Search
Close this search box.

Design Roles In A Virtual Drag & Drop Cockpit

Role redesign projects are time-consuming and expensive, which is why many organizations delay them (or avoid them altogether). One of the problems with role redesign projects is that they involve a variety of different stakeholders beyond the technical teams, including regular end-users, whose productivity may suffer as a result of such projects.

Xiting has developed the Xiting Authorizations Management Suite (XAMS), which automates and simplifies many of the tasks involved in a role redesign project, including:

  • Analyzing and identifying issues in the current role concept
  • Optimizing SU24 to improve the quality of roles
  • Maintaining organizational fields and batch-processing of roles
  • Preventing and mitigating SoD conflicts
  • Simulating the impact of role changes
  • Automating role testing with zero end-user involvement
  • Reducing the risk during go-live
  • Automated scanning of custom ABAP code for missing authority checks
  • Optimizing SAP licensing by tuning the roles of over-authorized users
  • Simplifying SAP security audits

Our Solution

The following XAMS module can help you reduce the effort involved in designing, updating and maintaining security roles.

Role Designer

Create sustainable authorization concepts, perform a what-if analysis, scan for SoD conflicts during the design phase, and quickly migrate roles to SAP S/4HANA using a virtual role design cockpit.

Do you want to simplify your next role redesign?

Let’s chat to discuss how our automation solutions can help you reach your SAP security goals!

Get our XAMS use Case Booklet!

Download here

Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now