1.Is it possible to have a request type by which we can change
the validity period of a user?
If possible, then what are the actions?
Answers were Sorted based on User's Feedback
Answer / sree
Any GRC experts?
Every one have only questions. Not gettting any answers from that questions. Please experts help us.
thanks
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / praveen
Hi, friends i can send some Grc Question plz send Answers.
4. What's the latest Support Pack for GRC 5.3? How it
differs from the previous one?
5. What are the issues faced by you in ERM & CUP after
golive?
6. Can we change Single roles, objects & Profile description
through mass maintenance of role? If yes, how?
7. What are the prerequisites for creating a workflow for
user provisioning?
8. How will you control GRC system if you have multiple
rulesets activated?
9. Can we view the changes of a role, happened in PFCG,
through GRC?
10. How will you mitigate a user against an authorization
object which is decided as sensitive by Business?
11. Give an example of SOD with object level control & also
decide the Risk implication from the Technical standpoint.
12. Is it possible to assign two roles with different
validity period to a user in one shot throughGRC? If yes,
how?
13. What's the use of Detour path? How Fork path differs
from Detour path?
14. How can you enable self password reset facility in GRC?
15. Can we have customized actions for creating request
types in CUP?
16. Which SOX rules got inherited in SAP GRC?
17. How many types of Background job you are familiar with?
Why Role/Profile & User Sync. job is required?
18. Where from can we change the default expiration time for
mitigating controls? What's the default value for the same?
19. How will you do the mass import of role in GRC?
20. Explain the total configuration & utility of SPM?
21. Can we create Logical systems in GRC? If yes, how & what
can be the advantages & disadvantages of the same?
22. Can we have different set of number ranges activated for
request generation?
23. Explain, how can we create derived roles in ERM? What
will be the significant changes in methodology for creating
composite roles?
24. Explain in detail how the different components of the
Access Controls suite integrate with each other
25.Explain the key problem areas in implementation of RAR
Is This Answer Correct ? | 1 Yes | 13 No |
Can you explain sap system transactions?
This is in continuataion to the previous question. a user is assigned with tcode SA38.how to restrict him to execute only a few reports,say rsusr003.If you're going to modify the role(having sa38) assigned to the user,that will affect other users also because that role might be assigned to multiple users.I don' want that to happen.so what is the solution?
How see hierarchies in BI security
in my production system there are some 20 roles created in the production system itself without following the standard procedure of creating in dev testing it qas and then moving it to prd.so how do you find out all the roles created in prd system?
1 .what are the authorization switches in security
Hello!!! We are asked to generate a report/collect data on users concurrently accessed to the system and what operations they performed with their concurrent access. Apart from they want info on the duration of thier concurrent/normal session (date, time etc). Can anyone help us to know any particular transactions (as of our knowledge STAT & STAD can render certain segment of data), reports available with SAP to collect the above requested info.
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?
what is central user administration?
Give some examples for Remediation and Mitigation in RAR?
can any tell me if a t_code is assigned to 5000 users then how would you find out who never uses this t_code?
what is sod in sap security?
What are st01 t-codes used for?