on 08-01-2007 10:51 AM
Hi,
Please let me know the points to be considered while checking the security and authorization in FI modules based on a user role.
Thanks,
Sridevi
Hi,
While defining the security roles, as a first step Composite roles, Single Roles are created. Transaction codes are attached to Single roles. A group of Single roles are attached to a Composite roles.
Based of Business requirements / Orgnaization structure in the Company in the sense VP. Finance / Controller / Sr.Manager / Manager etc., the composite roles and single roles are assigned to the positions. For example Vice President Finance will have full authorization to all composite roles.
Some of the users require only display authorization, in which case a role is created only incorporating transaction codes which display documents.
Thanks
Murali.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
95 | |
11 | |
11 | |
6 | |
6 | |
4 | |
4 | |
3 | |
3 | |
3 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.