amez 46 all

392
$XWKRUL]DWLRQV0DGH(DV\ 8VHU5ROH7HPSODWHVDQG *HQHUDWLQJ$XWKRUL]DWLRQ3URILOHV Release 4.6A/B SAP Labs, Inc. Palo Alto, California

Upload: mrtgl

Post on 11-May-2015

370 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Amez 46 all

$XWKRUL]DWLRQV�0DGH�(DV\

8VHU�5ROH�7HPSODWHV�DQG�*HQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV

Release 4.6A/B

SAP Labs, Inc.

Palo Alto, California

Page 2: Amez 46 all

&RS\ULJKW

������E\�6$3�$*��$OO�ULJKWV�UHVHUYHG�

1HLWKHU�WKLV�GRFXPHQWDWLRQ�QRU�DQ\�SDUW�RI�LW�PD\�EH�FRSLHG�RU�UHSURGXFHG�LQ�DQ\�IRUP�RU�E\�DQ\�PHDQV�RUWUDQVODWHG�LQWR�DQRWKHU�ODQJXDJH��ZLWKRXW�WKH�SULRU�FRQVHQW�RI�6$3�$*�

6$3�$*�PDNHV�QR�ZDUUDQWLHV�RU�UHSUHVHQWDWLRQV�ZLWK�UHVSHFW�WR�WKH�FRQWHQW�KHUHRI�DQG�VSHFLILFDOO\�GLVFODLPVDQ\�LPSOLHG�ZDUUDQWLHV�RI�PHUFKDQWDELOLW\�RU�ILWQHVV�IRU�DQ\�SDUWLFXODU�SXUSRVH��6$3�$*�DVVXPHV�QRUHVSRQVLELOLW\�IRU�DQ\�HUURUV�WKDW�PD\�DSSHDU�LQ�WKLV�GRFXPHQW��7KH�LQIRUPDWLRQ�FRQWDLQHG�LQ�WKLV�GRFXPHQW�LVVXEMHFW�WR�FKDQJH�ZLWKRXW�QRWLFH��6$3�$*�UHVHUYHV�WKH�ULJKW�WR�PDNH�DQ\�VXFK�FKDQJHV�ZLWKRXW�REOLJDWLRQ�WRQRWLI\�DQ\�SHUVRQ�RI�VXFK�UHYLVLRQ�RU�FKDQJHV��6$3�$*�PDNHV�QR�FRPPLWPHQW�WR�NHHS�WKH�LQIRUPDWLRQFRQWDLQHG�KHUHLQ�XS�WR�GDWH�

7UDGHPDUNV

6$3��WKH�6$3�ORJR��5����5����$%$3��DQG�RWKHU�6$3�UHODWHG�SURGXFWV�PHQWLRQHG�KHUHLQ�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�6$3�$*��$OO�RWKHU�SURGXFWV�PHQWLRQHG�LQ�WKLV�GRFXPHQW�DUH�UHJLVWHUHG�RUXQUHJLVWHUHG�WUDGHPDUNV�RI�WKHLU�UHVSHFWLYH�FRPSDQLHV�

6LPSOLILFDWLRQ�*URXS6$3�/DEV��,QF������'HHU�&UHHN�5RDG3DOR�$OWR��&$������

ZZZ�VDSODEV�FRP�VLPSOHVLPSOLI\�U�#VDS�FRP

3ULQWHG�LQ�WKH�8QLWHG�6WDWHV�RI�$PHULFD�,6%1�������������;

7KLV�ERRN�XVHV�(FR)/(;�OD\�IODW�ELQGLQJ��:LWK�WKLV�OD\�IODW�IHDWXUH³GHYHORSHG�E\DQG�H[FOXVLYHO\�DYDLODEOH�DW�-RKQVRQ�3ULQWLQJ�6HUYLFH��-36�³\RX�FDQ�RSHQ�WKLV�ERRNDQG�NHHS�LW�RSHQ�ZLWKRXW�LW�VQDSSLQJ�VKXW�RQ�\RX��<RX�QHHG�QRW�ZRUU\�DERXWEUHDNLQJ�WKH�VSLQH��(FR)/(;�PDNHV�ERRNV�OLNH�WKLV�RQH�HDVLHU�WR�XVH�

Page 3: Amez 46 all

&RQWHQWV�DW�D�*ODQFH

Authorizations Made Easy iii

$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL

,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y

:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3�����������������������������������������������������������������²�

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�����������������������������������������������������²�

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ�������������������������������������������������������������������������²�

&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�

&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV ���������������������������������������������������������������²�

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�����������������������������������������������������²�

&KDSWHU���� 8SJUDGH �������������������������������������������������������������������������������������������²�

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�

*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�

,QGH[ ������������������������������������������������������������������������������������������������������,²�

Page 4: Amez 46 all

iv

Page 5: Amez 46 all

'HWDLOHG�7DEOH�RI�&RQWHQWV

Authorizations Made Easy v

$FNQRZOHGJHPHQWV������������������������������������������������������������������������������������������������ [LLL

,QWURGXFWLRQ ������������������������������������������������������������������������������������������������������ [Y

What Is this Book About? ................................................................................... xviWho Should Read this Book?............................................................................. xviHow to Use this Guide ........................................................................................ xviiConventions......................................................................................................... xvii

:KDW·V�1HZ�LQ�5HOHDVH���� ������������������������������������������������������������������������������������ [[L

Overview............................................................................................................... xxiiUser Role Templates........................................................................................... xxiiFlexible User Menus............................................................................................ xxiiComposite Activity Groups............................................................................... xxivUser Groups........................................................................................................ xxivCentral User Administration ............................................................................. xxiv

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW ���������������������²�

Overview............................................................................................................... 1–2The Authorization Concept ................................................................................ 1–4Authorization Object .............................................................................................. 1–5Authorization Object Fields ................................................................................... 1–6Authorizations........................................................................................................ 1–6Authorization Profiles ............................................................................................ 1–7

Naming Convention for Authorization Profiles........................................................ 1–7User Master Records ............................................................................................ 1–7Authorization Checks ............................................................................................ 1–8Activating and Deactivating Authorization Checks in Transactions...................... 1–8SAP* and DDIC Users ......................................................................................... 1–8What Is the Profile Generator? .......................................................................... 1–9Components of the Profile Generator ................................................................. 1–10

Activity Groups...................................................................................................... 1–10Composite Activity Groups ................................................................................... 1–10Derived Activity Groups ........................................................................................ 1–10User Assignment .................................................................................................. 1–10

Generating the Profiles........................................................................................ 1–10What Is an Activity Group? .............................................................................. 1–12Activity Group Assignments ................................................................................ 1–12

R/3 login user IDs ............................................................................................... 1–12Jobs ..................................................................................................................... 1–12Positions.............................................................................................................. 1–13Organizational units ........................................................................................... 1–13

What Is a User Role Template?.......................................................................... 1–13

Page 6: Amez 46 all

Detailed Table of Contents

Authorizations Made Easyvi

R/3 Tools for Security Implementation ...........................................................1–14Case Study: Security Strategy in a Three-System Environment ................. 1–15Development System (DEV) ...............................................................................1–15Quality Assurance System (QAS) ....................................................................... 1–17

Training Client System (TRG)...............................................................................1–17Production System (PRD) ...................................................................................1–18Setting Up the Authorization Administrators.................................................1–19How the Administrators Work Together ..............................................................1–21Policies and Procedures...................................................................................1–21User Administration .............................................................................................1–21

Policies ..................................................................................................................1–21Procedures............................................................................................................1–22Roles and Responsibilities ....................................................................................1–22

System Security...................................................................................................1–23Policies ..................................................................................................................1–23Procedures............................................................................................................1–23Roles and Responsibilities ....................................................................................1–24

Auditing Requirements.....................................................................................1–24

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3 �����������������������������������������������������������������²�

Overview............................................................................................................... 2–2ASAP Roadmap ................................................................................................... 2–2Authorizations in the Roadmap Structure .............................................................2–4Knowledge Corner...............................................................................................2–5Questions and Answers Database (Q&Adb) .................................................... 2–6What Is the Q&Adb?..............................................................................................2–6How to Work with the Q&Adb................................................................................ 2–6How to Generate the Authorization List from the Q&Adb ..................................... 2–6Authorization List ................................................................................................2–6What Is the Authorization List?..............................................................................2–6How to Work with the Authorization List................................................................ 2–7

Generate Authorization List from the Q&Adb..........................................................2–7Define User Roles ...................................................................................................2–8Generate User Roles Overview ..............................................................................2–9Build User Roles .....................................................................................................2–9

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU �����������������������������������������������������²�

Overview...............................................................................................................3–2Confirming that the Profile Generator Is Active............................................... 3–2Checking the Required Instance Profile Parameter..............................................3–2Loading the USOBX_C and USOBT_C tables ..................................................3–4Initial Copying of SAP Defaults into the Customer Tables (SU25) .......................3–4Transporting the Defaults ...................................................................................... 3–6Getting Support from the SAPNet – R/3 Frontend Notes................................ 3–7Accessing the Error Notes Database ....................................................................3–7Printing Important SAPNet – R/3 Frontend Notes ................................................ 3–8Applying Advance Corrections to Your R/3 System.............................................. 3–8

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ �������������������������������������������������������������������������²�

Overview...............................................................................................................4–2System Users ....................................................................................................... 4–2

Page 7: Amez 46 all

Detailed Table of Contents

Release 4.6A/B YLLvii

External R/3 Users ................................................................................................ 4–3Internal R/3 Users ................................................................................................. 4–3

Dialog...................................................................................................................... 4–3Batch Data Communication.................................................................................... 4–3Background............................................................................................................. 4–3CPIC ....................................................................................................................... 4–4

Special R/3 Users.................................................................................................. 4–4SAP* ....................................................................................................................... 4–4DDIC ....................................................................................................................... 4–4EarlyWatch ............................................................................................................. 4–4

Creating Users ...................................................................................................... 4–5User Groups......................................................................................................... 4–5Authorizations and Authorization Profiles....................................................... 4–6Mass Operations ................................................................................................. 4–6Creating a New User (Client-Specific)............................................................... 4–7Changing a User’s Password........................................................................... 4–10Password Requirements ..................................................................................... 4–11User Information System.................................................................................. 4–12

&KDSWHU��� 8VHU�5ROH�7HPSODWHV �����������������������������������������������������������������������²�

Overview............................................................................................................... 5–2What Are User Role Templates? ....................................................................... 5–2User Menu ............................................................................................................ 5–2How to Work with User Role Templates ........................................................... 5–3Starting Activity Group Maintenance (PFCG) ....................................................... 5–4Using the SAP-Provided User Role Templates .................................................... 5–4Copying and Modifying SAP-Provided User Role Templates............................. 5–10Create your own User Role Templates............................................................... 5–22Creating Composite Activity Groups ................................................................... 5–32Tips for an Administrator ................................................................................. 5–35Available User Role Templates........................................................................ 5–40Release 4.6A....................................................................................................... 5–40Release 4.6B....................................................................................................... 5–44

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��������������������������������������²�

Overview............................................................................................................... 6–2Selecting Views/Types in Activity Group Maintenance .................................. 6–2Exploring Advanced Profile Generator Functionality ..................................... 6–3Creating and Changing the Hierarchy................................................................... 6–4

Inserting Transactions ............................................................................................ 6–5Inserting Internet and Document Links ............................................................... 6–10Inserting Reports ................................................................................................. 6–12Displaying the Online Documentation for Activity Group Objects ...................... 6–15Copying and Deriving Activity Groups...........................................................6–16Basics on Duplicating Activity Groups ................................................................ 6–16Copying Activity Groups...................................................................................... 6–17Deriving Activity Groups...................................................................................... 6–17Selecting Workflow Tasks................................................................................ 6–21What You Should Know About Workflow............................................................ 6–21Deleting Activity Groups ..................................................................................6–24

Page 8: Amez 46 all

Detailed Table of Contents

Authorizations Made Easyviii

Postmaintaining User Role Templates............................................................6–25Different Settings for the Maintenance View.......................................................6–25Maintaining and Generating the Authorization Profiles................................6–26Displaying an Overview of Generated Profiles .............................................. 6–30Regenerating Authorization Profiles After Making Changes ....................... 6–32Using Utilities to Change Generated Authorizations .................................... 6–36Merging Authorizations........................................................................................6–36Reorganizing Technical Names of Authorizations .............................................. 6–37Customizing Authorizations.............................................................................6–38Assigning IMG Projects or Project Views to Activity Groups ..............................6–38

&KDSWHU��� 3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�������������������������������������²�

Overview...............................................................................................................7–2Transports Between Clients............................................................................... 7–2Transports Between R/3 Systems ..................................................................... 7–3Transporting Activity Groups ............................................................................ 7–3Transporting Single Activity Groups Using the Activity Group Maintenance

Transaction........................................................................................................7–4Mass Transport of Activity Groups ........................................................................ 7–6Transporting Check Indicators and Field Values ............................................7–8Transporting Authorization Templates ............................................................. 7–8Transporting User Master Records ................................................................... 7–8

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV�����������������������������������������������������²�

Manually Postmaintaining Authorizations........................................................ 8–2When to Insert Missing Authorizations?................................................................8–2

Case #1: Authorization Is Missing for Related Transactions ..................................8–2Case #2: The Generated Profile Does Not Assign Any General Rights to the

User ....................................................................................................................8–2Case #3: Cannot Select Transaction SU53 from the Menu in PFCG.....................8–2

How to Insert Missing Authorizations ....................................................................8–3Manually Inserting Authorizations.....................................................................8–3Using Selection Criteria .........................................................................................8–4Inserting Manually.................................................................................................. 8–6Inserting Authorizations from Templates .........................................................8–7Creating a New Template......................................................................................8–7Inserting Authorizations from a Template ........................................................... 8–10Inserting Authorizations from a Profile...........................................................8–12Inserting Full Authorizations: Profile “<YourCompany>” ............................ 8–15

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV����������������������������������������������������������������²�

Overview............................................................................................................... 9–2Assigning Users to Activity Groups.................................................................. 9–3Assigning Activity Groups to Users.................................................................. 9–6Assigning PD Objects to Activity Groups ........................................................ 9–7Assigning Activity Groups to PD Objects ...................................................... 9–10Transferring Users from an IMG Project to an Activity Group..................... 9–13Updating Profiles in the User Master Records............................................... 9–15

Page 9: Amez 46 all

Detailed Table of Contents

Release 4.6A/B L[ix

Comparing User Master Data from Within Transaction PFCG........................... 9–15Profile Comparisons Using Mass Compare (PFUD)........................................... 9–18Report PFCG_TIME_DEPENDENCY to Schedule Time Dependency.............. 9–19Creating a Sample Organizational Plan.......................................................... 9–21Using the Classic R/3 Transaction...................................................................... 9–22Using the Enjoy Transaction ............................................................................... 9–27Structural Authorizations ................................................................................. 9–28

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ���������������������������������������������������������������������������������²�

Overview............................................................................................................. 10–2Setting Up an ALE User.................................................................................... 10–3Naming Logical Systems.................................................................................. 10–5Assigning Logical Systems to Clients............................................................ 10–8Defining Target System for RFC Calls .......................................................... 10–10Distribution Model........................................................................................... 10–13Generating Partner Profiles in the Central System ..................................... 10–16Distributing Model View ................................................................................. 10–17Generating Partner Profiles in the Client System........................................ 10–18

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ ����������������������������������������²�

Overview............................................................................................................. 11–2Assigning the Central User Administration Distribution Model .................. 11–2Testing Central User Administration .............................................................. 11–3Migrating Existing Users to the Central System............................................ 11–7Defining Field Attributes for User Maintenance ............................................ 11–9Global User Manager ...................................................................................... 11–10Structure of the Global User Manager .............................................................. 11–12Using the Global User Manager........................................................................ 11–12

System Landscape with Existing Users ............................................................. 11–12System Landscape Without Existing Users........................................................ 11–13User Creation...................................................................................................... 11–14

Defining System Types and User Groups......................................................... 11–14Modeling with the Global User Manager........................................................... 11–16Authorization for the Global User Manager....................................................... 11–17Distributing Data in the Global User Manager .................................................. 11–18

Immediate Distribution........................................................................................ 11–19Scheduling Background Distribution................................................................... 11–19

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ ���������������������������������������������������������������²�

Overview............................................................................................................. 12–2Tracing Authorizations with Transaction SU53............................................. 12–2System Trace Using Transaction ST01........................................................... 12–4Analyzing a Written Trace File ......................................................................... 12–9Reducing the Scope of Authorization Checks............................................. 12–12Overview............................................................................................................ 12–12Enabling the Profile Generator.......................................................................... 12–12Enabling/Disabling Other System-wide Checks ............................................... 12–12

Page 10: Amez 46 all

Detailed Table of Contents

Authorizations Made Easyx

Enabling auth/tcodes_not_checked ....................................................................12–12Enabling auth/rfc_authority_check......................................................................12–13Globally Deactivating or Activating Authorization Checks ..................................12–13Parameter Transactions......................................................................................12–18

Deactivating Authorization Checks Using SU24 ...............................................12–18Reducing the Scope of Authorization Checks................................................... 12–19

Maintaining Check Indicators for Transaction Codes .........................................12–20Mass Change of Check Indicators ......................................................................12–28Maintaining Authorizations in the Activity Groups...............................................12–32

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG�/RJJLQJ�������������������������������������������������� ��²�

Overview.............................................................................................................13–2Audit Tools (SM20, SM19, SECR) .................................................................... 13–2Security Audit Log (SM20)...................................................................................13–2

Running the Audit Log...........................................................................................13–4Setting Security Audit Log Parameters (SM19) ..................................................13–5

Defining Filter Group 1 ..........................................................................................13–7Defining Filter Group 2 ..........................................................................................13–7

Audit Information System (SECR).....................................................................13–11Complete Audit....................................................................................................13–12User-Defined Audit..............................................................................................13–16

User Security Audit Jobs ...................................................................................13–18Audit Tasks (SM21, STAT, ST03) ...................................................................13–20Reviewing Validity of Named Users ..................................................................13–20Reviewing Profiles for Accuracy and Permission Creep................................... 13–21System Log (SM21)........................................................................................... 13–22Statistic Records in CCMS (STAT) ................................................................... 13–24ST03 – User Profile ........................................................................................... 13–26Logging of Specific Activities............................................................................. 13–28

Logging Changes to Table Data .........................................................................13–28

Logging Changes to User Master Records, Profiles, and Authorizations 13–30

&KDSWHU���� 8SJUDGH ���������������������������������������������������������������������������������������� ��²�

Before Doing Any Upgrade .............................................................................. 14–2Validation Steps After Upgrading Is Completed ............................................ 14–3Converting Previously Created SU02 Profiles to Activity Groups............... 14–4Creating an Activity Group from Manually Maintained Profiles...........................14–4Removing User Assignments from the Original SU02 Profile............................. 14–9Upgrading from a Release Prior to 3.1x to 4.6 A/B ......................................14–11Converting Existing Authorization Profiles for the Profile Generator ................14–11Re-creating the Authorization Profiles from Scratch Using the Profile

Generator ...................................................................................................... 14–11Upgrading from Release 3.0F to 4.6 A/B.......................................................14–12Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B...................................... 14–14Upgrade from Releases 4.0x or 4.5x to 4.6 A/B............................................ 14–22

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV �������������������������������������������������������� $²�

Overview...............................................................................................................A–2SAPNet – R/3 Frontend Notes ............................................................................A–3

Page 11: Amez 46 all

Detailed Table of Contents

Release 4.6A/B [Lxi

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV���������������������������������������������������������� %²�

Overview...............................................................................................................B–2R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................B–2Profile Generator Setup......................................................................................B–3Working with the PG and Profiles .....................................................................B–3Authorization Checks (SU24).............................................................................B–5Upgrade Procedure (SU25) ................................................................................B–7Including Transactions or Reports ...................................................................B–7Missing Authorizations.......................................................................................B–7User Administration ............................................................................................B–8Transporting ........................................................................................................B–8Tables ...................................................................................................................B–8

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH�3DUDPHWHUV������������������������������������������� &²�

Incorrect Logons, Default Clients, and Default Start Menu............................C–2Setting Password Length and Expiration.........................................................C–2Specifying Impermissible Passwords...............................................................C–3Securing SAP* Against Misuse..........................................................................C–3Tracing Authorizations .......................................................................................C–3Profile Generator and Transaction SU24..........................................................C–4User Buffer ...........................................................................................................C–4No Check on Object S_TCODE..........................................................................C–4No Check on Certain ABAP Objects .................................................................C–4RFC Authority Check ..........................................................................................C–5

*ORVVDU\ ���������������������������������������������������������������������������������������������������� *²�

,QGH[ ������������������������������������������������������������������������������������������������������,²�

Page 12: Amez 46 all

Detailed Table of Contents

Authorizations Made Easyxii

Page 13: Amez 46 all

xiii

�$FNQRZOHGJPHQWV

,�ZLVK�WR�H[SUHVV�DSSUHFLDWLRQ�WR�WKH�IROORZLQJ�LQGLYLGXDOV�ZKR�SURYLGHG�WLPH��PDWHULDO��H[SHUWLVH��DQGUHVRXUFHV�WR�KHOS�PDNH�WKLV�JXLGHERRN�SRVVLEOH��LQ�DOSKDEHWLFDO�RUGHU��

6$3�$*� 1RUPDQ�'H�/HHXZ��0DWKLDV�.LQ]OHU��(UZLQ�5RMHZVNL��0DUNXV�6FKPLGW��+HLNR�6WRFN�6YHQ�6FKZHULQ�:HQ]HO��7KRUVWHQ�9LHWK

6$3�$PHULFD� 0DULD�*UHJJ��´&DVSHUµ�:DL�)X�.DQ��'DQLHO�%HQMDPLQ�)LJ�=DLGVSLQHU

6$3�/DEV� $QLO�-DLQ��-RKQ�.DQFOLHU��2OLYHU�0DLQND��*DU\�1DND\DPD��.XUW�:ROI

1LKDG�$O�)WD\HK6$3�/DEV��,QF�������

Page 14: Amez 46 all

Acknowledgments

Authorizations Made Easyxivxiv

Page 15: Amez 46 all

xv

,QWURGXFWLRQ

&RQWHQWV

What Is this Book About? .......................................................................................xvi

Who Should Read this Book?.................................................................................xvi

How to Use this Guide............................................................................................xvii

Conventions ............................................................................................................xvii

Page 16: Amez 46 all

Introduction

What Is this Book About?

Authorizations Made Easyxvixvi

:KDW�,V�WKLV�%RRN�$ERXW"

7KLV�JXLGHERRN�LV�GHVLJQHG�WR�KHOS�\RX�VHW�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�LQ�WKHFXVWRPHU�V\VWHP�XVLQJ�WKH�3URILOH�*HQHUDWRU��3*���,W�H[SODLQV�ZKDW�\RX�QHHG�WR�NQRZ�WRSHUIRUP�WKLV�WDVN�DQG�KHOSV�\RX�XVH�WKH�VWDQGDUG�WRROV�SURYLGHG�ZLWK�\RXU�V\VWHP�

7KLV�ERRN�GRHV�QRW�FRYHU�DXWKRUL]DWLRQV�IRU�DGG�RQ�FRPSRQHQWV�RU�1HZ�'LPHQVLRQSURGXFWV��,W�DOVR�GRHV�QRW�FRYHU�,QWHUQHW�UHODWHG�DXWKRUL]DWLRQV��HQFU\SWLRQ��DXWKHQWLFDWLRQ�DQG�FUHGLW�FDUG�VHFXULW\��

7KLV�JXLGH�UHIHUV�WR�5HOHDVH����$�%�RI�WKH�6$3�5���6\VWHP��$OO�VFUHHQVKRWV�DUH�IURP�5HOHDVH���$�XQOHVV�RWKHUZLVH�QRWHG�

7KH�VWUXFWXUH�RI�WKLV�JXLGHERRN�PDWFKHV�WKH�VHWXS�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW��SURJUHVVLQJIURP�D�QHZ�5���LQVWDOODWLRQ�DOO�WKH�ZD\�WR�DQ�XSJUDGH��,I�\RX�XSJUDGH�IURP�DQ�ROGHU�UHOHDVHVHH�FKDSWHU�����8SJUDGH��IRU�PRUH�LQIRUPDWLRQ�

7KH�JUDSKLF�EHORZ�SURYLGHV�DQ�URXJK�RYHUYLHZ�DERXW�WKH�5���DXWKRUL]DWLRQ�F\FOH��)RU�DPRUH�GHWDLOHG�LQIRUPDWLRQ�RQ�WKH�DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�VHH�FKDSWHU����5��6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�

Authorizations ScopingPreparing the R/3 Environment

and Preparation for Go-LiveProduction

Phase

Upgrade +Ongoing

Development

ImplementationEvaluation Operations andContinuous Improvement

7KLV�JXLGH�SURYLGHV�\RX�ZLWK�WKH�IROORZLQJ�< 7KH�ELJ�SLFWXUH��VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ�5���< 7DVNV�\RX�QHHG�WR�SHUIRUP�GXULQJ�DQG�DIWHU�LQVWDOODWLRQ�RI�5���WR�IDFLOLWDWH�WKH�XVH�RI�WKH

3*< 7DVNV�\RX�QHHG�WR�SHUIRUP�DIWHU�DQ�XSJUDGH�RI�WKH�5���6\VWHP< $OO�WKH�HVVHQWLDO�VWHSV�IRU�VHFXULW\�LPSOHPHQWDWLRQ�XVLQJ�WKH�3*�DQG�&HQWUDO�8VHU

$GPLQLVWUDWLRQ< 7DVNV�WR�SUHSDUH�IRU�JRLQJ�OLYH< $SSHQGL[HV�ZLWK�WKH�PRVW�LPSRUWDQW�6$31HW�²�5���)URQWHQG�QRWHV�IRU�DXWKRUL]DWLRQV

DQG�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�

:KR�6KRXOG�5HDG�WKLV�%RRN"

7KLV�JXLGH�ZDV�GHVLJQHG�IRU�WKH�IROORZLQJ�SHRSOH�XVLQJ�WKH�3*�HLWKHU�LQ�DQ�LPSOHPHQWDWLRQSURMHFW�RU�DV�DQ�RQJRLQJ�UHIHUHQFH�< %DVLV�&RQVXOWDQWV�ZKR�LQVWDOO�5���DQG�VHW�XS�WKH�VHFXULW\�DW�FXVWRPHU�VLWHV

Page 17: Amez 46 all

Introduction

How to Use this Guide

Release 4.6A/B xviixvii

< $SSOLFDWLRQ�&RQVXOWDQWV�ZKR�ZDQW�WR�VWDUW�XVLQJ�WKH�3*�DV�WKH�EDVLV�IRU�WKHLU�FXVWRPHUVHFXULW\�LPSOHPHQWDWLRQ

< &XVWRPHU�,7�DQG�KHOS�GHVN�SHUVRQQHO

+RZ�WR�8VH�WKLV�*XLGH

'HSHQGLQJ�RQ�\RXU�JHQHUDO�6$3�DQG�DXWKRUL]DWLRQ�VSHFLILF�NQRZOHGJH��VWDUW�ZLWK�WKHIROORZLQJ�VHFWLRQV�< ,I�\RX�KDYH�OLWWOH�RU�QR�NQRZOHGJH�FRQFHUQLQJ�VHFXULW\�DQG�WKH�DXWKRUL]DWLRQ�FRQFHSW�LQ

5����VWDUW�ZLWK�FKDSWHU����5���6\VWHP�6HFXULW\�DQG�WKH�$XWKRUL]DWLRQ�&RQFHSW�< (YHU\RQH��HYHQ�WKH�H[SHUWV��VKRXOG�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�

)DPLOLDULW\�ZLWK�WKLV�FKDSWHU�HQVXUHV�D�FRPSOHWH�VHWXS�EHIRUH�\RX�DFWXDOO\�VWDUW�ZRUNLQJZLWK�WKH�3*�

< ,I�\RX�KDYH�DOUHDG\�XVHG�WKH�3*�LQ�5HOHDVH����)����*����+����$����%����$�RU����%�ZHVWURQJO\�UHFRPPHQG�WKDW�\RX�UHDG�WKH�FKDSWHU�:KDWªV�1HZ�LQ�5HOHDVH�����DQG�WKHDSSURSULDWH�VHFWLRQ�LQ�FKDSWHU�����8SJUDGH��,Q�WKLV�FKDSWHU��ZH�GLVFXVV�WKH�VWHSV�WR�EHSHUIRUPHG�EHIRUH�\RX�FRQWLQXH�ZRUNLQJ�ZLWK�WKH�3*�DIWHU�DQ�5���6\VWHP�XSJUDGH��:HSURYLGH�LQIRUPDWLRQ�IRU�D�VPRRWK�WUDQVLWLRQ�WR�\RXU�QH[W�UHOHDVH�

< 5HDG�FKDSWHUV��²��DW�OHDVW�RQFH�IRU�LQIRUPDWLRQ�UHODWHG�WR�WKH�LPSOHPHQWDWLRQ�RI�VHFXULW\DQG�XVLQJ�WKH�3URILOH�*HQHUDWRU��$IWHU�WKDW��\RX�FDQ�EURZVH�WKH�FKDSWHUV�RQ�SHUIRUPLQJVSHFLILF�WDVNV�

< %HIRUH�WUDQVSRUWLQJ�DFWLYLW\�JURXSV��UHDG�FKDSWHU����3UHSDULQJ�WKH�5���(QYLURQPHQW�IRU�*R�/LYH�FDUHIXOO\�

< &KDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�KHOSV�VROYH�RQJRLQJ�DXWKRUL]DWLRQ�SUREOHPV�RQFH\RX�JR�OLYH�

&HUWDLQ�WHUPLQRORJ\��XVHU�LQIRUPDWLRQ��DQG�VSHFLDO�LFRQV�DUH�XVHG�WKURXJKRXW�WKLV�JXLGH�7KH�IROORZLQJ�VHFWLRQV�H[SODLQ�KRZ�WR�LGHQWLI\�DQG�XVH�WKHVH�KHOSIXO�IHDWXUHV�

&RQYHQWLRQV

,Q�WKH�WDEOH�EHORZ��\RX�ZLOO�ILQG�VRPH�RI�WKH�WH[W�FRQYHQWLRQV�XVHG�WKURXJKRXW�WKLV�JXLGH�

&ROXPQ�7LWOH &ROXPQ�7LWOH

6DQV�VHULI�LWDOLF 6FUHHQ�QDPHV�RU�RQ�VFUHHQ�REMHFWV��EXWWRQV�ILHOGV��VFUHHQ�WH[W��HWF��

Monospace 8VHU�LQSXW��WH[W�WKH�XVHU�W\SHV�YHUEDWLP�

1DPH��→��1DPH� 0HQX�VHOHFWLRQ�1DPH��LV�WKH�PHQX�QDPH�DQG�1DPH��LV�WKH�LWHP�RQ�WKH�PHQX

Page 18: Amez 46 all

Introduction

Conventions

Authorizations Made Easyxviiixviii

6DPSOH�5���5HOHDVH�����6FUHHQ

♦�$SSOLFDWLRQ�WRROEDU�

7KH�VFUHHQVKRWV�VKRZQ�LQ�WKLV�JXLGH�DUH�EDVHG�RQ�IXOO�XVHU�DXWKRUL]DWLRQ��6$3B$//��'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��VRPH�RI�WKH�EXWWRQV�RQ�\RXU�DSSOLFDWLRQ�WRROEDU�PD\QRW�EH�DYDLODEOH�

♣�:RUNSODFH�PHQX�

'HSHQGLQJ�RQ�\RXU�DXWKRUL]DWLRQV��\RXU�ZRUNSODFH�PHQX�PD\�ORRN�GLIIHUHQW�IURPVFUHHQVKRWV�LQ�WKLV�JXLGH�ZKLFK�DUH�EDVHG�RQ�6$3B$//��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUGPHQX�EXWWRQV�SURYLGH�GLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�

,Q�WKLV�JXLGHERRN�\RX�OHDUQ�KRZ�WR�EXLOG�XVHU�PHQXV�

1RWH��,Q�WKLV�JXLGHERRN��ZH�VKRZ�WKH�WHFKQLFDO�QDPHV�RI�HDFK�WUDQVDFWLRQ��7R�PDWFK�RXUVHWWLQJV��FKRRVH�([WUDV�→�6HWWLQJV�DQG�VHOHFW�6KRZ�WHFKQLFDO�QDPHV�

Menu Bar

Screen Title

♦ Application Toolbar

♣ Workplace Menu

Status Bar

Standard Toolbar

User menu

SAP standard menu

Workplace

Page 19: Amez 46 all

Introduction

Conventions

Release 4.6A/B xixxix

6SHFLDO�,FRQV

7KURXJKRXW�WKLV�JXLGH�VSHFLDO�LFRQV�LQGLFDWH�LPSRUWDQW�PHVVDJHV��%HORZ�DUH�EULHIH[SODQDWLRQV�RI�HDFK�LFRQ�

([HUFLVH�FDXWLRQ�ZKHQ�SHUIRUPLQJ�WKLV�WDVN�RU�VWHS��$Q�H[SODQDWLRQ�RI�ZK\�\RX�VKRXOG�EHFDUHIXO�LV�LQFOXGHG�

7KLV�LQIRUPDWLRQ�KHOSV�\RX�XQGHUVWDQG�WKH�WRSLF�LQ�JUHDWHU�GHWDLO��,W�LV�QRW�QHFHVVDU\�WRNQRZ�WKLV�LQIRUPDWLRQ�WR�SHUIRUP�WKH�WDVN�

7KHVH�PHVVDJHV�SURYLGH�KHOSIXO�KLQWV�DQG�VKRUWFXWV�WR�PDNH�\RXU�ZRUN�IDVWHU�DQG�HDVLHU�

Page 20: Amez 46 all

Introduction

Conventions

Authorizations Made Easyxx xx

Page 21: Amez 46 all

xxi

:KDW·V�1HZ�LQ�5HOHDVH����

&RQWHQWV

Overview ..................................................................................................................xxii

User Role Templates...............................................................................................xxii

Flexible User Menus ...............................................................................................xxii

Composite Activity Groups...................................................................................xxiv

User Groups ...........................................................................................................xxiv

Central User Administration .................................................................................xxiv

Page 22: Amez 46 all

What’s New in Release 4.6

Overview

Authorizations Made Easyxxiixxii

2YHUYLHZ

7KLV�FKDSWHU�SURYLGHV�D�EULHI�GHVFULSWLRQ�RI�WKH�QHZ�IXQFWLRQDOLW\�LQ�DXWKRUL]DWLRQ�UHODWHGWRSLFV�LQ�WKH�5���5HOHDVH�����

)RU�VWHS�E\�VWHS�SURFHGXUHV�DQG�GHWDLOHG�LQIRUPDWLRQ�RQ�VSHFLILF�WRSLFV��SOHDVH�VHH�WKHDSSURSULDWH�FKDSWHUV��DV�UHIHUHQFHG�

)RU�WKH�ODWHVW�LQIRUPDWLRQ��\RX�VKRXOG�DOZD\V�FKHFN�WKH�UHOHDVH�QRWHV�IRU�5HOHDVH�����

8VHU�5ROH�7HPSODWHV

:LWK�5HOHDVH����$�6$3�GHOLYHUV�RYHU�����XVHU�UROH�WHPSODWHV��7KH�XVHU�UROH�WHPSODWHV�DUHSUHGHILQHG�DFWLYLW\�JURXSV�FRQVLVWLQJ�RI�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��<RX�KDYHWKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�< 8VH�DV�GHOLYHUHG< &RS\�DQG�FKDQJH�WKHP�WR�VXLW�\RXU�QHHGV< &UHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�IURP�VFUDWFK

2QFH�XVHUV�DUH�DVVLJQHG�WR�RQH�RU�PRUH�DFWLYLW\�JURXSV�DQG�ORJ�RQWR�WKH�V\VWHP��WKH\�VHHWKHLU�XVHU�PHQX��$V�VKRZQ�LQ�WKH�JUDSKLF�RQ�WKH�QH[W�SDJH��WKLV�XVHU�PHQX�FRQWDLQV�RQO\WKRVH�LWHPV��VXFK�DV�WUDQVDFWLRQV��UHSRUWV��DQG�ZHE�DGGUHVVHV��WKH\�QHHG�WR�SHUIRUP�WKHLUGDLO\�WDVNV��8VHUV�FDQ�DOVR�DGG�WKHLU�PRVW�IUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�)DYRULWHV�PHQXIRU�TXLFNHU�DFFHVV�

)OH[LEOH�8VHU�0HQXV

$V�RI�5HOHDVH����$��WKH�V\VWHP�GLVSOD\V�D�VSHFLILF�XVHU�PHQX�LQ�WKH�IRUP�RI�D�WUHH�DIWHU�XVHUVORJ�RQ�WR�WKH�V\VWHP��VHH�JUDSKLF�RQ�QH[W�SDJH���7KLV�XVHU�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROHWHPSODWH�RU�DFWLYLW\�JURXS�WKH�XVHU�LV�DVVLJQHG�WR��8VHUV�QR�ORQJHU�KDYH�WR�QDYLJDWH�WKURXJKXQQHFHVVDU\�5���IXQFWLRQV�IRU�ZKLFK�WKH\�KDYH�QR�DXWKRUL]DWLRQ��7KH�FRPSDQ\�PHQX�LV�QRORQJHU�DYDLODEOH�DV�RI�5HOHDVH����$�

:KHQ�D�IXQFWLRQ�LV�VHOHFWHG��LW�VWDUWV�LQ�WKH�VDPH�VHVVLRQ��UHSODFLQJ�WKH�XVHU�PHQX�ZLWK�WKHH[HFXWHG�IXQFWLRQ��:KHQ�D�XVHU�H[LWV�D�WUDQVDFWLRQ�RU�VWDUWV�D�QHZ�VHVVLRQ��WKH�VSHFLILF�XVHUPHQX�DXWRPDWLFDOO\�UHDSSHDUV�

$ORQJ�ZLWK�WKH�XVHU�PHQXV��\RX�FDQ�GLVSOD\�D�FRPSOHWH�YLHZ�RI�DOO�IXQFWLRQV�GHOLYHUHG�E\6$3�XVLQJ�WKH�6$3�VWDQGDUG�PHQX��7KLV�FRPSOHWH�YLHZ�GLVSOD\V�DXWRPDWLFDOO\�LI�QR�XVHU

Page 23: Amez 46 all

What’s New in Release 4.6

Flexible User Menus

Release 4.6A/B xxiiixxiii

PHQXV�KDYH�EHHQ�GHILQHG�RU�LI�WKH�DGPLQLVWUDWRU�KDV�FKRVHQ�WKLV�RSWLRQ�ZKHQ�GHILQLQJ�QHZXVHU�PHQXV�

8VHU�0HQX�([DPSOH

+HUH�DUH�VRPH�H[DPSOHV�RI�GHOLYHUHG�DFWLYLW\�JURXSV�

%DVLV 0LVFHOODQHRXV

$XWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU &2��6DOHV�PDQDJHU

$XWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU &2��+HDG�RI�FRQWUROOLQJ

8VHU�DGPLQLVWUDWRU ),��$FFRXQWV�SD\DEOH�DFFRXQWDQW

6\VWHP�DGPLQLVWUDWRU ),��$FFRXQWV�UHFHLYDEOH�DFFRXQWDQW

%DFNJURXQG�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��:RUNHU

'DWDEDVH�DGPLQLVWUDWRU /2�3URGXFWLRQ�SODQQLQJ��2SHUDWRU

&XVWRPL]LQJ�SURMHFW�PHPEHU 00��$FFRXQWV�SD\DEOH�FOHUN

Page 24: Amez 46 all

What’s New in Release 4.6

Composite Activity Groups

Authorizations Made Easyxxivxxiv

&RPSRVLWH�$FWLYLW\�*URXSV

$V�RI�5HOHDVH����$�LW�LV�SRVVLEOH�WR�FUHDWH�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�D�FROOHFWLRQ�RI�RWKHUDFWLYLW\�JURXSV��7KLV�DFWLYLW\�JURXS�LV�FDOOHG�D�FRPSRVLWH�DFWLYLW\�JURXS��&RPSRVLWH�DFWLYLW\JURXSV�FRQWDLQ�RQO\�RWKHU�DFWLYLW\�JURXSV�DQG�QR�DXWKRUL]DWLRQ�GDWD�

8VHU�*URXSV

,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��7KH�FDWHJRU\�8VHUJURXS�FDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

&HQWUDO�8VHU�$GPLQLVWUDWLRQ

,I�D�V\VWHP�JURXS�FRQVLVWV�RI�GLIIHUHQW�5���6\VWHPV�ZLWK�PXOWLSOH�FOLHQWV��WKHQ�WKH�VDPHXVHUV�DUH�FUHDWHG�VHYHUDO�WLPHV�LQ�HYHU\�FOLHQW�DQG�DVVLJQHG�WR�DFWLYLW\�JURXSV��&HQWUDO�8VHU$GPLQLVWUDWLRQ�LV�GHVLJQHG�WR�FDUU\�RXW�WKHVH�WDVNV�LQ�D�FHQWUDO�V\VWHP�DQG�WKHQ�GLVWULEXWHWKLV�GDWD�WR�DOO�V\VWHPV�LQ�WKH�V\VWHP�JURXS�

7KH�*OREDO�8VHU�0DQDJHU�SURYLGHV�WKH�V\VWHP�DGPLQLVWUDWRU�ZLWK�DQ�RYHUYLHZ�RI�WKH�XVHUV�H[LVWLQJ�XVHU�JURXSV��WKH�V\VWHPV�LQ�WKH�V\VWHP�JURXS��DQG�WKH�DFWLYLW\�JURXSV��%\�VLPSO\XVLQJ�GUDJ�DQG�GURS��WKH�V\VWHP�DGPLQLVWUDWRU�FDQ�PDNH�FKDQJHV�LQ�WKH�RYHUYLHZ��7KHVHFKDQJHV�WDNH�HIIHFW�DIWHU�GLVWULEXWLRQ�WR�GHSHQGHQW�V\VWHPV�

Page 25: Amez 46 all

1–1

&KDSWHU��� 5���6\VWHP�6HFXULW\�DQG�WKH

$XWKRUL]DWLRQ�&RQFHSW

&RQWHQWV

Overview ..................................................................................................................1–2

The Authorization Concept ....................................................................................1–4

SAP* and DDIC Users .............................................................................................1–8

What Is the Profile Generator? ..............................................................................1–9

What Is an Activity Group? ..................................................................................1–12

R/3 Tools for Security Implementation ...............................................................1–14

Case Study: Security Strategy in a Three-System Environment .....................1–15

Setting Up the Authorization Administrators.....................................................1–19

Policies and Procedures ......................................................................................1–21

Auditing Requirements ........................................................................................1–24

��

Page 26: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Overview

Authorizations Made Easy1–2

2YHUYLHZ

,Q�WKLV�FKDSWHU�ZH�H[SODLQ�WKH�VHWXS�DQG�PDLQWHQDQFH�RI�WKH�5���DXWKRUL]DWLRQ�FRQFHSWWKURXJK�WKH�FRPSOHWH�5���OLIHF\FOH�

7KH�JUDSKLF�EHORZ�LOOXVWUDWHV�WKH�5���DXWKRUL]DWLRQ�F\FOH�DQG�WKH�WRROV�XVHG�LQ�YDULRXVVWDJHV�RI�WKH�LPSOHPHQWDWLRQ�

Description ofauth. concept

Info gathering

Strategy,Definition

SU25Upgrade

Authorizations Scoping Preparing the R/3 Environmentand Preparation for Go-Live

ProductionPhase

Upgrade +Ongoing

Development

Setting upthe profilegenerator

Roadmap,+ structure

Q&Adb (4.6B)

Authorizationlist (AL.xls)

Preparation for Going live,Transporting (AG, user,templates,…)

User role templates

Setting up ALE

ASAP

Setting up Central User Admnistration

Global usermanager

IMG

SU25 First installation

3 methods of usinguser role templates: - Use as is - Copy + change - Create own

Description how to workwith user role templates (AG)(which exists, how to use,customizing, creating, etc.)

Upgrade

3.x-4.x Õ 4.6

Miscellaneous

Tips & Troubleshoot.

Infosystem.

SAPNet -R/3Frontend notes (formerly OSS)

Useradmin.

R/3Users

ImplementationEvaluation Operations andContinuous Improvement

SecurityAudit

7RROV�WR�6XSSRUW�WKH�5���$XWKRUL]DWLRQ�&\FOH

7KH�JXLGHERRN�LV�GLYLGHG�LQWR�IRXU�VHSDUDWH�SKDVHV�

< $XWKRUL]DWLRQ�6FRSLQJ��FKDSWHU������< 3UHSDULQJ�WKH�5���(QYLURQPHQW�DQG�3UHSDUDWLRQ�IRU�*R�/LYH��FKDSWHU�����������������������������< 3URGXFWLRQ�3KDVH���FKDSWHU����������������< 8SJUDGH�DQG�2QJRLQJ�'HYHORSPHQW��FKDSWHU����

:H�EHJLQ�ZLWK�WKH�5���DXWKRUL]DWLRQ�FRQFHSW�DQG�WKH�DXWKRUL]DWLRQ�GHVLJQ�VR�\RX�FDQ�PHHWUHTXLUHPHQWV�VXFK�DV�PD[LPXP�VHFXULW\��HDV\�XVHU�PDLQWHQDQFH��DQG�VXIILFLHQW�SULYLOHJHVIRU�HQG�XVHUV�WR�IXOILOO�WKHLU�MRE�GXWLHV��7KH�DXWKRUL]DWLRQ�FRQFHSW�GHILQHV�WKH�IXQFWLRQV�WR�EHFDUULHG�RXW�LQ�YDULRXV�RUJDQL]DWLRQDO�XQLWV�E\�SHRSOH�LQ�VSHFLILF�SRVLWLRQV��7KH�FRQFHSW�DOVRH[WHQGV�WKH�5���RQOLQH�GRFXPHQWDWLRQ�RQ�DXWKRUL]DWLRQV�DQG�SURILOHV�UHTXLUHG�IRU�WKHYDULRXV�HQWHUSULVH�DUHDV�

,PSOHPHQWLQJ�D�PXOWLOHYHO�FOLHQW�VHUYHU�HQYLURQPHQW�RQ�:$1V�SURYLGHV�JUHDW�IOH[LELOLW\�%XW��LQ�WKLV�HQYLURQPHQW��KLJKO\�VHQVLWLYH�GDWD�DQG�SURJUDPV�DUH�DW�D�JUHDWHU�ULVN�RI�EHLQJORVW��PDQLSXODWHG��DQG�VSLHG�XSRQ�WKDQ�LQ�D�FRQYHQWLRQDO�PDLQIUDPH�HQYLURQPHQW��(YHQZLWK�ORFDO�RSHUDWLRQ��WKLV�ULVN�DSSOLHV�WR�DOO�WKUHH�OD\HUV��3UHVHQWDWLRQ��$SSOLFDWLRQ��DQG'DWDEDVH��DQG�EHFRPHV�HYHQ�PRUH�DFXWH�WKDQ�:$1V�

Page 27: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Overview

Release 4.6A/B1–3

7KH�IROORZLQJ�JUDSKLF�VKRZV�KRZ�5���FRYHUV�WKH�DVSHFWV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\�

FRYHUHG�LQ�

$XWKRUL]DWLRQV�0DGH�(DV\

$XWKRUL]DWLRQ�&RQFHSW�LQ�5��� 'DWD�SURWHFWLRQ�

DW�GDWDEDVH�OHYHO

3URWHFWLRQ�DW�FRPPXQLFDWLRQ�OHYHO

,QWHJULW\�FKHFN

$FFHVV�SURWHFWLRQ

'DWD�EDFNXS

5

5

SAP SAP

'DWD�3URWHFWLRQ�DQG�6HFXULW\

7R�PHHW�WKH�KLJK�GHPDQGV�RI�GDWD�SURWHFWLRQ�DQG�VHFXULW\��6$3�SURYLGHV�WKH�IROORZLQJ�5��VHFXULW\�PHFKDQLVPV�< $XWKRUL]DWLRQ�FRQFHSW��WKLV�JXLGHERRN�GLVFXVVHV�DQ�DXWKRUL]DWLRQ�GHVLJQ�XVLQJ�WKH

3URILOH�*HQHUDWRU�< $FFHVV�SURWHFWLRQ�DQG�DXWKHQWLFDWLRQ�RXWVLGH�RI�5����LQFOXGLQJ�DXWKRUL]DWLRQV�EHWZHHQ

:HE�EDVHG�DSSOLFDWLRQV�DQG�5����QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 3URWHFWLRQ�DW�QHWZRUN�FRPPXQLFDWLRQ�OHYHO��QRW�GLVFXVVHG�LQ�WKLV�JXLGH�< 'DWD�SURWHFWLRQ�DW�GDWDEDVH�OHYHO��QRW�GLVFXVVHG�LQ�WKH�JXLGH�

Page 28: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Authorizations Made Easy1–4

7KH�$XWKRUL]DWLRQ�&RQFHSW

7KH�FRQFHSW�RI�DXWKRUL]DWLRQV�LQ�WKH�5���6\VWHP�LQFOXGHV�WKH�IROORZLQJ�< 3URILOH�*HQHUDWRU< /RFNLQJ�DQG�XQORFNLQJ�WUDQVDFWLRQV< /RFNHG�UHFRUGV< 6WUXFWXUDO�DXWKRUL]DWLRQV��1RW�GLVFXVVHG�LQ�WKLV�YHUVLRQ��VHH�$XWKRUL]DWLRQV�0DGH�(DV\

JXLGHERRN�����$�%�IRU�LQIRUPDWLRQ��< 'DWD�HQFU\SWLRQ��QRW�GLVFXVVHG�LQ�WKLV�ERRN�< /RFNLQJ�V\VWHP�IRU�FKDQJHV

7KH�5���DXWKRUL]DWLRQ�FRQFHSW�SHUPLWV�WKH�DVVLJQPHQW�RI�JHQHUDO�DQG�RU�ILQHO\�GHWDLOHGXVHU�DXWKRUL]DWLRQV��7KHVH�DVVLJQPHQWV�FDQ�UHDFK�GRZQ�WR�WKH�WUDQVDFWLRQ��ILHOG��DQG�ILHOGYDOXH�OHYHO��7KHVH�DXWKRUL]DWLRQV�DUH�FHQWUDOO\�DGPLQLVWHUHG�LQ�XVHU�PDVWHU�UHFRUGV�DQG�PRVWDOORZ�WKH�KDQGOLQJ�RI�FHUWDLQ�5���FRPSRQHQWV�DSSOLFDEOH�WR�VSHFLILF�RSHUDWLRQV��$FWLRQV�E\�DXVHU�PD\�UHTXLUH�VHYHUDO�DXWKRUL]DWLRQV��)RU�H[DPSOH��WR�FKDQJH�D�PDWHULDO�PDVWHU�UHFRUG�DXWKRUL]DWLRQV�DUH�UHTXLUHG�IRU�WKH�< 7UDQVDFWLRQ�´FKDQJHµ< 6SHFLILF�PDWHULDO< *HQHUDO�DXWKRUL]DWLRQ�WR�ZRUN�ZLWKLQ�WKH�FRPSDQ\�FRGH

7KH�UHVXOWLQJ�UHODWLRQVKLSV�FDQ�EHFRPH�YHU\�FRPSOH[��7R�PHHW�WKHVH�UHTXLUHPHQWV��WKH�5��DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�LPSOHPHQWHG�DV�D�IRUP�RI�SVHXGR�REMHFW�RULHQWHG�FRQFHSWZLWK�FRPSOHWH�DXWKRUL]DWLRQ�REMHFWV��(DFK�DXWKRUL]DWLRQ�REMHFW�LV�D�FRPELQDWLRQ�RIDXWKRUL]DWLRQ�ILHOGV��$Q�DXWKRUL]DWLRQ�DOZD\V�UHIHUV�WR�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�FDQFRQWDLQ�LQWHUYDOV�IRU�WKH�ILHOG�YDOXHV��$XWKRUL]DWLRQ�FKHFNV�SURWHFW�WKH�IXQFWLRQV�RU�REMHFWV\RX�FKRRVH��6WDQGDUG�GHOLYHUHG�5���KDV�DXWKRUL]DWLRQ�FKHFNV�HPEHGGHG�LQ�WKH�SURJUDPORJLF��3URJUDPPHUV�KDYH�WR�GHFLGH�ZKLFK�DVSHFWV�RI�WKHLU�SURJUDPPHG�IXQFWLRQDOLW\�VKRXOGEH�FKHFNHG�DQG�KRZ�WKH�FKHFN�VKRXOG�EH�FRQGXFWHG�

$XWKRUL]DWLRQ�DGPLQLVWUDWRUV�FUHDWH�DXWKRUL]DWLRQV�WKDW�DUH�DVVLJQHG�WR�XVHUV�LQ�FROOHFWLRQVFDOOHG�SURILOHV��7KH�3URILOH�*HQHUDWRU��3*��XVXDOO\�JHQHUDWHV�DXWKRUL]DWLRQV�DQGDXWKRUL]DWLRQ�SURILOHV��DOWKRXJK�DXWKRUL]DWLRQV�FDQ�DOVR�EH�PDQXDOO\�LQVHUWHG�LQWR�D�SURILOH�

7KH�IROORZLQJ�JUDSKLF�VKRZV�WKH�DXWKRUL]DWLRQ�FRPSRQHQWV�DQG�H[SODLQV�WKHLU�UHODWLRQVKLS�

Page 29: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Release 4.6A/B1–5

)�,

��/RQJ�WH[W��7HFKQ��QDPH

��)LHOG��)LHOG�YDOXH

*HQHUDWHG�IURP�3*

-RKQ�([DPSOH�6$3�����

$P\�$Q\ZKHUH�6$3�����

+�5

2EMHFW�&ODVV $XWKRUL]DWLRQ2EMHFW

$XWKRUL]DWLRQ 3URILOH 8VHU

��/RQJ�WH[W��7HFKQ��QDPH

��/RQJ�WH[W��7HFKQ��QDPH

*HQHUDWHG�IURP�3*

��)LHOG��)LHOG�YDOXH

��)LHOG��)LHOG�YDOXH

��)LHOG��)LHOG�YDOXH

6$3�$XWKRUL]DWLRQ�&RQFHSW

$XWKRUL]DWLRQ�2EMHFW

$V�VKRZQ�LQ�WKH�JUDSKLF�´6$3�$XWKRUL]DWLRQ�&RQFHSWµ�DERYH��REMHFWV�DOORZ�FRPSOH[�XVHUDXWKRUL]DWLRQ�FKHFNV��$Q�DXWKRUL]DWLRQ�REMHFW�ZRUNV�DV�D�WHPSODWH�IRU�D�WR�EH�GHILQHGDXWKRUL]DWLRQ�DQG�FRQWDLQV�D�PD[LPXP�RI�WHQ�ILHOGV�SHU�REMHFW��8VHUV�PD\�RQO\�FRQGXFW�DQDFWLYLW\�LI�WKH\�VDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKH�DXWKRUL]DWLRQ�GHILQHG�RQ�DVSHFLILF�DXWKRUL]DWLRQ�REMHFW�

$XWKRUL]DWLRQ�REMHFWV�DUH�JURXSHG�LQ�DQ�REMHFW�FODVV��VXFK�DV�)LQDQFLDO�$FFRXQWLQJ�RU+XPDQ�5HVRXUFHV��$XWKRUL]DWLRQ�REMHFWV�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→$%$3�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�2EMHFWV��%HFDXVHDXWKRUL]DWLRQ�REMHFWV�DUH�FOLHQW�LQGHSHQGHQW�DQG�GHILQHG�LQ�WKH�$%$3�:RUNEHQFK�GHYHORSHUV�DQG�SURJUDPPHUV�DUH�JHQHUDOO\�UHVSRQVLEOH�IRU�FUHDWLQJ�QHZ�DXWKRUL]DWLRQREMHFWV�

&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQG�ZDQW�WR�LQFOXGH$87+25,7<�&+(&.�FDOOV�RU�QHZ�DXWKRUL]DWLRQ�REMHFWV��<RX�FDQ�RQO\�FKDQJH�RU�GHOHWHDXWKRUL]DWLRQ�REMHFWV�DGGHG�E\�\RXU�FRPSDQ\��5���DXWKRUL]DWLRQ�REMHFWV�PD\�QRW�EH�GHOHWHGRU�FKDQJHG��7R�FKDQJH�DQ�REMHFW��\RX�PXVW�ILUVW�GHOHWH�DOO�DXWKRUL]DWLRQV�ZLWK�ZKLFK�LW�LVDVVRFLDWHG�

$Q�$87+25,7<�&+(&.�LV�DQ�$%$3�FRPPDQG�

Page 30: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Authorizations Made Easy1–6

$XWKRUL]DWLRQ�2EMHFW�)LHOGV

$XWKRUL]DWLRQ�ILHOGV�IRU�DQ�REMHFW�FDQ�EH�FUHDWHG�PDQXDOO\�E\�FKRRVLQJ�7RROV�→�$%$3'HYHORSPHQW�:RUNEHQFK�→�'HYHORSPHQW�→�2WKHU�7RROV�→�$XWKRUL]DWLRQ�2EMHFWV�→�)LHOGV�

7KH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�DUH�OLQNHG�WR�GDWD�HOHPHQWV�LQ�WKH�6$3�$%$3'LFWLRQDU\��7KH�SHUPLVVLEOH�YDOXHV�FRQVWLWXWH�DQ�DXWKRUL]DWLRQ��:KHQ�DQ�DXWKRUL]DWLRQFKHFN�WDNHV�SODFH��WKH�V\VWHP�FKHFNV�WKH�YDOXHV�\RX�KDYH�VSHFLILHG�LQ�DQ�DXWKRUL]DWLRQDJDLQVW�WKRVH�UHTXLUHG�WR�FDUU\�RXW�WKH�DFWLRQ��8VHUV�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH\VDWLVI\�WKH�FRQGLWLRQV�IRU�HYHU\�ILHOG�GHILQHG�IRU�D�VSHFLILF�DXWKRUL]DWLRQ�REMHFW�

8VLQJ�WKH�DXWKRUL]DWLRQ�PDLQWHQDQFH�IXQFWLRQV��GHILQH�DOO�DXWKRUL]DWLRQ�ILHOGV�LQ�WKH�V\VWHPGHYHORSPHQW�HQYLURQPHQW��&KDQJHV�DUH�QHFHVVDU\�RQO\�LI�\RX�´PRGLI\µ�\RXU�V\VWHP�DQGWKH�QHZ�V\VWHP�HOHPHQWV�DUH�VXEMHFWHG�WR�DXWKRUL]DWLRQ�FKHFNV�

$XWKRUL]DWLRQV

$Q�DXWKRUL]DWLRQ�DOORZV�\RX�WR�FDUU\�RXW�DQ�5���WDVN�EDVHG�RQ�D�VHW�RI�ILHOG�YDOXHV�LQ�DQDXWKRUL]DWLRQ�REMHFW��(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�H[DFWO\�RQH�DXWKRUL]DWLRQ�REMHFW�DQGGHILQHV�WKH�SHUPLWWHG�YDOXH�UDQJH�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�RI�WKLV�DXWKRUL]DWLRQ�REMHFW�$XWKRUL]DWLRQV�DUH�XVHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�DV�SURILOHV�

%\�WKHPVHOYHV��DXWKRUL]DWLRQV�GR�QRW�H[LVW��7KH\�RQO\�KDYH�PHDQLQJ�LQVLGH�D�SURILOH�

)LHOG 9DOXH

&XVWRPHU�W\SH��&8677<3(�

$FWLYLW\��$&797� ��

([SODQDWLRQ�� � �DOO�SRVVLEOH�YDOXHV����� �GLVSOD\

$XWKRUL]DWLRQV�DUH�XVHG�WR�VSHFLI\�SHUPLWWHG�YDOXHV�IRU�WKH�ILHOGV�LQ�DQ�DXWKRUL]DWLRQ�REMHFW�7KHUH�PD\�EH�RQH�RU�PRUH�YDOXHV�IRU�HDFK�ILHOG��$XWKRUL]DWLRQV�DOORZ�\RX�WR�GHWHUPLQH�WKHQXPEHU�RI�VSHFLILF�YDOXHV�RU�YDOXH�UDQJHV�IRU�D�ILHOG��$OO�YDOXHV�RU�HPSW\�ILHOGV�FDQ�EHSHUPLVVLEOH�YDOXHV��&KDQJHV�DIIHFW�DOO�XVHUV�ZKRVH�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKDWDXWKRUL]DWLRQ��7KH�5���DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�PDLQWDLQ�DXWKRUL]DWLRQVDXWRPDWLFDOO\��XVLQJ�WKH�3*��RU�PDQXDOO\��2QFH�WKH�DXWKRUL]DWLRQ�LV�DFWLYDWHG��FKDQJHV�DIIHFWDOO�XVHUV�ZKLFK�FRQWDLQ�WKH�SURILOH�ZLWK�WKH�DFWLYDWHG�DXWKRUL]DWLRQ�

2QFH�JHQHUDWHG��DXWKRUL]DWLRQV�DQG�SURILOHV�FUHDWHG�ZLWK�WKH�3*�DUH�DXWRPDWLFDOO\DFWLYDWHG��,I�\RX�PDQXDOO\�FUHDWH�DQG�PDLQWDLQ�DXWKRUL]DWLRQV�DQG�SURILOHV��\RX�PXVW�DOVRPDQXDOO\�DFWLYDWH�WKHP��*HQHUDWHG�SURILOHV�DQG�DXWKRUL]DWLRQV�FDQQRW�EH�PDLQWDLQHGPDQXDOO\�ZLWK�WKH�FRQYHQWLRQDO�PDLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68����+RZHYHU��ZHGR�QRW�UHFRPPHQG�WKH�XVH�RI�WKHVH�WUDQVDFWLRQV�IRU�SURILOH�DQG�XVHU�DGPLQLVWUDWLRQDQ\PRUH��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�

Page 31: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

The Authorization Concept

Release 4.6A/B1–7

$XWKRUL]DWLRQ�3URILOHV

8VHU�DXWKRUL]DWLRQV�DUH�QRW�GLUHFWO\�DVVLJQHG�ZLWK�WKH�3*�WR�WKH�XVHU�PDVWHU�UHFRUGV�,QVWHDG��WKHVH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�DV�DXWKRUL]DWLRQ�SURILOHV��7KH�DXWKRUL]DWLRQDGPLQLVWUDWRU�FDQ�FUHDWH�DXWKRUL]DWLRQ�SURILOHV�PDQXDOO\�RU�DXWRPDWLFDOO\�

&KDQJHV�DIIHFW�DOO�XVHUV�WR�ZKRP�WKLV�SURILOH�LV�DVVLJQHG�DQG�WDNH�HIIHFW�RQO\�ZKHQ�WKH�XVHUORJV�RQ��8VHUV�ZKR�DUH�ORJJHG�RQ�ZKHQ�WKH�FKDQJH�WDNHV�SODFH�UHPDLQ�XQDIIHFWHG�GXULQJWKHLU�FXUUHQW�VHVVLRQ��EXW�ZKHQ�WKH\�ORJ�RQ�DJDLQ��WKHLU�SURILOH�FKDQJHV�DFFRUGLQJO\��$�XVHU·VDXWKRUL]DWLRQV�DUH�ORDGHG�LQWR�WKH�XVHU�EXIIHU�RQO\�ZKHQ�WKH\�ORJ�RQ�

<RX�FDQQRW�XVH�WKH�DXWKRUL]DWLRQ�SURILOH�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�PDQXDOO\PDQLSXODWH�WKH�3*�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV��$OWKRXJK�WHFKQLFDOO\�SRVVLEOH��QHYHUFUHDWH�D�SURILOH�WKDW�FRQWDLQV�ERWK�PDQXDOO\�DQG�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV�RUSURILOHV��:H�QR�ORQJHU�UHFRPPHQG�WKH�XVH�RI�WUDQVDFWLRQ�68���IRU�SURILOH�DQG�XVHUDGPLQLVWUDWLRQ��<RX�VKRXOG�XVH�WKH�3URILOH�*HQHUDWRU�LQVWHDG�

1DPLQJ�&RQYHQWLRQ�IRU�$XWKRUL]DWLRQ�3URILOHV

$XWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�D�7�PD\�FRQWDLQ�FULWLFDO��6B86(5 ��DXWKRUL]DWLRQREMHFWV��$OVR��XVH�WKH�3*�WR�H[FOXGH�IXUWKHU�DXWKRUL]DWLRQ�REMHFWV��IRU�H[DPSOH��+5�GDWD�IURP�WKH�SURILOH�

1RWH�WKDW�ZH�DUH�WDONLQJ�DERXW�DXWKRUL]DWLRQ�SURILOHV�QRW�DFWLYLW\�JURXSV�

:KHQ�\RX�ILUVW�VDYH�WKH�DXWKRUL]DWLRQ�SURILOHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH�7KH�V\VWHP�SURSRVHV�D�QDPH�IRU�WKH�SURILOH��KRZHYHU��RQO\�WKH�ILUVW����FKDUDFWHUV��WKHSURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHV�JHQHUDWHG�GHSHQGV�RQ�WKHQXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXP�RI�����DXWKRUL]DWLRQV�ILW�LQWRD�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ�����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,WKDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKH�SURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV��SRVLWLRQV���DQG�����DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�SURILOHV�DQG�WKRVH�SURILOHV�VXSSOLHG�E\�6$3�\RX�VKRXOG�QRW�XVH�DQ\�QDPH�WKDW�KDV�DQ�XQGHUVFRUH�LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QRRWKHU�UHVWULFWLRQV�RQ�WKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�WR�QRWH���������7KHUHIRUH��LI\RXU�FRPSDQ\�KDV�LWV�RZQ�QDPLQJ�FRQYHQWLRQV��\RX�DUH�DOORZHG�WR�RYHUZULWH�WKHSURSRVHG�QDPH�

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��:KHQ�PRUH�WKDQRQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW��WKH�ODVW�WZR�SODFHV�DUH�XVHG�DV�D�FRXQWHU��%DVHGRQ�WKH�QDPH�IRU�WKH�DXWKRUL]DWLRQ�SURILOH��WKH�WHFKQLFDO�QDPHV�IRU�WKH�DXWKRUL]DWLRQV�WR�EHFUHDWHG�VWDUW�ZLWK�D�7�DQG�FRPSULVH�WKH�LQWHUQDO�QXPEHU�RI�WKH�DFWLYLW\�JURXS�DQG�WZR�HQGGLJLWV�LQ�WKH�UDQJH���²�����7������������LV�D�VDPSOH�DXWKRUL]DWLRQ�QDPH��

8VHU�0DVWHU�5HFRUGV

0DVWHU�UHFRUGV�HQDEOH�WKH�XVHU�WR�ORJ�RQ�WR�WKH�5���6\VWHP�DQG�DOORZ�OLPLWHG�DFFHVV�WR�WKHIXQFWLRQV�DQG�REMHFWV��7KH�XVHU�DGPLQLVWUDWRU�PDLQWDLQV�XVHU�PDVWHU�UHFRUGV�E\�FKRRVLQJ7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV�

Page 32: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

SAP* and DDIC Users

Authorizations Made Easy1–8

$XWKRUL]DWLRQ�&KHFNV

7R�FRQGXFW�DQ�DXWKRUL]DWLRQ�FKHFN��WKLV�FKHFN�PXVW�EH�LQFOXGHG�LQ�WKH�WUDQVDFWLRQ·V�VRXUFHFRGH��'XULQJ�WKH�FKHFN��WKH�V\VWHP�FRPSDUHV�DXWKRUL]DWLRQ�SURILOH�YDOXHV��DVVLJQHG�E\�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU��WR�WKH�YDOXHV�QHHGHG�WR�FDUU\�RXW�D�SURJUDP�VSHFLILHG�DFWLRQ��$XVHU�PD\�RQO\�FDUU\�RXW�WKH�DFWLRQ�LI�WKH�DXWKRUL]DWLRQ�FKHFN�LV�VXFFHVVIXO�IRU�HYHU\�ILHOG�LQWKH�DXWKRUL]DWLRQ�REMHFW�

$XWKRUL]DWLRQ�FKHFNV�DUH�WULJJHUHG�E\�WKH�$%$3�$87+25,7<�&+(&.�VWDWHPHQW��7KHSURJUDPPHU�VSHFLILHV�DQ�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�UHTXLUHG�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQILHOG��7KH�$87+25,7<�&+(&.�WKHQ�YHULILHV�LI�D�XVHU�KDV�DXWKRUL]DWLRQ�DQG�LI�WKLVDXWKRUL]DWLRQ�LV�IURP�WKH�XVHU�PDVWHU�UHFRUG��7KH�FKHFN�LV�VXFFHVVIXO�LI�DQ�DXWKRUL]DWLRQ�LVIRXQG�WKDW�FRQWDLQV�WKH�YDOXHV�VSHFLILHG�LQ�WKH�$87+25,7<�&+(&.�

:KHQ�5���WUDQVDFWLRQV�DUH�H[HFXWHG��VLQFH�WKH�WUDQVDFWLRQ�FDOOV�RWKHU�ZRUN�DUHDV�LQ�WKHEDFNJURXQG��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�RIWHQ�FKHFNHG��)RU�WKHVH�FKHFNV�WR�EHVXFFHVVIXO��WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��$XWKRUL]DWLRQ�FKHFNV�FDQ�EHGLVDEOHG�E\�VHWWLQJ�FKHFN�LQGLFDWRUV�LQ�WUDQVDFWLRQ�68���RU�E\�VZLWFKLQJ�RII�REMHFWV�JOREDOO\�

$FWLYDWLQJ�DQG�'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�LQ�7UDQVDFWLRQV

,W�LV�SRVVLEOH�WKDW�XVHUV�UHFHLYH�PRUH�DXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHGPDLQWHQDQFH�ORDG��$XWKRUL]DWLRQ�FKHFNV�DUH�FRQGXFWHG�ZKHUHYHU�WKH\�DUH�ZULWWHQ�LQWR�DWUDQVDFWLRQ·V�VRXUFH�FRGH��2QO\�E\�XVLQJ�WKH�3*�FDQ�FKHFN�LQGLFDWRUV�EH�VHW�WR�H[FOXGH�< &HUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRULW\�FKHFNV< 6SHFLILF�DXWKRUL]DWLRQ�FKHFNV�LQ�VSHFLILF�WUDQVDFWLRQV< $Q�DXWKRUL]DWLRQ�REMHFW�IURP�EHLQJ�FKHFNHG

$OO�RI�WKHVH�DGMXVWPHQWV�DUH�SRVVLEOH�ZLWKRXW�DOWHULQJ�WKH�SURJUDP�FRGH��3ULRU�WRDXWRPDWLFDOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOH��XVH�WKH�FKHFN�LQGLFDWRUV�WR�FRQWURO�ZKLFKREMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�DUH�GLVSOD\HG��6$3�GHOLYHUV�D�GHIDXOW�FKHFNLQGLFDWRU�VHWWLQJ�ZLWK�5����)RU�PRUH�LQIRUPDWLRQ�UHIHU�WR�FKDSWHU�����7LSV�DQG7URXEOHVKRRWLQJ��WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�

6$3 �DQG�'',&�8VHUV

'XULQJ�\RXU�5���LQVWDOODWLRQ��FOLHQWV�����������DQG�����DUH�FUHDWHG��,Q�FOLHQWV�����DQG�����WZR�VSHFLDO�XVHUV�DUH�GHILQHG��EXW�QR�VSHFLDO�XVHU�LV�FUHDWHG�LQ�FOLHQW������6LQFH�WKHVH�XVHUVKDYH�VWDQGDUG�QDPHV�DQG�SDVVZRUGV��\RX�QHHG�WR�VHFXUH�WKHVH�XVHUV�IURP�XQDXWKRUL]HGXVDJH��WKH�(DUO\:DWFK�DQG�&3,&�XVHUV�DUH�QRW�FRYHUHG�LQ�WKLV�ERRN��

7KH�WZR�VSHFLDO�5���XVHUV�DUH�< 6$3

'HILQHG�DV�WKH�VWDQGDUG�5���VXSHUXVHU��6$3 �GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG�5DWKHU��LW�

Page 33: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Release 4.6A/B1–9

� ,V�GHILQHG�LQ�WKH�V\VWHP�FRGH� +DV�D�GHIDXOW�SDVVZRUG��PASS�� +DV�XQOLPLWHG�V\VWHP�DFFHVV�DXWKRUL]DWLRQV

:KHQ�\RX�LQVWDOO�5����D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�LQ�FOLHQWV�����DQG�����ZLWK�WKHLQLWLDO�SDVVZRUG�06071992��6$3 �XVHU�PDVWHU�UHFRUG�GHDFWLYDWHV�6$3 ªV�VSHFLDOSURSHUWLHV��7R�SUHYHQW�6$3 �PLVXVH��FKDQJH�WKH�SDVVZRUG��:H�UHFRPPHQG��KRZHYHU�WKDW�\RX�GHDFWLYDWH�6$3 �DQG�GHILQH�\RXU�RZQ�VXSHUXVHU�

< '',&

7KLV�XVHU�LV�WKH�PDLQWHQDQFH�XVHU�IRU�WKH�$%$3�'LFWLRQDU\�DQG�VRIWZDUH�ORJLVWLFV��7KHXVHU�PDVWHU�UHFRUG�IRU�'',&�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����DQG�KDV�WKHGHIDXOW�SDVVZRUG�19920706��6\VWHP�FRGH�WHVWLQJ�DOORZV�'',&�VSHFLDO�SULYLOHJHV�IRUFHUWDLQ�RSHUDWLRQV��)RU�H[DPSOH��'',&�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�GXULQJ�DQXSJUDGH��7R�SUHYHQW�'',&�PLVXVH��FKDQJH�WKH�SDVVZRUG�

8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�6$3 �DQG�'',&�SDVVZRUGV�KDYHEHHQ�FKDQJHG��7KLV�UHSRUW�LV�UHVWULFWHG�WR�XVHUV�ZKR�EHORQJ�WR�WKH�XVHU�JURXS�683(5�ZLWKDFWLYLW\����DQG�FOLHQW�DGPLQLVWUDWLRQ�

:KDW�,V�WKH�3URILOH�*HQHUDWRU"

6$3·V�3URILOH�*HQHUDWRU��3*��KHOSV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FUHDWH��JHQHUDWH��DQGDVVLJQ�DXWKRUL]DWLRQ�SURILOHV��)LUVW�UHOHDVHG�ZLWK����*��WKH�3*�DFFHOHUDWHV�5��LPSOHPHQWDWLRQ�E\�VLPSOLI\LQJ�WKH�WDVN�RI�VHWWLQJ�XS�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KHDGPLQLVWUDWRU�RQO\�QHHGV�WR�FRQILJXUH�WKH�FXVWRPHU�VSHFLILF�VHWWLQJV��WKH�3*�PDQDJHV�RWKHUWDVNV��VXFK�DV�VHOHFWLQJ�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�FRQVLGHUDWLRQ��7KH�3*�LV�IXOO\LQWHJUDWHG�ZLWK�5���DQG�LV�DYDLODEOH�RQ�DOO�5���VXSSRUWHG�SODWIRUPV��7KH�3*�UHSUHVHQWV�\HWDQRWKHU�LPSURYHPHQW�RI�6$3·V�WRRO�EDVHG�VXSSRUW�DQG�D�UHGXFWLRQ�LQ�5���LPSOHPHQWDWLRQWLPH�

7KH�3*�LV�DQ�DSSURDFK�WR�GHILQLQJ�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW��7KH�DGPLQLVWUDWRU�QRORQJHU�XVHV�WKH�DXWKRUL]DWLRQ�REMHFWV�WR�GHILQH�WKH�DXWKRUL]DWLRQV�IRU�YDULRXV�XVHU�JURXSV�LQVWHDG��DXWKRUL]DWLRQ�SURILOHV�DUH�EXLOW�DURXQG�WKH�IXQFWLRQV�WR�EH�SHUIRUPHG�LQ�5����%DVHGRQ�WKH�IXQFWLRQV�VHOHFWHG��WKH�3*�SLFNV�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�DQG�JURXSV�WKHPLQ�D�QHZ�DXWKRUL]DWLRQ�SURILOH�

8VLQJ�IXQFWLRQV�WR�GHILQH�DXWKRUL]DWLRQ�SURILOHV�< 6SHHGV�XS�WKH�SURFHVV< 'HILQHV�DXWKRUL]DWLRQ�SURILOHV< 6LPSOLILHV�DGPLQLVWUDWRU�XVHU�FRPPXQLFDWLRQ��DOORZLQJ�ERWK�WKH�DGPLQLVWUDWRU�DQG

XVHUV�WR�XVH�WKH�VDPH�5���IXQFWLRQ�WHUPLQRORJ\

7R�XVH�WKH�3*��\RX�ILUVW�KDYH�WR�VHW�LW�XS��7KH�RQH�WLPH�VHW�XS�LQYROYHV�WKH�IROORZLQJ�VWHSV��� &KHFN�LI�WKH�6$3�5���6\VWHP�SDUDPHWHU�LV�VHW�FRUUHFWO\�WR�DFWLYH�

Page 34: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Authorizations Made Easy1–10

�� 8VH�68���WR�LQLWLDOL]H�WKH�WDEOHV�862%7B&�DQG�862%;B&��DQG�WKHQ�FXVWRPL]H�WKHP�LIGHVLUHG��

)RU�GHWDLOHG�LQIRUPDWLRQ��SOHDVH�UHDG�FKDSWHU����6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU�

2QFH�WKH�3*�LV�VHW�XS��\RX�FDQ�ZRUN�ZLWK�LW��%HIRUH�ZRUNLQJ�ZLWK�ZLWK�WKH�3*��LW�LV�XVHIXO�WRXQGHUVWDQG�LWV�FRPSRQHQWV�

&RPSRQHQWV�RI�WKH�3URILOH�*HQHUDWRU

7KH�3*�KDV�WKH�IROORZLQJ�FRPSRQHQWV�

$FWLYLW\�*URXSV

$Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�5���WUDQVDFWLRQV��DXWKRUL]DWLRQV��DQG�DGGLWLRQDO�REMHFWV�<RX�FDQ�DVVLJQ�DQ�DFWLYLW\�JURXS�WR�DV�PDQ\�XVHUV�DV�\RX�ZDQW��<RX�FDQ�FUHDWH��GLVSOD\�FKDQJH��FRS\��DQG�WUDQVSRUW�DFWLYLW\�JURXSV�

&RPSRVLWH�$FWLYLW\�*URXSV

&RPSRVLWH�DFWLYLW\�JURXSV�DUH�PDGH�XS�RI�D�FROOHFWLRQ�RI�DFWLYLW\�JURXSV��7KH�XVHUV�DVVLJQHGWR�D�FRPSRVLWH�DFWLYLW\�JURXS�DUH�DXWRPDWLFDOO\�DGGHG�WR�WKH�DFWLYLW\�JURXSV�GXULQJ�DFRPSDULVRQ��&RPSRVLWH�DFWLYLW\�JURXSV�WKHPVHOYHV�GR�QRW�FRQWDLQ�DQ\�DXWKRUL]DWLRQ�GDWD�,QVWHDG�RI�KDYLQJ�WR�DVVLJQ�HDFK�XVHU�WR�HDFK�DFWLYLW\�JURXS��\RX�FDQ�VHW�XS�D�FRPSRVLWHDFWLYLW\�JURXS�DQG�WKHQ�DVVLJQ�WKH�XVHUV�WR�WKLV�JURXS�

'HULYHG�$FWLYLW\�*URXSV

<RX�FDQ�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH�ZKHQ�FUHDWLQJ�D�QHZ�RQH��7KH�V\VWHPWUDQVIHUV�WKH�WUDQVDFWLRQV�LQ�RQH�DFWLYLW\�JURXS�WR�D�QHZ�DFWLYLW\�JURXS³RQH�WKDW�UHPDLQVGHSHQGHQW�RQ�WKH�ILUVW��<RX�FDQ�GLVSOD\�WKH�KLHUDUFK\�RI�WKH�DFWLYLW\�JURXSV�WKDW�LQKHULWWUDQVDFWLRQV�IURP�HDFK�RWKHU�E\�FKRRVLQJ�$FWLYLW\�JURXS�→�:KHUH�XVHG�OLVW�

:LWK�DQ�DFWLYLW\�JURXS�GHULYHG�IURP�D�GLIIHUHQW�DFWLYLW\�JURXS��\RX�FDQQRW�HQWHUWUDQVDFWLRQV�GLUHFWO\��<RX�FDQQRW�UHVHW�WKH�GHILQLWLRQ�RI�WKH�LQLWLDO�DFWLYLW\�JURXS�IURP�ZKLFKWKH�GHULYHG�DFWLYLW\�JURXS�LQKHULWHG�LWV�WUDQVDFWLRQV��3DVVLQJ�RQ�WUDQVDFWLRQV�RQO\�UHIHUV�WRWKH�PHQX�VHOHFWLRQ�DQG�QRW�WR�WKH�DXWKRUL]DWLRQV��<RX�PXVW�PDLQWDLQ�DXWKRUL]DWLRQVVHSDUDWHO\�LQ�HDFK�DFWLYLW\�JURXS��WKHVH�DUH�QRW�SDVVHG�RQ��,W�LV�DOVR�SRVVLEOH�WR�WUDQVIHU�WKHDXWKRUL]DWLRQ�GDWD�RI�WKH�SUHYLRXV�DFWLYLW\�JURXS�WR�WKH�GHULYHG�DFWLYLW\�JURXS�DV�D�FRS\�

8VHU�$VVLJQPHQW

8VHUV�FDQ�EH�DVVLJQHG�WR�VLQJOH�DFWLYLW\�JURXSV�RU�WR�FRPSRVLWH�DFWLYLW\�JURXSV�ZKLFK�PRVWO\UHSUHVHQW�MRE�UROHV��8VHUV�WKDW�\RX�DVVLJQ�WR�DQ�DFWLYLW\�JURXS�PD\�H[HFXWH�WKH�WUDQVDFWLRQV�UHSRUWV��RU�DQ\�RWKHU�WDVN�LQ�WKH�DFWLYLW\�JURXS�ZLWK�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQV�

*HQHUDWLQJ�WKH�3URILOHV

7KH�DGPLQLVWUDWRU�FKRRVHV�WKH�VSHFLILF�PHQX�SDWKV�DQG�IXQFWLRQV�IRU�HDFK�XVHU�JURXS��7KLVVHOHFWLRQ�GHWHUPLQHV�WKH�5���DFWLYLWLHV�WKDW�XVHUV�LQ�HDFK�XVHU�JURXS�DUH�DXWKRUL]HG�WRSHUIRUP�

8VLQJ�WKH�VHOHFWHG�WUDQVDFWLRQ�FRGHV��WKH�3*�GHWHUPLQHV�WKH�DIIHFWHG�DXWKRUL]DWLRQ�REMHFWV�7R�VLPSOLI\�WKH�FUHDWLRQ�RI�VXEVHTXHQW�LQGLYLGXDO�DXWKRUL]DWLRQ�SURILOHV��5���FRQWDLQV

Page 35: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

What Is the Profile Generator?

Release 4.6A/B1–11

GHIDXOW�YDOXHV�IRU�PDQ\�DXWKRUL]DWLRQ�ILHOGV�LQ�VSHFLILF�DXWKRUL]DWLRQ�REMHFWV��)RU�H[DPSOH�RQH�SRVVLEOH�DFFHVV�UHVWULFWLRQ�PLJKW�EH�WKH�GHIDXOW�YDOXH�'LVSOD\��OLPLWLQJ�WKH�XVHU�WRGLVSOD\�PRGH�RQ�FHUWDLQ�WUDQVDFWLRQV�

$GGLWLRQDOO\��WKH�3*�LGHQWLILHV�WKH�RUJDQL]DWLRQDO�OHYHOV�WKDW�SOD\�D�UROH�LQ�WKH�H[WUDFWHGDXWKRUL]DWLRQ�REMHFWV�DQG�FOHDUO\�GLVSOD\V�WKHVH�OHYHOV�IRU�WKH�DGPLQLVWUDWRU��7KHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�PD\�KDYH�WR�LQWHUYHQH�DQG�PDQXDOO\�GHILQH�WKH�OHYHOV�WR�ZKLFKWKH�XVHUV�QHHG�DFFHVV��IRU�H[DPSOH��WKH�FRPSDQ\�FRGH��

7KH�3*�WKHQ�SODFHV�WKH�VSHFLILHG�OHYHOV�LQ�WKH�DXWKRUL]DWLRQ�REMHFWV��$W�WKLV�SRLQW��D�ORW�RIDXWKRUL]DWLRQ�REMHFW�ILHOGV�IRU�WKH�QHZ�DXWKRUL]DWLRQ�SURILOH�KDYH�EHHQ�ILOOHG��KRZHYHU�WKHUHDUH�VWLOO�ILHOGV�WKDW�QHHG�WR�EH�PDLQWDLQHG��7KH�DXWKRUL]DWLRQ�REMHFWV�DUH�GLVSOD\HGKLHUDUFKLFDOO\�LQ�D�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�DGPLQLVWUDWRU�PD\�DGMXVW�WKHUHPDLQLQJ�YDOXHV��VXFK�DV�PDWHULDO�W\SH��RUGHU�W\SH��HWF�

:LWKLQ�WKLV�PDLQWHQDQFH�WUDQVDFWLRQ��WKH�DGPLQLVWUDWRU�FDQ�HDVLO\�QDYLJDWH�IURP�WKHRYHUYLHZ�VFUHHQ�WR�WKH�ORZHVW�GLVSOD\�OHYHO��WKH�DXWKRUL]DWLRQV�DQG�WKHLU�ILHOGV��DQG�GLUHFWO\DVVLJQ�WKH�YDOXHV��*HQHUDOO\��SHUPLVVLEOH�YDOXHV�FDQ�DOVR�EH�DVVLJQHG�DW�KLJKHU�OHYHOV��7KHIROORZLQJ�XWLOLWLHV�WR�VSHFLI\�WKH�YDOXHV�DUH�DYDLODEOH�DW�HYHU\�OHYHO�RI�WKH�KLHUDUFKLFDOGLVSOD\�< 9DOXH�VHOHFWLRQ�IURP�OLVWV< &KHFNER[HV�IRU�VLPSOH�DFWLYLW\�VHOHFWLRQ< 'HOHWH�DQG�FRS\�IXQFWLRQV

,I�DGPLQLVWUDWRUV�GHWHUPLQH�WKDW�QR�IXUWKHU�DXWKRUL]DWLRQ�UHVWULFWLRQV�DUH�QHFHVVDU\�RQ�DFHUWDLQ�OHYHO��E\�FKRRVLQJ�D�EXWWRQ��WKH�3*�ILOOV�LQ�WKH�UHPDLQLQJ�YDOXHV�

)LQDOO\��DQRWKHU�PHQX�LWHP�LQ�WKH�V\VWHP�DVVLJQV�WKH�XVHUV�WR�WKH�5���IXQFWLRQV��,Q�WKLVSURFHVV��WKH�3*�DXWRPDWLFDOO\�FRSLHV�DOO�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOHV�WR�WKH�XVHUPDVWHU�UHFRUG��2I�FRXUVH��XVHUV�FDQ�EH�DVVLJQHG�PXOWLSOH�VHOHFWLRQV��ZKLFK�PHDQV�WKDWFHUWDLQ�JHQHUDO�DXWKRUL]DWLRQV�QHHG�WR�EH�PDLQWDLQHG�RQO\�RQFH�DQG�DUH�DYDLODEOH�IRUDVVLJQPHQW�WR�DOO�V\VWHP�XVHUV�

,QWHJUDWLQJ�WKH�3*�LQ�5���DOVR�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�DFFHVV�WKH�GRFXPHQWDWLRQ�RQHYHU\�DXWKRUL]DWLRQ�REMHFW�GLUHFWO\�IURP�WKH�3*��)XUWKHUPRUH��WKH�3*�FDQ�OLVW�DOO�5��IXQFWLRQV�WKDW�FKHFN�D�VSHFLILF�DXWKRUL]DWLRQ�

5HTXLUHPHQWV�DQG�$YDLODELOLW\7KH�3*�UXQV�RQ�DOO�VXSSRUWHG�SODWIRUPV�DQG�KDV�EHHQ�DYDLODEOH�VLQFH�5HOHDVH����*�IRUJHQHUDO�FXVWRPHU�XVH��6WDUWLQJ�ZLWK�5HOHDVH������LW�LV�DOUHDG\�DFWLYDWHG�IRU�XVH�

Page 36: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

What Is an Activity Group?

Authorizations Made Easy1–12

:KDW�,V�DQ�$FWLYLW\�*URXS"

7KH�SURFHVV�RI�VHFXULW\�LPSOHPHQWDWLRQ�ZLWK�WKH�3*�LV�EDVHG�RQ�WKH�FUHDWLRQ�RI�DFWLYLW\JURXSV�RU�D�FROOHFWLRQ�RI�OLQNHG�RU�DVVRFLDWHG�DFWLYLWLHV��VXFK�DV�WDVNV��UHSRUWV��DQGWUDQVDFWLRQV��$Q�DFWLYLW\�JURXS�LV�D�´GDWD�FRQWDLQHUµ�IRU�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQSURILOHV�DQG�XVXDOO\�UHSUHVHQWV�D�MRE�UROH�LQ�\RXU�FRPSDQ\���+RZHYHU��FXVWRPHUV�RIWHQGHILQH�DFWLYLW\�JURXSV�VRPHZKDW�GLIIHUHQWO\��$V�VXFK��WKHUH�LV�QR�RQH�FRQFUHWH�GHILQLWLRQ�RIDQ�DFWLYLW\�JURXS��RWKHU�WKDQ�LW�LV�D�GDWD�FRQWDLQHU�IRU�DXWKRUL]DWLRQV��

$FWLYLW\�JURXSV�DUH�GHILQHG�E\�WKH�FXVWRPHU�SHUIRUPLQJ�WKH�LPSOHPHQWDWLRQ�DQG�DOORZV\VWHPDWLF�RUJDQL]DWLRQ�DQG�HIILFLHQW�PDLQWHQDQFH�RI�V\VWHP�DFWLYLWLHV�

7KH�6$3�%XVLQHVV�:RUNIORZ��3HUVRQQHO�3ODQQLQJ�DQG�'HYHORSPHQW�DV�ZHOO�DV�WKH�5HSRUW:ULWHU�DQG�RWKHU�UHSRUWLQJ�WRROV�DUH�WLJKWO\�OLQNHG�ZLWK�WKH�3*��6$3�%XVLQHVV�:RUNIORZLQFOXGHV�ZRUNIORZ�WDVNV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS��8VHUV�DVVLJQHG�ZLWK�DFFHVVWR�D�SDUWLFXODU�DFWLYLW\�JURXS�UHDOO\�FRPH�IURP�WKH�+5�3HUVRQQHO�3ODQQLQJ�DQG'HYHORSPHQW�IXQFWLRQDOLW\��)XUWKHUPRUH��WKH�SODQ�YHUVLRQ�WKDW�LV�XVHG�LQ�+5�3HUVRQQHO3ODQQLQJ�DQG�'HYHORSPHQW�LV�WKH�VDPH�SODQ�YHUVLRQ�XVHG�E\�WKH�3*�DQG�:RUNIORZ�

8VLQJ�DQ�DFWLYLW\�JURXS�DV�DQ�LQIRUPDWLRQ�GDWDEDVH�UHGXFHV�GDWD�HQWU\�WLPH��6HOHFW�WKHFULWHULD��VXFK�DV�DFFHVV�ULJKWV��DQG�GLYLGH�WKH�DFWLYLWLHV�LQWR�DSSURSULDWH�JURXSV��)RU�H[DPSOH�\RX�FRXOG�GHFLGH�WR�JURXS�DFWLYLWLHV�E\�VXEMHFW�PDWWHU��VXFK�DV�SHUVRQQHO��SD\UROO��RUEXGJHWLQJ��2U��\RX�FRXOG�JURXS�DFWLYLWLHV�E\�MRE�FODVVHV��VXFK�DV�WUDQVODWLRQ�DFWLYLWLHV�FRPSXWHU�SURJUDPPHU�DFWLYLWLHV��RU�VHFUHWDULDO�DFWLYLWLHV��<RX�FRXOG�DOVR�VHW�XS�DFRPELQDWLRQ�RI�VXEMHFW�PDWWHU�DQG�MRE�RULHQWHG�DFWLYLW\�JURXSV��$IWHU�VHWWLQJ�XS�DFWLYLW\JURXSV��\RX�FDQ�DVVLJQ�WKHP�WR�YDULRXV�5���REMHFWV�

$FWLYLW\�*URXS�$VVLJQPHQWV

$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�PDQ\�XVHUV��2QH�XVHU�FDQ�DOVR�EH�DVVLJQHG�WR�PDQ\DFWLYLW\�JURXSV�

$Q�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�WKH�IROORZLQJ�W\SHV�RI�XVHUV�

5���ORJLQ�XVHU�,'V

$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�UHFRJQL]HG�E\�WKH�5���6\VWHP�DQG�LV�DOORZHG�WR�ORJ�RQ�)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�RIWKH�%DVLV�FRPSRQHQW�

-REV

$�MRE�UHSUHVHQWV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF��0DQ\�HPSOR\HHV�LQ�\RXU�FRPSDQ\�PD\�KROG�WKHVDPH�MRE�FODVVLILFDWLRQ���)RU�H[DPSOH��WKHUH�PLJKW�EH����SHRSOH�ZKRVH�MRE�LV�DGPLQLVWUDWLYHDVVLVWDQW���3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKDW�MRE��8QOHVV�WKH�DFWLYLW\JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKH�ULJKWV�QHHGHG�WR�ZRUN�ZLWK�6$3RIILFH��EHFDUHIXO�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV�

Page 37: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

What Is an Activity Group?

Release 4.6A/B1–13

3RVLWLRQV

$�SRVLWLRQ�UHSUHVHQWV�DQ�HPSOR\HH·V�XQLTXH��LQGLYLGXDO�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWKMREV��<RX�FDQ�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DQ�DOPRVW�FRPSOHWHO\�SRVLWLRQ�RULHQWHGIDVKLRQ��$OO�WKH�DFFHVV�ULJKWV�DUH�WKHQ�OLQNHG�WR�WKH�SRVLWLRQ��VR�LW�GRHV�QRW�PDWWHU�ZKR�ILOOVWKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��DQG�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG��WKHDXWKRUL]DWLRQ�SURILOH�DXWRPDWLFDOO\�FKDQJHV�

2UJDQL]DWLRQDO�XQLWV

2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�DQ\�RUJDQL]DWLRQDO�HQWLW\�WKDW�SHUIRUPV�D�VSHFLILHG�VHW�RIIXQFWLRQV�ZLWKLQ�D�FRPSDQ\��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV�GLYLVLRQV��GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDOVWUXFWXUH�DW�\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSVDPRQJ�WKH�XQLWV��$Q\RQH�ZKR�LV�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWVWKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�RUJDQL]DWLRQDO�XQLW�

([DPSOHV�RI�XQLWV�LQFOXGH�< 6XEVLGLDULHV< 'LYLVLRQV< 'HSDUWPHQWV< *URXSV< 6SHFLDO�SURMHFW�WHDPV

8QOHVV�WKH�DFWLYLW\�JURXSV�JUDQWV�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��EH�FDUHIXO�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�RUJDQL]DWLRQDO�XQLWV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WREH�IDLUO\�VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�LWV�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��:KHQ�H[FHSWLRQV�RFFXU�IRU�MREV�RUSRVLWLRQV��FUHDWH�DGGLWLRQDO�DFWLYLW\�JURXSV�IRU�WKHP��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RUSRVLWLRQ��LW�PD\�EH�EHVW�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�MREV�RU�SRVLWLRQV�FRQFHUQHG��%\FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�EHWZHHQ�WKH�XQLWV��\RXLGHQWLI\�\RXU�FRPSDQ\·V�RUJDQL]DWLRQDO�VWUXFWXUH�

:KDW�,V�D�8VHU�5ROH�7HPSODWH"

8VHU�UROH�WHPSODWHV�DUH�DFWLYLW\�JURXSV�LQ�WKH�VWDQGDUG�5���6\VWHP��GHOLYHUHG�E\�6$3��WKDWDOUHDG\�FRQWDLQ�WUDQVDFWLRQV�DQG�UHSRUWV�IURP�DOO�DSSOLFDWLRQ�DUHDV��7KHVH�XVHU�UROHWHPSODWHV�DUH�UHDG\�WR�XVH��<RX�KDYH�WKH�RSWLRQ�WR�XVH�D�XVHU�UROH�WHPSODWH�DV�LV�RU�FRS\�DQGFKDQJH�LW�WR�\RXU�QHHGV��,I�XVHUV�DUH�DVVLJQHG�WR�D�MRE�UROH�DQG�WKH\�ORJ�RQ�WR�WKH�V\VWHP�WKH\�RQO\�VHH�WKRVH�WDVNV�WKH\�DUH�DOORZHG�WR�SHUIRUP�

Page 38: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

R/3 Tools for Security Implementation

Authorizations Made Easy1–14

5���7RROV�IRU�6HFXULW\�,PSOHPHQWDWLRQ

,QIRUPDWLRQ�6RXUFH /RFDWLRQ

2YHUYLHZ�RI�LPSRUWDQW�6$31HW�¥�5��)URQWHQG�QRWHV��IRUPHUO\�266�

$SSHQGL[�$

)UHTXHQWO\�DVNHG�TXHVWLRQV��)$4� $SSHQGL[�%

2YHUYLHZ�RI�V\VWHP�SURILOH�SDUDPHWHUV $SSHQGL[�&

/LEUDU\�2QOLQH�'RFXPHQWDWLRQ &KRRVH�+HOS�→�5���OLEUDU\�→�%DVLV�→�&RPSXWHU�&HQWHU0DQDJHPHQW�6\VWHP�→��8VHUV�DQG�$XWKRUL]DWLRQV

5HOHDVH�,QIRUPDWLRQ &KRRVH�+HOS�→�5HOHDVH�QRWHV�

5���6HFXULW\�*XLGH 1RWH������

5HSRUW�'RFXPHQWDWLRQ 5HSRUW�GRFXPHQWDWLRQ�FDQ�EH�DFFHVVHG�IURP�WKH�VHOHFWLRQVFUHHQ�E\�HLWKHU�FKRRVLQJ�+HOS�→�([WHQGHG�+HOS�RU�6\VWHP�→6HUYLFHV�→�5HSRUWLQJ��HQWHULQJ�WKH�UHSRUW�QDPH��DQG�WKHQVHOHFWLQJ�*RWR�→�'RFXPHQWDWLRQ�

7UDLQLQJ�FRXUVHV 6HH�6$31HW�IRU�FXUUHQW�FRXUVHV��KWWS���ZZZ�VDS�FRP

�*ORVVDU\&KRRVH�+HOS�→�5���OLEUDU\�→�*ORVVDU\�IRU�WKH�HQWLUH�JORVVDU\�RUFKRRVH�+HOS�→�*ORVVDU\�IRU�D�FRQWH[W�VHQVLWLYH�JORVVDU\�

�&RQWH[W�6HQVLWLYH�+HOS0RYH�WKH�FXUVRU�WR�D�ILHOG�RU�WR�D�V\VWHP�PHVVDJH�DQGSUHVV�)��

�.QRZOHGJH�3URGXFWV1RWH������

�$%$3�:RUNEHQFK�'RFXVHW1RWH������

�6$31HW

6$31HW�LV�DQ�LQWHUQHW�VHUYLFH�WKDW�EULQJV�QHZ�LQIRUPDWLRQ�DQGFRPPXQLFDWLRQ�FKDQQHOV�EHWZHHQ�6$3�DQG�LWV�FXVWRPHUV��/RJRQ�E\�HQWHULQJ��KWWS���ZZZ�VDS�FRP��RQ�DQ�LQWHUQHW�EURZVHU�DQGFOLFN�WKH�3DUWQHU�&XVWRPHU�EXWWRQ��&OLFN�)UHTXHQW�XVHUV�DQG�HQWHU\RXU�6$31HW�¥�5���)URQWHQG�QRWH��IRUPHUO\�266��SDVVZRUG�

��6$3�/DEV��6LPSOLILFDWLRQ*URXS

6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�KWWS���ZZZ�VDSODEV�FRP�DXWK�IRUXSGDWHV��EHWD�UHOHDVHV�RI�QHZ�JXLGHERRNV��DGGLWLRQDOLQIRUPDWLRQ��SUHGHILQHG�DFWLYLW\�JURXSV��JXLGHERRNV�IRUSUHYLRXV�UHOHDVHV��HWF�

�$FFHOHUDWHG6$3�5RDGPDS�$6$3�

7KH�$6$3�,PSOHPHQWDWLRQ�5RDGPDS�UHFRPPHQGV�XVLQJ�WKH3*�LQ�LWV�DXWKRUL]DWLRQ�GHVLJQ�SURSRVDO��<RX�FDQ�DOVR�ILQG�OLQNVWR�WKLV�JXLGHERRN�IURP�GLIIHUHQW�ORFDWLRQV�LQ�WKH�URDGPDSVWUXFWXUH��,QVLGH�$6$3��FKRRVH�,PSOHPHQWDWLRQ�5RDGPDS�→3KDVH����5HDOL]DWLRQ�→�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�

Page 39: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Release 4.6A/B1–15

&DVH�6WXG\��6HFXULW\�6WUDWHJ\�LQ�D�7KUHH�6\VWHP

(QYLURQPHQW

'HYHORSPHQW�6\VWHP��'(9�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

'(9�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

:KHQ�WKH�GHYHORSPHQW�V\VWHP��'(9��LV�ILUVW�LQVWDOOHG��SURMHFW�PHPEHUV�LQFOXGLQJFRQILJXUDWRUV��GHYHORSHUV��V\VWHP�DGPLQLVWUDWRUV��DQG�UHFHQW�WUDLQHHV�FRPSULVH�WKH�EXON�RI5���XVHUV��6$3�UHFRPPHQGV�WKH�XVH�RI�MRE�UROH�WHPSODWHV��$V�WKH�5���SURMHFW�SURJUHVVHV�WKH�QHHG�WR�OLPLW�XVHU�DFFHVV�LQFUHDVHV��,Q�JHQHUDO��'(9�V\VWHP�XVHUV�KDYH�PRUH�DFFHVV�WKDQTXDOLW\�DVVXUDQFH���4$6��RU�SURGXFWLRQ���35'��V\VWHP�XVHUV�

$V�FRQILJXUDWLRQ�LV�GRQH�LQ�'(9�\RX�FDQ�QRZ�XVH�WKH�QHZ�IXQFWLRQDOLW\�RI�FXVWRPL]LQJDFWLYLW\�JURXSV�WR�HQVXUH�WKDW�SHRSOH�DUH�FRQILJXULQJ�RQO\�WKHLU�RZQ�SDUW�RI�WKH�V\VWHP��3OHDVH�UHDG�FKDSWHU���IRU�GHWDLOHG�LQIRUPDWLRQ�RQ�FXVWRPL]LQJ�DXWKRUL]DWLRQV��

7UHDW�VXSHUXVHU�DFFRXQWV�OLNH�´URRWµ�LQ�81,;��7KH��<RXU&RPSDQ\!B$//�SURILOH�OLPLWV�ULVNRQ�WKH�'(9�V\VWHP��6\VWHP�PDOIXQFWLRQV�GXH�WR�H[FHVVLYH�DFFHVV�FDQ�DOVR�FDXVH�SURMHFWGHYHORSPHQW�GHOD\V�

<RX�QRZ�FRQWURO�ZKR�FUHDWHV�DQG�PDLQWDLQV�< 8VHUV< 3URILOHV< $XWKRUL]DWLRQV

<RX�DOVR�HOLPLQDWH�DWWHPSWV�WR�< /RFN�WUDQVDFWLRQV< 'HOHWH�XVHU�VHVVLRQV< 6WRS�ZRUN�SURFHVVHV

7KLV�FRQWURO�PDLQWDLQV�WKH�V\VWHP·V�LQWHJULW\�DQG�VWDELOLW\��8VLQJ�WKH�3*��WKH�DXWKRUL]DWLRQDGPLQLVWUDWRU�GHYHORSV�HQG�XVHU�SURILOHV�DQG�DXWKRUL]DWLRQV�LQ�WKH�'(9�V\VWHP��7KHVHSURILOHV�DQG�DXWKRUL]DWLRQV�ZLOO�EH�WUDQVSRUWHG�WR�WKH�4$6�V\VWHP�IRU�ILQDO�WHVWLQJ�EHIRUHPRYLQJ�WR�35'��7KH�HQG�XVHU�PDVWHU�UHFRUGV�DUH�XVXDOO\�FUHDWHG�LQ�35'�FORVHU�WR�WKH�JR�OLYHGDWH��7KH�DFWLYLW\�JURXSV��WRJHWKHU�ZLWK�WKH�WUDQVSRUWHG�DXWKRUL]DWLRQ�GDWD��DUH�DVVLJQHG�WRWKH�HQG�XVHUV�DV�UHTXLUHG�LQ�35'��:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV

Page 40: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Authorizations Made Easy1–16

WKH�DXWKRUL]DWLRQ�SURILOHV��7KHVH�SURILOHV�GR�QRW�QHHG�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�LI�XVHUV�DUH�DOUHDG\�DVVLJQHG��6HH�FKDSWHU���IRU�PRUH�LQIRUPDWLRQDERXW�WUDQVSRUWLQJ�

0DLQWDLQLQJ�GRFXPHQWDWLRQ�LV�DOVR�LPSRUWDQW�EHFDXVH�LW�< +HOSV�IXWXUH�SURMHFW�UROORXWV�SURFHHG�VPRRWKO\< ,V�HVVHQWLDO�WR�SDVV�VHFXULW\�DGPLQLVWUDWLYH�IXQFWLRQV�WR�RWKHU�SURMHFW�PHPEHUV< ,V�UHTXLUHG�E\�DXGLWRUV

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�FOLHQW�FRS\�DGPLQLVWUDWRUV�:KHQ�QHZ�FOLHQWV�DUH�FUHDWHG��DFWLYLW\�JURXSV�DUH�QRW�DXWRPDWLFDOO\�FRSLHG��6LQFH�XVHUV�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�DUH�DOO�FOLHQW�GHSHQGHQW��WKH�FOLHQWFRS\�DGPLQLVWUDWRU�DOVR�QHHGV�WR�NQRZ�ZKLFK�XVHU�PDVWHU�UHFRUGV�WR�FRS\��6HH�FKDSWHU���IRUPRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�DOVR�ZRUN�FORVHO\�ZLWK�WKRVH�LQ�\RXU�FRPSDQ\�WKDWIXQFWLRQ�DV�FKDQJH�PDQDJHPHQW�DGPLQLVWUDWRUV��%RWK�DGPLQLVWUDWRUV�DUH�LPSRUWDQW�SURMHFWFRQWURO�SRLQWV��7KH�V\VWHP�ODQGVFDSH��FOLHQW�ODQGVFDSH��DQG�FOLHQW�UROHV�VKRXOG�EH�FOHDUO\GHILQHG�DQG�SUHVHQWHG�WR�WKH�SURMHFW�WHDP��'HYHORSPHQW�FODVVHV�DQG�DXWKRUL]DWLRQ�JURXSVVKRXOG�EH�HVWDEOLVKHG�IRU�DOO�QHZ�GHYHORSPHQW��$OO�DGPLQLVWUDWRUV�VKRXOG�FRPSOHWHDSSURSULDWH�6$3·V�WUDLQLQJ�FRXUVHV�IRU�WKH�DXWKRUL]DWLRQ�HQYLURQPHQW�WKH\�DUH�WU\LQJ�WR�VHWXS��:H�UHFRPPHQG�WKDW�\RX�DWWHQG�FRXUVHV�DQG�ZRUNVKRSV�LPPHGLDWHO\�DIWHU�WKH�LQLWLDOLQVWDOODWLRQ�RI�\RXU�5���6\VWHP�

1H[W��WKHVH�DGPLQLVWUDWRUV�VKRXOG�FRQGXFW�D�SURMHFW�VSHFLILF�ZRUNVKRS�WR�ERWK�UHYLHZ�WKHV\VWHP�DQG�FOLHQW�ODQGVFDSH��DQG�GLVFXVV�WKH�IROORZLQJ�FRQWURO�SRLQWV�< :KHQ�GHYHORSPHQW�UHTXHVWV�ZLOO�PRYH< 7R�ZKLFK�FOLHQWV�WKHVH�UHTXHVWV�ZLOO�PRYH< :KRVH�VLJQDWXUHV�ZLOO�EH�UHTXLUHG�DORQJ�WKH�ZD\

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�ZRUN�FORVHO\�ZLWK�WKH�GHYHORSHUV�WR�HQIRUFH�VHFXULW\VWDQGDUGV�IRU�QHZ�$%$3�SURJUDPV�DQG�WUDQVDFWLRQV��ZKLFK�FDQ�EH�HQIRUFHG�WKURXJK&KDQJH�0DQDJHPHQW��$OO�QHZ�FXVWRPHU�ZULWWHQ�FRGHV�VKRXOG�EH�DVVLJQHG�WR�DQDXWKRUL]DWLRQ�JURXS��ZLWK�WUDQVDFWLRQ�6(���DQG�6(����WKH�$%$3�HGLWRU�DWWULEXWHV�VFUHHQ�8QSURWHFWHG�FXVWRPHU�ZULWWHQ�SURJUDPV�DQG�WUDQVDFWLRQV�LQ�35'�DOZD\V�SUHVHQW�SUREOHPV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�LQYROYH�WKH�FRUSRUDWH�DXGLWRUV�DW�WKLV�MXQFWXUH�

:H�UHFRPPHQG�LQYROYLQJ�WKH�FRUSRUDWH�DXGLWRUV�XS�IURQW�VR�WKHLU�UHTXLUHPHQWV�DUHLQFRUSRUDWHG�LQ�WKH�GHYHORSPHQW�HIIRUWV��,W�LV�DOZD\V�XQSOHDVDQW�WR�DXGLW�SRVW�OLYHSURMHFWV��,Q�WKH�ZRUVW�FDVH�VFHQDULR��SURMHFWV�VKRXOG�EH�KDOWHG�XQWLO�DXGLWRU�UHTXLUHPHQWVDUH�PHW��DQG�DW�D�PLQLPXP��DOO�RI�WKH�RULJLQDO�GHYHORSPHQW�ZRUN�PD\�KDYH�WR�EH�UHYLVHG�

Page 41: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Release 4.6A/B1–17

4XDOLW\�$VVXUDQFH�6\VWHP��4$6�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

4$6�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

:KHQ�WKH�4$6�V\VWHP�DQG�FOLHQW�DUH�FUHDWHG��WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�FDQ�VWDUWWUDQVSRUWLQJ�WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP��WDEOH�862%;B&��WHPSODWHV�DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��IURP�WKH�'(9�V\VWHP�WR�WKH�4$6�V\VWHP�VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$XWKRUL]DWLRQ�SURILOHV�IRU�LPSRUWHG�DFWLYLW\�JURXSV�QRORQJHU�QHHG�WR�EH�UHJHQHUDWHG��VLQFH�WKH�V\VWHP�FDQ�GR�WKLV�DXWRPDWLFDOO\�QRZ��%HIRUHPRYLQJ�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�GDWD�WR�35'��D�ILQDO�WHVWLQJ�SODQ�VKRXOG�EHSURGXFHG�

)RU�H[DPSOH��DQ�),�SURMHFW�WHDP�PHPEHU�PD\�XVH�D�VDPSOH�DFFRXQWV�SD\DEOH�XVHU�,'�WR�< &RQILUP�WKDW�WKH�XVHU�KDV�DFFHVV�WR�WKH�VSHFLILF�WUDQVDFWLRQV�JRYHUQHG�E\�HDFK�DFWLYLW\

JURXS�WR�ZKLFK�WKH�XVHU�LV�DVVLJQHG�< (QVXUH�WKDW�WKHVH�WUDQVDFWLRQV�PDWFK�WKH�FRPSDQ\�GHILQHG�UROH�IRU�DFFRXQWV�SD\DEOH�< 9HULI\�WKDW�WKH�VDPSOH�XVHU�,'�GRHV�QRW�KDYH�DFFHVV�WR�XQDXWKRUL]HG�WUDQVDFWLRQV�

6RPH�VLWHV�FRQGXFW�D�GD\�LQ�WKH�OLIH�WHVW�DV�SDUW�RI�WKHLU�JR�OLYH�SODQ��ZKHUH�HQG�XVHUV�ORJ�RQWR�D�SUHSURGXFWLRQ�HQYLURQPHQW�DQG�VLPXODWH�UHDO�SURGXFWLRQ��7KLV�SURFHVV�LV�DQ�H[FHOOHQWZD\�RI�WHVWLQJ�WKH�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�

7UDLQLQJ�&OLHQW�6\VWHP��75*�

:KLOH�PDQ\�FXVWRPHUV�GR�QRW�SXW�WKHLU�WUDLQLQJ�HQYLURQPHQW�RQ�DQRWKHU�V\VWHP�HQWLUHO\�PDQ\�GR��<RX�QHHG�WR�VHW�XS�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WKH�WUDLQLQJ�V\VWHP�DV�ZHOO�7KH�DSSURSULDWH�DXWKRUL]DWLRQ�VHWXS�FDQQRW�EH�GHWHUPLQHG�ZLWKRXW�ILUVW�NQRZLQJ�IURPZKHUH�WKH�GDWD�WKDW�DSSHDUV�LQ�WKH�WUDLQLQJ�V\VWHP�FRPHV�IURP��RU�KRZ�WKH�V\VWHP�DQGWUDLQLQJ�FOLHQW�ZHUH�FUHDWHG���)RU�H[DPSOH��LI�WKH�WUDLQLQJ�V\VWHP�LV�D�FRS\�RI�WKH�SURGXFWLRQHQYLURQPHQW�RU�D�FRS\�RI�WKH�FOLHQW�ZKHUH�FRQYHUVLRQV�DQG�LQWHUIDFHV�ZHUH�LQLWLDOO\�WHVWHG��LWPD\�EH�SRVVLEOH�WKDW�WKH�WUDLQLQJ�V\VWHP�FRQWDLQV�VHQVLWLYH�LQIRUPDWLRQ�VXFK�DV�VRFLDOVHFXULW\�QXPEHUV��FRQYHUWHG�SD\UROO�LQIRUPDWLRQ��DGGUHVVHV��HWF�

Page 42: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Case Study: Security Strategy in a Three-System Environment

Authorizations Made Easy1–18

3URGXFWLRQ�6\VWHP��35'�

R/3R/3

SAP

R/3R/3

SAP

R/3R/3

SAP

'(9 4$6 35'

35'�6\VWHP�LQ�D�7KUHH�6\VWHP�(QYLURQPHQW

2QFH�WKH�DFWLYLW\�JURXSV�DQG�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�IXOO\�WHVWHG�LQ�4$6��DQG�HQGXVHU�DQG�SURMHFW�WHDP�DSSURYDO�KDV�EHHQ�SURYLGHG��WKH�FRPSRQHQWV�RI�WKH�DXWKRUL]DWLRQV\VWHP��WDEOH�862%;B&��WHPSODWHV��DFWLYLW\�JURXSV�DQG�FRPSRVLWHV�DFWLYLW\�JURXSV��DUHPRYHG�WR�35'��VHH�FKDSWHU���RQ�KRZ�WR�WUDQVSRUW���$FWXDO�HQG�XVHU�,'V�FDQ�EH�FUHDWHG��$IRUP�WKDW�LQFOXGHV�DOO�RI�WKH�SHUWLQHQW�LQIRUPDWLRQ�IRU�XVHU�,'�FUHDWLRQ��DORQJ�ZLWK�WKHSURSHU�VLJQDWXUHV��LV�GHYHORSHG�DQG�GLVWULEXWHG�WR�WKH�GHSDUWPHQWV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�EH�D�SDUW�RI�WKH�JR�OLYH�SODQ��7KH�ILUVW�GD\V�RI�JRLQJ�OLYH�DUH�KHFWLF��DQG�WKHUH�VKRXOG�EH�D�SURFHGXUH�WR�UHSRUW�DFFHVV�SUREOHPV�LQ�SURGXFWLRQ��7KHKHOS�GHVN�LV�D�JRRG�IRFDO�SRLQW��:KHQ�XVHUV�KDYH�DFFHVV�SUREOHPV��IRU�H[DPSOH��ZKHQ�XVHUVVHH�WKH�PHVVDJH��1R�DXWKRUL]DWLRQ�IRU�WUDQVDFWLRQ�;;;;���WKH\�VKRXOG�H[HFXWH�WUDQVDFWLRQ68���WR�REWDLQ�WKH�DXWKRUL]DWLRQ�UHTXLUHG�IRU�WKLV�WUDQVDFWLRQ���5HPHPEHU��VLQFH����+�WUDQVDFWLRQ�68���LV�DOVR�SURWHFWHG�E\�REMHFW�6B7&2'(��6HH�FKDSWHU����,QVHUWLQJ�0LVVLQJ$XWKRUL]DWLRQV��IRU�PRUH�GHWDLOV���$�VFUHHQ�SULQW�VKRXOG�EH�VHQW�WR�WKH�KHOS�GHVN�DQG�WKHDXWKRUL]DWLRQ�DGPLQLVWUDWRU�IRU�HYDOXDWLRQ��2QFH�WKH�DSSOLFDWLRQ�DUHD�RZQHU�DSSURYHV�WKHDGGLWLRQDO�DFFHVV��LW�LV�DVVLJQHG�WR�WKH�XVHU��$GGLWLRQDO�DFFHVV�PHDQV�WKDW�WKH�DFWLYLW\�JURXSVPLJKW�EH�FKDQJHG�RU�WKDW�D�PLVVLQJ�DXWKRUL]DWLRQ�REMHFW�PD\�QHHG�WR�EH�PDQXDOO\�LQVHUWHGLQ�WKH�DXWKRUL]DWLRQ�SURILOHV�

7KH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VKRXOG�VWDUW�SODQQLQJ�IRU�RWKHU�SURMHFW�SKDVHV��7KLV�PD\LQFOXGH�RWKHU�UROORXWV�WR�GLIIHUHQW�ORFDWLRQV��GLIIHUHQW�SODQWV��GLIIHUHQW�PRGXOHV��RU�5��XSJUDGHV��$OO�RI�WKHVH�UROORXWV�VKRXOG�LQYROYH�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�

Page 43: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Setting Up the Authorization Administrators

Release 4.6A/B1–19

6HWWLQJ�8S�WKH�$XWKRUL]DWLRQ�$GPLQLVWUDWRUV

:H�UHFRPPHQG�\RX�GLYLGH�WKH�V\VWHP�DGPLQLVWUDWLRQ�WDVNV��DV�VKRZQ�LQ�WKH�JUDSKLF�EHORZ�WR�HQVXUH�JUHDWHU�V\VWHP�VHFXULW\��)RU�FRPSDQLHV�WKDW�KDYH�VHYHUDO�SHRSOH�GHYRWHG�WR�WKHDXWKRUL]DWLRQV�FRPSRQHQW�RI�5����WKLV�GLYLVLRQ�PDNHV�JRRG�VHQVH��6$3�VXSSRUWV�WKLVDSSURDFK�ZLWK�WKH�XVHU�UROH�WHPSODWHV�IRU�WKHVH�DGPLQLVWUDWRUV��,Q�WKH�VWDQGDUG�5���6\VWHP\RX�FDQ�ILQG�WKH�IROORZLQJ�WHPSODWHV�

$GPLQLVWUDWRU 8VHU�5ROH�7HPSODWH

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU 6$3B%&B$87+B'$7$B$'0,1B$*

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU 6$3B%&B$87+B352),/(B$'0,1B$*

8VHU�$GPLQLVWUDWRU 6$3B%&B86(5B$'0,1B$*

6XSHU�8VHU

8VHU�$GPLQLVWUDWRU

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU

- Maintain user master records - Assign activity groups to users - Assign profiles to users (T ONLY) - Display auth. and profiles - Call user information system

- Maintain activity groups - Within activity groups: - Change authorizations (T ONLY) - Generate profiles (T ONLY) - Execute transaction information- Call user information system

- Maintain activity groups - Within activity groups: -Change transaction selection - Change authorization data- Call user information system

SAP

Organizing Authorization Administration

)RU�FRPSDQLHV�ZLWK�YHU\�IHZ�SHRSOH�LQYROYHG�LQ�VHWWLQJ�XS�DQG�PDLQWDLQLQJ�DXWKRUL]DWLRQV�GLYLGLQJ�XS�VXFK�WDVNV�FRPSOLFDWHV�WKH�SURFHVV�RI�FUHDWLQJ�DQG�PDLQWDLQLQJ�WKHDXWKRUL]DWLRQV�FRPSRQHQW��<RX�VKRXOG�DOVR�GHFLGH�ZKHWKHU�PDLQWHQDQFH�RI�XVHUV��DFWLYLW\JURXSV��DXWKRUL]DWLRQ�SURILOH��DQG�DXWKRUL]DWLRQV�VKRXOG�EH�FHQWUDOL]HG�RU�GHFHQWUDOL]HG��:HUHFRPPHQG�FHQWUDOL]LQJ�PDLQWHQDQFH�XQWLO�\RXU�JR�OLYH�GDWH�DQG�ILUVW�UROORXW��&HQWUDOL]HGDGPLQLVWUDWRUV�KDYH�D�EHWWHU�XQGHUVWDQGLQJ�RI�ZKDW�LV�LQYROYHG�LQ�D�UROORXW��DQG�FHQWUDOL]LQJWKH�DGPLQLVWUDWLYH�WDVNV�HVWDEOLVKHV�QDPLQJ�VWDQGDUGV��%\�WKH�ILUVW�UROORXW��DOO�DGPLQLVWUDWLYHIXQFWLRQV�VKRXOG�EH�GRFXPHQWHG�DQG�FDQ�WKHQ�EH�GHFHQWUDOL]HG�

Page 44: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Setting Up the Authorization Administrators

Authorizations Made Easy1–20

&RQYHUVHO\��ZKHQ�WKH�DGPLQLVWUDWLYH�IXQFWLRQV�DUH�GHFHQWUDOL]HG�XS�IURQW��DGPLQLVWUDWRUVXVH�GLIIHUHQW�QDPLQJ�VWDQGDUGV�IRU�WKHLU�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ�SURILOHV��DQGDXWKRUL]DWLRQV��DQG�GLIIHUHQW�DSSURDFKHV�WR�LPSOHPHQWLQJ�VHFXULW\��,I�HDFK�DGPLQLVWUDWRUFUHDWHV�KLV�RU�KHU�RZQ�VWDQGDUGV��HYHU\WKLQJ�KDV�WR�EH�UHQDPHG�RQFH�WKH�DXWKRUL]DWLRQLPSOHPHQWDWLRQ�LV�VWDQGDUGL]HG�

7KH�VXSHUXVHU�VHWV�XS�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�IRU�DGPLQLVWUDWRUV�LQD�GHSDUWPHQW��D�FRVW�FHQWHU��DQG�RWKHU�RUJDQL]DWLRQDO�XQLWV��:LWKLQ�DQ�DUHD��DGPLQLVWUDWLYHWDVNV�DUH�GLYLGHG�EHWZHHQ�WKH�XVHU�DGPLQLVWUDWRU��DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU��DQGDXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU��7KH�IROORZLQJ�LV�D�OLVW�RI�HDFK�DGPLQLVWUDWRU·V�WDVNV�DQGUHVSRQVLELOLWLHV�< 8VHU�$GPLQLVWUDWRU

� &UHDWLQJ�DQG�FKDQJLQJ�XVHUV� $VVLJQLQJ�XVHUV�WR�DFWLYLW\�JURXSV� $VVLJQLQJ�SURILOHV�EHJLQQLQJ�ZLWK�7�WR�XVHUV��RU�IROORZLQJ�\RXU�RZQ�QDPLQJ

FRQYHQWLRQ�� 'LVSOD\LQJ�DXWKRUL]DWLRQV�DQG�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

'LVSOD\LQJ�RU�FKDQJLQJ�DFWLYLW\�JURXS�GDWD�DQG�FKDQJLQJ�RU�JHQHUDWLQJ�SURILOHV�VKRXOGQRW�EH�SHUPLWWHG�IRU�XVHU�DGPLQLVWUDWRUV�

< $XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU� 'LVSOD\LQJ�XVHUV� &UHDWLQJ�DQG�FKDQJLQJ�DFWLYLW\�JURXSV� &KDQJLQJ�WKH�WUDQVDFWLRQ�VHOHFWLRQ�DQG�DXWKRUL]DWLRQ�GDWD�LQ�DFWLYLW\�JURXSV� 'LVSOD\LQJ�SURILOHV� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

&KDQJLQJ�XVHUV�DQG�JHQHUDWLQJ�SURILOHV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRUV�

< $XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU� 'LVSOD\LQJ�DFWLYLW\�JURXSV�DQG�WKHLU�GDWD��DQG�XVHUV� *HQHUDWLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�EHJLQQLQJ�ZLWK�7�EDVHG�RQ

H[LVWLQJ�DFWLYLW\�JURXSV��RU�UHVSHFWLYHO\�IROORZLQJ�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�� :RUNLQJ�ZLWK�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

7KH�IROORZLQJ�WDVNV�VKRXOG�QRW�EH�SHUPLWWHG�IRU�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRUV�� &KDQJLQJ�XVHUV� &KDQJLQJ�DFWLYLW\�JURXS�GDWD� *HQHUDWLQJ�DXWKRUL]DWLRQ�SURILOHV�FRQWDLQLQJ�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK

6B86(5

Page 45: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Release 4.6A/B1–21

+RZ�WKH�$GPLQLVWUDWRUV�:RUN�7RJHWKHU

7KH�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU�< &UHDWHV�DQ�DFWLYLW\�JURXS< &KRRVHV�WUDQVDFWLRQV< 0DLQWDLQV�DXWKRUL]DWLRQ�GDWD

:LWKRXW�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�WR�JHQHUDWH�WKH�SURILOH��WKH�DXWKRUL]DWLRQ�GDWDDGPLQLVWUDWRU�VDYHV�WKH�SURILOH�DQG�DFFHSWV�WKH�GHIDXOW�SURILOH�QDPH�7��RU�D�QDPH�WKDWIROORZV�\RXU�QDPLQJ�FRQYHQWLRQ�

7KH�DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU�< &DOOV�WUDQVDFWLRQ�PFCG< 6HOHFWV�WKH�'LVSOD\�PRGH�WR�FKHFN�WKH�GDWD< *HQHUDWHV�WKH�DXWKRUL]DWLRQ�SURILOHV

)LQDOO\��WKH�XVHU�DGPLQLVWUDWRU�DVVLJQV�WKH�DFWLYLW\�JURXS�WR�D�XVHU�RU�D�3'�REMHFW��VXFK�DV�DSRVLWLRQ��DQG�XSGDWHV�WKH�XVHU�PDVWHU�UHFRUG��7KH�DXWKRUL]DWLRQ�SURILOH�LV�WKHQ�DGGHG�WR�WKHXVHU�PDVWHU�UHFRUG�

3ROLFLHV�DQG�3URFHGXUHV

7KH�IROORZLQJ�VKRZV�D�VDPSOH�RI�SROLFLHV�DQG�SURFHGXUHV��KRZHYHU�IRU�\RXU�FRPSDQ\�LWPLJKW�EH�GLIIHUHQW�

8VHU�$GPLQLVWUDWLRQ

3ROLFLHV

< 6XSHUXVHUV�6$3 �DQG�'',&� 7KHUH�LV�QR�XVHU�6$3 �DQG�'',&�LQ�DQ\�FOLHQW�ZLWKRXW�D�SDVVZRUG�� 7KH�6$3 �XVHU�KDV�QR�DXWKRUL]DWLRQV�

< 8VHU�QDPLQJ�FRQYHQWLRQ

$OO�XVHUV�DUH�DVVLJQHG�QDPHV�LGHQWLFDO�WR�WKHLU�HPSOR\HH�,'�QXPEHUV��SHUVRQQHOQXPEHUV��

< 8VHU�PDLQWHQDQFH� 7KH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW�KDV�WR�UHFHLYH�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW

)RUP��ZLWK�H�PDLO��VLJQHG�E\�WKH�XVHU·V�DSSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�� $OO�SURILOHV�WKDW�WKH�XVHU�UHTXLUHV�PXVW�EH�VSHFLILFDOO\�OLVWHG�RQ�WKH�UHTXHVW�IRUP��7KH

IRUP�PXVW�LQGLFDWH�ZKHWKHU�WKH�XVHU�LV�WHPSRUDU\�RU�SHUPDQHQW�� )RU�WHPSRUDU\�HPSOR\HHV��DQ�DFFRXQW�H[SLUDWLRQ�GDWH�PXVW�EH�LQFOXGHG�

< 8VHU�OHDYLQJ�WKH�FRPSDQ\�� 7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�ILOOHG�RXW�DQG�VLJQHG�E\�WKH�DSSOLFDWLRQ

GHSDUWPHQW�PDQDJHU��� $�FRS\�RI�WKLV�IRUP�PXVW�EH�VHQW�WR�+5�GHSDUWPHQW�

Page 46: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Authorizations Made Easy1–22

�� 7KH�+5�GHSDUWPHQW�PDQDJHU�PXVW�VLJQ�WKH�UHTXHVW�IRU�GHOHWLRQ��� 7KLV�PDQDJHU�VHQGV�WKH�VLJQHG�FRS\�EDFN�WR�WKH�V\VWHP�DGPLQLVWUDWLRQ�GHSDUWPHQW��� $OO�HPSOR\HH�PDVWHU�UHFRUG�LQIRUPDWLRQ��LQFOXGLQJ�LQWHUQDO�SRVW�RIILFH��PXVW�EH

GHOHWHG�

3URFHGXUHV

< 6XSHUXVHUV�6$3 �DQG�'',&� 6$3 �LV�XVHG�RQO\�IRU�FOLHQW�FRSLHV�� 3VHXGR�VXSHUXVHUV�DUH�FUHDWHG�LQ�HDFK�FOLHQW�ZLWK�WKH�6$3B$//�SURILOH�� 7KH�SDVVZRUG�LV�FKDQJHG�HYHU\�PRQWK�

7KLV�FDQ�EH�GHWHUPLQHG�ZLWK�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�ORJLQ�SDVVZRUGBH[SLUDWLRQBWLPH��VHH�DSSHQGL[�&�IRU�WKH�OLVW�RI�V\VWHP�SURILOHSDUDPHWHUV��

� 8VH�UHSRUW�56865����WR�FKHFN�ZKHWKHU�WKH�VWDQGDUG�SDVVZRUGV�IRU�6$3 �DQG�'',&KDYH�EHHQ�FKDQJHG�IURP�WKH�GHIDXOWV�

< 8VHU�QDPLQJ�FRQYHQWLRQ

7KH�DSSOLFDWLRQ�PDQDJHU�PXVW�FRQWDFW�WKH�+5�GHSDUWPHQW�DQG�UHFHLYH�WKH�QHZHPSOR\HH�,'�QXPEHU��7KLV�,'�QXPEHU�LV�HQWHUHG�LQWR�WKH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUPZKHUH�LQGLFDWHG�

< 8VHU�PDLQWHQDQFH

7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�PDLOHG�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�

< 8VHU�OHDYLQJ�WKH�FRPSDQ\

7KH�8VHU�0RGLILFDWLRQ�5HTXHVW�)RUP�PXVW�EH�FRPSOHWHG�DQG�VHQW�WR�WKH�V\VWHPDGPLQLVWUDWLRQ�GHSDUWPHQW�DQG�WR�WKH�+5�GHSDUWPHQW�PDQDJHU��7KH�+5�GHSDUWPHQWPDQDJHU�PXVW�VLJQ�WKH�IRUP�DQG�UHWXUQ�WKH�VLJQHG�FRS\�WR�WKH�V\VWHP�DGPLQLVWUDWLRQGHSDUWPHQW�

5ROHV�DQG�5HVSRQVLELOLWLHV

7DVN 5ROH

0DLQWDLQLQJ�VXSHUXVHUV 6\VWHP�DGPLQLVWUDWRU

0DLQWDLQLQJ�QDPLQJ�FRQYHQWLRQV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�+5GHSDUWPHQW

0DLQWDLQLQJ�XVHUV $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU

0DLQWDLQLQJ�XVHUV�OHDYLQJ�FRPSDQ\ $SSOLFDWLRQ�GHSDUWPHQW�PDQDJHU�V\VWHPDGPLQLVWUDWRU�+5�GHSDUWPHQW

Page 47: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Policies and Procedures

Release 4.6A/B1–23

6\VWHP�6HFXULW\

3ROLFLHV

< ,7�0DQDJHU

7KH�,7�0DQDJHU��ZKR�LV�UHVSRQVLEOH�IRU�DOO�DVSHFWV�RI�V\VWHP�VHFXULW\��PXVW�UHYLHZ�WKHVHFXULW\�VWUDWHJ\�HYHU\�WZR�PRQWKV�

< 6XSHUXVHUV

)RU�UHYLVLRQ�DQG�VHFXULW\�SXUSRVHV��WKH�VXSHUXVHU�6$3 �ZLOO�QRW�EH�XVHG�IRU�V\VWHPPDLQWHQDQFH��$OO�PDLQWHQDQFH�KDV�WR�EH�SHUIRUPHG�ZLWK�QHZO\�GHILQHG�VXSHUXVHUV�

< 6\VWHP�SDVVZRUGV6\VWHP�SDVVZRUGV��'%�XVHU�VDSU���2�6��XVHU��6,'!$'0��'',&��PXVW�EH�FKDQJHG�HYHU\IRXU�ZHHNV��,Q�FDVH�RI�DQ�HPHUJHQF\��SDVVZRUG�DFFHVV�PXVW�EH�HQVXUHG�

< 8VHU�SDVVZRUGV7R�SURWHFW�WKH�V\VWHP�IURP�XQDXWKRUL]HG�DFFHVV��PDNH�XVHUV�FKDQJH�WKHLU�SDVVZRUGHYHU\�IRXU�ZHHNV��$�PLQLPXP�SDVVZRUG�OHQJWK�RI�VL[�FKDUDFWHUV�LV�UHTXLUHG��$IWHU�WKUHHXQVXFFHVVIXO�ORJRQ�DWWHPSWV�WKH�DFFRXQW�ZLOO�EH�ORFNHG�

< 6$3�FRQQHFWLRQ7KH�FRQQHFWLRQ�WR�6$3�LV�RSHQHG�RQO\�IRU�D�VHUYLFH�VHVVLRQ��7KHVH�FRQQHFWLRQV�DUH6$31HW�¥�5���)URQWHQG�QRWHV��IRUPHUO\�266���(DUO\�:DWFK��DQG�5HPRWH�&RQVXOWLQJ�&RQQHFWLRQ�WR�6$3�FDQ�RQO\�EH�RSHQHG�IURP�WKH�FXVWRPHU�VLWH��&RQQHFWLRQV�KDYH�WR�EHPRQLWRUHG�ZLWK�DQ�DSSURSULDWH�WRRO�

< 6$3URXWHU6$3URXWHU��D�6$3�VXSSOLHG�WRRO�IRU�VHFXULQJ�5���DFFHVV��LV�QHFHVVDU\�IRU�FRQQHFWLQJ�WR6$3�V\VWHPV�

< 5HPRWH�FRQQHFWLRQV)RU�H[WHUQDO�FRQQHFWLRQV��PRELOH�HQG�XVHUV���IL[HG�,3�DGGUHVVHV�DUH�DVVLJQHG��2QHH[SOLFLW�HQWU\�SHU�H[WHUQDO�FRQQHFWLRQ�LV�PDLQWDLQHG�LQ�WKH�SHUPLVVLRQ�OLVW�IRU�6$3�URXWHU�

3URFHGXUHV

< ,7�0DQDJHU

(YHU\�WZR�PRQWKV��WKH�,7�PDQDJHU�DQG�WKH�V\VWHP�DGPLQLVWUDWRU�VKRXOG�UHYLHZ�V\VWHPVHFXULW\�

< 6XSHUXVHUV

7KH�6$3B$//�SURILOH�LV�UHPRYHG�IURP�WKH�XVHU�6$3 ��DQG�WKH�6$3 �XVHU�LV�ORFNHG��$OOPDLQWHQDQFH�WDVNV�DUH�SHUIRUPHG�XVLQJ�DFFRXQWV�ZLWK�WKH�6$3B$//�SURILOH�

< 6\VWHP�SDVVZRUGV7KH�V\VWHP�DGPLQLVWUDWRU�FKDQJHV�WKH�V\VWHP�SDVVZRUGV�HYHU\�IRXU�ZHHNV��7KH�V\VWHPDGPLQLVWUDWRU�PXVW�ZULWH�GRZQ�WKH�FXUUHQW�SDVVZRUGV�DQG�SODFH�WKHP�LQ�D�VHDOHGHQYHORSH��ZKLFK�PXVW�EH�VWRUHG�LQ�WKH�GDWD�VDIH�DQG�EH�DFFHVVLEOH�LQ�FDVH�RI�HPHUJHQF\�8VH�UHSRUW�56865����WR�FKHFN�LI�V\VWHP�SDVVZRUGV�KDYH�EHHQ�FKDQJHG�

Page 48: Amez 46 all

Chapter 1: R/3 System Security and the Authorization Concept

Auditing Requirements

Authorizations Made Easy1–24

< 8VHU�SDVVZRUGV8VHUV�PXVW�FKDQJH�WKHLU�SDVVZRUGV�HYHU\�IRXU�ZHHNV�E\�VHWWLQJ�WKH�DSSURSULDWHSDUDPHWHUV�LQ�WKH�'()$8/7�SURILOH��7KLV�VWHS�HQVXUHV�WKDW�WKH�VHWWLQJV�DUH�YDOLG�LQ�WKHHQWLUH�V\VWHP��7KH�PLQLPXP�QXPEHU�RI�FKDUDFWHUV�IRU�D�SDVVZRUG�LV�VL[��DQG�WKHLQWUXGHU�ORFNRXW�FRXQW�LV�VHW�WR�WKUHH�

< 6$3�FRQQHFWLRQ$�FRQQHFWLRQ�EHWZHHQ�6$3�DQG�WKH�FXVWRPHU�LV�HVWDEOLVKHG�E\�VWDUWLQJ�6$3�URXWHU�LQ�WKHFXVWRPHU�QHWZRUN�DQG�VWDUWLQJ��IRU�H[DPSOH��6$3�*8,�IRU�DQ�6$31HW�²�5���)URQWHQGQRWH�FRQQHFWLRQ�

< 6$3�URXWHU6$3�URXWHU�LV�VWDUWHG�DQG�VWRSSHG�RQFH�D�GD\�WR�HQVXUH�WKHUH�LV�QR�RSHQ�FRQQHFWLRQV�

< 5HPRWH�FRQQHFWLRQV)RU�UHPRWH�XVHUV��GHGLFDWHG�,3�DGGUHVVHV�DUH�PDLQWDLQHG��7KHVH�DGGUHVVHV�PXVW�DOVR�EHPDLQWDLQHG�LQ�WKH�6$352877$%�WR�PDNH�VXUH�WKDW�XQDXWKRUL]HG�XVHUV�GR�QRW�ORJ�RQ�WR5���

5ROHV�DQG�5HVSRQVLELOLWLHV

7DVN 5ROH

'HILQLQJ�DQG�PDLQWDLQLQJ�6$352877$% 6\VWHP�DGPLQLVWUDWRU

0RQLWRULQJ�RSHQ�FRQQHFWLRQV 2SHUDWRU

6KXWWLQJ�GRZQ�UHVWDUWLQJ�6$3�URXWHU�GDLO\ 2SHUDWRU

5HYLHZLQJ�VHFXULW\�VWUDWHJ\ ,7�PDQDJHU

&KDQJLQJ�V\VWHP�SDVVZRUGV 6\VWHP�DGPLQLVWUDWRU

$XGLWLQJ�5HTXLUHPHQWV

,Q�5���WKHUH�DUH�VHYHUDO�DUHDV�UHODWHG�WR�DXGLWLQJ�< 3URFHVV�FRQWUROV< &KDQJH�PDQDJHPHQW< $XWKRUL]DWLRQ�LPSOHPHQWDWLRQ< 81,;< 'DWDEDVH

<RXU�VLWH�PD\�KDYH�DGGLWLRQDO�DXGLWLQJ�UHTXLUHPHQWV��1XPHURXV�FRPSDQLHV�KDYHLPSOHPHQWHG�H[FHOOHQW�DXGLWLQJ�SURFHGXUHV�EDVHG�RQ�VWDQGDUG�6$3�WRROV�DQG�FXVWRPHU�EXLOWWRROV��$PHULFDV·�6$3�8VHUV·�*URXS��$68*��,QWHUQDO�&RQWUROV�DQG�6HFXULW\�RIIHUV�WKH�EHVWLQIRUPDWLRQ�RQ�KRZ�RWKHU�FRPSDQLHV�KDYH�KDQGOHG�DXGLWLQJ�LQ�5����)RU�PRUH�LQIRUPDWLRQ�RQ�$68*�VHH�KWWS���ZZZ�DVXJ�FRP���)RU�PRUH�LQIRUPDWLRQ�RQ�DXGLWLQJ�VHH�FKDSWHU�����6$36HFXULW\�$XGLW�DQG�/RJJLQJ�

Page 49: Amez 46 all

2–1

&KDSWHU��� $XWKRUL]DWLRQV�DQG�$6$3

&RQWHQWV

Overview ..................................................................................................................2–2

ASAP Roadmap.......................................................................................................2–2

Knowledge Corner ..................................................................................................2–5

Questions and Answers Database (Q&Adb) ........................................................2–6

Authorization List....................................................................................................2–6

��

Page 50: Amez 46 all

Chapter 2: Authorizations and ASAP

Overview

Authorizations Made Easy2–2

2YHUYLHZ

$FFHOHUDWHG6$3��$6$3��LV�6$3·V�FRPSUHKHQVLYH�LPSOHPHQWDWLRQ�VROXWLRQ�WR�VWUHDPOLQH�5��SURMHFWV��$6$3�LQWHJUDWHV�WKUHH�FRPSRQHQWV��WKH�$6$3�5RDGPDS��7RROV��DQG�5���6HUYLFH�DQG7UDLQLQJ��ZKLFK�ZRUN�LQ�FRQMXQFWLRQ�WR�VXSSRUW�WKH�UDSLG�DQG�HIILFLHQW�LPSOHPHQWDWLRQ�RIWKH�5���6\VWHP�< $FFHOHUDWHG6$3�5RDGPDS�GHOLYHUV�D�SURFHVV�RULHQWHG��FOHDU�DQG�FRQFLVH�SURMHFW�SODQ�WR

SURYLGH�VWHS�E\�VWHS�GLUHFWLRQ�WKURXJKRXW�\RXU�LPSOHPHQWDWLRQ�RI�5���< 7RROV�LQFOXGHV�$6$3�VSHFLILF�WRROV�WR�VXSSRUW�SURMHFW�PDQDJHPHQW��TXHVWLRQQDLUHV�IRU

WKH�EXVLQHVV�SURFHVV�FRQVXOWDQWV�DQG�QXPHURXV�WHFKQLFDO�JXLGHERRNV�DQG�FKHFNOLVWV�< 5���6HUYLFHV�DQG�7UDLQLQJ�LQFOXGHV�DOO�FRQVXOWLQJ��WUDLQLQJ��DQG�VXSSRUW�VHUYLFHV��IRU

H[DPSOH��KRWOLQH��(DUO\:DWFK��UHPRWH�XSJUDGHV�RU�DUFKLYLQJ��HWF����7KHVH�SURGXFWV�KHOSWR�VWDQGDUGL]H�FHUWDLQ�WDVNV�WR�SHUIRUP�WKHP�DV�TXLFNO\�DV�SRVVLEOH�

,Q�UHVSHFW�WR�DXWKRUL]DWLRQV��$6$3�GHVFULEHV�WKH�SURFHVV�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�FRQFHSW�:KLOH�WKLV�JXLGHERRN�KHOSV�\RX�LQ�WKH�WHFKQLFDO�LPSOHPHQWDWLRQ�RI�DXWKRUL]DWLRQV�$6$3GHVFULEHV�WKH�VHWXS�RI�DQ�DXWKRUL]DWLRQ�FRQFHSW�IURP�D�PHWKRGLFDO�DQG�RUJDQL]DWLRQDO�YLHZSRLQW��%\�IROORZLQJ�WKH�VWHSV�RI�$6$3�5RDGPDS��\RX�FDQ�HVWDEOLVK�\RXU�DXWKRUL]DWLRQFRQFHSW�ZLWK�D�SURYHQ�LPSOHPHQWDWLRQ�SURFHVV��7KH�.QRZOHGJH�&RUQHU�SURYLGHV�\RX�ZLWKWRROV�WKDW�KHOS�\RX�WR�DFFHOHUDWH�WKH�DXWKRUL]DWLRQ�LPSOHPHQWDWLRQ�

,Q�WKLV�FKDSWHU��ZH�EULHIO\�GLVFXVV�KRZ�WR�ZRUN�ZLWK�$6$3�DQG�ZKDW�LW�FRQWDLQV�LQ�UHJDUGVWR�DXWKRUL]DWLRQV��:H�H[SODLQ�KRZ�WR�DFFHVV�WKH�$6$3�FRPSRQHQWV�FRQWDLQLQJDXWKRUL]DWLRQ�UHODWHG�UHVRXUFHV�UDWKHU�WKDQ�GLVFXVVLQJ�WKH�FRQWHQWV�WKHPVHOYHV�

$6$3�5RDGPDS

7KH�$6$3�5RDGPDS�VWUXFWXUH�LV�GLYLGHG�LQWR�GLIIHUHQW�OHYHOV�< 3KDVH< :RUN�SDFNDJH< $FWLYLW\< 7DVN

2Q�WKH�KLJKHVW�OHYHO��WKH�$6$3�5RDGPDS�FRQVLVWV�RI�ILYH�SKDVHV��DV�IROORZV�

Page 51: Amez 46 all

Chapter 2: Authorizations and ASAP

ASAP Roadmap

Release 4.6A/B2–3

�� 3URMHFW�3UHSDUDWLRQ,Q�WKLV�SKDVH��\RX�PDNH�VXUH�DOO�GHFLVLRQ�PDNHUV�DUH�RQ�ERDUG�IRU�\RXU�5��LPSOHPHQWDWLRQ�DQG�JDWKHU�\RXU�LQWHUQDO�DQG�H[WHUQDO�LPSOHPHQWDWLRQ�WHDP�

�� %XVLQHVV�%OXHSULQW&UHDWH�WKH�%XVLQHVV�%OXHSULQW�GRFXPHQWLQJ�\RXU�FRPSDQ\·V�EXVLQHVV�UHTXLUHPHQWV��7KH%XVLQHVV�%OXHSULQW�LV�D�YLVXDO�PRGHO�RI�\RXU�EXVLQHVV·�IXWXUH�VWDWH�DIWHU�\RX·YHLPSOHPHQWHG�WKH�5���6\VWHP��,W�DOORZV�\RXU�SURMHFW�WHDP�WR�FOHDUO\�GHILQH�\RXU�VFRSH�DQG�RQO\�IRFXV�RQ�WKH�5���SURFHVVHV�QHHGHG�WR�UXQ�\RXU�EXVLQHVV�

�� 5HDOL]DWLRQ,Q�WKLV�SKDVH��\RXU�LPSOHPHQWDWLRQ�WHDP�FRQILJXUHV�DQG�ILQH�WXQHV�WKH�5���6\VWHP�

�� )LQDO�3UHSDUDWLRQ7HVW�DOO�LQWHUIDFHV��WUDLQ�DOO�HQG�XVHUV��DQG�PLJUDWH�\RXU�EXVLQHVV�GDWD�WR�\RXU�5��6\VWHP�

�� *R�/LYH��6XSSRUW,Q�WKLV�SKDVH��JR�OLYH�ZLWK�5����<RX�HVWDEOLVK�SURFHGXUHV�DQG�PHDVXUHPHQWV�WR�UHYLHZWKH�EHQHILWV�RI�\RXU�5���LQYHVWPHQW�RQ�DQ�RQJRLQJ�EDVLV��6$3�VXSSRUW�DQG�VHUYLFHVDVVXUH�WKDW�\RXU�V\VWHP�FRQWLQXHV�WR�UXQ�VPRRWKO\��FOHDQO\��DQG�HIILFLHQWO\�

8VHU�DQG�DXWKRUL]DWLRQ�PDQDJHPHQW�LV�FRYHUHG�LQ�WKH�5HDOL]DWLRQ�SKDVH�RI�WKH�$6$35RDGPDS��,Q�WKH�ZRUN�SDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW��\RX�ILQG�D�GHVFULSWLRQ�RI�WKHPHWKRGRORJ\�WR�VHW�XS�DQ�DXWKRUL]DWLRQV�FRQFHSW��)ROORZ�WKH�VWHSV�EHORZ�

User and authorizationmanagement is coveredin phase 3, Realization

Page 52: Amez 46 all

Chapter 2: Authorizations and ASAP

ASAP Roadmap

Authorizations Made Easy2–4

$XWKRUL]DWLRQV�LQ�WKH�5RDGPDS�6WUXFWXUH

�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�

�� 2Q�WKH�5RDGPDS�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH,PSOHPHQWDWLRQ�5RDGPDS�→��5HDOL]DWLRQ�→��(VWDEOLVK$XWKRUL]DWLRQ�&RQFHSW�

�� 2Q�WKH�ULJKW�VLGH��DQ�H[SODQDWLRQ�RIWKH�FRQWHQWV�DSSHDUV�IRU�WKH�QRGHVHOHFWHG�RQ�WKH�OHIW�

1RWH��'XH�WR�VWUXFWXUDO�GLIIHUHQFHV�LQ�WKH�$6$3�URDGPDS�EHWZHHQ�$6$3�5HOHDVH����$�DQG����%��WKHQXPEHU�RI�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�LV�HLWKHU������LQ�$6$3�5HOHDVH����$�RU������LQ$6$3�5HOHDVH����%�

7KH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�FRQWDLQV�WKUHH�DFWLYLWLHV��ZKLFK�DUH�

�� &UHDWH�$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ

�� ,PSOHPHQW�$XWKRUL]DWLRQ�&RQFHSW

�� 9DOLGDWH�$XWKRUL]DWLRQ�&RQFHSW

7R�DFFHVV�WKH�DFWLYLWLHV�EHORQJLQJ�WR�WKH�ZRUNSDFNDJH�(VWDEOLVK�$XWKRUL]DWLRQ�&RQFHSW�IROORZ�WKH�VWHSVEHORZ�

�� &KRRVH�WKH�ILUVW�DFWLYLW\��&UHDWH$XWKRUL]DWLRQ�'HWDLOHG�'HVLJQ��WR�JHWDQ�RYHUYLHZ�DERXW�WKH�WDVNV�WKLVDFWLYLW\�FRQWDLQV�

2

3

1

Page 53: Amez 46 all

Chapter 2: Authorizations and ASAP

Knowledge Corner

Release 4.6A/B2–5

�� :RUN�\RXU�ZD\�WKURXJK�WKHGLIIHUHQW�WDVNV�

�� :KHQ�\RX�ILQLVK�WKHVH�WDVNV�FRQWLQXH�ZLWK�WKH�QH[W�DFWLYLW\�DQGLWV�WDVNV�

.QRZOHGJH�&RUQHU

7KH�.QRZOHGJH�&RUQHU��.&��LV�D�FROOHFWLRQ�RI�UHVRXUFHV�WKDW�KHOSV�\RX�WR�DFFHOHUDWH�WKH�5��LPSOHPHQWDWLRQ��,Q�RUGHU�WR�DFFHVV�DOO�DYDLODEOH�DXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROV�LQ�WKH�.QRZOHGJH&RUQHU��IROORZ�WKH�VWHSV�EHORZ�

�� 6WDUW�WKH�,PSOHPHQWDWLRQ�$VVLVWDQW�

�� 2Q�WKH�.&�WDE�RI�WKH�$6$3,PSOHPHQWDWLRQ�$VVLVWDQW��FKRRVH�6$33URGXFWV�→��&URVV�$SSOLFDWLRQ�→$XWKRUL]DWLRQV�

�� 7KH�XSSHU�ULJKW�WLOH�VKRZV�DQH[SODQDWLRQ�RI�WKH�FRQWHQWV�IURP�WKHOHIW�

�� 7KH�ORZHU�ULJKW�WLOH�VKRZV�DOODXWKRUL]DWLRQ�GRFXPHQWV�DQG�WRROVDYDLODEOH�LQ�WKH�.&�

2

3

2

4

Page 54: Amez 46 all

Chapter 2: Authorizations and ASAP

Questions and Answers Database (Q&Adb)

Authorizations Made Easy2–6

4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�

:KDW�,V�WKH�4$GE"

7KH�4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE��LV�D�WRRO�WKDW�KHOSV�\RX�WR�DQDO\]H�DQGGHWHUPLQH�WKH�VFDOH�DQG�VFRSH�RI�\RXU�V\VWHP�LPSOHPHQWDWLRQ�GXULQJ�WKH�%XVLQHVV�%OXHSULQWSKDVH�RI�DQ�$6$3�LPSOHPHQWDWLRQ�SURMHFW��,Q�WKH�4$GE��DOO�SURFHVVHV�WKDW�FDQ�EHLPSOHPHQWHG�LQ�WKH�5���6\VWHP�DUH�GLVSOD\HG�LQ�D�WUHH�FDOOHG�WKH�UHIHUHQFH�VWUXFWXUH��:KLOHGHILQLQJ�WKH�%XVLQHVV�%OXHSULQW��\RX�DUH�VHWWLQJ�WKH�EXVLQHVV�SURFHVVHV�LQ�VFRSH�WKDW�\RX�DLPWR�LPSOHPHQW�ZLWK�WKH�5���6\VWHP�

$V�RI�$6$3�5HOHDVH����%��\RX�FDQ�FUHDWH�XVHU�UROHV�LQ�WKH�4$GE�DQG�DVVLJQ�WKH�SURFHVVHVWR�EH�LPSOHPHQWHG�WR�WKHVH�UROHV��7KLV�LQIRUPDWLRQ�LV�ODWHU�SDVVHG�WR�WKH�$XWKRUL]DWLRQ�/LVWZKHUH�\RX�FDQ�FRPSOHWH�WKH�XVHU�UROH�GHILQLWLRQ�

+RZ�WR�:RUN�ZLWK�WKH�4$GE

)RU�GHWDLOV�RQ�KRZ�WR�FUHDWH�DQG�PDLQWDLQ�XVHU�UROHV�ZLWKLQ�WKH�4$GE��VHH�WKH�4$GERQOLQH�KHOS�

+RZ�WR�*HQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE

,Q�RUGHU�WR�UHILQH�WKH�XVHU�UROHV�WKDW�\RX�KDYH�GHILQHG�LQ�WKH�4$GE��\RX�FDQ�JHQHUDWH�WKH$XWKRUL]DWLRQ�/LVW��'XULQJ�WKH�JHQHUDWLRQ�RI�WKH�$XWKRUL]DWLRQ�/LVW��ERWK�WKH�SURFHVVHV�VHW�LQVFRSH�DQG�WKH�GHILQHG�XVHU�UROHV�DUH�WUDQVIHUUHG�WR�WKH�$XWKRUL]DWLRQ�/LVW��)RU�GHWDLOV�RQKRZ�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE��VHH�WKH�4$GE�RQOLQH�KHOS�

$XWKRUL]DWLRQ�/LVW

:KDW�,V�WKH�$XWKRUL]DWLRQ�/LVW"

7KH�$XWKRUL]DWLRQ�/LVW�LV�DQ�([FHO�ZRUNVKHHW�WKDW�KHOSV�\RX�WR�PRGHO�\RXU�XVHU�UROHV�SULRUWR�WKH�LPSOHPHQWDWLRQ�LQ�WKH�5���6\VWHP��8VLQJ�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FDQ�GHVLJQ�XVHUUROHV�LQ�DQ�HDUO\�V\VWHP�LPSOHPHQWDWLRQ�SKDVH�HYHQ�ZLWKRXW�KDYLQJ�LQVWDOOHG�5���

,Q�WKH�$XWKRUL]DWLRQ�/LVW��\RX�FUHDWH�XVHU�UROHV�DQG�GHILQH�WKH�WUDQVDFWLRQV�DVVRFLDWHG�ZLWKWKHVH�UROHV��7R�PRGHO�WKH�XVHU�UROHV��WKH�$XWKRUL]DWLRQ�/LVW�SURYLGHV�\RX�WZR�GLIIHUHQWYLHZV�< 3URFHVV�YLHZ

7KH�SURFHVV�YLHZ��5ROHV�'HVLJQ���4$GE�VFRSH�WDE��LV�JHQHUDWHG�IURP�WKH�4$GE�DQGFRQWDLQV�WKH�SURFHVVHV�WKDW�KDYH�EHHQ�VHW�LQ�VFRSH�GXULQJ�WKH�%XVLQHVV�%OXHSULQW�SKDVH�$OO�SURFHVVHV�DUH�GLVSOD\HG�LQ�WKH�VDPH�KLHUDUFK\�DV�LQ�WKH�UHIHUHQFH�VWUXFWXUH�RI�WKH4$GE��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WKH�SURFHVVHV�WR�LQFOXGH�WKHP�LQ�WKHXVHU�UROHV�

Page 55: Amez 46 all

Chapter 2: Authorizations and ASAP

Authorization List

Release 4.6A/B2–7

< 0HQX�YLHZ

,Q�WKH�PHQX�YLHZ��5ROHV�'HVLJQ�¥�6$3�PHQX�WDE���DOO�WUDQVDFWLRQV�LQ�WKH�VWDQGDUG�6$3PHQX�DUH�GLVSOD\HG��<RX�FDQ�GHILQH�\RXU�XVHU�UROHV�DQG�VHOHFW�WUDQVDFWLRQV�IURP�WKH�6$3PHQX�WR�LQFOXGH�WKHP�LQ�\RXU�XVHU�UROHV�

$IWHU�FRPSOHWLQJ�WKH�PRGHOLQJ�RI�XVHU�UROHV��\RX�FDQ�JHQHUDWH�DQ�RYHUYLHZ�RI�DOOWUDQVDFWLRQV�LQFOXGHG�LQ�HDFK�XVHU�UROH�

+RZ�WR�:RUN�ZLWK�WKH�$XWKRUL]DWLRQ�/LVW

7R�XVH�WKH�$XWKRUL]DWLRQ�/LVW�IRU�WKH�GHVLJQ�DQG�LPSOHPHQWDWLRQ�RI�\RXU�DXWKRUL]DWLRQFRQFHSW��IROORZ�WKH�VWHSV�EHORZ�

�� *HQHUDWH�DXWKRUL]DWLRQ�OLVW�IURP�WKH�4$GE

�� 'HILQH�XVHU�UROHV

�� *HQHUDWH�XVHU�UROHV�RYHUYLHZ

�� %XLOG�XVHU�UROHV

*HQHUDWH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE

7R�ZRUN�ZLWK�SURFHVV�YLHZ��\RX�QHHG�WR�JHQHUDWH�WKH�$XWKRUL]DWLRQ�/LVW�IURP�WKH�4$GE�3URFHHG�DV�GHVFULEHG�LQ�WKH�4$GE�RQOLQH�KHOS�

(YHQ�LI�\RX�GR�QRW�ZRUN�ZLWK�WKH�4$GE��\RX�FDQ�XVH�WKH�$XWKRUL]DWLRQ�/LVW��7KH�WHPSODWHFDQ�EH�IRXQG�LQ�WKH�$6$3�.QRZOHGJH�&RUQHU��+RZHYHU��WKH�SURFHVV�YLHZ�ZLOO�EH�HPSW\��WKXV\RX�FDQ�GHILQH�\RXU�XVHU�UROHV�RQO\�YLD�WKH�PHQX�YLHZ�

Page 56: Amez 46 all

Chapter 2: Authorizations and ASAP

Authorization List

Authorizations Made Easy2–8

'HILQH�8VHU�5ROHV

7R�GHILQH�D�XVHU�UROH��\RX�QHHG�WR�FUHDWH�D�XVHU�UROH�DQG�DVVLJQ�SURFHVVHV�RU�WUDQVDFWLRQV�WR�WKDW�XVHU�UROH�

�� 2SHQ�WKH�$XWKRUL]DWLRQ�/LVW�

�� (QWHU�%XVLQHVV�$UHD�DQG�5ROH1DPH�IRU�WKH�XVHU�UROH�WKDW\RX�ZDQW�WR�FUHDWH�

�� 0DUN�WKH�GHVLUHG�WUDQVDFWLRQV�

&KRRVH�&OLFN�KHUH�IRU�LQVWUXFWLRQVWR�JHW�DQ�H[SODQDWLRQ�RQ�WKHIXQFWLRQDOLW\�RI�WKH�$XWKRUL]DWLRQ/LVW�

7KH�FRPSOHWH�IXQFWLRQDOLW\�RI�WKH$XWKRUL]DWLRQ�/LVW�LV�GHVFULEHG�LQWKH�KHOS�ZLQGRZ�VKRZQ�WR�WKHULJKW�

2

3

Tip

Page 57: Amez 46 all

Chapter 2: Authorizations and ASAP

Authorization List

Release 4.6A/B2–9

*HQHUDWH�8VHU�5ROHV�2YHUYLHZ

7R�JHQHUDWH�WKH�XVHU�UROHV�RYHUYLHZ�IURP�WKH�$XWKRUL]DWLRQ�/LVW�

�� 6HOHFW�WKH�7�&RGHV�SHU�5ROH�WDE�

�� &KRRVH�*HQHUDWH�2YHUYLHZ�WRFUHDWH�IRU�HDFK�XVHU�UROH�D�OLVWRI�WUDQVDFWLRQV�DVVLJQHG�WRWKDW�UROH�

�� )RU�DOO�XVHU�UROHV��WKH�VHOHFWHGWUDQVDFWLRQV�DUH�VXPPDUL]HGLQ�WKH�$XWKRUL]DWLRQ�/LVW�

(YHU\�WLPH�\RX�PDNH�FKDQJHV�WR�WKH�UROHV�RU�FUHDWH�QHZ�UROHV�WKH�7�&RGHV�SHU�5ROHRYHUYLHZ�QHHGV�WR�EH�UHJHQHUDWHG�

%XLOG�8VHU�5ROHV

8VLQJ�WKH�3*��FUHDWH�DOO�WKH�VLQJOH�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�UHTXLUHG�WR�LPSOHPHQW�WKHXVHU�UROHV�GHILQHG�LQ�WKH�$XWKRUL]DWLRQ�/LVW�

1

2

Page 58: Amez 46 all

Chapter 2: Authorizations and ASAP

Authorization List

Authorizations Made Easy2–10

Page 59: Amez 46 all

3–1

&KDSWHU��� 6HWWLQJ�8S�WKH�3URILOH

*HQHUDWRU

&RQWHQWV

Overview ..................................................................................................................3–2

Confirming that the Profile Generator Is Active ..................................................3–2

Loading the USOBX_C and USOBT_C tables ......................................................3–4

Getting Support from the SAPNet – R/3 Frontend Notes....................................3–7

��

Page 60: Amez 46 all

Chapter 3: Setting Up the Profile Generator

Overview

Authorizations Made Easy3–2

2YHUYLHZ

�8VLQJ�WKH�3URILOH�*HQHUDWRU��3*��LQ�5HOHDVH����[�PDNHV�VHQVH�IRU�QHZ�FXVWRPHUV�MXVWVWDUWLQJ�WKHLU�5���SURMHFW�DQG�FXUUHQW�FXVWRPHUV�ZLWK�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�LQ�DQHDUOLHU�5���UHOHDVH��0DLQWHQDQFH�WUDQVDFWLRQV�68���DQG�68���DUH�QR�ORQJHU�UHTXLUHG��DQGFXVWRPHUV�ZKR�KDYH�SUHYLRXVO\�EHHQ�XVLQJ�WKLV�PHWKRG�VKRXOG�IDPLOLDUL]H�WKHPVHOYHV�ZLWKWKH�3*��,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWKRXW�WKH�3*��6$3�RIIHUV�\RX�DZD\�WR�PLJUDWH�WKHVH�SURILOHV�WR�WKH�3*�

)RU�LQIRUPDWLRQ�RQ�XSJUDGLQJ�WR�5HOHDVH�����IURP�D�SUHYLRXV�UHOHDVH��VHH�FKDSWHU����8SJUDGH�

6HWWLQJ�XS�WKH�3*�LQ����[�FRQVLVWV�RI�WZR�VWHSV�

�� &RQILUPLQJ�WKDW�WKH�3*�LV�DFWLYH�

�� /RDGLQJ�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��

&RQILUPLQJ�WKDW�WKH�3URILOH�*HQHUDWRU�,V�$FWLYH

:LWK�5���5HOHDVH������WKH�3*�LV�DOUHDG\�DFWLYDWHG��<RX�GR�QRW�KDYH�WR�VHW�WKH�V\VWHPSDUDPHWHU�LQ�WKH�5���LQVWDQFH�SURILOH�LI�\RX�KDYH�LQVWDOOHG�WKH�5���5HOHDVH�����DV�D�QHZV\VWHP��7KH�GHIDXOW�YDOXH�LV�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<�

&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU

,I�\RX�DUH�QRW�VXUH�ZKHWKHU�WKH�3*�LV�DFWLYDWHG��\RX�FDQ�FKHFN�WKH�LQVWDQFH�SURILOHSDUDPHWHU��7KH�IROORZLQJ�SURFHGXUH�VKRZV�\RX�KRZ�WR�FKHFN�LI�\RXU�SURILOH�SDUDPHWHU�LV�VHWFRUUHFWO\�DQG�DFWLYH��7R�FKHFN�LI�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�LV�VHW�FRUUHFWO\��UXQ�WKH�UHSRUW563$5$0�DV�VKRZ�EHORZ�

Page 61: Amez 46 all

Chapter 3: Setting Up the Profile Generator

Confirming that the Profile Generator Is Active

Release 4.6A/B3–3

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�SA38�DQG�FKRRVH�(QWHU��RU�FKRRVH 6\VWHP�→�6HUYLFHV�→�5HSRUWLQJ��

�� (QWHU�RSPARAM�LQ�WKH�3URJUDPILHOG�

�� &KRRVH�([HFXWH�

$�OLVW�RI�SDUDPHWHU�QDPHV�DSSHDUV�ZLWK�FRUUHVSRQGLQJ�XVHU�GHILQHG�YDOXHV��7KH�SDUDPHWHUQDPHV�DUH�SURYLGHG�LQ�YDULDEOH�IRUP��$W�UXQWLPH��WKHVH�YDULDEOHV�DUH�UHSODFHG�ZLWK�DFWXDOYDOXHV��8VHU�GHILQHG�YDOXHV�DUH�WKH�DFWXDO�YDOXHV�RI�WKH�LQGLYLGXDO�SDUDPHWHUV�

�� ,I�DFWLYH��WKH�SURILOH�SDUDPHWHUIRU�WKH�3*�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�GLVSOD\HG�DV�D�<�LQWKH�WKLUG�FROXPQ�

8VH�WKH� �LFRQ�WR�VHDUFK�IRU�WKH�HQWU\�auth/no_check_in_some_cases�LQ�WKH�OLVW�LI�\RXGR�QRW�VHH�LW�ULJKW�DZD\�

,I�WKH�YDOXH�<�IRU�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�QRWGLVSOD\HG��\RX�PXVW�ILUVW�FKDQJH�WKH�LQVWDQFH�SURILOH�DQG�WKHQ�UHERRW�WKH�5���LQVWDQFH�)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�GR�WKLV��VHH�FKDSWHU�����8SJUDGH�

2

3

4

Tip

Page 62: Amez 46 all

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Authorizations Made Easy3–4

/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV

/RDGLQJ�WKH�862%;B&�DQG�862%7B&�WDEOHV�LV�DFFRPSOLVKHG�LQ�WZR�VWHSV��� ,QLWLDO�FRS\LQJ�RI�6$3�GHIDXOWV�LQWR�WKH�FXVWRPHU�WDEOHV�� 7UDQVSRUWLQJ�WKH�GHIDXOWV�

,QLWLDO�&RS\LQJ�RI�6$3�'HIDXOWV�LQWR�WKH�&XVWRPHU�7DEOHV��68���

8VLQJ�WUDQVDFWLRQ�68����&RS\�LQLWLDO�GHIDXOWV���FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV��WDEOHV�862%;�DQG�862%7�7KLV�VWHS�LPSRUWV�WKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWV�IRU�WKH�DXWKRUL]DWLRQ�REMHFWV�ZLWKLQ�D�WUDQVDFWLRQ�DQGWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�3*�LQWR�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&��:H�GLVFXVV�KRZ�WRHGLW�WKHVH�YDOXHV�XVLQJ�WUDQVDFWLRQ�68���LQ�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SPRO�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�WUHH��FKRRVH�7RROV�→�$FFHOHUDWHG6$3�→�&XVWRPL]LQJ�→�(GLW�3URMHFW��

�� &KRRVH� �6$3�5HIHUHQFH�,0*�

�� ,Q�WKH�,0*��RSHQ�%DVLV�&RPSRQHQWV→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUVDQG�$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ3URILOH�*HQHUDWRU�DQG�FKRRVH� �QH[WWR�:RUN�RQ�6$3�&KHFN�,QGLFDWRUV�DQG)LHOG�9DOXHV�

7R�UHDFK�WKH�3URILOH�*HQHUDWRU��8SJUDGHDQG�)LUVW�,QVWDOODWLRQ�VFUHHQ�\RX�PD\DOWHUQDWLYHO\�XVH�WUDQVDFWLRQ�SU25�

3

Page 63: Amez 46 all

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Release 4.6A/B3–5

�� 2Q�WKH�QH[W�VFUHHQ�VHOHFW�&RS\�6$3�WHVW�VWDWXVHV�DQG�ILHOG�YDOXHV��WKLV�WUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&RS\�6$3�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV��

�� &KRRVH� �QH[W�WR����,QLWLDOO\�ILOO�WKHFXVWRPHU�WDEOHV��LI�\RX�KDYH�QRWSUHYLRXVO\�ZRUNHG�ZLWK�WKH�3*�RULI�\RX�ZDQW�WR�UHWUDQVIHU�DOO�6$3GHIDXOW�YDOXHV��7KLV�VWHS�PD\�WDNHVHYHUDO�PLQXWHV�

,I�\RX�KDYH�QRW�SUHYLRXVO\�ZRUNHGZLWK�WKH�3*�RU�\RX�ZDQW�WR�UHWUDQVIHUDOO�6$3�GHIDXOW�YDOXHV��XVH����,QLWLDOO\ILOO�WKH�FXVWRPHU�WDEOHV�IXQFWLRQ�XQGHU,QVWDOOLQJ�WKH�3URILOH�*HQHUDWRU�

,I�\RX�KDYH�DOUHDG\�ZRUNHG�ZLWK�WKH3*�DQG�ZDQW�WR�FRPSDUH�\RXU�GDWDZLWK�WKH�6$3�GHIDXOW�YDOXHV��VHHFKDSWHU�����8SJUDGH�

�� $�ZDUQLQJ�PHVVDJH�DSSHDUV�RQ�D�GLDORJ�ER[��5HDG�LW�FDUHIXOO\�DQG�FKRRVH� �

5

6

Page 64: Amez 46 all

Chapter 3: Setting Up the Profile Generator

Loading the USOBX_C and USOBT_C tables

Authorizations Made Easy3–6

7UDQVSRUWLQJ�WKH�'HIDXOWV

�� &KRRVH� �QH[W�WR����7UDQVSRUW�WKHFXVWRPHU�WDEOHV�WR�WUDQVSRUW�WKH�3*FXVWRPHU�WDEOHV��862%;B&�DQG862%7B&��

$W�WKLV�WLPH�SHUIRUP�RQO\�VWHSV��DQG����'R�QRW�UXQ�VWHSV��$�WKURXJK�'�\HW��6HH�FKDSWHU�����8SJUDGH�IRUPRUH�LQIRUPDWLRQ�

1RWH�WKDW�WKH�FXVWRPHU�WDEOHV��862%;B&�DQG�862%7B&��DUH�FRPSOHWHO\�WUDQVSRUWHG��$OOFKDQJHV�WR�DXWKRUL]DWLRQ�FKHFNV�WKDW�ZHUH�PDGH�LQ�WKLV�WUDQVDFWLRQ�RU�LQ�68���DUH�DOVRWUDQVSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��7KLV�VWHS�UHSODFHV�DOO�WKH�ILHOG�YDOXH�DQG�FKHFN�LQGLFDWRUVHWWLQJV�LQ�WKH�WDUJHW�V\VWHP�

1R�DFWLYLW\�JURXSV�RU�DXWKRUL]DWLRQ�SURILOHV�DUH�WUDQVSRUWHG�LQ�WKLV�VWHS��7R�WUDQVSRUW�QHZO\JHQHUDWHG�DFWLYLW\�JURXSV��XVH�WKH�DFWLYLW\�JURXS�WUDQVSRUW�FRQQHFWLRQ�

�� &KRRVH� �DIWHU�WKH�UHSRUW�LV�ILQLVKHG�

�� &KRRVH� �RQ�WKH�IROORZLQJ�VFUHHQ�WR�ILQLVK�WKH�SURFHGXUH�

7

Page 65: Amez 46 all

Chapter 3: Setting Up the Profile Generator

Getting Support from the SAPNet – R/3 Frontend Notes

Release 4.6A/B3–7

*HWWLQJ�6XSSRUW�IURP�WKH�6$31HW�²�5���)URQWHQG�1RWHV

$�VPRRWK�VHFXULW\�LPSOHPHQWDWLRQ�RI�\RXU�SURMHFW�LV�LPSRUWDQW��7KH�WRS�SULRULWLHV�RI�WKH6$31HW�²�5���)URQWHQG�1RWHV��IRUPHUO\�266��DUH�WR�VXSSRUW�\RXU�ZRUN�DQG�VSHHG�XS�\RXULPSOHPHQWDWLRQ��7KH�6$31HW�²�5���)URQWHQG�QRWHV�DUH�DQ�HDV\�WR�XVH��GLUHFWFRPPXQLFDWLRQ�OLQN�WR�6$3�VR�\RX�FDQ�TXLFNO\�DQG�HIILFLHQWO\�REWDLQ�SUREOHP�VROYLQJLQIRUPDWLRQ��6$31HW�²�5���)URQWHQG�QRWHV�JLYHV�\RX�D�IDVWHU�UHVSRQVH�WLPH�E\�DOORZLQJ�\RXWR�E\SDVV�WKH�6$3�KHOS�GHVN�DQG�HQWHU�SUREOHPV�GLUHFWO\�LQWR�RXU�GDWDEDVH�

%\�HQWHULQJ�SUREOHPV�RU�LQTXLULHV�GLUHFWO\�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��\RX�FDQ�< 7DNH�DGYDQWDJH�RI�5���VHUYLFHV��UHJDUGOHVV�RI�WKH�DYDLODELOLW\�DQG�ZRUNORDG�RI�WKH

UHVSRQVLEOH�KHOS�GHVN�SHUVRQQHO< 4XLFNO\�UHSRUW�\RXU�SUREOHPV< 'LUHFWO\�VXEPLW�\RXU�SUREOHPV�WR�ILUVW�OHYHO�FXVWRPHU�VHUYLFH�IRU�SURFHVVLQJ

$FFHVVLQJ�WKH�(UURU�1RWHV�'DWDEDVH

6$31HW�²�5���)URQWHQG�QRWHV�DFWLYHO\�LQYROYHV�\RX�LQ�WKH�SUREOHP�VROYLQJ�SURFHVV�E\JLYLQJ�\RX�GLUHFW�DFFHVV�WR�6$3·V�LQWHUDFWLYH�(UURU�1RWHV�GDWDEDVH��7KLV�GDWDEDVH�FRQWDLQVHUURU�OLVWLQJV�DQG�VROXWLRQV�WR�FRPPRQ�V\VWHP�SUREOHPV��:LWK�WKH�6$31HW�²�5���)URQWHQGQRWHV��\RX�FDQ�YLHZ�WKHVH�VROXWLRQV�ZLWKRXW�VXEPLWWLQJ�D�SUREOHP�PHVVDJH�WR�ILUVW�OHYHOFXVWRPHU�VHUYLFH��'LUHFW�DFFHVV�WR�WKH�(UURU�1RWHV�GDWDEDVH��ZLWK�WKH�6$31HW�²�5��)URQWHQG�QRWHV��DOVR�SURYLGHV�KHOSIXO�WLSV�RQ�DYRLGLQJ�SRWHQWLDO�SUREOHPV�

1RZ�LV�D�JRRG�WLPH�WR�ORRN�DW�WKH�6$31HW�²�5���)URQWHQG�QRWHV�OLVWHG�LQ�DSSHQGL[�$�7KHVH�QRWHV�KHOS�\RX�SUHSDUH�IRU�IXUWKHU�5���VHFXULW\�VHWXS�WDVNV�

<RX�VKRXOG�DOVR�ORRN�LQWR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LI�DQ\�H[SHULHQFHV�RFFXUWKDW�DUH�QRW�FRYHUHG�E\�WKLV�JXLGHERRN�

7R�XVH�6$31HW�¥�5���)URQWHQG�QRWHV�

�� &RQWDFW�\RXU�V\VWHP�DGPLQLVWUDWRU�IRU�DQ\�IXUWKHU�LQIRUPDWLRQ�DERXW�WKH�6$31HW�²5���)URQWHQG�QRWHV��

�� )LQG�RXW�ZKR�DOUHDG\�KDV�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�LQ�\RXUFRPSDQ\�

�� 0DNH�VXUH�\RX�KDYH�DFFHVV�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV��

�� /RJ�RQ�WR�WKH�6$31HW�²�5���)URQWHQG�QRWHV�DQG�EURZVH�WKURXJK�WKH�6$31HW�²�5��)URQWHQG�QRWHV�LQ�DSSHQGL[�$�

Page 66: Amez 46 all

Chapter 3: Setting Up the Profile Generator

Getting Support from the SAPNet – R/3 Frontend Notes

Authorizations Made Easy3–8

3ULQWLQJ�,PSRUWDQW�6$31HW�²�5���)URQWHQG�1RWHV

6LQFH�ZH�UHIHU�WR�FHUWDLQ�6$31HW�²�5���)URQWHQG�QRWHV�LQ�WKLV�JXLGHERRN��SOHDVH�OHDUQ�KRZWR�SULQW�D�QRWH�SURSHUO\��7KH�SULQW�IXQFWLRQ�LV�QRW�VXSSRUWHG�LQ�6$31HW�²�5���)URQWHQGQRWHV��VR�\RX�PXVW�ILUVW�GRZQORDG�WKH�QRWH�DQG�SULQW�LW�ORFDOO\��5HDG�QRWHV�������DQG������WR�IDPLOLDUL]H�\RXUVHOI�ZLWK�GRZQORDGLQJ�DQG�SULQWLQJ�WKH�QRWHV��%HIRUH�\RX�FRQWLQXH��SULQWRXW�WKH�QRWHV�LQ�DSSHQGL[�$�DQG�NHHS�WKHP�DV�KDQG\�UHIHUHQFH�WRROV�

$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�<RXU�5���6\VWHP

$GYDQFH�FRUUHFWLRQV�VKRXOG�EH�DSSOLHG�RQO\�ZLWK�WKH�DSSURYDO�RI�WKH�%DVLV�6\VWHP$GPLQLVWUDWRU�

7KH�5���6\VWHP�QHHGV�FHUWDLQ�FRUUHFWLRQV�WR�SHUIRUP�SURSHUO\��7R�DSSO\�WKHVH�FRUUHFWLRQV�LQDGYDQFH��UHIHU�WR�6$31HW�²�5���)URQWHQG�QRWH�������IRU�WKH�DYDLODELOLW\�RI�WKH�3*�KRWSDFNDJHV�IRU�5HOHDVHV����$�DQG����%�

Page 67: Amez 46 all

4–1

&KDSWHU��� 8VHU�$GPLQLVWUDWLRQ

&RQWHQWV

Overview ..................................................................................................................4–2

System Users ..........................................................................................................4–2

User Groups ............................................................................................................4–5

Authorizations and Authorization Profiles...........................................................4–6

Mass Operations .....................................................................................................4–6

Creating a New User (Client-Specific)...................................................................4–7

Changing a User’s Password ..............................................................................4–10

User Information System .....................................................................................4–12

��

Page 68: Amez 46 all

Chapter 4: User Administration

Overview

Authorizations Made Easy4–2

2YHUYLHZ

<RX�KDYH�WZR�RSWLRQV�WR�VHW�XS�\RXU�XVHU�DGPLQLVWUDWLRQ�< &HQWUDO�8VHU�$GPLQLVWUDWLRQ< &OLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ

,Q�WKLV�FKDSWHU��ZH�RQO\�GHVFULEH�WKH�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��,I�\RX�DUH�XVLQJ�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ��VHH�FKDSWHU�����6HWWLQJ�8S�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�PRUHLQIRUPDWLRQ�

5���DOORZV�\RX�WR�GHILQH�DQG�PDLQWDLQ�XVHUV�DQG�XVHU�DXWKRUL]DWLRQV�E\�JLYLQJ�\RX�SUHFLVHFRQWURO�RYHU�XVHU�DFFHVV��7KH�GHILQLWLRQ�DQG�YDOLGDWLRQ�RI�DXWKRUL]DWLRQ�WHFKQRORJ\�LVLQWHJUDWHG�LQWR�WKH�6$3�GHYHORSPHQW�HQYLURQPHQW�DQG�LV�HDVLO\�DGGHG�WR�FXVWRPHUPRGXOHV�

$OWKRXJK�XVHU�DGPLQLVWUDWLRQ�LV�DQ�RQJRLQJ�SURFHVV��\RX�VKRXOG�QRW�DGPLQLVWHU�\RXU�XVHUVLQ�D�SURGXFWLYH�HQYLURQPHQW��3HUIRUP�XVHU�DGPLQLVWUDWLRQ�WDVNV�LQ�\RXU�'(9�V\VWHP��:KHQ\RX�WUDQVSRUW�WKH�DFWLYLW\�JURXSV��WKH�XVHUV�DUH�DOVR�WUDQVSRUWHG�WKURXJK�WKH�4$6�WR�\RXU35'�V\VWHP��ZKHQHYHU�XVHUV�DQG�DXWKRUL]DWLRQ�REMHFWV�DUH�< &UHDWHG< 'HOHWHG< &KDQJHG< 0RQLWRUHG

+RZHYHU��\RX�PLJKW�KDYH�GLIIHUHQW�XVHUV�LQ�WKH�'(9�DQG�4$6�V\VWHP�WKDW�\RX�GR�QRW�QHHGLQ�\RXU�35'�V\VWHP�ODWHU��IRU�H[DPSOH�D�GHYHORSHU���$Q�DGPLQLVWUDWRU·V�UROH�LQ�WKLV�SURFHVVYDULHV�GHSHQGLQJ�RQ�KRZ�XVHU�DGPLQLVWUDWLRQ�WDVNV�DUH�GHOHJDWHG�

(YHQ�LI�\RX�DUH�XVLQJ�WKH�+5�PRGXOH��XVHU�DGPLQLVWUDWLRQ�VWLOO�QHHGV�WR�EH�VHW�XS��EXWPDLQWHQDQFH�LQ�WKH�ORQJ�UXQ�LQFOXGHV�RWKHU�IDFHWV�

6\VWHP�8VHUV

,Q�FOLHQW�VSHFLILF�XVHU�DGPLQLVWUDWLRQ��XVHUV�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFK�FOLHQW�LQ\RXU�V\VWHP��$�XVHU�GHILQLWLRQ�KDV�PDQ\�RI�WKH�IROORZLQJ�FRPSRQHQWV�< %DVLF�XVHU�GDWD

� 1DPH� 3DVVZRUG� $GGUHVV� &RPSDQ\�LQIRUPDWLRQ

Page 69: Amez 46 all

Chapter 4: User Administration

System Users

Release 4.6A/B4–3

< 8VHU�GHIDXOWV� /RJRQ�ODQJXDJH� 'HIDXOW�SULQWHU� 'DWH�DQG�GHFLPDO�IRUPDWV� 'HIDXOW�WLPH�]RQH

< 8VHU�SURILOH�LQIRUPDWLRQ� 3DUWV�RI�5���D�XVHU�FDQ�DFFHVV� 8VHU�JURXSV� $FWLYH�DQG�H[SLUDWLRQ�GDWHV�RI�D�XVHU·V�DFFRXQW

7KHUH�DUH�WZR�ZD\V�WR�FUHDWH�XVHUV��)LUVW��IURP�VFUDWFK��E\�GHILQLQJ�WKH�YDULRXV�XVHUFRPSRQHQWV��DQG�VHFRQG��E\�FRS\LQJ�DQ�H[LVWLQJ�XVHU��:KHQ�FRS\LQJ�DQ�H[LVWLQJ�XVHU��\RXPD\�DOVR�FRS\�WKH�GHIDXOWV��DGGUHVV��DQG�PHPRU\�SDUDPHWHU�VHWWLQJV�

([WHUQDO�5���8VHUV

([WHUQDO�XVHUV�LQFOXGH�WKRVH�FUHDWHG�IRU�:LQGRZV�17�DFWLYLWLHV��IRU�H[DPSOH�6$36,'!DGP��DGPLQLVWUDWRU��DQG�6$36HUYLFH��6$36,'!��DQG�GDWDEDVH�FRQQHFWLRQV�6$35���GDWDEDVH�DGPLQLVWUDWRU��DQG�64/�XVHUV��

,QWHUQDO�5���8VHUV

,QWHUQDO�XVHUV�DUH�FUHDWHG�DQG�PDLQWDLQHG�LQ�5����(DFK�XVHU�LV�DVVLJQHG�D�XVHU�W\SH�ZKLFKFRQWUROV�KRZ�WKH�XVHU�LQWHUDFWV�ZLWK�5���

,QWHUQDO�XVHU�W\SHV�LQFOXGH�< 'LDORJ< %DWFK�'DWD�&RPPXQLFDWLRQ��%'&�< %DFNJURXQG< &3,&

'LDORJ

7KH�GLDORJ�XVHU�W\SH�KDQGOHV�RQOLQH�WUDQVDFWLRQV�DQG�DSSOLHV�WR�PRVW�XVHUV�LQ�D�FRPSDQ\�'LDORJ�XVHUV�PD\�ORJ�RQ�DQG�LQWHUDFWLYHO\�ZRUN�ZLWK�5����7KHVH�XVHUV�DUH�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV�DQG�UHTXLUH�DXWKRUL]DWLRQ�SURILOHV�DQG�SDVVZRUGV��$OWKRXJK�LW�LV�QRWUHTXLUHG��GLDORJ�XVHUV�VKRXOG�EH�DVVLJQHG�WR�D�XVHU�JURXS�

%DWFK�'DWD�&RPPXQLFDWLRQ

7KH�EDWFK�GDWD�FRPPXQLFDWLRQ��%'&�RU�EDWFK�LQSXW��XVHU�W\SH�LV�XVHG�IRU�DXWKRUL]DWLRQFKHFNV�ZKHQ�SURFHVVLQJ�D�EDWFK�LQSXW�VHVVLRQ��7KHVH�XVHUV�FDQQRW�ORJ�RQ�RU�ZRUNLQWHUDFWLYHO\�DQG�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

%DFNJURXQG

7KH�EDFNJURXQG�XVHU�W\SH�UXQV�EDFNJURXQG�MREV��7KHVH�XVHUV�FDQQRW�ORJ�RQ�DQG�ZRUNLQWHUDFWLYHO\��7KH�DGPLQLVWUDWRU�FDQ�FUHDWH�EDFNJURXQG�XVHUV�ZLWK�WKH�QHFHVVDU\DXWKRUL]DWLRQV�WR�SHUIRUP�D�VHULHV�RI�WDVNV��7R�GHILQH�WKH�EDFNJURXQG�MREV��FKDQJH�WKH�XVHUILHOG�WR�WKH�EDFNJURXQG�XVHU�QDPH�\RX�FUHDWHG��$OO�DXWKRUL]DWLRQ�FKHFNV�JR�DJDLQVW�WKH

Page 70: Amez 46 all

Chapter 4: User Administration

System Users

Authorizations Made Easy4–4

EDFNJURXQG�XVHU�UDWKHU�WKDQ�WKH�XVHU�FUHDWLQJ�WKH�MRE��$OWKRXJK�EDFNJURXQG�XVHUV�DUHXQDIIHFWHG�E\�SDVVZRUG�FRQWURO�SDUDPHWHUV��IRU�H[DPSOH�SDVVZRUG�H[SLUDWLRQV�RU�FKDUDFWHUOHQJWK���WKHVH�XVHUV�DUH�VXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

&3,&

7KH�&3,&�XVHU�LV�GHOLYHUHG�LQ�FOLHQW�����ZLWK�QR�DXWKRUL]DWLRQV�DQG�ORJV�RQ�XVLQJ�WKH�&3,&LQWHUIDFH��7KLV�LQWHUIDFH�GRHV�QRW�ZRUN�LQWHUDFWLYHO\�ZLWK�5����7KH�&3,&�XVHU�UHFHLYHV�UHWXUQFRGHV�IURP�H[WHUQDO�SURJUDPV�DQG�WKH�VWDWLVWLF�FROOHFWRUV��UHIHU�WR�6$31HW�²�5���)URQWHQGQRWH��������6$3&3,&�LV�QR�ORQJHU�UHTXLUHG�IRU�WKH�WUDQVDFWLRQ�60���

7KH�&3,&�XVHU�UHTXLUHV�DQ�DXWKRUL]DWLRQ�WR�SHUIRUP�WKH�QHFHVVDU\�DFWLYLWLHV�LQ�5���DQG�LVVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�

6SHFLDO�5���8VHUV

6$3

,Q�FOLHQWV�����DQG������WKH�5���6\VWHP�LQFOXGHV�WKH�GHIDXOW�VXSHUXVHU�6$3 ��'XULQJLQVWDOODWLRQ��D�XVHU�PDVWHU�UHFRUG�LV�GHILQHG�IRU�6$3 ���+RZHYHU��6$3 �LV�SURJUDPPHG�LQ5���DQG�GRHV�QRW�UHTXLUH�D�XVHU�PDVWHU�UHFRUG��$IWHU�LQVWDOODWLRQ��RQFH�WKH�6$3 �XVHU�PDVWHUUHFRUG�EHFRPHV�DYDLODEOH��XVH�WKH�SDVVZRUG�06071992��,I�WKH�6$3 �XVHU�PDVWHU�UHFRUG�LVGHOHWHG�DQG�D�XVHU�ORJV�RQ�DJDLQ�DV�SAP*��ZLWK�WKH�LQLWLDO�SDVVZRUG�PASS��WKHQ�6$3 �LV�QRWVXEMHFW�WR�DXWKRUL]DWLRQ�FKHFNV�DQG�KDV�WKH�SDVVZRUG�PASS��ZKLFK�FDQQRW�EH�FKDQJHG�

'',&

7KH�'',&�XVHU�PDLQWDLQV�WKH�$%$3�'LFWLRQDU\�DQG�WKH�VRIWZDUH�ORJLVWLFV��$�'',&�XVHUPDVWHU�UHFRUG�LV�DXWRPDWLFDOO\�FUHDWHG�LQ�FOLHQWV�����DQG�����ZKHQ�5���LV�LQVWDOOHG�DQG�KDVVWDQGDUG�SDVVZRUG�19920706��7KLV�LV�WKH�RQO\�XVHU�WKDW�FDQ�ORJ�RQ�WR�5���GXULQJ�D�QHZUHOHDVH�LQVWDOODWLRQ��3URWHFW�WKH�'',&�XVHU�IURP�XQDXWKRUL]HG�DFFHVV�E\�FKDQJLQJ�WKH�LQLWLDOSDVVZRUG�LQ�FOLHQWV�����DQG������7KLV�XVHU�LV�UHTXLUHG�IRU�FHUWDLQ�LQVWDOODWLRQ�DQG�VHWXSWDVNV��VR�LW�VKRXOG�QRW�EH�GHOHWHG�

(DUO\:DWFK

7KH�(DUO\:DWFK�XVHU�LV�RQO\�GHOLYHUHG�LQ�FOLHQW�����ZLWK�WKH�LQLWLDO�SDVVZRUG�SUPPORT�$FFHVV�LV�OLPLWHG�WR�PRQLWRULQJ�DQG�SHUIRUPDQFH�GDWD��7KH�(DUO\:DWFK�XVHU�LV�XVHG�E\6$3·V�(DUO\:DWFK�H[SHUWV��7KLV�XVHU�VKRXOG�QRW�EH�GHOHWHG��DQG�WKH�SDVVZRUG�VKRXOG�EHFKDQJHG��(DUO\:DWFK�VKRXOG�QRW�EH�XVHG�IRU�DQ\�SXUSRVH�RWKHU�WKDQ�(DUO\:DWFK�IXQFWLRQV�

Page 71: Amez 46 all

Chapter 4: User Administration

User Groups

Release 4.6A/B4–5

&UHDWLQJ�8VHUV

,I�\RX�GR�QRW�XVH�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IXQFWLRQ��WKH�XVHU�PDVWHU�UHFRUGV�DQGDXWKRUL]DWLRQ�FRPSRQHQWV�DUH�FOLHQW�VSHFLILF�DQG�PXVW�EH�VHSDUDWHO\�GHILQHG�IRU�HDFKV\VWHP�FOLHQW�

8VHUV�DUH�FUHDWHG�HLWKHU�IURP�VFUDWFK��XVLQJ�WUDQVDFWLRQ�68����RU�IURP�D�FRS\�RI�DQ�H[LVWLQJXVHU�E\�< 8VLQJ�WUDQVDFWLRQ�68��

< &UHDWLQJ�D�WHPSODWH�XVHU< &RS\LQJ�LW�WR�RWKHU�VLPLODU�XVHUV< 0DQXDOO\�HQWHULQJ�HDFK�SDVVZRUG

7KH�KLHUDUFKLFDO�VHFXULW\�HIIHFW�RI�XVHU�JURXSV�HQDEOHV�WKH�DGPLQLVWUDWRU�WR�GLVWULEXWH�XVHUPDLQWHQDQFH�WDVNV�DQG�PDLQWDLQ�KLJK�VHFXULW\��:LWKLQ�D�VSHFLILF�JURXS��VHFXULW\�WDVNV�FDQ�EHGLVWULEXWHG�LQ�VXFK�D�ZD\�WKDW�WKUHH�SHRSOH�DUH�UHTXLUHG�WR�FUHDWH�XVHUV�DQG�PDQDJH�DFWLYLW\JURXSV�DQG�DXWKRUL]DWLRQV��7KXV��XVHU�DQG�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�FDQ�RQO\�FRPSOHWHFHUWDLQ�SDUWV�RI�WKH�UHTXLUHG�WDVNV��7KLV�SURFHVV�HQVXUHV�WKDW�QR�RQH�SHUVRQ�FDQ�FLUFXPYHQW5��·V�DXWKRUL]DWLRQ�VFKHPH��,I�D�FRPSDQ\�KDV�D�FHQWUDOL]HG�RUJDQL]DWLRQDO�VWUXFWXUH��DOOPDLQWHQDQFH�WDVNV�PD\�QHHG�WR�EH�SHUIRUPHG�E\�D�VLQJOH�XVHU��WKH�VR�FDOOHG�VXSHUXVHU�

7R�DOORZ�XVHUV�WR�VHH�WKHLU�RZQ�XVHU�PDVWHU�UHFRUGV��XVH�WUDQVDFWLRQ�68��'�

)RU�VHFXULW\�UHDVRQV��WKH�UHVSRQVLELOLW\�IRU�WKH�IROORZLQJ�PDLQWHQDQFH�WDVNV�VKRXOG�EHGLVWULEXWHG�DPRQJ�WKUHH�GLIIHUHQW�DGPLQLVWUDWRUV��VHH�FKDSWHU���IRU�DGGLWLRQDOLQIRUPDWLRQ��

8VHU�*URXSV

,QVWHDG�RI�XVLQJ�XVHU�JURXSV�WR�RQO\�GLVWULEXWH�XVHU�PDLQWHQDQFH�DPRQJ�VHYHUDODGPLQLVWUDWRUV��\RX�FDQ�QRZ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV��1RWH�WKDW�RQH�JURXSLV�VWLOO�WKH�SULPDU\�JURXS�IRU�WKH�DXWKRUL]DWLRQ�FKHFN��7KLV�LV�WKH�JURXS�WKDW�DSSHDUV�LQ�WKHWRS�ILHOG�RQ�WKH�/RJRQ�GDWD�WDE�LQ�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ��7KH�FDWHJRU\�8VHU�JURXSFDQ�EH�XVHG�DV�D�EDVLV�IRU�EHWWHU�GLVWULEXWLRQ�RI�XVHU�GDWD��WKXV�LQFUHDVLQJ�WKH�VSHHG�RI&HQWUDO�8VHU�$GPLQLVWUDWLRQ��<RX�PD\�XVH�DQ\�QDPLQJ�FRQYHQWLRQ�

8VHU�JURXSV�HQDEOH�WKH�DGPLQLVWUDWRU�WR�SURYLGH�DSSOLFDWLRQ�PDQDJHUV�ZLWK�WKH�ULJKWVUHTXLUHG�WR�FRQWURO�WKHLU�XVHUV��7KXV��WKHVH�PDQDJHUV�FDQ�FRQWURO�DOO�XVHUV�LQ�WKHLU�XVHUJURXSV�DQG�XVHUV�QRW�\HW�DVVLJQHG�WR�D�XVHU�JURXS��+RZHYHU��DSSOLFDWLRQ�PDQDJHUV�FDQQRWFKDQJH�XVHUV�LQ�RWKHU�XVHU�JURXSV�

$OWKRXJK�D�XVHU�JURXS�DIILOLDWLRQ�LV�QRW�UHTXLUHG�ZKHQ�\RX�FUHDWH�XVHUV��WKLV�DIILOLDWLRQ�LVQHFHVVDU\�WR�GHOHJDWH�XVHU�PDLQWHQDQFH�WDVNV�WR�DSSOLFDWLRQ�PDQDJHUV�DQG�VWDII��/DWHU��ZHVKRZ�KRZ�WR�GLVWULEXWH�XVHU�DGPLQLVWUDWLRQ�WDVNV�WR�WKH�DSSURSULDWH�DSSOLFDWLRQ�SHUVRQQHO�

Page 72: Amez 46 all

Chapter 4: User Administration

Authorizations and Authorization Profiles

Authorizations Made Easy4–6

8VHU�JURXSV�DUH�QRUPDOO\�EDVHG�RQ�WKH�UHTXLUHPHQWV�GLFWDWHG�E\�WKH�GLIIHUHQW�DSSOLFDWLRQJURXSV��7KH�QXPEHU�RI�XVHUV�LQ�HDFK�XVHU�JURXS�DOVR�LQIOXHQFHV�WKHVH�JURXSV��6LQFH�XVHUJURXSV�GLVWULEXWH�XVHU�DGPLQLVWUDWLYH�WDVNV��\RXU�XVHU�JURXSV�ZLOO�EH�EDVHG�RQ�WKH�DYDLODEOHRUJDQL]DWLRQDO�VXSSRUW�VWUXFWXUH��$�IHZ�WKLQJV�WR�UHPHPEHU�ZKHQ�ZRUNLQJ�ZLWK�XVHUJURXSV�DUH�WKDW�

< 8VHU�JURXSV�DUH�FUHDWHG�ZLWK�WUDQVDFWLRQ�68*5��7RROV�→�$GPLQLVWUDWLRQ�→�8VHU0DLQWHQDQFH�→�0DLQWDLQ�8VHUV�*URXSV��

< 8VHU�JURXSV�DIIHFW�QRWKLQJ�XQWLO�\RX�VHW�XS�\RXU�JURXS�DGPLQLVWUDWRUV�ZLWKLQ�D�XVHUJURXS�

< (DFK�XVHU�FDQ�EHORQJ�WR�PDQ\�XVHU�JURXSV�< 8VHU�JURXSV�FDQ�EH�PDLQWDLQHG�EHIRUH�WKH\�DUH�DVVLJQHG�WR�XVHUV�

$XWKRUL]DWLRQV�DQG�$XWKRUL]DWLRQ�3URILOHV

$XWKRUL]DWLRQ�SURILOHV�DOORZ�\RX�WR�RUJDQL]H�DFFHVV�SULYLOHJHV�E\�WDVN�RU�MRE�IXQFWLRQ�6SHFLILFDOO\��WKLV�SURILOH�FRQWDLQV�WKH�DFFHVV�SULYLOHJHV�QHHGHG�WR�SHUIRUP�SDUWLFXODU�MREV�VXFK�DV�GDWD�HQWU\�RU�DSSOLFDWLRQ�PDLQWHQDQFH��7R�DXWKRUL]H�D�XVHU�IRU�D�MRE��\RX�RQO\�QHHGWR�JLYH�WKH�XVHU�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�SURILOH��7KH�3URILOH�*HQHUDWRU��3*�VLPSOLILHV�WKH�WDVN�RI�VHWWLQJ�XS�DXWKRUL]DWLRQ�SURILOHV�

0DVV�2SHUDWLRQV

7KH�5���6\VWHP�SURYLGHV�VHYHUDO�XWLOLWLHV�WR�DGPLQLVWHU�DOO��RU�D�VHOHFWHG�VHW��RI�XVHUV�&KDQJHV�PDGH�IRU�RQH�XVHU�LQ�XVHU�DGPLQLVWUDWLRQ�FDQ�DOVR�EH�PDGH�IRU�D�ODUJH�QXPEHU�RIXVHUV�DOO�DW�RQFH��<RX�FDQ�FKDQJH�ORJRQ�GDWD��GHIDXOW�YDOXHV��SDUDPHWHUV��DFWLYLW\�JURXSV�DQG�SURILOHV�IRU�D�SDUWLFXODU�VHW�RI�XVHUV��IRU�H[DPSOH��DOO�XVHUV�RI�D�XVHU�JURXS��

7R�DFFHVV�WKH�PDVV�FKDQJHV�VFUHHQ��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QYLURQPHQW�→�0DVVFKDQJHV�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��E\�PDNLQJ�PDVV�FKDQJHV�LQ�WKH�FHQWUDOV\VWHP���WKH�SURILOHV�DQG�DFWLYLW\�JURXSV�DUH�GLVSOD\HG�DFFRUGLQJ�WR�WKH�UHOHYDQW�V\VWHP�

7KH�PDVV�FKDQJH�IXQFWLRQV�RQ�WKH�LQLWLDO�VFUHHQ�DIIHFW�WKH�XVHU�GDWD�RI�DOO�GLVSOD\HG�XVHUV�XQOHVV�\RX�KDYH�VHOHFWHG�VSHFLILF�XVHUV�

)RU�HYHU\�FKDQJH�RQ�WKH�$GGUHVV��/RJRQ�GDWD��DQG�'HIDXOW�YDOXHV�WDEV��\RX�PXVW�FKRRVH&KDQJH��7KLV�HQVXUHV�WKDW�\RXU�FKDQJHV��VXFK�DV�GHOHWLRQ�RI�ILHOG�FRQWHQWV��WDNH�HIIHFW�IRUWKH�FRUUHVSRQGLQJ�ILHOGV�

Page 73: Amez 46 all

Chapter 4: User Administration

Creating a New User (Client-Specific)

Release 4.6A/B4–7

&UHDWLQJ�D�1HZ�8VHU��&OLHQW�6SHFLILF�

'R�QRW�FUHDWH�RU�FKDQJH�XVHUV�LQ�FOLHQWV�����RU������7R�FUHDWH�RWKHU�QHZ�FOLHQWV��PDNH�D�FRS\�RIFOLHQW������VWDQGDUG�6$3�FOLHQW��

�� /RJ�RQ�WR�WKH�6$3�FOLHQW�ZKHUH�\RX�ZLVK�WR�FUHDWH�D�QHZ�XVHU�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→8VHU�PDLQWHQDQFH�→�8VHUV��

�� ,Q�WKH�8VHU�ILHOG� HQWHU�WKH�QHZ�XVHUQDPH�

�� &KRRVH� �

�� (QWHU�WKH�UHTXLUHG�GDWD�LQWR�WKHILHOGV��<RX�FDQ�DOZD\V�FRPH�EDFNDQG�FKDQJH�WKH�GDWD�ODWHU�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

7KH�EXWWRQ�2WKHU�FRPPXQLFDWLRQ��OLQNV�\RX�WR�WKH�FHQWUDO�DGGUHVVDGPLQLVWUDWLRQ�IXQFWLRQDOLW\��7KLVIXQFWLRQDOLW\�LV�QRW�FRYHUHG�LQ�WKLVERRN�

3

4

5

6

Tip

Page 74: Amez 46 all

Chapter 4: User Administration

Creating a New User (Client-Specific)

Authorizations Made Easy4–8

�� (QWHU�DQ�,QLWLDO�SDVVZRUG��IRUH[DPSOH��init)�ZKLFK�WKH�XVHUXVHV�IRU�WKH�ILUVW�ORJ�RQ��'XULQJ�WKDWILUVW�ORJRQ��WKH�XVHU�FKRRVHV�D�QHZSDVVZRUG�

�� 5HHQWHU�WKH�SDVVZRUG�WR�YHULI\�WKHVSHOOLQJ�LQ�WKH�ILHOG�5HSHDW�SDVVZRUG�

�� <RX�PD\�HGLW�RWKHU�/RJRQ�GDWDILHOGV��VXFK�DV�8VHU�JURXS�RU�8VHUW\SH�DV�QHHGHG��VHH�WKH�7HFK7DONEHORZ��

��� &KRRVH�WKH�'HIDXOWV�WDE�

/RJRQ�'DWD�)LHOG�'HILQLWLRQV

8VHU�JURXS�IRU�DXWKRUL]DWLRQ�FKHFN

$VVLJQLQJ�XVHUV�WR�JURXSV�DOORZV�WKH�XVHU�PDLQWHQDQFH�WDVN�WR�EH�GLVWULEXWHG�DPRQJ�VHYHUDOXVHU�DGPLQLVWUDWRUV��<RX�FDQ�DVVLJQ�XVHUV�WR�RQH�RU�PRUH�XVHU�JURXSV�

9DOLG�IURP�9DOLG�WR

7KHVH�ILHOGV�DUH�XVHIXO�LI�\RX�DUH�FUHDWLQJ�D�WHPSRUDU\�XVHU��VXFK�DV�D�FRQWUDFWRU��7RLPPHGLDWHO\�DFWLYDWH�WKH�XVHU��OHDYH�WKH�9DOLG�IURP�ILHOG�EODQN��)RU�D�XVHU�ZLWK�QR�DQWLFLSDWHGWHUPLQDWLRQ�GDWH��OHDYH�WKH�9DOLG�WR�ILHOG�EODQN��ZKLFK�DOORZV�LQGHILQLWH�DFFHVV�

$FFRXQWLQJ�QXPEHU

7KLV�ILHOG�LV�IRU�D�IUHHO\�VHOHFWDEOH�DFFRXQWLQJ�QDPH�RU�QXPEHU��,I�\RX�XVH�WKH�6$3�DFFRXQWLQJV\VWHP��WKH�XVHU·V�V\VWHP�XVDJH�LV�DVVLJQHG�WR�WKLV�DFFRXQW��7KH�DFFRXQWLQJ�QDPH�RU�QXPEHUPD\�EH�XQLTXH�WR�HDFK�XVHU�RU�FDQ�EH�VKDUHG�DPRQJ�JURXSV�RI�XVHUV�

&RVW�&HQWHU

8VH�WKLV�ILHOG�IRU�WKH�XVHU·V�FRVW�FHQWHU�QXPEHU�

'LDORJ

6HOHFW�WKLV�XVHU�W\SH�IRU�QRUPDO�GLDORJ�XVHUV�

%'&

:KHQ�\RX�SURFHVV�D�EDWFK�LQSXW�VHVVLRQ��VHOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�RQO\�XVHG�IRUWKH�DXWKRUL]DWLRQ�FKHFN�

87

9

10

Page 75: Amez 46 all

Chapter 4: User Administration

Creating a New User (Client-Specific)

Release 4.6A/B4–9

%DFNJURXQG

6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�EDWFK�UXQV�

&3,&

6HOHFW�WKLV�XVHU�W\SH�IRU�XVHUV�ZKR�DUH�DXWKRUL]HG�WR�H[HFXWH�&3,�&�FDOOV�

��� <RX�PD\�HLWKHU�HQWHU�D�6WDUW0HQXRU�OHDYH�WKH�ILHOG�EODQN�

��� (QWHU�D�ODQJXDJH�FRGH�LQ�WKH�/RJRQODQJXDJH�ILHOG�

��� (QWHU�D�GHIDXOW�2XWSXW'HYLFH��WKHSULQWHU�RU�ILOH�WR�ZKLFK�WKH�XVHU�ZLOODXWRPDWLFDOO\�SULQW��

��� :H�UHFRPPHQG�VHOHFWLQJ�2XWSXWLPPHGLDWHO\�DQG�'HOHWH�DIWHU�RXWSXW�

2XWSXW�LPPHGLDWHO\�UHOHDVHV�VSRROUHTXHVWV��2WKHUZLVH��VSRRO�UHTXHVWVVWD\�LQ�WKH�VSRRO�V\VWHP�XQWLOPDQXDOO\�UHOHDVHG��7KH�'HOHWH�DIWHURXWSXW�RSWLRQ�SUHYHQWV�VSRROUHTXHVWV�IURP�EHLQJ�UHWDLQHG�DIWHUSULQWLQJ�

��� 6HOHFW�WKH�GHVLUHG�'HFLPDO�QRWDWLRQDQG�'DWH�IRUPDW�

��� &KRRVH� �

)RU�HDFK�XVHU��ILHOG�GHIDXOWV�RU�SDUDPHWHUV�VWRUH�GHIDXOW�YDOXHV�IRU�5���ILHOGV��:KHQ�D�ILHOG�LVGLVSOD\HG��WKH�SDUDPHWHU·V�YDOXH��LI�DQ\��LV�D�GHIDXOW�YDOXH��8VHU�SDUDPHWHUV�DUH�RSWLRQDO�DQGGR�QRW�\HW�QHHG�WR�EH�GHILQHG�

7R�DVVLJQ�DQ�DXWKRUL]DWLRQ�SURILOH�WR�\RXU�QHZ�XVHU�PDVWHU�UHFRUG�

�� 6HOHFW�D�XVHU�UROH�WHPSODWH�RU�FUHDWH�DQ�DFWLYLW\�JURXS�\RXUVHOI�

�� *HQHUDWH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXSV�

�� $VVLJQ�DFWLYLW\�JURXSV�WR�QHZ�XVHUV�DQG�WUDQVIHU�SURILOHV�

)RU�PRUH�LQIRUPDWLRQ�DERXW�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV��VHH�FKDSWHU���3UHSDULQJ�WKH�5��(QYLURQPHQW�IRU�*R�/LYH�

15

11

12

14

13

17

Page 76: Amez 46 all

Chapter 4: User Administration

Changing a User’s Password

Authorizations Made Easy4–10

&KDQJLQJ�D�8VHU·V�3DVVZRUG

8VHUV�FDQ�FKDQJH�WKHLU�RZQ�SDVVZRUGV�DQG�DGPLQLVWUDWRUV�FDQ�FKDQJH�DQ\�XVHU·V�SDVVZRUG�8VHUV�PD\�RQO\�FKDQJH�WKHLU�SDVVZRUGV�RQFH�D�GD\��KRZHYHU��DQ�DGPLQLVWUDWRU�FDQ�FKDQJHSDVVZRUGV�ZKHQHYHU�UHTXLUHG��$Q�DGPLQLVWUDWRU�PD\�QHHG�WR�FKDQJH�SDVVZRUGV�DIWHU�DQHZ�LQVWDOODWLRQ��ZKHQ�WKH�GHIDXOW�SDVVZRUG�VKRXOG�EH�FKDQJHG�IRU�VHFXULW\�SXUSRVHV���RUZKHQ�XVHUV�ORVH�RU�IRUJHW�WKHLU�SDVVZRUGV��:KHQ�DQ�DGPLQLVWUDWRU�FKDQJHV�D�SDVVZRUG��WKHQHZ�SDVVZRUG�LV�RQO\�WHPSRUDU\��$W�WKH�QH[W�ORJRQ��WKH�XVHU�HQWHUV�WKLV�SDVVZRUG�DQG�WKHQVHOHFWV�D�SHUPDQHQW�RQH��5HIHU�WR�WKH�WDEOH�3DVVZRUG�5HTXLUHPHQWV�RQ�WKH�QH[W�SDJH�IRUSDVVZRUG�UHTXLUHPHQWV�

,I�\RX�GR�QRW�XVH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��WKH�XVHUV�DUH�FOLHQW�VSHFLILF��%HIRUHSURFHHGLQJ��EH�VXUH�WKDW�\RX�DUH�ORJJHG�RQ�WR�WKH�6$3�FOLHQW�WKDW�FRQWDLQV�WKH�XVHU�ZKRVHSDVVZRUG�\RX�ZDQW�WR�FKDQJH�

�� 7R�FKDQJH�D�XVHU·V�SDVVZRUG��LQ�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��

�� ,Q�8VHU��HQWHU�WKH�QDPH�RI�WKH�XVHUZKRVH�SDVVZRUG�\RX�ZRXOG�OLNH�WRFKDQJH�

�� &KRRVH� �

�� (QWHU�WKH�QHZ�LQLWLDO�SDVVZRUG��IRUH[DPSOH��init��DQG�UHHQWHU�WKHSDVVZRUG�IRU�YHULILFDWLRQ�LQ�WKHQH[W�OLQH�

�� &KRRVH� �&RS\�WR�FKDQJH�WKHSDVVZRUG�

3

2

4

5

Page 77: Amez 46 all

Chapter 4: User Administration

Changing a User’s Password

Release 4.6A/B4–11

3DVVZRUG�5HTXLUHPHQWV

7KH�IROORZLQJ�WDEOH�OLVWV�WKH�SDVVZRUG�UHTXLUHPHQWV��$GGLWLRQDOO\��LW�ZLOO�KHOS�\RXGHWHUPLQH�LI�WKHVH�UHTXLUHPHQWV�FDQ�EH�FXVWRPL]HG��$SSHQGL[�&�DOVR�OLVWV�LPSRUWDQW�V\VWHPSURILOH�SDUDPHWHUV�WR�FXVWRPL]H�SDVVZRUG�VHWWLQJV�

3DVVZRUG�5HTXLUHPHQWV 'HIDXOW 2SWLRQV

0LQLPXP�OHQJWK�LV�WKUHH�FKDUDFWHUV 0LQLPXP�OHQJWK�FDQEH�LQFUHDVHG�

([SLUDWLRQ 3DVVZRUG�PXVWQRW�EH�FKDQJHG

1XPEHU�RI�GD\V�DIWHUZKLFK�D�SDVVZRUGPXVW�EH�FKDQJHG�FDQEH�VHW�

3DVVZRUG�PD\�QRW�EH�VHW�WR�DQ\�YDOXHLQ�D�ORFNRXW�OLVW

1R�SDVVZRUGVDUH�EORFNHGRWKHU�WKDQ�3$66DQG�6$3

&DQ�EH�FXVWRPL]HG�

)LUVW�FKDUDFWHU�PD\�QRW�EH�DQH[FODPDWLRQ�SRLQW�����RU�TXHVWLRQ�PDUN�"��

)L[HG�LQ�WKH�5��6\VWHP

)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�DSSHDU�LQWKH�VDPH�VHTXHQFH�LQ�WKH�XVHU�,'�

)L[HG�LQ�WKH�5��6\VWHP

)LUVW�WKUHH�FKDUDFWHUV�PD\�QRW�EHLGHQWLFDO�

)L[HG�LQ�WKH�5��6\VWHP

6SDFH�FKDUDFWHU�QRW�DOORZHG�ZLWKLQ�ILUVWWKUHH�FKDUDFWHUV�

)L[HG�LQ�WKH�5��6\VWHP

3DVVZRUG�PD\�QRW�EH�PASS�RU�SAP*� )L[HG�LQ�WKH�5��6\VWHP

$Q\�NH\ERDUG�FKDUDFWHU�LV�DOORZHG�LQ�DSDVVZRUG��3DVVZRUGV�DUH�QRW�FDVH�VHQVLWLYH��QR�GLVWLQFWLRQ�LV�PDGHEHWZHHQ�XSSHU��DQG�ORZHUFDVH�OHWWHUV�

)L[HG�LQ�WKH�5��6\VWHP

8VHUV�FDQ�FKDQJH�WKHLU�SDVVZRUGV�RQO\RQFH�D�GD\��7KLV�UHVWULFWLRQ�GRHV�QRWDSSO\�WR�XVHU�DGPLQLVWUDWRUV�

)L[HG�LQ�WKH�5��6\VWHP

$�SDVVZRUG�PD\�QRW�EH�FKDQJHG�EDFNWR�D�XVHU·V�SUHYLRXV�ILYH�SDVVZRUGV�7KLV�UHVWULFWLRQ�GRHV�QRW�DSSO\�WR�XVHUDGPLQLVWUDWRUV�

)L[HG�LQ�WKH�5��6\VWHP

Page 78: Amez 46 all

Chapter 4: User Administration

User Information System

Authorizations Made Easy4–12

8VHU�,QIRUPDWLRQ�6\VWHP

,Q�WKH�8VHU�,QIRUPDWLRQ�6\VWHP��\RX�KDYH�WKH�RSWLRQ�WR�UXQ�GLIIHUHQW�UHSRUWV�WR�REWDLQLQIRUPDWLRQ�RQ�DOO�UHODWHG�GDWD�FRQFHUQLQJ�XVHUV��7KHVH�UHSRUWV�DUH�DOO�LQWHJUDWHG�LQ�WKHPHQX�WUHH�DQG�FDQ�EH�VWDUWHG�GLUHFWO\�IURP�WKHUH�

,QIRUPDWLRQ�LV�DYDLODEOH�IRU�WKH�IROORZLQJ�FDWHJRULHV�< 8VHU< 3URILOHV< $XWKRUL]DWLRQ�REMHFWV< $XWKRUL]DWLRQV< $FWLYLW\�JURXSV< 7UDQVDFWLRQV< &RPSDULVRQV< :KHUH�XVHG�OLVW< &KDQJH�GRFXPHQWV

5HWULHYLQJ�WKH�LQIRUPDWLRQ�LV�EDVLFDOO\�WKH�VDPH�IRU�DOO�FDWHJRULHV��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�LW�ZRUNV��7R�JHW�LQIRUPDWLRQ�IRU�D�GLIIHUHQW�FDWHJRU\��UXQ�WKHFRUUHVSRQGLQJ�UHSRUW�ZLWK�\RXU�VSHFLILF�UHTXLUHPHQWV�

Page 79: Amez 46 all

Chapter 4: User Administration

User Information System

Release 4.6A/B

([DPSOH��)LQG�RXW�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQ�D�VSHFLILF�WUDQVDFWLRQ�

�� ,Q�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP��,QWKLV�PHQX�DUHD�WKHUH�DUH�VHYHUDO�GLIIHUHQW�UHSRUWV�WR�FKRRVH�IURP��7R�VHH�ZKLFK�XVHUV�DUH�DOORZHG�WR�UXQD�SDUWLFXODU�WUDQVDFWLRQ��\RX�PD\�FKRRVH�DQ\�WUDQVDFWLRQ�FRGH�\RX�DUH�LQWHUHVWHG�LQ�

�� ,Q�WKH�,QIRUPDWLRQ�6\VWHP�PHQXDUHD��GRXEOH�FOLFN�%\�WUDQVDFWLRQDXWKRUL]DWLRQV�

�� (QWHU�D�WUDQVDFWLRQ�FRGH�WRGHWHUPLQH�ZKLFK�XVHUV�KDYH�DFFHVVWR�WKDW�WUDQVDFWLRQ��IRU�H[DPSOH�FB01��

�� &KRRVH� �WR�VWDUW�WKH�UHSRUW�

�� $�WDEOH�DSSHDUV�OLVWLQJ�DOO�WKH�XVHUVDOORZHG�WR�UXQ�WKDW�WUDQVDFWLRQ�

�� &KRRVH� �LI�\RX�ZLVK�WR�UHWXUQDQG�UHYLHZ�D�GLIIHUHQW�WUDQVDFWLRQFRGH�

2

3

6

5

4

;

4–13

;;;;;;

Page 80: Amez 46 all

Chapter 4: User Administration

User Information System

Authorizations Made Easy4–14

Page 81: Amez 46 all

5–1

&KDSWHU��� 8VHU�5ROH�7HPSODWHV

&RQWHQWV

Overview ..................................................................................................................5–2

What Are User Role Templates? ...........................................................................5–2

User Menu................................................................................................................5–2

How to Work with User Role Templates ...............................................................5–3

Tips for an Administrator .....................................................................................5–35

Available User Role Templates............................................................................5–40

��

Page 82: Amez 46 all

Chapter 5: User Role Templates

Overview

Authorizations Made Easy5–2

2YHUYLHZ

,Q�WKLV�FKDSWHU��ZH�GHVFULEH�KRZ�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV�DQG�VHW�XS�\RXU�DFWLYLW\JURXSV��)RU�PRUH�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�ZLWK�WKH�DFWLYLW\�JURXSV�DQG�XVHU�UROHWHPSODWHV�ZLWK�WKH�3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�

:KDW�$UH�8VHU�5ROH�7HPSODWHV"

6$3�GHOLYHUV�PRUH�WKDQ�����XVHU�UROH�WHPSODWHV��IRUPHUO\�NQRZQ�DV�SUHGHILQHG�DFWLYLW\JURXSV���ZKLFK�FDQ�EH�GLUHFWO\�DVVLJQHG�WR�XVHUV��7KHVH�XVHU�UROH�WHPSODWHV�FRQVLVW�RIFRPSRVLWH�DFWLYLW\�JURXSV�RU�VLQJOH�DFWLYLW\�JURXSV�ZKLFK�DUH�SUHGHILQHG�ZLWK�WUDQVDFWLRQVDQG�DXWKRUL]DWLRQV��7KHVH�DFWLYLW\�JURXSV�DUH�FUHDWHG�E\�DSSOLFDWLRQ�FRQVXOWDQWV�LQFRQMXQFWLRQ�ZLWK�FXVWRPHUV�WR�IXOILOO�WKH�PRVW�VWULQJHQW�UHTXLUHPHQWV��8VHU�UROHV�DUHDVVLJQHG�LQGLYLGXDO�XVHUV��:KHQ�XVHUV�ORJ�RQ�WR�WKH�5���6\VWHP�WKH\�RQO\�VHH�WKH�SDUW�RI�WKH6$3�PHQX�ZKLFK�LV�UHTXLUHG�WR�IXOILOO�WKHLU�UROH�WDVNV��7KLV�LQGLYLGXDO�PHQX�LV�FDOOHG�WKHXVHU�PHQX��8VHUV�FDQ�DUUDQJH�WKH�VWUXFWXUH�RI�WKHLU�PHQX�DQG�KDYH�WKH�RSWLRQ�WR�DGGIUHTXHQWO\�XVHG�WUDQVDFWLRQV�WR�D�SHUVRQDO�IDYRULWHV�IROGHU��7KH\�FDQ�DOVR�DGG�ZHE�OLQNV�DQGOLQNV�WR�ORFDO�GRFXPHQWV��IRU�H[DPSOH�0LFURVRIW�:RUG�RU�([FHO�ILOHV�

7R�ZRUN�ZLWK�WKHVH�XVHU�UROH�WHPSODWHV��XVH�WKH�WUDQVDFWLRQ�3)&*�ZKLFK�LV�NQRZQ�DV�WKH3URILOH�*HQHUDWRU��3*���7KH�XVHU�UROH�WHPSODWHV�DUH�VWDQGDUG�GHOLYHUHG�DFWLYLW\�JURXSV�ILOOHGZLWK�GDWD��$OO�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�VWDUW�ZLWK�6$3B���$FWLYLW\�JURXSV�DUHXVHG�E\�WKH�3*�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��7KH�ILUVW�SULRULW\�LV�WR�VHOHFW�WUDQVDFWLRQVDQG�UHSRUWV��7KLV�LQIRUPDWLRQ��WUDQVDFWLRQV�FRGHV��PHQX�SDWKV��UHSRUW�QDPHV��HWF���LV�VDYHGLQ�DQ�DFWLYLW\�JURXS��ZKLFK�VHUYHV�DV�D�GDWDEDVH�WR�KHOS�WKH�3*�GHWHUPLQH�WKH�QHFHVVDU\DXWKRUL]DWLRQV�DQG�JHQHUDWH�WKH�SURILOH�V��

<RX�PD\�VHW�XS�DV�PDQ\�DFWLYLW\�JURXSV�DV�\RXU�FRPSDQ\�UHTXLUHV��$�VLQJOH�DFWLYLW\��DWUDQVDFWLRQ��UHSRUW��RU�WDVN��FDQ�EH�LQFOXGHG�LQ�PDQ\�GLIIHUHQW�DFWLYLW\�JURXSV��DQG�DQDFWLYLW\�JURXS�FDQ�LQFOXGH�DV�PDQ\�VLQJOH�DFWLYLWLHV�DV�QHHGHG�

7R�VDYH�WLPH��6$3�SURYLGHV�XVHU�UROH�WHPSODWHV�VR�\RX�GR�QRW�KDYH�WR�FUHDWH�DOO�DFWLYLW\JURXSV�RQ�\RXU�RZQ��+RZHYHU��\RX�PD\�VWLOO�FUHDWH�\RXU�RZQ�DFWLYLW\�JURXSV�RU�PRGLI\�WKHRQHV�6$3�GHOLYHUV�

8VHU�0HQX

8VHUV�RQO\�VHH�WKH�WUDQVDFWLRQV�WKH\�DUH�DOORZHG�WR�H[HFXWH�LQ�WKH�V\VWHP³WKRVH�GHILQHG�LQWKH�DFWLYLW\�JURXS�DVVLJQHG�WR�WKHP�

,Q�WKH�IROORZLQJ�H[DPSOH��WKH�XVHU�PHQX�IRU�WKH�XVHU�UROH�WHPSODWH�´4XDOLW\�0DQDJHUµ�LVVKRZQ��7KH�6$3�(DV\�$FFHVV�PHQX�VHUYHV�DV�WKH�LQGLYLGXDOL]HG�XVHU�PHQX��7KH�PHQX

Page 83: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–3

VWUXFWXUH�LV�H[DFWO\�ZKDW�WKH�4XDOLW\�0DQDJHU�VHHV�ZKHQ�ORJJHG�RQ�WR�5����,Q�RXU�H[DPSOH�ZH�KDYH�DVVLJQHG�RQO\�RQH�DFWLYLW\�JURXS��RI�FRXUVH�\RX�FDQ�DVVLJQ�PDQ\�PRUH�

��������An example user menu using the user role template SAP_BC_CAT_QUALITYMANAGER_AG

<RX�FDQ�VWLOO�VZLWFK�WR�WKH�FRPSOHWH�6$3�VWDQGDUG�PHQX�XVLQJ� ��WKRXJK�WKH�XVHU�LV�QRWDXWKRUL]HG�WR�UXQ�HYHU\�WUDQVDFWLRQ�LQ�WKH�VWDQGDUG�PHQX��7R�UHWXUQ�WR�WKH�XVHU�PHQX�FKRRVH� �

+RZ�WR�:RUN�ZLWK�8VHU�5ROH�7HPSODWHV

7KHUH�DUH�GLIIHUHQW�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��<RX�PD\�HLWKHU�< 8VH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�DV�LV< &RS\�DQG�PRGLI\�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV< &UHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV

,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�H[SODLQ�HDFK�RSWLRQ�DQG�SURYLGH�WKH�EDVLF�NQRZOHGJH�\RX�QHHGWR�ZRUN�ZLWK�XVHU�UROH�WHPSODWHV��,I�\RX�QHHG�PRUH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUNZLWK�WKH�XVHU�UROH�WHPSODWHV��UHIHU�WR�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

7KH�WRRO�XVHG�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV�DQG�DFWLYLW\�JURXSV�UHVSHFWLYHO\�LV�WKH3URILOH�*HQHUDWRU��3*���8VH�WKH�WUDQVDFWLRQ�PFCG�IRU�WKH�3*�

Page 84: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–4

6WDUWLQJ�$FWLYLW\�*URXS�0DLQWHQDQFH��3)&*�

6WDUW�WKH�3URILOH�*HQHUDWRU��3*��E\�RQH�RI�WKH�IROORZLQJ�PHWKRGV�IURP�WKH�6$3�(DV\�$FFHVVVFUHHQ�

< &KRRVH� �&UHDWH�0HQX

< (QWHU�WKH�WUDQVDFWLRQ�PFCG�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH�(QWHU

< &KRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�3)&*�¥�$FWLYLW\�JURXSV

7KHQ�\RX�FDQ�VWDUW�ZRUNLQJ�ZLWK�WKH�XVHU�UROH�WHPSODWHV�

8VLQJ�WKH�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV

7R�XVH�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWHV�MXVW�DVVLJQ�WKH�XVHU�UROH�WHPSODWH�WR�D�XVHU�:KHQ�WKDW�XVHU�ORJV�RQ�WR�WKH�V\VWHP��D�VSHFLILF�XVHU�UROH�PHQX�DSSHDUV�

7R�DVVLJQ�XVHU�UROH�WHPSODWHV��\RX�KDYH�WZR�RSWLRQV�< 8VH�WKH�3*��VHOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��JHQHUDWH�LW��DVVLJQ�LW�WR�D�XVHU��DQG�GR�D

XVHU�FRPSDUH��7KH�IROORZLQJ�H[DPSOH�H[SODLQV�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�XVLQJWKH�3*�

< 8VH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�68���WR�DVVLJQ�WKH�GHVLUHG�XVHU�UROH�WHPSODWHV�WR�DVSHFLILF�XVHU��6HH�FKDSWHU����$VVLJQLQJ�$FWLYLW\�*URXSV�

([DPSOH�

+RZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU��IRU�H[DPSOH�WKH�4XDOLW\�0DQDJHU�XVLQJ�WKH�3URILOH*HQHUDWRU�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B%&B&$7B4XDOLW\PDQDJHUB$*��

�� &KRRVH� �&KDQJH�

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�WKDW�FDQ�FRQWDLQ�PXOWLSOH�DFWLYLW\JURXSV�

2

Tip

3

Page 85: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–5

�� &KRRVH�WKH�0HQX�WDE�WR�UHYLHZ�WKHWUDQVDFWLRQV�DVVLJQHG�WR�WKLV�DFWLYLW\JURXS�

,Q�WKH�6$3�GHOLYHUHG�DFWLYLW\�JURXSV\RX�DOZD\V�VHH�DQ�$FWLYLW\�JURXSGHVFULSWLRQ�RI�WKH�FRQWHQW�IRU�WKH�VHOHFWHGDFWLYLW\�JURXS��<RX�FDQ�DOVR�DGG�\RXURZQ�GHVFULSWLRQ�

�� 7KH�HQG�XVHU�ZLOO�VHH�WKH�IROGHUV�DQGWUDQVDFWLRQV�DV�WKH\�DSSHDU�LQ�WKH$FWLYLW\�JURXS�PHQX�

�� <RX�FDQ�FKDQJH�WKH�RUGHU�RI�DQ\LWHP�E\�VHOHFWLQJ�LW�DQG�XVLQJ� �DQG�WR�PRYH�LW�XS�DQG�GRZQ�

�� 6HOHFW�WKH�$XWKRUL]DWLRQV�WDE�WRJHQHUDWH�WKLV�DFWLYLW\�JURXS�

7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKH�SURILOH�LV�QRW�JHQHUDWHG\HW�

4

Tip

76

5

Page 86: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–6

�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�

�� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH� FKRRVH� .

��� &KRRVH� �

8

9

10

Page 87: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–7

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHUWR�WKLV�DFWLYLW\�JURXS�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�LV�DVVLJQHG�\HW�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FRPSRVLWH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�

11

Page 88: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–8

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHGLQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU,'��,Q�WKH�WZR�DGGLWLRQDO�FROXPQV��)URP�WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW��<RX�FDQ�GHOHWH�WKH�XVHU,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDORQH�LQ�IURQW�RI�D�VHOHFWHG�XVHU�,'�XVLQJ�

7R�JHW�DGGLWLRQDO�LQIRUPDWLRQ�RQDVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

2Q�WKH�&RPSDUH�8VHU�0DVWHU�5HFRUG�RI$FWLYLW\�*URXS�VFUHHQ��QRWH�WKH�VWDWXV�RIWKH�XVHU�PDVWHU�UHFRUG��,W�VD\V��8VHUPDVWHU�UHFRUG�KDV�QRW�\HW�EHHQ�FRPSOHWHO\FRPSDUHG��7KHUHIRUH�SHUIRUP�FRPSOHWHFRPSDUH�LQ�VWHS����

��� &KRRVH� �&RPSOHWH�FRPSDUH�

12

13

14

Page 89: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–9

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�ZLOO�VHH�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIURP�WKH�VHOHFWHG�DFWLYLW\�JURXS�

7KH�SURFHVV�LV�QRZ�FRPSOHWH�

:KHQ�WKH�XVHU�)7$<(+�ORJV�LQ��WKHVFUHHQ�WR�WKH�ULJKW�DSSHDUV�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�6$3B%&B&$7B48$/,7<0$1$*(5B$*��KDV�EHHQ�DVVLJQHG�WR�)7$<(+�

$V�\RX�FDQ�VHH��WKH�PHQX�LV�VLPLODU�WRWKH�RQH�FUHDWHG�LQ�WKH�3*�

15

Page 90: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–10

&RS\LQJ�DQG�0RGLI\LQJ�6$3�3URYLGHG�8VHU�5ROH�7HPSODWHV

,I�\RX�DUH�QRW�FRPSOHWHO\�VDWLVILHG�ZLWK�WKH�FRQWHQW�RI�DQ�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWH�\RX�FDQ�PRGLI\�WKH�WHPSODWH��:H�UHFRPPHQG�WKDW�\RX�ILUVW�FRS\�WKH�DFWLYLW\�JURXS�DQG�WKHQPDNH�DQ\�FKDQJHV�WR�WKH�QHZO\�FUHDWHG�FRS\��&RS\LQJ�ILUVW�HQVXUHV�WKDW�\RX�NHHS�WKHRULJLQDO�6$3�WHPSODWH�LQWDFW��'RFXPHQW�WKH�FKDQJHV�\RX�PDNH�WR�WKH�VWDQGDUG�

,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FRS\�DQ�H[LVWLQJ�DFWLYLW\�JURXS��PRGLI\�LW��DQG�DVVLJQ�LWWR�D�XVHU�

,I�\RX�ZDQW�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

([DPSOH�

7KH�IROORZLQJ�H[DPSOH�GHPRQVWUDWHV�KRZ�WR�FRS\�DQG�UHQDPH�WKH�XVHU�UROH�WHPSODWH�IRUWKH�$FFRXQWV�3D\DEOH�$FFRXQWDQW��ZH�ZLOO�XVH�´$FFRXQWV�3D\DEOH�$FFRXQWDQWµ�YDULDQW��:H�DVVXPH�WKDW�RQO\�RQH�FRPSDQ\�FRGH�ZLOO�EH�XVHG��VR�ZH�GHOHWH�WKH�IROGHU�&URVV�&RPSDQ\�&RGH�7UDQVDFWLRQ��DV�ZHOO�DV�%LOO�RI�([FKDQJH�DQG�5HMHFW�3DUNHG�'RFXPHQWV�)XUWKHUPRUH��ZH�DGG�WZR�WUDQVDFWLRQV³05+5�(QWHU�,QYRLFH�DQG�05+*�(QWHU�&UHGLW0HPR³LQWR�WKH�IROGHU�,QYRLFH�FUHGLW�PHPR��)LQDOO\��ZH�DVVLJQ�WKH�QHZ�DFWLYLW\�JURXS),B$3B$&&2817$17B9$5,$17B$*�WR�D�XVHU�XVLQJ�WKH�3*�DQG�GHPRQVWUDWH�ZKDW�WKLVXVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��XVH�SRVVLEOH�HQWULHV�WR�VHOHFWWKH�GHVLUHG�DFWLYLW\�JURXS�LQ�WKH$FWLYLW\�JURXS�ILHOG��IRU�H[DPSOH�6$3B),B$3B$&&2817$17�B$*��

�� &KRRVH� �WR�FRS\�WKH�DFWLYLW\JURXS�

�� (QWHU�D�QDPH�IRU�WKH�QHZ�DFWLYLW\JURXS�

�� &KRRVH� �&RS\�VHOHFWLYHO\�WR�GHFLGHZKDW�REMHFWV�\RX�ZRXOG�OLNH�WR�FRS\ZLWK�WKH�DFWLYLW\�JURXS�

4

5

3

2

Page 91: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–11

�� &KRRVH� �ZLWKRXW�VHOHFWLQJDQ\WKLQJ��<RX�VKRXOG�FRS\�WKHDFWLYLW\�JURXS�ZLWKRXW�WKH�XVHUDVVLJQPHQW�

�� &KRRVH� �&KDQJH�WR�PRGLI\�WKH�QHZDFWLYLW\�JURXS�

�� (QWHU�D�VKRUW�GHVFULSWLRQ�IRU�\RXUQHZ�DFWLYLW\�JURXS�LQ�WKH�'HVFULSWLRQILHOG�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�IUHH�WH[W�GHVFULSWLRQ�

��� &KRRVH�WKH�0HQX�WDE� 8

9

7

6

10

Page 92: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–12

1RZ�\RX�VHH�WKH�PHQX�RI�WKHRULJLQDO�DFWLYLW\�JURXS�LQ�WKH�QHZDFWLYLW\�JURXS��2SHQ�WKH�GHVLUHGIROGHU�ZKHUH�\RX�ZDQW�WR�PRGLI\�RUGHOHWH�WUDQVDFWLRQV��,Q�RXU�H[DPSOH�ZH�ZRXOG�OLNH�WR�GHOHWH�WUDQVDFWLRQ)%9��DQG�WKH�IROGHUV�&URVV�FRPSDQ\FRGH�WUDQVDFWLRQ�DQG�%LOO�RI�H[FKDQJHXQGHU�WKH�3D\PHQW�DQG�FOHDULQJ�QRGH�

��� 6HOHFW�)%9��¥�5HMHFW�

��� 7R�GHOHWH�WKH�WUDQVDFWLRQ��FKRRVH� �

7R�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV��FKRRVH��,I�WKH\�DUH�WXUQHG�RQ��WKH�LFRQ

FKDQJHV�WR� �

��� 6HOHFW�WKH�&URVV�FRPSDQ\�FRGHWUDQVDFWLRQ�OLQH�DQG�FKRRVH� �

��� 6HOHFW�WKH�%LOO�RI�H[FKDQJH�OLQH�DQGFKRRVH� �

11

12

Tip

13

14

Page 93: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–13

��� 7R�LQVHUW�D�QHZ�WUDQVDFWLRQ�FRGHPDQXDOO\��VHOHFW�WKH�IROGHU�LQ�ZKLFK\RX�ZRXOG�OLNH�WKDW�WUDQVDFWLRQ�WRDSSHDU�DQG�FKRRVH� �7UDQVDFWLRQ�IRU�H[DPSOH��ZH�ZRXOG�OLNH�WR�HQWHUWKH�WUDQVDFWLRQ�(QWHU�,QYRLFH�LQWR�WKHIROGHU�,QYRLFH�FUHGLW�PHPR��

��� (QWHU�WKH�WUDQVDFWLRQ�FRGH�LQWR�WKH7UDQVDFWLRQ�FRGH�ILHOG��,I�\RX�SUHVV(QWHU��WKH�WH[W�RI�WKH�WUDQVDFWLRQ�FRGHZLOO�DSSHDU�LQ�WKH�7H[W�FROXPQ�

��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�WRWUDQVIHU�WKH�WUDQVDFWLRQ�LQWR�WKHDFWLYLW\�JURXS�PHQX�

15

17

Page 94: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–14

,I�\RX�ZRXOG�OLNH�WR�FKDQJH�WKH�SRVLWLRQRI�WKH�WUDQVDFWLRQ�LQ�WKH�KLHUDUFK\��VHOHFWWKH�WUDQVDFWLRQ�DQG�XVH�WKH� �WRPRYH�WKH�WUDQVDFWLRQ�GRZQ�RU�XS�

��� ,I�\RX�GR�QRW�NQRZ�WKH�WUDQVDFWLRQFRGH�DQG�ZRXOG�UDWKHU�VHOHFW�WKHWUDQVDFWLRQ�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX�

:H�UHFRPPHQG�\RX�VWD\�ZLWK�RQH�RSWLRQ��(LWKHU�HQWHU�WKH�WUDQVDFWLRQ�PDQXDOO\�RU�HQWHULW�WKURXJK�RQH�RI�WKH�PHQXV��6$3�PHQX��DFWLYLW\�JURXS��RU�DUHD�PHQX���,I�\RX�FKRRVH�WRHQWHU�IURP�WKH�PHQX��WKH�PHQX�SDWK�ZLOO�EH�WUDQVIHUUHG�WR�WKH�DFWLYLW\�JURXS�PHQX�DVZHOO�

18

Page 95: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–15

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�FRGH�LW�LV�SRVVLEOH�WR�VHOHFW�PRUH�WKDQRQH��

��� &KRRVH� �7UDQVIHU�WR�WUDQVIHU�WKHWUDQVDFWLRQ�LQWR�DFWLYLW\�JURXSPHQX�

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�RU�RIIFKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKHWHFKQLFDO�QDPH�RI�WKH�WUDQVDFWLRQ��VFUROOWR�WKH�ULJKW�ZKHUH�LW�LV�VKRZQ�

7KH�WUDQVDFWLRQ�LV�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�PHQX�DQG�LQFOXGHVWKH�FRPSOHWH�PHQX�SDWK�IURP�WKH6$3�PHQX�

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�DQGPRYH�LW�WR�WKH�GHVLUHG�SRVLWLRQ�E\HLWKHU�< 'UDJ�DQG�GURS

< �RU�

< �0RYH�QRGH

,Q�WKLV�H[DPSOH��ZH�XVHG�GUDJ�DQGGURS�

20

21

19

Page 96: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–16

��� 7R�GHOHWH�WKH�OHIW�PHQX�SDWK�IURPWKH�MXVW�LQVHUWHG�WUDQVDFWLRQ��VFUROOGRZQ�WR�WKH�PHQX�SDWK�WKDW�EHJLQVZLWK�6$3�5���6\VWHP�

��� 6HOHFW�WKH�GHVLUHG�IROGHU�DQG�FKRRVH�WR�GHOHWH�WKH�IROGHU�DQG�WKH

FRPSOHWH�VWUXFWXUH�EHORZ�LW�

22

23

We moved the transaction into thefolder Invoice/credit memo, below thetransaction MRHR-Enter Invoice�

Page 97: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–17

$IWHU�\RX�ILQLVK�GHOHWLQJ�DQGLQVHUWLQJ�WUDQVDFWLRQV��PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�WUDQVDFWLRQV�LQWKLV�DFWLYLW\�JURXS�

��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWDWR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VHOHFW�H[SOLFLWO\�WKH�RSWLRQ�ZLWKZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�

24

25

Tip

Page 98: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–18

1RZ�DGMXVW�WKH�DXWKRUL]DWLRQV�WR\RXU�VSHFLILF�QHHGV��2SHQ�WKHGHVLUHG�IROGHU�DQG�FKHFN�RU�FKDQJHWKH�YDOXHV�

,Q�WKLV�H[DPSOH��ZH�DUH�QRW�FKDQJLQJDQ\WKLQJ�EHFDXVH�HYHU\WKLQJ�IURPWKH�FRSLHG�DFWLYLW\�JURXS�LV�FRUUHFW�

)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�KRZ�WRZRUN�ZLWK�WKH�DXWKRUL]DWLRQ�ILHOGV�VHH�FKDSWHU����$GYDQFHG�3URILOH*HQHUDWRU�)XQFWLRQDOLW\�

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV

�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�H[LVW�ZLWKRXW�YDOXHV�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�

��� 7R�FRQWLQXH��FKRRVH� �

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�

27

28

26

Page 99: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–19

'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���

6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�

$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�

29

30

Page 100: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–20

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�FDQ�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR��FROXPQ�\RX�FDQHQWHU�WKH�GDWH�UDQJH�IRU�KRZ�ORQJWKH�XVHU�LV�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\�FKRRVH� �

��� &KRRVH� �&RPSOHWH�FRPSDUH�

31

33

32

34

Page 101: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–21

,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�

:KHQ�ORJJLQJ�RQ�WR�5����WKH�XVHUZLOO�VHH�D�VSHFLILF�XVHU�PHQX�ZLWKRQO\�WKRVH�WUDQVDFWLRQV�IURP�WKHVHOHFWHG�DFWLYLW\�JURXS�

7KLV�LV�WKH�VFUHHQ�D�XVHU�VHHV�ZKHQORJJLQJ�RQ�WR�WKH�V\VWHP�DIWHU�DQDFWLYLW\�JURXS��IRU�H[DPSOH�),B$3B$&&2817$17B9$5,$17B$*��KDV�EHHQ�DVVLJQHG�WR�WKDW�XVHU�

$V�\RX�FDQ�VHH��WKH�PHQX�ORRNV�WKHVDPH�DV�WKDW�FUHDWHG�LQ�WKH�3*�

tip

35

Page 102: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–22

&UHDWH�\RXU�RZQ�8VHU�5ROH�7HPSODWHV

,I�\RX�QHHG�XVHU�UROH�WHPSODWHV�LQ�DGGLWLRQ�WR�WKH�RQHV�6$3�GHOLYHUV��\RX�FDQ�FUHDWH�\RXURZQ�DFWLYLW\�JURXS�

,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WR�FUHDWH�DQ�DFWLYLW\�JURXS��VHOHFW�WUDQVDFWLRQ�FRGHV�JHQHUDWH�WKH�DXWKRUL]DWLRQV��DQG�DVVLJQ�WKHP�WR�D�XVHU�

,I�\RX�ZRXOG�OLNH�DGYDQFHG�LQIRUPDWLRQ�RQ�KRZ�WR�ZRUN�WKH�FRPSOHWH�3*�IXQFWLRQDOLW\��VHHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\�

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS�DQGWKHUHIRUH�WKH�XVHU�UROH�WHPSODWH�IRU�D�GDWD�HQWU\�FOHUN��$W�WKH�HQG��ZH�DVVLJQ�WKH�QHZDFWLYLW\�JURXS��ZKLFK�ZH�QDPH�),B$3B'$7$B(175<B&/(5.B$*�WR�D�XVHU�ZLWK�WKH�3*DQG�GHPRQVWUDWH�ZKDW�WKLV�XVHU�LV�JRLQJ�WR�VHH�ZKHQ�ORJJLQJ�RQ�WR�5���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_ENTRY_CLERK��

�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�VLQJOHDFWLYLW\�JURXSV�RU�FRPSRVLWH�DFWLYLW\JURXSV�ZKLFK�FDQ�FRQWDLQ�PXOWLSOHDFWLYLW\�JURXSV��6HH�&UHDWLQJ�&RPSRVLWH$FWLYLW\�*URXSV�RQ�SDJH��²���

2

3

Tip

Page 103: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–23

�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�0HQX�WDE�WR�VHOHFW�WKHWUDQVDFWLRQV�IRU�WKH�DFWLYLW\�JURXS�

7KHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�WUDQVDFWLRQV�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�DVVLJQ�DWUDQVDFWLRQ�E\�GRLQJ�RQH�RI�WKH�IROORZLQJ�

< (QWHULQJ�LW�GLUHFWO\��RQO\�WKH�WUDQVDFWLRQ�ZLWKRXW�WKH�PHQX�SDWK�LV�DGGHG�< 6HOHFWLQJ�LW�IURP�WKH�6$3�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�< 6HOHFWLQJ�LW�IURP�DQ�DUHD�PHQX��WKH�FRPSOHWH�PHQX�SDWK�ZLOO�EH�VKRZQ�

,Q�WKLV�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�WUDQVDFWLRQ�IURP�DQ�H[LVWLQJ�DFWLYLW\�JURXS�DQG�KRZ�WRLQVHUW�WKH�WUDQVDFWLRQ�FRGH�GLUHFWO\��7KH�RWKHU�RSWLRQV�ZRUN�DFFRUGLQJO\�

:H�ZRXOG�OLNH�WR�LQVHUW�WKH�WUDQVDFWLRQV�IRU�´FUHDWLQJ�YHQGRU�LQYRLFHV�FUHGLW�PHPRµ��)%����DQG´GLVSOD\LQJ�GRFXPHQWVµ��)%����ZLWK�WKH�VDPH�PHQX�SDWK�DV�LW�LV�LQ�WKH�DFWLYLW\�JURXS�IRU�WKH�´DFFRXQWVSD\DEOH�DFFRXQWDQWµ��6$3B),B$3$&&2817B$*��

�� &KRRVH� �)URP�DFWLYLW\�JURXS�

,I�\RX�ZRXOG�OLNH�WR�VHOHFW�WKHWUDQVDFWLRQ�FRGH�IURP�WKH�6$3�PHQX�FKRRVH� �)URP�WKH�6$3�PHQX��7KHQIROORZ�WKH�VDPH�SURFHGXUH�

�� ,Q�WKH�IROORZLQJ�VFUHHQ��VHOHFW�WKHDFWLYLW\�JURXS6$3B),B$3B$&&2817$17B$*�

��� &KRRVH�(QWHU�

8

Page 104: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–24

��� 6HOHFW�WKH�GHVLUHG�WUDQVDFWLRQV��)RUH[DPSOH��ZH�VHOHFWHG�< 6FKHGXOH�0DQDJHU< �&UHDWH�YHQGRU�LQYRLFHV�FUHGLW�PHPRV

�XQGHU�(QWU\�→�,QYRLFH�FUHGLWPHPR�

< 'LVSOD\�GRFXPHQW��XQGHU�(QWU\�→,QYRLFH�FUHGLW�PHPR�

< 'LVSOD\�YHQGRU��XQGHU�$FFRXQWPDVWHU�GDWD�

��� 7R�DGG�WKH�VHOHFWHG�WUDQVDFWLRQV�WRWKH�DFWLYLW\�JURXS�PHQX��FKRRVH�$GG�

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG�RII��FKRRVH� �RU� ��,I�\RX�FDQQRW�VHH�WKH�WHFKQLFDOQDPH�RI�WKH�WUDQVDFWLRQ��VFUROO�IDUWKHU�WR�WKH�ULJKW�

,I�\RX�RSHQ�WKH�IROGHUV��\RX�FDQ�VHHKRZ�WKH�WUDQVDFWLRQV�DQG�SDWKV�KDYHEHHQ�LQVHUWHG��7KH\�DSSHDU�LQ�WKH8VHU�PHQX�LQ�H[DFWO\�WKH�VDPH�ZD\DV�GHILQHG�LQ�WKH�3*�

7KH�QH[W�WUDQVDFWLRQV�WR�LQVHUW�DUH)%���DQG�)%����)RU�WKRVHWUDQVDFWLRQV��ZH�ZLOO�FUHDWH�D�QHZIROGHU�FDOOHG�8VHU�VHWWLQJV�

��� 7R�FUHDWH�D�QHZ�IROGHU��FKRRVH�DQG�HQWHU�WKH�QHZ�QDPH�IRU�WKHIROGHU��LQ�H[DPSOH��8VHU�VHWWLQJV��

7R�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQGRII�FKRRVH� �RU� ��7KH�WHFKQLFDO�QDPHVDSSHDU�LQ�IURQW�RI�WKH�WUDQVDFWLRQ�FRGHWH[W�

11

12

13

Page 105: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–25

��� 7R�PRYH�WKH�IROGHU�WR�WKH�HQG�RI�WKHPHQX��KLJKOLJKW�WKH�IROGHU�\RX�ZDQWWR�PRYH�DQG�FKRRVH� �WR�PRYH�LWGRZQ�

��� 7R�HQWHU�WKH�WUDQVDFWLRQV��FKRRVH�7UDQVDFWLRQ�

��� (QWHU�WKH�GHVLUHG�WUDQVDFWLRQV��IRUH[DPSOH��FB00�DQG�FB07���7KHGHVFULSWLRQ�WH[W�IRU�WKH�WUDQVDFWLRQFRGH�DSSHDUV�LQ�ULJKW�FROXPQ�

��� &KRRVH� �$VVLJQ�WUDQVDFWLRQV�

$IWHU�\RX�VHOHFW�DOO�WKH�WUDQVDFWLRQVQHFHVVDU\��IRU�H[DPSOH��IRU�WKH�'DWD(QWU\�&OHUN��

��� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

14 15

16

17

18

19

Page 106: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–26

��� 7R�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�GDWD�FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLILFDOO\�VHOHFW�WKH�RSWLRQZLWK�ZKLFK�\RX�ZDQW�WR�PDLQWDLQDXWKRUL]DWLRQ�YDOXHV��7KLV�RSWLRQ�LVDXWRPDWLFDOO\�VHW�FRUUHFWO\�LQ�QRUPDOPRGH�

,I�QHFHVVDU\��WKH�'HILQH�2UJDQL]DWLRQDO/HYHOV�GLDORJ�ER[�DSSHDUV��7KLVVFUHHQ�XVXDOO\�SRSV�XS�WKH�ILUVW�WLPH\RX�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

8VH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHGHVLUHG�YDOXHV�RU�YDOXH�UDQJH�

��� ,Q�WKLV�H[DPSOH��ZH�VHOHFWHG�)XOODXWKRUL]DWLRQ�IRU�WKH�RUJDQL]DWLRQDOOHYHOV�

��� &KRRVH�6DYH�

&RPSDQ\�FRGHV��EXVLQHVV�DUHDV��DQG�SODQWV�DUH�H[DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV��<RXFDQ�GLVSOD\�DQG�PDLQWDLQ�D�OLVW�RI�H[LVWLQJ�OHYHOV�ZLWK�WUDQVDFWLRQ�6832�

20

Tip

2221

Page 107: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–27

2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKH�DXWKRUL]DWLRQGDWD�DSSHDUV�KLHUDUFKLFDOO\�

7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKH�ILUVWOHYHO��EOXH���8QGHUQHDWK�\RX�ILQG�< 2EMHFW�FODVVHV� �SXUSOH< $XWKRUL]DWLRQ�REMHFW� �JUHHQ< $XWKRUL]DWLRQ� �\HOORZ< $XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH

��� 7R�PDLQWDLQ�WKH�DFWLYLW\��FOLFN�WKH$FWLYLW\�YDOXH�ILHOG�

([SODQDWLRQ�RI�WKH�7UDIILF�/LJKWV

�²�*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��²�5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��²�<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

��� 6HOHFW�WKH�GHVLUHG�DXWKRUL]DWLRQ��IRUH[DPSOH��'LVSOD\��

��� 7R�WUDQVIHU��FKRRVH� �

��� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ, WR�PDLQWDLQ�WKH�$XWKRUL]DWLRQ�JURXS��FOLFN�WKH$XWKRUL]DWLRQ�JURXS�YDOXH�ILHOG�

23

24

25

26

Page 108: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–28

��� (QWHU�RU�VHOHFW�WKH�GHVLUHG�YDOXH��ZHFKRRVH�)XOO�DXWKRUL]DWLRQ��

��� 7R�WUDQVIHU��FKRRVH� �

3URFHHG�ZLWK�DOO�RSHQ�ILHOGV�LQ�WKH�VDPHZD\�XQWLO�DOO�OLJKWV�VZLWFK�WR�JUHHQ�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

��� 7KH�V\VWHP�VXJJHVWV�7��LQWHUQDOQXPEHU!�DV�WKH�GHIDXOW�QDPH��7KH3URILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU�KRZHYHU�WKH�7H[W�FDQ�

��� 7R�FRQWLQXH��FKRRVH� �

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�*HQHUDWHG�$XWKRUL]DWLRQV

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

31

30

29

32

27

28

Page 109: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–29

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZRGLJLWV�DUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHQDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

��� &KRRVH� �WR�UHWXUQ�WR�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ�

,I�\RX�FKRRVH� �DQG�IRUJHW�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�VKRZV�\RX�WKHVWDWXV�DQG�UHPLQGV�\RX�WR�JHQHUDWH�WKH�DFWLYLW\�JURXS�

33

Page 110: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–30

$OO�WKH�WUDQVDFWLRQV�DQGDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXSKDYH�QRZ�EHHQ�FROOHFWHG�DQGJHQHUDWHG��7KH�QH[W�VWHS�LV�WR�DVVLJQD�XVHU�WR�WKH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�D�XVHU�

7KH�UHG�OLJKW� �RQ�WKH�8VHU�WDELQGLFDWHV�WKDW�QR�XVHU�KDV�EHHQ�DVVLJQHG�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�LQGLFDWHV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS�

�8VHU�²�*UHHQ��$W�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��8VHU�²�5HG��1R�XVHUV�DUH�DVVLJQHG��8VHU�²�<HOORZ��$OWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU

PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�,I�WKH�DFWLYLW\�JURXS�LV�D�FROOHFWLYH�DFWLYLW\�JURXS��WKH�VWDWXV�GLVSOD\�RQO\�LQGLFDWHVZKHWKHU�XVHUV�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��VHOHFW�8VHU�FRPSDUH�

34

3536

37

Page 111: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–31

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� �DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �

��� �&KRRVH� �&RPSOHWH�FRPSDUH�

,I�\RX�FKRRVH�8WLOLWLHV�→�6HWWLQJV�DQGVHOHFW�$XWRPDWLF�FRPSDULVRQ�DW�VDYH��WKHXVHU�FRPSDUH�RFFXUV�DXWRPDWLFDOO\ZKHQ�\RX�VDYH�WKH�DFWLYLW\�JURXS�

��� 7KH�XVHU�LV�QRZ�DVVLJQHG�WR�WKHDFWLYLW\�JURXS��:KHQ�ORJJLQJ�RQ�WR5����WKH�XVHU�VHHV�D�VSHFLILF�XVHUPHQX�ZLWK�RQO\�WKRVH�WUDQVDFWLRQVIRU�WKH�VHOHFWHG�DFWLYLW\�JURXS�

38

39

Tip

Page 112: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–32

7KH�XVHU�VHHV�WKH�6$3�(DV\�$FFHVV�¥�8VHUPHQX�IRU��XVHUªV�QDPH!�ZKHQ�ORJJLQJLQWR�5���DIWHU�WKH�DVVLJQPHQW�RI�WKHDFWLYLW\�JURXS��LQ�WKLV�H[DPSOH��WKH�XVHUPHQX�IURP�),B$3B'$7$B(175<B&/(5.��

8VHUV�FDQ�PDLQWDLQ�WKHLU�RZQ�IDYRULWHVDQG�LQVHUW�OLQNV�WR�WKHLU�PHQX��6HHFKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\�IRU�GHWDLOV�

&UHDWLQJ�&RPSRVLWH�$FWLYLW\�*URXSV

,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�GHVFULEHG�KRZ�WR�FUHDWH�\RXU�RZQ�XVHU�UROH�WHPSODWHV�XVLQJ�VLQJOH�DFWLYLW\JURXSV��<RX�DOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�FRPSRVLWH�DFWLYLW\�JURXSV��ZKLFK�FRQVLVW�RI�PXOWLSOH�VLQJOHDFWLYLW\�JURXSV��,Q�WKRVH�FRPSRVLWH�DFWLYLW\�JURXSV��\RX�FDQQRW�DVVLJQ�WUDQVDFWLRQV�GLUHFWO\��<RX�KDYH�WRHQWHU�VLQJOH�WUDQVDFWLRQV�LQWR�VHSDUDWH�DFWLYLW\�JURXSV�DQG�WKHQ�DVVLJQ�WKRVH�DFWLYLW\�JURXSV�WR�FRPSRVLWHDFWLYLW\�JURXS�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FRPSRVLWH�DFWLYLW\�JURXS�WKDW�LQFOXGHV�WKUHHVLQJOH�DFWLYLW\�JURXSV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 8QGHU�7\SH��VHOHFW�&RPSRVLWH�DFWLYLW\JURXS�

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�WKHQDPH�IRU�WKH�QHZ�DFWLYLW\�JURXS��IRUH[DPSOH��FI_AP_DATA_MANAGER��

�� 7R�FUHDWH�WKH�QHZ�DFWLYLW\�JURXS�FKRRVH� �&UHDWH�

3

4

2

Page 113: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Release 4.6A/B5–33

�� ,Q�'HVFULSWLRQ� HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�GHVFULSWLRQ�RI�WKH�DFWLYLW\JURXS�

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�WRVHOHFW�WKH�DFWLYLW\�JURXSV�IRU�WKLVFRPSRVLWH�DFWLYLW\�JURXS�

�� 6HOHFW� �WR�LQVHUW�WKH�DFWLYLW\JURXSV�

<RX�FDQ�RQO\�LQVHUW�DFWLYLW\�JURXSV�LQWRFRPSRVLWH�DFWLYLW\�JURXSV��,W�LV�QRWSRVVLEOH�WR�DVVLJQ�RWKHU�FRPSRVLWHDFWLYLW\�JURXSV�RU�VLQJOH�WUDQVDFWLRQV�WRD�FRPSRVLWH�DFWLYLW\�JURXS�

��� 6HOHFW�WKH�DFWLYLW\�JURXSV�WKDW�\RXZRXOG�OLNH�WR�LQFOXGH�LQ�WKHFRPSRVLWH�DFWLYLW\�JURXS�

��� &KRRVH� �

8

6

7

5

9

10

11

Page 114: Amez 46 all

Chapter 5: User Role Templates

How to Work with User Role Templates

Authorizations Made Easy5–34

7KH�DFWLYLW\�JURXSV�KDYH�EHHQLQVHUWHG�

��� &KRRVH�WKH�0HQX�WDE�WR�FKHFN�WKDW\RX�FDQQRW�PDLQWDLQ�WKH�PHQX�IRUWKH�FRPSRVLWH�DFWLYLW\�JURXS�

��� &KRRVH�WKH�8VHU�WDE�WR�DVVLJQ�XVHUV�

��� ,Q�WKH�8VHU�,'�ILHOG��VHOHFW�WKHGHVLUHG�XVHU�E\�HLWKHU�HQWHULQJ�WKHQDPH�GLUHFWO\�RU�XVLQJ�SRVVLEOHHQWULHV��<RX�PD\�VHOHFW�PXOWLSOHHQWULHV�IURP�WKH�OLVW�DW�WKH�VDPH�WLPH�

��� ,Q�WKH�)URP�DQG�WR�FROXPQ��HQWHU�WKHGDWH�UDQJH�IRU�KRZ�ORQJ�WKH�XVHUVKRXOG�EH�DVVLJQHG�WR�WKH�DFWLYLW\JURXS�

��� $IWHU�HQWHULQJ�DOO�XVHUV��FKRRVH�8VHUFRPSDUH�

12

13

1415

16

Page 115: Amez 46 all

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–35

7KH�8VHU�QDPH�LV�DXWRPDWLFDOO\�HQWHUHG�LQ�WKH�VHFRQG�FROXPQ�QH[W�WR�WKH�XVHU�,'��,Q�WKHWZR�DGGLWLRQDO�FROXPQV��)URP��WR��\RX�FDQ�VSHFLI\�D�YDOLGLW\�SHULRG�IRU�WKH�DVVLJQPHQW�<RX�FDQ�GHOHWH�WKH�XVHU�,'V�E\�XVLQJ� ��DQG�LQVHUW�DQ�DGGLWLRQDO�RQH�LQ�IURQW�RI�D�VHOHFWHGXVHU�,'�XVLQJ� �

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�DVVLJQLQJ�XVHUV�DQG�WLPH�GHSHQGHQF\��FKRRVH� �

<RX�DUH�QRZ�ILQLVKHG�FUHDWLQJ�D�FRPSRVLWH�DFWLYLW\�JURXS�DQG�DVVLJQLQJ�WKLV�WR�D�XVHU��:KHQXVHUV�ORJ�RQ�WR�WKH�5���6\VWHP��WKHLU�PHQX�ZLOO�FRQWDLQ�WKH�WUDQVDFWLRQV�RI�WKH�WKUHH�LQVHUWHGDFWLYLW\�JURXSV�IURP�RXU�H[DPSOH�

7LSV�IRU�DQ�$GPLQLVWUDWRU

$V�DQ�DGPLQLVWUDWRU�ZLWK�VSHFLDO�DXWKRUL]DWLRQV��\RX�FDQ�KDYH�D�VKRUWFXW�IRU�DVVLJQLQJ�XVHUUROHV�WR�D�XVHU�ZLWKRXW�JRLQJ�LQWR�WUDQVDFWLRQ�3)&*�RU�68���

7R�VHH�DQG�SHUIRUP�WKH�VKRUWFXW��\RX�QHHG�DFFHVV�WR�WUDQVDFWLRQ�FRGH�3)&*��7KH�ILHOG�YDOXHVQHHG�WR�EH�VHW�WR�IXOO�DXWKRUL]DWLRQ�� ��LQ�WKH�DXWKRUL]DWLRQ�REMHFWV�6B86(5B352�6B86(5B*53��6B86(5B$87�DV�VKRZ�LQ�WKH�WDEOH�EHORZ�

$XWKRUL]DWLRQ�REMHFW�6B86(5B352

�$FWLYLW\

�$XWK��SURILOH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��352),/(�

$XWKRUL]DWLRQ�REMHFW�6B86(5B*53

�$FWLYLW\

�8VHU�JURXS�LQ�XVHU�PDVWHU�PDLQWHQDQFH��&/$66�

$XWKRUL]DWLRQ�REMHFW�6B86(5B$87

�$FWLYLW\

�$XWKRUL]DWLRQ�QDPH�LQ�XVHU�PDVWHU�PDLQWHQDQFH��$87+�

�$XWK��REMHFW�LQ�XVHU�PDVWHU�PDLQWHQDQFH��2%-(&7�

� �IXOO�DXWKRUL]DWLRQ

Page 116: Amez 46 all

Chapter 5: User Role Templates

Tips for an Administrator

Authorizations Made Easy5–36

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�D�XVHU�UROH�WHPSODWH�WR�D�XVHU�XVLQJ�WKLV�VKRUWFXW�

�� 2Q�WKH�6$3�(DV\�$FFHVV�VFUHHQ�FKRRVH� �2WKHU�PHQX�

7KH�PHQX�ZLOO�RQO\�EH�GLVSOD\HG�LQWKLV�ZD\�LI�WKH�VHWWLQJV�IRU�WKHDXWKRUL]DWLRQ�REMHFWV�DUH�VHW�DVGHVFULEHG�LQ�WKH�WDEOH�RQ�WKHSUHYLRXV�SDJH�

�� 6HOHFW�WKH�XVHU�UROH�WHPSODWH�WKDW\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�D�XVHU�

�� &KRRVH� �

'HSHQGLQJ�RQ�\RXU�VHWWLQJV��WKHZLQGRZ�PLJKW�ORRN�GLIIHUHQW��EXW�LWSURYLGHV�WKH�VDPH�IXQFWLRQDOLW\�

1

2

3

Page 117: Amez 46 all

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–37

�� 7KH�VWUXFWXUH�RI�WKH�XVHU�UROHWHPSODWH�DSSHDUV�WKH�VDPH�ZD\�DQHQG�XVHU�VHHV�LW�ODWHU�

�� )RU�DQ�RYHUYLHZ�RI�ZKDW�WKLV�XVHUUROH�WHPSODWH�FRYHUV��FKRRVH�'RFXPHQWDWLRQ�

�� 7KH�GHVFULSWLRQ�DERXW�WKH�VHOHFWHGXVHU�UROH�WHPSODWH�LV�PDLQWDLQHG�LQWKH�DFWLYLW\�JURXS�GHVFULSWLRQ�ILHOGLQ�WKH�3*�

�� &KRRVH� �

4

5

6

7

Page 118: Amez 46 all

Chapter 5: User Role Templates

Tips for an Administrator

Authorizations Made Easy5–38

�� 7R�DVVLJQ�D�XVHU�WR�WKLV�XVHU�UROHWHPSODWH��FKRRVH�$VVLJQ�XVHUV�

�� ,Q�WKH�$VVLJQ�XVHUV�ZLQGRZ��HQWHU�WKHXVHUV�QDPH�GLUHFWO\�RU�XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�XVHU�IURP�D�OLVW�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH�IRU�WKHDFWLYLW\�JURXS��FKRRVH�<HV�

8

9

10

11

Page 119: Amez 46 all

Chapter 5: User Role Templates

Tips for an Administrator

Release 4.6A/B5–39

��� 7KH�VHOHFWHG�XVHU�KDV�EHHQ�DVVLJQHGWR�WKH�XVHU�UROH�WHPSODWH�DQG�WKHGDWD�ZDV�VDYHG�

��� &KRRVH� �RU�UHSHDW�WKH�VWHSV�IRU�DQHZ�DVVLJQPHQW�

12

13

Page 120: Amez 46 all

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–40

$YDLODEOH�8VHU�5ROH�7HPSODWHV

,Q�WKH�SUHYLRXV�VHFWLRQ��ZH�H[SODLQHG�KRZ�WR�ZRUN�ZLWK�WKH�XVHU�UROH�WHPSODWHV��7KLV�VHFWLRQ�SURYLGHV�DQRYHUYLHZ�RI�WKH�XVHU�UROH�WHPSODWHV�GHOLYHUHG�ZLWK�5����VRUWHG�E\�DSSOLFDWLRQ�DUHD�

(DFK�XVHU�UROH�WHPSODWH�FRQWDLQV�D�< 6KRUW�GHILQLWLRQ�RI�WKH�UROH�DQG�DQ�RYHUYLHZ�RI�WDVNV< 5ROH�EDVHG�PHQX< &RPSOHWHO\�PDLQWDLQHG�DXWKRUL]DWLRQ�SURILOH�DFFRUGLQJ�WR�WKH�IXQFWLRQDOLW\�DFFHVVLEOH

5HOHDVH����$

7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DUH�DYDLODEOH�ZLWK�5���5HOHDVH����$�DQG�DUH�GLVWULEXWHG�DV�DFWLYLW\JURXSV�

$UHD�&URVV�$SSOLFDWLRQ� $UHD�/RJLVWLFV�([HFXWLRQ�

$XGLWRU 7UDQVSRUW�&RVW�0DQDJHU

'DWD�3URWHFWLRQ�$XGLWRU 7UDQVSRUW�&RVW�&OHUN

$XGLWRU�+5 :DUHKRXVH�:RUNHU

$XGLWRU�6\VWHP :DUHKRXVH�0DQDJHU

6SHFLDOLVW�'DWD�7UDQVIHU :DUHKRXVH�&OHUN

$UHD�0DWHULDOV�0DQDJHPHQW�3URFXUHPHQW� /RJLVWLFV�0DQDJHU

5HTXLVLWLRQHU /RJLVWLFV�&OHUN

053�FRQWUROOHU 7UDQVSRUW�3ODQQHU

%X\HU 7UDQVSRUW�0DQDJHU

*5�&OHUN 7UDQVSRUW�&OHUN

6(�&OHUN 6KLSSLQJ�0DQDJHU

*/�%X\HU 6KLSSLQJ�&OHUN

,9�&OHUN 3URMHFW�0DQDJHPHQW

3URGXFWLRQ�3ODQQLQJ 3URMHFW�0DQDJHU�&�

33�2SHUDWRU 3URMHFW�0DQDJHU�7�

33�3URGXFW�0DQDJHU :RUN�3DFNDJH�5HVSRQVLEOH

33�6XSHUYLVRU ,QYHVWPHQW�0DQDJHPHQW

.DQEDQ�&RQWUROOHU ,QYHVWPHQWV�$QDO\VW

053�&RQWUROOHU ,QYHVWPHQWV�0DQDJHU

5HS��0DQXIDFWXUHU ,QYHVWPHQWV�3ODQHU��25�

,QYHVWPHQWV�3ODQHU��35�

6HWWOH�6SHFLDOLVW

Page 121: Amez 46 all

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–41

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

%DVLV���'HYHORSPHQW 4XDOLW\�0DQDJHPHQW

$XWKRUL]DWLRQ�'DWD�$GPLQLVWUDWRU &HUWLILFDWH

$XWKRUL]DWLRQ�3URILOH�$GPLQLVWUDWRU (TXLSPHQW�0DQDJHU

6\VWHP�$GPLQLVWUDWRU ,QVSHFWLRQ�0DQDJHU

%DWFK�$GPLQLVWUDWRU ,QVSHFWLRQ�3ODQHU

$GPLQLVWUDWRU 3UREOHP�$XWKRU

3URFHVV�&RQWUROOHU 3UREOHP�3URFHVVRU

:RUNIORZ�'HYHORSHU 4XDOLW\�$QDO\VW

:RUNIORZ�3URFHVV�&RQWUROOHU 4XDOLW\�(QJLQHHU

4XDOLW\�0DQDJHU 4XDOLW\�,QVSHFWRU

7UDQVSRUW�0DQDJHU 6XSSRUW�/LQH�/HYHO��

&XVWRPL]LQJ�3URMHFW�0HPEHU 6XSSRUW�/LQH�/HYHO��

'DWDEDVH�$GPLQLVWUDWRU 6DOHV��'LVWULEXWLRQ

$%$3�'HYHORSHU 2UGHU�3URFHVVLQJ�&OHUN

'HYHORSPHQW�0DQDJHU 6DOHV�5HSUHVHQWDWLYH

'RFXPHQWDWLRQ�'HYHORSHU 6DOHV�0DQDJHU

3URMHFW�0DQDJHU &RQWUROOLQJ

(QGXVHU�3URILOH 3ODQQLQJ�$FWLYLW\�&RRUGLQDWRU

(YHU\�(PSOR\HH 6HQLRU�&RVWPDQDJHU

$/(�$GPLQLVWUDWRU 0DQDJHULDO�$FFRXQWDQW

$/(�'HYHORSHU 6DOHV�0DQDJHU

$GPLQLVWUDWRU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW )LQDQFH�0DQDJHPHQW

3URMHFW�/HDGHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�&OHUN

8VHU�$XWKRUL]��IRU�6\VWHP�$GPLQLVWUDWLRQ�$VVLVWDQW $VVHW�$FFRXQWDQW

6$3VFULSW�3RZHU�8VHU 6WDII�$FFRXQWDQW

6SRRO�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�$FFRXQWDQW

$UFKLYHOLQN�$GPLQLVWUDWRU $FFRXQWV�5HFHLYDEOH�6XSHUYLVRU

$UFKLYHOLQN�8VHU $FFRXQWV�3D\DEOH�$FFRXQWDQW

7HFKQLFDO�(QJLQHHU $FFRXQWV�3D\DEOH�6XSHUYLVRU

8VHU�$GPLQVWUDWRU &DVK�0DQDJHU

%XVLQHVV�:RUNSODFH�IRU�DOO�8VHUV &UHGLW�0DQDJHU

$GPLQLVWUDWRU $FFRXQWLQJ�6XSHUYLVRU

&RQWUROOHU 3URILW�&HQWHU�$FFRXQWLQJ

,PSOHPHQWDWLRQV�7HDP 3URILW�&HQWHU�&RQWUROOHU

3URILW�&HQWHU�0DQDJHU

Page 122: Amez 46 all

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–42

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

7UDYHO�0DQDJHPHQW 5HDO�(VWDWH

7UDYHO�$GPLQLVWUDWRU &RQWUROOHU�DQG�0DQDJHU

7UDYHO�$SSURYLQJ�PDQDJHU 5HQW�$GMXVWPHQW�&OHUN

7UDYHO�6\VWHP�PDQDJHU 6&6�&OHUN

7UDYHO�$VVLVWDQW 7HQDQW�&OHUN

7UDYHOHU 7HQDQW�5HQWDO�&OHUN

7UHDVXU\ +XPDQ�5HVRXUFHV

$GPLQLVWUDWRU $GPLQLVWUDWLYH�&OHUN

&UHGLW�$QDO\VW $GPLQLVWUDWLYH�&OHUN�%HQHILWV

'HSDUWPHQW�0DQDJHU�/RDQV $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ

/RDQV�2IILFHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW

5ROORYHU�2IILFHU %HQHILWV�6SHFLDOLVW

6WDII�$FFRXQWDQW &RPSHQVDWLRQ�6SHFLDOLVW

%DFNRIILFH�3URFHVV /LQH�0DQDJHU�%HQHILWV

&DVKPDQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

&RQWUROOHU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

)XQG�0DQDJHU /LQH�0DQDJHU�$SSUDLVDO�6\VWHP

5LVN�&RQWUROOHU /LQH�0DQDJHU�5RRP�5HVHUYDWLRQV

6WDII�$FFRXQWDQW +5�0DQDJHU

7UDGH�&RQWUROOHU +5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

7UDGHU +5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

7UHDVXU\�0DQDJHU +5�0DQDJHU�$SSUDLVDO�6\VWHP

3URGXFW�'DWD�0DQDJHPHQW +5�0DQDJHU�5RRP�5HVHUYDWLRQV

'HVLJQHU +5�0DQDJHU�&RPSHQVDWLRQ

:RUN�3UHSDUHU $GPLQLVWUDWLYH�&OHUN

)RUHLJQ�7UDGH $GPLQLVWUDWLYH�&OHUN�%HQHILWV

&RQ��([SRUW�&RQWURO�0DQDJHU $GPLQLVWUDWLYH�&OHUN�&RPSHQVDWLRQ

*RY��3HULRG�0DQDJHU $GPLQLVWUDWLYH�&OHUN�2UJDQL]DWLRQDO�0DQDJHPHQW

/RFDO�'RF��3D\PHQW�0DQDJHU %HQHILWV�6SHFLDOLVW

3UHIHUHQFH�PDQDJHU &RPSHQVDWLRQ�6SHFLDOLVW

3UR��([SRUW�0DQDJHU /LQH�0DQDJHU�%HQHILWV

3UR��,PSRUW�0DQDJHU /LQH�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW

6XSHUYLVRU /LQH�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ

/LQH�0DQDJHU�$SSUDLVDO�6\VWHP

/LQH�0DQDJHU�5RRP�5HVHUYDWLRQV

+5�0DQDJHU

Page 123: Amez 46 all

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–43

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

+5�0DQDJHU�2UJDQL]DWLRQDO�0DQDJHPHQW 3D\UROO�6SHFLDOLVW�*HUPDQ\

+5�0DQDJHU�3HUVRQQHO�&RVW�3ODQQLQJ 3D\UROO�6SHFLDOLVW�'DQPDUN

+5�0DQDJHU�$SSUDLVDO�6\VWHP 3D\UROO�6SHFLDOLVW�6SDLQ

+5�0DQDJHU�5RRP�5HVHUYDWLRQV 3D\UROO�6SHFLDOLVW�)UDQFH

+5�0DQDJHU�&RPSHQVDWLRQ 3D\UROO�6SHFLDOLVW�*UHDW�%ULWDLQ

,QFHQWLYH�:DJHV�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�+RQJ�.RQJ

7LPH�5HFRUGLQJ�6SHFLDOLVW 3D\UROO�6SHFLDOLVW�,QGRQHVLD

6SHFLDOLVW�2SHUDWLRQVSODQQHU 3D\UROO�6SHFLDOLVW�,UHODQG

3D\UROO�&OHUN 3D\UROO�6SHFLDOLVW�-DSDQ

3D\UROO�&OHUN�$XVWULD 3D\UROO�6SHFLDOLVW�0H[LFR

3D\UROO�&OHUN�%HOJLXP 3D\UROO�6SHFLDOLVW�0DOD\VLD

3D\UROO�&OHUN�&DQDGD 3D\UROO�6SHFLDOLVW�1HWKHUODQGV

3D\UROO�&OHUN�*HUPDQ\ 3D\UROO�6SHFLDOLVW�1RUZD\

3D\UROO�&OHUN�6SDLQ 3D\UROO�6SHFLDOLVW�1HZ�=HDODQG

3D\UROO�&OHUN�*UHDW�%ULWDLQ 3D\UROO�6SHFLDOLVW�3KLOLSSLQHV

3D\UROO�&OHUN�,QGRQHVLD 3D\UROO�6SHFLDOLVW�3RUWXJDO

3D\UROO�&OHUN�0H[LFR 3D\UROO�6SHFLDOLVW�6ZHGHQ

3D\UROO�&OHUN�0DOD\VLD 3D\UROO�6SHFLDOLVW�6LJQDSRUH

3D\UROO�&OHUN�1HWKHUODQGV 3D\UROO�6SHFLDOLVW�7KDLODQG

3D\UROO�&OHUN�1RUZD\ 3D\UROO�6SHFLDOLVW�7DLZDQ

3D\UROO�&OHUN�1HZ�=HDODQG 3D\UROO�6SHFLDOLVW�86$

3D\UROO�&OHUN�3KLOLSSLQHV 3D\UROO�6SHFLDOLVW�6RXWK�$IULFD

3D\UROO�&OHUN�3RUWXJDO 5HFUXLWHU

3D\UROO�&OHUN�6LJQDSRUH 6\VWHP�$GPLQLVWUDWRU

3D\UROO�&OHUN�7DLZDQ 6\VWHP�$GPLQLVWUDWRU�$UJHQWLQLD

3D\UROO�&OHUN�86$ 6\VWHP�$GPLQLVWUDWRU�$XVWULD

3D\UROO�&OHUN�9HQH]XHOD 6\VWHP�$GPLQLVWUDWRU�$XVWUDOLD

3D\UROO�&OHUN�6RXWK$IULFD 6\VWHP�$GPLQLVWUDWRU�%HOJLXP

3D\UROO�6SHFLDOLVW 6\VWHP�$GPLQLVWUDWRU�%UDVLO

3D\UROO�6SHFLDOLVW�$UJHQWLQLD 6\VWHP�$GPLQLVWUDWRU�&DQDGD

3D\UROO�6SHFLDOLVW�$XVWULD 6\VWHP�$GPLQLVWUDWRU�6XLVVH

3D\UROO�6SHFLDOLVW�$XVWUDOLD 6\VWHP�$GPLQLVWUDWRU�*HUPDQ\

3D\UROO�6SHFLDOLVW�%HOJLHQ 6\VWHP�$GPLQLVWUDWRU�'DQPDUN

3D\UROO�6SHFLDOLVW�%UDVLO 6\VWHP�$GPLQLVWUDWRU�6SDLQ

3D\UROO�6SHFLDOLVW�&DQDGD 6\VWHP�$GPLQLVWUDWRU�)UDQFH

3D\UROO�6SHFLDOLVW�6XLVVH 6\VWHP�$GPLQLVWUDWRU�*UHDW�%ULWDLQ

Page 124: Amez 46 all

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–44

8VHU�5ROH�7HPSODWHV����$��FRQWLQXHG�

6\VWHP�$GPLQLVWUDWRU�+RQJ�.RQJ 6\VWHP�$GPLQLVWUDWRU�2UJDQL]DWLRQDO�0DQDJHPHQW

6\VWHP�$GPLQLVWUDWRU�,QGRQHVLD 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�$GPLQLVWUDWLRQ

6\VWHP�$GPLQLVWUDWRU�,UHODQG 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�&RVW�3ODQQLQJ

6\VWHP�$GPLQLVWUDWRU�-DSDQ 6\VWHP�$GPLQLVWUDWRU�3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�0DOD\VLD 6\VWHP�$GPLQLVWUDWRU�$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�1HWKHUODQGV 6\VWHP�$GPLQLVWUDWRU�7UDLQLQJ�DQG�(YHQWV

6\VWHP�$GPLQLVWUDWRU�1RUZD\ 6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV

6\VWHP�$GPLQLVWUDWRU�1HZ�=HDODQG 6\VWHP�$GPLQLVWUDWRU�3D\UROO

6\VWHP�$GPLQLVWUDWRU�3KLOLSSLQHV 6\VWHP�$GPLQLVWUDWRU�5HFUXLWPHQW

6\VWHP�$GPLQLVWUDWRU�3RUWXJDO 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN

6\VWHP�$GPLQLVWUDWRU�6ZHGHQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�6LJQDSRUH 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�7KDLODQG 7UDLQLQJ�DQG�'HYHOSP��&OHUN��7UDLQLQJ�DQG�(YHQW�0DQDJHPHQW

6\VWHP�$GPLQLVWUDWRU�7DLZDQ 7UDLQLQJ�DQG�'HYHORSPHQW�&OHUN��5RRP�5HVHUYDWLRQ

6\VWHP�$GPLQLVWUDWRU�86$ 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��3HUVRQQHO�'HYHORSPHQW

6\VWHP�$GPLQLVWUDWRU�,QWHUQDWLRQDO 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��$SSUDLVDO�6\VWHP

6\VWHP�$GPLQLVWUDWRU�6RXWK�$IULFD 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��7UDLQLQJ

6\VWHP�$GPLQLVWUDWRU�5RRP�5HVHUYDWLRQV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW��5RRP�5HVHUYDWLRQ

6\VWHP�$GPLQLVWUDWRU�%HQHILWV 7UDLQLQJ�DQG�'HYHORSPHQW�6SHFLDOLVW

6\VWHP�$GPLQLVWUDWRU�&RPSHQVDWLRQ

5HOHDVH����%

7KH�IROORZLQJ�XVHU�UROH�WHPSODWHV�DYDLODEOH�ZLWK�5���5HOHDVH����%�DUH�LQ�DGGLWLRQ�WR�WKH�H[LVWLQJ�IURP5HOHDVH����$�DV�VKRZQ�DERYH�

%DVLV +XPDQ�5HVRXUFHV

$%$3�'HYHORSHU ,QFHQWLYH�:DJHV�&OHUN

$OH�$GPLQLVWUDWRU ,QFHQWLYH�:DJHV�6SHFLDOLVW

$/(�'HYHORSHUV 7LPH�5HFRUGLQJ�$GPLQLVWUDWRU

0DVWHU�'DWD�'LVWULEXWLRQ 7LPH�5HFRUGLQJ�6SHFLDOLVW

$FFRXQWLQJ�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�&OHUN

+5�0DVWHU�'DWD�'LVWULEXWLRQ 6KLIW�3ODQQLQJ�6SHFLDOLVW

/RJLVWLFV�0DVWHU�'DWD�'LVWULEXWLRQ 0DWHULDO�0DVWHU

)LQDQFH�PDQDJHPHQW %X\LQJ

),��$GYDQFH�3D\HU�IRU�7ULS�$GYDQFHV

Page 125: Amez 46 all

Chapter 5: User Role Templates

Available User Role Templates

Release 4.6A/B5–45

8VHU�5ROH�7HPSODWHV����%��FRQWLQXHG�

5HWDLO 0DLQWHQDQFH�RI�6DOHV�3ULFH�&DOFXODWLRQV

$OORFDWLRQ�7DEOH 3ULFLQJ�(QYLURQPHQW

$VVRUWPHQW�0DQDJHPHQW 6DOHV�3ULFH�&DOFXODWLRQV��6WUDWHJLF�

5HWDLO�6WRFN�3ODQQHU 3URPRWLRQ�0DQDJHPHQW

2UGHU�2SWLPL]LQJ 6WRUH�0DQDJHU

3HULVKDEOHV�3ODQQLQJ 7ULJJHULQJ�DQG�&RQWUROOLQJ�0HUFKDQGLVH�3URFXUHPHQW�LQ�D�6WRUH

&DWHJRU\�0DQDJHU *DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU

&ODVVLILFDWLRQ 6WRUH�*RRGV�5HFHLSWV�,VVXHV�DQG�,QYHQWRU\

0DLQWHQDQFH�RI�3XUFKDVH�3ULFH�&RQGLWLRQV 0DQDJHPHQW�RI�,QVWRUH�3HUVRQQHO

0DLQWHQDQFH�RI�6DOHV�3ULFH�&RQGLWLRQV ,QVWRUH�3ODQQLQJ�DQG�&RQWURO

*RRGV�5HFHLSW 6DOHV�$FWLYLWLHV�LQ�D�6WRUH

*RRGV�5HFHLSW�$VVRFLDWH 6DOHV�'HSDUWPHQW�0DQDJHU�LQ�D�6WRUH

,QWHUQDO�:DUHKRXVH�+DQGOLQJ 6WRUH�$VVRFLDWH�8VLQJ�6$3�5HWDLO�6WRUH

:DUHKRXVH�0DQDJHU 6HWWOHPHQW�RI�&XVWRPHU�$UUDQJHPHQWV

6KLSSLQJ�$VVRFLDWH 0DLQWHQDQFH�RI�&XVWRPHU�$UUDQJHPHQWV

:DUHKRXVH�:RUNHU 6HWWOHPHQW�RI�9HQGRU�$UUDQJHPHQWV

5HWDLO�%X\HU 0DLQWHQDQFH�RI�9HQGRU�$UUDQJHPHQWV

%X\LQJ�$FWLYLWLHV 7UDQVSRUWDWLRQ�0DQDJHU

*DWKHULQJ�,QIRUPDWLRQ�DQG�&KDQJLQJ�0DVWHU 7UDQVSRUWDWLRQ�3ODQQHU

,QYRLFH�9HULILFDWLRQ�&OHUN /RJLVWLFV�([HFXWLRQ

9HULILFDWLRQ�RI�,QYRLFHV 6KLSSLQJ�&OHUN

$UFKLYLQJ�RI�,QYRLFHV 6KLSSLQJ�0DQDJHU

)XQFWLRQV�LQ�WKH�,QYRLFH�9HULILFDWLRQ�(QYLURQPHQW 3ODQLQJ�6\VWHPV

&RRUGLQDWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW 'LVSOD\�DQG�0DLQWDLQ�:RUN�&HQWHU�0DVWHU�'DWD

([HFXWLRQ�RI�0HUFKDQGLVH�DQG�$VVRUWPHQW�3ODQQLQJ 6DOHV�3ULFH�9DOXDWLRQ

0HUFKDQGLVH�&DWHJRU\�+LHUDUFK\�&UHDWLRQ

5HTXLUHPHQWV�3ODQQLQJ

Page 126: Amez 46 all

Chapter 5: User Role Templates

Available User Role Templates

Authorizations Made Easy5–46

Page 127: Amez 46 all

6–1

&KDSWHU��� $GYDQFHG�3URILOH�*HQHUDWRU

)XQFWLRQDOLW\

&RQWHQWV

Overview ..................................................................................................................6–2

Selecting Views/Types in Activity Group Maintenance ......................................6–2

Exploring Advanced Profile Generator Functionality .........................................6–3

Copying and Deriving Activity Groups...............................................................6–16

Selecting Workflow Tasks....................................................................................6–21

Deleting Activity Groups ......................................................................................6–24

Postmaintaining User Role Templates ...............................................................6–25

Maintaining and Generating the Authorization Profiles....................................6–26

Displaying an Overview of Generated Profiles ..................................................6–30

Regenerating Authorization Profiles After Making Changes ...........................6–32

Using Utilities to Change Generated Authorizations ........................................6–36

Customizing Authorizations ................................................................................6–38

��

Page 128: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Overview

6–2

2YHUYLHZ

,Q�DGGLWLRQ�WR�WKH�WKUHH�PHWKRGV�RI�XVLQJ�WKH�XVHU�UROH�WHPSODWHV��WKH�3URILOH�*HQHUDWRU��3*�SURYLGHV�DGGLWLRQDO�RSWLRQDO�IXQFWLRQDOLW\�

,Q�WKLV�FKDSWHU��ZH�H[SODLQ�PRUH�RI�WKH�YDVW�IXQFWLRQDOLW\�RI�WKH�3*��([DPSOHV�VKRZ�KRZ�WRHQKDQFH�WKH�XVH�RI�\RXU�XVHU�UROH�WHPSODWHV�

6HOHFWLQJ�9LHZV�7\SHV�LQ�$FWLYLW\�*URXS�0DLQWHQDQFH

Views

Possible entries

Authorizations Made Easy

,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�ZLQGRZ��WUDQVDFWLRQ�3)&*���\RX�FDQ�WRJJOH�EHWZHHQGLIIHUHQW�YLHZV�DQG�W\SHV��)RU�YLHZV�\RX�FDQ�FKRRVH�< %DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV�< 2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ�

)RU�W\SHV�\RX�FDQ�FKRRVH�< $FWLYLW\�JURXS< &RPSRVLWH�DFWLYLW\�JURXS

7KHVH�YLHZV�DQG�W\SHV�DUH�GHVFULEHG�LQ�WKH�IROORZLQJ�VHFWLRQV�

%DVLF�0DLQWHQDQFH

6HOHFW�%DVLF�PDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��WR�FUHDWH�DFWLYLW\�JURXSV�DQG�DVVLJQWKHVH�JURXSV�WR�XVHUV�

2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�

6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�0DQDJHPHQW�DQG�ZRUNIORZ��WR�FUHDWH�DFWLYLW\�JURXSV�DQGDVVLJQ�WKHVH�DFWLYLW\�JURXSV�WR�5���XVHUV�RU�3'�REMHFWV��2YHUYLHZ�JLYHV�\RX�IXOO�DFFHVV�WR�DOODFWLYLW\�JURXS�PDLQWHQDQFH�IXQFWLRQV��LQFOXGLQJ�RUJDQL]DWLRQ�PDQDJHPHQW�DQG�WKH�UHODWHGWLPH�GHSHQGHQFLHV��)RU�H[DPSOH��ZKHQ�\RX�DUH�FUHDWLQJ�RU�FKDQJLQJ�DQ�DFWLYLW\�JURXS��\RXFDQ�RQO\�OLQN�ZRUNIORZ�WDVNV�WR�DQ�DFWLYLW\�JURXS�LQ�2YHUYLHZ�

Types

Page 129: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–3

$FWLYLW\�*URXS

6HOHFW�$FWLYLW\�JURXS�WR�GLVSOD\�DOO�DYDLODEOH�DFWLYLW\�JURXSV��LQFOXGLQJ�FRPSRVLWH�DFWLYLW\JURXSV�ZKHQ�\RX�VHOHFW�SRVVLEOH�HQWULHV�

&RPSRVLWH�$FWLYLW\�*URXS

6HOHFW�&RPSRVLWH�DFWLYLW\�JURXSV�WR�GLVSOD\�RQO\�FRPSRVLWH�DFWLYLW\�JURXSV�ZKHQ�\RX�VHOHFWSRVVLEOH�HQWULHV�

([SORULQJ�$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\

,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHVFULEHG�WKUHH�PHWKRGV�WR�ZRUN�ZLWK�XVHU�UROHWHPSODWHV��<RX�DFWXDOO\�KDYH�PRUH�RSWLRQV�ZKHQ�ZRUNLQJ�ZLWK�WKH�DFWLYLW\�JURXSV�DQG3URILOH�*HQHUDWRU��3*���)RU�H[DPSOH��WKHUH�DUH�GLIIHUHQW�ZD\V�WR�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\JURXS³\RX�FDQ�FUHDWH�\RXU�RZQ�KLHUDUFK\�ZLWK�FXVWRPL]HG�IROGHUV��QDPHV��DQG�OLQNV�IRUWKH�XVHU�UROH�WHPSODWHV�\RX�FUHDWH�

2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��VHH�EHORZ���D�VHULHV�RI�EXWWRQV�DURXQG�WKH�DVVLJQHGWUDQVDFWLRQV�SURYLGH�GLIIHUHQW�IXQFWLRQDOLW\�

Creating or changing thehierarchy (folders, names,order)

Inserting transactions andreports manually or fromdifferent existing menus

Additional activities(moving object in hierarchy,translating, displayingtechnical names, ordisplaying objectdocumentation)

Inserting Internet anddocument links

Select a system whereyou would like thesetransactions to beexecuted

Displaying reportinformation

Page 130: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–4

&UHDWLQJ�DQG�&KDQJLQJ�WKH�+LHUDUFK\

<RX�FDQ�DVVLJQ�REMHFWV�WR�DQ�DFWLYLW\�JURXS�E\�HLWKHU�< &UHDWLQJ�\RXU�RZQ�KLHUDUFK\< 0RYLQJ�REMHFWV�LQWR�WKH�H[LVWLQJ�KLHUDUFK\�DQG�UHQDPLQJ�WKHP�WR�VXLW�\RXU�QHHGV

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WR�LQVHUW�D�IROGHU��JLYH�LW�D�QHZ�QDPH��DQG�PRYH�LW�LQWR�WKHKLHUDUFK\�

:H�ZDQW�WR�FUHDWH�D�QHZ�IROGHU�DQG�FDOO�LW�´%X\HUµ�XQGHU�0DVWHU�'DWD�→�9HQGRU�LQ�WKH�DFWLYLW\�JURXS00B%8<(5B$*�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�VHOHFW�WKH�KLHUDUFK\�OHYHO�XQGHUZKLFK�\RX�ZDQW�WR�LQVHUW�WKH�IROGHU�IRU�H[DPSOH��9HQGRU�LQ00B%8<(5B$*��

�� &KRRVH� �

�� (QWHU�WKH�QDPH�RI�WKH�QHZ�IROGHU�

�� &KRRVH� �5

3

4

6

Page 131: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–5

�� 7KH�QHZ�IROGHU�LV�SODFHG�RQH�OHYHOEHORZ�WKH�VHOHFWHG�IROGHU�LQ�WKHKLHUDUFK\��7R�PRYH�LW�XS�RU�GRZQ�XVH�WKH�DUURZV� �RU�XVH�GUDJ�DQG�GURS�

7R�FKDQJH�WKH�WH[W�RI�WKH�QRGH��VHOHFW�LWDQG�HQWHU�WKH�QHZ�QDPH�

<RX�QHHG�WR�EH�FHUWDLQ�KRZ�\RX�FKDQJH�\RXU�PHQXV��EHFDXVH�LI�WKH�RULJLQDO�5���PHQXSDWK�FKDQJHV��\RX�PLJKW�QRW�EH�DEOH�WR�ILQG�\RXU�VHOHFWHG�WUDQVDFWLRQ�LQ�WKH�VDPHSRVLWLRQ�DV�EHIRUH�

,QVHUWLQJ�7UDQVDFWLRQV

:H�FRQWLQXH�IURP�WKH�VWHS�DERYH�WR�VKRZ�KRZ�WR�LQVHUW�WUDQVDFWLRQV�XQGHU�WKH�QHZO\�FUHDWHG�IROGHU�

,I�\RX�NQRZ�WKH�WUDQVDFWLRQ�FRGH��\RX�FDQ�LQVHUW�LW�PDQXDOO\�E\�FKRRVLQJ� �7UDQVDFWLRQ�DQG�HQWHULQJ�WKHWUDQVDFWLRQ�FRGH��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�IRU�GHWDLOV��

7R�VHOHFW�WKH�WUDQVDFWLRQ�IURP�D�PHQX��FKRRVH�RQH�RI�WKH�IROORZLQJ�EXWWRQV�

�)URP�WKH�6$3�PHQX��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�0RGLI\�WKH�6$3�SURYLGHG�8VHU�5ROH�7HPSODWHV�

�)URP�DFWLYLW\�JURXS

�)URP�DUHD�PHQX

7

Page 132: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–6

�� &KRRVH�IURP�ZKHUH�\RX�ZRXOG�OLNHWR�LQVHUW�WKH�WUDQVDFWLRQ��LQ�WKLVH[DPSOH��ZH�FKRVH� �)URP�DFWLYLW\JURXS��

,I�\RX�LQVHUW�WUDQVDFWLRQV�IURP�DGLIIHUHQW�PHQX��WKH�FRPSOHWH�PHQX�SDWKIURP�WKDW�VRXUFH�ZLOO�EH�DGGHG�

�� 6HOHFW�WKH�DFWLYLW\�JURXS�IURP�ZKHUH\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKHWUDQVDFWLRQ�FRGH��<RX�QHHG�WR�NQRZZKDW�DFWLYLW\�JURXS�FRQWDLQV�WKLVWUDQVDFWLRQ��:H�VHOHFWHG6$3B00B*/B%8<(5B$*�

�� &KRRVH� �

2

3

1

Page 133: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–7

7KH�PHQX�VWUXFWXUH�RI�WKH�VHOHFWHGDFWLYLW\�JURXS�DSSHDUV�

�� 2SHQ�WKH�GHVLUHG�KLHUDUFK\�OHYHODQG�VHOHFW�WKH�GHVLUHG�WUDQVDFWLRQ�V��

7R�VLPSOLI\�\RXU�VHDUFK��WXUQ�RQ�WKHWHFKQLFDO�QDPHV�E\�FKRRVLQJ� �

�� &KRRVH� �$GG�WR�WUDQVIHU�WKHWUDQVDFWLRQV�WR�\RXU�DFWLYLW\�JURXS�7KH�FRPSOHWH�PHQX�SDWK��LQ�WKLVFDVH��9HQGRU�→�%X\HU�ZLWK�DFWLYLW\JURXSV�&UHDWH��&KDQJH��DQG�'LVSOD\�LV�WUDQVIHUUHG�

$IWHU�WKH�FRPSOHWH�PHQX�SDWK�LVLQVHUWHG��\RX�KDYH�WKH�RSWLRQ�WRUHQDPH�LW�DQG�PRYH�WKH�LQVHUWHGWUDQVDFWLRQV�WR�WKH�GHVLUHG�SRVLWLRQXVLQJ�GUDJ�DQG�GURS�RU�0RYH�QRGH�

�� 6HOHFW�WKH�WUDQVDFWLRQ�WR�EH�PRYHG�

�� &KRRVH� �0RYH�QRGH�RU�XVH�GUDJ�DQG�GURS�WR�PRYH�LW�

4

5

6

7

Page 134: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–8

�� 6HOHFW�WKH�GHVLUHG�IROGHU��IRUH[DPSOH��%X\HU��

�� &KRRVH� �

7KH�WUDQVDFWLRQ�KDV�EHHQ�PRYHG�

'R�WKH�VDPH�IRU�WKH�RWKHUWUDQVDFWLRQV�XQWLO�DOO�DUH�LQ�WKH�ULJKWIROGHU�

��� 6HOHFW�WKH�PHQX�HQWU\�WKDW�ZDVWUDQVIHUUHG��IRU�H[DPSOH�9HQGRU��

��� &KRRVH� �WR�GHOHWH�WKH�HQWU\�

8

9

11

10

Page 135: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–9

7KH�WUDQVDFWLRQV�KDYH�EHHQ�PRYHGDQG�WKH�QRGH�KDV�EHHQ�GHOHWHG�

$IWHU�LQVHUWLQJ�DOO�WKH�GHVLUHGWUDQVDFWLRQV��\RX�KDYH�WR�JHQHUDWHWKH�DFWLYLW\�JURXS�DQG�DVVLJQ�XVHUV�

Page 136: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–10

,QVHUWLQJ�,QWHUQHW�DQG�'RFXPHQW�/LQNV

<RX�KDYH�WKH�RSWLRQ�WR�DVVLJQ�OLQNV³IRU�H[DPSOH�0LFURVRIW�:RUG��([FHO�GRFXPHQWV�RU�,QWHUQHW�VLWHV³WR�DQDFWLYLW\�JURXS�VR�WKDW�WKHVH�OLQNV�ZLOO�EH�DYDLODEOH�WR�DOO�HQG�XVHUV�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS��(QG�XVHUVDOVR�KDYH�WKH�RSWLRQ�WR�FUHDWH�WKHLU�RZQ�OLQNV�ODWHU�RQ�WKHLU�(DV\�$FFHVV�VFUHHQ��,Q�WKH�IROORZLQJ�H[DPSOH�ZH�DGG�D�OLQN�WR�D�ORFDO�0LFURVRIW�([FHO�VSUHDGVKHHW�DQG�D�ZHE�SDJH��:H�DUH�JRLQJ�WR�XVH�WKH�DFWLYLW\�JURXSIURP�DERYH�DQG�ZLOO�LQVHUW�D�IROGHU�FDOOHG�,QIRUPDWLRQ�VRXUFH�DV�D�SUHUHTXLVLWH�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� ,Q�WKH�&KDQJH�$FWLYLW\�*URXSVZLQGRZ��VHOHFW�WKH�SRVLWLRQ�ZKHUH\RX�ZRXOG�OLNH�WR�LQVHUW�WKHGRFXPHQW�OLQN��IRU�H[DPSOH��WKHIROGHU�,QIRUPDWLRQ�VRXUFH��

�� &KRRVH� �:HE�DGGUHVV�1RWH��(YHQ�LI�\RX�ZDQW�WR�LQVHUW�DGRFXPHQW�OLQN��\RX�PXVW�XVH�WKH

�:HE�DGGUHVV�EXWWRQ�

�� (QWHU�WKH�WH[W�IRU�WKH�OLQN�LQ�WKH�7H[WILHOG�

�� (QWHU�WKH�SDWK�WR�WKH�GRFXPHQW�RUXVH�SRVVLEOH�HQWULHV�WR�VHOHFW�LW�

�� &KRRVH� �

7KH�GRFXPHQW�FDQ�EH�D�ORFDO�GRFXPHQW�RU�D�GRFXPHQW�IURP�WKH�QHWZRUN��1RWH�WKDWQDPHV�IRU�GLIIHUHQW�KDUG�GULYHV�PD\�EH�GLIIHUHQW�

34

56

7

Page 137: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–11

�� 7KH�OLQN�WR�WKH�([FHO�VSUHDGVKHHW�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VDQ�LFRQ�WKDW�UHSUHVHQWV�WKHGRFXPHQW�W\SH�

�� &KRRVH� �:HE�DGGUHVV�WR�LQVHUW�WKH,QWHUQHW�OLQN�

��� ,Q�7H[W��HQWHU�WKH�WH[W�IRU�WKH�OLQN�

��� ,Q�:HE�DGGUHVV�RU�ILOH��HQWHU�WKH�85/OLQN�WR�WKH�GHVLUHG�SDJH�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�D�VDYHG�85/�

��� &KRRVH� �

��� 7KH�OLQN�WR�WKH�,QWHUQHW�SDJH�KDVEHHQ�LQVHUWHG��7KH�V\VWHP�GLVSOD\VWKH�LFRQ� �IRU�,QWHUQHW�OLQNV�

8

9

13

Page 138: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–12

,QVHUWLQJ�5HSRUWV

1HDUO\�HYHU\�UHSRUW�LQ�WKH�V\VWHP�KDV�D�WUDQVDFWLRQ�DVVLJQHG�WR�LW��7KHUHIRUH�\RX�FDQ�VHOHFWDQ\�UHSRUW�DQG�DXWKRUL]H�XVHUV�MXVW�IRU�FHUWDLQ�UHSRUWV��7KHUH�DUH�GLIIHUHQW�RSWLRQV�WR�DVVLJQ�DUHSRUW�WR�DQ�DFWLYLW\�JURXS��<RX�FDQ�VHOHFW�IURP�HLWKHU�< $%$3�UHSRUW< 6$3�TXHU\< 7UDQVDFWLRQ�ZLWK�YDULDQW< 5HSRUW:ULWHU< 'ULOOGRZQ< 5HS�SRUWIROLR

1RW�RQO\�FDQ�\RX�DVVLJQ�UHSRUWV�WR�WKH�PHQX�WKDW�DUH�SURYLGHG�E\�6$3�WKDW�DOUHDG\�KDYH�DWUDQVDFWLRQ��EXW�LW�LV�DOVR�SRVVLEOH�WR�DVVLJQ�VHOI�GHYHORSHG�UHSRUWV�ZLWK�WKLV�IXQFWLRQDOLW\�:KHQ�\RX�DVVLJQ�D�VHOI�GHYHORSHG�UHSRUW��\RX�FDQ�FUHDWH�D�WUDQVDFWLRQ�FRGH�WR�WKH�UHSRUWZKHQ�DGGLQJ�LW�WR�WKH�PHQX�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�RQO\�RQH�PHWKRG��WKH�RWKHUV�DUH�VLPLODU��

([DPSOH�

:H�VHOHFW�WKH�UHSRUW�'XH�'DWH�$QDO\VLV�IRU�2SHQ�,WHPV�IURP�WKH�DSSOLFDWLRQ�FODVV�),��$FFRXQWV�SD\DEOH�DQGDVVLJQ�LW�WR�D�IROGHU�FDOOHG�5HSRUWV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH��00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�0HQX�WDE��VHOHFW�WKH�IROGHUZKHUH�\RX�ZRXOG�OLNH�WR�LQVHUW�WKHUHSRUW�

�� &KRRVH� �5HSRUW�3

4

Page 139: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–13

,Q�RXU�H[DPSOH��ZH�GHPRQVWUDWHKRZ�WR�VHOHFW�D�UHSRUW�IURP�WKHDSSOLFDWLRQ�FODVV�

�� &KRRVH�'ULOOGRZQ�

,I�\RX�H[SDQG�WKH�SRSXS�XVLQJ� �WRGLVSOD\�RWKHU�RSWLRQV��\RX�FDQ�FKRRVHZKHWKHU�WR�DVVLJQ�\RXU�RZQ�WUDQVDFWLRQFRGH�RU�GHVFULSWLRQ�WR�WKH�UHSRUW��RUJHQHUDWH�WKH�WUDQVDFWLRQ�FRGHDXWRPDWLFDOO\�DQG�DGRSW�WKH�UHSRUWWUDQVDFWLRQ�

��� 6HOHFW�WKH�GHVLUHG�FODVV�IURP�WKH�OLVW�

�� &KRRVH�(QWHU�

'HSHQGLQJ�RQ�ZKDW�\RX�VHOHFWHG��WKHIROORZLQJ�ZLQGRZ��RU�ZLQGRZV��IRUVWHSV��²��PLJKW�GLIIHU�

�� 6HOHFW�WKH�GHVLUHG�UHSRUW�W\SH�

�� &KRRVH� �

��� &KRRVH�SRVVLEOH�HQWULHV�WR�VHOHFW�WKHUHSRUW�

5

6

8

9

10

Tip

7

Page 140: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Authorizations Made Easy6–14

��� 6HOHFW�WKH�GHVLUHG�UHSRUW�IURP�WKH�KLWOLVW�

��� &KRRVH� �

��� &KRRVH� �

��� &KRRVH� �

��� 7R�VDYH�\RXU�ZRUN��FKRRVH� �

7KH�UHSRUW�KDV�EHHQ�DVVLJQHG�

,I�\RX�GHFLGHG�WR�JLYH�WKH�UHSRUW�DGLIIHUHQW�QDPH�DQG�GHVFULSWLRQ��WKH�QHZLQIRUPDWLRQ�ZRXOG�EH�GLVSOD\HG�LQ�WKHPHQX�LQVWHDG�

11

14

12

13

15

Page 141: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Exploring Advanced Profile Generator Functionality

Release 4.6A/B6–15

'LVSOD\LQJ�WKH�2QOLQH�'RFXPHQWDWLRQ�IRU�$FWLYLW\�*URXS�2EMHFWV

<RX�PD\�UHYLHZ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�QHDUO\�HYHU\�REMHFW�LQ�WKH�DFWLYLW\�JURXS�VWUXFWXUH��LIDYDLODEOH���,I�\RX�DUH�QRW�VXUH�DERXW�D�FHUWDLQ�WUDQVDFWLRQ��LQVWHDG�RI�JRLQJ�WKURXJK�WKH�RQOLQHGRFXPHQWDWLRQ��MXVW�PDUN�LW�LQ�WKH�VWUXFWXUH�DQG�FKRRVH� �'LVSOD\�GRFXPHQWDWLRQ��7KH�DGYDQWDJH�RI�WKLVPHWKRG�LV�\RX�GR�QRW�QHHG�WR�NQRZ�ZKDW�DUHD�\RXU�REMHFW�EHORQJV�WR�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZRXOG�OLNH�WR�NQRZ�PRUH�DERXW�WKH�WUDQVDFWLRQ�0(���&UHDWH�SXUFKDVH�RUGHU�

�� 6HOHFW�WKH�REMHFW�IRU�ZKLFK�\RX�ZDQWWR�UHDG�WKH�GRFXPHQWDWLRQ�

�� &KRRVH� �'LVSOD\�GRFXPHQWDWLRQ�

�� 7KH�GRFXPHQWDWLRQ�EURZVHU�DSSHDUVZLWK�WKH�RQOLQH�GRFXPHQWDWLRQ�IRUWKH�VHOHFWHG�REMHFW�

'HSHQGLQJ�RQ�KRZ�\RX�VHW�XS�\RXURQOLQH�GRFXPHQWDWLRQ��WKH�EURZVHUPLJKW�ORRN�GLIIHUHQW�

3

1

2

Page 142: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–16

&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV

%DVLFV�RQ�'XSOLFDWLQJ�$FWLYLW\�*URXSV

,W�LV�DFFHSWDEOH�WR�XWLOL]H�RQO\�DFWLYLW\�JURXSV�LQ�\RXU�LPSOHPHQWDWLRQ�DQG�FUHDWH�WKHP�DVQHHGHG��+RZHYHU��6$3�SURYLGHV�WZR�PHWKRGV�WR�PDNH�DFWLYLW\�JURXS�PDLQWHQDQFH�HDVLHU�

7KHVH�WZR�FRUH�PHWKRGV�LQFOXGH�< &RS\LQJ�DFWLYLW\�JURXSV< 8VLQJ�GHULYHG�RU�LQKHULWHG�DFWLYLW\�JURXSV

7KH�GLDJUDP�EHORZ�SURYLGHV�DQ�RYHUYLHZ�RI�ZKDW�WR�H[SHFW�IURP�WKRVH�RSWLRQV�

���7KH�JUHHQ�FLUFOH�LQGLFDWHV�WKDW�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�

���7KH�UHG�;�LQGLFDWHV�WKDW�QR�PDLQWDLQHG�RU�DVVLJQHG�LWHPV�H[LVW�

&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWKRXW�D�XVHU

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�

copy WITHOUT user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

7KH�FRS\��DFWLYLW\BJURXSB���FRQWDLQV�WKH�VDPHLQIRUPDWLRQ�DV�DFWLYLW\BJURXSB��H[FHSW�WKH�XVHU�

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

&RSLHG�DFWLYLW\�JURXS

&RS\LQJ�DQ�DFWLYLW\�JURXS�ZLWK�D�XVHU

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$FWLYLW\BJURXSB��LV�WKH�RULJLQDO�DFWLYLW\�JURXS�ZKLFK�ZH�DUH�JRLQJ�WR�FRS\�ZLWK�WKH�XVHUDVVLJQPHQW�LQ�WKLV�H[DPSOH�

copy WITH user assignment 'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

&RSLHG�DFWLYLW\�JURXS

7KH�FRS\��DFWLYLW\BJURXSB���LV�LGHQWLFDO�WRDFWLYLW\BJURXSB��

7KHUH�LV�QR�OLQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQG�DFWLYLW\BJURXSB��DIWHU�WKH�FRS\�SURFHVV�LVSHUIRUPHG�LQ�WKH�WZR�FDVHV�DERYH�

Page 143: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Release 4.6A/B6–17

'HULYLQJ�DQ�DFWLYLW\�JURXS

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

'HVFULSWLRQ 0HQX $XWKRUL]DWLRQV 8VHU

'HVFULSWLRQ

$FWLYLW\�JURXS $FWLYLW\BJURXSB�

'HULYHG�DFWLYLW\�JURXS

Derive activity group

7KLV�LV�WKH�GHULYHG�DFWLYLW\�JURXS��$OO�WUDQVDFWLRQVIURP�WKH�RULJLQDO�DFWLYLW\�JURXSV�DUH�DOVR�LQ�WKLVRQH��<RX�FDQ�QRW�DGG�DQ\�LWHPV�WR�WKH�PHQX�7KH�DXWKRUL]DWLRQ�YDOXHV�QHHG�WR�EH�PDLQWDLQHG�

:H�DUH�JRLQJ�WR�FUHDWH�D�QHZ�DFWLYLW\�JURXS��DFWLYLW\BJURXSB���IURP�$FWLYLW\BJURXSB��E\�XVLQJ�7UDQVDFWLRQ�,QKHULWDQFH�

7UDQVDFWLRQ�,QKHULWDQFH7UDQVDFWLRQ�,QKHULWDQFH

'HULYH�IURP�DFWLYLW\�JURXS 'HULYH�IURP�DFWLYLW\�JURXS

$FWLYLW\BJURXSB�

2ULJLQDO�DFWLYLW\�JURXS

$GGLQJ�WUDQVDFWLRQ�FRGHV�WR�DFWLYLW\BJURXSB��DIWHU�DFWLYLW\BJURXSB��LV�FUHDWHG�RU�JHQHUDWHG�DXWRPDWLFDOO\�LPSDFWV�DFWLYLW\BJURXSB���/LQNDJH�EHWZHHQ�DFWLYLW\BJURXSB��DQGDFWLYLW\BJURXSB��LV�DOZD\V�XSGDWHG�DXWRPDWLFDOO\�ZKHQ�DFWLYLW\BJURXSB��KDV�QHZ�WUDQVDFWLRQFRGHV�DGGHG�WR�LW�

&RS\LQJ�$FWLYLW\�*URXSV

$V�VKRZQ�LQ�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV��FRS\LQJPHDQV�WKDW�\RX�UHSURGXFH�DQ�H[LVWLQJ�DFWLYLW\�JURXS��<RX�FDQ�FKRRVH�ZKHWKHU�RU�QRW�\RXZDQW�WR�FRS\�WKH�XVHU�DVVLJQPHQW�ZLWK�WKLV�DFWLYLW\�JURXS�

2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�ZKLFK�\RXZRXOG�OLNH�WR�FRS\�RU�VHOHFW�LW�E\�XVLQJ�SRVVLEOH�HQWULHV��7KHQ�FKRRVH� �WR�FRS\�LW��2Q�WKHIROORZLQJ�VFUHHQ��HQWHU�WKH�QHZ�QDPH�IRU�WKH�FRSLHG�DFWLYLW\�JURXS��)RU�D�PRUH�GHWDLOHGGHVFULSWLRQ��VHH�FKDSWHU����WKH�VHFWLRQ�&RS\�DQG�&KDQJH�([LVWLQJ�8VHU�5ROH�7HPSODWHV�

'HULYLQJ�$FWLYLW\�*URXSV

'HULYLQJ�DQ�DFWLYLW\�JURXS��DOVR�FDOOHG�WUDQVDFWLRQ�LQKHULWDQFH��PHDQV�\RX�FDQ�XVH�DQH[LVWLQJ�DFWLYLW\�JURXS�DV�D�UHIHUHQFH��(VVHQWLDOO\��WKH�V\VWHP�WUDQVIHUV�WKH�WUDQVDFWLRQV�IURPDQ�H[LVWLQJ�DFWLYLW\�JURXS��7KLV�SURFHVV�RI�GHULYLQJ�RQH�DFWLYLW\�JURXS�IURP�DQRWKHU�LV�RQO\SRVVLEOH�LI�\RX�KDYH�QRW�\HW�DVVLJQHG�DQ\�WUDQVDFWLRQV�WR�WKH�QHZ�DFWLYLW\�JURXS��7KHSUHYLRXV�DFWLYLW\�JURXS�SDVVHV�RQ�DOO�LWV�WUDQVDFWLRQV�WR�WKH�DFWLYLW\�JURXS�GHSHQGHQW�RQ�LW��,I\RX�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�LV�HDV\�WR�PDLQWDLQ�FRQVLVWHQF\�EHWZHHQ�DFFHVV�WRWUDQVDFWLRQ�FRGHV�

,I�\RX�DUH�JRLQJ�WR�XVH�GHULYHG�DFWLYLW\�JURXSV��LW�GRHV�QRW�PDNH�PXFK�VHQVH�WR�XVHWHPSODWHV�RU�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQV�ZLWK�WKH�RULJLQDO�DFWLYLW\�JURXS��2QO\�WKHWUDQVDFWLRQ�FRGHV�DUH�SDVVHG�DORQJ�WR�WKH�GHULYHG�DFWLYLW\�JURXS��7KH�PDQXDOO\�LQVHUWHGDXWKRUL]DWLRQV�DQG�WHPSODWHV�LQ�DFWLYLW\�JURXS���ZLOO�QRW�EH�FRSLHG�LQWR�DFWLYLW\�JURXS���QRU�ZLOO�WKH�OLQNDJH�EH�PDLQWDLQHG�LI�PDQXDOO\�LQVHUWHG�LQ�DFWLYLW\�JURXS����

Page 144: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–18

$V�RI�5HOHDVH����%��LW�LV�DOVR�SRVVLEOH�WR�DGMXVW�DQG�JHQHUDWH�WKH�SURILOHV�IRU�DOO�DFWLYLW\JURXSV�GHULYHG�IURP�WKH�RULJLQDO�DFWLYLW\�JURXS��$OO�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLV�DFWLYLW\JURXS�LV�SDVVHG�WR�WKH�GHULYHG�DFWLYLW\�JURXSV��H[FHSW�IRU�WKH�RUJDQL]DWLRQDO�OHYHOV��7KHRUJDQL]DWLRQDO�OHYHOV�RI�WKH�GHULYHG�DFWLYLW\�JURXSV�UHPDLQ�XQFKDQJHG��7KH�GDWD�IRU�WKHFRUUHVSRQGLQJ�RUJDQL]DWLRQDO�OHYHO�LV�RQO\�SDVVHG�LI�QR�GDWD�KDV�EHHQ�PDLQWDLQHG�IRU�WKHRUJDQL]DWLRQDO�OHYHO�LQ�D�GHULYHG�DFWLYLW\�JURXS�

7R�H[HFXWH�WKLV�DFWLRQ��\RX�QHHG�IXOO�DXWKRUL]DWLRQ�IRU�WKH�REMHFW�6B86(5B9$/�DV�ZHOO�DV�WKHDXWKRUL]DWLRQ�WR�FKDQJH�WKH�GHULYHG�DFWLYLW\�JURXSV�

7R�DFFHVV�WKLV�IXQFWLRQDOLW\��FKRRVH�$XWKRUL]DWLRQV�→��$GMXVW�GHULYHG�DFWLYLW\�JURXSV�RQ�WKH&KDQJH�$XWKRUL]DWLRQ�'DWD�VFUHHQ�RI�WKH�RULJLQDO�DFWLYLW\�JURXS�

([DPSOH��8VDJH�RI�'HULYHG�$FWLYLW\�*URXSV

$�PDQDJHU�ZDQWV�KHU�VWDII�WR�EH�DEOH�WR�DFFHVV�DOO�WKH�WUDQVDFWLRQV�WKDW�VKH�FDQ��+RZHYHU�KHU�HPSOR\HHV�DUH�QRW�WR�KDYH�DOO�WKH�IXQFWLRQDOLW\�WKDW�HDFK�WUDQVDFWLRQ�RIIHUV�$V�VXFK��ZH�FRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG��0$1$*(5�$�$&&(66�ZLWK�WKHWUDQVDFWLRQ�FRGHV��:H�ZRXOG�DOVR�PDLQWDLQ�DOO�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKLVDFWLYLW\�JURXS��7KHQ�ZH�ZRXOG�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�(03/2<((6�0$1$*(5�$�DQG�XVH�0$1$*(5�$�$&&(66�DV�WKH�GHULYHG�DFWLYLW\�JURXS��2Q�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS·V�GHVFULSWLRQ�VFUHHQ�RI�WUDQVDFWLRQ�3)&*��LQ�WKH�ILHOG�'LYHUW$FWLYLW\�*URXS��ZH�ZRXOG�SODFH�0$1$*(5�$�$&&(66���6LQFH�RQO\�WKH�WUDQVDFWLRQV�DUHFRSLHG�LQWR�WKH�´PHQXµ��GHULYHG�IURP�0$1$*(5�$�$&&(66���ZH�VWLOO�QHHG�WR�PDLQWDLQWKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRU�WKH�(03/2<((6�0$1$*(5�$�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��HQWHU�WKH�QDPH�IRU�\RXU�QHZDFWLYLW\�JURXS�LQ�WKH�$FWLYLW\�JURXSILHOG�

�� &KRRVH� �&UHDWH�2

3

Page 145: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Release 4.6A/B6–19

�� ,Q�'HVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�

�� 8QGHU�$FWLYLW\�JURXS�GHVFULSWLRQ�HQWHU�D�ORQJ�GHVFULSWLRQ�

�� 8QGHU�7UDQVDFWLRQ�LQKHULWDQFH��VHOHFWDQ�DFWLYLW\�JURXS�IURP�ZKLFK�\RXZDQW�WR�LQKHULW�WKH�WUDQVDFWLRQV��E\HLWKHU�HQWHULQJ�WKH�QDPH�LQ�WKH'HULYH�IURP�DFWLYLW\�JURXS�ILHOG�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

�� &KRRVH�<HV�

7

4

5

6

Page 146: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Copying and Deriving Activity Groups

Authorizations Made Easy6–20

�� &KRRVH� �

�� 7R�UHYLHZ�WKH�LQKHULWHG�WUDQVDFWLRQV�FKRRVH�WKH�0HQX�WDE�

$OO�WKH�WUDQVDFWLRQV�IURP�\RXURULJLQDO�DFWLYLW\�JURXS�KDYH�EHHQLQKHULWHG��7KH�PHQX�LV�JRLQJ�WR�ORRNWKH�VDPH�IRU�WKH�XVHU�DV�\RX�GHILQHGLW�KHUH�

1RZ�\RX�FDQ�PDLQWDLQ�WKHDXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�

8

9

Page 147: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Release 4.6A/B6–21

6HOHFWLQJ�:RUNIORZ�7DVNV

:KDW�<RX�6KRXOG�.QRZ�$ERXW�:RUNIORZ

7KLV�VHFWLRQ�SURYLGHV�D�VWHS�E\�VWHS�VDPSOH�6$3�%XVLQHVV�:RUNIORZ�DQG�DQ�H[SODQDWLRQ�RIZKDW�\RX�VKRXOG�NQRZ�DERXW�WDVNV�EHIRUH�\RX�DVVLJQ�WKHP�WR�\RXU�DFWLYLW\�JURXS�

7DVNV�DUH�XVHG�WR�H[SHGLWH�D�EXVLQHVV�SURFHGXUH��$�WDVN�FDQ�EH�HLWKHU�D�VLQJOH�VWHS�WDVN�RU�DPXOWL�VWHS�WDVN��,Q�WKH�IROORZLQJ�H[DPSOH��FUHDWLQJ�WKH�5HTXHVW�IRU�/HDYH�IRUP�DQG�WKHQFKHFNLQJ�WKLV�UHTXHVW�DUH�ERWK�VLQJOH�VWHS�WDVNV��7KH�SURFHGXUH�IRU�SURFHVVLQJ�D�5HTXHVW�IRU/HDYH�IRUP�LV�D�PXOWL�VWHS�WDVN��FRQVLVWLQJ�RI�VHYHUDO�FRPELQHG�VLQJOH�VWHS�WDVNV�

7KHUH�DUH�GLIIHUHQFHV�EHWZHHQ�WKH�VLQJOH�VWHS�VWDQGDUG�WDVNV�DQG�WKH�PXOWL�VWHS�ZRUNIORZWHPSODWHV��6WDQGDUG�WDVNV�DUH�WKH�VLQJOH�VWHS�WDVNV�XVHG�LQ�6$3·V�ZRUNIORZ�WHPSODWHV��0DQ\VWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�DUH�SURYLGHG�E\�6$3�DQG�VKRXOG�QRW�EH�FKDQJHG�E\FXVWRPHUV��&XVWRPHUV�FDQ��KRZHYHU��FRS\�DQG�PRGLI\�WKHVH�WHPSODWHV�WR�FUHDWH�WKHLU�RZQVWDQGDUG�WDVNV�DQG�ZRUNIORZ�WHPSODWHV�

:RUNIORZ�REMHFWV�WKDW�FDQ�EH�OLQNHG�WR�DQ�DFWLYLW\�JURXS

6WDQGDUG�WDVNV��76� 76�²�FOLHQW�LQGHSHQGHQW

:RUNIORZ�WHPSODWHV��:6� :6���FOLHQW

([DPSOH��6DPSOH�:RUNIORZ�IRU�D�1RWLILFDWLRQ�$EVHQFH

7KLV�SURFHVV�EHJLQV�ZKHQ�DQ�HPSOR\HH�VXEPLWV�D�FRPSOHWHG�5HTXHVW�IRU�/HDYH�IRUP��7KLVIRUP�LV�DXWRPDWLFDOO\�IRUZDUGHG�WR�WKH�HPSOR\HH·V�VXSHUYLVRU��,I�WKH�VXSHUYLVRU�DSSURYHVWKH�UHTXHVW��WKH�HPSOR\HH�LV�LQIRUPHG�DQG�WKH�ZRUNIORZ�HQGV��,I�WKH�VXSHUYLVRU�UHMHFWV�WKHUHTXHVW��WKH�HPSOR\HH�PXVW�GHFLGH�ZKHWKHU�KH�RU�VKH�VKRXOG�WR�UHYLVH�WKH�UHTXHVW��RUZLWKGUDZ�LW�FRPSOHWHO\��,I�WKH�HPSOR\HH�GHFLGHV�WR�UHYLVH�WKH�UHTXHVW��WKH�IRUP�LVDXWRPDWLFDOO\�UHWXUQHG�WR�WKH�HPSOR\HH·V�LQER[��DQG�WKH�ZRUNIORZ�EHJLQV�DJDLQ�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�DVVLJQ�WKH�VWDQGDUG�WDVN�&RQILUPDWLRQ�RI�/HDYH5HTXHVW�WR�WKH�DFWLYLW\�JURXS�),�6XSHUYLVRU�

Page 148: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Authorizations Made Easy6–22

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�2YHUYLHZ��2UJDQL]DWLRQ0DQDJHPHQW�DQG�ZRUNIORZ��

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�:RUNIORZ�WDE�

�� &KRRVH� �:RUNIORZ�WDVNV�

7KH�:RUNIORZ�WDE�LV�RQO\�GLVSOD\HG�LI�\RX�VHOHFWHG�2YHUYLHZ��2UJDQL]DWLRQ�0DQDJHPHQW�DQGZRUNIORZ��DW�WKH�EHJLQQLQJ�RI�WUDQVDFWLRQ�3)&*��,I�\RX�GR�QRW�VHH�WKLV�WDE��WKH�YLHZ�%DVLFPDLQWHQDQFH��PHQXV��SURILOHV��RWKHU�REMHFWV��ZDV�SUREDEO\�VHOHFWHG�RQ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�VFUHHQ�

�� &KRRVH� �WR�DGG�D�WDVN�

�� 6HOHFW�WKH�GHVLUHG�WDVN�W\SH��IRUH[DPSOH��6WDQGDUG�WDVN��

�� &KRRVH� �

$OWKRXJK�WKH�RSWLRQV�:RUNIORZ�WDVN�DQG�7DVN�VWLOO�DSSHDU��WKH\�DUH�QR�ORQJHU�XVHG�RUVXSSRUWHG�

�� &KRRVH� �WR�FRQWLQXH�

3

4

7

6

5

8

Page 149: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Selecting Workflow Tasks

Release 4.6A/B6–23

�� 6HOHFW�WKH�GHVLUHG�LWHP��IRU�H[DPSOH�&RQILUPDWLRQ�RI�/HDYH�5HTXHVW��

��� &KRRVH� �

��� &KRRVH�WKH�FRUUHFW�WLPH�SHULRG�IRUWKH�DVVLJQPHQW�

��� &KRRVH� �

��� &KRRVH� �

7KH�VHOHFWHG�WDVN�LV�QRZ�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��(YHU\RQH�WRZKRP�WKLV�DFWLYLW\�JURXS�ZLOO�EHDVVLJQHG�FDQ�FRQILUP�WKH�OHDYHUHTXHVW�LQ�WKH�GHILQHG�WLPH�SHULRG�

9

10

1112

13

Page 150: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Deleting Activity Groups

Authorizations Made Easy6–24

'HOHWLQJ�$FWLYLW\�*URXSV

:KHQ�\RX�GHOHWH�DQ�DFWLYLW\�JURXS��WKH�V\VWHP�DXWRPDWLFDOO\�GHOHWHV�DQ\�DVVLJQPHQWVH[LVWLQJ�EHWZHHQ�WKH�DFWLYLW\�JURXS�DQG�5���XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDOXQLWV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��VHOHFW�WKH�DFWLYLW\�JURXS�\RXZRXOG�OLNH�WR�GHOHWH�E\�HLWKHUHQWHULQJ�WKH�QDPH�LQ�WKH�$FWLYLW\JURXS�ILHOG�RU�FKRRVLQJ�SRVVLEOHHQWULHV�

�� &KRRVH� �WR�GHOHWH�WKH�DFWLYLW\JURXS�

�� &KRRVH�<HV�

9HULI\�WKDW�\RXU�DFWLYLW\�JURXS�ZDVDFWXDOO\�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVWFRPSOHWHG�HDUOLHU��2WKHUZLVH�WKHGHOHWLRQ�FDQQRW�EH�WUDQVSRUWHG�

�� &KRRVH� �

7KH�FKRVHQ�DFWLYLW\�JURXS�DQG�DOO�WKHFRUUHVSRQGLQJ�DVVLJQPHQWV�KDYHQRZ�EHHQ�GHOHWHG��7KH�DXWKRUL]DWLRQSURILOHV³LQFOXGLQJ�WKHDXWKRUL]DWLRQV�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS³DUH�DOVR�GHOHWHG�

2

3

4

5

Page 151: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Postmaintaining User Role Templates

Release 4.6A/B6–25

3RVWPDLQWDLQLQJ�8VHU�5ROH�7HPSODWHV

7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��\RX�PXVW�ILUVW�FUHDWH�RU�XVH�DQ�H[LVWLQJ�DFWLYLW\�JURXS�,Q�FKDSWHU����8VHU�5ROH�7HPSODWHV��ZH�GHPRQVWUDWHG�KRZ�WR�XVH�WKH�XVHU�UROH�WHPSODWHV�DQGJHQHUDWHG�WKH�UHODWHG�DXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV��,Q�WKLV�VHFWLRQ��ZH�VKRZ�\RX�KRZ�WRSRVWPDLQWDLQ�H[LVWLQJ�DFWLYLW\�JURXSV�LQ�JUHDWHU�GHWDLO�

2QFH�\RX�KDYH�GHILQHG�DQ�DFWLYLW\�JURXS��XVH�WKH�3URILOH�*HQHUDWRU��3*��WR�DXWRPDWLFDOO\JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH��$XWKRUL]DWLRQV�DXWRPDWLFDOO\�JHQHUDWHG�IRU�DFWLYLW\JURXSV�XVH�6$3�VXSSOLHG�GDWD�VR�WKDW�PRVW�ILHOGV�DUH�DOUHDG\�ILOOHG�ZLWK�SURSRVHG�YDOXHV�

7R�JHQHUDWH�DQ�DXWKRUL]DWLRQ�SURILOH�

�� 6WDUW�WKH�JHQHUDWLRQ�SURFHVV�

�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOV�

�� 3RVWHGLW�WKH�DXWKRUL]DWLRQV�DQG�RUJDQL]DWLRQDO�OHYHOV�

7KH�6$3�GHOLYHUHG�XVHU�UROH�WHPSODWHV�DOUHDG\�KDYH�VRPH�DXWKRUL]DWLRQ�GDWD��$OO�RSHQDXWKRUL]DWLRQ�ILHOGV�DQG�RUJDQL]DWLRQDO�OHYHOV�VXFK�DV�FRPSDQ\�FRGHV��EXVLQHVV�DUHDV��RUSODQWV�KDYH�WKH�DVWHULVNV�� ���IRU�IXOO�DXWKRUL]DWLRQ�DVVLJQHG��EXW�WKH�SURILOHV�DUH�QRWJHQHUDWHG�\HW�

'LIIHUHQW�6HWWLQJV�IRU�WKH�0DLQWHQDQFH�9LHZ

<RX�KDYH�GLIIHUHQW�RSWLRQV�WR�GLVSOD\�VHYHUDO�EXWWRQV�LQ�WKH�WUHH�VWUXFWXUH�IRU�WKH�PDLQWHQDQFH�SURFHVV�

7R�DFFHVV�WKH�VHOHFWLRQ�VFUHHQ��VWDUW�WKH�3*�DQG�JR�WR�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��2Q�WKH$XWKRUL]DWLRQV�WDE��FKRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD��&KRRVH�8WLOLWLHV�→�6HWWLQJV�WR�JHW�WR�WKH�'HILQH6HWWLQJV�IRU�8VHU�ZLQGRZ�

'LIIHUHQW�EXWWRQV�VLPSOLI\�\RXU�ZRUN��,QWKH�WUHH�VWUXFWXUH�\RX�VHH�

�²�2YHUYLHZ�RI�DXWKRUL]DWLRQ�REMHFW�XVH

�²�0HUJLQJ�VHYHUDO�DXWKRUL]DWLRQV

�²�&RS\LQJ�DXWKRUL]DWLRQ

�²�'HOHWLQJ�ILHOG�FRQWHQWV

7KH�WHFKQLFDO�QDPH�LV�GLVSOD\HG�DW�WKH�HQGRI�WKH�FRUUHVSRQGLQJ�OLQH�

6DYH�\RXU�VHWWLQJV�DIWHU�WKH�VHOHFWLRQ�

)RU�IXUWKHU�H[SODQDWLRQ�RI�WKH�LFRQV��FKRRVH�RQ�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ�

Page 152: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Authorizations Made Easy6–26

0DLQWDLQLQJ�DQG�*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV

,Q�WKLV�VHFWLRQ��ZH�DVVXPH�WKH�DFWLYLW\�JURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�DQG�VDYHG��:H�VKRZ�KRZ�WRJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WRPDLQWDLQ�DQG�FKRRVH� �&KDQJH��IRUH[DPSOH��00B%8<(5B$*��

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

7KH�UHG�OLJKW� �RQ�WKH�$XWKRUL]DWLRQVWDE�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQSURILOHV�KDYH�EHHQ�JHQHUDWHG�IRU�WKLVDFWLYLW\�JURXS��<RX�FDQ�DOVR�VHH�WKHVWDWXV�IRU�WKH�DXWKRUL]DWLRQ�SURILOH�LQWKH�,QIRUPDWLRQ�RQ�DXWKRUL]DWLRQ�SURILOHER[�

2Q�WKH�&KDQJH�$FWLYLW\�*URXS�$XWKRUL]DWLRQV�VFUHHQ��WKHDXWKRUL]DWLRQV�GDWD�DSSHDUVKLHUDUFKLFDOO\�

7KH�DFWLYLW\�JURXS�DSSHDUV�DW�WKHILUVW�OHYHO��KLJKOLJKWHG�LQ�EOXH��8QGHUQHDWK�\RX�ILQG�OLQHVKLJKOLJKWHG�DV�IROORZV�< �2EMHFW�FODVVHV� �RUDQJH< �$XWKRUL]DWLRQ�REMHFW� �JUHHQ< �$XWKRUL]DWLRQ� �\HOORZ< �$XWKRUL]DWLRQ�ILHOGV� �OLJKW�EOXH

7R�YLHZ�WKH�OHJHQG�IRU�WKH�LFRQVDQG�FRORUV�FKRRVH� �

�� 7R�PDLQWDLQ�RU�FKDQJH�WKH�DFWLYLW\�GRXEOH�FOLFN�RQ�WKH�HQWU\�QH[W�WR�WKHDFWLYLW\�ILHOG�

5

Tip

4

Tip

3

Page 153: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Release 4.6A/B6–27

7R�GLVSOD\�DOO�VHOHFWHG�WUDQVDFWLRQV�WKDW�FKHFN�WKLV�DXWKRUL]DWLRQ�REMHFW�IRU�WKH�XQGHUO\LQJDFWLYLW\�JURXS��FKRRVH� �

([SODQDWLRQ�RI�WKH�OLJKWV��*UHHQ��$OO�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG��5HG��2UJDQL]DWLRQDO�OHYHOV�DUH�QRW�PDLQWDLQHG��<HOORZ��2SHQ�DXWKRUL]DWLRQ�ILHOGV�ZLWKRXW�YDOXHV�H[LVW�WKDW�DUH�QRW�RUJDQL]DWLRQDO

OHYHOV�

�� 6HOHFW�RU�GHVHOHFW�DOO�GHVLUHG�YDOXHVIRU�WKH�DFWLYLW\��\RX�FDQ�XVH�)XOODXWKRUL]DWLRQ��

�� 7R�WUDQVIHU�\RXU�VHOHFWLRQ��FKRRVH�

�� 7R�PDLQWDLQ�WKH�YDOXHV�IRU�WKH�RSHQDXWKRUL]DWLRQV��FOLFN�QH[W�WR�WKHDXWKRUL]DWLRQ�ILHOG�QDPH�

�� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\�

��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �

9

7

6

8

10

Page 154: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Authorizations Made Easy6–28

$IWHU�PDLQWDLQLQJ�WKH�DFWLYLW\�DQGWKH�ILHOG�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�WKH�OLJKW�FKDQJHV�IURP�\HOORZ�WRJUHHQ�

��� 7R�PDLQWDLQ�WKH�PLVVLQJRUJDQL]DWLRQDO�OHYHOV��FOLFN�RQ�WKHILHOG�QH[W�WR�WKH�DXWKRUL]DWLRQ�ILHOGQDPH��IRU�H[DPSOH��&RPSDQ\�&RGHXQGHU�WKH�REMHFW�$XWKRUL]DWLRQ�IRU&RPSDQ\�&RGHV��

��� (QWHU�D�VLQJOH�YDOXH�LQ�WKH�)URPFROXPQ�RU�D�YDOXH�UDQJH�LQ�WKH�)URPDQG�7R�FROXPQV�HLWKHU�GLUHFWO\�RU�E\XVLQJ�SRVVLEOH�HQWULHV�

�)RU�PXOWLSOH�VHOHFWLRQV��ILOO�LQ�WKHURZV�EHORZ�WKH�HQWU\��

��� 7R�WUDQVIHU�WKH�GDWD��FKRRVH� �

$IWHU�PDLQWDLQLQJ�WKH�PLVVLQJ�GDWDIRU�WKLV�RUJDQL]DWLRQDO�OHYHO��WKH�OLJKWFKDQJHV�IURP�UHG�WR�JUHHQ�

3URFHHG�ZLWK�WKH�RWKHU�RSHQ�ILHOGV�LQWKH�VDPH�ZD\�XQWLO�DOO�OLJKWV�KDYHFKDQJHG�WR�JUHHQ�

��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �

7R�DVVLJQ�IXOO�DXWKRUL]DWLRQV�WR�DOO�RSHQILHOGV��FOLFN�RQ�WKH�\HOORZ�OLJKW�DW�WKHWRS��QH[W�WR�WKH�DFWLYLW\�JURXS�

11

12

13

14

Tip

Page 155: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Maintaining and Generating the Authorization Profiles

Release 4.6A/B6–29

5HPHPEHU�WR�PDLQWDLQ�HDFK�RSHQ�DXWKRUL]DWLRQ�ILHOG�ZLWK�D�VXLWDEOH�YDOXH��)RU�VRPHDXWKRUL]DWLRQV��HQWHU�D�VXLWDEOH�YDOXH�LQ�$XWKRUL]DWLRQ�JURXS��,I�\RX�DUH�QRW�VXUH�RI�DVXLWDEOH�YDOXH��XVH�WKH�DVWHULVN�� ��WR�DVVLJQ�RYHUDOO�DXWKRUL]DWLRQ�IRU�XQPDLQWDLQHG�ILHOGV�5HPHPEHU�WKDW�\RX�FDQ�DOZD\V�FKDQJH�YDOXHV�ODWHU�

:KHQ�DOO�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�DQG�\RX�KDYH�VDYHG�\RXUFKDQJHV��JHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH�

��� 7R�JHQHUDWH�WKH�DXWKRUL]DWLRQV�FKRRVH� �

7KH�V\VWHP�JHQHUDWHV�DQ�DXWKRUL]DWLRQ�IRU�HDFK�DXWKRUL]DWLRQ�LQ�WKH�WUHH�DQG�DQDXWKRUL]DWLRQ�SURILOH�IRU�WKH�DFWLYLW\�JURXS�WKDW�DSSOLHV�WR�WKH�HQWLUH�WUHH�

��� 7KH�$VVLJQ�3URILOH�1DPH�IRU�*HQHUDWHG$XWKRUL]DWLRQ�3URILOH�GLDORJ�ER[DSSHDUV��7KH�V\VWHP�VXJJHVWV7B�LQWHUQDO�QXPEHU!�DV�WKH�GHIDXOWSURILOH�QDPH�

��� &KRRVH� �

7KH�VKRUW�SURILOH�QDPH�FDQQRW�EH�FKDQJHG�ODWHU��+RZHYHU��WKH�ORQJ�WH[W�IRU�WKH�SURILOH�FDQEH�FKDQJHG�DW�DQ\�WLPH�

1DPLQJ�&RQYHQWLRQV�IRU�$XWKRUL]DWLRQ�3URILOHV�DQG�$XWKRUL]DWLRQV�*HQHUDWHG�ZLWKWKH�3*

:KHQ�\RX�VDYH�\RXU�FKDQJHV��\RX�DUH�SURPSWHG�WR�HQWHU�D�SURILOH�QDPH��+RZHYHU��RQO\WKH�ILUVW����FKDUDFWHUV��WKH�SURILOH�WRUVR��FDQ�EH�IUHHO\�DVVLJQHG��7KH�QXPEHU�RI�SURILOHVJHQHUDWHG�GHSHQGV�RQ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$�PD[LPXPRI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��DQG�WKH�ODVW�WZR�GLJLWV�DUH�XVHG�DV�D�FRXQWHU�

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�DQG�6$3�VXSSOLHG�SURILOHV��GR�QRW�XVH�DQ\QDPH�ZLWK�DQ�XQGHUVFRUH��B��LQ�WKH�VHFRQG�SRVLWLRQ��6$3�SODFHV�QR�RWKHU�UHVWULFWLRQV�RQWKH�QDPLQJ�RI�DXWKRUL]DWLRQ�SURILOHV��UHIHU�DOVR�WR�QRWH���������,I�\RXU�FRPSDQ\�KDV�LWVRZQ�QDPLQJ�FRQYHQWLRQV��\RX�PD\�RYHUZULWH�SURSRVHG�QDPHV�

15

16

17

Page 156: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Displaying an Overview of Generated Profiles

Authorizations Made Easy6–30

7KH�QDPHV�RI�WKH�DXWKRUL]DWLRQV�DUH�DOVR�GHULYHG�IURP�WKH�SURILOH�WRUVR��7KH�ODVW�WZR�GLJLWVDUH�XVHG�DV�D�FRXQWHU�ZKHQ�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�LV�UHTXLUHG�IRU�DQ�REMHFW�'HSHQGLQJ�RQ�WKH�DXWKRUL]DWLRQ�SURILOH�QDPH��WKH�WHFKQLFDO�QDPHV�IRU�DXWKRUL]DWLRQV�DUHWKHQ�QDPHG�DV�IROORZV�< %HJLQ�ZLWK�D�7�< &RPSULVH�DQ�LQWHUQDO�QXPEHU< (QG�ZLWK�D�WZR�GLJLW�QXPEHU�EHWZHHQ����DQG���6DPSOH�DXWKRUL]DWLRQ�QDPH��7������������

7KH�DXWKRUL]DWLRQ�REMHFW�6B86(5B352�LV�FKHFNHG�GXULQJ�DXWKRUL]DWLRQ�PDLQWHQDQFH��7KHREMHFW�LV�GHILQHG�ZLWK�WKH�IROORZLQJ�ILHOGV��$XWKRUL]DWLRQ�SURILOH�DQG�$FWLYLW\��,Q$XWKRUL]DWLRQ�SURILOH��HQWHU�WKH�DXWKRUL]DWLRQ�SURILOHV�WKDW�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRUFDQ�PDLQWDLQ�RU�WKDW�XVHU�DGPLQLVWUDWRUV�FDQ�DVVLJQ�WR�WKHLU�XVHUV��,Q�$FWLYLW\��\RX�FDQOLPLW�ZKDW�WKH�DGPLQLVWUDWRU�LV�DOORZHG�WR�GR�

,I�\RX�ZDQW�WR�VHW�XS�DQ�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�ZKR�FDQ�PDLQWDLQ�RQO\�FHUWDLQSURILOHV��VHW�XS�\RXU�RZQ�QDPLQJ�FRQYHQWLRQ�

'LVSOD\LQJ�DQ�2YHUYLHZ�RI�*HQHUDWHG�3URILOHV

$IWHU�VXFFHVVIXOO\�JHQHUDWLQJ�WKH�DXWKRUL]DWLRQ�SURILOHV��WR�ILQG�RXW�KRZ�PDQ\�SURILOHV�ZHUHJHQHUDWHG��\RX�KDYH�WR�NQRZ�WKH�QXPEHU�RI�DXWKRUL]DWLRQV�LQ�HDFK�DFWLYLW\�JURXS��$PD[LPXP�RI�DSSUR[LPDWHO\�����DXWKRUL]DWLRQV�ILW�LQWR�D�SURILOH��,I�WKHUH�DUH�PRUH�WKDQ����DXWKRUL]DWLRQV��DQ�DGGLWLRQDO�SURILOH�LV�JHQHUDWHG��,W�KDV�WKH�VDPH����FKDUDFWHU�WRUVR�DV�WKHSURILOH�QDPH��ZLWK�WKH�ODVW�WZR�GLJLWV�XVHG�DV�D�FRXQWHU�

,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKH�DGGLWLRQDOSURILOHV�DUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�RULJLQDO�SURILOH·V�XVHUV��7KH�XVHU�PDVWHU�RI�WKLVXVHU�LV�DXWRPDWLFDOO\�XSGDWHG�

,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GLVSOD\�WKH�RYHUYLHZ�RI�WKH�JHQHUDWHGSURILOHV�IRU�WKH�DFWLYLW\�JURXS�6$3B$//B',63/$<B$*��ZKLFK�FRQWDLQ�WKH�DXWKRUL]DWLRQ�WRGLVSOD\�´HYHU\WKLQJµ�H[FHSW�IRU�+5�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZRXOG�OLNH�WR�YLHZ��IRU�H[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�$XWKRUL]DWLRQ�'DWD�

Page 157: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Displaying an Overview of Generated Profiles

Release 4.6A/B6–31

�� &KRRVH�$XWKRUL]DWLRQV�→�3URILOH2YHUYLHZ�

,I�WKH�JHQHUDWHG�DXWKRUL]DWLRQSURILOHV�DUH�DOUHDG\�DFWLYH��WKH�GLDORJER[�SURYLGHV�DQ�RYHUYLHZ�RI�WKHFXUUHQW�SURILOH�ZLWK�SURILOH�QDPH�ORQJ�WH[W��DQG�WKH�VWDWXV�RI�WKHYHUVLRQ�

5

Page 158: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Authorizations Made Easy6–32

5HJHQHUDWLQJ�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ

&KDQJHV

:KHQ�DQ�DFWLYLW\�JURXS�LV�FKDQJHG��IRU�H[DPSOH�DIWHU�\RX�DGG�WUDQVDFWLRQV��UHJHQHUDWH�LWVDXWKRUL]DWLRQ�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*�

)RU�WKH�IROORZLQJ�H[DPSOH��ZH�KDYH�WDNHQ�WKH�DFWLYLW\�JURXS�00B%8<(5B$*�DGGHG�VRPHWUDQVDFWLRQV�DQG�VDYHG�WKH�FKDQJHV��1RZ�ZH�KDYH�VRPH�PRUH�DXWKRUL]DWLRQV�WKDW�QHHG�WR�EHPDLQWDLQHG�DQG�WKH�DFWLYLW\�JURXS�QHHGV�WR�EH�UHJHQHUDWHG�

:KHQ�\RX�FKDQJH�DQ�DFWLYLW\�JURXS��WKH�VWDWXV�RQ�WKH�$XWKRUL]DWLRQV�WDE�LQGLFDWHV�ZKHWKHUD�SURILOH�LV�FXUUHQW�RU�QRW��,I�WKH�GLVSOD\�VKRZV�D�UHG�RU�\HOORZ�OLJKW��WKH�SURILOH�LV�QRWFXUUHQW��7KH�VWDWXV�WH[W�RQ�WKH�VFUHHQ�H[SODLQV�ZK\�WKH�SURILOH�LV�QRW�FXUUHQW�< 5HG�OLJKW�DQG�WKH�WH[W�3URILOH�FRPSDULVRQ�UHTXLUHG

7KH�PHQX�KDV�EHHQ�FKDQJHG�VLQFH�WKH�SURILOH�ZDV�ODVW�JHQHUDWHG��7KHUHIRUH�WKH�SURILOHLV�QRW�FXUUHQW�DQG�WKH�DXWKRUL]DWLRQ�SURILOHV�QHHGV�WR�EH�UHJHQHUDWHG��<RX�PD\�DOVRKDYH�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�

< <HOORZ�OLJKW

7KH�SURILOH�KDV�EHHQ�FKDQJHG�DQG�VDYHG�VLQFH�LW�ZDV�ODVW�JHQHUDWHG��WKH�SURILOH�LV�QRWFXUUHQW�DQ\PRUH��DQG�WKH�DXWKRUL]DWLRQ�SURILOH�QHHGV�WR�EH�UHJHQHUDWHG�

< ,I�\RX�DUH�XQVXUH�ZKHWKHU�DQ�DXWKRUL]DWLRQ�SURILOHV�VKRXOG�EH�UHJHQHUDWHG�

1��5XQ�WUDQVDFWLRQ�SUPC�2��6HOHFW�$OVR�DFW��JUSV�WR�EH�DGMXVWHG�3��&KRRVH� �WR�H[HFXWH�WKH�WUDQVDFWLRQ�

7KH�V\VWHP�JHQHUDWHV�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�ZLWK�H[LVWLQJ�DXWKRUL]DWLRQ�GDWD�LQ�WKHV\VWHP��$FWLYLW\�JURXSV�LQ�UHG�QHHG�WR�EH�UHJHQHUDWHG�DIWHU�SRVWPDLQWDLQLQJ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��6HOHFW�RQH�RI�WKHVH�DFWLYLW\�JURXSV�DQG�FKRRVH�0DLQWDLQ�SURILOH��)URPSUPC��FDOO�WUDQVDFWLRQ�PFCG�DQG�SURFHHG�DV�GHVFULEHG�EHORZ�

Page 159: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Release 4.6A/B6–33

3UHUHTXLVLWH��<RX�PXVW�PDNH�FKDQJHV�WRDQ�DFWLYLW\�JURXS�DQG�VDYH�WKHP�EHIRUH\RX�FDQ�UHJHQHUDWH�DXWKRUL]DWLRQSURILOHV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�

,Q�H[SHUW�PRGH��\RX�FDQ�VHOHFW�H[SOLFLWO\WKH�RSWLRQ�ZLWK�ZKLFK�\RX�ZDQW�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�YDOXHV��7KLVRSWLRQ�LV�DXWRPDWLFDOO\�VHW�FRUUHFWO\�LQQRUPDO�PRGH�

�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWKQHZ�GDWD�

�� &KRRVH� �

2SWLRQV�RQ�WKH�'HILQH�0DLQWHQDQFH�7\SH�VFUHHQ�< 'HOHWH�DQG�UHFUHDWH�SURILOH�DQG�DXWKRUL]DWLRQV

$OO�DXWKRUL]DWLRQV�DUH�UH�FUHDWHG��9DOXHV�WKDW�KDYH�SUHYLRXVO\�EHHQ�PDLQWDLQHG�FKDQJHG��RU�HQWHUHG�PDQXDOO\�DUH�ORVW��2QO\�WKH�PDLQWDLQHG�YDOXHV�IRU�RUJDQL]DWLRQDOOHYHOV�UHPDLQ�

< (GLW�ROG�VWDWXV

<RX�FDQ�HGLW�WKH�DXWKRUL]DWLRQ�SURILOH�\RX�SUHYLRXVO\�PDLQWDLQHG�ZLWK�LWV�ROG�YDOXHV�,W�LV�QRW�ZRUWK�HGLWLQJ�LI�WKH�DVVLJQPHQW�RI�WUDQVDFWLRQV�WR�DFWLYLW\�JURXSV�KDVFKDQJHG�

< 5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�QHZ�GDWD

7KH�3*�FRPSDUHV�WKH�ROG�DQG�FXUUHQW�GDWD�IURP�WKH�DFWLYLW\�JURXS��7KLV�FKRLFH�LV�WKHEHVW�RSWLRQ�LI�WKH�DFWLYLW\�JURXS�KDV�FKDQJHG��8QFKDQJHG�GDWD�LV�PDUNHG�DV�2OG��QHZGDWD�DV�1HZ�

3

4

5

Page 160: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Authorizations Made Easy6–34

:H�DGGHG�D�IHZ�WUDQVDFWLRQV�WR�WKHDFWLYLW\�JURXS��7KH�SUHYLRXVO\PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUHNHSW��:KHQ�QHZ�RUJDQL]DWLRQDO�OHYHOVDUH�DGGHG��WKH\�PXVW�EH�PDLQWDLQHG�

�� 0DLQWDLQ�WKH�RUJDQL]DWLRQDO�OHYHOVZLWK�WKH�ULJKW�YDOXHV��RU�FKRRVH�)XOODXWKRUL]DWLRQ�WR�ILOO�DOO�EODQNV�ZLWKDVWHULVNV�� ���:H�FKRVH�)XOODXWKRUL]DWLRQ�LQ�RXU�H[DPSOH��

�� &KRRVH� �

2OG�DXWKRUL]DWLRQV�DUH�PDUNHG�2OG�QHZ�DXWKRUL]DWLRQV�DUH�PDUNHG�1HZ�

�� 0DLQWDLQ�WKH�RSHQ�ILHOGV�DVGHVFULEHG�LQ�0DLQWDLQLQJ�DQG*HQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHVRQ�SDJH��²���

�� &KRRVH� �

6

7

8

9

Page 161: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Regenerating Authorization Profiles After Making Changes

Release 4.6A/B6–35

3OHDVH�NHHS�WKH�IROORZLQJ�LQ�PLQG�ZKHQ�PDNLQJ�WKH�SRVW�FKDQJH�FRPSDULVRQ�< 3UHYLRXVO\�PDLQWDLQHG�RUJDQL]DWLRQDO�OHYHOV�DUH�NHSW��,I�QHZ�RUJDQL]DWLRQDO�OHYHOV�DUH

DGGHG��\RX�PXVW�PDLQWDLQ�WKHVH�OHYHOV�< ,I�DXWKRUL]DWLRQV�ZLWKLQ�DQ�DXWKRUL]DWLRQ�REMHFW�KDYH�FKDQJHG��\RX�QHHG�WR�H[HFXWH

WKH�FRPSDULVRQ�PDQXDOO\��<RX�PXVW�GHFLGH�ZKHWKHU�WR�NHHS�WKH�ROG�PRGLILHG�GDWD�RUXVH�WKH�FXUUHQW�GDWD��'HOHWH�RU�PDLQWDLQ�WKH�DXWKRUL]DWLRQV�\RX�QR�ORQJHU�UHTXLUH�

< 0DLQWDLQHG�DXWKRUL]DWLRQV�DUH�FRQILJXUHG�ZLWK�WKH�YDOXHV�\RX�PDLQWDLQHG�IRU�WKHP�)RU�H[DPSOH��IRU�DXWKRUL]DWLRQ�JURXS�������FHUWDLQ�DFWLYLWLHV��,QVHUW��&KDQJH��DQG'LVSOD\��DQG�PDLQWDLQHG�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�WUDQVDFWLRQV�DUHUHTXLUHG��\RX�PDLQWDLQHG�WKH�YDOXH�IRU�DXWKRUL]DWLRQ�JURXS���&KDQJH�WKH�DFWLYLW\JURXS�VR�WKDW�WKH�IROORZLQJ�DFWLYLWLHV�DULVH��&KDQJH��'LVSOD\��DQG�'HOHWH��7KH�YDOXH�����LV�FRSLHG�IRU�WKH�DXWKRUL]DWLRQ�JURXS�IRU�&KDQJH�DQG�'LVSOD\��WKHVH�DFWLYLWLHV�ZHUHDOUHDG\�PDLQWDLQHG���7KH�,QVHUW�RSWLRQ�GLVDSSHDUV��)RU�WKH�'HOHWH�DFWLYLW\��PDLQWDLQ�WKHDXWKRUL]DWLRQ�JURXS�DJDLQ��VLQFH�WKLV�JURXS�ZDV�QRW�PDLQWDLQHG�LQ�WKH�ROG�SURILOH·VVWDWXV�

< :KHUHYHU�WKH�1HZ�DWWULEXWH�DSSHDUV��FKHFN�LI�WKH�QHZ�DXWKRUL]DWLRQV�PDNH�VHQVH��\RXFDQ�FRPSDUH�WKHP�PDQXDOO\�ZLWK�WKH�ROG�YDOXHV��

< 0DQXDOO\�HQWHUHG�DXWKRUL]DWLRQV�DUH�QRW�GHOHWHG�7KH�YDOXHV�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�DUH�DOZD\V�DXWRPDWLFDOO\�ILOOHG�ZLWKWKH�FXUUHQW�WUDQVDFWLRQ�IURP�WKH�DFWLYLW\�JURXS��EXW�KDYH�WKH�DWWULEXWH�2OG�

:KHQ�WKHUH�DUH�RQO\�JUHHQ�OLJKWV�LQ�WKHWUHH��WKHUH�DUH�QR�PRUH�RSHQDXWKRUL]DWLRQ�ILHOGV�WR�PDLQWDLQ�

��� &KRRVH� �WR�UHJHQHUDWH�WKH�H[LVWLQJDXWKRUL]DWLRQ�SURILOHV�

$IWHU�WKH�UHJHQHUDWLRQ�RI�WKHDXWKRUL]DWLRQ�SURILOHV�LV�ILQLVKHG�\RX�FDQ�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�

10

Page 162: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Using Utilities to Change Generated Authorizations

Authorizations Made Easy6–36

8VLQJ�8WLOLWLHV�WR�&KDQJH�*HQHUDWHG�$XWKRUL]DWLRQV

7KHUH�DUH�WZR�RSWLRQV�WR�DOWHU�WKH�DXWRPDWLFDOO\�JHQHUDWHG�DXWKRUL]DWLRQV��7KHVH�RSWLRQV�DUH�IRXQG�LQWUDQVDFWLRQ�3)&*��XQGHU�WKH�8WLOLWLHV�PHQX�LQ�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ�

0HUJLQJ�$XWKRUL]DWLRQV

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�8WLOLWLHV�→�0HUJHDXWKRUL]DWLRQV�

�� 7KH�V\VWHP�DXWRPDWLFDOO\VXPPDUL]HV�DOO�SRVVLEOHDXWKRUL]DWLRQV�DQG�WKH�UHVXOWDSSHDUV�LQ�D�V\VWHP�PHVVDJH�

,Q�RXU�H[DPSOH��WKH�VWDWXV�EDU�VKRZVWKDW�ILYH�DXWKRUL]DWLRQV�KDYHFRPELQHG�ZLWK�RWKHUV�

4

5

Page 163: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Using Utilities to Change Generated Authorizations

Release 4.6A/B6–37

5HRUJDQL]LQJ�7HFKQLFDO�1DPHV�RI�$XWKRUL]DWLRQV

7KH�WHFKQLFDO�QDPH�RI�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS�DQG�DWZR�GLJLW�QXPEHU�EHWZHHQ����DQG����

7��LQWHUQDO�QXPEHU!QQ��IRU�H[DPSOH��7�����������

,I�WKH�DXWKRUL]DWLRQ�SURILOHV�FKDQJHG�DV�D�UHVXOW�RI�FKDQJHV�LQ�WKH�DSSURSULDWH�DFWLYLW\�JURXS��UHRUJDQL]H�WKHQXPEHUV�WR�DYRLG�QXPEHU�DVVLJQPHQW�SUREOHPV��7KH�IROORZLQJ�SURFHGXUH�UHVWDUWV�WKH�QXPEHU�DVVLJQPHQWIURP�����:KHQHYHU�\RX�JHQHUDWH�D�QHZ�DXWKRUL]DWLRQ�SURILOH��WKLV�UHRUJDQL]DWLRQ�LV�DXWRPDWLFDOO\�WDNHQLQWR�DFFRXQW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRUH[DPSOH�00B%8<(5B$*��DQGFKRRVH� �&KDQJH�

�� 2Q�WKH�$XWKRUL]DWLRQV�WDE�FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�8WLOLWLHV�→�5HRUJDQL]H�

7KH�V\VWHP�DXWRPDWLFDOO\UHRUJDQL]HV�WKH�ILQDO�GLJLWV�RI�WKHDXWKRUL]DWLRQV�WHFKQLFDO�QDPHV�DQGWKH�UHVXOW�DSSHDUV�LQ�D�V\VWHPPHVVDJH��IRU�H[DPSOH��$XWKRUL]DWLRQVZHUH�UHRUJDQL]HG��

4

Page 164: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–38

&XVWRPL]LQJ�$XWKRUL]DWLRQV

6$3�GHOLYHUV�D�XVHU�UROH�WHPSODWH�IRU�WKH�&XVWRPL]LQJ�3URMHFW�0HPEHU��ZKLFK�LV�FDOOHG6$3B%&B&86B&86720,=(5B$*��7KLV�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�DQ\�SHUVRQ�GRLQJ�FXVWRPL]LQJ�LQ5����,Q�DGGLWLRQ��\RX�FDQ�DVVLJQ�SURMHFWV�RU�YLHZV�RI�WKH�,PSOHPHQWDWLRQ�*XLGH��,0*��WR�DQ�DFWLYLW\�JURXS�7KH�DLP�RI�WKLV�DVVLJQPHQW�LV�WR�JHQHUDWH�DXWKRUL]DWLRQV�IRU�DQG�DVVLJQ�XVHUV�WR�VSHFLILF�,0*�DFWLYLWLHV��7KDWLQVXUHV�WKDW�XVHUV�DUH�RQO\�DOORZHG�WR�SHUIRUP�WDVNV�LQ�WKHLU�FXVWRPL]LQJ�SURMHFW�DQG�QRW�LQ�DQ\�RWKHU�:KHQ�\RX�JHQHUDWH�SURILOHV��LW�DOVR�JHQHUDWHV�WKH�DXWKRUL]DWLRQV�QHFHVVDU\�WR�H[HFXWH�DOO�DFWLYLWLHV�LQ�WKHDVVLJQHG�,0*�SURMHFWV�RU�SURMHFW�YLHZV�

$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV

,Q�WKH�IROORZLQJ�H[DPSOH�ZH�GHPRQVWUDWH�KRZ�WR�FUHDWH�D�FXVWRPL]LQJ�DFWLYLW\�JURXS�IRU�D�40FXVWRPL]LQJ�SURMHFW��7KHUHIRUH��ZH�ZLOO�FUHDWH�D�QHZ�DFWLYLW\�JURXS�FDOOHG�40B&86720,=,1*�DQG�DVVLJQWKH�40�FXVWRPL]LQJ�SURMHFW�WR�LW��<RX�FDQ�DVVLJQ�GLIIHUHQW�SURMHFW�YLHZV�LI�DYDLODEOH�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��HQWHU�DQDPH�IRU�\RXU�QHZ�DFWLYLW\�JURXS�

�� &KRRVH� �&UHDWH�

3

2

Page 165: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–39

�� (QWHU�D�VKRUW�GHVFULSWLRQ�LQ�WKH'HVFULSWLRQ�ILHOG�

�� (QWHU�D�ORQJ�WH[W�GHVFULSWLRQ�IRU�WKHDFWLYLW\�JURXS��RSWLRQDO��

�� 7R�VDYH�WKH�DFWLYLW\�JURXS��FKRRVH�

�� &KRRVH�WKH�0HQX�WDE�

�� &KRRVH�8WLOLWLHV�→�&XVWRPL]LQJ�DXWK�

<RX�FDQ�VHH�WKH�VWDWXV�RI�WKH�DFWLYLW\JURXS�LQ�WKH�GLDORJ�ER[�

�� &KRRVH� �$GG�WR�DVVLJQ�DFXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZWR�WKH�DFWLYLW\�JURXS�

��� 6HOHFW�,0*�SURMHFW�RU�,0*�SURMHFWYLHZ��GHSHQGLQJ�RQ�ZKDW�\RX�ZRXOGOLNH�WR�DVVLJQ��,Q�RXU�H[DPSOH��ZHDVVLJQHG�DQ�,0*�SURMHFW�

��� &KRRVH� �

��� 6HOHFW�WKH�GHVLUHG�SURMHFW�RU�SURMHFWYLHZ��LQ�WKLV�H[DPSOH��ZH�VHOHFWHGWKH�SURMHFW�40B&86720��

��� &KRRVH� �

��� &KRRVH� �WR�FRQWLQXH�

4

5

6

7

8

9

10

11

12

13

14Tip

Page 166: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–40

7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW

2Q�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQV�VFUHHQ��LI�WKHUH�DUH�XVHUV�DVVLJQHG�WR�WKH�,0*�SURMHFWWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�WKLV�DFWLYLW\�JURXS��FKRRVH� �8VHU��7KLV�DFWLRQ�FRSLHV�WKHXVHUV�IURP�WKH�,0*�SURMHFW�WR�WKH�DFWLYLW\�JURXS�

1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�FKDQJHV�DUH�PDGH�LQ�WKH�,0*SURMHFW�DGPLQLVWUDWLRQ�

7KH�V\VWHP�DXWRPDWLFDOO\GHWHUPLQHV�WKH�WUDQVDFWLRQ�FRGHVDQG�DGGLWLRQDO�DXWKRUL]DWLRQ�REMHFWVWKDW�DUH�UHTXLUHG�WR�PDLQWDLQ�WKHWDEOHV�IRU�WKLV�,0*�SURMHFW�RU�SURMHFWYLHZ��DQG�LPSRUWV�WKHP�LQWR�WKHDFWLYLW\�JURXS�

��� 7R�VDYH�\RXU�DFWLYLW\�JURXS��FKRRVH�

<RX�FDQQRW�PDQXDOO\�DVVLJQWUDQVDFWLRQV�WR�WKLV�DFWLYLW\�JURXS�QRUFDQ�\RX�VHOHFW�DQ\�IURP�WKH�6$3�PHQX�1RWH�WKDW�WKH�EXWWRQV�WR�GR�WKLV�KDYHYDQLVKHG�

15

Tip

Page 167: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–41

��� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�WRFRQWLQXH�WKH�JHQHUDWLRQ�SURFHVV�

��� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,I�QHFHVVDU\��WKH�GLDORJ�ER[�'HILQH2UJ��/HYHOV�DSSHDUV�

��� (QWHU�WKH�DSSURSULDWH�GDWD��<RX�FDQJLYH�IXOO�DXWKRUL]DWLRQV�E\�FKRRVLQJ)XOO�DXWKRUL]DWLRQ�LQ�WKH�ORZHU�ULJKWFRUQHU�

��� &KRRVH� �

16

17

18

19

Page 168: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–42

��� 0DLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV�LQGLFDWHG�E\�WKH�\HOORZ�OLJKW

�DV�GHVFULEHG�HDUOLHU�LQ�WKLVERRN��,Q�RXU�H[DPSOH��ZH�FKRVH�IXOODXWKRUL]DWLRQ�E\�FOLFNLQJ�RQ�WKHXSSHU�PRVW�\HOORZ�OLJKW�

,I�\RX�FKRRVH�IXOO�DXWKRUL]DWLRQV��DFRQILUPDWLRQ�VFUHHQ�DSSHDUV�

��� &KRRVH� �WR�FRQWLQXH�

$OO�RSHQ�DXWKRUL]DWLRQV�DUH�ILOOHGZKHQ�DOO�WKH�OLJKWV�KDYH�FKDQJHG�WRJUHHQ�

��� 6DYH�WKH�DFWLYLW\�JURXS�

20

21

22

Page 169: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Release 4.6A/B6–43

��� 2Q�WKH�$VVLJQ�3URILOH�1DPH�IRU*HQHUDWHG�$XWKRUL]DWLRQ�3URILOH�VFUHHQ�\RX�KDYH�WKH�RSWLRQ�WR�FKDQJH�WKH3URILOH�QDPH��<RX�ZLOO�QRW�EH�DEOH�WRFKDQJH�LW�ODWHU�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�DFWLYLW\�JURXS�FKRRVH� �

��� 7R�JR�EDFN�WR�WKH�PDLQ�VFUHHQ�FKRRVH� �

<RX�KDYH�QRZ�FUHDWHG�D�FXVWRPL]LQJDFWLYLW\�JURXS�DQG�DVVLJQHGDXWKRUL]DWLRQ�GDWD�WR�LW�

,I�WKHUH�DUH�QR�XVHUV�DVVLJQHG�WR�WKHVHOHFWHG�,0*�SURMHFW�RU�LI�\RX�FKRVHQRW�WR�FRS\�WKHP�WR�WKH�DFWLYLW\JURXS�LQ�DQ�HDUOLHU�VWHS��\RX�VWLOOKDYH�WR�GR�VR��&KRRVH�WKH�8VHUV�WDEWR�DVVLJQ�XVHUV�WR�WKH�DFWLYLW\�JURXS�DV�GHPRQVWUDWHG�LQ�FKDSWHUV���DQG���

23

24

25

26

Page 170: Amez 46 all

Chapter 6: Advanced Profile Generator Functionality

Customizing Authorizations

Authorizations Made Easy6–44

,I�WKH�,0*�SURMHFW�KDV�FKDQJHG��\RX�VKRXOG�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�GDWD�IRU�WKLVDFWLYLW\�JURXS��7KH�ILUVW�VWHS�LV�WR�FKRRVH� �5HIUHVK�RQ�WKH�&XVWRPL]LQJ�$XWKRUL]DWLRQVGLDORJ�ER[��VHH�VWHS����RQ�SDJH��²�����7KLV�DFWLRQ�UHFDOFXODWHV�WKH�WUDQVDFWLRQ�FRGHV��<RXPXVW�WKHQ�UHJHQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKH�DFWLYLW\�JURXS�

7R�DVVLJQ�XVHUV�WR�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��\RX�FDQ�WUDQVIHU�WKH�XVHUV�WKDW�DUHDOUHDG\�DVVLJQHG�WR�WKH�FXVWRPL]LQJ�SURMHFW�RU�SURMHFW�YLHZ��<RX�FDQ�DOVR�DVVLJQ�DQ\�RWKHUXVHU�WR�WKLV�FXVWRPL]LQJ�DFWLYLW\�JURXS�

<RX�VKRXOG�FRQVLGHU�XVLQJ�WKH�6$3�SURYLGHG�XVHU�UROH�WHPSODWH6$3B%&B&86B&86720,=(5B$*�IRU�HYHU\�FXVWRPL]LQJ�SURMHFW�PHPEHU�

Page 171: Amez 46 all

7–1

&KDSWHU��� 3UHSDULQJ�WKH�5��

(QYLURQPHQW�IRU�*R�/LYH

&RQWHQWV

Overview ..................................................................................................................7–2

Transports Between Clients ..................................................................................7–2

Transports Between R/3 Systems.........................................................................7–3

Transporting Activity Groups ................................................................................7–3

Transporting Check Indicators and Field Values ................................................7–8

Transporting Authorization Templates.................................................................7–8

Transporting User Master Records.......................................................................7–8

��

Page 172: Amez 46 all

Chapter 7: Preparing the R/3 Environment for Go-Live

Overview

Authorizations Made Easy7–2

2YHUYLHZ

:KHQ�\RX�ILQLVK�XVLQJ�RQH�RI�WKH�WKUHH�SRVVLEOH�PHWKRGV�IRU�ZRUNLQJ�ZLWK�XVHU�UROHWHPSODWHV³DQG�\RX�KDYH�PDLQWDLQHG�DQG�JHQHUDWHG�DOO�QHFHVVDU\�DXWKRUL]DWLRQV³\RX�FDQSUHSDUH�IRU�JR�OLYH��3UHSDUDWLRQ�PHDQV�WKDW�\RX�KDYH�WR�WUDQVSRUW�HYHU\WKLQJ�\RX�KDYHFUHDWHG�LQ�\RXU�'(9�V\VWHP�WR�\RXU�4$6�V\VWHP��DQG�ILQDOO\�WR�\RXU�35'�V\VWHP��VHHFKDSWHU���RQ�WKH�WKUHH�V\VWHP�HQYLURQPHQW��

<RX�FDQ�WUDQVSRUW�HLWKHU�EHWZHHQ�FOLHQWV��ZLWKLQ�DQ�5���6\VWHP��RU�EHWZHHQ�5���6\VWHPV�'HSHQGLQJ�RQ�WKH�W\SH�RI�WUDQVSRUW��\RX�FDQ�WUDQVSRUW�WKH�IROORZLQJ�LWHPV�< $FWLYLW\�JURXSV< &RPSRVLWH�DFWLYLW\�JURXSV< $XWKRUL]DWLRQ�SURILOH�GDWD< $XWKRUL]DWLRQ�GDWD< 8VHU�PDVWHU�UHFRUGV

7UDQVSRUWV�%HWZHHQ�&OLHQWV

7KH�LWHPV�LQ�WKH�OLVW�DERYH�DUH�FOLHQW�GHSHQGHQW��7KHUHIRUH��VHSDUDWH�UHFRUGV��DFWLYLW\�JURXSV�SURILOHV��DQG�DXWKRUL]DWLRQV�PXVW�EH�PDLQWDLQHG�IRU�HDFK�5���FOLHQW��7UDQVDFWLRQ�6&&/��7RROV→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ�→�&OLHQW�&RS\�→�6&&/�¥�/RFDO&RS\���ZKLFK�PXVW�EH�UXQ�IURP�WKH�WDUJHW�FOLHQW��WUDQVSRUWV�XVHU�PDVWHU�UHFRUGV�DXWKRUL]DWLRQ�SURILOHV��DQG�DXWKRUL]DWLRQV�EHWZHHQ�FOLHQWV��$V�RI�5HOHDVH����$��DFWLYLW\JURXSV�DUH�FRSLHG�ZLWK�&XVWRPL]LQJ�

:KHQ�\RX�FDUU\�RXW�D�WUDQVSRUW��DOO�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG�DXWKRUL]DWLRQV�LQ�WKHWDUJHW�V\VWHP�ZLWK�WKH�VDPH�QDPHV�DV�LWHPV�LQ�WKH�WUDQVSRUW�ZLOO�EH�RYHUZULWWHQ�7KHUHIRUH��GR�QRW�XVH�6&&/�LI�\RXU�WDUJHW�FOLHQW�FRQWDLQV�DXWKRUL]DWLRQV�DQG�XVHU�PDVWHUUHFRUGV�WKDW�\RX�ZDQW�WR�NHHS��2QO\�XVH�6&&/�WR�FUHDWH�D�QHZ�FOLHQW�ZLWK�WKH�REMHFWV6$3B&867��XVHUV�ZLOO�EH�NHSW��RU�6$3B8&86��XVHUV�FRPH�IURP�WKH�VRXUFH�FOLHQW��

6LQFH�DFWLYLW\�JURXSV�EHORQJ�WR�&XVWRPL]LQJ��WKH\�DUH�FRSLHG�DXWRPDWLFDOO\�GXULQJ�FOLHQWFRS\��,W�LV�DOVR�SRVVLEOH�WR�FRS\�WKHP�PDQXDOO\��VHH�EHORZ��

7KH�WUDQVDFWLRQ�GRFXPHQWDWLRQ�FRQWDLQV�DGGLWLRQDO�LQIRUPDWLRQ�DERXW�WKH�QHFHVVDU\DXWKRUL]DWLRQV��8VH�WUDQVDFWLRQ�6&&���7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ�→�6SHFLDO�)XQFWLRQV�→�6&&��¥�&RS\�7UDQVSRUW�5HTXHVW��WR�PDQXDOO\�FRS\DFWLYLW\�JURXSV�EHWZHHQ�H[LVWLQJ�FOLHQWV�

Page 173: Amez 46 all

Chapter 7: Preparing the R/3 Environment for Go-Live

Transports Between R/3 Systems

Release 4.6A/B7–3

7R�FRS\�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV�

�� &UHDWH�D�WUDQVSRUW�UHTXHVW�ZLWK�WKH�DSSURSULDWH�DFWLYLW\�JURXSV�

�� ,I�\RX�XVH�WUDQVDFWLRQ�6&&���GR�QRW�UHOHDVH�WKH�WUDQVSRUW�

7UDQVDFWLRQ�6&&��ZRUNV�ZLWK�UHOHDVHG�DQG�XQUHOHDVHG�WUDQVSRUWV�

�� /RJ�RQ�WR�WKH�RWKHU�FOLHQW�

�� 5XQ�WUDQVDFWLRQ�6&&��

�� &KRRVH�WKH�6RXUFH�FOLHQW�DQG�7UDQVSRUW�UHTXHVW�LQFOXGLQJ�WKH�WDVN�QXPEHU�

�� ([HFXWH�

7KH�DFWLYLW\�JURXS�V��VKRXOG�QRZ�EH�DFWLYH�LQ�WUDQVDFWLRQ�3)&*�

:KHQ�\RX�WUDQVSRUW�XVLQJ�6&&���WKH�UHSRUW�WUHH�LQVLGH�WKH�DFWLYLW\�JURXS�LV�WUDQVSRUWHG�EXW�QRW�WKH�UHSRUW�WUHH�LWVHOI��<RX�KDYH�WR�WUDQVSRUW�WKH�UHSRUW�WUHH�EHIRUHKDQG��$OVRUHPHPEHU�WKDW�UHSRUW�WUHHV�DUH�FOLHQW�GHSHQGHQW�

7UDQVSRUWV�%HWZHHQ�5���6\VWHPV

<RX�FDQ�WUDQVSRUW�DXWKRUL]DWLRQ�FRPSRQHQWV��DFWLYLW\�JURXSV��DQG�XVHU�PDVWHU�UHFRUGVEHWZHHQ�5���6\VWHPV��&RPSRQHQWV�PD\�EH�WUDQVSRUWHG�LQGHSHQGHQWO\�RU�ZLWK�DOO�RI�WKHLUDVVRFLDWHG�DXWKRUL]DWLRQV�

7UDQVSRUWLQJ�$FWLYLW\�*URXSV

:KHQ�\RX�WUDQVSRUW�DFWLYLW\�JURXSV��WKLV�DOVR�WUDQVSRUWV�WKH�DXWKRUL]DWLRQ�SURILOHV��7KHSURILOHV�QR�ORQJHU�KDYH�WR�EH�UHJHQHUDWHG�LQ�WKH�WDUJHW�V\VWHP�LQ�WUDQVDFWLRQ�683&�+RZHYHU��\RX�VKRXOG�FRPSDUH�WKH�XVHU�PDVWHU�UHFRUGV�ZKHQ�\RX�LPSRUW�DFWLYLW\�JURXSVLQWR�WKH�WDUJHW�V\VWHP�

2QFH�\RX�KDYH�HQWHUHG�WKH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUW�UHTXHVW��\RX�VKRXOG�QRW�PDNH�DQ\PRUH�FKDQJHV�WR�WKH�DXWKRUL]DWLRQ�SURILOHV�RI�WKDW�DFWLYLW\�JURXS��,I�\RX�FKDQJH�SURILOHV�RUJHQHUDWH�WKHP�IRU�WKH�ILUVW�WLPH��\RX�VKRXOG�HQWHU�WKH�ZKROH�DFWLYLW\�JURXS�LQ�D�WUDQVSRUWUHTXHVW�DJDLQ�

7KH�DFWLYLW\�JURXSV�HQWHUHG�LQ�D�WUDQVSRUW�UHTXHVW�FDQ�EH�GLVSOD\HG�ZLWK�WUDQVDFWLRQ�6(���

Page 174: Amez 46 all

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Authorizations Made Easy7–4

7UDQVSRUWLQJ�6LQJOH�$FWLYLW\�*URXSV�8VLQJ�WKH�$FWLYLW\�*URXS0DLQWHQDQFH�7UDQVDFWLRQ

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� (QWHU�WKH�DFWLYLW\�JURXS�\RX�ZRXOGOLNH�WR�WUDQVSRUW�RU�VHOHFW�LW�XVLQJSRVVLEOH�HQWULHV�

�� &KRRVH� �WR�WUDQVSRUW�WKH�DFWLYLW\JURXS�

�� &KRRVH� �WR�FRQWLQXH�

�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�

�� &KRRVH� �

2

3

5

6

4

Page 175: Amez 46 all

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Release 4.6A/B7–5

<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�

,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.

�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVWV��FUHDWH�D�QHZ�RQHXVLQJ� �

�� &KRRVH� �

�� <RX�FDQ�XVH�WUDQVDFWLRQ�6(���WR�GLVSOD\�\RXU�FXVWRPL]LQJ�WUDQVSRUW�UHTXHVWV�

��� 7R�LPSRUW�WKH�UHTXHVW�ZLWK�WKH�GDWD��ORJ�RQ�WR�WKH�FOLHQW�\RX�ZRXOG�OLNH�WR�LPSRUW�WKH�GDWD�WR�DQGH[HFXWH�WUDQVDFWLRQ�6&&���VHH�7UDQVSRUW�%HWZHHQ�&OLHQWV��VWHSV��²��RQ�SDJH��²���

7

8

Page 176: Amez 46 all

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Authorizations Made Easy7–6

0DVV�7UDQVSRUW�RI�$FWLYLW\�*URXSV

7R�WUDQVSRUW�D�VHW�RI�DFWLYLW\�JURXSV�DOO�DW�RQFH��XVH�WKH�PDVV�WUDQVSRUW�IXQFWLRQ�LQVLGH�WKH�3*�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFHVFUHHQ��FKRRVH�(QYLURQPHQW�→�0DVVWUDQVSRUW�

�� (QWHU�WKH�ILUVW�DQG�ODVW�DFWLYLW\�JURXSRI�WKH�UDQJH�WKDW�\RX�ZRXOG�OLNH�WRWUDQVSRUW��<RX�FDQ�DOVR�XVH�SRVVLEOHHQWULHV�IRU�D�OLVW�RI�DOO�H[LVWLQJ�DFWLYLW\JURXSV�

,Q�WKLV�H[DPSOH��ZH�FKRVH�DOO�DFWLYLW\JURXSV�IURP),B$3B'DWDB(QWU\B&OHUN�WR40B0DQDJHUB$VVLWDQW�

�� &KRRVH� �

�� &KRRVH� �WR�FRQWLQXH�

3

4

2

5

Page 177: Amez 46 all

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Activity Groups

Release 4.6A/B7–7

�� ,I�\RX�ZRXOG�OLNH�WR�WUDQVSRUW�WKHXVHU�DVVLJQPHQW�DV�ZHOO��VHOHFW�8VHU$VVLJQPHQW��,I�\RX�GR�QRW�ZDQW�WRWUDQVSRUW�WKH�XVHU�DVVLJQPHQW�ZLWKWKH�DFWLYLW\�JURXS��PDNH�VXUH�LW�LVGHVHOHFWHG�

�� &KRRVH� �

<RX�FDQ�GHFLGH�ZKHWKHU�WKH�XVHU�DVVLJQPHQWV�VKRXOG�DOVR�EH�WUDQVSRUWHG��3OHDVH�QRWHWKDW�ZKHQ�\RX�WUDQVSRUW�WKH�XVHU�DVVLJQPHQWV�ZLWK�WKH�DFWLYLW\�JURXSV��WKLV�DFWLRQUHSODFHV�WKH�DFWLYLW\�JURXS�XVHU�DVVLJQPHQW�LQ�WKH�WDUJHW�V\VWHP�

,I�\RX�DUH�XVLQJ�&HQWUDO�8VHU�0DLQWHQDQFH��\RX�FDQ�RQO\�FUHDWH�XVHU�DVVLJQPHQWV�LQ�WKHFHQWUDO�V\VWHP��7KHVH�XVHU�DVVLJQPHQWV�FDQ�WKHQ�EH�VHQW�E\�UHTXHVW�WR�WKH�V\VWHP�JURXSWKDW�\RX�VSHFLILHG��,I�XVHU�DVVLJQPHQWV�WR�DFWLYLW\�JURXSV�ZHUH�DGGLWLRQDOO\�WUDQVSRUWHG�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVSOD\�ZRXOG�EH�LQFRQVLVWHQW��7KH�XVHUV�WUDQVSRUWHG�LQWKLV�ZD\�ZRXOG�EH�UHPRYHG�DW�WKH�QH[W�XVHU�GLVWULEXWLRQ�

,I�\RX�ZDQW�WR�ORFN�WKH�V\VWHP�DJDLQVW�LPSRUWLQJ�XVHU�DVVLJQPHQWV�IURP�DFWLYLW\�JURXSV�\RX�FDQ�VSHFLI\�WKLV�LQ�WKH�&XVWRPL]LQJ�WDEOH�35*1B&867��XVLQJ�WUDQVDFWLRQ�60����(QWHU�D�OLQH�ZLWK�WKH�LGHQWLILHU�USER_REL_IMPORT�DQG�WKH�YDOXH�NO.

�� ,Q�WKH�3URPSW�IRU�&XVWRPL]LQJ�UHTXHVWGLDORJ�ER[��HQWHU�WKH�FRUUHFW&XVWRPL]LQJ�UHTXHVW�QXPEHU�RU�XVHSRVVLEOH�HQWULHV�WR�VHOHFW�DQ�H[LVWLQJRQH��,I�QRQH�H[LVW��FUHDWH�D�QHZ�RQHXVLQJ� �

�� &KRRVH� �

8VHU�0DVWHU�5HFRUG�&RPSDULVRQ�$IWHU�,PSRUW�LQWR�WKH�7DUJHW�6\VWHP

2QFH�WKH�DFWLYLW\�JURXSV�KDYH�EHHQ�LPSRUWHG�LQWR�WKH�WDUJHW�V\VWHP��\RX�VKRXOG�FRPSDUHWKH�XVHU�PDVWHU�UHFRUGV�RI�WKH�DFWLYLW\�JURXSV�FRQFHUQHG��([HFXWH�WKLV�FRPSDULVRQ�XVLQJUHSRUW�3)&*B7,0(B'(3(1'(1&<��ZKLFK�\RX�VKRXOG�VFKHGXOH�SHULRGLFDOO\�

,I�\RX�GR�QRW�ZDQW�WR�ZDLW�XQWLO�WKDW�UHSRUW�UXQV�DQG�ZDQW�WKH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHWV\VWHP�WR�EH�LPPHGLDWHO\�FRQVLVWHQW��FRPSDUH�WKH�DFWLYLW\�JURXSV�E\�FKRRVLQJ�(QYLURQPHQW→�0DVV�FRPSDUH�LQ�WUDQVDFWLRQ�3)&*��,Q�WKH�$FWLYLW\�JURXS�ILHOG��FKRRVH�WKH�DFWLYLW\�JURXSVFRQFHUQHG��6HOHFW�&RPSOHWH�FRPSDUH�LQ�WKH�6HOHFWLRQ�RI�DFWLRQ�ILHOG�DQG�VWDUW�WKH�UHSRUW�E\FKRRVLQJ�WKH� ��7KH�DFWLYLW\�JURXSV�LQ�WKH�WDUJHW�V\VWHP�DUH�WKHQ�PDGH�FRQVLVWHQW�

6

7

8

9

Page 178: Amez 46 all

Chapter 7: Preparing the R/3 Environment for Go-Live

Transporting Check Indicators and Field Values

Authorizations Made Easy7–8

7UDQVSRUWLQJ�&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV

:LWK�WUDQVDFWLRQ�68���\RX�FDQ�FRS\�WKH�VXSSOLHG�6$3�GHIDXOWV�FRQFHUQLQJ�FKHFN�LQGLFDWRUV�ILHOG�YDOXHV��DQG�WDEOHV�862%;�DQG�862%7��7KLV�SURFHGXUH�LPSRUWV�ERWK�WKH�6$3�FKHFNLQGLFDWRU�GHIDXOWV�IRU�DXWKRUL]DWLRQ�REMHFWV�LQ�D�WUDQVDFWLRQ��DQG�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�WKH�3*�LQWR�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�

:KHWKHU�\RX�UXQ�WUDQVDFWLRQ�68���LQLWLDOO\��RU�FKDQJH�WKH�GHIDXOWV�ODWHU�ZLWK�WUDQVDFWLRQ68����WKH�SURFHVV�LV�UHFRUGHG�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��%\�FDUU\LQJ�RXW�WKHFRUUHVSRQGLQJ�WUDQVSRUW�UHTXHVW��\RX�GLVWULEXWH�\RXU�FKHFN�LQGLFDWRUV�LQ�WKH�V\VWHP�

7KH��7UDQVDFWLRQ�QDPH!�FRUUHVSRQGV�WR�QRUPDO�6$3�WUDQVDFWLRQ�QDPHV��VXFK�DV�9$����7KHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�DUH�LQFOXGHG�LQ�WKH�WUDQVSRUW��&KHFN�LQGLFDWRUV�DUH�VDYHG�LQWDEOH�862%;B&�DQG�ILHOG�YDOXHV�IRU�WKH�3*�DUH�VDYHG�LQ�WDEOH�862%7B&�

7UDQVSRUWLQJ�$XWKRUL]DWLRQ�7HPSODWHV

$IWHU�DQ�XSJUDGH��DOO�6$3�GHOLYHUHG�WHPSODWHV�ZLOO�EH�LGHQWLFDO�LQ�DOO�V\VWHPV��<RX�FDQQRWFKDQJH�WKHVH�WHPSODWHV��\RX�FDQ�RQO\�FRS\�DQG�DOWHU�WKHP��<RX�FDQ��KRZHYHU��FUHDWH�\RXURZQ�WHPSODWHV��DV�GHVFULEHG�HDUOLHU�LQ�WKLV�ERRN��:KHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��XQOLNH6$3�GHIDXOW�FKDQJHV��WHPSODWH�FKDQJHV�DUH�QRW�DXWRPDWLFDOO\�SDVVHG�RQ�WR�WKH�DSSURSULDWHDXWKRUL]DWLRQ�SURILOH�V��ZKHUH�WKH�WHPSODWH�ZDV�LQVHUWHG��2QFH�\RX�KDYH�FKDQJHG�DWHPSODWH�WKDW�ZDV�SUHYLRXVO\�LQVHUWHG�LQ�DQ�DXWKRUL]DWLRQ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��\RXPXVW�PDQXDOO\�XSGDWH�WKDW�SURILOH�ZLWK�WKH�VDPH�FKDQJHV�WKDW�ZHUH�PDGH�WR�WKH�WHPSODWH�&KDQJHV�WR�\RXU�RZQ�WHPSODWHV�DUH�UHFRUGHG�E\�WKH�FRUUHFWLRQ�DQG�WUDQVSRUW�V\VWHPV��7RFDUU\�RXW�WKH�WUDQVSRUW�UHTXHVW��REMHFWV�LQ�WKH�UHTXHVW�PXVW�FRQWDLQ�WKH�IROORZLQJ�V\QWD[�

R3TR SUSP <Template Name>

7UDQVSRUWLQJ�8VHU�0DVWHU�5HFRUGV

7R�WUDQVSRUW�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�FOLHQWV��UXQ�WKH�FOLHQW�FRS\�WUDQVDFWLRQ�SCCL�7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW�$GPLQLVWUDWLRQ��→�&OLHQW�&RS\�→�6&&/�¥/RFDO�&RS\��DQG�VHOHFW�SURILOH�6$3B86(5��)RU�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV�EHWZHHQ�5��6\VWHPV��XVH�WUDQVDFWLRQ�SCC8��7RROV�→�$GPLQLVWUDWLRQ�→�$GPLQLVWUDWLRQ�→�&OLHQW$GPLQLVWUDWLRQ��→�&OLHQW�7UDQVSRUW�→�6&&����&OLHQW�7UDQVSRUW��ZLWK�SURILOH�6$3B86(5�

Page 179: Amez 46 all

8–1

&KDSWHU��� ,QVHUWLQJ�0LVVLQJ

$XWKRUL]DWLRQV

&RQWHQWV

Manually Postmaintaining Authorizations ...........................................................8–2

Manually Inserting Authorizations ........................................................................8–3

Inserting Authorizations from Templates.............................................................8–7

Inserting Authorizations from a Profile ..............................................................8–12

Inserting Full Authorizations: Profile “<YourCompany>” ................................8–15

��

Page 180: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Manually Postmaintaining Authorizations

Authorizations Made Easy8–2

0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV

$OWKRXJK�WKH�3URILOH�*HQHUDWRU��3*�EXLOGV�DXWKRUL]DWLRQ�SURILOHV��LW�PD\�VRPHWLPHV�EHQHFHVVDU\�WR�LQVHUW�D�PLVVLQJ�DXWKRUL]DWLRQ�RU�WR�DGMXVW�D�ILHOG�YDOXH��7KH�SURFHVV�RIPDLQWDLQLQJ�3*·V�VXJJHVWHG�DXWKRUL]DWLRQV��DV�GHULYHG�IURP�WKH�WUDQVDFWLRQV�VHOHFWHG�IRU�DQDFWLYLW\�JURXS��LV�FDOOHG�SRVWPDLQWDLQLQJ�DXWKRUL]DWLRQV��0DQXDO�SRVWPDLQWHQDQFH�PD\�EHQHFHVVDU\�LQ�WKH�SDUDPHWHU�DQG�YDULDQW�WUDQVDFWLRQV��DQG�GXULQJ�WKH�XSJUDGH�

:KHQ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV"

6KRZQ�EHORZ�DUH�VRPH�RI�WKH�W\SLFDO�FDVHV�ZKHUH�\RX�PXVW�PDQXDOO\�LQFOXGHDXWKRUL]DWLRQV�

&DVH�����$XWKRUL]DWLRQ�,V�0LVVLQJ�IRU�5HODWHG�7UDQVDFWLRQV

$OWKRXJK�WKH�3*�DVVLJQV�D�SDUWLFXODU�SURILOH�WR�D�XVHU��LW�LV�SRVVLEOH�WKDW�WKH�VDPH�XVHU�PD\UHFHLYH�WKH�HUURU�PHVVDJH�´<RX�DUH�QRW�DXWKRUL]HG�µ�ZKHQ�DWWHPSWLQJ�WR�XVH�D�UHODWHGWUDQVDFWLRQ�

7R�DGGUHVV�WKH�DXWKRUL]DWLRQ�VHWWLQJV�IRU�WKH�UHODWHG�WUDQVDFWLRQ��GR�WKH�IROORZLQJ�

�� 8VH�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG��WR�VHHWKH�ODVW�DXWKRUL]DWLRQ�FKHFN�WKDW�IDLOHG��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ��WR�OHDUQKRZ�WR�XVH�WUDQVDFWLRQ�68����

�� &KHFN�WKH�UHODWHG�WUDQVDFWLRQ�WR�FRQILUP�LI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�FKHFNHG�

�� &KHFN�WKH�JHQHUDWHG�SURILOH�WR�FRQILUP�LI�WKH�DXWKRUL]DWLRQ�IRU�WKH�UHODWHG�WUDQVDFWLRQ�LVLQFRUUHFWO\�VHW�

�� 8VH�WUDQVDFWLRQ�68���WR�FKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKH�DXWKRUL]DWLRQ�REMHFW�LQ�WKHGHVLUHG�WUDQVDFWLRQ��VHH�FKDSWHU�����7LSV�DQG�7URXEOHVKRRWLQJ�WR�OHDUQ�KRZ�WR�XVHWUDQVDFWLRQ�68����

&DVH�����7KH�*HQHUDWHG�3URILOH�'RHV�1RW�$VVLJQ�$Q\�*HQHUDO�5LJKWV�WR�WKH

8VHU

6LQFH�EDVLF�DXWKRUL]DWLRQV�DUH�VR�JHQHUDO��LW�LV�QRW�SUDFWLFDO�WR�LQFOXGH�WKHP�LQ�LQGLYLGXDOWUDQVDFWLRQV�

7R�LPSURYH�V\VWHP�SHUIRUPDQFH��WKRXJK�XQXVXDO�IURP�DQ�DXWKRUL]DWLRQV�VWDQGSRLQW��< 5���GRHV�QRW�FKHFN�LI�DQ�DXWKRUL]DWLRQ�LV�QHHGHG�IRU�DQ�H[LVWLQJ�WUDQVDFWLRQ< 1HZ�DXWKRUL]DWLRQV�DUH�DGGHG�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�DXWKRUL]DWLRQV7KH�V\VWHP�SURYLGHV�WKH�IXQFWLRQDOLW\�WR�VXPPDUL]H�DXWKRUL]DWLRQV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW�

&DVH�����&DQQRW�6HOHFW�7UDQVDFWLRQ�68���IURP�WKH�0HQX�LQ�3)&*

6$3�UHFRPPHQGV�LQFOXGLQJ�WKH�DSSURSULDWH�DXWKRUL]DWLRQV�IRU�WUDQVDFWLRQ�68���LQ�HDFKDXWKRUL]DWLRQ�SURILOH��7KHVH�DXWKRUL]DWLRQV�JXDUDQWHH�WKDW�LI�XVHUV�JHW�DQ�HUURU�PHVVDJH��IRU

Page 181: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Release 4.6A/B8–3

H[DPSOH��´<RX�DUH�QRW�DXWKRUL]HG«�µ�´1R�DXWKRUL]DWLRQ�IRU«µ�RU�DQ\�PHVVDJH�UHJDUGLQJDQ�DXWKRUL]DWLRQ�SUREOHP���WKH�KHOS�GHVN�FDQ�PRUH�HDVLO\�DVVLVW�WKHP��7KH�DFWLYLW\�JURXS6$3B%&B(1'86(5B$*�DOUHDG\�FRQWDLQV�WKH�DXWKRUL]DWLRQ�IRU�68����7KLV�DFWLYLW\�JURXS�LVDOVR�LQFOXGHG�LQ�WKH�FRPSRVLWH�DFWLYLW\�JURXS�6$3B%&B(9(5<B(03/2<((�

+RZ�WR�,QVHUW�0LVVLQJ�$XWKRUL]DWLRQV

<RX�PD\�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�< 0DQXDOO\< )URP�D�WHPSODWH< )URP�D�SURILOH< %\�LQVHUWLQJ�FRPSOHWH�DXWKRUL]DWLRQV

0DQXDOO\�,QVHUWLQJ�$XWKRUL]DWLRQV

8VLQJ�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG���\RX�FDQILQG�RXW�LI�DQ�DXWKRUL]DWLRQ�FKHFN�IRU�\RXU�WUDQVDFWLRQ�LV�PLVVLQJ��7UDQVDFWLRQ�68���LV�RQO\RQH�RI�WKH�ZD\V�WR�GHWHUPLQH�PLVVLQJ�DXWKRUL]DWLRQV��6RPHWLPHV��WUDFHV�DUH�PRUH�XVHIXOEHFDXVH�WKH\�DUH�PRUH�DFFXUDWH�DQG�FRPSOHWH³SDUWLFXODUO\�ZKHQ�GHDOLQJ�ZLWK�+5DXWKRUL]DWLRQ�SUREOHPV��,GHQWLI\�WKH�DXWKRUL]DWLRQ�REMHFW�DQG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�ILHOGYDOXHV��7KHQ�PDQXDOO\�LQVHUW�WKH�PLVVLQJ�DXWKRUL]DWLRQ�

<RX�FDQ�XVH�WKH�IROORZLQJ�WZR�RSWLRQV�WR�LQVHUW�DXWKRUL]DWLRQV�< 6HOHFWLRQ�FULWHULD��FKRRVH�IURP�DXWKRUL]DWLRQV�VRUWHG�E\�FODVV�< 0DQXDOO\��LI�\RX�NQRZ�WKH�REMHFW��RU�FDQ�FKRRVH�IURP�DQ�REMHFW�OLVW�

7R�DVVLJQ�JHQHUDO�DXWKRUL]DWLRQV��FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�< &UHDWH�D�VHSDUDWH�DFWLYLW\�JURXS�FRQWDLQLQJ�RQO\�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�

SULQWLQJ���DQG�DVVLJQ�WKLV�DFWLYLW\�JURXS�WR�DOO�XVHUV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�SULQW�WR�SDUWLFXODU�SULQWHUV��$�JHQHULF�SULQWLQJ�DXWKRUL]DWLRQ�FDQ�EH�DVVLJQHG�*HQHUDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IRU�WKHVH�DFWLYLW\�JURXSV�DQG�DVVLJQ�WKH�SURILOHV�WRWKH�XVHUV�

< ,QFOXGH�WKH�UHTXLUHG�REMHFWV�LQ�WKH�DFWLYLW\�JURXS�E\�XVLQJ�6$3�WHPSODWHV��RU�\RXU�RZQWHPSODWHV�E\�PDLQWDLQLQJ�DQ\�PLVVLQJ�ILHOG�HQWULHV��7KLV�PHWKRG�ZRUNV�EHVW�LI�XVHUVZLOO�EH�DVVLJQHG�WR�VSHFLILF�SULQWHUV�

< 6$3�DOUHDG\�GHOLYHUV�DFWLYLW\�JURXSV�ZLWK�JHQHUDO�DXWKRUL]DWLRQV��IRU�H[DPSOH�6$3B%&B(9(5<B(03/2<((�DQG�6$3B%&B(1'86(5�

Page 182: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Authorizations Made Easy8–4

8VLQJ�6HOHFWLRQ�&ULWHULD

<RX�FDQ�XVH�VHOHFWLRQ�FULWHULD�WR�LQVHUW�PLVVLQJ�DXWKRUL]DWLRQV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

2Q�VFUHHQ��\RX�FDQ�VHH�WKH�FXUUHQWO\LQFOXGHG�DXWKRUL]DWLRQ�FODVVHV�IRUWKH�VHOHFWHG�DFWLYLW\�JURXS�

�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZRXOG�OLNH�WRLQVHUW��VRUWHG�E\�FODVV��

,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQREMHFW�\RX�ZRXOG�OLNH�WR�LQVHUWPDQXDOO\��FKRRVH� �0DQXDOO\�DQG�HQWHUWKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQGVHOHFW�LW�IURP�D�OLVW��VHH�H[DPSOH�VKRZQEHORZ��

4

3

5

Page 183: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Release 4.6A/B8–5

�� ([SDQG�WKH�REMHFW�FODVVHV�DQG�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��

�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHGHVLUHG�DXWKRUL]DWLRQ�REMHFWV�

�� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�

�� &KRRVH�,QVHUW�FKRVHQ�

��� 7KH�VHOHFWHG�DXWKRUL]DWLRQ�REMHFWVDUH�WUDQVIHUUHG�EDFN�WR�WKHDXWKRUL]DWLRQ�FODVVHV�IRU�WKH�JLYHQDFWLYLW\�JURXS��7KH�V\VWHP�FUHDWHV�DQHZ�DXWKRUL]DWLRQ�IRU�HDFKDXWKRUL]DWLRQ�REMHFW��7KH�\HOORZOLJKW�LQGLFDWHV�WKDW�QR�DXWKRUL]DWLRQILHOG�YDOXHV�DUH�PDLQWDLQHG�

��� 7KH�V\VWHP�VWDWXV�LV�GLVSOD\HG�DV0DQXDOO\��ZKLFK�PHDQV�WKDW�WKHUHDUH�PDQXDOO\�LQVHUWHG�DXWKRUL]DWLRQVLQ�WKLV�REMHFW�FODVV�

��� &KRRVH� �2SHQ�WR�GLVSOD\�DOO�RSHQDXWKRUL]DWLRQ�ILHOGV�

6

7

8

9

10 11

12

Page 184: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Manually Inserting Authorizations

Authorizations Made Easy8–6

��� 0DLQWDLQ�WKH�DSSURSULDWH�YDOXHV�IRUWKH�RSHQ�DXWKRUL]DWLRQ�SURILOHV�

��� 6DYH�DQG�JHQHUDWH�WKH�DFWLYLW\JURXS�

,QVHUWLQJ�0DQXDOO\

,I�\RX�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZRXOG�OLNH�WR�LQVHUW��SHUIRUP�WKH�IROORZLQJ�VWHSV�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS��IRU�H[DPSOH�00B%8<(5B$*��DQG�FKRRVH� �&KDQJH�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQ��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� &KDQJH�DXWKRUL]DWLRQ�GDWD�

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH� �0DQXDOO\�

�� (QWHU�WKH�DXWKRUL]DWLRQ�REMHFW�RUFKRRVH�SRVVLEOH�HQWULHV�

�� &KRRVH� �

13

14

4

3

Page 185: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–7

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�7HPSODWHV

*HQHUDWHG�SURILOHV�GR�QRW�DXWRPDWLFDOO\�JUDQW�DQ\�JHQHUDO�ULJKWV�WR�< 3ULQW< /RJ�RQ�WR�6$31HW�²�5���)URQWHQG�QRWHV< 8VH�WUDQVDFWLRQ�68��

< 'HEXJ��YLHZ�RQO\�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�ZLOO�ILUVW�FUHDWH�D�QHZ�WHPSODWH�DQG�WKHQ�LQVHUW�WKH�WHPSODWH�LQWR�DQ�H[LVWLQJDFWLYLW\�JURXS�

&UHDWLQJ�D�1HZ�7HPSODWH

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 2Q�WKH�$FWLYLW\�*URXS�0DLQWHQDQFH�VFUHHQ��FKRRVH�(QYLURQPHQW�→�&KHFN�LQGLFDWRU�

�� 6HOHFW�(GLW�DXWKRUL]DWLRQ�WHPSODWHV�

�� &KRRVH� �

�� &KRRVH� �

7R�DYRLG�FRQIOLFWV�EHWZHHQ�FXVWRPHU�GHILQHG�WHPSODWHV�DQG�WKH�6$3�GHOLYHUHGWHPSODWHV��GR�QRW�XVH�QDPHV�IRU�\RXU�WHPSODWHV�WKDW�EHJLQ�ZLWK�6�RU�-��)RU�DGGLWLRQDOLQIRUPDWLRQ��VHH�6$31HW�²�5���)URQWHQG�QRWH�������DQG�ORRN�IRU�WUDQVSRUW�REMHFW�5�756863�

7HPSODWH�FKDQJHV�DUH�QRW�SDVVHG�RQ�ZKHQ�\RX�FRPSDUH�DFWLYLW\�JURXSV��7KDW�LV��LI�\RX

3

4

5

Page 186: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Authorizations Made Easy8–8

FKDQJH�D�WHPSODWH�WKDW�\RX�DOUHDG\�LQVHUWHG�LQWR�DQ�DFWLYLW\�JURXS��WKHUH�LV�QR�LQGLFDWRULQ�WKH�DFWLYLW\�JURXS�WR�VKRZ�WKDW�WKH�LQVHUWHG�WHPSODWH�KDV�FKDQJHG�

�� (QWHU�WKH�WHPSODWH�QDPH�DQG�D�VKRUWGHVFULSWLRQ�

�� &KRRVH� �

�� &KRRVH� �6HOHFWLRQ�FULWHULD�WR�VHOHFWWKH�DXWKRUL]DWLRQ�\RX�ZDQW�WR�LQVHUW�VRUWHG�E\�FODVV��

,I�\RX�DOUHDG\�NQRZ�WKH�DXWKRUL]DWLRQ�REMHFW�\RX�ZDQW�WR�LQVHUW�PDQXDOO\��\RX�FDQFKRRVH� �0DQXDO�LQSXW�DQG�HQWHU�WKH�REMHFW��RU�XVH�SRVVLEOH�HQWULHV�DQG�VHOHFW�LW�IURP�DOLVW��

�� ([SDQG�WKH�REMHFW�FODVVHV�WR�FKRRVHWKH�GHVLUHG�DXWKRUL]DWLRQ�REMHFW��IRUH[DPSOH��ZH�VHOHFWHG�%DVLV�$GPLQLVWUDWLRQ�WR�FKRRVH�WKHDXWKRUL]DWLRQ�REMHFWV�IRU�SULQWLQJ��

6

7

9

8Tip

Page 187: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–9

��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�\RX�ZDQW�WRLQVHUW�

��� 6HOHFW�WKH�DXWKRUL]DWLRQ�REMHFWV�\RXZDQW�WR�LQVHUW�E\�FOLFNLQJ�WKH�UHGPLQXV�����VLJQV��IRU�H[DPSOH��6SRRO�$FWLRQV�DQG�6SRRO��'HYLFH$XWKRUL]DWLRQV���7KH�JUHHQ�SOXV����VLJQV�LQGLFDWH�WKDW�WKH�REMHFWV�KDYHEHHQ�VHOHFWHG�

��� &KRRVH�,QVHUW�FKRVHQ�

��� 0DLQWDLQ�DOO�WKH�DSSURSULDWH�YDOXHVIRU�WKH�DXWKRUL]DWLRQ�ILHOGV��IRUH[DPSOH��ZH�FKRVH�)XOODXWKRUL]DWLRQ��

��� &KRRVH� �

��� &KRRVH� �

7KH�WHPSODWH�QRZ�DSSHDUV�LQ�WKHWHPSODWH�OLVW�DQG�LV�UHDG\�IRU�XVH�

��� &KRRVH� �

11

12

13

14 15

16

Page 188: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Authorizations Made Easy8–10

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�7HPSODWH

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�D�WHPSODWH��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�WHPSODWH� 5

4

3

Page 189: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from Templates

Release 4.6A/B8–11

�� 6HOHFW�WKH�WHPSODWH�\RX�ZDQW�WRLQFOXGH��IRU�H[DPSOH��35,17,1*WHPSODWH��

0XOWLSOH�WHPSODWH�VHOHFWLRQV�DUHSRVVLEOH�

�� &KRRVH� �

7KH�WHPSODWH�ZDV�LQVHUWHG�DQGPDUNHG�ZLWK�VWDWXV�0DQXDOO\��7KHJUHHQ�OLJKW�LQGLFDWHV�WKDW�WKHDXWKRUL]DWLRQ�ILHOGV�DUH�PDLQWDLQHG�

�� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �

,I�\RX�LQVHUWHG�D�WHPSODWH�ZLWK�DXWKRUL]DWLRQ�ILHOGV�WKDW�DUH�QRW�PDLQWDLQHG��WKH�LQGLFDWRUOLJKWV�DSSHDU�DV�\HOORZ�RU�UHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��%HIRUH�SURFHHGLQJ��\RXPXVW�ILUVW�SRVWPDLQWDLQ�DOO�RSHQ�ILHOGV�

6

7

8

Page 190: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Authorizations Made Easy8–12

,QVHUWLQJ�$XWKRUL]DWLRQV�IURP�D�3URILOH

,I�\RX�KDYH�DOUHDG\�FUHDWHG�DXWKRUL]DWLRQ�SURILOHV�XVLQJ�WUDQVDFWLRQV�68���DQG�68����\RX�FDQ�LQVHUW�WKHVHDXWKRUL]DWLRQV�SURILOHV�LQWR�WKH�OLVW�RI�WKH�DXWKRUL]DWLRQV�IRU�WKH�DFWLYLW\�JURXS�

0LJUDWLQJ�3URILOHV�&UHDWHG�ZLWK�7UDQVDFWLRQV�68���DQG�68��1RWH�WKDW�QR�DFWLYLW\�JURXS�LQIRUPDWLRQ��VXFK�DV�WUDQVDFWLRQ�FRGHV�DXWRPDWLFDOO\PDLQWDLQHG�IRU�REMHFW�6B7&2'(��FDQ�EH�UHJHQHUDWHG�IRU�LQVHUWHG�SURILOHV��7KH�WHFKQLTXHEHORZ�RQO\�DOORZV�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���WR�PLJUDWH�WR�VXFKSURILOHV�DQG�ODWHU�EH�PDLQWDLQHG�ZLWK�WKH�3*��7KHUH�LV�QR�ZD\�WR�UH�FUHDWH�WKH�DSSURSULDWHDFWLYLW\�JURXS�LQIRUPDWLRQ�

7KLV�PHDQV�WKDW�HYHU\WKLQJ�XQGHU�WKH�0HQX�WDE�ZLOO�EH�XQFKDQJHG�LI�68���SURILOHV�DUHFRSLHG�LQWR�WKH�DFWLYLW\�JURXS�+RZHYHU�ZLWK�����\RX�KDYH�QRZ�WKH�RSWLRQ�WR�PLJUDWH�SURILOHV�FUHDWHG�ZLWK�68���DQG68���LQWR�DFWLYLW\�JURXSV��6HH�FKDSWHU�����WKH�VHFWLRQ�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68��3URILOHV�LQWR�$FWLYLW\�*URXSV�

,Q�FHUWDLQ�FLUFXPVWDQFHV��\RX�PD\�ILUVW�FUHDWH�D�WHPSODWH�IURP�\RXU�SURILOH�DQG�WKHQ�LQVHUWWKH�WHPSODWH��7HPSODWHV�DUH�UHXVDEOH�DQG�HDV\�WR�LQVHUW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�GHVLUHG�DFWLYLW\�JURXS�LQ�ZKLFK�\RX�ZRXOG�OLNH�WR�LQVHUW�WKH�DXWKRUL]DWLRQ��IRU�H[DPSOH00B%8<(5B$*���DQG�FKRRVH�� �&KDQJH�

Page 191: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Release 4.6A/B8–13

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

,Q� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ\RX�FDQ�VSHFLI\�WKH�RSWLRQ�ZLWK�ZKLFK\RX�ZDQW�WR�PDLQWDLQ�WKH�DXWKRUL]DWLRQYDOXHV��7KLV�RSWLRQ�LV�DXWRPDWLFDOO\�VHWFRUUHFWO\�LQ�QRUPDO�PRGH�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)URP�SURILOH�

�� (QWHU�WKH�SURILOH�QDPH�RU�XVH�SRVVLEOHHQWULHV�

�� &KRRVH� �

,I�\RX�LQFOXGH�D�SURILOH�WKDW�LQFOXGHV�WKH�REMHFW�6B7&2'(��LW�GRHV�QRW�DGG�WKH�WUDQVDFWLRQFRGH�WR�WKH�PHQX�SRUWLRQ�RI�WKH�DFWLYLW\�JURXS�GHILQLWLRQ�

5

6

4

7

3

Tip

Page 192: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Authorizations from a Profile

Authorizations Made Easy8–14

�� 6HOHFW�WKH�GHVLUHG�SURILOH�IURP�WKHOLVW�RI�SURILOHV�

�� &KRRVH� �

<RXU�GLDORJ�ER[�PD\�ORRN�GLIIHUHQW��7KHDSSHDUDQFH�GHSHQGV�RQ�WKH�VHWWLQJV�IRUSRVVLEOH�HQWULHV�XQGHU�+HOS�→�6HWWLQJV�→3RVVLEOH�HQWULHV�→�6HWWLQJV�

��� 7KH�VHOHFWHG�SURILOH�LV�WUDQVIHUUHG�

��� &KRRVH� �

��� $OO�WKH�DXWKRUL]DWLRQV�LQ�WKH�VHOHFWHGSURILOH�DUH�WUDQVIHUUHG�DQG�PDUNHGZLWK�WKH�VWDWXV�0DQXDOO\��7KH�JUHHQOLJKW�LQGLFDWHV�WKDW�WKH�SURILOH�LVPDLQWDLQHG�

,I�\RX�LQVHUW�DXWKRUL]DWLRQV�IURP�DSURILOH�ZLWK�QRQPDLQWDLQHGDXWKRUL]DWLRQ�ILHOGV��WKH�UHG�OLJKWDSSHDUV�DQG�\RX�KDYH�WR�SRVWPDLQWDLQDOO�RSHQ�ILHOGV�EHIRUH�SURFHHGLQJ�

��� 7R�UHJHQHUDWH�WKH�DXWKRUL]DWLRQSURILOH��FKRRVH� �

8

9

10

11

12

13

Page 193: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–15

,QVHUWLQJ�)XOO�$XWKRUL]DWLRQV��3URILOH�´�<RXU&RPSDQ\!µ

,Q�WKH�IROORZLQJ�H[DPSOH��\RX�OHDUQ�KRZ�WR�FUHDWH�D�QHZ�SURILOH�FDOOHG�&203B$//��ZKHUH�´&203µ�VWDQGVIRU�\RXU�FRPSDQ\�QDPH��7KLV�SURILOH�ZLOO�EH�PRGHOHG�DIWHU�6$3B$//��EXW�ZLWK�WKH�VXSHUXVHU�DXWKRUL]DWLRQUHPRYHG��7KHUHIRUH��ZH�ZLOO�FUHDWH�DQ�DFWLYLW\�JURXS�FDOOHG�&203$1<B$//�DQG�LQFOXGH�WKH�SURILOH&203B$//�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� (QWHU�WKH�QDPH�RI�WKH�DFWLYLW\�JURXS\RX�ZDQW�WR�FUHDWH��IRU�H[DPSOH�COMPANY_ALL��

�� &KRRVH� �&UHDWH�

�� ,Q�WKH�'HVFULSWLRQ�ILHOG��HQWHU�DGHVFULSWLRQ�IRU�WKH�DFWLYLW\�JURXS�

�� &KRRVH� �WR�VDYH�WKH�DFWLYLW\�JURXS�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

2

3

4

5

6

Page 194: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–16

�� &KRRVH� �&KDQJH�DXWKRUL]DWLRQ�GDWD�

�� &KRRVH� �'R�QRW�VHOHFW�WHPSODWHV�

7KH�V\VWHP�GLVSOD\V�WKH�&KRRVH�7HPSODWHZLQGRZ�EHFDXVH�ZH�FKRVH�WKH$XWKRUL]DWLRQV�WDE�ZLWKRXW�VHOHFWLQJ�DQ\WUDQVDFWLRQV�

�� &KRRVH�(GLW�→�,QVHUW�DXWKRUL]DWLRQ�V�→�)XOO�DXWKRUL]DWLRQ�

7

8

9

Page 195: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–17

��� &KRRVH�<HV�

7KH�LQVHUWLRQ�GRHV�QRW�LQFOXGH�DGG�RQ�FRPSRQHQWV��H[FHSW�GHGXFWLRQ�PDQDJHPHQW�DGG�RQ�FRPSRQHQWV�

��� &KRRVH� �WR�FRQWLQXH�

��� &OLFN�RQ�WKH�QRGH�IRU�WKH�REMHFW�FODVV%DVLV��$GPLQLVWUDWLRQ�WR�RSHQ�LW�

11

10

12

Page 196: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–18

��� ,Q�WKH�6\VWHP�$XWKRUL]DWLRQV�OLQH�FKRRVH� �WR�GHDFWLYDWH�WKH�REMHFW�7KH�DXWKRUL]DWLRQ�REMHFW�6\VWHP$XWKRUL]DWLRQV��6B$'0,B)&'��LVQRZ�LQDFWLYH�DQG�ZLOO�QRW�EHJHQHUDWHG�LQWR�WKH�DXWKRUL]DWLRQSURILOH�IRU�&203B$//�

��� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHDXWKRUL]DWLRQ�REMHFWV�WKDW�EHJLQ�ZLWK$XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\*URXSV�

��� &KRRVH� �LQ�IURQW�RI�WKH�IROORZLQJDXWKRUL]DWLRQ�REMHFWV�WR�GHDFWLYDWHWKHP�< $XWKRUL]DWLRQ�&KHFN�IRU�$FWLYLW\

�*URXSV��6B86(5B$*5�< 8VHU�0DVWHU�0DLQWHQDQFH�

�$XWKRUL]DWLRQV��6B86(5B$87+�< 8VHU�0DVWHU�0DLQWHQDQFH��8VHU

�*URXSV��6B86(5B*53�< 8VHU�0DVWHU�0DLQWHQDQFH�

�$XWKRUL]DWLRQ�3URILOH�6B86(5B352�

< 8VHU�0DVWHU�0DLQWHQDQFH�6\VWHP�IRU�&HQWUDO�8VHU0DLQWHQDQFH��6B86(5B6<6�

< 7UDQVDFWLRQ�$VVLJQPHQW�RI7UDQVDFWLRQV�WR�$FWLYLW\�*URXSV�6B86(5B7&'�

��� 2QFH�\RX�KDYH�GHDFWLYDWHG�WKHVH�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV�IRU�\RXU�DXWKRUL]DWLRQ�SURILOH��VHOHFWDQG�GHDFWLYDWH�RWKHU�FULWLFDO�DXWKRUL]DWLRQ�REMHFWV��LI�QHHGHG�

��� &KRRVH�2UJDQL]DWLRQDO�OHYHOV�

13

14

15

17

Page 197: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Release 4.6A/B8–19

��� &KRRVH�)XOO�DXWKRUL]DWLRQ�IRU�WKHRUJDQL]DWLRQDO�OHYHOV��7KH�DVWHULVNV� ��ZLOO�EH�LQVHUWHG�LQ�DOO�WKH�RSHQILHOGV�

��� &KRRVH� �

��� 7R�JHQHUDWH�WKH�SURILOH��FKRRVH� �

��� <RX�FDQ�JLYH�WKH�QHZ�SURILOH�WKHVDPH�QDPH�DQG�GHVFULSWLRQ�DV�WKHDFWLYLW\�JURXS��IRU�H[DPSOH�COMP_ALL��

��� &KRRVH� �WR�JHQHUDWH�WKHDXWKRUL]DWLRQ�SURILOH�V��

18

19

21

22

Page 198: Amez 46 all

Chapter 8: Inserting Missing Authorizations

Inserting Full Authorizations: Profile “<YourCompany>”

Authorizations Made Easy8–20

��� 7R�YLHZ�DOO�WKH�FUHDWHG�SURILOHV�FKRRVH�$XWKRUL]DWLRQV�→�3URILOHRYHUYLHZ�

��� 7KH�2YHUYLHZ�RI�*HQHUDWHG�3URILOHVVFUHHQ�OLVWV�DOO�WKH�JHQHUDWHGDXWKRUL]DWLRQ�SURILOHV�

��� &KRRVH� �WR�FRQWLQXH�

23

24

25

Page 199: Amez 46 all

9–1

&KDSWHU��� $VVLJQLQJ�$FWLYLW\�*URXSV

&RQWHQWV

Overview ..................................................................................................................9–2

Assigning Users to Activity Groups .....................................................................9–3

Assigning Activity Groups to Users .....................................................................9–6

Assigning PD Objects to Activity Groups ............................................................9–7

Assigning Activity Groups to PD Objects ..........................................................9–10

Transferring Users from an IMG Project to an Activity Group.........................9–13

Updating Profiles in the User Master Records ..................................................9–15

Creating a Sample Organizational Plan..............................................................9–21

Structural Authorizations.....................................................................................9–28

��

Page 200: Amez 46 all

Chapter 9: Assigning Activity Groups

Overview

Authorizations Made Easy9–2

2YHUYLHZ

7KH�QHZ�6$3�(DV\�$FFHVV�XVHU�PHQX�LV�WKH�XVHU�VSHFLILF�SRLQW�RI�HQWU\�LQWR�WKH�5���6\VWHP�'HSHQGLQJ�RQ�WKH�DVVLJQHG�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXSV��WKH�XVHU�PHQX�ORRNVGLIIHUHQW�IRU�HDFK�XVHU��7KH�XVHU�PHQX�FRQWDLQV�RQO\�WKRVH�LWHPV³VXFK�DV�WUDQVDFWLRQV�UHSRUWV��DQG�ZHE�DGGUHVVHV³WKDW�WKH�DVVLJQHG�DFWLYLW\�JURXSV�FRQWDLQ�DQG�WKHUHIRUH�RQO\WKRVH�WDVNV�QHHGHG�WR�SHUIRUP�WKH�GDLO\�ZRUN�

'HSHQGLQJ�RQ�WKH�DUHD�RI�WKH�V\VWHP�\RX�ZRUN�LQ��DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV�VXFK�DV�XVHUV��SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV��DIIHFWV�WKH�IROORZLQJ�DUHDV�< ,Q�%XVLQHVV�:RUNIORZ��WKHVH�DVVLJQPHQWV�GHWHUPLQH�WKH�V\VWHP�WDVNV�D�XVHU�FDQ�SHUIRUP

�IRU�ZRUNIORZ�XVHUV��LW�LV�PDQGDWRU\�WR�RQO\�LQFOXGH�WDVNV�LQ�DFWLYLW\�JURXSV��< ,Q�+XPDQ�5HVRXUFHV��WKHVH�DVVLJQPHQWV�VHUYH�DV�KLJKO\�GHWDLOHG�REMHFW�GHVFULSWLRQV��IRU

MRE��SRVLWLRQ��GHVFULSWLRQV��HWF���

7KH�VDPH�DFWLYLW\�JURXS�FDQ�EH�DVVLJQHG�WR�VHYHUDO�GLIIHUHQW�REMHFWV��$�VLQJOH�REMHFW�PD\�DOVREH�UHODWHG�WR�VHYHUDO�GLIIHUHQW�DFWLYLW\�JURXSV��7KH�GLIIHUHQW�DFWLYLW\�JURXSV�DVVLJQHG�WR�DQREMHFW�DUH�WRJHWKHU�UHIHUUHG�WR�DV�WKH�REMHFW·V�DFWLYLW\�SURILOH��7KH�YDULRXV�5���REMHFWV�DUH�< 5���XVHUV�²�2EMHFW�W\SH�86

$Q�5���XVHU�LV�DQ�LQGLYLGXDO�ZKR�LV�� 5HFRJQL]HG�E\�5��� $OORZHG�WR�ORJ�RQ� $OORZHG�WR�SHUIRUP�VSHFLILHG�V\VWHP�DFWLYLWLHV

)RU�WKH�V\VWHP�WR�UHFRJQL]H�XVHUV��WKHLU�QDPHV�PXVW�EH�HQWHUHG�LQ�WKH�%DVLVFRPSRQHQW�RI�WKH�XVHU�PDVWHU�UHFRUG�

< :RUN�FHQWHU���2EMHFW�W\SH�$

$�ZRUN�FHQWHU�LGHQWLILHV�D�ORFDWLRQ�ZKHUH�ZRUN�LV�FDUULHG�RXW��$�ORFDWLRQ�FDQ�UHSUHVHQW�DJHRJUDSKLF�ORFDWLRQ��VXFK�DV�WKH�3KLODGHOSKLD�EUDQFK�RIILFH�RU�WKH�6LQJDSRUH�VXEVLGLDU\�RU�LW�FDQ�EH�PRUH�SUHFLVH��)RU�H[DPSOH��LW�FDQ�LGHQWLI\�D�VSHFLILF�ZRUNVWDWLRQ�ZLWK�FHUWDLQPDWHULDOV�DQG�HTXLSPHQW��RQ�D�VSHFLILF�IORRU�RI�D�VSHFLILF�EXLOGLQJ��:RUN�FHQWHUV�FDQ�EHXVHG�ZLWK�MREV�DQG�WDVNV�WR�FUHDWH�FRPSUHKHQVLYH�MRE�GHVFULSWLRQV��7KH�MRE�LGHQWLILHV�WKHMRE�FODVVLILFDWLRQ��WKH�WDVNV�LQGLFDWH�WKH�W\SHV�RI�GXWLHV�SHUIRUPHG��DQG�WKH�ZRUN�FHQWHULGHQWLILHV�ZKHUH�WKH�WDVNV�DUH�FDUULHG�RXW�

< -RE���2EMHFW�W\SH�&

$�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW�FRPSXWHU�SURJUDPPHU��RU�LQVWUXFWRU��0DQ\�HPSOR\HHV�PD\�KROG�WKH�VDPH�MRE��IRUH[DPSOH��WKHUH�PLJKW�EH����HPSOR\HHV�ZRUNLQJ�DV�HQJLQHHUV���-REV�DUH�QRUPDOO\�XVHG�WRFUHDWH�SRVLWLRQV��$Q\RQH�ZKR�KROGV�D�MRE�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV�DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�MRE��8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV�VXFK�DV�WKRVH�UHTXLUHG�WR�ZRUN�ZLWK�6$3�RIILFH��XVH�FDUH�ZKHQ�DVVLJQLQJ�DFWLYLW\�JURXSVWR�MREV�

Page 201: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Release 4.6A/B9–3

< 2UJDQL]DWLRQDO�XQLW���2EMHFW�W\SH�2

2UJDQL]DWLRQDO�XQLWV�UHSUHVHQW�RUJDQL]DWLRQDO�HQWLWLHV�GHVLJQDWHG�WR�SHUIRUP�D�VSHFLILHGVHW�RI�IXQFWLRQV��)RU�H[DPSOH��RUJDQL]DWLRQDO�XQLWV�UHSUHVHQW�VXEVLGLDULHV��GLYLVLRQV�GHSDUWPHQWV��JURXSV��VSHFLDO�SURMHFW�WHDPV��HWF��,GHQWLI\�WKH�RUJDQL]DWLRQDO�VWUXFWXUH�DW\RXU�ILUP�E\�FUHDWLQJ�RUJDQL]DWLRQDO�XQLWV�DQG�LGHQWLI\LQJ�WKH�UHODWLRQVKLSV�DPRQJ�WKHXQLWV��$Q�HPSOR\HH�DVVLJQHG�WR�DQ�RUJDQL]DWLRQDO�XQLW�DXWRPDWLFDOO\�LQKHULWV�WKHLQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKLV�XQLW�

8QOHVV�WKHVH�JURXSV�JUDQW�JHQHUDO�DFFHVV�ULJKWV��VXFK�DV�SULQWLQJ��XVH�FDUH�ZKHQDVVLJQLQJ�DFWLYLW\�JURXSV�WR�MREV��)RU�H[DPSOH��LI�DXWKRULW\�SURILOHV�WHQG�WR�EH�IDLUO\VWDQGDUG�IRU�DOO�ZRUNHUV�LQ�DQ�RUJDQL]DWLRQDO�XQLW��LW�PD\�EH�PRVW�HIIHFWLYH�WR�DVVLJQDFWLYLW\�JURXSV�DQG�WKHLU�SURILOHV�WR�RUJDQL]DWLRQDO�XQLWV��,I�H[FHSWLRQV�RFFXU��FUHDWHDGGLWLRQDO�DFWLYLW\�JURXSV��,I��KRZHYHU��DXWKRULWLHV�YDU\�E\�MRE�RU�SRVLWLRQ��LW�PD\�EH�EHVWWR�DVVLJQ�DFWLYLW\�JURXSV�WR�WKH�VSHFLILF�MREV�RU�SRVLWLRQV�

< 3HUVRQ���2EMHFW�W\SH�3

$�SHUVRQ�< 3RVLWLRQ���2EMHFW�W\SH�6

$�SRVLWLRQ�UHSUHVHQWV�D�XQLTXH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQW�ZLWKLQ�D�FRPSDQ\��IRUH[DPSOH��WKH�PDUNHWLQJ�DVVLVWDQW��VDOHV�PDQDJHU��HWF���3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHGZLWK�MREV�DQG�DUH�XVXDOO\�FUHDWHG�EDVHG�RQ�MREV��$Q\RQH�ZKR�KROGV�D�SRVLWLRQDXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV��DQG�SURSHUWLHV�RI�WKH�SRVLWLRQ�7KLV�SURFHVV�DOORZV�\RX�WR�KDQGOH�DXWKRUL]DWLRQ�PDQDJHPHQW�LQ�DOPRVW�D�FRPSOHWHO\SRVLWLRQ�RULHQWHG�IDVKLRQ��6LQFH�DOO�RI�WKH�DFFHVV�ULJKWV�DUH�QRZ�OLQNHG�WR�WKH�SRVLWLRQ��LWGRHV�QRW�PDWWHU�ZKR�ILOOV�WKLV�SRVLWLRQ��2QFH�D�XVHU�FKDQJHV�SRVLWLRQV��WKH�DXWKRUL]DWLRQSURILOH�DXWRPDWLFDOO\�FKDQJHV�DIWHU�WKH�XVHU�PDVWHU�UHFRUG�LV�XSGDWHG�

$VVLJQLQJ�$FWLYLW\�*URXSV

0DNH�VXUH�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�WKH�VSHFLILF�SRVLWLRQ�WKDW�ZLOO�UHFHLYH�DQDXWKRUL]DWLRQ�SURILOH��,I�\RX�DVVLJQ�WKH�DFWLYLW\�JURXS�WR�D�MRE��DOO�RI�WKH�SRVLWLRQVFUHDWHG�IURP�WKDW�MRE�ZLOO�LQKHULW�WKH�DFWLYLW\�JURXS�DQG�LWV�DXWKRUL]DWLRQ�SURILOH�V��

$VVLJQLQJ�8VHUV�WR�$FWLYLW\�*URXSV

$OWKRXJK�ZH�DOUHDG\�GHPRQVWUDWHG�LQ�FKDSWHU����8VHU�5ROH�7HPSODWHV��KRZ�WR�DVVLJQ�D�XVHU�WRD�XVHU�UROH�WHPSODWH�RU�DFWLYLW\�JURXS�XVLQJ�WKH�3*��ZH�ZLOO�GHPRQVWUDWH�LW�KHUH�LQ�PRUHGHWDLO�

7KH�IROORZLQJ�PHWKRG�LV�UHFRPPHQGHG�LI�\RX�ZDQW�WR�DVVLJQ�PRUH�XVHUV�WR�D�VSHFLILFDFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WR�DQ�HPSOR\HH�DQG�FKRRVH� �&KDQJH�

Page 202: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Authorizations Made Easy9–4

�� &KRRVH�WKH�8VHU�WDE�

�� (QWHU�WKH�XVHU�,'�LQ�WKH�8VHU�,'�ILHOG�

<RX�FDQ�LQFOXGH�XVHU�,'V�E\�RQH�RIWKH�IROORZLQJ�PHWKRGV�< (QWHU�WKH�XVHU�,'�GLUHFWO\�< 0DNH�D�VHOHFWLRQ�IURP�WKH�SRVVLEOH

HQWULHV�OLVW�< 8VH�PXOWLSOH�VHOHFWLRQ�IURP�D

VHOHFWLRQ�OLVW�E\�FKRRVLQJ�6HOHFWLRQ��6HH�WKH�IROORZLQJ�7LSV

�7ULFNV�

�� 7R�VDYH�\RXU�DVVLJQPHQW��FKRRVH� �

%\�XVLQJ�WKH�EXWWRQ�� �6HOHFWLRQ��\RX�FDQ�LQFOXGHVHYHUDO�XVHUV��IRU�H[DPSOH��DOO�XVHUV�LQ�D�SDUWLFXODUXVHU�JURXS�RU�DOO�XVHUV�LQ�WKH�5���6\VWHP���6HOHFW�WKHGHVLUHG�XVHU�DQG�FKRRVH� �

,I�\RX�FDQQRW�ILQG�WKH�UHTXLUHG�XVHU�RU�LI�\RX�ZDQW�WRFKRRVH�WKH�XVHU�WKURXJK�D�XVHU�JURXS�

D� &KRRVH� �

E� 2Q�WKH�([HFXWH�YDOXH�UHVWULFWLRQ�ZLQGRZ��ILQG�WKHXVHU�E\�HLWKHU�< (QWHULQJ�WKH�ILUVW�OHWWHU�V��RI�WKH�XVHU�QDPH�DQG

DQ�DVWHULVN�� ��WR�H[SDQG�VHOHFWLRQ�OLVW< 8VLQJ�WKH�8VHU�JURXS�ILHOG�WR�ILQG�WKH�XVHU

WKURXJK�WKHLU�XVHU�JURXS

F� &KRRVH� �

G� 6HOHFW�WKH�XVHU�

,W�LV�SRVVLEOH�WR�VHOHFW�VHYHUDO�XVHUV�

H� &KRRVH� �

a

3

4

b

c

Tip

d

e

Page 203: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning Users to Activity Groups

Release 4.6A/B9–5

�� 7KH�FKRVHQ�XVHU�V��DSSHDU�LQ�WKH8VHU�,'�DQG�8VHU�QDPH�FROXPQV�

�� ,Q�WKH�)URP�DQG�WR�FROXPQV��UHVWULFWWKH�VWDUW�DQG�HQG�GDWH�RI�WKH�XVHUDVVLJQPHQW�

7KH�V\VWHP�HQWHUV�E\�GHIDXOW�WKHFXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�DQG�����������DV�WKH�HQG�GDWH�

�� &KRRVH� �WR�VDYH�\RXU�VHOHFWLRQ�

�� &KRRVH� �8VHU�FRPSDUH�

6WDWXV�'LVSOD\�RQ�WKH�7DE

7KH�VWDWXV�GLVSOD\�RQ�WKH�8VHU�WDE�GLVSOD\V�ZKHWKHU�RU�QRW�XVHUV�DUH�DOUHDG\�DVVLJQHG�WRWKH�DFWLYLW\�JURXS��,I�WKH�GLVSOD\�DSSHDUV�LQ�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVWRQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS��,I�\HOORZ��LW�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQDVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKH�XVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�

7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV

,I�\RX�DOVR�XVH�WKH�DFWLYLW\�JURXS�WR�JHQHUDWH�DXWKRUL]DWLRQ�SURILOHV��WKHQ�\RX�VKRXOGQRWH�WKDW�WKH�JHQHUDWHG�SURILOH�LV�QRW�HQWHUHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�XQWLO�WKH�XVHUPDVWHU�UHFRUGV�KDYH�EHHQ�FRPSDUHG��:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS�WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWH�DV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG�����������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WR�UHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKHDVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�D�WHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKHV\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKH�XVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKHXVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW�3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH�\RX�VKRXOG�VFKHGXOH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKHPRUQLQJ��WR�UXQ�LQ�WKH�EDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUWFRPSDUHV�WKH�XVHU�PDVWHU�UHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQVIRU�WKH�XVHU�PDVWHU�UHFRUGV��7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHUDVVLJQPHQWV�DQG�HQWHUV�DXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�DVVLJQPHQWV�

6 7

8

9

Page 204: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to Users

Authorizations Made Easy9–6

$VVLJQLQJ�$FWLYLW\�*URXSV�WR�8VHUV

<RX�FDQ�DOVR�DVVLJQ�XVHU�UROH�WHPSODWHV�RU�DFWLYLW\�JURXSV�WR�XVHUV�XVLQJ�WUDQVDFWLRQ�68���¥�8VHUV��,I�\RXZRXOG�OLNH�WR�DVVLJQ�VHYHUDO�DFWLYLW\�JURXSV�WR�RQH�XVHU�WKLV�LV�D�PRUH�HIILFLHQW�ZD\�IRU�WKH�DVVLJQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�8VHUV��

�� (QWHU�WKH�QDPH�RI�WKH�XVHU�WR�ZKRP\RX�ZRXOG�OLNH�WR�DVVLJQ�WKH�DFWLYLW\JURXS��RU�XVH�SRVVLEOH�HQWULHV�

�� &KRRVH� �

�� 6HOHFW�DOO�WKH�GHVLUHG�DFWLYLW\�JURXSVE\�HQWHULQJ�WKH�FRUUHFW�QDPHV��RU�XVHSRVVLEOH�HQWULHV�

�� (QWHU�WKH�FRUUHFW�YDOLGLW\�SHULRG�IRUWKH�DVVLJQPHQW�

�� &KRRVH� �WR�VDYH�\RXU�DVVLJQPHQW�

7R�VHH�WKH�FRUUHVSRQGLQJ�SURILOHV��VHOHFWWKH�3URILOHV�WDE�

3

5

6

4

Tip

2

Page 205: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Release 4.6A/B9–7

$OO�FKDQJHV�KDYH�EHHQ�VDYHG�WR�WKHXVHU�PDVWHU�UHFRUG�

5HPHPEHU��DV�ORQJ�DV�DQ�DFWLYLW\�JURXS�LV�DVVLJQHG�WR�DQ�5���XVHU��\RX�FDQ�FKDQJH�WKLVDFWLYLW\�JURXS�DQG�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV�DV�RIWHQ�DV�\RX�ZDQW�ZLWKRXWXSGDWLQJ�WKH�XVHU�PDVWHU�UHFRUG�

,I�DQ�DFWLYLW\�JURXS�LV�FKDQJHG�VR�WKDW�RQH�SURILOH�EHFRPHV�WZR�RU�PRUH��WKHVH�SURILOHVDUH�DXWRPDWLFDOO\�DVVLJQHG�WR�DOO�WKH�XVHUV�WR�ZKRP�WKH�ROG�SURILOH�EHORQJHG��7KH�XVHUPDVWHU�RI�WKLV�XVHU�DXWRPDWLFDOO\�JHWV�XSGDWHG�

$VVLJQLQJ�3'�2EMHFWV�WR�$FWLYLW\�*URXSV

<RX�FDQ�DVVLJQ�3'�REMHFWV�VXFK�DV�SRVLWLRQV��MREV��RU�RUJDQL]DWLRQDO�XQLWV�WR�DFWLYLW\�JURXSV��8VLQJWUDQVDFWLRQ�PFCG��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQ�JHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQVWDE�VKRXOG�EH�JUHHQ��

&UHDWH�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ

7R�DVVLJQ�3'�REMHFWV�WR�DFWLYLW\�JURXSV��\RXU�V\VWHP�PXVW�KDYH�DQ�RUJDQL]DWLRQDO�SODQ��,I\RX�KDYH�QRW�FUHDWHG�RQH�IRU�\RXU�FRPSDQ\�EXW�\RX�ZDQW�WR�WHVW�WKLV�IXQFWLRQDOLW\��VHH&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ�RQ�SDJH��²���

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�DFWLYLW\�JURXS�WR�EH�DVVLJQHG�WR�D�3'�REMHFW�

�� 6HOHFW�2YHUYLHZ��2UJDQL]DWLRQDO�PDQDJHPHQW�DQG�ZRUNIORZ��

�� &KRRVH� �&KDQJH�

Page 206: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Authorizations Made Easy9–8

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�

�� &KRRVH� 2UJDQL]DWLRQDO�0��

�� 7R�FUHDWH�WKH�DVVLJQPHQW , FKRRVH� �

�� 6HOHFW�WKH�REMHFW�WR�EH�DVVLJQHG��IRUH[DPSOH��3RVLWLRQ��

�� &KRRVH� �

��� &KRRVH� �WR�JHW�D�OLVW�RI�SRVLWLRQV�

��� )URP�WKH�OLVW�RI�SRVLWLRQV��VHOHFW�WKHSRVLWLRQ�\RX�ZRXOG�OLNH�WR�DVVLJQ�WRWKH�VHOHFWHG�DFWLYLW\�JURXS��PRUHWKDQ�RQH�SRVLWLRQ�PD\�EH�VHOHFWHG��

��� &KRRVH� �

6

9

8

7

10

11

12

5

Page 207: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning PD Objects to Activity Groups

Release 4.6A/B9–9

��� (QWHU�WKH�WLPH�SHULRG�IRU�WKHUHODWLRQVKLS�

��� &KRRVH� �WR�FUHDWH�WKH�UHODWLRQVKLS�

7KH�UHODWLRQVKLS�LV�HVWDEOLVKHG�

��� 8QGHU�WKH�DFWLYLW\�JURXS�\RX�FDQ�VHHWKH�DVVLJQHG�SRVLWLRQ��8QGHU�WKHSRVLWLRQ�\RX�FDQ�VHH�WKH�DVVLJQHGXVHU�

��� 7R�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VRWKDW�WKH�DSSURSULDWH�SURILOHV�DUHLQVHUWHG�LQWR�WKLV�UHFRUG��FKRRVH� �

<RX�KDYH�WKH�RSWLRQ�WR�VHOHFW�EHWZHHQ�GLIIHUHQW�YLHZV�IRU�WKH�DVVLJQPHQW��)URP�WKHPHQX�EDU��FKRRVH�9LHZ�DQG�WKHQ�VHOHFW�DQ\�RI�WKH�IROORZLQJ�PHQX�RSWLRQV��.H\�$EEUHYLDWLRQ��2EMHFW�SHULRG��5HODWLRQVKLS�SHULRG��8VHUV�RQO\�

7KH�DVVLJQPHQW�LV�VDYHG�DQG�WKHXVHU�PDVWHU�GDWD�XSGDWHG�

13

14

15

16

Page 208: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Authorizations Made Easy9–10

$VVLJQLQJ�$FWLYLW\�*URXSV�WR�3'�2EMHFWV

<RX�FDQ�DVVLJQ�DFWLYLW\�JURXSV�WR�3'�REMHFWV��8VLQJ�WKH�3*��YHULI\�WKDW�WKH�DXWKRUL]DWLRQ�SURILOHV�KDYH�EHHQJHQHUDWHG��WKH�OLJKW�RQ�WKH�$XWKRUL]DWLRQV�WDE�VKRXOG�EH�JUHHQ��

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�ppom_old�DQG�FKRRVH�(QWHU��RU�LQ�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�WKH�+XPDQ�UHVRXUFHV�→�2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�PRGH�→�6LPSOH�PDLQWHQDQFH�→3320B2/'�¥�FKDQJH��

�� (QWHU�WKH�RUJDQL]DWLRQDO�XQLW��RU�XVHSRVVLEOH�HQWULHV�

�� &KRRVH�7��6WUXFWXUH�6HDUFK�WR�VHOHFWWKH�RUJDQL]DWLRQDO�XQLW�XVLQJ�DVWUXFWXUDO�VHDUFK�

�� 6HOHFW�WKH�DSSURSULDWH�URRWRUJDQL]DWLRQDO�XQLW��,Q�WKLV�H[DPSOH�ZH�FKRVH�WKH�URRW�RUJDQL]DWLRQDOXQLW�IURP�WKH�VDPSOH�RUJDQL]DWLRQDOSODQ�

�� &KRRVH� �

5

2

3

4

Page 209: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Release 4.6A/B9–11

�� 7KH�VHOHFWHG�RUJDQL]DWLRQDO�SODQDSSHDUV�LQ�WKH�2UJDQL]DWLRQDO�XQLWILHOG�

�� &KRRVH� �

�� &KRRVH�6WDII�DVVLJQPHQWV�

�� ([SDQG�WKH�XQLWV�DQG�VHOHFW�WKH�RQHWR�ZKLFK�\RX�ZRXOG�OLNH�WR�DVVLJQWKH�DFWLYLW\�JURXS��IRU�H[DPSOH�%X\HU��

��� &KRRVH�7DVN�SURILOH�

6

7

8

9

10

Page 210: Amez 46 all

Chapter 9: Assigning Activity Groups

Assigning Activity Groups to PD Objects

Authorizations Made Easy9–12

��� 2Q�WKH�7DVN�3URILOH�&KDQJH�VFUHHQ�VHOHFW�WKH�SRVLWLRQ�WR�ZKLFK�\RXZRXOG�OLNH�WR�DVVLJQ�DQ�DFWLYLW\JURXS�

��� &KRRVH� �$FWLYLW\�JURXS�

��� (QWHU�WKH�ILUVW�OHWWHU�RI�WKH�DFWLYLW\JURXS�\RX�ZRXOG�OLNH�WR�DVVLJQ�RUOHDYH�WKH�DVWHULVNV�� ��LQ�WKH�ILHOG�WRJHW�D�OLVW�RI�DOO�DFWLYLW\�JURXSV�

��� &KRRVH� �

��� 6HOHFW�WKH�DFWLYLW\�JURXS�\RX�ZLVK�WRDVVLJQ��PXOWLSOH�VHOHFWLRQV�DUHSRVVLEOH��

��� &KRRVH� �

��� 7R�YHULI\�WKH�DVVLJQPHQW��FKRRVH� �

7KH�DVVLJQPHQW�EHWZHHQ�WKH�SRVLWLRQDQG�WKH�DFWLYLW\�JURXS�KDV�EHHQ�VDYHG�

7R�PDNH�FKDQJHV�WR�WKH�DVVLJQHGDFWLYLW\�JURXS��VHOHFW�WKH�DFWLYLW\�JURXSDQG�FKRRVH�*RWR�→�$FWLYLW\�JURXS�

7KH�QH[W�VWHS�LV�WR�XSGDWH�WKH�XVHU�PDVWHU�UHFRUGV�VR�WKDW�WKH�DSSURSULDWH�SURILOHV�DUH�LQVHUWHG�LQWR�WKHXVHU�PDVWHU�UHFRUG�DQG�DVVLJQHG�WR�WKH�RUJDQL]DWLRQDO�XQLWV�

11

12

13

14

15

16

17

Page 211: Amez 46 all

Chapter 9: Assigning Activity Groups

Transferring Users from an IMG Project to an Activity Group

Release 4.6A/B9–13

7UDQVIHUULQJ�8VHUV�IURP�DQ�,0*�3URMHFW�WR�DQ�$FWLYLW\

*URXS

,I�\RX�DVVLJQHG�XVHUV��UHVRXUFHV��WR�DQ�,0*�SURMHFW�LQ�WKH�SURMHFW�PDQDJHPHQW��DQG�GLG�QRWFRS\�WKH�XVHU�DVVLJQPHQW�ZKHQ�FUHDWLQJ�WKH�FXVWRPL]LQJ�DXWKRUL]DWLRQV��\RX�FDQ�WUDQVIHUWKHVH�XVHUV�WR�WKH�DFWLYLW\�JURXS�XVLQJ�WKH�IROORZLQJ�SURFHGXUH�

1RWH�WKDW�\RX�PXVW�FDOO�WKLV�IXQFWLRQ�DJDLQ�HDFK�WLPH�\RX�PDNH�FKDQJHV�LQ�WKH�,0*�SURMHFWDGPLQLVWUDWLRQ�

)RU�WKH�IROORZLQJ�H[DPSOH��ZH�DVVXPH�WKDW�< $Q�,0*�SURMHFW�ZLWK�DW�OHDVW�RQH�DVVLJQHG�XVHU�H[LVWV< <RX�DVVLJQHG�DQ�,0*�SURMHFW�RU�SURMHFW�YLHZ�WR�WKH�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH

VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�< <RX�PDLQWDLQHG�WKH�DXWKRUL]DWLRQV�IRU�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS��VHH�FKDSWHU����WKH

VHFWLRQ�$VVLJQLQJ�,0*�3URMHFWV�RU�3URMHFW�9LHZV�WR�$FWLYLW\�*URXSV�

7R�WUDQVIHU�XVHUV�IURP�DQ�,0*�SURMHFW�WR�DQ�DFWLYLW\�JURXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�WKH�FXVWRPL]LQJ�DFWLYLW\�JURXS�WR�ZKLFK�\RX�ZRXOG�OLNH�WR�WUDQVIHU�WKH�XVHU�IURPDQ�,0*�SURMHFW��IRU�H[DPSOH��40B&86720,=,1*���DQG�FKRRVH� �&KDQJH�

�� &KRRVH�WKH�0HQX�WDE�

�� &KRRVH�8WLOLWLHV�→&XVWRPL]LQJ�DXWK� 4

Page 212: Amez 46 all

Chapter 9: Assigning Activity Groups

Transferring Users from an IMG Project to an Activity Group

Authorizations Made Easy9–14

�� &KRRVH� �8VHU�

�� 6HOHFW�WKH�XVHUV�\RX�ZRXOG�OLNH�WRDVVLJQ�

�� &KRRVH� �

$OO�VHOHFWHG�XVHUV�ZLOO�EH�WUDQVIHUUHGE\�GHIDXOW�

�� &KRRVH� �

�� &KRRVH�WKH�8VHU�WDE�

��� &KRRVH� 8VHU�FRPSDUH�

$V�FXVWRPL]LQJ�LV�SURMHFW�UHODWHG�DQGUXQV�IRU�D�OLPLWHG�SHULRG��\RX�VKRXOGPDLQWDLQ�WKH�HQG�GDWH�IRU�WKH�XVHU�LQ�WKHXVHU�DVVLJQPHQW��7LPH�UHVWULFWLRQVSUHYHQW�XVHUV�ZKR�DUH�DVVLJQHG�WR�WKHDFWLYLW\�JURXS�IURP�KDYLQJDXWKRUL]DWLRQ�IRU�WKH�DVVLJQHG�SURMHFWVRU�SURMHFW�YLHZV�DIWHU�WKH�FXVWRPL]LQJSURMHFW�LV�FRPSOHWH�

��� &KRRVH� �&RPSOHWH�FRPSDUH�

5

6

7

8

9

10

11

Page 213: Amez 46 all

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–15

7KH�XVHUV�IURP�WKH�FXVWRPL]LQJSURMHFW�DUH�WUDQVIHUUHG�WR�WKHDFWLYLW\�JURXS�

8SGDWLQJ�3URILOHV�LQ�WKH�8VHU�0DVWHU�5HFRUGV

7KLV�VHFWLRQ�GHVFULEHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�UHSRUW�3)&*B7,0(�'(3(1'(1&<�WRXSGDWH�XVHU�PDVWHU�UHFRUGV��5HPHPEHU�WKDW�DFWLYLW\�JURXSV��WKHLU�DVVLJQPHQW�WR�XVHU�PDVWHUUHFRUGV��RU�3'�REMHFWV�FDQ�EH�GHOLPLWHG�

7R�HQVXUH�WKDW�RQO\�YDOLG�DXWKRUL]DWLRQ�SURILOHV�UHPDLQ�LQ�WKH�XVHU�PDVWHU�UHFRUG�HDFK�GD\�FRQGXFW�GDLO\�SURILOH�FRPSDULVRQV��)RU�WKH�FKDQJHV�LQ�WKH�XVHU�PDVWHU�UHFRUG�WR�EH�HIIHFWLYH�WKLV�FRPSDULVRQ�PXVW�WDNH�SODFH�EHIRUH�WKH�XVHU�ORJV�RQ�

7R�FRQGXFW�D�FRPSDULVRQ��\RX�FDQ�HLWKHU�< &RPSDUH�WKH�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*

< 8VH�PDVV�FRPSDUH�ZLWKLQ�WKH�3*��(QYLURQPHQW�→�0DVV�FRPSDUH�

< 5XQ�UHSRUW�3)*&B7,0(B'(3(1'(1&<�LQ�D�EDFNJURXQG�MRE�EHIRUH�WKH�VWDUW�RI�HDFKGD\

7KHVH�RSWLRQV�DUH�GLVFXVVHG�LQ�WKH�IROORZLQJ�WKUHH�VHFWLRQV�

&RPSDULQJ�8VHU�0DVWHU�'DWD�IURP�:LWKLQ�7UDQVDFWLRQ�3)&*

$�FRPSDULVRQ�RI�XVHU�PDVWHU�GDWD�GLUHFWO\�IURP�ZLWKLQ�WKH�3*�LPPHGLDWHO\�XSGDWHV�DVSHFLILF�XVHU�PDVWHU�DIWHU�FUHDWLQJ�DQ�DVVLJQPHQW�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�DQ�DFWLYLW\�JURXS�IRU�ZKLFK�\RX�ZRXOG�OLNH�WR�XSGDWH�WKH�XVHU�PDVWHU�GDWD�DQGFKRRVH� �&KDQJH�

Page 214: Amez 46 all

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–16

�� 2Q�WKH�&KDQJH�$FWLYLW\�*URXSVVFUHHQ��FKRRVH�WKH�8VHU�WDE�

�� ,Q�WKH�8VHU�,'�FROXPQ��HQWHU�D�XVHU,'�RU�VHOHFW�LW�IURP�D�OLVW�XVLQJSRVVLEOH�HQWULHV�

�� (QWHU�D�YDOLGLW\�SHULRG�

�� &KRRVH� �8VHU�FRPSDUH�

6WDWXV�'LVSOD\�RQ�WKH�8VHU�7DE7KH�VWDWXV�GLVSOD\�RQ�WKH�WDE�WHOOV�LI�D�XVHU�LV�DOUHDG\�DVVLJQHG�WR�DQ�DFWLYLW\�JURXS��,I�WKHLQGLFDWRU�LV�UHG��QR�XVHUV�DUH�DVVLJQHG��,I�JUHHQ��DW�OHDVW�RQH�XVHU�LV�DVVLJQHG�WR�WKH�JURXS�,I�\HOORZ��WKLV�PHDQV�WKDW�DOWKRXJK�XVHUV�KDYH�EHHQ�DVVLJQHG�WR�WKH�DFWLYLW\�JURXS��WKHXVHU�PDVWHU�UHFRUG�FRPSDULVRQ�LV�QRW�FXUUHQW�

�� &KRRVH� �&RPSOHWH�FRPSDUH�

7KH�H[SHUW�PRGH�GLVSOD\V�H[DFWO\�ZKLFK�SURILOHV�ZHUH�LQVHUWHG�DQG�UHPRYHG�IRU�HDFKXVHU��$V�\RX�KDYH�WKH�RSWLRQ�WR�UHVWULFW�WKH�VHOHFWLRQ�RI�WKH�SURILOHV�IRU�SURFHVVLQJ��WKHVWDWXV�RI�8VHU�FRPSDUH�LV�QRW�VZLWFKHG�WR�JUHHQ��7KLV�VWDWXV�LV�RQO\�WKH�FDVH�LI�WKHFRPSDULVRQ�LV�H[HFXWHG�E\�FKRRVLQJ� �&RPSOHWH�FRPSDUH��,I�\RX�FKRRVH� �([SHUW�PRGH�IRUFRPSDUH��WKH�VWDWXV�LV�QRW�VHW�WR�JUHHQ�

�� ,I�\RX�KDYH�QRW�VDYHG�WKH�DFWLYLW\JURXS�\HW��FKRRVH�<HV�

45

6

7Tip

8

3

Page 215: Amez 46 all

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–17

�� 7KH�JUHHQ�OLJKW�RQ�8VHU�FRPSDUHLQGLFDWHV�WKDW�WKH�FRPSDULVRQ�LVFRPSOHWH�

1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�

9

Page 216: Amez 46 all

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–18

3URILOH�&RPSDULVRQV�8VLQJ�0DVV�&RPSDUH��3)8'�

)RU�SURILOH�FRPSDULVRQ�ZLWKLQ�WKH�3*��\RX�FDQ�XVH�WKH�PDVV�FRPSDUH�IXQFWLRQ�UHJXODUO\�WR�FKHFN�IRUEDFNJURXQG�MRE�HUURUV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��

�� &KRRVH�WKH�DFWLYLW\�JURXSV�\RXZRXOG�OLNH�WR�UHFRQFLOH�

�� 6HOHFW�RQH�RI�WKH�IROORZLQJ�DFWLRQV�< 6FKHGXOH�RU�FKHFN�MRE�IRU�IXOO

UHFRQFLOLDWLRQ�VHH�WKH�QH[W�VHFWLRQ�

< 0DQXDO�VHOHFWLRQ�RI�SURILOHV�IRU�VHOHFWHG�SURILOHV�

< &RPSOHWH�FRPSDUH�WR�DGMXVW�XVHU�PDVWHU�UHFRUGV�IRUDOO�DFWLYLW\�JURXSV�

�� 8QGHU�2SWLRQV��VHOHFW�WKH�GHVLUHGVHWWLQJV��ZH�VHOHFWHG�DOO��

�� ,I�\RX�ZRXOG�OLNH�WR�UHFRQFLOH�ZLWKRUJDQL]DWLRQDO�PDQDJHPHQW��VHOHFW5HFRQFLOH�ZLWK�+5�2UJDQL]DWLRQDO0DQDJHPHQW�

�� &KRRVH� �

7KH�IROORZLQJ�ZLQGRZ�RQO\�DSSHDUV�LI�\RX�VHOHFW�WKH�RSWLRQ�0DQXDO�VHOHFWLRQ�RI�SURILOHV�LQVWHS����EHFDXVH�WKH�VWDWXV�IRU�WKH�FRPSOHWH�FRPSDUH�KDV�QRW�EHHQ�VHW��,I�\RX�OHDYH�WKHGHIDXOW�YDOXH��ZKLFK�LV�&RPSOHWH�FRPSDUH��\RX�ZLOO�QRW�JHW�WKH�IROORZLQJ�ZLQGRZ��EHFDXVHWKH�VWDWXV�ZLOO�DOUHDG\�EH�VHW�FRUUHFWO\�IRU�WKH�3*�

�� &KRRVH� �

6

2

3

4

5

7

Page 217: Amez 46 all

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Release 4.6A/B9–19

�� &KRRVH� �8VHU�PDVWHU�UHFRUG�

7KH�XVHU�PDVWHU�UHFRUGV�KDYH�EHHQVXFFHVVIXOO\�XSGDWHG�

1RWH�WKDW�FKDQJHV�DUH�ILUVW�DFWLYH�ZLWK�WKH�QH[W�XVHU�ORJRQ�

5HSRUW�3)&*B7,0(B'(3(1'(1&<�WR�6FKHGXOH�7LPH�'HSHQGHQF\

7LPH�'HSHQGHQF\�RI�8VHU�$VVLJQPHQW�DQG�$XWKRUL]DWLRQV

:KHQ�\RX�VSHFLI\�WKH�XVHUV�IRU�WKH�DFWLYLW\�JURXS��WKH�V\VWHP�GHIDXOWV�WR�WKH�FXUUHQW�GDWHDV�WKH�VWDUW�GDWH�RI�WKH�XVHU�DVVLJQPHQW��DQG������������DV�WKH�HQG�GDWH��,I�\RX�ZDQW�WRUHVWULFW�WKH�VWDUW�DQG�HQG�GDWHV�RI�WKH�DVVLJQPHQW��IRU�H[DPSOH�LI�\RX�ZDQW�WR�GHILQH�DWHPSRUDU\�UHSODFHPHQW�IRU�D�XVHU��WKH�V\VWHP�DXWRPDWLFDOO\�PDNHV�WKH�FKDQJHV�WR�WKHXVHU��7KLV�DXWRPDWLF�DGMXVWPHQW�RI�WKH�XVHU·V�DXWKRUL]DWLRQV�LV�H[HFXWHG�E\�UHSRUW3)&*B7,0(B'(3(1'(1&<��,Q�WKLV�FDVH��\RX�VKRXOG�VFKHGXOH�UHSRUW3)&*B7,0(B'(3(1'(1&<�GDLO\��IRU�H[DPSOH�HDUO\�LQ�WKH�PRUQLQJ��WR�UXQ�LQ�WKHEDFNJURXQG��LQ�WUDQVDFWLRQ�6$����IRU�H[DPSOH���7KLV�UHSRUW�FRPSDUHV�WKH�XVHU�PDVWHUUHFRUGV�IRU�DOO�DFWLYLW\�JURXSV�DQG�XSGDWHV�WKH�DXWKRUL]DWLRQV�IRU�WKH�XVHU�PDVWHU�UHFRUGV�7KH�V\VWHP�UHPRYHV�DXWKRUL]DWLRQ�SURILOHV�IURP�LQYDOLG�XVHU�DVVLJQPHQWV�DQG�HQWHUVDXWKRUL]DWLRQ�SURILOHV�IURP�YDOLG�XVHU�DVVLJQPHQWV�

,I�WKH�UHSRUW�3)&*B7,0(B'(3(1'(1&<�UXQV�HYHU\�QLJKW��WKH�DXWKRUL]DWLRQ�SURILOHV�LQ�WKHXVHU�PDVWHU�ZLOO�EH�XSGDWHG�HDFK�PRUQLQJ��7KH�EHVW�SURFHGXUH�LV�WR�VFKHGXOH�WKLV�UHSRUW�LQ�DSHULRGLF�EDFNJURXQG�MRE�

8

Page 218: Amez 46 all

Chapter 9: Assigning Activity Groups

Updating Profiles in the User Master Records

Authorizations Made Easy9–20

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PFUD�DQG�FKRRVH�(QWHU��RU�DFFHVV�WKH�3*�DQG�FKRRVH(QYLURQPHQW�→�0DVV�FRPSDUH��

�� ,Q�WKH�$FWLYLW\�JURXS�ILHOG��VHOHFW�WKHGHVLUHG�DFWLYLW\�JURXS�

�� 6HOHFW�6FKHGXOH�RU�FKHFN�MRE�IRU�IXOOUHFRQFLOLDWLRQ�

�� &KRRVH� �

�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�RUOHDYH�WKH�GHIDXOW�

�� 8QGHU�6WDUW�GDWH��VHOHFW�WKH�GDWH�DQGWLPH�\RX�ZDQW�WKH�UHSRUW�WR�VWDUWDXWRPDWLFDOO\�

�� &KRRVH� �([HFXWH�

4

3

2

5

6

7

Page 219: Amez 46 all

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–21

�� &KRRVH .

�� (QWHU�D�MRE�QDPH�RU�OHDYH�WKHGHIDXOW�

��� (QWHU�D�MRE�FODVV��SULRULW\��

��� &KRRVH� �

7KH�MRE�ZL]DUG�KHOSV�\RX�WR�GHILQH�D�MREXVLQJ�VWHS�E\�VWHS�GLDORJ�VFUHHQV�WRJXLGH�\RX�WKURXJK�WKH�SURFHVV��2Q�WKHODVW�VFUHHQ��\RX�VHH�D�VXPPDU\�RI�ZKDW\RX�KDYH�GHILQHG�EHIRUH�\RX�VDYH�

&UHDWLQJ�D�6DPSOH�2UJDQL]DWLRQDO�3ODQ

<RX�KDYH�WZR�RSWLRQV�WR�FUHDWH�DQ�RUJDQL]DWLRQDO�SODQ�< 7KH�FODVVLF�5���WUDQVDFWLRQ��PPOC_OLD�< 7KH�(QMR\�WUDQVDFWLRQ��PPOCE�

%RWK�FDQ�EH�IRXQG�LQ�WKH�2UJDQL]DWLRQDO�PDQDJHPHQW�XQGHU�+XPDQ�5HVRXUFHV�LQ�WKH�6$3VWDQGDUG�PHQX�

,Q�WKH�IROORZLQJ�VHFWLRQ��ZH�GHVFULEH�WKH�VWHSV�WR�FUHDWH�D�VDPSOH�RUJDQL]DWLRQDO�SODQ�IRUWHVWLQJ��7KLV�SODQ�LV�QRW�FRPSOHWH��EXW�VKRZV�WKH�UHTXLUHG�HOHPHQWV�

8

910

11

Tip

Page 220: Amez 46 all

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–22

8VLQJ�WKH�&ODVVLF�5���7UDQVDFWLRQ

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOC_OLD�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�([SHUW�0RGH�→�6LPSOH�0DLQWHQDQFH�→�332&B2/'�&UHDWH��

A�URRW�RUJDQL]DWLRQDO�XQLW��WKHKLJKHVW�OHYHO�LQ�DQ�RUJDQL]DWLRQDOVWUXFWXUH��QHHGV�WR�EH�FUHDWHG��7KHQEXLOG�XS�WKH�RUJDQL]DWLRQDO�VWUXFWXUHIURP�WKH�URRW�RUJDQL]DWLRQDO�XQLW�

�� (QWHU�WKH�VKRUW�DQG�ORQJ�QDPH�IRUWKH�URRW�RUJDQL]DWLRQDO�XQLW�

�� &KRRVH� �

�� ,Q�WKH�5HTXHVW�ILHOG��XVH�SRVVLEOHHQWULHV�WR�VHOHFW�D�FKDQJH�UHTXHVW��,IQRQH�H[LVWV�\HW��XVH� �WR�FUHDWH�RQH�

�� &KRRVH� �

�,Q�WKH�IROORZLQJ�VWHSV��ZH�ZLOO�QRWVKRZ�WKLV�GLDORJ�ER[�DQ\PRUH��,I�LWGRHV�DSSHDU��SURFHHG�LQ�WKH�VDPHZD\�DV�KHUH��

�� &KRRVH� �WR�FUHDWH�WKHRUJDQL]DWLRQDO�XQLWV�WKDW�IROORZ�\RXUURRW�XQLW�

2

3

4

5

6

Page 221: Amez 46 all

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–23

�� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWVXQGHU�\RXU�URRW�XQLW�

�� &KRRVH� �

�� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW�DQGFKRRVH� �WR�HQWHU�WKH�QH[W�OHYHO�

��� (QWHU�WKH�QH[W�RUJDQL]DWLRQDO�XQLWXQGHU�WKH�VHOHFWHG�OHYHO��IRUH[DPSOH��6XEVLGLDU\�$�*HUPDQ\��

��� &KRRVH� �

��� &KRRVH�6WDII�DVVLJQPHQW�

7

8

9

10

11

12

Page 222: Amez 46 all

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–24

7KH�6WDII�$VVLJQPHQWV���&KDQJHZLQGRZ�DOORZV�\RX�WR�LGHQWLI\�WKHIXQGDPHQWDO�VWDIILQJ�GHWDLOVUHTXLUHG�IRU�DQ�RUJDQL]DWLRQDO�SODQ�7KLV�VWHS�LV�DFKLHYHG�E\�FUHDWLQJMREV��DQG�SRVLWLRQV��DQG�E\�DVVLJQLQJKROGHUV�WR�SRVLWLRQV�

��� &KRRVH�(GLW�→�&UHDWH�→�-REV�

-REV�DUH�RQH�RI�WKH�REMHFWV�WKDW�PDNH�XS�DQ�RUJDQL]DWLRQDO�SODQ��$�MRE�LV�D�JHQHUDOFODVVLILFDWLRQ��VXFK�DV�DGPLQLVWUDWLYH�DVVLVWDQW��FRPSXWHU�SURJUDPPHU��LQVWUXFWRU��HWF�<RX�PD\�FUHDWH�DV�PDQ\�MREV�DV�\RX�ZDQW��2QFH�D�MRE�LV�FUHDWHG��GHVFULEH�LWV�DWWULEXWHV�E\GHILQLQJ�LQIRW\SHV��$Q�HPSOR\HH�DXWRPDWLFDOO\�LQKHULWV�WKH�LQIRW\SH�VHWWLQJV��DWWULEXWHV�DQG�SURSHUWLHV�RI�WKH�MRE��SRVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV��

��� (QWHU�WKH�MRE�LQIRUPDWLRQ�

��� &KRRVH� �

��� 6HOHFW�DQ�RUJDQL]DWLRQDO�XQLW��WKHQFKRRVH� �3RVLWLRQV�

13

14

15

16

Page 223: Amez 46 all

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–25

��� &KRRVH�SRVVLEOH�HQWULHV�IRU�$EEU�

3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�DVVLJQPHQWV�ZLWKLQ�D�FRPSDQ\��IRU�H[DPSOH�

< 6DOHV�PDQDJHU< 0DUNHWLQJ�DVVLVWDQW< -XQLRU�PDQXIDFWXULQJ�HQJLQHHU%\�FUHDWLQJ�SRVLWLRQV�DQG�UHODWLRQVKLSV�DPRQJ�WKH�GLIIHUHQW�SRVLWLRQV��\RX�FDQ�LGHQWLI\WKH�UHSRUWLQJ�VWUXFWXUH�DW�\RXU�ILUP��3RVLWLRQV�DUH�XVXDOO\�EDVHG�RQ�MREV�

��� 6HOHFW�WKH�$EEUHYLDWLRQ�DQG�1DPH�WDE�

��� &KRRVH� �

��� 6HOHFW�WKH�DSSURSULDWH�MRE�

��� &KRRVH� �

��� 8QGHU�3RVLWLRQ� HQWHU�D�GHVFULSWLRQ�RIWKH�SRVLWLRQ�LQ�WKH�DSSURSULDWHILHOGV�

��� &KRRVH� �

17

18

19

21

20

22

23

Page 224: Amez 46 all

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Authorizations Made Easy9–26

5HSHDW�VWHSV���²���WR�FUHDWHDGGLWLRQDO�SRVLWLRQV�

��� 6HOHFW�D�SRVLWLRQ�DQG�FKRRVH�$VVLJQKROGHU�

$VVLJQ�KROGHUV�ZKHQ�\RX�ZDQW�WRLGHQWLI\�ZKR�RFFXSLHV��RU�ILOOV��DVSHFLILF�SRVLWLRQ�

,Q�6LPSOH�0DLQWHQDQFH��DVVLJQ�HLWKHUDQ�HPSOR\HH�RU�5���XVHU�WR�DSRVLWLRQ��:RUNIORZ�XVHUV�DVVLJQ�5��XVHUV�WR�SRVLWLRQV��3HUVRQQHODGPLQLVWUDWLRQ�XVHUV�DVVLJQHPSOR\HHV�WR�SRVLWLRQV�

��� &KRRVH�SRVVLEOH�HQWULHV�WR�GLVSOD\�WKHOLVW�RI�5���XVHUV�DOUHDG\�LQ�\RXUV\VWHP�

��� 6HOHFW�WKH�FRUUHFW�XVHU�RI�WKH�SRVLWLRQIURP�WKH�OLVW�

��� &KRRVH� �

��� (QWHU�WKH�YDOLGLW\�SHULRG�RI�WKHDVVLJQPHQW�

��� &KRRVH� �

24

25

27

26

28

29

Page 225: Amez 46 all

Chapter 9: Assigning Activity Groups

Creating a Sample Organizational Plan

Release 4.6A/B9–27

5HSHDW�VWHSV���²���WR�DVVLJQ�DGGLWLRQDOKROGHUV�WR�SRVLWLRQV�

7KH�RUJDQL]DWLRQDO�SODQ�LV�QRZ�FUHDWHG�7R�JHW�D�JUDSKLFDO�RYHUYLHZ��FRQWLQXHZLWK�WKH�IROORZLQJ�VWHSV�

��� 6HOHFW�WKH�URRW�RUJDQL]DWLRQDO�XQLW�

��� &KRRVH� �WR�GLVSOD\�WKH�6WUXFWXUDO*UDSKLFV�

8VLQJ�WKH�(QMR\�7UDQVDFWLRQ

7KH�SURFHGXUH�WR�FUHDWH�WKH�RUJDQL]DWLRQDO�SODQ�XVLQJ�WKH�(QMR\�WUDQVDFWLRQ�LV�EDVLFDOO\�WKH�VDPH�DV�WKHFRPPRQ�5���VW\OH��7KH�RQO\�GLIIHUHUHQFH�LV�WKDW�DOO�WKH�SURFHGXUHV�DUH�GLVSOD\HG�DQG�SHUIRUPHG�RQ�RQHVFUHHQ�

$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�(QMR\�IXQFWLRQDOLW\�ZDV�VWLOO�XQGHU�GHYHORSPHQW��7KHUHIRUH��ZH�RQO\SURYLGH�WKH�VFUHHQ�EHORZ�ZKLFK�\RX�FDQ�UHDFK�WKH�IROORZLQJ�ZD\�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�PPOCE�DQG�FKRRVH�(QWHU��RU�FKRRVH�+XPDQ�5HVRXUFHV�→2UJDQL]DWLRQDO�PDQDJHPHQW�→�2UJDQL]DWLRQDO�SODQ�→�2UJDQL]DWLRQ�DQG�6WDIILQJ�→�&UHDWH�.

+HUH�\RX�HQWHU�WKH�QHZ�2UJDQL]DWLRQDOXQLW�DQG�DOO�WKH�RWKHU�GDWD��DV�ZHGHVFULEH�XVLQJ�WKH�FRPPRQ�5���VW\OH�

31

30

Page 226: Amez 46 all

Chapter 9: Assigning Activity Groups

Structural Authorizations

Authorizations Made Easy9–28

6WUXFWXUDO�$XWKRUL]DWLRQV

6WUXFWXUDO�DXWKRUL]DWLRQV�DUH�QRW�FRYHUHG�LQ�WKLV�JXLGH��+RZHYHU��LI�\RX�QHHG�LQIRUPDWLRQRQ�VWUXFWXUDO�DXWKRUL]DWLRQV��UHIHU�WR�WKH�$XWKRUL]DWLRQV�0DGH�(DV\�JXLGHERRN��5HOHDVH����$�%��FKDSWHU����6WUXFWXUDO�$XWKRUL]DWLRQV��7KLV�FKDSWHU�FDQ�DOVR�EH�GRZQORDGHG�IURP�WKH6LPSOLILFDWLRQ�*URXSV�ZHE�SDJH�DW�KWWS���ZZZ�VDSODEV�FRP�DXWK�

Page 227: Amez 46 all

10–1

&KDSWHU���� 6HWWLQJ�8S�WKH�$/(

(QYLURQPHQW�IRU�&HQWUDO�8VHU

$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................10–2

Setting Up an ALE User........................................................................................10–3

Naming Logical Systems .....................................................................................10–5

Assigning Logical Systems to Clients................................................................10–8

Defining Target System for RFC Calls ..............................................................10–10

Distribution Model ..............................................................................................10–13

Generating Partner Profiles in the Central System .........................................10–16

Distributing Model View .....................................................................................10–17

Generating Partner Profiles in the Client System............................................10–18

����

Page 228: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Overview

Authorizations Made Easy10–2

2YHUYLHZ

&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QHZ�WR�5HOHDVH������,Q�HDUOLHU�UHOHDVHV�XVHU�PDVWHU�UHFRUGVZHUH�FUHDWHG�LQ�HDFK�FOLHQW�DQG�HDFK�V\VWHP�WKH�XVHU�ORJJHG�RQ�WR��IRU�H[DPSOH��'(9��4$6�35'��HWF����(DFK�XVHU�PDVWHU�UHFRUG�IRU�WKH�VDPH�XVHU�ZDV�LQGHSHQGHQW�RI�RWKHU�XVHU�PDVWHUUHFRUGV��,I�D�XVHU�ZDV�FKDQJHG�LQ�RQH�FOLHQW��WKHQ�WKH�VDPH�XVHU�KDG�WR�EH�FKDQJHG�LQ�DOORWKHU�FOLHQWV�DQG�V\VWHPV�PDQXDOO\��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�UHGXFHV�WKH�PDLQWHQDQFHDQG�V\QFKURQL]DWLRQ�LVVXHV�IDFHG�E\�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�

7KH�FRUH�FRQFHSW�EHKLQG�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�WR�GHVLJQDWH�RQH�FOLHQW�LQ�RQHV\VWHP�DV�WKH�UHSRVLWRU\�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV��7KLV�FOLHQW�V\VWHP�LV�GHVLJQDWHG�DVWKH�VHQGHU��$OO�RWKHU�FOLHQWV�LQ�RWKHU�V\VWHPV�DUH�GHVLJQDWHG�DV�UHFHLYHUV��$SSOLFDWLRQ�/LQN(QDEOLQJ��$/(��LV�5��·V�WHFKQRORJ\�WR�HQDEOH�GDWD�H[FKDQJH�EHWZHHQ�GLIIHUHQW�V\VWHPV�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�XVHU�GDWD�EHWZHHQ�FHQWUDO�DQG�FOLHQW�V\VWHPV�

7KLV�FKDSWHU�GLVFXVVHV�KRZ�WR�VHW�XS�$/(�IRU�XVH�ZLWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��7KHQH[W�FKDSWHU�GLVFXVVHV�WKH�VWHSV�LQYROYHG�LQ�XVLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

6HWWLQJ�XS�$/(�PXVW�EH�GRQH�WRJHWKHU�ZLWK�D�V\VWHP�DGPLQLVWUDWRU�RU�WKH�SHUVRQ�ZKR�ILUVWVHW�XS�WKH�FOLHQWV��,Q�VHWWLQJ�XS�$/(��WKH�HQWLUH�FOLHQW·V�GHILQLWLRQ�ZLOO�EH�FKDQJHG�DQG�WKLVPXVW�QRW�EH�GRQH�ZLWKRXW�WKH�FRQVHQW�RI�WKH�V\VWHP�DGPLQLVWUDWRU�

'XULQJ�WKH�LQVWDOODWLRQ�RI�DQ�$/(�HQYLURQPHQW��\RX�PXVW�IROORZ�HYHU\�VWHS�IRU�DOO�FOLHQW�V\VWHPV�WR�EH�LQWHJUDWHG�LQWR�RQH�XVHU�DFFRXQW��7KLV�XVHU�DFFRXQW�QHHGV�WR�KDYH�V\VWHPDGPLQLVWUDWRU�ULJKWV��(DFK�FOLHQW�V\VWHP�FRPELQDWLRQ�LV�UHFRJQL]HG�E\�$/(�DV�D�ORJLFDOV\VWHP�

6HWWLQJ�XS�DQ�$/(�HQYLURQPHQW�DOORZV�\RX�WR�GLVWULEXWH�GDWD�EHWZHHQ�ORJLFDO�V\VWHPV�DQGNHHS�WKLV�GDWD�FRQVLVWHQW��7KH�V\VWHPV�RI�DQ�$/(�HQYLURQPHQW�DUH�RQO\�ORRVHO\�OLQNHG��7KHGDWD�LV�EHLQJ�H[FKDQJHG�DV\QFKURQRXVO\��ZKLFK�LQVXUHV�WKDW�WKH�GDWD�ZLOO�EH�UHFHLYHG�E\�WKHUHFLSLHQW�V\VWHP�HYHQ�LI�WKH�UHFHLYLQJ�V\VWHP�LV�WXUQHG�RII�DW�WKH�WLPH�RI�VHQGLQJ�6\QFKURQRXV�FRQQHFWLRQV�DUH�RQO\�EHLQJ�XVHG�WR�UHDG�GDWD�E\�$/(�

Page 229: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Setting Up an ALE User

Release 4.6A/B10–3

7KH�JUDSKLF�RQ�WKH�ULJKWVKRZV�DQ�$/(�HQYLURQPHQWIRU�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

2QH�V\VWHP�QHHGV�WR�EHGHILQHG�DV�WKH�FHQWUDOV\VWHP��7KH�OLQNV�UXQ�IURPWKH�FHQWUDO�V\VWHP�WR�WKHFOLHQW�V\VWHPV�ZKHUH�WKHFHQWUDO�V\VWHP�VHUYHV�DV�WKHKXE�

7KH�FOLHQW�V\VWHPV�DUH�QRWGLUHFWO\�OLQNHG�WR�HDFKRWKHU�

6HWWLQJ�8S�DQ�$/(�8VHU

)RU�LQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQ�DOO�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�\RX�QHHG�D�XVHU�DFFRXQW��8VHG�IRULQWHUQDO�FRPPXQLFDWLRQ��WKLV�XVHU�DFFRXQW�LV�QRW�XVHG�LQ�GLDORJ�PRGH��7KH�XVHU�QHHGV�WR�KDYH�WKH�VDPHXVHU�QDPH�DQG�SDVVZRUG�IRU�DOO�WKH�V\VWHPV�LQ�DQ�$/(�HQYLURQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQGFKRRVH�(QWHU�

�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHLQWHUQDO�XVHU�

�� 7R�FUHDWH�WKH�XVHU��FKRRVH� �2

3

Page 230: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Setting Up an ALE User

Authorizations Made Easy10–4

�� 2Q�WKH�$GGUHVV�WDE��VSHFLI\�DW�OHDVWWKH�ODVW�QDPH�RI�WKH�XVHU�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

�� 8QGHU�3DVVZRUG��HQWHU�DQ�LQLWLDOSDVVZRUG�

�� 5HSHDW�WKH�LQLWLDO�SDVVZRUG�

�� 8QGHU�8VHU�W\SH��VHOHFW�&3,&�

:H�UHFRPPHQG�\RX�XVH�WKH�XVHU�W\SH&3,&��VLQFH�VXFK�D�V\VWHP�XVHU�FDQQRWORJ�RQ�WR�5���XVLQJ�D�GLDORJ�ZLQGRZ�7KLV�XVHU�FDQ�RQO\�EH�XVHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�EHWZHHQV\VWHPV��+RZHYHU��LW�LV�SRVVLEOH�WR�XVHD�GLDORJ�XVHU�IRU�WKLV�FRPPXQLFDWLRQ�

�� &KRRVH�3URILOHV�WDE�

4

5

67

8

9

Page 231: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Release 4.6A/B10–5

��� ,Q�WKH�3URIO��FROXPQ��HQWHU�WKH�SURILOHSAP_ALL�

��� 7R�VDYH�WKH�XVHU��FKRRVH� �

��� 5HSHDW�VWHSV��²���IRU�DOO�FOLHQWV�\RXZDQW�WR�VHW�XS�IRU�WKH�$/(HQYLURQPHQW�

1DPLQJ�/RJLFDO�6\VWHPV

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SALE�DQG�FKRRVH�(QWHU�

�� ([SDQG�WKH�QRGHV�IRU�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV�

�� &KRRVH� �QH[W�WR�WKH�,0*�DFWLYLW\1DPH�/RJLFDO�6\VWHP�

�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �

4

10

11

2

3

Page 232: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Authorizations Made Easy10–6

7KH�GDWD�IRU�WKH�ORJLFDO�V\VWHPV�LV�VWRUHG�LQ�D�FOLHQW�LQGHSHQGHQW�WDEOH��7KHUHIRUH�LW�LVYDOLG�IRU�DOO�FOLHQWV�LQ�DQ�5���6\VWHP��,I�\RXU�$/(�HQYLURQPHQW�FRQVLVWV�RQO\�RI�ORJLFDOV\VWHPV�LQ�RQH�5���6\VWHP��\RX�QHHG�WR�GHILQH�WKH�ORJLFDO�V\VWHPV�RQO\�RQFH��,I�\RX�DUHXVLQJ�PXOWLSOH�5���6\VWHPV��DOO�ORJLFDO�V\VWHPV�QHHG�WR�EH�VHW�XS�LQ�HYHU\�LQVWDQFH�

$�WDEOH�DSSHDUV�ZLWK�DOO�GHILQHGORJLFDO�V\VWHPV�IRU�WKH�GDWDGLVWULEXWLRQ�RI�\RXU�FHQWUDO�5��V\VWHP�

�� 7R�DGG�QHZ�ORJLFDO�V\VWHPV�LQWR�WKHOLVW��FKRRVH�1HZ�HQWULHV�

�� ,Q�WKH�FROXPQ�/RJ�6\VWHP��HQWHU�DVKRUW�QDPH�LQ�FDSLWDO�OHWWHUV�WKDW\RX�ZRXOG�OLNH�WKH�V\VWHP�WR�EHLGHQWLILHG�DV�LQ�WKH�$/(HQYLURQPHQW��(QWHU�D�FOHDUGHVFULSWLRQ�LQ�WKH�1DPH�FROXPQ�IRUWKH�ORJLFDO�V\VWHP�

�� $IWHU�HQWHULQJ�DOO�WKH�ORJLFDOV\VWHPV��FKRRVH� �WR�VDYH�\RXUGDWD�

5HPHPEHU�WR�HQWHU��LI�DYDLODEOH��DOOORJLFDO�V\VWHPV�WKDW�DUH�QRW�SDUW�RI�WKHDFWXDO�5���6\VWHPV��$OO�ORJLFDO�V\VWHPVQHHG�WR�EH�GHILQHG�LQ�HYHU\�5���6\VWHPRI�WKH�$/(�HQYLURQPHQW�

5

7

6

Page 233: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Naming Logical Systems

Release 4.6A/B10–7

:H�UHFRPPHQG�\RX�QDPH�WKH�V\VWHP�XVLQJ�D�FRPELQDWLRQ�RI�WKH�V\VWHP�QDPH�DQG�FOLHQWQXPEHU��IRU�H[DPSOH��IRU�V\VWHP�%,=�ZLWK�WKH�FOLHQW�����WKH�QDPH�%,=&/17�����

(QWHU�\RXU�WUDQVSRUW�UHTXHVW�IRU�WKHDERYH�HQWHUHG�GDWD�

�� ,I�\RX�DOUHDG\�KDYH�D�WUDQVSRUWUHTXHVW�LQ�WKLV�V\VWHP��FKRRVH�2ZQUHTXHVW�DQG�VHOHFW�LW�IURP�WKH�OLVW�DQG&RQWLQXH�ZLWK�VWHS����

�� ,I�\RX�GR�QRW�KDYH�D�WUDQVSRUWUHTXHVW�\HW�RU�ZRXOG�OLNH�WR�FUHDWH�DQHZ�RQH��FKRRVH� �

D� ,Q�6KRUW�GHVFULSWLRQ��HQWHU�D�VKRUWGHVFULSWLRQ�IRU�WKH�WUDQVSRUWUHTXHVW�

E� &KRRVH� �

7KH�V\VWHP�VXJJHVWV�D�FRXQWLQJQXPEHU�IRU�WKH�UHTXHVW�

��� &KRRVH� �WR�HQWHU�WKH�WUDQVSRUWUHTXHVW�

,I�\RXU�ORJLFDO�V\VWHP�LV�H[FOXVLYHO\�LQ�RQH�5���6\VWHP��WKH�QDPLQJ�SURFHVV�LV�QRZFRPSOHWH�

,I�\RXU�ORJLFDO�V\VWHPV�DUH�LQ�GLIIHUHQW�5���6\VWHPV��\RX�KDYH�WR�UHSHDW�VWHSV��²���IRUHDFK�5���6\VWHP��$OO�ORJLFDO�V\VWHPV�QHHG�WR�EH�GHILQHG�LQ�DOO�5���6\VWHPV�RI�WKH�$/(HQYLURQPHQW�

89

9a

9b

10

Page 234: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Assigning Logical Systems to Clients

Authorizations Made Easy10–8

$OWKRXJK�\RX�QDPHG�WKH�ORJLFDO�V\VWHPV��\RX�KDYH�QRW�\HW�OLQNHG�WKH�ORJLFDO�V\VWHPV�WRWKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�

$VVLJQLQJ�/RJLFDO�6\VWHPV�WR�&OLHQWV

$IWHU�QDPLQJ�WKH�ORJLFDO�V\VWHPV��WKH�QH[W�VWHS�LV�WR�DVVLJQ�ORJLFDO�V\VWHPV�WR�FOLHQWV��,Q�WKLV�VHFWLRQ��ZH�OLQNWKH�QHZO\�QDPHG�ORJLFDO�V\VWHPV�WR�WKH�H[LVWLQJ�FOLHQWV�LQ�\RXU�5���6\VWHP�

�� )URP�WKH�ODVW�VFUHHQ�RI�WKH�SUHYLRXV�VHFWLRQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�

�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�/RJLFDO6\VWHPV��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�$VVLJQ�/RJLFDO�6\VWHP�WR&OLHQW�

�� 1RWH�WKDW�WKH�WDEOH�LV�FOLHQW�LQGHSHQGHQW�DQG�FKRRVH� �WRFRQWLQXH�

2

3

Page 235: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Release 4.6A/B10–9

$�OLVW�RI�DYDLODEOH�FOLHQWV�LQ�WKLV�5��6\VWHP�DSSHDUV�

�� 6HOHFW�WKH�FOLHQW�WR�ZKLFK�\RX�ZDQWWR�DVVLJQ�D�ORJLFDO�V\VWHP�QDPH�DQGLQWHJUDWH�LQWR�WKH�$/(�HQYLURQPHQW�

�� &KRRVH� �

�� (QWHU�D�GHVFULSWLRQ�IRU�WKH�FOLHQW��LIQHFHVVDU\�

�� 7R�DVVLJQ�D�ORJLFDO�V\VWHP�WR�WKDWFOLHQW��HQWHU�WKH�ORJLFDO�V\VWHP�LQXSSHUFDVH�

�� &KRRVH� �

�� 2Q�WKH�QH[W�ZLQGRZ��FKRRVH� �WRSURFHHG��<RX�ZLOO�UHFHLYH�D�PHVVDJHWKDW�\RXU�GDWD�KDV�EHHQ�VDYHG�

��� 7R�DVVLJQ�DQRWKHU�ORJLFDO�V\VWHP�WR�DFOLHQW��FKRRVH� �DQG�UHSHDW�VWHSV��²��

7R�DVVLJQ�D�FOLHQW�RI�D�GLIIHUHQW�5���6\VWHP�WR�D�ORJLFDO�V\VWHP��ORJ�RQ�WR�WKDW�5��6\VWHP��VWDUW�WUDQVDFWLRQ�SALE��DQG�UHSHDW�VWHSV��²��

4

5

6

7

8

Page 236: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Authorizations Made Easy10–10

'HILQLQJ�7DUJHW�6\VWHP�IRU�5)&�&DOOV

$IWHU�DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV��\RX�PXVW�GHILQH�WKH�WDUJHW�V\VWHP�IRU�5)&�FDOOV�

�� )URP�WKH�&KDQJH�9LHZ�§&OLHQWV¨��'HWDLOV�VFUHHQ��FKRRVH� �WZLFH�WR�UHWXUQ�WR�WUDQVDFWLRQ�SALE�

�� 8QGHU�WKH�QRGHV�6HQGLQJ�DQG5HFHLYLQJ�6\VWHPV�DQG�6\VWHPV�LQ1HWZRUN��FKRRVH� �QH[W�WR�WKH�,0*DFWLYLW\�'HILQH�7DUJHW�6\VWHPV�IRU�5)&FDOOV�

�� &KRRVH�&UHDWH�

$Q�5)&�GHVWLQDWLRQ�LV�DOZD\V�FUHDWHGIURP�WKH�FOLHQW�ZKHUH�\RX�DUH�FXUUHQWO\ORJJHG�RQ��7R�GHILQH�DQ�5)&FRQQHFWLRQ�IURP�FOLHQW�����WR�FOLHQW�����\RX�PXVW�EH�ORJJHG�RQ�WR�FOLHQW�����5)&�FRQQHFWLRQV�IRU�WKH�&HQWUDO�8VHU$GPLQLVWUDWLRQ�DOZD\V�QHHG�D�EDFN�DQG�IRUWK�FRQQHFWLRQ��7R�GHILQH�WKH5)&�FRQQHFWLRQ�FRPSOHWHO\��\RX�DOVRQHHG�WR�EH�ORJJHG�RQ�WR�FOLHQW�����DQGVHW�XS�FOLHQW�����DV�WKH�5)&�FRQQHFWLRQ�

3

2

Page 237: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Release 4.6A/B10–11

�� ,Q�5)&�GHVWLQDWLRQ��HQWHU�WKH�QDPH�RIWKH�ORJLFDO�V\WHP�WR�ZKLFK�\RX�ZDQWWR�GHILQH�D�5)&�FRQQHFWLRQ�IURP\RXU�FXUUHQW�V\VWHP��5HPHPEHU�WRXVH�XSSHUFDVH�

�� ,Q�&RQQHFWLRQ�W\SH��HQWHU�3��GHIDXOWYDOXH���LI�LW�LV�D�FRQQHFWLRQ�WR�DQRWKHU5���6\VWHP�

�� 8QGHU�'HVFULSWLRQ��HQWHU�D�GHWDLOHGGHVFULSWLRQ�IRU�WKH�5)&�GHVWLQDWLRQ�

�� ,Q�&OLHQW��HQWHU�WKH�QXPEHU�RI�WKHWDUJHW�FOLHQW�

�� ,Q�WKH�8VHU�DQG�3DVVZRUG�ILHOG��HQWHUWKH�XVHU�DQG�WKH�FRUUHVSRQGLQJSDVVZRUG�\RX�VSHFLILHG�IRU�WKHLQWHUQDO�FRPPXQLFDWLRQ�RI�WKHV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�

�� 7R�VDYH�\RXU�GDWD��FKRRVH� �

4

5

6

7

8

9

Page 238: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Defining Target System for RFC Calls

Authorizations Made Easy10–12

7KH�PHVVDJH�'HVWLQDWLRQ��;;;;VDYHG�DSSHDUV�

1HZ�RSWLRQV�DSSHDU�RQ�VFUHHQ��<RXFDQ�QRZ�FKRRVH�WR�XVH�D�ORDGGLVWULEXWLRQ��UHFRPPHQGHG���,I�\RXGR�QRW�ZDQW�WR�XVH�WKH�ORDGGLVWULEXWLRQ��VNLS�DKHDG�WR�VWHS����

��� 6HOHFW�<HV�IRU�/RDG�GLVWULE�

��� ,Q�7DUJHW�KRVW��HQWHU�WKH�QXPEHU�RIWKH�PHVVDJH�VHUYHU��6HH�WKH�7LSV�7ULFNV�EHORZ�

��� ,Q�6\VWHP�QXPEHU��HQWHU�WKH�V\VWHPQXPEHU�RI�WKH�PHVVDJH�VHUYHU��6HHWKH�7LSV��7ULFNV�EHORZ�

7R�ILQG�WKH�QDPH�RI�WKH�PHVVDJH�VHUYHURI�WKH�WDUJHW�KRVW��JR�WR�WKH�WDUJHWV\VWHP�DQG�VWDUW�WUDQVDFWLRQ�RZ03�8VXDOO\�\RX�ZLOO�VHH�D�OLVW�ZLWK�VHYHUDOVHUYHU�QDPHV��7KH�FRUUHFW�PHVVDJHVHUYHU�LV�WKH�RQH�WKDW�KDV�DQ�0�OLVWHG�LQWKH�6HUYLFHV�FROXPQ��7KH�QDPH�RI�WKHPHVVDJH�VHUYHU�DSSHDUV�DV�WKH�ILUVW�SDUWRI�WKH�6HUYHU�QDPH��LQ�IURQW�RI�WKHXQGHUVFRUH��7KH�ODVW�WZR�GLJLWV�RI�WKH6HUYHU�QDPH�UHSUHVHQW�WKH�V\VWHPQXPEHU�

��� 7R�VDYH�\RXU�GDWD��FKRRVH� �

$�VWDWXV�PHVVDJH�DSSHDUV�VD\LQJ�'HVWLQDWLRQ�;;;;�VDYHG�

��� &KRRVH�7HVW�FRQQHFWLRQ�WR�WHVW�LI�WKHFRQQHFWLRQ�ZRUNV�FRUUHFWO\�

1011 12

13

14

Page 239: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Release 4.6A/B10–13

$�FRUUHFW�FRQQHFWLRQ�WHVW�ORRNV�OLNHWKH�VFUHHQ�WR�WKH�ULJKW�

$�WHVW�ZLWK�5HPRWH�ORJLQ�ZRXOG�QRWZRUN�LI�\RX�XVHG�WKH�6\VWHP�XVHU��&3,&�IRU�WKH�FRQQHFWLRQ��,I�\RX�XVHG�D�'LDORJXVHU��\RX�FDQ�XVH�5HPRWH�/RJLQ�IRU�DQDGGLWLRQDO�WHVW�FRQQHFWLRQ�

7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�WKH�VDPH�5���6\VWHP��FKRRVH� �WZLFH�DQG�UHSHDW�VWHSV��²���

7R�HQWHU�DQRWKHU�5)&�GHVWLQDWLRQ�LQ�D�GLIIHUHQW�5���6\VWHP��ORJ�RQ�WR�WKDW�V\VWHP��VWDUW�WUDQVDFWLRQSALE,�DQG�UHSHDW�VWHSV��²���

'LVWULEXWLRQ�0RGHO

7KH�GLVWULEXWLRQ�PRGHO�GHVFULEHV�WKH�$/(�PHVVDJH�IORZ�EHWZHHQ�ORJLFDO�V\VWHPV�

�� /RJ�RQ�WR�WKH�FHQWUDO�V\VWHP�RI�WKH�$/(�HQYLURQPHQW�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU�

�� &KRRVH� �WR�VZLWFK�EHWZHHQGLVSOD\�DQG�HGLW�PRGH�

3

Page 240: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Authorizations Made Easy10–14

�� &KRRVH� �&UHDWH�PRGHO�YLHZ�

�� ,Q�6KRUW�WH[W��HQWHU�D�VKRUWGHVFULSWLRQ�

�� ,Q�7HFKQLFDO�QDPH��HQWHU�D�WHFKQLFDOQDPH�IRU�WKH�PRGHO�YLHZ�

�� &KRRVH� �

�� &KRRVH �LQ�IURQW�RI�0RGHO�YLHZV�WRUHFHLYH�D�OLVW�RI�DOO�PRGHO�YLHZV�LQFOXGLQJ�WKH�RQH�\RX�MXVW�FUHDWHG�

�� 6HOHFW�WKH�MXVW�FUHDWHG�PRGHO�YLHZ�7KH�HQWU\�ZLOO�EH�KLJKOLJKWHG�

��� &KRRVH� �$GG�%$3,�

7R�GLVWULEXWH�WKH�GDWD��\RX�KDYH�WR�GHILQH�WZR�PHWKRGV�IRU�WKH�QHZO\�FUHDWHG�GLVWULEXWLRQPRGHO��:LWKLQ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�RQH�RI�WKH�PHWKRGV�LV�IRU�WKH�GLVWULEXWLRQ�RIWKH�XVHU��DQG�RQH�IRU�WKH�FRPSDQ\��7KHVH�PHWKRGV�DUH�UHDOL]HG�WKURXJK�%$3,V��%XVLQHVV$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��

4

56

7

8

9

10

Page 241: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distribution Model

Release 4.6A/B10–15

��� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHGGLVWULEXWLRQ�PRGHO�

��� ,Q�6HQGHU�FOLHQW��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�

��� ,Q�5HFHLYHU�VHUYHU��HQWHU�WKH�WKHORJLFDO�V\VWHP�QDPH�RI�WKH�FOLHQWV\VWHP�

��� ,Q�2EM�QDPH�LQWHUIDFH��HQWHU�WKH�REMHFWUSER��QRWH�WKDW�WKLV�HQWU\�LV�FDVH�VHQVLWLYH��

��� ,Q�0HWKRG��HQWHU�Clone��QRWH�WKDWWKLV�HQWU\�LV�FDVH�VHQVLWLYH��

��� &KRRVH� �

��� 5HSHDW�VWHS���²���WR�DGG�D�PHWKRGIRU�WKH�FRPSDQ\�DGGUHVV��(QWHUUserCompany�LQ�VWHS����LQVWHDG�RIUSER��QRWH�WKDW�WKH�HQWU\�LV�FDVH�VHQVLWLYH��

��� &KRRVH� �

,I�WKHUH�DUH�PRUH�WKDQ�WZR�V\VWHPV�LQ�\RXU�SODQQHG�$/(�HQYLURQPHQW��UHSHDW���²���IRUDOO�RWKHU�FOLHQW�V\VWHPV�

��� 7R�VDYH�WKH�GDWD��FKRRVH� �

,I�\RX�H[SDQG�WKH�PRGHO�YLHZFRPSOHWHO\�XVLQJ ��\RXU�PRGHOYLHZ�IRU�D�WZR�V\VWHP�$/(HQYLURQPHQW�VKRXOG�ORRN�OLNH�WKHVFUHHQ�WR�WKH�ULJKW�

11

1213

1415

16

18

17

19

Page 242: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Central System

Authorizations Made Easy10–16

*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&HQWUDO�6\VWHP

3ULRU�WR�WKH�JHQHUDWLRQ�RI�WKH�SDUWQHU�SURILOHV��ZKLFK�VHWV�WKH�FRQGLWLRQV�IRU�WKH�HOHFWURQLF�GDWD�H[FKDQJH�LQWKH�$/(�HQYLURQPHQW��\RX�ILUVW�FKRRVH�WKH�SDUDPHWHUV�LQ�WKH�FXUUHQW�PRGHO�YLHZ�DV�GHVFULEHG�EHORZ�

�� 2Q�WKH�'LVWULEXWLRQ�0RGHO�&KDQJHGVFUHHQ��FKRRVH�(QYLURQPHQW�→*HQHUDWH�3DUWQHU�3URILOHV�

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�OHWWHUV�

�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FOLHQW�V\VWHP�

,I�WKHUH�DUH�PRUH�FOLHQW�V\VWHPV�LQ�\RXU$/(�HQYLURQPHQW��VHOHFW�WKRVH�ORJLFDOV\VWHPV�XVLQJ� �

�� &KRRVH� �

7R�LPSURYH�SHUIRUPDQFH��\RX�FDQ�VHOHFW�XQGHU�3DFNHWVL]H�KRZ�PDQ\�,'RFV��GDWDFRQWDLQHU�H[FKDQJH�EHWZHHQ�5���6\VWHPV��ZLOO�EH�VHQW�IRU�HDFK�5)&�SURFHVV��7KHVXJJHVWHG�YDOXH�RI�����,'RFV�LV�D�FRPSURPLVH�WR�NHHS�WKH�QXPEHU�RI�GLDORJ�SURFHVVHVGRZQ�DQG�DW�WKH�VDPH�WLPH��TXLFNO\�SURFHVV�FKDQJHV��7R�LQFUHDVH�WKH�SHUIRUPDQFH�FKRRVH�D�VPDOOHU�QXPEHU�RI�,'RFV�WR�EH�VHQW�IRU�HYHU\�5)&�SURFHVV�

1

23

4

Tip

Page 243: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Distributing Model View

Release 4.6A/B10–17

�� <RX�UHFHLYH�WKH�3URWRFRO�IRUJHQHUDWLQJ�SDUWQHU�SURILOH��&KHFN�LI�WKHSDUWQHU�SURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�

�� &KRRVH� �WZLFH�WR�UHWXUQ�WR�WKHVWDUW�VFUHHQ�LQ�%'���

'LVWULEXWLQJ�0RGHO�9LHZ

�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�

�� &KRRVH�(GLW�→��0RGHO�YLHZ�→'LVWULEXWH�

$�OLVW�DSSHDUV�ZLWK�DOO�H[LVWLQJ�FOLHQWV\VWHPV�LQ�WKH�$/(�HQYLURQPHQW�WRZKLFK�WKH�PRGHO�YLHZ�QHHGV�WR�EHGLVWULEXWHG�

�� 6HOHFW�WKH�GHVLUHG�V\VWHP�

�� &KRRVH� �

6

1

2

3

5

4

Page 244: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Authorizations Made Easy10–18

<RX�UHFHLYH�D�ORJ�LI�WKH�PRGHO�YLHZKDV�EHHQ�FUHDWHG�LQ�WKH�FOLHQW�V\VWHP�

7R�FKHFN�LI�WKH�PRGHO�YLHZ�KDV�EHHQ�HVWDEOLVKHG�IRU�WKH�FOLHQW�V\VWHP��SHUIRUP�WKHIROORZLQJ�VWHSV�

�� /RJ�RQ�WR�WKH�GHVLUHG�FOLHQW�V\VWHP��� 6WDUW�WUDQVDFWLRQ�SCUA��� (QWHU�WKH�WHFKQLFDO�QDPH�RI�WKH�PRGHO�YLHZ�

�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\�VWUXFWXUH�

*HQHUDWLQJ�3DUWQHU�3URILOHV�LQ�WKH�&OLHQW�6\VWHP

�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�BD64�DQG�FKRRVH�(QWHU.

�� 6HOHFW�WKH�PRGHO�YLHZ�FUHDWHGHDUOLHU��7KH�HQWU\�ZLOO�EHKLJKOLJKWHG�

�� &KRRVH�(QYLURQPHQW�→�*HQHUDWH3DUWQHU�3URILOHV�

4

3

Page 245: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Release 4.6A/B10–19

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�QHZO\�FUHDWHG�PRGHOYLHZ��8VH�XSSHUFDVH�

�� ,Q�3DUWQHU�V\VWHP��HQWHU�WKH�ORJLFDOV\VWHP�QDPH�RI�WKH�FHQWUDO�V\VWHP�

:LWK�WKLV�HQWU\��\RX�HVWDEOLVK�WKHSDUWQHU�SURILOH�IRU�WKH�UHWXUQFRQHFWLRQ�IURP�WKH�FOLHQW�V\VWHP�WRWKH�FHQWUDO�V\VWHP�

�� &KRRVH� �

<RX�UHFHLYH�WKH�3URWRFRO�IRU�JHQHUDWLQJSDUWQHU�SURILOH��&KHFN�LI�WKH�SDUWQHUSURILOHV�KDYH�EHHQ�FUHDWHGVXFFHVVIXOO\�

5HSHDW�VWHSV��²��IRU�DOO�FOLHQWV\VWHPV��LI�QHFFHVVDU\�

<RX�KDYH�QRZ�VHW�XS�WKH�FRPSOHWH�$/(�HQYLURQPHQW�

56

7

Page 246: Amez 46 all

Chapter 10: Setting Up the ALE Environment for Central User Administration

Generating Partner Profiles in the Client System

Authorizations Made Easy10–20

Page 247: Amez 46 all

11–1

&KDSWHU���� 6HWWLQJ�8S�&HQWUDO�8VHU

$GPLQLVWUDWLRQ

&RQWHQWV

Overview ................................................................................................................11–2

Assigning the Central User Administration Distribution Model ......................11–2

Testing Central User Administration ..................................................................11–3

Migrating Existing Users to the Central System................................................11–7

Defining Field Attributes for User Maintenance ................................................11–9

Global User Manager ..........................................................................................11–10

����

Page 248: Amez 46 all

Chapter 11: Setting Up Central User Administration

Overview

Authorizations Made Easy11–2

2YHUYLHZ

:LWK�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�\RX�FDQ�UHGXFH�WKH�V\VWHP�DGPLQLVWUDWRU·V�HIIRUW�WR�PDLQWDLQ�XVHUV�LQ�WKH5���HQYLURQPHQW��&HQWUDO�8VHU�$GPLQLVWUDWLRQ�DOORZV�\RX�WR�PDLQWDLQ�WKH�XVHUV�FHQWUDOO\�LQ�RQH�V\VWHP�7KH�LQIRUPDWLRQ�LV�WKHQ�DXWRPDWLFDOO\�GLVWULEXWHG�WR�WKH�GHSHQGHQW�V\VWHPV�

7R�VHW�XS�&HQWUDO�8VHU�$GPLQLVWUDWLRQ��ZH�DVVXPH�WKDW�\RX�XVH�RQH�XVHU�DFFRXQW�WKDW�KDV�V\VWHPDGPLQLVWUDWRU�DXWKRUL]DWLRQV�IRU�WKH�FRPSOHWH�V\VWHP�HQYLURQPHQW�

7R�VHW�XS�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�IRU�\RXU�5���6\VWHP�JURXS��\RX�QHHG�WR�VHWXS�WKH�$/(�HQYLURQPHQW��DV�GHVFULEHG�LQ�FKDSWHU�����6HWWLQJ�8S�WKH�$/(�(QYLURQPHQW�IRU&HQWUDO�8VHU�$GPLQLVWUDWLRQ��IRU�\RXU�FHQWUDO�V\VWHP��7KLV�FHQWUDO�V\VWHP�PXVW�QRZ�EH�VHWXS�IRU�WKH�XVHU�PDLQWHQDQFH�

$VVLJQLQJ�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�'LVWULEXWLRQ

0RGHO

�� /RJ�RQ�WR�\RXU�FHQWUDO�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�

�� ,Q�0RGHO�YLHZ��HQWHU�WKH�WHFKQLFDOQDPH�RI�WKH�GLVWULEXWLRQ�PRGHO�DVFUHDWHG�IRU�WKH�$/(�HQYLURQPHQW�

7KH�PRGHO�\RX�FKRRVH�KHUH�LV�WKH�EDVLVIRU�WKH�GLVWULEXWLRQ�RI�XVHU�GDWD�LQ�\RXU$/(�HQYLURQPHQW�

�� &KRRVH� �

6DYLQJ�WKH�PRGHO�DVVLJQPHQW�IRU�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�GLVWULEXWHV�WKHFRPSOHWH�GLVWULEXWLRQ�PRGHO�WR�DOO�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��\RX�FDQ�QRORQJHU�FUHDWH�D�XVHU�LQ�WKH�FOLHQW�V\VWHP��)URP�WKLV�SRLQW�IRUZDUG��D�V\VWHP�LV�GHILQHG�DVWKH�FHQWUDO�V\VWHP�DQG�WKH�RWKHU�V\VWHPV�DV�FOLHQW�V\VWHPV�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

3

4

Page 249: Amez 46 all

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Release 4.6A/B11–3

&KHFN�LI�WKH�PRGHO�KDV�EHHQ�DVVLJQHG�DVWKH�FOLHQW�V\VWHP�

�� /RJ�RQ�WR�WKH�FOLHQW�V\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCUA�DQG�FKRRVH�(QWHU�7KH�GLVWULEXWLRQ�PRGHO�LV�HQWHUHGDXWRPDWLFDOO\�

�� &KRRVH�'LVWULEXWLRQ�PRGHO�→�'LVSOD\VWUXFWXUH�

$�FRPSOHWH�YLHZ�RI�WKH�PRGHOVWUXFWXUH�DSSHDUV�

,I�\RX�GR�QRW�VHH�DQ\�VWUXFWXUH��LW�FRXOGEH�EHFDXVH�WKH�GDWD�KDV�EHHQ�GLVWULEXWHGDV\QFKURQRXVO\��,I�WKLV�LV�WKH�FDVH��JREDFN�WR�WKH�VWDUW�VFUHHQ�RI�WUDQVDFWLRQSCUA��ZDLW�IRU�WZR�PLQXWHV��DQG�UHSHDWVWHS���

7HVWLQJ�&HQWUDO�8VHU�$GPLQLVWUDWLRQ

�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�

�� ,Q�8VHU��HQWHU�D�XVHU�QDPH�IRU�WKHWHVW�XVHU�

�� &KRRVH� �

7

2

3

Page 250: Amez 46 all

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Authorizations Made Easy11–4

�� 2Q�WKH�$GGUHVV�WDE��HQWHU�DW�OHDVW�DODVW�QDPH�

�� &KRRVH�WKH�/RJRQ�GDWD�WDE�

�� (QWHU�DQ�,QLWLDO�SDVVZRUG�IRU�WKH�WHVWXVHU��<RX�PXVW�FKDQJH�WKH�LQLWLDOSDVVZRUG�DW�ILUVW�ORJRQ�WR�WKH�5��6\VWHP�

�� 5HHQWHU�WKH�LQLWLDO�SDVVZRUG�

�� &KRRVH�WKH�6\VWHPV�WDE�

5

4

6 7

8

Page 251: Amez 46 all

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Release 4.6A/B11–5

�� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�WKHORJLFDO�QDPHV�RI�WKH�FHQWUDO�V\VWHPDQG�RI�DOO�WKH�FOLHQW�V\VWHPV�LQ�WKHV\VWHPV�WDEOH�

��� &KRRVH�WKH�$FWLYLW\�JURXSV�WDE�

��� &KRRVH�7H[W�FRPSDULVRQ�IURP�FKLOGV\V�

$�WH[W�FRPSDULVRQ�LV�QHHGHG�WR�SURYLGHWKH�FHQWUDO�V\VWHP�ZLWK�DYDLODEOHDFWLYLW\�JURXSV�IURP�WKH�FOLHQW�V\VWHP�2QO\�LI�WKLV�VWHS�KDV�EHHQ�SHUIRUPHGFDQ�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHPVEH�GLVSOD\HG�DQG�VHOHFWHG�LQ�WKH�FHQWUDOV\VWHP�XVLQJ�SRVVLEOH�HQWULHV��,W�LV�DOVRSRVVLEOH�WR�DVVLJQ�DFWLYLW\�JURXSVPDQXDOO\�IURP�WKH�FOLHQW�V\VWHPZLWKRXW�WKH�WH[W�FRPSDULVRQ�

��� 5HDG�WKH�GLDORJ�ZLQGRZ�DQG�FKRRVH�WR�FRQWLQXH�

9

10

11

Page 252: Amez 46 all

Chapter 11: Setting Up Central User Administration

Testing Central User Administration

Authorizations Made Easy11–6

$VVLJQ�DQ�DFWLYLW\�JURXS�WR�WKH�WHVW�XVHULQ�HYHU\�ORJLFDO�V\VWHP�RI�WKH�V\VWHPJURXS�

��� ,Q�WKH�6\VWHP�FROXPQ��HQWHU�DOO�WKHORJLFDO�V\VWHPV�

��� ,Q�WKH�$FWLY�FROXPQ��HQWHU�WKHDFWLYLW\�JURXS�\RX�ZDQW�WR�DVVLJQ�WRWKH�WHVW�XVHU�LQ�WKH�FRUUHVSRQGLQJV\VWHP��IRU�WHVW�SXUSRVHV��LW�LVHQRXJK�WR�DVVLJQ�RQH�DFWLYLW\�JURXSSHU�V\VWHP��

��� &KRRVH� �

6DYLQJ�VWDUWV�WKH�GLVWULEXWLRQ�SURFHVVDXWRPDWLFDOO\��7KH�XVHU�LV�FUHDWHG�ZLWKWKH�DFWLYLW\�JURXS�DVVLJQPHQW�LQ�HYHU\GHILQHG�V\VWHP�

7KH�XVHU�PDLQWHQDQFH�MXPSV�EDFN�WRWKH�VWDUW�VFUHHQ�RI�68���

<RX�UHFHLYH�WKH�PHVVDJH�8VHU���ZDVVDYHG��<RX�FDQ�QRZ�FKHFN�LI�WKH�XVHUGDWD�KDV�EHHQ�GLVWULEXWHG�FRUUHFWO\�

��� &KRRVH�(QYLURQPHQW�→�'LVWULEXWLRQORJ��WUDQVDFWLRQ�SCUL��

13 14

15

16

Page 253: Amez 46 all

Chapter 11: Setting Up Central User Administration

Migrating Existing Users to the Central System

Release 4.6A/B11–7

$�VHULHV�RI�EXWWRQV�SURYLGHV�DFFHVV�WRGLIIHUHQW�ORJ�GLVSOD\V�

,I�\RX�FKRRVH�6\VWHP�UHSRUWV��\RX�UHFHLYHWKH�XVHU�VWDWXV�VRUWHG�E\�FOLHQW�V\VWHPV�,I�\RX�H[SDQG�WKH�WUHH��\RX�UHFHLYH�WKHXVHUV�RI�WKH�FOLHQW�V\VWHPV�

$Q�RYHUYLHZ�DERXW�(UURUV��:DUQLQJV�6XFFHVVIXO��DQG�1HZ�XQFRQILUPHGGLVWULEXWLRQV�LV�GLVSOD\HG��8QFRQILUPHGGLVWULEXWLRQV�FRXOG�UHVXOW�IURP�D�IDXOW\5)&�FRQQHFWLRQ�

0LJUDWLQJ�([LVWLQJ�8VHUV�WR�WKH�&HQWUDO�6\VWHP

,I�\RX�DOUHDG\�VHW�XS�XVHU�DFFRXQWV�LQ�WKH�FOLHQW�V\VWHPV��WKHVH�XVHUV�QHHG�WR�EH�PLJUDWHG�WR�WKH�FHQWUDOV\VWHP��,I�WKLV�DFWLRQ�KDV�DOUHDG\�EHHQ�SHUIRUPHG��\RX�FDQ�PDLQWDLQ�WKH�XVHU�GDWD�FHQWUDOO\�

�� ,Q�WKH�&RPPDQG�ILHOG�RI�WKH�FHQWUDO�V\VWHP��HQWHU�WUDQVDFWLRQ�SCUG�DQG�FKRRVH�(QWHU�

�� 6HOHFW�WKH�FOLHQW�V\VWHP�IURP�ZKHUH�\RX�ZRXOG�OLNH�WR�PLJUDWH�WKH�XVHU�GDWD�

�� &KRRVH�7UDQVIHU�XVHUV�

3

Page 254: Amez 46 all

Chapter 11: Setting Up Central User Administration

Migrating Existing Users to the Central System

Authorizations Made Easy11–8

2Q�WKH�1HZ�XVHUV�WDE��\RX�FDQ�VHH�DOOXVHU�DFFRXQWV�DYDLODEOH�LQ�WKH�FOLHQWV\VWHP��EXW�QRW�LQ�WKH�FHQWUDO�V\VWHP�<RX�FDQ�PLJUDWH�DOO�WKHVH�XVHUV�LQWR�WKH&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

�� 7R�VHOHFW�DOO��FKRRVH� �

�� &KRRVH� �7UDQVIHU�XVHUV�

�� &KRRVH�WKH�,GHQWLFDO�XVHUV�WDE�

2Q�WKH�,GHQWLFDO�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�LGHQWLFDO�ILUVW�DQG�ODVWQDPHV�LQ�WKH�FOLHQW�DQG�FHQWUDO�V\VWHPDUH�GLVSOD\HG��$OO�RI�WKHVH�XVHUV�FDQ�EHPLJUDWHG�WR�&HQWUDO�8VHU$GPLQLVWUDWLRQ��7KH\�ZLOO�DOVR�JHW�WKHFOLHQW�V\VWHP�DVVLJQHG�LQ�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

�� 7R�VHOHFW�DOO��FKRRVH� �

�� &KRRVH� �7UDQVIHU�XVHUV�

�� &KRRVH�WKH�'LIIHUHQW�XVHUV�WDE�

2Q�WKH�'LIIHUHQW�XVHUV�WDE��DOO�XVHUDFFRXQWV�ZLWK�WKH�VDPH�XVHU�,'��EXWZLWK�QDPHV�WKDW�DUH�GLIIHUHQW�LQ�WKHFOLHQW�RU�FHQWUDO�V\VWHP��DUH�GLVSOD\HG�

��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FHQWUDOV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�

D� 6HOHFW�WKH�GHVLUHG�HQWU\�

E� &KRRVH� �7UDQVIHU�XVHUV�

��� ,I�WKH�XVHU�LV�FRUUHFW�LQ�WKH�FOLHQWV\VWHP��SURFHHG�ZLWK�WKH�IROORZLQJ�

D� (QWHU�WKH�VDPH�QDPH�LQ�WKHFHQWUDO�V\VWHP�DV�LW�LV�GLVSOD\HGLQ�WKH�FOLHQW�V\VWHP��7KH�XVHU�LVQRZ�GLVSOD\HG�XQGHU�WKH,GHQWLFDO�XVHUV�WDE�

E� 6HOHFW�WKH�GHVLUHG�HQWU\�

F� &KRRVH� �7UDQVIHU�XVHUV�

4 5

7 8

6

9

10b

10a

Page 255: Amez 46 all

Chapter 11: Setting Up Central User Administration

Defining Field Attributes for User Maintenance

Release 4.6A/B11–9

,I�WKH�GLIIHUHQW�QDPHV�UHVXOW�IURP�GHDOLQJ�ZLWK�WZR�GLIIHUHQW�SHUVRQV��\RX�KDYH�WR�FKDQJH�WKH�XVHU�QDPHVXVLQJ�SU01�HLWKHU�LQ�WKH�FHQWUDO�RU�FOLHQW�V\VWHP��7KH�XVHU�QDPH�RI�WKH�FOLHQW�V\VWHP�FDQ�EH�IRXQG�RQ�WKH1HZ�XVHUV�WDE�DIWHUZDUGV�

2Q�WKH�$OUHDG\�FHQWUDO�XVHU�WDE��DOO�XVHUDFFRXQWV�DUH�GLVSOD\HG�WKDW�KDYH�EHHQPLJUDWHG�XVLQJ�RQH�RI�WKH�DERYH�VWHSV�RU�KDYH�EHHQ�FUHDWHG�LQ�WKH�FHQWUDOV\VWHP�RI�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�

'HILQLQJ�)LHOG�$WWULEXWHV�IRU�8VHU�0DLQWHQDQFH

$OWKRXJK�LW�LV�QR�ORQJHU�SRVVLEOH�WR�FUHDWH�XVHUV�LQ�WKH�FOLHQW�V\VWHP��\RX�FDQ�PDLQWDLQ�DOUHDG\�H[LVWLQJ�XVHUGDWD�LQ�WKH�FOLHQW�V\VWHP��7KHUHIRUH��LW�LV�XVHIXO�WR�GHILQH��DW�WKH�ILHOG�OHYHO��LI�DQG�KRZ�WKLV�GDWD�VKRXOG�EHPDLQWDLQHG��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�ILHOG�DWWULEXWHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SCUM�DQG�FKRRVH�(QWHU�

�� $OORFDWH�RQ�DOO�WDEV�IRU�HDFK�ILHOG�WKHDWWULEXWHV�GHVFULEHG�LQ�WKH�WDEOHEHORZ��1RW�DOO�DWWULEXWHV�FDQ�EHVHOHFWHG�IRU�HYHU\�ILHOG�

�� &KRRVH� �

3

2

Page 256: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–10

$WWULEXWH 'HVFULSWLRQ

*OREDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�LVGLVWULEXWHG�IURP�WKHUH�LQWR�WKH�FOLHQW�V\VWHPV�

/RFDO 7KH�GDWD�FDQ�RQO\�EH�PDLQWDLQHG�LQ�WKH�FOLHQW�V\VWHP�DQG�LV�QRWGLVWULEXWHG�

3URSRVDO 'XULQJ�WKH�FUHDWLRQ�RI�D�XVHU��WKH�VXJJHVWHG�YDOXH�LV�PDLQWDLQHG�DQGWKHQ�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��$IWHU�WKH�GLVWULEXWLRQ��WKH�GDWD�LVPDLQWDLQHG�RQO\�ORFDOO\��,I�D�QHZ�FOLHQW�V\VWHP�LV�FRQQHFWHG�WR�&HQWUDO8VHU�$GPLQLVWUDWLRQ��WKH�SURSRVHG�YDOXH�LV�GLVWULEXWHG�WR�WKLV�V\VWHP�,I�WKH�SURSRVHG�YDOXH�LV�FKDQJHG�LQ�WKH�FHQWUDO�V\VWHP��LW�LV�RQO\GLVWULEXWHG�WR�WKH�QHZ�V\VWHPV��$OUHDG\�H[LVWLQJ�V\VWHPV�DUH�QRWDIIHFWHG�

5HW9DO 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DV�ZHOO�DV�WKHFOLHQW�V\VWHP��7KH�FKDQJHV�PDGH�LQ�WKH�FOLHQW�V\VWHP�DUH�UHGLVWULEXWHGWR�WKH�FHQWUDO�V\VWHP��)URP�WKHUH��WKH�GDWD�LV�GLVWULEXWHG�WR�DOO�RWKHUFOLHQW�V\VWHPV�

(YHU\ZKHUH 7KH�XVHU�GDWD�FDQ�EH�PDLQWDLQHG�LQ�WKH�FHQWUDO�V\VWHP�DQG�WKH�FOLHQWV\VWHP��7KH�FKDQJHV�LQ�WKH�FOLHQW�V\VWHP�DUH�QRW�GLVWULEXWHG�DQ\ZKHUH�7KH�FKDQJHV�DIIHFW�RQO\�WKLV�FOLHQW�V\VWHP�

7KH�LQVWDOODWLRQ�RI�WKH�&HQWUDO�8VHU�$GPLQLVWUDWLRQ�LV�QRZ�FRPSOHWH�

*OREDO�8VHU�0DQDJHU

7KH�*OREDO�8VHU�0DQDJHU�LV�DQ�RSWLRQDO�WRRO�WKDW�VLPSOLILHV�\RXU�ZRUN�ZLWK�&HQWUDO�8VHU$GPLQLVWUDWLRQ��<RX�FDQ�VWLOO�XVH�WKH�XVHU�PDLQWHQDQFH�WUDQVDFWLRQ�DQG�WKH�3URILOH�*HQHUDWRU�3*��WR�DVVLJQ�XVHUV�DQG�DFWLYLW\�JURXSV�

<RX�QRZ�KDYH�WKH�RSWLRQ�WR�XVH�GLIIHUHQW�JURXSLQJ�W\SHV�RQ�WKH�XVHU�DQG�V\VWHP�OHYHO�ZLWKWKH�*OREDO�8VHU�0DQDJHU��7KH�JURXSLQJ�LV�FDUULHG�RXW�WKURXJK�XVHU�JURXSV�RQ�WKH�XVHU�OHYHODQG�WKURXJK�V\VWHP�W\SHV�IRU�WKH�V\VWHP�

7KHVH�PDLQWHQDQFH�RSWLRQV�DUH�FRPELQHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�VLQFH�WKHUH�DUHXVXDOO\�QR�FKDQJHV�WR�RWKHU�GDWD�LQ�WKH�XVHU�PDVWHU�GDWD�DIWHU�WKH�FUHDWLRQ�RI�WKH�XVHU�+RZHYHU��V\VWHP�DQG�DXWKRUL]DWLRQ�DVVLJQPHQWV�DUH�DQ�RQJRLQJ�SURFHVV�

,I�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�VHWWLQJ�XS�WKH�XVHU�GDWD��GR�QRW�GLVWULEXWH�WKH�XVHUGDWD�XVLQJ�WKH�*OREDO�8VHU�0DQDJHU��(YHU\WKLQJ�WKDW�LV�QRW�GHILQHG�LQ�WKH�*OREDO�8VHU0DQDJHU�ZLOO�EH�GHOHWHG�LQ�WKH�WDUJHW�V\VWHP�

Page 257: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–11

,W�LV�QRW�SRVVLEOH�WR�DVVLJQ�DXWKRUL]DWLRQ�SURILOHV�GLUHFWO\�WR�XVHUV�RU�XVHU�JURXSV�ZLWK�WKH*OREDO�8VHU�0DQDJHU��7KH�DXWKRUL]DWLRQV�DUH�DVVLJQHG�WKURXJK�DFWLYLW\�JURXSV��,I�\RXZDQW�WR�FUHDWH�DQ�DFWLYLW\�JURXS�DXWRPDWLFDOO\�IURP�DQ�H[LVWLQJ�DXWKRUL]DWLRQ�SURILOH��XVHWUDQVDFWLRQ�SU25��VWHS����&RS\�GDWD�IURP�ROG�SURILOHV�

7KH�PDLQ�DGYDQWDJH�RI�WKH�*OREDO�8VHU�0DQDJHU�LV�WKDW�\RX�QHYHU�KDYH�WR�YLHZ�WKHFRPSOHWH�V\VWHP�ODQGVFDSH�WR�DVVLJQ�DXWKRUL]DWLRQV��,Q�HYHU\�WDVN��\RX�RQO\�ORRN�DW�D�VPDOOSDUW�RI�WKH�FRPSOHWH�ODQGVFDSH��7KH�GLDJUDP�EHORZ�VKRZV�WKDW�\RX�RQO\�ORRN�DW�WZR�VLGHV�RIWKH�DVVLJQPHQW�WULDQJOH�

6RXUFH 7DUJHW

8VHU�8VHU�JURXS 6\VWHP�6\VWHP�W\SH

6\VWHP�6\VWHP�W\SH $FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS

$FWLYLW\�JURXS�&RPSRVLWH�DFWLYLW\�JURXS 8VHU�8VHU�JURXS

7R�PRGHO�D�FRPSOHWH�DVVLJQPHQW�IRU�GLVWULEXWLRQ�LQ�WKH�WDUJHW�V\VWHPV�\RX�QHHG�WR�FUHDWHD�FORVHG�WULDQJOH�IRU�WKDW�DVVLJQPHQW�DV�VKRZQ�LQ�WKH�JUDSKLF�DERYH��7R�UHGXFH�WKHFRPSOH[LW\�RI�WKLV�SURFHVV��WKH�*OREDO�8VHU�0DQDJHU�LV�VHW�XS�LQ�VXFK�D�ZD\�WKDW�\RXRQO\�KDYH�WR�DVVLJQ�WKH�RWKHU�WZR�DQJOHV��2QFH�\RX�KDYH�FRPSOHWHG�HDFK�RI�WKH�WKUHHDQJOHV��WKH�DVVLJQPHQWV�DUH�FRPSOHWH�

Page 258: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–12

6WUXFWXUH�RI�WKH�*OREDO�8VHU�0DQDJHU

7KH�*OREDO�8VHU�0DQDJHU�FDQ�RQO\�EH�XVHG�LQ�WKH�FHQWUDO�V\VWHP�RI�&HQWUDO�8VHU$GPLQLVWUDWLRQ�

7R�VWDUW�WKH�*OREDO�8VHU�0DQDJHU��HQWHU�WUDQVDFWLRQ�SUUM�LQ�WKH�&RPPDQG�ILHOG�DQG�FKRRVH(QWHU�

On the left tile, all usersand user groups in thesystem environment aredisplayed.

In the middle tile, all thesystems and systemgroups are displayed.

On the right tile, all activitygroups and compositeactivity groups in thesystem environment aredisplayed.

7R�GLVSOD\�WKH�DFWLYLW\�JURXSV�DQG�FRPSRVLWH�DFWLYLW\�JURXSV�RI�WKH�FOLHQW�V\VWHP��LQ�WKH*OREDO�8VHU�0DQDJHU�FKRRVH�([WUDV�→�6\VWHP�FRPSDULVRQ��$OWHUQDWLYHO\��\RX�FDQ�SHUIRUPWKH�7H[W�FRPSDULVRQ�IRU�FKLOG�V\V��RQ�WKH�$FWLYLW\�JURXSV�WDE�LQ�XVHU�PDLQWHQDQFH�WUDQVDFWLRQSU01��DV�GHVFULEHG�HDUOLHU���1RWH�WKDW�LW�PD\�WDNH�VRPH�WLPH�IRU�WKH�GDWD�WR�EHFRPHDYDLODEOH�VLQFH�LW�LV�GLVWULEXWHG�DV\QFKURQRXVO\�

8VLQJ�WKH�*OREDO�8VHU�0DQDJHU

7KH�XVH�RI�WKH�*OREDO�8VHU�0DQDJHU�GHSHQGV�RQ�ZKHWKHU�RU�QRW�WKHUH�ZHUH�XVHUV�LQ�\RXUV\VWHP�ODQGVFDSH�EHIRUH�WKH�LQVWDOODWLRQ�RI�FHQWUDO�XVHU�PDQDJHPHQW�

,I�XVHUV�DOUHDG\�H[LVW��LW�LV�DGYLVDEOH�WR�PLJUDWH�WKDW�XVHU�PDVWHU�GDWD�LQWR�WKH�*OREDO�8VHU0DQDJHU��7KLV�HQVXUHV�WKDW�WKH�XVHU�GDWD�ZLOO�QRW�EH�GHOHWHG�ZLWK�WKH�ILUVW�GLVWULEXWLRQ�

6\VWHP�/DQGVFDSH�ZLWK�([LVWLQJ�8VHUV

,I�\RX�ZDQW�WR�XVH�WKH�*OREDO�8VHU�0DQDJHU�LQ�D�V\VWHP�ODQGVFDSH�ZLWK�DQ�H[LVWLQJ�DQGSURGXFWLYH�XVHU��SURFHHG�DV�GHVFULEHG�EHORZ�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SUUM�DQG�FKRRVH�(QWHU�

�� )URP�WKH�VWDQGDUG�PHQX�EDU�

Page 259: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–13

< &KRRVH�([WUDV�→�0LJUDWLRQ�→�8VHU�WR�GLVSOD\�WKH�FXUUHQW�VWDWXV�RI�XVHU�PDVWHUUHFRUGV�LQ�DOO�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

< &KRRVH�([WUDV�→�0LJUDWLRQ�→�$FWLYLW\�JURXSV�WR�DVVLJQ�DFWLYLW\�JURXSV�DXWRPDWLFDOO\LQ�WKH�YDOLG�V\VWHPV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

7KH�GDWD�LV�RQO\�XSGDWHG�RQ�WKH�VLQJOH�XVHU�OHYHO�ZLWK�WKH�FXUUHQW�VWDWXV�LQ�WKH�*OREDO�8VHU0DQDJHU�DIWHU�WKH�PLJUDWLRQ��'R�QRW�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHU�JURXSV�DQG�V\VWHPW\SHV�LI�\RX�DUH�QRW�FRPSOHWHO\�ILQLVKHG�ZLWK�WKH�PLJUDWLRQ�

$FWLYLW\�JURXSV�VKRXOG�EH�QDPHG�FOHDUO\�LQ�WKH�V\VWHP�ODQGVFDSH��7KH�V\VWHP�ODQGVFDSHDFWV�OLNH�D�VLQJOH�V\VWHP��7KHUHIRUH�DQ�DFWLYLW\�JURXS�VKRXOG�RQO\�H[LVW�RQFH�LQ�WKLV�V\VWHP�,I�DQ�DFWLYLW\�JURXS�ZLWK�WKH�VDPH�QDPH�H[LVWV�LQ�PXOWLSOH�V\VWHPV�LQ�WKH�V\VWHPODQGVFDSH��LW�ZLOO�DSSHDU�PXOWLSOH�WLPHV�LQ�WKH�DFWLYLW\�JURXS�OLVW�LQ�WKH�*OREDO�8VHU0DQDJHU�

,Q�WKH�*OREDO�8VHU�0DQDJHU�\RX�FDQ�FUHDWH�DVVLJQPHQWV�RQ�WKH�VLQJOH�XVHU�OHYHO��DV�ZHOO�DVRQ�WKH�XVHU�JURXS�OHYHO��7KLV�DELOLW\�PD\�OHDG�WR�XQZDQWHG�HIIHFWV�DIWHU�D�XVHU�PLJUDWLRQ�

)RU�H[DPSOH��\RX�PLJUDWHG�DOO�GHYHORSHUV�LQ�\RXU�V\VWHP�LQWR�WKH�*OREDO�8VHU�0DQDJHU�DVGHVFULEHG�DERYH��7KHQ�\RX�GHILQHG�D�XVHU�JURXS�IRU�DOO�GHYHORSHUV�WKDW�FRQWDLQV�WKH�VDPHDXWKRUL]DWLRQV�WKDW�\RX�GHILQHG�HDUOLHU�RQ�WKH�VLQJOH�XVHU�OHYHO��,I�\RX�DVVLJQ�DOO�GHYHORSHUVWR�WKDW�XVHU�JURXS��LW�ZRXOG�OHDG�WR�D�GRXEOH�DVVLJQPHQW�RI�WKH�VDPH�DXWKRUL]DWLRQV��,I�\RXGHOHWHG�WKH�DVVLJQPHQW�RI�RQH�XVHU�WR�WKLV�XVHU�JURXS��WKLV�XVHU�ZRXOG�VWLOO�KDYH�WKHDXWKRUL]DWLRQV�RQ�WKH�VLQJOH�XVHU�OHYHO��7KHUHIRUH��\RX�PXVW�GHOHWH�WKH�DVVLJQPHQW�WR�WKHVLQJOH�XVHU�OHYHO�DV�VRRQ�DV�\RX�DVVLJQ�WKH�XVHU�WR�D�XVHU�JURXS�DIWHU�WKH�PLJUDWLRQ��7KHVLQJOH�XVHU�DVVLJQPHQW�VKRXOG�EH�XVHG�WR�JLYH�D�XVHU�DGGLWLRQDO�DXWKRUL]DWLRQV�WKDW�GHYLDWHIURP�WKH�VWDQGDUG�

6\VWHP�/DQGVFDSH�:LWKRXW�([LVWLQJ�8VHUV

,I�\RX�KDYH�QR�H[LVWLQJ�XVHUV�LQ�\RXU�V\VWHP�ODQGVFDSH��WKH�PLJUDWLRQ�RI�WKH�XVHU�PDVWHUGDWD�GRHV�QRW�DSSO\��<RX�FDQ�LPPHGLDWHO\�VWDUW�ZLWK�WKH�FUHDWLRQ�RI�XVHUV�LQ�WKH�XVHUPDLQWHQDQFH�WUDQVDFWLRQ�SU01�DQG�FUHDWH�WKH�DXWKRUL]DWLRQ�DVVLJQPHQWV�LQ�WKH�V\VWHPODQGVFDSH�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU��(YHU\�XVHU�RQO\�QHHGV�WR�EH�FUHDWHG�RQFH�LQ�WKHFHQWUDO�V\VWHP��DQG�PLJKW�JHW�DVVLJQHG�WR�RWKHU�V\VWHPV�ZLWK�WKH�KHOS�RI�WKH�*OREDO�8VHU0DQDJHU��7KH�FUHDWLRQ�RI�WKDW�XVHU�LQ�WKH�RWKHU�V\VWHPV��DQG�WKH�DVVLJQPHQW�WR�WKH�DFWLYLW\JURXSV�WDNHV�SODFH�DXWRPDWLFDOO\�WKURXJK�WKH�*OREDO�8VHU�0DQDJHU�

Page 260: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–14

8VHU�&UHDWLRQ

�� &UHDWH�D�XVHU�LQ�WUDQVDFWLRQ�68���DVXVXDO��VHH�FKDSWHU���IRU�GHWDLOHGLQIRUPDWLRQ��

�� (QWHU�D�8VHU�JURXS�RQ�WKH�*URXSV�WDEIRU�WKH�FXUUHQW�XVHU��LI�WKLV�XVHUJURXS�KDV�DOUHDG\�EHHQ�FUHDWHG�LQWKH�*OREDO�8VHU�0DQDJHU���<RX�ZLOOQRW�QHHG�WR�PDNH�WKDW�DVVLJQPHQW�LQWKH�*OREDO�8VHU�0DQDJHU�DQ\PRUH�

<RX�VKRXOG�RQO\�FUHDWH�DVVLJQPHQWV�RQ�WKH�6\VWHPV�DQG�$FWLYL��DFWLYLW\�JURXSV��WDEV�LI\RX�DUH�FHUWDLQ�WKLV�DVVLJQPHQW�LV�RQO\�YDOLG�IRU�WKH�VLQJOH�XVHU��2WKHUZLVH��FUHDWH�WKHDVVLJQPHQWV�IRU�XVHU�JURXSV�LQ�WKH�*OREDO�8VHU�0DQDJHU�

$OO�GDWD�HQWHUHG�LQ�WUDQVDFWLRQ�68���LV�DOVR�DYDLODEOH�LQ�WKH�*OREDO�8VHU�0DQDJHU��$OODVVLJQPHQWV�FUHDWHG�LQ�WKH�*OREDO�8VHU�0DQDJHU�DUH�DOVR�DYDLODEOH�LQ�WUDQVDFWLRQ�SU01�

'HILQLQJ�6\VWHP�7\SHV�DQG�8VHU�*URXSV

:H�QRZ�GHPRQVWUDWH�KRZ�WR�JURXS�PXOWLSOH�V\VWHPV�LQWR�D�V\VWHP�JURXS�

�� &KRRVH� �QH[W�WR�6\VWHP�7\SHV�WRFUHDWH�D�V\VWHP�W\SH�

�� ,Q�6\VWHP�W\SH��HQWHU�D�QDPH�IRU�WKHV\VWHP�W\SH�

�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�V\VWHP�W\SH�

�� &KRRVH� �WR�FUHDWH�WKH�V\VWHP�W\SH�

2

1

23

4

Page 261: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–15

�� 7KH�QHZ�V\VWHP�W\SH�DSSHDUV�LQ�WKHOLVW�

�� 7R�DVVLJQ�D�V\VWHP�WR�WKH�MXVW�FUHDWHGV\VWHP�W\SH��VHOHFW�WKH�GHVLUHGV\VWHP�IURP�WKH�6\VWHPV�OLVW��0RYH�LWXVLQJ�GUDJ�DQG�GURS�LQWR�WKH�QHZV\VWHP�W\SH��LQ�RXU�H[DPSOH'(9(/��

�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\V\VWHP�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DV\VWHP�W\SH�

2QH�V\VWHP�FDQ�EH�DVVLJQHG�WR�RQO\�RQH�V\VWHP�JURXS��$�XVHU�FDQ�EH�DVVLJQHG�WRGLIIHUHQW�XVHU�JURXSV�

,Q�WKH�IROORZLQJ�VWHSV��ZH�GHPRQVWUDWH�KRZ�WR�GHILQH�D�XVHU�JURXS�

�� &KRRVH� �QH[W�WR�8VHU�JURXSV�

�� ,Q�8VHU�JURXS��HQWHU�D�QDPH�IRU�WKH8VHU�JURXS�

�� ,Q�6KRUW�WH[W��HQWHU�WKH�VKRUW�WH[W�IRUWKDW�XVHU�JURXS�

�� &KRRVH� �WR�FUHDWH�WKH�XVHU�JURXS�

2

6

1

5

3

4

Page 262: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–16

�� 7KH�QHZ�XVHU�JURXS�DSSHDUV�LQ�WKHOLVW�

�� 7R�DVVLJQ�D�XVHU�WR�WKH�MXVW�FUHDWHGXVHU�JURXS��VHOHFW�WKH�GHVLUHG�XVHUIURP�WKH�8VHUV�OLVW��0RYH�LW�XVLQJGUDJ�DQG�GURS�LQWR�WKH�QHZ�XVHUJURXS��LQ�RXU�H[DPSOH��'(9(/23��

�� 5HSHDW�WKLV�SURFHGXUH�IRU�HYHU\�XVHUWKDW�\RX�ZRXOG�OLNH�WR�DVVLJQ�WR�DXVHU�JURXS�

0RGHOLQJ�ZLWK�WKH�*OREDO�8VHU�0DQDJHU

,Q�WKH�IROORZLQJ�SURFHGXUH�ZH�GHPRQVWUDWH�KRZ�WR�DVVLJQ�WKH�FRUUHFW�V\VWHPV�DQG�DFWLYLW\�JURXSV�WR�D�XVHUJURXS�

�� 6HOHFW�WKH�MXVW�FUHDWHG�XVHU�JURXS�

�� &KRRVH� �WR�GLVSOD\�WKHDVVLJQPHQWV�

�� <RX�UHFHLYH�WKH�FXUUHQW�VWDWXV�RI�WKHV\VWHP�V\VWHP�W\SH�DQG�DFWLYLW\JURXS�DVVLJQPHQWV�IRU�WKH�VHOHFWHGXVHU�JURXS��,Q�RXU�H[DPSOH��ZH�KDYHPDGH�QR�DVVLJQPHQWV�IRU�WKH�XVHUJURXS�'(9(/23��7KHUHIRUH��QRDVVLJQPHQWV�DSSHDU��MXVW�WKH�IROGHUV�

56

1

2

3 3

Page 263: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–17

�� 7R�DVVLJQ�D�V\VWHP�RU�V\VWHP�W\SH�WRD�XVHU�JURXS��VHOHFW�WKH�GHVLUHGV\VWHP�RU�V\VWHP�W\SH�IURP�WKH6\VWHPV�RU�6\VWHP�W\SHV�OLVW�DQG�PRYHLW�XVLQJ�GUDJ�DQG�GURS�LQWR�WKHGHVLUHG�IROGHU��IRU�H[DPSOH��D�IROGHUEHORQJLQJ�WR�$VVLJQPHQW�WR�8VHUJURXS�'(9(/23��

�� 7R�DVVLJQ�DFWLYLW\�JURXSV�RUFRPSRVLWH�DFWLYLW\�JURXSV�WR�WKHXVHU�JURXS��SURFHHG�ZLWK�WKH�VDPHSURFHGXUH�

7R�UHGXFH�WKH�QXPEHU�RI�GLVSOD\HG�HQWULHV�LQ�D�OLVW��IRU�WKH�XVHU��DFWLYLW\�JURXS��HWF���FKRRVH�WKH�VHOHFWLRQ�LFRQ�QH[W�WR�WKH�GHVLUHG�HQWU\�

5HPHPEHU�WKDW�DFFRUGLQJ�WR�WKH�DVVLJQPHQW�WULDQJOH�VKRZQ�HDUOLHU��\RX�KDYH�RQO\�GHILQHGWZR�RI�WKH�WKUHH�DQJOHV�VR�IDU��,Q�WKH�H[DPSOH�DERYH��ZH�IRFXVHG�RQ�WKH�XVHU�JURXS�WRDVVLJQ�V\VWHPV�DQG�DFWLYLW\�JURXSV��:KDW�LV�PLVVLQJ�LV�WKH�DVVLJQPHQW�EHWZHHQ�DFWLYLW\JURXSV�DQG�V\VWHPV��,I�\RX�PLJUDWHG�WKH�DFWLYLW\�JURXSV��WKH�DVVLJQPHQW�KDV�EHHQSHUIRUPHG�DXWRPDWLFDOO\�DQG�WKH�WULDQJOH�LV�FRPSOHWH��,I�QRW��\RX�KDYH�WR�GHILQH�WKHDVVLJQPHQW�IRU�HYHU\�DFWLYLW\�JURXS�

<RX�KDYH�WKH�RSWLRQ�WR�GLVSOD\�DQG�PDLQWDLQ�DVVLJQPHQWV�IURP�HYHU\�FRUQHU�RI�WKHWULDQJOH��,I�\RX�GLVSOD\�WKH�DVVLJQPHQWV�RI�DQ�DFWLYLW\�JURXS��WKHQ�\RX�FDQ�PDLQWDLQ�WKHV\VWHP�DQG�XVHU�JURXSV�IRU�WKDW�DFWLYLW\�JURXS��,I�\RX�GLVSOD\�WKH�DVVLJQPHQW�RI�D�V\VWHPW\SH��WKHQ�\RX�FDQ�GHILQH�WKH�XVHU�DQG�DFWLYLW\�JURXSV�WKDW�DUH�YDOLG�IRU�WKLV�V\VWHP�W\SH�

$XWKRUL]DWLRQ�IRU�WKH�*OREDO�8VHU�0DQDJHU

:LWK�WKH�*OREDO�8VHU�0DQJHU��\RX�KDYH�WKH�RSWLRQ�WR�PDLQWDLQ�XVHUV�DQG�DOO�WKHLUDXWKRUL]DWLRQV�LQ�HYHU\�V\VWHP�IURP�WKH�FHQWUDO�V\VWHP�RI�WKH�V\VWHP�ODQGVFDSH��7KLV�RSWLRQFDQ�EH�YHU\�XVHIXO��EXW�DOVR�YHU\�SUREOHPDWLF�LI�XVHG�LQFRUUHFWO\��)RU�H[DPSOH��DOO�XVHUV�LQ�DV\VWHP�W\SH�FRXOG�EH�GHOHWHG�YHU\�HDVLO\��7KHUHIRUH��LW�LV�YHU\�LPSRUWDQW�WR�SD\�FDUHIXODWWHQWLRQ�WR�WKH�DXWKRUL]DWLRQV�RI�WKH�PRGHOHU�DQG�DGPLQLVWUDWRU�RI�WKH�*OREDO�8VHU0DQDJHU�

:H�UHFRPPHQG�\RX�XVH�WKH�IRXU�H\H�SULQFLSOH��ZKHUH�RQH�DGPLQLVWUDWRU�PRGHOV�WKHDVVLJQPHQWV�DQG�DQRWKHU�FKHFNV�WKRVH�DVVLJQPHQWV�EHIRUH�WKH�GDWD�LV�GLVWULEXWHG��7KHPRGHOLQJ�LV�WKH�XQFULWLFDO�SDUW��EHFDXVH�QR�GDWD�LV�EHLQJ�FKDQJHG�LQ�WKH�FOLHQW�V\VWHPV��7KLVKDSSHQV�RQO\�GXULQJ�WKH�GLVWULEXWLRQ�

7KH�GLVWULEXWLRQ�RQO\�WDNHV�SODFH�RQ�WKRVH�LVVXHV�IRU�ZKLFK�WKH�DGPLQLVWUDWRU�KDV�WKHGLVWULEXWLRQ�ULJKWV��,Q�WKLV�ZD\��LW�LV�SRVVLEOH�WR�KDYH�GLIIHUHQW�DGPLQLVWUDWRUV�IRU�VHOHFWHG

54

Page 264: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–18

V\VWHPV�LQ�WKH�V\VWHP�ODQGVFDSH��7KHVH�DGPLQLVWUDWRUV�FDQ�WKHQ�RQO\�GLVWULEXWH�WKH�GDWD�IRUZKLFK�WKH\�DUH�DXWKRUL]HG�

7KH�IROORZLQJ�WDEOH�GLVSOD\V�WKH�UHOHYDQW�DXWKRUL]DWLRQ�REMHFWV�IRU�WKH�*OREDO�8VHU�0DQDJHU�

7DVN 2EMHFW $FWLYLW\ 6B86(5B*53 6B86(5B6<6 6B865B$*5

'LVSOD\�FUHDWH�GHOHWHDVVLJQPHQW

8VHU8VHU�JURXS6\VWHP6\VWHP�W\SHDFWLY��JURXS

0RGHO������'LVSOD\�����

8VHU�JURXS�RIWKH�XVHU

8VHU�JURXS

6\VWHP6\VWHP�W\SH

$FWLY�JURXS

8VHU�LQ�XVHUJURXSV

$VVLJQ����� 8VHU�JURXS�RIWKH�XVHU

8VHU�JURXS

&KDQJH6\VWHP�W\SH

$VVLJQ����� 6\VWHP6\VWHP�W\SH

&UHDWH�XVHUJURXS

&UHDWH����� 8VHU�JURXS

0LJUDWH 0LJUDWH����� �&RPPHQW�HQWHULQJ�RIVLQJOHV\VWHP�QRWSRVVLEOH

'LVWULEXWLQJ�'DWD�LQ�WKH�*OREDO�8VHU�0DQDJHU

%HIRUH�WKH�GLVWULEXWLRQ��\RX�VKRXOG�DOZD\V�GLVSOD\�WKH�GDWD�DQG�FKHFN�LW��,Q�WKH�IROORZLQJ�VWHSV��ZHGHPRQVWUDWH�KRZ�WR�FKHFN�WKH�GDWD�

�� ,QVLGH�WKH�*OREDO�8VHU�0DQDJHU�FKRRVH� �WR�GLVSOD\�WKH�GLVWULEXWLRQGDWD�

�� &KHFN�LI�WKH�GDWD�IRU�WKH�XVHUV�LV�VHWFRUUHFWO\�IRU�WKH�GLVWULEXWLRQ�

2QO\�GLVWULEXWH�WKH�GDWD�DIWHU�\RX�KDYH�UDQGRPO\�FKHFNHG�WKH�XVHU�GDWD�

1

Page 265: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Release 4.6A/B11–19

<RX�FDQ�GLVWULEXWH�WKH�GDWD�IURP�WKH�*OREDO�8VHU�0DQDJHU�PDQXDOO\�LPPHGLDWHO\�RUFUHDWH�D�EDFNJURXQG�MRE�WR�GLVWULEXWH�WKH�GDWD�

,PPHGLDWH�'LVWULEXWLRQ

�� 7R�WULJJHU�WKH�GLVWULEXWLRQLPPHGLDWHO\��FKRRVH� �

7KH�GDWD�LV�GLVWULEXWHG�ULJKW�DZD\�5HPHPEHU�WKDW�LW�FDQ�WDNH�D�ZKLOHXQWLO�DOO�GDWD�LV�DYDLODEOH�LQ�HYHU\FOLHQW�V\VWHP��VLQFH�WKH�GLVWULEXWLRQKDSSHQV�DV\QFKURQRXVO\�

,PPHGLDWH�GLVWULEXWLRQ�FDQ�FDXVH�D�ORW�RI�QHWZRUN�WUDIILF�LQ�\RXU�V\VWHP�ODQGVFDSH�DQGVORZ�GRZQ�WKH�SHUIRUPDQFH�RI�V\VWHPV��,I�\RX�ZDQW�WR�DYRLG�WKLV�VORZGRZQ��\RX�VKRXOGVFKHGXOH�D�UHJXODU�EDFNJURXQG�MRE�WR�UXQ�DW�QLJKW�

'XULQJ�WKH�GLVWULEXWLRQ��WKH�GDWD�LV�HQWHUHG�LQWR�WUDQVDFWLRQ�68���DFFRUGLQJ�WR�WKHPRGHOLQJ�LQ�WKH�*OREDO�8VHU�0DQJHU��DQG�IURP�WKHUH�GLVWULEXWHG�WR�WKH�FOLHQW�V\VWHPV��,QWKH�FOLHQW�V\VWHP��RQO\�WKH�XVHUV�DUH�FUHDWHG�DQG�WKH�DFWLYLW\�JURXSV�DVVLJQHG��2WKHU�GDWDLV�QRW�GLVWULEXWHG��EXW�NHSW�LQ�WKH�FHQWUDO�V\VWHP��7KHUHIRUH��LQ�WUDQVDFWLRQ�6&8/�\RX�FDQH[SHFW�WR�ILQG�RQO\�VRPH�ORJV��QDPHO\�WKRVH�IRU�WKH�GLVWULEXWLRQ�RI�WKH�DFWLYLW\�JURXSDVVLJQPHQW�DQG�IRU�XVHUV�FUHDWHG�RU�GHOHWHG.

7R�UHGXFH�WKH�GDWD�IORZ�WKDW�RFFXUV�GXULQJ�WKH�GLVWULEXWLRQ��RQO\�GDWD�WKDW�KDV�FKDQJHGVLQFH�WKH�ODVW�GLVWULEXWLRQ�LV�GLVWULEXWHG�

6FKHGXOLQJ�%DFNJURXQG�'LVWULEXWLRQ

�� 7R�VFKHGXOH�D�EDFNJURXQG�MRE�IRUWKH�GDWD�GLVWULEXWLRQ��FKRRVH�([WUDV→�6FKHGXOH�GLVWULEXWLRQ�

1

1

Page 266: Amez 46 all

Chapter 11: Setting Up Central User Administration

Global User Manager

Authorizations Made Easy11–20

�� &KRRVH� �

�� ,Q�-RE�QDPH��HQWHU�D�MRE�QDPH�

�� ,Q�-RE�FODVV��HQWHU�D�SULRULW\�IRU�WKHMRE�FODVV�

�� ,Q�7DUJHW�VHUYHU��VHOHFW�WKH�FHQWUDOV\VWHP�DV�WKH�WDUJHW�V\VWHP�

�� &KRRVH� �6WHS�WR�SODQ�WKH�$%$3SURJUDP�56865����

�� &KRRVH� �6WDUW�FRQGLWLRQ�WR�VFKHGXOHWKH�WLPH�IRU�\RXU�MRE�

�� &KRRVH� �

,I�\RX�SURFHVV�WKH�DGPLQLVWUDWLRQ�RI�XVHU�GDWD�LQ�WKH�*OREDO�8VHU�0DQDJHU�ZLWK�WKH�IRXU�H\H�SULQFLSOH��\RX�VKRXOG�EH�DZDUH�WKDW�WKHUH�PLJKW�EH�FRQIOLFW��DV�\RX�FDQQRW�FKHFN�WKHGDWD�EHIRUH�WKH�DXWRPDWLF�GLVWULEXWLRQ�

2

34

5

67

8

Page 267: Amez 46 all

12–1

&KDSWHU���� 7LSV�DQG�7URXEOHVKRRWLQJ

&RQWHQWV

Overview ................................................................................................................12–2

Tracing Authorizations with Transaction SU53 .................................................12–2

System Trace Using Transaction ST01 ..............................................................12–4

Analyzing a Written Trace File.............................................................................12–9

Reducing the Scope of Authorization Checks.................................................12–12

����

Page 268: Amez 46 all

Chapter 12: Tips and Troubleshooting

Overview

Authorizations Made Easy12–2

2YHUYLHZ

:KHQ�XVHUV�H[HFXWH�D�WUDQVDFWLRQ�RU�UHSRUW�WKDW�LV�QRW�LQFOXGHG�LQ�WKHLU�XVHU�PHQX��WKH\�PD\VHH�WKH�V\VWHP�PHVVDJH�VLPLODU�WR��<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ���7KLV�PHVVDJHPHDQV�WKDW�HLWKHU�WKHLU�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�GRHV�QRW�FRQWDLQ�WKH�UHTXLUHGDXWKRUL]DWLRQ�WR�H[HFXWH�WKH�WUDQVDFWLRQ��RU�WKH�YDOXHV�PDLQWDLQHG�IRU�WKH�SURILOH·VDXWKRUL]DWLRQ�DUH�LQVXIILFLHQW��7KH�PLVVLQJ�DXWKRUL]DWLRQV�FDQ�EH�GHWHUPLQHG�HLWKHU�E\WUDFLQJ�DXWKRUL]DWLRQV�ZLWK�WUDQVDFWLRQ�68����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRWDXWKRUL]HG��RU�ZLWK�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�67���

7UDQVDFWLRQ�68���LV�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*��ZKLFK�LVLQFOXGHG�LQ�WKH�XVHU�UROH�WHPSODWH�6$3B(9(5<B(03/2<((�

,W�LV�DOVR�DFFHVVLEOH�XVLQJ�WKH�PHQX�SDWK�6\VWHP�→�8WLOLWLHV�→�'LVSOD\�$XWKRUL]DWLRQ�&KHFNIURP�WKH�PDLQ�PHQX�

7UDFLQJ�$XWKRUL]DWLRQV�ZLWK�7UDQVDFWLRQ�68��

%\�H[HFXWLQJ�WUDQVDFWLRQ�68�����'LVSOD\�FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HGIURP�WKH�XVHU�PHQX�RU�E\�HQWHULQJ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DW�DQ\�WLPH�DQDO\]HDQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�LQ�\RXU�VHVVLRQ��7UDQVDFWLRQ�68���FDQ�EH�DFFHVVHG�IURP�DQ\�RI\RXU�VHVVLRQV��QRW�MXVW�WKH�RQH�ZKHUH�WKH�HUURU�RFFXUUHG��<RX�FDQQRW��KRZHYHU��DQDO\]H�DQDXWKRUL]DWLRQ�HUURU�IURP�\RXU�RZQ�VHVVLRQ�LQ�DQRWKHU�XVHU·V�ORJRQ�VHVVLRQ�

$W�WKH�WUDQVDFWLRQ�VWDUW��WUDQVDFWLRQ�68���LV�SURWHFWHG�E\�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�<RX�VKRXOG�JLYH�DOO�XVHUV�DFFHVV�ULJKWV�WR�WUDQVDFWLRQ�68����7KXV��LQ�FDVH�RI�D�SUREOHP�\RXU�KHOS�GHVN�FDQ�HDVLO\�DQDO\]H�SUREOHPV�WKDW�XVH�WUDQVDFWLRQ�68����7UDQVDFWLRQ�68���LVLQFOXGHG�LQ�WKH�DFWLYLW\�JURXS�6$3B%&B(1'86(5B$*�ZKLFK�LV�LQFOXGHG�LQ�WKH�XVHU�UROHWHPSODWH�6$3B(9(5<B(03/2<((�

,I�\RX�DUH�XVLQJ�VWUXFWXUDO�DXWKRUL]DWLRQV��68���LV�QRW�YHU\�XVHIXO�LI�WKH�WUDQVDFWLRQ�ZKHUH\RX�DUH�UHFHLYLQJ�PHVVDJHV�<RX�KDYH�QR�DXWKRUL]DWLRQ�IRU��LV�DQ�+5�WUDQVDFWLRQ�RU�DWUDQVDFWLRQ�WKDW�FDOOV�+5�REMHFWV��68���RQO\�UHYHDOV�WKH�ODVW�DXWKRUL]DWLRQ�FKHFN�IDLOXUHEDVHG�RQ�WKH�$%$3�FRGH�VWDWHPHQW�$XWKRUL]DWLRQ�&KHFN��+RZHYHU��VWUXFWXUDODXWKRUL]DWLRQV�GR�QRW�DOZD\V�XVH�WKH�$XWKRUL]DWLRQ�&KHFN�VWDWHPHQW�LQ�GHWHUPLQLQJDFFHVVHV��7KHUHIRUH��LI�H[WHQVLYH�VWUXFWXUDO�DXWKRUL]DWLRQV�DUH�XVHG��WKH�6\VWHP�7UDFH�WUDQVDFWLRQ�67����ZLOO�EH�RI�PRUH�EHQHILW�WKDQ�68���

Page 269: Amez 46 all

Chapter 12: Tips and Troubleshooting

Tracing Authorizations with Transaction SU53

Release 4.6A/B12–3

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�D�XVHU��ZKR�KDV�WKH�XVHU�UROH�WHPSODWH'$7$B(175<B&/(5.��ZH�FUHDWHG�WKLV�DFWLYLW\�JURXS�HDUOLHU�LQ�WKH�ERRN���WULHV�WR�UXQ�WUDQVDFWLRQ�)%����'RFXPHQW�FKDQJHV��6LQFH�WKLV�XVHU�KDV�QR�DXWKRUL]DWLRQ�IRU�WKLV�WUDQVDFWLRQ��WKH�HUURU�PHVVDJH�<RX�KDYH�QRDXWKRUL]DWLRQ�IRU�7UDQVDFWLRQ�)%���LV�UHFHLYHG��7KH�XVHU�KDV�WR�XVH�68�����'LVSOD\�FKHFN�YDOXHV�RIDXWKRUL]DWLRQ�FKHFNV�LI��QRW�DXWKRUL]HG�WR�ILQG�RXW�ZKDW�DXWKRUL]DWLRQ�LV�PLVVLQJ�

:H�VWDUW�ZKHUH�WKH�XVHU�KDV�DWWHPSWHGWR�UXQ�WUDQVDFWLRQ�)%���DQG�UHFHLYHV�WKHHUURU�PHVVDJH��<RX�KDYH�QR�DXWKRUL]DWLRQIRU�7UDQVDFWLRQ�)%���

�� 6WDUW�WUDQVDFWLRQ�68���¥�'LVSOD\FKHFN�YDOXHV�RI�DXWKRUL]DWLRQ�FKHFNV�LI�QRW�DXWKRUL]HG�IURP�WKH�XVHU�PHQX��RUHQWHU�SU53�LQ�WKH�&RPPDQG�ILHOG�

�� 7KH�V\VWHP�GLVSOD\V�WKH�FKHFNHGDXWKRUL]DWLRQ�REMHFW�WKDW�FDXVHG�WKHHUURU�PHVVDJH�ZLWK�WKHFRUUHVSRQGLQJ�ILHOG�YDOXHV�

�� $OVR�GLVSOD\HG�DUH�

D� 7KH�FXUUHQW�DXWKRUL]DWLRQ�LQ�WKHXVHUV�DVVLJQHG�DXWKRUL]DWLRQSURILOH�

E� 7KH�DXWKRUL]DWLRQ�ILHOG�YDOXHV�IRUWKLV�DXWKRUL]DWLRQ�

�� 7R�SULQW�WKLV�LQIRUPDWLRQ��FKRRVH9DOXHV�→�3ULQW�

1

2

3a

3b

4

This iswhat ismissing

This iswhat iscurrentlyassigned

Error message

Page 270: Amez 46 all

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–4

7R�DGG�WKH�PLVVLQJ�DXWKRUL]DWLRQ�WR�WKH�XVHU·V�FXUUHQW�DXWKRUL]DWLRQ�SURILOH�XVLQJ�WKH3URILOH�*HQHUDWRU��3*���VHH�FKDSWHU����,QVHUWLQJ�0LVVLQJ�$XWKRUL]DWLRQV��$OVR�UHIHU�WR�WKH6$31HW�²�5���)URQWHQG�QRWH�QXPEHUV�������DQG��������IRUPHUO\�266�QRWHV��

6\VWHP�7UDFH�8VLQJ�7UDQVDFWLRQ�67��

<RX�FDQ�XVH�WKH�V\VWHP�WUDFH�WR�UHFRUG�DXWKRUL]DWLRQ�FKHFNV�LQ�\RXU�RZQ�VHVVLRQ�DQG�RWKHUXVHUV·�VHVVLRQV��6WDUW�WUDQVDFWLRQ�67����V\VWHP�WUDFH��DQG�UXQ�WKH�WUDQVDFWLRQ�WKH�XVHU�LVKDYLQJ�DXWKRUL]DWLRQ�SUREOHPV�ZLWK��$V�VRRQ�DV�\RX�JHW�VWXFN��VWRS�\RXU�WUDFH��:H�XVH�WKHWUDFH�IRU�DXWKRUL]DWLRQ�FKHFNV�WKRXJK�LW�LV�FDSDEOH�RI�WUDFLQJ�PXFK�PRUH��(YHU\WKLQJ�\RXKDYH�GRQH�LQ�WKH�5���6\VWHP�WKDW�UHTXLUHV�DXWKRULW\�FKHFNV�LV�UHFRUGHG�LQ�WKH�WUDFH�ZLWK�WKHREMHFW·V�ILHOGV�DQG�WKH�WHVWHG�YDOXHV�

8VLQJ�67����V\VWHP�WUDFH��VHYHUHO\�DIIHFWV�V\VWHP�SHUIRUPDQFH�

([DPSOH�

,Q�WKH�IROORZLQJ�H[DPSOH��ZH�GHPRQVWUDWH�KRZ�WKH�DGPLQLVWUDWRU�FDQ�FUHDWH�D�V\VWHP�WUDFHRI�DQRWKHU�XVHU·V�VHVVLRQ��8VHU�)7$<(+��ZKR�KDV�EHHQ�DVVLJQHG�WKH�XVHU�UROH'$7$B(175<B&/(5.��LV�WU\LQJ�WR�UXQ�D�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�DXWKRUL]DWLRQDQG�RQH�WUDQVDFWLRQ��)%����IRU�ZKLFK�KH�KDV�QR�DXWKRUL]DWLRQ��$W�WKH�VDPH�WLPH��WKHDGPLQLVWUDWRU�XVHV�WUDQVDFWLRQ�67���WR�FUHDWH�D�V\VWHP�WUDFH�IRU�WKH�DWWHPSWV�RI�XVHU)7$<(+�

7R�VHW�XS�WKH�V\VWHP�WUDFH�WUDQVDFWLRQ�

�� 6WDUW�WKH�WUDQVDFWLRQ�67��¥�6\VWHP�7UDFH�

1

Page 271: Amez 46 all

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Release 4.6A/B12–5

&KHFN�WKH�7UDFH�VWDWXV�EHIRUH�XVLQJ�WKH�V\VWHP�WUDFH��,I�WKH�WUDFH�LV�DFWLYH��GR�QRW�LQWHUIHUH�EHFDXVH�WKHUH�LV�RQO\�RQH�WUDFH�V\VWHP�IRU�HDFK�5���LQVWDQFH�

�� <RX�FDQ�VHH�LI�DQRWKHU�XVHU�KDV�XVHGWKH�V\VWHP�WUDFH�DQG�ZKHQ�LW�KDVEHHQ�DFWLYDWHG�

�� 0DQ\�GLIIHUHQW�7UDFH�FRPSRQHQWVH[LVW�DQG�HDFK�FDQ�EH�VZLWFKHG�RQZLWK�LWV�RZQ�IODJ��DQG�ILOWHU��

�� 6RPH�VHOHFWLRQV�DUH�GLUHFWO\�YLVLEOHLQ�WKH�FKHFNER[HV��(QVXUH�WKDW�RQO\WKH�$XWKRUL]DWLRQ�FKHFN�FKHFNER[�LVVHOHFWHG�

�� 2WKHU�WUDFH�FRPSRQHQW�VHOHFWLRQV�DUHJURXSHG�DQG�PLJKW�FRQWDLQ�RQO\SDUWLDO�VHOHFWLRQV��&KHFN�DOO� LFRQVWR�HQVXUH�WKDW�QRWKLQJ�LV�VHOHFWHG�

�� 7R�UHVWULFW�WKH�WUDFH�WR�D�VSHFLILF�XVHURU�VHVVLRQ��FKRRVH�(GLW�→�)LOWHU�→6KDUHG�

7KH�WUDFH�ILOH·V�QDPH�DQG�VWRUDJH�ORFDWLRQ�LV�VKRZQ�LQ�WKH�ILHOG�&XUUHQW�WUDFH�ILOH��7KH�WUDFHLV�DGGHG�WR�WKH�H[LVWLQJ�ILOH�XQWLO�WKH�PD[LPXP�ILOH�VL]H�LV�UHDFKHG��7KHQ�D�QHZ�ILOH�QHHGVWR�EH�FUHDWHG��VHH�ODWHU�LQ�WKLV�VHFWLRQ��

�� (QWHU�WKH�QDPH�RI�WKH�XVHU�IRU�ZKLFK\RX�ZRXOG�OLNH�WR�UXQ�WKH�WUDFH�,Q�RXU�H[DPSOH�ZH�ZDQW�WR�WUDFHXVHU�)7$<(+ªV�WUDQVDFWLRQV�

�� &KRRVH�%DFN�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�ILOWHU�WKHGDWD�IRU�HLWKHU�D�FHUWDLQ�WUDQVDFWLRQ�RUSURJUDP�

�� 2Q�WKH�6\VWHP�7UDFH�VFUHHQ��FKRRVH(GLW�→�:ULWH�RSWLRQV�

2

3

4

5

6

tech

Tip

7

8

10

11

Page 272: Amez 46 all

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–6

��� 7R�VDYH�\RXU�WUDFH�RQ�WKH�KDUG�GULYH�VHOHFW�7UDFH��:ULWH�WR�GLVN�

��� &KRRVH�%DFN�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�HLWKHU�GHILQH�D�WLPH�IUDPH�IRU�WKH�WUDFH�WR�UXQ�RU�WR�XVH�WKHEXIIHU�

��� 7R�VDYH�\RXU�VHWWLQJV�IRU�WKH�QH[WWLPH�\RX�XVH�WKH�WUDFH��FKRRVH�(GLW→�6HWWLQJV�→�:ULWH�WR�GDWDEDVH�

��� <RXU�GDWD�LV�VDYHG�ZLWK�WKHIROORZLQJ�VHWWLQJV��&OLHQW��XVHUQDPH�GHIDXOW�

7KH�V\VWHP�LV�QRZ�UHDG\�WR�EHJLQWKH�WUDFH��$W�WKLV�WLPH��ZHUHFRPPHQG�WKDW�\RX�KDYH�WKH�XVHU·VVHVVLRQ�\RX�ZRXOG�OLNH�WR�WUDFH�UHDG\�RU�RSHQ�DQRWKHU�VHVVLRQ�WR�WUDFH\RXU�RZQ�WUDQVDFWLRQ��

��� &KRRVH�7UDFH�RQ�

7R�XVH�\RXU�LQGLYLGXDO�VHWWLQJV�WKH�QH[W�WLPH�\RX�VWDUW�WKH�WUDFH��FKRRVH�(GLW�→�6HWWLQJV→�5HDG�IURP�GDWDEDVH��$OO�WKH�FKHFNPDUNV�\RX�VHW�ZLOO�DSSHDU�LQ�WKH�FRUUHVSRQGLQJFKHFNER[HV�

��� &KRRVH�<HV�

)URP�QRZ�RQ�HYHU\�DFWLRQ�WKDW�XVHU)7$<(+�SHUIRUPV�LV�UHFRUGHG�LQ�WKHWUDFH�

12

13

14

15

Page 273: Amez 46 all

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Release 4.6A/B12–7

��� &KDQJH�WR�WKH�XVHU·V�VHVVLRQ�\RXZDQW�WR�WUDFH�

7KH�XVHU�VKRXOG�QRZ�UXQ�WKHWUDQVDFWLRQV�\RX�ZRXOG�OLNH�WRLQYHVWLJDWH��,Q�RXU�H[DPSOH��ZH�ILUVWVWDUW�WUDQVDFWLRQ�)%����WKHQ�)%���

��� %HJLQ�WKH�WUDQVDFWLRQ��IRU�H[DPSOH�)%���¥�'LVSOD\�GRFXPHQWV��

7KH�WUDQVDFWLRQ�VWDUWV�EHFDXVH�XVHU)7$<(+�LV�DXWKRUL]HG�WR�SHUIRUP�LW�

��� %HJLQ�DQRWKHU�WUDQVDFWLRQ��IRUH[DPSOH��FB04��

6LQFH�XVHU�)7$<(+�LV�QRW�DXWKRUL]HGWR�SHUIRUP�)%����KH�UHFHLYHG�WKHHUURU�PHVVDJH��<RX�DUH�QRW�DXWKRUL]HGWR�XVH�WUDQVDFWLRQ�)%���

7KH�V\VWHP�DOVR�MXPSV�EDFN�WR�WKHXVHU�PHQX�

17

18

Error message

Page 274: Amez 46 all

Chapter 12: Tips and Troubleshooting

System Trace Using Transaction ST01

Authorizations Made Easy12–8

��� $IWHU�FRPSOHWLQJ�\RXU�V\VWHP�WUDFH�VZLWFK�EDFN�WR�WKH�RWKHU�VHVVLRQ��WKHWUDFH�VHVVLRQ�

��� &KRRVH� �7UDFH�RII�

��� &KRRVH�<HV�WR�VWRS�WUDFLQJ�

7KH�WUDFH�LV�QRZ�UHDG\�WR�DQDO\]H�6HH�WKH�QH[W�VHFWLRQ�RQ�KRZ�WRDQDO\]H�D�WUDFH�

20

21

Page 275: Amez 46 all

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Release 4.6A/B12–9

$QDO\]LQJ�D�:ULWWHQ�7UDFH�)LOH

�� 7R�GLVSOD\�WKH�WUDFH�UHVXOWV��IURP�WKH6\VWHP�7UDFH�ZLQGRZ��FKRRVH�)LOH�OLVW�

�� 6HOHFW�\RXU�WUDFH�

,I�\RX�VHH�PRUH�WKDQ�RQH�WUDFH��VHOHFW�WKHFRUUHFW�RQH��7R�GHWHUPLQH�WKH�WUDFHQDPH��VHH�WKH�7HFK7DON�RQ�SDJH���²���

�� &KRRVH� �$QDO\]H�

%H�DZDUH�WKDW�WKH�WUDFH�ILOH�FDQ�EH�H[WUHPHO\�ODUJH��%H�SDWLHQW�EHFDXVH�LW�PD\�WDNH�VRPHWLPH�WR�GLVSOD\�LW�

2

3

1

Page 276: Amez 46 all

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Authorizations Made Easy12–10

�� 6HOHFW�DOO�WKH�RSWLRQV�\RX�ZDQW�WRFRQVLGHU�LQ�\RXU�DQDO\VLV��IRUH[DPSOH��7UDFH�IRU�DXWKRUL]DWLRQFKHFNV��

,I�HYHU\WKLQJ�LV�VHOHFWHG��LW�PLJKW�EHHDVLHU�WR�FKRRVH� �WR�GHVHOHFW�DOO�ILUVWDQG�WKHQ�UHVHOHFW�RQH�RU�PRUHFKHFNER[HV�

�� 8QGHU�5HVWULFWLRQV��HQWHU�WKH�GHVLUHGXVHU�

�� &KRRVH� $QDO\]H�

�� 7KH�ILUVW�SDJH�RI�WKH�WUDFH�ILOHDSSHDUV��%\�GHIDXOW��:LWK�DXWKRULW\FKHFN�VKRXOG�EH�VHOHFWHG�

�� 6FUROO�GRZQ�XQWLO�\RX�VHH�WKHWUDQVDFWLRQV�WKDW�ZHUH�XVHG�E\�WKHXVHU�

7

4

5

6

Page 277: Amez 46 all

Chapter 12: Tips and Troubleshooting

Analyzing a Written Trace File

Release 4.6A/B12–11

�� 6LQFH�WKH�WUDFH�OLVWV�FDQ�EH�YHU\ODUJH��WKH�RXWSXW�LV�FRPSUHVVHG��7KH1XPEHU�RI�UHFRUGV�SULQWHG�LV�WKHQXPEHU�RI�OLQHV�FXUUHQWO\�GLVSOD\HG�

��� 7KHVH�OLQHV�DSSHDU�LQ�WKH�ER[�HV�DERYH�WKH�1XPEHU�RI�UHFRUGV�SULQWHG�,Q�RXU�H[DPSOH��DOO�WKHDXWKRUL]DWLRQV�FKHFNHG�ZLWK�WKHUHTXLUHG�ILHOG�YDOXHV�KDYH�DSSHDUHG�7KLV�LV�WKH�LQIRUPDWLRQ�\RX�DUHORRNLQJ�IRU�

��� 7KH�UHWXUQ�FRGH�IRU�HDFK�RI�WKHVHDXWKRUL]DWLRQ�FKHFNV�DOVR�DSSHDUV�< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�LW�LV�RND\�

< 7KH�UHWXUQ�FRGH�IRU�)%���LV��ZKLFK�PHDQV�WKH�FKHFN�KDV�IDLOHG�

��� 7KH�WH[W�VKRZV�WKH�REMHFW�WKDW�ZDVFKHFNHG�

��� 7KH�ODVW�LWHP�RQ�WKH�OLQH�LV�WKHWUDQVDFWLRQ�FRGH�WKDW�ZDV�FKHFNHG�

,I�WKH�UHWXUQ�FRGH�LV�

< (TXDO�WR����WKH�DXWKRUL]DWLRQ�FKHFN�LV�RND\< *UHDWHU�WKDQ����WKH�DXWKRUL]DWLRQ�FKHFN�LV�QRW�RND\

9

10

11

10

11 12 13

12 13

Page 278: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–12

5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV

2YHUYLHZ

7KH�EDVLV�IRU�DOO�VZLWFKHV�LV�WKH�DFWLYDWLRQ�RI�WKH�3*��<RX�FDQ�DOVR�VZLWFK�WKH�5)&�6B7&2'(��DQG�JOREDO�GHDFWLYDWLRQ�VZLWFKHV��%DVHG�RQ�WKHVH��\RX�FDQ�GHDFWLYDWHDXWKRUL]DWLRQ�FKHFNV�XVLQJ�68����,QVLGH�WKH�DFWLYLW\�JURXSV�\RX�FDQ�LQDFWLYDWH�DXWKRUL]DWLRQREMHFWV�DQG�VHW�WKH�DFWLYLW\�JURXS�DQG�XVHU�DVVLJQPHQW�YDOLGLW\�SHULRG�

Profile Generator

RFC, S_TCODE and global deactivation switches

SU24 switches

AG and AG-User assignments

,Q�WKH�IROORZLQJ�VHFWLRQV��ZH�GHVFULEH�WKH�VLQJOH�OD\HUV�LQ�PRUH�GHWDLOV�

(QDEOLQJ�WKH�3URILOH�*HQHUDWRU

%HIRUH�FRQWLQXLQJ�ZLWK�WKLV�VHFWLRQ��\RX�QHHG�WR�KDYH�DW�OHDVW�VHW�DQG�DFWLYDWHG�WKH�V\VWHPSDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV� �<��GHIDXOW�YDOXH���DQG�UXQ�68���ZKLFK�FRSLHV�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�DQG�ILHOG�YDOXHV�IURP�WDEOH�862%7�DQG�862%;�LQWR�WKHFXVWRPHU�WDEOHV�

(QDEOLQJ�'LVDEOLQJ�2WKHU�6\VWHP�ZLGH�&KHFNV

(QDEOLQJ�DXWK�WFRGHVBQRWBFKHFNHG

5���LV�QRW�IXOO\�D�WUDQVDFWLRQ�EDVHG�DXWKRUL]DWLRQ�V\VWHP��,W�LV�DOVR�DQ�REMHFW�RULHQWHGDXWKRUL]DWLRQ�V\VWHP��$�EXVLQHVV�SURFHVV�LQ�5���FDQ�EH�DFFHVVHG�E\�VHYHUDO�PHFKDQLVPV��IRUH[DPSOH��WUDQVDFWLRQ�FRGH��%$3,��HWF����EXW�WUDQVDFWLRQV�DUH�PRVW�FRPPRQ��5���SURWHFWVSDUWLFXODU�REMHFWV�RU�SLHFHV�RI�WKH�EXVLQHVV�SURFHVV�ZLWKLQ�WKH�WUDQVDFWLRQ��5���GHILQHV�ZKLFKREMHFWV�DUH�´VHFXUDEOHµ�LQ�WKH�VWDQGDUG�V\VWHP��DQG�RQH�EXVLQHVV�SURFHVV�RU�WUDQVDFWLRQ�FRGHPD\�UHTXLUH�DFFHVV�WR�D�YDU\LQJ�QXPEHU�RI�SUHGHILQHG�REMHFWV��+RZHYHU��5���DOVR�XVHV�WKHWUDQVDFWLRQ�FRGH�DV�WKH�´ILUVW�OLQH�RI�GHIHQVHµ�WR�SUHYHQW�VRPHRQH�IURP�DFFHVVLQJ�SDUWV�RI�WKHV\VWHP��,Q�WKH�HYHQW�WKDW�D�XVHU�HQWHUV�D�WUDQVDFWLRQ�FRGH�WR�SHUIRUP�D�WDVN��WKH�V\VWHPFKHFNV�WKH�XVHU·V�DXWKRUL]DWLRQ�REMHFW�6B7&2'(�WR�HQVXUH�WKH\�KDYH�WKH�FRUUHFW�6B7&2'(WUDQVDFWLRQ�FRGH�EHIRUH�FRQWLQXLQJ��,Q�FHUWDLQ�FDVHV��\RX�PD\�ZLVK�WR�HOLPLQDWH�WKLV�´ILUVWOLQH�RI�GHIHQVHµ�LI�\RX�ILQG�LW�FXPEHUVRPH�WR�SURWHFW�HDFK�DQG�HYHU\�WUDQVDFWLRQ�FRGH�LQ�WKH

Page 279: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–13

V\VWHP��$V�VXFK��\RX�FDQ�GLVDEOH�WKH�FKHFN�IRU�6B7&2'(�XVLQJ�WKH�V\VWHP�ZLGH�SURILOHSDUDPHWHU�DXWK�WFRGHVBQRWBFKHFNHG��,Q�WKH�V\VWHP��6B7&2'(�LV�DFWLYH�E\�GHIDXOW�

(QDEOLQJ�DXWK�UIFBDXWKRULW\BFKHFN

6$3�KDV�YDVWO\�HQKDQFHG�LWV�XVH�RI�WKH�5)&��UHPRWH�IXQFWLRQ�FDOO��IXQFWLRQDOLW\�LQ�UHFHQWUHOHDVHV�RI�WKH�5���6\VWHP��5)&V�DUH�XVHG�WKURXJKRXW�WKH�V\VWHP�VR�WKDW�RQH�SRUWLRQ�RI�WKH5���6\VWHP�FDQ�´FRPPXQLFDWHµ�ZLWK�DQRWKHU�SDUW�RI�5����IRU�H[DPSOH��FUHDWLQJ�D�VDOHVRUGHU�YLD�ZRUNIORZ�PD\�LQYRNH�DQ�5)&�WR�FRPPXQLFDWH�WKH�LQIRUPDWLRQ�WKDW�LV�EHLQJSDVVHG�LQWR�WKH�VDOHV�RUGHU�FUHDWH�IXQFWLRQ�LQ�ZRUNIORZ�SURFHVVLQJ���5)&·V�DUH�DOVR�FULWLFDO�LQSHUPLWWLQJ�V\VWHPV�DQG�DSSOLFDWLRQV�H[WHUQDO�WR�5����IRU�H[DPSOH��D�ZHE�SDJH��WRFRPPXQLFDWH�ZLWK�5���ZLWK�%$3,V��$V�%$3,V�XWLOL]H�5)&�IXQFWLRQDOLW\��DXWKRUL]DWLRQFKHFNV�DUH�SHUIRUPHG�EDVHG�RQ�WKH�%$3,�XVHG��2QH�RI�5��·V�FRUH�DSSURDFKHV�WR�VHFXULQJ�WKH5)&�IXQFWLRQDOLW\�LV�WR�LQWURGXFH�DQRWKHU�QHZ�DXWKRUL]DWLRQ�REMHFW�FDOOHG�6B5)&�ZKLFKJLYHV�SHRSOH�DFFHVV�WR�SDUWLFXODU�JURXSV�RI�5)&V��,Q�SDUWLFXODU��HYHU\�5)&�EHORQJV�WR�DIXQFWLRQ�JURXS��0DQ\�5)&V�FDQ�EHORQJ�WR�RQH�IXQFWLRQ�JURXS��IRU�H[DPSOH��WKH�IXQFWLRQJURXS�IRU�00�3XUFKDVH�2UGHU�3URFHVVLQJ���7KH�DXWKRUL]DWLRQ�REMHFW�6B5)&�FDQ�EH�UHVWULFWHGWR�JLYH�XVHUV�DFFHVV�WR�SDUWLFXODU�IXQFWLRQ�JURXSV��+RZHYHU��WKH�WUHPHQGRXV�DPRXQW�RI5)&V�LQ�����FRPSOLFDWHV�ZKLFK�IXQFWLRQ�JURXSV�\RX�VKRXOG�JLYH�SHRSOH�DFFHVV�WR��7KHUHIRUH�5���SURYLGHV�D�PHFKDQLVP�WR�GLVDEOH�WKH�FKHFN�DJDLQVW�WKH�6B5)&�DXWKRUL]DWLRQ�REMHFW�DW�DV\VWHP�ZLGH�OHYHO��7KH�V\VWHP�ZLGH�SURILOH�SDUDPHWHU�DXWK�UIFBDXWKRULW\BFKHFN�FDQ�EHFKDQJHG�IURP�LWV�EODQN�GHIDXOW�WR�RQH�RI�WKH�IROORZLQJ�< �� �1R�DXWKRUL]DWLRQ�FKHFN< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�VDPH�XVHU��QR�FKHFN�IRU�VDPH�XVHU�FRQWH[W

DQG�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��QR�FKHFN�IRU�65)&�)8*5�< �� �$XWKRUL]DWLRQ�FKHFN�DFWLYH��65)&�)8*5�DOVR�FKHFNHG�

*OREDOO\�'HDFWLYDWLQJ�RU�$FWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV

<RX�FDQ�DOVR�JOREDOO\�GHDFWLYDWH�RU�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�ZLWK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��7KH�V\VWHP�GRHV�QRW�H[HFXWH�DQ\�DXWKRUL]DWLRQ�FKHFNV�IRUGHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��<RX�KDYH�VHYHUDO�RSWLRQV�WR�UHDFK�WUDQVDFWLRQ$87+B6:,7&+B2%-(&76��<RX�FDQ�XVH�WKH�,0*��VHH�VWHS�����WUDQVDFWLRQ�SU25��VHH�VWHS���RU�XVH�WUDQVDFWLRQ�auth_switch_objects�GLUHFWO\�

Page 280: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–14

�� &KRRVH� �QH[W�WR�6ZLWFK�RIIDXWKRUL]DWLRQ�FKHFNV�JOREDOO\��RSWLRQDO�DQG�FRQWLQXH�ZLWK�VWHS����RU�HQWHUsu25�DQG�FRQWLQXH�ZLWK�VWHS����

�� ,Q�WUDQVDFWLRQ�68����FKRRVH����'HDFWLYDWH�DXWKRUL]DWLRQ�REMHFW

JOREDOO\�

Page 281: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–15

�� 5HDG�WKH�LQIRUPDWLRQ�FDUHIXOO\�DQGFKRRVH� �

�� 'HDFWLYDWH�DQ�DXWKRUL]DWLRQ�REMHFWE\�GHVHOHFWLQJ�WKH�FKHFNER[�QH[W�WRLW��7KH�GHVHOHFWHG�OLQH�LV�KLJKOLJKWHGLQ�UHG�

�� &KRRVH� �

�� 7R�DFWLYDWH�\RXU�GDWD��FKRRVH� �

�� )RU�D�GHWDLOHG�H[SODQDWLRQ�DERXW�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH� �QH[WWR�WKH�DXWKRUL]DWLRQ�REMHFW�

&KRRVH� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RQ�DQG� �WR�VZLWFK�WKH�WHFKQLFDO�QDPHV�RII�7R�YLHZ�WKH�FRORU�OHJHQG��FKRRVH� �

6 Tip

5

3

4 7

Tip

Page 282: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–16

�� <RX�UHFHLYH�GHWDLOHG�LQIRUPDWLRQDERXW�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�

�� &ORVH�WKH�ZLQGRZ�WR�UHWXUQ�

:KHQ�\RX�VDYH�DQG�DFWLYDWH�\RXU�GDWD��WKH�V\VWHP�DOVR�FKHFNV�WKH�DXWKRUL]DWLRQ�REMHFW6B86(5B2%-�

7KH�YDOXHV�IRU�WKH�V\VWHP�SDUDPHWHU�DXWK�REMHFWBGLVDEOLQJBDFWLYH�FDQ�EH�DQ�;�RU�EODQN��7KH;�LQGLFDWHV�WKDW�WKH�SDUDPHWHU�LV�DFWLYH�DQG�WKH�EODQN�LQGLFDWHV�WKDW�LW�LV�QRW��,I�LW�LV�QRWDFWLYH��ZLWK�68���JRW�VZLWFKHG�RII��\RXU�FKDQJHV�ZLOO�QRW�DIIHFW�DQ\WKLQJ��+RZHYHU��WKHGHIDXOW�YDOXH�LV�VHW�WR�DFWLYH�

8

9

Page 283: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–17

��� $XWKRUL]DWLRQ�REMHFWV�EHJLQQLQJZLWK�6B�RU�3B�FDQQRW�EH�VZLWFKHG�RII�

,I�\RX�WU\�WR�VZLWFK�WKRVH�REMHFWV�RIIDQG�VDYH�WKHP��\RX�ZLOO�UHFHLYH�DZDUQLQJ�PHVVDJH�

��� 7KH�V\VWHP�LJQRUHV�WKDW�\RX�KDYHVZLWFKHG�RII�WKRVH�DXWKRUL]DWLRQREMHFWV�

��� &KRRVH� �

<RX�FDQQRW�JOREDOO\�GHDFWLYDWH�DXWKRUL]DWLRQ�REMHFWV�EHJLQQLQJ�ZLWK�6B��%DVLV��RU�3B�+5��LQ�WUDQVDFWLRQ�$87+B6:,7&+B2%-(&76�

1R�DXWKRUL]DWLRQ�GDWD�LV�LQVHUWHG�LQ�WKH�3*�IRU�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��,Q�DUHOHDVH�XSJUDGH��WKH�V\VWHP�GRHV�QRW�GLVSOD\�WKH�WUDQVDFWLRQV�ZKHUH�DXWKRUL]DWLRQ�GDWDZLOO�EH�UHSURFHVVHG�LI�WKH�FRUUHVSRQGLQJ�DXWKRUL]DWLRQ�REMHFW�LV�JOREDOO\�GHDFWLYDWHG�

:KHQ�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��\RX�PD\�KDYH�WRPDLQWDLQ�WKH�DXWKRUL]DWLRQ�GDWD�IRU�PDQ\�DFWLYLW\�JURXSV�

,I�\RX�DFWLYDWH�SUHYLRXVO\�GHDFWLYDWHG�DXWKRUL]DWLRQ�REMHFWV��WKHVH�REMHFWV�DUH�QRWFRQWDLQHG�LQ�DQ\�DFWLYLW\�JURXSV��,Q�WKLV�FDVH��LQ�WKH�WUDQVDFWLRQ�3)&*�RQ�WKH

10

12

11

Page 284: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–18

$XWKRUL]DWLRQV�WDE��FKRRVH� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�WR�JHQHUDWH�SURILOHV�DQG�WKHRSWLRQ�5HDG�ROG�VWDWXV�DQG�PHUJH�ZLWK�WKH�QHZ�GDWD��0DLQWDLQ�DQ\�PLVVLQJ�DXWKRUL]DWLRQYDOXHV�DQG�UHJHQHUDWH�WKH�SURILOH�

3DUDPHWHU�7UDQVDFWLRQV

7KH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ�WR�RWKHU�WUDQVDFWLRQV��7KHVH�WUDQVDFWLRQV�ZRUNZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��ZKLFK�LV�UHVWULFWHG�E\�WKH�IDFW�WKDW�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�

<RX�FDQQRW�H[FOXGH�DXWKRUL]DWLRQ�REMHFWV�IURP�GLUHFW�XVH�LQ�SDUDPHWHU�WUDQVDFWLRQV��EXW�RQO\ZLWK�WKH�FRUUHVSRQGLQJ�FRUH�WUDQVDFWLRQ�

([DPSOH�

3DUDPHWHU�WUDQVDFWLRQ� �)��9��0DQDJHPHQW�RI�'RFXPHQW�$UFKLYHV�

&RUH�WUDQVDFWLRQ� �6$5$��$UFKLYH�0DQDJHPHQW�

7R�VHW�WKH�FKHFN�LQGLFDWRU�RI�WUDQVDFWLRQ�)��9�WR�1��QR�FKHFN���\RX�QHHG�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�RI�WKH�FRUH�WUDQVDFWLRQ�6$5$��<RX�FDQ�ILQG�WKH�QDPH�RI�WKLV�WUDQVDFWLRQ�LQ�WKHULJKW�KDQG�FROXPQ�7&RGH�RYHUYLHZ�LQ�WUDQVDFWLRQ�68����,I�\RX�GRXEOH�FOLFN�RQ�WKHSDUDPHWHU�WUDQVDFWLRQ�FRGH�LQ�ILHOG�7&RGH��WKH�V\VWHP�EUDQFKHV�GLUHFWO\�LQWR�WKH�FKHFNLQGLFDWRU�PDLQWHQDQFH�RI�WKH�FRUH�WUDQVDFWLRQ�

,I�WKH�DXWKRUL]DWLRQ�REMHFW�IRU�SDUDPHWHU�WUDQVDFWLRQ�)��9�LV�VHW�WR�&��FKHFN���EXW�XQGHU�WKHFRUH�WUDQVDFWLRQ�LW�LV�VHW�WR�&0��FKHFN�PDLQWDLQ���WKH�ILHOG�YDOXHV�IRU�6$5$�ZLOO�EHVXJJHVWHG�DV�GHIDXOWV�LQ�WKH�3*��,I�WKH�DXWKRUL]DWLRQ�REMHFW�LV�DOVR�VHW�WR�&0�LQ�)��9��WKHILHOG�YDOXHV�PDLQWDLQHG�IRU�)��9�ZLOO�EH�UHFRPPHQGHG�DV�GHIDXOWV�LQ�WKH�3*��DQG�WKH�HQWULHVIRU�6$5$�ZLOO�EH�RYHUZULWWHQ��<RX�FDQ�PDLQWDLQ�RU�RYHUZULWH�WKH�ILHOG�YDOXHV�RI�WKH�FRUHWUDQVDFWLRQ�IRU�SDUDPHWHU�WUDQVDFWLRQV�LQ�68���

'HDFWLYDWLQJ�$XWKRUL]DWLRQ�&KHFNV�8VLQJ�68��

2SWLRQDO��1RUPDOO\�\RX�GR�QRW�KDYH�WR�PDNH�DQ\�FKDQJHV�LQ�WUDQVDFWLRQ�68���

+RZHYHU��LI�\RX�GR�PDNH�FKDQJHV�LQ�68����WKH�FKDQJHV�PXVW�EH�PDGH�LQ�WKH�'(9�V\VWHPDQG�WUDQVSRUWHG�WR�RWKHU�V\VWHPV��1HYHU�PDNH�FKDQJHV�LQ�DQ\�RWKHU�V\VWHP�

,Q�WKH�3*��\RX�KDYH�WKH�RSWLRQ�WR�GHDFWLYDWH�DQG�DFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�DJDLQVWGLIIHUHQW�DXWKRUL]DWLRQ�REMHFWV�

:KHQHYHU�\RX�SHUIRUP�5���WUDQVDFWLRQV��PDQ\�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG�WKDW�DULVHWKURXJK�ZRUN�DUHDV�FDOOHG�LQ�WKH�EDFNJURXQG��)RU�WKH�DXWKRUL]DWLRQ�FKHFNV�WR�EH�VXFFHVVIXO�WKH�XVHU�PXVW�KDYH�WKH�DSSURSULDWH�DXWKRUL]DWLRQV��)RU�WKLV�UHDVRQ��PRVW�XVHUV�UHFHLYH�PRUHDXWKRUL]DWLRQV�WKDQ�QHFHVVDU\��OHDGLQJ�WR�DQ�LQFUHDVHG�PDLQWHQDQFH�ORDG��%XW�WKH�FRUHWUDQVDFWLRQ�LV�DOZD\V�SURWHFWHG�E\�REMHFW�6B7&2'(��DQG�DXWKRUL]DWLRQ�FKHFNV�WKDW�EHORQJ�WR

Page 285: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–19

SXUH�EDFNJURXQG�IXQFWLRQV�DUH�GHDFWLYDWHG���7KLV�KDV�QRWKLQJ�WR�GR�ZLWK�EDFNJURXQGSURFHVVLQJ��

,Q�5����PDQ\�DXWKRUL]DWLRQ�REMHFWV�JR�XQXVHG�E\�PRVW�FXVWRPHUV��<RX�FDQ�GHDFWLYDWH�WKHDXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKH�REMHFWV�XVLQJ�WUDQVDFWLRQ�68�����0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV��7KLV�GHDFWLYDWLRQ�UHVXOWV�LQ�FOHDU�DXWKRUL]DWLRQ�SURILOHV�DQG�EHWWHUSHUIRUPDQFH�

<RX�FDQ�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ\�RI�WKH�IROORZLQJ�UHDVRQV�< 1RW�DOO�DXWKRUL]DWLRQ�REMHFWV�DUH�XVHG��IRU�LQVWDQFH��)B/)$�B%(.�< 0DQ\�DXWKRUL]DWLRQ�ILHOGV�KDYH�EHHQ�PDLQWDLQHG�ZLWK�DQ�DVWHULVN�� �< $XWKRUL]DWLRQ�SURILOHV�DUH�WRR�ODUJH< (DFK�WUDQVDFWLRQ�LV�FKHFNHG�E\�6B7&2'(< 1HHGOHVV�DXWKRUL]DWLRQ�FKHFNV�UHGXFH�WKH�WUDQVDFWLRQ�SHUIRUPDQFH

7KH�IROORZLQJ�H[DPSOHV�LOOXVWUDWH�ZKHQ�WR�XVH�68���< ,I�D�ZDUHKRXVH�ZRUNHU�UHPRYHV�JRRGV�IURP�WKH�ZDUHKRXVH��DQG�WKH�UHPDLQLQJ�VWRFN

IDOOV�VKRUW�RI�D�FULWLFDO�OLPLW��WKH�V\VWHP�WULJJHUV�HLWKHU�D�SXUFKDVLQJ�RUGHU��D�SURGXFWLRQRUGHU��RU�ERWK��7KHVH�RSHUDWLRQV�DUH�FDUULHG�RXW�EHFDXVH�RI�WKH�V\VWHP�VHWWLQJV�DQGWKHUHIRUH�UHTXLUH�QR�IXUWKHU�DFWLRQV�E\�ZDUHKRXVH�ZRUNHUV��$FFRUGLQJO\��WKHVH�ZRUNHUVVKRXOG�QRW�KDYH�DXWKRUL]DWLRQV�IRU�SXUFKDVH�RU�SURGXFWLRQ�RUGHUV��VR�WKH�FKHFN�DJDLQVWWKLV�REMHFW�VKRXOG�EH�GHDFWLYDWHG�

< $XWKRUL]DWLRQ�REMHFW�)B/)$�B%(.��9HQGRU��$FFRXQW�DXWKRUL]DWLRQ��SURWHFWV�WKH�YHQGRUPDVWHU�UHFRUGV�DW�DFFRXQW�OHYHO��7KDW�LV��ZLWK�WKLV�REMHFW��LW�LV�SRVVLEOH�WR�GLYLGH�WKHYHQGRUV�LQWR�JURXSV�DQG�RQO\�DVVLJQ�WKH�DFFRXQWLQJ�FOHUN�WKH�PDLQWHQDQFH�DXWKRUL]DWLRQIRU�YHQGRUV�IURP�D�FHUWDLQ�JURXS��,I�\RX�GR�QRW�ZDQW�WR�PDNH�DQ\�DXWKRUL]DWLRQV�DW�WKLVOHYHO�DQG�DOORZ�DOO�DFFRXQWLQJ�FOHUNV�WR�PDLQWDLQ�DOO�YHQGRUV��LW�LV�EHVW�WR�GHDFWLYDWH�WKLVREMHFW�

2QO\�LI�\RX�KDYH�VHW�WKH�FKHFN�LQGLFDWRU�WR�&0��&KHFN�0DLQWDLQ���ZLOO�WKH�DXWKRUL]DWLRQDQG�SUHGHILQHG�DXWKRUL]DWLRQ�ILHOG�YDOXHV�EH�GLVSOD\HG�IRU�FKDQJLQJ�

5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV

$XWKRUL]DWLRQ�FKHFNV�DUH�FDUULHG�RXW�ZKHUHYHU�WKH\�DUH�VSHFLILFDOO\�ZULWWHQ�LQWR�WKH�VRXUFHFRGH�RI�D�WUDQVDFWLRQ��+RZHYHU��ZLWK�WUDQVDFWLRQ�68���\RX�FDQ�VHW�FKHFN�LQGLFDWRUV�WRH[FOXGH�FHUWDLQ�DXWKRUL]DWLRQ�REMHFWV�IURP�DXWKRUL]DWLRQ�FKHFNV��<RX�FDQ�H[FOXGH�SDUWLFXODUDXWKRUL]DWLRQ�FKHFNV�HLWKHU�LQ�VSHFLILF�WUDQVDFWLRQV�RU�5���6\VWHP�ZLGH��ZLWKRXW�FKDQJLQJWKH�SURJUDP�FRGH�

%HIRUH�WKH�DXWKRUL]DWLRQ�SURILOH�LV�DXWRPDWLFDOO\�JHQHUDWHG��XVH�WKH�FKHFN�LQGLFDWRUV�WRFRQWURO�ZKLFK�REMHFWV�DSSHDU�LQ�WKH�3*�DQG�ZKLFK�ILHOG�YDOXHV�GLVSOD\�

Page 286: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–20

0DLQWDLQLQJ�&KHFN�,QGLFDWRUV�IRU�7UDQVDFWLRQ�&RGHV

7R�DFFHVV�WKH�WUDQVDFWLRQ�IRU�PDLQWDLQLQJ�FKHFN�LQGLFDWRUV��HQWHU�WUDQVDFWLRQ�SU24�LQ�WKH�&RPPDQG�ILHOG��RUQDYLJDWH�XVLQJ�WKH�,0*��,Q�WKH�IROORZLQJ�SURFHGXUH��ZH�VKRZ�\RX�KRZ�WR�JHW�WR�0DLQWDLQ�FKHFN�LQGLFDWRUWUDQVDFWLRQ�XVLQJ�WKH�,0*��WUDQVDFWLRQ�FRGH�SPRO���,I�\RX�HQWHU�SU24�GLUHFWO\��VWDUW�ZLWK�VWHS���

�� ,Q�WKH�,0*�IROORZ�WKH�PHQX�SDWK%DVLV�&RPSRQHQWV�→�6\VWHP$GPLQLVWUDWLRQ�→�8VHUV�DQG$XWKRUL]DWLRQV�→�0DLQWDLQ$XWKRUL]DWLRQV�DQG�3URILOHV�8VLQJ�WKH3URILOH�*HQHUDWRU�→�:RUN�RQ�6$3&KHFN�,QGLFDWRUV�DQG�)LHOG�9DOXHV�DQGFKRRVH� �QH[W�WR�WKDW�OLQH�

�� 6HOHFW�&KDQJH�WHVW�VWDWXV��WKLVWUDQVODWLRQ�LV�LQFRUUHFW��WKH�WH[WVKRXOG�UHDG�&KDQJH�FKHFN�LQGLFDWRU��

�� &KRRVH� �&KRRVH�

1

2

3

Page 287: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–21

�� 6HOHFW�0DLQWDLQ�FKHFN�LQGLFDWRUV�IRUWUDQVDFWLRQ�FRGHV�

�� (QWHU�HLWKHU�D�VLQJOH�WUDQVDFWLRQ�FRGH�IRU�H[DPSOH�MK01��RU�D�UDQJH�RIFRGHV�IRU�ZKLFK�\RX�ZDQW�WR�OLVW�WKHFKHFN�LQGLFDWRUV�

�� &KRRVH� �WR�H[HFXWH�

�� 6HOHFW�WKH�DSSURSULDWH�WUDQVDFWLRQ��LQRXU�H[DPSOH��RQO\�RQH�LV�VKRZQ��EXWPRUH�WKDQ�RQH�FRXOG�DSSHDU��

�� &KRRVH� �&KHFN�LQGLFDWRU�WR�GLVSOD\WKH�FXUUHQW�DFWLYH�FKHFN�LQGLFDWRUVIRU�DXWKRUL]DWLRQ�REMHFWV�LQ�WKHVHOHFWHG�WUDQVDFWLRQV�

,I�\RX�DUH�GHDOLQJ�ZLWK�D�SDUDPHWHUWUDQVDFWLRQ��WKH�FRUH�WUDQVDFWLRQ�DSSHDUVLQ�WKH�7FRGH��RULJLQDO��FROXPQ��)RU�PRUHLQIRUPDWLRQ��VHH�3DUDPHWHU�7UDQVDFWLRQVRQ�SDJH���²���

4

5

6

7

8

Tip

Page 288: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–22

$�OLVW�RI�DXWKRUL]DWLRQ�REMHFWVDSSHDUV�LQ�WKH�2EMHFW�FROXPQ�IRU�WKHVHOHFWHG�WUDQVDFWLRQ�LQYROYHG�ZLWKWKH�FKHFN�

�� &KRRVH� �)LHOG�YDOXHV�

1RWH��7KHUH�DUH�WKUHH�REMHFWV�WKDWKDYH�WKH�FKHFN�LQGLFDWRU�VHW�WR�&0�

7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�862%;B&�

([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV

&0� �&KHFN�0DLQWDLQ

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&� �&KHFN

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

1� �1R�FKHFN

< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8� �8QPDLQWDLQHG

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�

9

Page 289: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–23

7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��

��� 7KUHH�REMHFWV�JHW�GLVSOD\HG�ZLWKSUHGHILQHG�YDOXHV��VLQFH�RQO\�WKUHHREMHFWV�KDG�WKH�FKHFN�LQGLFDWRU�VHW�WR&KHFN�0DLQWDLQ�

��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU��FKRRVH�WR�WRJJOH�EHWZHHQ�GLVSOD\�DQG

FKDQJH�PRGH�

7KH�WDEOH�GLVSOD\HG�RQ�WKH�ULJKW�LVWDEOH�8627B&�

��� (QWHU�D�WUDQVSRUWDEOH�FKDQJH�UHTXHVWQXPEHU��RU�XVH� �WR�FUHDWH�D�QHZRQH�

��� &KRRVH� �

��� 7R�FKDQJH�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�IRU�RQH�RI�WKH�REMHFWV��FKRRVH�QH[W�WR�WKH�REMHFW·V�ILHOG�QDPH��IRU

H[DPSOH��WKH�REMHFW�)B/)$�B$33DQG�WKH�ILHOG�$33.=��

10

11

12

13

14

Page 290: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–24

��� 6HOHFW�WKH�GHVLUHG�YDOXH��IRUH[DPSOH��ZH�DGGHG�)�)LQDQFLDO$FFRXQWLQJ��

��� &KRRVH� �

��� 7KH�YDOXH�ZDV�DGGHG�

��� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHDQ\�FKDQJHV�\RX�PLJKW�KDYH�PDGH�

7R�GLVSOD\�WKH�ORQJ�WH[W�IRU�WKHDXWKRUL]DWLRQ�REMHFW��FKRRVH�2EMHFW�GHVFU�

��� ,Q�WKH�9DOXH��LQWHUYDO��FROXPQ�UHYLHZ�\RXU�FKDQJHV��WKLV�LV�WDEOH862%7B&��ZKLFK�UHSUHVHQWVFXVWRPHU�VHWWLQJV��

��� ,Q�WKH�6$3�YDOXH��LQWHUYDO��FROXPQ�QRWLFH�WKH�RULJLQDOO\�GHOLYHUHG�6$3GHIDXOW�YDOXHV��WKLV�LV�WDEOH�862%7�ZKLFK�UHSUHVHQWV�6$3�GHIDXOWV��9DOXHV�WKDW�KDYH�FKDQJHG�IURP�WKH6$3�GHIDXOWV�DUH�LQ�FRORU�

��� 7R�VDYH�\RXU�FKDQJHV��FKRRVH� �

��� &KRRVH� �RU� �6$3�GHIDXOWV�WR�KLGHWKH�6$3�GHIDXOW�YDOXHV�

7R�VNLS�\RXU�FKDQJHV��FKRRVH� �IRU�WKH�DSSURSULDWH�YDOXH�\RX�FKDQJHG�

15

16

17

18 Tip

19 20

Tip

21 22

22

Page 291: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–25

��� &KRRVH� �WR�VZLWFK�WR�FKDQJH�PRGHIRU�WKH�FKHFN�LQGLFDWRUV�

��� 7R�FKDQJH�D�FKHFN�LQGLFDWRU�IRU�DQREMHFW��FOLFN�LQ�WKH�DSSURSLDWHFROXPQ��8��1��&��&0��

1RWLFH�KRZ�WKH�FXUVRU�FKDQJHV�WR�DQLFRQL]HG�KDQG�DV�\RX�PRYH�RYHU�WKHFKHFN�LQGLFDWRUV�

,Q�WKLV�H[DPSOH��ZH�FOLFNHG�LQ�WKH�1FROXPQ�WR�VHW�WKH�FKHFN�LQGLFDWRU�IRUREMHFW�)B/)$�B%(.�WR�1R�FKHFN�

��� 7KH�FKHFN�LQGLFDWRU�KDV�VXFFHVVIXOO\EHHQ�FKDQJHG�WR�1��7KHUHIRUH�)B/)$�B%(.�ZLOO�QR�ORQJHU�EHFKHFNHG�LQ�WUDQVDFWLRQ�0.���

��� 6HOHFW�DQ�REMHFW�DQG�FKRRVH�$XWK��REM��WR�YLHZ�D�ZKHUH�XVHG

OLVW�

��� <RX�KDYH�WR�GHWHUPLQH�D�VSHFLILFWUDQVDFWLRQ�FRGH�UDQJH��7R�VHDUFKWKURXJK�DOO�H[LVWLQJ�WUDQVDFWLRQFRGHV��HQWHU�DQ�DVWHULVN�� ��

��� &KRRVH� �

24

23

26

25

27

28

Page 292: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–26

��� 7KH�JHQHUDWHG�OLVW�VKRZV�DOOWUDQVDFWLRQV�ZKHUH�WKH�VHOHFWHGDXWKRUL]DWLRQ�REMHFW�LV�XVHG�

��� &KRRVH� �

��� &KRRVH�6$3�GHIDXOWV�WR�GLVSOD\�WKH6$3�FKHFN�LQGLFDWRU�GHIDXOWV�LQ�WKHVDPH�OLVW�

29

30

31

Page 293: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–27

%RWK�WDEOH�HQWULHV�LQ�WDEOHV�862%;DQG�862%;B&�QRZ�DSSHDU�IRU�WKHVHOHFWHG�WUDQVDFWLRQ��LQ�WKLV�H[DPSOH�0.����

��� ,Q�WKH�&KHFN�,'�FROXPQ��UHYLHZ�WKHFXUUHQW�DFWLYH�FKHFN�LQGLFDWRUV�IRUWKLV�WUDQVDFWLRQ��HQWULHV�LQ�WDEOH862%;B&��

��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��UHYLHZWKH�6$3�FKHFN�LQGLFDWRUV�GHIDXOWYDOXHV��HQWULHV�LQ�WDEOH�862%;��

��� 7R�VNLS�\RXU�FKDQJHV��FKRRVH� �WRUHVHW�WR�WKH�6$3�FKHFN�LQGLFDWRUGHIDXOW�YDOXH�IRU�WKLV�DXWKRUL]DWLRQREMHFW��6HWWLQJV�WKDW�GLIIHU�IURP�6$3GHIDXOWV�DSSHDU�LQ�FRORU�

��� &KRRVH� �$XWK��REM��WR�DGG�D�QHZREMHFW�IRU�FKHFNLQJ��7KHUH�PXVW�DOVREH�DQ�$87+25,7<B&+(&.�FDOO�LQWKLV�SURJUDP�IRU�WKH�QHZ�REMHFW�

��� &KRRVH� �

��� &KRRVH� �

([FHSWLRQV

$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG��7UDQVDFWLRQV�ZKRVH�FKHFN�LQGLFDWRU�FDQQRW�EHFKDQJHG�EHFDXVH�RI�D�ORFDO�ORFN��(148(8(��RU�D�ORFN�LQ�WKH�FRUUHFWLRQ�DQG�WUDQVSRUWV\VWHP��IRU�REMHFW�FDWDORJ�HQWU\�5�75�686.��7FRGH!��DUH�DOVR�VKRZQ�LQ�FRORU��$�VKRUWHUURU�PHVVDJH�DSSHDUV�LQ�WKH�GHVFULSWLRQ�ILHOG�

,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��

,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��

�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�

�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�

32 33

34

36 37

35

Page 294: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–28

�� ,Q�WUDQVDFWLRQ�3)&*�VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�

�� 5HJHQHUDWH�WKH�SURILOH�

�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU��FKDQJHV�EHFRPH�DFWLYH�ZLWK�WKHQH[W�V\VWHP�ORJRQ�

0DVV�&KDQJH�RI�&KHFN�,QGLFDWRUV

<RX�FDQ�DOVR�JOREDOO\�FKDQJH�DXWKRUL]DWLRQ�FKHFNV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LQ�WUDQVDFWLRQVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW�RFFXUV��<RX�FDQ�DOVR�VSHFLILFDOO\�H[FOXGH�LQGLYLGXDOWUDQVDFWLRQV�IURP�WKH�JOREDO�FKDQJH�

7R�DFFHVV�WKH�WUDQVDFWLRQ�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV��HQWHU�WKH�WUDQVDFWLRQ�SU24LQ�WKH�&RPPDQG�ILHOG��RU�QDYLJDWH�XVLQJ�WKH�,0*�DV�GHVFULEHG�LQ�WKH�VHFWLRQ�EHIRUH��,Q�WKHIROORZLQJ�SURFHGXUH��ZH�VKRZ�KRZ�WR�JHW�WR�(GLW�FKHFN�LQGLFDWRUV�LQ�DOO�WUDQVDFWLRQV�E\HQWHULQJ�SU24�GLUHFWO\�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SU24�DQG�FKRRVH�(QWHU�

�� 6HOHFW�(GLW�FKHFN�LQGLFDWRUV�LQ�DOOWUDQVDFWLRQV�

�� (QWHU�WKH�GHVLUHG�$XWKRUL]DWLRQ�REMHFW�IRU�H[DPSOH��)B/)$B%(.�

�� &KRRVH� �

$�OLVW�RI�WUDQVDFWLRQV�LV�GLVSOD\HG�RQWKH�QH[W�VFUHHQ��7KH�HQWHUHGDXWKRUL]DWLRQ�REMHFW�DSSHDUV�ZLWKWKH�DSSURSULDWH�FKHFN�LQGLFDWRU�SHUWUDQVDFWLRQ�

2

3

4

Page 295: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–29

�� 7R�DOWHU�WKH�FKHFN�LQGLFDWRU�HLWKHU�IRUVHOHFWHG�WUDQVDFWLRQV�RU�JOREDOO\�FKRRVH�RQH�RI�WKH�IROORZLQJ�RSWLRQV�

D� 6HOHFW�WKH�WUDQVDFWLRQV�IRU�ZKLFK\RX�ZLVK�WR�FKDQJH�WKH�FKHFNLQGLFDWRU�

E� &KRRVH� �WR�VHOHFW�DOOWUDQVDFWLRQV�ILUVW�DQG�WKHQGHVHOHFW�LQGLYLGXDO�WUDQVDFWLRQV�DVQHFHVVDU\�

7R�HQVXUH�WKDW�WKH�3*�DFWXDOO\FUHDWHV�DQ�DXWKRUL]DWLRQ��ZH�QHHG�WRFKDQJH�WKH�FKHFN�LQGLFDWRU�IRU�WKHDSSURSULDWH�DXWKRUL]DWLRQ�REMHFWIURP�&��&KHFN��WR�&0�&KHFN�0DLQWDLQ��

�� 7R�VLPXOWDQHRXVO\�FKDQJH�WKH�FKHFNLQGLFDWRUV�IRU�WKH�VHOHFWHGWUDQVDFWLRQV��FKDQJH�WKH�FKHFNLQGLFDWRU�LQ�WKH�ILUVW�OLQH��ZKLFKFRQWDLQV�WKH�QDPH�RI�WKHDXWKRUL]DWLRQ�REMHFW��E\�FOLFNLQJ�LQWKH�FROXPQ�IRU�WKH�QHZ�FKHFNLQGLFDWRU�EHORZ��8��1��&��&0���:HFKRVH�&0�

7R�FKHFN�WKH�WUDQVDFWLRQ�H[HFXWHG�E\�WKH�WUDQVDFWLRQ�FRGH�GLVSOD\HG�LQ�FROXPQ�7FRGH��\RXFDQ�FKRRVH� �QH[W�WR�WKH�WUDQVDFWLRQ�DQG�LW�ZLOO�EH�H[HFXWHG�

([SODQDWLRQ�RI�&KHFN�,QGLFDWRUV

&0� �&KHFN�0DLQWDLQ

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&� �&KHFN

< $Q�DXWKRUL]DWLRQ�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

5a

5b

6

Page 296: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–30

1� �1R�FKHFN

< 7KH�DXWKRUL]DWLRQ�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8� �8QPDLQWDLQHG

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRUL]DWLRQ�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��WKHUHIRUH�ILHOG�YDOXHV�DUH�QRW

GLVSOD\HG�

7KH�FKHFN�LQGLFDWRU�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�LPSRUWDQW�IRU�WKH�3*��7KH�3*�RQO\FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�LI�WKH�FKHFN�LQGLFDWRU�LV�VHW�WR&KHFN�0DLQWDLQ��&0���3UHGHILQHG�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�DUH�DOUHDG\�PDLQWDLQHG�LQWKH�DXWKRUL]DWLRQ�RYHUYLHZ��<RX�FDQ�RQO\�SUHGHILQH�DXWKRUL]DWLRQ�YDOXHV�IRU�DQ�REMHFW�LIWKH�FKHFN�LQGLFDWRU�LV�VHW�WR�&KHFN�0DLQWDLQ��&0��

�� 2QO\�WKH�FKHFN�LQGLFDWRU�IRU�WKHWUDQVDFWLRQV�\RX�VHOHFWHG�KDYHFKDQJHG�

�� 2QFH�D�FKHFN�LQGLFDWRU�LQ�WKH�OLVW�LVVHW�WR�&0��&KHFN�0DLQWDLQ���WKH�)OG�YDOXHV�EXWWRQ�DSSHDUV��%\

FOLFNLQJ�WKLV�EXWWRQ��\RX�FDQPDLQWDLQ�WKH�DXWKRUL]DWLRQ�ILHOGYDOXHV�RI�WKH�VHOHFWHG�DXWKRUL]DWLRQREMHFW�IRU�DOO�WUDQVDFWLRQV�ZKRVHFKHFN�LQGLFDWRU�KDV�EHHQ�VHW�

�� &KRRVH� �6$3�GHIDXOWV�WR�FRPSDUHWKH�FXUUHQW�VHWWLQJV�ZLWK�WKH�6$3GHIDXOWV�

98

7

Page 297: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Release 4.6A/B12–31

��� 7KH�FKDQJHV�RI�WKH�FKHFN�LQGLFDWRUDUH�VKRZQ�LQ�UHG�

7R�KLJKOLJKW�DOO�WUDQVDFWLRQ�FRGHVWKDW�KDYH�FKDQJHG��FKRRVH�(GLW�→&KDQJHV�→�'LVSOD\�LQ�FRORU�

��� ,Q�WKH�&KHFN�,'�FROXPQ��QRWLFH�WKHFKDQJHV�\RX�PDGH��HQWULHV�LQ�WDEOH862%;B&��

��� ,Q�WKH�6$3�GHIDXOWV�FROXPQ��QRWLFHWKH�6$3�FKHFN�LQGLFDWRU�GHIDXOWYDOXHV��HQWULHV�LQ�862%;��

&KRRVH� �6$3�GHIDXOW�LI�\RX�ZDQW�WRUHVWRUH�WKH�VHOHFWHG�WUDQVDFWLRQV�WR�WKHLURULJLQDO�GHOLYHU\�VWDWXV�VHW�E\�6$3�'XULQJ�LQVWDOODWLRQ��WKLV�VWHS�UHVWRUHV�WKHFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�WR�WKHVHWWLQJ�LQ�WKH�5���6\VWHP�

��� &KRRVH� �&KHFN�,'�

��� &KRRVH�<HV�

([FHSWLRQV

$XWKRUL]DWLRQ�REMHFWV�IURP�WKH�%DVLV��6 ��DQG�+XPDQ�5HVRXUFHV�0DQDJHPHQWDSSOLFDWLRQV��3B ��3/2*��FDQQRW�EH�H[FOXGHG�IURP�FKHFNLQJ��EHFDXVH�WKH�ILHOG�YDOXHV�IRUWKHVH�REMHFWV�PXVW�DOZD\V�JHW�FKHFNHG�

10

11 12

13Tip

14

Page 298: Amez 46 all

Chapter 12: Tips and Troubleshooting

Reducing the Scope of Authorization Checks

Authorizations Made Easy12–32

,PSRUWDQW�,QIRUPDWLRQ�&RQFHUQLQJ�3URILOH�0DWFKXS�$IWHU�&KDQJHV�LQ�68��

,I�\RX�JHQHUDWHG�DXWKRUL]DWLRQ�SURILOHV�ZLWK�WKH�3*��DIWHU�PDNLQJ�FKDQJHV�WR�FKHFNLQGLFDWRUV�LQ�WUDQVDFWLRQV��D�SURILOH�PDWFKXS�LV�UHTXLUHG��HYHQ�LI�WKH�3*�GRHV�QRW�LQGLFDWHWKLV�QHHG�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�SURILOHV��

�� $IWHU�PDNLQJ�FKDQJHV�WR�FKHFN�LQGLFDWRUV�ZLWK�68����UHPHPEHU�WKH�WUDQVDFWLRQV�WKDWDUH�DIIHFWHG�E\�WKH�FKDQJH�

�� )LQG�RXW�LQ�ZKLFK�DFWLYLW\�JURXSV�WKHVH�WUDQVDFWLRQV�KDYH�EHHQ�VHOHFWHG��7R�KHOSLGHQWLI\�WKH�DSSURSULDWH�DFWLYLW\�JURXSV��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHUPDLQWHQDQFH�→�,QIRUPDWLRQ�6\VWHP�→�$FWLYLW\�*URXSV�→�/LVW�RI�$FWLYLW\�*URXSV�$FFRUGLQJWR�&RPSOH[�6HOHFWLRQ�&ULWHULD�

�� ,Q�WUDQVDFWLRQ�3)&*��VHOHFW�WKH�DFWLYLW\�JURXS�WR�EH�UHJHQHUDWHG��<RX�FDQQRW�VHOHFWPRUH�WKDQ�RQH�DFWLYLW\�JURXS�DW�D�WLPH��:KHQ�PDLQWDLQLQJ�WKH�DXWKRUL]DWLRQ�GDWD��EHVXUH�WR�VHOHFW� �([SHUW�PRGH�IRU�SURILOH�JHQHUDWLRQ�DQG�WKHQ�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�

�� 5HJHQHUDWH�WKH�SURILOH�

�� 1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG��5HPHPEHU�WKDW�FKDQJHV�EHFRPH�DFWLYH�ZLWKWKH�QH[W�V\VWHP�ORJRQ�

0DLQWDLQLQJ�$XWKRUL]DWLRQV�LQ�WKH�$FWLYLW\�*URXSV

3OHDVH�VHH�FKDSWHU����$GYDQFHG�3URILOH�*HQHUDWRU�)XQFWLRQDOLW\��VLQFH�ZH�GHVFULEHG�WKLV�WRSLFWKHUH�LQ�GHWDLO�

Page 299: Amez 46 all

13–1

&KDSWHU���� 6$3�6HFXULW\�$XGLW�DQG

/RJJLQJ

&RQWHQWV

Overview ................................................................................................................13–2

Audit Tools (SM20, SM19, SECR) ........................................................................13–2

Audit Tasks (SM21, STAT, ST03).......................................................................13–19

Logging Changes to User Master Records, Profiles, and Authorizations ....13–29

����

Page 300: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Overview

Authorizations Made Easy13–2

2YHUYLHZ

7KH�SXUSRVH�RI�WKLV�FKDSWHU�LV�WR�PDNH�\RX�DZDUH�RI�\RXU�UHVSRQVLELOLWLHV�DV�WKH�5���6\VWHPDGPLQLVWUDWRU�V��IRU�VHFXULW\��ZKLFK�LQFOXGHV�< 3URWHFWLQJ�WKH�5���6\VWHP< 3UHSDULQJ�\RX�IRU�D�FRPSXWHU�VHFXULW\�DXGLW

*HQHUDOO\��WKH�V\VWHP�DGPLQLVWUDWRU�LV�UHVSRQVLEOH�IRU�UHVSRQGLQJ�WR�WKH�ILQGLQJV�RI�DQ�5��6\VWHP�DXGLW�

,Q�WKLV�FKDSWHU��\RX�OHDUQ�KRZ�WR�DQDO\]H�DXWKRUL]DWLRQ�ORJJLQJ�IURP�D�VHFXULW\�SHUVSHFWLYH�<RX�OHDUQ�KRZ�WR�SUHSDUH�IRU�D�W\SLFDO�V\VWHP�DXGLW�

5HIHU�WR�6\VWHP�$GPLQLVWUDWLRQ�0DGH�(DV\��5HOHDVH����$�%��FKDSWHU�����WKH�VHFWLRQ6HFXULW\�$GPLQLVWUDWLRQ��ZKLFK�VHUYHG�DV�WKH�EDVLV�IRU�WKLV�FKDSWHU�

7KLV�FKDSWHU�LV�RQO\�LQWHQGHG�WR�VHUYH�DV�DQ�LQWURGXFWLRQ�WR�FRPSXWHU�VHFXULW\�&RQVLGHULQJ�WKH�JURZLQJ�LPSRUWDQFH�RI�VHFXULW\��ZH�DGYLVH�\RX�WR�ZRUN�ZLWK�\RXUDXGLWRUV��ILQDQFH�GHSDUWPHQW��OHJDO�GHSDUWPHQW��DQG�RWKHUV�ZKR�PLJKW�EH�DIIHFWHG�E\V\VWHP�VHFXULW\�

$XGLW�7RROV��60����60����6(&5�

6HFXULW\�$XGLW�/RJ��60���

:KDW

7KH�6HFXULW\�$XGLW�/RJ�UHFRUGV�WKH�VHFXULW\�UHODWHG�DFWLYLWLHV�RI�XVHUV�LQ�WKH�V\VWHP��7KHVHDFWLYLWLHV�LQFOXGH�VXFFHVVIXO�DQG�IDLOHG�< 'LDORJ�ORJRQ�DWWHPSWV< 5HSRUW�DQG�WUDQVDFWLRQ�VWDUWV< 5)&�&3,&�ORJRQV2WKHU�HYHQWV�ZULWWHQ�WR�WKH�ORJ�DUH�< /RFNHG�WUDQVDFWLRQV�RU�XVHUV< &KDQJHG�RU�GHOHWHG�

� $XWKRUL]DWLRQV� $XWKRUL]DWLRQ�SURILOHV� 8VHU�PDVWHU�UHFRUGV

< &KDQJHV�WR�WKH�DXGLW�FRQILJXUDWLRQ

Page 301: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–3

7KH�ORJ�LV�FUHDWHG�HDFK�GD\��DQG�SUHYLRXV�ORJV�DUH�QRW�GHOHWHG�RU�RYHUZULWWHQ��7KH�ORJ�ILOHVFDQ�EHFRPH�QXPHURXV�DQG�ODUJH��VR�ZH�UHFRPPHQG�WKDW�WKH�ORJV�EH�SHULRGLFDOO\�DUFKLYHGEHIRUH�EHLQJ�PDQXDOO\�SXUJHG�

1RWH��7KH�ORJ�ILOHV�DUH�RSHUDWLQJ�V\VWHP�ORJ�ILOHV��7UDQVDFWLRQ�60����6HFXULW\�$XGLW�'HOHWH�2OG�$XGLW�/RJV��LV�RQH�PHFKDQLVP�WR�SXUJH�WKHVH�ILOHV��2WKHU�RSHUDWLQJ�V\VWHPDUFKLYLQJ�WHFKQLTXHV�PD\�DOVR�EH�XVHG�

$Q�DXGLW�DQDO\VLV�UHSRUW�FDQ�EH�JHQHUDWHG�IURP�WKH�DXGLW�ORJV��<RX�FDQ�DQDO\]H�D�ORFDOVHUYHU��D�UHPRWH�VHUYHU��RU�DOO�WKH�VHUYHUV�LQ�DQ�5���6\VWHP�

:K\

7KH�LQIRUPDWLRQ�LQ�WKH�VHFXULW\�DXGLW�ILOHV�FDQ�EH�PDQLSXODWHG�WR�WDLORU�WKH�DXGLW�DQDO\VLVUHSRUW�EDVHG�RQ�FHUWDLQ�FULWHULD��7KH�UHSRUW�DVVLVWV�WKH�DGPLQLVWUDWRU�WR�< 5HFRQVWUXFW�RU�DQDO\]H�LQFLGHQWV< ,PSURYH�VHFXULW\�E\�UHFRJQL]LQJ�LQDGHTXDWH�PHDVXUHV< 7UDFH�XQXVXDO�XVHU�DFWLYLWLHV< 8QGHUVWDQG�WKH�LPSDFW�RI�FKDQJHV�WR�WUDQVDFWLRQV�RU�XVHUV

+RZ

7R�VWDUW�D�VHFXULW\�DXGLW��\RX�FDQ�GR�RQH�RI�WKH�IROORZLQJ�< 6HW�WKH�SURILOH�SDUDPHWHU�UVDX�HQDEOH�WR��< '\QDPLFDOO\�VWDUW�LW�XVLQJ�WUDQVDFWLRQ�60����6HH�WKH�VHFWLRQ�6HWWLQJ�6HFXULW\�$XGLW�/RJ

3DUDPHWHUV�RQ�SDJH���²���

7KH�QXPEHU�RI�DXGLW�ORJV�FUHDWHG�E\�WKH�V\VWHP�GHSHQGV�RQ�WKH�IROORZLQJ�< <RX�PD\�FKRRVH�WR�VHW�WKH�PD[LPXP�VSDFH�IRU�WKH�VHFXULW\�DXGLW�ILOH�LQ�SDUDPHWHU

UVDX�PD[BGLVNVSDFH�ORFDO�$W�WKLV�SRLQW��ZKHQ�WKH�OLPLW�KDV�EHHQ�UHDFKHG��ORJJLQJ�ZLOO�HQG�

< <RX�FDQ�GHILQH�WKH�VL]H�RI�DQ�LQGLYLGXDO�VHFXULW\�ORJ�ILOH�WR�ILW�WKH�FKRVHQ�DUFKLYLQJPHGLD�7KLV�GHILQLWLRQ�PHDQV�WKDW�WKH�V\VWHP�SURGXFHV�VHYHUDO�ORJ�ILOHV�HDFK�GD\��DQG�WKHVH�ILOHVFDQ�EH��IRU�H[DPSOH��DUFKLYHG�SHULRGLFDOO\�RQWR�&'V��7KH�SURILOH�SDUDPHWHU�LVUVDX�PD[BGLVNVSDFH�SHUBILOH�DQG�WKH�PD[LPXP�VL]H�SHU�ILOH�LV���*%�

<RX�FDQQRW�VHW�ERWK�SDUDPHWHUV��<RX�KDYH�WR�FKRRVH�WKH�PHWKRG�E\�ZKLFK�WKH�DXGLW�ILOHVDUH�FUHDWHG�

Page 302: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–4

5XQQLQJ�WKH�$XGLW�/RJ

7KLV�SURFHGXUH�DVVXPHV�WKDW�WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRU�VRPH�WLPH�DQG�WKDW�DXGLW�ORJV�KDYH�EHHQFUHDWHG�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM20�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���$QDO\VLV��

�� 2Q�WKH�6\VWHP�$XGLW�/RJ�VFUHHQ��FRPSOHWH�WKHVWHSV�EHORZ�

D� ,Q�)URP�GDWH�WLPH��HQWHU�IRU�H[DPSOH��13:00

E� 8QGHU�$XGLW�FODVVHV��VHOHFW�� 'LDORJ�ORJRQ� 7UDQVDFWLRQ�VWDUW� 5HSRUW�VWDUW

�� &KRRVH�5H�UHDG�DXGLW�ORJ�

7KLV�EXWWRQ�LV�XVHG�WR�UHDG�D�ORJ�IRU�WKH�ILUVWWLPH�

7KH�VHFXULW\�UHSRUW�LV�GLVSOD\HG�

�� 7R�UHYLHZ�WKH�GHWDLOV�RI�DQ�DXGLW�PHVVDJH��VHOHFWD�OLQH�DQG�FKRRVH� �

2b

2a

3

4

Page 303: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–5

'RFXPHQWDWLRQ�IRU�WKH�PHVVDJH�DQGWHFKQLFDO�GHWDLOV�DSSHDUV��7KLV�GLVSOD\�LVPRVW�XVHIXO�ZKHQ�GLVSOD\LQJ�QHJDWLYHPHVVDJHV�VXFK�DV�IDLOHG�ORJLQV�RU�ORFNHGWUDQVDFWLRQV�

6HWWLQJ�6HFXULW\�$XGLW�/RJ�3DUDPHWHUV��60���

:KDW

7KH�DXGLW�ORJ�SDUDPHWHUV�DUH�WKH�FULWHULD�XVHG�WR�ZULWH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�LQWR�WKHDXGLW�ORJ�ILOH��7KH�SDUDPHWHUV�DUH�JURXSHG�LQWR�DXGLW�SURILOHV�WKDW�FDQ�EH�DFWLYDWHG�DW�WKHQH[W�V\VWHP�VWDUWXS��FRQILJXUDWLRQ�VWDWXV��RU�DSSOLHG�´RQ�WKH�IO\µ��G\QDPLF�FRQILJXUDWLRQ��

:K\

$XGLW�SURILOHV�QHHG�WR�EH�FUHDWHG�ILUVW�EHIRUH�DXGLW�ORJV�FDQ�EH�ZULWWHQ��7KHVH�SURILOHV�OLPLWWKH�DPRXQW�DQG�W\SH�RI�GDWD�ZULWWHQ�LQWR�WKH�VHFXULW\�DXGLW�ILOHV��PDNLQJ�WKH�VXEVHTXHQWVHFXULW\�UHSRUWV�PRUH�PHDQLQJIXO�WR�WKH�DGPLQLVWUDWRU�

+RZ

'HFLGH�ZKDW�WR�DXGLW�DQG�VHW�VHOHFWLRQ�FULWHULD�HLWKHU�DW�WKH�GDWDEDVH�OHYHO�RU�G\QDPLFDOO\�DWWKH�DSSOLFDWLRQ�VHUYHU�OHYHO�< ,I�WKH�DXGLW�FRQILJXUDWLRQ�LV�SHUPDQHQWO\�VWRUHG�DW�WKH�GDWDEDVH�OHYHO��DOO�DSSOLFDWLRQ

VHUYHUV�XVH�WKH�LGHQWLFDO�FULWHULD�WR�VDYH�HYHQWV�LQ�WKH�DXGLW�ORJ��7KH�VHWWLQJV�WDNH�HIIHFW�DWWKH�QH[W�DSSOLFDWLRQ�VHUYHU�VWDUW�

< $W�WKH�DSSOLFDWLRQ�VHUYHU�OHYHO��KRZHYHU��G\QDPLF�FKDQJHV�FDQ�EH�VHW�WR�LQGLYLGXDODSSOLFDWLRQ�VHUYHUV�DQG�GLVWULEXWHG�WR�WKH�HQWLUH�V\VWHP�7KH�QHZ�FULWHULD�UHPDLQV�LQ�HIIHFW�XQWLO�WKH�VHUYHU�LV�EURXJKW�GRZQ�

<RX�FDQ�GHILQH�XS�WR�ILYH�VHWV�RI�VHOHFWLRQ�FULWHULD�RU�ILOWHUV��7KH�V\VWHP�SDUDPHWHU�UVDX�VHOHFWLRQBVORWV��WKDW�GHILQHV�WKH�QXPEHU�RI�ILOWHUV�KDV�D�GHIDXOW�YDOXH�RI����<RX�FDQDFWLYDWH�DQ�DXGLW�LQ�WKH�G\QDPLF�FRQILJXUDWLRQ�XVLQJ�WUDQVDFWLRQ�60���

Page 304: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–6

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM19�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH7RROV�→�$GPLQLVWUDWLRQ→�0RQLWRU→�6HFXULW\�$XGLW�ORJ→�60���&RQILJXUDWLRQ��

&RQILJXUDWLRQ�VWDWXV�UHIHUV�WR�WKH�VWRUDJH�RI�WKH�SDUDPHWHUV�LQ�WKH�GDWDEDVH�

�� &KRRVH� �

�� (QWHU�D�SURILOH�QDPH��IRU�H[DPSOH��AUDPROF1��

�� &KRRVH� �

�� ,Q�WKLV�VFUHHQ��\RX�PD\�VSHFLI\�WZR�ILOWHU�JURXSVDQG�GHILQH�WKH�W\SHV�RI�DXGLW�PHVVDJHV�WKDW�ZLOOEH�ZULWWHQ�LQWR�WKH�ORJ�

2

5

4

3

Page 305: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–7

'HILQLQJ�)LOWHU�*URXS��

�� &KRRVH�WKH�)LOWHU���WDE�

�� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�*�LQ�8VHU�1DPHV�

�� ,Q�$XGLW�&ODVVHV��VHOHFW�< 'LDORJ�/RJRQ< 7UDQVDFWLRQ�6WDUW

�� 8QGHU�(YHQWV��VHOHFW�$OO�

��� 6HOHFW�)LOWHU�$FWLYH�

'HILQLQJ�)LOWHU�*URXS��

��� &KRRVH�WKH�)LOWHU���WDE�

7KLV�ILOWHU�WUDFHV�WKH�UHSRUWV�VWDUWHG�E\�RQH�XVHU�

��� 8QGHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW.< (QWHU�D�XVHU�,'�LQ�8VHU�1DPHV��IRU�H[DPSOH�

GARYN��

��� ,Q�$XGLW�&ODVVHV��VHOHFW�5HSRUW�VWDUW�

��� 8QGHU�(YHQWV��VHOHFW�6HYHUH�DQG�FULWLFDO�

��� 'HVHOHFW�)LOWHU�$FWLYH�

7KLV�VHWWLQJ�DOORZV�\RX�WR�VDYH�WKH�ILOWHU�VHWWLQJV�EXW�GRHV�QRW�DFWLYDWH�WKHP�

��� &KRRVH�'HWDLO�VHWWLQJ�WR�GULOO�GRZQ�WR�WKH�DXGLWFODVV�DQG�HYHQW�FODVV�FDWHJRULHV�

7 8 9

10

12 13 14

1516

6

11

Page 306: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–8

��� 6FUROO�GRZQ�WR�5HSRUW�VWDUW�

1RWLFH�WKDW�WKH�FDWHJRU\�LV�DXWRPDWLFDOO\�FKRVHQEDVHG�RQ�WKH�HDUOLHU�VHOHFWLRQ�RI�HYHQW�W\SH�DQGDXGLW�FODVV�W\SH�

��� &KRRVH� �

��� 7KH�JHQHUDO�FDWHJRULHV�DUH�FOHDUHG�LQGLFDWLQJWKDW�VHWWLQJV�ZHUH�EURZVHG�RU�GHILQHG�DW�WKHGHWDLO�OHYHO�

��� &KRRVH� �

20

18

19

Page 307: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–9

��� $�V\VWHP�PHVVDJH�QRWLILHV�WKH�XVHU�WKDW�WKHSURILOH�ZDV�VDYHG�VXFFHVVIXOO\�

��� 7R�DFWLYDWH�WKH�SURILOH��VHOHFW� �

��� 7KH�SURILOH�QDPH�QRZ�DSSHDUV�LQ�WKH�$FWLYHSURILOH�ILHOG�

��� $�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKH�SURILOH�ZLOOEH�DFWLYDWHG�ZKHQ�WKH�DSSOLFDWLRQ�VHUYHU�LVUHVWDUWHG�

��� 7R�G\QDPLFDOO\�FKDQJH�WKH�VHOHFWLRQ�FULWHULD�IRURQH�RU�PRUH�DSSOLFDWLRQ�VHUYHUV�LQ�D�UXQQLQJV\VWHP��FKRRVH�WKH�'\QDPLF�FRQILJXUDW��'\QDPLFFRQILJXUDWLRQ��WDE�

21

22

23

24

25

Page 308: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–10

��� ,Q�WKLV�H[DPSOH��WKH�DXGLW�KDV�EHHQ�UXQQLQJ�IRUVRPH�WLPH��LQGLFDWHG�E\�WKH�FXUUHQW�ILOH�VL]HJUHDWHU�WKDQ�]HUR��EHIRUH�EHLQJ�VWRSSHG�EULHIO\�7KH�UHG� �LQ�WKH�6WDW���6WDWXV��FROXPQ�LQGLFDWHVWKDW�WKH�DXGLW�LV�LQDFWLYH�

��� &KRRVH� �

5XQQLQJ�DQ�$XGLW�RQ�D�'LIIHUHQW�8VHU

,Q�WKLV�SURFHGXUH��ZH�UXQ�DQ�DXGLW�RQ�D�GLIIHUHQW�XVHU�DQG�FKHFN�DOO�WKH�UHSRUWV�WKDW�ZHUH�VWDUWHG�

�� 2Q�WKH�)LOWHU�WDE��HQWHU�6HOHFWLRQ�FULWHULD�< (QWHU�*�LQ�&OLHQW�< (QWHU�D�XVHU�,'�LQ�8VHU�QDPHV��IRU�H[DPSOH�

Patricia��

�� 8QGHU�$XGLW�FODVVHV��VHOHFW�5HSRUW�VWDUW�

�� 8QGHU�(YHQWV��VHOHFW�$OO�

�� 8QGHU�)LOWHU����VHOHFW�)LOWHU�DFWLYH�

�� 7R�DFWLYDWH��FKRRVH� �

27

1 2 3

4

5

26

Page 309: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–11

�� &KRRVH�<HV�

�� $�JUHHQ� �DSSHDUV�LQ�WKH�6WDW���6WDWXV��FROXPQDQG�D�V\VWHP�PHVVDJH�LQGLFDWHV�WKDW�WKHFRQILJXUDWLRQ�ZDV�DFWLYDWHG�

$XGLW�,QIRUPDWLRQ�6\VWHP��6(&5�

:KDW

7KH�$XGLW�,QIRUPDWLRQ�6\VWHP��$,6��LV�GHVLJQHG�IRU�V\VWHP�DQG�EXVLQHVV�DXGLWV�DQG�ZLOOOLNHO\�EH�UXQ�E\�LQWHUQDO�RU�H[WHUQDO�DXGLWRUV��,W�SXWV�LQ�RQH�SODFH�PDQ\�RI�WKH�5���VHFXULW\WRROV��7KH�FHQWHU�RI�WKH�$,6�LV�WKH�DXGLW�UHSRUW�WUHH��VWUXFWXUHG�DURXQG�D�UDQJH�RI�DXGLWLQJIXQFWLRQV�DQG�GHIDXOW�FRQILJXUDWLRQV�LQFOXGLQJ�< $XGLWLQJ�SURFHGXUHV�DQG�GRFXPHQWDWLRQ< $XGLWLQJ�HYDOXDWLRQV< 'RZQORDGLQJ�RI�DXGLW�GDWD

$,6�FDQ�EH�HIIHFWLYHO\�SRVLWLRQHG�DV�WKH�6$3�WRRO�IRU�LQWHUQDO�DXGLWLQJ�DQG�GDWD�SURWHFWLRQ�H[WHUQDO�DXGLWLQJ��RQJRLQJ�VHFXULW\�FRQWURO�FKHFNV��LQWHULP�DXGLWV��SUHSDUDWLRQ�RI�\HDU�HQGFORVLQJ�VWDWHPHQWV��\HDU�HQG�DXGLWV��HWF�

$,6�XVHV�VWDQGDUG�5���UHSRUWV�DQG�WUDQVDFWLRQV�WR�FRQGXFW�WKH�UHYLHZ�DQG�LV�D�VWDQGDUGFRPSRQHQW�LQ�5HOHDVH����$��+RZHYHU��\RX�FDQ�LPSRUW�WKH�$,6�LQWR�\RXU�V\VWHP�EDFN�WR5HOHDVH����'�RU�KLJKHU��)RU�PRUH�LQIRUPDWLRQ�RQ�$,6�DQG�LWV�DYDLODELOLW\��SOHDVH�UHIHU�WR

7

6

Page 310: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–12

6$31HW�²�5���)URQWHQG�QRWHV�������DQG���������$,6�DOVR�SURYLGHV�DQ�LQWHUIDFH�WR�H[SRUWGDWD�WR�DQ�H[WHUQDO�DXGLWLQJ�V\VWHP�WKDW�DQDO\]HV�ILQDQFLDO�VWDWHPHQWV�

:K\

$XGLWRUV�H[DPLQH�WKH�UHVXOWV�RI�DXWRPDWHG�DQG�PDQXDO�ILQDQFLDO�DQG�V\VWHP�SURFHGXUHV�WRHQVXUH�WKDW�WKHUH�LV�D�FKHFNV�DQG�EDODQFHV�LQIUDVWUXFWXUH�WR�SUHYHQW�IUDXG�DQG�RWKHUSUREOHPV��$,6�HQDEOHV�WKH�DXGLWRUV�WR�WHVW�WUDQVDFWLRQV�DQG�UXQ�UHSRUWV�GXULQJ�WKHLQVSHFWLRQ�

+RZ

7R�VWDUW�$,6��FDOO�WUDQVDFWLRQ�SECR��7KHUH�DUH�WZR�ZD\V�WR�FRQGXFW�DQ�DXGLW�< &RPSOHWH< 8VHU�GHILQHG

&RPSOHWH�$XGLW

:KLOH�LW�LV�QRW�SRVVLEOH�WR�VKRZ�DOO�WKH�IXQFWLRQDOLW\�RI�WKH�$,6�KHUH��ZH�SURYLGH�WKH�IROORZLQJ�VFHQDULR�RILQYHVWLJDWLRQ�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV�→�6(&5�$XGLW�,QIR�6\VWHP��

�� 8QGHU�&KRRVH�YLHZ��VHOHFW�&RPSOHWH�DXGLW�

�� &KRRVH� �

$�FRPSOHWH�DXGLW�FRQVLVWV�RI�D�V\VWHP�DXGLW�DQGEXVLQHVV�DXGLW��7KH�VWUXFWXUH�RQ�WKLV�VFUHHQ�LV$XGLWB$OO�ZLWK�D�VWDQGDUG�YLHZ�

�� &OLFN�WKH�QRGHV�����WR�H[SDQG�WKH�IROORZLQJ�< 6\VWHP�$XGLW< %XVLQHVV�$XGLW

1

2

3

Page 311: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–13

6\VWHP�$XGLW

7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�$,6�

�� 8QGHU�6\VWHP�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR5HSRVLWRU\���7DEOHV�

�� &OLFN�WKH�QRGH�����QH[W�WR�7DEOH�,QIRUPDWLRQ�

�� &KRRVH� �QH[W�WR�'DWD�'LFWLRQDU\�GLVSOD\�

1

2

3

Page 312: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–14

7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RX�DUH�EURXJKWWR�WKLV�VFUHHQ�

�� &KRRVH� �

%XVLQHVV�$XGLW

�� 8QGHU�%XVLQHVV�$XGLW��FOLFN�WKH�QRGH�����QH[W�WR&ORVLQJ��),�*/��

�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�%DODQFHV�

�� &OLFN�WKH�QRGH�����QH[W�WR�%DODQFH�6KHHW��3/�<RX�FDQ�H[HFXWH�GLIIHUHQW�UHSRUWV�WR�LQVSHFW�WKHILQDQFLDO�EDODQFHV�

�� &KRRVH� �QH[W�WR�3URILW�DQG�/RVV�3URMHFWLRQ� 1

2

3

4

4

Page 313: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–15

�� 2Q�WKLV�VFUHHQ��\RX�FDQ�HQWHU�FULWHULD�IRU�\RXUUHSRUW��WKHQ�FKRRVH� �

�� &KRRVH� �

8VHU�'HILQHG�$XGLW

<RX�FDQ�DOVR�FRQGXFW�D�XVHU�GHILQHG�DXGLW�E\�FUHDWLQJ�D�YLHZ�RU�VXEVHW�RI�D�FRPSOHWH�DXGLW�

,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SECR�DQG�FKRRVH�(QWHU��RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH,QIRUPDWLRQ�6\VWHPV→�6(&5�$XGLW�,QIR�6\VWHP��

�� 6HOHFW�8VHU�GHILQHG�DXGLW�

�� 8QGHU�8VHU�GHILQHG�DXGLW��HQWHU�D�YLHZ�QDPH��IRUH[DPSOH��HQWHU�ZVUE��

�� &KRRVH� �

9LHZ�QDPHV�VKRXOG�VWDUW�ZLWK�<�RU�=�

12

6

3

5

Page 314: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–16

�� 8QGHU�1HZ�YLHZ��LQ�1DPH��HQWHU�WKH�QDPH�RI�WKHYLHZ��IRU�H[DPSOH��ZVUE��

�� 8QGHU�6HOHFW�XVLQJ��VHOHFW�0DQXDO�6HOHFWLRQ�<RX�ZLOO�VHOHFW�WKH�SURFHGXUHV�WKDW�ZLOO�EHLQFOXGHG�LQ�WKH�YLHZ�

�� &KRRVH� �

:KHQ�\RX�FUHDWH�D�YLHZ�DQG�HQWHU�D�GLIIHUHQWQDPH�LQ�1DPH��WKH�QDPH�RI�WKH�YLHZ�LV�ZKDW�ZDVHQWHUHG�LQ�WKH�PDLQ�VFUHHQ�

:H�ZDQW�WR�LQFOXGH�DOO�WKH�SURFHGXUHV�IRU�DV\VWHP�DXGLW�LQ�WKLV�YLHZ�

�� 6HOHFW�6\VWHP�$XGLW�

�� &KRRVH� �

�� 7R�JHQHUDWH��FKRRVH� �

$�PHVVDJH�LQGLFDWHV�WKDW�WKH�JHQHUDWLRQ�ZDVVXFFHVVIXO�

��� &KRRVH� �

6

5

4

9

7

10

8

Page 315: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Release 4.6A/B13–17

��� &KRRVH� �'LVSOD\�WR�FKHFN�WKH�YLHZ�RI�WKLVVWUXFWXUH�

��� &OLFN�RQ�WKH�6\VWHP�$XGLW�QRGH�����WR�H[SDQG�LW�

7KH�VFUHHQ�RQ�WKH�ULJKW�VKRZV�DOO�WKH�SURFHGXUHVIRU�WKH�$XGLWB$OO�VWUXFWXUH�ZLWK�D�=98(�YLHZ�

11

12

Page 316: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tools (SM20, SM19, SECR)

Authorizations Made Easy13–18

8VHU�6HFXULW\�$XGLW�-REV

0DQ\�RI�WKH�XVHU�VHFXULW\�DXGLW�MREV�SURJUDPV�DUH�LQFOXGHG�DV�SDUW�RI�WKH�$,6��DV�ZHOO�LQ�WKHVWDQGDUG�5���6\VWHP�

:KDW

7KHUH�DUH�VHYHUDO�SUHGHILQHG�6$3�VHFXULW\�UHSRUWV��LQFOXGLQJ�< 56865��� &KHFN�IRU�GHIDXOW�SDVVZRUG�RQ�XVHU�,'V�6$3 �DQG�'',&

< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�XVHUV�ZKR�DUH�ORFNHG�GXH�WR�LQFRUUHFW�ORJRQ

7KLV�UHSRUW�VKRXOG�EH�VFKHGXOHG�WR�UXQ�HDFK�GD\��MXVW�EHIRUH�PLGQLJKW�< 56865��� /LVWV�XVHUV�ZLWK�LQFRPSOHWH�DGGUHVV�GDWD< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV< 56865��� /LVWV�XVHUV�ZLWK�FULWLFDO�DXWKRUL]DWLRQV��ZLWK�WKH�RSWLRQ�WR�VHOHFW�WKH

FULWLFDO�DXWKRUL]DWLRQV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�XVHUV�DQG�VKRZV�FKDQJHV�PDGH�WR�D�XVHU·V

VHFXULW\< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�SURILOHV�DQG�VKRZV�FKDQJHV�PDGH�WR�VHFXULW\

SURILOHV< 56865��� /LVWV�FKDQJH�GRFXPHQWV�IRU�DXWKRUL]DWLRQV�DQG�VKRZV�FKDQJHV�PDGH�WR

VHFXULW\�DXWKRUL]DWLRQV

6RPH�RI�WKHVH�UHSRUWV�KDYH�SDUDPHWHU�WDEOHV�WKDW�QHHG�WR�EH�SURSHUO\�PDLQWDLQHG�IRU�EHVWXVH��5HYLHZ�DQG�DQDO\]H�WKHVH�UHSRUWV�EDVHG�RQ�\RXU�NQRZOHGJH�RI�WKH�FRPSDQ\��+RZHYHU�EH�DZDUH�WKDW�VHFXULW\�LVVXHV�PD\�H[LVW��,I�\RX�KDYH�D�VPDOO�FRPSDQ\��WKHVH�LVVXHV�FDQQRW�EHDYRLGHG�EHFDXVH�RQH�SHUVRQ�RIWHQ�PXVW�ZHDU�PDQ\�GLIIHUHQW�KDWV�

:K\

<RXU�H[WHUQDO�DXGLWRUV�PD\�UHTXLUH�VRPH�RI�WKHVH�UHSRUWV�WR�EH�H[HFXWHG�DV�SDUW�RI�WKHDQQXDO�ILQDQFLDO�DXGLW�

+RZ

<RX�FDQ�XVH�RQH�RI�WKH�IROORZLQJ�WUDQVDFWLRQV�RU�PDQQHUV�< 6$����$%$3��([HFXWH�3URJUDP�

7KLV�WUDQVDFWLRQ�RQO\�DOORZV�WKH�SURJUDP�WR�EH�H[HFXWHG�< 6(����7KH�REMHFW�QDYLJDWRU�

< 7KH�8VHU�,QIRUPDWLRQ�6\VWHP�2QO\�WKH�6$���PDQQHU�LV�GHVFULEHG�EHORZ�

Page 317: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–19

6$���²�$%$3��([HFXWH�3URJUDP

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SA38�DQG�FKRRVH�(QWHU�

�� ,Q�3URJUDP��HQWHU�WKH�UHSRUWQDPH�

�� &KRRVH� �

�1RWHV�IRU�6SHFLILF�5HSRUWV

56865�����OLVWV�FULWLFDO�FRPELQDWLRQV�RI�DXWKRUL]DWLRQV�RU�WUDQVDFWLRQV��< 7KHVH�FRPELQDWLRQV�DUH�PDLQWDLQHG�RQ�WDEOH�68.5,�< 'DQJHURXV�FRPELQDWLRQV�LQFOXGH�WKH�IROORZLQJ�WUDQVDFWLRQV�

� 5=����ZLWK�DQ\WKLQJ�� 5=����ZLWK�DQ\WKLQJ�� 6(�� �ZLWK�DQ\WKLQJ�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�� 68����ZLWK�VHFXULW\��XVHUV��DQG�SURILOHV�

$XGLW�7DVNV��60����67$7��67���

5HYLHZLQJ�9DOLGLW\�RI�1DPHG�8VHUV

:KDW

$OO�XVHUV�ZKR�KDYH�OHIW�WKH�FRPSDQ\�VKRXOG�KDYH�WKHLU�5���DFFHVV�WHUPLQDWHG�LPPHGLDWHO\�%\�ORFNLQJ�RU�GHOHWLQJ�WKHVH�XVHU�,'V��\RX�OLPLW�DFFHVV�WR�RQO\�WKRVH�XVHUV�ZKR�VKRXOG�KDYHDFFHVV�WR�5����3HULRGLF�UHYLHZ�DVVXUHV�WKDW�WKH�WDVN�RI�ORFNLQJ�RU�GHOHWLQJ�KDV�EHHQFRPSOHWHG�

1RWH��,I�WKH�+5�PRGXOH�LV�LPSOHPHQWHG��WKHUH�DUH�PHFKDQLVPV�WKDW�LQWHJUDWH�ZLWK�WKHDXWKRUL]DWLRQ�V\VWHP�WR�KDYH�VXFK�FKDQJHV�LQ�XVHU�DFFHVVHV�RFFXU�DXWRPDWLFDOO\�

:K\

3URSHU�DXGLW�FRQWURO�UHTXLUHV�WKDW�D�XVHU�ZKR�QR�ORQJHU�KDV�D�YDOLG�EXVLQHVV�QHHG�WR�DFFHVV5���VKRXOG�QRW�EH�DOORZHG�WR�GR�VR�

3

2

Page 318: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–20

'HOHWLQJ�RU�ORFNLQJ�WKHVH�XVHU�,'V�DOVR�SUHYHQWV�DQ\RQH�ZKR�KDG�EHHQ�XVLQJ�WKH�WHUPLQDWHGXVHU�,'�IURP�DFFHVVLQJ�WKH�V\VWHP�ZLWK�WKDW�,'�

2QH�RI�WKH�DXGLW�SURFHGXUHV�WKDW�\RXU�H[WHUQDO�DXGLWRUV�ZLOO�XVH�LV�WR�WHVW�ZKHWKHU�D�SHUVRQZKR�GRHV�QRW�QHHG�WR�DFFHVV�5���KDV�D�OLYH�XVHU�,'�

+RZ

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU01�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX��FKRRVH�7RROV�→�$GPLQLVWUDWLRQ�→�8VHU�PDLQWHQDQFH�→�68���8VHUV��

�� &KRRVH�SRVVLEOH�HQWULHV�

�� 5HYLHZ�WKH�DFWLYH�XVHUV�

9HULI\�WKDW�WKHVH�XVHUV�DUH�LQGHHGYDOLG�XVHUV�

,Q�D�ODUJH�FRPSDQ\��\RX�VKRXOG�GRD�UDQGRP�DXGLW�RQ�DW�OHDVW�WZHQW\XVHUV��7KH�PLQLPXP�QXPEHUVKRXOG�EH�GHWHUPLQHG�E\�\RXUDXGLWRUV�

2

Page 319: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–21

5HYLHZLQJ�3URILOHV�IRU�$FFXUDF\�DQG�3HUPLVVLRQ�&UHHS

:KDW

$�SHUPLVVLRQ�FUHHS�LV�DQ�LQFUHPHQWDO�LQFUHDVH�LQ�SHUPLVVLRQV�JLYHQ�WR�D�XVHU�RYHU�WLPH��,IOHIW�XQFKHFNHG��LQFUHDVHG�SHUPLVVLRQV�PD\�JUDQW�D�XVHU�PRUH�DXWKRULW\�LQ�WKH�V\VWHP�WKDQ�LVUHTXLUHG�RU�LQWHQGHG�

:K\

8VHUV�PD\�KDYH�XQGHVLUDEOH�DXWKRUL]DWLRQ�V��RU�FRPELQDWLRQV�

<RXU�H[WHUQDO�DXGLWRUV�PD\�KDYH�DQ�DXGLW�VWHS�WR�FKHFN�IRU�SHUPLVVLRQ�FUHHS�

+RZ

<RX�FDQ�FRQGXFW�D�VSRW�DXGLW�RI�< ,QGLYLGXDOV

� 5HYLHZ�WKH�VHFXULW\�IRUPV�IRU�D�XVHU��FRPSDUH�WKHVH�IRUPV�WR�WKH�DFWLYLW\�JURXSV�DQGSURILOHV�DVVLJQHG�WR�WKDW�XVHU��DQG�LQYHVWLJDWH�LQFRQVLVWHQFLHV�

� 5HYLHZ�WKH�DFWLYLW\�JURXSV�DQG�SURILOHV�DVVLJQHG�WR�WKH�LQGLYLGXDO�IRU�UHDVRQDEOHQHVV�

� 5HYLHZ�WKH�LQGLYLGXDO�SURILOHV�DVVLJQHG�IRU�FRQWHQW�DQG�FKHFN�WR�VHH�LI�WKH�SURILOH�KDVEHHQ�UHFHQWO\�FKDQJHG�

< 3URILOHV��WUDQVDFWLRQ�68����DQG�DXWKRUL]DWLRQV��WUDQVDFWLRQ�68���&KHFN�WR�VHH�LI�WKH�FKDQJH�GDWH�LV�UHFHQW�

<RX�FDQ�DOVR�H[HFXWH�WKH�IROORZLQJ�DXGLW�UHSRUWV�< 56865�����XVHU�FKDQJHV�< 56865�����SURILOH�FKDQJHV�< 56865�����DXWKRUL]DWLRQ�FKDQJHV�

)RU�DGGLWLRQDO�LQIRUPDWLRQ�RQ�WKHVH�UHSRUWV��VHH�WKH�8VHU�6HFXULW\�$XGLW�VHFWLRQ�RQ�SDJH���²���

6\VWHP�/RJ��60���

7KH�5���6\VWHP�ORJV�DOO�V\VWHP�HUURUV��ZDUQLQJV��SURFHVV�PHVVDJHV�LQ�WKH�V\VWHP�ORJ�6\V/RJ���DQG�XVHU�ORFNV�GXH�WR�IDLOHG�ORJ�RQ�DWWHPSWV�IURP�NQRZQ�XVHUV��7KH�6\V/RJ�ZULWHVWR�WZR�GLIIHUHQW�W\SHV�RI�ORJV�< /RFDO�/RJV< &HQWUDO�/RJV

Page 320: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–22

8VH�WKH�WUDQVDFWLRQ�60���WR�DFFHVV�WKH�V\VWHP�ORJ�RXWSXW�VFUHHQ��:LWK�WKLV�WUDQVDFWLRQ��\RX�FDQ�UHDG�DQ\�RIWKH�PHVVDJHV�WKDW�DUH�FRQWDLQHG�LQ�WKH�V\VWHP�ORJV��<RX�FDQ�PRGLI\�WKH�YLHZ�WR�PHHW�\RXU�QHHGV��$�ZLGHUDQJH�RI�VHOHFWLRQ�FULWHULD�LV�DYDLODEOH�WR�DQDO\]H�WKH�V\VWHP�

7KH�IROORZLQJ�H[DPSOH�VKRZV�KRZ�WR�XVH�WKH�V\VWHP�ORJ�IRU�PRQLWRULQJ�VHFXULW\�LVVXHV�VXFK�DV�IDLOHG�ORJRQDWWHPSWV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SM21�DQG�FKRRVH�(QWHU��RU�FKRRVH�7RROV→�$GPLQLVWUDWLRQ�→0RQLWRULQJ�→�6\VWHP�/RJ��

�� 6SHFLI\�WKH�VHOHFWLRQ�FULWHULD�IRU�\RXUV\VWHP�ORJ�DQDO\VLV�UHSRUW��IRUH[DPSOH��)URP�GDWH�WLPH��7R�GDWH�WLPH�8VHU��7UDQVDFWLRQ�FRGH��3URFHVV�3UREOHP�FODVV��HWF�

�� �2SWLRQDO��<RX�PD\�HQWHU�WKHPHVVDJH�QXPEHUV��IRU�H[DPSOH��US-3��IRU�IDLOHG�ORJRQ�DWWHPSWV�IRUORFNHG�XVHUV��DQG�FKRRVH� �8VH�

�� &KRRVH� �WR�GLVSOD\�WKH�V\VWHP�ORJUHSRUW�

�� 2Q�WKH�6\VWHP�ORJ��/RFDO�$QDO\VLVVFUHHQ��\RX�FDQ�YLHZ�WKH�V\VWHP�ORJDQDO\VLV�UHSRUW�DQG�GULOO�GRZQ�HDFKLWHP�IRU�GHWDLO��LI�QHFHVVDU\��

�� &KRRVH� �

6

2

3

4

Page 321: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–23

/RFDO�/RJV

(DFK�5���$SSOLFDWLRQ�6HUYHU�KDV�D�ORFDO�ORJ�WKDW�UHFHLYHV�DOO�WKH�PHVVDJHV�RXWSXW�E\�WKLVVHUYHU��6\V/RJ�UHFRUGV�WKHVH�PHVVDJHV�LQ�D�FLUFXODU�ILOH�RQ�WKH�VHUYHU���7KLV�PHDQV�WKDW�ZKHQWKLV�ORJ�ILOH�UHDFKHV�WKH�PD[LPXP�SHUPLVVLEOH�OHQJWK��6\V/RJ�RYHUZULWHV�LW��VWDUWLQJ�RYHUIURP�WKH�EHJLQQLQJ��

&HQWUDO�/RJV

:H�UHFRPPHQG�WKDW�\RX�DOVR�PDLQWDLQ�D�FHQWUDO�ORJ�ILOH�RQ�D�VHOHFWHG�DSSOLFDWLRQ�VHUYHU�(DFK�LQGLYLGXDO�DSSOLFDWLRQ�VHUYHU�WKHQ�VHQGV�LWV�ORFDO�ORJ�PHVVDJHV�WR�WKLV�VHUYHU��7KHVHUYHU�WKDW�\RX�GHVLJQDWH�WR�PDLQWDLQ�WKH�FHQWUDO�ORJ�FROOHFWV�WKH�PHVVDJHV�IURP�WKH�RWKHUDSSOLFDWLRQ�VHUYHUV�DQG�ZULWHV�WKHVH�PHVVDJHV�WR�WKH�FHQWUDO�ORJ�

7KH�FHQWUDO�ORJ�FRQVLVWV�RI�WZR�ILOHV��WKH�DFWLYH�ILOH�DQG�WKH�ROG�ILOH��WKH�ORFDWLRQ�RI�WKH�DFWLYHILOH�LV�VSHFLILHG�LQ�WKH�UVOJ�FHQWUDO�ILOH SURILOH�SDUDPHWHU��WKH�ORFDWLRQ�RI�WKH�ROG�ILOH�LV�VSHFLILHGLQ�WKH�UVOJ�FHQWUDO�ROGBILOH��

7KH�DFWLYH�ILOH�FRQWDLQV�WKH�FXUUHQW�ORJ��:KHQ�LW�UHDFKHV�WKH�PD[LPXP�VL]H��WKH�V\VWHPZULWHV�WR�WKH�ROG�ORJ�ILOH��PDNHV�WKH�SUHYLRXVO\�DFWLYH�ILOH�WKH�ROG�ILOH��DQG�FUHDWHV�D�QHZDFWLYH�ILOH��7KH�VZLWFK�RFFXUV�ZKHQ�WKH�VL]H�RI�WKH�DFWLYH�ORJ�ILOH�LV�KDOI�WKH�YDOXH�DV�VSHFLILHGLQ�WKH�UVOJ�PD[BGLVNVSDFH�FHQWUDO SDUDPHWHU�

6WDWLVWLF�5HFRUGV�LQ�&&06��67$7�

7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06��SHUIRUPDQFH�DQDO\VLV�WRROV�ZLWKLQ�5��ORJV�DOO�5���DFWLYLWLHV�FDWHJRUL]HG�E\�WUDQVDFWLRQ�DQG�XVHU�LQ�VWDWLVWLFDO�UHFRUGV�WKDW�FDQ�EHXVHIXO�IRU�DXGLW�WUDLO�SXUSRVHV��<RX�FDQ�DFFHVV�WKHVH�UHFRUGV�ZLWK�WKH�WUDQVDFWLRQ�67$7�RUIURP�WKH�6$3�VWDQGDUG�PHQX��7KLV�WUDQVDFWLRQ�SURYLGHV�\RX�ZLWK�WKH�GHWDLOHG�VWDWLVWLFDOUHFRUGV��LQFOXGLQJ�XVHU�VWDWLVWLFV��

Page 322: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–24

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�STAT�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�7RROV�→�$GPLQLVWUDWLRQ0RQLWRU�→�3HUIRUPDQFH�→�:RUNORDG→�6WDWLVWLFV�UHFRUGV��

�� 3URYLGH�WKH�GHVLUHG�VHOHFWLRQ�FULWHULD�IRU�H[DPSOH��E\�HQWHULQJ�FULWHULD�IRUXVHU��WUDQVDFWLRQ��SURJUDP��WDVNW\SH��ZRUN�SURFHVV�QXPEHU��VWDUW�WLPH��HWF���

�� &KRRVH� �WR�GLVSOD\�WKH�VWDWLVWLFUHFRUGV�

7KH�:RUNORDG��'LVSOD\�6WDWLVWLFDO5HFRUGV�VFUHHQ�DSSHDUV�

�� 3ODFH�WKH�FXUVRU�LQ�WKH�XVHU�LQIRUPDWLRQ�DQG�GRXEOH�FOLFN�IRUIXUWKHU�GHWDLOHG�LQIRUPDWLRQ�

�� &KRRVH� �

5

2

3

4

Page 323: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–25

67���²�8VHU�3URILOH

7KH�&RPSXWHU�&HQWHU�0RQLWRULQJ�6\VWHP��&&06���WUDQVDFWLRQ�67���¥�8VHU�3URILOH��FDQ�EH�XVHG�WR�FROOHFWLQIRUPDWLRQ�DERXW�< 7KH�VHUYHUV�DQG�ORJJHG�RQ�XVHUV< 8VHU�DQG�VHUYHUV�LQ�XVH

7KH�XVHU�SURILOH�OLVW�SURYLGHV�\RX�ZLWK�DQ�RYHUYLHZ�RI�WKH�ORJJHG�RQ�XVHUV�DQG�WKHLU�DFFXPXODWHG�UHVSRQVHWLPHV��7KH�GHWDLO�VFUHHQ�VKRZV�WKH�OLVW�RI�XVHUV�WRJHWKHU�ZLWK�WKHLU�GLDORJ�VWHSV�DFWLYLW\�DQG�UHVSRQVH�WLPHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�ST03�DQG�FKRRVH�(QWHU�RU�IURP�WKH�6$3�VWDQGDUG�PHQX�FKRRVH�$GPLQLVWUDWLRQ�→�0RQLWRU�→3HUIRUPDQFH�→�:RUNORDG�→�67���¥$QDO\VLV��

�� &KRRVH�3HUIRUPDQFH�GDWDEDVH�

�� &KRRVH�RQH�RI�WKH�IROORZLQJ�ZKHQWKH�GLDORJ�ER[�DSSHDUV�< 6LQJOH�VWDW��UHFRUGV< 7RGD\·V�ZRUNORDG< /DVW�PLQXWH�ZRUNORDG< /RFDO�DOHUW�PRQLWRU

�� &KRRVH�*RWR�→�8VHU�3URILOH�WR�REWDLQWKH�:RUNORDG��8VHU�3URILOH�5HSRUW�

2

3

Page 324: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–26

�� 7KH�:RUNORDG��8VHU�3URILOH�5HSRUWVFUHHQ�DSSHDUV�

�� 'RXEOH�FOLFN�RQ�WKH�XVHU�QDPH�LQ�WKH8VHU�FROXPQ�WR�REWDLQ�DGGLWLRQDOGHWDLOHG�LQIRUPDWLRQ�UHJDUGLQJ�WKHWUDQVDFWLRQ�DFWLYLW\�E\�XVHU�LQ�D�OLVWIRUPDW�

7KH�GHWDLOHG�WUDQVDFWLRQ�LQIRUPDWLRQDSSHDUV�IRU�WKH�FKRVHQ�XVHU�

�� &KRRVH� �

7

6

Page 325: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Release 4.6A/B13–27

/RJJLQJ�RI�6SHFLILF�$FWLYLWLHV

5���ORJV�RWKHU�VSHFLILF�DFWLYLWLHV�LQ�YDULRXV�ORJV��:H�GLVFXVV�WKH�IROORZLQJ�VSHFLILF�ORJVEHORZ�

/RJJLQJ�&KDQJHV�WR�7DEOH�'DWD

:H�UHFRPPHQG�WKDW�\RX�DFWLYDWH�WKH�ORJJLQJ�RI�WDEOH�GDWD�IRU�WKRVH�WDEOHV�WKDW�DUH�FULWLFDO�RUVXVFHSWLEOH�WR�DXGLWV��$JDLQ��\RX�PXVW�H[SOLFLWO\�DFWLYDWH�WKLV�ORJJLQJ��1RWH�WKH�IROORZLQJ�< <RX�PXVW�VWDUW�WKH�5���6\VWHP�ZLWK�WKH�UHF�FOLHQW SURILOH�SDUDPHWHU�VHW��7KLV�SDUDPHWHU

VSHFLILHV�5���ORJV�IRU�DOO�FOLHQWV�RU�RQO\�VSHFLILF�FOLHQWV��:H�UHFRPPHQG�VHWWLQJ�WKLVSDUDPHWHU�WR�ORJ�DOO�FOLHQWV�LQ�\RXU�SURGXFWLYH�V\VWHP�

< 6HW�WKH�/RJ�GDWD�FKDQJHV IODJ�IRU�WKRVH�WDEOHV�WKDW�\RX�ZDQW�WR�KDYH�ORJJHG��,I�ERWK�RIWKHVH�FRQGLWLRQV�DUH�PHW��WKH�GDWDEDVH�ORJV�WDEOH�FKDQJHV�LQ�WKH�WDEOH�'%7$%357��6HWWLQJ�WKH�/RJ�GDWD�FKDQJHV IODJ�RQO\�GRHV�QRW�VXIILFH�LQ�UHFRUGLQJ�WDEOH�FKDQJHV��\RXPXVW�DOVR�VHW�WKH�UHF�FOLHQW SDUDPHWHU���<RX�FDQ�YLHZ�WKHVH�ORJV�ZLWK�WKH�WUDQVDFWLRQ6&8���:LWKLQ�5���5HOHDVH����$�RU�JUHDWHU��\RX�PD\�FDOO�UHSRUW�56973527�IRU�WKHHYDOXDWLRQ�RI�WKH�ERWK�� 7KH�FXVWRPL]LQJ�REMHFW�DQG�WDEOH�ORJ�GDWDEDVH� 5HSRUW�567%+,67�IRU�WDEOH�DQDO\VLV�ZLWK�KLVWRU\

,I�D�VWDQGDUG�GHOLYHUHG�6$3�WDEOH�LV�QRW�VHW�XS�WR�SHUPLW�ORJJLQJ�RI�FKDQJHV�DQG�\RXZLVK�WR�FKDQJH�LW��WKHQ�WKLV�DFWLRQ�LV�FRQVLGHUHG�D�PRGLILFDWLRQ�WR�WKH�5���6\VWHP��7RVHH�LI�D�WDEOH�SHUPLWV�ORJJLQJ�RI�FKDQJHV��JR�WR�WUDQVDFWLRQ�6(���RU�6(���DQG�ORRN�DW�WKHGDWDEDVH�WDEOH·V�WHFKQLFDO�VHWWLQJV��WKLV�LV�D�EXWWRQ�LQVLGH�RI�WKH�VFUHHQ�ZKHUH�WKH�WDEOH�LVGHILQHG��DW�WKH�ILHOG�FDOOHG�/RJ�GDWD�FKDQJHV�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHUWUDQVDFWLRQ�SCU3�DQG�FKRRVH�(QWHU�

�� 6HOHFW�/LVW�RI�FKDQJH�GRFV�

�� &KRRVH� �WR�REWDLQ�WKH�DQDO\VLV�RIWKH�FKDQJH�GRFXPHQWV�OLVW�IRU�ERWKFXVWRPL]LQJ�REMHFWV�DQG�WDEOHV�

2

3

Page 326: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Audit Tasks (SM21, STAT, ST03)

Authorizations Made Easy13–28

�� 5XQ�WKH�(YDOXDWLRQ�RI�FKDQJH�ORJVSURJUDP��56973527�IRU�WKHHYDOXDWLRQ�RI�ERWK�WKH�FXVWRPL]LQJREMHFW�DQG�WDEOH�ORJ�GDWDEDVH��ZLWKWKH�DSSURSULDWH�VHOHFWLRQ�FULWHULD�

�� &KRRVH� �WR�WKH�GLVSOD\�WKH�UHFRUGV�

7KH�WUDQVDFWLRQ�LV�H[HFXWHG�DQG�\RXDUH�EURXJKW�WR�WKH�(YDOXDWLRQ�RIFKDQJH�ORJV�VFUHHQ�

�� &KRRVH� �

5

6

Page 327: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Logging Changes to User Master Records, Profiles, and Authorizations

Release 4.6A/B13–29

/RJJLQJ�&KDQJHV�WR�8VHU�0DVWHU�5HFRUGV��3URILOHV��DQG

$XWKRUL]DWLRQV

5���ORJV�FKDQJHV�PDGH�E\�D�XVHU�DGPLQLVWUDWRU�LQ�QRQWUDQVSDUHQW�WDEOHV�LQ�WKH�GDWDEDVH�$FFHVV�WR�WKHVH�WDEOHV�LV�SURWHFWHG�E\�WKH�5���DXWKRUL]DWLRQ�FRQFHSW��2QFH�WKHVH�ORJV�KDYHEHHQ�DUFKLYHG��WKH\�DUH�GHOHWHG��'HSHQGLQJ�RQ�\RXU�UHOHDVH��XVH�HLWKHU�WKH�DXWKRUL]DWLRQLQIRV\VWHP�RU�WUDQVDFWLRQ�68���WR�DFFHVV�WKHVH�ORJV��<RX�FDQ�YLHZ�WKH�IROORZLQJ�FKDQJHV�< &KDQJHV�PDGH�GLUHFWO\�WR�D�XVHU·V�DXWKRUL]DWLRQ

7KHVH�DUH�FKDQJHV�PDGH�WR�WKH�SURILOH�OLVW�LQ�WKH�XVHU·V�PDVWHU�UHFRUG��7KLV�GRHV�QRWLQFOXGH�LQGLUHFW�FKDQJHV�WKDW�RFFXU�ZKHQ�DXWKRUL]DWLRQV�RU�SURILOHV�DUH�FKDQJHG��9LHZWKH�FKDQJH�GRFXPHQWV�IRU�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�WR�FKHFN�WKRVH�FKDQJHV�

< &KDQJHV�WR�WKH�� 8VHU�SDVVZRUG��KDVKHG�UHSUHVHQWDWLRQ�RQO\�� 8VHU�W\SH� 8VHU�JURXS� 9DOLGLW\�SHULRG� $FFRXQW�QXPEHU

< &KDQJHV�PDGH�GLUHFWO\�WR�SURILOHV�RU�DXWKRUL]DWLRQV�

)RU�PRUH�LQIRUPDWLRQ��VHH�%&�8VHUV�DQG�$XWKRUL]DWLRQV�→�&UHDWLQJ�DQG�0DLQWDLQLQJ�8VHU0DVWHU�5HFRUGV�→�'LVSOD\LQJ�&KDQJH�'RFXPHQWV�

Page 328: Amez 46 all

Chapter 13: SAP Security Audit and Logging

Logging Changes to User Master Records, Profiles, and Authorizations

Authorizations Made Easy13–30

Page 329: Amez 46 all

14–1

&KDSWHU���� 8SJUDGH

&RQWHQWV

Before Doing Any Upgrade ..................................................................................14–2

Validation Steps After Upgrading Is Completed................................................14–3

Converting Previously Created SU02 Profiles into Activity Groups ...............14–4

Upgrade from a Release Prior to 3.1x to 4.6 A/B .............................................14–11

Upgrade from Release 3.0F to 4.6 A/B..............................................................14–12

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B..........................................14–14

Upgrade from Releases 4.0x or 4.5x to 4.6 A/B ...............................................14–22

����

Page 330: Amez 46 all

Chapter 14: Upgrade

Before Doing Any Upgrade

Authorizations Made Easy14–2

%HIRUH�'RLQJ�$Q\�8SJUDGH

%HIRUH�GRLQJ�DQ\�XSJUDGH��\RX�VKRXOG�

�� 5HYLHZ�WKH�6$31HW�²�5���)URQWHQG�QRWHV�IRU�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ�WR�:KHQ�VHDUFKLQJ�5���6$31HW�²�5���)URQWHQG�QRWHV��SHUIRUP�VHYHUDO�VHDUFKHV��)RUH[DPSOH��ILUVW�VHDUFK�RQ�WKH�FRPSRQHQW�%&�&&0�86 ��7KHQ�VHDUFK�RQ�WKH�NH\�ZRUGVauthorization��security��DQG�user master�IRU�WKH�UHOHDVH�\RX�DUH�SODQQLQJ�WRZRUN�RQ�

�� 5HYLHZ�UHOHDVH�QRWHV�UHODWHG�WR�DXWKRUL]DWLRQV�IRU�DOO�YHUVLRQV�EHWZHHQ�WKH�YHUVLRQ�\RXDUH�FXUUHQWO\�XVLQJ�DQG�WKH�YHUVLRQ�\RX�ZLOO�EH�LPSOHPHQWLQJ��)RU�H[DPSOH��LI�\RX�DUHXSJUDGLQJ�IURP����+�WR����%��UHDG�WKH�UHOHDVH�QRWHV�IRU�YHUVLRQV����,�����$�����%�����$����%�����$��DQG����%��7R�UHYLHZ�WKH�UHOHDVH�QRWHV��FKRRVH�+HOS�→�5HOHDVH�QRWHV�RQ�\RXUV\VWHP��6HOHFW�WKH�&RPSOHWH�OLVW�5HO������DQG�WKHQ�FKRRVH�WKH�VSHFLILF�UHOHDVH�\RX�ZDQW�WRJHW�LQIRUPDWLRQ�RQ��,Q�WKH�WUHH�VWUXFWXUH�WKDW�DSSHDUV��XVH�WKH�VHDUFK�IXQFWLRQ�DQGSHUIRUP�D�VHDUFK�RQ�WKH�ZRUGV�authorization��checks��DQG�security��$OVR��\RXZLOO�ZDQW�WR�UHDG�WKH�VHFWLRQ�RQ�WKH�WUHH�EHQHDWK�%DVLV�→�&RPSXWHU�&HQWHU�0DQDJHPHQW6\VWHP�→�8VHUV�DQG�$XWKRUL]DWLRQV��5HYLHZ�WKH�UHOHDVH�QRWHV�EHFDXVH�WKH\�WHOO�\RX�ZKDWQHZ�IXQFWLRQDOLW\�LV�QRZ�DYDLODEOH��DV�ZHOO�DV�FKDQJHV�WR�H[LVWLQJ�IXQFWLRQDOLW\�WKDW�\RXPD\�QHHG�WR�FRQVLGHU�LQ�WKH�QHZ�XSJUDGHG�HQYLURQPHQW�

%H�DZDUH�WKDW�WKH�DERYH�PHQWLRQHG�UHOHDVH�QRWHV�RQO\�WHOO�\RX�ZKDW�LV�QHZ�IRU�WKH�WRROLWVHOI��,W�GRHV�QRW�WHOO�\RX�DERXW�QHZ�DXWKRUL]DWLRQV�DQG�WKH�SXUSRVH�RI�QHZDXWKRUL]DWLRQV�LQ�DSSOLFDWLRQV��)RU�LQIRUPDWLRQ�DERXW�QHZ�DXWKRUL]DWLRQ�IXQFWLRQDOLW\DYDLODEOH�ZLWKLQ�D�SDUWLFXODU�DSSOLFDWLRQ��\RX�PXVW�UHDG�WKH�UHOHDVH�QRWHV�IRU�WKDWSDUWLFXODU�DSSOLFDWLRQ�

�� 'HYLVH�D�EDFNXS�DQG�GLVDVWHU�UHFRYHU\�SODQ�IRU�DXWKRUL]DWLRQV��%H�UHDOLVWLF��,I�\RX�KDYHGRQH�H[WHQVLYH�PRGLILFDWLRQV�RU�FKDQJHV�WR�VWDQGDUG�6$3�5���ORJLF��WKHVH�FKDQJHV�PD\FDXVH�SUREOHPV�DIWHU�WKH�XSJUDGH��<RX�PD\�ZDQW�WR�FUHDWH�D�WHPSRUDU\�JURXS�RI�DFWLYLW\JURXSV�WKDW�FDQ�EH�XVHG�LQ�WKH�LQWHULP�VR�RSHUDWLRQV�FDQ�FRQWLQXH��'LVFXVV�\RXU�EDFNXSSODQ�ZLWK�WKH�SURMHFW�PDQDJHPHQW�RU�V\VWHP�DGPLQLVWUDWRUV��$�JRRG�LGHD�LV�WR�FUHDWHWKHVH�WHPSRUDU\�DFWLYLW\�JURXSV�LPPHGLDWHO\�ZKHQ�\RX�JHW�DFFHVV�WR�WKH�QHZ�V\VWHP�

�� 0DNH�FHUWDLQ�WKDW�WKH�%DVLV�WHDP�UHFRJQL]HV�DQG�DSSURSULDWHO\�DOORFDWHV�LQ�WKH�XSJUDGHWLPHOLQH�WKDW�WKH�DXWKRUL]DWLRQ�SHUVRQ�LV�DQ�LQWHJUDO�SDUW�RI�WKH�XSJUDGH�SURFHGXUH��DQGWKDW�WKH�XSJUDGH��IURP�D�WHFKQLFDO�SHUVSHFWLYH��LV�QRW�FRPSOHWH�XQWLO�WKH�DXWKRUL]DWLRQVSRUWLRQ�LV�DOVR�FRPSOHWH�

�� ,I�\RX�KDYH�PDGH�DQ\�FKDQJHV�ZLWK�68����WKHQ�LW�LV�KLJKO\�DGYLVDEOH�WKDW�\RX�GRZQORDGWR�D�ORFDO�ILOH��DQG�VDYH�RXWVLGH�RI�WKH�5���6\VWHP��WKH�FRQWHQWV�RI�WKH�WZR�WDEOHV862%7B&�DQG�862%;B&�IURP�WKH�YHUVLRQ�\RX�DUH�XSJUDGLQJ��7KHVH�WDEOHV�PD\�EHQHHGHG�LQ�WKH�HYHQW�WKDW�D�GLVDVWHU�UHFRYHU\�QHHGV�WR�EH�SHUIRUPHG�

Page 331: Amez 46 all

Chapter 14: Upgrade

Validation Steps After Upgrading Is Completed

Release 4.6 A/B14–3

,Q�WKLV�FKDSWHU��ZH�VKRZ�\RX�WKH�VWHSV�UHTXLUHG�DIWHU�DQ�5���6\VWHP�XSJUDGH��7KLVLQIRUPDWLRQ�LV�DGYDQWDJHRXV�LPPHGLDWHO\�DIWHU�\RXU�XSJUDGH��%H�VXUH�WR�UHDG�WKLV�FKDSWHUEHIRUH�FRQWLQXLQJ�\RXU�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU��3*��LQ�D�QHZ�UHOHDVH�

7KH�VSHFLILF�VWHSV�LQYROYHG�DIWHU�WKH�XSJUDGH�GHSHQG�RQ�WKH�VRXUFH�DQG�WDUJHW�UHOHDVH�\RXDUH�FRPLQJ�IURP�

9DOLGDWLRQ�6WHSV�$IWHU�8SJUDGLQJ�,V�&RPSOHWHG

�� ,QVWDOO�DGG�RQ�FRPSRQHQWV�WR�WKH�XSJUDGHG�V\VWHP��LI�DQ\��DORQJ�ZLWK�ZKDWHYHUDXWKRUL]DWLRQV�FRPH�ZLWK�WKDW�DGG�RQ�FRPSRQHQW��IRU�H[DPSOH�GHGXFWLRQ�PDQDJHPHQWFRPSRQHQWV��$XGLW�,QIRUPDWLRQ�V\VWHP��

�� 8SJUDGH�WKH�UHSRUW�WUHH�PLJUDWLRQ�

7KH�GDWD�VWUXFWXUH�RI�WKH�UHSRUW�WUHHV�FKDQJHV��7R�FRQWLQXH�XVLQJ�\RXU�VHOI�FUHDWHG�UHSRUWWUHHV��WKH\�PXVW�EH�DGMXVWHG�WR�WKH�FKDQJHG�GDWD�VWUXFWXUHV��7KH�6$3�SURYLGHG�UHSRUWWUHHV�JHQHUDWH�LQWR�DUHD�PHQXV�DXWRPDWLFDOO\��7KH�PLJUDWLRQ�LV�SHUIRUPHG�XVLQJ�WKHWUDQVDFWLRQ�5775((B0,*5$7,21��7KH�WUDQVDFWLRQ�LV�H[HFXWHG�LQ�WKH�FOLHQW�FRQWDLQLQJWKH�SURGXFWLRQ�YHUVLRQV�RI�WKH�UHSRUW�WUHHV��'XULQJ�WKH�PLJUDWLRQ��WUDQVDFWLRQ�FRGHV�DUHDXWRPDWLFDOO\�DVVLJQHG�IRU�DOO�UHSRUWV�LQ�D�WUHH��7KLV�PDNHV�LW�SRVVLEOH�WR�DGG�UHSRUWV�WRWKH�XVHU�PHQX�LQ�DFWLYLW\�JURXS�PDLQWHQDQFH��,I�\RX�ZDQW�WR�FUHDWH�WUDQVDFWLRQ�FRGHVZLWK�D�FRPSDQ\�VSHFLILF�SUHIL[��\RX�FDQ�VHW�WKLV�E\�JRLQJ�WR�WKH�6$3�5HIHUHQFH�,0*�DQGFKRRVLQJ�%DVLV�&RPSRQHQWV�→�6\VWHP�$GPLQLVWUDWLRQ�→�8VHUV�DQG�$XWKRUL]DWLRQV�→�6HWQDPHVSDFH�IRU�UHSRUW�WUHH�PLJUDWLRQ�DQG�VSHFLILF�,0*�DFWLYLWLHV�

�� 9DOLGDWH�WKH�XVHU�PDVWHU�UHFRUGV�IRU�QHZ�ILHOGV�ZLWK�QHZ�YDOXHV��LI�QHHGHG��68����

�� (QVXUH�WKDW�WKH�3*�DQG�RWKHU�V\VWHP�SDUDPHWHUV�DUH�VHOHFWHG�DV�UHTXLUHG��VHH�FKDSWHU���6HWWLQJ�8S�WKH�3URILOH�*HQHUDWRU��

�� 8SJUDGH�WKH�DFWLYLW\�JURXSV�ZLWK�WUDQVDFWLRQ�68���DQG�SHUIRUP�VWHSV��$�WR��'�

�� 8VH�XVHU�PDVWHU�UHFRQFLOLDWLRQ��WUDQVDFWLRQ�3)8'���LI�QHHGHG

0DNH�FHUWDLQ�WKDW�\RXU�UHSRUW�WUHHV�KDYH�XSJUDGHG�SURSHUO\��,I�XSJUDGLQJ�IURP�5HOHDVH����[RU�EHORZ�WR������VRPH�FRUH�FKDQJHV�KDYH�EHHQ�PDGH�WR�WKH�IXQFWLRQDOLW\�DQG�SUHVHQWDWLRQ�RIUHSRUW�WUHHV�

,I�XSJUDGLQJ�IURP����[�RU�EHORZ�WR������EH�DZDUH�WKDW�WKHUH�\RX�DUH�QRZ�LQYROYHG�LQ�DV\VWHP�WKDW�KDV�D�ORW�PRUH�IXQFWLRQDOLW\�WR�GHDO�ZLWK�WKH�ZRUOG�´RXWVLGHµ�RI�5����7KHVH�FDOOVWKDW�ZRUN�RXWVLGH�RI�5���DUH�FRPPRQO\�KDQGOHG�WKURXJK�YHU\�VSHFLDO�W\SHV�RI�IXQFWLRQPRGXOH��$�IXQFWLRQ�PRGXOH�EHORQJV�WR�D�IXQFWLRQ�JURXS��7KH�6B5)&�DXWKRUL]DWLRQ�REMHFW�LVFULWLFDO�LQ�V\VWHPV�PRUH�UHFHQW�WKDQ����[��7KLV�DXWKRUL]DWLRQ�REMHFW�PD\�EH�WRWDOO\�´VKXW�RIIµYLD�D�563$5$0�SDUDPHWHU�YDOXH��EXW�ZH�GR�QRW�VXJJHVW�VKXWWLQJ�LW�RII��$V�VXFK��\RX�ZLOOQHHG�WR�GHDO�ZLWK�6B5)&�DIWHU�WKH�XSJUDGH�

)LUVW�XSJUDGH�\RXU�'(9�V\VWHP��3HUIRUP�DOO�WKH�VWHSV�LQ�'(9��'HWHUPLQH�ZKDW�LV�DQG�ZKDWLV�QRW�WUDQVSRUWDEOH�WR�WKH�4$6�V\VWHP�DQG�35'�V\VWHP��$OPRVW�QRWKLQJ�QHHGV�WR�EH�GRQHGLUHFWO\�LQ�35'�DV�\RX�VKRXOG�EH�DEOH�WR�WUDQVSRUW�DOPRVW�HYHU\WKLQJ�IURP�'(9��1R�RQHVKRXOG�HYHU�DWWHPSW�WR�XSGDWH�DXWKRUL]DWLRQV�LQ�VROHO\�35'�

Page 332: Amez 46 all

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–4

7KH�XVHU�PDVWHU�UHFRUG�KDV�UHPDLQHG�UHODWLYHO\�WKH�VDPH�WKURXJKRXW�WKH�UHOHDVHV��+RZHYHU�WKHUH�DUH�WZR�WKLQJV�WKDW�VKRXOG�EH�QRWHG�LQ�WUDQVDFWLRQ�68���< 2Q�WKH�'HIDXOWV�WDE��WKHUH�DUH�WZR�QHZ�ILHOGV�

� 3HUVRQDO�WLPH�]RQH�²�7KLV�ILHOG�VKRXOG�EH�ILOOHG�LQ�DIWHU�WKH�XSJUDGH��$�VPDOOFRQYHUVLRQ�SURJUDP�FDQ�EH�ZULWWHQ�WR�ILOO�WKLV�ILHOG�

� 'DWH�IRUPDW�²�7KLV�QHZ�ILHOG�SHUPLWV�\RX�WR�XVH�WKH�GDWH�IRUPDW�<<<<�00�''��EHDZDUH�WKDW�VRPH�SODFHV�LQ�5���KDYH�QRW�EHHQ�FRGHG�\HW�WR�UHFRJQL]H�WKLV�QHZIRUPDW��

< 2Q�WKH�$GGUHVV�WDE��WKHUH�LV�DGGUHVV�LQIRUPDWLRQ�DERXW�WKH�XVHU��7KLV�DGGUHVVLQIRUPDWLRQ�LV�OLQNHG�WR�WKH�����LQWURGXFHG�IXQFWLRQDOLW\�IRU�WKH�FHQWUDO�DGGUHVVPDQDJHPHQW�FRPSRQHQW�RI�5���

&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\

*URXSV

&UHDWLQJ�DQ�$FWLYLW\�*URXS�IURP�0DQXDOO\�0DLQWDLQHG�3URILOHV

,I�\RX�FUHDWHG�SURILOHV�PDQXDOO\�XVLQJ�WUDQVDFWLRQ�68����\RX�FDQ�FUHDWH�DQ�DFWLYLW\�JURXS�IURP�WKHVHSURILOHV��7KH�SURILOHV�FDQ�EH�VLQJOH��DV�ZHOO�DV�FRPSRVLWH��8VH�WUDQVDFWLRQ�68����8SJUDGH�DQG�ILUVWLQVWDOODWLRQ��

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�

2

Page 333: Amez 46 all

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–5

�� 5HDG�WKH�,PSRUWDQW�LQIRUPDWLRQZLQGRZ�

�� &KRRVH� �

7KH�V\VWHP�SURSRVHV�DOO�WKH�PDQXDOO\FUHDWHG�SURILOHV�

�� 6HOHFW�WKH�SURILOH�\RX�ZDQW�WRFRQYHUW�WR�DQ�DFWLYLW\�JURXS��IRUH[DPSOH��1$)�3*�����

�� &KRRVH� �2SWLPL]HG�

6HH�WKH�GRFXPHQWDWLRQ�IURP�WKH,PSRUWDQW�LQIRUPDWLRQ�ZLQGRZ�DERYH�IRUWKH�EHQHILWV�RI�WKLV�RSWLRQ�

<RX�DOVR�KDYH�WKH�RSWLRQ�WR�XVH� �,GHQWLFDO�WR�SURILOH�LI�\RX�ZRXOG�OLNH�WR�KDYH�WKHDXWKRUL]DWLRQV�GDWD�FRQYHUWHG�LGHQWLFDOO\�LQ�WKH�DFWLYLW\�JURXS��7KH�0HQX�WDE�ZRXOGUHPDLQ�HPSW\�WKRXJK��7KH�0HQX�WDE�DOVR�UHPDLQV�HPSW\�LI�\RX�FKRRVH� �2SWLPL]HG�XQOHVV�\RX�KDYH�GLVFUHWH�YDOXHV�IRU�6B7&2'(�LQ�\RXU�SURILOH��*HQHULF�YDOXHV�VXFK�DV�6( RU�UDQJHV�IURP�6¥3�DUH�LJQRUHG�

�� &KRRVH�<HV�

4

5

6

7

Tip

Page 334: Amez 46 all

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–6

7KH�/LVW�RI�DFWLYLW\�JURXS�FUHDWHGVFUHHQ�DSSHDUV�

�� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS�

7KH�&KDQJH�$FWLYLW\�*URXSV�VFUHHQDSSHDUV��7R�PDLQWDLQ�WKH�DFWLYLW\JURXS��SHUIRUP�WKH�IROORZLQJ�VWHSV�

�� ,Q�'HVFULSWLRQ��WKH�GHVFULSWLRQ�WKDWH[LVWHG�IRU�WKH�68���FUHDWHG�SURILOHZLOO�GHIDXOW�LQWR�WKLV�ILHOG�

$W�WKH�WLPH�RI�WKLV�ZULWLQJ��WKH�68���FUHDWHG�ORQJ�GHVFULSWLRQ�WH[W�ZDV�QRWFRSLHG�LQWR�WKH�QHZO\�FUHDWHGDFWLYLW\�JURXS�

��� 2Q�WKH�'HVFULSWLRQ�WDE��SURYLGH�DGHWDLOHG�GHVFULSWLRQ�XQGHU�$FWLYLW\JURXS�GHVFULSWLRQ�

8

9

10

Page 335: Amez 46 all

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–7

2Q�WKH�0HQX�WDE��\RX�FDQ�DGG�RWKHUWUDQVDFWLRQV��RU�ZHE�DGGUHVVHV��,I�LQ�WKHPDQXDOO\�FUHDWHG�SURILOH�\RX�KDG�DYDOXH�LQ�WKH�DXWKRUL]DWLRQ�REMHFW6B7&2'(��WKH�V\VWHP�FUHDWHV�D�PHQX�7KLV�PHQX�ZLOO�EH�WKH�ODXQFK�SDG�IRU�WKHXVHU�IRU�WKH�(DV\�$FFHVV�PHQX�

��� 2Q�WKH�$XWKRUL]DWLRQV�WDE��FKRRVH�&KDQJH�DXWKRUL]DWLRQ�GDWD�

11

Page 336: Amez 46 all

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–8

��� 5HYLHZ�DOO�WUDIILF�OLJKWV�WKDW�DUH�QRWJUHHQ�DQG�FOLFN�RQ� �WR�SODFH�YDOXHVLQ�WKH�ILHOG��RU�FOLFN�RQ�WKH�DVWHULVN�WRDOORZ�DOO�YDOXHV�LQ�WKLV�ILHOG��

:KHQ�DOO�YDOXHV�DUH�FRPSOHWH��WKHWUDIILF�OLJKWV�WXUQ�JUHHQ�

��� &KRRVH� �

��� 7R�FUHDWH�WKH�SURILOH��FKRRVH� �

��� &KRRVH� �

��� 2Q�WKH�8VHU�WDE��FKRRVH�8VHU�FRPSDUH��&RPSDUH�WKH�XVHU

PDVWHU�UHFRUG�WR�WUDQVIHU�WKHJHQHUDWHG�SURILOH�YDOXHV�WR�WKH�XVHUPDVWHU��7KLV�UHFRUG�PD\�GLIIHU�IURPWKH�RULJLQDO��GHSHQGLQJ�RQ�WKHDGMXVWPHQWV�WKDW�ZHUH�PDGH�

,I�D�XVHU�ZDV�DVVLJQHG�WR�D�SURILOH��WKHQWKH�XVHU�LV�DXWRPDWLFDOO\�DVVLJQHG�WR�WKHMXVW�FUHDWHG�DFWLYLW\�JURXS�

13

14

15

12

16

Tip

Page 337: Amez 46 all

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Release 4.6 A/B14–9

5HPRYLQJ�8VHU�$VVLJQPHQWV�IURP�WKH�2ULJLQDO�68���3URILOH

<RX�FDQ�UHPRYH�WKH�XVHU�DVVLJQPHQW�IURP�D�SURILOH�ZLWK�68���RU�68����,Q�WKH�IROORZLQJ��SURFHGXUH��ZHGHPRQVWUDWH�KRZ�WR�UHPRYH�D�XVHU�DVVLJQPHQW�IURP�D�SURILOH�WKDW�KDV�EHHQ�FUHDWHG�ZLWKRXW�WKH�3*�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

�� &KRRVH�VWHS����&RS\�GDWD�IURP�ROGSURILOHV�

�� 7R�FRQWLQXH��FKRRVH� �

2

3

Page 338: Amez 46 all

Chapter 14: Upgrade

Converting Previously Created SU02 Profiles to Activity Groups

Authorizations Made Easy14–10

$�OLVW�ZLWK�DOO�DFWLYH�SURILOH�DSSHDUV�

�� 6HOHFW�WKH�SURILOH�V��IURP�ZKLFK�\RXZRXOG�OLNH�WR�UHPRYH�WKH�XVHUDVVLJQPHQW��IRU�H[DPSOH��1$)B�����

�� 7R�GHOHWH�WKH�DVVLJQPHQW��FKRRVH�8VHU�DVVLJQPHQWV�

�� &KRRVH�<HV�

�� 7KH�V\VWHP�UHWXUQV�WKH�DIIHFWHGXVHUV�DQG�UHPRYHG�SURILOHV�WKDWZHUH�UHPRYHG�IURP�WKH�XVHU�PDVWHUUHFRUGV�

,I�QR�XVHUV�ZHUH�DVVLJQHG��\RXUHFHLYH�QR�PHVVDJH�

�� <RX�FDQ�QRZ�FKHFN�WKH�VHOHFWHG�XVHUPDVWHU�UHFRUG�WR�VHH�WKDW�WKHDVVLJQPHQWV�WR�WKH�PDQXDOO\�FUHDWHGSURILOHV�ZHUH�UHPRYHG�

�� &KRRVH� �WR�UHWXUQ�

4

5

6

7

9

Page 339: Amez 46 all

Chapter 14: Upgrade

Upgrading from a Release Prior to 3.1x to 4.6 A/B

Release 4.6 A/B14–11

8SJUDGLQJ�IURP�D�5HOHDVH�3ULRU�WR����[�WR�����$�%

5HDG�FKDSWHU����6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�DQG�FKDSWHU�����7LSV��7URXEOHVKRRWLQJ�LI�< <RX�DUH�XSJUDGLQJ�IURP�D�UHOHDVH�SULRU�WR����*< ,Q�WKH�UHOHDVH�SULRU�WR����*��\RX�FRXOG�QRW�RU�GLG�QRW�XVH�WKH�3*< <RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*�QRZ

<RX�IDFH�WZR�PDLQ�TXHVWLRQV�< 'R�\RX�FRQYHUW�WKH�DXWKRUL]DWLRQ�SURILOHV�FUHDWHG�ZLWK�WUDQVDFWLRQV�68���DQG�68���LQWR

SURILOHV�WKDW�FDQ�EH�PDLQWDLQHG�E\�WKH�3*"< 'R�\RX�UH�FUHDWH�WKH�DXWKRUL]DWLRQ�SURILOHV�IURP�VFUDWFK�XVLQJ�WKH�3*"

7KH�IROORZLQJ�VHFWLRQV�SURYLGH�VRPH�KLQWV�WR�DQVZHULQJ�WKHVH�TXHVWLRQV�

&RQYHUWLQJ�([LVWLQJ�$XWKRUL]DWLRQ�3URILOHV�IRU�WKH�3URILOH�*HQHUDWRU

)LUVW��FUHDWH�DQG�VDYH�D�QHZ�DFWLYLW\�JURXS�IRU�HDFK�MRE��5DWKHU�WKDQ�VHOHFWLQJ�EXVLQHVVWUDQVDFWLRQV�IURP�WKH�FRPSDQ\�PHQX�WUHH��FKRRVH�WKH�$XWKRUL]DWLRQV�WDE�LQ�WKH�&KDQJH$FWLYLW\�*URXSV�VFUHHQ��7KHQ�IROORZ�WKH�VWHSV�GHVFULEHG�LQ�FKDSWHU����,QVHUWLQJ�$XWKRUL]DWLRQVIURP�D�3URILOH�

7KH�DGYDQWDJH�WR�WKLV�PHWKRG�LV�WKDW�\RX�FDQ�ZRUN�ZLWK�H[LVWLQJ��ZHOO�WHVWHG�SURILOHV��,IREMHFW�6B7&2'(�GRHV�QRW�KDYH�DQ�DXWKRUL]DWLRQ��PDQXDOO\�LQVHUW�RQH��0DLQWDLQ�WKHSHUPLWWHG�WUDQVDFWLRQ�IRU�HDFK�DFWLYLW\�JURXS�DV�DXWKRUL]DWLRQ�YDOXHV�IRU�REMHFW�6B7&2'(�LQWKH�SURILOH�\RX�ZLOO�JHQHUDWH�IRU�WKLV�DFWLYLW\�JURXS��<RX�FDQ��RI�FRXUVH��PDLQWDLQ�DQ�DVWHULVN� ���EXW�WKLV�LV�D�GLVDGYDQWDJH��EHFDXVH�XVHUV�ZRXOG�UHFHLYH�PRUH�DFFHVV�WKDQ�\RX�ZDQW�WRJLYH�WKHP��7KH�RWKHU�GLVDGYDQWDJH�LV�WKDW�VLQFH�WKH�XVHU�VSHFLILF�PHQX�LV�PLVVLQJ��\RXFDQQRW�UH�FUHDWH�WKH�LQIRUPDWLRQ�VDYHG�LQ�DQ�DFWLYLW\�JURXS��<RX�PD\�FRQYHUW�\RXU�ROGSURILOHV�DQG�ZRUN�ZLWK�WKHP�XQWLO�\RX�QHHG�WR�UH�FUHDWH�DQG�GHOHWH�WKHP�

6HH�DOVR�&RQYHUWLQJ�3UHYLRXVO\�&UHDWHG�68���3URILOHV�WR�$FWLYLW\�*URXSV�RQ�SDJH���²��

5H�FUHDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�IURP�6FUDWFK�8VLQJ�WKH�3URILOH*HQHUDWRU

)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU���8VHU�5ROH�7HPSODWHV��FKDSWHU���$GYDQFHG�3URILOH�*HQHUDWRU)XQFWLRQDOLW\��DQG�FKDSWHU���0LVVLQJ�$XWKRUL]DWLRQV�

Page 340: Amez 46 all

Chapter 14: Upgrade

Upgrading from Release 3.0F to 4.6 A/B

Authorizations Made Easy14–12

8SJUDGLQJ�IURP�5HOHDVH����)�WR�����$�%

$Q�XSJUDGH�IURP�5HOHDVH����)�WR����$�LV�QRW�SRVVLEOH�LI�\RX�XVH�5���+5�6XSSRUW3DFNDJHV��)XUWKHU�LQIRUPDWLRQ�LV�DYDLODEOH�LQ�6$31HW���5���)URQWHQG�QRWH��������

$IWHU�\RXU�����XSJUDGH��LI�\RX�FUHDWH�DFWLYLW\�JURXSV�DQG�JHQHUDWH�SURILOHV�LQ�5HOHDVH����)ZLWK�WKH�SUHOLPLQDU\�YHUVLRQ�RI�WKH�3*��WKHQ�

�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�

)ROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH3DUDPHWHU��,I�WKH�SDUDPHWHU�LV�LQDFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG�

7KH�3*�LV�DOUHDG\�DFWLYH�LQ�5HOHDVH�����WKRXJK�

$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJHE\�UHIHUULQJ�WR�FKDSWHU����WKH�VHFWLRQ�$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�

�� %HFDXVH�WKH�FXVWRPHU�WDEOHV�862%;B&�DQG�862%7B&�ZHUH�QRW�D�SDUW�RI�WKH�5HOHDVH����)YHUVLRQ�RI�WKH�3*��FRS\�WKH�6$3�GHIDXOWV�LQ�WKHVH�FXVWRPHU�WDEOHV�

7R�FRS\�WKHVH�GHIDXOWV��UXQ�WUDQVDFWLRQ�68���DQG�SHUIRUP�WKH�VWHSV�LQ�FKDSWHU����WKHVHFWLRQ�/RDGLQJ�WKH�862%;B&�DQG�862%7B&�7DEOHV��,Q�WUDQVDFWLRQ�68����SHUIRUP�WKH�ILUVWVWHS�FDOOHG�,QLWLDOO\�ILOO�WKH�FXVWRPHU�WDEOHV�

$OVR�UHDG�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�WR�OHDUQ�PRUHDERXW�WKH�QHZ�IXQFWLRQDOLW\��7KHQ�GHFLGH�ZKHWKHU�\RX�QHHG�WR�SHUIRUP�DGGLWLRQDO�VWHSVRQ�WKH�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKH�WUDQVDFWLRQV�\RX�DUH�XVLQJ�

�� $IWHU�WKH�XSJUDGH�WR�5HOHDVH����[��D�SURILOH�PDWFKXS�LV�UHTXLUHG�IRU�DOO�SURILOHV�JHQHUDWHGLQ�5HOHDVH����)��$IWHU�WKH�XSJUDGH��WKH�3*�GRHV�QRW�DXWRPDWLFDOO\�LQIRUP�\RX�WKDW�DFRPSDULVRQ�LV�QHFHVVDU\�IRU�WKHVH�SURILOHV��LQ�WUDQVDFWLRQ�3)&*��WKH�OLJKW�RQ�WKH$XWKRUL]DWLRQV�WDE�UHPDLQV�JUHHQ�IRU�WKH�SURILOHV�FUHDWHG�LQ�5HOHDVH����)��DQG�WUDQVDFWLRQ683&�GRHV�QRW�LQGLFDWH�ZKHWKHU�D�PDWFKXS�LV�DFWXDOO\�UHTXLUHG���1HYHUWKHOHVV��WKH�6$3GHIDXOW�GDWD�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�WKH�QHZ�UHOHDVH�KDV�EHHQ�LPSURYHG�VR�WKDW�D�SURILOH�PDWFKXS�LV�HVVHQWLDO�WR�HQVXUH�SURSHU�ZRUNLQJ�SURILOHV�DIWHU�WKHXSJUDGH�

Page 341: Amez 46 all

Chapter 14: Upgrade

Upgrading from Release 3.0F to 4.6 A/B

Release 4.6 A/B14–13

7R�SHUIRUP�D�SURILOH�PDWFKXS�

�� $FFHVV�WKH�3*��WUDQVDFWLRQ�PFCG��

�� 6HOHFW�DQ�DFWLYLW\�JURXS�FUHDWHG�LQ5HOHDVH������<RX�FDQ�RQO\�VHOHFWRQH�DFWLYLW\�JURXS�DW�D�WLPH��VHHWKH�IROORZLQJ�7LSV��7ULFNV��

7KLV�SURFHGXUH�KDV�WR�EH�SHUIRUPHGIRU�HDFK�DFWLYLW\�JURXS�VHSDUDWHO\��7RVSHHG�XS�WKH�SURFHVV��XVH�WUDQVDFWLRQ683&�ZKHUH�\RX�JHW�D�OLVW�RI�DOODFWLYLW\�JURXSV��6HOHFW�WKH�DFWLYLW\JURXS�WKDW�QHHGV�WR�EH�PDLQWDLQHG�E\GRXEOH�FOLFNLQJ�RQ�LW�

�� &KRRVH� &KDQJH�

�� &KRRVH�WKH�$XWKRUL]DWLRQV�WDE�

�� &KRRVH� �([SHUW�PRGH�IRU�SURILOHJHQHUDWLRQ�

3

4

5

Page 342: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–14

�� 6HOHFW�5HDG�ROG�VWDWXV�DQG�PHUJHZLWK�QHZ�GDWD�DV�WKH�FRUUHFWPDLQWHQDQFH�W\SH�

�� &KRRVH� �DQG�SRVWPDLQWDLQ�DQ\RSHQ�DXWKRUL]DWLRQ�ILHOGV�RQ�WKHQH[W�VFUHHQ��LI�UHTXLUHG�

'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWV�IRU�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�LQ�5HOHDVH����[��WKH�3*�PD\FUHDWH�VRPH�QHZ�DXWKRUL]DWLRQV��,I�\RX�VHH�QHZ�DXWKRUL]DWLRQV�FUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��GHDFWLYDWH�RU�GHOHWH�WKHP�

7KH�V\VWHP�LQFOXGHV�WKH�QHZ�UHTXLUHG�DXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJ�IRU�H[LVWLQJ�RQHV��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO�EXW�RIIHUV�LPSURYHG�V\VWHP�SHUIRUPDQFH��7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�DIWHU�0DNLQJ�&KDQJHV�

�� $IWHU�UHJHQHUDWLQJ�DOO�WKH�SURILOHV��\RX�KDYH�FRPSOHWHG�WKH�XSJUDGH�VWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�5HOHDVH����)�

1R�XVHU�PDVWHU�FRPSDULVRQ�LV�UHTXLUHG�IRU�SURILOHV�DOUHDG\�DVVLJQHG�WR�XVHUV��EXW�UHPHPEHU�WKDWFKDQJHV�EHFRPH�DFWLYH�ZLWK�WKH�QH[W�V\VWHP�ORJRQ�

8SJUDGH�IURP�5HOHDVHV����*�����+�����,�WR�����$�%

$IWHU�FUHDWLQJ�DFWLYLW\�JURXSV�DQG�JHQHUDWLQJ�SURILOHV�LQ�5HOHDVHV����*�����+�����,�����$�RU����%�����[�ZLWKWKH�3*��ZKHQ�\RX�XSJUDGH�WR�5HOHDVH����[�

�� 0DNH�VXUH�WKDW�WKH�LQVWDQFH�SURILOH�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VWLOO�DFWLYH�

7R�GR�VR��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ�&KHFNLQJ�WKH�5HTXLUHG�,QVWDQFH�3URILOH�3DUDPHWHU�,I�WKH�SDUDPHWHU�LV�QRW�DFWLYH��LW�QHHGV�WR�EH�DFWLYDWHG��7KH�3*�LV�VHW�WR�DFWLYH�LQ�5HOHDVH�����

$SSO\�WKH�DSSURSULDWH�DGYDQFH�FRUUHFWLRQV�IRU�5HOHDVH�����RU�DQ\�DYDLODEOH�+RW�3DFNDJH�E\�UHIHUULQJ�WRFKDSWHU����$SSO\LQJ�$GYDQFH�&RUUHFWLRQV�WR�\RXU�5���6\VWHP�

�� ,Q�WKH�&RPPDQG�ILHOG��HQWHU�WUDQVDFWLRQ�SU25�DQG�FKRRVH�(QWHU�

6

7

Page 343: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–15

�� &KRRVH�VWHS��$��3UHSDUDWLRQ�&RPSDUH�ZLWK�6$3�YDOXHV��7KLV�VWHSLV�XVHG�WR�SUHSDUH�IRU�VWHSV��%�DQG�&�

�� &KRRVH .

7KLV�VWHS�PLJKW�WDNH�VHYHUDOPLQXWHV.

3

4

Page 344: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–16

�� &KRRVH��%��&RPSDUH�WUDQVDFWLRQV�

�� &KRRVH� �

7KH�XSJUDGH�UHSRUW�\RX�VWDUWHG�LQVWHS��$��XSGDWHV�FXVWRPHU�WDEOHV862%;B&�DQG�862%7B&��EXW�GRHVQRW�RYHUZULWH�WKH�HQWULHV�\RXFKDQJHG�LQ�UHOHDVHV�EHIRUH����[�

,I�\RX�KDYH�QRW�FKDQJHG�FKHFNLQGLFDWRUV�DQG�ILHOG�YDOXHV�ZLWKWUDQVDFWLRQ�68���LQ�UHOHDVHV�EHIRUH���[��\RX�ZLOO�VHH�WKH�IROORZLQJVWDWXV�PHVVDJH�

<RX�GR�QRW�QHHG�WR�PDLQWDLQ�WKHWUDQVDFWLRQ�

5

6

Page 345: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–17

�� ,I�\RX�PDGH�FKDQJHV��WKHVH�FKDQJHVZLOO�VWLOO�EH�DFWLYH�DIWHU�WKHXSJUDGH��7KH�RXWSXW�ZLOO�EH�D�OLVWRI�DIIHFWHG�WUDQVDFWLRQV��LQ�RXU�FDVHLW�LV�0.����

�� ,Q�WKH�RXWSXW�OLVW�RI�WUDQVDFWLRQV�\RX�FDQ�VHH�WKH�6WDWXV�ZKLFK�VKRZVZKHWKHU�D�WUDQVDFWLRQ�KDV�DOUHDG\EHHQ�FKHFNHG�

�� 6HOHFW�D�WUDQVDFWLRQ�ZKHUH�WKHFXUUHQW�VWDWXV�LV�7R�EH�FKHFNHG�

��� &KRRVH� �6HW�WR�FKHFNHG�WR�VHW�WKHVWDWXV�WR�FKHFNHG�ZLWKRXW�FKDQJLQJDQ\�FKHFN�LQGLFDWRU�VHWWLQJV�IRU�WKLVWUDQVDFWLRQ�

��� &KRRVH�WKH� �7UDQVIHU�UHPDLQLQJ6$3�GHIDXOWV�EXWWRQ�WR�FKDQJH�WKHFXUUHQW�DFWLYH�FKHFN�,'�VHWWLQJ�WRWKH�6$3�GHIDXOW�YDOXH�DQG�WKHVWDWXV�WR�FKHFNHG�

��� &KRRVH� �&KHFN�LQGLFDWRU�

��� &KRRVH� �

,I�\RX�VDYH�ZLWKRXW�PDNLQJ�DQ\FKDQJHV��WKH�VWDWXV�LV�DXWRPDWLFDOO\VHW�WR�FKHFNHG��DQG�WKH�FKDQJHVUHPDLQ�

��� &KRRVH�DQ\�RWKHU�PHQX�RSWLRQ�WRPDNH�DGGLWLRQDO�FKDQJHV�WR�WKLVWUDQVDFWLRQ�DQG�LWV�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�

��� 2QFH�ILQLVKHG��FKRRVH� �

7 8

9

1012 11

13 15

14

Page 346: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–18

��� 7KH�VWDWXV�KDV�FKDQJHG�WR�FKHFNHG�

��� 7R�XVH�WKH�6$3�GHIDXOW�YDOXHV�IRUDOO�WKH�WUDQVDFWLRQV�WKDW�\RX�KDYHQRW�\HW�PDQXDOO\�FKHFNHG��FKRRVHWKH� �7UDQVIHU�UHPDLQLQJ�6$3GHIDXOWV�EXWWRQ�WR�FRS\�DQ\UHPDLQLQJ�6$3�GHIDXOW�YDOXHV��LQRXU�FDVH��ZH�GR�QRW�KDYH�DQ\IXUWKHU�WUDQVDFWLRQV��

��� &KRRVH� �

��� ,I�\RX�KDG�RWKHU�WUDQVDFWLRQV�DOOWKHLU�VWDWXVHV�ZRXOG�KDYH�EHHQ�VHWWR�FKHFNHG�

��� &KRRVH� �

16

17

18

19

20

Page 347: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–19

��� &KRRVH��&��$FWLYLW\�JURXSV�WR�EHFKHFNHG�

��� &KRRVH� �

7KH�RXWSXW�LV�D�OLVW�RI�DFWLYLW\JURXSV�WKDW�DUH�DIIHFWHG�E\�HLWKHUFKDQJHV�\RX�PDGH�RU�E\�FKDQJHVIURP�RXU�LPSURYHG�GHIDXOW�GDWD�

22

21

Page 348: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Authorizations Made Easy14–20

��� )RU�WKH�OLVWHG�DFWLYLW\�JURXSV�FKDQJHV�KDYH�EHHQ�PDGH�WR�FKHFNLQGLFDWRUV�RU�GHIDXOW�WUDQVDFWLRQYDOXHV��7KHUHIRUH��WKHFRUUHVSRQGLQJ�DXWKRUL]DWLRQSURILOHV�QHHG�WR�EH�DGMXVWHG�

0DNH�VXUH�\RX�VHOHFW�HDFK�HQWU\�LQWKLV�OLVW�

��� 'RXEOH�FOLFN�RQ�WKH�DFWLYLW\�JURXS\RX�ZRXOG�OLNH�WR�DGMXVW�

��� 'HSHQGLQJ�RQ�WKH�FKDQJHV��\RX�PLJKW�KDYH�WR�PDLQWDLQ�WKH�FRUUHFW�RUJDQL]DWLRQDO�OHYHO�

��� 3RVWPDLQWDLQ�DQ\�RSHQDXWKRUL]DWLRQ�ILHOGV��LI�UHTXLUHG�\HOORZ�RU�UHG�OLJKWV��

'XH�WR�FKDQJHV�LQ�WKH�6$3�GHIDXOWVIRU�FKHFN�LQGLFDWRUV�DQG�ILHOGYDOXHV��WKH�3*�PD\�FUHDWH�VRPHQHZ�DXWKRUL]DWLRQV�LQ�5HOHDVH����[�<RX�ZLOO�VHH�QHZ�DXWKRUL]DWLRQVFUHDWHG�ZKHUH�\RX�KDYH�DOUHDG\PDLQWDLQHG�DXWKRUL]DWLRQV��WKHVHDUH�LGHQWLILHG�E\�WKH�RQHV�WKDW�VD\1HZ���-XVW�DFWLYDWH��RU�GHOHWH��WKHQHZ�DXWKRUL]DWLRQV��7KH�V\VWHPLQFOXGHV�WKH�QHZ�UHTXLUHGDXWKRUL]DWLRQV�ZLWKRXW�FKHFNLQJIRU�H[LVWLQJ�RQHV�IRU�WKH�VDPHDXWKRUL]DWLRQ�REMHFW��7KLV�IHDWXUHPD\�VRXQG�XQXVXDO��EXW�KDV�PRUHDGYDQWDJHV�WKDQ�GLVDGYDQWDJHV�DQGDOVR�LPSURYHV�3*�SHUIRUPDQFH�

7R�SRVWPDLQWDLQ�DOO�RSHQ�DXWKRUL]DWLRQ�ILHOGV��IROORZ�WKH�LQVWUXFWLRQV�LQ�FKDSWHU����WKH�VHFWLRQ5HJHQHUDWLQJ�WKH�$XWKRUL]DWLRQ�3URILOHV�$IWHU�0DNLQJ�&KDQJHV�

��� $IWHU�UHJHQHUDWLQJ��FKRRVH� �

��� &RQWLQXH�ZLWK�WKH�QH[W�HQWU\�LQ�WKH�OLVW�RI�DFWLYLW\�JURXSV�ZLWK�WKLV�VDPH�SURFHGXUH�XQWLO�\RX�KDYHDGMXVWHG�DOO�DFWLYLW\�JURXSV�

23

26

24

25

Page 349: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 3.1G, 3.1H, 3.1I to 4.6 A/B

Release 4.6 A/B14–21

$IWHU�FRPSOHWLQJ�VWHSV��$���%��DQG��&��\RX�KDYH�SHUIRUPHG�WKH�PRVW�LPSRUWDQW�VWHSV�DIWHU\RXU�5HOHDVH�����$�%�XSJUDGH�

<RX�VWLOO�QHHG�WR�SHUIRUP�VWHS����7UDQVSRUW�WKH�FXVWRPHU�WDEOHV��DQG�WUDQVSRUW�WKH�FKDQJHV�\RXPDGH�LQ�VWHSV���DQG���WR�\RXU�RWKHU�5���V\VWHPV��$OO�V\VWHPV�PXVW�KDYH�WKH�VDPH�VHWWLQJV�IRUFKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV�

��� &KRRVH��'��'LVSOD\�FKDQJHGWUDQVDFWLRQ�FRGHV�

7KLV�UHSRUW�OLVWV�DOO�DFWLYLW\�JURXSVZKHUH�WUDQVDFWLRQV�KDYH�EHHQUHSODFHG�E\�RWKHU�WUDQVDFWLRQV��7KHROG�DQG�QHZ�WUDQVDFWLRQV�DUH�DOVRGLVSOD\HG��<RX�FDQ�FKDQJH�WKHWUDQVDFWLRQ�FRGH�LQ�WKHFRUUHVSRQGLQJ�DFWLYLW\�JURXS�E\GRXEOH�FOLFNLQJ�RQ�WKH�HQWU\�LQ�WKHOLVW�

<RX�KDYH�FRPSOHWHG�WKH�XSJUDGHVWHSV�IRU�DXWKRUL]DWLRQ�SURILOHVFUHDWHG�LQ�UHOHDVHV�SULRU�WR����[�

29

Page 350: Amez 46 all

Chapter 14: Upgrade

Upgrade from Releases 4.0x or 4.5x to 4.6 A/B

Authorizations Made Easy14–22

8SJUDGH�IURP�5HOHDVHV����[�RU����[�WR�����$�%

,I�\RX�DUH�XSJUDGLQJ�IURP����[�RU����[�WR�����$�%��\RX�VKRXOG�SURFHHG�IURP�VWHSV��$�WR��'LQ�WKH�VDPH�ZD\�DV�LQ�WKH�VHFWLRQ�EHIRUH�

,Q������UHVSRQVLELOLWLHV�QR�ORQJHU�H[LVW

,I�\RX�ZRUNHG�ZLWK�WKH�5���6\VWHP�LQ�5HOHDVH����[�RU�UHDG�WKH����%�$XWKRUL]DWLRQV�0DGH�(DV\JXLGHERRN��WKHQ�\RX�PD\�KDYH�ZRQGHUHG�ZKDW�KDSSHQHG�WR�WKH�IXQFWLRQDOLW\�FDOOHG´UHVSRQVLELOLWLHV�µ�,Q�5HOHDVH�����DQG������UHVSRQVLELOLWLHV�ZHUH�UHSODFHG�E\�D�FRQFHSW�FDOOHG´GHULYHG�DFWLYLW\�JURXSVµ�DQG�WKHVH�GHULYHG�DFWLYLW\�JURXSV�IXQFWLRQ�VOLJKWO\�GLIIHUHQW�IURPWKH�����UHVSRQVLELOLWLHV��,I�\RX�XVHG�UHVSRQVLELOLWLHV�LQ�����DQG�XSJUDGH�WR������\RXUUHVSRQVLELOLWLHV�DUH�FRQYHUWHG�DXWRPDWLFDOO\�LQWR�GHULYHG�DFWLYLW\�JURXSV�

)RU�GHWDLOHG�LQIRUPDWLRQ�RQ�GHULYHG�DFWLYLW\�JURXSV��VHH�WKH�FRUUHVSRQGLQJ�VHFWLRQ�LQFKDSWHU����&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�

Page 351: Amez 46 all

A–1

$SSHQGL[�$� 6$31HW�²�5���)URQWHQG�1RWHV

&RQWHQWV

Overview ................................................................................................................. A–2

SAPNet – R/3 Frontend Notes............................................................................... A–3

$$

Page 352: Amez 46 all

Appendix A: SAPNet – R/3 Frontend Notes

Overview

Authorizations Made EasyA–2

2YHUYLHZ

6$31HW�²�5���)URQWHQG�QRWHV��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6XSSRUW��266���FRQWDLQVLQIRUPDWLRQ�UHJDUGLQJ�NQRZQ�HUURUV��DQG�VXEVHTXHQW�PHDQV�RI�DGGUHVVLQJ�VXFK�HUURUV��VRPH�DGYLFH��DQG�JHQHUDO�LQIRUPDWLRQ�UHODWHG�WR�WKH�5���6\VWHP��,W�DOVR�VHUYHV�DV�RQH�RI�WKHFRUH�PHDQV�RI�FRPPXQLFDWLQJ�SUREOHPV�ZLWK�\RXU�5���6\VWHP�WR�WKH�6$3�5���VXSSRUWVHUYLFHV�SRUWLRQ�RI�WKH�6$3�ZRUOGZLGH�RUJDQL]DWLRQ��7KH�VXSSRUW�V\VWHP��PDLQWDLQHGHQWLUHO\�E\�6$3��FRQWDLQV�KXQGUHGV�RI�WKRXVDQGV�RI�´QRWHVµ�WKDW�DGGUHVV�WRSLFV�UDQJLQJIURP�5���V\VWHPV��5���V\VWHPV���DQG�PDQ\�RI�WKH�DGG�RQ�FRPSRQHQWV�WR�WKHVH�V\VWHPV��)RUPRUH�LQIRUPDWLRQ�DERXW�ZKDW�WKH�6$31HW�²�5���)URQWHQG�V\VWHP�LV��SOHDVH�UHIHU�WRZZZ�VDS�FRP�DQG�JR�WR�WKH�6$31HW�VHFWLRQ�

7KH�QRWH�QXPEHUV�SURYLGHG�LQ�WKLV�DSSHQGL[�UHSUHVHQW�RQO\�D�IUDFWLRQ�RI�DOO�WKH�QRWHV�UHODWHGWR�DXWKRUL]DWLRQV��$V�KXQGUHGV�RI�QRWHV�IRU�WKH�YDULRXV�6$3�SURGXFWV�DUH�FUHDWHG�HYHU\�GD\�WKLV�OLVWLQJ�RI�QRWHV�UHSUHVHQWV�´D�VQDSVKRW�LQ�WLPHµ�RI�WKRVH�WKDW�H[LVWHG�DW�WKH�WLPH�WKLVZULWLQJ�DQG�ZHUH�VHOHFWLYHO\�LQFOXGHG�KHUH��,W�LV�E\�QR�PHDQV�D�FRPSUHKHQVLYH�OLVW�

1RWHV�LQ�6$31HW�²�5���)URQWHQG�DUH�VHSDUDWHG�LQ�PDQ\�ZD\V��2QH�RI�WKH�PRVW�FRPPRQZD\V�LV�E\�WKH�´&RPSRQHQWµ�RU�´$SSOLFDWLRQ�$UHDµ�LQ�WKH�V\VWHP�WKDW�ZDV�DIIHFWHG��7KHIROORZLQJ�WDEOH�GHVFULEHV�VRPH�RI�WKH�PRVW�FRPPRQ�DSSOLFDWLRQ�DUHDV�ZKHUH�QRWHV�PD\�EHIRXQG��7KHVH�DUHDV�FDQ�EH�XVHG�WR�VHDUFK�WKH�6$31HW�²�5���)URQWHQG�QRWHV�GDWDEDVH�IRUDGGLWLRQDO�VHFXULW\�DGPLQLVWUDWRU�LQIRUPDWLRQ

$SSOLFDWLRQ�$UHD 'HVFULSWLRQ

%&�&&0 &RPSXWLQJ�&HQWHU�0DQDJHPHQW�6\VWHP

%&�&&0�865 8VHUV�DQG�$XWKRUL]DWLRQV

%&�&&0�865�$'0 8VHUV�DQG�$XWKRUL]DWLRQV�0DLQWHQDQFH

%&�&&0�865�.51 8VHUV�DQG�$XWKRUL]DWLRQV�.HUQHO�)XQFWLRQV

%&�&&0�865�3)& 3URILOH�*HQHUDWRU

%&�&76�25* :RUNEHQFK�&XVWRPL]HU�2UJDQL]HU

%&�)(6�6(0 6HVVLRQ�0DQDJHU

%&�659�5(3 5HSRUWLQJ

%&�%07�20 2UJDQL]DWLRQDO�0DQDJHPHQW

%&�%07�20�20 2UJDQL]DWLRQDO�3ODQ

),�$3�$3�% 3D\PHQW�3URJUDP�3D\PHQW�7UDQVIHU

00�,0�*)�5(3 ,0�5HSRUWLQJ��QR�/,6�

3$�3$�;; $OO�&RXQWULHV��3HUVRQQHO�$GPLQLVWUDWLRQ�

Page 353: Amez 46 all

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Release 4.6A/BA–3

(DFK�DSSOLFDWLRQ�DUHD�FDQ�DOVR�EH�VHDUFKHG�XVLQJ�D�NH\ZRUG�VXFK�DV�SURILOH�JHQHUDWRU��3)&*��DFWLYLW\�JURXS�SUHGHILQHG�DFWLYLW\�JURXSV��DXWKRUL]DWLRQ��SURILOH��XVHU��68����VHFXULW\�DQG�VR�RQ�

6$31HW�²�5���)URQWHQG�1RWHV

�$V�RI�'HFHPEHU������

/HJHQG�< 5,� �5HOHDVH�LQGHSHQGHQW< � ����$������%< 25� �ROGHU�UHOHDVH��EXW�VWLOO�YDOXDEOH�LQIRUPDWLRQ

6XEMHFW 5HOHDVH 1RWH 7LWOH

$XWKRUL]DWLRQ�&KHFN 5, ����� :KLFK�DXWKRUL]DWLRQ�REMHFWV�DUH�FKHFNHG

$XWKRUL]DWLRQ 5, ����� 1DPLQJ�FRQYHQWLRQV�IRU�DXWKRUL]DWLRQV

$XWKRUL]DWLRQ�&KHFN 5, ����� $XWKRUL]DWLRQ�FKHFN���D�VKRUW�LQWURGXFWLRQ

$XWKRUL]DWLRQ�&RQFHSW 5, ����� 4XHVWLRQV�UHJDUGLQJ�WKH�DXWKRUL]DWLRQ�FRQFHSW

$XWKRUL]DWLRQV�5HSRUWLQJ�7UHH

5, ���� $XWKRUL]DWLRQ�SURWHFWLRQ�RI�$%$3���SURJUDPV

$XWKRUL]DWLRQV��7UDFH 5, ����� 7UDFH�IXQFWLRQ��PXOWLSOH�XVHUV

'RFXPHQWDWLRQ��%DVLV.QRZOHGJHZDUH3URGXFWV

25 ����� ,QIR�IRU�FXVWRPHU���%DVLV�.QRZOHGJH�3URGXFWV

+RW�3DFNDJHV 25 ����� ,PSRUWDQW�,QIRUPDWLRQ�DERXW�+RW�3DFNDJHV

+RW�3DFNDJHV ����� &RQIOLFWV�EHWZHHQ�6XSSRUW�3DFNDJHV�/&3V��$GG�RQV

+RW�3DFNDJHV ����� 1HZ�+RW�3DFNDJHV�IRU�3URILOH�*HQHUDWRU

.QRZOHGJHZDUH3URGXFWV

25 ����� 4XHVWLRQV�DQG�DQVZHUV�RQ�WKH�5���%DVLV�.QRZOHGJH3URGXFW�&'V

1DPLQJ�&RQYHQWLRQV ����� &XVWRPHU�QDPH�UDQJH�IRU�6$3�REMHFWV

2UJDQL]DWLRQDO0DQDJHPHQW

����� 3'�DQG�:RUNIORZ�DSSOLFDWLRQ�GR�QRW�UXQ�FRUUHFWO\

266 5, ����� 266�5HJLVWUDWLRQ�)RUP��IRU�1RUWK�$PHULFD�

266 5, ����� 'RFXPHQWDWLRQ�RQ�WUDLQLQJ�LQIR�LQ�WKH�266

266 5, ����� 6HDUFK�SURFHGXUH�IRU�QRWHV�DQG�PHVVDJHV�LQ�266

266 5, ����� 6$3�$PHULFD·V�3URGXFWLRQ�5HJLVWUDWLRQ�)RUP

Page 354: Amez 46 all

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Authorizations Made EasyA–4

6XEMHFW 5HOHDVH 1RWH 7LWOH

266 5, ����� 6$3/2*21�IRU�266

266 25 ����� 6HUYLFH�FRQQHFWLRQV��&RPSRVLWH�QRWH��RYHUYLHZ�

266 5, ����� 6WUXFWXUH�RI�DSSOLFDWLRQ�DUHDV�LQ�266

266 5, ����� 8VHU�PDLQWHQDQFH�DQG�FUHDWLRQ�LQ�266�IRU�FXVWRPHU

266 25 ����� )/&6�)HHGEDFN�IRU�WKH�1RWHV�ZLWKLQ�WKH�266�6\VWHP

266 5, ����� 266�FRUSRUDWH�JURXS�IXQFWLRQDOLW\��&ROOHFWLYH�QRWH

266 5, ����� &RQILUPDWLRQ�RI�266�5HJLVWUDWLRQ

266�DQG�266� 5, ����� /RJ�RQ�WR�266��7UDQVDFWLRQ�266��

266�DQG�266� 5, ����� 266���:KDW�WR�GR�LI�5���ZLOO�QRW�UXQ

266�DQG�266� 5, ����� *XLGHOLQHV�IRU�266���9HUVLRQ�IRU�6$36(59��

266�DQG�266� 5, ����� (DV\�WR�XVH�JXLGH�IRU�7UDQVDFWLRQ�266�

266�DQG�3ULQWLQJ 5, ����� 3ULQW���'RZQORDG�LQ�266

266�DQG�3ULQWLQJ 5, ����� 'RZQORDGLQJ�²�3ULQWLQJ�QRWHV�LQ�266

3DVVZRUGV�LQ�5�� 5, ���� $QVZHUV�RQ�´6HFXULW\µ

3DWFK�GRZQORDG�IURP6$36(59[

5, ����� $GYDQFH�WUDQVSRUWV�WR�FXVWRPHUV

3URILOH�*HQHUDWRU ����� 3UREOHPV�ZLWK�WDEOH�60(1B'$7(6

3URILOH�*HQHUDWRU ����� 0LVVLQJ�DXWKRUL]DWLRQ�ZKHQ�XVLQJ�WKH�3URILOH�*HQHUDWRU

3URILOH�*HQHUDWRU ����� ��SUREOHP�IRU�WKH�3*

3URILOH�*HQHUDWRU 5, ������ 5HJHQHUDWLRQ�RI�DFWLYLW\�JURXSV�DXWKRUL]DWLRQ�ORVV

3URILOH�*HQHUDWRU 5, ������ 0HUJ��3URFHVV�ZLWK�DXWKRUL]DWLRQ�GDWD��([SODQDWLRQ

3URILOH�*HQHUDWRU�7UDQVSRUW�3'�REMHFWV�DFWLYLW\�JURXSV�

25 ����� 7UDQVSRUWLQJ�3'�REMHFWV�E\�FOLHQW�FRS\

5HSRUW�5+$8783� 25 ����� $FWLYLW\�JURXS�PDLQW���XVHU�PDVWHU�GDWD�FRPSDULVRQ

6$3�6RIWZDUH�&KDQJH5HJLVWUDWLRQ

25 ����� 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5�

6$3B1(: 5, ����� :KDW�GRHV�WKH�SURILOH�6$3B1(:�GR"

6$31HW 5, ����� $FFHVV�WR�WKH�6$31HW�VHUYHU�ZLWK�266�8VHU�,'

6$36(59[ 25 ����� 7UDQVIHUULQJ�FXVWRPHU�ILOHV�WR�VDSVHUY��ZLWK�IWS

6HFXULW\�LQ�5�� 5, ����� &RQVHTXHQFHV�LQ�WUDQVSRUW�GXULQJ�SDVVZRUG�FKDQJH

Page 355: Amez 46 all

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Release 4.6A/BA–5

6XEMHFW 5HOHDVH 1RWH 7LWOH

6HFXULW\�LQ�5�� 5, ����� 'DWD�SURWHFWLRQ�DQG�VHFXULW\�LQ�5��

6HFXULW\�LQ�5�� 5, ����� 6HFUHF\�DQG�'DWD�6HFXULW\�2EOLJDWLRQV

6HFXULW\�LQ�5����$%$3 5, ����� 6HFXULW\�DVSHFWV�LQ�$%$3���SURJUDPPLQJ

6HFXULW\�LQ�5����&3,�& 5, ����� 6$3&3,&��:KHUH�DUH�SDVVZRUGV�YLVLEOH"

6HFXULW\�LQ�5���

&XVWRPHU�([LW

����� &XVWRPHU�H[LWV�LQ�6$3�ORJ�RQ

6HVVLRQ�0DQDJHU 25 ����� *HQHUDWLRQ�RI�6HVVLRQ�0DQDJHU�PHQXV�WDNHV�WRR�ORQJ

68�� 5, ����� <RX�DUH�QRW�DXWKRUL]HG�WR�����!�$QDO\VLV

68�� 25 ����� 68����$XWKRUL]DWLRQ�YDOXH�FRQWDLQV�VSHFLDO�FKDUV

68�� 25 ����� 68����2EMHFW�QDPH�RYHUZULWHV�REMHFW�WH[W

6\VWHP�3URILOH3DUDPHWHUV

5, ����� 6\VWHP�SDUDPHWHUV��'HILQHG�ZKHUH"�'LVSOD\HG�KRZ"

7UDQVSRUWLQJ 5, ����� 7UDQVSRUWLQJ�SURILOHV�DQG�DXWKRUL]DWLRQV

7UDQVSRUW 25 ����� 7UDQVSRUW�SURILOHV��DXWKRU���LQ�ORJRQ�ODQJXDJH

7UDQVSRUW��8VHU�%XIIHU 5, ����� $XWKRUL]DWLRQV�QRW�FXUUHQW�DIWHU�SURILOH�WUDQVSRUW

7UDQVSRUWLQJ��$6���� ����� $6������,PSRUWLQJ�WUDQVSRUWV

8VHU�DGPLQLVWUDWLRQ 5, ����� 8VHUV�ZLWK�ODUJH�PDVWHU�UHF��PLVVLQJ�DXWKRUL]DWLRQV

8VHU�DGPLQLVWUDWLRQ ������ &HQWUDO�XVHU�GLVWULEXWLRQ��WRR�PDQ\�$/(�SURFHVVHV

8VHU�DGPLQLVWUDWLRQ ������ &HQ��8VHU�DGP���68���/DVW�FKDQJH�QRW�DOZD\V�GVSOHG�

8VHU�DGPLQLVWUDWLRQ ������ 8VH�RI�ZLOGFDUG�¶ ·�LQ�DXWKRUL]DWLRQV

8VHU�,QIRUPDWLRQ�6\VWHP�68,0�

25 ����� 1HZ�UHSRUWV�IRU�WKH�XVHU�LQIRUPDWLRQ�V\VWHP

8VHU�,QIRUPDWLRQ�6\VWHP�68,0�

25 ����� :KHUH�XVHG�OLVW��6XUQDPHV�PLVVLQJ�LQ�XVHU�OLVW

8VHU�6$3 5, ���� +RZ�WR�DVVLJQ�DQ�LGHQWLILHU�WR�6$3

8VHU�6$3 5, ���� +RZ�GR�,�GHOHWH�WKH�XVHU�6$3 "

8VHUV�DQG$XWKRUL]DWLRQV�.HUQHO)XQFWLRQV

������ $XWKRUL]DWLRQ�%XIIHU�LV�ILOOHG�GXULQJ�HDFK�ORJRQ

:RUNEHQFK�&XVWRPL]HU2UJDQL]HU

������ 'HYHORSPHQW�&ODVV�&KDQJH�RQO\�ZLWK�DGPLQ�$XWKRUL]DWLRQ

Page 356: Amez 46 all

Appendix A: SAPNet – R/3 Frontend Notes

SAPNet – R/3 Frontend Notes

Authorizations Made EasyA–6

6XEMHFW 5HOHDVH 1RWH 7LWOH

3D\PHQW3URJUDP�3D\PHQW7UDQVIHU

������ ,QFRUUHFW�DXWKRUL]DWLRQ�FKHFN�IRU�FKHFN�PDQDJHPHQW

,0�5HSRUWLQJ��QR�/,6� ������ 0%����0%���0%�6��32�VFKHG��$JUHHPHQW�GLVSOD\V

$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�

������ $XWK��&KHFN�RI�QRW�LQWHJUDWHG�SHUVRQQHO�QXPEHUV

$OO�&RXQWULHV��3HUVRQQHO$GPLQLVWUDWLRQ�

������ $XWKRUL]DWLRQ�OHYHO�0�LV�KDQGOHG�LQFRUUHFWO\

Page 357: Amez 46 all

B–1

$SSHQGL[�%� )UHTXHQWO\�$VNHG�4XHVWLRQV

&RQWHQWV

Overview ................................................................................................................. B–2

R/3 Initial Screen (SAP Easy Access Menu) and Favorites ............................... B–2

Profile Generator Setup......................................................................................... B–3

Working with the PG and Profiles ........................................................................ B–3

Authorization Checks (SU24)................................................................................ B–5

Upgrade Procedure (SU25) ................................................................................... B–7

Including Transactions or Reports ...................................................................... B–7

Missing Authorizations ......................................................................................... B–7

User Administration............................................................................................... B–8

Transporting ........................................................................................................... B–8

Tables...................................................................................................................... B–8

%%

Page 358: Amez 46 all

Appendix B: Frequently Asked Questions

Overview

Authorizations Made EasyB–2

2YHUYLHZ

7KLV�DSSHQGL[�FRQWDLQV�VRPH�RI�WKH�PRVW�IUHTXHQWO\�DVNHG�TXHVWLRQV�DERXW�5���DQG�WKH3URILOH�*HQHUDWRU��3*���:H�KRSH�WKH�DQVZHUV�< +HOS�\RX�WR�EHWWHU�XQGHUVWDQG�WKH�V\VWHP< )DFLOLWDWH�\RXU�LPSOHPHQWDWLRQ< 5HVROYH�EDVLF�V\VWHP�LVVXHV

5���,QLWLDO�6FUHHQ��6$3�(DV\�$FFHVV�0HQX��DQG�)DYRULWHV

,I�D�XVHU�KDV�VHYHUDO�DFWLYLW\�JURXSV�DVVLJQHG�WR�WKHP�ZLWK�WKH�VDPH�WUDQVDFWLRQ

FRGH��ZLOO�WKH�WUDQVDFWLRQ�FRGH�DSSHDU�PXOWLSOH�WLPHV�RQ�WKH�6$3�(DV\�$FFHVV

0HQX"�,V�WKHUH�D�ZD\�WR�´PHUJHµ�WKH�UHSHDWHG�WUDQVDFWLRQ�FRGHV"

7KH�WUDQVDFWLRQ�FRGH�ZLOO�LQGHHG�DSSHDU�PXOWLSOH�WLPHV��$W�SUHVHQW��WKHUH�DUH�QR�PHUJHFDSDELOLWLHV�WR�HOLPLQDWH�UHSHDWHG�WUDQVDFWLRQ�FRGHV�

,I�D�XVHU�KDV�PDQ\�DFWLYLW\�JURXSV�RU�PDQ\�WUDQVDFWLRQ�FRGHV��LV�WKHUH�DQ�HIIHFW

RQ�SHUIRUPDQFH��IRU�H[DPSOH��WKH�WLPH�IRU�WKH�ILUVW�VFUHHQ�WR�EH�SURFHVVHG�"

(DFK�´EUDQFKµ�RU�´QRGHµ�RQ�WKH�6$3�(DV\�$FFHVV�PHQX�UHSUHVHQWV�LWHPV�WKDW�D�XVHU�KDVDFFHVV�WR��3HUIRUPDQFH�GRHV�JR�GRZQ�ZLWK�D�ODUJH�QXPEHU�RI�QRGHV��EXW�IURP�SUHOLPLQDU\WHVWLQJ�E\�6$3�GHYHORSPHQW�JURXSV��WKH�V\VWHP�FDQ�KDQGOH�DQ�H[WHQVLYH�QXPEHU�ZLWK�DUHDVRQDEOH�UHVSRQVH�WLPHV��PRUH�WKDQ�D�XVHU�FDQ�KDQGOH�LQ�D�UHDVRQDEOH�OLIHWLPH���7KH�WHVWLQJRI�D�PHQX�EUDQFK�QRGH�VWUXFWXUH�RI��������QRGHV�KDV�EHHQ�VKRZQ�WR�SURYLGH�JRRGUHVSRQVH�WLPHV�

:KDW�KDSSHQHG�WR�WKH�5HSRUW�7UHHV�LQ�����DQG�DUH�WKH\�LQ�WKH�6$3�(DV\�$FFHVV

VFUHHQ"

5HSRUW�7UHHV�LQ�����DUH�QRZ�FOLHQW�LQGHSHQGHQW��7KH\�H[LVW�LQ�WKH�6$3�(DV\�$FFHVV�PHQX�5HSRUWLQJ�WUHHV�DQG�DUHD�PHQXV�KDYH�EHHQ�PHUJHG�LQ�IXQFWLRQDOLW\�DQG�LQ�RQH�WRRO��3OHDVHVHH�WKH�UHOHDVH�QRWHV�UHODWHG�WR�WKLV�WRSLF�

:LOO�RQH�XVHU��IRU�H[DPSOH��WKH�$XWKRUL]DWLRQV�$GPLQLVWUDWRU��EH�DEOH�WR�YLHZ�WKH

)DYRULWHV�RI�DQRWKHU�XVHU"�:LOO�D�XVHU�EH�DEOH�WR�DGG�DQ\�WUDQVDFWLRQ�FRGH�WR�WKHLU

IDYRULWHV"

$W�SUHVHQW��RQH�XVHU�FDQQRW�YLHZ�WKH�IDYRULWHV�RI�DQRWKHU�XVHU��$�XVHU�FDQ�DGG�DQ\WUDQVDFWLRQ�FRGH�WR�WKHLU�IDYRULWHV��+RZHYHU��D�XVHU�FDQQRW�H[HFXWH�WKH�WUDQVDFWLRQ�FRGHXQOHVV�WKH\�KDYH�DSSURSULDWH�DXWKRUL]DWLRQV��6B7&2'(��WR�GR�VR��)DYRULWHV��DW�SUHVHQW��DUHQRW�YLHZHG�E\�6$3�GHYHORSPHQW��DV�´VHFXULW\�UHOHYDQW�µ

,I�D�XVHU�FRSLHV�VRPH�WUDQVDFWLRQV�IURP�WKHLU�PHQX�WR�WKHLU�IDYRULWHV�DQG�ODWHU�RQ�WKHVHWUDQVDFWLRQV�DUH�WDNHQ�RXW�RI�WKHLU�DFWLYLW\�JURXS��WKH�WUDQVDFWLRQV�VWLOO�UHPDLQ�LQ�WKH�XVHU·V

Page 359: Amez 46 all

Appendix B: Frequently Asked Questions

Profile Generator Setup

Release 4.6A/BB–3

IDYRULWHV��7KH�XVHU�ZLOO�QRW�KDYH�DXWKRUL]DWLRQV�IRU�WKHVH�WUDQVDFWLRQV�DQ\PRUH��0DQXDOPDLQWHQDQFH�RI�WKH�IDYRULWHV�LV�QHHGHG�

3URILOH�*HQHUDWRU�6HWXS

+RZ�GRHV�WKH�$87+25,7<�&+(&.�ZRUN�ZLWK�WKH�3URILOH�*HQHUDWRU"

:KHQ�$87+25,7<�&+(&.�LV�FDOOHG��WKH�V\VWHP�FKHFNV�ZKHWKHU�WKH�V\VWHP�SDUDPHWHU�DXWK�QRBFKHFNBLQBVRPHBFDVHV�LV�VHW�WR�<��,I�WKH�SDUDPHWHU�LV�QRW�VHW�WR�<��WKH�QRUPDO$87+25,7<�&+(&.�LV�FRQGXFWHG��,I�WKH�SDUDPHWHU�LV�VHW�WR�<��LW�VHDUFKHV�IRU�DQ�HQWU\�LQWDEOH�862%;B&��UHIHU�WR�VWUXFWXUH�862%;B&��ZLWK�WKH�FXUUHQW�WUDQVDFWLRQ�FRGH�DQGDXWKRUL]DWLRQ�REMHFW��,I�QRWKLQJ�LV�IRXQG��WKH�QRUPDO�$87+25,7<�&+(&.�LV�FRQGXFWHG��,IDQ�HQWU\�LV�IRXQG��DQG�862%;B&�2.)/$*�LV�VHW�WR�1���QR�FKHFN�LV�SHUIRUPHG��UHJDUGOHVV�RIWKH�DFWXDO�XVHU�SURILOH��,Q�DOO�RWKHU�FDVHV��WKH�UHJXODU�DXWKRUL]DWLRQ�FKHFN�LV�FRQGXFWHG�DQGVXFFHHGV�ZKHQ�WKH�XVHU�SURILOH�FRQWDLQV�DQ�DXWKRUL]DWLRQ�ZLWK�WKH�FRUUHVSRQGLQJH[SUHVVLRQV�IRU�WKH�FXUUHQW�REMHFW�

,Q�D�QHZ�LQVWDOODWLRQ�WKH�SDUDPHWHU�LV�VHW�WR�<��VLQFH�WKH�3*�LV�DOUHDG\�DFWLYDWHG��)RU�PRUHLQIRUPDWLRQ��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�

'R�,�QHHG�WR�VKXW�GRZQ�DQG�UHVWDUW�WKH�LQVWDQFH�DIWHU�,�FKDQJHG�WKH�V\VWHP

SURILOH�SDUDPHWHU"

<HV��\RX�PXVW�UHVWDUW�WKH�LQVWDQFH�DIWHU�DGGLQJ�WKH�LQVWDQFH�SURILOH�SDUDPHWHU��)RU�IXUWKHULQIRUPDWLRQ�RQ�KRZ�WKH�3*�LV�VHW�XS�DQG�ZKDW�VHWWLQJV�QHHG�WR�EH�SHUIRUPHG��VHH�FKDSWHU���6HWWLQJ�XS�WKH�3URILOH�*HQHUDWRU�

:RUNLQJ�ZLWK�WKH�3*�DQG�3URILOHV

&DQ�,�LQFOXGH�DQ�H[LVWLQJ�SURILOH�LQ�DQ�DFWLYLW\�JURXS"

<HV��\RX�FDQ�LQFOXGH�DQ�H[LVWLQJ�SURILOHV��VLQJOH�DQG�FRPSRVLWH��LQWR�DQ�DFWLYLW\�JURXS�3OHDVH�UHIHU�WR�FKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�

:K\�LV�RQO\�RQH�SURILOH�VRPHWLPHV�JHQHUDWHG"

7HFKQLFDOO\��RQO\�����DXWKRUL]DWLRQV�FDQ�ILW�LQWR�RQH�SURILOH��VR�VHYHUDO�SURILOHV�DUH�FUHDWHGIRU�ODUJH�DFWLYLW\�JURXSV��6LQFH�WKH�ODVW�WZR�GLJLWV�DUH�UHTXLUHG�IRU�WKH�LQWHUQDO�QXPHUDWRU�RQO\����GLJLWV�DUH�DYDLODEOH�IRU�WKH�SURILOH�QDPH�

Page 360: Amez 46 all

Appendix B: Frequently Asked Questions

Working with the PG and Profiles

Authorizations Made EasyB–4

&DQ�,�PDQXDOO\�FKDQJH�JHQHUDWHG�SURILOHV�IURP�3)&*�LQ�68��"

<RX�FDQ�RQO\�FKDQJH�JHQHUDWHG�SURILOHV�ZLWK�WUDQVDFWLRQ�3)&*��ZKHUH�\RX�KDYH�DOO�WKH�VDPHRSWLRQV�DV�LQ�WUDQVDFWLRQ�68����7R�EORFN�JHQHUDWHG�SURILOHV�IRU�PDLQWHQDQFH��XVH�68����,QRWKHU�ZRUGV��LI�WKH�SURILOH�ZDV�FUHDWHG�DV�D�UHVXOW�RI�3)&*��\RX�FDQQRW�FKDQJH�LW�ZLWK�68���

&DQ�,�LQFOXGH�PDQXDO�SURILOHV�LQ�WKH�3URILOH�*HQHUDWRU"

,Q�WKH�3*��FKRRVLQJ�(GLW�→�,QVHUW�DXWK��→�IURP�SURILOH�LQFOXGHV�DOO�DXWKRUL]DWLRQV�IURP�DPDQXDOO\�FUHDWHG�SURILOH�LQ�D�JHQHUDWHG�SURILOH��7KHVH�DXWKRUL]DWLRQV�UHPDLQ�LQ�PDQXDOVWDWXV�DQG��LI�WKH�DFWLYLW\�JURXS�FKDQJHV��WKH�DXWKRUL]DWLRQV�UHPDLQ�XQFKDQJHG�ZKHQ�\RXFRPSDUH�WKH�SURILOH��+RZHYHU��\RX�FDQ�RQO\�LQVHUW�DXWKRUL]DWLRQV�IURP�D�VLQJOH�SURILOH�

&DQ�,�PDQXDOO\�HQWHU�JHQHUDWHG�SURILOHV�LQ�WKH�XVHU�PDVWHU�UHFRUG"

<HV��EXW�ZH�GR�QRW�UHFRPPHQG�LW�IRU�WKH�IROORZLQJ�UHDVRQV�< ,I�WKH�DFWLYLW\�JURXS�LV�H[WUHPHO\�ODUJH��RU�LV�LQFUHDVHG�E\�D�ODWHU�FKDQJH���WKH�3*

JHQHUDWHV�PRUH�WKDQ�RQH�DXWKRUL]DWLRQ�SURILOH�DQG�DXWRPDWLFDOO\�XSGDWHV�WKH�DIIHFWHGXVHU�PDVWHUV��ZKLFK�KDYH�WR�EH�PDQXDOO\�LQVHUWHG�

< :KHQ�DVVLJQLQJ�ZLWK�WKH�3*��\RX�FDQ�LQFOXGH�WLPH�GHSHQGHQFLHV�DQG�DVVLJQ�WKH�SURILOHIRU�D�OLPLWHG�WLPH�SHULRG�

,V�LW�SRVVLEOH�WR�FKDQJH�WKH�SURILOH�QDPH�ODWHU"

<HV��RQO\�WKH�ORQJ�WH[W��GHVFULSWLYH�WH[W��WR�D�SURILOH�FDQ�EH�FKDQJHG�ZLWK�WKH�3*��ZKLFK�GRHVQRW�DIIHFW�WKH�DXWKRUL]DWLRQV�XVHG�LQ�WKLV�SURILOH��,W�LV�QRW�SRVVLEOH�WR�PDQXDOO\�FKDQJH�WKHWHFKQLFDO�SURILOH�QDPH�RI�D�JHQHUDWHG�SURILOH�ZLWK�WKH�3*�

&DQ�,�FRS\�DQ�DFWLYLW\�JURXS��DQG�ZLOO�WKLV�SURFHGXUH�DOVR�FRS\�WKH�SURILOH"

<HV��\RX�FDQ�FRS\�DFWLYLW\�JURXSV��EXW�ZKLOH�FRS\LQJ��FKRRVH�D�GLIIHUHQW�QDPH�IRU�WKH�QHZDFWLYLW\�JURXS��7KH�DFWLYLW\�JURXS��WKH�DFWLYLWLHV��DQG�WKH�SURILOH�GDWD�DUH�WKHQ�FRSLHG��6HHFKDSWHU����WKH�VHFWLRQ�&RS\LQJ�DQG�'HULYLQJ�$FWLYLW\�*URXSV�IRU�GHWDLOHG�LQIRUPDWLRQ�

,I�,�JHQHUDWH�D�SURILOH�WKDW�PD\�XVH�D�SUHYLRXVO\�EXLOW�DXWKRUL]DWLRQ��ZLOO�WKH

V\VWHP�FUHDWH�D�QHZ�RQH�RU�XVH�WKH�H[LVWLQJ�RQH"

(YHU\�WLPH�\RX�JHQHUDWH�D�QHZ�SURILOH�IRU�DQ�DFWLYLW\�JURXS��QHZ�DXWKRUL]DWLRQV�DUH�FUHDWHG�,W�WDNHV�ORQJHU�WR�VHDUFK�IRU�H[LVWLQJ�DXWKRUL]DWLRQV�ZLWK�WKH�VDPH�YDOXHV�WKDQ�WR�FUHDWH�QHZRQHV��(DFK�DXWKRUL]DWLRQ�FDQ�RQO\�EH�XVHG�LQ�RQH�DFWLYLW\�JURXS�

+RZ�GR�,�UHVWULFW�DFWLYLWLHV�E\�VSHFLILF�WLPH�SHULRGV"

(YHQ�LI�\RX�GR�QRW�XVH�%&�2UJ��\RX�FDQ�VWLOO�FKRRVH�WR�DVVLJQ�DFWLYLW\�JURXSV�WR�XVHUV�IRU�DOLPLWHG�WLPH��7KLV�DFWLRQ�PDNHV�VHQVH��IRU�H[DPSOH��ZKHQ�\RXU�FRPSDQ\�HQWHUV�D�QHZ�ILVFDO\HDU��3K\VLFDO�LQYHQWRU\�DFWLYLWLHV�VKRXOG�RQO\�EH�DOORZHG�IRU�D�OLPLWHG�SHULRG�RI�WLPH��)RUIXUWKHU�LQIRUPDWLRQ�RQ�VHWWLQJ�WLPH�OLPLWV��UHIHU�WR�FKDSWHU����$VVLJQLQJ�DFWLYLW\�JURXSV�

Page 361: Amez 46 all

Appendix B: Frequently Asked Questions

Authorization Checks (SU24)

Release 4.6A/BB–5

:KLFK�WUDQVDFWLRQV�DUH�XVHG�E\�WKH�3*�WR�PDLQWDLQ�D�VSHFLILF�DXWKRUL]DWLRQ"

2Q�WKH�&KDQJH�$FWLYLW\�*URXS��$XWKRUL]DWLRQV�VFUHHQ��FKRRVH�8WLOLWLHV�→�6HWWLQJV�→�)RU2YHUYLHZ�RI�$XWKRUL]DWLRQ�2EMHFW�8VH��WR�LPSRUW�DQ�LFRQ�LQWR�\RXU�SURILOH�WUHH��7KLV�LFRQ�ZKLFK�ORRNV�OLNH�D�PRXQWDLQ��GLVSOD\V�WKH�WUDQVDFWLRQV�IRU�ZKLFK�WKH�&KHFN�PDLQWDLQ�IODJ�LVVHW�IRU�WKH�REMHFW�

$XWKRUL]DWLRQ�&KHFNV��68���

:KDW�GR�WKH�GLIIHUHQW�FKHFN�IODJV�VWDQG�IRU"

&0��&KHFN�0DLQWDLQ�

< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�FUHDWHV�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW�DQG�ILHOG�YDOXHV�DUH�GLVSOD\HG�IRU

FKDQJLQJ�< 'HIDXOW�YDOXHV�IRU�WKLV�DXWKRUL]DWLRQ�FDQ�EH�PDLQWDLQHG�

&��&KHFN�

< $Q�DXWKRULW\�FKHFN�LV�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

1��1R�FKHFN�

< 7KH�DXWKRULW\�FKHFN�DJDLQVW�WKLV�REMHFW�LV�GLVDEOHG�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

8��8QPDLQWDLQHG�

< 1R�FKHFN�LQGLFDWRU�LV�VHW�< $Q�DXWKRULW\�FKHFN�LV�DOZD\V�FDUULHG�RXW�DJDLQVW�WKLV�REMHFW�< 7KH�3*�GRHV�QRW�FUHDWH�DQ�DXWKRUL]DWLRQ�IRU�WKLV�REMHFW��VR�ILHOG�YDOXHV�DUH�QRW�GLVSOD\HG�< 1R�GHIDXOW�YDOXHV�FDQ�EH�PDLQWDLQHG�IRU�WKLV�DXWKRUL]DWLRQ�

7R�OHDUQ�PRUH�DERXW�WUDQVDFWLRQ�68����SOHDVH�VHH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI$XWKRUL]DWLRQ�&KHFNV�

:K\�'RHV�WKH�3URILOH�*HQHUDWRU�0DLQWDLQ�$XWKRUL]DWLRQV�IRU�0RUH�2EMHFWV�7KDQ

<RX�&DQ�6HH"

:LWK�WUDQVDFWLRQ�68���\RX�FDQ�EURZVH�WKH�HQWULHV�RI�WDEOHV�862%;B&�DQG�862%7B&��7KH3*�XVHV�WDEOH�862%;B&�WR�FKHFN�IRU�WUDQVDFWLRQV�LQ�WKH�FRUUHVSRQGLQJ�DFWLYLW\�JURXSVZKHUH�WKH�DXWKRUL]DWLRQ�REMHFW·V�DXWKRUL]DWLRQV�DUH�WR�EH�PDLQWDLQHG��7KH�FRUUHVSRQGLQJYDOXHV�DUH�VWRUHG�LQ�WDEOH�862%7B&��%XW��WKH�SDUDPHWHU�WUDQVDFWLRQV�DUH�DQ�H[FHSWLRQ��7KHVHWUDQVDFWLRQV�ZRUN�ZLWK�D�SRZHUIXO�FRUH�WUDQVDFWLRQ��UHVWULFWHG�E\�WKH�LQLWLDO�VFUHHQ�RI�WKHFRUH�WUDQVDFWLRQ�WKDW�LV�ILOOHG�DQG�VNLSSHG�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�

Page 362: Amez 46 all

Appendix B: Frequently Asked Questions

Authorization Checks (SU24)

Authorizations Made EasyB–6

7KH�DXWKRUL]DWLRQ�FKHFNV�DUH�FRGHG�H[FOXVLYHO\�LQ�WKH�FRUH�WUDQVDFWLRQ��+RZHYHU��WKHDXWKRUL]DWLRQ�ILHOG�YDOXHV�FDQ�EH�VSHFLILHG�PRUH�SUHFLVHO\�LQ�WKH�SDUDPHWHU�WUDQVDFWLRQ�WKDQLQ�WKH�FRUH�WUDQVDFWLRQ��7KH�3*�ILUVW�PDLQWDLQV�WKH�DXWKRUL]DWLRQV�LQ�862%;B&�DQG862%7B&�XQGHU�WKH�SDUDPHWHU�WUDQVDFWLRQ��DQG�WKHQ�OLVWV�DXWKRUL]DWLRQV�IRU�DOODXWKRUL]DWLRQ�REMHFWV�LQ�WKH�FRUH�WUDQVDFWLRQ�DV�WR�EH�PDLQWDLQHG��$V�D�UHVXOW��IRU�WKH�SDUDPHWHUWUDQVDFWLRQ��PRUH�DXWKRUL]DWLRQV�DUH�PDLQWDLQHG�WKDQ�FDQ�EH�VHHQ�LQ�68���

)RU�H[DPSOH��WUDQVDFWLRQ�2&����ZKLFK�PDLQWDLQV�H[FKDQJH�UDWHV��XVHV�WKH�JHQHUDO�WDEOHPDLQWHQDQFH�WUDQVDFWLRQ��60�����2Q�WKH�LQLWLDO�VFUHHQ�IRU�60����HQWHU�WKH�YLHZ�QDPHV_TCURR�DQG�FKRRVH�0DLQWDLQ��7KH�3*�UHDGV�68���IRU�2&���DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQIRU�WKH�REMHFW�6B7$%8B',6�ZLWK�WKH�&KDQJH�DQG�'LVSOD\�YDOXHV�IRU�WKH�DFWLYLW\�DQG�WKH�)&��YDOXH�IRU�WKH�DXWKRUL]DWLRQ�JURXS��7KH�3*�DOVR�UHDGV�68���IRU�WKH�FRUH�WUDQVDFWLRQ�60��DQG�PDLQWDLQV�DQ�DXWKRUL]DWLRQ�IRU�6B7$%8B&/,�ZLWK�D�%/$1.�YDOXH��EHFDXVH�WKLV�REMHFW�LVQRW�OLVWHG�LQ�68���XQGHU�2&���

+RZ�'R�,�5HGXFH�WKH�6FRSH�RI�$XWKRULW\�&KHFNV�LQ�5��"

6HH�FKDSWHU�����WKH�VHFWLRQ�5HGXFLQJ�WKH�6FRSH�RI�$XWKRUL]DWLRQ�&KHFNV�LQ�WKLV�JXLGH�

+RZ�&DQ�D�&XVWRPHU�,QFOXGH�,QGLYLGXDO�$XWKRUL]DWLRQ�&KHFNV�LQ�D�7UDQVDFWLRQ"

)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�EH�FDUULHG�RXW�< $OZD\V< 2QO\�RQ�FHUWDLQ�VFUHHQV< 2QO\�LQ�FHUWDLQ�WUDQVDFWLRQV

)RU�PRUH�LQIRUPDWLRQ�RQ�ILHOG�H[LWV��VHH�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'�

:KHQ�6WDUWLQJ�7UDQVDFWLRQV��:KDW�6KRXOG�,�.QRZ�$ERXW�WKH�1HZ�$XWKRUL]DWLRQ

&KHFN"

(DFK�WLPH�D�QHZ�WUDQVDFWLRQ�LV�FDOOHG��00����IRU�H[DPSOH���WKH�V\VWHP�FKHFNV�ZKHWKHU�WKHXVHU�LV�DXWKRUL]HG�WR�VWDUW�WKDW�WUDQVDFWLRQ���1R�FKHFN�WDNHV�SODFH�IRU�WKH�$%$3�FRPPDQG&$//�75$16$&7,21���,I�\RX�XVH�WKH�3*�DQG�LWV�PHQXV�WR�IRUP�DFWLYLW\�JURXSV��DQDXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(�LV�DXWRPDWLFDOO\�GHILQHG�IRU�HDFK�DFWLYLW\�JURXS��,WFRQWDLQV�WKH�H[DFW�WUDQVDFWLRQV�WKDW�\RX�VHOHFWHG�IRU�WKH�DFWLYLW\�JURXS�

,I�\RX�ZDQW�WR�DOORZ�WUDQVDFWLRQV�WKDW�\RX�GLG�QRW�DVVLJQ�XVLQJ�WKH�DFWLYLW\�JURXS�PHQX�PDQXDOO\�DGG�DQ�DXWKRUL]DWLRQ�IRU�REMHFW�6B7&2'(��DQG�HQWHU�WKH�PLVVLQJ�WUDQVDFWLRQV��<RXFDQ�QRZ�DYRLG�SUREOHPV�ZKHQ�\RX�FRPSDUH�WKH�DXWKRUL]DWLRQ�GDWD�

6B7&2'(�LV�IRXQG�LQ�WKH�REMHFW�FODVV�1RQDSSOLFDWLRQ�VSHFLILF�$XWKRUL]DWLRQ�REMHFWV��7KH6B7&'B$//�DXWKRUL]DWLRQ�LV�GHOLYHUHG�ZLWK�WKH�SURILOH�6$3B1(:B��(��ZKLFK�DOORZV�\RX�WRH[HFXWH�DOO�WUDQVDFWLRQV��%\�JLYLQJ�UHVWULFWHG�DXWKRUL]DWLRQV�IRU�6B7&2'(��WKH�XVHUDGPLQLVWUDWRU�FDQ�UHVWULFW�LQGLYLGXDO�XVHUV�RU�XVHU�JURXSV�WR�UHPDLQ�ZLWKLQ�WKH�WUDQVDFWLRQVWKH\�UHTXLUH��7KH�DXWKRUL]DWLRQ�FKHFNV�GHILQHG�E\�WKH�GHYHORSHU�ZLWK�WUDQVDFWLRQ�6(���WUDQVDFWLRQ�PDLQWHQDQFH���RU�LQ�WKH�$%$3�VRXUFH�FRGH��FRQWLQXH�WR�EH�SHUIRUPHG�

Page 363: Amez 46 all

Appendix B: Frequently Asked Questions

Upgrade Procedure (SU25)

Release 4.6A/BB–7

7KHVH�DUH�WKH�DGYDQWDJHV�RI�WKH�QHZ�DXWKRUL]DWLRQ�FKHFN�< $�JXDUDQWHH�WKDW�HDFK�WUDQVDFWLRQ�SHUIRUPV�DW�OHDVW�RQH�DXWKRUL]DWLRQ�FKHFN< $Q�HDV\�ZD\�WR�GHWHUPLQH�ZKLFK�WUDQVDFWLRQV�D�XVHU�FDQ�H[HFXWH

8SJUDGH�3URFHGXUH��68���

,V�WKHUH�D�ZD\�WR�UXQ�WKH�68���VWHSV�LQ�´VLPXODWLRQµ�RU�´WHVWµ�PRGH"

$W�SUHVHQW��LW�LV�QRW�SRVVLEOH�WR�UXQ�D�VLPXODWLRQ�RU�WHVW�PRGH�

,QFOXGLQJ�7UDQVDFWLRQV�RU�5HSRUWV

+RZ�FDQ�,�LQFOXGH�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV�LQ�WUDQVDFWLRQV"

)RU�LQGLYLGXDO�DXWKRUL]DWLRQ�FKHFNV��WKHUH�DUH�WKH�VR�FDOOHG�ILHOG�H[LWV��7KHVH�DUHHQKDQFHPHQWV�WKDW�\RX�FDQ�FUHDWH�IRU�DQ\�GDWD�HOHPHQW��DQG�ZKHUH�\RX�FDQ�LPSOHPHQW�\RXUFKHFNV��)LHOG�H[LWV�DUH�DOZD\V�UXQ�LI�D�ILHOG�ZDV�VHOHFWHG�RQ�D�VFUHHQ�IRU�WKLV�GDWD�HOHPHQW�:KHQ�\RX�FUHDWH�WKH�ILHOG�H[LW��\RX�FDQ�GHWHUPLQH�ZKHWKHU�WKLV�FKHFN�VKRXOG�DOZD\V�EHFDUULHG�RXW�RQO\�RQ�FHUWDLQ�VFUHHQV�RU�LQ�FHUWDLQ�WUDQVDFWLRQV��)XUWKHU�GHWDLOV�RQ�ILHOG�H[LWVFDQ�EH�IRXQG�LQ�WKH�RQOLQH�GRFXPHQWDWLRQ�IRU�WUDQVDFWLRQ�&02'��127(��)LHOG�H[LWV�JHWLQYRNHG�DIWHU�WKH�XVHU�DWWHPSWV�WR�SURFHVV�D�SDUWLFXODU�VFUHHQ��)LHOG�H[LWV�GR�QRW�SUHYHQWXVHUV�IURP�HQWHULQJ�D�VFUHHQ�ZKLFK�FRQWDLQV�WKH�ILHOG��$V�ILHOG�H[LWV�FDQ�EH�PDGH�WR�EH�VFUHHQDQG�SURJUDP�VSHFLILF��LW�LV�SRVVLEOH�WKDW�6$3�FDQ�GHILQH�QHZ�VFUHHQV�DQG�SURJUDPV�ZKLFKZLOO��H�J��DIWHU�DQ�XSJUDGH��UHQGHU�WKH�ILHOG�H[LW�DV�QRQ�IXQFWLRQDO��)LHOG�H[LWV�RI�VXFK�VRUWPXVW�DOZD\V�EH�FRQVLGHUHG�DIWHU�DQ�XSJUDGH�

0LVVLQJ�$XWKRUL]DWLRQV

:KDW�LI�DQ�DXWKRUL]DWLRQ�LV�VWLOO�PLVVLQJ�IRU�WKH�JHQHUDWHG�SURILOH��DQG�WKH�XVHU

JHWV�D�´1R�DXWKRUL]DWLRQ���µ�PHVVDJH"

5HPHPEHU�WKDW�LI�LPSOHPHQWLQJ�DQ\�SRUWLRQ�RI�WKH�+5�FRPSRQHQW�RI�WKH�5���6\VWHP��WKHUHLV�D�SRVVLELOLW\�WR�HQDEOH�FHUWDLQ�SDUWV�RI�WKH�DXWKRUL]DWLRQ�V\VWHP�WKDW�DUH�127�UHODWHG�WR�WKHSURILOH�JHQHUDWRU��H[DPSOH��,PSOHPHQWLQJ�+5�VWUXFWXUDO�DXWKRUL]DWLRQV���$V�VXFK��WKH�´1RDXWKRUL]DWLRQ«�µ�PHVVDJH�ZRXOG�EH�FRUUHFW�DQG�WKH�V\VWHP�LV�QRW�LQ�HUURU��,I�FRQYLQFHG�WKDWWKHUH�LV�DQ�HUURU�LQ�WKH�V\VWHP��FUHDWH�DQ�6$31HW�²�5���)URQWHQG�QRWH�WR�VSHFLI\�WKHWUDQVDFWLRQ�DQG�WKH�SUHFLVH�HUURU�PHVVDJH��SUHIHUDEO\�D�FRS\�RI�WKH�RXWSXW�IURP�WUDQVDFWLRQ68����WKDW�\RX�LQFOXGHG�LQ�WKH�DFWLYLW\�JURXS��7R�FRUUHFW�WKH�HUURU�LQ�\RXU�V\VWHP��VHHFKDSWHU����WKH�VHFWLRQ�0DQXDOO\�3RVWPDLQWDLQLQJ�$XWKRUL]DWLRQV�

Page 364: Amez 46 all

Appendix B: Frequently Asked Questions

User Administration

Authorizations Made EasyB–8

8VHU�$GPLQLVWUDWLRQ

+RZ�FDQ�WKH�ZRUN�LQYROYHG�LQ�PDLQWDLQLQJ�VHWWLQJ�XS�DXWKRUL]DWLRQV�EH�GLYLGHG�XS

DPRQJVW�PXOWLSOH�SHRSOH"

6LQFH�WKH�3*�VHOHFWV�WKH�DXWKRUL]DWLRQ�REMHFWV��LW�LV�QR�ORQJHU�QHFHVVDU\�WR�GHFLGH�ZKRPDLQWDLQV�DXWKRUL]DWLRQV�IRU�DQ�REMHFW��7KH�FKHFN�DJDLQVW�WKH�REMHFW�6B86(5B$87�LV�FDUULHGRXW�RQO\�LI�WKH�DGPLQLVWUDWRU�PDQXDOO\�LQVHUWV�DQ�DXWKRUL]DWLRQ��:LWK�DXWKRUL]DWLRQ�REMHFW6B86(5B$*5��D�FKHFN�LV�SRVVLEOH�DW�WKH�DFWLYLW\�JURXS�OHYHO�WR�VHH�ZKR�LV�DOORZHG�WR�VHOHFWZKLFK�WUDQVDFWLRQ�IRU�WKLV�DFWLYLW\�JURXS��)RU�D�IXUWKHU�FODVVLILFDWLRQ�LQWR�DXWKRUL]DWLRQ�DQGDFWLYDWLRQ�DGPLQLVWUDWRU��VHH�$GPLQLVWUDWLRQ�:KHQ�8VLQJ�WKH�3URILOH�*HQHUDWRU�LQ�WKH�RQOLQHGRFXPHQWDWLRQ�

7UDQVSRUWLQJ

'R�WKH�862%;B&�DQG�862%7B&�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�FOLHQWV"

1R��7KHVH�WDEOHV�DUH�FOLHQW�LQGHSHQGHQW��7KH\�RQO\�QHHG�WR�EH�WUDQVSRUWHG�EHWZHHQ�V\VWHPV�

,V�WKHUH�D�ZD\�WR�WUDQVSRUW�DFWLYLW\�JURXSV"

<HV��\RX�FDQ�HLWKHU�XVH�WKH�VWDQGDUG�WUDQVSRUW�FRQQHFWLRQ�LQ�WUDQVDFWLRQ�3)&*�RU�XVH�PDVV�WUDQVSRUW�DFWLYLW\�JURXSV�LQVLGH�WKH�3*�

'RHV�WKH�WUDQVSRUW�RI�DFWLYLW\�JURXSV�EHWZHHQ�WZR�FOLHQWV��LQ�WKH�VDPH�V\VWHP�

ZRUN�ZLWK�WUDQVDFWLRQ�6&&�"

<HV��DIWHU�EHLQJ�LPSRUWHG�WR�WKH�WDUJHW�FOLHQW��WKH�WUDQVSRUWHG�DFWLYLW\�JURXSV�DUH�QRZ�DFWLYHDQG�GR�DSSHDU�LQ�WUDQVDFWLRQ�3)&*��7KLV�VWHS�ZDV�QRW�SRVVLEOH�LQ�UHOHDVHV�EHIRUH����%�

:KDW�LI�WKH�JHQHUDWHG�SURILOH�RQO\�KDV�DXWKRUL]DWLRQV�IRU�REMHFW�6B7&2'("

7KH�6$3�GHIDXOW�WDEOHV�PD\�QRW�KDYH�EHHQ�FRSLHG�LQWR�WKH�FXVWRPHU�WDEOHV��,I�\RX�JHW�D�1RRUJDQL]DWLRQDO�GDWD�DYDLODEOH�PHVVDJH��UXQ�WUDQVDFWLRQ�68����6HH�FKDSWHU���LQ�WKLV�JXLGH�IRUPRUH�LQIRUPDWLRQ�RQ�WUDQVDFWLRQ�68���

7DEOHV

+RZ�GR�,�GLVSOD\�WKH�WUDQVDFWLRQ�FRGHV�WKDW�DUH�LQFOXGHG�LQ�DQ�DFWLYLW\�JURXS"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�$*5B1$0(�

Page 365: Amez 46 all

Appendix B: Frequently Asked Questions

Tables

Release 4.6A/BB–9

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�WUDQVDFWLRQ�FRGHV�LQ�WKDW�DFWLYLW\�JURXS�QDPH�

+RZ�GR�,�GLVSOD\�LQ�ZKLFK�DFWLYLW\�JURXS�D�FHUWDLQ�WUDQVDFWLRQ�FRGH�LV�EHLQJ�XVHG"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_TCODES�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKH�ILHOG�7&2'(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�DOO�DFWLYLW\�JURXSV�QDPH�ZKHUH�WKDW�WUDQVDFWLRQ�FRGH�LV�EHLQJXVHG�

+RZ�GR�,�GLVSOD\�ZKLFK�DFWLYLW\�JURXS�LV�XVHG�E\�ZKLFK�XVHU"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�DFWLYLW\�JURXS�QDPH�LQ�WKH�ILHOG�7$*5B1$0(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�QDPHV�RI�DOO�XVHUV�WKDW�DUH�DVVLJQHG�WR�WKDW�DFWLYLW\�JURXS�

+RZ�GR�,�GLVSOD\�ZKLFK�XVHU�LV�DVVLJQHG�WR�ZKLFK�DFWLYLW\�JURXS"

5XQ�WUDQVDFWLRQ�SE16��7RROV�→�$%$3�:RUNEHQFK�→�2YHUYLHZ�→�'DWD�%URZVHU��

�� (QWHU�AGR_USERS�LQ�WKH�7DEOH�QDPH�ILHOG�

�� 'LVSOD\�WKH�WDEOH�FRQWHQWV��7DEOH�→�WDEOH�FRQWHQWV��

�� ,Q�WKH�VHOHFWLRQ�VFUHHQ��HQWHU�WKH�QDPH�RI�WKH�XVHU�LQ�WKH�ILHOG�81$0(�

�� &KRRVH�([HFXWH��RU�FKRRVH�3URJUDP�→�([HFXWH��

�� <RX�ZLOO�UHFHLYH�D�OLVW�ZLWK�WKH�DOO�DFWLYLW\�JURXSV�WKLV�XVHU�LV�DVVLJQHG�WR�

'RHV�WKH�DXWKRUL]DWLRQ�REMHFW�DOORZ�DFWLYLWLHV�QRW�PDLQWDLQHG�LQ�WDEOH�7$&7="

7DEOH�7$&7=�FRQWDLQV�DOORZDEOH�DFWLYLWLHV�IRU�DQ�DXWKRUL]DWLRQ�REMHFW��,I�\RX�ILQG�DWUDQVDFWLRQ�ORRNLQJ�IRU�DQ�DXWKRUL]DWLRQ�REMHFW�ZLWK�DQ�DFWLYLW\�WKDW�LV�QRW�PDLQWDLQHG�RURIIHUHG�E\�3*��PDLQWDLQ�WKH�PLVVLQJ�DFWLYLW\�IRU�WKH�DSSURSULDWH�DXWKRUL]DWLRQ�REMHFW�LQ�WDEOH7$&7=�ZLWK�WUDQVDFWLRQ�60����7KH�3*�WKHQ�RIIHUV�WKLV�YDOXH�

Page 366: Amez 46 all

Appendix B: Frequently Asked Questions

Tables

Authorizations Made EasyB–10

:KDW�LV�WKH�VWUXFWXUH�RI�WDEOH�862%;B&"

)LHOG�QDPH .H\ 'HVFULSWLRQ

1$0( ; 3URJUDP�WUDQVDFWLRQ�IXQFWLRQ�PRGXOH�QDPH

7<3( ; 7\SH�RI�UHSRUW

2%-(&7 ; 8VHU�PDVWHU�PDLQWHQDQFH��DXWKRUL]DWLRQ�REMHFW

02',),(5 /DVW�FKDQJHG�E\

02''$7( 'DWH�RI�FKDQJH

02'7,0( 7LPH�RI�FKDQJH

2.)/$* 1� �1R�DXWKRUL]DWLRQ�FKHFNV;� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH<� �$XWKRUL]DWLRQ�FKHFNV�WDNH�SODFH��GHIDXOW�YDOXHV�LQ�862%7B&8� �1RW�PDLQWDLQHG

7KH�1$0(�DQG�7<3(�ILHOGV�LGHQWLI\�D�WUDQVDFWLRQ��DQG�2%-(&7�LGHQWLILHV�WKH�DXWKRUL]DWLRQREMHFW��02',),(5��02''$7(��02'7,0(�FRQWDLQ�DGPLQLVWUDWLYH�LQIRUPDWLRQ�DERXW�WKHPRVW�UHFHQW�FKDQJHV��2.)/$*�LV�LPSRUWDQW�EHFDXVH�ZKHQ�LW�FRQWDLQV�WKH�YDOXH�1��QRDXWKRUL]DWLRQ�FKHFN�LV�SHUIRUPHG�IRU�WKH�WUDQVDFWLRQ�DQG�DXWKRUL]DWLRQ�REMHFW�

([DPSOHV

(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_STUE_BER��2.)/$*� �N��(YHU\DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B678(B%(5�,'����ZLOO�VXFFHHG�UHJDUGOHVV�RI�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�

(QWHU�1$0(� �VA01��7<3(� �TR��2%-(&7� �C_DRAW_TCD��2.)/$*� �X�RU�DQRWKHU�YDOXH�!�N��$Q�DXWKRUL]DWLRQ�FKHFN��$87+25,7<�&+(&.�2%-(&7�&B'5$:B7&'�,'����ZLOOVXFFHHG�RQO\�ZKHQ�WKH�XVHU·V�DXWKRUL]DWLRQ�SURILOH�FRQWDLQV�WKH�FRPELQDWLRQ�RI�ILHOGV�RUILHOG�FRQWHQWV��XQGHU�,'�

Page 367: Amez 46 all

C–1

$SSHQGL[�&� ,PSRUWDQW�6\VWHP�3URILOH

3DUDPHWHUV

&RQWHQWV

Incorrect Logons, Default Clients, and Default Start Menu............................... C–2

Setting Password Length and Expiration............................................................ C–2

Specifying Impermissible Passwords ................................................................. C–3

Securing SAP* Against Misuse ............................................................................ C–3

Tracing Authorizations.......................................................................................... C–3

Profile Generator and Transaction SU24............................................................. C–4

User Buffer.............................................................................................................. C–4

No Check on Object S_TCODE............................................................................. C–4

No Check on Certain ABAP Objects .................................................................... C–4

RFC Authority Check............................................................................................. C–5

&&

Page 368: Amez 46 all

Appendix C: Important System Profile Parameters

Incorrect Logons, Default Clients, and Default Start Menu

Authorizations Made EasyC–2

,QFRUUHFW�/RJRQV��'HIDXOW�&OLHQWV��DQG�'HIDXOW�6WDUW�0HQX

8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VHW�LQFRUUHFW�ORJRQ�OLPLWV�DQG�WKH�GHIDXOWFOLHQW�< /RJLQ�IDLOVBWRBVHVVLRQBHQG

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�WHUPLQDWHV�WKH�ORJRQ�DWWHPSW��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV��EXW�WKLVYDOXH�FDQ�EH�VHW�WR�DQ\�QXPEHU�EHWZHHQ��²���

< /RJLQ�IDLOVBWRBXVHUBORFN

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�WLPHV�D�XVHU�FDQ�HQWHU�DQ�LQFRUUHFW�SDVVZRUGEHIRUH�WKH�V\VWHP�ORFNV�WKH�XVHU�IURP�PDNLQJ�DGGLWLRQDO�ORJRQ�DWWHPSWV��,I�WKH�V\VWHPORFNV��DQ�HQWU\�LV�ZULWWHQ�WR�WKH�V\VWHP�ORJ��DQG�WKH�ORFN�LV�UHOHDVHG�DW�PLGQLJKW��7KHGHIDXOW�LV����WLPHV��EXW�WKLV�YDOXH�FDQ�EH�VHW�WR�DQ\�YDOXH�EHWZHHQ��²���

< /RJLQ�IDLOHGBXVHUBDXWRBXQORFN

7KLV�SDUDPHWHU�XQORFNV�XVHUV�ZKR�JRW�ORFNHG�RXW�E\�ORJJLQJ�RQ�LQFRUUHFWO\��,I�WKHSDUDPHWHU�LV�VHW�WR����WKH�GHIDXOW���GXH�WR�D�SUHYLRXV�LQFRUUHFW�ORJRQ�DWWHPSW��WKH�V\VWHPGRHV�QRW�FRQVLGHU�XVHUV�ORFNHG��7KH�ORFNV�UHPDLQ�LI�WKH�SDUDPHWHU�YDOXH�LV���

< /RJLQ�V\VWHPBFOLHQW

7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�FOLHQW��7KLV�FOLHQW�LV�DXWRPDWLFDOO\�ILOOHG�LQ�RQ�WKHV\VWHP�ORJRQ�VFUHHQ��8VHUV�FDQ�HQWHU�D�GLIIHUHQW�FOLHQW�

< /RJLQ�H[WBVHFXULW\

6LQFH�5HOHDVH����(��H[WHUQDO�VHFXULW\�WRROV�VXFK�DV�.HUEHURV�RU�6HFXGH�KDYH�PDQDJHG5���6\VWHP�DFFHVV��,I�WKLV�SDUDPHWHU�LV�VHW��DQ�DGGLWLRQDO�LGHQWLILFDWLRQ�FDQ�EH�VSHFLILHGIRU�HDFK�XVHU��LQ�XVHU�PDLQWHQDQFH��ZKHUH�XVHUV�ORJ�RQ�WR�WKHLU�VHFXULW\�V\VWHP��7RDFWLYDWH��VHW�WKH�YDOXH�WR�;�

< 6WDUWBPHQX

7KLV�SDUDPHWHU�VSHFLILHV�WKH�GHIDXOW�VWDUW�PHQX�IRU�DOO�XVHUV�DQG�FDQ�EH�RYHUZULWWHQ�ZLWKWKH�XVHU�VSHFLILF�VWDUW�PHQX��WUDQVDFWLRQ�68�����7KH�GHIDXOW�LV�6�����DQG�WKLV�YDOXH�FDQ�EHVHW�WR�DQ\�RWKHU�DUHD�PHQX�FRGH�

6HWWLQJ�3DVVZRUG�/HQJWK�DQG�([SLUDWLRQ

8VH�WKH�IROORZLQJ�V\VWHP�SURILOH�SDUDPHWHUV�WR�VSHFLI\�WKH�PLQLPXP�OHQJWK�RI�D�SDVVZRUGDQG�WKH�IUHTXHQF\�ZLWK�ZKLFK�XVHUV�PXVW�FKDQJH�SDVVZRUGV�< /RJLQ�PLQBSDVVZRUGBOQJ

7KLV�SDUDPHWHU�GHILQHV�WKH�PLQLPXP�SDVVZRUG�OHQJWK��7KH�GHIDXOW�LV�WKUHH�FKDUDFWHUV�EXW�WKLV�YDOXH�FDQ�EH�VHW�IURP�WKUHH�WR�HLJKW�FKDUDFWHUV�

Page 369: Amez 46 all

Appendix C: Important System Profile Parameters

Specifying Impermissible Passwords

Release 4.6A/BC–3

< /RJLQ�SDVVZRUGBH[SLUDWLRQBWLPH

7KLV�SDUDPHWHU�GHILQHV�WKH�QXPEHU�RI�GD\V�DIWHU�ZKLFK�D�SDVVZRUG�PXVW�EH�FKDQJHG�7KH�SDUDPHWHU�DOORZV�XVHUV�WR�NHHS�WKHLU�SDVVZRUGV�ZLWKRXW�WLPH�OLPLW�DQG�OHDYHV�WKHYDOXH�VHW�WR�WKH�GHIDXOW����

7R�PDNH�WKH�SDUDPHWHUV�JOREDOO\�HIIHFWLYH�LQ�DQ�5���6\VWHP��VHW�WKHP�LQ�WKH�GHIDXOW�SURILOH�'()$8/7�3)/��7R�PDNH�WKHP�LQVWDQFH�VSHFLILF��\RX�PXVW�VHW�WKHP�LQ�WKH�SURILOHV�RI�HDFKDSSOLFDWLRQ�VHUYHU�LQ�\RXU�5���6\VWHP�

6SHFLI\LQJ�,PSHUPLVVLEOH�3DVVZRUGV

7R�IRUELG�XVH�RI�D�FHUWDLQ�SDVVZRUG��HQWHU�LW�LQ�WDEOH�865����<RX�FDQ�PDLQWDLQ�WKLV�WDEOH�ZLWKWUDQVDFWLRQ�60����,Q�865����\RX�PD\�DOVR�JHQHULFDOO\�VSHFLI\�SURKLELWHG�SDVVZRUGV�

7KHUH�DUH�WZR�ZLOG�FDUG�FKDUDFWHUV�< $�TXHVWLRQ�PDUN��"��PHDQV�D�VLQJOH�FKDUDFWHU�< $Q�DVWHULVN�� ��PHDQV�D�VHTXHQFH�RI�DQ\�FRPELQDWLRQ�FKDUDFWHUV�RI�DQ\�OHQJWK�

([DPSOHV�< ��� �LQ�WDEOH�865���SURKLELWV�DQ\�SDVVZRUG�WKDW�EHJLQV�ZLWK�WKH�VHTXHQFH�����< ��� �SURKLELWV�DQ\�SDVVZRUG�WKDW�FRQWDLQV�WKH�VHTXHQFH�����< $%"�SURKLELWV�SDVVZRUGV�WKDW�EHJLQ�ZLWK�$%�DQG�KDYH�DQ�DGGLWLRQDO�FKDUDFWHU��VXFK�DV

$%$��$%%��DQG�$%&�

6HFXULQJ�6$3 �$JDLQVW�0LVXVH

/RJLQ�QRBDXWRPDWLFBXVHUBVDS

,I�WKH�SDUDPHWHU�LV�VHW�WR����WKHQ�6$3 �KDV�QR�VSHFLDO�GHIDXOW�SURSHUWLHV��5HVHWWLQJ�WKHSDUDPHWHU�WR���DOORZV�ORJLQV�ZLWK�SAP*��SDVVZRUG�PASS��DQG�XQUHVWULFWHG�V\VWHP�DFFHVVSULYLOHJHV��(YHQ�LI�\RX�VHW�WKH�SDUDPHWHU��HQVXUH�WKDW�WKHUH�LV�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �,I�D�XVHU�PDVWHU�UHFRUG�IRU�6$3 �H[LVWV��LW�EHKDYHV�OLNH�D�QRUPDO�XVHU��LV�VXEMHFW�WRDXWKRUL]DWLRQ�FKHFNV��DQG�LWV�SDVVZRUG�FDQ�EH�FKDQJHG�

7UDFLQJ�$XWKRUL]DWLRQV

$XWK�FKHFNBYDOXHBZULWHBRQ

%\�HQWHULQJ�WUDQVDFWLRQ�SU53�LQ�WKH�&RPPDQG�ILHOG��\RX�FDQ�DQDO\]H�DQ�DXWKRUL]DWLRQ�GHQLHG�HUURU�WKDW�KDV�MXVW�RFFXUUHG�LQ�\RXU�VHVVLRQ��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�KDYHVHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�D�YDOXH�JUHDWHU�WKDQ����%\�GHIDXOW��WKH�IXQFWLRQ�LVLQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV���

Page 370: Amez 46 all

Appendix C: Important System Profile Parameters

Profile Generator and Transaction SU24

Authorizations Made EasyC–4

3URILOH�*HQHUDWRU�DQG�7UDQVDFWLRQ�68��

$XWK�QRBFKHFNBLQBVRPHBFDVHV

%\�XVLQJ�WUDQVDFWLRQ�SU24��\RX�FDQ�DFWLYDWH�RU�GHDFWLYDWH�DXWKRUL]DWLRQ�FKHFNV�IRUWUDQVDFWLRQV��7KLV�IXQFWLRQ�LV�DFWLYH�RQO\�LI�\RX�VHW�WKH�V\VWHP�SURILOH�SDUDPHWHU�WR�<��%\GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�DFWLYDWH�WKH�SDUDPHWHU��VHWWKH�YDOXH�WR�<��,I�\RX�ZDQW�WR�ZRUN�ZLWK�WKH�3*��WKH�SDUDPHWHU�PXVW�EH�VHW�

8VHU�%XIIHU

$XWK�DXWKBQXPEHUBLQBXVHUEXIIHU

7R�KDYH�D�JRRG�SHUIRUPDQFH�LQ�WKH�V\VWHP��WKH�QDPHV�RI�DOO�WKH�DXWKRUL]DWLRQV�LQFOXGHG�LQ�DXVHU�PDVWHU�IRU�D�XVHU�DUH�EXIIHUHG�LQ�D�WDEOH��,Q�WKH�VWDQGDUG��WKLV�EXIIHU�FDQ�GHDO�ZLWK�XS�WR������DXWKRUL]DWLRQV��,I�D�XVHU�KDV�PRUH�WKDQ�������DXWKRUL]DWLRQV�WKH�YDOXH�FDQ�EH�VHW�WR������7KH�GHIDXOW�YDOXH�LV������EXW�WKLV�GHIDXOW�YDOXH�FDQ�EH�VHW�WR�EHWZHHQ��²������,I�IRU�DQ\UHDVRQ�\RX�KDYH�WR�UHVHW�WKH�XVHU�EXIIHU��VHH�2QOLQH�6HUYLFH�6\VWHP�QRWH�������DQG�������IRUGHWDLOHG�LQIRUPDWLRQ�

1R�&KHFN�RQ�2EMHFW�6B7&2'(

$XWK�QRBFKHFNBRQBWFRGH

)URP�5HOHDVH����(��WKH�V\VWHP�FKHFNV�RQ�REMHFW�6B7&2'(��,Q�VSHFLILF�LQVWDQFHV��\RX�FDQ�WXUQWKLV�FKHFN�RII��EXW�WKLV�VWHS�UHVXOWV�LQ�D�ELJ�VHFXULW\�ULVN�IRU�\RXU�V\VWHP��%\�GHIDXOW��WKHIXQFWLRQ�LV�LQDFWLYH��DQG�WKH�SDUDPHWHU�YDOXH�LV�1��7R�VZLWFK�WKH�FKHFN�RII�VHW�WKH�YDOXH�WR�<�

1R�&KHFN�RQ�&HUWDLQ�$%$3�2EMHFWV

$XWK�V\VWHPBDFFHVVBFKHFNBRII

8VH�WKLV�SDUDPHWHU�WR�WXUQ�RII�WKH�DXWRPDWLF�DXWKRUL]DWLRQ�FKHFN�IRU�SDUWLFXODU�$%$3ODQJXDJH�HOHPHQWV��ILOH�RSHUDWLRQV��&3,&�FDOOV��DQG�FDOOV�WR�NHUQHO�IXQFWLRQV���7KLV�SDUDPHWHUHQVXUHV�WKH�GRZQZDUG�FRPSDWLELOLW\�RI�WKH�5���NHUQHO��%\�GHIDXOW��WKH�IXQFWLRQ�LV�LQDFWLYH�YDOXH� ���DQG�FKHFN�UHPDLQV�DFWLYH���7R�WXUQ�WKH�FKHFN�RII��VHW�WKH�YDOXH�WR���

Page 371: Amez 46 all

Appendix C: Important System Profile Parameters

RFC Authority Check

Release 4.6A/BC–5

5)&�$XWKRULW\�&KHFN

$XWK�UIFBDXWKRULW\BFKHFN

<RX�FDQ�XVH�WKLV�SDUDPHWHU�WR�GHWHUPLQH�ZKHWKHU�REMHFW�6B5)&�LV�FKHFNHG�GXULQJ�5)&�FDOOV�< 9DOXH� ����QR�FKHFN�DJDLQVW�6B5)&< 9DOXH� ����FKHFN�DFWLYH�EXW�QR�FKHFN�IRU�65)&�)8*5

< 9DOXH� ����FKHFN�DFWLYH�DQG�FKHFN�DJDLQVW�65)&�)8*5

Page 372: Amez 46 all

Appendix C: Important System Profile Parameters

RFC Authority Check

Authorizations Made EasyC–6

Page 373: Amez 46 all

G–1

*ORVVDU\

7HUP 'HILQLWLRQ

$%$3 $%$3�LV�DQ�LQWHUSUHWDWLYH��SODWIRUP�LQGHSHQGHQW��IRXUWK�JHQHUDWLRQ�ODQJXDJHWDLORUHG�WR�GHYHORS�EXVLQHVV�DSSOLFDWLRQV��7KH�ODQJXDJH�VXSSRUWV�VWUXFWXUHGSURJUDPPLQJ�DQG�FRQWDLQV�HOHPHQWV�QHFHVVDU\�WR�FDOO�H[WHUQDO�UHODWLRQDO�GDWDEDVHVWKURXJK�RSHQ�64/�FDOOV�RU�GDWDEDVH�VSHFLILF�QDWLYH�64/�FDOOV��7KH�GHYHORSHU�LV�QRWUHTXLUHG�WR�NQRZ�WKH�XQGHUO\LQJ�LQIUDVWUXFWXUH�

$%$3'HYHORSPHQW:RUNEHQFK

7KH�$%$3�'HYHORSPHQW�:RUNEHQFK�SURYLGHV�D�FRPSOHWH�FOLHQW�VHUYHU�UXQWLPHHQYLURQPHQW�DQG�H[WHQVLYH�PDQDJHPHQW�DQG�WXQLQJ�WRROV��7KH�:RUNEHQFK�LV�6$3·VLQWHJUDWHG�WRRO�VHW�WR�GHYHORS�HQWHUSULVH�ZLGH�FOLHQW�VHUYHU�DSSOLFDWLRQV��7KLV�WRRO�VHW�LV�SDUWLFXODUO\�VXLWHG�WR�5���FXVWRPHUV�ZKR�ZDQW�WR�HQKDQFH�VWDQGDUG�5��EXVLQHVV�DSSOLFDWLRQV�ZLWK�FXVWRPL]HG��DGG�RQ�IXQFWLRQDOLW\�

7KH�PDMRU�FRPSRQHQWV�RI�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�LQFOXGH�< $%$3�3URJUDPPLQJ�/DQJXDJH< $%$3�'LFWLRQDU\< $%$3�(GLWRU< $%$3�)XQFWLRQ�/LEUDU\< 'DWD�0RGHOHU< 5���5HSRVLWRU\< 7HVW�7RROV��6FUHHQ�3DLQWHU< 0HQX�3DLQWHU��:RUNEHQFK�2UJDQL]HU�7UDQVSRUW�6\VWHP< 5���5HSRVLWRU\�,QIRUPDWLRQ�6\VWHP7KH�ZRUNEHQFK�LV�DOVR�DYDLODEOH�WR�FRPSDQLHV�ZKR�DUH�QRW�5���XVHUV��EXW�ZDQW�WKHEHQHILWV�RI�6$3·V�SURYHQ�GHYHORSPHQW�HQYLURQPHQW�IRU�WKHLU�VRIWZDUH�SURMHFWV�

$%$3�'LFWLRQDU\ 7KH�$%$3�'LFWLRQDU\��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��LV�D�FHQWUDOLQIRUPDWLRQ�EDVH�IRU�DSSOLFDWLRQ�DQG�V\VWHP�GDWD��7KH�'LFWLRQDU\�GHVFULEHV�WKLVGDWD�IURP�D�ORJLFDO�SRLQW�RI�YLHZ�DQG�VWRUHV�LQIRUPDWLRQ�DERXW�KRZ�WKH�GDWD�LVUHSURGXFHG�LQ�WKH�XQGHUO\LQJ�UHODWLRQDO�GDWDEDVH��7KH�$%$3�'LFWLRQDU\�LV�DFWLYHDQG�IXOO\�LQWHJUDWHG�ZLWK�WKH�RWKHU�'HYHORSPHQW�:RUNEHQFK�WRROV��$Q\�FKDQJHV�WRWKH�'LFWLRQDU\�DUH�DXWRPDWLFDOO\�DQG�LPPHGLDWHO\�XSGDWHG�WKURXJKRXW�WKH�V\VWHP�

Page 374: Amez 46 all

*ORVVDU\

Authorizations Made EasyG–2

7HUP 'HILQLWLRQ

$%$3�(GLWRU 7KH�$%$3�(GLWRU��D�FRPSRQHQW�RI�WKH�'HYHORSPHQW�:RUNEHQFK��SURYLGHV�WKHIROORZLQJ�IXQFWLRQV�WR�VXSSRUW�WKH�DSSOLFDWLRQ�GHYHORSHU�< 6\QWD[�FKHFN�ZLWK�DXWRPDWLF�FRUUHFWLRQ�RI�HUURUV< ,QVHUWLRQ�RI�FRGLQJ�SDWWHUQV�IRU�IUHTXHQWO\�XVHG�LQVWUXFWLRQV< 1DYLJDWLRQ�LQWR�RWKHU�ZRUNEHQFK�WRROV< *HQHUDWLRQ�RI�ZKHUH�XVHG�OLVWV�IRU�DOO�GDWD�REMHFWV< 6SOLW�VFUHHQ�HGLWRU�ZLWK�SURJUDP�FRPSDULVRQ

$FWLYDWLRQDGPLQLVWUDWRU

$Q�DFWLYDWLRQ�DGPLQLVWUDWRU�DFWLYDWHV�DXWKRUL]DWLRQ�SURILOHV�DQG�DXWKRUL]DWLRQV�PDNLQJ�WKHP�HIIHFWLYH�LQ�WKH�V\VWHP��7KHVH�DGPLQLVWUDWRUV�FDQ�RQO\�FKDQJH�RUGHOHWH�WKH�SURILOHV�DQG�DXWKRUL]DWLRQV�VSHFLILHG�LQ�WKHLU�DXWKRUL]DWLRQ�SURILOH�

$FWLYH�SODQYHUVLRQ

7KLV�LV�WKH�SODQ�YHUVLRQ�WKDW�WKH�5���6\VWHP�UHFRJQL]HV�DV�YDOLG�DQG�FXUUHQWO\�LQRSHUDWLRQ��7KH�LQIRUPDWLRQ�LQ�WKH�DFWLYH�SODQ�YHUVLRQ�LV�XVHG�WR�SHUIRUP�DOO�GD\�WR�GD\�SURFHVVLQJ�DQG�FURVV�DSSOLFDWLRQ�PDLQWHQDQFH�

<RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DFWLYH�LI�< <RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU< ,QWHJUDWLRQ�LV�DFWLYH�EHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV��VXFK�DV

WKH�3*

<RXU�VHOHFWHG�SODQ�VKRXOG�UHIOHFW�WKH�DFWXDO�VWDWH�RI�RSHUDWLRQV�DW�\RXU�ILUP��$Q\RWKHU�SODQ�YHUVLRQV�\RXU�FRPSDQ\�PDLQWDLQV�FDQ�EH�XVHG�WR�H[SHULPHQW�ZLWKGLIIHUHQW�RUJDQL]DWLRQDO�VFHQDULRV�

$FWLYLW\�JURXS $Q�DFWLYLW\�JURXS�LV�D�FROOHFWLRQ�RI�LQGLYLGXDO�DFWLYLWLHV�WKDW�DUH�URXWLQHO\SHUIRUPHG�WRJHWKHU�RU�DUH�DIILOLDWHG�LQ�VRPH�ZD\���)RU�H[DPSOH��WKH�WUDQVODWLRQWDVNV�DFWLYLW\�JURXS�FRXOG�LQFOXGH�DOO�WDVNV��UHSRUWV��DQG�WUDQVDFWLRQV�DVVRFLDWHGZLWK�WUDQVODWLRQ��<RX�VHW�XS�DFWLYLW\�JURXSV�E\�OLQNLQJ�VLQJOH�DFWLYLWLHV�XQGHU�DQDFWLYLW\�JURXS�QDPH��$�VLQJOH�DFWLYLW\�PD\�EH�LQFOXGHG�LQ�PRUH�WKDQ�RQH�DFWLYLW\JURXS�

$SSOLFDWLRQVHUYHU

$�FRPSXWHU�ZKHUH�WKH�DSSOLFDWLRQ�ORJLF�DQG�DSSOLFDWLRQ�FRQWURO�VHUYLFHV�RI�WKH�5��6\VWHP�UXQ�

$XWKRUL]DWLRQ $Q�DXWKRUL]DWLRQ�LV�WKH�DXWKRULW\�WR�SHUIRUP�D�SDUWLFXODU�DFWLRQ�LQ�WKH�5���6\VWHP�(DFK�DXWKRUL]DWLRQ�UHIHUV�WR�RQH�DXWKRUL]DWLRQ�REMHFW�DQG�GHILQHV�RQH�RU�PRUHSRVVLEOH�YDOXHV�IRU�HDFK�DXWKRUL]DWLRQ�ILHOG�OLVWHG�IRU�WKDW�DXWKRUL]DWLRQ�REMHFW��$XVHU·V�DXWKRUL]DWLRQV�DUH�FRPELQHG�LQ�D�SURILOH�WKDW�LV�HQWHUHG�LQ�WKH�XVHU·V�PDVWHUUHFRUG�

$XWKRUL]DWLRQDGPLQLVWUDWRU

7KH�XVHU�UHVSRQVLEOH�IRU�PDLQWDLQLQJ�DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV�LVWKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU��)RU�VHFXULW\�UHDVRQV��WKLV�XVHU�VKRXOG�QRW�EHDXWKRUL]HG�WR�DFWLYDWH�DXWKRUL]DWLRQV�DQG�SURILOHV�RU�WR�PDLQWDLQ�XVHU�PDVWHUUHFRUGV��2WKHUZLVH��RQH�XVHU�ZRXOG�VLQJOH�KDQGHGO\�GHILQH��DFWLYDWH��DQG�DVVLJQV\VWHP�DFFHVV�DXWKRUL]DWLRQV�

Page 375: Amez 46 all

*ORVVDU\

Release 4.6A/B �G–3

7HUP 'HILQLWLRQ

$XWKRUL]DWLRQFKHFN

7KLV�FKHFN�GHFLGHV�ZKHWKHU�D�XVHU�LV�DXWKRUL]HG�WR�H[HFXWH�D�SDUWLFXODU�IXQFWLRQ�3URFHVVHV��IXQFWLRQV��DQG�GDWD�DFFHVVHV�LQ�WKH�5���6\VWHP�FDQ�RQO\�EH�SHUIRUPHGZKHQ�XVHU�DXWKRUL]DWLRQV�KDYH�EHHQ�FKHFNHG�LQ�WKH�UHVSHFWLYH�V\VWHP�DQGDSSOLFDWLRQ�SURJUDPV�

$XWKRUL]DWLRQFRQFHSW

*HQHUDO�DFFHVV�WR�D�VWDQGDUG�GDWDEDVH�IRU�GLIIHUHQW�DSSOLFDWLRQV�UHTXLUHV�UHOLDEOHPHFKDQLVPV�GHVLJQHG�WR�HQVXUH�WKH�FRQILGHQWLDOLW\�RI�SHUVRQDO�LQIRUPDWLRQ��$PXOWLOHYHO��JUDGHG�DXWKRUL]DWLRQ�FRQFHSW�KDV�EHHQ�VHW�XS�WR�UHJXODWH�GDWD�DFFHVV�2QO\�WKRVH�SHRSOH�ZLWK�DFWLYH�XVHU�PDVWHU�UHFRUGV�FDQ�DFFHVV�WKH�V\VWHP��7KHDXWKRUL]DWLRQ�FRQFHSW�FRYHUV�WKH�VWUXFWXUH�DQG�IXQFWLRQDOLW\�RI�DXWKRUL]DWLRQDVVLJQPHQW�DQG�FKHFNLQJ�LQ�WKH�5���6\VWHP��$XWKRUL]DWLRQV�SURWHFW�WKH�V\VWHPIURP�XQDXWKRUL]HG�DFFHVV�

$XWKRUL]DWLRQILHOG

2QH�HOHPHQW�RI�DQ�DXWKRUL]DWLRQ�REMHFW�LV�WKH�DXWKRUL]DWLRQ�ILHOG��,Q�DXWKRUL]DWLRQREMHFWV��WKHVH�ILHOGV�UHSUHVHQW�YDOXHV�IRU�LQGLYLGXDO�V\VWHP�HOHPHQWV��ZKLFKXQGHUJR�DXWKRUL]DWLRQ�FKHFNLQJ�WR�YHULI\�D�XVHU·V�DXWKRUL]DWLRQ�

$XWKRUL]DWLRQJURXS

$Q�DXWKRUL]DWLRQ�JURXS�LV�WKH�FRPELQHG�ILHOGV�RI�WKH�DXWKRUL]DWLRQ�REMHFWV6B'(9(/23��SURJUDP�GHYHORSPHQW�DQG�SURJUDP�H[HFXWLRQ��DQG�6B352*5$0�SURJUDP�PDLQWHQDQFH���7KH�DXWKRUL]DWLRQ�JURXS�ILHOG�FRQWDLQV�WKH�QDPH�RI�DSURJUDP�JURXS�WKDW�DOORZV�XVHUV�WR�SHUIRUP�WKH�IROORZLQJ�RSHUDWLRQV�< ([HFXWH�SURJUDPV< 6FKHGXOH�MREV�IRU�EDFNJURXQG�SURFHVVLQJ< 0DLQWDLQ�SURJUDPV< 0DLQWDLQ�YDULDQWV

:KHQ�FUHDWLQJ�D�SURJUDP��\RX�FDQ�VSHFLI\�DQ�DXWKRUL]DWLRQ�JURXS�DV�RQH�RI�WKHSURJUDP�DWWULEXWHV��7KLV�VWHS�DOORZV�\RX�WR�JURXS�SURJUDPV�IRU�DXWKRUL]DWLRQFKHFNLQJ�

$XWKRUL]DWLRQREMHFW

$QRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�LV�WKH�DXWKRUL]DWLRQ�REMHFW�WKDW�DOORZV\RX�WR�GHILQH�FRPSOH[�DXWKRUL]DWLRQV��$Q�DXWKRUL]DWLRQ�REMHFW�JURXSV�XS�WR���DXWKRUL]DWLRQ�ILHOGV�LQ�DQ�´$1'µ�UHODWLRQVKLS�WR�FKHFN�ZKHWKHU�D�XVHU�LV�DOORZHG�WRSHUIRUP�D�FHUWDLQ�DFWLRQ��7R�SDVV�DQ�DXWKRUL]DWLRQ�WHVW�IRU�DQ�REMHFW��WKH�XVHU�PXVWVDWLVI\�WKH�DXWKRUL]DWLRQ�FKHFN�IRU�HDFK�ILHOG�LQ�WKDW�REMHFW�

$XWKRUL]DWLRQSURILOH

7KH�DXWKRUL]DWLRQ�SURILOH�LV�DQRWKHU�HOHPHQW�RI�WKH�DXWKRUL]DWLRQ�FRQFHSW�WKDW�JLYHVXVHUV�DFFHVV�WR�WKH�V\VWHP��7KH�SURILOHV�FRQWDLQ�DXWKRUL]DWLRQV�LGHQWLILHG�E\�WKHDXWKRUL]DWLRQ�REMHFW�DQG�WKH�DXWKRUL]DWLRQ�QDPH��,I�D�SURILOH�LV�VSHFLILHG�LQ�D�XVHUPDVWHU�UHFRUG��WKH�XVHU�KDV�DOO�WKH�DXWKRUL]DWLRQV�GHILQHG�LQ�WKDW�SURILOH�

$XWKRUL]DWLRQWUDFH

7KLV�LV�D�WUDQVDFWLRQ�WKDW�UHFRUGV�DOO�WKH�UHTXLUHG�DXWKRUL]DWLRQ�REMHFWV�LQ�DSURFHVVLQJ�VWHS�

%DFNJURXQGSURFHVV

7KH�EDFNJURXQG�SURFHVV�LV�WKH�QRQLQWHUDFWLYH�H[HFXWLRQ�RI�SURJUDPV��ZKLFK�LQ�WKH5���6\VWHP��DUH�KDQGOHG�OLNH�RQOLQH�RSHUDWLRQV��%DFNJURXQG�SURFHVVHV�RIWHQ�XVHWKH�VDPH�SURJUDPV�WKDW�FRQWURO�WKH�GLDORJV�

Page 376: Amez 46 all

*ORVVDU\

Authorizations Made Easy� G–4

7HUP 'HILQLWLRQ

%XVLQHVV�SURFHVV %XVLQHVV�SURFHVVHV�JURXS�WDVNV�PDGH�DFURVV�FRVW�FHQWHUV�LQ�\RXU�FRPSDQ\��7KLVSURFHVV�HQDEOHV�\RX�WR�VWUXFWXUH�\RXU�FRPSDQ\·V�SURFHVVHV�E\�IXQFWLRQ�

([DPSOHV�LQFOXGH�< 'HYHORSLQJ�D�SURGXFW< 'UDZLQJ�XS�D�TXRWDWLRQ< 3XUFKDVLQJ�D�PDWHULDO< 3URFHVVLQJ�DQ�RUGHU

%XVLQHVV:RUNIORZ��6$3�

7KLV�VXSSRUW��SURYLGHG�IRU�E\�WUDQVDFWLRQ�SURFHVVLQJ�LQ�WKH�5���6\VWHP��WDNHV�LQWRDFFRXQW�WKH�EXVLQHVV�HQYLURQPHQWV·�QHHGV�

&KHFN�LQGLFDWRU $�FKHFN�LQGLFDWRU�LV�VHW�WR�GHWHUPLQH�ZKHWKHU�DXWKRUL]DWLRQ�REMHFWV�DUHXQPDLQWDLQHG��QRW�FKHFNHG��FKHFNHG��RU�FKHFNHG�PDLQWDLQHG�

&OLHQW�VHUYHUDUFKLWHFWXUH����WLHU

2ZLQJ�WR�WKH�VRIWZDUH�RULHQWHG�FOLHQW�VHUYHU�DUFKLWHFWXUH�RI�WKH�5���6\VWHP��ORJLFDQG�GDWD�RI�WKH�WKUHH�LPSOHPHQWHG�OHYHOV³GDWDEDVH��DSSOLFDWLRQ��DQG�SUHVHQWDWLRQVHUYLFHV³FDQ�EH�GLVWULEXWHG�DPRQJ�GHGLFDWHG�VHUYHUV��7KH�LQGLYLGXDO�VHUYLFHV�FDQEH�IOH[LEOH��HLWKHU�DV�FOLHQWV�RU�VHUYHUV��GHSHQGLQJ�RQ�WKH�WDVNV�WR�EH�SHUIRUPHG�LQHDFK�FDVH�

&RPSRVLWHDFWLYLW\�JURXSV

$�FRPSRVLWH�DFWLYLW\�JURXS�LV�DQ�DFWLYLW\�JURXS�WKDW�FRQWDLQV�PXOWLSOH�DFWLYLW\JURXSV�

&XVWRPL]LQJ�&RQILJXUDWLRQ

,Q�6$3�WHUPLQRORJ\��FXVWRPL]LQJ�LV�WKH�LPSOHPHQWDWLRQ�RI�FRQILJXUDWLRQV�ZLWKLQWKH�IOH[LELOLW\�RI�WKH�5���6\VWHP��,W�LV�WKH�EDVLV�IRU�HYHU\�5���SURMHFW��ZKHWKHU�LW�LVDQ�LQWURGXFWLRQ��VXEVHTXHQW�SURMHFW�VWDJH��RU�SURFHVV�FKDQJH��7KH�FRQILJXUDWLRQLQFOXGHV�

< 5���3URFHGXUH�0RGHO��D�SURFHGXUDO�JXLGH�IRU�VWUXFWXULQJ�D�6$3LPSOHPHQWDWLRQ

< 5���5HIHUHQFH�0RGHO�LQ�WKH�%XVLQHVV�1DYLJDWRU��D�JUDSKLFDO�GHVFULSWLRQ�RIEXVLQHVV�SURFHVVHV

< ,PSOHPHQWDWLRQ�*XLGH��,0*���PHQX�OHG�SDUDPHWHU�VHWWLQJV< 3URMHFW�PDQDJHPHQW�WKURXJK�XSORDG�DQG�GRZQORDG�IDFLOLWLHV�DQG�WR�DQG�IURP

0LFURVRIW�3URMHFW< $�PRGHO�FRPSDQ\��,'(6���D�IXOO\�LQWHJUDWHG�DQG�SUHFRQILJXUHG�V\VWHP�XVHG�IRU

WUDLQLQJ�DQG�WHVWLQJ

7KH�FXVWRPL]LQJ�WRROV�DOVR�EHORQJ�WR�WKH�%XVLQHVV�(QJLQHHULQJ�:RUNEHQFK�DQG�DUHSURYLGHG�DW�QR�H[WUD�FKDUJH�ZLWK�WKH�5���6\VWHP��$GG�RQ�FXVWRPL]LQJ�LV�GLVFXVVHGLQ�WKH�$%$3�'HYHORSPHQW�:RUNEHQFK�VHFWLRQ�

'DWDEDVH�VHUYHU 7KLV�LV�WKH�FRPSXWHU�ZKHUH�D�GDWDEDVH�LV�LQVWDOOHG��6SHFLDOO\�RSWLPL]HG�KDUGZDUHPD\�EH�XVHG�IRU�UXQQLQJ�GDWDEDVHV�

Page 377: Amez 46 all

*ORVVDU\

Release 4.6A/B �G–5

7HUP 'HILQLWLRQ

'HVNWRS $�3&�WKDW�LV�XVHG�DV�D�ZRUNVWDWLRQ�LV�FRQVLGHUHG�WR�EH�GHVNWRS��,GHDOO\��WKH�GHVNWRSKDV�DFFHVV�WR�DOO�V\VWHPV�DQG�IXQFWLRQV�QHHGHG�IRU�D�XVHU�WR�PDQDJH�DXWKRUL]HGWDVNV�

'\QSUR 6KRUW�IRU�G\QDPLF�SURJUDP��D�G\QSUR�FRQVLVWV�RI�D�VFUHHQ�DQG�DVVRFLDWHG�SURFHVVLQJORJLF��VXFK�DV�YDOLGDWLRQ�SURFHGXUHV��(DFK�G\QSUR�FRQWUROV�H[DFWO\�RQH�GLDORJ�VWHS�

(DV\�$FFHVV�0HQX 7KH�(DV\�$FFHVV�PHQX�LV�6$3·V�QHZ�*8,�IRU�ZRUNLQJ�ZLWK�WKH�5���6\VWHP��7KH(DV\�$FFHV�PHQX�LV�EDVHG�RQ�WKH�XVHU�UROH�WHPSODWH�WKDW�KDV�EHHQ�DVVLJQHG�WR�DQXVHU��7KH�PHQX�FRQWDLQV�RQO\�WKRVH�WUDQVDFWLRQV�DQG�UHSRUWV�WKDW�WKH�XVHU�JRWDVVLJQHG�WKURXJK�WKH�DFWLYLW\�JURXS�DVVLJQHG�WR�KLP��7KHUHIRUH�WKH�XVHU�ZLOO�RQO\VHH�WKRVH�WUDQVDFWLRQV�KH�LV�DOORZHG�WR�SHUIRUP�

$�XVHU�FDQ�FKRRVH�EHWZHHQ�WZR�GLIIHUHQW�YLHZV�RI�5���< 7KH�FRPSOHWH�6$3�PHQX< 7KH�XVHU�VSHFLILF�PHQX

*HQHUDWH 7KLV�IXQFWLRQ�VDYHV�DQG�DFWLYDWHV�DQ�REMHFW��%HIRUH�DFWLYDWLQJ�WKH�REMHFW��WKH�V\VWHPDXWRPDWLFDOO\�SHUIRUPV�D�FRQVLVWHQF\�FKHFN�

*66�$3, 7KH�*66�$3,�LV�WKH�VWDQGDUGL]HG�6HFXULW\�$3,�ZLWK�D�VWDQGDUG�FRPPXQLFDWLRQPRGHO�WR�DEVWUDFW�IURP�WKH�LQGLYLGXDO�SURGXFWV�DQG�WKHLU�FKDUDFWHULVWLFV��7KH&RPPRQ�$XWKHQWLFDWLRQ�7HFKQRORJLHV��&$7��ZRUN�JURXS�RI�WKH�,QWHUQHW(QJLQHHULQJ�7DVN�)RUFH��,(7)��GHILQHV�WKH�VWDQGDUGL]DWLRQ�SURSRVDOV��7KHIXQFWLRQDO�VSHFLILFDWLRQ�RI�*66�$3,�9HUVLRQ����WKH�YHUVLRQ�VXSSRUWHG�E\�5����LVFXUUHQWO\�DQ�,QWHUQHW�GUDIW�

+XPDQ�UHVRXUFHVSODQQLQJ

3HUVRQQHO�SODQQLQJ�DQG�GHYHORSPHQW�GHDOV�ZLWK�DQWLFLSDWLQJ�IXWXUH�SHUVRQQHOQHHGV��3ODQQHUV�VKRXOG�FRQVLGHU�VKRUW���PHGLXP���DQG�ORQJ�WHUP�JRDOV�ZKHQFRQVLGHULQJ�FRPSDQ\�SROLF\�DQG�WKH�FRVWV�LQYROYHG��*RRG�KXPDQ�UHVRXUFHVSODQQLQJ�HQVXUHV�WKDW�WKH�FRPSDQ\�KDV�WKH�DSSURSULDWH�QXPEHU�RI�HPSOR\HHV�ZLWKWKH�UHTXLUHG�VNLOOV�LQ�WKH�FRUUHFW�SRVLWLRQ�

,0*�DFWLYLW\ $Q�,PSOHPHQWDWLRQ�JXLGH��,0*��DFWLYLW\�LV�DQ�H[SODQDWLRQ�RI�D�V\VWHP�VHWWLQJDFWLYLW\��$FWLYLWLHV�LQ�WKH�,0*�DUH�OLQNHG�GLUHFWO\�WR�WKH�FRUUHVSRQGLQJ�FXVWRPL]LQJWUDQVDFWLRQV��XVHG�WR�FUHDWH�WKH�DSSURSULDWH�V\VWHP�VHWWLQJ��<RX�FDQ�XVH�,0*DFWLYLWLHV�WR�UHFRUG�WKH�QRWHV�WKDW�GRFXPHQW�\RXU�V\VWHP�VHWWLQJV��<RX�FDQ�DOVR�EDVHWKH�UHFRUGLQJ�RU�VWDWXV�RI�SURMHFW�PDQDJHPHQW�LQIRUPDWLRQ�RQ�,0*�DFWLYLWLHV�

,PSOHPHQWDWLRQ 7KLV�SURFHVV�LQYROYHV�VZLWFKLQJ�IURP�DQ�H[LVWLQJ�PDQDJHPHQW�V\VWHP�DQG�EXVLQHVVSUDFWLFH�DQG�KDYLQJ�5���UXQ�SDUW�RI��RU�WKH�HQWLUH��EXVLQHVV�

Page 378: Amez 46 all

*ORVVDU\

Authorizations Made EasyG–6

7HUP 'HILQLWLRQ

,PSOHPHQWDWLRQ*XLGH

$OVR�UHIHUUHG�WR�DV�WKH�,0*��WKH�JXLGH�LV�D�WRRO�IRU�FRQILJXULQJ�WKH�5���6\VWHP�WRPHHW�FXVWRPHU�UHTXLUHPHQWV��)RU�HDFK�EXVLQHVV�DSSOLFDWLRQ��WKH�LPSOHPHQWDWLRQJXLGH�< ([SODLQV�DOO�WKH�VWHSV�LQ�WKH�LPSOHPHQWDWLRQ�SURFHVV< 7HOOV�\RX�WKH�6$3�VWDQGDUG��IDFWRU\��VHWWLQJV< 'HVFULEHV�V\VWHP�FRQILJXUDWLRQ�ZRUN��DFWLYLWLHV��DQG�LQWHUDFWLYHO\�RSHQV�WKH

DFWLYLWLHV

7KH�,0*�DUH�VWUXFWXUHG�DV�K\SHUWH[W��7KH�KLHUDUFKLFDO�VWUXFWXUH�UHIOHFWV�WKHVWUXFWXUH�RI�WKH�5���EXVLQHVV�DSSOLFDWLRQ�FRPSRQHQWV�DQG�OLVWV�DOO�WKHGRFXPHQWDWLRQ�UHODWHG�WR�LPSOHPHQWLQJ�5����7KH�,0*�FRQWDLQV�DFWLYH�IXQFWLRQVZLWK�ZKLFK�\RX�FDQ�< 2SHQ�FXVWRPL]LQJ�WUDQVDFWLRQV< :ULWH�SURMHFW�GRFXPHQWDWLRQ< 0DLQWDLQ�VWDWXV�LQIRUPDWLRQ< 6XSSRUW�\RXU�SURMHFW�GRFXPHQWDWLRQ�ZRUN�DQG�WKH�PDQDJHPHQW�RI�\RXU�5��

6\VWHP�LPSOHPHQWDWLRQ�

,PSOHPHQWDWLRQSURMHFW

7KLV�SURMHFW�UHODWHV�WR�WKH�LPSOHPHQWDWLRQ�RI�D�VSHFLILF�JURXS�RI�5���IXQFWLRQV�DQGSURFHVVHV�ZLWK�D�FRPPRQ�JR�OLYH�GDWH�

,PSOHPHQWDWLRQVWUDWHJ\

$Q�LPSOHPHQWDWLRQ�VWUDWHJ\�LV�DQ�DSSURDFK�WR�5���LPSOHPHQWDWLRQ��7KH�VWUDWHJ\�LVEDVHG�RQ�ORQJ�WHUP�SHUVSHFWLYHV�DQG�LQFOXGHV�DOO�VWHSV�DFURVV�WKH�ZKROH�HQWHUSULVHSODQQHG�LQ�FRQQHFWLRQ�ZLWK�LPSOHPHQWLQJ�WKH�5���6\VWHP��(VWDEOLVKLQJ�WKLVVWUDWHJ\�LV�DQ�HVVHQWLDO�SDUW�RI�SURMHFW�SUHSDUDWLRQ�DQG�LPSDFWV�WKH�VHTXHQFH�RILPSOHPHQWDWLRQ�SURMHFWV�

,QIRW\SH ,QIRW\SHV�DOORZ�\RX�WR�GHVFULEH��RU�GHILQH�WKH�GLIIHUHQW�DWWULEXWHV�WKDW�REMHFWV�KDYH�:LWKLQ�SHUVRQQHO�GHYHORSPHQW��3'��WKHUH�DUH�PDQ\�GLIIHUHQW�LQIRW\SHV��HDFK�RQHGHVFULELQJ�D�VSHFLILF�VHW�RI�DWWULEXWHV��6RPH�LQIRW\SHV�DSSO\�RQO\�WR�FHUWDLQ�W\SHV�RIREMHFWV��ZKLOH�RWKHUV�FDQ�EH�GHILQHG�IRU�DQ\�W\SH�RI�REMHFW�

,QVWDQFH�SURILOH 7KH�LQVWDQFH�SURILOH�FRQWDLQV�DSSOLFDWLRQ�VHUYHU�VSHFLILF�FRQILJXUDWLRQ�SDUDPHWHUV�ZKLFK�FRPSOHWH�WKH�VHW�YDOXHV�RI�WKH�GHIDXOW�SURILOH�

-RE $�MRE�LV�D�JHQHUDO�FODVVLILFDWLRQ�RI�ZRUN�GXWLHV��VXFK�DV�VHFUHWDU\�DQG�PDQDJHU�0DQ\�HPSOR\HHV�PD\�KDYH�WKH�VDPH�MRE�FODVVLILFDWLRQ��7KDW�LV��WKHUH�FDQ�EH���VHFUHWDULHV�DQG�HLJKW�PDQDJHUV��-REV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�SRVLWLRQV��VHHEHORZ��

0HQX 0HQXV�DUH�FRQWURO�HOHPHQWV��RIIHULQJ�WKH�XVHU�D�UDQJH�RI�RSWLRQV�ZKLFK��ZKHQFKRVHQ��SURPSWV�WKH�V\VWHP�WR�H[HFXWH�DQ�DFWLRQ��7KH�OD\RXW�RI�WKH�PHQX�EDU�KDVEHHQ�GHILQHG�IRU�HDFK�5���6\VWHP�OHYHO��0HQX�RSWLRQV�DUH�VHOHFWHG�HLWKHU�ZLWK�DVLQJOH�PRXVH�FOLFN�RU�E\�SRVLWLRQLQJ�WKH�FXUVRU�DQG�E\�SUHVVLQJ�(QWHU�

Page 379: Amez 46 all

*ORVVDU\

Release 4.6A/B �G–7

7HUP 'HILQLWLRQ

0HQX�EDU $�PHQX�EDU�LV�WKH�EDU�DFURVV�WKH�WRS�RI�WKH�ZLQGRZ�ORFDWHG�MXVW�DERYH�WKH�VWDQGDUGWRROEDUV��:KHQ�\RX�FKRRVH�D�PHQX�RSWLRQ�IURP�WKH�PHQX�EDU��\RX�RSHQ�DGURSGRZQ�PHQX�ZLWK�GLIIHUHQW�FKRLFHV��7KH�V\VWHP�DXWRPDWLFDOO\�LQFOXGHV�WKH6\VWHP�DQG�+HOS�PHQXV�

1DPH�UDQJH 7KH�QDPH�UDQJH�LV�D�NH\�DUHD�RI�D�WDEOH��,W�HIIHFWLYHO\�UHVHUYHV�SDUW�RI�WKH�NH\�DUHDRQO\�IRU�FXVWRPHUV�RU�IRU�6$3�

1HWZRUN�VHFXULW\ 1HWZRUN�VHFXULW\�LV�D�QHWZRUN�FRQQHFWLRQ�FRQILJXUHG�WR�SURWHFW�6$3�DQG�LWVFXVWRPHUV�IURP�SUREOHPV��VXFK�DV�XQDXWKRUL]HG�DFFHVV�LQKHUHQW�WR�:$1�QHWZRUNFRQQHFWLRQV�

2UJDQL]DWLRQDOOHYHO

2UJDQL]DWLRQDO�OHYHOV�DUH�KLHUDUFKLFDO�OHYHOV�ZKHUH�FHUWDLQ�GDWD�LQ�D�PDWHULDO�PDVWHUUHFRUG�LV�FUHDWHG��([DPSOHV�RI�RUJDQL]DWLRQDO�OHYHOV�DUH�FOLHQW��SODQW��DQG�VWRUDJHORFDWLRQ�

2QOLQH�6HUYLFH6\VWHP

6HH�6$31HW�²�5���)URQWHQG�QRWHV

3DVVZRUG $�SDVVZRUG�LV�D�XVHU�FRGH�WKDW�FRPSULVHV�WKH�IROORZLQJ�HOHPHQWV�WKDW�XVHUV�QHHG�WRORJRQ�WR�WKH�V\VWHP�< 6WULQJ�RI�ILJXUHV< /HWWHUV< 6SHFLDO�FKDUDFWHUV�WKDW�WKH�XVHU�PXVW�HQWHU< $�XVHU�,'

3ODQ�YHUVLRQ $�SODQ�YHUVLRQ�LV�D�GHVLJQDWHG�DUHD�ZKHUH�\RX�GHSRVLW��RU�VWRUH��VHWV�RI�LQIRUPDWLRQ�:KHQHYHU�\RX�HQWHU�DQ\�LQIRUPDWLRQ�LQ�3'��\RX�PXVW�VSHFLI\�WKH�SODQ�YHUVLRQZKHUH�WKH�LQIRUPDWLRQ�VKRXOG�EH�NHSW��$�VLQJOH�SODQ�YHUVLRQ�FRXOG�LQFOXGHLQIRUPDWLRQ�IURP�DQ\�RI�WKH�3'�PRGXOHV��VXFK�DV�2UJDQL]DWLRQ�DQG�3ODQQLQJ�6HPLQDU�DQG�&RQYHQWLRQ��RU�6KLIW�3ODQQLQJ��<RX�FDQ�PDLQWDLQ�PRUH�WKDQ�RQH�SODQYHUVLRQ���7KLV�DOORZV�\RX�WR�XVH�GLIIHUHQW�SODQ�YHUVLRQV�WR�UHSUHVHQW�GLIIHUHQWVFHQDULRV�IRU�\RXU�ILUP��+RZHYHU��\RX�PXVW�GHVLJQDWH�RQH�SODQ�YHUVLRQ�DV�WKHDFWLYH�SODQ�LI�\RX�DUH�D�6$3�%XVLQHVV�:RUNIORZ�XVHU�DQG�LI�LQWHJUDWLRQ�LV�DFWLYHEHWZHHQ�3'�DQG�RWKHU�5���EXVLQHVV�DSSOLFDWLRQV�

3RVLWLRQ 3RVLWLRQV�DUH�WKH�LQGLYLGXDO�HPSOR\HH�SODFHPHQWV�RU�DVVLJQPHQWV�LQ�D�FRPSDQ\��IRUH[DPSOH��VHFUHWDU\�RI�PDUNHWLQJ�RU�D�VDOHV�PDQDJHU���%\�FUHDWLQJ�SRVLWLRQV�DQGFUHDWLQJ�UHODWLRQVKLSV�EHWZHHQ�WKH�SRVLWLRQV��\RX�LGHQWLI\�WKH�DXWKRULW\�VWUXFWXUH�RUFKDLQ�RI�FRPPDQG�DW�\RXU�ILUP��3RVLWLRQV�VKRXOG�QRW�EH�FRQIXVHG�ZLWK�MREV��VHHDERYH��

3UHVHQWDWLRQVHUYHU

$�FRPSXWHU��XVXDOO\�D�3&�RU�0DFLQWRVK��XVHG�IRU�SUHVHQWDWLRQ�LQ�WKH�5���6\VWHP�LVFDOOHG�D�SUHVHQWDWLRQ�VHUYHU�

Page 380: Amez 46 all

*ORVVDU\

Authorizations Made EasyG–8

7HUP 'HILQLWLRQ

3URFHVV�IORZ�YLHZ 7KH�SURFHVV�IORZ�YLHZ�LV�RQH�RI�WKH�WZR�QDYLJDWLRQ�SDWKV�LQ�WKH�%XVLQHVV�1DYLJDWRU�WKH�RWKHU�EHLQJ�WKH�FRPSRQHQW�YLHZ��7KH�SURFHVV�IORZ�YLHZ�RI�WKH�5���5HIHUHQFH0RGHO�SURYLGHV�SURFHVV�RULHQWHG�DFFHVV�WR�WKH�VFHQDULRV�DQG�SURFHVVHV�LQ�WKH0RGHO��,W�LV�DUUDQJHG�DV�D�VWUXFWXUH�ZLWK�WKH�IROORZLQJ�OHYHOV�< (QWHUSULVH�DUHDV< 6FHQDULR�SURFHVVHV< 3URFHVVHV

3URFHVV�VHOHFWLRQPDWUL[

7KH�SURFHVV�VHOHFWLRQ�PDWUL[�LV�D�PRGHO�W\SH�LQ�WKH�5���5HIHUHQFH�0RGHO��7KHPDWUL[�GHVFULEHV�WKH�DVVLJQPHQW�RI�SURFHVVHV�WR�VFHQDULRV��ZKLFK�DUH�WKH�FROXPQV�LQD�SURFHVV�VHOHFWLRQ�PDWUL[��3URFHVVHV�EHORQJLQJ�WR�D�VFHQDULR�DUH�OLVWHG�DQG�DVVLJQHGXQGHU�WKDW�VFHQDULR��FROXPQ�KHDG���6FHQDULR�DQG�SURFHVV�LFRQV�SURYLGH�DFFHVV�WRFRUUHVSRQGLQJ�(3&V�

3URILOH $�SURILOH�LV�D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�SDUWLFXODU�XVHU�JURXSV��HQWHUHG�LQ�WKHXVHU�PDVWHU�UHFRUG��7KH�VDPH�SURILOH�FDQ�EH�DVVLJQHG�WR�DQ\�QXPEHU�RI�XVHUV�

7KHUH�DUH�WZR�W\SHV�RI�DXWKRUL]DWLRQ�SURILOHV�< 6LPSOH��D�FROOHFWLRQ�RI�DXWKRUL]DWLRQV�IRU�D�SDUWLFXODU�WDVN< &RPSRVLWH��D�FROOHFWLRQ�RI�VHYHUDO�VLPSOH�SURILOHV

3URILOHFRPSDULVRQ

:KHQ�DQ�DFWLYLW\�JURXS�LV�PRGLILHG�XVLQJ�WUDQVDFWLRQ�3)&*��LWV�DVVRFLDWHGDXWKRUL]DWLRQ�SURILOH�LV�QRW�DXWRPDWLFDOO\�XSGDWHG��7KH�XVHU�PXVW�FDUU\�RXW�DSURILOH�FRPSDULVRQ�WR�HQVXUH�WKDW�WKH�DXWKRUL]DWLRQV�FRQWDLQHG�LQ�WKH�DXWKRUL]DWLRQSURILOH�FRUUHVSRQG�ZLWK�WKH�QHZ�FRQWHQWV�RI�WKH�DFWLYLW\�JURXS�

3URILOH�*HQHUDWRU 7KH�3URILOH�*HQHUDWRU��3*��VXSSRUWV�WKH�DXWKRUL]DWLRQ�DGPLQLVWUDWRU�VHWWLQJ�XS�WKHDXWKRUL]DWLRQ�FRQFHSW�DW�WKH�FXVWRPHU�VLWH��$FFRUGLQJ�WR�D�VHW�RI�DSSOLFDWLRQFRPSRQHQWV�FKRVHQ�E\�WKH�DGPLQLVWUDWRU��WKH�3*�DXWRPDWLFDOO\�FUHDWHV�DQDXWKRUL]DWLRQ�SURILOH��7KH�DGPLQLVWUDWRU�FDQ�WKHQ�HDVLO\�FXVWRPL]H�DQG�PRGLI\�WKHDXWKRUL]DWLRQV�LQ�WKH�SURILOH�E\�XVLQJ�VSHFLDO�PDLQWHQDQFH�WUDQVDFWLRQV�RIIHUHG�E\WKH�3*�

3URJUDP�DWWULEXWH $�SURSHUW\�RI�D�SURJUDP�LV�FDOOHG�D�SURJUDP�DWWULEXWH��7KH�DWWULEXWHV�RI�DQ�$%$3SURJUDP�GHILQH�LWV�EDVLF�FKDUDFWHULVWLFV��VR�WKDW�WKH�V\VWHP�FDQ�SURFHVV�LW�FRUUHFWO\�7KH�SURJUDP�DWWULEXWHV�LQFOXGH�WKH�IROORZLQJ�HOHPHQWV�< 3URJUDP�WLWOH< 3URJUDP�W\SH< 3URJUDP�VWDWXV< $XWKRUL]DWLRQ�JURXS< 'HYHORSPHQW�FODVV

Page 381: Amez 46 all

*ORVVDU\

Release 4.6A/B �G–9

7HUP 'HILQLWLRQ

3XVK�EXWWRQ 3XVK�EXWWRQV��RU�EXWWRQV��DUH�JUDSKLFDO�FRQWURO�HOHPHQWV�WKDW�\RX�FOLFN�RQFH�WRH[HFXWH�WKH�IXQFWLRQV�OLQNHG�WR�WKHP��,Q�WKH�5���6\VWHP��\RX�FDQ�DOVR�VWDUWIXQFWLRQV�ZLWK�WKH�NH\ERDUG��7R�GR�WKLV��SODFH�WKH�FXUVRU�RQ�WKH�EXWWRQ�DQG�SUHVVHLWKHU�WKH�(QWHU�NH\�RU�(QWHU�EXWWRQ��3XVK�EXWWRQV�PD\�FRQWDLQ�WH[W�RU�JUDSKLFV\PEROV�

5DGLR�EXWWRQ 7KH�UDGLR�EXWWRQ�LV�DQRWKHU�JUDSKLFDO�FRQWURO�HOHPHQW�WKDW�DOORZV�WKH�XVHU�WR�VHOHFWDQ�LWHP�IURP�D�OLVW�RI�ILHOGV��,I�WKH�XVHU�LV�DOORZHG�WR�VHOHFW�VHYHUDO�ILHOGV�DW�RQFH�FKHFNER[HV�DUH�XVHG�

5HOHDVH�&KDQJHVDQG�8SJUDGHV

<RX�FDQ�JHQHUDWH�VSHFLILF�,0*�IRU�UHOHDVH�XSJUDGHV�RU�FKDQJHRYHUV��7KHVH�JXLGHVFRQWDLQ�D�VSHFLILF�OLVW�RI�,0*�DFWLYLWLHV��LQFOXGLQJ�DOO�FKDQJHG�RU�QHZ�IXQFWLRQV�LQWKH�QHZ�5���UHOHDVH��7KLV�IDFLOLWDWHV�WKH�LPSOHPHQWDWLRQ�RI�UHOHDVH�SURMHFWV��$OOUHOHDVH�QRWHV�FDQ�DOVR�EH�LPPHGLDWHO\�DFFHVVHG�IURP�WKLV�ORFDWLRQ�

5HSRUW $�UHSRUW�VHOHFWV�GDWD�IURP�D�GDWDEDVH�DQG�GLVSOD\V�LW�LQ�D�VWUXFWXUHG�IRUP�IRUDQDO\VLV��<RX�PD\�SULQW�WKH�UHSRUW�UHVXOWV�RU�GLVSOD\�WKHP�RQOLQH��7KH�V\VWHP�DOVRSURYLGHV�WKH�RSWLRQ�RI�VDYLQJ�WKH�VHOHFWHG�UHSRUW�GDWD��WR�UHYLHZ�ZLWKRXW�KDYLQJ�WRUH�FUHDWH�LW�

5HVSRQVLELOLW\ 5HVSRQVLELOLWLHV�GLIIHUHQWLDWH�DXWKRULW\�SURILOHV�JHQHUDWHG�IURP�DFWLYLW\�JURXSV�5HVSRQVLELOLWLHV�DUH�OLQNHG�WR�DXWKRULW\�SURILOHV�DQG�WR�DFWLYLW\�JURXSV��$Q�DFWLYLW\JURXS�LV�DQ�REMHFW�ZKHUH�\RX�FROOHFW�D�QXPEHU�RI�V\VWHP�DFWLYLWLHV��$Q�DXWKRULW\SURILOH�LV�JHQHUDWHG�XVLQJ�3*��ZKLFK�GHVLJQDWHV�WKH�XVHU·V�DXWKRULWLHV�LQ�WKH�V\VWHP�5HVSRQVLELOLWLHV�GRQ·W�H[LVW�LQ�����DQ\�PRUH�

6$3�%XVLQHVV:RUNIORZ

6$3�%XVLQHVV�:RUNIORZ������FRPSULVHV�WHFKQRORJLHV�DQG�WRROV�WR�DXWRPDWLFDOO\FRQWURO�DQG�H[HFXWH�FURVV�DSSOLFDWLRQ�SURFHVVHV��ZKLFK�SULPDULO\�LQYROYHVFRRUGLQDWLQJ�WKH�< 3HUVRQV�LQYROYHG< :RUN�VWHSV�UHTXLUHG< 'DWD��EXVLQHVV�REMHFWV��WKDW�QHHG�WR�EH�SURFHVVHG

2XU�SULPDU\�JRDOV�ZLWK�WKH�ZRUNIORZ�DUH�WR�UHGXFH�WKURXJKSXW�WLPHV��WR�UHGXFH�WKHFRVWV�LQYROYHG�LQ�PDQDJLQJ�EXVLQHVV�SURFHVVHV��DQG�WR�LQFUHDVH�WUDQVSDUHQF\�DQGTXDOLW\�

6$31HW���5��)URQWHQG�QRWHV

7KH�6$31HW�²�5���)URQWHQG��IRUPHUO\�NQRZQ�DV�2QOLQH�6HUYLFH�6\VWHP��SURYLGHV�DGLUHFW�FRPPXQLFDWLRQ�OLQN�WR�6$3��DOORZLQJ�FXVWRPHUV�WR�TXLFNO\�DQG�HIILFLHQWO\REWDLQ�SUREOHP�VROYLQJ�LQIRUPDWLRQ�IRU�WKH�5���6\VWHP�

6$3�VWDQGDUGPHQX

)URP�WKH�6$3�VWDQGDUG�PHQX��\RX�FDQ�DFFHVV�WKH�IXOO�UDQJH�RI�6$3�IXQFWLRQV�

Page 382: Amez 46 all

*ORVVDU\

Authorizations Made EasyG–10

7HUP 'HILQLWLRQ

6$3�*8, 6$3�*8,�LV�WKH�JUDSKLFDO�XVHU�LQWHUIDFH�RI�WKH�5���6\VWHP�

6$3�URXWHU 6$3�URXWHU�LV�D�VRIWZDUH�PRGXOH�WKDW�DFWV�DV�SDUW�RI�D�ILUHZDOO�V\VWHP��6$3�URXWHUVLPSOLILHV�WKH�FRQILJXUDWLRQ�RI�QHWZRUN�VHFXULW\�DQG�WKH�URXWLQJ�RI�WUDIILF�WR�DQGIURP�5����7KH�6$3�URXWHU�HVWDEOLVKHV�DQ�LQGLUHFW�FRQQHFWLRQ�EHWZHHQ�WKH�5��QHWZRUN�DQG�DQ�RXWHU�QHWZRUN��7KHUH�LV�UHVWULFWHG�DFFHVV�WR�WKH�DSSOLFDWLRQ�OD\HUEHWZHHQ�FOLHQW�VRIWZDUH�DQG�WKH�5���DSSOLFDWLRQ�VHUYHU�

6FUHHQ $�VFUHHQ�LV��HVVHQWLDOO\��WKH�SULPDU\�ZLQGRZ�RI�D�VHVVLRQ�

6HFXUH�1HWZRUN&RPPXQLFDWLRQV�61&�

:LWKLQ�WKH�IUDPHZRUN�RI�WKH�6HFXUH�1HWZRUN�&RPPXQLFDWLRQV�SURMHFW��6$3�LVLPSOHPHQWLQJ�WKH�*66�$3,�LQ�5����HQDEOLQJ�5���WR�EH�LQWHJUDWHG�LQWR�FRPSDQ\�ZLGH�QHWZRUN�VHFXULW\�V\VWHPV��VXFK�DV�.HUEHURV�RU�6HFX'(��$V�WKH�*66�$3,�LV�WKHVWDQGDUG�LQWHUIDFH�LQ�WKH�VHFXULW\�DUHD��6$3�RSHUDWHV�ZLWK�DOO�*66�$3,�FRPSOLDQWVHFXULW\�V\VWHPV�

6HOHFW 7KLV�IXQFWLRQ�DOORZV�\RX�WR�VHOHFW�DQ�REMHFW�IRU�IXUWKHU�SURFHVVLQJ�E\�SODFLQJ�WKHFXUVRU�RQ�WKH�REMHFW�DQG�FOLFNLQJ�RQ�WKH�REMHFW�

6HVVLRQ $�VHVVLRQ�LV�D�ZLQGRZ�ZKHUH�WKH�XVHU�SURFHVVHV�D�FHUWDLQ�WDVN��:KHQ�\RX�ORJ�RQ�WRWKH�5���6\VWHP��LW�DXWRPDWLFDOO\�RSHQV�WKH�ILUVW�VHVVLRQ��EXW�\RX�FDQ�VLPXOWDQHRXVO\RSHQ�XS�WR�QLQH�VHVVLRQV��7KH�QXPEHU�RI�WKH�FXUUHQW�VHVVLRQ�DSSHDUV�LQ�WKH�VWDWXVEDU�

6HVVLRQ�0DQDJHU 7KH�6HVVLRQ�0DQDJHU�GRHV�QRW�H[LVW�LQ�5HOHDVH�����DQ\PRUH��,W�KDV�EHHQ�VXEVWLWXWHGZLWK�WKH�(DV\�$FFHVV�0HQX�

66&5 6$3�6RIWZDUH�&KDQJH�5HJLVWUDWLRQ��66&5��LV�D�SURFHGXUH�WKDW�UHJLVWHUV�DOOPRGLILFDWLRQV�WR�5���5HSRVLWRU\�REMHFWV�DQG�SURYLGHV�DQ�RYHUYLHZ�RI�PRGLILHG�5��5HSRVLWRU\�REMHFWV��6$3�PDWFKFRGHV�DQG�WXQLQJ�PHDVXUHV��IRU�H[DPSOH��FUHDWLQJGDWDEDVH�LQGLFHV�DQG�EXIIHUV��DUH�QRW�UHJLVWHUHG�E\�66&5�

6\VWHP�SDUDPHWHU $�V\VWHP�SDUDPHWHU�LV�WKH�EDVLF�V\VWHP�FRQILJXUDWLRQ�UHTXLUHG�WR�HQVXUH�VPRRWKIXQFWLRQLQJ�RI�WKH�VRIWZDUH�

7DEOH 'DWD�FDQ�EH�DUUDQJHG�LQ�WDEOH�IRUP��$�WDEOH�FRQVLVWV�RI�FROXPQV��GDWD�YDOXHV�RI�WKHVDPH�W\SH��DQG�URZV��GDWD�UHFRUGV���)LHOGV�LGHQWLI\�D�UHFRUG�

7UDQVDFWLRQ $�WUDQVDFWLRQ�LV�D�VHULHV�RI�UHODWHG�VWHSV�UHTXLUHG�WR�SHUIRUP�D�FHUWDLQ�WDVN�

7UDQVDFWLRQ�FRGH $�VHTXHQFH�RI�IRXU�FKDUDFWHUV�UHSUHVHQWV�D�6$3�WUDQVDFWLRQ��7R�FDOO�D�WUDQVDFWLRQ�LQWKH�5���6\VWHP��\RX�FDQ�IROORZ�DQ�,0*�SDWK�RU�HQWHU�WKH�WUDQVDFWLRQ�FRGH�LQ�WKHFRPPDQG�ILHOG��)RU�H[DPSOH��60���LV�WKH�FRGH�IRU�WKH�WDEOH�PDLQWHQDQFHWUDQVDFWLRQ�

8VHU�PDLQWHQDQFH 8VHU�PDLQWHQDQFH�WUDQVDFWLRQV�DOORZ�WKH�V\VWHP�DGPLQLVWUDWRU�WR�FUHDWH�DQGPDLQWDLQ�XVHU�PDVWHU�UHFRUGV��7KLV�SURFHVV�LQFOXGHV�JHQHUDWLQJ�DQG�DVVLJQLQJDXWKRUL]DWLRQV�DQG�WKHLU�SURILOHV�

Page 383: Amez 46 all

*ORVVDU\

Release 4.6A/B ��G–11

7HUP 'HILQLWLRQ

8VHU�PDVWHUUHFRUG

7KLV�UHFRUG�FRQWDLQV�LPSRUWDQW�PDVWHU�GDWD�IRU�DQ�5���6\VWHP�XVHU��2QO\�XVHUVZLWK�D�XVHU�PDVWHU�UHFRUG�FDQ�ORJRQ�WR�WKH�V\VWHP��$�XVHU·V�DXWKRUL]DWLRQV�DUHGHILQHG�LQ�WKH�XVHU�PDVWHU�UHFRUG�

8VHU�UROH�WHPSODWH $�XVHU�UROH�WHPSODWH�LV�DQ�DFWLYLW\�JURXS�ZKLFK�VHUYHV�DV�WKH�EDVLV�IRU�WKH�XVHUPHQX�ZKHQ�DQ�HQG�XVHU�ORJV�RQ�WR�5���

9DOLGLW\�SHULRG 9DOLGLW\�SHULRGV�GHILQH�WKH�OLIH�VSDQ�RI�DQ�REMHFW�RU�LQIRW\SH�UHFRUG��:KHQ�FUHDWLQJREMHFWV�DQG�LQIRW\SH�UHFRUGV��VSHFLI\�D�YDOLGLW\�SHULRG�E\�SURYLGLQJ�D�VWDUW�DQG�DQHQG�GDWH�

:RUN�SURFHVV 7KH�DSSOLFDWLRQ�VHUYLFHV�RI�WKH�5���6\VWHP�SHUIRUP�VSHFLDO�ZRUN�SURFHVVHV��VXFK�DVIRU�GLDORJ�SURFHVVLQJ��XSGDWLQJ�RI�WKH�GDWDEDVH�DV�GLFWDWHG�E\�FKDQJH�GRFXPHQWV�EDFNJURXQG�SURFHVVLQJ��VSRROLQJ��DQG�ORFN�PDQDJHPHQW��:RUN�SURFHVVHV�FDQ�EHDVVLJQHG�WR�GHGLFDWHG�DSSOLFDWLRQ�VHUYHUV�

:RUNEHQFK2UJDQL]HU�7UDQVSRUW�V\VWHP

7KH�:RUNEHQFK�2UJDQL]HU�LV�D�FHQWUDO�PDQDJHPHQW�WRRO�IRU�ODUJH�VFDOH�SURMHFWPDQDJHPHQW�WKDW�VXSSRUWV�LQGLYLGXDO�GHYHORSHUV�DQG�ODUJH�SURMHFW�WHDPV�

7KH�2UJDQL]HU�DOVR�GRHV�WKH�IROORZLQJ�

�� 2UJDQL]HV�UHODWHG�SURMHFW�FRPSRQHQWV�LQWR�RUGHUV

�� /RFNV�WKH�FRPSRQHQWV�GXULQJ�GHYHORSPHQW

�� 6WRUHV�D�YHUVLRQ�RI�HDFK�SURMHFW�EHWZHHQ�WUDQVSRUWV

7KH�WUDQVSRUW�V\VWHP�VXSSRUWV�WKH�WUDQVIHU�RI�GHYHORSPHQW�REMHFWV�EHWZHHQGLVWULEXWHG�V\VWHPV�E\�FUHDWLQJ�DQ�H[WHQVLYH�ORJ�UHFRUGLQJ�RI�ZKHQ�DQG�ZK\�HDFKWUDQVSRUW�ZDV�H[HFXWHG�DQG�ZKR�H[HFXWHG�LW�

:RUNIORZ�WDVN $�ZRUNIORZ�WDVN�LV�D�PXOWLVWHS�WDVN�GHILQHG�E\�WKH�FXVWRPHU��ZKLFK�UHIHUHQFHV�DZRUNIORZ�GHILQLWLRQ��:RUNIORZ�WDVNV��RUJDQL]DWLRQDO�PDQDJHPHQW�REMHFW�W\SH�:)�DUH�FOLHQW�GHSHQGHQW��KDYH�D�YDOLGLW\�SHULRG��DQG�DUH�SODQ�YHUVLRQ�VSHFLILF�

:RUNSODFH 7KH�PDLQ�ULJKW�WLOH�RQ�WKH�VFUHHQ�ZKHUH�PRVW�ZRUN�LV�SHUIRUPHG��ILHOG�HQWULHV�VHOHFWLRQV��HWF����2Q�VRPH�ZLQGRZV��WKH�ZRUNSODFH�FRYHUV�WKH�HQWLUH�VFUHHQ�

:RUNSODFH�PHQX 7KH�OHIW�WLOH�RQ�WKH�6$3�(DV\�$FFHVV�VFUHHQ�ZKHUH�HDFK�QRGH�UHSUHVHQWV�GLIIHUHQWOHYHOV�LQ�WKH�5���6\VWHP��7KH�8VHU�PHQX�DQG�6$3�VWDQGDUG�PHQX�EXWWRQV�SURYLGHGLIIHUHQW�YLHZV�RI�WKH�ZRUNSODFH�PHQX�

:RUNORDGPRQLWRU

7KH�ZRUNORDG�PRQLWRU�GLVSOD\V�WKH�GLVWULEXWLRQ�RI�WKH�ZRUNORDG�DFURVV�VHUYHUV�DQGWUDQVDFWLRQV�

Page 384: Amez 46 all

*ORVVDU\

Authorizations Made EasyG–12

Page 385: Amez 46 all

I–1

,QGH[

A$%$3

GLFWLRQDU\���²�REMHFWV��QR�FKHFN��&²�

$FFHOHUDWHG6$3��$6$3�EXVLQHVV�EOXHSULQW���²�JR�OLYH�DQG�VXSSRUW���²�NQRZOHGJH�FRUQHU���²�RYHUYLHZ���²�SURMHFW�SUHSDUDWLRQ���²�4$GE��TXHVWLRQV�DQG�DQVZHUV�GDWDEDVH����²�UHDOL]DWLRQ���²�URDGPDS���²�����²�

$FFHVV�SUREOHPV���²��$FWLYLW\�JURXS�PDLQWHQDQFH��6HH�DOVR�3URILOH�*HQHUDWRU

EDVLF�PDLQWHQDQFH���²����²����²��FRPSRVLWH�DFWLYLW\�JURXSV���²�FUHDWLQJ�DQG�FKDQJLQJ�KLHUDUFK\���²�LQWHUQHW�DQG�GRFXPHQW�OLQNV���²��RUJDQL]DWLRQ�PDQDJHPHQW���²����²��UHVSRQVLELOLWLHV����²��VHOHFWLQJ�YLHZV���²�WUDQVIHUULQJ�XVHUV�IURP�,0*�SURMHFW���²��ZRUNIORZ���²��

$FWLYLW\�JURXSVDVVLJQLQJ�,0*�SURMHFWV�RU�YLHZV���²��DVVLJQLQJ�REMHFWV���²����²�DVVLJQLQJ�3'�REMHFWV���²����²����²��DVVLJQLQJ�WUDQVDFWLRQV���²��DVVLJQLQJ�XVHUV���²�����²����²����²�&203$1<B$//���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRVLWH��6HH�&RPSRVLWH�DFWLYLW\�JURXSVFRQYHUWHG�IURP�68���SURILOHV����²�FRS\LQJ���²�����²����%²�FUHDWLQJ���²��FXVWRPL]LQJ�DFWLYLW\�JURXS���²�����²��GHOHWLQJ���²��GHULYHG��6HH�'HULYHG�DFWLYLW\�JURXSVGLVSOD\LQJ�WUDQVDFWLRQ�FRGHV��%²�GLVSOD\LQJ�XVHUV��%²�GRFXPHQWDWLRQ�RQOLQH�IRU�REMHFWV���²��JHQHUDO�DXWKRUL]DWLRQV���²�LQVHUWLQJ�UHSRUWV���²��LQVHUWLQJ�WUDQVDFWLRQV���²�RYHUYLHZ���²�����²��SUHGHILQHG���²��SURILOHV���²�����²����%²�

UHJHQHUDWLQJ�DXWKRUL]DWLRQ�GDWD���²��WUDQVDFWLRQ�FRGHV��PXOWLSOH��%²�WUDQVSRUWLQJ���²����²����²����²����²�XVHU�UROH�WHPSODWHV���²����²�ZRUNIORZ�WDVNV���²��

$GPLQLVWUDWRUDXWKRUL]DWLRQ�DGPLQLVWUDWRU���²�DXWKRUL]DWLRQ�GDWD�DGPLQLVWUDWRU���²��DXWKRUL]DWLRQ�SURILOH�DGPLQLVWUDWRU���²��FKDQJH�PDQDJHPHQW���²��*OREDO�8VHU�0DQDJHU����²��PXOWLSOH�DGPLQLVWUDWRUV��%²�SROLFLHV�DQG�SURFHGXUHV���²��VHWWLQJ�XS�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV���²��WKUHH�DXWKRUL]DWLRQ�DGPLQLVWUDWRUV�ZRUNLQJ�WRJHWKHU���²��WLSV�IRU���²��XVHU�DGPLQLVWUDWRU���²��

$GYDQFH�FRUUHFWLRQVDSSO\LQJ�WR�5�����²�

$,6��$XGLW�LQIRUPDWLRQ�V\VWHP�����²��$PHULFDQ�6$3�8VHUV�*URXS��$68*����²��$SSOLFDWLRQ�/LQN�(QDEOLQJ��$/(�

DVVLJQLQJ�ORJLFDO�V\VWHPV�WR�FOLHQWV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ�HQYLURQPHQW����²�GHILQLQJ�WDUJHW�V\VWHP�IRU�5)&����²��GLVWULEXWLRQ�PRGHO����²��ORJLFDO�V\VWHP�QDPLQJ����²�PRGHO�YLHZ��GLVWULEXWLQJ����²��RYHUYLHZ����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�VHWWLQJ�XS�XVHU����²�

$6$3��6HH�$FFHOHUDWHG6$3$XGLWV

DXGLW�LQIRUPDWLRQ�V\VWHP��$,6���WUDQVDFWLRQ�6(&5����²��EXVLQHVV�DXGLWV����²��FRPSOHWH����²��GHOHWH�ROG�DXGLW�ORJV����²�ILOWHU�JURXSV����²�ORJJLQJ�RI�VSHFLILF�DFWLYLWLHV����²��RYHUYLHZ����²�SURILOH�UHYLHZ�IRU�DFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��UHTXLUHPHQWV���²��UHYLHZLQJ�YDOLG�XVHUV����²��UXQQLQJ�ORJV����²�UXQQLQJ�RQ�GLIIHUHQW�XVHU����²��VHFXULW\�DXGLW�ORJ��60�������²�VHWWLQJ�ORJ�SDUDPHWHUV����²�VWDWLVWLF�UHFRUGV�LQ�&&06��67$7�����²��

Page 386: Amez 46 all

,QGH[

Authorizations Made Easy�I–2

V\VWHP�DXGLW����²��V\VWHP�ORJV��60�������²��WDVNV����²��XVHU�VHFXULW\�DXGLW�MREV����²��XVHU�GHILQHG����²��

$XWKRUL]DWLRQDGGLQJ�PLVVLQJ��SRVWPDLQWDLQLQJ���²����²�DGPLQLVWUDWRU���²����²�����²�����²��DXWKRUL]DWLRQ�FRQFHSW���²����²�����²��FKDQJLQJ�XVLQJ�XWLOLWLHV���²��FKHFNV��6HH�$XWKRUL]DWLRQ�FKHFNVFRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²�FXVWRPL]LQJ���²��HUURU�DQDO\VLV��68������²�ILHOGV���²����²�JHQHUDO��DVVLJQLQJ���²�JHQHUDWLQJ�SURILOHV���²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²����²�OLIHF\FOH���²�OLVW��6HH�$XWKRUL]DWLRQ�/LVWORJJLQJ�FKDQJHV����²��QDPLQJ�FRQYHQWLRQV���²�����²�����²��REMHFWV��6HH�$XWKRUL]DWLRQ�REMHFWVSURILOHV��6HH�3URILOHVUHVSRQVLELOLWLHV����²��VWUXFWXUDO���²��WHFKQLFDO�QDPHV��UHRUJDQL]LQJ���²��WHPSODWHV��WUDQVSRUWLQJ���²�WLPH�GHSHQGHQF\���²����²�����²����%²�WUDFLQJ�HUURUV��&²�WUDQVSRUWLQJ���²�XVHU�DGPLQLVWUDWLRQ���²�

$XWKRUL]DWLRQ�FKHFNVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ���²�����²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVGHILQLWLRQ���²�HQDEOLQJ�RU�GLVDEOLQJ�V\VWHP�ZLGH�FKHFNV����²��LQFOXGLQJ�LQ�WUDQVDFWLRQV��%²���%²�UHGXFLQJ�VFRSH����²������²��5)&��&²�VWDUWLQJ�WUDQVDFWLRQV��%²�V\VWHP�WUDFH��67������²�

$XWKRUL]DWLRQ�ILHOGVGHILQLWLRQ���²�PDLQWDLQLQJ�RSHQ�ILHOGV���²��

$XWKRUL]DWLRQ�/LVWGHILQLQJ�XVHU�UROHV���²�JHQHUDWHG�IURP�4$GE���²����²�RYHUYLHZ���²�ZRUNLQJ�ZLWK���²�

$XWKRUL]DWLRQ�REMHFWVDFWLYDWLQJ�DQG�GHDFWLYDWLQJ����²������²������²��EDVLV����²������²������²��FKHFN�LQGLFDWRUV��6HH�&KHFN�LQGLFDWRUVFKHFNLQJ����²��

FODVVHV���²�GHILQLWLRQ���²�ILHOGV���²�KXPDQ�UHVRXUFHV����²������²������²��LQVHUWLQJ�E\�VHOHFWLRQ�FULWHULD���²�LQVHUWLQJ�PDQXDOO\���²�RYHUYLHZ���²�6B7&2'(���²������²�����²����%²���&²�6B86(5B2%-����²��6B86(5B352���²��WDEOH�7$&7=��%²�XQXVHG����²��

B%DFNJURXQG

GLVWULEXWLRQ��*OREDO�8VHU�0DQDJHU����²��XVHU�W\SHV���²�

%DVLF�PDLQWHQDQFH���²����²����²��%DVLV�&RPSRQHQWV��%&�

DXWKRUL]DWLRQ�REMHFWV����²������²������²��XVHUV���²�

%DWFK�GDWD�FRPPXQLFDWLRQ��%'&����²�%DWFK�LQSXW��6HH�%DWFK�GDWD�FRPPXQLFDWLRQ%XVLQHVV�$SSOLFDWLRQ�3URJUDPPLQJ�,QWHUIDFH��%$3,V�����²��

C&&06�SHUIRUPDQFH�DQDO\VLV�WRROV����²��&HQWUDO�V\VWHP

PLJUDWLRQ�RI�H[LVWLQJ�XVHUV����²�WH[W�FRPSDULVRQ����²�

&HQWUDO�XVHU�DGPLQLVWUDWLRQ$/(�HQYLURQPHQW����²�GLVWULEXWLRQ�PRGHO�DVVLJQPHQW����²�*OREDO�8VHU�0DQDJHU����²��PLJUDWLRQ�RI�XVHUV�WR�FHQWUDO�V\VWHP����²�QRQFHQWUDO�XVHU�DGPLQLVWUDWLRQ���²�RYHUYLHZ��[[LY����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��VHWWLQJ�XS����²�WHVWLQJ����²�

&HQWUDO�XVHU�PDLQWHQDQFHXVHU�DVVLJQPHQWV���²�

&KDQJH�PDQDJHPHQW�DGPLQLVWUDWRU���²��&KHFN�IODJV��6HH�&KHFN�LQGLFDWRUV&KHFN�LQGLFDWRUV

DXWKRUL]DWLRQ�REMHFWV����²������²��&KHFN��&�����²������²��&KHFN�0DLQWDLQ��&0�����²������²������²��GHIDXOWV���²�PDVV�FKDQJHV����²��1R�FKHFN��1�����²������²��UHSODFLQJ�VHWWLQJV���²�WUDQVDFWLRQ�FRGHV����²��WUDQVSRUWLQJ���²�

Page 387: Amez 46 all

,QGH[

Release 4.6A/B �I–3

W\SHV��%²�8QPDLQWDLQHG��8�����²������²��

&OLHQW�V\VWHPVGLVWULEXWLRQ�PRGHO����²�*OREDO�8VHU�0DQDJHU����²��PDLQWDLQLQJ�XVHU�GDWD��ILHOG�DWWULEXWHV����²�PLJUDWLQJ�XVHUV�WR�FHQWUDO�V\VWHP����²�WH[W�FRPSDULVRQ����²�

&OLHQWV������²����²����²�������²����²����²�������²����²�DVVLJQLQJ�ORJLFDO�V\VWHPV����²�FHQWUDO�XVHU�DGPLQLVWUDWLRQ����²�FRS\LQJ�DFWLYLW\�JURXSV�EHWZHHQ�FOLHQWV���²�GHIDXOW��&²�GHIDXOW�XVHUV���²�SDUWHU�SURILOHV�JHQHUDWHG�LQ�FOLHQW�V\VWHP����²��6$3�VWDQGDUG���²�WUDQVSRUWV���²�

&RPSRVLWH�DFWLYLW\�JURXSVFUHDWLQJ���²��GLVSOD\LQJ���²�RYHUYLHZ��[[LY���²��

&RS\LQJDFWLYLW\�JURXSV���²����%²�DFWLYLW\�JURXSV�DQG�GHULYLQJ���²��XVHU�UROH�WHPSODWHV�IRU�PRGLILFDWLRQ���²��

&3,&���²�&UHDWLQJ

DFWLYLW\�JURXS���²��FRPSRVLWH�DFWLYLW\�JURXSV���²��QHZ�XVHU��FOLHQW�VSHFLILF����²�XVHU�UROH�WHPSODWHV���²��

&XVWRPL]LQJ�DXWKRUL]DWLRQV���²��

D'DWD�SURWHFWLRQ���²�'',&�XVHUV���²����²�����²�'HIDXOWV

FKDQJLQJ���²�FKHFN�LQGLFDWRUV���²����²�����²��FRPSDULQJ�GDWD�ZLWK�6$3�GHIDXOW�YDOXHV���²�FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�ILHOG�YDOXHV���²����²�UHWUDQVIHUULQJ���²�

'HOHWLQJDFWLYLW\�JURXSV���²��

'HULYHG�DFWLYLW\�JURXSV���²�����²��RYHUYLHZ���²��

'HYHORSPHQW�V\VWHP��'(9����²��'LDORJ

XVHU�W\SHV���²�'LVWULEXWLRQ�PRGHO����²��

DVVLJQPHQW����²�'RFXPHQW�OLQNV���²��

'RFXPHQWDWLRQRQOLQH�IRU�DFWLYLW\�JURXS�REMHFWV���²��

E(DUO\:DWFK���²�(DV\�$FFHVV�PHQX���²����²�����²���%²�(UURU�QRWHV�GDWDEDVH���²���$²�([WHUQDO�XVHUV

XVHU�DGPLQLVWUDWLRQ���²�

F)DYRULWHV

DGGLQJ�DQG�GHOHWLQJ�WUDQVDFWLRQV��%²�YLHZLQJ��%²�

)LHOG�DWWULEXWHVGHILQLQJ�LQ�FOLHQW�V\VWHP����²�

)LHOG�GHIDXOWV���²�)LHOG�H[LWV��%²�)LHOG�YDOXHV

FRS\LQJ����²��FRS\LQJ�LQWR�FXVWRPHU�WDEOHV���²�UHSODFLQJ���²�WUDQVSRUWLQJ���²�

)LOWHUVGHILQLQJ�ILOWHU�JURXSV�IRU�DXGLW����²�

)XOO�DXWKRUL]DWLRQV���²��LQVHUWLQJ���²��

G*OREDO�8VHU�0DQDJHU

DXWKRUL]DWLRQ�IRU����²��FRPSRVLWH�DFWLYLW\�JURXS����²������²��GLVWULEXWLQJ�GDWD����²��PRGHOLQJ����²��RYHUYLHZ����²��VWUXFWXUH����²��V\VWHP�W\SHV����²��XVHU�FUHDWLRQ����²��XVHU�JURXSV����²��XVLQJ����²��

*R�OLYH�SODQ���²�����²�SUHSDUDWLRQV���²�WUDQVSRUWLQJ�DFWLYLW\�JURXSV���²�WUDQVSRUWLQJ�DXWKRUL]DWLRQ�WHPSODWHV���²�WUDQVSRUWLQJ�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�WUDQVSRUWLQJ�XVHU�PDVWHU�UHFRUGV���²�WUDQVSRUWV�EHWZHHQ�FOLHQWV���²�WUDQVSRUWV�EHWZHHQ�5���6\VWHPV���²�

H+HOS

HUURU�QRWHV�GDWDEDVH���²���$²�6$31HW�²�5���)URQWHQG�QRWHV���²�

Page 388: Amez 46 all

,QGH[

Authorizations Made Easy�I–4

+LHUDUFK\FUHDWLQJ�DQG�FKDQJLQJ���²�

+XPDQ�5HVRXUFHV��+5�DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�DXWKRUL]DWLRQ�REMHFWV����²������²������²��VXSSRUW�SDFNDJHV����²��XVHU�QDPLQJ�FRQYHQWLRQV���²��

I,'RFV����²��,0*�SURMHFWV

DVVLJQLQJ�SURMHFWV�RU�YLHZV�WR�DFWLYLW\�JURXSV���²��WUDQVIHUULQJ�XVHUV���²�����²��

,PSOHPHQWDWLRQ�*XLGH��,0*�SURMHFWV��6HH�,0*�SURMHFWV

,QWHUQDO�5���XVHUVXVHU�DGPLQLVWUDWLRQ���²�

,QWHUQHWLQVHUWLQJ�OLQNV�LQ�DFWLYLW\�JURXSV���²��

,7�PDQDJHU���²��

J-RE�UROHV���²��-REV

DVVLJQLQJ�DFWLYLW\�JURXSV���²��ZRUN�GXWLHV���²����²��

K.QRZOHGJH�&RUQHU��.&���$6$3���²�

L/LQNV

LQVHUWLQJ�,QWHUQHW�DQG�GRFXPHQW�OLQNV�LQWR�DFWLYLW\JURXSV���²��

/RFNV��XVHU����²��/RJLFDO�V\VWHPV����²�

DVVLJQLQJ�WR�FOLHQWV����²�GLVWULEXWLRQ�PRGHO����²��QDPLQJ����²�

/RJRQ�GDWD�ILHOGV���²�/RJRQV

LQFRUUHFW��&²�/RJV

DFWLYLWLHV��VSHFLILF����²��DXGLW����²�FHQWUDO����²������²��FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG

DXWKRUL]DWLRQV����²��ILOHV����²�ORFDO����²������²��SURWHFWHG�WDEOHV����²��UXQQLQJ�DXGLW�ORJV����²�6\V/RJ����²��

WDEOH�GDWD����²��

M0DLQWHQDQFH�W\SHV���²��0DQXDOO\�LQVHUWLQJ�DXWKRUL]DWLRQV���²�0DVV�FKDQJHV

FKHFN�LQGLFDWRUV����²��XVHUV���²�

0DVV�FRPSDUH��3)8'����²��0HQXV

GHIDXOW�VWDUW��&²�0RGHO�YLHZ����²�

GLVWULEXWLQJ����²��

N1DPLQJ�FRQYHQWLRQV

DXWKRUL]DWLRQ�SURILOHV���²�SURILOHV�DQG�DXWKRUL]DWLRQV�JHQHUDWHG�ZLWK�3*���²�����²���

�²��1R�FKHFN��&²�

O2EMHFW�FODVVHV���²�2EMHFW�W\SHV

$���²�&���²�2���²�3���²�6���²�86���²�

2EMHFWVMREV���²����²��RQOLQH�GRFXPHQWDWLRQ���²��RUJDQL]DWLRQDO�XQLWV���²�SHUVRQ���²�3HUVRQQHO�'HYHORSPHQW��3'���6HH�3'�REMHFWVSRVLWLRQV���²����²��5���XVHUV���²�ZRUN�FHQWHUV���²�

2QOLQH�GRFXPHQWDWLRQGLVSOD\LQJ�IRU�DFWLYLW\�JURXS�REMHFWV���²��

2QOLQH�6HUYLFH�6\VWHP��266���6HH�6$31HW�²�5���)URQWHQGQRWHV

2UJDQL]DWLRQ�PDQDJHPHQW���²����²��2UJDQL]DWLRQDO

(QMR\�WUDQVDFWLRQ�SODQ���²��OHYHOV���²�����²��SODQV���²����²�����²��VWUXFWXUHV���²��XQLWV���²�����²�

266��6HH�6$31HW�²�5���)URQWHQG�QRWHV

Page 389: Amez 46 all

,QGH[

Release 4.6A/B �I–5

P3DUDPHWHUV

DXWK�QRBFKHFNBLQBVRPHBFDVHV��%²�DXWK�REMHFWBGLVDEOLQJBDFWLYH����²��DXWK�WFRGHVBQRWBFKHFNHG����²��DXWKRUL]DWLRQ�FKHFNV��&²���&²�ILHOG�GHIDXOWV���²�ORJRQ��&²�PDQXDOO\�SRVWPDLQWDLQLQJ���²�QDPHV���²�SDUDPHWHU�WUDQVDFWLRQV����²��SDVVZRUG��&²���&²�6$3 ��&²�V\VWHP����²��WUDFLQJ�DXWKRUL]DWLRQV��&²�XVHU�EXIIHU��&²�

3DVVZRUGVEDFNJURXQG�XVHUV���²�FKDQJLQJ���²��UHTXLUHPHQWV���²��VHWWLQJ�OHQJWK��H[SLUDWLRQ��&²�VSHFLI\LQJ�LPSHUPLVVLEOH��&²�V\VWHP���²��XVHU���²�����²��

3'�REMHFWVDVVLJQLQJ�DFWLYLW\�JURXSV���²����²����²��

3HUPLVVLRQ�FUHHS����²��3HUVRQQHO�$GPLQLVWUDWLRQ��3$�

XVHUV���²��3HUVRQQHO�'HYHORSPHQW��3'�

DVVLJQLQJ�DFWLYLW\�JURXSV�WR�3'�REMHFWV���²��DVVLJQLQJ�3'�REMHFWV�WR�DFWLYLW\�JURXSV���²�

3*��6HH�3URILOH�*HQHUDWRU3ODQ�YHUVLRQ���²��3ROLFLHV�DQG�SURFHGXUHV

VHFXULW\���²��3RVLWLRQV

DVVLJQLQJ�DFWLYLW\�JURXSV���²��REMHFWV���²����²��

3RVWPDLQWDLQLQJPLVVLQJ�DXWKRUL]DWLRQV���²����²�XVHU�UROH�WHPSODWHV���²��

3UHGHILQHG�DFWLYLW\�JURXSV��6HH�8VHU�UROH�WHPSODWHV3URGXFWLRQ�V\VWHP��35'����²��3URILOH�*HQHUDWRU��6HH�DOVR�$FWLYLW\�JURXS�PDLQWHQDQFH

DFWLYDWLQJ���²�$87+25,7<�&+(&.��%²�FKHFNLQJ�WKH�UHTXLUHG�LQVWDQFH�SURILOH�SDUDPHWHU���²�FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²��FRPSRQHQWV���²��IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�RYHUYLHZ���²����²�VHWWLQJ�XS���²���%²�VWDUWLQJ���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�XVHU�UROH�WHPSODWHV���²�

3URILOHVDFFXUDF\�DQG�SHUPLVVLRQ�FUHHS����²��DGPLQLVWUDWRU��VHFXULW\���²��DVVLJQLQJ�WR�QHZ�XVHU�PDVWHU�UHFRUG���²�DXWKRUL]DWLRQ�FKHFNV��&²�DXWKRUL]DWLRQ�PLVVLQJ��%²�FKDQJLQJ�QDPHV��%²�&203$1<B$//�RU�´�<RXU&RPSDQ\!µ���²��FRPSDULQJ�ROG�DQG�FXUUHQW�GDWD���²�����²��FRQYHUWLQJ�ROG�68���SURILOHV�LQWR�DFWLYLW\�JURXSV����²��

��²��FRQYHUWLQJ�WR�EH�PDLQWDLQDEOH�E\�WKH�3*����²��'()$8/7�3)/��&²�GHILQLWLRQ���²�GLVSOD\LQJ�RYHUYLHZ�DIWHU�JHQHUDWLRQ���²��HGLWLQJ���²��HQWHULQJ�LQ�XVHU�PDVWHU�UHFRUGV���²�JHQHUDO�ULJKWV�QRW�DVVLJQHG���²�JHQHUDWLQJ���²�����²�����²��LQVHUWLQJ�DXWKRUL]DWLRQV�IURP���²��ORJJLQJ�FKDQJHV����²��PDLQWDLQLQJ���²��PDVV�FRPSDUH���²��PDWFKLQJ�XS�DIWHU�FKDQJLQJ�LQ�68������²������²��PDWFKLQJ�XS�DIWHU�XSJUDGH����²��PLJUDWLQJ���²��QDPLQJ�FRQYHQWLRQV���²����²�����²�����²��RYHUYLHZ���²����²�SDUWQHU�SURILOHV��FHQWUDO�V\VWHP����²��SDUWQHU�SURILOHV��FOLHQW�V\VWHP����²��UH�FUHDWLQJ���²������²��UHJHQHUDWLQJ�DIWHU�FKDQJHV���²��UHJHQHUDWLQJ�QXPEHU�DVVLJQPHQW���²��VWDWXV�LQGLFDWRUV���²��WUDQVSRUWLQJ���²����²�XSGDWLQJ�LQ�XVHU�PDVWHU�UHFRUG���²��ZRUNLQJ�ZLWK��%²�

3URJUDPV3)&*B7,0(B'(3(1'(1&<���²��56865������²��

Q4XDOLW\�DVVXUDQFH�V\VWHP��4$6����²�����²��4XHVWLRQV�DQG�$QVZHUV�'DWDEDVH��4$GE�

$XWKRUL]DWLRQ�/LVW���²�RYHUYLHZ���²�

R5HOHDVH�QRWHV����²�5HPRWH�FRQQHFWLRQV

VHFXULW\���²�����²��5HPRWH�IXQFWLRQ�FDOO��6HH�5)&5HSRUWV

DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��GRFXPHQWDWLRQ���²��

Page 390: Amez 46 all

,QGH[

Authorizations Made Easy�I–6

3)&*B7,0(B'(3(1'(1&<���²�����²��UHSRUW�WUHHV��%²�56865������²��

5HVSRQVLELOLWLHV����²��5)&

DXWKRULW\�FKHFN��&²�%$3,V����²��FDOOV����²��FRQQHFWLRQ����²������²�GHVWLQDWLRQ����²������²��,'RFV����²��

5RDGPDS��6HH�$FFHOHUDWHG6$3��$6$3�5ROHV

XVHU�UROHV��GHILQLQJ���²�

S6$3�%XVLQHVV�:RUNIORZ��6HH�:RUNIORZ6$3�GHIDXOWV��6HH�'HIDXOWV6$3�URXWHU

VHFXULW\���²�����²��6$3�VWDQGDUG�PHQX��[YLLL���²�����6$3�WHPSODWHV��6HH�7HPSODWHV6$3 ���²����²�����²�

VHFXULQJ�DJDLQVW�PLVXVH��&²�6$31HW���²��6$31HW�²�5���)URQWHQG�QRWHV

GDWDEDVH��$²�HUURU�QRWHV�GDWDEDVH���²�JHWWLQJ�VXSSRUW���²�3*�KRW�SDFNDJHV�IRU�5HOHDVHV����$�DQG����%���²�SULQWLQJ�QRWHV���²�VHOHFWLYH�OLVW��$²�WHPSODWH�QRWHV���²�XSJUDGLQJ�WR�QHZ�UHOHDVH����²�

6HFXULW\DFWLYLWLHV����²�DXGLWV��6HH�$XGLWVORJJLQJ�FKDQJHV�WR�XVHU�PDVWHU�UHFRUGV��SURILOHV��DQG

DXWKRUL]DWLRQV����²��ORJJLQJ�VSHFLILF�DFWLYLWLHV����²��SHUPLVVLRQ�FUHHS����²��SROLFLHV�DQG�SURFHGXUHV���²��UHYLHZLQJ�ORJV����²��VHFXULW\�UHSRUWV����²��VRXUFHV�DERXW�LPSOHPHQWDWLRQ���²��VWUDWHJ\�LQ�WKUHH�V\VWHP�HQYLURQPHQW���²��

6WDWLVWLF�UHFRUGV��DXGLWLQJ����²��6WUXFWXUDO�DXWKRUL]DWLRQV���²��

WURXEOHVKRRWLQJ�OLPLWDWLRQV����²�6XSHUXVHUV���²����²�����²�����²��6\V/RJ����²��6\VWHP��6HH�&HQWUDO�V\VWHP��&OLHQW�V\VWHP��7DUJHW�V\VWHP6\VWHP�ODQGVFDSH

ZLWK�H[LVWLQJ�XVHUV����²������²��6\VWHP�SDVVZRUGV���²��6\VWHP�7UDFH��6HH�7UDFHV

T7DEOHV

IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�ORJJLQJ�FKDQJHV�WR�GDWD����²��ORJV�SURWHFWHG����²��68.5,����²��7$&7=��%²�862%7���²����²�862%;���²����²�����²����%²��865����&²�

7DUJHW�V\VWHPGHILQLQJ�IRU�5)&�FDOOV����²��

7DVNVPXOWLSOH�VWHS���²��VLQJOH�VWHS���²��

7HFKQLFDO�QDPHVDXWKRUL]DWLRQV���²��

7HPSODWHVFUHDWLQJ�QHZ���²�GHOLYHUHG���²�GHOLYHUHG�QDPHV���²�LQFOXGLQJ�UHTXLUHG�REMHFWV�LQ�DFWLYLW\�JURXSV���²�LQVHUWLQJ�DXWKRUL]DWLRQV���²����²��LQVHUWLQJ�LQWR�H[LVWLQJ�DFWLYLW\�JURXS���²�WUDQVSRUWLQJ���²�ZRUNIORZ���²��

7KUHH�V\VWHP�HQYLURQPHQWGHYHORSPHQW�V\VWHP��'(9����²��SURGXFWLRQ�V\VWHP��35'����²��TXDOLW\�DVVXUDQFH�V\VWHP��4$6����²��

7LPH�SHULRGVORJRQ�YDOLG�IURP�YDOLG�WR�GDWHV���²�UHVWULFWLQJ�DFWLYLWLHV��%²�XVHU�DVVLJQPHQW���²����²�����²��

7UDFHVDQDO\]LQJ�WUDFH�ILOH����²�DXWKRUL]DWLRQV��&²�GLVSOD\LQJ�UHVXOWV����²�QDPLQJ����²�UHFRUGLQJ�DXWKRUL]DWLRQ�FKHFNV����²�

7UDLQLQJ�FOLHQW�V\VWHP��75*����²��7UDQVDFWLRQV

DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²��DVVLJQLQJ�WR�UHSRUWV���²��$87+B6:,7&+B2%-(&76����²��DXWKRUL]DWLRQ�FKHFNV��%²�%'������²��GHULYHG�DFWLYLW\�JURXSV���²��LQVHUWLQJ���²�PDLQWDLQ�FKHFN�LQGLFDWRUV����²��PLVVLQJ�DXWKRUL]DWLRQV���²�3)&*���²��3)8'���²��5=������²��6$������²��6$5$����²��

Page 391: Amez 46 all

,QGH[

Release 4.6A/B �I–7

6&&����²���%²�6&&����²�6&&/���²�6&8�����²��6&80����²�6(������²��6(�����²��6(������²��6(&5����²������²��60������²�60������²�����²�60������²�����²�60������²��60�����²����²���%²���&²�6352����²��67������²�67������²��67$7����²��68�����²����²�����²������²��68�����²����²������²��68�����²����²������²��68�����²����²�����²����%²���&²�68�����²����²�����²������²������²���%²�68�����²�����²����²�����²�683&���²�����²�����²��

7UDQVSRUWLQJDFWLYLW\�JURXSV���²����²���%²�FKHFN�LQGLFDWRUV�DQG�ILHOG�YDOXHV���²�IUHTXHQWO\�DVNHG�TXHVWLRQV��%²�PDVV�WUDQVSRUW�RI�DFWLYLW\�JURXSV���²�VLQJOH�DFWLYLW\�JURXSV�XVLQJ�DFWLYLW\�JURXS�PDLQWHQDQFH�

�²�WHPSODWHV���²�XVHU�DVVLJQPHQWV���²����²�XVHU�PDVWHU�UHFRUGV���²�

7URXEOHVKRRWLQJ��6HH�DOVR�7UDFHVHUURU�DQDO\VLV��68������²�

U8SJUDGHV

FRQYHUWLQJ�SUHYLRXVO\�FUHDWHG�68���SURILOHV�LQWR�DFWLYLW\JURXSV����²�

SUHSDUDWLRQ�EHIRUH����²�SURFHGXUH��68�����%²�5HOHDVH����)����²��5HOHDVHV����*�����+�����,����²��5HOHDVHV����[�RU����[����²��UHOHDVHV�SULRU�WR����[����²��UHPRYH�XVHU�DVVLJQPHQWV�IURP�RULJLQDO�68���SURILOH����²�YDOLGDWLRQ�DIWHU�FRPSOHWH����²�

8VHUDFFRXQWV����²�DGPLQLVWUDWLRQ���²�����²�����²�$/(����²�DVVLJQLQJ�WR�DFWLYLW\�JURXSV���²����²�DVVLJQLQJ�WR�FXVWRPL]LQJ�DFWLYLW\�JURXSV���²��

DVVLJQLQJ�XVHU�UROH�WHPSODWHV���²�DVVLJQPHQWV���²�����²����²�����²�DXGLWLQJ�IRU�YDOLG�XVHUV����²��DXWKRUL]DWLRQV�DQG�DXWKRUL]DWLRQ�SURILOHV���²�EDVLF�XVHU�GDWD���²�EXIIHU���²�FKDQJLQJ�SDVVZRUGV���²��FOLHQW�VSHFLILF���²��FUHDWLQJ���²����²�����²��GDWHV�RI�XVHU�DVVLJQPHQW���²����²�����²��'',&���²����²�����²�GHIDXOWV���²����²�(DUO\:DWFK���²�H[WHUQDO���²�ILHOG�DWWULEXWHV��GHILQLQJ����²�JURXSV��[[LY���²�LQIRUPDWLRQ�V\VWHP���²��LQWHUQDO�5�����²�MREV���²��ORJRQ�GDWD�ILHOG�GHILQLWLRQV���²�PDVV�FKDQJHV���²�PHQX��[YLLL��[[LL���²����²�����RUJDQL]DWLRQDO�XQLWV���²��SDVVZRUGV���²�����²��SRVLWLRQV���²��SURILOHV��WUDQVDFWLRQ�67������²��UROHV��6HH�8VHU�UROHV6$3 ���²����²�����²�VSHFLDO�5���XVHUV���²�VWDWXV�GLVSOD\�RQ�WDE���²�VXSHUXVHUV���²����²�����²�����²��V\VWHP���²����²�V\VWHP�ODQGVFDSH����²������²��WUDQVIHUULQJ�IURP�,0*�SURMHFW�WR�DFWLYLW\�JURXS���²��XVHU�DGPLQLVWUDWLRQ��%²�XVHU�,'V���²��XVHU�W\SHV���²�

8VHU�EXIIHUV��&²�8VHU�PDVWHU�UHFRUGV

DXWKRUL]DWLRQ�FRQFHSW���²����²�FRPSDULQJ�DIWHU�DFWLYLW\�JURXS�LPSRUW���²�FRPSDULQJ�DIWHU�DXWKRUL]DWLRQ�SURILOH�JHQHUDWLRQ���²�FRPSDULQJ�ZLWK�3*���²��GHILQLQJ���²�*OREDO�8VHU�0DQDJHU����²��ORJJLQJ�FKDQJHV����²��PDQXDOO\�HQWHULQJ�JHQHUDWHG�SURILOHV��%²�V\VWHP�UHFRJQLWLRQ�RI�XVHUV���²�WUDQVSRUWLQJ���²����²����²�XSGDWLQJ���²�XSGDWLQJ�SURILOHV���²��

8VHU�UROH�WHPSODWHVDVVLJQLQJ�WR�D�XVHU�XVLQJ�VKRUWFXW���²��DVVLJQLQJ�XVHUV���²����²�FRS\LQJ�DQG�PRGLI\LQJ���²��FUHDWLQJ�XVLQJ�PXOWLSOH�VLQJOH�DFWLYLW\�JURXSV���²��FUHDWLQJ�XVLQJ�VLQJOH�DFWLYLW\�JURXSV���²��

Page 392: Amez 46 all

,QGH[

Authorizations Made Easy�I–8

FUHDWLQJ�\RXU�RZQ���²��FXVWRPL]LQJ�WHPSODWH���²��PDLQWHQDQFH�YLHZ�VHWWLQJV���²��RYHUYLHZ��[[LL���²�����²�SRVWPDLQWDLQLQJ���²��5HOHDVH����$���²��5HOHDVH����%���²��XVLQJ�6$3�SURYLGHG���²�ZRUNLQJ�ZLWK���²�

8VHU�UROHVGHILQLQJ���²�JHQHUDWLQJ�RYHUYLHZ���²�

8VHU�W\SHVEDFNJURXQG���²�EDWFK�GDWD�FRPPXQLFDWLRQ���²�

&3,&���²�GLDORJ���²�

W:RUN�FHQWHUV���²�:RUNIORZ

DVVLJQLQJ�DFWLYLW\�JURXSV�WR�5���REMHFWV���²�VDPSOH���²��WDVNV���²�����²��WHPSODWHV���²��XVHUV���²��

:RUNSODFH�PHQX��[YLLL