Drinking Water Company Vitens Connects HR and GRC Business Roles to Achieve an 80% Automated Provisioning Rate

498 results

  1. SAP HANA Security Part 1: The Difference Between Run-Time and Design-Time Roles

    The basics about SAP HANA security can be a somewhat confusing topic, even for experienced users. However, there are some terms and concepts that users must understand in order to properly set up security in SAP HANA. In the first of this two-part series about SAP HANA security, gain an overview of two ways for...…

  2. Improve Your Authorization Concept by Deriving Roles in Enterprise Role Management

    Enterprise Role Management (ERM) helps your role design process with a predefined, customizable design methodology that guides you through role definition, authorization maintenance, risk analysis, role approval, and role generation in your SAP back-end systems. During role maintenance, you can manage massive role derivation and adopt a mapping for speeding up this process. Key Concept...…

  3. Create CRM Business Roles Easily with Web-Based Business Role Customizing

    Use the CRM WebClient UI to customize CRM business roles. Understand the underlying concepts and test the customizing by assigning the user to a business role. Key Concept Business roles are roles that contain business content from CRM applications. Business roles are controlled by different elements that define which work centers, direct link groups, logical...…

  4. Steps to Safely Define and Customize Business Roles and Authorizations in SAP CRM

    See how to define a business role in customizing, assign it to a position in an organizational model, and then analyze its content. Key Concept Business roles and authorizations are prerequisites for SAP CRM upgrades or cutovers. This means that during the user acceptance test, users should test each business scenario using appropriate profiles and...…

  5. Develop Roles and Responsibilities Specific to a Data Migration Project

    Reading time: 16 mins

    ManagementLearn a real-world example of a resource operating model, including the roles and responsibilities — for both business and IT — in achieving a successful data migration project. Arm yourself with detailed descriptions of what each role should do, when and how they interact with other roles, and how to deliver the migration objects successfully....…

  6. The Impact of SAP S/4HANA On-Premise Migration on SAP Roles and Authorizations

    With the SAP-imposed deadline of 2027 looming for migrating to SAP S/4HANA, many of SAP’s customers are currently considering migrating their legacy ERP system to SAP S/4HANA. Resilient security is essential when moving forward with new technologies, and SAP software is no exception. SAP has made significant changes to the business suite’s data model in…

  7. Link Defaults, Limits, and Other Values Directly to Security Roles

    Personalization data functionality introduced with SAP R/3 Release 4.6C enables you to link and maintain default settings, values, limits, and other data directly against security roles and user masters. Key Concept Even with all the customizing options available in SAP systems, every so often you need to store a little extra data to default settings...…

  8. Best Practices and Scenarios for Working with Overall Authorizations

    Reading time: 13 mins

    Learn some best practices and scenarios for building a solid authorizations concept. See which combination of roles and structural authorizations is best for your company. Key Concept Overall authorizations are the combination of different types of roles and use of structural authorizations. For each specific need, a company needs to choose the implementation of roles...…

  9. Manual Provisioning of Non-SAP Roles Using SAP Access Control

    SAP Professional Journal Learn how to minimize multiple access requests by configuring SAP Access Control so that you can manually provision access for non-SAP applications. Key Concept Transaction code SPRO is used for setting up SAP Access Control configuration settings. You execute SPRO to integrate non-SAP Remote Function Call (RFC) connections with the logical file...…

  10. Southwire Powers Up with Analytics to Redesign User Roles

    Preventing access risk and ensuring regulatory compliance are top priorities for any business, and cable and wire manufacturer Southwire Company, LLC, understands how analytics are required to successfully achieve these goals. Concerned that access-related risks were unacceptably high, Southwire embarked on a multi-phased project that aimed to remove, reduce, and mitigate these risks and to…