*SAP CRMLocation : Houston,TXDuration: 6+ months*

Phone interview then possible F2F
Large Electricity Company

Aside from the obvious differences of different system so different tcodes.
And depending upon which elements of CRM are implemented, there are a
couple of big differences.

1. A lot of functionality is executed via BSPs (business server pages) that
are run on a browser, but authorizations are still in the backend. What
that means for security is that you can rely on a tcode defaulting the auth
objects.
2. Depending upon what and how things are implemented, there are often RFC
calls to another system like ECC from CRM - so you may actually need to
build ECC roles as well.

·         CRM Security - role design and implementation
·         ECC Security including HR Security (Position based security and
PD profiles) - role design and implementation
·         Hana and BW Security - role design and implementation
·         SCM EWM Security - role design and implementation
·         Solution Manager Security - role design and implementation

The environments are listed in order of importance to our current project
workload. That said, I would really like to see someone that has designed
security for an EWM implementation. The initial duration would be 3 months
with a possible extension.


Warm Regards,
*Alvin Paul*
alvin.p...@panzersolutions.com
alvinpau...@gmail.com
Panzer Solutions LLC
45 Stuart Ave, Unit K,Norwalk CT 06850.
Phone#: 203-652-1444*159 | Fax: 203-286-1457

-- 
You received this message because you are subscribed to the Google Groups "Open 
Source Erp & Crm" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to open-source-erp-crm+unsubscr...@googlegroups.com.
To post to this group, send email to open-source-erp-crm@googlegroups.com.
Visit this group at http://groups.google.com/group/open-source-erp-crm.
For more options, visit https://groups.google.com/d/optout.

Reply via email to