Access Request Management (ARM) ensures secure and controlled access to sensitive systems and data within organizations. To implement an effective risk management strategy, it is essential to identify and mitigate authorization risks. However, have you ever been required to mitigate only high and medium risks and ignore low ones? This blog discusses a solution to....
Access Analysis plays a crucial role in IAG to provide several functionalities to manage the potential occurrence of risks and their proper handling. Ruleset is foundation of all these functionalities of Access Analysis. In this blog post, I have tried to provide answers to few questions regarding Access Analysis, which can be beneficial to those....
Creation and assignment of Mitigation Controls in SAP GRC 12.0.This document describes the Mitigation configuration proces in GRC12 Access Control in very simple and easy way. What is Mitigation? The Mitigation allows you to mitigate certain risk violations that you want available to specific users or roles. This is done by creating and assigning a Mitigation....
“The shoemaker’s children always go barefoot” 🙂 This is somehting that can discribe our SAP IdM authorization structure/concept …there is no such. It’s a rare case, when we have to implement one and there is no standard connector or approach for that. With this blog, I want to present one possible direction with which we can....
Introduction: We might come across data in Access Control and Process Control applications which are relatively old or obsolete in nature and need to be archived to avoid system performance issues when the data volume rises. The archiving function provides the choice to store away unneeded historical data so that the different features/applications will be able....
Background Context Business objects developed by SAP in Business ByDesign can have controlled access based on the associated Access Control List (ACL) node data. ACL is a dependent object (DO) that can be related to the business object to provide controlled access. Scenario We have a Custom Business Object, and it has a field of....
Introduction: This blog post will cover the process and steps to configure the MSMP configuration in SAP GRC Access Control. I am writing this blog because during implementation of MSMP, I faced lot of challenges. After doing several changes finally, I was able to complete this configuration in one of the SAP system. In GRC....
There might be situations in which the Business decides to accept a given Risk but just for a set of users, or a specific User Group, and you might need to exclude them from all Risk Analysis reports. SAP Access Control provides the ability to exclude objects (Users, Roles, Profiles, User Groups) from Batch Risk....
GRC Integration with SuccessFactors EC Using IAG Bridge Concept The below steps will provide the insight on how GRC AC will integrate with IAG and SAP SF EC for user creation and provisioning. Overview 1. Setup SuccessFactors System for IAG Provisioning I. The SF system needs to be setup and enabled for Oauth2 through “Manage....
Please follow below steps to upload Cloud Groups in GRC AC for IAG Bridge For Uploading Cloud Group setup as below Role Type = Technical Role Import Source= File on Desktop Role Authentic Source = Skip Application Type = IAG Landscape = ARIBA/SAC etc. Methodology = Complete Selection Criteria ....