Expert Tips To Simplify and Automate Your User Access Request Process David Denson PWC
Expert Tips To Simplify and Automate Your User Access Request Process David Denson PWC
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
COMMON CHALLENGES – REQUEST ACCESS
There are so many fields I have to enter data in and I am transferring to a new job, I’ll just copy Bob’s
tabs to navigate, this takes forever! access and I should be fine.
I am a new user and there are so many roles and This request status report is very confusing, how
systems for me to choose, I have no clue which roles do I figure out who needs to approve my request?
I need …
Why do I have to run a risk analysis in every I do not have the information I need to make
request / when I make a change to an informed decision whether this user
the request? actually needs access to this role.
The user selected every available role, What is this role being
The approval form is cumbersome and does why is it my responsibility to analyze requested and why is it coming
not readily display the information I need. this request? to me?
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
APPROVER EXPERIENCE ENHANCEMENTS
• Based on the validation checks, user has submitted a valid request for access.
Valid request These requests can then be routed to the approver for approval or
for access auto-provisioned.
APPROVER EXPERIENCE ENHANCEMENTS
(CONT.)
• Work Inbox
– To pull more relevant fields into the work inbox, such as user
name/ID, requester name/ID, stage, and request type, switch the
default query from ‘All’ to ‘Access Management’ (this can be done
for all users by accessing the work inbox in Customizing mode).
– To have the items in the work inbox refresh automatically, you can
utilize t-code/npowl_cockpit.
• Find the GRFN_INBOX application, click on ‘Register Query’,
choose the query to maintain and click ‘Maintain Query’, then
change the option for the ‘Refresh Type’ to ‘On Every Page Visit’.
– You can also maintain this option for other tables in GRC.
APPROVER EXPERIENCE ENHANCEMENTS
(CONT.)
• Remediation/Mitigation Stage
– To present the risk analysis reports in a more “business friendly” view, you can utilize
parameter 1048 to have the analysis ran in business view.
– When configuring the ruleset, make sure that only permissions that are relevant to
your environment are enabled (you can utilize ST01 to determine needed
authorizations), otherwise this can lead to false positives in your reports.
– For any non-critical risks that are expected to have job level conflicts that cannot be
avoided, applicable mitigating controls should already be available for assignment (or
you can utilize mitigation policy functionality to not require mitigation of
these risks).
– If you have multiple rulesets in your environment, you can utilize the “Request
Multiple Rule set” BRF+ application to configure when each ruleset is selected
for analysis.
If your company leverages Process Control (PC), the integration between PC &
AC can bridge the gap in determining if mitigating controls being assigned are
still valid and effective.
APPROVER EXPERIENCE ENHANCEMENTS
(CONT.)
• Remediation/Mitigation Stage
– Occasionally, you may receive a risk analysis that is nearly impossible
to decipher.
• A simple method to determine what remediation options are
available (besides integration with third-party tools) is to pull the
analysis into Excel and utilize pivot tables or use Access Databases to
compare results to functions and identify remediation options.
4000+ Lines Easily Identify Available Remediation Options
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
CUSTOMIZING ACCESS REQUEST VIEWS
• Why does this matter? I do not have the information I need to make
– Through GRC form customization, an informed decision whether this user
we can realize the following actually needs access to this role.
benefits:
• Ease the requesting process by
reducing the time it takes to There are so many fields I have to enter data
submit a request in and tabs to navigate, this
• Present only relevant takes forever!
information to the user, reducing
user confusion and frustration
during the request process The approval form is cumbersome and does
• Reduction in the data points not readily display the information I need.
needing to be reviewed eases
the review process for approvers
• Deliver all required information
the reviewers need to make an
informed decision
CUSTOMIZING ACCESS REQUEST VIEWS (CONT.)
You can utilize the characters #!# in the default value field to pull in a dynamic value for an
attribute. For example, if your SNC value needs to be p:clientx.com\userid, you can use
p:clientx.com\#!#USERID_L#!# to provision the value for each user.
CUSTOMIZING ACCESS REQUEST VIEWS (CONT.)
What is IdM?
• Identity Management (IdM) tools are enterprise-wide, cross-
application solutions that automate and increase the transparency
around user access and entitlement administration. IdM tools offer a
wide range of functionality, including:
– Automated provisioning to
new and existing users
– Automated password resets “Virtual” Composite
grouping for A/P
Clerk
– Single sign-on
– Ability to customize forms and
Underlying Roles (SAP
and/or Non-SAP)
user experience
SAP FIORI – WHAT IS IT?
Drawbacks
• SAP Fiori is not a mobile platform. With SAP
Benefits Fiori, you do not see terms like offline
• Increased end user adoption and improved synchronization management, device
user satisfaction due to dramatically management etc. which are functionalities that
improved user experience a typical mobile platform provides
• SAP Fiori apps are multi-platform without • SAP Fiori apps are not native to the device they
programming additional screens -> a very are running on
attractive low TCO option • SAP backend only – currently, Fiori is designed
• Leverages existing SAP investments by to run with SAP backend only
providing instant value to all employees
and processes
COMMONLY USED APPLICATIONS
In order to utilize the new “Simplified” screens in GRC 10.1, you must have a
browser that is HTML5 and CSS3 compliant. Examples of such browsers
include Internet Explorer 9+, Chrome, and Firefox.
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
UTILIZING BADIS TO ENHANCE GRC
• The Access Request Role Search Criteria & Access Request Role Search
Restriction BAdIs can be utilized to guide users to the correct
role assignments.
– The Access Request Role Search Criteria BAdI can be utilized to default in
the search fields most relevant to your environment. This provides easy
to use default search parameters leaving advanced search for
advanced users.
– The Access Request Role Search Restriction BAdI can be utilized to
restrict role search results to only those roles applicable to
the user.
If you have an accurate user data source, you can pull user restriction fields directly into the
request via field mapping (i.e. company, employee type, etc), have the field configured as a role
attribute, and use the role search restriction BAdI to limit the role search results to only roles
mapped to the user’s restriction field, reducing the risk of users selecting irrelevant roles for
their position.
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
IMPLEMENTING AN EFFECTIVE ROLE DESIGN
STRATEGY
Task-Based Approach
IMPLEMENTING AN EFFECTIVE ROLE DESIGN
STRATEGY (CONT.)
• We now have tools available that can be utilized to assist users in getting
the access they need. These functionalities should be utilized for new user
requests and job transfers:
– Template requests
If you have the ability
– Model User Access and timing to allow for
ABAP development
– Business Roles activities, template roles
are a great alternative
that allows you to
automatically add roles
based on attributes and
perform validations on
the requested access. To
enable template roles,
you must implement the
GRAC_TEMPLATE_ROLE
BAdI.
ACCESS REQUEST TOOLS (CONT.)
• Template Requests
– Can be used to build a pre-populated access request for users
to select
– Pre-populate access request with roles, request, type, user
information, etc.
– Can specify a default EUP ID to be used for the template
Pros:
• Simple process for new users if they know
Cons: which template to select
• Cannot restrict who can make changes to • Provides additional flexibility for users to
other templates remove/add additional roles to
• Roles will be sent to all role approvers for the request
approval
• Time consuming task to set up
• Can be difficult for users to know which
template to use
ACCESS REQUEST TOOLS (CONT.)
• Business Roles
– Business roles are “virtual” containers that only exist in GRC. These roles
are searchable from the role search menu within an access request and
can contain roles for
multiple systems.
Pros:
• Business friendly names Cons:
• Users granted all access associated with the • No native reporting of user to BR
business role • No mass loading of user to BR
• Adding or removing a technical role can be • Not tied to a system – may cause
“pushed” to end users user confusion
• Can map one approver to the business role
• Flexibility to remove single role assignments
when needed
• Supported by User Access Review
ACCESS REQUEST TOOLS (CONT.)
• Default Roles
– You can set up logic to automatically add roles to a request based
on set request or role attributes
– You can choose whether default roles are based on role attributes
or request attributes or both
• Role Attributes – Based on attributes or master data elements
of the roles selected by the user. Default role is added to the
request immediately.
• Request Attributes – Based on attributes within the header
data of the request. Default roles are not added until after
request submission.
• Due to limited logic, best if used for “general end user” type roles or
enabler roles based on request attributes.
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
BUILD CUSTOM REPORTING
• There are many options to build custom reporting in GRC such as:
– Custom Report Development
This request status report is very confusing,
– BW Integration how do I figure out who needs to approve
my request?
– Crystal Reports
• There is another simple, quick alternative if the options above are not available to
you, SQVI queries!
– Relatively simple to build
– Transportable
– Can build security around the reports
– Can be built into the GRC NWBC view as an application
Is a standard report just missing one key field that your business users need? You can
add a column in a standard report utilizing view cluster ‘VC_GRFNREPCOLUMNSC’ via
SM34. Just be sure to check it after an upgrade/applying OSS notes.
BUILD CUSTOM REPORTING (CONT.)
• You can build reports to fill some of the missing gaps in business role
reporting, such as:
– Business role to user report
– Single roles provisioned without a business role (helpful during
periodic reviews)
– Report showing which approver approved role assignments
– Business role to t-code report
In addition to creating a custom report as shown in the take home materials, you
could also create a custom report by utilizing view cluster VC_GRFNREPCUST via
SM34 and add to the desired Launchpad as a Web Dynpro ABAP application.
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
MODIFYING GRC AC USER INTERFACE
Applications
(NWBC) is the “front-end” user
interface and is accessed via
internet browser.
• Security roles are maintained
through PFCG on the “backend” –
SAP GUI.
• Roles and authorizations within
them control what is visible and
what the user can do within each
application (Web Dynpro) in NWBC.
MODIFYING GRC AC USER INTERFACE (CONT.)
When removing applications from end user views, best practice is to attempt to
remove them by utilizing role authorizations first. If the authorization is shared with
an application the user needs, then you may need to customize the Launchpad.
MODIFYING GRC AC USER INTERFACE (CONT.)
Please don’t
Trial and error?
say ST01!
Am I actually
going to have
to read the SAP
security guide?
MODIFYING GRC AC USER INTERFACE (CONT.)
• The below tables can be joined via SQVI to create a query to pull the
relationship between each application and the related
authorization object(s)!
I cannot even
begin to show my
excitement…
MODIFYING GRC AC USER INTERFACE (CONT.)
You should never modify the SAP provided Launchpads, but rather copy an existing Launchpad
using the “Save As” feature and modify to your requirements. If you are creating a new work
center, you will need to create the associated Web Dynpro components, associate them to a
Launchpad, and associate the Launchpad to a PFCG role.
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
HELP CENTER
• The Help Center is a very useful tool that can be utilized to guide and assist users
through various GRC tasks, such as requesting access.
– The content within the help center can be configured to be application specific
(only shows for defined applications) or cross application (shows for
all applications)
• The four sections included
within the help center include:
– Notes
– Frequently Asked Questions
– Worth Knowing
– Learning Content
HELP CENTER (CONT.)
• Within the current view, the user can access the Help Center to
obtain content-specific assistance with the task they are performing.
HELP CENTER (CONT.)
• Note section:
– Allows users to add personalized notes.
– Notes are application-specific and will only display in the application
they were made (i.e., Access Request notes would only be viewable
through accessing the help center within the access request
submission screen).
– Notes are user-specific and cannot be viewed by other users.
HELP CENTER (CONT.)
To authorize users to manage Help Center content centrally (cross-application), they will need
access to S_TABU_DIS (auth group SHC) and S_WDHC_ADM (Action “A”). SAP provided role is
SAP_BC_WDHC_ADMINISTRATOR.
HELP CENTER (CONT.)
You can translate help center content via t-code SHC_TRANSLATION. To authorize users to
translate Help Center texts, they will need access to S_WDHC_ADM (Action “T”). SAP provided
role is SAP_BC_WDHC_TRANSLATOR.
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
REQUEST MITIGATION POLICY
N/A
business process and the combination of activities results in the risk of a
financial reporting misstatement / fraud. (No users should have this access)
The functions being performed are directly next to each other in the
business process and there exists an advantage in perpetrating fraud for Yes
High
No
necessary to perpetrate fraud. The resulting fraud is not attractive and
there exists no potential for personal gain.
REQUEST MITIGATION POLICY (CONT.)
– Within MSMP workflow, for the stage in your approval workflow that is
responsible for mitigation assignments / remediation, ‘Approve Despite Risk’
should not be checked and ‘Risk Analysis Mandatory’ should be set to ‘Yes’.
REQUEST MITIGATION POLICY (CONT.)
• To set up request mitigation policy, you must first determine the associated BRF
Function ID, which is noted under ‘Maintain AC Applications and BRFplus Function
Mapping’ in SPRO.
• Once you have the BRFplus ID, navigate to BRFplus (t-code BRF+), and enter the ID
under Workbench > Open Object.
The first time you access BRF+, make sure to change your User Mode to ‘Expert’.
REQUEST MITIGATION POLICY (CONT.)
• Create a decision table and implement your business logic. In this example, we are
enforcing mitigating control assignments for all risk levels except for ‘Low’.
• In the ‘MITIGATE_RISK’ column, set the value to ‘1’ to enforce mitigations and ‘2’ to
not require mitigations.
• Save and activate your newly created decision table and the associated
function. Under the function, you can simulate values to confirm that the
appropriate mitigation policy is being enforced.
WHAT WE’LL COVER
• Common Challenges
• Approver Experience Enhancements
• Customizing Access Request Views
• Utilizing BAdIs To Enhance GRC
• Implementing an Effective Role Design Strategy
• Custom Reporting
• Modifying GRC AC User Interface
• Help Center
• Request Mitigation Policy
• Wrap-up
WHERE TO FIND MORE INFORMATION
• http://www.pwc.com/us/en/sap-implementation.html
– PwC’s SAP Implementation Services
• http://scn.sap.com/docs/DOC-1570
– Harleen Kaur, “AC 10.0 – Business Role Management” (SAP
Community Network, August 2011)
• www.sdn.sap.com/irj/bpx/grc
– SAP Governance, Risk, and Compliance Solutions, Guides,
and Applications (Designing your SAP security processes)
7 KEY POINTS TO TAKE HOME
• Simplifying and enhancing your access request process is not a simple task!
• An effective, healthy role design is a MUST before attempting to roll out
the GRC Access Request Management (ARM) Module.
• A mix of task based “technical” roles and business role “templates” is a
good way to strike a balance between end user experience and flexibility in
your role design.
• You can meet reporting requirements without extensive
customization/integration with reporting tools.
• The Help Center is a great tool, don’t forget about it!
• Prior to implementing a mitigation policy, a risk classification system needs
to be clearly defined.
• Integrating GRC with an accurate HR data source can lead to further
automation in the request process.
YOUR TURN!
David Denson
[email protected]
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other
countries. All other product and service names mentioned are the trademarks of their respective companies. Wellesley Information Services is neither owned nor controlled by SAP SE.
©2016 PwC. All rights reserved. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the
PwC network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details.
This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.
FOLLOW US