{"id":11747,"date":"2024-07-03T10:27:26","date_gmt":"2024-07-03T08:27:26","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=11747"},"modified":"2024-07-03T10:27:59","modified_gmt":"2024-07-03T08:27:59","slug":"benefits-of-using-a-role-model-based-on-best-practices-composite-roles","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/","title":{"rendered":"Benefits of Using a Role Model based on Best Practices &#038; Composite Roles"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In this article, we will examine some of the benefits of having a role model defined based on SAP\u00ae&#8217;s best practices, as well as a composite role model, in our SAP\u00ae system.<\/span><\/p>\n\n<h2><b>Role Model based on Best Practices<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">We will review the main points to consider when defining our role model:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Logical Definition of Role Model<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Role Naming Convention<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Organizational Value Matrix<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Organizational Structure<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Risk Matrix<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Transactional Use<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It is essential to define the <\/span><b>logic <\/b><span style=\"font-weight: 400;\">of our model should follow beforehand. When dealing with an ECC system, it is often advisable to use a model of Master Roles and Derived Roles, employing Enabler Roles where necessary. For instance, to impose a specific restriction on a non-organizational value field or a custom object enabling a particular functionality.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-11749\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/1-1.png\" alt=\"\" width=\"511\" height=\"174\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/1-1.png 511w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/1-1-300x102.png 300w\" sizes=\"(max-width: 511px) 100vw, 511px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Keeping in mind the logic best suits us for our model, we will define the <\/span><b>naming convention<\/b><span style=\"font-weight: 400;\"> of roles. It is important to strive to use the 30 characters allowed by SAP\u00ae to their fullest, ensuring that each character adds value. This approach will be highly beneficial for conducting searches through tables or easily identifying the roles we wish to assign. For instance, whether they allow modification or viewing access, which functional areas the included accesses belong to, if it is a master or derived role, which business unit it applies to, a brief description of the role&#8217;s functionality using abbreviations\u2026<\/span><\/p>\n<figure id=\"attachment_11751\" aria-describedby=\"caption-attachment-11751\" style=\"width: 774px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-11751\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/2-1.png\" alt=\"\" width=\"774\" height=\"76\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/2-1.png 774w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/2-1-300x29.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/2-1-600x59.png 600w\" sizes=\"(max-width: 774px) 100vw, 774px\" \/><figcaption id=\"caption-attachment-11751\" class=\"wp-caption-text\">(Example of Naming convention)<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">In our naming convention, it is also important to leave characters for identifying the <\/span><b>organizational value<\/b><span style=\"font-weight: 400;\"> (the plant, company, etc.) restricted by our derived role. Moreover, understanding how different organizational values interrelate is crucial in order to maintain the roles properly. For example, deriving our role at the plant level does not mean it will only contain this organizational value. It is important to know which other values, such as sales or purchasing organization, are associated with each plant to prevent unauthorized access to other organizational units.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having a clearly defined <\/span><b>organizational structure<\/b><span style=\"font-weight: 400;\"> at the department and user position level helps us define our composite roles, which we will discuss later.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Classifying transactions in roles requires keeping our <\/span><b>Risk Matrix<\/b><span style=\"font-weight: 400;\"> (or SAP\u00ae&#8217;s standard one if we don&#8217;t have a custom one) in mind and creating roles based on functionalities, such as &#8220;create suppliers.&#8221; This approach prevents internal segregation of duties risks in our roles and maximizes the reduction of risks in our system.<\/span><\/p>\n<figure id=\"attachment_11753\" aria-describedby=\"caption-attachment-11753\" style=\"width: 703px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-11753\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/3-1.png\" alt=\"\" width=\"703\" height=\"683\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/3-1.png 703w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/3-1-300x291.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/3-1-600x583.png 600w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><figcaption id=\"caption-attachment-11753\" class=\"wp-caption-text\">(Risk Matrix Relations)<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Accesses should be differentiated in our roles between Display or Change (which should be easily identifiable in our role naming convention). Certain transactions may have this dual functionality, depending on the activities we select in the objects checked by the transaction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To facilitate the assignment of transactions, it is advisable that each transaction is in a maximum of two roles, as long as it can be restricted to Display or Change. It is important to verify that none of our viewing roles are providing modification access. However, we could add the viewing transactions in the modification roles of the same functionality. This way, if a user only needs to view materials, they are given the specific display role, but if they need to modify materials, giving them the modification role would include both Change and Display accesses without the need to assign two roles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once we have defined and created our role model, we will base it on <\/span><b>transactional use<\/b><span style=\"font-weight: 400;\"> to give each user only what they use. It is advisable to use as broad a transactional use as possible, covering month and year-end closures.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Benefits of Role Model based on Best Practices<\/b><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Creation of a flexible model that adapts to the different requirements the company has or may have.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An intuitive model that speeds up the identification of the role or roles we need.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Allows specific assignment to the organizational values required by users. Thus, they cannot view or modify data from other business units to which they do not belong.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Facilitates the reduction of risks in the system. For instance, if the company decides to activate a new risk that was not being monitored, it is easy to identify which roles are giving that risk and to remove that access from users who do not require it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reduces the number of Professional Licenses assigned. As access in the system is highly restricted, we avoid having to give a professional license to a user who does not require it due to being over-authorized.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Simplifies access identification in user provisioning.<\/span><\/li>\n<\/ul>\n<h2><b>Composite Role Model<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Once we have our roles with our transactions created, SAP\u00ae allows us to create Composite Roles. These are roles that contain other roles. That is, we would make groupings of our defined permissions, for example, at the job position level.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-11755\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/4-1.png\" alt=\"\" width=\"226\" height=\"241\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For the definition of composite roles, having a clear <\/span><b>organizational structure<\/b><span style=\"font-weight: 400;\"> is essential, and thus we can properly design our composite roles, avoiding adding roles that give access to transactions that do not correspond to the position.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Next, we show different low-level examples of how the different positions in each department could be segregated.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-11757\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/5-1.png\" alt=\"\" width=\"432\" height=\"361\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/5-1.png 432w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/5-1-300x251.png 300w\" sizes=\"(max-width: 432px) 100vw, 432px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Clearly, all our users in SAP\u00ae should have their department and job position properly indicated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The creation of composite roles is recommended but not essential; it would be like a second phase of improvement after having created our role model based on best practices. It should be highlighted that a composite role model cannot be created without first carrying out all the steps mentioned at the beginning of the article, as these composite roles will contain our previously designed and created roles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Again, <\/span><b>transactional use<\/b><span style=\"font-weight: 400;\"> will be of great value for defining the accesses that will make up our composite roles. It will also be necessary to keep the risk matrix in mind, to reduce the risks of the composite role to the maximum.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It may be necessary to create several composite roles for each Department and Position based on the segregation of access at the <\/span><b>organizational value<\/b><span style=\"font-weight: 400;\"> level. For example, in the company, there are 5 sales managers, but each one manages for each of the 5 plants the company has. Therefore, all should have the same accesses, but each one restricted to a specific plant. This should be clearly indicated in the naming convention of the composite roles.<\/span><\/p>\n<h2><b>Benefits of Composite Role Model<\/b><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reduction in the number of incidents at the access request level. The reported incident will be resolved for the entire department, not just for the user making the request.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">More efficient management of tickets.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The accesses that users have are clearly identified, facilitating the onboarding of a new user in SAP\u00ae.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Simplification of the &#8220;movers&#8221; process within the company, since it would be easily identifiable the accesses of the new position, and an end date of validity could be set for the position they will no longer belong to while making the transition.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Immediate identification of the type of License required by composite role (Department and Position).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automation of the registration process through integration with IDM (Identity Management System). A relationship between the job position and the SAP\u00ae role would be created, and the IDM system would perform automatic provisioning.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this article, we will examine some of the benefits of having a role model defined based on SAP\u00ae&#8217;s best practices, as well as a composite role model, in our SAP\u00ae system. Role Model based on Best Practices We will review the main points to consider when defining our role model: Logical Definition of Role&#8230;<\/p>\n","protected":false},"author":6,"featured_media":11761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[52],"tags":[],"class_list":["post-11747","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Benefits of Using a Role Model based on Best Practices &amp; Composite Roles - Inprosec<\/title>\n<meta name=\"description\" content=\"Discover the benefits of having a defined role model in your SAP system. In this article, we explore the best practices recommended by SAP and how to implement them effectively. Learn how to structure your role model, improve security, and optimize access management for greater efficiency in your company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Benefits of Using a Role Model based on Best Practices &amp; Composite Roles\" \/>\n<meta property=\"og:description\" content=\"Discover the benefits of having a defined role model in your SAP system. In this article, we explore the best practices recommended by SAP and how to implement them effectively. Learn how to structure your role model, improve security, and optimize access management for greater efficiency in your company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-03T08:27:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-03T08:27:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/modelo-de-roles-en-buenas-practicas.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"Benefits of Using a Role Model based on Best Practices &#038; Composite Roles\",\"datePublished\":\"2024-07-03T08:27:26+00:00\",\"dateModified\":\"2024-07-03T08:27:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/\"},\"wordCount\":1208,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/modelo-de-roles-en-buenas-practicas.jpg\",\"articleSection\":[\"Technical Article\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/\",\"name\":\"Benefits of Using a Role Model based on Best Practices & Composite Roles - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/modelo-de-roles-en-buenas-practicas.jpg\",\"datePublished\":\"2024-07-03T08:27:26+00:00\",\"dateModified\":\"2024-07-03T08:27:59+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"Discover the benefits of having a defined role model in your SAP system. In this article, we explore the best practices recommended by SAP and how to implement them effectively. Learn how to structure your role model, improve security, and optimize access management for greater efficiency in your company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/modelo-de-roles-en-buenas-practicas.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/modelo-de-roles-en-buenas-practicas.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Benefits of Using a Role Model based on Best Practices &#038; Composite Roles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Benefits of Using a Role Model based on Best Practices & Composite Roles - Inprosec","description":"Discover the benefits of having a defined role model in your SAP system. In this article, we explore the best practices recommended by SAP and how to implement them effectively. Learn how to structure your role model, improve security, and optimize access management for greater efficiency in your company.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/","og_locale":"en_US","og_type":"article","og_title":"Benefits of Using a Role Model based on Best Practices & Composite Roles","og_description":"Discover the benefits of having a defined role model in your SAP system. In this article, we explore the best practices recommended by SAP and how to implement them effectively. Learn how to structure your role model, improve security, and optimize access management for greater efficiency in your company.","og_url":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/","og_site_name":"Inprosec","article_published_time":"2024-07-03T08:27:26+00:00","article_modified_time":"2024-07-03T08:27:59+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/modelo-de-roles-en-buenas-practicas.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"Benefits of Using a Role Model based on Best Practices &#038; Composite Roles","datePublished":"2024-07-03T08:27:26+00:00","dateModified":"2024-07-03T08:27:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/"},"wordCount":1208,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/modelo-de-roles-en-buenas-practicas.jpg","articleSection":["Technical Article"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/","url":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/","name":"Benefits of Using a Role Model based on Best Practices & Composite Roles - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/modelo-de-roles-en-buenas-practicas.jpg","datePublished":"2024-07-03T08:27:26+00:00","dateModified":"2024-07-03T08:27:59+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"Discover the benefits of having a defined role model in your SAP system. In this article, we explore the best practices recommended by SAP and how to implement them effectively. Learn how to structure your role model, improve security, and optimize access management for greater efficiency in your company.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/modelo-de-roles-en-buenas-practicas.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/06\/modelo-de-roles-en-buenas-practicas.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/benefits-of-using-a-role-model-based-on-best-practices-composite-roles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Benefits of Using a Role Model based on Best Practices &#038; Composite Roles"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/11747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=11747"}],"version-history":[{"count":3,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/11747\/revisions"}],"predecessor-version":[{"id":11771,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/11747\/revisions\/11771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/11761"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=11747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=11747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=11747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}