Sunday, 27 October 2013

Good Link for GRC Installation and Configuration Documents -Sap BusinessObjects Access Control 10.0



A fragmented, reactive approach to managing access risk isn't just inefficient and costly - it's bad for business. The SAP BusinessObjects Access Control application can enable your business to confidently manage and reduce access risk across the enterprise by helping you prevent unauthorized access and achieve real-time visibility into access risk.

To learn more about SAP GRC solutions, please visit our product page, or go to the GRC area of BPX. We also invite you to learn more about SAP GRC Access Control 5.3.


Getting Started

GRC 10.0 Pre-Installation 
The presentation explains the new architecture and the necessary prerequisites for a successful installation of SAP BusinessObjects GRC 10.0 and guides the reader through the installation procedure of the software.

GRC 10.0 Post-Installation 
The presentation explains the necessary post-installation steps in SAP BusinessObjects GRC 10.0.

AC 10.0 Post-Installation  
The presentation covers the basic steps required for setting up SAP BusinessObjects GRC 10.0. For setting up specific functionality please refer to corresponding pre-implementation guide.

AC 10.0 - Installation Checklist 
This guide provides a checklist for your installation activities for the Access Control 10.0 application.

Access Risk Analysis

AC 10.0 Pre-Implementation From Post-Installation to First Risk Analysis
This document allows implementation consultants and administrators to setup the required functionality for running a user level risk analysis after the post-installation has been finished. This is by no means a comprehensive guide for setting up the Access Risk Analysis component, rather it allows testing the application is working properly by setting up a basic test case.

AC 10.0 - Enhanced Access Risk Analysis  
This document describes the major enhancements to the access risk analysis capability of GRC, including end user customization and personalization. It covers how to navigate through the different reports, and also about new functionality such as new bulk maintenance, automation, audit trail, and mitigation options.

Emergency Access

AC 10.0 Pre-Implementation From Post-Installation to First Emergency Access 
This document allows implementation consultants and administrators to setup the required functionality for running an emergency access (firefighter) session after the post-installation has been finished. This is by no means a comprehensive guide for setting up the Emergency Access Management component, rather it allows testing the application is working properly by setting up a basic test case.

AC 10.0 - Centralized Emergency Access 
This document is a detailed guide on the emergency access capability of Access Control 10.0. It explains the basic concepts about emergency access and provide details on how to configure the application. Also this document includes additional information on the types of logs available for monitoring the emergency accesses.

Business Role Management

AC 10.0 Pre-Implementation From Post-Installation to First Role Creation  
This document allows implementation consultants and administrators to setup the required functionality for creating a single role in AC after the post-installation has been finished. This is by no means a comprehensive guide for setting up the Business Role Management component, rather it allows testing the application is working properly by setting up a basic test case.

AC 10.0 - Business Role Management 
This document allows implementation consultants and administrators to setup the required functionality for creating roles in AC after the post-installation has been finished. This guide provides the configuration steps for setting up Business Role Management.

Access Request Management

AC 10.0 Pre-Implementation From Post-Installation to First Access Request 
This document allows implementation consultants and administrators to setup the required functionality for creating an access request after the post-installation has been finished, please notice that it is required to configure Role Management before being able to request role assignments. This is by no means a comprehensive guide for setting up MSMP workflows, rather it allows testing the application is working properly by setting up a basic test case.

AC 10.0 - Customizing Workflows for Access Management
This document allows implementation consultants and administrators to setup the required functionality for enabling the workflow engine in AC 10.0. You will learn the main components of the new workflow engine and how to customize them, also how to create agents and initiators using Function Modules and BRFplus.

AC 10.0 - How to Customize Notification Templates for AC Workflow  
This how-to-guide explains how to set up the SAPconnect communication interface in your application server in order to send out email notifications triggered by workflow events in Access Control 10.0. This guide provides a comprehensive overview of workflow events that can trigger email notifications and notification variables used to populate the message bodies with information that is specific to each request. The guide also explains how the pre-delivered message bodies can be replaced by custom messages as well as how email reminders are set up.

AC 10.0 - Managing Custom Fields for Access & Role Management 
This document explains how to setup the required functionality for adding custom fields to access requests and roles maintained in GRC 10.0.

AC 10.0 - End User Personalization  
This how-to-guide explains the End User Personalization concept in Access Control 10.0 and the technical configuration to attain that functionality.

AC 10.0 - Performing Segregation of Duties Review 
This how-to-guide explains the Segregation of Duties Review concept and the technical configuration to attain that functionality.

Integration with Other Applications


GRC 10.0 Integration Guide:
SAP Access Control 10.0 Interface for Identity Management These documents cover all the new web services for Access Control 10.0 and integration scenarios with IDM solutions. The main foundation for this integration is based on NetWeaver Identity Management 7.2.

With the release of GRC 10.0, Access Control and Process Control are offered as an integrated solution, both at the data layer and at the user interface layer. This new unified platform enables increased harmonization of key master data. Organization, process and control structures can now be shared across components of Access Control and Process Control, which supports a more integrated approach to governance, risk, and compliance. Access risks identified in Access Control can be mitigated using controls managed by Process Control, as an example. This document details methods for harmonizing data across Access Control and Process Control.

Access Control 5.3

SAP GRC Access Control 5.3  
SAP GRC Solutions for Access Control handle sustainable prevention of segregation-of-duties (SoD) violations.

No comments:

Post a Comment