Thank you for the demonstration. I would appreciate it if you could clarify the following points to better understand the implementation and design of authorizations on a larger scale: How were the "Authorizations" implemented in your demonstration? How can we effectively segregate the roles of authorization experts and developers in a larger project? Can this concept be managed through "SAP Access Control" with connectors, or does it require entirely siloed authorization management? Your input on these questions would be highly valuable.
I really like this TechBytes. They are really useful!
Thank you for the demonstration. I would appreciate it if you could clarify the following points to better understand the implementation and design of authorizations on a larger scale:
How were the "Authorizations" implemented in your demonstration?
How can we effectively segregate the roles of authorization experts and developers in a larger project?
Can this concept be managed through "SAP Access Control" with connectors, or does it require entirely siloed authorization management?
Your input on these questions would be highly valuable.
hi, kindly check the latest TechByte video on ABAP CDS Troubleshooting.. The authorisation details is covered..
Thanks a lot. I have a question, CDS Access control is possible for CDS in CAP Model? Or how to reuse it from CAP services?
Hi, Kindly check this: cap.cloud.sap/docs/guides/security/authorization