SAP ABAP IMG Activity PAOC_EIC_075 (BAdI: Information Security)
Hierarchy
EA-HRGXX (Software Component) Sub component EA-HRGXX of EA-HR
   PA-EIC (Application Component) Employee Interaction Center
     PAOC_EIC_IMG (Package) Employee Interaction Center: IMG
IMG Activity
ID PAOC_EIC_075 BAdI: Information Security  
Transaction Code S_AEN_10000690   (empty) 
Created on 20050317    
Customizing Attributes PAOC_EIC_OPT   Employee Interaction Center (EIC): Optional Activity 
Customizing Activity PAOC_EIC_075   BAdI: Information Security 
Document
Document Class SIMG   Hypertext: Object Class - Class to which a document belongs.
Document Name CRM_IIA_012    

Use

In this Implementation Guide (IMG) activity, you define information security for a predefined knowledge base in the Software Agent Framework (SAF).

Requirements

You have designed a set of strategies. For example, strategy A will consider only the user name, and strategy B will consider both user name and the user's logon language.

You have defined a set of attribute names as the information security criteria, for example, USER_NAME to represent the user name, and LANGUAGE_KEY to represent the logon language.

You have authorizations for transactions SE19, SE24, and CRMC_SAF_ADV_APP.

Standard settings

Activities

  1. Create a new Add-In implementation.
    1. In Customizing, go to the Business Add-In BAdI: Information Security.
    2. Choose Create and enter an implementation name (for example, CRM_SAF_IS_NEW), and choose Enter.
    3. Save the new Add-In implementation.
    4. A new implementing class is generated automatically.
    5. Access the Interface tab page and note the name of the implementing class.
  2. Implement the Add-In class.
    1. Access the Class Builder (transaction SE24).
    2. Enter the name of the implementing class from step 1, and choose Change.
    3. For the knowledge base for which you are defining information security, implement codes for the following methods:
    4. IF_EX_CRM_SAF_IS~GET_SECURITY_CRITERIA
      A set of criteria names should be returned based on the strategy imported into this method. This method allows the SAF to switch from one strategy to another for an individual knowledge base. For example, for strategy A, the information security criteria should contain only USER_NAME, and for strategy B, the information security criteria should contain both USER_NAME and LANGUAGE_KEY.
      IF_EX_CRM_SAF_SE~GET_SECURITY_PATTERNS
      This method will compose Boolean operations among attributes to be controlled for a specific knowledge base, based on the security criteria passed to the method. For example, if a user has authorization to access problems of a given problem type and status, the Boolean operation should be entered into an exporting table. For example, a restriction like
      (problem type = A or B) and (status = RELEASED or CREATED)
      should be composed as the following rows for the exporting table:

Row    OP_TYPE    NAME    OPERATION    VALUE

1    LPA

2        type    EQ    A

3    OR

4        type    EQ    B

5    RPA

6    AND

7    LPA

8        status    EQ    RELEASED

9    OR

10        status    EQ    CREATED

11    RPA

(where LPA = left parenthesis, RPA = right parenthesis, EQ = equals)

  1. Assign an active strategy to the knowledge base.
    1. Go to transaction CRMC_SAF_ADV_APP.
    2. Select the application(s) that will use information security.
    3. In the left-hand navigation, double-click Links to Knowledge Bases.
    4. Select the knowledge base(s) that will use information security.
    5. In the left-hand navigation, double-click Links to Information Security.
    6. Enter the strategies for each application and knowledge base. Based on this configuration, different knowledge bases in different applications can have different information security strategies.
  2. Activate the information security Add-In for testing.
    1. Go to the Business Add-Ins: Initial Implementation Maintenance screen (transaction SE19).
    2. Enter the implementation name of the information security Add-In.
    3. Choose Change.
    4. Select the knowledge base(s) that will use this information security Add-In.
    5. Choose Activate.

Example

Business Attributes
ASAP Roadmap ID 204   Establish Functions and Processes 
Mandatory / Optional 2   Optional activity 
Critical / Non-Critical 2   Non-critical 
Country-Dependency A   Valid for all countries 
Maintenance Objects
Maintenance object type E   Business Add-In - Definition 
History
Last changed by/on SAP  20050421 
SAP Release Created in 600