Answer Posted / himmatchavan
This is very generic question it should be specific as it
helps to answers with proper examples and particular
details.
Role Designing involves multiple Steps
1: Identify the Transaction codes as per the modules with
help of SAP Functional Consultant
2: Segregate it based on the Functionality and Sub
functionality as per modules and group it
3: Mark different activities for sub modules and create the
Security Matrix.
4: Security Matrix will be used to design the roles which
are SoD(Segregation of Duties) Compliance
5: Defining the Role Naming Conventions
All above steps are called as Role Designing
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Tell me about derived role?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Differentiate between usobx_c and usobt_c
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
Explain document transfer-level security?
How to assign any program to user?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Can you explain transport system-level security?
What does the account assessment category specify in a purchasing requisition in SAP Materials Management?
Pfcg proposed activities but you need only two. What would you do?
How to update risk id in rule set?
How we Educated client personnel in R/3 Security and general Basis knowledge
What are the most used tables in sap?
What profile versions?
You want to create and maintain user master record. What authorization would you need?