Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

security

Former Member
0 Kudos

hi all.

during BLUE PRINT stage ,security guy will b given the requirements about the roles..,rite?want to know the basic concepts..like wat r all the basic requirements wil b given?t.codes n the authorizations for the users will b given ?if not how its goin to wrk?

1 ACCEPTED SOLUTION

Former Member
0 Kudos

Hi Kamal,

The authorization is to be finalised basing on what the individual user is supposed to do. It is better to decide this in consultation of both the basis as well as concerned functional key users.

Detailed list of tcodes which the users are to perform are to be made out in consultation with the functional people. Apart from this some basic basis authorisation are also to be given.

For a better result u can assign the functionalkey user with sap_all profile and ask him to carry out all the works which the individual user is supposed to do and put this user under a authorization trace. In this way you can get a basic layout of the auth which you can copy and modify afterwards as per requirement.

SU53 is to be given to almost all the roles as this enables to detect the missing authorization in case there is a authorization failure.

Dont forget to award suitable points if helpful.

Regards

1 REPLY 1

Former Member
0 Kudos

Hi Kamal,

The authorization is to be finalised basing on what the individual user is supposed to do. It is better to decide this in consultation of both the basis as well as concerned functional key users.

Detailed list of tcodes which the users are to perform are to be made out in consultation with the functional people. Apart from this some basic basis authorisation are also to be given.

For a better result u can assign the functionalkey user with sap_all profile and ask him to carry out all the works which the individual user is supposed to do and put this user under a authorization trace. In this way you can get a basic layout of the auth which you can copy and modify afterwards as per requirement.

SU53 is to be given to almost all the roles as this enables to detect the missing authorization in case there is a authorization failure.

Dont forget to award suitable points if helpful.

Regards