Installation, Control Center and Configuration Guide
Installation, Control Center and Configuration Guide
Installation, Control Center and Configuration Guide
Copyright 2009 –2020 EPI-USE Systems Limited and its related entities, hereinafter EPI-USE.
The information in this document is confidential and subject to change without notice. The companies, names, and
data used in this document’s examples are fictitious unless otherwise noted. The data contained in this document is
for information purposes only, unless explicitly mentioned otherwise. National product specifications may vary. No
part of this document may be reproduced or transmitted in any form or by any means, whether electronic or
mechanical or for any purpose, without the express written permission of EPI-USE Systems Limited.
EPI-USE may have patents or pending patent applications, trademarks, copyrights, or other intellectual property
rights covering the subject matter in this document. The furnishing of this document does not give you any license to
these patents, trademarks, copyrights, or other intellectual property rights, except as expressly provided in a written
license agreement from EPI-USE. For a complete list of EPI-USE Labs’ products and trademarks, please consult
Copyright Information at www.epiuselabs.com.
All product names, trademarks, and registered trademarks are the property of their respective owners. All company,
product and service names used in this guide are for identification purposes only.
documentation@labs.epiuse.com
Document version B
27 February 2020
i
Contents
1. Getting started with Data Sync Manager ........................................................................................................................ 1
1.1 Introduction ................................................................................................................................................................... 1
1.2 What is the Control Center? ..................................................................................................................................... 1
1.3 Download and import the latest code library and Data Sync Manager 5 transport ........................... 2
1.4 Activate your product ................................................................................................................................................ 4
1.5 Name spaces .................................................................................................................................................................. 5
ii
4.4.4 Object Sync cleanup .............................................................................................................................. 42
4.4.5 Client Sync cleanup ................................................................................................................................ 43
4.4.6 File explorer............................................................................................................................................... 44
4.4.7 Clean up mapping table ....................................................................................................................... 45
4.4.8 Optimization program .......................................................................................................................... 46
4.4.9 HR cluster optimizer ............................................................................................................................... 47
4.4.10 Pre-calculate masked values ............................................................................................................... 48
4.4.11 Data Disclose index run ........................................................................................................................ 50
4.4.12 Object flow optimization...................................................................................................................... 51
4.4.13 Pre-system export optimization ........................................................................................................ 51
4.5 Masking ......................................................................................................................................................................... 52
4.5.1 Address database .................................................................................................................................... 52
4.5.2 Company database................................................................................................................................. 54
4.5.3 Person database ...................................................................................................................................... 55
4.6 Business Object maintenance ............................................................................................................................... 56
4.6.1 Mapping Editor ........................................................................................................................................ 56
4.6.2 Generate object classes ........................................................................................................................ 58
4.6.3 Generate Profiles and Groupings ...................................................................................................... 60
4.6.4 Maintain Semantic Tags........................................................................................................................ 61
4.7 Audit and security...................................................................................................................................................... 62
4.7.1 Group Management............................................................................................................................... 62
4.7.2 Object protection list ............................................................................................................................. 64
4.7.3 Object protection editor ....................................................................................................................... 65
4.7.4 SAP Authorizations for Objects .......................................................................................................... 67
4.7.5 User preferences...................................................................................................................................... 68
4.7.6 Sync Audit Report ................................................................................................................................... 70
4.8 Client Sync utilities .................................................................................................................................................... 71
4.8.1 Index enabler ............................................................................................................................................ 72
4.8.2 Index disabler ........................................................................................................................................... 72
4.8.3 Tables for which secondary indices can be dropped ................................................................. 73
4.8.4 Object key processing limits ............................................................................................................... 74
5. Troubleshooting ..................................................................................................................................................................... 76
iii
6.3.3 Videos .......................................................................................................................................................... 78
6.3.4 Forums ........................................................................................................................................................ 78
6.3.5 Contact us .................................................................................................................................................. 78
iv
DSM5 Installation, Control Center and Configuration Guide Getting started with Data Sync Manager
1.1 Introduction
Every company using SAP® needs to transfer data between clients and systems for production support and
development or to refresh training clients. However, without an adequate transfer solution, full client or
system copies can be time-consuming and use a lot of storage space. There is also the risk of exposing
sensitive data in less secure systems.
The Data Sync Manager™ 5 (DSM5) suite includes four complementary products: Object Sync™, Client
Sync™, Data Secure™ and System Builder™.
Object Sync allows you to select and transfer specific data objects, easily and accurately, as you need
them.
Client Sync provides a table-oriented approach to copying a subset of client data.
Data Secure provides in-place data masking and provides integrated masking for other DSM suite
products.
System Builder allows you to make complete repository copies easily, then add the client data as you
need it.
With Object Sync and Data Secure now working across systems automatically (for example, ERP and CRM),
there is much more complexity to these settings and something more powerful is required to control
them, hence the Control Center being introduced. It does, however, remain part of the Administration
screen in DSM5, with other settings and reports also available there. Unlike previous versions of DSM, the
Control Center settings are configured once in a ‘controller’ system client and distributed to all the defined
systems. This central management lessens the amount of manual effort to keep the configuration updated
and ensures the consistency of these settings between systems. It does, of course, require more DSM-
specific connectivity between the systems.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 1
DSM5 Installation, Control Center and Configuration Guide Getting started with Data Sync Manager
1.3 Download and import the latest code library and Data Sync
Manager 5 transport
All EPI-USE Labs products make use of a generic code library shared between products and distributed as a
separate Library 2 (Lib2) transport. Data Sync Manager requires the installation of this Lib2 transport as
well as the DSM5 transport, on every system that it should have access to.
1. Library 2
2. DSM5
The latest versions of the Lib2 and DSM5 transport releases can be found on the EPI-USE Labs Client
Central website. To download these from within Client Central, navigate to Workspaces > Data Sync
Manager > Downloads > Data Sync Manager 5:
DSM5 only supports NetWeaver 7 kernel systems and above. Kernel functionality that is essential to
DSM5 is not available on lower versions.
In the ‘Data Sync Manager 5’ folder, find and open the DSM sub-folder for the required SAP system type
(ERP, ECC, SRM, CRM, NW, etc.). Then, find and open the release sub-folder matching the release of the
system(s) that DSM will be installed on, e.g. for ECC6 with EhP5.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 2
DSM5 Installation, Control Center and Configuration Guide Getting started with Data Sync Manager
It is important to import the transports for your current SAP release. Please ensure that the Library
transport (see point 1 below) has been imported successfully before importing the DSM5 Build
transport.
To successfully import the necessary transports, import the client-independent transports in the order
specified below:
1. First, import the client-independent Library 2 Build x transport once into each system that you would
like to update.
2. Then, import the client-independent DSM5 Build x transport on any client on the system.
Please ensure that the following ‘Import Options’ are selected for both transports:
* This last additional Import Option may appear at the bottom of the list on systems with SAP NetWeaver
7.0 EhP2 or higher.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 3
DSM5 Installation, Control Center and Configuration Guide Getting started with Data Sync Manager
When you access DSM for the first time by entering /n/use/dsm, you will first be prompted to select the
version of DSM you will be using from the pop-up below:
Only clients that already have DSM4 licenses will be required to make this selection. New clients
starting on DSM5 will go automatically to the DSM5 Landing page.
Once you have selected ‘5’, your system will automatically try to load your transport and display this pop-
up:
A “Successfully activated” message will be displayed once the activation is complete. However, if you
receive the “We could not activate your product automatically” message, you’ll need to activate Data Sync
Manager manually.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 4
DSM5 Installation, Control Center and Configuration Guide Getting started with Data Sync Manager
If you require a new license file or experience any problems during activation, please log a ticket on Client
Central.
You assign objects to a namespace in the ABAP Workbench by placing the namespace prefix in front of the
object name. The namespace ID begins and ends with a delimiter (/) and can be up to 10 characters long.
EPI-USE Labs has registered the /use/ and /epiuse/ name spaces with SAP and does product development
and the addition of objects exclusively within these name spaces. The only exception to this is packages
and authorization classes for authorization objects. Since these cannot be shipped in /USE values, they are
provided as Z objects. The rest of the transport contains only /USE objects and contents.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 5
DSM5 Installation, Control Center and Configuration Guide Authorization template roles
For the Administration of the DSM5 product suite there are two Administrator roles and then two more
limited roles that can be used to distribute responsibilities for different parts of administration to different
users.
There are also template roles that can be used for the service users DSM5 uses to manage the Control
Center configuration distribution and the additional service users that are used to communicate between
systems when data is being copied or masked.
For more information regarding the role templates, options and configuration of the authorization
roles, please refer to the DSM5 Authorizations Guide.
To see the list of templates included in the transport execute transaction PFCG. Then access the ‘Utilities’
menu and select ‘Templates’ from the drop-down list. The DSM5 templates have a prefix of /USE/DM1_.
The DSM5 role templates can be adopted into an existing SAP user profile with the steps below in a Dev
system:
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 6
DSM5 Installation, Control Center and Configuration Guide Authorization template roles
9. Transport the role to all higher systems in the landscape and assign it to the user(s).
Data Sync Manager Administration includes an audit report ‘SAP Authorizations for Objects’ that lists
the SAP authorizations that are checked before search results for an EPI-USE Business Object can be
returned. This is discussed in more detail in Section 4.7.4 in this guide.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 7
DSM5 Installation, Control Center and Configuration Guide Control Center settings
When you try to execute any DSM transaction on a system where the Control Center has not yet been
configured, it will automatically launch the DSM Administration screen and inform you that you need to
complete the Control Center configuration for this system or distribute the configuration from the
Controller to this system.
To access DSM Administration you can either use the transaction /USE/DSM_ADMIN or use any of the
other DSM transactions e.g. /USE/DSM, navigate to the Administration launchpad and select
‘Administration’.
If you need additional information for any of the screens you are navigating in, you can select the
Documentation button or press Shift+F1. This will display information and guidelines that are
pertinent to the screen you are on at that moment.
An ‘Environment’ is a collection of clients in one or more applications that work together. For example, a
Production environment can consist of an ERP, BW and CRM systems.
To set up the configuration of all the systems and their clients in their respective application landscapes
we need a Controlling System (known as the Controller). The Control Center configuration will be done
once on this system and then distributed across the landscapes.
Typically, the Controller will be a specific client on the Production ERP system. This Controller serves as a
Control Center for all the connected systems. Therefore, users are required to connect systems to the
Controller.
Each system can only have one Controller. So for any sort of multi-tenant system, the clients on the
system have to be in the same Control Center group.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 8
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Right-click on ‘Control Center’ to Enable or Disable a system client as the Controller. This will then ask you
which RFC type you wish to use (see section 3.1.1 below).
For additional information and details relating to the Control Center RFC connections, please
consult the knowledge base article by that name.
The Controller distributes configuration to other systems. These systems are called Controlled Systems.
One client from each of these systems should be registered under the Control Center. These clients are
called Control Clients.
Object Sync and Client Sync source clients need to communicate with target clients. DSM5 includes cross-
application support. This allows sibling clients to communicate, for example, communication between the
QA ERP client 400 and the corresponding QA CRM client. The DSM Controller needs to communicate with
all of these systems to update the configuration. This communication is facilitated by RFC connections.
There are different naming conventions used for the four types of RFC connections used by the
Control Center. These RFCs will be created when the systems are registered or when the Control
Center (CC) configuration is distributed.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 9
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The Control Center (CC) and control (CTRL) destinations use the DSM_CONTROL User unless this is
changed with the profile parameter DSM/CC/CONTROL_USER (see section 3.1.2 for more details).
The communication (COMM) RFC uses the DSM_COMM<SID> user unless this is changed with the
profile parameter DSM/CC/TRANSFER_USER.
When you first enable a system as the Controller a pop-up appears asking whether it should use
Dynamic, Fixed or Manual RFCs. This will determine when and how the control and
communication connections are configured.
The Fixed, Dynamic and Manual RFC options are described below:
Dynamic RFCs. The Control Center and Control RFC connections are created when the
configuration in the Control Center is distributed. These RFC connections are retained.
COMM connections are only created as needed. When a COMM connection is needed, the
control connection auto-generates and sets the password for the DSM_COMM_<SID> user. The
COMM RFC is then created and used for the intended activity or function (for example, reading
data from linked systems for Object Sync).
After the activity is completed, the COMM RFC is deleted. A new COMM RFC with a new
password is created every time a communication connection is needed and user information is
encrypted before it is shared between systems.
From a technical security perspective, this is arguably the most secure option, but it does mean
there are automatically created and deleted RFC connections.
Fixed RFCs. Control Center, Control and Communication RFCs are generated and retained the
first time they are needed. Secure encrypted passwords are used for the communication user.
Manual RFCs. This provides a list of connection RFCs that should be created via SAP transaction
SM59 and the names populated inside the Control Center. This requires more configuration
effort but ensures no connections or users are created automatically by the Control Center
during configuration distribution. It is not recommended to use existing RFC connections but
rather ones specifically created for DSM5.
In Manual RFC mode, RFCs will not be generated on the controlled systems but instead a
lookup table (/USE/DC1_RFC_CFG) will be used to read the RFC mappings.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 10
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The default configuration creates these users as ‘service users’ with the profile SAP_ALL. Some
organizations may allow this and there will be existing service users with SAP_ALL, while for
other organizations this will not be permitted and a different profile should be used from one
of the template roles listed below. Please check with your Authorizations team before
continuing.
These settings are not distributed, so you must update them directly in each system before
distributing the Control Center configuration from the Controller and keep in mind that the
parameters in the /USE/USY2_PROFILE transaction do not influence the manual RFC mode.
DSM/CC/CONTROL_USER: The default value for this parameter is DSM_CONTROL. This user is
used by Control Center RFCs from the Control Center to the control client of each controlled
system. It is also used by Control RFCs between systems. The user is automatically created when
a system is connected in Dynamic or Fixed RFC modes. Automatic user creation can be
overwritten by setting the DSM/CC/CONTROL_USER_MANUAL_CREATION profile parameter.
Presently, this user will be assigned the SAP_ALL profile, which can be changed in
DSM/CC/CONTROL_USER_PROFILE parameter.
DSM/CC/TRANSFER_USER: The transfer user is automatically created and updated when the
Control Center configuration is distributed in Fixed RFC mode or when a Sync is performed in
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 11
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Dynamic RFC mode. The default for this parameter is DSM_COMM_<SID>. The <SID> allows
visibility of which system is making a call. The username prefix can be overwritten by setting the
profile parameter DSM/CC/TRANSER_USER, but the <SID> will still be added at the end. It is
therefore recommended to only use a maximum of eight (8) characters for these users. The
DSM_COMM_<SID> user is generated to facilitate communication between the source and
target systems as used by the Communication RFCs. For example, when ED1 reads data from
CD1, the DSM_COMM_ED1 user will be visible in CD1. A dedicated user should be used in this
case, because DSM5-encrypted passwords will be used, except in the case of Manual RFC mode.
The user used for communication (DSM_COMM_<SID>) is by default generated with SAP_ALL
unless the parameter noted above is changed. If you don't use SAP_ALL, the user must have
functional authorizations to display data on source systems (typically Production) and create
data on target systems. Without that, Object Sync will not find remote data in the preview step
and will not copy it.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 12
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The diagram below provides a high-level overview of a typical SAP landscape and its components.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 13
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The SAP System will be the system type chosen most often. Click on the ‘Continue’ button to
display the ‘Register SAP System’ dialog.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 14
DSM5 Installation, Control Center and Configuration Guide Control Center settings
This screen will be shown instead of the one above when creating a SAP system in manual RFC
mode:
A ‘Control User’ (as configured in the DSM/CC/CONTROL_USER profile parameter) will be created
automatically on this system by the Control Center. This user’s password will also be generated by
default (Use generated password option), although you do have the option to specify a password
. You need to use the ‘Specify password’ option if the manual user creation option is enabled
(parameter DSM/CC/CONTROL_USER_MANUAL_CREATION) on the system being registered.
When adding a system to the Control Center, you can either enter the system details or choose an
existing locally-defined RFC destination (visible from transaction SM59) connecting to the
Control Client on the system being registered The RFC provided here is only used to find the
system’s information will not be used by DSM5. DSM5 will create the Control Center and Control
RFC connections using this system information (see section 3.1.1).
When selected: DSM5 will create the ‘Control User’ on the remote system and assign the
SAP_ALL profile to the user and you have to explicitly select the option if you want DSM5 to
assign SAP_ALL.
When deselected: DSM5 will create the ‘Control User’ on the remote system and assign the
authorization profile as specified by the DSM/CC/CONTROL_USER_PROFILE profile parameter
requires configuration.
The profile specified in the parameter needs to be in line with the applicable authorizations and
policies in your organization.
The default option is deselected to avoid automatically assigning the SAP_ALL profile.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 15
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The buttons in the System registration toolbar are defined in the table below:
Please note that the ‘Warning’ icon ( ) is a notification that a System is disconnected.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 16
DSM5 Installation, Control Center and Configuration Guide Control Center settings
3.2.2 Applications
It is necessary to define and maintain all your applications with their corresponding SAP
application types. A typical landscape may include the following applications: ERP, HCM (ERP),
SRM, CRM, SCM, and BW. Default entries are provided for convenience. This comes pre-configured
so you can remove any or add new ones.
When creating a new application, specify a name and description that is appropriate for your
landscape and avoids confusion. Typical application names include ERP, HCM, FI, SRM, CRM and so
forth. For each application, set the application type to the appropriate SAP application or other
applications such as SAP ERP, SAP SRM, SAP CRM, External Systems (SAP SuccessFactors), etc.
Keep in mind that more than one Application can belong to the same Application type. For
example, Application ERP and HCM are both of Application type ‘SAP Enterprise Resource
Planning’.
Also remember that S/4 HANA has its own application type and should be used instead of ERP if
the system is S/4.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 17
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Find / Find next Allows you to search for a specific application in the
list.
3.2.3 Environments
An environment is a collection of clients in one or more applications that work together. Typically,
a landscape would include at least the following environments: Development, Quality Assurance,
Production.
For example, EDV-100 (ERP Development Client 100) and SDV-100 (SRM Development
Client 100) form part of the same environment.
Default entries are provided for convenience. Delete any entries that you do not need or create any
new environment.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 18
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The toolbar used here has the same functions as those described in the previous section for
‘Applications’. For more information, please refer to the table in section 3.2.2.
For additional information and details relating to the Control Center RFC connections, please
consult the knowledge base article by that name.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 19
DSM5 Installation, Control Center and Configuration Guide Control Center settings
In this step, you essentially map out the landscape where DSM5 will be used, client by client. To
assign a client to an Environment, click on the ‘Create ‘ button and select the System and Client
you want to assign from the drop-down lists. If the client that you want to assign does not appear
in the list, select ‘New’ and specify the client ID.
Although the Data Disclose client registration is discussed in detail in section 3.2.7 below, you
need to ensure that the system and client assignment is properly configured to avoid any
problems that may arise when executing a Data Disclose Installation. For more details and
information in this regard, please refer to the Data Disclose Installation Guide.
Update the Description, Environment and Application as required. The Control Center will
automatically populate the Application based on the selected System, but this may need to be
updated for non-SAP systems.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 20
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Allow scenario: When selected, this permits the use of the Object Sync Scenario copy
functionality into this target client. Typically, this is set on clients that are regularly refreshed
with Client Sync. This option and implications should be discussed with functional super users
of Object Sync before enabled. Most customers will not need to set this option for clients.
Allow inplace masking: This determines whether in-place Data Secure Object or Client
masking should be allowed on this client.
Assignments:
You need to specify Logical Systems, URLs and RFC destinations for each client if these
need to be converted in Client Sync runs.
The logical system for an existing system client will be automatically assigned with
‘MANDT’ in the ‘Alias’ field. The ‘MANDT’ logical system should match the logical system
associated with the client in Transaction SCC4. For example, if you are setting up C3R 800,
it should match SCC4 in C3R.
The toolbar used here has the same functions as those described in the ‘System registration’
section. For more information, please refer to the table in section 3.2.1.
To streamline your process, give each shared folder a logical name. This logical Path name e.g.
SHARE FOLDER in the screenshot will be used for the Control Center configuration. For each shared
folder, assign the physical paths that correspond to the logical shared folder name on each server.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 21
DSM5 Installation, Control Center and Configuration Guide Control Center settings
A logical path is a logical name that identifies a permissible directory within DSM and has one
or more physical paths assigned to it. For optimal use, it is recommended to use the same
logical Path name for all systems in a specific Environment.
The toolbar used here has the same functions as those described in the ‘System registration’
section. For more information, please refer to the table in section 3.2.1.
3.2.6 Routes
Routes specify the path that DSM data transfers between system clients can follow. In the Routes
screen, we have much more granular detail on where and how the different DSM products can
send or receive data. For Object Sync there is the choice between ‘Standalone’ and ‘Distributed’
routes, determining whether partner systems will be included. The Access button allows you to
assign users or user groups access to the routes.
When creating a new route, specify the Route ID and Description, select the relevant DSM product
for which the route is intended and choose the ‘Sync type’ and ‘Transfer type’. Depending on the
‘Transfer type’ selected, the Route source and target parameters will differ.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 22
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Sync types:
Standalone routes are used to move data from one client to another client. For example, from
EQA-100 (ERP Quality Assurance client 100) to EDV-100 (ERP Development client 100). For a
standalone route:
an RFC Sync can be performed from the specified source client to the specified target client.
a file export Sync can be performed from the specified source client to the specified shared
folder.
a file import Sync can be performed into the specified target client from the specified shared
folder.
Take note that the file export and import would each need a defined route.
Distributed routes are used to move data from one environment to another environment using
DSM Object Sync. For example, it allows you to move all related data from the clients included in
the Quality Assurance environment to the clients included in the Development environment. For a
distributed route:
an RFC Sync can be performed from the specified source environment to the specified target
environment. An RFC Sync can be started from any of the source environment systems.
a file export Sync can be performed from the specified source environment to the specified
shared folder. A file export can be started from any of the source environment systems where
the shared folder is also available.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 23
DSM5 Installation, Control Center and Configuration Guide Control Center settings
a file import Sync can be performed into the specified target environment from the specified
shared folder. A file import can be started from any of the target environment systems where
the shared folder is also available.
Data exported with a Standalone Route cannot be imported with a Distributed Route and vice-
versa.
The toolbar used here has the same functions as those described in the ‘System registration’
section. For more information, please refer to the table in section 3.2.1.
There is however an additional icon in the toolbar, namely the button. The purpose of
this button is to maintain access for a specific user or specific group of users to a route.
When you define a new route, the route is not accessible to all users automatically. You need to
define the Users and/or Groups that should have access to the Route.
The relevant Groups are defined in the ‘Administration’ space in the User Groups utility and you
need to ensure that the Users and Groups exist on the relevant system clients.
All system clients that should be searched by Data Disclose or used for reporting or redaction by
Data Disclose or Data Redact need to be registered here. The Reporting option (Allow reporting)
should only be enabled for one of the clients. It allows the Data Disclose/Data Redact SAP GUI or
Fiori app to be executed on this system client. If the Fiori apps are used, this should only be
allowed on a system that has the OData transport applied. Discovery (Allow Discovery) means
that the client provides responses to information requests from the reporting system/client.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 24
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The toolbar used here has the same functions as those described in the ‘System registration’
section. For more information, please refer to the table in section 3.2.1.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 25
DSM5 Installation, Control Center and Configuration Guide Control Center settings
The toolbar used here has the same functions as those described in the ‘System registration’
section except for the ‘Display’ feature. For more information, please refer to the table in
section 3.2.1.
If errors occur in the manual RFC mode (“Manual RFC destination not specified, please specify
manual RFC”), the user should first go to the RFC Destinations tab to see which RFCs should be
set up, as shown below:
Status Description
Config up to date.
The earlier entries in the Control Center are all distributed between systems but after distribution,
this entry must be maintained on every system including but not limited to the Controller itself.
The Control Center depicts six (6) different types of RFC destinations when in Manual mode:
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 26
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Transfer: Connection used for data transfer between source and target clients.
Partner: Connection between related clients within an environment (e.g. between ERP and
CRM/SRM environments).
Data Disclose discovery: Connection used by the Data Privacy Suite to perform cross-system
data discovery and redaction.
Control: Connection between the source system and control client of each controlled system.
Control Center: Connection between the controlling system and the control clients of other
systems.
After the configuration has been distributed, any RFCs that are now required to be created will be
marked as <Please specify a destination>.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 27
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Double-click on an entry or highlight it and click on the Change button in order to enter the RFC
and then Save.
The ID and client indicate for which system and client the connection is for.
Please note that in this example we must now do the same on the remote system CD2 as well.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 28
DSM5 Installation, Control Center and Configuration Guide Control Center settings
Once all the required destinations are entered in a system you can then ‘Distribute’ it again to see
that the configuration is complete.
For additional information and details relating to the Control Center RFC connections, please
consult the knowledge base article by that name.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 29
DSM5 Installation, Control Center and Configuration Guide Administration features
4. Administration features
In addition to the Control Center, there are a number of Administration features and settings that you can
use to configure and manage DSM5 according to your requirements. These programs and settings are
specific to the system and/or client where it is executed and the configuration is not distributed by the
Control Center.
To assist users in the configuration of their Administration screen features relating to whether the
configuration is required, optional or suggested, an appendix has been provided at the end of this
document. The appendix expands on the relationship between the individual utilities and to which
products they are applicable. It also looks at whether these utilities are client- or system-specific.
Partner systems manage the application data related to the system you’re currently working on, allowing
you to query and update this application data via a protocol called OData.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 30
DSM5 Installation, Control Center and Configuration Guide Administration features
For example, if you have HR data on both your SuccessFactors system and ERP systems that you
want to move to a target environment, you need to identify the SuccessFactors system as a partner
system by creating an OData identity.
Changes should only be made after careful consideration and preferably only once you have consulted
with EPI-USE Labs. Please see the Client Sync or System Builder User guides for more information on these
settings.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 31
DSM5 Installation, Control Center and Configuration Guide Administration features
Find / Find next Allows you to search for a specific Exception in the
list by entering a search string. DSM will match this
search string with text in the Table, Grouping
columns, etc.
Add Table Click on the ‘Add Table’ button to add a new entry
into the list.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 32
DSM5 Installation, Control Center and Configuration Guide Administration features
Exclude from The table will not be selected on the source client, and no
Syncs changes will be made to the table on the target client.
Delete table The table will not be selected on the source client, but its
data contents will be deleted on the target client.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 33
DSM5 Installation, Control Center and Configuration Guide Administration features
The toolbar used here has the same functions as those described in the previous section for ‘Client
Sync grouping exceptions’. For more information, please refer to the table in section 4.2.1.
For more information regarding the meaning and purpose of enterprise slicing, you can refer to
the DSM5 Client Sync User Guide found in the DSM > Downloads > Data Sync Manager 5
Documentation > English space on Client Central.
The information can be found in section 3.2.3.a. (Application data) in the ‘Create Sync’ section
of the guide.
The toolbar used here has the same functions as those described in the previous section for ‘Client
Sync grouping exceptions’, with one additional button. For more information on the toolbar
functions, please refer to the table in section 4.2.1.
The additional button mentioned above is the ‘Change’ button . By clicking on the
‘Change’ button, you will be able to edit the exception for the selected table.
For more information on the functions and benefits of the System Builder product, please refer
to the DSM5 System Builder User Guide that can be found in the DSM > Downloads > Data Sync
Manager 5 Documentation > English space on Client Central.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 34
DSM5 Installation, Control Center and Configuration Guide Administration features
The Business Object may not allow some options in exceptional cases.
These options are client-independent and therefore apply to all clients on the system.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 35
DSM5 Installation, Control Center and Configuration Guide Administration features
Please note that the settings adopted for the Master Data tab in the screen above remain the
same for the ‘Transactional Data’ and that only the exceptions will vary according to your
requirements.
Also, note that the button will save any changes you make to the Exceptions in the
behavior options on this screen. The button will revert any changes you
made to the available options and exceptions to the delivered defaults.
By default, DSM will ‘Keep Original Number’ for Business Objects. However, keeping the same
number is not possible if the target number range interval is ‘internal’ and the source object
number is greater than the current target internal ‘number range’ pointer. This problem can
be overcome by ensuring that the Target client's internal ‘number range’ pointer for the
interval is large enough.
This can be achieved by manually adjusting the internal number range pointer for the
applicable number range intervals. The ‘Number Range Maintenance’ utility under the
Administration functions can be used to assist with this.
Alternatively, DSM can automatically adjust the number range pointer during Syncs so that all
Business Object numbers in the Sync are smaller than the internal number range pointer. To
enable this functionality, select the ‘Adjust Number Range Pointer’ option. This is the default
configuration option.
The second option is to have the Sync of the Object Sync ‘Fail with Error Message’. If this
option is set, DSM will by default not insert the Business Object on the target client and give
an error message indicating a problem with the number range.
DSM provides an alternative to ‘Keep the original number’, which adheres to the standard SAP
behavior. If the relevant number range interval on the Target system is set to ‘internal’, a new
number will be assigned based on the number range configuration. If the Target system's
number range interval is set to ‘external’, the source number will be used on the target client.
This option is less frequently chosen by customers because the test data is not obviously the
same as the original on the source system and can, therefore, be harder to test with.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 36
DSM5 Installation, Control Center and Configuration Guide Administration features
By default DSM allows the user to decide how new numbers will be assigned to the cloned
Business Objects in an OS Sync. There are two options to choose from: ‘Start at user-specified
number’ and ‘Automatically generate new number’. The Administrator can limit the number
assignment method choice to one of these options only or leave it up to the user to specify for
each Sync.
d. Exceptions
The buttons in this toolbar are defined in the table below:
This list allows exceptions to be made for specific Business Objects. For example, you may
wish to use the default behavior for everything except EMPLOYEE. You can then add the
EMPLOYEE object as an exception and specify different options that should be used for this
object specifically instead of the global Default behaviors. Remember to add the exceptions
on both source and target systems.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 37
DSM5 Installation, Control Center and Configuration Guide Administration features
The following functions are available when configuring and maintaining a number range:
In the ‘Selection options’ block, you have the option to indicate for which Business Objects this
utility should be run. By using the ‘Additional Settings’ button, you can further include
and manage values and ranges.
By clicking on the ‘Remote System’ button, you can select the remote client with which the
number range comparison should be done. Once you have clicked on this button you will be
presented with the ‘Destination value help’ pop-up window where you can select the remote
system and client from the list of RFC destinations (you can only use DSM-registered RFC
destinations with this utility).
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 38
DSM5 Installation, Control Center and Configuration Guide Administration features
Once all the configuration and/or maintenance is done, click on the ‘Execute’ button to
execute the report.
From this screen, you can see exactly which number range intervals have errors (i.e. those that
have different customizing) and those that do not. You can click on the ‘Alter Pointer’ button to
move the pointer or change the interval from internal to external (this function can only be used
for intervals that are internal and do not contain any errors). Number range intervals on production
clients may not be altered.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 39
DSM5 Installation, Control Center and Configuration Guide Administration features
Regarding the Business Object selection, you have the option to indicate for which Business
Objects this report should run. If you select the checkbox 'Consider empty tables', the report will
also include tables that are currently empty in the recommendation.
In the ‘Selection options’ block, you have the option to indicate for which Business Objects this
utility should be run. By using the ‘Additional Settings’ button, you can further include and
manage values and ranges.
To start the ‘Recommended Index Check’ report, click on the ‘Execute’ button.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 40
DSM5 Installation, Control Center and Configuration Guide Administration features
Regarding the Business Object selection, you have the option to indicate for which Business
Objects this report should run. If you select the checkbox 'Only show missing indexes', the report
will only show those indexes that do not match the indicated Business Object values or ranges.
In the ‘Selection options’ block, you have the option to indicate for which Business Objects this
utility should be run. By using the ‘Additional Settings’ button, you can further include and
manage values and ranges.
To start the ‘Recommended Index Check’ report, click on the ‘Execute’ button.
Database and Runtime object checks available in transaction SE11 under the ‘Utilities’ menu.
Attempt to select a single record as a sanity check.
The ‘Job Log’ will list any tables that have inconsistent Database objects, Runtime objects or where
the single select failed.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 41
DSM5 Installation, Control Center and Configuration Guide Administration features
: This option allows you to execute this utility immediately in the foreground.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 42
DSM5 Installation, Control Center and Configuration Guide Administration features
When a user marks a Sync for deletion it is removed from their Monitor Desk but can still be
seen by the Administrator.
In the ‘Selection options, you can also specify whether the related Object Sync files (generated
during a File Export Sync) should be deleted according to the filter options and settings available
in the checkboxes. By using the ‘Additional Settings’ button, you can further include and
manage values and ranges.
The ‘Job Log’ or foreground pop-up will list all the activities relating to the cleaning up of Object
Syncs that have been carried out. When run in the foreground the logs will not be visible in the
future, only at the time of execution.
For more information on the utility functions and buttons available on this screen, you can refer to
the table and the ‘Infobox’ in the previous section, section 4.4.3.
In the ‘Selection options, you can also specify whether the related Client Sync files (generated
during a File Export Sync) should be deleted according to the filter options and settings available
in the checkboxes. By using the ‘Additional Settings’ button, you can further include and
manage values and ranges.
The ‘Job Log’ or foreground pop-up will list all the activities relating to the cleaning up of Client
Syncs that have been carried out. When run in the foreground the logs will not be visible in the
future, only at the time of execution.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 43
DSM5 Installation, Control Center and Configuration Guide Administration features
For more information on the utility functions and buttons available on this screen, you can refer to
the table and the ‘Infobox’ in section 4.4.3.
In your ‘Selection options’, you have the option to indicate which DSM directory the cleanup utility
should run for.
Currently, the Path name has only one option, namely the ‘SHARE’ option.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 44
DSM5 Installation, Control Center and Configuration Guide Administration features
Find / Find Allows you to search for a specific system in the list.
next
In your ‘Selection options’, you have the option to select specific Business Objects in order to
remove their inconsistent key mappings. By using the ‘Additional Settings’ button, you can
further include and manage values and ranges.
The ‘Job Log’ will list all the activities relating to the cleaning up of the Mapping table that have
been carried out. The starting date and time can be defined by the user and other filters can be set
in place to generate more specific information, as is required.
This will only find inconsistent mapping values where data has been removed from a client, for
example, mappings for Employee keys that have since been deleted in the client.
For more information on the utility functions and buttons available on this screen, you can refer to
the table and the ‘Infobox’ in section 4.4.3.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 45
DSM5 Installation, Control Center and Configuration Guide Administration features
In the ‘Selection options’, you can select specific Business Objects to optimize or leave blank to
optimize all Business Objects. The checkbox 'Evaluate delta changes only' is set by default and this
option will only re-evaluate tables that were empty with the previous run, meaning that
subsequent optimization runs will require less runtime.
The ‘Job Log’ will list all the activities relating to the performance improvement of Syncs by means
of the Optimization programs that have been carried out. The starting date and time can be
defined by the user and other filters can be set in place to generate more specific information, as is
required.
Object Sync will automatically run the optimization if the objects in scope have not been
optimized in the previous week but scheduling it ahead of time makes the run quicker. For Client
Sync it is essential for it to have run recently so having it run weekly is highly recommended.
For more information on the utility functions and buttons available on this screen, you can refer to
the table and the ‘Infobox’ in section 4.4.3.
This utility automatically runs per Source and Target client configured for the product, every
seven days if it is scheduled.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 46
DSM5 Installation, Control Center and Configuration Guide Administration features
In the ‘Selection options’, you can set the maximum number of days per run to be evaluated. In the
example above, all records changes in the last 60 days will be evaluated.
The ‘Job Log’ will list all the activities relating to the specific HR-cluster activities necessary for
optimization that have been carried out.
For more information on the utility functions and buttons available on this screen, you can refer to
the table and the ‘Infobox’ in section 4.4.3.
Please note that this report should be scheduled to run once per day.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 47
DSM5 Installation, Control Center and Configuration Guide Administration features
To execute a calculation run, click on the Policy and then ‘Create run’.
In the pop-up, you can assign processes for the calculation run in each system/client in the
environment, with a tab to make the selections on each one.
You can then choose to add Notifications if you wish to know when the run has Started, Finished, is
Cancelled or if you want status updates on it.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 48
DSM5 Installation, Control Center and Configuration Guide Administration features
And finally, add the execution options for when it should run:
The buttons in this toolbar and the icons in the table are defined:
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 49
DSM5 Installation, Control Center and Configuration Guide Administration features
Sensitive values won't be duplicated. Indexing occurs according to the configuration set up in
'Data Disclose client registration' (under 'Control Center') and indexing runs can only be
executed from systems and clients that have 'Allow reporting' enabled.
For more information on the utility functions and icons available on this screen, you can refer to
the ‘Infobox’ in the previous section, section 4.4.10.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 50
DSM5 Installation, Control Center and Configuration Guide Administration features
Select the checkbox 'Persists results' if you want to save the results of this analysis. Deselecting the
checkbox will result in a report only.
The list box 'Trace level' can be used to define the level of detail to be provided in the analysis
report.
The runtime for this utility will vary according to system performance. A typical runtime of at least
30 minutes should be expected if the system contains version control information, on Production
systems the runtime can be as low as one or two minutes.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 51
DSM5 Installation, Control Center and Configuration Guide Administration features
The ‘Job Log’ will list all the activities relating to the pre-system optimization that have taken place
before it is exported.
For more information on the utility functions and buttons available on this screen, you can refer to
the table and the ‘Infobox’ in section 4.4.3.
4.5 Masking
This section enables you to configure the settings that will be applied when making use of the Masking’
options in Data Secure and now working across systems automatically and embedded into Object Sync
and Client Sync. This is necessary because of the greater complexity of these settings and the additional
power it provides to users.
Data Sync Manager delivers a database of default address values that are used by the address-
scrambling logic to randomly create gender and country-specific addresses. These values are
recombined to form an address that passes input checks but does not truly exist and does not
match the original address. The Rules in Data Secure determine how these name and address
values are utilized.
Individual configurations for the Address database can be adapted for each of the following:
Street names
City names
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 52
DSM5 Installation, Control Center and Configuration Guide Administration features
Regions
Postal codes
Each option comes with pre-delivered values that can be added to or replaced completely. The
export/import capability makes this much quicker.
A customer-specified address may be added, removed, exported to and imported from a comma-
delimited file, reloaded from the database and sorted.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 53
DSM5 Installation, Control Center and Configuration Guide Administration features
Select All Allows you to select the entire list with one action.
Postal codes may be altered fully, partially, or not at all, depending on the effect the alteration
will have on tax and other calculations. You can specify country-specific postal-code settings in
the 'Postal codes' tab.
Company names
Company industries
Company suffixes
Masking rules that use random values for companies will randomly select from the name, industry
and suffix list for the country the data is assigned to.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 54
DSM5 Installation, Control Center and Configuration Guide Administration features
As with the Address database the delivered content can be deactivated, downloaded, modified
and uploaded back in.
For more information on the utility functions and buttons available on this screen, you can refer to
the table in section 4.5.1.
Adapting these delivered values could be used to increase or decrease variety (e.g. a single
name per type per country that all records get) or to ensure non-realistic names such as days of
the week or months of the year.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 55
DSM5 Installation, Control Center and Configuration Guide Administration features
You need to select the Master Data Business Object in the object tree, and then you can specify the
values of the source system, client and object key that you wish to manipulate. If none is specified,
all the existing mapping records for the selected Business Object will be listed.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 56
DSM5 Installation, Control Center and Configuration Guide Administration features
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 57
DSM5 Installation, Control Center and Configuration Guide Administration features
This utility will only be used by EPI-USE Labs Support in an effort to resolve a problem.
The Business Object Selection options are twofold when generating object classes:
: This option allows you to execute this utility immediately in the foreground. An
Object Class Generation Trace is displayed when run in the foreground.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 58
DSM5 Installation, Control Center and Configuration Guide Administration features
In the ‘Selection options’ block, you have the option to indicate for which Business Objects this
utility should be run. By using the ‘Additional Settings’ button, you can further include and
manage values and ranges.
By selecting the ‘Execute on remote system’ checkbox, you can select the remote client with which
the connection should be made for generating the object classes remotely. Once you have clicked
on this button, you will be presented with the ‘Destination value help’ pop-up window where you
can select the remote system and client from the list of RFC destinations (you can only use DSM5-
registered RFC destinations with this utility).
The buttons in this screen’s toolbar are defined in the table below:
The ‘Job Log’ will list all the activities relating to the generation of Object classes that have
occurred. You can set various filters to define more specific information, as is required.
For more information on the Execution options available on this screen, you can refer to the
‘Infobox’ in section 4.6.1.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 59
DSM5 Installation, Control Center and Configuration Guide Administration features
You should always run this generation without specifying any selection for a consistent result.
Profile: Select which Client Sync Profiles this utility should be run for.
Grouping: Select which Client Sync Grouping this utility should be run for.
In your ‘Selection options’, you have the option to select specific Profiles or Groupings and by
using the ‘Additional Settings’ button, you can further include and manage values and
ranges.
Job Overview To display the ‘Job Overview’ and the ‘Job Log’.
The ‘Job Log’ will list all the activities relating to the generation of Profiles and Groupings that have
occurred. You can set various filters to define more specific information, as is required.
For more information on the Execution options available on this screen, you can refer to the
‘Infobox’ in section 4.6.2.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 60
DSM5 Installation, Control Center and Configuration Guide Administration features
Tags can also be created with the content they are linked to in Data Secure.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 61
DSM5 Installation, Control Center and Configuration Guide Administration features
Select All Allows you to select the entire list with one action.
The EVERYONE group is all users with DSM access and the $ADMIN group is all users with the
following authorization pattern:
Object - /USE/DM1MT
ID – /USE/DM1MT = ‘M13’
ID – ACTVT = ‘02’
Other groups can be created and then users assigned to those Groups or sub-groups assigned to
the group.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 62
DSM5 Installation, Control Center and Configuration Guide Administration features
The buttons in the ‘User groups’ toolbar are defined in the table below:
Change Allows you to select User group and change or edit the
Group detail in the pop-up window shown below:
Display Shows the Policies, Templates and Routes the group has
effective access access to.
The buttons in the ‘User’ window are defined in the table below:
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 63
DSM5 Installation, Control Center and Configuration Guide Administration features
Add single user Allows you to add a single user to the list or obtain
selection options for lists or ranges of users.
Delete row Allows you to remove a single user from the list.
Display effective Shows the Policies, Templates and Routes the group
access has access to.
The ‘Access’ buttons are a very useful way to see from here which Policies, Templates and
Routes a Group or an individual User has access to.
In the ‘Selection options’ block, you have the option to indicate for which Business Objects this
utility should be run. By using the ‘Additional Settings’ button, you can further include and
manage values and ranges.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 64
DSM5 Installation, Control Center and Configuration Guide Administration features
By selecting the ‘Execute on remote system’ checkbox, you can specify specific business objects to
retrieve the protection list for. Once you have clicked on this button you will be presented with the
‘Destination value help’ pop-up window where you can select the remote system and client from
the list of RFC destinations (you can only use DSM registered RFC destinations with this utility).
Main Object Selection Tree: Double-click on the Business Object that you wish to protect or
select the Business Object and click on the ‘Edit’ button.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 65
DSM5 Installation, Control Center and Configuration Guide Administration features
Select Options pop-up screen: Select the instances that you wish to protect.
Object Protection ALV Grid screen: You are then presented with a list of object instances in an
ALV grid, from which you can select specific instances that you wish to protect. Either click the
lock/unlock icon in the Status column or select a row and click on the ‘Protect’ or ‘Unprotect’
buttons in the grid toolbar. The protection of these instances can be enabled and disabled from
this screen. All the selected objects will appear in the list and can be individually protected or
unprotected.
Administrators have the additional option to remove protection from all the listed object instances
for a specified type using the Clear Protection menu option in the ‘Action’ menu.
Once an object instance is protected, only the user that protected it or an Administrator/Super-
User can unprotect it. Administrators can also use the 'Clear Protection' menu option under
'Administration' to remove protection for all object instances of a specified type.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 66
DSM5 Installation, Control Center and Configuration Guide Administration features
In the ‘Selection options’ block, you have the option to indicate for which Business Objects this
utility should be run. By using the ‘Additional Settings’ button, you can further include and
manage values and ranges.
To get the Authorization Details, select the ‘Execute’ button to start the report. The
result will be displayed in an HTML output that can be printed or alternatively downloaded to file
using the relevant toolbar (Print) or (Download to file) buttons.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 67
DSM5 Installation, Control Center and Configuration Guide Administration features
To select a ‘User Name’, click on the ‘Select User’ button to display the ‘Username value help’ pop-
up screen.
Click on the F4 pop-up button to select a ‘User Name’ from the list of SAP users. Make a selection
and click on the ‘OK’ button to display the name of the user in the ‘Username value help’ pop-up
screen. When you click on ‘Continue’ again, you will generate the Transaction Display.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 68
DSM5 Installation, Control Center and Configuration Guide Administration features
In the ‘Main Object Selection’ block, you will see the Business Objects and Integration Objects that
are displayed on the DSM Business Object Hierarchy Tree. These can be viewed according to
various filters:
In the ‘File Import View’, you can view the imported Syncs may be listed according to four types of
filters:
List by Date: Import Syncs are listed according to the creation date.
List by Source: Import Syncs are listed according to the Source system where the Sync was
created.
List by User: Import Syncs are listed according to the User who created the Sync.
List by Main Object: Import Syncs are listed according to the main object.
List by Date: Import Syncs are listed according to the creation date.
List by Source: Import Syncs are listed according to the Source system where the Sync was
created.
List by User: Import Syncs are listed according to the User who created the Sync.
The DSM Product block allows you to set the default version of DSM or choose between version 4
and version 5 each time DSM is opened. This will only appear on systems that also have DSM4
loaded.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 69
DSM5 Installation, Control Center and Configuration Guide Administration features
The ‘List Output Limit’ function sets the upper limit for the number of items that may be displayed
per User. In the example displayed, the limit is set to 200 items. This will, for example, affect the
number of Business Object instances on the Preview screen or in the Monitor Desk statistics.
Select or deselect this checkbox to show or hide the ‘List Output Limit’ pop-up screen that is
displayed prior to the Preview Screen. If this checkbox is not selected, a warning is displayed when
the output is limited.
The last tab on this screen is the ‘Limits’ tab, which allows you to set your Sync limits.
Limit Objects: Limit the maximum number of Business Objects allowed within a single Sync.
The default is unlimited.
Limit Parallel Processing: Limit the maximum number of usable parallel processes while
executing a Sync. The default is unlimited.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 70
DSM5 Installation, Control Center and Configuration Guide Administration features
The Selection Options allow you to specify the Sync Number, Business Object definition, Business
Object Instance, SAP ‘User Name’, and Sync Period. Once you have identified a Business Object,
you will also have the option to add, remove or clear Instance Keys for that object by clicking on
the button.
In your ‘Selection options’, you also have the option to use the ‘Additional Settings’ button,
to further include and manage values and ranges.
The Output Options allows you to choose meaningful fields to be displayed in the report.
: This option allows you to execute this utility immediately in the foreground.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 71
DSM5 Installation, Control Center and Configuration Guide Administration features
The buttons available for use in the ‘Job Log’ window are as follows:
Job Overview To display the ‘Job Overview’ and the ‘Job Log’.
The status displayed in the screenshot above indicates that the job is finished.
Please be aware that deleting an index will affect all clients in that system and can also seriously
affect performance in other clients.
For the uses of the buttons available in the ‘Job Log’ window, refer to the relevant table in section
4.8.1. above.
The status displayed in the screenshot above indicates that the job is finished.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 72
DSM5 Installation, Control Center and Configuration Guide Administration features
Remember to save the tables that you have created so as to not lose them, even if you’re just
navigating between screens.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 73
DSM5 Installation, Control Center and Configuration Guide Administration features
The Object key processing limit settings are used to control the number of keys that are processed
by Client Sync at a time in relation to transactional objects. The data is stored in the table
/USE/CS1_OBJKYL. The fields available are the following:
Business Object Definition Name: Name of the object you wish to control. This object needs
to be transactional either by default or by using the /USE/CS1_TOBJ table.
SELECT_LIMIT: The maximum number of keys that Client Sync can select from the 'Check' table
of the object at a time for processing.
PROCESS_LIMIT: The maximum number of keys that Client Sync can process at once when
selecting data on tables related to the 'Check' table of the object.
a. Example of usage
Scenario:
Some customers run into inconsistencies for material ledger data due to data being created
while the sync export is being run. The data for material ledgers is stored in the object
ES_MATPLANT, which is a master data object. The inconsistencies are caused when data is
read from one ledger table and by the time the table is extracted and moves onto the next
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 74
DSM5 Installation, Control Center and Configuration Guide Administration features
ledger table, there have been updates. This means that data relating to a transaction is in one
table but not in another. To try to minimize the inconsistencies we set the object
ES_MATPLANT to transactional using the /USE/CS1_TOBJ table. Now that the object is
transactional, we can use the /USE/CS1_OBJKYL table. The following entry is made:
OBJECT: ES_MATPLANT
SELECT_LIMIT: 5
PROCESS_LIMIT: 1
Impact:
SELECT_LIMIT: As the object is now transactional, the relating keys are selected from the
table MARC which is the 'Check' table of the object ES_MATPLANT, 5 at a time as that is the
limit that has been set.
PROCESS_LIMIT: Now that Client Sync has the keys from the 'Check' table of the object, it
can now go through all the other tables in the object and select the related data. This is
done using 1 key at a time as the setting change indicates.
Effect:
As Client sync is processing so few keys at a time, the time between the select on one table
and another related table is minimal, meaning the data in the tables at the time of selection is
more likely to be consistent.
As a possible side effect of the above changes, it may be that the performance of the Sync is
negatively impacted. To ensure the best balance between performance and consistency
testing may be needed with different settings.
Remember to save the tables that you have created so as to not lose them, even if you’re just
navigating between screens.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 75
DSM5 Installation, Control Center and Configuration Guide Troubleshooting
5. Troubleshooting
In the course of your installation and specifically the setting up of your Control Center, you might
encounter some problems. Here are some tips on how to deal with possible issues:
If you have issues with the Control Center and connections you may want to strip the configuration
down and delete RFCs before building it up again while checking settings such as the ‘Logon’ groups in
your connections.
If you keep being prompted to log on, check the RFCs in Transaction SM59 and use the Utilities ->
Authorization test.
Check the output logs where an icon shows as yellow or red. There may be additional information in
the log that helps explain what the issue is.
Registering systems after a System Copy. The Control Center encrypts the information that it uses to
communicate between systems. If a system is copied from another system using traditional system
copy, the private key it stores will still match the old system ID, not the new one. This will cause system
registration to fail in the Control Center. Go to the copied system and execute the program
/USE/DC1_REGENERATE_PRIVATEKEY in the background. Once this job has completed (it may take 5
minutes), the system can then be registered.
Look in the Knowledge Base articles in the DSM Workspace of Client Central for any error message or
description of the situation you are encountering. If that doesn’t resolve the issue, log a ticket via Client
Central. See section 6.2 below on how to do that.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 76
DSM5 Installation, Control Center and Configuration Guide Accessing support through Client Central
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 77
DSM5 Installation, Control Center and Configuration Guide Accessing support through Client Central
To find out which version of DSM you are running, click About > About on the menu bar.
Under ‘Description’, provide a short but detailed description of the problem, including screenshots and
the error message or unusual output that you received.
Exporting and attaching a diagnostic log (DL) to your ticket will save time and help the Support team
assist you. Please create a zipped folder if you would like to attach multiple files.
3. Click ‘Submit’.
The system will issue you a ticket number and send you an email acknowledging the ticket, and an EPI-USE
Labs support representative will begin to assist you. You can view the status of your tickets on Client
Central’s homepage under ‘Tickets’.
6.3.1 Guides
View and download various DSM5 installation, configuration and user guides in the DSM5
Documentation folder.
6.3.3 Videos
Browse the DSM video library for product overviews, demonstrations and tutorials.
6.3.4 Forums
Visit the forums to ask questions to or share your expertise with other members of Client Central’s
online community.
6.3.5 Contact us
You are welcome to send us comments and suggestions regarding our products, documents,
services and support via:
the Client Central support portal (for existing customers only) or support@labs.epiuse.com (if
you do not have access to Client Central)
the EPI-USE Labs website.
We are happy to incorporate suggestions that make our products more powerful and easier to use. In this
way, we can contribute to making your work simpler and more efficient.
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 78
DSM5 Installation, Control Center and Configuration Guide Utilities and Products relationship
Product abbreviations:
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 79
DSM5 Installation, Control Center and Configuration Guide Utilities and Products relationship
Clean up X O C
mapping table
Optimization X X X X X X R C
program
HR cluster X X R C
optimizer
Pre-calculate X O C
masked values
Data Disclose X X R C
index run
Object flow X S C
optimization
Pre-system X R S
export
optimization
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 80
DSM5 Installation, Control Center and Configuration Guide Utilities and Products relationship
Copyright 2020 by EPI-USE Systems Limited. Confidential and proprietary: duplication prohibited. 81