As an SAP Basis professional, understanding and managing authorizations for specific document types within transaction CV01N (Create Document) is paramount to maintaining a secure and efficient SAP Document Management System (DMS). This guide delves into the intricate layers of authorization checks, configuration steps, and troubleshooting techniques to empower you with the knowledge needed to control who can create, modify, or view documents of a particular type in SAP DMS.
C_DRAW_DOK
and C_DRAW_BGR
.PFCG
. These roles define the specific activities and document types a user is permitted to interact with.The SAP system employs a multi-layered authorization check when a user attempts to create or manage documents via transaction CV01N. This robust framework ensures that users only access documents for which they have explicit permissions. The authorization checks typically involve several key authorization objects and steps, which are crucial for SAP Basis administrators to comprehend.
When a user initiates transaction CV01N, SAP performs a series of authorization checks to determine if the user has the necessary permissions. These checks are executed in a specific order:
The most basic check ensures that the user is authorized to execute the transaction CV01N
itself. This is typically controlled by the authorization object S_TCODE
. If this check fails, the user cannot even access the initial screen of CV01N.
Beyond the transaction code, SAP DMS utilizes specific authorization objects to control access to document info records and their originals. The primary objects relevant to document types in CV01N are:
C_DRAW_DOK
(Authorization for document type): This object is fundamental for controlling access based on the document type (e.g., DRW
, AER
, or custom document types). It typically contains fields like ACTVT
(Activity, e.g., 01 for create, 02 for change, 03 for display) and DOKAR
(Document Type). By assigning specific document types to a user's role with relevant activities, you can define which document types they can create or manage.C_DRAW_BGR
(Authorization for Authorization Group): This object provides an additional layer of control, allowing you to restrict document processing based on an "Authorization Group" assigned to the document. If an authorization group is defined for a document type in configuration (DC10
) and a user's role contains this object, the user must have the corresponding authorization group in their profile to create a document of that type. It typically contains fields like ACTVT
and BEGRU
(Authorization Group). This is particularly useful for segregating documents within the same document type by department or project.C_DRAW_TCD
(Authorization for Document Type and Transaction Code): This object can further restrict access by checking the combination of the document type and the transaction code being used.C_DRAW_TCS
(Authorization for Document Type and Status): This object provides control over documents based on the document type and its current status in the status network.C_DRAD_OBJ
(Object Link): While not directly controlling document type creation, this object is crucial for controlling which users can process document info records based on a combination of activity, object (e.g., material, PO), and status. This is relevant if documents are linked to other SAP objects.To determine which users are authorized for a specific document type in CV01N, you need to investigate the roles assigned to users and the authorization objects configured within those roles. This process involves using several SAP transactions.
DRW
, AER
) for which you want to check authorizations.Access transaction PFCG
(Role Maintenance). Enter the role names that are typically assigned to users who should have access to create documents. Within the role, navigate to the "Authorizations" tab and then "Change Authorization Data" (or display if in display mode). Here, you will primarily look for the authorization objects C_DRAW_DOK
and potentially C_DRAW_BGR
.
C_DRAW_DOK
: Look at the values assigned to the DOKAR
(Document Type) field and ACTVT
(Activity) field. If the document type you are investigating is listed with activity '01' (Create) or '*' (all activities), then users with this role can create documents of that type.C_DRAW_BGR
: If this object is present and maintained, check the BEGRU
(Authorization Group) field. If the document type you're checking is configured to require an authorization group, users will need a role containing this object with the corresponding authorization group.To see which roles are assigned to a particular user, use transaction SU01
(User Maintenance). Enter the user ID and navigate to the "Roles" tab. This will list all roles assigned to that user.
SAP User Role Assignments as seen in SU01
By combining the information from PFCG
(what document types are authorized per role) and SU01
(which users have which roles), you can deduce which users are authorized for specific document types.
For real-time authorization checks, use transaction ST01
(System Trace) or STAUTHTRACE
(Authorization Trace). Activate the trace for a specific user and ask them to perform the action (e.g., attempt to create a document with the specific document type in CV01N). The trace will record all authorization objects checked by the system, including those for which the user lacks authorization. This is an invaluable tool for troubleshooting authorization issues.
After executing CV01N
, you can also immediately execute /NSU53
in a new session. This transaction displays the last failed authorization check for the current user, which can quickly pinpoint missing authorizations related to document types or authorization groups.
The configuration of document types and their association with authorization groups is performed in transaction DC10
(Define Document Types). This is a crucial step that dictates how authorizations are applied.
SAP DMS relies on a set of core authorization objects to manage access control. Understanding these objects is vital for any SAP Basis professional. The following table summarizes some of the most frequently used objects:
Authorization Object | Description | Key Fields | Purpose in CV01N Context |
---|---|---|---|
S_TCODE |
Authorization for Transaction Codes | TCD (Transaction Code) |
Controls access to execute transaction CV01N. |
C_DRAW_DOK |
Authorization for Document Type | ACTVT (Activity), DOKAR (Document Type) |
Grants permission to perform specific activities (create, change, display) on documents of a given type. |
C_DRAW_BGR |
Authorization for Authorization Group | ACTVT (Activity), BEGRU (Authorization Group) |
Restricts access to documents based on their assigned authorization group. Essential when segregating documents by group. |
C_DRAW_TCD |
Authorization for Document Type and Transaction Code | ACTVT (Activity), DOKAR (Document Type), TCD (Transaction Code) |
Allows for more granular control by linking document type access to the specific transaction used. |
C_DRAW_TCS |
Authorization for Document Type and Status | ACTVT (Activity), DOKAR (Document Type), DOKST (Document Status) |
Controls access to documents based on their type and their current status within the document lifecycle. |
C_DRAD_OBJ |
Authorization for Object Link | ACTVT (Activity), DOKAR (Document Type), KLZBH (Object Key) |
Manages access to documents linked to other SAP objects (e.g., Material Master, Purchase Order). |
To better illustrate the multi-faceted nature of authorizations in SAP CV01N, let's consider a radar chart. This chart will represent the perceived "control strength" of various authorization layers and their impact on securing document creation for specific document types.
The axes of this radar chart reflect different dimensions of authorization control, such as granularity, flexibility, and direct impact on CV01N functionality. Higher values indicate greater control or direct relevance to restricting document type creation.
Authorization issues are common in SAP environments. Here are some common scenarios and how to approach them:
If the "Authorization Group" field is blank and a required field in CV01N, it indicates that either the authorization group has not been properly defined or assigned in the relevant roles, or the document type configuration in DC10
requires it, but the role does not provide the F4 help functionality. Users must remember the authorization code defined in PFCG
and manually enter it.
This error (Message no. 26 043) typically means the user lacks the necessary activity (e.g., '52' for check-in) for the specified document type (XXX) in authorization object C_DRAW_DOK
, or another relevant DMS authorization object. Check the user's roles in PFCG
and ensure the appropriate activities are assigned for C_DRAW_DOK
, and potentially C_DRAW_BGR
or C_DRAW_TCS
.
The "Document Browser" and "Authorization" tabs in CV01N might not be visible if specific PLM (Product Lifecycle Management) functionalities are not activated (EA-PLM
in ECC 6.0
) or if relevant configuration settings in DC10
are missing. Ensure that the "selection criteria" in DC10
for the document type include options for authorization group and workstation application, which can influence tab visibility.
Beyond the direct authorization checks, several other concepts and best practices are relevant to document management security in SAP.
SAP DMS supports document check-in and check-out functionalities to manage versions and prevent concurrent modifications. When a user checks in a file after a check-out, a new version might be created. Authorizations extend to these activities, often controlled by specific activities within the DMS authorization objects.
For highly specific authorization requirements, SAP allows for custom authorization checks using Business Add-Ins (BADIs). For example, BADI_DOCUMENT_STORAGE01
(method BEFORE_LIST_STORAGECAT
) can be used for auto-checkin scenarios, and BADIs can enable document-type-wise filtering for authorization groups, replacing fixed values with dynamic table lookups.
Documents created in CV01N can be linked to other SAP objects like Material Master records (e.g., via MM01
/MM02
), Purchase Orders, or Quality Notifications (QA01
/QA02
). The authorization to link documents is governed by authorization objects like C_DRAD_OBJ
, ensuring that users can only link documents to objects for which they have access.
A comprehensive overview of the SAP DMS CV01N full process and configuration, including authorization aspects.
This video provides a deep dive into the entire process of document creation within SAP DMS using CV01N, from initial setup to the various configuration steps. It highlights the practical application of the concepts discussed in this guide, particularly how authorizations are interwoven into the functional flow of document management, which is crucial for SAP Basis professionals looking to understand the full scope of their security responsibilities.
As SAP systems evolve, particularly with the transition to S/4HANA, the approach to authorizations may see refinements. Staying updated with SAP's latest security recommendations and authorization concepts is crucial.
C_DRAW_DOK
. It controls which activities (create, change, display) a user can perform on documents of a given type.C_DRAW_BGR
) or the document type configuration in DC10
. Unlike other fields, it does not have an F4 help, so users must manually enter the correct, authorized group.ST01
(System Trace) or STAUTHTRACE
(Authorization Trace). Activate the trace for the user, ask them to perform the action in CV01N, and then analyze the trace results for failed authorization checks. Alternatively, use /NSU53
immediately after a failed attempt in CV01N to see the last missing authorization.Effective management of document type authorizations in SAP CV01N is a critical responsibility for SAP Basis professionals. It requires a thorough understanding of the relevant authorization objects, their configuration in roles, and the interplay with document type settings in DC10
. By diligently applying the principles outlined in this guide, you can ensure that your SAP DMS environment remains secure, compliant, and tailored to your organization's specific access control needs.