we have one parent role and we derived five roles from that
and i assigned these derived roles to five users now i want
to restrict 2 users for couple of T-codes and rest of the
users work with those T-codes , How we can solve the problem
Answer Posted / sumeithmn
We can change the Authorizations of those 2 specific derived roles by removing the desired tcodes and generate. But this actually defies the derived - template roles concept.
Also, whenever the template role is modified for some reason i future, and if the change is inherited via the template role, then the 2 specific derived roles will lose all the changes made to them (as above) and will get the same auths as the template role again.
The only solution in this case is to not derive all roles from the template role after template roles modification, but to derived individually each of those 3 derived roles, and make the changes exclusively to those 2 derived roles. This is possible but proposes a very weak and unnecessary overhead task for Security administrator.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What does the item category specify in a purchasing requisition in SAP Materials Management?
Explain transport system-level security?
Can you explain transport system-level security?
How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
what is hypercare and go live support?
what is authorization object and authorization object class?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Why is it important to delete sap-new profile? What steps will you take to do this?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
Explain network topology in sap systems?
what is the difference between usobt_c and usobx_c?