Notice Icon

Focus on Force has had a makeover! Same great products, same great prices but a whole lot more!

SAP Access Control Implementation and Configuration

Audience Application Consultant Business Analyst Business Process Architect Business Process Owner / Team Lead / Power User Prerequisites Essential GRC100 Recommended ADM940

Last Updated: March 2026

Audience

  • Application Consultant
  • Business Analyst
  • Business Process Architect
  • Business Process Owner / Team Lead / Power User

Prerequisites

  • GRC100
  • ADM940

Course Goals

  • Describe tasks performed by a typical SAP Access Control user
  • Explain how SAP GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control
  • Use the SAP Access Control application to analyze and manage risk, design and manage roles, and provision and manage users
  • Describe the SAP Access Control architecture and landscape, SAP Access Control Repository, and Object Level Security
  • Describe the Periodic Access Review process
  • Plan for and manage emergency access
  • Configure workflows, including multi-stage multi- path (MSMP) workflows and BRF+
  • Describe how the different applications of the SAP GRC Solution integrate with each other
  • Discuss key tasks in the SAP Access Control implementation process

Lessons and Topics

  • Introduction to Access Governance using SAP Access Control Business Challenges and Solutions
  • SAP Access Control Functionality and Integration Scenarios
  • Identification and Management of Access Risk Identifying Access Risks
  • The Access Risk Management Process
  • User Experience, Security Concepts and System Architecture User Access and the User Experience
  • User Access using the SAP Business Client
  • User Access using SAP Fiori Launchpad
  • SAP Access Control System Architecture
  • Configuration Overview Shared SAP GRC Settings
  • SAP Access Control Specific Settings
  • SAP Access Control Business Configuration (BC) Set Overview
  • Managing the Access Control Repository
  • Risk Analysis Maintaining Master Data and Access Control Owners
  • Risk Recognition
  • Rule Building and Validation
  • Access Risk Analysis
  • Risk Remediation
  • Risk Mitigation
  • Continuous Compliance
  • Appendix: (Optional) Access Risk Analysis Parameter Configuration
  • SAP Business Rule Framework (BRFplus) Introduction to Business Rules and Business Rule Management Systems
  • Defining MSMP Workflow-Related Rules using SAP Business Rule Framework BRFplus
  • Configuration and Maintenance of MSMP Workflow-Related Rules
  • Multi-Stage, Multi-Path (MSMP) Workflow Introducing Multi-Stage, Multi-Path (MSMP) Workflow
  • Implementing Multi-Stage, Multi-Path (MSMP) Workflow
  • User Provisioning Configuring User Provisioning Settings
  • Configuring Access Request Forms
  • Preparing Roles and Owner Data for MSMP Workflow
  • Requesting Access
  • Reviewing Search Request Results
  • Appendix: (Optional) User Provisioning Parameter Settings
  • Role Design and Management Configuring Role Management
  • Configuring Role Methodology
  • Configuring Role Search Attributes
  • Planning for Technical Role Definition
  • Planning for Business Role Definition
  • Consolidating Roles Through Role Mining
  • Performing Role Mass Maintenance Operations
  • Appendix (Optional) Evaluate Parameters for Role Management
  • Emergency Access Management Describing Emergency Access Management
  • Planning for Emergency Access Management
  • Monitoring Emergency Access
  • Appendix (Optional) Evaluate Parameters for Emergency Access Management
  • Periodic Access Review Process Planning Periodic Review
  • Monitoring Periodic Review
  • Appendix (Optional) Evaluate Parameters for Periodic Access Review
  • Appendix (Optional) Maintaining Custom Fields Maintaining Custom Fields

Why choose us?

We bring decades of enterprise technology expertise to every course.

150k
professionals trained worldwide
28+
years of enterprise-tech expertise
45+
practical, multi-platform courses
Your Cart (0)

Your cart is empty

Looks like you haven't added any items to your cart yet.