25
SAP Library 12.11.2013 Master Data Governance Security Guide 70 1 Master Data Governance Security Guide PUBLIC Document Version: 01.08 2014

Master Data Governance Security Guidearchive.utopiainc.com/images/pdf/Help-Portal-MDG...SAP Library 01.08.2014 Master Data Governance Security Guide 70 6 Data can be displayed without

  • Upload
    others

  • View
    11

  • Download
    2

Embed Size (px)

Citation preview

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 1

    Master Data Governance Security Guide

    PUBLIC Document Version: 01.08 2014

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 2

    Copyright © Copyright 2013 SAP AG. All rights reserved.Portions © Copyright 2014 Utopia Global, Inc. All rights reserved.SAP Library document classification: PUBLIC

    No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG and/or Utopia Global, Inc.. The information contained herein may be changed without prior notice.

    Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary.

    These materials are provided by SAP AG and its affiliated companies (“SAP Group”) for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.

    SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Utopia Global, Inc products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Utopia GLobal, Inc. in the United States of America

    Please see http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark for additional trademark information and notices.

    http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 3

    Icons in Body Text Icon Meaning

    Caution

    Example

    Note

    Recommendation

    Syntax

    Additional icons are used in SAP Library documentation to help you identify different types of

    information at a glance. For more information, see Help on Help General Information Classes and Information Classes for Business Information Warehouse on the first page of any version of SAP Library.

    Typographic Conventions Type Style Description

    Example text Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Cross-references to other documentation.

    Example text Emphasized words or phrases in body text, graphic titles, and table titles. EXAMPLE TEXT Technical names of system objects. These include report names, program

    names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE.

    Example text Output on the screen. This includes file and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools.

    Example text Exact user entry. These are words or characters that you enter in the system exactly as they appear in the documentation.

    Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system.

    EXAMPLE TEXT Keys on the keyboard, for example, F2 or ENTER.

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 4

    Master Data Governance Security Guide

    The following guide covers the information that you require to operate Master Data Governance securely. To make the information more accessible, it is divided into a general part, containing information relevant for all components, and a separate part for information specific for individual components.

    1 Introduction

    This guide does not replace the administration or operation guides that are available for productive operations.

    Target Audience

    Technology consultants

    Security consultants

    System administrators

    This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas the Security Guide provides information that is relevant for all life cycle phases.

    Why Is Security Necessary?

    With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These demands on security apply likewise to Master Data Governance. To assist you in securing Master Data Governance, we provide this Security Guide.

    Since Master Data Governance is based on and uses SAP NetWeaver technology, it is essential that you consult the Security Guide for SAP NetWeaver. See SAP Service Marketplace at http://service.sap.com/securityguide SAP NetWeaver .

    For all Security Guides published by SAP, see SAP Service Marketplace at http://service.sap.com/securityguide.

    Overview of the Main Sections

    The Security Guide comprises the following main sections:

    Before You Start [Page 5]

    This section contains information about why security is necessary, how to use thisdocument, and references to other Security Guides that build the foundation for thisSecurity Guide.

    Technical System Landscape [Page 6]

    http://service.sap.com/securityguidehttp://service.sap.com/securityguide

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 5

    This section provides an overview of the technical components and communication paths that are used by Master Data Governance.

    User Management and Authentication [Page 6]

    This section provides an overview of the following user administration andauthentication aspects:

    o Recommended tools to use for user management

    o User types that are required by Master Data Governance

    o Standard users that are delivered with Master Data Governance

    o Overview of the user synchronization strategy

    o Overview of how integration into Single Sign-On environments is possible

    Authorizations [Page 10]

    This section provides an overview of the authorization concept that applies to MasterData Governance.

    Network and Communication Security [Page 10]

    This section provides an overview of the communication paths used by Master DataGovernance and the security mechanisms that apply. It also includes ourrecommendations for the network topology to restrict access at the network level.

    Data Storage Security [Page 13]

    This section provides an overview of any critical data that is used by Master DataGovernance and the security mechanisms that apply.

    Enterprise Services Security [Page 13]

    This section provides an overview of the security aspects that apply to the enterpriseservices delivered with Master Data Governance.

    Security-Relevant Logs and Tracing [Page 14]

    This section provides an overview of the trace and log files that contain security-relevant information, for example, so you can reproduce activities if a security breachdoes occur.

    Appendix [Page 25]

    This section provides references to further information.

    2 Before You Start

    This table contains the most important SAP notes concerning the safety of Master Data Governance.

    Title SAP Note

    Comment

    Code injection vulnerability in UAC_ASSIGNMENT_CONTROL_TEST

    1493809 MDG and XBRL

  • SAP Library 01.08.2014

    Master Data Governance Security Guide 70 6

    Data can be displayed without authorization 1489976 MDG (Financial Master Data Governance, CA-MDG-APP-FIN)

    More Information

    For more information about specific topics, see the sources in the table below.

    Content Quick Link on SAP Service Marketplace or SDN

    Security http://sdn.sap.com/irj/sdn/security

    Security Guides http://service.sap.com/securityguide

    Related Notes http://service.sap.com/notes

    http://service.sap.com/securitynotes

    Allowed platforms http://service.sap.com/pam

    Network security http://service.sap.com/securityguide

    SAP Solution Manager http://service.sap.com/solutionmanager

    SAP NetWeaver http://sdn.sap.com/irj/sdn/netweaver

    3 Technical System Landscape

    For information about the technical system landscape, see the sources listed in the table below.

    Subject Guide/Tool Quick Link to SAP Service Marketplace

    Technical description of Master Data Governance and the underlying technical components, such as SAP NetWeaver

    Master Guide http://service.sap.com/instguides SAP Business Suite Applications SAP Master Data Governance

    High availability High Availability for SAP Solutions

    http://sdn.sap.com/irj/sdn/ha

    Design of technical landscape

    See available documents

    http://sdn.sap.com/irj/sdn/landscapedesign

    Security See available documents

    http://sdn.sap.com/irj/sdn/security

    4 User Management and Authentication

    http://sdn.sap.com/irj/sdn/securityhttp://service.sap.com/securityguidehttp://service.sap.com/noteshttp://service.sap.com/securitynoteshttp://service.sap.com/pamhttp://service.sap.com/securityguidehttp://service.sap.com/solutionmanagerhttp://sdn.sap.com/irj/sdn/netweaverhttp://service.sap.com/instguideshttp://sdn.sap.com/irj/sdn/hahttp://sdn.sap.com/irj/sdn/landscapedesignhttp://sdn.sap.com/irj/sdn/security

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 7

    Master Data Governance uses the user management and authentication mechanisms of the SAP NetWeaver platform, and in particular, SAP NetWeaver Application Server. Therefore, the security recommendations and guidelines for user management and authentication that are described in the security guide for SAP NetWeaver Application Server for ABAP Security Guide [External] also apply to Master Data Governance.

    In addition to these guidelines, we also supply information on user management and authentication that is especially applicable to Master Data Governance in the following sections:

    User Administration [Page 7]

    This section details the user management tools, the required user types, and thestandard users that are supplied with Master Data Governance.

    User Data Synchronization [Page 9]

    The components of Master Data Governance can use user data together with othercomponents. This section describes how the user data is synchronized with theseother sources.

    Integration into Single Sign-On Environments [Page 9]

    This section describes how Master Data Governance supports single sign-on-mechanisms.

    4.1 User Administration

    Master Data Governance user management uses the mechanisms provided by SAP NetWeaver Application Server for ABAP, such as tools, user types, and the password concept. For an overview of how these mechanisms apply for Master Data Governance, see the sections below. In addition, we provide a list of the standard users required for operating components of Master Data Governance.

    User Administration Tools

    The following table shows the user administration tools for Master Data Governance.

    Tool Description

    User maintenance for ABAP-based systems (transaction SU01)

    For more information on the authorization objects provided by the components of Master Data Governance, see the component specific section.

    Role maintenance with the profile generator for ABAP-based systems (PFCG)

    For more information on the roles provided by Master Data Governance, see the component specific section. For more information, see User and Role Administration of Application Server ABAP [External]

    Central User Administration (CUA) for the maintenance of multiple ABAP-based systems

    For more information, see Central User Administration [External].

    User Management Engine for SAP NetWeaver AS Java (UME)

    Administration console for maintenance of users, roles, and authorizations in Java-based systems and in the Enterprise Portal. The UME also provides persistence options, such as ABAP Engine. For more information, see User Management

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 8

    Engine [External].

    For more information on the tools that SAP provides for user administration with SAP NetWeaver, see SAP Service Marketplace at http://service.sap.com/securityguide SAP NetWeaver 7.0 Security Guides (Complete) Release User Administration and Authentication .

    User Types

    It is often necessary to specify different security policies for different types of users. For example, your policy may specify that individual users who perform tasks interactively have to change their passwords on a regular basis, but not those users under which background processing jobs run.

    User types required for Master Data Governance include, for example:

    Individual users

    o Dialog users

    Dialog users are used for SAP GUI for Windows.

    o Internet users for Web applications

    Same policies apply as for dialog users, but used for Internet connections.

    Technical users:

    o Service users are dialog users who are available for a large set ofanonymous users (for example, for anonymous system access via an ITSservice).

    o Communication users are used for dialog-free communication betweensystems.

    o Background users can be used for processing in the background.

    For more information about user types, see User Types [External] in the Security Guide for SAP NetWeaver AS ABAP.

    Standard Users

    The following table shows the standard users that are necessary for operating Master Data Governance.

    System User ID Type Password Additional Information

    SAP Web Application Server

    (sapsid)adm SAP system administrator

    Mandatory SAP NetWeaver installation guide

    SAP Web Application Server

    SAP Service (sapsid)adm

    SAP system service administrator

    Mandatory SAP NetWeaver installation guide

    SAP Web Application

    SAP Standard ABAP Users (SAP*, DDIC, EARLYWATCH,

    See SAP NetWeaver

    SAP NetWeaver security guide

    http://service.sap.com/securityguide

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 9

    Server SAPCPIC) security guide

    SAP Web Application Server

    SAP Standard SAP Web Application Server Java Users

    See SAP NetWeaver security guide

    SAP NetWeaver security guide

    SAP ECC SAP Users Dialog users Mandatory The number of users depends on the area of operation and the business data to be processed.

    We recommend that you change the passwords and IDs of users that were created automatically during the installation.

    4.2 User Data Synchronization

    By synchronizing user data, you can reduce effort and expense in the user management of your system landscape. Since Master Data Governance is based on SAP NetWeaver, you can use all of the mechanisms for user synchronization in SAP NetWeaver here. For more information, see the SAP NetWeaver Security Guide on SAP Service Marketplace at

    service.sap.com/securityguide SAP NetWeaver.

    You can use user data distributed across systems by replicating the data, for example in a central directory such as LDAP.

    4.3 Integration into Single Sign-On Environments

    Master Data Governance supports the single sign-on (SSO) mechanisms provided by SAP NetWeaver Application Server for ABAP technology. Therefore, the security recommendations and guidelines for user management and authentication that are described in the SAP NetWeaver Security Guide [External] also apply to Master Data Governance.

    Master Data Governance supports the following mechanisms:

    Secure Network Communication (SNC)

    SNC is available for user authentication and provides for an SSO environment when using the SAP GUI for Windows or Remote Function Calls.

    SAP Logon Tickets

    Master Data Governance supports the use of logon tickets for SSO when using a Web browser as the front-end client. In this case, users can be issued a logon ticket after they have authenticated themselves with the initial SAP system. The ticket can then be submitted to other systems (SAP or external systems) as an authentication token. The user does not need to enter a user ID or password for authentication, but can access the system directly

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 10

    once it has checked the logon ticket. For more information, see SAP Logon Tickets in the Security Guide for SAP NetWeaver Application Server.

    Client Certificates

    As an alternative to user authentication using a user ID and passwords, users using a Web browser as a front-end client can also provide X.509 client certificates to use for authentication. In this case, user authentication is performed on the Web server using the Secure Sockets Layer Protocol (SSL Protocol). No passwords have to be transferred. User authorizations are valid in accordance with the authorization concept in the SAP system.

    For more information see Client Certificates in the Security Guide for SAP NetWeaver Application Server. For more information about available authentication mechanisms, see SAP Library for SAP NetWeaver under User Authentication and Single Sign-On [External].

    5 Authorizations

    Master Data Governance uses the authorization concept of SAP NetWeaver Application Server ABAP. Therefore, the security recommendations and guidelines for authorizations that are described in the Security Guide for SAP NetWeaver Application Server ABAP also apply to Master Data Governance. You can use authorizations to restrict the access of users to the system, and thereby protect transactions and programs from unauthorized access.

    The SAP NetWeaver Application Server authorization concept is based on assigning authorizations to users based on roles. For role maintenance in SAP NetWeaver Application Server ABAP, use the profile generator (transaction PFCG), and in SAP NetWeaver Application Server for Java, the user management console of the User Management Engine (UME). You can define user-specific menus using roles.

    For more information about creating roles, see Role Administration [External].

    Standard Roles and Standard Authorization Objects

    SAP delivers standard roles covering the most frequent business transactions. You can use these roles as a template for your own roles.

    For a list of the standard roles and authorization objects used by components of Master Data Governance, see the section of this document relevant to each component.

    Before using the roles listed, you may want to check whether the standard roles delivered by SAP meet your requirements.

    Authorizations for Customizing Settings

    You can use Customizing roles to control access to the configuration of Master Data Governance in the SAP Customizing Implementation Guide (IMG).

    6 Network and Communication Security

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 11

    Your network infrastructure is extremely important in protecting your system. Your network needs to support the communication necessary for your business and your needs without allowing unauthorized access. A well-defined network topology can eliminate many security threats based on software flaws (at both the operating system and application level) or network attacks such as eavesdropping. If users cannot log on to your application or database servers at the operating system or database layer, then there is no way for intruders to compromise the devices and gain access to the backend system’s database or files. Additionally, if users are not able to connect to the server LAN (local area network), they cannot exploit known bugs and security holes in network services on the server machines.

    The network topology for Master Data Governance is based on the topology used by the SAP NetWeaver platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security Guide also apply to Master Data Governance. Details that relate directly to SAP ERP Central Component are described in the following sections:

    Communication Channel Security [Page 11]

    This section contains a description of the communication channels and protocols thatare used by the components of Master Data Governance.

    Network Security [Page 12]

    This section contains information on the network topology recommended for thecomponents of Master Data Governance. It shows the appropriate network segmentsfor the various client and server components and where to use firewalls for accessprotection. It also contains a list of the ports required for operating thesubcomponents of Master Data Governance.

    Communication Destinations [Page 12]

    This section describes the data needed for the various communication channels, forexample, which users are used for which communications.

    For more information, see the following section in the SAP NetWeaver Security Guide: Security Guides for Connectivity and Interoperability Technologies [External]

    6.1 Communication Channel Security

    Communication channels transfer a wide variety of different business data that needs to be protected from unauthorized access. SAP makes general recommendations and provides technology for the protection of your system landscape based on SAP NetWeaver.

    The table below shows the communication channels used by Master Data Governance, the protocol used for the connection, and the type of data transferred.

    Communication Path Protocol Used

    Type of Data Transferred

    Data Requiring Special Protection

    Application server to application server

    RFC, HTTP(S)

    Integration data Business data

    Application server to application of a third party administrator

    HTTP(S) Application data For example, passwords, business data

    DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections are protected using the Secure Sockets Layer protocol (SSL protocol).

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 12

    We strongly recommend that you use secure protocols (SSL, SNC).

    For more information, see Transport Layer Security [External] und Web Services Security [External] in the SAP NetWeaver Security Guide.

    6.2 Network Security

    Since Master Data Governance is based on SAP NetWeaver technology, for information about network security, see the following sections of the SAP NetWeaver Security Guide at

    http://help.sap.com SAP ERP Release/Language SAP NetWeaver Library Administrator's Guide NetWeaver Security Guide Network and Communication Security Network Services :

    Using Firewall Systems for Access Control [External]

    Using Multiple Network Zones [External]

    If you provide services in the Internet, you should protect your network infrastructure with a firewall at least. You can further increase the security of your system or group of systems by placing the groups in different network segments, each of which you then protect from unauthorized access by a firewall. You should bear in mind that unauthorized access is also possible internally if a malicious user has managed to gain control of one of your systems.

    Ports

    Master Data Governance is executed in SAP NetWeaver and uses the ports of AS ABAP or AS Java. For more information see the corresponding security guides for SAP NetWeaver in the topics for AS ABAP Ports [External] and AS Java Ports [External]. For information about other components, such as SAPinst, SAProuter, or SAP Web Dispatcher, see the document TCP/IP Ports Used by SAP Applications in SAP Developer Network at http://sdn.sap.com/irj/sdn/security under Infrastructure Security Network and Communications Security .

    6.3 Communication Destinations

    The use of users and authorizations in an irresponsible manner can pose security risks. You should therefore follow the security rules below when communicating between systems:

    Employ the user types system and communication.

    Grant a user only the minimum authorizations.

    Choose a secure password and do not divulge it to anyone else.

    Only store user-specific logon data for users of type system and communication.

    Wherever possible, use trusted system functions instead of user-specific logon data.

    U 6.4 se of Virus Scanners

    http://help.sap.com/http://sdn.sap.com/irj/sdn/security

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 13

    If you upload files from application servers into Master Data Governance and you want to use an virus scanner, a virus scanner must then be active on each application server. For more information, see SAP Note 964305 (solution A).

    Work through the Customizing activities in the Implementation Guide under theVirus Scan Interface node.

    When doing this, use the virus scan profile

    /MDG_BS_FILE_UPLOAD/MDG_VSCAN, which is delivered for Master Data

    Governance.

    When you upload files from the front-end into Master Data Governance, the system uses the

    configuration you defined for virus scan profile /SIHTTP/HTTP_UPLOAD. For more

    information, see SAP Note 1693981.

    7 Data Storage Security

    Using Logical Paths and File Names to Protect Access to the File System

    Master Data Governance saves data in files in the file system. Therefore, it is important to explicitly provide access to the corresponding files in the file system without allowing access to other directories or files (also known as directory traversal). This is achieved by specifying logical paths and file names in the system that map to the physical paths and file names. This mapping is validated at runtime and if access is requested to a directory that does not match a stored mapping, then an error occurs. In the application-specific part of this guide, there is a list for each component of the logical file names and paths, where it is specified for which programs these file names and paths apply.

    Activating the Validation of Logical Paths and File Names

    The logical paths and file names are entered in the system for the corresponding programs. For downward compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain the physical path using the transactions FILE (client-independent) and SF01 (client-dependent). To determine which paths are used by your system, you can activate the appropriate settings in the Security Audit Log.

    More Information

    Logical File Names [External] Logical File Names [External]

    Protecting Access to the File System [External]

    Security Audit Logs [External]

    For information about data storage security, see the SAP NetWeaver Security Guide at http://help.sap.com SAP NetWeaver Release/Language SAP NetWeaver Library

    Administrator’s Guide NetWeaver Security Guide Security Guides for the Operating System and Database Platforms

    8 Enterprise Services Security

    http://service.sap.com/~form/handler?_APP=01100107900000000342&_EVENT=REDIR&_NNUM=964305&_NLANG=en&_NVERS=0http://service.sap.com/~form/handler?_APP=01100107900000000342&_EVENT=REDIR&_NNUM=1693981&_NLANG=en&_NVERS=0http://help.sap.com/

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 14

    The following sections in the NetWeaver Security Guide are relevant for Master Data Governance:

    Web Services Security Guide [External]

    Recommended WS Security Scenarios [External]

    9 Security-Relevant Logs and Tracing

    The trace and log files of Master Data Governance use the standard mechanisms of SAP NetWeaver. For more information, see the following sections in the SAP NetWeaver Security Guide at http://service.sap.com/securityguide:

    Auditing and Logging [External]

    Tracing and Logging [External] (AS Java)

    10 Segregation of Duties

    Segregation of duties can be achieved by assigning roles to users and in addition by a strict separation of the user groups for the workflow.

    Activities

    Assigning Roles to Users

    You can assign roles to a user using the following transactions:

    User Maintenance SU01

    Use this transaction to assign one or more roles to one user.

    Role Maintenance PFCG

    Use this transaction to assign one or more users to one role.

    Separating User Groups for the Workflow

    Depending on the component of Master Data Governance you intend to configure, use the following Customizing activities to separate the user groups:

    MDG-M, MDG-F

    Run the Customizing activity under Master Data Governance General SettingsProcess Modeling Workflow Rule-Based Workflow Configure Rule-BasedWorkflow .

    MDG-S

    Run the Customizing activity under Master Data Governance Master DataGovernance for Supplier Workflow Assign Processor to Change Request StepNumber in BRFplus for Supplier .

    MDG-C

    http://service.sap.com/securityguide

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 15

    Depending on the change request step, run the following Customizing activities under:

    o Master Data Governance General Settings Process ModelingWorkflow Other MDG Workflows Assign Processor to Change Request Step Number (Simple Workflow)

    o Master Data Governance Master Data Governance for SupplierWorkflow Assign Processor to Change Request Step Number in BRFplus for Supplier

    For further information, see Configuring Master Data Governance for Customer [External].

    For information about the corresponding roles, see the documents listed below:

    Authorization Objects Used by Master Data Governance [Page 15]

    Supplier Master Data Governance (CA-MDG-APP-SUP) [Page 17]

    Customer Master Data Governance (CA-MDG-APP-CUS) [Page 19]

    Material Master Data Governance (CA-MDG-APP-MM) [Page 21]

    Financial Master Data Governance (CA-MDG-APP-FIN) [Page 22]

    Custom Objects (CA-MDG-COB) [Page 24]

    11 Authorization Objects Used by Master Data Governance

    Authorization Objects

    The following authorization objects are used by all components of Master Data Governance.

    To obtain more detailed information about specific authorization objects proceed as follows:

    1. Choose SAP Menu Tools ABAP Workbench Development Other

    Tools Authorization Objects Objects (Transaction SU21).

    2. Select the authorization object using (Find) and then choose (Display).

    3. On the Display authorization object dialog box choose Display ObjectDocumentation.

    Authorization Object Description

    MDG_MDF_TR Master Data: Transport

    MDG_IDM Key Mapping

    USMD_CREQ Change Request

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 16

    USMD_MDAT Master Data

    USMD_MDATH Hierarchies

    USMD_UI2 UI Configuration

    DRF_RECEIVE Authorization for outbound messages for receiver systems

    DRF_ADM Create Outbound Messages

    CA_POWL Authorization for iViews for personal object worklists

    BCV_SPANEL Execute Side Panel

    BCV_USAGE Usage of Business Context Viewer

    MDG_DEF Data Export

    MDG_DIF Data Import

    For information about component specific authorization objects, see the corresponding sections:

    Master Data Governance for Business Partner (CA-MDG-APP-BP) [Page 16]

    Master Data Governance for Supplier (CA-MDG-APP-SUP) [Page 17]

    Master Data Governance for Customer (CA-MDG-APP-CUS) [Page 19]

    Master Data Governance for Material (CA-MDG-APP-MM) [Page 21]

    Master Data Governance for Financial (CA-MDG-APP-FIN) [Page 22]

    Master Data Governance for Custom Objects (CA-MDG-COB) [Page 24]

    Standard Role

    Role Name

    SAP_MDG_ADMIN Master Data Governance Administrator

    This role contains authorizations needed for administrative tasks and for setting up a base configuration in all components of Master Data Governance. Some authorizations enable critical activities. If multiple users in your organization are entrusted with the administration and configuration of Master Data Governance, we recommend that you split the role into several roles, each with its own set of authorizations. The role does not contain the authorizations for the respective master data transactions.

    11.1 Master Data Governance for Business Partner (CA-MDG-APP-BP)

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 17

    Authorization Objects

    Master Data Governance for Business Partner mainly uses the authorization objects of the business objects Business Partner, the authorization objects of the Application Framework for Master Data Governance, and the authorization objects of the Data Replication Framework.

    Authorization Object Description

    B_BUPA_GRP

    This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected.

    Business Partner: Authorization Groups

    B_BUPA_RLT Business Partner: BP Roles

    B_BUPR_BZT Business Partner Relationships: Relationship Categories

    DC_OBJECT Data Cleansing

    Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15].

    Standard Roles

    Role Name

    SAP_MDGBP_MENU_04 [External]

    Master Data Governance for Business Partner: Menu

    SAP_MDGBP_DISP_04 [External] Master Data Governance for Business Partner: Display

    SAP_MDGBP_REQ_04 [External] Master Data Governance for Business Partner: Requestor

    SAP_MDGBP_SPEC_04 [External]

    Master Data Governance for Business Partner: Specialist

    SAP_MDGBP_STEW_04 [External]

    Master Data Governance for Business Partner: Data Steward

    If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant.

    11.2 Master Data Governance for Supplier (CA-MDG-APP-SUP)

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 18

    Authorization Objects

    Master Data Governance for Supplier does not have dedicated authorization objects, but instead uses the authorization objects of the business objects Business Partner and Vendor, the authorization objects of the Application Framework for Master Data Governance, and the authorization objects of the Data Replication Framework.

    Authorization Object Description

    B_BUPA_GRP

    This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected.

    Business Partner: Authorization Groups

    B_BUPA_RLT Business Partner: BP Roles

    B_BUPR_BZT Business Partner Relationships: Relationship Categories

    DC_OBJECT Data Cleansing

    F_LFA1_APP Vendor: Application Authorization

    F_LFA1_BEK

    This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected.

    Vendor: Account Authorization

    F_LFA1_BUK Vendor: Authorization for Company Codes

    F_LFA1_GEN Vendor: Central Data

    F_LFA1_GRP Vendor: Account Group Authorization

    M_LFM1_EKO Purchasing organization in supplier master data

    Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15].

    Standard Roles

    Role Name

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 19

    SAP_MDGS_MENU_04 Master Data Governance for Supplier: Menu [External]

    SAP_MDGS_DISP_04 Master Data Governance for Supplier: Display [External]

    SAP_MDGS_REQ_04 Master Data Governance for Supplier: Requester [External]

    SAP_MDGS_SPEC_04 Master Data Governance for Supplier: Specialist [External]

    SAP_MDGS_STEW_04 Master Data Governance for Supplier: Data Steward [External]

    SAP_MDGS_LVC_MENU_03 Master Data Governance for Supplier (Lean Request UI): Menu [External]

    SAP_MDGS_LVC_REQ_03 Master Data Governance for Supplier (Lean Request UI): Requester [External]

    If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant.

    11.3 Master Data Governance for Customer (CA-MDG-APP-CUS)

    Authorization Objects

    Master Data Governance for Customer does not have dedicated authorization objects, but instead uses the authorization objects of the business objects Business Partner and Customer, the authorization objects of the Application Framework for Master Data Governance, and the authorization objects of the Data Replication Framework.

    Depending on whether you use the Master Data Governance for Customer on a hub system [External] or on a client system [External] a different set of authorization objects is required.

    Authorization Object Description Hub System

    Client System

    B_BUPA_GRP

    This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected.

    Business Partner: Authorization Groups

    x x

    B_BUPA_RLT Business Partner: BP Roles

    x x

    B_BUPR_BZT Business Partner Relationships:

    x x

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 20

    Relationship Categories

    DC_OBJECT Data Cleansing x

    F_KNA1_APP Customer: Application Authorization

    x x

    F_KNA1_BED

    This authorization object is optional. You do not need to assign this authorization object if no master records are to be specifically protected.

    Customer: Account Authorization

    x x

    F_KNA1_BUK Customer: Authorization for Company Codes

    x x

    F_KNA1_GEN Customer: Central Data x x

    F_KNA1_GRP Customer: Account Group Authorization

    x x

    MDGC_LCOPY Copy Customer Master Data from MDG Hub

    — x

    V_KNA1_BRG Customer: Account Authorization for Sales Areas

    x x

    V_KNA1_VKO Customer: Authorization for Sales Organizations

    x x

    Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15].

    Standard Roles

    Role Name

    SAP_MDGC_MENU_04 Master Data Governance for Customer: Menu [External]

    SAP_MDGC_DISP_04 Master Data Governance for Customer: Display [External]

    SAP_MDGC_REQ_04 Master Data Governance for Customer: Requester [External]

    SAP_MDGC_SPEC_04 Master Data Governance for Customer: Specialist [External]

    SAP_MDGC_STEW_04 Master Data Governance for Customer: Data Steward [External]

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 21

    If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant.

    11.4 Master Data Governance for Material (CA-MDG-APP-MM)

    Authorization Objects

    Master Data Governance for Material does not have dedicated authorization objects, but instead uses, for example, the authorization objects of the Material Master and the Application Framework for Master Data Governance.

    Authorization Object Description

    M_MATE_MAT Material Master: Material

    M_MATE_MAR Material Master: Material Type

    M_MATE_WGR Material Master: Material Group

    M_MATE_STA Material Master: Maintenance Status

    M_MATE_MTA Material Master: Change Material Type

    M_MATE_WRK Material Master: Plant

    M_MATE_MAN Material Master: Central Data

    M_MATE_NEU Material Master: Create

    M_MATE_BUK Material Master: Company Codes

    M_MATE_VKO Material Master: Sales Organization/Distribution Channel

    M_MATE_LGN Material Master: Warehouse Numbers

    C_KLAH_BKL Authorization for Classification

    C_KLAH_BSE Authorization for Selection

    C_TCLA_BKA Authorization for Class Types

    C_DRAD_OBJ Create/Change/Display/Delete Object Link

    C_DRAW_DOK Authorization for document access

    C_DRAW_TCD Authorization for document activities

    C_DRAW_TCS Status-Dependent Authorizations for Documents

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 22

    C_DRAW_BGR Authorization for authorization groups

    C_DRAW_STA Authorization for document status

    DRF_RECEIV Authorization for outbound messages for receiver systems

    DRF_ADM Create Outbound Messages

    PLM_SPUSR

    You need this authorization object for the object type PLM_MAT only if the search object connector of SAP NetWeaver Enterprise Search is created for the following Enterprise Search software components:

    PLMWUI

    Software components that include PLMWUI

    For more information about SAP NetWeaver Enterprise Search, see SAP NetWeaver Enterprise Search [External].

    Superuser by Object Type

    Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15].

    Standard Roles

    Role Name

    SAP_MDGM_MENU_04 [External] Master Data Governance for Material: Menu

    SAP_MDGM_DISP_04 [External] Master Data Governance for Material: Display

    SAP_MDGM_REQ_04 [External] Master Data Governance for Material: Requester

    SAP_MDGM_SPEC_04 [External] Master Data Governance for Material: Specialist

    SAP_MDGM_STEW_04 [External] Master Data Governance for Material: Data Steward

    If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant.

    11.5 Master Data Governance for Financials (CA-MDG-APP-FIN)

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 23

    Authorization Objects

    Authorization Object Description

    USMD_DIST

    This authorization object is used if you have not activated business function MDG_FOUNDATION.

    (Switch: FIN_MDM_CORE_SFWS_EHP5)

    Distribution

    USMD_EDTN Edition

    Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15].

    Standard Roles

    Role Description

    SAP_MDGF_ACC_DISP_04 [External]

    Master Data Governance for Financials: Accounting Display

    SAP_MDGF_ACC_REQ_04 [External]

    Master Data Governance for Financials: Accounting Requester

    SAP_MDGF_ACC_SPEC_04 [External]

    Master Data Governance for Financials: Accounting Specialist

    SAP_MDGF_ACC_STEW_04 [External]

    Master Data Governance for Financials: Accounting Data Steward

    SAP_MDGF_CO_DISP_04 [External]

    Master Data Governance for Financials: Consolidation Display

    SAP_MDGF_CO_REQ_04 [External] Master Data Governance for Financials: Consolidation Requester

    SAP_MDGF_CO_SPEC_04 [External]

    Master Data Governance for Financials: Consolidation Specialist

    SAP_MDGF_CO_STEW_04 [External]

    Master Data Governance for Financials: Consolidation Data Steward

    SAP_MDGF_CTR_DISP_04 [External]

    Master Data Governance for Financials: Controlling Display

    SAP_MDGF_CTR_REQ_04 [External]

    Master Data Governance for Financials: Controlling Requester

    SAP_MDGF_CTR_SPEC_04 [External]

    Master Data Governance for Financials: Controlling Specialist

    SAP_MDGF_CTR_STEW_04 Master Data Governance for Financials: Controlling

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 24

    [External] Data Steward

    If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant.

    11.6 Master Data Governance for Custom Objects (CA-MDG-COB)

    Authorization Objects

    You can use the following authorization objects for Master Data Governance for Custom Objects.

    Authorization Object Description

    USMD_DIST Replication

    USMD_DM Data Model

    USMD_EDTN Edition Type

    Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15].

    Standard Role

    Role Name

    SAP_MDGX_MENU_04 [External] Master data governance for self-defined objects

    SAP_MDGX_FND_SAMPLE_SF_04 [External]

    Master data governance for self-defined objects - Flight Data Model example

    If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant.

    12 Change Settings of Generated MDG Database Tables

    The SAP system generates database tables for the entities of all defined data models. The settings of these database tables are the following:

    Buffering and log of data changes is switched on.

    Display and maintenance is allowed with restrictions.

  • SAP Library 12.11.2013

    Master Data Governance Security Guide 70 25

    Activities

    To change these settings of generated MDG database tables run the transaction

    MDG_TABLE_ADJUST.

    The results of the transaction are listed in the transaction SLG1 (Analyse Application Log),

    using Object FMDM and Subobject ADJUST_TABLE.

    You have to execute the transaction in each system manually.

    After a model activation it might be necessary to execute the transaction again.

    More Information

    For more information see SAP note 1828363.

    13 Appendix

    For more information about the security of SAP applications see SAP Service Marketplace at http://service.sap.com/security.

    You can also access additional security guides via SAP Service Marketplace at http://service.sap.com/securityguide.

    For more information about security issues, see SAP Service Marketplace at http://service.sap.com followed by:

    Topic SAP Service Marketplace

    Master guides, installation guides, upgrade guides, and Solution Management guides

    /instguides

    /ibc

    Related notes /notes

    Platforms /platforms

    Network security /network

    /securityguide

    Technical infrastructure /ti

    SAP Solution Manager /solutionmanager

    http://service.sap.com/~form/handler?_APP=01100107900000000342&_EVENT=REDIR&_NNUM=1828363&_NLANG=en&_NVERS=0http://service.sap.com/securityhttp://service.sap.com/securityguidehttp://service.sap.com/