Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

which role is commonly used

Answer Posted / krishna

I think the question is in-correct, to my knowledge the question is about the which roles (Tcodes) are commonly used. To answer this question, any resource in the organization irrespective of their position are employees and everyone need some common access like SU53, CAT2, PR* Tcodes, to view their own salary, to see some open position in the organization, SU3, etc...are the basic requirement of every employee. Hope this could be the intention of the question.

On top of that we can say user should have some general roles (I club all these tcodes in a single Role or I can club the roles which will give the above said access in one composite role) + Job role (based on his position or job - these are generally Derived roles, but again from the adimistration perspective or Master data management perspective these roles can not be Derive roles as the Amins / MDG team should have the wider access meaning that orgfield should have '*') Hope this explanation will help you.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is centralize FFID?

2027


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2076


How to assign any program to user?

1531


What does the profile generator do?

1065


How do we test security systems.

1043


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2596


Explain x-glueb and its use in sap security.

1287


What is the difference between the table buffer and the user buffer?

1148


Can you explain internet-level security?

1069


What is sap cryptographic library?

1018


Can you explain document transfer-level security?

1072


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2752


Can you explain network topology in sap systems?

1050


Differentiate between derived role and composite role

1104


Explain protecting public keys?

1166