Getting StartedSecurity Tables

Security Tables

The names of most Security tables begin with USR, AGR or UST. Here are a few of the most common ones

  • USR02 – Users with logon data
  • USR04 – Users by authorization profile assignment
  • USR05 – Users by user parameters
  • USR10 – Profiles with authorizations
  • ARR_1251 – Authorization data for roles
  • AGR_1252 – Organizational data for roles
  • AGR_USERS – Roles assigned to users
  • AGR_PROF – Profiles defined for roles
  • AGR_HIER – Menu for a role
  • AGR_TIME – Change date/time for a role

5 thoughts on “Security Tables

  • Hi,

    This is shanmukh.I really appreciate about this website it’s really useful to everyone. And i have a question on tables assaining process ..
    Generally assaining process is map the auth.group under s_tabu_dis object and assain that role to user but hear i got a question.
    Without role how to assain table access to users ??
    please let me know the suitable answer for this confusing question please..

    Reply
  • Hi,

    Excellent Work.One small doubt…

    How to find number of tables a user can access ?

    Regards,
    Mandeep

    Reply
    • Hi Mandeep,

      Please look around the site. there are multiple posts on how to secure SAP tables.

      Regards,
      Aninda

      Reply
  • Hi,

    Which table gives the user assigned tcodes?

    Reply
    • None. You will have to combine user_agr with agr_tcodes.

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *