Is Role-Based Access Control Sufficient?

By Soujanya Madhurapantula. In SAP’s role-based security architecture, Users and Authorization objects are used to create profiles, such as “buyer” or “payer”, and these are used to define functional roles. As a counter measure for potential fraud, the GRC Access Control Segregation of Duties can dictate that a user should not have, for example, both … More Is Role-Based Access Control Sufficient?