Skip to Content
avatar image
Former Member

SAP Security Architecture and BW security Architecture

Hi all

My company(Retail Industry) is in realization stage in their implementation of SAP R/3 and BW.Now in some time the security piece will start for R/3 and BW

<b>Does anyone has document which lists down the documentation and steps for R/3 and BW security in realization stages and stages after that?</b>

<b>Also document which shows how to design R/3 security and BW security architecture ?

Document which shows How to take care of R/3 and BW security architecture and deliver the solution?</b>

Please I don't need help.sap.com link.I already know that link

Any other documents would be helpful

Thanks

Message was edited by:

Jackofalltrades

Message was edited by:

Jackofalltrades

Add comment
10|10000 characters needed characters exceeded

  • Get RSS Feed

8 Answers

  • avatar image
    Former Member
    Feb 26, 2007 at 08:13 PM

    Anyone has any document?

    mail it at <b><email removed by moderator></b>

    Thanks

    Add comment
    10|10000 characters needed characters exceeded

  • avatar image
    Former Member
    Feb 27, 2007 at 09:11 AM

    Hi,

    please check your email.

    Hope it help's

    Add comment
    10|10000 characters needed characters exceeded

  • avatar image
    Former Member
    Feb 28, 2007 at 04:37 PM

    The ASAP methodology provides descriptions and templates for the authorisations activities and deliverables throughout the project. Try downloading the ASAP methodology most applicable to your project and reading through it.

    By the way, authorisation activities and deliverables start well and truly within the blueprinting phase. You'll have to perform some major catchup!

    Add comment
    10|10000 characters needed characters exceeded

  • avatar image
    Former Member
    Feb 28, 2007 at 08:40 PM

    Jack,

    I am currently managing the security design of a brand new ecc 6.0 implementation. This is a very important phase of the project that was not well planned and described before i came on board.

    I would be happy to share some of the experience with you.

    You can email me at <b><email removed by moderator></b>

    Add comment
    10|10000 characters needed characters exceeded

  • avatar image
    Former Member
    Mar 05, 2007 at 08:41 AM

    Hello!

    Please!

    Can you send me the Security Architecture documents too at <b><email removed by moderator></b>

    Add comment
    10|10000 characters needed characters exceeded

  • avatar image
    Former Member
    Mar 06, 2007 at 02:14 AM

    hi guys

    could anyone please forward the document to <b><email removed by moderator></b>

    cheers

    raju

    Add comment
    10|10000 characters needed characters exceeded

  • avatar image
    Former Member
    Mar 30, 2007 at 07:25 PM

    Hi,

    Can someone please send the documents to my email ID as well. My ID is <b><email removed by moderator></b>

    Add comment
    10|10000 characters needed characters exceeded

    • Former Member

      Hi Folks,

      Can any one send me the security architecture documents to this id <b><email removed by moderator></b>

      Thanks in Advance.

  • avatar image
    Former Member
    Apr 13, 2007 at 02:41 PM

    Hi,

    you can check this:

    https://www.sdn.sap.com/irj/sdn/wiki?path=/display/bi/authorizationinSAPNWBI&

    hope it helps

    Add comment
    10|10000 characters needed characters exceeded