SAP Access Control 12.0 SP13
SAP Access Control 12.0 SP13
Content
Introduction to SAP Access Control
What's New in SAP Access Control 12.0 SP13
What's New History
What's New In SAP Access Control 12.0 SP01
What's New in SAP Access Control 12.0 SP02
What's New in SAP Access Control 12.0 SP03
What's New in SAP Access Control 12.0 SP04
What's New in SAP Access Control 12.0 SP05
What's New in SAP Access Control 12.0 SP06
What's New in SAP Access Control 12.0 SP07
What's New in SAP Access Control 12.0 SP08
What's New in SAP Access Control 12.0 SP09
What's New in SAP Access Control 12.0 SP10
What's New in SAP Access Control 12.0 SP11
What's New in SAP Access Control 12.0 SP12
Navigation
SAP Business Client (NWBC) Navigation
My Home Work Center
Work Inbox
Simplified Work Inbox
Delegating Your Approval Tasks
My Profile
Maintaining Your Profile
Viewing Your Request Status
Resetting User Passwords
Changing User Names
Registering Security Questions
Setup Work Center
Access Control Owners
Access Management Work Center
Reports and Analytics Work Center
Fiori Launchpad Navigation
Cross-Component Topics
Maintaining Important Roles
Profiles and Logons
End User Logon
Managing the End User Logon
Administrator Logon
Your Profile
Custom Fields
Special Privileges
Background Jobs
Background Scheduler
Scheduling Background Jobs
Managing Access Requests
Access Request Creation
Simplified Access Requests
Create Request-Simplified
Creating Access Requests
Importing Multiple Roles into an Access Request
Analyzing Risks When Submitting Access Requests
Mitigating Risks
Template Roles
Configuring Template Roles
Creating Access Requests Based on Model Users
Changing User Details
Copying Requests
Creating Organizational Assignment Requests
Access Request Approval
Reviewing and Approving Access Requests
Analyzing Risks When Approving Access Requests
Mitigating Risks
Maintaining Tasks and Authorizations for Request Approvers
Access Request Administration
Creating and Managing Templates
Searching Requests
Viewing Provisioning Logs
Unlocking and Deleting Password Self-Service Accounts
Approver Delegation
Creating Access Requests Based on Templates
Managing Access Risks
Mitigating Controls
Creating Mitigating Controls
Searching Mitigating Controls
Maintenance of Mitigation Control Owners
Rule Setup
Exception Access Rules
Organization Rules
Creating an Organization Rule using the Wizard
Creating an Organization Rule
Modifying an Organization Rule
Deleting an Organization Rule
Creating a Supplementary Rule
Modifying a Supplementary Rule
Deleting a Supplementary Rule
Generated Rules
Access Rule Summary
Access Rule Detail
Access Rule Maintenance
Rule Sets
Creating a New Rule Set
Viewing a Rule Set
Modifying a Rule Set
Deleting a Rule Set
Functions and Risks
Functions
Creating a Function
Searching and Viewing a Function
Modifying a Function
Deleting a Function
Access Risks
Creating Access Risks
Searching and Viewing Access Risks
Modifying an Access Risk
Deleting an Access Risk
Adding Access Risk Owners
Maintenance of Access Risk Owners
Critical Access Rules
Critical Role and Critical Profile Rules
Critical Roles
Critical Profiles
Access Risk Analysis
User Level Access Risk Analysis
Creating a Custom User Group
User Level Simulation
Role Level Access Risk Analysis
Role Level Simulation
Profile Level Access Risk Analysis
Profile Level Simulation
HR Objects Access Risk Analysis
HR Objects Simulation
User Level Invalid Mitigations
Role Level Invalid Mitigations
Mitigated Access
Mitigated Users
Mitigated User for Organization Rules
Mitigated Roles
Mitigated Profiles
HR Objects Mitigation
Mitigated Role for Organization Rules
Analyzing Risks When Approving Access Requests
Analyzing Risks When Submitting Access Requests
Analyzing Access Risks for Role Maintenance
Mitigating Risks
Alerts
Searching Alerts
Cleared Alerts
Clearing Alerts
Searching Cleared Alerts
Background Jobs
Background Scheduler
Managing Roles
Role Management Overview
Role Management Considerations
Role Creation Methodology
Reapply Methodology
Role Derivation
Role Maintenance
Defining Roles
Additional Details
Maintaining Role Provisioning Settings
Maintaining Authorizations
Deriving Roles
Analyzing Access Risks for Role Maintenance
Mitigating Risks
Updating Role Owners
Maintaining Business-role-to-technical-role Associations
Generating Roles
Maintaining Test Cases
Approving Role Requests
Reprovisioning Business Roles
Role Search
Default Roles
Maintain Rule to Role Mapping
Role Mining
Action Usage
Role Comparison
Role Reaffirm
Role Mass Maintenance
Importing Multiple Roles
Defining Criteria
Selecting Role Data
Scheduling Background Jobs
Updating Multiple Roles
Updating Org. Values for Multiple Derived Roles
Deriving Multiple Roles
Analyzing Risk for Multiple Roles
Generating Multiple Roles
Using Emergency Access Management
Emergency Access Management Overview
EAM Terminology
Configuring Emergency Access
Requesting Emergency Access
Reviewing and Approving Access Requests
Extending Validity Periods for Firefighting Assignments
Accessing Systems to Perform Firefighting Activities
Using the Emergency Access Management Launchpad
Reviewing Emergency Access Activities and Reports
Firefighter ID Review
Managing Periodic Access Reviews
Compliance Certification Reviews
Managing Coordinators
Creating Coordinator Mappings
Modifying Coordinators
Searching Coordinators
Reviewing Requests
Managing Rejections
Alerts
Searching Alerts
Cleared Alerts
Clearing Alerts
Searching Cleared Alerts
Reports and Analytics
Access Dashboards
Access Provisioning Dashboard
Access Requests Dashboard
Access Rule Library Dashboard
Alerts Dashboard
Mitigating Control Library Dashboard
Risk Violations Dashboard
Remediation View
Role Analysis Dashboard
Role Library Dashboard
Service Level for Access Requests Dashboard
User Analysis Dashboard
Violations Comparisons Dashboard
Risk Violation in Access Request Dashboard
Access Risk Analysis Reports
Access Rule Summary Report
Access Rule Detail Report
Mitigated Object Report
HR Object Risk Violation Report
Mitigation Control Report
Profile Risk Violation Report
Role Risk Violation Report
User Risk Violation Report
Access Request Reports
Approver Delegation Report
Requests by PD/Structural Profiles
Requests by Roles and Role Assignment Approvers Report
Requests with Conflicts and Mitigations Report
Service Level for Requests Report
SoD Review History Report
User Access Review History Report
User Review Status Report
Role Management Reports
Compare Action in Menu and Authorization Report
Compare User Roles Report
List of Actions in Roles Report
Master to Derived Role Relationship Report
PFCG Change History Report
Role by Date of Generation Report
Role Relationships Report
Role Relationship with User/User Group Report
Single to Composite Role Relationship Report
User to Role Relationship Report
Security Reports
Action Usage by User, Role, and Profile Report
Count Authorization for Users Report
Count Authorization in Roles Report
List Expired and Expiring Roles for Users Report
Audit Reports
Change Log Report
Embedded Action Calls in Programs of SAP Systems Report
List Actions in Roles But Not in Rules Report
List Permissions in Roles But Not in Rules Report
Emergency Access Management Reports
Consolidated Log Report
Firefighter Log Summary Report
Invalid Emergency Access Report
Reason Code and Activity Report
SoD Conflict Report for Firefighter IDs
Transaction Log and Session Details Report
Risk Terminator Log Report