cancel
Showing results for 
Search instead for 
Did you mean: 

SAC Live connection to S/4HANA Cloud - end user authorization

KMS71
Participant

All,

Can someone confirm if a live data connection from SAC to S/4HANA Cloud inherits the roles/authorizations from S/4HANA Cloud as per the user that executes the report/query, or is the access determined by the role assigned to the user stored in the connection settings?

As an example, a business user is restricted to only see certain cost centers in S/4HANA Cloud, will same restrictions automatically be applied when same user executes a SAC report that is based on a Live connection? Hope this makes sense.

Thanks

Kris

Accepted Solutions (1)

Accepted Solutions (1)

pedrosan
Advisor
Advisor

Hi Kris,

It will depend on the connection type you configure and the authentication method you select. For a direct connection for example, if you select and configure SSO and both SAC and S4 are configured to trust the same IdP the data security implemented at the source will always be respected for each request(via SAML assertions). You could also configure a direct connection but selecting user name and password as the authentication method and in this scenario you will have to assign an specific user on the S4 side to execute the requests and therefore the authorizations for that user ID will be used. Hope it helps!

You can find more information on the official SAC help site:

SAC Help

Kind regards,

Pedro

Answers (2)

Answers (2)

KMS71
Participant
0 Kudos

pedrosan That helps and explains. Many Thanks!

Regards

Kris

pedrosan
Advisor
Advisor
0 Kudos

Glad it helped! Could you please mark the answer as correct?

KMS71
Participant
0 Kudos

pedrosan That helps and explains. Many Thanks!

Regards

Kris

mfoeken
Active Contributor

Hi Kris,

One remark. If you create a live connection you don't have to implement SSO for the security to be inherited. The only downside is that the user is prompted for an S/4HANA username and password. With a live connection, security is always taken into account of the user that logs in.

Kind regards,

Martijn van Foeken | Interdobs