Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

SAP ECC authorisation implementation plan

Former Member
0 Kudos

Hi Experts, I'm looking for a sample implementation plan of SAP authorisation in ECC, CRM, CLP, BW, GRC. I'm keen to see what are the key activities to perform the implementation. Appreciate if you can give me your inputs or if you can refer me to a sample project plan having the key activities for such an implementation of the authorisation security from role design, realisation/build, go-live preparation, go-live and support. Please advise. Thanks.

3 REPLIES 3

mvoros
Active Contributor
0 Kudos

Hi,

the book [SAP Authorization System Implementation |http://www.amazon.com/SAP-Authorization-System-Implementation-Enterprise/dp/1592290167] should answer most of your basic questions. It's a bit old but basic info are still relevant. There seems to be new book [Authorizations in SAP Software: Design and Configuration|http://www.sap-press.com/products/Authorizations-in-SAP-Software%3A-Design-and-Configuration.html]. I haven't seen this one.

You can also check [ASAP|http://www.sdn.sap.com/irj/sdn/go/portal/prtroot/com.sap.km.cm.docs/lw/asap%20methodology/asap%20methodology%20for%20implementation/index.htm] for security related activities.

Cheers

Former Member
0 Kudos

Thank you for your comments. I'll take a look at these materials

Former Member
0 Kudos

I agree with Martin. For a guide to how activities can be structured the IBM book is good for someone without a lot of experience of doing end-to-end security.

Monica - there are a few more book reviews here: