-
Access Control Implementation and Configuration (GRC300)
< Terug naar vorige paginaTraining codeSAPROM0223Gesproken taalEngelsTaal materiaalEngelsDagdelen10Kosten€3.590,19excl. BTW Geen extra kosten.Klik op onderstaande button om je in te schrijven voor deze training
Training codeSAPROM0223Gesproken taalEngelsTaal materiaalEngelsDagdelen10Kosten€3.590,19excl. BTW Geen extra kosten.Klik op onderstaande button om je in te schrijven voor deze training
-
-
Wat is Access Control Implementation and Configuration
In this course, you will get deep Implementation and Configuration knowledge about SAP Governance, Risk and Compliance Access Control. Course based on software release: SAP Access Control 12.0.This course will prepare you to:- Describe tasks performed by a typical SAP Access Control user
- Explain how SAP GRC helps you to address business challenges
- Identify authorization risks in typical business processes
- Describe the Segregation of Duties Risk Management Process
- Describe and configure functionality and features for SAP Access Control
- Use the SAP Access Control application to analyze and manage risk, design and manage roles, and provision and manage users
- Describe the SAP Access Control architecture and landscape, SAP Access Control Repository, and Object Level Security
- Describe the Periodic Access Review process
- Plan for and manage emergency access
- Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
- Describe how the different applications of the SAP GRC Solution integrate with each other
- Discuss key tasks in the SAP Access Control implementation process
Contents:
Introduction to SAP Access Control
Discussing Business Challenges and Solutions
Using SAP Access Control
Architecture, Security, and Authorizations
Describing the System Architecture
Describing Security and Authorizations
Shared Configuration Settings
Configuring Shared GRC Settings
Configuring Shared SAP Access Control Settings
Authorization Risks and the Segregation of Duties (SoD) Management Process
Identifying Authorization Risks
Managing Risk by Segregating Duties
SAP Access Control Repository
Synchronizing Objects into the Repository
Scheduling and Viewing Background Jobs
Risk Analysis
Maintaining Shared Master Data
Configuring and Maintaining the Rule Set
Configuring and Using Audit Trail Tracking
Using the Risk Analysis Framework
Remediating Risks
Mitigating Risks
Mitigating Multiple Risks at One Time
Business Rule Framework
Creating Rules in the Business Rule Framework (BRF)
Defining Business Rules
Multi-Stage, Multi-Path (MSMP) Workflow
Describing Multi-Stage, Multi-Path (MSMP) Workflow
Maintaining MSMP Workflow
Building MSMP Workflow
User Provisioning
Configuring User Provisioning Settings
Configuring Access Request Forms
Requesting Access
Preparing Roles and Owner Data for MSMP Workflow
Creating Simplified Access Requests
Reviewing Search Request Results
Role Design and Management
Configuring Role Management
Configuring Role Methodology
Configuring Role Search Attributes
Planning for Technical Role Definition
Planning for Business Role Definition
Consolidating Roles Through Role Mining
Performing Role Mass Maintenance Operations
Emergency Access Management
Describing Emergency Access Management
Planning for Emergency Access
Monitoring Emergency Access
Periodic Access Review Process
Planning Periodic Review
Monitoring Periodic Review
Maintaining Custom Fields
Maintaining Custom Fields in Request Header and Role Definition -
Voor wie is Access Control Implementation and Configuration
Target Group:- Application Consultant
- Business Analyst
- Business Process Architect
- Business Process Owner / Team Lead / Power User
- Essential: Knowledge of integrated processes in an SAP System (ECC and/or S/4HANA), Knowledge of authorization concepts in an SAP System (Object Level Security and Fiori), Practical knowledge of common business processes
- Recommended: GRC100 – Principles of SAP Governance, Risk and Compliance