Redwood Documentation

Product Documentation

 

›Configuration

RunMyJobsSAP Connector

Introduction

  • The SAP Connector
  • HANA Platforms

Configuration

  • Configuring the Central and Satellite Systems
  • Installing SAP JCo
  • Configuring an SAP System for Process Automation
  • SAP RFC User Privileges
  • Assigning SAP Authorizations to the RFC User
  • Connecting to SAP Systems
  • Connecting to SAP Systems with the Wizard
  • Connection Details for the ABAP Stack
  • Intercepting SAP Jobs
  • SAP Job Interception Configuration
  • Interacting with SAP Events
  • Configuration Details on Interacting with SAP Events
  • Parsing Log Files to set Status of SAP Jobs
  • Understanding the Different XBP Interface Releases

Importing SAP Objects

  • Importing Objects from SAP Systems
  • Importing ABAP Programs
  • Importing ABAP Program Parameter Definitions
  • Importing Archive Objects
  • Importing Batch Events
  • Importing SAP BusinessObjects Processes
  • Importing SAP Calendars
  • Importing SAP CCMS Jobs
  • Importing Communication Channels via PI/XI
  • Importing External Commands
  • Importing and Running Mass Activities
  • Importing Output Devices
  • Importing Process Chains
  • Importing Process Chain Definitions
  • Importing Recipients
  • Importing Variants
  • Importing Variant Definitions

SAP ABAP

  • Handling ABAP Programs
  • Controlling Batch Input Sessions
  • Handling Variants
  • Creating and Modifying Variants in Redwood Server
  • Maintaining Variants Manually
  • Maintaining Variants Automatically
  • Maintaining Variants Automatically (Advanced)
  • Using Temporary Variants
  • Default SAP Process Definitions

Business Objects

  • Main
  • Interface Configuration
  • Crystal Reports
  • Web Intelligence
  • Data Services
  • Triggering Events
  • Crystal Reports REST
  • Web Intelligence REST

Process Chains

  • Handling Process Chains
  • Running Process Chains
  • Monitoring Process Chains
  • Restarting Process Chains

SAP PI/XI

  • SAP Communication Channels with PI/XI
  • Controlling Communication Channels with Redwood Server via PI/XI

Adaptive Computing

  • SAP Adaptive Computing
  • Controlling SAP Adaptive Computing

SAP Monitoring

  • Integrating SAP Monitors
  • Configuration Details for Integrating SAP Monitors
  • Sending Monitoring Data to SAP Systems
  • Configuration Details for Sending Monitoring Data to SAP Systems
  • Monitoring Redwood Server Availability in CEN
  • Active XMB Monitoring
  • Active IDoc Monitoring

Advanced Configuration

  • Connect to an ABAP System via SAProuter
  • SNC connection to an SAP System
  • The SAP Cryptographic Library
  • Tuning Redwood Server

Legacy Systems Support

  • Enable XBP 2.0 or 3.0 Functionality
  • Enhanced SAP Interfaces with Redwood Transports
← Configuring an SAP System for Process AutomationAssigning SAP Authorizations to the RFC User →

SAP RFC User Privileges

Each ABAP stack you want to interact with needs a privileged user. Redwood recommends it to be a System user for normal batch processing and a Dialog user if this user also has to be used as the Step user.

The following section describes the privileges required by the RFC user to interact with the ABAP stack of SAP Systems. To assign the following privileges, navigate to Tools > Administration > User Maintenance > Role Administration > Roles (transaction PFCG ) and see the Assigning SAP Authorizations to the RFC User procedure for more information.

note

Whenever an authorization problem occurs, you can log into the SAP system as the user and execute transaction SU53. You can use the output of this transaction to identify any missing authorizations.

SAP Authorizations for XBP and BW

AAAB - Cross-application Authorization Objects

S_RFC - Authorization check for RFC access

NameRequired Authorizations
Activity* (or Execute)
Name of RFC to be protected*, or all of BATG, FRFC, OCSB, RFC1, RFC_METADATA_GET, SALX, SCCA, SDIFRUNTIME, SDTX, SG00, SRFC, SXBP, SXMI, SYST, SVAR_RFC, SXBP_VAR, and SYSU
Type of RFC object to be protectedFUGR (Function group), FUBA (Function module)
Name of RFC to be protectedBAPI_CM_PROFILES_GET
Type of RFC to be protectedFUNC

If you are using XBP transports, the following two RFC's need to be added:

/REDWOOD/1XBP, /REDWOOD/2XBP

If you are using ISU transports, the following two RFC's need to be added:

/REDWOOD/1ISU and /REDWOOD/2ISU

If you want to retrieve the SAP syslog from within Redwood Server with the GetSupportFiles functionality, you also need the following RFC:

SXMB

For BW, the list with names of RFCs to be protected has to be extended with following authorizations (unless the list contains just * (all RFCs)):

NameRequired Authorizations
Name of RFC to be protectedRSBC, RSAB, BATG, RSPC_API

This is required to be able to use RFC, and is thus an absolute requirement.

BC_A - Basis: Administration

S_ADMI_FCD - System Authorizations

NameRequired Authorizations
System administration functionsSP01, SP0R, SPAD, SPAM (when retrieving spool from processes with non-default client))

S_BTCH_ADM - Background Processing: Background Administrator

NameRequired Authorizations
Background administrator ID*

S_BTCH_JOB - Background Processing: Operations on Background Jobs

NameRequired Authorizations
Job operations*
Summary of jobs for a group*

While it is possible to individually assign authorizations to delete background jobs, display spool requests, copy or repeat jobs, display the job processing log, release jobs and to display the job queue, all of them are required for proper function of the product.

S_BTCH_NAM - Background Processing: Background User Name

NameRequired Authorizations
Background User Name for Authorization*

S_PROGRAM - ABAP: program run checks

NameRequired Authorizations
Authorization group ABAP program* (or the required authorization group)
User action ABAP programBTCSubmit

S_RZL_ADM - CCMS: System Administration

NameRequired Authorizations
Activity01

S_SPO_ACT - Spool: Actions

NameRequired Authorizations
Authorization field for spool*
Value for authorization check*

S_SPO_DEV - Spool: Device authorizations

NameRequired Authorizations
Long device names*

S_TABU_DIS - Table maintenance (via standard tools such as SM30)

NameRequired Authorizations
Activity03
Authorization group*

The S_TABU_DIS authorization is needed for importing BW InfoPackage groups. Additionally, it is required for all SAP releases that have neither XBP 3.0 nor transports in order to be able to import SAP calendars.

The following table illustrates the various combinations and the requirements:

Without transports and XBP 2.0 or earlierWithout transports and XBP 3.0With transports
Run InfoPackagestable RSMONRQTABooo
Import InfoPackage Groupstable RSPAKPOSxxx
Import SAP Calendarstables THOCS and TFACSx--
  • o - (optional) the official API will be used, which is slower and sometimes not reliable
  • x - (mandatory) this functionality requires access to the table via RFC_READ_TABLE
  • - - no direct table access is needed

S_OC_DOC

Only required if you want to archive spool lists.

NameRequired Authorizations
Activity24 (or *)

S_OC_ROLE

Required for sending spool-lists to recipients or archiving spool lists

NameRequired Authorizations
ActivityADMINISTRATOR (or *)

S_OC_SEND - Authorization Object for Sending

Required for sending spool lists to recipients

NameRequired Authorizations
Valid communication methods* (or any communication methods you want to be able to use)
Range of number of recipients allowed per send operation* (or the desired value, for example 100)

S_XMI_LOG - Internal access authorization for XMI log

NameRequired Authorizations
Access method for XMI log*

S_XMI_PROD - Auth. for external management interfaces (XMI)

NameRequired Authorizations
XMI logging: company nameREDWOOD (or *)
Product*
Interface ID*
note

Please note that this has to be set to REDWOOD and not your company name.

This is the minimal set of authorizations required by Redwood Server.

SAP Authorizations for BW Process Chains

S_RS_ALL

You need to assign the S_RS_ALL profile to the user, this is done as follows:

If you want to schedule process chains and/or InfoPackages, then you must also assign the S_RS_ALL profile to the REDWOOD role. This can be done as follows:

  1. Navigate to Tools > Administration > User Maintenance > Role Administration > Roles (transaction PFCG).
  2. Create a new role REDWOOD, or edit the existing one if it already exists.
  3. Select the Authorizations tab.
  4. Choose Change Authorization Data. If the system shows a list of templates, choose Do not select templates.
  5. You should now be in Change role: Authorizations.
  6. Choose Edit > Insert authorization(s) > From profile and fill S_RS_ALL into the profile field, apply the change. Notice that the required authorizations have been added automatically.

S_DEVELOP - ABAP Workbench

When the synchronous flag is switched on, the following authorization is also required for process chains:

NameRequired Authorizations
ACTVT16
DEVCLASS*
OBJNAME*
OBJTYPEPROG
P_GROUP*

AAAB - Cross-application Authorization Objects (BW)

SAP Authorizations required for XAL and XMW synchronization.

S_RFC - Authorization check for RFC access

NameRequired Authorizations
Name of RFC to be protected*, or all of FRFC, OCSB, SALX, SXMI, SYST, SDTX, RFC1, SDIFRUNTIME, SG00, SRFC, SYSU
Type of RFC object to be protectedFUGR

SAP Authorizations for Industry Solutions (ISU)

S_DEVELOP - ABAP Workbench

NameRequired Authorizations
ACTVT03
DEVCLASSEE20
OBJNAME*
OBJTYPE*
P_GROUP*

SAP Authorizations for SAP Applications

The role SAP_BC_REDWOOD_COMM_EXT_SDL is required for Business Automation Enabler (BAE).

Please ensure that the role has the following authorizations:

S_RFC_ADM

NameRequired Authorizations
ActivityAll activities
Internet Communication Framework*
Logical DestinationCRONACLE*, REDWOOD
Type of Entry in RFCDESAll values
note

ABAP users connecting to Redwood Server require the role SAP_BC_BATCH_ADMIN_REDWOOD.

← Configuring an SAP System for Process AutomationAssigning SAP Authorizations to the RFC User →
  • SAP Authorizations for XBP and BW
  • AAAB - Cross-application Authorization Objects
  • S_RFC - Authorization check for RFC access
  • BC_A - Basis: Administration
  • S_ADMI_FCD - System Authorizations
  • S_BTCH_ADM - Background Processing: Background Administrator
  • S_BTCH_JOB - Background Processing: Operations on Background Jobs
  • S_BTCH_NAM - Background Processing: Background User Name
  • S_PROGRAM - ABAP: program run checks
  • S_RZL_ADM - CCMS: System Administration
  • S_SPO_ACT - Spool: Actions
  • S_SPO_DEV - Spool: Device authorizations
  • S_TABU_DIS - Table maintenance (via standard tools such as SM30)
  • S_OC_DOC
  • S_OC_ROLE
  • S_OC_SEND - Authorization Object for Sending
  • S_XMI_LOG - Internal access authorization for XMI log
  • S_XMI_PROD - Auth. for external management interfaces (XMI)
  • SAP Authorizations for BW Process Chains
  • S_RS_ALL
  • S_DEVELOP - ABAP Workbench
  • AAAB - Cross-application Authorization Objects (BW)
  • S_RFC - Authorization check for RFC access
  • SAP Authorizations for Industry Solutions (ISU)
  • S_DEVELOP - ABAP Workbench
  • SAP Authorizations for SAP Applications
  • S_RFC_ADM
Docs
Getting StartedInstallationFinance InstallationConcepts
TroubleshootingArchiving
Learn and Connect
Support Portal
BlogEventsResources
ISO/ IEC 27001 Information Security Management
Automate to be human

2023 All Rights Reserved |

Terms of Service | Policies | Cookies | Glossary | Third-party Software | Contact | Copyright | Impressum |