{"id":2899,"date":"2012-06-06T10:11:46","date_gmt":"2012-06-06T04:41:46","guid":{"rendered":"http:\/\/JitendraZaa.com\/blog\/?p=2899"},"modified":"2014-03-31T05:39:30","modified_gmt":"2014-03-31T05:39:30","slug":"s_tabu_nam-an-advanced-authorization-object-for-generic-table-access","status":"publish","type":"post","link":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/s_tabu_nam-an-advanced-authorization-object-for-generic-table-access\/","title":{"rendered":"S_TABU_NAM: An advanced authorization object for generic table access"},"content":{"rendered":"<p style=\"text-align: justify;\">In general, the access to particular table is controlled by authorization object S_TABU_DIS which has fields for activity (ACTVT) and Authorization group (DICBERCLS). In this case, it is understood that the table is assigned to specific authorization group and the name of authorization group containing the respective table has be maintained in S_TABU_DIS.<\/p>\n<p style=\"text-align: justify;\">However, this situation has some limits:<\/p>\n<ul>\n<li style=\"text-align: justify;\">There are large numbers of table which are not assigned to any authorization groups, these are included under authorization group <strong>&amp;NC&amp;<\/strong> but assignment of tables to this authorization group is not much useful while securing access to any particular table.<\/li>\n<li style=\"text-align: justify;\">The authorization group name can have up to 4 characters hence there is a limit to define the authorization group.<\/li>\n<li style=\"text-align: justify;\">If we need to give access to only one table belonging to some authorization group; say XYZ then it involves an additional efforts.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><!--more--><br \/>\nTo overcome these limitations, we can use the authorization object S_TABU_NAM. This authorization object contains two fields as below:<\/p>\n<ul>\n<li>Activity (ACTVT) \u2013 Display or change access similar to ACTVT in S_TABU_DIS<\/li>\n<li>Table Name (TABNAME) \u2013 Name of table of view<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">With this object, the system checks the view names or table names directly so that an exact authorization check is possible. Also, this table is checked only if the authorization check on S_TABU_DIS is unsuccessful. In this way, this provision enables both features providing more flexibility.<br \/>\nThe authorization object S_TABU_NAM is provided in recent versions of SAP Systems, a relevant note\/correction instructions need to be applied to system with lower versions. At program level, the authorization check on S_TABU_NAM is implemented only in the module VIEW_AUTHORITY_CHECK.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>S_TABU_NAM: An advanced authorization object for generic table access in SAP<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"jz_research_post":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[332],"class_list":["post-2899","post","type-post","status-publish","format-standard","hentry","category-sap","tag-sap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2487,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/sap-security-interview-questions-tips-and-tricks\/","url_meta":{"origin":2899,"position":0},"title":"SAP Security Interview Questions, Tips and Tricks","author":"Santosh Karemore","date":"November 20, 2011","format":false,"excerpt":"Important Must read Interview Questions of SAP Security, Tips and Tricks","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2887,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/sap-r3-security-interview-questions\/","url_meta":{"origin":2899,"position":1},"title":"SAP R\/3 Security &#8211; Interview Questions","author":"Santosh Karemore","date":"June 2, 2012","format":false,"excerpt":"Interview Questions for SAP R3 Security","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":509,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/sap-r3-audit-review-checklist\/","url_meta":{"origin":2899,"position":2},"title":"SAP R\/3 Audit Review Checklist","author":"Santosh Karemore","date":"July 2, 2010","format":false,"excerpt":"It is always advisable to perform a check on SAP R\/3 system a couple of times a year to ensure the tight security of SAP System. Below are few useful Do's which can help to achieve the high degree of Security: Review the following:-\u00a0 \u00a0System security file parameters (TU02) (e.g.\u2026","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2010\/07\/SAP-291x300.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":6152,"url":"https:\/\/www.jitendrazaa.com\/blog\/salesforce\/call-salesforce-rest-api-from-apex\/","url_meta":{"origin":2899,"position":3},"title":"Call Salesforce REST API from Apex","author":"Jitendra","date":"February 27, 2014","format":false,"excerpt":"Use Apex to call Salesforce REST API with sample source code","rel":"","context":"In &quot;Salesforce&quot;","block_context":{"text":"Salesforce","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/salesforce\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2910,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/how-to-set-up-central-user-administration-cua-in-sap\/","url_meta":{"origin":2899,"position":4},"title":"How to set up Central User Administration (CUA) in SAP","author":"Santosh Karemore","date":"June 8, 2012","format":false,"excerpt":"Step by step tutorial of setting up Central User Administration (CUA) in SAP","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"SAP CUA System Name System User","src":"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2012\/06\/SAP-CUA-System-Name-System-User.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":4532,"url":"https:\/\/www.jitendrazaa.com\/blog\/salesforce\/salesforce-to-salesforce-integration-using-named-credentials-in-just-5-lines-of-code\/","url_meta":{"origin":2899,"position":5},"title":"Salesforce to Salesforce integration using Named Credentials in 5 lines","author":"Jitendra","date":"May 29, 2015","format":false,"excerpt":"I have already written article to integrate Salesforce with other Salesforce instance around 3 years back. In last 3 years, Salesforce has changed a lot. This time I will integrate Salesforce with other Salesforce only only in 5 lines of code, can you believe it \u00a0:) ? Check my old\u2026","rel":"","context":"In &quot;Salesforce&quot;","block_context":{"text":"Salesforce","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/salesforce\/"},"img":{"alt_text":"Authenticated Named Credential in Salesforce","src":"https:\/\/i0.wp.com\/www.jitendrazaa.com\/blog\/wp-content\/uploads\/2015\/05\/Authenticated-Named-Credential-in-Salesforce.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/2899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/comments?post=2899"}],"version-history":[{"count":1,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/2899\/revisions"}],"predecessor-version":[{"id":3793,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/2899\/revisions\/3793"}],"wp:attachment":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/media?parent=2899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/categories?post=2899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/tags?post=2899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}