What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
Answer Posted / siva ramaiah b v
1.Identify the users and their functionalities.
2.define and use authorization objects.
3.Roles will be designed as per GRC i.e single roles and composite role.
4.All roles should be controlled by objects ie. it should not be wild chars ( Notification Type : t1, t2..)
5.All roles will controlled with business functions i.e (If not required controlled functions like Release, create, close, TECO, Change etc.)
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
Which tables will you use for making customizing setting for security administration?
What does user compare do?
What is sap’s grc?
How we schedule and administering background jobs?
What is a composite role?
What profile versions?
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
What is the use of su56?
Explain x-glueb and its use in sap security.
What is sap internet transaction server?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
How to insert missing authorization?
How to update risk id in rule set?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Can you explain snc in sap security?