Skip to end of metadata
Go to start of metadata

GRC Access Control

How-to Configure SAP BusinessObjects Access Control 5.3 for SAP NetWeaver Portal 7.0  (PDF, 1,545 KB)

This document will explain the major steps to configure AC 5.3 to connect and integrate with NetWeaver Portal 7.0 for provisioning (CUP) and risk analysis (RAR) of Portal items.

[How-to Integrate Access Control 5.3 and Business Warehouse 7.0|https://admin.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/e05a9879-d204-2c10-54a9-ebc94eaddc4e]   (PDF, 1,095 KB)

The guide will describe prerequistes and configuration steps to integrate Access Control 5.3 and Business Warehouse 7.0

Single Sign-On with SAP BusniessObjects Access Control 5.3

This guide outlines the ways in which Single Sign-On can be configured for SAP BusinessObjects Access Control 5.3

How to Performance Optimize SAP GRC Access Control 5.3   (PDF, 303 KB)
The guide provides an overview of the technical architecture of SAP GRC Access Control 5.3 and a structured list of recommendations and preferred practices for performance optimization.

SAP GRC Access Control 5.3 - Pre-Installation - Voice Over (FLASH 20,869 KB)

This eLearning session explains the necessary prerequisites for a successful installation of SAP GRC Access Control 5.3 and guides the reader through the installation procedure of the software. Underlying presentation: SAP GRC Access Control 5.3 - Pre-Installation (PDF 923 KB)

SAP GRC Access Control 5.3 - HowTo - Apply Support Packages in AC5.3 - Voice over (FLASH 7,500 KB)

The presentation explains the necessary steps for a successful installation of a Support Package in SAP GRC Access Control 5.3 and guides the reader through the procedure.  Underlying presentation: SAP GRC Access Control 5.3 - HowTo - Apply Support Packages in AC5.3 (PDF 1,643 KB)

SAP GRC Access Control - HowTo - Integrate GRC AC53 CUP and NW IdM (PDF 1.438 KB)

This How-To guide explains the integration of SAP GRC AC 5.3 CUP and NetWeaver IdM 7.0.

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined Solutions  (PDF 422 KB)

This paper provides an overview of the integrated solution and a summary of implementation options for deploying a combined solution based on SAP Access Control and NetWeaver Identity Management. This solution combines access governance and identity management capabilities to support automation of identity and access processes and compliance requirements.

GRC Access Control - Risk Analysis and Remediation (formerly Virsa Compliance Calibrator)

SAP GRC Access Control 5.3 - Post-Installation - RAR - Voice over (FLASH 17,337 KB)

This eLearning session outlines necessary post-installation steps for the implementation of risk analysis and remediation in SAP GRC Access Control 5.3. Underlying presentation: SAP GRC Access Control 5.3 - Post-Installation - RAR (PDF 1,676 KB)

Offline-Mode Risk Analysis (PDF 2,738 KB)

Risk Analysis may be performed in offline-mode (aka remote risk analysis). The process helps in detecting SOD violations in an ERP system without having to connect online. Instead, data from the ERP system is exported to files and subsequently imported to GRC Access Control by using the data extractor utility. 

Background Jobs for Risk Analysis and Remediation (PDF 345 KB)

This document discusses the background jobs available in the context of using risk analysis and remediation in SAP GRC Access Control. Best practices on executing these jobs are given, e.g. the order in which background jobs should be executed, the difference between full synch mode and incremental mode.

Organizational Rules and Organizational Level Reporting (PDF 2,807 KB)

Use this Quick Reference Guide to understand and create Organizational Rules and perform organization level reporting.

Risk Terminator Documents on SCN  (PDF 600 KB)

This document is a compilation of Risk Terminator configuration documentation currently available for Access Control 10.0.

Periodic Job Processing for Risk Identification and Remediation (PDF 134 KB)

SAP's solutions for Governance, Risk, and Compliance comprise GRC Access Control, an application that handles sustainable prevention of Segregation of Duties violations. This Quick Reference Guide for periodic job processing applies to the system's capability for risk analysis and remediation.

Post-Installation Tasks for Risk Identification and Remediation (PDF 105 KB)

This Quick Reference Guide for post-installation tasks applies to the system's capability for risk analysis and remediation.

Pre-Implementation Checklist for Risk Identification and Remediation (PDF 53 KB)

This Quick Reference Guide for a pre-implementation checklist applies to the system's capability for risk analysis and remediation.

GRC Access Control - Risk Analysis and Remediation (Release 5.2): Quick Reference Guide for Moving to Production (PDF 192 KB)

Moving GRC Access Control from a development/testing environment to production requires populating data in the production version so that risk analysis can be performed and  management views are available.

GRC Access Control - Enterprise Role Management (formerly Virsa Role Expert)

SAP GRC Access Control 5.3 - Post-Installation - ERM - Part I - Voice Over (FLASH 17,122 KB)

This eLearning session explains the required post-installation steps for enterprise role management in SAP GRC Access Control 5.3. This is a prerequisite to customization and implementation of role management. Underlying presentation: SAP GRC Access Control 5.3 - Post-Installation - ERM - Part I (PDF 668 KB)

SAP GRC Access Control 5.3- Post-Installation - ERM - Part II - Voice Over (FLASH 7,355 KB)

This eLearing session runs through typical implementation steps of enterprise role management in SAP GRC Access Control 5.3. It explains how roles may be created. Projects may apply a different methodology. Underlying presentation: SAP GRC Access Control 5.3 - Post-Installation - ERM - Part II (PDF 506 KB)

SAP GRC Access Control 5.2 Implementation Guide for Enterprise Role Management *(PDF 91 KB)*

GRC Access Control identifies and prevents access and authorization risks in cross-enterprise IT systems to prevent fraud and reduce the cost of continuous compliance and control. This paper provides a quick reference guide to understand the main features, business benefits, and implementation best practices of the application's capability for enterprise role management (formerly known as Virsa Role Expert).

GRC Access Control - Compliant User Provisioning (formerly Virsa Access Enforcer)

SAP GRC Access Control 5.3 - Post-Installation - CUP - Voice Over (FLASH 14,607 KB)

This eLearning session outlines necessary post-installation steps to enable compliant user provisioning in SAP GRC Access Control 5.3. Completing the required post-installation tasks allows customizing and implementation of individual workflows. Underlying presentation: SAP GRC Access Control 5.3 - Post-Installation - CUP (PDF 635 KB)

Configuring LDAP connector in compliant user provisioning (PDF 243 KB)

When implementing compliant user provisioning in GRC Access Control the system is typically linked to an LDAP repository. This paper outlines the configuration of LDAP connectors and provides sample mappings for Active Directory, SunOne, E-Directory, and Tivoli. 

SAP GRC Access Control: Compliant user provisioning goes Identity Management (PDF 1.19 MB)
According to Gartner, Governance, Risk, and Compliance (GRC) is the ultimate driver for today's identity management projects. SAP GRC Access Control has the technology to provide customers with a cross ERP-platform solution for compliant user provisioning and at the same time provides an open API/interface for existing identity management vendors to integrate seamlessly with SAP GRC Access Control for an end-to-end user, role and rule provisioning solution.

Configuring Compliant User Provisioning into CUA Systems (PDF 457 KB)

For GRC Access Control to be able to perform user provisioning into Central User Administration (CUA) systems certain special configurations related to compliant user provisioning (formerly Virsa Access Enforcer) need to be done. This article outlines the configuration procedure for provisioning to work with CUA systems. The paper also discusses troubleshooting.

Compliant User Provisioning Quick Reference Guide (QRG): Risk Analysis URI Configuration (PDF 280 KB)

SAP GRC Access Control - part of SAP solutions for Governance, Risk, and Compliance - is helping organizations close gaps in access risk. This guide indicates how to link the application's capability for compliant user provisioning with the application's capability for risk analysis and remediation.

Compliant User Provisioning QRG: HR Triggers (PDF 393 KB)

Compliant user provisioning may be triggered by SAP's human resource application. This quick reference guide outlines how set up that HR link.

Configuring Multiple User Detail Sources in CUP 5.3

Compliant User Provisioning can be configured to fetch user details from various sources. This guide outlines the steps to configure multiple user detail data sources in CUP.

Integration of Training and Verification system with CUP

Compliant User Provisioning can be integrated with various Training and Verification systems. This guide outlines the steps to configure them.

Integration of Compliant User Provisioning with Super User Privilege Management 

CUP and SPM capabilities can now be integrated and FF IDs in SPM can be provisioned through CUP. This guide indicates the steps required to configure them.

How To Configure HR Triggers in CUP V 2.0

CUP can be configured for automatic request creation for the changes made in SAP HR data. This guide provides the steps required to configure CUP for HR Triggers.
 

GRC Access Control - Superuser Privilege Management (formerly Virsa Fire Fighter)

SAP GRC Access Control 5.3 - Post-Installation - SPM - Voice Over (FLASH 12,053 KB)

This eLearning session outlines post-installation tasks required for superuser privilege management in SAP GRC Access Control 5.3. The session explains how to set up superuser privilege management in SAP backend systems and enable the Java reporting component, which allows for centralized access to log reports in multiple SAP backend systems. Underlying presentation: SAP GRC Access Control 5.3 - Post-Installation - SPM (PDF 1,169 KB)

GRC Process Control

SAP BusinessObjects Risk Management and Process Control 3.0 - Technical Overview and Requirements (FLASH 6061 KB)

This eLearning provides an overview of the PC and RM Technical items as well as version and hardware requirements.

SAP BusinessObjects Risk Management and Process Control 3.0 - Available Documentation and Installation Preparation (FLASH 6524 KB)

This according eLearning provides an introduction on the available PC and RM documentation (SMP, SAP Notes, help.sap.com etc) and shows an installation preparation.

SAP BusinessObjects Risk Management and Process Control 3.0 - Installation Steps for ABAP and Java (FLASH 7360 KB)

This eLearning shows the detailed steps to install the PC and RM ABAP add-on and Portal Business Packages.

SAP BusinessObjects Risk Management and Process Control 3.0 - Post Installation Tasks ABAP (FLASH 11500 KB)

This eLearning goes throught the configuration steps to be performed on the Application Server ABAP where PC/RM 3.0 was installed.

SAP BusinessObjects Risk Management and Process Control 3.0 - Post Installation Tasks Java (FLASH 10211 KB)

This eLearning goes throught the configuration steps to be performed on the Application Server Java where PC/RM 3.0 was installed.

Process Controls 2.5 Workflow Customizing (PDF 550 KB)
This accelerator describes the necessary steps to activate the workflow functionality for PC 2.5.

Process Controls 2.5 User Defined Fields (PDF 516 KB)
This accelerator describes how a technical person can add customer defined fields in the PC 2.5 application.

 Process Controls 2.5 Upload Master Data  (PDF 672 KB)
This accelerator provides information how to upload master data in PC 2.5.
 Process Controls 2.5 Performance Increasing Actions  (PDF 647 KB)
This accelerator describes the options to increase performance in PC 2.5.
 Process Controls 2.5 Automated Controls Testing NWBC  (PDF 1036 KB)
This accelerator describes the setup of Automated Controls in the NWBC as frontend for the Automated Control Specialist.
 Process Controls 2.5 Automated Controls Testing Customizing  (PDF 575 KB)
This accelerator describes the necessary customizing for using the Automated Control Testing.
 Process Controls 2.5 Admin Reports  (PDF 580 KB)
This accelerator explains some administration reports that are relevant for an administrator or a consultant for PC 2.5 with access to the PC 2.5 backend system.

10 Comments

  1. Unknown User (mvimoqp)

    Great to have 1 place where all the handy documents are bundled!

    Regards, George 

  2. Former Member

  3. Unknown User (105knyrku)

    I will strongly agree with this.

  4. Unknown User (1065jckdk)

    Hi,

    Felt so happy to see all documents at one place.

    Thank you so much.

    Naresh A 


  5. Unknown User (106rwevhl)

    All the documents are very helpful.

     Rgds,

    Mohit

  6. Unknown User (dxqex3o)

    Hi Team,

    Could i get the documents/pdf files related to sap security,that should be step by step information that would be helpful for lerner like me as a guide i am very glad if i get please.

    Thanks,

    Deepak

  7. Unknown User (uwq3ke9)

    This is the result of great work by Frank Rambo and Frank Bannert. 

     Both of them deserve a great applause from every SAP Security consultant

     I got a good understanding on SAP GRC and got confidence to work on the same.

     Regards,

     Raja Ram.

  8. Hello,

    I am looking for steps on how to configure SAP Access Control (AC) 10.0 to integrate with SAP NetWeaver Portal for Access Request Management (ARM) capability.

    I do see there is link to How-to steps to configure AC 5.3 for NetWeaver Portal. Can someone point to the how-to steps for GRC AC 10 integration with EP.

    Thanks,

    Asif

  9. Hello,

    I am looking for steps on how to configure SAP Access Control (AC) 10.0 to integrate with SAP NetWeaver Portal for Access Request Management (ARM) capability.

    I do see there is link to How-to steps to configure AC 5.3 for NetWeaver Portal. Can someone point to the how-to steps for GRC AC 10 integration with EP.

    Thanks,

    Asif