SAP Access Control
185 Blog Posts
69 Contributors
-
Firefighter Sessions (GRAC_FFSESSION) Report to check the major information of a Firefighter sessions and to (re)collect the logs, (re)initiate workflow, force logoff the session and to set the status of them. This is replacement to Timebased... Read More »0Comments1Like
-
こんにちは! 今回のブログでは、クラウド時代にふさわしい SAP が提供する IDとアクセス管理(いわゆる IAM、Identity and Access... Read More »0Comments1Like
-
Gratitude: Thanks to the people of SAP who contribute their effort towards compliance to deliver readymade Global SoD Ruleset for SAP and Non-SAP products in the form of BC-set. Storyline: Building SoD Rules for SAP ABAP stack applications are known... Read More »2Comments2Likes
-
A total of more than 4,100 publicly disclosed data breaches occurred in 2022, resulting in the exposure of approximately 22 billion records. 14 new ransomware groups target organizations worldwide. Since Jan 2023 to July 2023 approx. 2700+... Read More »0Comments1Like
-
As SAP security practitioners, we frequently encounter a critical decision-making process concerning the effective management of user access. Today, we will explore a pivotal subject that often sparks debates within the SAP community: The... Read More »0Comments6Likes
-
Not everything that glitters is gold! This statement applies perfectly to the external reporting solutions that many enterprises are embracing today. Surprisingly, approximately 40% of enterprises are outsourcing their reporting to external analytic... Read More »2Comments3Likes
-
Objective: This try is to give increased visualization of the Note: 2615341 with a tiny narration. Build: Mail conversation between Customer (A) and SAP GRC Consultant (A). ‘Cut to the main plot’. Customer A: I really appreciate your... Read More »0Comments5Likes
-
SAP GRC framework has a new buzzword – IAG, or Identity and Access Governance. Many of us have heard about this for the past couple of years, but are unsure of its capabilities. The purpose of this blog is to explain what IAG is and how it... Read More »5Comments16Likes
-
SAP GRC Augmented Access Control Introduction SAP GRC Augmented Access Control (AC) is a solution that helps organizations protect their data and systems by providing a comprehensive framework for managing access control. It combines the power of... Read More »0Comments8Likes
-
Access Request Management (ARM) ensures secure and controlled access to sensitive systems and data within organizations. To implement an effective risk management strategy, it is essential to identify and mitigate authorization risks. However, have... Read More »0Comments2Likes