hr structural authorizations

49
HR STRUCTURAL AUTHORIZATIONS by Ken Bowers SAIC

Upload: jonge019

Post on 26-Oct-2015

250 views

Category:

Documents


10 download

DESCRIPTION

HR Structural Authorizations

TRANSCRIPT

Page 1: Hr Structural Authorizations

HR STRUCTURAL AUTHORIZATIONS

by

Ken Bowers

SAIC

Page 2: Hr Structural Authorizations

Structural Authorization Defined

HR Structural Authorization permit access to personnel data based on the user’s position or span of authority within the organizational structure.

Page 3: Hr Structural Authorizations

Structural

Authorization General

Authorization

TC: OOSB

TC: PFCG

Personnel Admin

Org, PD, TEM, Quals

Page 4: Hr Structural Authorizations

Structural Authorization High Level Process

Create StructuralAuthorization

Profile

Link StructuralAuthorization

Profileto User Id

Configuration &Switch Settings

Evaluation Path

Determine RootOrg Unit

Page 5: Hr Structural Authorizations

SAP User IDlinked to PA viaIT0105 Record

PA/PD IntegrationTurned “On”

(POLGI/ORGA)

StructuralAuthorizationActivated via

(TC: OOAC orT77S0)

StructuralAuthorization

ProfilesDeveloped (TC:

OOSP or T77PR)

Structural AuthProfilesLinked

PD Object(IT1017)

DynamicallyOrganizational

StructureDeveloped

SAP User ID linkedStructural Auth.

Profile(TC: OOSB or

T77UA

SAP ProgramRHPROFLO

Executed

Manually

Evaluation PathsMaintained

(T778A/V_T77AW))

Dynamicallyassign

Root Org Unit(Function Module)

Employee RecordassignedIT0001

Manuallyassign

Root Org Unit

STRUCTURAL AUTHORIZATIONS PROCESS FLOWCHART

User AccessRestricted

Based on OrgStructure

OrganizationalStructure

(Org Unit/Position)

StructuralAuthorization

Waiting Period(TC: OOAC or

T77S0)

Execute Reports toOptimize

Performance

Page 6: Hr Structural Authorizations

PA/PD Integration “Active”

Page 7: Hr Structural Authorizations

Structural Authorizations ‘Activated”

4.6 and below

Refer to OSS Note 339367 refers to OSS Note 363083 Maintenance of the switch AUTH_SW P_ORGPD to import 4.7 functionality

Change from 0 to 1

TC: OOAC T77S0

Page 8: Hr Structural Authorizations

Structural Authorizations “Activated”

4.7

Page 9: Hr Structural Authorizations

Activation Options

• Value 1: Org Unit Checked – No Authorization.

• Value 2: Org Unit Not Checked – No Authorization.

• Value 3: Org Unit Checked – Authorization

• Value 4: Org Unit Not Checked - Authorization

Page 10: Hr Structural Authorizations

Structural Authorizations Waiting Period

Page 11: Hr Structural Authorizations

Create Organizational Structure

• Transaction code PPOME

• Create organizational units (object type O)

• Create jobs (object type C)

• Create positions (object type S)

• Assign chief positions especially if the relationship A012 is being used in function modules

Page 12: Hr Structural Authorizations

Create Organizational Structure

Page 13: Hr Structural Authorizations

Create Personnel Master Records

• All personnel require personnel number

• Create IT0105, subtype 0001 record for all EE’s linking SAP user id to personnel number which is linked to the org structure

• All personnel require IT0001 record

Page 14: Hr Structural Authorizations

Create Personnel Master Records

IT0105 IT0001

Page 15: Hr Structural Authorizations

Evaluation Paths

• Use SAP standard evaluation paths

– SAP standard function modules read delivered evaluation paths

• Create customer defined evaluation paths

– Customer defined function modules specify customer defined evaluation paths

Page 16: Hr Structural Authorizations

Evaluation Paths

T778A

V_T77AW

Page 17: Hr Structural Authorizations

Create Structural Authorization Profiles

• Transaction code OOSP or T77PR

• Screen # 1– Profile: Enter profile name and description– Save Structural Authorization Profile

Page 18: Hr Structural Authorizations

Assign Root Org Unit Option 1: Dynamically.

• Function Module: RH_GET_MANAGER_ASSIGNMENT determines the root organizational unit to which the user is assigned as Manager via the A012 chief relationship.

• Assign function module in T77PR In field PFUNC

Page 19: Hr Structural Authorizations

Screen # 2 T77PR

When Function Module is

being used, leave Object

ID field “Blank”

RH_GET_MANAGER_ASSIGNMENT:

Determines the root org unit object to which the user is assigned as Manager via the A012 chief relationship. (Supervisor)

Page 20: Hr Structural Authorizations

• Screen # 2 (Continued)– Auth Profile: Select profile for pop-up box– No.: Enter Line/Sequence/Interval numbers 5, 10, 15

…etc.– Plan version: Enter active plan. Ex. 01– Object type: Enter object type end user will be

authorized to change or display (O – Org Unit, S – Position, C – Job, P- person, and any customer defined objects)

– Object ID: If assign root org unit is being used, enter org unit id value. If you are using function modules to dynamically determine the root org unit, leave this field blank

– Maintenance: If checked, maintain authorization is granted for object type, if uncheck, only display authorization granted.

– Evaluation Path: Enter evaluation path defined inT77UA

Page 21: Hr Structural Authorizations

• Screen # 2 (Continued)– Status vector: Planning status authorization

• 1 – Active• 2 – Planned• 3 – Submitted• 4 – Approved• 5 – Rejected• To grant access to Active and Planned status(s)

enter “12”– Depth: Enter the number of levels from the

root org unit of the org structure.– Sign: Process structural authorization top –

down (+) or bottom-up (-)

Page 22: Hr Structural Authorizations

• Screen # 2 (Continued)– Time period: Restrict access based on the

validity period of the org structure. • D – Current Day• M – Current Month• Y – Current Year• P – Past• F – Future

– Function module:• Leave this field “blank” if root org unit is defined in

field “Object id”• Determine the root org unit using SAP standard or

Customer defined function modules

Page 23: Hr Structural Authorizations

• Screen # 2 (Continued)– Add multiple rows in this table for all PD

objects the structural authorizations are permitting to change and/or display

Page 24: Hr Structural Authorizations

Assign Root Org Unit Option 2: Dynamically.

• Function Module: RH_GET_ORG_ASSIGNMENT determines the root organizational unit to which the user is organizationally assigned.

• Assign function module in T77PR In field PFUNC

Page 25: Hr Structural Authorizations

Screen # 2 T77PR

RH_GET_ORG_ASSIGNMENT

Determines the root organizational unit to which the user is organizationally assigned.

A customer defined Function Module may be used

Page 26: Hr Structural Authorizations

Assign Root Org Unit Option 3: Dynamically.

• Customer Defined Function Module:

– Copy and modify SAP standard function modules to specify customer defined evaluation paths

• Assign function module in T77PR In field PFUNC

Page 27: Hr Structural Authorizations

Assign Root Org Unit Option 4: Manually

• Function Module not used.

• Manual assignment of root organizational unit

• Define root organizational unit in T77PR In field OBJID

Page 28: Hr Structural Authorizations

Screen # 2 T77PR

When Object ID is being used, leave Function

Module field “Blank”

Page 29: Hr Structural Authorizations

Structural Authorization Profile Completed

Page 30: Hr Structural Authorizations

Link User ID to Structural Authorization Option # 1

Assign Structural Authorization to PD Object

• Restrict user access based on PD objects.• Assign structural authorization defined in

transaction code OOSP or T77PR by creating an IT1017 to a PD object. Example: Create IT1017 to org unit or position depending on your requirements

• This is linking the structural authorization to the organizational structure.

• IT1017 is required if you are going to dynamically populate T77UA by linking user id to structural authorization profile.

Page 31: Hr Structural Authorizations

Assign IT1017 to PositionExecute transaction code PP01 > Create PD Profiles > Assign Structural

Authorization Profile

Page 32: Hr Structural Authorizations

Link User ID to Structural Authorization

• Execute SAP Program RHPROFL0 on a nightly or emergency basis.

• Report dynamically links the user id (IT0105, Subtype 0001) to the designated structural authorization profile in T77UA based on the assignment of IT1017 to PD objects.

Page 33: Hr Structural Authorizations
Page 34: Hr Structural Authorizations

RHPROFL0 program report output

T77UA auto populated by the

RHPROFL0 program

Page 35: Hr Structural Authorizations

Link User ID to Structural Authorization Option # 2

• Can be assigned “manually”

• IT1017 is not necessary

• Transaction code OOSB or T77UA

• Ensure customizing of the table in permitted in Production client

• This method is no recommended. Can be very labor intensive

Page 36: Hr Structural Authorizations

Manually Link User ID to Structural Authorization

Execute transaction code OOSB > Click on New Entries > Enter user id, corresponding structural authorization profile, enter start date, enter end

date and click on the save icon.

Page 37: Hr Structural Authorizations

Optimize Structural Authorization Performance

• Manually enter user id’s in T77UU User Table for Batch Input. Stores user id in SAP memory (T77UU). Not recommended.

• Dynamically add/remove user id’s in T77UU executing program RHBAUS02 based on the number of objects.

• Execute nightly program RHBAUS00 to regenerate indexes saved in table INDX.

• Indexes regenerated and saved in table INDX• ODD note 836478 dated 4/21/05: Display Index

Report: RHAUTH_VIEW_INDX

Page 38: Hr Structural Authorizations

Congratulations !

• You have completed the configuration of structural authorizations.

• Do not know of any method to trace structural authorizations

• Test, test user id’s for both structural authorizations and PA/PD authorization assigned to roles in TC: SU01.

Page 39: Hr Structural Authorizations

Customer Defined Structural Authorizations

• Use BADl: HRBAS00_STRUAUTH Customer defined logic for Structural Authorization

• Use BADI: HRPAD00AUTH_CHECK, which allows the customer to input their own coding into this customer exit for HR Master Data.– Example: Restrict authorizations

based on Business Area, Plant, etc.

Page 40: Hr Structural Authorizations

Reporting Considerations

• Customer Defined Reports: Use HR Macros in your custom program to engage structural authorizations from the LDB. If LDB is not being accessed, need to code structural authorizations in program

• SAP Standard Reports: There may be some circumstances you do not want structural authorizations checked. Copy standard reports and remove authorization checks.

Page 41: Hr Structural Authorizations

Lessons Learned

• Keep in mind, users with new structural authorizations will not be effective until next day if RHPROFLO is ran nightly.

• Remember to assign Authorization Groups to customer defined z-tables in order to maintain in Production client.

• Assign all end users structural authorizations.

Page 42: Hr Structural Authorizations

WHAT’S NEW IN 4.7

Transaction code SU53: Reasons for failed Structural authorizations are displayed

Page 43: Hr Structural Authorizations

Context Structural Authorizations

Page 44: Hr Structural Authorizations

Context Structural Authorizations

Page 45: Hr Structural Authorizations

Context Structural Authorizations

Page 46: Hr Structural Authorizations

Context Structural Authorizations

Page 47: Hr Structural Authorizations

Context Structural Authorizations

Page 48: Hr Structural Authorizations

Questions ?

Page 49: Hr Structural Authorizations

Contact Information

[email protected]

864-940-7282