Hierarchy

⤷

⤷

IMG Activity
ID | PAOC_EIC_075 | BAdI: Information Security |
Transaction Code | S_AEN_10000690 | (empty) |
Created on | 20050317 | |
Customizing Attributes | PAOC_EIC_OPT | Employee Interaction Center (EIC): Optional Activity |
Customizing Activity | PAOC_EIC_075 | BAdI: Information Security |
Document
Document Class | SIMG | Hypertext: Object Class - Class to which a document belongs. |
Document Name | CRM_IIA_012 |
Use
In this Implementation Guide (IMG) activity, you define information security for a predefined knowledge base in the Software Agent Framework (SAF).
Requirements
You have designed a set of strategies. For example, strategy A will consider only the user name, and strategy B will consider both user name and the user's logon language.
You have defined a set of attribute names as the information security criteria, for example, USER_NAME to represent the user name, and LANGUAGE_KEY to represent the logon language.
You have authorizations for transactions SE19, SE24, and CRMC_SAF_ADV_APP.
Standard settings
Activities
- Create a new Add-In implementation.
- In Customizing, go to the Business Add-In BAdI: Information Security.
- Choose Create and enter an implementation name (for example, CRM_SAF_IS_NEW), and choose Enter.
- Save the new Add-In implementation.
- A new implementing class is generated automatically.
- Access the Interface tab page and note the name of the implementing class.
- Implement the Add-In class.
- Access the Class Builder (transaction SE24).
- Enter the name of the implementing class from step 1, and choose Change.
- For the knowledge base for which you are defining information security, implement codes for the following methods:
- IF_EX_CRM_SAF_IS~GET_SECURITY_CRITERIA
A set of criteria names should be returned based on the strategy imported into this method. This method allows the SAF to switch from one strategy to another for an individual knowledge base. For example, for strategy A, the information security criteria should contain only USER_NAME, and for strategy B, the information security criteria should contain both USER_NAME and LANGUAGE_KEY. - IF_EX_CRM_SAF_SE~GET_SECURITY_PATTERNS
This method will compose Boolean operations among attributes to be controlled for a specific knowledge base, based on the security criteria passed to the method. For example, if a user has authorization to access problems of a given problem type and status, the Boolean operation should be entered into an exporting table. For example, a restriction like
(problem type = A or B) and (status = RELEASED or CREATED)
should be composed as the following rows for the exporting table:
Row OP_TYPE NAME OPERATION VALUE
1 LPA
2 type EQ A
3 OR
4 type EQ B
5 RPA
6 AND
7 LPA
8 status EQ RELEASED
9 OR
10 status EQ CREATED
11 RPA
- Assign an active strategy to the knowledge base.
- Go to transaction CRMC_SAF_ADV_APP.
- Select the application(s) that will use information security.
- In the left-hand navigation, double-click Links to Knowledge Bases.
- Select the knowledge base(s) that will use information security.
- In the left-hand navigation, double-click Links to Information Security.
- Enter the strategies for each application and knowledge base. Based on this configuration, different knowledge bases in different applications can have different information security strategies.
- Activate the information security Add-In for testing.
- Go to the Business Add-Ins: Initial Implementation Maintenance screen (transaction SE19).
- Enter the implementation name of the information security Add-In.
- Choose Change.
- Select the knowledge base(s) that will use this information security Add-In.
- Choose Activate.
Example
Business Attributes
ASAP Roadmap ID | 204 | Establish Functions and Processes |
Mandatory / Optional | 2 | Optional activity |
Critical / Non-Critical | 2 | Non-critical |
Country-Dependency | A | Valid for all countries |
Maintenance Objects
Maintenance object type | E | Business Add-In - Definition |
History
Last changed by/on | SAP | 20050421 |
SAP Release Created in | 600 |