Analyzing an existing role in SAP
Hi Security gurus
I am novice in security and been asked to analyze an existing role in SAP, this role is given as a customized default role to every user master created. Now, I am not sure about understanding dependency as why certain auth.objects are given the values they have. Or interdependency among the auth. objects themselves.
How do I know what is the problem when a T-code is deleted from a role?
Help me or at least point me to a direction where I can read about this.