Extract Authorizations
This workflow is called by the Security Impact Analysis workflow, which provides it with a list of transactions from either the Source or Target system, and a list of distinct SAP roles obtained from the transports to be analyzed. The workflow returns the authorization details for each transaction that is enabled by one of the roles. The results are stored in the Combined Auths and Tcodes Table dataset, which has the following columns:
Column | Description |
---|---|
ROLE | An SAP role from the transport set. |
OBJECT | Authorization object. |
FIELD | Authorization field name. |
LOW | ‘Low’ authorization value. |
HIGH | ‘High’ authorization value. |