a. Execute the Repository Object Sync and then re-execute the user level batch risk analysis. Correct* b. Execute the Authorization Synch and then re-execute the user level batch risk analysis. c. Execute the Action Usage Sync followed by the Role Usage Sync and ...
5) Assign the Roles needed to the Users, they are: SAP_GRC_ACREQ_CRE_APP SAP_GRC_ACREQ_MON_APP SAP_GRC_BCR_EMPLOYEE And that is it – check out the screenshots: (Note: These were taken on a Nexus 7 tablet) Overall – the installation and configuration for these two applications wer...
When i check the entry in NWBC=>Access Management=>ARA=>Search Requests? Select "Process ID=Firefighter Log Report Review Workflow - it is showing up as approved. We need to either grey out the return button or let the 2nd controller receive the log on selecting it. Any ideas?? Thank...
Risk within an enterprise can come from various sources including mergers/acquisitions requiring extensive integration in a business unit, new regulations that may be subject to varying interpretation or entry of a company into a new market with substantial exposure and return. By implementing a risk...