Required Permissions
This topic describes the minimum permissions required for users to perform IdentityIQ operations on the SAP Direct source.
For the SAP Direct source, the service account is an administrative account. The following tables list the permissions associated with different operations on SAP authorization objects. The tables include the SAP fields used to specify the permissions.
The following table lists the required permissions for specific operations:
Note
There are additional permissions for (For Change Password only) For SNC (Secure Network Communication).
Operation |
Required Permissions |
Test Connection |
|
Account Aggregation |
|
Group Aggregation |
Test Connection and Group Aggregation Note
|
Delta Aggregation |
|
Create Account |
Test Connection, Account Aggregation and Create Account (Create user with assign role and profiles) Note
|
Enable/Disable/Unlock Account |
Test Connection, Account Aggregation and Enable/Disable/Unlock Account |
Delete Account |
|
Add/Remove Entitlement |
Test Connection, Account Aggregation and Add/Remove Entitlements and Change Password |
Change Password |
Test Connection, Account Aggregation and Add/Remove Entitlements and Change Password Note
|
The role assigned to the SAP Administrative user must have the following Authorization Objects as mentioned in the tables below.

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_RFC |
ACTVT |
Activity |
|
RFC_NAME |
Name of RFC object |
|
|
RFC_TYPE |
Type of RFC object |
|

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_RFC |
Activity: 16 RFC_NAME |
Name of the RFC object |
Add the following: RFC_METADATA_GET BAPI_USER_GETLIST BAPI_USER_GET_DETAIL DDIF_FIELDINFO_GET MSS_GET_SY_DATE_TIME RFC_GET_FUNCTION_INTERFACE SDTX SMSSDATA1 SU_USER BAPI_USER_ACTGROUPS_ASSIGN Based on the options configured in the UI, select one of the three options below.
To aggregate Organization Data, add the following: BAPI_EMPLOYEE_GETDATA RFC_METADATA |
S_TABU_NAM |
ACTVT |
Activity |
|
Activity: 03 TABLE Name |
TABLE |
Add the following: USR11 USR06 USR02 TUTYP TUTYPA CVERS PRDVERS To aggregate Organization Data, add the following: PA0105 |
|
S_USER_GRP |
ACTVT |
Activity |
|
CLASS |
User group in user master maintenance |
* or specify the Group you want to assign for the user. For example, |
|
P_Orgin (To aggregate Organization data) |
AUTH |
Authorization Level |
R |
INFTY |
INFOTYPE |
0001 |
|
PERSA |
Personal area |
* |
|
PERSG |
Employee group |
* |
|
SUBTYPE |
SUBTY |
* |
|
PERSK |
Employee subgroup |
* |
|
VDSK1 |
Organization Key |
* |

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_RFC |
RFC_NAME |
Name of RFC object |
Add the following: BAPI_USER_LOCACTGROUPS_READ BAPI_USER_LOCPROFILES_READ |

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_RFC |
ACTVT |
Activity |
|
S_RFC |
Activity: 16 RFC_NAME |
Name of RFC object |
Add the following: BAPI_HELPVALUES_GET PRGN_ACTIVITY_GROUPS_LOAD_RFC PRGN_EXCHANGE COLL_ACTGROUPS_GET_ACTGROUPS DDIF_FIELDINFO_GET MSS_GET_SY_DATE_TIME PRGN_COLLECTIVE_ACTGROUPS RFC_GET_FUNCTION_INTERFACE SDTX SMSSDATA1 Based on the options configured in the UI, select one of the three options below:
Note
|
S_TABU_NAM |
TABLE Name |
TABLE |
Roles AGR_FLAGS, AGR_PROF, AGR_TCODES, AGR_TEXTS Profiles AGR_DEFINE, USR11, UST10C, UST10S Authorization Objects associated with a role AGR_1251, AGR_1252 Note
To aggregate Organization Data and Indirect Roles, add the following: HRP1000 HRP1001 |
Note
Group aggregation specific to Authorization Objects are not supported for the SAP CUA system.

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_TABU_NAM |
TABLE Name |
TABLE |
Profiles USRSYSPRF USRSYSPRFT Roles USRSYSACTT USRSYSACT |

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_RFC |
RFC_NAME |
Name of RFC object |
Add the following: /SAILPOIN/USR_CHANGE_DOC_USERS /SAILPOIN/IDENTITYIQ_FUGR /SAILPOIN/USR_CHANGE_DOC_ROLES |
S_TABU_NAM |
TABLE Name |
TABLE |
|
S_USER_GRP |
ACTVT |
Activity |
|

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_USER_GRP |
ACTVT |
Activity |
|
S_RFC |
RFC_NAME |
Name of RFC object |
|
S_USER_SAS |
ACTVT |
Activity |
Add the following: 22 - Enter Include Assign 01 - Create |
ACT_GROUP |
Role name |
* or you can specify the role name for which you have assigned |
|
CLASS |
User group in user master maintenance |
* or specify the Group you want to assign for the user For example, |
|
PROFILE |
Auth. profile in user master maintenance |
* or you can specify the Profile for which you have assigned |
|
SUBSYSTEM |
Receiving system for central user administration |
* or specify the system you are targeting |

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_USER_GRP |
ACTVT |
Activity |
|

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_USER_GRP |
ACTVT |
Activity |
|

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_USER_GRP |
ACTVT |
Activity |
|

Authorization Objects |
Field Name |
Field Description |
Field Value |
S_USER_GRP |
ACTVT |
Activity |
Add the following: 22 - Enter Include Assign 78 - Assign |
CLASS |
User group in user master maintenance |
* or specify the Group you want to assign or remove for the user. |
|
S_RFC |
RFC_NAME |
Name of RFC object |
|
S_USER_SAS |
ACTVT |
Activity |
Add the following: 22 - Enter Include Assign |
ACT_GROUP |
Role name |
* or you can specify the role name for which you have assigned |
|
CLASS |
User group in user master maintenance |
* or specify the Group you want to assign for the user. For example, |
|
PROFILE |
Auth. profile in user master maintenance |
* or you can specify the Profile for which you have assigned |
|
SUBSYSTEM |
Receiving system for central user administration |
* or specify the system you are targeting. |
|
S_USER_AGR |
ACTVT |
Activity |
|
ACT_GROUP |
Role name |
* or you can specify the role name for which you want to provide access |
|
S_USER_PRO |
ACTVT |
Activity |
Add the following: 22 - Enter Include Assign |
PROFILE |
Auth. profile |
* or you can specify the Profile for which you want to provide access. |

Authorization Objects |
Field Name |
Field Description |
Field value |
S_USER_GRP |
ACTVT |
Activity |
|

For more information on table-level permissions, refer to Configuration Table for SAP Direct.
Authorization Objects |
Field Name |
Field Description |
Field value |
S_RFC |
ACTVT |
Activity |
|
RFC_NAME |
Name of RFC object |
Add the following: BAPI_EMPLCOMM_CHANGE BAPI_EMPLCOMM_CREATE BAPI_EMPLOYEE_ENQUEUE BAPI_EMPLOYEE_DEQUEUE BAPI_EMPLOYEE_GETDATA BAPI_EMPLOYEE_CHECKEXISTENCE BAPI_EMPLCOMM_GETDETAILEDLIST |
|
P_Orgin |
AUTHC |
Authorization Level |
Add the following: E S W |
INFTY |
INFOTYPE |
|
|
PERSA |
Personal area |
* |
|
PERSG |
Employee group |
* |
|
SUBTYPE |
SUBTY |
* |
|
PERSK |
Employee subgroup |
* |
|
VDSK1 |
Organization Key |
* |
|
S_USER_GROUP |
ACTIVITY |
Activity |
|
CLASS |
User group in user master maintenance |
* |

Refer to the following for information about configuring permissions to aggregate Organization Data: