Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

HR Security Step by step guide

Former Member
0 Kudos

Hi,

Can any one help me with HR Security Implementation, I am looking for some step by step guide , as I am new for HR. please help its urgent

Regards

Puneet

4 REPLIES 4

Former Member
0 Kudos

This message was moderated.

0 Kudos

Hello Alicia,

Are you proud of your first contribution to this forum?

First of all, Puneet did not ask for free information per se.

Second, there is a lot of free information available to make a decent start in HR security.

Third, calling names to newbies makes YOU the amateur here!

Maybe you should refrain from posting here until you have something useful to say.

Kind regards,

Lodewijk

Former Member
0 Kudos

Dear Puneet,

You can go through the following websites

1). http://www.sapsecurityonline.com/hr_security/hr_security_tips.htm

2). http://expertanswercenter.techtarget.com/eac/knowledgebaseCategory/0,295197,sid63_tax296866_idx0_off...

3). you can search and download documents from:

http://www.hrexpertonline.com/downloads.cfm?session=

hope it helps You.

ps:

Award points if useful, please

Former Member
0 Kudos

Hi Puneet,

Your question is broad and without an idea of your system setup, its hard to provide an answer that would meet your needs.

The previous post has provided you with some documentation, some helpful tips for you would be getting familiar with some of the HCM transactions, such as PA20/30, PO03, PO10, PO13, PPOSE to see what data and relationships are availble to users.

I would then have a look at some of the common HR authorisation objects that can be used, such as PLOG, P_PERNR, P_PCLX, etc you can access these by going to PFCG > Environment > Auth Objects > Display... read the documentation against them. Note that some auth objects need to be turned on for checking in the system if you want them to be used.. P_PERNR is one of them..

Restricting users by what data they should see is important, you need to determine whether you want to use structural authorisations (PD profiles) or not. This could rely on whether your organisation is currently maintaining the organisational structure? There are advantages of Structural auths and many disadvantages. Check transaction OOSP and OOSB, one of these will allow you to create a PD Profile and limit it to HR Objects...

The best way to get familiar with all this is by setting up a test user and test role. (trial and error).

Obviously there are a lot of factors that you need to consider when attempting a HR security build, but I hope some of this information will point you in the right direction.

Cheers

Nathan

Australia

P.s I won't charge you step by step for this information