SAP GRC

Real Time IT Experts

Best SAP GRC Training Institute in Bangalore

Overview

SAP GRC (Governance, Risk, and Compliance) TRAINING

For Innovative Teaching And Learning Research Solutions

REAL TIME IT EXPERTS is one of the best in software training in Bangalore, We delivered the training for many individuals, groups, and corporations, We prioritize to give our best quality of training and further assistance, You have complete freedom to customize course topics and time, REAL TIME IT EXPERTS is a good experience and a generation ahead. Register yourself for unbelievable prices.

BOOK A FREE DEMO

    Introduction to GRC

    • What is GRC
    • SAP GRC Versions

    Application of GRC Financial Compliance

    • Types of GRC Financial Compliance and its explanation
    • How to activate GRC Financial Compliance

    What is SAP Access Control (AC)?

    What are the components of GRC Access Control?

    • Access Risk Analysis (ARA)
    • Emergency Access Management (EAM)
    • Access Request Management (ARM)
    • Business Role Management (BRM)

    Post Installation

    • Check The Required Components That Needs To Be Installed Both Grc & Ecc System
    • Active The Applications Of Financial Compliance
    • Activating BC Sets
    • Activating The Services
    • Perform Automatic Workflow Configuration
    • Perform Task Specific Customizing

    MODULES

    Common Configuration

    • Creating RFC Connection
    • Maintain Connectors & Connection Types
    • Maintain Connection Settings.
    • Maintain Configuration Settings Under Access Control
    • Maintain The Connector Settings
    • Maintain Mapping For Actions And Connectors Group
    • Maintain Plug-In Systems
    • Connect User Data Base From Backend To GRC System
    • Synchronization Jobs

    Access Risk Analysis (ARA)

    • Maintain Access Risk Levels
    • Maintain Custom User Group
    • Maintain Master User ID Mapping
    • Create & Maintain Rule Set, Function ID & Risk ID
    • Generate SoD Rules
    • Downloading SoD Rule
    • Uploading SoD Rule
    • ARA: Run User Risk Analysis
    • ARA: Batch Risk Analysis

    ARA: Mitigation Configuration

    Emergency Access Management (EAM)

    Brief Explanation on EAM and Configuring EAM

    • Prerequisite-Maintain Connection Setting
    • Prerequisite-Maintain Configuration Settings
    • Prerequisite: Create Users and Roles & Maintain in Access Control Owners
    • Assign Owner to FFID
    • Assign FFID to Controller and FireFighter
    • Create a Reason Code
    • Firefighter log Synchronization
    • Working of FFID execution by FireFighter
    • FFID Reports Execution

    Access Request Management (ARM)

    Brief Explanation on ARM and Configuring ARM

    • Maintain Connection Settings
    • Maintain Configuration Settings
    • Configure Number Ranges & Activate
    • Prerequisite: Maintain Provision Settings
    • Maintenance of Define Request types – MSMP Process IDs
    • Maintain MSMP Workflow
    • Find the working of ARM Configuration

    BRF+: Business Rule Framework

    • Generate MSMP Rules for Processes
    • Define Business Rule Framework – Execute T-Code BRF+
    • Mapping BRF+ Application with MSMP Workflow

    Business Role Management (BRM)

    Brief Explanation on BRM and Configuring BRM

    • Maintain Connectors to Connector Group
    • Requirements > Maintain Connection Settings
    • Requirements > Maintain Mapping for Actions and Connector Groups
    • Requirements > Maintain Connector Settings
    • Requirements > Activate Business Configuration BC-Set
    • Requirements > Maintain Configuration Settings
    • Requirements > Create Users & assign as Access Owners
    • Maintain Role type Settings
    • Prerequisite > Define Business Process & Sub Business Process
    • Specify Naming Convention
    • Define other Role Attributes
    • Maintain MSMP Workflow
    • Role Methodology
    • Role creation through Methodology
    • Role Import
    • Role Owner Update