Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is role designing

Answer Posted / himmatchavan

This is very generic question it should be specific as it
helps to answers with proper examples and particular
details.

Role Designing involves multiple Steps

1: Identify the Transaction codes as per the modules with
help of SAP Functional Consultant
2: Segregate it based on the Functionality and Sub
functionality as per modules and group it
3: Mark different activities for sub modules and create the
Security Matrix.
4: Security Matrix will be used to design the roles which
are SoD(Segregation of Duties) Compliance
5: Defining the Role Naming Conventions

All above steps are called as Role Designing

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1094


Explain network topology in sap systems?

1092


Tell me about derived role?

1081


what is your ticketing tool? can we give some details about how we are getting tickets

1602


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2242


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2450


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7181


What is the difference between c (check) and u (unmaintained)?

1888


Which t-code can be used to delete old security audit logs?

1489


What are su53 t-codes used for?

1374


Differentiate between temp role and copy role

1200


when performing client copies what steps you need to take from CUA point of view?

2562


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4467


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3198


What appears as the last sentence in sap note 587410?

1059