Expert Tips To Simplify And Automate Your User Access Request Process David Denson PwC
|
|
|
- Giles Roberts
- 9 years ago
- Views:
Transcription
1 Expert Tips To Simplify And Automate Your User Access Request Process David Denson PwC
2 IN THIS SESSION In this session, we will discuss effective strategies that have been utilized at other implementations to simplify the access request process, focusing on the 10.X versions of GRC AC. The discussions will include: The common challenges experienced at each stage of the access request process. Functionality that can be utilized to assist end users with the access request process. How to customize access request screens to better agree with business requirements and terminology. Learn effective strategies that have been utilized at other implementations to simplify the request process.
3 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
4 COMMON CHALLENGES REQUEST ACCESS Some of the common challenges/frustrations experienced by end users while requesting access include: There are so many fields I have to enter data in and tabs to navigate, this takes forever! I am transferring to a new job, I ll just copy Bob s access and I should be fine. I am a new user and there are so many roles and systems for me to choose, I have no clue which roles I need This request status report is very confusing, how do I figure out who needs to approve my request? I need to help out during close and know the transactions / organization values I need access to, but how do I find the associated roles in GRC?
5 COMMON CHALLENGES APPROVE ACCESS Some of the common challenges/frustrations experienced by end users while approving access include: Navigating GRC is very difficult as there are too many links and I cannot find the one that I need! This is a reporting risk, do all of these really need to be routed to me for mitigating control assignments? Why do I have to run a risk analysis in every request / when I make a change to the request? I do not have the information I need to make an informed decision whether this user actually needs access to this role. I get so many requests for approval, many of which are mapped to the user s job position. What value is there in my approval of these types of requests? I need additional field XX in these reports to properly understand them. The approval form is cumbersome and does not readily display the information I need. The user selected every available role, why is it my responsibility to analyze this request? What is this role being requested and why is it coming to me?
6 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
7 APPROVER EXPERIENCE ENHANCEMENTS Exception Based Routing To reduce the number of irrelevant requests that route to your approvers, consider using custom routing rules to perform checks on requested access prior to routing to approvers. This approach will require an accurate and valid user data source. Examples: Upon submission, confirm the user is an appropriate business area for the role being requested (i.e. if requesting a JE entry role, confirm the user is in Finance). For dollar value roles (i.e. PR/PO roles), confirm the user is at an appropriate organizational level for the role they are attempting to request. You can utilize the SAP provided classes to build custom rules, just insert your business logic in the P_PROCESS method. Access request processes are included in the CL_GRAC_RULEAPI_*_ACCREQ classes.
8 APPROVER EXPERIENCE ENHANCEMENTS (CONT.) Exception Based Routing Custom rules can be developed for use during approval workflow to perform validations on requested access User submits request for access in GRC Selectable roles can be limited based on a user s organization or position, allowing them to only select from roles that are mapped to their area. Is preapproved criteria met? Based on the user s organization / position, are the pre-approved requirements met for the user to have access to the requested role? If not, requests can be routed to exception approvers that can assist the user with requesting appropriate access or determining if the request is a valid exception. Valid request for access Based on the validation checks, user has submitted a valid request for access. These requests can then be routed to the approver for approval or auto-provisioned.
9 APPROVER EXPERIENCE ENHANCEMENTS (CONT.) To enhance the approver experience, the following recommendations are strongly encouraged: Notifications In the notifications that are sent to the approver, do not just use the standard notifications in GRC. You can set up a different notification for each action in each stage of the approval path by adding additional message classes (see SAP Note for more details). If multiple approvers share approval duties for roles, do not give the link directly into the approval request, but rather set up a view and provide a link directly to their work inbox. Be sure to include either instructions on how to approve / reject the request or note where to go for further instruction (i.e., help center). You can replace the long URL links in your notifications with hyperlinks by utilizing the following HTML format: <a href = %Variable% or URL> Your Keyword for hyperlink </a>.
10 APPROVER EXPERIENCE ENHANCEMENTS (CONT.) Work Inbox To pull more relevant fields into the work inbox, such as user name/id, requester name/id, stage, and request type, switch the default query from All to Access Management (this can be done for all users by accessing the work inbox in Customizing mode). To have the items in the work inbox refresh automatically, you can utilize t-code/npowl_cockpit. Find the GRFN_INBOX application, click on Register Query, choose the query to maintain and click Maintain Query, then change the option for the Refresh Type to On Every Page Visit. You can also maintain this option for other tables in GRC.
11 APPROVER EXPERIENCE ENHANCEMENTS (CONT.) Remediation/Mitigation Stage To present the risk analysis reports in a more business friendly view, you can utilize parameter 1048 to have the analysis ran in business view. When configuring the ruleset, make sure that only permissions that are relevant to your environment are enabled (you can utilize ST01 to determine needed authorizations), otherwise this can lead to false positives in your reports. For any non-critical risks that are expected to have job level conflicts that cannot be avoided, applicable mitigating controls should already be available for assignment (or you can utilize mitigation policy functionality to not require mitigation of these risks). If you have multiple rulesets in your environment, you can utilize the Request Multiple Rule set BRF+ application to configure when each ruleset is selected for analysis. If your company leverages Process Control (PC), the integration between PC & AC can bridge the gap in determining if mitigating controls being assigned are still valid and effective.
12 APPROVER EXPERIENCE ENHANCEMENTS (CONT.) Remediation/Mitigation Stage Occasionally, you may receive a risk analysis that is nearly impossible to decipher. A simple method to determine what remediation options are available (besides integration with third-party tools) is to pull the analysis into Excel and utilize pivot tables or use Access Databases to compare results to functions and identify remediation options Lines Easily Identify Available Remediation Options
13 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
14 CUSTOMIZING ACCESS REQUEST VIEWS Why does this matter? Through GRC form customization, we can realize the following benefits: Ease the requesting process by reducing the time it takes to submit a request Present only relevant information to the user, reducing user confusion and frustration during the request process Reduction in the data points needing to be reviewed eases the review process for approvers Deliver all required information the reviewers need to make an informed decision I do not have the information I need to make an informed decision whether this user actually needs access to this role. There are so many fields I have to enter data in and tabs to navigate, this takes forever! The approval form is cumbersome and does not readily display the information I need.
15 CUSTOMIZING ACCESS REQUEST VIEWS (CONT.) There are several ways to customize the displayed information on GRC access request screens: End User Personalization Hide, allow edits, require data entry, or specify default values for selected fields. Standard configuration functionality. Administratively customize the view configuration Allows you to hide objects, add new objects, change object text, and apply default values by directly configuring the access request views. Considered a development function and should be performed with care. IdM / Fiori Integration Integrate with an IdM solution or Fiori to provide a more customizable, simplified interface to meet your end user requirements.
16 CUSTOMIZING ACCESS REQUEST VIEWS (CONT.) End User Personalization (EUP) Navigation path: SPRO > Governance, Risk and Compliance > Access Control > User Provisioning > Maintain End User Personalization 999 (Default) EUP ID is used for Access Request submission screen, but you can configure additional EUP IDs and assign to approver stages and template request IDs. You can utilize the characters #!# in the default value field to pull in a dynamic value for an attribute. For example, if your SNC value needs to be p:clientx.com\userid, you can use p:clientx.com\#!#userid_l#!# to provision the value for each user.
17 CUSTOMIZING ACCESS REQUEST VIEWS (CONT.) Configure Access Request Views To enter admin mode after navigating to the desired Web Dynpro application, enter &SAP-CONFIG-MODE=X at the end of the URL. This is the case for all access request screens EXCEPT for the approver view. To enter admin mode for the approver view, enter the string &SAP-CONFIG-MODE=X&OBJECT_ID=ACCREQ/123 to the end of the URL. By default end users are allowed to personalize their interface, which can pose a risk, especially when utilizing End User Login (EUL) functionality as a shared user ID is used. You can disable this option globally in the WD_GLOBAL_SETTINGS service via t-code SICF (Drill down to /default_host/sap/bc/webdynpro/sap/ and right click on WD_GLOBAL_SETTINGS, click Test Service, check box next to Do not allow Personalization by the User).
18 CUSTOMIZING ACCESS REQUEST VIEWS (CONT.) Customize Access Request Views
19 CUSTOMIZING ACCESS REQUEST VIEWS (CONT.) What is IdM? Identity Management (IdM) tools are enterprise-wide, crossapplication solutions that automate and increase the transparency around user access and entitlement administration. IdM tools offer a wide range of functionality, including: Automated provisioning to new and existing users Automated password resets Single sign-on Ability to customize forms and functionality to enhance the user experience Virtual Composite grouping for A/P Clerk Underlying Roles (SAP and/or Non-SAP) Flexibility to select some or all of the underlying tasks
20 SAP FIORI WHAT IS IT? An SAP front-end tool that. Offers a single, role based entry point for end users to access business functionality in a simple, coherent and responsive fashion Makes about 400+ SAP transactions available out of the box -> included as part of license cost Can be used on multiple platforms (desktop, idevices, etc) without additional programming Makes it possible for end users to access business functionality on their mobile devices either in the Intranet (VPN) and/or the Internet. Allows for customizing screens and functionality to meet customer s specific business needs
21 SAP FIORI BENEFITS AND DRAWBACKS Benefits Increased end user adoption and improved user satisfaction due to dramatically improved user experience SAP Fiori apps are multi-platform without programming additional screens -> a very attractive low TCO option Leverages existing SAP investments by providing instant value to all employees and processes Drawbacks SAP Fiori is not a mobile platform. With SAP Fiori, you do not see terms like offline synchronization management, device management etc. which are functionalities that a typical mobile platform provides SAP Fiori apps are not native to the device they are running on SAP backend only currently, Fiori is designed to run with SAP backend only
22 COMMONLY USED APPLICATIONS SAP has delivered a number of mobility applications for GRC Access Controls: Check Request Status* Access Approver* Request Access* Request for Others Compliance Approval Role Access User Access Risk Mitigation Control *Most commonly used Fiori apps by customers
23 SIMPLIFIED ACCESS REQUEST Access Request Management New access request and approver forms Streamlined interface Improved search Embedded side-panels Existing form customization improvement Role search improvements In order to utilize the new Simplified screens in GRC 10.1, you must have a browser that is HTML5 and CSS3 compliant. Examples of such browsers include Internet Explorer 9+, Chrome, and Firefox.
24 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
25 UTILIZING BADIS TO ENHANCE GRC A BAdI (Business Add-in) is a custom enhancement that can be inserted to accommodate user requirements. There are many provided BAdIs, but the most commonly used include: GRAC_ACCREQ_SEARCH_CRITERIA Access Request Role Search Criteria GRAC_ACCREQ_ROLE_SEARCH Role Search Restrictions GRFN_MSMP_NOTIFICATION_ES MSMP Notification Override GRFN_MSMP_END_OF_PATH_NOTIF End of Path Notification GRFN_MSMP_APPROVER_VALID_ESI Approver Validation GRFN_MSMP_ESCALATE_OVERRIDE_ES Escalation Override GRFN_MSMP_ESCAPE_OVERRIDE_ES Escape Override GRFN_MSMP_REQUEST_FINISHED_ES Request Finished Extension GRAC_TRG_VERIF Training Verification GRAC_TEMPLATE_ROLE Creation of Template Roles GRAC_BUSINESS_SHELL_ROLE Business Role Provisioning Override BAdIs allow you to customize the application without making core code modifications, reducing the risk of impacting the customization when applying fixes or Support Pack upgrades. GRAC_ACREQ_ITEM_VALIDATE Override Role Assignment Validation for Provisioning Actions
26 UTILIZING BADIS TO ENHANCE GRC (CONT.) The Access Request Role Search Criteria & Access Request Role Search Restriction BAdIs can be utilized to guide users to the correct role assignments. The Access Request Role Search Criteria BAdI can be utilized to default in the search fields most relevant to your environment. This provides easy to use default search parameters leaving advanced search for advanced users. The Access Request Role Search Restriction BAdI can be utilized to restrict role search results to only those roles applicable to the user. If you have an accurate user data source, you can pull user restriction fields directly into the request via field mapping (i.e. company, employee type, etc), have the field configured as a role attribute, and use the role search restriction BAdI to limit the role search results to only roles mapped to the user s restriction field, reducing the risk of users selecting irrelevant roles for their position.
27 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
28 IMPLEMENTING AN EFFECTIVE ROLE DESIGN STRATEGY An effective, healthy role design is a MUST before attempting to roll out the GRC Access Request Management (ARM) Module. Who What Where Why? Environments with large numbers of unused roles, high t-code duplication between roles, and inconsistent naming convention will make role selection extremely difficult for end users. Effective SAP role design Roles with intra-role SoD conflicts will cause delays in the provisioning process while being evaluated for mitigation / remediation. Remediation efforts will be very time consuming if you do not have focused, task based roles with secure org level values at the core of your role design. This will allow remediation activities to be at the user assignment level and reduce role maintenance activities needed.
29 IMPLEMENTING AN EFFECTIVE ROLE DESIGN STRATEGY (CONT.) Comprehensive SAP Security Design User provisioning process could have more automation and information Role Change Management needs risk and quality controls Needs improved emergency support process Management KPIs for Security Design are not established Needs automation for ongoing monitoring and recertification procedures Needs improved SOD and/or Mitigating control frameworks Key Challenges Security & Provisioning Processes SAP Role Architecture Org Structure & Governance Effective SAP Security Design Misalignment of IT vs. Business Objectives Needs Strategic Security Design Decisions Needs Role or Security Design Ownership Complex Security Design Needs more flexibility to respond to ongoing changes Needs scalability to grow with organization Needs more efficient Role Build Approach Needs Documentation of Security Control Points Inherent Segregation of Duties Risk
30 IMPLEMENTING AN EFFECTIVE ROLE DESIGN STRATEGY (CONT.) High Level Two Design Approaches Job-Based Approach = Security is built and provisioned based upon positions/jobs for a group of users (i.e., A/P Manager). Task-Based Approach = Security is built upon small definable tasks executed within the system (i.e., A/P Invoice Processing). Several task roles make up a user s access. Also known as activity-based approach. Preferred Model: Task-Based Approach
31 IMPLEMENTING AN EFFECTIVE ROLE DESIGN STRATEGY (CONT.) What is the main complaint regarding task-based roles by end users? I have to add all 20 roles I need access to one-by-one?!?!?
32 ACCESS REQUEST TOOLS We now have tools available that can be utilized to assist users in getting the access they need. These functionalities should be utilized for new user requests and job transfers: Template requests Model User Access Business Roles If you have the ability and timing to allow for ABAP development activities, template roles are a great alternative that allows you to automatically add roles based on attributes and perform validations on the requested access. To enable template roles, you must implement the GRAC_TEMPLATE_ROLE BAdI.
33 ACCESS REQUEST TOOLS (CONT.) Template Requests Can be used to build a pre-populated access request for users to select Pre-populate access request with roles, request, type, user information, etc. Can specify a default EUP ID to be used for the template Cons: Cannot restrict who can make changes to other templates Roles will be sent to all role approvers for approval Time consuming task to set up Can be difficult for users to know which template to use Pros: Simple process for new users if they know which template to select Provides additional flexibility for users to remove/add additional roles to the request
34 ACCESS REQUEST TOOLS (CONT.) Model User Access Functionality can be used to set up a user with the same access as another user. This is most effective by setting up template users in the system that have the access needed for a specific position that end users can copy to their ID. Cons: Can lead to excessive access if using to copy other users Can remove access a user currently has if the model user does not have the same roles assigned Can allow circumvention of request restrictions Pros: Simple process for users needing the same access as the template ID or another user Provides additional flexibility for users to remove/add additional roles to the request
35 ACCESS REQUEST TOOLS (CONT.) Business Roles Business roles are virtual containers that only exist in GRC. These roles are searchable from the role search menu within an access request and can contain roles for multiple systems. Pros: Business friendly names Users granted all access associated with the business role Adding or removing a technical role can be pushed to end users Can map one approver to the business role Flexibility to remove single role assignments when needed Supported by User Access Review Cons: No native reporting of user to BR No mass loading of user to BR Not tied to a system may cause user confusion
36 ACCESS REQUEST TOOLS (CONT.) The most effective way to utilize business roles are as role templates to be used in conjunction with task-based roles. Business roles should be SoD free. Built with the core roles for a position at the local level to include organizational levels needed and to route to approvers familiar with the user and the access contained in the role. Review business role approvers with the task role owners to confirm they approve of these users approving access to the roles they own. Can utilize your user mapping to build business roles. Should utilize the detailed description field to clearly document what the role allows users to do (in business language) and who the role is intended for. Idle target state 80/20
37 ACCESS REQUEST TOOLS (CONT.) Default Roles You can set up logic to automatically add roles to a request based on set request or role attributes You can choose whether default roles are based on role attributes or request attributes or both Role Attributes Based on attributes or master data elements of the roles selected by the user. Default role is added to the request immediately. Request Attributes Based on attributes within the header data of the request. Default roles are not added until after request submission. Due to limited logic, best if used for general end user type roles or enabler roles based on request attributes.
38 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
39 BUILD CUSTOM REPORTING There are many options to build custom reporting in GRC such as: Custom Report Development BW Integration Crystal Reports This request status report is very confusing, how do I figure out who needs to approve my request? There is another simple, quick alternative if the options above are not available to you, SQVI queries! Relatively simple to build Transportable Can build security around the reports Can be built into the GRC NWBC view as an application Is a standard report just missing one key field that your business users need? You can add a column in a standard report utilizing view cluster VC_GRFNREPCOLUMNSC via SM34. Just be sure to check it after an upgrade/applying OSS notes.
40 BUILD CUSTOM REPORTING (CONT.) An example of the most frequently requested report is a more detailed Request Status report that shows the status of the request and the outstanding approvers. Provided reporting functionality requires a user to dig through lengthy, technical audit logs to find answer a simple question Where is my request?!?
41 BUILD CUSTOM REPORTING (CONT.) You can build reports to fill some of the missing gaps in business role reporting, such as: Business role to user report Single roles provisioned without a business role (helpful during periodic reviews) Report showing which approver approved role assignments Business role to t-code report In addition to creating a custom report as shown in the take home materials, you could also create a custom report by utilizing view cluster VC_GRFNREPCUST via SM34 and add to the desired Launchpad as a Web Dynpro ABAP application.
42 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
43 MODIFYING GRC AC USER INTERFACE Introduction to GRC AC Security GRC AC 10.0 is an ABAP based system and uses standard SAP NetWeaver authorization system. Security roles are maintained through PFCG and assigned directly to user master records i.e., SU01. SAP NetWeaver Business Client (NWBC) is the front-end user interface and is accessed via internet browser. Security roles are maintained through PFCG on the backend SAP GUI. Roles and authorizations within them control what is visible and what the user can do within each application (Web Dynpro) in NWBC. Launchpads Applications
44 MODIFYING GRC AC USER INTERFACE (CONT.) There are multiple options to customize the user interface in GRC PFCG role menu structure PFCG role authorizations Modify Launchpads When removing applications from end user views, best practice is to attempt to remove them by utilizing role authorizations first. If the authorization is shared with an application the user needs, then you may need to customize the Launchpad.
45 MODIFYING GRC AC USER INTERFACE (CONT.) PFCG role menu structure The Menu tab of a PFCG role and the folders within it control the Work Centers (folders) that are displayed in NWBC Does not provide authorizations Contents of each standard SAP delivered work center can be modified by changing the Launch Pad (next section)
46 MODIFYING GRC AC USER INTERFACE (CONT.) PFCG role menu structure (cont.) You can also directly add individual web dynpro applications in place of a launch pad
47 MODIFYING GRC AC USER INTERFACE (CONT.) PFCG role authorizations Each application shown under the Launchpads is controlled by an associated authorization object. For example, cross application authorization object CA_POWL restricts access to the entire POWL* iviews within the NWBC tabs (similar to S_TCODE) for some applications. *POWL Personal Object Work List
48 MODIFYING GRC AC USER INTERFACE (CONT.) PFCG role authorizations While restricting access to certain types of sensitive reports, such as Firefighter Log reports, is controlled by authorization object GRAC_REP.
49 MODIFYING GRC AC USER INTERFACE (CONT.) So now, you may be asking yourself, How do you determine the relationship between authorizations and the 120+ GRC applications? Trial and error? Am I actually going to have to read the SAP security guide? Please don t say ST01!
50 MODIFYING GRC AC USER INTERFACE (CONT.) The below tables can be joined via SQVI to create a query to pull the relationship between each application and the related authorization object(s)! I cannot even begin to show my excitement
51 MODIFYING GRC AC USER INTERFACE (CONT.) Be careful when removing authorizations to hide links as these may control actions users can perform within the application and also may be shared with other applications.
52 MODIFYING GRC AC USER INTERFACE (CONT.) It may be required to customize the end user interface to further restrict access where it is not possible via authorizations alone Authorization object GRAC_BGJOB with ACTVT = 03 makes the following two applications visible. Only viewing the jobs Background Jobs and not scheduling Background Scheduler is desired. Access may be restricted by creating a custom Access Management Launch Pad without the link Background Scheduler.
53 MODIFYING GRC AC USER INTERFACE (CONT.) Modifying a Launch Pad Performed under t-code LPD_CUST Allows you the ability to add, hide, or change applications shown under the Launch pad (i.e. My Home tab). Can also rearrange the order / layout of the applications shown. You should never modify the SAP provided Launchpads, but rather copy an existing Launchpad using the Save As feature and modify to your requirements. If you are creating a new work center, you will need to create the associated Web Dynpro components, associate them to a Launchpad, and associate the Launchpad to a PFCG role.
54 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
55 HELP CENTER The Help Center is a very useful tool that can be utilized to guide and assist users through various GRC tasks, such as requesting access. The content within the help center can be configured to be application specific (only shows for defined applications) or cross application (shows for all applications) The four sections included within the help center include: Notes Frequently Asked Questions Worth Knowing Learning Content
56 HELP CENTER (CONT.) Within the current view, the user can access the Help Center to obtain content-specific assistance with the task they are performing.
57 HELP CENTER (CONT.) Note section: Allows users to add personalized notes. Notes are application-specific and will only display in the application they were made (i.e., Access Request notes would only be viewable through accessing the help center within the access request submission screen). Notes are user-specific and cannot be viewed by other users.
58 HELP CENTER (CONT.) Frequently Asked Questions section: Allows users to select a question to expand the answer. Ability to add questions is based on authorizations of the user. Questions can be application specific or cross-application. To authorize users to manage Help Center content centrally (cross-application), they will need access to S_TABU_DIS (auth group SHC) and S_WDHC_ADM (Action A ). SAP provided role is SAP_BC_WDHC_ADMINISTRATOR.
59 HELP CENTER (CONT.) Worth Knowing section: Can provide links to helpful information, such as SAP Help or internal documentation (SharePoint). Click the link opens the URL. Links in this section can be application specific or cross-application (or both).
60 HELP CENTER (CONT.) Learning Content section: Can provide links to training documentation created for the application (i.e., link to SharePoint). Links in this section can be application specific or crossapplication (or both). You can translate help center content via t-code SHC_TRANSLATION. To authorize users to translate Help Center texts, they will need access to S_WDHC_ADM (Action T ). SAP provided role is SAP_BC_WDHC_TRANSLATOR.
61 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
62 REQUEST MITIGATION POLICY When routing requests with SoD conflicts contained within them, there may be some instances where risks do not require mitigation, such as non-critical, reporting-only risks. The mitigation policy feature allows you to define logic within GRC you can use to drive the behavior of the approval process based on the attributes (i.e., risk level) of the risk identified during the risk analysis performed for an access request. This allows you specify which risks require mitigation and which risks do not require mitigation.
63 Medium REQUEST MITIGATION POLICY (CONT.) Prior to implementing a mitigation policy, a risk classification system needs to be clearly defined in order to group the risks to their mitigating control requirements. Low High Critical Definition The functions being performed are directly next to each other in the business process and the combination of activities results in the risk of a financial reporting misstatement / fraud. The functions being performed are directly next to each other in the business process and there exists an advantage in perpetrating fraud for personal gain or altering revenue. There exists a separation in the business process for the duties/functions being performed; however, fraud is more attractive than that of a low level risks and may result in personal gain or a potential impact to revenue. There exists a large separation in the business process for the functions being performed and there are multiple areas where collusion would be necessary to perpetrate fraud. The resulting fraud is not attractive and there exists no potential for personal gain. Mitigating Control Required? N/A (No users should have this access) Yes Yes No
64 REQUEST MITIGATION POLICY (CONT.) To use request mitigation policy, it is recommended that you set several configurable items to the following settings: Parameter 1072 (set under Maintain Configuration Settings in SPRO), which requires that critical risks be mitigated prior to approving an access request, should be set to Yes. Within MSMP workflow, for the stage in your approval workflow that is responsible for mitigation assignments / remediation, Approve Despite Risk should not be checked and Risk Analysis Mandatory should be set to Yes.
65 REQUEST MITIGATION POLICY (CONT.) To set up request mitigation policy, you must first determine the associated BRF Function ID, which is noted under Maintain AC Applications and BRFplus Function Mapping in SPRO. Once you have the BRFplus ID, navigate to BRFplus (t-code BRF+), and enter the ID under Workbench > Open Object. The first time you access BRF+, make sure to change your User Mode to Expert.
66 REQUEST MITIGATION POLICY (CONT.) Create a decision table and implement your business logic. In this example, we are enforcing mitigating control assignments for all risk levels except for Low. In the MITIGATE_RISK column, set the value to 1 to enforce mitigations and 2 to not require mitigations. Save and activate your newly created decision table and the associated function. Under the function, you can simulate values to confirm that the appropriate mitigation policy is being enforced.
67 WHAT WE LL COVER Common Challenges Approver Experience Enhancements Customizing Access Request Views Utilizing BAdIs To Enhance GRC Implementing an Effective Role Design Strategy Custom Reporting Modifying GRC AC User Interface Help Center Request Mitigation Policy Wrap-up
68 WHERE TO FIND MORE INFORMATION PwC s SAP Implementation Services Harleen Kaur, AC 10.0 Business Role Management (SAP Community Network, August 2011) SAP Governance, Risk, and Compliance Solutions, Guides, and Applications (Designing your SAP security processes)
69 7 KEY POINTS TO TAKE HOME Simplifying and enhancing your access request process is not a simple task! An effective, healthy role design is a MUST before attempting to roll out the GRC Access Request Management (ARM) Module. A mix of task based technical roles and business role templates is a good way to strike a balance between end user experience and flexibility in your role design. You can meet reporting requirements without extensive customization/integration with reporting tools. The Help Center is a great tool, don t forget about it! Prior to implementing a mitigation policy, a risk classification system needs to be clearly defined. Integrating GRC with an accurate HR data source can lead to further automation in the request process.
70 YOUR TURN! How to contact me: David Denson Please remember to complete your session evaluation
71 Disclaimer SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Wellesley Information Services is neither owned nor controlled by SAP SE PwC. All rights reserved. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.
72 FOLLOW US Thank you for your time Follow us on
SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned
SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned Executive Summary Organizations evaluating technology solutions to enhance their governance, risk and compliance
Minimize Access Risk and Prevent Fraud With SAP Access Control
SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access
AC 10.0 Business Role Management
AC 10.0 Business Role Management Customer Solution Adoption July 2011 Version 1.1 Purpose of this document This document allows implementation consultants and administrators to setup the required functionality
IBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide
IBM Unica emessage Version 8 Release 6 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 403. This edition applies to
AC 10.0 Customizing Workflows for Access Management
AC 10.0 Customizing Workflows for Access Management Customer Solution Adoption June 2011 Version 2.0 Purpose of this document This document allows implementation consultants and administrators to setup
Overview of SAP BusinessObjects Risk Management 10.0
Overview of SAP BusinessObjects Risk Management 10.0 Applies to: SAP BusinessObjects Risk Management 10.0, SAP NetWeaver 7.0, Enhancement Package 2. For more information, visit the Governance, Risk, and
SAP FIORI / HR Renewal
SAP FIORI / HR Renewal (HR Renewal) http://help.sap.com/fiori_bs2013/ General Overview A History of User Interfaces & Technical Architecture User Interface SAP GUI ITS BSP/Web Dynpro for Java WD for ABAP
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management
U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management Disclaimer These materials are subject to change without notice. SAP AG s compliance analysis with respect to SAP software
Fiori Frequently Asked Technical Questions
Fiori Frequently Asked Technical Questions Table of Contents SAP Fiori General Overview... 1 SAP Fiori Technical Overview... 1 SAP Fiori Applications... 3 SRM Applications... 3 Approval Applications...
SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06. Business Intelligence Launch Pad User Guide
SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06 Business Intelligence Launch Pad User Guide Table of Contents 1 Document history....7 2 Getting started
This guide is to help you get started with Live Chat Support on your Wix website. If you have any additional questions after reading this guide,
This guide is to help you get started with Live Chat Support on your Wix website. If you have any additional questions after reading this guide, please chat with us at www.socialintents.com or email us
SAP NetWeaver Business Client 5.0 Overview. Product Management P&I Technology Core Platform
SAP NetWeaver Business Client 5.0 Overview Product Management P&I Technology Core Platform Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP
Salesforce Classic Guide for iphone
Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Contents AP - BROWSER BASED USER INTERFACE... 3 AP - CLIENT CAPABILITIES... 12. Cabinet AP October 2014 P a g e 2
Cabinet AP Contents AP - BROWSER BASED USER INTERFACE... 3 AP - CLIENT CAPABILITIES... 12 Cabinet AP October 2014 P a g e 2 AP - BROWSER BASED USER INTERFACE AP uses a browser interface for processing
BI 4.1 Quick Start Guide
BI 4.1 Quick Start Guide BI 4.1 Quick Start Guide... 1 Introduction... 4 Logging in... 4 Home Screen... 5 Documents... 6 Preferences... 8 Setting Up Preferences to Display Public Folders... 10 Web Intelligence...
isupport 15 Release Notes
isupport 15 Release Notes This document includes new features, changes, and fixes in isupport v15. The Readme.txt file included with the download includes a list of known issues. New Features in isupport
VBLOCK SOLUTION FOR SAP APPLICATION SERVER ELASTICITY
Vblock Solution for SAP Application Server Elasticity Table of Contents www.vce.com VBLOCK SOLUTION FOR SAP APPLICATION SERVER ELASTICITY Version 2.0 February 2013 1 Copyright 2013 VCE Company, LLC. All
Set Up and Maintain Customer Support Tools
Set Up and Maintain Customer Support Tools Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
Collaboration Technology Support Center Microsoft Collaboration Brief
Collaboration Technology Support Center Microsoft Collaboration Brief September 2005 HOW TO INTEGRATE MICROSOFT EXCHANGE SERVER INTO SAP ENTERPRISE PORTAL Authors Robert Draken, Solution Architect, Comma
PUBLIC Password Manager for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5
UOFL SHAREPOINT ADMINISTRATORS GUIDE
UOFL SHAREPOINT ADMINISTRATORS GUIDE WOW What Power! Learn how to administer a SharePoint site. [Type text] SharePoint Administrator Training Table of Contents Basics... 3 Definitions... 3 The Ribbon...
August 2014 Release Notes Version 14.0.72.6
August 2014 Release Notes Version 14.0.72.6 i NOTICES ServicePRO Release Notes August 2014 HelpSTAR and ServicePRO are registered trademarks of Help Desk Technology International Corporation. This publication
Microsoft Dynamics CRM 2013 Applications Introduction Training Material Version 2.0
Microsoft Dynamics CRM 2013 Applications Introduction Training Material Version 2.0 www.firebrandtraining.com Course content Module 0 Course Content and Plan... 4 Objectives... 4 Course Plan... 4 Course
EMC Documentum Webtop
EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights
Primavera Unifier Real Estate Management. User, Configuration, and Administration Guides
Primavera Unifier Real Estate Management User, Configuration, and Administration Guides Version 9.10 November 2012 Copyright Copyright 1998, 2012, Oracle and/or its affiliates. All rights reserved. Oracle
for Sage 100 ERP Business Insights Overview Document
for Sage 100 ERP Business Insights Document 2012 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and the Sage Software product and service names mentioned herein are registered
Using the Content Distribution Manager GUI
CHAPTER 3 Using the Content Distribution Manager GUI The Content Distribution Manager is the central location from which much of the work of creating and managing ACNS networks and hosted content can be
IBM Operational Decision Manager Version 8 Release 5. Getting Started with Business Rules
IBM Operational Decision Manager Version 8 Release 5 Getting Started with Business Rules Note Before using this information and the product it supports, read the information in Notices on page 43. This
EIM264 Flexible Governance Govern Your Own Objects in SAP Master Data Governance
EIM264 Flexible Governance Govern Your Own Objects in SAP Master Data Governance Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision.
GR5 Access Request. Process Diagram
GR5 Access Request Process Diagram Purpose, Benefits, and Key Process Steps Purpose This scenario uses business roles to show a new user access provisioning and also demo using simplified access request
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings
NHFIRST Time Management User Instructions
NHFIRST Time Management User Instructions As of January 11, 2012 NHFIRST Time Management User Instructions Page 1 Table of Contents Chapter 1... 4 Time Management Overview... 4 Time Management Features...
My Inbox in SAP Fiori Simplifying Workflow for End Users
My Inbox in SAP Fiori Simplifying Workflow for End Users Benjamin Notheis, Product Manager BPM, SAP SE ASUG Annual Conference, May 2015 Session Code: BT1072 Public Enterprise Architecture Data Modeling
User Documentation. Administrator Manual. www.proposalsoftware.com
User Documentation Administrator Manual Proposal Software 1140 US Highway 287, Suite 400-102 Broomfield, CO 80020 USA Tel: 203.604.6597 www.proposalsoftware.com Table of Contents Open the WebPro Viewer...
Installation and Administration Guide
Installation and Administration Guide Release 8 This installation guide will walk you through how to install and deploy Conga Composer, including recommended settings for the application. Contact Support:
Solution Documentation for Custom Development
Version: 1.0 August 2008 Solution Documentation for Custom Development Active Global Support SAP AG 2008 SAP AGS SAP Standard Solution Documentation for Custom Page 1 of 53 1 MANAGEMENT SUMMARY... 4 2
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0.
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the Northrop
Enter your User Id and Password and click the Log In button to launch the application.
Working with CECAS How to Log In to CECAS Training Site In your internet browser, go to the following IP address: training.nccecas.org/cecas Enter your User Id and Password and click the Log In button
7 Laying the Groundwork for Configuration
Implementation of performance management can be a challenge due to the multitude of components involved, including R/3 configuration, Business Add-Ins (BAdIs), and portal integration. This chapter explains
SAP Change Control - One Integrated Process to Manage Software Solution Deployments SAP AG
SAP Change Control - One Integrated Process to Manage Software Solution Deployments SAP AG Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase
RCS UI Field Security (UI Masking) Tobias Keller, Product Owner Custom Development, SAP SE December 2014
RCS UI Field Security (UI Masking) Tobias Keller, Product Owner Custom Development, SAP SE December 2014 Data Security The insider threat 2014 SAP SE. All rights reserved. Customer 2 Data Security SAP
How To Access A Project Plan On A Pc Or Macbook 2 On A Computer Or Macodeo On A Network (For Free) On A Server Or Macrocessor On A Microsoft Macbook (For A Free) With A Web
SharePoint Project Management Tools 1 P age W elcome to Tyler Implementation! Over the years, Tyler has continuously revisited and refined its Implementation processes in order to benefit from years of
AT&T Business Messaging Account Management
AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein
Getting Started with the Aloha Community Template for Salesforce Identity
Getting Started with the Aloha Community Template for Salesforce Identity Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved.
Single Sign-On Portal User Reference (Okta Cloud SSO)
Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...
SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.
Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori
Frequently Asked Questions
Frequently Asked Questions Administrator Functions How do I add a new employee to my organization? As an administrator, select Add User from the drop down option under the Administrator tab. If the new
Business Portal for Microsoft Dynamics GP 2010. Field Service Suite
Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views
Government of Saskatchewan Executive Council. Oracle Sourcing isupplier User Guide
Executive Council Oracle Sourcing isupplier User Guide Contents 1 Introduction to Oracle Sourcing and isupplier...6 1.0 Oracle isupplier...6 1.1 Oracle Sourcing...6 2 Customer Support...8 2.0 Communications
Citrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
Consuming Real Time Analytics and KPI powered by leveraging SAP Lumira and SAP Smart Business in Fiori SESSION CODE: 0611 Draft!!!
Consuming Real Time Analytics and KPI powered by leveraging SAP Lumira and SAP Smart Business in Fiori SESSION CODE: 0611 Draft!!! Michael Sung SAP Consuming Real Time Analytics and KPI powered by leveraging
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Table of Contents. Copyright 2010-2015 Symphonic Source, Inc. All rights reserved. Salesforce is a registered trademark of salesforce.
DupeCatcher is a real-time deduplication app designed specifically for Salesforce. It is a 100% APEX developed and deployed managed package, and is installed via the Salesforce AppExchange, eliminating
How To Use Netsuite With Openair
NetSuite OpenAir/NetSuite Integration Guide October 17, 2015 2015 NetSuite, Inc. NetSuite OpenAir/NetSuite Integration Guide November 12, 2015 This document is the property of NetSuite Inc., and may not
Change Management for Rational DOORS User s Guide
Change Management for Rational DOORS User s Guide Before using this information, read the general information under Appendix: Notices on page 58. This edition applies to Change Management for Rational
Business ByDesign. The SAP Business ByDesign solution helps you optimize project management
SAP Functions in Detail SAP Solutions for Small Businesses and Midsize Companies Efficient Project Management Drive Project Success with SAP Business ByDesign The SAP Business ByDesign solution helps you
ADMINISTRATOR GUIDE VERSION
ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose
PORTAL ADMINISTRATION
1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5
DIIMS Records Classifier Guide
DIIMS Records Classifier Guide Featuring Content Server 10 Second Edition, November 2012 Table of Contents Contents 1. DIIMS Overview... 3 1.1 An Overview of DIIMS within the GNWT... 3 1.1.1 Purpose of
Tips and Tricks for Deploying BI Web Services Within Your Web Intelligence Environment Chris Greer EV Technologies
Tips and Tricks for Deploying BI Web Services Within Your Web Intelligence Environment Chris Greer EV Technologies 2012 Wellesley Information Services. All rights reserved. In This Session Demonstrate
Welcome to the Audit, Control & Security Stream. Sponsored by:
Welcome to the Audit, Control & Security Stream Sponsored by: Realizing the Value of your Controls Platform Gerald West Manager, Security and Controls Assurance Serco Agenda Introduction Strategies (the
Microsoft SharePoint Products & Technologies
Tips & Tricks / SharePoint Page 1 of 2 Microsoft SharePoint Products & Technologies SharePoint Products and Technologies provide you enterprise-scale capabilities to meet businesscritical needs such as
Introduction to IBM Digital Analytics Michigan.gov
Introduction to IBM Digital Analytics Michigan.gov Revised: October 17, 2013 Table of Contents Overview... 3 Accessing Digital Analytics... 3 System Requirements... 3 Main Page... 3 Top Navigation... 4
one Managing your PBX Administrator ACCESSING YOUR PBX ACCOUNT CHECKING ACCOUNT ACTIVITY
one Managing your PBX Administrator ACCESSING YOUR PBX ACCOUNT Navigate to https://portal.priorityonenet.com/ and log in to the PriorityOne portal account. If you would like your web browser to keep you
Working with the ERP Integration Service of EMC Documentum Process Services for SAP
Working with the ERP Integration Service of EMC Documentum Process Services for SAP Applied Technology Abstract EMC Documentum Process Services for SAP is a new product that integrates with EMC Documentum
SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH
SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH WWW.MANTRANCONSULTING.COM 25 Mar 2011, ISACA Singapore SOD SAS70 Project Controls Infrastructure security Configurable controls Change
Sage CRM. 7.2 Mobile Guide
Sage CRM 7.2 Mobile Guide Copyright 2013 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
What s New in LANDESK Service Desk Version 7.8. Abstract
What s New in LANDESK Service Desk Version 7.8 Abstract This document highlights the new features and enhancements introduced in versions 7.8 of LANDESK Service Desk. Document Creation: December, 19 2014.
PEOPLESOFT EXPENSES & MOBILE EXPENSES
PEOPLESOFT EXPENSES & MOBILE EXPENSES Oracle s PeopleSoft Expenses is a comprehensive travel expense solution, which streamlines and automates travel spend KEY FEATURES Best practices in expense Mobile
Reading Sample. Integration Scenarios with Other Project Management Tools. Contents. Index. The Author. Project Management with SAP Project System
First-hand knowledge. Reading Sample SAP Project System s innovative design allows for cross-platform usage. This is good news for companies who manage projects through different programs and software.
Communications Cloud Product Enhancements February 2016
Communications Cloud Product Enhancements February 2016 Table of Contents Pages GoToMeeting... 3-26 GoToTraining...47-60 Communications Cloud Product Enhancements February 2016 GoToMeeting (Return to Table
Google Sites: Creating, editing, and sharing a site
Google Sites: Creating, editing, and sharing a site Google Sites is an application that makes building a website for your organization as easy as editing a document. With Google Sites, teams can quickly
Manual. Version: 1.0.0
Manual Version: 1.0.0 Table of Contents I. INTRODUCTION... 3 II. INSTALLATION... 5 a. System Requirements... 5 b. Installation... 5 c. Configure PayPal IPN... 5 d. Cron Setup... 6 e. Upload Email Logo...
1. Introduction to the Automated Accounts Payable Development... 3. 2. Process Flows of Purchase Orders, Goods Receipts and Invoice Queries...
Contents 1. Introduction to the Automated Accounts Payable Development... 3 2. Process Flows of Purchase Orders, Goods Receipts and Invoice Queries... 4 2.1 Ideal MM Process... 4 2.2 Missing GRN process...
Taulia Supplier Portal User Guide
Taulia Supplier Portal User Guide Version 2.1 Taulia Inc. Taulia GmbH 201 Mission Street, Ste. 900 Gladbacher Strasse 74 San Francisco, CA 94105 Phone +1 (415) 376 8280 40219 Düsseldorf Germany Fax +1
New, changed, or deprecated features
Microsoft Dynamics AX 7 New, changed, or deprecated s This document provides a summary of new and changed s that have been implemented in Microsoft Dynamics 'AX 7'. It also includes deprecated notices
SAP Solution Manager - Content Transfer This document provides information on architectural and design questions, such as which SAP Solution Manager
SAP Solution Manager - Content Transfer This document provides information on architectural and design questions, such as which SAP Solution Manager content is transferable and how. TABLE OF CONTENTS PREFACE...
Sage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
HCM on Any Device SAP Fiori Apps for Human Capital Management
Orange County Convention Center Orlando, Florida June 3-5, 2014 HCM on Any Device SAP Fiori Apps for Human Capital Management Satyam Singh Gertrud Beisel LEARNING POINTS Fiori and the UX Strategy Principles
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228
BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228 Contents Getting Started...4 Tips for Using Actionable Intelligence... 4 Logging into Actionable Intelligence...
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
SharePoint 2013 for Business Process Automation
SharePoint 2013 for Business Process Automation Course Number: 12966 Category: SharePoint Duration: 3 Days Course Description This three-day instructor-led course teaches business professionals how to
AC 10.0 Centralized Emergency Access
AC 10.0 Centralized Emergency Access Customer Solution Adoption June 2011 Version 2.0 Purpose of this document This document is a detailed guide on the emergency access capability of Access Control 10.0.
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On
How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On How to implement the X.509 certificate based Single Sign-On solution from SAP Page 2 of 34 How to
April 2010. 2007, 2008, 2009, 2010 GXS, Inc. All Rights Reserved.
April 2010 2007, 2008, 2009, 2010 GXS, Inc. All Rights Reserved. Licenses and Trademarks All product names are copyrights and registered trademarks/tradenames of their respective owners. Information in
P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T
O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T, F U S I O N E D I T I O N R E L E A S E 1 1. 1. 1.x P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E
E21 Mobile Users Guide
E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions
Scheduling Software User s Guide
Scheduling Software User s Guide Revision 1.12 Copyright notice VisualTime is a trademark of Visualtime Corporation. Microsoft Outlook, Active Directory, SQL Server and Exchange are trademarks of Microsoft
BusinessObjects Enterprise InfoView User's Guide
BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,
Citrix Receiver. Configuration and User Guide. For Windows Users
Citrix Receiver Configuration and User Guide For Windows Users rev: 26.01.2016 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
rma_product_return version BoostMyShop
rma_product_return version BoostMyShop June 30, 2016 Contents rma_product_return 1 1. Overview 1 Return Merchandise Authorized Request 1 Accept return 1 Process a return 1 Other features 1 2. Installation
8 Creating a Workflow
Whether you are building a new workflow from scratch or using an SAP supplied workflow, it is important that you understand the Workflow Builder tool. This chapter gets you started by enabling you to create
AD Self-Service Suite for Active Directory
The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.
CUSTOMER PORTAL USER GUIDE FEBRUARY 2007
CUSTOMER PORTAL USER GUIDE FEBRUARY 2007 CONTENTS INTRODUCTION 1. Access to the system 2. Case Management 2.1 Create a case 2.2 Review & Access existing cases 2.3 Update a Case 2.4 Resolve and Close a
