The RFC Interface
A remote function call (RFC) is when a function module is called that runs
in a different system to the calling program. Although it is also possible to
call a function module in the same system as an RFC, RFCs are normally
used when the caller and the called function module run in different
systems.
In the SAP system, these functions are provided by the RFC interface
system. The RFC interface system enables function calls between two
SAP systems, or between an SAP system and an external system.
The RFC- interface system is made up of the following interfaces:
● Calling interface for ABAP programs
● Every ABAP program can call a remote function module using the
command CALL FUNCTION...DESTINATION. Parameter
DESTINATION informs the SAP system that the called function
module is running in a different system to the calling system. RFC
communication with the remote system takes place as part of the
CALL FUNCTION command.
● RFC function modules in an SAP system must be proper function
modules and must be registered in the SAP system as remote.
● If the calling program and the called program are both ABAP
programs, the RFC interface provides both communication partners.
The calling program can be any ABAP program, while
the called program must be a function module that is registered as
remote.
● For more detailed information on calling function modules that are
registered as remote, see Calling RFC Function Modules in ABAP.
● For more information on writing function modules that you want to
call remotely, see Writing RFC Function Modules in ABAP.
● Interfaces for calling non-ABAP programs
If either the calling program or the called partner is not an SAP
program, this program must be programmed in such a way that it can
play the role of the other partner in RFC communication.
For help while implementing RFC partner programs in non-SAP
systems, see: Components of SAP Communication Technology
RFC-supported and GUI-supported interfaces can be used by
external programs to call function modules in SAP systems and to
perform them in these systems. ABAP programs can also use these
interfaces to use functions supplied by external programs.
https://www.geeksforgeeks.org/important-sap-security-t-code-transaction-codes/
Important SAP Security T Code (Transaction
Codes)
In SAP, T Code stands for Transaction Codes, which are alphanumeric strings that
represent a task or a set of tasks in the SAP system. With the help of these codes,
one can quickly navigate to a specific transaction within the SAP software. Users of
SAP can directly enter the T Code in SAP GUI in order to access different functions
and records.
n this article, we are going to cover Some Important SAP Security T Codes
that every SAP Security Consultant must aware of:
Important SAP Security T Code
S.no T Code Description Application
Used by user
User administrator to
SU01
Maintenance maintain User
1 Information.
2 SUIM User Information Useful for
System auditing and
analyzing user
S.no T Code Description Application
authorizations
It defines and
manages set of
Role permission for
PFCG
Maintenance user according to
their job
3. responsibilities
It ensure that that
default values are
set appropriately
Authorization
SU24 when
Default Values
authorizations
are assigned to
4 roles or users.
Important for
monitoring and
Security Audit
SM19 investigating
Log
security related
5 activities.
Useful for
security
administrators
Display Changes and auditors who
SU01D
to User Data review historical
changes made to
user master
6 records.
Used for making
Mass Changes to mass changes to
SU10 User Master user master
Records records in the
7 SAP system
S.no T Code Description Application
Allow users to
view detailed
Display information about
SU53 Authorization failed
Data in SAP GUI authorization
attempts in the
8 SAP GUI
Used for tracing
and analyzing the
activities and
ST01 System Trace performance of
different SAP
system
9 components
Used for
managing and
Maintain
maintaining
SU02 Authorization
authorization
Profiles
profiles in the
10 SAP system
Used for
maintaining
Maintain
authorization
SU03 Authorizations for
data for individual
Users
users in the SAP
11 system
Used for
maintaining user-
SU3 User Parameters specific
parameters in the
12 SAP system.
13 SU56 Display Used to display
Authorization detailed
Data for User information about
S.no T Code Description Application
authorization
checks for a
specific user in
the SAP system
Used to manage
Authorization default values for
SU24 Object authorization
Maintenance objects in the
14 SAP system
Used in the
Upgrade
SU25 context of SAP
Customizing
15 system upgrades
Used for
Maintain maintaining
SU20 Authorization authorization
Fields fields in the SAP
16 system
Used for
Maintain maintaining
SU21 Authorization authorization
Objects objects in the
17 SAP system
Used to display
and analyze the
SM19 Display Audit Log security audit log
in the SAP
18 system
19 SM20 Security Audit Used for
Log: Analysis analyzing and
reviewing the
entries in the
SAP Security
S.no T Code Description Application
Audit Log
Used for creating
custom T-codes
for specific
Transaction
SE93 functions or
Codes
reports, making it
easier for users
20 to access them
Customize SAP
GUI menus. It
allows for the
SE41 Menu Painter
creation and
modification of
21 menu structures.
Monitoring and
auditing to
ensure that the
SAP_ALL profile
S_P99_41000099 SAP All Profile is assigned only
to authorized
personnel due to
its extensive
22 permissions.
Conclusion
Sap Security Transaction code plays a crucial role in security of As these T
Code provide functionality to administrator or security person to determine
the role and maintain, monitor and fix the security related issues in the SAP
System.
Here's a complete roadmap for you to become a developer: Learn DSA ->
Master Frontend/Backend/Full Stack -> Build Projects -> Keep
Applying to Jobs
And why go anywhere else when our DSA to Development: Coding
Guide helps you do this in a single program! Apply now to our DSA to
Development Program and our counsellors will connect with you for further
guidance & support.