Skip to main Content

Access Control Implementation and Configuration

  • Code training GRC300
  • Duur 5 dagen

Andere trainingsmethoden

Extra betaalopties

  • GTC’s 48 (incl. BTW)

    Global Training Credits: neem contact met ons op voor meer informatie

Klassikale training Prijs

eur4.100,00

(excl. BTW)

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Klassikale training

    Klassikaal leren

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven
This course offers hands-on configuration and implementation of SAP Access Control 10.1, as well as important concepts you will need to know in order to prepare for implementation and ongoing access risk prevention.
    • Methode: Virtueel leren
    • Datum: 22-26 april, 2024
    • Locatie: Virtueel-en-klassikaal
    • Taal: Engels

    eur4.100,00

    • Methode: Virtueel leren
    • Datum: 08-12 juli, 2024
    • Locatie: Virtueel-en-klassikaal
    • Taal: Engels

    eur4.100,00

    • Methode: Virtueel leren
    • Datum: 02-06 september, 2024
    • Locatie: Virtueel-en-klassikaal
    • Taal: Engels

    eur4.100,00

    • Methode: Virtueel leren
    • Datum: 07-11 oktober, 2024
    • Locatie: Virtueel-en-klassikaal
    • Taal: Engels

    eur4.100,00

    • Methode: Virtueel leren
    • Datum: 25-29 november, 2024
    • Locatie: Virtueel-en-klassikaal
    • Taal: Engels

    eur4.100,00

Doelgroep

Naar boven
  • Application Consultant
  • Business Process Architect
  • Business Process Owner / Team Lead / Power User

Trainingsdoelstellingen

Naar boven
  • Describe tasks performed by a typical SAP Access Control user
  • Discuss Harmonization topics as they relate to SAP Access Control
  • Explain how SAP GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control 10.1
  • Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage users
  • Describe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level Security
  • Describe the Periodic Access Review process
  • Plan for and manage emergency access
  • Discuss the reporting framework
  • Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
  • Describe how the different applications of the SAP GRC Solution integrate with each other
  • Discuss key steps in the SAP Access Control implementation process

Inhoud training

Naar boven

Introduction to SAP Access Control

  • Discussing Business Challenges and Solutions
  • Using SAP Access Control

Architecture, Security, and Authorizations

  • Describing the System Architecture
  • Describing Security and Authorizations

Shared Configuration Settings

  • Configuring Shared GRC Settings
  • Configuring Shared SAP Access Control Settings

Authorization Risks and the Segregation of Duties (SoD) Management Process

  • Identifying Authorization Risks
  • Managing Risk by Segregating Duties

SAP Access Control Repository

  • Synchronizing Objects into the Repository
  • Scheduling and Viewing Background Jobs

Risk Analysis

  • Maintaining Shared Master Data
  • Configuring and Maintaining the Rule Set
  • Configuring and Using Audit Trail Tracking
  • Using the Risk Analysis Framework
  • Remediating Risks
  • Mitigating Risks
  • Mitigating Multiple Risks at One Time

Business Rule Framework

  • Creating Rules in the Business Rule Framework (BRF)
  • Defining Business Rules

Multi-Stage, Multi-Path (MSMP) Workflow

  • Describing Multi-Stage, Multi-Path (MSMP) Workflow
  • Maintaining MSMP Workflow
  • Building MSMP Workflow

User Provisioning

  • Configuring User Provisioning Settings
  • Configuring Access Request Forms
  • Requesting Access
  • Preparing Roles and Owner Data for MSMP Workflow
  • Creating Simplified Access Requests
  • Reviewing Search Request Results

SAP Fiori User Experience (UX) for GRC

  • Describing SAP Fiori UX

Role Design and Management

  • Configuring Role Management
  • Configuring Role Methodology
  • Configuring Role Search Attributes
  • Planning for Technical Role Definition
  • Planning for Business Role Definition
  • Consolidating Roles Through Role Mining
  • Performing Role Mass Maintenance Operations

Emergency Access Management

  • Describing Emergency Access Management
  • Planning for Emergency Access
  • Monitoring Emergency Access

Periodic Access Review Process

  • Planning Periodic Review
  • Monitoring Periodic Review

Reports and Custom Fields

  • Use the Reporting Framework

SAP Access Control Implementation

  • Using the SAP Access Control Implementation Process
  • Designing the SAP Access Control Solution
  • Planning Upgrade and Migration
  • Configuring SAP Access Control
  • Implementing the SAP Access Control solution
  • Optimizing the SAP Access Control Suite

Voorkennis

Naar boven
Essential
  • GRC100: SAP Governance, Risk, and Compliance (GRC)10.0 Solution Overview and Harmonization
  • Knowledge of integrated processes in an SAP System
  • Knowledge of authorization concepts in an SAP System
  • Practical knowledge of common business processes

Aanvullende informatie

Naar boven
Course based on software release
  • SAP Access Control 10.1
Cookie Control toggle icon