1. Introduction to SAP Access Control
• Business Challenges and Solutions
• SAP Access Control
2. Architecture, Security, and Authorizations
• System Architecture
• Security and Authorizations
3. Shared Configuration Settings
• Configuring Shared GRC Settings
• Configuring Shared SAP Access Control Settings
4. Authorization Risks and the Segregation of Duties (SoD) Management Process
• Authorization Risks
• Managing Risk by Segregating Duties
5. SAP Access Control Repository
• Synchronizing Objects into the Repository
• Scheduling and Viewing Background Jobs
6. Risk Analysis
• Maintaining Shared Master Data
• Configuring and Maintaining the Rule Set
• Configuring and Using Audit Trail Tracking
• Using the Risk Analysis Framework
• Remediating Risks
• Mitigating Risks
• Mitigating Multiple Risks at One Time
7. Business Rule Framework
• Creating Rules in the Business Rule Framework (BRF)
• Defining Business Rules
8. Multi-Stage, Multi-Path (MSMP) Workflow
• Maintaining MSMP Workflow
• Building MSMP Workflow
9. User Provisioning
• Configuring User Provisioning Settings
• Configuring Access Request Forms
• Requesting Access
• Preparing Roles and Owner Data for MSMP Workflow
• Creating Simplified Access Requests
• Reviewing Search Request Results
10. SAP Fiori User Experience (UX) for GRC
• SAP Fiori UX
11. Role Design and Management
• Configuring Role Management
• Configuring Role Methodology
• Configuring Role Search Attributes
• Planning for Technical Role Definition
• Planning for Business Role Definition
• Consolidating Roles Through Role Mining
• Performing Role Mass Maintenance Operations
12. Emergency Access Management
• Planning for Emergency Access
• Monitoring Emergency Access
13. Periodic Access Review Process
• Planning Periodic Review
• Monitoring Periodic Review
14. Reports and Custom Fields
• Use the Reporting Framework
15. SAP Access Control Implementation
• Using the SAP Access Control Implementation Process
• Designing the SAP Access Control Solution
• Planning Upgrade and Migration
• Configuring SAP Access Control
• Implementing the SAP Access Control solution
• Optimizing the SAP Access Control Suite