Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

SAP HR security implementation approach

Former Member
0 Kudos

Dear All,

Please give inputs to start implementing the new SAP HCM security setup for the modules OM, PA, EM and ESS & MSS.  I have worked in the support project but am not sure the approach including product development, planning, and quality-assurance for the Security setup of SAP HCM. 

What I need is from our client, they want to implement the above mentioned modules and to build the Security.  Please can anyone guide through how to proceed on requirement gathering, configuration settings to the base of security, required information and steps to follow.

Your inputs are really helpful and appreciated.

Thanks is advance.

Best Regards,

Venkat.

1 ACCEPTED SOLUTION

Former Member
0 Kudos

Hi,

Firstly, check if all the employees are assigned to any personnel number / positions  and how the organisational structure is linked.

look thourgh transaction OOAC in this you can check which switch can be activated.

check transaction HRAUTH, in this you can check what BADI's can be implemented as per the requirement.

If you go through the above transaction, probable you will get some idea on structural authorizations and then you can think on your strategy of implementing structural authorization. ( this also requires lot of developer inputs and functional inputs).

Go through the below link:

http://scn.sap.com/thread/1728793

Thanks,

Sanketh.

1 REPLY 1

Former Member
0 Kudos

Hi,

Firstly, check if all the employees are assigned to any personnel number / positions  and how the organisational structure is linked.

look thourgh transaction OOAC in this you can check which switch can be activated.

check transaction HRAUTH, in this you can check what BADI's can be implemented as per the requirement.

If you go through the above transaction, probable you will get some idea on structural authorizations and then you can think on your strategy of implementing structural authorization. ( this also requires lot of developer inputs and functional inputs).

Go through the below link:

http://scn.sap.com/thread/1728793

Thanks,

Sanketh.