Show TOC

Displaying Change Documents for Security PoliciesLocate this document in the navigation structure


You have been assigned the authorization object S_SECPOL set to the value 08 (ACTVT).


Sometimes you need to change security policies and their attributes. For these changes, the system creates change documents that contain the relevant security policies and the related policy attributes. Run the report Display Change Documents for Security Policies to display the following:

  • Change document numbers

  • Date and time of the change

  • Users

  • Security policies

  • Policy attributes

  • Old value

  • New value


  1. In the User Information System (transaction SUIM), choose Start of the navigation path Change Documents Next navigation step For Security Policies End of the navigation path.
  2. In the selection section, enter your selection criteria.

    You can specify a range of security policies and policy attribute names for which you want to see the change document numbers.

    You can further refine your selection by entering a period of time. To specify a period, enter dates into the Changed To and Changed From fields. After having entered a date in Changed To field, you can define a period with the help of the buttons that define the period in days (1, 7, 30, or 365). The default date in the field Changed To is the current day.

    To display the change documents created by a specific user, enter the user who made the security policy changes into the Changed By field. As an option, you can also use multiple selection or choose the button with the current user name to conveniently fill the Changed By field with this user name.

    There is also a possibility to set a certain change document number, to use multiple selection, or to define a range of change document numbers. You can save the selection as a variant if you choose Save as Variant....

  3. When you do not select the Show Raw Change Documents checkbox in the display options (default), the report prepares the change documents taking into account the specific handling of security policy attributes. You see, for example, the attributes that have not been maintained and the respective default values. For this reason it is easier to understand the effect of the change for the runtime behavior of the system.

    When you select the checkbox, the system displays the change documents for security policies in a flat list based on the data of the database. No items are added or hidden by the report.

  4. Choose Execute.

Next Steps

For more information on the parameters, see the F1 Help.