Create Protect4S VM users and roles

Protect4S VM requires two different types of users:

  • Application users with their applicable roles in the Protect4S system

  • Different types of users in the satellite systems

Protect4S system users

Protect4S VM is an application based on SAP WebDynpro and allows for multiple users accessing the functionality at the same time. In order to access the specific parts of the functionality, all Protect4S VM users need to be provided with a suitable user role.

  • ✔ Due to the sensitive nature of the information that Protect4S VM generates, it is recommended to give due consideration to the role distribution.

  • ✔ Please make sure to always use the latest version of these roles as provided in the support packages.

Protect4S VM distinguishes several different functional user types:

Functional user

Role

Description

Administrator

/ESEC/SA_ADMINISTRATOR

Is able to start all menu's. Is required for License Administration

Customiser

/ESEC/SA_CONFIGURATOR

Configures all master data like Systems, Companies, etc.

Planner

/ESEC/SA_PLANNER

Plans Projects and has read access to master data

Reviewer

/ESEC/SA_REVIEWER

Is able to view the reports produced by Protect4S VM

Reviewer (Management Overview)

/ESEC/SA_REVIEWER_MANAGER

Can view the Management Overview report only

Background user

/ESEC/SA_BACKGROUND_EXECUTOR

Background user that effectively executes the background jobs for Scan notification and the jobs that run all Projects

Scan export users

/ESEC/SA_SCAN_EXPORT

Is able to export the Scan reports

Mitigation user

/ESEC/SA_MITIGATOR

Is able to create mitigation reports

Users in the satellite systems

Depending on the satellite system type, the following user types must be created or present in the satellite systems:

  • ABAP RFC type user(s) for ABAP and dual-stack type systems

  • JAVA users for J2EE type systems (Portal, PI) etc. or dual-stack systems

  • Database users

  • Operating System users

  • BusinessObjects users

Roles required in the satellite systems

The following overview shows the purpose of the roles that needs to be distributed to the satellite systems which are to be connected.

Role:Description:

ESEC_SA_SATELLITE

This role is required to execute the checks in the satellite system. It does not have authorizations to perform changes to your system.

ESEC_SA_SATELLITE_PUSH

This is an optional role which is needed if you would like to distribute roles automatically (only works if CUA is not active for the satellite system)

ESEC_SA_SATELLITE_MITIGATE

This is an additional role on top of the ESEC_SA_SATELLITE role for the user used in the destination. It is required for the systems that will be used for mitigation of OSS Notes.

In general this applies for single tier system or Development systems.

Notice, the user type will have to be set as Service.

Last updated