SAP Access Control 10.0 – Implementation

GRC300 5 days

Virtual Live Classroom

SAP Access Control 10.0 – Implementation

Virtual Live Classroom
Display Language:
Insufficient data for accurate rating at this time.


  • Describe tasks performed by a typical SAP Access Control user
  • Discuss Harmonization topics as they relate to SAP Access Control
  • Explain how SAP GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control 10.0
  • Use the SAP Access Control 10.0 application to analyze and manage risk, design and manage roles, and provision and manage users
  • Describe the SAP Access Control 10.0 architecture and landscape, SAP Access Control Repository, and Object Level Security
  • Describe how to upgrade from SAP Access Control 5.3 to SAP Access Control 10.0
  • Explain post-installation steps for SAP Access Control 10.0
  • Describe the Periodic Access Review process
  • Plan for and manage emergency access
  • Discuss the reporting framework
  • Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
  • Describe how the different applications of the SAP GRC Solution integrate with each other
  • Discuss key steps in the SAP Access Control implementation process


  • Implementation Consultants
  • Key Technical Business Users involved in an SAP Access Control project
  • IT Governance Experts
  • Consultants for SAP Security and GRC IT Auditors
  • Business Project Team Leaders



  • GRC100_96 SAP Governance, Risk, and Compliance (GRC)10.0 Solution Overview and Harmonization
  • Knowledge of integrated processes in an SAP System
  • Knowledge of authorization concepts in an SAP System
  • Practical knowledge of common business processes


  • None

Course based on software release

  • SAP Access Control 10.0
  • SAP ERP Central Component (ECC) 6.05
  • SAP NetWeaver 7.02


  • Introduction to SAP Access Control
    • Discussing Business Challenges and Solutions
    • Using Access Control
  • Architecture, Security and Authorizations
    • Describing the System Architecture
    • Describing Object-Level Security
    • Describing Authorization Concepts
  • Authorization Risks and the SoD Risk Management Process
    • Identifying Authorization Risks
    • Managing Risk by Segregating Duties
  • Shared Configuration Settings
    • Configuring Shared SAP GRC Settings
    • Configuring Shared Access Control Settings
  • SAP Access Control Repository
    • Synchronizing Objects into the Repository
    • Scheduling and Viewing Background Jobs
  • Business Rule Framework (BRF)
    • Creating Rules in the Business Rule Framework (BRF)
    • Defining Business Rules
  • MSMP Workflow
    • Describing Multi-Stage Multi-Path Workflow
    • Maintaining MSMP Workflow
  • Analyze and Manage Risk
    • Maintaining Shared Master Data
    • Configuring and Maintaining the Rule Set
    • Using and Configuring Audit Trail Tracking
    • Using the Risk Analysis Framework
    • Remediating Risks
    • Mitigating Risks
    • Mass Mitigating
  • Emergency Access Management
    • Managing Emergency Access
    • Planning for Emergency Access: Owners, Controllers, and Firefighters
    • Planning for Emergency Access: Reason Codes
    • Monitoring Emergency Access
  • Design and Manage Roles
    • Configuring Role Management
    • Configuring Role Methodology
    • Planning for Technical Role Definition
    • Planning for Business Role Definition
    • Consolidating Roles through Role Mining
    • Mass Managing Roles
  • Provision and Manage Users
    • Designing End User Personalization Forms
    • Planning for User Access
    • Defining User Provisioning
    • Requesting User Access Approval
  • Periodic Access Review Process
    • Planning Periodic Review
    • Monitoring Periodic Review
  • Reports and Custom Fields
    • Working with the Reporting Framework
    • Changing Existing Reports
    • Adding Custom Fields to Access Requests and Roles
  • SAP Access Control Implementation
    • Working with the SAP Access Control Implementation Process
    • Designing the Access Control Solution
    • Planning Upgrade and Migration
    • Configuring SAP Access Control
    • Implementing the Solution
    • Optimizing and Enhancing the Solution

Popular tags

No tags submitted for this course yet

Share this course: Print