your functional team has asked you to provide the seurity
for a tcode.how do you go about it?
Answer Posted / naveen kumar
As a part of a security the functional consultant must give
wht r the tcode that are to be secure and not to be given
to end user depending on that we perpare a matrix
and then we create a role for the each indiviual matrix
assign to end user according to there business requirement
and thus we restrict the user for using of critical tcodes
we should not give SAP_All,SAP_NEW profiles to any user
inthe oragnization until unless told if u also give put a
trace on for that particular user id
Is This Answer Correct ? | 8 Yes | 3 No |
Post New Answer View All Answers
What is t code?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to update risk id in rule set?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
What are the most used tables in sap?
You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?
When would you update a sap table directly? What precautions would you taje?
what things you have to take care before executing run system trace?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
What are some ap security t codes?
What is the main purpose of parameters, groups & personalization tabs?
when performing client copies what steps you need to take from CUA point of view?
what is the process to find that one consultant had removed a table from sap tables
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
Which transaction code is used to display the user buffer?