TREX provides various admin tools that you can use to configure TREX, monitor it during routine operations, and troubleshoot if necessary. All admin tools have a graphical user interface. For more information, see TREX admin tools. On the basis of the SAP authorization concept, you configure the TREX admin tools for secure use.
The SAP authorization concept protects transactions and programs in SAP systems from unauthorized access. On the basis of the authorization concept the administrator gives users authorizations that define which actions those users can carry out in SAP systems after logging onto those systems and carrying out authentication. When a user starts a program or calls up a transaction, the system carries out authorization checks and makes sure that the user has the correct authorizations. The SAP system can then determine which users should be able to carry out which functions and what users should be able to do with data (insert, create, execute, display, change, delete, and so on). It can also determine the organizational limits within which users can carry out these actions. Activity groups, profiles, collective profiles, authorization objects, control fields, and transactions are important parts of this concept.
Note
For more information about the authorization concept in the SAP system and on using users and roles, see Users and Roles in SAP All.
To use the TREX-Admin-Tools in secure form, you use the SAP_BC_TREX_ADMIN role, which is delivered together with the TREX ABAP client as part of the SAP NetWeaver Application Server ABAP. On the basis of this role, you can create users with predefined authorizations for the following TREX admin tools:
This allows you to ensure that only users with authorization can use the TREX admin tools and the associated configuration and administration tasks.