header
stringlengths
12
160
content
stringlengths
15
265k
## 6 Network and Communication Security
## 6 Network and Communication Security Your network infrastructure is extremely important in protecting your system. Your network needs to support the communication necessary for your business needs without allowing unauthorized access. A well-defined network topology can eliminate many security threats. These threats...
## 6.1 Communication Channel Security
## 6.1 Communication Channel Security SAP S/4 HANA uses several protocols for communication to internal and external applications. These can be SAP systems or third-party systems. The following protocols are supported: - HTTPS HTTP connections are protected by the Transport Layer Security (TLS) protocol. This protocol ...
## 6.2 Network Security
## 6.2 Network Security ## Network SAP S/4HANA is based on ABAP Platform technology. Therefore, for information about network security, see the respective sections in the ABAP Platform Security Guide. This includes information on using firewall systems for access control and using network segmentation. Go to https:/ /h...
## 6.3 Communication Destinations
## 6.3 Communication Destinations The use of communication destination is application-specific. Therefore please check the application-specific chapters for details. In this context please note that users and authorizations should be used with specific care, as the use of users and authorizations in an irresponsible ma...
## 7 ICF and Session Security
## 7 ICF and Session Security ## Internet Communication Framework (ICF) Services You should handle Internet Communication Framework (ICF) services in a restrictive manner in order to minimize the attack surface on the web. ##  Note As a general rule you should only activate those ICF services that are needed for the a...
## 8 File System Access Security
## 8 File System Access Security ## More Information For detailed information about data storage security, see the ABAP Platform Security Guide. ## Using Logical Paths and File Names to Protect Access Some applications in SAP S/4HANA save data in files in the file system. Therefore, it is important to explicitly provid...
## 9 Virus Scanning
## 9 Virus Scanning ## Basic Concepts We recommend installing and running a VSI 2.x-compliant virus scanner in your landscape. The SAP S/4HANA code calls this scanner using a dedicated interface during different stages of processing - during upload, download, and passage through the Gateway, and so on. You can customiz...
## 9.1 General Recommendations for Virus Scan Profiles
## 9.1 General Recommendations for Virus Scan Profiles We recommend that you enable all pre-delivered virus scan profiles. The decision to deactivate a scan profile requires a security risk assessment. ## Customer Profiles You should set up the following customer profiles: | Name | Description | |---...
## 9.2 Virus Scanning in File Uploads
## 9.2 Virus Scanning in File Uploads ## Example The system allows uploading of files. For example, users can add an attachment to business documents. Also, you can upload template files, such as e-mail HTML templates, which can be used to render data on a UI. Once uploaded into SAP S/4HANA, such documents may be displ...
## 9.3 Scan Profiles for File Downloads
## 9.3 Scan Profiles for File Downloads The following pre-delivered profiles are used for download-time scanning: - /SCET/GUI\_DOWNLOAD - /SIHTTP/HTTP\_DOWNLOAD - /SOAP\_CORE/WS\_SEND Scanning files on download as well as upload offers additional security benefits. Typically, the virus signature database will have been...
## 9.4 Further Protection Against Active Content
## 9.4 Further Protection Against Active Content ## Lines of Defense There are at least two lines of defense against active content. The first is performing virus scanning in order to avoid uploading malicious content in the first place. The second line of defense is SAP WebDispatcher. An alternative is the Internet Co...
## 10 Additional System Hardening Activities
## 10 Additional System Hardening Activities ## Click-Jacking Protection Click-jacking is an attack type where an attacker tries to hijack the clicks of an authenticated user in order to trigger malicious actions. This attack is based on framing the attacked page into an attacker-controlled enclosing page. SAP S/4HANA ...
## 11 Data Protection and Privacy
## 11 Data Protection and Privacy ## Use Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance with general data protection acts, it is necessary to consider compliance with industry-specific legislation in different countries. This section describes the specific...
## 11.1 Read Access Logging
## 11.1 Read Access Logging ## Use Read access to personal data is partially based on legislation, and it is subject to logging functionality. The Read Access Logging (RAL) component can be used to monitor and log read access to data and provide information such as which business users accessed personal data (for examp...
## 11.2 Deletion of Personal Data
## 11.2 Deletion of Personal Data Personal data in a system can be blocked as soon as the business activities for which this data is needed are completed and the residence time for the data has elapsed. After this time, only users who are assigned additional authorizations can access the data. When the retention period...
## 11.3 Information Retrieval
## 11.3 Information Retrieval Data subjects have the right to get information regarding their personal data undergoing processing, including the reason (purpose) for processing. The Information Retrieval Framework component can be used to carry out a cross-application search for personal data of a specified data subjec...
## 11.4 Consent Administration
## 11.4 Consent Administration ## Use Any personal data collected or processed must be linked to a specific, predefined purpose, such as the fulfillment of a contract or legal obligation. If you must obtain consent from the data subject to use their personal data, this consent data can be stored in the SAP system as co...
## 12 SAP S/4HANA Cross Application Infrastructure
## 12 SAP S/4HANA Cross Application Infrastructure
## 12.1 Data Security in SAP ILM
## 12.1 Data Security in SAP ILM SAP ILM offers options for protecting data security from the archiving of data up to its storage and destruction. All system connections and ILM functions have authorization protection. ## Related Information Data Security in SAP ILM System Connections [page 37] Users and Authorizations...
## 12.1.1 Data Security in SAP ILM System Connections
## 12.1.1 Data Security in SAP ILM System Connections ## System Landscape Components The SAP ILM system landscape includes the following main components: - Application system (AS ABAP) - WebDAV server on which ILM stores are set up - System on which the service for the control of ILM stores runs Since two different se...
## 12.1.2 Users and Authorizations in SAP ILM
## 12.1.2 Users and Authorizations in SAP ILM ## User To make SAP ILM available, you need users for the communication between the participating systems (using HTTP connections). For more information, see Data Security in SAP ILM System Connections under SAP Information Lifecycle Management. ## Authorizations SAP deliv...
## 12.1.3 Security of Stored Data in SAP ILM
## 12.1.3 Security of Stored Data in SAP ILM ## Security of Archived Data in the File System When storing archived data in the file system, you have read and write access to the file system with the technical system user of the SAP system. The system temporarily moves the archive files to the file system and then dele...
## 12.1.4 Logs in SAP ILM
## 12.1.4 Logs in SAP ILM In SAP ILM , logging depends on the service you use to control the stores. | Service Used | Type of Log File | Server | Description ...
## 12.2 Payment Card Security
## 12.2 Payment Card Security
## 12.2.1 Before You Start
## 12.2.1 Before You Start Since the measures described in this guideline for security in the use and administration of payment cards apply in various applications, see the security guides for those particular applications. The most important SAP Notes that apply to secure handling of payment card data are shown in th...
## 12.2.2 Authorizations
## 12.2.2 Authorizations The functions for secure handling of payment cards use the authorization concept provided by ABAP platform. Therefore, the recommendations and guidelines for authorizations as described in the ABAP Platform Security Guide also apply to the secure handling of payment cards. The ABAP platform au...
## 12.2.3 Data Storage Security
## 12.2.3 Data Storage Security ## Use Since payment card data is needed by many different applications for operational processes, the data is stored on the database. If you choose the security level Masked Display, and Encrypted When Saved , the system stores payment card numbers in encrypted form on the database in ...
## 12.2.4 Setting Up Encryption Software
## 12.2.4 Setting Up Encryption Software To be able to encrypt payment card data in the system, you must install the function package SAPCRYPTOLIB. The function package SAPCRYPTOLIB contains the functions necessary for encryption. To execute the encryption software, you have to make general settings in Customizing for...
## 12.2.5 Making Settings for Payment Card Security
## 12.2.5 Making Settings for Payment Card Security You make settings for payment card security in Customizing for Cross-Application Components under Payment Cards Basic Settings Make Security Settings for Payment Cards . The following explanations refer to the settings there. ## Security Level You can select from the...
## 12.2.6 Relevant SSF Applications
## 12.2.6 Relevant SSF Applications For encryption and decryption using the SSF Framework, the applications communicate using an SSF application. The keys (PSEs) used for encryption and decryption are generated for each SSF application. If you have not activated key replacement, then, for technical reasons, various SS...
## 12.2.7 Generating Keys
## 12.2.7 Generating Keys The generation of the keys (PSEs) used for encryption and decryption differs depending on the SSF application: ## · SSF Application *PAYCRV To generate a key version, on the SAP Easy Access screen, choose Cross-Application Components Security of Payment Card Data Encryption of Payment Cards A...
## 12.2.8 Migration of Payment Card Data Stored in Unencrypted Form
## 12.2.8 Migration of Payment Card Data Stored in Unencrypted Form You can use several migration programs to migrate payment card data stored in unencrypted form to encrypted payment card data. These programs comply with the naming convention RCCSEC\_MIGRATION\_*. For information on which program you can use for your...
## 12.2.9 Migration of Payment Card Data on SAP Business Partner
## 12.2.9 Migration of Payment Card Data on SAP Business Partner The following section is relevant for you only if you use the SAP business partner. For the SAP business partner in S/4HANA systems to support encrypted storage of payment card data, a one-time data migration is required. Before this migration, the syste...
## 12.2.10 Migration to SSF Application PAYCRV
## 12.2.10 Migration to SSF Application PAYCRV If you already encrypted credit card data in the system (using the SSF applications PAYCRD or CCARD), you can migrate this data to the SSF application PAYCRV. As a result, the system then also replaces the keys for this data on a periodic basis. Start the migration on the...
## 12.2.11 Migration to Current Key Version
## 12.2.11 Migration to Current Key Version Once you have generated a new key version, you can migrate the data, which was encrypted and stored under an older key version, to the current key version. During this process, the system decrypts the data record with the older key version, encrypts the data with the current...
## 12.2.12 Deleting a Key Version
## 12.2.12 Deleting a Key Version Once the data of an old key version has been migrated completely to the current key version, the old key version receives the status deletable . T o ensure the utmost security, the earliest the key version can actually be deleted is after an additional waiting period of 90 days after ...
## 12.2.13 Security-Relevant Logging and Tracing
## 12.2.13 Security-Relevant Logging and Tracing ## Use You can have the system log users' access to unmasked payment card data. In Customizing, choose the setting Access Log: Logs for Unmasked Display (see Making Settings for Payment Card Security [page 44]). The system updates the log on database table CCSEC\_LOG. Y...
## 12.2.14 Recommended Implementation Steps
## 12.2.14 Recommended Implementation Steps The following recommended implementation steps differ according to which of the following situations apply to you: - You did not yet set a security level. - You are already using the security level for saving payment card numbers in encrypted form, and you now want to implem...
## 12.3 Data Security in Behavioral Insights
## 12.3 Data Security in Behavioral Insights
## 12.3.1 Roles and Authorizations
## 12.3.1 Roles and Authorizations This section describes the use of roles and authorizations in SAP S/4HANA for behavioral insights (abbreviated to: Behavioral Insights).
## 12.3.1.1 Standard Roles
## 12.3.1.1 Standard Roles Behavioral Insights uses the standard authorization concepts provided by SAP S/4HANA. SAP delivers standard roles covering the most frequent business transactions. You can use these roles as a template for your own roles. In Behavioral Insights, PFCG delta roles are used to access content in...
## 12.3.1.2 Authorization Objects
## 12.3.1.2 Authorization Objects The following authorization objects are shipped with Behavioral Insights. | Authorization Ob- ject | Purpose | Attributes ...
## 12.3.2 Data Protection
## 12.3.2 Data Protection Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance with general data privacy acts, it is necessary to consider compliance with industry-specific legislation in different countries.
## 12.3.2.1 Deletion of Personal Data
## 12.3.2.1 Deletion of Personal Data Behavioral Insights might process data that is subject to the data protection laws that apply in specific countries as described in the SAP note, Simplified Deletion and Blocking of Personal Data in SAP Business Suite (SAP note number 1825544). Behavioral Insights provides SAP Net...
## 12.3.2.2 Read-Access Logging
## 12.3.2.2 Read-Access Logging ## Prerequisites Before you can use the delivered RAL configurations, the following prerequisites must be met: - The RAL configurations have been activated. - RAL is enabled in each system client. ## Description Read-access to personal data is partially based on legislation, and it is s...
## 12.3.2.3 Change Logs
## 12.3.2.3 Change Logs Whenever the records in the configuration tables are updated or deleted, this activity is logged in the ABAP platform using the standard change document feature. Change documents facilitate auditing and can be used to log what has changed, and when and how the changes were made. Configuration c...
## 12.3.2.4 Information Retrieval
## 12.3.2.4 Information Retrieval Data subjects have the right to obtain information about their data that is being processed. The information retrieval feature allows you to comply with the relevant legal requirements for data protection by allowing you to search for and retrieve all personal data for a specified dat...
## 13 SAP S/4HANA Enterprise Business Applications
## 13 SAP S/4HANA Enterprise Business Applications
## 13.1 Asset Management
## 13.1 Asset Management
## 13.1.1 Maintenance Operations
## 13.1.1 Maintenance Operations
## 13.1.1.1 Authorizations in Plant Maintenance
## 13.1.1.1 Authorizations in Plant Maintenance ## Standard Roles SAP delivers business role templates which follow the naming convention SAP\_BR\_*. The delivered business role templates are designed to cover typical activities of business users with a certain job profile. ## Example The delivered business role templ...
## 13.1.2 Resource Scheduling
## 13.1.2 Resource Scheduling
## 13.1.2.1 Deletion of Personal Data in Resource Scheduling
## 13.1.2.1 Deletion of Personal Data in Resource Scheduling ## Use SAP S/4HANA Asset Management for resource scheduling might process data (personal data) that is subject to the data protection laws applicable in specific countries. For more information about data protection, see the product assistance for SAP S/4HAN...
## 13.2 Finance
## 13.2 Finance
## 13.2.1 Financial Accounting
## 13.2.1 Financial Accounting ## Network and Communication Security Communication with external systems takes place using the standard channels provided by SAP basis technology: - Application Link Enabling(ALE)/IDoc - Standard interfaces to BI, CRM, and SRM systems - Batch-Input Ensure that no unauthorized access can...
## 13.2.1.1 Deletion of Personal Data in Financial Accounting
## 13.2.1.1 Deletion of Personal Data in Financial Accounting ## Use The Financial Accounting (FI) component might process data (personal data) that is subject to the data protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion of pe...
## 13.2.1.2 General Ledger Accounting (FI-GL)
## 13.2.1.2 General Ledger Accounting (FI-GL)
## 13.2.1.2.1 Data Storage Security
## 13.2.1.2.1 Data Storage Security ## Logical Path and File Names The FI-GL component saves data in files in the file system. Therefore, it is important to explicitly provide access to the corresponding files in the file system without allowing access to other directories or files (also known as directory traversal)....
## 13.2.1.2.2 Specific Read Access Logging Configuration
## 13.2.1.2.2 Specific Read Access Logging Configuration ## Use In Read Access Logging (RAL), you can configure which read-access information to log and under which conditions. SAP delivers sample configurations for applications. For the transactions ACC\_ECS\_LIST and ACC\_ECS\_MAINTAIN , two configurations are avail...
## 13.2.1.2.3 Authorizations
## 13.2.1.2.3 Authorizations ## Standard Authorization Objects for Accounting Enhancements for Banking The table below shows the security-relevant autorizations: | Authorization Object | Field | Value | Description | |----------------------...
## 13.2.1.3 Bank Accounting (FI-BL)
## 13.2.1.3 Bank Accounting (FI-BL) ## Important SAP Notes For a list of additional security-relevant SAP HotNews and SAP Notes, see the SAP Support Portal at http:/ / support.sap.com/securitynotes .
## 13.2.1.4 Asset Accounting (FI-AA)
## 13.2.1.4 Asset Accounting (FI-AA) ## Important SAP Notes For a list of additional security-relevant SAP HotNews and SAP Notes, see the SAP Support Portal at http:/ / support.sap.com/securitynotes . ## Standard Roles | Role | Description | |------------------------|---------...
## 13.2.1.5 Special Purpose Ledger (FI-SL)
## 13.2.1.5 Special Purpose Ledger (FI-SL) ## Data Storage Security ## Protect access to the file system with logical paths and file names The Special Purpose Ledger saves data in files in the file system. Therefore, it is important to allow access explicitly to certain files in the file system without allowing access...
## 13.2.1.6 Corporate Close - Consolidation Foundation
## 13.2.1.6 Corporate Close - Consolidation Foundation
## 13.2.1.6.1 Deletion of Personal Data
## 13.2.1.6.1 Deletion of Personal Data ## Use The Real-Time Consolidation (FIN-RTC) component in SAP S/4HANA might process data (personal data) that is subject to the data protection laws applicable in specific countries. ## Relevant Application Objects and Available Deletion Functionality | Application ...
## 13.2.1.7 Corporate Close - Group Reporting
## 13.2.1.7 Corporate Close - Group Reporting
## 13.2.1.7.1 Deletion of Personal Data
## 13.2.1.7.1 Deletion of Personal Data ## Use The Group Reporting ( FIN-CS ) component in SAP S/4HANA might process data (personal data) that is subject to the data protection laws applicable in specific countries. ## Procedure You can use the app Data Protection for Consolidation (transaction code CXDPP ) to anonymi...
## 13.2.1.7.2 Virus Scanning
## 13.2.1.7.2 Virus Scanning You can activate and set up a virus scan interface of your choice. When you upload an xls spreadsheet, make sure that the virus scanner you selected detects xls-bombs (like zip bombs). For more information see Virus Scanning [page 24].
## 13.2.1.7.3 Allowlisting
## 13.2.1.7.3 Allowlisting For the Import Consolidation Master Data app, the following MIME Type is on the allowlist: - application/vnd.openxmlformats-officedocument.spreadsheetml.sheet. Make sure that you have included the above mentioned MIME Type in the allowlist. For more information, see General Recommendations f...
## 13.2.1.7.4 Malicious Content
## 13.2.1.7.4 Malicious Content If the virus scanner detects malicious content when uploading and importing data in the Import Consolidation Master Data app, the process is terminated. SAP recommends that customers do not turn off this function.
## 13.2.1.8 Central Finance (FI-CF)
## 13.2.1.8 Central Finance (FI-CF) The following functions are available for Central Finance: ## Schedule Clean-Up Report in Source System Data relating to FI/CO documents is temporarily stored in log tables in the source system before it can be transferred to Central Finance. To delete the temporary information from...
## 13.2.1.9 Joint Venture Accounting
## 13.2.1.9 Joint Venture Accounting
## 13.2.1.9.1 Deletion of Personal Data in Joint Venture Accounting
## 13.2.1.9.1 Deletion of Personal Data in Joint Venture Accounting ## Use The Joint Venture Accounting component might process data (personal data) that is subject to the data protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion ...
## 13.2.1.9.2 Deletion of Personal Data in Project Risk Management for Contractors
## 13.2.1.9.2 Deletion of Personal Data in Project Risk Management for Contractors ## Use The Project Risk Management for Contractors component might process data (personal data) that is subject to the data protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to cont...
## 13.2.2 Controlling
## 13.2.2 Controlling
## 13.2.2.1 Deletion of Personal Data in Controlling
## 13.2.2.1 Deletion of Personal Data in Controlling ## Use The Controlling (CO) component might process data (personal data) that is subject to the data protection laws applicable in specific countries. You can use SAP Information Lifecycle Management (ILM) to control the blocking and deletion of personal data. For m...
## 13.2.2.2 Network and Communication Security
## 13.2.2.2 Network and Communication Security Controlling is integrated with Microsoft Office .For information on security aspects with Microsoft Office applications, refer to the documentation of those products. Communication in Manager Self-Service (MSS) and in the Web Application for the Business Unit Analyst (BU...
## 13.2.2.2.1 Communication Destinations
## 13.2.2.2.1 Communication Destinations Technical users are required for communication over ALE, for batch reporting, and for third-party providers that access Controlling data.
## 13.2.3 Governance, Risk and Compliance for Finance
## 13.2.3 Governance, Risk and Compliance for Finance
## 13.2.3.1 International Trade
## 13.2.3.1 International Trade The following security information applies to SAP S/4HANA for international trade only.
## 13.2.3.1.1 Intrastat
## 13.2.3.1.1 Intrastat ## Related Information Personal Data in Intrastat Declarations [page 80] Manage Authorizations for Generic UIs for Intrastat [page 80]
## 13.2.3.1.1.1 Personal Data in Intrastat Declarations
## 13.2.3.1.1.1 Personal Data in Intrastat Declarations Personal data of the contact person of the provider of information, for example first name, last name and e-mail address, is written into Intrastat declaration files to be compliant with the file formats defined by authorities. These file formats are country-spec...
## 13.2.3.1.1.2 Manage Authorizations for Generic UIs for Intrastat
## 13.2.3.1.1.2 Manage Authorizations for Generic UIs for Intrastat ## Related Information Generic UIs - Application Job for Intrastat [page 80]
## 13.2.3.1.1.2.1 Generic UIs - Application Job for Intrastat
## 13.2.3.1.1.2.1 Generic UIs - Application Job for Intrastat ## Context On the back-end server, you have to assign the OData service authorization to a PFCG role. For more information, go to https:/ /help.sap.com/s4hana\_op\_2021, enter Creating Authorization Roles for Catalogs into the search bar, press Enter , and ...
## 13.2.3.1.1.3 Dependent Business Catalog for Intrastat
## 13.2.3.1.1.3 Dependent Business Catalog for Intrastat You can manage authorization fields in PFCG role by using transaction PFCG. The authorization field is used in Business Partner display catalog. Business Catalog: SAP\_CMD\_BC\_BP\_DISP Master Data - Business Partner Display | Authorization Object | Descriptio...
## 13.2.3.1.2 International Trade Classification
## 13.2.3.1.2 International Trade Classification ## Related Information Manage Authorization for Generic UIs for International Trade Classification [page 82] Generic UIs - Application Log for International Trade Classification [page 82]
## 13.2.3.1.2.1 Manage Authorization for Generic UIs for International Trade Classification
## 13.2.3.1.2.1 Manage Authorization for Generic UIs for International Trade Classification ## Related Information Generic UIs - Application Log for International Trade Classification [page 82] Dependent Business Catalog for International Trade Classification [page 83]
## 13.2.3.1.2.1.1 Generic UIs - Application Log for International Trade Classification
## 13.2.3.1.2.1.1 Generic UIs - Application Log for International Trade Classification ## Context Manual action required. 1. Assign Fiori catalog to PFCG role. 2. Fill authorization data for authorization object S\_APPL\_LOG . 1. Log object -ALG\_OBJECT 2. Log sub-object -ALG\_SUBOBJ | Business Catalog | Lo...
## 13.2.3.1.2.2 Dependent Business Catalog for International Trade Classification
## 13.2.3.1.2.2 Dependent Business Catalog for International Trade Classification If you assign business catalog SAP\_SLL\_BC\_CLS\_CMMDTYCODE in backend role, you also assign business catalog SAP\_CMD\_BC\_PRODUCT\_DSP in the same backend role. If you assign business catalog SAP\_SLL\_BC\_CLS\_TRIFNMBR in backend rol...
## 13.2.3.1.3 International Trade Compliance
## 13.2.3.1.3 International Trade Compliance ## Related Information Manage Authorization for Generic UIs for International Trade Compliance [page 83] Dependent Business Catalog for International Trade Compliance [page 85]
## 13.2.3.1.3.1 Manage Authorization for Generic UIs for International Trade Compliance
## 13.2.3.1.3.1 Manage Authorization for Generic UIs for International Trade Compliance ## Related Information Generic UIs - Attachment for License Master [page 84]
## 13.2.3.1.3.1.1 Generic UIs - Application Job for International Trade Compliance
## 13.2.3.1.3.1.1 Generic UIs - Application Job for International Trade Compliance ## Context Manual action required. 1. Assign Fiori catalog to PFCG role. 2. Assign additional authorization default for required application job catalog entry. 3. Fill authorization field P\_PROGNAM with report name for authorization ob...
## 13.2.3.1.3.1.2 Generic UIs - Attachment for License Master
## 13.2.3.1.3.1.2 Generic UIs - Attachment for License Master ## Context On the back-end server, you have to assign the OData service authorization to a PFCG role. For more information, go to https:/ /help.sap.com/s4hana\_op\_2021, enter Creating Authorization Roles for Catalogs into the search bar, press Enter , and ...
## 13.2.3.1.3.2 Dependent Business Catalog for International Trade Compliance
## 13.2.3.1.3.2 Dependent Business Catalog for International Trade Compliance If you assign business catalog SAP\_SLL\_BC\_LICENSE\_MANAGE in backend role, you also assign business catalog SAP\_CMD\_BC\_BP\_DISP in the same backend role. If you assign business catalog SAP\_SLL\_BC\_LICENSE\_MANAGE in backend role, you...
## 13.2.3.1.4 Integration
## 13.2.3.1.4 Integration ## Related Information Integration with SAP Global Trade Services [page 85] Integration with SAP Watch List Screening [page 89] Integration with Content Data Provider [page 90]
## 13.2.3.1.4.1 Integration with SAP Global Trade Services
## 13.2.3.1.4.1 Integration with SAP Global Trade Services ## Related Information Manage Authorization for Generic UIs for GTS Integration [page 86]
## 13.2.3.1.4.1.1 Manage Authorization for Generic UIs for GTS Integration
## 13.2.3.1.4.1.1 Manage Authorization for Generic UIs for GTS Integration ## Related Information Generic UIs - Application Job for Global Trade Services Integration [page 86] Generic UIs - Application Log for Global Trade Services Integration [page 88]
## 13.2.3.1.4.1.1.1 Generic UIs - Application Job for Global Trade Services Integration
## 13.2.3.1.4.1.1.1 Generic UIs - Application Job for Global Trade Services Integration ## Context On the back-end server, you have to assign the OData service authorization to a PFCG role. For more information, go to https:/ /help.sap.com/s4hana\_op\_2021, enter Creating Authorization Roles for Catalogs into the sear...
## 13.2.3.1.4.1.1.2 Generic UIs - Application Log for Global Trade Services Integration
## 13.2.3.1.4.1.1.2 Generic UIs - Application Log for Global Trade Services Integration ## Context On the back-end server, you have to assign the OData service authorization to a PFCG role. For more information, go to https:/ /help.sap.com/s4hana\_op\_2021, enter Creating Authorization Roles for Catalogs into the sear...
## 13.2.3.1.4.1.2 Dependent Business Catalog for SAP Global Trade Services Integration
## 13.2.3.1.4.1.2 Dependent Business Catalog for SAP Global Trade Services Integration If you assign business catalog SAP\_SLL\_BC\_PI\_BOM\_TRANS in the backend role, you also assign the business catalog SAP\_PLM\_BC\_MBOM\_DISP in the same backend role. If you assign business catalog SAP\_SLL\_BC\_PI\_BOM\_TRANS in ...