SAP GRC Online Training
SAP GRC Online Training:
-
Introduction to SAP Access Control
- Discussing Business Challenges and Solutions
- Using Access Control
-
Architecture, Security and Authorizations
- Describing the System Architecture
- Describing Object-Level Security
- Describing Authorization Concepts
-
Authorization Risks and the SoD Risk Management Process
- Identifying Authorization Risks
- Managing Risk by Segregating Duties
-
Shared Configuration Settings
- Configuring Shared SAP GRC Settings
- Configuring Shared Access Control Settings
-
SAP Access Control Repository
- Synchronizing Objects into the Repository
- Scheduling and Viewing Background Jobs
-
Business Rule Framework (BRF)
- Creating Rules in the Business Rule Framework (BRF)
- Defining Business Rules
-
MSMP Workflow
- Describing Multi-Stage Multi-Path Workflow
- Maintaining MSMP Workflow
-
Analyze and Manage Risk
- Maintaining Shared Master Data
- Configuring and Maintaining the Rule Set
- Using and Configuring Audit Trail Tracking
- Using the Risk Analysis Framework
- Remediating Risks
- Mitigating Risks
- Mass Mitigating
-
Emergency Access Management in SAP GRC Online Training
- Managing Emergency Access
- Planning for Emergency Access: Owners, Controllers, and Firefighters
- Planning for Emergency Access: Reason Codes
- Monitoring Emergency Access
-
Design and Manage Roles
- Configuring Role Management
- Configuring Role Methodology
- Planning for Technical Role Definition
- Planning for Business Role Definition
- Consolidating Roles through Role Mining
- Mass Managing Roles
-
Provision and Manage Users
- Designing End User Personalization Forms
- Planning for User Access
- Defining User Provisioning
- Requesting User Access Approval
-
Periodic Access Review Process
- Planning Periodic Review
- Monitoring Periodic Review
-
Reports and Custom Fields: SAP GRC Online Training
- Working with the Reporting Framework
- Changing Existing Reports
- Adding Custom Fields to Access Requests and Roles
-
SAP Access Control Implementation
- Working with the SAP Access Control Implementation Process
- Designing the Access Control Solution
- Planning Upgrade and Migration
- Configuring SAP Access Control
- Implementing the Solution
Optimizing and Enhancing the Solution
More About: