Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

your functional team has asked you to provide the seurity
for a tcode.how do you go about it?

Answer Posted / naveen kumar

As a part of a security the functional consultant must give
wht r the tcode that are to be secure and not to be given
to end user depending on that we perpare a matrix

and then we create a role for the each indiviual matrix

assign to end user according to there business requirement

and thus we restrict the user for using of critical tcodes

we should not give SAP_All,SAP_NEW profiles to any user
inthe oragnization until unless told if u also give put a
trace on for that particular user id

Is This Answer Correct ?    8 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is use of derived roles?

1190


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4150


What are the most used tables in sap?

1158


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

991


Tell me about derived role?

1010


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1399


Can you explain transport system-level security?

1167


What does the item category specify in a purchasing order in SAP Materials Management?

1328


What is the maximum number of profiles in a role and maximum number of object in a role?

971


Explain document transfer-level security?

1070


Can you explain internet-level security?

1072


What authorization are required to create and maintain user master records?

1064


what is the main difference between the derived role and a single role?

1089


What are se10 t-codes used for?

1069


how to do Reporting and Analysis authorizations

2388