Difference between Structural and Org. Based Security

Hi
   Could anyone please explain the difference between Structural and Org. based security
Also could anyone please point to relevant documents.
Thanks

Structural authorization:
ex: assigning roles to position and not to userids.. Listed below are some links that may help you to get started in understanding "Structural authorization".
http://www.sap-img.com/human/structural-authorization-vs-role-authorization.htm
http://www.sap-press.de/katalog/buecher/inhaltsverzeichnis/gp/titelID-1071
https://websmp205.sap-ag.de/~form/ehandler?_APP=00200682500000001337&_EVENT=DISPLAY&COURSE=ADM940
HB

Similar Messages

  • DIfference between BW and R/3 Security

    Hi
    Please tell me whats the difference between BW and R/3 Security
    Thanks

    Hi,
    The main difference is that, in R/3 the first line of defence it S_TCODE, i mean its completely based on Transaction.
    Where as B/W is completely object based i.e, it deals with securing Infoobjetcs, Infocubes, ODS, BW Queries, etc....
    For more ingormation on BW Seecurity, please visit:
    http://www.*********************/bw_security/bw_security.htm
    Hope it helps.
    Please award points if it is useful.
    thanks & regards,
    santosh

  • What is the difference between "Replace" and "Replace by Security"

    Hi all,
    I am implementing FDM to Load data to HFM, I set them up with a proper security on the shared service and FDM. When I load data to HFM from FDM, there are 4 options to load data. (Replace, Merge, Accumulate, Replace by Security)
    A document states that
    Replace: Clears all account values from the target application, and replaces that the data in the application with the data in the load file.
    Replace by Security: Loads data to the target application only for members to which you have access.
    However, even if I used “Replace”, it worked with security which I set.
    Does anyone know what the difference between “Replace” and “Replace by Security”?
    Is there any way that FDM works without security?
    Thanks in advance
    taku

    The fact both methods are producing the same results will either be coincidence or perhaps because you are mis-interpreting the difference between the 2. When you run a Replace HFM will clear out all data based on the combination of Scenario, Year, Period, Entity and Value dimensions it does not care if you have set up security classes which may restrict access to any of the other dimensions i.e. Account, Custom1 thru 4. When you use Replace By Security HFM will still clear on the original criteria but it will respect security class restrictions set up on the other dimensions e.g. if you are assigned to a security class which is restricted to accessing only a certain subset of accounts, HFM will not clear data fro the accounts you don't have access to when you use Replace By Security

  • Difference Between Cost and Account Based COPA

    Hi
    What is the difference between Cost and Account based COPA from a BI perspective ( both functionally and technically)
    Thanks
    Rashmi.

    Hi Rashmi,
    Greetings.
    There is lot of reading material available on forums and help.sap.com
    For start you can try with this:
    Link:[http://help.sap.com/saphelp_46c/helpdata/en/7a/4c37ef4a0111d1894c0000e829fbbd/content.htm]
    Thanks
    Sachin

  • Difference between element and identity based version

    Can anybody tell me the difference between elment and identity based version of the Object with any example? which classes implement them?

    Hunky322 wrote:
    At first it struck me as odd, given how List, Set, and Map define equals, but the part the OP left off clears it up a bit: "..because element-based equality is not always well-defined for queues with the same elements but different ordering properties."This lineSo, you're saying you don't understand the following?
    >
    Queue implementations generally do not define element-based versions of the equals and hashCode methods but instead inherit the identity-based versions from Object because element-based equality is not always well-defined for queues with the same elements but different ordering properties.
    >
    Okay, here's the deal.
    For a List, equals() is true if both Lists contain the same objects and in the same order. That's pretty straightforward, and it makes sense.
    For a Set, equals() is true if both Sets contain the same objects. Order is not considered because Sets are not generally ordered. Again, this it straightforward.
    So, you might think that Queue might define equals in a similar fashion--either if both Queues contain all the same elements, or if they contain all the same elements in the same order. However, this doesn't really work very well. Since ordering is an important part of a Queue, the ordering should be considered for equality. However, unlike Lists, two different Queues containing the same objects might define ordering differently. One might be a FIFO and the other might be a PriorityQueue, so how do you compare those two queues for equality?
    There are no clear-cut rules for equality between two arbitrary Queues, so the Queue interface does not define an equals method that's related to the contents of the Queues.

  • What is the difference between Structure and Work area

    Hi Guys,
    What is the difference between Structure and work area?
    Are they same with different names?
    Thanks,
    mini.

    hey buddies,*
    i had this same doubt for a long time and i have my finds with me ie wa and structure are the same but wa can hold a single record but structure cannot hold data in it but according to the previous posts  folks  say structure too holds data as wa does but i guess when debugging wa holds data and structure doesnt hold bcoz i tried.
    types : begin of str_mara,
                 matnr type mara-matnr,
                ernam type mara-ernam,
                end of str_mara.
    data it_mara type table of str_mara.
    select matnr ernam from mara into it_mara where matnr = '100-101'.
    *********************if folks say wa = structure,this should work,isn't it?*********************************
    loop at it_mara into str_mara.
    write:/ str_mara-matnr , str_mara-ernam.
    endloop.
    *******************but it throws an error saying that str_mara is not a wa*******************************
    i may not be correct too plz let me know if i'm wrong
    Edited by: arun_aime on Feb 12, 2010 4:41 PM

  • Difference between ID and Role based Administration - Firefighter 5.3

    In GRC AC 5.3 Firefighter, security guide, there are two sections for role design,
    1. Firefighter Role based Administration
    2. Firefighter ID based Administration
    Can someone explain what is the difference between the two?
    I have read the documentation, but it does not have a clear description of the
    differences between the two.
    Please help.
    Thanks

    HI Prakash,
    Though both of them eventually achieve the same function, that is giving access rights to the user for a certain period under monitring these differ based on the following:
    1. Firefighter Role based Administration
    You identlfy a particular role as a firefighter role and give it to the user.
    2. Firefighter ID based Administration
    You create a separate user altogether and give the normal dialog user, the access to this user's authorization.
    For the implication that both of these have and the differences or comparisons between using 1 & 2, I would suggest you do a bit of Mock testing for both of these. Also, there are a lot of posts related to this on the forum already, which you can refer to, for getting a more detailed idea on this topic. Unlimately, it depends on organization to organization which methodology they folow as per what suits them, according to features which both have. But generally what is preferred is Number 2.
    Regards,
    Hersh.

  • Difference between HFM and Essbase user security in 9.3.1 version

    Hi,
    Could any one explain the differences between Hyperion Essbase and HFM security setup using HSS in 9.3.1
    Thanks
    Edited by: user10305642 on Jul 13, 2009 12:39 AM

    HFM and Essbase security is totally different... HFM uses security classes while Essbase uses security filters.
    The way you assign security is also different.
    HFM also has more roles than Essbase.
    You will find further info in the Security Administration Guide:
    http://download.oracle.com/docs/cd/E10530_01/doc/epm.931/hyp_security_guide.pdf
    Hiope this helps,
    Seb

  • Main Difference Between EDI and IDOC Based On RFC

    In IDOC ,RFC is Used to define the characteristics of communication links to a remote system on which a functions needs to be executed.
    What About EDI ?

    Hi Saurabh,
    Check this..Hope it helps you.
    EDI is nothing but Electronic data interchange. SAP will support EDI through Intermediate documents (IDOCS).
    EDI (Electronic Document interchange) - EDI is the electronic exchange of business documents between the computer systems of business partners, using a standard format over a communication network. 
    EDI is also called paperless exchange. 
    Advantages: 
    Reduced Data entry errors
    Reduced processing time
    Availabilty of data in electonic form
    Reduced paperwork
    Reduced Cost
    Reduced inventories and better planning
    Standard means of communications
    Better business process
    EDI has two process
    1. Outbound process
    2. Inbound process
    OP:
    1.Application document is created.
    2.IDOC is generated
    3.IDoc is transferred from SAP to Operating system layer
    4.Idoc is converted into EDI standards
    5.Edi document is transmitted to the business partner
    6.The Edi Subsystem report status to SAP
    IP:
    1.EDI transmission received
    2.EDI document is converted into an IDOC
    3.IDOC is transferred to the SAP layer
    4.The application document is created
    5.The application document can be viewed.
    IDOC:
    IDOC is a container that can be used to exchange data between any two process.
    Each iDoc is assigned a unique number for tracking and future reference.
    iDoc Consist of several segments,and segments contain several fields.
    iDoc contains the following three type of records...
    1.One Control Record.
    2.One or many Data Record
    3.One or many Status record.
    PORT:
    Port is used in the outbound process to determine the name of the EDI subsystem program,the directory path where the idoc file will be created at the operating system level,the idoc file names and the rfc desinations.
    RFC Destination:
    Used to define the characteristics of communication links to a remote system on which a functions needs to be executed.
    Partner Profile:
    Partner profile specified the various componets used in an outbound process ( Partner number,IDoc type,message type,Port,Process code),the mode in which it communicates with the subsystem(batch or immediate) and the person to be notified in case of errors.
    Message Control
    Used in pricing,account determination,material determination,and output determination.The message control component enables you to encapsulate business rules with out having to write abap programs.
    Process:
    Setup RFC destinations SM59
    Port Destinations WE21
    Partner Profile WE20
    Message control NACE
    Purchase Order ME21
    Check IDOCs WE02,WE05
    Explain to me about Idoc?
    IDoc (for intermediate document) is a standard data structure for electronic data interchange (EDI) between application programs written for the popular SAP business system or between an SAP application and an external program. IDocs serve as the vehicle for data transfer in SAP's Application Link Enabling (ALE) system. 
    IDocs are used for asynchronous transactions:  Each IDoc generated exists as a self-contained text file that can then be transmitted to the requesting workstation without connecting to the central database. 
    Another SAP mechanism, the Business Application Programming Interface (BAPI) is used for synchronous transactions. 
    A large enterprise's networked computing environment is likely to connect many geographically distributed computers to the main database. These computers are likely to use different hardware and/or operating system platforms. An IDoc encapsulates data so that it can be exchanged between different systems without conversion from one format to another. 
    IDoc types define different categories of data, such as purchase orders or invoices, which may then be broken down into more specific categories called message types. Greater specificity means that an IDoc type is capable of storing only the data required for a particular transaction, which increases efficiency and decreases resource demands. 
    An IDoc can be generated at any point in a transaction process. For example, during a shipping transaction process, an IDoc may be generated that includes the data fields required to print a shipping manifest. After a user performs an SAP transaction, one or more IDocs are generated in the sending database and passed to the ALE communication layer. The communication
    layer performs a Remote Function Call (RFC), using the port definition and RFC destination specified by the customer model. 
    The IDoc is transmitted to the receiver, which may be an R/3, R/2, or some external system.
    Re,Manas

  • Any difference between rfc4448 and rfc4665-based ethernet vpws?

    thanks

    Hello Karen,
    both RFCs conform to the pseudowire service model defined in previous RFC 3985.
    so regarding this aspect they share the same root. RFC 4448 is more focused on EoMPLS, RFC 4665 describes requirements in service provider networks to support point -to-point and point-to-mulitpoint (VPLS) services.
    Hope to help
    Giuseppe

  • Difference between Table and Table Type

    Hi
       Can you please let me know the
    Difference between Table and Table Type and
    Difference between Structure and Table Type?
    Regards,
    Sree

    hi,
    table is a data dictionary object in sap. table is of different types
    1. transparent tables
    2. pool tables
    3. cluster tables
    table type gives option for u to select different types of internal tables. they r
    1. standard table
    2. sorted table
    3. hash table
    Structures :
    -Defined like a table and can then be addressed from ABAP programs.
    -Structures contain data only during the runtime of a program.
    -Just like user-defined data type.
    - they are not present in database server and only on application server.
    if helpful reward some points.
    with regards,
    Suresh Aluri.

  • Diference between structure and infostructure

    Hi All!
    What is the difference between structure and infostructure in SAP.What are the pros and cons.
    Please provide me any analysis on this?
    Regards
    Praneeth

    hi Praneeth,
    <b>Structure:</b>In structure there will be no data present.
    Only the tables contains data.
    Structures are meant for temporary passage of data and we can include tht structure in any tables..
    Check these links
    http://help.sap.com/saphelp_nw04/helpdata/en/5c/11afb6d55711d2b1f80000e8a5b9a5/content.htm
    http://help.sap.com/saphelp_erp2005/helpdata/en/6b/9f97e674547b4fa7e33e5d36cea248/frameset.htm
    http://help.sap.com/saphelp_erp2005/helpdata/en/61/d25eb4166811d2a2380000e8a5f24f/frameset.htm
    http://help.sap.com/saphelp_erp2005/helpdata/en/ff/6bb43b3d4a7958e10000000a114084/frameset.htm
    Regards,
    Santosh

  • Security Profiles - Difference between SYSTEM and TENANT admin user?

    Hi,
    In the OnDemand Enterprise workbook, some defualt security profiles have been configured.  This includes one called 'Tenant Admin'.   When I look in the system there is also a profiule called 'System Admin'.  Could somebody please explan the differences between system and tenant regarding these profiles?   I assume we shoul drarely use System Admin, and Tenant Admin is the safer option?
    Thanks
    John

    Hi,
    As you mentioned there are 2 status can be maintained for documents like Equipment Master, Notification, Maintenance Order & other important business documents.
    In case, client feels that system status is not enough to capture the details of the object, then user status can be used.
    System statuses will be updated automatically based on business transactions which will be done on SAP.
    For example, once the equipment is created, System status would CRTD (Created). If you install the same to some superior equipment or FL, then status would be INST (Installed).
    If you keeping that equipment in Spare, then for that, you have to maintain separate User Status like AVLB (Available in Stock / Spare) so that through IH08, by using User status, you can the report which is available as spare.
    These user status as per the name, should be updated by the user manually.
    Regards,
    Maheswaran.

  • Difference between payscale and paygrade,  salary structure, payscale struc

    what is the difference between payscale and paygrade?
    also where can we find  salary structure, payscale structure
    regards
    cs

    Pay Scale  is the specific set of information that determines a preconfigured monthly, semi-monthly, or hourly rate of pay. It consists of Pay Scale Area, Pay Scale Group and Level, Pay Scale Type, and Capacity Utilization Level.
    Pay Scale would be used if there are steps based on time or other criteria such as can be found in a union agreement. However, it can also be used for salaried employees. Pay Grade would be used if most of the employees were salaried. Pay Grade is also tied to Compa Ratio while Pay Scale is not.
    Pay Scale Structure means creation of Payroll area , Pay scale type,area, group and levels with EmpSub group grouping for PCR & CAP's.
    Salary Structure - Structure of job grades and pay ranges within a company. It is a grouping of pay grades.
    Hope this helps
    Vinodh Balakrishnan

  • What's the security difference between WPA and WPA2 Personal?

    In order to get my G4 iMac (OS 10.4.11) onto my new AEBS(b/g/n) wi-fi network, I had to drop the network security down from WPA2 Personal to WPA/WPA2 Personal.
    What are the potential security risks in this mode? I know that WEP is no longer secure, so I'm concerned about WPA also being vulnerable.
    If there's a good online explanation of these security differences (not necessarily Apple-only), you just give me that link.
    Thanks

    Hi,
    Summary:
    1.WPA2 is the improved version of WPA
    2.WPA only supports TKIP encryption while WPA2 supports AES
    3.Theoretically, WPA2 is not hackable while WPA is
    4.WPA2 requires more processing power than WPA
    http://www.differencebetween.net/technology/difference-between-wpa-and-wpa2/

Maybe you are looking for

  • Letter of Credit (LC) for vendor payments

    Hi, We have a case where a single LC will be raised at the time of creation of purchase order. The vendor will send invoices at regular intervals. We will need to clear the invoices against the single LC created. How will we do this in SAP and how ca

  • I cannot open a pdf on mac - am running 17.0.1 on mac os 10.6.8

    Hi, I cannot open a pdf on mac - am running 17.0.1 on mac os 10.6.8. I followed the instructions here: http://support.mozilla.org/en-US/kb/pdf-files-are-blank-and-cant-be-downloaded-mac?esab=a&s=pdf+mac&r=0&as=s but the problem is not fixed - I just

  • Can i run Creative Cloud (full), Ableton Live 9 Suite/Fl studio 11 producer edition on a MacBook Air?

    i know all of this is a stretch on a Thin 'n'light computer,. but i'm a highschool student with serios prospects and lots of stuff i want to do , and i'll be saving about 200 dollars buying a macbook air insead of macbook pro. Any replies are greatly

  • Delete Infotype 0008

    Hi, i have a scenerio where i need to delete the infotype 0008 we have 2 system one for payroll process another  for maintaining data salary exempt we have infotype 8 in payroll system but not in maintainence system so a person is moved from hourly t

  • Java Card Security domain

    Hi , According to the visa Open platform architecture, each Java card applet is associated with a Security domain. I am using GemXpressoRAD211 toolkit for developing Java Card applets. In the Gemxpresso211IS card, the default security domain is the C