{"id":1722,"date":"2021-08-23T11:19:53","date_gmt":"2021-08-23T09:19:53","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1722"},"modified":"2021-08-23T11:20:53","modified_gmt":"2021-08-23T09:20:53","slug":"role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/","title":{"rendered":"Role conversion is anything but child\u2019s play \u2013 but you can still execute your SAP S\/4HANA authorization projects quickly and securely"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1723 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz-300x225.jpg\" alt=\"Roozbeh Noori-Amoli (SAST SOLUTIONS)\" width=\"300\" height=\"225\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz-300x225.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz.jpg 630w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>A survey was conducted during an ITOK expert talk on the greatest challenges for SAP security in March. It revealed that over half the participants see such challenges in the area of roles and authorizations.\u00a0The integration of the authorization concept represents one of the core activities during SAP S\/4HANA implementation and is a frequent reason for the failure of such projects as a whole. But how can you handle conflicts like resource bottlenecks, shifting priorities for subprojects, changes to tasks, and testing?<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>In an interview with <strong>Ulrich Parthier, publisher of <em>it management<\/em> magazine<\/strong>, Roozbeh Noori-Amoli, Deputy Head SAST CONSULTING, explains why the right authorization concept can be a decisive factor in the success and dynamism of the transformation, alongside the selected approach and the project management.<\/p>\n<h2><strong>Mr. Noori-Amoli, you just completed a successful global role conversion project with PUMA SE. What are the most important things to consider before tackling an SAP S\/4HANA migration?<\/strong><\/h2>\n<p><strong><em>Roozbeh Noori-Amoli:<\/em>\u00a0<\/strong>The first consideration, of course, is which approach is best for the project: greenfield, brownfield, or bluefield. For the methodology, you have to decide between classic and agile project management. And then comes the question: What will my <a href=\"https:\/\/sast-solutions.com\/sap-authorization-consulting.html\" target=\"_blank\" rel=\"noopener\">authorization concept<\/a> look like? Will it be based on the sole proposal from a consultant or a best-practice approach that fails to take your company and its project-specific needs into account, as is so often the case? Because that\u2019s the cardinal mistake already: It is essential for you to familiarize yourself with the advantages and disadvantages of the various concepts, any of which could be feasible depending on the situation. If you made the wrong choice, you often won\u2019t even notice until many days spent on implementation effort have already passed \u2013 or even worse, not until the system is being used for everyday work. The subsequent correction can demand a lot of costly effort.<\/p>\n<h2><strong>How can you identify the right authorization concept among the wide variety that is available?<\/strong><\/h2>\n<p><strong><em>Roozbeh Noori-Amoli:<\/em><\/strong>\u00a0To do so, the most important questions have to be clarified ahead of time: What are the company\u2019s actual needs, what are the project objectives, and what level of security is required? How much budget, time, and staff resources are available? Limiting factors such as the existing organizational structures and processes, the number of SAP users, and the fundamental type and architecture of the system already provide a fixed framework. The objectives are then prioritized based on the selected IT strategy. Ultimately, the choice of authorization concept means striking a balance between the need for high security, with custom-tailored authorizations, and the desire to minimize the administrative effort needed. The trade-off could be formulated as the assignment of minimal authorizations versus the standardization of processes.<\/p>\n<h2><strong>Can you describe a few scenarios in which a particular concept would be preferred?<\/strong><\/h2>\n<p><strong><em>Roozbeh Noori-Amoli:<\/em><\/strong>\u00a0For an international organization with many identical business units and repetitive processes, for example, the template role approach with derivations by organizational unit or the menu\/value role concept would work well. If a company has extremely high security requirements and the desire to grant authorizations precisely, while keeping the number of transactions for each user low and running a system with just a few, yet different processes, I recommend the 1 transaction \u2013 1 role concept.<\/p>\n<h2><strong>In your experience, are there specific examples of better and poorer choices?<\/strong><\/h2>\n<p><strong><em>Roozbeh Noori-Amoli:<\/em><\/strong> Yes, that can be demonstrated based on a well-considered and less well-considered decision in favor of the same authorization concept. Our customer PUMA, with around 14,000 employees in 50 countries, had many country-specific custom developments and interfaces, along with high compliance requirements. The project encompassed the launch of the migration in four countries and different SAP ERP systems\u00a0to SAP S\/4HANA. Due to the many organizational units, distributed processes, and critical country specifics, the challenge was to create a global authorization concept that could then be rolled out in-depth at the country level. We ultimately decided on process-based single roles with functional workplace composite roles for PUMA, because there are many units that are similar, administered centrally, with central auditing and a standard concept with special roles, as well as derivation via organizational levels. The customer is now very satisfied, particularly since we chose an agile project management approach that supported a rapid, dynamic, flexible implementation.<\/p>\n<h2><strong>And what about the poorer decision?<\/strong><\/h2>\n<p><em><strong>Roozbeh Noori-Amoli:<\/strong>\u00a0<\/em>The same concept isn\u2019t right for everyone, as a different S\/4HANA project made clear: The customer insisted on implementing this authorization concept without any prior consultation. However, the workshops with the user departments quickly revealed that the options for separating users into homogeneous groups and implementing clear separation of the individual processes were actually quite limited. As a result, we were able to ultimately convince the customer to choose a hybrid authorization concept that better supported the given situation with country and department specifics.<\/p>\n<h2><strong>Based on your lessons learned, what suggestions do you have for ensuring the success of a S\/4HANA role conversion?<\/strong><\/h2>\n<p><strong><em>Roozbeh Noori-Amoli:<\/em><\/strong>\u00a0It is important to schedule time for testing from the beginning and to ensure detailed coordination between test management, training management, and the authorization team. An agile project management structure delivers major advantages here: The integration tests, regression tests, and authorization tests are carried out in parallel, instead of being considered separately. The entire topic should be tackled at an early stage, together with the user departments. Your ultimate goal should be to reach decisions regarding the role contents for all departments and to create customer-specific catalogs and groups, to avoid having to fall back on the cluttered SAP standard. Another insight: away from authorization teams and towards user managers in each user department. We recommend using specific <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener\">tool support<\/a>. You will need standard templates for default roles for testing, as well as clean, SoD-free roles. In addition to testing authorizations to confirm they work, you also have to conduct negative tests. To avoid interruptions to everyday business, I highly recommend taking a safe go-live approach. Last but not least, it is important to allocate enough time and resources, because this isn\u2019t something that you can simply do alongside your day-to-day business activities.<\/p>\n<p><strong>Mr. Noori-Amoli, thank you for the interview.<\/strong><\/p>\n<p><strong>\u00a0<\/strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1724 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz-itdailynet-300x224.jpg\" alt=\"Roozbeh Noori-Amoli_itdailynet\" width=\"300\" height=\"224\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz-itdailynet-300x224.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz-itdailynet.jpg 538w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>This article was originally published in <strong>IT Management magazine, July\/August 2021<\/strong> issue and is available free of charge from the online reader service on <a href=\"https:\/\/www.it-daily.net\/\" target=\"_blank\" rel=\"noopener\">it-daily.net<\/a>: <a href=\"https:\/\/www.it-daily.net\/leser-service\" target=\"_blank\" rel=\"noopener\">https:\/\/www.it-daily.net\/leser-service<\/a> (in German).<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Further postings on the topic:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Yu1lqKSyWk\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/08\/10\/starting-migration-project-consider-converting-sap-erp-authorizations-to-sap-s-4hana\/\">Starting a migration project? Consider these things when converting SAP ERP authorizations to SAP S\/4HANA<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Starting a migration project? Consider these things when converting SAP ERP authorizations to SAP S\/4HANA&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/08\/10\/starting-migration-project-consider-converting-sap-erp-authorizations-to-sap-s-4hana\/embed\/#?secret=Yu1lqKSyWk\" data-secret=\"Yu1lqKSyWk\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"AJn0suzcY6\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/02\/06\/sap-s-4hana-authorizations-choice-brownfield-or-greenfield\/\">SAP S\/4HANA authorizations \u2013 it\u2019s your choice: brownfield or greenfield<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP S\/4HANA authorizations \u2013 it\u2019s your choice: brownfield or greenfield&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/02\/06\/sap-s-4hana-authorizations-choice-brownfield-or-greenfield\/embed\/#?secret=AJn0suzcY6\" data-secret=\"AJn0suzcY6\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A survey was conducted during an ITOK expert talk on the greatest challenges for SAP security in March. It revealed that over half the participants see such challenges in the area of roles and authorizations.\u00a0The integration of the authorization concept represents one of the core activities during SAP S\/4HANA implementation and is a frequent reason [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[67,64,153,163,68],"class_list":["post-1722","post","type-post","status-publish","format-standard","hentry","category-sap-authorizations-grc","tag-identity-management","tag-role-management","tag-s-4hana","tag-s4hana-migration","tag-sap-authorizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Role Conversion: How to execute S\/4HANA authorisation projects securely<\/title>\n<meta name=\"description\" content=\"In the S\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Role Conversion: How to execute S\/4HANA authorisation projects securely\" \/>\n<meta property=\"og:description\" content=\"In the S\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-23T09:19:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-23T09:20:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"630\" \/>\n\t<meta property=\"og:image:height\" content=\"472\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Role Conversion: How to execute S\/4HANA authorisation projects securely\" \/>\n<meta name=\"twitter:description\" content=\"In the S\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Role conversion is anything but child\u2019s play \u2013 but you can still execute your SAP S\\\/4HANA authorization projects quickly and securely\",\"datePublished\":\"2021-08-23T09:19:53+00:00\",\"dateModified\":\"2021-08-23T09:20:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/\"},\"wordCount\":1108,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Rooz-300x225.jpg\",\"keywords\":[\"Identity Management\",\"Role Management\",\"S\\\/4HANA\",\"S\\\/4HANA Migration\",\"SAP Authorizations\"],\"articleSection\":[\"SAP Authorizations &amp; GRC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/\",\"name\":\"Role Conversion: How to execute S\\\/4HANA authorisation projects securely\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Rooz-300x225.jpg\",\"datePublished\":\"2021-08-23T09:19:53+00:00\",\"dateModified\":\"2021-08-23T09:20:53+00:00\",\"description\":\"In the S\\\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Rooz.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Rooz.jpg\",\"width\":630,\"height\":472,\"caption\":\"Roozbeh Noori-Amoli (SAST SOLUTIONS)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/08\\\/23\\\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Role conversion is anything but child\u2019s play \u2013 but you can still execute your SAP S\\\/4HANA authorization projects quickly and securely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Role Conversion: How to execute S\/4HANA authorisation projects securely","description":"In the S\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/","og_locale":"en_US","og_type":"article","og_title":"Role Conversion: How to execute S\/4HANA authorisation projects securely","og_description":"In the S\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/","og_site_name":"SAST BLOG","article_published_time":"2021-08-23T09:19:53+00:00","article_modified_time":"2021-08-23T09:20:53+00:00","og_image":[{"width":630,"height":472,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Role Conversion: How to execute S\/4HANA authorisation projects securely","twitter_description":"In the S\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Role conversion is anything but child\u2019s play \u2013 but you can still execute your SAP S\/4HANA authorization projects quickly and securely","datePublished":"2021-08-23T09:19:53+00:00","dateModified":"2021-08-23T09:20:53+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/"},"wordCount":1108,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz-300x225.jpg","keywords":["Identity Management","Role Management","S\/4HANA","S\/4HANA Migration","SAP Authorizations"],"articleSection":["SAP Authorizations &amp; GRC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/","name":"Role Conversion: How to execute S\/4HANA authorisation projects securely","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz-300x225.jpg","datePublished":"2021-08-23T09:19:53+00:00","dateModified":"2021-08-23T09:20:53+00:00","description":"In the S\/4HANA migration, the greatest challenges lie in the area of roles and authorisations. It all depends on the right concept.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/08\/Rooz.jpg","width":630,"height":472,"caption":"Roozbeh Noori-Amoli (SAST SOLUTIONS)"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/08\/23\/role-conversion-is-anything-but-childs-play-execute-sap-s4hana-authorization-projects-quickly-securely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Role conversion is anything but child\u2019s play \u2013 but you can still execute your SAP S\/4HANA authorization projects quickly and securely"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1722"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1722\/revisions"}],"predecessor-version":[{"id":1727,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1722\/revisions\/1727"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}