• Describe tasks performed during a day in the life of a typical Access Control user
  • Discuss Harmonization topics as they relate to Access Control
  • Explain how GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control 10.0
  • Use the Access Control 10.0 application to analyze and manage risk, design and manage roles, and provision and manage users
  • Describe the Access Control 10.0 architecture and landscape, Access Control Repository, and Object Level Security
  • Describe how to upgrade from Access Control 5.3 to Access Control 10.0
  • Explain the post-installation steps for Access Control 10.0
  • Describe the Periodic Access Review process
  • Configure Access Control to support the integration of Identity Management
  • Plan for and manage emergency access
  • Discuss the reporting framework
  • Configure workflows, including multi-stage multi-path (MSMP)workflows and BRF+
  • Describe how the different components of the GRC application integrate with each other
  • Discuss key steps in the Access Control implementation process


  • Implementation Consultants
  • Key Technical Business Users involved in an Access Control project
  • IT Governance Experts
  • Consultants for SAP Security and GRC IT Auditors
  • Business Project Team Leaders



  • GRC100_96 SAP Governance, Risk, and Compliance (GRC)10.0 Solution Overview and Harmonization
  • Knowledge of integrated processes in an SAP System
  • Knowledge of authorization concepts in an SAP System
  • Practical knowledge of common business processes


  • None

Course based on software release

  • SAP Access Control 10.0
  • SAP ERP Central Component (ECC) 6.05
  • SAP NetWeaver 7.02


  • Introduction to SAP Access Control 10.0
    • Access Control 10.0 Overview
    • Key Features and Benefits
    • Transporting Objects
    • User Interface Overview
    • A Day in the Life of an Access Control User
  • Harmonization and Integrations
    • Common Technical Platform
    • Effects of Harmonization in Access Control
    • Harmonization settings
    • Integration Points
    • How Access Control components work together
    • Identity Management Integration
    • LDAP Integration
  • Managing Compliance with Access Control 10.0
    • Business Challenges and Solutions
    • Overview of Business Process Flows
    • Segregation of Duties Risk Management Process
  • Information Architecture, Security, and Authorizations
  • Analyze and Manage Risk
    • Shared Master Data
    • Configuration and Rule Set Maintenance
    • Audit Trail Tracking
    • Risk Analysis Framework
    • System-Specific Mitigation
    • Mass Mitigation
  • Emergency Access Management
    • Emergency Access Management Overview
    • Centralized Firefighting
    • Plan for Emergency Access
    • Monitor Emergency Access
  • Design and Manage Roles
    • Configure Role Management
    • Configure Role Methodology
    • Plan for Technical Role Definition
    • Plan for Business Role Definition
    • Consolidate Roles through Role Mining
    • Mass Manage Roles
  • Provision and Manage Users
    • Plan for User Access
    • Plan for Human Resources Integration
    • Define User Provisioning
    • Design End User Personalization Forms
    • Request Approval
  • Periodic Access Review Process
    • Plan Periodic Review
    • Review Access Risk (SoD Review)
    • Monitor User Access
    • Monitor Role Access
  • Business Rule Framework (BRF)
    • Define workflow related Multi-Stage Multi-Path Workflow Rules
    • Define business rules using the BRF Workbench
    • Create BRFplus rules
  • Reporting
    • Reporting Framework
    • Change Existing Reports
    • Add Custom Fields to Access Requests and Roles
  • Access Control Implementation Process
    • Implementation Process Overview
    • Project Teams
    • Designing the Access Control Solution
    • Upgrade and Migration
    • Configuring Access Control using the IMG
    • Implementing the Solution
    • Optimizing and Enhancing the Solution

Submit your request

Is the course not scheduled? Or looking for other dates and locations that fit your schedule? Let us know what works for you by clicking the button below and select your preferred location. We will do our best to consider your request.

Note: Location can be for a Virtual Classroom, Public Classroom or Any location (Any Physical location except Virtual Classroom.)

Register Interest