SAP GRC Online Training
SAP GRC Online Training:
- Introduction to SAP Access Control
- Discussing Business Challenges and Solutions
- Using Access Control
- Architecture, Security and Authorizations
- Describing the System Architecture
- Describing Object-Level Security
- Describing Authorization Concepts
- Authorization Risks and the SoD Risk Management Process
- Identifying Authorization Risks
- Managing Risk by Segregating Duties
- Shared Configuration Settings
- Configuring Shared SAP GRC Settings
- Configuring Shared Access Control Settings
- SAP Access Control Repository
- Synchronizing Objects into the Repository
- Scheduling and Viewing Background Jobs
- Business Rule Framework (BRF)
- Creating Rules in the Business Rule Framework (BRF)
- Defining Business Rules
- MSMP Workflow
- Describing Multi-Stage Multi-Path Workflow
- Maintaining MSMP Workflow
- Analyze and Manage Risk
- Maintaining Shared Master Data
- Configuring and Maintaining the Rule Set
- Using and Configuring Audit Trail Tracking
- Using the Risk Analysis Framework
- Remediating Risks
- Mitigating Risks
- Mass Mitigating
- Emergency Access Management in SAP GRC Online Training
- Managing Emergency Access
- Planning for Emergency Access: Owners, Controllers, and Firefighters
- Planning for Emergency Access: Reason Codes
- Monitoring Emergency Access
- Design and Manage Roles
- Configuring Role Management
- Configuring Role Methodology
- Planning for Technical Role Definition
- Planning for Business Role Definition
- Consolidating Roles through Role Mining
- Mass Managing Roles
- Provision and Manage Users
- Designing End User Personalization Forms
- Planning for User Access
- Defining User Provisioning
- Requesting User Access Approval
- Periodic Access Review Process
- Planning Periodic Review
- Monitoring Periodic Review
- Reports and Custom Fields: SAP GRC Online Training
- Working with the Reporting Framework
- Changing Existing Reports
- Adding Custom Fields to Access Requests and Roles
- SAP Access Control Implementation
- Working with the SAP Access Control Implementation Process
- Designing the Access Control Solution
- Planning Upgrade and Migration
- Configuring SAP Access Control
- Implementing the Solution
Optimizing and Enhancing the Solution
More About: