Permissions
The table below lists the required K2 permissions and System permissions per K2 connect for SAP tasks.
Task | K2 Permissions | System Permissions | Comments |
---|---|---|---|
Install | K2 Service Account | db_owner, SysAdmin |
The K2 Service Account must be part of the Local Administrators group. Two folders are written to by the server and require write permissions: The system permissions can be changed to reader/write after the installation is complete. |
Developer | Domain Account, Cached credentials in K2 Workspace | Read and Write Access must be granted to the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\SourceCode\ connect\Configuration\SqlConnectionString | |
Database Rights for K2 connect Server | db_owner, Create | ||
K2 Server Rights on K2 connect database | db_datareader | ||
Developer connecting to K2 connect database using Visual Studio | Execute |
|
|
Access to SAP | Setting permissions and access to SAP is the role of the SAP Administrator and not a K2 connect function. Contact your SAP Administrator. | ||
Stop or Start K2 connect Server | Stop and Start rights on Windows Services | In distributed environments, developers must have stop and start rights on the remote server. |
SAP User Types and Permissions
SAP has several user types available and each is used for a different purpose, more information is available at http://help.sap.com/saphelp_nw70ehp2/helpdata/en/3d/3272396ace5534e10000000a11405a/frameset.htm. Two of these user types can be used with K2 connect, either the Dialog or Communication user type. Below is a summary of the tasks to the related permissions.
Task | General Authority Objects |
---|---|
To establish a connection. |
S_RFC RFC_TYPE=FUGR ;RFC_NAME=SYST ;ACTVT=16 ; S_RFC RFC_TYPE=FUGR ;RFC_NAME=RFC1 ;ACTVT=16 ; |
Transaction | |
Use Transaction Class |
S_RFC RFC_TYPE=FUGR ;RFC_NAME=SDTX ;ACTVT=16 ; S_RFC RFC_TYPE=FUGR ;RFC_NAME=SDIFRUNTIME ;ACTVT=16 ; S_ADMI_FCD S_ADMI_FCD=NADM; |
Tables | |
Read Tables from SAP |
S_RFC RC=0 RFC_TYPE=FUGR ;RFC_NAME=SDTX ;ACTVT=16 ; S_TABU_DIS RC=0 RFC_TYPE=FUGR ;RFC_NAME=SDIFRUNTIME ;ACTVT=16 ; S_ADMI_FCD S_ADMI_FCD=NADM; |
Look up tables and table meta data |
S_RFC RFC_TYPE=FUGR ;RFC_NAME=SDTX ;ACTVT=16 ; S_RFC RFC_TYPE=FUGR ;RFC_NAME=SDIFRUNTIME ;ACTVT=16 ; S_TABU_DIS ACTVT=03 ;DICBERCLS=&NC& ; |
Separate authority check for each table to read |
S_RFC C RFC_TYPE=FUGR ;RFC_NAME=SDTX ;ACTVT=16 ; S_RFC C RFC_TYPE=FUGR ;RFC_NAME=SDIFRUNTIME ;ACTVT=16; S_TABU_DIS ACTVT=03 ;DICBERCLS=XXXX ; S_TABU_NAM ACTVT = 03; TABLE = DD02V
Where XXXX is the Authority Group for the table. To find out which authority group belongs to which table, look at table TDDAT (e.g. with SE16). If the table is not listed there, the authority group is &NC&. For authorizing specific tables use authorization object S_TABU_NAM instead of S_TABU_DIS. |
Custom functions |
If Custom functions like Z_XTRACT_IS_TABLE_COMPRESSION, Z_XTRACT_IS_TABLE or Z_XTRACT_IS_TABLE_JOIN are used, then use:
S_RFC C RFC_TYPE=FUGR ;RFC_NAME=XXXX ;ACTVT=16 ;
Where XXXX is the name of the function group where the custom function module is located. |