In this blog we will discuss on the method to perform the authority check on the custom Object.
Design to Deployment – is discussed in this video. This is the Session 3, do watch the previous 2 session which help you to catch you up for the complete details.
I was super excited to hear some feedback that these sessions are helping people to make impact on their current role and some of the feedback that i received are below.
Very Nice and thoroughly understood session Satheesh Sir .
Very helpful input in daily issue solving .
Sir , Wonderful demo . I have now clear idea about Whats Role , How to validate it . How to search T codes from Roles. What is the functionality of authorization Object or Permission type . How to search authorization Object based on T codes using T code- Su24 .
In case if you missed my previous session do Click below and will request you to watch in series for Better understanding and clarity.
Do watch and do leave your comments, i will be super motivated and will keep pushing to address your requirements. Write me at myscmh[email protected] in case if you like to write any specific topic.
In this video i have shared the basics of SAP Roles and authorization. I will continue post few more sessions to cover this topic fully that will help the SAP Functional consultants.
In SAP to meet the customer requirements ,we create many Z tables. But during the creation of the Ztable, we miss to discuss and maintain the Authoritsation related parameters.
And later during the Audit, GRC requirements a huge mainatainence needs to be done.
So it is always better to design the table to handle this requirements also.
To achive this for the Ztable, we need to create a Authorisation group and assign them in this Tables.
So along with the Authorisation group and the authority object the security team will be able to
manage the Autho requirements.