Connector 2
Connector 2
In this particular session, we are going to discuss about the shared configuration within SAP GRC
Access
Control, meaning the configuration which is relevant for all the different four applications which
we have seen, as well as we will also see and enable the BC sets, which is delivered by SAP.
In general, this is a set of baseline customizing which is delivered by SAP means that SAP does many
So we can use this BC sets to have the initial baseline configuration Now you may think, do we really
need that?
You can make the changes which are required on top of this basis sets which is delivered by SAP.
The detail of this BC sets are available in SAP Access Control Administration Guide.
This is the transaction code and these are all the BC sets which we need for your SAP access control
activation.
If you want to see all the BC sets delivered for access control, then you go to a SAPR20 and just
say GRAC*.
Then you will get all the list of access control BC sets.
Similarly, there are basis sets available for process control and risk management.
We will be using only the access control BC sets for our system.
So let us go to the system and see how we can enable the BC sets.
There are many BC set which is not related to us like SRM and APO.
Basically, as we discussed before SAP delivers the standard rule sets for your systems, which can
Then you can move it to your quality as well as to the productive system.
Let's execute.
If you want to see the detail you select the activation log.
As.
Okay.
And if there is an error of course we need to see what is actually the problem.
Like this.
Basically, these rule sets I have selected the rule set which is required for us.
And I have eliminated many of the rule set which is not required.
Now, if you see we have completed all the business set activation, we could also recheck whether
this
Basically, some of the customizing setting, which is delivered by SAP, supposed to be there in the
So let's go to Spro.
Reference img.
And one thing you can see here also you will see existing BC sets.
It means that some of the BC sets has the SAP delivered configuration.
So in that case if you say existing BC set, you can see there is something called additional information
Then if you go to governance risk and compliance and uh, let's go to All Access management or just
bring anything okay The role management when I open the role management you can see here
additional
Okay.
Basically we need to configure this instead you know to reduce the efforts SAP pre delivered these
configurations.
Now let us discuss about mapping for Action and Connection group.
Let us say if you are integrating your GRC system with the HR system.
So whenever a employee is created, then you can automatically trigger the event from the HR system
to create a access request in the GRC system for the respective system, depending on the position
which
Similarly, we can also map the BRM event in this particular customizing activity.
If you see here these are all the options available in this particular customizing activity.
Here.
What we can do is we can maintain the status of the particular group active or inactive.
Here we can assign the connector to the connector group the default connector to the connected
group.
Here we can map the fields within the GRC system which is connected to the different external
system.
Basically when you are using IDM, IDM use Spml standard, there you can map which field is equal to
which field in GRC Both of these configurations, basically we are doing a field mapping only.
If you use any external system then you will.
Okay.
Reference img.
We go to access control.
Select this.
SAP, R3 LG and specify this is active and the application type is SAP
Okay.
You can have more than one system or more than one action.
Okay.
These are the four actions which is related to BRM which is required for us.
Okay.
005.
As I said, if you select one of these and go to the field mapping you can create the field mapping.
Okay.
Then the field name and the table name and the subtype.
So like this we can assign each field for the specific action.
Here we can maintain the connection setting for the system that are connected to access control
application.
Go to spro SAP.
Select this.
Application is SAP.
So if you have development quality and production then you can specify each system and or let us
say
Let's go back.
As you know we are using a PFCG system that is in the EH8 system is a PFCG system.
If we want to skip the PFCG system and go to a non PFCG system, then we can use this customizing
activity
Of course when you go to the non PFCG system then you need to have additional programs to be
created which
Maybe we can quickly go through the img configuration just to show you where is this available.
Okay we have non GRC systems which you can define it here.
Next let us see some more customizing activities like maintain critical level for emergency access
management.
So this sod risk you will classify at high medium low and critical.
And each of them we can also define a color code for that.
Okay.
So this is the configuration for that.
Let's go to.
We have four critical levels very high high medium and low.
Okay.
That is.
Here.
This is required.
Let's say if you have high number of parallel processing in your SAP GRC then you can configure this.
So basically you need to provide which application what server and the log on server group, the
number
of tasks which you can run and the work process which you can occupy.
You can also change it or you can also create additional risk level if it is required.
This is one important topic we need to create the list of available business process and subprocess
That means all the business process and subprocess which is available in your ERP or your SRM
systems,
need to be created in the GRC system.
Okay.
Please remember we also need to have subprocess in all the business process.
Okay.
If you don't have any subprocess we need to create one subprocess in the same name means that
every
If it is finance then you have sub process like account receivable account payable.
Like this.
Okay.
Okay.
Yeah.
Similarly we need to create sub process for each of these business processes.
Okay.
For the interest of the time, I will be doing this and I will come back to you.
Maybe I can show you some of the sub process like for M, I created purchase order and purchase
approval
Then I simply created one sub process as it is with the same name, so that every business process
have
a sub process
We have a separate topic we will be discussing about BRF plus how to create BRF plus functions and
so on.
So once we complete that then this will become quite clear to you the configuration perspective I
don't
So in this particular configuration what we will be doing is we will maintain the BRF plus application
mapping.
Okay.
Then this will be BRF plus function ID which will be in turn assigned to one MSMP process.
We can directly assign the BRF plus functiona ID in the MSMP itself, and some of them we need to
assign it here because like HR here, if you have a BRF functiona ID, then we have to assign it
here.
Okay.
Basically, if you create a new function in BRF plus, then you need to maintain the mapping for
the application.
So let's go back and let's go to maintain access application and BRF plus function mapping.
If you have new functions then you can select what application then BRF plus function.
At the moment we are not going to assign anything So we will skip this.
Basically here we can maintain the connection information which is required for access control to
retrieve
Okay.
Let's say you are authenticating using Ldap or some other sources.
Then you can use this functionality where we have different configuration like uh, search your uh,
user detail from which location or which connection, or retrieve the user detail from which
connections.
Verify the requester identity from which source, or let's say end user logon and so on.
Okay.
So basically we are retrieving the users and authentication information from other data source by
using
this configuration.
Let's say if you are integrating with other data source, then you can use this.
The SAP, GRC can use any other data source like Ldap or any other data sources, to retrieve
informations
So if you create a connection for Ldap then you can specify the connection here and specify the data
source.
Then you can retrieve the user information from that data source.
Otherwise you can pull the user information like your first name, last name, email ID these are all
does not need to be filled in manually since these information available in the Ldap for example.
If you want to run a risk analysis based on some custom user group, then we can create the user
group
here.
Here you can specify the user group which you want to run the risk analysis.
Basically, if you have some user group which is quite critical, you want to automate the Sod analysis
for this user group in a periodic basis, then you can create this.
Otherwise still you can run the SOD analysis for user group.
But this is basically you are configuring in the system itself as a configuration so that you know it
Okay.
In general, if you see many of the system you should have already faced not recent days.
Maybe in the older systems you will have a user in one SAP system with a specific user ID, the same
user will have an user in other SAP system with a different user ID.
You will not find this because most of the companies use a unique identifier for each users However,
if at all this problem happens, then you can map one system as a master user ID.
If at all this happens, you can configure this specific user ID is equal to.
Basically you can execute batch risk analysis from the Spro.
And you can also monitor the batch risk analysis from Spro.
Let's go here.
Let's go to.
If you see batch risk analysis you can maintain and execute the object for bachelor risk analysis.
Okay.
So if in case if you want to explore in this direction you can use this functionality.
behave.
There are many configurations where we can change the behavior of the GRC system or let's say GRC
access
control system.
We will go through some of the main important things which is required during the course.
Now we need to understand there is something called configuration setting where we can configure
some
Go to access control.
Select this.
Of course SAP cannot deliver you the configuration settings because it may vary depending on your
requirement.
Let's say if when you run a risk analysis do you want to include your expired users.
Some customer says expired user need to be included for risk analysis because they do not delete
the
So you wanted to include or don't want to include, you want to include the logged user or not.
Okay.
So once we do this then whenever you run a risk analysis it will include all the expired user like this.
So if you want to define a default role whenever you create an access request, you want to assign a
default role to the user without adding into the access request.
We have all the possible parameters are already available here means this parameters.
If you compare with the older versions, these parameters are increased a lot.
Okay, so most of the requirements you may require for your implementation is already here.
We are not going to go through this one by one because this parameter groups are quite big.
Okay.
Let's go to authorization.
Then let's select enable authorization logging.
Let's see.
Yes.
Then I will also add workflow Maybe then in workflow we have the.
Let's say you wanted to send the email from a specific email address.
Okay.
Let's say.
Okay.
Like this.
Okay.
Select this.
So whenever you run a risk analysis it will give you the output in the technical format.
So this basically by default the view for risk analysis will be technical, which means it will have
Once you configure this then you will save, create a TR.
Bye bye.