<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>All SAP BASIS</title><description>Message Class,Networking,Tables,Transaction Codes,EMail, Interview Questions,OSS,Printing and Fax,SAP,Performance Tuning,Solution Manager,Statistics ,System Audit, Transports and Upgrade,Users Profiles and Password,SAP Router.</description><managingEditor>noreply@blogger.com (Software Download)</managingEditor><pubDate>Fri, 1 Nov 2024 16:07:07 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">154</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://allsapbasis.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:keywords>Message,Class,Networking,Tables,Transaction,Codes,EMail,Interview,Questions,OSS,Printing,and,Fax,SAP,Performance,Tuning,Solution,Manager,Statistics,System,Audit,Transports,and,Upgrade,Users,Profiles,and,Password,SAP,Router</itunes:keywords><itunes:summary>Message Class,Networking,Tables,Transaction Codes,EMail, Interview Questions,OSS,Printing and Fax,SAP,Performance Tuning,Solution Manager,Statistics ,System Audit, Transports and Upgrade,Users Profiles and Password,SAP Router.</itunes:summary><itunes:subtitle>All SAP BASIS</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:owner><itunes:email>softwaredownload.webworld@gmail.com</itunes:email></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>background job failed because of authorization</title><link>http://allsapbasis.blogspot.com/2009/03/background-job-failed-because-of.html</link><category>Background Job Troubleshooting</category><pubDate>Wed, 11 Mar 2009 12:25:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-1543717355799603557</guid><description>&lt;strong&gt;We have a job which runs OK in foreground but when defined in background.&lt;br /&gt;It failed and the log said it is an authorization problem. Unlike a&lt;br /&gt;foreground job which we can always run SU53 after the execution to get&lt;br /&gt;which auth is needed, the log of the background job didn't tell more&lt;br /&gt;detail other than "it is an auth problem". Pls help us with this. is&lt;br /&gt;there a way to find out what is the exactly reason after a background job&lt;br /&gt;failed because of authorization?&lt;br /&gt;&lt;br /&gt;thanks.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;Several solutions:&lt;br /&gt;1) Copy the batch user to a dialogue user, then logon and run the job. You will then have your error online and maybe the SU53 you are looking for.&lt;br /&gt;2) Check S_PROGRAM value for the batch user. Maje sure the batch user has activity BTCSUBMIT for the program auth group. Have you checked the job log in SM37?? You can usually drill-down to see some type of error. Common errors are S_PROGRAM and S_DATASET authotizations' missing.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;You can also run an authorization trace from ST01 for the "job step executor" (the background user) -- not the batch job scheduler, unless if they're run by the same people.&lt;br /&gt;&lt;br /&gt;Also -- make sure you run ST01 on the exact application server the batch job is running to capture the trace.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;Tried to run the job online, it went through w/o problem.&lt;br /&gt;&lt;br /&gt;Tried it in background again, failed with same authorization problem.&lt;br /&gt;&lt;br /&gt;Does this make sense for you guys? Should running online and running in background have the same authorization check?&lt;/strong&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Background Jobs</title><link>http://allsapbasis.blogspot.com/2009/03/background-jobs.html</link><category>Background Job Troubleshooting</category><pubDate>Wed, 11 Mar 2009 12:24:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-7828650470337382479</guid><description>&lt;strong&gt;What is the general practice for running Background jobs? Under the individual's user ID or one generic ID which has wide authorisations?&lt;br /&gt;&lt;br /&gt;If it is run under the individual ID, then how is it handled when the person leaves the company?&lt;br /&gt;&lt;br /&gt;What are the pro's and con's of running it under one generic ID?&lt;br /&gt;&lt;br /&gt;Thank you&lt;br /&gt;Jaynick&lt;br /&gt;_________________&lt;br /&gt;SAP Rules!!!&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;We make sure that all background jobs are scheduled against a background user. This way we ensure that there is sufficient access to complete the job without having to give the individual users the same level of access. At the same time we can lock leavers and inactive users without being concerned of jobs falling over&lt;br /&gt;&lt;br /&gt;To do this, you need to make sure that only a limited number of people can schedule batchjobs against the background ID. If not, you risk people obtaining access they should not have.&lt;br /&gt;&lt;br /&gt;You can also ensure that the jobs won't have a negative performance impact on the system, as they will be scheduled with the right parameters.&lt;br /&gt;&lt;br /&gt;Hope it helps&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;If you currently allow users to create background jobs, checking for jobs scheduled for a particular ID should be a standard part of user decomissioning.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;Thanks Henrik! Any other input from SAP fans as to what the general practice out in the world is?&lt;br /&gt;&lt;br /&gt;Jaynick&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;I have a question about this also. I understood that a Basis admin could schedule background jobs to run under the userid of a system user, so that the system user (non dialog) could be granted broad authorizations, and not the dialog user, and also no maintenance is required if basis admin leaves the company.&lt;br /&gt;&lt;br /&gt;I know that there are a few things that will require that the basis admin who schedules the background job to run under the auths of the system user id, also have the authorizations in his/her role also, or they will not be allowed to schedule it to run under the system id, even if the system id has the auths. Which is an understandable security measure. But these are only for a few things like os command and program execution considered critical, and not like broad business applications which the admin would not have in his admin role, and yet there is no problem scheduling jobs under the system id which does process business application jobs.&lt;br /&gt;&lt;br /&gt;I have been told by some that they needed to create a generic dialog user like "JOBSCHEDULER" and use it to schedule jobs. I don't understand why they need to do this. Can anyone tell me why there would be a technical problem if they simply used their own id to schedule these jobs to run under the authorizations of the system id set up for this purpose?&lt;br /&gt;_________________&lt;br /&gt;Gary Morris&lt;br /&gt;SAP Security Analyst/Developer&lt;br /&gt;garymorris@sapsecurity.net&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;Hi Gary,&lt;br /&gt;&lt;br /&gt;Do you mean that the job admin is a generic account? That makes the connection between the dialog user ID and the name of the background user in which the job step is running even more obscure...&lt;br /&gt;&lt;br /&gt;The belief that SOD conflicts between dialog users with S_BTCH_NAM = 'BATCHUSER' and the authorizations of 'BATCHUSER' itself is bad enough!&lt;br /&gt;&lt;br /&gt;If you mean the job steps running in the name of the generic account as a dialog user, I have observed some OSS notes on a related topic which you can find with a search on 'call transaction' (I was looking for something else). Some programs may call a transaction screen which is not a parameter transaction and requires dialog interaction - at least that is what I understood the notes to be describing.&lt;br /&gt;&lt;br /&gt;If I find an example again, I will post it.&lt;br /&gt;&lt;br /&gt;Noddy&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;There are two types of background jobs:&lt;br /&gt;1. Repetative Production scheduled jobs to support a business process.&lt;br /&gt;2. Adhoc reporting in background to keep the dialog processes free for "real" work. ( transaction processing)&lt;br /&gt;&lt;br /&gt;The repetative Production jobs should be formalized with a standard naming convention for the job name and scheduled by the Batch administrator at the appropriate time, generally on a basis person's id not a generic one as there is no accountability on a geeric ID. The batch admin will need sufficient access to create the job, not run the report if internal authorization is needed to run the report (generally S_BATCH_NAM and S_PROGRAM, plus the S_BTCH_ADM access is sufficient. This allows scheduling the jobs in ANY class to limit their run to a specific batch processes controled by basis), and the STEPS should be run under an ID setup as a batch ID for the specific module ( not a user and not the batch admin person), like BATCH_FIAR , BATCH_HR, BATCH_MM, BATCH_SEC, etc. the batch Ids (setting in SU01) should have broad functional module access, not all access.&lt;br /&gt;&lt;br /&gt;Adhoc reporting SHOULD be encouraged to keep the dialog processes free to enter the data into the system that SAP was purchased for, entering sales orders, getting money, and paying bills, ALL more important tha a poorly defined batch job report.&lt;br /&gt;&lt;br /&gt;The user should have access to schedule jobs but NOT S_BTCH_ADM, this then forces all the job into class C which allows basis to manage when and where batch jobs are run. Since the user is running a report in backgroung that they could run in foreground, the report SHOULD be part of their role and the report tied to the role menu and the access in the report granted. The job is then scheduled on the user' s ID and run under the user's ID.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;Thanks John, That is exactly what I have told others, but for some reason I did not understand, they were saying they had some kind of technical problem when using system admin IDs, instead of this generic one. I will try and narrow done exactly what it was. They understand that the job will not fail if the admin leaves if it is scheduled under a batch-id but they still want to use a generic dialog user to schedule all of the jobs under one batch id.&lt;br /&gt;&lt;br /&gt;Will they encounter a technical problem if they schedule too many jobs under the same user? Will there ever be any difference in the performance of the background processing with the same user such as maybe some kind of wait time when the same system id is logging in for multiple jobs, whereas if the user ids were different it would not have waited? Or rfc trace files getting wierd error messages because the background user is trying to authenticate when it is not necessary such as wrong classification of the user id causes the kernel to handle the login in a way that it would not if the classification of the user type trying to connect was set to cpic instead of system etc..&lt;/strong&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>background jobs via background users</title><link>http://allsapbasis.blogspot.com/2009/03/background-jobs-via-background-users.html</link><category>Background Job Troubleshooting</category><pubDate>Wed, 11 Mar 2009 12:24:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-3613839981719279511</guid><description>&lt;strong&gt;I need some opinions about following issue:&lt;br /&gt;&lt;br /&gt;We have some jobs who have to be done every day. So, these jobs are planned every morning. The jobs are backgroundjobs and [b]one[/b] system user runs [b]all the jobs[/b]. Therefore, this system user has a SAP_ALL.&lt;br /&gt;A system user can't login on a normal basis but I don't feel well with the SAP_ALL.&lt;br /&gt;&lt;br /&gt;I have the idea to split this user in several system users, with a big profile of the module which need some background jobs. (HR-user for HR-backgroundjobs, FI-user for FI-backgroundjobs,...)&lt;br /&gt;&lt;br /&gt;Is this realistic or is there an other solution? Maybe our situation at this moment isn't so bad as I think???&lt;br /&gt;Can someone help me?&lt;br /&gt;&lt;br /&gt;Thanks in advance!&lt;br /&gt;Bart&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;It's perfectly feasible to split them by function or module.&lt;br /&gt;&lt;br /&gt;For non-sensitive stuff I generally have a user e.g. FIBATCH with auths to cover what's needed. It takes a bit more work to set up but helps keep things arranged in an orderly manner.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;I’ve been through audits in the past where they have been satisfied with the background user having SAP_ALL as long as you have tightly controlled who can actually schedule jobs etc against that ID.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;I’ve been through audits in the past where they have been satisfied with the background user having SAP_ALL as long as you have tightly controlled who can actually schedule jobs etc against that ID.&lt;br /&gt;&lt;br /&gt;Its all about risk. System users can also be used as communications users and there are some tricks that could allow someone to abuse a systems user in an RFC call. (They involve a kind of password hack). If you restrict the authority of the systems user you can diminish the opportunity for abuse.&lt;br /&gt;&lt;br /&gt;You also have to be very restrictive about authority for S_BTCH_NAM.&lt;br /&gt;_________________&lt;br /&gt;bwSecurity&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;I’ve been through audits in the past where they have been satisfied with the background user having SAP_ALL as long as you have tightly controlled who can actually schedule jobs etc against that ID.&lt;br /&gt;When I perform audits I prefer not to see the ID with SAP_ALL - as there are plenty of ways it can be misused if the required restrictions are not in place.&lt;br /&gt;&lt;br /&gt;If you do want to use one user, at least use a chopped down version of SAP_ALL with some of the more sensitive auths removed or very tightly controlled to grant what specifically is used.&lt;/strong&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Background Processing VS Batch processing</title><link>http://allsapbasis.blogspot.com/2009/03/background-processing-vs-batch.html</link><category>Background Job Troubleshooting</category><pubDate>Wed, 11 Mar 2009 12:23:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-1152383051750942155</guid><description>&lt;strong&gt;Can someone tell me what the difference between backgroud processing and batch processing is. Also does the access to this function be limited.&lt;br /&gt;&lt;br /&gt;I have a requrinment where they want everyone to have access to batch processing and just wanted to know how i should be handling this request.&lt;br /&gt;&lt;br /&gt;Please help&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;You have to get clarification from the requester. Most often Batch and background mean the same. There is a SAP useage which means Batch Data Communication ( BDC) that is sometimes refered to as Batch but most often refered to as BDC. Batch anf Background is controlles with S_BTCH_JOB and BDC is S_BDC_MONI. You need clarification fromt he requester.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;And if the user also has S_BTCH_ADM = Y and S_BTCH_NAM = DDIC (or *), then they can schedule the jobs, release, delete etc (as per S_BTCH_JOB actions permitted), but.. in the name of and with the authorizations of the other user names.&lt;br /&gt;&lt;br /&gt;You can check with SUIM reports who can use your user account (for example) without having to know your password.&lt;br /&gt;&lt;br /&gt;The myth that one cannot logon with a batch user is therefore true, because you don't need to logon with it...&lt;br /&gt;&lt;br /&gt;Cheers,&lt;br /&gt;Bob&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;There is no myth about "loggin on to a Batch id" it does logon to run the batch job it just cannot be used in DIALOG mode. S_BTCH_NAM allows you to run a batch job using that users' access be it DDIC ( which should not have SAP_ALL) or any other id BATCH or DIALOG.&lt;br /&gt;&lt;br /&gt;&lt;span class="style1"&gt;Answer:&lt;/span&gt;&lt;br /&gt;There is no myth about "loggin on to a Batch id" it does logon to run the batch job it just cannot be used in DIALOG mode. S_BTCH_NAM allows you to run a batch job using that users' access be it DDIC ( which should not have SAP_ALL) or any other id BATCH or DIALOG.&lt;br /&gt;&lt;br /&gt;It does logon, but unlike Communication users, the password is not critical for this login so you can change it. Like Communication users, one does not have to know what the password is... just access to see that someone once did and left it behind in the system. For Communication users one does not need to know the password either, but changing it, would make the access to the user more difficult.&lt;/strong&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Deleting a scheduled Background job in SAP</title><link>http://allsapbasis.blogspot.com/2009/03/deleting-scheduled-background-job-in.html</link><category>Background Job</category><pubDate>Wed, 11 Mar 2009 12:22:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-6107307586864318056</guid><description>To delete a job:&lt;br /&gt;Go to Transaction SM37. Select a job (or jobs) from the Select Background Jobs screen. In the Job Overview, mark the job or jobs you want to delete by checking the box to the left of the job name. Choose Job --&gt; Delete.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Deleting Jobs That Have Dependent Jobs:&lt;br /&gt;&lt;br /&gt;If you delete a job that must be processed before another job can be started, the dependent job can no longer be started. The system will inform you of any such existing dependent, or successor, jobs. You'll then need to either reschedule or delete the dependent job.&lt;br /&gt;If you try to release a job whose predecessor job was deleted, the system sets the status of the job to Planned. To start this job, you must release it and specify the start conditions.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Schedule Manager</title><link>http://allsapbasis.blogspot.com/2009/03/schedule-manager.html</link><category>Background Job</category><pubDate>Wed, 11 Mar 2009 12:22:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-6365211769260660415</guid><description>&lt;p&gt;Automate your routinue task with Schedule Manager. It facilitate the definition, scheduling, execution, and review of tasks that are executed on a regular basis, such as period-end closing. &lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style="color: rgb(153, 0, 0);"&gt;SCMA&lt;/span&gt;&lt;/b&gt; - Schedule Manager &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>how you can assign a Background work process as a Class A Background Work process</title><link>http://allsapbasis.blogspot.com/2009/03/how-you-can-assign-background-work.html</link><category>Background Job</category><pubDate>Wed, 11 Mar 2009 12:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-3490406450383217714</guid><description>&lt;p class="MsoNormal"  style="text-align: justify;font-family:verdana;"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-size:85%;"&gt;Go to transaction code rz04 then button &lt;i&gt;&lt;span style=""&gt;Operation Modes / Instances&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span style=""&gt;&lt;span style="font-size:85%;"&gt;. Then select the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Operation mode and double click on it. Then you will see a window with no of Background work process. In the field named Class A increase the no to 1 (use the + button to increase that). Default value is zero. Then click on the save button to save the configuration&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" face="verdana" style="text-align: justify;"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQiC-3UlYcb1Bd17p1FzgAeiWf0fQZRZWC8QqokcDRhrT8HRmsEulRgVKryvWN-mH6Xri24SFw-61FPtPyO3I1Q3Pn7B-ZIJj4bqWWx5EonhcJ-4pggdaq1OAkxpTgO8Anb4ILE08gfE/s320/Btc_A_Incr.jpg" alt="" id="BLOGGER_PHOTO_ID_5146046804313866466" border="0" /&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQiC-3UlYcb1Bd17p1FzgAeiWf0fQZRZWC8QqokcDRhrT8HRmsEulRgVKryvWN-mH6Xri24SFw-61FPtPyO3I1Q3Pn7B-ZIJj4bqWWx5EonhcJ-4pggdaq1OAkxpTgO8Anb4ILE08gfE/s72-c/Btc_A_Incr.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>How To Delete a Scheduled Job in sap</title><link>http://allsapbasis.blogspot.com/2009/03/how-to-delete-scheduled-job-in-sap.html</link><category>Background Job</category><pubDate>Wed, 11 Mar 2009 12:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-6750617684283170182</guid><description>&lt;p&gt;&lt;b&gt;I am working in production support and have been asked to stop a scheduled jobs. The job will run on the first of next month and I need to stop it from running. &lt;/b&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;To delete a job:&lt;/b&gt; &lt;/p&gt;  &lt;p&gt;Go to Transaction &lt;b&gt;SM37&lt;/b&gt;. Select a job (or jobs) from the Select Background Jobs screen. In the Job Overview, mark the job or jobs you want to delete by checking the box to the left of the job name. Choose &lt;b&gt;Job --&gt; Delete&lt;/b&gt;.&lt;!--[endif]--&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Deleting Jobs That Have Dependent Jobs:&lt;/b&gt; &lt;/p&gt;  &lt;p&gt;If you delete a job that must be processed before another job can be started, the dependent job can no longer be started. The system will inform you of any such existing dependent, or successor, jobs. You'll then need to either reschedule or delete the dependent job. &lt;/p&gt;  &lt;p class="MsoNormal"&gt;If you try to release a job whose predecessor job was deleted, the system sets the status of the job to Planned. To start this job, you must release it and specify the start conditions.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Checking your program Background Job Status</title><link>http://allsapbasis.blogspot.com/2009/03/checking-your-program-background-job.html</link><category>Background Job</category><pubDate>Wed, 11 Mar 2009 12:20:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-7843444008889001107</guid><description>&lt;p&gt;Checking your job status with &lt;b&gt;SM50&lt;/b&gt; (processor type&lt;b&gt; BTC&lt;/b&gt;) is more accurate then &lt;b&gt;SM37&lt;/b&gt;. SAP updates the tables TBTCO wheneveryour background jobs status change. If SAP is shutdown, the currentjobs might not be update ontime to the table. (e.g. a background job wasshown as Active (SM37), in fact it real status should be Cancelled. &lt;/p&gt;  &lt;p&gt;The type of work process: &lt;/p&gt;  &lt;ul type="disc"&gt;&lt;li class="MsoNormal" style=""&gt;DIA - work process for      executing dialog steps in user transactions&lt;/li&gt;&lt;li class="MsoNormal" style=""&gt;UPD - update process for      executing U1 (time-critical) database changes&lt;/li&gt;&lt;li class="MsoNormal" style=""&gt;UP2 - update process for      executing U2 (non-critical) database changes&lt;/li&gt;&lt;li class="MsoNormal" style=""&gt;ENQ - for setting and      releasing locks on SAP lock objects&lt;/li&gt;&lt;li class="MsoNormal" style=""&gt;BTC - for executing      background jobs&lt;/li&gt;&lt;li class="MsoNormal" style=""&gt;SPO - for spool formatting      processes&lt;/li&gt;&lt;/ul&gt;  &lt;span style="font-size: 12pt; font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;PID: Process ID of the work process&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Availability Check on Quotation</title><link>http://allsapbasis.blogspot.com/2009/03/availability-check-on-quotation.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:20:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-780534394241030139</guid><description>&lt;p&gt;&lt;b&gt;SAP standard does not do an availability check on the quotation, as it is not a definite order, usually just a pricing quote.&lt;/b&gt; &lt;/p&gt;&lt;p&gt;When it is converted to an order, the first availability check is carried out, as well as credit checks. The system will check stock in the plant, plus what is contained in the availability checking rule (scope of check) eg: can add POs for replenishment, purchase reqs, different planned orders, and subtract sales orders, deliveries etc already created against that material in that plant (and possibly Storage location). &lt;/p&gt;&lt;p&gt;If there is enough stock in the plant/SLoc, the system will give you a confirmed date, or give you a date based on the production time or purchasing time from the material master. The date the system proposes is based on the customer's requested delivery date. &lt;/p&gt;&lt;p&gt;SAP first backward schedules looking at the required delivery date, less transportation time, less transportation lead time, less pick and pack time, less production/purchase time if applicable. If the date it calculates is equal or later than today’s date, then it will confirm the customer’s required date. If it falls in the past, SAP will then forward schedule for today’s date, plus the times listed above to get the date when the customer can actually have it. &lt;/p&gt;&lt;p&gt;ATP is the single most complex part of the SD module, depending upon how PP and MRP is set up. &lt;/p&gt;&lt;p&gt;MRP works semi-separately, depending on how it is set up. Basically, MRP looks at the demand on the plant, and if it the stock does not meet expected sales orders and deliveries, it will create a purchase requisition (outside purchase) or requirement or planned order (for production) to cover the shortfall. When MRP is started, it will turn the PR into a PO or the requirement into a production order. &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>SD material Determination based on availability check</title><link>http://allsapbasis.blogspot.com/2009/03/sd-material-determination-based-on.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:19:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-4513257420794213719</guid><description>&lt;p&gt;&lt;b&gt;For SD material Determination you can create a Substitution reason and on the Strategy field, the following info. is available:&lt;/b&gt; &lt;/p&gt;&lt;p&gt;&lt;b&gt;Product selection in the background is performed on the basis of the availability check.&lt;/b&gt; &lt;/p&gt;&lt;p&gt;&lt;b&gt;We want to have the material determination only in case on material shortage. We expect the Substitution reason to give us this functionallity. It does not hovever take the availabilty into account before substitution.&lt;/b&gt; &lt;/p&gt;&lt;p&gt;&lt;b&gt;We thought the worse case is to create a ABAP which is linked to the "requirement" field in the Procedure (OV13).&lt;/b&gt; &lt;/p&gt;&lt;p&gt;&lt;b&gt;Has anyone had the same requirement? Is this a bug or just incorrectly documented?&lt;/b&gt; &lt;/p&gt;&lt;p&gt;I also encountered this abnormally recently using material determination. In order to combat the problem, the first product substitution should be for the original material. I've illustrated this below: &lt;/p&gt;&lt;p&gt;Original Product: ABC&lt;br /&gt;Substitutes: DEF, XYZ &lt;/p&gt;&lt;p&gt;In order to perform product substitution ONLY in the case of ATP failure for product ABC, structure the Material Determination record as follows: &lt;/p&gt;&lt;p&gt;Material Entered: ABC Substitutes: ABC&lt;br /&gt;DEF&lt;br /&gt;XYZ &lt;/p&gt;&lt;p&gt;&lt;b&gt;There seems to be a devaition at availability check and or on a conceptual note still.&lt;/b&gt; &lt;/p&gt;&lt;p&gt;Availability check can be configured both at requiremnt class and at the schedule line categories level. &lt;/p&gt;&lt;p&gt;Whilst the availabilty check at the requirement class level via global and mandatory configuration the schedule line catgry availability check deals with the order. &lt;/p&gt;&lt;p&gt;It is mandatory that the reqmnt class is flagged off for avlblty check and the schdelu line cat need not be. &lt;/p&gt;&lt;p&gt;The following are the mandatory for Availability check to happen-- &lt;/p&gt;&lt;p&gt;1. Must be swithced on at the requirment class level and at the schedule line level. &lt;/p&gt;&lt;p&gt;2. Reqmnt type must exist by which a requiremnt class can be found &lt;/p&gt;&lt;p&gt;3. There must exist a plant and is defined &lt;/p&gt;&lt;p&gt;4.Checking group must be defined in Material Master records(it controls whthr the system is to create individual or collective reqmnt) &lt;/p&gt;&lt;p&gt;A combination of checking gropup and checking rule will determine the scope of availbaility check. &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Creating Multiple Materials in Material Determination</title><link>http://allsapbasis.blogspot.com/2009/03/creating-multiple-materials-in-material.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:19:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-7699895564046890498</guid><description>&lt;p&gt;Material Determination is used to swap one material for another.It is possible to get a list of materials for substituiton,but remember you can substitue only one material from the list. &lt;/p&gt;&lt;p&gt;This can be done through substituiton reason T Code [OVRQ]&lt;br /&gt;See the substitution reason number for Manual Material Selection&lt;br /&gt;- check the Entry box&lt;br /&gt;- check the Warning box&lt;br /&gt;- select A for Stategy&lt;br /&gt;- save. &lt;/p&gt;&lt;p&gt;Go To VB11 to create Material Determination (taking into consideration that all the previous steps for material determiantion i.e. maintaining condition types,maintaining procedures for material determination and assigning procedures to sales doc. types have been done) &lt;/p&gt;&lt;p&gt;Create one material determination,dont forget to give the Subst reason on top and also on the line. &lt;/p&gt;&lt;p&gt;Click the Variants Icon on top left-Sreen opens &lt;/p&gt;&lt;p&gt;Specify different materials you want to swap with the material you have enterd &lt;/p&gt;&lt;p&gt;Note that the subst reason is already copied on the screen &lt;/p&gt;Remember materials should be of the same sales area,atleast Divisions should be same</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Backward and Forward Scheduling</title><link>http://allsapbasis.blogspot.com/2009/03/backward-and-forward-scheduling.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-6789562339797229732</guid><description>&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Backward scheduling is the calculation of deadline dates: the arrival time at the customer site is calculated as the earliest possible goods receipt time at the customers unloading point on the requested delivery date. All four of the delivery and transportation scheduling lead times are subtracted from the customer's requested delivery date to determine if this date can be met. &lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;The transit time, loading time, and pick/pack time are subtracted from the customer’s requested delivery date to calculate the required material availability date. &lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;The system calculates backward scheduling as follows: &lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Requested delivery date minus transit time  = Goods issue date &lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Goods issue date minus loading time = Loading date &lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Loading date minus transportation lead time = Transportation scheduling date &lt;/span&gt;&lt;br /&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Loading date minus pick/pack time = Material availability date &lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;By default, the system will calculate delivery dates the closest day, taking into consideration the working days of the shipping point and a rounding profile. In this case the system assumes a 24 hour work day and lead times can be entered in days up to 2 decimal points. This is referred to as daily scheduling. &lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Precise scheduling calculated down to the day, hour and minute is supported. This allows the scheduling of a delivery within a single day. It is activated by maintaining the working hours for a particular shipping point. &lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Backward scheduling is always carried out first. If the material availability date or transportation scheduling date is calculated to be in the past, the system must then use forward scheduling. &lt;/span&gt; &lt;/p&gt;&lt;span style="color: rgb(0, 0, 0);"&gt;Forward scheduling is also done if no product is available on the material availability date calculated by backward scheduling. The system does an availability check to determine the first possible date when product will be available. This new material availability date forms the starting point for scheduling the remaining activities. The loading time, pick/pack time, transit time, and transportation lead time are added to the new material availability date to calculate the confirmed delivery date.&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>SAP Authorization Concept</title><link>http://allsapbasis.blogspot.com/2009/03/sap-authorization-concept.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-5642072487874527461</guid><description>&lt;p align="justify"&gt;&lt;span style="font-family: Arial;"&gt;&lt;span style="font-size: 85%;"&gt;The SAP authorization concept is based upon the logical relationship between a user ID and the range of system authorizations with which it can be associated. The architecture of the authorization system is based upon the utilization of several individuals but related logical components: Profiles, Objects, Fields, and Authorizations. The user ID refers exclusively to profiles. Each profile grants a set of specific system access authorizations to user. Figure 2 illustrates the hierarchical authorization concept in SAP. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;span style="font-family: Arial;"&gt;            &lt;b&gt;             &lt;p align="center"&gt;             &lt;img src="http://www.thespot4sap.com/images/BC_Authorization_Concept.gif" width="574" height="347" /&gt;&lt;/p&gt;             &lt;p align="center"&gt;Figure 2&lt;/p&gt;             &lt;strong&gt;                          &lt;/strong&gt;             &lt;p&gt;&lt;a name="_Toc16661168"&gt;2.2 Composite Profiles&lt;/a&gt;&lt;/p&gt;             &lt;/b&gt;             &lt;/span&gt;&lt;p align="justify"&gt;&lt;span style="font-family: Arial;"&gt;&lt;span style="font-size: 85%;"&gt;Composite profiles refer to the various employee roles available in the corporation (for instance: Purchasing / Receiving Clerk or Accounts Agent). As the name suggests, composite profiles may contain multiple user IDs necessary to perform all the business operations associated with a particular role. A composite profile may encapsulate another composite profile(s). In practice, a model composite profile should be recognized for each possible role in the organization, which may be used to produce hybrid composite profiles. The over-existence of the hybrids can defy the very purpose of composite profiles and they should be created only when specific needs arise.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;span style="font-family: Arial;"&gt;            &lt;b&gt;             &lt;p&gt;&lt;a name="_Toc16661169"&gt;2.3 User Ids&lt;/a&gt;&lt;/p&gt;             &lt;/b&gt;             &lt;/span&gt;&lt;p align="justify"&gt;&lt;span style="font-family: Arial;"&gt;&lt;span style="font-size: 85%;"&gt;User ids allow access to SAP applications. Each user must have a corresponding profile specifically assigned. In many situations, multiple composite profiles can be assigned to a user ID, depending on the role(s) an individual user is responsible for, in the business processes.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;span style="font-family: Arial;"&gt;            &lt;b&gt;             &lt;p&gt;&lt;a name="_Toc16661170"&gt;2.4 Authorizations&lt;/a&gt;&lt;/p&gt;             &lt;/b&gt;             &lt;/span&gt;&lt;p align="justify"&gt;&lt;span style="font-family: Arial;"&gt;&lt;span style="font-size: 85%;"&gt;Authorizations are the key building blocks of SAP security. Authorization is the process of assigning values to fields present in authorization objects. In SAP, access to all system functionality is achieved through a complex array of authorizations. Sometimes users find that they lack the necessary authorizations to perform a certain function in the system, in which case the message: "You are not authorized..." is displayed at the bottom of the screen.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;span style="font-family: Arial;"&gt;            &lt;/span&gt;&lt;p&gt;&lt;span style="font-family: Arial;"&gt;&lt;span style="font-size: 85%;"&gt;An authorization process may ask for second associated authorization process which in turn asks for third and so on. For example, the task of paying a vendor invoice may require 10 different authorizations. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>SAP’s TCODE checks with the authorization tool</title><link>http://allsapbasis.blogspot.com/2009/03/saps-tcode-checks-with-authorization.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:17:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-833368603655986155</guid><description>&lt;p&gt;&lt;strong&gt;What are the checks that the &lt;span class="caps"&gt;SAP&lt;/span&gt; authorization tool performs when a &lt;span class="caps"&gt;TCODE&lt;/span&gt; is executed in order to ensure authorization of that user?  &lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;&lt;span class="caps"&gt;EXPERT RESPONSE&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;When initiating a transaction, a system program performs a series of checks to ensure the user is authorized.&lt;/p&gt;   &lt;p&gt;1. The program checks whether the transaction code exists in table &lt;span class="caps"&gt;TSTC&lt;/span&gt;.&lt;/p&gt;   &lt;p&gt;2. The program checks whether the transaction code is locked by the administrator (transaction code &lt;span class="caps"&gt;SM01&lt;/span&gt;).&lt;/p&gt;   &lt;p&gt;3. The program checks whether the user has the authority to start the transaction. Authorization object S_TCODE (transaction start) contains the authorization field &lt;span class="caps"&gt;TCD &lt;/span&gt;(transaction code). The user must have the appropriate authorization for the transaction code to be started (for example, &lt;span class="caps"&gt;FK01&lt;/span&gt;, Create Vendor).&lt;/p&gt;   &lt;p&gt;4. The program checks whether an authorization object is assigned to the transaction code. If this is the case, the program checks whether the user has an authorization for this authorization object. The transaction code/authorization object assignment is stored in table &lt;span class="caps"&gt;TSTCA&lt;/span&gt;.&lt;br /&gt;&lt;strong&gt;Note: &lt;/strong&gt;An &lt;span class="caps"&gt;SAP&lt;/span&gt; program controls steps 1 through 4. It displays an automatic message to the user if an authorization attempt fails in the step.&lt;/p&gt;   &lt;p&gt;5. The system performs authorization checks in the &lt;span class="caps"&gt;ABAP&lt;/span&gt; program using the &lt;span class="caps"&gt;ABAP&lt;/span&gt; statement &lt;span class="caps"&gt;AUTHORITY&lt;/span&gt;-CHECK.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Listing TCODE transactions used to view what users are logged in to SAP</title><link>http://allsapbasis.blogspot.com/2009/03/listing-tcode-transactions-used-to-view.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:17:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-1041332222395773195</guid><description>&lt;p&gt;&lt;strong&gt;I want to get a list of all transactions used per user in a specific time period. Basically I’m looking for a list of all users logged in &lt;span class="caps"&gt;SAP&lt;/span&gt; and the details of the tcodes they used. Is there any standard report or tcode available to view this info?  &lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;&lt;span class="caps"&gt;EXPERT RESPONSE&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;There is no standard transaction. The information is available for configurable time periods using transaction &lt;span class="caps"&gt;ST05N&lt;/span&gt; but it is not organized to readily provide a report of users and transactions. Also the information available summarizes a user’s use of a transaction. There will be one entry (with count data) per user per time period. Daily, weekly and monthly summaries can be created and they are stored for configurable durations.&lt;br /&gt;The information is summarized into a cluster table called &lt;span class="caps"&gt;MONI&lt;/span&gt; based on the &lt;span class="caps"&gt;STAT&lt;/span&gt; files that are written in the file system and regularly refreshed. &lt;span class="caps"&gt;MONI&lt;/span&gt; cannot be queried via &lt;span class="caps"&gt;SE16&lt;/span&gt; etc., but &lt;span class="caps"&gt;SAP&lt;/span&gt; delivers a number of function modules that retrieve data from these tables.&lt;/p&gt;   &lt;p&gt;It is also possible to configure audit logging via &lt;span class="caps"&gt;SM19&lt;/span&gt; and read the log files via &lt;span class="caps"&gt;SM20&lt;/span&gt;. This will provide more detail but it also introduces new file management issues and requires a change to system settings.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Authorization Check</title><link>http://allsapbasis.blogspot.com/2009/03/authorization-check_11.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:17:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-9120229017246933516</guid><description>&lt;p&gt;The following actions are subject to authorization checks that are performed&lt;br /&gt;before the start of a program or table maintenance and which the &lt;span class="caps"&gt;SAP&lt;/span&gt;&lt;br /&gt;applications cannot avoid:&lt;/p&gt;   &lt;p&gt; Starting &lt;span class="caps"&gt;SAP&lt;/span&gt; transactions (authorization object S_TCODE)&lt;br /&gt; starting reports (authorization object S_PROGRAM)&lt;br /&gt; Calling &lt;span class="caps"&gt;RFC&lt;/span&gt; function modules (authorization object S_RFC)&lt;br /&gt; Table maintenance with generic tools (S_TABU_DIS)&lt;/p&gt;   &lt;p&gt;The authorization objects S_TCODE, S_PROGRAM, S_RFC, and S_TABU_DIS&lt;br /&gt;are standard &lt;span class="caps"&gt;SAP&lt;/span&gt; provided.&lt;br /&gt;Creating a new authorization object is not in the scope of &lt;span class="caps"&gt;ABAP&lt;/span&gt; developer. It will&lt;br /&gt;be taken care by &lt;span class="caps"&gt;SAP BASIS&lt;/span&gt; team.&lt;/p&gt;  This is a preview of &lt;q&gt;Authorization Check:&lt;/q&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>SAP BASIS (BC) Authorization Concepts</title><link>http://allsapbasis.blogspot.com/2009/03/sap-basis-bc-authorization-concepts.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:16:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-2687610844762751697</guid><description>&lt;p&gt;&lt;strong&gt;&lt;span class="caps"&gt;SAP &lt;/span&gt;Authorization Concept&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;The &lt;span class="caps"&gt;SAP&lt;/span&gt; authorization concept is based upon the logical relationship between a user ID and the range of system authorizations with which it can be associated. The architecture of the authorization system is based upon the utilization of several individuals but related logical components: Profiles, Objects, Fields, and Authorizations. The user ID refers exclusively to profiles. Each profile grants a set of specific system access authorizations to user.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;Composite Profiles&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;Composite profiles refer to the various employee roles available in the corporation (for instance: Purchasing / Receiving Clerk or Accounts Agent). As the name suggests, composite profiles may contain multiple user IDs necessary to perform all the business operations associated with a particular role. A composite profile may encapsulate another composite profile(s). In practice, a model composite profile should be recognized for each possible role in the organization, which may be used to produce hybrid composite profiles. The over-existence of the hybrids can defy the very purpose of composite profiles and they should be created only when specific needs arise.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;User Ids&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;User ids allow access to &lt;span class="caps"&gt;SAP&lt;/span&gt; applications. Each user must have a corresponding profile specifically assigned. In many situations, multiple composite profiles can be assigned to a user ID, depending on the role(s) an individual user is responsible for, in the business processes.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;Authorizations&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;Authorizations are the key building blocks of &lt;span class="caps"&gt;SAP&lt;/span&gt; security. Authorization is the process of assigning values to fields present in authorization objects. In &lt;span class="caps"&gt;SAP&lt;/span&gt;, access to all system functionality is achieved through a complex array of authorizations. Sometimes users find that they lack the necessary authorizations to perform a certain function in the system, in which case the message: “You are not authorized…” is displayed at the bottom of the screen.&lt;/p&gt;   &lt;p&gt;An authorization process may ask for second associated authorization process which in turn asks for third and so on. For example, the task of paying a vendor invoice may require 10 different authorizations.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Unlocking a blocked admin user ID in an Oracle DB</title><link>http://allsapbasis.blogspot.com/2009/03/unlocking-blocked-admin-user-id-in.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:16:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-3823408673667895535</guid><description>&lt;p&gt;&lt;strong&gt;My admin user ID has been locked out. Is there a table I can update in Oracle to reset the flag and enable myself to log in?  &lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;&lt;span class="caps"&gt;EXPERT RESPONSE&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;Select all entries of table &lt;span class="caps"&gt;USR02&lt;/span&gt; where ‘UFLAG’=128. These users are locked by reason of incorrect logons. ‘UFLAG’=64 will give you the users that are blocked by Administrator. Set ‘UFLAG’ to 0, to unlock your account.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>How to Check Missing Authorisation for User</title><link>http://allsapbasis.blogspot.com/2009/03/how-to-check-missing-authorisation-for.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:15:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-5228099670979337011</guid><description>How to check the missing authorisation for the user not having the option "/nsu53 ?"&lt;br /&gt;&lt;br /&gt;You can use the following procedures to determine which authorizations a user requires to carry out a transaction:&lt;br /&gt;&lt;br /&gt;You can use Trace function, ST01, you can trace the user activity and from the log you can see the authorization missing.&lt;br /&gt;&lt;br /&gt;Start an authorization trace using the ST01 transaction and carry out the transaction with a user who has full authorizations. On the basis of the trace, you can see which authorizations were checked.&lt;br /&gt;&lt;br /&gt;This procedure generally works well. However, sometimes the result is very surprising because certain programs can and do ignore some authorization checks by using preliminary checks and buffered results. In such cases, these methods are not very effective. You can recognize these cases because certain fields of the corresponding programs are specified with * or DUMMY at some point of the authorization check.&lt;br /&gt;&lt;br /&gt;Analyzing authorization problems in an unknown program&lt;br /&gt;&lt;br /&gt;The most frequently used method to analyze authorization problems in an unknown program involves you setting the Debugger breakpoints to the AUTHORITY-CHECK and MESSAGE commands. Then execute the program and analyze its behavior.&lt;br /&gt;&lt;br /&gt;Determining all the authorizations a user has for an authorization object&lt;br /&gt;&lt;br /&gt;When troubleshooting, it is often helpful to find out all the authorizations a specified user has for a specific authorization object. A simple method of reading these authorizations as raw data from the user master record is to execute the GET_AUTH_VALUES function module in the SUSR function group. Use the SE37 transaction or SE80 in test mode to do so. The result table is not formatted for output, but is very compact and easy to understand for authorization experts.&lt;br /&gt;&lt;br /&gt;Analyzing an authorization problem that occurs for only one user&lt;br /&gt;&lt;br /&gt;It is often the case that a certain authorization problem occurs for only one specific user. This kind of authorization problem generally affects users with no Debugging authorization. If you want to assign a user Debugging authorization without changing the HR authorizations, you can add the S_A.DEVELOP authorization profile (if available) to the user’s authorization profiles. In production systems, note that changes such as these to authorizations enable users (with relevant knowledge of the development environment) to access any system data easily (especially in other clients).</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>SAP Profile Generator tables</title><link>http://allsapbasis.blogspot.com/2009/03/sap-profile-generator-tables.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-4235516876536361035</guid><description>---Original Message-----&lt;br /&gt;Subject: Profile Generator tables?&lt;br /&gt;From: Paul Ellis&lt;br /&gt;&lt;br /&gt;We maintain profiles in a Development system using Profile Generator, but only transport the authorisation profile and not the activity group to Staging/Production.&lt;br /&gt;&lt;br /&gt;We are about to refresh the Development system with a copy of Production. What tables do I need to export from Development prior to the refresh, and later re-import, to ensure that Profile Generator is able to maintain the activity groups created in Development?&lt;br /&gt;&lt;br /&gt;Thanks in advance.&lt;br /&gt;&lt;br /&gt;Paul Ellis&lt;br /&gt;&lt;br /&gt;-----Reply Message-----&lt;br /&gt;Subject: Re: Profile Generator tables? - more&lt;br /&gt;From: Mike O'Carroll&lt;br /&gt;&lt;br /&gt;oh, and maybe these tables for profile genrator stuff......&lt;br /&gt;(from top include for PFCG)&lt;br /&gt;000010 function-pool rhum.&lt;br /&gt;000020&lt;br /&gt;000030 tables: hrv1220, hrp1001, hrp1000.&lt;br /&gt;000040 tables: pchdy, pphdx, p1000,&lt;br /&gt;000050 pt1220, t77fc, t77fd.&lt;br /&gt;000060 tables: *objec, objec, *p1000.&lt;br /&gt;000070 tables: pdrhum, t77aw, t777o.&lt;br /&gt;000080 tables: xu213.&lt;br /&gt;000090 tables: t777e, usr05, tprprof.&lt;br /&gt;&lt;br /&gt;and you may need to do the same with menu tables - I'm not sure which ones&lt;br /&gt;-&lt;br /&gt;(from top include from SSM1)&lt;br /&gt;000010 function-pool smnu. "MESSAGE-ID ...&lt;br /&gt;000020 *&lt;br /&gt;000030 tables: indx, tstct, dsyax,&lt;br /&gt;000040 smenca_new, smen_obnew, smen_conew,&lt;br /&gt;000050 smenusenew, smenentnew,&lt;br /&gt;000060 smen_dates, ssm_stat, ssm_start, ssm_langu,&lt;br /&gt;000070 smensapt, smencust, smenentt,&lt;br /&gt;000080 smensapnew, smencusnew,&lt;br /&gt;000090 smenselect, t002t,&lt;br /&gt;000100 ssm_rele, smenintnew, smenintt.&lt;br /&gt;&lt;br /&gt;--------------------------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;Regards,&lt;br /&gt;Mike O'Carroll&lt;br /&gt;&lt;br /&gt;-----Reply Message-----&lt;br /&gt;Subject: Re: Profile Generator tables? (Document link: Michael O'Carroll)&lt;br /&gt;From: Michael O'Carroll/UK&lt;br /&gt;&lt;br /&gt;user masters: USR01 to 09, UST04,&lt;br /&gt;profiles: USR10, USR11, UST10S, UST10C,&lt;br /&gt;authorisations: USR12, USR13, UST12.&lt;br /&gt;password exceptions USR40.&lt;br /&gt;History tables(may not be applicable but FYI): users: USH02, USH04,&lt;br /&gt;profiles: USH10, auths USH12.&lt;br /&gt;&lt;br /&gt;activity groups are stored in table PLOGI along with loads of other object types. the activity groups are object type T.&lt;br /&gt;You could export the table data with a manual transport request via SE01, using R3TR TABU and specify the keys to use for all objects of type T(ie all activity groups). Remember to include all clients in the selection.&lt;br /&gt;&lt;br /&gt;OR, if you are using the client copy functions to refresh you DEV from PROD, then you could use the RSCCEXCT (see OSS note 70290) to list all these tables and exclude them from the copy, hence the corresponding original DEV tables should not be overwritten in DEV.&lt;br /&gt;I suggest you export a transport request with with all these tables from DEV just in case, so you can re-import them again if it goes pear shaped.&lt;br /&gt;In 3.x I don't think the activity group names involve client number or SID, but I've heard some differences in 4.6 - Guy Holchester has sent many notes to the list about it - have a look at the archives, but I think as long as you aren't copying between different versions (eg from Prod 4.6 to Dev 3.x, or vice versa) then it should be OK.&lt;br /&gt;&lt;br /&gt;If you choose to re-import the tables from transport requests, you might want to run the sync tool in the target client (DEV) afterwards - ie run function module SUSR_SYNC_USER_TABLES, or run SU30, just to check for any dodgy links or inconsistencies.&lt;br /&gt;&lt;br /&gt;Also, if you are re-importing user masters too, run RSSODELT and RSSOUSER to recreate all SAPOffice mailboxes and link them to the new user IDs in the target client.&lt;br /&gt;&lt;br /&gt;hope this helps.&lt;br /&gt;cheers,&lt;br /&gt;Mike&lt;br /&gt;&lt;br /&gt;-----Reply Message-----&lt;br /&gt;Subject: Re: Profile Generator tables?&lt;br /&gt;From: Kenneth Marquardt&lt;br /&gt;&lt;br /&gt;I would use RHMOVE30 and create a transport of your activity groups. To be safe test import the activity groups to QAS prior to refreshing DEV with PRD. Then once you have completed the refresh import the transport you created. For more info on this look at the Authorization is made easy guide available online on page 11-6 release 4.0b.&lt;br /&gt;&lt;br /&gt;Remember to run SUPC after you import to regenerate the profiles.&lt;br /&gt;&lt;br /&gt;-----End of Reply Message-----</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Query About Tcode PFCG</title><link>http://allsapbasis.blogspot.com/2009/03/query-about-tcode-pfcg.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-869219681982510715</guid><description>1. How to check the name of all users who has been authorised to use a particular transaction? I am trying to find through SUIM, but failing to find the name or total number of users of a particular t-code say SPRO.&lt;br /&gt;&lt;br /&gt;2. I know that a particular transaction say SPRO is available in a particular role and I want to remove that t-code from that role. But I am unable to find that node through PFCG. If I am using the search for a t-code inside menu tab after putting the edit mode it is not coming in PFCG, but through SUIM its existence is coming in that role. That particular role contains a lot of t-code and reports, say about 2000.&lt;br /&gt;&lt;br /&gt;1. Goto SUIM and select USER node, then select USERS BY COMPLEX SELECTION CRITERIA node then execute BY TRANSACTION AUTHORIZATION report then give the Tran. code and it will return you the number of users having that trans with relevatn details.&lt;br /&gt;&lt;br /&gt;Follows these steps :-&lt;br /&gt;&lt;br /&gt;-  Go to SUIM .&lt;br /&gt;-  Choose Roles --&gt; By Transaction assignment.&lt;br /&gt;-  Enter Transaction : "SPRO"&lt;br /&gt;-  Choose execute.&lt;br /&gt;-  Double click on  a role in which you want to remove "SPRO" authorisation.&lt;br /&gt;-  Click on pen mark to change into change mode.&lt;br /&gt;-  Go to tab "Authorization"&lt;br /&gt;-  Choose change authorization data.&lt;br /&gt;-  Choose Utilities --&gt; Technical names on .&lt;br /&gt;-  Choose --&gt; cross application authorization objects--&gt;&lt;br /&gt;- Expand the selection for Object "s_tcode" , under the corresponding profile look the values maintained for "TCD" and remove value "SPRO" from the list to eliminate the authorization.&lt;br /&gt;- Don't forget to regenerate profiles.&lt;br /&gt;&lt;br /&gt;2. You should able to find this via menu tab otherwise try to do this in authorization tab --&gt; change authorization data by search.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>How To Compare The Roles</title><link>http://allsapbasis.blogspot.com/2009/03/how-to-compare-roles.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-306458786121823208</guid><description>How to compare the roles where created or defined in two different systems?&lt;br /&gt;&lt;br /&gt;For role comparision both the roles must be in the same system, in same client&lt;br /&gt; &lt;br /&gt;Transaction code SUIM -&gt; Comparision-&gt; Roles&lt;br /&gt; &lt;br /&gt;If the roles are in different system, then tranport the role into one of the system and do comparision. If no transport connection defined then, you can use the upload and download option in the PFCG&lt;br /&gt;&lt;br /&gt;Steps for Role Comparing:&lt;br /&gt;&lt;br /&gt;1. Run the t-code SUIM&lt;br /&gt; &lt;br /&gt;2. Go To Comparison and select the option of roles&lt;br /&gt; &lt;br /&gt;3. Click on Across systems option it will give option to select the sys name under Remote Comparison there enter the SYS ID between which system you want to do comparison and put the role name in compare role section then execute it will give you the result.&lt;br /&gt; &lt;br /&gt;4. If there is any difference b/wn the t-codes it will b in red colour otherwisein yellow.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Creating New User With Authorizations</title><link>http://allsapbasis.blogspot.com/2009/03/creating-new-user-with-authorizations.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-4936857811898217166</guid><description>I want to create new user for SAP module. I am having user id as sap* (someone has said that this is super user id); when I login with this id and go to IMG for configurations. A message is displayed that I am not authorised to change the details with sap* user.&lt;br /&gt;&lt;br /&gt;What is the procedure for creating new user which have all features define under SAP* user and which could allow me to make the configruations.&lt;br /&gt;&lt;br /&gt;Creating new user with superuser authorizations.&lt;br /&gt;&lt;br /&gt;1. Goto SU01 --&lt;br /&gt;   username : sapuser&lt;br /&gt;   |--&gt;Create.&lt;br /&gt;&lt;br /&gt;2. In default settings, give&lt;br /&gt;                           :Mr&lt;br /&gt;  first name          : sap&lt;br /&gt;  lastname            : user&lt;br /&gt;&lt;br /&gt;3. Goto next tab,&lt;br /&gt;    give       initial password  :1234&lt;br /&gt;               repeat password : 1234&lt;br /&gt;&lt;br /&gt;4. Goto profiles.&lt;br /&gt;   type-    sap_all     (say enter)&lt;br /&gt;               sap_new   (say enter)&lt;br /&gt;   Then save....&lt;br /&gt;   See the message in status bar,  (user created successfully)&lt;br /&gt;&lt;br /&gt;5. Login with the new user. change the password. now this user contains all superuser authorizations.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item><item><title>Introduction on Authorizations</title><link>http://allsapbasis.blogspot.com/2009/03/introduction-on-authorizations.html</link><category>Authorization</category><pubDate>Wed, 11 Mar 2009 12:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5145705497958932767.post-861186128087760163</guid><description>&lt;ul&gt;&lt;li&gt; Authorization objects enable complex checks of an authorization, which allows a user to carry out an action. An authorization object can group up to &lt;strong&gt;10 authorization fields&lt;/strong&gt; that are checked in an AND   relationship.   &lt;/li&gt;&lt;li&gt;For an authorization check to be successful, all field values of the authorization object must be maintained accordingly. The fields in an object should not be seen as input fields on a screen. Instead, fields should be regarded as system elements, such as infotypes, which are to be protected. &lt;/li&gt;&lt;li&gt;You can define as many system access authorizations as you wish for an object by creating a number of allowed values for the fields in an object. These value sets are called &lt;strong&gt;authorizations&lt;/strong&gt;. The system checks these   authorizations in &lt;strong&gt;OR&lt;/strong&gt; relationships. &lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>softwaredownload.webworld@gmail.com (Software Download)</author></item></channel></rss>