Authorization Enforcement
Authorization enforcement consists of three major activities:
- Definition of the authorization-relevant attributes (for example, authorization object fields): The application developer defines the fields that are relevant for an authority check (for example, the type of a business document).
- Configuration of the end user authorizations (for example, by roles): An administrator configures the user-specific values related to authorization-relevant fields (for example, which product types can be edited by a certain end user).
- Authorization check (for example, in ABAP authority check): The runtime working with data has to match the user authorizations against the requested access to business data in order to restrict data to the allowed data subset.