Impact for Security app

The Impact for Security app assesses the impact of applying a set of transports containing SAP roles from a source system to a target system.

A user with LiveCompare Editor privileges must prepare this app by making sure that performance history data is available for the ‘System 2’ RFC Destination. See the ‘Prerequisites’ section below for details.

Prerequisites

Before running the Impact for Impact for Security app for the first time, you will need to make sure that performance history data is available on the RFC Destination selected for the ‘System 2’ system. Select the RFC Destination in the LiveCompare hierarchy and click the PHD tab. Select the source for performance history data, and if necessary the number of months of data to retrieve, then click ‘Update Data’. The performance history data may also be retrieved using a schedule. See the Retrieve performance history data help topic for details.

DevOps categories

Testing.

Run the app

To run the Impact for Security app, select the app from the Apps screen and create an app variant. Set the ‘System 1’ field to the RFC Destination for the source system, and the ‘System 2’ field to the RFC Destination for the target system. Edit the ‘Transport/s Containing Auth Roles’ table to provide a list of transports to be analyzed.

Click ‘Run’. When the variant has completed, its results may be accessed from the App Cockpit screen.

App results

The Impact for Security app generates a Dashboard report which includes the following charts:

  • The ‘Assigned Roles Impact’ pie chart provides a summary of the roles that would be changed as a result of applying the transports to the target system, and the roles that would remain unchanged.
  • The ‘Account Impact’ column chart provides a summary of the SAP accounts that would be impacted as a result of applying the transports to the target system.

The Dashboard report also includes links to the following reports:

Distinct Role Differences

This HTML report contains a distinct list of roles which are different on the source and target systems.

Role, User Accounts

This HTML report contains a list of roles from the target system, and their associated user accounts.

Excel Report

This report includes details for the most impacted accounts, the impacted accounts, the transports affecting security, and the distinct role differences.

Analysis Input Data

This Excel report contains a copy of the input parameters used to produce the app’s Dashboard report. The value of each input parameter is stored in a separate worksheet, which is named after the parameter whose value it contains.

Standard apps