Authorization groups

Authorization groups The access protection system must ensure that only authorized individuals have access to the system and to particular data. For achieving precise application security concerning authorization and to protect confidential data against unauthorized access it is very important to focus on the use of authorization groups. The authorization group allows extended authorization protection … Read more

Understanding the Components of a Work Process

Each work process has four components Each work process is composed of the following: (1)A task handler(2)An ABAP/4 interpreter(3)A screen interpreter(4)A database interface All requests pass through the task handler, which then funnels the request to the appropriate part of the work process. The interpreters interpret the ABAP/4 code. Notice that there are two interpreters: … Read more