Duration
5 Days Intensive Training
Delivery
ILT & Virtual Live Classroom
Audience
SAP Security Consultants, GRC Specialists, System Administrators & Project Managers
Upcoming Schedule
Course | Date | Duration | Delivery Method |
---|---|---|---|
SAP Access Control Implementation and Configuration (GRC300) | To be announced | 5 days | ILT |
To be announced | VLC |
Overview
This course provides detailed knowledge and practical skills for implementing and configuring SAP Access Control, a key component of the SAP GRC suite. Participants will learn how to set up and manage access risk analysis, emergency access management (EAM), role management, and user provisioning. The course also covers integration with SAP systems, workflow configuration, and best practices for access governance and compliance enforcement.
Goals
- Describe tasks performed by a typical SAP Access Control user
- Explain how SAP GRC helps you to address business challenges
- Identify authorization risks in typical business processes
- Describe the Segregation of Duties Risk Management Process
- Describe and configure functionality and features for SAP Access Control
- Use the SAP Access Control application to analyze and manage risk, design and manage roles, and provision and manage users
- Describe the SAP Access Control architecture and landscape, SAP Access Control Repository, and Object Level Security
- Describe the Periodic Access Review process
- Plan for and manage emergency access
- Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
- Describe how the different applications of the SAP GRC Solution integrate with each other
- Discuss key tasks in the SAP Access Control implementation process
Content
- Introduction to Access Governance using SAP Access Control
- Business Challenges and Solutions
- SAP Access Control Functionality and Integration Scenarios
- Identification and Management of Access Risk
- Identifying Access Risks
- The Access Risk Management Process
- User Experience, Security Concepts and System Architecture
- User Access and the User Experience
- User Access using the SAP Business Client
- User Access using SAP Fiori Launchpad
- SAP Access Control System Architecture
- Configuration Overview
- Shared SAP GRC Settings
- SAP Access Control Specific Settings
- SAP Access Control Business Configuration (BC) Set Overview
- Managing the Access Control Repository
- Risk Analysis
- Maintaining Master Data and Access Control Owners
- Risk Recognition
- Rule Building and Validation
- Access Risk Analysis
- Risk Remediation
- Risk Mitigation
- Continuous Compliance
- Appendix: (Optional) Access Risk Analysis Parameter Configuration
- SAP Business Rule Framework (BRFplus)
- Introduction to Business Rules and Business Rule Management Systems
- Defining MSMP Workflow-Related Rules using SAP Business Rule Framework BRFplus
- Configuration and Maintenance of MSMP Workflow-Related Rules
- Multi-Stage, Multi-Path (MSMP) Workflow
- Introducing Multi-Stage, Multi-Path (MSMP) Workflow
- Implementing Multi-Stage, Multi-Path (MSMP) Workflow
- User Provisioning
- Configuring User Provisioning Settings
- Configuring Access Request Forms
- Preparing Roles and Owner Data for MSMP Workflow
- Requesting Access
- Reviewing Search Request Results
- Appendix: (Optional) User Provisioning Parameter Settings
- Role Design and Management
- Configuring Role Management
- Configuring Role Methodology
- Configuring Role Search Attributes
- Planning for Technical Role Definition
- Planning for Business Role Definition
- Consolidating Roles Through Role Mining
- Performing Role Mass Maintenance Operations
- Appendix (Optional) Evaluate Parameters for Role Management
- Emergency Access Management
- Describing Emergency Access Management
- Planning for Emergency Access Management
- Monitoring Emergency Access
- Appendix (Optional) Evaluate Parameters for Emergency Access Management
- Periodic Access Review Process
- Planning Periodic Review
- Monitoring Periodic Review
- Appendix (Optional) Evaluate Parameters for Periodic Access Review
- Appendix (Optional) Maintaining Custom Fields
- Maintaining Custom Fields
Audience
- Application Consultants
- Business Analyst
- Business Process Architect
- Business Process Owner / Team Lead / Power User
Prerequisites
Essential: GRC100
Recommended: ADM940
Ready to Join the Training?
Secure your SAP landscape — learn to implement Access Control and manage access risks effectively.
Enroll Now Contact Us