Create Protect4S VM users and roles
Last updated
Last updated
Protect4S VM requires two different types of users:
Application users with their applicable roles in the Protect4S system
Different types of users in the satellite systems
Protect4S VM is an application based on SAP WebDynpro and allows for multiple users accessing the functionality at the same time. In order to access the specific parts of the functionality, all Protect4S VM users need to be provided with a suitable user role.
✔ Due to the sensitive nature of the information that Protect4S VM generates, it is recommended to give due consideration to the role distribution.
✔ Please make sure to always use the latest version of these roles as provided in the support packages.
Protect4S VM distinguishes several different functional user types:
Depending on the satellite system type, the following user types must be created or present in the satellite systems:
ABAP RFC type user(s) for ABAP and dual-stack type systems
JAVA users for J2EE type systems (Portal, PI) etc. or dual-stack systems
Database users
Operating System users
BusinessObjects users
The following overview shows the purpose of the roles that needs to be distributed to the satellite systems which are to be connected.
Role: | Description: |
---|---|
Functional user
Role
Description
Administrator
/ESEC/SA_ADMINISTRATOR
Is able to start all menu's. Is required for License Administration
Customiser
/ESEC/SA_CONFIGURATOR
Configures all master data like Systems, Companies, etc.
Planner
/ESEC/SA_PLANNER
Plans Projects and has read access to master data
Reviewer
/ESEC/SA_REVIEWER
Is able to view the reports produced by Protect4S VM
Reviewer (Management Overview)
/ESEC/SA_REVIEWER_MANAGER
Can view the Management Overview report only
Background user
/ESEC/SA_BACKGROUND_EXECUTOR
Background user that effectively executes the background jobs for Scan notification and the jobs that run all Projects
Scan export users
/ESEC/SA_SCAN_EXPORT
Is able to export the Scan reports
Mitigation user
/ESEC/SA_MITIGATOR
Is able to create mitigation reports
ESEC_SA_SATELLITE
This role is required to execute the checks in the satellite system. It does not have authorizations to perform changes to your system.
ESEC_SA_SATELLITE_PUSH
This is an optional role which is needed if you would like to distribute roles automatically (only works if CUA is not active for the satellite system)
ESEC_SA_SATELLITE_MITIGATE
This is an additional role on top of the ESEC_SA_SATELLITE role for the user used in the destination. It is required for the systems that will be used for mitigation of OSS Notes.
In general this applies for single tier system or Development systems.
Notice, the user type will have to be set as Service.