0% found this document useful (0 votes)
250 views

SAP GRC Course: AP GRC 10.0 Access Control

This document provides an overview of the SAP GRC 10.0 course, including an introduction to the GRC 10.0 suite, an explanation of separation of duties concepts, differences between GRC 10.0 and other versions, and installation and configuration instructions for the key GRC 10.0 access control components: ARA for access risk analysis, EAM for emergency access management, ARM for access request management, and BRM for business role management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
250 views

SAP GRC Course: AP GRC 10.0 Access Control

This document provides an overview of the SAP GRC 10.0 course, including an introduction to the GRC 10.0 suite, an explanation of separation of duties concepts, differences between GRC 10.0 and other versions, and installation and configuration instructions for the key GRC 10.0 access control components: ARA for access risk analysis, EAM for emergency access management, ARM for access request management, and BRM for business role management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

SAP GRC Course

AP GRC 10.0 Access control


Introduction of GRC 10.0 Suite
SOD Concept Explanation
Difference between GRC10.0 to Other GRC Versions
Installation Requirements of GRC 10.0
Configuration of Each GRC 10.0 AC Components

1. ARA (Access Risk Analysis)

 
Risk Analysis On Different Levels
Remediation Process
Mitigation Process
Rule Set Designing
Background Jobs Scheduling
Reports

1. EAM (Emergency Access Management)

 
Configuration of EAM
Assigning Emergency Access to User
Audit Reports

1. ARM (Access Request Management)

 
Basic Configuration of ARM
Configuration of MSMP workflows
Generating BRF+ objects
 

1. BRM (Business Role Management)

 
Overview of BRM
Basic Configuration of BRM
Generating roles using BRM
 

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy