Application Development and Automation Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

basic question abt security

Former Member
0 Likes
356

hi all,

some basic questions:

1)in R/3 system we have different modules like MM,SD,HR..so all these

modules vary only in transaction codes with respect to security view??

Eg: In some of the requirements they ask for HR security or sd security for the project..means only we use the tcodes for that related module and give some restrictions in the field value and assign to the user??

2) during the project implementation the role of security guy is to assign some restrictions to the functional as well as the technical guy?once the project is implemented when will the security guy asign the roles to the end users??will he log into the production ,and create roles etc..?

3) In BW security the main role of security guy is to assign which user needs to access infocubes,info providers,queries??

some one please explain me clearly based on to my questions..

thanks,

john

2 REPLIES 2
Read only

Former Member
0 Likes
335

Hello,

1) Yes, depends on the t-codes , and reports the modules will differ, in respect to security point of view as well as it's functionality.

Yes, basically the functional head will have full authorizations. And he/she has to provide the user's list, and their roles with field values.

2) There is not much difference between before implementation and after implementation. (ie before go-live and after go-live), all the roles and authorizations are to be created for functional / technical also at the time of implementation it self.

End users are also created at the time of implementation it self. They have to work on DEV, QTY.

But on PRD we will create on after golive only.

3) In BW , yes, it depends on the user.

Just discuss the things with respective Heads/Leads , to proceed further.

I hope this information will help you.

Note: Points always encourage me to reply !!

Read only

Former Member
0 Likes
335

Hi John,

1) A Basis Security Administrator has to restrict Authorisations as per the respective modules in any organisation. Remember if you don't do that then it will raise to SOD conflicts in the system and will reflect in the Audit process.

2) There is no much difference as such for (pre go live) or (post go live). Yes the users are created in DEV & QAS systems along with the roles & then after implementation, when Roles are in PRD sytem you need to create users & assign accordingly. The Manager or the Super User Manager will have full Authorisations

3) BW security is different. It depends on the user if he needs access to queries, workbooks etc...

I hope your questions are answered.

Assign Reward Points if your questions are answered.

Thanks & Regards,

Sameer