03-11-2010 2:43 PM
Hello Gurus,
I am working on a Upgrade project from 4.6c to ECC6.0 , In 4.6C R/3 system position based security concept is used.
Are there any extra precautions need to be taken while upgrading in a position based security model ?
Or
Is it the same procedure either it is a role based security model or a postion based security model.
iam new to this upgrade stuff, please kindly direct me in the right direction.
Also please provide if any documents are available.
Thanks,
Sanketh.
03-11-2010 9:36 PM
please browse a recent post of Julius.. good note on upgrade are there please refer..
coming to you point.. there is no diffrence in urgrading if you have role based aithorization concept
or Structural authorization..
Thanks,
Prasant K paichha
Edited by: Prasant K Paichha on Mar 12, 2010 7:47 AM
03-11-2010 5:08 PM
Hi,
Already there are many document posted on SDN on same . Security upgrade is standard and mostly deal with role modification and can you elaborate more on Position based. Positiong related assignment also taken care with respective functional team for ex :HR and technical team Workflow if there are any issues.
Better you go throug the upgrade document .see post already available in forum before starting with upgrade.
Experts correct me in case of correction.
03-11-2010 9:36 PM
please browse a recent post of Julius.. good note on upgrade are there please refer..
coming to you point.. there is no diffrence in urgrading if you have role based aithorization concept
or Structural authorization..
Thanks,
Prasant K paichha
Edited by: Prasant K Paichha on Mar 12, 2010 7:47 AM
03-19-2010 12:19 PM
Gurus,
What are the most possible errors we can can face after an upgrade from 4.7 to ECC 6.0,
from structural authorizations point of you.
Are there any prerequisites need to be taken,before doing an upgrade from 4.7 to ECC 6.0 for a system in structural authorizations point of view.
thanks,
Sanketh.
03-19-2010 7:27 PM
Hello,
please look into upgrade notes/guide it has all the pre requisites need to be taken care.
Thanks,
Prasant K Paichha
03-19-2010 8:09 PM
Position based security model which is basically a part of HR Security didn't change much from older releases. So there is nothing to check almost from extra authorization or obsolete authorization point of view. But, it is evident to check the authorization switches and the Indirect Org. assignments of the roles which are getting changes with other auth Objects apart from HR (if any) and regenerate them.
I hope this make clear.
Regards,
Dipanjan
03-23-2010 5:52 AM
Thanks for all your replies.
Can you please provide thelink for upgrade security guide from4.6c to ECc 6.0 .
i could not find the appropriate guide.
Regards,
Sanketh.