SAP Access Control Implementation and Configuration

Astute360corp > SAP Access Control Implementation and Configuration
  • Introduction to Access Governance using SAP Access Control
    • Business Challenges and Solutions
    • SAP Access Control Functionality and Integration Scenarios
  • Identification and Management of Access Risk
    • Identifying Access Risks
    • The Access Risk Management Process
  • User Experience, Security Concepts and System Architecture
    • User Access and the User Experience
    • User Access using the SAP Business Client
    • User Access using SAP Fiori Launchpad
    • SAP Access Control System Architecture
  • Configuration Overview
    • Shared SAP GRC Settings
    • SAP Access Control Specific Settings
    • SAP Access Control Business Configuration (BC) Set Overview
    • Managing the Access Control Repository
  • Risk Analysis
    • Maintaining Master Data and Access Control Owners
    • Risk Recognition
    • Rule Building and Validation
    • Access Risk Analysis
    • Risk Remediation
    • Risk Mitigation
    • Continuous Compliance
    • Appendix: (Optional) Access Risk Analysis Parameter Configuration
  • SAP Business Rule Framework (BRFplus)
    • Introduction to Business Rules and Business Rule Management Systems
    • Defining MSMP Workflow-Related Rules using SAP Business Rule Framework BRFplus
    • Configuration and Maintenance of MSMP Workflow-Related Rules
  • Multi-Stage, Multi-Path (MSMP) Workflow
    • Introducing Multi-Stage, Multi-Path (MSMP) Workflow
    • Implementing Multi-Stage, Multi-Path (MSMP) Workflow
  • User Provisioning
    • Configuring User Provisioning Settings
    • Configuring Access Request Forms
    • Preparing Roles and Owner Data for MSMP Workflow
    • Requesting Access
    • Reviewing Search Request Results
    • Appendix: (Optional) User Provisioning Parameter Settings
  • Role Design and Management
    • Configuring Role Management
    • Configuring Role Methodology
    • Configuring Role Search Attributes
    • Planning for Technical Role Definition
    • Planning for Business Role Definition
    • Consolidating Roles Through Role Mining
    • Performing Role Mass Maintenance Operations
    • Appendix (Optional) Evaluate Parameters for Role Management
  • Emergency Access Management
    • Describing Emergency Access Management
    • Planning for Emergency Access Management
    • Monitoring Emergency Access
    • Appendix (Optional) Evaluate Parameters for Emergency Access Management
  • Periodic Access Review Process
    • Planning Periodic Review
    • Monitoring Periodic Review
    • Appendix (Optional) Evaluate Parameters for Periodic Access Review
  • Appendix (Optional) Maintaining Custom Fields
    • Maintaining Custom Fields

 

For Demo