Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

Identifying Indirect Usage of SAP system via RFC

Former Member
0 Kudos

Hi,

My requirement is to identify any indirect usage to SAP. One of the ways is to call any RFC FM in the SAP system from an external system.

How can this be identified?

There are transactions such as ST03N and a program provided by SAP STRFCTRACE to monitor RFC connections, but I am unable to interpret them as well.

Please help.

Regards,

Anirudh

6 REPLIES 6

Former Member
0 Kudos

Hi Anirudh

Could you please expand a bit more on your requirement.

What is it that you're wanting to achieve with this?

Regards

Arden

0 Kudos

Hi Arden,

I want to identify Indirect Access to SAP system and hence check if my system is in compliance with the SAP Licenses.

So, i want to know which external system made a call to any RFC in SAP system.

Former Member
0 Kudos

Hi,

Go to transaction SM59 and check that how many system are connected to your SAP system.

You can also filter out the Function Modules which can be getting called from other system

1) SE16 - TABLE NAME TFDIR

2) SELECT FMODE AS 'R'

It will give you list of FM's in your SAP systems which can be called from other systems.

Thanks.

Regards,

Ashish Desai

0 Kudos

Hi Ashish,

I don't think this would be the correct approach. SM59 would have RFC destinations which would be used by SAP system to connect to the other systems, not the other way round. When an external system makes a call to my SAP system it would use a destination created at there end.

And identifying RFC's in the system would not be of much help, as there would be a lot of RFC FM's, but which are used in the SAP system only, like BAPI's.

Regards,

Anirudh

0 Kudos

Hi Anirudh

I don't think you can apply just 1 approach to this requirement.

In addition to the options supplied from Ashish, you should also analyse the users on your system.

Start by identifying System users as opposed to Dialog users.

No one and I mean no one should be accessing your system without a valid login. Start from there and work backwards to determine what they're using the access for. If it's not as required then deactivate the login.

Once you're done with that I'd very all Dialog users are indeed valid Dialog users...not System users who've been set-up incorrectly.

Regards

Arden

0 Kudos

Hi,

Arden is correct.

There is no single approach or tcode which can give you details.

One other method is

You can identify the external user ( Remote User ) who is accessing your system and view the log using transaction code STAD. You can take help from your basis team.

Thanks.

Regards,

Ashish Desai