Prerequisites, Scope and Considerations Jan 2013 UI Field Level Security.

Slides:



Advertisements
Similar presentations
Travel and Expense Management Scenario Overview
Advertisements

Module 4: System Maintenance Intuit Financial Services University Internet Banking Certification Training.
© 2010 Bennett, McRobb and Farmer1 Use Case Description Supplementary material to support Bennett, McRobb and Farmer: Object Oriented Systems Analysis.
Page 1 Customer Platform: Basic Services Intuit Financial Services University Business Banking Certification Training.
Hidden Features. What will we cover 16 hidden features for Admins Bonus: –2 hidden features for Employers –Live examples!
5/15/2012. An OARRS Account Administrator is the person(s) who approves the personnel from your jurisdiction or agency to have access to the system. Each.
1 Payables Efficiency Through… Access Online PAYMENT PLUS.
©© 2013 SAP AG. All rights reserved. Request-to-Resolve Scenario Overview Handling an Incoming Customer Inquiry Creating, Assigning, and Resolving a Service.
Protect Yourself from Your Customer Kristin A. Stedman, AAP Senior Vice President Education Services 1 © 2014 TACHA. All Rights Reserved.
Introduction to the ABAP Data Dictionary
Better Maintenance of the Schedule of Classes Through Customization and Security.
Travel and Expense Management Scenario Overview
Copyright © 2003 Americas’ SAP Users’ Group Custom Archiving 101 Session Code 108 Karin Tillotson Sr. Basis Administrator Tuesday, May 20 th, 2003.
Guide to Oracle10G1 Introduction To Forms Builder Chapter 5.
 SAP AG CSU Chico 102/14/981SAP Security Lecture MINS 298C SAP Configuration & Use: Security Copyright 1996, 1997, James R. Mensching, Gail Corbitt.
A Guide to Oracle9i1 Introduction To Forms Builder Chapter 5.
Chapter 3: System design. System design Creating system components Three primary components – designing data structure and content – create software –
Employee Central Presentation
SABAL SHRESTHA SHERIF HALAWA SHAMA KHADPEKAR JIANWEI LAI SI TRAN GROUP A Tri-Airport Shuttle System.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Role of Account Management at ERCOT Market Participant Identity Management Overview (MPIM)
Access 2007 Database Application Managing Business Information Effectively BCIS 1 and 2.
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
Module Two Business Partners
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
1 Team Leader TKS Job Aid. 2 Viewing the On-line Presentation If you are viewing this presentation via Internet Explorer for best results resize the “Notes”
Jan Hatje, DESY CSS ITER March 2009: Alarm System, Authorization, Remote Management XFEL The European X-Ray Laser Project X-Ray Free-Electron.
July 2010 Staffing Release Friday, March 5, 2010.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
R 29 G 115 B 176 R 69 G 153 B 195 R 0 G 51 B 153 R 190 G 26 B 38 R 234 G 40 B 57 R 255 G 121 B 1 R 155 G 238 B 255 R 146 G 212 B 0 R 205 G 234 B 247 R.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
COMPONENT INTERFACE By, Mr. Srinivas.. What is Component Interface? A means to access the PeopleSoft application without using the PeopleSoft pages. It.
E-COMMERCE JOBS This project (Project number: HU/01/B/F/PP ) is carried out with the financial support of the Commssion of the European Communities.
DEMO - 8/14/2007. R2 Feature List ReceiveDocumentBatch Web Service SendPESCAcknowledgment Web Service Validate Acknowledgment Upload Acknowledgment Transcript.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
© 2005 Avaya Inc. All rights reserved. Avaya – Proprietary Restricted IP One New System Promotional Program for S8300 systems One System, One Quick Pricing.
The Project – Database Design. The following is the high mark band for the Database design: Analysed a given situation and produced and analysed a given.
First in Service -Best in Banking Pavan Anna Shirish Nadella Maneeshpal Bandlamudi.
Jan Hatje, DESY CSS GSI Feb. 2009: Alarm System, Authorization, Remote Management XFEL The European X-Ray Laser Project X-Ray Free-Electron.
User Management. Basics SDMS shall maintain a database of all users. SDMS shall maintain a database of all users. SDMS shall not limit the number of registered.
ITGS Databases.
Enterprise Integrator CISTECH R7.8 SERIES Denise Luther Senior Consultant, Technical Services
1 Command Control and Monitor CL Commands. 2 Command- The Need CL commands control nearly all IBM functionality Monitoring, controlling and logging CL.
R7 Integrator and Enterprise Integrator: You won’t believe this is XA… Deborah Vermillion, VP Consulting Services, CPIM, CIRM Belinda Daub, Senior Consultant.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
3 Copyright © 2010, Oracle. All rights reserved. Product Data Hub: PIM Functional Training Program Setup Workbench Fundamentals.
SAP DEVELOPMENT BASICS Bohuslav Tesar. TRAINING OVERVIEW Amazing life of ABAP developer ;) SAP introduction ABAP basics ABAP Reporting.
Computer Security: Principles and Practice
Matthias Clausen, Jan Hatje, DESY CSS Overview – Alarm System and Management CSS Overview - GSI, 11 Februrary CSS Overview Alarm System and CSS.
SAP - CRM. SAP - CRM CRM One Order Model CRM One Order concept. layers of one order framework Function modules in the one order framework Table Relationship.
1 Copyright © 2009, Oracle. All rights reserved. I Course Introduction.
Oracle Business Intelligence Foundation – Testing and Deploying OBI Repository.
Personal Expense Tracker Ajmera Aneri S. ( ) Developed At : Developed By :
Purchase Order Creation Manually or automatically With or without reference to other documents Data Documents: Purchase requisition, Purchase order, RFQ,
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
17 Copyright © 2006, Oracle. All rights reserved. Information Publisher.
Reports and Graphs Chapter 5. PAGE REF #CHAPTER 5: Reports and Graphs SLIDE # 2 Objectives Describe several types of QuickBooks reports Set QuickBooks.
Presented by [Harshit Agrawal] 04/03/2017
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
To the OASIS Work in Progress Online Training Course
Sr. Quality Engineering Manager,
EFT for Payables Elaine Foley EFT for Payables is a hole in one!
Presentation transcript:

Prerequisites, Scope and Considerations Jan 2013 UI Field Level Security

©2012 SAP AG. All rights reserved.2 UI Field Level Security Pre-requisites  SAP BASIS 700 (SP 14)/ 702 (SP 09)  SAP_APPL 600 (SP 11)/ 605 (SP 05)  SAP_HR 600 (SP 22)/ 600 (SP 45) Feature Considerations  The data element is generated for character type fields, date and currency (with restrictions) fields but the field must not be/have a  Primary key  Foreign key relationship  Input help, search help or check table  Standard conversion exit  UI Masking solution supports single currency formatting in general. There are limited number of transactions and fields for which multiple currency formatting has been enabled (kindly refer SAP Note for more details).

©2012 SAP AG. All rights reserved.3 UI Field Level Security - Scope  In ALV data display, data is masked in ‘Display’ and ‘Edit’ mode for unauthorized users. However, the masked data column shall be changed into display mode for unauthorized users if the ALV is in ‘Edit’ mode.  In “Table Control” data display, data is masked in ‘Display’ mode for unauthorized users. However, the masked data column shall be hidden for unauthorized users if table control is in ‘Edit’ mode. Note: Table Control data masking needs to be analyzed as masking solution does not provide complete coverage.  The masking pattern can be set for character type fields. For e.g. Bank Account Number can be displayed as ‘**18**’ or ‘&&&&&&’ based on the configured masking pattern. The masking pattern for ‘date’ or ‘currency’ field will be taken as ‘*’ for the entire field length.  User Interface Field Security logs data when the user accesses the registered fields (masking configuration). The functionality is provided to archive the User Interface (UI) Logs from the UI Log table to the archive files.  Configure the ‘critical’ database table in the UI Masking Configuration which allows only authorized users to see the data in SAP Transactions SE11, SE12, SE16, SE16N, DB02 and ST04. Note: DB02/ ST04 functionality for customer’s on Oracle database only.

©2012 SAP AG. All rights reserved.4 UI Field Level Security - Scope  UI Masking configuration allows maintenance of role assignment for every table-fieldname to check the user authorization. A user assigned to this role is authorized to see the unmasked data. In case, someone tries to change the critical role(configuration) then an notifications will be triggered to a configured administrator. Note: Notification will be triggered using SAP standard configurations. Customer specific mail subject and mail content can be created through BADI implementation.  The unauthorized users must not be allowed to create the data in the ‘create’ transactions if it contains any masked field(for instance XD01, FK01, etc). For e.g. User can have an authorization to create new ‘Customer’ via SAP Transaction ‘XD01’ but user does not have authorization to access ‘Bank Account Number’ of the customer.  Specific masking scenarios delivered in the solution via standard program modifications will be covered in the next slides.

©2012 SAP AG. All rights reserved.5 UI Field Level Security – Special Consideration  1. Bank Account Number (BANKN)  The masking functionality is delivered for the Bank Account Number in the following scenarios:-  For Table- LFBK & KNBK; Field- BANKN, standard program modifications are delivered for SAP Transactions XD02, XD03, MK02, MK03, FK02, FK03, XK02, XK03, FD02 & FD03 to mask/ hide the number for unauthorized users.  For Table- LFBK, KNBK, TIBAN; Field- BANKN: The Bank Account Number is masked for unauthorized users in SAP Transactions SE11, SE12, SE16, SE16N.  The column IBAN and IBAN Value will be hidden in ‘Display’ and ‘Edit’ mode for unauthorized users in SAP Transactions XD02, XD03, MK02, MK03, FK02, FK03, XK02, XK03, FD02 & FD03. An authorization will be required for Bank Account Number in the specified transactions to access the unmasked IBAN value.

©2012 SAP AG. All rights reserved.6 UI Field Level Security – Special Consideration  Note: The data is masked in ‘Display’ mode for unauthorized users but data column will be hidden in ‘Edit’ mode for Bank Account Number. This is applicable for mentioned SAP Transactions except SE11, SE12, SE16, SE16N.

©2012 SAP AG. All rights reserved.7 UI Field Level Security – Special Consideration  2. Credit Card Number (CCNUM)  The masking functionality is delivered for the Credit Card Number in the following scenarios:-  For Table- VCNUM; Field- CCNUM: The Credit Card Number is masked for unauthorized users in SAP Transactions XD02 & XD03. In Edit mode, “Unmasked Card” button is hidden for unauthorized users.  For Table- VCNUM, VCKUN; Field- CCNUM : The credit card number is masked for unauthorized users in SAP Transactions SE11, SE12, SE16, SE16N. Note: The data is masked in ‘Display’ mode for unauthorized users but data column will be hidden in ‘Edit’ mode for Credit Card Number. This is applicable for mentioned SAP Transactions except SE11, SE12, SE16, SE16N.

©2012 SAP AG. All rights reserved.8 UI Field Level Security - Special Consideration  3. Korean Supplement (Tax Number STCD1)  In SAP Transactions XD02, XD03, MK02, MK03, FK02 & FK03, Tax Number (STCD1 within ‘Korean Supplement’) will be hidden for unauthorized users in ‘Display’ and ‘Edit’ mode.  In SAP Transactions BP & BUG2, Tax Number will be hidden in ‘Edit’ mode and masked in ‘Display’ mode for unauthorized users.  Note: Tax Number column is hidden for unauthorized users.

©2012 SAP AG. All rights reserved.9 UI Field Level Security - Special Consideration  4. Communication Data  In SAP Transactions XD02, XD03, MK02, MK03, FK02 & FK03, ‘Preview’ button will be disabled for unauthorized users in ‘Display’ and ‘Edit’ mode. The preview functionality will be disabled if any of the following characteristics are active for masking: o Name, City, Post Code, Street or Country.  In ‘Edit’ mode, communication data such as Telephone Number, and Fax number will be hidden for unauthorized users.

©2012 SAP AG. All rights reserved.10 UI Field Level Security - Conclusion  The customer’s masking field list MUST be analyzed to verify the technical feasibility of the solution. The customer fields not covered within the technical feasibility will be considered as separate development request for the customer.

Thank You