Professional Documents
Culture Documents
SECURITY
INTORDUCTION
2
3
• Network Security
• System Access Security—Role and Authorisation
• Data security
3
4
• Role-based authorisation
• Identify the transaction codes that each role in the organization require
• Prepare an authorization role for the list of transactions identified
• Assign the user the specific authorization role
4
5
Summary
• For better access security roles and authorizations need to be defined in ERP system.
Authorization can be role-based or activity-based.
• In activity-based authorization, based on the number of transactions a person use, an
authorization profile is created for the individual including all those transactions and
assigned to him.
• In role-based authorization, an organization creates a set of roles based on organization's
functions and anyone performing that function will get that role and access to a set of
transactions associated with the role. Role can be sales manager, sales supervisor,
production manager, material manager, store clerk, etc.
• Data security is another important issue for the company going for ERP implementation and
technology like data masking can help here.
6
7
THANK YOU