ITSM & ChaRM Security Approach
I am new to ITSM & ChaRM security. I have read lot of documentation about this but We don't want to use the standard template roles for ChaRM provided by SAP. We would like to customize roles from scratch based on testing/trace results to get accurate security access (no more or less access),
Is this a good approach ? Which approach is normally used by companies whether they just copy standard roles and implement ?
also, do we need to create business partner for all end users who can create support message?