GRC 12
GRC 12
1 Document History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
7 Application Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
7.1 Business Catalog Roles for FLP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
7.2 Delivered Business Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
7.3 Authorization Object Names. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
7.4 Authorization Objects and Relevant Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Authorization Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Values for ACTVT Field. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Values for GRAC_ACTRD Field. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
7.5 Business Roles and Authorization Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Roles Relevant Across All Capabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Role Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Access Request. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Emergency Access Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Access Risk Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Workflow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
8 Data Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Note
Before you start the implementation, make sure you have the latest version of this document. You can find
the latest version at: http://help.sap.com.
SAP Access Control is an enterprise software application that enables organizations to control access and
prevent fraud across the enterprise, while minimizing the time and cost of compliance. The application
streamlines compliance processes, including access risk analysis and remediation, business role management,
access request management, emergency access maintenance, and periodic compliance certifications. It
delivers visibility of the current risk situation with real-time data.
The security guide provides an overview of the application relevant security information. You can use this
document to implement system security, and the application security features.
Target Audience
The security guide is written for the following audience, and requires existing knowledge of SAP security model
and of PFCG, SU01, and Customizing tools:
● Technology consultants
● System administrators
This area covers the system security issues and addresses them in the following sections:
Access Control uses SAP NetWeaver, SAP NetWeaver Portal, and SAP NetWeaver Business Warehouse.
Therefore, the corresponding security guides and other documentation also apply.
Make sure that you have the up-to-date version of each SAP Note, available at https://help.sap.com/grc-ac.
The following is the component diagram for SAP Access Control 12.0.
You can use the information in this section to understand and implement the network and communication
security for SAP Access Control.
Network
SAP Access Control is based on SAP NetWeaver technology. Therefore, for information about network security,
see the respective sections in the SAP NetWeaver Security Guide at https://help.sap.com/nw75 > Security
Guide.
For more information, see the following sections in the SAP NetWeaver Security Guide:
Use
The following table contains the communication paths, the connection protocol, and the transferred data type
used by the access control solution:
Communication Path Protocol Type of Data Transferred Data Requiring Special Pro
tection
SAP NetWeaver ABAP server DIAG All application data Logon data
using SAP GUI
SAP NetWeaver Business Cli HTTP/HTTPS All application data Logon data
ent
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTPS
connections are protected using the Secure Sockets Layer (SSL) protocol.
More Information
Use
You can set up trusted and trusting Remote Function Call (RFC) relationships between two SAP systems. This
allows secure RFC connections between the systems without sending passwords for logging on. The logon user
must have the corresponding authorization object S_RFCACL in the trusting system. This trusted relationship
is not specific to GRC applications, and is a function of SAP NetWeaver.
More Information
Trusted/Trusting Relationships Between SAP Systems on the SAP Help Portal under RFC Programming in
ABAP.
The table lists the RFC authorization objects and values you must add to the RFC user to allow Access Control
to communicate with other SAP and non-SAP solutions.
BAPT
RFC1
SDIF
SDIFRUNTIME
SDTX
SUNI
SUSR
SUUS
SU_USER
SYST
SYSU
RFC_TYPE FUGR
DICBERCLS &NC&
SC
SS
ZV&G
ZV&H
ZV&N
ACT_GROUP *
OBJECT *
ACT_GROUP *
CLASS *
PROFILE *
SUBSYSTEM *
OBJECT *
DEVCLASS SUSO
OBJNAME /GRCPI/*
OBJTYPE FUGR
P_GROUP *
03
06
ADGRP BC01
1001
ISTAT *
OTYPE *
PLVAR *
PPFCODE *
SUBTYP *
● supports the Single Sign-On (SSO) mechanisms provided by SAP NetWeaver Application Server ABAP.
● supports the security guidelines for user management and authentication described in the SAP NetWeaver
Application Server Security Guide.
● leverages the SAP NetWeaver ABAP Server and SAP NetWeaver Portal infrastructure.
For more information about SNC, see Secure Network Communications (SNC) in the SAP NetWeaver
Application Server Security Guide.
For more information about SAP Logon Tickets, see SAP Logon Tickets in the SAP NetWeaver Application
Server Security Guide.
Client Certificates
For more information about X.509 Client Certificates, see Using X.509 Client Certificates on the SAP Help
Portal (http://help.sap.com ).
Master data and transaction data is stored in the database of the SAP system on which the application is
installed. Data storage occurs in Organizational Management, Case Management and in separate tables for this
purpose.
In some applications, you can upload documents into the system. The default document management system
(DMS) for storing data is the SAP Content Server and Knowledge Provider (KPro) infrastructure. Once
uploaded, the documents can be accessed using a URL. The application security functions govern
authorization for accessing the URL directly in the portal. To prevent unauthorized access to the document
through copying and sending the URL, a URL is only valid for a given user and for a restricted amount of time
(the default is two hours).
If you choose to implement a different document management system, the data storage security issues are
deferred to that particular DMS.
For information about trace and log files, see the SAP Access Control 12.0 Admin Guide at https://
help.sap.com/grc-ac.
Access Control provides the ability to upload documents. We recommend you scan all documents for potential
malicious code before you upload them. You can use the NetWeaver Virus Scan Interface (NW VSI) to scan the
documents. For more information, see SAP Virus Scan Interface in the SAP NetWeaver Library.
SAP Access Control relies on the user management and authentication mechanisms provided with the SAP
NetWeaver platform, in particular the SAP NetWeaver AS for ABAP Application Server. Therefore, the security
recommendations and guidelines for user administration and authentication as described in the SAP
NetWeaver Application Server for ABAP Security Guide also apply to SAP Access Control.
This table shows the tools available for user management and administration.
Tool Description
User maintenance for ABAP-based systems (transaction For more information about the authorization objects pro
SU01) vided by SAP Access Control, see the Authorization Objects
sections.
Role maintenance with the profile generator for ABAP-based For more information about, see the Delivered Roles sec
systems (PFCG) tions.
Central User Administration (CUA) for the maintenance of For central administration tasks
multiple ABAP-based systems
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy
may specify that individual users who perform tasks interactively have to change their passwords on a regular
● Individual users
○ Dialog users - used for SAP GUI for Windows
○ Internet users - used for Web Applications
● Technical users
● Service users are dialog users who are available for a large set of anonymous users
● Communication users are used for dialog-free communication between systems
● Background users are used for processing in the background
SAP Fiori launchpad is a shell that hosts SAP Fiori apps, and provides the apps with services such as
navigation, personalization, embedded support, and application configuration. SAP Access Conrol 12.0 uses
the on-premise implementation, therefore users and authentication are maintained using the the mechanisms
provided with the SAP NetWeaver Application Server for ABAP.
Fore more information, see the SAP NetWeaver Application Server for ABAP Security Guide.
The information in this section explains the application authorizations model and concepts.
Access Control leverages the standard SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP
NetWeaver Portal user management and authorization. The security information for SAP NetWeaver, SAP
NetWeaver Application Server ABAP, and SAP NetWeaver Portal also apply.
For information about SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver Portal
see the SAP NetWeaver, SAP NetWeaver Application Server ABAP, and SAP NetWeaver Portal security guides.
Prerequisites
For more information about Access Control concepts and features, see the SAP Access Control 12.0 Application
Help at http://help.sap.com/grc-ac .
You can configure user-specific front-end screens and menus in the Customizing activities accessed from the
SPRO transaction.
Caution
SAP does not recommend you customize the information architecture because if SAP provides updates to
the content, then such changes update only the standard SAP-delivered repository and Launchpads. The
changes do not directly update any customized versions.
You carry out the configuration activities from the transaction SPRO, SAP Reference IMG Governance, Risk,
and Compliance General Settings Maintain Customer Specific Menus .
Notify your users as required by your company's privacy policy that user information such as first Name, last
Name, E-mail address, roles, and other personal information is stored by the program
GRAC_REPOSITORY_OBJECT_SYNC.
Maintaining Authorizations
Access Control uses object level authorizations. Authorizations are granted to users based on the
authorizations of specific roles and the authorization objects assigned to those roles. To maintain the
authorizations, you use PFCG and the information in this guide about the delivered roles and authorization
objects.
SAP provides a set of sample roles for Access Control, which include recommended authorizations. You can
create your own PFCG roles or copy the sample roles to your customer namespace. Then modify them as
needed.
This information is relevant for customers who have implemented SAP Fiori Launchpad (FLP). SAP Fiori
launchpad is a shell that hosts SAP Fiori apps, and provides the apps with services such as navigation,
personalization, embedded support, and application configuration.
Role administrators make tile catalogs and groups available on the end user's page by assigning tile catalogs
and tile groups to a PFCG role to which users can be assigned. Users logging on to the launchpad see all
assigned groups on their home page, and when users open the catalog section, they can access all tiles in the
assigned catalogs.
SAP Access Control delivers the following business catalog roles for the FLP.
Name Description
Access Control leverages the SAP NetWeaver authorization model and assigns authorizations to users based
on roles. The following sample roles are delivered with the application. You must copy them into your own
namespace to use them.
Note
You must assign this role to the WF-BATCH user.
All AC SAP_GRAC_REPORTS Ability to run all AC reports and have the display ac
cess for all drill-downs.
Access Request SAP_GRAC_ACCESS_REQUESTER The role for the access request end user
Access Request SAP_GRAC_ACCESS_APPROVER The role for the access request approver
Access Request SAP_GRAC_ACCESS_REQUEST_ADMIN The role for the access request administrator
Emergency Access Man SAP_GRAC_SUPER_USER_MGMT_ADMIN This administrator role is for centralized firefighting
agement
Emergency Access Man SAP_GRAC_SUPER_USER_MGMT_OWNER This owner role is for centralized firefighting
agement
Emergency Access Man SAP_GRAC_SUPER_USER_MGMT_CNTLR This controller role is for centralized firefighting
agement
Emergency Access man SAP_GRAC_SUPER_USER_MGMT_USER This firefighter user role is for centralized firefighting
agement
Emergency Access Man SAP_GRIA_SUPER_USER_MGMT_ADMIN This firefighter admin role is for plug-in firefighting
agement
Emergency Access Man SAP_GRIA_SUPER_USER_MGMT_USER This firefighter user role is for plug-in firefighting
agement
Emergency Access Man SAP_GRC_SPM_FFID This service role is for ID-based firefighting. Assign
agement this role to users to create firefigher IDs.
Access Risk Analysis SAP_GRAC_RULE_SETUP This role has the authorization to define access rules
Access Control authorizations for roles are maintained by the assignment of authorization objects.
Note
For use with Fiori fact sheets, verify that the following authorization objects are in place: Mitigation Control
– GRAC-MITC, Role – GRAC-ROLED, Risk – GRAC-RISK, User – GRAC-USER
The table lists the authorization objects delivered with the application:
Object Description
2 GRAC_ALERT This object allows you to generate, clean up, and create alerts.
3 GRAC_ASIGN The object allows you to assign owner types to firefighter IDs.
4 The object allows you to create, read, update, and delete business proc
GRAC_BPROC esses, and to assign business processes to risks and functions.
7 The object allows you to create, read, update, and delete SoD critical pro
GRAC_CPROF files.
8 The object allows you to create, read, update, and delete SoD critical
GRAC_CROLE roles.
9 The object allows you to restrict activities based on the following attrib
utes: cost center, department, company, location. You use this object to
GRAC_EMPLY maintain authorization for attributes not in the in the GRAC_USER object.
11 The object allows you to create, read, update, and delete FFID owners
GRAC_FFOWN based on the owner type, user ID, or system ID.
12 The object allows you to maintain authorizations for the SoD function
based on the following attributes: activity, function ID, action (SOD trans
GRAC_FUNC action), and permission.
13 The object allows you to restrict activities for the HR object based on spe
GRAC_HROBJ cific attributes: activity, connector ID, HR object type, HR object ID.
16 GRAC_OUNIT The object allows you to maintain org units for access control.
19 The object allows you to perform risk analysis. You can specify if the user
has authorizations to only execute risk analysis, or has administrator
GRAC_RA rights.
25 This object allows you to enforce authorizations for accessing roles dur
GRAC_ROLED ing role definition.
26 GRAC_ROLEP This object allows you to control which roles a user can request.
28 GRAC_RSET The object allows you to create, read, update, and delete SoD rule sets.
29 The object allows you to create, read, update, and delete SoD supplemen
GRAC_SUPP tary rules.
32 The object allows you to restrict activities based on the following attrib
GRAC_USER utes: user group, user ID, connector, user group, orgunit.
33 This object allows you to access connectors in CCITS (the GRC integra
GRFN_CONN tion engine).
The authorization objects for Access Control use specific authorization fields.
The following table lists the authorization fields that are available for each authorization object:
Object Fields
1 ● GRAC_ACTN
GRAC_ACTN ● GRFNW_PRC
2 ● ACTVT
GRAC_ALERT ● GRAC_ALRTT
3 ● ACTVT
GRAC_ASIGN ● GRAC_OWN_T
4 ● ACTVT
GRAC_BGJOB ● GRAC_BGJOB
5 ● ACTVT
GRAC_BPROC ● GRAC_BPROC
6 ● ACTVT
GRAC_CGRP ● GRAC_CGRP
7 ● ACTVT
GRAC_CPROF ● GRAC_CPROF
8 ● ACTVT
GRAC_CROLE ● GRAC_CROLE
9 ● ACTVT
● GRAC_COMP
● GRAC_COSTC
● GRAC_DEPT
GRAC_EMPLY ● GRAC_LOCTN
10 ● ACTVT
● GRAC_FFOBJ
GRAC_FFOBJ ● GRAC_SYSID
11 ● ACTVT
● GRAC_OWN_T
● GRAC_SYSID
GRAC_FFOWN ● GRAC_USER
12 ● ACTVT
● GRAC_ACT
● GRAC_FUNC
GRAC_FUNC ● GRAC_PRM
13 ● ACTVT
● GRAC_HROBJ
● GRAC_HRTYP
GRAC_HROBJ ● GRAC_SYSID
14 ● ACTVT
● GRAC_MITC
GRAC_MITC ● GRAC_OUNIT
15 ● ACTVT
GRAC_ORGRL ● GRAC_ORGRL
16 ● ACTVT
● GRAC_OUNIT
GRAC_OUNIT ● GRAC_OUTYP
17 ● ACTVT
● GRAC_CLASS
● GRAC_OUNIT
● GRAC_OWN_T
● GRAC_SYSID
GRAC_OWNER ● GRAC_USER
18 ● ACTVT
● GRAC_PROF
GRAC_PROF ● GRAC_SYSID
19 ● ACTVT
● GRAC_OTYPE
● GRAC_RAMOD
GRAC_RA ● GRAC_REPT
20 ● ACTVT
● GRAC_RSCOD
GRAC_RCODE ● GRAC_SYSID
21 ● ACTVT
GRAC_REP ● GRAC_REPID
22 ● ACTVT
● GRAC_BPROC
● GRAC_FNCAR
● GRAC_RQFOR
● GRAC_RQINF
GRAC_REQ ● GRAC_RQTYP
23 ● ACTVT
● GRAC_BPROC
● GRAC_RISK
● GRAC_RLVL
● GRAC_RSET
GRAC_RISK ● GRAC_RTYPE
24 ● ACTVT
GRAC_RLMM ● GRAC_RLMMT
25 ● GRAC_ACTRD
● GRAC_BPROC
● GRAC_LDSCP
● GRAC_RLSEN
● GRAC_RLTYP
GRAC_ROLED ● GRAC_ROLE
26 ● ACTVT
● GRAC_BPROC
● GRAC_OUNIT
● GRAC_RLTYP
● GRAC_ROLE
GRAC_ROLEP ● GRAC_SYSID
27 ● ACTVT
● GRAC_OUNIT
● GRAC_ROLE
● GRAC_ROTYP
GRAC_ROLER ● GRAC_SYSID
28 ● ACTVT
GRAC_RSET ● GRAC_RSET
29 ● ACTVT
● GRAC_RQTP
GRAC_RT ● GRAC_TN
30 GRAC_SUPP ● ACTVT
31 ● ACTVT
● GRAC_APPTY
● GRAC_ENVRM
GRAC_SYS ● GRAC_SYSID
32 ● ACTVT
● GRACSYSACT
GRAC_SYSTM ● GRAC_SYSID
33 ● ACTVT
● GRAC_CLASS
● GRAC_OUNIT
● GRAC_SYSID
● GRAC_USER
GRAC_USER ● GRAC_UTYPE
34
Note
To allow users to view access request data in re
ports, you must assign this authorization object and
the activity A5 (display report) to their role.
GRFN_MSMP
This section covers the technical names for the authorization fields and their descriptions.
For information about the fields that are relevant for specific authorization objects, see Authorization Objects
and Relevant Fields.
1 GRAC_ACT Action
2 GRAC_ACTRD Activities
6 GRAC_BSUBP Subprocess
8 GRAC_COMP Company
13 GRAC_DEPT Department
17 GRAC_FUNC Function ID
18 GRAC_HROBJ HR object ID
21 GRAC_LOCTN Location
27 GRAC_OUNIT HR object ID
50 GRAC_SYSID Connector ID
52 GRAC_USER User ID
The ACTVT (or Activity) field is used by almost every Access Control authorization object. The values you
select for the ACTVT field controls the actions the role can perform with the authorization object, such as
delete or execute.
The GRAC_ROLED authorization object does not use the ACTVT field; it uses the custom attribute:
GRAC_ACTRD. For more information, see Values for GRAC_ACTRD Field [page 29].
The following table lists the values you can select for the ACTVT field based on the authorization object:
20 GRAC_REP Execute
23 GRAC_RLMM Perform
24 GRAC_ROLEP Assign
The GRAC_ACTRD field is used by the GRAC_ROLED authorization object for role definition.
The Ticket Number functionality in BRM allows you to attach ticket numbers to the workflow for role changes.
The V8 value in the GRAC_ACTRD field enables the user to edit and overwrite the ticket number in all role
methodology steps. Without this value, the user can only enter or change the ticket number when the role is in
Create mode or in Completed status.
This section lists and explains the delivered roles and relavant authorization objects for SAP Access Control
12.0.
Some roles are relevant for all access control capabilities, whereas some roles are only relevant for specific
capabilities. The information in the following sections is divided by capabilities.
The following table lists the delivered roles that are relevant across all Access Control capabilities, and the
relevant authorization objects:
Role Objects
SAP_GRAC_ALL ● GRAC_ALERT
● GRAC_ASIGN
● GRAC_BGJOB
● GRAC_BPROC
● GRAC_CGRP
● GRAC_CPROF
● GRAC_CROLE
● GRAC_EMPLY
● GRAC_FFOWN
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_MITC
● GRAC_ORGRL
● GRAC_OUNIT
● GRAC_OWNER
● GRAC_PROF
● GRAC_RA
● GRAC_RCODE
● GRAC_REP
● GRAC_RISK
● GRAC_RLMM
● GRAC_ROLED
● GRAC_ROLEP
● GRAC_ROLER
● GRAC_RSET
● GRAC_RT
● GRAC_SUPP
● GRAC_SYS
● GRAC_SYSTM
● GRAC_USER
● GRFN_CONN
SAP_GRAC_BASE ● GRAC_BGJOB
● GRAC_REQ
● GRAC_USER
● S_START
SAP_GRAC_DISPLAY_ALL ● GRAC_CPROF
● GRAC_CROLE
● GRAC_EMPLY
● GRAC_FFOBJ
● GRAC_FFOWN
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_MITC
● GRAC_ORGRL
● GRAC_OUNIT
● GRAC_OWNER
● GRAC_PROF
● GRAC_RCODE
● GRAC_REQ
● GRAC_RISK
● GRAC_ROLED
● GRAC_RSET
● GRAC_RT
● GRAC_SUPP
● GRAC_SYS
● GRAC_SYSTM
● GRAC_USER
● GRFN_CONN
SAP_GRAC_REPORTS ● GRAC_ALERT
● GRAC_ASIGN
● GRAC_BPROC
● GRAC_CPROF
● GRAC_CROLE
● GRAC_EMPLY
● GRAC_FFOBJ
● GRAC_FFOWN
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_MITC
● GRAC_ORGRL
● GRAC_OUNIT
● GRAC_OWNER
● GRAC_PROF
● GRAC_RA
● GRAC_RCODE
● GRAC_REP
● GRAC_REQ
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLER
● GRAC_RSET
● GRAC_SUPP
● GRAC_SYS
● GRAC_SYSTM
● GRAC_USER
● GRFN_CONN
The following table lists the delivered roles and the relevant authorization objects for role management.
SAP_GRAC_ROLE_MGMT_ADMIN ● GRAC_CPROF
● GRAC_CROLE
● GRAC_FUNC
● GRAC_ORGRL
● GRAC_OWNER
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_RLMM
● GRAC_ROLED
● GRAC_RSET
● GRAC_SYS
● GRAC_SYSTM
● GRAC_SUPP
● GRFN_CONN
SAP_GRAC_ROLE_MGMT_DESIGNER ● GRAC_CPROF
● GRAC_CROLE
● GRAC_FUNC
● GRAC_ORGRL
● GRAC_OWNER
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_ROLED
● GRAC_RSET
● GRAC_SYS
● GRAC_SYSTM
● GRAC_SUPP
● GRFN_CONN
SAP_GRAC_ROLE_MGMT_ROLE_OWNER ● GRAC_REP
● GRAC_ROLED
● GRAC_SYSTM
● GRFN_CONN
SAP_GRAC_ROLE_MGMT_USER ● GRAC_ROLED
● GRFN_CONN
The following table lists the delivered roles and the relevant authorization objects for access request:
SAP_GRAC_ACCESS_APPROVER ● GRAC_CPROF
● GRAC_CROLE
● GRAC_EMPLY
● GRAC_FUNC
● GRAC_ORGRL
● GRAC_RA
● GRAC_REQ
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLEP
● GRAC_RSET
● GRAC_SUPP R
● GRAC_SYS
● GRAC_SYSTM
● GRAC_USE
SAP_GRAC_ACCESS_REQUEST_ADMIN ● GRAC_CPROF
● GRAC_CROLE
● GRAC_EMPLY
● GRAC_FUNC
● GRAC_ORGRL
● GRAC_OWNER
● GRAC_RA
● GRAC_REP
● GRAC_REQ
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLEP
● GRAC_RSET
● GRAC_RT
● GRAC_SUPP
● GRAC_SYS
● GRAC_SYSTM
● GRAC_USER
SAP_GRAC_ACCESS_REQUESTER ● GRAC_EMPLY
● GRAC_REQ
● GRAC_ROLED
● GRAC_ROLEP
● GRAC_SYS
● GRAC_SYSTM
● GRAC_USER
Emergency Access Management is available in centralized and decentralized (plug-in) implementations. The
role information is separated by the implementation scenario in the following sections.
The following table lists the delivered roles and the relevant authorization objects for centralized emergency
access management:
SAP_GRAC_SUPER_USER_MGMT_ADMIN ● GRAC_ASIGN
● GRAC_OWNER
● GRAC_RCODE
● GRAC_REP
● GRAC_ROLED
● GRAC_USER
SAP_GRAC_SUPER_USER_MGMT_CNTLR ● GRAC_ASIGN
● GRAC_OWNER
● GRAC_REP
SAP_GRAC_SUPER_USER_MGMT_OWNER ● GRAC_ASIGN
● GRAC_OWNER
● GRAC_RCODE
● GRAC_ROLED
● GRAC_USER
SAP_GRAC_SUPER_USER_MGMT_USER ● GRAC_RCODE
● GRAC_USER
● GRFN_CONN
For decentralized (plug-in) firefighting scenarios, the following roles are delivered.
The following table lists the delivered roles and the relevant authorization objects for access risk analysis:
SAP_GRAC_ALERTS ● GRAC_ALERT
● GRAC_CPROF
● GRAC_CROLE
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_ORGRL
● GRAC_PROF
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLER
● GRAC_RSET
● GRAC_SUPP
● GRAC_USER
● GRFN_CONN
SAP_GRAC_CONTROL_APPROVER ● GRAC_ALERT
● GRAC_CPROF
● GRAC_CROLE
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_MITC
● GRAC_ORGRL
● GRAC_OUNIT
● GRAC_OWNER
● GRAC_PROF
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLER
● GRAC_RSET
● GRAC_SUPP
● GRAC_USER
SAP_GRAC_CONTROL_MONITOR ● GRAC_CPROF
● GRAC_CROLE
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_MITC
● GRAC_ORGRL
● GRAC_OUNIT
● GRAC_OWNER
● GRAC_PROF
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLER
● GRAC_RSET
● GRAC_SUPP
● GRAC_USER
SAP_GRAC_CONTROL_OWNER ● GRAC_CPROF
● GRAC_CROLE
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_MITC
● GRAC_ORGRL
● GRAC_OUNIT
● GRAC_OWNER
● GRAC_PROF
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLER
● GRAC_RSET
● GRAC_SUPP
● GRAC_USER
SAP_GRAC_FUNCTION_APPROVER ● GRAC_FUNC
● GRAC_SYSTM
● GRFN_CONN
SAP_GRAC_RISK_ANALYSIS ● GRAC_CPROF
● GRAC_CGRP
● GRAC_CROLE
● GRAC_FUNC
● GRAC_HROBJ
● GRAC_ORGRL
● GRAC_PROF
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLER
● GRAC_RSET
● GRAC_SYSTM
● GRAC_SUPP
● GRAC_USER
● GRFN_CONN
SAP_GRAC_RISK_OWNER ● GRAC_FUNC
● GRAC_HROBJ
● GRAC_ORGRL
● GRAC_OWNER
● GRAC_PROF
● GRAC_RA
● GRAC_REP
● GRAC_RISK
● GRAC_ROLED
● GRAC_ROLER
● GRAC_RSET
● GRAC_SUPP
● GRAC_USER
SAP_GRAC_RULE_SETUP ● GRAC_CPROF
● GRAC_CROLE
● GRAC_FUNC
● GRAC_ORGRL
● GRAC_REP
● GRAC_RISK
● GRAC_RSET
● GRAC_SUPP
● GRAC_SYS
● GRAC_SYSTM
● GRFN_CONN
7.5.6 Workflow
The following table lists the delivered roles and the relevant authorization objects for workflow:
SAP_GRC_MSMP_WF_ADMIN_ALL GRFN_MSMP
SAP_GRC_MSMP_WF_CONFIG_ALL GRFN_MSMP
User data from ERP and non-ERP systems is synchronized to, and stored in, the Access Control system.
Note
In order to use this functionality, you must be at SAP Access Control 12.0, SP01.
The following data is synchronized to, and stored in, the Access Control system:
● Authorization data (role, user, profiles, HR objects), which contains the user IDs, email IDs, telephone
numbers, address, organizational assignments, etc.
● User logs and activity information
The Access Control solution supports the SAP Information Lifecycle Management (ILM) framework to maintain
data protection. This chapter describes how to use ILM to carryout blocking and destruction of data as
required by data protection policies.
Setting Up ILM
Note
SAP NetWeaver Information Lifecycle Management is a product that requires its own license. After
licensing, you have to activate this product.
2. Select the components that will use the ILM functionality: GRC, GRC-AC.
Use transaction SPRO, and complete the activity: Global ILM Enablement, under SAP Reference IMG
Governance, Risk, and Compliance General Settings Blocking and Deletion
3. Maintain the fiscal year variant for Access Control.
Use transaction SPRO, and open activity: Maintain Configuration Settings, under SAP Reference IMG
Governance, Risk, and Compliance Access Control .
Configure parameter 6001: Fiscal Year Variant
4. Configure the ILM rules for data retention.
Access Control provides ILM objects that enhance archiving objects with information for data retention. An
ILM object contains the settings for the ILM rules. These rules are read by Access Control while data
processing and, based on the rule condition, personal data is blocked and deleted.
Use transaction SPRO, complete the activity: ILM Entity Settings, under SAP Reference IMG
Governance, Risk, and Compliance General Settings Blocking and Deletion .
● To establish the Residence Rules and the Retention rules, use transaction IRMPOL. For any Residence Rule
(if blocking is required), use Audit area GRC.
● To designate objects to be blocked or destroyed (based on business need and legal requirements), use
transaction SPRO, and maintain the activity: Maintain Legal Entity, under SAP Reference IMG
Governance, Risk, and Compliance General Settings Blocking and Deletion .
● To verify you have configured your data blocking, use transaction GRAC_DATA_BLOCK.
● To unblock data, use transaction GRAC_DATA_UNBLOCK. Select the ILM object, and then click execute.
Select a record and click Unblock.
Objects remain unblocked until the next scheduled execution of the blocking job blocks them again.
Destruction
Use transaction code ILM_DESTRUCTION to verify your destruction policies. Select Data from the Database
and identify the ILM object. Use test mode.
Logs
Verification
Open Access Control and check the dates to see if your policies and rules are operating as intended. For
example, if you set up the data to be blocked after 2 years, check if any data is shown if you search for dates
older than 2 years.
Use ABAP Program GRFN_PI_DBTABLOG_COPY_DES to look at a Simple deletion report to delete contents of
GRC plugin system DB table /GRCPI/GRIA_AM_DBLOG
The Information Retrieval Framework (IRF) allows you to search for and retrieve all personal data of a specified
data subject. The search results are displayed in a comprehensive and structured list containing all personal
For information about IRF, setting up the data model used by IRF, and retrieving personal data using IRF, see
the Information Retrieval Guide attached to SAP Note: 2469325 .
Access Control does not deliver Read Access Logging (RAL) configurations and log conditions.
The table below lists the business entities for Access Control.
Note
Business Entities
Legal Entity or
Blocking Re Country Flag
Business Entity ILM Object Component quired (RST) Archiving Required Available
Verify the end-user can no longer access the personal data stored in blocked process tables. Authorization can
be given to specific users (like auditors) to read the personal data from blocked process tables.
69 Discard
94 Override
● Only the ILM Auditor can
have this activity to pro
tect the blocked data.
95 Unlock
GRC supports the SAP Information Lifecycle Management (ILM) framework for retention management.
Before using the archiving object for the first time, verify if the GRC Customizing activities under Blocking and
Deletion have been completed to enable the Information Lifecycle Management (ILM) capabilities. When you
use the archiving object GRACTUS, data is archived from the following tables:
Tables Programs
GRACACTUSAGE GRAC_ACTUSAGE_ARCHIVE_WRITE
GRAC_ACTUSAGE_ARCHIVE_DELETE
GRAC_ACTUSAGE_ARCHIVE_READ
Before using the archiving object for the first time, verify if the GRC Customizing activities under Blocking and
Deletion have been completed to enable the Information Lifecycle Management (ILM) capabilities. When you
use the archiving object GRFNMSMP, data is archived from the following tables:
Tables
GRFNMWRTINST
GRFNMWRTINSTAPPL
GRFNMWRTMSGLG
GRFNMWRTARCHCONF
GRACREQ
GRACREQPROVLOG
GRACREQOWNER
GRACREQUSER
GRACREQUSERADR
GRACREQUSERGROUP
GRACREQUSERPARAM
GRACREQPROVITEM
GRACREVITEM
GRACREQOMOBJITEM
GRACSODREVIEW
GRACFUNUSAGE
GRACSODUSERROLE
GRACUARBUSRLSNAP
GRFNMW_ARCHIVE_WRITE
GRFNMW_ARCHIVE_DELETE
GRFNMW_ARCHIVE_RELOAD
GRFNMW_ARCHIVE_READ
Use archiving object GRACEAM for archiving Emergency Access Management (EAM) logs.
Before using the archiving object for the first time, verify if the GRC Customizing activities under Blocking and
Deletion have been completed to enable the Information Lifecycle Management (ILM) capabilities. When you
use the archiving object GRACEAM, data is archived from the following tables:
● GRACAUDITLOG
● GRACACTUSAGE
● GRACSYSTEMLOG
● GRACCHANGELOG
● GRACOSCMDLOG
● GRACROLEFFLOG
● GRACFFLOG
● GRACFFREPMAPP
● GRAC_EAM_ARCHIVE_WRITE
● GRAC_EAM_ARCHIVE_DELETE
● GRAC_EAM_ARCHIVE_READ
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such
links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Gender-Related Language
We try not to use gender-specific word forms and formulations. As appropriate for context and readability, SAP may use masculine word forms to refer to all genders.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.