Learning Tracker Must Know docs set to done: 0 of 36 | Completed: 0:00 of 33:28 hours Each time you leave this Learning Map, remember to save your progress or set it to complete. You can continue to use the Learning Map afterwards. Open all / Close all Update Your Core Competence - Must Know Save & Close Set to Complete
I ntroduction to SAP BusinessObjects Access Control 10.0 Open/Close Duration: 4:11 hours At the end of this unit you will be able to: Discuss positioning for Access Control 10.0 Identify new features of Access Control 10.0 Provide a high level overview of planning, analyzing, responding to, and monitoring access Identify key components of Access Control 10.0 Architecture Identify migration scenarios Identify the Access Control 10.0 architecture and components Describe the common configurations, customizing BC sets Discuss all the background jobs, including user-role sync Describe the implementation of object level security in Access Control 10.0 Identify the out-of-the-box roles
I ntroduction to SAP BusinessObjects Access Control 10.0 eBook (HTM/SWF) 20 mins December 2010
After completing this eBook, you will be able to: Discuss positioning for Access Control 10.0 Identify new features of Access Control 10.0 Identify key components of Access Control 10.0 Architecture Identify migration scenarios Download the eBook to your computer. This content was approved by target group representatives. Did it help you? Select... Please specify:
Architecture and Landscape Presentation (PDF) 43 mins (18 pages) December 2010
After completing this presentation, you will be able to: Identify key components of the GRC 10.0 architecture Describe the Access Control 10.0 architecture and components This content was approved by target group representatives. Did it help you? Select... Please specify:
Configuration Overview Presentation (PDF) 110 mins (46 pages) May 2011
After completing this presentation, you will be able to describe the common configurations, customizing BC sets. Updated content May 2011
This content was approved by target group representatives. Did it help you? Select... Please specify:
Compl ementary Learni ng Techni ques Live Expert Sessions Learni ng Tool s Getting Started Recent Updates Viewer Software Search Support Terms & Conditions
Access Control Repository Presentation (PDF) 52 mins (22 pages) May 2011
After completing this presentation, you will be able to: Explain various programs which are used to sync the User, Role, Profile and Authorization object to the Access Control Repository Execute background jobs Updated content May 2011 This content was approved by target group representatives. Did it help you? Select... Please specify:
Object Level Security Presentation (PDF) 26 mins (11 pages) May 2011
After completing this presentation, you will be able to: Describe the implementation of object level security in Access Control Identify the out-of-the-box roles Updated content May 2011 This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Analyze and Manage Access Risk Open/Close Duration: 4:25 hours At the end of this unit you will be able to: Navigate the user interface for efficient creation and maintenance of functions, actions, and permissions Describe workflow process for function maintenance Discuss the Audit trail tracking of most maintenance activities Describe the following new risk analysis features: Flexible interface that supports list import, multiple selections and multiple analysis levels Customization of results dynamically by user Drill through links to master data including risks, users, roles, and more Discuss organizations and control usage Differentiate standalone organizations from those shared with PC and RM Describe the use of owners and users Describe the system-specific assignment of mitigating controls Describe the process for mitigating large numbers of risks at one time Demonstrate a risk analysis Run a risk analysis View results Simulate role and permission changes for a user Set up an organization Establish owners and users Assign owners, processes, subprocesses to organizations Establish object level security settings
Rule Set Maintenance Presentation (PDF) 69 mins (29 pages) May 2011
After completing this presentation, you will be able to navigate the user interface for efficient creation and maintenance of functions, actions and permissions. Updated content May 2011
This content was approved by target group representatives. Did it help you? Select... Please specify:
Approval Process for Functions Presentation (PDF) After completing this presentation, you will be able to describe the workflow process for function maintenance.
50 mins (21 pages) December 2010
This content was approved by target group representatives. Did it help you? Select... Please specify:
Additional Audit Trail Tracking Presentation (PDF) 38 mins (16 pages) December 2010
After completing this presentation, you will be able to discuss the Audit trail tracking of most maintenance activities.
This content was approved by target group representatives. Did it help you? Select... Please specify:
New Risk Analysis Framework Presentation (PDF) 28 mins (12 pages) December 2010
After completing this presentation, you will be able to describe the following new risk analysis features: Flexible interface that supports list import, multiple selections and multiple analysis levels Customization of results dynamically by user Drill through links to master data including risks, users, roles, and more This content was approved by target group representatives. Did it help you? Select... Please specify:
Shared Master Data with PC and RM Applications Presentation (PDF) 21 mins (9 pages) December 2010
After completing this presentation, you will be able to: Discuss organizations and control usage Differentiate standalone organizations from those shared with Process Control (PC) and Risk Management (RM) Describe the use of owners and users This content was approved by target group representatives. Did it help you? Select... Please specify:
System Specific Mitigation Presentation (PDF) 28 mins (12 pages) December 2010
After completing this presentation, you will be able to describe the system-specific assignment of mitigating controls.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Mass Mitigation Presentation (PDF) 31 mins (13 pages) December 2010
After completing this presentation, you will be able to describe the process for mitigating large numbers of risks at one time.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Design and Manage Roles Open/Close Duration: 6:14 hours At the end of this unit you will be able to: Discuss Business Roles Discuss changes to Technical role definition including role derivation Describe the process of Role compare and Role usage reports Describe PFCG integration and required configuration tasks Identify role mass operations Describe the Role Certification process Demonstrate how to define a role Define a role Authorize a role
Configure Role Management Presentation (PDF) 55 mins (23 pages) December 2010
After completing this presentation, you will be able to describe Configuration options for Role Management
This content was approved by target group representatives. Did it help you? Select... Please specify:
Configure Role Methodology Presentation (PDF) 93 mins (39 pages) May 2011
After completing this presentation, you will be able to discuss Role Methodology Definition. Updated content May 2011
This content was approved by target group representatives. Did it help you? Select... Please specify:
Plan for Business Role Definition Presentation (PDF) 60 mins (25 pages) December 2010
After completing this presentation, you will be able to discuss Business Roles.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Plan for Technical Role Definition Presentation (PDF) 43 mins (18 pages) December 2010
After completing this presentation, you will be able to: Discuss changes to Technical role definition including role derivation Describe PFCG integration and required configuration tasks This content was approved by target group representatives. Did it help you? Select... Please specify:
Consolidate Role Through Role Mining Presentation (PDF) 45 mins (19 pages) December 2010
After completing this presentation, you will be able to describe the process of Role compare and Role usage reports.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Mass Manage Roles Presentation (PDF) 52 mins (22 pages) December 2010
After completing this presentation, you will be able to identify role mass operations.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Role Certification Presentation (PDF) 26 mins (11 pages) December 2010
After completing this presentation you will be able to describe the Role Certification process.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Periodic Access Review Process Open/Close Duration: 2:32 hours At the end of this unit you will be able to: Describe the Periodic review process and setup Discuss Access Risk review Discuss User Access Review Discuss Role Access Review Demonstrate the Periodic Access Review Process Monitor user access Monitor role access
Plan Periodic Review Presentation (PDF) 72 mins (30 pages) December 2010
After completing this presentation, you will be able to: Describe the Periodic Review Process Configure Parameters for periodic access review requests This content was approved by target group representatives. Did it help you? Select... Please specify:
Monitor for Access Risks Presentation (PDF) 24 mins (10 pages) December 2010
After completing this presentation, you will be able to discuss Access Risk review.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Monitor User Access Presentation (PDF) 40 mins (17 pages) December 2010
After completing this presentation, you will be able to discuss User Access Review.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Monitor Role Access Presentation (PDF) 16 mins (7 pages) December 2010
After completing this presentation, you will be able to discuss Role Access Review.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Provision and Manage Users Open/Close Duration: 5:04 hours At the end of this unit you will be able to: Explain how to configure request parameters Describe how to create access requests Describe how to identify owners Explain how to create Firefighter access requests Describe how to plan for HR Integration Explain how to plan for end user authentication Highlight Form customization and template creation Explain user provisioning configuration and field mapping Describe the Request Approval process Demonstrate how to set up and initiate a workflow Plan for user access Access, analyze and process a user access request
Plan for User Access Presentation (PDF) 122 mins (51 pages) December 2010
After completing this presentation, you will be able to: Create access requests Model user access Use a template to create a request Copy a request Create requests for User Organizational assignments This content was approved by target group representatives. Did it help you? Select... Please specify:
Plan for HR Integration Presentation (PDF) 67 mins (28 pages) December 2010
After completing this presentation, you will be able to: Describe HR events for employees captured for any info types and combinations Customize and establish prerequisite settings for HR trigger Use BRF Rules in HR triggers Check logs for created requests This content was approved by target group representatives. Did it help you? Select... Please specify:
Design End User Request Forms and Templates Presentation (PDF) 19 mins (8 pages) December 2010
After completing this presentation, you will be able to describe Form customization and template creation.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Define User Provisioning Presentation (PDF) 36 mins (15 pages) December 2010
After completing this presentation, you will be able to explain provisioning configuration and field mapping.
This content was approved by target group representatives. Did it help you? Select... Please specify:
Request Approval Presentation (PDF) 60 mins (25 pages) December 2010
After completing this presentation, you will be able to: Describe Workflow Inbox Describe risk analysis and request approval Discuss rules and policies Configure request parameters Describe HR Organization assignment requests for job, position and org unit assignments with roles supported with workflow, risk analysis and provisioning This content was approved by target group representatives. Did it help you? Select... Please specify:
Close I dentity Management (IdM) Integration Open/Close Duration: 2:57 hours At the end of this unit you will be able to: Describe GRC Identity Management Integration Services Describe IdM configuration tasks Demonstrate IdM configuration Perform IdM configuration tasks
I dM Integration Overview Presentation (PDF) 60 mins (25 pages) December 2010
After completing this presentation, you will be able to: Describe the Identity Management Integration Scenarios Discuss Password Self Service with IdM Integration This content was approved by target group representatives. Did it help you? Select... Please specify:
Perform GRC Configuration Tasks for IdM Integration Presentation (PDF) 117 mins (49 pages) December 2010
After completing this presentation, you will be able to: Describe the Identity Management Integration Scenarios Discuss Password Self Service with IdM Integration This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Emergency Access Management Open/Close Duration: 3:49 hours At the end of this unit you will be able to: Describe the architecture and maintenance changes for emergency access Identify critical firefighting roles and assignments Discuss new workflow features and the auditable process for tracking log report approvals Describe configuration options for superuser and location Describe new FF reports Demonstrate how to request firefighter IDs and roles Discuss criticality and groups Configure firefighting roles
Plan for Emergency Access Presentation (PDF) 124 mins (52 pages) May 2011
After completing this presentation, you will be able to: Describe the architecture and maintenance changes for emergency access Identify critical firefighting roles and assignments Discuss new workflow features and the auditable process for tracking log report approvals Describe configuration options for superuser and location Updated content May 2011 This content was approved by target group representatives. Did it help you? Select... Please specify:
Monitor Emergency Access Presentation (PDF) 62 mins (26 pages) May 2011
After completing this presentation, you will be able to describe new Firefighter reports. Updated content May 2011
This content was approved by target group representatives. Did it help you? Select... Please specify:
Centralized Firefighting Presentation (PDF) 43 mins (18 pages) May 2011
After completing this presentation, you will be able to: Understand Centralized Firefighting concept Extend Your Competence - Nice to Know Use Centralized firefighting Updated content May 2011 This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Reporting Framework Open/Close Duration: 0:24 hours At the end of this unit you will be able to: Describe the new reporting framework Customize reports
Reporting Framework Presentation (PDF) 24 mins (10 pages) May 2011
After completing this presentation, you will be able to: Describe the new reporting framework Explain how to customize reports Updated content May 2011 This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Workflow Configuration Open/Close Duration: 3:52 hours At the end of this unit you will be able to: Identify delivered workflows for each capability Explain the common inbox Describe key roles Discuss configuration options Configure workflows
MSMP Workflow Configuration Presentation (PDF) 148 mins (62 pages) May 2011
After completing this presentation, you will be able to: Identify delivered workflows for each capability Describe key roles Discuss configuration options Configure workflows Updated content May 2011 This content was approved by target group representatives. Did it help you? Select... Please specify:
Business Rule Framework (BRF+) Presentation (PDF) 84 mins (35 pages) May 2011
After completing this presentation, you will be able to describe how rules are created using the Business Rule Framework. Updated content May 2011
This content was approved by target group representatives. Did it help you? Select... Please specify:
Close Back to Top See the statistics for this learning map Access Control 10.0 Workshop Material Open/Close At the end of this unit you will be able to download the collection of hands-on exercises for additional training and reference purposes. Access Control 10.0 Workshop Material Workshop Material (ZIP)
Use this workshop material for additional training purposes.
Close I dentity Management (IDM) Integration Open/Close GRC Web Services for IdM I ntegration Presentation (PDF) 326 mins (136 pages) December 2010
After completing this presentation, you will be able to describes in detail the Webservices required to integrate IdM.