8009  Reviews star_rate star_rate star_rate star_rate star_half

SAP Access Control Implementation and Configuration

Skills Gained This course will prepare you to: -Describe tasks performed by a typical SAP Access Control user -Explain how SAP GRC helps you to address business challenges -Identify authorization...

Read More
$4,600 USD GSA  $3,930.98
Course Code GRC300-v018
Duration 5 days
Available Formats Virtual, Classroom

Skills Gained

  • This course will prepare you to:
       -Describe tasks performed by a typical SAP Access Control user
       -Explain how SAP GRC helps you to address business challenges
       -Identify authorization risks in typical business processes
       -Describe the Segregation of Duties Risk Management Process
       -Describe and configure functionality and features for SAP Access Control
       -Use the SAP Access Control application to analyze and manage risk, design and manage roles, and provision and manage users
       -Describe the SAP Access Control architecture and landscape, SAP Access Control Repository, and Object Level Security
       -Describe the Periodic Access Review process
       -Plan for and manage emergency access
       -Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
       -Describe how the different applications of the SAP GRC Solution integrate with each other
       -Discuss key tasks in the SAP Access Control implementation process

Who Can Benefit

  • Application Consultant
  • Business Analyst
  • Business Process Architect
  • Business Process Owner / Team Lead / Power User


  • Essential:
  • Recommended:

Course Details

Course Content

  • Introduction to Access Governance using SAP Access Control
       -Business Challenges and Solutions
       -SAP Access Control Functionality and Integration Scenarios
  • Identification and Management of Access Risk
       -Identifying Access Risks
       -The Access Risk Management Process
  • User Experience, Security Concepts and System Architecture
       -User Access and the User Experience
       -User Access using the SAP Business Client
       -User Access using SAP Fiori Launchpad
       -SAP Access Control System Architecture
  • Configuration Overview
       -Shared SAP GRC Settings
       -SAP Access Control Specific Settings
       -SAP Access Control Business Configuration (BC) Set Overview
       -Managing the Access Control Repository
  • Risk Analysis
       -Maintaining Master Data and Access Control Owners
       -Risk Recognition
       -Rule Building and Validation
       -Access Risk Analysis
       -Risk Remediation
       -Risk Mitigation
       -Continuous Compliance
       -Appendix: (Optional) Access Risk Analysis Parameter Configuration
  • SAP Business Rule Framework (BRFplus)
       -Introduction to Business Rules and Business Rule Management Systems
       -Defining MSMP Workflow-Related Rules using SAP Business Rule Framework BRFplus
       -Configuration and Maintenance of MSMP Workflow-Related Rules
  • Multi-Stage, Multi-Path (MSMP) Workflow
       -Introducing Multi-Stage, Multi-Path (MSMP) Workflow
       -Implementing Multi-Stage, Multi-Path (MSMP) Workflow
  • User Provisioning
       -Configuring User Provisioning Settings
       -Configuring Access Request Forms
       -Preparing Roles and Owner Data for MSMP Workflow
       -Requesting Access
       -Reviewing Search Request Results
       -Appendix: (Optional) User Provisioning Parameter Settings
  • Role Design and Management
       -Configuring Role Management
       -Configuring Role Methodology
       -Configuring Role Search Attributes
       -Planning for Technical Role Definition
       -Planning for Business Role Definition
       -Consolidating Roles Through Role Mining
       -Performing Role Mass Maintenance Operations
       -Appendix (Optional) Evaluate Parameters for Role Management
  • Emergency Access Management
       -Describing Emergency Access Management
       -Planning for Emergency Access Management
       -Monitoring Emergency Access
       -Appendix (Optional) Evaluate Parameters for Emergency Access Management
  • Periodic Access Review Process
       -Planning Periodic Review
       -Monitoring Periodic Review
       -Appendix (Optional) Evaluate Parameters for Periodic Access Review
  • Appendix (Optional) Maintaining Custom Fields
       -Maintaining Custom Fields

Course based on software release

  • SAP Access Control 12.0 SP14
View Full Schedule