SAP Crystal Reports 2011, Win Guía de usuario Pagina 619

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 718
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 618
Essentially, by associating an authorization object with a field within an SAP table, you define that table
as an exception to the Global Lock settings that you have made within the Security Definition Editor.
In other words, once you've associated an authorization object with a field, the parent table is secured
from all users—regardless of your Global Lock settings. You must then use the authorization object
according to your usual SAP security conventions in order to provide particular users with access to
rows of data within the SAP table.
You can secure rows in a table by using authorization objects, custom functions, or both.
Securing rows using authorization objects
In order to define row-level security for tables, you can create an authorization object and use the
Security Definition Editor to associate the object with one of the table's fields. You then apply the new
authorization object to the roles or profiles of SAP users who need to access any of the table's data.
When you apply the authorization object, you specify the rows of data that each user is permitted to
access.
To define row-level security using an authorization object
1.
Create a new authorization object.
For this example, create an authorization object called Z_BUKRS that consists of one authorization
field called BUKRS. This authorization is being used to secure the GLT0 table based on the values
in the BUKRS (Company Codes) field.
Note:
Use transaction SU21 to create the authorization object, or see the SAPGUI Help for more information
on creating authorization objects.
2.
Execute transaction /CRYSTAL/RLS to access the Security Definition Editor.
3.
In the Table name field, type the name of the table that contains the rows you want to secure.
For this example, type GLT0.
Note:
You can now use wildcards to specify the table name. This is an efficient way to apply an authorization
to multiple tables with similar names simultaneously. Use * to specify zero or more characters and
+ to specify one character.
4.
Click Create.
5.
In the "Authorization entries" screen, click Create.
6.
In the "Select authorization entry type" screen, click Reference to an authorization object.
7.
Click OK to access the "Authorization Object entry" screen.
8.
In the Authorization object name field, type the name of the authorization that you created in step
1.
For this example, you would type Z_BUKRS.
9.
Click Create.
2012-03-14619
Integrating Business Applications with Crystal Reports
Vista de pagina 618
1 2 ... 614 615 616 617 618 619 620 621 622 623 624 ... 717 718

Comentarios a estos manuales

Edwinfet 29 Feb 2024 | 08:13:09

What are the upsides of contracting skilled web optimization organizations? Expert search marketing companies utilize teams of experts focused on elevating your site's content for browsing engines. This encompasses researchingsearch phrases, adjusting on site characteristics, and managing off-domain enhancements. Moreover, these firms monitor adjustment in from Google parameters and refresh the text on your website as needed. This saves both you your time and your workers from unwanted a

KarenSkaky 17 Apr 2024 | 10:11:41

Securing the security of your home is essential in today's unsettled times. Among the best ways to safeguard your belongings and peace of mind is by committing in a trustworthy safe. Regardless of whether you're securing money, important documents, or precious heirlooms, a safe gives a protected repository solution. Regarding selecting the right safe for your house, there are several elements to consider. Above all, assess your safety requirements. Determine what items you plan to store in

Helenlal 18 Apr 2024 | 08:19:10

Arranging an open-air wedding in Phenix and anxious about the unpredictable weather? Don't let Mother Nature rain on your parade – truly! At [Event Rentals Phoenix], we provide stunning wedding tent rentals that will ensure your distinctive day goes off without an hitch. Our wedding tent rentals are created to supply both charm and functionality. Say "I do" under tha elegant canopy of one of our tents, surrounded by your loved ones and tha breathtaking scenery of Pheonix. With one assortmen

Helenlal 29 Apr 2024 | 05:23:21

In both personal and professional situations, encountering issues is unavoidable. However, mastering productive trouble-shooting techniques is key for triumphing over hurdles and accomplishing success. In this piece, we delve into the strategies and methods for efficiently addressing dilemmas. From analytical thinking to creative brainstorming, we look into various approaches that can help individuals tackle challenges with certainty and accuracy. Effective challenge solving begins wit

Chrisnug 29 Apr 2024 | 14:39:54

Hello, im noob :)