Answer Posted / madhav1203
This are the 7 steps.
1).define the name of the role.
2).determine the activity of the role.
3).design the menu structure.
4).maintain the authorization.
5).generation the authorization.
6).assign the role to user.
7).perform the user compost
| Is This Answer Correct ? | 21 Yes | 1 No |
Post New Answer View All Answers
Explain protecting public keys?
Differentiate between derived role and composite role
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What is Sap security t-codes?
You want to create and maintain user master record. What authorization would you need?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
You want to remove a developer's and developer keys from a system. How would you do that?
Can you explain protecting public keys?
What is the use of su56?
how to do Reporting and Analysis authorizations
what is use of copy data in derived role and when we use this one ???
Authorization check on s_btch_job failed. What would happen now?
List the various user types.
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
As a SAP security consultant what is the most challenged you faced in previous company?