Configuration for Fetching Manager Data from HR
Use: after configuration this setting. GRC system will pick respective HR master data from the HR master data information PFCG link .click on maintain Connection Setting following screen will appearand...
View ArticleFeatured Content for SAP Fraud Management
Announcing SAP Assurance and Compliance Software, Powered by SAP HANASAP is introducing a new product for Governance, Risk and Compliance: SAP Assurance and Compliance Software (ACS). SAP ACS...
View ArticleMaintain Authorization Customizing
PFCG Link UseIn this Customizing activity, you can activate or deactivate second-level authorizations, the use of shared memory for role definitions in Risk Management and Process Control, and the...
View ArticleFeatured Content for SAP Fraud Management
Announcing SAP Assurance and Compliance Software, Powered by SAP HANASAP is introducing a new product for Governance, Risk and Compliance: SAP Assurance and Compliance Software (ACS). SAP ACS...
View ArticleAC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+...
In Access Request, sometimes you would want to route your request based on the risk violations present in the request. There are some standard function module based detour/initiator rules which are...
View ArticleGRC Processes, Lifecycles and Responsibilities
Dear all, in this document I would like to share my experiences with setting up GRC processes, lifecycles and responsibilities. For each topic I have created an own blog post to discuss and contribute...
View ArticleExample of Mitigation Controls in GRC 10.0
In reference to document Creation of Mitigation Controls in GRC 10.0I made a test and intend to share this example. Create a Mitigation Control Role Analysis
View ArticleAC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+...
In Access Request, sometimes you would want to route your request based on the risk violations present in the request. There are some standard function module based detour/initiator rules which are...
View ArticleFeatured Content for SAP Fraud Management
SAP Fraud Management Released with New SAP Audit Management SolutionSAP Fraud Management Release 1.1 SP02, powered by SAP HANA, was released on February 10, 2014 together with a new solution, SAP Audit...
View ArticleConfigure Emergency Access (EAM) in GRC 10
Hello! Configuring EAM in GRC 10 isn’t a difficult task, but there are some details you have to take into account. The document “AC 10.0 Pre-Implementation From Post-Installation to First Emergency...
View ArticleCreation of Mitigation Controls in GRC 10.0
Before creating mitigating controls you need to create a Root Org entry, this replaces the Business Units in previous AC versions. Navigate to the IMG under Shared Master Data Settings and create a...
View ArticleRecommendations for using Business roles provisioning in access request
Customers who are using business roles provisioning via access request sometimes run into data consistency issues due to incorrect data in repository table GRACUSERROLE. There are many possible reasons...
View ArticleMaintain Custom Notification Messages
UseIn this Customizing activity, you assign custom notification e-mail messages to business recipients (workflow recipients).Whenever the workflow needs to determine the recipient, it does so by using...
View ArticleMaintaining the Event Queue Settings in GRC
UseIn this Customizing activity, you can use specific settings to improve the performance of your workflow processing. Since many dialog processes are utilized during workflow generation, if the...
View ArticleRegister Workflow System in qRFC Monitor
Register Workflow System in qRFC Monitor UseIn this Customizing activity, you can improve the performance of workflow processing. You do this by registering the logical RFC destination used by the...
View ArticleTransfer Work Items to Replacement
Transfer Work Items to Replacement UseIn this Customizing activity, you schedule the program Transfer Work Items to Replacement (GRFN_REPLACEMENT_MASS_ACTIVATE). The program transfers work items from...
View ArticleAC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+...
In Access Request, sometimes you would want to route your request based on the risk violations present in the request. There are some standard function module based detour/initiator rules which are...
View ArticleFeatured Content for SAP Fraud Management
SAP Fraud Management Released with New SAP Audit Management SolutionSAP Fraud Management Release 1.1 SP02, powered by SAP HANA, was released on February 10, 2014 together with a new solution, SAP Audit...
View ArticleCreation of Mitigation Controls in GRC 10.0
Before creating mitigating controls you need to create a Root Org entry, this replaces the Business Units in previous AC versions. Navigate to the IMG under Shared Master Data Settings and create a...
View ArticleConfigure Emergency Access (EAM) in GRC 10
Hello! Configuring EAM in GRC 10 isn’t a difficult task, but there are some details you have to take into account. The document “AC 10.0 Pre-Implementation From Post-Installation to First Emergency...
View Article