Answer Posted / himmatchavan
This is very generic question it should be specific as it
helps to answers with proper examples and particular
details.
Role Designing involves multiple Steps
1: Identify the Transaction codes as per the modules with
help of SAP Functional Consultant
2: Segregate it based on the Functionality and Sub
functionality as per modules and group it
3: Mark different activities for sub modules and create the
Security Matrix.
4: Security Matrix will be used to design the roles which
are SoD(Segregation of Duties) Compliance
5: Defining the Role Naming Conventions
All above steps are called as Role Designing
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
Explain network topology in sap systems?
Tell me about derived role?
what is your ticketing tool? can we give some details about how we are getting tickets
How we Provided Security design, configuration, and support for SAP Enterprise Portals
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the difference between c (check) and u (unmaintained)?
Which t-code can be used to delete old security audit logs?
What are su53 t-codes used for?
Differentiate between temp role and copy role
when performing client copies what steps you need to take from CUA point of view?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
What appears as the last sentence in sap note 587410?