Maintaining Configuration Settings in Access Control

Size: px
Start display at page:

Download "Maintaining Configuration Settings in Access Control"

Transcription

1 Maintaining Configuration Settings in Access Control Applies to: SAP BusinessObjects Access Control 10.0 SP05 Summary: This guide contains additional information about the parameters used when configuring the access control application. The information covers the configuration parameters available as of SP05. Created: August 2011 Version SAP AG

2 Document History Document Version Description 1.00 Initial release 2011 SAP AG

3 Typographic Conventions Icons Type Style Description Icon Description Example Text Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Caution Note or Important Example Recommendation or Tip Cross-references to other documentation Example text Emphasized words or phrases in body text, graphic titles, and table titles Example text File and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. Example text User entry texts. These are words or characters that you enter in the system exactly as they appear in the documentation. <Example text> EXAMPLE TEXT Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. Keys on the keyboard, for example, F2 or ENTER SAP AG

4 Table of Contents 1. Maintain Configuration Settings Standard Settings Activities Details of Configuration Parameters Copyright SAP AG

5 1. Maintain Configuration Settings This document covers the use of the Customizing activity Maintain Configuration Settings under Governance, Risks, and Compliance > Access Control. In this Customizing activity, you maintain the global configuration settings and parameters used in the access control application. The activity includes settings for the following parameter groups: 01 Change Log 10 Role Management 02 Mitigation 11 Risk Analysis - Risk Terminator 03 Risk Analysis 12 Access Request Role Selection 04 Risk Analysis - Spool 13 Access Request Default Roles 05 Workflow 14 Access Request Role Mapping 06 Superuser Management 15 SOD Review 07 UAR Review 17 Assignment Expiry 08 Performance 18 Access Request Training Verification 09 Risk Analysis - Access Request 19 Authorizations Note: The numbering is part of the parameter group name. In the above list, number 16 is not used. 1.1 Standard Settings The following table lists the delivered parameters and default values. Note: Values labeled as <empty> have no default value. Parameter Group Parameter ID Description Default Value Change Log 1001 Enable Function Change Log Change Log 1002 Enable Risk Change Log Change Log 1003 Enable Organization Rule Log Change Log 1004 Enable Supplementary Rule Log Change Log 1005 Enable Critical Role Log Change Log 1006 Enable Critical Profile Log Change Log 1007 Enable Rule Set Change Log Change Log 1008 Enable Role Change Log Mitigation 1011 Default expiration time for mitigating control assignments (in days) 365 August

6 Parameter Group Mitigation 1012 Mitigation 1013 Risk Analysis 1021 Risk Analysis 1022 Parameter ID Description Default Value Consider Rule ID also for mitigation assignment Consider System for mitigation assignment Consider Org Rules for other applications Allow object IDs for this connector to be case sensitive Risk Analysis 1023 Default report type for risk analysis 2 Risk Analysis 1024 Default risk level for risk analysis 3 <empty> Risk Analysis 1025 Default rule set for risk analysis <empty> Risk Analysis 1026 Default user type for risk analysis A Risk Analysis 1027 Enable Offline Risk Analysis Risk Analysis 1028 Include Expired Users Risk Analysis 1029 Include Locked Users Risk Analysis 1030 Include Mitigated Risks Risk Analysis 1031 Ignore Critical Roles and Profiles Risk Analysis 1032 Risk Analysis 1033 Risk Analysis 1034 Risk Analysis 1035 Include Reference user when doing user analysis Include Role/Profile Mitigating Controls in Risk Analysis Max number of objects in a package for parallel processing Send notification to the monitor of the updated mitigated object Risk Analysis 1036 Show all objects in Risk Analysis Risk Analysis 1037 Use SoD Supplementary Table for Analysis 100 Risk Analysis 1046 Extended objects enabled connector <empty> Risk Analysis - Spool 1051 Max number of objects in a file or database record Risk Analysis - Spool 1052 Spool File Location <empty> Risk Analysis - Spool 1053 Spool Type D Workflow 1061 Mitigating Control Maintenance Workflow 1062 Mitigation Assignment Workflow 1063 Risk Maintenance Workflow 1064 Function Maintenance Risk Analysis - Access Request Risk Analysis - Access Request Enable risk analysis on form submission Mitigation of critical risk required before approving the request Risk Analysis - Risk 1080 Connector enabled for Risk <empty> August

7 Parameter Group Terminator Parameter ID Description Default Value Terminator Risk Analysis - Risk Terminator 1081 Enable Risk Terminator for PFCG Role Generation Risk Analysis - Risk Terminator 1082 Enable Risk Terminator for PFCG User Assignment Risk Analysis - Risk Terminator 1083 Enable Risk Terminator for SU01 Role Assignment Risk Analysis - Risk Terminator 1084 Enable Risk Terminator for SU10 multiple User Assignment Risk Analysis - Risk Terminator 1085 Stop role generation if violations exist Risk Analysis - Risk Terminator 1086 Comments are required in case of violations Risk Analysis - Risk Terminator 1087 Send Notification in case of violations Risk Analysis - Risk Terminator 1088 Default report type for Risk Terminator 2 Authorizations 1100 Enable authorization logging Workflow 1101 Create Request for Risk Approval 12 Workflow 1102 Update Request for Risk Approval 13 Workflow 1103 Delete Request for Risk Approval 14 Workflow 1104 Workflow 1105 Workflow 1106 Workflow 1107 Workflow 1108 Workflow 1109 Create Request for Function Approval Update Request for Function Approval Delete Request for Function Approval Create Request for Mitigation Assignment Approval Update Request for Mitigation Assignment Approval Delete Request for Mitigation Assignment Approval Workflow 1110 High 2 Workflow 1111 High 3 Workflow 1112 High 4 Workflow 1113 Access Control Sender WF-BATCH Performance 1120 Batch size for Batch Risk Analysis 1000 Performance 1121 Batch size for User Sync 1000 Performance 1122 Batch size for Role Sync 1000 Performance 1123 Batch size for Profile Sync 1000 UAR Review 2004 Request Type for UAR <empty> UAR Review 2005 Default Priority 005 August

8 Parameter Group Parameter ID Description Default Value UAR Review 2006 Who are the reviewers? MANAGER UAR Review 2007 Access Request Default Roles Access Request Default Roles Access Request Default Roles Access Request Default Roles Access Request Default Roles Access Request Role Mapping Access Request Role Mapping Admin. review required before sending tasks to reviewers 2009 Consider Default Roles 2010 Request type for default roles <empty> 2011 Default Role Level <empty> 2012 Role Attributes <empty> 2013 Request Attributes <empty> 2014 Enable Role Mapping 2015 Applicable to Role Removals SOD Review 2016 Request Type for SoD <empty> SOD Review 2017 Default priority for SoD <empty> SOD Review 2018 Who are the reviewers? MANAGER SOD Review 2019 Admin. review required before sending tasks to reviewers SOD Review 2023 Is actual removal of role allowed? Access Request Training Verification Access Request Role Selection Access Request Role Selection Access Request Role Selection Access Request Role Selection Access Request Role Selection Access Request Role Selection Access Request Role Selection Access Request Role Selection Access Request Role Selection 2024 Training and verification <empty> 2031 Allow All Roles for Approver 2032 Approver Role Restriction Attribute <empty> 2033 Allow All Roles for Requestor 2034 Requestor Role Restriction Attribute <empty> 2035 Allow Role Comments 2036 Role Comments Mandatory Assignment Expiry 2041 Display expired roles for existing roles Auto Approve Roles without Approvers Search Role by Transactions from Backend System Duration for assignment expiry in Days <empty> August

9 Parameter Group Performance 2050 Performance 2051 Parameter ID Description Default Value Enable Realtime LDAP Search for Access Request User Enable User ID Validation in Access Request Against Search Data Sources Role Management 3000 Default Business Process <empty> Role Management 3001 Default Subprocess <empty> Role Management 3002 Default Criticality Level <empty> Role Management 3003 Default Project Release <empty> Role Management 3004 Default Role Status <empty> Role Management 3006 Role Management 3007 Role Management 3008 Role Management 3009 Role Management 3010 Role Management 3011 Role Management 3012 Role Management 3013 Role Management 3014 Role Management 3015 Role Management 3016 Role Management 3017 Role Management 3018 Role Management 3019 Role Management 3020 Role Management 3021 Allow add functions to an authorization Allow editing organizational level values for derived roles A ticket number is required after authorization data changes Allow Role Deletion from back-end system Allow attaching files to the role definition Conduct Risk Analysis before Role Generation Allow Role Generation on Multiple Systems Use logged-on user credentials for role generation Allow role generation with Permission Level violations Allow role generation with Critical Permission violations Allow role generation with Action Level violations Allow role generation with Critical Action violations Allow role generation with Critical Role/Profile violations Overwrite individual role Risk Analysis results for Mass Risk Analysis Role certification reminder notification Directory for mass role import server files Workflow 3022 Request Type for Role Approval 21 Workflow 3023 Priority for Role Approval 5 10 <empty> August

10 Parameter Group Workflow 3024 Superuser Management Superuser Management Superuser Management Superuser Management Superuser Management Superuser Management Superuser Management Superuser Management Superuser Management Superuser Management Superuser Management Parameter ID Description Default Value Enforce methodology process for derived roles during generation 4000 Application Type Default Firefighter Validity Period (in days) <empty> 4002 Send Immediately 4003 Retrieve Change Log 4004 Retrieve System Log 4005 Retrieve Audit Log 4006 Retrieve O/S Command Log 4007 Send Log Report Execution Notification Immediately 4008 Send FirefightId Logon Notification 4009 Log Report Execution Notification 4010 Firefighter ID Role Name ZSAP_GRAC_SMP_FFID 1.2 Activities To maintain the configuration settings: 1. Choose the New Entries pushbutton and select a parameter group from the dropdown list. 2. In the Parameter ID column, select a parameter ID for use with the parameter group. The short description appears on the right-hand side. 3. Select a Parameter Value from the dropdown list, or enter values in the field. 4. In the Priority field, enter a number for the priority. 5. Choose Save. 1.3 Details of Configuration Parameters The information in this section explains in further detail the configuration parameters. The table is formatted and ordered to match the table displayed in the actual Customizing activity. For each parameter, the table includes information about the purpose of the parameter, the available option values, and screenshots to provide context about how the parameter affects the application. August

11 Note: The application provides a standard set of work centers, however, your system administrator can customize them according to your company s corporate processes and structures. Additionally, Access Control is available both as a standalone application and as part of the GRC 10.0 application. Depending on the GRC applications you have licensed, different areas of the access control application are displayed. The navigation paths included in this document and in the screenshots may differ from yours. # Parameter Group Parameter ID Description DEFAULT Value Change Log 1001 Enable Function Change Log Set to to display the Change History tab on the Function screen. 1 Change Log 1002 Enable Risk Change Log Set to to display the Change History tab on the Access Risk screen. 2 August

12 Change Log 1003 Enable Organization Rule Log Set to to display the Change History tab on the Organization Rules screen. 3 Change Log 1004 Enable Supplementary Rule Log Set to to display the Change History tab on the Supplementary Rules screen. 4 August

13 Change Log 1005 Enable Critical Role Log Set to to display the Change History tab on the Critical Role screen. 5 Change Log 1006 Enable Critical Profile Log Set to to display the Change History tab on the Critical Profile screen. 6 August

14 Change Log 1007 Enable Rule Set Change Log Set to to display the Change History tab on the Rule Sets screen. 7 Change Log 1008 Enable Role Change Log Set to to display the Change History link on the Additional Details tab of the Role Maintenance screen. 8 August

15 Mitigation 1011 Default expiration time for mitigating control assignments (in days) The default quantity of days you are allowed to mitigate any object (selection on service map). You can overwrite this quantity in the Valid To field August

16 Mitigation 1012 By default the application includes all rules when it mitigates the access risk. Consider Rule ID also for mitigation assignment Setting the value to allows you to specify the specific Rule ID to be included when mitigating the risk. 10 August

17 Mitigation 1013 Consider System for mitigation assignment Setting the value to allows you to apply mitigating controls to risks originating from specific systems. 11 August

18 Risk Analysis 1021 Consider Org Rules for other applications Setting the value to automatically selects the Consider Org Rule checkbox on the Risk Violations tab of the Access Request and Role Maintenance screens. 12 August

19 Risk Analysis 1022 Allow object IDs for this connector to be case sensitive <empty> On the Risk Analysis screen you can perform risk analysis. You specify the system and the analysis criteria such as User, Risk Level, and so on. This parameter allows you to specify for which systems the information entered is case sensitive. In the example below, z_cup_usr001 is case sensitive for system NCACLNT Note: To enter more than one system or connector, enter additional instances of the parameter. August

20 Risk Analysis 1023 Default report type for risk analysis 2 The Risk Analysis screen allows you to select several options for the risk analysis, such as analysis criteria, report options, and additional criteria. This parameter allows you to choose the type of report that is selected by default. Note: In the value cell, press F4 to display the available types, such as Permission Level, and so on. 14 Note: This setting does not affect the Risk Analysis Type fields on the Batch Risk Analysis screens; you must set these separately. August

21 Risk Analysis 1024 Default risk level for risk analysis The Risk Analysis screen allows you to select several options for the risk analysis, such as analysis criteria, report options, and additional criteria. This parameter allows you to choose the Risk Level that is selected by default. Risk Analysis 1025 Default rule set for risk analysis <empty> The Risk Analysis screen allows you to select several options for the risk analysis, such as analysis criteria, report options, and additional criteria. This parameter allows you to choose the Rule Set that is selected by default. Risk Analysis 1026 Default user type for risk analysis A The Risk Analysis screen allows you to select several options for the risk analysis, such as analysis criteria, report options, and additional criteria. This parameter allows you to choose the User Type that is selected by default. Risk Analysis 1027 Enable Offline Risk Analysis The Risk Analysis screen allows you to select several options for the risk analysis, such as analysis criteria, report options, and additional criteria. Set the parameter value to to include Offline Data in risk analysis by default. On the Risk Analysis screen the Offline Data checkbox is automatically selected Risk Analysis 1028 Include Expired Users Set to to include expired users from plug-in systems for risk analysis. Risk Analysis 1029 Include Locked Users Set to to include locked users from plug-in systems for risk analysis. Risk Analysis 1030 Include Mitigated Risks The Risk Analysis screen allows you to select several options for the risk analysis, such as analysis criteria, report options, and additional criteria. Set the parameter value to to include Mitigated Risks in the risk analysis by default. The application displays the SoD violations, the mitigated risks, and the mitigating control assigned to it. On the Risk Analysis screen, the Include Mitigated Risks checkbox is automatically selected Risk Analysis 1031 Ignore Critical Roles and Profiles Set the value to to exclude critical roles and profiles for risk analysis. Risk Analysis 1032 Include Reference user when doing user analysis Set the value to to include referenced users when performing SoD risk analysis for users. This is also valid for Batch Risk Analysis. Risk Analysis 1033 Include Role/Profile Mitigating Controls in Risk Analysis Set the value to to include the mitigating controls assigned to the user s roles and profiles for risk analysis. Risk Analysis 1034 Maximum number of objects in a package for parallel processing The application uses this parameter in conjunction with the Number of Tasks specified in the Customizing activity Distribute Jobs for Parallel Processing to determine the distribution of objects that are processed per job. For example, if there are 10,000 users to analyze and this value is 100, then there will be 100 packages created each having 100 users. Each package is submitted to a separate background process which is available to the application via the application group If instead, we specify three background processes are available to GRAC_SOD, 100 packages are submitted one by one to these processes. Three packages initially and then one by one to each process which complete the package execution. Note: The RZ10 parameter rdisp/wp_no_btc overrides this configuration. Therefore, if the RZ10 parameter is set to 2, then the application ignores the parameter in this setting and uses the value 2 instead. August

22 Risk Analysis 1035 Send notification to the monitor of the updated mitigated object Set the value to to send notifications to the owner of the mitigating control when the mitigated object is updated, such as the user/role. 26 August

23 Risk Analysis 1036 Show all objects in Risk Analysis Set the value to to select the Show All Objects checkbox on the Risk Analysis screen by default. 27 The objects that do not have violations are displayed with the Action: No Violations. Note: This setting applies to SoD Batch Risk Analysis. Risk Analysis 1037 Set value to to use supplementary rules for SoD risk analysis. Use SoD Supplementary Table for Analysis 28 August

24 29 Risk Analysis 1046 Extended objects enabled connector <empty> Extended objects are objects from non-sap systems. This parameter allows you to specify the connectors for non-sap systems. The connectors can have object lengths greater than SAP objects. For example, SAP User ID length is 12, but the extended object length may be 50. Note: You can set multiple connectors by adding multiple instances of the parameter. 30 Risk Analysis - Spool 1051 Max number of objects in a file or database record You can use this parameter to specify the maximum number of analytics data objects the application stores. If parameter 1053 is set to F, the value is the maximum number of objects stored in the file If parameter 1053 is set to D, the value is the maximum number of objects stored in the REPCONTENT column of the GRACSODREPDATA table. Note: You can use the GRAC_DELETE_REPORT_SPOOL program to clean up the analytics data from the file system or table. Prerequisite: You have configured parameters 1052 and Risk Analysis - Spool 1052 Spool File Location <empty> You can specify the file location the application stores the analytics data, such as \\<ip_address>\public\sod\. Note: This parameter is only valid if parameter 1053 is set to F. Prerequisite: You have configured parameter Risk Analysis - Spool 1053 Spool Type D You can use this parameter to set whether the application uses the file system or the database table to store the analytics data for access control, such as ad hoc SoD violations. Set the value to F to store the data on the file system. (You set the file location in parameter 1052). Set the value to D to store the data inthe GRACSODREPDATA table. Note: You see the intermediate results while risk analysis is running. This gives you an opportunity to see if the desired records are created and choose to stop or cancel the job. If you change the location type (such as from D to F) in mid-course, the report will still read the previously generated files or database records. Index tables keep track of the source of the records when the data was generated. If you cancel the job before the report is finished, you can still read the data up to the point the files or database records were created. August

25 Workflow 1061 Mitigating Control Maintenance The application allows users to create and change mitigating controls. Set the value to to require that when users create or change mitigating controls, the application sends a workflow item to an approver to approve the action. Note: On the Mitigating Control screen, the Create button is replaced by a Submit button. You can configure the role that receives the workflow item for approving the mitigating control changes using the Customizing activity Maintain MSMP Workflows under Governance, Risk, and Compliance > Access Control > Workflow for Access Control. Figure A below shows that on the control Owners tab the Mitigation Control Approver points to the Approver. Figure B below shows you can use Maintain MSMP Workflows to change the approver agent ID (GRAC_CONTROL_APPROVER). Figure A Figure B August

26 Workflow 1062 Mitigation Assignment The application allows users to mitigate risks for objects (user, role, profile, and so on). Set the value to to require the application send an approval workflow item to the mitigating control approver. The screen displays a Submit button. Note: You can configure the role that receives the workflow item for approving the mitigating control changes using the Customizing activity Maintain MSMP Workflows under Governance, Risk, and Compliance > Access Control > Workflow for Access Control. Set the value to and the users can mitigate risks without approval. The screen displays a Save button. 34 August

27 Workflow 1063 Risk Maintenance The application allows users to create and modify risks. Set the value to to require the application send an approval workflow item to the Risk Owner (or to any alternate workflow agent you set) for approval. The screen displays a Submit button. Note: You can configure the role that receives the approval workflow item using the Customizing activity Maintain MSMP Workflows under Governance, Risk, and Compliance > Access Control > Workflow for Access Control. Set the value to and then users can create and modify risks without approval. The screen displays a Save button. 35 August

28 Workflow 1064 Function Maintenance The application allows users to create and change functions. Set the value to to require the application send an approval workflow item to the specified workflow agent for approval when functions are created or modified. Note: Workflow agents are users who have been assigned the role SAP_GRAC_FUNCTION_APPROVER. You can change the approver agent by using the Customizing activity Maintain MSMP Workflows under Governance, Risk, and Compliance > Access Control > Workflow for Access Control. 36 August

29 Risk Analysis - Access Request 1071 Enable risk analysis on form submission The application automatically performs risk analysis when the requestor submits the request. Note: The risk analysis results are intended for the approver. Therefore, the risk analysis results appear on the approver s screens but not on the requestor s screens Risk Analysis - Access Request 1072 Mitigation of critical risk required before approving the request Set the value to to require mitigation of Risks that are of the type Critical Access. Risk Analysis - Risk Terminator 1080 Connector enabled for Risk Terminator Enter the name of the connector in the value field to enable it for risk terminator. You can enter multiple values by entering multiple instances of the parameter, as follows: <empty> Note: The Plug-in Connector is maintained in parameter The GRC Connector is maintained in parameter August

30 Risk Analysis - Risk Terminator 1081 Set to to trigger the risk terminator service for PFCG Role Generation. Enable Risk Terminator for PFCG Role Generation The Risk Terminator service is a tool that resides in the back end SAP ABAP system and notifies you when a risk violation occurs. Risk Analysis - Risk Terminator 1082 Set to to trigger the risk terminator service for PFCG User Assignment. Risk Analysis - Risk Terminator 1083 Set to to trigger the risk terminator service for SU01 Role Assignment. Risk Analysis - Risk Terminator 1084 Enable Risk Terminator for PFCG User Assignment Enable Risk Terminator for SU01 Role Assignment Enable Risk Terminator for SU10 multiple User Assignment Set to to trigger the risk terminator service for SU10 Multiple User Assignment. Risk Analysis - Risk Terminator 1085 Set to the risk terminator service stops generating roles if violations exist. Risk Analysis - Risk Terminator 1086 Stop role generation if violations exist Comments are required in case of violations Set the value to to require the user to enter comments if SoD violations are reported and the user wants to continue with role generation or role assignment. Risk Analysis - Risk Terminator 1087 Send Notification in case of violations Set the value to to enable the application to send notifications to the role owner when violations occur. Risk Analysis - Risk Terminator 1088 Default report type for Risk Terminator Select the default report type the risk terminator service uses to report SoD violations. Use F4 help to display the available report types. Authorizations 1100 Enable the authorization logging If set to, the application logs all occurrences of insufficient authorizations on the GRC box in transaction SLG1. For example, an owner wants to perform an action and is missing the necessary authorizations. Workflow 1101 Create Request for Risk Approval 12 Use F4 help and choose the request type the workflow uses to create requests for risk approval. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. This request type is associated with an MSMP process ID such as SAP_GRAC_RISK_APPR August

31 Workflow 1102 Update Request for Risk Approval Use F4 help and choose the request type the workflow uses to update requests for risk approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1103 Delete Request for Risk Approval 14 Use F4 help and choose the request type the workflow uses to delete requests for risk approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1104 Create Request for Function Approval Use F4 help and choose the request type the workflow uses to create requests for function approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1105 Update Request for Function Approval Use F4 help and choose the request type the workflow uses to update requests for function approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1106 Delete Request for Function Approval Use F4 help and choose the request type the workflow uses to delete requests for risk approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1107 Create Request for Mitigation Assignment Approval Use F4 help and choose the request type the workflow uses to create requests for mitigation assignment approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1108 Update Request for Mitigation Assignment Approval Use F4 help and choose the request type the workflow uses to update requests for mitigation assignment approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1109 Delete Request for Mitigation Assignment Approval Use F4 help and choose the request type the workflow uses to delete requests for mitigation assignment approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 1110 High 2 You use this parameter to set the default workflow request priority for Updating and Creating Risks. Use F4 help to display the list of available priorities. You maintain the list of available priority values in the Customizing activity Maintain Priority Configuration under Governance, Risk, and Compliance > Access Control > User Provisioning. You assign the MSMP Process ID of SAP_GRAC_RISK_APPR to risk approval priorities August

32 Workflow 1111 High You use this parameter to set the default workflow request priority for Creating and Updating Functions. Use F4 help to display the list of available priorities. You maintain the list of available priority values in the Customizing activity Maintain Priority Configuration under Governance, Risk, and Compliance > Access Control > User Provisioning. You assign the MSMP Process ID of SAP_GRAC_FUNC_APPR to function approval priorities. Workflow 1112 High 4 You use this parameter to set the default workflow request priority for Mitigation Control Assignments. Use F4 help to display the list of available priorities. You maintain the list of available priority values in the Customizing activity Maintain Priority Configuration under Governance, Risk, and Compliance > Access Control > User Provisioning. You assign the MSMP Process ID of SAP_GRAC_CONTROL_ASGN to mitigation control assignment priorities. Workflow 1113 Access Control sender WF-BATCH The application uses the of this user as defined in SU01 to send the workflow s to the approvers. See the Access Control 10.0 Security Guide for information about required authorizations for the WF-BATCH user. Performance 1120 Batch size for Batch Risk Analysis 1000 The application uses this value to determine the size of the batch when performing batch risk analysis. (See also parameter 1121 for an example). Performance 1121 Batch size for User sync 1000 The application uses this value to determine the size of the batch when synchronizing users to the GRC AC Repository. For example, if the batch size is 1000 and there are 10,000 users, the application divides the total users (10,000) by the batch size (1000), and then processes the job in 10 batches of the range 0 to 1000, 1001 to 2000 so on. Each batch is processed in its entirety before continuing with the next. To synchorinize users to the GRC AC Repository, you use the Customizing activity Repository Object Synch under Governance, Risks, and Compliance > Access Control > Synchronization Jobs Performance 1122 Batch size for Role sync 1000 The application uses this value to determine the size of the batch when synchronizing roles to the GRC AC Repository. Each batch is processed in its entirety before moving on to the next. See also parameter Performance 1123 Batch size for Profile sync 1000 The application uses this value to determine the size of the batch when synchronizing profiles to the GRC AC Repository. Each batch is processed in its entirety before moving on to the next. See also parameter August

33 UAR Review 2004 Request Type for UAR <empty> All Request Types that are defined for SAP_GRAC_USER_ACCESS_REVIEW are visible by pressing F4. 66 This is important for tagging the workflow in MSMP for UAR Review. UAR Review 2005 Default Priority 005 You use this parameter to set the default priority for user access request reviews. Use F4 help to display the list of available priorities for UAR Requests. 67 You maintain the list of available priority values in the Customizing activity Maintain Priority Configuration under Governance, Risk, and Compliance > Access Control > User Provisioning. You assign the MSMP Process ID of SAP_GRAC_USER_ACCESS_REVIEW to UAR Review priorities. In this example, priority IDs 10, 22, 24, and 36 are relevant for UAR. Review. August

34 UAR Review 2006 Who are the reviewers? MANAGER Select either Manager or Role Owner as the approver type for user access review requests. The application creates a review workflow for the specified approver type. Managers receive review requests sorted by USER, and Role Owners receive review requests sorted by ROLE. 68 August

35 UAR Review 2007 Admin. review required before sending tasks to reviewers Set the value to to require that users who are assigned the role of access request administrator (such as SAP_GRAC_ACCESS_REQUEST_ADMIN) must review the request before the workflow goes to the reviewers. (You specify reviewers in parameter 2006). 69 Access Request Default Roles 2009 Consider Default Roles If set to, the application automatically adds the relevant Default Roles to the access request. Prerequisites: You have maintained the following parameters as needed: 2011, 2012, and In this example, the value for the attribute Functional Area maps to a relevant default role, so the application adds the role to the request. 70 August

36 71 Access Request Default Roles 2010 Request type for default roles <empty> Enter the request types that are relevant for default roles functionality. The application adds default roles only for the specified roles. Enter multiple request types by adding additional instances of the parameter. Use F4 help to display the available request types. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. See also parameters 2009, 2011, 2012, and Access Request Default Roles 2011 Default Role Level <empty> Select which attribute type the application uses to determine the relevance of the default roles. Role The application uses the role attributes to determine the relevant default roles and adds the default roles at the time the user adds the roles to the request. That is, the user does see the added default roles at the time they create the request. You define the relevant role attributes in parameter Request - The application uses the request attributes to determine the relevant default roles and adds the default roles when the request is displayed for the approver. That is, the user does not see the added default roles at the time they create the request. You define the relevant request attributes in parameter In this example, the value is set to Request. The manager receives a request with the default role z_user_admin already added, because Functional Area is a relevant attribute. 72 In this example, the value is set to Role. On the request screen, the application shows the default roles as Existing and adds them to the request. August

37 73 See also parameters 2009, 2010, 2012, and Access Request Default Roles 2012 Role Attributes <empty> Enter the role attributes the application considers for Default Role Attribute mapping. These are mutually exclusive of the request attributes maintained in parameter You can add multiple role attributes by adding additional instances of the parameter. See also parameters 2009, 2010, 2011, and August

38 Access Request Default Roles 2013 Request Attributes <empty> 74 Enter the request attributes the application considers for Default Role Attribute mapping. These are mutually exclusive of the request attributes maintained in parameter You can add multiple role attributes by adding additional instances of the parameter. See also parameters 2009, 2010, 2011, and Access Request Role Mapping 2014 Enable Role Mapping The application allows you to assign roles as child roles (or map the roles). This allows anyone who is assigned this role to also be assigned the authorizations and access for the child roles. Set the parameter value to to enable this functionality. The role mappings are applicable for provisioning access requests. Note: On the Role Maintenance screen, you can select the Consider Parent Role Approver checkbox to use only the approvers associated with the parent roles and ignore any approvers associated with the child roles. In the following example, the user is requesting the role BS_BS_123 of system GF1->GO7. The mapped role AC_C_ROLE1 is automatically added to the request. The user can choose to remove the role from the request. Note: The Source System dropdown list is from the same landscape you chose on the Detail tab. 75 Access Request Role Mapping 2015 Applicable to Role Removals Set the value to to allow users to include mapped roles in requests for role removal. For example, if a user creates a request to remove a role assigned to them, and the role has mapped roles, then the mapped roles are automatically included in the request. The user can choose to keep the mapped roles by deleting them from the removal request. SOD Review 2016 Request Type for SoD <empty> Use F4 help and select the request type when SoD review requests are created. You maintain the list of available request type values in the Customizing activity Define Request Types under Governance, Risk, and Compliance > Access Control > User Provisioning. You assign the MSMP Process ID of SAP_GRAC_SOD_RISK_REVIEW. August

39 SOD Review 2017 Default priority for SoD <empty> 78 Use F4 help and select the default priority used for SoD review requests. You maintain the list of available priority values in the Customizing activity Maintain Priority Configuration under Governance, Risk, and Compliance > Access Control > User Provisioning. You assign the MSMP Process ID of SAP_GRAC_SOD_RISK_REVIEW. 79 SOD Review 2018 Who are the reviewers? MANAGER Select either Manager or Risk Owner as the approver type for user access review requests. The application creates a review workflow for the specified approver type. Managers receive review requests sorted by USER, and Risk Owners receive review requests sorted by Risk. SOD Review 2019 Admin. review required before sending tasks to reviewers Set the value to to require that users who are assigned the role of access request administrator (such as SAP_GRAC_ACCESS_REQUEST_ADMIN) must review the request before the workflow goes to the reviewers. (You specify reviewers in parameter 2018). 80 SOD Review 2023 Is actual removal of role allowed 81 You use this parameter to configure whether the reviewers of SoD risks are allowed to remove the actual roles associated with a SoD risk or only propose removal of the roles. Set value as This is the default setting, and the recommended setting. On the SoD Review screen, the application displays the Propose Removal button. Reviewers can only propose the removal of roles associated with a SoD risk violation. The workflow goes to the security administrator who is able to view the source of the risk before deciding whether or not to remove the role. Set value as This setting is not recommended. On the SoD Review screen, the application displays the Remove Role button. This allows the reviewer to delete the roles directly without going through approval by the security administrator. Warning: Reviewers do not have the ability to view the source of the risks; therefore have the risk of potentially deleting relevant roles. August

40 Access Request Training Verification 2024 Training and verification <empty> The application allows you to require that users complete specific training courses before the application provisions specific roles to them. You enable this functionality by : 1. Setting training requirements (See Example 1 below.) 2. Configuring MSMP routing rule 3. Configuring the data source systems for verifying if the training requirements are completed Example 1: The user is requesting a role that has a TRAINING prerequisite, and Verify on Request is set to Yes. The application will not allow them to submit the request until all the prerequisites are met. 82 The application has a Routing rule for Training and Verification in MSMP (GRAC_MSMP_DETOUR_TRG_VERIF). The routing checks this parameter to determine the data source for verifying if the user has completed the training required for the roles they are requesting to add. If the required training is not completed for a particular role the application does not provision the role, and instead, sends the request to the routing path. Leave the value field empty to disable the function. The workflow does not take any routing paths. Set the value to BAdI and the application uses the specified BadI to perform the verification. Set the value to WS and the application uses the specified web service to perform the verification. You specify the prerequisite system in the connector configuration. To configure the connectors, use the Customizing activity Maintain Connectors and Connector Types under Governance, Risk, and Compliance > Common Component Settings > Integration Framework. The connector must be of the type WS and associated with a logical port. You can define the logical port in transaction SOAMANAGER. Prerequisite: You have implemented the BadI or webservice (WS) as needed. Yes, it correct to say that to disable this function, leave the value field empty. So if the value is empty Note: You can configure the routing in the Customizing activity Maintain MSMP Workflows under Governance, Risk, and Compliance > Access Control > Workflow for Access Control. Access Request Role Selection 2031 Allow All Roles for Approver 83 The application allows approvers to add additional roles to access requests when reviewing them. Set the value to to allow approvers to view and select all roles. Set the value to to restrict the roles the approvers can view and select for request creation. You specify the restriction criteria in parameter August

41 Access Request Role Selection 2032 Approver Role Restriction Attribute <empty> The application allows approvers to add additional roles to access requests when reviewing them. You can restrict the roles approvers can view and select for request creation. Set the value to A to Restrict on Role Approver. Approvers can view and select only those roles for which they are the role approver. Set the value to B to Restrict on Business Process. Approvers can view and add only those roles with business process attributes that match those in the request Set the value to F to Restrict on Functional Area. Approvers can view and add only those roles with functional area attributes that match those in the request. Prerequisite: You have set parameter 2031 to. If parameter 2031 is set to, the application ignores the restrictions specified here. You can add multiple restriction values by adding additional instances of the parameter Access Request Role Selection 2033 Allow All Roles for Requestor Set the value to to allow the user to view all roles for request creation. Set the value to to restrict the roles the user can view for request creation. You specify the restriction criteria in parameter August

42 Access Request Role Selection 2034 Requestor Role Restriction Attribute <empty> This parameter allows you to require that, for access request creation, the application displays only the roles that have attributes that match the specified requestor attributes. Set the value to B to Restrict on Business Process. The application displays only the roles that match the requestor s business process attribute. Set the value to F to Restrict on Functional Area. The application displays only the roles that match the requestor s functional area attribute. Prerequisite: You have set parameter 2033 (Allow All Roles for Requestor) to. If parameter 2033 is set to, the application ignores the restrictions specified here. You can add multiple restriction values by adding additional instances of the parameter Access Request Role Selection 2035 Allow Role Comments Set value to to allow the user to enter Role Comments when creating access requests. Access Request Role Selection 2036 Role Comments Mandatory Set value to to require Role Comments when creating access requests. Note: This is a GLOBAL setting and is required for all roles included on requests. Mandatory comments can also be determined at the individual role level. Prerequisite: Parameter 2035 must be set to. August

43 Access Request Role Selection 2037 Display expired roles for existing roles Set the value to to include the roles for which the user assignment is expired when the user chooses the Existing Assignment button on the Access Request Access Request Role Selection 2038 Auto Approve Roles without Approvers Set the value to to allow the application to automatically approve access requests for roles without role owners. Access Request Role Selection 2039 Search Role by Transactions from Backend System Set the value to to allow users to search for roles using the role information in the GRC AC Repository. Set the value to to allow users to search for roles by transactions on a specific backend system in real time. This has the following effect: It adds the Transaction from Backend System criteria to the Select Roles screen. It makes the System criteria mandatory. It fetches role information from the specified system in real time, which may have an effect on performance. 91 August

44 92 Assignment Expiry 2041 Duration for assignment expiry in Days <empty> On the My Profile and Existing Assignment screens, the application displays the Status field for the roles. Roles that are about to expire displays the status of Expiring. You use this parameter to specify the timeframe (in days) that triggers the application to display the status as Expiring. In the following example, the My Profile and Existing Assignment screens will show the status of Expiring for all roles assigned to the user that is about to expire in 1 to 45 days. 93 Performance 2050 Enable Realtime LDAP Search for Access Request User. If set to, the application searches for the access request user on the specified LDAP source and in real time. Prerequisite: You have specified the data source as LDAP, or else the application ignores this parameter. Note: Be aware that because the search is performed in real time, it impacts performance. Workflow 2051 Enable User ID Validation in Access Request against Search Data Sources If set to, the application validates the UserID exists on the specified source system. If the user does not exist, the application does not allow the request to continue. The validation is performed when you choose Submit or press Enter. 94 August

45 Role Management 3000 Default Business Process <empty> Select the business process the application displays by default on the Role Import screen. Use F4 help to display the available business processes. You maintain the list of business processes in the Customizing activity Maintain Business Processes and Subprocesses under Governance, Risk and Compliance > Access Control. 95 Role Management 3001 Default Subprocess <empty> Select the subprocess the application displays by default on the Role Import screen. Use F4 help to display the available subprocesses. You maintain the list of subprocesses in the Customizing activity Maintain Business Processes and Suprocesses under Governance, Risk and Compliance > Access Control. Role Management 3002 Default Criticality Level <empty> Select the criticality level the application displays by default on the Role Import screen. Use F4 help to display the available criticality levels. You maintain the list of subprocesses in the Customizing activity Specify Criticality Level under Governance, Risk and Compliance > Access Control > Role Management. Role Management 3003 Default Project Release <empty> Select the project release the application displays by default on the Role Import screen. Use F4 help to display the available project releases. You maintain the list of project releases in the Customizing activity Maintain Project and Product Release Name under Governance, Risk and Compliance > Access Control > Role Management. Role Management 3004 Default Role Status <empty> Select the role status the application displays by default on the Role Import screen. Use F4 help to display the available role status. You maintain the list of project releases in the Customizing activity Maintain Role Status under Governance, Risk and Compliance > Access Control > Role Management. August

46 Role Management 3006 Allow add functions to an authorization Set the value to to display the Add/Delete Function button on the Maintain Authorizations tab of the Role Maintenance screen Role Management 3007 Allow editing organizational level values for derived roles The maintenance screen for derived roles displays organizational levels from the parent role. Set the value to to allow the derived roles to change the values for the organizational levels. Role Management 3008 A ticket number is required after authorization data changes Set the value to to require a ticket number when role authorizations are modified in PFCG and the user chooses the Synch with PFCG button. Note: The Ticket Number field is a free text entry field. The application only provides the field and does not have any specific requirements. You can enter information appropriate for your company s change request processes. 102 August

47 Role Management 3009 Allow Role Deletion from back-end system Set the value to to allow users the option to roles from both Access Control and relevant plug-in systems. Setting this value to Yes deletes the roles in each of the systems the role resided individually. For example the role is DELETED directly from PRD instead of having a delete request transported through CTS. Set the value to to allow users to delete roles only from Access Control. 103 Role Management 3010 Allow attaching files to the role definition Set the value to to allow users to attach files by displaying the Attachments tab on the Role Maintenance screen. 104 August

48 Role Management 3011 Conduct Risk Analysis before Role Generation Set the value to to automatically perform risk analysis when the user generates roles. 105 Role Management 3012 Allow Role Generation on Multiple Systems Set the value to to allow users to select multiple systems when generating roles. The application displays systems in the landscape which are available for role generation 106 action. August

49 107 Role Management 3013 Use logged-on user credentials for role generation When generating a role, the application connects to back-end systems to push the authorization data. The applicatiion needs a username/password to open the connection to the back-end ERP system. You can use this parameter to specify whether the application uses a generic username/password for all role generation connections to the ERP system, or the username/password of the person generating the role. Set the value to to use a generic username/password for the connection to the ERP system. You maintain the generic username/password for the connector in the Customizing activity Create Connectors under Governance, Risk, and Compliance > Common Component Settings > Integration Framework. Set the value to to allow the application to use the username/password of the person who is generating the role. The advantage of setting this parameter to Yes is that when someone opens a role in the ERP system, they can view exactly who generated it. If the parameter is set to No they can see only that the connector, with the generic username/password, has generated it. Role Management 3014 Allow role generation with Permission Level violations Set the value to to allow the application to generate roles even if Permission Level violations are present. Set the value to to prohibit role generation if permission level violations are present Role Management 3015 Allow role generation with Critical Permission violations Set the value to to allow the application to generate roles even if permission level violations are present. Set the value to to prohibit role generation if permission level violations are present. Role Management 3016 Allow role generation with Action Level violations Set the value to to allow the application to generate roles even if action level violations are present. Set the value to to prohibit role generation if action level violations are present. Role Management 3017 Allow role generation with Critical Action violations Set the value to to allow the application to generate roles even if critical action violations are present. Set the value to to prohibit role generation if critical action violations are present. Role Management 3018 Allow role generation with Critical Role/Profile violations Set the value to to allow the application to generate roles even if critical role/profile violations are present. Set the value to to prohibit role generation if critical role/profile violations are present. August

50 Role Management 3019 Overwrite individual role Risk Analysis results for Mass Risk Analysis The application allows you to perform ad hoc risk analysis for multiple roles under Access Management > Role Mass Maintenance > Run Risk Analysis. The application stores the results of the analysis. (See also parameters 1052, 1053). When you next perform mass risk analysis, the application searches the stored data to determine if there are previous risk analysis results for each role. You can choose whether or not the application overwrites the risk analysis results. Set the parameter value to to overwrite previous results. Set the parameter value to to not overwrite previous results. Note: This is done per individual role; it does not automatically overwrite the results for all roles. 113 Role Management 3020 Role certification reminder notification You use this parameter to set how many days prior to the Next Certification date the application sends a reminder to the role owner. For example, if the next certification is June 15, xxxx, and this parameter value is 10, then the application sends the reminder notification to the role owner on June 5, xxxx. You set the Certification Period in Days and Next Certification date in the Define Role phase, on the Properties tab Note Additional information about Certification Notifications: You can use the following Customizing activities to maintain custom notification s under Governance, Risks, and Compliance > Access Control > Workflow for Access Control: August

51 Maintain Custom Notification Messages Maintain Text for Custom Notification Messages Maintain Background Job for Reminders The following is an example of a notification The application provides notification templates. You can choose to assign your own custom notification templates in the Customizing activity Maintain Custom Notification Messages under Governance, Risk, and Compliance > Access Control > Workflow for Access Control. You can customize the notification text by using the Customizing activity Maintain Text for Custom Notification Messages under Governance, Risks, and Compliance > Access Control > Workflow for Access Control. For certification notifications to be delivered, you must run the GRAC_ERM_ROLE_CERTIFY_TIF program either in the foreground or the background. You can schedule background jobs to run periodically using the Customizing activity Maintain Background Job for Reminders under Governance, Risk, and Compliance > Access Control > Workflow for Access Control. August

52 If you run the program in the foreground, the application displays the following results screen: Role Management 3021 Directory for mass role import server files <empty> The application allows you to perform mass role import under Access Management > Role Mass Maintenance > Role Import. You can select the Import Source as File on Server. You use this parameter to specify the location of the files on the server. Workflow 3022 Request Type for Role Approval 21 Use F4 help and choose the request type the workflow uses for role approval. The request type is associated with an MSMP process ID. You maintain the list of available request types in the Customizing activity Define Request Type under Governance, Risk, and Compliance > Access Control > User Provisioning. (See also parameter 1101). Workflow 3023 Priority for Role Approval 5 Priority of the request for Role Approval You use this parameter to set the default workflow request priority for Role Approvals. Use F4 help to display the list of available priorities. You maintain the list of available priority values in the Customizing activity Maintain Priority Configuration under Governance, Risk, and Compliance > Access Control > User Provisioning. You assign the MSMP Process ID of SAP_GRAC_ROLE_APPR to role approval priorities. August

53 Role Management 3024 Enforce methodology process for derived roles during generation You use this parameter to determine the derived roles displayed in the role generation phase of the master role. Set the value to to display only the derived roles that reach the role generation phase of the methodology process. Set the value to to display all derived roles, regardless of their phase in the methodology process. In the following example, Figure A shows five derived roles available; two of the roles are in Role Generation phase. Figure B shows that if the value is set to, only the two roles in Role Generation phase are displayed. 118 Superuser Management 4000 Application type 1 You use this parameter to set the firefighting configuration: Choose 1 for ID-based firefighting. Choose 2 for Role-based firefighting. 119 August

54 Superuser Management 4001 Default Firefighter Validity Period (Days) Set the default validity period (in days) of firefighter ID assignments to a firefighter. <empty> Note: This is only the default period. You can override the validity period for each assignment as needed in the front-end. 120 Superuser Management 4002 Send Immediately The application sends notifications to the controller. Set the value to to send the notifications immediately. Set the value to and the application sends notifications only when the user chooses the Update Firefighter Log button or runs the program GRAC_SPM_LOG_SYNC_UPDATE. The Update Firefighter Log button is available on the Consolidated Log Report under Superuser Management Reports. 121 Superuser Management 4003 Retrieve Change Log 122 If set to then the application fetches the Change Log when the user chooses the Update Firefighter Log button or runs the program GRAC_SPM_LOG_SYNC_UPDATE. The Update Firefighter Log button is available on the Consolidated Log Report under Superuser Management Reports. (See also parameter 4002.) Note: Plug-in system must have the O/S time and R/3 time zone matched for the logs to be properly collected. This is because STAD stores the logs in O/S files. August

55 Superuser Management 4004 Retrieve System Log If set to then the application fetches the System Log (debug changes) when the user chooses the Update Firefighter Log button or runs the program GRAC_SPM_LOG_SYNC_UPDATE. The Update Firefighter Log button is available on the Consolidated Log Report under Superuser Management Reports. (See also parameter 4002.) Superuser Management 4005 Retrieve Audit Log If set to then the application fetches the audit (security) logs when the user chooses the Update Firefighter Log button or runs the program GRAC_SPM_LOG_SYNC_UPDATE. The Update Firefighter Log button is available on the Consolidated Log Report under Superuser Management Reports. Note: You can activate Audit Logs using the transaction SM19. (See also parameter 4002.) Superuser Management 4006 Retrieve O/S Command Log 125 If set to then the application fetches the O/S Command Log when the user chooses the Update Firefighter Log button or runs the program GRAC_SPM_LOG_SYNC_UPDATE. The O/S Command Log tracks information when O/S commands (SM49) are created, changed, or executed. The Update Firefighter Log button is available on the Consolidated Log Report under Superuser Management Reports. (See also parameter 4002.) Superuser Management 4007 Send Log Report Execution Notification Immediately The application can send log reports controllers. The application sends the notifications as s or workflow items based on the configuration of the controllers. (See figure below.) Set the value to and the application sends notifications when the user chooses the Update Firefighter Log button or runs the program GRAC_SPM_LOG_SYNC_UPDATE. The Update Firefighter Log button is available on the Consolidated Log Report under Superuser Management Reports. Set the value to and the application only collects the logs when the user chooses the Update Firefighter Log button or runs the GRAC_SPM_LOG_SYNC_UPDATE program. The application sends the notifications when the GRAC_SPM_WORKFLOW_SYNC program is run Superuser Management 4008 Send FirefightId Logon Notification Set to and the application sends notification to the controller whenever a firefighter logs onto a system. Superuser Management 4009 Log Report Execution Notification Set to and the application sends notification to the controller when a user runs a log report. Superuser Management 4010 Firefighter ID Role Name ZSAP_GRAC_SMP_FFID Enter the name of the role assigned to the firefighter ID in the target systems. This is identifies to the application that the user who is logging on to the target system is a firefighter ID. The target system makes a call to the GRC Box and reads this configuration to check if the user has this role assigned to them. August

Access Control Configuration Parameters. Applies to: Summary: Created: May Version 1.1. Access Control 12.0

Access Control Configuration Parameters. Applies to: Summary: Created: May Version 1.1. Access Control 12.0 Access Control 12.0 Configuration Parameters Applies to: Access Control 12.0 Summary: This guide contains information about the parameters used when configuring Access Control. Created: May 2018 Version

More information

Maintaining Configuration Settings in Access Control

Maintaining Configuration Settings in Access Control Maintaining Configuration Settings in Access Control Applies to: Access Control 10.1 SP18 Summary: This guide contains information about the parameters used when configuring Access Control. Created: July

More information

Testkings.C_GRCAC_10.91 questions

Testkings.C_GRCAC_10.91 questions Testkings.C_GRCAC_10.91 questions Number: C_GRCAC_10 Passing Score: 800 Time Limit: 120 min File Version: 4.5 http://www.gratisexam.com/ SAP C_GRCAC_10 SAP Certified Application Associate - SAP BusinessObjects

More information

Configuring Job Monitoring in SAP Solution Manager 7.2

Configuring Job Monitoring in SAP Solution Manager 7.2 How-To Guide SAP Solution Manager Document Version: 1.0 2017-05-31 Configuring Job Monitoring in SAP Solution Manager 7.2 Typographic Conventions Type Style Example Example EXAMPLE Example Example

More information

Access Control 5.3 Implementation Considerations for Superuser Privilege Management ID-Based Firefighting versus Role-Based Firefighting Applies to:

Access Control 5.3 Implementation Considerations for Superuser Privilege Management ID-Based Firefighting versus Role-Based Firefighting Applies to: Access Control 5.3 Implementation Considerations for Superuser Privilege Management ID-Based Firefighting versus Role-Based Firefighting Applies to: Access Control 5.3 Summary GRC Access Control identifies

More information

How To...Configure Integration of CUP with SPM

How To...Configure Integration of CUP with SPM SAP SOLUTIONS FOR GOVERNANCE, RISK, AND COMPLIANCE How-To Guide How To...Configure Integration of CUP with SPM SAP GRC Regional Implementation Group Applicable Releases: SAP GRC Access Control 5.3 Topic

More information

PUBLIC. How to Manage Batch Numbers. All Countries. Solutions from SAP. SAP Business One 2007 A and 2007 B. August English

PUBLIC. How to Manage Batch Numbers. All Countries. Solutions from SAP. SAP Business One 2007 A and 2007 B. August English PUBLIC How to Manage Batch Numbers All Countries Solutions from SAP SAP Business One 2007 A and 2007 B August 2008 English Contents Purpose... 3 Defining General Settings... 4 Procedure... 4 Setting Authorizations...

More information

IBM Security Identity Manager Version Administration Topics

IBM Security Identity Manager Version Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration

More information

How To Transfer ERP HCM Data Using SAP Test Data Migration Server

How To Transfer ERP HCM Data Using SAP Test Data Migration Server How-To Guide Document Version: 1.1 2015-02-16 CUSTOMER How To Transfer ERP HCM Data Using SAP Test Data Migration Server Release 4.0 Typographic Conventions Type Style Example Example EXAMPLE Example Example

More information

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide Adobe Document Cloud esign Services for Salesforce Version 17 Installation and Customization Guide 2015 Adobe Systems Incorporated. All rights reserved. Last Updated: August 28, 2015 Table of Contents

More information

Visual Business Configuration with SAP TM

Visual Business Configuration with SAP TM SAP Transportation Management Visual Business Configuration with SAP TM CUSTOMER Document Version: 3.0 December 2013 SAP AG 1 Copyright Copyright 2013 SAP AG. All rights reserved. SAP Library document

More information

SAP HANA Authorization (HA2)

SAP HANA Authorization (HA2) SAP HANA 1.0 SP5 June 2013 English SAP HANA Authorization (HA2) Building Block Configuration Guide SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2013 SAP AG or an SAP affiliate company.

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.  Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : C_AUDSEC_731 Title : SAP Certified Technology Associate - SAP Authorization and Auditing for SAP NetWeaver 7.31

More information

USER MANUAL. Calendar 365 TABLE OF CONTENTS. Version: 4.0

USER MANUAL. Calendar 365 TABLE OF CONTENTS. Version: 4.0 USER MANUAL TABLE OF CONTENTS Introduction... 1 Benefits of Calendar 365... 1 Pre-requisites... 2 Installation... 2 Installation Steps... 2 Configuration Steps... 5 Calendar Management... 19 Calendar Activities...

More information

Workflow Templates in Compliance 360 Version 2018

Workflow Templates in Compliance 360 Version 2018 Workflow Templates in Compliance 360 Version 2018 Workflow Templates 5 Workflow Elements 6 Workflow Teams 6 Workflow Template Changes 6 Create or Edit a Workflow Template 8 Import and Export Workflow Templates

More information

SAP Landscape Transformation for SAP HANA (HA1)

SAP Landscape Transformation for SAP HANA (HA1) SAP HANA 1.0 SP05 SAP Landscape Transformation SP04 October 2013 English SAP Landscape Transformation for SAP HANA (HA1) Building Block Configuration Guide SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany

More information

Administering isupport

Administering isupport Administering isupport Tracking and Monitoring isupport Usage Agents perform tasks in the background that are an integral part of isupport functionality. See Enabling and Scheduling Agents on page 2 for

More information

Stock Balancing Management

Stock Balancing Management User Guide Document Version: 1.0 2013-06-28 Typographic Conventions Type Style Example Example EXAMPLE Example Example EXAMPLE Description Words or characters quoted from the screen. These include

More information

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions.

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions. USER GUIDE This guide is intended for users of all levels of expertise. The guide describes in detail Sitefinity user interface - from logging to completing a project. Use it to learn how to create pages

More information

QuickStart Guide 6 - Data Quality

QuickStart Guide 6 - Data Quality QuickStart Guide 6 - Data Quality Document Version: v1.2 Product Version: v2.9 Date: 9 th September 2017 This document provides an overview and Step-by-Step implementation instructions for the clearmdm

More information

SAP NetWeaver How-To Guide How To... Configure SAP HANA for CTS

SAP NetWeaver How-To Guide How To... Configure SAP HANA for CTS SAP NetWeaver How-To Guide How To... Configure SAP HANA for CTS Applicable Releases: SAP Solution Manager 7.1 SPS05, SAP NetWeaver 7.3 including enhancement package 1, or SAP NetWeaver 7.4 SAP HANA Platform

More information

CA GovernanceMinder. CA IdentityMinder Integration Guide

CA GovernanceMinder. CA IdentityMinder Integration Guide CA GovernanceMinder CA IdentityMinder Integration Guide 12.6.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

What's New in SAP Landscape Transformation Replication Server 2.0 SP15

What's New in SAP Landscape Transformation Replication Server 2.0 SP15 What's New Document Version: 1.0 2018-09-10 What's New in SAP Landscape Transformation Replication Server 2.0 SP15 Typographic Conventions Type Style Example Description Words or characters quoted from

More information

Certification Suite BC-ILM 3.0

Certification Suite BC-ILM 3.0 Master Guide Certification Suite ABAP Document Version: 1.1 2016-06-27 ABAP Typographic Conventions Type Style Example Example EXAMPLE Example Example EXAMPLE Description Words or characters

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Cloud Service Administrator's Guide 15 R2 March 2016 Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Configuring Settings for Microsoft Internet Explorer...

More information

SAP Workforce Performance Builder 9.5

SAP Workforce Performance Builder 9.5 Upgrade Guide Workforce Performance Builder Document Version: 1.0 2016-10-15 2016 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Table of Contents 1 Introduction... 3 2 Migrating a Workarea...

More information

How to Work with Excel Report and Interactive Analysis

How to Work with Excel Report and Interactive Analysis How-To Guide SAP Business One, version for SAP HANA Document Version: 1.4 2016-07-29 PUBLIC How to Work with Excel Report and Interactive Analysis SAP Business One 9.2 PL04 and Later, version for SAP HANA

More information

Adobe Sign for Microsoft Dynamics

Adobe Sign for Microsoft Dynamics Adobe Sign for Microsoft Dynamics Installation & Configuration Guide (v5) Last Updated: March 16, 2017 2017 Adobe Systems Incorporated. All rights reserved Table of Contents Overview... 3 Prerequisites...

More information

Case Management Implementation Guide

Case Management Implementation Guide Case Management Implementation Guide Salesforce, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

MIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD)

MIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD) MIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD) Edward Beaver Edward.Beaver@temple.edu ff Video: Record the Class Discussion v Something

More information

Installing and Updating SAP HANA Products and Software Components

Installing and Updating SAP HANA Products and Software Components Product Documentation Document Version: 1.0 2015-10-09 Installing and Updating SAP HANA Products and Software Components SAP HANA SPS 10, as of Database Maintenance Revision 102.1 Typographic Conventions

More information

Standalone Retrofit. Required Steps when Upgrading to SAP Solution Manager 7.2, SP03

Standalone Retrofit. Required Steps when Upgrading to SAP Solution Manager 7.2, SP03 Configuration Guide Document Version: 1.0 2017-01-10 Required Steps when Upgrading to SAP Solution Manager 7.2, SP03 Typographic Conventions Type Style Example Description Words or characters quoted from

More information

Migration of Interface Monitoring in classical BPMon to Interface & Connection Monitoring SAP Solution Manager 7.1 / 7.2

Migration of Interface Monitoring in classical BPMon to Interface & Connection Monitoring SAP Solution Manager 7.1 / 7.2 Migration of Interface Monitoring in classical BPMon to Interface & Connection Monitoring SAP Solution Manager 7.1 / 7.2 Document Version 1.3 (August 2017) TABLE OF CONTENTS INTRODUCTION... 3 MONITOR TYPES

More information

How to Work with Excel Report and Interactive Analysis

How to Work with Excel Report and Interactive Analysis How-To Guide SAP Business One, version for SAP HANA Document Version: 1.7 2017-10-31 PUBLIC How to Work with Excel Report and Interactive Analysis SAP Business One 9.2 PL10 and Later, version for SAP HANA

More information

Icon Directory. Action Icons. Icon Name Description

Icon Directory. Action Icons. Icon Name Description Icon Directory The icons found on the various MasterControl pages are listed according to their general location on a given page. For instance, Action Icons usually are found in columns headed "Action".

More information

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Primavera Portfolio Management 9.0 What s New Copyright 1999-2011, Oracle and/or its affiliates. The Programs (which include both the software and documentation) contain proprietary information; they are

More information

USER MANUAL. TapCRM TABLE OF CONTENTS. Version: 1.4

USER MANUAL. TapCRM TABLE OF CONTENTS. Version: 1.4 USER MANUAL TABLE OF CONTENTS Introduction... 1 Benefits of TapCRM... 1 Prerequisites... 1 Installation & Configuration... 2 TapCRM Plug-in Installation... 2 Front Side Instructions... 9 Contact Us...

More information

Marketo ON24 Adapter. User Guide Version 4.1. Updated May 3, 2013

Marketo ON24 Adapter. User Guide Version 4.1. Updated May 3, 2013 Marketo ON24 Adapter User Guide Version 4.1 Updated May 3, 2013 CONTENTS EVENT INTEGRATION OVERVIEW... 2 BEFORE YOU BEGIN... 3 REQUIREMENTS... 3 HOW TO CREATE AN EVENT IN MARKETO WITH AN ON24 INTEGRATION...

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

OpenProject AdminGuide

OpenProject AdminGuide OpenProject AdminGuide I. Contents I. Contents... 1 II. List of figures... 2 1 Administration... 2 1.1 Manage projects...2 1.2 Manage users...5 1.3 Manage groups...11 1.4 Manage roles and permissions...13

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Lionbridge Connector for Sitecore. User Guide

Lionbridge Connector for Sitecore. User Guide Lionbridge Connector for Sitecore User Guide Version 4.0.5 November 2, 2018 Copyright Copyright 2018 Lionbridge Technologies, Inc. All rights reserved. Lionbridge and the Lionbridge logotype are registered

More information

Business Add-Ins (BAdIs) for SD Jam Integration Document Version:

Business Add-Ins (BAdIs) for SD Jam Integration Document Version: Document Version: 1.0 2014-08-22 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names,

More information

IBM emessage Version 9 Release 1 February 13, User's Guide

IBM emessage Version 9 Release 1 February 13, User's Guide IBM emessage Version 9 Release 1 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 471. This edition applies to version

More information

Pre-Determined Pricing Engine 1.0

Pre-Determined Pricing Engine 1.0 SAP Custom Development Pre-Determined Pricing Engine 1.0 User Guide Version Status Date 1.0 Final June 19, 2012 Typographic Conventions Icons Type Style Example Text Example text EXAMPLE TEXT Example text

More information

What's New in SAP Landscape Transformation Replication Server 2.0 SP13

What's New in SAP Landscape Transformation Replication Server 2.0 SP13 What's New Document Version: 1.0 2017-06-14 What's New in SAP Landscape Transformation Replication Server 2.0 SP13 Typographic Conventions Type Style Example Description Words or characters quoted from

More information

sforce Web Services Enterprise API sforce Object Query Language sforce Custom Objects... 40

sforce Web Services Enterprise API sforce Object Query Language sforce Custom Objects... 40 Release Notes Winter 04 Major Announcements Dashboards... 2 Workflow Automation... 8 Advanced Page Layout Wizard... 12 Dynamic Page Layouts and Field-Level Security... 14 Team-Based Account Management...

More information

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0 USER MANUAL TABLE OF CONTENTS Introduction...1 Benefits of Customer Portal...1 Prerequisites...1 Installation...2 Salesforce App Installation... 2 Salesforce Lightning... 2 WordPress Manual Plug-in installation...

More information

SAP ERP, add-on for Polish SAF-T regulatory requirements 1.02

SAP ERP, add-on for Polish SAF-T regulatory requirements 1.02 Application Help Document Version: 1.4 Released to Customer Date: January 20, 2017 SAP ERP, add-on for Polish SAF-T regulatory requirements 1.02 Typographic Conventions Type Style Example Description Words

More information

BackupAgent Service Provider Deployment Guide

BackupAgent Service Provider Deployment Guide BackupAgent Service Provider Deployment Guide APS2.0 for Parallels Automation Revision 1.2 (April 22, 2014) Template version 1.0 Contents Preface... 6 Documentation Conventions... 6 Typographical Conventions...

More information

New in isupport v12.7

New in isupport v12.7 New in isupport v12.7 In addition to continued enhancement of code quality, this release contains the following features: Social Client renamed to mysupport Email Processing Email Rules and Rule Groups

More information

Integration of the Change and Transport System

Integration of the Change and Transport System Integration of the Change and Transport System Release 4.6C 1 SAP AG! Neurottstr. 16! D-69190 Walldorf Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced

More information

Functional Trace HELP.BCCCM. Release 620

Functional Trace HELP.BCCCM. Release 620 Functional Trace HELP.BCCCM Release 620 Copyright Copyright 2003 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express

More information

FileLoader for SharePoint

FileLoader for SharePoint Administrator s Guide FileLoader for SharePoint v. 2.0 Last Updated 6 September 2012 Contents Preface 3 FileLoader Users... 3 Getting Started with FileLoader 4 Configuring Connections to SharePoint 8

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

SAP Assurance and Compliance Software Release 1.2 SP04

SAP Assurance and Compliance Software Release 1.2 SP04 Extensibility Guide Document Version: 1.0 2016-11-21 SAP Assurance and Compliance Software Release 1.2 SP04 SAP Tax Compliance Typographic Conventions Type Style Example Description Words or characters

More information

SAP NetWeaver Master Data Management

SAP NetWeaver Master Data Management Upgrade Guide GDS 2.1 Document Version: 1.04 2015-11-15 Global Data Synchronization Option 2.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include

More information

Quick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment

Quick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment SAP HANA 1.0 Predictive Analysis 1.0 August 2013 English Quick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment solution for Retail (EN) SAP AG Dietmar-Hopp-Allee 16 69190

More information

Your upgrade to smartdata.gen2

Your upgrade to smartdata.gen2 Your upgrade to smartdata.gen2 smartdata.gen2 (SDG2) is a robust card and expense reporting tool and is hosted by MasterCard. It has a reporting package built for clients with sophisticated card and expense

More information

Service Manager. Ops Console On-Premise User Guide

Service Manager. Ops Console On-Premise User Guide Service Manager powered by HEAT Ops Console On-Premise User Guide 2017.2.1 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

OnCommand Insight 7.1 Planning Guide

OnCommand Insight 7.1 Planning Guide OnCommand Insight 7.1 Planning Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277 Web: www.netapp.com

More information

Lionbridge Connector for Sitecore. User Guide

Lionbridge Connector for Sitecore. User Guide Lionbridge Connector for Sitecore User Guide Version 4.0.2 March 28, 2018 Copyright Copyright 2018 Lionbridge Technologies, Inc. All rights reserved. Lionbridge and the Lionbridge logotype are registered

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012848-001, Rev. B Release Date March 2015 Applicability This version of the SAS

More information

12/05/2017. Geneva ServiceNow Security Management

12/05/2017. Geneva ServiceNow Security Management 12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security

More information

SAP Help for Student Lifecycle Management

SAP Help for Student Lifecycle Management SAP Help for Student Lifecycle Management Applies to: Student Lifecycle Management EHP3 Summary This document describes the features and functions delivered with Student Lifecycle Management EHP3. Author(s):

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

END OF PURPOSE CHECK ADAPTION FOR APPLICATIONS CONSUMING SAP BUSINESS PARTNER IN SAP S/4HANA

END OF PURPOSE CHECK ADAPTION FOR APPLICATIONS CONSUMING SAP BUSINESS PARTNER IN SAP S/4HANA SAP SECURITY REQUIREMENT SEC- 256 (DELETION OF PERSONAL DATA) DEVELOPMENT HOW-TO INFORMATION END OF PURPOSE CHECK ADAPTION FOR APPLICATIONS CONSUMING SAP BUSINESS PARTNER IN SAP S/4HANA AND HOW AND HOW

More information

Deleting SAP HANA Delivery Units and Products

Deleting SAP HANA Delivery Units and Products User Documentation SAP HANA Document Version: 1.0 2015-12-02 SAP HANA SPS 10 / SPS 11 Typographic Conventions Type Style Example Example EXAMPLE Example Example EXAMPLE Description Words or characters

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Clay Tablet Connector for Sitecore. User Guide. Version 3.9.8

Clay Tablet Connector for Sitecore. User Guide. Version 3.9.8 Clay Tablet Connector for Sitecore User Guide Version 3.9.8 May 27, 2016 Copyright Copyright 2005-2016 Clay Tablet Technologies Inc. All rights reserved. All rights reserved. This document and its content

More information

OIG 11G R2 Field Enablement Training

OIG 11G R2 Field Enablement Training OIG 11G R2 Field Enablement Training Lab 4 - Configure Request Scenarios Disclaimer: The Virtual Machine Image and other software are provided for use only during the workshop. Please note that you are

More information

NCID Service Desk Guide Version Department of Information Technology As of July 14, 2016

NCID Service Desk Guide Version Department of Information Technology As of July 14, 2016 NCID Service Desk Guide Version 1.10 Department of Information Technology As of July 14, 2016 Document History Version Change Reference Date Author 1.0 Initial draft release 8/25/10 Heather Ferrie 1.1

More information

Compliance Desktop Technology Platform Admin User Guide

Compliance Desktop Technology Platform Admin User Guide Compliance Desktop Technology Platform Admin User Guide Table of Contents 1. Logging into ComplianceDesktop... 4 1.1 ComplianceDesktop Landing Page... 4 1.2 Requesting a New Password... 4 1.3 Requesting

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

OnCommand Insight 7.2

OnCommand Insight 7.2 OnCommand Insight 7.2 Planning Guide for the Java UI March 2016 215-10395_A0 doccomments@netapp.com Table of Contents 3 Contents OnCommand Insight Plan features... 5 OnCommand Insight product portfolio...

More information

Oracle. Service Cloud Knowledge Advanced User Guide

Oracle. Service Cloud Knowledge Advanced User Guide Oracle Service Cloud Release May 2017 Oracle Service Cloud Part Number: E84078-03 Copyright 2015, 2016, 2017, Oracle and/or its affiliates. All rights reserved Authors: The Knowledge Information Development

More information

Using the Self-Service Portal

Using the Self-Service Portal UBC Workspace 2.0 Using the Self-Service Portal Using the Self-Service Portal to access and manage your content July 2017 Table of Contents Introduction... 3 Overview... 3 User Types... 4 Compliance and

More information

DocAve Content Shield v2.2 for SharePoint

DocAve Content Shield v2.2 for SharePoint DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary

More information

e-lms Electronic Lodgement of Mailing Statements User Guide Version 4.5

e-lms Electronic Lodgement of Mailing Statements User Guide Version 4.5 e-lms Electronic Lodgement of Mailing Statements User Guide Version 4.5 Copyright Statement Copyright the Australian Postal Corporation 2016. All rights reserved. No part of this document may be reproduced,

More information

ACHieve Access 4.3 USER GUIDE

ACHieve Access 4.3 USER GUIDE ACHieve Access 4.3 USER GUIDE TABLE OF CONTENTS SECTION 1: OVERVIEW...3 Chapter 1: Introduction...3 How to Use This Manual...3 Overview of ACHieve Access Administrative Functions...3 System Access and

More information

Sage Construction Central Setup Guide (Version 18.1)

Sage Construction Central Setup Guide (Version 18.1) Sage 300 Construction and Real Estate Sage Construction Central Setup Guide (Version 18.1) Certified course curriculum Important Notice The course materials provided are the product of Sage. Please do

More information

11/14/2018. Istanbul Governance, risk, and compliance (GRC)

11/14/2018. Istanbul Governance, risk, and compliance (GRC) 11/14/2018 Governance, risk, and compliance (GRC) Contents Contents... 4 Policy and Compliance Management...5 Activate Policy and Compliance Management... 6 Dependency modeling and mapping...13 Compliance...

More information

vfire 9.8 Release Notes Version 1.5

vfire 9.8 Release Notes Version 1.5 9.8 Release Notes 9.8 Release Notes Table of Contents Version Details for 9.8 Release Notes 4 Copyright 5 About this Document 6 Intended Audience 6 Standards and Conventions 6 Introducing 9.8 7 Installation

More information

Related Documents... 7 AVM-RTA DS AVM-LaserFocus... 8 Pre-requisites... 8

Related Documents... 7 AVM-RTA DS AVM-LaserFocus... 8 Pre-requisites... 8 SAP RM AVM README README V1.0 SAP RM AVM Readme... 1 Purpose... 1 Overview... 2 Navigation Path for Software and Documents download... 2 Base Installation Package... 2 Support Packs... 2 RM AVM Component

More information

PLM User Guide. A Guide to Adding and Maintaining Records of Agencies with Multiple Branch Locations and a Single EIN Using Producer Manager

PLM User Guide. A Guide to Adding and Maintaining Records of Agencies with Multiple Branch Locations and a Single EIN Using Producer Manager PLM User Guide A Guide to Adding and Maintaining Records of Agencies with Multiple Branch Locations and a Single EIN Using Producer Manager July 2013 Version 6.4.1 Contents Overview... 2 Quick Adding the

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012848-001, Rev. E Release Date July 2015 Applicability This version of the SAS

More information

Edge Integration Guide Workday Transcript Outbound Integration

Edge Integration Guide Workday Transcript Outbound Integration Edge Integration Guide Workday Transcript Outbound Integration 1 TABLE OF CONTENTS Welcome To 3 Enablement 3 Prerequisite Setup in Workday 4 Setup Instructions in Cornerstone 8 Workflow 13 Field Mapping

More information

Supplier Contract Management for Agencies Core-CT Finance Upgrade Implementation

Supplier Contract Management for Agencies Core-CT Finance Upgrade Implementation Supplier Contract Management for Agencies Core-CT Finance Upgrade Implementation March 2018 For Classroom Training Use Only Introduction Supplier Contract Management for Agencies Welcome to Supplier Contract

More information

Adobe Document Cloud esign Services. for Salesforce Version 17 Upgrade Guide

Adobe Document Cloud esign Services. for Salesforce Version 17 Upgrade Guide Adobe Document Cloud esign Services for Salesforce Version 17 Upgrade Guide 2015 Adobe Systems Incorporated. All Rights Reserved. Last Updated: August 25, 2015 Table of Contents Upgrading from a previous

More information

WAM!NET Submission Icons. Help Guide. March 2015

WAM!NET Submission Icons. Help Guide. March 2015 WAM!NET Submission Icons Help Guide March 2015 Document Contents 1 Introduction...2 1.1 Submission Option Resource...2 1.2 Submission Icon Type...3 1.2.1 Authenticated Submission Icons...3 1.2.2 Anonymous

More information

Oracle. Service Cloud Knowledge Advanced User Guide

Oracle. Service Cloud Knowledge Advanced User Guide Oracle Service Cloud Release November 2016 Oracle Service Cloud Part Number: E80589-02 Copyright 2015, 2016, Oracle and/or its affiliates. All rights reserved Authors: The Knowledge Information Development

More information

SAP Policy Management 5.3 SP03

SAP Policy Management 5.3 SP03 How-To Guide SAP Policy Management Document Version: 1.3 2016-11-30 Guide for Implementing Business Transactions Typographic Conventions Type Style Example Description Words or characters quoted from the

More information

Adobe Sign for Microsoft Dynamics

Adobe Sign for Microsoft Dynamics Adobe Sign for Microsoft Dynamics Installation & Configuration Guide (v6) Last Updated: September 1, 2017 2017 Adobe Systems Incorporated. All rights reserved Table of Contents Overview... 3 Prerequisites...

More information

Contents. Server Call Usage

Contents. Server Call Usage Server Call Usage Contents Server Call Usage Overview...3 Server Call Usage Dashboard...6 View Current Server Call Usage...6 View Report Suite Usage...8 Server Call Usage Alerts...10 Server Call Usage

More information

Setting Up an Environment for Testing Applications in a Federated Portal Network

Setting Up an Environment for Testing Applications in a Federated Portal Network SAP NetWeaver How-To Guide Setting Up an Environment for Testing Applications in a Federated Portal Network Applicable Releases: SAP NetWeaver 7.0 IT Practice: User Productivity Enablement IT Scenario:

More information

Feature Scope Description Document Version: CUSTOMER. SAP Analytics Hub. Software version 17.09

Feature Scope Description Document Version: CUSTOMER. SAP Analytics Hub. Software version 17.09 Feature Scope Description Document Version: 2017-09-23 Software version 17.09 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names,

More information

12/05/2017. Geneva ServiceNow Custom Application Development

12/05/2017. Geneva ServiceNow Custom Application Development 12/05/2017 Contents...3 Applications...3 Creating applications... 3 Parts of an application...22 Contextual development environment... 48 Application management... 56 Studio... 64 Service Creator...87

More information