Creating Users with Data-Dependent Authorizations 
You perform the steps described in the following sections to create special user roles with authorizations restricted to specific data.
You must have created the corresponding authorizations beforehand.
More information: Defining User Roles
Perform the following steps to create users and roles in AS ABAP.
Note
Since ABAP roles are mapped to Java user groups, the term role used in an ABAP context means user group in a Java context.
Use transaction SU01 to create a user, for example CUST_USER.
Use transaction PFCG to create a composite role, for example CUST_USER_ROLE, by either creating a new role or copying an existing role.
If you create a new role, ensure that you assign XXX_ABAP and XXX_J2EE single roles to this role, with XXX = SAP_XI_DEVELOPER, SAP_XI_CONFIGURATOR, or SAP_XI_CONTENT_ORGANIZER, depending on whether your new role is a developer, configurator, or content organizer.
If you copy an existing role, for example, SAP_XI_DEVELOPER for a restricted developer role, or SAP_XI_CONFIGURATOR for a restricted configurator role, ensure that this role is completely copied to the new role, but disable the copying of contained *ABAP and *J2EE single roles.
More information: Changing Dialog User Roles.
Delete all users from the role created in the previous step.
Use transaction PFCG to assign the user created in step 1 to the role created in step 2.
Perform the following steps to assign ABAP roles to user groups in AS Java.
Start your AS Java Identity Management.
Choose Identity Management.
Search for the new role and select it.
Choose Assigned groups and then choose Modify.
Search for the user group (corresponding to the ABAP role) of interest in the Available Groups frame.
Select the group and choose Add.
Check the assignment in the Assigned Groups frame.
Choose Save All Changes.
More information: Assigning Principals to Roles or Groups.
You must assign an unrestricted tool-specific role, for example XiRep_Unrestricted or XiDir_Unrestricted, to predefined user groups without data-dependent restrictions. For these users, only standard J2EE security applies. Otherwise, users of these groups do not have any permission once the additional data-dependent authorization checks are activated.
Perform the following steps to assign a predefined unrestricted role to standard user groups.
Start your AS Java Identity Management.
Choose Identity Management.
Search for the unrestricted role (for example XiRep_Unrestricted or XiDir_Unrestricted), and select it.
Choose Assigned Groups and then choose Modify.
Search for the relevant PI user groups (omit SAP_XI_DEMOAPP).
The relevant PI user groups are:
The ABAP dialog user roles listed and described in Dialog Users.
The roles of the PI service users listed and described in Service Users.
Select each relevant user group and choose Add.
Choose Save All Changes.
Perform the following steps to activate the permissions (authorizations and user roles) defined in the ES Repository and Integration Directory.
Access the exchange profile at http://<host>:<port>/dir, .
Go to and select the following properties:
com.sap.aii.util.server.auth.activation: To define user roles
com.sap.aii.ib.server.acl.enable: To define authorizations
Set these properties to true and Save your settings.
Based on the value defined for authorizations and user roles, the system will perform the following actions:
Value of com.sap.aii.ib.server.acl.enable (Authorizations) |
Value of com.sap.aii.util.server.auth.activation (User Roles) |
Action in ES Repository and Integration Directory |
False |
False |
Both, authorizations and user roles are disabled. All users have permissions to create, edit, and delete objects. |
False |
True |
User roles are enabled. |
True |
False |
Authorizations are enabled. However, if no authorizations are defined, users will not have permissions to create, edit, and delete objects. To perform any of these actions, you should define authorizations. |
True |
True |
Both, authorizations and user roles are enabled. If authorizations are defined, the system grants permissions based on the defined authorizations and not the user roles. However, if no authorizations are defined, the system checks for the user roles and grants permissions accordingly. |
Go to and repeat steps 2 and 3.
Choose AII Properties to display and Refresh the properties.
Choose AII Properties again and verify that the above mentioned properties have the correct value.