SmartExporter end user

To call the SmartExporter RFC function modules the user requires the following authorizations.

RFC Access

Authorizations check for RFC access (S_RFC)

Activity (ACTVT)

16 (Execute)

Name of RFC object (RFC_NAME) to be protected

/AUDIC/SE, RFC1, SDIFRUNTIME, SYST, SCUST_SYS_INFO, SLI1, SDTX, SUSR

Type of RFC object (RFC_TYPE) to be protected

FUGR (Function group)

Table: Authorizations check for RFC access (S_RFC)

 

Note:

When using SAP® 4.6C you have to replace SDIFRUNTIME by SDIF.

 

The authorizations for the function groups SCUST_SYS_INFO and SLI1 are optional for the download of data. However, for the download of Data Dictionaries these authorizations are required.

If these authorizations are not assigned, not all information can be shown in the connection test of the SmartExporter Windows client.

 

Figure: Authorizations check for RFC access (S_RFC)

 

System authorizations (S_ADMI_FCD)

Process administration with the transactions SM04, SM50

PADM

Table: System administration function (S_ADMI_FCD)

 

Note:

The authorization process administration S_ADMI_FCD, activity PADM is optional. If this authorization is not assigned, not all information can be shown in the connection test and the Data Dictionary download of the SmartExporter client.

 

Figure: System administration function (S_ADMI_FCD)

 

Archiving (S_ARCHIVE)

Activity

03

Work area

Not maintained

Archiving Object

Not maintained

Table: Archiving (S_ARCHIVE)

 

Note:

The attributes for the authorization object have to be defined according to your requirements on an individual basis.

 

To allow access to archived data in an SAP® system, a separate license for the SmartExporter client is required.

 

Figure: Archiving

 

Batch-Processing: Batch-Jobs (S_BTCH_JOB)

Job operations

RELE, SHOW, PROT

Summary of jobs

*

Table: Batch-Processing: Batch-Jobs (S_BTCH_JOB)

 

Note:

Without the authorization to enable one's own batch jobs (RELE) it is not possible to run asynchronous Data Requests or to run a Data Request as a background job.

 

Figure: Batch-Processing: Batch-Jobs (S_BTCH_JOB)

 

Writing files to the backend file system requires the following authorizations (S_DATASET).

 

Authorization for file access (S_DATASET)

Activity (ACTVT)

Delete, Read, Write

Physical file name (FILENAME)

Not maintained

ABAP-Program name (PROGRAM)

/AUDIC/*

Table: Authorization for file access (S_DATASET)

 

Note:

You can further restrict the authorizations using the attributes FILENAME and PROGRAM.

 

The /AUDIC/* value for the PROGRAM attribute only allows programs, function modules and classes from the AUDIC namespace to access the specified path.

When using the FILENAME attribute for the restriction you have to specify the physical path in the file system of the application server(s). You cannot specify the logical file name which is configured in the SmartExporter settings.

The maximum length of the path of 59 characters may not be exceeded because otherwise no authorization check is possible.

 

Figure: Authorization for file access (S_DATASET)

 

Table Maintenance

Table maintenance using default tools like SM30 (S_TABU_DIS)

Activity (ACTVT)

03 (Display)

Auth. group (DICBERCLS)

ZASE

Table: Table maintenance using default tools like SM30 (S_TABU_DIS)

 

Figure: Table maintenance using default tools like SM30 (S_TABU_DIS)

Note:

For SAP® versions of the base release 700 and higher a new authorization object S_TABU_NAM is available (see SAP® note 1481950). This object also allows you to restrict the access on table level below or alongside an authorization group.

 

Note:

Using the SmartExporter authorization profiles you can define which tables the SmartExporter end user may access complementary to SmartExporter customized settings for the SAP® authorization check. This may be useful if you do not want to alter existing S_TABU_DIS roles but prefer to create dedicated authorizations for tables with your own authorization object.

 

With the deployment of the SmartExporter SAP® components 7.0.0004 the authorization object S_USER_GRP was added to allow the assignment of roles to the SmartExporter profile.

 

User master maintenance: User groups

User master maintenance: User groups (S_USER_GRP)
User group in user master maintenance (CLASS) *
Activity (ACTVT) 03 (Display)

Table: Authorization user master maintenance: User groups (S_USER_GRP)

Note:

The attribute for user group has to be defined according to your requirements on an individual basis.

 

Figure: Authorization for user groups (S_USER_GRP)