Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is role designing

Answer Posted / himmatchavan

This is very generic question it should be specific as it
helps to answers with proper examples and particular
details.

Role Designing involves multiple Steps

1: Identify the Transaction codes as per the modules with
help of SAP Functional Consultant
2: Segregate it based on the Functionality and Sub
functionality as per modules and group it
3: Mark different activities for sub modules and create the
Security Matrix.
4: Security Matrix will be used to design the roles which
are SoD(Segregation of Duties) Compliance
5: Defining the Role Naming Conventions

All above steps are called as Role Designing

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which tables will you use for making customizing setting for security administration?

1106


What does the account assessment category specify in a purchasing order in SAP Materials Management?

1399


List the various user types.

1015


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4151


How to update risk id in rule set?

1089


Pfcg proposed activities but you need only two. What would you do?

1074


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1027


Can you explain snc in sap security?

1089


User is not there in User master record. Then how to trace the user?

1427


How to run the daily background job s for virsa violations ? thabks in advance

3610


What is the difference between c (check) and u (unmaintained)?

1790


What are pfud t-codes used for?

1163


Differentiate between usobx_c and usobt_c

1101


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2236


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2402