Extract Authorizations

This workflow is called by the Security Impact Analysis workflow, which provides it with a list of transactions from either the Source or Target system, and a list of distinct SAP roles obtained from the transports to be analyzed. The workflow returns the authorization details for each transaction that is enabled by one of the roles. The results are stored in the Combined Auths and Tcodes Table dataset, which has the following columns:

Column Description
ROLE An SAP role from the transport set.
OBJECT Authorization object.
FIELD Authorization field name.
LOW ‘Low’ authorization value.
HIGH ‘High’ authorization value.