Time-Dependency of the Authorization Check

Use
When an employee undergoes an organizational change, you may want to assign him or her
infotype authorizations based on the duration of the organizational assignment. To do so, you
can run authorization checks based on a data record’s history.
Example: At the start of the year, an employee changes from personnel area 0101 to
personnel area 0102. The administrator responsible for processing the employee’s
personal data in the second personnel area is different from the administrator in the
first personnel area. You might want to prevent the administrator who was
responsible for the employee in the previous year from accessing data that is
entered in certain infotypes in the current year. In this case, you can set up the
access authorization for infotype data so that it is dependent on the history of data
records in the employee’s organizational assignment.

Prerequisites
If you want to carry out a time-dependent authorization check, set the corresponding indicator in the Indicator for access authorization field (T582A-VALDT) in the Infotype: Customer Specific Settings table (T582A).

Features
The procedure is as follows:

There are three possible cases:
a) The administrator’s period of responsibility for the employee starts in the future.
If the administrator has write authorization for the relevant infotype/subtype, it is
extended to all infotype records that are valid within the period of responsibility. Read
authorization exists for infotype records that have the same validity period as the period
of responsibility, or that precede the period of responsibility.
b) The period of responsibility starts before the current date. However, the end of the period
of responsibility does not exceed the maximum specified tolerance before the current
date.
In this case, a write or read authorization is extended over all periods. In other words,
there are no restrictions for this administrator in terms of the validity period of the
relevant infotype records.
The tolerance time concept ensures that an administrator can still access the data of an
employee who is no longer within his/her responsibility, for a limited period of time. This
means that the administrator still has the opportunity to close any open issues once the
person has moved.
c) The period of responsibility ends in the past. Even the end that was adjusted to the
tolerance time is before the current date.
In this case, the administrator has no write authorization. Read authorization exists for
infotype records that have the same validity period as the period of responsibility.

Main HR Authorization Object for Security

Some of the main HR authorisation objects are:


Object: PLOG Personnel Planning 

Fields: PLVAR Plan Version
OTYPE Object Type
INFOTYP Infotype
SUBTYP Subtype
ISTAT Planning Status
PPFCODE Function Code

Definition:
The present object is used by the authorization check for PD data.

Field Details:
PLVAR – Plan version This field defines which plan version(s) the user may access.

OTYPE – Object type This field defines which object types the user may access.

INFOTYP – Infotype This field defines, which infotypes, that is, attributes, of an object the users (generally) may access.

SUBTYP – Subtype This field determines which subtypes the user may access for given infotypes.

Relationships are special subtypes for infotype 1001. Consequently, the relationships for which a user should have access authorization can also be limited in this field.

ISTAT_D – Planning status This field determines in which planning status the user may access information.

OKCODE – Function code This field defines for which type of information processing (Display, Change ) the user is authorized.

The possible values are defined in table T77FC. This protection against unauthorized access is extended by the structural authorization check. Two types of function codes are distinguished in HR management. By marking the processing method Maintenance in table T77FC the function codes are indicated, with which objects may be maintained within the structure; Otherwise, only Display is allowed.

The function code has effects in connection with the structural authorization. In table T77PR, authorization profiles can be indicated which are to have maintenance authorization for the structure. Without this authorization, you can only display structures. Consequently, the overall authorization results from the intersection between basis authorization and structural authorization.


Object: P_ABAP HR: Reporting

Fields: REPID ABAP Program Name
COARS Degree of simplification for authorization check


Definition: 

The authorization object HR reporting (P_ABAP) is used in many ways: 

HR Reporting with HR Reporting are reports with the RE.SAPDBPNP logical database PNP .
Report: RPUAUD00 Logged changes in infotype data Processing person-related data using payment medium programs from Accounting.

To 1. You can use the relevant authorization for these objects to control how the objects

UO.P_ORGIN HR: Master data (P_ORGIN), UO.P_ORGXX HR: Master data – extended check (P_ORGXX) and CHAP.OHIX0010 structural authorization check are used in specified reports to check the authorization for INFTY HR infotypes . In this way, you can carry out a fine-tuned control on reports for infotype authorization.

This can be useful for functional reasons or to improve performance at runtime of the corresponding reports.

For this object, specify the report name(s) and the degree of simplification to be used for the authorization check.

Note: 

Note that this object differs from the object UO.S_PROGRAM ABAP: Program run checks . The latter is used for general program authorization checks.

In HR reports, these checks are carried out in addition to the HR infotype authorization check.

HR: Reporting , however, overrides the HR infotype authorization check for selected reports, with the result that the authorization checks are weakened or completely switched off.

Examples: 

In your company, the authorization for infotypes is, for example, independent of the authorization for specific organizational units (one administrator may be authorized to access address, personal and education data only for personnel area 0101 – but not for address data in personnel area 0101 and personal data in personnel area 0102). If you enter 1 in the Degree of simplification field, the above facts are taken into account in the specified report and the check is carried out more quickly for a user with this authorization.

If certain HR reports are not critical (telephone lists etc.) and authorization protection is not required, enter the report name and = * in the Degree of simplification field. The system then checks whether the person starting the report is authorized to do so (object – ABAP/4: Program run checks), but performs no other checks (object – HR: Master data).

In your company, one user may have access to all HR infotype data. For this user, enter * in the Report name and Degree of simplification fields. The system then only checks whether this user is authorized to start the report in question but not whether he/she is authorized to display the requested HR infotype data.

A time adminstrator should carry out time evaluations (report HR: Time – time evaluation (RPTIME00) for employees with the organizational key 0001TIMEXXX . For certain additional information that is needed internally (the program user either cannot see this, or can only partially see it), the Basic pay infotype (0008)must be imported, for example, to timeevaluation. To carry out time evaluation, the administrator must therefore have display authorization for the Basic pay infotype (0008).

If the administrator is not to have display authorization for this infotype, the read authorization for the Basic pay infotype can be restricted for individuals with the organizational key 0001TIMEXXX for the report HR: Time – Time evaluation (RPTIME00). For this, use the following authorization


Object HR: Master data (P_ORGIN) (two authorizations)

Infotype 0008 ‘ ‘
Subtype * ‘ ‘
Authorization level R ‘ ‘
Organizational key ‘ ‘ 0001TIMEXXX


Object HR: Reporting (P_ABAP) 

Report name RPTIME00
Degree of simplification 1

In this way, a simple check is carried out for the authorization check infotype in conjunction with the report HR: Time – Time evaluation (RPTIME00): The infotype, subtype, level are checked, and then, independently, the organizational assignment (in the example, the Organizational key field) (according to degree of simplification 1 ). In report HR: Time – Time evaluation (RPTIME00), infotype Basic pay (0008) can also be read. However, if the check is not in conjunction with the report HR: Time – Time evaluation (RPTIME00), all fields of the object HR:

Master data (P_ORGIN) are checked together, but in this way there is no read access to the Basic pay infotype (0008). TO 2. Evaluations of the logged changes in infotype data are subject to infotype authorization checks. However, usually, someone, who starts such an evaluation, has extensive authorizations.

In this case, it is useful, in order to ensure improved performance, to do without the check of individual data and instead, grant the user global authorization for logging evaluations using the report Logged changes in the infotype data (RPUAUD00).

For this, use an authorization for the object, by specifying the value RPUAUD00 in the Report name field, and the value 2 in the Degree of Simplification field. To 3 The payment medium program of accounting processes, in particular, confidential personal data.

In addition the check to see whether the user is authorized to start the program, a check to see whether the corresponding authorization exists for the object is also carried out, as an additionl security measure : The name of the payment medium program must be entered in the Program name field, the value 2 (or * must be entered in the Degree of simplification field.

Field Details:

Report name
COARS Degree of simplification


Object: P_APPL HR: Applicants

Fields: INFTY Infotype
SUBTY Subtype
AUTHC Authorization level
PERSA Personnel Area
APGRP Applicant group
APTYP Applicant range
VDSK1 Organizational Key
RESRF Personnel officer responsible for application

Definition:


This object is used for the applicant data authorization check. This check is carried out when INFTY applicant infotypes are edited or read. When a transaction for editing applicant data is accessed, the system first checks whether the user has the minimum authorization. Depending on the transaction this may be write authorization or read authorization ( AUTHC_D authorization level = ‘*’ or R). If the user has the minimum authorization, a further and more detailed authorization check is carried out within the transaction itself.

Field Details:

INFTY Infotype
SUBTY Subtype
AUTHC_D Authorization level
PERSA Personnel area
APGRP Applicant group
APTYP Applicant range
VDSK1 Organizational key
RESRF Personnel officer responsible for applicant


Object: P_ORGIN HR: Master Data

Fields: INFTY Infotype
SUBTY Subtype
AUTHC Authorization level
PERSA Personnel Area
PERSG Employee Group
PERSK Employee Subgroup
VDSK1 Organizational Key

Definition: 

The object HR: Master data (P_ORGIN) is used for authorization checks of personal data. Checks are performed only when INFTY HR infotypes are edited or read.
When you call up a transaction for editing of personal data, the system checks that you at least have one read authorization ( AUTHC_D authorization level R). If you do, a more specific authorization check is carried out within the transaction. In HR reports that use the

Program run checks and UO.P_ABAP HR:

Reporting must also be taken into account.

Note that values specified for the individual fields do not generally contain other values. The value ‘ ‘ must therefore be specified explicitly. The value ‘ ‘ must always be used for the subtype field (reason: the field is initial if the infotype does not support any subtypes, or if the subtype has not been specified).


Field Details: 

INFTY Infotype
SUBTY Subtype
AUTHC_D Authorization level
PERSA Personnel area
PERSG Employee group
PERSK Employee subgroup
VDSK1 Organizational key


Object: P_ORGXX HR: Master Data – Extended Check

Fields: INFTY Infotype
SUBTY Subtype
AUTHC Authorization level
SACHA Payroll Administrator
SACHP Administrator for HR Master Data
SACHZ Administrator for Time Recording
SBMOD Administrator Group


Definition:

The object HR: Master data – Extended check (P_ORGXX) can be used to check authorization for personal data INFTY (HR infotypes) This check is not active in the standard system. The program switch HR: Master data – Extended check (ORGXX) can be used to add this check in the standard system or set it as an alternative to UO.P_ORGIN HR: master data . The main switch settings can be processed using transaction HR: Authorization switch (OOAC)


Field Details: 

Administrator for the person being processed (stored in the
organizational assignment infotype)
SACHA Payroll administrator
SACHZ Time data administrator
SACHP HR master data administrator
SBMOD Administrator group


View of data: 

INFTY Infotype
SUBTY Subtype
AUTHC_D Authorization level (write, read, write with lock indicator, unlock).


Object: P_PCLX HR: Clusters

Fields: RELID Area identifier for cluster in tables PCLx
AUTHC Authorization level


Definition:

This object is used in the authorization check when accessing PCLx (x = 1, 2, 3,4) HR files using the PCLx buffer (interface supported by HR).


Field Details: 

Cluster ID: enter the cluster name in this field. Authorization level: in this field you must specify the operation to be carried out on the cluster along with the cluster ID specified above.

The values which can be entered here are R (read), U (update database) and S (export data to PCLx buffer without database update).