cancel
Showing results for 
Search instead for 
Did you mean: 

Structural Authorizations preventing a number of transactions

Former Member
0 Kudos

Scenario:

Structural authorizations have been set for Resource Management in PPM.

The standard switches that are being used:

AUTSWADAYS0HR: Tolerance Time for Authorization Check
AUTSWAPPRO0HR: Test Procedures
AUTSWDFCON0HR: Default Position (Context)
AUTSWINCON0HR: Master Data (Context)
AUTSWNNCON0HR:Customer-Specific Authorization Check (Context)
AUTSWNNNNN0HR: Customer-Specific Authorization Check
AUTSWORGIN1HR: Master Data
AUTSWORGPD0HR: Structural Authorization Check
AUTSWORGXX0HR: Master Data - Extended Check
AUTSWPERNR1HR: Master Data - Personnel Number Check
AUTSWXXCON0HR: Master Data - Enhanced Check (Context)

By default, authorization profiles are assigned to all positions (this is a requirement from PPM).

The issue is structural authorization is restricting users from accessing any object which doesn't have an evaluation path.

For example, it is preventing users from creating work centers (Object Type = A).

Work Centers are not connected to HR structure here and should not be failing structural authorization checks.

Is there any way to prevent this - either by changing the switch values or defining some generic evaluation paths (evaluation path with object value = *). So far all our attempts to use a generic evaluation path has failed.

Any advice on this will be greatly appreciated.

- B

Accepted Solutions (1)

Accepted Solutions (1)

Former Member
0 Kudos

Thanks Sven for your help.

The issue has now been resolved. It was done through a change in the combination of switches and change in the structural authorization profile.

Switch settings:

AUTSWADAYS0HR: Tolerance Time for Authorization Check
AUTSWAPPRO0HR: Test Procedures
AUTSWDFCON0HR: Default Position (Context)
AUTSWINCON0HR: Master Data (Context)
AUTSWNNCON0HR:Customer-Specific Authorization Check (Context)
AUTSWNNNNN0HR: Customer-Specific Authorization Check
AUTSWORGIN1HR: Master Data
AUTSWORGPD0HR: Structural Authorization Check
AUTSWORGXX0HR: Master Data - Extended Check
AUTSWPERNR1HR: Master Data - Personnel Number Check
AUTSWXXCON0HR: Master Data - Enhanced Check (Context)

Authorization profile settings:

Answers (1)

Answers (1)

Former Member
0 Kudos

Hi,

Per default, all users have the same profile as SAP*, if they are not assigned in T77ua. Per default again, that's "ALL".

If it's not ALL, but you want all users to have access to all objects of type A (if they have access in auth object PLOG), then you have to

- assign a profile with objtype A abd * to SAP*

- assign the same profile to all users, who have something else assigned in t77ua

Even if you use ALL for SAP*, you still need the second step, because in that case, as soon as you assign anything to a user in t77ua, they lose everything else they had before per default.