Categoría

sap

Description

Metas *Describe tasks performed by a typical SAP Access Control user *Discuss Harmonization topics as they relate to SAP Access Control *Explain how SAP GRC helps you to address business challenges *Identify authorization risks in typical business processes *Describe the Segregation of Duties Risk Management Process *Describe and configure functionality and features for SAP Access Control 10.0 *Use the SAP Access Control 10.0 application to analyze and manage risk, design and manage roles, and provision and manage users *Describe the SAP Access Control 10.0 architecture and landscape, SAP Access Control Repository, and Object Level Security *Describe how to upgrade from SAP Access Control 5.3 to SAP Access Control 10.0 *Explain post-installation steps for SAP Access Control 10.0 *Describe the Periodic Access Review process *Plan for and manage emergency access *Discuss the reporting framework *Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+ *Describe how the different applications of the SAP GRC Solution integrate with each other *Discuss key steps in the SAP Access Control implementation process

Contenido *Introduction to SAP Access Control -Discussing Business Challenges and Solutions -Using Access Control *Architecture, Security and Authorizations -Describing the System Architecture -Describing Object-Level Security -Describing Authorization Concepts *Authorization Risks and the SoD Risk Management Process -Identifying Authorization Risks -Managing Risk by Segregating Duties *Shared Configuration Settings -Configuring Shared SAP GRC Settings -Configuring Shared Access Control Settings *SAP Access Control Repository -Synchronizing Objects into the Repository -Scheduling and Viewing Background Jobs *Business Rule Framework (BRF) -Creating Rules in the Business Rule Framework (BRF) -Defining Business Rules *MSMP Workflow -Describing Multi-Stage Multi-Path Workflow -Maintaining MSMP Workflow *Analyze and Manage Risk -Maintaining Shared Master Data -Configuring and Maintaining the Rule Set -Using and Configuring Audit Trail Tracking -Using the Risk Analysis Framework -Remediating Risks -Mitigating Risks -Mass Mitigating *Emergency Access Management -Managing Emergency Access -Planning for Emergency Access: Owners, Controllers, and Firefighters -Planning for Emergency Access: Reason Codes -Monitoring Emergency Access *Design and Manage Roles -Configuring Role Management -Configuring Role Methodology -Planning for Technical Role Definition -Planning for Business Role Definition -Consolidating Roles through Role Mining -Mass Managing Roles *Provision and Manage Users -Designing End User Personalization Forms -Planning for User Access -Defining User Provisioning -Requesting User Access Approval *Periodic Access Review Process -Planning Periodic Review -Monitoring Periodic Review *Reports and Custom Fields -Working with the Reporting Framework -Changing Existing Reports -Adding Custom Fields to Access Requests and Roles *SAP Access Control Implementation -Working with the SAP Access Control Implementation Process -Designing the Access Control Solution -Planning Upgrade and Migration -Configuring SAP Access Control -Implementing the Solution -Optimizing and Enhancing the Solution
Contactar