Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

Security Redesign Best Practices

Former Member
0 Kudos

Hi All:

I am working on security redesign project.

I request you to share any guidelines on role based redesign.

Thank you,

3 REPLIES 3

manohar_kappala2
Contributor
0 Kudos

Hi,

First of all Identify the key conflicts at the Tcode level.

Verify the tcodes combinations from S_TCODE level and identify the conflicts.

Then go into the details of the other Auth objects which give access for this conflict to materialise and if there are any then let the management know about this and mitigate it accordingly. For example SU01 with PFCG is a conflict but it would take effect if they are given Activities 01,02 and 06 for

Corresponding Auth Objects, this might not be a conflict of drastic proportions if the Activities are 03, 08 . Let me know if it helps

Former Member
0 Kudos

I explored the help.sap and service market place.

0 Kudos

What did you found there?

post updates