Upload
gonzalo-ferrero
View
229
Download
0
Embed Size (px)
Citation preview
7/31/2019 Risk Analysis for Legacy Connector
1/24
7/31/2019 Risk Analysis for Legacy Connector
2/24
2
Table of Contents............................................................................................................................................. 3
................................................................................................................................................ 3
1.1-Legacy File Formats: ....................................................................................................................... 4...................................................................................................... 13
................................................................................................... 15
1.4- Establish relationship between Target connector to Connector Type: ....................................... 18
.................................................................................................... 20
1.5-Running Synch Job for Legacy Connector ..................................................................................... 23
1.6-Execute Risk Analysis for Legacy Connector ................................................................................. 24
7/31/2019 Risk Analysis for Legacy Connector
3/24
3
7/31/2019 Risk Analysis for Legacy Connector
4/24
7/31/2019 Risk Analysis for Legacy Connector
5/24
5
File ID: LEGACY_DEFAULT_USER
User Master File
7/31/2019 Risk Analysis for Legacy Connector
6/24
6
User Action File
Field DataField
Type
FieldSize
FieldValues
Sorting Req'd Description Transformation
User ID String 50 CAPS Sort Ascending
Order1
Yes User ID Unique record= The
combination of columns 1 3
(User ID,Roles, and
Action From)must be unique
Role Name String 100 CAPS Sort
AscendingOrder2
Yes Role Name
ActionFrom
String 50 CAPS Sort Ascending
Order3
Yes User Action
Action To String 50 CAPS No User Action, onlyapplicable if User Action has range
From/To
If this valuedoes not exist
for sourcesystem, leave
blank
PROFILE String 20 CAPS No If this valuedoes not exist
for sourcesystem, leave
blank
CompositeRole Name
String 100 CAPS No Composite RoleName (leave blank if
unavailable)
If this valuedoes not exist
for sourcesystem, leave
blank.
7/31/2019 Risk Analysis for Legacy Connector
7/24
7
User Permission File
Field DataFieldType
FieldSize
FieldValues
Sorting Req'd Description Transformation
User ID String 50 CAPS Sort Ascending
Order1
Yes User ID Unique record=Thecombination of columns 1 3(User ID, Roles,and ActionFrom) must beunique
Role Name String 100 CAPS Sort Ascending
Order2
Yes Role Name
Permission(Resource
Name||ResourceExt.)
String 100 CAPS Sort Ascending
Order3
User Permission(Permission
Object/Field),required if applicable
ACTION andPERMISSIONfield that use | |with no space in
between.
Auth Group String 20 Auth Group
Value From String 50 CAPS Sort Ascending
Order4
Yes PermissionValue
Value To String 50 CAPS No Permissionvalue, onlyapplicable if User Actionhas rangeFrom/To
If this valuedoes not existfor sourcesystem, leaveblank
Extra Field () String Leave Blank
Profile String 20 CAPS No Profile Name If this valuedoes not existfor source
system, leaveblank
Composite RoleName
String 100 CAPS No Composite RoleName (leaveblank if unavailable)
If this valuedoes not existfor sourcesystem, leaveblank.
7/31/2019 Risk Analysis for Legacy Connector
8/24
8
7/31/2019 Risk Analysis for Legacy Connector
9/24
9
Role Permission File
Field DataFieldType
FieldSize
FieldValues
Sorting Req'd Description Transformation
Role String 100 CAPS Sort Ascending
Order1
Yes Role Name
PERMISSION(Resource
Name||Resource
Ext.)
String 100 CAPS Sort Ascending
Order2
Yes Role Permission(Permission
Object/Field),required
if applicable
ACTION andPERMISSIONfield that use | |
with no spacein between
Auth Group String 20 Yes Auth Group
Value From String 50 CAPS Yes PermissionValue
Value To String 50 CAPS No Permissionvalue, only
applicable if User Actionhas rangeFrom/To
If this valuedoes not exist
for sourcesystem, leave
blank
7/31/2019 Risk Analysis for Legacy Connector
10/24
10
Profile Master File
Field DataFieldType
FieldSize
FieldValues
Sorting Req'd Description Transformation
Profile String 20 CAPS Sort Ascending
Yes Profile Name Unique recordsonly
ProfileDescription
String 255 Yes Profile Description
Language String 2 CAPS Yes Language
DeletionFlag
String 1 No Deletion Flag(X=True, SPACE =
False)
File ID: LEGACY_PROFILE_ACTION
Profile Action File
Field DataFieldType
FieldSize
FieldValues
Sorting Req'd Description Transformation
Profile String 20 CAPS Sort
AscendingOrder1
Yes Profile Name
ActionFrom
String 50 CAPS Sort Ascending
Order2
Yes Profile Action
Action To String 50 CAPS No Profile Action, onlyapplicable if User Action has range
From/To
If this valuedoes not exist
for sourcesystem, leave
blank
7/31/2019 Risk Analysis for Legacy Connector
11/24
11
File ID: LEGACY_PROFILE_PERMISSION
Profile Permission File
Field DataFieldType
FieldSize
FieldValues
Sorting Req'd Description Transformation
Profile String 20 CAPS Sort
AscendingOrder1
Yes Profile Name
PERMISSION(Resource
Name||ResourceExt.)
String 100 CAPS Sort Ascending
Order2
Yes Profile Permission(Permission
Object/Field),required if applicable
ACTION andPERMISSIONfield that use | |with no space
in between
Auth Group String 2 Yes Auth Group
Value From String 50 CAPS Yes Permission
Value
Value To String 50 CAPS No Permissionvalue, only
applicable if User Actionhas rangeFrom/To
If this valuedoes not exist
for sourcesystem, leave
blank
File ID: LEGACY_ACTIONS
Field
TCODEString 32 CAPS Sort
AscendingOrder1
Yes Transaction Code
TCODEDescription
String 255 Transaction CodeDescription
LANGUAGE String 2 CAPS Yes Language
7/31/2019 Risk Analysis for Legacy Connector
12/24
12
File ID: LEGACY_PERMISSION
Permission File
Field DataFieldType
FieldSize
FieldValues
Sorting Req'd Description Transformation
ResourceName
String 50 CAPS Sort Ascending
Order1
Yes Resource Name
ResourceText
String 50 Resource Text
LANGUAGE String 2 CAPS Yes Language
7/31/2019 Risk Analysis for Legacy Connector
13/24
13
7/31/2019 Risk Analysis for Legacy Connector
14/24
14
7/31/2019 Risk Analysis for Legacy Connector
15/24
15
assign Physical
path to each Logical file path
7/31/2019 Risk Analysis for Legacy Connector
16/24
16
7/31/2019 Risk Analysis for Legacy Connector
17/24
17
7/31/2019 Risk Analysis for Legacy Connector
18/24
18
1.4- Establish relationship between Target connector to Connector Type:
7/31/2019 Risk Analysis for Legacy Connector
19/24
7/31/2019 Risk Analysis for Legacy Connector
20/24
20
7/31/2019 Risk Analysis for Legacy Connector
21/24
21
http://vmw3053.wdf.sap.corp:50000/irj/portal7/31/2019 Risk Analysis for Legacy Connector
22/24
22
7/31/2019 Risk Analysis for Legacy Connector
23/24
23
1.5-Running Synch Job for Legacy Connector For Authorization Synch:
1. Transaction SPRO- SAP Reference IMG Governance, Risk Compliance Access Control Synchronization Jobs Authorization Synch Execute
For User and Role Synch
Transaction SPRO- SAP Reference IMG Governance, Risk Compliance Access Control Synchronization Jobs Repository Object Synch Execute
7/31/2019 Risk Analysis for Legacy Connector
24/24