Show TOC

Background documentationSystem-Specific Authorizations Locate this document in the navigation structure

 

You can restrict the authorizations that a user has for a specific system. For example, you could restrict the import authorizations so that while many administrators can execute imports into the quality assurance (QA) system, only a few actually have authorization to execute imports into the productive system.

Use the following authorization objects to grant the system-specific authorizations named above:

  • S_SYS_RWBO

    With this you can restrict the authorization for creating transport requests. For this, enter the system IDs of the systems where the user is permitted to create transport requests.

    The authorization object is contained in the predefined role SAP_CTS_PLUS_ORG_TEMPLATE as a template.

  • S_CTS_SADM

    You can restrict the authorization for importing into specific systems with this. For this, enter the system IDs of the systems where the user is permitted to execute imports. If you require different settings for different users, then you need to create different roles.

    The authorization object is contained in the predefined role SAP_CTS_PLUS_TRANSPRT_TEMPLATE as a template.

Caution Caution

The system-specific authorization objects S_CTS_SADM and S_SYS_RWBO are enhancements of the non-system-specific authorization objects S_CTS_ADMI and S_TRANSPRT. For compatibility reasons only the system-specific authorizations come into effect if the user has not beed granted the required rights from S_CTS_ADMI or S_TRANSPRT. However, the display authorization S_TRANSPRT must always be given.

End of the caution.

You set the system-specific authorizations using the role maintenance (transaction PFCG).

Setting System-Specific Authorizations
  1. Start transaction PFCG. Enter the name of the required template in the Role field and copy it. When changing the authorization data under Logical System, enter the system IDs of those systems for which you want to restrict the authorizations.

  2. Assign the relevant roles with these authorizations to the users.

More Information

For more information on the functions of role management, see Role Management Functions.

For more information on authorizations in CTS, see CTS Authorization Concept.