Structural authorizations are some of the most important configurations done during SAP implementations when we talk about information security.
The structural authorization will allow a manager to see only the information of its employees directly or indirectly subordinates.
However, before you start to configure the structural profile itself you will need to understand some other concepts equally important to this accomplishment.
These are some of the subjects we will also see in this document in order to make you understand how the structural profile works and how it was configured.
In the next documents you will see all i have learned about structural profiles and how I implemented my first structural profile.
Hope you all enjoy the documents below:
Part 2 and 3: http://scn.sap.com/docs/DOC-71663
Part 4 : http://scn.sap.com/docs/DOC-71662
Part 5 : http://scn.sap.com/docs/DOC-71661
Part 6 : http://scn.sap.com/docs/DOC-71580
Part 7 : http://scn.sap.com/docs/DOC-71579
Part 8 : http://scn.sap.com/docs/DOC-71578
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
2 | |
2 | |
2 | |
2 | |
2 | |
2 | |
2 | |
2 | |
1 | |
1 |