Language & Region
SAP Wiki

SAP authorizations

SAP systems are the digital backbone of many companies. A well thought-out authorization concept plays a central role in ensuring security, traceability and efficiency.

What are SAP authorizations?

SAP authorizations regulate what a user is allowed to see and execute in the system. Access to transactions, data, functions and reports is controlled via a fine-grained authorization concept. This is based on so-called authorization objects, which define certain actions in combination with organizational units or data fields.

What does an SAP authorization concept consist of?

A solid authorization concept is made up of several components:

ComponentDescription
User master recordCentral user administration with personal and security-relevant data
Rollers (PFCG)Roles bundle authorization objects and are assigned to users
ProfilTechnical translation of the roles for the authorization system
Authorization objectsCombination of fields such as activity, company code, plant, etc.
Organizational assignmentsRestriction to organizational units such as company codes or plants

Role management with transaction PFCG

Transaction PFCG is the heart of role maintenance in the SAP system. This is where roles can be created, changed and filled with transactions, reports and authorizations. A distinction is made between

  • Single roles: A collection of specific authorizations
  • Composite roles: Are made up of several single roles
  • Derivations: Role variants for different organizational units

SAP authorizations in transition - What's new with S/4HANA?

With the introduction of SAP S/4HANA and the Fiori interface, authorization management is also changing:

RangeChange with S/4HANA
Fiori AppsAuthorizations control access to Fiori tiles via APP IDs
CDS ViewsCore Data Services are accessed via analytical authorizations
UI5 TechnologyTechnical roles for SAP GUI and Fiori must be managed in combination
SAP BRF+Business Rules Framework is used to control workflows and authorizations

Blog post: authorizations in Fiori

FIORI apps are clear, easy to use and ideal for mobile devices. However, authorizations for FIORI work differently than for ERP transactions. We will tell you how to achieve a good authorization concept.

Typical roles and authorization objects

In practice, there are frequent roles with corresponding authorizations. Examples:

RoleTypical transactionsImportant authorization objects
PurchaserME21N, ME22N, ME23NM_BEST_BSA, M_BEST_EKG
AccountantFB60, F110, F-02F_BKPF_BUK, F_LFA1_APP
Warehouse managerMIGO, MB1C, LT01M_MSEG_WMB, L_LGNUM
HR administratorPA30, PA20, PA40P_ORGIN, P_PERNR
System administratorSU01, PFCG, ST01S_USER_GRP, S_USER_PRO

Organizational restrictions

A particular strength of SAP authorizations lies in the combination of activity (e.g. display, change, create) and organizational unit (e.g. plant, company code, personnel area). This restriction increases security:

Example: an employee may only make postings for company code 1000, but not for others.

FAQ - Frequently asked questions

Wie erkenne ich fehlende Berechtigungen eines Benutzers?
Mit Transaktionen wie SU53 (letzte fehlgeschlagene Berechtigungsprüfung) oder ST01 (Systemtrace) können fehlende Objekte analysiert werden.

Was ist der Unterschied zwischen Rolle und Profil?
Die Rolle ist die organisatorische Einheit für Benutzerrechte. Das Profil ist die technische Übersetzung, die vom System zur Laufzeit verwendet wird.

Wie funktioniert die Massenpflege von Rollen?
Mit Tools wie PFCG_MASS_CHANGE oder dem SAP NetWeaver Identity Management lassen sich Rollen und Benutzer effizient in großen Mengen verwalten.

Best practices for a secure authorization system

  • Principle of minimal assignment of rights: only grant what is necessary.
  • Separation of functions (SoD): Avoid critical combinations (e.g. posting invoice + triggering payment).
  • Regular recertification: Have user roles checked periodically.
  • Documentation & traceability: Log all changes to roles in an audit-proof manner.
  • Use a test environment: Test new roles in a QA environment before going live.

Tools for management and analysis

SAP offers a range of tools for managing and analyzing authorizations:

Tool / TransactionFunction
SU01/SU10User maintenance (individually / en masse)
PFCGRoll care
SUIMUser information system
ST01System trace for authorization checks
SU53Analysis of failed authorizations
GRC Access ControlAdvanced governance and compliance tools

Challenges in the assignment of authorizations

The complexity of SAP authorizations can lead to various problems:

  • Overauthorization due to role inheritance or poor maintenance
  • Lack of separation of responsibilities
  • Lack of documentation
  • Difficult to trace in the event of an audit

Conclusion: Why a good authorization concept is crucial

A well thought-out authorization system is not a "nice-to-have", but essential for the IT security and efficiency of SAP systems. It protects sensitive data, fulfills legal requirements and supports smooth business processes. Especially with the switch to S/4HANA, it is crucial to put existing concepts to the test and redesign them.