SAP Access Control 10.0 - Implementation and Configuration

GRC300 5 days


SAP Access Control 10.0 - Implementation and Configuration

Display Language:
Insufficient data for accurate rating at this time.


  • Describe tasks performed during a day in the life of a typical Access Control user
  • Discuss Harmonization topics as they relate to Access Control
  • Explain how GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control 10.0
  • Use the Access Control 10.0 application to analyze and manage risk, design and manage roles, and provision and manage users
  • Describe the Access Control 10.0 architecture and landscape, Access Control Repository, and Object Level Security
  • Describe how to upgrade from Access Control 5.3 to Access Control 10.0
  • Explain the post-installation steps for Access Control 10.0
  • Describe the Periodic Access Review process
  • Configure Access Control to support the integration of Identity Management
  • Plan for and manage emergency access
  • Discuss the reporting framework
  • Configure workflows, including multi-stage multi-path (MSMP)workflows and BRF+
  • Describe how the different components of the GRC application integrate with each other
  • Discuss key steps in the Access Control implementation process


  • Implementation Consultants
  • Key Technical Business Users involved in an Access Control project
  • IT Governance Experts
  • Consultants for SAP Security and GRC IT Auditors
  • Business Project Team Leaders



  • GRC100_96 SAP Governance, Risk, and Compliance (GRC)10.0 Solution Overview and Harmonization
  • Knowledge of integrated processes in an SAP System
  • Knowledge of authorization concepts in an SAP System
  • Practical knowledge of common business processes


  • None

Course based on software release

  • SAP Access Control 10.0
  • SAP ERP Central Component (ECC) 6.05
  • SAP NetWeaver 7.02


  • Introduction to SAP Access Control 10.0
    • Access Control 10.0 Overview
    • Key Features and Benefits
    • Transporting Objects
    • User Interface Overview
    • A Day in the Life of an Access Control User
  • Harmonization and Integrations
    • Common Technical Platform
    • Effects of Harmonization in Access Control
    • Harmonization settings
    • Integration Points
    • How Access Control components work together
    • Identity Management Integration
    • LDAP Integration
  • Managing Compliance with Access Control 10.0
    • Business Challenges and Solutions
    • Overview of Business Process Flows
    • Segregation of Duties Risk Management Process
  • Information Architecture, Security, and Authorizations
  • Analyze and Manage Risk
    • Shared Master Data
    • Configuration and Rule Set Maintenance
    • Audit Trail Tracking
    • Risk Analysis Framework
    • System-Specific Mitigation
    • Mass Mitigation
  • Emergency Access Management
    • Emergency Access Management Overview
    • Centralized Firefighting
    • Plan for Emergency Access
    • Monitor Emergency Access
  • Design and Manage Roles
    • Configure Role Management
    • Configure Role Methodology
    • Plan for Technical Role Definition
    • Plan for Business Role Definition
    • Consolidate Roles through Role Mining
    • Mass Manage Roles
  • Provision and Manage Users
    • Plan for User Access
    • Plan for Human Resources Integration
    • Define User Provisioning
    • Design End User Personalization Forms
    • Request Approval
  • Periodic Access Review Process
    • Plan Periodic Review
    • Review Access Risk (SoD Review)
    • Monitor User Access
    • Monitor Role Access
  • Business Rule Framework (BRF)
    • Define workflow related Multi-Stage Multi-Path Workflow Rules
    • Define business rules using the BRF Workbench
    • Create BRFplus rules
  • Reporting
    • Reporting Framework
    • Change Existing Reports
    • Add Custom Fields to Access Requests and Roles
  • Access Control Implementation Process
    • Implementation Process Overview
    • Project Teams
    • Designing the Access Control Solution
    • Upgrade and Migration
    • Configuring Access Control using the IMG
    • Implementing the Solution
    • Optimizing and Enhancing the Solution

Popular tags

No tags submitted for this course yet

Share this course: Print