Rsecadmin - Auth Issue Log

Embed Size (px)

Citation preview

  • 8/10/2019 Rsecadmin - Auth Issue Log

    1/2

    Getting Started Newsletters Store

    SearchtheCommunity

    Welcome, Guest Login Register

    Added by Jerome Penaranda, last edited by Jerome Penaranda on Aug 18, 2014

    SAP NetWeaver Business Warehouse / / Learning Map by Topic

    The authorization Log in RSECADMIN

    Purpose

    To describe how to read and analyze authorization issues with the Authorization Log in RSECADMIN.

    Overview

    The OLAP-authorization-check must not be confused with the basis-authorization-check traced in transaction ST01 or SU53. Analysis Authorizations are NOT based on the SAP Standard

    Authorizationconcept. They use their own concept based on the BW reporting and analysis features. Hence the OLAP authorization-check cannot be traced via ST01 or SU53, you need to trace and

    display the OLAP-authorization-log in transaction RSECADMIN.

    Using the log

    Call transaction RSECADMIN. Choose the "Analysis" tab page. Choose the function for the Authorization log (pushbutton in the middle). On the following screen, you can execute all required actions for

    logging.

    Switching on logging: Choose the pushbutton for configuring logging to switch on logging for the required users (in the l ist, you can see whether this function is alr eady switched on).

    Execute the action you want to check. As a rule, this is a query execution. However, you can also log all other actions that use the reporting authorization.

    *Important:*We strongly recommend that you use transaction RSRT (or RSRT2) to execute queries. If required, create a BOOKMARK and log its execution. (See note 788393.)

    The execution in the BEx Analyzer, in the Web or in the Portal may result in ver y complex logs that are difficult to understand.

    When you have executed the action, go back to the relevant position in transaction RSECADMIN.

    The selection criteria (in the field with this name) must be defined correctly if you want to display logs. The easiest option is to select by specifying a suitable time interval. The two user fields may then

    remain blank. The time stamp is automatically set to the l ast ten minutes. Choose "Display" to display a log.

    The log is optimized for a screen width of at least 927 pixels. If the window is narrower, you must scroll horizontally.

    Do not forget to switch off logging after the test for the user. Unnecessary logging may impair performance and waste memory space.

    Fast creation

    Call transaction RSUDO, set the "With Log" indicator next to the user field and choose "Start Transaction". (Leave the transaction selector on "RSRT".) Execute the query in transaction RSRT. Then,

    choose "Back" (F3) two times to go back to transaction RSUDO. Choose "Display Log". You are immediately transferred to the log.

    Usage in a message

    If you assume that there is a program error i n the authorization code, you require a simplified example in your system so that a remote analysis can be executed. However, the processing time of a

    customer message can significantly be reduced if this remote analysis is superfluous because a good authorization log is available. Use your simplified example to create a log and attach this log to the

    message.

    You can easily save the log locally as an HTML file by choosing "Save Document" in the display.

    Note the following:

    Log on to the system (only for log output) in English so that all employees of SAP Support can read the log.1.

    Set the relevant switch to display the relevant parts of the log before saving. If required , create a short version and a long version of the same log.2.

    In specific cases, several logs can be written. Search for the suitable log.3.

    Simplifying the log

    The RSECADMIN log may be very long and not very clear. Use every available method to simplify the log.

    Variables filled from authorizations:

    Remove authorization variables if possible. Use a query copy with fixed fil ters and the values that you expect for the variables (in this text). This simplifies authorization problems.

    1.

    F4 Input help:

    If possible, avoid using the F4 input help (not only for authorization-relevant characteristics) when you execute the query. This is to shorten the log.

    2.

    Navigation ( IMPORTANT)

    Navigating steps in the query (for example, filtering or adding a characteristic for the drilldown) often cause the system to run the main part of the authorization check several times. As a result, the

    authorization log is more difficult to understand. It is therefore very importantthat only one singleaction is logged each time.

    In many cases, the problem cannot be reproduced using the initial query execution. If such a situation occurs, the function BOOKMARK in transaction RSRT is helpful in most cases. Note 788393

    provides further information. Executing a bookmark that was previously saved results in the shortest-possible log.

    3.

    Content of the RSECADMIN logThe log is displayed in HTML format. In the upmost part, various blocks can be switched on and off. However, you must choose the function for updating the display if changes are made to the switches.

    Only then is the HTML page rebuilt. Caution: If the log is very long, it may take a while until the HTML page is built up.

    The individual blocks are explained in the following. However, many texts are self-explanatory. These are not mentioned here.

    authorization Log in RSECADMIN - SAP NetWeaver Business Wa... http://wiki.scn.sap.com/wiki/display/BI/The+authorization+Log+in+...

    3 11/2/2014 1:03 AM

  • 8/10/2019 Rsecadmin - Auth Issue Log

    2/2

    Header

    Basic data of the execution is displayed:

    Date and time of log creation; name of the executed query; which transaction was executed. In addition, the relevant user names are specified: Logon user and authorization-relevant user.

    InfoProvider check

    Authorizations are filtered at a very early stage for the validity of the relevant InfoProvider. This is displayed here.

    Main part: Header: "Authorization check"

    (in italics and highlighted in orange) First, you have to enhance the selections. Most of the texts are self-explanatory.

    Subselection (technically SUBNR) 1(highlighted in light orange)

    Depending on the query structure, the full selection of the query is first split up into smaller parts (SUB numbers, SUBNR). As a rule, the SUB number corresponds with a structure element in the query. A

    structure element is often a column in the query.

    The SUB numbers are then checked separately and independent of each other. Some SUB numbers may be authorized whereas some may not be authorized.

    For the simplification, a test query should therefore contain only one structure element if possible.

    Note 1140831 explains the check for the colon authorization. The log contains the relevant link.

    "In the following section, the remaining characteristics are checked in detail."

    (Note 1233793 explains this part of the log in detail.) The line introduces the detail check for the selected characteristics. The table has a blue header line that begins on the top left with:

    "Following Set Is Checked".

    The first field "Following Set Is Checked", at the top left of the blue table is usually the most important: Here, you have the unchanged selected set as it is requested by the query. If you think there may be

    an incorrect function in the authorization check, you should always check first whether this set is what you expect: Or is more data queried than should be the case?

    An iterative check is then executed:

    The selected set is first compared with the first authorization. If this authorization set covers the selected set, the check is completed successfully.

    If a subselection (SUB number) is authorized, this is highlighted in green

    If the authorization set does notcover the selected set completely, the remaining set that is not yet authorized is determined and displayed. The same check process begins with this remaining set

    (remaining selection). However, now the second authorization is used. The following applies: If the second authorization set covers the remaining set, the check is completed successfully. Otherwise the

    iteration process is repeated until the whole selected set is covered by the authorizations. Then the check is successful.

    Or, all authorizations of the user have been processed, and there is still a remaining set. This remaining set is then not authorized: The check for this SUB number returns "No authorization".

    Important:

    You can see that the log may display an unsuccessful partial check in the first iteration steps while the check as a whole is successful. The result after the last step is the relevant one.

    However, if a subselection is not authorized, the system displays the following lines:

    "All Authorizations Tested"

    "Message EYE 007: You do not have sufficient authorization" (in yellow).

    "No Sufficient Authorization for This Subselection (SUBNR)" (in yellow).

    Note that each selected characteristic may be authorized independently. However, it is always the combinationof allselected characteristics that is relevant.

    If a subselection is checked, the check i s carried out for the next one, again with the heading:

    Subselection (technical SUBNR) n (Highlighted in light orange)

    The processing of all subselections is completed with the entry:

    "Authorization Check Complete" (In italics and highlighted in orange)

    Buffering the authorization data

    This supplement must be switched on using the switch with the same name on top of the log display. The raw data of the authorization, its combinations and processing is displayed. (For more

    information, see Note 1000004.) Caution: The output of this unfiltered raw data may result in a very long log. The block starts with the heading "Buffering the Authorization Data" and ends with "Buffering

    the Authorization Data Completed". Both texts are displayed in italics and highlighted in orange.

    "Buffering for InfoProvider and user "

    Here, you first specify for which environment the valid authorizations are determined. In most cases, there are two large blocks: one block for the relevant InfoProvider and one block for data that is

    independent of an InfoProvider. The InfoProvider-independent block i s important for the check of a query selection. The InfoProvider-independent authorization data is relevant for display attributes and

    when a check cannot be assigned exactly to one provider.

    Subsequently, status lines are issued. These are for the most part sel f-explanatory.

    Important:A check for the global authorization 0BI_ALL is executed. If this authorization is found, the following line is displayed further down:"There Are No Characteristics That Have to Be Checked".

    If the global authorization 0BI_ALL is notfound, this does notconstitute an error. It only means that the (normal) detail check of the selection must be executed.

    After the line "The Following Value Authorizations Were Found", there is a tabular list of al l authorizations for single values and intervals of the user. The so call ed flat authorizations: The entries are sorted

    by authorizations (TCTAUTH) and characteristics (TCTIOBJNM). The fields TCTLOW and TCTHIGH specify the lower and upper interval limit.

    Under the heading "The Following Hierarchy Authorizations Were Found", there is a list of the hierarchy authorizations of the user.

    The fields TCTAUTH and TCTIOBJNM again specify the authorization and characteristic names. The fields HIESID and HIEID have no significance in this context. The fields TCTHIENM und

    TCTHIEVERS and TCTHIEDATE are three specifications that generally and precisely define each hierarchy of a characteristic in a BI system: Hierarchy name, version and date (valid-to).

    The fields TCTNIOBJNM and TCTNODE precisely define the authorized node. TCTNODE is simply the technical node name.

    TCTNIOBJNM specifies the node type.

    if TCTNIOBJNM = 0HIER_NODE, then a text node with the name is authorized.a.

    If TCTNIOBJNM is blank, a hierarchy leaf with the given name is authorized.b.

    If TCTNIOBJNM has the same name as the hierarchy-defining characteristic, a chargeable node is authorized.c.

    1.

    CAUTIONThe node type is relevant for the authorization. For example: A hierarchy authorization for a text node cannotdirectly authorize a chargeable node with the same name.

    Most of the following lines are self-explanatory.

    The next block is: "Optimization of Authorizations:" (in italics and highlighted in light orange)

    Here, the formatting of the authorizations is logged. This is difficult from a l ogical point of view and therefore explained in detail in Note 1000004.

    Related Content

    authorization Log in RSECADMIN - SAP NetWeaver Business Wa... http://wiki.scn.sap.com/wiki/display/BI/The+authorization+Log+in+...

    3 11/2/2014 1:03 AM