SAP MDG Security.pdf
SAP MDG Security.pdf
Caution
Before you start the implementation, make sure you have the latest version of this document. You can find the
latest version at the following location:xxx /xxx
The following table provides an overview of the most important document changes.
Table 1
Version Date Description
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
2 All rights reserved. Document History
Content
2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
6 Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
11 Segregation of Duties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Content All rights reserved. 3
13 Change Settings of Generated MDG Database Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
14 Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
4 All rights reserved. Content
1 SAP Master Data Governance Security
Guide
The following guide covers the information that you require to operate SAP Master Data Governance securely. To
make the information more accessible, it is divided into a general part, containing information relevant for all
components, and a separate part for information specific for individual components.
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
SAP Master Data Governance Security Guide All rights reserved. 5
2 Introduction
This guide does not replace the administration or operation guides that are available for productive operations.
Target Audience
● Technology consultants
● Security consultants
● System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation
Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas
the Security Guide provides information that is relevant for all life cycle phases.
For all Security Guides published by SAP, see SAP Service Marketplace at service.sap.com/securityguide .
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
6 All rights reserved. Introduction
This section provides an overview of the authorization concept that applies to Master Data Governance.
● Network and Communication Security [page 15]
This section provides an overview of the communication paths used by Master Data Governance and the
security mechanisms that apply. It also includes our recommendations for the network topology to restrict
access at the network level.
● Data Storage Security [page 18]
This section provides an overview of any critical data that is used by Master Data Governance and the
security mechanisms that apply.
● Enterprise Services Security [page 19]
This section provides an overview of the security aspects that apply to the enterprise services delivered with
Master Data Governance.
● Security-Relevant Logs and Tracing [page 20]
This section provides an overview of the trace and log files that contain security-relevant information, for
example, so you can reproduce activities if a security breach does occur.
● Segregation of Duties [page 21]
● Authorization Objects and Roles Used by SAP Master Data Governance [page 23]
● Change Settings of Generated MDG Database Tables [page 40]
● Appendix [page 41]
This section provides references to further information.
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Introduction All rights reserved. 7
3 Before You Start
This table contains the most important SAP notes concerning the safety of Master Data Governance.
Table 2
Title SAP Note Comment
More Information
For more information about specific topics, see the sources in the table below.
Table 3
Content Quick Link on SAP Service Marketplace or SDN
Security sdn.sap.com/irj/sdn/security
service.sap.com/securitynotes
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
8 All rights reserved. Before You Start
4 Technical System Landscape
For information about the technical system landscape, see the sources listed in the table below.
Table 4
Subject Guide/Tool Quick Link to SAP Service Marketplace
Note
If you intend to use a portal in your landscape, ensure that the embedding enterprise portal frame has the same
domain as the embedded web dynpro application.
To check the settings, call up the technical help in the web dynpro application (right mouse click, then select
Technical Help). On the Browser tab, check if the Parent window is accessible indicator is marked.
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Technical System Landscape All rights reserved. 9
5 User Management and Authentication
Master Data Governance uses the user management and authentication mechanisms of the SAP NetWeaver
platform, and in particular, SAP NetWeaver Application Server. Therefore, the security recommendations and
guidelines for user management and authentication that are described in the security guide for SAP NetWeaver
Application Server for ABAP Security Guide [external document] also apply to Master Data Governance.
In addition to these guidelines, we also supply information on user management and authentication that is
especially applicable to Master Data Governance in the following sections:
● User Administration [page 10]
This section details the user management tools, the required user types, and the standard users that are
supplied with Master Data Governance.
● User Data Synchronization [page 12]
The components of Master Data Governance can use user data together with other components. This
section describes how the user data is synchronized with these other sources.
● Integration into Single Sign-On Environments [page 12]
This section describes how Master Data Governance supports single sign-on-mechanisms.
Master Data Governance user management uses the mechanisms provided by SAP NetWeaver Application
Server for ABAP, such as tools, user types, and the password concept. For an overview of how these mechanisms
apply for Master Data Governance, see the sections below. In addition, we provide a list of the standard users
required for operating components of Master Data Governance.
User Administration Tools
The following table shows the user administration tools for Master Data Governance.
Table 5
Tool Description
User maintenance for ABAP-based systems (transaction For more information on the authorization objects provided
SU01) by the components of Master Data Governance, see the
component specific section.
Role maintenance with the profile generator for ABAP-based For more information on the roles provided by Master Data
systems (PFCG) Governance, see the component specific section.
Central User Administration (CUA) for the maintenance of For more information, see Central User Administration
multiple ABAP-based systems [external document].
User Management Engine for SAP NetWeaver AS Java (UME) Administration console for maintenance of users, roles, and
authorizations in Java-based systems and in the Enterprise
Portal. The UME also provides persistence options, such as
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
10 All rights reserved. User Management and Authentication
ABAP Engine. For more information, see User Management
Engine [external document].
Note
For more information on the tools that SAP provides for user administration with SAP NetWeaver, see SAP
Service Marketplace at service.sap.com/securityguide SAP NetWeaver 7.0 Security Guides
(Complete) Release User Administration and Authentication .
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
specify that individual users who perform tasks interactively have to change their passwords on a regular basis,
but not those users under which background processing jobs run.
User types required for Master Data Governance include, for example:
● Individual users
○ Dialog users
Dialog users are used for SAP GUI for Windows.
○ Internet users for Web applications
Same policies apply as for dialog users, but used for Internet connections.
● Technical users:
○ Service users are dialog users who are available for a large set of anonymous users (for example, for
anonymous system access via an ITS service).
○ Communication users are used for dialog-free communication between systems.
○ Background users can be used for processing in the background.
Standard Users
The following table shows the standard users that are necessary for operating Master Data Governance.
Table 6
System User ID Type Password Additional
Information
SAP Web Application SAP Service SAP system service Mandatory SAP NetWeaver
Server (sapsid)adm administrator installation guide
SAP Web Application SAP Standard ABAP See SAP NetWeaver SAP NetWeaver
Server Users (SAP*, DDIC, security guide security guide
EARLYWATCH,
SAPCPIC)
SAP Web Application SAP Standard SAP See SAP NetWeaver SAP NetWeaver
Server Web Application Server security guide security guide
Java Users
SAP ECC SAP Users Dialog users Mandatory The number of users
depends on the area of
operation and the
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
User Management and Authentication All rights reserved. 11
System User ID Type Password Additional
Information
business data to be
processed.
Note
We recommend that you change the passwords and IDs of users that were created automatically during the
installation.
By synchronizing user data, you can reduce effort and expense in the user management of your system
landscape. Since Master Data Governance is based on SAP NetWeaver, you can use all of the mechanisms for
user synchronization in SAP NetWeaver here. For more information, see the SAP NetWeaver Security Guide on
SAP Service Marketplace at service.sap.com/securityguide SAP NetWeaver.
Note
You can use user data distributed across systems by replicating the data, for example in a central directory
such as LDAP.
Master Data Governance supports the single sign-on (SSO) mechanisms provided by SAP NetWeaver Application
Server for ABAP technology. Therefore, the security recommendations and guidelines for user management and
authentication that are described in the SAP NetWeaver Security Guide also apply to Master Data Governance.
Master Data Governance supports the following mechanisms:
Secure Network Communication (SNC)
SNC is available for user authentication and provides for an SSO environment when using the SAP GUI for
Windows or Remote Function Calls.
SAP Logon Tickets
Master Data Governance supports the use of logon tickets for SSO when using a Web browser as the front-end
client. In this case, users can be issued a logon ticket after they have authenticated themselves with the initial SAP
system. The ticket can then be submitted to other systems (SAP or external systems) as an authentication token.
The user does not need to enter a user ID or password for authentication, but can access the system directly once
it has checked the logon ticket. For more information, see SAP Logon Tickets in the Security Guide for SAP
NetWeaver Application Server.
Client Certificates
As an alternative to user authentication using a user ID and passwords, users using a Web browser as a front-end
client can also provide X.509 client certificates to use for authentication. In this case, user authentication is
performed on the Web server using the Secure Sockets Layer Protocol (SSL Protocol). No passwords have to be
transferred. User authorizations are valid in accordance with the authorization concept in the SAP system.
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
12 All rights reserved. User Management and Authentication
For more information see Client Certificates in the Security Guide for SAP NetWeaver Application Server. For
more information about available authentication mechanisms, see SAP Library for SAP NetWeaver under User
Authentication and Single Sign-On [external document].
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
User Management and Authentication All rights reserved. 13
6 Authorizations
Master Data Governance uses the authorization concept of SAP NetWeaver Application Server ABAP. Therefore,
the security recommendations and guidelines for authorizations that are described in the Security Guide for SAP
NetWeaver Application Server ABAP also apply to Master Data Governance. You can use authorizations to restrict
the access of users to the system, and thereby protect transactions and programs from unauthorized access.
The SAP NetWeaver Application Server authorization concept is based on assigning authorizations to users based
on roles. For role maintenance in SAP NetWeaver Application Server ABAP, use the profile generator (transaction
PFCG), and in SAP NetWeaver Application Server for Java, the user management console of the User
Management Engine (UME). You can define user-specific menus using roles.
Note
For more information about creating roles, see Role Administration [external document].
Note
Before using the roles listed, you may want to check whether the standard roles delivered by SAP meet your
requirements.
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
14 All rights reserved. Authorizations
7 Network and Communication Security
Your network infrastructure is extremely important in protecting your system. Your network needs to support the
communication necessary for your business and your needs without allowing unauthorized access. A well-defined
network topology can eliminate many security threats based on software flaws (at both the operating system and
application level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, then there is no way for intruders to compromise the devices
and gain access to the backend system’s database or files. Additionally, if users are not able to connect to the
server LAN (local area network), they cannot exploit known bugs and security holes in network services on the
server machines.
The network topology for Master Data Governance is based on the topology used by the SAP NetWeaver platform.
Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security Guide also
apply to Master Data Governance. Details that relate directly to SAP ERP Central Component are described in the
following sections:
● Communication Channel Security [page 15]
This section contains a description of the communication channels and protocols that are used by the
components of Master Data Governance.
● Network Security [page 16]
This section contains information on the network topology recommended for the components of Master Data
Governance. It shows the appropriate network segments for the various client and server components and
where to use firewalls for access protection. It also contains a list of the ports required for operating the
subcomponents of Master Data Governance.
● Communication Destinations [page 16]
This section describes the data needed for the various communication channels, for example, which users
are used for which communications.
Communication channels transfer a wide variety of different business data that needs to be protected from
unauthorized access. SAP makes general recommendations and provides technology for the protection of your
system landscape based on SAP NetWeaver.
The table below shows the communication channels used by Master Data Governance, the protocol used for the
connection, and the type of data transferred.
Table 7
Communication Path Protocol Used Type of Data Transferred Data Requiring Special
Protection
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Network and Communication Security All rights reserved. 15
Communication Path Protocol Used Type of Data Transferred Data Requiring Special
Protection
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections
are protected using the Secure Sockets Layer protocol (SSL protocol).
Recommendation
We strongly recommend that you use secure protocols (SSL, SNC).
Since Master Data Governance is based on SAP NetWeaver technology, for information about network security,
see the corresponding sections of the SAP NetWeaver Security Guide at help.sap.com Technology
Platform SAP NetWeaver Release/Language SAP NetWeaver Security Guide Network and Communication
Security Network Services :
If you provide services in the Internet, you should protect your network infrastructure with a firewall at least. You
can further increase the security of your system or group of systems by placing the groups in different network
segments, each of which you then protect from unauthorized access by a firewall. You should bear in mind that
unauthorized access is also possible internally if a malicious user has managed to gain control of one of your
systems.
Ports
Master Data Governance is executed in SAP NetWeaver and uses the ports of AS ABAP or AS Java. For more
information see the corresponding security guides for SAP NetWeaver in the topics for AS ABAP Ports [external
document] and AS Java Ports [external document]. For information about other components, such as SAPinst,
SAProuter, or SAP Web Dispatcher, see the document TCP/IP Ports Used by SAP Applications in SAP Developer
Network at sdn.sap.com/irj/sdn/security under Infrastructure Security Network and Communications
Security .
The use of users and authorizations in an irresponsible manner can pose security risks. You should therefore
follow the security rules below when communicating between systems:
● Employ the user types system and communication.
● Grant a user only the minimum authorizations.
Note
For information on authorization objects, see Authorization Objects and Roles Used by SAP Master Data
Governance [page 23].
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
16 All rights reserved. Network and Communication Security
● Choose a secure password and do not divulge it to anyone else.
● Only store user-specific logon data for users of type system and communication.
● Wherever possible, use trusted system functions instead of user-specific logon data.
If you upload files from application servers into Master Data Governance and you want to use an virus scanner, a
virus scanner must then be active on each application server. For more information, see SAP Note 964305
(solution A).
Note
● Work through the Customizing activities in the Implementation Guide under the Virus Scan Interface node.
● When doing this, use the virus scan profile /MDG_BS_FILE_UPLOAD/MDG_VSCAN, which is delivered for
Master Data Governance.
When you upload files from the front-end into Master Data Governance, the system uses the configuration you
defined for virus scan profile /SIHTTP/HTTP_UPLOAD. For more information, see SAP Note 1693981 .
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Network and Communication Security All rights reserved. 17
8 Data Storage Security
Using Logical Paths and File Names to Protect Access to the File System
Master Data Governance saves data in files in the file system. Therefore, it is important to explicitly provide
access to the corresponding files in the file system without allowing access to other directories or files (also
known as directory traversal). This is achieved by specifying logical paths and file names in the system that map
to the physical paths and file names. This mapping is validated at runtime and if access is requested to a directory
that does not match a stored mapping, then an error occurs. In the application-specific part of this guide, there is
a list for each component of the logical file names and paths, where it is specified for which programs these file
names and paths apply.
More Information
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
18 All rights reserved. Data Storage Security
9 Enterprise Services Security
The following section in the NetWeaver Security Guide is relevant for Master Data Governance:
● Recommended WS Security Scenarios [external document]
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Enterprise Services Security All rights reserved. 19
10 Security-Relevant Logs and Tracing
The trace and log files of Master Data Governance use the standard mechanisms of SAP NetWeaver. For more
information, see the following sections in the SAP NetWeaver Security Guide at service.sap.com/securityguide
:
Auditing and Logging [external document]
Tracing and Logging [external document] (AS Java)
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
20 All rights reserved. Security-Relevant Logs and Tracing
11 Segregation of Duties
Segregation of duties can be achieved by assigning roles to users and in addition by a strict separation of the user
groups for the workflow.
Activities
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Segregation of Duties All rights reserved. 21
○ Master Data Governance Central Governance General Settings Process Modeling Workflow
Rule-Based Workflow Configure Rule-Based Workflow
For further information, see Configuring Master Data Governance for Business Partner [external document]
For information about the corresponding roles, see the documents listed below:
● Authorization Objects Used by Master Data Governance [page 28]
● Supplier Master Data Governance (CA-MDG-APP-SUP) [page 31]
● Customer Master Data Governance (CA-MDG-APP-CUS) [page 33]
● Material Master Data Governance (CA-MDG-APP-MM) [page 35]
● Financial Master Data Governance (CA-MDG-APP-FIN) [page 37]
● Custom Objects (CA-MDG-COB) [page 38]
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
22 All rights reserved. Segregation of Duties
12 Authorization Objects and Roles Used by
SAP Master Data Governance
This chapter provides information about authorization objects and roles used by:
● Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28]
● Authorization Objects and Roles Used by SAP MDG, Consolidation and Mass Processing [page 23]
Authorization Objects
SAP MDG, consolidation and mass processing uses the authorization objects listed below.
Table 8
Authorization Object Description
Caution
To use SAP MDG, consolidation and mass processing in combination with the functions of SAP MDG, central
governance, see the required authorization objects in the documents listed below:
● Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28]
● Master Data Governance for Business Partner (CA-MDG-APP-BP) [page 29]
● Master Data Governance for Supplier (CA-MDG-APP-SUP) [page 31]
● Master Data Governance for Customer (CA-MDG-APP-CUS) [page 33]
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 23
Standard Roles
Table 9
Frontend Launchpad Role Name
Table 10
Backend Authorization Role Name
12.1.1 MDC_PROOT
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
24 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
Features
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
31 Confirm Continue consolidation process after a process step has been executed
● The Continue button becomes active.
● If the process pauses at a check point, the Continue button stays active only if
the activity 31 Confirm is permitted.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
36 Extended Adjust configuration within the process UI for the current process
maintenance The Adjust link is displayed.
37 Accept Continue consolidation process after a matching step that still contains open
match groups
● The Continue button becomes active.
● If the process pauses at a check point and still open match groups exist, the
Continue button stays active only if the activity 37 Accept is permitted.
Caution
In addition, the activity 31 Confirm has to be permitted.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 25
12.1.2 MDC_PFILT
To create a process you have to select a Source, which is a combination of Source System, Status, and an optional
Source Filter.
Features
The activities listed below are assigned to the authorization object. They all are related to the optional Source
Filter.
Table 12
Activity Text Authorization
02 Change Create and run processes containing source data that is assigned to a Source
Filter.
The input help of the Sources field only displays sources with a Source Filter if this
activity is permitted.
06 Delete Delete processes containing source data that is assigned to a Source Filter.
12.1.3 MDC_MASS
Features
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
26 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
Activity Text Authorization
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
31 Confirm Continue mass processes after a process step has been executed.
The Continue button becomes active.
Caution
If the process pauses at a check point, the Continue button stays active only if
the activity 31 Confirm is permitted.
Note
Either the Start or the Continue button is displayed, depending on whether the
process has started or not.
36 Extended Adjust configuration within the process UI for the current process
maintenance The Adjust link is displayed.
12.1.4 MDC_ADMIN
Features
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 27
Activity Text Authorization
This report transforms customer and vendor data to business partner data during
the data import.
Authorization Objects
The following authorization objects are used by all components of Master Data Governance.
Note
To obtain more detailed information about specific authorization objects proceed as follows:
1. Choose SAP Menu Tools ABAP Workbench Development Other Tools Authorization Objects
Objects (Transaction SU21).
2. Select the authorization object using (Find) and then choose (Display).
3. On the Display authorization object dialog box choose Display Object Documentation.
Table 15
Authorization Object Description
USMD_MDATH Hierarchies
USMD_UI2 UI Configuration
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
28 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
Caution
For information about component specific authorization objects, see the corresponding sections:
● Master Data Governance for Business Partner (CA-MDG-APP-BP) [page 29]
● Master Data Governance for Supplier (CA-MDG-APP-SUP) [page 31]
● Master Data Governance for Customer (CA-MDG-APP-CUS) [page 33]
● Master Data Governance for Material (CA-MDG-APP-MM) [page 35]
● Master Data Governance for Financial (CA-MDG-APP-FIN) [page 37]
● Master Data Governance for Custom Objects (CA-MDG-COB) [page 38]
Standard Role
Table 16
Role Name
This role contains authorizations needed for administrative tasks and for setting up a base configuration in all
components of Master Data Governance. Some authorizations enable critical activities. If multiple users in your
organization are entrusted with the administration and configuration of Master Data Governance, we recommend
that you split the role into several roles, each with its own set of authorizations. The role does not contain the
authorizations for the respective master data transactions.
Enterprise Search
To use the Enterprise Search users have to be assigned to the role SAP_ESH_SEARCH Enterprise Search Hub
(Composite): Authorizations for searching.
Authorization Objects
Master Data Governance for Business Partner mainly uses the authorization objects of the business objects
Business Partner, the authorization objects of the Application Framework for Master Data Governance, and the
authorization objects of the Data Replication Framework.
Table 17
Authorization Object Description
Note
This authorization object is optional. You need to assign
this authorization object only if master data records are to
be specifically protected.
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 29
Authorization Object Description
BCV_QUILST Overview
BCV_QUERY Query
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28].
Standard Roles
Table 18
Role Name
SAP_MDGBP_MENU_04 [external document] Master Data Governance for Business Partner: Menu
SAP_MDGBP_DISP_04 [external document] Master Data Governance for Business Partner: Display
SAP_MDGBP_REQ_04 [external document] Master Data Governance for Business Partner: Requester
SAP_MDGBP_SPEC_04 [external document] Master Data Governance for Business Partner: Specialist
SAP_MDGBP_STEW_04 [external document] Master Data Governance for Business Partner: Data Steward
If you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
More Information
If you use the optional feature address screening, see the corresponding security guide under help.sap.com/fra
.
For details on the address screening, see Address Screening [external document].
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
30 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
12.2.2 Master Data Governance for Supplier (CA-MDG-APP-
SUP)
Authorization Objects
Master Data Governance for Supplier does not have dedicated authorization objects, but instead uses the
authorization objects of the business objects Business Partner and Vendor, the authorization objects of the
Application Framework for Master Data Governance, and the authorization objects of the Data Replication
Framework.
Table 19
Authorization Object Description
Note
This authorization object is optional. You need to assign
this authorization object only if master data records are to
be specifically protected.
Note
This authorization object is optional. You need to assign
this authorization object only if master data records are to
be specifically protected.
BCV_QUERY Query
BCV_QUILST Overview
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 31
Authorization Object Description
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28].
Standard Roles
Table 20
Role Name
SAP_MDGS_VL_MENU_04 Master Data Governance for Supplier (ERP Vendor UI): Menu
[external document]
If you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
More Information
If you use the optional feature address screening, see the corresponding security guide under help.sap.com/fra
.
For details on the address screening, see Address Screening [external document].
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
32 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
12.2.3 Master Data Governance for Customer (CA-MDG-APP-
CUS)
Authorization Objects
Master Data Governance for Customer does not have dedicated authorization objects, but instead uses the
authorization objects of the business objects Business Partner and Customer, the authorization objects of the
Application Framework for Master Data Governance, and the authorization objects of the Data Replication
Framework.
Note
Depending on whether you use the Master Data Governance for Customer on a hub system [external
document] or on a client system [external document] a different set of authorization objects is required.
Table 21
Authorization Object Description Hub Client
Syste Syste
m m
Note
This authorization object is optional. You do not need to assign
this authorization object if no master records are to be
specifically protected.
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 33
Authorization Object Description Hub Client
Syste Syste
m m
BCV_QUERY Query x x
BCV_QUILST Overview x x
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28].
Standard Roles
Table 22
Role Name
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
34 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
Role Name
If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data
Model and define which entity types and attributes are authorization relevant.
More Information
If you use the optional feature address screening, see the corresponding security guide under help.sap.com/fra
.
For details on the address screening, see Address Screening [external document].
Authorization Objects
Master Data Governance for Material does not have dedicated authorization objects, but instead uses, for
example, the authorization objects of the Material Master and the Application Framework for Master Data
Governance.
Table 23
Authorization Object Description
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 35
Authorization Object Description
Note
You need this authorization object for the object type
PLM_MAT only if the search object connector of SAP
NetWeaver Enterprise Search is created for the following
Enterprise Search software components:
● PLMWUI
● Software components that include PLMWUI
For more information about SAP NetWeaver Enterprise
Search, see SAP NetWeaver Enterprise Search [external
document].
BCV_QUILST Overview
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28].
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
36 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
Standard Roles
Table 24
Role Name
If you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
Authorization Objects
Table 25
Authorization Object Description
USMD_DIST Distribution
Note
This authorization object is used if you have not activated
business function MDG_FOUNDATION.
(Switch: FIN_MDM_CORE_SFWS_EHP5)
USMD_EDTN Edition
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28].
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 37
Standard Roles
Table 26
Role Description
If you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
Authorization Objects
You can use the following authorization objects for Master Data Governance for Custom Objects.
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
38 All rights reserved. Authorization Objects and Roles Used by SAP Master Data Governance
Table 27
Authorization Object Description
USMD_DIST Replication
Caution
Authorization objects used by all components of Master Data Governance are listed in the document
Authorization Objects and Roles Used by SAP MDG, Central Governance [page 28].
Standard Role
Table 28
Role Name
SAP_MDGX_FND_SAMPLE_SF_05 [external document] Master Data Governance for Custom Objects - Flight Data
Model (MDG 8.0)
If you want to restrict the authorizations for users or roles to specific values, run the Customizing activity under
Master Data Governance, Central Governance General Settings Data Modeling Define Authorization
Relevance per Entity Type and define which entity types and attributes are authorization relevant.
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Authorization Objects and Roles Used by SAP Master Data Governance All rights reserved. 39
13 Change Settings of Generated MDG
Database Tables
The SAP system generates database tables for the entities of all defined data models. The settings of these
database tables are the following:
● Buffering and log of data changes is switched on.
● Display and maintenance is allowed with restrictions.
Activities
To change these settings of generated MDG database tables run the transaction MDG_TABLE_ADJUST.
The results of the transaction are listed in the transaction SLG1 (Analyse Application Log), using Object FMDM and
Subobject ADJUST_TABLE.
Caution
● You have to execute the transaction in each system manually.
● After a model activation it might be necessary to execute the transaction again.
More Information
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
40 All rights reserved. Change Settings of Generated MDG Database Tables
14 Appendix
For more information about the security of SAP applications see SAP Service Marketplace at service.sap.com/
security .
You can also access additional security guides via SAP Service Marketplace at service.sap.com/securityguide .
For more information about security issues, see SAP Service Marketplace at service.sap.com .
For information about SAP Fiori Implementation including Security Information, see help.sap.com/
fiori_implementation .
Table 29
Topic SAP Service Marketplace
Platforms /platforms
CUSTOMER
SAP Master Data Governance Security Guide © Copyright 2016 SAP SE or an SAP affiliate company.
Appendix All rights reserved. 41
Typographic Conventions
Table 30
Example Description
<Example> Angle brackets indicate that you replace these words or characters with appropriate entries
to make entries in the system, for example, “Enter your <User Name>”.
Example Example Arrows separating the parts of a navigation path, for example, menu options
Example Words or characters that you enter in the system exactly as they appear in the
documentation
/example Quicklinks added to the internet address of a homepage to enable quick access to specific
content on the Web
Example ● Words or characters quoted from the screen. These include field labels, screen titles,
pushbutton labels, menu names, and menu options.
● Cross-references to other documentation or published works
Example ● Output on the screen following a user action, for example, messages
● Source code or syntax quoted directly from a program
● File and directory names and their paths, names of variables and parameters, and
names of installation, upgrade, and database tools
EXAMPLE Technical names of system objects. These include report names, program names,
transaction codes, database table names, and key concepts of a programming language
when they are surrounded by body text, for example, SELECT and INCLUDE
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company. SAP Master Data Governance Security Guide
42 All rights reserved. Typographic Conventions
CUSTOMER
© Copyright 2016 SAP SE or an SAP affiliate company.
SAP Master Data Governance Security Guide All rights reserved. 43
www.sap.com