SoD Transport Issue - GRC AC 10.0
Recently, I came across with an unique issue where I was not able to transport the SoD rule set across the clients. While creating the Transport Request as Customized, the system was throwing an error...
View ArticleGRC Request with both System and Role Line Items
GRC 10.0 - GRC Request with both System and Role Line Items Most common question I have come across in this forum is how to handle the GRC requests with both System and Role LineItems. As system will...
View ArticleOffline Workflow Process - ASSERTION_FAILED
In Offline Workflow Process, a generic dump happens when delivering the PDFs to the recipients. In ST22, we can see the following Short Dump:This short dump does not say what is the issue and how to...
View ArticleDownload, Modify and Upload the Access Risk Analysis Rule Set in SAP Access...
A common problem for SAP Access Control customers migrating to Access Controls 10.1 is that they want to take advantage of rule set changes made since their last rule set update, but they don’t want to...
View ArticleCustomizing NWBC for New Menus with our own Transactions, Reports and...
Customizing NWBC for New Menus with our own Transactions, Reports and Accessing SAP Backend Systems from NWBCSince GRC 5.3 was on Java stack, customization of GRC screen was not possible on greater...
View ArticleA lot of help from my friends
On one of my first projects as the lead architect I needed to prototype GRC. I had supported GRC components before (albeit 5.3 version), attended the GRC300 training course and passed my certification....
View ArticleChallenges during GRC 10.0 Support pack and Net weaver upgrade
This document talks about the challenges organizations face when upgrading Support pack/ Net weaver for SAP GRC 10.0. Organizations that upgrade support pack with Net weaver version for SAP GRC 10.0,...
View ArticleCreate Transportable BRF+ Rules in GRC AC 10.0
Hi GRC, Here i would like to share my experience to Create Transportable BRF+ Rules in GRC AC 10.0. Please follow witha attached file. Thanks & Regards, Rajesh Srisailapu
View ArticleTransport BRF+ application from $Temp package
Transport BRF+ Application from $Temp packge I am not sure if you have already come across the phase associate with Copy the BRF+ application from $Temp package in order to make it transportable. At...
View ArticleApprobation by Email and Delegation in GRC 10
There are multiple issues related to this solution and in fact SAP has released a knowledge article to the topic that it is not allowed citing security reasons - SAP KBA: 1622881 - Approve by E-mail...
View ArticleIssues, Bugs in GRC SP13 - Related Fixes
Hi All, We are currently on GRC SP13. I could see lot of community members also working on same SP. There are lot of issues in GRC SP13. I am just updating the issues with relevant SAP notes here just...
View ArticleAre you ready to implement GRC 10?
With the go-live of our Governance, Risk, and Compliance (GRC) version 10 Access Control finally past us (hallelujah!), I have been thinking about the learnings, from my previous GRC 10 projects as...
View ArticleSAPinsider's GRC 2014 in Singapore
Dear all, I am wondering if one of you join the SAPinsider GRC conference in Singapore from October 13th till October 15th. As I am travelling to Singapore around that date I might attend. For more...
View ArticleREGISTER NOW - August SAP Fraud Management Partner Workshop
Sign Up Now To Summer Training - Partner Workshop on SAP Fraud ManagementAugust 26-28th, 2014 SAP Campus – Walldorf, Germany With the continuing momentum around SAP Fraud Management, we will be...
View ArticleListing and Selling SAP Fraud Management Content in the SAP HANA Marketplace
In the last 9 months, more than 250 consultants from partners attended the Fraud Management Partner Workshops to receive training on how to develop rules for SAP Fraud Management. Since then, many...
View ArticleIf I had it to do all over: looking back on GRC 10 projects
If you attended Alan Jackson's performance at the 2013 ASUG/ SAPPHIRE Now Celebration Night, or if you are a fan of his, you might be familiar with his hit ballad "I'd love you all over...
View ArticleTransforming Internal Audit Management – Are You Prepared? [INFOGRAPHIC]
SAP recently conducted a survey on transforming internal audit management at the Institute of Internal Auditors International Conference 2014 held at London. The purpose of this survey was to explore...
View ArticleLooking ahead to SAP TechEd && d-code 2014
What I like best about SAP TechEd && d-code is the variety of learning experiences available to attendees. SAP Security and GRC professionals might be surprised to learn that there is a good...
View ArticleEnabling Business Role updates to existing assigned users
SummaryWith the availability of defining Business roles within GRC AC 10.0, provisioning initial access to users across multiple landscapes with a single combined role is possible. However, there have...
View ArticleMaintenance of Critical Risks at Critical Permission level
Risks:Risks are the core objects that identify the potential access issues which your enterprise may encounter. The elements that make up a risk are its attributes. Risk management uses the attribute...
View Article