GRC300 SAP Access Control Implementation and Configuration . . EXERCISES AND SOLUTIONS . Course Version: 18 Course Duration: 9 Hours 25 Minutes Material Number: 50160621 SAP Copyrights, Trademarks and Disclaimers © 2022 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. Please see https://www.sap.com/ corporate/en/legal/copyright.html for additional trademark information and notices. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials may have been machine translated and may contain grammatical errors or inaccuracies. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. Typographic Conventions American English is the standard used in this handbook. The following typographic conventions are also used. This information is displayed in the instructor’s presentation Demonstration Procedure Warning or Caution Hint Related or Additional Information Facilitated Discussion User interface control Example text Window title Example text © Copyright. All rights reserved. iii Contents Unit 1: Introduction to Access Governance Using SAP Access Control No exercises Unit 2: Identification and Management of Access Risk No exercises Unit 3: User Experience, Security Concepts and System Architecture 1 Exercise 1: Connect to the System and Navigate the User Interface Unit 4: Configuration Overview No exercises Unit 5: Risk Analysis 4 10 20 32 Exercise 2: Maintain Master Data and Access Control Owners Exercise 3: Build a Rule Set and Prepare for Testing Exercise 4: Perform Risk Analysis, Remediation, and Mitigation Exercise 5: Review Parameter Settings for Analyze and Manage Risk (Optional) Unit 6: SAP Business Rule Framework (BRFplus) 44 56 Exercise 6: Create a BRFplus Initiator Rule Exercise 7: Create BRFplus Agent and Routing Rules Unit 7: Multi-Stage, Multi-Path (MSMP) Workflow 70 Exercise 8: Evaluate MSMP Workflow Configuration Unit 8: User Provisioning 79 82 Exercise 9: Maintain End User Personalization Exercise 10: Prepare Roles and Owner Data for MSMP Workflow Testing and Validation for SAP Systems Exercise 11: Create an Access Request Exercise 12: Create an Access Request with Risk Violations Exercise 13: Review Parameter Settings for Provisioning and Managing Users 89 98 109 © Copyright. All rights reserved. iv Unit 9: Role Design and Management 121 123 Exercise 14: Maintain Owners for Role Management Exercise 15: Maintain Default Owners with Condition Group 125 128 130 Exercise 16: Review Configuration Settings for Condition Groups Exercise 17: Define Methodology Process and Steps Exercise 18: Associate Role Methodology Process to Condition Group Exercise 19: Create a Single Role Exercise 20: Create a Composite Role Exercise 21: Create a Business Role Exercise 22: Review Parameter Settings for Design and Manage Roles 132 143 153 161 Unit 10: Emergency Access Management 170 Exercise 23: Maintain EAM Owners and Controllers in Central Owner Maintenance Exercise 24: Assign Owners to Firefighter IDs Exercise 25: Assign Controllers to Firefighter IDs Exercise 26: Assign Firefighter Users to Firefighter IDs Exercise 27: Maintain Reason Codes Exercise 28: Execute a Firefight Session Exercise 29: Review a Log Report Exercise 30: Review Parameter Settings for Emergency Access Management 173 176 179 183 186 191 193 Unit 11: Periodic Access Review Process 200 Exercise 31: Review Parameter Settings for Periodic Access Review Unit 12: Appendix (Optional) Maintaining Custom Fields 203 213 Exercise 32: Add Custom Fields to Request Header Exercise 33: Add Custom Fields to Role Definition © Copyright. All rights reserved. v © Copyright. All rights reserved. vi Unit 3 Exercise 1 Connect to the System and Navigate the User Interface Business Example You are a system administrator starting a new implementation of the SAP GRC software. You have been asked to connect to the system and navigate to the user interface. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. 1. Access SAP Access Control using the SAP Logon Pad. Log on with User ID GRC300-## and password Welcome1. 2. Identify the customizing activities for SAP GRC. 3. Access SAP Fiori Launchpad from the SAP ABAP system. Log on with User ID GRC300-## and password Welcome1. Note: It is important to note that, due to our technical environment, how we will access the SAP Fiori Launchpad in this training system will not reflect the SAP recommended scenario. 4. Explore the AC Home and ARA Configuration tile groups. 5. Explore the Organization hierarchy of the SAP GRC System. © Copyright. All rights reserved. 1 Unit 3 Solution 1 Connect to the System and Navigate the User Interface Business Example You are a system administrator starting a new implementation of the SAP GRC software. You have been asked to connect to the system and navigate to the user interface. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. 1. Access SAP Access Control using the SAP Logon Pad. Log on with User ID GRC300-## and password Welcome1. a) In the classroom environment, choose Start → SAP Logon. b) In the SAP Logon box, select the TGT system and choose Log On. c) On the log on screen, enter the data from the table. Field Value Client 001 User GRC300-## Password Welcome1 Logon Language Course Language 2. Identify the customizing activities for SAP GRC. a) On the SAP Easy Access screen, in the command box, enter /nSPRO and choose Enter. b) On the Customizing: Execute Project screen, choose SAP Reference IMG. c) On the Display IMG screen, expand the Governance, Risk and Compliance node using the icon on the left. d) Take note of the nodes under Governance, Risk and Compliance. Result: This is where customizing activities and configuration settings are performed for the SAP GRC solution. Note that there are nodes for shared configuration settings, as well as for solution-specific configuration, such as Access Control. e) In the command box, enter /n and choose Enter. Result: The SAP Easy Access screen appear. Remain on this screen for the next step. 3. Access SAP Fiori Launchpad from the SAP ABAP system. Log on with User ID GRC300-## and password Welcome1. © Copyright. All rights reserved. 2 Solution 1: Connect to the System and Navigate the User Interface Note: It is important to note that, due to our technical environment, how we will access the SAP Fiori Launchpad in this training system will not reflect the SAP recommended scenario. a) On the SAP Easy Access screen, under the folder User Menu for Training GRC300-##, double click SAP Fiori Launchpad Result: The log on page for SAP Fiori will appear. b) On the SAP Fiori Logon page, enter the data from the table. Table 1: Field Value User GRC300-## Password Welcome1 Language Course Language c) Choose Log On. Result: The SAP Fiori Launchpad homepage appears. d) Take note of the Fiori Tile Groups that are shown. e) Remain on this page for the next step. 4. Explore the AC Home and ARA Configuration tile groups. a) On the SAP Fiori Launchpad homepage, in the AC Home tile group, choose Work Inbox. Result: Your work inbox appears. This is where you can access the requests that have been assigned to you and process the task needed. b) Choose Back to return to the SAP Fiori Launchpad. c) Choose the ARA Configuration tile group. d) Take note of the tiles shown. Choose a few tiles and look at the screens displayed. When done reviewing a screen, choose Back to return to the SAP Fiori Launchpad homepage. 5. Explore the Organization hierarchy of the SAP GRC System. a) On the SAP Fiori Launchpad homepage, in the ARA Configuration tile group, choose Organizations. b) On the Organization Hierarchy screen, locate the node ##_CRG GLB INTL. c) Expand the ##_CRG GLB INTL node by choosing the arrow to the left. Continue to expand as needed to view all of the organizations reporting to ##_CRG GLB INTL. d) Choose Back to return to the SAP Fiori Launchpad homepage. © Copyright. All rights reserved. 3 Unit 5 Exercise 2 Maintain Master Data and Access Control Owners Business Example You are preparing to set up your access control rule sets and mitigating controls. To support this, create an organization and assign Access Control Owners to that organization. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. 1. In the ##-CRG GLB INTL Organizational Hierarchy, define an organizational structure named ##-GROUP HQ. 2. Create a suborganization for ##-GROUP HQ called ##-FINANCE. 3. Create the following two business process and subprocess IDs in the SAP Reference IMG for SAP Access Control. Note: ##S1 should be the Subprocess to ##B1 . ##S2 should be the Subprocess for ##B2. Process Type Process Name Process Description Business Process ##B1 Group ## Business Process 1 Business Process ##B2 Group ## Business Process 2 Business Subprocess ##S1 Group ## Subprocess 1 Business Subprocess ##S2 Group ## Subprocess 2 4. Create the Business Subprocess. © Copyright. All rights reserved. 4 Exercise 2: Maintain Master Data and Access Control Owners 5. Assign the Access Control Owner Type to the corresponding Access Control Owner ID, and assign all Access Control Owner types to your GRC300-## ID. Access Control Owner Name Access Control Owner Type ACRISKOWN## Risk Owner ACMITAPP## Mitigation Approver ACMITMON## Mitigation Monitor Note: Your log on user IDGRC300-## is assigned to all selections in the training system. You are not allowed to assign yourself as an a Central Owner. 6. Assign your Access Control Owners to your organization ##-FINANCE that you previously created. © Copyright. All rights reserved. 5 Unit 5 Solution 2 Maintain Master Data and Access Control Owners Business Example You are preparing to set up your access control rule sets and mitigating controls. To support this, create an organization and assign Access Control Owners to that organization. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. 1. In the ##-CRG GLB INTL Organizational Hierarchy, define an organizational structure named ##-GROUP HQ. a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Organizations. b) On the Organization Hierarchy screen, choose Advanced at the end of the Date line. c) In the Advanced Options dialog box, choose Default Selection Method as Date and Default Date as Fixed Date. In the Date field, enter January 1, CY. d) Choose OK. e) On the Organizations screen, choose ##-CRG GLB INTL Org. f) On the Organizations screen, choose Add. g) On the Add Organization dialog box, select Create New Organization. h) Choose OK. i) On the Organization screen, in the Name field, enter ##-GROUP HQ. j) Choose Save. 2. Create a suborganization for ##-GROUP HQ called ##-FINANCE. a) On the Organization Hierarchy screen, choose ##-GROUP HQ. b) Choose Add. © Copyright. All rights reserved. 6 Solution 2: Maintain Master Data and Access Control Owners c) On the Add Organization dialog box, select Create New Organization. d) Choose OK. e) On the Organization screen, in the Name field, enter ##-FINANCE. f) Choose Save. g) Choose the Home icon to return to the SAP Fiori Launchpad home page. 3. Create the following two business process and subprocess IDs in the SAP Reference IMG for SAP Access Control. Note: ##S1 should be the Subprocess to ##B1 . ##S2 should be the Subprocess for ##B2. Process Type Process Name Process Description Business Process ##B1 Group ## Business Process 1 Business Process ##B2 Group ## Business Process 2 Business Subprocess ##S1 Group ## Subprocess 1 Business Subprocess ##S2 Group ## Subprocess 2 a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-## screen, in the command field, enter SPRO. b) Choose Enter. c) On the Customizing: Execute Project screen, on the toolbar, choose SAP Reference IMG. d) On the Display IMG screen, choose SAP Customizing Implementation Guide → Governance Risk and Compliance → Access Control → Maintain Business Processes and Subprocesses. e) On the Change View “Business Process”: Overview screen, choose New Entries. f) In the Business Process table, enter the two new business processes from the table at the beginning of this step. g) Choose Save. h) Remain on this screen for the next step. 4. Create the Business Subprocess. a) Select the Business Process ##B1 so that the row is highlighted. b) In the navigation panel, double-click Business Subprocess subfolder. © Copyright. All rights reserved. 7 Unit 5: Risk Analysis c) On the Change View “Business Subprocess”: Overview screen, choose New Entries. d) In the Business Subprocess table, enter the subprocess ##S1 with the data from the table. e) In the navigation panel, double-click Business Process subfolder. f) In the Business Process table, select ##B2. g) In the navigation panel, double-click the Business Subprocess subfolder. h) On the Change View “Business Subprocess”: Overview screen, choose New Entries. i) In the Business Subprocess table, enter the subprocess ##S2 with the data from the table. j) Choose Save. k) Choose Back until you return to the SAP Easy Access — User Menu for Training GRC300-## screen. 5. Assign the Access Control Owner Type to the corresponding Access Control Owner ID, and assign all Access Control Owner types to your GRC300-## ID. Access Control Owner Name Access Control Owner Type ACRISKOWN## Risk Owner ACMITAPP## Mitigation Approver ACMITMON## Mitigation Monitor Note: Your log on user IDGRC300-## is assigned to all selections in the training system. You are not allowed to assign yourself as an a Central Owner. a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Access Control Owners. b) On the Owner Assignment: New screen, choose Create. c) In the Owner field, choose Search. d) On the Select User screen, in the Find field, enter AC*##. e) Choose Go. f) In the Available table, choose ACRISKOWN##. g) Choose OK. h) On the Owner Assignment: New screen, in the Owner Type section, choose Risk Owner. i) In the Comment Column enter ARA Owner Maintenance for GRC Training Course Group ##. j) Choose Save. © Copyright. All rights reserved. 8 Solution 2: Maintain Master Data and Access Control Owners k) Choose Close. If your entry does not appear, choose Refresh at the bottom of the data table. l) Repeat steps b - k for the other owners using the data in the table. m) Close the Central Owner browser tab. 6. Assign your Access Control Owners to your organization ##-FINANCE that you previously created. a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Organizations. b) On the Organization screen, expand ##-CRG GLB INTL → ##-GROUP HQ. Choose ##FINANCE. c) Choose Open. d) On the Organization window, select the Owners tab. Note: You may need to maximize the window to see the Owners tab or use the Navigation icons at the end of the tab row to locate the Owners tab. e) In the AC Owners section, choose Add Row. f) In the Name field, choose Search. g) In the Search: Name dialog box, in the Full Name field, enter Group ##. h) Choose Go. i) Select ACMITAPP## that you assigned as an Access Control Owner. j) Repeat the steps e - i to add the ACMITMON## and GRC300-## users. For GRC300##, use GRC300 as the search criteria. k) Choose Save. l) Close the Organization Hierarchy browser tab. © Copyright. All rights reserved. 9 Unit 5 Exercise 3 Build a Rule Set and Prepare for Testing Business Example You are a system administrator and have been asked to run a validation of access risks. The validation of access risks in a crucial task for the success of the SAP Access Control project. An incorrect access risk destroys the credibility of the whole set of access risks. You want to be certain this is not an issue in your system. You will use simple ABAP Roles in the back-end system to validate the access risks (SoD). In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. This exercise uses the data created in the exercise Maintain Master Data and Access Control Owners. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Create and Build a Rule Set 1. Create a rule set using the data from the table: Field Value Rule Set ID ##RS Description Group ## Rule Set 2. Create the functions using the data from the following table. Function ID Function Description Business System Process ##F1 Payments Procure ZMGCLNT FB10 to Pay 800 ECC ERP F_BKPF_ ACTVT BUK 01 ##F2 Vendor Procure ZMGCLNT XK01 Mainte- to Pay 800 nance ECC ERP F_LFA1_ ACTVT APP 01 ##F3 MainProcure ZMGCLNT ME21N tain PO to Pay 800 ECC ERP M_BEST_ ACTVT BSA 01 © Copyright. All rights reserved. Action Permission Field Field Value 10 Exercise 3: Build a Rule Set and Prepare for Testing Function ID Function Description Business System Process Action Permission Field Field Value ##F4 Invoice Procure ZMGCLNT MIRO Procto Pay 800 essing ECC ERP M_RECH_ ACTVT WRK 01 ##F5 Table Basis Maintenance ZMGCLNT SM30 800 ECC ERP S_TABU_ ACTVT DIS 02 ##F6 Table Basis Maintenance Permission ZMGCLNT 800 ECC ERP S_TABU_ ACTVT DIS 02 3. Create two SoD Risks using the data in the following table. Access Risk ID Description Risk Type Business Process ##R1 Payment Fraud Segregation of Duties Procure to High Pay ##F1 Unauthorized Purchasing Segregation of Duties Procure to High Pay ##F3 ##R2 Risk Level Functions ##F2 ##F4 Hint: Be sure to include the rule set ID you created previously on the Rule Set tab for each risk you create. 4. Create a critical action risk using the data in the following table. Risk ID Risk Descrip- Risk Type tion Business Process Risk Level Function ##R3 Table Maintenance Basis High ##F5 Critical Action 5. Create a Critical Permission Risk using the data in the following table. © Copyright. All rights reserved. 11 Unit 5: Risk Analysis Risk ID Risk Descrip- Risk Type tion Business Process ##R4 Table Critical Basis MaintePermission nance Permission Risk Level Function High ##F6 6. Generate rules for your risks. 7. Run the Access Rule Summary Report for your rule set ##RS and review the results. Confirm that all the Risk IDs from your rule set ##RS are listed. If not, please correct your ruleset configuration from the previous steps. 8. Run the Access Rule Detail Report for the Global rule set and review the Access Rules for Risk P001. What is the Access Rule ID for the combination of actions FB10 and XK01 What is the field value for Permission Object M_LFM1_EKO field ACTVT? What is the status of permission M_LFM1_EKO? How will the status of Permission Object M_LFM1_EKO impact the results of a Risk Analysis? © Copyright. All rights reserved. 12 Unit 5 Solution 3 Build a Rule Set and Prepare for Testing Business Example You are a system administrator and have been asked to run a validation of access risks. The validation of access risks in a crucial task for the success of the SAP Access Control project. An incorrect access risk destroys the credibility of the whole set of access risks. You want to be certain this is not an issue in your system. You will use simple ABAP Roles in the back-end system to validate the access risks (SoD). In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. This exercise uses the data created in the exercise Maintain Master Data and Access Control Owners. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Create and Build a Rule Set 1. Create a rule set using the data from the table: Field Value Rule Set ID ##RS Description Group ## Rule Set a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose the Rule Sets tile. b) On the Sod Rule Set screen, choose Create. c) In the Ruleset: New dialog box, enter the data from the table. d) Choose Save. e) Choose Close. f) Close the SOD Rule Set browser window to return to the SAP Fiori Launchpad home page. 2. Create the functions using the data from the following table. © Copyright. All rights reserved. 13 Unit 5: Risk Analysis Function ID Function Description Business System Process Action Permission Field Field Value ##F1 Payments Procure ZMGCLNT FB10 to Pay 800 ECC ERP F_BKPF_ ACTVT BUK 01 ##F2 Vendor Procure ZMGCLNT XK01 Mainte- to Pay 800 nance ECC ERP F_LFA1_ ACTVT APP 01 ##F3 MainProcure ZMGCLNT ME21N tain PO to Pay 800 ECC ERP M_BEST_ ACTVT BSA 01 ##F4 Invoice Procure ZMGCLNT MIRO Procto Pay 800 essing ECC ERP M_RECH_ ACTVT WRK 01 ##F5 Table Basis Maintenance ZMGCLNT SM30 800 ECC ERP S_TABU_ ACTVT DIS 02 ##F6 Table Basis Maintenance Permission ZMGCLNT 800 ECC ERP S_TABU_ ACTVT DIS 02 a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Functions. b) On the SOD FUNCTION screen, choose Create. c) In the Function: New dialog box, enter the data from the table at the beginning of this step. d) Enter the Function ID and Business Process data from the table. e) Select Analysis Scope → Single System. f) On the Action tab, choose Add. g) In the open row, enter the data from the table for System and Action. h) Choose Enter. i) Select the Permission tab. j) On the Permission tab, enter the data from the table for Permission, Field, and Field Value. k) Set the status to Active for each object configured in the table. Leave all others as Inactive l) Choose Save. © Copyright. All rights reserved. 14 Solution 3: Build a Rule Set and Prepare for Testing m) Choose Close. n) Repeat steps b - m for the remaining functions in the table except for ##F6. o) For ##F6, do not add anything to the table on the Actions tab. p) Select the Permission tab. q) Choose Add. r) In the System field, choose ZMGCLNT800-ECC ERP. s) In the Permission Group field, enter S_TABU_DIS. t) Add the rest of the entries indicated in the last line of the table at the beginning of this step, use the search functionality if necessary. u) Choose Save. v) Choose Close. w) Close the SOD FUNCTION browser tab. 3. Create two SoD Risks using the data in the following table. Access Risk ID Description Risk Type Business Process ##R1 Payment Fraud Segregation of Duties Procure to High Pay ##F1 Unauthorized Purchasing Segregation of Duties Procure to High Pay ##F3 ##R2 Risk Level Functions ##F2 ##F4 Hint: Be sure to include the rule set ID you created previously on the Rule Set tab for each risk you create. a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Access Risks. b) On the SOD Risk screen, choose Create. c) On the Access Risk: New dialog box, enter the data from the table. d) Select the Functions tab and choose Add. e) In the Function ID field, choose Search. f) In the Select Functions dialog box, in the Find field, enter ##*. Choose Go. g) In the Available column, choose ##F1 and ##F2. h) Use the single arrow button to move the functions to the Selected column. i) Choose OK. © Copyright. All rights reserved. 15 Unit 5: Risk Analysis j) On the Access Risk: New screen, select the Rule Sets tab. k) Choose Add. l) In the Rule Set ID field, choose Search. m) In the Select Rulesets dialog box, choose ##RS. n) Use the single arrow button to move the functions to the Selected column. o) Choose OK. p) Choose the Risk Owners tab. q) Choose Add. r) In the Owner ID field, choose Search. s) In the Select Risk Owners dialog box, choose GRC300-## and ACRISKOWN##. t) Use the single arrow button to move the functions to the Selected column. u) Choose OK. v) Choose Save. w) Choose Close. x) Repeat steps b - w to add the remaining risks. y) Remain on this screen for the next step. 4. Create a critical action risk using the data in the following table. Risk ID Risk Descrip- Risk Type tion Business Process Risk Level Function ##R3 Table Maintenance Basis High ##F5 Critical Action a) on the SOD Risk screen, choose Create. b) In the Access Risk: New dialog box, enter the data from the table. c) On the Function tab, choose Add. d) In the Function ID field, choose Search. e) On the Select Functions dialog box, in the Available column, choose ##F5. f) Use the single arrow button to move the functions to the Selected column. g) Choose OK. h) On the Access Risk: New dialog box, select the Rule Sets tab. i) Choose Add. j) In the Rule Set ID field, choose Search. k) In the Select Rulesets dialog box, choose your rule set. © Copyright. All rights reserved. 16 Solution 3: Build a Rule Set and Prepare for Testing l) Use the single arrow button to move the functions to the Selected column. m) Choose OK. n) On the Access Risk: New dialog box, select the Risk Owners tab. o) Choose Add. p) In the Owner ID field, choose Search. q) In the Select Risk Owners dialog box, choose GRC300-## and ACRISKOWN##. r) Use the single arrow button to move the functions to the Selected column. s) Choose OK. t) Choose Save. u) Choose Close. v) Remain on this screen for the next step. 5. Create a Critical Permission Risk using the data in the following table. Risk ID Risk Descrip- Risk Type tion Business Process ##R4 Table Critical Basis MaintePermission nance Permission Risk Level Function High ##F6 a) In the SOD Risk dialog box, choose Create. b) In the Access Risk: New dialog box, enter the data from the table. c) On the Function tab, choose Add. d) In the Function ID column, choose Search. e) On the Select Functions dialog box, in the Available column, choose ##F6. f) Use the single arrow button to move the functions to the Selected column. g) Choose OK. h) On the Access Risk: New dialog box, select the Rule Sets tab. i) Choose Add. j) In the Rule Set ID field, choose Search. k) In the Select Rulesets dialog box, choose your rule set. l) Use the single arrow button to move the functions to the Selected column. m) Choose OK. n) On the Access Risk: New dialog box, select the Risk Owners tab. o) In the Owner ID field, choose Search. © Copyright. All rights reserved. 17 Unit 5: Risk Analysis p) Choose Add. q) In the Select Risk Owners dialog box, choose your training ID and Risk Owner Training ID. r) Use the single arrow button to move the functions to the Selected column. s) Choose OK. t) Choose Save. u) Choose Close. v) Remain on this screen for the next step. 6. Generate rules for your risks. a) On the SOD Risk screen, choose your first Risk ID. b) On the SOD Risk dialog box, choose Generate Rules → Foreground. c) In the Risks dialog box, choose Confirm. d) In the dialog box, choose the link View Action Rules. e) In the Action Rules dialog box, view your action rules. f) Choose Back. g) In the dialog box, choose the link View Permission Rules. h) In the Permission Rules dialog box, view your permission rules. i) Choose Back. j) Choose Close to return to the SOD Risk dialog box. k) Deselect the risk just generated. l) Repeat steps a - j for the remaining risks you created. m) After all your rules have been generated, close the SOD Risk browser tab. 7. Run the Access Rule Summary Report for your rule set ##RS and review the results. Confirm that all the Risk IDs from your rule set ##RS are listed. If not, please correct your ruleset configuration from the previous steps. a) On the SAP Fiori Launchpad homepage, in the ARA Configuration tile group, choose Access Rule Summary. b) Under Analysis Criteria, use the Rule Set drop down to select Group ## Rule Set (##RS). Leave all other Analysis Criteria drop downs unchanged. c) Choose Run in Foreground. d) In the Information regarding huge data dialog box, choose No. Result: The results from the data query appear and can be reviewed. e) Close the Results / Multiple Selection window. f) Choose the Home icon to return to the SAP Fiori Launchpad home page. 8. Run the Access Rule Detail Report for the Global rule set and review the Access Rules for Risk P001. © Copyright. All rights reserved. 18 Solution 3: Build a Rule Set and Prepare for Testing What is the Access Rule ID for the combination of actions FB10 and XK01 0001 What is the field value for Permission Object M_LFM1_EKO field ACTVT? 01 What is the status of permission M_LFM1_EKO? InActive How will the status of Permission Object M_LFM1_EKO impact the results of a Risk Analysis? Object will not be analyzed because it is not active. a) On the SAP Fiori Launchpad homepage, in the ARA Configuration tile group, choose Access Rule Detail. b) Under Analysis Criteria, use the Rule Set drop down to select Group ## Rule Set (##RS). c) Under Analysis Criteria, use the Access Risk ID Search. d) In the Search: Choose a value for this criterion window, enter ##R1. e) Choose Go and select the line for ##R1. f) Choose Run in Foreground. Result: The results from the data query appear and can be reviewed. g) Close the Results / Multiple Selection window. h) Choose the Home icon to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 19 Unit 5 Exercise 4 Perform Risk Analysis, Remediation, and Mitigation Business Example You are the access risk specialist within the internal control group. You have been asked to evaluate a rule set that you created earlier against the users and rules you created using Ad Hoc Risk Analysis in Access Control. You have been asked to validate that our rule set function as designed and to successfully identify risks at the user and role levels. In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. This exercise uses the data created in the exercises Maintain Master Data and Access Control Owners and Build a Rule Set and Prepare for Testing. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Task 1: Analyze Users for SoD and Critical Action Violations 1. Analyze your users for SoD and CA violations, and save the report criteria as variant ##_USER_01. Field Value System ZMGCLNT800 (ZMGCLNT800-ECC ERP) Users ##_USER_01, ##_USER_02, ##_USER_03 (HINT: Add additional criteria rows for User or use Multiple Selections) Rule Set Group ## Rule Set Report Options: Format Detail / Technical View Report Options: Type Select the following elements: Access Risk Analysis © Copyright. All rights reserved. ● Action Level ● Permission Level ● Critical Action ● Critical Permission 20 Exercise 4: Perform Risk Analysis, Remediation, and Mitigation Field Value Additional Criteria Select the following elements: Save Variant as ● Include Mitigated Risks ● Show All Objects ##_USER_01 2. Using Simulation, evaluate the possibilities for remediating the risks identified during your User-Level Analysis. Field Value System ZMGCLNT800 (ZMGCLNT800-ECC ERP) User ##_USER_02 Rule Set Group ## Rule Set Report Options: Format Detail / Technical View Report Options: Type Select the following elements: Access Risk Analysis Additional Criteria Save Variant as ● Action Level ● Permission Level ● Critical Action Select the following elements: ● Include Mitigated Risks ● Show All Objects ##_USER_02 3. Simulate what happens when you exclude the value MIRO from the Composite role. 4. Simulate what happens when you exclude the technical role Z:RISK_##R2. Task 2: Analyze Roles for SoD and Critical Action Violations 1. Using Simulation, evaluate the possibilities for remediating the risks identified during RoleLevel Analysis. Use Composite role Z:COMP_RULE_GRC300, which contains the Single roles Z:RISK_00R1 and Z:RISK_00R2 from system ZMGCLNT800. Field Value System ZMGCLNT800 (ZMGCLNT800-ECC ERP) Role Type Technical Role Role Z:COMP_ROLE_GRC300 Rule Set Group ## Rule Set © Copyright. All rights reserved. 21 Unit 5: Risk Analysis Field Value Report Options: Format Detail / Technical View Report Options: Type Select the following elements: Access Risk Analysis Additional Criteria ● Action Level ● Permission Level ● Critical Action Select the following elements: ● Include Mitigated Risks 2. Simulate what happens when you exclude the value MIRO from the Composite role. 3. Simulate what happens when you exclude the technical role Z:RISK_002. 4. Simulate what happens when you add a transaction to the composite role. Task 3: Create a Mitigating Control 1. Create a Mitigating Control to mitigate one of your risks. Tab Field Value Mitigating Control ID GRCMCT## Name Group ## Mitigating Control Organization ##-Finance Process Group ## Business Process 1 Subprocess Group ## Subprocess 1 Risk ID ##R1 and P001 Rule ID * General Access Risks Owners Name ● ● © Copyright. All rights reserved. Group ## AC Mitigation Monitor Training ID (ACMITMON##) Group ## AC Mitigation Approver 22 Exercise 4: Perform Risk Analysis, Remediation, and Mitigation Tab Field Value Training ID (ACMITAPP##) ● Assignment Type ● ● ● Training GRC300-## (GRC300-##) Assignment Type for Group ## AC Mitigation Approver Training ID: Approver Assignment Type for Group ## AC Mitigation Monitor Training ID: Monitor Assignment Type for Training GRC300-## ID: Monitor 2. Assign the new mitigating control to the risk identified earlier in this exercise. Use saved variant ##_USER_01. 3. Run a risk analysis including mitigated risks. 4. Run the risk analysis excluding mitigated risks. © Copyright. All rights reserved. 23 Unit 5 Solution 4 Perform Risk Analysis, Remediation, and Mitigation Business Example You are the access risk specialist within the internal control group. You have been asked to evaluate a rule set that you created earlier against the users and rules you created using Ad Hoc Risk Analysis in Access Control. You have been asked to validate that our rule set function as designed and to successfully identify risks at the user and role levels. In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. This exercise uses the data created in the exercises Maintain Master Data and Access Control Owners and Build a Rule Set and Prepare for Testing. Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Task 1: Analyze Users for SoD and Critical Action Violations 1. Analyze your users for SoD and CA violations, and save the report criteria as variant ##_USER_01. Field Value System ZMGCLNT800 (ZMGCLNT800-ECC ERP) Users ##_USER_01, ##_USER_02, ##_USER_03 (HINT: Add additional criteria rows for User or use Multiple Selections) Rule Set Group ## Rule Set Report Options: Format Detail / Technical View Report Options: Type Select the following elements: Access Risk Analysis © Copyright. All rights reserved. ● Action Level ● Permission Level ● Critical Action ● Critical Permission 24 Solution 4: Perform Risk Analysis, Remediation, and Mitigation Field Value Additional Criteria Select the following elements: Save Variant as ● Include Mitigated Risks ● Show All Objects ##_USER_01 a) On the SAP Fiori Launchpad home page, in the ARA Monitoring & Analysis tile group, choose User Level Risk Analysis. b) On the Risk Analysis: User Level screen, enter the data from the table. Note: To add additional Users criteria rows, choose Add at the end of the respective row or select Multiple Selections in the boolean field.. c) After entering data in Save Variant as field, choose Save. d) Choose Run in Foreground. e) In the Multiple Selection dialog box, in the Result table, view the SoD violations and roles. Note: The SoD violations are listed by code in the Function column. f) Use the Type drop-down menu to view the different types of results for each type of risk analysis. Review the data for each report type. g) Choose OK. h) Close the browser window to return to the SAP Fiori Launchpad home page. 2. Using Simulation, evaluate the possibilities for remediating the risks identified during your User-Level Analysis. Field Value System ZMGCLNT800 (ZMGCLNT800-ECC ERP) User ##_USER_02 Rule Set Group ## Rule Set Report Options: Format Detail / Technical View © Copyright. All rights reserved. 25 Unit 5: Risk Analysis Field Value Report Options: Type Select the following elements: Access Risk Analysis Additional Criteria Save Variant as ● Action Level ● Permission Level ● Critical Action Select the following elements: ● Include Mitigated Risks ● Show All Objects ##_USER_02 a) On the SAP Fiori Launchpad home page, in the ARA Monitoring & Analysis tile group, choose User Level Simulation. b) On the Simulation: User Level, Step 1 (Define Analysis Criteria) screen, enter the data from the table. c) After entering data in Save Variant as field, choose Save. d) Choose Next. e) On the Risk Analysis: User Level, Step 2 (Define Simulation Criteria) screen, choose Run in Foreground. f) On the Risk Analysis: User Level, Step 3 (Confirmation) screen, view the results for each type of risk analysis. For a more detailed look, in the Format field, choose Detail. g) Remain on this screen for the next step. 3. Simulate what happens when you exclude the value MIRO from the Composite role. a) On the Risk Analysis: User Level, Step 3 (Confirmation) screen, in the navigation ribbon, choose Previous. b) On the Risk Analysis: User Level, Step 2 (Define Simulation Criteria) screen, in the Actions table, choose Add. c) In the table, in the System column, choose ZMGCLNT800 (ZMGCLNT800-ECC ERP). d) in the Action From column enter MIRO. e) In the Actions column, choose Exclude from the drop-down list. f) Choose Run in Foreground. g) On the Risk Analysis: User Level, Step 3 (Confirmation) screen, view the results for each type of risk analysis. For a more detailed look, in the Format field, choose Detail. By excluding the value MIRO, there are no longer any SoD violations. © Copyright. All rights reserved. 26 Solution 4: Perform Risk Analysis, Remediation, and Mitigation h) Remain on this screen for the next step. 4. Simulate what happens when you exclude the technical role Z:RISK_##R2. a) On the Risk Analysis: User Level, Step 3 (Confirmation) screen, choose Previous. b) Select the Actions tab, select the entry for MIRO, and choose Remove. c) Select the Roles tab and choose Add. d) In the table, in the Role Type column, select Technical Role. e) In the System column, choose ZMGCLNT800 (ZMGCLNT800-ECC ERP). f) in the Role From column enter Z:RISK_##R2. g) In the Actions column, choose Exclude from the drop-down list h) Choose Run in Foreground. i) On the Risk Analysis: User Level, Step 3 (Confirmation) screen, view the results for each type of risk analysis. For a more detailed look, in the Format field, choose Detail. By excluding the role Z:RISK_##R2, there are no longer any SoD violations. j) Close the User Level, Step 3 (Confirmation) browser window to return to the SAP Fiori Launchpad home page. Task 2: Analyze Roles for SoD and Critical Action Violations 1. Using Simulation, evaluate the possibilities for remediating the risks identified during RoleLevel Analysis. Use Composite role Z:COMP_RULE_GRC300, which contains the Single roles Z:RISK_00R1 and Z:RISK_00R2 from system ZMGCLNT800. Field Value System ZMGCLNT800 (ZMGCLNT800-ECC ERP) Role Type Technical Role Role Z:COMP_ROLE_GRC300 Rule Set Group ## Rule Set Report Options: Format Detail / Technical View Report Options: Type Select the following elements: Access Risk Analysis Additional Criteria ● Action Level ● Permission Level ● Critical Action Select the following elements: ● © Copyright. All rights reserved. Include Mitigated Risks 27 Unit 5: Risk Analysis a) On the SAP Fiori Launchpad home page, in the ARA Monitoring & Analysis tile group, choose Role Level Simulation. b) On the Simulation: Role Level, Step 1 (Define Analysis Criteria) screen, enter the data from the table. c) Choose Next. d) On the Simulation: Role Level, Step 2 (Define Simulation Criteria) screen, choose Run in Foreground. e) On the Risk Analysis: Role Level, Step 3 (Confirmation) screen, view the results for each type of risk analysis. For a more detailed look, in the Format field, choose Detail f) Remain on this screen for the next step. 2. Simulate what happens when you exclude the value MIRO from the Composite role. a) On the Risk Analysis: Role Level, Step 3 (Confirmation) screen, choose Previous. b) On the Risk Analysis: Role Level, Step 2 (Define Simulation Criteria) screen, choose the Actions tab, then choose Add. c) In the table, in the System field, choose ZMGCLNT800-ECC ERP. d) In the Action From field, enter MIRO. e) In the Actions field, choose Exclude from the drop-down list. f) Choose Run in Foreground. g) On the Risk Analysis: Role Level, Step 3 (Confirmation) screen, view the results for each type of risk analysis. For a more detailed look, in the Format field, choose Detail. By excluding the value MIRO, you will no longer see the ##R2 SoD violation between ME21N and MIRO. h) Remain on this screen for the next step. 3. Simulate what happens when you exclude the technical role Z:RISK_002. a) On the Risk Analysis: Role Level, Step 3 (Confirmation) screen, choose Previous. b) Select the Actions tab, select the entry for MIRO. Choose Remove. c) Select the Roles tab and choose Add. d) In the table, in the Role Type column, select Technical Role. e) In the System field, choose ZMGCLNT800-ECC ERP. f) in the Role From field enter Z:RISK_00R2. g) In the Actions field, choose Exclude from the drop-down list. h) Choose Run in Foreground. i) On the Risk Analysis: Role Level, Step 3 (Confirmation) screen, view the results for each type of risk analysis. For a more detailed look, in the Format field, choose Detail After excluding the role Z:RISK_00R2, there are no longer see the ##R2 SoD violation. j) Remain on this screen for the next step. © Copyright. All rights reserved. 28 Solution 4: Perform Risk Analysis, Remediation, and Mitigation 4. Simulate what happens when you add a transaction to the composite role. a) On the Risk Analysis: Role Level, Step 3 (Confirmation) screen, choose Previous. b) On the Roles tab, select any remaining entries, and choose Remove. c) Select the Actions tab and choose Add. d) In the table, in the System column, choose ZMGCLNT800-ECC ERP. e) In the Action From column enter SM30. f) In the Actions column, choose Include from the drop-down list. g) Choose Run in Foreground. h) On the Risk Analysis: Role Level, Step 3 (Confirmation) screen, in the Type drop-down menu, choose Critical Action. i) In the Result table, deselect all entries in the Results table. After adding SM30, you will see a critical action violation. Note that the line is shaded in a color. This indicates that this risk is due to the simulation that you just performed. j) Close the Simulation: Role Level, Step 3 (Confirmation) browser tab, and return to the SAP Fiori Launchpad home page. Task 3: Create a Mitigating Control 1. Create a Mitigating Control to mitigate one of your risks. Tab Field Value Mitigating Control ID GRCMCT## Name Group ## Mitigating Control Organization ##-Finance Process Group ## Business Process 1 Subprocess Group ## Subprocess 1 Risk ID ##R1 and P001 Rule ID * General Access Risks Owners Name ● ● © Copyright. All rights reserved. Group ## AC Mitigation Monitor Training ID (ACMITMON##) Group ## AC Mitigation Approver 29 Unit 5: Risk Analysis Tab Field Value Training ID (ACMITAPP##) ● Assignment Type ● ● ● Training GRC300-## (GRC300-##) Assignment Type for Group ## AC Mitigation Approver Training ID: Approver Assignment Type for Group ## AC Mitigation Monitor Training ID: Monitor Assignment Type for Training GRC300-## ID: Monitor a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Mitigating Controls. b) On the AC Mitigating Control screen, in the Mitigating Controls table, choose Create. c) In the Control dialog box, choose the General tab. Enter the data from the table for the General tab. d) Select the Access Risks tab. e) On the Access Risks tab, choose Add Row twice. f) Enter the data from the table for the Access Risks tab. g) Choose Enter. h) Select the Owners tab. i) On the Owners tab, choose Add Row. j) Enter the data from the table for the Owners tab. k) Choose Add as needed for each AC Owner. l) Choose Save. If an warning message appears, chose Save again. m) Choose Cancel to return to the AC Mitigating Control screen. n) Close the browser window to return to the SAP Fiori Launchpad home page. 2. Assign the new mitigating control to the risk identified earlier in this exercise. Use saved variant ##_USER_01. a) On the SAP Fiori Launchpad home page, in the ARA Monitoring & Analysis tile group, choose User Level Risk Analysis. © Copyright. All rights reserved. 30 Solution 4: Perform Risk Analysis, Remediation, and Mitigation b) On the Risk Analysis: User Level screen, in the Saved Variants drop-down menu, choose ##_USER_01. c) In the Additional Criteria section, select Include Mitigated Risks if not already selected. d) Choose Run in Foreground. e) On the Multiple Selection dialog box, in the Result table, select a row with access risk ##R1. Hint: The risk analysis type needs to be Permission Level. f) Choose Mitigate Risk. g) Review data on the screen. The Control ID field should be populated with your Mitigating Control information created earlier. In the Monitor field, choose Search and choose GRC300-##. Note: If the Control ID column is blank, then your mitigation control is not configured correctly. Go back to the beginning of this exercise and verify that all information has been entered correctly. h) On the Mitigation dialog box, choose Save. The risk should not show a Control and Monitor in the Result area. i) Choose OK. j) Remain on this screen for the next step. 3. Run a risk analysis including mitigated risks. a) On the Risk Analysis: User Level screen, choose Run in Foreground. b) On the Multiple Selection dialog box, verify that risk ##R1 has been mitigated by noting that the Control and the Monitor appears for risk ##R1 for the user ##_USER_01. c) Choose OK. d) e) Remain on this screen for the next step. 4. Run the risk analysis excluding mitigated risks. a) On the Risk Analysis: User Level screen, deselect Include Mitigated Risks. b) Choose Run in Foreground. c) On the Multiple Selection dialog box, view the results. Note that ##_USER_01 now shows as having No Violations. d) Choose OK. e) Close the browser window to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 31 Unit 5 Exercise 5 Review Parameter Settings for Analyze and Manage Risk (Optional) Business Example You are a system administrator. You have been asked to review configuration settings for Analyze and Manage Risk functionality. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. Note: Do not make any changes in this configuration unless directed to. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. 2. List the settings that are set and their values for Parameter Group 1 - Change Log: ● 1001 - Enable Function Change Log ● 1002 - Enable Risk Change Log ● 1003 - Enable Organization Rule Log ● 1004 - Enable Supplementary Rule Log ● 1005 - Enable Critical Role Log ● 1006 - Enable Critical Profile Log ● 1007 - Enable Rule Set Change Log 3. List the settings that are set and their values for Parameter Group 2 - Mitigation: ● 1011 - Default expiration time for mitigating control assignments (in days) ● 1012 - Consider Rule Id also for mitigation assignment ● 1013 - Consider System for mitigation assignment ● 1014 - Enable separate authorization check for Mitigation from Access Request ● 1015 - Enable Invalid Mitigation Report from management summary © Copyright. All rights reserved. 32 Exercise 5: Review Parameter Settings for Analyze and Manage Risk (Optional) ● 1016 - Specify number of days to exclude from Invalid Mitigation Cleanup 4. List the settings that are set and their values for Parameter Group 3 - Risk Analysis: ● 1021 - Consider Org Rules for other applications ● 1022 - Connector for which Object Ids may be maintained case sensitive ● 1023 - Default report type for risk analysis ● 1024 - Default risk level for risk analysis ● 1025 - Default rule set for risk analysis ● 1026 - Default user type for risk analysis ● 1027 - Enable Offline Risk Analysis ● 1028 -Include Expired Users ● 1029 - Include Locked Users ● 1030 -Include Mitigated Risks ● 1031 - Ignore Critical Roles & Profiles ● 1032 - Include Reference user when doing user analysis ● 1033 - Include Role/Profile Mitigating Controls in Risk Analysis ● 1034 - Max number of objects in a package for parallel processing ● 1035 - Send email notification to the monitor of the updated mitigated object ● 1036 - Show All Objects in Risk Analysis ● 1037 - Use SoD Supplementary Table for Analysis ● 1038 - Consider FF Assignments in Risk Analysis ● 1039 - Include Role assignment for Risk Analysis ● 1046 - Extended objects enabled connector ● 1048 - Business View for Risk Analysis is enabled ● 1050 - Default Report View for Risk Analysis 5. List the settings that are set and their values for Parameter Group 4 - Risk Analysis Spool: ● 1051 - Max number of objects in a file or database record ● 1052 - Spool File Location ● 1053 - Spool Type Workflow ● 1054 - Max number of violations supported in Organizational Rule Analysis 6. List the settings that are set and their values for Parameter Group 5 - Workflow relevant for risk analysis functionality: © Copyright. All rights reserved. 33 Unit 5: Risk Analysis ● 1061 - Mitigating Control Maintenance ● 1062 - Mitigation Assignment ● 1063 - Risk Maintenance ● 1064 - Function Maintenance ● 1101 - Create Request for Risk Approval ● 1102 - Change Request for Risk Approval ● 1103 - Delete Request for Risk Approval ● 1104 - Create Request for Function Approval ● 1105 - Change Request for Function Approval ● 1106 - Delete Request for Function Approval ● 1107 - Create Request for Mitigation Assignment Approval ● 1108 - Change Request for Mitigation Assignment Approval ● 1109 - Delete Request for Mitigation Assignment Approval ● 1110 - Default workflow request priority for Updating and Creating Risks ● 1111 - Default workflow request priority for Creating and Updating Functions ● 1112 - Default workflow request priority for Mitigation Control Assignments 7. List the settings that are set and their values for Parameter Group 8 - Performance: ● 1120 - Batch size for Batch Risk Analysis ● 1121 - Batch size for User sync ● 1122 - Batch size for Role sync ● 1123 - Batch size for Profile sync ● 1124 - Batch size for Authorization Synchronization ● 1125 - Pre-Aggregate Access Risk Information ● 1126 - Number of background jobs created for one Ad hoc Risk Analysis job ● ● 1127 - Minimum number of objects for splitting into multiple background jobs in Ad hoc Risk Analysis 2060 - Organization Rules Maximum allowed in Foreground 8. List which settings are set and their values for Parameter Group 11 Risk Analysis - Risk Terminator: ● 1080 - Connector Enabled for Risk Terminator ● 1081 - Enable Risk Terminator for PFCG Role Generation © Copyright. All rights reserved. 34 Exercise 5: Review Parameter Settings for Analyze and Manage Risk (Optional) ● 1082 - Enable Risk Terminator for PFCG User Assignment ● 1083 - Enable Risk Terminator for SU01 Role Assignment ● 1084 - Enable Risk Terminator for SU10 Multiple User Assignment ● 1085 - Stop Role Generation if Violations Exist ● 1086- Comments Are Required in Case of Violations ● 1087 - Send Notification in Case of Violations ● 1088 - Default Report Type for Risk Terminator 9. List which settings are set and their values for Parameter Group 21 Management Dashboard Reports: ● 1047 - Default Management Report Violation Count ● 1049 - Default Management Report Risk Type 10. Exit the Configuration Settings screen. 11. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. 12. List the settings that are set and their values for the ZMG system: ● 1000 - Please maintain Plug-in Connector ● 1001 - Please maintain GRC Connector ● 1002 - Please maintain Ruleset ● 1003 - Enable HR Trigger ● 1004 - User Lock Type to be excluded in Repository Sync ● 1081 - Enable Risk Terminator for PFCG Role Generation ● 1082 - Enable Risk Terminator for PFCG User Assignment ● 1083 - Enable Risk Terminator for SU01 Role Assignment ● 1084 - Enable Risk Terminator for SU10 multiple User Assignment ● 1085 - Stop role generation if violation exists ● 1086 - Comments are required in case of violations ● 1087 - Send Notification in case of violations ● 1088 - Default report type for Risk Terminator 13. In the command field, enter /nEX to log off from this system. 14. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. 15. List the settings that are set and their values for the T41 system: © Copyright. All rights reserved. 35 Unit 5: Risk Analysis ● 1000 - Please maintain Plug-in Connector ● 1001 - Please maintain GRC Connector ● 1002 - Please maintain Ruleset ● 1003 - Enable HR Trigger ● 1004 - User Lock Type to be excluded in Repository Sync ● 1081 - Enable Risk Terminator for PFCG Role Generation ● 1082 - Enable Risk Terminator for PFCG User Assignment ● 1083 - Enable Risk Terminator for SU01 Role Assignment ● 1084 - Enable Risk Terminator for SU10 multiple User Assignment ● 1085 - Stop role generation if violation exists ● 1086 - Comments are required in case of violations ● 1087 - Send Notification in case of violations ● 1088 - Default report type for Risk Terminator 16. In the command field, enter /nEX to log off from this system. © Copyright. All rights reserved. 36 Unit 5 Solution 5 Review Parameter Settings for Analyze and Manage Risk (Optional) Business Example You are a system administrator. You have been asked to review configuration settings for Analyze and Manage Risk functionality. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. Note: Do not make any changes in this configuration unless directed to. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. a) Log on to the main GRC system TGT ABAP client with user ID GRC300–##. b) Execute transaction /nSPRO, then choose SAP Reference IMG . c) Choose Governance, Risk and Compliance → Access Control → Maintain Configuration Settings. The AC Configuration Settings screen is displayed. These are the parameters that are configured for this particular instance of SAP Access Control. Remember, that some parameters do have a coded default in the GRACCONFIG table. If a parameter is not entered here, then the default will be applied. 2. List the settings that are set and their values for Parameter Group 1 - Change Log: ● 1001 - Enable Function Change Log ● 1002 - Enable Risk Change Log ● 1003 - Enable Organization Rule Log ● 1004 - Enable Supplementary Rule Log ● 1005 - Enable Critical Role Log ● 1006 - Enable Critical Profile Log ● 1007 - Enable Rule Set Change Log a) 1001 - 1007: YES © Copyright. All rights reserved. 37 Unit 5: Risk Analysis 3. List the settings that are set and their values for Parameter Group 2 - Mitigation: ● 1011 - Default expiration time for mitigating control assignments (in days) ● 1012 - Consider Rule Id also for mitigation assignment ● 1013 - Consider System for mitigation assignment ● 1014 - Enable separate authorization check for Mitigation from Access Request ● 1015 - Enable Invalid Mitigation Report from management summary ● 1016 - Specify number of days to exclude from Invalid Mitigation Cleanup a) 1011: 365 b) 1012: NO c) 1013: NO d) 1014: YES e) 1015: NO f) 1016: 0 4. List the settings that are set and their values for Parameter Group 3 - Risk Analysis: ● 1021 - Consider Org Rules for other applications ● 1022 - Connector for which Object Ids may be maintained case sensitive ● 1023 - Default report type for risk analysis ● 1024 - Default risk level for risk analysis ● 1025 - Default rule set for risk analysis ● 1026 - Default user type for risk analysis ● 1027 - Enable Offline Risk Analysis ● 1028 -Include Expired Users ● 1029 - Include Locked Users ● 1030 -Include Mitigated Risks ● 1031 - Ignore Critical Roles & Profiles ● 1032 - Include Reference user when doing user analysis ● 1033 - Include Role/Profile Mitigating Controls in Risk Analysis ● 1034 - Max number of objects in a package for parallel processing ● 1035 - Send email notification to the monitor of the updated mitigated object ● 1036 - Show All Objects in Risk Analysis © Copyright. All rights reserved. 38 Solution 5: Review Parameter Settings for Analyze and Manage Risk (Optional) ● 1037 - Use SoD Supplementary Table for Analysis ● 1038 - Consider FF Assignments in Risk Analysis ● 1039 - Include Role assignment for Risk Analysis ● 1046 - Extended objects enabled connector ● 1048 - Business View for Risk Analysis is enabled ● 1050 - Default Report View for Risk Analysis a) 1021: NO b) 1022: SAP_S4A_LG c) 1023: 02 (Permission Level), 03 (Critical Action) d) 1024: * (ALL) e) 1025: GLOBAL f) 1026: A (Dialog) g) 1027 - 1031: YES h) 1032-1033: NO i) 1034: 100 j) 1035 - 1038: NO k) 1039: 02 (Future Dated) l) 1046: SAP_S4A_LG m) 1048: YES n) 1050: 1 (Technical View) 5. List the settings that are set and their values for Parameter Group 4 - Risk Analysis Spool: ● 1051 - Max number of objects in a file or database record ● 1052 - Spool File Location ● 1053 - Spool Type Workflow ● 1054 - Max number of violations supported in Organizational Rule Analysis a) 1051: 200000 b) 1052 - (not defined) c) 1053: D (Database) d) 1054: 500000 6. List the settings that are set and their values for Parameter Group 5 - Workflow relevant for risk analysis functionality: © Copyright. All rights reserved. 39 Unit 5: Risk Analysis ● 1061 - Mitigating Control Maintenance ● 1062 - Mitigation Assignment ● 1063 - Risk Maintenance ● 1064 - Function Maintenance ● 1101 - Create Request for Risk Approval ● 1102 - Change Request for Risk Approval ● 1103 - Delete Request for Risk Approval ● 1104 - Create Request for Function Approval ● 1105 - Change Request for Function Approval ● 1106 - Delete Request for Function Approval ● 1107 - Create Request for Mitigation Assignment Approval ● 1108 - Change Request for Mitigation Assignment Approval ● 1109 - Delete Request for Mitigation Assignment Approval ● 1110 - Default workflow request priority for Updating and Creating Risks ● 1111 - Default workflow request priority for Creating and Updating Functions ● 1112 - Default workflow request priority for Mitigation Control Assignments a) 1061–1064: NO b) 1101 - 1112: (not defined) 7. List the settings that are set and their values for Parameter Group 8 - Performance: ● 1120 - Batch size for Batch Risk Analysis ● 1121 - Batch size for User sync ● 1122 - Batch size for Role sync ● 1123 - Batch size for Profile sync ● 1124 - Batch size for Authorization Synchronization ● 1125 - Pre-Aggregate Access Risk Information ● 1126 - Number of background jobs created for one Ad hoc Risk Analysis job ● ● 1127 - Minimum number of objects for splitting into multiple background jobs in Ad hoc Risk Analysis 2060 - Organization Rules Maximum allowed in Foreground a) 1120-1124: 1000 b) 1125: YES © Copyright. All rights reserved. 40 Solution 5: Review Parameter Settings for Analyze and Manage Risk (Optional) c) 1126: 2 d) 1127: 1000 e) 2060: 50000 8. List which settings are set and their values for Parameter Group 11 Risk Analysis - Risk Terminator: ● 1080 - Connector Enabled for Risk Terminator ● 1081 - Enable Risk Terminator for PFCG Role Generation ● 1082 - Enable Risk Terminator for PFCG User Assignment ● 1083 - Enable Risk Terminator for SU01 Role Assignment ● 1084 - Enable Risk Terminator for SU10 Multiple User Assignment ● 1085 - Stop Role Generation if Violations Exist ● 1086- Comments Are Required in Case of Violations ● 1087 - Send Notification in Case of Violations ● 1088 - Default Report Type for Risk Terminator a) 1080: (not defined) b) 1081-1087: NO c) 1088: (not defined) 9. List which settings are set and their values for Parameter Group 21 Management Dashboard Reports: ● 1047 - Default Management Report Violation Count ● 1049 - Default Management Report Risk Type a) 1047 - P (Permission) b) 1049 - * (All) 10. Exit the Configuration Settings screen. a) Choose Back to return to the Display IMG screen. 11. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. a) Log on to the target system ZMG ABAP client with user ID GRC300–##. b) Execute transaction /nSPRO, then choose SAP Reference IMG . c) Choose Governance, Risk and Compliance (Plug-In) → Access Control → Maintain Plug-In Configuration Settings. The Change View "For System Details": Overview screen is displayed. 12. List the settings that are set and their values for the ZMG system: © Copyright. All rights reserved. 41 Unit 5: Risk Analysis ● 1000 - Please maintain Plug-in Connector ● 1001 - Please maintain GRC Connector ● 1002 - Please maintain Ruleset ● 1003 - Enable HR Trigger ● 1004 - User Lock Type to be excluded in Repository Sync ● 1081 - Enable Risk Terminator for PFCG Role Generation ● 1082 - Enable Risk Terminator for PFCG User Assignment ● 1083 - Enable Risk Terminator for SU01 Role Assignment ● 1084 - Enable Risk Terminator for SU10 multiple User Assignment ● 1085 - Stop role generation if violation exists ● 1086 - Comments are required in case of violations ● 1087 - Send Notification in case of violations ● 1088 - Default report type for Risk Terminator a) 1000: ZMGCLNT800 b) 1001: TGTCLNT001 c) 1002: GLOBAL d) 1003 - 1004: (not defined) e) 1081: (not defined) f) 1082 - 1084: NO g) 1085 - 1088: (not defined) 13. In the command field, enter /nEX to log off from this system. 14. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. a) Log on to the target system T41 ABAP client with user ID GRC300–##. b) Execute transaction /nSPRO, then choose SAP Reference IMG . c) Choose Governance, Risk and Compliance (Plug-In) → Access Control → Maintain Plug-In Configuration Settings. The Change View "For System Details": Overview screen is displayed. 15. List the settings that are set and their values for the T41 system: ● 1000 - Please maintain Plug-in Connector ● 1001 - Please maintain GRC Connector ● 1002 - Please maintain Ruleset © Copyright. All rights reserved. 42 Solution 5: Review Parameter Settings for Analyze and Manage Risk (Optional) ● 1003 - Enable HR Trigger ● 1004 - User Lock Type to be excluded in Repository Sync ● 1081 - Enable Risk Terminator for PFCG Role Generation ● 1082 - Enable Risk Terminator for PFCG User Assignment ● 1083 - Enable Risk Terminator for SU01 Role Assignment ● 1084 - Enable Risk Terminator for SU10 multiple User Assignment ● 1085 - Stop role generation if violation exists ● 1086 - Comments are required in case of violations ● 1087 - Send Notification in case of violations ● 1088 - Default report type for Risk Terminator a) 1000: T41CLNT400 b) 1001: TGTCLNT001 c) 1002: GLOBAL d) 1003 - 1004: (not defined) e) 1081 - 1088: (not defined) 16. In the command field, enter /nEX to log off from this system. © Copyright. All rights reserved. 43 Unit 6 Exercise 6 Create a BRFplus Initiator Rule Business Example You are an SAP Access Control administrator. You have been asked to set up the Access Request Management system so that all user requests for access are reviewed for SoD violations before access is granted as provided by the Access Request Design team. In this exercise, you will build the Initiator Rule that will be needed for this design and incorporate your new BRF+ rule into the MSMP Process ID configuration. During the access request design process, the conditions for access requests have been decided. The request attributes that will initiate the workflow are the Request Type (from the request header area) and the Connector (from the line items area). The Request Types that are relevant for your system are: ● New Account (001) ● Change Account (002) ● Lock Account (004) ● Unlock Account (005) ● Superuser Access Request (006) The Connectors that are relevant are: ● ZMGCLNT800 ● T41CLNT400 The types of requests expected and the processors are: ● ● ● ● ● For Request Types New Account (001) and Change Account (002) and the Connector ZMGCLNT800, these requests are to be processed by the North American (NA) team. For Request Types New Account (001) and Change Account (002) and the Connector T41CLNT400, these requests are to be processed by the European/Asia Pacific(EUAP) team. For Request Types Delete Account (003), Lock Account (004) and Unlock Account (005) and ANY connector, these requests will be processed by the Security team in a LOCK path. For Request Type Superuser Access Request (006), these request will be processed by the Firefight ID Owner in an EAM (Emergency Access Management) path. Also, do not forget to include a rule line that will include all possibilities as per the recommendations stated previously. These need to be processed by the Security Team. The details for the actual stages of the workflow will be discussed in a subsequent exercise and are not needed at this time. Below is the workflow diagram that the Design Team provided. © Copyright. All rights reserved. 44 Exercise 6: Create a BRFplus Initiator Rule Figure 1: MSMP Workflow Design Note: In this exercise, when values include ##, replace the character with the participant number your instructor assigned to you. Note: This exercise is dependent upon the previous exercise Maintain Master Data and Access Control Owners where the Business Processes and Subprocess were created. 1. Create a BRFplus application with the name Z##_INITIATOR_RULE. Field Value Name Z##_INITIATOR_RULE Short Text Z##_INITIATOR_RULE Development Package ZGRAC (Hint — Use Search) 2. Create a BRFplus Initiator Rule for the SAP_GRAC_ACCESS_REQUEST Process ID. Run transaction GRFNMW_DEV_RULES and enter the following values: Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Initiator Rule Rule ID Z##_INITIATOR_RULE Application/Func. Group Name Z##_INITIATOR_RULE © Copyright. All rights reserved. 45 Unit 6: SAP Business Rule Framework (BRFplus) Field Value Rule Type BRFplus Flat Rule (LineItem by LineItem) Override BRF+ Application Text Access Request Initiator Rule App Override BRF+ Function Text Access Request Initiator Rule Function 3. Choose the table generation options Header (BRF + Flat rule) and Item (BRF + Flat rule) and choose the following attributes: Table 2: Option Field Name Field Description Header (BRF+ Flat rule) REQTYPE Request Type Item (BRF+ Flat rule) CONNECTOR Application or Connector 4. Configure the decision table logic for your Initiator Rule. 5. Configure the decision table with the following decision criteria: Request Type Connector Line Item Key (use Search) Trigger Value (RULE_RESULT) 001 (New Account) ZMGCLNT800 (ZMGCLNT800 ECC ERP) ITEMNUM AR_NA_PATH 002 (Change Account) ZMGCLNT800 (ZMGCLNT800 ECC ERP) ITEMNUM AR_NA_PATH 001 (New Account) or 002 (Change Account) T41CLNT400 (T41CLNT400 — S4HANA ERP) ITEMNUM AR_EUAP_PATH 003 (Delete Account) Leave open for any value ITEMNUM AR_LOCK_PATH 004 (Lock Account) Leave open for any value ITEMNUM AR_LOCK_PATH 005 (Unlock Account) Leave open for any value ITEMNUM AR_LOCK_PATH 006 (Emergency Ac- Leave open for any value cess) ITEMNUM AR_EAM_PATH Leave open for any value ITEMNUM AR_NOINIT_PATH Leave open for any value 6. Using the simulation functionality, test your Initiator Rule and make sure it functions as designed using the data in the following table. © Copyright. All rights reserved. 46 Exercise 6: Create a BRFplus Initiator Rule Request Type Connector Trigger Value (RULE_RESULT) 001 ZMGCLNT800 AR_NA_PATH 002 ZMGCLNT800 AR_NA_PATH 001 T41CLNT400 AR_EUAP_PATH 002 Blank AR_NOINIT_PATH 004 Blank AR_LOCK_PATH 004 ZMGCLNT800 AR_LOCK_PATH 005 Blank AR_LOCK_PATH 006 Blank AR_EAM_PATH 006 ZMGCLNT800 AR_EAM_PATH 003 Blank AR_LOCK_PATH 7. Find the object number of your BRFplus function and make a note of it. My BRFplus function object number is: © Copyright. All rights reserved. 47 Unit 6 Solution 6 Create a BRFplus Initiator Rule Business Example You are an SAP Access Control administrator. You have been asked to set up the Access Request Management system so that all user requests for access are reviewed for SoD violations before access is granted as provided by the Access Request Design team. In this exercise, you will build the Initiator Rule that will be needed for this design and incorporate your new BRF+ rule into the MSMP Process ID configuration. During the access request design process, the conditions for access requests have been decided. The request attributes that will initiate the workflow are the Request Type (from the request header area) and the Connector (from the line items area). The Request Types that are relevant for your system are: ● New Account (001) ● Change Account (002) ● Lock Account (004) ● Unlock Account (005) ● Superuser Access Request (006) The Connectors that are relevant are: ● ZMGCLNT800 ● T41CLNT400 The types of requests expected and the processors are: ● ● ● ● ● For Request Types New Account (001) and Change Account (002) and the Connector ZMGCLNT800, these requests are to be processed by the North American (NA) team. For Request Types New Account (001) and Change Account (002) and the Connector T41CLNT400, these requests are to be processed by the European/Asia Pacific(EUAP) team. For Request Types Delete Account (003), Lock Account (004) and Unlock Account (005) and ANY connector, these requests will be processed by the Security team in a LOCK path. For Request Type Superuser Access Request (006), these request will be processed by the Firefight ID Owner in an EAM (Emergency Access Management) path. Also, do not forget to include a rule line that will include all possibilities as per the recommendations stated previously. These need to be processed by the Security Team. The details for the actual stages of the workflow will be discussed in a subsequent exercise and are not needed at this time. Below is the workflow diagram that the Design Team provided. © Copyright. All rights reserved. 48 Solution 6: Create a BRFplus Initiator Rule Figure 1: MSMP Workflow Design Note: In this exercise, when values include ##, replace the character with the participant number your instructor assigned to you. Note: This exercise is dependent upon the previous exercise Maintain Master Data and Access Control Owners where the Business Processes and Subprocess were created. 1. Create a BRFplus application with the name Z##_INITIATOR_RULE. Field Value Name Z##_INITIATOR_RULE Short Text Z##_INITIATOR_RULE Development Package ZGRAC (Hint — Use Search) a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-##, access the BRFplus application by executing transaction /nBRF+. b) On the Business Rule Framework plus screen, choose Create Application. c) In the Create Application dialog box, enter the data from the table. Do not change any other fields. d) Choose Create And Navigate To Object. © Copyright. All rights reserved. 49 Unit 6: SAP Business Rule Framework (BRFplus) e) In the left navigation panel, select the new application created. Choose Save, then Activate. Result: In the Navigation panel, you will now see the status of the application as Active (shown as a green square). f) Close the BRFplus Workbench window. 2. Create a BRFplus Initiator Rule for the SAP_GRAC_ACCESS_REQUEST Process ID. Run transaction GRFNMW_DEV_RULES and enter the following values: Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Initiator Rule Rule ID Z##_INITIATOR_RULE Application/Func. Group Name Z##_INITIATOR_RULE Rule Type BRFplus Flat Rule (LineItem by LineItem) Override BRF+ Application Text Access Request Initiator Rule App Override BRF+ Function Text Access Request Initiator Rule Function a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-## screen,in the command field, enter /nGRFNMW_DEV_RULES. b) Choose Enter. c) On the Generate MSMP Rule for Process screen, enter the data from the table. d) Choose Enter. Caution: Do note choose Execute. e) Remain on this screen for the next step. 3. Choose the table generation options Header (BRF + Flat rule) and Item (BRF + Flat rule) and choose the following attributes: Table 2: Option Field Name Field Description Header (BRF+ Flat rule) REQTYPE Request Type Item (BRF+ Flat rule) CONNECTOR Application or Connector a) On the Generate MSMP Rule for Process screen, select the Header (BRF+ Flat rule) checkbox. © Copyright. All rights reserved. 50 Solution 6: Create a BRFplus Initiator Rule b) On the Header (BRF+ Flat rule) screen, select the header attributes from the table. c) Choose Enter. d) On the Generate MSMP Rule for Process screen, select the Item (BRF+ Flat rule) checkbox. e) On the Item (BRF+ Flat rule) screen, select the header attributes from the table. f) Choose Enter. g) On the Generate MSMP Rule for Process screen, choose Execute. h) On the Display Logs screen, check the log for errors. Note: A warning message will appear stating that Name Z##_INITIATOR_RULE has already been used. This is expected since this was created in a previous step. If you find errors in your log, ask your instructor for assistance. i) Choose Back until you return to the SAP Easy Access — User Menu for Training GRC300-## screen. 4. Configure the decision table logic for your Initiator Rule. a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-## screen, in the command field, enter /nBRF+. b) Choose Enter. c) On the Business Rule Framework plus screen, in the Show drop-down menu, choose My Applications. d) On the Business Rule Framework plus screen, in the My Applications navigation panel, choose Z##_INITIATOR_RULE → Expression → Decision Table → Z##_INITIATOR_RULE - Decision Table. e) Remain on this screen for the next step. 5. Configure the decision table with the following decision criteria: Request Type Connector Line Item Key (use Search) Trigger Value (RULE_RESULT) 001 (New Account) ZMGCLNT800 (ZMGCLNT800 ECC ERP) ITEMNUM AR_NA_PATH 002 (Change Account) ZMGCLNT800 (ZMGCLNT800 ECC ERP) ITEMNUM AR_NA_PATH 001 (New Account) or 002 (Change Account) T41CLNT400 (T41CLNT400 — S4HANA ERP) ITEMNUM AR_EUAP_PATH © Copyright. All rights reserved. 51 Unit 6: SAP Business Rule Framework (BRFplus) Request Type Connector Line Item Key (use Search) Trigger Value (RULE_RESULT) 003 (Delete Account) Leave open for any value ITEMNUM AR_LOCK_PATH 004 (Lock Account) Leave open for any value ITEMNUM AR_LOCK_PATH 005 (Unlock Account) Leave open for any value ITEMNUM AR_LOCK_PATH 006 (Emergency Ac- Leave open for any value cess) ITEMNUM AR_EAM_PATH Leave open for any value ITEMNUM AR_NOINIT_PATH Leave open for any value a) On the Business Rule Framework plus screen, verify that you are in Edit Mode. If not in Edit Mode, choose Edit in the top menu bar. b) In the Table Contents section, choose (Insert New Row). Note: When editing a row, you can either choose the drop-down icon in the field, or you can use the Row Editor to edit all fields in a row in one screen. To open the Row Editor, select the row, and choose Row Editor from the Table Contents menu. c) In theRequest Type column, in the drop-down menu, choose Direct Value Input, or in the Row Editor, choose Direct Value Input. Note: Use the correct Boolean value to achieve the required results. For example, if the condition is to apply to request type 001. use value "is equal to". You can modify the Boolean value by using the drop-down list. For example, "is between" or "is not equal to". Note: Remember, this is a Initiator rule type, you must consider the order of the condition lines. HINT: The table above indicates the correct order. d) In the Request Type field, choose the appropriate Boolean value in the first box using the drop-down list. e) In the Request Type field, enter request type ID (001), or use search to choose from the request type list in the second box. © Copyright. All rights reserved. 52 Solution 6: Create a BRFplus Initiator Rule f) If multiple entries are needed, choose Change after the second box, and choose Insert Include Condition to add additional entries. g) If editing directly in the field, choose OK to save and configure next field. If using Row Editor, complete this process for each field except for Line Item. h) In the Line Item Key column, from the drop-down menu, choose Context → More. If using the Row Editor, choose Other operations → Select Context Parameter. i) In the Context Query dialog box, in the Search Criteria section, in the Name row, in the third column, enter ITEMNUM. j) Choose Search. k) In the Result List, select ITEMNUM. Hint: If you did not change your profile to the EXPERT mode, this may be listed as Line Item Key. l) Repeat steps d - k for the remaining table entries. m) Choose Save. n) Choose Check. o) Choose Activate, then choose Yes. p) Remain on this screen for the next step. 6. Using the simulation functionality, test your Initiator Rule and make sure it functions as designed using the data in the following table. Request Type Connector Trigger Value (RULE_RESULT) 001 ZMGCLNT800 AR_NA_PATH 002 ZMGCLNT800 AR_NA_PATH 001 T41CLNT400 AR_EUAP_PATH 002 Blank AR_NOINIT_PATH 004 Blank AR_LOCK_PATH 004 ZMGCLNT800 AR_LOCK_PATH 005 Blank AR_LOCK_PATH 006 Blank AR_EAM_PATH 006 ZMGCLNT800 AR_EAM_PATH 003 Blank AR_LOCK_PATH a) On the Business Rule Framework plus screen, in the Detail section, choose Start Simulation. © Copyright. All rights reserved. 53 Unit 6: SAP Business Rule Framework (BRFplus) b) On the Business Rule Framework plus — Simulation screen, choose Continue. c) On the next screen, enter the data from the table. d) Choose Execute. Note: You can also choose Execute and Display Processing Steps as this will display the Simulation Results and the Processing Logic. This can be a troubleshooting tool when you do not get the expected results. e) On the next screen, verify that the result matches the Trigger Value column in the table at the beginning of this task. f) Choose Back to Simulation. g) Repeat steps c - e to complete the simulation for the remaining rules. h) Choose Back to Workbench. i) In the My Applications navigation panel, choose Z##_INITIATOR_RULE → Function → Z##_INITATOR_RULE - Function j) Choose Save. k) Choose Check. Note: Warning will appear, this is expected for this scenario. l) Choose Activate, then choose Yes. m) In the My Applications navigation panel, choose Z##_INITATOR_RULE - Application. n) Choose Save. o) Choose Check. p) Choose Activate. q) Remain on this screen for the next step. 7. Find the object number of your BRFplus function and make a note of it. My BRFplus function object number is: a) On the Business Rule Framework plus screen, in the My Application navigation panel, choose Z##_INITIATOR_RULE → Function → Z##_INITATOR_RULE - Function. b) In the General section, at the end of the line, choose © Copyright. All rights reserved. (Expand Tray). 54 Solution 6: Create a BRFplus Initiator Rule c) In the ID field, find your BRFplus object number and note it in the space provided. d) Remain on this screen for the next exercise. © Copyright. All rights reserved. 55 Unit 6 Exercise 7 Create BRFplus Agent and Routing Rules Business Example You are an SAP Access Control administrator. You have been asked to create a custom approver determinator rule and a detour to another path based upon criteria from the security team responsible for Access Request Workflow. To complete this task, you need to create an Agents Rule and a Routing Rule. The design team as decided that a special routing during the European/Asia Pacific (EUAP) path is required based upon the attributes Business Process and Subprocess of the Role requested. If the role requested is assigned ##B1 as the Business Process and ##S1 as the Subprocess, these roles need additional approval. The design team also decided that if during the North American (NA) path, when a user has a Segregation of Duties (SOD) issue then the approver is assigned by the Business Process and Subprocess of the role. If the role is assigned ##B1 as the Business Process, then the SOD needs to be approved by user GRC300–## should be the approver. If any other Business Process assigned to the role, then the SOD needs to be approved by user GRC300–99. As a refresher, below is the MSMP Workflow Design from the Access Request Design Team. Figure 2: MSMP Workflow Design Note: This exercise uses the Business Process and Subprocess data created previously in the exercise Maintain Master Data and the data assigned in the exercise Access Control Owners. © Copyright. All rights reserved. 56 Exercise 7: Create BRFplus Agent and Routing Rules Note: In this exercise, when values include ##, replace the character with the participant number your instructor assigned to you. 1. Create BRF+ application Z##_AGENTS_RULE and assign to package to allow transport. Field Value Name Z##_AGENTS_RULE Short Text Z##_AGENTS_RULE Development Package ZGRAC (Hint — Use Search) 2. Create a BRFplus Agents Rule for the SAP_GRAC_ACCESS_REQUEST MSMP Process ID using transaction code GRFNMW_DEV_RULES, and enter the following values: Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Agents Rule Rule ID Z##_AGENTS_RULE Application/Func. Group Name Z##_AGENTS_RULE Rule Type BRFplus Flat Rule (LineItem by LineItem) Override BRF+ Application Text Access Request Agents Rule App Override BRF+ Function Text Access Request Agents Rule Function 3. Choose the table generation options Item (BRF+ Flat rule), and choose the following attributes: Option Field Names Field Description Item (BRF+ Flat rule) BPROC Business Process 4. Configure the decision table logic for your Agents Rule. 5. Configure the decision table with the following decision criteria: Business Process Line Item Key User ID ##B1 (Group ## Business Process 1) ITEMNUM GRC300-## not equal to ##B1 ITEMNUM GRC300-99 6. Using the simulation functionality, test your Agents Rule and make sure it functions as designed using the data in the following table: © Copyright. All rights reserved. 57 Unit 6: SAP Business Rule Framework (BRFplus) Business Process User ID ##B1 GRC300-## FI00 GRC300-99 MM00 GRC300-99 7. Find the object number for your BRFplus function and make note of it. My BRFplus function object number is: 8. Create BRFplus application Z##_ROUTING_RULE and assign to package to allow transport. Field Value Name Z##_ROUTING_RULE Short Text Z##_ROUTING_RULE Development Package ZGRAC (Hint — Use Search) Note: Refer to the Business Example at the beginning of the exercise for details if needed. 9. Create a BRFplus Routing Rule for the SAP_GRAC_ACCESS_REQUEST Process ID. Run transaction /nGRFNMW_DEV_RULES and enter the following values: Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Routing Rule Rule ID Z##_ROUTING_RULE Application/Func. Group Name Z##_ROUTING_RULE Rule Type BRFplus Flat Rule (LineItem by LineItem) Override BRF+ Application Text Access Request Routing Rule App Override BRF+ Function Text Access Request Routing Rule Function 10. Choose the table generation option Item (BRF+ Flat rule), and choose the following attributes: © Copyright. All rights reserved. 58 Exercise 7: Create BRFplus Agent and Routing Rules Option Field Name Field Description Item (BRF+ Flat rule) BPROC Business Process Item (BRF+ Flat rule) BSUBPROC Subprocess 11. Configure the decision table logic for your Routing rule. 12. Configure the decision table with the following decision criteria: Business Process Subprocess Line Item Key Trigger Value (RULE_RESULT) ##B1 ##S1 ITEMNUM SP_ROUTE_PATH 13. Using the simulation functionality, test your Routing Rule and make sure it functions as designed using the data in the following table: Business Process Subprocess Trigger Value (RULE_RESULT) ##B1 ##S1 SP_ROUTE_PATH ##B2 ##S1 No Value Returned BLANK ##S1 No Value Returned ##B1 BLANK No Value Returned 14. Find the object number for your BRFplus function and make note of it. My BRFplus function object number is: © Copyright. All rights reserved. 59 Unit 6 Solution 7 Create BRFplus Agent and Routing Rules Business Example You are an SAP Access Control administrator. You have been asked to create a custom approver determinator rule and a detour to another path based upon criteria from the security team responsible for Access Request Workflow. To complete this task, you need to create an Agents Rule and a Routing Rule. The design team as decided that a special routing during the European/Asia Pacific (EUAP) path is required based upon the attributes Business Process and Subprocess of the Role requested. If the role requested is assigned ##B1 as the Business Process and ##S1 as the Subprocess, these roles need additional approval. The design team also decided that if during the North American (NA) path, when a user has a Segregation of Duties (SOD) issue then the approver is assigned by the Business Process and Subprocess of the role. If the role is assigned ##B1 as the Business Process, then the SOD needs to be approved by user GRC300–## should be the approver. If any other Business Process assigned to the role, then the SOD needs to be approved by user GRC300–99. As a refresher, below is the MSMP Workflow Design from the Access Request Design Team. Figure 2: MSMP Workflow Design Note: This exercise uses the Business Process and Subprocess data created previously in the exercise Maintain Master Data and the data assigned in the exercise Access Control Owners. © Copyright. All rights reserved. 60 Solution 7: Create BRFplus Agent and Routing Rules Note: In this exercise, when values include ##, replace the character with the participant number your instructor assigned to you. 1. Create BRF+ application Z##_AGENTS_RULE and assign to package to allow transport. Field Value Name Z##_AGENTS_RULE Short Text Z##_AGENTS_RULE Development Package ZGRAC (Hint — Use Search) a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-##, access the BRF+ application by executing transaction /nBRFplus. b) Choose Create Application. c) In the Create Application dialog box, enter the data from the table. Do not change any other fields. d) Choose Create And Navigate To Object. e) In the left navigation panel, select the new application created. Choose Save, then Activate. As a result, in the Navigation panel, you will now see the status of the application as Active (shown as a green square) f) Close the BRFplus Workbench window. 2. Create a BRFplus Agents Rule for the SAP_GRAC_ACCESS_REQUEST MSMP Process ID using transaction code GRFNMW_DEV_RULES, and enter the following values: Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Agents Rule Rule ID Z##_AGENTS_RULE Application/Func. Group Name Z##_AGENTS_RULE Rule Type BRFplus Flat Rule (LineItem by LineItem) Override BRF+ Application Text Access Request Agents Rule App Override BRF+ Function Text Access Request Agents Rule Function © Copyright. All rights reserved. 61 Unit 6: SAP Business Rule Framework (BRFplus) a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-## screen, in the command field, enter /nGRFNMW_DEV_RULES. b) Choose Enter. c) On the Generate MSMP Rule for Process screen, enter the data from the table. d) Choose Enter. Note: Do not choose Execute. e) Remain on this screen for the next step 3. Choose the table generation options Item (BRF+ Flat rule), and choose the following attributes: Option Field Names Field Description Item (BRF+ Flat rule) BPROC Business Process a) On the Generate MSMP Rule for Process screen, select the Item (BRF + Flat rule) checkbox. b) On the Generate MSMP Rule for Process screen, select the Item(BRF+ Flat Rule) checkbox. c) On the Item(BRF+ Flat Rule) dialog box, select the item attributes from the table. d) Choose Enter. e) On the Generate MSMP Rule for Process screen, choose Execute. f) On the Display Logs screen, check the log for errors. Note: A warning message will appear stating that Name Z##_AGENTS_RULE has already been used. This is expected since this was created in a previous step. If you find errors in your log, ask your instructor for assistance. g) Choose Back until you return to the SAP Easy Access — User Menu for Training GRC300-## screen. 4. Configure the decision table logic for your Agents Rule. a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-## screen, in the command field, enter /nBRF+. b) Choose Enter. c) On the Business Rule Framework plus screen, in the Show dropdown menu, choose My Applications. © Copyright. All rights reserved. 62 Solution 7: Create BRFplus Agent and Routing Rules d) On the Business Rule Framework plus screen, in the My Applications navigation panel, choose Z##_AGENTS_RULE → Expression → Decision Table → Z##_AGENTS_RULE Decision Table. e) Remain on this screen for the next step. 5. Configure the decision table with the following decision criteria: Business Process Line Item Key User ID ##B1 (Group ## Business Process 1) ITEMNUM GRC300-## not equal to ##B1 ITEMNUM GRC300-99 a) On the Business Rule Framework plus screen, verify that you are in Edit Mode. If not in Edit Mode, choose Edit in the top menu bar. b) In the Table Contents table, choose (Insert New Row). Note: When editing a row, you can either choose the dropdown icon in the field, or you can use the Row Editor to edit all fields in a row in one screen. To open the Row Editor, select the row, and choose Row Editor from the Table Contents menu. c) In the BPROC (Business Process) column, in the dropdown menu, choose Direct Value input or in the Row Editor, choose Direct Value Input. d) In the BPROC (Business Process) field, choose the appropriate Boolean value in the first box using the dropdown list. e) In the BPROC (Business Process) field, enter ##B1, or choose from the Business Process list in the second box. f) If multiple entries are needed, choose Change after the second box. Choose Insert Include Condition to add additional entries. g) If editing directly in the field, choose OK to save and configure the next field. If using the Row Editor, complete this process for each field except for Line Item. h) In the Line Item column, in the dropdown menu, choose Context → More. If using the Row Editor, choose Other operations → Select Context Parameter. i) In the Context Query dialog box, in the Search Criteria section, in the Name row, in the third column, enter ITEMNUM. j) Choose Search. k) In the Result List, select ITEMNUM. l) Repeat steps b - k for the remaining table entries. m) Choose Save. © Copyright. All rights reserved. 63 Unit 6: SAP Business Rule Framework (BRFplus) n) Choose Check. o) Choose Activate, then choose Yes. p) Remain on this screen for the next step. 6. Using the simulation functionality, test your Agents Rule and make sure it functions as designed using the data in the following table: Business Process User ID ##B1 GRC300-## FI00 GRC300-99 MM00 GRC300-99 a) On the Business Rule Framework plus screen, in Detail section, choose Start Simulation. b) On the Business Rule Framework plus — Simulation screen, choose Continue. c) On the next screen, enter the data for the first line from the table from the table. d) Choose Execute. Note: You can also choose Execute and Display Processing Steps as this will display the Simulation Results and the Processing Logic. This can be a troubleshooting tool when you do not get the expected results. e) On the next screen, verify that the result matches the User ID column in the table at the beginning of this task. f) Choose Back to Simulation. g) Repeat the simulation for the remaining rules. h) Choose Back to Workbench. i) In the My Applications navigation panel, choose Z##_AGENTS_RULE → Function → Z##_AGENTS_RULE-Function. j) Choose Save. k) Choose Check. l) Choose Activate, then choose Yes. m) In the My Applications navigation panel, choose Z##_AGENTS_RULE-Application. n) Choose Save. o) Choose Check. p) Choose Activate. q) Remain on this screen for the next step. 7. Find the object number for your BRFplus function and make note of it. © Copyright. All rights reserved. 64 Solution 7: Create BRFplus Agent and Routing Rules My BRFplus function object number is: a) On the Business Rule Framework plus screen, in the My applications navigation panel, choose Z##_AGENTS_RULE → Function → Z##_AGENTS_RULE-Function. b) In the General section, at the end of the line, choose Expand Tray. c) In the ID field, find your BRFplus object number and note it in the space provided. d) Remain on this screen for the next step. 8. Create BRFplus application Z##_ROUTING_RULE and assign to package to allow transport. Field Value Name Z##_ROUTING_RULE Short Text Z##_ROUTING_RULE Development Package ZGRAC (Hint — Use Search) Note: Refer to the Business Example at the beginning of the exercise for details if needed. a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-##, access the BRF+ application by executing transaction /nBRF+. b) On the Business Rule Framework plus screen, choose Create Application. c) In the Create Application dialog box, enter the data from the table. Do not change any other fields. d) Choose Create And Navigate To Object. e) In the left navigation panel, select the new application created. Choose Save, then Activate. As a result, in the Navigation panel, you will now see the status of the application as Active (shown as a green square) f) Close the BRFplus Workbench window. 9. Create a BRFplus Routing Rule for the SAP_GRAC_ACCESS_REQUEST Process ID. Run transaction /nGRFNMW_DEV_RULES and enter the following values: Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Routing Rule Rule ID Z##_ROUTING_RULE © Copyright. All rights reserved. 65 Unit 6: SAP Business Rule Framework (BRFplus) Field Value Application/Func. Group Name Z##_ROUTING_RULE Rule Type BRFplus Flat Rule (LineItem by LineItem) Override BRF+ Application Text Access Request Routing Rule App Override BRF+ Function Text Access Request Routing Rule Function a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-## screen, in the command field, enter /nGRFNMW_DEV_RULES. b) Choose Enter. c) On the Generate MSMP Rule for Process screen, enter the data from the table. d) Choose Enter. Note: Do not choose Execute. 10. Choose the table generation option Item (BRF+ Flat rule), and choose the following attributes: Option Field Name Field Description Item (BRF+ Flat rule) BPROC Business Process Item (BRF+ Flat rule) BSUBPROC Subprocess a) On the Generate MSMP Rule for Process screen, select the Item (BRF+ Flat rule) checkbox. b) On the Item (BRF+ Flat rule) dialog box, select the item attributes from the table. c) Choose Enter. d) On the Generate MSMP Rule for Process screen, choose Execute. e) On the Display Logs screen, check the logs for errors. Note: A warning message will appear stating that Name Z##_ROUTING_RULE has already been used. This is expected since this was created in a previous step. If you find errors in your log, ask your instructor for assistance. f) Choose Back until you return to the SAP Easy Access — User Menu for Training GRC300-## screen. 11. Configure the decision table logic for your Routing rule. © Copyright. All rights reserved. 66 Solution 7: Create BRFplus Agent and Routing Rules a) In the TGT system, on the SAP Easy Access — User Menu for Training GRC300-## screen, in the command field, enter /nBRF+. b) Choose Enter. c) On the Business Rule Framework plus screen, in the Show dropdown menu, choose My Applications. d) On the Business Rule Framework plus screen, in the My Applications navigation panel, choose Z##_ROUTING_RULE → Expression → Decision Table → Z##_ROUTING_RULE-Decision Table. e) Remain on this screen for the next step. 12. Configure the decision table with the following decision criteria: Business Process Subprocess Line Item Key Trigger Value (RULE_RESULT) ##B1 ##S1 ITEMNUM SP_ROUTE_PATH a) Verify that you are in Edit Mode. If not in Edit Mode, choose Edit from the top menu bar. b) In the Table Contents table, choose (Insert New Row). c) In the Business Process Column, in the dropdown menu, choose Direct Value Input, or in the Row Editor, choose Direct Value Input. d) In the Business Process field, choose the appropriate Boolean value in the first box using the dropdown list. e) In the Business Process column, enter business process ID ##B1, or use search to choose from the Business Process list in the second box. f) If multiple entries are needed, choose Change after the second box. Choose Insert Include Condition to add additional entries. g) If editing directly in the field, choose OK to save and configure the next field. If using Row Editor, complete this process for each field except for Line Item. h) In the Line Item Key column, in the dropdown menu, choose Context → More. If using the Row Editor, choose Other operations → Select Context Parameter. i) In the Context Query dialog box, in the Search Criteria section, in the Name row, in the third column, enter ITEMNUM. j) Choose Search. k) In the Result List, choose ITEMNUM. Hint: If you did not change your profile to the EXPERT mode, this may be listed as Line Item Key. l) Choose Save. © Copyright. All rights reserved. 67 Unit 6: SAP Business Rule Framework (BRFplus) m) Choose Check. n) Choose Activate, then choose Yes. o) Remain on this screen for the next step. 13. Using the simulation functionality, test your Routing Rule and make sure it functions as designed using the data in the following table: Business Process Subprocess Trigger Value (RULE_RESULT) ##B1 ##S1 SP_ROUTE_PATH ##B2 ##S1 No Value Returned BLANK ##S1 No Value Returned ##B1 BLANK No Value Returned a) On the Business Rule Framework plus screen, in the Detail section, choose Start Simulation. b) On the Business Rule Framework plus -- Simulation screen, choose Continue. c) On the next screen, enter the data for the first line from the table. d) Choose Execute. e) On the next screen, verify that the result matches the Trigger Value column in the table at the beginning of this task. f) Choose Back to Simulation. g) Repeat the simulation for the remaining rules. h) Choose Back to Workbench. i) In the My Applications navigation panel, choose Z##_ROUTING_RULE → Function → Z##_ROUTING_RULE-Function. j) Choose Save. k) Choose Check. l) Choose Activate, then choose Yes. m) In the My Applications navigation panel, choose Z##_ROUTING_RULE-Application. n) Choose Save. o) Choose Check. p) Choose Activate, then choose Yes. q) Remain on this screen for the next step. 14. Find the object number for your BRFplus function and make note of it. © Copyright. All rights reserved. 68 Solution 7: Create BRFplus Agent and Routing Rules My BRFplus function object number is: a) On the Business Rule Framework plus screen, in the My applications navigation panel, choose Z##_ROUTING_RULE → Function → Z##_ROUTING_RULE-Function. b) In the General section, at the end of the line, choose Expand Tray. c) In the ID field, find your BRFplus object number and note it in the space provided. d) Close BRFplus by clicking the X in the upper right hand corner of the BRFplus window. © Copyright. All rights reserved. 69 Unit 7 Exercise 8 Evaluate MSMP Workflow Configuration Business Example Your organization is implementing SAP Access Control to handle all access requests within one process including new user ID requests and adding more authorizations. The implementation team has configured the Access Request Approval Workflow based upon the blueprint provided by the Access Request Design, which is outlined in the diagram below. Figure 3: MSMP Workflow Design The request attributes that will initiate the workflow are the Request Type (from the request header area) and the Connector (from the line items area). The Request Types that are relevant for your system are: ● New Account (001) ● Change Account (002) ● Delete Account (003) ● Lock Account (004) ● Unlock Account (005) ● Emergency Access (006) The connectors that are relevant are: ● ZMGCLNT800 ● T41CLNT400 © Copyright. All rights reserved. 70 Exercise 8: Evaluate MSMP Workflow Configuration North America Access Requests The approvals required for the North American (NA) requests, types 001 and 002, are Manager, Role Approver (defined on the Role Master Data), and the Security Team. The design team also decided that for the North American (NA) path, if a user has a Segregation of Duties (SOD) issue at the Role Owner Stage, then the approver is assigned by the Business Process of the role. If the role is assigned 00BP as the Business Process, then the SOD needs to be approved by user GRC300–00. If any other Business Process assigned to the role, then the SOD needs to be approved by user GRC300–99. Europe and Asia Pacific Access Requests The approvals required for the European/Asia Pacific (EUAP) requests, types 001 and 002, are Role Approver (defined on the Role Master Data). For request that are part of the European/Asia Pacific (EUAP) path, if the role requested is assigned 00BP as the Business Process, these roles need additional approval by the Security Team. Administration Requests For Request Types Delete Account (003), Lock Account (004) and Unlock Account (005) for ANY connector, these requests will be processed using a LOCK path with a Security Team member as the approver. For Request Type Emergency Access (006), these requests will be processed using an EAM (Emergency Access Management) path with the Firefight ID Owners as the approver. Note: In this exercise, you will be evaluating the MSMP Workflow Configuration that has been created by the implementation team. DO NOT MAKE ANY CHANGES TO THE CONFIGURATION. 1. Execute transaction /nGRFNMW_CONFIGURE_WD to open MSMP Workflow Configuration and answer the following question: How many workflow Process ID’s are delivered by SAP for MSMP Workflow? 2. For Process ID SAP_GRAC_ACCESS_REQUEST, what will happen to an Access Request in the event auto provisioning fails? Describe what will happen to an Access Request in the event auto provisioning fails. 3. Identify the available Initiator Rules for access requests. © Copyright. All rights reserved. 71 Unit 7: Multi-Stage, Multi-Path (MSMP) Workflow List available Initiator Rules for SAP_GRAC_ACCESS_REQUEST. 4. For MSMP Workflow, each Process ID may have only one (1) Initiator Rule active at any given time as the Process Initiator. The Process Initiator determines which Initiator Rule will be evaluated when an Access Request is submitted. What is the Process Initiator for Process ID SAP_GRAC_ACCESS_REQUEST? What is the Process Initiator for Process ID SAP_GRAC_ACCESS_REQUEST? 5. For the AR_NA_PATH, answer the following questions when processing the GRAC_MANAGER stage. How is the approver of the request determined? If the requester who submitted the Access Request forgot to include a critical role, can the Manager add that role to the request? If the Manager approves the Access Request, are comments mandatory? 6. For the AR_NA_PATH, answer the following questions when processing the GRAC_ROLEOWNER stage. Has a routing rule been enabled in the GRAC_ROLEOWNER stage? © Copyright. All rights reserved. 72 Exercise 8: Evaluate MSMP Workflow Configuration Is the approver at the GRAC_ROLEOWNER stage required to run a Risk Analysis before they can submit the Access Request? 7. For the AR_EUAP_PATH, answer the following questions when processing the GRAC_ROLEOWNER stage. Is the same routing rule configured for the GRAC_ROLEOWNER stage in both the AR_EUAP_PATH and the AR_NA_PATH? How can you determine the conditions that will trigger the custom routing rule for the GRAC_ROLE_OWNER stage? © Copyright. All rights reserved. 73 Unit 7 Solution 8 Evaluate MSMP Workflow Configuration Business Example Your organization is implementing SAP Access Control to handle all access requests within one process including new user ID requests and adding more authorizations. The implementation team has configured the Access Request Approval Workflow based upon the blueprint provided by the Access Request Design, which is outlined in the diagram below. Figure 3: MSMP Workflow Design The request attributes that will initiate the workflow are the Request Type (from the request header area) and the Connector (from the line items area). The Request Types that are relevant for your system are: ● New Account (001) ● Change Account (002) ● Delete Account (003) ● Lock Account (004) ● Unlock Account (005) ● Emergency Access (006) The connectors that are relevant are: ● ZMGCLNT800 ● T41CLNT400 © Copyright. All rights reserved. 74 Solution 8: Evaluate MSMP Workflow Configuration North America Access Requests The approvals required for the North American (NA) requests, types 001 and 002, are Manager, Role Approver (defined on the Role Master Data), and the Security Team. The design team also decided that for the North American (NA) path, if a user has a Segregation of Duties (SOD) issue at the Role Owner Stage, then the approver is assigned by the Business Process of the role. If the role is assigned 00BP as the Business Process, then the SOD needs to be approved by user GRC300–00. If any other Business Process assigned to the role, then the SOD needs to be approved by user GRC300–99. Europe and Asia Pacific Access Requests The approvals required for the European/Asia Pacific (EUAP) requests, types 001 and 002, are Role Approver (defined on the Role Master Data). For request that are part of the European/Asia Pacific (EUAP) path, if the role requested is assigned 00BP as the Business Process, these roles need additional approval by the Security Team. Administration Requests For Request Types Delete Account (003), Lock Account (004) and Unlock Account (005) for ANY connector, these requests will be processed using a LOCK path with a Security Team member as the approver. For Request Type Emergency Access (006), these requests will be processed using an EAM (Emergency Access Management) path with the Firefight ID Owners as the approver. Note: In this exercise, you will be evaluating the MSMP Workflow Configuration that has been created by the implementation team. DO NOT MAKE ANY CHANGES TO THE CONFIGURATION. 1. Execute transaction /nGRFNMW_CONFIGURE_WD to open MSMP Workflow Configuration and answer the following question: How many workflow Process ID’s are delivered by SAP for MSMP Workflow? 11 a) On the SAP Easy Access screen, in the command field, enter / nGRFNMW_CONFIGURE_WD. b) Choose Enter. Result: A browser page will open and display the MSMP Workflow Configuration screen. c) Remain on this screen for the next step. 2. For Process ID SAP_GRAC_ACCESS_REQUEST, what will happen to an Access Request in the event auto provisioning fails? © Copyright. All rights reserved. 75 Unit 7: Multi-Stage, Multi-Path (MSMP) Workflow Describe what will happen to an Access Request in the event auto provisioning fails. In the case that auto provisioning of an Access Request should fail, the request will be routed down an Escape Routing (Escape Condition) and travel down the Escape Path ARESC_PRV_FAIL_PATH. a) On the MSMP Workflow Configuration screen, select the line for Process ID SAP_GRAC_ACCESS_REQUEST. b) In the Guided Step area, choose 1-Process Global Settings. c) In the Escape Conditions section, review the data for the Auto Provisioning Failure Escape Condition. d) Remain on this screen for the next step. 3. Identify the available Initiator Rules for access requests. List available Initiator Rules for SAP_GRAC_ACCESS_REQUEST. The initiator rules available are Default Initiator Rule (Process Type: SAP_GRAC_AR) and Z_INTIATOR_RULE. a) On the MSMP Workflow Configuration screen, in the Guided Step area, choose 2Maintain Rules. b) In the List of Rules section, click on the column Rule Kind. c) In the drop-down menu, choose Initiator Rule to filter. d) Remain on this screen for the next step. 4. For MSMP Workflow, each Process ID may have only one (1) Initiator Rule active at any given time as the Process Initiator. The Process Initiator determines which Initiator Rule will be evaluated when an Access Request is submitted. What is the Process Initiator for Process ID SAP_GRAC_ACCESS_REQUEST? What is the Process Initiator for Process ID SAP_GRAC_ACCESS_REQUEST? The Process Initiator for SAP_GRAC_ACCESS_REQUEST is Z_INITIATOR_RULE. a) On the MSMP Workflow Configuration screen, in the 2- Maintain Rules Guided Step, review the data in the Global Rules section. b) Remain on this screen for the next step. 5. For the AR_NA_PATH, answer the following questions when processing the GRAC_MANAGER stage. © Copyright. All rights reserved. 76 Solution 8: Evaluate MSMP Workflow Configuration How is the approver of the request determined? The Agent ID displayed in the Maintain Stages section is GRAC_MANAGER. This agent looks to the Manager field value on the Access Request Approval Workflow to determine the approver. If the requester who submitted the Access Request forgot to include a critical role, can the Manager add that role to the request? No. The stage option Add Assignment is not selected so the approver cannot add line items to the Access Request. If the Manager approves the Access Request, are comments mandatory? No. Comments are mandatory only upon rejection. a) On the MSMP Workflow Configuration screen, in the Guided Step area, choose 5Maintain Paths. b) In the Maintain Paths section, choose the line for Path ID AR_NA_PATH. c) In the Maintain Stages section, choose the line for Stage ID GRAC_MANAGER. Result: In the Stage line, under the column Agent ID, the GRAC_MANAGER is displayed for this stage. d) Choose Display Task Settings. e) On the Stage Definition screen, in the Task Settings section, review the data for Add Assignment and Comments Mandatory. Result: For this stage, the Add Assignment checkbox is not selected, therefore the Manager cannot add any roles. Result: For this stage, the Comments Mandatory field displays Rejection. f) Close the Stage Definition window by choosing the X in the upper right corner. g) Remain on this screen for the next step. 6. For the AR_NA_PATH, answer the following questions when processing the GRAC_ROLEOWNER stage. Has a routing rule been enabled in the GRAC_ROLEOWNER stage? Yes. The GRAC_MSMP_DETOUR_SODVIOL routing rule has been configured. © Copyright. All rights reserved. 77 Unit 7: Multi-Stage, Multi-Path (MSMP) Workflow Is the approver at the GRAC_ROLEOWNER stage required to run a Risk Analysis before they can submit the Access Request? Yes. The RA Mandatory setting is set to Risk Analysis is mandatory. a) In the Maintain Stages section, choose the line for Stage ID GRAC_ROLEOWNER. Result: In the Stage line, the Routing Enabled column is set to Yes, and the Rule ID configured is GRAC_MSMP_DETOUR_SODVIOL for this stage. b) Choose Display Task Settings. c) On the Stage Definition screen, in the Task Settings section, review the data for RA Mandatory. Result: For this stage, the RA Mandatory field display Yes, Risk Analysis is mandatory. d) Close the Stage Definition window by choosing the X in the upper right corner. e) Remain on this screen for the next step. 7. For the AR_EUAP_PATH, answer the following questions when processing the GRAC_ROLEOWNER stage. Is the same routing rule configured for the GRAC_ROLEOWNER stage in both the AR_EUAP_PATH and the AR_NA_PATH? No. In the AR_EUAP_PATH, a custom routing rule is enabled. How can you determine the conditions that will trigger the custom routing rule for the GRAC_ROLE_OWNER stage? Since the custom routing rule for the stage is a BRFplus Flat Rule, in order to determine the specific condition that will trigger the routing rule, take the Rule ID number and search for the function in BRFplus. Review the Decision Table for the rule to identify the condition that will trigger the routing rule. a) On the MSMP Workflow Configuration screen, in the 5-Maintain Paths Guided Step, in the Maintain Paths section, choose the line for the AR_EUAP_PATH path. b) On the MSMP Workflow Configuration screen, in the 5-Maintain Paths Guided Step, in the Maintain Stages section, choose the line for the GRAC_ROLEOWNER stage. Result: The routing rule for the GRAC_ROLEOWNER stage in the AR_EUAP_PATH is a custom routing rule and is different from the GRAC_ROLEOWNER stage in the AR_NA_PATH. c) Close the MSMP Workflow Configuration window by choosing the X in the upper right corner. © Copyright. All rights reserved. 78 Unit 8 Exercise 9 Maintain End User Personalization Business Example You are a system administrator. You have been asked to maintain end user personalization to control what is displayed on a request. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Review and maintain the Default End User Personalization (999) to match the default settings that are required for your request process.. 2. Create a new customized End User Personalization. © Copyright. All rights reserved. 79 Unit 8 Solution 9 Maintain End User Personalization Business Example You are a system administrator. You have been asked to maintain end user personalization to control what is displayed on a request. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Review and maintain the Default End User Personalization (999) to match the default settings that are required for your request process.. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG c) On the Display IMG screen, choose Governance, Risk and Compliance → Access Control → User Provisioning → Maintain End User Personalization. . d) On the Change View "Create EUP": Overview screen, in the Create EUP section, choose EUP ID 999 Default. e) In the Dialog Structure navigation panel, double-click Maintain EUP Fields. f) Review the settings displayed. g) Change the following fields to align with request workflow needs: i. Manager - Mandatory, Editable, Visible ii. Job - NOT Mandatory, NOT Editable, NOT Visible h) Choose Save. 2. Create a new customized End User Personalization. a) Choose Create EUP in the left navigation panel. b) Choose New Entries. c) Enter EUP ID: 7##. d) Enter EUP Config Name:##_EUP_TRAINING. e) Choose Save. f) Choose your new EUP ID. g) In the Dialog Structure navigation panel, double-click Maintain EUP Fields. © Copyright. All rights reserved. 80 Solution 9: Maintain End User Personalization h) Choose Save. i) Review settings and adjust as needed. Note: This exercise is for instructional purposes only. The new EUP will not be used in any subsequent exercises. You can make any changes you want. j) Choose Back until you return to the SAP Easy Access — User Menu for Training GRC300-##. © Copyright. All rights reserved. 81 Unit 8 Exercise 10 Prepare Roles and Owner Data for MSMP Workflow Testing and Validation for SAP Systems Business Example The roles in the target systems need to be prepared so that users can request them in the Access Request Management application. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. Task 1: Prepare Roles and Owner Data for ZMG Landscape 1. Import your roles into SAP AC using the data in the following table: Field Value Role Type Technical Role Role Attribute Source User Input Role Authorization Source Backend System Application Type SAP Landscape ZMG 800 Landscape Overwrite Existing Role Yes Source System ZMGCLNT800–ECC ERP Role From Z:RISK_##* Methodology Status Complete 2. Maintain role attributes using the data in the following table: Field Value Critical Level High Project Release ZMG PRD ROLE Role Status In Productive Use Business Process Group ## Business Process 1 Subprocess Group ## Subprocess 1 © Copyright. All rights reserved. 82 Exercise 10: Prepare Roles and Owner Data for MSMP Workflow Testing and Validation for SAP Systems Field Value Role Owner GRC300–## Assignment Approver Select Role Content Approver Select 3. Review all of your roles and then submit the roles. Task 2: Prepare Roles and Owner Data for T41 Landscape 1. Import your roles into SAP AC using the data in the following table: Field Value Role Type Technical Role Role Attribute Source User Input Role Authorization Source Backend System Application Type SAP Landscape T41 400 Landscape Overwrite Existing Role Yes Source System T41CLNT400 — S/4HANA ERP Role From Z:*## Methodology Status Complete 2. Maintain role attributes using the data in the following table: Field Value Critical Level High Project Release T41 PRD ROLE Role Status In Productive Use Business Process Group ## Business Process 1 Subprocess Group ## Subprocess 1 Role Owner GRC300–## Assignment Approver Select Role Content Approver Select 3. Review all of your roles and then submit the roles. © Copyright. All rights reserved. 83 Unit 8 Solution 10 Prepare Roles and Owner Data for MSMP Workflow Testing and Validation for SAP Systems Business Example The roles in the target systems need to be prepared so that users can request them in the Access Request Management application. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. Task 1: Prepare Roles and Owner Data for ZMG Landscape 1. Import your roles into SAP AC using the data in the following table: Field Value Role Type Technical Role Role Attribute Source User Input Role Authorization Source Backend System Application Type SAP Landscape ZMG 800 Landscape Overwrite Existing Role Yes Source System ZMGCLNT800–ECC ERP Role From Z:RISK_##* Methodology Status Complete a) In the TGT system, on the SAP Easy Access - User Menu for Training GRC300-## screen, choose SAP Fiori Launchpad from menu list. b) Log on on with your GRC300-## user ID. c) On the Fiori Launchpad home page, in the BRM Administration tile group, choose Role Import. d) On the Role Import: Step 1 (Define Criteria) screen, enter the data from the table. e) Choose Next. © Copyright. All rights reserved. 84 Solution 10: Prepare Roles and Owner Data for MSMP Workflow Testing and Validation for SAP Systems f) Remain on this screen for the next step. 2. Maintain role attributes using the data in the following table: Field Value Critical Level High Project Release ZMG PRD ROLE Role Status In Productive Use Business Process Group ## Business Process 1 Subprocess Group ## Subprocess 1 Role Owner GRC300–## Assignment Approver Select Role Content Approver Select a) On the Role Import: Step 2 (Select Role Data) screen, enter the data from the table. b) In the Role Attributes section, enter the data from the table for the following: ● Critical Level ● Project Release ● Role Status ● Business Process ● Subprocess c) Choose the Owners/Approvers tab. d) In the List of Approvers section, choose Add. e) In the open row, in the User field, choose Search. f) On the Search: User dialog box, in the Owner ID field, and enter *##*. Choose Go. g) Choose Search. h) Select the Role Owner ID from the table. i) In the List of Approvers section, select the Assignment Approver and Role Content Approver checkboxes. j) Choose Next. k) Remain on this screen for the next step. 3. Review all of your roles and then submit the roles. a) On the Role Import: Step 3 (Review) screen, select Preview All Roles. b) Choose Show Preview. c) In the Role List, review your roles. © Copyright. All rights reserved. 85 Unit 8: User Provisioning Note: You should see 4 roles in the preview. d) Choose Next. e) On the Role Import: Step 4 (Schedule) screen, choose Foreground. f) Choose Submit. g) On the Role Import screen, review your report and verify that in the Details section. The Status column should be set to Success. h) Close the Role Import browser window to return to the SAP Fiori Launchpad home page. Task 2: Prepare Roles and Owner Data for T41 Landscape 1. Import your roles into SAP AC using the data in the following table: Field Value Role Type Technical Role Role Attribute Source User Input Role Authorization Source Backend System Application Type SAP Landscape T41 400 Landscape Overwrite Existing Role Yes Source System T41CLNT400 — S/4HANA ERP Role From Z:*## Methodology Status Complete a) On the Fiori Launchpad home page, in the BRM Administration tile group, choose Role Import. b) On the Role Import: Step 1 (Define Criteria) screen, enter the data from the table. c) Choose Next. d) Remain on this screen for the next step. 2. Maintain role attributes using the data in the following table: Field Value Critical Level High Project Release T41 PRD ROLE Role Status In Productive Use Business Process Group ## Business Process 1 © Copyright. All rights reserved. 86 Solution 10: Prepare Roles and Owner Data for MSMP Workflow Testing and Validation for SAP Systems Field Value Subprocess Group ## Subprocess 1 Role Owner GRC300–## Assignment Approver Select Role Content Approver Select a) On the Role Import: Step 2 (Select Role Data) screen, enter the data from the table. b) In the Role Attributes section, enter the data from the table for the following: ● Critical Level ● Project Release ● Role Status ● Business Process ● Subprocess c) Choose the Owners/Approvers tab. d) In the List of Approvers screen, choose Add. e) In the open row, in the User field, choose Search. f) On the Search: User dialog box, in the Owner ID field, and enter *##*. Choose Go. g) Choose Search. h) Choose the Role Owner ID from the table. i) In the List of Approvers section, select the Assignment Approver and Role Content Approver checkboxes. j) Choose Next. k) Remain on this screen for the next step. 3. Review all of your roles and then submit the roles. a) On the Role Import: Step 3 (Review) screen, select Preview All Roles. b) Choose Show Preview. c) In the Role List, review your roles. Note: You should see 2 roles in the preview. d) Choose Next. e) On the Role Import: Step 4 (Schedule) screen, choose Foreground. f) Choose Submit. © Copyright. All rights reserved. 87 Unit 8: User Provisioning g) On the Role Import screen, review your report and verify that in the Details table, the Status column is set to Success. h) Close the browser window to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 88 Unit 8 Exercise 11 Create an Access Request Business Example You are a system administrator, and you have been asked to validate the configuration and workflow for access requests to ensure that they are functioning properly. You will use various access request test cases to validate several MSMP path configurations. To validate the Access Request workflow design, you will need to submit multiple access requests and verify that each request flows down the correct path and that at each stage the configuration options are functioning as designed. Note: Read this exercise completely before you begin. Figure 4: MSMP Workflow Design In this exercise, you will undertake several roles and approve Access Requests as various approvers: ● Manager ● Role Owner ● Security Team Member ● Workflow Administrator © Copyright. All rights reserved. 89 Unit 8: User Provisioning Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Create an Access Request 1. Create an access request using the data from the following table. Table 3: Field Value Description Group ## Request Request Type New Account Request For Other User ##_User_10 Priority Low – Access Request 2. Add a role to the request using the data from the following table. Table 4: Field Value Role Type Single Role Role Name Z:RISK_##* 3. Add user details and system details to the access request. Select the User Details tab and enter the data from the following table. Table 5: Field Value First Name User 10 Last Name Group ## Manager GRC300-## Email Train-##@educ.corp User Type Dialog Password/Confirm Password Welcome1 Note: If needed, choose Home to return to the Fiori Launchpad home page. 4. Search for your Access Request and view its status. © Copyright. All rights reserved. 90 Exercise 11: Create an Access Request 5. As Manager, view the access request in your Work Inbox. View the Audit Log. 6. As Manager, view the Risk Violations for your Access Request using the data in the following table. Make sure you run Risk Analysis against your rule set ##RS. Table 6: Field Value Analysis Type Risk Analysis Rule Set ##RS Type Additional Criteria ● Action Level ● Permission Level ● Critical Action Include Mitigated Risks 7. As Role Approver, review the request in your inbox. Update the assignment according to the table and submit your request to the next stage. 8. As Security Lead, review the request and approve. 9. Search for your access request and view its status. © Copyright. All rights reserved. 91 Unit 8 Solution 11 Create an Access Request Business Example You are a system administrator, and you have been asked to validate the configuration and workflow for access requests to ensure that they are functioning properly. You will use various access request test cases to validate several MSMP path configurations. To validate the Access Request workflow design, you will need to submit multiple access requests and verify that each request flows down the correct path and that at each stage the configuration options are functioning as designed. Note: Read this exercise completely before you begin. Figure 4: MSMP Workflow Design In this exercise, you will undertake several roles and approve Access Requests as various approvers: ● Manager ● Role Owner ● Security Team Member ● Workflow Administrator © Copyright. All rights reserved. 92 Solution 11: Create an Access Request Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Create an Access Request 1. Create an access request using the data from the following table. Table 3: Field Value Description Group ## Request Request Type New Account Request For Other User ##_User_10 Priority Low – Access Request a) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Access Request. b) On the Access Request screen, enter the data from the table for the Reason for Request and Request Details sections. c) Remain on this screen for the next step 2. Add a role to the request using the data from the following table. Table 4: Field Value Role Type Single Role Role Name Z:RISK_##* a) On the Access Request screen, on the User Access tab, choose Add → Role. b) In the Select Roles dialog box, in the Search Criteria section, remove all search criteria except Role Type and Role/Profile Name. c) In the Search Criteria section, enter the data from the table. d) Choose Search. e) Under the Available section, choose Add All. Result: This moves selected roles from the Available section to the Selected section. There should be 4 roles in the Selected section. f) Choose OK. g) Remain on this screen for the next step © Copyright. All rights reserved. 93 Unit 8: User Provisioning 3. Add user details and system details to the access request. Select the User Details tab and enter the data from the following table. Table 5: Field Value First Name User 10 Last Name Group ## Manager GRC300-## Email Train-##@educ.corp User Type Dialog Password/Confirm Password Welcome1 a) On the Access Request screen, select the User Details tab. b) On the User Details tab, enter the data from the table for First Name, Last Name, Manager, Company, Email and User Type. c) Select the User System Details tab. d) In the System row with the system ZMGCLNT800, in the Password / Confirm Password fields, enter the password information from the table. e) Choose Submit. f) In the bottom left corner, messages will appear. Using your mouse pointer, widen the Message Box. Result: Make note of your request number: ________________________ g) Choose Close to return to the SAP Fiori Launchpad home page. Note: If needed, choose Home to return to the Fiori Launchpad home page. 4. Search for your Access Request and view its status. a) On the SAP Fiori Launchpad home page, in the ARQ Administration tile group, choose Search Requests. b) On the Search Requests screen, choose Search. c) In the Results section, select the checkbox to choose your request. d) Choose Instance Status. Review the displayed data. Result: The resulting dialog box displays the information related to this particular work item. You can see the MSMP Process ID and Process version, the Path and Stage the request is active in, the request approvers that currently have the request in their work inbox, and the detailed Audit Log for the request. Verify that GRC300-## is the current approver as Manager © Copyright. All rights reserved. 94 Solution 11: Create an Access Request e) Choose X in the upper right corner to close the dialog box. f) Close the Search Request browser tab or choose Home to return to the SAP Fiori Launchpad home page. 5. As Manager, view the access request in your Work Inbox. View the Audit Log. a) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Work Inbox. b) On the My Home screen, in the Work Inbox section, choose Work Inbox. c) In the Work Inbox dialog box, click on the subject line of the request to choose your access request. d) On the Access Request, select the Audit Log tab and review the data. e) Remain on this screen for the next step. 6. As Manager, view the Risk Violations for your Access Request using the data in the following table. Make sure you run Risk Analysis against your rule set ##RS. Table 6: Field Value Analysis Type Risk Analysis Rule Set ##RS Type Additional Criteria ● Action Level ● Permission Level ● Critical Action Include Mitigated Risks a) On the Access Request: <Access Request Number> dialog box, select the Risk Violations tab. b) On the Risk Violations tab, in the Rule Set field, choose Search. c) On the Search Rulesets dialog box, in the Available table, select your rule set and move it to the Selected table. d) In the Selected table, select Global and move it to the Available section. Note: This step is for training only. In actual practice, the rule set should not be changed from the Default that has been configured in the Access Control Parameters. e) Choose OK. f) On the Access Request: <Access Request Number> dialog box, enter the data from the table. © Copyright. All rights reserved. 95 Unit 8: User Provisioning g) Choose Run Risk Analysis. h) In the Results table, view your results. Result: The user should have 2 SOD risk violations and 1 Critical Action violation: ● ##R1-Payment Fraud ● ##R2-Unauthorized Purchasing ● ##R3-Table Maintenance i) Choose Submit to confirm your approval as Manager. Hint: You may need to scroll to the right to see the button in the bottom right of the screen. j) If needed, in the Confirmation dialog box, choose Yes. k) Choose Close to return to the Work Inbox screen. 7. As Role Approver, review the request in your inbox. Update the assignment according to the table and submit your request to the next stage. a) In the Work Inbox dialog box, click on the subject line of the request to choose your access request. Hint: If the access request does not appear automatically, choose Refresh in the lower right corner. b) Choose Submit. Did the system allow you to approve the request? No, Risk Analysis is Mandatory c) On the Access Request in request details, reject the assignments listed in the table. Table 7: Role Assignment Approval Status Z:RISK_##R1 Reject Z:RISK_##R2 Reject Z:RISK_##R3_##R4 Reject Z:RISK_##_DISPLAY Approve d) Choose the Risk Violations tab. e) In the Rule Set field, choose ##RS. © Copyright. All rights reserved. 96 Solution 11: Create an Access Request f) To update the SOD risk analysis, choose Run Risk Analysis. g) Select the Risk Violations tab. h) On the Risk Violations tab, scroll down to the Analysis Criteria table. Result: You should not see any Risk Violations. i) Choose the Comments tab. j) On the Comments tab, in the Notes text box, enter the following note: Approved as changed. k) Choose the User Access tab and review the Risk Violations and Mitigation Control columns. Result: Notice that a Green Light indicates there is no Risk Violation. l) Choose Submit to approve the request as Role Approver. m) In the Confirmation dialog box, choose Yes. n) Choose Close to return to the Work Inbox screen. 8. As Security Lead, review the request and approve. a) In the Work Inbox dialog box, click on the subject of the request to choose your access request. Caution: Since all participants are Security Leads in the Access Control Owners table, you may have additional requests in your inbox so please choose only your request. b) Review the data. c) Choose Submit to approve the request as Security Administrator. d) Choose Close. e) Close the Work Inbox tab. 9. Search for your access request and view its status. a) On the SAP Fiori launchpad home page, in the ARQ Administration tile group, choose the Search Requests tile. b) On the Search Request dialog box, choose Search. c) In the Results table, select your new access request. d) Choose Instance Status. Result: The Instance Status dialog box displays the request in Finished status. The Audit Log has a detailed description of the events for this request, including that a user has been created and 2 roles were provisioned as per the request. e) Close the Search Request dialog box. f) Choose Home to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 97 Unit 8 Exercise 12 Create an Access Request with Risk Violations Business Example You are a system administrator, and you have been asked to validate the configuration and workflow for access requests to ensure that they are functioning properly. You will use various access request test cases to validate several MSMP path configurations. To validate the Access Request workflow design, you will need to submit multiple access requests and verify that each request flows down the correct path and that at each stage the configuration options are functioning as designed. Note: Read this exercise completely before you begin. Figure 5: MSMP Workflow Design In this exercise, you will undertake several roles and approve Access Requests as various approvers: ● Manager ● Role Owner ● Security Team Member ● Workflow Administrator © Copyright. All rights reserved. 98 Exercise 12: Create an Access Request with Risk Violations Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Create an Access Request with Access Risk Violation 1. Create an access request using the data from the following table. Table 8: Field Value Description Group ## Request Request Type New Account Request For Other User ##_User_11 Priority High – Access Request 2. Add a role to the request using the data from the following table. Table 9: Field Value Role Type Single Role Role Name Z:RISK_##* 3. Add user details and system details to the access request. Select the User Details tab and enter the data from the following table. Table 10: Field Value First Name User 11 Last Name Group ## Manager GRC300-## Email Train-##@educ.corp User Type Dialog Password/Confirm Password Welcome1 Note: If needed, choose Home to return to the Fiori Launchpad home page. 4. Search for your Access Request and view its status. © Copyright. All rights reserved. 99 Unit 8: User Provisioning 5. As Manager, view the access request in your Work Inbox. View the Audit Log. 6. As Manager, view the Risk Violations for your Access Request using the data in the following table. Make sure you run Risk Analysis against your ruleset ##RS. Table 11: Field Value Analysis Type Risk Analysis Rule Set ##RS Type Additional Criteria ● Action Level ● Permission Level ● Critical Action Include Mitigated Risks 7. As Role Approver, review the request in your inbox. Update the assignment according to the table and submit your request to the next stage. Table 12: Role Assignment Approval Status Z:RISK_##R1 Approve Z:RISK_##R2 Reject Z:RISK_##R3_##R4 Reject Z:RISK_##_DISPLAY Approve 8. Search for your access request and view its status. 9. As Workflow Administrator, review the request and approve it. . 10. As Security Lead, review the request and approve. 11. Search for your access request and view its status. © Copyright. All rights reserved. 100 Unit 8 Solution 12 Create an Access Request with Risk Violations Business Example You are a system administrator, and you have been asked to validate the configuration and workflow for access requests to ensure that they are functioning properly. You will use various access request test cases to validate several MSMP path configurations. To validate the Access Request workflow design, you will need to submit multiple access requests and verify that each request flows down the correct path and that at each stage the configuration options are functioning as designed. Note: Read this exercise completely before you begin. Figure 5: MSMP Workflow Design In this exercise, you will undertake several roles and approve Access Requests as various approvers: ● Manager ● Role Owner ● Security Team Member ● Workflow Administrator © Copyright. All rights reserved. 101 Unit 8: User Provisioning Note: In this exercise, whenever a value includes ##, replace ## with the number which your instructor has assigned you. Create an Access Request with Access Risk Violation 1. Create an access request using the data from the following table. Table 8: Field Value Description Group ## Request Request Type New Account Request For Other User ##_User_11 Priority High – Access Request a) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Access Request. b) On the Access Request screen, enter the data from the table for the Reason for Request and Request Details sections. c) Remain on this screen for the next step 2. Add a role to the request using the data from the following table. Table 9: Field Value Role Type Single Role Role Name Z:RISK_##* a) On the Access Request screen, on the User Access tab, choose Add → Role. b) In the Select Roles dialog box, in the Search Criteria section, remove all search criteria except Role Type and Role/Profile Name. c) In the Search Criteria section, enter the data from the table. d) Choose Search. e) Under the Available section, choose Add All. Result: This moves selected roles from the Available section to the Selected section. f) Choose OK. g) Remain on this screen for the next step 3. Add user details and system details to the access request. Select the User Details tab and enter the data from the following table. © Copyright. All rights reserved. 102 Solution 12: Create an Access Request with Risk Violations Table 10: Field Value First Name User 11 Last Name Group ## Manager GRC300-## Email Train-##@educ.corp User Type Dialog Password/Confirm Password Welcome1 a) On the Access Request screen, select the User Details tab. b) On the User Details tab, enter the data from the table for First Name, Last Name, Manager, Company, Email and User Type. c) Select the User System Details tab. d) In the System row with the system ZMGCLNT800, in the Password / Confirm Password fields, enter the password information from the table. e) Choose Submit. f) In the bottom left corner, messages will appear. Using your mouse pointer, widen the Message Box. Result: Make note of your request number: ________________________ g) Choose Close to return to the SAP Fiori Launchpad home page. Note: If needed, choose Home to return to the Fiori Launchpad home page. 4. Search for your Access Request and view its status. a) On the SAP Fiori Launchpad home page, in the ARQ Administration tile group, choose Search Requests. b) On the Search Requests screen, choose Search. c) In the Results section, select the checkbox to choose your request. d) Choose Instance Status. Review the displayed data. Result: The resulting dialog box displays the information related to this particular work item. You can see the MSMP Process ID and Process version, the Path and Stage the request is active in, the request approvers that currently have the request in their work inbox, and the detailed Audit Log for the request. Verify that GRC300-## is the current approver as Manager e) Choose X in the upper right corner to close the dialog box. f) Close the Search Request browser tab or choose Home to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 103 Unit 8: User Provisioning 5. As Manager, view the access request in your Work Inbox. View the Audit Log. a) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Work Inbox. b) On the My Home screen, in the Work Inbox section, choose Work Inbox. c) In the Work Inbox dialog box, click on the subject line of the request to choose your access request. d) On the Access Request, select the Audit Log tab and review the data. e) Remain on this screen for the next step. 6. As Manager, view the Risk Violations for your Access Request using the data in the following table. Make sure you run Risk Analysis against your ruleset ##RS. Table 11: Field Value Analysis Type Risk Analysis Rule Set ##RS Type Additional Criteria ● Action Level ● Permission Level ● Critical Action Include Mitigated Risks a) On the Access Request: <Access Request Number> dialog box, select the Risk Violations tab. b) On the Risk Violations tab, in the Rule Set field, choose Search. c) On the Search Rulesets dialog box, in the Available table, select your rule set and move it to the Selected table. d) In the Selected table, select Global and move it to the Available section. Note: This step is for training only. In actual practice, the rule set should not be changed from the Default that has been configured in the Access Control Parameters. e) Choose OK. f) On the Access Request: <Access Request Number> dialog box, enter the data from the table. g) Choose Run Risk Analysis. h) In the Results table, view your results. Result: The user should have 2 SOD risk violations and 1 Critical Action violation: © Copyright. All rights reserved. 104 Solution 12: Create an Access Request with Risk Violations ● ##R1-Payment Fraud ● ##R2-Unauthorized Purchasing ● ##R3-Table Maintenance i) Choose Submit to confirm your approval as Manager. Hint: You may need to scroll to the right to see the button in the bottom right of the screen. j) If needed, in the Confirmation dialog box, choose Yes. k) Choose Close to return to the Work Inbox screen. 7. As Role Approver, review the request in your inbox. Update the assignment according to the table and submit your request to the next stage. Table 12: Role Assignment Approval Status Z:RISK_##R1 Approve Z:RISK_##R2 Reject Z:RISK_##R3_##R4 Reject Z:RISK_##_DISPLAY Approve a) In the Work Inbox dialog box, click on the subject line of the request to choose your access request. Hint: If the access request does not appear automatically, choose Refresh in the lower right corner. b) On the Access Request in request details, reject the assignments listed in the table. c) Choose the Risk Violations tab. d) In the Rule Set field, choose ##RS. e) To update the SOD risk analysis, choose Run Risk Analysis. f) Select the Risk Violations tab. g) On the Risk Violations tab, scroll down to the Analysis Criteria table. h) DO NOT apply mitigating controls to risks at this stage. i) Choose the Comments tab. © Copyright. All rights reserved. 105 Unit 8: User Provisioning j) On the Comments tab, in the Notes text box, enter the following note: Approved as changed. k) Choose the User Access tab and review the Risk Violations and Mitigation Control columns. Result: Notice that a Red Light indicates there are Risk Violations. l) Choose Submit to approve the request as Role Approver. m) If needed, in the Confirmation dialog box, choose Yes. n) Choose Close to return to the Work Inbox screen. o) Choose Home to return to the SAP Fiori Launchpad. 8. Search for your access request and view its status. a) On the SAP Fiori Launchpad home page, in the ARQ Administration tile group, choose the Search Requests tile. b) On the Search Request dialog box, choose Search. c) In the Results table, select your new access request and choose the Instance Status button. On what path and at what stage is your access request awaiting approval? The request is on path SOD Review Path (AR_SOD_PATH) for requests with SOD Violations and is at the SOX Team stage for approval. Notice that the approver for the SOX Team is GRC300-99. d) Close the Instance Status dialog and remain in Search Request for the next step. 9. As Workflow Administrator, review the request and approve it. . a) From the Search Request Results, select the line that contains your new access request. The line should highlight blue. b) Select the Administration button and click the path hyperlink (AR_SOD_PATH) to open the request for Administrator approval. c) On the Comments tab, in the Notes text box, enter the following note: Approved as changed. d) Choose the Risk Violations tab. e) In the Rule Set field, choose ##RS. f) To update the SOD risk analysis, choose Run Risk Analysis. g) On the Risk Violations tab, scroll down to the Analysis Criteria table. h) Choose the Submit button in the bottom right-hand corner of the screen to approve the request. i) In the Confirmation Dialog box, choose Yes. Do not exit this tab. © Copyright. All rights reserved. 106 Solution 12: Create an Access Request with Risk Violations Did the system let you approve the request? No, the request contains risk violations that have not been mitigated. j) Select the Risk Violations tab and scroll down to the Analysis Criteria table to view the results. Note: If needed, repeat steps d - h to refresh the violations results. k) In the Result area, select a line with the risk to mitigate and choose the Mitigate Risk button. l) In the Mitigation dialog box, in the Control ID field, search for and select your mitigating control GRCMCT##. Note: This may already be populated. If so, verify the Control ID. m) In the Monitor field, choose Search, then Go. n) Select GRC300-## as the monitor, then choose Save. o) Choose Save. p) On the Access Request run the Risk Analysis again using rule set ##RS. q) Choose the User Access tab and review the Risk Violations and Mitigation Control columns. Notice that a Green Light in the Mitigation Control column, indicates there are no unmitigated risk violations. r) Choose Submit to approve the request as Administrator. s) If prompted, enter a comment in the Comments pop up box describing why you approved the request as an administrator. t) In the Confirmation Dialog box, choose Yes. Do not exit this tab. u) Choose Close. v) Choose Home to return to the SAP Fiori Launchpad home page. 10. As Security Lead, review the request and approve. a) In the Work Inbox dialog box, click on the subject of the request to choose your access request. Caution: Since all participants are Security Leads in the Access Control Owners table, you may have additional requests in your inbox so please choose only your request. © Copyright. All rights reserved. 107 Unit 8: User Provisioning b) Review the data. c) Choose Submit to approve the request as Security Administrator. d) Choose Close. e) Choose Home to return to the SAP Fiori Launchpad home page. 11. Search for your access request and view its status. a) On the SAP Fiori Launchpad home page, in the ARQ Administration tile group, choose the Search Requests tile. b) On the Search Request dialog box, choose Search. c) In the Results table, select your new access request. d) Choose Instance Status. Result: The Instance Status dialog box displays the request in Finished status. The Audit Log has a detailed description of the events for this request, including that a user has been created and 2 roles were provisioned as per the request. e) Close the Search Request dialog box. f) Choose Home to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 108 Unit 8 Exercise 13 Review Parameter Settings for Provisioning and Managing Users Business Example You are a system administrator. You have been asked to review configuration settings for Provisioning and Managing Users functionality. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. Do not make any changes in this configuration unless directed to. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to User Provisioning. 2. List the settings that are set and their values for Parameter Group 1 - Change Log: ● 5001 - SLG1 Log Level for HR Triggers 3. List the settings that are set and their values for Parameter Group 5 - Workflow: ● 2051 - Enable User ID Validation in Access Request against Search Data Sources 4. List the settings that are set and their values for Parameter Group 8 - Performance: ● 2050 - Enable Real Time LDAP Search for Access Request User 5. List the settings that are set and their values for Parameter Group 9 - Risk Analysis Access Request: ● 1071 - Enable Risk Analysis upon request submission ● 1072 - Mitigation of critical risk required before approving the request ● 1073 - Enable SoD violations detour on risks from existing roles ● 1074 - Save Mitigation Control in temporary table ● 1075 - Select Management Summary as default view in Access Request 6. List the settings that are set and their values for Parameter Group 12 - Access Request Role Selection: ● 2031 - Allow All Roles for Approver ● 2032 - Approver Role Restriction Attribute © Copyright. All rights reserved. 109 Unit 8: User Provisioning ● 2033 - Allow All Roles for Requester ● 2034 - Requester Role Restriction Attribute ● 2035 - Allow Role Comments ● 2036 - Role Comments Mandatory ● 2037 - Display expired roles for existing roles ● 2038 - Auto Approve Roels without Approvers ● 2039 - Search Role by Transactions from Backend System ● 2040 - Assignment Comments mandatory on rejection ● 2042 - Visibility of Valid from/valid to for profiles ● 2043 - Authorization object for Role search - Provisioning ● 2044 - Display profiles in Existing assignments, My Profile and Model user ● 2045 - Default provisioning action after adding roles/profiles/FFID from Existing assignments and My Profile ● 2046 - Field type for business process and system fields in access request role search ● 2047 - Filter Business Process and systems based upon application area ● 2048 - Default Provisioning Environment for Business Role while creating Access Request 7. List the settings that are set and their values for Parameter Group 13 - Access Request Default Roles: ● 1302 - Add only roles for chick system entry in present in request ● 2009 - Consider Default Roles ● 2010 - Request Type for Default Roles ● 2011 - Default Role Level ● 2012 - Role Attributes ● 2013 - Request Attributes 8. List the settings that are set and their values for Parameter Group 14 - Access Request Role Mapping: ● 2014 - Enable Role Mapping ● 2015 - Applicable to Role Removals 9. List the settings that are set and their values for Parameter Group 16 - LDAP: ● 2052 - Use LDAP Domain Forest 10. List the settings that are set and their values for Parameter Group 17 - Assignment Expiry: ● 2041- Duration for assignment expiry in days © Copyright. All rights reserved. 110 Exercise 13: Review Parameter Settings for Provisioning and Managing Users 11. List the settings that are set and their values for Parameter Group 18 - Access Request Training Verification: ● 2024- Training and Verification 12. List the settings that are set and their values for Parameter Group 20 - Access Request Business Roles: ● 4011- Delete the Technical Roles if part of the Business Role ● 4016 - Consider only the approved/completed version of business role for provisioning ● 4019 - Do not copy manual role assignment changes during repository sync ● 4022 - Future dated assignments sync is mandatory 13. List the settings that are set and their values for Parameter Group 22 - Access Request Validations: ● 5021 - Check manager value against the user ID in current system ● 5022 - Consider the password change in access request ● ● ● 5023 - Consider details from multiple data sources for missing user details in access request 5024 - Enable in-line editing for User group and Parameter in Access request 5026 - Make system and provisioning actions visible for filtering user assignments for model users ● 5027 - Default value for filtering by System ● 5028 - Default value for filtering by provisioning action 14. List the settings that are set and their values for Parameter Group 23 - Simplified Access Request: ● 5031 - Enable "Open in Advanced Mode" option ● 5032 - Disable Type-ahead search in Simplified Access Request 15. Review additional configuration areas for Provisioning and Managing Users under the User Provisioning Node in IMG. ● Maintain Service Level Agreements What Service Level Agreements (SLAs) are configured? What are the options for determining the SLA time frame? ● Define Request Types How many request types are configured? To which MSMP process is the request type Role Approval assigned? ● Maintain Priority Configuration How many priorities have been configured? © Copyright. All rights reserved. 111 Unit 8: User Provisioning To which MSMP process have they been assigned? ● Define Number Range for Provisioning Requests What is the end number for the first number range? ● Maintain Provisioning Settings What are the options for Password Expiry for ORAAPPS? What are the fields available for System Provisioning Configuration? Review other areas of the User Provisioning node: ● Maintain Settings for HR Trigger ● Define Employee Types ● Maintain Number Range Intervals for Provisioning Requests ● Maintain User Defaults ● Maintain Password Self Service ● Maintain CUA Settings ● Activate End User Logon Note: For the Steps below, choose the IMG Activity listed and review the items. When finished with the review choose Back. Do not change any values. © Copyright. All rights reserved. 112 Unit 8 Solution 13 Review Parameter Settings for Provisioning and Managing Users Business Example You are a system administrator. You have been asked to review configuration settings for Provisioning and Managing Users functionality. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. Do not make any changes in this configuration unless directed to. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to User Provisioning. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG c) Choose Governance, Risk and Compliance → Access Control → Maintain Configuration Settings.. The AC Configuration Settings screen is displayed. These are the parameters that are configured for this particular instance of SAP Access Control. Remember, that some parameters do have a coded default in the GRACCONFIG table. If a parameter is not entered here, then the default will be applied. 2. List the settings that are set and their values for Parameter Group 1 - Change Log: ● 5001 - SLG1 Log Level for HR Triggers a) 5001: HIGH 3. List the settings that are set and their values for Parameter Group 5 - Workflow: ● 2051 - Enable User ID Validation in Access Request against Search Data Sources a) 2051: NO 4. List the settings that are set and their values for Parameter Group 8 - Performance: ● 2050 - Enable Real Time LDAP Search for Access Request User a) 2050: NO 5. List the settings that are set and their values for Parameter Group 9 - Risk Analysis Access Request: © Copyright. All rights reserved. 113 Unit 8: User Provisioning ● 1071 - Enable Risk Analysis upon request submission ● 1072 - Mitigation of critical risk required before approving the request ● 1073 - Enable SoD violations detour on risks from existing roles ● 1074 - Save Mitigation Control in temporary table ● 1075 - Select Management Summary as default view in Access Request a) 1071 - 1073: NO b) 1074: YES c) 1075: NO 6. List the settings that are set and their values for Parameter Group 12 - Access Request Role Selection: ● 2031 - Allow All Roles for Approver ● 2032 - Approver Role Restriction Attribute ● 2033 - Allow All Roles for Requester ● 2034 - Requester Role Restriction Attribute ● 2035 - Allow Role Comments ● 2036 - Role Comments Mandatory ● 2037 - Display expired roles for existing roles ● 2038 - Auto Approve Roels without Approvers ● 2039 - Search Role by Transactions from Backend System ● 2040 - Assignment Comments mandatory on rejection ● 2042 - Visibility of Valid from/valid to for profiles ● 2043 - Authorization object for Role search - Provisioning ● 2044 - Display profiles in Existing assignments, My Profile and Model user ● 2045 - Default provisioning action after adding roles/profiles/FFID from Existing assignments and My Profile ● 2046 - Field type for business process and system fields in access request role search ● 2047 - Filter Business Process and systems based upon application area ● 2048 - Default Provisioning Environment for Business Role while creating Access Request a) 2031: YES b) 2032: (not defined) c) 2033: YES © Copyright. All rights reserved. 114 Solution 13: Review Parameter Settings for Provisioning and Managing Users d) 2034: (not defined) e) 2035: YES f) 2036: NO g) 2037: YES h) 2038: NO i) 2039: YES j) 2040: NO k) 2042: 0 l) 2043: GRAC_ROLED m) 2044: NO n) 2045: 010 (Retain) o) 2046: 3 (Display both as drop down) p) 2047: (not defined) q) 2048: PRD (Production) 7. List the settings that are set and their values for Parameter Group 13 - Access Request Default Roles: ● 1302 - Add only roles for chick system entry in present in request ● 2009 - Consider Default Roles ● 2010 - Request Type for Default Roles ● 2011 - Default Role Level ● 2012 - Role Attributes ● 2013 - Request Attributes a) 1302: NO b) 2009: YES c) 2010: 001 (New Account), 002 (Change Account) d) 2011: REQUEST e) 2012: (not defined) f) 2013: SYSTEM 8. List the settings that are set and their values for Parameter Group 14 - Access Request Role Mapping: ● 2014 - Enable Role Mapping ● 2015 - Applicable to Role Removals © Copyright. All rights reserved. 115 Unit 8: User Provisioning a) 2014: YES b) 2015: NO 9. List the settings that are set and their values for Parameter Group 16 - LDAP: ● 2052 - Use LDAP Domain Forest a) 2052: NO 10. List the settings that are set and their values for Parameter Group 17 - Assignment Expiry: ● 2041- Duration for assignment expiry in days a) 2041: 10 11. List the settings that are set and their values for Parameter Group 18 - Access Request Training Verification: ● 2024- Training and Verification a) 2024: (not defined) 12. List the settings that are set and their values for Parameter Group 20 - Access Request Business Roles: ● 4011- Delete the Technical Roles if part of the Business Role ● 4016 - Consider only the approved/completed version of business role for provisioning ● 4019 - Do not copy manual role assignment changes during repository sync ● 4022 - Future dated assignments sync is mandatory a) 4011: NO b) 4016: YES c) 4019: NO d) 4022: YES 13. List the settings that are set and their values for Parameter Group 22 - Access Request Validations: ● 5021 - Check manager value against the user ID in current system ● 5022 - Consider the password change in access request ● ● ● 5023 - Consider details from multiple data sources for missing user details in access request 5024 - Enable in-line editing for User group and Parameter in Access request 5026 - Make system and provisioning actions visible for filtering user assignments for model users ● 5027 - Default value for filtering by System ● 5028 - Default value for filtering by provisioning action © Copyright. All rights reserved. 116 Solution 13: Review Parameter Settings for Provisioning and Managing Users a) 5021: YES b) 5022: NO c) 5023: YES d) 5024: NO e) 5026: NO f) 5027 - 5028: (not defined) 14. List the settings that are set and their values for Parameter Group 23 - Simplified Access Request: ● 5031 - Enable "Open in Advanced Mode" option ● 5032 - Disable Type-ahead search in Simplified Access Request a) 5031: YES b) 5032: NO 15. Review additional configuration areas for Provisioning and Managing Users under the User Provisioning Node in IMG. ● Maintain Service Level Agreements What Service Level Agreements (SLAs) are configured? What are the options for determining the SLA time frame? ● Define Request Types How many request types are configured? To which MSMP process is the request type Role Approval assigned? ● Maintain Priority Configuration How many priorities have been configured? To which MSMP process have they been assigned? ● Define Number Range for Provisioning Requests What is the end number for the first number range? ● Maintain Provisioning Settings What are the options for Password Expiry for ORAAPPS? What are the fields available for System Provisioning Configuration? Review other areas of the User Provisioning node: ● Maintain Settings for HR Trigger ● Define Employee Types ● Maintain Number Range Intervals for Provisioning Requests ● Maintain User Defaults © Copyright. All rights reserved. 117 Unit 8: User Provisioning ● Maintain Password Self Service ● Maintain CUA Settings ● Activate End User Logon Note: For the Steps below, choose the IMG Activity listed and review the items. When finished with the review choose Back. Do not change any values. a) Maintain Service Level Agreements: No Service Level Agreements (SLAs) are configured. SLA time frame options are: ● Fixed by number of days ● Fixed by Date ● Formula b) Define Request Types: There are 20 request types configured: ● 1 - New Account ● 2 - Change Account ● 3 - Delete Account ● 4 - Lock Account ● 5 - Unlock Account ● 6 - Emergency Access ● 9 - Role Reaffirm ● 10 - SOD Review ● 11 - UAR Review ● 12 - Create Risk ● 13 - Update Risk ● 14 - Delete Risk ● 15 - Create Function ● 16 - Update Function ● 17 - Delete Function ● 18 - Create Mitigation Assignment © Copyright. All rights reserved. 118 Solution 13: Review Parameter Settings for Provisioning and Managing Users ● 19 - Update Mitigation Assignment ● 20 - Delete Mitigation Assignment ● 21 - Role Approval ● 22 - Information The request type Role Approval is assigned to the SAP_GRAC_ROLE_APPR MSMP process. c) Maintain Priority Configuration: 10 Priorities have been configured: ● 1 - Control Maintenance ● 2 - High - Risk Approval ● 3 - High - Function Maintenance ● 4 - High - Control Assignment ● 5 - High - Role Approval ● 6 - High - UAR ● 7 - High - SOD Review ● 8 - High - Firefight ID Review ● 9 - Low - Access Request ● 10 - Medium - Access Request ● 11 - High - Access Request MSMP process assignments are: ● 1 - SAP_GRAC_CONTROL_MAINT ● 2 - SAP_GRAC_RISK_APPR ● 3 - SAP_GRAC_FUNC_APPR ● 4 - SAP_GRAC_CONTROL_ASGN ● 5 - SAP_GRAC_ROLE_APPR ● 6-8 - SAP_GRAC_ACCESS_REQUEST ● 9 - SAP_GRAC_USER_ACCESS_REVIEW ● 10 - SAP_GRAC_SOD_RISK_REVIEW d) Define Number Range for Provisioning Requests: The end number for the first number range is 9999999999. e) Maintain Provisioning Settings: Password Expiry for ORAAPPS options are as follows: © Copyright. All rights reserved. 119 Unit 8: User Provisioning ● ACSS - Accesses ● DAYS - Days ● NONE - None Available System Provisioning Configuration fields include the following: ● Target Connector - Specific Connector for Settings ● Auto Prov - Auto Provisioning ● Ind Prov - Indirect Provisioning Type ● Role Prov - Role Provisioning Type ● Pwd Expire - Password Expiry for ORAAPPS ● Password Expiration Value - Value for Expiry for ORAAPPS ● ImmProvisn - Provisioning Effective Immediately ● Role Delim (1) - Role Delimit Years ● Role Delim (2) - Role Delimit Months ● Role Delim (3) - Role Delimit Days ● Account Va (1) - Account Validation Check ● Account Va (2) - Account Validation ● Role Assign - Create User for Role Assign Action ● CreateUser - Create User for Change User Action ● Deactivate - Deactivate Password f) Review other areas of the User Provisioning node as you want. g) Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 120 Unit 9 Exercise 14 Maintain Owners for Role Management Business Example You are a system administrator. You have been asked to create owners for roles. You have been asked to maintain Role Owners in Central Owner Maintenance. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign users in Access Control Owners for Role Management. Use the following data: Owner Type ACROLEOWN## Select Type Role Owner ACROLEAPP## Select Type Role Owner © Copyright. All rights reserved. 121 Unit 9 Solution 14 Maintain Owners for Role Management Business Example You are a system administrator. You have been asked to create owners for roles. You have been asked to maintain Role Owners in Central Owner Maintenance. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign users in Access Control Owners for Role Management. Use the following data: Owner Type ACROLEOWN## Select Type Role Owner ACROLEAPP## Select Type Role Owner a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Access Control Owners. b) On the Central Owner screen, choose Create. c) In the Owner field, choose Search. d) On the Select User dialog box, in the Find field, enter AC*##. e) Choose Go. f) In the Available table, choose ACROLEOWN##. g) Choose OK. h) On the Owner Assignment: New screen, in the Owner Type section, choose Role Owner. i) In the Comment Column enter Role Owner Maintenance for GRC Training Course Group ##. j) Choose Save. k) Choose Close. l) Repeat steps b - k for the other owners. m) Close the Central Owner browser tab. © Copyright. All rights reserved. 122 Unit 9 Exercise 15 Maintain Default Owners with Condition Group Business Example You are a system administrator. You have been asked to review the default owners based on criteria that are entered in BRFplus. The user can be the Assignment Approver, the Role Content Approver, or both. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Review the role owners that have been defined as default based upon conditions. © Copyright. All rights reserved. 123 Unit 9 Solution 15 Maintain Default Owners with Condition Group Business Example You are a system administrator. You have been asked to review the default owners based on criteria that are entered in BRFplus. The user can be the Assignment Approver, the Role Content Approver, or both. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Review the role owners that have been defined as default based upon conditions. a) On the SAP Fiori Launchpad, in the BRM Administration tile group, choose Role Owners. b) Review information displayed in the query. The Condition Group IDs are the same ones that is associated with the BRF+ Approvers Rule rule results. Note: In the next exercise, you will review the BRF+ application referred noted in this step. c) Close the Role Owner Criteria browser tab. © Copyright. All rights reserved. 124 Unit 9 Exercise 16 Review Configuration Settings for Condition Groups Business Example You are a system administrator. You have been asked to review configuration settings so that you can assign condition groups to BRFplus function. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control configuration settings Role Management. 2. Review the configuration in SAP Access Control for Condition Groups. 3. In the command box, execute transaction /NBRF+. A new window will open that will show the BRFplus Workbench. BRFplus is a tool to analyze attributes and return a result. This result is returned to the requesting program. 4. Review the BRF+ application ZBRM_METHODOLOGY_AND_APPROVER. 5. Close the BRFplus Workbench browser window that was opened. © Copyright. All rights reserved. 125 Unit 9 Solution 16 Review Configuration Settings for Condition Groups Business Example You are a system administrator. You have been asked to review configuration settings so that you can assign condition groups to BRFplus function. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control configuration settings Role Management. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG. c) Choose Governance, Risk and Compliance → Access Control → Role Management → Assign Condition Groups to BRFplus Functions. d) Remain on this screen for the next step. 2. Review the configuration in SAP Access Control for Condition Groups. a) On the Change View "Condition group type to BRFplus assgnment": Overview screen, review the data listed in the table. The Condition Groups shown are APPROVER and METHODOLOGY. For each of the Condition Groups, the associated BRF+ Application and Function is listed. In this case these are listed by the NAMES of the objects in BRF+ instead of the Object ID. 3. In the command box, execute transaction /NBRF+. A new window will open that will show the BRFplus Workbench. BRFplus is a tool to analyze attributes and return a result. This result is returned to the requesting program. 4. Review the BRF+ application ZBRM_METHODOLOGY_AND_APPROVER. a) In the navigation panel, choose Search. b) In the Search dialog box, search for Application Name with is equal to with criteria ZBRM* and Object Type with is equal to with criteria Application. c) Choose Search. The BRF application will now display in the navigation area. d) On the Business Rule Framework plus screen, in the Search Results navigation panel, choose ZBRM_METHODOLOGY_AND_APPROVER → Expression → Decision Table → ZBRM_APPROVERS - Decision Table. © Copyright. All rights reserved. 126 Solution 16: Review Configuration Settings for Condition Groups e) Review the role approvers decision table that has been previously configured. In the GRAC_CNDGP (Condition Group ID) column, you can see the Condition Groups that you reviewed in the previous exercise for default role owners. f) On the Business Rule Framework plus screen, in the Search Results navigation panel, choose ZBRM_METHODOLOGY_AND_APPROVER → Expression → Decision Table → ZBRM_METHODOLOGY - Decision Table. g) Review the role methodology decision table that has been previously configured. In the GRAC_CNDGP (Condition Group ID) column, you can see the Condition Groups that you will review in an upcoming exercise for determining the role methodology steps. 5. Close the BRFplus Workbench browser window that was opened. © Copyright. All rights reserved. 127 Unit 9 Exercise 17 Define Methodology Process and Steps Business Example You are a system administrator. You have been asked to review role methodology and the associated phases and their sequence. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control configuration settings Design and Manage Roles. 2. Review the Role Methodology Processes that have been configured in SAP Access Control for Role Management. © Copyright. All rights reserved. 128 Unit 9 Solution 17 Define Methodology Process and Steps Business Example You are a system administrator. You have been asked to review role methodology and the associated phases and their sequence. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control configuration settings Design and Manage Roles. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG c) Choose Governance, Risk and Compliance → Access Control → Role Management → Define Methodology Process and Steps. 2. Review the Role Methodology Processes that have been configured in SAP Access Control for Role Management. a) On the Change View "Define Methodology Process:" Overview screen, in the navigation panel, double-click Define Step. These are the steps that can be included in the Role Methodology. These are not customizable except for the Phase Description. b) In the navigation panel, double-click Define Methodology Process to view the configured role maintenance methodologies and which one is the default. These are the configured methodologies for Role Management. The Default Methodology is delivered in a BC Set by SAP. c) Choose the box to the left of 1 to select the line for the Default Methodology. d) In the navigation panel, double-click Methodology Process Step. e) In the navigation panel, double-click Define Methodology Process. f) Repeat steps d - e to review each of the configured methodologies. g) Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 129 Unit 9 Exercise 18 Associate Role Methodology Process to Condition Group Business Example You are a system administrator. You have been asked to review settings for associating role methodologies to condition groups. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Design and Manage Roles. 2. In a previous exercise, you reviewed the BRF+ application ZBRM_METHODOLOGY_AND_APPROVER. In the ZBRM_METHODOLOGY decision table, a condition group value would be returned. Review the IMG Activity Associate Methodology Process to Condition Group to determine which methodology is triggered with each condition group. 3. Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 130 Unit 9 Solution 18 Associate Role Methodology Process to Condition Group Business Example You are a system administrator. You have been asked to review settings for associating role methodologies to condition groups. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Design and Manage Roles. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /nSPRO, then choose SAP Reference IMG. c) Choose Governance, Risk and Compliance → Access Control → Role Management → Associate Methodology Process to Condition Group 2. In a previous exercise, you reviewed the BRF+ application ZBRM_METHODOLOGY_AND_APPROVER. In the ZBRM_METHODOLOGY decision table, a condition group value would be returned. Review the IMG Activity Associate Methodology Process to Condition Group to determine which methodology is triggered with each condition group. a) On theChange View "Maintenance view for Condition Group - Methodology Assig screen, note the Condition Group ID and assigned Methodology. 3. Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 131 Unit 9 Exercise 19 Create a Single Role Business Example You are a system administrator. You have been asked to create a single (technical) role. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the Role Maintenance application. Change the Role query to remove the 100 result limit. 2. Create a new Single Role and enter the role definition using the data in the following table: Field Value Application Type SAP Landscape ZMG 800 Landscape Business Process Basis Subprocess SEC - Security Project Release ZMG PRD ROLE Finalize Role Name so that it shows as Z:S_ZMG_BS_SE_SIN_ROLE_GRP## Description Single Role Maintenance for GRC Training Course Group ## Profile Name and Description Leave blank 3. Enter the role properties using the data from the following table: Field Value Critical Level Medium Sensitivity Normal Derivation Allowed NO 4. Apply the Functional Area BASIS to the role. 5. Apply Company 0001 to the role. 6. Apply the Role Prerequisite CERT305 to the role. Do not verify on request submission. 7. Apply the Role Owners and Role Approvers to the role using the data in the following table. © Copyright. All rights reserved. 132 Exercise 19: Create a Single Role User Assignment Approver Role Content Approver ACROLEOWN## Enabled Enabled ACROLEAPP## Enabled NOT Enabled GRC300-## Enabled Enabled 8. Enter the additional role details. 9. Enter Detailed Description for the role: This role was created by Training Participant Group ##. 10. Enter Provisioning information for the role. The role status should be Under Development. For System ZMGCLNT800, Provisioning and Auto-provisioning should be allowed. 11. Review the Role Management Change Log. 12. Save your work and proceed to the next phase - Maintain Authorizations. 13. Configure role authorization data, and assign the transactions in the following list to the role. XK01 XK02 XK03 FB60 MIRO Note: Use your user ID GRC300–## and password to log into ZMG system. 14. Synchronize PFCG role data to SAP Access Control. 15. Save your work and proceed to the next phase - Analyze Access Risks 16. Analyze the role for access risks. 17. Save your work and proceed to the next phase - Derive Role 18. Since this role is not allowed for derivation, save your work and proceed to the next phase - Request Approval. 19. Initiate Role Approval Request, and enter the following reason: Training Course Group ##. 20. Approve the Role Approval request with the following comment: Approved Training Request Group ##. 21. Generate role profile. 22. Save your work and proceed to the next phase - Maintain Test Cases 23. Maintain Test Case information using the following data: © Copyright. All rights reserved. 133 Unit 9: Role Design and Management Table 13: Test Results Data Field Value (Test Case) Name: Single Role Test Case (Test Case) Description: Test for GRC Training Single Role Tested by: Use Default Value Date/Time: Use Default Value Table 14: Add Link Data Field Value Title: Single Test Results Path: www.sap.com 24. Save your work and proceed to the final phase - Complete 25. Set role to In Productive Use status. 26. Review the Role Management Change Log. 27. Review the PFCG Change Log. Note: Use your user ID GRC300–## and password to log into ZMG system. © Copyright. All rights reserved. 134 Unit 9 Solution 19 Create a Single Role Business Example You are a system administrator. You have been asked to create a single (technical) role. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the Role Maintenance application. Change the Role query to remove the 100 result limit. a) On the SAP Fiori Launchpad home screen, in the BRM Administration tile group, choose Role Maintenance. b) On the ERM Role screen, choose Change Query. c) On the Change Query 'Role' (Object Type: Role Search) screen, in the Result rows field, delete any entry that exists. d) Choose Apply. e) Remain on this screen for the next step. 2. Create a new Single Role and enter the role definition using the data in the following table: Field Value Application Type SAP Landscape ZMG 800 Landscape Business Process Basis Subprocess SEC - Security Project Release ZMG PRD ROLE Finalize Role Name so that it shows as Z:S_ZMG_BS_SE_SIN_ROLE_GRP## Description Single Role Maintenance for GRC Training Course Group ## Profile Name and Description Leave blank a) On the ERM Role screen, choose Create → Single Role. b) On the New Single Role screen, in the Define Role tab, choose the Details sub-tab, enter the data from the table using the drop-down lists. © Copyright. All rights reserved. 135 Unit 9: Role Design and Management c) After entering all other data, maintain the Role Name field as noted in the table by replacing the hash marks. 3. Enter the role properties using the data from the following table: Field Value Critical Level Medium Sensitivity Normal Derivation Allowed NO a) On the New Single Role screen, in the Define Role tab, choose the Properties sub-tab, enter the data from the table using the drop-down lists. 4. Apply the Functional Area BASIS to the role. a) On the New Single Role screen, in the Define Role tab, choose the Functional Area subtab. b) In the List of Functional Areas section, choose Add. c) In the open row, in the Functional Area field, choose Search. d) In the Available section, choose the Functional Area BASIS. e) Choose Add (single right arrow) to move it to the Selected section. f) Choose OK. 5. Apply Company 0001 to the role. a) On the New Single Role screen, in the Define Role tab, choose the Company sub-tab. b) In the List of Companies section, choose Add. c) In the open row, in the Company field, choose Search. d) In the Available section, choose Company 0001. e) Choose Add (single right arrow) to move it to the Selected section. f) Choose OK. 6. Apply the Role Prerequisite CERT305 to the role. Do not verify on request submission. a) On the New Single Role screen, in the Define Role tab, choose the Prerequisite sub-tab. b) In the Role Prerequisites section, choose Add. c) In the open row, in the Role Prerequisite Name field, choose Search. d) In the Available section, choose CERT305. e) Choose Add (single right arrow) to move it to the Selected section. f) Choose OK. g) In the Verify on Request field, choose No. h) In the Active field, select the checkbox to enable. © Copyright. All rights reserved. 136 Solution 19: Create a Single Role i) On the New Single Role screen, choose Save to save your work and remain in the same phase. Result: The screen will change from New Single Role to Single Role: <Role Name>. 7. Apply the Role Owners and Role Approvers to the role using the data in the following table. User Assignment Approver Role Content Approver ACROLEOWN## Enabled Enabled ACROLEAPP## Enabled NOT Enabled GRC300-## Enabled Enabled a) On the Single Role: <Role Name> screen, in the Define Role tab, choose the Owners/ Approvers sub-tab. b) In the List of Approvers section, choose Add. c) In the open row, in the User field, choose Search. d) In the Search: User dialog screen, in the Owner field, enter search criteria. e) Choose Go. f) Choose the User from the table. g) Assign Assignment Approver and Role Content owner as noted in the table. h) Repeat sub-steps b - g for each user in the table. 8. Enter the additional role details. a) On the Single Role: <Role Name> screen, choose the Additional Details tab. 9. Enter Detailed Description for the role: This role was created by Training Participant Group ##. a) On the Single Role: <Role Name> screen, in the Additional Details tab, choose the Detailed Description sub-tab. b) In the Detailed Description text box, enter This role was created by Training Participant Group ##. 10. Enter Provisioning information for the role. The role status should be Under Development. For System ZMGCLNT800, Provisioning and Auto-provisioning should be allowed. a) On the Single Role: <Role Name> screen, in the Additional Details tab, choose the Provisioning sub-tab. b) In the Role Status field, choose Under Development from the drop down list. c) In the Systems section, in the Provisioning Allowed and Allow Auto-provisioning fields, choose Yes. © Copyright. All rights reserved. 137 Unit 9: Role Design and Management Note: If no systems appear in the Provisioning tab, choose Save, then Close. On the ERM Role screen, select your role and choose Open and return to Additional Details → Provisioning. d) Chose Save. 11. Review the Role Management Change Log. a) On the Single Role: <Role Name> screen, in the Additional Details tab, choose the Change History sub-tab. b) In the Results List, review change log entries. 12. Save your work and proceed to the next phase - Maintain Authorizations. a) On the Single Role: <Role Name> screen, choose the Define Role tab. b) ChooseSave & Continue to save your work and to continue to the next phase - Maintain Authorizations. 13. Configure role authorization data, and assign the transactions in the following list to the role. XK01 XK02 XK03 FB60 MIRO Note: Use your user ID GRC300–## and password to log into ZMG system. a) On the Single Role: <Role Name> screen, in the Maintain Authorizations tab, choose the Maintain Authorization Data sub-tab. b) Choose Maintain Authorization Data. c) If an open or save Launch-PFCG.sap dialog appears, choose Open. d) On the SAP GUI Shortcut - Logon (ZMG, 800, EN, *PFCG) screen, enter GRC300–## and password. e) Choose Log On. Result: The ZMG Client 800 Role Maintenance screen displays. f) On the Change Roles screen, choose the Menu tab. g) Choose Transaction, and enter the transaction codes provided in the step. h) Choose Assign Transactions. Result: The transactions will appear in the Hierarchy section. © Copyright. All rights reserved. 138 Solution 19: Create a Single Role i) Choose the Authorizations tab, and choose Change Authorization Data. Result: The Save the Role dialog appears. j) On the Save the Role dialog , choose Yes. k) On the Define Organizational Levels dialog, for Account Type, choose Add Values. l) Choose Full Authorization to populate wild cards for the organizational levels. m) On the Define Organizational Levels dialog , choose Save. n) On the Change Role: Authorizations screen, double click the yellow triangle after the role name. On the Assign Full Authorization for Subtree dialog, choose Enter. o) Choose Generate, and then choose Enter. p) Choose Back to exit Role Maintenance screens and log off the ZMG system. 14. Synchronize PFCG role data to SAP Access Control. a) On the Single Role: <Role Name> screen, choose Sync. with PFCG. Result: The Date/Time attributes are now displayed. 15. Save your work and proceed to the next phase - Analyze Access Risks a) On the Single Role: <Role Name> screen, choose the Maintain Authorizations tab. b) Choose Save & Continue to save your work and to continue to the next phase - Analyze Access Risks. 16. Analyze the role for access risks. a) On the Single Role: <Role Name> screen, on the Analyze Access Risks tab, in the Analysis Criteria section, choose Analysis Type: Risk Analysis, System: ZMGCLNT800, Rule Set: GLOBAL. b) In the Result Options section, choose Format: Summary, Type: Action, Permission, Critical Action. Note: Since this is a new role, the Impact Analysis Criteria section is grayed out as this role cannot have been assigned. c) Choose Foreground. d) Review data results. Choose different Types and Formats to review additional data. 17. Save your work and proceed to the next phase - Derive Role a) On the Single Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Derive Role. 18. Since this role is not allowed for derivation, save your work and proceed to the next phase - Request Approval. a) On the Single Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Request Approval. 19. Initiate Role Approval Request, and enter the following reason: Training Course Group ##. © Copyright. All rights reserved. 139 Unit 9: Role Design and Management a) Choose Initiate Approval Request. b) In the Approval Request dialog screen, In the Request Reason box, enter Training Course Group ##. c) Choose OK. Result: The Request Status will appear as PENDING. d) On the Single Role: <Role Name> screen, choose Close. e) Close the ERM Role browser tab. 20. Approve the Role Approval request with the following comment: Approved Training Request Group ##. a) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Work Inbox. b) Choose the subject Role Approval required for role <Role Name> to open the work item. c) On the Role Approval for <Role Name> screen, review the data, then choose Approve. d) Click the Role Name to display the role details. e) On the Single Role: <Role Name> screen, choose Close. f) If requested, in the Approver Comments dialog box, enter comments Approved Training Request Group ##. g) Choose OK. h) Choose Close. i) Close the Work Inbox browser window. j) On the SAP Fiori Launchpad home screen, in the BRM Administration tile group, choose Role Maintenance. Result: On the ERM Role screen, the Current Phase of your role should be Generate Roles. 21. Generate role profile. a) On the ERM Role screen, select the checkbox for your role, then choose Open. b) On the Single Role: <Role Name> screen, on the Generate Roles tab, choose Generate. c) On the Role Generation screen, in the Select System & Role step, verify the correct default system for role generation (ZMGCLNT800). d) Choose Next. e) In the Schedule step screen, select Foreground. f) In the Backend Password field, enter the password for the default system. Enter Welcome1. g) Choose Next. h) On the Confirmation step screen, confirm successful role generation. i) Choose Close. © Copyright. All rights reserved. 140 Solution 19: Create a Single Role 22. Save your work and proceed to the next phase - Maintain Test Cases a) On the Single Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Maintain Test Cases. 23. Maintain Test Case information using the following data: Table 13: Test Results Data Field Value (Test Case) Name: Single Role Test Case (Test Case) Description: Test for GRC Training Single Role Tested by: Use Default Value Date/Time: Use Default Value Table 14: Add Link Data Field Value Title: Single Test Results Path: www.sap.com a) On the Single Role: <Role Name> screen, on the Maintain Test Cases tab, choose Create. b) On the Test Results dialog screen, enter the data provided in the table, Test Results Data. c) Choose Add → Add Link. d) On the Add Link dialog screen, enter the data provided in the table, Add Link Data. e) Choose OK. f) Choose Save. Result: The test case should now appear in the Test Results section. 24. Save your work and proceed to the final phase - Complete a) On the Single Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Complete b) Verify Complete phase is active in the guided activity ribbon. 25. Set role to In Productive Use status. a) On the Single Role: <Role Name> screen, choose Go To Phase → Define Role. b) Choose the Additional Details tab, then choose the Provisioning sub-tab. c) In the Role Status field, choose In Productive Use. d) Choose Save. 26. Review the Role Management Change Log. © Copyright. All rights reserved. 141 Unit 9: Role Design and Management a) On the Single Role: <Role Name> screen, in the Additional Details tab, choose the Change History sub-tab. b) In the Results List, review change log entries. 27. Review the PFCG Change Log. Note: Use your user ID GRC300–## and password to log into ZMG system. a) On the Single Role: <Role Name> screen, in the Additional Details tab, choose the PFCG Change History sub-tab. b) In the View PFCG History section, under List of Systems, choose ZMGCLNT800. c) If an Launch-PFCG.sap dialog appears, choose Open. Note: This may appear in the lower left corner of the browser window. d) On the SAP GUI Shortcut - Logon (ZMG, 800, EN, *PFCG) screen, enter the user ID and password provided in the step. e) Choose Log On. f) On the Display Change Documents for Role Administration screen, choose Execute. Note: If no information appears, choose Back to the selection screen. Check the From Date field and change if needed to Current Date. Choose Execute. Note: For additional information, you can choose a different Change Documents category and execute the report again. g) Review the PFCG change log. h) In the Command box, enter /nEX. i) On the Single Role: <Role Name> screen, choose Close. j) Close the ERM Role browser tab. © Copyright. All rights reserved. 142 Unit 9 Exercise 20 Create a Composite Role Business Example You are a system administrator. You have been asked to create a composite role. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the Role Maintenance application. 2. Enter the composite role definition using the following data: Field Value Application Type SAP Landscape ZMG 800 Landscape Business Process Basis Subprocess SEC - Security Project Release ZMG PRD ROLE Finalize Role Name so that it shows as Z:C_ZMG_BS_SE_COM_ROLE_GRP## Description Composite Role Maintenance for GRC Training Course Group ## Profile Name and Description Leave blank 3. Enter the role properties using the data from the following table: Field Value Critical Level: High Sensitivity: Restricted Comments Mandatory: Enabled 4. Apply the Functional Area BASIS to the role. 5. Apply Company 0001 to the role. 6. Add single roles to composite role. Add the role Z:S_ZMG_BS_SE_SIN_ROLE_GRP## to this composite role. 7. Apply the role Owners / Approvers using the data in the following table: © Copyright. All rights reserved. 143 Unit 9: Role Design and Management User Assignment Approver Role Content Approver ACROLEOWN## Enabled Enabled ACROLEAPP## Enabled NOT Enabled GRC300-## Enabled Enabled 8. Enter the additional role details. 9. Enter Detailed Description for the role: This role was created by Training Participant Group ##. 10. Enter Provisioning information for the role. The role status should be Under Development. For System ZMGCLNT800, Provisioning and Auto-provisioning should be allowed. 11. Review the Role Management Change Log. 12. Save your work and proceed to the next phase - Analyze Access Risks 13. Analyze the role for access risks. 14. Save your work and proceed to the next phase - Request Approval. 15. Initiate Role Approval Request, and enter the following reason: Training Course Group ##. 16. Approve the Role Approval request with the following comment: Approved Training Request Group ##. 17. Use the Generate Roles phase to push data for the Composite Role to the target system. 18. Maintain Test Case information using the following data: Table 15: Test Results Data Field Value (Test Case) Name: Composite Role Test Case (Test Case) Description: Test for GRC Training Composite Role Tested by: Use Default Value Date/Time: Use Default Value Table 16: Add Link Data Field Value Title: Composite Test Results Path: www.sap.com 19. Save your work and proceed to the final phase - Complete 20. Set role to In Productive Use status. © Copyright. All rights reserved. 144 Exercise 20: Create a Composite Role 21. Review the Role Management Change Log. 22. Review the PFCG Change Log. Note: Use your user ID GRC300–## and password to log into ZMG system. © Copyright. All rights reserved. 145 Unit 9 Solution 20 Create a Composite Role Business Example You are a system administrator. You have been asked to create a composite role. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the Role Maintenance application. a) On the SAP Fiori Launchpad home screen, in the BRM Administration tile group, choose Role Maintenance. b) On the ERM Role screen, choose Create → Composite Role. 2. Enter the composite role definition using the following data: Field Value Application Type SAP Landscape ZMG 800 Landscape Business Process Basis Subprocess SEC - Security Project Release ZMG PRD ROLE Finalize Role Name so that it shows as Z:C_ZMG_BS_SE_COM_ROLE_GRP## Description Composite Role Maintenance for GRC Training Course Group ## Profile Name and Description Leave blank a) On the New Composite Role screen, in the Define Role tab, choose the Details sub-tab, enter the data from the table using the drop-down lists when available. b) After entering all other data, enter the Role Name field as noted in the table by replacing the hash marks. c) Remain on this screen for the next step. 3. Enter the role properties using the data from the following table: Field Value Critical Level: High © Copyright. All rights reserved. 146 Solution 20: Create a Composite Role Field Value Sensitivity: Restricted Comments Mandatory: Enabled a) On the New Composite Role screen, in the Define Role tab, choose the Properties subtab, enter the data from the table using the drop-down lists. b) Remain on this screen for the next step. 4. Apply the Functional Area BASIS to the role. a) On the New Composite Role screen, in the Define Role tab, choose the Functional Area sub-tab. b) In the List of Functional Areas section, choose Add. c) In the open row, in the Functional Area field, choose Search. d) In the Available section, choose the Functional Area BASIS. e) Choose Add (single right arrow) to move it to the Selected section. f) Choose OK. g) Remain on this screen for the next step. 5. Apply Company 0001 to the role. a) On the New Composite Role screen, in the Define Role tab, choose the Company subtab. b) In the List of Companies section, choose Add. c) In the open row, in the Company field, choose Search. d) In the Available section, choose Company 0001. e) Choose Add (single right arrow) to move it to the Selected section. f) Choose OK. g) On the New Composite Role screen, choose Save to save your work and remain in the same phase. The screen will change from New Composite Role to Composite Role: <Role Name>. h) Remain on this screen for the next step. 6. Add single roles to composite role. Add the role Z:S_ZMG_BS_SE_SIN_ROLE_GRP## to this composite role. a) On the Composite Role: <Role Name> screen, in the Define Role tab, choose the Roles sub-tab. b) In the List of Roles section, choose Add. c) In the Select Roles screen, enter Z:S_ZMG*## in the Role Name field, and then choose Search. © Copyright. All rights reserved. 147 Unit 9: Role Design and Management d) In the Available section, choose Z:S_ZMG_BS_SE_SIN_ROLE_GRP##, then choose Add(single down arrow) to move the role to the Selected section. e) Choose OK. f) Remain on this screen for the next step. 7. Apply the role Owners / Approvers using the data in the following table: User Assignment Approver Role Content Approver ACROLEOWN## Enabled Enabled ACROLEAPP## Enabled NOT Enabled GRC300-## Enabled Enabled a) On the Composite Role: <Role Name> screen, in the Define Role tab, choose the Owners/Approvers sub-tab. b) In the List of Approvers section, choose Add. c) In the open row, in the User field, choose Search. d) In the Search: User dialog, in the Owner field, enter AC*##. e) Choose Search. f) Choose the User from the data provided in the table. g) Assign Assignment Approver and Role Content owner from the data provided in the table. h) Repeat steps b - g for each user in the table. i) Remain on this screen for the next step. 8. Enter the additional role details. a) On the Composite Role: <Role Name> screen, choose the Additional Details tab. 9. Enter Detailed Description for the role: This role was created by Training Participant Group ##. a) On the Composite Role: <Role Name> screen, in the Additional Details tab, choose the Detailed Description sub-tab. b) In the Detailed Description text box, enter This role was created by Training Participant Group ##. c) Remain on this screen for the next step. 10. Enter Provisioning information for the role. The role status should be Under Development. For System ZMGCLNT800, Provisioning and Auto-provisioning should be allowed. a) On the Composite Role: <Role Name> screen, in the Additional Details tab, choose the Provisioning sub-tab. b) In the Role Status field, choose Under Development from the drop-down list. c) In the Systems section, in the Provisioning Allowed and Allow Auto-provisioning fields, choose Yes. © Copyright. All rights reserved. 148 Solution 20: Create a Composite Role Note: If no systems appear in the Provisioning tab, choose Save, then Close. On the ERM Role screen, select your role and choose Open. d) Chose Save to save your work and remain in the same phase. e) Remain on this screen for the next step. 11. Review the Role Management Change Log. a) On the Composite Role: <Role Name> screen, in the Additional Details tab, choose the Change History sub-tab b) In the Results List, review change log entries. c) Remain on this screen for the next step. 12. Save your work and proceed to the next phase - Analyze Access Risks a) On the Composite Role: <Role Name> screen, choose the Define Role tab. b) Choose Save & Continue to save your work and to continue to the next phase - Analyze Access Risks. c) Remain on this screen for the next step. 13. Analyze the role for access risks. a) On the Composite Role: <Role Name> screen, on the Analyze Access Risks tab, in the Analysis Criteria section, choose Analysis Type: Risk Analysis, System: ZMGCLNT800, Rule Set: GLOBAL. b) In the Result Options section, choose Format: Summary, Type: Permission, Critical Action. Note: Since this is a new role, the Impact Analysis Criteria section is grayed out as this role cannot have been assigned. c) Choose Foreground. d) Review data results. In the Result area, choose different Types and Formats to review additional data. 14. Save your work and proceed to the next phase - Request Approval. a) On the Composite Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Request Approval. b) Remain on this screen for the next step. 15. Initiate Role Approval Request, and enter the following reason: Training Course Group ##. a) Choose Initiate Approval Request. © Copyright. All rights reserved. 149 Unit 9: Role Design and Management b) In the Approval Request dialog screen, In the Request Reason box, enter Training Course Group ##. c) Choose OK. Result: The Request Status will appear as PENDING. d) Choose Close. e) Choose Home to return to the SAP Fiori Launchpad home page. 16. Approve the Role Approval request with the following comment: Approved Training Request Group ##. a) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Work Inbox. b) Choose the subject Role Approval required for role <Role Name> to open the work item. c) On the Role Approval for <Role Name> screen, review the data, then choose Approve. d) Click the Role Name to display the role details. e) On the Composite Role: <Role Name> screen, choose Close. f) On the Role Approval for <Role Name> screen, choose the Approve. g) Choose Close. h) Choose Home to return to the SAP Fiori Launchpad home page. i) On the SAP Fiori Launchpad home screen, in the BRM Administration tile group, choose Role Maintenance. Result: On the ERM Role screen, the Current Phase of your role should be Generate Roles. 17. Use the Generate Roles phase to push data for the Composite Role to the target system. a) On the ERM Role screen, select the checkbox for your role, then choose Open. b) On the Composite Role: <Role Name> screen, on the Generate Roles tab, choose Generate. c) On the Role Generation screen, in the Select System & Role step, verify the correct default system for role generation (ZMGCLNT800). d) Choose Next. e) In the Schedule step screen, select Foreground. f) In the Backend Password field, enter the password for the default system. Enter Welcome1. g) Choose Next. h) On the Confirmation step screen, confirm successful role generation. i) Choose Close. j) On the Composite Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Maintain Test Cases. © Copyright. All rights reserved. 150 Solution 20: Create a Composite Role k) Remain on this screen for the next step. 18. Maintain Test Case information using the following data: Table 15: Test Results Data Field Value (Test Case) Name: Composite Role Test Case (Test Case) Description: Test for GRC Training Composite Role Tested by: Use Default Value Date/Time: Use Default Value Table 16: Add Link Data Field Value Title: Composite Test Results Path: www.sap.com a) On the Composite Role: <Role Name> screen, on the Maintain Test Cases tab, choose Create. b) On the Test Results dialog screen, enter the data provided in the table, Test Results Data. c) Choose Add → Add Link. d) On the Add Link dialog screen, enter the data provided in the table, Add Link Data. e) Choose OK. f) Choose Save. Result: The test case should now appear in the Test Results section. g) Remain on this screen for the next step. 19. Save your work and proceed to the final phase - Complete a) On the Composite Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Complete. Result: Your role should now be in the Complete phase. b) Remain on this screen for the next step. 20. Set role to In Productive Use status. a) On the Composite Role: <Role Name> screen, choose Go To Phase → Define Role. b) Choose the Additional Details tab, then choose the Provisioning sub-tab. c) In the Role Status field, choose In Productive Use. d) Choose Save. © Copyright. All rights reserved. 151 Unit 9: Role Design and Management e) Choose Close. f) Remain on this screen for the next step. 21. Review the Role Management Change Log. a) On the Composite Role: <Role Name> screen, in the Additional Details tab, choose the Change History sub-tab. b) In the Results List, review change log entries. c) Remain on this screen for the next step. 22. Review the PFCG Change Log. Note: Use your user ID GRC300–## and password to log into ZMG system. a) On the Composite Role: <Role Name> screen, in the Additional Details tab, choose the PFCG Change History sub-tab. b) In the View PFCG History area, under List of Systems, choose ZMGCLNT800. c) If an Launch-PFCG.sap dialog appears, choose Open. Note: This may appear in the lower left corner of the browser window. d) On the SAP GUI Shortcut - Logon (ZMG, 800, EN, *PFCG) screen, enter ID GRC300–## and password. e) Choose Log On. f) On the Display Change Documents for Role Administration screen, choose Execute. Note: If no information appears, choose Back to the selection screen. Check the From Date field and change if needed to Current Date. Choose Execute. Note: For additional information, you can choose a different Change Documents category and execute the report again. g) Review the PFCG change log. h) In the Command box, enter /nEX. i) On the Composite Role: <Role Name> screen, choose Close. j) Choose Home to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 152 Unit 9 Exercise 21 Create a Business Role Business Example You are a system administrator. You have been asked to create a business role. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the Role Maintenance application. 2. Enter the business role definition using the following data: Field Value Application Type Business Roles Landscape Business Roles Business Process Basis Subprocess SEC - Security Project Release Business Roles Finalize Role Name so that it shows as Z:B_BUS_BS_SE_BUS_ROLE_GRP## Description Business Role Maintenance for GRC Training Course Group ## 3. Enter the role properties using the data from the following table. Field Value (same as Single Role exercise) Critical Level Medium Sensitivity Normal 4. Apply the Functional Area BASIS to the role. 5. Apply Company 0001 to the role. 6. Add roles to business role. Add the roles Z:S_ZMG_BS_SE_SIN_ROLE_GRP##, Z:FIN_ANALIQUIDITYPLAN_APP_## and Z:C_ZMG_BS_SE_COM_ROLE_GRP## to this business role. 7. Apply the Role Owners and Role Approvers to the role using the data in the following table. © Copyright. All rights reserved. 153 Unit 9: Role Design and Management User Assignment Approver Role Content Approver ACROLEOWN## Enabled Enabled ACROLEAPP## Enabled NOT Enabled GRC300-## Enabled Enabled 8. Enter the additional role details. 9. Enter Detailed Description for the role: This role was created by Training Participant Group ##. 10. Enter Provisioning information for the role. 11. Review the Role Management Change Log. 12. Save your work and proceed to the next phase - Analyze Access Risks. 13. Analyze the role for access risks. 14. Save your work and proceed to the next phase - Request Approval. 15. Initiate Role Approval Request, and enter the following reason: Training Course Group ##. 16. Approve the Role Approval request with the following comment: Approved Training Request Group ##. 17. Maintain Test Case information using the following data: Table 17: Test Results Data Field Value (Test Case) Name: Business Role Test Case (Test Case) Description: Test for GRC Training Business Role Tested by: Use Default Value Date/Time: Use Default Value Table 18: Add Link Data Field Value Title: Business Test Results Path: www.sap.com 18. Save your work and proceed to the final phase - Complete. 19. Set role to In Productive Use status. 20. Review the Role Management Change Log. © Copyright. All rights reserved. 154 Unit 9 Solution 21 Create a Business Role Business Example You are a system administrator. You have been asked to create a business role. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the Role Maintenance application. a) On the SAP Fiori Launchpad home screen, in the BRM Administration tile group, choose Role Maintenance. b) On the ERM Role screen, choose Create → Business Role. 2. Enter the business role definition using the following data: Field Value Application Type Business Roles Landscape Business Roles Business Process Basis Subprocess SEC - Security Project Release Business Roles Finalize Role Name so that it shows as Z:B_BUS_BS_SE_BUS_ROLE_GRP## Description Business Role Maintenance for GRC Training Course Group ## a) On the New Business Role screen, in the Define Role tab, choose the Details sub-tab, enter the data from the table using the drop-down lists. b) After entering all other data, maintain the Role Name field as noted in the table by replacing the hash marks. c) Remain on this screen for the next step. 3. Enter the role properties using the data from the following table. Field Value (same as Single Role exercise) Critical Level Medium © Copyright. All rights reserved. 155 Unit 9: Role Design and Management Field Value (same as Single Role exercise) Sensitivity Normal a) On the New Business Role screen, in the Define Role tab, choose the Properties subtab, enter the data from the table using the drop-down lists. b) Remain on this screen for the next step. 4. Apply the Functional Area BASIS to the role. a) On the New Business Role screen, in the Define Role tab, choose the Functional Area sub-tab. b) In the List of Functional Areas section, choose Add. c) In the open row, in the Functional Area field, choose Search. d) In the Available section, choose the Functional Area BASIS. e) Choose Add (single right arrow) to move it to the Selected section. f) Choose OK. g) Remain on this screen for the next step. 5. Apply Company 0001 to the role. a) On the New Business Role screen, in the Define Role tab, choose the Company sub-tab. b) In the List of Companies section, choose Add. c) In the open row, in the Company field, choose Search. d) In the Available section, choose Company 0001. e) Choose Add (single right arrow) to move it to the Selected section. f) Choose OK. g) Chose Save to save the data and remain in the current phase. h) Remain on this screen for the next step. 6. Add roles to business role. Add the roles Z:S_ZMG_BS_SE_SIN_ROLE_GRP##, Z:FIN_ANALIQUIDITYPLAN_APP_## and Z:C_ZMG_BS_SE_COM_ROLE_GRP## to this business role. a) On the Business Role: <Role Name> screen, in the Define Role tab, choose the Roles sub-tab. b) In the List of Roles section, choose Add. c) In the Select Roles screen, enter Z*## in the Role Name field, then choose Search d) In the Available section, choose Z:S_ZMG_BS_SE_SIN_ROLE_GRP##, Z:FIN_ANALIQUIDITYPLAN_APP_## and Z:C_ZMG_BS_SE_COM_ROLE_GRP##, then choose Add(single down arrow) to move the roles to the Selected section. e) Choose OK. f) Remain on this screen for the next step. © Copyright. All rights reserved. 156 Solution 21: Create a Business Role 7. Apply the Role Owners and Role Approvers to the role using the data in the following table. User Assignment Approver Role Content Approver ACROLEOWN## Enabled Enabled ACROLEAPP## Enabled NOT Enabled GRC300-## Enabled Enabled a) On the Business Role: <Role Name> screen, in the Define Role tab, choose the Owners/ Approvers sub-tab. b) In the List of Approvers section, choose Add. c) In the open row, in the User field, choose Search. d) In the Search: User dialog screen, in the Owner field, enter search criteria. e) Choose Go. f) Choose the User from the table. g) Assign Assignment Approver and Role Content owner as noted in the table. h) Repeat sub-steps b - g for each user in the table. i) Remain on this screen for the next step. 8. Enter the additional role details. a) On the Business Role: <Role Name> screen, choose the Additional Details tab. 9. Enter Detailed Description for the role: This role was created by Training Participant Group ##. a) On the Business Role: <Role Name> screen, in the Additional Details tab, choose the Detailed Description sub-tab. b) In the Detailed Description text box, enter This role was created by Training Participant Group ##. c) Remain on this screen for the next step. 10. Enter Provisioning information for the role. a) On the Business Role: <Role Name> screen, in the Additional Details tab, choose the Provisioning sub-tab. b) In the Role Status field, choose Under Development from the drop-down list c) On the Business Role: <Role Name> screen, choose Save to save your work and remain in the same phase. d) Remain on this screen for the next step. 11. Review the Role Management Change Log. a) On the Business Role: <Role Name> screen, in the Additional Details tab, choose the Change History sub-tab. b) In the Results List, review the change log entries. c) Remain on this screen for the next step. © Copyright. All rights reserved. 157 Unit 9: Role Design and Management 12. Save your work and proceed to the next phase - Analyze Access Risks. a) On the Business Role: <Role Name> screen, choose the Define Role tab. b) Choose Save & Continue to save your work and to continue to the next phase - Analyze Access Risks. c) Remain on this screen for the next step. 13. Analyze the role for access risks. a) On the Business Role: <Role Name> screen, on the Analyze Access Risks tab, in the Analysis Criteria section, choose Analysis Type: Risk Analysis and Rule Set: GLOBAL. Note: For the System designation, this will be determined by the roles that are contained in the Business Role. b) In the Result Options section, choose Format: Summary, Type: Action, Permission, Critical Action. Note: Since this is a new role, the Impact Analysis Criteria section is grayed out as this role cannot have been assigned. c) Choose Foreground. d) Review data results. In the Result area, choose different Types and Formats to review additional data. e) Remain on this screen for the next step. 14. Save your work and proceed to the next phase - Request Approval. a) On the Business Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Request Approval. b) Remain on this screen for the next step. 15. Initiate Role Approval Request, and enter the following reason: Training Course Group ##. a) Choose Initiate Approval Request. b) In the Approval Request dialog screen, In the Request Reason box, enter Training Course Group ##. c) Choose OK. Result: The Request Status will appear as PENDING. d) Choose Close. e) Choose Home to return to the SAP Fiori Launchpad home page. 16. Approve the Role Approval request with the following comment: Approved Training Request Group ##. © Copyright. All rights reserved. 158 Solution 21: Create a Business Role a) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Work Inbox. b) Choose the subject Role Approval required for role <Role Name> to open the work item. c) On the Role Approval for <Role Name> screen, review the data, then choose Approve. d) Click the Role Name to display the role details. e) On the Business Role: <Role Name> screen, choose Close. f) On the Role Approval for <Role Name> screen, choose the Approve. g) If needed, in the Approver Comments dialog box, enter comments Approved Training Request Group ##. h) Choose OK. i) Choose Close. j) Choose Home to return to the SAP Fiori Launchpad home page. k) On the SAP Fiori Launchpad home screen, in the BRM Administration tile group, choose Role Maintenance. Result: On the ERM Role screen, the Current Phase of your role should be Maintain Test Cases. 17. Maintain Test Case information using the following data: Table 17: Test Results Data Field Value (Test Case) Name: Business Role Test Case (Test Case) Description: Test for GRC Training Business Role Tested by: Use Default Value Date/Time: Use Default Value Table 18: Add Link Data Field Value Title: Business Test Results Path: www.sap.com a) On the Business Role: <Role Name> screen, on the Maintain Test Cases tab, choose Create. b) On the Test Results dialog screen, enter the data provided in the table, Test Results Data. c) Choose Add → Add Link. © Copyright. All rights reserved. 159 Unit 9: Role Design and Management d) On the Add Link dialog screen, enter the data provided in the table, Add Link Data. e) Choose OK. f) Choose Save. Result: The test case should now appear in the Test Results section. g) Remain on this screen for the next step. 18. Save your work and proceed to the final phase - Complete. a) On the Business Role: <Role Name> screen, choose Save & Continue to save your work and to continue to the next phase - Complete b) Verify Complete status appears. 19. Set role to In Productive Use status. a) On the Business Role: <Role Name> screen, choose Go To Phase → Define Role. b) Choose the Additional Details tab, then choose the Provisioning sub-tab. c) In the Role Status field, choose In Productive Use. d) Choose Save. e) Remain on this screen for the next step. 20. Review the Role Management Change Log. a) On the Business Role: <Role Name> screen, in the Additional Details tab, choose the Change History sub-tab. b) In the Results List, review change log entries. c) Choose Close. d) Choose Home to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 160 Unit 9 Exercise 22 Review Parameter Settings for Design and Manage Roles Business Example You are a system administrator. You have been asked to review the current and available configuration settings related to designing and managing roles. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Design and Manage Roles. 2. List the settings that are set and their values for Parameter Group 1 - Change Log: ● 1008 - Enable Role Change Log 3. List the settings that are set and their values for Parameter Group 5 - Workflow: ● 3022 - Request Type for Role Approval ● 3023 - Priority for Role Approval 4. List the settings that are set and their values for Parameter Group 10-Role Management: ● 3000 - Default Business Process ● 3001 - Default Subprocess ● 3002 - Default Critical Level ● 3003 - Default Project Release ● 3004 - Default Role Status ● 3005 - Reset Role Methodology when Changing Role Attributes ● 3006 - Allow add functions to an authorization ● 3007 - Allow editing organizational level values for derived roles ● 3008 - A ticket number is required after authorization data changes ● 3009 - Allow Role Deletion from Back End ● 3010 - Allow attaching files to the role definition © Copyright. All rights reserved. 161 Unit 9: Role Design and Management ● 3011 - Conduct Risk Analysis before Role Generation ● 3012 - Allow Role Generation on Multiple Systems ● 3013 - Used Logged-on user credentials for role generation ● 3014 - Allow role generation with Permission Level violations ● 3015 - Allow role generation with Critical Permission violations ● 3016 - Allow role generation with Action Level violations ● 3017 - Allow role generation with Critical Action violations ● 3018 - Allow role generation with Critical Role/Profile violations ● 3019 - Overwrite individual role's Risk Analysis result during Mass Risk Analysis run ● 3020 - Role certification reminder notification ● 3021 - Directory for mass role import server files ● 3024 - Enforce methodology process for derived roles during generation ● 3025 - Allow selection of Org. Value Maps without leading org ● 3026 - Save Role Provisioning Details while copying role ● 3027 - Automate authorization copy from master role to its new derived roles ● 3028 - Generate Derived roles after Creation/Update ● 3029 - Notify User when Business Role Assignment Changes ● 3030 - Initiate role approval request with mandatory Role content approver ● 3040 - A ticket number is required for all role changes ● 3041 Perform mandatory risk analysis during role maintenance ● 3042 - Do not allow role creation with risks ● 3043 - Default Connector for IDM GRC integration 5. List the settings that are set and their values for Parameter Group 5-Workflow: ● 3022 - Request Type for Role Approval ● 3023 - Priority for Role Approval 6. Choose Back to return to the Display IMG screen. 7. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Specify Naming Conventions. 8. Review the following settings related to Design and Manage Roles: How many naming conventions have been configured? What is the Connector Group attached to Naming Convention 3? © Copyright. All rights reserved. 162 Exercise 22: Review Parameter Settings for Design and Manage Roles There is a mismatch in configuration for the Naming Convention for Business Roles. What is it? What role attributes are used for Composite roles to create the Role ID? 9. Choose Back to return to the Display IMG screen. 10. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Maintain Project and Product Release Name. 11. Review the following settings related to Design and Manage roles: How many project releases have been configured? What is the Project Release ID and Description? 12. Choose Back to return to the Display IMG screen. 13. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Role Sensitivity. What is the description of Role Sensitivity ID 3? 14. Choose Back to return to the Display IMG screen. 15. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Maintain Role Status. What is the Role Status ID for "In Productive Use"? 16. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Specify Critical Level. What does the Critical Level for "VH" mean? 17. Choose Back to return to the Display IMG screen. 18. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Companies. What is the Company ID for the IDES Company? 19. Choose Back to return to the Display IMG screen. 20. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Maintain Functional Areas. What is the Functional Area ID for the Materials Management? What is the abbreviation for the Sales functional area? 21. Choose Back to return to the Display IMG screen. 22. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Organizational Value Maps. What is the parent organizational value for the IDES AG map? List Org Level (ID or Description) and the value. What is the value of Org Level LGNUM for this value map? 23. Choose Back to return to the Display IMG screen. 24. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Prerequisite Types. What is the description for prerequisite type CERTIF? © Copyright. All rights reserved. 163 Unit 9: Role Design and Management 25. Choose Back to return to the Display IMG screen. 26. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Role Prerequisites. What is the Course ID and description for the CERT role prerequisite? 27. Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 164 Unit 9 Solution 22 Review Parameter Settings for Design and Manage Roles Business Example You are a system administrator. You have been asked to review the current and available configuration settings related to designing and managing roles. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Design and Manage Roles. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG c) Choose Governance, Risk and Compliance → Access Control → Maintain Configuration Settings.. The AC Configuration Settings screen is displayed. These are the parameters that are configured for this particular instance of SAP Access Control. Remember, that some parameters do have a coded default in the GRACCONFIG table. If a parameter is not entered here, then the default will be applied. 2. List the settings that are set and their values for Parameter Group 1 - Change Log: ● 1008 - Enable Role Change Log a) 1008: Yes 3. List the settings that are set and their values for Parameter Group 5 - Workflow: ● 3022 - Request Type for Role Approval ● 3023 - Priority for Role Approval a) 3022: 21 b) 3023: 005 4. List the settings that are set and their values for Parameter Group 10-Role Management: ● 3000 - Default Business Process ● 3001 - Default Subprocess © Copyright. All rights reserved. 165 Unit 9: Role Design and Management ● 3002 - Default Critical Level ● 3003 - Default Project Release ● 3004 - Default Role Status ● 3005 - Reset Role Methodology when Changing Role Attributes ● 3006 - Allow add functions to an authorization ● 3007 - Allow editing organizational level values for derived roles ● 3008 - A ticket number is required after authorization data changes ● 3009 - Allow Role Deletion from Back End ● 3010 - Allow attaching files to the role definition ● 3011 - Conduct Risk Analysis before Role Generation ● 3012 - Allow Role Generation on Multiple Systems ● 3013 - Used Logged-on user credentials for role generation ● 3014 - Allow role generation with Permission Level violations ● 3015 - Allow role generation with Critical Permission violations ● 3016 - Allow role generation with Action Level violations ● 3017 - Allow role generation with Critical Action violations ● 3018 - Allow role generation with Critical Role/Profile violations ● 3019 - Overwrite individual role's Risk Analysis result during Mass Risk Analysis run ● 3020 - Role certification reminder notification ● 3021 - Directory for mass role import server files ● 3024 - Enforce methodology process for derived roles during generation ● 3025 - Allow selection of Org. Value Maps without leading org ● 3026 - Save Role Provisioning Details while copying role ● 3027 - Automate authorization copy from master role to its new derived roles ● 3028 - Generate Derived roles after Creation/Update ● 3029 - Notify User when Business Role Assignment Changes ● 3030 - Initiate role approval request with mandatory Role content approver ● 3040 - A ticket number is required for all role changes ● 3041 Perform mandatory risk analysis during role maintenance ● 3042 - Do not allow role creation with risks © Copyright. All rights reserved. 166 Solution 22: Review Parameter Settings for Design and Manage Roles ● 3043 - Default Connector for IDM GRC integration a) 3000 - 3003: (not defined) b) 3004: DEV c) 3005: NO d) 3006 - 3007: YES e) 3008 - 3009: NO f) 3010: YES g) 3011: NO h) 3012 - 3019: YES i) 3020: 1 j) 3021: (not defined) k) 3024: NO l) 3025: YES m) 3026: NO n) 3027 - 3029: YES o) 3030: (not defined) p) 3040: NO q) 3041: YES r) 3042: NO s) 3043: (not defined) 5. List the settings that are set and their values for Parameter Group 5-Workflow: ● 3022 - Request Type for Role Approval ● 3023 - Priority for Role Approval a) 3022: 21 b) 3023: 005 6. Choose Back to return to the Display IMG screen. 7. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Specify Naming Conventions. 8. Review the following settings related to Design and Manage Roles: How many naming conventions have been configured? What is the Connector Group attached to Naming Convention 3? There is a mismatch in configuration for the Naming Convention for Business Roles. What is it? What role attributes are used for Composite roles to create the Role ID? © Copyright. All rights reserved. 167 Unit 9: Role Design and Management a) Configured naming conventions: 10 b) Connector group attached: R3 (double-click on the naming convention) c) Mismatch: The maximum length for this role type is configured at 30 characters, but the role naming convention is configured to 40 characters. d) Role attributes for Composite Roles: Role Type, Business Process, Subprocess 9. Choose Back to return to the Display IMG screen. 10. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Maintain Project and Product Release Name. 11. Review the following settings related to Design and Manage roles: How many project releases have been configured? What is the Project Release ID and Description? a) Configured project releases: 5 b) Project Release ID and Description: PROD; Production 12. Choose Back to return to the Display IMG screen. 13. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Role Sensitivity. What is the description of Role Sensitivity ID 3? a) Description: Restricted 14. Choose Back to return to the Display IMG screen. 15. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Maintain Role Status. What is the Role Status ID for "In Productive Use"? a) Role Status ID: PRD 16. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Specify Critical Level. What does the Critical Level for "VH" mean? a) VH: Very High 17. Choose Back to return to the Display IMG screen. 18. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Companies. What is the Company ID for the IDES Company? a) Company ID: 0001 19. Choose Back to return to the Display IMG screen. 20. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Maintain Functional Areas. What is the Functional Area ID for the Materials Management? What is the abbreviation for the Sales functional area? a) Materials Management Functional Area ID: MATERIAL © Copyright. All rights reserved. 168 Solution 22: Review Parameter Settings for Design and Manage Roles b) Sales Functional Area abbreviation: SD 21. Choose Back to return to the Display IMG screen. 22. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Organizational Value Maps. What is the parent organizational value for the IDES AG map? List Org Level (ID or Description) and the value. What is the value of Org Level LGNUM for this value map? a) On the Change View "Org level Mapping" Details screen, review the data in the Org.Level and From fields. b) Parent org value: BUKRS/Company Code: 1000 c) On the Change View "Org level Mapping" Details screen, in the Dialog Structure area, double-click Org level Mapping Details. d) Org Level LGNUM: 001 23. Choose Back to return to the Display IMG screen. 24. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Prerequisite Types. What is the description for prerequisite type CERTIF? a) Certification 25. Choose Back to return to the Display IMG screen. 26. In SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → Role Management → Define Role Prerequisites. What is the Course ID and description for the CERT role prerequisite? a) CERT305; Certification Course 305 27. Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 169 Unit 10 Exercise 23 Maintain EAM Owners and Controllers in Central Owner Maintenance Business Example You are a system administrator. You have been asked to maintain Emergency Access Management Owners and Controllers in Central Owner Maintenance. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign users in Access Control Owners for Role Management. Owner Type ACFFIDOWN## Select Type Firefighter ID Owner ACFFIDCNTL## Select Type Firefighter ID Controller © Copyright. All rights reserved. 170 Unit 10 Solution 23 Maintain EAM Owners and Controllers in Central Owner Maintenance Business Example You are a system administrator. You have been asked to maintain Emergency Access Management Owners and Controllers in Central Owner Maintenance. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign users in Access Control Owners for Role Management. Owner Type ACFFIDOWN## Select Type Firefighter ID Owner ACFFIDCNTL## Select Type Firefighter ID Controller a) On the SAP Fiori Launchpad home page, in the ARA Configuration tile group, choose Access Control Owners. b) On the Owner Assignment: New screen, choose Create. c) In the Owner field, choose Search. d) On the Select User dialog box, in the Find field, enter AC*##. e) Choose Go. f) In the Available table, choose ACFFIDOWN##. g) Choose OK. h) On the Owner Assignment: New screen, in the Owner Type section, choose Firefighter ID Owner. i) In the Comment Column enter EAM Owner Maintenance for GRC Training Course Group ##. j) Choose Save. © Copyright. All rights reserved. 171 Unit 10: Emergency Access Management k) Choose Close. l) Repeat steps b - k for the other owners using the data in the table. m) Close the Central Owner browser tab. © Copyright. All rights reserved. 172 Unit 10 Exercise 24 Assign Owners to Firefighter IDs Business Example You are a system administrator. You have been asked to assign Firefighter Owners to Firefighter IDs. Note: As a prerequisite, the Firefighter IDs have already been created on the SAP target back-end systems (ZMCCLNT800 & T41CLNT400) and have been assigned the appropriate roles to be used in Emergency Access, as well as the Firefighter ID role listed in the Maintain Configuration Settings, Parameter Group 6, Parameter ID 4010. Profile/Role and User Synchronization have also been performed. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign Firefighter Owners to Firefight IDs. Firefighter Owner Firefighter ID System ACFFIDOWN## FFID##01 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##02 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##03 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##04 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##05 T41CLNT400 ZMGCLNT800 © Copyright. All rights reserved. 173 Unit 10 Solution 24 Assign Owners to Firefighter IDs Business Example You are a system administrator. You have been asked to assign Firefighter Owners to Firefighter IDs. Note: As a prerequisite, the Firefighter IDs have already been created on the SAP target back-end systems (ZMCCLNT800 & T41CLNT400) and have been assigned the appropriate roles to be used in Emergency Access, as well as the Firefighter ID role listed in the Maintain Configuration Settings, Parameter Group 6, Parameter ID 4010. Profile/Role and User Synchronization have also been performed. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign Firefighter Owners to Firefight IDs. Firefighter Owner Firefighter ID System ACFFIDOWN## FFID##01 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##02 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##03 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##04 T41CLNT400 ZMGCLNT800 ACFFIDOWN## FFID##05 T41CLNT400 ZMGCLNT800 © Copyright. All rights reserved. 174 Solution 24: Assign Owners to Firefighter IDs a) On the SAP Fiori Launchpad Home page, in the EAM Administration tile group, choose Owners. b) On the Firefighter Owners screen, choose Assign. c) On the Owner Assignment: New screen, in the Owner ID field, choose Search. d) In the Select Owner ID dialog box, in the User Name field, enter AC*##. e) Choose Go. f) In the Available table, choose ACFFIDOWN##. g) Choose OK. h) On the Owner Assignment: New screen, in the Firefighter ID section, choose Add. i) In the Firefighter ID field, choose Search. j) In the Select Firefighter ID dialog box, in the Firefighter ID field, enter FFID##*. The Firefighter IDs that meet the search criteria will appear. There should be 5 Firefighter IDs for each system ZMGCLNT800 and T41CLNT400. k) Choose Add All (double right arrows) to move all Firefighter IDs to the Selected section. l) Choose OK. m) Add Comments, if you wish. n) Choose Save. o) Choose Close. p) Close the Firefighter Owners browser window. © Copyright. All rights reserved. 175 Unit 10 Exercise 25 Assign Controllers to Firefighter IDs Business Example You are a system administrator. You have been asked to assign Firefighter Controllers to Firefighter IDs. Note: As a prerequisite, the Firefighter IDs have already been created on the SAP target back-end systems (ZMCCLNT800 & T41CLNT400) and have been assigned the appropriate roles to be used in Emergency Access, as well as the Firefighter ID role listed in the Maintain Configuration Settings, Parameter Group 6, Parameter ID 4010. Profile/Role and User Synchronization have also been performed. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign Firefighter Controllers to Firefight IDs. Firefighter Owner Firefighter ID System Notification By ACFFIDCNTL## FFID##01 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##02 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##03 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##04 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##05 T41CLNT400 Workflow ZMGCLNT800 © Copyright. All rights reserved. 176 Unit 10 Solution 25 Assign Controllers to Firefighter IDs Business Example You are a system administrator. You have been asked to assign Firefighter Controllers to Firefighter IDs. Note: As a prerequisite, the Firefighter IDs have already been created on the SAP target back-end systems (ZMCCLNT800 & T41CLNT400) and have been assigned the appropriate roles to be used in Emergency Access, as well as the Firefighter ID role listed in the Maintain Configuration Settings, Parameter Group 6, Parameter ID 4010. Profile/Role and User Synchronization have also been performed. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign Firefighter Controllers to Firefight IDs. Firefighter Owner Firefighter ID System Notification By ACFFIDCNTL## FFID##01 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##02 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##03 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##04 T41CLNT400 Workflow ZMGCLNT800 ACFFIDCNTL## FFID##05 T41CLNT400 Workflow ZMGCLNT800 © Copyright. All rights reserved. 177 Unit 10: Emergency Access Management a) On the SAP Fiori Launchpad Home page, in the EAM Administration tile group, choose Controllers. b) On the SPM Controllers screen, choose Assign. c) On the Controller Assignment: New screen In the Controller ID field, choose Search. d) In the Select Controller ID dialog box, in the User Name field, enter AC*##. e) Choose Go. f) In the Available table, choose ACFFIDCNTL##. g) Choose OK. h) On the Controller Assignment: New screen, in the Firefighter ID section, choose Add. i) In the Firefighter ID field, choose Search. j) In the Select Firefighter ID dialog box, in the Firefighter ID field, enter FFID##*. Result: The Firefighter IDs that have been assigned Firefighter Owners and meet the search criteria will appear. There should be 5 Firefighter IDs for each system ZMGCLNT800 and T41CLNT400. k) Choose Add All (double right arrows) to move all Firefighter IDs to the Selected section. l) Choose OK. m) In the Notification By field for each ID, use the drop-down to choose Workflow. n) In the Comments field, enter GRC300 Training. o) Choose Save. p) Choose Close. q) Choose Home to return to the SAP Fiori Launchpad home page. © Copyright. All rights reserved. 178 Unit 10 Exercise 26 Assign Firefighter Users to Firefighter IDs Business Example You are a system administrator. You have been asked to assign users to Firefighter Note: There are two ways to assign Firefighters to Firefighter IDs. You can assign a Firefighter ID to a Firefighter(s) or a Firefighter to a Firefighter ID(s). The exercise includes both scenarios. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign a Firefighter ID to Firefighters Firefighter ID System Criticality Firefighter User ID FFID##01 T41CLNT400 Medium ACFFIGHTER## 2. Assign a Firefighter to Firefighter IDs Firefighter Firefitgher ID System ACFFIGHTER## FFID##01 ZMGCLNT800 ACFFIGHTER## FFID##02 T41CLNT400 ZMGCLNT800 ACFFIGHTER## FFID##03 T41CLNT400 ZMGCLNT800 ACFFIGHTER## FFID##04 T41CLNT400 ZMGCLNT800 ACFFIGHTER## FFID##05 T41CLNT400 ZMGCLNT800 © Copyright. All rights reserved. 179 Unit 10 Solution 26 Assign Firefighter Users to Firefighter IDs Business Example You are a system administrator. You have been asked to assign users to Firefighter Note: There are two ways to assign Firefighters to Firefighter IDs. You can assign a Firefighter ID to a Firefighter(s) or a Firefighter to a Firefighter ID(s). The exercise includes both scenarios. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Assign a Firefighter ID to Firefighters Firefighter ID System Criticality Firefighter User ID FFID##01 T41CLNT400 Medium ACFFIGHTER## a) On the SAP Fiori Launchpad Home page, in the EAM Administration tile group, choose Firefighter IDs. b) On the Firefighter ID and Role Assignment screen, choose Assign. c) On the Firefighter ID Assignment: New screen, in the Firefighter ID field, choose Search. d) On the Select Firefighter ID dialog box, in the Firefighter ID field, enter FFID##01. e) Choose Go. f) Choose FFID##01 for System T41CLNT400. g) Choose OK. h) On the Firefighter ID Assignment: New screen, choose Add. i) In the Firefighter User ID field, choose Search. j) In the Select Firefighter dialog box, in the Firefighter field, enter ACFF*##. © Copyright. All rights reserved. 180 Solution 26: Assign Firefighter Users to Firefighter IDs k) Choose Go. l) In the Available section, select ACFFIGHTER## and choose Add (single right arrow) to move the Firefighter to the Selected section. m) Choose OK. n) On the Firefighter ID Assignment: New screen, choose Save. o) Choose Close. p) Close the Firefighter ID and Role Assignment browser tab. 2. Assign a Firefighter to Firefighter IDs Firefighter Firefitgher ID System ACFFIGHTER## FFID##01 ZMGCLNT800 ACFFIGHTER## FFID##02 T41CLNT400 ZMGCLNT800 ACFFIGHTER## FFID##03 T41CLNT400 ZMGCLNT800 ACFFIGHTER## FFID##04 T41CLNT400 ZMGCLNT800 ACFFIGHTER## FFID##05 T41CLNT400 ZMGCLNT800 a) On the SAP Fiori Launchpad Home page, in the EAM Administration tile group, choose Firefighters. b) On the SPM Firefighter user screen, select one of the lines with your Firefighter User Name, choose Open. c) On the Firefighter Assignment: GROUP ## AC FF User Training ID dialog box, choose Add. d) In the Firefighter ID field, choose Search. e) In the Select Firefighter ID dialog box, in the Firefighter ID field, enter FFID##*. f) Choose Add All (double right arrows) to move all Firefighter IDs to the Selected section. g) Choose OK. Note: You are not able to assign Criticality in this application. h) On the Firefighter Assignment: GROUP ## AC FF User Training ID screen, for each line that was just added, enter the Owner. © Copyright. All rights reserved. 181 Unit 10: Emergency Access Management Note: You can copy the Owner Name that was entered from the previous step and paste in each line. i) Choose Save. j) Choose Close. k) Choose Home to return to the SAP Fiori Launchpad home page. Note: To update the target systems with the latest EAM Master Data assignments, the EAM Master Data Synchronization should be executed. © Copyright. All rights reserved. 182 Unit 10 Exercise 27 Maintain Reason Codes Business Example You are a system administrator. You have been asked to Maintain Reason Codes for Emergency Access Management. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Maintain a Reason Code that will be assigned to a Firefight Session. Reason Code Description System EAM##01 EAM Reason 1 Group ## T41CLNT400 ZMGCLNT800 EAM##02 © Copyright. All rights reserved. EAM Reason 2 Group ## ZMGCLNT800 183 Unit 10 Solution 27 Maintain Reason Codes Business Example You are a system administrator. You have been asked to Maintain Reason Codes for Emergency Access Management. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Maintain a Reason Code that will be assigned to a Firefight Session. Reason Code Description System EAM##01 EAM Reason 1 Group ## T41CLNT400 ZMGCLNT800 EAM##02 EAM Reason 2 Group ## ZMGCLNT800 a) On the SAP Fiori Launchpad Home page, in the EAM Administration tile group, choose Reason Codes. b) On the SPM reason code screen, choose Create. c) In the Reason Code: New dialog box, enter the Reason Code and Description from the table. d) Choose Add. e) In the System field, choose Search. f) On the Select Systems dialog box, choose Go. g) In the Available section, the system(s) as noted in the table for the Reason Code. h) Choose Add (single right arrow) to move selected systems to the Selected section. i) Choose OK. j) On the Reason Code: New screen, choose Save. © Copyright. All rights reserved. 184 Solution 27: Maintain Reason Codes k) Choose Close. l) Repeat steps b-k for the other Reason Codes. m) Close the SPM reason code browser window. © Copyright. All rights reserved. 185 Unit 10 Exercise 28 Execute a Firefight Session Business Example You are a system administrator. You have been asked to test executing a firefight session using the EAM Centralized scenario. A firefight session can also be performed directly in the system to be maintained (Decentralized). Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Execute a Firefight session using the Centralized functionality. Use Firefighter ID FF##01 with system ZMGCLNT800. Note: Due to compliance reasons, to execute this exercise, you must log on to SAP Access Control with using ID ACFFIGHTER##. Reason Codes Reason Details EAM##01 Execute Firefight Session for GRC Training Course Group ## Actions to Perform ● OB52 ● PFCG 2. Execute transactions OB52 and PFCG in the firefight session and then end the session. 3. You have realized that an additional transaction needs to be performed. As per policy, you must document this in the EAM Log. 4. Refresh the Emergency Access Management console to verify you have logged off the Firefighter ID. Log off the SAP Access Control system for your Firefighter ID. 5. As the Firefight ID Controller, you have received an email stating you have a log report to review. © Copyright. All rights reserved. 186 Exercise 28: Execute a Firefight Session Note: Close all SAP Fiori sessions before executing this step. © Copyright. All rights reserved. 187 Unit 10 Solution 28 Execute a Firefight Session Business Example You are a system administrator. You have been asked to test executing a firefight session using the EAM Centralized scenario. A firefight session can also be performed directly in the system to be maintained (Decentralized). Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Execute a Firefight session using the Centralized functionality. Use Firefighter ID FF##01 with system ZMGCLNT800. Note: Due to compliance reasons, to execute this exercise, you must log on to SAP Access Control with using ID ACFFIGHTER##. Reason Codes Reason Details EAM##01 Execute Firefight Session for GRC Training Course Group ## Actions to Perform ● OB52 ● PFCG a) Log on to the TGT system, Client 001, with the User ID ACFFIGHTER## and password Welcome1. b) On the SAP Easy Access — User Menu for GROUP ## AC FF User Training ID screen, in the command field, enter /nGRAC_EAM or choose Emergency Access Management from the User Menu. c) On the Emergency Access Management screen, in the row for FFID##01 and system ZMGCLNT800, choose Logon. d) On the Emergency Access Management dialog box, enter the data from the table. © Copyright. All rights reserved. 188 Solution 28: Execute a Firefight Session e) Choose Continue. f) A new SAP session will open. Check to see that the correct system and ID are displayed using the information pop-up on the bottom of the screen. g) Choose the Start SAP Easy Access button if it appears h) Remain on this screen for the next step. 2. Execute transactions OB52 and PFCG in the firefight session and then end the session. a) On the SAP Easy Access — User Menu for FFID01 Firefight ID Group ## screen, in the command box, enter /nOB52. Choose Enter. b) On the Determine Work Area: Entry dialog, box, choose Continue (Enter). c) On the Change view "Posting Periods: Specify Time Intervals": Overview screen, in the command box, enter /nPFCG. Choose Enter. d) On the Role Maintenance screen, in the Role field, enter Z:RISK_##R1. e) Choose Role → Copy. f) In the Query dialog box, in the to role field, enter Z:RISK_##R1_COPY. g) Choose Copy All. h) Remain on this screen for the next step. 3. You have realized that an additional transaction needs to be performed. As per policy, you must document this in the EAM Log. a) In the Windows task bar, choose the session titledEmergency Access Management. Note: This should be your ACFFIGHTER## session in the TGT system. b) On the Emergency Access Management screen, in the row for FFID##01 and system ZMGCLNT800, choose Additional Activity. c) On the Emergency Access Management dialog box, in the Document additional activity field, enter Additional Transaction needed to complete task - SU01D. d) Choose Continue. e) In the Windows task bar, choose the session titled Role Maintenance. Note: This should be your Firefight Session in the ZMG system. f) On the Role Maintenance screen, in the command box, enter /nSU01D. Choose Enter. g) On the User Maintenance: Initial Screen, in the command box, enter /nEX to log off the ZMG system. © Copyright. All rights reserved. 189 Unit 10: Emergency Access Management Note: After participants execute the firefight session, if the Log Update job has not been scheduled, this will need to be executed manually. 4. Refresh the Emergency Access Management console to verify you have logged off the Firefighter ID. Log off the SAP Access Control system for your Firefighter ID. a) In the TGT system, on the Emergency Access Management screen, choose Refresh. Result: The Firefight ID you were using should no longer by checked out. b) In the command box, enter /nEX to log off the Firefighter user. 5. As the Firefight ID Controller, you have received an email stating you have a log report to review. Note: Close all SAP Fiori sessions before executing this step. a) Log on to SAP Fiori launchpad with user ID ACFFIDCNTL## and password Welcome1. b) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose Work Inbox. c) Choose the subject EAM Audit review required for... to open the work item. d) To enter comments, choose the Notes tab. e) Choose Add Note. Enter comments into the text box that appears. f) Choose Submit. g) In the Confirmation Dialog screen, choose Yes. h) Choose Close. i) Choose the Me icon in the upper left of the screen, then choose Sign Out. © Copyright. All rights reserved. 190 Unit 10 Exercise 29 Review a Log Report Business Example You are a system administrator. You have been asked to review a log report from a Firefight session using the Consolidated Log Report. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Review the Firefight Logs for Firefighter FFID##01 using the Consolidated Log Report. © Copyright. All rights reserved. 191 Unit 10 Solution 29 Review a Log Report Business Example You are a system administrator. You have been asked to review a log report from a Firefight session using the Consolidated Log Report. Note: Unless otherwise noted in the instructions, use GRC300-## when accessing the SAP GRC or SAP ERP systems. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Review the Firefight Logs for Firefighter FFID##01 using the Consolidated Log Report. a) Log on to SAP Fiori launchpad with user ID GRC300-##. b) On the SAP Fiori Launchpad home page, in the EAM Reporting tile group, choose Consolidated Log Report. c) On the Consolidated Log Report screen, in the Firefighter ID field, enter FFID##01. d) Choose Run in foreground. e) Review the data that displays. Scroll to the left to see additional data. f) Close the Consolidated Log Report browser tab. © Copyright. All rights reserved. 192 Unit 10 Exercise 30 Review Parameter Settings for Emergency Access Management Business Example You are a system administrator. You have been asked to review current and available configuration settings for Emergency Access Management. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Emergency Access Management. 2. List the settings that are set and their values for Parameter Group 6-Emergency Access Management: ● 4000-Application type ● 4001-Default Firefighter Validity Period (Days) ● 4003-Retrieve Change Log ● 4004-Retrieve System log ● 4005-Retrieve Audit log ● 4006-Retrieve OS Command log ● 4007-Send Log Report Execution Notification Immediately ● 4008-Send FirefightId Login Notification ● 4009-Log Report Execution Notification ● 4010-Firefighter ID role name ● 4012-Default User for forwarding the Audit Log workflow ● 4013-Firefighter ID owner can submit request for Firefighter ID owned ● 4014-Firefighter ID controller can submit request for Firefighter ID controlled ● 4015-Enable Decentralized Firefighting © Copyright. All rights reserved. 193 Unit 10: Emergency Access Management ● 4017-Enable CUP request no. to be shown in Firefighter - Firefighter ID/Role assignment screen ● 4018-Enable detailed logging (SLG1) for EAM Log Synchronization programs ● 4020-Generate EAM log for Firefighter sessions with no activity ● 4021–Use ALV Grid for Firefighter Filter Transaction ● 4025–Restrict Firefighter Validity period during Access Request ● 5033-Allow Firefighter with no Controller 3. Choose Back to return to the Display IMG screen. 4. Review configuration in Emergency Access Management node and review configuration settings. Navigate to Governance Risk and Compliance → Access Control → Emergency Access Management . 5. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. 6. List the settings that are set and their values for the ZMG system: ● 1000-Please maintain Plug-in Connector ● 1001-Please maintain GRC Connector ● 1002-Please maintain Ruleset ● 4000-EAM Application Type ● 4001–Default Firefighter Validity Period (Days) ● 4008–Send FirefightId Login Notification ● 4010-FFID Role Name Note: Parameters 1089 and 1090 are obsolete and have been replaced with Parameters 4000 and 4010, respectively. 7. In the command field, enter /nEX to log off from this system. 8. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. 9. Log on and review the following settings in T41 system (use the SAP Logon Pad) with GRC300–##, which are configured in the IMG under Governance, Risk and Compliance (Plug-In) → Maintain Plug-In Configuration Settings: ● 1000-Please maintain Plug-in Connector ● 1001-Please maintain GRC Connector ● 1002-Please maintain Ruleset © Copyright. All rights reserved. 194 Exercise 30: Review Parameter Settings for Emergency Access Management ● 4000-EAM Application Type ● 4001–Default Firefighter Validity Period (Days) ● 4008–Send FirefightId Login Notification ● 4010-FFID Role Name Note: Parameters 1089 and 1090 are obsolete and have been replaced with Parameters 4000 and 4010, respectively. 10. In the command field, enter /nEX to log off from this system. © Copyright. All rights reserved. 195 Unit 10 Solution 30 Review Parameter Settings for Emergency Access Management Business Example You are a system administrator. You have been asked to review current and available configuration settings for Emergency Access Management. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Emergency Access Management. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG . c) Choose Governance, Risk and Compliance → Access Control → Maintain Configuration Settings.. The AC Configuration Settings screen is displayed. These are the parameters that are configured for this particular instance of SAP Access Control. Remember, that some parameters do have a coded default in the GRACCONFIG table. If a parameter is not entered here, then the default will be applied. 2. List the settings that are set and their values for Parameter Group 6-Emergency Access Management: ● 4000-Application type ● 4001-Default Firefighter Validity Period (Days) ● 4003-Retrieve Change Log ● 4004-Retrieve System log ● 4005-Retrieve Audit log ● 4006-Retrieve OS Command log ● 4007-Send Log Report Execution Notification Immediately ● 4008-Send FirefightId Login Notification ● 4009-Log Report Execution Notification © Copyright. All rights reserved. 196 Solution 30: Review Parameter Settings for Emergency Access Management ● 4010-Firefighter ID role name ● 4012-Default User for forwarding the Audit Log workflow ● 4013-Firefighter ID owner can submit request for Firefighter ID owned ● 4014-Firefighter ID controller can submit request for Firefighter ID controlled ● 4015-Enable Decentralized Firefighting ● 4017-Enable CUP request no. to be shown in Firefighter - Firefighter ID/Role assignment screen ● 4018-Enable detailed logging (SLG1) for EAM Log Synchronization programs ● 4020-Generate EAM log for Firefighter sessions with no activity ● 4021–Use ALV Grid for Firefighter Filter Transaction ● 4025–Restrict Firefighter Validity period during Access Request ● 5033-Allow Firefighter with no Controller a) 4000: 1 b) 4001: 365 c) 4003 - 4009: YES d) 4010: SAP_GRC_SPM_FFID e) 4012: 2 (Only to Controllers) f) 4013 - 4015: YES g) 4017 - 4018: YES h) 4020 - 4021: YES i) 4025: YES j) 5033: NO 3. Choose Back to return to the Display IMG screen. 4. Review configuration in Emergency Access Management node and review configuration settings. Navigate to Governance Risk and Compliance → Access Control → Emergency Access Management . a) Maintain Firefighter ID Role Name Per Connector. Are there any Connector specific Firefight ID identifier roles? No b) Maintain Criticality Levels for Emergency Access Management. © Copyright. All rights reserved. 197 Unit 10: Emergency Access Management How many criticality levels have been configured? List the descriptions. 4 levels: Low, Medium, High, Very High 5. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. a) Log on to the ZMG ABAP client with user ID GRC300–##. b) Execute transaction /nSPRO, then choose SAP Reference IMG. c) Choose Governance, Risk and Compliance (Plug-In) → Access Control → Maintain Plug-In Configuration Settings. The Change View "For System Details": Overview screen is displayed. 6. List the settings that are set and their values for the ZMG system: ● 1000-Please maintain Plug-in Connector ● 1001-Please maintain GRC Connector ● 1002-Please maintain Ruleset ● 4000-EAM Application Type ● 4001–Default Firefighter Validity Period (Days) ● 4008–Send FirefightId Login Notification ● 4010-FFID Role Name Note: Parameters 1089 and 1090 are obsolete and have been replaced with Parameters 4000 and 4010, respectively. a) 1000: ZMGCLNT800 b) 1001: TGTCLNT001 c) 1002: GLOBAL d) 4000: 1 e) 4001: 365 f) 4008: YES g) 4010: SAP_GRAC_SPM_FFID 7. In the command field, enter /nEX to log off from this system. 8. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Analyze and Manage Risk. a) Log on to the T41 ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG © Copyright. All rights reserved. 198 Solution 30: Review Parameter Settings for Emergency Access Management c) Choose Governance, Risk and Compliance (Plug-In) → Access Control → Maintain Plug-In Configuration Settings. The Change View "For System Details": Overview screen is displayed. 9. Log on and review the following settings in T41 system (use the SAP Logon Pad) with GRC300–##, which are configured in the IMG under Governance, Risk and Compliance (Plug-In) → Maintain Plug-In Configuration Settings: ● 1000-Please maintain Plug-in Connector ● 1001-Please maintain GRC Connector ● 1002-Please maintain Ruleset ● 4000-EAM Application Type ● 4001–Default Firefighter Validity Period (Days) ● 4008–Send FirefightId Login Notification ● 4010-FFID Role Name Note: Parameters 1089 and 1090 are obsolete and have been replaced with Parameters 4000 and 4010, respectively. a) 1000: T41CLNT400 b) 1001: TGTCLNT001 c) 1002: GLOBAL d) 4000: 1 e) 4001: 365 f) 4008: YES g) 4010: SAP_GRAC_SPM_FFID 10. In the command field, enter /nEX to log off from this system. © Copyright. All rights reserved. 199 Unit 11 Exercise 31 Review Parameter Settings for Periodic Access Review Business Example You are a system administrator. You have been asked to review configuration parameters for Periodic Access Review. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Periodic Access Review. 2. List the settings that are set and their values for Parameter Group 7- UAR Review: ● 2004 - Request Type for UAR ● 2005 - Default Priority ● 2006 - Who are the reviewers? ● 2007 - Admin. review required before sending tasks to reviewers ● 2008 - Number of line items per UAR request ● 2062 - Send notification to users whose access is removed 3. List the settings that are set and their values for Parameter Group 15- SoD Review: ● 2016 - Request Type for SoD ● 2017 - Default priority for SoD ● 2018 - Who are the reviewers? ● 2019 - Admin. review required before sending tasks to reviewers ● 2020 - Number of unique line items per SOD request.(Maximum 9999) ● 2023 - Is actual removal of role allowed 4. In the SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → User Provisioning → Maintain Review Rejection Reasons . Review the listed rejection reasons. 5. Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 200 Unit 11 Solution 31 Review Parameter Settings for Periodic Access Review Business Example You are a system administrator. You have been asked to review configuration parameters for Periodic Access Review. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Access the IMG Configuration to review the SAP Access Control parameter settings relevant to Periodic Access Review. a) Log on to the TGT ABAP client with user ID GRC300–##. b) Execute transaction /NSPRO, then choose SAP Reference IMG . c) Choose Governance, Risk and Compliance → Access Control → Maintain Configuration Settings. The AC Configuration Settings screen is displayed. These are the parameters that are configured for this particular instance of SAP Access Control. Remember, that some parameters do have a coded default in the GRACCONFIG table. If a parameter is not entered here, then the default will be applied. 2. List the settings that are set and their values for Parameter Group 7- UAR Review: ● 2004 - Request Type for UAR ● 2005 - Default Priority ● 2006 - Who are the reviewers? ● 2007 - Admin. review required before sending tasks to reviewers ● 2008 - Number of line items per UAR request ● 2062 - Send notification to users whose access is removed a) 2004: 011 b) 2005: 006 c) 2006: ROLE OWNER d) 2007: YES e) 2008: 25 © Copyright. All rights reserved. 201 Unit 11: Periodic Access Review Process f) 2062: YES 3. List the settings that are set and their values for Parameter Group 15- SoD Review: ● 2016 - Request Type for SoD ● 2017 - Default priority for SoD ● 2018 - Who are the reviewers? ● 2019 - Admin. review required before sending tasks to reviewers ● 2020 - Number of unique line items per SOD request.(Maximum 9999) ● 2023 - Is actual removal of role allowed a) 2016: 010 b) 2017: 007 c) 2018: MANAGER d) 2019: YES e) 2020: 25 f) 2023: YES 4. In the SAP Reference IMG, navigate to Governance, Risk and Compliance → Access Control → User Provisioning → Maintain Review Rejection Reasons . Review the listed rejection reasons. a) Rejected User - Not my Direct Report b) Rejected User - User is Unknown c) Rejected Risk - Risk no Longer Approved 5. Choose Back to return to the Display IMG screen. © Copyright. All rights reserved. 202 Unit 12 Exercise 32 Add Custom Fields to Request Header Business Example You are a system administrator. You have been asked to add custom fields to a request header. Note: This exercise creates data that is used in the exerciseAdd Custom Fields to Role Definition. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Log on to ABAP client for GRC, SID: TGT, Client: 001 with user ID GRC300-##. 2. Create Domains using the data in the following table: Note: Save items as LOCAL OBJECT. Remember to activate each object after saving. Domain ID Short Description Data Type No. Characters ZAC_CF_TX20_## Char String 20 Chars for Group ## CHAR 20 ZAC_CF_REG_## Multiple Values String for Group ## CHAR 5 Enter the following values for this domain ● ● ● ● © Copyright. All rights reserved. EMEA – Europe APJ – Asia Pacific Japan ANZ – Australia New Zealand AMER – Americas 203 Unit 12: Appendix (Optional) Maintaining Custom Fields Domain ID Short Description Data Type ZAC_CF_DATE_## Single Date Value for DATS Group ## No. Characters Attributes will be populated automatically 3. Create Data Elements using the data in the following table: Data Type Short Description Domain ZAC_DE_EID_## Employee ID – Custom Field for GRC Training Group ## ZAC_CF_TX20_## Length-Field Label ● 10-Emp ID## ● 10-Emp ID## ● ● ZAC_DE_DIV_## ZAC_DE_MKT_## Division – Custom Field for GRC Training Group ## ZAC_CF_TX20_## Market – Market of ZAC_CF_REG_## User-Custom Field for GRC Training Grp ## 5-DIV## ● 10-Division## ● 20- Division## ● 20- Division## ● 10 - MKT## ● ● Hire Date – Custom Field for GRC Training Group ## ZAC_CF_DATE_## 20-Employee ID## ● ● ZAC_DE_HIR_## 20-Employee ID## 15 - Mkt of User## 20 - Market of User## 20- Market of User## ● 8 – Hire## ● 10 – Hire Dte## ● 12 – Hire Dte## ● 12 – Hire Dte## 4. Modify / Create structure CI_GRAC_REQ_ATTR included in database table GRACREQ to add the custom fields to the Request Header table using the data in the following table. In the short description, enter Custom fields INCLUDE for Role Definition. Component Component Type ZZAC_DE_EID_## ZAC_DE_EID_## © Copyright. All rights reserved. 204 Exercise 32: Add Custom Fields to Request Header Component Component Type ZZAC_DE_DIV_## ZAC_DE_DIV_## ZZAC_DE_MKT_## ZAC_DE_MKT_## ZZAC_DE_HIR_## ZAC_DE_HIR_## Note: Remember to set the Enhancement Category. Review any warnings that may display. Warning messages regarding Position can be ignored. 5. Check the Customer Defined fields for issues. 6. Configure your newly created custom fields using the data in the following table. When configuring these custom fields, mark them as Optional. When creating the request use the short description Custom Field Customizing Group ##. Field ID Status ZZAC_DE_EID_## Optional Entry ZZAC_DE_DIV_## Optional Entry ZZAC_DE_MKT_## Optional Entry ZZAC_DE_HIR_## Optional Entry 7. Verify that the fields just created appear on the Access Request screen. 8. Verify that the fields created appear in BRF+ context. Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Initiator Rule Rule ID TEST TO VERIFY CUSTOM FIELDS Application/Func. Group Name TEST TO VERIFY CUSTOM FIELDS Rule Type BRFplus Flat Rule (LineItem by LineItem) © Copyright. All rights reserved. 205 Unit 12 Solution 32 Add Custom Fields to Request Header Business Example You are a system administrator. You have been asked to add custom fields to a request header. Note: This exercise creates data that is used in the exerciseAdd Custom Fields to Role Definition. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Log on to ABAP client for GRC, SID: TGT, Client: 001 with user ID GRC300-##. 2. Create Domains using the data in the following table: Note: Save items as LOCAL OBJECT. Remember to activate each object after saving. Domain ID Short Description Data Type No. Characters ZAC_CF_TX20_## Char String 20 Chars for Group ## CHAR 20 ZAC_CF_REG_## Multiple Values String for Group ## CHAR 5 Enter the following values for this domain ● ● ● ● © Copyright. All rights reserved. EMEA – Europe APJ – Asia Pacific Japan ANZ – Australia New Zealand AMER – Americas 206 Solution 32: Add Custom Fields to Request Header Domain ID Short Description Data Type ZAC_CF_DATE_## Single Date Value for DATS Group ## No. Characters Attributes will be populated automatically a) On the SAP Easy Access - User Menu screen, in the command field, enter SE11. b) Choose Enter. c) On the ABAP Dictionary: Initial Screen, choose Domain. d) In the Domain field, enter the Domain ID from the table. e) Choose Create. f) On the Dictionary: Change Domain screen, enter the Short Description, Data Type, and No. Characters from the table. For the Domain ZAC_CF_REG_##, also choose Value Range tab, enter values in the Data Type column from the table in Single Vals for Fix.Val and Short Descript. fields. g) Choose Check from the Dictionary: Change Domain menu bar. h) In the Check Domain dialog screen, choose Yes. i) On the Create Object Directory Entry screen, choose Local Object. Note: Choosing Local Object is only for training. During normal maintenance, place objects in a Package and a transport. j) Choose Activate from the Dictionary: Change Domain menu bar. k) Verify that the Domain has changed from New to Active. l) Choose Back. m) Repeat steps c - m for each Domain ID in the table. n) Choose Back to return to the ABAP Dictionary: Initial Screen. o) Remain on this screen for the next step 3. Create Data Elements using the data in the following table: Data Type Short Description Domain ZAC_DE_EID_## Employee ID – Custom Field for GRC Training Group ## ZAC_CF_TX20_## Length-Field Label ● 10-Emp ID## ● 10-Emp ID## ● ● © Copyright. All rights reserved. 20-Employee ID## 20-Employee ID## 207 Unit 12: Appendix (Optional) Maintaining Custom Fields Data Type Short Description Domain ZAC_DE_DIV_## Division – Custom Field for GRC Training Group ## ZAC_CF_TX20_## ZAC_DE_MKT_## Market – Market of ZAC_CF_REG_## User-Custom Field for GRC Training Grp ## Length-Field Label ● 5-DIV## ● 10-Division## ● 20- Division## ● 20- Division## ● 10 - MKT## ● ● ● ZAC_DE_HIR_## Hire Date – Custom Field for GRC Training Group ## ZAC_CF_DATE_## 15 - Mkt of User## 20 - Market of User## 20- Market of User## ● 8 – Hire## ● 10 – Hire Dte## ● 12 – Hire Dte## ● 12 – Hire Dte## a) On the ABAP Dictionary: Initial Screen, choose Data type. b) In the Data type field, enter the Data Type from the table. c) Choose Create. d) On the Create Type <Data Type> screen, choose Data Element. e) Choose Continue (Enter). f) On the Dictionary: Change Data Element screen, enter the Short Description and the Domain from the table. g) Choose Enter. h) Choose the Field Label tab. i) Enter Length and Field Label from the table for Short, Medium, Long, and Heading respectively. j) Choose Check from the Dictionary: Change Data Element menu bar. k) If the Check Data Element dialog box appears, choose Yes. l) On the Create Object Directory Entry screen, choose Local Object. © Copyright. All rights reserved. 208 Solution 32: Add Custom Fields to Request Header Note: Choosing Local Object is only for training. During normal maintenance, place objects in a Package and a transport. m) Choose Activate from the Dictionary: Change Data Element menu bar. n) Verify that the Data Element has changed from New to Active. o) Choose Back. p) Repeat steps a - p for each Data Element in the table. q) Choose Back to return to the ABAP Dictionary: Initial Screen. 4. Modify / Create structure CI_GRAC_REQ_ATTR included in database table GRACREQ to add the custom fields to the Request Header table using the data in the following table. In the short description, enter Custom fields INCLUDE for Role Definition. Component Component Type ZZAC_DE_EID_## ZAC_DE_EID_## ZZAC_DE_DIV_## ZAC_DE_DIV_## ZZAC_DE_MKT_## ZAC_DE_MKT_## ZZAC_DE_HIR_## ZAC_DE_HIR_## Note: Remember to set the Enhancement Category. Review any warnings that may display. Warning messages regarding Position can be ignored. a) On the ABAP Dictionary: Initial Screen, choose Database table. b) In the Database table field, enter the GRACREQ. c) In the Information dialog box, choose Continue (Enter). d) Verify the window states Dictionary: Change Table. If not, choose Display ↔ Change. e) On the Dictionary: Change Table screen, scroll down to the field .Include. f) Double-click the Data Element CI_GRAC_REQ_ATTR. g) If a message appears to create the structure, choose Yes. h) Enter Custom Fields INCLUDE for Request Header in the Short Description if the field is not already populated. i) Verify that you are in change mode. If not, choose Display ↔ Change. j) Enter the Component and Component Type for each entry in the table. k) Choose Types for Typing Method. © Copyright. All rights reserved. 209 Unit 12: Appendix (Optional) Maintaining Custom Fields l) On the Dictionary: Change Structure screen, choose Extras from the main menu bar. m) Choose Enhancement Category. n) On the Maintain Enhancement Category for CI_GRAC_REQ_ATTR screen, choose Cannot Be Enhanced. o) Choose Copy. p) Choose Check from the Dictionary: Change Structure menu bar. q) On the Check Structure dialog screen, choose Yes. r) If the Create Object Directory Entry screen appears, choose Local Object. Note: Choosing Local Object is only for training. During normal maintenance, place objects in a Package and a transport. s) Choose Activate from the Dictionary: Change Structure menu bar. t) If the Inactive Objects for GRC300-## appear, choose all entries, then choose Continue (Enter). u) Verify that the Structure has changed from New (or Revised) to Active. v) If the Warning During Activation screen appears, choose Yes. w) Review the Log display for any Warnings or Errors. If Errors exist, please notify the instructor for assistance. x) Choose Back until the SAP Easy Access - User Menu appears. 5. Check the Customer Defined fields for issues. a) On the SAP Easy Access - User Menu screen, in the command field, enter SA38. b) Choose Enter. c) Enter Program GRFN_CHECK_CDF. d) Choose Execute. e) On the Customer Defined Fields - Check Utility screen, in the Execution Mode area, choose Run in a "Correction mode". f) In the To be Corrected area, choose Subtypes for Reg., UI metadata, and Reporting metadata. g) Choose Execute. Result: Verify that the message "Structures successfully generated" appears and your ID is listed. h) Choose Back until the SAP Easy Access - User Menu screen appears. 6. Configure your newly created custom fields using the data in the following table. When configuring these custom fields, mark them as Optional. When creating the request use the short description Custom Field Customizing Group ##. © Copyright. All rights reserved. 210 Solution 32: Add Custom Fields to Request Header Field ID Status ZZAC_DE_EID_## Optional Entry ZZAC_DE_DIV_## Optional Entry ZZAC_DE_MKT_## Optional Entry ZZAC_DE_HIR_## Optional Entry a) On the SAP Easy Access - User Menu screen, in the command field, enter transaction SPRO. b) Choose Enter. c) Choose SAP Reference IMG. d) Choose Governance Risk and Compliance → Shared Master Data Settings → Maintain Field-Based Configuration. e) On the Display View "Regulation Specific Configuration": Overview screen, in the Dialog Structure navigation pane, double-click Choose Entity. f) On the Information screen, choose Continue (Enter). g) In the Choose Entity area, choose ACCREQ. h) In the Dialog Structure navigation pane, double-click Field Status Configuration by Appl. Component. i) Choose New Entries. j) Enter Field ID and Status for each field in the table. Use the Search function to choose. k) Choose AC for the Component from the drop-down list. l) Choose Save. m) If needed, on the Prompt for Customizing request screen, choose Create. n) On the Create Request screen, enter the Short Description Custom Field Customizing Group ##. o) Choose Save. p) On the Prompt for Customizing request screen, choose Enter. q) Choose Back until the SAP Easy Access - User Menu screen appears. 7. Verify that the fields just created appear on the Access Request screen. a) On the SAP Easy Access — User Menu screen, choose SAP Fiori Launchpad. b) Log on to SAP Fiori with user ID GRC300-## and password Welcome1. c) On the SAP Fiori Launchpad home page, in the AC Home tile group, choose the Access Request tile. d) On the Access Request screen, choose the Custom Data tab. © Copyright. All rights reserved. 211 Unit 12: Appendix (Optional) Maintaining Custom Fields e) Review the fields shown. Verify that your fields appear and the correct data is displayed. f) Sign out of SAP Fiori. g) Close all browsers and return to the SAP Easy Access - User Menu screen. 8. Verify that the fields created appear in BRF+ context. Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Initiator Rule Rule ID TEST TO VERIFY CUSTOM FIELDS Application/Func. Group Name TEST TO VERIFY CUSTOM FIELDS Rule Type BRFplus Flat Rule (LineItem by LineItem) a) On the SAP Easy Access - User Menu screen, in the command field, enter transaction GRFNMW_DEV_RULES. b) Choose Enter. c) On the Generate MSMP Rule for Process screen, enter the data from the table. d) Choose Enter. Note: Do not choose Execute. e) In the Generate decision table section, choose Header (BRF+ Flat Rule). f) On the Dialog screen, verify that your custom fields appear. g) Cancel out of all screens without saving any data and return to the SAP Easy Access User Menu screen. h) In the command field, enter BRF+. i) Choose Enter. j) On the Business Rule Framework plus screen, in the My Applications navigation panel, choose Z##_INITIATOR_RULE → Data Object → Structure → GRAC_S_REQUEST_RULE_HEADER - Structure. k) In the Detail section, scroll down to locate your custom fields. l) If you fields do not appear, in the Define Data Binding section, choose Refresh Binding. m) Close the BRF+ browser screen. © Copyright. All rights reserved. 212 Unit 12 Exercise 33 Add Custom Fields to Role Definition Business Example You are a system administrator. You have been asked to add custom fields to a role definition. Note: This exercise uses data from the exercise Add Custom Fields to Request Header. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Log on to ABAP client for GRC, SID: TGT, Client: 001 with user ID GRC300-##. 2. Create Data Elements using the data in the following table. Note: Save items as LOCAL OBJECT. Remember to activate each object after saving. Data Type Short Description Domain ZAC_DE_RMKT_## Market of Role – Custom Field for GRC Training Group ## ZAC_CF_REG_## Length-Field Label ● ● ● ● ZAC_DE_RREQ_## Role Request Date – ZAC_CF_DATE_## Custom Field for GRC Training Group ## 10 – Mkt Role## 15 – Mkt of Role## 20 – Market of Role## 20– Market of Role## ● 8 – ReqDt## ● 10 – Req Date## ● 12 – Req Date## ● 12 – Req Date## 3. Modify / Create structure CI_ROLE_ATTR included in database table GRACROLE to add the custom fields to the Role table. Use the data in the following table: © Copyright. All rights reserved. 213 Unit 12: Appendix (Optional) Maintaining Custom Fields Component Component Type ZZAC_DE_RMKT_## ZAC_DE_RMKT_## ZZAC_DE_RREQ_## ZAC_DE_RREQ_## Note: In the short description, enter Custom fields INCLUDE for Role Definition. Note: Remember to set the Enhancement Category. Review warnings that might display. Warning messages regarding Position can be ignored. 4. Check the Customer Defined fields for issues. 5. Verify that the fields created appear on the Role Maintenance screen. 6. Verify that the fields created appear in BRF+ context. Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Initiator Rule Rule ID TEST TO VERIFY CUSTOM FIELDS Application/Func. Group Name TEST TO VERIFY CUSTOM FIELDS Rule Type BRFplus Flat Rule (LineItem by LineItem) © Copyright. All rights reserved. 214 Unit 12 Solution 33 Add Custom Fields to Role Definition Business Example You are a system administrator. You have been asked to add custom fields to a role definition. Note: This exercise uses data from the exercise Add Custom Fields to Request Header. Note: In this exercise, when values include ##, replace the characters with the participant number your instructor assigned to you. 1. Log on to ABAP client for GRC, SID: TGT, Client: 001 with user ID GRC300-##. 2. Create Data Elements using the data in the following table. Note: Save items as LOCAL OBJECT. Remember to activate each object after saving. Data Type Short Description Domain ZAC_DE_RMKT_## Market of Role – Custom Field for GRC Training Group ## ZAC_CF_REG_## Length-Field Label ● ● ● ● ZAC_DE_RREQ_## Role Request Date – ZAC_CF_DATE_## Custom Field for GRC Training Group ## 10 – Mkt Role## 15 – Mkt of Role## 20 – Market of Role## 20– Market of Role## ● 8 – ReqDt## ● 10 – Req Date## ● 12 – Req Date## ● 12 – Req Date## a) On the SAP Easy Access - User Menu screen, in the command field, enter SE11. © Copyright. All rights reserved. 215 Unit 12: Appendix (Optional) Maintaining Custom Fields b) Choose Enter. c) On the ABAP Dictionary: Initial Screen, choose Data Type. d) In the Data Type field, enter the Data Type from the table. e) Choose Create. f) On the Create: <Data Type> screen, choose Data Element. g) Choose Continue (Enter). h) On the Dictionary: Change Data Element screen, enter the Short Description, Domain from the table. i) Choose Enter. j) Choose Field Label tab. k) Enter Length and Field Label from the table for Short, Medium, Long, and Heading respectively. l) Choose Check from the Dictionary: Change Data Element menu bar. m) If the Check Data Element dialog box appears, choose Yes. n) On the Create Object Directory Entry screen, choose Local Object. Note: Choosing Local Object is only for training. During normal maintenance, place objects in a Package and a transport. o) Choose Activate from the Dictionary: Change Domain menu bar. p) If the Inactive Objects for GRC300-## appear, choose all entries, then choose Continue (Enter). q) Verify that the Data Element has changed from New to Active. r) Choose Back. s) Repeat steps c - r for each Data Element in the table. t) Choose Back to return to the ABAP Dictionary: Initial Screen. 3. Modify / Create structure CI_ROLE_ATTR included in database table GRACROLE to add the custom fields to the Role table. Use the data in the following table: Component Component Type ZZAC_DE_RMKT_## ZAC_DE_RMKT_## ZZAC_DE_RREQ_## ZAC_DE_RREQ_## © Copyright. All rights reserved. 216 Solution 33: Add Custom Fields to Role Definition Note: In the short description, enter Custom fields INCLUDE for Role Definition. Note: Remember to set the Enhancement Category. Review warnings that might display. Warning messages regarding Position can be ignored. a) On the ABAP Dictionary: Initial Screen, choose Database table. b) In the Database table field, enter the GRACROLE. c) In the Information dialog box, choose Continue (Enter). d) Choose Change. e) On the Dictionary: Change Table screen, scroll down to the field .Include. f) Double-click Data Element CI_ROLE_ATTR. g) If message appears to create the structure, choose Yes. h) Enter Custom Fields INCLUDE for Role Definition in the Short Description, if the field is not already populated. i) Verify that you are in change mode. If not, choose Display ↔ Change. j) Enter Component and Component Type for each entry in the table. k) Choose Types for Typing Method. l) On the Dictionary: Change Structure screen, choose Extras from the main menu bar. m) Choose Enhancement Category.. n) On the Maintain Enhancement Category for CI_ROLE_ATTR screen, choose Cannot Be Enhanced. o) Choose Copy. p) Choose Check from the Dictionary: Change Structure menu bar. q) If the Check Structure dialog screen appears, choose Yes. r) If the Create Object Directory Entry screen appears, choose Local Object. Note: Choosing Local Object is only for training. During normal maintenance, place objects in a Package and a transport. s) Choose Activate from the Dictionary: Change Structure menu bar. t) Choose Back to return to the SAP Easy Access screen. 4. Check the Customer Defined fields for issues. © Copyright. All rights reserved. 217 Unit 12: Appendix (Optional) Maintaining Custom Fields a) On the SAP Easy Access - User Menu screen, in the command field, enter SA38. b) Choose Enter. c) Enter Program GRFN_CHECK_CDF. d) Choose Execute. e) On the Customer Defined Fields - Check Utility screen, in the Execution Mode area, choose Run in a "Correction mode". f) In the To be Corrected area, choose Subtypes for Reg., UI metadata, and Reporting metadata. g) Choose Execute. Result: Verify that the message "Structures successfully generated" appears and your ID is listed. h) Choose Back until the SAP Easy Access - User Menu screen appears. 5. Verify that the fields created appear on the Role Maintenance screen. a) On the SAP Easy Access — User Menu screen, choose SAP Fiori Launchpad. b) Log on to SAP Fiori with user ID GRC300-## and password Welcome1. c) On the SAP Fiori Launchpad home screen, in the BRM Administration tile group, choose Role Maintenance. d) On the Business Role Management - Role screen, choose Create. e) Choose Single Role. f) On the New Single Role screen, on the Define Role tab, choose Custom Fields. g) Review the fields shown. Verify that your fields appear and that the correct data is displayed. h) Close all browsers and return to the SAP Easy Access - User Menu screen. 6. Verify that the fields created appear in BRF+ context. Field Value MSMP Process ID SAP_GRAC_ACCESS_REQUEST Rule Kind Initiator Rule Rule ID TEST TO VERIFY CUSTOM FIELDS Application/Func. Group Name TEST TO VERIFY CUSTOM FIELDS Rule Type BRFplus Flat Rule (LineItem by LineItem) a) On the SAP Easy Access - User Menu screen, in the command field, enter transaction GRFNMW_DEV_RULES. b) Choose Enter. c) On the Generate MSMP Rule for Process screen, enter the data from the table. © Copyright. All rights reserved. 218 Solution 33: Add Custom Fields to Role Definition d) Choose Enter. Note: Do not choose Execute. e) In the Generate decision table section, choose Item (BRF+ Flat Rule). f) On the Dialog screen, verify that your custom fields appear. g) Cancel out of all screens without saving any data and return to the SAP Easy Access User Menu screen. h) In the command field, enter BRF+. i) Choose Enter. j) On the Business Rule Framework plus screen, in the My Applications navigation panel, choose Z##_INITIATOR_RULE → Data Object → Structure → GRAC_S_REQUEST_RULE_LINE - Structure. k) In the Detail section, scroll down to locate your custom fields. l) If you fields do not appear, in the Define Data Binding section, choose Refresh Binding. m) Close the BRF+ browser screen. © Copyright. All rights reserved. 219