View authorisations can be set up so that different groups of users only see the data objects relevant to them when using Transport Expresso. For example, if you have completely different teams delivering projects and/or performing Production support activities, each team member only sees the transport paths, transports and configuration relevant to their area.

The main concept in view authorisations is the Authorisation Group. An Authorisation Group can be allocated to each TE object (Path, Project, Group etc.). Each user is then allocated a SAP Role giving them access to certain Authorisation Groups. A user will therefore only see the objects allocated to an Authorisation Group they have access to.

Authorisation Groups can be assigned to the following Objects in TE:

  • Paths – If there are multiple teams, such as Production Support and Project teams, each team member only sees the transport paths relevant to them. So a Production support team member would only see the Production Support paths in TE and could only allocate a transport to those paths
  • Projects – Different teams may only be able to allocate Tasks to certain projects
  • Groups – The valid Groups can be restricted on Tasks and Transport forms
  • Types – The valid Types can be restricted on the Tasks and Transport Forms
  • Change Paths – The change paths can be restricted when creating Tasks
  • User Roles – The user roles can be restricted when creating Tasks
  • Custom Fields – Whether a custom field is visible to a user
  • Import Methods – Import methods available can be restricted

Currently, all View Authorisations configuration is done in the SAP GUI.

Note: If an object (Path, Project, etc.) is not allocated to any Authorisation Group, all users will have view access to it by default so if this is not required please ensure that all object values are allocated to at least one authorisation group.

  • Authorisation groups can be maintained in table /BTI/TE_AUTHGRPS.
  • To allocate an Authorisation Group to a TE object an entry needs to be maintained in the table /BTI/TE_AUTHOBJS on the domain controller.

Table fields for /BTI/TE_AUTHOBJS

Field Name Label Description
OBJECT_TYPE Object Type This is the TE object type. Allowed types are in table /BTI/TE_AUTHOTYP. These table includes all of the objects that can be assigned to Authorisation Groups, including Paths, Projects, Groups, Types and custom fields
OBJECT_KEY Internal ID The internal ID of the TE Object. This will be the numeric ID used as the object key in TE:
  • Path: Field PATH from table /BTI/TE_PATH
  • Project: Field ID from table /BTI/TE_PROJ
  • Group: Field GROUPID from table /BTI/TE_GROUPS
  • Type: Field ID from table /BTI/TE_TYPE
  • Change Path: Field PATH from table /BTI/TE_CPATH
  • User Roles: Field ROLEID from table /BTI/TE_ROLEU
  • Custom Fields: Field FIELDID from table /BTI/TE_CUSTF
  • Import Methods: Field METHOD from table /BTI/TE_IMPMET
AUTH_GROUP Authorisation Group The authorisation group that is to be associated with this object. The valid list of authorisation groups should be maintained in table /BTI/TE_AUTHGRPS
CUSTOMFIELD_VAL Custom Field Value (Reserved for future use)
Once entries in the authorisation objects table have been maintained, roles will need to be created and allocated to users so that TE can determine which authorisation groups each user has access to. The authorisation object that controls this access is Y_TEAUTH_V.

Authorisation Object Y_TEAUTH_V fields

Field Name Label Description
/BTI/TE_AG Authorisation Group This is the authorisation group (or groups) the user has access to. An * in this field indicates the user has access to ALL authorisation groups
/BTI/TE_C1 Path Category 1 A category can be allocated to a path. This could be to indicate all paths that are BW or XI, for example. And these entries can be used to allow access only to certain categories. The categories a user has access to should be put in this field. An * indicates the user has access to ALL categories.
/BTI/TE_C2 Path Category 2 (Reserved for future use)
/BTI/TE_TA Target Dev System This is the development system (or systems) for which the user is able to see transports without a Transport Form. This access restriction should only be required if there are multiple ‘source’ development systems. The SID of the development system(s) should be entered here. An * in this field indicates the user has access to all configured source systems.

Once the required roles for View Authorisations have been created, they should be allocated to the appropriate users.

Feedback

Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Post Comment