The technical separation of general and structural authorization profiles can cause context problems for users who perform different roles in a company. This is because you cannot simply add any number of structural and general authorization profiles required for different tasks in different contexts without overriding an authorization.
Consider a user who is a manager in the Accounting department. The user must be authorized to edit infotypes 0000 through 0007 of all the employees in the department. This user is also a manager for another organizational structure, Payroll. The user must have access to all payroll-relevant infotypes (0008 and 0015) for the employees in this organizational structure.
You cannot map the structural and general authorizations for such a user without the context solution because there is no relationship between a user’s structural profile and basis authorization. The missing relationship leads to overriding.
Context Problems in HR Authorizations (2)
You cannot create an assignment between a user’s specific structural profile (here, for example, structural profile 2) and a specific general profile (profile 2 with P_ORGIN).
The structural profiles (that is, the set of objects) and the general profiles (in this case, using P_ORGIN) are added to result in the overall profile. In the example shown in the figure, the manager has full read and write authorization for all objects from both the structural profiles.
When the authorization profiles are added, the following overall profile is produced:
- All employees in the manager’s team and organizational structure
- Full read and write authorization for infotypes 0000 to 0008 and for 0015
If you use a separate user for each context, it is easier to map different contexts or roles with the correct authorizations. For example, if the manager wants to perform activities as an accounting manager, the manager uses manager's user name. If the manager wants to perform the role of a payroll manager, the manager uses a second system user with the respective authorizations.
You may need many users to map the user-specific contexts in your organization. Therefore, the context solution has been developed for HR master data.