Roles
Implementation of your user and security management
If the additional memory in the Advanced Storage Area is still not sufficient for the user context, the optional second role area can be used. The size of the second roll range is determined by the difference between the parameters ztta/roll_first and ztta/roll_area. Rolling range has been eliminated in kernel release 7.4, so these parameters are obsolete from then on. Instead, the user context is now stored directly in the Advanced Memory.
Although you always make sure that authorization roles are generated when administering them, it happens again and again that there are red lights in the user assignment in the production systems. Have you considered user matching?
Solutions for production environments and as proof of concept (PoC)
It is essential to define the role to be played within the company. STEP 4: DETERMINATION OF THE TARGET GROUP In this step, the target group of the service is defined and described in detail, e.g. by means of a letter. It will also discuss future target groups which may be of interest in the future. By defining a target group within a company, the SAP basis decides for whom the services and IT products should be delivered. It also makes sense to identify and describe future target groups (e.g. specialist areas) within the framework of a transformation of the SAP basis. STEP 5: POSITIONING This step will position the service on the market and also position the competitors in the relevant segment.
A degree in computer science is usually a prerequisite and is now almost compulsory. Those who have been trained as IT specialists can take advantage of further training to become SAP Basis Administrators and thus position themselves particularly well on the job market. However, quite a few companies also offer to train employees to make them fit to work as SAP Basis Administrators.
Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.
At the same time, through the respective SMEs, the concept creates expertise in specific topics and enables communication on an equal footing with upstream or downstream IT departments as well as with external service providers.
At this point you will again have the possibility to perform the approval step you really want to perform.