0% found this document useful (0 votes)
74 views3 pages

SAP Security + GRC

Uploaded by

admin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views3 pages

SAP Security + GRC

Uploaded by

admin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

SAP Security & GRC

30hrs program:

POST INSTALLATION

Step: 001 > Active the Applications of Financial Compliance

Step: 002 > Activating the Services

Step: 003 > Perform Automatic Workflow Configuration


Step: 004 > Perform Task Specific Customizing

Step: 005 > Generate Profiles for the Roles in GRC Server
Step: 006 > Create New User GRC_ADMN:

Step: 007 > Activate End User Logon:


Step: 008 > Maintain Access Control Owners & other Nominations in GRC Server:

Step: 009 > Define Business Process & Sub Business Process

Step: 010 > Define Employee Types

Step: 011 > Configuring Data Sources

COMMON CONFIGURATION:

Step: 012 > Configuring RFC Destination


Step: 013 > Activating BC Sets

Step: 014 > Maintain Connectors to Connection Type

Step: 015 > Maintain Connection Settings


Step: 016 > Maintain Connector Settings

Step: 017 > Maintain Configuration Settings

Step: 018 > Maintain Mapping for Actions and Connector Groups

Step: 019 > Maintain Plug-in Settings:


Step: 020 > Distribute Jobs for Parallel Processing:
Step: 021 > Connect User Data Base from Backend to GRC Server (NEW):

Step: 022 > Synchronization Jobs

ACCESS RISK ANALYSIS:

Step: 023 > Maintain Access Risk Levels

Step: 024 > Maintain Custom User Group

Step: 025 > Maintain Master User ID Mapping

Step: 026 > Create & Maintain Rule Set, Function ID & Risk ID
Step: 027 > Generate SoD Rules

Step: 028 > Downloading SoD Rules

Step: 029 > Uploading SoD Rules

Step: 030 > ARA: Run User Risk Analysis

Step: 031 > ARA: Batch Risk Analysis

Step: 032 > ARA: Mitigation Configuration


EMERGENCY ACCESS MANAGEMENT:

Step: 033 > Prerequisite-Maintain Connection Setting


Step: 034 > Prerequisite-Maintain Configuration Settings

Step: 035 > Prerequisite: Create Users and Roles & Maintain in Access Control Owners

Step: 036 > Assign Owner to FFID


Step: 037 > Assign FFID to Controller and firefighters

Step: 038 > Create a Reason Code


Step: 039 > Firefighter log Synchronization

Step: 040 > Working of FFID execution by firefighter

Step: 041 > FFID Reports Execution

ACCESS REQUEST MANAGEMENT:

Step: 042 > Maintain Connection Settings


Step: 043 > Maintain Configuration Settings
Step: 044 > Configure Number Ranges & Activate

Step: 045 > Prerequisite: Maintain Provision Settings

Step: 046 > Maintenance of Define Request types – MSMP Process IDs

Step: 047 > Maintain MSMP Workflow

Step: 048 > Find the working of ARM Configuration

BRF+: Business Rule Framework


Step: 049 > Generate MSMP Rules for Processes

Step: 050 > Define Business Rule Framework - Execute T-Code BRF+

Step: 051 > Mapping BRF+ Application with MSMP Workflow:

BUSINESS ROLE MANAGEMENT

Step: 052 > Requirements > Maintain Connectors to Connector Group:

Step: 053 > Requirements > Maintain Connection Settings:

Step: 054 > Requirements > Maintain Mapping for Actions and Connector Groups:

Step: 055 > Requirements > Maintain Connector Settings:


Step: 056 > Requirements > Activate Business Configuration BC-Sets:

Configuration document of GRC – Access Control 10


Step: 057 > Requirements > Maintain Configuration Settings:

Step: 058 > Requirements > Create Users & assign as Access Owners:

Step: 059 > Maintain Role type Settings:


Step: 060 > Prerequisite > Define Business Process & Sub Business Process:

Step: 061 > Specify Naming Convention:


Step: 062 > Define other Role Attributes:

Step: 063 > Maintain MSMP Workflow:

Step: 064 > Role Methodology:

Step: 065 > Role creation through Methodology:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy