Business Scenario:
What is our level of detail for security?
Which enterprise-wide job roles do we need?
How do we implement security?
How do we get the authorizations?
What is different to the way we do it today?
- Authorization profiles will be defined based on selected business transaction (we use activity groups as data container for this selection)