KEMBAR78
Security | PDF | Systems Engineering | Software Engineering
0% found this document useful (0 votes)
29 views7 pages

Security

The document discusses the RFC interface in SAP systems which enables function calls between two SAP systems or between an SAP system and an external system. It describes the calling interface for ABAP programs and interfaces for calling non-ABAP programs. It also provides details on writing and calling RFC function modules in ABAP.

Uploaded by

Andrea
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views7 pages

Security

The document discusses the RFC interface in SAP systems which enables function calls between two SAP systems or between an SAP system and an external system. It describes the calling interface for ABAP programs and interfaces for calling non-ABAP programs. It also provides details on writing and calling RFC function modules in ABAP.

Uploaded by

Andrea
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

The RFC Interface

A remote function call (RFC) is when a function module is called that runs
in a different system to the calling program. Although it is also possible to
call a function module in the same system as an RFC, RFCs are normally
used when the caller and the called function module run in different
systems.
In the SAP system, these functions are provided by the RFC interface
system. The RFC interface system enables function calls between two
SAP systems, or between an SAP system and an external system.
The RFC- interface system is made up of the following interfaces:
● Calling interface for ABAP programs
● Every ABAP program can call a remote function module using the
command CALL FUNCTION...DESTINATION. Parameter
DESTINATION informs the SAP system that the called function
module is running in a different system to the calling system. RFC
communication with the remote system takes place as part of the
CALL FUNCTION command.
● RFC function modules in an SAP system must be proper function
modules and must be registered in the SAP system as remote.
● If the calling program and the called program are both ABAP
programs, the RFC interface provides both communication partners.
The calling program can be any ABAP program, while
the called program must be a function module that is registered as
remote.
● For more detailed information on calling function modules that are
registered as remote, see Calling RFC Function Modules in ABAP.
● For more information on writing function modules that you want to
call remotely, see Writing RFC Function Modules in ABAP.
● Interfaces for calling non-ABAP programs
If either the calling program or the called partner is not an SAP
program, this program must be programmed in such a way that it can
play the role of the other partner in RFC communication.
For help while implementing RFC partner programs in non-SAP
systems, see: Components of SAP Communication Technology
RFC-supported and GUI-supported interfaces can be used by
external programs to call function modules in SAP systems and to
perform them in these systems. ABAP programs can also use these
interfaces to use functions supplied by external programs.

https://www.geeksforgeeks.org/important-sap-security-t-code-transaction-codes/

Important SAP Security T Code (Transaction


Codes)


In SAP, T Code stands for Transaction Codes, which are alphanumeric strings that
represent a task or a set of tasks in the SAP system. With the help of these codes,
one can quickly navigate to a specific transaction within the SAP software. Users of
SAP can directly enter the T Code in SAP GUI in order to access different functions
and records.

n this article, we are going to cover Some Important SAP Security T Codes
that every SAP Security Consultant must aware of:

Important SAP Security T Code


S.no T Code Description Application

Used by user
User administrator to
SU01
Maintenance maintain User
1 Information.

2 SUIM User Information Useful for


System auditing and
analyzing user
S.no T Code Description Application

authorizations

It defines and
manages set of
Role permission for
PFCG
Maintenance user according to
their job
3. responsibilities

It ensure that that


default values are
set appropriately
Authorization
SU24 when
Default Values
authorizations
are assigned to
4 roles or users.

Important for
monitoring and
Security Audit
SM19 investigating
Log
security related
5 activities.

Useful for
security
administrators
Display Changes and auditors who
SU01D
to User Data review historical
changes made to
user master
6 records.

Used for making


Mass Changes to mass changes to
SU10 User Master user master
Records records in the
7 SAP system
S.no T Code Description Application

Allow users to
view detailed
Display information about
SU53 Authorization failed
Data in SAP GUI authorization
attempts in the
8 SAP GUI

Used for tracing


and analyzing the
activities and
ST01 System Trace performance of
different SAP
system
9 components

Used for
managing and
Maintain
maintaining
SU02 Authorization
authorization
Profiles
profiles in the
10 SAP system

Used for
maintaining
Maintain
authorization
SU03 Authorizations for
data for individual
Users
users in the SAP
11 system

Used for
maintaining user-
SU3 User Parameters specific
parameters in the
12 SAP system.

13 SU56 Display Used to display


Authorization detailed
Data for User information about
S.no T Code Description Application

authorization
checks for a
specific user in
the SAP system

Used to manage
Authorization default values for
SU24 Object authorization
Maintenance objects in the
14 SAP system

Used in the
Upgrade
SU25 context of SAP
Customizing
15 system upgrades

Used for
Maintain maintaining
SU20 Authorization authorization
Fields fields in the SAP
16 system

Used for
Maintain maintaining
SU21 Authorization authorization
Objects objects in the
17 SAP system

Used to display
and analyze the
SM19 Display Audit Log security audit log
in the SAP
18 system

19 SM20 Security Audit Used for


Log: Analysis analyzing and
reviewing the
entries in the
SAP Security
S.no T Code Description Application

Audit Log

Used for creating


custom T-codes
for specific
Transaction
SE93 functions or
Codes
reports, making it
easier for users
20 to access them

Customize SAP
GUI menus. It
allows for the
SE41 Menu Painter
creation and
modification of
21 menu structures.

Monitoring and
auditing to
ensure that the
SAP_ALL profile
S_P99_41000099 SAP All Profile is assigned only
to authorized
personnel due to
its extensive
22 permissions.

Conclusion
Sap Security Transaction code plays a crucial role in security of As these T
Code provide functionality to administrator or security person to determine
the role and maintain, monitor and fix the security related issues in the SAP
System.

Here's a complete roadmap for you to become a developer: Learn DSA ->
Master Frontend/Backend/Full Stack -> Build Projects -> Keep
Applying to Jobs

And why go anywhere else when our DSA to Development: Coding


Guide helps you do this in a single program! Apply now to our DSA to
Development Program and our counsellors will connect with you for further
guidance & support.

You might also like