Prerequisites
You have been assigned the authorization object S_SECPOL set to the value 08 (ACTVT).
Context
Sometimes you need to change security policies and their attributes. For these changes, the system creates change documents that contain the relevant security policies and the related policy attributes. Run the report
Display Change Documents for Security Policies to display the following:
Procedure
- In the User Information System (transaction
SUIM), choose
.
- In the selection section, enter your selection criteria.
You can specify a range of security policies and policy attribute names for which you want to see the change document numbers.
You can further refine your selection by entering a period of time. To specify a period, enter dates into the
Changed To and
Changed From fields. After having entered a date in
Changed To field, you can define a period with the help of the buttons that define the period in days (1, 7, 30, or 365). The default date in the field
Changed To is the current day.
To display the change documents created by a specific user, enter the user who made the security policy changes into the
Changed By field. As an option, you can also use multiple selection or choose the button with the current user name to conveniently fill the
Changed By field with this user name.
There is also a possibility to set a certain change document number, to use multiple selection, or to define a range of change document numbers. You can save the selection as a variant if you choose
.
- When you do not select the
Show Raw Change Documents checkbox in the display options (default), the report prepares the change documents taking into account the specific handling of security policy attributes. You see, for example, the attributes that have not been maintained and the respective default values. For this reason it is easier to understand the effect of the change for the runtime behavior of the system.
When you select the checkbox, the system displays the change documents for security policies in a flat list based on the data of the database. No items are added or hidden by the report.
- Choose
.
Next Steps
For more information on the parameters, see the F1 Help.