Security role granting using Workflow
Susan R. Keohan
keohan at ll.mit.edu
Wed Jul 14 11:48:11 EDT 2004
Hi Paul,
The presentation was given by Tracey Lawson and Rob Tannert of Oak Ridge National Laboratories.
ASUG members can access presentations given at past conferences by logging into www.asug.com and
going to the 'Events' tab, and choosing past conferences. From there, you would look for
'Presentations' and would be given a screen to fill out your search criteria. The session in
question is:
603: Security Management using Workflow
Happy hunting!
Sue
Rivera, Raul wrote:
> Adding to Justin's posting below, is it possible to get hold of the
> presentation material (Power Point or white paper). The same idea has been
> floated in our company.
>
> Thanks,
> Raul Rivera
> Accenture Business Services for Utilities
>
> -----Original Message-----
>> From: SAP Workflow [mailto:Owner-SAP-WUG at MITVMA.MIT.EDU] On Behalf Of Justin
> Dauby
> Sent: Wednesday, July 14, 2004 7:38 AM
> To: SAP-WUG at MITVMA.MIT.EDU
> Subject: Security role granting using Workflow
>
> I saw a presentation given at the April ASUG in Atlanta on Security
> Management using WorkFlow. We are currently on 4.6C and discussing
> possibilities to automate the role granting process. I was wondering if
> anyone could share some success or failures with ideas of things that
> could help us or things to stay away from.
>
> Thanks!
>
>
> Justin Dauby - Kimball International Inc.
>
--
Susan R. Keohan
SAP Workflow Developer
MIT Lincoln Laboratory
244 Wood Street
LI-200
Lexington, MA. 02420
781-981-3561
keohan at ll.mit.edu
More information about the SAP-WUG
mailing list