Security Tables

The names of most Security tables begin with USR, AGR or UST. Here are a few of the most common ones

  • USR02 – Users with logon data
  • USR04 – Users by authorization profile assignment
  • USR05 – Users by user parameters
  • USR10 – Profiles with authorizations
  • ARR_1251 – Authorization data for roles
  • AGR_1252 – Organizational data for roles
  • AGR_USERS – Roles assigned to users
  • AGR_PROF – Profiles defined for roles
  • AGR_HIER – Menu for a role
  • AGR_TIME – Change date/time for a role

5 thoughts on “Security Tables

  • April 5, 2012 at 5:47 am
    Permalink

    Hi,

    This is shanmukh.I really appreciate about this website it’s really useful to everyone. And i have a question on tables assaining process ..
    Generally assaining process is map the auth.group under s_tabu_dis object and assain that role to user but hear i got a question.
    Without role how to assain table access to users ??
    please let me know the suitable answer for this confusing question please..

    Reply
  • July 3, 2012 at 6:09 pm
    Permalink

    Hi,

    Excellent Work.One small doubt…

    How to find number of tables a user can access ?

    Regards,
    Mandeep

    Reply
    • July 11, 2012 at 3:40 pm
      Permalink

      Hi Mandeep,

      Please look around the site. there are multiple posts on how to secure SAP tables.

      Regards,
      Aninda

      Reply
  • June 30, 2013 at 12:49 pm
    Permalink

    Hi,

    Which table gives the user assigned tcodes?

    Reply
    • July 2, 2013 at 8:31 pm
      Permalink

      None. You will have to combine user_agr with agr_tcodes.

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *