Access Control
Release Note for SAP BusinessObjects Access Control
Key Concepts
Access Request Creation
Access Request Administration
User Provisioning
Reviewing and Approving Access Requests
Analyzing Risks When Approving Access Requests
Mitigating Risks
Maintaining Tasks and Authorizations for Request Approvers
Custom Fields
Mandatory Fields
Segregation of Duties
Access Risk Maintenance
Functions and Risks
Critical Role and Critical Profile Rules
Owners and Groups
Superuser Management
Role Management
Organizational Value Maps
Role Derivation
Role Creation Methodology
Reapply Methodology
Compliance Certification Reviews
Integration
Integration of Shared Data (Data Model)
Integration with Process Control and Risk Management
End User Logon
Managing the End User Logon
Administrator Logon
Work Centers
Work Centers for Access Control in the GRC Application
My Home
Work Inbox
My Profile
Changing User Details
Maintaining Your Identity and Profile
Viewing Your Request Status
Resetting User Passwords
Changing User Names
Registering Security Questions
Master Data
Organizations
Creating Organizations
Searching Organizations
Mitigating Controls
Creating Mitigating Controls
Searching Mitigating Controls
Rule Setup
Access Rule Maintenance
Rule Sets
Creating a New Rule Set
Viewing a Rule Set
Modifying a Rule Set
Deleting a Rule Set
Functions
Creating a Function
Searching and Viewing a Function
Modifying a Function
Deleting a Function
Access Risks
Creating Access Risks
Searching and Viewing Access Risks
Modifying an Access Risk
Deleting an Access Risk
Critical Access Rules
Critical Roles
Critical Profiles
Exception Access Rules
Organization Rules
Creating an Organization Rule
Modifying an Organization Rule
Deleting an Organization Rule
Supplementary Rules
Creating a Supplementary Rule
Modifying a Supplementary Rule
Deleting a Supplementary Rule
Generated Rules
Access Rule Summary
Access Rule Detail
Assessments
Access Management
GRC Role Assignments
Access Control Owners
Role Owners
Access Risk Analysis
User Level Access Risk Analysis
User Level Simulation
Role Level Access Risk Analysis
Role Level Simulation
Profile Level Access Risk Analysis
Profile Level Simulation
HR Objects Access Risk Analysis
HR Objects Simulation
Mitigated Access
Mitigated Users
Mitigated User for Organization Rules
Mitigated Roles
Mitigated Profiles
HR Objects Mitigation
Mitigated Role for Organization Rules
Access Request Administration
Creating and Managing Templates
Searching Requests
Viewing Provisioning Logs
Unlocking and Deleting Password Self# Service Accounts
Delegating Approval for Another User
Access Request Creation
Creating Access Requests
Analyzing Risks When Submitting Access Requests
Mitigating Risks
Creating Access Requests Based on Model Users
Creating Access Requests Based on Templates
Changing User Details
Copying Requests
Creating Organizational Assignment Requests
Role Management
Role Maintenance
Defining Roles
Maintaining Authorizations
Deriving Roles
Analyzing Access Risks for Role Maintenance
Mitigating Risks
Approving Role Requests
Generating Roles
Maintaining Test Cases
Additional Details
Maintaining Role Provisioning Settings
Role Search
Default Roles
Role Mining
Action Usage
Role Comparison
Role Reaffirm
Role Mass Maintenance
Importing Multiple Roles
Defining Criteria
Selecting Role Data
Scheduling Background Jobs
Updating Multiple Roles
Updating Org. Values for Multiple Derived Roles
Deriving Multiple Roles
Analyzing Risk for Multiple Roles
Generating Multiple Roles
Superuser Assignment
Owners
Assigning Firefighter IDs to Owners
Firefighter IDs
Assigning Firefighter IDs to Firefighters
Assigning Controllers to Firefighter IDs
Provisioning Firefighter IDs/Roles Using Access Request
Superuser Maintenance
Firefighters
Viewing and Maintaining Firefighter Assignments
Controllers
Viewing and Maintaining Controller Assignments
Reason Codes
Assigning Systems to Reason Codes
Compliance Certification Reviews
Managing Coordinators
Creating Coordinator Mappings
Modifying Coordinators
Searching Coordinators
Reviewing Requests
Managing Rejections
Alerts
Searching Alerts
Cleared Alerts
Clearing Alerts
Searching Cleared Alerts
Scheduling
Background Scheduler
Background Jobs
Reports and Analytics
Work Centers for Access Control Standalone
My Home
Work Inbox
My Profile
Creating Access Requests
Analyzing Risks When Submitting Access Requests
Mitigating Risks
Changing User Details
Maintaining Your Identity and Profile
Viewing Your Request Status
Resetting User Passwords
Changing User Names
Registering Security Questions
My Delegation
Delegating Your Approval Tasks
Setup
Access Rule Maintenance
Rule Sets
Creating a New Rule Set
Viewing a Rule Set
Modifying a Rule Set
Deleting a Rule Set
Functions
Creating a Function
Searching and Viewing a Function
Modifying a Function
Deleting a Function
Access Risks
Creating Access Risks
Searching and Viewing Access Risks
Modifying an Access Risk
Deleting an Access Risk
Critical Access Rules
Critical Roles
Critical Profiles
Organizations
Creating Organizations
Searching Organizations
Superuser Assignment
Owners
Assigning Firefighter IDs to Owners
Firefighter IDs
Assigning Firefighter IDs to Firefighters
Assigning Controllers to Firefighter IDs
Provisioning Firefighter IDs/Roles Using Access Request
Access Owners
Access Control Owners
Creating Access Control Owners
Modifying Access Control Owners
Searching Access Control Owners
Role Owners
Creating Role Owner Criteria
Modifying Role Owner Criteria
Searching Role Owner Criteria
Exception Access Rules
Organization Rules
Creating an Organization Rule
Modifying an Organization Rule
Deleting an Organization Rule
Supplementary Rules
Creating a Supplementary Rule
Modifying a Supplementary Rule
Deleting a Supplementary Rule
Generated Rules
Access Rule Summary
Access Rule Detail
Mitigating Controls
Creating Mitigating Controls
Searching Mitigating Controls
Superuser Maintenance
Firefighters
Viewing and Maintaining Firefighter Assignments
Controllers
Viewing and Maintaining Controller Assignments
Reason Codes
Assigning Systems to Reason Codes
Access Management
Access Risk Analysis
User Level Access Risk Analysis
User Level Simulation
Role Level Access Risk Analysis
Role Level Simulation
Profile Level Access Risk Analysis
Profile Level Simulation
HR Objects Access Risk Analysis
HR Objects Simulation
Access Request Administration
Creating and Managing Templates
Searching Requests
Viewing Provisioning Logs
Unlocking and Deleting Password Self# Service Accounts
Delegating Approval for Another User
Access Request Creation
Creating Access Requests
Analyzing Risks When Submitting Access Requests
Mitigating Risks
Creating Access Requests Based on Model Users
Creating Access Requests Based on Templates
Changing User Details
Copying Requests
Creating Organizational Assignment Requests
Role Management
Role Maintenance
Defining Roles
Maintaining Authorizations
Deriving Roles
Analyzing Access Risks for Role Maintenance
Mitigating Risks
Approving Role Requests
Generating Roles
Maintaining Test Cases
Additional Details
Maintaining Role Provisioning Settings
Role Search
Default Roles
Role Mass Maintenance
Importing Multiple Roles
Defining Criteria
Selecting Role Data
Scheduling Background Jobs
Updating Multiple Roles
Updating Org. Values for Multiple Derived Roles
Deriving Multiple Roles
Analyzing Risk for Multiple Roles
Generating Multiple Roles
Scheduling
Background Scheduler
Background Jobs
Mitigated Access
Mitigated Users
Mitigated User for Organization Rules
Mitigated Roles
Mitigated Profiles
HR Objects Mitigation
Mitigated Role for Organization Rules
Compliance Certification Reviews
Managing Coordinators
Creating Coordinator Mappings
Modifying Coordinators
Searching Coordinators
Reviewing Requests
Managing Rejections
Role Mining
Action Usage
Role Comparison
Role Reaffirm
Access Alerts
Searching Access Alerts
Cleared Access Alerts
Clearing Access Alerts
Searching Cleared Access Alerts
Reports and Analytics