Skip to Content
avatar image
Former Member

Implementing the security for FSCM

Hi ,

We are going to implement FSCM module as currently R/3 4.7ee 200 exists in our landscape and for this FSCM implementation they have planned to Install Standalone Java stack system for Accessing Biller direct (netweaver2004s) and ECC6.0 with only abap stack for accessing Dispute management .

what i am concern from Security perspective that what are the requirements we need to check and inputs required from functional and Business teams.

Do we have to create the user ids in all the three systems and role mapping between Java system and ECC6.0/4.7ee systems?

Regards,

Dheeraj

Add comment
10|10000 characters needed characters exceeded

  • Follow
  • Get RSS Feed

2 Answers

  • avatar image
    Former Member
    Feb 27, 2009 at 12:15 PM

    would you care to explain to use how the process should run? we are not FSCM specialists and to answer your question a bit more precisely it would be helpful to know the planned setup.

    Add comment
    10|10000 characters needed characters exceeded

  • avatar image
    Former Member
    Feb 27, 2009 at 12:27 PM

    Are you implementing this via a portal?

    Generally, you would need to have a valid user in each system that they are accessing. There would also need to be appropriate roles / authorisations in the individual systems to allow them to access what you want them to do, where you want them to do it.

    However, there are many ways to manage the authentification. Single sign on using logon tickets is the standard SAP way as once they log into one system, the others then use that as the authentication.

    You could also use CUA to centrally assign access from one master system. This does not really work brilliantly with portals though!

    With portals, you assign access to the pages using different roles and then they have a reference user in the background system to authenticate against. You can map a user to a different one in the background. Be careful with this though for obvious reasons!

    I hope this is helpful.

    Simon

    Add comment
    10|10000 characters needed characters exceeded