From the course: SAP S/4HANA Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Security roles in SAP S/4HANA - SAP Tutorial
From the course: SAP S/4HANA Essential Training
Security roles in SAP S/4HANA
SAP S/4HANA has customizable security rules that ensure proper access for each end user. Let's take a look at how they work. Not every SAP end user will have the same access in the system. When a user profile is first created, they are mapped to the appropriate security role. Security roles in SAP ensure that there is a segregation of duties across a business. The role that the user is mapped to will either allow or deny access to different transactions. The assigned security role will also allow or deny access to different organizational levels in the system. Organizational levels are components of our enterprise structure, like company code, plant, or sales organization. These roles make sure that the right people have access to the right transactions and the right areas of the system. Let's look at an example. Let's imagine that Lisa is our plant manager. Lisa is mapped to a security role called Plant Manager- New York.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
What is SAP S/4HANA?1m 35s
-
(Locked)
Benefits and constraints of SAP S/4HANA3m 29s
-
(Locked)
SAP S/4HANA implementations and customizations4m 10s
-
(Locked)
SAP S/4HANA modules3m 54s
-
(Locked)
Enterprise structure in SAP S/4HANA3m 28s
-
(Locked)
Master data vs. transactional data1m 41s
-
(Locked)
Security roles in SAP S/4HANA1m 50s
-
(Locked)
Artificial intelligence in SAP S/4HANA2m 55s
-
-
-
-
-