Introduction:

Structural authorizations are some of the most important configurations done during SAP implementations when we talk about information security.

The structural authorization will allow a manager to see only the information of its employees directly or indirectly subordinates.

However, before you start to configure the structural profile itself you will need to understand some other concepts equally important to this accomplishment.

  • Evaluation Path;
  • Object on PD, PA, RC, PE and so on;
  • Data specifications (period);
  • Useful reports;
  • Background Jobs;

These are some of the subjects we will also see in this document in order to make you understand how the structural profile works and how it was configured.

In the next documents you will see all i have learned about structural profiles and how I implemented my first structural profile.

Hope you all enjoy the documents below:


Part 2 and 3: http://scn.sap.com/docs/DOC-71663

Part 4          : http://scn.sap.com/docs/DOC-71662

Part 5          : http://scn.sap.com/docs/DOC-71661

Part 6          : http://scn.sap.com/docs/DOC-71580

Part 7          : http://scn.sap.com/docs/DOC-71579

Part 8          : http://scn.sap.com/docs/DOC-71578

To report this post you need to login first.

Be the first to leave a comment

You must be Logged on to comment or reply to a post.

Leave a Reply