Chi dovrebbe partecipare
- Application Consultant
- Business Analyst
- Business Process Architect
- Business Process Owner / Team Lead / Power User
Prerequisiti
Essential
- Knowledge of integrated processes in an SAP System (ECC and/or S/4HANA)
- Knowledge of authorization concepts in an SAP System (Object Level Security and Fiori)
- Practical knowledge of common business processes
Recommended:
- GRC100 – Principles of SAP Governance, Risk and Compliance
Obiettivi del Corso
This course will prepare you to:
- Describe tasks performed by a typical SAP Access Control user
- Explain how SAP GRC helps you to address business challenges
- Identify authorization risks in typical business processes
- Describe the Segregation of Duties Risk Management Process
- Describe and configure functionality and features for SAP Access Control
- Use the SAP Access Control application to analyze and manage risk, design and manage roles, and provision and manage users
- Describe the SAP Access Control architecture and landscape, SAP Access Control Repository, and Object Level Security
- Describe the Periodic Access Review process
- Plan for and manage emergency access
- Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
- Describe how the different applications of the SAP GRC Solution integrate with each other
- Discuss key tasks in the SAP Access Control implementation process
Contenuti del Corso
- Introduction to SAP Access Control
- Discussing Business Challenges and Solutions
- Using SAP Access Control
- Architecture, Security, and Authorizations
- Describing the System Architecture
- Describing Security and Authorizations
- Shared Configuration Settings
- Configuring Shared GRC Settings
- Configuring Shared SAP Access Control Settings
- Authorization Risks and the Segregation of Duties (SoD) Management Process
- Identifying Authorization Risks
- Managing Risk by Segregating Duties
- SAP Access Control Repository
- Synchronizing Objects into the Repository
- Scheduling and Viewing Background Jobs
- Risk Analysis
- Maintaining Shared Master Data
- Configuring and Maintaining the Rule Set
- Configuring and Using Audit Trail Tracking
- Using the Risk Analysis Framework
- Remediating Risks
- Mitigating Risks
- Mitigating Multiple Risks at One Time
- Business Rule Framework
- Creating Rules in the Business Rule Framework (BRF)
- Defining Business Rules
- Multi-Stage, Multi-Path (MSMP) Workflow
- Describing Multi-Stage, Multi-Path (MSMP) Workflow
- Maintaining MSMP Workflow
- Building MSMP Workflow
- User Provisioning
- Configuring User Provisioning Settings
- Configuring Access Request Forms
- Requesting Access
- Preparing Roles and Owner Data for MSMP Workflow
- Creating Simplified Access Requests
- Reviewing Search Request Results
- Role Design and Management
- Configuring Role Management
- Configuring Role Methodology
- Configuring Role Search Attributes
- Planning for Technical Role Definition
- Planning for Business Role Definition
- Consolidating Roles Through Role Mining
- Performing Role Mass Maintenance Operations
- Emergency Access Management
- Describing Emergency Access Management
- Planning for Emergency Access
- Monitoring Emergency Access
- Periodic Access Review Process
- Planning Periodic Review
- Monitoring Periodic Review
- Maintaining Custom Fields
- Maintaining Custom Fields in Request Header and Role Definition