RFC User Authorizations

Prev Next

The RFC user should have the required authorizations as described below.


Production RFC User

Object S_RFC (Authorization Check for RFC Access):

  • RFC_TYPE (type of RFC object to be protected) – ‘FUGR’

  • RFC_NAME (name of RFC to be protected) – ‘SDTX’, ‘STUW’, ‘SYST’, 'BDCH', ‘SRTT’, ‘SRFC’, ‘THFB’,’SIFP’, ‘SCSM_COLLECTOR’, ‘SCSM_GLOB_SYSTEM’, ‘SXMB_MONI’, ‘IPC_V01’, 'S1EM', ‘SUSE', ’RFC_TABLE_READ’

  • ACTVT (Activity) – ‘16’

 Object S_TABU_DIS (Table Maintenance via standard tools such as SM30):

  • DICBERCLS (Authorization Group) =
    For all Panaya Projects - ’PC’, ’SS’, ’SC’, ‘SA’,’&NC&’, ‘SPWD’ , ‘XICO’, ‘XIPE’, 'VC', 'MA'

  • ACTVT (Activity) = ‘3’

 Object S_TABU_NAM (Table Maintenance)

  • ACTVT (Activity) - '03' 

  • Table AGR_USERS


Object S_DEVELOP (ABAP Workbench): 

  • ACTVT (Activity) = ‘3’ 

  • DEVCLASS (Development class for Transport) =’*’ 

  • OBJNAME (Object name) = ‘*’ 

  • OBJTYPE (Object type) =’*’ 

  • P_GROUP (Authorization group ABAP/4 program) = ‘*’

Object S_XMB_MONI (Authorization Object for XI Message Monitoring):

  • ACTVT (Activity) - '03'

  • SXMBIFNAME (Proxy Generation: Interface ID) - '*'

  • SXMBIFNS (Proxy Generation: Namespace in the Integration Builder) - '*'

  • SXMBPARTY (XI: Communication Party) - '*'

  • SXMBPRTAG (XI: Issuing Agency for Communication Party) - '*'

  • SXMBPRTTYP (XI: Identification Scheme for Communication Party) - '*'

  • SXMBSERV (XI: Service) - '*'

For a system with HR components - Object S_TABU_CLI (Cross-Client Table Maintenance): 

  • CLIIDMAINT (Cross-Client Table Maintenance ) – ‘X’ 

For extractions that require Fiori data - Object 'S_TABU_NAM'

  • ACTVT (Activity) - '03'

  • Table /IWFND/L_METAGR

  • Table /IWFND/L_MET_DAT



Solution Manager RFC User

Object S_RFC (Authorization Check for RFC Access):

  • RFC_TYPE (type of RFC object to be protected) – ‘FUGR’

  • RFC_NAME (name of RFC to be protected) – ‘SDTX’, ‘SMSY_GET_DATA’, ‘SMSY_GET_DATA_RFC’, ‘SMSY_PPMS_API_RFC’,’RSDRI’, ‘SYST’, ‘SASAP00’, ‘RFC1’

  • ACTVT (Activity) – ‘16’

 Object S_TABU_DIS (Table Maintenance via standard tools such as SM30):

  • DICBERCLS (Authorization Group) = ’SS’,’&NC&’

  • ACTVT (Activity) = ‘3’

Object S_TABU_RFC (Data Export with RFC): 

  • ACTVT (Activity) = ‘3’

Object S_RS_AUTH (BI Analysis Authorizations in Role):

  • BIAUTH (BI Analysis Authorizations: Name of an Authorization) = ‘0BI_ALL’

Object S_TABU_NAM (Table Access with Generic Standard Tools):

  • ACTVT (Activity) = ‘3’

  • TABLE (Table Name) = TFDIR, USR01



BW RFC User

Object S_RFC (Authorization Check for RFC Access):

  • RFC_TYPE (type of RFC object to be protected) – ‘FUGR’

  • RFC_NAME (name of RFC to be protected) – ‘SCT2’,‘SDTX’ 

  • ACTVT (Activity) – ‘16’

Object S_TABU_DIS (Table Maintenance via standard tools such as SM30):

  • DICBERCLS (Authorization Group) = ‘SC’,’SS’,’&NC&’

If you encounter authorization issues related to BW during the extraction, try adding the following to the authorization group: ‘BWC’, ‘STRW’

  • ACTVT (Activity) = ‘3’

Object S_TABU_RFC (Data Export with RFC): 

  • ACTVT (Activity) = ‘3’


Fiori RFC user

The following RFC user is only required if extracting Fiori from external systems -

For Services -

Object S_RFC (Authorization Check for RFC Access):

  • RFC_TYPE (type of RFC object to be protected) – ‘FUGR’

  • RFC_NAME (name of RFC to be protected) – ‘SDTX’

  • ACTVT (Activity) – ‘16’

Object S_TABU_NAM (Table Maintenance)

  • ACTVT (Activity) - '03'

  • Table '/IWFND/I_MED_SRH', '/IWFND/I_MED_SRT', '/IWBEP/I_MGW_SRH', '/IWBEP/I_SBD_SV', '/IWBEP/I_SBD_GA', '/IWBEP/I_SBD_DS', 'TADIR'.

For usage -

Object S_RFC (Authorization Check for RFC Access):

  • RFC_TYPE (type of RFC object to be protected) – ‘FUGR’

  • RFC_NAME (name of RFC to be protected) – ‘SDTX’

  • ACTVT (Activity) – ‘16’

Object S_TABU_NAM (Table Maintenance)

  • ACTVT (Activity) - '03'

  • Table '/IWFND/L_METAGR', '/IWFND/L_MET_COL', '/IWFND/L_MET_DAT'.


SI RFC user   

The following SI/ATC users are only required for S/4HANA Solutions -

In the Client field, use 000. No authorizations are required.



ATC RFC user


The RFC user should have the required authorizations as described below -

Object S_RFC (Authorization Check for RFC Access):

  • RFC_TYPE (type of RFC object to be protected) – ‘FUGR’

  • RFC_NAME (name of RFC to be protected) – ‘SATC_CI_METADATA_REMOTE’, ‘SATC_CI_RESULT_REMOTE’, 'SDTX'.  

  • ACTVT (Activity) – ‘16’

Object S_Q_ADM (Launching code analysis, accessing results):

  • ACTVT (Activity) – ‘03’

  • ATC_OBJTYP (ATC: ATC-object with access control needs) – ‘02’, '03'

  • ATC_VISIBL (ATC: Result visibility) – All Values

  • DEVCLASS (Package) - *

  • APPL_COMP (Application component ID) - *

Object S_TABU_NAM (Table Maintenance):

  • ACTVT (Activity) – ‘03’

  • TABLE (Table Name) = SATC_AC_RESULTH, SCA_DS_SRC 


ATC User for Checked System

In the checked system, the RFC user needs the following authorizations:

Object S_RFC A

  • ACTVT (Activity) – ‘16’ (Execute)

  • RFC_TYPE - ‘FUGR’

  • RFC_NAME -

    • SCA_REMOTE_DATA_ACCESS

    • SABP_COMP_PROCS_E

    • SYCM_APS_REMOTE

    • SYST

    • S_CODE_INSPECTOR_TESTS

Object S_RFC

  • ACTVT (Activity) – ‘16’ (Execute)

  • RFC_TYPE  - ‘FUNC’

  • RFC_NAME -

    • FUNCTION_EXISTS

    • REPOSITORY_ENVIRONMENT_ALL

    • RFC_GET_NAMETAB

    • SVRS_GET_VERSION_DIRECTORY_46

    • RFCPING

    • SLINRMT_RUN

    • TRINT_PROGRESS_INDICATOR

    • TRINT_TP_UPDATE_TPSTAT

    • SLDAG_GET_SYSTEM_NAME

Object S_DEVELOP

  • ACTVT – ‘3’ (Display)

  • DEVCLASS - *

  • OBJNAME - *

  • OBJTYPE - *

  • P_GROUP - *

Object S_SYS_RWBO

  • ACTVT - ‘01’ (Create or generate), ‘02’ (Change), ‘03’ (Display)

  • DOMAIN - *

  • TTYPE - TRAN

Object S_TRANSPRT

  • ACTVT - ‘01’ (Create or generate), ‘02’ (Change), ‘03’ (Display)

  • TTYPE - TRAN

Object S_DATASET

  • ACTVT - ‘34’ (Write)

  • FILENAME - *

  • PROGRAM - SAPLSABC, SAPLSTRF