what is the landscape of GRC
Answers were Sorted based on User's Feedback
Answer / ramesh
For Best practice we required 2 systems.. DEV and PRD (recommended by SAP) But we can build 3 system landscape as well.DEV,QA and PRD.
Thanks
Ramesh
Is This Answer Correct ? | 6 Yes | 2 No |
Answer / kishore
GRC Landscape is 2 system landscape,
1. SAP GRC DEV
2. SAP GRC PRD
in GRC there is no Quality system.
Is This Answer Correct ? | 6 Yes | 7 No |
. Is it possible to have a request type by which we can change the validity period of a user? If possible, then what are the actions?
While run the risk analysis fir two user & its showing blank screen and other users its working fine , whats the reason?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
what is the difference between se16 and se16n ?
How to lock all the users at a time?
What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
1 Answers Accenture, Ernst Young,
what is the process to find that one consultant had removed a table from sap tables
This is in continuataion to the previous question. a user is assigned with tcode SA38.how to restrict him to execute only a few reports,say rsusr003.If you're going to modify the role(having sa38) assigned to the user,that will affect other users also because that role might be assigned to multiple users.I don' want that to happen.so what is the solution?
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one.
How to identify which Authorization Objects contains which fields \ activities?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security