• Access Control Implementation and Configuration (GRC300)

    < Terug naar vorige pagina
    Training code
    SAPROM0223
    Gesproken taal
    Engels
    Taal materiaal
    Engels
    Dagdelen
    10
    Kosten
    €3.590,19
    excl. BTW Geen extra kosten.

    Klik op onderstaande button om je in te schrijven voor deze training

    • 17-2-2025
      Anyplace
      €3.590,19
      €3.590,19
    Training code
    SAPROM0223
    Gesproken taal
    Engels
    Taal materiaal
    Engels
    Dagdelen
    10
    Kosten
    €3.590,19
    excl. BTW Geen extra kosten.

    Klik op onderstaande button om je in te schrijven voor deze training

    • 17-2-2025
      Anyplace
      €3.590,19
      €3.590,19
  • Wat is Access Control Implementation and Configuration

    In this course, you will get deep Implementation and Configuration knowledge about SAP Governance, Risk and Compliance Access Control. Course based on software release: SAP Access Control 12.0.
     
    This course will prepare you to:
    • Describe tasks performed by a typical SAP Access Control user
    • Explain how SAP GRC helps you to address business challenges
    • Identify authorization risks in typical business processes
    • Describe the Segregation of Duties Risk Management Process
    • Describe and configure functionality and features for SAP Access Control
    • Use the SAP Access Control application to analyze and manage risk, design and manage roles, and provision and manage users
    • Describe the SAP Access Control architecture and landscape, SAP Access Control Repository, and Object Level Security
    • Describe the Periodic Access Review process
    • Plan for and manage emergency access
    • Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
    • Describe how the different applications of the SAP GRC Solution integrate with each other
    • Discuss key tasks in the SAP Access Control implementation process
    -
     
    Contents:
    Introduction to SAP Access Control
    Discussing Business Challenges and Solutions
    Using SAP Access Control
    Architecture, Security, and Authorizations
    Describing the System Architecture
    Describing Security and Authorizations
    Shared Configuration Settings
    Configuring Shared GRC Settings
    Configuring Shared SAP Access Control Settings
    Authorization Risks and the Segregation of Duties (SoD) Management Process
    Identifying Authorization Risks
    Managing Risk by Segregating Duties
    SAP Access Control Repository
    Synchronizing Objects into the Repository
    Scheduling and Viewing Background Jobs
    Risk Analysis
    Maintaining Shared Master Data
    Configuring and Maintaining the Rule Set
    Configuring and Using Audit Trail Tracking
    Using the Risk Analysis Framework
    Remediating Risks
    Mitigating Risks
    Mitigating Multiple Risks at One Time
    Business Rule Framework
    Creating Rules in the Business Rule Framework (BRF)
    Defining Business Rules
    Multi-Stage, Multi-Path (MSMP) Workflow
    Describing Multi-Stage, Multi-Path (MSMP) Workflow
    Maintaining MSMP Workflow
    Building MSMP Workflow
    User Provisioning
    Configuring User Provisioning Settings
    Configuring Access Request Forms
    Requesting Access
    Preparing Roles and Owner Data for MSMP Workflow
    Creating Simplified Access Requests
    Reviewing Search Request Results
    Role Design and Management
    Configuring Role Management
    Configuring Role Methodology
    Configuring Role Search Attributes
    Planning for Technical Role Definition
    Planning for Business Role Definition
    Consolidating Roles Through Role Mining
    Performing Role Mass Maintenance Operations
    Emergency Access Management
    Describing Emergency Access Management
    Planning for Emergency Access
    Monitoring Emergency Access
    Periodic Access Review Process
    Planning Periodic Review
    Monitoring Periodic Review
    Maintaining Custom Fields
    Maintaining Custom Fields in Request Header and Role Definition
  • Voor wie is Access Control Implementation and Configuration

    Target Group:
    • Application Consultant
    • Business Analyst
    • Business Process Architect
    • Business Process Owner / Team Lead / Power User
    Prerequisites:
    • Essential: Knowledge of integrated processes in an SAP System (ECC and/or S/4HANA), Knowledge of authorization concepts in an SAP System (Object Level Security and Fiori), Practical knowledge of common business processes
    • Recommended: GRC100 – Principles of SAP Governance, Risk and Compliance