*SAP CRMLocation : Houston,TXDuration: 6+ months*

Phone interview then possible F2F
Large Electricity Company

Aside from the obvious differences of different system so different tcodes.
And depending upon which elements of CRM are implemented, there are a
couple of big differences.

1. A lot of functionality is executed via BSPs (business server pages) that
are run on a browser, but authorizations are still in the backend. What
that means for security is that you can rely on a tcode defaulting the auth
objects.
2. Depending upon what and how things are implemented, there are often RFC
calls to another system like ECC from CRM - so you may actually need to
build ECC roles as well.

·         CRM Security - role design and implementation
·         ECC Security including HR Security (Position based security and
PD profiles) - role design and implementation
·         Hana and BW Security - role design and implementation
·         SCM EWM Security - role design and implementation
·         Solution Manager Security - role design and implementation

The environments are listed in order of importance to our current project
workload. That said, I would really like to see someone that has designed
security for an EWM implementation. The initial duration would be 3 months
with a possible extension.


Warm Regards,
*Alvin Paul*
alvin.p...@panzersolutions.com
alvinpau...@gmail.com
Panzer Solutions LLC
45 Stuart Ave, Unit K,Norwalk CT 06850.
Phone#: 203-652-1444*159 | Fax: 203-286-1457

-- 
You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to