Answer Posted / madhav1203
This are the 7 steps.
1).define the name of the role.
2).determine the activity of the role.
3).design the menu structure.
4).maintain the authorization.
5).generation the authorization.
6).assign the role to user.
7).perform the user compost
| Is This Answer Correct ? | 21 Yes | 1 No |
Post New Answer View All Answers
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
How to update risk id in rule set?
How to run the daily background job s for virsa violations ? thabks in advance
Explain snc in sap security?
What is the use of tmssup* rfc destinations?
What is the procedure for role modifications?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
how to do Reporting and Analysis authorizations
Explain protecting public keys?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
what are all the questions covered in "profiles related concepts " please let me know ?
You want to remove a developer's and developer keys from a system. How would you do that?
when performing client copies what steps you need to take from CUA point of view?
What is the difference between usobx_c and usobt_c?