You are on page 1of 9

SAP BUSINESSOBJ ECTS ACCESS CONTROL 10.

0: LEARNING MAP FOR SOLUTION


CONSULTANTS

Learning Tracker
Must Know docs set to done: 0 of 36 | Completed: 0:00 of 33:28 hours
Each time you leave this Learning Map, remember to save your progress or set it to complete. You can continue to use
the Learning Map afterwards.
Open all / Close all
Update Your Core Competence - Must Know
Save & Close Set to Complete

I ntroduction to SAP BusinessObjects Access Control
10.0
Open/Close Duration: 4:11 hours
At the end of this unit you will be able to:
Discuss positioning for Access Control 10.0
Identify new features of Access Control 10.0
Provide a high level overview of planning, analyzing, responding to, and monitoring access
Identify key components of Access Control 10.0 Architecture
Identify migration scenarios
Identify the Access Control 10.0 architecture and components
Describe the common configurations, customizing BC sets
Discuss all the background jobs, including user-role sync
Describe the implementation of object level security in Access Control 10.0
Identify the out-of-the-box roles

I ntroduction to SAP BusinessObjects Access Control 10.0 eBook (HTM/SWF)
20 mins
December 2010

After completing this eBook, you will be able to:
Discuss positioning for Access Control 10.0
Identify new features of Access Control 10.0
Identify key components of Access Control 10.0 Architecture
Identify migration scenarios
Download the eBook to your computer.
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Architecture and Landscape Presentation (PDF)
43 mins (18 pages)
December 2010

After completing this presentation, you will be able to:
Identify key components of the GRC 10.0 architecture
Describe the Access Control 10.0 architecture and components
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Configuration Overview Presentation (PDF)
110 mins (46
pages)
May 2011

After completing this presentation, you will be able to describe the common configurations,
customizing BC sets.
Updated content May 2011

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Compl ementary
Learni ng
Techni ques
Live Expert Sessions
Learni ng Tool s
Getting Started
Recent Updates
Viewer Software
Search
Support
Terms & Conditions

Access Control Repository Presentation (PDF)
52 mins (22 pages)
May 2011

After completing this presentation, you will be able to:
Explain various programs which are used to sync the User, Role, Profile and Authorization
object to the Access Control Repository
Execute background jobs
Updated content May 2011
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Object Level Security Presentation (PDF)
26 mins (11 pages)
May 2011

After completing this presentation, you will be able to:
Describe the implementation of object level security in Access Control
Identify the out-of-the-box roles
Updated content May 2011
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Analyze and Manage Access Risk Open/Close Duration: 4:25 hours
At the end of this unit you will be able to:
Navigate the user interface for efficient creation and maintenance of functions, actions, and permissions
Describe workflow process for function maintenance
Discuss the Audit trail tracking of most maintenance activities
Describe the following new risk analysis features:
Flexible interface that supports list import, multiple selections and multiple analysis levels
Customization of results dynamically by user
Drill through links to master data including risks, users, roles, and more
Discuss organizations and control usage
Differentiate standalone organizations from those shared with PC and RM
Describe the use of owners and users
Describe the system-specific assignment of mitigating controls
Describe the process for mitigating large numbers of risks at one time
Demonstrate a risk analysis
Run a risk analysis
View results
Simulate role and permission changes for a user
Set up an organization
Establish owners and users
Assign owners, processes, subprocesses to organizations
Establish object level security settings

Rule Set Maintenance Presentation (PDF)
69 mins (29 pages)
May 2011

After completing this presentation, you will be able to navigate the user interface for efficient
creation and maintenance of functions, actions and permissions.
Updated content May 2011

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Approval Process for Functions Presentation (PDF)
After completing this presentation, you will be able to describe the workflow process for function
maintenance.

50 mins (21 pages)
December 2010

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Additional Audit Trail Tracking Presentation (PDF)
38 mins (16 pages)
December 2010

After completing this presentation, you will be able to discuss the Audit trail tracking of most
maintenance activities.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


New Risk Analysis Framework Presentation (PDF)
28 mins (12 pages)
December 2010

After completing this presentation, you will be able to describe the following new risk analysis
features:
Flexible interface that supports list import, multiple selections and multiple analysis levels
Customization of results dynamically by user
Drill through links to master data including risks, users, roles, and more
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Shared Master Data with PC and RM Applications Presentation (PDF)
21 mins (9 pages)
December 2010

After completing this presentation, you will be able to:
Discuss organizations and control usage
Differentiate standalone organizations from those shared with Process Control (PC) and Risk
Management (RM)
Describe the use of owners and users
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


System Specific Mitigation Presentation (PDF)
28 mins (12 pages)
December 2010

After completing this presentation, you will be able to describe the system-specific assignment of
mitigating controls.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Mass Mitigation Presentation (PDF)
31 mins (13 pages)
December 2010

After completing this presentation, you will be able to describe the process for mitigating large
numbers of risks at one time.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Design and Manage Roles Open/Close Duration: 6:14 hours
At the end of this unit you will be able to:
Discuss Business Roles
Discuss changes to Technical role definition including role derivation
Describe the process of Role compare and Role usage reports
Describe PFCG integration and required configuration tasks
Identify role mass operations
Describe the Role Certification process
Demonstrate how to define a role
Define a role
Authorize a role

Configure Role Management Presentation (PDF)
55 mins (23 pages)
December 2010

After completing this presentation, you will be able to describe Configuration options for Role
Management

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Configure Role Methodology Presentation (PDF)
93 mins (39 pages)
May 2011

After completing this presentation, you will be able to discuss Role Methodology Definition.
Updated content May 2011

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Plan for Business Role Definition Presentation (PDF)
60 mins (25 pages)
December 2010

After completing this presentation, you will be able to discuss Business Roles.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Plan for Technical Role Definition Presentation (PDF)
43 mins (18 pages)
December 2010

After completing this presentation, you will be able to:
Discuss changes to Technical role definition including role derivation
Describe PFCG integration and required configuration tasks
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Consolidate Role Through Role Mining Presentation (PDF)
45 mins (19 pages)
December 2010

After completing this presentation, you will be able to describe the process of Role compare and
Role usage reports.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Mass Manage Roles Presentation (PDF)
52 mins (22 pages)
December 2010

After completing this presentation, you will be able to identify role mass operations.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Role Certification Presentation (PDF)
26 mins (11 pages)
December 2010

After completing this presentation you will be able to describe the Role Certification process.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Periodic Access Review Process Open/Close Duration: 2:32 hours
At the end of this unit you will be able to:
Describe the Periodic review process and setup
Discuss Access Risk review
Discuss User Access Review
Discuss Role Access Review
Demonstrate the Periodic Access Review Process
Monitor user access
Monitor role access

Plan Periodic Review Presentation (PDF)
72 mins (30 pages)
December 2010

After completing this presentation, you will be able to:
Describe the Periodic Review Process
Configure Parameters for periodic access review requests
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Monitor for Access Risks Presentation (PDF)
24 mins (10 pages)
December 2010

After completing this presentation, you will be able to discuss Access Risk review.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Monitor User Access Presentation (PDF)
40 mins (17 pages)
December 2010

After completing this presentation, you will be able to discuss User Access Review.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Monitor Role Access Presentation (PDF)
16 mins (7 pages)
December 2010

After completing this presentation, you will be able to discuss Role Access Review.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Provision and Manage Users Open/Close Duration: 5:04 hours
At the end of this unit you will be able to:
Explain how to configure request parameters
Describe how to create access requests
Describe how to identify owners
Explain how to create Firefighter access requests
Describe how to plan for HR Integration
Explain how to plan for end user authentication
Highlight Form customization and template creation
Explain user provisioning configuration and field mapping
Describe the Request Approval process
Demonstrate how to set up and initiate a workflow
Plan for user access
Access, analyze and process a user access request

Plan for User Access Presentation (PDF)
122 mins (51
pages)
December 2010

After completing this presentation, you will be able to:
Create access requests
Model user access
Use a template to create a request
Copy a request
Create requests for User Organizational assignments
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Plan for HR Integration Presentation (PDF)
67 mins (28 pages)
December 2010

After completing this presentation, you will be able to:
Describe HR events for employees captured for any info types and combinations
Customize and establish prerequisite settings for HR trigger
Use BRF Rules in HR triggers
Check logs for created requests
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Design End User Request Forms and Templates Presentation (PDF)
19 mins (8 pages)
December 2010

After completing this presentation, you will be able to describe Form customization and template
creation.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Define User Provisioning Presentation (PDF)
36 mins (15 pages)
December 2010

After completing this presentation, you will be able to explain provisioning configuration and field
mapping.

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Request Approval Presentation (PDF)
60 mins (25 pages)
December 2010

After completing this presentation, you will be able to:
Describe Workflow Inbox
Describe risk analysis and request approval
Discuss rules and policies
Configure request parameters
Describe HR Organization assignment requests for job, position and org unit assignments with
roles supported with workflow, risk analysis and provisioning
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
I dentity Management (IdM) Integration Open/Close Duration: 2:57 hours
At the end of this unit you will be able to:
Describe GRC Identity Management Integration Services
Describe IdM configuration tasks
Demonstrate IdM configuration
Perform IdM configuration tasks

I dM Integration Overview Presentation (PDF)
60 mins (25 pages)
December 2010

After completing this presentation, you will be able to:
Describe the Identity Management Integration Scenarios
Discuss Password Self Service with IdM Integration
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Perform GRC Configuration Tasks for IdM Integration Presentation (PDF)
117 mins (49
pages)
December 2010

After completing this presentation, you will be able to:
Describe the Identity Management Integration Scenarios
Discuss Password Self Service with IdM Integration
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Emergency Access Management Open/Close Duration: 3:49 hours
At the end of this unit you will be able to:
Describe the architecture and maintenance changes for emergency access
Identify critical firefighting roles and assignments
Discuss new workflow features and the auditable process for tracking log report approvals
Describe configuration options for superuser and location
Describe new FF reports
Demonstrate how to request firefighter IDs and roles
Discuss criticality and groups
Configure firefighting roles

Plan for Emergency Access Presentation (PDF)
124 mins (52
pages)
May 2011

After completing this presentation, you will be able to:
Describe the architecture and maintenance changes for emergency access
Identify critical firefighting roles and assignments
Discuss new workflow features and the auditable process for tracking log report approvals
Describe configuration options for superuser and location
Updated content May 2011
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Monitor Emergency Access Presentation (PDF)
62 mins (26 pages)
May 2011

After completing this presentation, you will be able to describe new Firefighter reports.
Updated content May 2011

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Centralized Firefighting Presentation (PDF)
43 mins (18 pages)
May 2011

After completing this presentation, you will be able to:
Understand Centralized Firefighting concept
Extend Your Competence - Nice to Know
Use Centralized firefighting
Updated content May 2011
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Reporting Framework Open/Close Duration: 0:24 hours
At the end of this unit you will be able to:
Describe the new reporting framework
Customize reports

Reporting Framework Presentation (PDF)
24 mins (10 pages)
May 2011

After completing this presentation, you will be able to:
Describe the new reporting framework
Explain how to customize reports
Updated content May 2011
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Workflow Configuration Open/Close Duration: 3:52 hours
At the end of this unit you will be able to:
Identify delivered workflows for each capability
Explain the common inbox
Describe key roles
Discuss configuration options
Configure workflows

MSMP Workflow Configuration Presentation (PDF)
148 mins (62
pages)
May 2011

After completing this presentation, you will be able to:
Identify delivered workflows for each capability
Describe key roles
Discuss configuration options
Configure workflows
Updated content May 2011
This content was approved by target group representatives. Did it help
you? Select...
Please
specify:


Business Rule Framework (BRF+) Presentation (PDF)
84 mins (35 pages)
May 2011

After completing this presentation, you will be able to describe how rules are created using the
Business Rule Framework.
Updated content May 2011

This content was approved by target group representatives. Did it help
you? Select...
Please
specify:

Close
Back to Top
See the statistics for this learning map
Access Control 10.0 Workshop Material Open/Close
At the end of this unit you will be able to download the collection of hands-on exercises for additional training and
reference purposes.
Access Control 10.0 Workshop Material Workshop
Material (ZIP)


Use this workshop material for additional training purposes.

Close
I dentity Management (IDM) Integration Open/Close
GRC Web Services for IdM I ntegration Presentation
(PDF)
326 mins (136
pages)
December 2010

After completing this presentation, you will be able to describes in detail the Webservices required to
integrate IdM.

Close

You might also like