2 Ways to Control Making Changes to ABAP Web Dynpro Personalization Settings

  • by Kehinde Eseyin, Security Architect
  • December 18, 2013
The SAP NetWeaver Business Client (NWBC), which is based on SAP ABAP Web Dynpro technology, is one of the front-end tools for accessing SAP GRC 10.0. Learn how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.
Learning Objectives

After reading this article, you'll know how to:

  • Selectively control the ability of users to make changes to Web Dynpro application forms
  • Globally control the ability of users to make changes to Web Dynpro application forms
Key Concept

Personalization involves the process of customizing services (for example, ABAP Web Dynpro applications) to suit users’ preferences. The WDDISABLEUSERPERSONALIZATION ABAP Web Dynpro parameter can be used to control the ability to change personalization settings, especially when the capability is abused by end users.

The capability to maintain user settings should be controlled in a business environment. If appropriate controls are not in place, it is common for users to play around with user settings. This often leads to unnecessary help desk calls as a result of end users tampering with the application forms, such as hiding fields or entering filter values. Changing user settings can lead to an avoidable error message. For example, if you have configured the description field of an access request form to be mandatorily filled before an access request can be submitted and the form is now personalized to hide the description field, then an error is displayed when the field is not completed because it has been unintentionally (or intentionally) hidden.

Personification and Personalization of Web Dynpro Applications

To personalize Web Dynpro applications, access transaction code NWBC. In the screen that appears (Figure 1) click the Access Request link.


Figure 1
The initial screen of NWBC

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.
 

See more by this author


Comments

1/25/2014 5:10:44 AM
Rakesh

Nice.. good work

Please log in to post a comment.

To learn more about subscription access to premium content, click here.