Answer Posted / sapsecvj
Go to Tcode PFCG, give the technical name of the role to be created, click on the "Single Role"
in Description : give meaningful description of the role.
In the Description tab<long text area>: fill the details of the business requirements gathered.
In Menu tab: Add the TCODES
In Authorization Tab: Click Change Authorization Data to update the Field values of the authorization objects. Generate the profile for the role.
click SAVE
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Can you explain document transfer-level security?
You want to remove a developer's and developer keys from a system. How would you do that?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
By which parameter number of entries are controlled in the user buffer?
List the various user types.
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
What are su25 t-codes used for?
User is not there in User master record. Then how to trace the user?
What are su56 t-codes used for?
how a t code works
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
what is user buffer?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects