00 353 1 2790020sales@olas.ie Olas: Professional, Direct, Clever & Helpful

GRC300: SAP Access Control 10.0 Implementation


  • Describe tasks performed by a typical SAP Access Control user
  • Discuss Harmonization topics as they relate to SAP Access Control
  • Explain how SAP GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control 10.0
  • Use the SAP Access Control 10.0 application to analyze and manage risk, design and manage roles, and provision and manage users
  • Describe the SAP Access Control 10.0 architecture and landscape, SAP Access Control Repository, and Object Level Security
  • Describe how to upgrade from SAP Access Control 5.3 to SAP Access Control 10.0
  • Explain post-installation steps for SAP Access Control 10.0
  • Describe the Periodic Access Review process
  • Plan for and manage emergency access
  • Discuss the reporting framework
  • Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
  • Describe how the different applications of the SAP GRC Solution integrate with each other
  • Discuss key steps in the SAP Access Control implementation process

Price €3,325 per person


  • 5 Days – Please call us regarding scheduling





  • Implementation Consultants
  • Key Technical Business Users involved in an SAP Access Control project
  • IT Governance Experts
  • Consultants for SAP Security and GRC IT Auditors
  • Business Project Team Leaders



  • GRC100_96 SAP Governance, Risk, and Compliance (GRC)10.0 Solution Overview and Harmonization
  • Knowledge of integrated processes in an SAP System
  • Knowledge of authorization concepts in an SAP System
  • Practical knowledge of common business processes

Course based on software release

  • SAP Access Control 10.0
  • SAP ERP Central Component (ECC) 6.05
  • SAP NetWeaver 7.02
Course Outline

Introduction to SAP Access Control

  • Discussing Business Challenges and Solutions
  • Using Access Control

Architecture, Security and Authorisations

  • Describing the System Architecture
  • Describing Object-Level Security
  • Describing Authorisation Concepts

Authorisation Risks and the SoD Risk Management Process

  • Identifying Authorisation Risks
  • Managing Risk by Segregating Duties

Shared Configuration Settings

  • Configuring Shared SAP GRC Settings
  • Configuring Shared Access Control Settings

SAP Access Control Repository

  • Synchronising Objects into the Repository
  • Scheduling and Viewing Background Jobs

Business Rule Framework (BRF)

  • Creating Rules in the Business Rule Framework (BRF)
  • Defining Business Rules

MSMP Workflow

  • Describing Multi-Stage Multi-Path Workflow
  • Maintaining MSMP Workflow

Analyse and Manage Risk

  • Maintaining Shared Master Data
  • Configuring and Maintaining the Rule Set
  • Using and Configuring Audit Trail Tracking
  • Using the Risk Analysis Framework
  • Remediating Risks
  • Mitigating Risks
  • Mass Mitigating

Emergency Access Management

  • Managing Emergency Access
  • Planning for Emergency Access: Owners, Controllers, and Firefighters
  • Planning for Emergency Access: Reason Codes
  • Monitoring Emergency Access

Design and Manage Roles

  • Configuring Role Management
  • Configuring Role Methodology
  • Planning for Technical Role Definition
  • Planning for Business Role Definition
  • Consolidating Roles through Role Mining
  • Mass Managing Roles

Provision and Manage Users

  • Designing End User Personalization Forms
  • Planning for User Access
  • Defining User Provisioning
  • Requesting User Access Approval

Periodic Access Review Process

  • Planning Periodic Review
  • Monitoring Periodic Review

Reports and Custom Fields

  • Working with the Reporting Framework
  • Changing Existing Reports
  • Adding Custom Fields to Access Requests and Roles

SAP Access Control Implementation

  • Working with the SAP Access Control Implementation Process
  • Designing the Access Control Solution
  • Planning Upgrade and Migration
  • Configuring SAP Access Control
  • Implementing the Solution
  • Optimising and Enhancing the Solution
Contact Us

Drop us a line, include your contact details and we will get back to you as soon as possible.