLIIHUHQW�WDVNV�

�� :KHQ�\RX�ILQLVK�WKHVH�WDVNV�FRQWLQXH�ZLWK�WKH�QH[W�DFWLYLW\�DQGLWV�WDVNV�

.QRZOHGJH�&RUQHU

7KH�.QRZOHGJH�&RUQHU��.&��LV�D�FROOHFWLRQ�RI�UHVRXUFHV�WKDW�KHOSV�\RX�WR�DFFHOHUDWH�WKH�5��LPSOHPHQWDWLRQ��,Q�RUGHU�WR�DFFHVV�DOO�DYDLODEOH�DXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROV�LQ�WKH�.QRZOHGJH&RUQHU��IROORZ�WKH�VWHSV�EHORZ�

�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�

�� 2Q�WKH�.&�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH�6$33URGXFWV�→��&URVV�$SSOLFDWLRQ�→$XWKRUL]DWLRQV�

�� 7KH�XSSHU�ULJKW�WLOH�VKRZV�DQH[SODQDWLRQ�RI�WKH�FRQWHQWV�IURP�WKHOHIW�

�� 7KH�ORZHU�ULJKW�WLOH�VKRZV�DOODXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROVDYDLODEOH�LQ�WKH�.&�

2

3

2

4

Chapter 2: Authorizations and ASAP

Questions and Answers Database (Q&Adb)

Authorizations Made Easy2–6

4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�

:KDW�,V�WKH�4$GE"

7KH�4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE��LV�D�WRRO�WKDW�KHOSV�\RX�WR�DQDO\]H�DQGGHWHUPLQH�WKH�VFDOH�DQG�VFRSH�RI�\RXU�V\VWHP�LPSOHPHQWDWLRQ�GXULQJ�WKH�%XVLQHVV�%OXHSULQWSKDVH�RI�DQ�$6$3�LPSOHPHQWDWLRQ�SURMHFW��,Q�WKH�4$GE��DOO�SURFHVVHV�WKDW�FDQ�EHLPSOHPHQWHG�LQ�WKH�5���6\VWHP�DUH�GLVSOD\HG�LQ�D�WUHH�FDOOHG�WKH�UHIHUHQFH�VWUXFWXUH��:KLOHGHILQLQJ�WKH�%XVLQHVV�%OXHSULQW��\RX�DUH�VHWWLQJ�WKH�EXVLQHVV�SURFHVVHV�LQ�VFRSH�WKDW�\RX�DLPWR�LPSOHPHQW�ZLWK�WKH�5���6\VWHP�

$V�RI�$6$3�5HOHDVH����%��\RX�FDQ�FUHDWH�XVHU�UROHV�LQ�WKH�4$GE�DQG�DVVLJQ�WKH�SURFHVVHVWR�EH�LPSOHPHQWHG�WR�WKHVH�UROHV��7KLV�LQIRUPDWLRQ�LV�ODWHU�SDVVHG�WR�WKH�$XWKRUL]DWLRQ�/LVWZKHUH�\RX�FDQ�FRPSOHWH�WKH�XVHU�UROH�GHILQLWLRQ�

+RZ�WR�:RUN�ZLWK�WKH�4$GE

)RU�GHWDLOV�RQ�KRZ�WR�FUHDWH�DQG�PDLQWDLQ�XVHU�UROHV�ZLWKLQ�WKH�4$GE��VHH�WKH�4$GERQOLQH�KHOS�

+RZ�WR�*HQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE

,Q�RUGHU�WR�UHILQH�WKH�XVHU�UROHV�WKDW�\RX�KDYH�GHILQHG�LQ�WKH�4$GE��\RX�FDQ�JHQHUDWH�WKH$XWKRUL]DWLRQ�/LVW��'XULQJ�WKH�JHQHUDWLRQ�RI�WKH�$XWKRUL]DWLRQ�/LVW��ERWK�WKH�SURFHVVHV�VHW�LQVFRSH�DQG�WKH�GHILQHG�XVHU�UROHV�DUH�WUDQVIHUUHG�WR�WKH�$XWKRUL]DWLRQ�/LVW��)RU�GHWDLOV�RQKRZ�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE��VHH�WKH�4$GE�RQOLQH�KHOS�

$XWKRUL]DWLRQ�/LVW

:KDW�,V�WKH�$XWKRUL]DWLRQ�/LVW"

7KH�$XWKRUL]DWLRQ�/LVW�LV�DQ�([FHO�ZRUNVKHHW�WKDW�KHOSV�\RX�WR�PRGHO�\RXU�XVHU�UROHV�SULRUWR�WKH�LPSOHPHQWDWLRQ�LQ�WKH�5���6\VWHP��8VLQJ�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FDQ�GHVLJQ�XVHUUROHV�LQ�DQ�HDUO\�V\VWHP�LPSOHPHQWDWLRQ�SKDVH�HYHQ�ZLWKRXW�KDYLQJ�LQVWDOOHG�5���

,Q�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FUHDWH�XVHU�UROHV�DQG�GHILQH�WKH�WUDQVDFWLRQV�DVVRFLDWHG�ZLWKWKHVH�UROHV��7R�PRGHO�WKH�XVHU�UROHV��WKH�$XWKRUL]DWLRQ�/LVW�SURYLGHV�\RX�WZR�GLIIHUHQWYLHZV�< 3URFHVV�YLHZ

7KH�SURFHVV�YLHZ��5ROHV�'HVLJQ���4$GE�VFRSH�WDE��LV�JHQHUDWHG�IURP�WKH�4$GE�DQGFRQWDLQV�WKH�SURFHVVHV�WKDW�KDYH�EHHQ�VHW�LQ�VFRSH�GXULQJ�WKH�%XVLQHVV�%OXHSULQW�SKDVH�$OO�SURFHVVHV�DUH�GLVSOD\HG�LQ�WKH�VDPH�KLHUDUFK\�DV�LQ�WKH�UHIHUHQFH�VWUXFWXUH�RI�WKH4$GE��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WKH�SURFHVVHV�WR�LQFOXGH�WKHP�LQ�WKHXVHU�UROHV�

Chapter 2: Authorizations and ASAP

Authorization List

Release 4.6A/B2–7

< 0HQX�YLHZ

,Q�WKH�PHQX�YLHZ��5ROHV�'HVLJQ�¥�6$3�PHQX�WDE���DOO�WUDQVDFWLRQV�LQ�WKH�VWDQGDUG�6$3PHQX�DUH�GLVSOD\HG��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WUDQVDFWLRQV�IURP�WKH�6$3PHQX�WR�LQFOXGH�WKHP�LQ�\RXU�XVHU�UROHV�

$IWHU�FRPSOHWLQJ�WKH�PRGHOLQJ�RI�XVHU�UROHV��\RX�FDQ�JHQHUDWH�DQ�RYHUYLHZ�RI�DOOWUDQVDFWLRQV�LQFOXGHG�LQ�HDFK�XVHU�UROH�

+RZ�WR�:RUN�ZLWK�WKH�$XWKRUL]DWLRQ�/LVW

7R�XVH�WKH�$XWKRUL]DWLRQ�/LVW�IRU�WKH�GHVLJQ�DQG�LPSOHPHQWDWLRQ�RI�\RXU�DXWKRUL]DWLRQFRQFHSW��IROORZ�WKH�VWHSV�EHORZ�

�� *HQHUDWH�DXWKRUL]DWLRQ�OLVW�IURP�WKH�4$GE

�� 'HILQH�XVHU�UROHV

�� *HQHUDWH�XVHU�UROHV�RYHUYLHZ

�� %XLOG�XVHU�UROHV

*HQHUDWH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE

7R�ZRUN�ZLWK�SURFHVV�YLHZ��\RX�QHHG�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE�3URFHHG�DV�GHVFULEHG�LQ�WKH�4$GE�RQOLQH�KHOS�

(YHQ�LI�\RX�GR�QRW�ZRUN�ZLWK�WKH�4$GE��\RX�FDQ�XVH�WKH�$XWKRUL]DWLRQ�/LVW��7KH�WHPSODWHFDQ�EH�IRXQG�LQ�WKH�$6$3�.QRZOHGJH�&RUQHU��+RZHYHU��WKH�SURFHVV�YLHZ�ZLOO�EH�HPSW\��WKXV\RX�FDQ�GHILQH�\RXU�XVHU�UROHV�RQO\�YLD�WKH�PHQX�YLHZ�

Chapter 2: Authorizations and ASAP

Authorization List

Authorizations Made Easy2–8

'HILQH�8VHU�5ROHV

7R�GHILQH�D�XVHU�UROH��\RX�QHHG�WR�FUHDWH�D�XVHU�UROH�DQG�DVVLJQ�SURFHVVHV�RU�WUDQVDFWLRQV�WR�WKDW�XVHU�UROH�

�� 2SHQ�WKH�$XWKRUL]DWLRQ�/LVW�

�� (QWHU�%XVLQHVV�$UHD�DQG�5ROH1DPH�IRU�WKH�XVHU�UROH�WKDW\RX�ZDQW�WR�FUHDWH�

�� 0DUN�WKH�GHVLUHG�WUDQVDFWLRQV�

&KRRVH�&OLFN�KHUH�IRU�LQVWUXFWLRQVWR�JHW�DQ�H[SODQDWLRQ�RQ�WKHIXQFWLRQDOLW\�RI�WKH�$XWKRUL]DWLRQ/LVW�

7KH�FRPSOHWH�IXQFWLRQDOLW\�RI�WKH$XWKRUL]DWLRQ�/LVW�LV�GHVFULEHG�LQWKH�KHOS�ZLQGRZ�VKRZQ�WR�WKHULJKW�

2

3

Tip

Chapter 2: Authorizations and ASAP

Authorization List

Release 4.6A/B2–9

*HQHUDWH�8VHU�5ROHV�2YHUYLHZ

7R�JHQHUDWH�WKH�XVHU�UROHV�RYHUYLHZ�IURP�WKH�$XWKRUL]DWLRQ�/LVW�

�� 6HOHFW�WKH�7�&RGHV�SHU�5ROH�WDE�

�� &KRRVH�*HQHUDWH�2YHUYLHZ�WRFUHDWH�IRU�HDFK�XVHU�UROH�D�OLVWRI�WUDQVDFWLRQV�DVVLJQHG�WRWKDW�UROH�

�� )RU�DOO�XVHU�UROHV��WKH�VHOHFWHGWUDQVDFWLRQV�DUH�VXPPDUL]HGLQ�WKH�$XWKRUL]DWLRQ�/LVW�

(YHU\�WLPH�\RX�PDNH�FKDQJHV�WR�WKH�UROHV�RU�FUHDWH�QHZ�UROHV�WKH�7�&RGHV�SHU�5ROHRYHUYLHZ�QHHGV�WR�EH�UHJHQHUDWHG�

%XLOG�8VHU�5ROHV

8VLQJ�WKH�3*��FUHDWH�DOO�WKH�VLQJOH�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�UHTXLUHG�WR�LPSOHPHQW�WKHXVHU�UROHV�GHILQHG�LQ�WKH�$XWKRUL]DWLRQ�/LVW�

1

2

Chapter 2: Authorizations and ASAP

Authorization List

Authorizations Made Easy2–10

3–1

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH

*HQHUDWRU

&RQWHQWV

Overview ..................................................................................................................3–2

Confirming that the Profile Generator Is Active ..................................................3–2

Loading the USOBX_C and USOBT_C tables ......................................................3–4

Getting Support from the SAPNet – R/3 Frontend Notes....................................3–7

��

Chapter 3: Setting Up the Profile Generator

Overview

Authorizations Made Easy3–2

2YHUYLHZ

�8VLQJ�WKH�3URILOH�*HQHUDWRU��3*��LQ�5HOHDVH����[�PDNHV�VHQVH�IRU�QHZ�FXVWRPHUV�MXVWVWDUWLQJ�WKHLU�5���SURMHFW�DQG�FXUUHQW�FXVWRPHUV�ZLWK�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�LQ�DQHDUOLHU�5���UHOHDVH��0DLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68���DUH�QR�ORQJHU�UHTXLUHG��DQGFXVWRPHUV�ZKR�KDYH�SUHYLRXVO\�EHHQ�XVLQJ�WKLV�PHWKRG�VKRXOG�IDPLOLDUL]H�WKHPVHOYHV�ZLWKWKH�3*��,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWKRXW�WKH�3*��6$3�RIIHUV�\RX�DZD\�WR�PLJUDWH�WKHVH�SURILOHV�WR�WKH�3*�

)RU�LQIRUPDWLRQ�RQ�XSJUDGLQJ�WR�5HOHDVH�����IURP�D�SUHYLRXV�UHOHDVH��VHH�FKDSWHU����8SJUDGH�

6HWWLQJ�XS�WKH�3*�LQ����[�FRQVLVWV�RI�WZR�VWHSV�

�� &RQILUPLQJ�WKDW�WKH�3*�LV�DFWLYH�

�� /RDGLQJ�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��

&RQILUPLQJ�WKDW�WKH�3URILOH�*HQHUDWRU�,V�$FWLYH

:LWK�5���5HOHDVH������WKH�3*�LV�DOUHDG\�DFWLYDWHG��<RX�GR�QRW�KDYH�WR�VHW�WKH�V\VWHPSDUDPHWHU�LQ�WKH�5���LQVWDQFH�SURILOH�LI�\RX�KDYH�LQVWDOOHG�WKH�5���5HOHDVH�����DV�D�QHZV\VWHP��7KH�GHIDXOW�YDOXH�LV�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<�

&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU

,I�\RX�DUH�QRW�VXUH�ZKHWKHU�WKH�3*�LV�DFWLYDWHG��\RX�FDQ�FKHFN�WKH�LQVWDQFH�SURILOHSDUDPHWHU��7KH�IROORZLQJ�SURFHGXUH�VKRZV�\RX�KRZ�WR�FKHFN�LI�\RXU�SURILOH�SDUDPHWHU�LV�VHWFRUUHFWO\�DQG�DFWLYH��7R�FKHFN�LI�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�LV�VHW�FRUUHFWO\��UXQ�WKH�UHSRUW563$5$0�DV�VKRZ�EHORZ�

Chapter 3: Setting Up the Profile Generator

Confirming that the Profile Generator Is Active

Release 4.6A/B3–3

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�SA38�DQG�FKRRVH�(QWHU��RU�FKRRVH 6\VWHP�→�6HUYLFHV�→�5HSRUWLQJ��

�� (QWHU�RSPARAM�LQ�WKH�3URJUDPILHOG�

�� &KRRVH�([HFXWH�

$�OLVW�RI�SDUDPHWHU�QDPHV�DSSHDUV�ZLWK�FRUUHVSRQGLQJ�XVHU�GHILQHG�YDOXHV��7KH�SDUDPHWHUQDPHV�DUH�SURYLGHG�LQ�YDULDEOH�IRUP��$W�UXQWLPH��WKHVH�YDULDEOHV�DUH�UHSODFHG�ZLWK�DFWXDOYDOXHV��8VHU�GHILQHG�YDOXHV�DUH�WKH�DFWXDO�YDOXHV�RI�WKH�LQGLYLGXDO�SDUDPHWHUV�

�� ,I�DFWLYH��WKH�SURILOH�SDUDPHWHUIRU�WKH�3*�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�GLVSOD\HG�DV�D�<�LQWKH�WKLUG�FROXPQ�

8VH�WKH� �LFRQ�WR�VHDUFK�IRU�WKH�HQWU\�auth/no_check_in_some_cases�LQ�WKH�OLVW�LI�\RXGR�QRW�VHH�LW�ULJKW�DZD\�

,I�WKH�YDOXH�<�IRU�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�QRWGLVSOD\HG��\RX�PXVW�ILUVW�FKDQJH�WKH�LQVWDQFH�SURILOH�DQG�WKHQ�UHERRW�WKH�5���LQVWDQFH�)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�GR�WKLV��VHH�FKDSWHU�����8SJUDGH�

2

3

4

Tip

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Authorizations Made Easy3–4

/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV

/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV�LV�DFFRPSOLVKHG�LQ�WZR�VWHSV��� ,QLWLDO�FRS\LQJ�RI�6$3�GHIDXOWV�LQWR�WKH�FXVWRPHU�WDEOHV�� 7UDQVSRUWLQJ�WKH�GHIDXOWV�

,QLWLDO�&RS\LQJ�RI�6$3�'HIDXOWV�LQWR�WKH�&XVWRPHU�7DEOHV��68���

8VLQJ�WUDQVDFWLRQ�68����&RS\�LQLWLDO�GHIDXOWV���FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV��WDEOHV�862%;�DQG�862%7�7KLV�VWHS�LPSRUWV�WKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWV�IRU�WKH�DXWKRUL]DWLRQ�REMHFWV�ZLWKLQ�D�WUDQVDFWLRQ�DQGWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�3*�LQWR�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&��:H�GLVFXVV�KRZ�WRHGLW�WKHVH�YDOXHV�XVLQJ�WUDQVDFWLRQ�68���LQ�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SPRO�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�WUHH��FKRRVH�7RROV�→�$FFHOHUDWHG6$3�→�&XVWRPL]LQJ�→�(GLW�3URMHFW��

�� &KRRVH� �6$3�5HIHUHQFH�,0*�

�� ,Q�WKH�,0*��RSHQ�%DVLV�&RPSRQHQWV→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUVDQG�$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ3URILOH�*HQHUDWRU�DQG�FKRRVH� �QH[WWR�:RUN�RQ�6$3�&KHFN�,QGLFDWRUV�DQG)LHOG�9DOXHV�

7R�UHDFK�WKH�3URILOH�*HQHUDWRU��8SJUDGHDQG�)LUVW�,QVWDOODWLRQ�VFUHHQ�\RX�PD\DOWHUQDWLYHO\�XVH�WUDQVDFWLRQ�SU25�

3

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Release 4.6A/B3–5

�� 2Q�WKH�QH[W�VFUHHQ�VHOHFW�&RS\�6$3�WHVW�VWDWXVHV�DQG�ILHOG�YDOXHV��WKLV�WUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&RS\�6$3�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV��

�� &KRRVH� �QH[W�WR����,QLWLDOO\�ILOO�WKHFXVWRPHU�WDEOHV��LI�\RX�KDYH�QRWSUHYLRXVO\�ZRUNHG�ZLWK�WKH�3*�RULI�\RX�ZDQW�WR�UHWUDQVIHU�DOO�6$3GHIDXOW�YDOXHV��7KLV�VWHS�PD\�WDNHVHYHUDO�PLQXWHV�

,I�\RX�KDYH�QRW�SUHYLRXVO\�ZRUNHGZLWK�WKH�3*�RU�\RX�ZDQW�WR�UHWUDQVIHUDOO�6$3�GHIDXOW�YDOXHV��XVH����,QLWLDOO\ILOO�WKH�FXVWRPHU�WDEOHV�IXQFWLRQ�XQGHU,QVWDOOLQJ�WKH�3URILOH�*HQHUDWRU�

,I�\RX�KDYH�DOUHDG\�ZRUNHG�ZLWK�WKH3*�DQG�ZDQW�WR�FRPSDUH�\RXU�GDWDZLWK�WKH�6$3�GHIDXOW�YDOXHV��VHHFKDSWHU�����8SJUDGH�

�� $�ZDUQLQJ�PHVVDJH�DSSHDUV�RQ�D�GLDORJ�ER[��5HDG�LW�FDUHIXOO\�DQG�FKRRVH� �

5

6

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Authorizations Made Easy3–6

7UDQVSRUWLQJ�WKH�'HIDXOWV

�� &KRRVH� �QH[W�WR����7UDQVSRUW�WKHFXVWRPHU�WDEOHV�WR�WUDQVSRUW�WKH�3*FXVWRPHU�WDEOHV��862%;B&�DQG862%7B&��

$W�WKLV�WLPH�SHUIRUP�RQO\�VWHSV��DQG����'R�QRW�UXQ�VWHSV��$�WKURXJK�'�\HW��6HH�FKDSWHU�����8SJUDGH�IRUPRUH�LQIRUPDWLRQ�

1RWH�WKDW�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��DUH�FRPSOHWHO\�WUDQVSRUWHG��$OOFKDQJHV�WR�DXWKRUL]DWLRQ�FKHFNV�WKDW�ZHUH�PDGH�LQ�WKLV�WUDQVDFWLRQ�RU�LQ�68���DUH�DOVRWUDQVSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��7KLV�VWHS�UHSODFHV�DOO�WKH�ILHOG�YDOXH�DQG�FKHFN�LQGLFDWRUVHWWLQJV�LQ�WKH�WDUJHW�V\VWHP�

1R�DFWLYLW\�JURXSV�RU�DXWKRUL]DWLRQ�SURILOHV�DUH�WUDQVSRUWHG�LQ�WKLV�VWHS��7R�WUDQVSRUW�QHZO\JHQHUDWHG�DFWLYLW\�JURXSV��XVH�WKH�DFWLYLW\�JURXS�WUDQVSRUW�FRQQHFWLRQ�

�� &KRRVH� �DIWHU�WKH�UHSRUW�LV�ILQLVKHG�

�� &KRRVH� �RQ�WKH�IROORZLQJ�VFUHHQ�WR�ILQLVK�WKH�SURFHGXUH�

7

Chapter 3: Setting Up the Profile Generator

Getting Support from the SAPNet – R/3 Frontend Notes

Release 4.6A/B3–7

*HWWLQJ�6XSSRUW�IURP�WKH�6$31HW�²�5���)URQWHQG�1RWHV

$�VPRRWK�VHFXULW\�LPSOHPHQWDWLRQ�RI�\RXU�SURMHFW�LV�LPSRUWDQW��7KH�WRS�SULRULWLHV�RI�WKH6$31HW�²�5���)URQWHQG�1RWHV��IRUPHUO\�266��DUH�WR�VXSSRUW�\RXU�ZRUN�DQG�VSHHG�XS�\RXULPSOHPHQWDWLRQ��7KH�6$31HW�²�5���)URQWHQG�QRWHV�DUH�DQ�HDV\�WR�XVH��GLUHFWFRPPXQLFDWLRQ�OLQN�WR�6$3�VR�\RX�FDQ�TXLFNO\�DQG�HIILFLHQWO\�REWDLQ�SUREOHP�VROYLQJLQIRUPDWLRQ��6$31HW�²�5���)URQWHQG�QRWHV�JLYHV�\RX�D�IDVWHU�UHVSRQVH�WLPH�E\�DOORZLQJ�\RXWR�E\SDVV�WKH�6$3�KHOS�GHVN�DQG�HQWHU�SUREOHPV�GLUHFWO\�LQWR�RXU�GDWDEDVH�

%\�HQWHULQJ�SUREOHPV�RU�LQTXLULHV�GLUHFWO\�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��\RX�FDQ�< 7DNH�DGYDQWDJH�RI�5���VHUYLFHV��UHJDUGOHVV�RI�WKH�DYDLODELOLW\�DQG�ZRUNORDG�RI�WKH

UHVSRQVLEOH�KHOS�GHVN�SHUVRQQHO< 4XLFNO\�UHSRUW�\RXU�SUREOHPV< 'LUHFWO\�VXEPLW�\RXU�SUREOHPV�WR�ILUVW�OHYHO�FXVWRPHU�VHUYLFH�IRU�SURFHVVLQJ

$FFHVVLQJ�WKH�(UURU�1RWHV�'DWDEDVH

6$31HW�²�5���)URQWHQG�QRWHV�DFWLYHO\�LQYROYHV�\RX�LQ�WKH�SUREOHP�VROYLQJ�SURFHVV�E\JLYLQJ�\RX�GLUHFW�DFFHVV�WR�6$3·V�LQWHUDFWLYH�(UURU�1RWHV�GDWDEDVH��7KLV�GDWDEDVH�FRQWDLQVHUURU�OLVWLQJV�DQG�VROXWLRQV�WR�FRPPRQ�V\VWHP�SUREOHPV��:LWK�WKH�6$31HW�²�5���)URQWHQGQRWHV��\RX�FDQ�YLHZ�WKHVH�VROXWLRQV�ZLWKRXW�VXEPLWWLQJ�D�SUREOHP�PHVVDJH�WR�ILUVW�OHYHOFXVWRPHU�VHUYLFH��'LUHFW�DFFHVV�WR�WKH�(UURU�1RWHV�GDWDEDVH��ZLWK�WKH�6$31HW�²�5��)URQWHQG�QRWHV��DOVR�SURYLGHV�KHOSIXO�WLSV�RQ�DYRLGLQJ�SRWHQWLDO�SUREOHPV�

1RZ�LV�D�JRRG�WLPH�WR�ORRN�DW�WKH�6$31HW�²�5���)URQWHQG�QRWHV�OLVWHG�LQ�DSSHQGL[�$�7KHVH�QRWHV�KHOS�\RX�SUHSDUH�IRU�IXUWKHU�5���VHFXULW\�VHWXS�WDVNV�

<RX�VKRXOG�DOVR�ORRN�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LI�DQ\�H[SHULHQFHV�RFFXUWKDW�DUH�QRW�FRYHUHG�E\�WKLV�JXLGHERRN�

7R�XVH�6$31HW�¥�5���)URQWHQG�QRWHV�

�� &RQWDFW�\RXU�V\VWHP�DGPLQLVWUDWRU�IRU�DQ\�IXUWKHU�LQIRUPDWLRQ�DERXW�WKH�6$31HW�²5���)URQWHQG�QRWHV��

�� )LQG�RXW�ZKR�DOUHDG\�KDV�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LQ�\RXUFRPSDQ\�

�� 0DNH�VXUH�\RX�KDYH�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��

�� /RJ�RQ�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�DQG�EURZVH�WKURXJK�WKH�6$31HW�²�5��)URQWHQG�QRWHV�LQ�DSSHQGL[�$�

Chapter 3: Setting Up the Profile Generator

Getting Support from the SAPNet – R/3 Frontend Notes

Authorizations Made Easy3–8

3ULQWLQJ�,PSRUWDQW�6$31HW�²�5���)URQWHQG�1RWHV

6LQFH�ZH�UHIHU�WR�FHUWDLQ�6$31HW�²�5���)URQWHQG�QRWHV�LQ�WKLV�JXLGHERRN��SOHDVH�OHDUQ�KRZWR�SULQW�D�QRWH�SURSHUO\��7KH�SULQW�IXQFWLRQ�LV�QRW�VXSSRUWHG�LQ�6$31HW�²�5���)URQWHQGQRWHV��VR�\RX�PXVW�ILUVW�GRZQORDG�WKH�QRWH�DQG�SULQW�LW�ORFDOO\��5HDG�QRWHV�������DQG������WR�IDPLOLDUL]H�\RXUVHOI�ZLWK�GRZQORDGLQJ�DQG�SULQWLQJ�WKH�QRWHV��%HIRUH�\RX�FRQWLQXH��SULQWRXW�WKH�QRWHV�LQ�DSSHQGL[�$�DQG�NHHS�WKHP�DV�KDQG\�UHIHUHQFH�WRROV�

$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�<RXU�5���6\VWHP

$GYDQFH�FRUUHFWLRQV�VKRXOG�EH�DSSOLHG�RQO\�ZLWK�WKH�DSSURYDO�RI�WKH�%DVLV�6\VWHP$GPLQLVWUDWRU�

7KH�5���6\VWHP�QHHGV�FHUWDLQ�FRUUHFWLRQV�WR�SHUIRUP�SURSHUO\��7R�DSSO\�WKHVH�FRUUHFWLRQV�LQDGYDQFH��UHIHU�WR�6$31HW�²�5���)URQWHQG�QRWH�������IRU�WKH�DYDLODELOLW\�RI�WKH�3*�KRWSDFNDJHV�IRU�5HOHDVHV����$�DQG����%�

4–1

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ

&RQWHQWV

Overview ..................................................................................................................4–2

System Users ..........................................................................................................4–2

User Groups ............................................................................................................4–5

Authorizations and Authorization Profiles...........................................................4–6

Mass Operations .....................................................................................................4–6

Creating a New User (Client-Specific)...................................................................4–7

Changing a User’s Password ..............................................................................4–10

User Information System .....................................................................................4–12

��

Chapter 4: User Administration

Overview

Authorizations Made Easy4–2

2YHUYLHZ

<RX�KDYH�WZR�RSWLRQV�WR�VHW�XS�\RXU�XVHU�DGPLQLVWUDWLRQ�< &HQWUDO�8VHU�$GPLQLVWUDWLRQ< &OLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ

,Q�WKLV�FKDSWHU��ZH�RQO\�GHVFULEH�WKH�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��,I�\RX�DUH�XVLQJ�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ��VHH�FKDSWHU�����6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�PRUHLQIRUPDWLRQ�

5���DOORZV�\RX�WR�GHILQH�DQG�PDLQWDLQ�XVHUV�DQG�XVHU�DXWKRUL]DWLRQV�E\�JLYLQJ�\RX�SUHFLVHFRQWURO�RYHU�XVHU�DFFHVV��7KH�GHILQLWLRQ�DQG�YDOLGDWLRQ�RI�DXWKRUL]DWLRQ�WHFKQRORJ\�LVLQWHJUDWHG�LQWR�WKH�6$3�GHYHORSPHQW�HQYLURQPHQW�DQG�LV�HDVLO\�DGGHG�WR�FXVWRPHUPRGXOHV�

$OWKRXJK�XVHU�DGPLQLVWUDWLRQ�LV�DQ�RQJRLQJ�SURFHVV��\RX�VKRXOG�QRW�DGPLQLVWHU�\RXU�XVHUVLQ�D�SURGXFWLYH�HQYLURQPHQW��3HUIRUP�XVHU�DGPLQLVWUDWLRQ�WDVNV�LQ�\RXU�'(9�V\VWHP��:KHQ\RX�WUDQVSRUW�WKH�DFWLYLW\�JURXSV��WKH�XVHUV�DUH�DOVR�WUDQVSRUWHG�WKURXJK�WKH�4$6�WR�\RXU35'�V\VWHP��ZKHQHYHU�XVHUV�DQG�DXWKRUL]DWLRQ�REMHFWV�DUH�< &UHDWHG< 'HOHWHG< &KDQJHG< 0RQLWRUHG

+RZHYHU��\RX�PLJKW�KDYH�GLIIHUHQW�XVHUV�LQ�WKH�'(9�DQG�4$6�V\VWHP�WKDW�\RX�GR�QRW�QHHGLQ�\RXU�35'�V\VWHP�ODWHU��IRU�H[DPSOH�D�GHYHORSHU���$Q�DGPLQLVWUDWRU·V�UROH�LQ�WKLV�SURFHVVYDULHV�GHSHQGLQJ�RQ�KRZ�XVHU�DGPLQLVWUDWLRQ�WDVNV�DUH�GHOHJDWHG�

(YHQ�LI�\RX�DUH�XVLQJ�WKH�+5�PRGXOH��XVHU�DGPLQLVWUDWLRQ�VWLOO�QHHGV�WR�EH�VHW�XS��EXWPDLQWHQDQFH�LQ�WKH�ORQJ�UXQ�LQFOXGHV�RWKHU�IDFHWV�

6\VWHP�8VHUV

,Q�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��XVHUV�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFK�FOLHQW�LQ\RXU�V\VWHP��$�XVHU�GHILQLWLRQ�KDV�PDQ\�RI�WKH�IROORZLQJ�FRPSRQHQWV�< %DVLF�XVHU�GDWD

� 1DPH� 3DVVZRUG� $GGUHVV� &RPSDQ\�LQIRUPDWLRQ

Chapter 4: User Administration

System Users

Release 4.6A/B4–3

< 8VHU�GHIDXOWV� /RJRQ�ODQJXDJH� 'HIDXOW�SULQWHU� 'DWH�DQG�GHFLPDO�IRUPDWV� 'HIDXOW�WLPH�]RQH

< 8VHU�SURILOH�LQIRUPDWLRQ� 3DUWV�RI�5���D�XVHU�FDQ�DFFHVV� 8VHU�JURXSV� $FWLYH�DQG�H[SLUDWLRQ�GDWHV�RI�D�XVHU·V�DFFRXQW

7KHUH�DUH�WZR�ZD\V�WR�FUHDWH�XVHUV��)LUVW��IURP�VFUDWFK��E\�GHILQLQJ�WKH�YDULRXV�XVHUFRPSRQHQWV��DQG�VHFRQG��E\�FRS\LQJ�DQ�H[LVWLQJ�XVHU��:KHQ�FRS\LQJ�DQ�H[LVWLQJ�XVHU��\RXPD\�DOVR�FRS\�WKH�GHIDXOWV��DGGUHVV��DQG�PHPRU\�SDUDPHWHU�VHWWLQJV�

([WHUQDO�5���8VHUV

([WHUQDO�XVHUV�LQFOXGH�WKRVH�FUHDWHG�IRU�:LQGRZV�17�DFWLYLWLHV��IRU�H[DPSOH�6$36,'!DGP��DGPLQLVWUDWRU��DQG�6$36HUYLFH��6$36,'!��DQG�GDWDEDVH�FRQQHFWLRQV�6$35���GDWDEDVH�DGPLQLVWUDWRU��DQG�64/�XVHUV��

,QWHUQDO�5���8VHUV

,QWHUQDO�XVHUV�DUH�FUHDWHG�DQG�PDLQWDLQHG�LQ�5����(DFK�XVHU�LV�DVVLJQHG�D�XVHU�W\SH�ZKLFKFRQWUROV�KRZ�WKH�XVHU�LQWHUDFWV�ZLWK�5���

,QWHUQDO�XVHU�W\SHV�LQFOXGH�< 'LDORJ< %DWFK�'DWD�&RPPXQLFDWLRQ��%'&�< %DFNJURXQG< &3,&

'LDORJ

7KH�GLDORJ�XVHU�W\SH�KDQGOHV�RQOLQH�WUDQVDFWLRQV�DQG�DSSOLHV�WR�PRVW�XVHUV�LQ�D�FRPSDQ\�'LDORJ�XVHUV�PD\�ORJ�RQ�DQG�LQWHUDFWLYHO\�ZRUN�ZLWK�5����7KHVH�XVHUV�DUH�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV�DQG�UHTXLUH�DXWKRUL]DWLRQ�SURILOHV�DQG�SDVVZRUGV��$OWKRXJK�LW�LV�QRWUHTXLUHG��GLDORJ�XVHUV�VKRXOG�EH�DVVLJQHG�WR�D�XVHU�JURXS�

%DWFK�'DWD�&RPPXQLFDWLRQ

7KH�EDWFK�GDWD�FRPPXQLFDWLRQ��%'&�RU�EDWFK�LQSXW��XVHU�W\SH�LV�XVHG�IRU�DXWKRUL]DWLRQFKHFNV�ZKHQ�SURFHVVLQJ�D�EDWFK�LQSXW�VHVVLRQ��7KHVH�XVHUV�FDQQRW�ORJ�RQ�RU�ZRUNLQWHUDFWLYHO\�DQG�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

%DFNJURXQG

7KH�EDFNJURXQG�XVHU�W\SH�UXQV�EDFNJURXQG�MREV��7KHVH�XVHUV�FDQQRW�ORJ�RQ�DQG�ZRUNLQWHUDFWLYHO\��7KH�DGPLQLVWUDWRU�FDQ�FUHDWH�EDFNJURXQG�XVHUV�ZLWK�WKH�QHFHVVDU\DXWKRUL]DWLRQV�WR�SHUIRUP�D�VHULHV�RI�WDVNV��7R�GHILQH�WKH�EDFNJURXQG�MREV��FKDQJH�WKH�XVHUILHOG�WR�WKH�EDFNJURXQG�XVHU�QDPH�\RX�FUHDWHG��$OO�DXWKRUL]DWLRQ�FKHFNV�JR�DJDLQVW�WKH

Chapter 4: User Administration

System Users

Authorizations Made Easy4–4

EDFNJURXQG�XVHU�UDWKHU�WKDQ�WKH�XVHU�FUHDWLQJ�WKH�MRE��$OWKRXJK�EDFNJURXQG�XVHUV�DUHXQDIIHFWHG�E\�SDVVZRUG�FRQWURO�SDUDPHWHUV��IRU�H[DPSOH�SDVVZRUG�H[SLUDWLRQV�RU�FKDUDFWHUOHQJWK���WKHVH�XVHUV�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

&3,&

7KH�&3,&�XVHU�LV�GHOLYHUHG�LQ�FOLHQW�����ZLWK�QR�DXWKRUL]DWLRQV�DQG�ORJV�RQ�XVLQJ�WKH�&3,&LQWHUIDFH��7KLV�LQWHUIDFH�GRHV�QRW�ZRUN�LQWHUDFWLYHO\�ZLWK�5����7KH�&3,&�XVHU�UHFHLYHV�UHWXUQFRGHV�IURP�H[WHUQDO�SURJUDPV�DQG�WKH�VWDWLVWLF�FROOHFWRUV��UHIHU�WR�6$31HW�²�5���)URQWHQGQRWH��������6$3&3,&�LV�QR�ORQJHU�UHTXLUHG�IRU�WKH�WUDQVDFWLRQ�60���

7KH�&3,&�XVHU�UHTXLUHV�DQ�DXWKRUL]DWLRQ�WR�SHUIRUP�WKH�QHFHVVDU\�DFWLYLWLHV�LQ�5���DQG�LVVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

6SHFLDO�5���8VHUV

6$3

,Q�FOLHQWV�����DQG������WKH�5���6\VWHP�LQFOXGHV�WKH�GHIDXOW�VXSHUXVHU�6$3 ��'XULQJLQVWDOODWLRQ��D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�IRU�6$3 ���+RZHYHU��6$3 �LV�SURJUDPPHG�LQ5���DQG�GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG��$IWHU�LQVWDOODWLRQ��RQFH�WKH�6$3 �XVHU�PDVWHUUHFRUG�EHFRPHV�DYDLODEOH��XVH�WKH�SDVVZRUG�06071992��,I�WKH�6$3 �XVHU�PDVWHU�UHFRUG�LVGHOHWHG�DQG�D�XVHU�ORJV�RQ�DJDLQ�DV�SAP*��ZLWK�WKH�LQLWLDO�SDVVZRUG�PASS��WKHQ�6$3 �LV�QRWVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�DQG�KDV�WKH�SDVVZRUG�PASS��ZKLFK�FDQQRW�EH�FKDQJHG�

'',&

7KH�'',&�XVHU�PDLQWDLQV�WKH�$%$3�'LFWLRQDU\�DQG�WKH�VRIWZDUH�ORJLVWLFV��$�'',&�XVHUPDVWHU�UHFRUG�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����ZKHQ�5���LV�LQVWDOOHG�DQG�KDVVWDQGDUG�SDVVZRUG�19920706��7KLV�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�WR�5���GXULQJ�D�QHZUHOHDVH�LQVWDOODWLRQ��3URWHFW�WKH�'',&�XVHU�IURP�XQDXWKRUL]HG�DFFHVV�E\�FKDQJLQJ�WKH�LQLWLDOSDVVZRUG�LQ�FOLHQWV�����DQG������7KLV�XVHU�LV�UHTXLUHG�IRU�FHUWDLQ�LQVWDOODWLRQ�DQG�VHWXSWDVNV��VR�LW�VKRXOG�QRW�EH�GHOHWHG�

(DUO\:DWFK

7KH�(DUO\:DWFK�XVHU�LV�RQO\�GHOLYHUHG�LQ�FOLHQW�����ZLWK�WKH�LQLWLDO�SDVVZRUG�SUPPORT�$FFHVV�LV�OLPLWHG�WR�PRQLWRULQJ�DQG�SHUIRUPDQFH�GDWD��7KH�(DUO\:DWFK�XVHU�LV�XVHG�E\6$3·V�(DUO\:DWFK�H[SHUWV��7KLV�XVHU�VKRXOG�QRW�EH�GHOHWHG��DQG�WKH�SDVVZRUG�VKRXOG�EHFKDQJHG��(DUO\:DWFK�VKRXOG�QRW�EH�XVHG�IRU�DQ\�SXUSRVH�RWKHU�WKDQ�(DUO\:DWFK�IXQFWLRQV�

Chapter 4: User Administration

User Groups

Release 4.6A/B4–5

&UHDWLQJ�8VHUV

,I�\RX�GR�QRW�XVH�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IXQFWLRQ��WKH�XVHU�PDVWHU�UHFRUGV�DQGDXWKRUL]DWLRQ�FRPSRQHQWV�DUH�FOLHQW�VSHFLILF�DQG�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFKV\VWHP�FOLHQW�

8VHUV�DUH�FUHDWHG�HLWKHU�IURP�VFUDWFK��XVLQJ�WUDQVDFWLRQ�68����RU�IURP�D�FRS\�RI�DQ�H[LVWLQJXVHU�E\�< 8VLQJ�WUDQVDFWLRQ�68��

< &UHDWLQJ�D�WHPSODWH�XVHU< &RS\LQJ�LW�WR�RWKHU�VLPLODU�XVHUV< 0DQXDOO\�HQWHULQJ�HDFK�SDVVZRUG

7KH�KLHUDUFKLFDO�VHFXULW\�HIIHFW�RI�XVHU�JURXSV�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�GLVWULEXWH�XVHUPDLQWHQDQFH�WDVNV�DQG�PDLQWDLQ�KLJK�VHFXULW\��:LWKLQ�D�VSHFLILF�JURXS��VHFXULW\�WDVNV�FDQ�EHGLVWULEXWHG�LQ�VXFK�D�ZD\�WKDW�WKUHH�SHRSOH�DUH�UHTXLUHG�WR�FUHDWH�XVHUV�DQG�PDQDJH�DFWLYLW\JURXSV�DQG�DXWKRUL]DWLRQV��7KXV��XVHU�DQG�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�FDQ�RQO\�FRPSOHWHFHUWDLQ�SDUWV�RI�WKH�UHTXLUHG�WDVNV��7KLV�SURFHVV�HQVXUHV�WKDW�QR�RQH�SHUVRQ�FDQ�FLUFXPYHQW5��·V�DXWKRUL]DWLRQ�VFKHPH��,I�D�FRPSDQ\�KDV�D�FHQWUDOL]HG�RUJDQL]DWLRQDO�VWUXFWXUH��DOOPDLQWHQDQFH�WDVNV�PD\�QHHG�WR�EH�SHUIRUPHG�E\�D�VLQJOH�XVHU��WKH�VR�FDOOHG�VXSHUXVHU�

7R�DOORZ�XVHUV�WR�VHH�WKHLU�RZQ�XVHU�PDVWHU�UHFRUGV��XVH�WUDQVDFWLRQ�68��'�

)RU�VHFXULW\�UHDVRQV��WKH�UHVSRQVLELOLW\�IRU�WKH�IROORZLQJ�PDLQWHQDQFH�WDVNV�VKRXOG�EHGLVWULEXWHG�DPRQJ�WKUHH�GLIIHUHQW�DGPLQLVWUDWRUV��VHH�FKDSWHU���IRU�DGGLWLRQDOLQIRUPDWLRQ��

8VHU�*URXSV

,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��1RWH�WKDW�RQH�JURXSLV�VWLOO�WKH�SULPDU\�JURXS�IRU�WKH�DXWKRUL]DWLRQ�FKHFN��7KLV�LV�WKH�JURXS�WKDW�DSSHDUV�LQ�WKHWRS�ILHOG�RQ�WKH�/RJRQ�GDWD�WDE�LQ�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�FDWHJRU\�8VHU�JURXSFDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��WKXV�LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ��<RX�PD\�XVH�DQ\�QDPLQJ�FRQYHQWLRQ�

8VHU�JURXSV�HQDEOH�WKH�DGPLQLVWUDWRU�WR�SURYLGH�DSSOLFDWLRQ�PDQDJHUV�ZLWK�WKH�ULJKWVUHTXLUHG�WR�FRQWURO�WKHLU�XVHUV��7KXV��WKHVH�PDQDJHUV�FDQ�FRQWURO�DOO�XVHUV�LQ�WKHLU�XVHUJURXSV�DQG�XVHUV�QRW�\HW�DVVLJQHG�WR�D�XVHU�JURXS��+RZHYHU��DSSOLFDWLRQ�PDQDJHUV�FDQQRWFKDQJH�XVHUV�LQ�RWKHU�XVHU�JURXSV�

$OWKRXJK�D�XVHU�JURXS�DIILOLDWLRQ�LV�QRW�UHTXLUHG�ZKHQ�\RX�FUHDWH�XVHUV��WKLV�DIILOLDWLRQ�LVQHFHVVDU\�WR�GHOHJDWH�XVHU�PDLQWHQDQFH�WDVNV�WR�DSSOLFDWLRQ�PDQDJHUV�DQG�VWDII��/DWHU��ZHVKRZ�KRZ�WR�GLVWULEXWH�XVHU�DGPLQLVWUDWLRQ�WDVNV�WR�WKH�DSSURSULDWH�DSSOLFDWLRQ�SHUVRQQHO�

Chapter 4: User Administration

Authorizations and Authorization Profiles

Authorizations Made Easy4–6

8VHU�JURXSV�DUH�QRUPDOO\�EDVHG�RQ�WKH�UHTXLUHPHQWV�GLFWDWHG�E\�WKH�GLIIHUHQW�DSSOLFDWLRQJURXSV��7KH�QXPEHU�RI�XVHUV�LQ�HDFK�XVHU�JURXS�DOVR�LQIOXHQFHV�WKHVH�JURXSV��6LQFH�XVHUJURXSV�GLVWULEXWH�XVHU�DGPLQLVWUDWLYH�WDVNV��\RXU�XVHU�JURXSV�ZLOO�EH�EDVHG�RQ�WKH�DYDLODEOHRUJDQL]DWLRQDO�VXSSRUW�VWUXFWXUH��$�IHZ�WKLQJV�WR�UHPHPEHU�ZKHQ�ZRUNLQJ�ZLWK�XVHUJURXSV�DUH�WKDW�

< 8VHU�JURXSV�DUH�FUHDWHG�ZLWK�WUDQVDFWLRQ�68*5��7RROV�→�$GPLQLVWUDWLRQ�→�8VHU0DLQWHQDQFH�→�0DLQWDLQ�8VHUV�*URXSV��

< 8VHU�JURXSV�DIIHFW�QRWKLQJ�XQWLO�\RX�VHW�XS�\RXU�JURXS�DGPLQLVWUDWRUV�ZLWKLQ�D�XVHUJURXS�

< (DFK�XVHU�FDQ�EHORQJ�WR�PDQ\�XVHU�JURXSV�< 8VHU�JURXSV�FDQ�EH�PDLQWDLQHG�EHIRUH�WKH\�DUH�DVVLJQHG�WR�XVHUV�

$XWKRUL]DWLRQV�DQG�$XWKRUL]DWLRQ�3URILOHV

$XWKRUL]DWLRQ�SURILOHV�DOORZ�\RX�WR�RUJDQL]H�DFFHVV�SULYLOHJHV�E\�WDVN�RU�MRE�IXQFWLRQ�6SHFLILFDOO\��WKLV�SURILOH�FRQWDLQV�WKH�DFFHVV�SULYLOHJHV�QHHGHG�WR�SHUIRUP�SDUWLFXODU�MREV�VXFK�DV�GDWD�HQWU\�RU�DSSOLFDWLRQ�PDLQWHQDQFH��7R�DXWKRUL]H�D�XVHU�IRU�D�MRE��\RX�RQO\�QHHGWR�JLYH�WKH�XVHU�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOH��7KH�3URILOH�*HQHUDWRU��3*�VLPSOLILHV�WKH�WDVN�RI�VHWWLQJ�XS�DXWKRUL]DWLRQ�SURILOHV�

0DVV�2SHUDWLRQV

7KH�5���6\VWHP�SURYLGHV�VHYHUDO�XWLOLWLHV�WR�DGPLQLVWHU�DOO��RU�D�VHOHFWHG�VHW��RI�XVHUV�&KDQJHV�PDGH�IRU�RQH�XVHU�LQ�XVHU�DGPLQLVWUDWLRQ�FDQ�DOVR�EH�PDGH�IRU�D�ODUJH�QXPEHU�RIXVHUV�DOO�DW�RQFH��<RX�FDQ�FKDQJH�ORJRQ�GDWD��GHIDXOW�YDOXHV��SDUDPHWHUV��DFWLYLW\�JURXSV�DQG�SURILOHV�IRU�D�SDUWLFXODU�VHW�RI�XVHUV��IRU�H[DPSOH��DOO�XVHUV�RI�D�XVHU�JURXS��

7R�DFFHVV�WKH�PDVV�FKDQJHV�VFUHHQ��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QYLURQPHQW�→�0DVVFKDQJHV�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��E\�PDNLQJ�PDVV�FKDQJHV�LQ�WKH�FHQWUDOV\VWHP���WKH�SURILOHV�DQG�DFWLYLW\�JURXSV�DUH�GLVSOD\HG�DFFRUGLQJ�WR�WKH�UHOHYDQW�V\VWHP�

7KH�PDVV�FKDQJH�IXQFWLRQV�RQ�WKH�LQLWLDO�VFUHHQ�DIIHFW�WKH�XVHU�GDWD�RI�DOO�GLVSOD\HG�XVHUV�XQOHVV�\RX�KDYH�VHOHFWHG�VSHFLILF�XVHUV�

)RU�HYHU\�FKDQJH�RQ�WKH�$GGUHVV��/RJRQ�GDWD��DQG�'HIDXOW�YDOXHV�WDEV��\RX�PXVW�FKRRVH&KDQJH��7KLV�HQVXUHV�WKDW�\RXU�FKDQJHV��VXFK�DV�GHOHWLRQ�RI�ILHOG�FRQWHQWV��WDNH�HIIHFW�IRUWKH�FRUUHVSRQGLQJ�ILHOGV�

Chapter 4: User Administration

Creating a New User (Client-Specific)

Release 4.6A/B4–7

&UHDWLQJ�D�1HZ�8VHU��&OLHQW�6SHFLILF�

'R�QRW�FUHDWH�RU�FKDQJH�XVHUV�LQ�FOLHQWV�����RU������7R�FUHDWH�RWKHU�QHZ�FOLHQWV��PDNH�D�FRS\�RIFOLHQW������VWDQGDUG�6$3�FOLHQW��

�� /RJ�RQ�WR�WKH�6$3�FOLHQW�ZKHUH�\RX�ZLVK�WR�FUHDWH�D�QHZ�XVHU�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→8VHU�PDLQWHQDQFH�→�8VHUV��

�� ,Q�WKH�8VHU�ILHOG� HQWHU�WKH�QHZ�XVHUQDPH�

�� &KRRVH� �

�� (QWHU�WKH�UHTXLUHG�GDWD�LQWR�WKHILHOGV��<RX�FDQ�DOZD\V�FRPH�EDFNDQG�FKDQJH�WKH�GDWD�ODWHU�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

7KH�EXWWRQ�2WKHU�FRPPXQLFDWLRQ��OLQNV�\RX�WR�WKH�FHQWUDO�DGGUHVVDGPLQLVWUDWLRQ�IXQFWLRQDOLW\��7KLVIXQFWLRQDOLW\�LV�QRW�FRYHUHG�LQ�WKLVERRN�

3

4

5

6

Tip

Chapter 4: User Administration

Creating a New User (Client-Specific)

Authorizations Made Easy4–8

�� (QWHU�DQ�,QLWLDO�SDVVZRUG��IRUH[DPSOH��init)�ZKLFK�WKH�XVHUXVHV�IRU�WKH�ILUVW�ORJ�RQ��'XULQJ�WKDWILUVW�ORJRQ��WKH�XVHU�FKRRVHV�D�QHZSDVVZRUG�

�� 5HHQWHU�WKH�SDVVZRUG�WR�YHULI\�WKHVSHOOLQJ�LQ�WKH�ILHOG�5HSHDW�SDVVZRUG�

�� <RX�PD\�HGLW�RWKHU�/RJRQ�GDWDILHOGV��VXFK�DV�8VHU�JURXS�RU�8VHUW\SH�DV�QHHGHG��VHH�WKH�7HFK7DONEHORZ��

��� &KRRVH�WKH�'HIDXOWV�WDE�

/RJRQ�'DWD�)LHOG�'HILQLWLRQV

8VHU�JURXS�IRU�DXWKRUL]DWLRQ�FKHFN

$VVLJQLQJ�XVHUV�WR�JURXSV�DOORZV�WKH�XVHU�PDLQWHQDQFH�WDVN�WR�EH�GLVWULEXWHG�DPRQJ�VHYHUDOXVHU�DGPLQLVWUDWRUV��<RX�FDQ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV�

9DOLG�IURP�9DOLG�WR

7KHVH�ILHOGV�DUH�XVHIXO�LI�\RX�DUH�FUHDWLQJ�D�WHPSRUDU\�XVHU��VXFK�DV�D�FRQWUDFWRU��7RLPPHGLDWHO\�DFWLYDWH�WKH�XVHU��OHDYH�WKH�9DOLG�IURP�ILHOG�EODQN��)RU�D�XVHU�ZLWK�QR�DQWLFLSDWHGWHUPLQDWLRQ�GDWH��OHDYH�WKH�9DOLG�WR�ILHOG�EODQN��ZKLFK�DOORZV�LQGHILQLWH�DFFHVV�

$FFRXQWLQJ�QXPEHU

7KLV�ILHOG�LV�IRU�D�IUHHO\�VHOHFWDEOH�DFFRXQWLQJ�QDPH�RU�QXPEHU��,I�\RX�XVH�WKH�6$3�DFFRXQWLQJV\VWHP��WKH�XVHU·V�V\VWHP�XVDJH�LV�DVVLJQHG�WR�WKLV�DFFRXQW��7KH�DFFRXQWLQJ�QDPH�RU�QXPEHUPD\�EH�XQLTXH�WR�HDFK�XVHU�RU�FDQ�EH�VKDUHG�DPRQJ�JURXSV�RI�XVHUV�

&RVW�&HQWHU

8VH�WKLV�ILHOG�IRU�WKH�XVHU·V�FRVW�FHQWHU�QXPEHU�

'LDORJ

6HOHFW�WKLV�XVHU�W\SH�IRU�QRUPDO�GLDORJ�XVHUV�

%'&

:KHQ�\RX�SURFHVV�D�EDWFK�LQSXW�VHVVLRQ��VHOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�RQO\�XVHG�IRUWKH�DXWKRUL]DWLRQ�FKHFN�

87

9

10

Chapter 4: User Administration

Creating a New User (Client-Specific)

Release 4.6A/B4–9

%DFNJURXQG

6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�EDWFK�UXQV�

&3,&

6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�&3,�&�FDOOV�

��� <RX�PD\�HLWKHU�HQWHU�D�6WDUW0HQXRU�OHDYH�WKH�ILHOG�EODQN�

��� (QWHU�D�ODQJXDJH�FRGH�LQ�WKH�/RJRQODQJXDJH�ILHOG�

��� (QWHU�D�GHIDXOW�2XWSXW'HYLFH��WKHSULQWHU�RU�ILOH�WR�ZKLFK�WKH�XVHU�ZLOODXWRPDWLFDOO\�SULQW��

��� :H�UHFRPPHQG�VHOHFWLQJ�2XWSXWLPPHGLDWHO\�DQG�'HOHWH�DIWHU�RXWSXW�

2XWSXW�LPPHGLDWHO\�UHOHDVHV�VSRROUHTXHVWV��2WKHUZLVH��VSRRO�UHTXHVWVVWD\�LQ�WKH�VSRRO�V\VWHP�XQWLOPDQXDOO\�UHOHDVHG��7KH�'HOHWH�DIWHURXWSXW�RSWLRQ�SUHYHQWV�VSRROUHTXHVWV�IURP�EHLQJ�UHWDLQHG�DIWHUSULQWLQJ�

��� 6HOHFW�WKH�GHVLUHG�'HFLPDO�QRWDWLRQDQG�'DWH�IRUPDW�

��� &KRRVH� �

)RU�HDFK�XVHU��ILHOG�GHIDXOWV�RU�SDUDPHWHUV�VWRUH�GHIDXOW�YDOXHV�IRU�5���ILHOGV��:KHQ�D�ILHOG�LVGLVSOD\HG��WKH�SDUDPHWHU·V�YDOXH��LI�DQ\��LV�D�GHIDXOW�YDOXH��8VHU�SDUDPHWHUV�DUH�RSWLRQDO�DQGGR�QRW�\HW�QHHG�WR�EH�GHILQHG�

7R�DVVLJQ�DQ�DXWKRUL]DWLRQ�SURILOH�WR�\RXU�QHZ�XVHU�PDVWHU�UHFRUG�

�� 6HOHFW�D�XVHU�UROH�WHPSODWH�RU�FUHDWH�DQ�DFWLYLW\�JURXS�\RXUVHOI�

�� *HQHUDWH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXSV�

�� $VVLJQ�DFWLYLW\�JURXSV�WR�QHZ�XVHUV�DQG�WUDQVIHU�SURILOHV�

)RU�PRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV��VHH�FKDSWHU���3UHSDULQJ�WKH�5��(QYLURQPHQW�IRU�*R�/LYH�

15

11

12

14

13

17

Chapter 4: User Administration

Changing a User’s Password

Authorizations Made Easy4–10

&KDQJLQJ�D�8VHU·V�3DVVZRUG

8VHUV�FDQ�FKDQJH�WKHLU�RZQ�SDVVZRUGV�DQG�DGPLQLVWUDWRUV�FDQ�FKDQJH�DQ\�XVHU·V�SDVVZRUG�8VHUV�PD\�RQO\�FKDQJH�WKHLU�SDVVZRUGV�RQFH�D�GD\��KRZHYHU��DQ�DGPLQLVWUDWRU�FDQ�FKDQJHSDVVZRUGV�ZKHQHYHU�UHTXLUHG��$Q�DGPLQLVWUDWRU�PD\�QHHG�WR�FKDQJH�SDVVZRUGV�DIWHU�DQHZ�LQVWDOODWLRQ��ZKHQ�WKH�GHIDXOW�SDVVZRUG�VKRXOG�EH�FKDQJHG�IRU�VHFXULW\�SXUSRVHV���RUZKHQ�XVHUV�ORVH�RU�IRUJHW�WKHLU�SDVVZRUGV��:KHQ�DQ�DGPLQLVWUDWRU�FKDQJHV�D�SDVVZRUG��WKHQHZ�SDVVZRUG�LV�RQO\�WHPSRUDU\��$W�WKH�QH[W�ORJRQ��WKH�XVHU�HQWHUV�WKLV�SDVVZRUG�DQG�WKHQVHOHFWV�D�SHUPDQHQW�RQH��5HIHU�WR�WKH�WDEOH�3DVVZRUG�5HTXLUHPHQWV�RQ�WKH�QH[W�SDJH�IRUSDVVZRUG�UHTXLUHPHQWV�

,I�\RX�GR�QRW�XVH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��WKH�XVHUV�DUH�FOLHQW�VSHFLILF��%HIRUHSURFHHGLQJ��EH�VXUH�WKDW�\RX�DUH�ORJJHG�RQ�WR�WKH�6$3�FOLHQW�WKDW�FRQWDLQV�WKH�XVHU�ZKRVHSDVVZRUG�\RX�ZDQW�WR�FKDQJH�

�� 7R�FKDQJH�D�XVHU·V�SDVVZRUG��LQ�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��

�� ,Q�8VHU��HQWHU�WKH�QDPH�RI�WKH�XVHUZKRVH�SDVVZRUG�\RX�ZRXOG�OLNH�WRFKDQJH�

�� &KRRVH� �

�� (QWHU�WKH�QHZ�LQLWLDO�SDVVZRUG��IRUH[DPSOH��init��DQG�UHHQWHU�WKHSDVVZRUG�IRU�YHULILFDWLRQ�LQ�WKHQH[W�OLQH�

�� &KRRVH� �&RS\�WR�FKDQJH�WKHSDVVZRUG�

3

2

4

5

Chapter 4: User Administration

Changing a User’s Password

Release 4.6A/B4–11

3DVVZRUG�5HTXLUHPHQWV

7KH�IROORZLQJ�WDEOH�OLVWV�WKH�SDVVZRUG�UHTXLUHPHQWV��$GGLWLRQDOO\��LW�ZLOO�KHOS�\RXGHWHUPLQH�LI�WKHVH�UHTXLUHPHQWV�FDQ�EH�FXVWRPL]HG��$SSHQGL[�&�DOVR�OLVWV�LPSRUWDQW�V\VWHPSURILOH�SDUDPHWHUV�WR�FXVWRPL]H�SDVVZRUG�VHWWLQJV�

3DVVZRUG�5HTXLUHPHQWV 'HIDXOW 2SWLRQV

0LQLPXP�OHQJWK�LV�WKUHH�FKDUDFWHUV 0LQLPXP�OHQJWK�FDQEH�LQFUHDVHG�

([SLUDWLRQ 3DVVZRUG�PXVWQRW�EH�FKDQJHG

1XPEHU�RI�GD\V�DIWHUZKLFK�D�SDVVZRUGPXVW�EH�FKDQJHG�FDQEH�VHW�

3DVVZRUG�PD\�QRW�EH�VHW�WR�DQ\�YDOXHLQ�D�ORFNRXW�OLVW

1R�SDVVZRUGVDUH�EORFNHGRWKHU�WKDQ�3$66DQG�6$3

&DQ�EH�FXVWRPL]HG�

)LUVW�FKDUDFWHU�PD\�QRW�EH�DQH[FODPDWLRQ�SRLQW�����RU�TXHVWLRQ�PDUN�"��

)L[HG�LQ�WKH�5��6\VWHP

)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�DSSHDU�LQWKH�VDPH�VHTXHQFH�LQ�WKH�XVHU�,'�

)L[HG�LQ�WKH�5��6\VWHP

)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�EHLGHQWLFDO�

)L[HG�LQ�WKH�5��6\VWHP

6SDFH�FKDUDFWHU�QRW�DOORZHG�ZLWKLQ�ILUVWWKUHH�FKDUDFWHUV�

)L[HG�LQ�WKH�5��6\VWHP

3DVVZRUG�PD\�QRW�EH�PASS�RU�SAP*� )L[HG�LQ�WKH�5��6\VWHP

$Q\�NH\ERDUG�FKDUDFWHU�LV�DOORZHG�LQ�DSDVVZRUG��3DVVZRUGV�DUH�QRW�FDVH�VHQVLWLYH��QR�GLVWLQFWLRQ�LV�PDGHEHWZHHQ�XSSHU��DQG�ORZHUFDVH�OHWWHUV�

)L[HG�LQ�WKH�5��6\VWHP

8VHUV�FDQ�FKDQJH�WKHLU�SDVVZRUGV�RQO\RQFH�D�GD\��7KLV�UHVWULFWLRQ�GRHV�QRWDSSO\�WR�XVHU�DGPLQLVWUDWRUV�

)L[HG�LQ�WKH�5��6\VWHP

$�SDVVZRUG�PD\�QRW�EH�FKDQJHG�EDFNWR�D�XVHU·V�SUHYLRXV�ILYH�SDVVZRUGV�7KLV�UHVWULFWLRQ�GRHV�QRW�DSSO\�WR�XVHUDGPLQLVWUDWRUV�

)L[HG�LQ�WKH�5��6\VWHP

Chapter 4: User Administration

User Information System

Authorizations Made Easy4–12

8VHU�,QIRUPDWLRQ�6\VWHP

,Q�WKH�8VHU�,QIRUPDWLRQ�6\VWHP��\RX�KDYH�WKH�RSWLRQ�WR�UXQ�GLIIHUHQW�UHSRUWV�WR�REWDLQLQIRUPDWLRQ�RQ�DOO�UHODWHG�GDWD�FRQFHUQLQJ�XVHUV��7KHVH�UHSRUWV�DUH�DOO�LQWHJUDWHG�LQ�WKHPHQX�WUHH�DQG�FDQ�EH�VWDUWHG�GLUHFWO\�IURP�WKHUH�

,QIRUPDWLRQ�LV�DYDLODEOH�IRU�WKH�IROORZLQJ�FDWHJRULHV�< 8VHU< 3URILOHV< $XWKRUL]DWLRQ�REMHFWV< $XWKRUL]DWLRQV< $FWLYLW\�JURXSV< 7UDQVDFWLRQV< &RPSDULVRQV< :KHUH�XVHG�OLVW< &KDQJH�GRFXPHQWV

5HWULHYLQJ�WKH�LQIRUPDWLRQ�LV�EDVLFDOO\�WKH�VDPH�IRU�DOO�FDWHJRULHV��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�LW�ZRUNV��7R�JHW�LQIRUPDWLRQ�IRU�D�GLIIHUHQW�FDWHJRU\��UXQ�WKHFRUUHVSRQGLQJ�UHSRUW�ZLWK�\RXU�VSHFLILF�UHTXLUHPHQWV�

Chapter 4: User Administration

User Information System

Release 4.6A/B

([DPSOH��)LQG�RXW�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQ�D�VSHFLILF�WUDQVDFWLRQ�

�� ,Q�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP��,QWKLV�PHQX�DUHD�WKHUH�DUH�VHYHUDO�GLIIHUHQW�UHSRUWV�WR�FKRRVH�IURP��7R�VHH�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQD�SDUWLFXODU�WUDQVDFWLRQ��\RX�PD\�FKRRVH�DQ\�WUDQVDFWLRQ�FRGH�\RX�DUH�LQWHUHVWHG�LQ�

�� ,Q�WKH�,QIRUPDWLRQ�6\VWHP�PHQXDUHD��GRXEOH�FOLFN�%\�WUDQVDFWLRQDXWKRUL]DWLRQV�

�� (QWHU�D�WUDQVDFWLRQ�FRGH�WRGHWHUPLQH�ZKLFK�XVHUV�KDYH�DFFHVVWR�WKDW�WUDQVDFWLRQ��IRU�H[DPSOH�FB01��

�� &KRRVH� �WR�VWDUW�WKH�UHSRUW�

�� $�WDEOH�DSSHDUV�OLVWLQJ�DOO�WKH�XVHUVDOORZHG�WR�UXQ�WKDW�WUDQVDFWLRQ�

�� &KRRVH� �LI�\RX�ZLVK�WR�UHWXUQDQG�UHYLHZ�D�GLIIHUHQW�WUDQVDFWLRQFRGH�

2

3

6

5

4

;

4–13

;;;;;;

Chapter 4: User Administration

User Information System

Authorizations Made Easy4–14

5–1

&KDSWHU��� 8VHU�5ROH�7HPSODWHV

&RQWHQWV

Overview ..................................................................................................................5–2

What Are User Role Templates? ...........................................................................5–2

User Menu................................................................................................................5–2

How to Work with User Role Templates ...............................................................5–3

Tips for an Administrator .....................................................................................5–35

Available User Role Templates............................................................................5–40

��

Chapter 5: User Role Templates

Overview

Authorizations Made Easy5–2

2YHUYLHZ

,Q�WKLV�FKDSWHU��ZH�GHVFULEH�KRZ�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�DQG�VHW�XS�\RXU�DFWLYLW\JURXSV��)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�ZLWK�WKH�DFWLYLW\�JURXSV�DQG�XVHU�UROHWHPSODWHV�ZLWK�WKH�3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�

:KDW�$UH�8VHU�5ROH�7HPSODWHV"

6$3�GHOLYHUV�PRUH�WKDQ�����XVHU�UROH�WHPSODWHV��IRUPHUO\�NQRZQ�DV�SUHGHILQHG�DFWLYLW\JURXSV���ZKLFK�FDQ�EH�GLUHFWO\�DVVLJQHG�WR�XVHUV��7KHVH�XVHU�UROH�WHPSODWHV�FRQVLVW�RIFRPSRVLWH�DFWLYLW\�JURXSV�RU�VLQJOH�DFWLYLW\�JURXSV�ZKLFK�DUH�SUHGHILQHG�ZLWK�WUDQVDFWLRQVDQG�DXWKRUL]DWLRQV��7KHVH�DFWLYLW\�JURXSV�DUH�FUHDWHG�E\�DSSOLFDWLRQ�FRQVXOWDQWV�LQFRQMXQFWLRQ�ZLWK�FXVWRPHUV�WR�IXOILOO�WKH�PRVW�VWULQJHQW�UHTXLUHPHQWV��8VHU�UROHV�DUHDVVLJQHG�LQGLYLGXDO�XVHUV��:KHQ�XVHUV�ORJ�RQ�WR�WKH�5���6\VWHP�WKH\�RQO\�VHH�WKH�SDUW�RI�WKH6$3�PHQX�ZKLFK�LV�UHTXLUHG�WR�IXOILOO�WKHLU�UROH�WDVNV��7KLV�LQGLYLGXDO�PHQX�LV�FDOOHG�WKHXVHU�PHQX��8VHUV�FDQ�DUUDQJH�WKH�VWUXFWXUH�RI�WKHLU�PHQX�DQG�KDYH�WKH�RSWLRQ�WR�DGGIUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�SHUVRQDO�IDYRULWHV�IROGHU��7KH\�FDQ�DOVR�DGG�ZHE�OLQNV�DQGOLQNV�WR�ORFDO�GRFXPHQWV��IRU�H[DPSOH�0LFURVRIW�:RUG�RU�([FHO�ILOHV�

7R�ZRUN�ZLWK�WKHVH�XVHU�UROH�WHPSODWHV��XVH�WKH�WUDQVDFWLRQ�3)&*�ZKLFK�LV�NQRZQ�DV�WKH3URILOH�*HQHUDWRU��3*���7KH�XVHU�UROH�WHPSODWHV�DUH�VWDQGDUG�GHOLYHUHG�DFWLYLW\�JURXSV�ILOOHGZLWK�GDWD��$OO�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�VWDUW�ZLWK�6$3B���$FWLYLW\�JURXSV�DUHXVHG�E\�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��7KH�ILUVW�SULRULW\�LV�WR�VHOHFW�WUDQVDFWLRQVDQG�UHSRUWV��7KLV�LQIRUPDWLRQ��WUDQVDFWLRQV�FRGHV��PHQX�SDWKV��UHSRUW�QDPHV��HWF���LV�VDYHGLQ�DQ�DFWLYLW\�JURXS��ZKLFK�VHUYHV�DV�D�GDWDEDVH�WR�KHOS�WKH�3*�GHWHUPLQH�WKH�QHFHVVDU\DXWKRUL]DWLRQV�DQG�JHQHUDWH�WKH�SURILOH�V��

<RX�PD\�VHW�XS�DV�PDQ\�DFWLYLW\�JURXSV�DV�\RXU�FRPSDQ\�UHTXLUHV��$�VLQJOH�DFWLYLW\��DWUDQVDFWLRQ��UHSRUW��RU�WDVN��FDQ�EH�LQFOXGHG�LQ�PDQ\�GLIIHUHQW�DFWLYLW\�JURXSV��DQG�DQDFWLYLW\�JURXS�FDQ�LQFOXGH�DV�PDQ\�VLQJOH�DFWLYLWLHV�DV�QHHGHG�

7R�VDYH�WLPH��6$3�SURYLGHV�XVHU�UROH�WHPSODWHV�VR�\RX�GR�QRW�KDYH�WR�FUHDWH�DOO�DFWLYLW\JURXSV�RQ�\RXU�RZQ��+RZHYHU��\RX�PD\�VWLOO�FUHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�RU�PRGLI\�WKHRQHV�6$3�GHOLYHUV�

8VHU�0HQX

8VHUV�RQO\�VHH�WKH�WUDQVDFWLRQV�WKH\�DUH�DOORZHG�WR�H[HFXWH�LQ�WKH�V\VWHP³WKRVH�GHILQHG�LQWKH�DFWLYLW\�JURXS�DVVLJQHG�WR�WKHP�

,Q�WKH�IROORZLQJ�H[DPSOH��WKH�XVHU�PHQX�IRU�WKH�XVHU�UROH�WHPSODWH�´4XDOLW\�0DQDJHUµ�LVVKRZQ��7KH�6$3�(DV\�$FFHVV�PHQX�VHUYHV�DV�WKH�LQGLYLGXDOL]HG�XVHU�PHQX��7KH�PHQX

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–3

VWUXFWXUH�LV�H[DFWO\�ZKDW�WKH�4XDOLW\�0DQDJHU�VHHV�ZKHQ�ORJJHG�RQ�WR�5����,Q�RXU�H[DPSOH�ZH�KDYH�DVVLJQHG�RQO\�RQH�DFWLYLW\�JURXS��RI�FRXUVH�\RX�FDQ�DVVLJQ�PDQ\�PRUH�

��������An example user menu using the user role template SAP_BC_CAT_QUALITYMANAGER_AG

<RX�FDQ�VWLOO�VZLWFK�WR�WKH�FRPSOHWH�6$3�VWDQGDUG�PHQX�XVLQJ� ��WKRXJK�WKH�XVHU�LV�QRWDXWKRUL]HG�WR�UXQ�HYHU\�WUDQVDFWLRQ�LQ�WKH�VWDQGDUG�PHQX��7R�UHWXUQ�WR�WKH�XVHU�PHQX�FKRRVH� �

+RZ�WR�:RUN�ZLWK�8VHU�5ROH�7HPSODWHV

7KHUH�DUH�GLIIHUHQW�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��<RX�PD\�HLWKHU�< 8VH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�DV�LV< &RS\�DQG�PRGLI\�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV< &UHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV

,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�H[SODLQ�HDFK�RSWLRQ�DQG�SURYLGH�WKH�EDVLF�NQRZOHGJH�\RX�QHHGWR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��,I�\RX�QHHG�PRUH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUNZLWK�WKH�XVHU�UROH�WHPSODWHV��UHIHU�WR�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

7KH�WRRO�XVHG�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV�DQG�DFWLYLW\�JURXSV�UHVSHFWLYHO\�LV�WKH3URILOH�*HQHUDWRU��3*���8VH�WKH�WUDQVDFWLRQ�PFCG�IRU�WKH�3*�

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–4

6WDUWLQJ�$FWLYLW\�*URXS�0DLQWHQDQFH��3)&*�

6WDUW�WKH�3URILOH�*HQHUDWRU��3*��E\�RQH�RI�WKH�IROORZLQJ�PHWKRGV�IURP�WKH�6$3�(DV\�$FFHVVVFUHHQ�

< &KRRVH� �&UHDWH�0HQX

< (QWHU�WKH�WUDQVDFWLRQ�PFCG�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH�(QWHU

< &KRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�3)&*�¥�$FWLYLW\�JURXSV

7KHQ�\RX�FDQ�VWDUW�ZRUNLQJ�ZLWK�WKH�XVHU�UROH�WHPSODWHV�

8VLQJ�WKH�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV

7R�XVH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�MXVW�DVVLJQ�WKH�XVHU�UROH�WHPSODWH�WR�D�XVHU�:KHQ�WKDW�XVHU�ORJV�RQ�WR�WKH�V\VWHP��D�VSHFLILF�XVHU�UROH�PHQX�DSSHDUV�

7R�DVVLJQ�XVHU�UROH�WHPSODWHV��\RX�KDYH�WZR�RSWLRQV�< 8VH�WKH�3*��VHOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��JHQHUDWH�LW��DVVLJQ�LW�WR�D�XVHU��DQG�GR�D

XVHU�FRPSDUH��7KH�IROORZLQJ�H[DPSOH�H[SODLQV�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�XVLQJWKH�3*�

< 8VH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�DVVLJQ�WKH�GHVLUHG�XVHU�UROH�WHPSODWHV�WR�DVSHFLILF�XVHU��6HH�FKDSWHU����$VVLJQLQJ�$FWLYLW\�*URXSV�

([DPSOH�

+RZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU��IRU�H[DPSOH�WKH�4XDOLW\�0DQDJHU�XVLQJ�WKH�3URILOH*HQHUDWRU�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B%&B&$7B4XDOLW\PDQDJHUB$*��

�� &KRRVH� �&KDQJH�

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�WKDW�FDQ�FRQWDLQ�PXOWLSOH�DFWLYLW\JURXSV�

2

Tip

3

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–5

�� &KRRVH�WKH�0HQX�WDE�WR�UHYLHZ�WKHWUDQVDFWLRQV�DVVLJQHG�WR�WKLV�DFWLYLW\JURXS�

,Q�WKH�6$3�GHOLYHUHG�DFWLYLW\�JURXSV\RX�DOZD\V�VHH�DQ�$FWLYLW\�JURXSGHVFULSWLRQ�RI�WKH�FRQWHQW�IRU�WKH�VHOHFWHGDFWLYLW\�JURXS��<RX�FDQ�DOVR�DGG�\RXURZQ�GHVFULSWLRQ�

�� 7KH�HQG�XVHU�ZLOO�VHH�WKH�IROGHUV�DQGWUDQVDFWLRQV�DV�WKH\�DSSHDU�LQ�WKH$FWLYLW\�JURXS�PHQX�

�� <RX�FDQ�FKDQJH�WKH�RUGHU�RI�DQ\LWHP�E\�VHOHFWLQJ�LW�DQG�XVLQJ� �DQG�WR�PRYH�LW�XS�DQG�GRZQ�

�� 6HOHFW�WKH�$XWKRUL]DWLRQV�WDE�WRJHQHUDWH�WKLV�DFWLYLW\�JURXS�

7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKH�SURILOH�LV�QRW�JHQHUDWHG\HW�

4

Tip

76

5

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–6

�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�

�� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH� FKRRVH� .

��� &KRRVH� �

8

9

10

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–7

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHUWR�WKLV�DFWLYLW\�JURXS�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�LV�DVVLJQHG�\HW�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FRPSRVLWH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�

11

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–8

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHGLQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU,'��,Q�WKH�WZR�DGGLWLRQDO�FROXPQV��)URP�WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW��<RX�FDQ�GHOHWH�WKH�XVHU,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDORQH�LQ�IURQW�RI�D�VHOHFWHG�XVHU�,'�XVLQJ�

7R�JHW�DGGLWLRQDO�LQIRUPDWLRQ�RQDVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

2Q�WKH�&RPSDUH�8VHU�0DVWHU�5HFRUG�RI$FWLYLW\�*URXS�VFUHHQ��QRWH�WKH�VWDWXV�RIWKH�XVHU�PDVWHU�UHFRUG��,W�VD\V��8VHUPDVWHU�UHFRUG�KDV�QRW�\HW�EHHQ�FRPSOHWHO\FRPSDUHG��7KHUHIRUH�SHUIRUP�FRPSOHWHFRPSDUH�LQ�VWHS����

��� &KRRVH� �&RPSOHWH�FRPSDUH�

12

13

14

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–9

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�ZLOO�VHH�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIURP�WKH�VHOHFWHG�DFWLYLW\�JURXS�

7KH�SURFHVV�LV�QRZ�FRPSOHWH�

:KHQ�WKH�XVHU�)7$<(+�ORJV�LQ��WKHVFUHHQ�WR�WKH�ULJKW�DSSHDUV�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�6$3B%&B&$7B48$/,7<0$1$*(5B$*��KDV�EHHQ�DVVLJQHG�WR�)7$<(+�

$V�\RX�FDQ�VHH��WKH�PHQX�LV�VLPLODU�WRWKH�RQH�FUHDWHG�LQ�WKH�3*�

15

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–10

&RS\LQJ�DQG�0RGLI\LQJ�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV

,I�\RX�DUH�QRW�FRPSOHWHO\�VDWLVILHG�ZLWK�WKH�FRQWHQW�RI�DQ�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWH�\RX�FDQ�PRGLI\�WKH�WHPSODWH��:H�UHFRPPHQG�WKDW�\RX�ILUVW�FRS\�WKH�DFWLYLW\�JURXS�DQG�WKHQPDNH�DQ\�FKDQJHV�WR�WKH�QHZO\�FUHDWHG�FRS\��&RS\LQJ�ILUVW�HQVXUHV�WKDW�\RX�NHHS�WKHRULJLQDO�6$3�WHPSODWH�LQWDFW��'RFXPHQW�WKH�FKDQJHV�\RX�PDNH�WR�WKH�VWDQGDUG�

,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FRS\�DQ�H[LVWLQJ�DFWLYLW\�JURXS��PRGLI\�LW��DQG�DVVLJQ�LWWR�D�XVHU�

,I�\RX�ZDQW�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

([DPSOH�

7KH�IROORZLQJ�H[DPSOH�GHPRQVWUDWHV�KRZ�WR�FRS\�DQG�UHQDPH�WKH�XVHU�UROH�WHPSODWH�IRUWKH�$FFRXQWV�3D\DEOH�$FFRXQWDQW��ZH�ZLOO�XVH�´$FFRXQWV�3D\DEOH�$FFRXQWDQWµ�YDULDQW��:H�DVVXPH�WKDW�RQO\�RQH�FRPSDQ\�FRGH�ZLOO�EH�XVHG��VR�ZH�GHOHWH�WKH�IROGHU�&URVV�&RPSDQ\�&RGH�7UDQVDFWLRQ��DV�ZHOO�DV�%LOO�RI�([FKDQJH�DQG�5HMHFW�3DUNHG�'RFXPHQWV�)XUWKHUPRUH��ZH�DGG�WZR�WUDQVDFWLRQV³05+5�(QWHU�,QYRLFH�DQG�05+*�(QWHU�&UHGLW0HPR³LQWR�WKH�IROGHU�,QYRLFH�FUHGLW�PHPR��)LQDOO\��ZH�DVVLJQ�WKH�QHZ�DFWLYLW\�JURXS),B$3B$&&2817$17B9$5,$17B$*�WR�D�XVHU�XVLQJ�WKH�3*�DQG�GHPRQVWUDWH�ZKDW�WKLVXVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B),B$3B$&&2817$17�B$*��

�� &KRRVH� �WR�FRS\�WKH�DFWLYLW\JURXS�

�� (QWHU�D�QDPH�IRU�WKH�QHZ�DFWLYLW\JURXS�

�� &KRRVH� �&RS\�VHOHFWLYHO\�WR�GHFLGHZKDW�REMHFWV�\RX�ZRXOG�OLNH�WR�FRS\ZLWK�WKH�DFWLYLW\�JURXS�

4

5

3

2

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–11

�� &KRRVH� �ZLWKRXW�VHOHFWLQJDQ\WKLQJ��<RX�VKRXOG�FRS\�WKHDFWLYLW\�JURXS�ZLWKRXW�WKH�XVHUDVVLJQPHQW�

�� &KRRVH� �&KDQJH�WR�PRGLI\�WKH�QHZDFWLYLW\�JURXS�

�� (QWHU�D�VKRUW�GHVFULSWLRQ�IRU�\RXUQHZ�DFWLYLW\�JURXS�LQ�WKH�'HVFULSWLRQILHOG�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�IUHH�WH[W�GHVFULSWLRQ�

��� &KRRVH�WKH�0HQX�WDE� 8

9

7

6

10

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–12

1RZ�\RX�VHH�WKH�PHQX�RI�WKHRULJLQDO�DFWLYLW\�JURXS�LQ�WKH�QHZDFWLYLW\�JURXS��2SHQ�WKH�GHVLUHGIROGHU�ZKHUH�\RX�ZDQW�WR�PRGLI\�RUGHOHWH�WUDQVDFWLRQV��,Q�RXU�H[DPSOH�ZH�ZRXOG�OLNH�WR�GHOHWH�WUDQVDFWLRQ)%9��DQG�WKH�IROGHUV�&URVV�FRPSDQ\FRGH�WUDQVDFWLRQ�DQG�%LOO�RI�H[FKDQJHXQGHU�WKH�3D\PHQW�DQG�FOHDULQJ�QRGH�

��� 6HOHFW�)%9��¥�5HMHFW�

��� 7R�GHOHWH�WKH�WUDQVDFWLRQ��FKRRVH� �

7R�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV��FKRRVH��,I�WKH\�DUH�WXUQHG�RQ��WKH�LFRQ

FKDQJHV�WR� �

��� 6HOHFW�WKH�&URVV�FRPSDQ\�FRGHWUDQVDFWLRQ�OLQH�DQG�FKRRVH� �

��� 6HOHFW�WKH�%LOO�RI�H[FKDQJH�OLQH�DQGFKRRVH� �

11

12

Tip

13

14

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–13

��� 7R�LQVHUW�D�QHZ�WUDQVDFWLRQ�FRGHPDQXDOO\��VHOHFW�WKH�IROGHU�LQ�ZKLFK\RX�ZRXOG�OLNH�WKDW�WUDQVDFWLRQ�WRDSSHDU�DQG�FKRRVH� �7UDQVDFWLRQ�IRU�H[DPSOH��ZH�ZRXOG�OLNH�WR�HQWHUWKH�WUDQVDFWLRQ�(QWHU�,QYRLFH�LQWR�WKHIROGHU�,QYRLFH�FUHGLW�PHPR��

��� (QWHU�WKH�WUDQVDFWLRQ�FRGH�LQWR�WKH7UDQVDFWLRQ�FRGH�ILHOG��,I�\RX�SUHVV(QWHU��WKH�WH[W�RI�WKH�WUDQVDFWLRQ�FRGHZLOO�DSSHDU�LQ�WKH�7H[W�FROXPQ�

��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�WRWUDQVIHU�WKH�WUDQVDFWLRQ�LQWR�WKHDFWLYLW\�JURXS�PHQX�

15

17

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–14

,I�\RX�ZRXOG�OLNH�WR�FKDQJH�WKH�SRVLWLRQRI�WKH�WUDQVDFWLRQ�LQ�WKH�KLHUDUFK\��VHOHFWWKH�WUDQVDFWLRQ�DQG�XVH�WKH� �WRPRYH�WKH�WUDQVDFWLRQ�GRZQ�RU�XS�

��� ,I�\RX�GR�QRW�NQRZ�WKH�WUDQVDFWLRQFRGH�DQG�ZRXOG�UDWKHU�VHOHFW�WKHWUDQVDFWLRQ�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX�

:H�UHFRPPHQG�\RX�VWD\�ZLWK�RQH�RSWLRQ��(LWKHU�HQWHU�WKH�WUDQVDFWLRQ�PDQXDOO\�RU�HQWHULW�WKURXJK�RQH�RI�WKH�PHQXV��6$3�PHQX��DFWLYLW\�JURXS��RU�DUHD�PHQX���,I�\RX�FKRRVH�WRHQWHU�IURP�WKH�PHQX��WKH�PHQX�SDWK�ZLOO�EH�WUDQVIHUUHG�WR�WKH�DFWLYLW\�JURXS�PHQX�DVZHOO�

18

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–15

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�FRGH�LW�LV�SRVVLEOH�WR�VHOHFW�PRUH�WKDQRQH��

��� &KRRVH� �7UDQVIHU�WR�WUDQVIHU�WKHWUDQVDFWLRQ�LQWR�DFWLYLW\�JURXSPHQX�

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�RU�RIIFKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKHWHFKQLFDO�QDPH�RI�WKH�WUDQVDFWLRQ��VFUROOWR�WKH�ULJKW�ZKHUH�LW�LV�VKRZQ�

7KH�WUDQVDFWLRQ�LV�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�PHQX�DQG�LQFOXGHVWKH�FRPSOHWH�PHQX�SDWK�IURP�WKH6$3�PHQX�

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�DQGPRYH�LW�WR�WKH�GHVLUHG�SRVLWLRQ�E\HLWKHU�< 'UDJ�DQG�GURS

< �RU�

< �0RYH�QRGH

,Q�WKLV�H[DPSOH��ZH�XVHG�GUDJ�DQGGURS�

20

21

19

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–16

��� 7R�GHOHWH�WKH�OHIW�PHQX�SDWK�IURPWKH�MXVW�LQVHUWHG�WUDQVDFWLRQ��VFUROOGRZQ�WR�WKH�PHQX�SDWK�WKDW�EHJLQVZLWK�6$3�5���6\VWHP�

��� 6HOHFW�WKH�GHVLUHG�IROGHU�DQG�FKRRVH�WR�GHOHWH�WKH�IROGHU�DQG�WKH

FRPSOHWH�VWUXFWXUH�EHORZ�LW�

22

23

We moved the transaction into thefolder Invoice/credit memo, below thetransaction MRHR-Enter Invoice�

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–17

$IWHU�\RX�ILQLVK�GHOHWLQJ�DQGLQVHUWLQJ�WUDQVDFWLRQV��PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�WUDQVDFWLRQV�LQWKLV�DFWLYLW\�JURXS�

��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWDWR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VHOHFW�H[SOLFLWO\�WKH�RSWLRQ�ZLWKZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�

24

25

Tip

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–18

1RZ�DGMXVW�WKH�DXWKRUL]DWLRQV�WR\RXU�VSHFLILF�QHHGV��2SHQ�WKHGHVLUHG�IROGHU�DQG�FKHFN�RU�FKDQJHWKH�YDOXHV�

,Q�WKLV�H[DPSOH��ZH�DUH�QRW�FKDQJLQJDQ\WKLQJ�EHFDXVH�HYHU\WKLQJ�IURPWKH�FRSLHG�DFWLYLW\�JURXS�LV�FRUUHFW�

)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�KRZ�WRZRUN�ZLWK�WKH�DXWKRUL]DWLRQ�ILHOGV�VHH�FKDSWHU����$GYDQFHG�3URILOH*HQHUDWRU�)XQFWLRQDOLW\�

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV

�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�H[LVW�ZLWKRXW�YDOXHV�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�

��� 7R�FRQWLQXH��FKRRVH� �

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�

27

28

26

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–19

'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���

6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�

$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�

29

30

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–20

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�FDQ�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR��FROXPQ�\RX�FDQHQWHU�WKH�GDWH�UDQJH�IRU�KRZ�ORQJWKH�XVHU�LV�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �

��� &KRRVH� �&RPSOHWH�FRPSDUH�

31

33

32

34

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–21

,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�

:KHQ�ORJJLQJ�RQ�WR�5����WKH�XVHUZLOO�VHH�D�VSHFLILF�XVHU�PHQX�ZLWKRQO\�WKRVH�WUDQVDFWLRQV�IURP�WKHVHOHFWHG�DFWLYLW\�JURXS�

7KLV�LV�WKH�VFUHHQ�D�XVHU�VHHV�ZKHQORJJLQJ�RQ�WR�WKH�V\VWHP�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�),B$3B$&&2817$17B9$5,$17B$*��KDV�EHHQ�DVVLJQHG�WR�WKDW�XVHU�

$V�\RX�FDQ�VHH��WKH�PHQX�ORRNV�WKHVDPH�DV�WKDW�FUHDWHG�LQ�WKH�3*�

tip

35

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–22

&UHDWH�\RXU�RZQ�8VHU�5ROH�7HPSODWHV

,I�\RX�QHHG�XVHU�UROH�WHPSODWHV�LQ�DGGLWLRQ�WR�WKH�RQHV�6$3�GHOLYHUV��\RX�FDQ�FUHDWH�\RXURZQ�DFWLYLW\�JURXS�

,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FUHDWH�DQ�DFWLYLW\�JURXS��VHOHFW�WUDQVDFWLRQ�FRGHV�JHQHUDWH�WKH�DXWKRUL]DWLRQV��DQG�DVVLJQ�WKHP�WR�D�XVHU�

,I�\RX�ZRXOG�OLNH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS�DQGWKHUHIRUH�WKH�XVHU�UROH�WHPSODWH�IRU�D�GDWD�HQWU\�FOHUN��$W�WKH�HQG��ZH�DVVLJQ�WKH�QHZDFWLYLW\�JURXS��ZKLFK�ZH�QDPH�),B$3B'$7$B(175<B&/(5.B$*�WR�D�XVHU�ZLWK�WKH�3*DQG�GHPRQVWUDWH�ZKDW�WKLV�XVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_ENTRY_CLERK��

�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�ZKLFK�FDQ�FRQWDLQ�PXOWLSOHDFWLYLW\�JURXSV��6HH�&UHDWLQJ�&RPSRVLWH$FWLYLW\�*URXSV�RQ�SDJH��²���

2

3

Tip

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–23

�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�0HQX�WDE�WR�VHOHFW�WKHWUDQVDFWLRQV�IRU�WKH�DFWLYLW\�JURXS�

7KHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�WUDQVDFWLRQV�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�DVVLJQ�DWUDQVDFWLRQ�E\�GRLQJ�RQH�RI�WKH�IROORZLQJ�

< (QWHULQJ�LW�GLUHFWO\��RQO\�WKH�WUDQVDFWLRQ�ZLWKRXW�WKH�PHQX�SDWK�LV�DGGHG�< 6HOHFWLQJ�LW�IURP�WKH�6$3�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�DUHD�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�

,Q�WKLV�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�WUDQVDFWLRQ�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DQG�KRZ�WRLQVHUW�WKH�WUDQVDFWLRQ�FRGH�GLUHFWO\��7KH�RWKHU�RSWLRQV�ZRUN�DFFRUGLQJO\�

:H�ZRXOG�OLNH�WR�LQVHUW�WKH�WUDQVDFWLRQV�IRU�´FUHDWLQJ�YHQGRU�LQYRLFHV�FUHGLW�PHPRµ��)%����DQG´GLVSOD\LQJ�GRFXPHQWVµ��)%����ZLWK�WKH�VDPH�PHQX�SDWK�DV�LW�LV�LQ�WKH�DFWLYLW\�JURXS�IRU�WKH�´DFFRXQWVSD\DEOH�DFFRXQWDQWµ��6$3B),B$3$&&2817B$*��

�� &KRRVH� �)URP�DFWLYLW\�JURXS�

,I�\RX�ZRXOG�OLNH�WR�VHOHFW�WKHWUDQVDFWLRQ�FRGH�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX��7KHQIROORZ�WKH�VDPH�SURFHGXUH�

�� ,Q�WKH�IROORZLQJ�VFUHHQ��VHOHFW�WKHDFWLYLW\�JURXS6$3B),B$3B$&&2817$17B$*�

��� &KRRVH�(QWHU�

8

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–24

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQV��)RUH[DPSOH��ZH�VHOHFWHG�< 6FKHGXOH�0DQDJHU< �&UHDWH�YHQGRU�LQYRLFHV�FUHGLW�PHPRV

�XQGHU�(QWU\�→�,QYRLFH�FUHGLWPHPR�

< 'LVSOD\�GRFXPHQW��XQGHU�(QWU\�→,QYRLFH�FUHGLW�PHPR�

< 'LVSOD\�YHQGRU��XQGHU�$FFRXQWPDVWHU�GDWD�

��� 7R�DGG�WKH�VHOHFWHG�WUDQVDFWLRQV�WRWKH�DFWLYLW\�JURXS�PHQX��FKRRVH�$GG�

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG�RII��FKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKH�WHFKQLFDOQDPH�RI�WKH�WUDQVDFWLRQ��VFUROO�IDUWKHU�WR�WKH�ULJKW�

,I�\RX�RSHQ�WKH�IROGHUV��\RX�FDQ�VHHKRZ�WKH�WUDQVDFWLRQV�DQG�SDWKV�KDYHEHHQ�LQVHUWHG��7KH\�DSSHDU�LQ�WKH8VHU�PHQX�LQ�H[DFWO\�WKH�VDPH�ZD\DV�GHILQHG�LQ�WKH�3*�

7KH�QH[W�WUDQVDFWLRQV�WR�LQVHUW�DUH)%���DQG�)%����)RU�WKRVHWUDQVDFWLRQV��ZH�ZLOO�FUHDWH�D�QHZIROGHU�FDOOHG�8VHU�VHWWLQJV�

��� 7R�FUHDWH�D�QHZ�IROGHU��FKRRVH�DQG�HQWHU�WKH�QHZ�QDPH�IRU�WKHIROGHU��LQ�H[DPSOH��8VHU�VHWWLQJV��

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQGRII�FKRRVH� �RU� ��7KH�WHFKQLFDO�QDPHVDSSHDU�LQ�IURQW�RI�WKH�WUDQVDFWLRQ�FRGHWH[W�

11

12

13

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–25

��� 7R�PRYH�WKH�IROGHU�WR�WKH�HQG�RI�WKHPHQX��KLJKOLJKW�WKH�IROGHU�\RX�ZDQWWR�PRYH�DQG�FKRRVH� �WR�PRYH�LWGRZQ�

��� 7R�HQWHU�WKH�WUDQVDFWLRQV��FKRRVH�7UDQVDFWLRQ�

��� (QWHU�WKH�GHVLUHG�WUDQVDFWLRQV��IRUH[DPSOH��FB00�DQG�FB07���7KHGHVFULSWLRQ�WH[W�IRU�WKH�WUDQVDFWLRQFRGH�DSSHDUV�LQ�ULJKW�FROXPQ�

��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�

$IWHU�\RX�VHOHFW�DOO�WKH�WUDQVDFWLRQVQHFHVVDU\��IRU�H[DPSOH��IRU�WKH�'DWD(QWU\�&OHUN��

��� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

14 15

16

17

18

19

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–26

��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�GDWD�FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLILFDOO\�VHOHFW�WKH�RSWLRQZLWK�ZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�

,I�QHFHVVDU\��WKH�'HILQH�2UJDQL]DWLRQDO/HYHOV�GLDORJ�ER[�DSSHDUV��7KLVVFUHHQ�XVXDOO\�SRSV�XS�WKH�ILUVW�WLPH\RX�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

8VH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHGHVLUHG�YDOXHV�RU�YDOXH�UDQJH�

��� ,Q�WKLV�H[DPSOH��ZH�VHOHFWHG�)XOODXWKRUL]DWLRQ�IRU�WKH�RUJDQL]DWLRQDOOHYHOV�

��� &KRRVH�6DYH�

&RPSDQ\�FRGHV��EXVLQHVV�DUHDV��DQG�SODQWV�DUH�H[DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV��<RXFDQ�GLVSOD\�DQG�PDLQWDLQ�D�OLVW�RI�H[LVWLQJ�OHYHOV�ZLWK�WUDQVDFWLRQ�6832�

20

Tip

2221

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–27

2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKH�DXWKRUL]DWLRQGDWD�DSSHDUV�KLHUDUFKLFDOO\�

7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKH�ILUVWOHYHO��EOXH���8QGHUQHDWK�\RX�ILQG�< 2EMHFW�FODVVHV� �SXUSOH< $XWKRUL]DWLRQ�REMHFW� �JUHHQ< $XWKRUL]DWLRQ� �\HOORZ< $XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH

��� 7R�PDLQWDLQ�WKH�DFWLYLW\��FOLFN�WKH$FWLYLW\�YDOXH�ILHOG�

([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV

�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

��� 6HOHFW�WKH�GHVLUHG�DXWKRUL]DWLRQ��IRUH[DPSOH��'LVSOD\��

��� 7R�WUDQVIHU��FKRRVH� �

��� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ, WR�PDLQWDLQ�WKH�$XWKRUL]DWLRQ�JURXS��FOLFN�WKH$XWKRUL]DWLRQ�JURXS�YDOXH�ILHOG�

23

24

25

26

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–28

��� (QWHU�RU�VHOHFW�WKH�GHVLUHG�YDOXH��ZHFKRRVH�)XOO�DXWKRUL]DWLRQ��

��� 7R�WUDQVIHU��FKRRVH� �

3URFHHG�ZLWK�DOO�RSHQ�ILHOGV�LQ�WKH�VDPHZD\�XQWLO�DOO�OLJKWV�VZLWFK�WR�JUHHQ�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�

��� 7R�FRQWLQXH��FKRRVH� �

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

31

30

29

32

27

28

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–29

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�

,I�\RX�FKRRVH� �DQG�IRUJHW�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�VKRZV�\RX�WKHVWDWXV�DQG�UHPLQGV�\RX�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS�

33

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–30

$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

34

3536

37

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–31

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �

��� �&KRRVH� �&RPSOHWH�FRPSDUH�

,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�VHHV�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIRU�WKH�VHOHFWHG�DFWLYLW\�JURXS�

38

39

Tip

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–32

7KH�XVHU�VHHV�WKH�6$3�(DV\�$FFHVV�¥�8VHUPHQX�IRU��XVHUªV�QDPH!�ZKHQ�ORJJLQJLQWR�5���DIWHU�WKH�DVVLJQPHQW�RI�WKHDFWLYLW\�JURXS��LQ�WKLV�H[DPSOH��WKH�XVHUPHQX�IURP�),B$3B'$7$B(175<B&/(5.��

8VHUV�FDQ�PDLQWDLQ�WKHLU�RZQ�IDYRULWHVDQG�LQVHUW�OLQNV�WR�WKHLU�PHQX��6HHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�IRU�GHWDLOV�

&UHDWLQJ�&RPSRVLWH�$FWLYLW\�*URXSV

,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�GHVFULEHG�KRZ�WR�FUHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV�XVLQJ�VLQJOH�DFWLYLW\JURXSV��<RX�DOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�FRPSRVLWH�DFWLYLW\�JURXSV��ZKLFK�FRQVLVW�RI�PXOWLSOH�VLQJOHDFWLYLW\�JURXSV��,Q�WKRVH�FRPSRVLWH�DFWLYLW\�JURXSV��\RX�FDQQRW�DVVLJQ�WUDQVDFWLRQV�GLUHFWO\��<RX�KDYH�WRHQWHU�VLQJOH�WUDQVDFWLRQV�LQWR�VHSDUDWH�DFWLYLW\�JURXSV�DQG�WKHQ�DVVLJQ�WKRVH�DFWLYLW\�JURXSV�WR�FRPSRVLWHDFWLYLW\�JURXS�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FRPSRVLWH�DFWLYLW\�JURXS�WKDW�LQFOXGHV�WKUHHVLQJOH�DFWLYLW\�JURXSV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 8QGHU�7\SH��VHOHFW�&RPSRVLWH�DFWLYLW\JURXS�

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_MANAGER��

�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�

3

4

2

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–33

�� ,Q�'HVFULSWLRQ� HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�WRVHOHFW�WKH�DFWLYLW\�JURXSV�IRU�WKLVFRPSRVLWH�DFWLYLW\�JURXS�

�� 6HOHFW� �WR�LQVHUW�WKH�DFWLYLW\JURXSV�

<RX�FDQ�RQO\�LQVHUW�DFWLYLW\�JURXSV�LQWRFRPSRVLWH�DFWLYLW\�JURXSV��,W�LV�QRWSRVVLEOH�WR�DVVLJQ�RWKHU�FRPSRVLWHDFWLYLW\�JURXSV�RU�VLQJOH�WUDQVDFWLRQV�WRD�FRPSRVLWH�DFWLYLW\�JURXS�

��� 6HOHFW�WKH�DFWLYLW\�JURXSV�WKDW�\RXZRXOG�OLNH�WR�LQFOXGH�LQ�WKHFRPSRVLWH�DFWLYLW\�JURXS�

��� &KRRVH� �

8

6

7

5

9

10

11

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–34

7KH�DFWLYLW\�JURXSV�KDYH�EHHQLQVHUWHG�

��� &KRRVH�WKH�0HQX�WDE�WR�FKHFN�WKDW\RX�FDQQRW�PDLQWDLQ�WKH�PHQX�IRUWKH�FRPSRVLWH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�XVHUV�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��FKRRVH�8VHUFRPSDUH�

12

13

1415

16

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–35

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� ��DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �

<RX�DUH�QRZ�ILQLVKHG�FUHDWLQJ�D�FRPSRVLWH�DFWLYLW\�JURXS�DQG�DVVLJQLQJ�WKLV�WR�D�XVHU��:KHQXVHUV�ORJ�RQ�WR�WKH�5���6\VWHP��WKHLU�PHQX�ZLOO�FRQWDLQ�WKH�WUDQVDFWLRQV�RI�WKH�WKUHH�LQVHUWHGDFWLYLW\�JURXSV�IURP�RXU�H[DPSOH�

7LSV�IRU�DQ�$GPLQLVWUDWRU

$V�DQ�DGPLQLVWUDWRU�ZLWK�VSHFLDO�DXWKRUL]DWLRQV��\RX�FDQ�KDYH�D�VKRUWFXW�IRU�DVVLJQLQJ�XVHUUROHV�WR�D�XVHU�ZLWKRXW�JRLQJ�LQWR�WUDQVDFWLRQ�3)&*�RU�68���

7R�VHH�DQG�SHUIRUP�WKH�VKRUWFXW��\RX�QHHG�DFFHVV�WR�WUDQVDFWLRQ�FRGH�3)&*��7KH�ILHOG�YDOXHVQHHG�WR�EH�VHW�WR�IXOO�DXWKRUL]DWLRQ�� ��LQ�WKH�DXWKRUL]DWLRQ�REMHFWV�6B86(5B352�6B86(5B*53��6B86(5B$87�DV�VKRZ�LQ�WKH�WDEOH�EHORZ�

$XWKRUL]DWLRQ�REMHFW�6B86(5B352

�$FWLYLW\

�$XWK��SURILOH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��352),/(�

$XWKRUL]DWLRQ�REMHFW�6B86(5B*53

�$FWLYLW\

�8VHU�JURXS�LQ�XVHU�PDVWHU�PDLQWHQDQFH��&/$66�

$XWKRUL]DWLRQ�REMHFW�6B86(5B$87

�$FWLYLW\

�$XWKRUL]DWLRQ�QDPH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��$87+�

�$XWK��REMHFW�LQ�XVHU�PDVWHU�PDLQWHQDQFH��2%-(&7�

� �IXOO�DXWKRUL]DWLRQ

Chapter 5: User Role Templates

Tips for an Administrator

Authorizations Made Easy5–36

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU�XVLQJ�WKLV�VKRUWFXW�

�� 2Q�WKH�6$3�(DV\�$FFHVV�VFUHHQ�FKRRVH� �2WKHU�PHQX�

7KH�PHQX�ZLOO�RQO\�EH�GLVSOD\HG�LQWKLV�ZD\�LI�WKH�VHWWLQJV�IRU�WKHDXWKRUL]DWLRQ�REMHFWV�DUH�VHW�DVGHVFULEHG�LQ�WKH�WDEOH�RQ�WKHSUHYLRXV�SDJH�

�� 6HOHFW�WKH�XVHU�UROH�WHPSODWH�WKDW\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�D�XVHU�

�� &KRRVH� �

'HSHQGLQJ�RQ�\RXU�VHWWLQJV��WKHZLQGRZ�PLJKW�ORRN�GLIIHUHQW��EXW�LWSURYLGHV�WKH�VDPH�IXQFWLRQDOLW\�

1

2

3

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–37

�� 7KH�VWUXFWXUH�RI�WKH�XVHU�UROHWHPSODWH�DSSHDUV�WKH�VDPH�ZD\�DQHQG�XVHU�VHHV�LW�ODWHU�

�� )RU�DQ�RYHUYLHZ�RI�ZKDW�WKLV�XVHUUROH�WHPSODWH�FRYHUV��FKRRVH�'RFXPHQWDWLRQ�

�� 7KH�GHVFULSWLRQ�DERXW�WKH�VHOHFWHGXVHU�UROH�WHPSODWH�LV�PDLQWDLQHG�LQWKH�DFWLYLW\�JURXS�GHVFULSWLRQ�ILHOGLQ�WKH�3*�

�� &KRRVH� �

4

5

6

7

Chapter 5: User Role Templates

Tips for an Administrator

Authorizations Made Easy5–38

�� 7R�DVVLJQ�D�XVHU�WR�WKLV�XVHU�UROHWHPSODWH��FKRRVH�$VVLJQ�XVHUV�

�� ,Q�WKH�$VVLJQ�XVHUV�ZLQGRZ��HQWHU�WKHXVHUV�QDPH�GLUHFWO\�RU�XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�XVHU�IURP�D�OLVW�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH�IRU�WKHDFWLYLW\�JURXS��FKRRVH�<HV�

8

9

10

11

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–39

��� 7KH�VHOHFWHG�XVHU�KDV�EHHQ�DVVLJQHGWR�WKH�XVHU�UROH�WHPSODWH�DQG�WKHGDWD�ZDV�VDYHG�

��� &KRRVH� �RU�UHSHDW�WKH�VWHSV�IRU�DQHZ�DVVLJQPHQW�

12

13

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–40

$YDLODEOH�8VHU�5ROH�7HPSODWHV

,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�H[SODLQHG�KRZ�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV��7KLV�VHFWLRQ�SURYLGHV�DQRYHUYLHZ�RI�WKH�XVHU�UROH�WHPSODWHV�GHOLYHUHG�ZLWK�5����VRUWHG�E\�DSSOLFDWLRQ�DUHD�

(DFK�XVHU�UROH�WHPSODWH�FRQWDLQV�D�< 6KRUW�GHILQLWLRQ�RI�WKH�UROH�DQG�DQ�RYHUYLHZ�RI�WDVNV< 5ROH�EDVHG�PHQX< &RPSOHWHO\�PDLQWDLQHG�DXWKRUL]DWLRQ�SURILOH�DFFRUGLQJ�WR�WKH�IXQFWLRQDOLW\�DFFHVVLEOH

5HOHDVH����$

7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DUH�DYDLODEOH�ZLWK�5���5HOHDVH����$�DQG�DUH�GLVWULEXWHG�DV�DFWLYLW\JURXSV�

$UHD�&URVV�$SSOLFDWLRQ� $UHD�/RJLVWLFV�([HFXWLRQ�

$XGLWRU 7UDQVSRUW�&RVW�0DQDJHU

'DWD�3URWHFWLRQ�$XGLWRU 7UDQVSRUW�&RVW�&OHUN

$XGLWRU�+5 :DUHKRXVH�:RUNHU

$XGLWRU�6\VWHP :DUHKRXVH�0DQDJHU

6SHFLDOLVW�'DWD�7UDQVIHU :DUHKRXVH�&OHUN

$UHD�0DWHULDOV�0DQDJHPHQW�3URFXUHPHQW� /RJLVWLFV�0DQDJHU

5HTXLVLWLRQHU /RJLVWLFV�&OHUN

053�FRQWUROOHU 7UDQVSRUW�3ODQQHU

%X\HU 7UDQVSRUW�0DQDJHU

*5�&OHUN 7UDQVSRUW�&OHUN

6(�&OHUN 6KLSSLQJ�0DQDJHU

*/�%X\HU 6KLSSLQJ�&OHUN

,9�&OHUN 3URMHFW�0DQDJHPHQW

3URGXFWLRQ�3ODQQLQJ 3URMHFW�0DQDJHU�&�

33�2SHUDWRU 3URMHFW�0DQDJHU�7�

33�3URGXFW�0DQDJHU :RUN�3DFNDJH�5HVSRQVLEOH

33�6XSHUYLVRU ,QYHVWPHQW�0DQDJHPHQW

.DQEDQ�&RQWUROOHU ,QYHVWPHQWV�$QDO\VW

053�&RQWUROOHU ,QYHVWPHQWV�0DQDJHU

5HS��0DQXIDFWXUHU ,QYHVWPHQWV�3ODQHU��25�

,QYHVWPHQWV�3ODQHU��35�

6HWWOH�6SHFLDOLVW

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–41

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

%DVLV���'HYHORSPHQW 4XDOLW\�0DQDJHPHQW

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU &HUWLILFDWH

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU (TXLSPHQW�0DQDJHU

6\VWHP�$GPLQLVWUDWRU ,QVSHFWLRQ�0DQDJHU

%DWFK�$GPLQLVWUDWRU ,QVSHFWLRQ�3ODQHU

$GPLQLVWUDWRU 3UREOHP�$XWKRU

3URFHVV�&RQWUROOHU 3UREOHP�3URFHVVRU

:RUNIORZ�'HYHORSHU 4XDOLW\�$QDO\VW

:RUNIORZ�3URFHVV�&RQWUROOHU 4XDOLW\�(QJLQHHU

4XDOLW\�0DQDJHU 4XDOLW\�,QVSHFWRU

7UDQVSRUW�0DQDJHU 6XSSRUW�/LQH�/HYHO��

&XVWRPL]LQJ�3URMHFW�0HPEHU 6XSSRUW�/LQH�/HYHO��

'DWDEDVH�$GPLQLVWUDWRU 6DOHV��'LVWULEXWLRQ

$%$3�'HYHORSHU 2UGHU�3URFHVVLQJ�&OHUN

'HYHORSPHQW�0DQDJHU 6DOHV�5HSUHVHQWDWLYH

'RFXPHQWDWLRQ�'HYHORSHU 6DOHV�0DQDJHU

3URMHFW�0DQDJHU &RQWUROOLQJ

(QGXVHU�3URILOH 3ODQQLQJ�$FWLYLW\�&RRUGLQDWRU

(YHU\�(PSOR\HH 6HQLRU�&RVWPDQDJHU

$/(�$GPLQLVWUDWRU 0DQDJHULDO�$FFRXQWDQW

$/(�'HYHORSHU 6DOHV�0DQDJHU

$GPLQLVWUDWRU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW )LQDQFH�0DQDJHPHQW

3URMHFW�/HDGHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�&OHUN

8VHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�$FFRXQWDQW

6$3VFULSW�3RZHU�8VHU 6WDII�$FFRXQWDQW

6SRRO�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�$FFRXQWDQW

$UFKLYHOLQN�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�6XSHUYLVRU

$UFKLYHOLQN�8VHU $FFRXQWV�3D\DEOH�$FFRXQWDQW

7HFKQLFDO�(QJLQHHU $FFRXQWV�3D\DEOH�6XSHUYLVRU

8VHU�$GPLQVWUDWRU &DVK�0DQDJHU

%XVLQHVV�:RUNSODFH�IRU�DOO�8VHUV &UHGLW�0DQDJHU

$GPLQLVWUDWRU $FFRXQWLQJ�6XSHUYLVRU

&RQWUROOHU 3URILW�&HQWHU�$FFRXQWLQJ

,PSOHPHQWDWLRQV�7HDP 3URILW�&HQWHU�&RQWUROOHU

3URILW�&HQWHU�0DQDJHU

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–42

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

7UDYHO�0DQDJHPHQW 5HDO�(VWDWH

7UDYHO�$GPLQLVWUDWRU &RQWUROOHU�DQG�0DQDJHU

7UDYHO�$SSURYLQJ�PDQDJHU 5HQW�$GMXVWPHQW�&OHUN

7UDYHO�6\VWHP�PDQDJHU 6&6�&OHUN

7UDYHO�$VVLVWDQW 7HQDQW�&OHUN

7UDYHOHU 7HQDQW�5HQWDO�&OHUN

7UHDVXU\ +XPDQ�5HVRXUFHV

$GPLQLVWUDWRU $GPLQLVWUDWLYH�&OHUN

&UHGLW�$QDO\VW $GPLQLVWUDWLYH�&OHUN�%HQHILWV

'HSDUWPHQW�0DQDJHU�/RDQV $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ

/RDQV�2IILFHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW

5ROORYHU�2IILFHU %HQHILWV�6SHFLDOLVW

6WDII�$FFRXQWDQW &RPSHQVDWLRQ�6SHFLDOLVW

%DFNRIILFH�3URFHVV /LQH�0DQDJHU�%HQHILWV

&DVKPDQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

&RQWUROOHU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

)XQG�0DQDJHU /LQH�0DQDJHU�$SSUDLVDO�6\VWHP

5LVN�&RQWUROOHU /LQH�0DQDJHU�5RRP�5HVHUYDWLRQV

6WDII�$FFRXQWDQW +5�0DQDJHU

7UDGH�&RQWUROOHU +5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

7UDGHU +5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

7UHDVXU\�0DQDJHU +5�0DQDJHU�$SSUDLVDO�6\VWHP

3URGXFW�'DWD�0DQDJHPHQW +5�0DQDJHU�5RRP�5HVHUYDWLRQV

'HVLJQHU +5�0DQDJHU�&RPSHQVDWLRQ

:RUN�3UHSDUHU $GPLQLVWUDWLYH�&OHUN

)RUHLJQ�7UDGH $GPLQLVWUDWLYH�&OHUN�%HQHILWV

&RQ��([SRUW�&RQWURO�0DQDJHU $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ

*RY��3HULRG�0DQDJHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW

/RFDO�'RF��3D\PHQW�0DQDJHU %HQHILWV�6SHFLDOLVW

3UHIHUHQFH�PDQDJHU &RPSHQVDWLRQ�6SHFLDOLVW

3UR��([SRUW�0DQDJHU /LQH�0DQDJHU�%HQHILWV

3UR��,PSRUW�0DQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

6XSHUYLVRU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

/LQH�0DQDJHU�$SSUDLVDO�6\VWHP

/LQH�0DQDJHU�5RRP�5HVHUYDWLRQV

+5�0DQDJHU

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–43

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

+5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW 3D\UROO�6SHFLDOLVW�*HUPDQ\

+5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ 3D\UROO�6SHFLDOLVW�'DQPDUN

+5�0DQDJHU�$SSUDLVDO�6\VWHP 3D\UROO�6SHFLDOLVW�6SDLQ

+5�0DQDJHU�5RRP�5HVHUYDWLRQV 3D\UROO�6SHFLDOLVW�)UDQFH

+5�0DQDJHU�&RPSHQVDWLRQ 3D\UROO�6SHFLDOLVW�*UHDW�%ULWDLQ

,QFHQWLYH�:DJHV�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�+RQJ�.RQJ

7LPH�5HFRUGLQJ�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�,QGRQHVLD

6SHFLDOLVW�2SHUDWLRQVSODQQHU 3D\UROO�6SHFLDOLVW�,UHODQG

3D\UROO�&OHUN 3D\UROO�6SHFLDOLVW�-DSDQ

3D\UROO�&OHUN�$XVWULD 3D\UROO�6SHFLDOLVW�0H[LFR

3D\UROO�&OHUN�%HOJLXP 3D\UROO�6SHFLDOLVW�0DOD\VLD

3D\UROO�&OHUN�&DQDGD 3D\UROO�6SHFLDOLVW�1HWKHUODQGV

3D\UROO�&OHUN�*HUPDQ\ 3D\UROO�6SHFLDOLVW�1RUZD\

3D\UROO�&OHUN�6SDLQ 3D\UROO�6SHFLDOLVW�1HZ�=HDODQG

3D\UROO�&OHUN�*UHDW�%ULWDLQ 3D\UROO�6SHFLDOLVW�3KLOLSSLQHV

3D\UROO�&OHUN�,QGRQHVLD 3D\UROO�6SHFLDOLVW�3RUWXJDO

3D\UROO�&OHUN�0H[LFR 3D\UROO�6SHFLDOLVW�6ZHGHQ

3D\UROO�&OHUN�0DOD\VLD 3D\UROO�6SHFLDOLVW�6LJQDSRUH

3D\UROO�&OHUN�1HWKHUODQGV 3D\UROO�6SHFLDOLVW�7KDLODQG

3D\UROO�&OHUN�1RUZD\ 3D\UROO�6SHFLDOLVW�7DLZDQ

3D\UROO�&OHUN�1HZ�=HDODQG 3D\UROO�6SHFLDOLVW�86$

3D\UROO�&OHUN�3KLOLSSLQHV 3D\UROO�6SHFLDOLVW�6RXWK�$IULFD

3D\UROO�&OHUN�3RUWXJDO 5HFUXLWHU

3D\UROO�&OHUN�6LJQDSRUH 6\VWHP�$GPLQLVWUDWRU

3D\UROO�&OHUN�7DLZDQ 6\VWHP�$GPLQLVWUDWRU�$UJHQWLQLD

3D\UROO�&OHUN�86$ 6\VWHP�$GPLQLVWUDWRU�$XVWULD

3D\UROO�&OHUN�9HQH]XHOD 6\VWHP�$GPLQLVWUDWRU�$XVWUDOLD

3D\UROO�&OHUN�6RXWK$IULFD 6\VWHP�$GPLQLVWUDWRU�%HOJLXP

3D\UROO�6SHFLDOLVW 6\VWHP�$GPLQLVWUDWRU�%UDVLO

3D\UROO�6SHFLDOLVW�$UJHQWLQLD 6\VWHP�$GPLQLVWUDWRU�&DQDGD

3D\UROO�6SHFLDOLVW�$XVWULD 6\VWHP�$GPLQLVWUDWRU�6XLVVH

3D\UROO�6SHFLDOLVW�$XVWUDOLD 6\VWHP�$GPLQLVWUDWRU�*HUPDQ\

3D\UROO�6SHFLDOLVW�%HOJLHQ 6\VWHP�$GPLQLVWUDWRU�'DQPDUN

3D\UROO�6SHFLDOLVW�%UDVLO 6\VWHP�$GPLQLVWUDWRU�6SDLQ

3D\UROO�6SHFLDOLVW�&DQDGD 6\VWHP�$GPLQLVWUDWRU�)UDQFH

3D\UROO�6SHFLDOLVW�6XLVVH 6\VWHP�$GPLQLVWUDWRU�*UHDW�%ULWDLQ

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–44

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

6\VWHP�$GPLQLVWUDWRU�+RQJ�.RQJ 6\VWHP�$GPLQLVWUDWRU�2UJDQL]DWLRQDO�0DQDJHPHQW

6\VWHP�$GPLQLVWUDWRU�,QGRQHVLD 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�$GPLQLVWUDWLRQ

6\VWHP�$GPLQLVWUDWRU�,UHODQG 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�&RVW�3ODQQLQJ

6\VWHP�$GPLQLVWUDWRU�-DSDQ 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�0DOD\VLD 6\VWHP�$GPLQLVWUDWRU�$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�1HWKHUODQGV 6\VWHP�$GPLQLVWUDWRU�7UDLQLQJ�DQG�(YHQWV

6\VWHP�$GPLQLVWUDWRU�1RUZD\ 6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV

6\VWHP�$GPLQLVWUDWRU�1HZ�=HDODQG 6\VWHP�$GPLQLVWUDWRU�3D\UROO

6\VWHP�$GPLQLVWUDWRU�3KLOLSSLQHV 6\VWHP�$GPLQLVWUDWRU�5HFUXLWPHQW

6\VWHP�$GPLQLVWUDWRU�3RUWXJDO 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN

6\VWHP�$GPLQLVWUDWRU�6ZHGHQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�6LJQDSRUH 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�7KDLODQG 7UDLQLQJ�DQG�'HYHOSP��&OHUN��7UDLQLQJ�DQG�(YHQW�0DQDJHPHQW

6\VWHP�$GPLQLVWUDWRU�7DLZDQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��5RRP�5HVHUYDWLRQ

6\VWHP�$GPLQLVWUDWRU�86$ 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�,QWHUQDWLRQDO 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�6RXWK�$IULFD 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��7UDLQLQJ

6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��5RRP�5HVHUYDWLRQ

6\VWHP�$GPLQLVWUDWRU�%HQHILWV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW

6\VWHP�$GPLQLVWUDWRU�&RPSHQVDWLRQ

5HOHDVH����%

7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DYDLODEOH�ZLWK�5���5HOHDVH����%�DUH�LQ�DGGLWLRQ�WR�WKH�H[LVWLQJ�IURP5HOHDVH����$�DV�VKRZQ�DERYH�

%DVLV +XPDQ�5HVRXUFHV

$%$3�'HYHORSHU ,QFHQWLYH�:DJHV�&OHUN

$OH�$GPLQLVWUDWRU ,QFHQWLYH�:DJHV�6SHFLDOLVW

$/(�'HYHORSHUV 7LPH�5HFRUGLQJ�$GPLQLVWUDWRU

0DVWHU�'DWD�'LVWULEXWLRQ 7LPH�5HFRUGLQJ�6SHFLDOLVW

$FFRXQWLQJ�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�&OHUN

+5�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�6SHFLDOLVW

/RJLVWLFV�0DVWHU�'DWD�'LVWULEXWLRQ 0DWHULDO�0DVWHU

)LQDQFH�PDQDJHPHQW %X\LQJ

),��$GYDQFH�3D\HU�IRU�7ULS�$GYDQFHV

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–45

8VHU�5ROH�7HPSODWHV����%��FRQWLQXHG�

5HWDLO 0DLQWHQDQFH�RI�6DOHV�3ULFH�&DOFXODWLRQV

$OORFDWLRQ�7DEOH 3ULFLQJ�(QYLURQPHQW

$VVRUWPHQW�0DQDJHPHQW 6DOHV�3ULFH�&DOFXODWLRQV��6WUDWHJLF�

5HWDLO�6WRFN�3ODQQHU 3URPRWLRQ�0DQDJHPHQW

2UGHU�2SWLPL]LQJ 6WRUH�0DQDJHU

3HULVKDEOHV�3ODQQLQJ 7ULJJHULQJ�DQG�&RQWUROOLQJ�0HUFKDQGLVH�3URFXUHPHQW�LQ�D�6WRUH

&DWHJRU\�0DQDJHU *DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU

&ODVVLILFDWLRQ 6WRUH�*RRGV�5HFHLSWV�,VVXHV�DQG�,QYHQWRU\

0DLQWHQDQFH�RI�3XUFKDVH�3ULFH�&RQGLWLRQV 0DQDJHPHQW�RI�,QVWRUH�3HUVRQQHO

0DLQWHQDQFH�RI�6DOHV�3ULFH�&RQGLWLRQV ,QVWRUH�3ODQQLQJ�DQG�&RQWURO

*RRGV�5HFHLSW 6DOHV�$FWLYLWLHV�LQ�D�6WRUH

*RRGV�5HFHLSW�$VVRFLDWH 6DOHV�'HSDUWPHQW�0DQDJHU�LQ�D�6WRUH

,QWHUQDO�:DUHKRXVH�+DQGOLQJ 6WRUH�$VVRFLDWH�8VLQJ�6$3�5HWDLO�6WRUH

:DUHKRXVH�0DQDJHU 6HWWOHPHQW�RI�&XVWRPHU�$UUDQJHPHQWV

6KLSSLQJ�$VVRFLDWH 0DLQWHQDQFH�RI�&XVWRPHU�$UUDQJHPHQWV

:DUHKRXVH�:RUNHU 6HWWOHPHQW�RI�9HQGRU�$UUDQJHPHQWV

5HWDLO�%X\HU 0DLQWHQDQFH�RI�9HQGRU�$UUDQJHPHQWV

%X\LQJ�$FWLYLWLHV 7UDQVSRUWDWLRQ�0DQDJHU

*DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU 7UDQVSRUWDWLRQ�3ODQQHU

,QYRLFH�9HULILFDWLRQ�&OHUN /RJLVWLFV�([HFXWLRQ

9HULILFDWLRQ�RI�,QYRLFHV 6KLSSLQJ�&OHUN

$UFKLYLQJ�RI�,QYRLFHV 6KLSSLQJ�0DQDJHU

)XQFWLRQV�LQ�WKH�,QYRLFH�9HULILFDWLRQ�(QYLURQPHQW 3ODQLQJ�6\VWHPV

&RRUGLQDWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW 'LVSOD\�DQG�0DLQWDLQ�:RUN�&HQWHU�0DVWHU�'DWD

([HFXWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW�3ODQQLQJ 6DOHV�3ULFH�9DOXDWLRQ

0HUFKDQGLVH�&DWHJRU\�+LHUDUFK\�&UHDWLRQ

5HTXLUHPHQWV�3ODQQLQJ

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–46

6–1

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU

)XQFWLRQDOLW\

&RQWHQWV

Overview ..................................................................................................................6–2

Selecting Views/Types in Activity Group Maintenance ......................................6–2

Exploring Advanced Profile Generator Functionality .........................................6–3

Copying and Deriving Activity Groups...............................................................6–16

Selecting Workflow Tasks....................................................................................6–21

Deleting Activity Groups ......................................................................................6–24

Postmaintaining User Role Templates ...............................................................6–25

Maintaining and Generating the Authorization Profiles....................................6–26

Displaying an Overview of Generated Profiles ..................................................6–30

Regenerating Authorization Profiles After Making Changes ...........................6–32

Using Utilities to Change Generated Authorizations ........................................6–36

Customizing Authorizations ................................................................................6–38

��

Chapter 6: Advanced Profile Generator Functionality

Overview

6–2

2YHUYLHZ

,Q�DGGLWLRQ�WR�WKH�WKUHH�PHWKRGV�RI�XVLQJ�WKH�XVHU�UROH�WHPSODWHV��WKH�3URILOH�*HQHUDWRU��3*�SURYLGHV�DGGLWLRQDO�RSWLRQDO�IXQFWLRQDOLW\�

,Q�WKLV�FKDSWHU��ZH�H[SODLQ�PRUH�RI�WKH�YDVW�IXQFWLRQDOLW\�RI�WKH�3*��([DPSOHV�VKRZ�KRZ�WRHQKDQFH�WKH�XVH�RI�\RXU�XVHU�UROH�WHPSODWHV�

6HOHFWLQJ�9LHZV�7\SHV�LQ�$FWLYLW\�*URXS�0DLQWHQDQFH

Views

Possible entries

Authorizations Made Easy

,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�ZLQGRZ��WUDQVDFWLRQ�3)&*���\RX�FDQ�WRJJOH�EHWZHHQGLIIHUHQW�YLHZV�DQG�W\SHV��)RU�YLHZV�\RX�FDQ�FKRRVH�< %DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV�< 2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ�

)RU�W\SHV�\RX�FDQ�FKRRVH�< $FWLYLW\�JURXS< &RPSRVLWH�DFWLYLW\�JURXS

7KHVH�YLHZV�DQG�W\SHV�DUH�GHVFULEHG�LQ�WKH�IROORZLQJ�VHFWLRQV�

%DVLF�0DLQWHQDQFH

6HOHFW�%DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��WR�FUHDWH�DFWLYLW\�JURXSV�DQG�DVVLJQWKHVH�JURXSV�WR�XVHUV�

2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�

6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ��WR�FUHDWH�DFWLYLW\�JURXSV�DQGDVVLJQ�WKHVH�DFWLYLW\�JURXSV�WR�5���XVHUV�RU�3'�REMHFWV��2YHUYLHZ�JLYHV�\RX�IXOO�DFFHVV�WR�DOODFWLYLW\�JURXS�PDLQWHQDQFH�IXQFWLRQV��LQFOXGLQJ�RUJDQL]DWLRQ�PDQDJHPHQW�DQG�WKH�UHODWHGWLPH�GHSHQGHQFLHV��)RU�H[DPSOH��ZKHQ�\RX�DUH�FUHDWLQJ�RU�FKDQJLQJ�DQ�DFWLYLW\�JURXS��\RXFDQ�RQO\�OLQN�ZRUNIORZ�WDVNV�WR�DQ�DFWLYLW\�JURXS�LQ�2YHUYLHZ�

Types

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–3

$FWLYLW\�*URXS

6HOHFW�$FWLYLW\�JURXS�WR�GLVSOD\�DOO�DYDLODEOH�DFWLYLW\�JURXSV��LQFOXGLQJ�FRPSRVLWH�DFWLYLW\JURXSV�ZKHQ�\RX�VHOHFW�SRVVLEOH�HQWULHV�

&RPSRVLWH�$FWLYLW\�*URXS

6HOHFW�&RPSRVLWH�DFWLYLW\�JURXSV�WR�GLVSOD\�RQO\�FRPSRVLWH�DFWLYLW\�JURXSV�ZKHQ�\RX�VHOHFWSRVVLEOH�HQWULHV�

([SORULQJ�$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\

,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHVFULEHG�WKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROHWHPSODWHV��<RX�DFWXDOO\�KDYH�PRUH�RSWLRQV�ZKHQ�ZRUNLQJ�ZLWK�WKH�DFWLYLW\�JURXSV�DQG3URILOH�*HQHUDWRU��3*���)RU�H[DPSOH��WKHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\JURXS³\RX�FDQ�FUHDWH�\RXU�RZQ�KLHUDUFK\�ZLWK�FXVWRPL]HG�IROGHUV��QDPHV��DQG�OLQNV�IRUWKH�XVHU�UROH�WHPSODWHV�\RX�FUHDWH�

2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��VHH�EHORZ���D�VHULHV�RI�EXWWRQV�DURXQG�WKH�DVVLJQHGWUDQVDFWLRQV�SURYLGH�GLIIHUHQW�IXQFWLRQDOLW\�

Creating or changing thehierarchy (folders, names,order)

Inserting transactions andreports manually or fromdifferent existing menus

Additional activities(moving object in hierarchy,translating, displayingtechnical names, ordisplaying objectdocumentation)

Inserting Internet anddocument links

Select a system whereyou would like thesetransactions to beexecuted

Displaying reportinformation

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–4

&UHDWLQJ�DQG�&KDQJLQJ�WKH�+LHUDUFK\

<RX�FDQ�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\�JURXS�E\�HLWKHU�< &UHDWLQJ�\RXU�RZQ�KLHUDUFK\< 0RYLQJ�REMHFWV�LQWR�WKH�H[LVWLQJ�KLHUDUFK\�DQG�UHQDPLQJ�WKHP�WR�VXLW�\RXU�QHHGV

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�IROGHU��JLYH�LW�D�QHZ�QDPH��DQG�PRYH�LW�LQWR�WKHKLHUDUFK\�

:H�ZDQW�WR�FUHDWH�D�QHZ�IROGHU�DQG�FDOO�LW�´%X\HUµ�XQGHU�0DVWHU�'DWD�→�9HQGRU�LQ�WKH�DFWLYLW\�JURXS00B%8<(5B$*�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�VHOHFW�WKH�KLHUDUFK\�OHYHO�XQGHUZKLFK�\RX�ZDQW�WR�LQVHUW�WKH�IROGHU�IRU�H[DPSOH��9HQGRU�LQ00B%8<(5B$*��

�� &KRRVH� �

�� (QWHU�WKH�QDPH�RI�WKH�QHZ�IROGHU�

�� &KRRVH� �5

3

4

6

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–5

�� 7KH�QHZ�IROGHU�LV�SODFHG�RQH�OHYHOEHORZ�WKH�VHOHFWHG�IROGHU�LQ�WKHKLHUDUFK\��7R�PRYH�LW�XS�RU�GRZQ�XVH�WKH�DUURZV� �RU�XVH�GUDJ�DQG�GURS�

7R�FKDQJH�WKH�WH[W�RI�WKH�QRGH��VHOHFW�LWDQG�HQWHU�WKH�QHZ�QDPH�

<RX�QHHG�WR�EH�FHUWDLQ�KRZ�\RX�FKDQJH�\RXU�PHQXV��EHFDXVH�LI�WKH�RULJLQDO�5���PHQXSDWK�FKDQJHV��\RX�PLJKW�QRW�EH�DEOH�WR�ILQG�\RXU�VHOHFWHG�WUDQVDFWLRQ�LQ�WKH�VDPHSRVLWLRQ�DV�EHIRUH�

,QVHUWLQJ�7UDQVDFWLRQV

:H�FRQWLQXH�IURP�WKH�VWHS�DERYH�WR�VKRZ�KRZ�WR�LQVHUW�WUDQVDFWLRQV�XQGHU�WKH�QHZO\�FUHDWHG�IROGHU�

,I�\RX�NQRZ�WKH�WUDQVDFWLRQ�FRGH��\RX�FDQ�LQVHUW�LW�PDQXDOO\�E\�FKRRVLQJ� �7UDQVDFWLRQ�DQG�HQWHULQJ�WKHWUDQVDFWLRQ�FRGH��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�IRU�GHWDLOV��

7R�VHOHFW�WKH�WUDQVDFWLRQ�IURP�D�PHQX��FKRRVH�RQH�RI�WKH�IROORZLQJ�EXWWRQV�

�)URP�WKH�6$3�PHQX��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�

�)URP�DFWLYLW\�JURXS

�)URP�DUHD�PHQX

7

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–6

�� &KRRVH�IURP�ZKHUH�\RX�ZRXOG�OLNHWR�LQVHUW�WKH�WUDQVDFWLRQ��LQ�WKLVH[DPSOH��ZH�FKRVH� �)URP�DFWLYLW\JURXS��

,I�\RX�LQVHUW�WUDQVDFWLRQV�IURP�DGLIIHUHQW�PHQX��WKH�FRPSOHWH�PHQX�SDWKIURP�WKDW�VRXUFH�ZLOO�EH�DGGHG�

�� 6HOHFW�WKH�DFWLYLW\�JURXS�IURP�ZKHUH\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKHWUDQVDFWLRQ�FRGH��<RX�QHHG�WR�NQRZZKDW�DFWLYLW\�JURXS�FRQWDLQV�WKLVWUDQVDFWLRQ��:H�VHOHFWHG6$3B00B*/B%8<(5B$*�

�� &KRRVH� �

2

3

1

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–7

7KH�PHQX�VWUXFWXUH�RI�WKH�VHOHFWHGDFWLYLW\�JURXS�DSSHDUV�

�� 2SHQ�WKH�GHVLUHG�KLHUDUFK\�OHYHODQG�VHOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�V��

7R�VLPSOLI\�\RXU�VHDUFK��WXUQ�RQ�WKHWHFKQLFDO�QDPHV�E\�FKRRVLQJ� �

�� &KRRVH� �$GG�WR�WUDQVIHU�WKHWUDQVDFWLRQV�WR�\RXU�DFWLYLW\�JURXS�7KH�FRPSOHWH�PHQX�SDWK��LQ�WKLVFDVH��9HQGRU�→�%X\HU�ZLWK�DFWLYLW\JURXSV�&UHDWH��&KDQJH��DQG�'LVSOD\�LV�WUDQVIHUUHG�

$IWHU�WKH�FRPSOHWH�PHQX�SDWK�LVLQVHUWHG��\RX�KDYH�WKH�RSWLRQ�WRUHQDPH�LW�DQG�PRYH�WKH�LQVHUWHGWUDQVDFWLRQV�WR�WKH�GHVLUHG�SRVLWLRQXVLQJ�GUDJ�DQG�GURS�RU�0RYH�QRGH�

�� 6HOHFW�WKH�WUDQVDFWLRQ�WR�EH�PRYHG�

�� &KRRVH� �0RYH�QRGH�RU�XVH�GUDJ�DQG�GURS�WR�PRYH�LW�

4

5

6

7

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–8

�� 6HOHFW�WKH�GHVLUHG�IROGHU��IRUH[DPSOH��%X\HU��

�� &KRRVH� �

7KH�WUDQVDFWLRQ�KDV�EHHQ�PRYHG�

'R�WKH�VDPH�IRU�WKH�RWKHUWUDQVDFWLRQV�XQWLO�DOO�DUH�LQ�WKH�ULJKWIROGHU�

��� 6HOHFW�WKH�PHQX�HQWU\�WKDW�ZDVWUDQVIHUUHG��IRU�H[DPSOH�9HQGRU��

��� &KRRVH� �WR�GHOHWH�WKH�HQWU\�

8

9

11

10

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–9

7KH�WUDQVDFWLRQV�KDYH�EHHQ�PRYHGDQG�WKH�QRGH�KDV�EHHQ�GHOHWHG�

$IWHU�LQVHUWLQJ�DOO�WKH�GHVLUHGWUDQVDFWLRQV��\RX�KDYH�WR�JHQHUDWHWKH�DFWLYLW\�JURXS�DQG�DVVLJQ�XVHUV�

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–10

,QVHUWLQJ�,QWHUQHW�DQG�'RFXPHQW�/LQNV

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�OLQNV³IRU�H[DPSOH�0LFURVRIW�:RUG��([FHO�GRFXPHQWV�RU�,QWHUQHW�VLWHV³WR�DQDFWLYLW\�JURXS�VR�WKDW�WKHVH�OLQNV�ZLOO�EH�DYDLODEOH�WR�DOO�HQG�XVHUV�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS��(QG�XVHUVDOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�WKHLU�RZQ�OLQNV�ODWHU�RQ�WKHLU�(DV\�$FFHVV�VFUHHQ��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�DGG�D�OLQN�WR�D�ORFDO�0LFURVRIW�([FHO�VSUHDGVKHHW�DQG�D�ZHE�SDJH��:H�DUH�JRLQJ�WR�XVH�WKH�DFWLYLW\�JURXSIURP�DERYH�DQG�ZLOO�LQVHUW�D�IROGHU�FDOOHG�,QIRUPDWLRQ�VRXUFH�DV�D�SUHUHTXLVLWH�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSVZLQGRZ��VHOHFW�WKH�SRVLWLRQ�ZKHUH\RX�ZRXOG�OLNH�WR�LQVHUW�WKHGRFXPHQW�OLQN��IRU�H[DPSOH��WKHIROGHU�,QIRUPDWLRQ�VRXUFH��

�� &KRRVH� �:HE�DGGUHVV�1RWH��(YHQ�LI�\RX�ZDQW�WR�LQVHUW�DGRFXPHQW�OLQN��\RX�PXVW�XVH�WKH

�:HE�DGGUHVV�EXWWRQ�

�� (QWHU�WKH�WH[W�IRU�WKH�OLQN�LQ�WKH�7H[WILHOG�

�� (QWHU�WKH�SDWK�WR�WKH�GRFXPHQW�RUXVH�SRVVLEOH�HQWULHV�WR�VHOHFW�LW�

�� &KRRVH� �

7KH�GRFXPHQW�FDQ�EH�D�ORFDO�GRFXPHQW�RU�D�GRFXPHQW�IURP�WKH�QHWZRUN��1RWH�WKDWQDPHV�IRU�GLIIHUHQW�KDUG�GULYHV�PD\�EH�GLIIHUHQW�

34

56

7

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–11

�� 7KH�OLQN�WR�WKH�([FHO�VSUHDGVKHHW�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VDQ�LFRQ�WKDW�UHSUHVHQWV�WKHGRFXPHQW�W\SH�

�� &KRRVH� �:HE�DGGUHVV�WR�LQVHUW�WKH,QWHUQHW�OLQN�

��� ,Q�7H[W��HQWHU�WKH�WH[W�IRU�WKH�OLQN�

��� ,Q�:HE�DGGUHVV�RU�ILOH��HQWHU�WKH�85/OLQN�WR�WKH�GHVLUHG�SDJH�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�D�VDYHG�85/�

��� &KRRVH� �

��� 7KH�OLQN�WR�WKH�,QWHUQHW�SDJH�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VWKH�LFRQ� �IRU�,QWHUQHW�OLQNV�

8

9

13

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–12

,QVHUWLQJ�5HSRUWV

1HDUO\�HYHU\�UHSRUW�LQ�WKH�V\VWHP�KDV�D�WUDQVDFWLRQ�DVVLJQHG�WR�LW��7KHUHIRUH�\RX�FDQ�VHOHFWDQ\�UHSRUW�DQG�DXWKRUL]H�XVHUV�MXVW�IRU�FHUWDLQ�UHSRUWV��7KHUH�DUH�GLIIHUHQW�RSWLRQV�WR�DVVLJQ�DUHSRUW�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�VHOHFW�IURP�HLWKHU�< $%$3�UHSRUW< 6$3�TXHU\< 7UDQVDFWLRQ�ZLWK�YDULDQW< 5HSRUW:ULWHU< 'ULOOGRZQ< 5HS�SRUWIROLR

1RW�RQO\�FDQ�\RX�DVVLJQ�UHSRUWV�WR�WKH�PHQX�WKDW�DUH�SURYLGHG�E\�6$3�WKDW�DOUHDG\�KDYH�DWUDQVDFWLRQ��EXW�LW�LV�DOVR�SRVVLEOH�WR�DVVLJQ�VHOI�GHYHORSHG�UHSRUWV�ZLWK�WKLV�IXQFWLRQDOLW\�:KHQ�\RX�DVVLJQ�D�VHOI�GHYHORSHG�UHSRUW��\RX�FDQ�FUHDWH�D�WUDQVDFWLRQ�FRGH�WR�WKH�UHSRUWZKHQ�DGGLQJ�LW�WR�WKH�PHQX�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�RQO\�RQH�PHWKRG��WKH�RWKHUV�DUH�VLPLODU��

([DPSOH�

:H�VHOHFW�WKH�UHSRUW�'XH�'DWH�$QDO\VLV�IRU�2SHQ�,WHPV�IURP�WKH�DSSOLFDWLRQ�FODVV�),��$FFRXQWV�SD\DEOH�DQGDVVLJQ�LW�WR�D�IROGHU�FDOOHG�5HSRUWV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�0HQX�WDE��VHOHFW�WKH�IROGHUZKHUH�\RX�ZRXOG�OLNH�WR�LQVHUW�WKHUHSRUW�

�� &KRRVH� �5HSRUW�3

4

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–13

,Q�RXU�H[DPSOH��ZH�GHPRQVWUDWHKRZ�WR�VHOHFW�D�UHSRUW�IURP�WKHDSSOLFDWLRQ�FODVV�

�� &KRRVH�'ULOOGRZQ�

,I�\RX�H[SDQG�WKH�SRSXS�XVLQJ� �WRGLVSOD\�RWKHU�RSWLRQV��\RX�FDQ�FKRRVHZKHWKHU�WR�DVVLJQ�\RXU�RZQ�WUDQVDFWLRQFRGH�RU�GHVFULSWLRQ�WR�WKH�UHSRUW��RUJHQHUDWH�WKH�WUDQVDFWLRQ�FRGHDXWRPDWLFDOO\�DQG�DGRSW�WKH�UHSRUWWUDQVDFWLRQ�

��� 6HOHFW�WKH�GHVLUHG�FODVV�IURP�WKH�OLVW�

�� &KRRVH�(QWHU�

'HSHQGLQJ�RQ�ZKDW�\RX�VHOHFWHG��WKHIROORZLQJ�ZLQGRZ��RU�ZLQGRZV��IRUVWHSV��²��PLJKW�GLIIHU�

�� 6HOHFW�WKH�GHVLUHG�UHSRUW�W\SH�

�� &KRRVH� �

��� &KRRVH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHUHSRUW�

5

6

8

9

10

Tip

7

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–14

��� 6HOHFW�WKH�GHVLUHG�UHSRUW�IURP�WKH�KLWOLVW�

��� &KRRVH� �

��� &KRRVH� �

��� &KRRVH� �

��� 7R�VDYH�\RXU�ZRUN��FKRRVH� �

7KH�UHSRUW�KDV�EHHQ�DVVLJQHG�

,I�\RX�GHFLGHG�WR�JLYH�WKH�UHSRUW�DGLIIHUHQW�QDPH�DQG�GHVFULSWLRQ��WKH�QHZLQIRUPDWLRQ�ZRXOG�EH�GLVSOD\HG�LQ�WKHPHQX�LQVWHDG�

11

14

12

13

15

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–15

'LVSOD\LQJ�WKH�2QOLQH�'RFXPHQWDWLRQ�IRU�$FWLYLW\�*URXS�2EMHFWV

<RX�PD\�UHYLHZ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�QHDUO\�HYHU\�REMHFW�LQ�WKH�DFWLYLW\�JURXS�VWUXFWXUH��LIDYDLODEOH���,I�\RX�DUH�QRW�VXUH�DERXW�D�FHUWDLQ�WUDQVDFWLRQ��LQVWHDG�RI�JRLQJ�WKURXJK�WKH�RQOLQHGRFXPHQWDWLRQ��MXVW�PDUN�LW�LQ�WKH�VWUXFWXUH�DQG�FKRRVH� �'LVSOD\�GRFXPHQWDWLRQ��7KH�DGYDQWDJH�RI�WKLVPHWKRG�LV�\RX�GR�QRW�QHHG�WR�NQRZ�ZKDW�DUHD�\RXU�REMHFW�EHORQJV�WR�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZRXOG�OLNH�WR�NQRZ�PRUH�DERXW�WKH�WUDQVDFWLRQ�0(���&UHDWH�SXUFKDVH�RUGHU�

�� 6HOHFW�WKH�REMHFW�IRU�ZKLFK�\RX�ZDQWWR�UHDG�WKH�GRFXPHQWDWLRQ�

�� &KRRVH� �'LVSOD\�GRFXPHQWDWLRQ�

�� 7KH�GRFXPHQWDWLRQ�EURZVHU�DSSHDUVZLWK�WKH�RQOLQH�GRFXPHQWDWLRQ�IRUWKH�VHOHFWHG�REMHFW�

'HSHQGLQJ�RQ�KRZ�\RX�VHW�XS�\RXURQOLQH�GRFXPHQWDWLRQ��WKH�EURZVHUPLJKW�ORRN�GLIIHUHQW�

3

1

2

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–16

&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV

%DVLFV�RQ�'XSOLFDWLQJ�$FWLYLW\�*URXSV

,W�LV�DFFHSWDEOH�WR�XWLOL]H�RQO\�DFWLYLW\�JURXSV�LQ�\RXU�LPSOHPHQWDWLRQ�DQG�FUHDWH�WKHP�DVQHHGHG��+RZHYHU��6$3�SURYLGHV�WZR�PHWKRGV�WR�PDNH�DFWLYLW\�JURXS�PDLQWHQDQFH�HDVLHU�

7KHVH�WZR�FRUH�PHWKRGV�LQFOXGH�< &RS\LQJ�DFWLYLW\�JURXSV< 8VLQJ�GHULYHG�RU�LQKHULWHG�DFWLYLW\�JURXSV

7KH�GLDJUDP�EHORZ�SURYLGHV�DQ�RYHUYLHZ�RI�ZKDW�WR�H[SHFW�IURP�WKRVH�RSWLRQV�

���7KH�JUHHQ�FLUFOH�LQGLFDWHV�WKDW�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�

���7KH�UHG�;�LQGLFDWHV�WKDW�QR�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�

&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWKRXW�D�XVHU

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�

copy WITHOUT user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

7KH�FRS\��DFWLYLW\BJURXSB���FRQWDLQV�WKH�VDPHLQIRUPDWLRQ�DV�DFWLYLW\BJURXSB��H[FHSW�WKH�XVHU�

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

&RSLHG�DFWLYLW\�JURXS

&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWK�D�XVHU

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�

copy WITH user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

&RSLHG�DFWLYLW\�JURXS

7KH�FRS\��DFWLYLW\BJURXSB���LV�LGHQWLFDO�WRDFWLYLW\BJURXSB��

7KHUH�LV�QR�OLQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQG�DFWLYLW\BJURXSB��DIWHU�WKH�FRS\�SURFHVV�LVSHUIRUPHG�LQ�WKH�WZR�FDVHV�DERYH�

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Release 4.6A/B6–17

'HULYLQJ�DQ�DFWLYLW\�JURXS

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

'HULYHG�DFWLYLW\�JURXS

Derive activity group

7KLV�LV�WKH�GHULYHG�DFWLYLW\�JURXS��$OO�WUDQVDFWLRQVIURP�WKH�RULJLQDO�DFWLYLW\�JURXSV�DUH�DOVR�LQ�WKLVRQH��<RX�FDQ�QRW�DGG�DQ\�LWHPV�WR�WKH�PHQX�7KH�DXWKRUL]DWLRQ�YDOXHV�QHHG�WR�EH�PDLQWDLQHG�

:H�DUH�JRLQJ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS��DFWLYLW\BJURXSB���IURP�$FWLYLW\BJURXSB��E\�XVLQJ�7UDQVDFWLRQ�,QKHULWDQFH�

7UDQVDFWLRQ�,QKHULWDQFH7UDQVDFWLRQ�,QKHULWDQFH

'HULYH�IURP�DFWLYLW\�JURXS 'HULYH�IURP�DFWLYLW\�JURXS

$FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$GGLQJ�WUDQVDFWLRQ�FRGHV�WR�DFWLYLW\BJURXSB��DIWHU�DFWLYLW\BJURXSB��LV�FUHDWHG�RU�JHQHUDWHG�DXWRPDWLFDOO\�LPSDFWV�DFWLYLW\BJURXSB���/LQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQGDFWLYLW\BJURXSB��LV�DOZD\V�XSGDWHG�DXWRPDWLFDOO\�ZKHQ�DFWLYLW\BJURXSB��KDV�QHZ�WUDQVDFWLRQFRGHV�DGGHG�WR�LW�

&RS\LQJ�$FWLYLW\�*URXSV

$V�VKRZQ�LQ�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV��FRS\LQJPHDQV�WKDW�\RX�UHSURGXFH�DQ�H[LVWLQJ�DFWLYLW\�JURXS��<RX�FDQ�FKRRVH�ZKHWKHU�RU�QRW�\RXZDQW�WR�FRS\�WKH�XVHU�DVVLJQPHQW�ZLWK�WKLV�DFWLYLW\�JURXS�

2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�ZKLFK�\RXZRXOG�OLNH�WR�FRS\�RU�VHOHFW�LW�E\�XVLQJ�SRVVLEOH�HQWULHV��7KHQ�FKRRVH� �WR�FRS\�LW��2Q�WKHIROORZLQJ�VFUHHQ��HQWHU�WKH�QHZ�QDPH�IRU�WKH�FRSLHG�DFWLYLW\�JURXS��)RU�D�PRUH�GHWDLOHGGHVFULSWLRQ��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV�

'HULYLQJ�$FWLYLW\�*URXSV

'HULYLQJ�DQ�DFWLYLW\�JURXS��DOVR�FDOOHG�WUDQVDFWLRQ�LQKHULWDQFH��PHDQV�\RX�FDQ�XVH�DQH[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH��(VVHQWLDOO\��WKH�V\VWHP�WUDQVIHUV�WKH�WUDQVDFWLRQV�IURPDQ�H[LVWLQJ�DFWLYLW\�JURXS��7KLV�SURFHVV�RI�GHULYLQJ�RQH�DFWLYLW\�JURXS�IURP�DQRWKHU�LV�RQO\SRVVLEOH�LI�\RX�KDYH�QRW�\HW�DVVLJQHG�DQ\�WUDQVDFWLRQV�WR�WKH�QHZ�DFWLYLW\�JURXS��7KHSUHYLRXV�DFWLYLW\�JURXS�SDVVHV�RQ�DOO�LWV�WUDQVDFWLRQV�WR�WKH�DFWLYLW\�JURXS�GHSHQGHQW�RQ�LW��,I\RX�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�LV�HDV\�WR�PDLQWDLQ�FRQVLVWHQF\�EHWZHHQ�DFFHVV�WRWUDQVDFWLRQ�FRGHV�

,I�\RX�DUH�JRLQJ�WR�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�GRHV�QRW�PDNH�PXFK�VHQVH�WR�XVHWHPSODWHV�RU�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQV�ZLWK�WKH�RULJLQDO�DFWLYLW\�JURXS��2QO\�WKHWUDQVDFWLRQ�FRGHV�DUH�SDVVHG�DORQJ�WR�WKH�GHULYHG�DFWLYLW\�JURXS��7KH�PDQXDOO\�LQVHUWHGDXWKRUL]DWLRQV�DQG�WHPSODWHV�LQ�DFWLYLW\�JURXS���ZLOO�QRW�EH�FRSLHG�LQWR�DFWLYLW\�JURXS���QRU�ZLOO�WKH�OLQNDJH�EH�PDLQWDLQHG�LI�PDQXDOO\�LQVHUWHG�LQ�DFWLYLW\�JURXS����

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–18

$V�RI�5HOHDVH����%��LW�LV�DOVR�SRVVLEOH�WR�DGMXVW�DQG�JHQHUDWH�WKH�SURILOHV�IRU�DOO�DFWLYLW\JURXSV�GHULYHG�IURP�WKH�RULJLQDO�DFWLYLW\�JURXS��$OO�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLV�DFWLYLW\JURXS�LV�SDVVHG�WR�WKH�GHULYHG�DFWLYLW\�JURXSV��H[FHSW�IRU�WKH�RUJDQL]DWLRQDO�OHYHOV��7KHRUJDQL]DWLRQDO�OHYHOV�RI�WKH�GHULYHG�DFWLYLW\�JURXSV�UHPDLQ�XQFKDQJHG��7KH�GDWD�IRU�WKHFRUUHVSRQGLQJ�RUJDQL]DWLRQDO�OHYHO�LV�RQO\�SDVVHG�LI�QR�GDWD�KDV�EHHQ�PDLQWDLQHG�IRU�WKHRUJDQL]DWLRQDO�OHYHO�LQ�D�GHULYHG�DFWLYLW\�JURXS�

7R�H[HFXWH�WKLV�DFWLRQ��\RX�QHHG�IXOO�DXWKRUL]DWLRQ�IRU�WKH�REMHFW�6B86(5B9$/�DV�ZHOO�DV�WKHDXWKRUL]DWLRQ�WR�FKDQJH�WKH�GHULYHG�DFWLYLW\�JURXSV�

7R�DFFHVV�WKLV�IXQFWLRQDOLW\��FKRRVH�$XWKRUL]DWLRQV�→��$GMXVW�GHULYHG�DFWLYLW\�JURXSV�RQ�WKH&KDQJH�$XWKRUL]DWLRQ�'DWD�VFUHHQ�RI�WKH�RULJLQDO�DFWLYLW\�JURXS�

([DPSOH��8VDJH�RI�'HULYHG�$FWLYLW\�*URXSV

$�PDQDJHU�ZDQWV�KHU�VWDII�WR�EH�DEOH�WR�DFFHVV�DOO�WKH�WUDQVDFWLRQV�WKDW�VKH�FDQ��+RZHYHU�KHU�HPSOR\HHV�DUH�QRW�WR�KDYH�DOO�WKH�IXQFWLRQDOLW\�WKDW�HDFK�WUDQVDFWLRQ�RIIHUV�$V�VXFK��ZH�FRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG��0$1$*(5�$�$&&(66�ZLWK�WKHWUDQVDFWLRQ�FRGHV��:H�ZRXOG�DOVR�PDLQWDLQ�DOO�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKLVDFWLYLW\�JURXS��7KHQ�ZH�ZRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�(03/2<((6�0$1$*(5�$�DQG�XVH�0$1$*(5�$�$&&(66�DV�WKH�GHULYHG�DFWLYLW\�JURXS��2Q�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS·V�GHVFULSWLRQ�VFUHHQ�RI�WUDQVDFWLRQ�3)&*��LQ�WKH�ILHOG�'LYHUW$FWLYLW\�*URXS��ZH�ZRXOG�SODFH�0$1$*(5�$�$&&(66���6LQFH�RQO\�WKH�WUDQVDFWLRQV�DUHFRSLHG�LQWR�WKH�´PHQXµ��GHULYHG�IURP�0$1$*(5�$�$&&(66���ZH�VWLOO�QHHG�WR�PDLQWDLQWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��HQWHU�WKH�QDPH�IRU�\RXU�QHZDFWLYLW\�JURXS�LQ�WKH�$FWLYLW\�JURXSILHOG�

�� &KRRVH� �&UHDWH�2

3

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Release 4.6A/B6–19

�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�ORQJ�GHVFULSWLRQ�

�� 8QGHU�7UDQVDFWLRQ�LQKHULWDQFH��VHOHFWDQ�DFWLYLW\�JURXS�IURP�ZKLFK�\RXZDQW�WR�LQKHULW�WKH�WUDQVDFWLRQV��E\HLWKHU�HQWHULQJ�WKH�QDPH�LQ�WKH'HULYH�IURP�DFWLYLW\�JURXS�ILHOG�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

�� &KRRVH�<HV�

7

4

5

6

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–20

�� &KRRVH� �

�� 7R�UHYLHZ�WKH�LQKHULWHG�WUDQVDFWLRQV�FKRRVH�WKH�0HQX�WDE�

$OO�WKH�WUDQVDFWLRQV�IURP�\RXURULJLQDO�DFWLYLW\�JURXS�KDYH�EHHQLQKHULWHG��7KH�PHQX�LV�JRLQJ�WR�ORRNWKH�VDPH�IRU�WKH�XVHU�DV�\RX�GHILQHGLW�KHUH�

1RZ�\RX�FDQ�PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�

8

9

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Release 4.6A/B6–21

6HOHFWLQJ�:RUNIORZ�7DVNV

:KDW�<RX�6KRXOG�.QRZ�$ERXW�:RUNIORZ

7KLV�VHFWLRQ�SURYLGHV�D�VWHS�E\�VWHS�VDPSOH�6$3�%XVLQHVV�:RUNIORZ�DQG�DQ�H[SODQDWLRQ�RIZKDW�\RX�VKRXOG�NQRZ�DERXW�WDVNV�EHIRUH�\RX�DVVLJQ�WKHP�WR�\RXU�DFWLYLW\�JURXS�

7DVNV�DUH�XVHG�WR�H[SHGLWH�D�EXVLQHVV�SURFHGXUH��$�WDVN�FDQ�EH�HLWKHU�D�VLQJOH�VWHS�WDVN�RU�DPXOWL�VWHS�WDVN��,Q�WKH�IROORZLQJ�H[DPSOH��FUHDWLQJ�WKH�5HTXHVW�IRU�/HDYH�IRUP�DQG�WKHQFKHFNLQJ�WKLV�UHTXHVW�DUH�ERWK�VLQJOH�VWHS�WDVNV��7KH�SURFHGXUH�IRU�SURFHVVLQJ�D�5HTXHVW�IRU/HDYH�IRUP�LV�D�PXOWL�VWHS�WDVN��FRQVLVWLQJ�RI�VHYHUDO�FRPELQHG�VLQJOH�VWHS�WDVNV�

7KHUH�DUH�GLIIHUHQFHV�EHWZHHQ�WKH�VLQJOH�VWHS�VWDQGDUG�WDVNV�DQG�WKH�PXOWL�VWHS�ZRUNIORZWHPSODWHV��6WDQGDUG�WDVNV�DUH�WKH�VLQJOH�VWHS�WDVNV�XVHG�LQ�6$3·V�ZRUNIORZ�WHPSODWHV��0DQ\VWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�DUH�SURYLGHG�E\�6$3�DQG�VKRXOG�QRW�EH�FKDQJHG�E\FXVWRPHUV��&XVWRPHUV�FDQ��KRZHYHU��FRS\�DQG�PRGLI\�WKHVH�WHPSODWHV�WR�FUHDWH�WKHLU�RZQVWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�

:RUNIORZ�REMHFWV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS

6WDQGDUG�WDVNV��76� 76�²�FOLHQW�LQGHSHQGHQW

:RUNIORZ�WHPSODWHV��:6� :6���FOLHQW

([DPSOH��6DPSOH�:RUNIORZ�IRU�D�1RWLILFDWLRQ�$EVHQFH

7KLV�SURFHVV�EHJLQV�ZKHQ�DQ�HPSOR\HH�VXEPLWV�D�FRPSOHWHG�5HTXHVW�IRU�/HDYH�IRUP��7KLVIRUP�LV�DXWRPDWLFDOO\�IRUZDUGHG�WR�WKH�HPSOR\HH·V�VXSHUYLVRU��,I�WKH�VXSHUYLVRU�DSSURYHVWKH�UHTXHVW��WKH�HPSOR\HH�LV�LQIRUPHG�DQG�WKH�ZRUNIORZ�HQGV��,I�WKH�VXSHUYLVRU�UHMHFWV�WKHUHTXHVW��WKH�HPSOR\HH�PXVW�GHFLGH�ZKHWKHU�KH�RU�VKH�VKRXOG�WR�UHYLVH�WKH�UHTXHVW��RUZLWKGUDZ�LW�FRPSOHWHO\��,I�WKH�HPSOR\HH�GHFLGHV�WR�UHYLVH�WKH�UHTXHVW��WKH�IRUP�LVDXWRPDWLFDOO\�UHWXUQHG�WR�WKH�HPSOR\HH·V�LQER[��DQG�WKH�ZRUNIORZ�EHJLQV�DJDLQ�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�DVVLJQ�WKH�VWDQGDUG�WDVN�&RQILUPDWLRQ�RI�/HDYH5HTXHVW�WR�WKH�DFWLYLW\�JURXS�),�6XSHUYLVRU�

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Authorizations Made Easy6–22

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�2YHUYLHZ��2UJDQL]DWLRQ0DQDJHPHQW�DQG�ZRUNIORZ��

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�:RUNIORZ�WDE�

�� &KRRVH� �:RUNIORZ�WDVNV�

7KH�:RUNIORZ�WDE�LV�RQO\�GLVSOD\HG�LI�\RX�VHOHFWHG�2YHUYLHZ��2UJDQL]DWLRQ�0DQDJHPHQW�DQGZRUNIORZ��DW�WKH�EHJLQQLQJ�RI�WUDQVDFWLRQ�3)&*��,I�\RX�GR�QRW�VHH�WKLV�WDE��WKH�YLHZ�%DVLFPDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��ZDV�SUREDEO\�VHOHFWHG�RQ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�VFUHHQ�

�� &KRRVH� �WR�DGG�D�WDVN�

�� 6HOHFW�WKH�GHVLUHG�WDVN�W\SH��IRUH[DPSOH��6WDQGDUG�WDVN��

�� &KRRVH� �

$OWKRXJK�WKH�RSWLRQV�:RUNIORZ�WDVN�DQG�7DVN�VWLOO�DSSHDU��WKH\�DUH�QR�ORQJHU�XVHG�RUVXSSRUWHG�

�� &KRRVH� �WR�FRQWLQXH�

3

4

7

6

5

8

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Release 4.6A/B6–23

�� 6HOHFW�WKH�GHVLUHG�LWHP��IRU�H[DPSOH�&RQILUPDWLRQ�RI�/HDYH�5HTXHVW��

��� &KRRVH� �

��� &KRRVH�WKH�FRUUHFW�WLPH�SHULRG�IRUWKH�DVVLJQPHQW�

��� &KRRVH� �

��� &KRRVH� �

7KH�VHOHFWHG�WDVN�LV�QRZ�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��(YHU\RQH�WRZKRP�WKLV�DFWLYLW\�JURXS�ZLOO�EHDVVLJQHG�FDQ�FRQILUP�WKH�OHDYHUHTXHVW�LQ�WKH�GHILQHG�WLPH�SHULRG�

9

10

1112

13

Chapter 6: Advanced Profile Generator Functionality

Deleting Activity Groups

Authorizations Made Easy6–24

'HOHWLQJ�$FWLYLW\�*URXSV

:KHQ�\RX�GHOHWH�DQ�DFWLYLW\�JURXS��WKH�V\VWHP�DXWRPDWLFDOO\�GHOHWHV�DQ\�DVVLJQPHQWVH[LVWLQJ�EHWZHHQ�WKH�DFWLYLW\�JURXS�DQG�5���XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDOXQLWV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�WKH�DFWLYLW\�JURXS�\RXZRXOG�OLNH�WR�GHOHWH�E\�HLWKHUHQWHULQJ�WKH�QDPH�LQ�WKH�$FWLYLW\JURXS�ILHOG�RU�FKRRVLQJ�SRVVLEOHHQWULHV�

�� &KRRVH� �WR�GHOHWH�WKH�DFWLYLW\JURXS�

�� &KRRVH�<HV�

9HULI\�WKDW�\RXU�DFWLYLW\�JURXS�ZDVDFWXDOO\�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVWFRPSOHWHG�HDUOLHU��2WKHUZLVH�WKHGHOHWLRQ�FDQQRW�EH�WUDQVSRUWHG�

�� &KRRVH� �

7KH�FKRVHQ�DFWLYLW\�JURXS�DQG�DOO�WKHFRUUHVSRQGLQJ�DVVLJQPHQWV�KDYHQRZ�EHHQ�GHOHWHG��7KH�DXWKRUL]DWLRQSURILOHV³LQFOXGLQJ�WKHDXWKRUL]DWLRQV�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS³DUH�DOVR�GHOHWHG�

2

3

4

5

Chapter 6: Advanced Profile Generator Functionality

Postmaintaining User Role Templates

Release 4.6A/B6–25

3RVWPDLQWDLQLQJ�8VHU�5ROH�7HPSODWHV

7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��\RX�PXVW�ILUVW�FUHDWH�RU�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHPRQVWUDWHG�KRZ�WR�XVH�WKH�XVHU�UROH�WHPSODWHV�DQGJHQHUDWHG�WKH�UHODWHG�DXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV��,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WRSRVWPDLQWDLQ�H[LVWLQJ�DFWLYLW\�JURXSV�LQ�JUHDWHU�GHWDLO�

2QFH�\RX�KDYH�GHILQHG�DQ�DFWLYLW\�JURXS��XVH�WKH�3URILOH�*HQHUDWRU��3*��WR�DXWRPDWLFDOO\JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��$XWKRUL]DWLRQV�DXWRPDWLFDOO\�JHQHUDWHG�IRU�DFWLYLW\JURXSV�XVH�6$3�VXSSOLHG�GDWD�VR�WKDW�PRVW�ILHOGV�DUH�DOUHDG\�ILOOHG�ZLWK�SURSRVHG�YDOXHV�

7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH�

�� 6WDUW�WKH�JHQHUDWLRQ�SURFHVV�

�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOV�

�� 3RVWHGLW�WKH�DXWKRUL]DWLRQV�DQG�RUJDQL]DWLRQDO�OHYHOV�

7KH�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�DOUHDG\�KDYH�VRPH�DXWKRUL]DWLRQ�GDWD��$OO�RSHQDXWKRUL]DWLRQ�ILHOGV�DQG�RUJDQL]DWLRQDO�OHYHOV�VXFK�DV�FRPSDQ\�FRGHV��EXVLQHVV�DUHDV��RUSODQWV�KDYH�WKH�DVWHULVNV�� ���IRU�IXOO�DXWKRUL]DWLRQ�DVVLJQHG��EXW�WKH�SURILOHV�DUH�QRWJHQHUDWHG�\HW�

'LIIHUHQW�6HWWLQJV�IRU�WKH�0DLQWHQDQFH�9LHZ

<RX�KDYH�GLIIHUHQW�RSWLRQV�WR�GLVSOD\�VHYHUDO�EXWWRQV�LQ�WKH�WUHH�VWUXFWXUH�IRU�WKH�PDLQWHQDQFH�SURFHVV�

7R�DFFHVV�WKH�VHOHFWLRQ�VFUHHQ��VWDUW�WKH�3*�DQG�JR�WR�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��2Q�WKH$XWKRUL]DWLRQV�WDE��FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD��&KRRVH�8WLOLWLHV�→�6HWWLQJV�WR�JHW�WR�WKH�'HILQH6HWWLQJV�IRU�8VHU�ZLQGRZ�

'LIIHUHQW�EXWWRQV�VLPSOLI\�\RXU�ZRUN��,QWKH�WUHH�VWUXFWXUH�\RX�VHH�

�²�2YHUYLHZ�RI�DXWKRUL]DWLRQ�REMHFW�XVH

�²�0HUJLQJ�VHYHUDO�DXWKRUL]DWLRQV

�²�&RS\LQJ�DXWKRUL]DWLRQ

�²�'HOHWLQJ�ILHOG�FRQWHQWV

7KH�WHFKQLFDO�QDPH�LV�GLVSOD\HG�DW�WKH�HQGRI�WKH�FRUUHVSRQGLQJ�OLQH�

6DYH�\RXU�VHWWLQJV�DIWHU�WKH�VHOHFWLRQ�

)RU�IXUWKHU�H[SODQDWLRQ�RI�WKH�LFRQV��FKRRVH�RQ�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Authorizations Made Easy6–26

0DLQWDLQLQJ�DQG�*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV

,Q�WKLV�VHFWLRQ��ZH�DVVXPH�WKH�DFWLYLW\�JURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�DQG�VDYHG��:H�VKRZ�KRZ�WRJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WRPDLQWDLQ�DQG�FKRRVH� �&KDQJH��IRUH[DPSOH��00B%8<(5B$*��

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQSURILOHV�KDYH�EHHQ�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS��<RX�FDQ�DOVR�VHH�WKHVWDWXV�IRU�WKH�DXWKRUL]DWLRQ�SURILOH�LQWKH�,QIRUPDWLRQ�RQ�DXWKRUL]DWLRQ�SURILOHER[�

2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKHDXWKRUL]DWLRQV�GDWD�DSSHDUVKLHUDUFKLFDOO\�

7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKHILUVW�OHYHO��KLJKOLJKWHG�LQ�EOXH��8QGHUQHDWK�\RX�ILQG�OLQHVKLJKOLJKWHG�DV�IROORZV�< �2EMHFW�FODVVHV� �RUDQJH< �$XWKRUL]DWLRQ�REMHFW� �JUHHQ< �$XWKRUL]DWLRQ� �\HOORZ< �$XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH

7R�YLHZ�WKH�OHJHQG�IRU�WKH�LFRQVDQG�FRORUV�FKRRVH� �

�� 7R�PDLQWDLQ�RU�FKDQJH�WKH�DFWLYLW\�GRXEOH�FOLFN�RQ�WKH�HQWU\�QH[W�WR�WKHDFWLYLW\�ILHOG�

5

Tip

4

Tip

3

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Release 4.6A/B6–27

7R�GLVSOD\�DOO�VHOHFWHG�WUDQVDFWLRQV�WKDW�FKHFN�WKLV�DXWKRUL]DWLRQ�REMHFW�IRU�WKH�XQGHUO\LQJDFWLYLW\�JURXS��FKRRVH� �

([SODQDWLRQ�RI�WKH�OLJKWV��*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

�� 6HOHFW�RU�GHVHOHFW�DOO�GHVLUHG�YDOXHVIRU�WKH�DFWLYLW\��\RX�FDQ�XVH�)XOODXWKRUL]DWLRQ��

�� 7R�WUDQVIHU�\RXU�VHOHFWLRQ��FKRRVH�

�� 7R�PDLQWDLQ�WKH�YDOXHV�IRU�WKH�RSHQDXWKRUL]DWLRQV��FOLFN�QH[W�WR�WKHDXWKRUL]DWLRQ�ILHOG�QDPH�

�� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\�

��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �

9

7

6

8

10

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Authorizations Made Easy6–28

$IWHU�PDLQWDLQLQJ�WKH�DFWLYLW\�DQGWKH�ILHOG�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�WKH�OLJKW�FKDQJHV�IURP�\HOORZ�WRJUHHQ�

��� 7R�PDLQWDLQ�WKH�PLVVLQJRUJDQL]DWLRQDO�OHYHOV��FOLFN�RQ�WKHILHOG�QH[W�WR�WKH�DXWKRUL]DWLRQ�ILHOGQDPH��IRU�H[DPSOH��&RPSDQ\�&RGHXQGHU�WKH�REMHFW�$XWKRUL]DWLRQ�IRU&RPSDQ\�&RGHV��

��� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

�)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\��

��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �

$IWHU�PDLQWDLQLQJ�WKH�PLVVLQJ�GDWDIRU�WKLV�RUJDQL]DWLRQDO�OHYHO��WKH�OLJKWFKDQJHV�IURP�UHG�WR�JUHHQ�

3URFHHG�ZLWK�WKH�RWKHU�RSHQ�ILHOGV�LQWKH�VDPH�ZD\�XQWLO�DOO�OLJKWV�KDYHFKDQJHG�WR�JUHHQ�

��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �

7R�DVVLJQ�IXOO�DXWKRUL]DWLRQV�WR�DOO�RSHQILHOGV��FOLFN�RQ�WKH�\HOORZ�OLJKW�DW�WKHWRS��QH[W�WR�WKH�DFWLYLW\�JURXS�

11

12

13

14

Tip

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Release 4.6A/B6–29

5HPHPEHU�WR�PDLQWDLQ�HDFK�RSHQ�DXWKRUL]DWLRQ�ILHOG�ZLWK�D�VXLWDEOH�YDOXH��)RU�VRPHDXWKRUL]DWLRQV��HQWHU�D�VXLWDEOH�YDOXH�LQ�$XWKRUL]DWLRQ�JURXS��,I�\RX�DUH�QRW�VXUH�RI�DVXLWDEOH�YDOXH��XVH�WKH�DVWHULVN�� ��WR�DVVLJQ�RYHUDOO�DXWKRUL]DWLRQ�IRU�XQPDLQWDLQHG�ILHOGV�5HPHPEHU�WKDW�\RX�FDQ�DOZD\V�FKDQJH�YDOXHV�ODWHU�

:KHQ�DOO�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�DQG�\RX�KDYH�VDYHG�\RXUFKDQJHV��JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH�

��� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQV�FKRRVH� �

7KH�V\VWHP�JHQHUDWHV�DQ�DXWKRUL]DWLRQ�IRU�HDFK�DXWKRUL]DWLRQ�LQ�WKH�WUHH�DQG�DQDXWKRUL]DWLRQ�SURILOH�IRU�WKH�DFWLYLW\�JURXS�WKDW�DSSOLHV�WR�WKH�HQWLUH�WUHH�

��� 7KH�$VVLJQ�3URILOH�1DPH�IRU�*HQHUDWHG$XWKRUL]DWLRQ�3URILOH�GLDORJ�ER[DSSHDUV��7KH�V\VWHP�VXJJHVWV7B�LQWHUQDO�QXPEHU!�DV�WKH�GHIDXOWSURILOH�QDPH�

��� &KRRVH� �

7KH�VKRUW�SURILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU��+RZHYHU��WKH�ORQJ�WH[W�IRU�WKH�SURILOH�FDQEH�FKDQJHG�DW�DQ\�WLPH�

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�$XWKRUL]DWLRQV�*HQHUDWHG�ZLWKWKH�3*

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

15

16

17

Chapter 6: Advanced Profile Generator Functionality

Displaying an Overview of Generated Profiles

Authorizations Made Easy6–30

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZR�GLJLWVDUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHWKHQ�QDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

7KH�DXWKRUL]DWLRQ�REMHFW�6B86(5B352�LV�FKHFNHG�GXULQJ�DXWKRUL]DWLRQ�PDLQWHQDQFH��7KHREMHFW�LV�GHILQHG�ZLWK�WKH�IROORZLQJ�ILHOGV��$XWKRUL]DWLRQ�SURILOH�DQG�$FWLYLW\��,Q$XWKRUL]DWLRQ�SURILOH��HQWHU�WKH�DXWKRUL]DWLRQ�SURILOHV�WKDW�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRUFDQ�PDLQWDLQ�RU�WKDW�XVHU�DGPLQLVWUDWRUV�FDQ�DVVLJQ�WR�WKHLU�XVHUV��,Q�$FWLYLW\��\RX�FDQOLPLW�ZKDW�WKH�DGPLQLVWUDWRU�LV�DOORZHG�WR�GR�

,I�\RX�ZDQW�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�ZKR�FDQ�PDLQWDLQ�RQO\�FHUWDLQSURILOHV��VHW�XS�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�

'LVSOD\LQJ�DQ�2YHUYLHZ�RI�*HQHUDWHG�3URILOHV

$IWHU�VXFFHVVIXOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOHV��WR�ILQG�RXW�KRZ�PDQ\�SURILOHV�ZHUHJHQHUDWHG��\RX�KDYH�WR�NQRZ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$PD[LPXP�RI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��ZLWK�WKH�ODVW�WZR�GLJLWV�XVHG�DV�D�FRXQWHU�

,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKH�DGGLWLRQDOSURILOHV�DUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�RULJLQDO�SURILOH·V�XVHUV��7KH�XVHU�PDVWHU�RI�WKLVXVHU�LV�DXWRPDWLFDOO\�XSGDWHG�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GLVSOD\�WKH�RYHUYLHZ�RI�WKH�JHQHUDWHGSURILOHV�IRU�WKH�DFWLYLW\�JURXS�6$3B$//B',63/$<B$*��ZKLFK�FRQWDLQ�WKH�DXWKRUL]DWLRQ�WRGLVSOD\�´HYHU\WKLQJµ�H[FHSW�IRU�+5�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZRXOG�OLNH�WR�YLHZ��IRU�H[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�$XWKRUL]DWLRQ�'DWD�

Chapter 6: Advanced Profile Generator Functionality

Displaying an Overview of Generated Profiles

Release 4.6A/B6–31

�� &KRRVH�$XWKRUL]DWLRQV�→�3URILOH2YHUYLHZ�

,I�WKH�JHQHUDWHG�DXWKRUL]DWLRQSURILOHV�DUH�DOUHDG\�DFWLYH��WKH�GLDORJER[�SURYLGHV�DQ�RYHUYLHZ�RI�WKHFXUUHQW�SURILOH�ZLWK�SURILOH�QDPH�ORQJ�WH[W��DQG�WKH�VWDWXV�RI�WKHYHUVLRQ�

5

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Authorizations Made Easy6–32

5HJHQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ

&KDQJHV

:KHQ�DQ�DFWLYLW\�JURXS�LV�FKDQJHG��IRU�H[DPSOH�DIWHU�\RX�DGG�WUDQVDFWLRQV��UHJHQHUDWH�LWVDXWKRUL]DWLRQ�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*�

)RU�WKH�IROORZLQJ�H[DPSOH��ZH�KDYH�WDNHQ�WKH�DFWLYLW\�JURXS�00B%8<(5B$*�DGGHG�VRPHWUDQVDFWLRQV�DQG�VDYHG�WKH�FKDQJHV��1RZ�ZH�KDYH�VRPH�PRUH�DXWKRUL]DWLRQV�WKDW�QHHG�WR�EHPDLQWDLQHG�DQG�WKH�DFWLYLW\�JURXS�QHHGV�WR�EH�UHJHQHUDWHG�

:KHQ�\RX�FKDQJH�DQ�DFWLYLW\�JURXS��WKH�VWDWXV�RQ�WKH�$XWKRUL]DWLRQV�WDE�LQGLFDWHV�ZKHWKHUD�SURILOH�LV�FXUUHQW�RU�QRW��,I�WKH�GLVSOD\�VKRZV�D�UHG�RU�\HOORZ�OLJKW��WKH�SURILOH�LV�QRWFXUUHQW��7KH�VWDWXV�WH[W�RQ�WKH�VFUHHQ�H[SODLQV�ZK\�WKH�SURILOH�LV�QRW�FXUUHQW�< 5HG�OLJKW�DQG�WKH�WH[W�3URILOH�FRPSDULVRQ�UHTXLUHG

7KH�PHQX�KDV�EHHQ�FKDQJHG�VLQFH�WKH�SURILOH�ZDV�ODVW�JHQHUDWHG��7KHUHIRUH�WKH�SURILOHLV�QRW�FXUUHQW�DQG�WKH�DXWKRUL]DWLRQ�SURILOHV�QHHGV�WR�EH�UHJHQHUDWHG��<RX�PD\�DOVRKDYH�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�

< <HOORZ�OLJKW

7KH�SURILOH�KDV�EHHQ�FKDQJHG�DQG�VDYHG�VLQFH�LW�ZDV�ODVW�JHQHUDWHG��WKH�SURILOH�LV�QRWFXUUHQW�DQ\PRUH��DQG�WKH�DXWKRUL]DWLRQ�SURILOH�QHHGV�WR�EH�UHJHQHUDWHG�

< ,I�\RX�DUH�XQVXUH�ZKHWKHU�DQ�DXWKRUL]DWLRQ�SURILOHV�VKRXOG�EH�UHJHQHUDWHG�

1��5XQ�WUDQVDFWLRQ�SUPC�2��6HOHFW�$OVR�DFW��JUSV�WR�EH�DGMXVWHG�3��&KRRVH� �WR�H[HFXWH�WKH�WUDQVDFWLRQ�

7KH�V\VWHP�JHQHUDWHV�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�ZLWK�H[LVWLQJ�DXWKRUL]DWLRQ�GDWD�LQ�WKHV\VWHP��$FWLYLW\�JURXSV�LQ�UHG�QHHG�WR�EH�UHJHQHUDWHG�DIWHU�SRVWPDLQWDLQLQJ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��6HOHFW�RQH�RI�WKHVH�DFWLYLW\�JURXSV�DQG�FKRRVH�0DLQWDLQ�SURILOH��)URPSUPC��FDOO�WUDQVDFWLRQ�PFCG�DQG�SURFHHG�DV�GHVFULEHG�EHORZ�

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Release 4.6A/B6–33

3UHUHTXLVLWH��<RX�PXVW�PDNH�FKDQJHV�WRDQ�DFWLYLW\�JURXS�DQG�VDYH�WKHP�EHIRUH\RX�FDQ�UHJHQHUDWH�DXWKRUL]DWLRQSURILOHV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�

,Q�H[SHUW�PRGH��\RX�FDQ�VHOHFW�H[SOLFLWO\WKH�RSWLRQ�ZLWK�ZKLFK�\RX�ZDQW�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�YDOXHV��7KLVRSWLRQ�LV�DXWRPDWLFDOO\�VHW�FRUUHFWO\�LQQRUPDO�PRGH�

�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWKQHZ�GDWD�

�� &KRRVH� �

2SWLRQV�RQ�WKH�'HILQH�0DLQWHQDQFH�7\SH�VFUHHQ�< 'HOHWH�DQG�UHFUHDWH�SURILOH�DQG�DXWKRUL]DWLRQV

$OO�DXWKRUL]DWLRQV�DUH�UH�FUHDWHG��9DOXHV�WKDW�KDYH�SUHYLRXVO\�EHHQ�PDLQWDLQHG�FKDQJHG��RU�HQWHUHG�PDQXDOO\�DUH�ORVW��2QO\�WKH�PDLQWDLQHG�YDOXHV�IRU�RUJDQL]DWLRQDOOHYHOV�UHPDLQ�

< (GLW�ROG�VWDWXV

<RX�FDQ�HGLW�WKH�DXWKRUL]DWLRQ�SURILOH�\RX�SUHYLRXVO\�PDLQWDLQHG�ZLWK�LWV�ROG�YDOXHV�,W�LV�QRW�ZRUWK�HGLWLQJ�LI�WKH�DVVLJQPHQW�RI�WUDQVDFWLRQV�WR�DFWLYLW\�JURXSV�KDVFKDQJHG�

< 5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�QHZ�GDWD

7KH�3*�FRPSDUHV�WKH�ROG�DQG�FXUUHQW�GDWD�IURP�WKH�DFWLYLW\�JURXS��7KLV�FKRLFH�LV�WKHEHVW�RSWLRQ�LI�WKH�DFWLYLW\�JURXS�KDV�FKDQJHG��8QFKDQJHG�GDWD�LV�PDUNHG�DV�2OG��QHZGDWD�DV�1HZ�

3

4

5

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Authorizations Made Easy6–34

:H�DGGHG�D�IHZ�WUDQVDFWLRQV�WR�WKHDFWLYLW\�JURXS��7KH�SUHYLRXVO\PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUHNHSW��:KHQ�QHZ�RUJDQL]DWLRQDO�OHYHOVDUH�DGGHG��WKH\�PXVW�EH�PDLQWDLQHG�

�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOVZLWK�WKH�ULJKW�YDOXHV��RU�FKRRVH�)XOODXWKRUL]DWLRQ�WR�ILOO�DOO�EODQNV�ZLWKDVWHULVNV�� ���:H�FKRVH�)XOODXWKRUL]DWLRQ�LQ�RXU�H[DPSOH��

�� &KRRVH� �

2OG�DXWKRUL]DWLRQV�DUH�PDUNHG�2OG�QHZ�DXWKRUL]DWLRQV�DUH�PDUNHG�1HZ�

�� 0DLQWDLQ�WKH�RSHQ�ILHOGV�DVGHVFULEHG�LQ�0DLQWDLQLQJ�DQG*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHVRQ�SDJH��²���

�� &KRRVH� �

6

7

8

9

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Release 4.6A/B6–35

3OHDVH�NHHS�WKH�IROORZLQJ�LQ�PLQG�ZKHQ�PDNLQJ�WKH�SRVW�FKDQJH�FRPSDULVRQ�< 3UHYLRXVO\�PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUH�NHSW��,I�QHZ�RUJDQL]DWLRQDO�OHYHOV�DUH

DGGHG��\RX�PXVW�PDLQWDLQ�WKHVH�OHYHOV�< ,I�DXWKRUL]DWLRQV�ZLWKLQ�DQ�DXWKRUL]DWLRQ�REMHFW�KDYH�FKDQJHG��\RX�QHHG�WR�H[HFXWH

WKH�FRPSDULVRQ�PDQXDOO\��<RX�PXVW�GHFLGH�ZKHWKHU�WR�NHHS�WKH�ROG�PRGLILHG�GDWD�RUXVH�WKH�FXUUHQW�GDWD��'HOHWH�RU�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�\RX�QR�ORQJHU�UHTXLUH�

< 0DLQWDLQHG�DXWKRUL]DWLRQV�DUH�FRQILJXUHG�ZLWK�WKH�YDOXHV�\RX�PDLQWDLQHG�IRU�WKHP�)RU�H[DPSOH��IRU�DXWKRUL]DWLRQ�JURXS�������FHUWDLQ�DFWLYLWLHV��,QVHUW��&KDQJH��DQG'LVSOD\��DQG�PDLQWDLQHG�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�WUDQVDFWLRQV�DUHUHTXLUHG��\RX�PDLQWDLQHG�WKH�YDOXH�IRU�DXWKRUL]DWLRQ�JURXS���&KDQJH�WKH�DFWLYLW\JURXS�VR�WKDW�WKH�IROORZLQJ�DFWLYLWLHV�DULVH��&KDQJH��'LVSOD\��DQG�'HOHWH��7KH�YDOXH�����LV�FRSLHG�IRU�WKH�DXWKRUL]DWLRQ�JURXS�IRU�&KDQJH�DQG�'LVSOD\��WKHVH�DFWLYLWLHV�ZHUHDOUHDG\�PDLQWDLQHG���7KH�,QVHUW�RSWLRQ�GLVDSSHDUV��)RU�WKH�'HOHWH�DFWLYLW\��PDLQWDLQ�WKHDXWKRUL]DWLRQ�JURXS�DJDLQ��VLQFH�WKLV�JURXS�ZDV�QRW�PDLQWDLQHG�LQ�WKH�ROG�SURILOH·VVWDWXV�

< :KHUHYHU�WKH�1HZ�DWWULEXWH�DSSHDUV��FKHFN�LI�WKH�QHZ�DXWKRUL]DWLRQV�PDNH�VHQVH��\RXFDQ�FRPSDUH�WKHP�PDQXDOO\�ZLWK�WKH�ROG�YDOXHV��

< 0DQXDOO\�HQWHUHG�DXWKRUL]DWLRQV�DUH�QRW�GHOHWHG�7KH�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�DUH�DOZD\V�DXWRPDWLFDOO\�ILOOHG�ZLWKWKH�FXUUHQW�WUDQVDFWLRQ�IURP�WKH�DFWLYLW\�JURXS��EXW�KDYH�WKH�DWWULEXWH�2OG�

:KHQ�WKHUH�DUH�RQO\�JUHHQ�OLJKWV�LQ�WKHWUHH��WKHUH�DUH�QR�PRUH�RSHQDXWKRUL]DWLRQ�ILHOGV�WR�PDLQWDLQ�

��� &KRRVH� �WR�UHJHQHUDWH�WKH�H[LVWLQJDXWKRUL]DWLRQ�SURILOHV�

$IWHU�WKH�UHJHQHUDWLRQ�RI�WKHDXWKRUL]DWLRQ�SURILOHV�LV�ILQLVKHG�\RX�FDQ�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�

10

Chapter 6: Advanced Profile Generator Functionality

Using Utilities to Change Generated Authorizations

Authorizations Made Easy6–36

8VLQJ�8WLOLWLHV�WR�&KDQJH�*HQHUDWHG�$XWKRUL]DWLRQV

7KHUH�DUH�WZR�RSWLRQV�WR�DOWHU�WKH�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV��7KHVH�RSWLRQV�DUH�IRXQG�LQWUDQVDFWLRQ�3)&*��XQGHU�WKH�8WLOLWLHV�PHQX�LQ�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ�

0HUJLQJ�$XWKRUL]DWLRQV

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�8WLOLWLHV�→�0HUJHDXWKRUL]DWLRQV�

�� 7KH�V\VWHP�DXWRPDWLFDOO\VXPPDUL]HV�DOO�SRVVLEOHDXWKRUL]DWLRQV�DQG�WKH�UHVXOWDSSHDUV�LQ�D�V\VWHP�PHVVDJH�

,Q�RXU�H[DPSOH��WKH�VWDWXV�EDU�VKRZVWKDW�ILYH�DXWKRUL]DWLRQV�KDYHFRPELQHG�ZLWK�RWKHUV�

4

5

Chapter 6: Advanced Profile Generator Functionality

Using Utilities to Change Generated Authorizations

Release 4.6A/B6–37

5HRUJDQL]LQJ�7HFKQLFDO�1DPHV�RI�$XWKRUL]DWLRQV

7KH�WHFKQLFDO�QDPH�RI�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�DQG�DWZR�GLJLW�QXPEHU�EHWZHHQ����DQG����

7��LQWHUQDO�QXPEHU!QQ��IRU�H[DPSOH��7�����������

,I�WKH�DXWKRUL]DWLRQ�SURILOHV�FKDQJHG�DV�D�UHVXOW�RI�FKDQJHV�LQ�WKH�DSSURSULDWH�DFWLYLW\�JURXS��UHRUJDQL]H�WKHQXPEHUV�WR�DYRLG�QXPEHU�DVVLJQPHQW�SUREOHPV��7KH�IROORZLQJ�SURFHGXUH�UHVWDUWV�WKH�QXPEHU�DVVLJQPHQWIURP�����:KHQHYHU�\RX�JHQHUDWH�D�QHZ�DXWKRUL]DWLRQ�SURILOH��WKLV�UHRUJDQL]DWLRQ�LV�DXWRPDWLFDOO\�WDNHQLQWR�DFFRXQW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�8WLOLWLHV�→�5HRUJDQL]H�

7KH�V\VWHP�DXWRPDWLFDOO\UHRUJDQL]HV�WKH�ILQDO�GLJLWV�RI�WKHDXWKRUL]DWLRQV�WHFKQLFDO�QDPHV�DQGWKH�UHVXOW�DSSHDUV�LQ�D�V\VWHPPHVVDJH��IRU�H[DPSOH��$XWKRUL]DWLRQVZHUH�UHRUJDQL]HG��

4

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–38

&XVWRPL]LQJ�$XWKRUL]DWLRQV

6$3�GHOLYHUV�D�XVHU�UROH�WHPSODWH�IRU�WKH�&XVWRPL]LQJ�3URMHFW�0HPEHU��ZKLFK�LV�FDOOHG6$3B%&B&86B&86720,=(5B$*��7KLV�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�DQ\�SHUVRQ�GRLQJ�FXVWRPL]LQJ�LQ5����,Q�DGGLWLRQ��\RX�FDQ�DVVLJQ�SURMHFWV�RU�YLHZV�RI�WKH�,PSOHPHQWDWLRQ�*XLGH��,0*��WR�DQ�DFWLYLW\�JURXS�7KH�DLP�RI�WKLV�DVVLJQPHQW�LV�WR�JHQHUDWH�DXWKRUL]DWLRQV�IRU�DQG�DVVLJQ�XVHUV�WR�VSHFLILF�,0*�DFWLYLWLHV��7KDWLQVXUHV�WKDW�XVHUV�DUH�RQO\�DOORZHG�WR�SHUIRUP�WDVNV�LQ�WKHLU�FXVWRPL]LQJ�SURMHFW�DQG�QRW�LQ�DQ\�RWKHU�:KHQ�\RX�JHQHUDWH�SURILOHV��LW�DOVR�JHQHUDWHV�WKH�DXWKRUL]DWLRQV�QHFHVVDU\�WR�H[HFXWH�DOO�DFWLYLWLHV�LQ�WKHDVVLJQHG�,0*�SURMHFWV�RU�SURMHFW�YLHZV�

$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV

,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FXVWRPL]LQJ�DFWLYLW\�JURXS�IRU�D�40FXVWRPL]LQJ�SURMHFW��7KHUHIRUH��ZH�ZLOO�FUHDWH�D�QHZ�DFWLYLW\�JURXS�FDOOHG�40B&86720,=,1*�DQG�DVVLJQWKH�40�FXVWRPL]LQJ�SURMHFW�WR�LW��<RX�FDQ�DVVLJQ�GLIIHUHQW�SURMHFW�YLHZV�LI�DYDLODEOH�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�DQDPH�IRU�\RXU�QHZ�DFWLYLW\�JURXS�

�� &KRRVH� �&UHDWH�

3

2

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–39

�� (QWHU�D�VKRUW�GHVFULSWLRQ�LQ�WKH'HVFULSWLRQ�ILHOG�

�� (QWHU�D�ORQJ�WH[W�GHVFULSWLRQ�IRU�WKHDFWLYLW\�JURXS��RSWLRQDO��

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�0HQX�WDE�

�� &KRRVH�8WLOLWLHV�→�&XVWRPL]LQJ�DXWK�

<RX�FDQ�VHH�WKH�VWDWXV�RI�WKH�DFWLYLW\JURXS�LQ�WKH�GLDORJ�ER[�

�� &KRRVH� �$GG�WR�DVVLJQ�DFXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZWR�WKH�DFWLYLW\�JURXS�

��� 6HOHFW�,0*�SURMHFW�RU�,0*�SURMHFWYLHZ��GHSHQGLQJ�RQ�ZKDW�\RX�ZRXOGOLNH�WR�DVVLJQ��,Q�RXU�H[DPSOH��ZHDVVLJQHG�DQ�,0*�SURMHFW�

��� &KRRVH� �

��� 6HOHFW�WKH�GHVLUHG�SURMHFW�RU�SURMHFWYLHZ��LQ�WKLV�H[DPSOH��ZH�VHOHFWHGWKH�SURMHFW�40B&86720��

��� &KRRVH� �

��� &KRRVH� �WR�FRQWLQXH�

4

5

6

7

8

9

10

11

12

13

14Tip

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–40

7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW

2Q�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQV�VFUHHQ��LI�WKHUH�DUH�XVHUV�DVVLJQHG�WR�WKH�,0*�SURMHFWWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�WKLV�DFWLYLW\�JURXS��FKRRVH� �8VHU��7KLV�DFWLRQ�FRSLHV�WKHXVHUV�IURP�WKH�,0*�SURMHFW�WR�WKH�DFWLYLW\�JURXS�

1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�FKDQJHV�DUH�PDGH�LQ�WKH�,0*SURMHFW�DGPLQLVWUDWLRQ�

7KH�V\VWHP�DXWRPDWLFDOO\GHWHUPLQHV�WKH�WUDQVDFWLRQ�FRGHVDQG�DGGLWLRQDO�DXWKRUL]DWLRQ�REMHFWVWKDW�DUH�UHTXLUHG�WR�PDLQWDLQ�WKHWDEOHV�IRU�WKLV�,0*�SURMHFW�RU�SURMHFWYLHZ��DQG�LPSRUWV�WKHP�LQWR�WKHDFWLYLW\�JURXS�

��� 7R�VDYH�\RXU�DFWLYLW\�JURXS��FKRRVH�

<RX�FDQQRW�PDQXDOO\�DVVLJQWUDQVDFWLRQV�WR�WKLV�DFWLYLW\�JURXS�QRUFDQ�\RX�VHOHFW�DQ\�IURP�WKH�6$3�PHQX�1RWH�WKDW�WKH�EXWWRQV�WR�GR�WKLV�KDYHYDQLVKHG�

15

Tip

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–41

��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�WRFRQWLQXH�WKH�JHQHUDWLRQ�SURFHVV�

��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,I�QHFHVVDU\��WKH�GLDORJ�ER[�'HILQH2UJ��/HYHOV�DSSHDUV�

��� (QWHU�WKH�DSSURSULDWH�GDWD��<RX�FDQJLYH�IXOO�DXWKRUL]DWLRQV�E\�FKRRVLQJ)XOO�DXWKRUL]DWLRQ�LQ�WKH�ORZHU�ULJKWFRUQHU�

��� &KRRVH� �

16

17

18

19

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–42

��� 0DLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV�LQGLFDWHG�E\�WKH�\HOORZ�OLJKW

�DV�GHVFULEHG�HDUOLHU�LQ�WKLVERRN��,Q�RXU�H[DPSOH��ZH�FKRVH�IXOODXWKRUL]DWLRQ�E\�FOLFNLQJ�RQ�WKHXSSHU�PRVW�\HOORZ�OLJKW�

,I�\RX�FKRRVH�IXOO�DXWKRUL]DWLRQV��DFRQILUPDWLRQ�VFUHHQ�DSSHDUV�

��� &KRRVH� �WR�FRQWLQXH�

$OO�RSHQ�DXWKRUL]DWLRQV�DUH�ILOOHGZKHQ�DOO�WKH�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�

��� 6DYH�WKH�DFWLYLW\�JURXS�

20

21

22

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–43

��� 2Q�WKH�$VVLJQ�3URILOH�1DPH�IRU*HQHUDWHG�$XWKRUL]DWLRQ�3URILOH�VFUHHQ�\RX�KDYH�WKH�RSWLRQ�WR�FKDQJH�WKH3URILOH�QDPH��<RX�ZLOO�QRW�EH�DEOH�WRFKDQJH�LW�ODWHU�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�DFWLYLW\�JURXS�FKRRVH� �

��� 7R�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�FKRRVH� �

<RX�KDYH�QRZ�FUHDWHG�D�FXVWRPL]LQJDFWLYLW\�JURXS�DQG�DVVLJQHGDXWKRUL]DWLRQ�GDWD�WR�LW�

,I�WKHUH�DUH�QR�XVHUV�DVVLJQHG�WR�WKHVHOHFWHG�,0*�SURMHFW�RU�LI�\RX�FKRVHQRW�WR�FRS\�WKHP�WR�WKH�DFWLYLW\JURXS�LQ�DQ�HDUOLHU�VWHS��\RX�VWLOOKDYH�WR�GR�VR��&KRRVH�WKH�8VHUV�WDEWR�DVVLJQ�XVHUV�WR�WKH�DFWLYLW\�JURXS�DV�GHPRQVWUDWHG�LQ�FKDSWHUV���DQG���

23

24

25

26

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–44

,I�WKH�,0*�SURMHFW�KDV�FKDQJHG��\RX�VKRXOG�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLVDFWLYLW\�JURXS��7KH�ILUVW�VWHS�LV�WR�FKRRVH� �5HIUHVK�RQ�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQVGLDORJ�ER[��VHH�VWHS����RQ�SDJH��²�����7KLV�DFWLRQ�UHFDOFXODWHV�WKH�WUDQVDFWLRQ�FRGHV��<RXPXVW�WKHQ�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�

7R�DVVLJQ�XVHUV�WR�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��\RX�FDQ�WUDQVIHU�WKH�XVHUV�WKDW�DUHDOUHDG\�DVVLJQHG�WR�WKH�FXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZ��<RX�FDQ�DOVR�DVVLJQ�DQ\�RWKHUXVHU�WR�WKLV�FXVWRPL]LQJ�DFWLYLW\�JURXS�

<RX�VKRXOG�FRQVLGHU�XVLQJ�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWH6$3B%&B&86B&86720,=(5B$*�IRU�HYHU\�FXVWRPL]LQJ�SURMHFW�PHPEHU�

7–1

&KDSWHU��� 3UHSDULQJ�WKH�5��

(QYLURQPHQW�IRU�*R�/LYH

&RQWHQWV

Overview ..................................................................................................................7–2

Transports Between Clients ..................................................................................7–2

Transports Between R/3 Systems.........................................................................7–3

Transporting Activity Groups ................................................................................7–3

Transporting Check Indicators and Field Values ................................................7–8

Transporting Authorization Templates.................................................................7–8

Transporting User Master Records.......................................................................7–8

��

Chapter 7: Preparing the R/3 Environment for Go-Live

Overview

Authorizations Made Easy7–2

2YHUYLHZ

:KHQ�\RX�ILQLVK�XVLQJ�RQH�RI�WKH�WKUHH�SRVVLEOH�PHWKRGV�IRU�ZRUNLQJ�ZLWK�XVHU�UROHWHPSODWHV³DQG�\RX�KDYH�PDLQWDLQHG�DQG�JHQHUDWHG�DOO�QHFHVVDU\�DXWKRUL]DWLRQV³\RX�FDQSUHSDUH�IRU�JR�OLYH��3UHSDUDWLRQ�PHDQV�WKDW�\RX�KDYH�WR�WUDQVSRUW�HYHU\WKLQJ�\RX�KDYHFUHDWHG�LQ�\RXU�'(9�V\VWHP�WR�\RXU�4$6�V\VWHP��DQG�ILQDOO\�WR�\RXU�35'�V\VWHP��VHHFKDSWHU���RQ�WKH�WKUHH�V\VWHP�HQYLURQPHQW��

<RX�FDQ�WUDQVSRUW�HLWKHU�EHWZHHQ�FOLHQWV��ZLWKLQ�DQ�5���6\VWHP��RU�EHWZHHQ�5���6\VWHPV�'HSHQGLQJ�RQ�WKH�W\SH�RI�WUDQVSRUW��\RX�FDQ�WUDQVSRUW�WKH�IROORZLQJ�LWHPV�< $FWLYLW\�JURXSV< &RPSRVLWH�DFWLYLW\�JURXSV< $XWKRUL]DWLRQ�SURILOH�GDWD< $XWKRUL]DWLRQ�GDWD< 8VHU�PDVWHU�UHFRUGV

7UDQVSRUWV�%HWZHHQ�&OLHQWV

7KH�LWHPV�LQ�WKH�OLVW�DERYH�DUH�FOLHQW�GHSHQGHQW��7KHUHIRUH��VHSDUDWH�UHFRUGV��DFWLYLW\�JURXSV�SURILOHV��DQG�DXWKRUL]DWLRQV�PXVW�EH�PDLQWDLQHG�IRU�HDFK�5���FOLHQW��7UDQVDFWLRQ�6&&/��7RROV→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ�→�&OLHQW�&RS\�→�6&&/�¥�/RFDO&RS\���ZKLFK�PXVW�EH�UXQ�IURP�WKH�WDUJHW�FOLHQW��WUDQVSRUWV�XVHU�PDVWHU�UHFRUGV�DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�EHWZHHQ�FOLHQWV��$V�RI�5HOHDVH����$��DFWLYLW\JURXSV�DUH�FRSLHG�ZLWK�&XVWRPL]LQJ�

:KHQ�\RX�FDUU\�RXW�D�WUDQVSRUW��DOO�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�LQ�WKHWDUJHW�V\VWHP�ZLWK�WKH�VDPH�QDPHV�DV�LWHPV�LQ�WKH�WUDQVSRUW�ZLOO�EH�RYHUZULWWHQ�7KHUHIRUH��GR�QRW�XVH�6&&/�LI�\RXU�WDUJHW�FOLHQW�FRQWDLQV�DXWKRUL]DWLRQV�DQG�XVHU�PDVWHUUHFRUGV�WKDW�\RX�ZDQW�WR�NHHS��2QO\�XVH�6&&/�WR�FUHDWH�D�QHZ�FOLHQW�ZLWK�WKH�REMHFWV6$3B&867��XVHUV�ZLOO�EH�NHSW��RU�6$3B8&86��XVHUV�FRPH�IURP�WKH�VRXUFH�FOLHQW��

6LQFH�DFWLYLW\�JURXSV�EHORQJ�WR�&XVWRPL]LQJ��WKH\�DUH�FRSLHG�DXWRPDWLFDOO\�GXULQJ�FOLHQWFRS\��,W�LV�DOVR�SRVVLEOH�WR�FRS\�WKHP�PDQXDOO\��VHH�EHORZ��

7KH�WUDQVDFWLRQ�GRFXPHQWDWLRQ�FRQWDLQV�DGGLWLRQDO�LQIRUPDWLRQ�DERXW�WKH�QHFHVVDU\DXWKRUL]DWLRQV��8VH�WUDQVDFWLRQ�6&&���7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ�→�6SHFLDO�)XQFWLRQV�→�6&&��¥�&RS\�7UDQVSRUW�5HTXHVW��WR�PDQXDOO\�FRS\DFWLYLW\�JURXSV�EHWZHHQ�H[LVWLQJ�FOLHQWV�

Chapter 7: Preparing the R/3 Environment for Go-Live

Transports Between R/3 Systems

Release 4.6A/B7–3

7R�FRS\�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV�

�� &UHDWH�D�WUDQVSRUW�UHTXHVW�ZLWK�WKH�DSSURSULDWH�DFWLYLW\�JURXSV�

�� ,I�\RX�XVH�WUDQVDFWLRQ�6&&���GR�QRW�UHOHDVH�WKH�WUDQVSRUW�

7UDQVDFWLRQ�6&&��ZRUNV�ZLWK�UHOHDVHG�DQG�XQUHOHDVHG�WUDQVSRUWV�

�� /RJ�RQ�WR�WKH�RWKHU�FOLHQW�

�� 5XQ�WUDQVDFWLRQ�6&&��

�� &KRRVH�WKH�6RXUFH�FOLHQW�DQG�7UDQVSRUW�UHTXHVW�LQFOXGLQJ�WKH�WDVN�QXPEHU�

�� ([HFXWH�

7KH�DFWLYLW\�JURXS�V��VKRXOG�QRZ�EH�DFWLYH�LQ�WUDQVDFWLRQ�3)&*�

:KHQ�\RX�WUDQVSRUW�XVLQJ�6&&���WKH�UHSRUW�WUHH�LQVLGH�WKH�DFWLYLW\�JURXS�LV�WUDQVSRUWHG�EXW�QRW�WKH�UHSRUW�WUHH�LWVHOI��<RX�KDYH�WR�WUDQVSRUW�WKH�UHSRUW�WUHH�EHIRUHKDQG��$OVRUHPHPEHU�WKDW�UHSRUW�WUHHV�DUH�FOLHQW�GHSHQGHQW�

7UDQVSRUWV�%HWZHHQ�5���6\VWHPV

<RX�FDQ�WUDQVSRUW�DXWKRUL]DWLRQ�FRPSRQHQWV��DFWLYLW\�JURXSV��DQG�XVHU�PDVWHU�UHFRUGVEHWZHHQ�5���6\VWHPV��&RPSRQHQWV�PD\�EH�WUDQVSRUWHG�LQGHSHQGHQWO\�RU�ZLWK�DOO�RI�WKHLUDVVRFLDWHG�DXWKRUL]DWLRQV�

7UDQVSRUWLQJ�$FWLYLW\�*URXSV

:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV�WKH�DXWKRUL]DWLRQ�SURILOHV��7KHSURILOHV�QR�ORQJHU�KDYH�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�LQ�WUDQVDFWLRQ�683&�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�

2QFH�\RX�KDYH�HQWHUHG�WKH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUW�UHTXHVW��\RX�VKRXOG�QRW�PDNH�DQ\PRUH�FKDQJHV�WR�WKH�DXWKRUL]DWLRQ�SURILOHV�RI�WKDW�DFWLYLW\�JURXS��,I�\RX�FKDQJH�SURILOHV�RUJHQHUDWH�WKHP�IRU�WKH�ILUVW�WLPH��\RX�VKRXOG�HQWHU�WKH�ZKROH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUWUHTXHVW�DJDLQ�

7KH�DFWLYLW\�JURXSV�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVW�FDQ�EH�GLVSOD\HG�ZLWK�WUDQVDFWLRQ�6(���

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Authorizations Made Easy7–4

7UDQVSRUWLQJ�6LQJOH�$FWLYLW\�*URXSV�8VLQJ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�7UDQVDFWLRQ

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� (QWHU�WKH�DFWLYLW\�JURXS�\RX�ZRXOGOLNH�WR�WUDQVSRUW�RU�VHOHFW�LW�XVLQJSRVVLEOH�HQWULHV�

�� &KRRVH� �WR�WUDQVSRUW�WKH�DFWLYLW\JURXS�

�� &KRRVH� �WR�FRQWLQXH�

�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�

�� &KRRVH� �

2

3

5

6

4

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Release 4.6A/B7–5

<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�

,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.

�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVWV��FUHDWH�D�QHZ�RQHXVLQJ� �

�� &KRRVH� �

�� <RX�FDQ�XVH�WUDQVDFWLRQ�6(���WR�GLVSOD\�\RXU�FXVWRPL]LQJ�WUDQVSRUW�UHTXHVWV�

��� 7R�LPSRUW�WKH�UHTXHVW�ZLWK�WKH�GDWD��ORJ�RQ�WR�WKH�FOLHQW�\RX�ZRXOG�OLNH�WR�LPSRUW�WKH�GDWD�WR�DQGH[HFXWH�WUDQVDFWLRQ�6&&���VHH�7UDQVSRUW�%HWZHHQ�&OLHQWV��VWHSV��²��RQ�SDJH��²���

7

8

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Authorizations Made Easy7–6

0DVV�7UDQVSRUW�RI�$FWLYLW\�*URXSV

7R�WUDQVSRUW�D�VHW�RI�DFWLYLW\�JURXSV�DOO�DW�RQFH��XVH�WKH�PDVV�WUDQVSRUW�IXQFWLRQ�LQVLGH�WKH�3*�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��FKRRVH�(QYLURQPHQW�→�0DVVWUDQVSRUW�

�� (QWHU�WKH�ILUVW�DQG�ODVW�DFWLYLW\�JURXSRI�WKH�UDQJH�WKDW�\RX�ZRXOG�OLNH�WRWUDQVSRUW��<RX�FDQ�DOVR�XVH�SRVVLEOHHQWULHV�IRU�D�OLVW�RI�DOO�H[LVWLQJ�DFWLYLW\JURXSV�

,Q�WKLV�H[DPSOH��ZH�FKRVH�DOO�DFWLYLW\JURXSV�IURP),B$3B'DWDB(QWU\B&OHUN�WR40B0DQDJHUB$VVLWDQW�

�� &KRRVH� �

�� &KRRVH� �WR�FRQWLQXH�

3

4

2

5

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Release 4.6A/B7–7

�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�

�� &KRRVH� �

<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�

,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.

�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVW��FUHDWH�D�QHZ�RQHXVLQJ� �

�� &KRRVH� �

8VHU�0DVWHU�5HFRUG�&RPSDULVRQ�$IWHU�,PSRUW�LQWR�WKH�7DUJHW�6\VWHP

2QFH�WKH�DFWLYLW\�JURXSV�KDYH�EHHQ�LPSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��\RX�VKRXOG�FRPSDUHWKH�XVHU�PDVWHU�UHFRUGV�RI�WKH�DFWLYLW\�JURXSV�FRQFHUQHG��([HFXWH�WKLV�FRPSDULVRQ�XVLQJUHSRUW�3)&*B7,0(B'(3(1'(1&<��ZKLFK�\RX�VKRXOG�VFKHGXOH�SHULRGLFDOO\�

,I�\RX�GR�QRW�ZDQW�WR�ZDLW�XQWLO�WKDW�UHSRUW�UXQV�DQG�ZDQW�WKH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHWV\VWHP�WR�EH�LPPHGLDWHO\�FRQVLVWHQW��FRPSDUH�WKH�DFWLYLW\�JURXSV�E\�FKRRVLQJ�(QYLURQPHQW→�0DVV�FRPSDUH�LQ�WUDQVDFWLRQ�3)&*��,Q�WKH�$FWLYLW\�JURXS�ILHOG��FKRRVH�WKH�DFWLYLW\�JURXSVFRQFHUQHG��6HOHFW�&RPSOHWH�FRPSDUH�LQ�WKH�6HOHFWLRQ�RI�DFWLRQ�ILHOG�DQG�VWDUW�WKH�UHSRUW�E\FKRRVLQJ�WKH� ��7KH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHW�V\VWHP�DUH�WKHQ�PDGH�FRQVLVWHQW�

6

7

8

9

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Check Indicators and Field Values

Authorizations Made Easy7–8

7UDQVSRUWLQJ�&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV

:LWK�WUDQVDFWLRQ�68���\RX�FDQ�FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV�FRQFHUQLQJ�FKHFN�LQGLFDWRUV�ILHOG�YDOXHV��DQG�WDEOHV�862%;�DQG�862%7��7KLV�SURFHGXUH�LPSRUWV�ERWK�WKH�6$3�FKHFNLQGLFDWRU�GHIDXOWV�IRU�DXWKRUL]DWLRQ�REMHFWV�LQ�D�WUDQVDFWLRQ��DQG�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�WKH�3*�LQWR�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�

:KHWKHU�\RX�UXQ�WUDQVDFWLRQ�68���LQLWLDOO\��RU�FKDQJH�WKH�GHIDXOWV�ODWHU�ZLWK�WUDQVDFWLRQ68����WKH�SURFHVV�LV�UHFRUGHG�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��%\�FDUU\LQJ�RXW�WKHFRUUHVSRQGLQJ�WUDQVSRUW�UHTXHVW��\RX�GLVWULEXWH�\RXU�FKHFN�LQGLFDWRUV�LQ�WKH�V\VWHP�

7KH��7UDQVDFWLRQ�QDPH!�FRUUHVSRQGV�WR�QRUPDO�6$3�WUDQVDFWLRQ�QDPHV��VXFK�DV�9$����7KHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�DUH�LQFOXGHG�LQ�WKH�WUDQVSRUW��&KHFN�LQGLFDWRUV�DUH�VDYHG�LQWDEOH�862%;B&�DQG�ILHOG�YDOXHV�IRU�WKH�3*�DUH�VDYHG�LQ�WDEOH�862%7B&�

7UDQVSRUWLQJ�$XWKRUL]DWLRQ�7HPSODWHV

$IWHU�DQ�XSJUDGH��DOO�6$3�GHOLYHUHG�WHPSODWHV�ZLOO�EH�LGHQWLFDO�LQ�DOO�V\VWHPV��<RX�FDQQRWFKDQJH�WKHVH�WHPSODWHV��\RX�FDQ�RQO\�FRS\�DQG�DOWHU�WKHP��<RX�FDQ��KRZHYHU��FUHDWH�\RXURZQ�WHPSODWHV��DV�GHVFULEHG�HDUOLHU�LQ�WKLV�ERRN��:KHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��XQOLNH6$3�GHIDXOW�FKDQJHV��WHPSODWH�FKDQJHV�DUH�QRW�DXWRPDWLFDOO\�SDVVHG�RQ�WR�WKH�DSSURSULDWHDXWKRUL]DWLRQ�SURILOH�V��ZKHUH�WKH�WHPSODWH�ZDV�LQVHUWHG��2QFH�\RX�KDYH�FKDQJHG�DWHPSODWH�WKDW�ZDV�SUHYLRXVO\�LQVHUWHG�LQ�DQ�DXWKRUL]DWLRQ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��\RXPXVW�PDQXDOO\�XSGDWH�WKDW�SURILOH�ZLWK�WKH�VDPH�FKDQJHV�WKDW�ZHUH�PDGH�WR�WKH�WHPSODWH�&KDQJHV�WR�\RXU�RZQ�WHPSODWHV�DUH�UHFRUGHG�E\�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��7RFDUU\�RXW�WKH�WUDQVSRUW�UHTXHVW��REMHFWV�LQ�WKH�UHTXHVW�PXVW�FRQWDLQ�WKH�IROORZLQJ�V\QWD[�

R3TR SUSP <Template Name>

7UDQVSRUWLQJ�8VHU�0DVWHU�5HFRUGV

7R�WUDQVSRUW�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�FOLHQWV��UXQ�WKH�FOLHQW�FRS\�WUDQVDFWLRQ�SCCL�7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ��→�&OLHQW�&RS\�→�6&&/�¥/RFDO�&RS\��DQG�VHOHFW�SURILOH�6$3B86(5��)RU�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�5��6\VWHPV��XVH�WUDQVDFWLRQ�SCC8��7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ��→�&OLHQW�7UDQVSRUW�→�6&&����&OLHQW�7UDQVSRUW��ZLWK�SURILOH�6$3B86(5�

8–1

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ

$XWKRUL]DWLRQV

&RQWHQWV

Manually Postmaintaining Authorizations ...........................................................8–2

Manually Inserting Authorizations ........................................................................8–3

Inserting Authorizations from Templates.............................................................8–7

Inserting Authorizations from a Profile ..............................................................8–12

Inserting Full Authorizations: Profile “<YourCompany>” ................................8–15

��

Chapter 8: Inserting Missing Authorizations

Manually Postmaintaining Authorizations

Authorizations Made Easy8–2

0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV

$OWKRXJK�WKH�3URILOH�*HQHUDWRU��3*�EXLOGV�DXWKRUL]DWLRQ�SURILOHV��LW�PD\�VRPHWLPHV�EHQHFHVVDU\�WR�LQVHUW�D�PLVVLQJ�DXWKRUL]DWLRQ�RU�WR�DGMXVW�D�ILHOG�YDOXH��7KH�SURFHVV�RIPDLQWDLQLQJ�3*·V�VXJJHVWHG�DXWKRUL]DWLRQV��DV�GHULYHG�IURP�WKH�WUDQVDFWLRQV�VHOHFWHG�IRU�DQDFWLYLW\�JURXS��LV�FDOOHG�SRVWPDLQWDLQLQJ�DXWKRUL]DWLRQV��0DQXDO�SRVWPDLQWHQDQFH�PD\�EHQHFHVVDU\�LQ�WKH�SDUDPHWHU�DQG�YDULDQW�WUDQVDFWLRQV��DQG�GXULQJ�WKH�XSJUDGH�

:KHQ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV"

6KRZQ�EHORZ�DUH�VRPH�RI�WKH�W\SLFDO�FDVHV�ZKHUH�\RX�PXVW�PDQXDOO\�LQFOXGHDXWKRUL]DWLRQV�

&DVH�����$XWKRUL]DWLRQ�,V�0LVVLQJ�IRU�5HODWHG�7UDQVDFWLRQV

$OWKRXJK�WKH�3*�DVVLJQV�D�SDUWLFXODU�SURILOH�WR�D�XVHU��LW�LV�SRVVLEOH�WKDW�WKH�VDPH�XVHU�PD\UHFHLYH�WKH�HUURU�PHVVDJH�´<RX�DUH�QRW�DXWKRUL]HG�µ�ZKHQ�DWWHPSWLQJ�WR�XVH�D�UHODWHGWUDQVDFWLRQ�

7R�DGGUHVV�WKH�DXWKRUL]DWLRQ�VHWWLQJV�IRU�WKH�UHODWHG�WUDQVDFWLRQ��GR�WKH�IROORZLQJ�

�� 8VH�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG��WR�VHHWKH�ODVW�DXWKRUL]DWLRQ�FKHFN�WKDW�IDLOHG��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ��WR�OHDUQKRZ�WR�XVH�WUDQVDFWLRQ�68����

�� &KHFN�WKH�UHODWHG�WUDQVDFWLRQ�WR�FRQILUP�LI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�FKHFNHG�

�� &KHFN�WKH�JHQHUDWHG�SURILOH�WR�FRQILUP�LI�WKH�DXWKRUL]DWLRQ�IRU�WKH�UHODWHG�WUDQVDFWLRQ�LVLQFRUUHFWO\�VHW�

�� 8VH�WUDQVDFWLRQ�68���WR�FKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�LQ�WKHGHVLUHG�WUDQVDFWLRQ��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�WR�OHDUQ�KRZ�WR�XVHWUDQVDFWLRQ�68����

&DVH�����7KH�*HQHUDWHG�3URILOH�'RHV�1RW�$VVLJQ�$Q\�*HQHUDO�5LJKWV�WR�WKH

8VHU

6LQFH�EDVLF�DXWKRUL]DWLRQV�DUH�VR�JHQHUDO��LW�LV�QRW�SUDFWLFDO�WR�LQFOXGH�WKHP�LQ�LQGLYLGXDOWUDQVDFWLRQV�

7R�LPSURYH�V\VWHP�SHUIRUPDQFH��WKRXJK�XQXVXDO�IURP�DQ�DXWKRUL]DWLRQV�VWDQGSRLQW��< 5���GRHV�QRW�FKHFN�LI�DQ�DXWKRUL]DWLRQ�LV�QHHGHG�IRU�DQ�H[LVWLQJ�WUDQVDFWLRQ< 1HZ�DXWKRUL]DWLRQV�DUH�DGGHG�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�DXWKRUL]DWLRQV7KH�V\VWHP�SURYLGHV�WKH�IXQFWLRQDOLW\�WR�VXPPDUL]H�DXWKRUL]DWLRQV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW�

&DVH�����&DQQRW�6HOHFW�7UDQVDFWLRQ�68���IURP�WKH�0HQX�LQ�3)&*

6$3�UHFRPPHQGV�LQFOXGLQJ�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WUDQVDFWLRQ�68���LQ�HDFKDXWKRUL]DWLRQ�SURILOH��7KHVH�DXWKRUL]DWLRQV�JXDUDQWHH�WKDW�LI�XVHUV�JHW�DQ�HUURU�PHVVDJH��IRU

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Release 4.6A/B8–3

H[DPSOH��´<RX�DUH�QRW�DXWKRUL]HG«�µ�´1R�DXWKRUL]DWLRQ�IRU«µ�RU�DQ\�PHVVDJH�UHJDUGLQJDQ�DXWKRUL]DWLRQ�SUREOHP���WKH�KHOS�GHVN�FDQ�PRUH�HDVLO\�DVVLVW�WKHP��7KH�DFWLYLW\�JURXS6$3B%&B(1'86(5B$*�DOUHDG\�FRQWDLQV�WKH�DXWKRUL]DWLRQ�IRU�68����7KLV�DFWLYLW\�JURXS�LVDOVR�LQFOXGHG�LQ�WKH�FRPSRVLWH�DFWLYLW\�JURXS�6$3B%&B(9(5<B(03/2<((�

+RZ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV

<RX�PD\�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�< 0DQXDOO\< )URP�D�WHPSODWH< )URP�D�SURILOH< %\�LQVHUWLQJ�FRPSOHWH�DXWKRUL]DWLRQV

0DQXDOO\�,QVHUWLQJ�$XWKRUL]DWLRQV

8VLQJ�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG���\RX�FDQILQG�RXW�LI�DQ�DXWKRUL]DWLRQ�FKHFN�IRU�\RXU�WUDQVDFWLRQ�LV�PLVVLQJ��7UDQVDFWLRQ�68���LV�RQO\RQH�RI�WKH�ZD\V�WR�GHWHUPLQH�PLVVLQJ�DXWKRUL]DWLRQV��6RPHWLPHV��WUDFHV�DUH�PRUH�XVHIXOEHFDXVH�WKH\�DUH�PRUH�DFFXUDWH�DQG�FRPSOHWH³SDUWLFXODUO\�ZKHQ�GHDOLQJ�ZLWK�+5DXWKRUL]DWLRQ�SUREOHPV��,GHQWLI\�WKH�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�ILHOGYDOXHV��7KHQ�PDQXDOO\�LQVHUW�WKH�PLVVLQJ�DXWKRUL]DWLRQ�

<RX�FDQ�XVH�WKH�IROORZLQJ�WZR�RSWLRQV�WR�LQVHUW�DXWKRUL]DWLRQV�< 6HOHFWLRQ�FULWHULD��FKRRVH�IURP�DXWKRUL]DWLRQV�VRUWHG�E\�FODVV�< 0DQXDOO\��LI�\RX�NQRZ�WKH�REMHFW��RU�FDQ�FKRRVH�IURP�DQ�REMHFW�OLVW�

7R�DVVLJQ�JHQHUDO�DXWKRUL]DWLRQV��FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�< &UHDWH�D�VHSDUDWH�DFWLYLW\�JURXS�FRQWDLQLQJ�RQO\�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�

SULQWLQJ���DQG�DVVLJQ�WKLV�DFWLYLW\�JURXS�WR�DOO�XVHUV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�SULQW�WR�SDUWLFXODU�SULQWHUV��$�JHQHULF�SULQWLQJ�DXWKRUL]DWLRQ�FDQ�EH�DVVLJQHG�*HQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKHVH�DFWLYLW\�JURXSV�DQG�DVVLJQ�WKH�SURILOHV�WRWKH�XVHUV�

< ,QFOXGH�WKH�UHTXLUHG�REMHFWV�LQ�WKH�DFWLYLW\�JURXS�E\�XVLQJ�6$3�WHPSODWHV��RU�\RXU�RZQWHPSODWHV�E\�PDLQWDLQLQJ�DQ\�PLVVLQJ�ILHOG�HQWULHV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�EH�DVVLJQHG�WR�VSHFLILF�SULQWHUV�

< 6$3�DOUHDG\�GHOLYHUV�DFWLYLW\�JURXSV�ZLWK�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�6$3B%&B(9(5<B(03/2<((�DQG�6$3B%&B(1'86(5�

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Authorizations Made Easy8–4

8VLQJ�6HOHFWLRQ�&ULWHULD

<RX�FDQ�XVH�VHOHFWLRQ�FULWHULD�WR�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

2Q�VFUHHQ��\RX�FDQ�VHH�WKH�FXUUHQWO\LQFOXGHG�DXWKRUL]DWLRQ�FODVVHV�IRUWKH�VHOHFWHG�DFWLYLW\�JURXS�

�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZRXOG�OLNH�WRLQVHUW��VRUWHG�E\�FODVV��

,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQREMHFW�\RX�ZRXOG�OLNH�WR�LQVHUWPDQXDOO\��FKRRVH� �0DQXDOO\�DQG�HQWHUWKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQGVHOHFW�LW�IURP�D�OLVW��VHH�H[DPSOH�VKRZQEHORZ��

4

3

5

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Release 4.6A/B8–5

�� ([SDQG�WKH�REMHFW�FODVVHV�DQG�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��

�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHGHVLUHG�DXWKRUL]DWLRQ�REMHFWV�

�� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�

�� &KRRVH�,QVHUW�FKRVHQ�

��� 7KH�VHOHFWHG�DXWKRUL]DWLRQ�REMHFWVDUH�WUDQVIHUUHG�EDFN�WR�WKHDXWKRUL]DWLRQ�FODVVHV�IRU�WKH�JLYHQDFWLYLW\�JURXS��7KH�V\VWHP�FUHDWHV�DQHZ�DXWKRUL]DWLRQ�IRU�HDFKDXWKRUL]DWLRQ�REMHFW��7KH�\HOORZOLJKW�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQILHOG�YDOXHV�DUH�PDLQWDLQHG�

��� 7KH�V\VWHP�VWDWXV�LV�GLVSOD\HG�DV0DQXDOO\��ZKLFK�PHDQV�WKDW�WKHUHDUH�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQVLQ�WKLV�REMHFW�FODVV�

��� &KRRVH� �2SHQ�WR�GLVSOD\�DOO�RSHQDXWKRUL]DWLRQ�ILHOGV�

6

7

8

9

10 11

12

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Authorizations Made Easy8–6

��� 0DLQWDLQ�WKH�DSSURSULDWH�YDOXHV�IRUWKH�RSHQ�DXWKRUL]DWLRQ�SURILOHV�

��� 6DYH�DQG�JHQHUDWH�WKH�DFWLYLW\JURXS�

,QVHUWLQJ�0DQXDOO\

,I�\RX�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZRXOG�OLNH�WR�LQVHUW��SHUIRUP�WKH�IROORZLQJ�VWHSV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH� �0DQXDOO\�

�� (QWHU�WKH�DXWKRUL]DWLRQ�REMHFW�RUFKRRVH�SRVVLEOH�HQWULHV�

�� &KRRVH� �

13

14

4

3

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–7

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�7HPSODWHV

*HQHUDWHG�SURILOHV�GR�QRW�DXWRPDWLFDOO\�JUDQW�DQ\�JHQHUDO�ULJKWV�WR�< 3ULQW< /RJ�RQ�WR�6$31HW�²�5���)URQWHQG�QRWHV< 8VH�WUDQVDFWLRQ�68��

< 'HEXJ��YLHZ�RQO\�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZLOO�ILUVW�FUHDWH�D�QHZ�WHPSODWH�DQG�WKHQ�LQVHUW�WKH�WHPSODWH�LQWR�DQ�H[LVWLQJDFWLYLW\�JURXS�

&UHDWLQJ�D�1HZ�7HPSODWH

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��FKRRVH�(QYLURQPHQW�→�&KHFN�LQGLFDWRU�

�� 6HOHFW�(GLW�DXWKRUL]DWLRQ�WHPSODWHV�

�� &KRRVH� �

�� &KRRVH� �

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�WHPSODWHV�DQG�WKH�6$3�GHOLYHUHGWHPSODWHV��GR�QRW�XVH�QDPHV�IRU�\RXU�WHPSODWHV�WKDW�EHJLQ�ZLWK�6�RU�-��)RU�DGGLWLRQDOLQIRUPDWLRQ��VHH�6$31HW�²�5���)URQWHQG�QRWH�������DQG�ORRN�IRU�WUDQVSRUW�REMHFW�5�756863�

7HPSODWH�FKDQJHV�DUH�QRW�SDVVHG�RQ�ZKHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��7KDW�LV��LI�\RX

3

4

5

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Authorizations Made Easy8–8

FKDQJH�D�WHPSODWH�WKDW�\RX�DOUHDG\�LQVHUWHG�LQWR�DQ�DFWLYLW\�JURXS��WKHUH�LV�QR�LQGLFDWRULQ�WKH�DFWLYLW\�JURXS�WR�VKRZ�WKDW�WKH�LQVHUWHG�WHPSODWH�KDV�FKDQJHG�

�� (QWHU�WKH�WHPSODWH�QDPH�DQG�D�VKRUWGHVFULSWLRQ�

�� &KRRVH� �

�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZDQW�WR�LQVHUW�VRUWHG�E\�FODVV��

,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZDQW�WR�LQVHUW�PDQXDOO\��\RX�FDQFKRRVH� �0DQXDO�LQSXW�DQG�HQWHU�WKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQG�VHOHFW�LW�IURP�DOLVW��

�� ([SDQG�WKH�REMHFW�FODVVHV�WR�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��

6

7

9

8Tip

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–9

��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�\RX�ZDQW�WRLQVHUW�

��� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�

��� &KRRVH�,QVHUW�FKRVHQ�

��� 0DLQWDLQ�DOO�WKH�DSSURSULDWH�YDOXHVIRU�WKH�DXWKRUL]DWLRQ�ILHOGV��IRUH[DPSOH��ZH�FKRVH�)XOODXWKRUL]DWLRQ��

��� &KRRVH� �

��� &KRRVH� �

7KH�WHPSODWH�QRZ�DSSHDUV�LQ�WKHWHPSODWH�OLVW�DQG�LV�UHDG\�IRU�XVH�

��� &KRRVH� �

11

12

13

14 15

16

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Authorizations Made Easy8–10

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�7HPSODWH

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�D�WHPSODWH��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�WHPSODWH� 5

4

3

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–11

�� 6HOHFW�WKH�WHPSODWH�\RX�ZDQW�WRLQFOXGH��IRU�H[DPSOH��35,17,1*WHPSODWH��

0XOWLSOH�WHPSODWH�VHOHFWLRQV�DUHSRVVLEOH�

�� &KRRVH� �

7KH�WHPSODWH�ZDV�LQVHUWHG�DQGPDUNHG�ZLWK�VWDWXV�0DQXDOO\��7KHJUHHQ�OLJKW�LQGLFDWHV�WKDW�WKHDXWKRUL]DWLRQ�ILHOGV�DUH�PDLQWDLQHG�

�� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �

,I�\RX�LQVHUWHG�D�WHPSODWH�ZLWK�DXWKRUL]DWLRQ�ILHOGV�WKDW�DUH�QRW�PDLQWDLQHG��WKH�LQGLFDWRUOLJKWV�DSSHDU�DV�\HOORZ�RU�UHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��%HIRUH�SURFHHGLQJ��\RXPXVW�ILUVW�SRVWPDLQWDLQ�DOO�RSHQ�ILHOGV�

6

7

8

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Authorizations Made Easy8–12

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�3URILOH

,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�XVLQJ�WUDQVDFWLRQV�68���DQG�68����\RX�FDQ�LQVHUW�WKHVHDXWKRUL]DWLRQV�SURILOHV�LQWR�WKH�OLVW�RI�WKH�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�

0LJUDWLQJ�3URILOHV�&UHDWHG�ZLWK�7UDQVDFWLRQV�68���DQG�68��1RWH�WKDW�QR�DFWLYLW\�JURXS�LQIRUPDWLRQ��VXFK�DV�WUDQVDFWLRQ�FRGHV�DXWRPDWLFDOO\PDLQWDLQHG�IRU�REMHFW�6B7&2'(��FDQ�EH�UHJHQHUDWHG�IRU�LQVHUWHG�SURILOHV��7KH�WHFKQLTXHEHORZ�RQO\�DOORZV�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���WR�PLJUDWH�WR�VXFKSURILOHV�DQG�ODWHU�EH�PDLQWDLQHG�ZLWK�WKH�3*��7KHUH�LV�QR�ZD\�WR�UH�FUHDWH�WKH�DSSURSULDWHDFWLYLW\�JURXS�LQIRUPDWLRQ�

7KLV�PHDQV�WKDW�HYHU\WKLQJ�XQGHU�WKH�0HQX�WDE�ZLOO�EH�XQFKDQJHG�LI�68���SURILOHV�DUHFRSLHG�LQWR�WKH�DFWLYLW\�JURXS�+RZHYHU�ZLWK�����\RX�KDYH�QRZ�WKH�RSWLRQ�WR�PLJUDWH�SURILOHV�FUHDWHG�ZLWK�68���DQG68���LQWR�DFWLYLW\�JURXSV��6HH�FKDSWHU�����WKH�VHFWLRQ�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68��3URILOHV�LQWR�$FWLYLW\�*URXSV�

,Q�FHUWDLQ�FLUFXPVWDQFHV��\RX�PD\�ILUVW�FUHDWH�D�WHPSODWH�IURP�\RXU�SURILOH�DQG�WKHQ�LQVHUWWKH�WHPSODWH��7HPSODWHV�DUH�UHXVDEOH�DQG�HDV\�WR�LQVHUW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�WKH�DXWKRUL]DWLRQ��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Release 4.6A/B8–13

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLI\�WKH�RSWLRQ�ZLWK�ZKLFK\RX�ZDQW�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQYDOXHV��7KLV�RSWLRQ�LV�DXWRPDWLFDOO\�VHWFRUUHFWO\�LQ�QRUPDO�PRGH�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�SURILOH�

�� (QWHU�WKH�SURILOH�QDPH�RU�XVH�SRVVLEOHHQWULHV�

�� &KRRVH� �

,I�\RX�LQFOXGH�D�SURILOH�WKDW�LQFOXGHV�WKH�REMHFW�6B7&2'(��LW�GRHV�QRW�DGG�WKH�WUDQVDFWLRQFRGH�WR�WKH�PHQX�SRUWLRQ�RI�WKH�DFWLYLW\�JURXS�GHILQLWLRQ�

5

6

4

7

3

Tip

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Authorizations Made Easy8–14

�� 6HOHFW�WKH�GHVLUHG�SURILOH�IURP�WKHOLVW�RI�SURILOHV�

�� &KRRVH� �

<RXU�GLDORJ�ER[�PD\�ORRN�GLIIHUHQW��7KHDSSHDUDQFH�GHSHQGV�RQ�WKH�VHWWLQJV�IRUSRVVLEOH�HQWULHV�XQGHU�+HOS�→�6HWWLQJV�→3RVVLEOH�HQWULHV�→�6HWWLQJV�

��� 7KH�VHOHFWHG�SURILOH�LV�WUDQVIHUUHG�

��� &KRRVH� �

��� $OO�WKH�DXWKRUL]DWLRQV�LQ�WKH�VHOHFWHGSURILOH�DUH�WUDQVIHUUHG�DQG�PDUNHGZLWK�WKH�VWDWXV�0DQXDOO\��7KH�JUHHQOLJKW�LQGLFDWHV�WKDW�WKH�SURILOH�LVPDLQWDLQHG�

,I�\RX�LQVHUW�DXWKRUL]DWLRQV�IURP�DSURILOH�ZLWK�QRQPDLQWDLQHGDXWKRUL]DWLRQ�ILHOGV��WKH�UHG�OLJKWDSSHDUV�DQG�\RX�KDYH�WR�SRVWPDLQWDLQDOO�RSHQ�ILHOGV�EHIRUH�SURFHHGLQJ�

��� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �

8

9

10

11

12

13

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–15

,QVHUWLQJ�)XOO�$XWKRUL]DWLRQV��3URILOH�´�<RXU&RPSDQ\!µ

,Q�WKH�IROORZLQJ�H[DPSOH��\RX�OHDUQ�KRZ�WR�FUHDWH�D�QHZ�SURILOH�FDOOHG�&203B$//��ZKHUH�´&203µ�VWDQGVIRU�\RXU�FRPSDQ\�QDPH��7KLV�SURILOH�ZLOO�EH�PRGHOHG�DIWHU�6$3B$//��EXW�ZLWK�WKH�VXSHUXVHU�DXWKRUL]DWLRQUHPRYHG��7KHUHIRUH��ZH�ZLOO�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�&203$1<B$//�DQG�LQFOXGH�WKH�SURILOH&203B$//�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� (QWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS\RX�ZDQW�WR�FUHDWH��IRU�H[DPSOH�COMPANY_ALL��

�� &KRRVH� �&UHDWH�

�� ,Q�WKH�'HVFULSWLRQ�ILHOG��HQWHU�DGHVFULSWLRQ�IRU�WKH�DFWLYLW\�JURXS�

�� &KRRVH� �WR�VDYH�WKH�DFWLYLW\�JURXS�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

2

3

4

5

6

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–16

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH� �'R�QRW�VHOHFW�WHPSODWHV�

7KH�V\VWHP�GLVSOD\V�WKH�&KRRVH�7HPSODWHZLQGRZ�EHFDXVH�ZH�FKRVH�WKH$XWKRUL]DWLRQV�WDE�ZLWKRXW�VHOHFWLQJ�DQ\WUDQVDFWLRQV�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)XOO�DXWKRUL]DWLRQ�

7

8

9

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–17

��� &KRRVH�<HV�

7KH�LQVHUWLRQ�GRHV�QRW�LQFOXGH�DGG�RQ�FRPSRQHQWV��H[FHSW�GHGXFWLRQ�PDQDJHPHQW�DGG�RQ�FRPSRQHQWV�

��� &KRRVH� �WR�FRQWLQXH�

��� &OLFN�RQ�WKH�QRGH�IRU�WKH�REMHFW�FODVV%DVLV��$GPLQLVWUDWLRQ�WR�RSHQ�LW�

11

10

12

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–18

��� ,Q�WKH�6\VWHP�$XWKRUL]DWLRQV�OLQH�FKRRVH� �WR�GHDFWLYDWH�WKH�REMHFW�7KH�DXWKRUL]DWLRQ�REMHFW�6\VWHP$XWKRUL]DWLRQV��6B$'0,B)&'��LVQRZ�LQDFWLYH�DQG�ZLOO�QRW�EHJHQHUDWHG�LQWR�WKH�DXWKRUL]DWLRQSURILOH�IRU�&203B$//�

��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�WKDW�EHJLQ�ZLWK$XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\*URXSV�

��� &KRRVH� �LQ�IURQW�RI�WKH�IROORZLQJDXWKRUL]DWLRQ�REMHFWV�WR�GHDFWLYDWHWKHP�< $XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\

�*URXSV��6B86(5B$*5�< 8VHU�0DVWHU�0DLQWHQDQFH�

�$XWKRUL]DWLRQV��6B86(5B$87+�< 8VHU�0DVWHU�0DLQWHQDQFH��8VHU

�*URXSV��6B86(5B*53�< 8VHU�0DVWHU�0DLQWHQDQFH�

�$XWKRUL]DWLRQ�3URILOH�6B86(5B352�

< 8VHU�0DVWHU�0DLQWHQDQFH�6\VWHP�IRU�&HQWUDO�8VHU0DLQWHQDQFH��6B86(5B6<6�

< 7UDQVDFWLRQ�$VVLJQPHQW�RI7UDQVDFWLRQV�WR�$FWLYLW\�*URXSV�6B86(5B7&'�

��� 2QFH�\RX�KDYH�GHDFWLYDWHG�WKHVH�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV�IRU�\RXU�DXWKRUL]DWLRQ�SURILOH��VHOHFWDQG�GHDFWLYDWH�RWKHU�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV��LI�QHHGHG�

��� &KRRVH�2UJDQL]DWLRQDO�OHYHOV�

13

14

15

17

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–19

��� &KRRVH�)XOO�DXWKRUL]DWLRQ�IRU�WKHRUJDQL]DWLRQDO�OHYHOV��7KH�DVWHULVNV� ��ZLOO�EH�LQVHUWHG�LQ�DOO�WKH�RSHQILHOGV�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

��� <RX�FDQ�JLYH�WKH�QHZ�SURILOH�WKHVDPH�QDPH�DQG�GHVFULSWLRQ�DV�WKHDFWLYLW\�JURXS��IRU�H[DPSOH�COMP_ALL��

��� &KRRVH� �WR�JHQHUDWH�WKHDXWKRUL]DWLRQ�SURILOH�V��

18

19

21

22

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–20

��� 7R�YLHZ�DOO�WKH�FUHDWHG�SURILOHV�FKRRVH�$XWKRUL]DWLRQV�→�3URILOHRYHUYLHZ�

��� 7KH�2YHUYLHZ�RI�*HQHUDWHG�3URILOHVVFUHHQ�OLVWV�DOO�WKH�JHQHUDWHGDXWKRUL]DWLRQ�SURILOHV�

��� &KRRVH� �WR�FRQWLQXH�

23

24

25

9–1

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV

&RQWHQWV

Overview ..................................................................................................................9–2

Assigning Users to Activity Groups .....................................................................9–3

Assigning Activity Groups to Users .....................................................................9–6

Assigning PD Objects to Activity Groups ............................................................9–7

Assigning Activity Groups to PD Objects ..........................................................9–10

Transferring Users from an IMG Project to an Activity Group.........................9–13

Updating Profiles in the User Master Records ..................................................9–15

Creating a Sample Organizational Plan..............................................................9–21

Structural Authorizations.....................................................................................9–28

��

Chapter 9: Assigning Activity Groups

Overview

Authorizations Made Easy9–2

2YHUYLHZ

7KH�QHZ�6$3�(DV\�$FFHVV�XVHU�PHQX�LV�WKH�XVHU�VSHFLILF�SRLQW�RI�HQWU\�LQWR�WKH�5���6\VWHP�'HSHQGLQJ�RQ�WKH�DVVLJQHG�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXSV��WKH�XVHU�PHQX�ORRNVGLIIHUHQW�IRU�HDFK�XVHU��7KH�XVHU�PHQX�FRQWDLQV�RQO\�WKRVH�LWHPV³VXFK�DV�WUDQVDFWLRQV�UHSRUWV��DQG�ZHE�DGGUHVVHV³WKDW�WKH�DVVLJQHG�DFWLYLW\�JURXSV�FRQWDLQ�DQG�WKHUHIRUH�RQO\WKRVH�WDVNV�QHHGHG�WR�SHUIRUP�WKH�GDLO\�ZRUN�

'HSHQGLQJ�RQ�WKH�DUHD�RI�WKH�V\VWHP�\RX�ZRUN�LQ��DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV�VXFK�DV�XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV��DIIHFWV�WKH�IROORZLQJ�DUHDV�< ,Q�%XVLQHVV�:RUNIORZ��WKHVH�DVVLJQPHQWV�GHWHUPLQH�WKH�V\VWHP�WDVNV�D�XVHU�FDQ�SHUIRUP

�IRU�ZRUNIORZ�XVHUV��LW�LV�PDQGDWRU\�WR�RQO\�LQFOXGH�WDVNV�LQ�DFWLYLW\�JURXSV��< ,Q�+XPDQ�5HVRXUFHV��WKHVH�DVVLJQPHQWV�VHUYH�DV�KLJKO\�GHWDLOHG�REMHFW�GHVFULSWLRQV��IRU

MRE��SRVLWLRQ��GHVFULSWLRQV��HWF���

7KH�VDPH�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�VHYHUDO�GLIIHUHQW�REMHFWV��$�VLQJOH�REMHFW�PD\�DOVREH�UHODWHG�WR�VHYHUDO�GLIIHUHQW�DFWLYLW\�JURXSV��7KH�GLIIHUHQW�DFWLYLW\�JURXSV�DVVLJQHG�WR�DQREMHFW�DUH�WRJHWKHU�UHIHUUHG�WR�DV�WKH�REMHFW·V�DFWLYLW\�SURILOH��7KH�YDULRXV�5���REMHFWV�DUH�< 5���XVHUV�²�2EMHFW�W\SH�86

$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�� 5HFRJQL]HG�E\�5��� $OORZHG�WR�ORJ�RQ� $OORZHG�WR�SHUIRUP�VSHFLILHG�V\VWHP�DFWLYLWLHV

)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�%DVLVFRPSRQHQW�RI�WKH�XVHU�PDVWHU�UHFRUG�

< :RUN�FHQWHU���2EMHFW�W\SH�$

$�ZRUN�FHQWHU�LGHQWLILHV�D�ORFDWLRQ�ZKHUH�ZRUN�LV�FDUULHG�RXW��$�ORFDWLRQ�FDQ�UHSUHVHQW�DJHRJUDSKLF�ORFDWLRQ��VXFK�DV�WKH�3KLODGHOSKLD�EUDQFK�RIILFH�RU�WKH�6LQJDSRUH�VXEVLGLDU\�RU�LW�FDQ�EH�PRUH�SUHFLVH��)RU�H[DPSOH��LW�FDQ�LGHQWLI\�D�VSHFLILF�ZRUNVWDWLRQ�ZLWK�FHUWDLQPDWHULDOV�DQG�HTXLSPHQW��RQ�D�VSHFLILF�IORRU�RI�D�VSHFLILF�EXLOGLQJ��:RUN�FHQWHUV�FDQ�EHXVHG�ZLWK�MREV�DQG�WDVNV�WR�FUHDWH�FRPSUHKHQVLYH�MRE�GHVFULSWLRQV��7KH�MRE�LGHQWLILHV�WKHMRE�FODVVLILFDWLRQ��WKH�WDVNV�LQGLFDWH�WKH�W\SHV�RI�GXWLHV�SHUIRUPHG��DQG�WKH�ZRUN�FHQWHULGHQWLILHV�ZKHUH�WKH�WDVNV�DUH�FDUULHG�RXW�

< -RE���2EMHFW�W\SH�&

$�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��RU�LQVWUXFWRU��0DQ\�HPSOR\HHV�PD\�KROG�WKH�VDPH�MRE��IRUH[DPSOH��WKHUH�PLJKW�EH����HPSOR\HHV�ZRUNLQJ�DV�HQJLQHHUV���-REV�DUH�QRUPDOO\�XVHG�WRFUHDWH�SRVLWLRQV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV�DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�MRE��8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKRVH�UHTXLUHG�WR�ZRUN�ZLWK�6$3�RIILFH��XVH�FDUH�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSVWR�MREV�

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Release 4.6A/B9–3

< 2UJDQL]DWLRQDO�XQLW���2EMHFW�W\SH�2

2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�RUJDQL]DWLRQDO�HQWLWLHV�GHVLJQDWHG�WR�SHUIRUP�D�VSHFLILHGVHW�RI�IXQFWLRQV��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV��GLYLVLRQV�GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDO�VWUXFWXUH�DW\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�DPRQJ�WKHXQLWV��$Q�HPSOR\HH�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWV�WKHLQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�XQLW�

8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��XVH�FDUH�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WR�EH�IDLUO\VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�WKHLU�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��,I�H[FHSWLRQV�RFFXU��FUHDWHDGGLWLRQDO�DFWLYLW\�JURXSV��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RU�SRVLWLRQ��LW�PD\�EH�EHVWWR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�VSHFLILF�MREV�RU�SRVLWLRQV�

< 3HUVRQ���2EMHFW�W\SH�3

$�SHUVRQ�< 3RVLWLRQ���2EMHFW�W\SH�6

$�SRVLWLRQ�UHSUHVHQWV�D�XQLTXH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��WKH�PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHGZLWK�MREV�DQG�DUH�XVXDOO\�FUHDWHG�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�SRVLWLRQDXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�SRVLWLRQ�7KLV�SURFHVV�DOORZV�\RX�WR�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DOPRVW�D�FRPSOHWHO\SRVLWLRQ�RULHQWHG�IDVKLRQ��6LQFH�DOO�RI�WKH�DFFHVV�ULJKWV�DUH�QRZ�OLQNHG�WR�WKH�SRVLWLRQ��LWGRHV�QRW�PDWWHU�ZKR�ILOOV�WKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��WKH�DXWKRUL]DWLRQSURILOH�DXWRPDWLFDOO\�FKDQJHV�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG�

$VVLJQLQJ�$FWLYLW\�*URXSV

0DNH�VXUH�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�WKH�VSHFLILF�SRVLWLRQ�WKDW�ZLOO�UHFHLYH�DQDXWKRUL]DWLRQ�SURILOH��,I�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�D�MRE��DOO�RI�WKH�SRVLWLRQVFUHDWHG�IURP�WKDW�MRE�ZLOO�LQKHULW�WKH�DFWLYLW\�JURXS�DQG�LWV�DXWKRUL]DWLRQ�SURILOH�V��

$VVLJQLQJ�8VHUV�WR�$FWLYLW\�*URXSV

$OWKRXJK�ZH�DOUHDG\�GHPRQVWUDWHG�LQ�FKDSWHU����8VHU�5ROH�7HPSODWHV��KRZ�WR�DVVLJQ�D�XVHU�WRD�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXS�XVLQJ�WKH�3*��ZH�ZLOO�GHPRQVWUDWH�LW�KHUH�LQ�PRUHGHWDLO�

7KH�IROORZLQJ�PHWKRG�LV�UHFRPPHQGHG�LI�\RX�ZDQW�WR�DVVLJQ�PRUH�XVHUV�WR�D�VSHFLILFDFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WR�DQ�HPSOR\HH�DQG�FKRRVH� �&KDQJH�

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Authorizations Made Easy9–4

�� &KRRVH�WKH�8VHU�WDE�

�� (QWHU�WKH�XVHU�,'�LQ�WKH�8VHU�,'�ILHOG�

<RX�FDQ�LQFOXGH�XVHU�,'V�E\�RQH�RIWKH�IROORZLQJ�PHWKRGV�< (QWHU�WKH�XVHU�,'�GLUHFWO\�< 0DNH�D�VHOHFWLRQ�IURP�WKH�SRVVLEOH

HQWULHV�OLVW�< 8VH�PXOWLSOH�VHOHFWLRQ�IURP�D

VHOHFWLRQ�OLVW�E\�FKRRVLQJ�6HOHFWLRQ��6HH�WKH�IROORZLQJ�7LSV

�7ULFNV�

�� 7R�VDYH�\RXU�DVVLJQPHQW��FKRRVH� �

%\�XVLQJ�WKH�EXWWRQ�� �6HOHFWLRQ��\RX�FDQ�LQFOXGHVHYHUDO�XVHUV��IRU�H[DPSOH��DOO�XVHUV�LQ�D�SDUWLFXODUXVHU�JURXS�RU�DOO�XVHUV�LQ�WKH�5���6\VWHP���6HOHFW�WKHGHVLUHG�XVHU�DQG�FKRRVH� �

,I�\RX�FDQQRW�ILQG�WKH�UHTXLUHG�XVHU�RU�LI�\RX�ZDQW�WRFKRRVH�WKH�XVHU�WKURXJK�D�XVHU�JURXS�

D� &KRRVH� �

E� 2Q�WKH�([HFXWH�YDOXH�UHVWULFWLRQ�ZLQGRZ��ILQG�WKHXVHU�E\�HLWKHU�< (QWHULQJ�WKH�ILUVW�OHWWHU�V��RI�WKH�XVHU�QDPH�DQG

DQ�DVWHULVN�� ��WR�H[SDQG�VHOHFWLRQ�OLVW< 8VLQJ�WKH�8VHU�JURXS�ILHOG�WR�ILQG�WKH�XVHU

WKURXJK�WKHLU�XVHU�JURXS

F� &KRRVH� �

G� 6HOHFW�WKH�XVHU�

,W�LV�SRVVLEOH�WR�VHOHFW�VHYHUDO�XVHUV�

H� &KRRVH� �

a

3

4

b

c

Tip

d

e

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Release 4.6A/B9–5

�� 7KH�FKRVHQ�XVHU�V��DSSHDU�LQ�WKH8VHU�,'�DQG�8VHU�QDPH�FROXPQV�

�� ,Q�WKH�)URP�DQG�WR�FROXPQV��UHVWULFWWKH�VWDUW�DQG�HQG�GDWH�RI�WKH�XVHUDVVLJQPHQW�

7KH�V\VWHP�HQWHUV�E\�GHIDXOW�WKHFXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�DQG�����������DV�WKH�HQG�GDWH�

�� &KRRVH� �WR�VDYH�\RXU�VHOHFWLRQ�

�� &KRRVH� �8VHU�FRPSDUH�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�8VHU�WDE�GLVSOD\V�ZKHWKHU�RU�QRW�XVHUV�DUH�DOUHDG\�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��,I�WKH�GLVSOD\�DSSHDUV�LQ�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVWRQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��,I�\HOORZ��LW�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQDVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�

7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV

,I�\RX�DOVR�XVH�WKH�DFWLYLW\�JURXS�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��WKHQ�\RX�VKRXOGQRWH�WKDW�WKH�JHQHUDWHG�SURILOH�LV�QRW�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�XQWLO�WKH�XVHUPDVWHU�UHFRUGV�KDYH�EHHQ�FRPSDUHG��:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS�WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG�����������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WR�UHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKHDVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�D�WHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKHV\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKH�XVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKHXVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW�3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH�\RX�VKRXOG�VFKHGXOH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKHPRUQLQJ��WR�UXQ�LQ�WKH�EDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUWFRPSDUHV�WKH�XVHU�PDVWHU�UHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQVIRU�WKH�XVHU�PDVWHU�UHFRUGV��7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHUDVVLJQPHQWV�DQG�HQWHUV�DXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�DVVLJQPHQWV�

6 7

8

9

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to Users

Authorizations Made Easy9–6

$VVLJQLQJ�$FWLYLW\�*URXSV�WR�8VHUV

<RX�FDQ�DOVR�DVVLJQ�XVHU�UROH�WHPSODWHV�RU�DFWLYLW\�JURXSV�WR�XVHUV�XVLQJ�WUDQVDFWLRQ�68���¥�8VHUV��,I�\RXZRXOG�OLNH�WR�DVVLJQ�VHYHUDO�DFWLYLW\�JURXSV�WR�RQH�XVHU�WKLV�LV�D�PRUH�HIILFLHQW�ZD\�IRU�WKH�DVVLJQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��

�� (QWHU�WKH�QDPH�RI�WKH�XVHU�WR�ZKRP\RX�ZRXOG�OLNH�WR�DVVLJQ�WKH�DFWLYLW\JURXS��RU�XVH�SRVVLEOH�HQWULHV�

�� &KRRVH� �

�� 6HOHFW�DOO�WKH�GHVLUHG�DFWLYLW\�JURXSVE\�HQWHULQJ�WKH�FRUUHFW�QDPHV��RU�XVHSRVVLEOH�HQWULHV�

�� (QWHU�WKH�FRUUHFW�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW�

�� &KRRVH� �WR�VDYH�\RXU�DVVLJQPHQW�

7R�VHH�WKH�FRUUHVSRQGLQJ�SURILOHV��VHOHFWWKH�3URILOHV�WDE�

3

5

6

4

Tip

2

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Release 4.6A/B9–7

$OO�FKDQJHV�KDYH�EHHQ�VDYHG�WR�WKHXVHU�PDVWHU�UHFRUG�

5HPHPEHU��DV�ORQJ�DV�DQ�DFWLYLW\�JURXS�LV�DVVLJQHG�WR�DQ�5���XVHU��\RX�FDQ�FKDQJH�WKLVDFWLYLW\�JURXS�DQG�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV�DV�RIWHQ�DV�\RX�ZDQW�ZLWKRXWXSGDWLQJ�WKH�XVHU�PDVWHU�UHFRUG�

,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKHVH�SURILOHVDUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�XVHUV�WR�ZKRP�WKH�ROG�SURILOH�EHORQJHG��7KH�XVHUPDVWHU�RI�WKLV�XVHU�DXWRPDWLFDOO\�JHWV�XSGDWHG�

$VVLJQLQJ�3'�2EMHFWV�WR�$FWLYLW\�*URXSV

<RX�FDQ�DVVLJQ�3'�REMHFWV�VXFK�DV�SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV�WR�DFWLYLW\�JURXSV��8VLQJWUDQVDFWLRQ�PFCG��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�JHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQVWDE�VKRXOG�EH�JUHHQ��

&UHDWH�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ

7R�DVVLJQ�3'�REMHFWV�WR�DFWLYLW\�JURXSV��\RXU�V\VWHP�PXVW�KDYH�DQ�RUJDQL]DWLRQDO�SODQ��,I\RX�KDYH�QRW�FUHDWHG�RQH�IRU�\RXU�FRPSDQ\�EXW�\RX�ZDQW�WR�WHVW�WKLV�IXQFWLRQDOLW\��VHH&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ�RQ�SDJH��²���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�WR�EH�DVVLJQHG�WR�D�3'�REMHFW�

�� 6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�PDQDJHPHQW�DQG�ZRUNIORZ��

�� &KRRVH� �&KDQJH�

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Authorizations Made Easy9–8

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�

�� &KRRVH� 2UJDQL]DWLRQDO�0��

�� 7R�FUHDWH�WKH�DVVLJQPHQW , FKRRVH� �

�� 6HOHFW�WKH�REMHFW�WR�EH�DVVLJQHG��IRUH[DPSOH��3RVLWLRQ��

�� &KRRVH� �

��� &KRRVH� �WR�JHW�D�OLVW�RI�SRVLWLRQV�

��� )URP�WKH�OLVW�RI�SRVLWLRQV��VHOHFW�WKHSRVLWLRQ�\RX�ZRXOG�OLNH�WR�DVVLJQ�WRWKH�VHOHFWHG�DFWLYLW\�JURXS��PRUHWKDQ�RQH�SRVLWLRQ�PD\�EH�VHOHFWHG��

��� &KRRVH� �

6

9

8

7

10

11

12

5

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Release 4.6A/B9–9

��� (QWHU�WKH�WLPH�SHULRG�IRU�WKHUHODWLRQVKLS�

��� &KRRVH� �WR�FUHDWH�WKH�UHODWLRQVKLS�

7KH�UHODWLRQVKLS�LV�HVWDEOLVKHG�

��� 8QGHU�WKH�DFWLYLW\�JURXS�\RX�FDQ�VHHWKH�DVVLJQHG�SRVLWLRQ��8QGHU�WKHSRVLWLRQ�\RX�FDQ�VHH�WKH�DVVLJQHGXVHU�

��� 7R�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VRWKDW�WKH�DSSURSULDWH�SURILOHV�DUHLQVHUWHG�LQWR�WKLV�UHFRUG��FKRRVH� �

<RX�KDYH�WKH�RSWLRQ�WR�VHOHFW�EHWZHHQ�GLIIHUHQW�YLHZV�IRU�WKH�DVVLJQPHQW��)URP�WKHPHQX�EDU��FKRRVH�9LHZ�DQG�WKHQ�VHOHFW�DQ\�RI�WKH�IROORZLQJ�PHQX�RSWLRQV��.H\�$EEUHYLDWLRQ��2EMHFW�SHULRG��5HODWLRQVKLS�SHULRG��8VHUV�RQO\�

7KH�DVVLJQPHQW�LV�VDYHG�DQG�WKHXVHU�PDVWHU�GDWD�XSGDWHG�

13

14

15

16

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Authorizations Made Easy9–10

$VVLJQLQJ�$FWLYLW\�*URXSV�WR�3'�2EMHFWV

<RX�FDQ�DVVLJQ�DFWLYLW\�JURXSV�WR�3'�REMHFWV��8VLQJ�WKH�3*��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQJHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQV�WDE�VKRXOG�EH�JUHHQ��

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�ppom_old�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�WKH�+XPDQ�UHVRXUFHV�→�2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�PRGH�→�6LPSOH�PDLQWHQDQFH�→3320B2/'�¥�FKDQJH��

�� (QWHU�WKH�RUJDQL]DWLRQDO�XQLW��RU�XVHSRVVLEOH�HQWULHV�

�� &KRRVH�7��6WUXFWXUH�6HDUFK�WR�VHOHFWWKH�RUJDQL]DWLRQDO�XQLW�XVLQJ�DVWUXFWXUDO�VHDUFK�

�� 6HOHFW�WKH�DSSURSULDWH�URRWRUJDQL]DWLRQDO�XQLW��,Q�WKLV�H[DPSOH�ZH�FKRVH�WKH�URRW�RUJDQL]DWLRQDOXQLW�IURP�WKH�VDPSOH�RUJDQL]DWLRQDOSODQ�

�� &KRRVH� �

5

2

3

4

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Release 4.6A/B9–11

�� 7KH�VHOHFWHG�RUJDQL]DWLRQDO�SODQDSSHDUV�LQ�WKH�2UJDQL]DWLRQDO�XQLWILHOG�

�� &KRRVH� �

�� &KRRVH�6WDII�DVVLJQPHQWV�

�� ([SDQG�WKH�XQLWV�DQG�VHOHFW�WKH�RQHWR�ZKLFK�\RX�ZRXOG�OLNH�WR�DVVLJQWKH�DFWLYLW\�JURXS��IRU�H[DPSOH�%X\HU��

��� &KRRVH�7DVN�SURILOH�

6

7

8

9

10

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Authorizations Made Easy9–12

��� 2Q�WKH�7DVN�3URILOH�&KDQJH�VFUHHQ�VHOHFW�WKH�SRVLWLRQ�WR�ZKLFK�\RXZRXOG�OLNH�WR�DVVLJQ�DQ�DFWLYLW\JURXS�

��� &KRRVH� �$FWLYLW\�JURXS�

��� (QWHU�WKH�ILUVW�OHWWHU�RI�WKH�DFWLYLW\JURXS�\RX�ZRXOG�OLNH�WR�DVVLJQ�RUOHDYH�WKH�DVWHULVNV�� ��LQ�WKH�ILHOG�WRJHW�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�

��� &KRRVH� �

��� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZLVK�WRDVVLJQ��PXOWLSOH�VHOHFWLRQV�DUHSRVVLEOH��

��� &KRRVH� �

��� 7R�YHULI\�WKH�DVVLJQPHQW��FKRRVH� �

7KH�DVVLJQPHQW�EHWZHHQ�WKH�SRVLWLRQDQG�WKH�DFWLYLW\�JURXS�KDV�EHHQ�VDYHG�

7R�PDNH�FKDQJHV�WR�WKH�DVVLJQHGDFWLYLW\�JURXS��VHOHFW�WKH�DFWLYLW\�JURXSDQG�FKRRVH�*RWR�→�$FWLYLW\�JURXS�

7KH�QH[W�VWHS�LV�WR�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VR�WKDW�WKH�DSSURSULDWH�SURILOHV�DUH�LQVHUWHG�LQWR�WKHXVHU�PDVWHU�UHFRUG�DQG�DVVLJQHG�WR�WKH�RUJDQL]DWLRQDO�XQLWV�

11

12

13

14

15

16

17

Chapter 9: Assigning Activity Groups

Transferring Users from an IMG Project to an Activity Group

Release 4.6A/B9–13

7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW�WR�DQ�$FWLYLW\

*URXS

,I�\RX�DVVLJQHG�XVHUV��UHVRXUFHV��WR�DQ�,0*�SURMHFW�LQ�WKH�SURMHFW�PDQDJHPHQW��DQG�GLG�QRWFRS\�WKH�XVHU�DVVLJQPHQW�ZKHQ�FUHDWLQJ�WKH�FXVWRPL]LQJ�DXWKRUL]DWLRQV��\RX�FDQ�WUDQVIHUWKHVH�XVHUV�WR�WKH�DFWLYLW\�JURXS�XVLQJ�WKH�IROORZLQJ�SURFHGXUH�

1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�\RX�PDNH�FKDQJHV�LQ�WKH�,0*�SURMHFWDGPLQLVWUDWLRQ�

)RU�WKH�IROORZLQJ�H[DPSOH��ZH�DVVXPH�WKDW�< $Q�,0*�SURMHFW�ZLWK�DW�OHDVW�RQH�DVVLJQHG�XVHU�H[LVWV< <RX�DVVLJQHG�DQ�,0*�SURMHFW�RU�SURMHFW�YLHZ�WR�WKH�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH

VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�< <RX�PDLQWDLQHG�WKH�DXWKRUL]DWLRQV�IRU�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH

VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�

7R�WUDQVIHU�XVHUV�IURP�DQ�,0*�SURMHFW�WR�DQ�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS�WR�ZKLFK�\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKH�XVHU�IURPDQ�,0*�SURMHFW��IRU�H[DPSOH��40B&86720,=,1*���DQG�FKRRVH� �&KDQJH�

�� &KRRVH�WKH�0HQX�WDE�

�� &KRRVH�8WLOLWLHV�→&XVWRPL]LQJ�DXWK� 4

Chapter 9: Assigning Activity Groups

Transferring Users from an IMG Project to an Activity Group

Authorizations Made Easy9–14

�� &KRRVH� �8VHU�

�� 6HOHFW�WKH�XVHUV�\RX�ZRXOG�OLNH�WRDVVLJQ�

�� &KRRVH� �

$OO�VHOHFWHG�XVHUV�ZLOO�EH�WUDQVIHUUHGE\�GHIDXOW�

�� &KRRVH� �

�� &KRRVH�WKH�8VHU�WDE�

��� &KRRVH� 8VHU�FRPSDUH�

$V�FXVWRPL]LQJ�LV�SURMHFW�UHODWHG�DQGUXQV�IRU�D�OLPLWHG�SHULRG��\RX�VKRXOGPDLQWDLQ�WKH�HQG�GDWH�IRU�WKH�XVHU�LQ�WKHXVHU�DVVLJQPHQW��7LPH�UHVWULFWLRQVSUHYHQW�XVHUV�ZKR�DUH�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�IURP�KDYLQJDXWKRUL]DWLRQ�IRU�WKH�DVVLJQHG�SURMHFWVRU�SURMHFW�YLHZV�DIWHU�WKH�FXVWRPL]LQJSURMHFW�LV�FRPSOHWH�

��� &KRRVH� �&RPSOHWH�FRPSDUH�

5

6

7

8

9

10

11

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–15

7KH�XVHUV�IURP�WKH�FXVWRPL]LQJSURMHFW�DUH�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�

8SGDWLQJ�3URILOHV�LQ�WKH�8VHU�0DVWHU�5HFRUGV

7KLV�VHFWLRQ�GHVFULEHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�UHSRUW�3)&*B7,0(�'(3(1'(1&<�WRXSGDWH�XVHU�PDVWHU�UHFRUGV��5HPHPEHU�WKDW�DFWLYLW\�JURXSV��WKHLU�DVVLJQPHQW�WR�XVHU�PDVWHUUHFRUGV��RU�3'�REMHFWV�FDQ�EH�GHOLPLWHG�

7R�HQVXUH�WKDW�RQO\�YDOLG�DXWKRUL]DWLRQ�SURILOHV�UHPDLQ�LQ�WKH�XVHU�PDVWHU�UHFRUG�HDFK�GD\�FRQGXFW�GDLO\�SURILOH�FRPSDULVRQV��)RU�WKH�FKDQJHV�LQ�WKH�XVHU�PDVWHU�UHFRUG�WR�EH�HIIHFWLYH�WKLV�FRPSDULVRQ�PXVW�WDNH�SODFH�EHIRUH�WKH�XVHU�ORJV�RQ�

7R�FRQGXFW�D�FRPSDULVRQ��\RX�FDQ�HLWKHU�< &RPSDUH�WKH�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*

< 8VH�PDVV�FRPSDUH�ZLWKLQ�WKH�3*��(QYLURQPHQW�→�0DVV�FRPSDUH�

< 5XQ�UHSRUW�3)*&B7,0(B'(3(1'(1&<�LQ�D�EDFNJURXQG�MRE�EHIRUH�WKH�VWDUW�RI�HDFKGD\

7KHVH�RSWLRQV�DUH�GLVFXVVHG�LQ�WKH�IROORZLQJ�WKUHH�VHFWLRQV�

&RPSDULQJ�8VHU�0DVWHU�'DWD�IURP�:LWKLQ�7UDQVDFWLRQ�3)&*

$�FRPSDULVRQ�RI�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*�LPPHGLDWHO\�XSGDWHV�DVSHFLILF�XVHU�PDVWHU�DIWHU�FUHDWLQJ�DQ�DVVLJQPHQW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�DQ�DFWLYLW\�JURXS�IRU�ZKLFK�\RX�ZRXOG�OLNH�WR�XSGDWH�WKH�XVHU�PDVWHU�GDWD�DQGFKRRVH� �&KDQJH�

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–16

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�

�� ,Q�WKH�8VHU�,'�FROXPQ��HQWHU�D�XVHU,'�RU�VHOHFW�LW�IURP�D�OLVW�XVLQJSRVVLEOH�HQWULHV�

�� (QWHU�D�YDOLGLW\�SHULRG�

�� &KRRVH� �8VHU�FRPSDUH�

6WDWXV�'LVSOD\�RQ�WKH�8VHU�7DE7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�WHOOV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS��,I�WKHLQGLFDWRU�LV�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS�,I�\HOORZ��WKLV�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKHXVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�

�� &KRRVH� �&RPSOHWH�FRPSDUH�

7KH�H[SHUW�PRGH�GLVSOD\V�H[DFWO\�ZKLFK�SURILOHV�ZHUH�LQVHUWHG�DQG�UHPRYHG�IRU�HDFKXVHU��$V�\RX�KDYH�WKH�RSWLRQ�WR�UHVWULFW�WKH�VHOHFWLRQ�RI�WKH�SURILOHV�IRU�SURFHVVLQJ��WKHVWDWXV�RI�8VHU�FRPSDUH�LV�QRW�VZLWFKHG�WR�JUHHQ��7KLV�VWDWXV�LV�RQO\�WKH�FDVH�LI�WKHFRPSDULVRQ�LV�H[HFXWHG�E\�FKRRVLQJ� �&RPSOHWH�FRPSDUH��,I�\RX�FKRRVH� �([SHUW�PRGH�IRUFRPSDUH��WKH�VWDWXV�LV�QRW�VHW�WR�JUHHQ�

�� ,I�\RX�KDYH�QRW�VDYHG�WKH�DFWLYLW\JURXS�\HW��FKRRVH�<HV�

45

6

7Tip

8

3

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–17

�� 7KH�JUHHQ�OLJKW�RQ�8VHU�FRPSDUHLQGLFDWHV�WKDW�WKH�FRPSDULVRQ�LVFRPSOHWH�

1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�

9

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–18

3URILOH�&RPSDULVRQV�8VLQJ�0DVV�&RPSDUH��3)8'�

)RU�SURILOH�FRPSDULVRQ�ZLWKLQ�WKH�3*��\RX�FDQ�XVH�WKH�PDVV�FRPSDUH�IXQFWLRQ�UHJXODUO\�WR�FKHFN�IRUEDFNJURXQG�MRE�HUURUV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��

�� &KRRVH�WKH�DFWLYLW\�JURXSV�\RXZRXOG�OLNH�WR�UHFRQFLOH�

�� 6HOHFW�RQH�RI�WKH�IROORZLQJ�DFWLRQV�< 6FKHGXOH�RU�FKHFN�MRE�IRU�IXOO

UHFRQFLOLDWLRQ�VHH�WKH�QH[W�VHFWLRQ�

< 0DQXDO�VHOHFWLRQ�RI�SURILOHV�IRU�VHOHFWHG�SURILOHV�

< &RPSOHWH�FRPSDUH�WR�DGMXVW�XVHU�PDVWHU�UHFRUGV�IRUDOO�DFWLYLW\�JURXSV�

�� 8QGHU�2SWLRQV��VHOHFW�WKH�GHVLUHGVHWWLQJV��ZH�VHOHFWHG�DOO��

�� ,I�\RX�ZRXOG�OLNH�WR�UHFRQFLOH�ZLWKRUJDQL]DWLRQDO�PDQDJHPHQW��VHOHFW5HFRQFLOH�ZLWK�+5�2UJDQL]DWLRQDO0DQDJHPHQW�

�� &KRRVH� �

7KH�IROORZLQJ�ZLQGRZ�RQO\�DSSHDUV�LI�\RX�VHOHFW�WKH�RSWLRQ�0DQXDO�VHOHFWLRQ�RI�SURILOHV�LQVWHS����EHFDXVH�WKH�VWDWXV�IRU�WKH�FRPSOHWH�FRPSDUH�KDV�QRW�EHHQ�VHW��,I�\RX�OHDYH�WKHGHIDXOW�YDOXH��ZKLFK�LV�&RPSOHWH�FRPSDUH��\RX�ZLOO�QRW�JHW�WKH�IROORZLQJ�ZLQGRZ��EHFDXVHWKH�VWDWXV�ZLOO�DOUHDG\�EH�VHW�FRUUHFWO\�IRU�WKH�3*�

�� &KRRVH� �

6

2

3

4

5

7

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–19

�� &KRRVH� �8VHU�PDVWHU�UHFRUG�

7KH�XVHU�PDVWHU�UHFRUGV�KDYH�EHHQVXFFHVVIXOO\�XSGDWHG�

1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�

5HSRUW�3)&*B7,0(B'(3(1'(1&<�WR�6FKHGXOH�7LPH�'HSHQGHQF\

7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV

:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWHDV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG������������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WRUHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKH�DVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�DWHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKH�V\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKHXVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKH�XVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH��\RX�VKRXOG�VFKHGXOH�UHSRUW3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKH�PRUQLQJ��WR�UXQ�LQ�WKHEDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUW�FRPSDUHV�WKH�XVHU�PDVWHUUHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQV�IRU�WKH�XVHU�PDVWHU�UHFRUGV�7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHU�DVVLJQPHQWV�DQG�HQWHUVDXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�XVHU�DVVLJQPHQWV�

,I�WKH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�UXQV�HYHU\�QLJKW��WKH�DXWKRUL]DWLRQ�SURILOHV�LQ�WKHXVHU�PDVWHU�ZLOO�EH�XSGDWHG�HDFK�PRUQLQJ��7KH�EHVW�SURFHGXUH�LV�WR�VFKHGXOH�WKLV�UHSRUW�LQ�DSHULRGLF�EDFNJURXQG�MRE�

8

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–20

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��VHOHFW�WKHGHVLUHG�DFWLYLW\�JURXS�

�� 6HOHFW�6FKHGXOH�RU�FKHFN�MRE�IRU�IXOOUHFRQFLOLDWLRQ�

�� &KRRVH� �

�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�RUOHDYH�WKH�GHIDXOW�

�� 8QGHU�6WDUW�GDWH��VHOHFW�WKH�GDWH�DQGWLPH�\RX�ZDQW�WKH�UHSRUW�WR�VWDUWDXWRPDWLFDOO\�

�� &KRRVH� �([HFXWH�

4

3

2

5

6

7

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–21

�� &KRRVH .

�� (QWHU�D�MRE�QDPH�RU�OHDYH�WKHGHIDXOW�

��� (QWHU�D�MRE�FODVV��SULRULW\��

��� &KRRVH� �

7KH�MRE�ZL]DUG�KHOSV�\RX�WR�GHILQH�D�MREXVLQJ�VWHS�E\�VWHS�GLDORJ�VFUHHQV�WRJXLGH�\RX�WKURXJK�WKH�SURFHVV��2Q�WKHODVW�VFUHHQ��\RX�VHH�D�VXPPDU\�RI�ZKDW\RX�KDYH�GHILQHG�EHIRUH�\RX�VDYH�

&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ

<RX�KDYH�WZR�RSWLRQV�WR�FUHDWH�DQ�RUJDQL]DWLRQDO�SODQ�< 7KH�FODVVLF�5���WUDQVDFWLRQ��PPOC_OLD�< 7KH�(QMR\�WUDQVDFWLRQ��PPOCE�

%RWK�FDQ�EH�IRXQG�LQ�WKH�2UJDQL]DWLRQDO�PDQDJHPHQW�XQGHU�+XPDQ�5HVRXUFHV�LQ�WKH�6$3VWDQGDUG�PHQX�

,Q�WKH�IROORZLQJ�VHFWLRQ��ZH�GHVFULEH�WKH�VWHSV�WR�FUHDWH�D�VDPSOH�RUJDQL]DWLRQDO�SODQ�IRUWHVWLQJ��7KLV�SODQ�LV�QRW�FRPSOHWH��EXW�VKRZV�WKH�UHTXLUHG�HOHPHQWV�

8

910

11

Tip

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–22

8VLQJ�WKH�&ODVVLF�5���7UDQVDFWLRQ

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOC_OLD�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�0RGH�→�6LPSOH�0DLQWHQDQFH�→�332&B2/'�&UHDWH��

A�URRW�RUJDQL]DWLRQDO�XQLW��WKHKLJKHVW�OHYHO�LQ�DQ�RUJDQL]DWLRQDOVWUXFWXUH��QHHGV�WR�EH�FUHDWHG��7KHQEXLOG�XS�WKH�RUJDQL]DWLRQDO�VWUXFWXUHIURP�WKH�URRW�RUJDQL]DWLRQDO�XQLW�

�� (QWHU�WKH�VKRUW�DQG�ORQJ�QDPH�IRUWKH�URRW�RUJDQL]DWLRQDO�XQLW�

�� &KRRVH� �

�� ,Q�WKH�5HTXHVW�ILHOG��XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�FKDQJH�UHTXHVW��,IQRQH�H[LVWV�\HW��XVH� �WR�FUHDWH�RQH�

�� &KRRVH� �

�,Q�WKH�IROORZLQJ�VWHSV��ZH�ZLOO�QRWVKRZ�WKLV�GLDORJ�ER[�DQ\PRUH��,I�LWGRHV�DSSHDU��SURFHHG�LQ�WKH�VDPHZD\�DV�KHUH��

�� &KRRVH� �WR�FUHDWH�WKHRUJDQL]DWLRQDO�XQLWV�WKDW�IROORZ�\RXUURRW�XQLW�

2

3

4

5

6

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–23

�� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWVXQGHU�\RXU�URRW�XQLW�

�� &KRRVH� �

�� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW�DQGFKRRVH� �WR�HQWHU�WKH�QH[W�OHYHO�

��� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWXQGHU�WKH�VHOHFWHG�OHYHO��IRUH[DPSOH��6XEVLGLDU\�$�*HUPDQ\��

��� &KRRVH� �

��� &KRRVH�6WDII�DVVLJQPHQW�

7

8

9

10

11

12

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–24

7KH�6WDII�$VVLJQPHQWV���&KDQJHZLQGRZ�DOORZV�\RX�WR�LGHQWLI\�WKHIXQGDPHQWDO�VWDIILQJ�GHWDLOVUHTXLUHG�IRU�DQ�RUJDQL]DWLRQDO�SODQ�7KLV�VWHS�LV�DFKLHYHG�E\�FUHDWLQJMREV��DQG�SRVLWLRQV��DQG�E\�DVVLJQLQJKROGHUV�WR�SRVLWLRQV�

��� &KRRVH�(GLW�→�&UHDWH�→�-REV�

-REV�DUH�RQH�RI�WKH�REMHFWV�WKDW�PDNH�XS�DQ�RUJDQL]DWLRQDO�SODQ��$�MRE�LV�D�JHQHUDOFODVVLILFDWLRQ��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW��FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF�<RX�PD\�FUHDWH�DV�PDQ\�MREV�DV�\RX�ZDQW��2QFH�D�MRE�LV�FUHDWHG��GHVFULEH�LWV�DWWULEXWHV�E\GHILQLQJ�LQIRW\SHV��$Q�HPSOR\HH�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV�DQG�SURSHUWLHV�RI�WKH�MRE��SRVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��

��� (QWHU�WKH�MRE�LQIRUPDWLRQ�

��� &KRRVH� �

��� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW��WKHQFKRRVH� �3RVLWLRQV�

13

14

15

16

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–25

��� &KRRVH�SRVVLEOH�HQWULHV�IRU�$EEU�

3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQWV�ZLWKLQ�D�FRPSDQ\��IRU�H[DPSOH�

< 6DOHV�PDQDJHU< 0DUNHWLQJ�DVVLVWDQW< -XQLRU�PDQXIDFWXULQJ�HQJLQHHU%\�FUHDWLQJ�SRVLWLRQV�DQG�UHODWLRQVKLSV�DPRQJ�WKH�GLIIHUHQW�SRVLWLRQV��\RX�FDQ�LGHQWLI\WKH�UHSRUWLQJ�VWUXFWXUH�DW�\RXU�ILUP��3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV�

��� 6HOHFW�WKH�$EEUHYLDWLRQ�DQG�1DPH�WDE�

��� &KRRVH� �

��� 6HOHFW�WKH�DSSURSULDWH�MRE�

��� &KRRVH� �

��� 8QGHU�3RVLWLRQ� HQWHU�D�GHVFULSWLRQ�RIWKH�SRVLWLRQ�LQ�WKH�DSSURSULDWHILHOGV�

��� &KRRVH� �

17

18

19

21

20

22

23

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–26

5HSHDW�VWHSV���²���WR�FUHDWHDGGLWLRQDO�SRVLWLRQV�

��� 6HOHFW�D�SRVLWLRQ�DQG�FKRRVH�$VVLJQKROGHU�

$VVLJQ�KROGHUV�ZKHQ�\RX�ZDQW�WRLGHQWLI\�ZKR�RFFXSLHV��RU�ILOOV��DVSHFLILF�SRVLWLRQ�

,Q�6LPSOH�0DLQWHQDQFH��DVVLJQ�HLWKHUDQ�HPSOR\HH�RU�5���XVHU�WR�DSRVLWLRQ��:RUNIORZ�XVHUV�DVVLJQ�5��XVHUV�WR�SRVLWLRQV��3HUVRQQHODGPLQLVWUDWLRQ�XVHUV�DVVLJQHPSOR\HHV�WR�SRVLWLRQV�

��� &KRRVH�SRVVLEOH�HQWULHV�WR�GLVSOD\�WKHOLVW�RI�5���XVHUV�DOUHDG\�LQ�\RXUV\VWHP�

��� 6HOHFW�WKH�FRUUHFW�XVHU�RI�WKH�SRVLWLRQIURP�WKH�OLVW�

��� &KRRVH� �

��� (QWHU�WKH�YDOLGLW\�SHULRG�RI�WKHDVVLJQPHQW�

��� &KRRVH� �

24

25

27

26

28

29

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–27

5HSHDW�VWHSV���²���WR�DVVLJQ�DGGLWLRQDOKROGHUV�WR�SRVLWLRQV�

7KH�RUJDQL]DWLRQDO�SODQ�LV�QRZ�FUHDWHG�7R�JHW�D�JUDSKLFDO�RYHUYLHZ��FRQWLQXHZLWK�WKH�IROORZLQJ�VWHSV�

��� 6HOHFW�WKH�URRW�RUJDQL]DWLRQDO�XQLW�

��� &KRRVH� �WR�GLVSOD\�WKH�6WUXFWXUDO*UDSKLFV�

8VLQJ�WKH�(QMR\�7UDQVDFWLRQ

7KH�SURFHGXUH�WR�FUHDWH�WKH�RUJDQL]DWLRQDO�SODQ�XVLQJ�WKH�(QMR\�WUDQVDFWLRQ�LV�EDVLFDOO\�WKH�VDPH�DV�WKHFRPPRQ�5���VW\OH��7KH�RQO\�GLIIHUHUHQFH�LV�WKDW�DOO�WKH�SURFHGXUHV�DUH�GLVSOD\HG�DQG�SHUIRUPHG�RQ�RQHVFUHHQ�

$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�(QMR\�IXQFWLRQDOLW\�ZDV�VWLOO�XQGHU�GHYHORSPHQW��7KHUHIRUH��ZH�RQO\SURYLGH�WKH�VFUHHQ�EHORZ�ZKLFK�\RX�FDQ�UHDFK�WKH�IROORZLQJ�ZD\�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOCE�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�2UJDQL]DWLRQDO�SODQ�→�2UJDQL]DWLRQ�DQG�6WDIILQJ�→�&UHDWH�.

+HUH�\RX�HQWHU�WKH�QHZ�2UJDQL]DWLRQDOXQLW�DQG�DOO�WKH�RWKHU�GDWD��DV�ZHGHVFULEH�XVLQJ�WKH�FRPPRQ�5���VW\OH�

31

30

Chapter 9: Assigning Activity Groups

Structural Authorizations

Authorizations Made Easy9–28

6WUXFWXUDO�$XWKRUL]DWLRQV

6WUXFWXUDO�DXWKRUL]DWLRQV�DUH�QRW�FRYHUHG�LQ�WKLV�JXLGH��+RZHYHU��LI�\RX�QHHG�LQIRUPDWLRQRQ�VWUXFWXUDO�DXWKRUL]DWLRQV��UHIHU�WR�WKH�$XWKRUL]DWLRQV�0DGH�(DV\�JXLGHERRN��5HOHDVH����$�%��FKDSWHU����6WUXFWXUDO�$XWKRUL]DWLRQV��7KLV�FKDSWHU�FDQ�DOVR�EH�GRZQORDGHG�IURP�WKH6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�DW�KWWS���ZZZ�VDSODEV�FRP�DXWK�

10–1

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(

(QYLURQPHQW�IRU�&HQWUDO�8VHU

$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................10–2

Setting Up an ALE User........................................................................................10–3

Naming Logical Systems .....................................................................................10–5

Assigning Logical Systems to Clients................................................................10–8

Defining Target System for RFC Calls ..............................................................10–10

Distribution Model ..............................................................................................10–13

Generating Partner Profiles in the Central System .........................................10–16

Distributing Model View .....................................................................................10–17

Generating Partner Profiles in the Client System............................................10–18

����

Chapter 10: Setting Up the ALE Environment for Central User Administration

Overview

Authorizations Made Easy10–2

2YHUYLHZ

&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QHZ�WR�5HOHDVH������,Q�HDUOLHU�UHOHDVHV�XVHU�PDVWHU�UHFRUGVZHUH�FUHDWHG�LQ�HDFK�FOLHQW�DQG�HDFK�V\VWHP�WKH�XVHU�ORJJHG�RQ�WR��IRU�H[DPSOH��'(9��4$6�35'��HWF����(DFK�XVHU�PDVWHU�UHFRUG�IRU�WKH�VDPH�XVHU�ZDV�LQGHSHQGHQW�RI�RWKHU�XVHU�PDVWHUUHFRUGV��,I�D�XVHU�ZDV�FKDQJHG�LQ�RQH�FOLHQW��WKHQ�WKH�VDPH�XVHU�KDG�WR�EH�FKDQJHG�LQ�DOORWKHU�FOLHQWV�DQG�V\VWHPV�PDQXDOO\��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�UHGXFHV�WKH�PDLQWHQDQFHDQG�V\QFKURQL]DWLRQ�LVVXHV�IDFHG�E\�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�

7KH�FRUH�FRQFHSW�EHKLQG�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�WR�GHVLJQDWH�RQH�FOLHQW�LQ�RQHV\VWHP�DV�WKH�UHSRVLWRU\�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV��7KLV�FOLHQW�V\VWHP�LV�GHVLJQDWHG�DVWKH�VHQGHU��$OO�RWKHU�FOLHQWV�LQ�RWKHU�V\VWHPV�DUH�GHVLJQDWHG�DV�UHFHLYHUV��$SSOLFDWLRQ�/LQN(QDEOLQJ��$/(��LV�5��·V�WHFKQRORJ\�WR�HQDEOH�GDWD�H[FKDQJH�EHWZHHQ�GLIIHUHQW�V\VWHPV�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�XVHU�GDWD�EHWZHHQ�FHQWUDO�DQG�FOLHQW�V\VWHPV�

7KLV�FKDSWHU�GLVFXVVHV�KRZ�WR�VHW�XS�$/(�IRU�XVH�ZLWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��7KHQH[W�FKDSWHU�GLVFXVVHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

6HWWLQJ�XS�$/(�PXVW�EH�GRQH�WRJHWKHU�ZLWK�D�V\VWHP�DGPLQLVWUDWRU�RU�WKH�SHUVRQ�ZKR�ILUVWVHW�XS�WKH�FOLHQWV��,Q�VHWWLQJ�XS�$/(��WKH�HQWLUH�FOLHQW·V�GHILQLWLRQ�ZLOO�EH�FKDQJHG�DQG�WKLVPXVW�QRW�EH�GRQH�ZLWKRXW�WKH�FRQVHQW�RI�WKH�V\VWHP�DGPLQLVWUDWRU�

'XULQJ�WKH�LQVWDOODWLRQ�RI�DQ�$/(�HQYLURQPHQW��\RX�PXVW�IROORZ�HYHU\�VWHS�IRU�DOO�FOLHQW�V\VWHPV�WR�EH�LQWHJUDWHG�LQWR�RQH�XVHU�DFFRXQW��7KLV�XVHU�DFFRXQW�QHHGV�WR�KDYH�V\VWHPDGPLQLVWUDWRU�ULJKWV��(DFK�FOLHQW�V\VWHP�FRPELQDWLRQ�LV�UHFRJQL]HG�E\�$/(�DV�D�ORJLFDOV\VWHP�

6HWWLQJ�XS�DQ�$/(�HQYLURQPHQW�DOORZV�\RX�WR�GLVWULEXWH�GDWD�EHWZHHQ�ORJLFDO�V\VWHPV�DQGNHHS�WKLV�GDWD�FRQVLVWHQW��7KH�V\VWHPV�RI�DQ�$/(�HQYLURQPHQW�DUH�RQO\�ORRVHO\�OLQNHG��7KHGDWD�LV�EHLQJ�H[FKDQJHG�DV\QFKURQRXVO\��ZKLFK�LQVXUHV�WKDW�WKH�GDWD�ZLOO�EH�UHFHLYHG�E\�WKHUHFLSLHQW�V\VWHP�HYHQ�LI�WKH�UHFHLYLQJ�V\VWHP�LV�WXUQHG�RII�DW�WKH�WLPH�RI�VHQGLQJ�6\QFKURQRXV�FRQQHFWLRQV�DUH�RQO\�EHLQJ�XVHG�WR�UHDG�GDWD�E\�$/(�

Chapter 10: Setting Up the ALE Environment for Central User Administration

Setting Up an ALE User

Release 4.6A/B10–3

7KH�JUDSKLF�RQ�WKH�ULJKWVKRZV�DQ�$/(�HQYLURQPHQWIRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

2QH�V\VWHP�QHHGV�WR�EHGHILQHG�DV�WKH�FHQWUDOV\VWHP��7KH�OLQNV�UXQ�IURPWKH�FHQWUDO�V\VWHP�WR�WKHFOLHQW�V\VWHPV�ZKHUH�WKHFHQWUDO�V\VWHP�VHUYHV�DV�WKHKXE�

7KH�FOLHQW�V\VWHPV�DUH�QRWGLUHFWO\�OLQNHG�WR�HDFKRWKHU�

6HWWLQJ�8S�DQ�$/(�8VHU

)RU�LQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQ�DOO�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�\RX�QHHG�D�XVHU�DFFRXQW��8VHG�IRULQWHUQDO�FRPPXQLFDWLRQ��WKLV�XVHU�DFFRXQW�LV�QRW�XVHG�LQ�GLDORJ�PRGH��7KH�XVHU�QHHGV�WR�KDYH�WKH�VDPHXVHU�QDPH�DQG�SDVVZRUG�IRU�DOO�WKH�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQGFKRRVH�(QWHU�

�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHLQWHUQDO�XVHU�

�� 7R�FUHDWH�WKH�XVHU��FKRRVH� �2

3

Chapter 10: Setting Up the ALE Environment for Central User Administration

Setting Up an ALE User

Authorizations Made Easy10–4

�� 2Q�WKH�$GGUHVV�WDE��VSHFLI\�DW�OHDVWWKH�ODVW�QDPH�RI�WKH�XVHU�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

�� 8QGHU�3DVVZRUG��HQWHU�DQ�LQLWLDOSDVVZRUG�

�� 5HSHDW�WKH�LQLWLDO�SDVVZRUG�

�� 8QGHU�8VHU�W\SH��VHOHFW�&3,&�

:H�UHFRPPHQG�\RX�XVH�WKH�XVHU�W\SH&3,&��VLQFH�VXFK�D�V\VWHP�XVHU�FDQQRWORJ�RQ�WR�5���XVLQJ�D�GLDORJ�ZLQGRZ�7KLV�XVHU�FDQ�RQO\�EH�XVHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQV\VWHPV��+RZHYHU��LW�LV�SRVVLEOH�WR�XVHD�GLDORJ�XVHU�IRU�WKLV�FRPPXQLFDWLRQ�

�� &KRRVH�3URILOHV�WDE�

4

5

67

8

9

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Release 4.6A/B10–5

��� ,Q�WKH�3URIO��FROXPQ��HQWHU�WKH�SURILOHSAP_ALL�

��� 7R�VDYH�WKH�XVHU��FKRRVH� �

��� 5HSHDW�VWHSV��²���IRU�DOO�FOLHQWV�\RXZDQW�WR�VHW�XS�IRU�WKH�$/(HQYLURQPHQW�

1DPLQJ�/RJLFDO�6\VWHPV

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SALE�DQG�FKRRVH�(QWHU�

�� ([SDQG�WKH�QRGHV�IRU�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV�

�� &KRRVH� �QH[W�WR�WKH�,0*�DFWLYLW\1DPH�/RJLFDO�6\VWHP�

�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �

4

10

11

2

3

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Authorizations Made Easy10–6

7KH�GDWD�IRU�WKH�ORJLFDO�V\VWHPV�LV�VWRUHG�LQ�D�FOLHQW�LQGHSHQGHQW�WDEOH��7KHUHIRUH�LW�LVYDOLG�IRU�DOO�FOLHQWV�LQ�DQ�5���6\VWHP��,I�\RXU�$/(�HQYLURQPHQW�FRQVLVWV�RQO\�RI�ORJLFDOV\VWHPV�LQ�RQH�5���6\VWHP��\RX�QHHG�WR�GHILQH�WKH�ORJLFDO�V\VWHPV�RQO\�RQFH��,I�\RX�DUHXVLQJ�PXOWLSOH�5���6\VWHPV��DOO�ORJLFDO�V\VWHPV�QHHG�WR�EH�VHW�XS�LQ�HYHU\�LQVWDQFH�

$�WDEOH�DSSHDUV�ZLWK�DOO�GHILQHGORJLFDO�V\VWHPV�IRU�WKH�GDWDGLVWULEXWLRQ�RI�\RXU�FHQWUDO�5��V\VWHP�

�� 7R�DGG�QHZ�ORJLFDO�V\VWHPV�LQWR�WKHOLVW��FKRRVH�1HZ�HQWULHV�

�� ,Q�WKH�FROXPQ�/RJ�6\VWHP��HQWHU�DVKRUW�QDPH�LQ�FDSLWDO�OHWWHUV�WKDW\RX�ZRXOG�OLNH�WKH�V\VWHP�WR�EHLGHQWLILHG�DV�LQ�WKH�$/(HQYLURQPHQW��(QWHU�D�FOHDUGHVFULSWLRQ�LQ�WKH�1DPH�FROXPQ�IRUWKH�ORJLFDO�V\VWHP�

�� $IWHU�HQWHULQJ�DOO�WKH�ORJLFDOV\VWHPV��FKRRVH� �WR�VDYH�\RXUGDWD�

5HPHPEHU�WR�HQWHU��LI�DYDLODEOH��DOOORJLFDO�V\VWHPV�WKDW�DUH�QRW�SDUW�RI�WKHDFWXDO�5���6\VWHPV��$OO�ORJLFDO�V\VWHPVQHHG�WR�EH�GHILQHG�LQ�HYHU\�5���6\VWHPRI�WKH�$/(�HQYLURQPHQW�

5

7

6

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Release 4.6A/B10–7

:H�UHFRPPHQG�\RX�QDPH�WKH�V\VWHP�XVLQJ�D�FRPELQDWLRQ�RI�WKH�V\VWHP�QDPH�DQG�FOLHQWQXPEHU��IRU�H[DPSOH��IRU�V\VWHP�%,=�ZLWK�WKH�FOLHQW�����WKH�QDPH�%,=&/17�����

(QWHU�\RXU�WUDQVSRUW�UHTXHVW�IRU�WKHDERYH�HQWHUHG�GDWD�

�� ,I�\RX�DOUHDG\�KDYH�D�WUDQVSRUWUHTXHVW�LQ�WKLV�V\VWHP��FKRRVH�2ZQUHTXHVW�DQG�VHOHFW�LW�IURP�WKH�OLVW�DQG&RQWLQXH�ZLWK�VWHS����

�� ,I�\RX�GR�QRW�KDYH�D�WUDQVSRUWUHTXHVW�\HW�RU�ZRXOG�OLNH�WR�FUHDWH�DQHZ�RQH��FKRRVH� �

D� ,Q�6KRUW�GHVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�IRU�WKH�WUDQVSRUWUHTXHVW�

E� &KRRVH� �

7KH�V\VWHP�VXJJHVWV�D�FRXQWLQJQXPEHU�IRU�WKH�UHTXHVW�

��� &KRRVH� �WR�HQWHU�WKH�WUDQVSRUWUHTXHVW�

,I�\RXU�ORJLFDO�V\VWHP�LV�H[FOXVLYHO\�LQ�RQH�5���6\VWHP��WKH�QDPLQJ�SURFHVV�LV�QRZFRPSOHWH�

,I�\RXU�ORJLFDO�V\VWHPV�DUH�LQ�GLIIHUHQW�5���6\VWHPV��\RX�KDYH�WR�UHSHDW�VWHSV��²���IRUHDFK�5���6\VWHP��$OO�ORJLFDO�V\VWHPV�QHHG�WR�EH�GHILQHG�LQ�DOO�5���6\VWHPV�RI�WKH�$/(HQYLURQPHQW�

89

9a

9b

10

Chapter 10: Setting Up the ALE Environment for Central User Administration

Assigning Logical Systems to Clients

Authorizations Made Easy10–8

$OWKRXJK�\RX�QDPHG�WKH�ORJLFDO�V\VWHPV��\RX�KDYH�QRW�\HW�OLQNHG�WKH�ORJLFDO�V\VWHPV�WRWKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�

$VVLJQLQJ�/RJLFDO�6\VWHPV�WR�&OLHQWV

$IWHU�QDPLQJ�WKH�ORJLFDO�V\VWHPV��WKH�QH[W�VWHS�LV�WR�DVVLJQ�ORJLFDO�V\VWHPV�WR�FOLHQWV��,Q�WKLV�VHFWLRQ��ZH�OLQNWKH�QHZO\�QDPHG�ORJLFDO�V\VWHPV�WR�WKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�

�� )URP�WKH�ODVW�VFUHHQ�RI�WKH�SUHYLRXV�VHFWLRQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�

�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�$VVLJQ�/RJLFDO�6\VWHP�WR&OLHQW�

�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �WRFRQWLQXH�

2

3

Chapter 10: Setting Up the ALE Environment for Central User Administration

Release 4.6A/B10–9

$�OLVW�RI�DYDLODEOH�FOLHQWV�LQ�WKLV�5��6\VWHP�DSSHDUV�

�� 6HOHFW�WKH�FOLHQW�WR�ZKLFK�\RX�ZDQWWR�DVVLJQ�D�ORJLFDO�V\VWHP�QDPH�DQGLQWHJUDWH�LQWR�WKH�$/(�HQYLURQPHQW�

�� &KRRVH� �

�� (QWHU�D�GHVFULSWLRQ�IRU�WKH�FOLHQW��LIQHFHVVDU\�

�� 7R�DVVLJQ�D�ORJLFDO�V\VWHP�WR�WKDWFOLHQW��HQWHU�WKH�ORJLFDO�V\VWHP�LQXSSHUFDVH�

�� &KRRVH� �

�� 2Q�WKH�QH[W�ZLQGRZ��FKRRVH� �WRSURFHHG��<RX�ZLOO�UHFHLYH�D�PHVVDJHWKDW�\RXU�GDWD�KDV�EHHQ�VDYHG�

��� 7R�DVVLJQ�DQRWKHU�ORJLFDO�V\VWHP�WR�DFOLHQW��FKRRVH� �DQG�UHSHDW�VWHSV��²��

7R�DVVLJQ�D�FOLHQW�RI�D�GLIIHUHQW�5���6\VWHP�WR�D�ORJLFDO�V\VWHP��ORJ�RQ�WR�WKDW�5��6\VWHP��VWDUW�WUDQVDFWLRQ�SALE��DQG�UHSHDW�VWHSV��²��

4

5

6

7

8

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Authorizations Made Easy10–10

'HILQLQJ�7DUJHW�6\VWHP�IRU�5)&�&DOOV

$IWHU�DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV��\RX�PXVW�GHILQH�WKH�WDUJHW�V\VWHP�IRU�5)&�FDOOV�

�� )URP�WKH�&KDQJH�9LHZ�§&OLHQWV¨��'HWDLOV�VFUHHQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�

�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�6\VWHPV�LQ1HWZRUN��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�'HILQH�7DUJHW�6\VWHPV�IRU�5)&FDOOV�

�� &KRRVH�&UHDWH�

$Q�5)&�GHVWLQDWLRQ�LV�DOZD\V�FUHDWHGIURP�WKH�FOLHQW�ZKHUH�\RX�DUH�FXUUHQWO\ORJJHG�RQ��7R�GHILQH�DQ�5)&FRQQHFWLRQ�IURP�FOLHQW�����WR�FOLHQW�����\RX�PXVW�EH�ORJJHG�RQ�WR�FOLHQW�����5)&�FRQQHFWLRQV�IRU�WKH�&HQWUDO�8VHU$GPLQLVWUDWLRQ�DOZD\V�QHHG�D�EDFN�DQG�IRUWK�FRQQHFWLRQ��7R�GHILQH�WKH5)&�FRQQHFWLRQ�FRPSOHWHO\��\RX�DOVRQHHG�WR�EH�ORJJHG�RQ�WR�FOLHQW�����DQGVHW�XS�FOLHQW�����DV�WKH�5)&�FRQQHFWLRQ�

3

2

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Release 4.6A/B10–11

�� ,Q�5)&�GHVWLQDWLRQ��HQWHU�WKH�QDPH�RIWKH�ORJLFDO�V\WHP�WR�ZKLFK�\RX�ZDQWWR�GHILQH�D�5)&�FRQQHFWLRQ�IURP\RXU�FXUUHQW�V\VWHP��5HPHPEHU�WRXVH�XSSHUFDVH�

�� ,Q�&RQQHFWLRQ�W\SH��HQWHU�3��GHIDXOWYDOXH���LI�LW�LV�D�FRQQHFWLRQ�WR�DQRWKHU5���6\VWHP�

�� 8QGHU�'HVFULSWLRQ��HQWHU�D�GHWDLOHGGHVFULSWLRQ�IRU�WKH�5)&�GHVWLQDWLRQ�

�� ,Q�&OLHQW��HQWHU�WKH�QXPEHU�RI�WKHWDUJHW�FOLHQW�

�� ,Q�WKH�8VHU�DQG�3DVVZRUG�ILHOG��HQWHUWKH�XVHU�DQG�WKH�FRUUHVSRQGLQJSDVVZRUG�\RX�VSHFLILHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�RI�WKHV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�

�� 7R�VDYH�\RXU�GDWD��FKRRVH� �

4

5

6

7

8

9

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Authorizations Made Easy10–12

7KH�PHVVDJH�'HVWLQDWLRQ��;;;;VDYHG�DSSHDUV�

1HZ�RSWLRQV�DSSHDU�RQ�VFUHHQ��<RXFDQ�QRZ�FKRRVH�WR�XVH�D�ORDGGLVWULEXWLRQ��UHFRPPHQGHG���,I�\RXGR�QRW�ZDQW�WR�XVH�WKH�ORDGGLVWULEXWLRQ��VNLS�DKHDG�WR�VWHS����

��� 6HOHFW�<HV�IRU�/RDG�GLVWULE�

��� ,Q�7DUJHW�KRVW��HQWHU�WKH�QXPEHU�RIWKH�PHVVDJH�VHUYHU��6HH�WKH�7LSV�7ULFNV�EHORZ�

��� ,Q�6\VWHP�QXPEHU��HQWHU�WKH�V\VWHPQXPEHU�RI�WKH�PHVVDJH�VHUYHU��6HHWKH�7LSV��7ULFNV�EHORZ�

7R�ILQG�WKH�QDPH�RI�WKH�PHVVDJH�VHUYHURI�WKH�WDUJHW�KRVW��JR�WR�WKH�WDUJHWV\VWHP�DQG�VWDUW�WUDQVDFWLRQ�RZ03�8VXDOO\�\RX�ZLOO�VHH�D�OLVW�ZLWK�VHYHUDOVHUYHU�QDPHV��7KH�FRUUHFW�PHVVDJHVHUYHU�LV�WKH�RQH�WKDW�KDV�DQ�0�OLVWHG�LQWKH�6HUYLFHV�FROXPQ��7KH�QDPH�RI�WKHPHVVDJH�VHUYHU�DSSHDUV�DV�WKH�ILUVW�SDUWRI�WKH�6HUYHU�QDPH��LQ�IURQW�RI�WKHXQGHUVFRUH��7KH�ODVW�WZR�GLJLWV�RI�WKH6HUYHU�QDPH�UHSUHVHQW�WKH�V\VWHPQXPEHU�

��� 7R�VDYH�\RXU�GDWD��FKRRVH� �

$�VWDWXV�PHVVDJH�DSSHDUV�VD\LQJ�'HVWLQDWLRQ�;;;;�VDYHG�

��� &KRRVH�7HVW�FRQQHFWLRQ�WR�WHVW�LI�WKHFRQQHFWLRQ�ZRUNV�FRUUHFWO\�

1011 12

13

14

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Release 4.6A/B10–13

$�FRUUHFW�FRQQHFWLRQ�WHVW�ORRNV�OLNHWKH�VFUHHQ�WR�WKH�ULJKW�

$�WHVW�ZLWK�5HPRWH�ORJLQ�ZRXOG�QRWZRUN�LI�\RX�XVHG�WKH�6\VWHP�XVHU��&3,&�IRU�WKH�FRQQHFWLRQ��,I�\RX�XVHG�D�'LDORJXVHU��\RX�FDQ�XVH�5HPRWH�/RJLQ�IRU�DQDGGLWLRQDO�WHVW�FRQQHFWLRQ�

7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�WKH�VDPH�5���6\VWHP��FKRRVH� �WZLFH�DQG�UHSHDW�VWHSV��²���

7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�D�GLIIHUHQW�5���6\VWHP��ORJ�RQ�WR�WKDW�V\VWHP��VWDUW�WUDQVDFWLRQSALE,�DQG�UHSHDW�VWHSV��²���

'LVWULEXWLRQ�0RGHO

7KH�GLVWULEXWLRQ�PRGHO�GHVFULEHV�WKH�$/(�PHVVDJH�IORZ�EHWZHHQ�ORJLFDO�V\VWHPV�

�� /RJ�RQ�WR�WKH�FHQWUDO�V\VWHP�RI�WKH�$/(�HQYLURQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU�

�� &KRRVH� �WR�VZLWFK�EHWZHHQGLVSOD\�DQG�HGLW�PRGH�

3

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Authorizations Made Easy10–14

�� &KRRVH� �&UHDWH�PRGHO�YLHZ�

�� ,Q�6KRUW�WH[W��HQWHU�D�VKRUWGHVFULSWLRQ�

�� ,Q�7HFKQLFDO�QDPH��HQWHU�D�WHFKQLFDOQDPH�IRU�WKH�PRGHO�YLHZ�

�� &KRRVH� �

�� &KRRVH �LQ�IURQW�RI�0RGHO�YLHZV�WRUHFHLYH�D�OLVW�RI�DOO�PRGHO�YLHZV�LQFOXGLQJ�WKH�RQH�\RX�MXVW�FUHDWHG�

�� 6HOHFW�WKH�MXVW�FUHDWHG�PRGHO�YLHZ�7KH�HQWU\�ZLOO�EH�KLJKOLJKWHG�

��� &KRRVH� �$GG�%$3,�

7R�GLVWULEXWH�WKH�GDWD��\RX�KDYH�WR�GHILQH�WZR�PHWKRGV�IRU�WKH�QHZO\�FUHDWHG�GLVWULEXWLRQPRGHO��:LWKLQ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�RQH�RI�WKH�PHWKRGV�LV�IRU�WKH�GLVWULEXWLRQ�RIWKH�XVHU��DQG�RQH�IRU�WKH�FRPSDQ\��7KHVH�PHWKRGV�DUH�UHDOL]HG�WKURXJK�%$3,V��%XVLQHVV$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��

4

56

7

8

9

10

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Release 4.6A/B10–15

��� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHGGLVWULEXWLRQ�PRGHO�

��� ,Q�6HQGHU�FOLHQW��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�

��� ,Q�5HFHLYHU�VHUYHU��HQWHU�WKH�WKHORJLFDO�V\VWHP�QDPH�RI�WKH�FOLHQWV\VWHP�

��� ,Q�2EM�QDPH�LQWHUIDFH��HQWHU�WKH�REMHFWUSER��QRWH�WKDW�WKLV�HQWU\�LV�FDVH�VHQVLWLYH��

��� ,Q�0HWKRG��HQWHU�Clone��QRWH�WKDWWKLV�HQWU\�LV�FDVH�VHQVLWLYH��

��� &KRRVH� �

��� 5HSHDW�VWHS���²���WR�DGG�D�PHWKRGIRU�WKH�FRPSDQ\�DGGUHVV��(QWHUUserCompany�LQ�VWHS����LQVWHDG�RIUSER��QRWH�WKDW�WKH�HQWU\�LV�FDVH�VHQVLWLYH��

��� &KRRVH� �

,I�WKHUH�DUH�PRUH�WKDQ�WZR�V\VWHPV�LQ�\RXU�SODQQHG�$/(�HQYLURQPHQW��UHSHDW���²���IRUDOO�RWKHU�FOLHQW�V\VWHPV�

��� 7R�VDYH�WKH�GDWD��FKRRVH� �

,I�\RX�H[SDQG�WKH�PRGHO�YLHZFRPSOHWHO\�XVLQJ ��\RXU�PRGHOYLHZ�IRU�D�WZR�V\VWHP�$/(HQYLURQPHQW�VKRXOG�ORRN�OLNH�WKHVFUHHQ�WR�WKH�ULJKW�

11

1213

1415

16

18

17

19

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Central System

Authorizations Made Easy10–16

*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&HQWUDO�6\VWHP

3ULRU�WR�WKH�JHQHUDWLRQ�RI�WKH�SDUWQHU�SURILOHV��ZKLFK�VHWV�WKH�FRQGLWLRQV�IRU�WKH�HOHFWURQLF�GDWD�H[FKDQJH�LQWKH�$/(�HQYLURQPHQW��\RX�ILUVW�FKRRVH�WKH�SDUDPHWHUV�LQ�WKH�FXUUHQW�PRGHO�YLHZ�DV�GHVFULEHG�EHORZ�

�� 2Q�WKH�'LVWULEXWLRQ�0RGHO�&KDQJHGVFUHHQ��FKRRVH�(QYLURQPHQW�→*HQHUDWH�3DUWQHU�3URILOHV�

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�OHWWHUV�

�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FOLHQW�V\VWHP�

,I�WKHUH�DUH�PRUH�FOLHQW�V\VWHPV�LQ�\RXU$/(�HQYLURQPHQW��VHOHFW�WKRVH�ORJLFDOV\VWHPV�XVLQJ� �

�� &KRRVH� �

7R�LPSURYH�SHUIRUPDQFH��\RX�FDQ�VHOHFW�XQGHU�3DFNHWVL]H�KRZ�PDQ\�,'RFV��GDWDFRQWDLQHU�H[FKDQJH�EHWZHHQ�5���6\VWHPV��ZLOO�EH�VHQW�IRU�HDFK�5)&�SURFHVV��7KHVXJJHVWHG�YDOXH�RI�����,'RFV�LV�D�FRPSURPLVH�WR�NHHS�WKH�QXPEHU�RI�GLDORJ�SURFHVVHVGRZQ�DQG�DW�WKH�VDPH�WLPH��TXLFNO\�SURFHVV�FKDQJHV��7R�LQFUHDVH�WKH�SHUIRUPDQFH�FKRRVH�D�VPDOOHU�QXPEHU�RI�,'RFV�WR�EH�VHQW�IRU�HYHU\�5)&�SURFHVV�

1

23

4

Tip

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distributing Model View

Release 4.6A/B10–17

�� <RX�UHFHLYH�WKH�3URWRFRO�IRUJHQHUDWLQJ�SDUWQHU�SURILOH��&KHFN�LI�WKHSDUWQHU�SURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�

�� &KRRVH� �WZLFH�WR�UHWXUQ�WR�WKHVWDUW�VFUHHQ�LQ�%'���

'LVWULEXWLQJ�0RGHO�9LHZ

�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�

�� &KRRVH�(GLW�→��0RGHO�YLHZ�→'LVWULEXWH�

$�OLVW�DSSHDUV�ZLWK�DOO�H[LVWLQJ�FOLHQWV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�WRZKLFK�WKH�PRGHO�YLHZ�QHHGV�WR�EHGLVWULEXWHG�

�� 6HOHFW�WKH�GHVLUHG�V\VWHP�

�� &KRRVH� �

6

1

2

3

5

4

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Authorizations Made Easy10–18

<RX�UHFHLYH�D�ORJ�LI�WKH�PRGHO�YLHZKDV�EHHQ�FUHDWHG�LQ�WKH�FOLHQW�V\VWHP�

7R�FKHFN�LI�WKH�PRGHO�YLHZ�KDV�EHHQ�HVWDEOLVKHG�IRU�WKH�FOLHQW�V\VWHP��SHUIRUP�WKHIROORZLQJ�VWHSV�

�� /RJ�RQ�WR�WKH�GHVLUHG�FOLHQW�V\VWHP��� 6WDUW�WUDQVDFWLRQ�SCUA��� (QWHU�WKH�WHFKQLFDO�QDPH�RI�WKH�PRGHO�YLHZ�

�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\�VWUXFWXUH�

*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&OLHQW�6\VWHP

�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU.

�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�

�� &KRRVH�(QYLURQPHQW�→�*HQHUDWH3DUWQHU�3URILOHV�

4

3

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Release 4.6A/B10–19

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�

�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�

:LWK�WKLV�HQWU\��\RX�HVWDEOLVK�WKHSDUWQHU�SURILOH�IRU�WKH�UHWXUQFRQHFWLRQ�IURP�WKH�FOLHQW�V\VWHP�WRWKH�FHQWUDO�V\VWHP�

�� &KRRVH� �

<RX�UHFHLYH�WKH�3URWRFRO�IRU�JHQHUDWLQJSDUWQHU�SURILOH��&KHFN�LI�WKH�SDUWQHUSURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�

5HSHDW�VWHSV��²��IRU�DOO�FOLHQWV\VWHPV��LI�QHFFHVVDU\�

<RX�KDYH�QRZ�VHW�XS�WKH�FRPSOHWH�$/(�HQYLURQPHQW�

56

7

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Authorizations Made Easy10–20

11–1

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU

$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................11–2

Assigning the Central User Administration Distribution Model ......................11–2

Testing Central User Administration ..................................................................11–3

Migrating Existing Users to the Central System................................................11–7

Defining Field Attributes for User Maintenance ................................................11–9

Global User Manager ..........................................................................................11–10

����

Chapter 11: Setting Up Central User Administration

Overview

Authorizations Made Easy11–2

2YHUYLHZ

:LWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�\RX�FDQ�UHGXFH�WKH�V\VWHP�DGPLQLVWUDWRU·V�HIIRUW�WR�PDLQWDLQ�XVHUV�LQ�WKH5���HQYLURQPHQW��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�DOORZV�\RX�WR�PDLQWDLQ�WKH�XVHUV�FHQWUDOO\�LQ�RQH�V\VWHP�7KH�LQIRUPDWLRQ�LV�WKHQ�DXWRPDWLFDOO\�GLVWULEXWHG�WR�WKH�GHSHQGHQW�V\VWHPV�

7R�VHW�XS�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��ZH�DVVXPH�WKDW�\RX�XVH�RQH�XVHU�DFFRXQW�WKDW�KDV�V\VWHPDGPLQLVWUDWRU�DXWKRUL]DWLRQV�IRU�WKH�FRPSOHWH�V\VWHP�HQYLURQPHQW�

7R�VHW�XS�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IRU�\RXU�5���6\VWHP�JURXS��\RX�QHHG�WR�VHWXS�WKH�$/(�HQYLURQPHQW��DV�GHVFULEHG�LQ�FKDSWHU�����6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�\RXU�FHQWUDO�V\VWHP��7KLV�FHQWUDO�V\VWHP�PXVW�QRZ�EH�VHWXS�IRU�WKH�XVHU�PDLQWHQDQFH�

$VVLJQLQJ�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�'LVWULEXWLRQ

0RGHO

�� /RJ�RQ�WR�\RXU�FHQWUDO�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�GLVWULEXWLRQ�PRGHO�DVFUHDWHG�IRU�WKH�$/(�HQYLURQPHQW�

7KH�PRGHO�\RX�FKRRVH�KHUH�LV�WKH�EDVLVIRU�WKH�GLVWULEXWLRQ�RI�XVHU�GDWD�LQ�\RXU$/(�HQYLURQPHQW�

�� &KRRVH� �

6DYLQJ�WKH�PRGHO�DVVLJQPHQW�IRU�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�WKHFRPSOHWH�GLVWULEXWLRQ�PRGHO�WR�DOO�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��\RX�FDQ�QRORQJHU�FUHDWH�D�XVHU�LQ�WKH�FOLHQW�V\VWHP��)URP�WKLV�SRLQW�IRUZDUG��D�V\VWHP�LV�GHILQHG�DVWKH�FHQWUDO�V\VWHP�DQG�WKH�RWKHU�V\VWHPV�DV�FOLHQW�V\VWHPV�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

3

4

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Release 4.6A/B11–3

&KHFN�LI�WKH�PRGHO�KDV�EHHQ�DVVLJQHG�DVWKH�FOLHQW�V\VWHP�

�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�7KH�GLVWULEXWLRQ�PRGHO�LV�HQWHUHGDXWRPDWLFDOO\�

�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\VWUXFWXUH�

$�FRPSOHWH�YLHZ�RI�WKH�PRGHOVWUXFWXUH�DSSHDUV�

,I�\RX�GR�QRW�VHH�DQ\�VWUXFWXUH��LW�FRXOGEH�EHFDXVH�WKH�GDWD�KDV�EHHQ�GLVWULEXWHGDV\QFKURQRXVO\��,I�WKLV�LV�WKH�FDVH��JREDFN�WR�WKH�VWDUW�VFUHHQ�RI�WUDQVDFWLRQSCUA��ZDLW�IRU�WZR�PLQXWHV��DQG�UHSHDWVWHS���

7HVWLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ

�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�

�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHWHVW�XVHU�

�� &KRRVH� �

7

2

3

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Authorizations Made Easy11–4

�� 2Q�WKH�$GGUHVV�WDE��HQWHU�DW�OHDVW�DODVW�QDPH�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

�� (QWHU�DQ�,QLWLDO�SDVVZRUG�IRU�WKH�WHVWXVHU��<RX�PXVW�FKDQJH�WKH�LQLWLDOSDVVZRUG�DW�ILUVW�ORJRQ�WR�WKH�5��6\VWHP�

�� 5HHQWHU�WKH�LQLWLDO�SDVVZRUG�

�� &KRRVH�WKH�6\VWHPV�WDE�

5

4

6 7

8

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Release 4.6A/B11–5

�� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�WKHORJLFDO�QDPHV�RI�WKH�FHQWUDO�V\VWHPDQG�RI�DOO�WKH�FOLHQW�V\VWHPV�LQ�WKHV\VWHPV�WDEOH�

��� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�

��� &KRRVH�7H[W�FRPSDULVRQ�IURP�FKLOGV\V�

$�WH[W�FRPSDULVRQ�LV�QHHGHG�WR�SURYLGHWKH�FHQWUDO�V\VWHP�ZLWK�DYDLODEOHDFWLYLW\�JURXSV�IURP�WKH�FOLHQW�V\VWHP�2QO\�LI�WKLV�VWHS�KDV�EHHQ�SHUIRUPHGFDQ�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHPVEH�GLVSOD\HG�DQG�VHOHFWHG�LQ�WKH�FHQWUDOV\VWHP�XVLQJ�SRVVLEOH�HQWULHV��,W�LV�DOVRSRVVLEOH�WR�DVVLJQ�DFWLYLW\�JURXSVPDQXDOO\�IURP�WKH�FOLHQW�V\VWHPZLWKRXW�WKH�WH[W�FRPSDULVRQ�

��� 5HDG�WKH�GLDORJ�ZLQGRZ�DQG�FKRRVH�WR�FRQWLQXH�

9

10

11

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Authorizations Made Easy11–6

$VVLJQ�DQ�DFWLYLW\�JURXS�WR�WKH�WHVW�XVHULQ�HYHU\�ORJLFDO�V\VWHP�RI�WKH�V\VWHPJURXS�

��� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�DOO�WKHORJLFDO�V\VWHPV�

��� ,Q�WKH�$FWLY�FROXPQ��HQWHU�WKHDFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WRWKH�WHVW�XVHU�LQ�WKH�FRUUHVSRQGLQJV\VWHP��IRU�WHVW�SXUSRVHV��LW�LVHQRXJK�WR�DVVLJQ�RQH�DFWLYLW\�JURXSSHU�V\VWHP��

��� &KRRVH� �

6DYLQJ�VWDUWV�WKH�GLVWULEXWLRQ�SURFHVVDXWRPDWLFDOO\��7KH�XVHU�LV�FUHDWHG�ZLWKWKH�DFWLYLW\�JURXS�DVVLJQPHQW�LQ�HYHU\GHILQHG�V\VWHP�

7KH�XVHU�PDLQWHQDQFH�MXPSV�EDFN�WRWKH�VWDUW�VFUHHQ�RI�68���

<RX�UHFHLYH�WKH�PHVVDJH�8VHU���ZDVVDYHG��<RX�FDQ�QRZ�FKHFN�LI�WKH�XVHUGDWD�KDV�EHHQ�GLVWULEXWHG�FRUUHFWO\�

��� &KRRVH�(QYLURQPHQW�→�'LVWULEXWLRQORJ��WUDQVDFWLRQ�SCUL��

13 14

15

16

Chapter 11: Setting Up Central User Administration

Migrating Existing Users to the Central System

Release 4.6A/B11–7

$�VHULHV�RI�EXWWRQV�SURYLGHV�DFFHVV�WRGLIIHUHQW�ORJ�GLVSOD\V�

,I�\RX�FKRRVH�6\VWHP�UHSRUWV��\RX�UHFHLYHWKH�XVHU�VWDWXV�VRUWHG�E\�FOLHQW�V\VWHPV�,I�\RX�H[SDQG�WKH�WUHH��\RX�UHFHLYH�WKHXVHUV�RI�WKH�FOLHQW�V\VWHPV�

$Q�RYHUYLHZ�DERXW�(UURUV��:DUQLQJV�6XFFHVVIXO��DQG�1HZ�XQFRQILUPHGGLVWULEXWLRQV�LV�GLVSOD\HG��8QFRQILUPHGGLVWULEXWLRQV�FRXOG�UHVXOW�IURP�D�IDXOW\5)&�FRQQHFWLRQ�

0LJUDWLQJ�([LVWLQJ�8VHUV�WR�WKH�&HQWUDO�6\VWHP

,I�\RX�DOUHDG\�VHW�XS�XVHU�DFFRXQWV�LQ�WKH�FOLHQW�V\VWHPV��WKHVH�XVHUV�QHHG�WR�EH�PLJUDWHG�WR�WKH�FHQWUDOV\VWHP��,I�WKLV�DFWLRQ�KDV�DOUHDG\�EHHQ�SHUIRUPHG��\RX�FDQ�PDLQWDLQ�WKH�XVHU�GDWD�FHQWUDOO\�

�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SCUG�DQG�FKRRVH�(QWHU�

�� 6HOHFW�WKH�FOLHQW�V\VWHP�IURP�ZKHUH�\RX�ZRXOG�OLNH�WR�PLJUDWH�WKH�XVHU�GDWD�

�� &KRRVH�7UDQVIHU�XVHUV�

3

Chapter 11: Setting Up Central User Administration

Migrating Existing Users to the Central System

Authorizations Made Easy11–8

2Q�WKH�1HZ�XVHUV�WDE��\RX�FDQ�VHH�DOOXVHU�DFFRXQWV�DYDLODEOH�LQ�WKH�FOLHQWV\VWHP��EXW�QRW�LQ�WKH�FHQWUDO�V\VWHP�<RX�FDQ�PLJUDWH�DOO�WKHVH�XVHUV�LQWR�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

�� 7R�VHOHFW�DOO��FKRRVH� �

�� &KRRVH� �7UDQVIHU�XVHUV�

�� &KRRVH�WKH�,GHQWLFDO�XVHUV�WDE�

2Q�WKH�,GHQWLFDO�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�LGHQWLFDO�ILUVW�DQG�ODVWQDPHV�LQ�WKH�FOLHQW�DQG�FHQWUDO�V\VWHPDUH�GLVSOD\HG��$OO�RI�WKHVH�XVHUV�FDQ�EHPLJUDWHG�WR�&HQWUDO�8VHU$GPLQLVWUDWLRQ��7KH\�ZLOO�DOVR�JHW�WKHFOLHQW�V\VWHP�DVVLJQHG�LQ�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

�� 7R�VHOHFW�DOO��FKRRVH� �

�� &KRRVH� �7UDQVIHU�XVHUV�

�� &KRRVH�WKH�'LIIHUHQW�XVHUV�WDE�

2Q�WKH�'LIIHUHQW�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�WKH�VDPH�XVHU�,'��EXWZLWK�QDPHV�WKDW�DUH�GLIIHUHQW�LQ�WKHFOLHQW�RU�FHQWUDO�V\VWHP��DUH�GLVSOD\HG�

��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FHQWUDOV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�

D� 6HOHFW�WKH�GHVLUHG�HQWU\�

E� &KRRVH� �7UDQVIHU�XVHUV�

��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FOLHQWV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�

D� (QWHU�WKH�VDPH�QDPH�LQ�WKHFHQWUDO�V\VWHP�DV�LW�LV�GLVSOD\HGLQ�WKH�FOLHQW�V\VWHP��7KH�XVHU�LVQRZ�GLVSOD\HG�XQGHU�WKH,GHQWLFDO�XVHUV�WDE�

E� 6HOHFW�WKH�GHVLUHG�HQWU\�

F� &KRRVH� �7UDQVIHU�XVHUV�

4 5

7 8

6

9

10b

10a

Chapter 11: Setting Up Central User Administration

Defining Field Attributes for User Maintenance

Release 4.6A/B11–9

,I�WKH�GLIIHUHQW�QDPHV�UHVXOW�IURP�GHDOLQJ�ZLWK�WZR�GLIIHUHQW�SHUVRQV��\RX�KDYH�WR�FKDQJH�WKH�XVHU�QDPHVXVLQJ�SU01�HLWKHU�LQ�WKH�FHQWUDO�RU�FOLHQW�V\VWHP��7KH�XVHU�QDPH�RI�WKH�FOLHQW�V\VWHP�FDQ�EH�IRXQG�RQ�WKH1HZ�XVHUV�WDE�DIWHUZDUGV�

2Q�WKH�$OUHDG\�FHQWUDO�XVHU�WDE��DOO�XVHUDFFRXQWV�DUH�GLVSOD\HG�WKDW�KDYH�EHHQPLJUDWHG�XVLQJ�RQH�RI�WKH�DERYH�VWHSV�RU�KDYH�EHHQ�FUHDWHG�LQ�WKH�FHQWUDOV\VWHP�RI�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

'HILQLQJ�)LHOG�$WWULEXWHV�IRU�8VHU�0DLQWHQDQFH

$OWKRXJK�LW�LV�QR�ORQJHU�SRVVLEOH�WR�FUHDWH�XVHUV�LQ�WKH�FOLHQW�V\VWHP��\RX�FDQ�PDLQWDLQ�DOUHDG\�H[LVWLQJ�XVHUGDWD�LQ�WKH�FOLHQW�V\VWHP��7KHUHIRUH��LW�LV�XVHIXO�WR�GHILQH��DW�WKH�ILHOG�OHYHO��LI�DQG�KRZ�WKLV�GDWD�VKRXOG�EHPDLQWDLQHG��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�ILHOG�DWWULEXWHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUM�DQG�FKRRVH�(QWHU�

�� $OORFDWH�RQ�DOO�WDEV�IRU�HDFK�ILHOG�WKHDWWULEXWHV�GHVFULEHG�LQ�WKH�WDEOHEHORZ��1RW�DOO�DWWULEXWHV�FDQ�EHVHOHFWHG�IRU�HYHU\�ILHOG�

�� &KRRVH� �

3

2

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–10

$WWULEXWH 'HVFULSWLRQ

*OREDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�LVGLVWULEXWHG�IURP�WKHUH�LQWR�WKH�FOLHQW�V\VWHPV�

/RFDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FOLHQW�V\VWHP�DQG�LV�QRWGLVWULEXWHG�

3URSRVDO 'XULQJ�WKH�FUHDWLRQ�RI�D�XVHU��WKH�VXJJHVWHG�YDOXH�LV�PDLQWDLQHG�DQGWKHQ�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��WKH�GDWD�LVPDLQWDLQHG�RQO\�ORFDOO\��,I�D�QHZ�FOLHQW�V\VWHP�LV�FRQQHFWHG�WR�&HQWUDO8VHU�$GPLQLVWUDWLRQ��WKH�SURSRVHG�YDOXH�LV�GLVWULEXWHG�WR�WKLV�V\VWHP�,I�WKH�SURSRVHG�YDOXH�LV�FKDQJHG�LQ�WKH�FHQWUDO�V\VWHP��LW�LV�RQO\GLVWULEXWHG�WR�WKH�QHZ�V\VWHPV��$OUHDG\�H[LVWLQJ�V\VWHPV�DUH�QRWDIIHFWHG�

5HW9DO 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DV�ZHOO�DV�WKHFOLHQW�V\VWHP��7KH�FKDQJHV�PDGH�LQ�WKH�FOLHQW�V\VWHP�DUH�UHGLVWULEXWHGWR�WKH�FHQWUDO�V\VWHP��)URP�WKHUH��WKH�GDWD�LV�GLVWULEXWHG�WR�DOO�RWKHUFOLHQW�V\VWHPV�

(YHU\ZKHUH 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�WKH�FOLHQWV\VWHP��7KH�FKDQJHV�LQ�WKH�FOLHQW�V\VWHP�DUH�QRW�GLVWULEXWHG�DQ\ZKHUH�7KH�FKDQJHV�DIIHFW�RQO\�WKLV�FOLHQW�V\VWHP�

7KH�LQVWDOODWLRQ�RI�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QRZ�FRPSOHWH�

*OREDO�8VHU�0DQDJHU

7KH�*OREDO�8VHU�0DQDJHU�LV�DQ�RSWLRQDO�WRRO�WKDW�VLPSOLILHV�\RXU�ZRUN�ZLWK�&HQWUDO�8VHU$GPLQLVWUDWLRQ��<RX�FDQ�VWLOO�XVH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�DQG�WKH�3URILOH�*HQHUDWRU�3*��WR�DVVLJQ�XVHUV�DQG�DFWLYLW\�JURXSV�

<RX�QRZ�KDYH�WKH�RSWLRQ�WR�XVH�GLIIHUHQW�JURXSLQJ�W\SHV�RQ�WKH�XVHU�DQG�V\VWHP�OHYHO�ZLWKWKH�*OREDO�8VHU�0DQDJHU��7KH�JURXSLQJ�LV�FDUULHG�RXW�WKURXJK�XVHU�JURXSV�RQ�WKH�XVHU�OHYHODQG�WKURXJK�V\VWHP�W\SHV�IRU�WKH�V\VWHP�

7KHVH�PDLQWHQDQFH�RSWLRQV�DUH�FRPELQHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�VLQFH�WKHUH�DUHXVXDOO\�QR�FKDQJHV�WR�RWKHU�GDWD�LQ�WKH�XVHU�PDVWHU�GDWD�DIWHU�WKH�FUHDWLRQ�RI�WKH�XVHU�+RZHYHU��V\VWHP�DQG�DXWKRUL]DWLRQ�DVVLJQPHQWV�DUH�DQ�RQJRLQJ�SURFHVV�

,I�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�VHWWLQJ�XS�WKH�XVHU�GDWD��GR�QRW�GLVWULEXWH�WKH�XVHUGDWD�XVLQJ�WKH�*OREDO�8VHU�0DQDJHU��(YHU\WKLQJ�WKDW�LV�QRW�GHILQHG�LQ�WKH�*OREDO�8VHU0DQDJHU�ZLOO�EH�GHOHWHG�LQ�WKH�WDUJHW�V\VWHP�

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–11

,W�LV�QRW�SRVVLEOH�WR�DVVLJQ�DXWKRUL]DWLRQ�SURILOHV�GLUHFWO\�WR�XVHUV�RU�XVHU�JURXSV�ZLWK�WKH*OREDO�8VHU�0DQDJHU��7KH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�WKURXJK�DFWLYLW\�JURXSV��,I�\RXZDQW�WR�FUHDWH�DQ�DFWLYLW\�JURXS�DXWRPDWLFDOO\�IURP�DQ�H[LVWLQJ�DXWKRUL]DWLRQ�SURILOH��XVHWUDQVDFWLRQ�SU25��VWHS����&RS\�GDWD�IURP�ROG�SURILOHV�

7KH�PDLQ�DGYDQWDJH�RI�WKH�*OREDO�8VHU�0DQDJHU�LV�WKDW�\RX�QHYHU�KDYH�WR�YLHZ�WKHFRPSOHWH�V\VWHP�ODQGVFDSH�WR�DVVLJQ�DXWKRUL]DWLRQV��,Q�HYHU\�WDVN��\RX�RQO\�ORRN�DW�D�VPDOOSDUW�RI�WKH�FRPSOHWH�ODQGVFDSH��7KH�GLDJUDP�EHORZ�VKRZV�WKDW�\RX�RQO\�ORRN�DW�WZR�VLGHV�RIWKH�DVVLJQPHQW�WULDQJOH�

6RXUFH 7DUJHW

8VHU�8VHU�JURXS 6\VWHP�6\VWHP�W\SH

6\VWHP�6\VWHP�W\SH $FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS

$FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS 8VHU�8VHU�JURXS

7R�PRGHO�D�FRPSOHWH�DVVLJQPHQW�IRU�GLVWULEXWLRQ�LQ�WKH�WDUJHW�V\VWHPV�\RX�QHHG�WR�FUHDWHD�FORVHG�WULDQJOH�IRU�WKDW�DVVLJQPHQW�DV�VKRZQ�LQ�WKH�JUDSKLF�DERYH��7R�UHGXFH�WKHFRPSOH[LW\�RI�WKLV�SURFHVV��WKH�*OREDO�8VHU�0DQDJHU�LV�VHW�XS�LQ�VXFK�D�ZD\�WKDW�\RXRQO\�KDYH�WR�DVVLJQ�WKH�RWKHU�WZR�DQJOHV��2QFH�\RX�KDYH�FRPSOHWHG�HDFK�RI�WKH�WKUHHDQJOHV��WKH�DVVLJQPHQWV�DUH�FRPSOHWH�

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–12

6WUXFWXUH�RI�WKH�*OREDO�8VHU�0DQDJHU

7KH�*OREDO�8VHU�0DQDJHU�FDQ�RQO\�EH�XVHG�LQ�WKH�FHQWUDO�V\VWHP�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

7R�VWDUW�WKH�*OREDO�8VHU�0DQDJHU��HQWHU�WUDQVDFWLRQ�SUUM�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH(QWHU�

On the left tile, all usersand user groups in thesystem environment aredisplayed.

In the middle tile, all thesystems and systemgroups are displayed.

On the right tile, all activitygroups and compositeactivity groups in thesystem environment aredisplayed.

7R�GLVSOD\�WKH�DFWLYLW\�JURXSV�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHP��LQ�WKH*OREDO�8VHU�0DQDJHU�FKRRVH�([WUDV�→�6\VWHP�FRPSDULVRQ��$OWHUQDWLYHO\��\RX�FDQ�SHUIRUPWKH�7H[W�FRPSDULVRQ�IRU�FKLOG�V\V��RQ�WKH�$FWLYLW\�JURXSV�WDE�LQ�XVHU�PDLQWHQDQFH�WUDQVDFWLRQSU01��DV�GHVFULEHG�HDUOLHU���1RWH�WKDW�LW�PD\�WDNH�VRPH�WLPH�IRU�WKH�GDWD�WR�EHFRPHDYDLODEOH�VLQFH�LW�LV�GLVWULEXWHG�DV\QFKURQRXVO\�

8VLQJ�WKH�*OREDO�8VHU�0DQDJHU

7KH�XVH�RI�WKH�*OREDO�8VHU�0DQDJHU�GHSHQGV�RQ�ZKHWKHU�RU�QRW�WKHUH�ZHUH�XVHUV�LQ�\RXUV\VWHP�ODQGVFDSH�EHIRUH�WKH�LQVWDOODWLRQ�RI�FHQWUDO�XVHU�PDQDJHPHQW�

,I�XVHUV�DOUHDG\�H[LVW��LW�LV�DGYLVDEOH�WR�PLJUDWH�WKDW�XVHU�PDVWHU�GDWD�LQWR�WKH�*OREDO�8VHU0DQDJHU��7KLV�HQVXUHV�WKDW�WKH�XVHU�GDWD�ZLOO�QRW�EH�GHOHWHG�ZLWK�WKH�ILUVW�GLVWULEXWLRQ�

6\VWHP�/DQGVFDSH�ZLWK�([LVWLQJ�8VHUV

,I�\RX�ZDQW�WR�XVH�WKH�*OREDO�8VHU�0DQDJHU�LQ�D�V\VWHP�ODQGVFDSH�ZLWK�DQ�H[LVWLQJ�DQGSURGXFWLYH�XVHU��SURFHHG�DV�GHVFULEHG�EHORZ�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SUUM�DQG�FKRRVH�(QWHU�

�� )URP�WKH�VWDQGDUG�PHQX�EDU�

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–13

< &KRRVH�([WUDV�→�0LJUDWLRQ�→�8VHU�WR�GLVSOD\�WKH�FXUUHQW�VWDWXV�RI�XVHU�PDVWHUUHFRUGV�LQ�DOO�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

< &KRRVH�([WUDV�→�0LJUDWLRQ�→�$FWLYLW\�JURXSV�WR�DVVLJQ�DFWLYLW\�JURXSV�DXWRPDWLFDOO\LQ�WKH�YDOLG�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

7KH�GDWD�LV�RQO\�XSGDWHG�RQ�WKH�VLQJOH�XVHU�OHYHO�ZLWK�WKH�FXUUHQW�VWDWXV�LQ�WKH�*OREDO�8VHU0DQDJHU�DIWHU�WKH�PLJUDWLRQ��'R�QRW�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHU�JURXSV�DQG�V\VWHPW\SHV�LI�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�WKH�PLJUDWLRQ�

$FWLYLW\�JURXSV�VKRXOG�EH�QDPHG�FOHDUO\�LQ�WKH�V\VWHP�ODQGVFDSH��7KH�V\VWHP�ODQGVFDSHDFWV�OLNH�D�VLQJOH�V\VWHP��7KHUHIRUH�DQ�DFWLYLW\�JURXS�VKRXOG�RQO\�H[LVW�RQFH�LQ�WKLV�V\VWHP�,I�DQ�DFWLYLW\�JURXS�ZLWK�WKH�VDPH�QDPH�H[LVWV�LQ�PXOWLSOH�V\VWHPV�LQ�WKH�V\VWHPODQGVFDSH��LW�ZLOO�DSSHDU�PXOWLSOH�WLPHV�LQ�WKH�DFWLYLW\�JURXS�OLVW�LQ�WKH�*OREDO�8VHU0DQDJHU�

,Q�WKH�*OREDO�8VHU�0DQDJHU�\RX�FDQ�FUHDWH�DVVLJQPHQWV�RQ�WKH�VLQJOH�XVHU�OHYHO��DV�ZHOO�DVRQ�WKH�XVHU�JURXS�OHYHO��7KLV�DELOLW\�PD\�OHDG�WR�XQZDQWHG�HIIHFWV�DIWHU�D�XVHU�PLJUDWLRQ�

)RU�H[DPSOH��\RX�PLJUDWHG�DOO�GHYHORSHUV�LQ�\RXU�V\VWHP�LQWR�WKH�*OREDO�8VHU�0DQDJHU�DVGHVFULEHG�DERYH��7KHQ�\RX�GHILQHG�D�XVHU�JURXS�IRU�DOO�GHYHORSHUV�WKDW�FRQWDLQV�WKH�VDPHDXWKRUL]DWLRQV�WKDW�\RX�GHILQHG�HDUOLHU�RQ�WKH�VLQJOH�XVHU�OHYHO��,I�\RX�DVVLJQ�DOO�GHYHORSHUVWR�WKDW�XVHU�JURXS��LW�ZRXOG�OHDG�WR�D�GRXEOH�DVVLJQPHQW�RI�WKH�VDPH�DXWKRUL]DWLRQV��,I�\RXGHOHWHG�WKH�DVVLJQPHQW�RI�RQH�XVHU�WR�WKLV�XVHU�JURXS��WKLV�XVHU�ZRXOG�VWLOO�KDYH�WKHDXWKRUL]DWLRQV�RQ�WKH�VLQJOH�XVHU�OHYHO��7KHUHIRUH��\RX�PXVW�GHOHWH�WKH�DVVLJQPHQW�WR�WKHVLQJOH�XVHU�OHYHO�DV�VRRQ�DV�\RX�DVVLJQ�WKH�XVHU�WR�D�XVHU�JURXS�DIWHU�WKH�PLJUDWLRQ��7KHVLQJOH�XVHU�DVVLJQPHQW�VKRXOG�EH�XVHG�WR�JLYH�D�XVHU�DGGLWLRQDO�DXWKRUL]DWLRQV�WKDW�GHYLDWHIURP�WKH�VWDQGDUG�

6\VWHP�/DQGVFDSH�:LWKRXW�([LVWLQJ�8VHUV

,I�\RX�KDYH�QR�H[LVWLQJ�XVHUV�LQ�\RXU�V\VWHP�ODQGVFDSH��WKH�PLJUDWLRQ�RI�WKH�XVHU�PDVWHUGDWD�GRHV�QRW�DSSO\��<RX�FDQ�LPPHGLDWHO\�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHUV�LQ�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQG�FUHDWH�WKH�DXWKRUL]DWLRQ�DVVLJQPHQWV�LQ�WKH�V\VWHPODQGVFDSH�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU��(YHU\�XVHU�RQO\�QHHGV�WR�EH�FUHDWHG�RQFH�LQ�WKHFHQWUDO�V\VWHP��DQG�PLJKW�JHW�DVVLJQHG�WR�RWKHU�V\VWHPV�ZLWK�WKH�KHOS�RI�WKH�*OREDO�8VHU0DQDJHU��7KH�FUHDWLRQ�RI�WKDW�XVHU�LQ�WKH�RWKHU�V\VWHPV��DQG�WKH�DVVLJQPHQW�WR�WKH�DFWLYLW\JURXSV�WDNHV�SODFH�DXWRPDWLFDOO\�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU�

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–14

8VHU�&UHDWLRQ

�� &UHDWH�D�XVHU�LQ�WUDQVDFWLRQ�68���DVXVXDO��VHH�FKDSWHU���IRU�GHWDLOHGLQIRUPDWLRQ��

�� (QWHU�D�8VHU�JURXS�RQ�WKH�*URXSV�WDEIRU�WKH�FXUUHQW�XVHU��LI�WKLV�XVHUJURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�LQWKH�*OREDO�8VHU�0DQDJHU���<RX�ZLOOQRW�QHHG�WR�PDNH�WKDW�DVVLJQPHQW�LQWKH�*OREDO�8VHU�0DQDJHU�DQ\PRUH�

<RX�VKRXOG�RQO\�FUHDWH�DVVLJQPHQWV�RQ�WKH�6\VWHPV�DQG�$FWLYL��DFWLYLW\�JURXSV��WDEV�LI\RX�DUH�FHUWDLQ�WKLV�DVVLJQPHQW�LV�RQO\�YDOLG�IRU�WKH�VLQJOH�XVHU��2WKHUZLVH��FUHDWH�WKHDVVLJQPHQWV�IRU�XVHU�JURXSV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

$OO�GDWD�HQWHUHG�LQ�WUDQVDFWLRQ�68���LV�DOVR�DYDLODEOH�LQ�WKH�*OREDO�8VHU�0DQDJHU��$OODVVLJQPHQWV�FUHDWHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�DUH�DOVR�DYDLODEOH�LQ�WUDQVDFWLRQ�SU01�

'HILQLQJ�6\VWHP�7\SHV�DQG�8VHU�*URXSV

:H�QRZ�GHPRQVWUDWH�KRZ�WR�JURXS�PXOWLSOH�V\VWHPV�LQWR�D�V\VWHP�JURXS�

�� &KRRVH� �QH[W�WR�6\VWHP�7\SHV�WRFUHDWH�D�V\VWHP�W\SH�

�� ,Q�6\VWHP�W\SH��HQWHU�D�QDPH�IRU�WKHV\VWHP�W\SH�

�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�V\VWHP�W\SH�

�� &KRRVH� �WR�FUHDWH�WKH�V\VWHP�W\SH�

2

1

23

4

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–15

�� 7KH�QHZ�V\VWHP�W\SH�DSSHDUV�LQ�WKHOLVW�

�� 7R�DVVLJQ�D�V\VWHP�WR�WKH�MXVW�FUHDWHGV\VWHP�W\SH��VHOHFW�WKH�GHVLUHGV\VWHP�IURP�WKH�6\VWHPV�OLVW��0RYH�LWXVLQJ�GUDJ�DQG�GURS�LQWR�WKH�QHZV\VWHP�W\SH��LQ�RXU�H[DPSOH'(9(/��

�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\V\VWHP�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DV\VWHP�W\SH�

2QH�V\VWHP�FDQ�EH�DVVLJQHG�WR�RQO\�RQH�V\VWHP�JURXS��$�XVHU�FDQ�EH�DVVLJQHG�WRGLIIHUHQW�XVHU�JURXSV�

,Q�WKH�IROORZLQJ�VWHSV��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�D�XVHU�JURXS�

�� &KRRVH� �QH[W�WR�8VHU�JURXSV�

�� ,Q�8VHU�JURXS��HQWHU�D�QDPH�IRU�WKH8VHU�JURXS�

�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�XVHU�JURXS�

�� &KRRVH� �WR�FUHDWH�WKH�XVHU�JURXS�

2

6

1

5

3

4

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–16

�� 7KH�QHZ�XVHU�JURXS�DSSHDUV�LQ�WKHOLVW�

�� 7R�DVVLJQ�D�XVHU�WR�WKH�MXVW�FUHDWHGXVHU�JURXS��VHOHFW�WKH�GHVLUHG�XVHUIURP�WKH�8VHUV�OLVW��0RYH�LW�XVLQJGUDJ�DQG�GURS�LQWR�WKH�QHZ�XVHUJURXS��LQ�RXU�H[DPSOH��'(9(/23��

�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\�XVHUWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DXVHU�JURXS�

0RGHOLQJ�ZLWK�WKH�*OREDO�8VHU�0DQDJHU

,Q�WKH�IROORZLQJ�SURFHGXUH�ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�WKH�FRUUHFW�V\VWHPV�DQG�DFWLYLW\�JURXSV�WR�D�XVHUJURXS�

�� 6HOHFW�WKH�MXVW�FUHDWHG�XVHU�JURXS�

�� &KRRVH� �WR�GLVSOD\�WKHDVVLJQPHQWV�

�� <RX�UHFHLYH�WKH�FXUUHQW�VWDWXV�RI�WKHV\VWHP�V\VWHP�W\SH�DQG�DFWLYLW\JURXS�DVVLJQPHQWV�IRU�WKH�VHOHFWHGXVHU�JURXS��,Q�RXU�H[DPSOH��ZH�KDYHPDGH�QR�DVVLJQPHQWV�IRU�WKH�XVHUJURXS�'(9(/23��7KHUHIRUH��QRDVVLJQPHQWV�DSSHDU��MXVW�WKH�IROGHUV�

56

1

2

3 3

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–17

�� 7R�DVVLJQ�D�V\VWHP�RU�V\VWHP�W\SH�WRD�XVHU�JURXS��VHOHFW�WKH�GHVLUHGV\VWHP�RU�V\VWHP�W\SH�IURP�WKH6\VWHPV�RU�6\VWHP�W\SHV�OLVW�DQG�PRYHLW�XVLQJ�GUDJ�DQG�GURS�LQWR�WKHGHVLUHG�IROGHU��IRU�H[DPSOH��D�IROGHUEHORQJLQJ�WR�$VVLJQPHQW�WR�8VHUJURXS�'(9(/23��

�� 7R�DVVLJQ�DFWLYLW\�JURXSV�RUFRPSRVLWH�DFWLYLW\�JURXSV�WR�WKHXVHU�JURXS��SURFHHG�ZLWK�WKH�VDPHSURFHGXUH�

7R�UHGXFH�WKH�QXPEHU�RI�GLVSOD\HG�HQWULHV�LQ�D�OLVW��IRU�WKH�XVHU��DFWLYLW\�JURXS��HWF���FKRRVH�WKH�VHOHFWLRQ�LFRQ�QH[W�WR�WKH�GHVLUHG�HQWU\�

5HPHPEHU�WKDW�DFFRUGLQJ�WR�WKH�DVVLJQPHQW�WULDQJOH�VKRZQ�HDUOLHU��\RX�KDYH�RQO\�GHILQHGWZR�RI�WKH�WKUHH�DQJOHV�VR�IDU��,Q�WKH�H[DPSOH�DERYH��ZH�IRFXVHG�RQ�WKH�XVHU�JURXS�WRDVVLJQ�V\VWHPV�DQG�DFWLYLW\�JURXSV��:KDW�LV�PLVVLQJ�LV�WKH�DVVLJQPHQW�EHWZHHQ�DFWLYLW\JURXSV�DQG�V\VWHPV��,I�\RX�PLJUDWHG�WKH�DFWLYLW\�JURXSV��WKH�DVVLJQPHQW�KDV�EHHQSHUIRUPHG�DXWRPDWLFDOO\�DQG�WKH�WULDQJOH�LV�FRPSOHWH��,I�QRW��\RX�KDYH�WR�GHILQH�WKHDVVLJQPHQW�IRU�HYHU\�DFWLYLW\�JURXS�

<RX�KDYH�WKH�RSWLRQ�WR�GLVSOD\�DQG�PDLQWDLQ�DVVLJQPHQWV�IURP�HYHU\�FRUQHU�RI�WKHWULDQJOH��,I�\RX�GLVSOD\�WKH�DVVLJQPHQWV�RI�DQ�DFWLYLW\�JURXS��WKHQ�\RX�FDQ�PDLQWDLQ�WKHV\VWHP�DQG�XVHU�JURXSV�IRU�WKDW�DFWLYLW\�JURXS��,I�\RX�GLVSOD\�WKH�DVVLJQPHQW�RI�D�V\VWHPW\SH��WKHQ�\RX�FDQ�GHILQH�WKH�XVHU�DQG�DFWLYLW\�JURXSV�WKDW�DUH�YDOLG�IRU�WKLV�V\VWHP�W\SH�

$XWKRUL]DWLRQ�IRU�WKH�*OREDO�8VHU�0DQDJHU

:LWK�WKH�*OREDO�8VHU�0DQJHU��\RX�KDYH�WKH�RSWLRQ�WR�PDLQWDLQ�XVHUV�DQG�DOO�WKHLUDXWKRUL]DWLRQV�LQ�HYHU\�V\VWHP�IURP�WKH�FHQWUDO�V\VWHP�RI�WKH�V\VWHP�ODQGVFDSH��7KLV�RSWLRQFDQ�EH�YHU\�XVHIXO��EXW�DOVR�YHU\�SUREOHPDWLF�LI�XVHG�LQFRUUHFWO\��)RU�H[DPSOH��DOO�XVHUV�LQ�DV\VWHP�W\SH�FRXOG�EH�GHOHWHG�YHU\�HDVLO\��7KHUHIRUH��LW�LV�YHU\�LPSRUWDQW�WR�SD\�FDUHIXODWWHQWLRQ�WR�WKH�DXWKRUL]DWLRQV�RI�WKH�PRGHOHU�DQG�DGPLQLVWUDWRU�RI�WKH�*OREDO�8VHU0DQDJHU�

:H�UHFRPPHQG�\RX�XVH�WKH�IRXU�H\H�SULQFLSOH��ZKHUH�RQH�DGPLQLVWUDWRU�PRGHOV�WKHDVVLJQPHQWV�DQG�DQRWKHU�FKHFNV�WKRVH�DVVLJQPHQWV�EHIRUH�WKH�GDWD�LV�GLVWULEXWHG��7KHPRGHOLQJ�LV�WKH�XQFULWLFDO�SDUW��EHFDXVH�QR�GDWD�LV�EHLQJ�FKDQJHG�LQ�WKH�FOLHQW�V\VWHPV��7KLVKDSSHQV�RQO\�GXULQJ�WKH�GLVWULEXWLRQ�

7KH�GLVWULEXWLRQ�RQO\�WDNHV�SODFH�RQ�WKRVH�LVVXHV�IRU�ZKLFK�WKH�DGPLQLVWUDWRU�KDV�WKHGLVWULEXWLRQ�ULJKWV��,Q�WKLV�ZD\��LW�LV�SRVVLEOH�WR�KDYH�GLIIHUHQW�DGPLQLVWUDWRUV�IRU�VHOHFWHG

54

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–18

V\VWHPV�LQ�WKH�V\VWHP�ODQGVFDSH��7KHVH�DGPLQLVWUDWRUV�FDQ�WKHQ�RQO\�GLVWULEXWH�WKH�GDWD�IRUZKLFK�WKH\�DUH�DXWKRUL]HG�

7KH�IROORZLQJ�WDEOH�GLVSOD\V�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�WKH�*OREDO�8VHU�0DQDJHU�

7DVN 2EMHFW $FWLYLW\ 6B86(5B*53 6B86(5B6<6 6B865B$*5

'LVSOD\�FUHDWH�GHOHWHDVVLJQPHQW

8VHU8VHU�JURXS6\VWHP6\VWHP�W\SHDFWLY��JURXS

0RGHO������'LVSOD\�����

8VHU�JURXS�RIWKH�XVHU

8VHU�JURXS

6\VWHP6\VWHP�W\SH

$FWLY�JURXS

8VHU�LQ�XVHUJURXSV

$VVLJQ����� 8VHU�JURXS�RIWKH�XVHU

8VHU�JURXS

&KDQJH6\VWHP�W\SH

$VVLJQ����� 6\VWHP6\VWHP�W\SH

&UHDWH�XVHUJURXS

&UHDWH����� 8VHU�JURXS

0LJUDWH 0LJUDWH����� �&RPPHQW�HQWHULQJ�RIVLQJOHV\VWHP�QRWSRVVLEOH

'LVWULEXWLQJ�'DWD�LQ�WKH�*OREDO�8VHU�0DQDJHU

%HIRUH�WKH�GLVWULEXWLRQ��\RX�VKRXOG�DOZD\V�GLVSOD\�WKH�GDWD�DQG�FKHFN�LW��,Q�WKH�IROORZLQJ�VWHSV��ZHGHPRQVWUDWH�KRZ�WR�FKHFN�WKH�GDWD�

�� ,QVLGH�WKH�*OREDO�8VHU�0DQDJHU�FKRRVH� �WR�GLVSOD\�WKH�GLVWULEXWLRQGDWD�

�� &KHFN�LI�WKH�GDWD�IRU�WKH�XVHUV�LV�VHWFRUUHFWO\�IRU�WKH�GLVWULEXWLRQ�

2QO\�GLVWULEXWH�WKH�GDWD�DIWHU�\RX�KDYH�UDQGRPO\�FKHFNHG�WKH�XVHU�GDWD�

1

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–19

<RX�FDQ�GLVWULEXWH�WKH�GDWD�IURP�WKH�*OREDO�8VHU�0DQDJHU�PDQXDOO\�LPPHGLDWHO\�RUFUHDWH�D�EDFNJURXQG�MRE�WR�GLVWULEXWH�WKH�GDWD�

,PPHGLDWH�'LVWULEXWLRQ

�� 7R�WULJJHU�WKH�GLVWULEXWLRQLPPHGLDWHO\��FKRRVH� �

7KH�GDWD�LV�GLVWULEXWHG�ULJKW�DZD\�5HPHPEHU�WKDW�LW�FDQ�WDNH�D�ZKLOHXQWLO�DOO�GDWD�LV�DYDLODEOH�LQ�HYHU\FOLHQW�V\VWHP��VLQFH�WKH�GLVWULEXWLRQKDSSHQV�DV\QFKURQRXVO\�

,PPHGLDWH�GLVWULEXWLRQ�FDQ�FDXVH�D�ORW�RI�QHWZRUN�WUDIILF�LQ�\RXU�V\VWHP�ODQGVFDSH�DQGVORZ�GRZQ�WKH�SHUIRUPDQFH�RI�V\VWHPV��,I�\RX�ZDQW�WR�DYRLG�WKLV�VORZGRZQ��\RX�VKRXOGVFKHGXOH�D�UHJXODU�EDFNJURXQG�MRE�WR�UXQ�DW�QLJKW�

'XULQJ�WKH�GLVWULEXWLRQ��WKH�GDWD�LV�HQWHUHG�LQWR�WUDQVDFWLRQ�68���DFFRUGLQJ�WR�WKHPRGHOLQJ�LQ�WKH�*OREDO�8VHU�0DQJHU��DQG�IURP�WKHUH�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��,QWKH�FOLHQW�V\VWHP��RQO\�WKH�XVHUV�DUH�FUHDWHG�DQG�WKH�DFWLYLW\�JURXSV�DVVLJQHG��2WKHU�GDWDLV�QRW�GLVWULEXWHG��EXW�NHSW�LQ�WKH�FHQWUDO�V\VWHP��7KHUHIRUH��LQ�WUDQVDFWLRQ�6&8/�\RX�FDQH[SHFW�WR�ILQG�RQO\�VRPH�ORJV��QDPHO\�WKRVH�IRU�WKH�GLVWULEXWLRQ�RI�WKH�DFWLYLW\�JURXSDVVLJQPHQW�DQG�IRU�XVHUV�FUHDWHG�RU�GHOHWHG.

7R�UHGXFH�WKH�GDWD�IORZ�WKDW�RFFXUV�GXULQJ�WKH�GLVWULEXWLRQ��RQO\�GDWD�WKDW�KDV�FKDQJHGVLQFH�WKH�ODVW�GLVWULEXWLRQ�LV�GLVWULEXWHG�

6FKHGXOLQJ�%DFNJURXQG�'LVWULEXWLRQ

�� 7R�VFKHGXOH�D�EDFNJURXQG�MRE�IRUWKH�GDWD�GLVWULEXWLRQ��FKRRVH�([WUDV→�6FKHGXOH�GLVWULEXWLRQ�

1

1

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–20

�� &KRRVH� �

�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�

�� ,Q�-RE�FODVV��HQWHU�D�SULRULW\�IRU�WKHMRE�FODVV�

�� ,Q�7DUJHW�VHUYHU��VHOHFW�WKH�FHQWUDOV\VWHP�DV�WKH�WDUJHW�V\VWHP�

�� &KRRVH� �6WHS�WR�SODQ�WKH�$%$3SURJUDP�56865����

�� &KRRVH� �6WDUW�FRQGLWLRQ�WR�VFKHGXOHWKH�WLPH�IRU�\RXU�MRE�

�� &KRRVH� �

,I�\RX�SURFHVV�WKH�DGPLQLVWUDWLRQ�RI�XVHU�GDWD�LQ�WKH�*OREDO�8VHU�0DQDJHU�ZLWK�WKH�IRXU�H\H�SULQFLSOH��\RX�VKRXOG�EH�DZDUH�WKDW�WKHUH�PLJKW�EH�FRQIOLFW��DV�\RX�FDQQRW�FKHFN�WKHGDWD�EHIRUH�WKH�DXWRPDWLF�GLVWULEXWLRQ�

2

34

5

67

8

12–1

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ

&RQWHQWV

Overview ................................................................................................................12–2

Tracing Authorizations with Transaction SU53 .................................................12–2

System Trace Using Transaction ST01 ..............................................................12–4

Analyzing a Written Trace File.............................................................................12–9

Reducing the Scope of Authorization Checks.................................................12–12

����

Chapter 12: Tips and Troubleshooting

Overview

Authorizations Made Easy12–2

2YHUYLHZ

:KHQ�XVHUV�H[HFXWH�D�WUDQVDFWLRQ�RU�UHSRUW�WKDW�LV�QRW�LQFOXGHG�LQ�WKHLU�XVHU�PHQX��WKH\�PD\VHH�WKH�V\VWHP�PHVVDJH�VLPLODU�WR��<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ���7KLV�PHVVDJHPHDQV�WKDW�HLWKHU�WKHLU�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�GRHV�QRW�FRQWDLQ�WKH�UHTXLUHGDXWKRUL]DWLRQ�WR�H[HFXWH�WKH�WUDQVDFWLRQ��RU�WKH�YDOXHV�PDLQWDLQHG�IRU�WKH�SURILOH·VDXWKRUL]DWLRQ�DUH�LQVXIILFLHQW��7KH�PLVVLQJ�DXWKRUL]DWLRQV�FDQ�EH�GHWHUPLQHG�HLWKHU�E\WUDFLQJ�DXWKRUL]DWLRQV�ZLWK�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRWDXWKRUL]HG��RU�ZLWK�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�67���

7UDQVDFWLRQ�68���LV�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*��ZKLFK�LVLQFOXGHG�LQ�WKH�XVHU�UROH�WHPSODWH�6$3B(9(5<B(03/2<((�

,W�LV�DOVR�DFFHVVLEOH�XVLQJ�WKH�PHQX�SDWK�6\VWHP�→�8WLOLWLHV�→�'LVSOD\�$XWKRUL]DWLRQ�&KHFNIURP�WKH�PDLQ�PHQX�

7UDFLQJ�$XWKRUL]DWLRQV�ZLWK�7UDQVDFWLRQ�68��

%\�H[HFXWLQJ�WUDQVDFWLRQ�68�����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HGIURP�WKH�XVHU�PHQX�RU�E\�HQWHULQJ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DW�DQ\�WLPH�DQDO\]HDQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�LQ�\RXU�VHVVLRQ��7UDQVDFWLRQ�68���FDQ�EH�DFFHVVHG�IURP�DQ\�RI\RXU�VHVVLRQV��QRW�MXVW�WKH�RQH�ZKHUH�WKH�HUURU�RFFXUUHG��<RX�FDQQRW��KRZHYHU��DQDO\]H�DQDXWKRUL]DWLRQ�HUURU�IURP�\RXU�RZQ�VHVVLRQ�LQ�DQRWKHU�XVHU·V�ORJRQ�VHVVLRQ�

$W�WKH�WUDQVDFWLRQ�VWDUW��WUDQVDFWLRQ�68���LV�SURWHFWHG�E\�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�<RX�VKRXOG�JLYH�DOO�XVHUV�DFFHVV�ULJKWV�WR�WUDQVDFWLRQ�68����7KXV��LQ�FDVH�RI�D�SUREOHP�\RXU�KHOS�GHVN�FDQ�HDVLO\�DQDO\]H�SUREOHPV�WKDW�XVH�WUDQVDFWLRQ�68����7UDQVDFWLRQ�68���LVLQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*�ZKLFK�LV�LQFOXGHG�LQ�WKH�XVHU�UROHWHPSODWH�6$3B(9(5<B(03/2<((�

,I�\RX�DUH�XVLQJ�VWUXFWXUDO�DXWKRUL]DWLRQV��68���LV�QRW�YHU\�XVHIXO�LI�WKH�WUDQVDFWLRQ�ZKHUH\RX�DUH�UHFHLYLQJ�PHVVDJHV�<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU��LV�DQ�+5�WUDQVDFWLRQ�RU�DWUDQVDFWLRQ�WKDW�FDOOV�+5�REMHFWV��68���RQO\�UHYHDOV�WKH�ODVW�DXWKRUL]DWLRQ�FKHFN�IDLOXUHEDVHG�RQ�WKH�$%$3�FRGH�VWDWHPHQW�$XWKRUL]DWLRQ�&KHFN��+RZHYHU��VWUXFWXUDODXWKRUL]DWLRQV�GR�QRW�DOZD\V�XVH�WKH�$XWKRUL]DWLRQ�&KHFN�VWDWHPHQW�LQ�GHWHUPLQLQJDFFHVVHV��7KHUHIRUH��LI�H[WHQVLYH�VWUXFWXUDO�DXWKRUL]DWLRQV�DUH�XVHG��WKH�6\VWHP�7UDFH�WUDQVDFWLRQ�67����ZLOO�EH�RI�PRUH�EHQHILW�WKDQ�68���

Chapter 12: Tips and Troubleshooting

Tracing Authorizations with Transaction SU53

Release 4.6A/B12–3

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�D�XVHU��ZKR�KDV�WKH�XVHU�UROH�WHPSODWH'$7$B(175<B&/(5.��ZH�FUHDWHG�WKLV�DFWLYLW\�JURXS�HDUOLHU�LQ�WKH�ERRN���WULHV�WR�UXQ�WUDQVDFWLRQ�)%����'RFXPHQW�FKDQJHV��6LQFH�WKLV�XVHU�KDV�QR�DXWKRUL]DWLRQ�IRU�WKLV�WUDQVDFWLRQ��WKH�HUURU�PHVVDJH�<RX�KDYH�QRDXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ�)%���LV�UHFHLYHG��7KH�XVHU�KDV�WR�XVH�68�����'LVSOD\�FKHFN�YDOXHV�RIDXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG�WR�ILQG�RXW�ZKDW�DXWKRUL]DWLRQ�LV�PLVVLQJ�

:H�VWDUW�ZKHUH�WKH�XVHU�KDV�DWWHPSWHGWR�UXQ�WUDQVDFWLRQ�)%���DQG�UHFHLYHV�WKHHUURU�PHVVDJH��<RX�KDYH�QR�DXWKRUL]DWLRQIRU�7UDQVDFWLRQ�)%���

�� 6WDUW�WUDQVDFWLRQ�68���¥�'LVSOD\FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI�QRW�DXWKRUL]HG�IURP�WKH�XVHU�PHQX��RUHQWHU�SU53�LQ�WKH�&RPPDQG�ILHOG�

�� 7KH�V\VWHP�GLVSOD\V�WKH�FKHFNHGDXWKRUL]DWLRQ�REMHFW�WKDW�FDXVHG�WKHHUURU�PHVVDJH�ZLWK�WKHFRUUHVSRQGLQJ�ILHOG�YDOXHV�

�� $OVR�GLVSOD\HG�DUH�

D� 7KH�FXUUHQW�DXWKRUL]DWLRQ�LQ�WKHXVHUV�DVVLJQHG�DXWKRUL]DWLRQSURILOH�

E� 7KH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRUWKLV�DXWKRUL]DWLRQ�

�� 7R�SULQW�WKLV�LQIRUPDWLRQ��FKRRVH9DOXHV�→�3ULQW�

1

2

3a

3b

4

This iswhat ismissing

This iswhat iscurrentlyassigned

Error message

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–4

7R�DGG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�WR�WKH�XVHU·V�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�XVLQJ�WKH3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV��$OVR�UHIHU�WR�WKH6$31HW�²�5���)URQWHQG�QRWH�QXPEHUV�������DQG��������IRUPHUO\�266�QRWHV��

6\VWHP�7UDFH�8VLQJ�7UDQVDFWLRQ�67��

<RX�FDQ�XVH�WKH�V\VWHP�WUDFH�WR�UHFRUG�DXWKRUL]DWLRQ�FKHFNV�LQ�\RXU�RZQ�VHVVLRQ�DQG�RWKHUXVHUV·�VHVVLRQV��6WDUW�WUDQVDFWLRQ�67����V\VWHP�WUDFH��DQG�UXQ�WKH�WUDQVDFWLRQ�WKH�XVHU�LVKDYLQJ�DXWKRUL]DWLRQ�SUREOHPV�ZLWK��$V�VRRQ�DV�\RX�JHW�VWXFN��VWRS�\RXU�WUDFH��:H�XVH�WKHWUDFH�IRU�DXWKRUL]DWLRQ�FKHFNV�WKRXJK�LW�LV�FDSDEOH�RI�WUDFLQJ�PXFK�PRUH��(YHU\WKLQJ�\RXKDYH�GRQH�LQ�WKH�5���6\VWHP�WKDW�UHTXLUHV�DXWKRULW\�FKHFNV�LV�UHFRUGHG�LQ�WKH�WUDFH�ZLWK�WKHREMHFW·V�ILHOGV�DQG�WKH�WHVWHG�YDOXHV�

8VLQJ�67����V\VWHP�WUDFH��VHYHUHO\�DIIHFWV�V\VWHP�SHUIRUPDQFH�

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WKH�DGPLQLVWUDWRU�FDQ�FUHDWH�D�V\VWHP�WUDFHRI�DQRWKHU�XVHU·V�VHVVLRQ��8VHU�)7$<(+��ZKR�KDV�EHHQ�DVVLJQHG�WKH�XVHU�UROH'$7$B(175<B&/(5.��LV�WU\LQJ�WR�UXQ�D�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�DXWKRUL]DWLRQDQG�RQH�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�QR�DXWKRUL]DWLRQ��$W�WKH�VDPH�WLPH��WKHDGPLQLVWUDWRU�XVHV�WUDQVDFWLRQ�67���WR�FUHDWH�D�V\VWHP�WUDFH�IRU�WKH�DWWHPSWV�RI�XVHU)7$<(+�

7R�VHW�XS�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�

�� 6WDUW�WKH�WUDQVDFWLRQ�67��¥�6\VWHP�7UDFH�

1

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Release 4.6A/B12–5

&KHFN�WKH�7UDFH�VWDWXV�EHIRUH�XVLQJ�WKH�V\VWHP�WUDFH��,I�WKH�WUDFH�LV�DFWLYH��GR�QRW�LQWHUIHUH�EHFDXVH�WKHUH�LV�RQO\�RQH�WUDFH�V\VWHP�IRU�HDFK�5���LQVWDQFH�

�� <RX�FDQ�VHH�LI�DQRWKHU�XVHU�KDV�XVHGWKH�V\VWHP�WUDFH�DQG�ZKHQ�LW�KDVEHHQ�DFWLYDWHG�

�� 0DQ\�GLIIHUHQW�7UDFH�FRPSRQHQWVH[LVW�DQG�HDFK�FDQ�EH�VZLWFKHG�RQZLWK�LWV�RZQ�IODJ��DQG�ILOWHU��

�� 6RPH�VHOHFWLRQV�DUH�GLUHFWO\�YLVLEOHLQ�WKH�FKHFNER[HV��(QVXUH�WKDW�RQO\WKH�$XWKRUL]DWLRQ�FKHFN�FKHFNER[�LVVHOHFWHG�

�� 2WKHU�WUDFH�FRPSRQHQW�VHOHFWLRQV�DUHJURXSHG�DQG�PLJKW�FRQWDLQ�RQO\SDUWLDO�VHOHFWLRQV��&KHFN�DOO� LFRQVWR�HQVXUH�WKDW�QRWKLQJ�LV�VHOHFWHG�

�� 7R�UHVWULFW�WKH�WUDFH�WR�D�VSHFLILF�XVHURU�VHVVLRQ��FKRRVH�(GLW�→�)LOWHU�→6KDUHG�

7KH�WUDFH�ILOH·V�QDPH�DQG�VWRUDJH�ORFDWLRQ�LV�VKRZQ�LQ�WKH�ILHOG�&XUUHQW�WUDFH�ILOH��7KH�WUDFHLV�DGGHG�WR�WKH�H[LVWLQJ�ILOH�XQWLO�WKH�PD[LPXP�ILOH�VL]H�LV�UHDFKHG��7KHQ�D�QHZ�ILOH�QHHGVWR�EH�FUHDWHG��VHH�ODWHU�LQ�WKLV�VHFWLRQ��

�� (QWHU�WKH�QDPH�RI�WKH�XVHU�IRU�ZKLFK\RX�ZRXOG�OLNH�WR�UXQ�WKH�WUDFH�,Q�RXU�H[DPSOH�ZH�ZDQW�WR�WUDFHXVHU�)7$<(+ªV�WUDQVDFWLRQV�

�� &KRRVH�%DFN�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�ILOWHU�WKHGDWD�IRU�HLWKHU�D�FHUWDLQ�WUDQVDFWLRQ�RUSURJUDP�

�� 2Q�WKH�6\VWHP�7UDFH�VFUHHQ��FKRRVH(GLW�→�:ULWH�RSWLRQV�

2

3

4

5

6

tech

Tip

7

8

10

11

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–6

��� 7R�VDYH�\RXU�WUDFH�RQ�WKH�KDUG�GULYH�VHOHFW�7UDFH��:ULWH�WR�GLVN�

��� &KRRVH�%DFN�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�HLWKHU�GHILQH�D�WLPH�IUDPH�IRU�WKH�WUDFH�WR�UXQ�RU�WR�XVH�WKHEXIIHU�

��� 7R�VDYH�\RXU�VHWWLQJV�IRU�WKH�QH[WWLPH�\RX�XVH�WKH�WUDFH��FKRRVH�(GLW→�6HWWLQJV�→�:ULWH�WR�GDWDEDVH�

��� <RXU�GDWD�LV�VDYHG�ZLWK�WKHIROORZLQJ�VHWWLQJV��&OLHQW��XVHUQDPH�GHIDXOW�

7KH�V\VWHP�LV�QRZ�UHDG\�WR�EHJLQWKH�WUDFH��$W�WKLV�WLPH��ZHUHFRPPHQG�WKDW�\RX�KDYH�WKH�XVHU·VVHVVLRQ�\RX�ZRXOG�OLNH�WR�WUDFH�UHDG\�RU�RSHQ�DQRWKHU�VHVVLRQ�WR�WUDFH\RXU�RZQ�WUDQVDFWLRQ��

��� &KRRVH�7UDFH�RQ�

7R�XVH�\RXU�LQGLYLGXDO�VHWWLQJV�WKH�QH[W�WLPH�\RX�VWDUW�WKH�WUDFH��FKRRVH�(GLW�→�6HWWLQJV→�5HDG�IURP�GDWDEDVH��$OO�WKH�FKHFNPDUNV�\RX�VHW�ZLOO�DSSHDU�LQ�WKH�FRUUHVSRQGLQJFKHFNER[HV�

��� &KRRVH�<HV�

)URP�QRZ�RQ�HYHU\�DFWLRQ�WKDW�XVHU)7$<(+�SHUIRUPV�LV�UHFRUGHG�LQ�WKHWUDFH�

12

13

14

15

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Release 4.6A/B12–7

��� &KDQJH�WR�WKH�XVHU·V�VHVVLRQ�\RXZDQW�WR�WUDFH�

7KH�XVHU�VKRXOG�QRZ�UXQ�WKHWUDQVDFWLRQV�\RX�ZRXOG�OLNH�WRLQYHVWLJDWH��,Q�RXU�H[DPSOH��ZH�ILUVWVWDUW�WUDQVDFWLRQ�)%����WKHQ�)%���

��� %HJLQ�WKH�WUDQVDFWLRQ��IRU�H[DPSOH�)%���¥�'LVSOD\�GRFXPHQWV��

7KH�WUDQVDFWLRQ�VWDUWV�EHFDXVH�XVHU)7$<(+�LV�DXWKRUL]HG�WR�SHUIRUP�LW�

��� %HJLQ�DQRWKHU�WUDQVDFWLRQ��IRUH[DPSOH��FB04��

6LQFH�XVHU�)7$<(+�LV�QRW�DXWKRUL]HGWR�SHUIRUP�)%����KH�UHFHLYHG�WKHHUURU�PHVVDJH��<RX�DUH�QRW�DXWKRUL]HGWR�XVH�WUDQVDFWLRQ�)%���

7KH�V\VWHP�DOVR�MXPSV�EDFN�WR�WKHXVHU�PHQX�

17

18

Error message

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–8

��� $IWHU�FRPSOHWLQJ�\RXU�V\VWHP�WUDFH�VZLWFK�EDFN�WR�WKH�RWKHU�VHVVLRQ��WKHWUDFH�VHVVLRQ�

��� &KRRVH� �7UDFH�RII�

��� &KRRVH�<HV�WR�VWRS�WUDFLQJ�

7KH�WUDFH�LV�QRZ�UHDG\�WR�DQDO\]H�6HH�WKH�QH[W�VHFWLRQ�RQ�KRZ�WRDQDO\]H�D�WUDFH�

20

21

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Release 4.6A/B12–9

$QDO\]LQJ�D�:ULWWHQ�7UDFH�)LOH

�� 7R�GLVSOD\�WKH�WUDFH�UHVXOWV��IURP�WKH6\VWHP�7UDFH�ZLQGRZ��FKRRVH�)LOH�OLVW�

�� 6HOHFW�\RXU�WUDFH�

,I�\RX�VHH�PRUH�WKDQ�RQH�WUDFH��VHOHFW�WKHFRUUHFW�RQH��7R�GHWHUPLQH�WKH�WUDFHQDPH��VHH�WKH�7HFK7DON�RQ�SDJH���²���

�� &KRRVH� �$QDO\]H�

%H�DZDUH�WKDW�WKH�WUDFH�ILOH�FDQ�EH�H[WUHPHO\�ODUJH��%H�SDWLHQW�EHFDXVH�LW�PD\�WDNH�VRPHWLPH�WR�GLVSOD\�LW�

2

3

1

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Authorizations Made Easy12–10

�� 6HOHFW�DOO�WKH�RSWLRQV�\RX�ZDQW�WRFRQVLGHU�LQ�\RXU�DQDO\VLV��IRUH[DPSOH��7UDFH�IRU�DXWKRUL]DWLRQFKHFNV��

,I�HYHU\WKLQJ�LV�VHOHFWHG��LW�PLJKW�EHHDVLHU�WR�FKRRVH� �WR�GHVHOHFW�DOO�ILUVWDQG�WKHQ�UHVHOHFW�RQH�RU�PRUHFKHFNER[HV�

�� 8QGHU�5HVWULFWLRQV��HQWHU�WKH�GHVLUHGXVHU�

�� &KRRVH� $QDO\]H�

�� 7KH�ILUVW�SDJH�RI�WKH�WUDFH�ILOHDSSHDUV��%\�GHIDXOW��:LWK�DXWKRULW\FKHFN�VKRXOG�EH�VHOHFWHG�

�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHWUDQVDFWLRQV�WKDW�ZHUH�XVHG�E\�WKHXVHU�

7

4

5

6

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Release 4.6A/B12–11

�� 6LQFH�WKH�WUDFH�OLVWV�FDQ�EH�YHU\ODUJH��WKH�RXWSXW�LV�FRPSUHVVHG��7KH1XPEHU�RI�UHFRUGV�SULQWHG�LV�WKHQXPEHU�RI�OLQHV�FXUUHQWO\�GLVSOD\HG�

��� 7KHVH�OLQHV�DSSHDU�LQ�WKH�ER[�HV�DERYH�WKH�1XPEHU�RI�UHFRUGV�SULQWHG�,Q�RXU�H[DPSOH��DOO�WKHDXWKRUL]DWLRQV�FKHFNHG�ZLWK�WKHUHTXLUHG�ILHOG�YDOXHV�KDYH�DSSHDUHG�7KLV�LV�WKH�LQIRUPDWLRQ�\RX�DUHORRNLQJ�IRU�

��� 7KH�UHWXUQ�FRGH�IRU�HDFK�RI�WKHVHDXWKRUL]DWLRQ�FKHFNV�DOVR�DSSHDUV�< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�LW�LV�RND\�

< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�WKH�FKHFN�KDV�IDLOHG�

��� 7KH�WH[W�VKRZV�WKH�REMHFW�WKDW�ZDVFKHFNHG�

��� 7KH�ODVW�LWHP�RQ�WKH�OLQH�LV�WKHWUDQVDFWLRQ�FRGH�WKDW�ZDV�FKHFNHG�

,I�WKH�UHWXUQ�FRGH�LV�

< (TXDO�WR����WKH�DXWKRUL]DWLRQ�FKHFN�LV�RND\< *UHDWHU�WKDQ����WKH�DXWKRUL]DWLRQ�FKHFN�LV�QRW�RND\

9

10

11

10

11 12 13

12 13

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–12

5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV

2YHUYLHZ

7KH�EDVLV�IRU�DOO�VZLWFKHV�LV�WKH�DFWLYDWLRQ�RI�WKH�3*��<RX�FDQ�DOVR�VZLWFK�WKH�5)&�6B7&2'(��DQG�JOREDO�GHDFWLYDWLRQ�VZLWFKHV��%DVHG�RQ�WKHVH��\RX�FDQ�GHDFWLYDWHDXWKRUL]DWLRQ�FKHFNV�XVLQJ�68����,QVLGH�WKH�DFWLYLW\�JURXSV�\RX�FDQ�LQDFWLYDWH�DXWKRUL]DWLRQREMHFWV�DQG�VHW�WKH�DFWLYLW\�JURXS�DQG�XVHU�DVVLJQPHQW�YDOLGLW\�SHULRG�

Profile Generator

RFC, S_TCODE and global deactivation switches

SU24 switches

AG and AG-User assignments

,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�GHVFULEH�WKH�VLQJOH�OD\HUV�LQ�PRUH�GHWDLOV�

(QDEOLQJ�WKH�3URILOH�*HQHUDWRU

%HIRUH�FRQWLQXLQJ�ZLWK�WKLV�VHFWLRQ��\RX�QHHG�WR�KDYH�DW�OHDVW�VHW�DQG�DFWLYDWHG�WKH�V\VWHPSDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<��GHIDXOW�YDOXH���DQG�UXQ�68���ZKLFK�FRSLHV�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�DQG�ILHOG�YDOXHV�IURP�WDEOH�862%7�DQG�862%;�LQWR�WKHFXVWRPHU�WDEOHV�

(QDEOLQJ�'LVDEOLQJ�2WKHU�6\VWHP�ZLGH�&KHFNV

(QDEOLQJ�DXWK�WFRGHVBQRWBFKHFNHG

5���LV�QRW�IXOO\�D�WUDQVDFWLRQ�EDVHG�DXWKRUL]DWLRQ�V\VWHP��,W�LV�DOVR�DQ�REMHFW�RULHQWHGDXWKRUL]DWLRQ�V\VWHP��$�EXVLQHVV�SURFHVV�LQ�5���FDQ�EH�DFFHVVHG�E\�VHYHUDO�PHFKDQLVPV��IRUH[DPSOH��WUDQVDFWLRQ�FRGH��%$3,��HWF����EXW�WUDQVDFWLRQV�DUH�PRVW�FRPPRQ��5���SURWHFWVSDUWLFXODU�REMHFWV�RU�SLHFHV�RI�WKH�EXVLQHVV�SURFHVV�ZLWKLQ�WKH�WUDQVDFWLRQ��5���GHILQHV�ZKLFKREMHFWV�DUH�´VHFXUDEOHµ�LQ�WKH�VWDQGDUG�V\VWHP��DQG�RQH�EXVLQHVV�SURFHVV�RU�WUDQVDFWLRQ�FRGHPD\�UHTXLUH�DFFHVV�WR�D�YDU\LQJ�QXPEHU�RI�SUHGHILQHG�REMHFWV��+RZHYHU��5���DOVR�XVHV�WKHWUDQVDFWLRQ�FRGH�DV�WKH�´ILUVW�OLQH�RI�GHIHQVHµ�WR�SUHYHQW�VRPHRQH�IURP�DFFHVVLQJ�SDUWV�RI�WKHV\VWHP��,Q�WKH�HYHQW�WKDW�D�XVHU�HQWHUV�D�WUDQVDFWLRQ�FRGH�WR�SHUIRUP�D�WDVN��WKH�V\VWHPFKHFNV�WKH�XVHU·V�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�WR�HQVXUH�WKH\�KDYH�WKH�FRUUHFW�6B7&2'(WUDQVDFWLRQ�FRGH�EHIRUH�FRQWLQXLQJ��,Q�FHUWDLQ�FDVHV��\RX�PD\�ZLVK�WR�HOLPLQDWH�WKLV�´ILUVWOLQH�RI�GHIHQVHµ�LI�\RX�ILQG�LW�FXPEHUVRPH�WR�SURWHFW�HDFK�DQG�HYHU\�WUDQVDFWLRQ�FRGH�LQ�WKH

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–13

V\VWHP��$V�VXFK��\RX�FDQ�GLVDEOH�WKH�FKHFN�IRU�6B7&2'(�XVLQJ�WKH�V\VWHP�ZLGH�SURILOHSDUDPHWHU�DXWK�WFRGHVBQRWBFKHFNHG��,Q�WKH�V\VWHP��6B7&2'(�LV�DFWLYH�E\�GHIDXOW�

(QDEOLQJ�DXWK�UIFBDXWKRULW\BFKHFN

6$3�KDV�YDVWO\�HQKDQFHG�LWV�XVH�RI�WKH�5)&��UHPRWH�IXQFWLRQ�FDOO��IXQFWLRQDOLW\�LQ�UHFHQWUHOHDVHV�RI�WKH�5���6\VWHP��5)&V�DUH�XVHG�WKURXJKRXW�WKH�V\VWHP�VR�WKDW�RQH�SRUWLRQ�RI�WKH5���6\VWHP�FDQ�´FRPPXQLFDWHµ�ZLWK�DQRWKHU�SDUW�RI�5����IRU�H[DPSOH��FUHDWLQJ�D�VDOHVRUGHU�YLD�ZRUNIORZ�PD\�LQYRNH�DQ�5)&�WR�FRPPXQLFDWH�WKH�LQIRUPDWLRQ�WKDW�LV�EHLQJSDVVHG�LQWR�WKH�VDOHV�RUGHU�FUHDWH�IXQFWLRQ�LQ�ZRUNIORZ�SURFHVVLQJ���5)&·V�DUH�DOVR�FULWLFDO�LQSHUPLWWLQJ�V\VWHPV�DQG�DSSOLFDWLRQV�H[WHUQDO�WR�5����IRU�H[DPSOH��D�ZHE�SDJH��WRFRPPXQLFDWH�ZLWK�5���ZLWK�%$3,V��$V�%$3,V�XWLOL]H�5)&�IXQFWLRQDOLW\��DXWKRUL]DWLRQFKHFNV�DUH�SHUIRUPHG�EDVHG�RQ�WKH�%$3,�XVHG��2QH�RI�5��·V�FRUH�DSSURDFKHV�WR�VHFXULQJ�WKH5)&�IXQFWLRQDOLW\�LV�WR�LQWURGXFH�DQRWKHU�QHZ�DXWKRUL]DWLRQ�REMHFW�FDOOHG�6B5)&�ZKLFKJLYHV�SHRSOH�DFFHVV�WR�SDUWLFXODU�JURXSV�RI�5)&V��,Q�SDUWLFXODU��HYHU\�5)&�EHORQJV�WR�DIXQFWLRQ�JURXS��0DQ\�5)&V�FDQ�EHORQJ�WR�RQH�IXQFWLRQ�JURXS��IRU�H[DPSOH��WKH�IXQFWLRQJURXS�IRU�00�3XUFKDVH�2UGHU�3URFHVVLQJ���7KH�DXWKRUL]DWLRQ�REMHFW�6B5)&�FDQ�EH�UHVWULFWHGWR�JLYH�XVHUV�DFFHVV�WR�SDUWLFXODU�IXQFWLRQ�JURXSV��+RZHYHU��WKH�WUHPHQGRXV�DPRXQW�RI5)&V�LQ�����FRPSOLFDWHV�ZKLFK�IXQFWLRQ�JURXSV�\RX�VKRXOG�JLYH�SHRSOH�DFFHVV�WR��7KHUHIRUH�5���SURYLGHV�D�PHFKDQLVP�WR�GLVDEOH�WKH�FKHFN�DJDLQVW�WKH�6B5)&�DXWKRUL]DWLRQ�REMHFW�DW�DV\VWHP�ZLGH�OHYHO��7KH�V\VWHP�ZLGH�SURILOH�SDUDPHWHU�DXWK�UIFBDXWKRULW\BFKHFN�FDQ�EHFKDQJHG�IURP�LWV�EODQN�GHIDXOW�WR�RQH�RI�WKH�IROORZLQJ�< �� �1R�DXWKRUL]DWLRQ�FKHFN< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�VDPH�XVHU��QR�FKHFN�IRU�VDPH�XVHU�FRQWH[W

DQG�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��65)&�)8*5�DOVR�FKHFNHG�

*OREDOO\�'HDFWLYDWLQJ�RU�$FWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV

<RX�FDQ�DOVR�JOREDOO\�GHDFWLYDWH�RU�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�ZLWK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��7KH�V\VWHP�GRHV�QRW�H[HFXWH�DQ\�DXWKRUL]DWLRQ�FKHFNV�IRUGHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��<RX�KDYH�VHYHUDO�RSWLRQV�WR�UHDFK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��<RX�FDQ�XVH�WKH�,0*��VHH�VWHS�����WUDQVDFWLRQ�SU25��VHH�VWHS���RU�XVH�WUDQVDFWLRQ�auth_switch_objects�GLUHFWO\�

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–14

�� &KRRVH� �QH[W�WR�6ZLWFK�RIIDXWKRUL]DWLRQ�FKHFNV�JOREDOO\��RSWLRQDO�DQG�FRQWLQXH�ZLWK�VWHS����RU�HQWHUsu25�DQG�FRQWLQXH�ZLWK�VWHS����

�� ,Q�WUDQVDFWLRQ�68����FKRRVH����'HDFWLYDWH�DXWKRUL]DWLRQ�REMHFW

JOREDOO\�

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–15

�� 5HDG�WKH�LQIRUPDWLRQ�FDUHIXOO\�DQGFKRRVH� �

�� 'HDFWLYDWH�DQ�DXWKRUL]DWLRQ�REMHFWE\�GHVHOHFWLQJ�WKH�FKHFNER[�QH[W�WRLW��7KH�GHVHOHFWHG�OLQH�LV�KLJKOLJKWHGLQ�UHG�

�� &KRRVH� �

�� 7R�DFWLYDWH�\RXU�GDWD��FKRRVH� �

�� )RU�D�GHWDLOHG�H[SODQDWLRQ�DERXW�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH� �QH[WWR�WKH�DXWKRUL]DWLRQ�REMHFW�

&KRRVH� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RII�7R�YLHZ�WKH�FRORU�OHJHQG��FKRRVH� �

6 Tip

5

3

4 7

Tip

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–16

�� <RX�UHFHLYH�GHWDLOHG�LQIRUPDWLRQDERXW�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�

�� &ORVH�WKH�ZLQGRZ�WR�UHWXUQ�

:KHQ�\RX�VDYH�DQG�DFWLYDWH�\RXU�GDWD��WKH�V\VWHP�DOVR�FKHFNV�WKH�DXWKRUL]DWLRQ�REMHFW6B86(5B2%-�

7KH�YDOXHV�IRU�WKH�V\VWHP�SDUDPHWHU�DXWK�REMHFWBGLVDEOLQJBDFWLYH�FDQ�EH�DQ�;�RU�EODQN��7KH;�LQGLFDWHV�WKDW�WKH�SDUDPHWHU�LV�DFWLYH�DQG�WKH�EODQN�LQGLFDWHV�WKDW�LW�LV�QRW��,I�LW�LV�QRWDFWLYH��ZLWK�68���JRW�VZLWFKHG�RII��\RXU�FKDQJHV�ZLOO�QRW�DIIHFW�DQ\WKLQJ��+RZHYHU��WKHGHIDXOW�YDOXH�LV�VHW�WR�DFWLYH�

8

9

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–17

��� $XWKRUL]DWLRQ�REMHFWV�EHJLQQLQJZLWK�6B�RU�3B�FDQQRW�EH�VZLWFKHG�RII�

,I�\RX�WU\�WR�VZLWFK�WKRVH�REMHFWV�RIIDQG�VDYH�WKHP��\RX�ZLOO�UHFHLYH�DZDUQLQJ�PHVVDJH�

��� 7KH�V\VWHP�LJQRUHV�WKDW�\RX�KDYHVZLWFKHG�RII�WKRVH�DXWKRUL]DWLRQREMHFWV�

��� &KRRVH� �

<RX�FDQQRW�JOREDOO\�GHDFWLYDWH�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK�6B��%DVLV��RU�3B�+5��LQ�WUDQVDFWLRQ�$87+B6:,7&+B2%-(&76�

1R�DXWKRUL]DWLRQ�GDWD�LV�LQVHUWHG�LQ�WKH�3*�IRU�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��,Q�DUHOHDVH�XSJUDGH��WKH�V\VWHP�GRHV�QRW�GLVSOD\�WKH�WUDQVDFWLRQV�ZKHUH�DXWKRUL]DWLRQ�GDWDZLOO�EH�UHSURFHVVHG�LI�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�REMHFW�LV�JOREDOO\�GHDFWLYDWHG�

:KHQ�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��\RX�PD\�KDYH�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�IRU�PDQ\�DFWLYLW\�JURXSV�

,I�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��WKHVH�REMHFWV�DUH�QRWFRQWDLQHG�LQ�DQ\�DFWLYLW\�JURXSV��,Q�WKLV�FDVH��LQ�WKH�WUDQVDFWLRQ�3)&*�RQ�WKH

10

12

11

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–18

$XWKRUL]DWLRQV�WDE��FKRRVH� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�WR�JHQHUDWH�SURILOHV�DQG�WKHRSWLRQ�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�WKH�QHZ�GDWD��0DLQWDLQ�DQ\�PLVVLQJ�DXWKRUL]DWLRQYDOXHV�DQG�UHJHQHUDWH�WKH�SURILOH�

3DUDPHWHU�7UDQVDFWLRQV

7KH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ�WR�RWKHU�WUDQVDFWLRQV��7KHVH�WUDQVDFWLRQV�ZRUNZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��ZKLFK�LV�UHVWULFWHG�E\�WKH�IDFW�WKDW�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�

<RX�FDQQRW�H[FOXGH�DXWKRUL]DWLRQ�REMHFWV�IURP�GLUHFW�XVH�LQ�SDUDPHWHU�WUDQVDFWLRQV��EXW�RQO\ZLWK�WKH�FRUUHVSRQGLQJ�FRUH�WUDQVDFWLRQ�

([DPSOH�

3DUDPHWHU�WUDQVDFWLRQ� �)��9��0DQDJHPHQW�RI�'RFXPHQW�$UFKLYHV�

&RUH�WUDQVDFWLRQ� �6$5$��$UFKLYH�0DQDJHPHQW�

7R�VHW�WKH�FKHFN�LQGLFDWRU�RI�WUDQVDFWLRQ�)��9�WR�1��QR�FKHFN���\RX�QHHG�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�RI�WKH�FRUH�WUDQVDFWLRQ�6$5$��<RX�FDQ�ILQG�WKH�QDPH�RI�WKLV�WUDQVDFWLRQ�LQ�WKHULJKW�KDQG�FROXPQ�7&RGH�RYHUYLHZ�LQ�WUDQVDFWLRQ�68����,I�\RX�GRXEOH�FOLFN�RQ�WKHSDUDPHWHU�WUDQVDFWLRQ�FRGH�LQ�ILHOG�7&RGH��WKH�V\VWHP�EUDQFKHV�GLUHFWO\�LQWR�WKH�FKHFNLQGLFDWRU�PDLQWHQDQFH�RI�WKH�FRUH�WUDQVDFWLRQ�

,I�WKH�DXWKRUL]DWLRQ�REMHFW�IRU�SDUDPHWHU�WUDQVDFWLRQ�)��9�LV�VHW�WR�&��FKHFN���EXW�XQGHU�WKHFRUH�WUDQVDFWLRQ�LW�LV�VHW�WR�&0��FKHFN�PDLQWDLQ���WKH�ILHOG�YDOXHV�IRU�6$5$�ZLOO�EHVXJJHVWHG�DV�GHIDXOWV�LQ�WKH�3*��,I�WKH�DXWKRUL]DWLRQ�REMHFW�LV�DOVR�VHW�WR�&0�LQ�)��9��WKHILHOG�YDOXHV�PDLQWDLQHG�IRU�)��9�ZLOO�EH�UHFRPPHQGHG�DV�GHIDXOWV�LQ�WKH�3*��DQG�WKH�HQWULHVIRU�6$5$�ZLOO�EH�RYHUZULWWHQ��<RX�FDQ�PDLQWDLQ�RU�RYHUZULWH�WKH�ILHOG�YDOXHV�RI�WKH�FRUHWUDQVDFWLRQ�IRU�SDUDPHWHU�WUDQVDFWLRQV�LQ�68���

'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�8VLQJ�68��

2SWLRQDO��1RUPDOO\�\RX�GR�QRW�KDYH�WR�PDNH�DQ\�FKDQJHV�LQ�WUDQVDFWLRQ�68���

+RZHYHU��LI�\RX�GR�PDNH�FKDQJHV�LQ�68����WKH�FKDQJHV�PXVW�EH�PDGH�LQ�WKH�'(9�V\VWHPDQG�WUDQVSRUWHG�WR�RWKHU�V\VWHPV��1HYHU�PDNH�FKDQJHV�LQ�DQ\�RWKHU�V\VWHP�

,Q�WKH�3*��\RX�KDYH�WKH�RSWLRQ�WR�GHDFWLYDWH�DQG�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�DJDLQVWGLIIHUHQW�DXWKRUL]DWLRQ�REMHFWV�

:KHQHYHU�\RX�SHUIRUP�5���WUDQVDFWLRQV��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG�WKDW�DULVHWKURXJK�ZRUN�DUHDV�FDOOHG�LQ�WKH�EDFNJURXQG��)RU�WKH�DXWKRUL]DWLRQ�FKHFNV�WR�EH�VXFFHVVIXO�WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��)RU�WKLV�UHDVRQ��PRVW�XVHUV�UHFHLYH�PRUHDXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHG�PDLQWHQDQFH�ORDG��%XW�WKH�FRUHWUDQVDFWLRQ�LV�DOZD\V�SURWHFWHG�E\�REMHFW�6B7&2'(��DQG�DXWKRUL]DWLRQ�FKHFNV�WKDW�EHORQJ�WR

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–19

SXUH�EDFNJURXQG�IXQFWLRQV�DUH�GHDFWLYDWHG���7KLV�KDV�QRWKLQJ�WR�GR�ZLWK�EDFNJURXQGSURFHVVLQJ��

,Q�5����PDQ\�DXWKRUL]DWLRQ�REMHFWV�JR�XQXVHG�E\�PRVW�FXVWRPHUV��<RX�FDQ�GHDFWLYDWH�WKHDXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKH�REMHFWV�XVLQJ�WUDQVDFWLRQ�68�����0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV��7KLV�GHDFWLYDWLRQ�UHVXOWV�LQ�FOHDU�DXWKRUL]DWLRQ�SURILOHV�DQG�EHWWHUSHUIRUPDQFH�

<RX�FDQ�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ\�RI�WKH�IROORZLQJ�UHDVRQV�< 1RW�DOO�DXWKRUL]DWLRQ�REMHFWV�DUH�XVHG��IRU�LQVWDQFH��)B/)$�B%(.�< 0DQ\�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG�ZLWK�DQ�DVWHULVN�� �< $XWKRUL]DWLRQ�SURILOHV�DUH�WRR�ODUJH< (DFK�WUDQVDFWLRQ�LV�FKHFNHG�E\�6B7&2'(< 1HHGOHVV�DXWKRUL]DWLRQ�FKHFNV�UHGXFH�WKH�WUDQVDFWLRQ�SHUIRUPDQFH

7KH�IROORZLQJ�H[DPSOHV�LOOXVWUDWH�ZKHQ�WR�XVH�68���< ,I�D�ZDUHKRXVH�ZRUNHU�UHPRYHV�JRRGV�IURP�WKH�ZDUHKRXVH��DQG�WKH�UHPDLQLQJ�VWRFN

IDOOV�VKRUW�RI�D�FULWLFDO�OLPLW��WKH�V\VWHP�WULJJHUV�HLWKHU�D�SXUFKDVLQJ�RUGHU��D�SURGXFWLRQRUGHU��RU�ERWK��7KHVH�RSHUDWLRQV�DUH�FDUULHG�RXW�EHFDXVH�RI�WKH�V\VWHP�VHWWLQJV�DQGWKHUHIRUH�UHTXLUH�QR�IXUWKHU�DFWLRQV�E\�ZDUHKRXVH�ZRUNHUV��$FFRUGLQJO\��WKHVH�ZRUNHUVVKRXOG�QRW�KDYH�DXWKRUL]DWLRQV�IRU�SXUFKDVH�RU�SURGXFWLRQ�RUGHUV��VR�WKH�FKHFN�DJDLQVWWKLV�REMHFW�VKRXOG�EH�GHDFWLYDWHG�

< $XWKRUL]DWLRQ�REMHFW�)B/)$�B%(.��9HQGRU��$FFRXQW�DXWKRUL]DWLRQ��SURWHFWV�WKH�YHQGRUPDVWHU�UHFRUGV�DW�DFFRXQW�OHYHO��7KDW�LV��ZLWK�WKLV�REMHFW��LW�LV�SRVVLEOH�WR�GLYLGH�WKHYHQGRUV�LQWR�JURXSV�DQG�RQO\�DVVLJQ�WKH�DFFRXQWLQJ�FOHUN�WKH�PDLQWHQDQFH�DXWKRUL]DWLRQIRU�YHQGRUV�IURP�D�FHUWDLQ�JURXS��,I�\RX�GR�QRW�ZDQW�WR�PDNH�DQ\�DXWKRUL]DWLRQV�DW�WKLVOHYHO�DQG�DOORZ�DOO�DFFRXQWLQJ�FOHUNV�WR�PDLQWDLQ�DOO�YHQGRUV��LW�LV�EHVW�WR�GHDFWLYDWH�WKLVREMHFW�

2QO\�LI�\RX�KDYH�VHW�WKH�FKHFN�LQGLFDWRU�WR�&0��&KHFN�0DLQWDLQ���ZLOO�WKH�DXWKRUL]DWLRQDQG�SUHGHILQHG�DXWKRUL]DWLRQ�ILHOG�YDOXHV�EH�GLVSOD\HG�IRU�FKDQJLQJ�

5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV

$XWKRUL]DWLRQ�FKHFNV�DUH�FDUULHG�RXW�ZKHUHYHU�WKH\�DUH�VSHFLILFDOO\�ZULWWHQ�LQWR�WKH�VRXUFHFRGH�RI�D�WUDQVDFWLRQ��+RZHYHU��ZLWK�WUDQVDFWLRQ�68���\RX�FDQ�VHW�FKHFN�LQGLFDWRUV�WRH[FOXGH�FHUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRUL]DWLRQ�FKHFNV��<RX�FDQ�H[FOXGH�SDUWLFXODUDXWKRUL]DWLRQ�FKHFNV�HLWKHU�LQ�VSHFLILF�WUDQVDFWLRQV�RU�5���6\VWHP�ZLGH��ZLWKRXW�FKDQJLQJWKH�SURJUDP�FRGH�

%HIRUH�WKH�DXWKRUL]DWLRQ�SURILOH�LV�DXWRPDWLFDOO\�JHQHUDWHG��XVH�WKH�FKHFN�LQGLFDWRUV�WRFRQWURO�ZKLFK�REMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�GLVSOD\�

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–20

0DLQWDLQLQJ�&KHFN�,QGLFDWRUV�IRU�7UDQVDFWLRQ�&RGHV

7R�DFFHVV�WKH�WUDQVDFWLRQ�IRU�PDLQWDLQLQJ�FKHFN�LQGLFDWRUV��HQWHU�WUDQVDFWLRQ�SU24�LQ�WKH�&RPPDQG�ILHOG��RUQDYLJDWH�XVLQJ�WKH�,0*��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�\RX�KRZ�WR�JHW�WR�0DLQWDLQ�FKHFN�LQGLFDWRUWUDQVDFWLRQ�XVLQJ�WKH�,0*��WUDQVDFWLRQ�FRGH�SPRO���,I�\RX�HQWHU�SU24�GLUHFWO\��VWDUW�ZLWK�VWHS���

�� ,Q�WKH�,0*�IROORZ�WKH�PHQX�SDWK%DVLV�&RPSRQHQWV�→�6\VWHP$GPLQLVWUDWLRQ�→�8VHUV�DQG$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ�WKH3URILOH�*HQHUDWRU�→�:RUN�RQ�6$3&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV�DQGFKRRVH� �QH[W�WR�WKDW�OLQH�

�� 6HOHFW�&KDQJH�WHVW�VWDWXV��WKLVWUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&KDQJH�FKHFN�LQGLFDWRU��

�� &KRRVH� �&KRRVH�

1

2

3

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–21

�� 6HOHFW�0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV�

�� (QWHU�HLWKHU�D�VLQJOH�WUDQVDFWLRQ�FRGH�IRU�H[DPSOH�MK01��RU�D�UDQJH�RIFRGHV�IRU�ZKLFK�\RX�ZDQW�WR�OLVW�WKHFKHFN�LQGLFDWRUV�

�� &KRRVH� �WR�H[HFXWH�

�� 6HOHFW�WKH�DSSURSULDWH�WUDQVDFWLRQ��LQRXU�H[DPSOH��RQO\�RQH�LV�VKRZQ��EXWPRUH�WKDQ�RQH�FRXOG�DSSHDU��

�� &KRRVH� �&KHFN�LQGLFDWRU�WR�GLVSOD\WKH�FXUUHQW�DFWLYH�FKHFN�LQGLFDWRUVIRU�DXWKRUL]DWLRQ�REMHFWV�LQ�WKHVHOHFWHG�WUDQVDFWLRQV�

,I�\RX�DUH�GHDOLQJ�ZLWK�D�SDUDPHWHUWUDQVDFWLRQ��WKH�FRUH�WUDQVDFWLRQ�DSSHDUVLQ�WKH�7FRGH��RULJLQDO��FROXPQ��)RU�PRUHLQIRUPDWLRQ��VHH�3DUDPHWHU�7UDQVDFWLRQVRQ�SDJH���²���

4

5

6

7

8

Tip

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–22

$�OLVW�RI�DXWKRUL]DWLRQ�REMHFWVDSSHDUV�LQ�WKH�2EMHFW�FROXPQ�IRU�WKHVHOHFWHG�WUDQVDFWLRQ�LQYROYHG�ZLWKWKH�FKHFN�

�� &KRRVH� �)LHOG�YDOXHV�

1RWH��7KHUH�DUH�WKUHH�REMHFWV�WKDWKDYH�WKH�FKHFN�LQGLFDWRU�VHW�WR�&0�

7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�862%;B&�

([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV

&0� �&KHFN�0DLQWDLQ

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&� �&KHFN

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

1� �1R�FKHFN

< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8� �8QPDLQWDLQHG

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�

9

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–23

7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��

��� 7KUHH�REMHFWV�JHW�GLVSOD\HG�ZLWKSUHGHILQHG�YDOXHV��VLQFH�RQO\�WKUHHREMHFWV�KDG�WKH�FKHFN�LQGLFDWRU�VHW�WR&KHFN�0DLQWDLQ�

��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU��FKRRVH�WR�WRJJOH�EHWZHHQ�GLVSOD\�DQG

FKDQJH�PRGH�

7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�8627B&�

��� (QWHU�D�WUDQVSRUWDEOH�FKDQJH�UHTXHVWQXPEHU��RU�XVH� �WR�FUHDWH�D�QHZRQH�

��� &KRRVH� �

��� 7R�FKDQJH�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�RQH�RI�WKH�REMHFWV��FKRRVH�QH[W�WR�WKH�REMHFW·V�ILHOG�QDPH��IRU

H[DPSOH��WKH�REMHFW�)B/)$�B$33DQG�WKH�ILHOG�$33.=��

10

11

12

13

14

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–24

��� 6HOHFW�WKH�GHVLUHG�YDOXH��IRUH[DPSOH��ZH�DGGHG�)�)LQDQFLDO$FFRXQWLQJ��

��� &KRRVH� �

��� 7KH�YDOXH�ZDV�DGGHG�

��� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHDQ\�FKDQJHV�\RX�PLJKW�KDYH�PDGH�

7R�GLVSOD\�WKH�ORQJ�WH[W�IRU�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH�2EMHFW�GHVFU�

��� ,Q�WKH�9DOXH��LQWHUYDO��FROXPQ�UHYLHZ�\RXU�FKDQJHV��WKLV�LV�WDEOH862%7B&��ZKLFK�UHSUHVHQWVFXVWRPHU�VHWWLQJV��

��� ,Q�WKH�6$3�YDOXH��LQWHUYDO��FROXPQ�QRWLFH�WKH�RULJLQDOO\�GHOLYHUHG�6$3GHIDXOW�YDOXHV��WKLV�LV�WDEOH�862%7�ZKLFK�UHSUHVHQWV�6$3�GHIDXOWV��9DOXHV�WKDW�KDYH�FKDQJHG�IURP�WKH6$3�GHIDXOWV�DUH�LQ�FRORU�

��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �

��� &KRRVH� �RU� �6$3�GHIDXOWV�WR�KLGHWKH�6$3�GHIDXOW�YDOXHV�

7R�VNLS�\RXU�FKDQJHV��FKRRVH� �IRU�WKH�DSSURSULDWH�YDOXH�\RX�FKDQJHG�

15

16

17

18 Tip

19 20

Tip

21 22

22

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–25

��� &KRRVH� �WR�VZLWFK�WR�FKDQJH�PRGHIRU�WKH�FKHFN�LQGLFDWRUV�

��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU�IRU�DQREMHFW��FOLFN�LQ�WKH�DSSURSLDWHFROXPQ��8��1��&��&0��

1RWLFH�KRZ�WKH�FXUVRU�FKDQJHV�WR�DQLFRQL]HG�KDQG�DV�\RX�PRYH�RYHU�WKHFKHFN�LQGLFDWRUV�

,Q�WKLV�H[DPSOH��ZH�FOLFNHG�LQ�WKH�1FROXPQ�WR�VHW�WKH�FKHFN�LQGLFDWRU�IRUREMHFW�)B/)$�B%(.�WR�1R�FKHFN�

��� 7KH�FKHFN�LQGLFDWRU�KDV�VXFFHVVIXOO\EHHQ�FKDQJHG�WR�1��7KHUHIRUH�)B/)$�B%(.�ZLOO�QR�ORQJHU�EHFKHFNHG�LQ�WUDQVDFWLRQ�0.���

��� 6HOHFW�DQ�REMHFW�DQG�FKRRVH�$XWK��REM��WR�YLHZ�D�ZKHUH�XVHG

OLVW�

��� <RX�KDYH�WR�GHWHUPLQH�D�VSHFLILFWUDQVDFWLRQ�FRGH�UDQJH��7R�VHDUFKWKURXJK�DOO�H[LVWLQJ�WUDQVDFWLRQFRGHV��HQWHU�DQ�DVWHULVN�� ��

��� &KRRVH� �

24

23

26

25

27

28

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–26

��� 7KH�JHQHUDWHG�OLVW�VKRZV�DOOWUDQVDFWLRQV�ZKHUH�WKH�VHOHFWHGDXWKRUL]DWLRQ�REMHFW�LV�XVHG�

��� &KRRVH� �

��� &KRRVH�6$3�GHIDXOWV�WR�GLVSOD\�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�LQ�WKHVDPH�OLVW�

29

30

31

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–27

%RWK�WDEOH�HQWULHV�LQ�WDEOHV�862%;DQG�862%;B&�QRZ�DSSHDU�IRU�WKHVHOHFWHG�WUDQVDFWLRQ��LQ�WKLV�H[DPSOH�0.����

��� ,Q�WKH�&KHFN�,'�FROXPQ��UHYLHZ�WKHFXUUHQW�DFWLYH�FKHFN�LQGLFDWRUV�IRUWKLV�WUDQVDFWLRQ��HQWULHV�LQ�WDEOH862%;B&��

��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��UHYLHZWKH�6$3�FKHFN�LQGLFDWRUV�GHIDXOWYDOXHV��HQWULHV�LQ�WDEOH�862%;��

��� 7R�VNLS�\RXU�FKDQJHV��FKRRVH� �WRUHVHW�WR�WKH�6$3�FKHFN�LQGLFDWRUGHIDXOW�YDOXH�IRU�WKLV�DXWKRUL]DWLRQREMHFW��6HWWLQJV�WKDW�GLIIHU�IURP�6$3GHIDXOWV�DSSHDU�LQ�FRORU�

��� &KRRVH� �$XWK��REM��WR�DGG�D�QHZREMHFW�IRU�FKHFNLQJ��7KHUH�PXVW�DOVREH�DQ�$87+25,7<B&+(&.�FDOO�LQWKLV�SURJUDP�IRU�WKH�QHZ�REMHFW�

��� &KRRVH� �

��� &KRRVH� �

([FHSWLRQV

$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG��7UDQVDFWLRQV�ZKRVH�FKHFN�LQGLFDWRU�FDQQRW�EHFKDQJHG�EHFDXVH�RI�D�ORFDO�ORFN��(148(8(��RU�D�ORFN�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUWV\VWHP��IRU�REMHFW�FDWDORJ�HQWU\�5�75�686.��7FRGH!��DUH�DOVR�VKRZQ�LQ�FRORU��$�VKRUWHUURU�PHVVDJH�DSSHDUV�LQ�WKH�GHVFULSWLRQ�ILHOG�

,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��

,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��

�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�

�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�

32 33

34

36 37

35

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–28

�� ,Q�WUDQVDFWLRQ�3)&*�VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�

�� 5HJHQHUDWH�WKH�SURILOH�

�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU��FKDQJHV�EHFRPH�DFWLYH�ZLWK�WKHQH[W�V\VWHP�ORJRQ�

0DVV�&KDQJH�RI�&KHFN�,QGLFDWRUV

<RX�FDQ�DOVR�JOREDOO\�FKDQJH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LQ�WUDQVDFWLRQVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW�RFFXUV��<RX�FDQ�DOVR�VSHFLILFDOO\�H[FOXGH�LQGLYLGXDOWUDQVDFWLRQV�IURP�WKH�JOREDO�FKDQJH�

7R�DFFHVV�WKH�WUDQVDFWLRQ�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV��HQWHU�WKH�WUDQVDFWLRQ�SU24LQ�WKH�&RPPDQG�ILHOG��RU�QDYLJDWH�XVLQJ�WKH�,0*�DV�GHVFULEHG�LQ�WKH�VHFWLRQ�EHIRUH��,Q�WKHIROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�JHW�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV�E\HQWHULQJ�SU24�GLUHFWO\�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SU24�DQG�FKRRVH�(QWHU�

�� 6HOHFW�(GLW�FKHFN�LQGLFDWRUV�LQ�DOOWUDQVDFWLRQV�

�� (QWHU�WKH�GHVLUHG�$XWKRUL]DWLRQ�REMHFW�IRU�H[DPSOH��)B/)$B%(.�

�� &KRRVH� �

$�OLVW�RI�WUDQVDFWLRQV�LV�GLVSOD\HG�RQWKH�QH[W�VFUHHQ��7KH�HQWHUHGDXWKRUL]DWLRQ�REMHFW�DSSHDUV�ZLWKWKH�DSSURSULDWH�FKHFN�LQGLFDWRU�SHUWUDQVDFWLRQ�

2

3

4

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–29

�� 7R�DOWHU�WKH�FKHFN�LQGLFDWRU�HLWKHU�IRUVHOHFWHG�WUDQVDFWLRQV�RU�JOREDOO\�FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�

D� 6HOHFW�WKH�WUDQVDFWLRQV�IRU�ZKLFK\RX�ZLVK�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�

E� &KRRVH� �WR�VHOHFW�DOOWUDQVDFWLRQV�ILUVW�DQG�WKHQGHVHOHFW�LQGLYLGXDO�WUDQVDFWLRQV�DVQHFHVVDU\�

7R�HQVXUH�WKDW�WKH�3*�DFWXDOO\FUHDWHV�DQ�DXWKRUL]DWLRQ��ZH�QHHG�WRFKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKHDSSURSULDWH�DXWKRUL]DWLRQ�REMHFWIURP�&��&KHFN��WR�&0�&KHFN�0DLQWDLQ��

�� 7R�VLPXOWDQHRXVO\�FKDQJH�WKH�FKHFNLQGLFDWRUV�IRU�WKH�VHOHFWHGWUDQVDFWLRQV��FKDQJH�WKH�FKHFNLQGLFDWRU�LQ�WKH�ILUVW�OLQH��ZKLFKFRQWDLQV�WKH�QDPH�RI�WKHDXWKRUL]DWLRQ�REMHFW��E\�FOLFNLQJ�LQWKH�FROXPQ�IRU�WKH�QHZ�FKHFNLQGLFDWRU�EHORZ��8��1��&��&0���:HFKRVH�&0�

7R�FKHFN�WKH�WUDQVDFWLRQ�H[HFXWHG�E\�WKH�WUDQVDFWLRQ�FRGH�GLVSOD\HG�LQ�FROXPQ�7FRGH��\RXFDQ�FKRRVH� �QH[W�WR�WKH�WUDQVDFWLRQ�DQG�LW�ZLOO�EH�H[HFXWHG�

([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV

&0� �&KHFN�0DLQWDLQ

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&� �&KHFN

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

5a

5b

6

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–30

1� �1R�FKHFN

< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8� �8QPDLQWDLQHG

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�

7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��

�� 2QO\�WKH�FKHFN�LQGLFDWRU�IRU�WKHWUDQVDFWLRQV�\RX�VHOHFWHG�KDYHFKDQJHG�

�� 2QFH�D�FKHFN�LQGLFDWRU�LQ�WKH�OLVW�LVVHW�WR�&0��&KHFN�0DLQWDLQ���WKH�)OG�YDOXHV�EXWWRQ�DSSHDUV��%\

FOLFNLQJ�WKLV�EXWWRQ��\RX�FDQPDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�RI�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�IRU�DOO�WUDQVDFWLRQV�ZKRVHFKHFN�LQGLFDWRU�KDV�EHHQ�VHW�

�� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHWKH�FXUUHQW�VHWWLQJV�ZLWK�WKH�6$3GHIDXOWV�

98

7

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–31

��� 7KH�FKDQJHV�RI�WKH�FKHFN�LQGLFDWRUDUH�VKRZQ�LQ�UHG�

7R�KLJKOLJKW�DOO�WUDQVDFWLRQ�FRGHVWKDW�KDYH�FKDQJHG��FKRRVH�(GLW�→&KDQJHV�→�'LVSOD\�LQ�FRORU�

��� ,Q�WKH�&KHFN�,'�FROXPQ��QRWLFH�WKHFKDQJHV�\RX�PDGH��HQWULHV�LQ�WDEOH862%;B&��

��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��QRWLFHWKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWYDOXHV��HQWULHV�LQ�862%;��

&KRRVH� �6$3�GHIDXOW�LI�\RX�ZDQW�WRUHVWRUH�WKH�VHOHFWHG�WUDQVDFWLRQV�WR�WKHLURULJLQDO�GHOLYHU\�VWDWXV�VHW�E\�6$3�'XULQJ�LQVWDOODWLRQ��WKLV�VWHS�UHVWRUHV�WKHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�WR�WKHVHWWLQJ�LQ�WKH�5���6\VWHP�

��� &KRRVH� �&KHFN�,'�

��� &KRRVH�<HV�

([FHSWLRQV

$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG�

10

11 12

13Tip

14

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–32

,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��

,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��

�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�

�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�

�� ,Q�WUDQVDFWLRQ�3)&*��VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�

�� 5HJHQHUDWH�WKH�SURILOH�

�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU�WKDW�FKDQJHV�EHFRPH�DFWLYH�ZLWKWKH�QH[W�V\VWHP�ORJRQ�

0DLQWDLQLQJ�$XWKRUL]DWLRQV�LQ�WKH�$FWLYLW\�*URXSV

3OHDVH�VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��VLQFH�ZH�GHVFULEHG�WKLV�WRSLFWKHUH�LQ�GHWDLO�

13–1

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG

/RJJLQJ

&RQWHQWV

Overview ................................................................................................................13–2

Audit Tools (SM20, SM19, SECR) ........................................................................13–2

Audit Tasks (SM21, STAT, ST03).......................................................................13–19

Logging Changes to User Master Records, Profiles, and Authorizations ....13–29

����

Chapter 13: SAP Security Audit and Logging

Overview

Authorizations Made Easy13–2

2YHUYLHZ

7KH�SXUSRVH�RI�WKLV�FKDSWHU�LV�WR�PDNH�\RX�DZDUH�RI�\RXU�UHVSRQVLELOLWLHV�DV�WKH�5���6\VWHPDGPLQLVWUDWRU�V��IRU�VHFXULW\��ZKLFK�LQFOXGHV�< 3URWHFWLQJ�WKH�5���6\VWHP< 3UHSDULQJ�\RX�IRU�D�FRPSXWHU�VHFXULW\�DXGLW

*HQHUDOO\��WKH�V\VWHP�DGPLQLVWUDWRU�LV�UHVSRQVLEOH�IRU�UHVSRQGLQJ�WR�WKH�ILQGLQJV�RI�DQ�5��6\VWHP�DXGLW�

,Q�WKLV�FKDSWHU��\RX�OHDUQ�KRZ�WR�DQDO\]H�DXWKRUL]DWLRQ�ORJJLQJ�IURP�D�VHFXULW\�SHUVSHFWLYH�<RX�OHDUQ�KRZ�WR�SUHSDUH�IRU�D�W\SLFDO�V\VWHP�DXGLW�

5HIHU�WR�6\VWHP�$GPLQLVWUDWLRQ�0DGH�(DV\��5HOHDVH����$�%��FKDSWHU�����WKH�VHFWLRQ6HFXULW\�$GPLQLVWUDWLRQ��ZKLFK�VHUYHG�DV�WKH�EDVLV�IRU�WKLV�FKDSWHU�

7KLV�FKDSWHU�LV�RQO\�LQWHQGHG�WR�VHUYH�DV�DQ�LQWURGXFWLRQ�WR�FRPSXWHU�VHFXULW\�&RQVLGHULQJ�WKH�JURZLQJ�LPSRUWDQFH�RI�VHFXULW\��ZH�DGYLVH�\RX�WR�ZRUN�ZLWK�\RXUDXGLWRUV��ILQDQFH�GHSDUWPHQW��OHJDO�GHSDUWPHQW��DQG�RWKHUV�ZKR�PLJKW�EH�DIIHFWHG�E\V\VWHP�VHFXULW\�

$XGLW�7RROV��60����60����6(&5�

6HFXULW\�$XGLW�/RJ��60���

:KDW

7KH�6HFXULW\�$XGLW�/RJ�UHFRUGV�WKH�VHFXULW\�UHODWHG�DFWLYLWLHV�RI�XVHUV�LQ�WKH�V\VWHP��7KHVHDFWLYLWLHV�LQFOXGH�VXFFHVVIXO�DQG�IDLOHG�< 'LDORJ�ORJRQ�DWWHPSWV< 5HSRUW�DQG�WUDQVDFWLRQ�VWDUWV< 5)&�&3,&�ORJRQV2WKHU�HYHQWV�ZULWWHQ�WR�WKH�ORJ�DUH�< /RFNHG�WUDQVDFWLRQV�RU�XVHUV< &KDQJHG�RU�GHOHWHG�

� $XWKRUL]DWLRQV� $XWKRUL]DWLRQ�SURILOHV� 8VHU�PDVWHU�UHFRUGV

< &KDQJHV�WR�WKH�DXGLW�FRQILJXUDWLRQ

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–3

7KH�ORJ�LV�FUHDWHG�HDFK�GD\��DQG�SUHYLRXV�ORJV�DUH�QRW�GHOHWHG�RU�RYHUZULWWHQ��7KH�ORJ�ILOHVFDQ�EHFRPH�QXPHURXV�DQG�ODUJH��VR�ZH�UHFRPPHQG�WKDW�WKH�ORJV�EH�SHULRGLFDOO\�DUFKLYHGEHIRUH�EHLQJ�PDQXDOO\�SXUJHG�

1RWH��7KH�ORJ�ILOHV�DUH�RSHUDWLQJ�V\VWHP�ORJ�ILOHV��7UDQVDFWLRQ�60����6HFXULW\�$XGLW�'HOHWH�2OG�$XGLW�/RJV��LV�RQH�PHFKDQLVP�WR�SXUJH�WKHVH�ILOHV��2WKHU�RSHUDWLQJ�V\VWHPDUFKLYLQJ�WHFKQLTXHV�PD\�DOVR�EH�XVHG�

$Q�DXGLW�DQDO\VLV�UHSRUW�FDQ�EH�JHQHUDWHG�IURP�WKH�DXGLW�ORJV��<RX�FDQ�DQDO\]H�D�ORFDOVHUYHU��D�UHPRWH�VHUYHU��RU�DOO�WKH�VHUYHUV�LQ�DQ�5���6\VWHP�

:K\

7KH�LQIRUPDWLRQ�LQ�WKH�VHFXULW\�DXGLW�ILOHV�FDQ�EH�PDQLSXODWHG�WR�WDLORU�WKH�DXGLW�DQDO\VLVUHSRUW�EDVHG�RQ�FHUWDLQ�FULWHULD��7KH�UHSRUW�DVVLVWV�WKH�DGPLQLVWUDWRU�WR�< 5HFRQVWUXFW�RU�DQDO\]H�LQFLGHQWV< ,PSURYH�VHFXULW\�E\�UHFRJQL]LQJ�LQDGHTXDWH�PHDVXUHV< 7UDFH�XQXVXDO�XVHU�DFWLYLWLHV< 8QGHUVWDQG�WKH�LPSDFW�RI�FKDQJHV�WR�WUDQVDFWLRQV�RU�XVHUV

+RZ

7R�VWDUW�D�VHFXULW\�DXGLW��\RX�FDQ�GR�RQH�RI�WKH�IROORZLQJ�< 6HW�WKH�SURILOH�SDUDPHWHU�UVDX�HQDEOH�WR��< '\QDPLFDOO\�VWDUW�LW�XVLQJ�WUDQVDFWLRQ�60����6HH�WKH�VHFWLRQ�6HWWLQJ�6HFXULW\�$XGLW�/RJ

3DUDPHWHUV�RQ�SDJH���²���

7KH�QXPEHU�RI�DXGLW�ORJV�FUHDWHG�E\�WKH�V\VWHP�GHSHQGV�RQ�WKH�IROORZLQJ�< <RX�PD\�FKRRVH�WR�VHW�WKH�PD[LPXP�VSDFH�IRU�WKH�VHFXULW\�DXGLW�ILOH�LQ�SDUDPHWHU

UVDX�PD[BGLVNVSDFH�ORFDO�$W�WKLV�SRLQW��ZKHQ�WKH�OLPLW�KDV�EHHQ�UHDFKHG��ORJJLQJ�ZLOO�HQG�

< <RX�FDQ�GHILQH�WKH�VL]H�RI�DQ�LQGLYLGXDO�VHFXULW\�ORJ�ILOH�WR�ILW�WKH�FKRVHQ�DUFKLYLQJPHGLD�7KLV�GHILQLWLRQ�PHDQV�WKDW�WKH�V\VWHP�SURGXFHV�VHYHUDO�ORJ�ILOHV�HDFK�GD\��DQG�WKHVH�ILOHVFDQ�EH��IRU�H[DPSOH��DUFKLYHG�SHULRGLFDOO\�RQWR�&'V��7KH�SURILOH�SDUDPHWHU�LVUVDX�PD[BGLVNVSDFH�SHUBILOH�DQG�WKH�PD[LPXP�VL]H�SHU�ILOH�LV���*%�

<RX�FDQQRW�VHW�ERWK�SDUDPHWHUV��<RX�KDYH�WR�FKRRVH�WKH�PHWKRG�E\�ZKLFK�WKH�DXGLW�ILOHVDUH�FUHDWHG�

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–4

5XQQLQJ�WKH�$XGLW�/RJ

7KLV�SURFHGXUH�DVVXPHV�WKDW�WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRU�VRPH�WLPH�DQG�WKDW�DXGLW�ORJV�KDYH�EHHQFUHDWHG�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM20�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���$QDO\VLV��

�� 2Q�WKH�6\VWHP�$XGLW�/RJ�VFUHHQ��FRPSOHWH�WKHVWHSV�EHORZ�

D� ,Q�)URP�GDWH�WLPH��HQWHU�IRU�H[DPSOH��13:00

E� 8QGHU�$XGLW�FODVVHV��VHOHFW�� 'LDORJ�ORJRQ� 7UDQVDFWLRQ�VWDUW� 5HSRUW�VWDUW

�� &KRRVH�5H�UHDG�DXGLW�ORJ�

7KLV�EXWWRQ�LV�XVHG�WR�UHDG�D�ORJ�IRU�WKH�ILUVWWLPH�

7KH�VHFXULW\�UHSRUW�LV�GLVSOD\HG�

�� 7R�UHYLHZ�WKH�GHWDLOV�RI�DQ�DXGLW�PHVVDJH��VHOHFWD�OLQH�DQG�FKRRVH� �

2b

2a

3

4

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–5

'RFXPHQWDWLRQ�IRU�WKH�PHVVDJH�DQGWHFKQLFDO�GHWDLOV�DSSHDUV��7KLV�GLVSOD\�LVPRVW�XVHIXO�ZKHQ�GLVSOD\LQJ�QHJDWLYHPHVVDJHV�VXFK�DV�IDLOHG�ORJLQV�RU�ORFNHGWUDQVDFWLRQV�

6HWWLQJ�6HFXULW\�$XGLW�/RJ�3DUDPHWHUV��60���

:KDW

7KH�DXGLW�ORJ�SDUDPHWHUV�DUH�WKH�FULWHULD�XVHG�WR�ZULWH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�LQWR�WKHDXGLW�ORJ�ILOH��7KH�SDUDPHWHUV�DUH�JURXSHG�LQWR�DXGLW�SURILOHV�WKDW�FDQ�EH�DFWLYDWHG�DW�WKHQH[W�V\VWHP�VWDUWXS��FRQILJXUDWLRQ�VWDWXV��RU�DSSOLHG�´RQ�WKH�IO\µ��G\QDPLF�FRQILJXUDWLRQ��

:K\

$XGLW�SURILOHV�QHHG�WR�EH�FUHDWHG�ILUVW�EHIRUH�DXGLW�ORJV�FDQ�EH�ZULWWHQ��7KHVH�SURILOHV�OLPLWWKH�DPRXQW�DQG�W\SH�RI�GDWD�ZULWWHQ�LQWR�WKH�VHFXULW\�DXGLW�ILOHV��PDNLQJ�WKH�VXEVHTXHQWVHFXULW\�UHSRUWV�PRUH�PHDQLQJIXO�WR�WKH�DGPLQLVWUDWRU�

+RZ

'HFLGH�ZKDW�WR�DXGLW�DQG�VHW�VHOHFWLRQ�FULWHULD�HLWKHU�DW�WKH�GDWDEDVH�OHYHO�RU�G\QDPLFDOO\�DWWKH�DSSOLFDWLRQ�VHUYHU�OHYHO�< ,I�WKH�DXGLW�FRQILJXUDWLRQ�LV�SHUPDQHQWO\�VWRUHG�DW�WKH�GDWDEDVH�OHYHO��DOO�DSSOLFDWLRQ

VHUYHUV�XVH�WKH�LGHQWLFDO�FULWHULD�WR�VDYH�HYHQWV�LQ�WKH�DXGLW�ORJ��7KH�VHWWLQJV�WDNH�HIIHFW�DWWKH�QH[W�DSSOLFDWLRQ�VHUYHU�VWDUW�

< $W�WKH�DSSOLFDWLRQ�VHUYHU�OHYHO��KRZHYHU��G\QDPLF�FKDQJHV�FDQ�EH�VHW�WR�LQGLYLGXDODSSOLFDWLRQ�VHUYHUV�DQG�GLVWULEXWHG�WR�WKH�HQWLUH�V\VWHP�7KH�QHZ�FULWHULD�UHPDLQV�LQ�HIIHFW�XQWLO�WKH�VHUYHU�LV�EURXJKW�GRZQ�

<RX�FDQ�GHILQH�XS�WR�ILYH�VHWV�RI�VHOHFWLRQ�FULWHULD�RU�ILOWHUV��7KH�V\VWHP�SDUDPHWHU�UVDX�VHOHFWLRQBVORWV��WKDW�GHILQHV�WKH�QXPEHU�RI�ILOWHUV�KDV�D�GHIDXOW�YDOXH�RI����<RX�FDQDFWLYDWH�DQ�DXGLW�LQ�WKH�G\QDPLF�FRQILJXUDWLRQ�XVLQJ�WUDQVDFWLRQ�60���

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–6

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM19�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���&RQILJXUDWLRQ��

&RQILJXUDWLRQ�VWDWXV�UHIHUV�WR�WKH�VWRUDJH�RI�WKH�SDUDPHWHUV�LQ�WKH�GDWDEDVH�

�� &KRRVH� �

�� (QWHU�D�SURILOH�QDPH��IRU�H[DPSOH��AUDPROF1��

�� &KRRVH� �

�� ,Q�WKLV�VFUHHQ��\RX�PD\�VSHFLI\�WZR�ILOWHU�JURXSVDQG�GHILQH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�WKDW�ZLOOEH�ZULWWHQ�LQWR�WKH�ORJ�

2

5

4

3

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–7

'HILQLQJ�)LOWHU�*URXS��

�� &KRRVH�WKH�)LOWHU���WDE�

�� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�*�LQ�8VHU�1DPHV�

�� ,Q�$XGLW�&ODVVHV��VHOHFW�< 'LDORJ�/RJRQ< 7UDQVDFWLRQ�6WDUW

�� 8QGHU�(YHQWV��VHOHFW�$OO�

��� 6HOHFW�)LOWHU�$FWLYH�

'HILQLQJ�)LOWHU�*URXS��

��� &KRRVH�WKH�)LOWHU���WDE�

7KLV�ILOWHU�WUDFHV�WKH�UHSRUWV�VWDUWHG�E\�RQH�XVHU�

��� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW.< (QWHU�D�XVHU�,'�LQ�8VHU�1DPHV��IRU�H[DPSOH�

GARYN��

��� ,Q�$XGLW�&ODVVHV��VHOHFW�5HSRUW�VWDUW�

��� 8QGHU�(YHQWV��VHOHFW�6HYHUH�DQG�FULWLFDO�

��� 'HVHOHFW�)LOWHU�$FWLYH�

7KLV�VHWWLQJ�DOORZV�\RX�WR�VDYH�WKH�ILOWHU�VHWWLQJV�EXW�GRHV�QRW�DFWLYDWH�WKHP�

��� &KRRVH�'HWDLO�VHWWLQJ�WR�GULOO�GRZQ�WR�WKH�DXGLWFODVV�DQG�HYHQW�FODVV�FDWHJRULHV�

7 8 9

10

12 13 14

1516

6

11

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–8

��� 6FUROO�GRZQ�WR�5HSRUW�VWDUW�

1RWLFH�WKDW�WKH�FDWHJRU\�LV�DXWRPDWLFDOO\�FKRVHQEDVHG�RQ�WKH�HDUOLHU�VHOHFWLRQ�RI�HYHQW�W\SH�DQGDXGLW�FODVV�W\SH�

��� &KRRVH� �

��� 7KH�JHQHUDO�FDWHJRULHV�DUH�FOHDUHG�LQGLFDWLQJWKDW�VHWWLQJV�ZHUH�EURZVHG�RU�GHILQHG�DW�WKHGHWDLO�OHYHO�

��� &KRRVH� �

20

18

19

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–9

��� $�V\VWHP�PHVVDJH�QRWLILHV�WKH�XVHU�WKDW�WKHSURILOH�ZDV�VDYHG�VXFFHVVIXOO\�

��� 7R�DFWLYDWH�WKH�SURILOH��VHOHFW� �

��� 7KH�SURILOH�QDPH�QRZ�DSSHDUV�LQ�WKH�$FWLYHSURILOH�ILHOG�

��� $�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKH�SURILOH�ZLOOEH�DFWLYDWHG�ZKHQ�WKH�DSSOLFDWLRQ�VHUYHU�LVUHVWDUWHG�

��� 7R�G\QDPLFDOO\�FKDQJH�WKH�VHOHFWLRQ�FULWHULD�IRURQH�RU�PRUH�DSSOLFDWLRQ�VHUYHUV�LQ�D�UXQQLQJV\VWHP��FKRRVH�WKH�'\QDPLF�FRQILJXUDW��'\QDPLFFRQILJXUDWLRQ��WDE�

21

22

23

24

25

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–10

��� ,Q�WKLV�H[DPSOH��WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRUVRPH�WLPH��LQGLFDWHG�E\�WKH�FXUUHQW�ILOH�VL]HJUHDWHU�WKDQ�]HUR��EHIRUH�EHLQJ�VWRSSHG�EULHIO\�7KH�UHG� �LQ�WKH�6WDW���6WDWXV��FROXPQ�LQGLFDWHVWKDW�WKH�DXGLW�LV�LQDFWLYH�

��� &KRRVH� �

5XQQLQJ�DQ�$XGLW�RQ�D�'LIIHUHQW�8VHU

,Q�WKLV�SURFHGXUH��ZH�UXQ�DQ�DXGLW�RQ�D�GLIIHUHQW�XVHU�DQG�FKHFN�DOO�WKH�UHSRUWV�WKDW�ZHUH�VWDUWHG�

�� 2Q�WKH�)LOWHU�WDE��HQWHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�D�XVHU�,'�LQ�8VHU�QDPHV��IRU�H[DPSOH�

Patricia��

�� 8QGHU�$XGLW�FODVVHV��VHOHFW�5HSRUW�VWDUW�

�� 8QGHU�(YHQWV��VHOHFW�$OO�

�� 8QGHU�)LOWHU����VHOHFW�)LOWHU�DFWLYH�

�� 7R�DFWLYDWH��FKRRVH� �

27

1 2 3

4

5

26

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–11

�� &KRRVH�<HV�

�� $�JUHHQ� �DSSHDUV�LQ�WKH�6WDW���6WDWXV��FROXPQDQG�D�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKHFRQILJXUDWLRQ�ZDV�DFWLYDWHG�

$XGLW�,QIRUPDWLRQ�6\VWHP��6(&5�

:KDW

7KH�$XGLW�,QIRUPDWLRQ�6\VWHP��$,6��LV�GHVLJQHG�IRU�V\VWHP�DQG�EXVLQHVV�DXGLWV�DQG�ZLOOOLNHO\�EH�UXQ�E\�LQWHUQDO�RU�H[WHUQDO�DXGLWRUV��,W�SXWV�LQ�RQH�SODFH�PDQ\�RI�WKH�5���VHFXULW\WRROV��7KH�FHQWHU�RI�WKH�$,6�LV�WKH�DXGLW�UHSRUW�WUHH��VWUXFWXUHG�DURXQG�D�UDQJH�RI�DXGLWLQJIXQFWLRQV�DQG�GHIDXOW�FRQILJXUDWLRQV�LQFOXGLQJ�< $XGLWLQJ�SURFHGXUHV�DQG�GRFXPHQWDWLRQ< $XGLWLQJ�HYDOXDWLRQV< 'RZQORDGLQJ�RI�DXGLW�GDWD

$,6�FDQ�EH�HIIHFWLYHO\�SRVLWLRQHG�DV�WKH�6$3�WRRO�IRU�LQWHUQDO�DXGLWLQJ�DQG�GDWD�SURWHFWLRQ�H[WHUQDO�DXGLWLQJ��RQJRLQJ�VHFXULW\�FRQWURO�FKHFNV��LQWHULP�DXGLWV��SUHSDUDWLRQ�RI�\HDU�HQGFORVLQJ�VWDWHPHQWV��\HDU�HQG�DXGLWV��HWF�

$,6�XVHV�VWDQGDUG�5���UHSRUWV�DQG�WUDQVDFWLRQV�WR�FRQGXFW�WKH�UHYLHZ�DQG�LV�D�VWDQGDUGFRPSRQHQW�LQ�5HOHDVH����$��+RZHYHU��\RX�FDQ�LPSRUW�WKH�$,6�LQWR�\RXU�V\VWHP�EDFN�WR5HOHDVH����'�RU�KLJKHU��)RU�PRUH�LQIRUPDWLRQ�RQ�$,6�DQG�LWV�DYDLODELOLW\��SOHDVH�UHIHU�WR

7

6

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–12

6$31HW�²�5���)URQWHQG�QRWHV�������DQG���������$,6�DOVR�SURYLGHV�DQ�LQWHUIDFH�WR�H[SRUWGDWD�WR�DQ�H[WHUQDO�DXGLWLQJ�V\VWHP�WKDW�DQDO\]HV�ILQDQFLDO�VWDWHPHQWV�

:K\

$XGLWRUV�H[DPLQH�WKH�UHVXOWV�RI�DXWRPDWHG�DQG�PDQXDO�ILQDQFLDO�DQG�V\VWHP�SURFHGXUHV�WRHQVXUH�WKDW�WKHUH�LV�D�FKHFNV�DQG�EDODQFHV�LQIUDVWUXFWXUH�WR�SUHYHQW�IUDXG�DQG�RWKHUSUREOHPV��$,6�HQDEOHV�WKH�DXGLWRUV�WR�WHVW�WUDQVDFWLRQV�DQG�UXQ�UHSRUWV�GXULQJ�WKHLQVSHFWLRQ�

+RZ

7R�VWDUW�$,6��FDOO�WUDQVDFWLRQ�SECR��7KHUH�DUH�WZR�ZD\V�WR�FRQGXFW�DQ�DXGLW�< &RPSOHWH< 8VHU�GHILQHG

&RPSOHWH�$XGLW

:KLOH�LW�LV�QRW�SRVVLEOH�WR�VKRZ�DOO�WKH�IXQFWLRQDOLW\�RI�WKH�$,6�KHUH��ZH�SURYLGH�WKH�IROORZLQJ�VFHQDULR�RILQYHVWLJDWLRQ�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV�→�6(&5�$XGLW�,QIR�6\VWHP��

�� 8QGHU�&KRRVH�YLHZ��VHOHFW�&RPSOHWH�DXGLW�

�� &KRRVH� �

$�FRPSOHWH�DXGLW�FRQVLVWV�RI�D�V\VWHP�DXGLW�DQGEXVLQHVV�DXGLW��7KH�VWUXFWXUH�RQ�WKLV�VFUHHQ�LV$XGLWB$OO�ZLWK�D�VWDQGDUG�YLHZ�

�� &OLFN�WKH�QRGHV�����WR�H[SDQG�WKH�IROORZLQJ�< 6\VWHP�$XGLW< %XVLQHVV�$XGLW

1

2

3

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–13

6\VWHP�$XGLW

7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�$,6�

�� 8QGHU�6\VWHP�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR5HSRVLWRU\���7DEOHV�

�� &OLFN�WKH�QRGH�����QH[W�WR�7DEOH�,QIRUPDWLRQ�

�� &KRRVH� �QH[W�WR�'DWD�'LFWLRQDU\�GLVSOD\�

1

2

3

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–14

7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RX�DUH�EURXJKWWR�WKLV�VFUHHQ�

�� &KRRVH� �

%XVLQHVV�$XGLW

�� 8QGHU�%XVLQHVV�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR&ORVLQJ��),�*/��

�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�%DODQFHV�

�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�<RX�FDQ�H[HFXWH�GLIIHUHQW�UHSRUWV�WR�LQVSHFW�WKHILQDQFLDO�EDODQFHV�

�� &KRRVH� �QH[W�WR�3URILW�DQG�/RVV�3URMHFWLRQ� 1

2

3

4

4

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–15

�� 2Q�WKLV�VFUHHQ��\RX�FDQ�HQWHU�FULWHULD�IRU�\RXUUHSRUW��WKHQ�FKRRVH� �

�� &KRRVH� �

8VHU�'HILQHG�$XGLW

<RX�FDQ�DOVR�FRQGXFW�D�XVHU�GHILQHG�DXGLW�E\�FUHDWLQJ�D�YLHZ�RU�VXEVHW�RI�D�FRPSOHWH�DXGLW�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV→�6(&5�$XGLW�,QIR�6\VWHP��

�� 6HOHFW�8VHU�GHILQHG�DXGLW�

�� 8QGHU�8VHU�GHILQHG�DXGLW��HQWHU�D�YLHZ�QDPH��IRUH[DPSOH��HQWHU�ZVUE��

�� &KRRVH� �

9LHZ�QDPHV�VKRXOG�VWDUW�ZLWK�<�RU�=�

12

6

3

5

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–16

�� 8QGHU�1HZ�YLHZ��LQ�1DPH��HQWHU�WKH�QDPH�RI�WKHYLHZ��IRU�H[DPSOH��ZVUE��

�� 8QGHU�6HOHFW�XVLQJ��VHOHFW�0DQXDO�6HOHFWLRQ�<RX�ZLOO�VHOHFW�WKH�SURFHGXUHV�WKDW�ZLOO�EHLQFOXGHG�LQ�WKH�YLHZ�

�� &KRRVH� �

:KHQ�\RX�FUHDWH�D�YLHZ�DQG�HQWHU�D�GLIIHUHQWQDPH�LQ�1DPH��WKH�QDPH�RI�WKH�YLHZ�LV�ZKDW�ZDVHQWHUHG�LQ�WKH�PDLQ�VFUHHQ�

:H�ZDQW�WR�LQFOXGH�DOO�WKH�SURFHGXUHV�IRU�DV\VWHP�DXGLW�LQ�WKLV�YLHZ�

�� 6HOHFW�6\VWHP�$XGLW�

�� &KRRVH� �

�� 7R�JHQHUDWH��FKRRVH� �

$�PHVVDJH�LQGLFDWHV�WKDW�WKH�JHQHUDWLRQ�ZDVVXFFHVVIXO�

��� &KRRVH� �

6

5

4

9

7

10

8

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–17

��� &KRRVH� �'LVSOD\�WR�FKHFN�WKH�YLHZ�RI�WKLVVWUXFWXUH�

��� &OLFN�RQ�WKH�6\VWHP�$XGLW�QRGH�����WR�H[SDQG�LW�

7KH�VFUHHQ�RQ�WKH�ULJKW�VKRZV�DOO�WKH�SURFHGXUHVIRU�WKH�$XGLWB$OO�VWUXFWXUH�ZLWK�D�=98(�YLHZ�

11

12

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–18

8VHU�6HFXULW\�$XGLW�-REV

0DQ\�RI�WKH�XVHU�VHFXULW\�DXGLW�MREV�SURJUDPV�DUH�LQFOXGHG�DV�SDUW�RI�WKH�$,6��DV�ZHOO�LQ�WKHVWDQGDUG�5���6\VWHP�

:KDW

7KHUH�DUH�VHYHUDO�SUHGHILQHG�6$3�VHFXULW\�UHSRUWV��LQFOXGLQJ�< 56865��� &KHFN�IRU�GHIDXOW�SDVVZRUG�RQ�XVHU�,'V�6$3 �DQG�'',&

< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�XVHUV�ZKR�DUH�ORFNHG�GXH�WR�LQFRUUHFW�ORJRQ

7KLV�UHSRUW�VKRXOG�EH�VFKHGXOHG�WR�UXQ�HDFK�GD\��MXVW�EHIRUH�PLGQLJKW�< 56865��� /LVWV�XVHUV�ZLWK�LQFRPSOHWH�DGGUHVV�GDWD< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV��ZLWK�WKH�RSWLRQ�WR�VHOHFW�WKH

FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�XVHUV�DQG�VKRZV�FKDQJHV�PDGH�WR�D�XVHU·V

VHFXULW\< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�SURILOHV�DQG�VKRZV�FKDQJHV�PDGH�WR�VHFXULW\

SURILOHV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�DXWKRUL]DWLRQV�DQG�VKRZV�FKDQJHV�PDGH�WR

VHFXULW\�DXWKRUL]DWLRQV

6RPH�RI�WKHVH�UHSRUWV�KDYH�SDUDPHWHU�WDEOHV�WKDW�QHHG�WR�EH�SURSHUO\�PDLQWDLQHG�IRU�EHVWXVH��5HYLHZ�DQG�DQDO\]H�WKHVH�UHSRUWV�EDVHG�RQ�\RXU�NQRZOHGJH�RI�WKH�FRPSDQ\��+RZHYHU�EH�DZDUH�WKDW�VHFXULW\�LVVXHV�PD\�H[LVW��,I�\RX�KDYH�D�VPDOO�FRPSDQ\��WKHVH�LVVXHV�FDQQRW�EHDYRLGHG�EHFDXVH�RQH�SHUVRQ�RIWHQ�PXVW�ZHDU�PDQ\�GLIIHUHQW�KDWV�

:K\

<RXU�H[WHUQDO�DXGLWRUV�PD\�UHTXLUH�VRPH�RI�WKHVH�UHSRUWV�WR�EH�H[HFXWHG�DV�SDUW�RI�WKHDQQXDO�ILQDQFLDO�DXGLW�

+RZ

<RX�FDQ�XVH�RQH�RI�WKH�IROORZLQJ�WUDQVDFWLRQV�RU�PDQQHUV�< 6$����$%$3��([HFXWH�3URJUDP�

7KLV�WUDQVDFWLRQ�RQO\�DOORZV�WKH�SURJUDP�WR�EH�H[HFXWHG�< 6(����7KH�REMHFW�QDYLJDWRU�

< 7KH�8VHU�,QIRUPDWLRQ�6\VWHP�2QO\�WKH�6$���PDQQHU�LV�GHVFULEHG�EHORZ�

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–19

6$���²�$%$3��([HFXWH�3URJUDP

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SA38�DQG�FKRRVH�(QWHU�

�� ,Q�3URJUDP��HQWHU�WKH�UHSRUWQDPH�

�� &KRRVH� �

�1RWHV�IRU�6SHFLILF�5HSRUWV

56865�����OLVWV�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV��< 7KHVH�FRPELQDWLRQV�DUH�PDLQWDLQHG�RQ�WDEOH�68.5,�< 'DQJHURXV�FRPELQDWLRQV�LQFOXGH�WKH�IROORZLQJ�WUDQVDFWLRQV�

� 5=����ZLWK�DQ\WKLQJ�� 5=����ZLWK�DQ\WKLQJ�� 6(�� �ZLWK�DQ\WKLQJ�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�

$XGLW�7DVNV��60����67$7��67���

5HYLHZLQJ�9DOLGLW\�RI�1DPHG�8VHUV

:KDW

$OO�XVHUV�ZKR�KDYH�OHIW�WKH�FRPSDQ\�VKRXOG�KDYH�WKHLU�5���DFFHVV�WHUPLQDWHG�LPPHGLDWHO\�%\�ORFNLQJ�RU�GHOHWLQJ�WKHVH�XVHU�,'V��\RX�OLPLW�DFFHVV�WR�RQO\�WKRVH�XVHUV�ZKR�VKRXOG�KDYHDFFHVV�WR�5����3HULRGLF�UHYLHZ�DVVXUHV�WKDW�WKH�WDVN�RI�ORFNLQJ�RU�GHOHWLQJ�KDV�EHHQFRPSOHWHG�

1RWH��,I�WKH�+5�PRGXOH�LV�LPSOHPHQWHG��WKHUH�DUH�PHFKDQLVPV�WKDW�LQWHJUDWH�ZLWK�WKHDXWKRUL]DWLRQ�V\VWHP�WR�KDYH�VXFK�FKDQJHV�LQ�XVHU�DFFHVVHV�RFFXU�DXWRPDWLFDOO\�

:K\

3URSHU�DXGLW�FRQWURO�UHTXLUHV�WKDW�D�XVHU�ZKR�QR�ORQJHU�KDV�D�YDOLG�EXVLQHVV�QHHG�WR�DFFHVV5���VKRXOG�QRW�EH�DOORZHG�WR�GR�VR�

3

2

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–20

'HOHWLQJ�RU�ORFNLQJ�WKHVH�XVHU�,'V�DOVR�SUHYHQWV�DQ\RQH�ZKR�KDG�EHHQ�XVLQJ�WKH�WHUPLQDWHGXVHU�,'�IURP�DFFHVVLQJ�WKH�V\VWHP�ZLWK�WKDW�,'�

2QH�RI�WKH�DXGLW�SURFHGXUHV�WKDW�\RXU�H[WHUQDO�DXGLWRUV�ZLOO�XVH�LV�WR�WHVW�ZKHWKHU�D�SHUVRQZKR�GRHV�QRW�QHHG�WR�DFFHVV�5���KDV�D�OLYH�XVHU�,'�

+RZ

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�68���8VHUV��

�� &KRRVH�SRVVLEOH�HQWULHV�

�� 5HYLHZ�WKH�DFWLYH�XVHUV�

9HULI\�WKDW�WKHVH�XVHUV�DUH�LQGHHGYDOLG�XVHUV�

,Q�D�ODUJH�FRPSDQ\��\RX�VKRXOG�GRD�UDQGRP�DXGLW�RQ�DW�OHDVW�WZHQW\XVHUV��7KH�PLQLPXP�QXPEHUVKRXOG�EH�GHWHUPLQHG�E\�\RXUDXGLWRUV�

2

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–21

5HYLHZLQJ�3URILOHV�IRU�$FFXUDF\�DQG�3HUPLVVLRQ�&UHHS

:KDW

$�SHUPLVVLRQ�FUHHS�LV�DQ�LQFUHPHQWDO�LQFUHDVH�LQ�SHUPLVVLRQV�JLYHQ�WR�D�XVHU�RYHU�WLPH��,IOHIW�XQFKHFNHG��LQFUHDVHG�SHUPLVVLRQV�PD\�JUDQW�D�XVHU�PRUH�DXWKRULW\�LQ�WKH�V\VWHP�WKDQ�LVUHTXLUHG�RU�LQWHQGHG�

:K\

8VHUV�PD\�KDYH�XQGHVLUDEOH�DXWKRUL]DWLRQ�V��RU�FRPELQDWLRQV�

<RXU�H[WHUQDO�DXGLWRUV�PD\�KDYH�DQ�DXGLW�VWHS�WR�FKHFN�IRU�SHUPLVVLRQ�FUHHS�

+RZ

<RX�FDQ�FRQGXFW�D�VSRW�DXGLW�RI�< ,QGLYLGXDOV

� 5HYLHZ�WKH�VHFXULW\�IRUPV�IRU�D�XVHU��FRPSDUH�WKHVH�IRUPV�WR�WKH�DFWLYLW\�JURXSV�DQGSURILOHV�DVVLJQHG�WR�WKDW�XVHU��DQG�LQYHVWLJDWH�LQFRQVLVWHQFLHV�

� 5HYLHZ�WKH�DFWLYLW\�JURXSV�DQG�SURILOHV�DVVLJQHG�WR�WKH�LQGLYLGXDO�IRU�UHDVRQDEOHQHVV�

� 5HYLHZ�WKH�LQGLYLGXDO�SURILOHV�DVVLJQHG�IRU�FRQWHQW�DQG�FKHFN�WR�VHH�LI�WKH�SURILOH�KDVEHHQ�UHFHQWO\�FKDQJHG�

< 3URILOHV��WUDQVDFWLRQ�68����DQG�DXWKRUL]DWLRQV��WUDQVDFWLRQ�68���&KHFN�WR�VHH�LI�WKH�FKDQJH�GDWH�LV�UHFHQW�

<RX�FDQ�DOVR�H[HFXWH�WKH�IROORZLQJ�DXGLW�UHSRUWV�< 56865�����XVHU�FKDQJHV�< 56865�����SURILOH�FKDQJHV�< 56865�����DXWKRUL]DWLRQ�FKDQJHV�

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�WKHVH�UHSRUWV��VHH�WKH�8VHU�6HFXULW\�$XGLW�VHFWLRQ�RQ�SDJH���²���

6\VWHP�/RJ��60���

7KH�5���6\VWHP�ORJV�DOO�V\VWHP�HUURUV��ZDUQLQJV��SURFHVV�PHVVDJHV�LQ�WKH�V\VWHP�ORJ�6\V/RJ���DQG�XVHU�ORFNV�GXH�WR�IDLOHG�ORJ�RQ�DWWHPSWV�IURP�NQRZQ�XVHUV��7KH�6\V/RJ�ZULWHVWR�WZR�GLIIHUHQW�W\SHV�RI�ORJV�< /RFDO�/RJV< &HQWUDO�/RJV

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–22

8VH�WKH�WUDQVDFWLRQ�60���WR�DFFHVV�WKH�V\VWHP�ORJ�RXWSXW�VFUHHQ��:LWK�WKLV�WUDQVDFWLRQ��\RX�FDQ�UHDG�DQ\�RIWKH�PHVVDJHV�WKDW�DUH�FRQWDLQHG�LQ�WKH�V\VWHP�ORJV��<RX�FDQ�PRGLI\�WKH�YLHZ�WR�PHHW�\RXU�QHHGV��$�ZLGHUDQJH�RI�VHOHFWLRQ�FULWHULD�LV�DYDLODEOH�WR�DQDO\]H�WKH�V\VWHP�

7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�V\VWHP�ORJ�IRU�PRQLWRULQJ�VHFXULW\�LVVXHV�VXFK�DV�IDLOHG�ORJRQDWWHPSWV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM21�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV→�$GPLQLVWUDWLRQ�→0RQLWRULQJ�→�6\VWHP�/RJ��

�� 6SHFLI\�WKH�VHOHFWLRQ�FULWHULD�IRU�\RXUV\VWHP�ORJ�DQDO\VLV�UHSRUW��IRUH[DPSOH��)URP�GDWH�WLPH��7R�GDWH�WLPH�8VHU��7UDQVDFWLRQ�FRGH��3URFHVV�3UREOHP�FODVV��HWF�

�� �2SWLRQDO��<RX�PD\�HQWHU�WKHPHVVDJH�QXPEHUV��IRU�H[DPSOH��US-3��IRU�IDLOHG�ORJRQ�DWWHPSWV�IRUORFNHG�XVHUV��DQG�FKRRVH� �8VH�

�� &KRRVH� �WR�GLVSOD\�WKH�V\VWHP�ORJUHSRUW�

�� 2Q�WKH�6\VWHP�ORJ��/RFDO�$QDO\VLVVFUHHQ��\RX�FDQ�YLHZ�WKH�V\VWHP�ORJDQDO\VLV�UHSRUW�DQG�GULOO�GRZQ�HDFKLWHP�IRU�GHWDLO��LI�QHFHVVDU\��

�� &KRRVH� �

6

2

3

4

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–23

/RFDO�/RJV

(DFK�5���$SSOLFDWLRQ�6HUYHU�KDV�D�ORFDO�ORJ�WKDW�UHFHLYHV�DOO�WKH�PHVVDJHV�RXWSXW�E\�WKLVVHUYHU��6\V/RJ�UHFRUGV�WKHVH�PHVVDJHV�LQ�D�FLUFXODU�ILOH�RQ�WKH�VHUYHU���7KLV�PHDQV�WKDW�ZKHQWKLV�ORJ�ILOH�UHDFKHV�WKH�PD[LPXP�SHUPLVVLEOH�OHQJWK��6\V/RJ�RYHUZULWHV�LW��VWDUWLQJ�RYHUIURP�WKH�EHJLQQLQJ��

&HQWUDO�/RJV

:H�UHFRPPHQG�WKDW�\RX�DOVR�PDLQWDLQ�D�FHQWUDO�ORJ�ILOH�RQ�D�VHOHFWHG�DSSOLFDWLRQ�VHUYHU�(DFK�LQGLYLGXDO�DSSOLFDWLRQ�VHUYHU�WKHQ�VHQGV�LWV�ORFDO�ORJ�PHVVDJHV�WR�WKLV�VHUYHU��7KHVHUYHU�WKDW�\RX�GHVLJQDWH�WR�PDLQWDLQ�WKH�FHQWUDO�ORJ�FROOHFWV�WKH�PHVVDJHV�IURP�WKH�RWKHUDSSOLFDWLRQ�VHUYHUV�DQG�ZULWHV�WKHVH�PHVVDJHV�WR�WKH�FHQWUDO�ORJ�

7KH�FHQWUDO�ORJ�FRQVLVWV�RI�WZR�ILOHV��WKH�DFWLYH�ILOH�DQG�WKH�ROG�ILOH��WKH�ORFDWLRQ�RI�WKH�DFWLYHILOH�LV�VSHFLILHG�LQ�WKH�UVOJ�FHQWUDO�ILOH SURILOH�SDUDPHWHU��WKH�ORFDWLRQ�RI�WKH�ROG�ILOH�LV�VSHFLILHGLQ�WKH�UVOJ�FHQWUDO�ROGBILOH��

7KH�DFWLYH�ILOH�FRQWDLQV�WKH�FXUUHQW�ORJ��:KHQ�LW�UHDFKHV�WKH�PD[LPXP�VL]H��WKH�V\VWHPZULWHV�WR�WKH�ROG�ORJ�ILOH��PDNHV�WKH�SUHYLRXVO\�DFWLYH�ILOH�WKH�ROG�ILOH��DQG�FUHDWHV�D�QHZDFWLYH�ILOH��7KH�VZLWFK�RFFXUV�ZKHQ�WKH�VL]H�RI�WKH�DFWLYH�ORJ�ILOH�LV�KDOI�WKH�YDOXH�DV�VSHFLILHGLQ�WKH�UVOJ�PD[BGLVNVSDFH�FHQWUDO SDUDPHWHU�

6WDWLVWLF�5HFRUGV�LQ�&&06��67$7�

7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06��SHUIRUPDQFH�DQDO\VLV�WRROV�ZLWKLQ�5��ORJV�DOO�5���DFWLYLWLHV�FDWHJRUL]HG�E\�WUDQVDFWLRQ�DQG�XVHU�LQ�VWDWLVWLFDO�UHFRUGV�WKDW�FDQ�EHXVHIXO�IRU�DXGLW�WUDLO�SXUSRVHV��<RX�FDQ�DFFHVV�WKHVH�UHFRUGV�ZLWK�WKH�WUDQVDFWLRQ�67$7�RUIURP�WKH�6$3�VWDQGDUG�PHQX��7KLV�WUDQVDFWLRQ�SURYLGHV�\RX�ZLWK�WKH�GHWDLOHG�VWDWLVWLFDOUHFRUGV��LQFOXGLQJ�XVHU�VWDWLVWLFV��

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–24

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�STAT�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ0RQLWRU�→�3HUIRUPDQFH�→�:RUNORDG→�6WDWLVWLFV�UHFRUGV��

�� 3URYLGH�WKH�GHVLUHG�VHOHFWLRQ�FULWHULD�IRU�H[DPSOH��E\�HQWHULQJ�FULWHULD�IRUXVHU��WUDQVDFWLRQ��SURJUDP��WDVNW\SH��ZRUN�SURFHVV�QXPEHU��VWDUW�WLPH��HWF���

�� &KRRVH� �WR�GLVSOD\�WKH�VWDWLVWLFUHFRUGV�

7KH�:RUNORDG��'LVSOD\�6WDWLVWLFDO5HFRUGV�VFUHHQ�DSSHDUV�

�� 3ODFH�WKH�FXUVRU�LQ�WKH�XVHU�LQIRUPDWLRQ�DQG�GRXEOH�FOLFN�IRUIXUWKHU�GHWDLOHG�LQIRUPDWLRQ�

�� &KRRVH� �

5

2

3

4

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–25

67���²�8VHU�3URILOH

7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06���WUDQVDFWLRQ�67���¥�8VHU�3URILOH��FDQ�EH�XVHG�WR�FROOHFWLQIRUPDWLRQ�DERXW�< 7KH�VHUYHUV�DQG�ORJJHG�RQ�XVHUV< 8VHU�DQG�VHUYHUV�LQ�XVH

7KH�XVHU�SURILOH�OLVW�SURYLGHV�\RX�ZLWK�DQ�RYHUYLHZ�RI�WKH�ORJJHG�RQ�XVHUV�DQG�WKHLU�DFFXPXODWHG�UHVSRQVHWLPHV��7KH�GHWDLO�VFUHHQ�VKRZV�WKH�OLVW�RI�XVHUV�WRJHWKHU�ZLWK�WKHLU�GLDORJ�VWHSV�DFWLYLW\�DQG�UHVSRQVH�WLPHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�ST03�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�$GPLQLVWUDWLRQ�→�0RQLWRU�→3HUIRUPDQFH�→�:RUNORDG�→�67���¥$QDO\VLV��

�� &KRRVH�3HUIRUPDQFH�GDWDEDVH�

�� &KRRVH�RQH�RI�WKH�IROORZLQJ�ZKHQWKH�GLDORJ�ER[�DSSHDUV�< 6LQJOH�VWDW��UHFRUGV< 7RGD\·V�ZRUNORDG< /DVW�PLQXWH�ZRUNORDG< /RFDO�DOHUW�PRQLWRU

�� &KRRVH�*RWR�→�8VHU�3URILOH�WR�REWDLQWKH�:RUNORDG��8VHU�3URILOH�5HSRUW�

2

3

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–26

�� 7KH�:RUNORDG��8VHU�3URILOH�5HSRUWVFUHHQ�DSSHDUV�

�� 'RXEOH�FOLFN�RQ�WKH�XVHU�QDPH�LQ�WKH8VHU�FROXPQ�WR�REWDLQ�DGGLWLRQDOGHWDLOHG�LQIRUPDWLRQ�UHJDUGLQJ�WKHWUDQVDFWLRQ�DFWLYLW\�E\�XVHU�LQ�D�OLVWIRUPDW�

7KH�GHWDLOHG�WUDQVDFWLRQ�LQIRUPDWLRQDSSHDUV�IRU�WKH�FKRVHQ�XVHU�

�� &KRRVH� �

7

6

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–27

/RJJLQJ�RI�6SHFLILF�$FWLYLWLHV

5���ORJV�RWKHU�VSHFLILF�DFWLYLWLHV�LQ�YDULRXV�ORJV��:H�GLVFXVV�WKH�IROORZLQJ�VSHFLILF�ORJVEHORZ�

/RJJLQJ�&KDQJHV�WR�7DEOH�'DWD

:H�UHFRPPHQG�WKDW�\RX�DFWLYDWH�WKH�ORJJLQJ�RI�WDEOH�GDWD�IRU�WKRVH�WDEOHV�WKDW�DUH�FULWLFDO�RUVXVFHSWLEOH�WR�DXGLWV��$JDLQ��\RX�PXVW�H[SOLFLWO\�DFWLYDWH�WKLV�ORJJLQJ��1RWH�WKH�IROORZLQJ�< <RX�PXVW�VWDUW�WKH�5���6\VWHP�ZLWK�WKH�UHF�FOLHQW SURILOH�SDUDPHWHU�VHW��7KLV�SDUDPHWHU

VSHFLILHV�5���ORJV�IRU�DOO�FOLHQWV�RU�RQO\�VSHFLILF�FOLHQWV��:H�UHFRPPHQG�VHWWLQJ�WKLVSDUDPHWHU�WR�ORJ�DOO�FOLHQWV�LQ�\RXU�SURGXFWLYH�V\VWHP�

< 6HW�WKH�/RJ�GDWD�FKDQJHV IODJ�IRU�WKRVH�WDEOHV�WKDW�\RX�ZDQW�WR�KDYH�ORJJHG��,I�ERWK�RIWKHVH�FRQGLWLRQV�DUH�PHW��WKH�GDWDEDVH�ORJV�WDEOH�FKDQJHV�LQ�WKH�WDEOH�'%7$%357��6HWWLQJ�WKH�/RJ�GDWD�FKDQJHV IODJ�RQO\�GRHV�QRW�VXIILFH�LQ�UHFRUGLQJ�WDEOH�FKDQJHV��\RXPXVW�DOVR�VHW�WKH�UHF�FOLHQW SDUDPHWHU���<RX�FDQ�YLHZ�WKHVH�ORJV�ZLWK�WKH�WUDQVDFWLRQ6&8���:LWKLQ�5���5HOHDVH����$�RU�JUHDWHU��\RX�PD\�FDOO�UHSRUW�56973527�IRU�WKHHYDOXDWLRQ�RI�WKH�ERWK�� 7KH�FXVWRPL]LQJ�REMHFW�DQG�WDEOH�ORJ�GDWDEDVH� 5HSRUW�567%+,67�IRU�WDEOH�DQDO\VLV�ZLWK�KLVWRU\

,I�D�VWDQGDUG�GHOLYHUHG�6$3�WDEOH�LV�QRW�VHW�XS�WR�SHUPLW�ORJJLQJ�RI�FKDQJHV�DQG�\RXZLVK�WR�FKDQJH�LW��WKHQ�WKLV�DFWLRQ�LV�FRQVLGHUHG�D�PRGLILFDWLRQ�WR�WKH�5���6\VWHP��7RVHH�LI�D�WDEOH�SHUPLWV�ORJJLQJ�RI�FKDQJHV��JR�WR�WUDQVDFWLRQ�6(���RU�6(���DQG�ORRN�DW�WKHGDWDEDVH�WDEOH·V�WHFKQLFDO�VHWWLQJV��WKLV�LV�D�EXWWRQ�LQVLGH�RI�WKH�VFUHHQ�ZKHUH�WKH�WDEOH�LVGHILQHG��DW�WKH�ILHOG�FDOOHG�/RJ�GDWD�FKDQJHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCU3�DQG�FKRRVH�(QWHU�

�� 6HOHFW�/LVW�RI�FKDQJH�GRFV�

�� &KRRVH� �WR�REWDLQ�WKH�DQDO\VLV�RIWKH�FKDQJH�GRFXPHQWV�OLVW�IRU�ERWKFXVWRPL]LQJ�REMHFWV�DQG�WDEOHV�

2

3

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–28

�� 5XQ�WKH�(YDOXDWLRQ�RI�FKDQJH�ORJVSURJUDP��56973527�IRU�WKHHYDOXDWLRQ�RI�ERWK�WKH�FXVWRPL]LQJREMHFW�DQG�WDEOH�ORJ�GDWDEDVH��ZLWKWKH�DSSURSULDWH�VHOHFWLRQ�FULWHULD�

�� &KRRVH� �WR�WKH�GLVSOD\�WKH�UHFRUGV�

7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RXDUH�EURXJKW�WR�WKH�(YDOXDWLRQ�RIFKDQJH�ORJV�VFUHHQ�

�� &KRRVH� �

5

6

Chapter 13: SAP Security Audit and Logging

Logging Changes to User Master Records, Profiles, and Authorizations

Release 4.6A/B13–29

/RJJLQJ�&KDQJHV�WR�8VHU�0DVWHU�5HFRUGV��3URILOHV��DQG

$XWKRUL]DWLRQV

5���ORJV�FKDQJHV�PDGH�E\�D�XVHU�DGPLQLVWUDWRU�LQ�QRQWUDQVSDUHQW�WDEOHV�LQ�WKH�GDWDEDVH�$FFHVV�WR�WKHVH�WDEOHV�LV�SURWHFWHG�E\�WKH�5���DXWKRUL]DWLRQ�FRQFHSW��2QFH�WKHVH�ORJV�KDYHEHHQ�DUFKLYHG��WKH\�DUH�GHOHWHG��'HSHQGLQJ�RQ�\RXU�UHOHDVH��XVH�HLWKHU�WKH�DXWKRUL]DWLRQLQIRV\VWHP�RU�WUDQVDFWLRQ�68���WR�DFFHVV�WKHVH�ORJV��<RX�FDQ�YLHZ�WKH�IROORZLQJ�FKDQJHV�< &KDQJHV�PDGH�GLUHFWO\�WR�D�XVHU·V�DXWKRUL]DWLRQ

7KHVH�DUH�FKDQJHV�PDGH�WR�WKH�SURILOH�OLVW�LQ�WKH�XVHU·V�PDVWHU�UHFRUG��7KLV�GRHV�QRWLQFOXGH�LQGLUHFW�FKDQJHV�WKDW�RFFXU�ZKHQ�DXWKRUL]DWLRQV�RU�SURILOHV�DUH�FKDQJHG��9LHZWKH�FKDQJH�GRFXPHQWV�IRU�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�WR�FKHFN�WKRVH�FKDQJHV�

< &KDQJHV�WR�WKH�� 8VHU�SDVVZRUG��KDVKHG�UHSUHVHQWDWLRQ�RQO\�� 8VHU�W\SH� 8VHU�JURXS� 9DOLGLW\�SHULRG� $FFRXQW�QXPEHU

< &KDQJHV�PDGH�GLUHFWO\�WR�SURILOHV�RU�DXWKRUL]DWLRQV�

)RU�PRUH�LQIRUPDWLRQ��VHH�%&�8VHUV�DQG�$XWKRUL]DWLRQV�→�&UHDWLQJ�DQG�0DLQWDLQLQJ�8VHU0DVWHU�5HFRUGV�→�'LVSOD\LQJ�&KDQJH�'RFXPHQWV�

Chapter 13: SAP Security Audit and Logging

Logging Changes to User Master Records, Profiles, and Authorizations

Authorizations Made Easy13–30

14–1

&KDSWHU���� 8SJUDGH

&RQWHQWV

Before Doing Any Upgrade ..................................................................................14–2

Validation Steps After Upgrading Is Completed................................................14–3

Converting Previously Created SU02 Profiles into Activity Groups ...............14–4

Upgrade from a Release Prior to 3.1x to 4.6 A/B .............................................14–11

Upgrade from Release 3.0F to 4.6 A/B..............................................................14–12

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B..........................................14–14

Upgrade from Releases 4.0x or 4.5x to 4.6 A/B ...............................................14–22

����

Chapter 14: Upgrade

Before Doing Any Upgrade

Authorizations Made Easy14–2

%HIRUH�'RLQJ�$Q\�8SJUDGH

%HIRUH�GRLQJ�DQ\�XSJUDGH��\RX�VKRXOG�

�� 5HYLHZ�WKH�6$31HW�²�5���)URQWHQG�QRWHV�IRU�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ�WR�:KHQ�VHDUFKLQJ�5���6$31HW�²�5���)URQWHQG�QRWHV��SHUIRUP�VHYHUDO�VHDUFKHV��)RUH[DPSOH��ILUVW�VHDUFK�RQ�WKH�FRPSRQHQW�%&�&&0�86 ��7KHQ�VHDUFK�RQ�WKH�NH\�ZRUGVauthorization��security��DQG�user master�IRU�WKH�UHOHDVH�\RX�DUH�SODQQLQJ�WRZRUN�RQ�

�� 5HYLHZ�UHOHDVH�QRWHV�UHODWHG�WR�DXWKRUL]DWLRQV�IRU�DOO�YHUVLRQV�EHWZHHQ�WKH�YHUVLRQ�\RXDUH�FXUUHQWO\�XVLQJ�DQG�WKH�YHUVLRQ�\RX�ZLOO�EH�LPSOHPHQWLQJ��)RU�H[DPSOH��LI�\RX�DUHXSJUDGLQJ�IURP����+�WR����%��UHDG�WKH�UHOHDVH�QRWHV�IRU�YHUVLRQV����,�����$�����%�����$����%�����$��DQG����%��7R�UHYLHZ�WKH�UHOHDVH�QRWHV��FKRRVH�+HOS�→�5HOHDVH�QRWHV�RQ�\RXUV\VWHP��6HOHFW�WKH�&RPSOHWH�OLVW�5HO������DQG�WKHQ�FKRRVH�WKH�VSHFLILF�UHOHDVH�\RX�ZDQW�WRJHW�LQIRUPDWLRQ�RQ��,Q�WKH�WUHH�VWUXFWXUH�WKDW�DSSHDUV��XVH�WKH�VHDUFK�IXQFWLRQ�DQGSHUIRUP�D�VHDUFK�RQ�WKH�ZRUGV�authorization��checks��DQG�security��$OVR��\RXZLOO�ZDQW�WR�UHDG�WKH�VHFWLRQ�RQ�WKH�WUHH�EHQHDWK�%DVLV�→�&RPSXWHU�&HQWHU�0DQDJHPHQW6\VWHP�→�8VHUV�DQG�$XWKRUL]DWLRQV��5HYLHZ�WKH�UHOHDVH�QRWHV�EHFDXVH�WKH\�WHOO�\RX�ZKDWQHZ�IXQFWLRQDOLW\�LV�QRZ�DYDLODEOH��DV�ZHOO�DV�FKDQJHV�WR�H[LVWLQJ�IXQFWLRQDOLW\�WKDW�\RXPD\�QHHG�WR�FRQVLGHU�LQ�WKH�QHZ�XSJUDGHG�HQYLURQPHQW�

%H�DZDUH�WKDW�WKH�DERYH�PHQWLRQHG�UHOHDVH�QRWHV�RQO\�WHOO�\RX�ZKDW�LV�QHZ�IRU�WKH�WRROLWVHOI��,W�GRHV�QRW�WHOO�\RX�DERXW�QHZ�DXWKRUL]DWLRQV�DQG�WKH�SXUSRVH�RI�QHZDXWKRUL]DWLRQV�LQ�DSSOLFDWLRQV��)RU�LQIRUPDWLRQ�DERXW�QHZ�DXWKRUL]DWLRQ�IXQFWLRQDOLW\DYDLODEOH�ZLWKLQ�D�SDUWLFXODU�DSSOLFDWLRQ��\RX�PXVW�UHDG�WKH�UHOHDVH�QRWHV�IRU�WKDWSDUWLFXODU�DSSOLFDWLRQ�

�� 'HYLVH�D�EDFNXS�DQG�GLVDVWHU�UHFRYHU\�SODQ�IRU�DXWKRUL]DWLRQV��%H�UHDOLVWLF��,I�\RX�KDYHGRQH�H[WHQVLYH�PRGLILFDWLRQV�RU�FKDQJHV�WR�VWDQGDUG�6$3�5���ORJLF��WKHVH�FKDQJHV�PD\FDXVH�SUREOHPV�DIWHU�WKH�XSJUDGH��<RX�PD\�ZDQW�WR�FUHDWH�D�WHPSRUDU\�JURXS�RI�DFWLYLW\JURXSV�WKDW�FDQ�EH�XVHG�LQ�WKH�LQWHULP�VR�RSHUDWLRQV�FDQ�FRQWLQXH��'LVFXVV�\RXU�EDFNXSSODQ�ZLWK�WKH�SURMHFW�PDQDJHPHQW�RU�V\VWHP�DGPLQLVWUDWRUV��$�JRRG�LGHD�LV�WR�FUHDWHWKHVH�WHPSRUDU\�DFWLYLW\�JURXSV�LPPHGLDWHO\�ZKHQ�\RX�JHW�DFFHVV�WR�WKH�QHZ�V\VWHP�

�� 0DNH�FHUWDLQ�WKDW�WKH�%DVLV�WHDP�UHFRJQL]HV�DQG�DSSURSULDWHO\�DOORFDWHV�LQ�WKH�XSJUDGHWLPHOLQH�WKDW�WKH�DXWKRUL]DWLRQ�SHUVRQ�LV�DQ�LQWHJUDO�SDUW�RI�WKH�XSJUDGH�SURFHGXUH��DQGWKDW�WKH�XSJUDGH��IURP�D�WHFKQLFDO�SHUVSHFWLYH��LV�QRW�FRPSOHWH�XQWLO�WKH�DXWKRUL]DWLRQVSRUWLRQ�LV�DOVR�FRPSOHWH�

�� ,I�\RX�KDYH�PDGH�DQ\�FKDQJHV�ZLWK�68����WKHQ�LW�LV�KLJKO\�DGYLVDEOH�WKDW�\RX�GRZQORDGWR�D�ORFDO�ILOH��DQG�VDYH�RXWVLGH�RI�WKH�5���6\VWHP��WKH�FRQWHQWV�RI�WKH�WZR�WDEOHV862%7B&�DQG�862%;B&�IURP�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ��7KHVH�WDEOHV�PD\�EHQHHGHG�LQ�WKH�HYHQW�WKDW�D�GLVDVWHU�UHFRYHU\�QHHGV�WR�EH�SHUIRUPHG�

Chapter 14: Upgrade

Validation Steps After Upgrading Is Completed

Release 4.6 A/B14–3

,Q�WKLV�FKDSWHU��ZH�VKRZ�\RX�WKH�VWHSV�UHTXLUHG�DIWHU�DQ�5���6\VWHP�XSJUDGH��7KLVLQIRUPDWLRQ�LV�DGYDQWDJHRXV�LPPHGLDWHO\�DIWHU�\RXU�XSJUDGH��%H�VXUH�WR�UHDG�WKLV�FKDSWHUEHIRUH�FRQWLQXLQJ�\RXU�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU��3*��LQ�D�QHZ�UHOHDVH�

7KH�VSHFLILF�VWHSV�LQYROYHG�DIWHU�WKH�XSJUDGH�GHSHQG�RQ�WKH�VRXUFH�DQG�WDUJHW�UHOHDVH�\RXDUH�FRPLQJ�IURP�

9DOLGDWLRQ�6WHSV�$IWHU�8SJUDGLQJ�,V�&RPSOHWHG

�� ,QVWDOO�DGG�RQ�FRPSRQHQWV�WR�WKH�XSJUDGHG�V\VWHP��LI�DQ\��DORQJ�ZLWK�ZKDWHYHUDXWKRUL]DWLRQV�FRPH�ZLWK�WKDW�DGG�RQ�FRPSRQHQW��IRU�H[DPSOH�GHGXFWLRQ�PDQDJHPHQWFRPSRQHQWV��$XGLW�,QIRUPDWLRQ�V\VWHP��

�� 8SJUDGH�WKH�UHSRUW�WUHH�PLJUDWLRQ�

7KH�GDWD�VWUXFWXUH�RI�WKH�UHSRUW�WUHHV�FKDQJHV��7R�FRQWLQXH�XVLQJ�\RXU�VHOI�FUHDWHG�UHSRUWWUHHV��WKH\�PXVW�EH�DGMXVWHG�WR�WKH�FKDQJHG�GDWD�VWUXFWXUHV��7KH�6$3�SURYLGHG�UHSRUWWUHHV�JHQHUDWH�LQWR�DUHD�PHQXV�DXWRPDWLFDOO\��7KH�PLJUDWLRQ�LV�SHUIRUPHG�XVLQJ�WKHWUDQVDFWLRQ�5775((B0,*5$7,21��7KH�WUDQVDFWLRQ�LV�H[HFXWHG�LQ�WKH�FOLHQW�FRQWDLQLQJWKH�SURGXFWLRQ�YHUVLRQV�RI�WKH�UHSRUW�WUHHV��'XULQJ�WKH�PLJUDWLRQ��WUDQVDFWLRQ�FRGHV�DUHDXWRPDWLFDOO\�DVVLJQHG�IRU�DOO�UHSRUWV�LQ�D�WUHH��7KLV�PDNHV�LW�SRVVLEOH�WR�DGG�UHSRUWV�WRWKH�XVHU�PHQX�LQ�DFWLYLW\�JURXS�PDLQWHQDQFH��,I�\RX�ZDQW�WR�FUHDWH�WUDQVDFWLRQ�FRGHVZLWK�D�FRPSDQ\�VSHFLILF�SUHIL[��\RX�FDQ�VHW�WKLV�E\�JRLQJ�WR�WKH�6$3�5HIHUHQFH�,0*�DQGFKRRVLQJ�%DVLV�&RPSRQHQWV�→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUV�DQG�$XWKRUL]DWLRQV�→�6HWQDPHVSDFH�IRU�UHSRUW�WUHH�PLJUDWLRQ�DQG�VSHFLILF�,0*�DFWLYLWLHV�

�� 9DOLGDWH�WKH�XVHU�PDVWHU�UHFRUGV�IRU�QHZ�ILHOGV�ZLWK�QHZ�YDOXHV��LI�QHHGHG��68����

�� (QVXUH�WKDW�WKH�3*�DQG�RWKHU�V\VWHP�SDUDPHWHUV�DUH�VHOHFWHG�DV�UHTXLUHG��VHH�FKDSWHU���6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU��

�� 8SJUDGH�WKH�DFWLYLW\�JURXSV�ZLWK�WUDQVDFWLRQ�68���DQG�SHUIRUP�VWHSV��$�WR��'�

�� 8VH�XVHU�PDVWHU�UHFRQFLOLDWLRQ��WUDQVDFWLRQ�3)8'���LI�QHHGHG

0DNH�FHUWDLQ�WKDW�\RXU�UHSRUW�WUHHV�KDYH�XSJUDGHG�SURSHUO\��,I�XSJUDGLQJ�IURP�5HOHDVH����[RU�EHORZ�WR������VRPH�FRUH�FKDQJHV�KDYH�EHHQ�PDGH�WR�WKH�IXQFWLRQDOLW\�DQG�SUHVHQWDWLRQ�RIUHSRUW�WUHHV�

,I�XSJUDGLQJ�IURP����[�RU�EHORZ�WR������EH�DZDUH�WKDW�WKHUH�\RX�DUH�QRZ�LQYROYHG�LQ�DV\VWHP�WKDW�KDV�D�ORW�PRUH�IXQFWLRQDOLW\�WR�GHDO�ZLWK�WKH�ZRUOG�´RXWVLGHµ�RI�5����7KHVH�FDOOVWKDW�ZRUN�RXWVLGH�RI�5���DUH�FRPPRQO\�KDQGOHG�WKURXJK�YHU\�VSHFLDO�W\SHV�RI�IXQFWLRQPRGXOH��$�IXQFWLRQ�PRGXOH�EHORQJV�WR�D�IXQFWLRQ�JURXS��7KH�6B5)&�DXWKRUL]DWLRQ�REMHFW�LVFULWLFDO�LQ�V\VWHPV�PRUH�UHFHQW�WKDQ����[��7KLV�DXWKRUL]DWLRQ�REMHFW�PD\�EH�WRWDOO\�´VKXW�RIIµYLD�D�563$5$0�SDUDPHWHU�YDOXH��EXW�ZH�GR�QRW�VXJJHVW�VKXWWLQJ�LW�RII��$V�VXFK��\RX�ZLOOQHHG�WR�GHDO�ZLWK�6B5)&�DIWHU�WKH�XSJUDGH�

)LUVW�XSJUDGH�\RXU�'(9�V\VWHP��3HUIRUP�DOO�WKH�VWHSV�LQ�'(9��'HWHUPLQH�ZKDW�LV�DQG�ZKDWLV�QRW�WUDQVSRUWDEOH�WR�WKH�4$6�V\VWHP�DQG�35'�V\VWHP��$OPRVW�QRWKLQJ�QHHGV�WR�EH�GRQHGLUHFWO\�LQ�35'�DV�\RX�VKRXOG�EH�DEOH�WR�WUDQVSRUW�DOPRVW�HYHU\WKLQJ�IURP�'(9��1R�RQHVKRXOG�HYHU�DWWHPSW�WR�XSGDWH�DXWKRUL]DWLRQV�LQ�VROHO\�35'�

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–4

7KH�XVHU�PDVWHU�UHFRUG�KDV�UHPDLQHG�UHODWLYHO\�WKH�VDPH�WKURXJKRXW�WKH�UHOHDVHV��+RZHYHU�WKHUH�DUH�WZR�WKLQJV�WKDW�VKRXOG�EH�QRWHG�LQ�WUDQVDFWLRQ�68���< 2Q�WKH�'HIDXOWV�WDE��WKHUH�DUH�WZR�QHZ�ILHOGV�

� 3HUVRQDO�WLPH�]RQH�²�7KLV�ILHOG�VKRXOG�EH�ILOOHG�LQ�DIWHU�WKH�XSJUDGH��$�VPDOOFRQYHUVLRQ�SURJUDP�FDQ�EH�ZULWWHQ�WR�ILOO�WKLV�ILHOG�

� 'DWH�IRUPDW�²�7KLV�QHZ�ILHOG�SHUPLWV�\RX�WR�XVH�WKH�GDWH�IRUPDW�<<<<�00�''��EHDZDUH�WKDW�VRPH�SODFHV�LQ�5���KDYH�QRW�EHHQ�FRGHG�\HW�WR�UHFRJQL]H�WKLV�QHZIRUPDW��

< 2Q�WKH�$GGUHVV�WDE��WKHUH�LV�DGGUHVV�LQIRUPDWLRQ�DERXW�WKH�XVHU��7KLV�DGGUHVVLQIRUPDWLRQ�LV�OLQNHG�WR�WKH�����LQWURGXFHG�IXQFWLRQDOLW\�IRU�WKH�FHQWUDO�DGGUHVVPDQDJHPHQW�FRPSRQHQW�RI�5���

&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\

*URXSV

&UHDWLQJ�DQ�$FWLYLW\�*URXS�IURP�0DQXDOO\�0DLQWDLQHG�3URILOHV

,I�\RX�FUHDWHG�SURILOHV�PDQXDOO\�XVLQJ�WUDQVDFWLRQ�68����\RX�FDQ�FUHDWH�DQ�DFWLYLW\�JURXS�IURP�WKHVHSURILOHV��7KH�SURILOHV�FDQ�EH�VLQJOH��DV�ZHOO�DV�FRPSRVLWH��8VH�WUDQVDFWLRQ�68����8SJUDGH�DQG�ILUVWLQVWDOODWLRQ��

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�

2

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–5

�� 5HDG�WKH�,PSRUWDQW�LQIRUPDWLRQZLQGRZ�

�� &KRRVH� �

7KH�V\VWHP�SURSRVHV�DOO�WKH�PDQXDOO\FUHDWHG�SURILOHV�

�� 6HOHFW�WKH�SURILOH�\RX�ZDQW�WRFRQYHUW�WR�DQ�DFWLYLW\�JURXS��IRUH[DPSOH��1$)�3*�����

�� &KRRVH� �2SWLPL]HG�

6HH�WKH�GRFXPHQWDWLRQ�IURP�WKH,PSRUWDQW�LQIRUPDWLRQ�ZLQGRZ�DERYH�IRUWKH�EHQHILWV�RI�WKLV�RSWLRQ�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�XVH� �,GHQWLFDO�WR�SURILOH�LI�\RX�ZRXOG�OLNH�WR�KDYH�WKHDXWKRUL]DWLRQV�GDWD�FRQYHUWHG�LGHQWLFDOO\�LQ�WKH�DFWLYLW\�JURXS��7KH�0HQX�WDE�ZRXOGUHPDLQ�HPSW\�WKRXJK��7KH�0HQX�WDE�DOVR�UHPDLQV�HPSW\�LI�\RX�FKRRVH� �2SWLPL]HG�XQOHVV�\RX�KDYH�GLVFUHWH�YDOXHV�IRU�6B7&2'(�LQ�\RXU�SURILOH��*HQHULF�YDOXHV�VXFK�DV�6( RU�UDQJHV�IURP�6¥3�DUH�LJQRUHG�

�� &KRRVH�<HV�

4

5

6

7

Tip

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–6

7KH�/LVW�RI�DFWLYLW\�JURXS�FUHDWHGVFUHHQ�DSSHDUV�

�� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS�

7KH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQDSSHDUV��7R�PDLQWDLQ�WKH�DFWLYLW\JURXS��SHUIRUP�WKH�IROORZLQJ�VWHSV�

�� ,Q�'HVFULSWLRQ��WKH�GHVFULSWLRQ�WKDWH[LVWHG�IRU�WKH�68���FUHDWHG�SURILOHZLOO�GHIDXOW�LQWR�WKLV�ILHOG�

$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�68���FUHDWHG�ORQJ�GHVFULSWLRQ�WH[W�ZDV�QRWFRSLHG�LQWR�WKH�QHZO\�FUHDWHGDFWLYLW\�JURXS�

��� 2Q�WKH�'HVFULSWLRQ�WDE��SURYLGH�DGHWDLOHG�GHVFULSWLRQ�XQGHU�$FWLYLW\JURXS�GHVFULSWLRQ�

8

9

10

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–7

2Q�WKH�0HQX�WDE��\RX�FDQ�DGG�RWKHUWUDQVDFWLRQV��RU�ZHE�DGGUHVVHV��,I�LQ�WKHPDQXDOO\�FUHDWHG�SURILOH�\RX�KDG�DYDOXH�LQ�WKH�DXWKRUL]DWLRQ�REMHFW6B7&2'(��WKH�V\VWHP�FUHDWHV�D�PHQX�7KLV�PHQX�ZLOO�EH�WKH�ODXQFK�SDG�IRU�WKHXVHU�IRU�WKH�(DV\�$FFHVV�PHQX�

��� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

11

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–8

��� 5HYLHZ�DOO�WUDIILF�OLJKWV�WKDW�DUH�QRWJUHHQ�DQG�FOLFN�RQ� �WR�SODFH�YDOXHVLQ�WKH�ILHOG��RU�FOLFN�RQ�WKH�DVWHULVN�WRDOORZ�DOO�YDOXHV�LQ�WKLV�ILHOG��

:KHQ�DOO�YDOXHV�DUH�FRPSOHWH��WKHWUDIILF�OLJKWV�WXUQ�JUHHQ�

��� &KRRVH� �

��� 7R�FUHDWH�WKH�SURILOH��FKRRVH� �

��� &KRRVH� �

��� 2Q�WKH�8VHU�WDE��FKRRVH�8VHU�FRPSDUH��&RPSDUH�WKH�XVHU

PDVWHU�UHFRUG�WR�WUDQVIHU�WKHJHQHUDWHG�SURILOH�YDOXHV�WR�WKH�XVHUPDVWHU��7KLV�UHFRUG�PD\�GLIIHU�IURPWKH�RULJLQDO��GHSHQGLQJ�RQ�WKHDGMXVWPHQWV�WKDW�ZHUH�PDGH�

,I�D�XVHU�ZDV�DVVLJQHG�WR�D�SURILOH��WKHQWKH�XVHU�LV�DXWRPDWLFDOO\�DVVLJQHG�WR�WKHMXVW�FUHDWHG�DFWLYLW\�JURXS�

13

14

15

12

16

Tip

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–9

5HPRYLQJ�8VHU�$VVLJQPHQWV�IURP�WKH�2ULJLQDO�68���3URILOH

<RX�FDQ�UHPRYH�WKH�XVHU�DVVLJQPHQW�IURP�D�SURILOH�ZLWK�68���RU�68����,Q�WKH�IROORZLQJ��SURFHGXUH��ZHGHPRQVWUDWH�KRZ�WR�UHPRYH�D�XVHU�DVVLJQPHQW�IURP�D�SURILOH�WKDW�KDV�EHHQ�FUHDWHG�ZLWKRXW�WKH�3*�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�

�� 7R�FRQWLQXH��FKRRVH� �

2

3

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–10

$�OLVW�ZLWK�DOO�DFWLYH�SURILOH�DSSHDUV�

�� 6HOHFW�WKH�SURILOH�V��IURP�ZKLFK�\RXZRXOG�OLNH�WR�UHPRYH�WKH�XVHUDVVLJQPHQW��IRU�H[DPSOH��1$)B�����

�� 7R�GHOHWH�WKH�DVVLJQPHQW��FKRRVH�8VHU�DVVLJQPHQWV�

�� &KRRVH�<HV�

�� 7KH�V\VWHP�UHWXUQV�WKH�DIIHFWHGXVHUV�DQG�UHPRYHG�SURILOHV�WKDWZHUH�UHPRYHG�IURP�WKH�XVHU�PDVWHUUHFRUGV�

,I�QR�XVHUV�ZHUH�DVVLJQHG��\RXUHFHLYH�QR�PHVVDJH�

�� <RX�FDQ�QRZ�FKHFN�WKH�VHOHFWHG�XVHUPDVWHU�UHFRUG�WR�VHH�WKDW�WKHDVVLJQPHQWV�WR�WKH�PDQXDOO\�FUHDWHGSURILOHV�ZHUH�UHPRYHG�

�� &KRRVH� �WR�UHWXUQ�

4

5

6

7

9

Chapter 14: Upgrade

Upgrading from a Release Prior to 3.1x to 4.6 A/B

Release 4.6 A/B14–11

8SJUDGLQJ�IURP�D�5HOHDVH�3ULRU�WR����[�WR�����$�%

5HDG�FKDSWHU����6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�DQG�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�LI�< <RX�DUH�XSJUDGLQJ�IURP�D�UHOHDVH�SULRU�WR����*< ,Q�WKH�UHOHDVH�SULRU�WR����*��\RX�FRXOG�QRW�RU�GLG�QRW�XVH�WKH�3*< <RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*�QRZ

<RX�IDFH�WZR�PDLQ�TXHVWLRQV�< 'R�\RX�FRQYHUW�WKH�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���LQWR

SURILOHV�WKDW�FDQ�EH�PDLQWDLQHG�E\�WKH�3*"< 'R�\RX�UH�FUHDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IURP�VFUDWFK�XVLQJ�WKH�3*"

7KH�IROORZLQJ�VHFWLRQV�SURYLGH�VRPH�KLQWV�WR�DQVZHULQJ�WKHVH�TXHVWLRQV�

&RQYHUWLQJ�([LVWLQJ�$XWKRUL]DWLRQ�3URILOHV�IRU�WKH�3URILOH�*HQHUDWRU

)LUVW��FUHDWH�DQG�VDYH�D�QHZ�DFWLYLW\�JURXS�IRU�HDFK�MRE��5DWKHU�WKDQ�VHOHFWLQJ�EXVLQHVVWUDQVDFWLRQV�IURP�WKH�FRPSDQ\�PHQX�WUHH��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�LQ�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ��7KHQ�IROORZ�WKH�VWHSV�GHVFULEHG�LQ�FKDSWHU����,QVHUWLQJ�$XWKRUL]DWLRQVIURP�D�3URILOH�

7KH�DGYDQWDJH�WR�WKLV�PHWKRG�LV�WKDW�\RX�FDQ�ZRUN�ZLWK�H[LVWLQJ��ZHOO�WHVWHG�SURILOHV��,IREMHFW�6B7&2'(�GRHV�QRW�KDYH�DQ�DXWKRUL]DWLRQ��PDQXDOO\�LQVHUW�RQH��0DLQWDLQ�WKHSHUPLWWHG�WUDQVDFWLRQ�IRU�HDFK�DFWLYLW\�JURXS�DV�DXWKRUL]DWLRQ�YDOXHV�IRU�REMHFW�6B7&2'(�LQWKH�SURILOH�\RX�ZLOO�JHQHUDWH�IRU�WKLV�DFWLYLW\�JURXS��<RX�FDQ��RI�FRXUVH��PDLQWDLQ�DQ�DVWHULVN� ���EXW�WKLV�LV�D�GLVDGYDQWDJH��EHFDXVH�XVHUV�ZRXOG�UHFHLYH�PRUH�DFFHVV�WKDQ�\RX�ZDQW�WRJLYH�WKHP��7KH�RWKHU�GLVDGYDQWDJH�LV�WKDW�VLQFH�WKH�XVHU�VSHFLILF�PHQX�LV�PLVVLQJ��\RXFDQQRW�UH�FUHDWH�WKH�LQIRUPDWLRQ�VDYHG�LQ�DQ�DFWLYLW\�JURXS��<RX�PD\�FRQYHUW�\RXU�ROGSURILOHV�DQG�ZRUN�ZLWK�WKHP�XQWLO�\RX�QHHG�WR�UH�FUHDWH�DQG�GHOHWH�WKHP�

6HH�DOVR�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\�*URXSV�RQ�SDJH���²��

5H�FUHDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�IURP�6FUDWFK�8VLQJ�WKH�3URILOH*HQHUDWRU

)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU���8VHU�5ROH�7HPSODWHV��FKDSWHU���$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\��DQG�FKDSWHU���0LVVLQJ�$XWKRUL]DWLRQV�

Chapter 14: Upgrade

Upgrading from Release 3.0F to 4.6 A/B

Authorizations Made Easy14–12

8SJUDGLQJ�IURP�5HOHDVH����)�WR�����$�%

$Q�XSJUDGH�IURP�5HOHDVH����)�WR����$�LV�QRW�SRVVLEOH�LI�\RX�XVH�5���+5�6XSSRUW3DFNDJHV��)XUWKHU�LQIRUPDWLRQ�LV�DYDLODEOH�LQ�6$31HW���5���)URQWHQG�QRWH��������

$IWHU�\RXU�����XSJUDGH��LI�\RX�FUHDWH�DFWLYLW\�JURXSV�DQG�JHQHUDWH�SURILOHV�LQ�5HOHDVH����)ZLWK�WKH�SUHOLPLQDU\�YHUVLRQ�RI�WKH�3*��WKHQ�

�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�

)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH3DUDPHWHU��,I�WKH�SDUDPHWHU�LV�LQDFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG�

7KH�3*�LV�DOUHDG\�DFWLYH�LQ�5HOHDVH�����WKRXJK�

$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJHE\�UHIHUULQJ�WR�FKDSWHU����WKH�VHFWLRQ�$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�

�� %HFDXVH�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�ZHUH�QRW�D�SDUW�RI�WKH�5HOHDVH����)YHUVLRQ�RI�WKH�3*��FRS\�WKH�6$3�GHIDXOWV�LQ�WKHVH�FXVWRPHU�WDEOHV�

7R�FRS\�WKHVH�GHIDXOWV��UXQ�WUDQVDFWLRQ�68���DQG�SHUIRUP�WKH�VWHSV�LQ�FKDSWHU����WKHVHFWLRQ�/RDGLQJ�WKH�862%;B&�DQG�862%7B&�7DEOHV��,Q�WUDQVDFWLRQ�68����SHUIRUP�WKH�ILUVWVWHS�FDOOHG�,QLWLDOO\�ILOO�WKH�FXVWRPHU�WDEOHV�

$OVR�UHDG�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�WR�OHDUQ�PRUHDERXW�WKH�QHZ�IXQFWLRQDOLW\��7KHQ�GHFLGH�ZKHWKHU�\RX�QHHG�WR�SHUIRUP�DGGLWLRQDO�VWHSVRQ�WKH�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKH�WUDQVDFWLRQV�\RX�DUH�XVLQJ�

�� $IWHU�WKH�XSJUDGH�WR�5HOHDVH����[��D�SURILOH�PDWFKXS�LV�UHTXLUHG�IRU�DOO�SURILOHV�JHQHUDWHGLQ�5HOHDVH����)��$IWHU�WKH�XSJUDGH��WKH�3*�GRHV�QRW�DXWRPDWLFDOO\�LQIRUP�\RX�WKDW�DFRPSDULVRQ�LV�QHFHVVDU\�IRU�WKHVH�SURILOHV��LQ�WUDQVDFWLRQ�3)&*��WKH�OLJKW�RQ�WKH$XWKRUL]DWLRQV�WDE�UHPDLQV�JUHHQ�IRU�WKH�SURILOHV�FUHDWHG�LQ�5HOHDVH����)��DQG�WUDQVDFWLRQ683&�GRHV�QRW�LQGLFDWH�ZKHWKHU�D�PDWFKXS�LV�DFWXDOO\�UHTXLUHG���1HYHUWKHOHVV��WKH�6$3GHIDXOW�GDWD�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�WKH�QHZ�UHOHDVH�KDV�EHHQ�LPSURYHG�VR�WKDW�D�SURILOH�PDWFKXS�LV�HVVHQWLDO�WR�HQVXUH�SURSHU�ZRUNLQJ�SURILOHV�DIWHU�WKHXSJUDGH�

Chapter 14: Upgrade

Upgrading from Release 3.0F to 4.6 A/B

Release 4.6 A/B14–13

7R�SHUIRUP�D�SURILOH�PDWFKXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�DQ�DFWLYLW\�JURXS�FUHDWHG�LQ5HOHDVH������<RX�FDQ�RQO\�VHOHFWRQH�DFWLYLW\�JURXS�DW�D�WLPH��VHHWKH�IROORZLQJ�7LSV��7ULFNV��

7KLV�SURFHGXUH�KDV�WR�EH�SHUIRUPHGIRU�HDFK�DFWLYLW\�JURXS�VHSDUDWHO\��7RVSHHG�XS�WKH�SURFHVV��XVH�WUDQVDFWLRQ683&�ZKHUH�\RX�JHW�D�OLVW�RI�DOODFWLYLW\�JURXSV��6HOHFW�WKH�DFWLYLW\JURXS�WKDW�QHHGV�WR�EH�PDLQWDLQHG�E\GRXEOH�FOLFNLQJ�RQ�LW�

�� &KRRVH� &KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �([SHUW�PRGH�IRU�SURILOHJHQHUDWLRQ�

3

4

5

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–14

�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�DV�WKH�FRUUHFWPDLQWHQDQFH�W\SH�

�� &KRRVH� �DQG�SRVWPDLQWDLQ�DQ\RSHQ�DXWKRUL]DWLRQ�ILHOGV�RQ�WKHQH[W�VFUHHQ��LI�UHTXLUHG�

'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWV�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�5HOHDVH����[��WKH�3*�PD\FUHDWH�VRPH�QHZ�DXWKRUL]DWLRQV��,I�\RX�VHH�QHZ�DXWKRUL]DWLRQV�FUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��GHDFWLYDWH�RU�GHOHWH�WKHP�

7KH�V\VWHP�LQFOXGHV�WKH�QHZ�UHTXLUHG�DXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�RQHV��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO�EXW�RIIHUV�LPSURYHG�V\VWHP�SHUIRUPDQFH��7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�DIWHU�0DNLQJ�&KDQJHV�

�� $IWHU�UHJHQHUDWLQJ�DOO�WKH�SURILOHV��\RX�KDYH�FRPSOHWHG�WKH�XSJUDGH�VWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�5HOHDVH����)�

1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG�IRU�SURILOHV�DOUHDG\�DVVLJQHG�WR�XVHUV��EXW�UHPHPEHU�WKDWFKDQJHV�EHFRPH�DFWLYH�ZLWK�WKH�QH[W�V\VWHP�ORJRQ�

8SJUDGH�IURP�5HOHDVHV����*�����+�����,�WR�����$�%

$IWHU�FUHDWLQJ�DFWLYLW\�JURXSV�DQG�JHQHUDWLQJ�SURILOHV�LQ�5HOHDVHV����*�����+�����,�����$�RU����%�����[�ZLWKWKH�3*��ZKHQ�\RX�XSJUDGH�WR�5HOHDVH����[�

�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�

7R�GR�VR��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU�,I�WKH�SDUDPHWHU�LV�QRW�DFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG��7KH�3*�LV�VHW�WR�DFWLYH�LQ�5HOHDVH�����

$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJH�E\�UHIHUULQJ�WRFKDSWHU����$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

6

7

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–15

�� &KRRVH�VWHS��$��3UHSDUDWLRQ�&RPSDUH�ZLWK�6$3�YDOXHV��7KLV�VWHSLV�XVHG�WR�SUHSDUH�IRU�VWHSV��%�DQG�&�

�� &KRRVH .

7KLV�VWHS�PLJKW�WDNH�VHYHUDOPLQXWHV.

3

4

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–16

�� &KRRVH��%��&RPSDUH�WUDQVDFWLRQV�

�� &KRRVH� �

7KH�XSJUDGH�UHSRUW�\RX�VWDUWHG�LQVWHS��$��XSGDWHV�FXVWRPHU�WDEOHV862%;B&�DQG�862%7B&��EXW�GRHVQRW�RYHUZULWH�WKH�HQWULHV�\RXFKDQJHG�LQ�UHOHDVHV�EHIRUH����[�

,I�\RX�KDYH�QRW�FKDQJHG�FKHFNLQGLFDWRUV�DQG�ILHOG�YDOXHV�ZLWKWUDQVDFWLRQ�68���LQ�UHOHDVHV�EHIRUH���[��\RX�ZLOO�VHH�WKH�IROORZLQJVWDWXV�PHVVDJH�

<RX�GR�QRW�QHHG�WR�PDLQWDLQ�WKHWUDQVDFWLRQ�

5

6

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–17

�� ,I�\RX�PDGH�FKDQJHV��WKHVH�FKDQJHVZLOO�VWLOO�EH�DFWLYH�DIWHU�WKHXSJUDGH��7KH�RXWSXW�ZLOO�EH�D�OLVWRI�DIIHFWHG�WUDQVDFWLRQV��LQ�RXU�FDVHLW�LV�0.����

�� ,Q�WKH�RXWSXW�OLVW�RI�WUDQVDFWLRQV�\RX�FDQ�VHH�WKH�6WDWXV�ZKLFK�VKRZVZKHWKHU�D�WUDQVDFWLRQ�KDV�DOUHDG\EHHQ�FKHFNHG�

�� 6HOHFW�D�WUDQVDFWLRQ�ZKHUH�WKHFXUUHQW�VWDWXV�LV�7R�EH�FKHFNHG�

��� &KRRVH� �6HW�WR�FKHFNHG�WR�VHW�WKHVWDWXV�WR�FKHFNHG�ZLWKRXW�FKDQJLQJDQ\�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKLVWUDQVDFWLRQ�

��� &KRRVH�WKH� �7UDQVIHU�UHPDLQLQJ6$3�GHIDXOWV�EXWWRQ�WR�FKDQJH�WKHFXUUHQW�DFWLYH�FKHFN�,'�VHWWLQJ�WRWKH�6$3�GHIDXOW�YDOXH�DQG�WKHVWDWXV�WR�FKHFNHG�

��� &KRRVH� �&KHFN�LQGLFDWRU�

��� &KRRVH� �

,I�\RX�VDYH�ZLWKRXW�PDNLQJ�DQ\FKDQJHV��WKH�VWDWXV�LV�DXWRPDWLFDOO\VHW�WR�FKHFNHG��DQG�WKH�FKDQJHVUHPDLQ�

��� &KRRVH�DQ\�RWKHU�PHQX�RSWLRQ�WRPDNH�DGGLWLRQDO�FKDQJHV�WR�WKLVWUDQVDFWLRQ�DQG�LWV�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�

��� 2QFH�ILQLVKHG��FKRRVH� �

7 8

9

1012 11

13 15

14

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–18

��� 7KH�VWDWXV�KDV�FKDQJHG�WR�FKHFNHG�

��� 7R�XVH�WKH�6$3�GHIDXOW�YDOXHV�IRUDOO�WKH�WUDQVDFWLRQV�WKDW�\RX�KDYHQRW�\HW�PDQXDOO\�FKHFNHG��FKRRVHWKH� �7UDQVIHU�UHPDLQLQJ�6$3GHIDXOWV�EXWWRQ�WR�FRS\�DQ\UHPDLQLQJ�6$3�GHIDXOW�YDOXHV��LQRXU�FDVH��ZH�GR�QRW�KDYH�DQ\IXUWKHU�WUDQVDFWLRQV��

��� &KRRVH� �

��� ,I�\RX�KDG�RWKHU�WUDQVDFWLRQV�DOOWKHLU�VWDWXVHV�ZRXOG�KDYH�EHHQ�VHWWR�FKHFNHG�

��� &KRRVH� �

16

17

18

19

20

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–19

��� &KRRVH��&��$FWLYLW\�JURXSV�WR�EHFKHFNHG�

��� &KRRVH� �

7KH�RXWSXW�LV�D�OLVW�RI�DFWLYLW\JURXSV�WKDW�DUH�DIIHFWHG�E\�HLWKHUFKDQJHV�\RX�PDGH�RU�E\�FKDQJHVIURP�RXU�LPSURYHG�GHIDXOW�GDWD�

22

21

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–20

��� )RU�WKH�OLVWHG�DFWLYLW\�JURXSV�FKDQJHV�KDYH�EHHQ�PDGH�WR�FKHFNLQGLFDWRUV�RU�GHIDXOW�WUDQVDFWLRQYDOXHV��7KHUHIRUH��WKHFRUUHVSRQGLQJ�DXWKRUL]DWLRQSURILOHV�QHHG�WR�EH�DGMXVWHG�

0DNH�VXUH�\RX�VHOHFW�HDFK�HQWU\�LQWKLV�OLVW�

��� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS\RX�ZRXOG�OLNH�WR�DGMXVW�

��� 'HSHQGLQJ�RQ�WKH�FKDQJHV��\RX�PLJKW�KDYH�WR�PDLQWDLQ�WKH�FRUUHFW�RUJDQL]DWLRQDO�OHYHO�

��� 3RVWPDLQWDLQ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��LI�UHTXLUHG�\HOORZ�RU�UHG�OLJKWV��

'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWVIRU�FKHFN�LQGLFDWRUV�DQG�ILHOGYDOXHV��WKH�3*�PD\�FUHDWH�VRPHQHZ�DXWKRUL]DWLRQV�LQ�5HOHDVH����[�<RX�ZLOO�VHH�QHZ�DXWKRUL]DWLRQVFUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��WKHVHDUH�LGHQWLILHG�E\�WKH�RQHV�WKDW�VD\1HZ���-XVW�DFWLYDWH��RU�GHOHWH��WKHQHZ�DXWKRUL]DWLRQV��7KH�V\VWHPLQFOXGHV�WKH�QHZ�UHTXLUHGDXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJIRU�H[LVWLQJ�RQHV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO��EXW�KDV�PRUHDGYDQWDJHV�WKDQ�GLVDGYDQWDJHV�DQGDOVR�LPSURYHV�3*�SHUIRUPDQFH�

7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQ�ILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ�&KDQJHV�

��� $IWHU�UHJHQHUDWLQJ��FKRRVH� �

��� &RQWLQXH�ZLWK�WKH�QH[W�HQWU\�LQ�WKH�OLVW�RI�DFWLYLW\�JURXSV�ZLWK�WKLV�VDPH�SURFHGXUH�XQWLO�\RX�KDYHDGMXVWHG�DOO�DFWLYLW\�JURXSV�

23

26

24

25

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–21

$IWHU�FRPSOHWLQJ�VWHSV��$���%��DQG��&��\RX�KDYH�SHUIRUPHG�WKH�PRVW�LPSRUWDQW�VWHSV�DIWHU\RXU�5HOHDVH�����$�%�XSJUDGH�

<RX�VWLOO�QHHG�WR�SHUIRUP�VWHS����7UDQVSRUW�WKH�FXVWRPHU�WDEOHV��DQG�WUDQVSRUW�WKH�FKDQJHV�\RXPDGH�LQ�VWHSV���DQG���WR�\RXU�RWKHU�5���V\VWHPV��$OO�V\VWHPV�PXVW�KDYH�WKH�VDPH�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�

��� &KRRVH��'��'LVSOD\�FKDQJHGWUDQVDFWLRQ�FRGHV�

7KLV�UHSRUW�OLVWV�DOO�DFWLYLW\�JURXSVZKHUH�WUDQVDFWLRQV�KDYH�EHHQUHSODFHG�E\�RWKHU�WUDQVDFWLRQV��7KHROG�DQG�QHZ�WUDQVDFWLRQV�DUH�DOVRGLVSOD\HG��<RX�FDQ�FKDQJH�WKHWUDQVDFWLRQ�FRGH�LQ�WKHFRUUHVSRQGLQJ�DFWLYLW\�JURXS�E\GRXEOH�FOLFNLQJ�RQ�WKH�HQWU\�LQ�WKHOLVW�

<RX�KDYH�FRPSOHWHG�WKH�XSJUDGHVWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�UHOHDVHV�SULRU�WR����[�

29

Chapter 14: Upgrade

Upgrade from Releases 4.0x or 4.5x to 4.6 A/B

Authorizations Made Easy14–22

8SJUDGH�IURP�5HOHDVHV����[�RU����[�WR�����$�%

,I�\RX�DUH�XSJUDGLQJ�IURP����[�RU����[�WR�����$�%��\RX�VKRXOG�SURFHHG�IURP�VWHSV��$�WR��'LQ�WKH�VDPH�ZD\�DV�LQ�WKH�VHFWLRQ�EHIRUH�

,Q������UHVSRQVLELOLWLHV�QR�ORQJHU�H[LVW

,I�\RX�ZRUNHG�ZLWK�WKH�5���6\VWHP�LQ�5HOHDVH����[�RU�UHDG�WKH����%�$XWKRUL]DWLRQV�0DGH�(DV\JXLGHERRN��WKHQ�\RX�PD\�KDYH�ZRQGHUHG�ZKDW�KDSSHQHG�WR�WKH�IXQFWLRQDOLW\�FDOOHG´UHVSRQVLELOLWLHV�µ�,Q�5HOHDVH�����DQG������UHVSRQVLELOLWLHV�ZHUH�UHSODFHG�E\�D�FRQFHSW�FDOOHG´GHULYHG�DFWLYLW\�JURXSVµ�DQG�WKHVH�GHULYHG�DFWLYLW\�JURXSV�IXQFWLRQ�VOLJKWO\�GLIIHUHQW�IURPWKH�����UHVSRQVLELOLWLHV��,I�\RX�XVHG�UHVSRQVLELOLWLHV�LQ�����DQG�XSJUDGH�WR������\RXUUHVSRQVLELOLWLHV�DUH�FRQYHUWHG�DXWRPDWLFDOO\�LQWR�GHULYHG�DFWLYLW\�JURXSV�

)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�GHULYHG�DFWLYLW\�JURXSV��VHH�WKH�FRUUHVSRQGLQJ�VHFWLRQ�LQFKDSWHU����&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�

A–1

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV

&RQWHQWV

Overview ................................................................................................................. A–2

SAPNet – R/3 Frontend Notes............................................................................... A–3

$$

Appendix A: SAPNet – R/3 Frontend Notes

Overview

Authorizations Made EasyA–2

2YHUYLHZ

6$31HW�²�5���)URQWHQG�QRWHV��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6XSSRUW��266���FRQWDLQVLQIRUPDWLRQ�UHJDUGLQJ�NQRZQ�HUURUV��DQG�VXEVHTXHQW�PHDQV�RI�DGGUHVVLQJ�VXFK�HUURUV��VRPH�DGYLFH��DQG�JHQHUDO�LQIRUPDWLRQ�UHODWHG�WR�WKH�5���6\VWHP��,W�DOVR�VHUYHV�DV�RQH�RI�WKHFRUH�PHDQV�RI�FRPPXQLFDWLQJ�SUREOHPV�ZLWK�\RXU�5���6\VWHP�WR�WKH�6$3�5���VXSSRUWVHUYLFHV�SRUWLRQ�RI�WKH�6$3�ZRUOGZLGH�RUJDQL]DWLRQ��7KH�VXSSRUW�V\VWHP��PDLQWDLQHGHQWLUHO\�E\�6$3��FRQWDLQV�KXQGUHGV�RI�WKRXVDQGV�RI�´QRWHVµ�WKDW�DGGUHVV�WRSLFV�UDQJLQJIURP�5���V\VWHPV��5���V\VWHPV���DQG�PDQ\�RI�WKH�DGG�RQ�FRPSRQHQWV�WR�WKHVH�V\VWHPV��)RUPRUH�LQIRUPDWLRQ�DERXW�ZKDW�WKH�6$31HW�²�5���)URQWHQG�V\VWHP�LV��SOHDVH�UHIHU�WRZZZ�VDS�FRP�DQG�JR�WR�WKH�6$31HW�VHFWLRQ�

7KH�QRWH�QXPEHUV�SURYLGHG�LQ�WKLV�DSSHQGL[�UHSUHVHQW�RQO\�D�IUDFWLRQ�RI�DOO�WKH�QRWHV�UHODWHGWR�DXWKRUL]DWLRQV��$V�KXQGUHGV�RI�QRWHV�IRU�WKH�YDULRXV�6$3�SURGXFWV�DUH�FUHDWHG�HYHU\�GD\�WKLV�OLVWLQJ�RI�QRWHV�UHSUHVHQWV�´D�VQDSVKRW�LQ�WLPHµ�RI�WKRVH�WKDW�H[LVWHG�DW�WKH�WLPH�WKLVZULWLQJ�DQG�ZHUH�VHOHFWLYHO\�LQFOXGHG�KHUH��,W�LV�E\�QR�PHDQV�D�FRPSUHKHQVLYH�OLVW�

1RWHV�LQ�6$31HW�²�5���)URQWHQG�DUH�VHSDUDWHG�LQ�PDQ\�ZD\V��2QH�RI�WKH�PRVW�FRPPRQZD\V�LV�E\�WKH�´&RPSRQHQWµ�RU�´$SSOLFDWLRQ�$UHDµ�LQ�WKH�V\VWHP�WKDW�ZDV�DIIHFWHG��7KHIROORZLQJ�WDEOH�GHVFULEHV�VRPH�RI�WKH�PRVW�FRPPRQ�DSSOLFDWLRQ�DUHDV�ZKHUH�QRWHV�PD\�EHIRXQG��7KHVH�DUHDV�FDQ�EH�XVHG�WR�VHDUFK�WKH�6$31HW�²�5���)URQWHQG�QRWHV�GDWDEDVH�IRUDGGLWLRQDO�VHFXULW\�DGPLQLVWUDWRU�LQIRUPDWLRQ

$SSOLFDWLRQ�$UHD 'HVFULSWLRQ

%&�&&0 &RPSXWLQJ�&HQWHU�0DQDJHPHQW�6\VWHP

%&�&&0�865 8VHUV�DQG�$XWKRUL]DWLRQV

%&�&&0�865�$'0 8VHUV�DQG�$XWKRUL]DWLRQV�0DLQWHQDQFH

%&�&&0�865�.51 8VHUV�DQG�$XWKRUL]DWLRQV�.HUQHO�)XQFWLRQV

%&�&&0�865�3)& 3URILOH�*HQHUDWRU

%&�&76�25* :RUNEHQFK�&XVWRPL]HU�2UJDQL]HU

%&�)(6�6(0 6HVVLRQ�0DQDJHU

%&�659�5(3 5HSRUWLQJ

%&�%07�20 2UJDQL]DWLRQDO�0DQDJHPHQW

%&�%07�20�20 2UJDQL]DWLRQDO�3ODQ

),�$3�$3�% 3D\PHQW�3URJUDP�3D\PHQW�7UDQVIHU

00�,0�*)�5(3 ,0�5HSRUWLQJ��QR�/,6�

3$�3$�;; $OO�&RXQWULHV��3HUVRQQHO�$GPLQLVWUDWLRQ�

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Release 4.6A/BA–3

(DFK�DSSOLFDWLRQ�DUHD�FDQ�DOVR�EH�VHDUFKHG�XVLQJ�D�NH\ZRUG�VXFK�DV�SURILOH�JHQHUDWRU��3)&*��DFWLYLW\�JURXS�SUHGHILQHG�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ��SURILOH��XVHU��68����VHFXULW\�DQG�VR�RQ�

6$31HW�²�5���)URQWHQG�1RWHV

�$V�RI�'HFHPEHU������

/HJHQG�< 5,� �5HOHDVH�LQGHSHQGHQW< � ����$������%< 25� �ROGHU�UHOHDVH��EXW�VWLOO�YDOXDEOH�LQIRUPDWLRQ

6XEMHFW 5HOHDVH 1RWH 7LWOH

$XWKRUL]DWLRQ�&KHFN 5, ����� :KLFK�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG

$XWKRUL]DWLRQ 5, ����� 1DPLQJ�FRQYHQWLRQV�IRU�DXWKRUL]DWLRQV

$XWKRUL]DWLRQ�&KHFN 5, ����� $XWKRUL]DWLRQ�FKHFN���D�VKRUW�LQWURGXFWLRQ

$XWKRUL]DWLRQ�&RQFHSW 5, ����� 4XHVWLRQV�UHJDUGLQJ�WKH�DXWKRUL]DWLRQ�FRQFHSW

$XWKRUL]DWLRQV�5HSRUWLQJ�7UHH

5, ���� $XWKRUL]DWLRQ�SURWHFWLRQ�RI�$%$3���SURJUDPV

$XWKRUL]DWLRQV��7UDFH 5, ����� 7UDFH�IXQFWLRQ��PXOWLSOH�XVHUV

'RFXPHQWDWLRQ��%DVLV.QRZOHGJHZDUH3URGXFWV

25 ����� ,QIR�IRU�FXVWRPHU���%DVLV�.QRZOHGJH�3URGXFWV

+RW�3DFNDJHV 25 ����� ,PSRUWDQW�,QIRUPDWLRQ�DERXW�+RW�3DFNDJHV

+RW�3DFNDJHV ����� &RQIOLFWV�EHWZHHQ�6XSSRUW�3DFNDJHV�/&3V��$GG�RQV

+RW�3DFNDJHV ����� 1HZ�+RW�3DFNDJHV�IRU�3URILOH�*HQHUDWRU

.QRZOHGJHZDUH3URGXFWV

25 ����� 4XHVWLRQV�DQG�DQVZHUV�RQ�WKH�5���%DVLV�.QRZOHGJH3URGXFW�&'V

1DPLQJ�&RQYHQWLRQV ����� &XVWRPHU�QDPH�UDQJH�IRU�6$3�REMHFWV

2UJDQL]DWLRQDO0DQDJHPHQW

����� 3'�DQG�:RUNIORZ�DSSOLFDWLRQ�GR�QRW�UXQ�FRUUHFWO\

266 5, ����� 266�5HJLVWUDWLRQ�)RUP��IRU�1RUWK�$PHULFD�

266 5, ����� 'RFXPHQWDWLRQ�RQ�WUDLQLQJ�LQIR�LQ�WKH�266

266 5, ����� 6HDUFK�SURFHGXUH�IRU�QRWHV�DQG�PHVVDJHV�LQ�266

266 5, ����� 6$3�$PHULFD·V�3URGXFWLRQ�5HJLVWUDWLRQ�)RUP

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Authorizations Made EasyA–4

6XEMHFW 5HOHDVH 1RWH 7LWOH

266 5, ����� 6$3/2*21�IRU�266

266 25 ����� 6HUYLFH�FRQQHFWLRQV��&RPSRVLWH�QRWH��RYHUYLHZ�

266 5, ����� 6WUXFWXUH�RI�DSSOLFDWLRQ�DUHDV�LQ�266

266 5, ����� 8VHU�PDLQWHQDQFH�DQG�FUHDWLRQ�LQ�266�IRU�FXVWRPHU

266 25 ����� )/&6�)HHGEDFN�IRU�WKH�1RWHV�ZLWKLQ�WKH�266�6\VWHP

266 5, ����� 266�FRUSRUDWH�JURXS�IXQFWLRQDOLW\��&ROOHFWLYH�QRWH

266 5, ����� &RQILUPDWLRQ�RI�266�5HJLVWUDWLRQ

266�DQG�266� 5, ����� /RJ�RQ�WR�266��7UDQVDFWLRQ�266��

266�DQG�266� 5, ����� 266���:KDW�WR�GR�LI�5���ZLOO�QRW�UXQ

266�DQG�266� 5, ����� *XLGHOLQHV�IRU�266���9HUVLRQ�IRU�6$36(59��

266�DQG�266� 5, ����� (DV\�WR�XVH�JXLGH�IRU�7UDQVDFWLRQ�266�

266�DQG�3ULQWLQJ 5, ����� 3ULQW���'RZQORDG�LQ�266

266�DQG�3ULQWLQJ 5, ����� 'RZQORDGLQJ�²�3ULQWLQJ�QRWHV�LQ�266

3DVVZRUGV�LQ�5�� 5, ���� $QVZHUV�RQ�´6HFXULW\µ

3DWFK�GRZQORDG�IURP6$36(59[

5, ����� $GYDQFH�WUDQVSRUWV�WR�FXVWRPHUV

3URILOH�*HQHUDWRU ����� 3UREOHPV�ZLWK�WDEOH�60(1B'$7(6

3URILOH�*HQHUDWRU ����� 0LVVLQJ�DXWKRUL]DWLRQ�ZKHQ�XVLQJ�WKH�3URILOH�*HQHUDWRU

3URILOH�*HQHUDWRU ����� ��SUREOHP�IRU�WKH�3*

3URILOH�*HQHUDWRU 5, ������ 5HJHQHUDWLRQ�RI�DFWLYLW\�JURXSV�DXWKRUL]DWLRQ�ORVV

3URILOH�*HQHUDWRU 5, ������ 0HUJ��3URFHVV�ZLWK�DXWKRUL]DWLRQ�GDWD��([SODQDWLRQ

3URILOH�*HQHUDWRU�7UDQVSRUW�3'�REMHFWV�DFWLYLW\�JURXSV�

25 ����� 7UDQVSRUWLQJ�3'�REMHFWV�E\�FOLHQW�FRS\

5HSRUW�5+$8783� 25 ����� $FWLYLW\�JURXS�PDLQW���XVHU�PDVWHU�GDWD�FRPSDULVRQ

6$3�6RIWZDUH�&KDQJH5HJLVWUDWLRQ

25 ����� 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5�

6$3B1(: 5, ����� :KDW�GRHV�WKH�SURILOH�6$3B1(:�GR"

6$31HW 5, ����� $FFHVV�WR�WKH�6$31HW�VHUYHU�ZLWK�266�8VHU�,'

6$36(59[ 25 ����� 7UDQVIHUULQJ�FXVWRPHU�ILOHV�WR�VDSVHUY��ZLWK�IWS

6HFXULW\�LQ�5�� 5, ����� &RQVHTXHQFHV�LQ�WUDQVSRUW�GXULQJ�SDVVZRUG�FKDQJH

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Release 4.6A/BA–5

6XEMHFW 5HOHDVH 1RWH 7LWOH

6HFXULW\�LQ�5�� 5, ����� 'DWD�SURWHFWLRQ�DQG�VHFXULW\�LQ�5��

6HFXULW\�LQ�5�� 5, ����� 6HFUHF\�DQG�'DWD�6HFXULW\�2EOLJDWLRQV

6HFXULW\�LQ�5����$%$3 5, ����� 6HFXULW\�DVSHFWV�LQ�$%$3���SURJUDPPLQJ

6HFXULW\�LQ�5����&3,�& 5, ����� 6$3&3,&��:KHUH�DUH�SDVVZRUGV�YLVLEOH"

6HFXULW\�LQ�5���

&XVWRPHU�([LW

����� &XVWRPHU�H[LWV�LQ�6$3�ORJ�RQ

6HVVLRQ�0DQDJHU 25 ����� *HQHUDWLRQ�RI�6HVVLRQ�0DQDJHU�PHQXV�WDNHV�WRR�ORQJ

68�� 5, ����� <RX�DUH�QRW�DXWKRUL]HG�WR�����!�$QDO\VLV

68�� 25 ����� 68����$XWKRUL]DWLRQ�YDOXH�FRQWDLQV�VSHFLDO�FKDUV

68�� 25 ����� 68����2EMHFW�QDPH�RYHUZULWHV�REMHFW�WH[W

6\VWHP�3URILOH3DUDPHWHUV

5, ����� 6\VWHP�SDUDPHWHUV��'HILQHG�ZKHUH"�'LVSOD\HG�KRZ"

7UDQVSRUWLQJ 5, ����� 7UDQVSRUWLQJ�SURILOHV�DQG�DXWKRUL]DWLRQV

7UDQVSRUW 25 ����� 7UDQVSRUW�SURILOHV��DXWKRU���LQ�ORJRQ�ODQJXDJH

7UDQVSRUW��8VHU�%XIIHU 5, ����� $XWKRUL]DWLRQV�QRW�FXUUHQW�DIWHU�SURILOH�WUDQVSRUW

7UDQVSRUWLQJ��$6���� ����� $6������,PSRUWLQJ�WUDQVSRUWV

8VHU�DGPLQLVWUDWLRQ 5, ����� 8VHUV�ZLWK�ODUJH�PDVWHU�UHF��PLVVLQJ�DXWKRUL]DWLRQV

8VHU�DGPLQLVWUDWLRQ ������ &HQWUDO�XVHU�GLVWULEXWLRQ��WRR�PDQ\�$/(�SURFHVVHV

8VHU�DGPLQLVWUDWLRQ ������ &HQ��8VHU�DGP���68���/DVW�FKDQJH�QRW�DOZD\V�GVSOHG�

8VHU�DGPLQLVWUDWLRQ ������ 8VH�RI�ZLOGFDUG�¶ ·�LQ�DXWKRUL]DWLRQV

8VHU�,QIRUPDWLRQ�6\VWHP�68,0�

25 ����� 1HZ�UHSRUWV�IRU�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

8VHU�,QIRUPDWLRQ�6\VWHP�68,0�

25 ����� :KHUH�XVHG�OLVW��6XUQDPHV�PLVVLQJ�LQ�XVHU�OLVW

8VHU�6$3 5, ���� +RZ�WR�DVVLJQ�DQ�LGHQWLILHU�WR�6$3

8VHU�6$3 5, ���� +RZ�GR�,�GHOHWH�WKH�XVHU�6$3 "

8VHUV�DQG$XWKRUL]DWLRQV�.HUQHO)XQFWLRQV

������ $XWKRUL]DWLRQ�%XIIHU�LV�ILOOHG�GXULQJ�HDFK�ORJRQ

:RUNEHQFK�&XVWRPL]HU2UJDQL]HU

������ 'HYHORSPHQW�&ODVV�&KDQJH�RQO\�ZLWK�DGPLQ�$XWKRUL]DWLRQ

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Authorizations Made EasyA–6

6XEMHFW 5HOHDVH 1RWH 7LWOH

3D\PHQW3URJUDP�3D\PHQW7UDQVIHU

������ ,QFRUUHFW�DXWKRUL]DWLRQ�FKHFN�IRU�FKHFN�PDQDJHPHQW

,0�5HSRUWLQJ��QR�/,6� ������ 0%����0%���0%�6��32�VFKHG��$JUHHPHQW�GLVSOD\V

$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�

������ $XWK��&KHFN�RI�QRW�LQWHJUDWHG�SHUVRQQHO�QXPEHUV

$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�

������ $XWKRUL]DWLRQ�OHYHO�0�LV�KDQGOHG�LQFRUUHFWO\

B–1

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV

&RQWHQWV

Overview ................................................................................................................. B–2

R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................... B–2

Profile Generator Setup......................................................................................... B–3

Working with the PG and Profiles ........................................................................ B–3

Authorization Checks (SU24)................................................................................ B–5

Upgrade Procedure (SU25) ................................................................................... B–7

Including Transactions or Reports ...................................................................... B–7

Missing Authorizations ......................................................................................... B–7

User Administration............................................................................................... B–8

Transporting ........................................................................................................... B–8

Tables...................................................................................................................... B–8

%%

Appendix B: Frequently Asked Questions

Overview

Authorizations Made EasyB–2

2YHUYLHZ

7KLV�DSSHQGL[�FRQWDLQV�VRPH�RI�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�DERXW�5���DQG�WKH3URILOH�*HQHUDWRU��3*���:H�KRSH�WKH�DQVZHUV�< +HOS�\RX�WR�EHWWHU�XQGHUVWDQG�WKH�V\VWHP< )DFLOLWDWH�\RXU�LPSOHPHQWDWLRQ< 5HVROYH�EDVLF�V\VWHP�LVVXHV

5���,QLWLDO�6FUHHQ��6$3�(DV\�$FFHVV�0HQX��DQG�)DYRULWHV

,I�D�XVHU�KDV�VHYHUDO�DFWLYLW\�JURXSV�DVVLJQHG�WR�WKHP�ZLWK�WKH�VDPH�WUDQVDFWLRQ

FRGH��ZLOO�WKH�WUDQVDFWLRQ�FRGH�DSSHDU�PXOWLSOH�WLPHV�RQ�WKH�6$3�(DV\�$FFHVV

0HQX"�,V�WKHUH�D�ZD\�WR�´PHUJHµ�WKH�UHSHDWHG�WUDQVDFWLRQ�FRGHV"

7KH�WUDQVDFWLRQ�FRGH�ZLOO�LQGHHG�DSSHDU�PXOWLSOH�WLPHV��$W�SUHVHQW��WKHUH�DUH�QR�PHUJHFDSDELOLWLHV�WR�HOLPLQDWH�UHSHDWHG�WUDQVDFWLRQ�FRGHV�

,I�D�XVHU�KDV�PDQ\�DFWLYLW\�JURXSV�RU�PDQ\�WUDQVDFWLRQ�FRGHV��LV�WKHUH�DQ�HIIHFW

RQ�SHUIRUPDQFH��IRU�H[DPSOH��WKH�WLPH�IRU�WKH�ILUVW�VFUHHQ�WR�EH�SURFHVVHG�"

(DFK�´EUDQFKµ�RU�´QRGHµ�RQ�WKH�6$3�(DV\�$FFHVV�PHQX�UHSUHVHQWV�LWHPV�WKDW�D�XVHU�KDVDFFHVV�WR��3HUIRUPDQFH�GRHV�JR�GRZQ�ZLWK�D�ODUJH�QXPEHU�RI�QRGHV��EXW�IURP�SUHOLPLQDU\WHVWLQJ�E\�6$3�GHYHORSPHQW�JURXSV��WKH�V\VWHP�FDQ�KDQGOH�DQ�H[WHQVLYH�QXPEHU�ZLWK�DUHDVRQDEOH�UHVSRQVH�WLPHV��PRUH�WKDQ�D�XVHU�FDQ�KDQGOH�LQ�D�UHDVRQDEOH�OLIHWLPH���7KH�WHVWLQJRI�D�PHQX�EUDQFK�QRGH�VWUXFWXUH�RI��������QRGHV�KDV�EHHQ�VKRZQ�WR�SURYLGH�JRRGUHVSRQVH�WLPHV�

:KDW�KDSSHQHG�WR�WKH�5HSRUW�7UHHV�LQ�����DQG�DUH�WKH\�LQ�WKH�6$3�(DV\�$FFHVV

VFUHHQ"

5HSRUW�7UHHV�LQ�����DUH�QRZ�FOLHQW�LQGHSHQGHQW��7KH\�H[LVW�LQ�WKH�6$3�(DV\�$FFHVV�PHQX�5HSRUWLQJ�WUHHV�DQG�DUHD�PHQXV�KDYH�EHHQ�PHUJHG�LQ�IXQFWLRQDOLW\�DQG�LQ�RQH�WRRO��3OHDVHVHH�WKH�UHOHDVH�QRWHV�UHODWHG�WR�WKLV�WRSLF�

:LOO�RQH�XVHU��IRU�H[DPSOH��WKH�$XWKRUL]DWLRQV�$GPLQLVWUDWRU��EH�DEOH�WR�YLHZ�WKH

)DYRULWHV�RI�DQRWKHU�XVHU"�:LOO�D�XVHU�EH�DEOH�WR�DGG�DQ\�WUDQVDFWLRQ�FRGH�WR�WKHLU

IDYRULWHV"

$W�SUHVHQW��RQH�XVHU�FDQQRW�YLHZ�WKH�IDYRULWHV�RI�DQRWKHU�XVHU��$�XVHU�FDQ�DGG�DQ\WUDQVDFWLRQ�FRGH�WR�WKHLU�IDYRULWHV��+RZHYHU��D�XVHU�FDQQRW�H[HFXWH�WKH�WUDQVDFWLRQ�FRGHXQOHVV�WKH\�KDYH�DSSURSULDWH�DXWKRUL]DWLRQV��6B7&2'(��WR�GR�VR��)DYRULWHV��DW�SUHVHQW��DUHQRW�YLHZHG�E\�6$3�GHYHORSPHQW��DV�´VHFXULW\�UHOHYDQW�µ

,I�D�XVHU�FRSLHV�VRPH�WUDQVDFWLRQV�IURP�WKHLU�PHQX�WR�WKHLU�IDYRULWHV�DQG�ODWHU�RQ�WKHVHWUDQVDFWLRQV�DUH�WDNHQ�RXW�RI�WKHLU�DFWLYLW\�JURXS��WKH�WUDQVDFWLRQV�VWLOO�UHPDLQ�LQ�WKH�XVHU·V

Appendix B: Frequently Asked Questions

Profile Generator Setup

Release 4.6A/BB–3

IDYRULWHV��7KH�XVHU�ZLOO�QRW�KDYH�DXWKRUL]DWLRQV�IRU�WKHVH�WUDQVDFWLRQV�DQ\PRUH��0DQXDOPDLQWHQDQFH�RI�WKH�IDYRULWHV�LV�QHHGHG�

3URILOH�*HQHUDWRU�6HWXS

+RZ�GRHV�WKH�$87+25,7<�&+(&.�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU"

:KHQ�$87+25,7<�&+(&.�LV�FDOOHG��WKH�V\VWHP�FKHFNV�ZKHWKHU�WKH�V\VWHP�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VHW�WR�<��,I�WKH�SDUDPHWHU�LV�QRW�VHW�WR�<��WKH�QRUPDO$87+25,7<�&+(&.�LV�FRQGXFWHG��,I�WKH�SDUDPHWHU�LV�VHW�WR�<��LW�VHDUFKHV�IRU�DQ�HQWU\�LQWDEOH�862%;B&��UHIHU�WR�VWUXFWXUH�862%;B&��ZLWK�WKH�FXUUHQW�WUDQVDFWLRQ�FRGH�DQGDXWKRUL]DWLRQ�REMHFW��,I�QRWKLQJ�LV�IRXQG��WKH�QRUPDO�$87+25,7<�&+(&.�LV�FRQGXFWHG��,IDQ�HQWU\�LV�IRXQG��DQG�862%;B&�2.)/$*�LV�VHW�WR�1���QR�FKHFN�LV�SHUIRUPHG��UHJDUGOHVV�RIWKH�DFWXDO�XVHU�SURILOH��,Q�DOO�RWKHU�FDVHV��WKH�UHJXODU�DXWKRUL]DWLRQ�FKHFN�LV�FRQGXFWHG�DQGVXFFHHGV�ZKHQ�WKH�XVHU�SURILOH�FRQWDLQV�DQ�DXWKRUL]DWLRQ�ZLWK�WKH�FRUUHVSRQGLQJH[SUHVVLRQV�IRU�WKH�FXUUHQW�REMHFW�

,Q�D�QHZ�LQVWDOODWLRQ�WKH�SDUDPHWHU�LV�VHW�WR�<��VLQFH�WKH�3*�LV�DOUHDG\�DFWLYDWHG��)RU�PRUHLQIRUPDWLRQ��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�

'R�,�QHHG�WR�VKXW�GRZQ�DQG�UHVWDUW�WKH�LQVWDQFH�DIWHU�,�FKDQJHG�WKH�V\VWHP

SURILOH�SDUDPHWHU"

<HV��\RX�PXVW�UHVWDUW�WKH�LQVWDQFH�DIWHU�DGGLQJ�WKH�LQVWDQFH�SURILOH�SDUDPHWHU��)RU�IXUWKHULQIRUPDWLRQ�RQ�KRZ�WKH�3*�LV�VHW�XS�DQG�ZKDW�VHWWLQJV�QHHG�WR�EH�SHUIRUPHG��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�

:RUNLQJ�ZLWK�WKH�3*�DQG�3URILOHV

&DQ�,�LQFOXGH�DQ�H[LVWLQJ�SURILOH�LQ�DQ�DFWLYLW\�JURXS"

<HV��\RX�FDQ�LQFOXGH�DQ�H[LVWLQJ�SURILOHV��VLQJOH�DQG�FRPSRVLWH��LQWR�DQ�DFWLYLW\�JURXS�3OHDVH�UHIHU�WR�FKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�

:K\�LV�RQO\�RQH�SURILOH�VRPHWLPHV�JHQHUDWHG"

7HFKQLFDOO\��RQO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�RQH�SURILOH��VR�VHYHUDO�SURILOHV�DUH�FUHDWHGIRU�ODUJH�DFWLYLW\�JURXSV��6LQFH�WKH�ODVW�WZR�GLJLWV�DUH�UHTXLUHG�IRU�WKH�LQWHUQDO�QXPHUDWRU�RQO\����GLJLWV�DUH�DYDLODEOH�IRU�WKH�SURILOH�QDPH�

Appendix B: Frequently Asked Questions

Working with the PG and Profiles

Authorizations Made EasyB–4

&DQ�,�PDQXDOO\�FKDQJH�JHQHUDWHG�SURILOHV�IURP�3)&*�LQ�68��"

<RX�FDQ�RQO\�FKDQJH�JHQHUDWHG�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*��ZKHUH�\RX�KDYH�DOO�WKH�VDPHRSWLRQV�DV�LQ�WUDQVDFWLRQ�68����7R�EORFN�JHQHUDWHG�SURILOHV�IRU�PDLQWHQDQFH��XVH�68����,QRWKHU�ZRUGV��LI�WKH�SURILOH�ZDV�FUHDWHG�DV�D�UHVXOW�RI�3)&*��\RX�FDQQRW�FKDQJH�LW�ZLWK�68���

&DQ�,�LQFOXGH�PDQXDO�SURILOHV�LQ�WKH�3URILOH�*HQHUDWRU"

,Q�WKH�3*��FKRRVLQJ�(GLW�→�,QVHUW�DXWK��→�IURP�SURILOH�LQFOXGHV�DOO�DXWKRUL]DWLRQV�IURP�DPDQXDOO\�FUHDWHG�SURILOH�LQ�D�JHQHUDWHG�SURILOH��7KHVH�DXWKRUL]DWLRQV�UHPDLQ�LQ�PDQXDOVWDWXV�DQG��LI�WKH�DFWLYLW\�JURXS�FKDQJHV��WKH�DXWKRUL]DWLRQV�UHPDLQ�XQFKDQJHG�ZKHQ�\RXFRPSDUH�WKH�SURILOH��+RZHYHU��\RX�FDQ�RQO\�LQVHUW�DXWKRUL]DWLRQV�IURP�D�VLQJOH�SURILOH�

&DQ�,�PDQXDOO\�HQWHU�JHQHUDWHG�SURILOHV�LQ�WKH�XVHU�PDVWHU�UHFRUG"

<HV��EXW�ZH�GR�QRW�UHFRPPHQG�LW�IRU�WKH�IROORZLQJ�UHDVRQV�< ,I�WKH�DFWLYLW\�JURXS�LV�H[WUHPHO\�ODUJH��RU�LV�LQFUHDVHG�E\�D�ODWHU�FKDQJH���WKH�3*

JHQHUDWHV�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�SURILOH�DQG�DXWRPDWLFDOO\�XSGDWHV�WKH�DIIHFWHGXVHU�PDVWHUV��ZKLFK�KDYH�WR�EH�PDQXDOO\�LQVHUWHG�

< :KHQ�DVVLJQLQJ�ZLWK�WKH�3*��\RX�FDQ�LQFOXGH�WLPH�GHSHQGHQFLHV�DQG�DVVLJQ�WKH�SURILOHIRU�D�OLPLWHG�WLPH�SHULRG�

,V�LW�SRVVLEOH�WR�FKDQJH�WKH�SURILOH�QDPH�ODWHU"

<HV��RQO\�WKH�ORQJ�WH[W��GHVFULSWLYH�WH[W��WR�D�SURILOH�FDQ�EH�FKDQJHG�ZLWK�WKH�3*��ZKLFK�GRHVQRW�DIIHFW�WKH�DXWKRUL]DWLRQV�XVHG�LQ�WKLV�SURILOH��,W�LV�QRW�SRVVLEOH�WR�PDQXDOO\�FKDQJH�WKHWHFKQLFDO�SURILOH�QDPH�RI�D�JHQHUDWHG�SURILOH�ZLWK�WKH�3*�

&DQ�,�FRS\�DQ�DFWLYLW\�JURXS��DQG�ZLOO�WKLV�SURFHGXUH�DOVR�FRS\�WKH�SURILOH"

<HV��\RX�FDQ�FRS\�DFWLYLW\�JURXSV��EXW�ZKLOH�FRS\LQJ��FKRRVH�D�GLIIHUHQW�QDPH�IRU�WKH�QHZDFWLYLW\�JURXS��7KH�DFWLYLW\�JURXS��WKH�DFWLYLWLHV��DQG�WKH�SURILOH�GDWD�DUH�WKHQ�FRSLHG��6HHFKDSWHU����WKH�VHFWLRQ�&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�IRU�GHWDLOHG�LQIRUPDWLRQ�

,I�,�JHQHUDWH�D�SURILOH�WKDW�PD\�XVH�D�SUHYLRXVO\�EXLOW�DXWKRUL]DWLRQ��ZLOO�WKH

V\VWHP�FUHDWH�D�QHZ�RQH�RU�XVH�WKH�H[LVWLQJ�RQH"

(YHU\�WLPH�\RX�JHQHUDWH�D�QHZ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��QHZ�DXWKRUL]DWLRQV�DUH�FUHDWHG�,W�WDNHV�ORQJHU�WR�VHDUFK�IRU�H[LVWLQJ�DXWKRUL]DWLRQV�ZLWK�WKH�VDPH�YDOXHV�WKDQ�WR�FUHDWH�QHZRQHV��(DFK�DXWKRUL]DWLRQ�FDQ�RQO\�EH�XVHG�LQ�RQH�DFWLYLW\�JURXS�

+RZ�GR�,�UHVWULFW�DFWLYLWLHV�E\�VSHFLILF�WLPH�SHULRGV"

(YHQ�LI�\RX�GR�QRW�XVH�%&�2UJ��\RX�FDQ�VWLOO�FKRRVH�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�XVHUV�IRU�DOLPLWHG�WLPH��7KLV�DFWLRQ�PDNHV�VHQVH��IRU�H[DPSOH��ZKHQ�\RXU�FRPSDQ\�HQWHUV�D�QHZ�ILVFDO\HDU��3K\VLFDO�LQYHQWRU\�DFWLYLWLHV�VKRXOG�RQO\�EH�DOORZHG�IRU�D�OLPLWHG�SHULRG�RI�WLPH��)RUIXUWKHU�LQIRUPDWLRQ�RQ�VHWWLQJ�WLPH�OLPLWV��UHIHU�WR�FKDSWHU����$VVLJQLQJ�DFWLYLW\�JURXSV�

Appendix B: Frequently Asked Questions

Authorization Checks (SU24)

Release 4.6A/BB–5

:KLFK�WUDQVDFWLRQV�DUH�XVHG�E\�WKH�3*�WR�PDLQWDLQ�D�VSHFLILF�DXWKRUL]DWLRQ"

2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH�8WLOLWLHV�→�6HWWLQJV�→�)RU2YHUYLHZ�RI�$XWKRUL]DWLRQ�2EMHFW�8VH��WR�LPSRUW�DQ�LFRQ�LQWR�\RXU�SURILOH�WUHH��7KLV�LFRQ�ZKLFK�ORRNV�OLNH�D�PRXQWDLQ��GLVSOD\V�WKH�WUDQVDFWLRQV�IRU�ZKLFK�WKH�&KHFN�PDLQWDLQ�IODJ�LVVHW�IRU�WKH�REMHFW�

$XWKRUL]DWLRQ�&KHFNV��68���

:KDW�GR�WKH�GLIIHUHQW�FKHFN�IODJV�VWDQG�IRU"

&0��&KHFN�0DLQWDLQ�

< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW�DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&��&KHFN�

< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

1��1R�FKHFN�

< 7KH�DXWKRULW\�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8��8QPDLQWDLQHG�

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRULW\�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

7R�OHDUQ�PRUH�DERXW�WUDQVDFWLRQ�68����SOHDVH�VHH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI$XWKRUL]DWLRQ�&KHFNV�

:K\�'RHV�WKH�3URILOH�*HQHUDWRU�0DLQWDLQ�$XWKRUL]DWLRQV�IRU�0RUH�2EMHFWV�7KDQ

<RX�&DQ�6HH"

:LWK�WUDQVDFWLRQ�68���\RX�FDQ�EURZVH�WKH�HQWULHV�RI�WDEOHV�862%;B&�DQG�862%7B&��7KH3*�XVHV�WDEOH�862%;B&�WR�FKHFN�IRU�WUDQVDFWLRQV�LQ�WKH�FRUUHVSRQGLQJ�DFWLYLW\�JURXSVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW·V�DXWKRUL]DWLRQV�DUH�WR�EH�PDLQWDLQHG��7KH�FRUUHVSRQGLQJYDOXHV�DUH�VWRUHG�LQ�WDEOH�862%7B&��%XW��WKH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ��7KHVHWUDQVDFWLRQV�ZRUN�ZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��UHVWULFWHG�E\�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�WKDW�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�

Appendix B: Frequently Asked Questions

Authorization Checks (SU24)

Authorizations Made EasyB–6

7KH�DXWKRUL]DWLRQ�FKHFNV�DUH�FRGHG�H[FOXVLYHO\�LQ�WKH�FRUH�WUDQVDFWLRQ��+RZHYHU��WKHDXWKRUL]DWLRQ�ILHOG�YDOXHV�FDQ�EH�VSHFLILHG�PRUH�SUHFLVHO\�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�WKDQLQ�WKH�FRUH�WUDQVDFWLRQ��7KH�3*�ILUVW�PDLQWDLQV�WKH�DXWKRUL]DWLRQV�LQ�862%;B&�DQG862%7B&�XQGHU�WKH�SDUDPHWHU�WUDQVDFWLRQ��DQG�WKHQ�OLVWV�DXWKRUL]DWLRQV�IRU�DOODXWKRUL]DWLRQ�REMHFWV�LQ�WKH�FRUH�WUDQVDFWLRQ�DV�WR�EH�PDLQWDLQHG��$V�D�UHVXOW��IRU�WKH�SDUDPHWHUWUDQVDFWLRQ��PRUH�DXWKRUL]DWLRQV�DUH�PDLQWDLQHG�WKDQ�FDQ�EH�VHHQ�LQ�68���

)RU�H[DPSOH��WUDQVDFWLRQ�2&����ZKLFK�PDLQWDLQV�H[FKDQJH�UDWHV��XVHV�WKH�JHQHUDO�WDEOHPDLQWHQDQFH�WUDQVDFWLRQ��60�����2Q�WKH�LQLWLDO�VFUHHQ�IRU�60����HQWHU�WKH�YLHZ�QDPHV_TCURR�DQG�FKRRVH�0DLQWDLQ��7KH�3*�UHDGV�68���IRU�2&���DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQIRU�WKH�REMHFW�6B7$%8B',6�ZLWK�WKH�&KDQJH�DQG�'LVSOD\�YDOXHV�IRU�WKH�DFWLYLW\�DQG�WKH�)&��YDOXH�IRU�WKH�DXWKRUL]DWLRQ�JURXS��7KH�3*�DOVR�UHDGV�68���IRU�WKH�FRUH�WUDQVDFWLRQ�60��DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQ�IRU�6B7$%8B&/,�ZLWK�D�%/$1.�YDOXH��EHFDXVH�WKLV�REMHFW�LVQRW�OLVWHG�LQ�68���XQGHU�2&���

+RZ�'R�,�5HGXFH�WKH�6FRSH�RI�$XWKRULW\�&KHFNV�LQ�5��"

6HH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�LQ�WKLV�JXLGH�

+RZ�&DQ�D�&XVWRPHU�,QFOXGH�,QGLYLGXDO�$XWKRUL]DWLRQ�&KHFNV�LQ�D�7UDQVDFWLRQ"

)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�EH�FDUULHG�RXW�< $OZD\V< 2QO\�RQ�FHUWDLQ�VFUHHQV< 2QO\�LQ�FHUWDLQ�WUDQVDFWLRQV

)RU�PRUH�LQIRUPDWLRQ�RQ�ILHOG�H[LWV��VHH�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'�

:KHQ�6WDUWLQJ�7UDQVDFWLRQV��:KDW�6KRXOG�,�.QRZ�$ERXW�WKH�1HZ�$XWKRUL]DWLRQ

&KHFN"

(DFK�WLPH�D�QHZ�WUDQVDFWLRQ�LV�FDOOHG��00����IRU�H[DPSOH���WKH�V\VWHP�FKHFNV�ZKHWKHU�WKHXVHU�LV�DXWKRUL]HG�WR�VWDUW�WKDW�WUDQVDFWLRQ���1R�FKHFN�WDNHV�SODFH�IRU�WKH�$%$3�FRPPDQG&$//�75$16$&7,21���,I�\RX�XVH�WKH�3*�DQG�LWV�PHQXV�WR�IRUP�DFWLYLW\�JURXSV��DQDXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(�LV�DXWRPDWLFDOO\�GHILQHG�IRU�HDFK�DFWLYLW\�JURXS��,WFRQWDLQV�WKH�H[DFW�WUDQVDFWLRQV�WKDW�\RX�VHOHFWHG�IRU�WKH�DFWLYLW\�JURXS�

,I�\RX�ZDQW�WR�DOORZ�WUDQVDFWLRQV�WKDW�\RX�GLG�QRW�DVVLJQ�XVLQJ�WKH�DFWLYLW\�JURXS�PHQX�PDQXDOO\�DGG�DQ�DXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(��DQG�HQWHU�WKH�PLVVLQJ�WUDQVDFWLRQV��<RXFDQ�QRZ�DYRLG�SUREOHPV�ZKHQ�\RX�FRPSDUH�WKH�DXWKRUL]DWLRQ�GDWD�

6B7&2'(�LV�IRXQG�LQ�WKH�REMHFW�FODVV�1RQDSSOLFDWLRQ�VSHFLILF�$XWKRUL]DWLRQ�REMHFWV��7KH6B7&'B$//�DXWKRUL]DWLRQ�LV�GHOLYHUHG�ZLWK�WKH�SURILOH�6$3B1(:B��(��ZKLFK�DOORZV�\RX�WRH[HFXWH�DOO�WUDQVDFWLRQV��%\�JLYLQJ�UHVWULFWHG�DXWKRUL]DWLRQV�IRU�6B7&2'(��WKH�XVHUDGPLQLVWUDWRU�FDQ�UHVWULFW�LQGLYLGXDO�XVHUV�RU�XVHU�JURXSV�WR�UHPDLQ�ZLWKLQ�WKH�WUDQVDFWLRQVWKH\�UHTXLUH��7KH�DXWKRUL]DWLRQ�FKHFNV�GHILQHG�E\�WKH�GHYHORSHU�ZLWK�WUDQVDFWLRQ�6(���WUDQVDFWLRQ�PDLQWHQDQFH���RU�LQ�WKH�$%$3�VRXUFH�FRGH��FRQWLQXH�WR�EH�SHUIRUPHG�

Appendix B: Frequently Asked Questions

Upgrade Procedure (SU25)

Release 4.6A/BB–7

7KHVH�DUH�WKH�DGYDQWDJHV�RI�WKH�QHZ�DXWKRUL]DWLRQ�FKHFN�< $�JXDUDQWHH�WKDW�HDFK�WUDQVDFWLRQ�SHUIRUPV�DW�OHDVW�RQH�DXWKRUL]DWLRQ�FKHFN< $Q�HDV\�ZD\�WR�GHWHUPLQH�ZKLFK�WUDQVDFWLRQV�D�XVHU�FDQ�H[HFXWH

8SJUDGH�3URFHGXUH��68���

,V�WKHUH�D�ZD\�WR�UXQ�WKH�68���VWHSV�LQ�´VLPXODWLRQµ�RU�´WHVWµ�PRGH"

$W�SUHVHQW��LW�LV�QRW�SRVVLEOH�WR�UXQ�D�VLPXODWLRQ�RU�WHVW�PRGH�

,QFOXGLQJ�7UDQVDFWLRQV�RU�5HSRUWV

+RZ�FDQ�,�LQFOXGH�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV�LQ�WUDQVDFWLRQV"

)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�DOZD\V�EHFDUULHG�RXW�RQO\�RQ�FHUWDLQ�VFUHHQV�RU�LQ�FHUWDLQ�WUDQVDFWLRQV��)XUWKHU�GHWDLOV�RQ�ILHOG�H[LWVFDQ�EH�IRXQG�LQ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'��127(��)LHOG�H[LWV�JHWLQYRNHG�DIWHU�WKH�XVHU�DWWHPSWV�WR�SURFHVV�D�SDUWLFXODU�VFUHHQ��)LHOG�H[LWV�GR�QRW�SUHYHQWXVHUV�IURP�HQWHULQJ�D�VFUHHQ�ZKLFK�FRQWDLQV�WKH�ILHOG��$V�ILHOG�H[LWV�FDQ�EH�PDGH�WR�EH�VFUHHQDQG�SURJUDP�VSHFLILF��LW�LV�SRVVLEOH�WKDW�6$3�FDQ�GHILQH�QHZ�VFUHHQV�DQG�SURJUDPV�ZKLFKZLOO��H�J��DIWHU�DQ�XSJUDGH��UHQGHU�WKH�ILHOG�H[LW�DV�QRQ�IXQFWLRQDO��)LHOG�H[LWV�RI�VXFK�VRUWPXVW�DOZD\V�EH�FRQVLGHUHG�DIWHU�DQ�XSJUDGH�

0LVVLQJ�$XWKRUL]DWLRQV

:KDW�LI�DQ�DXWKRUL]DWLRQ�LV�VWLOO�PLVVLQJ�IRU�WKH�JHQHUDWHG�SURILOH��DQG�WKH�XVHU

JHWV�D�´1R�DXWKRUL]DWLRQ���µ�PHVVDJH"

5HPHPEHU�WKDW�LI�LPSOHPHQWLQJ�DQ\�SRUWLRQ�RI�WKH�+5�FRPSRQHQW�RI�WKH�5���6\VWHP��WKHUHLV�D�SRVVLELOLW\�WR�HQDEOH�FHUWDLQ�SDUWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP�WKDW�DUH�127�UHODWHG�WR�WKHSURILOH�JHQHUDWRU��H[DPSOH��,PSOHPHQWLQJ�+5�VWUXFWXUDO�DXWKRUL]DWLRQV���$V�VXFK��WKH�´1RDXWKRUL]DWLRQ«�µ�PHVVDJH�ZRXOG�EH�FRUUHFW�DQG�WKH�V\VWHP�LV�QRW�LQ�HUURU��,I�FRQYLQFHG�WKDWWKHUH�LV�DQ�HUURU�LQ�WKH�V\VWHP��FUHDWH�DQ�6$31HW�²�5���)URQWHQG�QRWH�WR�VSHFLI\�WKHWUDQVDFWLRQ�DQG�WKH�SUHFLVH�HUURU�PHVVDJH��SUHIHUDEO\�D�FRS\�RI�WKH�RXWSXW�IURP�WUDQVDFWLRQ68����WKDW�\RX�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS��7R�FRUUHFW�WKH�HUURU�LQ�\RXU�V\VWHP��VHHFKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�

Appendix B: Frequently Asked Questions

User Administration

Authorizations Made EasyB–8

8VHU�$GPLQLVWUDWLRQ

+RZ�FDQ�WKH�ZRUN�LQYROYHG�LQ�PDLQWDLQLQJ�VHWWLQJ�XS�DXWKRUL]DWLRQV�EH�GLYLGHG�XS

DPRQJVW�PXOWLSOH�SHRSOH"

6LQFH�WKH�3*�VHOHFWV�WKH�DXWKRUL]DWLRQ�REMHFWV��LW�LV�QR�ORQJHU�QHFHVVDU\�WR�GHFLGH�ZKRPDLQWDLQV�DXWKRUL]DWLRQV�IRU�DQ�REMHFW��7KH�FKHFN�DJDLQVW�WKH�REMHFW�6B86(5B$87�LV�FDUULHGRXW�RQO\�LI�WKH�DGPLQLVWUDWRU�PDQXDOO\�LQVHUWV�DQ�DXWKRUL]DWLRQ��:LWK�DXWKRUL]DWLRQ�REMHFW6B86(5B$*5��D�FKHFN�LV�SRVVLEOH�DW�WKH�DFWLYLW\�JURXS�OHYHO�WR�VHH�ZKR�LV�DOORZHG�WR�VHOHFWZKLFK�WUDQVDFWLRQ�IRU�WKLV�DFWLYLW\�JURXS��)RU�D�IXUWKHU�FODVVLILFDWLRQ�LQWR�DXWKRUL]DWLRQ�DQGDFWLYDWLRQ�DGPLQLVWUDWRU��VHH�$GPLQLVWUDWLRQ�:KHQ�8VLQJ�WKH�3URILOH�*HQHUDWRU�LQ�WKH�RQOLQHGRFXPHQWDWLRQ�

7UDQVSRUWLQJ

'R�WKH�862%;B&�DQG�862%7B&�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�FOLHQWV"

1R��7KHVH�WDEOHV�DUH�FOLHQW�LQGHSHQGHQW��7KH\�RQO\�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�V\VWHPV�

,V�WKHUH�D�ZD\�WR�WUDQVSRUW�DFWLYLW\�JURXSV"

<HV��\RX�FDQ�HLWKHU�XVH�WKH�VWDQGDUG�WUDQVSRUW�FRQQHFWLRQ�LQ�WUDQVDFWLRQ�3)&*�RU�XVH�PDVV�WUDQVSRUW�DFWLYLW\�JURXSV�LQVLGH�WKH�3*�

'RHV�WKH�WUDQVSRUW�RI�DFWLYLW\�JURXSV�EHWZHHQ�WZR�FOLHQWV��LQ�WKH�VDPH�V\VWHP�

ZRUN�ZLWK�WUDQVDFWLRQ�6&&�"

<HV��DIWHU�EHLQJ�LPSRUWHG�WR�WKH�WDUJHW�FOLHQW��WKH�WUDQVSRUWHG�DFWLYLW\�JURXSV�DUH�QRZ�DFWLYHDQG�GR�DSSHDU�LQ�WUDQVDFWLRQ�3)&*��7KLV�VWHS�ZDV�QRW�SRVVLEOH�LQ�UHOHDVHV�EHIRUH����%�

:KDW�LI�WKH�JHQHUDWHG�SURILOH�RQO\�KDV�DXWKRUL]DWLRQV�IRU�REMHFW�6B7&2'("

7KH�6$3�GHIDXOW�WDEOHV�PD\�QRW�KDYH�EHHQ�FRSLHG�LQWR�WKH�FXVWRPHU�WDEOHV��,I�\RX�JHW�D�1RRUJDQL]DWLRQDO�GDWD�DYDLODEOH�PHVVDJH��UXQ�WUDQVDFWLRQ�68����6HH�FKDSWHU���LQ�WKLV�JXLGH�IRUPRUH�LQIRUPDWLRQ�RQ�WUDQVDFWLRQ�68���

7DEOHV

+RZ�GR�,�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV�WKDW�DUH�LQFOXGHG�LQ�DQ�DFWLYLW\�JURXS"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�$*5B1$0(�

Appendix B: Frequently Asked Questions

Tables

Release 4.6A/BB–9

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�WUDQVDFWLRQ�FRGHV�LQ�WKDW�DFWLYLW\�JURXS�QDPH�

+RZ�GR�,�GLVSOD\�LQ�ZKLFK�DFWLYLW\�JURXS�D�FHUWDLQ�WUDQVDFWLRQ�FRGH�LV�EHLQJ�XVHG"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKH�ILHOG�7&2'(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�DFWLYLW\�JURXSV�QDPH�ZKHUH�WKDW�WUDQVDFWLRQ�FRGH�LV�EHLQJXVHG�

+RZ�GR�,�GLVSOD\�ZKLFK�DFWLYLW\�JURXS�LV�XVHG�E\�ZKLFK�XVHU"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�7$*5B1$0(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�QDPHV�RI�DOO�XVHUV�WKDW�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�

+RZ�GR�,�GLVSOD\�ZKLFK�XVHU�LV�DVVLJQHG�WR�ZKLFK�DFWLYLW\�JURXS"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�XVHU�LQ�WKH�ILHOG�81$0(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�DOO�DFWLYLW\�JURXSV�WKLV�XVHU�LV�DVVLJQHG�WR�

'RHV�WKH�DXWKRUL]DWLRQ�REMHFW�DOORZ�DFWLYLWLHV�QRW�PDLQWDLQHG�LQ�WDEOH�7$&7="

7DEOH�7$&7=�FRQWDLQV�DOORZDEOH�DFWLYLWLHV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW��,I�\RX�ILQG�DWUDQVDFWLRQ�ORRNLQJ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�ZLWK�DQ�DFWLYLW\�WKDW�LV�QRW�PDLQWDLQHG�RURIIHUHG�E\�3*��PDLQWDLQ�WKH�PLVVLQJ�DFWLYLW\�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�REMHFW�LQ�WDEOH7$&7=�ZLWK�WUDQVDFWLRQ�60����7KH�3*�WKHQ�RIIHUV�WKLV�YDOXH�

Appendix B: Frequently Asked Questions

Tables

Authorizations Made EasyB–10

:KDW�LV�WKH�VWUXFWXUH�RI�WDEOH�862%;B&"

)LHOG�QDPH .H\ 'HVFULSWLRQ

1$0( ; 3URJUDP�WUDQVDFWLRQ�IXQFWLRQ�PRGXOH�QDPH

7<3( ; 7\SH�RI�UHSRUW

2%-(&7 ; 8VHU�PDVWHU�PDLQWHQDQFH��DXWKRUL]DWLRQ�REMHFW

02',),(5 /DVW�FKDQJHG�E\

02''$7( 'DWH�RI�FKDQJH

02'7,0( 7LPH�RI�FKDQJH

2.)/$* 1� �1R�DXWKRUL]DWLRQ�FKHFNV;� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH<� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH��GHIDXOW�YDOXHV�LQ�862%7B&8� �1RW�PDLQWDLQHG

7KH�1$0(�DQG�7<3(�ILHOGV�LGHQWLI\�D�WUDQVDFWLRQ��DQG�2%-(&7�LGHQWLILHV�WKH�DXWKRUL]DWLRQREMHFW��02',),(5��02''$7(��02'7,0(�FRQWDLQ�DGPLQLVWUDWLYH�LQIRUPDWLRQ�DERXW�WKHPRVW�UHFHQW�FKDQJHV��2.)/$*�LV�LPSRUWDQW�EHFDXVH�ZKHQ�LW�FRQWDLQV�WKH�YDOXH�1��QRDXWKRUL]DWLRQ�FKHFN�LV�SHUIRUPHG�IRU�WKH�WUDQVDFWLRQ�DQG�DXWKRUL]DWLRQ�REMHFW�

([DPSOHV

(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_STUE_BER��2.)/$*� �N��(YHU\DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B678(B%(5�,'����ZLOO�VXFFHHG�UHJDUGOHVV�RI�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�

(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_DRAW_TCD��2.)/$*� �X�RU�DQRWKHU�YDOXH�!�N��$Q�DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B'5$:B7&'�,'����ZLOOVXFFHHG�RQO\�ZKHQ�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKH�FRPELQDWLRQ�RI�ILHOGV�RUILHOG�FRQWHQWV��XQGHU�,'�

C–1

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH

3DUDPHWHUV

&RQWHQWV

Incorrect Logons, Default Clients, and Default Start Menu............................... C–2

Setting Password Length and Expiration............................................................ C–2

Specifying Impermissible Passwords ................................................................. C–3

Securing SAP* Against Misuse ............................................................................ C–3

Tracing Authorizations.......................................................................................... C–3

Profile Generator and Transaction SU24............................................................. C–4

User Buffer.............................................................................................................. C–4

No Check on Object S_TCODE............................................................................. C–4

No Check on Certain ABAP Objects .................................................................... C–4

RFC Authority Check............................................................................................. C–5

&&

Appendix C: Important System Profile Parameters

Incorrect Logons, Default Clients, and Default Start Menu

Authorizations Made EasyC–2

,QFRUUHFW�/RJRQV��'HIDXOW�&OLHQWV��DQG�'HIDXOW�6WDUW�0HQX

8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VHW�LQFRUUHFW�ORJRQ�OLPLWV�DQG�WKH�GHIDXOWFOLHQW�< /RJLQ�IDLOVBWRBVHVVLRQBHQG

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�WHUPLQDWHV�WKH�ORJRQ�DWWHPSW��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV��EXW�WKLVYDOXH�FDQ�EH�VHW�WR�DQ\�QXPEHU�EHWZHHQ��²���

< /RJLQ�IDLOVBWRBXVHUBORFN

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�ORFNV�WKH�XVHU�IURP�PDNLQJ�DGGLWLRQDO�ORJRQ�DWWHPSWV��,I�WKH�V\VWHPORFNV��DQ�HQWU\�LV�ZULWWHQ�WR�WKH�V\VWHP�ORJ��DQG�WKH�ORFN�LV�UHOHDVHG�DW�PLGQLJKW��7KHGHIDXOW�LV����WLPHV��EXW�WKLV�YDOXH�FDQ�EH�VHW�WR�DQ\�YDOXH�EHWZHHQ��²���

< /RJLQ�IDLOHGBXVHUBDXWRBXQORFN

7KLV�SDUDPHWHU�XQORFNV�XVHUV�ZKR�JRW�ORFNHG�RXW�E\�ORJJLQJ�RQ�LQFRUUHFWO\��,I�WKHSDUDPHWHU�LV�VHW�WR����WKH�GHIDXOW���GXH�WR�D�SUHYLRXV�LQFRUUHFW�ORJRQ�DWWHPSW��WKH�V\VWHPGRHV�QRW�FRQVLGHU�XVHUV�ORFNHG��7KH�ORFNV�UHPDLQ�LI�WKH�SDUDPHWHU�YDOXH�LV���

< /RJLQ�V\VWHPBFOLHQW

7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�FOLHQW��7KLV�FOLHQW�LV�DXWRPDWLFDOO\�ILOOHG�LQ�RQ�WKHV\VWHP�ORJRQ�VFUHHQ��8VHUV�FDQ�HQWHU�D�GLIIHUHQW�FOLHQW�

< /RJLQ�H[WBVHFXULW\

6LQFH�5HOHDVH����(��H[WHUQDO�VHFXULW\�WRROV�VXFK�DV�.HUEHURV�RU�6HFXGH�KDYH�PDQDJHG5���6\VWHP�DFFHVV��,I�WKLV�SDUDPHWHU�LV�VHW��DQ�DGGLWLRQDO�LGHQWLILFDWLRQ�FDQ�EH�VSHFLILHGIRU�HDFK�XVHU��LQ�XVHU�PDLQWHQDQFH��ZKHUH�XVHUV�ORJ�RQ�WR�WKHLU�VHFXULW\�V\VWHP��7RDFWLYDWH��VHW�WKH�YDOXH�WR�;�

< 6WDUWBPHQX

7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�VWDUW�PHQX�IRU�DOO�XVHUV�DQG�FDQ�EH�RYHUZULWWHQ�ZLWKWKH�XVHU�VSHFLILF�VWDUW�PHQX��WUDQVDFWLRQ�68�����7KH�GHIDXOW�LV�6�����DQG�WKLV�YDOXH�FDQ�EHVHW�WR�DQ\�RWKHU�DUHD�PHQX�FRGH�

6HWWLQJ�3DVVZRUG�/HQJWK�DQG�([SLUDWLRQ

8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VSHFLI\�WKH�PLQLPXP�OHQJWK�RI�D�SDVVZRUGDQG�WKH�IUHTXHQF\�ZLWK�ZKLFK�XVHUV�PXVW�FKDQJH�SDVVZRUGV�< /RJLQ�PLQBSDVVZRUGBOQJ

7KLV�SDUDPHWHU�GHILQHV�WKH�PLQLPXP�SDVVZRUG�OHQJWK��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV�EXW�WKLV�YDOXH�FDQ�EH�VHW�IURP�WKUHH�WR�HLJKW�FKDUDFWHUV�

Appendix C: Important System Profile Parameters

Specifying Impermissible Passwords

Release 4.6A/BC–3

< /RJLQ�SDVVZRUGBH[SLUDWLRQBWLPH

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�GD\V�DIWHU�ZKLFK�D�SDVVZRUG�PXVW�EH�FKDQJHG�7KH�SDUDPHWHU�DOORZV�XVHUV�WR�NHHS�WKHLU�SDVVZRUGV�ZLWKRXW�WLPH�OLPLW�DQG�OHDYHV�WKHYDOXH�VHW�WR�WKH�GHIDXOW����

7R�PDNH�WKH�SDUDPHWHUV�JOREDOO\�HIIHFWLYH�LQ�DQ�5���6\VWHP��VHW�WKHP�LQ�WKH�GHIDXOW�SURILOH�'()$8/7�3)/��7R�PDNH�WKHP�LQVWDQFH�VSHFLILF��\RX�PXVW�VHW�WKHP�LQ�WKH�SURILOHV�RI�HDFKDSSOLFDWLRQ�VHUYHU�LQ�\RXU�5���6\VWHP�

6SHFLI\LQJ�,PSHUPLVVLEOH�3DVVZRUGV

7R�IRUELG�XVH�RI�D�FHUWDLQ�SDVVZRUG��HQWHU�LW�LQ�WDEOH�865����<RX�FDQ�PDLQWDLQ�WKLV�WDEOH�ZLWKWUDQVDFWLRQ�60����,Q�865����\RX�PD\�DOVR�JHQHULFDOO\�VSHFLI\�SURKLELWHG�SDVVZRUGV�

7KHUH�DUH�WZR�ZLOG�FDUG�FKDUDFWHUV�< $�TXHVWLRQ�PDUN��"��PHDQV�D�VLQJOH�FKDUDFWHU�< $Q�DVWHULVN�� ��PHDQV�D�VHTXHQFH�RI�DQ\�FRPELQDWLRQ�FKDUDFWHUV�RI�DQ\�OHQJWK�

([DPSOHV�< ��� �LQ�WDEOH�865���SURKLELWV�DQ\�SDVVZRUG�WKDW�EHJLQV�ZLWK�WKH�VHTXHQFH�����< ��� �SURKLELWV�DQ\�SDVVZRUG�WKDW�FRQWDLQV�WKH�VHTXHQFH�����< $%"�SURKLELWV�SDVVZRUGV�WKDW�EHJLQ�ZLWK�$%�DQG�KDYH�DQ�DGGLWLRQDO�FKDUDFWHU��VXFK�DV

$%$��$%%��DQG�$%&�

6HFXULQJ�6$3 �$JDLQVW�0LVXVH

/RJLQ�QRBDXWRPDWLFBXVHUBVDS

,I�WKH�SDUDPHWHU�LV�VHW�WR����WKHQ�6$3 �KDV�QR�VSHFLDO�GHIDXOW�SURSHUWLHV��5HVHWWLQJ�WKHSDUDPHWHU�WR���DOORZV�ORJLQV�ZLWK�SAP*��SDVVZRUG�PASS��DQG�XQUHVWULFWHG�V\VWHP�DFFHVVSULYLOHJHV��(YHQ�LI�\RX�VHW�WKH�SDUDPHWHU��HQVXUH�WKDW�WKHUH�LV�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �,I�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �H[LVWV��LW�EHKDYHV�OLNH�D�QRUPDO�XVHU��LV�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV��DQG�LWV�SDVVZRUG�FDQ�EH�FKDQJHG�

7UDFLQJ�$XWKRUL]DWLRQV

$XWK�FKHFNBYDOXHBZULWHBRQ

%\�HQWHULQJ�WUDQVDFWLRQ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DQDO\]H�DQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�WKDW�KDV�MXVW�RFFXUUHG�LQ�\RXU�VHVVLRQ��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�KDYHVHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�D�YDOXH�JUHDWHU�WKDQ����%\�GHIDXOW��WKH�IXQFWLRQ�LVLQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV���

Appendix C: Important System Profile Parameters

Profile Generator and Transaction SU24

Authorizations Made EasyC–4

3URILOH�*HQHUDWRU�DQG�7UDQVDFWLRQ�68��

$XWK�QRBFKHFNBLQBVRPHBFDVHV

%\�XVLQJ�WUDQVDFWLRQ�SU24��\RX�FDQ�DFWLYDWH�RU�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRUWUDQVDFWLRQV��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�VHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�<��%\GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�DFWLYDWH�WKH�SDUDPHWHU��VHWWKH�YDOXH�WR�<��,I�\RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*��WKH�SDUDPHWHU�PXVW�EH�VHW�

8VHU�%XIIHU

$XWK�DXWKBQXPEHUBLQBXVHUEXIIHU

7R�KDYH�D�JRRG�SHUIRUPDQFH�LQ�WKH�V\VWHP��WKH�QDPHV�RI�DOO�WKH�DXWKRUL]DWLRQV�LQFOXGHG�LQ�DXVHU�PDVWHU�IRU�D�XVHU�DUH�EXIIHUHG�LQ�D�WDEOH��,Q�WKH�VWDQGDUG��WKLV�EXIIHU�FDQ�GHDO�ZLWK�XS�WR������DXWKRUL]DWLRQV��,I�D�XVHU�KDV�PRUH�WKDQ�������DXWKRUL]DWLRQV�WKH�YDOXH�FDQ�EH�VHW�WR������7KH�GHIDXOW�YDOXH�LV������EXW�WKLV�GHIDXOW�YDOXH�FDQ�EH�VHW�WR�EHWZHHQ��²������,I�IRU�DQ\UHDVRQ�\RX�KDYH�WR�UHVHW�WKH�XVHU�EXIIHU��VHH�2QOLQH�6HUYLFH�6\VWHP�QRWH�������DQG�������IRUGHWDLOHG�LQIRUPDWLRQ�

1R�&KHFN�RQ�2EMHFW�6B7&2'(

$XWK�QRBFKHFNBRQBWFRGH

)URP�5HOHDVH����(��WKH�V\VWHP�FKHFNV�RQ�REMHFW�6B7&2'(��,Q�VSHFLILF�LQVWDQFHV��\RX�FDQ�WXUQWKLV�FKHFN�RII��EXW�WKLV�VWHS�UHVXOWV�LQ�D�ELJ�VHFXULW\�ULVN�IRU�\RXU�V\VWHP��%\�GHIDXOW��WKHIXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�VZLWFK�WKH�FKHFN�RII�VHW�WKH�YDOXH�WR�<�

1R�&KHFN�RQ�&HUWDLQ�$%$3�2EMHFWV

$XWK�V\VWHPBDFFHVVBFKHFNBRII

8VH�WKLV�SDUDPHWHU�WR�WXUQ�RII�WKH�DXWRPDWLF�DXWKRUL]DWLRQ�FKHFN�IRU�SDUWLFXODU�$%$3ODQJXDJH�HOHPHQWV��ILOH�RSHUDWLRQV��&3,&�FDOOV��DQG�FDOOV�WR�NHUQHO�IXQFWLRQV���7KLV�SDUDPHWHUHQVXUHV�WKH�GRZQZDUG�FRPSDWLELOLW\�RI�WKH�5���NHUQHO��%\�GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH�YDOXH� ���DQG�FKHFN�UHPDLQV�DFWLYH���7R�WXUQ�WKH�FKHFN�RII��VHW�WKH�YDOXH�WR���

Appendix C: Important System Profile Parameters

RFC Authority Check

Release 4.6A/BC–5

5)&�$XWKRULW\�&KHFN

$XWK�UIFBDXWKRULW\BFKHFN

<RX�FDQ�XVH�WKLV�SDUDPHWHU�WR�GHWHUPLQH�ZKHWKHU�REMHFW�6B5)&�LV�FKHFNHG�GXULQJ�5)&�FDOOV�< 9DOXH� ����QR�FKHFN�DJDLQVW�6B5)&< 9DOXH� ����FKHFN�DFWLYH�EXW�QR�FKHFN�IRU�65)&�)8*5

< 9DOXH� ����FKHFN�DFWLYH�DQG�FKHFN�DJDLQVW�65)&�)8*5

Appendix C: Important System Profile Parameters

RFC Authority Check

Authorizations Made EasyC–6

G–1

*ORVVDU\

7HUP 'HILQLWLRQ

$%$3 $%$3�LV�DQ�LQWHUSUHWDWLYH��SODWIRUP�LQGHSHQGHQW��IRXUWK�JHQHUDWLRQ�ODQJXDJHWDLORUHG�WR�GHYHORS�EXVLQHVV�DSSOLFDWLRQV��7KH�ODQJXDJH�VXSSRUWV�VWUXFWXUHGSURJUDPPLQJ�DQG�FRQWDLQV�HOHPHQWV�QHFHVVDU\�WR�FDOO�H[WHUQDO�UHODWLRQDO�GDWDEDVHVWKURXJK�RSHQ�64/�FDOOV�RU�GDWDEDVH�VSHFLILF�QDWLYH�64/�FDOOV��7KH�GHYHORSHU�LV�QRWUHTXLUHG�WR�NQRZ�WKH�XQGHUO\LQJ�LQIUDVWUXFWXUH�

$%$3'HYHORSPHQW:RUNEHQFK

7KH�$%$3�'HYHORSPHQW�:RUNEHQFK�SURYLGHV�D�FRPSOHWH�FOLHQW�VHUYHU�UXQWLPHHQYLURQPHQW�DQG�H[WHQVLYH�PDQDJHPHQW�DQG�WXQLQJ�WRROV��7KH�:RUNEHQFK�LV�6$3·VLQWHJUDWHG�WRRO�VHW�WR�GHYHORS�HQWHUSULVH�ZLGH�FOLHQW�VHUYHU�DSSOLFDWLRQV��7KLV�WRRO�VHW�LV�SDUWLFXODUO\�VXLWHG�WR�5���FXVWRPHUV�ZKR�ZDQW�WR�HQKDQFH�VWDQGDUG�5��EXVLQHVV�DSSOLFDWLRQV�ZLWK�FXVWRPL]HG��DGG�RQ�IXQFWLRQDOLW\�

7KH�PDMRU�FRPSRQHQWV�RI�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�LQFOXGH�< $%$3�3URJUDPPLQJ�/DQJXDJH< $%$3�'LFWLRQDU\< $%$3�(GLWRU< $%$3�)XQFWLRQ�/LEUDU\< 'DWD�0RGHOHU< 5���5HSRVLWRU\< 7HVW�7RROV��6FUHHQ�3DLQWHU< 0HQX�3DLQWHU��:RUNEHQFK�2UJDQL]HU�7UDQVSRUW�6\VWHP< 5���5HSRVLWRU\�,QIRUPDWLRQ�6\VWHP7KH�ZRUNEHQFK�LV�DOVR�DYDLODEOH�WR�FRPSDQLHV�ZKR�DUH�QRW�5���XVHUV��EXW�ZDQW�WKHEHQHILWV�RI�6$3·V�SURYHQ�GHYHORSPHQW�HQYLURQPHQW�IRU�WKHLU�VRIWZDUH�SURMHFWV�

$%$3�'LFWLRQDU\ 7KH�$%$3�'LFWLRQDU\��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��LV�D�FHQWUDOLQIRUPDWLRQ�EDVH�IRU�DSSOLFDWLRQ�DQG�V\VWHP�GDWD��7KH�'LFWLRQDU\�GHVFULEHV�WKLVGDWD�IURP�D�ORJLFDO�SRLQW�RI�YLHZ�DQG�VWRUHV�LQIRUPDWLRQ�DERXW�KRZ�WKH�GDWD�LVUHSURGXFHG�LQ�WKH�XQGHUO\LQJ�UHODWLRQDO�GDWDEDVH��7KH�$%$3�'LFWLRQDU\�LV�DFWLYHDQG�IXOO\�LQWHJUDWHG�ZLWK�WKH�RWKHU�'HYHORSPHQW�:RUNEHQFK�WRROV��$Q\�FKDQJHV�WRWKH�'LFWLRQDU\�DUH�DXWRPDWLFDOO\�DQG�LPPHGLDWHO\�XSGDWHG�WKURXJKRXW�WKH�V\VWHP�

*ORVVDU\

Authorizations Made EasyG–2

7HUP 'HILQLWLRQ

$%$3�(GLWRU 7KH�$%$3�(GLWRU��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��SURYLGHV�WKHIROORZLQJ�IXQFWLRQV�WR�VXSSRUW�WKH�DSSOLFDWLRQ�GHYHORSHU�< 6\QWD[�FKHFN�ZLWK�DXWRPDWLF�FRUUHFWLRQ�RI�HUURUV< ,QVHUWLRQ�RI�FRGLQJ�SDWWHUQV�IRU�IUHTXHQWO\�XVHG�LQVWUXFWLRQV< 1DYLJDWLRQ�LQWR�RWKHU�ZRUNEHQFK�WRROV< *HQHUDWLRQ�RI�ZKHUH�XVHG�OLVWV�IRU�DOO�GDWD�REMHFWV< 6SOLW�VFUHHQ�HGLWRU�ZLWK�SURJUDP�FRPSDULVRQ

$FWLYDWLRQDGPLQLVWUDWRU

$Q�DFWLYDWLRQ�DGPLQLVWUDWRU�DFWLYDWHV�DXWKRUL]DWLRQ�SURILOHV�DQG�DXWKRUL]DWLRQV�PDNLQJ�WKHP�HIIHFWLYH�LQ�WKH�V\VWHP��7KHVH�DGPLQLVWUDWRUV�FDQ�RQO\�FKDQJH�RUGHOHWH�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�VSHFLILHG�LQ�WKHLU�DXWKRUL]DWLRQ�SURILOH�

$FWLYH�SODQYHUVLRQ

7KLV�LV�WKH�SODQ�YHUVLRQ�WKDW�WKH�5���6\VWHP�UHFRJQL]HV�DV�YDOLG�DQG�FXUUHQWO\�LQRSHUDWLRQ��7KH�LQIRUPDWLRQ�LQ�WKH�DFWLYH�SODQ�YHUVLRQ�LV�XVHG�WR�SHUIRUP�DOO�GD\�WR�GD\�SURFHVVLQJ�DQG�FURVV�DSSOLFDWLRQ�PDLQWHQDQFH�

<RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DFWLYH�LI�< <RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU< ,QWHJUDWLRQ�LV�DFWLYH�EHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV��VXFK�DV

WKH�3*

<RXU�VHOHFWHG�SODQ�VKRXOG�UHIOHFW�WKH�DFWXDO�VWDWH�RI�RSHUDWLRQV�DW�\RXU�ILUP��$Q\RWKHU�SODQ�YHUVLRQV�\RXU�FRPSDQ\�PDLQWDLQV�FDQ�EH�XVHG�WR�H[SHULPHQW�ZLWKGLIIHUHQW�RUJDQL]DWLRQDO�VFHQDULRV�

$FWLYLW\�JURXS $Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�LQGLYLGXDO�DFWLYLWLHV�WKDW�DUH�URXWLQHO\SHUIRUPHG�WRJHWKHU�RU�DUH�DIILOLDWHG�LQ�VRPH�ZD\���)RU�H[DPSOH��WKH�WUDQVODWLRQWDVNV�DFWLYLW\�JURXS�FRXOG�LQFOXGH�DOO�WDVNV��UHSRUWV��DQG�WUDQVDFWLRQV�DVVRFLDWHGZLWK�WUDQVODWLRQ��<RX�VHW�XS�DFWLYLW\�JURXSV�E\�OLQNLQJ�VLQJOH�DFWLYLWLHV�XQGHU�DQDFWLYLW\�JURXS�QDPH��$�VLQJOH�DFWLYLW\�PD\�EH�LQFOXGHG�LQ�PRUH�WKDQ�RQH�DFWLYLW\JURXS�

$SSOLFDWLRQVHUYHU

$�FRPSXWHU�ZKHUH�WKH�DSSOLFDWLRQ�ORJLF�DQG�DSSOLFDWLRQ�FRQWURO�VHUYLFHV�RI�WKH�5��6\VWHP�UXQ�

$XWKRUL]DWLRQ $Q�DXWKRUL]DWLRQ�LV�WKH�DXWKRULW\�WR�SHUIRUP�D�SDUWLFXODU�DFWLRQ�LQ�WKH�5���6\VWHP�(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�RQH�DXWKRUL]DWLRQ�REMHFW�DQG�GHILQHV�RQH�RU�PRUHSRVVLEOH�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�OLVWHG�IRU�WKDW�DXWKRUL]DWLRQ�REMHFW��$XVHU·V�DXWKRUL]DWLRQV�DUH�FRPELQHG�LQ�D�SURILOH�WKDW�LV�HQWHUHG�LQ�WKH�XVHU·V�PDVWHUUHFRUG�

$XWKRUL]DWLRQDGPLQLVWUDWRU

7KH�XVHU�UHVSRQVLEOH�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�LVWKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU��)RU�VHFXULW\�UHDVRQV��WKLV�XVHU�VKRXOG�QRW�EHDXWKRUL]HG�WR�DFWLYDWH�DXWKRUL]DWLRQV�DQG�SURILOHV�RU�WR�PDLQWDLQ�XVHU�PDVWHUUHFRUGV��2WKHUZLVH��RQH�XVHU�ZRXOG�VLQJOH�KDQGHGO\�GHILQH��DFWLYDWH��DQG�DVVLJQV\VWHP�DFFHVV�DXWKRUL]DWLRQV�

*ORVVDU\

Release 4.6A/B �G–3

7HUP 'HILQLWLRQ

$XWKRUL]DWLRQFKHFN

7KLV�FKHFN�GHFLGHV�ZKHWKHU�D�XVHU�LV�DXWKRUL]HG�WR�H[HFXWH�D�SDUWLFXODU�IXQFWLRQ�3URFHVVHV��IXQFWLRQV��DQG�GDWD�DFFHVVHV�LQ�WKH�5���6\VWHP�FDQ�RQO\�EH�SHUIRUPHGZKHQ�XVHU�DXWKRUL]DWLRQV�KDYH�EHHQ�FKHFNHG�LQ�WKH�UHVSHFWLYH�V\VWHP�DQGDSSOLFDWLRQ�SURJUDPV�

$XWKRUL]DWLRQFRQFHSW

*HQHUDO�DFFHVV�WR�D�VWDQGDUG�GDWDEDVH�IRU�GLIIHUHQW�DSSOLFDWLRQV�UHTXLUHV�UHOLDEOHPHFKDQLVPV�GHVLJQHG�WR�HQVXUH�WKH�FRQILGHQWLDOLW\�RI�SHUVRQDO�LQIRUPDWLRQ��$PXOWLOHYHO��JUDGHG�DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�VHW�XS�WR�UHJXODWH�GDWD�DFFHVV�2QO\�WKRVH�SHRSOH�ZLWK�DFWLYH�XVHU�PDVWHU�UHFRUGV�FDQ�DFFHVV�WKH�V\VWHP��7KHDXWKRUL]DWLRQ�FRQFHSW�FRYHUV�WKH�VWUXFWXUH�DQG�IXQFWLRQDOLW\�RI�DXWKRUL]DWLRQDVVLJQPHQW�DQG�FKHFNLQJ�LQ�WKH�5���6\VWHP��$XWKRUL]DWLRQV�SURWHFW�WKH�V\VWHPIURP�XQDXWKRUL]HG�DFFHVV�

$XWKRUL]DWLRQILHOG

2QH�HOHPHQW�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�DXWKRUL]DWLRQ�ILHOG��,Q�DXWKRUL]DWLRQREMHFWV��WKHVH�ILHOGV�UHSUHVHQW�YDOXHV�IRU�LQGLYLGXDO�V\VWHP�HOHPHQWV��ZKLFKXQGHUJR�DXWKRUL]DWLRQ�FKHFNLQJ�WR�YHULI\�D�XVHU·V�DXWKRUL]DWLRQ�

$XWKRUL]DWLRQJURXS

$Q�DXWKRUL]DWLRQ�JURXS�LV�WKH�FRPELQHG�ILHOGV�RI�WKH�DXWKRUL]DWLRQ�REMHFWV6B'(9(/23��SURJUDP�GHYHORSPHQW�DQG�SURJUDP�H[HFXWLRQ��DQG�6B352*5$0�SURJUDP�PDLQWHQDQFH���7KH�DXWKRUL]DWLRQ�JURXS�ILHOG�FRQWDLQV�WKH�QDPH�RI�DSURJUDP�JURXS�WKDW�DOORZV�XVHUV�WR�SHUIRUP�WKH�IROORZLQJ�RSHUDWLRQV�< ([HFXWH�SURJUDPV< 6FKHGXOH�MREV�IRU�EDFNJURXQG�SURFHVVLQJ< 0DLQWDLQ�SURJUDPV< 0DLQWDLQ�YDULDQWV

:KHQ�FUHDWLQJ�D�SURJUDP��\RX�FDQ�VSHFLI\�DQ�DXWKRUL]DWLRQ�JURXS�DV�RQH�RI�WKHSURJUDP�DWWULEXWHV��7KLV�VWHS�DOORZV�\RX�WR�JURXS�SURJUDPV�IRU�DXWKRUL]DWLRQFKHFNLQJ�

$XWKRUL]DWLRQREMHFW

$QRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�LV�WKH�DXWKRUL]DWLRQ�REMHFW�WKDW�DOORZV\RX�WR�GHILQH�FRPSOH[�DXWKRUL]DWLRQV��$Q�DXWKRUL]DWLRQ�REMHFW�JURXSV�XS�WR���DXWKRUL]DWLRQ�ILHOGV�LQ�DQ�´$1'µ�UHODWLRQVKLS�WR�FKHFN�ZKHWKHU�D�XVHU�LV�DOORZHG�WRSHUIRUP�D�FHUWDLQ�DFWLRQ��7R�SDVV�DQ�DXWKRUL]DWLRQ�WHVW�IRU�DQ�REMHFW��WKH�XVHU�PXVWVDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKDW�REMHFW�

$XWKRUL]DWLRQSURILOH

7KH�DXWKRUL]DWLRQ�SURILOH�LV�DQRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�WKDW�JLYHVXVHUV�DFFHVV�WR�WKH�V\VWHP��7KH�SURILOHV�FRQWDLQ�DXWKRUL]DWLRQV�LGHQWLILHG�E\�WKHDXWKRUL]DWLRQ�REMHFW�DQG�WKH�DXWKRUL]DWLRQ�QDPH��,I�D�SURILOH�LV�VSHFLILHG�LQ�D�XVHUPDVWHU�UHFRUG��WKH�XVHU�KDV�DOO�WKH�DXWKRUL]DWLRQV�GHILQHG�LQ�WKDW�SURILOH�

$XWKRUL]DWLRQWUDFH

7KLV�LV�D�WUDQVDFWLRQ�WKDW�UHFRUGV�DOO�WKH�UHTXLUHG�DXWKRUL]DWLRQ�REMHFWV�LQ�DSURFHVVLQJ�VWHS�

%DFNJURXQGSURFHVV

7KH�EDFNJURXQG�SURFHVV�LV�WKH�QRQLQWHUDFWLYH�H[HFXWLRQ�RI�SURJUDPV��ZKLFK�LQ�WKH5���6\VWHP��DUH�KDQGOHG�OLNH�RQOLQH�RSHUDWLRQV��%DFNJURXQG�SURFHVVHV�RIWHQ�XVHWKH�VDPH�SURJUDPV�WKDW�FRQWURO�WKH�GLDORJV�

*ORVVDU\

Authorizations Made Easy� G–4

7HUP 'HILQLWLRQ

%XVLQHVV�SURFHVV %XVLQHVV�SURFHVVHV�JURXS�WDVNV�PDGH�DFURVV�FRVW�FHQWHUV�LQ�\RXU�FRPSDQ\��7KLVSURFHVV�HQDEOHV�\RX�WR�VWUXFWXUH�\RXU�FRPSDQ\·V�SURFHVVHV�E\�IXQFWLRQ�

([DPSOHV�LQFOXGH�< 'HYHORSLQJ�D�SURGXFW< 'UDZLQJ�XS�D�TXRWDWLRQ< 3XUFKDVLQJ�D�PDWHULDO< 3URFHVVLQJ�DQ�RUGHU

%XVLQHVV:RUNIORZ��6$3�

7KLV�VXSSRUW��SURYLGHG�IRU�E\�WUDQVDFWLRQ�SURFHVVLQJ�LQ�WKH�5���6\VWHP��WDNHV�LQWRDFFRXQW�WKH�EXVLQHVV�HQYLURQPHQWV·�QHHGV�

&KHFN�LQGLFDWRU $�FKHFN�LQGLFDWRU�LV�VHW�WR�GHWHUPLQH�ZKHWKHU�DXWKRUL]DWLRQ�REMHFWV�DUHXQPDLQWDLQHG��QRW�FKHFNHG��FKHFNHG��RU�FKHFNHG�PDLQWDLQHG�

&OLHQW�VHUYHUDUFKLWHFWXUH����WLHU

2ZLQJ�WR�WKH�VRIWZDUH�RULHQWHG�FOLHQW�VHUYHU�DUFKLWHFWXUH�RI�WKH�5���6\VWHP��ORJLFDQG�GDWD�RI�WKH�WKUHH�LPSOHPHQWHG�OHYHOV³GDWDEDVH��DSSOLFDWLRQ��DQG�SUHVHQWDWLRQVHUYLFHV³FDQ�EH�GLVWULEXWHG�DPRQJ�GHGLFDWHG�VHUYHUV��7KH�LQGLYLGXDO�VHUYLFHV�FDQEH�IOH[LEOH��HLWKHU�DV�FOLHQWV�RU�VHUYHUV��GHSHQGLQJ�RQ�WKH�WDVNV�WR�EH�SHUIRUPHG�LQHDFK�FDVH�

&RPSRVLWHDFWLYLW\�JURXSV

$�FRPSRVLWH�DFWLYLW\�JURXS�LV�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�PXOWLSOH�DFWLYLW\JURXSV�

&XVWRPL]LQJ�&RQILJXUDWLRQ

,Q�6$3�WHUPLQRORJ\��FXVWRPL]LQJ�LV�WKH�LPSOHPHQWDWLRQ�RI�FRQILJXUDWLRQV�ZLWKLQWKH�IOH[LELOLW\�RI�WKH�5���6\VWHP��,W�LV�WKH�EDVLV�IRU�HYHU\�5���SURMHFW��ZKHWKHU�LW�LVDQ�LQWURGXFWLRQ��VXEVHTXHQW�SURMHFW�VWDJH��RU�SURFHVV�FKDQJH��7KH�FRQILJXUDWLRQLQFOXGHV�

< 5���3URFHGXUH�0RGHO��D�SURFHGXUDO�JXLGH�IRU�VWUXFWXULQJ�D�6$3LPSOHPHQWDWLRQ

< 5���5HIHUHQFH�0RGHO�LQ�WKH�%XVLQHVV�1DYLJDWRU��D�JUDSKLFDO�GHVFULSWLRQ�RIEXVLQHVV�SURFHVVHV

< ,PSOHPHQWDWLRQ�*XLGH��,0*���PHQX�OHG�SDUDPHWHU�VHWWLQJV< 3URMHFW�PDQDJHPHQW�WKURXJK�XSORDG�DQG�GRZQORDG�IDFLOLWLHV�DQG�WR�DQG�IURP

0LFURVRIW�3URMHFW< $�PRGHO�FRPSDQ\��,'(6���D�IXOO\�LQWHJUDWHG�DQG�SUHFRQILJXUHG�V\VWHP�XVHG�IRU

WUDLQLQJ�DQG�WHVWLQJ

7KH�FXVWRPL]LQJ�WRROV�DOVR�EHORQJ�WR�WKH�%XVLQHVV�(QJLQHHULQJ�:RUNEHQFK�DQG�DUHSURYLGHG�DW�QR�H[WUD�FKDUJH�ZLWK�WKH�5���6\VWHP��$GG�RQ�FXVWRPL]LQJ�LV�GLVFXVVHGLQ�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�VHFWLRQ�

'DWDEDVH�VHUYHU 7KLV�LV�WKH�FRPSXWHU�ZKHUH�D�GDWDEDVH�LV�LQVWDOOHG��6SHFLDOO\�RSWLPL]HG�KDUGZDUHPD\�EH�XVHG�IRU�UXQQLQJ�GDWDEDVHV�

*ORVVDU\

Release 4.6A/B �G–5

7HUP 'HILQLWLRQ

'HVNWRS $�3&�WKDW�LV�XVHG�DV�D�ZRUNVWDWLRQ�LV�FRQVLGHUHG�WR�EH�GHVNWRS��,GHDOO\��WKH�GHVNWRSKDV�DFFHVV�WR�DOO�V\VWHPV�DQG�IXQFWLRQV�QHHGHG�IRU�D�XVHU�WR�PDQDJH�DXWKRUL]HGWDVNV�

'\QSUR 6KRUW�IRU�G\QDPLF�SURJUDP��D�G\QSUR�FRQVLVWV�RI�D�VFUHHQ�DQG�DVVRFLDWHG�SURFHVVLQJORJLF��VXFK�DV�YDOLGDWLRQ�SURFHGXUHV��(DFK�G\QSUR�FRQWUROV�H[DFWO\�RQH�GLDORJ�VWHS�

(DV\�$FFHVV�0HQX 7KH�(DV\�$FFHVV�PHQX�LV�6$3·V�QHZ�*8,�IRU�ZRUNLQJ�ZLWK�WKH�5���6\VWHP��7KH(DV\�$FFHV�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROH�WHPSODWH�WKDW�KDV�EHHQ�DVVLJQHG�WR�DQXVHU��7KH�PHQX�FRQWDLQV�RQO\�WKRVH�WUDQVDFWLRQV�DQG�UHSRUWV�WKDW�WKH�XVHU�JRWDVVLJQHG�WKURXJK�WKH�DFWLYLW\�JURXS�DVVLJQHG�WR�KLP��7KHUHIRUH�WKH�XVHU�ZLOO�RQO\VHH�WKRVH�WUDQVDFWLRQV�KH�LV�DOORZHG�WR�SHUIRUP�

$�XVHU�FDQ�FKRRVH�EHWZHHQ�WZR�GLIIHUHQW�YLHZV�RI�5���< 7KH�FRPSOHWH�6$3�PHQX< 7KH�XVHU�VSHFLILF�PHQX

*HQHUDWH 7KLV�IXQFWLRQ�VDYHV�DQG�DFWLYDWHV�DQ�REMHFW��%HIRUH�DFWLYDWLQJ�WKH�REMHFW��WKH�V\VWHPDXWRPDWLFDOO\�SHUIRUPV�D�FRQVLVWHQF\�FKHFN�

*66�$3, 7KH�*66�$3,�LV�WKH�VWDQGDUGL]HG�6HFXULW\�$3,�ZLWK�D�VWDQGDUG�FRPPXQLFDWLRQPRGHO�WR�DEVWUDFW�IURP�WKH�LQGLYLGXDO�SURGXFWV�DQG�WKHLU�FKDUDFWHULVWLFV��7KH&RPPRQ�$XWKHQWLFDWLRQ�7HFKQRORJLHV��&$7��ZRUN�JURXS�RI�WKH�,QWHUQHW(QJLQHHULQJ�7DVN�)RUFH��,(7)��GHILQHV�WKH�VWDQGDUGL]DWLRQ�SURSRVDOV��7KHIXQFWLRQDO�VSHFLILFDWLRQ�RI�*66�$3,�9HUVLRQ����WKH�YHUVLRQ�VXSSRUWHG�E\�5����LVFXUUHQWO\�DQ�,QWHUQHW�GUDIW�

+XPDQ�UHVRXUFHVSODQQLQJ

3HUVRQQHO�SODQQLQJ�DQG�GHYHORSPHQW�GHDOV�ZLWK�DQWLFLSDWLQJ�IXWXUH�SHUVRQQHOQHHGV��3ODQQHUV�VKRXOG�FRQVLGHU�VKRUW���PHGLXP���DQG�ORQJ�WHUP�JRDOV�ZKHQFRQVLGHULQJ�FRPSDQ\�SROLF\�DQG�WKH�FRVWV�LQYROYHG��*RRG�KXPDQ�UHVRXUFHVSODQQLQJ�HQVXUHV�WKDW�WKH�FRPSDQ\�KDV�WKH�DSSURSULDWH�QXPEHU�RI�HPSOR\HHV�ZLWKWKH�UHTXLUHG�VNLOOV�LQ�WKH�FRUUHFW�SRVLWLRQ�

,0*�DFWLYLW\ $Q�,PSOHPHQWDWLRQ�JXLGH��,0*��DFWLYLW\�LV�DQ�H[SODQDWLRQ�RI�D�V\VWHP�VHWWLQJDFWLYLW\��$FWLYLWLHV�LQ�WKH�,0*�DUH�OLQNHG�GLUHFWO\�WR�WKH�FRUUHVSRQGLQJ�FXVWRPL]LQJWUDQVDFWLRQV��XVHG�WR�FUHDWH�WKH�DSSURSULDWH�V\VWHP�VHWWLQJ��<RX�FDQ�XVH�,0*DFWLYLWLHV�WR�UHFRUG�WKH�QRWHV�WKDW�GRFXPHQW�\RXU�V\VWHP�VHWWLQJV��<RX�FDQ�DOVR�EDVHWKH�UHFRUGLQJ�RU�VWDWXV�RI�SURMHFW�PDQDJHPHQW�LQIRUPDWLRQ�RQ�,0*�DFWLYLWLHV�

,PSOHPHQWDWLRQ 7KLV�SURFHVV�LQYROYHV�VZLWFKLQJ�IURP�DQ�H[LVWLQJ�PDQDJHPHQW�V\VWHP�DQG�EXVLQHVVSUDFWLFH�DQG�KDYLQJ�5���UXQ�SDUW�RI��RU�WKH�HQWLUH��EXVLQHVV�

*ORVVDU\

Authorizations Made EasyG–6

7HUP 'HILQLWLRQ

,PSOHPHQWDWLRQ*XLGH

$OVR�UHIHUUHG�WR�DV�WKH�,0*��WKH�JXLGH�LV�D�WRRO�IRU�FRQILJXULQJ�WKH�5���6\VWHP�WRPHHW�FXVWRPHU�UHTXLUHPHQWV��)RU�HDFK�EXVLQHVV�DSSOLFDWLRQ��WKH�LPSOHPHQWDWLRQJXLGH�< ([SODLQV�DOO�WKH�VWHSV�LQ�WKH�LPSOHPHQWDWLRQ�SURFHVV< 7HOOV�\RX�WKH�6$3�VWDQGDUG��IDFWRU\��VHWWLQJV< 'HVFULEHV�V\VWHP�FRQILJXUDWLRQ�ZRUN��DFWLYLWLHV��DQG�LQWHUDFWLYHO\�RSHQV�WKH

DFWLYLWLHV

7KH�,0*�DUH�VWUXFWXUHG�DV�K\SHUWH[W��7KH�KLHUDUFKLFDO�VWUXFWXUH�UHIOHFWV�WKHVWUXFWXUH�RI�WKH�5���EXVLQHVV�DSSOLFDWLRQ�FRPSRQHQWV�DQG�OLVWV�DOO�WKHGRFXPHQWDWLRQ�UHODWHG�WR�LPSOHPHQWLQJ�5����7KH�,0*�FRQWDLQV�DFWLYH�IXQFWLRQVZLWK�ZKLFK�\RX�FDQ�< 2SHQ�FXVWRPL]LQJ�WUDQVDFWLRQV< :ULWH�SURMHFW�GRFXPHQWDWLRQ< 0DLQWDLQ�VWDWXV�LQIRUPDWLRQ< 6XSSRUW�\RXU�SURMHFW�GRFXPHQWDWLRQ�ZRUN�DQG�WKH�PDQDJHPHQW�RI�\RXU�5��

6\VWHP�LPSOHPHQWDWLRQ�

,PSOHPHQWDWLRQSURMHFW

7KLV�SURMHFW�UHODWHV�WR�WKH�LPSOHPHQWDWLRQ�RI�D�VSHFLILF�JURXS�RI�5���IXQFWLRQV�DQGSURFHVVHV�ZLWK�D�FRPPRQ�JR�OLYH�GDWH�

,PSOHPHQWDWLRQVWUDWHJ\

$Q�LPSOHPHQWDWLRQ�VWUDWHJ\�LV�DQ�DSSURDFK�WR�5���LPSOHPHQWDWLRQ��7KH�VWUDWHJ\�LVEDVHG�RQ�ORQJ�WHUP�SHUVSHFWLYHV�DQG�LQFOXGHV�DOO�VWHSV�DFURVV�WKH�ZKROH�HQWHUSULVHSODQQHG�LQ�FRQQHFWLRQ�ZLWK�LPSOHPHQWLQJ�WKH�5���6\VWHP��(VWDEOLVKLQJ�WKLVVWUDWHJ\�LV�DQ�HVVHQWLDO�SDUW�RI�SURMHFW�SUHSDUDWLRQ�DQG�LPSDFWV�WKH�VHTXHQFH�RILPSOHPHQWDWLRQ�SURMHFWV�

,QIRW\SH ,QIRW\SHV�DOORZ�\RX�WR�GHVFULEH��RU�GHILQH�WKH�GLIIHUHQW�DWWULEXWHV�WKDW�REMHFWV�KDYH�:LWKLQ�SHUVRQQHO�GHYHORSPHQW��3'��WKHUH�DUH�PDQ\�GLIIHUHQW�LQIRW\SHV��HDFK�RQHGHVFULELQJ�D�VSHFLILF�VHW�RI�DWWULEXWHV��6RPH�LQIRW\SHV�DSSO\�RQO\�WR�FHUWDLQ�W\SHV�RIREMHFWV��ZKLOH�RWKHUV�FDQ�EH�GHILQHG�IRU�DQ\�W\SH�RI�REMHFW�

,QVWDQFH�SURILOH 7KH�LQVWDQFH�SURILOH�FRQWDLQV�DSSOLFDWLRQ�VHUYHU�VSHFLILF�FRQILJXUDWLRQ�SDUDPHWHUV�ZKLFK�FRPSOHWH�WKH�VHW�YDOXHV�RI�WKH�GHIDXOW�SURILOH�

-RE $�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�VHFUHWDU\�DQG�PDQDJHU�0DQ\�HPSOR\HHV�PD\�KDYH�WKH�VDPH�MRE�FODVVLILFDWLRQ��7KDW�LV��WKHUH�FDQ�EH���VHFUHWDULHV�DQG�HLJKW�PDQDJHUV��-REV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�SRVLWLRQV��VHHEHORZ��

0HQX 0HQXV�DUH�FRQWURO�HOHPHQWV��RIIHULQJ�WKH�XVHU�D�UDQJH�RI�RSWLRQV�ZKLFK��ZKHQFKRVHQ��SURPSWV�WKH�V\VWHP�WR�H[HFXWH�DQ�DFWLRQ��7KH�OD\RXW�RI�WKH�PHQX�EDU�KDVEHHQ�GHILQHG�IRU�HDFK�5���6\VWHP�OHYHO��0HQX�RSWLRQV�DUH�VHOHFWHG�HLWKHU�ZLWK�DVLQJOH�PRXVH�FOLFN�RU�E\�SRVLWLRQLQJ�WKH�FXUVRU�DQG�E\�SUHVVLQJ�(QWHU�

*ORVVDU\

Release 4.6A/B �G–7

7HUP 'HILQLWLRQ

0HQX�EDU $�PHQX�EDU�LV�WKH�EDU�DFURVV�WKH�WRS�RI�WKH�ZLQGRZ�ORFDWHG�MXVW�DERYH�WKH�VWDQGDUGWRROEDUV��:KHQ�\RX�FKRRVH�D�PHQX�RSWLRQ�IURP�WKH�PHQX�EDU��\RX�RSHQ�DGURSGRZQ�PHQX�ZLWK�GLIIHUHQW�FKRLFHV��7KH�V\VWHP�DXWRPDWLFDOO\�LQFOXGHV�WKH6\VWHP�DQG�+HOS�PHQXV�

1DPH�UDQJH 7KH�QDPH�UDQJH�LV�D�NH\�DUHD�RI�D�WDEOH��,W�HIIHFWLYHO\�UHVHUYHV�SDUW�RI�WKH�NH\�DUHDRQO\�IRU�FXVWRPHUV�RU�IRU�6$3�

1HWZRUN�VHFXULW\ 1HWZRUN�VHFXULW\�LV�D�QHWZRUN�FRQQHFWLRQ�FRQILJXUHG�WR�SURWHFW�6$3�DQG�LWVFXVWRPHUV�IURP�SUREOHPV��VXFK�DV�XQDXWKRUL]HG�DFFHVV�LQKHUHQW�WR�:$1�QHWZRUNFRQQHFWLRQV�

2UJDQL]DWLRQDOOHYHO

2UJDQL]DWLRQDO�OHYHOV�DUH�KLHUDUFKLFDO�OHYHOV�ZKHUH�FHUWDLQ�GDWD�LQ�D�PDWHULDO�PDVWHUUHFRUG�LV�FUHDWHG��([DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV�DUH�FOLHQW��SODQW��DQG�VWRUDJHORFDWLRQ�

2QOLQH�6HUYLFH6\VWHP

6HH�6$31HW�²�5���)URQWHQG�QRWHV

3DVVZRUG $�SDVVZRUG�LV�D�XVHU�FRGH�WKDW�FRPSULVHV�WKH�IROORZLQJ�HOHPHQWV�WKDW�XVHUV�QHHG�WRORJRQ�WR�WKH�V\VWHP�< 6WULQJ�RI�ILJXUHV< /HWWHUV< 6SHFLDO�FKDUDFWHUV�WKDW�WKH�XVHU�PXVW�HQWHU< $�XVHU�,'

3ODQ�YHUVLRQ $�SODQ�YHUVLRQ�LV�D�GHVLJQDWHG�DUHD�ZKHUH�\RX�GHSRVLW��RU�VWRUH��VHWV�RI�LQIRUPDWLRQ�:KHQHYHU�\RX�HQWHU�DQ\�LQIRUPDWLRQ�LQ�3'��\RX�PXVW�VSHFLI\�WKH�SODQ�YHUVLRQZKHUH�WKH�LQIRUPDWLRQ�VKRXOG�EH�NHSW��$�VLQJOH�SODQ�YHUVLRQ�FRXOG�LQFOXGHLQIRUPDWLRQ�IURP�DQ\�RI�WKH�3'�PRGXOHV��VXFK�DV�2UJDQL]DWLRQ�DQG�3ODQQLQJ�6HPLQDU�DQG�&RQYHQWLRQ��RU�6KLIW�3ODQQLQJ��<RX�FDQ�PDLQWDLQ�PRUH�WKDQ�RQH�SODQYHUVLRQ���7KLV�DOORZV�\RX�WR�XVH�GLIIHUHQW�SODQ�YHUVLRQV�WR�UHSUHVHQW�GLIIHUHQWVFHQDULRV�IRU�\RXU�ILUP��+RZHYHU��\RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DV�WKHDFWLYH�SODQ�LI�\RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU�DQG�LI�LQWHJUDWLRQ�LV�DFWLYHEHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV�

3RVLWLRQ 3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�SODFHPHQWV�RU�DVVLJQPHQWV�LQ�D�FRPSDQ\��IRUH[DPSOH��VHFUHWDU\�RI�PDUNHWLQJ�RU�D�VDOHV�PDQDJHU���%\�FUHDWLQJ�SRVLWLRQV�DQGFUHDWLQJ�UHODWLRQVKLSV�EHWZHHQ�WKH�SRVLWLRQV��\RX�LGHQWLI\�WKH�DXWKRULW\�VWUXFWXUH�RUFKDLQ�RI�FRPPDQG�DW�\RXU�ILUP��3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�MREV��VHHDERYH��

3UHVHQWDWLRQVHUYHU

$�FRPSXWHU��XVXDOO\�D�3&�RU�0DFLQWRVK��XVHG�IRU�SUHVHQWDWLRQ�LQ�WKH�5���6\VWHP�LVFDOOHG�D�SUHVHQWDWLRQ�VHUYHU�

*ORVVDU\

Authorizations Made EasyG–8

7HUP 'HILQLWLRQ

3URFHVV�IORZ�YLHZ 7KH�SURFHVV�IORZ�YLHZ�LV�RQH�RI�WKH�WZR�QDYLJDWLRQ�SDWKV�LQ�WKH�%XVLQHVV�1DYLJDWRU�WKH�RWKHU�EHLQJ�WKH�FRPSRQHQW�YLHZ��7KH�SURFHVV�IORZ�YLHZ�RI�WKH�5���5HIHUHQFH0RGHO�SURYLGHV�SURFHVV�RULHQWHG�DFFHVV�WR�WKH�VFHQDULRV�DQG�SURFHVVHV�LQ�WKH0RGHO��,W�LV�DUUDQJHG�DV�D�VWUXFWXUH�ZLWK�WKH�IROORZLQJ�OHYHOV�< (QWHUSULVH�DUHDV< 6FHQDULR�SURFHVVHV< 3URFHVVHV

3URFHVV�VHOHFWLRQPDWUL[

7KH�SURFHVV�VHOHFWLRQ�PDWUL[�LV�D�PRGHO�W\SH�LQ�WKH�5���5HIHUHQFH�0RGHO��7KHPDWUL[�GHVFULEHV�WKH�DVVLJQPHQW�RI�SURFHVVHV�WR�VFHQDULRV��ZKLFK�DUH�WKH�FROXPQV�LQD�SURFHVV�VHOHFWLRQ�PDWUL[��3URFHVVHV�EHORQJLQJ�WR�D�VFHQDULR�DUH�OLVWHG�DQG�DVVLJQHGXQGHU�WKDW�VFHQDULR��FROXPQ�KHDG���6FHQDULR�DQG�SURFHVV�LFRQV�SURYLGH�DFFHVV�WRFRUUHVSRQGLQJ�(3&V�

3URILOH $�SURILOH�LV�D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�SDUWLFXODU�XVHU�JURXSV��HQWHUHG�LQ�WKHXVHU�PDVWHU�UHFRUG��7KH�VDPH�SURILOH�FDQ�EH�DVVLJQHG�WR�DQ\�QXPEHU�RI�XVHUV�

7KHUH�DUH�WZR�W\SHV�RI�DXWKRUL]DWLRQ�SURILOHV�< 6LPSOH��D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�D�SDUWLFXODU�WDVN< &RPSRVLWH��D�FROOHFWLRQ�RI�VHYHUDO�VLPSOH�SURILOHV

3URILOHFRPSDULVRQ

:KHQ�DQ�DFWLYLW\�JURXS�LV�PRGLILHG�XVLQJ�WUDQVDFWLRQ�3)&*��LWV�DVVRFLDWHGDXWKRUL]DWLRQ�SURILOH�LV�QRW�DXWRPDWLFDOO\�XSGDWHG��7KH�XVHU�PXVW�FDUU\�RXW�DSURILOH�FRPSDULVRQ�WR�HQVXUH�WKDW�WKH�DXWKRUL]DWLRQV�FRQWDLQHG�LQ�WKH�DXWKRUL]DWLRQSURILOH�FRUUHVSRQG�ZLWK�WKH�QHZ�FRQWHQWV�RI�WKH�DFWLYLW\�JURXS�

3URILOH�*HQHUDWRU 7KH�3URILOH�*HQHUDWRU��3*��VXSSRUWV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VHWWLQJ�XS�WKHDXWKRUL]DWLRQ�FRQFHSW�DW�WKH�FXVWRPHU�VLWH��$FFRUGLQJ�WR�D�VHW�RI�DSSOLFDWLRQFRPSRQHQWV�FKRVHQ�E\�WKH�DGPLQLVWUDWRU��WKH�3*�DXWRPDWLFDOO\�FUHDWHV�DQDXWKRUL]DWLRQ�SURILOH��7KH�DGPLQLVWUDWRU�FDQ�WKHQ�HDVLO\�FXVWRPL]H�DQG�PRGLI\�WKHDXWKRUL]DWLRQV�LQ�WKH�SURILOH�E\�XVLQJ�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQV�RIIHUHG�E\WKH�3*�

3URJUDP�DWWULEXWH $�SURSHUW\�RI�D�SURJUDP�LV�FDOOHG�D�SURJUDP�DWWULEXWH��7KH�DWWULEXWHV�RI�DQ�$%$3SURJUDP�GHILQH�LWV�EDVLF�FKDUDFWHULVWLFV��VR�WKDW�WKH�V\VWHP�FDQ�SURFHVV�LW�FRUUHFWO\�7KH�SURJUDP�DWWULEXWHV�LQFOXGH�WKH�IROORZLQJ�HOHPHQWV�< 3URJUDP�WLWOH< 3URJUDP�W\SH< 3URJUDP�VWDWXV< $XWKRUL]DWLRQ�JURXS< 'HYHORSPHQW�FODVV

*ORVVDU\

Release 4.6A/B �G–9

7HUP 'HILQLWLRQ

3XVK�EXWWRQ 3XVK�EXWWRQV��RU�EXWWRQV��DUH�JUDSKLFDO�FRQWURO�HOHPHQWV�WKDW�\RX�FOLFN�RQFH�WRH[HFXWH�WKH�IXQFWLRQV�OLQNHG�WR�WKHP��,Q�WKH�5���6\VWHP��\RX�FDQ�DOVR�VWDUWIXQFWLRQV�ZLWK�WKH�NH\ERDUG��7R�GR�WKLV��SODFH�WKH�FXUVRU�RQ�WKH�EXWWRQ�DQG�SUHVVHLWKHU�WKH�(QWHU�NH\�RU�(QWHU�EXWWRQ��3XVK�EXWWRQV�PD\�FRQWDLQ�WH[W�RU�JUDSKLFV\PEROV�

5DGLR�EXWWRQ 7KH�UDGLR�EXWWRQ�LV�DQRWKHU�JUDSKLFDO�FRQWURO�HOHPHQW�WKDW�DOORZV�WKH�XVHU�WR�VHOHFWDQ�LWHP�IURP�D�OLVW�RI�ILHOGV��,I�WKH�XVHU�LV�DOORZHG�WR�VHOHFW�VHYHUDO�ILHOGV�DW�RQFH�FKHFNER[HV�DUH�XVHG�

5HOHDVH�&KDQJHVDQG�8SJUDGHV

<RX�FDQ�JHQHUDWH�VSHFLILF�,0*�IRU�UHOHDVH�XSJUDGHV�RU�FKDQJHRYHUV��7KHVH�JXLGHVFRQWDLQ�D�VSHFLILF�OLVW�RI�,0*�DFWLYLWLHV��LQFOXGLQJ�DOO�FKDQJHG�RU�QHZ�IXQFWLRQV�LQWKH�QHZ�5���UHOHDVH��7KLV�IDFLOLWDWHV�WKH�LPSOHPHQWDWLRQ�RI�UHOHDVH�SURMHFWV��$OOUHOHDVH�QRWHV�FDQ�DOVR�EH�LPPHGLDWHO\�DFFHVVHG�IURP�WKLV�ORFDWLRQ�

5HSRUW $�UHSRUW�VHOHFWV�GDWD�IURP�D�GDWDEDVH�DQG�GLVSOD\V�LW�LQ�D�VWUXFWXUHG�IRUP�IRUDQDO\VLV��<RX�PD\�SULQW�WKH�UHSRUW�UHVXOWV�RU�GLVSOD\�WKHP�RQOLQH��7KH�V\VWHP�DOVRSURYLGHV�WKH�RSWLRQ�RI�VDYLQJ�WKH�VHOHFWHG�UHSRUW�GDWD��WR�UHYLHZ�ZLWKRXW�KDYLQJ�WRUH�FUHDWH�LW�

5HVSRQVLELOLW\ 5HVSRQVLELOLWLHV�GLIIHUHQWLDWH�DXWKRULW\�SURILOHV�JHQHUDWHG�IURP�DFWLYLW\�JURXSV�5HVSRQVLELOLWLHV�DUH�OLQNHG�WR�DXWKRULW\�SURILOHV�DQG�WR�DFWLYLW\�JURXSV��$Q�DFWLYLW\JURXS�LV�DQ�REMHFW�ZKHUH�\RX�FROOHFW�D�QXPEHU�RI�V\VWHP�DFWLYLWLHV��$Q�DXWKRULW\SURILOH�LV�JHQHUDWHG�XVLQJ�3*��ZKLFK�GHVLJQDWHV�WKH�XVHU·V�DXWKRULWLHV�LQ�WKH�V\VWHP�5HVSRQVLELOLWLHV�GRQ·W�H[LVW�LQ�����DQ\�PRUH�

6$3�%XVLQHVV:RUNIORZ

6$3�%XVLQHVV�:RUNIORZ������FRPSULVHV�WHFKQRORJLHV�DQG�WRROV�WR�DXWRPDWLFDOO\FRQWURO�DQG�H[HFXWH�FURVV�DSSOLFDWLRQ�SURFHVVHV��ZKLFK�SULPDULO\�LQYROYHVFRRUGLQDWLQJ�WKH�< 3HUVRQV�LQYROYHG< :RUN�VWHSV�UHTXLUHG< 'DWD��EXVLQHVV�REMHFWV��WKDW�QHHG�WR�EH�SURFHVVHG

2XU�SULPDU\�JRDOV�ZLWK�WKH�ZRUNIORZ�DUH�WR�UHGXFH�WKURXJKSXW�WLPHV��WR�UHGXFH�WKHFRVWV�LQYROYHG�LQ�PDQDJLQJ�EXVLQHVV�SURFHVVHV��DQG�WR�LQFUHDVH�WUDQVSDUHQF\�DQGTXDOLW\�

6$31HW���5��)URQWHQG�QRWHV

7KH�6$31HW�²�5���)URQWHQG��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6\VWHP��SURYLGHV�DGLUHFW�FRPPXQLFDWLRQ�OLQN�WR�6$3��DOORZLQJ�FXVWRPHUV�WR�TXLFNO\�DQG�HIILFLHQWO\REWDLQ�SUREOHP�VROYLQJ�LQIRUPDWLRQ�IRU�WKH�5���6\VWHP�

6$3�VWDQGDUGPHQX

)URP�WKH�6$3�VWDQGDUG�PHQX��\RX�FDQ�DFFHVV�WKH�IXOO�UDQJH�RI�6$3�IXQFWLRQV�

*ORVVDU\

Authorizations Made EasyG–10

7HUP 'HILQLWLRQ

6$3�*8, 6$3�*8,�LV�WKH�JUDSKLFDO�XVHU�LQWHUIDFH�RI�WKH�5���6\VWHP�

6$3�URXWHU 6$3�URXWHU�LV�D�VRIWZDUH�PRGXOH�WKDW�DFWV�DV�SDUW�RI�D�ILUHZDOO�V\VWHP��6$3�URXWHUVLPSOLILHV�WKH�FRQILJXUDWLRQ�RI�QHWZRUN�VHFXULW\�DQG�WKH�URXWLQJ�RI�WUDIILF�WR�DQGIURP�5����7KH�6$3�URXWHU�HVWDEOLVKHV�DQ�LQGLUHFW�FRQQHFWLRQ�EHWZHHQ�WKH�5��QHWZRUN�DQG�DQ�RXWHU�QHWZRUN��7KHUH�LV�UHVWULFWHG�DFFHVV�WR�WKH�DSSOLFDWLRQ�OD\HUEHWZHHQ�FOLHQW�VRIWZDUH�DQG�WKH�5���DSSOLFDWLRQ�VHUYHU�

6FUHHQ $�VFUHHQ�LV��HVVHQWLDOO\��WKH�SULPDU\�ZLQGRZ�RI�D�VHVVLRQ�

6HFXUH�1HWZRUN&RPPXQLFDWLRQV�61&�

:LWKLQ�WKH�IUDPHZRUN�RI�WKH�6HFXUH�1HWZRUN�&RPPXQLFDWLRQV�SURMHFW��6$3�LVLPSOHPHQWLQJ�WKH�*66�$3,�LQ�5����HQDEOLQJ�5���WR�EH�LQWHJUDWHG�LQWR�FRPSDQ\�ZLGH�QHWZRUN�VHFXULW\�V\VWHPV��VXFK�DV�.HUEHURV�RU�6HFX'(��$V�WKH�*66�$3,�LV�WKHVWDQGDUG�LQWHUIDFH�LQ�WKH�VHFXULW\�DUHD��6$3�RSHUDWHV�ZLWK�DOO�*66�$3,�FRPSOLDQWVHFXULW\�V\VWHPV�

6HOHFW 7KLV�IXQFWLRQ�DOORZV�\RX�WR�VHOHFW�DQ�REMHFW�IRU�IXUWKHU�SURFHVVLQJ�E\�SODFLQJ�WKHFXUVRU�RQ�WKH�REMHFW�DQG�FOLFNLQJ�RQ�WKH�REMHFW�

6HVVLRQ $�VHVVLRQ�LV�D�ZLQGRZ�ZKHUH�WKH�XVHU�SURFHVVHV�D�FHUWDLQ�WDVN��:KHQ�\RX�ORJ�RQ�WRWKH�5���6\VWHP��LW�DXWRPDWLFDOO\�RSHQV�WKH�ILUVW�VHVVLRQ��EXW�\RX�FDQ�VLPXOWDQHRXVO\RSHQ�XS�WR�QLQH�VHVVLRQV��7KH�QXPEHU�RI�WKH�FXUUHQW�VHVVLRQ�DSSHDUV�LQ�WKH�VWDWXVEDU�

6HVVLRQ�0DQDJHU 7KH�6HVVLRQ�0DQDJHU�GRHV�QRW�H[LVW�LQ�5HOHDVH�����DQ\PRUH��,W�KDV�EHHQ�VXEVWLWXWHGZLWK�WKH�(DV\�$FFHVV�0HQX�

66&5 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5��LV�D�SURFHGXUH�WKDW�UHJLVWHUV�DOOPRGLILFDWLRQV�WR�5���5HSRVLWRU\�REMHFWV�DQG�SURYLGHV�DQ�RYHUYLHZ�RI�PRGLILHG�5��5HSRVLWRU\�REMHFWV��6$3�PDWFKFRGHV�DQG�WXQLQJ�PHDVXUHV��IRU�H[DPSOH��FUHDWLQJGDWDEDVH�LQGLFHV�DQG�EXIIHUV��DUH�QRW�UHJLVWHUHG�E\�66&5�

6\VWHP�SDUDPHWHU $�V\VWHP�SDUDPHWHU�LV�WKH�EDVLF�V\VWHP�FRQILJXUDWLRQ�UHTXLUHG�WR�HQVXUH�VPRRWKIXQFWLRQLQJ�RI�WKH�VRIWZDUH�

7DEOH 'DWD�FDQ�EH�DUUDQJHG�LQ�WDEOH�IRUP��$�WDEOH�FRQVLVWV�RI�FROXPQV��GDWD�YDOXHV�RI�WKHVDPH�W\SH��DQG�URZV��GDWD�UHFRUGV���)LHOGV�LGHQWLI\�D�UHFRUG�

7UDQVDFWLRQ $�WUDQVDFWLRQ�LV�D�VHULHV�RI�UHODWHG�VWHSV�UHTXLUHG�WR�SHUIRUP�D�FHUWDLQ�WDVN�

7UDQVDFWLRQ�FRGH $�VHTXHQFH�RI�IRXU�FKDUDFWHUV�UHSUHVHQWV�D�6$3�WUDQVDFWLRQ��7R�FDOO�D�WUDQVDFWLRQ�LQWKH�5���6\VWHP��\RX�FDQ�IROORZ�DQ�,0*�SDWK�RU�HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKHFRPPDQG�ILHOG��)RU�H[DPSOH��60���LV�WKH�FRGH�IRU�WKH�WDEOH�PDLQWHQDQFHWUDQVDFWLRQ�

8VHU�PDLQWHQDQFH 8VHU�PDLQWHQDQFH�WUDQVDFWLRQV�DOORZ�WKH�V\VWHP�DGPLQLVWUDWRU�WR�FUHDWH�DQGPDLQWDLQ�XVHU�PDVWHU�UHFRUGV��7KLV�SURFHVV�LQFOXGHV�JHQHUDWLQJ�DQG�DVVLJQLQJDXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV�

*ORVVDU\

Release 4.6A/B ��G–11

7HUP 'HILQLWLRQ

8VHU�PDVWHUUHFRUG

7KLV�UHFRUG�FRQWDLQV�LPSRUWDQW�PDVWHU�GDWD�IRU�DQ�5���6\VWHP�XVHU��2QO\�XVHUVZLWK�D�XVHU�PDVWHU�UHFRUG�FDQ�ORJRQ�WR�WKH�V\VWHP��$�XVHU·V�DXWKRUL]DWLRQV�DUHGHILQHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�

8VHU�UROH�WHPSODWH $�XVHU�UROH�WHPSODWH�LV�DQ�DFWLYLW\�JURXS�ZKLFK�VHUYHV�DV�WKH�EDVLV�IRU�WKH�XVHUPHQX�ZKHQ�DQ�HQG�XVHU�ORJV�RQ�WR�5���

9DOLGLW\�SHULRG 9DOLGLW\�SHULRGV�GHILQH�WKH�OLIH�VSDQ�RI�DQ�REMHFW�RU�LQIRW\SH�UHFRUG��:KHQ�FUHDWLQJREMHFWV�DQG�LQIRW\SH�UHFRUGV��VSHFLI\�D�YDOLGLW\�SHULRG�E\�SURYLGLQJ�D�VWDUW�DQG�DQHQG�GDWH�

:RUN�SURFHVV 7KH�DSSOLFDWLRQ�VHUYLFHV�RI�WKH�5���6\VWHP�SHUIRUP�VSHFLDO�ZRUN�SURFHVVHV��VXFK�DVIRU�GLDORJ�SURFHVVLQJ��XSGDWLQJ�RI�WKH�GDWDEDVH�DV�GLFWDWHG�E\�FKDQJH�GRFXPHQWV�EDFNJURXQG�SURFHVVLQJ��VSRROLQJ��DQG�ORFN�PDQDJHPHQW��:RUN�SURFHVVHV�FDQ�EHDVVLJQHG�WR�GHGLFDWHG�DSSOLFDWLRQ�VHUYHUV�

:RUNEHQFK2UJDQL]HU�7UDQVSRUW�V\VWHP

7KH�:RUNEHQFK�2UJDQL]HU�LV�D�FHQWUDO�PDQDJHPHQW�WRRO�IRU�ODUJH�VFDOH�SURMHFWPDQDJHPHQW�WKDW�VXSSRUWV�LQGLYLGXDO�GHYHORSHUV�DQG�ODUJH�SURMHFW�WHDPV�

7KH�2UJDQL]HU�DOVR�GRHV�WKH�IROORZLQJ�

�� 2UJDQL]HV�UHODWHG�SURMHFW�FRPSRQHQWV�LQWR�RUGHUV

�� /RFNV�WKH�FRPSRQHQWV�GXULQJ�GHYHORSPHQW

�� 6WRUHV�D�YHUVLRQ�RI�HDFK�SURMHFW�EHWZHHQ�WUDQVSRUWV

7KH�WUDQVSRUW�V\VWHP�VXSSRUWV�WKH�WUDQVIHU�RI�GHYHORSPHQW�REMHFWV�EHWZHHQGLVWULEXWHG�V\VWHPV�E\�FUHDWLQJ�DQ�H[WHQVLYH�ORJ�UHFRUGLQJ�RI�ZKHQ�DQG�ZK\�HDFKWUDQVSRUW�ZDV�H[HFXWHG�DQG�ZKR�H[HFXWHG�LW�

:RUNIORZ�WDVN $�ZRUNIORZ�WDVN�LV�D�PXOWLVWHS�WDVN�GHILQHG�E\�WKH�FXVWRPHU��ZKLFK�UHIHUHQFHV�DZRUNIORZ�GHILQLWLRQ��:RUNIORZ�WDVNV��RUJDQL]DWLRQDO�PDQDJHPHQW�REMHFW�W\SH�:)�DUH�FOLHQW�GHSHQGHQW��KDYH�D�YDOLGLW\�SHULRG��DQG�DUH�SODQ�YHUVLRQ�VSHFLILF�

:RUNSODFH 7KH�PDLQ�ULJKW�WLOH�RQ�WKH�VFUHHQ�ZKHUH�PRVW�ZRUN�LV�SHUIRUPHG��ILHOG�HQWULHV�VHOHFWLRQV��HWF����2Q�VRPH�ZLQGRZV��WKH�ZRUNSODFH�FRYHUV�WKH�HQWLUH�VFUHHQ�

:RUNSODFH�PHQX 7KH�OHIW�WLOH�RQ�WKH�6$3�(DV\�$FFHVV�VFUHHQ�ZKHUH�HDFK�QRGH�UHSUHVHQWV�GLIIHUHQWOHYHOV�LQ�WKH�5���6\VWHP��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUG�PHQX�EXWWRQV�SURYLGHGLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�

:RUNORDGPRQLWRU

7KH�ZRUNORDG�PRQLWRU�GLVSOD\V�WKH�GLVWULEXWLRQ�RI�WKH�ZRUNORDG�DFURVV�VHUYHUV�DQGWUDQVDFWLRQV�

*ORVVDU\

Authorizations Made EasyG–12

I–1

,QGH[

A$%$3

GLFWLRQDU\���²�REMHFWV��QR�FKHFN��&²�

$FFHOHUDWHG6$3��$6$3�EXVLQHVV�EOXHSULQW���²�JR�OLYH�DQG�VXSSRUW���²�NQRZOHGJH�FRUQHU���²�RYHUYLHZ���²�SURMHFW�SUHSDUDWLRQ���²�4$GE��TXHVWLRQV�DQG�DQVZHUV�GDWDEDVH����²�UHDOL]DWLRQ���²�URDGPDS���²�����²�

$FFHVV�SUREOHPV���²��$FWLYLW\�JURXS�PDLQWHQDQFH��6HH�DOVR�3URILOH�*HQHUDWRU

EDVLF�PDLQWHQDQFH���²����²����²��FRPSRVLWH�DFWLYLW\�JURXSV���²�FUHDWLQJ�DQG�FKDQJLQJ�KLHUDUFK\���²�LQWHUQHW�DQG�GRFXPHQW�OLQNV���²��RUJDQL]DWLRQ�PDQDJHPHQW���²����²��UHVSRQVLELOLWLHV����²��VHOHFWLQJ�YLHZV���²�WUDQVIHUULQJ�XVHUV�IURP�,0*�SURMHFW���²��ZRUNIORZ���²��

$FWLYLW\�JURXSVDVVLJQLQJ�,0*�SURMHFWV�RU�YLHZV���²��DVVLJQLQJ�REMHFWV���²����²�DVVLJQLQJ�3'�REMHFWV���²����²����²��DVVLJQLQJ�WUDQVDFWLRQV���²��DVVLJQLQJ�XVHUV���²�����²����²����²�&203$1<B$//���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRVLWH��6HH�&RPSRVLWH�DFWLYLW\�JURXSVFRQYHUWHG�IURP�68���SURILOHV����²�FRS\LQJ���²�����²����%²�FUHDWLQJ���²��FXVWRPL]LQJ�DFWLYLW\�JURXS���²�����²��GHOHWLQJ���²��GHULYHG��6HH�'HULYHG�DFWLYLW\�JURXSVGLVSOD\LQJ�WUDQVDFWLRQ�FRGHV��%²�GLVSOD\LQJ�XVHUV��%²�GRFXPHQWDWLRQ�RQOLQH�IRU�REMHFWV���²��JHQHUDO�DXWKRUL]DWLRQV���²�LQVHUWLQJ�UHSRUWV���²��LQVHUWLQJ�WUDQVDFWLRQV���²�RYHUYLHZ���²�����²��SUHGHILQHG���²��SURILOHV���²�����²����%²�

UHJHQHUDWLQJ�DXWKRUL]DWLRQ�GDWD���²��WUDQVDFWLRQ�FRGHV��PXOWLSOH��%²�WUDQVSRUWLQJ���²����²����²����²����²�XVHU�UROH�WHPSODWHV���²����²�ZRUNIORZ�WDVNV���²��

$GPLQLVWUDWRUDXWKRUL]DWLRQ�DGPLQLVWUDWRU���²�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU���²��DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU���²��FKDQJH�PDQDJHPHQW���²��*OREDO�8VHU�0DQDJHU����²��PXOWLSOH�DGPLQLVWUDWRUV��%²�SROLFLHV�DQG�SURFHGXUHV���²��VHWWLQJ�XS�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV���²��WKUHH�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�ZRUNLQJ�WRJHWKHU���²��WLSV�IRU���²��XVHU�DGPLQLVWUDWRU���²��

$GYDQFH�FRUUHFWLRQVDSSO\LQJ�WR�5�����²�

$,6��$XGLW�LQIRUPDWLRQ�V\VWHP�����²��$PHULFDQ�6$3�8VHUV�*URXS��$68*����²��$SSOLFDWLRQ�/LQN�(QDEOLQJ��$/(�

DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ�HQYLURQPHQW����²�GHILQLQJ�WDUJHW�V\VWHP�IRU�5)&����²��GLVWULEXWLRQ�PRGHO����²��ORJLFDO�V\VWHP�QDPLQJ����²�PRGHO�YLHZ��GLVWULEXWLQJ����²��RYHUYLHZ����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�VHWWLQJ�XS�XVHU����²�

$6$3��6HH�$FFHOHUDWHG6$3$XGLWV

DXGLW�LQIRUPDWLRQ�V\VWHP��$,6���WUDQVDFWLRQ�6(&5����²��EXVLQHVV�DXGLWV����²��FRPSOHWH����²��GHOHWH�ROG�DXGLW�ORJV����²�ILOWHU�JURXSV����²�ORJJLQJ�RI�VSHFLILF�DFWLYLWLHV����²��RYHUYLHZ����²�SURILOH�UHYLHZ�IRU�DFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��UHTXLUHPHQWV���²��UHYLHZLQJ�YDOLG�XVHUV����²��UXQQLQJ�ORJV����²�UXQQLQJ�RQ�GLIIHUHQW�XVHU����²��VHFXULW\�DXGLW�ORJ��60�������²�VHWWLQJ�ORJ�SDUDPHWHUV����²�VWDWLVWLF�UHFRUGV�LQ�&&06��67$7�����²��

,QGH[

Authorizations Made Easy�I–2

V\VWHP�DXGLW����²��V\VWHP�ORJV��60�������²��WDVNV����²��XVHU�VHFXULW\�DXGLW�MREV����²��XVHU�GHILQHG����²��

$XWKRUL]DWLRQDGGLQJ�PLVVLQJ��SRVWPDLQWDLQLQJ���²����²�DGPLQLVWUDWRU���²����²�����²�����²��DXWKRUL]DWLRQ�FRQFHSW���²����²�����²��FKDQJLQJ�XVLQJ�XWLOLWLHV���²��FKHFNV��6HH�$XWKRUL]DWLRQ�FKHFNVFRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²�FXVWRPL]LQJ���²��HUURU�DQDO\VLV��68������²�ILHOGV���²����²�JHQHUDO��DVVLJQLQJ���²�JHQHUDWLQJ�SURILOHV���²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²����²�OLIHF\FOH���²�OLVW��6HH�$XWKRUL]DWLRQ�/LVWORJJLQJ�FKDQJHV����²��QDPLQJ�FRQYHQWLRQV���²�����²�����²��REMHFWV��6HH�$XWKRUL]DWLRQ�REMHFWVSURILOHV��6HH�3URILOHVUHVSRQVLELOLWLHV����²��VWUXFWXUDO���²��WHFKQLFDO�QDPHV��UHRUJDQL]LQJ���²��WHPSODWHV��WUDQVSRUWLQJ���²�WLPH�GHSHQGHQF\���²����²�����²����%²�WUDFLQJ�HUURUV��&²�WUDQVSRUWLQJ���²�XVHU�DGPLQLVWUDWLRQ���²�

$XWKRUL]DWLRQ�FKHFNVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ���²�����²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVGHILQLWLRQ���²�HQDEOLQJ�RU�GLVDEOLQJ�V\VWHP�ZLGH�FKHFNV����²��LQFOXGLQJ�LQ�WUDQVDFWLRQV��%²���%²�UHGXFLQJ�VFRSH����²������²��5)&��&²�VWDUWLQJ�WUDQVDFWLRQV��%²�V\VWHP�WUDFH��67������²�

$XWKRUL]DWLRQ�ILHOGVGHILQLWLRQ���²�PDLQWDLQLQJ�RSHQ�ILHOGV���²��

$XWKRUL]DWLRQ�/LVWGHILQLQJ�XVHU�UROHV���²�JHQHUDWHG�IURP�4$GE���²����²�RYHUYLHZ���²�ZRUNLQJ�ZLWK���²�

$XWKRUL]DWLRQ�REMHFWVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ����²������²������²��EDVLV����²������²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVFKHFNLQJ����²��

FODVVHV���²�GHILQLWLRQ���²�ILHOGV���²�KXPDQ�UHVRXUFHV����²������²������²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²�RYHUYLHZ���²�6B7&2'(���²������²�����²����%²���&²�6B86(5B2%-����²��6B86(5B352���²��WDEOH�7$&7=��%²�XQXVHG����²��

B%DFNJURXQG

GLVWULEXWLRQ��*OREDO�8VHU�0DQDJHU����²��XVHU�W\SHV���²�

%DVLF�PDLQWHQDQFH���²����²����²��%DVLV�&RPSRQHQWV��%&�

DXWKRUL]DWLRQ�REMHFWV����²������²������²��XVHUV���²�

%DWFK�GDWD�FRPPXQLFDWLRQ��%'&����²�%DWFK�LQSXW��6HH�%DWFK�GDWD�FRPPXQLFDWLRQ%XVLQHVV�$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��%$3,V�����²��

C&&06�SHUIRUPDQFH�DQDO\VLV�WRROV����²��&HQWUDO�V\VWHP

PLJUDWLRQ�RI�H[LVWLQJ�XVHUV����²�WH[W�FRPSDULVRQ����²�

&HQWUDO�XVHU�DGPLQLVWUDWLRQ$/(�HQYLURQPHQW����²�GLVWULEXWLRQ�PRGHO�DVVLJQPHQW����²�*OREDO�8VHU�0DQDJHU����²��PLJUDWLRQ�RI�XVHUV�WR�FHQWUDO�V\VWHP����²�QRQFHQWUDO�XVHU�DGPLQLVWUDWLRQ���²�RYHUYLHZ��[[LY����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS����²�WHVWLQJ����²�

&HQWUDO�XVHU�PDLQWHQDQFHXVHU�DVVLJQPHQWV���²�

&KDQJH�PDQDJHPHQW�DGPLQLVWUDWRU���²��&KHFN�IODJV��6HH�&KHFN�LQGLFDWRUV&KHFN�LQGLFDWRUV

DXWKRUL]DWLRQ�REMHFWV����²������²��&KHFN��&�����²������²��&KHFN�0DLQWDLQ��&0�����²������²������²��GHIDXOWV���²�PDVV�FKDQJHV����²��1R�FKHFN��1�����²������²��UHSODFLQJ�VHWWLQJV���²�WUDQVDFWLRQ�FRGHV����²��WUDQVSRUWLQJ���²�

,QGH[

Release 4.6A/B �I–3

W\SHV��%²�8QPDLQWDLQHG��8�����²������²��

&OLHQW�V\VWHPVGLVWULEXWLRQ�PRGHO����²�*OREDO�8VHU�0DQDJHU����²��PDLQWDLQLQJ�XVHU�GDWD��ILHOG�DWWULEXWHV����²�PLJUDWLQJ�XVHUV�WR�FHQWUDO�V\VWHP����²�WH[W�FRPSDULVRQ����²�

&OLHQWV������²����²����²�������²����²����²�������²����²�DVVLJQLQJ�ORJLFDO�V\VWHPV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�FRS\LQJ�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV���²�GHIDXOW��&²�GHIDXOW�XVHUV���²�SDUWHU�SURILOHV�JHQHUDWHG�LQ�FOLHQW�V\VWHP����²��6$3�VWDQGDUG���²�WUDQVSRUWV���²�

&RPSRVLWH�DFWLYLW\�JURXSVFUHDWLQJ���²��GLVSOD\LQJ���²�RYHUYLHZ��[[LY���²��

&RS\LQJDFWLYLW\�JURXSV���²����%²�DFWLYLW\�JURXSV�DQG�GHULYLQJ���²��XVHU�UROH�WHPSODWHV�IRU�PRGLILFDWLRQ���²��

&3,&���²�&UHDWLQJ

DFWLYLW\�JURXS���²��FRPSRVLWH�DFWLYLW\�JURXSV���²��QHZ�XVHU��FOLHQW�VSHFLILF����²�XVHU�UROH�WHPSODWHV���²��

&XVWRPL]LQJ�DXWKRUL]DWLRQV���²��

D'DWD�SURWHFWLRQ���²�'',&�XVHUV���²����²�����²�'HIDXOWV

FKDQJLQJ���²�FKHFN�LQGLFDWRUV���²����²�����²��FRPSDULQJ�GDWD�ZLWK�6$3�GHIDXOW�YDOXHV���²�FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�ILHOG�YDOXHV���²����²�UHWUDQVIHUULQJ���²�

'HOHWLQJDFWLYLW\�JURXSV���²��

'HULYHG�DFWLYLW\�JURXSV���²�����²��RYHUYLHZ���²��

'HYHORSPHQW�V\VWHP��'(9����²��'LDORJ

XVHU�W\SHV���²�'LVWULEXWLRQ�PRGHO����²��

DVVLJQPHQW����²�'RFXPHQW�OLQNV���²��

'RFXPHQWDWLRQRQOLQH�IRU�DFWLYLW\�JURXS�REMHFWV���²��

E(DUO\:DWFK���²�(DV\�$FFHVV�PHQX���²����²�����²���%²�(UURU�QRWHV�GDWDEDVH���²���$²�([WHUQDO�XVHUV

XVHU�DGPLQLVWUDWLRQ���²�

F)DYRULWHV

DGGLQJ�DQG�GHOHWLQJ�WUDQVDFWLRQV��%²�YLHZLQJ��%²�

)LHOG�DWWULEXWHVGHILQLQJ�LQ�FOLHQW�V\VWHP����²�

)LHOG�GHIDXOWV���²�)LHOG�H[LWV��%²�)LHOG�YDOXHV

FRS\LQJ����²��FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�UHSODFLQJ���²�WUDQVSRUWLQJ���²�

)LOWHUVGHILQLQJ�ILOWHU�JURXSV�IRU�DXGLW����²�

)XOO�DXWKRUL]DWLRQV���²��LQVHUWLQJ���²��

G*OREDO�8VHU�0DQDJHU

DXWKRUL]DWLRQ�IRU����²��FRPSRVLWH�DFWLYLW\�JURXS����²������²��GLVWULEXWLQJ�GDWD����²��PRGHOLQJ����²��RYHUYLHZ����²��VWUXFWXUH����²��V\VWHP�W\SHV����²��XVHU�FUHDWLRQ����²��XVHU�JURXSV����²��XVLQJ����²��

*R�OLYH�SODQ���²�����²�SUHSDUDWLRQV���²�WUDQVSRUWLQJ�DFWLYLW\�JURXSV���²�WUDQVSRUWLQJ�DXWKRUL]DWLRQ�WHPSODWHV���²�WUDQVSRUWLQJ�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV���²�WUDQVSRUWV�EHWZHHQ�FOLHQWV���²�WUDQVSRUWV�EHWZHHQ�5���6\VWHPV���²�

H+HOS

HUURU�QRWHV�GDWDEDVH���²���$²�6$31HW�²�5���)URQWHQG�QRWHV���²�

,QGH[

Authorizations Made Easy�I–4

+LHUDUFK\FUHDWLQJ�DQG�FKDQJLQJ���²�

+XPDQ�5HVRXUFHV��+5�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�DXWKRUL]DWLRQ�REMHFWV����²������²������²��VXSSRUW�SDFNDJHV����²��XVHU�QDPLQJ�FRQYHQWLRQV���²��

I,'RFV����²��,0*�SURMHFWV

DVVLJQLQJ�SURMHFWV�RU�YLHZV�WR�DFWLYLW\�JURXSV���²��WUDQVIHUULQJ�XVHUV���²�����²��

,PSOHPHQWDWLRQ�*XLGH��,0*�SURMHFWV��6HH�,0*�SURMHFWV

,QWHUQDO�5���XVHUVXVHU�DGPLQLVWUDWLRQ���²�

,QWHUQHWLQVHUWLQJ�OLQNV�LQ�DFWLYLW\�JURXSV���²��

,7�PDQDJHU���²��

J-RE�UROHV���²��-REV

DVVLJQLQJ�DFWLYLW\�JURXSV���²��ZRUN�GXWLHV���²����²��

K.QRZOHGJH�&RUQHU��.&���$6$3���²�

L/LQNV

LQVHUWLQJ�,QWHUQHW�DQG�GRFXPHQW�OLQNV�LQWR�DFWLYLW\JURXSV���²��

/RFNV��XVHU����²��/RJLFDO�V\VWHPV����²�

DVVLJQLQJ�WR�FOLHQWV����²�GLVWULEXWLRQ�PRGHO����²��QDPLQJ����²�

/RJRQ�GDWD�ILHOGV���²�/RJRQV

LQFRUUHFW��&²�/RJV

DFWLYLWLHV��VSHFLILF����²��DXGLW����²�FHQWUDO����²������²��FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG

DXWKRUL]DWLRQV����²��ILOHV����²�ORFDO����²������²��SURWHFWHG�WDEOHV����²��UXQQLQJ�DXGLW�ORJV����²�6\V/RJ����²��

WDEOH�GDWD����²��

M0DLQWHQDQFH�W\SHV���²��0DQXDOO\�LQVHUWLQJ�DXWKRUL]DWLRQV���²�0DVV�FKDQJHV

FKHFN�LQGLFDWRUV����²��XVHUV���²�

0DVV�FRPSDUH��3)8'����²��0HQXV

GHIDXOW�VWDUW��&²�0RGHO�YLHZ����²�

GLVWULEXWLQJ����²��

N1DPLQJ�FRQYHQWLRQV

DXWKRUL]DWLRQ�SURILOHV���²�SURILOHV�DQG�DXWKRUL]DWLRQV�JHQHUDWHG�ZLWK�3*���²�����²���

�²��1R�FKHFN��&²�

O2EMHFW�FODVVHV���²�2EMHFW�W\SHV

$���²�&���²�2���²�3���²�6���²�86���²�

2EMHFWVMREV���²����²��RQOLQH�GRFXPHQWDWLRQ���²��RUJDQL]DWLRQDO�XQLWV���²�SHUVRQ���²�3HUVRQQHO�'HYHORSPHQW��3'���6HH�3'�REMHFWVSRVLWLRQV���²����²��5���XVHUV���²�ZRUN�FHQWHUV���²�

2QOLQH�GRFXPHQWDWLRQGLVSOD\LQJ�IRU�DFWLYLW\�JURXS�REMHFWV���²��

2QOLQH�6HUYLFH�6\VWHP��266���6HH�6$31HW�²�5���)URQWHQGQRWHV

2UJDQL]DWLRQ�PDQDJHPHQW���²����²��2UJDQL]DWLRQDO

(QMR\�WUDQVDFWLRQ�SODQ���²��OHYHOV���²�����²��SODQV���²����²�����²��VWUXFWXUHV���²��XQLWV���²�����²�

266��6HH�6$31HW�²�5���)URQWHQG�QRWHV

,QGH[

Release 4.6A/B �I–5

P3DUDPHWHUV

DXWK�QRBFKHFNBLQBVRPHBFDVHV��%²�DXWK�REMHFWBGLVDEOLQJBDFWLYH����²��DXWK�WFRGHVBQRWBFKHFNHG����²��DXWKRUL]DWLRQ�FKHFNV��&²���&²�ILHOG�GHIDXOWV���²�ORJRQ��&²�PDQXDOO\�SRVWPDLQWDLQLQJ���²�QDPHV���²�SDUDPHWHU�WUDQVDFWLRQV����²��SDVVZRUG��&²���&²�6$3 ��&²�V\VWHP����²��WUDFLQJ�DXWKRUL]DWLRQV��&²�XVHU�EXIIHU��&²�

3DVVZRUGVEDFNJURXQG�XVHUV���²�FKDQJLQJ���²��UHTXLUHPHQWV���²��VHWWLQJ�OHQJWK��H[SLUDWLRQ��&²�VSHFLI\LQJ�LPSHUPLVVLEOH��&²�V\VWHP���²��XVHU���²�����²��

3'�REMHFWVDVVLJQLQJ�DFWLYLW\�JURXSV���²����²����²��

3HUPLVVLRQ�FUHHS����²��3HUVRQQHO�$GPLQLVWUDWLRQ��3$�

XVHUV���²��3HUVRQQHO�'HYHORSPHQW��3'�

DVVLJQLQJ�DFWLYLW\�JURXSV�WR�3'�REMHFWV���²��DVVLJQLQJ�3'�REMHFWV�WR�DFWLYLW\�JURXSV���²�

3*��6HH�3URILOH�*HQHUDWRU3ODQ�YHUVLRQ���²��3ROLFLHV�DQG�SURFHGXUHV

VHFXULW\���²��3RVLWLRQV

DVVLJQLQJ�DFWLYLW\�JURXSV���²��REMHFWV���²����²��

3RVWPDLQWDLQLQJPLVVLQJ�DXWKRUL]DWLRQV���²����²�XVHU�UROH�WHPSODWHV���²��

3UHGHILQHG�DFWLYLW\�JURXSV��6HH�8VHU�UROH�WHPSODWHV3URGXFWLRQ�V\VWHP��35'����²��3URILOH�*HQHUDWRU��6HH�DOVR�$FWLYLW\�JURXS�PDLQWHQDQFH

DFWLYDWLQJ���²�$87+25,7<�&+(&.��%²�FKHFNLQJ�WKH�UHTXLUHG�LQVWDQFH�SURILOH�SDUDPHWHU���²�FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²��IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�RYHUYLHZ���²����²�VHWWLQJ�XS���²���%²�VWDUWLQJ���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�XVHU�UROH�WHPSODWHV���²�

3URILOHVDFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��DGPLQLVWUDWRU��VHFXULW\���²��DVVLJQLQJ�WR�QHZ�XVHU�PDVWHU�UHFRUG���²�DXWKRUL]DWLRQ�FKHFNV��&²�DXWKRUL]DWLRQ�PLVVLQJ��%²�FKDQJLQJ�QDPHV��%²�&203$1<B$//�RU�´�<RXU&RPSDQ\!µ���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²�����²��FRQYHUWLQJ�ROG�68���SURILOHV�LQWR�DFWLYLW\�JURXSV����²��

��²��FRQYHUWLQJ�WR�EH�PDLQWDLQDEOH�E\�WKH�3*����²��'()$8/7�3)/��&²�GHILQLWLRQ���²�GLVSOD\LQJ�RYHUYLHZ�DIWHU�JHQHUDWLRQ���²��HGLWLQJ���²��HQWHULQJ�LQ�XVHU�PDVWHU�UHFRUGV���²�JHQHUDO�ULJKWV�QRW�DVVLJQHG���²�JHQHUDWLQJ���²�����²�����²��LQVHUWLQJ�DXWKRUL]DWLRQV�IURP���²��ORJJLQJ�FKDQJHV����²��PDLQWDLQLQJ���²��PDVV�FRPSDUH���²��PDWFKLQJ�XS�DIWHU�FKDQJLQJ�LQ�68������²������²��PDWFKLQJ�XS�DIWHU�XSJUDGH����²��PLJUDWLQJ���²��QDPLQJ�FRQYHQWLRQV���²����²�����²�����²��RYHUYLHZ���²����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��UH�FUHDWLQJ���²������²��UHJHQHUDWLQJ�DIWHU�FKDQJHV���²��UHJHQHUDWLQJ�QXPEHU�DVVLJQPHQW���²��VWDWXV�LQGLFDWRUV���²��WUDQVSRUWLQJ���²����²�XSGDWLQJ�LQ�XVHU�PDVWHU�UHFRUG���²��ZRUNLQJ�ZLWK��%²�

3URJUDPV3)&*B7,0(B'(3(1'(1&<���²��56865������²��

Q4XDOLW\�DVVXUDQFH�V\VWHP��4$6����²�����²��4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�

$XWKRUL]DWLRQ�/LVW���²�RYHUYLHZ���²�

R5HOHDVH�QRWHV����²�5HPRWH�FRQQHFWLRQV

VHFXULW\���²�����²��5HPRWH�IXQFWLRQ�FDOO��6HH�5)&5HSRUWV

DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��GRFXPHQWDWLRQ���²��

,QGH[

Authorizations Made Easy�I–6

3)&*B7,0(B'(3(1'(1&<���²�����²��UHSRUW�WUHHV��%²�56865������²��

5HVSRQVLELOLWLHV����²��5)&

DXWKRULW\�FKHFN��&²�%$3,V����²��FDOOV����²��FRQQHFWLRQ����²������²�GHVWLQDWLRQ����²������²��,'RFV����²��

5RDGPDS��6HH�$FFHOHUDWHG6$3��$6$3�5ROHV

XVHU�UROHV��GHILQLQJ���²�

S6$3�%XVLQHVV�:RUNIORZ��6HH�:RUNIORZ6$3�GHIDXOWV��6HH�'HIDXOWV6$3�URXWHU

VHFXULW\���²�����²��6$3�VWDQGDUG�PHQX��[YLLL���²�����6$3�WHPSODWHV��6HH�7HPSODWHV6$3 ���²����²�����²�

VHFXULQJ�DJDLQVW�PLVXVH��&²�6$31HW���²��6$31HW�²�5���)URQWHQG�QRWHV

GDWDEDVH��$²�HUURU�QRWHV�GDWDEDVH���²�JHWWLQJ�VXSSRUW���²�3*�KRW�SDFNDJHV�IRU�5HOHDVHV����$�DQG����%���²�SULQWLQJ�QRWHV���²�VHOHFWLYH�OLVW��$²�WHPSODWH�QRWHV���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�

6HFXULW\DFWLYLWLHV����²�DXGLWV��6HH�$XGLWVORJJLQJ�FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG

DXWKRUL]DWLRQV����²��ORJJLQJ�VSHFLILF�DFWLYLWLHV����²��SHUPLVVLRQ�FUHHS����²��SROLFLHV�DQG�SURFHGXUHV���²��UHYLHZLQJ�ORJV����²��VHFXULW\�UHSRUWV����²��VRXUFHV�DERXW�LPSOHPHQWDWLRQ���²��VWUDWHJ\�LQ�WKUHH�V\VWHP�HQYLURQPHQW���²��

6WDWLVWLF�UHFRUGV��DXGLWLQJ����²��6WUXFWXUDO�DXWKRUL]DWLRQV���²��

WURXEOHVKRRWLQJ�OLPLWDWLRQV����²�6XSHUXVHUV���²����²�����²�����²��6\V/RJ����²��6\VWHP��6HH�&HQWUDO�V\VWHP��&OLHQW�V\VWHP��7DUJHW�V\VWHP6\VWHP�ODQGVFDSH

ZLWK�H[LVWLQJ�XVHUV����²������²��6\VWHP�SDVVZRUGV���²��6\VWHP�7UDFH��6HH�7UDFHV

T7DEOHV

IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�ORJJLQJ�FKDQJHV�WR�GDWD����²��ORJV�SURWHFWHG����²��68.5,����²��7$&7=��%²�862%7���²����²�862%;���²����²�����²����%²��865����&²�

7DUJHW�V\VWHPGHILQLQJ�IRU�5)&�FDOOV����²��

7DVNVPXOWLSOH�VWHS���²��VLQJOH�VWHS���²��

7HFKQLFDO�QDPHVDXWKRUL]DWLRQV���²��

7HPSODWHVFUHDWLQJ�QHZ���²�GHOLYHUHG���²�GHOLYHUHG�QDPHV���²�LQFOXGLQJ�UHTXLUHG�REMHFWV�LQ�DFWLYLW\�JURXSV���²�LQVHUWLQJ�DXWKRUL]DWLRQV���²����²��LQVHUWLQJ�LQWR�H[LVWLQJ�DFWLYLW\�JURXS���²�WUDQVSRUWLQJ���²�ZRUNIORZ���²��

7KUHH�V\VWHP�HQYLURQPHQWGHYHORSPHQW�V\VWHP��'(9����²��SURGXFWLRQ�V\VWHP��35'����²��TXDOLW\�DVVXUDQFH�V\VWHP��4$6����²��

7LPH�SHULRGVORJRQ�YDOLG�IURP�YDOLG�WR�GDWHV���²�UHVWULFWLQJ�DFWLYLWLHV��%²�XVHU�DVVLJQPHQW���²����²�����²��

7UDFHVDQDO\]LQJ�WUDFH�ILOH����²�DXWKRUL]DWLRQV��&²�GLVSOD\LQJ�UHVXOWV����²�QDPLQJ����²�UHFRUGLQJ�DXWKRUL]DWLRQ�FKHFNV����²�

7UDLQLQJ�FOLHQW�V\VWHP��75*����²��7UDQVDFWLRQV

DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��DVVLJQLQJ�WR�UHSRUWV���²��$87+B6:,7&+B2%-(&76����²��DXWKRUL]DWLRQ�FKHFNV��%²�%'������²��GHULYHG�DFWLYLW\�JURXSV���²��LQVHUWLQJ���²�PDLQWDLQ�FKHFN�LQGLFDWRUV����²��PLVVLQJ�DXWKRUL]DWLRQV���²�3)&*���²��3)8'���²��5=������²��6$������²��6$5$����²��

,QGH[

Release 4.6A/B �I–7

6&&����²���%²�6&&����²�6&&/���²�6&8�����²��6&80����²�6(������²��6(�����²��6(������²��6(&5����²������²��60������²�60������²�����²�60������²�����²�60������²��60�����²����²���%²���&²�6352����²��67������²�67������²��67$7����²��68�����²����²�����²������²��68�����²����²������²��68�����²����²������²��68�����²����²�����²����%²���&²�68�����²����²�����²������²������²���%²�68�����²�����²����²�����²�683&���²�����²�����²��

7UDQVSRUWLQJDFWLYLW\�JURXSV���²����²���%²�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�PDVV�WUDQVSRUW�RI�DFWLYLW\�JURXSV���²�VLQJOH�DFWLYLW\�JURXSV�XVLQJ�DFWLYLW\�JURXS�PDLQWHQDQFH�

�²�WHPSODWHV���²�XVHU�DVVLJQPHQWV���²����²�XVHU�PDVWHU�UHFRUGV���²�

7URXEOHVKRRWLQJ��6HH�DOVR�7UDFHVHUURU�DQDO\VLV��68������²�

U8SJUDGHV

FRQYHUWLQJ�SUHYLRXVO\�FUHDWHG�68���SURILOHV�LQWR�DFWLYLW\JURXSV����²�

SUHSDUDWLRQ�EHIRUH����²�SURFHGXUH��68�����%²�5HOHDVH����)����²��5HOHDVHV����*�����+�����,����²��5HOHDVHV����[�RU����[����²��UHOHDVHV�SULRU�WR����[����²��UHPRYH�XVHU�DVVLJQPHQWV�IURP�RULJLQDO�68���SURILOH����²�YDOLGDWLRQ�DIWHU�FRPSOHWH����²�

8VHUDFFRXQWV����²�DGPLQLVWUDWLRQ���²�����²�����²�$/(����²�DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²����²�DVVLJQLQJ�WR�FXVWRPL]LQJ�DFWLYLW\�JURXSV���²��

DVVLJQLQJ�XVHU�UROH�WHPSODWHV���²�DVVLJQPHQWV���²�����²����²�����²�DXGLWLQJ�IRU�YDOLG�XVHUV����²��DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV���²�EDVLF�XVHU�GDWD���²�EXIIHU���²�FKDQJLQJ�SDVVZRUGV���²��FOLHQW�VSHFLILF���²��FUHDWLQJ���²����²�����²��GDWHV�RI�XVHU�DVVLJQPHQW���²����²�����²��'',&���²����²�����²�GHIDXOWV���²����²�(DUO\:DWFK���²�H[WHUQDO���²�ILHOG�DWWULEXWHV��GHILQLQJ����²�JURXSV��[[LY���²�LQIRUPDWLRQ�V\VWHP���²��LQWHUQDO�5�����²�MREV���²��ORJRQ�GDWD�ILHOG�GHILQLWLRQV���²�PDVV�FKDQJHV���²�PHQX��[YLLL��[[LL���²����²�����RUJDQL]DWLRQDO�XQLWV���²��SDVVZRUGV���²�����²��SRVLWLRQV���²��SURILOHV��WUDQVDFWLRQ�67������²��UROHV��6HH�8VHU�UROHV6$3 ���²����²�����²�VSHFLDO�5���XVHUV���²�VWDWXV�GLVSOD\�RQ�WDE���²�VXSHUXVHUV���²����²�����²�����²��V\VWHP���²����²�V\VWHP�ODQGVFDSH����²������²��WUDQVIHUULQJ�IURP�,0*�SURMHFW�WR�DFWLYLW\�JURXS���²��XVHU�DGPLQLVWUDWLRQ��%²�XVHU�,'V���²��XVHU�W\SHV���²�

8VHU�EXIIHUV��&²�8VHU�PDVWHU�UHFRUGV

DXWKRUL]DWLRQ�FRQFHSW���²����²�FRPSDULQJ�DIWHU�DFWLYLW\�JURXS�LPSRUW���²�FRPSDULQJ�DIWHU�DXWKRUL]DWLRQ�SURILOH�JHQHUDWLRQ���²�FRPSDULQJ�ZLWK�3*���²��GHILQLQJ���²�*OREDO�8VHU�0DQDJHU����²��ORJJLQJ�FKDQJHV����²��PDQXDOO\�HQWHULQJ�JHQHUDWHG�SURILOHV��%²�V\VWHP�UHFRJQLWLRQ�RI�XVHUV���²�WUDQVSRUWLQJ���²����²����²�XSGDWLQJ���²�XSGDWLQJ�SURILOHV���²��

8VHU�UROH�WHPSODWHVDVVLJQLQJ�WR�D�XVHU�XVLQJ�VKRUWFXW���²��DVVLJQLQJ�XVHUV���²����²�FRS\LQJ�DQG�PRGLI\LQJ���²��FUHDWLQJ�XVLQJ�PXOWLSOH�VLQJOH�DFWLYLW\�JURXSV���²��FUHDWLQJ�XVLQJ�VLQJOH�DFWLYLW\�JURXSV���²��

,QGH[

Authorizations Made Easy�I–8

FUHDWLQJ�\RXU�RZQ���²��FXVWRPL]LQJ�WHPSODWH���²��PDLQWHQDQFH�YLHZ�VHWWLQJV���²��RYHUYLHZ��[[LL���²�����²�SRVWPDLQWDLQLQJ���²��5HOHDVH����$���²��5HOHDVH����%���²��XVLQJ�6$3�SURYLGHG���²�ZRUNLQJ�ZLWK���²�

8VHU�UROHVGHILQLQJ���²�JHQHUDWLQJ�RYHUYLHZ���²�

8VHU�W\SHVEDFNJURXQG���²�EDWFK�GDWD�FRPPXQLFDWLRQ���²�

&3,&���²�GLDORJ���²�

W:RUN�FHQWHUV���²�:RUNIORZ

DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�VDPSOH���²��WDVNV���²�����²��WHPSODWHV���²��XVHUV���²��

:RUNSODFH�PHQX��[YLLL