
This lesson covers the use of standard authorization tracing strategies, focusing on tools like SU53, ST01, STAUTHTRACE, and STUSERTRACE to support the specification and assignment of standard authorizations.
Objective
This lesson covers the use of standard authorization tracing strategies, focusing on tools like SU53, ST01, STAUTHTRACE, and STUSERTRACE to support the specification and assignment of standard authorizations.
In the absence of documentation or encountering failed authorization checks during transaction execution, use the following methods to determine the required SAP standard authorizations:
The Authorization Error Analysis using transaction SU53.
System Trace using transaction ST01 executes a trace tool that exists in all ABAP-based systems.
One function of this tool is acting as a trace for all SAP-provided authorization objects.
System Trace using transaction STAUTHTRACE.
Note
Analysis Authorizations can only be traced in transaction RSECADMIN
.
Users can use transaction SU53 to analyze an access-denied error in their system that just occurred. They can call transaction SU53 in any session, not just the session in which the error occurred.
Using SU53, you can analyze which authorizations are missing and pass this information to the authorization administrator.
If there are many active users and many failed authorization checks, the number of checks and the period covered can be decreased for a user.
Note
The display is reset if the user logs on again.
The display is not refreshed if a new error occurs. It is only updated if transaction SU53
is called again.
The user can also use transaction SU56 to view which authorizations are currently in the buffer.
If a user is unable to perform an action, and the authorization error analysis shows the message "All authorization checks have been successful". Then the issue lies elsewhere, not with authorization.
If transaction SU53 does not provide a satisfactory result, the following further system trace options can be used: ST01 and STAUTHTRACE.
The system trace allows you to record internal SAP system activities. The system trace is primarily used when an authorization trace is required. Apart from authorization checks, the following components can be monitored using the system trace: kernel functions, kernel modules, database accesses, table buffers, RFC calls, and lock operations.
For the ST01 system trace, ensure the trace and transaction being traced are on the same application server.
Using the ST01 System Trace, you can analyze authorizations as follows:
Choose the Authorization Check trace component.
To restrict the trace function to your own or to another user, choose General Filter.
Enter the user ID to be traced in the Trace for user only field in the displayed dialog box.
To start the trace, choose Trace on.
The user to be traced executes the relevant system actions.
Choose Analysis.
Maintain the Options for Trace Analysis to narrow the analysis result.
Choose Start Reporting.
Analyse the trace result.
Analysis highlights successful checks in a darker shade and failed checks in a lighter shade.
A return code of "0" (dark green) indicates successful checks, while other codes such as "12" and "4" signify errors.
Double-click on a relevant entry for more details on a specific security check in the trace log.
Once you have completed the analysis, choose Trace off.
The System Trace for Authorization Checks (transaction STAUTHTRACE) provides an optimized user interface to trace authorization checks. It works in the same way as the system trace (transaction ST01) but is solely for performing authorization checks.
STAUTHTRACE tool usage notes:
Using the STAUTHTRACE Authorization Checks, you can analyze authorizations as follows:
Once you have completed the analysis, deactivate the trace by choosing Deactivate Trace.
The advantages of STAUTHTRACE compared to the ST01 transaction are as follows:
Note
For more information please refer to SAP NOTE 2577291 - How to get trace of authorization checks using transaction STAUTHTRACE.This long-term trace collects client-specific and user-specific authorization data and stores it in the database. During the execution of a program, every authorization check is recorded once for each user with the first time stamp, together with the name and type of the running application, the point in the program, the authorization object, the checked authorization values, and the result.
Trace data aids in maintaining authorization default values and authorizations, especially for users with specific tasks or unique objects like communication users in RFC scenarios.
Note
Refer to SAP Note 2220030 - STUSERTRACE: User trace for authorization checks for more details.
In this video, you learn which authorizations are necessary for loading data into a DataStore Object advanced.
Transactions | Description |
---|---|
PFCG | Role Maintenance |
SU01 | User Maintenance |
SU02 | Maintain Authorization Profiles |
SU03 | Edit Authorizations in Profiles |
SU10 | User Mass Maintenance |
SU21 | Maintain Authorization Objects |
SU24 | Maintain Authorization Default Values |
SU53 | Evaluate Authorization Check |
SU56 | Analyze User Buffer |
SUIM | User Information System |
ST01 | System Trace |
STAUTHTRACE | System Trace for Authorization Checks |
STUSERTRACE | User Trace for Authorization Checks |
SE93 | Maintain Transaction (List of Transactions) |
Tables | Description |
---|---|
TOBJ | Authorization Objects and their Fields |
AGR_1251 | Roles with Authorization Objects and Authorizations |
AGR_USERS | Assignment of Roles to Users |
AGR_PROF | Profile Name for Role |
AGR_TCODES | Transactions in Roles |
AGR_* | Many more tables for Roles |
UST12 | Profiles with Authorization Objects and Authorizations |
TACT | Activities which can be protected |
Log in to track your progress & complete quizzes