Answer Posted / sapsecvj
Go to Tcode PFCG, give the technical name of the role to be created, click on the "Single Role"
in Description : give meaningful description of the role.
In the Description tab<long text area>: fill the details of the business requirements gathered.
In Menu tab: Add the TCODES
In Authorization Tab: Click Change Authorization Data to update the Field values of the authorization objects. Generate the profile for the role.
click SAVE
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
how we do CUA configuration in Quality system
When would you update a sap table directly? What precautions would you taje?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
How to assign any program to user?
what are the issues you faced with UME?
What does user compare do?
What is the difference between the table buffer and the user buffer?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Authorization check on s_btch_job failed. What would happen now?
Pfcg proposed activities but you need only two. What would you do?
What are the different types of sap security tables?
Explain sap system transactions?
Explain internet-level security?
What is audit information system?