*SAP CRMLocation : Houston,TXDuration: 6+ months*
Phone interview then possible F2F Large Electricity Company Aside from the obvious differences of different system so different tcodes. And depending upon which elements of CRM are implemented, there are a couple of big differences. 1. A lot of functionality is executed via BSPs (business server pages) that are run on a browser, but authorizations are still in the backend. What that means for security is that you can rely on a tcode defaulting the auth objects. 2. Depending upon what and how things are implemented, there are often RFC calls to another system like ECC from CRM - so you may actually need to build ECC roles as well. · CRM Security - role design and implementation · ECC Security including HR Security (Position based security and PD profiles) - role design and implementation · Hana and BW Security - role design and implementation · SCM EWM Security - role design and implementation · Solution Manager Security - role design and implementation The environments are listed in order of importance to our current project workload. That said, I would really like to see someone that has designed security for an EWM implementation. The initial duration would be 3 months with a possible extension. Warm Regards, *Alvin Paul* alvin.p...@panzersolutions.com alvinpau...@gmail.com Panzer Solutions LLC 45 Stuart Ave, Unit K,Norwalk CT 06850. Phone#: 203-652-1444*159 | Fax: 203-286-1457 -- You received this message because you are subscribed to the Google Groups "Open Source Erp & Crm" group. To unsubscribe from this group and stop receiving emails from it, send an email to open-source-erp-crm+unsubscr...@googlegroups.com. To post to this group, send email to open-source-erp-crm@googlegroups.com. Visit this group at http://groups.google.com/group/open-source-erp-crm. For more options, visit https://groups.google.com/d/optout.