<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating the Authorization Matrix? in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605756#M868536</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thankyou Abhishek Guru  for the valuable information.:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually,I am fresher in security and was  just involved in Role build and FUT phase.&lt;/P&gt;&lt;P&gt;But want to learn how to carry out a security implementation project,the security designing  concepts ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest me some source and guide me in the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please ellaborate Job based security or process based security?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Mar 2008 00:49:48 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2008-03-28T00:49:48Z</dc:date>
    <item>
      <title>Creating the Authorization Matrix?</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605752#M868532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How requirement gathering should be done?&lt;/P&gt;&lt;P&gt;What is procedure to Create Authorization Matrix in SAP Secuirty Project?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Mar 2008 21:15:51 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605752#M868532</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-27T21:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: Creating the Authorization Matrix?</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605753#M868533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Transactions and authorizations defined in roles are a result of business process needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So first, the functional/business consultants needs to define the proper business processes in place. Initially, this is done at the transaction level. &lt;/P&gt;&lt;P&gt;In this initial requirement gathering, the security team needs to be proactive to understand all these process and propose possible changes. viz. normalize the roles so that a transaction is not duplicated across many roles(unless required), check if any within role SOD's are forming and act accordingly...etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, would be to determine the object values, which is normally done with high degree of interaction with the functional consultants. For larger companies, some roles might need to be restricted too, hence, derived roles would also come into play... all this forms a part of requirement gathering.&lt;/P&gt;&lt;P&gt;Companies follow different procedures for requirement gathering, but you go through ADM940, it gives a good hindsight of the matrix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The answer to your question is very deep........ &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So just shoot whatever specific questions flash your mind &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Mar 2008 22:54:55 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605753#M868533</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-27T22:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Creating the Authorization Matrix?</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605754#M868534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thankyou Abhishek once again!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;" normalize the roles so that a transaction is not duplicated across many roles(unless required), check if any within role SOD's are forming and act accordingly...etc..."&lt;/P&gt;&lt;P&gt;What does this statement signify?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also are there any tools involved to identify transaction from process?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you have any case studies which illustrates this? or where can I find the same?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards ,&lt;/P&gt;&lt;P&gt;Ajit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Mar 2008 23:30:32 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605754#M868534</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-27T23:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Creating the Authorization Matrix?</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605755#M868535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It depends on the type of security design the company is implementing. For example, if its a process based design, each business process is linked to a security role. Then we try to normalize the roles, so that one transaction is not duplicated across many processes. Unless these transactions play a different role in various business processes, viz. simple example could be : display in one/maintain in another. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which type of approach is your company implementing? Job based security or process based security?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the SOD, we try not to create a role with an inherent SOD. You can search the forum for "SOD", contains a pool of knowledge and links discussed by our experts. &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Each implementation has its own processes, its difficult to predict this with tools, its actually the job and responsibility of the functional/business teams to define the processes and their underlying transactions/restrictions. Am not sure of any case studies you are specifically looking for are out here. Will leave this one to the gurus.&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Mar 2008 23:57:20 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605755#M868535</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-27T23:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: Creating the Authorization Matrix?</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605756#M868536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thankyou Abhishek Guru  for the valuable information.:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually,I am fresher in security and was  just involved in Role build and FUT phase.&lt;/P&gt;&lt;P&gt;But want to learn how to carry out a security implementation project,the security designing  concepts ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest me some source and guide me in the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please ellaborate Job based security or process based security?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Mar 2008 00:49:48 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605756#M868536</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-28T00:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: Creating the Authorization Matrix?</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605757#M868537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are starting new to security, then you can go through books like authorizations made easy, and can also enroll for the SAP ADM courses. There are also good books for authorizations and the procedures for implementing it on SAP-PRESS. You can buy them too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can search this forum for certification too:&lt;/P&gt;&lt;P&gt;&lt;A class="jive_macro jive_macro_message" href="https://community.sap.com/" __jive_macro_name="message" modifiedtitle="true" __default_attr="4883948"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your question on job and process based roles:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Process roles are roles that contain at least one tcode, but are usually a set of tcodes, reports and programs.  They represent a defined granular business process with specific functions within the R/3 environments. Set of these roles make up a job for a user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Job roles are roles containing multiple tcodes, reports and programs which make up specific Job Functions .These may also be referenced as Position-Based Roles. In most cases, users are only assigned one Job Role&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Mar 2008 18:09:26 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605757#M868537</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-28T18:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Creating the Authorization Matrix?</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605758#M868538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This message was moderated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2015 10:24:13 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/creating-the-authorization-matrix/m-p/3605758#M868538</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2015-02-20T10:24:13Z</dc:date>
    </item>
  </channel>
</rss>

