⚠️ IMPORTANT INFORMATION for Avantra 24 Automation customers

From Avantra 24 for customers who are licensed for automations and have previously imported any automation transport there is no longer a requirement to import the standard Avantra monitoring transports before importing the automation transports!
 
ONLY THE AUTOMATION TRANSPORTS ARE REQUIRED and are accessed via the solution document here: How to guide: SAP Automation Templates Installation

Note: Make sure to import the workbench request before the customising request containing the role.



TABLE OF CONTENTS



This solution document provides information about the content of all Avantra automation customizing transports released with version 24.1.0.001. In addition, the article provides an overview of all released automation customizing transports in correlation to the Avantra version.


1.0 History of role transports


Avantra VersionDateSAP Release >= 7.30 SP 5Comments
24.1.0.00129 Feb 2024AVAK900646Addition of ZAVANTRA_AUTOMATION_JOB and ZAVANTRA_AUTOMATION_USER
24.0.2.002
19 Jan 2024AVAK900632
Avantra role (ZAVANTRA) and the multiple automation roles (ZAVANTRA_AUTOMATION*) are now all include in a single role transport - AVAK900632 Role ZAVANTRA and Avantra automation roles V24.0.2.002
24.0.2.00110 Jan 2024
AVAK900626
Update to ZAVANTRA role adding RFC: /OSP/SYSTEM_TIMEZONE, RFC_METADATA_GET, RFC_METADATA_GET_TIMESTAMP, SALC_MT_GET_TID_BY_NAME
24.0.0.00229 Nov 2023AVAK900610
23.3.3.0
AVAK900529
23.2.2.0
AVAK900519
23.2.0.0
AVAK900489
23.1.0.0
AVAK900428
23.0.0.0
AVAK900392
21.11.6.0
AVAK900343



2.0 Content of the ZAVANTRA_AUTOMATION role transport


Note: From Avantra 24 the automation customising transport now combines the standard interface monitoring role ZAVANTRA as well as the automation role ZAVANTRA_AUTOMATION.
Please refer to the solution document "Avantra interface customising transports for release 24.1.0.001for the details of the ZAVANTRA role.



Cross-application authorization objects
B_ALE_LSYS
ALE/EDI: Maintaining Logical Systems
LOGSYS
Logical System
*


S_RFC
Authorization Check for RFC Access
ACTVT
Activity
16 (Execute)
RFC_NAME
Name (Whitelist) of RFC object

BAPI_CTREQUEST_CREATE

OCS_API_CALCULATE_QUEUE

OCS_API_CONFIRM_QUEUE

OCS_API_DEFINE_QUEUE

OCS_API_EXTRACT_ARCHIVES

OCS_API_GET_QUEUE_STATUS

OCS_API_GET_SPAM_VERSION

OCS_API_LOAD_EPS_FILES

OCS_API_PREPARE_SPAM_UPDATE

OCS_API_SCHEDULE_IMPORT_JOB

OCS_API_SET_SETTINGS

OCS_API_SKIP_PHASE

PFL_IMPORT_ACTIVE_SRV_PROFILES

SPFL_API_DEL_AND_CREATE

SSFR_GET_ALL_STRUST_IDENTITIES

SSFR_REMOVE_APP_PSES

SWNC_COLLECTOR_CLEAN_SWNCMONI

RFC_TYPE
Type of RFC object to which access
FUNC (Function Module)


S_RFC_ADM

Administration for RFC Destination

ACTVT
Activity
02 Change
03 Display
06 Delete
ICF_VALUE
Internet Communication Framework Values
*
RFCDEST
Logical destination (specified in function call)
*
RFCTYPE
Type of Entry in RFCDES
All values


S_TCODE
Transaction Code Check at Transaction Start
TCD
Transaction Code

SA38, SAINT, SMT1, SPAD, SPAM





Basis: Administration
S_ADMI_FCD
System Authorizations
S_ADMI_FCD
System administration function
SPAA    Spool administration (device administration)
SPAB    Spool administration (general settings)
SPAC    Spool administration (device type, character sets)
SUM      Software Update Manager Tools



S_BTCH_JOB
Background Processing: Operations
JOBACTION
Job operations
RELE Release Jobs (Released Automatically When Scheduled)

JOBGROUP
Summary of jobs for a group
*


S_BTCH_NAM
Background Processing: Background User Name
BTCUNAME
Background User Name for Authorization Check
*


S_CTS_ADMI
Administration Functions in Change and Transport System
                      CTS_ADMFCT
Administration Tasks for Change and Transport System
*




S_CTS_SADM
System-Specific Administration (Transport)
CTS_ADMFCT
Administration Tasks for Change and Transport System
EPS1, EPS2, IMPA, IMPS, IMPT, TADD, TADM, TDEL
DESTSYS
Logical System
*
DOMAIN
TMS: Transport Domain
*



S_DATASET
Authorization for file access
ACTVT
Activity
06 Delete
33 Read
34 Write
FILENAME
Physical file name
*
PROGRAM
Program Name with Search Help
CL_OCS_BINARY_FILE============CP

CL_OCS_BINARY_FILE_WRITER=====CP

SAPLSCCB

SAPLSLOG

SAPLSPFL

SAPLSTRF

SAPLTMSM



S_SPO_DEV
Spool: Device authorizations
SPODEVICE
Spool: Long device names
*



S_SRT_CF_C
SOAP Runtime: Web Service Consumer
ACTVT
Activity
06 Delete
SRT_NAME
SRT Authorization Object Name
*



S_SRT_CF_P
SOAP Runtime: Web Service Provider
ACTVT
Activity
03 Display
06 Delete
SRT_NAME
SRT Authorization Object Name
*




S_SRT_LRD
SOAP Runtime: Logcal Receiver Dete
ACTVT
Activity
06 Delete
SRT_NAME
SRT Authorization Object Name
*



S_SRT_PROF
OAP Runtime Profile Administratio
ACTVT
Activity
06 Delete
SRT_NAME
SRT Authorization Object Name
*


S_SRT_SCEN
SOAP Runtime: Web Scenario
ACTVT
Activity
06 Delete
SRT_TYPE
SRT Authorization Check Type
*


S_SRT_TYPE
SOAP Runtime: Web Service Special
ACTVT
Activity
02 Change
03 Display
SRT_TYPE
SRT Authorization Check Type
GLOB (Global Settings)


S_SRT_UACC
SOAP Runtime User Accounts
ACTVT
Activity
06 Delete
SRT_TYPE
SRT Authorization Check Type
*


S_SRT_UASG
SOAP Runtime: User Account Assignment
ACTVT
Activity

06 Delete

SRT_NAME
SRT Authorization Object Name
*
SRT_NAME2
SRT Authorization Object Name
*





S_USER_GRP
User Master Maintenance: User Groups
ACTVT
Activity

03 Display

05 Lock

06 Delete

CLASS
User group in user master maintenance
*


S_USER_GRP
User Master Maintenance: User Groups
ACTVT
Activity
02 Change
CLASS
User group in user master maintenance
TMSADM


Basis - Development Environment
S_DEVELOP
ABAP Workbench
ACTVT
Activity
03 Display
DEVCLASS
Package
SOAP_CONFIG
OBJNAME
Object Name
SRT_WSP_CONFIG_FW_INIT
OBJTYPE
Object Type
FUGR
P_GROUP
ABAP Program Authorization Group
*


S_PROGRAM
ABAP: Program Flow Checks
P_ACTION
User Action in ABAP Program
SUBMIT Execute ABAP program
VARIANT Create and Maintain Variants
P_GROUP
Authorization group ABAP/4 program
*


S_SYS_RWBO
System-Specific Authorization for Transport Organizer       
ACTVT
Activity
01 Add or Create
02 Change
03 Display
DESTSYS
Logical System
*
DOMAIN
TMS: Transport Domain
*
TTYPE
Request Type (Change and Transport System)
PATC,PIEC


S_TRANSPRT
Transport Organizer
ACTVT
Activity

01 Add or Create
02 Change
03 Display

TTYPE
Request Type (Change and Transport System)
DTRA, PATC, PIEC, TASK, TRAN 


S_TRANSPRT
Transport Organizer
ACTVT
Activity

43 Release

TTYPE
Request Type (Change and Transport System)
TRAN 



Basis - Central Functions
S_OC_ROLE
SAPoffice: Office User Attribute
OFFADMI
Text field length 15: authorization check
*


3.0 Content of the ZAVANTRA_AUTOMATION_CLIENT role transport


Cross-application Authorization Objects
S_TCODE
Transaction Code Check at Transaction Start
TCD
Transaction Code
SCC4


Basis: Administration
S_ADMI_FCD
System Authorizations
S_ADMI_FCD
System administration function
T000 (Create new client)


S_BTCH_ADM
Background Processing: Background Administrator
    
BTCADMIN
Background Administrator ID
Y (Background Administrator Authorization)


S_BTCH_JOB
Background Processing: Operations on Background Jobs
JOBACTION
Job operations

RELE (Release Jobs (Released Automatically When Scheduled))

JOBACTION
Job operations
*


S_CLNT_IMP
Data Import for Client Copy 
ACTVT
Activity

60 Import


S_CTS_ADMI
Administration Functions in Change and Transport System
CTS_ADMFCT
Administration Tasks for Change and Transport System
TABL


S_DATASET
Authorization for file access     
ACTVT
Activity
34 (Write)
FILENAME
Physical file name
*
PROGRAM
Program Name with Search Help
SAPLSCCB
SAPLSLOG


S_SPO_DEV
Spool: Device authorizations
SPODEVICE
Spool: Long device names

*


S_TABU_CLI
Cross-Client Table Maintenance
CLIIDMAINT
Indicator for cross-client mainten

'X' (Allowed: Maintenance of cross-client tables)


S_TABU_DIS
Table Maintenance (using standard tools such as SM30)  
ACTIVITY
Activity

02 (change)

DICBERCLS
Table authorization group
SS


S_TABU_NAM
Table Access by Generic Standard Tools
ACTVT
Activity
02 (Change)
03 (Display)
TABLE
Table name
T000


S_USR_AGR
Authorizations: Role Check
ACTVT
Activity
01 (Add or Create)
ACT_GROUP
Role Name
*


S_USR_GROUP
User Master Maintenance: User Groups 
ACTVT
Activity
01 (Add or Create)
CLASS
User group in user master maintenance
*


S_USR_PRO
User Master Maintenance: Authorization Profile 
ACTVT
Activity
01 (Add or Create)
PROFILE
Auth. profile in user master maintenance
*


Basis - Development Environment  
S_TRANSPRT
Transport Organizer
ACTVT
Activity
01 (Add or Create)
TTYPE
Request Type (Change and Transport System)
CLCP



4.0 Content of the ZAVANTRA_AUTOMATION_SNOTE role transport


Basis: Administration
S_DATASET
Authorization for file access     
ACTVT
Activity
All activities 
FILENAME
Physical file name
*
PROGRAM
Program Name with Search Help
SAPLSTRF


Basis - Development Environment  
S_DEVELOP
ABAP Workbench
ACTVT
Activity
All activities
TTYPE
Request Type (Change and Transport System)
*


S_TRANSPRT
Transport Organizer
ACTVT
Activity
01 (Add or Create)
02 (Change)
03 (Display)
05 (Lock)
06 (Delete)
23 (Maintain)
DEVCLASS
Package
SBSPEXT_HTMLB
OBJNAME
Object Name
HTMLB_SAMPLES
OBJTYPE
Object Type
WAPA
P_GROUP
ABAP Program Authorization Group
*




5.0 Content of the ZAVANTRA_AUTOMATION_SPAMSAINT role transport


Cross-application Authorization Objects
S_RFC
Authorization Check for RFC Access
ACTIVITY
Activity
16 (Execute)
RFC_NAME
Name (Whitelist) of RFC object to which access is allowed
OCS*
RFC_TYPE
Type of RFC object to which access
FUGR (Function group)
FUNC (Function Module)


S_TCODE
Transaction Code Check at Transaction Start
TCD
Transaction Code
SAINT, SPAM


Basis: Administration
S_ADMI_FCD
System Authorizations
S_ADMI_FCD
System administration function
SUM (Use Software Update Manager Tools)


S_BTCH_ADM
Background Processing: Background Administrator
    
BTCADMIN
Background Administrator ID
Y (Background Administrator Authorization)


S_CTS_ADMI
Administration Functions in Change and Transport System
CTS_ADMFCT
Administration Tasks for Change and Transport System
EPS1, EPS2, IMPA, IMPS, IMPT, TADD, TADM


S_CTS_SADM
System-Specific Administration (Transport)
CTS_ADMFCT
Administration Tasks for Change and Transport System
EPS1, EPS2, IMPA, IMPS, IMPT, TADD, TADM, TDEL
DESTSYS
Logical System
*
DOMAIN
TMS: Transport Domain
*


S_C_FUNCT
C calls in ABAP programs
ACTIVITY
Activity
16 (Execute)
CFUNCNAME
Name of C Routine Callable Using CALL
SYSTEM
PROGRAM
Program Name with Search Help
SAPLOCS_FILEMGMT


S_DATASET
Authorization for file access     
ACTVT
Activity
06 (Delete)
33 (Read)
34 (Write)
FILENAME
Physical file name
*
PROGRAM
Program Name with Search Help
CL_OCS_BINARY_FILE============CP
CL_OCS_BINARY_FILE_WRITER=====CP
SAPLSLOG



Basis - Development Environment  
S_SYS_RWBO
System-Specific Authorization for Transport Organizer
ACTVT
Activity
01 (Add or Create)
02 (Change)
03 (Display)
DESTSYS
Logical System
*
DOMAIN
TMS: Transport Domain
*
TTYPE
Request Type (Change and Transport System)
PATC, PIEC


S_TRANSPRT
Transport Organizer
ACTVT
Activity
01 (Add or Create)
02 (Change)
03 (Display)
TTYPE
Request Type (Change and Transport System)
PATC, PIEC


S_TRANSPRT
Transport Organizer
ACTVT
Activity
43 (Release)
TTYPE
Request Type (Change and Transport System)
TRAN



6.0 Content of the ZAVANTRA_AUTOMATION_STRUST role transport


Cross-application Authorization Objects
S_RFC
Authorization Check for RFC Access
ACTIVITY
Activity
16 (Execute)
RFC_NAME
Name (Whitelist) of RFC object to which access is allowed
ICM_SSL_PSE_CHANGED
RFC_TYPE
Type of RFC object to which access
FUNC (Function Module)



Basis: Administration  
S_DATASET
Authorization for file access     
ACTVT
Activity
06 (Delete)
33 (Read)
34 (Write)
FILENAME
Physical file name
*
PROGRAM
Program Name with Search Help
/AVANTRA/CL_CERTS_MAINTAIN====CP
SAPLSSFM
SAPLSSFR 



7.0 Content of the ZAVANTRA_AUTOMATION_SYSREFRESH role transport



Cross-application Authorization Objects
S_RFC
Authorization Check for RFC Access
ACTIVITY
Activity
16 (Execute)
RFC_NAME
Name (Whitelist) of RFC object to which access is allowed
TRINT_CLEAR_FOR_DBCOPY  
RFC_TYPE
Type of RFC object to which access
FUNC (Function Module)


S_TCODE
Transaction Code Check at Transaction Start
TCD
Transaction Code
SICF 



Basis: Administration

S_SRT_CF_C
SOAP Runtime: Web Service Consumer
ACTVT
Activity
06 Delete
SRT_NAME
SRT Authorization Object Name
*



S_SRT_CF_P
SOAP Runtime: Web Service Provider
ACTVT
Activity
03 Display
06 Delete
SRT_NAME
SRT Authorization Object Name
*



S_SRT_DEST
SOAP Runtime: SRT Destinations
ACTVT
Activity
06 Delete
SRT_NAME
SRT Authorization Object Name
*



S_SRT_LRD
SOAP Runtime: Logcal Receiver Dete
ACTVT
Activity
06 Delete
SRT_NAME
SRT Authorization Object Name
*



S_SRT_PROF
OAP Runtime Profile Administratio
ACTVT
Activity
06 Delete
SRT_NAME
SRT Authorization Object Name
*


S_SRT_SCEN
SOAP Runtime: Web Scenario
ACTVT
Activity
06 Delete
SRT_TYPE
SRT Authorization Check Type
*


S_SRT_UACC
SOAP Runtime User Accounts
ACTVT
Activity
06 Delete
SRT_TYPE
SRT Authorization Check Type
*


S_SRT_UASG
SOAP Runtime: User Account Assignment
ACTVT
Activity

06 Delete

SRT_NAME
SRT Authorization Object Name
*
SRT_NAME2
SRT Authorization Object Name
*



Basis - Development Environment
S_DOKU_AUT
SE61 Documentation Maintenance Authorization  
DOKU_ACT
Editing Status
ACTIVATE (Activate end user documentation)
FINAL_VERS (End user documentation)
RAW_VERS (Raw documentation)
DOKU_DEVCL
Package for which documentation authorization is assigned
*
DOKU_MODE
Authorization to maintain, transla
MAINTAIN (Edit the master language documentation)
TRANSLATE (Translate)




8.0 Content of the ZAVANTRA_AUTOMATION_JOB role transport


Cross-application Authorization Objects
S_RFC
Authorization Check for RFC Access
ACTIVITY
Activity
16 (Execute)
RFC_NAME
Name (Whitelist) of RFC object to which access is allowed
BAPI_XBP_EVENT_RAISE
BAPI_XBP_JOB_ADD_ABAP_STEP
BAPI_XBP_JOB_CLOSE
BAPI_XBP_JOB_DELETE
BAPI_XBP_JOB_HEADER_MODIFY
BAPI_XBP_JOB_JOBLOG_READ
BAPI_XBP_JOB_OPEN
BAPI_XBP_JOB_SPOOLLIST_READ_20
BAPI_XBP_JOB_START_ASAP
BAPI_XBP_JOB_STATUS_CHECK
RFC_TYPE
Type of RFC object to which access
FUNC (Function Module)



9.0 Content of the ZAVANTRA_AUTOMATION_USER role transport


Cross-application Authorization Objects
S_RFC
Authorization Check for RFC Access
ACTIVITY
Activity
16 (Execute)
RFC_NAME
Name (Whitelist) of RFC object to which access is allowed
BAPI_USER_ACTGROUPS_ASSIGN
BAPI_USER_CHANGE
BAPI_USER_CREATE1
BAPI_USER_DELETE
BAPI_USER_GET_DETAIL
BAPI_USER_LOCACTGROUPS_ASSIGN
BAPI_USER_LOCACTGROUPS_READ
BAPI_USER_LOCK
BAPI_USER_UNLOCK
RFC_TYPE
Type of RFC object to which access
FUNC (Function Module)




Basis: Administration  
S_USER_GRP
User Master Maintenance: User Group
ACTVT
Activity
03 (Display)
CLASS
User group in user master maintenance
*