*SAP CRMLocation : Houston,TXDuration: 6+ months*
Phone interview then possible F2F Large Electricity Company Aside from the obvious differences of different system so different tcodes. And depending upon which elements of CRM are implemented, there are a couple of big differences. 1. A lot of functionality is executed via BSPs (business server pages) that are run on a browser, but authorizations are still in the backend. What that means for security is that you can rely on a tcode defaulting the auth objects. 2. Depending upon what and how things are implemented, there are often RFC calls to another system like ECC from CRM - so you may actually need to build ECC roles as well. · CRM Security - role design and implementation · ECC Security including HR Security (Position based security and PD profiles) - role design and implementation · Hana and BW Security - role design and implementation · SCM EWM Security - role design and implementation · Solution Manager Security - role design and implementation The environments are listed in order of importance to our current project workload. That said, I would really like to see someone that has designed security for an EWM implementation. The initial duration would be 3 months with a possible extension. Warm Regards, *Alvin Paul* alvin.p...@panzersolutions.com alvinpau...@gmail.com Panzer Solutions LLC 45 Stuart Ave, Unit K,Norwalk CT 06850. Phone#: 203-652-1444*159 | Fax: 203-286-1457 -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to sap-or-oracle-financials@googlegroups.com. Visit this group at http://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.