Enterprise Resource Planning Blogs by Members
Gain new perspectives and knowledge about enterprise resource planning in blog posts from community members. Share your own comments and ERP insights today!
cancel
Showing results for 
Search instead for 
Did you mean: 
lukemarson
Active Contributor
0 Kudos

In the report /NAKISA/RFC_REPORT the following security rules are used:

  1. View authority for each table is requested with function module VIEW_AUTHORITY_CHECK
  2. PA infotypes are checked for PERNR authority using function module HR_CHECK_AUTHORITY_INFTY. Authorization objects p_orgin and p_pernr are not used.
  3. OM infotypes are checked using PLOG authority check

For PERNR based authorization values can be maintained in the SAP table /NAKISA/PESEINFO. An example can be seen below:

INFOTYPEPERNR
SUBTY
ENABLESECURITY
ACTION
0001PERNRSUBTYXDELROW
0008PERNRXDELROW
9003PERNRXDELROW

The SUBTY field is optional.

Labels in this area