Structural authorizations are some of the most important configurations done during SAP implementations when we talk about information security.
The structural authorization will allow a manager to see only the information of its employees directly or indirectly subordinates.
However, before you start to configure the structural profile itself you will need to understand some other concepts equally important to this accomplishment.
- Evaluation Path;
- Object on PD, PA, RC, PE and so on;
- Data specifications (period);
- Useful reports;
- Background Jobs;
These are some of the subjects we will also see in this document in order to make you understand how the structural profile works and how it was configured.
In the next documents you will see all i have learned about structural profiles and how I implemented my first structural profile.
Hope you all enjoy the documents below:
Part 2 and 3: http://scn.sap.com/docs/DOC-71663
Part 4 : http://scn.sap.com/docs/DOC-71662
Part 5 : http://scn.sap.com/docs/DOC-71661
Part 6 : http://scn.sap.com/docs/DOC-71580
Part 7 : http://scn.sap.com/docs/DOC-71579
Part 8 : http://scn.sap.com/docs/DOC-71578