two company codes ex 1001,1002 and two users ,one user need to access both company codes and another user need to access only one company code need to access by giving same role (one role ) to both of them.how can give access or restrict company codes in one role?
IBM,
2 8379how to assign the selected transaction in role example in the role we have a Two transactions(T1,T2)so we have a users U1,U2. i need to assign the T1 and lock the T2 to U1, and U2 assign the bothT1,T2
IBM,
1 4124How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
IBM,
2218how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
IBM,
1866how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
IBM,
1673how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
IBM,
1992Post New SAP Security Questions
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
what is user base in sap security?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
Support types of WOs you have faced?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
How to update risk id in rule set?
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
Differentiate between derived role and composite role
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Differentiate between temp role and copy role
Tell me about derived role?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects