![Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access](https://www.ibm.com/blogs/security-identity-access/wp-content/uploads/2018/08/SAP-Authorization-Model.png)
Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access
![SAP Basis For Beginner: How to search for composite role by using single role that attached to it and vice versa SAP Basis For Beginner: How to search for composite role by using single role that attached to it and vice versa](http://3.bp.blogspot.com/-GNHIYuTGz9A/UeUF9ipOr9I/AAAAAAAAA4g/1YTfIo07R7Q/s1600/pic2.gif)
SAP Basis For Beginner: How to search for composite role by using single role that attached to it and vice versa
![Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access](https://www.ibm.com/blogs/security-identity-access/wp-content/uploads/2018/08/SAP-Authzns-for-a-Role.png)
Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access
![SAP Basis For Beginner: How to search for composite role by using single role that attached to it and vice versa SAP Basis For Beginner: How to search for composite role by using single role that attached to it and vice versa](http://2.bp.blogspot.com/-C33YePJnIyc/UeUF9mB6QJI/AAAAAAAAA4c/aDKbqUxLUsM/s1600/pic1.gif)