your functional team has asked you to provide the seurity
for a tcode.how do you go about it?
Answers were Sorted based on User's Feedback
Answer / naveen kumar
As a part of a security the functional consultant must give
wht r the tcode that are to be secure and not to be given
to end user depending on that we perpare a matrix
and then we create a role for the each indiviual matrix
assign to end user according to there business requirement
and thus we restrict the user for using of critical tcodes
we should not give SAP_All,SAP_NEW profiles to any user
inthe oragnization until unless told if u also give put a
trace on for that particular user id
Is This Answer Correct ? | 8 Yes | 3 No |
How can I find List of users in system who dont have any role assigned (Role Tab Blank) but created in system ?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
Which transaction code is used to manage lack entries?
hi tel me what is the use os SNC tab page in su01, and how to configure it , give me example for this,and how it can used in real time
Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
What is Use Of SM35P and SM35 , Is there any difference between these two ?
How to find the already locked users list before a particular date. Example: list of users already locked before 25.03.2010
Hii... Any one tell me .. We are using mainly 2 T.R. 1.customizing request. 2.work bench request. Can u tell me ..which are comes under customizing request and which are work bench request
Give one example of master data that is shared between AC, PC and RM? (grc 10)
how a t code works
What is the maximum number of authorization in an object?
What transactions can be assigned for all the users ?