Quantcast
Channel: SCN : Document List - Governance, Risk and Compliance (SAP GRC)
Browsing all 459 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Configuration for Fetching Manager Data from HR

Use: after configuration this setting. GRC system will pick respective HR master data from the HR master data information PFCG link .click on maintain Connection Setting following screen will appearand...

View Article


Featured Content for SAP Fraud Management

Announcing SAP Assurance and Compliance Software, Powered by SAP HANASAP is introducing a new product for Governance, Risk and Compliance:  SAP Assurance and Compliance Software (ACS). SAP ACS...

View Article


Image may be NSFW.
Clik here to view.

Maintain Authorization Customizing

PFCG Link  UseIn this Customizing activity, you can activate or deactivate second-level authorizations, the use of shared memory for role definitions in Risk Management and Process Control, and the...

View Article

Featured Content for SAP Fraud Management

Announcing SAP Assurance and Compliance Software, Powered by SAP HANASAP is introducing a new product for Governance, Risk and Compliance:  SAP Assurance and Compliance Software (ACS). SAP ACS...

View Article

Image may be NSFW.
Clik here to view.

AC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+...

In Access Request, sometimes you would want to route your request based on the risk violations present in the request. There are some standard function module based detour/initiator rules which are...

View Article


GRC Processes, Lifecycles and Responsibilities

Dear all, in this document I would like to share my experiences with setting up GRC processes, lifecycles and responsibilities. For each topic I have created an own blog post to discuss and contribute...

View Article

Image may be NSFW.
Clik here to view.

Example of Mitigation Controls in GRC 10.0

In reference to document Creation of Mitigation Controls in GRC 10.0I made a test and intend to share this example. Create a Mitigation Control Role Analysis

View Article

Image may be NSFW.
Clik here to view.

AC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+...

In Access Request, sometimes you would want to route your request based on the risk violations present in the request. There are some standard function module based detour/initiator rules which are...

View Article


Featured Content for SAP Fraud Management

SAP Fraud Management Released with New SAP Audit Management SolutionSAP Fraud Management Release 1.1 SP02, powered by SAP HANA, was released on February 10, 2014 together with a new solution, SAP Audit...

View Article


Image may be NSFW.
Clik here to view.

Configure Emergency Access (EAM) in GRC 10

Hello! Configuring EAM in GRC 10 isn’t a difficult task, but there are some details you have to take into account. The document “AC 10.0 Pre-Implementation From Post-Installation to First Emergency...

View Article

Image may be NSFW.
Clik here to view.

Creation of Mitigation Controls in GRC 10.0

Before creating mitigating controls you need to create a Root Org entry, this replaces the Business Units in previous AC versions. Navigate to the IMG under Shared Master Data Settings and create a...

View Article

Recommendations for using Business roles provisioning in access request

Customers who are using business roles provisioning via access request sometimes run into data consistency issues due to incorrect data in repository table GRACUSERROLE. There are many possible reasons...

View Article

Maintain Custom Notification Messages

UseIn this Customizing activity, you assign custom notification e-mail messages to business recipients (workflow recipients).Whenever the workflow needs to determine the recipient, it does so by using...

View Article


Image may be NSFW.
Clik here to view.

Maintaining the Event Queue Settings in GRC

UseIn this Customizing activity, you can use specific settings to improve the performance of your workflow processing. Since many dialog processes are utilized during workflow generation, if the...

View Article

Image may be NSFW.
Clik here to view.

Register Workflow System in qRFC Monitor

Register Workflow System in qRFC Monitor UseIn this Customizing activity, you can improve the performance of workflow processing. You do this by registering the logical RFC destination used by the...

View Article


Image may be NSFW.
Clik here to view.

Transfer Work Items to Replacement

Transfer Work Items to Replacement  UseIn this Customizing activity, you schedule the program Transfer Work Items to Replacement (GRFN_REPLACEMENT_MASS_ACTIVATE). The program transfers work items from...

View Article

Image may be NSFW.
Clik here to view.

AC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+...

In Access Request, sometimes you would want to route your request based on the risk violations present in the request. There are some standard function module based detour/initiator rules which are...

View Article


Featured Content for SAP Fraud Management

SAP Fraud Management Released with New SAP Audit Management SolutionSAP Fraud Management Release 1.1 SP02, powered by SAP HANA, was released on February 10, 2014 together with a new solution, SAP Audit...

View Article

Image may be NSFW.
Clik here to view.

Creation of Mitigation Controls in GRC 10.0

Before creating mitigating controls you need to create a Root Org entry, this replaces the Business Units in previous AC versions. Navigate to the IMG under Shared Master Data Settings and create a...

View Article

Image may be NSFW.
Clik here to view.

Configure Emergency Access (EAM) in GRC 10

Hello! Configuring EAM in GRC 10 isn’t a difficult task, but there are some details you have to take into account. The document “AC 10.0 Pre-Implementation From Post-Installation to First Emergency...

View Article
Browsing all 459 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>