You can use authorizations to protect your data against unauthorized access and monitor your data protection management. Authorizations restrict access to the data in order to avoid business risks and financial losses due to errors, mistakes or negligence.
Furthermore, it is also about treating personal data confidentially. Think for example of personal data from HR processes or customer data. This information can cause a lot of damage if it falls into the wrong hands.
NextTables protects your data on several levels. On the one hand, access at the table level is controlled by NextTables own authorization object. In this way you can determine which users can display or change data in a table. You can also determine administrators who are allowed to create the configuration or customize the application.
In addition, standard SAP authorizations also apply when accessing InfoProviders. These authorizations are required by all users, for example to call up reports or maintain new entries. This authorization check deals with general access to InfoProviders. There is no access restriction to the data contents of the InfoProviders.
These are guaranteed by so-called analysis authorizations. These restrict access to the data content of the InfoProvider. In this way, you can unlock certain content for a user and assign very granular authorizations. For example, one user may only see the data of one company code and another user may see the data of another company code. However, the information for both company codes is located in the same InfoProvider.
If analysis authorizations are used, NextTables automatically generates variables for each InfoObject that is flagged as authorization-relevant. You can select the variables in the global filter.
The user therefore only sees the data for which he is authorized.
Why are variables used? Well, when variables are used, the user understands that his view is restricted and therefore may look different from the view other users see. Also, templates/bookmarks with variables can be created and shared so that each user can see "his" data.
If the user tries to access data outside his or her authorization, an error message is displayed.
An authorization check is also carried out when the data is written back. All values that are updated by the user must be within the scope of his or her authorizations.
NextTables supports authorizations for both DSOs and InfoObjects. Compounded InfoObjects are also supported. However, there is one restriction: analysis authorizations for hierarchy nodes are not currently supported.
As you can see, NextTables protects your data from unauthorized access in various ways. Variables are used to ensure that user-friendliness is not compromised. If you are interested in the technical implementation of authorizations, this article from our NextTables Knowledge Base will help you.
Would you like to learn more about NextTables? Download our NextTables presentation now and learn everything about other application scenarios and functions!