Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

SAP Access Control Implementation and Configuration (GRC300v16)

GK# 4669

Course Overview

TOP

In this course, you will learn about the configuration and implementation of SAP Access Control 10.1, as well as important concepts you will need to know in order to prepare for implementation and ongoing access risk prevention.

Note: This course is based on software release SAP Access Control 10.1.

What You'll Learn

TOP
  • Tasks performed by a typical SAP Access Control user
  • Harmonization topics as they relate to SAP Access Control
  • How SAP GRC helps you to address business challenges
  • Authorization risks in typical business processes
  • Segregation of Duties Risk Management Process
  • Configure functionality and features for SAP Access Control 10.1
  • Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage users
  • SAP Access Control 10.1 architecture and landscape
  • SAP Access Control Repository
  • Object-level security
  • Periodic access review process
  • Plan for and manage emergency access
  • Reporting framework
  • Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
  • How the different applications of the SAP GRC Solution integrate with each other
  • Key steps in the SAP Access Control implementation process

Outline

TOP
Viewing outline for:

Classroom Live Outline

1. Introduction to SAP Access Control

• Business Challenges and Solutions
• SAP Access Control

2. Architecture, Security, and Authorizations

• System Architecture
• Security and Authorizations

3. Shared Configuration Settings

• Configuring Shared GRC Settings
• Configuring Shared SAP Access Control Settings

4. Authorization Risks and the Segregation of Duties (SoD) Management Process

• Authorization Risks
• Managing Risk by Segregating Duties

5. SAP Access Control Repository

• Synchronizing Objects into the Repository
• Scheduling and Viewing Background Jobs

6. Risk Analysis

• Maintaining Shared Master Data
• Configuring and Maintaining the Rule Set
• Configuring and Using Audit Trail Tracking
• Using the Risk Analysis Framework
• Remediating Risks
• Mitigating Risks
• Mitigating Multiple Risks at One Time

7. Business Rule Framework

• Creating Rules in the Business Rule Framework (BRF)
• Defining Business Rules

8. Multi-Stage, Multi-Path (MSMP) Workflow

• Maintaining MSMP Workflow
• Building MSMP Workflow

9. User Provisioning

• Configuring User Provisioning Settings
• Configuring Access Request Forms
• Requesting Access
• Preparing Roles and Owner Data for MSMP Workflow
• Creating Simplified Access Requests
• Reviewing Search Request Results

10. SAP Fiori User Experience (UX) for GRC

• SAP Fiori UX

11. Role Design and Management

• Configuring Role Management
• Configuring Role Methodology
• Configuring Role Search Attributes
• Planning for Technical Role Definition
• Planning for Business Role Definition
• Consolidating Roles Through Role Mining
• Performing Role Mass Maintenance Operations

12. Emergency Access Management

• Planning for Emergency Access
• Monitoring Emergency Access

13. Periodic Access Review Process

• Planning Periodic Review
• Monitoring Periodic Review

14. Reports and Custom Fields

• Use the Reporting Framework

15. SAP Access Control Implementation

• Using the SAP Access Control Implementation Process
• Designing the SAP Access Control Solution
• Planning Upgrade and Migration
• Configuring SAP Access Control
• Implementing the SAP Access Control solution
• Optimizing the SAP Access Control Suite

 

Prerequisites

TOP
  • Knowledge of integrated processes in an SAP System
  • Knowledge of authorization concepts in an SAP System
  • Practical knowledge of common business processes

Who Should Attend

TOP
  • Application consultant
  • Business process architect
  • Business process owner 
  • Team lead 
  • Power user
Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 5 day

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 5 day

Request this course in a different delivery format.
Enroll