Answer Posted / krishna
I think the question is in-correct, to my knowledge the question is about the which roles (Tcodes) are commonly used. To answer this question, any resource in the organization irrespective of their position are employees and everyone need some common access like SU53, CAT2, PR* Tcodes, to view their own salary, to see some open position in the organization, SU3, etc...are the basic requirement of every employee. Hope this could be the intention of the question.
On top of that we can say user should have some general roles (I club all these tcodes in a single Role or I can club the roles which will give the above said access in one composite role) + Job role (based on his position or job - these are generally Derived roles, but again from the adimistration perspective or Master data management perspective these roles can not be Derive roles as the Amins / MDG team should have the wider access meaning that orgfield should have '*') Hope this explanation will help you.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is centralize FFID?
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
How to assign any program to user?
What does the profile generator do?
How do we test security systems.
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
Explain x-glueb and its use in sap security.
What is the difference between the table buffer and the user buffer?
Can you explain internet-level security?
What is sap cryptographic library?
Can you explain document transfer-level security?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
Can you explain network topology in sap systems?
Differentiate between derived role and composite role
Explain protecting public keys?