Authorizations

[39 Matches Found]
Page 1 of 2         1 2      
Article icon
by Hernan Huwyler, Risk Management and Internal Control Director, Veolia September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Article icon
by Eric Wood, SAP ERP HCM/SuccessFactors Solution Architect, Presence of IT February 26, 2013
HR – 

In this article by Eric Wood, he shows you how to craft an effective SAP HR security strategy using structural authorizations and position-based security. Learn step-by-step guidelines for designing appropriate SAP HR strategy and how to implement structural authorizations.


Article icon
by Venki Krishnamoorthy, Independent SAP ERP HCM Functional Consultant December 13, 2012
HR – 

In this article by Venki Krishnamoorthy, he shows users how to build a cloud-based appraisal application using SuccessFactors Performance Management and how to use themes when creating an appraisal application. Venki also delves into the details of SuccessFactors Performance Management functionalities like Writing Assistant (to develop competencies), SMART goals (to assist with creating benchmarks), and how to use the Manager Assistant.


Article icon
by Malcolm Dillon, Independent GRC and Security Consultant November 8, 2012
HR/SAP Professional Journal/Financials – 

Malcolm Dillon shows you how to prevent unauthorized users from making changes to historical master data after the submission has been approved by a manager or time administrator.


Article icon
by Malcolm Dillon, Independent GRC and Security Consultant June 19, 2012
HR/SAP Professional Journal/Financials – 

Learn how to configure SAP Access Control 5.3 to use an enterprise role concept across all SAP ABAP components, Java components, and LDAP user group provisioning.


Article icon
by Prashant Rastogi, Associate Manager, Accenture February 15, 2012
HR – 

Have you ever wondered how to implement structural authorizations for Nakisa? This article shows you, and helps you understand the concepts and activities required to make structural authorizations work with Nakisa components.


Article icon
by Prashant Rastogi, Associate Manager, Accenture December 16, 2011
HR – 

Learn how to implement position-based authorizations in your organization. Discover the advantages and pitfalls of having position-based authorizations.


Article icon
by Apparao Kavuri, Specialist Master, Deloitte Consulting LLP August 19, 2011
HR – 

Learn how to implement a delegate solution for SAP E-Recruiting and manager self-service (MSS) using SAP’s Object and Data Provider (OADP), structural authorizations, and HCM processes and forms framework. Discover how to configure and initiate an MSS requisition request form using SAP NetWeaver Portal.


Article icon
by Vinay Naithani, Managing Consultant, HCL-Axon January 10, 2011
HR – 

Using the expertise of SAP Experts author, Vinay Naithani, use these six tried-and-true steps to help you roll out the Employee Interaction Center (EIC) using customized enhancements.


Article icon
by Jarret Pazahanick, Managing Partner, EIC Experts | Chandan Gopalani, Managing Partner, EIC Experts January 5, 2011
HR – 

In this article by Jarret Pazahanick and Chandan Gopalani, they teach you the key concepts of securing employee data contained in the Employee Interaction Center (EIC) and how to set up authorizations for an HR shared service center.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. May 21, 2010
HR – 
Learn best practices to enhance and optimize the process of structural authorization checks, such as using evaluation paths, creating indexes, and buffering large numbers of structural authorization check objects in the SAP memory via standard SAP reports.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting April 15, 2010
HR – 
Learn the importance of the connection between personnel planning functions and structural authorizations through these integration tips.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting March 30, 2010
HR – 
Learn some best practices and scenarios for building a solid authorizations concept. See which combination of roles and structural authorizations is best for your company.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting February 19, 2010
HR – 
Whether a company is implementing the SAP standard authorizations concept or the context-specific authorizations concept, some specific switches need to be applied. Learn about the importance of the main switches for SAP ERP HCM authorizations as well as specifications for employees in a default position.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting January 14, 2010
HR – 
Learn the basic information for building an overall authorizations concept including specifications and examples for each different type of role as well as structural authorizations use. Also, see some examples of bad role design and specific actions to avoid.

Article icon
by Manuel Gallardo, SAP HR System Architect August 25, 2009
HR – 
Learn a 3-step technique for restricting user access to LSMW to just one assigned data load. Users then can execute a data load without posing a security risk.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting June 10, 2009
HR – 
Learn how to create, implement, and maintain a solid authorizations concept using transaction SUIM.

Article icon
by Raghavendran Parthasarathy, Principal Consultant, Hexaware Technologies March 31, 2009
HR – 
The log of report auditing tool, which is not widely used, can enhance employee personal data protection. See how to configure it in your system.

Page 1 of 2         1 2