Answer Posted / himmatchavan
This is very generic question it should be specific as it
helps to answers with proper examples and particular
details.
Role Designing involves multiple Steps
1: Identify the Transaction codes as per the modules with
help of SAP Functional Consultant
2: Segregate it based on the Functionality and Sub
functionality as per modules and group it
3: Mark different activities for sub modules and create the
Security Matrix.
4: Security Matrix will be used to design the roles which
are SoD(Segregation of Duties) Compliance
5: Defining the Role Naming Conventions
All above steps are called as Role Designing
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
What are su22 t-codes used for?
What is t code?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
what is sod in sap security?
what things you have to take care before executing run system trace?
Can you explain transport system-level security?
What are the uses of an authorization group?
What is sap cryptographic library?
What is the maximum number of profiles in a role and maximum number of object in a role?
how we can see FFID if firefighter not able to see FFids ?
Can you explain network topology in sap systems?
How we Educated client personnel in R/3 Security and general Basis knowledge
what is the critical issue u are faced in your previous experience
What is the difference between c (check) and u (unmaintained)?