Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

S_DEVELOP in PRD without Developer access key?

0 Kudos

Hello,

If a user appeared in DEVACCESS table and have access to authorization object S_DEVELOP with ACTVT value 01 and 02, and later someone deletes the user from DEVACCESS, will that still be a security issue and what all activity that user can perforrm?

Thanks

1 ACCEPTED SOLUTION

Colleen
Advisor
Advisor

which ABAP release are you on? Developer Keys are no longer used in S/4HANA systems.

You need to protect via authorisations and shouldn't be assigning that level of access in production.

Refer note 2309060 - The SSCR license key procedure is not supported in SAP S/4 HANA

12 REPLIES 12

TammyPowlas
Active Contributor
0 Kudos

Why would someone have 01 02 S_DEVELOP access in production?

0 Kudos

Hi Tammy, In one of the clients I'm seeing users having 01 & 02 access in PRD.

TammyPowlas
Active Contributor
0 Kudos

I would ask why they need that access - that is create and change

Colleen
Advisor
Advisor

which ABAP release are you on? Developer Keys are no longer used in S/4HANA systems.

You need to protect via authorisations and shouldn't be assigning that level of access in production.

Refer note 2309060 - The SSCR license key procedure is not supported in SAP S/4 HANA

0 Kudos

Thanks Colleen, So the client is on HANA 1.0, which means only way to restrict the access is through S_DEVELOP only, is it??

Thanks again!

restrict your S_DEVELOP and S_TRANSPRT access to display. Take note of DEBUG of for object type to avoid granting permanent access to debug display in production (there is a risk they could debug past a commit statement and end the session before completing program run) - Tan MIchael already made the comment with the ACTVT 02 access.

In PFCG authorisations, press F1 on the S_DEVELOP object as it gives you a heap of practical scenarios

As a side, I've seen developers debug past checks for DEVACCESS Key so quite happy to see guidance that security authorisations is the way to go. Also, it's less manual administration to register developers and continually review keys.

0 Kudos

Thanks Colleen, this helps a lot

0 Kudos

Hi Colleen,

If the my SCC4 is set as no changes allowed and my SE06 not modifiable, would any user with debug access be able to update table data and maybe use debug previliges??

pretty sure they could debug past the table checks

debug display in a product environment can be a risk if user debug's past a commit statement and exits out before program has completed.

In short, protect your system integrity and restrict the object.

0 Kudos

Thanks Colleen, In this case someone had debug access, now I wanted to understand if any changes were done using that access. Audit logging in the system is not enabled hence can’t check the sm20 logs, any other leads to see If any changes were made??

Tried checking if RSTPDAMAIN is invoked through ST03N and it appears during the period but do RSTPDAMAIN gets called even with display debug access as well?? And is it’s the right way to go about it?

Any other possible way to find out if at all any changes were made??

Thanks a lot for helping.

tan_michael
Active Participant
0 Kudos

Hi,

I think he/she can view the program and debug it since he got 02(changed), she/he change manipulate the data filters through debugging..

Thanks Tam for helping