+ All Categories
Home > Documents > Process Control 10.0.pdf

Process Control 10.0.pdf

Date post: 10-Feb-2018
Category:
Upload: trevonb12
View: 216 times
Download: 0 times
Share this document with a friend
98
7/22/2019 Process Control 10.0.pdf http://slidepdf.com/reader/full/process-control-100pdf 1/98 Security Guide SAP Access Control™ 10.0 / Process Control™ 10.0 / Risk Management™ 10.0 Target Audience System administrators Technology consultants PUBLIC Document version: 1.80 – 2012-06-18
Transcript
Page 1: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 1/98

Security Guide

SAP Access Control™ 10.0 / Process Control™ 10.0 / Risk

Management™ 10.0

Target Audience

■ System administrators

■ Technology consultants

PUBLICDocument version: 1.80 – 2012-06-18

Page 2: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 2/98

Document History 

CAUTION

Before you start the implementation, make sure you have the latest version of this document.

You can find the latest version at: http://help.sap.com/grc.

The following table provides an overview of the most important document changes.

 Version Date Description

1.00 2010-12-13 Release to customer.1.10 2011-01-31 Updates for SP02:

■ Changed writing and documentation references throughout guide to improveclarity.

■ In section 5.3.2 Cross Regulation Roles, we added a note for roleSAP_GRC_FN_ADISSUE_PROCESS.

1.20 2011-04-01 Updates for SP03:

■ Added section 4.2.1 RFC Authorizations for Access Control.

■ Updated section 5.4.1 Authorization Object Element Relationships: ORGUNIT/ROLES

and ORGUNIT/ROLES_PC.

■ Updated section 5.4.2 Maintaining Application Role Authorizations:

● Added more information for CREATE/ENTITY● Clarified use of the authorizations: CHANGE/ORGUNIT/ROLES and

CHANGE/ ORGUNIT ROLES_PC

■ Clarified that the delivered are samples, and must be copied to the customernamespace.

1.30 2011-04-18 Added statement to clarify that Content Lifecycle Management (CLM) is currentlyonly available for SAP BusinessObjects Process Control 10.0 and SAP BusinessObjects

Risk Management 10.0.

1.40 2011-05-31 Added role IDs to section 5.3.2 Application Roles (Process Control).

Removed authorization object GRCFF_0001 from section 4.2.1 RFC Authorizations for 

Access Control.

1.50 2011-08-12 In section 4.2.1 RFC Authorizations for Access Control, added /GRCPI/* value to theRFC_NAME authorization field of the S_RFC authorization object.

1.60 2011-12-19 In section Appendix A: PC and RM clarified the role SAP_GRC_FN_ALL.

1.70 2012-03-19 Updated the following for SP08:

■ Changed terminology from Superuser Privilege Management (SPM) to

Emergency Access Management (EAM).

■ Removed obsolete Reporting Authorization section.

■ Added GRC Internal Audit Management role information to section 5.3.4 Portal

Roles, Process Control Portal Roles

■ Added section 5.3.6 Internal Audit Management Roles (Process Control) and includedreference for more information about SAP NetWeaver Audit Management

roles.

 

2 /98 PUBLIC 2012-06-18

Page 3: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 3/98

 Version Date Description

1.75 2012-04-16 Added section 4.2 Trusted/Trusting RFC Relationships, about maintainingtrusted/trusting relationships between SAP systems..

1.80 2012-06-18 Formerly known as SAP BusinessObjects Access Control, SAP BusinessObjects

Process Control and SAP BusinessObjects Risk Management, now known as SAPAccess Control, SAP Process Control and SAP Risk Management.

 

2012-06-18 PUBLIC 3 /98

Page 4: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 4/98

 Table of Contents

Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Chapter 2 Before You Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Chapter 3 Technical System Landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Chapter 4 Network and Communication Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

4.1 Communication Channel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

4.2 Trusted/Trusting RFC Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

4.3 Communication Destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

4.3.1 RFC Authorization Objects for Access Control . . . . . . . . . . . . . . . . . . . . . . . . 16

4.4 Integration with Single Sign-On Environments . . . . . . . . . . . . . . . . . . . . . . . . 18

4.5 Data Storage Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

4.6 User Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

4.7 Trace and Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

4.8 Configuring NW VSI in the Landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Chapter 5 Application Security: PC and RM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

5.1 Authorizations Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

5.1.1 Maintaining Authorizations (Risk Management) . . . . . . . . . . . . . . . . . . . . . . . 23

5.1.2 Maintaining Authorizations (Process Control) . . . . . . . . . . . . . . . . . . . . . . . . 24

5.2 First-Level and Second-Level Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . 26

5.2.1 Configuring Second-Level Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285.3 Delivered Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

5.3.1 Application Roles (Process Control) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

5.3.2 Application Roles (Risk Management) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

5.3.3 Authorization Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

5.3.4 Portal Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

5.3.5 Continuous Monitoring Roles (Process Control) . . . . . . . . . . . . . . . . . . . . . . . 34

5.3.6 Internal Audit Management Roles (Process Control) . . . . . . . . . . . . . . . . . . . 35

5.4 Workflow Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

5.4.1 Maintaining Workflow Recipient Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

 

4 /98 PUBLIC 2012-06-18

Page 5: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 5/98

5.5 Ticket Based Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

5.6 Standard Authorization Objects Relevant to Security . . . . . . . . . . . . . . . . . . . 41

Chapter 6 Application Security: AC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436.1 Authorizations Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

6.1.1 Delivered Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

6.1.2 Authorization Object Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Chapter 7 Security for Content Life-Cycle Management . . . . . . . . . . . . . . . . . . . . . . 49

7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

7.2 Technical System Landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

7.3 User Administration and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

7.4 Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

7.5 N  etwork and Communication Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Chapter 8 Appendix A: PC and RM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

8.1 Delivered Roles and Relevant Authorization Objects . . . . . . . . . . . . . . . . . . . 63

8.2 SAP Delivered Business Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

8.3 SAP Delivered Workflow Recipient BC Set (Process Control) . . . . . . . . . . . . . 70

8.4 Authorization Object Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

8.4.1 Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768.4.2 Entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

8.4.3 Subentities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

8.4.4 Dataparts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Chapter 9 Appendix B: AC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

9.1 Delivered Roles and Relevant Authorization Objects . . . . . . . . . . . . . . . . . . . 83

9.1.1 Roles Relevant Across All Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

9.1.2 Role Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

9.1.3 Access Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859.1.4 Emergency Access Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

9.1.5 Access Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

9.1.6 Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

9.2 Authorization Objects and Relevant Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

9.3 Authorization Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

9.4 Values for Activity Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

 

2012-06-18 PUBLIC 5 /98

Page 6: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 6/98

 This page is left blank for documents that are printed on both sides.

Page 7: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 7/98

1 Introduction

SAP Access Control is an enterprise software application that enables organizations to control access

and prevent fraud across the enterprise, while minimizing the time and cost of compliance. The

application streamlines compliance processes, including access risk analysis and remediation, business

role management, access request management, emergency access maintenance, and periodic

compliance certifications. It delivers immediate visibility of the current risk situation with real-time

data.

SAP Process Control is an enterprise software solution for compliance and policy management. The

compliance management capabilities enable organizations to manage and monitor its internal control

environment. This provides the ability to proactively remediate any identified issues, and then certify

and report on the overall state of the corresponding compliance activities. The policy management

capabilities support the management of the overall policy lifecycle, including the distribution and

attestation of policies by target groups. These combined capabilities help reduce the cost of compliance

and improve management transparency and confidence in overall compliance management processes.

SAP Risk Management enables organizations to balance business opportunities with financial, legal,

and operational risks to minimize the market penalties from high-impact events. The application allowscustomers to collaboratively identify these risks and monitor them on a continuous basis. Stakeholders

and owners are provided with such tools as analytic dashboards for greater visibility in mitigating risks

in their areas of responsibility.

The access control, process control, and risk management applications use the same security

components, therefore, the information in this guide is relevant to you if you implement only SAP

Access Control, only SAP Process Control, only SAP Risk Management, or all applications. The security

guide provides an overview of the application relevant security information. You can use the

information in this document to understand and implement system security, and to understand and

implement the application security features.

NOTE

Unless explicitly stated, it is understood the information in this guide applies to all three

applications.

NOTE

For information about the changes to security from SAP Access Control 5.3 to SAP Access Control

10.0, see the SAP Access Control 10.0 Migration Guide.

1 Introduction

2012-06-18 PUBLIC 7 /98

Page 8: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 8/98

CAUTION

This guide does not replace the daily operations handbook that we recommend customers create

for their specific productive operations.

 Target Audience

The security guide is written for the following audience, and requires existing knowledge of SAP security

model and of PFCG, SU01, and Customizing tools:

■ Technology consultants

■ System administrators

 About this Document

This Security Guide covers two main security areas:

Network and system security

This area covers the system security issues and addresses them in the following sections:

■ Technical System Landscape

■ Network and Communication Security

● Communication Channel Security

● Communication Destinations

● Integration with Single Sign-on (SSO) Environments

● Data Storage Security

● User Administration

● Trace and Log FilesApplication Security

Application security is divided in to the following sections:

■ Application Security for SAP Process Control and SAP Risk Management

This section covers the application security information for the process control and risk

management applications.

■ Application Security for SAP Access Control

This section covers the application security information for the access control application.

NOTE

For ease of reading, the application names may be abbreviated as follows:

■ AC is SAP Access Control

■ PC is SAP Process Control

■ RM is SAP Risk Management

1 Introduction

8 /98 PUBLIC 2012-06-18

Page 9: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 9/98

2 Before You Start

The access control, process control, and risk management applications use SAP NetWeaver, SAP

NetWeaver Portal, and SAP NetWeaver Business Warehouse. Therefore, the corresponding security

guides and other documentation also apply.

Guide Location

SAP NetWeaver ABAP Security Guide service.sap.com/securityguide

SAP NetWeaver Business Warehouse Security Guide service.sap.com/securityguide

Important SAP Notes

These SAP Notes contain the most recent information about the applications, as well as corrections to

the documentation.

Make sure that you have the up-to-date version of each SAP Note, available at http://help.sap.com/

grc.

For a complete list of important SAP Notes for the applications, see the following:

■ For the access control application, see the SAP Access Control 10.0 Master Guide at https://

help.sap.com/grc  Solutions for Governance, Risk, and Compliance Access Control SAP Access Control

10.0  .

■ For the process control application, see the SAP Process Control 10.0 Master Guide at https://

help.sap.com/grc  Solutions for Governance, Risk, and Compliance Pccess Control SAP Pccess Control

10.0  .

■ For the risk management application, see the SAP Risk Management 10.0 Master Guide at https://

help.sap.com/grc  Solutions for Governance, Risk, and Compliance Risk Management SAP Risk

Management 10.0  .

 Additional Information

For more information about specific topics, see the Quick Links as shown in the table below.

Content Quick Link on the SAP Service Marketplace

Security service.sap.com/security

Security Guides service.sap.com/securityguide

Related SAP Notes service.sap.com/notes

Released platforms service.sap.com/platforms

Network security service.sap.com/network

service.sap.com/securityguide

Technical infrastructure service.sap.com/ti

SAP Solution Manager service.sap.com/solutionmanager

2 Before You Start

2012-06-18 PUBLIC 9 /98

Page 10: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 10/98

 This page is left blank for documents that are printed on both sides.

Page 11: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 11/98

3 Technical System Landscape

For information about the technical system landscape for the applications, see the following Master 

Guides:

■ For the access control application, see the SAP Access Control 10.0 Master Guide at http://

help.sap.com/grc  Solutions for Governance, Risk, and Compliance Access Control SAP Access Control

10.0  .

■ For the process control application, see the SAP Process Control 10.0 Master Guide at http://

help.sap.com/grc  Solutions for Governance, Risk, and Compliance Process Control SAP Process Control

10.0  .

■ For the risk management application, see the SAP Risk Management 10.0 Master Guide at http://

help.sap.com/grc  Solutions for Governance, Risk, and Compliance Risk Management SAP Risk

Management 10.0  .

3 Technical System Landscape

2012-06-18 PUBLIC 11 /98

Page 12: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 12/98

 This page is left blank for documents that are printed on both sides.

Page 13: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 13/98

4 Network and Communication Security 

The network topology for SAP Access Control, SAP Process Control, and SAP Risk Management is

based on the topology used by the SAP NetWeaver platform. Therefore, the security guidelines and

recommendations described in the SAP NetWeaver Security Guide also apply to the applications. You

can use the information in this section to understand and implement the network and communication

security for the process control and risk management applications.

For more information, see the following sections in the SAP NetWeaver Security Guide in the SAP

Library:

■ Network and Communication Security

■ Security Aspects for Connectivity and Interoperability

4.1 Communication Channel Security 

The following table contains the communication paths used by the access control, process control,

and risk management applications, the connection protocol, and the transferred data type:

Communication Path Protocol Type of Data TransferredData Requiring SpecialProtection

SAP NetWeaver ABAP server usingSAP GUI

DIAG All application data Logon data

SAP NetWeaver Portal HTTP/HTTPS All application data Logon data

DS Extraction (application server to

BI system)

RFC All application data Logon data

Application server to BI system HTTP/HTTPS All application data Logon data

BI system to application server HTTP/HTTPS All application data Logon data

BusinessObjects Enterprise Server TCP/IP All application data Logon dataSAP NetWeaver Business Client HTTP/HTTPS All application data Logon data

DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTPS

connections are protected using the Secure Sockets Layer (SSL) protocol.

More Information

■ Transport Layer Security in the SAP NetWeaver Security Guide

■ Using the Secure Sockets Layer Protocol with SAP NetWeaver Application Server ABAP on the SAP Help Portal.

4 Network and Communication Security

4.1 Communication Channel Security

2012-06-18 PUBLIC 13 /98

Page 14: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 14/98

4.2 Trusted/Trusting RFC Relationships

You can set up trusted and trusting RFC relationships between two SAP systems. This allows secure

RFC connections between the systems without sending passwords for logging on. The logon user must

have the corresponding authorization object S_RFCACL in the trusting system. This trusted relationship

is not specific to GRC applications, and is a function of SAP NetWeaver.

More Information

Trusted/Trusting Relationships Between SAP Systems on the SAP Help Portal

http://help.sap.com/saphelp_nw04/helpdata/en/8b/0010519daef443ab06d38d7ade26f4/

content.htm

4.3 Communication Destinations

The information in this section applies to access control, process control, and risk management

applications.

For information about BusinessObjects Enterprise Server, see the Integration for SAP Solutions Install and 

Admin Guide at https://service.sap.com/instguides  SAP BusinessObjects BusinessObjects Information

Management (IM) .

For more information about non-SAP applications, see solutions provided by SAP partners.

 Access Control

The following table lists the communication destinations and authorizations required by Access

Control to communicate with other SAP and non-SAP capabilities:

Destination Type Comments

Access Control to SAP ERP / Plug-In

(Required)

RFC For more information about the

specific authorizations objects andvalues for Access Control, see 4.2.1

RFC Authorization Objects for Access

Control.

Access Control to SAP ERP / 

Standard Control(Required)

RFC You must assign SAP Module

Authorization for the user. Formore information, see your systemadministrator and the SAP 

NetWeaver Security Guide.

Process Control

The table below lists the required connection types and authorizations for the process control

application to communicate with other SAP components:

Destination Type Comments

Process Control to SAP ERP / 

Plug-In

RFC This is only required if you plan to use

automated controls:

4 Network and Communication Security

4.2 Trusted/Trusting RFC Relationships

14 /98 PUBLIC 2012-06-18

Page 15: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 15/98

Destination Type Comments

(Required) This also depends on the SAP moduleauthorization for the user. The RFC userrequires the following authorizations for

setting up the Process Control rule script andscheduling background jobs in ERP:

■ RFC access (S_RFC: 16; *; FUGR)Transaction Start (S_TCODE: SE37,

SM37, SM59, SU53)System Authorizations (S_ADMI_FCD:STOR)Background Administrator

(S_BTCH_ADM: Y)Operations on Background Jobs(S_BTCH_JOB: RELE, JOBGROUP)

ABAP Workbench (S_DEVELOP: 03, *, *,*, *)

Grant additional authorizations accordinglyto the RFC user to execute controls toretrieve ERP application specific data.

For more information, see your systemadministrator and the SAP NetWeaverSecurity Guide.

Process Control to SAP ERP / Standard Control(Required)

RFC This is only required if your organizationplans to use the automated controlfunctionality.

This also depends on the SAP moduleauthorization for the user. The RFC userrequires the following authorizations forsetting up the Process Control rule script andscheduling background jobs in ERP:

■ RFC access (S_RFC: 16; *; FUGR)Transaction Start (S_TCODE: SE37,SM37, SM59, SU53)System Authorizations (S_ADMI_FCD:

STOR)Background Administrator(S_BTCH_ADM: Y)

Operations on Background Jobs(S_BTCH_JOB: RELE, JOBGROUP)ABAP Workbench (S_DEVELOP: 03, *, *,*, *)

Grant additional authorizations accordingly

to the RFC user to execute controls toretrieve ERP application specific data.For more information, see your systemadministrator and the SAP NetWeaver

Security Guide.

SAP ABAP Query

Required

RFC This is required for the Automated Controls

Framework.

4 Network and Communication Security

4.3 Communication Destinations

2012-06-18 PUBLIC 15 /98

Page 16: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 16/98

Destination Type Comments

BI QueryRequired

RFC This is required for the Automated ControlsFramework.

Risk Management

The table below lists the required connection types and authorizations for the risk management

application to communicate with other SAP:

Destination Type Comments

SAP ABAP QueryRequired

RFC This is required for the risk management KeyRisk Indicator (KRI) framework.

BI QueryRequired

RFC This is required for the risk management KRIframework.

Risk Management to BusinessSuite

Required

RFC This also depends on the SAP moduleauthorization for the user.

For more information, see your systemadministrator and the SAP NetWeaverSecurity Guide.

Risk Management to SSMRequired

Web service This also depends on the SAP moduleauthorization for the user.

For more information, see your systemadministrator and the SAP NetWeaverSecurity Guide.

4.3.1 RFC Authorization Objects for Access Control

The information in this section applies only to the Access Control application.

The following table lists the authorization objects and values you must add to the RFC user to allow

Access Control to communicate with other SAP and non-SAP capabilities.

Object Description Authorization Field Value

S_RFC Authorization check forRFC Access

ACTVT 16

N/A RFC_NAME /GRCPI/*BAPTRFC1SDIFSDIFRUNTIME

SDTXSUSRSUUSSU_USER

SYSTSYSU

RFC_TYPE FUGR

4 Network and Communication Security

4.3 Communication Destinations

16 /98 PUBLIC 2012-06-18

Page 17: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 17/98

Object Description Authorization Field Value

S_TCODE Authorization check attransaction start

TCD SU01

S_TABU_DIS Table maintenance ACTVT 3

DICBERCLS &NC&SCSSZV&G

ZV&HZV&N 

S_GUI Authorization for GUIactivities

ACTVT *

S_USER_AGR Authorizations: rolecheck

ACTVT *

ACT_GROUP *

S_USER_AUT User Master Maintenance:Authorizations

ACTVT *

AUTH *

OBJECT *

S_USER_GRP User Master Maintenance:User Group

ACTVT *

CLASS *

S_USER_PRO User Master MaintenanceAuthorization Profile

ACTVT *

PROFILE *

S_USER_SAS User Master Maintenance:System-Specific

Assignments

ACTVT 0106

22

ACT_GROUP *

CLASS *

PROFILE *

SUBSYSTEM *

S_USER_SYS User Master Maintenance:

System for Central UserMaintenance

ACTVT 78

SUBSYSTEM *

S_USER_TCD Authorizations:transactions in roles

TCD *

S_USER_VAL Authorizations: filedvalues in roles AUTH_FIELD *AUTH_VALUE *

OBJECT *

S_DEVELOP ABAP Workbench ACTVT *

DEVCLASS SUSO

OBJNAME /GRCPI/*

OBJTYPE FUGR

P_GROUP *

S_ADDRESS1 Central addressmanagement

ACTVT 0102

03

4 Network and Communication Security

4.3 Communication Destinations

2012-06-18 PUBLIC 17 /98

Page 18: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 18/98

Object Description Authorization Field Value

06

ADGRP BC01

PLOG Personnel planning INFOTYP 10001001

ISTAT *

OTYPE *

PLVAR *

PPFCODE *

SUBTYP *

P_TCODE HR: Transaction code TCD SU01

4.4 Integration with Single Sign-On Environments

The information in this section applies to the access control, process control, and risk management

applications.

The process control and risk management applications support the Single Sign-On (SSO) mechanisms

provided by SAP NetWeaver Application Server ABAP. The security recommendations and guidelines

for user management and authentication described in the SAP NetWeaver Application Server Security

Guide also apply to process control and risk management.

The process control and risk management applications leverage the SAP NetWeaver ABAP Server andSAP NetWeaver Portal infrastructure, therefore they support the same SSO mechanisms.

Secure Network Communications (SNC)

For more information about SNC, see Secure Network Communications (SNC) in the SAP NetWeaver Application

Server Security Guide.

SAP Logon Tickets

For more information about SAP Logon Tickets, see SAP Logon Tickets in the SAP NetWeaver Application

Server Security Guide.

Client Certificates

For more information about X.509 Client Certificates, see Using X.509 Client Certificates on the SAP Help

Portal (http://help.sap.com).

4.5 Data Storage Security 

The information in this section applies to the access control, process control, and risk management

applications.

4 Network and Communication Security

4.4 Integration with Single Sign-On Environments

18 /98 PUBLIC 2012-06-18

Page 19: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 19/98

Master data and transaction data is stored in the database of the SAP system on which the application

is installed. Data storage occurs in Organizational Management, Case Management, and in separate

tables for this purpose.

In some applications, you can upload documents into the system. The default document management

system for storing data is the SAP Content Server and Knowledge Provider (KPro) infrastructure. Once

uploaded, the documents can be accessed using a URL. The application security functions govern

authorization for accessing the URL directly in the portal. To prevent unauthorized access to the

document through copying and sending the URL, a URL is only valid for a given user and for a restricted

amount of time (the default is two hours).

If you choose to implement a different document management system (DMS), the data storage security

issues are deferred to that particular DMS.

4.6 User Administration

The application user administration uses the mechanisms provided by SAP NetWeaver, such as user

types, tools, and the password concept.

User Types

You use user types to specify different security policies for different types of users. For example, your

policy may specify that individual users who perform tasks interactively have to change their passwords

on a regular basis, but not those users under which background processing jobs run.

The following user types are required for the process control and risk management applications:

■ Dialog users:

● Required for logging on to the SAP GUI and Web Dynpro

■ Communication users:

● Required for executing Automated Controls. (Process control application only)

● Required for KRI value extractions. (Risk management application only)

● Required for RFC connection to the BI system

This is a user on the target system. Configure this user according to the security requirementsof the target system.

● Required for RTAs. (Process control application only)

This is a user on the target system. Configure this user according to the security requirements

of the target system.

● A communication user (WF-BATCH) is required to run the workflow infrastructure.

User Administration Tools

The applications use SAP NetWeaver Application Server ABAP user and role maintenance. The

following lists the tools available to manage users:

4 Network and Communication Security

4.6 User Administration

2012-06-18 PUBLIC 19 /98

Page 20: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 20/98

 Tool Detailed Description

Transaction SU01 Use SU01 for ABAP user management: create and update users andassign authorizations.

Transaction PFCG (Profile Generator) Use PFCG for ABAP role maintenance and creating authorizationprofiles.

Customizing Use transaction SPRO to open Customizing. You can useCustomizing to configure and maintain the application.

SAP NetWeaver Portal This is the application front end. Most users can access the applicationthrough the portal.

SAP NetWeaver Business Client (NWBC) This is the application front end. Most users can access the application

through NWBC.

For more information, see Customizing for Governance, Risk, and Compliance and the respective

applications: Access Control, Process Control, and Risk Management.

4.7 Trace and Log Files

For information about trace and log files, see the SAP Access Control/Process Control/Risk Management 10.0 

Operations Guide at https://help.sap.com/grc  Solutions for Governance, Risk, and Compliance Process Control

SAP Process Control 3.0  .

You can also find the guide under SAP Risk Management 3.0 .

4.8 Configuring NW VSI in the Landscape

The access control, process control and risk management applications provide the ability to upload

documents. We recommend you scan all documents for potential malicious code before you upload

them. You can use the NetWeaver Virus Scan Interface (NW VSI) to scan the documents. For more

information, see SAP Virus Scan Interface in the SAP NetWeaver Library.

4 Network and Communication Security

4.7 Trace and Log Files

20 /98 PUBLIC 2012-06-18

Page 21: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 21/98

5 Application Security: PC and RM

The information in this section applies to SAP Process Control and SAP Risk Management.

This section explains the application authorizations model and concepts. The process control and risk

management applications leverage the standard SAP NetWeaver, SAP NetWeaver Application Server

ABAP, and SAP NetWeaver Portal user management and authorization. The security information for

SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver Portal also apply.

For information about SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver

Portal see the SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver Portal

security guides.

Prerequisites

You have knowledge of the following tools, terms, and concepts:

■ ABAP Application Server

● Customizing

● PFCG

● SU01

■ Portal

● User Administration

● Content Administration

● Portal Roles

■ Business Client

● Menu of PFCG roles

■ Application Specific Terms and Concepts

● Multiple Compliance Framework (Process Control only).

●Business User

● Regulations/Policy (Process Control only)

For more information about process control concepts and features, see the SAP Process Control 10.0 

Application Help at http://help.sap.com/grc. Click Solutions for Governance, Risk, and Compliance Process

Control SAP Process Control 10.0  .

For more information about risk management concepts and features, see the SAP Risk Management 10.0 

Application Help at http://help.sap.com/grc. Click Solutions for Governance, Risk, and Compliance Risk

Management SAP Risk Management 10.0  .

5 Application Security: PC and RM

2012-06-18 PUBLIC 21 /98

Page 22: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 22/98

5.1 Authorizations Overview 

A user's access to specific screens and menus on the front end is determined by the following:

■ The role type

■ The authorizations granted to the role type

■ The applications that are installed

Role Authorizations

SAP Process Control and SAP Risk Management leverage the SAP NetWeaver authorization model and

assign authorizations to users based on roles. SAP standard roles (PFCG basic roles) provide the standard

authorizations for the NetWeaver ABAP Server. Application roles (PFCG model roles) refine the

standard role authorizations and define a user's detailed authorizations. Portal roles provide user

authorizations for the SAP NetWeaver Portal.

The following table lists the applicable role types:

Front-end Screen and Menu Access Determined by Role Type

Work Center Portal role

Menu Group Application role

Menu Item Application role

 Application Authorizations

The following table lists examples of screens on the front end you see based on theapplications installed

on your system:

Item Application

My Home Work Inbox  All

My Home My Delegation Access Control Delegation SAP Access Control

My Home My Objects My iELCs SAP Process Control

My Home Ad Hoc Tasks Risk Proposals SAP Risk Management

For more information about the information architecture for the delivered screens and menus delivered

by SAP, see the Appendix .

Customizing User-specific Front-end Screens and MenusYou can configure user-specific front-end screens and menus in Customizing.

CAUTION

SAP does not recommend you customize the information architecture because if SAP provides

updates to the content, then such changes update the standard SAP delivered repository and

Launchpads; the changes do not directly update any customized versions.

You carry out the configuration activities in the Customizing activities Maintain Authorizations for 

Applications Links and Configure LaunchPad for Menus under Governance, Risk, and Compliance General Settings

Maintain Customer Specific Menus .

5 Application Security: PC and RM

5.1 Authorizations Overview

22 /98 PUBLIC 2012-06-18

Page 23: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 23/98

Entity–Level Authorizations

All the application entities are structured in hierarchy, providing top-down authorizations. Roles and

entities at a higher entity level have greater authorizations to perform tasks and greater access to the

application than roles at a lower entity level. The hierarchy also affects task assignments, work flows,and business event processing.

The following figure illustrates the Process Control and Risk Management entity hierarchies:

Figure 1:

Both applications share the corporate and organization objects. For Risk Management, activity is

optional.

5.1.1 Maintaining Authorizations (Risk Management)

The following is the procedure to define users, roles, and assign them to the risk management

authorization objects:

Figure 2:

5 Application Security: PC and RM

5.1 Authorizations Overview

2012-06-18 PUBLIC 23 /98

Page 24: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 24/98

1. In Customizing, define the roles, such as risk owner, activity owner, and so on. SAP provides a set

of sample roles for Risk Management, which include recommended authorizations. You can create

your own roles, or copy the sample roles to your customer namespace, and then modify them as

needed. The names of the delivered Risk Management roles begin with this naming convention:

SAP_GRC_RM_API*.

2. In Customizing, define which roles can be assigned to which GRC entities. For more information

about defining the possible assignment levels, see Customizing for Maintain Entity Role Assignment 

under Governance, Risk and Compliance General Settings Authorizations . For this activity SAP provides

a BC set referring to the example roles.

EXAMPLE

The Risk Owner role can be assigned to the risk level. Risk Management only allows role

assignment to organizations, activities, and risks.3. In the user interface, assign the users to the entity-assigned roles. You can maintain the roles on

the Roles tab under Master Data Organizations or Activities and Processes or Risks and Responses. You

can also maintain the roles centrally via the mass assignment tools Access Management Role Mass

Maintenance .

4. In Customizing, maintain the agent determination rules. This step is not necessary for the

authorization itself, but only to define how workflow or notification recipients are defined based

on the existing authorization setup. For more information about this Customizing activity, see

Customizing for Maintain Custom Agent Determination Rules under Governance, Risk and Compliance

General Settings Workflows . For this activity, SAP provides a BC set referring to the example roles.

5.1.2 Maintaining Authorizations (Process Control)

The figure lists the procedure to maintain authorizations for the process control application:

5 Application Security: PC and RM

5.1 Authorizations Overview

24 /98 PUBLIC 2012-06-18

Page 25: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 25/98

Figure 3:

1. Define PFCG roles such as Process Owner, Control Owner, and so on. SAP provides a set of sample

roles for Process Control, which include recommended authorizations. You can create your own

PFCG roles or copy the sample roles to your customer namespace, and then modify them as needed.For more information about the delivered roles for Process Control, see Application Roles (Process

Control).

2. Maintain first and second level authorization.

1. Maintain the Customizing activity Maintain Authorization Customizing under Governance, Risk and 

Compliance General Settings Authorizations .

2. Maintain the authorization levels as needed and save your work.

For more information, see First and Second Level Authorizations.

3. Assign relevant PFCG roles to Process Control entities. In this activity, you bind the PFCG roles to

specific Process Control entities.

1. Maintain the Customizing activity Maintain Entity Role Assignment under Governance, Risk and 

Compliance General Settings Authorizations .

2. Maintain the Entity ID and Roles as needed.

3. Save your work.

4. Define regulations. You configure new regulations in the Customizing activity Configure Compliance

Initiatives under Governance, Risk and Compliance Process Control Multiple-Compliance Framework . You

can create your own or use the sample regulations. For more information, see Configuring New

Compliance Initiatives.

5 Application Security: PC and RM

5.1 Authorizations Overview

2012-06-18 PUBLIC 25 /98

Page 26: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 26/98

5. Assign PFCG roles to Process Control regulation entities using the Customizing activity Maintain

Regulation Role Assignment under Governance, Risk and Compliance Process Control Authorizations .

Maintain the Entity ID, Role, and assignments as needed, and save your work.

6. Configure the agent (or recipient) of a workflow task in the Customizing activity Maintain Custom

Agent Determination Rules under Governance, Risk and Compliance General Settings Workflow . For more

information, see Workflow Recipient .

7. Maintain the portal configuration. You can use the delivered sample portal roles or create your

own. For more information, see Portal Roles.

8. In the Process Control user interface, you assign users to PFCG roles (created and configured in

Steps 1 through 7.) For more information, see the SAP Process Control 10.0 Application Help.

5.2 First-Level and Second-Level Authorizations

The information in this section applies to both the process control application and risk management

application.

This configuration flag determines the approach that is used to perform user-role assignments. The

default application authorization is First Level Authorization. You can choose to enable Second Level

Authorization in the IMG. For more information, see Configuring Second-Level Authorizations.

First-Level Authorizations

When first-level authorization is active, the pool of users assigned to the Business User role(SAP_GRC_FN_BUSINESS_USER) is the set of users available for any entity-user-role assignment.

Once a user is assigned to an entity-user-role, the user assigned to the specific entity inherits the

authorizations associated with the corresponding application role, as configured in PFCG.

EXAMPLE

The figure illustrates that all users are included in the pool of potential users for the subprocess

owner and control owner roles.

5 Application Security: PC and RM

5.2 First-Level and Second-Level Authorizations

26 /98 PUBLIC 2012-06-18

Page 27: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 27/98

Figure 4:

First Level Authorization Details

 AuthorizationsEntity Data

 Assignments Delegation

■ Business user role assignment

■ For all general users, this assignment is mandatory to access the

application.

User assignmentrestricted to

business users

Any business usercan be a delegate and

inherit data andauthorizations.

Second Level Authorizations

In second-level authorization, the pool of users available for a given entity-user-role assignment is

restricted to only those users who have that specific application role assigned to their user profile. This

allows the pool of business users to be segmented into different entity-user-role groups.

EXAMPLE

The following figure illustrates that, in Process Control, you can define that only users assigned

to the Subprocess Owner application role can be considered for subprocess entity-user-role

assignments. Similarly, in the risk management application, you can define that only users

assigned to the Opportunity Owner application role can be considered for opportunity entity-

user-role assignments.

5 Application Security: PC and RM

5.2 First-Level and Second-Level Authorizations

2012-06-18 PUBLIC 27 /98

Page 28: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 28/98

Figure 5:

Second-Level Authorization Details

 Authorizations Entity Data Assignments Delegation

■ Business user role assignment

■ Application role assignment is requiredUser assignment restricted tousers assigned to application

roles.

Any business user can be adelegate and inherit data and

authorizations.

5.2.1 Configuring Second-Level Authorizations

You can enable and disable Second-Level Authorizations in the Customizing activity Maintain

Authorization Customizing under Governance, Risk, and Compliance General Settings Authorizations .

NOTE

■ This setting is shared by both process control and risk management applications. Therefore,

if you are implementing both applications, maintaining the setting for one application affects

both applications.

This is a global setting and affects all application roles for your application.■ Second-Level Authorizations affect only entity-user-role assignments while the feature is

enabled. Entity-user-role assignments maintained prior to enabling Second-Level

Authorizations may lose authorizations to perform certain activities in the application if they

do not have the appropriate entity user-roles assigned. In this case, you must assign the

additional authorizations to the specific users.

5.3 Delivered Roles

The process control and risk management applications use the following role types:

5 Application Security: PC and RM

5.3 Delivered Roles

28 /98 PUBLIC 2012-06-18

Page 29: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 29/98

■ SAP standard roles

■ Application roles

■ Portal roles

■ Automated rule roles (Process Control only)

Automated rule roles grant the technical authority to perform SAP NetWeaver ABAP Server job

execution, such as submitting the jobs and retrieving job results data from the connected ERP

system for automated jobs.

5.3.1 Application Roles (Process Control)

The information in this section applies only to the process control application. The delivered application

roles are examples. You can copy them or create your own.

NOTE

SAP provides a BC Set for the role assignment customizing. If you choose to update the role

assignment, do not assign the same role to multiple regulations.

Cross Regulation Roles

The following are the delivered application roles:

Role Role ID Entity Level Assigned by

Organization Admin SAP_GRC_SPC_GLOBAL_ORG_ADMIN 

Corporate System Admin

Organization Owner SAP_GRC_SPC_GLOBAL_ORG_OWN ER

Organization Organization Admin

Process and ControlAdmin

SAP_GRC_SPC_GLOBAL_PRC_ADMIN 

Corporate System Admin

Regulation and Policy

Admin

SAP_GRC_SPC_GLOBAL_REG_ADMI

Corporate System Admin

Question and SurveyAdmin

SAP_GRC_SPC_GLOBAL_SRV_ADMIN 

Corporate System Admin

Test Plan Admin SAP_GRC_SPC_GLOBAL_TPL_ADMI

Corporate System Admin

Automated ControlAdmin

SAP_GRC_SPC_GLOBAL_AUT_ADMIN 

Corporate System Admin

CEO/CFO SAP_GRC_SPC_GLOBAL_CEO_CFO Corporate Organization Admin

Internal Auditor SAP_GRC_SPC_GLOBAL_INT_AUD Corporate Organization Admin

Certification Admin SAP_GRC_SPC_SOX_SIG_ADMIN Corporate Power User

CAPA Plan Approver SAP_GRC_SPC_FDA_CAPA_PLAN_APPR

Corporate/ Organization

Power User

CAPA Execution

Approver

SAP_GRC_SPC_FDA_CAPA_EXEC_A

PPR

Corporate/ 

Organization

Power User

Policy Admin SAP_GRC_SPC_CRS_PLC_ADMIN Corporate System Admin

5 Application Security: PC and RM

5.3 Delivered Roles

2012-06-18 PUBLIC 29 /98

Page 30: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 30/98

Role Role ID Entity Level Assigned by

Policy Manager SAP_GRC_SPC_CRS_PLC_MANAGER Organization System Admin

Policy Owner SAP_GRC_SPC_CRS_POLICY_OWNER

Policy Policy Admin

Policy Approver SAP_GRC_SPC_CRS_PLC_APPR Policy Policy Admin

Policy Reviewer SAP_GRC_SPC_CRS_PLC_REVIEW Policy Policy Admin

Policy Viewer SAP_GRC_SPC_CRS_PLC_DISPLAY Policy Policy Admin

Ad Hoc Issue Admin SAP_GRC_SPC_CRS_ISSUE_ADMIN Corporate System Admin

Ad Hoc Issue Processor SAP_GRC_FN_ADISSUE_PROCESS G_AI System Admin

NOTE

You assign thisrole to users to

allow them to

process ad hocissues. In thefront-end, there

is no need toassign this role tousers via massrole assignment.

Continuous

Monitoring DataSource Specialist

SAP_GRC_SPC_CRS_CM_DS_SPEC Corporate System Admin

Continuous

Monitoring BusinessRule Specialist

SAP_GRC_SPC_CRS_CM_BR_SPEC Corporate System Admin

Continuous

Monitoring JobSpecialist

SAP_GRC_SPC_CRS_CM_JOB_SPEC Corporate System Admin

Cross RegulationInternal ControlManager

SAP_GRC_SPC_CRS_ICMAN Corporate System Admin

Cross Regulation

Organization Owner

SAP_GRC_SPC_GLOBAL_ORG_OWN 

ER

Organization Cross Regulation

Internal Control

MangerCross RegulationOrganization Tester

SAP_GRC_SPC_CRS_ORG_TESTER Organization Cross RegulationInternal ControlManger

Cross RegulationProcess Owner

SAP_GRC_SPC_CRS_PRC_OWNER Process Cross RegulationInternal Control

Manger

Cross RegulationSubprocess Owner

SAP_GRC_SPC_CRS_SPR_OWNER Subprocess Cross RegulationInternal ControlManger

5 Application Security: PC and RM

5.3 Delivered Roles

30 /98 PUBLIC 2012-06-18

Page 31: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 31/98

Role Role ID Entity Level Assigned by

Cross RegulationControl Owner

SAP_GRC_SPC_CRS_CTL_OWNER Control Cross RegulationInternal ControlManger

Cross RegulationControl Tester

SAP_GRC_SPC_CRS_PRC_TESTER Control Cross RegulationInternal Control

Manger

The delivered Cross Regulation roles have the following attributes:

■ They are assigned the Portal role GRC Suite.

■ They are assigned to the GRC work centers.

■ They are assigned through the Access Management work center.

■ They require the following standard roles:

● SAP_GRC_FN_BASE

● SAP_GRC_FN_BUSINESS_USER

NOTE

The role SAP_GRC_FN_ADISSUE_PROCESS grants the authority to process ad hoc issues. You

do not need to assign this role to a user. The authorization is assigned through the application's

code logic, and the user who is assigned as the issue owner is automatically granted this

authorization. You must ensure the role profile is activated.

SOX Regulation Application Roles

The following are the delivered application roles for the SOX regulation:

Role Role ID Entity Level Assigned by

SOX Internal Control

Manager

SAP_GRC_SPC_SOX_ICMAN Corporate Regulation/Policy

Admin

SOX Subprocess Owner SAP_GRC_SPC_SOX_SPR_OWN ER

Subprocess SOX Internal ControlManager

SOX Control Owner SAP_GRC_SPC_SOX_CTL_OWN ER

Control SOX Internal ControlManager

SOX OrganizationOwner

SAP_GRC_SPC_REG_ORG_OWNER_1

Organization SOX Internal ControlManager

SOX Control Tester SAP_GRC_SPC_SOX_PRC_TESTER

Control SOX Internal ControlManager

SOX Organization Tester SAP_GRC_SPC_SOX_ORG_TEST

ER

Organization SOX Internal Control

Manager

SOX Automated RuleSpecialist

SAP_GRC_SPC_SOX_AUT_SPECIALIST

Corporate SOX Internal ControlManager

The delivered SOX application roles have the following attributes:

■ They are assigned by the SOX Internal Control Manager.

5 Application Security: PC and RM

5.3 Delivered Roles

2012-06-18 PUBLIC 31 /98

Page 32: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 32/98

■ They require the following standard roles:

● SAP_GRC_FN_BASE

● SAP_GRC_FN_BUSINESS_USER

● They require the portal role: GRC Suite.

FDA Regulation Application Roles

The following are the delivered application roles for the FDA regulation:

Role Role ID Entity Level Assigned by

FDA Internal ControlManager

SAP_GRC_SPC_FDA_ICMAN Corporate Regulation/Policy Admin

FDA Subprocess Owner SAP_GRC_SPC_FDA_SPR_OWNER

Subprocess FDA Internal ControlManager

FDA Control Owner SAP_GRC_SPC_FDA_CTL_O

WNER

Control FDA Internal Control

Manager

FDA Control Tester SAP_GRC_SPC_FDA_PRC_TESTER

Control FDA Internal ControlManager

FDA Organization Owner SAP_GRC_SPC_REG_ORG_OWNER_2

Organization FDA Internal ControlManager

FDA Organization Tester SAP_GRC_SPC_FDA_ORG_TESTER

Organization FDA Internal ControlManager

FDA Automated Rule

Specialist

SAP_GRC_SPC_FDA_AUT_S

PECIALIST

Corporate FDA Internal Control

Manager

The delivered FDA application roles have the following attributes:

■ They are assigned by the FDA Internal Control Manager.

■ They require the following standard roles:

● SAP_GRC_FN_BASE

● SAP_GRC_FN_BUSINESS_USER

● They require the portal role: GRC Suite

5.3.2 Application Roles (Risk Management)The information in this section applies only to the risk management application. The delivered

application roles are example roles. You can use them as is, copy them, or create your own.

The risk management application roles have the following attributes:

Role Entity Level Assigned by

Activity Owner Activity, Corporate Unit Risk Manager

Central Risk Manager Corporate, Organization Power User

CEO/CFO Corporate, Organization Central Risk Manager

Enhancement Plan Owner Enhancement Plan Response Owner

Incident Editor Incident Unit Risk Manager

5 Application Security: PC and RM

5.3 Delivered Roles

32 /98 PUBLIC 2012-06-18

Page 33: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 33/98

Role Entity Level Assigned by

Internal Auditor Corporate, Organization Central Risk Manager

Opportunity Owner Opportunity? Unit Risk Manager

Organization Owner Corporate, Organization Central Risk ManagerResponse Owner Response Plan Risk Owner

Risk Owner Risk Unit Risk Manager

System Administrator Corporate Central Risk Manager

Unit Risk Manager Corporate, Organization Central Risk Manager

■ They are assigned through the User Access work set.

■ They require the following standard roles:

● SAP_GRC_FN_BASE

● SAP_GRC_FN_BUSINESS_USER■ They require the portal role: GRC Risk Management.

5.3.3 Authorization Objects

The application roles are composed of the following authorization objects:

■ GRFN_API

This is the most utilized authorization object. It controls access to the master data objects and

drives the user authorizations for the business entities. It includes the following elements: activity,entity, subentity, and datapart.

■ GRFN_REP

This authorization object controls the access to retrieve data for reports. It has the elements:

Activity and Report Name.

■ GRFN_CONN 

This authorization object is used to run automated rules testing or monitoring on other systems.

It grants Remote Function Call authority to the user. To assign this authorization to users, use

transaction SU01 in the back-end system to create a new role, add the authorization object to the

role, and assign the role to users.

For more information about the possible element values, see Authorization Object Elements in the

Appendix .

5.3.4 Portal Roles

This section provides information about the delivered portal roles for the process control and risk

management applications. The delivered portal roles are sample portal roles. You can use them as

delivered, copy them, or create your own.

5 Application Security: PC and RM

5.3 Delivered Roles

2012-06-18 PUBLIC 33 /98

Page 34: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 34/98

For information about the BOE portal roles, see the BusinessObjects Enterprise XI 3.1 Publisher's Guide and

BusinessObjects XI Integration for SAP Installation Guide.

Process Control Portal RolesThe process control application has two delivered portal roles:

■ GRC_Suite. This portal role must be assigned to all Process Control users.

■ GRC Internal Audit Management. Assign this role to the user for Internal Audit Management

processing. To use this role, the user must be also be assigned the GRC_Suite role and the user

group must be assigned the ERP COMMON role.

Risk Management Portal Roles

The risk management application has one delivered portal role: COM.SAP.GRC.RM.Role_All (GRC

Risk Management).

5.3.5 Continuous Monitoring Roles (Process Control)

The information in this section applies to only the process control application.

This information covers the role authorizations required for Continuous Monitoring:

■ Cross Regulation Data Source Specialist

The user with this role can create and maintain the data sources. Assign the user the role

SAP_GRC_FN_BUSINESS_USER using transaction SU01 in the process control back-end system.

■ Cross Regulation Business Rule Specialist

The user with this role can create and maintain business rules. Assign the user the

SAP_GRC_FN_BUSINESS_USER role in using transaction SU01 in the process control back-end

system.

■ Cross Regulation Job Specialist

The user with this role can create jobs in Monitoring Scheduler and monitor job status in Job

Monitor. Assign the user the following roles in transaction SU01 in the process control back-end

system:

●SAP_GRC_FN_BUSINESS_USER, which grants basic access to the application

● SAP_GRC_SPC_SCHEDULER, which grants the authority to run background jobs

To allow the user the authorization to execute SoD jobs, you must also assign the

SAP_GRAC_RISK_ANALYSISrole, which grants the authority to run SoD jobs.

NOTE

The role is delivered with AC, therefore, SoD jobs can only be run in the system where AC

is also activated.

■ Internal Control Manager/Process Owner/Subprocess Owner/Control Owner

These users can access the Job Monitor and Event Queue Log to view the results. This role needs

the PFCG standard role (SAP_GRC_FN_BUSINESS_USER assigned.

5 Application Security: PC and RM

5.3 Delivered Roles

34 /98 PUBLIC 2012-06-18

Page 35: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 35/98

■ Z_GRFN_CONN 

This role is not delivered; you must create it. Assign the role to the connector for automated

control testing and monitoring. Assign the role to users and application roles that require

authorization to view the job results of automated control testing and monitoring. The user can

only view results of information for the specific connector. The role uses the authorization object

GRFN_CONN.

5.3.6 Internal Audit Management Roles (Process Control)

The information in this section applies only to the Internal Audit Management (IAM) Roles for the

Process Control application.

Standard delivered business user roles for IAM include audit director, audit manager, audit lead, andthe audit transfer role for transferring audit planning entities to SAP NetWeaver Audit Management..

The following tables lists the authorization fields and values that are available for each authorization

object in the delivered role:

GRC Internal Audit Management — Audit Director (SAP_GRC_IAM_AUD_DIR)

 AuthorizationObject Field

FieldDescription Value

 ValueDescription

Auditable

Entity(GRFN_AE)

ACTVT Activity 01 Create

ACTVT Activity 02 Change

(The Name field cannot be modified.)

ACTVT Activity 03 Display

ACTVT Activity 06 Delete

Audit RiskRating(GRFN_ARR)

ACTVT Activity 01 Create, Copy

ACTVT Activity 02 Change(The Name field cannot be modified.)

ACTVT Activity 03 Display

ACTVT Activity 06 Delete

Audit Proposal(GRFN_AP)

ACTVT Activity 01 Create

ACTVT Activity 02 Change

(The Name field cannot be modified.)ACTVT Activity 03 Display

ACTVT Activity 06 Delete

ACTVT Activity 50 Transfer

ACTVT Activity 64 Generate

Audit Plan

Proposal(GRFN_APP)

ACTVT Activity 01 Create

ACTVT Activity 02 Change

(The Responsible Person can modify the audit plan proposal.The Name or Responsible Person fields cannot be modified.)

ACTVT Activity 03 Display

ACTVT Activity 06 Delete

5 Application Security: PC and RM

5.3 Delivered Roles

2012-06-18 PUBLIC 35 /98

Page 36: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 36/98

 AuthorizationObject Field

FieldDescription Value

 ValueDescription

ACTVT Activity 50 Transfer

ACTVT Activity 64 Generate

IAM Reports(GRFN_REP)

ACTVT Activity 71 Analyze

ACTVT Activity 80 Print

ACTVT Activity * All Values

GRC Internal Audit Management — Audit Manager (SAP_GRC_IAM_AUD_MGR)

 AuthorizationObject Field

FieldDescription Value

 ValueDescription

Auditable Entity(GRFN_AE)

ACTVT Activity 01 Create

ACTVT Activity 02 Change

(The Name field cannot be modified.)

ACTVT Activity 03 Display

ACTVT Activity 06 Delete

Audit Risk Rating(GRFN_ARR)

ACTVT Activity 02 Change(The Responsible Person can modify the audit risk rating.

The Name and Responsible Person fields cannot be

modified.)

ACTVT Activity 03 Display

Audit Proposal(GRFN_AP)

ACTVT Activity 01 Create

ACTVT Activity 02 Change

(The Name field cannot be modified.)

ACTVT Activity 03 Display

ACTVT Activity 06 Delete

ACTVT Activity 50 Transfer

ACTVT Activity 64 Generate

Audit Plan

Proposal(GRFN_APP)

ACTVT Activity 02 Change

(The Responsible Person can modify the audit planproposal. The Name or Responsible Person fields cannot be

modified.)

ACTVT Activity 03 Display

ACTVT Activity 50 Transfer

ACTVT Activity 64 Generate

Ad HocIssues(GRFN_AUDIS)

ACTVT Activity 01 Create

IAM Reports(GRFN_REP)

ACTVT Activity 71 Analyze

ACTVT Activity 80 Print

ACTVT Activity * All Values

GRC Internal Audit Management — Audit Lead (SAP_GRC_IAM_AUD_LEAD)

5 Application Security: PC and RM

5.3 Delivered Roles

36 /98 PUBLIC 2012-06-18

Page 37: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 37/98

 AuthorizationObject Field

FieldDescription Value

 ValueDescription

AuditableEntity

(GRFN_AE)

ACTVT Activity 03 Display

Audit Risk

Rating(GRFN_ARR)

ACTVT Activity 03 Display

AuditProposal(GRFN_AP)

ACTVT Activity 02 Change(The Responsible Person can modify the audit proposal. The

Name and Responsible Person fields cannot be modified.)

ACTVT Activity 03 Display

Audit PlanProposal(GRFN_APP)

ACTVT Activity 03 Display

IAM Reports(GRFN_REP)

ACTVT Activity 71 Analyze

ACTVT Activity 80 Print

ACTVT Activity * All Values

GRC Internal Audit Management — Audit Transfer (SAP_GRC_IAM_TRANSFER)

You use this PFCG role to transfer audit planning entities to SAP NetWeaver Audit Management.

NOTE

In the audit transfer role you can create, edit, and change audit plans and audits in SAP NetWeaver

Audit Management.

 AuthorizationObject Field

FieldDescription Value

 ValueDescription

AuditTransfer(AUDIT_AUTH)

AUDITACTVT Activities forAuthorization

1001 Creating an Audit Plan

AUDITACTVT Activities for

Authorization

1002 Changing an Audit Plan

AUDITACTVT Activities forAuthorization

3001 Creating an Investigation (Audit)

AUDITACTVT Activities forAuthorization

3002 Changing an Investigation (Audit)

AUDITACTVT Activities forAuthorization

3003 Displaying an Investigation(Audit)

Audit Plan

Proposal(GRFN_APP)

AUDIT_TYPE Audit Type * All Values

IAM Reports(GRFN_REP)

AUD_AUTHGR AuthorizationGroup

* All Values

5 Application Security: PC and RM

5.3 Delivered Roles

2012-06-18 PUBLIC 37 /98

Page 38: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 38/98

For more information about SAP NetWeaver Audit Management roles see Accessing Audit Management at

http://help.sap.com/saphelp_nw70Ehp1/helpdata/en/7d/1fa841c0dada34e10000000a1550b0/

frameset.htm.

5.4 Workflow Recipient

The applications determine the agent (or recipient) of a workflow task based on the mapping of business

events and roles. You can override the default configuration and maintain your own agent

determination rule in the Customizing. Carry out the activities in the Customizing activity Maintain

Custom Agent Determination Rules under Governance, Risk, and Compliance General Settings Workflow

In the Customized Business Events table, you configure rules for determining the recipient of a workflow

task by customizing the business events, sort, roles, entities, and subentities.

5.4.1 Maintaining Workflow Recipient Rules

The following is an overview for maintaining the workflow recipient rules:

■ The value of the sort number has no numerical significance. It is only for grouping. The following

figure illustrates that the Perform Assessment business event for SOX Control Owner is in the

same group as the SOX Subprocess Owner.

Figure 6:

■ The business event processing starts with the lowest entity-level role and proceeds upwards. In the

following example, control owner is lower than subprocess owner in the entity-level hierarchy,therefore it is processed first.

Figure 7:

■ Entity and subentity are optional. You can leave them empty. You only need to include them

in special cases to differentiate the business events. In the following example, Perform Signoff and

5 Application Security: PC and RM

5.4 Workflow Recipient

38 /98 PUBLIC 2012-06-18

Page 39: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 39/98

Perform AOD do not need entities or subentities because the task can only be performed in one

way. Perform Assessment is differentiated so that control owner performs control design

assessment (CD) and subprocess owner performs process design assessment (PD).

Figure 8:

■ For all business events (except for Incident_Validate and Master_Data_Change_Notify), the

application processes the business events on the basis of first group found. In the following

example, the application processes the first group found (Sort 1) for the Perf_Assessment business

event and stops.

Figure 9:

■ The Incident_Validate business event is processed in serial for All Groups Found. The followingexample illustrates that the application first processes the sort 8 group, then the sort 9 group.

Figure 10:

■ The MasterData_Change_Notification business event is processed in parallel for All Groups

Found, The following example illustrates the notification is sent to the control owner, SOX

internal control manager, and FDA internal control manager concurrently.

Figure 11:

■ You can specify a backup role to receive the workflow task by placing different roles in the same

sort group with the same business event. The following example illustrates that, because the control

5 Application Security: PC and RM

5.4 Workflow Recipient

2012-06-18 PUBLIC 39 /98

Page 40: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 40/98

owner role is lower in the entity hierarchy, it is processed first. However, if there is no user assigned

to that role, the task is assigned to the subprocess owner.

Figure 12:

■ These business events must be configured as follows:

● 0PC_RECE_ISSUE

When the subentity is CO or MO, enter the entity as G_IS. For other all other subentities,

enter the entity as G_AS.

● 0PC_RECE_REM_PLAN 

Enter the entity as G_IS (issue); the entity of the remediation plan creator.

● 0PC_PERF_SIGNOFF and 0PC_PERF_AOD

Enter the entity as ORGUNIT, not SIGNOFF.

More Information

SAP Delivered Business Events in Appendix A: PC and RM 

5.5 Ticket Based AuthorizationsThe information in this section applies to both the process control application and risk management

application.

Most users have the appropriate authorizations to complete their assigned work item. However, in

some cases, it is required to pass on a work item to a user who does not typically have these required

authorizations. Ticket Based Authorizations provides temporary authorizations to the user to enable

them to complete the assigned work item. Once the work item has been completed, or reassigned to

another user, the ticket expires for this user.

NOTE

The delivered ticket based authorizations cannot be modified. Further, the functionality is

transparent to the user. This information is provided for explanatory purposes only.

Users Who May Need Ticket Based Authorizations

■ Process control users:

● Assessment Performer

● Assessment Reviewer

● Effectiveness Tester

● Test Reviewer

5 Application Security: PC and RM

5.5 Ticket Based Authorizations

40 /98 PUBLIC 2012-06-18

Page 41: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 41/98

● Issue Owner

● Remediation Owner

● Any user who needs to assign a workflow task to substitution or to the next processor.

■ Risk management users:

● Risk survey performer

● Activity survey performer

● KRI survey performer

 Time Related Aspects

■ Once a user starts to perform the task from the work inbox, the authorization is given to the user.

■ The authorization is temporary. A user who no longer holds the ticket is no longer authorized to

perform the task.

■ The authorization expires when the task is submitted. If the time has passed beyond the task due

date, but the user has not submitted the task, the authorization remains active.

■ The authorization is subject to the SAP Business Workflow escalation functionality.

5.6 Standard Authorization Objects Relevant to Security 

The information in this section applies to both the process control application and risk management

application.

You must maintain the process control and risk management application authorizations for applicationserver objects:

■ Personnel Planning (PLOG) from Organizational Management:

The general object type Organization (orgunit) is used in the process control and risk

management applications.

NOTE

Organizations created in other projects are also available in the process control and risk

management applications, and organizations created in Process Control and Risk

Management are available in other projects.

■ Case Management and Records Management:

The process control assessments, tests, issues, and remediation plans are stored in Case or Records

Management. The RMS ID for the process control application is GRPC_PC.

The risk management analysis, responses, and surveys are stored in Case or Records Management.

The RMS ID for the risk management application is GRRM_RM.

5 Application Security: PC and RM

5.6 Standard Authorization Objects Relevant to Security

2012-06-18 PUBLIC 41 /98

Page 42: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 42/98

 This page is left blank for documents that are printed on both sides.

Page 43: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 43/98

6 Application Security: AC

The information in this section applies to only SAP Access Control.

This section explains the application authorizations model and concepts. The process control and risk

management applications leverage the standard SAP NetWeaver, SAP NetWeaver Application Server

ABAP, and SAP NetWeaver Portal user management and authorization. The security information for

SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver Portal also apply.

For information about SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver

Portal see the SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver Portal

security guides.

Prerequisites

You have knowledge of the following tools, terms, and concepts:

■ ABAP Application Server

● Customizing

● PFCG

● SU01

■ Portal

● User Administration

● Content Administration

● Portal Roles

■ Business Client

● Menu of PFCG roles

For more information about access control concepts and features, see the SAP Access Control 10.0 

Application Help at http://help.sap.com/grc. Click Solutions for Governance, Risk, and Compliance Access

Control SAP Access Control 10.0  .

6.1 Authorizations Overview 

A user's access to specific screens and menus on the front end is determined by the following:

■ The applications that are installed

■ The role type

■ The authorizations granted to the role type

6 Application Security: AC

6.1 Authorizations Overview

2012-06-18 PUBLIC 43 /98

Page 44: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 44/98

 Application Authorizations

The following table lists examples of screens on the front end you see based on theapplications installed

on your system:

Item Application

My Home Work Inbox  All

My Home My Delegation Access Control Delegation SAP Access Control

My Home My Objects My iELCs SAP Process Control

My Home Ad Hoc Tasks Risk Proposals SAP Risk Management

For more information about the information architecture for the delivered screens and menus delivered

by SAP, see the Appendix .

Customizing User-specific Front-end Screens and MenusYou can configure user-specific front-end screens and menus in Customizing.

CAUTION

SAP does not recommend you customize the information architecture because if SAP provides

updates to the content, then such changes update the standard SAP delivered repository and

Launchpads; the changes do not directly update any customized versions.

You carry out the configuration activities in the Customizing activities Maintain Authorizations for 

Applications Links and Configure LaunchPad for Menus under Governance, Risk, and Compliance General Settings

Maintain Customer Specific Menus .

Maintaining Authorizations

The access control application uses object level authorizations. Authorizations are granted to users

based on the authorizations of specific roles and the authorization objects assigned to those roles. To

maintain the authorizations, you use PFCG and the information in this guide about the delivered roles

and authorization objects.

SAP provides a set of sample roles for Access Control, which include recommended authorizations.

You can create your own PFCG roles or copy the sample roles to your customer namespace, and thenmodify them as needed.

6.1.1 Delivered Roles

AC leverages the SAP NetWeaver authorization model and assigns authorizations to users based on

roles.

The following table lists the roles provided by the application and their descriptions:

Feature Role Name Description

All AC SAP_GRAC_ALL Super administrator for Access Control.

6 Application Security: AC

6.1 Authorizations Overview

44 /98 PUBLIC 2012-06-18

Page 45: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 45/98

Feature Role Name Description

NOTE

You must assign this role to the WF-BATCH user.

All AC SAP_GRAC_BASE Gives basic authorizations required for allAC users. You must assign this role to allAC users.

All AC SAP_GRAC_REPORTS Ability to run all AC reports and have the

display access for all drill-downs.

All AC SAP_GRAC_NWBC Gives the authorizations to launchNWBC. You must assign this role to allAC users.

All AC SAP_GRAC_SETUP Gives authorizations to set up andcustomize AC.

All AC SAP_GRAC_DISPLAY_ALL Gives display-only access to all masterdata and application data.

Role management SAP_GRAC_ROLE_MGMT_USER Role management business user

Role management SAP_GRAC_ROLE_MGMT_DESIGNER Role management designer

Role management SAP_GRAC_ROLE_MGMT_ROLE_OWNE

R

The Role Management role owner

Access request SAP_GRAC_ACCESS_REQUESTER The role for the access request end user

Access request SAP_GRAC_ACCESS_APPROVER The role for the access request approver

Access request SAP_GRAC_ACCESS_REQUEST_ADMIN The role for the access requestadministrator

Emergency Access

management

SAP_GRAC_SUPER_USER_MGMT_ADMIN 

Emergency Access managementadministrator

Emergency Access

management

SAP_GRAC_SUPER_USER_MGMT_OWN ER

Emergency Access management owner

Emergency Access

management

SAP_GRAC_SUPER_USER_MGMT_CNTL

R

Emergency Access management

controller

Emergency Access

management

SAP_GRAC_SUPER_USER_MGMT_USER Emergency Access managementfirefighter

Access risk analysis SAP_GRAC_RULE_SETUP This role has the authorization to defineaccess rules

Access risk analysis SAP_GRAC_RISK_ANALYSIS This role has the authorization toperform access risk analysis

Access risk analysis SAP_GRAC_ALERTS This role has the authorization togenerate, clear and delete access risk alerts

Access risk analysis SAP_GRAC_CONTROL_OWNER This role has the authorization to create

mitigating controls.

Access risk analysis SAP_GRAC_RISK_OWNER This role has the authorization to runaccess risk maintenance and access riskanalysis.

Access risk analysis SAP_GRAC_CONTROL_MONITOR This role has the authorization to run risk

analysis, mitigating control assignment,

6 Application Security: AC

6.1 Authorizations Overview

2012-06-18 PUBLIC 45 /98

Page 46: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 46/98

Feature Role Name Description

and assign mitigating controls to an accessrisk.

Access risk analysis SAP_GRAC_CONTROL_APPROVER This role is used for control and controlassignments. It has the authorization to

run risk analysis, mitigating controlassignment, and workflow approval foraccess risk alerts.

Access risk analysis SAP_GRAC_FUNCTION_APPROVER This role is the delivered agent forworkflow in access control. It has

authorization to approve, create, read,update, and delete workflow requests.

Workflow SAP_GRC_MSMP_WF_ADMIN_ALL Administrator role for MSMP workflows

Workflow SAP_GRC_MSMP_WF_CONFIG_ALL Configurator role for MSMP workflows

6.1.2 Authorization Object Names

Access Control authorizations for roles are maintained by the assignment of specific authorization

objects.

The table lists the authorization objects delivered with the application:

Object Description

1 GRAC_ALERT The GRAC_ALERT object allows you to generate, clean up, and create alerts.

2 GRAC_ASIGN The object allows you to assign owner types to firefighter IDs.

3 GRAC_BPROC The object allows you to create, read, update, and delete business processes,and to assign business processes to risks and functions.

4 GRAC_BGJOB The object allows you to execute background jobs.

5 GRAC_CPROF The object allows you to create, read, update, and delete SoD critical profiles.

6 GRAC_CROLE The object allows you to create, read, update, and delete SoD critical roles.

7 GRAC_EMPLY The object allows you to restrict activities based on the following attributes:cost center, department, company, location.You use this object to maintain authorization for attributes not in the in the

GRAC_USER object.

8 GRAC_FFOBJ The object allows you to restrict creation of FFID or FFROLE based on systemuser ID, system, or activity.

9 GRAC_FFOWN The object allows you to create, read, update, and delete FFID owners basedon the owner type, user ID, or system ID.

10 GRAC_FUNC The object allows you to maintain authorizations for the SoD function basedon the following attributes: activity, function ID, action (SOD transaction),

and permission.

11 GRAC_HROBJ The object allows you to restrict activities for the HR object based on specificattributes: activity, connector ID, HR object type, HR object ID.

12 GRAC_MITC The object allows you to maintain mitigation controls.

13 GRAC_ORGRL The object allows you to maintain SoD organization rules.

14 GRAC_OUNIT The object allows you to maintain org units for access control.

6 Application Security: AC

6.1 Authorizations Overview

46 /98 PUBLIC 2012-06-18

Page 47: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 47/98

Object Description

15 GRAC_OWNER The object allows you to maintain owners in access control.

16 GRAC_PROF The object allows you to maintain the SoD profile.

17 GRAC_RA The object allows you to perform risk analysis. You can specify if the user hasauthorizations to only execute risk analysis, or has administrator rights.

18 GRAC_RCODE The object allows you to maintain the reason code.

19 GRAC_REP The object allows you to excute all reports.

20 GRAC_REQ The object allows you to maintain access requests.

21 GRAC_RISK The object allows you to maintain SoD access risk.

22 GRAC_RLMM The object allows you to perform role mass maintenance.

23 GRAC_ROLED The object allows you to create, read, update, and delete roles.

24 GRAC_ROLEP The object allows you to restrict who can provision users based on attributes.

25 GRAC_ROLER This object allows you to perform role risk analysis.

26 GRAC_RSET The object allows you to create, read, update, and delete SoD rule sets.

27 GRAC_SUPP The object allows you to create, read, update, and delete SoD supplementaryrules.

28 GRAC_SYS The object allows you authorize access to specific connectors or systems basedon application type and system ID.

29 GRAC_USER The object allows you to restrict activities based on the following attributes:user group, user ID, connector, user group, orgunit.

30 GRFN_CONN This object allows you to access connectors in CCITS (the GRC integrationengine).

6 Application Security: AC

6.1 Authorizations Overview

2012-06-18 PUBLIC 47 /98

Page 48: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 48/98

 This page is left blank for documents that are printed on both sides.

Page 49: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 49/98

7 Security for Content Life-CycleManagement

The information in this section about Content Life-Cycle Management (CLM) applies only to SAP

Process Control 10.0 and SAP Risk Management 10.0.

7.1 IntroductionContent Lifecycle Management (CLM) is a tool that supports distribution of application content across

different systems. Given that application content is replicated and detached from its source, security

considerations specific to CLM could apply.

Since CLM can be configured to connect to applications from which the content originates (managed

applications) in a remote manner, it is necessary to secure these communication channels.

When using CLM, you need to be sure that your data and processes support your business needs without

allowing unauthorized access to critical information. User errors, negligence, or attempted

manipulation on your system must not result in loss of information or processing time.

This section contains information about the virus scanning feature of CLM.

Fundamental Security Guides

CLM is built with SAP NetWeaver components. Therefore, the SAP NetWeaver security guide also

applies to CLM. Pay particular attention to the Most-Relevant Sections or Specific Restrictions as indicated in

the table.

Scenario, Application, or Component Security GuideMost-Relevant Sectionsor Specific Restrictions

SAP NetWeaver Application Server ABAP Security Guide on SAP Help Portal at

http://help.sap.com SAP NetWeaver 

AS ABAP

AuthorizationConcept

Identity management information on SAP Help Portal at http://help.sap.com

SAP NetWeaver 

User and RoleAdministration of ASABAP

User authentication and single sign-on information on SAP Help Portal at http://

help.sap.com SAP NetWeaver 

Authentication on theAS ABAP

RFC/ICF Security Guide on SAP Help Portal at http://help.sap.com SAP 

NetWeaver 

-

SAP NetWeaver Security Guide on SAP Help Portal at http://help.sap.com SAP 

NetWeaver 

Secure NetworkCommunications

(SNC)

7 Security for Content Life-Cycle Management

7.1 Introduction

2012-06-18 PUBLIC 49 /98

Page 50: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 50/98

Scenario, Application, or Component Security GuideMost-Relevant Sectionsor Specific Restrictions

SAP NetWeaver documentation on SAP Help Portal at http://help.sap.com SAP 

NetWeaver 

ABAP Programmingand Runtime

Environment (BC-ABA)

Security Guides for Connectivity and Interoperability Technologies on SAP Help Portalat http://help.sap.com SAP NetWeaver 

-

SAP NetWeaver documentation on SAP Help Portal at http://help.sap.com SAP 

NetWeaver 

Network andTransport Layer

Security

Important SAP Notes

These SAP Notes contain the most recent information about CLM, as well as corrections to the

documentation. Make sure that you have the up-to-date version of each SAP Note, which you can findon SAP Service Marketplace at http://service.sap.com/notes.

SAP Note Title Comment

1501945 Secure Configuration SAP NW This note contains information about how the NetWeaver platformcan be configured securely.

In addition, you can look at SAP Notes for application area XAP-SBC-CLM.

7.2 Technical System LandscapeCLM can be installed in different ways to better adapt to the usage needs in the customer landscape.

Two possible scenarios are the simple landscape and the complex landscape.

For more information about the technical system landscape, see the Master Guide for the application.

For more information about connectivity over the network between the different components, see the

Communication Channel Security section.

Simple Landscape

In scenarios where CLM is used for managing application content residing on a single system, the simple

deployment landscape scenario should be applied, as depicted by the following diagram.

7 Security for Content Life-Cycle Management

7.2 Technical System Landscape

50 /98 PUBLIC 2012-06-18

Page 51: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 51/98

Figure 13:

Complex Landscape

If CLM is used for managing content residing in many systems in the landscape, the complex

deployment landscape scenario should be applied, as depicted by the following diagram.

Figure 14:

7.3 User Administration and Authentication

The CLM component uses the same user management and authentication mechanisms provided with

the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server ABAP. Therefore,

the security recommendations and guidelines for user administration and authentication as described

in the SAP NetWeaver Application Server ABAP Security Guide also apply to this component.

For more information, see the SAP NetWeaver Application Server ABAP Security Guide on SAP Help

Portal at http://help.sap.com SAP NetWeaver  .

7 Security for Content Life-Cycle Management

7.3 User Administration and Authentication

2012-06-18 PUBLIC 51 /98

Page 52: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 52/98

In addition to these guidelines, there is information about user administration and authentication that

specifically applies to CLM in the following sections:

■ User Management 

This lists the tools to use for user management and the types of users required.

■ Integration into Single Sign-On Environments

This describes how CLM supports Single Sign-On mechanisms.

User Management

User management for CLM uses the mechanisms provided with the SAP NetWeaver Application Server

ABAP, for example, tools, user types, and password policies. In addition, we provide a list of the standard

users required for operating CLM.

User Administration Tools

This table shows the tools to use for user management and user administration in Content Lifecycle

Management:

User Management Tools

 Tool Detailed Description Prerequisites

User and rolemaintenance withSAP NetWeaver ASABAP

(Transactions

SU01, PFCG)

For more information about user and role administration of AS ABAP, seeSAP Help Portal at http://help.sap.com SAP NetWeaver 

-

User Types

All users needed for operating CLM are of SAP user type Dialog.

NOTE

If possible, you should not have technical users; however, if this cannot be avoided,

communication destinations can be set up to use technical users to connect to applications. In

such scenarios, these technical users should be set up as Communication type users.

Standard Users

CLM does not require the creation of additional dedicated users for any special purposes. The use of 

CLM is possible via user accounts created for regular users by assigning the necessary CLM-related

authorizations to them.

Connections between CLM and applications can be set up in a way that requires the creation of technical

users.

User Data Synchronization

CLM does not deliver additional user data synchronization related features in addition to those available

in the SAP NetWeaver platform. CLM also does not impose any special needs or restrictions, which

would limit the usage of related NetWeaver tools.

7 Security for Content Life-Cycle Management

7.3 User Administration and Authentication

52 /98 PUBLIC 2012-06-18

Page 53: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 53/98

Page 54: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 54/98

NOTE

SAML support is only available on SAP NetWeaver release 7.3 or higher.

7.4 Authorizations

CLM uses the authorization concept provided by SAP NetWeaver. Therefore, the recommendations

and guidelines for authorizations as described in the SAP NetWeaver Application Server ABAP Security

Guide also apply to CLM.

The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles.

For role maintenance, use the profile generator (transaction PFCG).

NOTE

For more information about how to create roles, see the role administration information on SAP

Help Portal under http://help.sap.com SAP NetWeaver  .

Standard Roles

CLM delivers the following roles with CLM-specific authorization object /POA/CLMAC:

Role Description

/POA/CLM_GRC_<application name>_USER Role with CLM features relevant for a particular application

/POA/CLM_GRC_USER Role with CLM features relevant for all SAP BusinessObjectsgovernance, risk, and compliance solutions where CLM is

supported

NOTE

These roles do not include all possible combinations with restrictions for CLM actions (for

example, copy, delete, deploy content). These roles are more generic in nature and are supplied

for reference to a particular CLM managed application.

In real scenarios, more strict authorization values could be needed to restrict access to specific

CLM actions.

RECOMMENDATION

We recommend to either copy these roles or create your own with desired combinations of 

authorization values. For more information, see documentation of authorization object /POA/ 

CLMAC in your ABAP system.

Standard Authorization Objects

Standard Authorization Objects that are used by CLM:

 Authorization Object Field Value Description

/POA/CLMAC

/POA/CLMAP ID of the application theAuthorization refers to.

7 Security for Content Life-Cycle Management

7.4 Authorizations

54 /98 PUBLIC 2012-06-18

Page 55: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 55/98

 Authorization Object Field Value Description

Valid values are the onesavailable in table /POA/ I_CLM_APP.

/POA/CLMAC CLM actions refer to the

values of table /POA/ I_CLM_ACT

/POA/CLMRP Authorization object toexecute CLM utilities(intended for technical

administrators anddevelopers).You can create your ownrole and map this

authorization object to

the role.

ACTVT '16' Activity to run CLMreports

/POA/CLMAC CLM actions refer to thevalues of table /POA/ 

I_CLM_ACT

S_TABU_DIS

DICBERCLS 'CLMC' Authorization group forCLM administration.

'CLMA' Authorization group for

CLM application tables.ACTVT The values for this

Authorization Object are

the ones defined in the SAPNetWeaver SecurityGuide.

S_APPL_LOG Authorization object,which is checked when

application log entries aredisplayed, changed ordeleted.

OBJECT '/POA/SBC' Specifies the log object thisauthorization refers to.

SUBOBJECT Specifies the log subobjectsthis authorization refers

to. Permissible values arethe subobject values listedin Security Logging and 

Tracing.

ACTIVITY

S_BTCH_JOB Authorization object that

controls the creation of 

7 Security for Content Life-Cycle Management

7.4 Authorizations

2012-06-18 PUBLIC 55 /98

Page 56: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 56/98

 Authorization Object Field Value Description

background jobs. It is needfor CLM contentextraction and content

deployment scenarios.

 JOBACTION 'RELE' Specifies the operationtype job release.

 JOBGROUP '*'

S_DEVELOP Authorization object withthe settings below isneeded by CLM to

generate XSLT code tovalidate inbound XMLdocuments.

DEVCLASS '$TMP' This value permits accessto local package.

OBJTYPE 'XSLT' This value permits access

to development objects of type XSLT(transformation).

OBJNAME 'Z_*_XSLT' This value permits generalaccess to XSL

transformationsgenerated for anyapplication.

NOTE

You can furtherrestrict access bysubstituting the ’*’with a combination

of the destinationclient and theapplication name inthe following

format:'<CLIENT>_<APPLICATIONNAME>', for example,

’Z_200_GRC_PC_2010_XSLT’.

P_GROUP ”

ACTVT 01, 02, 03, 06, 07 This value permits CLM tocreate, read, write, andexecute generated XSL

transformations.

S_DEVELOP Authorization object with

the settings below is

7 Security for Content Life-Cycle Management

7.4 Authorizations

56 /98 PUBLIC 2012-06-18

Page 57: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 57/98

 Authorization Object Field Value Description

needed by CLM to gainaccess to the base XMLschema located in the

MIME repository.

DEVCLASS ”

OBJTYPE 'SMIM' This value permits accessto MIME repository.

OBJNAME ”

P_GROUP ”

ACTVT 03 This value permits CLM toread the base XML schema.

S_ICF Authorization Object forcontrolling outbound

RFC calls.For more informationabout settings for S_RFCauthorization object, see

RFC/ICF Security Guideon SAP Help Portal athttp://help.sap.com

SAP NetWeaver  .

ICF_FIELD 'DEST' Indicates that thispermission refers to RFCinvocations through a

Destination.For more informationabout S_ICFauthorization object, see

RFC/ICF Security Guideon SAP Help Portal athttp://help.sap.com

SAP NetWeaver  .

ICF_VALUE Contains the check valuesupplied in theDestination

configuration.For more informationabout S_ICFauthorization object, see

RFC/ICF Security Guideon SAP Help Portal athttp://help.sap.com

SAP NetWeaver  .

S_RFC Authorization check forRFC access

RFC_TYPE Type of RFC object to be

protected

7 Security for Content Life-Cycle Management

7.4 Authorizations

2012-06-18 PUBLIC 57 /98

Page 58: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 58/98

 Authorization Object Field Value Description

RFC_NAME Name of RFC to beprotected

ACTVT '16' (Execute) Activity for S_RFCauthorization

S_START Authorization to start orrun an application/ development object (in

this case, CLM WebDynpro application)

AUTHOBJNAM '/POA/WD_CLM' Object name

AUTHOBJTYP 'WDYA' Object type

AUTHPGMID 'R3TR' Object program ID

For more information about authorization objects, see RFC/ICF Security Guide on SAP Help Portal at

http://help.sap.com SAP NetWeaver  .

CAUTION

For successful integration with applications, CLM might need configuration of additional

authorizations in the managed applications, including S_RFC.

For more information about S_RFC settings, see Authorization Object S_RFC in RFC/ICF Security

Guide.

Critical Combinations

As a generic rule, administrative privileges over CLM must not be assigned to business users of CLM.

To avoid this, it must be ensured that the DICBERCLS field of a S_TABU_DIS authorization does not

contain both values CLMA and CLMX.

7.5 Network and Communication Security 

The network topology for CLM is based on the topology used by the SAP NetWeaver platform.

Therefore, the security guidelines and recommendations described in the SAP NetWeaver SecurityGuide also apply to CLM. Details that specifically apply to CLM are described in the following sections:

■ Communication Channel Security

This describes the communication paths and protocols used by CLM.

■ Communication Destinations

This describes the information needed for the various communication paths, for example, which

users are used for which communications.

For more information, see the following sections in the SAP NetWeaver Security guide on SAP Help

Portal at http://help.sap.com SAP NetWeaver  :

■ Network and Communication Security

7 Security for Content Life-Cycle Management

7.5 Network and Communication Security

58 /98 PUBLIC 2012-06-18

Page 59: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 59/98

■ Security Guides for Connectivity and Interoperability Technologies

Communication Channel Security 

The following table shows the communication channels used by CLM, the protocol used for theconnection, and the type of data transferred:

Communication Path Protocol Used Type of Data TransferredData Requiring SpecialProtection

Web Dynpro-based UI in client

browser communicates withapplication server hosting CLM

HTTP User interaction data N/A

CLM communicates withmanaged applications in complexlandscape scenario

RFC Content record data, contentrecord metadata

N/A

SAPGUI communicates withapplication server hosting CLM DIAG User interaction forCustomizing N/A

DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP

connections are protected using the Secure Sockets Layer (SSL) protocol.

For more information about transport layer security, see the SAP NetWeaver Security Guide on SAP

Help Portal at http://help.sap.com SAP NetWeaver  .

Network Security 

CLM relies on the networking infrastructure provided by SAP NetWeaver. As a result, network securityrelated information explained in the SAP NetWeaver Security Guide also applies to CLM. CLM does

not impose any special requirements on the setup of the network beyond the those documented in

the SAP NetWeaver Security Guide.

Communication Destinations

RECOMMENDATION

We recommend a landscape setup where the same users are used across all connected systems. In

such scenarios, communication destinations must be set up to authenticate the current user

against the destination system.

Connection Destinations

Destination Delivered Type User, Authorizations Description

Freely Configurable No RFC Freely configurable, though single-sign on setup is recommended

The destination, with which CLMcan connect to managedapplications, is freely configurable.The only requirement is that the

configured destination must beregistered with CLM asdocumented in the Master Guide.

7 Security for Content Life-Cycle Management

7.5 Network and Communication Security

2012-06-18 PUBLIC 59 /98

Page 60: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 60/98

Data Storage Security: Locations

Data is stored by CLM exclusively in the primary database of the SAP NetWeaver Application Server

ABAP.

For more information about access control on database and operating system level, see the security-relevant documentation of your database and operating system.

Access to data stored in the database throughout various locations can be secured by configuring access

controls according to the guidelines in the Authorizations section.

For guidelines about securing data located in the primary database of SAP NetWeaver Application Server

ABAP, consult the SAP NetWeaver Security Guide and the documentation of the database product

used.

Security for Additional Applications

There are no additional non-SAP provided applications needed by CLM.

Other Security-Relevant Information

Virus Scanning for CLM

CLM performs a virus scan of the following content when that content enters CLM via upload or

import:

■ Package attachments

■ Packages in ZIP (transportable) format

NOTEData Protection and Privacy Compliance

CLM does not provide any means of distinguishing personal or sensitive data in the managed

application content. Accordingly, CLM cannot be used to extract, package, or deploy such data.

Security Logging and Tracing

CLM delivers and uses the following SAP NetWeaver Application Server ABAP Application Log Object

for application log entries: /POA/CLM

Within this object the following sub objects exist:

■CHECKPOINT – for CLM Content Group related operations

■ DEPLOYMENT – for deployment related operations

■ PACKAGE – for CLM Package creation and maintenance operations

■ TECHNICAL – for any other operations not belonging to any of the above categories

In addition to application logs, there is also logging information stored in change document, /POA/ 

CLM_CHDOC, to keep track of changes in CLM content groups and packages.

Change recording is also activated after installation for the following CLM-delivered tables:

■ /POA/C_CLM_APG – API Groups and Applications

■ /POA/C_CLM_API – API and RFC Functions Mapping

■ /POA/C_CLM_APP – List of Applications

7 Security for Content Life-Cycle Management

7.5 Network and Communication Security

60 /98 PUBLIC 2012-06-18

Page 61: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 61/98

■ /POA/C_CLM_DOM – List of Domains

■ /POA/C_CLM_GLOB – CLM Global Configuration

■ /POA/C_CLM_SYR – CLM System Registry

For more information about logging on SAP NetWeaver Application Server ABAP, see the information

about logging of specific activities in SAP NetWeaver Security Guide on SAP Help Portal at http://

help.sap.com SAP NetWeaver  .

7 Security for Content Life-Cycle Management

7.5 Network and Communication Security

2012-06-18 PUBLIC 61 /98

Page 62: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 62/98

 This page is left blank for documents that are printed on both sides.

Page 63: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 63/98

8 Appendix A: PC and RM

The information in this section applies to SAP Process Control and SAP Risk Management.

8.1 Delivered Roles and Relevant Authorization Objects

These are the delivered back-end roles for Process Control and Risk Management. You assign the roles

to configure user permissions and authorizations.

Role ID Application Description

SAP_GRC_FN_BASE Process ControlRisk Management

This technical role is required for all users to accessthe application.

SAP_GRC_FN_BUSINESS_ USER

Process ControlRisk Management

This is the default role assigned to all users. Youmust assign additional entity-level authorizations

to users to enable them to perform activities andact on objects in the application. The role can onlyaccess the application through the portal.

NOTE

Users who set up master data must beassigned additional rights to perform uploadsusing program GRPCB_UPLOAD.

SAP_GRC_FN_ALL Process ControlRisk Management

This is the power user role. The role can access boththe front-end and back-end systems. It does not use

entity-level security and therefore bypasses theauthorizations from theSAP_GRC_FN_BUSINESS_USER role.

RECOMMENDATION

This role provides extensive access. For

security purposes, we recommend you onlyuse the role in emergencies such astroubleshooting task issues. It includes the

following authorizations:

■ Administration functions in ProcessControl and Risk ManagementCustomizing

■ Structure setup in expert mode

■ Data upload for structure setup

■ Central Delegation — Delegation to anyuser in the system.

8 Appendix A: PC and RM

8.1 Delivered Roles and Relevant Authorization Objects

2012-06-18 PUBLIC 63 /98

Page 64: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 64/98

Role ID Application Description

NOTE

The role does not contain the authorizationsfor customizing workflows, case

management, or Web services activation. Forthese authorizations in:

■ Process Control, useSAP_GRC_SPC_CUSTOMIZING.

■ Risk Management, useSAP_GRC_RM_CUSTOMIZING.

SAP_GRC_SPC_CUSTOMI

ZING

Process Control This role can access the SAP NetWeaver ABAP

Server. This role contains all necessaryauthorizations for Customizing settings in theapplication. This includes authorization objects forthe following:

■ SAP Process Control■ Customizing Workflow

■ Case management

■ RFC connections

■ Shared objects monitor

■ Client comparison with Customizing Cross-system Viewer

■  Job scheduling

■ E-mail notification settings

■ Web service activation

NOTE

You may be required to record all your

changes in the Customizing request. Reviewthe client settings in transaction SCC4 andmake sure you have a request available foryou, or you are authorized to create one.

NOTE

This role does not have authorizations toperform the following tasks:

■ Activating and creating BAdI

implementations

■ SAP NetWeaver Business Intelligenceintegration

■ Remote Logon to configure the RFC

connections

SAP_GRC_RM_CUSTOMIZING

Risk Management This role can access the SAP NetWeaver ABAPServer. This role contains all necessaryauthorizations for Customizing settings in theapplication. This includes authorization objects for

the following:

■ SAP Risk Management

■ Customizing Workflow

■ Case management

8 Appendix A: PC and RM

8.1 Delivered Roles and Relevant Authorization Objects

64 /98 PUBLIC 2012-06-18

Page 65: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 65/98

Role ID Application Description

■ RFC connections

■ Shared objects monitor

■ Client comparison with Customizing Cross-

system Viewer■  Job scheduling

■ E-mail notification settings

■ Web service activation

NOTE

You may be required to record all yourchanges in the Customizing request. Reviewthe client settings in transaction SCC4 and

make sure you have a request available foryou, or you are authorized to create one.

NOTE

This role does not have authorizations to

perform the following tasks:

■ Activating and creating BAdIimplementations

■ SAP NetWeaver Business Intelligence

integration

■ Remote Logon to configure the RFCconnections

SAP_GRC_FN_DISPLAY Process Control

Risk Management

This role can access the SAP NetWeaver ABAP

Server. This role contains the displayauthorizations for Customizing and entity levelauthorizations.

RECOMMENDATION

Assign this role to external auditors if you

want to give them display access throughoutthe application. This role bypasses theSAP_GRC_FN_BUSINESS_USER role togrant display authorizations in the back end.

If you wish to have more control over whatis displayed, use the

SAP_GRC_FN_BUSINESS_USER instead.

SAP_GRC_SPC_SCHEDULER

Process Control This role grants the authority to performbackground job execution.

SAP_GRC_SPC_SETUP Process Control This role grants the authority for system setup and

installation.

For more information, see the individual roles in the IMG.

PFCG Basic Role Authorization Objects

SAP delivers the following authorization objects for the PFCG basic roles:

8 Appendix A: PC and RM

8.1 Delivered Roles and Relevant Authorization Objects

2012-06-18 PUBLIC 65 /98

Page 66: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 66/98

■ GRFN_USER

This authorization object is used to separate business users and power users, and controls the access

to perform your own or central delegation. It has only the Activity element.

■ GRFN_CONN 

This authorization object is used to run automated rules testing or monitoring on other systems.

It grants Remote Function Call authority to the user. To assign this authorization to users, use

transaction SU01 in the back-end system to create a new role, add the authorization object to the

role, and assign the role to users.

Standard Authorization Objects Relevant to Security 

Authorizations for objects of applications belonging to the Application Server and used in Process

Control are relevant to security in Process Control. If you run Process Control in a system in which

the applications used by Process Control are also used productively in other projects, then you must

manage the authorizations for the Process Control-specific objects separately from the other

authorization objects.

■ Personnel Planning (PLOG) from Organizational Management:

The general object types Organization and Person are used in Process Control together with

other Process Control-specific object types.

Note that the organization and persons created in other projects are also available in Process

Control, and that those created in Process Control are also available in other projects.

■Case Management and Records Management:Assessments, tests, issues, and remediation plans are stored in Case or Records Management. The

RMS ID GRPC_PC is relevant for Process Control.

8.2 SAP Delivered Business Events

Business events are the placeholders for recipient determination in workflow driven scenarios. When

the workflow needs to determine the recipient, it uses the correlated object of the workflow instance

and business event. SAP ships default rules for recipient determination based on the entity, activity,

and data part used in roles. You can overwrite the default rules with your own rules by using the direct

mapping of the business events and their roles.

For information about the delivered business events and where they are used in the application, view

the BC Set for the Customizing activity Maintain Custom Agent Determination Rules, under Governance, Risk,

and Compliance General Settings Workflow .

The following table provides a list of the SAP delivered business events and a description:

Business EventBusiness EventName Description

0FN_AHISSUE_DEFAULT_PRC Default processorfor Ad hoc issue

When an ad hoc issue is reported on an object, theapplication enters the default issue owner. This

8 Appendix A: PC and RM

8.2 SAP Delivered Business Events

66 /98 PUBLIC 2012-06-18

Page 67: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 67/98

Business EventBusiness EventName Description

business event suggests the default ad hoc issueowner.

0FN_AM_BRFP_NOTIFY CM EventBRFplusnotification

The Continuous Monitor subscenarioEVENTsupportssending notifications. When users choose the optionto find recipients by customer agent rule, thisbusiness event supports the determining therecipient.

0FN_ISSUE_NOTIFY Send notification

to object owner of Ad-hoc Issue

When an ad hoc issue is confirmed, the application

automatically sends a notification to the objectowner. This business event determines the recipientbased on the object owner.

0FN_MDCHG_APPR Get master datachange approver

who has thechange authorityof the object

The business event determines the recipient of achange request for master data changes.

0FN_MDCHG_NTFY Get notifiedperson who has

the displayauthority of theobject

The business event determines the recipients of anotification when a master data change happens.

0FN_MDCHG_NTFY_L Get notifiedperson who has

the display

authority of theobject on localobject level

The business event defines the recipients of anotification when a local master data change

happens.

0FN_POLICY_APPROVE Approve policy This business event determines the recipients to

approve policy, when policy is sent for approval .Additionally the agent of 0FN_POLICY_DEFAULT_APPR is also in therecipient list.

0FN_POLICY_DEFAULT_APPR Default approver

for policy

This business event determines the recipients to

approve policy, when policy is sent to approve.

0FN_POLICY_REVIEW Review policy This business event determines the recipients toreview policy.

0PC_CONTROL_PROPOSAL_APPR Get controlproposalapprover who has

the changeauthority of theobject

This business event determines the approvalrecipients of the control proposed from PC & and RMintegration scenario.

0PC_PERF_AOD Performaggregation of deficiencies

This business event determines the recipients of Control Risk Assessment as it can be scheduled in theplanner.

8 Appendix A: PC and RM

8.2 SAP Delivered Business Events

2012-06-18 PUBLIC 67 /98

Page 68: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 68/98

Business EventBusiness EventName Description

0PC_PERF_ASSESSMENT Performassessment

This business event determines the recipients of several Assessments as it can be scheduled in the

planner.0PC_PERF_CRA Perform control

risk assessment

This business event determines the recipients of 

Control Risk Assessments as it can be scheduled inthe planner.

0PC_PERF_IELC_ASSESSMENT Perform indirectEntity-LevelControlAssessment

This business event determines the recipients of Indirect Entity-Level Control Assessment as it can bescheduled in the planner.

0PC_PERF_IELC_TESTING Perform Indirect

Entity-LevelControl Testing

This business event determines the recipients of 

Indirect Entity-Level Control Testing .

0PC_PERF_RISK_ASSESSMENT Perform riskassessment

This business event determines the recipients of RiskAssessment.

0PC_PERF_SIGNOFF Perform Sign-Off This business event determines the recipients of Sign-Off.

0PC_PERF_TESTING Perform testing This business event determines the recipients of  

Testing.

0PC_RECE_ESCALATION Receiveescalations of workflow

The user is able to configure escalation recipients foroverdue workflow items. For more information, seeCustomizing for Workflow E-Mail Notification under

Governance, Risk and Compliance General Settings

Workflow .0PC_RECE_ISSUE Default issue

ownerThis business event determines the recipients of monitoring issues. When users manually assign theissue owner, this business event determines thedefault issue owner.

0PC_RECE_REM_PLAN Default

Remediation PlanOwner

When users manually assign the remediation plan

owner, this business event determines the defaultone.

0PC_VALI_ASSESSMENT Reviewassessment

This business event determines the recipients toreview assessments.

0PC_VALI_CAPA_EXEC Review CAPAexecution

This business event determines the recipients toreview CAPA execution.

0PC_VALI_CAPA_PLAN Review CAPA

plan

This business event determines the recipients to

review CAPA plans.

0PC_VALI_CRA Review controlrisk assessment

This business event determines the recipients toreview Control Risk Assessment.

0PC_VALI_IELC_ASSESSMENT Review Entity-Level ControlAssessment

This business event determines the recipients toreview indirect Entity-Level Control Assessment.

0PC_VALI_IELC_TESTING Review IndirectEntity-Level

Control Testing

This business event determines the recipients toreview Indirect Entity-Level Control Testing.

8 Appendix A: PC and RM

8.2 SAP Delivered Business Events

68 /98 PUBLIC 2012-06-18

Page 69: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 69/98

Business EventBusiness EventName Description

0PC_VALI_RISK_ASSESSMENT Review riskassessment

This business event determines the recipients toreview Risk Assessments.

0PC_VALI_TESTING Review manualtesting

This business event determines the recipients toreview testing for manual controls.

0RM_ACTIVITY_SURVEY Activity Survey This business event determines the recipients of theactivity survey.

0RM_ACTIVITY_VALIDATE Activity

Validation

This business event determines the recipients of the

activity validation .

0RM_COLLAB_ASSMNT_SUB Contribute toCollaborativeRisk Assessment

This business event determines all recipients of theinitial workflow or survey to participate in acollaborative risk assessment.

0RM_COLLAB_ASSMNT_TOP Consolidate

CollaborativeRisk Assessment

This business event determines the consolidator of a

collaborative risk assessment. This user receives aworkflow item that allows them to track the progressof the collaborative risk assessment. Once theassessment is finished they get another workflow itemto start the consolidation of the results.

0RM_INCIDENT_VALIDATE Incident

Validation

After an Incident has been created and submitted, or

posted from outside, the validation workflow istriggered. This business event determines multiplegroups of validators for the incident. First a validationworkflow item goes out to all members of the first

group.

Once a member of the first group has approved theincident the members of the next group receive avalidation item, and so on.

The incident is completely approved after a memberfrom each group has approved it. If it is sent to reworkby anyone, the validation cycle begins again with thefirst group again.

0RM_KRI_LIAISON KRI Liaison This business event is used to determine the workflow

recipients for KRI implementation requests and KRIlocalization requests.A KRI implementation request is triggered after a newKRI implementation request has been created for a

KRI template.A localization request is triggered when a localizationfor a KRI instance is requested on the riskmanagement front end.

0RM_KRI_NOTIFICATION KRI Notification This business event determines the recipients for the

notification of violated business rules maintained forone or multiple KRI instances on the riskmanagement front end.

0RM_KRI_SURVEY Risk IndicatorSurvey

This business event determines the recipients of therisk indicator survey

8 Appendix A: PC and RM

8.2 SAP Delivered Business Events

2012-06-18 PUBLIC 69 /98

Page 70: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 70/98

Business EventBusiness EventName Description

0RM_OPP_ASSESSMENT OpportunityAssessment

This business event determines the recipients of theopportunity assessment.

0RM_OPP_VALIDATE OpportunityValidation

This business event determines the recipients of theopportunity validation.

0RM_RESP_AHISSUE_UPDATE Response updatefrom issue status

change

The business event determines the recipients of an e-mail notification when response completeness

reaches 100% based on related issue closing.

0RM_RESP_CONT_UPDATE Response updatefrom Control'scases

The business event determines the recipients of an e-mail notification when response completeness oreffectiveness is changed based on related controlrating change.

0RM_RESP_POLICY_UPDATE Response update

from policy statuschange

The business event determines the recipients of an e-

mail notification when response completenessreached 100% based on related policy status change.

0RM_RESPONSE_UPDATE ResponseValidation

This business event determines the recipients of theresponse update.

0RM_RISK_ASSESSMENT Risk Assessment This business event determines the recipients of therisk assessment.

0RM_RISK_PROPOSE Risk Proposal After a risk is proposed in SAP Risk Management, a

workflow is sent to a risk management expert tovalidate the proposal.If it is accepted, a new risk is created for it. This businessevent determines approver.

0RM_RISK_SURVEY Risk Survey This business event determines the recipients of therisk survey

0RM_RISK_VALIDATE Risk Validation This business event determines the recipients of therisk validation.

8.3 SAP Delivered Workflow Recipient BC Set (ProcessControl)

The information in this section applies to only the process control application. The use of this BC setis optional. The risk management application uses the default agent determination rules and does not

have a BC set.

The process control application is delivered with the following agent determination rule BC sets:

■ Cross Regulations

Business Event Sort Role Entity Subentity

0FN_AHISSUE_DEFAULT_PRC

1 SAP_GRC_SPC_CRS_CTL_OWNER

CONTROL Notapplicable

0FN_AHISSUE_DEFAUL

T_PRC

1 SAP_GRC_SPC_CRS_ICMAN CORPORATE Not

applicable

8 Appendix A: PC and RM

8.3 SAP Delivered Workflow Recipient BC Set (Process Control)

70 /98 PUBLIC 2012-06-18

Page 71: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 71/98

Business Event Sort Role Entity Subentity

0FN_AHISSUE_DEFAULT_PRC

1 SAP_GRC_SPC_CRS_POLICY_  OWNER

POLICY Notapplicable

0FN_AHISSUE_DEFAULT_PRC

1 SAP_GRC_SPC_CRS_PRC_OWNER

PROCESS Notapplicable

0FN_AHISSUE_DEFAULT_PRC

1 SAP_GRC_SPC_CRS_SPR_OWNER

SUBPROCESS Notapplicable

0FN_AHISSUE_DEFAULT_PRC

1 SAP_GRC_SPC_GLOBAL_ORG _OWNER

ORGUNIT Notapplicable

0FN_AHISSUE_DEFAUL

T_PRC

1 SAP_GRC_SPC_GLOBAL_REG_  

ADMIN 

REGULATION Not

applicable

0FN_AHISSUE_DEFAULT_PRC

2 SAP_GRC_SPC_GLOBAL_ORG _OWNER

ECONTROL Notapplicable

0FN_AM_BRFP_NOTIF

Y

1 SAP_GRC_SPC_CRS_CTL_OW

NER

CONTROL Not

applicable

0FN_ISSUE_NOTIFY 1 SAP_GRC_SPC_CRS_CTL_OWNER

CONTROL Notapplicable

0FN_ISSUE_NOTIFY 1 SAP_GRC_SPC_CRS_ICMAN CORPORATE Not

applicable

0FN_ISSUE_NOTIFY 1 SAP_GRC_SPC_CRS_POLICY_  OWNER

POLICY Notapplicable

0FN_ISSUE_NOTIFY 1 SAP_GRC_SPC_CRS_PRC_OWNER

PROCESS Notapplicable

0FN_ISSUE_NOTIFY 1 SAP_GRC_SPC_CRS_SPR_OW

NER

SUBPROCESS Not

applicable0FN_ISSUE_NOTIFY 1 SAP_GRC_SPC_GLOBAL_ORG

 _OWNER

ORGUNIT Not

applicable

0FN_ISSUE_NOTIFY 1 SAP_GRC_SPC_GLOBAL_REG_  ADMIN 

REGULATION Notapplicable

0FN_ISSUE_NOTIFY 2 SAP_GRC_SPC_GLOBAL_ORG _OWNER

ECONTROL Notapplicable

0FN_POLICY_DEFAULT _APPR

1 SAP_GRC_SPC_GLOBAL_ORG _OWNER

Not applicable Notapplicable

0FN_POLICY_APPROVE 1 SAP_GRC_SPC_CRS_PLC_APP

R

Not applicable Not

applicable0FN_POLICY_REVIEW 1 SAP_GRC_SPC_CRS_PLC_REVI

EW

Not applicable Not

applicable

0PC_CONTROL_PROPOSAL_APPR

1 SAP_GRC_SPC_CRS_SPR_OWNER

Not applicable Notapplicable

0PC_CONTROL_PROPOSAL_APPR

2 SAP_GRC_SPC_CRS_SPR_OWNER

Not applicable Notapplicable

0PC_CONTROL_PROPOSAL_APPR

3 SAP_GRC_SPC_GLOBAL_ORG _OWNER

Not applicable Notapplicable

0PC_PERF_AOD 1 SAP_GRC_SPC_GLOBAL_ORG

 _OWNER

ORGUNIT Not

applicable

8 Appendix A: PC and RM

8.3 SAP Delivered Workflow Recipient BC Set (Process Control)

2012-06-18 PUBLIC 71 /98

Page 72: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 72/98

Business Event Sort Role Entity Subentity

0PC_PERF_ASSESSMEN T

1 SAP_GRC_SPC_CRS_SPR_OWNER

G_AS PD

0PC_PERF_CRA 1 SAP_GRC_SPC_CRS_SPR_OWNER

G_AS CR

0PC_PERF_IELC_ASSESSMENT

1 SAP_GRC_SPC_GLOBAL_ORG _OWNER

G_AS MCOU

0PC_PERF_IELC_ASSESSMENT

2 SAP_GRC_SPC_GLOBAL_INT_  AUD

G_AS MCOU

0PC_PERF_IELC_TESTI

NG

2 SAP_GRC_SPC_GLOBAL_INT_  

AUD

G_TL MTOU

0PC_PERF_RISK_ASSESSMENT

1 SAP_GRC_SPC_GLOBAL_ORG _OWNER

G_AS RISK  

0PC_PERF_RISK_ASSES

SMENT

2 SAP_GRC_SPC_GLOBAL_INT_  

AUD

G_AS RISK  

0PC_PERF_SIGNOFF 1 SAP_GRC_SPC_GLOBAL_ORG _OWNER

ORGUNIT Notapplicable

0PC_PERF_SIGNOFF 2 SAP_GRC_SPC_GLOBAL_CEO_  

CFO

ORGUNIT Not

applicable

0PC_RECE_ESCALATION 

1 SAP_GRC_SPC_CRS_SPR_OWNER

CONTROL Notapplicable

0PC_RECE_ESCALATION 

3 SAP_GRC_SPC_CRS_PRC_OWNER

G_AS CE

0PC_RECE_ESCALATIO

4 SAP_GRC_SPC_GLOBAL_CEO_  

CFO

G_AS MCOU

0PC_RECE_ESCALATIO

5 SAP_GRC_SPC_GLOBAL_INT_  

AUD

G_AS CR

0PC_RECE_ESCALATION 

6 SAP_GRC_SPC_GLOBAL_CEO_  CFO

G_AS RISK  

0PC_RECE_ESCALATION 

8 SAP_GRC_SPC_CRS_PRC_OWNER

G_AS CD

0PC_RECE_ESCALATION 

10 SAP_GRC_SPC_CRS_PRC_OWNER

G_IS CO

0PC_RECE_ESCALATIO

11 SAP_GRC_SPC_CRS_SPR_OW

NER

G_IS MO

0PC_RECE_ESCALATIO

12 SAP_GRC_SPC_CRS_SPR_OW

NER

G_IS CE

0PC_RECE_ESCALATION 

13 SAP_GRC_SPC_CRS_SPR_OWNER

G_IS TE

0PC_RECE_ESCALATION 

16 SAP_GRC_SPC_CRS_PRC_OWNER

G_IS PD

0PC_RECE_ESCALATION 

17 SAP_GRC_SPC_CRS_PRC_OWNER

G_TL TE

0PC_RECE_ESCALATIO

18 SAP_GRC_SPC_CRS_SPR_OW

NER

G_TL CO

8 Appendix A: PC and RM

8.3 SAP Delivered Workflow Recipient BC Set (Process Control)

72 /98 PUBLIC 2012-06-18

Page 73: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 73/98

Business Event Sort Role Entity Subentity

0PC_RECE_ESCALATION 

19 SAP_GRC_SPC_GLOBAL_ORG _OWNER

G_TL MTOU

0PC_RECE_ESCALATION 

20 SAP_GRC_SPC_GLOBAL_INT_  AUD

ORGUNIT Notapplicable

0PC_RECE_ISSUE 1 SAP_GRC_SPC_CRS_PRC_OWNER

G_AS PD

0PC_RECE_ISSUE 1 SAP_GRC_SPC_CRS_SPR_OWNER

G_IS CO

0PC_RECE_ISSUE 2 SAP_GRC_SPC_CRS_SPR_OW

NER

G_AS CD

0PC_RECE_ISSUE 3 SAP_GRC_SPC_CRS_SPR_OWNER

G_AS CE

0PC_RECE_ISSUE 4 SAP_GRC_SPC_CRS_SPR_OW

NER

G_TL TE

0PC_RECE_ISSUE 5 SAP_GRC_SPC_CRS_SPR_OWNER

G_TL CO

0PC_RECE_REM_PLAN 1 SAP_GRC_SPC_CRS_SPR_OW

NER

G_IS PD

0PC_RECE_REM_PLAN 1 SAP_GRC_SPC_GLOBAL_ORG _OWNER

G_IS MCOU

0PC_RECE_REM_PLAN 2 SAP_GRC_SPC_GLOBAL_INT_  AUD

G_IS MCOU

0PC_RECE_REM_PLAN 3 SAP_GRC_SPC_GLOBAL_INT_  

AUD

G_IS MTOU

0PC_VALI_ASSESSMEN 

T

1 SAP_GRC_SPC_CRS_PRC_OW

NER

G_AS PD

0PC_VALI_ASSESSMEN T

1 SAP_GRC_SPC_CRS_SPR_OWNER

G_AS CD

0PC_VALI_ASSESSMEN T

2 SAP_GRC_SPC_CRS_SPR_OWNER

G_AS CE

0PC_VALI_CAPA_EXEC 1 SAP_GRC_SPC_FDA_CAPA_EXEC_APPR

G_CP Notapplicable

0PC_VALI_CAPA_PLAN 1 SAP_GRC_SPC_FDA_CAPA_PL

AN_APPR

G_CP Not

applicable0PC_VALI_TESTING 1 SAP_GRC_SPC_CRS_SPR_OW

NER

G_TL TE

■ SOX Regulation

Business Event Sort Role Entity Subentity

0FN_AM_BRFP_NOTIFY 1 SAP_GRC_SPC_SOX_CTL_OWNER

CONTROL Notapplicable

0PC_PERF_AOD 2 SAP_GRC_SPC_SOX_ICMAN 

ORGUNIT Notapplicable

0PC_PERF_ASSESSMENT 1 SAP_GRC_SPC_SOX_C

TL_OWNER

G_AS CD

8 Appendix A: PC and RM

8.3 SAP Delivered Workflow Recipient BC Set (Process Control)

2012-06-18 PUBLIC 73 /98

Page 74: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 74/98

Business Event Sort Role Entity Subentity

0PC_PERF_ASSESSMENT 2 SAP_GRC_SPC_SOX_CTL_OWNER

G_AS CE

0PC_PERF_IELC_TESTING 1 SAP_GRC_SPC_SOX_ORG_TESTER

G_TL MTOU

0PC_PERF_TESTING 1 SAP_GRC_SPC_SOX_PRC_TESTER

G_TL CO

0PC_PERF_TESTING 2 SAP_GRC_SPC_SOX_PRC_TESTER

G_TL TE

0PC_RECE_ESCALATION 2 SAP_GRC_SPC_SOX_IC

MAN 

CPROPOSAL Not

applicable

0PC_RECE_ESCALATION 7 SAP_GRC_SPC_SOX_ICMAN 

G_AS PD

0PC_RECE_ESCALATION 14 SAP_GRC_SPC_SOX_IC

MAN 

G_IS MCOU

0PC_RECE_ESCALATION 15 SAP_GRC_SPC_SOX_ICMAN 

G_IS MTOU

0PC_RECE_EVENT_NOTIF

ICATION 

1 SAP_GRC_SPC_SOX_C

TL_OWNER

CONTROL Not

applicable

0PC_RECE_ISSUE 1 SAP_GRC_SPC_SOX_CTL_OWNER

G_IS MO

0PC_RECE_ISSUE 1 SAP_GRC_SPC_SOX_ICMAN 

G_AS MCOU

0PC_RECE_ISSUE 2 SAP_GRC_SPC_SOX_IC

MAN 

G_TL MTOU

0PC_RECE_REM_PLAN 1 SAP_GRC_SPC_SOX_C

TL_OWNER

G_IS CD

0PC_RECE_REM_PLAN 1 SAP_GRC_SPC_SOX_ORG_TESTER

G_IS MTOU

0PC_RECE_REM_PLAN 2 SAP_GRC_SPC_SOX_CTL_OWNER

G_IS CE

0PC_RECE_REM_PLAN 3 SAP_GRC_SPC_SOX_CTL_OWNER

G_IS TE

0PC_RECE_REM_PLAN 4 SAP_GRC_SPC_SOX_C

TL_OWNER

G_IS CO

0PC_RECE_REM_PLAN 5 SAP_GRC_SPC_SOX_C

TL_OWNER

G_IS MO

0PC_VALI_CRA 1 SAP_GRC_SPC_SOX_ICMAN 

G_AS CR

0PC_VALI_IELC_ASSESSMENT

1 SAP_GRC_SPC_SOX_ICMAN 

G_AS MCOU

0PC_VALI_IELC_TESTING 1 SAP_GRC_SPC_SOX_ICMAN 

G_TL MTOU

0PC_VALI_RISK_ASSESSM

ENT

1 SAP_GRC_SPC_SOX_IC

MAN 

G_AS RISK  

8 Appendix A: PC and RM

8.3 SAP Delivered Workflow Recipient BC Set (Process Control)

74 /98 PUBLIC 2012-06-18

Page 75: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 75/98

■ FDA Regulation

Business Event Sort Role Entity Subentity

0FN_AM_BRFP_NOTI

FY

1 SAP_GRC_SPC_FDA_CTL_O

WNER

CONTROL Not applicable

0PC_PERF_ASSESSMENT

2 SAP_GRC_SPC_FDA_CTL_OWNER

G_AS CE

0PC_PERF_TESTING 1 SAP_GRC_SPC_FDA_PRC_TESTER

G_TL CO

0PC_PERF_TESTING 2 SAP_GRC_SPC_FDA_PRC_TESTER

G_TL TE

0PC_RECE_ESCALATION 

2 SAP_GRC_SPC_FDA_ICMAN 

CPROPOSAL

Not applicable

0PC_RECE_ESCALAT

ION 

9 SAP_GRC_SPC_FDA_ICMA

G_CP Not applicable

0PC_RECE_EVENT_N OTIFICATION 

1 SAP_GRC_SPC_FDA_CTL_OWNER

CONTROL Not applicable

0PC_RECE_ISSUE 1 SAP_GRC_SPC_FDA_CTL_OWNER

G_IS MO

0PC_RECE_REM_PLAN 

1 SAP_GRC_SPC_FDA_CTL_OWNER

G_IS CE

0PC_RECE_REM_PLA

2 SAP_GRC_SPC_FDA_CTL_O

WNER

G_IS TE

0PC_RECE_REM_PLAN 

3 SAP_GRC_SPC_FDA_CTL_OWNER

G_IS CO

0PC_RECE_REM_PLAN 

4 SAP_GRC_SPC_FDA_CTL_OWNER

G_IS MO

If you want to implement a SOX initiative using the delivered BC Sets, active Cross Regulation and

SOX.

If you want to implement an FDA initiative using the delivered BC Sets, active Cross Regulation and

FDA.

If you want to implement both SOX and FDA initiatives using the delivered BC Sets, active Cross

Regulation, SOX, and FDA.

8.4 Authorization Object Elements

The information in this section applies to both the process control application and risk management

application.

You configure the authorizations for application roles by maintaining the authorization object

elements. The following tables list the descriptions of the authorization object elements. For

information about the procedure, see Maintaining Application Roles.

8 Appendix A: PC and RM

8.4 Authorization Object Elements

2012-06-18 PUBLIC 75 /98

Page 76: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 76/98

8.4.1 Activity 

The following activities are relevant for both process control and risk management applications.

Activity controls the user behavior on the business object.

 Activity Authorization Object

CHANGE GRFN_API

CREATE GRFN_API

DELETE GRFN_API

DISPLAY GRFN_API

ANALYZE GRFN_REP

PRINT GRFN_REP

DISPLAY TAKEOVER GRFN_USER

DISTRIBUTE GRFN_USER

EXECUTE GRFN_CONN  

8.4.2 Entities

The entity specifies the business object. Its values are all the business objects within the application.

The table lists the authorization relevant entities for the process control and risk management

applications:

Entity Application Description Central

ACC_GROUP Process Control Account Group X

ACTIVITY Risk Management Activity not applicable

AM_JOB Process ControlRisk Management

Scheduler not applicable

AM_JOBP Process Control

Risk Management

 Job Log not applicable

AM_JOBRESULT Process ControlRisk Management

 Job Result not applicable

AM_AHQRY Process ControlRisk Management

Ad-Hoc Query not applicable

AM_EVENT Process ControlRisk Management

Event Monitor not applicable

AOD Process Control AOD not applicable

BR Process Control

Risk Management

Business Rule not applicable

BRA Process ControlRisk Management

Business Rule Assignment not applicable

CACTIVITY Risk Management Activity Category X

CAGROUP Risk Management Activity Category Group X

COBJECTIVE Process Control Control Objective X

COGROUP Risk Management Opportunity Category X

8 Appendix A: PC and RM

8.4 Authorization Object Elements

76 /98 PUBLIC 2012-06-18

Page 77: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 77/98

Entity Application Description Central

CONTROL Process ControlRisk Management

Control not applicable

COPP Risk Management Central Opportunity X

CPROPOSAL Process Control Control Proposal not applicable

CRGROUP Process ControlRisk Management

Risk Category X

CRISK Process ControlRisk Management

Central Risk X

ECGROUP Process Control Indirect Entity-Level ControlGroup

not applicable

ECONTROL Process Control Indirect Entity-Level Control not applicable

EO Process Control

Risk Management

Data Source not applicable

EVENT Process Control Event X

EVENT_D Process Control Dispatched Event X

EXEC Process Control Scheduler X

G_AS Process Control Assessment not applicable

G_CP Process Control CAPA Plan not applicable

G_IS Process Control Issue not applicable

G_PL Process Control Remediation plan not applicable

G_TL Process Control Test Log not applicable

INCIDENT Risk Management Incident not applicable

 JOBLOG Process Control Job log from Scheduler X

 JOBRESULT Process Control Job Result X

KRIIMPL Risk Management KRI Implementation X

KRIIMPLREQ Risk Management KRI Implementation Request X

KRIINST Risk Management KRI Instance not applicable

KRIRULE Risk Management KRI Business Rule not applicable

KRITMPL Risk Management KRI Template X

OBJECTIVE Risk Management Objectives X

OLSP Process Control OLSP X

OPP Risk Management Opportunity not applicableORGUNIT Process Control

Risk ManagementOrganization not applicable

PLANNER Process Control

Risk Management

Planner not applicable

PRISK Risk Management Risk Proposal not applicable

PROCESS Process Control Process not applicable

QSURVEY Risk Management Question Survey X

REGULATION Process ControlRisk Management

Regulation/Policy X

REG_GROUP Process Control Regulation/Policy Group X

8 Appendix A: PC and RM

8.4 Authorization Object Elements

2012-06-18 PUBLIC 77 /98

Page 78: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 78/98

Entity Application Description Central

Risk Management

REG_REQ Process ControlRisk Management

Regulation/PolicyRequirement

X

RESPONSE Risk Management Response not applicable

RISK Process ControlRisk Management

Risk not applicable

RULCR Process Control Rule Criteria X

RULE Process Control Rule X

SAPQUERY Process Control SAP Query X

SCRIPT Process Control Rule Script X

SIGNOFF Process Control Sign-Off not applicable

SRV_QUESTION Process Control

Risk Management

Survey Question X

SUBPROCESS Process Control Subprocess not applicable

SURVEY Process Control

Risk Management

Survey Template X

TESTPLAN Process Control Testplan X

XCONTROL Process Control Central Control X

XECGROUP Process Control Central Indirect Entity-LevelControl Group

X

XECONTROL Process Control Central Indirect Entity-LevelControl

X

XPROCESS Process Control Central Process XXSUBPROCESS Process Control Central Subprocess X

8.4.3 Subentities

The information in this section is relevant for both process control and risk management applications:

Subentities are the subgroup of objects related to an entity. Not all entities have subentities. The table

lists the subentities and related entities:

Entity Subentity Description

G_AS CD Control Design Assessment

G_AS CE Self Assessment

G_AS CR Control Risk Assessment

G_AS MCOU Indirect ELC Assessment

G_AS PD Sub Process Assessment

G_AS RISK Risk Assessment

G_CP CE CAPA plan for Self Assessment

G_CP CO CAPA plan for Compliance Test

G_CP MO CAPA plan for Monitoring Test

8 Appendix A: PC and RM

8.4 Authorization Object Elements

78 /98 PUBLIC 2012-06-18

Page 79: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 79/98

Entity Subentity Description

G_CP TE CAPA plan for Manual Test

G_IS CD Control Design Assessment Issue

G_IS CE Self Assessment IssueG_IS CO Compliance Test Issue

G_IS MCOU Indirect ELC Assessment Issue

G_IS MO Monitoring Test Issue

G_IS MTOU Indirect ELC Test Issue

G_IS PD Sub Process Assessment Issue

G_IS TE Manual Test Issue

G_PL CD Control Design Assessment Plan

G_PL CE Self Assessment Plan

G_PL CO Compliance Test Plan

G_PL MCOU Indirect ELC Assessment Plan

G_PL MO Monitoring Test Plan

G_PL MTOU Indirect ELC Test Plan

G_PL PD Sub Process Assessment Plan

G_PL TE Manual Test Plan

G_TL CO Compliance Test Test Log

G_TL MO Monitoring Test Test Log

G_TL MTOU Indirect ELC Test Test Log

G_TL TE Manual Test Test Log

PLANNER PERF-AOD Perform Aggregation of Deficiencies

PLANNER PERF-CDASS Perform Control Design Assessment

PLANNER PERF-CEASS Perform Self Assessment

PLANNER PERF-CRISK Perform Control Risk Assessment

PLANNER PERF-ETEST Perform Indirect ELC Test

PLANNER PERF-MCAOU Perform Indirect ELC Assessment

PLANNER PERF-PDASS Perform Sub Process Assessment

PLANNER PERF-RISK Perform Risk Assessment

PLANNER PERF-SOFOU Perform Sign-Off  

PLANNER PERF-TEST Perform TestPLANNER PERF-PLCA Perform Policy Acknowledgement

PLANNER PERF-PLCQ Perform Policy Quiz

PLANNER PERF-PLCS Perform Policy Survey

PLANNER GRRM_ACT Perform Activity Validation

PLANNER GRRM_ANAL Perform Risk Assessment

PLANNER GRRM_OPP Perform Opportunity Assessment

PLANNER GRRM_OPPVA Perform Opportunity Validation

PLANNER GRRM_RESP Perform Responsible Validation

PLANNER GRRM_RISK Perform Risk Validation

8 Appendix A: PC and RM

8.4 Authorization Object Elements

2012-06-18 PUBLIC 79 /98

Page 80: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 80/98

Entity Subentity Description

PLANNER GRRM_SACT Perform Activity Survey

PLANNER GRRM_SKRI Perform Risk Indicator Survey

PLANNER GRRM_SRISK Perform Risk Survey

8.4.4 Dataparts

The information in this section is relevant for both process control and risk management applications.

Entity Datapart Description Relevant Application

ACTIVITY DATA Activity Details Risk management

ACTIVITY VALIDATE Activity Validation Risk management

BR STATUS Business Rule Status Process controlRisk management

CONTROL CDATA Additional data of control Process control

CONTROL DATA Basic data of control Process control

CONTROL RISK Assignment of control to risk Process control

CONTROL RULE Assignment of control to rule Process control

CONTROL TDATA Test attributes of control Process control

ECONTROL DATA Basic data of indirect Entity-LevelControl

Process control

ECONTROL TDATA Test attributes of indirect Entity-

Level Control

Process control

INCIDENT DATA Maintain Incident Draft Risk management

INCIDENT REWORK Rework Incident (resubmit or

refuse)

Risk management

INCIDENT VALIDATE Validate Incident (validate or sendto rework)

Risk management

KRITMPL DATA KRI Template Data Risk management

KRITMPL LIAISON KRI Liaison Risk management

OPP DATA Opportunity Details Risk management

OPP VALIDATE Opportunity Validation Risk management

ORGUNIT DATA Orgunit Data Risk managementProcess control

ORGUNIT ECONTROL Assignment of Indirect Entity LevelControl

Process control

ORGUNIT INSCOPE Orgunit Scoping Information Process control

ORGUNIT RISK_ASSESSMENT Risk Assessment on Organizations Risk management

ORGUNIT ROLES Role Assignment on Organizations Risk managementProcess control

ORGUNIT ROLES_PC Role Assignment on Processes,

Subprocesses, and Controls

Process control

8 Appendix A: PC and RM

8.4 Authorization Object Elements

80 /98 PUBLIC 2012-06-18

Page 81: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 81/98

Entity Datapart Description Relevant Application

ORGUNIT ROLES_RM Role Assignment on Risks andActivities

Risk management

ORGUNIT SIGNOFF Sign-Off Process control

ORGUNIT SUBPROCESS Assignment of Subprocess Process control

RESPONSE DATA Response Data Part Risk management

RESPONSE VALIDATE Response Validation Risk management

RISK DATA Risk Details Process controlRisk management

RISK VALIDATE Risk Validation Risk management

SUBPROCESS COR_GLOB Assignment of global control tosubprocess, control objective, andrisk

Process control

SUBPROCESS COR_ORG Assignment of referenced control tosubprocess, control objective andrisk

Process control

SUBPROCESS DATA Local subprocess attributes Process control

SUBPROCESS INSCOPE Subprocess Scoping Information Process control

XCONTROL DATA Basic data of control Process control

XCONTROL TDATA Test attributes of control Process control

XECONTROL DATA Basic data of indirect Entity-LevelControl

Process control

XECONTROL TDATA Test attributes of indirect Entity-

Level Control

Process control

8 Appendix A: PC and RM

8.4 Authorization Object Elements

2012-06-18 PUBLIC 81 /98

Page 82: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 82/98

 This page is left blank for documents that are printed on both sides.

Page 83: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 83/98

9 Appendix B: AC

The information in this section applies only to SAP Access Control. It contains the details about the

delivered roles, authorization objects, and authorization fields.

9.1 Delivered Roles and Relevant Authorization Objects

This section lists the delivered access control roles and the relevant authorization objects.

9.1.1 Roles Relevant Across All Features

The roles delivered by the access control application are relevant to specific features, such as risk

management, emergency access management, and so on. This section covers the roles that are relevant

to all the access control features.

The following table lists the delivered roles and the relevant authorization objects:

Role Objects

SAP_GRAC_ALL ■ GRAC_ALERT■ GRAC_ASIGN 

■ GRAC_BGJOB

■ GRAC_BPROC

■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_EMPLY

■ GRAC_FFOWN 

■ GRAC_FUNC

■ GRAC_HROBJ

■ GRAC_MITC

■ GRAC_ORGRL■ GRAC_OUNIT

■ GRAC_OWNER

■ GRAC_PROF

■ GRAC_RA

■ GRAC_RCODE

■ GRAC_REP

■ GRAC_RISK 

■ GRAC_RLMM

■ GRAC_ROLED

■ GRAC_ROLEP

■ GRAC_ROLER

■ GRAC_RSET

9 Appendix B: AC

9.1 Delivered Roles and Relevant Authorization Objects

2012-06-18 PUBLIC 83 /98

Page 84: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 84/98

Role Objects

■ GRAC_SUPP

■ GRAC_SYS

■ GRAC_USER

■ GRFN_CONN 

SAP_GRAC_BASE ■ GRAC_BGJOB

■ GRAC_REQ 

■ GRAC_USER

SAP_GRAC_DISPLAY ■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_EMPLY

■ GRAC_FFOBJ

■ GRAC_FFOWN 

■ GRAC_FUNC

■ GRAC_HROBJ

■ GRAC_MITC■ GRAC_ORGRL

■ GRAC_OUNIT

■ GRAC_OWNER

■ GRAC_PROF

■ GRAC_RCODE

■ GRAC_REQ 

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_SYS■ GRAC_USER

■ GRFN_CONN 

SAP_GRAC_REPORTS ■ GRAC_ALERT

■ GRAC_ASIGN 

■ GRAC_BPROC

■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_EMPLY

■ GRAC_FFOBJ

■ GRAC_FFOWN 

■GRAC_FUNC

■ GRAC_HROBJ

■ GRAC_MITC

■ GRAC_ORGRL

■ GRAC_OUNIT

■ GRAC_OWNER

■ GRAC_PROF

■ GRAC_RA

■ GRAC_RCODE

■ GRAC_REP

■ GRAC_REQ 

■ GRAC_RISK 

■ GRAC_ROLED

9 Appendix B: AC

9.1 Delivered Roles and Relevant Authorization Objects

84 /98 PUBLIC 2012-06-18

Page 85: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 85/98

Role Objects

■ GRAC_ROLER

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_SYS■ GRAC_USER

■ GRFN_CONN 

9.1.2 Role Management

The following table lists the delivered roles and the relevant authorization objects for role management:

Role Name Objects

SAP_GRAC_ROLE_MGMT_ADMIN  ■ GRAC_CPROF

■ GRAC_CROLE■ GRAC_FUNC

■ GRAC_ORGRL

■ GRAC_OWNER

■ GRAC_RA

■ GRAC_REP

■ GRAC_RISK 

■ GRAC_RLMM

■ GRAC_ROLED

■ GRAC_RSET

■ GRAC_SUPP

■GRFN_CONN 

SAP_GRAC_ROLE_MGMT_DESIGNER ■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_FUNC

■ GRAC_ORGRL

■ GRAC_OWNER

■ GRAC_RA

■ GRAC_REP

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_RSET

■GRAC_SUPP

■ GRFN_CONN 

SAP_GRAC_ROLE_MGMT_ROLE_OWNER ■ GRAC_REP

■ GRAC_ROLED

■ GRFN_CONN 

SAP_GRAC_ROLE_MGMT_USER ■ GRAC_ROLED

■ GRFN_CONN 

9.1.3 Access Request

The following table lists the delivered roles and the relevant authorization objects for access request:

9 Appendix B: AC

9.1 Delivered Roles and Relevant Authorization Objects

2012-06-18 PUBLIC 85 /98

Page 86: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 86/98

Role Name Objects

SAP_GRAC_ACCESS_APPROVER ■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_EMPLY

■ GRAC_FUNC■ GRAC_ORGRL

■ GRAC_RA

■ GRAC_REQ 

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_ROLEP

■ GRAC_RSET

■ GRAC_SUPP R

■ GRAC_SYS

■ GRAC_USE

SAP_GRAC_ACCESS_REQUEST_ADMIN  ■ GRAC_CPROF■ GRAC_CROLE

■ GRAC_EMPLY

■ GRAC_FUNC

■ GRAC_ORGRL

■ GRAC_OWNER

■ GRAC_RA

■ GRAC_REP

■ GRAC_REQ 

■ GRAC_RISK 

■ GRAC_ROLED

■GRAC_ROLEP

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_SYS

■ GRAC_ USER

SAP_GRAC_ACCESS_REQUESTER ■ GRAC_EMPLY

■ GRAC_REQ 

■ GRAC_ROLED

■ GRAC_ROLEP

■ GRAC_SYS

■ GRAC_USER

9.1.4 Emergency Access Management

The following table lists the delivered roles and the relevant authorization objects for emergency access

management:

Role Name Objects

SAP_GRAC_SUPER_USER_MGMT_ADMIN  ■ GRAC_ASIGN 

■ GRAC_OWNER

■ GRAC_RCODE

■ GRAC_REP

9 Appendix B: AC

9.1 Delivered Roles and Relevant Authorization Objects

86 /98 PUBLIC 2012-06-18

Page 87: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 87/98

Role Name Objects

■ GRAC_ROLED

■ GRAC_USER

SAP_GRAC_SUPER_USER_MGMT_CNTLR ■ GRAC_ASIGN 

■ GRAC_OWNER

■ GRAC_REP

SAP_GRAC_SUPER_USER_MGMT_OWNER ■ GRAC_ASIGN 

■ GRAC_OWNER

■ GRAC_RCODE

■ GRAC_ROLED

■ GRAC_USER

SAP_GRAC_SUPER_USER_MGMT_USER ■ GRAC_RCODE

■ GRAC_USER

■ GRFN_CONN 

9.1.5 Access Risk Analysis

The following table lists the delivered roles and the relevant authorization objects for access risk analysis:

Role Name Objects

SAP_GRAC_ALERTS ■ GRAC_ALERT

■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_FUNC

■ GRAC_HROBJ■ GRAC_ORGRL

■ GRAC_PROF

■ GRAC_RA

■ GRAC_REP

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_ROLER

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_USER

■GRFN_CONN 

SAP_GRAC_CONTROL_APPROVER ■ GRAC_ALERT

■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_FUNC

■ GRAC_HROBJ

■ GRAC_MITC

■ GRAC_ORGRL

■ GRAC_OUNIT

■ GRAC_OWNER

■ GRAC_PROF

■ GRAC_RA

■ GRAC_REP

9 Appendix B: AC

9.1 Delivered Roles and Relevant Authorization Objects

2012-06-18 PUBLIC 87 /98

Page 88: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 88/98

Role Name Objects

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_ROLER

■ GRAC_RSET■ GRAC_SUPP

■ GRAC_USER

SAP_GRAC_CONTROL_MONITOR ■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_FUNC

■ GRAC_HROBJ

■ GRAC_MITC

■ GRAC_ORGRL

■ GRAC_OUNIT

■ GRAC_OWNER

■ GRAC_PROF■ GRAC_RA

■ GRAC_REP

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_ROLER

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_USER

SAP_GRAC_CONTROL_OWNER ■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_FUNC■ GRAC_HROBJ

■ GRAC_MITC

■ GRAC_ORGRL

■ GRAC_OUNIT

■ GRAC_OWNER

■ GRAC_PROF

■ GRAC_RA

■ GRAC_REP

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_ROLER

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_USER

SAP_GRAC_FUNCTION_APPROVER ■ GRAC_FUNC GRFN_CONN 

SAP_GRAC_RISK_ANALYSIS ■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_FUNC

■ GRAC_HROBJ

■ GRAC_ORGRL

■ GRAC_PROF

■GRAC_RA

9 Appendix B: AC

9.1 Delivered Roles and Relevant Authorization Objects

88 /98 PUBLIC 2012-06-18

Page 89: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 89/98

Role Name Objects

■ GRAC_REP

■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_ROLER■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_USER

■ GRFN_CONN 

SAP_GRAC_RISK_OWNER ■ GRAC_FUNC

■ GRAC_HROBJ

■ GRAC_ORGRL

■ GRAC_OWNER

■ GRAC_PROF

■ GRAC_RA

■ GRAC_REP■ GRAC_RISK 

■ GRAC_ROLED

■ GRAC_ROLER

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_USER

SAP_GRAC_RULE_SETUP ■ GRAC_CPROF

■ GRAC_CROLE

■ GRAC_FUNC

■ GRAC_ORGRL

■ GRAC_REP■ GRAC_RISK 

■ GRAC_RSET

■ GRAC_SUPP

■ GRAC_SYS

■ GRFN_CONN 

9.1.6 Workflow 

The following table lists the delivered roles and the relevant authorization objects for workflow:

Role Name Object

SAP_GRC_MSMP_WF_ADMIN_ALL GRFN_MSMP

SAP_GRC_MSMP_WF_CONFIG_ALL GRFN_MSMP

9.2 Authorization Objects and Relevant Fields

The authorization objects for the access control application use specific authorization fields.

The following table lists the authorization fields that are available for each authorization object:

9 Appendix B: AC

9.2 Authorization Objects and Relevant Fields

2012-06-18 PUBLIC 89 /98

Page 90: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 90/98

Object Fields

1 GRAC_ALERT ■ ACTVT

■ GRAC_ALRTT

2 GRAC_ASIGN   ■ ACTVT

■ GRAC_OWN_T

3 GRAC_BGJOB ■ ACTVT

■ GRAC_BGJOB

4 GRAC_BPROC ■ ACTVT

■ GRAC_BPROC

5 GRAC_CPROF ■ ACTVT

■ GRAC_CPROF

6 GRAC_CROLE ■ ACTVT

■ GRAC_CROLE

7 GRAC_EMPLY ■ ACTVT

■ GRAC_COMP■ GRAC_COSTC

■ GRAC_DEPT

■ GRAC_LOCTN 

8 GRAC_FFOBJ ■ ACTVT

■ GRAC_FFOBJ

■ GRAC_SYSID

9 GRAC_FFOWN   ■ ACTVT

■ GRAC_OWN_T

■ GRAC_SYSID

■ GRAC_USER

10 GRAC_FUNC ■ ACTVT

■ GRAC_ACT

■ GRAC_FUNC

■ GRAC_PRM

11 GRAC_HROBJ ■ ACTVT

■ GRAC_HROBJ

■ GRAC_HRTYP

■ GRAC_SYSID

12 GRAC_MITC ■ ACTVT

■ GRAC_MITC

■GRAC_OUNIT

13 GRAC_ORGRL ■ ACTVT

■ GRAC_ORGRL

14 GRAC_OUNIT ■ ACTVT

■ GRAC_OUNIT

■ GRAC_OUTYP

15 GRAC_OWNER ■ ACTVT

■ GRAC_CLASS

■ GRAC_OUNIT

■ GRAC_OWN_T

■ GRAC_SYSID

■ GRAC_USER

9 Appendix B: AC

9.2 Authorization Objects and Relevant Fields

90 /98 PUBLIC 2012-06-18

Page 91: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 91/98

Object Fields

16 GRAC_PROF ■ ACTVT

■ GRAC_PROF

■ GRAC_SYSID

17 GRAC_RA ■ ACTVT

■ GRAC_OTYPE

■ GRAC_RAMOD

■ GRAC_REPT

18 GRAC_RCODE ■ ACTVT

■ GRAC_RSCOD

■ GRAC_SYSID

19 GRAC_REP ■ ACTVT

■ GRAC_REPID

20 GRAC_REQ   ■ ACTVT

■GRAC_BPROC

■ GRAC_FNCAR

■ GRAC_RQFOR

■ GRAC_RQINF

■ GRAC_RQTYP

21 GRAC_RISK   ■ ACTVT

■ GRAC_BPROC

■ GRAC_RISK 

■ GRAC_RLVL

■ GRAC_RSET

■ GRAC_RTYPE

22 GRAC_RLMM ■ ACTVT■ GRAC_RLMMT

23 GRAC_ROLED ■ GRAC_ACTRD

■ GRAC_BPROC

■ GRAC_LDSCP

■ GRAC_RLSEN 

■ GRAC_RLTYP

■ GRAC_ROLE

24 GRAC_ROLEP ■ ACTVT

■ GRAC_BPROC

■ GRAC_OUNIT

■ GRAC_RLTYP■ GRAC_ROLE

■ GRAC_SYSID

25 GRAC_ROLER ■ ACTVT

■ GRAC_OUNIT

■ GRAC_ROLE

■ GRAC_ROTYP

■ GRAC_SYSID

26 GRAC_RSET ■ ACTVT

■ GRAC_RSET

27 GRAC_SUPP ■ ACTVT

9 Appendix B: AC

9.2 Authorization Objects and Relevant Fields

2012-06-18 PUBLIC 91 /98

Page 92: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 92/98

Object Fields

28 GRAC_SYS ■ ACTVT

■ GRAC_APPTY

■ GRAC_ENVRM

■ GRAC_SYSID

29 GRAC_USER ■ ACTVT

■ GRAC_CLASS

■ GRAC_OUNIT

■ GRAC_SYSID

■ GRAC_USER

■ GRAC_UTYPE

9.3 Authorization Fields

This section covers the technical names for the authorization fields and their descriptions.

For information about the fields that are relevant for specific authorization objects, see Authorization

Objects and Relevant Fields.

Field Name Description

1 GRAC_ACT Action

2 GRAC_ACTRD Activities

3 GRAC_ALRTT Alert type

4 GRAC_APPTY Application type

5 GRAC_BPROC Business process6 GRAC_BSUBP Subprocess

7 GRAC_CLASS User group

8 GRAC_COMP Company

9 GRAC_COSTC Cost center

10 GRAC_CPROF Profile name

11 GRAC_CROLE Role name

12 GRAC_CTRID SOD control ID

13 GRAC_DEPT Department

14 GRAC_ENVRM System environment

15 GRAC_FFOBJ Description for user ID or role

16 GRAC_FNCAR Functional area

17 GRAC_FUNC Function ID

18 GRAC_HROBJ HR object ID

19 GRAC_HRTYP HR object type

20 GRAC_LDSCP Connector group

21 GRAC_LOCTN Location

22 GRAC_MITC SOD control ID

23 GRAC_MON Owner description

24 GRAC_OLVL Resource extension

9 Appendix B: AC

9.3 Authorization Fields

92 /98 PUBLIC 2012-06-18

Page 93: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 93/98

Field Name Description

25 GRAC_ORGRL Organization rule ID

26 GRAC_OTYPE Object types for authorization

27 GRAC_OUNIT HR object ID28 GRAC_OUTYP Object type for assigned organization

29 GRAC_OWN_T Owner type

30 GRAC_PRM SOD resource

31 GRAC_PROF Profile name

32 GRAC_RAMOD Risk analysis mode

33 GRAC_REPID Report name

34 GRAC_REPT Report type

35 GRAC_RISK Access risk ID

36 GRAC_RLMMT Type for role mass maintenance

37 GRAC_RLSEN Role sensitivity

38 GRAC_RLTYP Role type

39 GRAC_RLVL SOD risk level

40 GRAC_ROLE Role name

41 GRAC_ROTYP Role type for risk analysis

42 GRAC_ROWN Owner description

43 GRAC_RQFOR Request for single or multiple user

44 GRAC_RQINF Request Information

45 GRAC_RQSOD SOD option for request

46 GRAC_RQTYP Request type

47 GRAC_RSCOD Title/Short name

48 GRAC_RSET Rule set ID

49 GRAC_RTYPE Access risk type

50 GRAC_SYSID Connector ID

51 GRAC_USER User ID

52 GRAC_USRTY Role type for request approver

53 GRAC_UTYPE User type

9.4 Values for Activity Field

The ACTVT field is used by almost every access control authorization object. The values you select

for the activity field controls the actions the role can perform using the authorization object, such as

delete or execute.

NOTE

The GRAC_ROLED authorization object does not use the ACTVT field; it uses the custom

attribute: GRAC_ACTRD.

9 Appendix B: AC

9.4 Values for Activity Field

2012-06-18 PUBLIC 93 /98

Page 94: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 94/98

The following table lists the available values you can select for the activity field based on the

authorization object:

Object Valid Activity Values

1 GRAC_ALERT Delete, Execute, Archive, Deactivate

2 GRAC_ASIGN Create or generate, Change, Display, Delete, Administer

3 GRAC_BPROC Create or generate, Change, Display, Delete, Execute, Assign

4 GRAC_BGJOB Create or generate, Display, Delete, Administer

5 GRAC_CPROF Create or generate, Change, Display, Delete, Execute, Assign

6 GRAC_CROLE Create or generate, Change, Display, Delete, Execute, Assign

7 GRAC_EMPLY Create or generate, Change, Display, Delete, Execute, Administer,Assign, Copy

8 GRAC_FFOBJ Create or generate, Change, Display, Delete

9 GRAC_FFOWN Create or generate, Change, Display, Delete, Archive, Administer10 GRAC_FUNC Create or generate, Change, Display, Delete, Execute, Generate,

Assign

11 GRAC_HROBJ Create or generate, Change, Display, Delete, Execute, Assign

12 GRAC_MITC Create or generate, Change, Display, Delete, Assign

13 GRAC_ORGRL Create or generate, Change, Display, Delete, Activate or Generate,

Execute, Assign

14 GRAC_OUNIT Create or generate, Change, Display, Delete, Execute, Assign

15 GRAC_OWNER Create or generate, Change, Display, Delete, Archive, Administer,Assign

16 GRAC_PROF Create or generate, Change, Display, Delete, Execute,Assign17 GRAC_RA Execute, Administer

18 GRAC_RCODE Create or generate, Change, Display, Delete

19 GRAC_REP Execute

20 GRAC_REQ Create or generate, Change, Display, Administer, Copy

21 GRAC_RISK Create or generate, Change, Display, Delete, Execute, Generate,Assign

22 GRAC_RLMM Perform

23 GRAC_ROLEP Assign

24 GRAC_ROLER Execute, Assign

25 GRAC_RSET Create or generate, Change, Display, Delete, Execute, Assign

26 GRAC_SUPP Create or generate, Change, Display, Delete

27 GRAC_SYS Create or generate, Change, Display, Delete, Execute, Assign

28 GRAC_USER Create or generate, Change, Display, Delete, Execute, Assign

9 Appendix B: AC

9.4 Values for Activity Field

94 /98 PUBLIC 2012-06-18

Page 95: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 95/98

SAP AGDietmar-Hopp-Allee 16

69190 WalldorfGermany 

T +49/18 05/34 34 34

F +49/18 05/34 34 20 www.sap.com

© Copyright 2012 SAP AG. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission

of SAP AG. The information contained herein may be changed without prior notice.

Some software products marketed by SAP AG and its distributors contain proprietary software components of other software

vendors.

Microsoft, Windows, Excel, Outlook, PowerPoint, Silverlight, and Visual Studio are registered trademarks of MicrosoftCorporation.

IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, z10, z/VM, z/ 

OS, OS/390, zEnterprise, PowerVM, Power Architecture, Power Systems, POWER7, POWER6+, POWER6, POWER, PowerHA,

pureScale, PowerPC, BladeCenter, System Storage, Storwize, XIV, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks,

OS/2, AIX, Intelligent Miner, WebSphere, Tivoli, Informix, and Smarter Planet are trademarks or registered trademarks of 

IBM Corporation.

Linux is the registered trademark of Linus Torvalds in the United States and other countries.

Adobe, the Adobe logo, Acrobat, PostScript, and Reader are trademarks or registered trademarks of Adobe Systems

Incorporated in the United States and other countries.

Oracle and Java are registered trademarks of Oracle and its affiliates.

UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.

Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered

trademarks of Citrix Systems Inc.

HTML, XML, XHTML, and W3C are trademarks or registered trademarks of W3C®, World Wide Web Consortium,

Massachusetts Institute of Technology.

Apple, App Store, iBooks, iPad, iPhone, iPhoto, iPod, iTunes, Multi-Touch, Objective-C, Retina, Safari, Siri, and Xcode are

trademarks or registered trademarks of Apple Inc.

IOS is a registered trademark of Cisco Systems Inc.

RIM, BlackBerry, BBM, BlackBerry Curve, BlackBerry Bold, BlackBerry Pearl, BlackBerry Torch, BlackBerry Storm,

BlackBerry Storm2, BlackBerry PlayBook, and BlackBerry App World are trademarks or registered trademarks of Research

in Motion Limited.

Google App Engine, Google Apps, Google Checkout, Google Data API, Google Maps, Google Mobile Ads, Google Mobile

Updater, Google Mobile, Google Store, Google Sync, Google Updater, Google Voice, Google Mail, Gmail, YouTube, Dalvik

and Android are trademarks or registered trademarks of Google Inc.

INTERMEC is a registered trademark of Intermec Technologies Corporation.Wi-Fi is a registered trademark of Wi-Fi Alliance.

Bluetooth is a registered trademark of Bluetooth SIG Inc.

Motorola is a registered trademark of Motorola Trademark Holdings LLC.

Computop is a registered trademark of Computop Wirtschaftsinformatik GmbH.

SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, SAP HANA, and other

SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP

AG in Germany and other countries.

Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius,

and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered

trademarks of Business Objects Software Ltd. Business Objects is an SAP company.

Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein

as well as their respective logos are trademarks or registered trademarks of Sybase Inc. Sybase is an SAP company.

2012-06-18 PUBLIC 95 /98

Page 96: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 96/98

Crossgate, m@gic EDDY, B2B 360°, and B2B 360° Services are registered trademarks of Crossgate AG in Germany and other

countries. Crossgate is an SAP company.

All other product and service names mentioned are the trademarks of their respective companies. Data contained in this

document serves informational purposes only. National product specifications may vary.

These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies(“SAP Group”) for informational purposes only, without representation or warranty of any kind, and SAP Group shall not

be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are

those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein

should be construed as constituting an additional warranty.

Disclaimer

Some components of this product are based on Java™. Any code change in these components may cause unpredictable and

severe malfunctions and is therefore expressly prohibited, as is any decompilation of these components.

Any Java™ Source Code delivered with this product is only to be used by SAP’s Support Services and may not be modified or

altered in any way.

Documentation in the SAP Service Marketplace

You can find this document at the following address: http://service.sap.com/instguides

96 /98 PUBLIC 2012-06-18

Page 97: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 97/98

Page 98: Process Control 10.0.pdf

7/22/2019 Process Control 10.0.pdf

http://slidepdf.com/reader/full/process-control-100pdf 98/98

SAP AGDietmar-Hopp-Allee 1669190 WalldorfGermany T +49/18 05/34 34 34F +49/18 05/34 34 20

 www.sap.com


Recommended