SAP Crystal Reports 2011, Win User's Guide Page 613

  • Download
  • Add to my manuals
  • Print
  • Page
    / 718
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 612
Customizing authorizations for specific tables
Whether you have enabled or disabled the Global Lock feature, you may need to customize the data
access authorizations for one or more SAP tables. If the Global Lock is enabled, you will need to allow
all or some users to access particular tables. (Otherwise, users will be unable to design or refresh
reports against the SAP system.) Alternatively, if the Global Lock is disabled, you may need to prevent
all or some users from accessing tables that contain sensitive data.
In either case, whether you want to secure a table or to permit access to a table, you must use an
authorization object for that purpose. (You can customize a new authorization object, or reuse an existing
one.) Then, using the Security Definition Editor, you associate the authorization object with the table
in question. Finally, you incorporate the new authorization object into your current configuration of user
profiles or roles.
Essentially, by associating an authorization object with an SAP table, you define that table as an
exception to the Global Lock settings that you have made within the Security Definition Editor. In other
words, once you've associated an authorization object with a table, that table is withheld from all
users—regardless of your Global Lock settings. You must then use the authorization object according
to your usual SAP security conventions in order to provide particular users with access to the SAP
table.
To customize authorizations for a specific table
1.
Create a new authorization object.
For this example, create an authorization object called ZTABCHK that consists of one authorization
field called TABLE. The ZTABCHK authorization is being used to secure the VBAK table from all
but a particular subset of users.
Note:
Use transaction SU21 to create the authorization object, or see the SAP Help for more information
on creating authorization objects.
2.
From SAP, execute transaction /CRYSTAL/RLS.
The "Security Definition Editor" screen appears.
2012-03-14613
Integrating Business Applications with Crystal Reports
Page view 612
1 2 ... 608 609 610 611 612 613 614 615 616 617 618 ... 717 718

Comments to this Manuals

Edwinfet 29 Feb 2024 | 09:13:09

What are the upsides of contracting skilled web optimization organizations? Expert search marketing companies utilize teams of experts focused on elevating your site's content for browsing engines. This encompasses researchingsearch phrases, adjusting on site characteristics, and managing off-domain enhancements. Moreover, these firms monitor adjustment in from Google parameters and refresh the text on your website as needed. This saves both you your time and your workers from unwanted a

KarenSkaky 17 Apr 2024 | 12:11:41

Securing the security of your home is essential in today's unsettled times. Among the best ways to safeguard your belongings and peace of mind is by committing in a trustworthy safe. Regardless of whether you're securing money, important documents, or precious heirlooms, a safe gives a protected repository solution. Regarding selecting the right safe for your house, there are several elements to consider. Above all, assess your safety requirements. Determine what items you plan to store in

Helenlal 18 Apr 2024 | 10:19:10

Arranging an open-air wedding in Phenix and anxious about the unpredictable weather? Don't let Mother Nature rain on your parade – truly! At [Event Rentals Phoenix], we provide stunning wedding tent rentals that will ensure your distinctive day goes off without an hitch. Our wedding tent rentals are created to supply both charm and functionality. Say "I do" under tha elegant canopy of one of our tents, surrounded by your loved ones and tha breathtaking scenery of Pheonix. With one assortmen

Helenlal 29 Apr 2024 | 07:23:21

In both personal and professional situations, encountering issues is unavoidable. However, mastering productive trouble-shooting techniques is key for triumphing over hurdles and accomplishing success. In this piece, we delve into the strategies and methods for efficiently addressing dilemmas. From analytical thinking to creative brainstorming, we look into various approaches that can help individuals tackle challenges with certainty and accuracy. Effective challenge solving begins wit

Chrisnug 29 Apr 2024 | 16:39:54

Hello, im noob :)