Вы находитесь на странице: 1из 9

SAP BUSINESSOBJECTS ACCESS CONTROL 10.0: LEARNING MAP FOR SOLUTION CONSULTANTS

Learning Tracker Must Know docs set to done: 0 of 36 | Completed: 0:00 of
Learning Tracker
Must Know docs set to done: 0 of 36
|
Completed: 0:00 of 33:28 hours
Each time you leave this Learning Map, remember to save your progress or set it to complete. You can continue to use
the Learning Map afterwards.
Save & Close
Set to Complete

Open all / Close all

Update Your Core Competence - Must Know

Introduction to SAP BusinessObjects Access Control

 

10.0

 

Open/Close

Duration:

4:11 hours

 

At the end of this unit you will be able to:

 

Discuss positioning for Access Control 10.0

Identify new features of Access Control 10.0

Provide a high level overview of planning, analyzing, responding to, and monitoring access

 

Identify key components of Access Control 10.0 Architecture

 

Identify migration scenarios

Identify the Access Control 10.0 architecture and components

 

Describe the common configurations, customizing BC sets

Discuss all the background jobs, including user-role sync

Describe the implementation of object level security in Access Control 10.0

 

Identify the out-of-the-box roles

 
  Introduction to SAP BusinessObjects Access Control 10.0   eBook (HTM/SWF)

Introduction to SAP BusinessObjects Access Control 10.0

 

eBook (HTM/SWF)

 

20 mins

 

After completing this eBook, you will be able to:

 

December 2010

Discuss positioning for Access Control 10.0

Identify new features of Access Control 10.0

Identify key components of Access Control 10.0 Architecture

 

Identify migration scenarios

Download the eBook to your computer.

 
 

This content was approved by target group representatives. Did it help

Please

  This content was approved by target group representatives. Did it help Please

you?

Select

specify:

 
  Architecture and Landscape Presentation (PDF) 43 mins (18 pages) December 2010

Architecture and Landscape

Presentation (PDF) 43 mins (18 pages) December 2010

After completing this presentation, you will be able to:

 

Identify key components of the GRC 10.0 architecture

Describe the Access Control 10.0 architecture and components

 
 

This content was approved by target group representatives. Did it help

Please

  This content was approved by target group representatives. Did it help Please

you?

Select
Select

specify:

 
  Configuration Overview Presentation (PDF) 110 mins (46 pages) May 2011

Configuration Overview

Presentation (PDF) 110 mins (46 pages) May 2011

After completing this presentation, you will be able to describe the common configurations, customizing BC sets. Updated content May 2011

 

This content was approved by target group representatives. Did it help

Please

  This content was approved by target group representatives. Did it help Please

you?

Select
Select

specify:

Complementary

Learning

Techniques

Live Expert Sessions

Learning Tools

Getting Started

Recent Updates

Viewer Software

Search

Support

Terms & Conditions

 
  Access Control Repository   Presentation (PDF)

Access Control Repository

 

Presentation (PDF)

 

52

mins (22 pages)

 

After completing this presentation, you will be able to:

 

May 2011

Explain various programs which are used to sync the User, Role, Profile and Authorization object to the Access Control Repository

 

Execute background jobs

 

Updated content May 2011

 

This content was approved by target group representatives. Did it help

Please

  This content was approved by target group representatives. Did it help Please
 

you?

Select

specify:

 
  Object L e v e l S e c u r i t y Presentation

Object

Level Security

Presentation (PDF)

 

26

mins (11 pages)

 

After completing this presentation, you will be able to:

 

May 2011

Describe the implementation of object level security in Access Control

 

Identify the out-of-the-box roles

 

Updated content May 2011

 
 

This content was approved by target group representatives. Did it help

Please

  This content was approved by target group representatives. Did it help Please
 

you?

Select

specify:

 

Close

Analyze and Manage Access Risk Open/Close

 

Duration:

4:25 hours

 

At the end of this unit you will be able to:

 

Navigate the user interface for efficient creation and maintenance of functions, actions, and permissions

 

Describe workflow process for function maintenance

 

Discuss the Audit trail tracking of most maintenance activities

 

Describe the following new risk analysis features:

 

Flexible interface that supports list import, multiple selections and multiple analysis levels

 

Customization of results dynamically by user

 

Drill through links to master data including risks, users, roles, and more

 

Discuss organizations and control usage

 

Differentiate standalone organizations from those shared with PC and RM

 

Describe the use of owners and users

 

Describe the system-specific assignment of mitigating controls

 

Describe the process for mitigating large numbers of risks at one time

Demonstrate a risk analysis

 

Run a risk analysis

View results

Simulate role and permission changes for a user

 

Set up an organization

 

Establish owners and users

Assign owners, processes, subprocesses to organizations

 

Establish object level security settings

 
  Rule Set Maintenance   Presentation (PDF)

Rule Set Maintenance

 

Presentation (PDF)

 

69

mins (29 pages)

 

After completing this presentation, you will be able to navigate the user interface for efficient

 

May 2011

creation and maintenance of functions, actions and permissions.

 

Updated content May 2011

 
 

This content was approved by target group representatives. Did it help

Please

  This content was approved by target group representatives. Did it help Please
 

you?

Select

specify:

 
  Approval Process for Functions   Presentation (PDF)

Approval Process for Functions

 

Presentation (PDF)

 

After completing this presentation, you will be able to describe the workflow process for function

50

mins (21 pages)

maintenance.

 

December 2010

 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Additional Audit Trail Tracking   Presentation (PDF)

Additional Audit Trail Tracking

 

Presentation (PDF)

 

38

mins (16 pages)

 

After completing this presentation, you will be able to discuss the Audit trail tracking of most

December 2010

maintenance activities.

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select
Select

specify:

 
  New Risk Analysis Framework   Presentation (PDF)

New Risk Analysis Framework

 

Presentation (PDF)

 

28

mins (12 pages)

 

After completing this presentation, you will be able to describe the following new risk analysis

December 2010

features:

 

Flexible interface that supports list import, multiple selections and multiple analysis levels

 

Customization of results dynamically by user

 

Drill through links to master data including risks, users, roles, and more

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Shared Master Data with PC and RM Applications   Presentation (PDF)

Shared Master Data with PC and RM Applications

 

Presentation (PDF)

 

21 mins (9 pages)

 

After completing this presentation, you will be able to:

 

December 2010

Discuss organizations and control usage

 

Differentiate standalone organizations from those shared with Process Control (PC) and Risk Management (RM)

 

Describe the use of owners and users

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  System Specific Mitigation Presentation (PDF)

System

Specific Mitigation

Presentation (PDF)

 

28

mins (12 pages)

 

After completing this presentation, you will be able to describe the system-specific assignment of

December 2010

mitigating controls.

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  M a s s M i t i g a t i o n  

Mass Mitigation

 

Presentation (PDF)

 

31

mins (13 pages)

 

After completing this presentation, you will be able to describe the process for mitigating large

December 2010

numbers of risks at one time.

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 

Close

Design and Manage Roles Open/Close

 

Duration:

6:14 hours

 

At the end of this unit you will be able to:

 

Discuss Business Roles

 

Discuss changes to Technical role definition including role derivation

 

Describe the process of Role compare and Role usage reports

Describe PFCG integration and required configuration tasks

 

Identify role mass operations

Describe the Role Certification process

Demonstrate how to define a role

Define a role

Authorize a role

how to define a role Define a role Authorize a role Configure Role Management After completing

Configure Role Management

After completing this presentation, you will be able to describe Configuration options for Role Management

Presentation (PDF)

55 mins (23 pages) December 2010

This content was approved by target group representatives. Did it help

you?

Select

Please

group representatives. Did it help y o u ? Select Please specify: Configure Role Methodology After

specify:

Configure Role Methodology Methodology

After completing this presentation, you will be able to discuss Role Methodology Definition. Updated content May 2011

This content was approved by target group representatives. Did it help

Select

you?

Presentation (PDF)

93 mins (39 pages) May 2011

Please

u ? Presentation (PDF) 93 mins (39 pages) May 2011 Please specify: Plan for Business Role

specify:

(PDF) 93 mins (39 pages) May 2011 Please specify: Plan for Business Role Definition After completing

Plan for Business Role Definition

After completing this presentation, you will be able to discuss Business Roles.

Presentation (PDF)

60 mins (25 pages) December 2010

This content was approved by target group representatives. Did it help

Please

by target group representatives. Did it help Please you? Select specify: Plan for Technical Role Definition
you? Select specify:
you?
Select
specify:
representatives. Did it help Please you? Select specify: Plan for Technical Role Definition After completing this

Plan for Technical Role Definition

After completing this presentation, you will be able to:

Presentation (PDF)

43 mins (18 pages) December 2010

Discuss changes to Technical role definition including role derivation

Describe PFCG integration and required configuration tasks

This content was approved by target group representatives. Did it help

you?

Select

Please

group representatives. Did it help y o u ? Select Please specify: Consolidate Role Through Role

specify:

Did it help y o u ? Select Please specify: Consolidate Role Through Role Mining After

Consolidate Role Through Role Mining

After completing this presentation, you will be able to describe the process of Role compare and Role usage reports.

Presentation (PDF)

45 mins (19 pages) December 2010

This content was approved by target group representatives. Did it help

you?

Select

Please

group representatives. Did it help y o u ? Select Please specify: M a s s

specify:

Did it help y o u ? Select Please specify: M a s s M a

Mass Manage Roles

After completing this presentation, you will be able to identify role mass operations.

Presentation (PDF)

52 mins (22 pages) December 2010

This content was approved by target group representatives. Did it help

Please

by target group representatives. Did it help Please you? Select specify: Role Certification After completing
you? Select specify:
you?
Select
specify:
representatives. Did it help Please you? Select specify: Role Certification After completing this presentation you

Role Certification

After completing this presentation you will be able to describe the Role Certification process.

Presentation (PDF)

26 mins (11 pages) December 2010

This content was approved by target group representatives. Did it help

you?

Select

Please

2010 This content was approved by target group representatives. Did it help y o u ?

specify:

Close

content was approved by target group representatives. Did it help y o u ? Select Please

Periodic Access Review Process Open/Close

 

Duration:

2:32 hours

 

At the end of this unit you will be able to:

 

Describe the Periodic review process and setup

Discuss Access Risk review

Discuss User Access Review

Discuss Role Access Review

Demonstrate the Periodic Access Review Process

Monitor user access

Monitor role access

 
  Plan Periodic Review Presentation (PDF)

Plan Periodic Review

Presentation (PDF)

After completing this presentation, you will be able to:

 

72

mins (30 pages) December 2010

Describe the Periodic Review Process

Configure Parameters for periodic access review requests

 

This content was approved by target group representatives. Did it help

Please

Please

you?

Select

specify:

 
  Monitor for Access Risks Presentation (PDF)

Monitor for Access Risks

Presentation (PDF)

After completing this presentation, you will be able to discuss Access Risk review.

 

24

mins (10 pages) December 2010

 

This content was approved by target group representatives. Did it help

Please

Please

you?

Select
Select

specify:

 
  Monitor User Access Presentation (PDF)

Monitor User Access

Presentation (PDF)

After completing this presentation, you will be able to discuss User Access Review.

 

40

mins (17 pages) December 2010

 

This content was approved by target group representatives. Did it help

Please

Please

you?

Select

specify:

 
  Monitor Role Access Presentation (PDF) 16 mins (7 pages) December 2010

Monitor Role Access

Presentation (PDF) 16 mins (7 pages) December 2010

After completing this presentation, you will be able to discuss Role Access Review.

 
 

This content was approved by target group representatives. Did it help

Please

Please

you?

Select
Select

specify:

 

Close

Provision and Manage Users Open/Close

 

Duration:

5:04 hours

 

At the end of this unit you will be able to:

 

Explain how to configure request parameters

Describe how to create access requests

Describe how to identify owners

Explain how to create Firefighter access requests

Describe how to plan for HR Integration

Explain how to plan for end user authentication

Highlight Form customization and template creation

Explain user provisioning configuration and field mapping

Describe the Request Approval process

Demonstrate how to set up and initiate a workflow

 

Plan for user access

 

Access, analyze and process a user access request

 
Plan for User Access   Presentation (PDF)

Plan for User Access

 

Presentation (PDF)

 

122 mins (51

 

After completing this presentation, you will be able to:

 

pages)

Create access requests

 

December 2010

Model user access

 

Use a template to create a request

Copy a request

Create requests for User Organizational assignments

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Plan for HR Integration   Presentation (PDF)

Plan for HR Integration

 

Presentation (PDF)

 

67

mins (28 pages)

 

After completing this presentation, you will be able to:

 

December 2010

Describe HR events for employees captured for any info types and combinations

 

Customize and establish prerequisite settings for HR trigger

 

Use BRF Rules in HR triggers

 

Check logs for created requests

 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select
Select

specify:

 
  Design End User Request Forms and Templates   Presentation (PDF)

Design

End User Request Forms and Templates

 

Presentation (PDF)

 

19 mins (8 pages)

 

After completing this presentation, you will be able to describe Form customization and template

 

December 2010

creation.

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Define User Provisioning   Presentation (PDF)

Define User Provisioning

 

Presentation (PDF)

 

36

mins (15 pages)

 

After completing this presentation, you will be able to explain provisioning configuration and field

December 2010

mapping.

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Request A p p r o v a l Presentation (PDF)

Request

Approval

Presentation (PDF)

 

60

mins (25 pages)

 

After completing this presentation, you will be able to:

 

December 2010

Describe Workflow Inbox

 

Describe risk analysis and request approval

Discuss rules and policies

Configure request parameters

Describe HR Organization assignment requests for job, position and org unit assignments with roles supported with workflow, risk analysis and provisioning

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select
Select

specify:

 

Close

Identity Management (IdM) Integration

Open/Close

 

Duration:

2:57 hours

 

At the end of this unit you will be able to:

 

Describe GRC Identity Management Integration Services

 
 

Describe IdM configuration tasks

Demonstrate IdM configuration

Perform IdM configuration tasks

IdM Integration Overview Presentation (PDF)

IdM Integration Overview

Presentation (PDF)

After completing this presentation, you will be able to:

 

60

mins (25 pages) December 2010

Describe the Identity Management Integration Scenarios

 

Discuss Password Self Service with IdM Integration

 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Perform GRC Configuration Tasks for IdM Integration Presentation (PDF)

Perform GRC Configuration Tasks for IdM Integration

Presentation (PDF)

 

117

mins (49

 

After completing this presentation, you will be able to:

 

pages)

Describe the Identity Management Integration Scenarios

 

December 2010

Discuss Password Self Service with IdM Integration

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 

Close

Emergency Access Management

Open/Close

 

Duration:

3:49 hours

 

At the end of this unit you will be able to:

 

Describe the architecture and maintenance changes for emergency access

 

Identify critical firefighting roles and assignments

 

Discuss new workflow features and the auditable process for tracking log report approvals

 

Describe configuration options for superuser and location

 

Describe new FF reports

Demonstrate how to request firefighter IDs and roles

 

Discuss criticality and groups

Configure firefighting roles

 
  Plan for Emergency Access Presentation (PDF)

Plan for Emergency Access

Presentation (PDF)

 

124

mins (52

 

After completing this presentation, you will be able to:

 

pages)

Describe the architecture and maintenance changes for emergency access

 

May 2011

Identify critical firefighting roles and assignments

 

Discuss new workflow features and the auditable process for tracking log report approvals

 

Describe configuration options for superuser and location

 

Updated content May 2011

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Monitor Emergency Access Presentation (PDF)

Monitor Emergency Access

Presentation (PDF)

After completing this presentation, you will be able to describe new Firefighter reports. Updated content May 2011

62

mins (26 pages) May 2011

 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 
  Centralized Firefighting Presentation (PDF)

Centralized Firefighting

Presentation (PDF)

After completing this presentation, you will be able to:

 

43

mins (18 pages) May 2011

Understand Centralized Firefighting concept

 
Use Centralized firefighting Updated content May 2011 This content was approved by target group representatives.
Use Centralized firefighting
Updated content May 2011
This content was approved by target group representatives. Did it help
Please
you?
Select
specify:
Close

Reporting Framework Open/Close

 

Duration:

0:24 hours

 

At the end of this unit you will be able to:

   

Describe the new reporting framework

Customize reports

 
  Reporting Framework   Presentation (PDF)

Reporting Framework

 

Presentation (PDF)

After completing this presentation, you will be able to:

24

mins (10 pages) May 2011

Describe the new reporting framework

 

Explain how to customize reports

Updated content May 2011

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select

specify:

 

Close

Workflow Configuration

Open/Close

 

Duration:

3:52 hours

 

At the end of this unit you will be able to:

 

Identify delivered workflows for each capability

Explain the common inbox

Describe key roles

Discuss configuration options

 

Configure workflows

 
  MSMP Workflow Configuration   Presentation (PDF) 148 mins (62 pages) May 2011

MSMP Workflow Configuration

 

Presentation (PDF) 148 mins (62 pages) May 2011

After completing this presentation, you will be able to:

Identify delivered workflows for each capability

Describe key roles

Discuss configuration options

 

Configure workflows

Updated content May 2011

 
 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select
Select

specify:

 
  Business Rule Framework (BRF+)   Presentation (PDF)

Business Rule Framework (BRF+)

 

Presentation (PDF)

After completing this presentation, you will be able to describe how rules are created using the Business Rule Framework. Updated content May 2011

84

mins (35 pages) May 2011

 

This content was approved by target group representatives. Did it help

Please

Please
 

you?

Select
Select

specify:

 

Close

Extend Your Competence - Nice to Know

it help Please   y o u ? Select specify:   Close Extend Your Competence -

Access Control 10.0 Workshop Material Open/Close

At the end of this unit you will be able to download the collection of hands-on exercises for additional training and reference purposes.

unit you will be able to download the collection of hands-on exercises for additional training and

Use this workshop material for additional training purposes.

Material (ZIP)

Close

Access Control 10.0 Workshop

Material

Workshop

Identity Management (IDM) Integration

Open/Close

GRC Web Services for IdM Integration After completing this presentation, you will be able to
GRC Web Services for IdM Integration
After completing this presentation, you will be able to describes in detail the Webservices required to
integrate IdM.
Presentation
(PDF)
326 mins (136
pages)
December 2010
Close

Back to Top

See the statistics for this learning map