Skip to Content

Archived discussions are read-only. Learn more about SAP Q&A

ITSM & ChaRM Security Approach

Hi Gurus,

I am new to ITSM & ChaRM security. I have read lot of documentation about this but We don't want to use the standard template roles for ChaRM provided by SAP. We would like to customize roles from scratch based on testing/trace results to get accurate security access (no more or less access),

Is this a good approach ? Which approach is normally used by companies whether they just copy standard roles and implement ?

also, do we need to create business partner for all end users who can create support message?



Former Member

Helpful Answer

Not what you were looking for? View more on this topic or Ask a question