Enterprise Architecture

Designing SAP Master Data and Authorizations with TOGAF: A 7‑Step Playbook for Enterprise Architects

1. Why SAP master data and authorizations so often end in chaos

In SAP and other ERP implementations, core master data such as customers, suppliers, materials, and G/L accounts is referenced and updated by multiple applications across the landscape.
When the Single Source of Truth is not clearly defined, and when it is unclear who is allowed to maintain which fields, you inevitably end up with duplicate masters, inconsistencies, and excessive authorizations.

On real projects, the following situations are very common:

  • Late in the project, debates suddenly resurface like “So in the end, is the material master owned by PLM or by SAP?”
  • Anyone can change material master data with transaction MM02, leading to frequent inventory differences and cost inconsistencies.
  • During audits, Segregation of Duties (SoD) issues are raised, and the team is forced into a last‑minute redesign of roles.

These are not isolated configuration mistakes. They are symptoms of having moved forward without an enterprise‑level design for “Master Data × Applications × Authorizations”.

This is precisely the area that Enterprise Architects (EAs) should own and orchestrate.

In this article, using the TOGAF Architecture Development Method (ADM) as a conceptual backbone, I will walk through seven practical steps to design “which master is used in which application, and which roles can do what on it” in the context of an SAP implementation.


2. A 7‑step overview based on TOGAF ADM

The TOGAF ADM is a framework for designing an integrated set of Business, Data, Application, and Technology architectures at the enterprise level.
If you apply the ADM way of thinking, you can structure “Master Data × Applications × Authorizations” into the following seven steps:

  1. Define objectives and principles (Architecture Vision)
  2. Inventory key masters and business accountability (Business Architecture)
  3. Build logical data models and define ownership boundaries (Data Architecture)
  4. Map usage patterns for each application (Application Architecture)
  5. Design role‑based authorization policies (Security / cross‑cutting)
  6. Map to SAP roles and authorization objects
  7. Define execution roadmap and governance

The crucial point is: do not start directly with SAP role design.

You first lock down business accountability and data ownership, then define application usage and role policies, and only after that do you break things down into concrete SAP roles and authorization objects.


3. Steps 1–3: Fixing master ownership in Business & Data Architecture

3‑1. Step 1: Define objectives and principles (Architecture Vision)

Start by defining the objectives and guiding principles for master data and authorization design.
As Enterprise Architecture principles, it is helpful to articulate policies such as the following:

  • Master data should be consolidated into a single source wherever feasible; duplicate maintenance across systems is prohibited.
  • Update authorizations for master data must be granted based on business roles, not directly to individual users.
  • Display authorizations must also follow the “need‑to‑know” principle; if someone does not need to see data, they must not see it.
  • Authorization design must satisfy Segregation of Duties and compliance requirements, including audit and GRC expectations.

By documenting principles at this level as EA standards and guidelines, you can make consistent decisions later when exception requests inevitably arise.


3‑2. Step 2: Inventory key masters and business accountability (Business Architecture)

Next, from a Business Architecture perspective, identify “which business processes bear what kind of responsibility for which master data objects”.

Treat master data as “information assets” and organize business accountability using a RACI‑style view.

Examples of key masters (assuming SAP S/4HANA):

  • Customer master (BP – Customer role)
  • Supplier master (BP – Supplier role)
  • Material master
  • G/L account master
  • Cost centers and profit centers
  • Production‑related masters (BOMs, routings, work centers, etc.)

Example: Process × Master × RACI for the material master

For the material master, you might define responsibilities like the following:

  • Design department
    • Definition of design‑related attributes (drawing number, material, weight, etc.): Responsible
  • Production planning department
    • Setting production attributes (MRP type, lot size, lead time, default work center, etc.): Responsible
  • Cost planning / Finance
    • Setting accounting and costing attributes (standard cost, valuation class, etc.): Accountable
  • Sales department
    • Proposal of sales conditions (sales unit, base price, etc.): Consulted
  • Other general departments
    • Reference use of the material master (stock inquiry, ordering, etc.): Informed

Once this RACI is agreed, the system team no longer has to shoulder the entire burden of deciding “Which department owns which field of the material master?”


3‑3. Step 3: Logical data modeling and ownership boundaries (Data Architecture)

Now take the business‑level responsibilities and break them down on the Data Architecture side to the “attribute” level.

Concretely, you create logical data models for key masters and assign responsible departments and roles for each attribute cluster.

Example: Attribute clusters for the material master

  • Basic attributes
    • Material number, material type, material group, base unit of measure
  • Design attributes
    • Drawing number, material, weight, specification classification, etc.
  • Production attributes
    • MRP type, lot size, production lead time, default work center, etc.
  • Procurement attributes
    • Purchasing group, order unit, standard purchasing quantity, etc.
  • Sales attributes
    • Sales organization, sales unit, sales status, base price, etc.
  • Accounting attributes
    • Valuation class, costing settings, standard cost, price control, etc.

Example: Assigning responsibility by attribute cluster

  • Design attributes → “Design Master Specialist” in the design department
  • Production attributes → “Production Master Specialist” in the production planning department
  • Accounting attributes → “Costing Master Specialist” in the finance department
  • Sales attributes → “Sales Master Specialist” in the sales department (proposal and partial maintenance)

By making “who owns which attributes” explicit in the data model, you avoid the risky situation where the material master is treated as a shared object that “anyone can change at any time”.


4. Steps 4–5: Defining application usage and role policies at EA level

4‑1. Step 4: Map usage patterns for each application (Application Architecture)

From the Application Architecture viewpoint, clarify “how each application uses which masters”.

Overlay master usage on an application landscape diagram.

Representative applications might include:

  • PLM (Product Lifecycle Management / engineering)
  • SAP S/4HANA (ERP core)
  • MES (Manufacturing Execution System)
  • CRM (Customer Relationship Management)
  • Existing custom systems and surrounding tools

For each application, list:

  • Which master types it
    • References
    • Updates
    • Originates (creates first)
  • How interfaces flow between systems

Example: Simple matrix of Applications × Masters × Operations

  • Material master
    • PLM: Creates and updates design attributes
    • SAP S/4HANA: Manages all attributes as the integrated truth
    • MES: Reads material information only
  • BOM
    • PLM: Creates engineering BOM
    • SAP S/4HANA: Approves and distributes as manufacturing BOM
    • MES: References as part of production orders
  • Customer master
    • SAP S/4HANA: Creates and manages customers via Business Partner as the truth
    • MES: References customer information within production instructions

By this point, you have an EA‑level view of “which masters are used by which applications”, which then becomes the basis for deciding “which applications are allowed to update which masters, and which must not”.


4‑2. Step 5: Design role‑based authorization policies (Security / cross‑cutting)

Once data and application responsibilities are visible, you can define “who can do what and to what extent” in a role‑based manner.

At this stage, you stay at the level of business roles, without yet naming SAP‑specific technical roles.

Example business roles (derived from the RACIs and data responsibilities):

  • Design Master Specialist
  • Production Master Specialist
  • Procurement Master Specialist
  • Costing Master Specialist
  • Sales Order Processor
  • AP/AR Accountant
  • General User

Example: Role × Master × Operation matrix for the material master

  • Design Master Specialist
    • Create and change design attributes; view other attributes only
  • Production Master Specialist
    • Create and change production attributes; view other attributes only
  • Costing Master Specialist
    • Create and change costing attributes; view other attributes only
  • Sales Order Processor
    • View sales attributes; enter proposals for some sales conditions
  • General User
    • Display material master only

By defining and approving this matrix as an “enterprise authorization policy”, you can later design SAP roles in a consistent way across modules and projects.


5. Step 6: Mapping into SAP roles (with examples)

From here, you translate the business roles defined above into SAP roles and authorization structures.
In this article, we will focus on the structural concepts rather than deep SAP configuration details.

5‑1. Basic approach to SAP role design

In SAP, authorizations are typically designed using a two‑tier structure:

  • Single roles
    • Technical bundles of transactions, Fiori apps, and authorization objects
  • Composite roles
    • Collections of single roles that together implement a business role

From an Enterprise Architect’s standpoint, your responsibility is to define “which single roles should be grouped under which business role”, while Basis and security specialists handle the detailed authorization objects and field values.

5‑2. Identify key transactions per master

For example, assuming S/4HANA material master, the key classic transactions might include:

  • Create: MM01
  • Change: MM02
  • Display: MM03

For customers and suppliers, you would primarily use transaction BP and relevant Fiori apps, as S/4HANA harmonizes customer and vendor under the Business Partner concept.

At this stage, you map “which business role requires which operations (create / change / display)” back to the Role × Master × Operation matrix.

5‑3. Example mappings: Business roles → SAP roles

Example: Production Master Specialist

  • Allowed operations
    • Create and change production‑related views of the material master (MM01 / MM02)
    • Display all material master views (MM03)
  • Typical restriction pattern
    • Limit to specific plants (only factories belonging to that organization)
    • Control which tables/views can be changed
    • Prohibit changes to accounting, costing, and design attributes

Example: General User

  • Allowed operations
    • Display only (MM03)
  • Typical restriction pattern
    • Minimize the company codes and plants that can be viewed
    • Hide master data and functions that are irrelevant to their daily work

For Enterprise Architects, the key is to clarify the principles at the business‑role level so that the SAP security team can implement them consistently in concrete authorization objects and values.

If you let “which transactions each role can use” be determined ad‑hoc during the project, cleaning up later becomes extremely painful.


6. Step 7: Embedding into project lifecycle and operational governance

Finally, you need to embed the “Master Data × Applications × Authorizations” design into both the SAP implementation project and the ongoing run phase.

6‑1. Positioning across the project lifecycle

  • Fit‑to‑Standard / Requirements phase
    • Finalize Steps 2–5 (RACI, data responsibility, application usage, role policies) and get them approved as part of business requirements.
  • Design / Realize phase
    • Execute Step 6: design SAP roles and authorizations, then validate them in test systems using end‑to‑end business scenarios.
  • Pre‑cutover
    • Complete production user master and role assignments, and explain the “why” behind the authorization design as part of key user and end‑user training.

It is essential to keep all of this as EA‑owned standards, not as “one‑off project documents that die after go‑live”.

6‑2. Key points for operational governance

  • When introducing new applications or new master data types, apply the same seven‑step review.
  • Route all requests for role changes and additional authorizations through a review board that includes EA and security, and check alignment with principles and SoD.
  • Perform periodic authorization reviews to ensure that users have not drifted away from their intended business roles and that no excessive access has been granted.
  • Feed audit and GRC findings back into the role policies and EA principles, and adjust where necessary.

The Enterprise Architect’s role does not end with the initial design of “Master Data × Applications × Authorizations”.
By applying the same thinking to change requests and new systems, EA protects architectural coherence over the long term.


7. Conclusion: EA as the guide for “Master Data × Applications × Authorizations”

In SAP programs, attention often gravitates toward individual modules and screens, but the real success factor lies in master data and in the design of “who can touch what and to what extent”.

If you leave these questions entirely to each individual team, you end up with a collection of locally optimized settings that deviate significantly from overall optimization.

By grounding yourself in the TOGAF mindset—organizing master data accountability in Business Architecture, defining attribute‑level ownership in Data Architecture, clarifying application usage patterns in Application Architecture, and then designing role policies at EA level before mapping them into SAP roles—you can design “Master Data × Applications × Authorizations” end‑to‑end in a consistent way.

Enterprise Architects are not just diagram makers; they are the design guides for master data and authorizations, leading the project as a whole.

If you tailor the seven steps in this article to your specific master structures and industry context—whether automotive suppliers, process manufacturing, or trading companies—you can establish an architecture standard that is much more persuasive and easier to govern over time.

Please refer to this article for topics related to Enterprise Architecture (EA).
Enterprise Architecture – Insight Arc | SAP, Enterprise Architecture & Supply Chain Strategy


Reference Links


Disclaimer

Parts of this article were developed with reference to generative AI suggestions and were reviewed, refined, and supplemented based on the author’s professional expertise and judgment.


Back to Top

REI

Recent Posts

Global SAP Implementation and TOGAF® Enterprise Architecture: The Strategic Role of Enterprise Architects

A structured guide to the role of Enterprise Architects in SAP programs, aligned with TOGAF…

1 day ago

TOGAF® Architecture Patterns for SAP S/4HANA: Practical Guide for Enterprise Architects

This article explains how enterprise architects can use TOGAF architecture patterns as reusable assets in…

2 days ago

SAP Enterprise Architecture Implementation : What Must Be Agreed Upfront for Success

A practical guide for aligning architecture vision, scope, and roadmap in SAP projects.

3 days ago

How to Use TOGAF® Compliance Assessment in SAP S/4HANA Implementation

A practical guide for Enterprise Architects on using TOGAF Compliance Assessment in SAP implementations.

5 days ago

TOGAF® Risk Management in SAP S/4HANA Implementations: A Practical Guide for Enterprise Architects

TOGAF Risk Management is not just about reading the PMO risk register. It is how…

5 days ago

TOGAF® Capability-Based Planning for SAP Implementation: A Practical Guide for Enterprise Architects

A practical guide to applying TOGAF Capability-Based Planning in SAP projects, helping Enterprise Architects connect…

6 days ago