GRC12 Configuring Emergency Access Management
GRC12 Configuring Emergency Access Management
2018-03-28
1 Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1 About This Document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 EAM Terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 Overview of Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4 Creating Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
6 Decentralized Firefighting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
11 Configuration Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
SAP Access Control is an enterprise software application that enables organizations to control access and prevent
fraud across the enterprise, while minimizing the time and cost of compliance. The application streamlines
compliance processes, including access risk analysis and remediation, business role management, access request
management, emergency access maintenance, and periodic compliance certifications. It delivers
immediatevisibility of the current risk situation with real-time data.
The Emergency Access Management (EAM) capability enables you to implement your company’s policies for
managing emergency access. Users can create self-service requests for emergency access to systems and
applications. Business process owners can review requests for emergency access and grant access. Compliance
persons can perform periodic audits of usage and logs to monitor compliance with company guidelines.
This document describes the prerequisites and procedures for configuring Emergency Access Management. It
includes information for centralized and decentralized ID-based firefighting scenarios, and role-based firefighting.
You must have completed the following prerequisites before configuring EAM.
● You have completed the SAP Access Control 12.0 post-installation steps.
For more information, refer to the administrator guide at https://help.sap.com/viewer/p/
SAP_ACCESS_CONTROL.
● You have set up GRC connectors for all target systems.
See SAP NOTE 2413716 - Setup of Trusted RFC in GRC Access Control EAM.
● You have assigned the integration scenario SUPMG to all EAM relevant connectors.
● You have implemented User Exit per SAP Note 1545511 .
This restricts firefighter IDs from logging into target systems systems via SAP GUI.
● You have configured email settins (transaction SCOT).
● You have activated the following BC sets:
○ GRAC_SPM_CRITICALITY_LEVEL
○ GRAC_ACCESS_REQUEST_PRIORITY
○ GRC_MSMP_CONFIGURATION
○ GRAC_ACCESS_REQUEST_REQ_TYPE
Use
The following is the overall procedure for configuring Emergency Access Management (EAM).
Process
Emergency Access Management users include administrators, owners, controllers, and firefighters. The following
table describes each role and the delivered roles that contain the recommended authorizations.
Note
The delivered roles are sample roles. You must copy them into your own namespace if you want to use them.
Administrator Administrators have complete access to Emergency Access Management capability. They assign Fire
fighter IDs to owners and to Firefighters. Administrators run reports, maintain the data tables, and make
sure that the Reason Code table is current. Administrators can enable e-mail notifications for Controllers
through the Firefighter Assignment function and through Customizing.
Note
For decentralized firefighting scenarios, to enable the administrator to extend the validity period of
firefighting assignments you must create this role on the relevant plug-in systems. Assign the authori
zation object /GRCPI/001, and enter the ACTVT field value as 70 or * (asterisk).
Owner Owners can assign Firefighter IDs to Firefighters and define controllers. Owners can view the Firefighter
IDs assigned to them by the administrator. They cannot assign Firefighter IDs to themselves.
Note
For decentralized firefighting scenarios, to enable the owner to extend the validity period of firefighting
assignments you must create this role on the relevant plug-in systems. Assign the authorization ob
ject /GRCPI/001, and enter the ACTVT field value as blank (empty).
Controller Controllers monitor Firefighter ID usage by reviewing the log report or log report workflow and receiving
e-mail notification of Firefighter ID logon events.
Firefighter Firefighters can access Firefighter IDs assigned to them and can perform any tasks for which they have
authorization. Firefighters use the Firefighter ID logons to run transactions during emergency situations.
Note
For decentralized firefighting scenarios, to enable the firefighter to use the EAM Launchpad, you must
create this role on the relevant plug-in systems. Assign to the role the authorizations to use transac
tions /GRCPI/GRIA_EAM and SU53.
Firefighter ID The delivered role SAP_GRAC_SPM_FFID, when assigned to a user ID turns the ID into a Firefighter ID.
Assign the role the authorization object S_RFC to enable remote logon.
Note
This role is used only for ID-Based firefighting.
For more information about roles and authorization objects, see the SAP Access Control 10.0 Security Guide at
http://help.sap.com/grc-ac .
You can choose from the following application types to use for firefighting:
● ID-Based Firefighter: You provide Firefighter authorizations by assigning Firefighter IDs to users. The
Firefighters use the Emergency Access Management (EAM) Launchpad to access their firefighting IDs and the
relevant systems. Users can access the EAM Launchpad in the following ways:
○ Centralized (on the GRC system)
Log onto the GRC system, and use transaction GRAC_EAM to remotely access all authorized plug-in
systems. In this scenario, the GRC system and the EAM Launchpad provide a centralized access point to
the plug-in systems for firefighting.
○ Decentralized (on the plug-in systems)
Log onto the respective plug-in systems, and use transaction /GRCPI/GRIA_EAM to perform the
firefighting activities. In this scenario, as firefighting is performed locally on each of the plug-in systems,
you have uninterrupted firefighting access in case the GRC system is not available, however, you must
make sure you have user accounts on each of the plug-in systems.
Functions such as assignments, and reporting is still maintained in the GRC system. For more information,
see Decentralized Firefighting [page 10].
Note
Both centralized and decentralized options are always available. You do not need to enable one or the other.
For more information, see Configuring ID-based Firefighting. [page 15]
● Role-Based Firefighter: You create the Firefighter roles on the plug-in systems, and assign them to users on
the GRC system. The Firefighter directly logs onto the plug-in system using their user ID and performs
firefighting activities.
Note
You can use only one application type at a time.
To set the application type as either ID-Based or Role-Based, configure parameter 4000 in the Customizing
activity Maintain Configuration Settings, under Governance, Risks, and Compliance Access Control
Decentralized firefighting allows you to use the Emergency Access Management (EAM) Launchpad directly on the
plug-in systems to perform firefighting activities in case the GRC system is not available.
To use the decentralized EAM Launchpad on the plug-in system, open SAP GUI and run transaction /GRCPI/
GRIA_EAM. As this transaction is run locally, this also requires users to have accounts on the relevant plug-in
systems in order to perform firefighting.
The following graphic illustrates that, for decentralized firefighting, the majority of the functions are still
maintained in the GRC system. The following functions are available in the plug-in system:
You can also choose to maintain different role names for the Firefighter IDs for each plug-in system. For example,
on Plug-in System01 you use SAP_GRAC_EAM_FFID01 , and on Plug-in System02 you use
SAP_GRAC_EAM_FFID02.
You can configure this in the Customizing activity, Maintain Firefighter ID Role Name Per Connector, under
Governance, Risks, and Compliance Access Control Emergency Access Management .
The information in the following table describes which activities are maintained in the plug-system.
Activity Comments
Creating users on systems to enable use As the EAM Launchpad is initiated locally, the user must have a user account on the
of EAM Launchpad via SAP GUI. plug-in systems in order to perform firefighting.
Creating Firefighter IDs You create Firefighter IDs on each plug-in system and synchronize them to the GRC
repository.
For more information, see Creating and Maintaining Firefighter IDs [page 17].
Extend validity period for firefighting as You can extend the validity period for firefighting assignments on either the GRC sys
signments tem or the plug-in system
On the GRC system, open the Firefighter ID assignment and extend the assignment
period.
On the plug-in system, use the Customizing activities (transaction SPRO) to extend
the validity period for Firefighter assignments on the plug-system.
For more information, see Extending Validity Periods for Firefighting Assignments.
Enable Firefighter Logon E-mail notifi You can enable each plug-in system to notify the relevant firefighting controller when
cation. a Firefighter has logged into a firefighting session.
You can enable each plug-in system to The plug-in systems send notifications to the controllers and owners. This requires
notify the relevant firefighting controller user accounts for the controllers and owners on the plug-in systems.
when a Firefighter has logged into a fire
On the plug-in systems, use the Customizing activities (transaction SPRO) to enable
fighting session.
the notification.
For more information, see Maintaining E-mail Notifications for Emergency Access
Logons [page 24].
Customize text for Firefighter Logon E- You can adapt the text for the notifications for each plug-in system.
mail notification.
On the plug-in systems, use the Customizing activities (transaction SPRO) to enable
You can customize the text for the notifi the notification.
cations for each plug-in system.
For more information, see Maintaining E-mail Notifications for Emergency Access
Logons [page 24].
The following table describes which activities are maintained in the GRC system.
Activity Comments
Configure Emergency Access Maintenance The configuration and master data information is maintained in the GRC system
and related master data and pushed to the plug-in systems.
You must schedule periodic jobs for the application to sync the master data from
the GRC system to the corresponding plug-in systems. We recommend you
schedule the synchronization to run daily.
Synch .
Creating Firefighter IDs You create Firefighter IDs on each plug-in system and synchronize them to the
GRC repository.
For more information, see Creating and Maintaining Firefighter IDs [page 17].
Maintain Owners and Controllers for fire Maintained on the GRC system
fighting
Extend validity period for firefighting as You can extend the validity period for firefighting assignments on either the GRC
signments system or the plug-in system.
On the GRC system, open the Firefighter ID assignment and extend the assign
ment period.
On the plug-in system, use the Customizing activities (transaction SPRO) to ex
tend the validity period for Firefighter assignments on the plug-system.
For more information, see Extending Validity Periods for Firefighting Assignments.
Maintenance and Synchronize logs All logs and user maintenance activities are maintained on the GRC system. We
recommend scheduling the job for log collection to run every hour.
The GRC system should not be down for extended periods of time because it im
pacts collection of the logs.
Use
You can choose to have the application send e-mail notifications when a log has been created. You can also
customize the notification text. If you do not customize the text, the application uses the default message text.
Procedure
Centralized Firefighting
For the centralized firefighting scenarios, all e-mail notifications are handled on the GRC system.
Configure the following Customizing activities under Governance, Risks, and Compliance Access Control
Workflow Access Control .
Decentralized Firefighting
For the decentralized firefighting scenarios, E-mail Notifications for logs are handled on each plug-in system. You
maintain the following configuration settings for each plug-in system.
Configure the following Customizing activities under Governance, Risks, and Compliance (Plug-In) Access
Control .
Use
Prerequisites
Ensure users can access the GRC system and open the SAP GUI.
Process
The information in this section is required for configuring all ID-based firefighting.
Note
For additional steps required for decentralized firefighting, see the Additional Steps for Configuring
Decentralized ID-based Firefighting section below.
To configure decentralized firefighting, first complete the above tasks and then complete the following steps.
1. Ensure users have user accounts and roles on each of the plug-in systems to allow them to log on to each
system. Firefighters must be able to directly access each plug-in system and use the EAM Launchpad locally.
2. Enable decentralized firefighting.
On the GRC system, in Customizing (transaction SPRO) use the activity, Maintain Configuration Settings, under
Governance, Risks, and Compliance Access Control .
Set parameter 4015 – Enable Decentralized Firefighting to Yes.
3. Synchronize the master data from the GRC system to the plug-in systems.
In Customizing (transaction SPRO) use the activity, EAM Master Data Synch, under Governance, Risks, and
Compliance Access Control Synchronization Jobs .
4. Optionally, you can maintain different Firefighter ID role names for each plug-in system. For example, on Plug-
in System01 you use SAP_GRAC_EAM_FFID01 , and on Plug-in System 02 you use SAP_GRAC_EAM_FFID02.
1. On the GRC system, open Customizing (transaction SPRO).
2. Open the Customizing activity, Maintain Firefighter ID Role Name Per Connector, under Governance,
Risks, and Compliance Access Control Emergency Access Management .
3. Maintain the Firefighter ID Role names as needed.
5. Optionally, you can maintain separate Firefighter Logon e-mail notifications settings for each of the plug-in
systems.
○ To enable each plug-in system to send its own logon e-mail notifications, do the following:
1. On the plug-in system, open the Customizing activity, Maintain Plug-in Configuration Settings, under
Governance, Risks, and Compliance (Plug-In) Access Control .
2. For parameter 4008, set the value to 1.
○ To change the text of the logon e-mail notifications for each of the plug-in systems, maintain the following
Customizing activities:
○ Maintain Custom Notification Messages for Emergency Access Management (plug-In)
○ Maintain Text for Custom Notification Messages (Plug-In)
For more information, see Maintaining E-mail Notifications for Emergency Access Logons [page 24].
Note
These configuration steps are in addition to the main configuration steps for ID-based firefighting. Make sure
you complete the steps for creating and assigning owners, controllers, and Firefighters.
More Information
Use
You create Firefighter IDs by assigning the Firefighter ID role to a user account.
You can use either transaction SU01 or the access request functionality in Access Control to create Firefighter IDs.
This topic explains how to create and maintain Firefighter IDs using the access request functionality.
Note
You must create Firefighter IDs for each plug-in system and then synchronize them to the GRC repository.
Procedure
Note
You can use either transaction SU01 or the access request functionality in Access Control to create Firefighter
IDs. These steps explain how to create Firefighter IDs using the access request functionality.
You can also use the access request functionality to maintain, change, or delete the Firefighter IDs.
Note
You can type Firefighter, Owner, and Controller assignment entries directly into the Firefighter assignment
screens in addition to selecting entries using the F4 help.
If you mistakenly type an invalid entry, an error message appears at the top of the screen. Then you can
manually correct the entry or use F4 help to choose a valid entry
3. Optionally, if you want to reassign all of the assignments of a Firefighter ID, select Reassign.
4. Save the entry.
Use
You must assign owners to Firefighter IDs and Firefighter Roles. The Owners then assign Firefighter IDs to
Firefighters and define controllers.
Prerequisites
● For role-based firefighting, you have defined the Firefighter roles in the GRC system, and selected the Enable
for Firefighting checkbox on the Define Role screen under Access Management Role Management Role
Maintenance .
● For ID-based firefighting, you have defined a Firefighter ID role on the ERP system, and assigned the role the
remote logon authorization S_RFC.
Procedure
Note
If the Owner is not in the Access Control Owners table, a pop-up asks if you want it to be added and available
for future use. If you choose No, the Firefighter IID assignment is saved, but the Owner is not added to the
Access Control Owners table.
Note
You can type Firefighter, Owner, and Controller assignment entries directly into the Firefighter assignment
screens in addition to selecting entries using the F4 help.
If you mistakenly type an invalid entry, an error message appears at the top of the screen. Then you can
manually correct the entry or use F4 help to choose a valid entry
Note
For example, if an Owner is promoted to a new position, clicking Reassign will reassign all of his Firefighters
to whoever you designate.
Use
Owners assign controllers to Firefighting IDs and Firefighting roles. Controllers track and audit the activities of the
Firefighter IDs and Firefighter roles. You can use the Controller screen to assign, add, or remove a controller for
Firefighter IDs and roles.
Note
Only one person can edit the controller assignments for a Firefighter ID or role at a time.
1. Choose Emergency Access Maintenance Controllers . The Controller screen displays existing controllers,
Firefighter IDs, and associated systems.
2. Choose Assign.
The Controller Assignment: New screen appears.
3. In the Controller ID field, enter the user ID for the person you want to assign as controller.
Note
If the person is not in the Access Control Owners table, a pop-up asks if you want this person to be added as
a Controller to the table and available for future use. If you choose No, the Controller assignment is saved,
but the Controller is not added to the Access Control Owners table.
4. Choose OK.
5. Choose Add, select the Firefighter ID from the list, and then choose OK.
The System value is generated after you choose the Firefighter ID.
6. In the Notification By column, select from these options:
○ E-mail
To send a log report to an external e-mail inbox, such as Microsoft Outlook, or to an SAP inbox each time
the GRAC_SPM_LOG_SYNC_UPDATE background job runs.
You can select options for notification by e-mail:
○ To send logon notifications, set the Send Firefighter ID Login Notification parameter to YES. Logon
notification is sent by e-mail only, independent of the Notification By option.
○ To send notification when a Firefighter ID logs on to the system, set the Send Firefighter Login
Notification Immediately parameter to YES.
○ To send log report notifications, set the Log Report Execution Notification parameter to YES. Log
report notification depends on the Notification By field.
○ To receive log report notifications as the logs are updated, set the Send Log Report Execution
Notification Immediately parameter to YES.
○ Workflow
To send log report notifications in the form of an SAP Workflow item.
Note
Users must have Portal authorization to access the workflow items.
○ Log Display
To view Firefighter ID logon events from the Emergency Access Management Administrator screen. The
controller manually generates the log report and views the report in the Emergency Access Management
Administrator screen. The system does not send automated e-mail notifications.
7. Choose Save Close .
If you mistakenly type an invalid entry, an error message appears at the top of the screen. Then you can
manually correct the entry or use F4 help to choose a valid entry
Note
For example, if a Controller is promoted to a new position, clicking Reassign will reassign all of his
assignments to whomever you designate.
Use
You enable users to perform firefighting by assigning them Firefighter IDs (for ID-based firefighting) or Firefighter
roles (for role-based firefighting). You use the functions on the Firefighter ID screen to maintain the Firefighter
assignments.
Note
Only one person can edit a Firefighter assignment at a time.
Prerequisites
● For role-based firefighting, you have defined the Firefighter roles in the GRC system, and selected the Enable
for Firefighting checkbox on the Define Role screen under Access Management Role Management Role
Maintenance .
● For ID-based firefighting, you have defined a Firefighter ID role on the ERP system, and assigned the role the
remote logon authorization S_RFC.
Note
You can type Firefighter, Owner, and Controller assignment entries directly into the Firefighter assignment
screens in addition to selecting entries using the F4 help.
If you mistakenly type an invalid entry, an error message appears at the top of the screen. Then you can
manually correct the entry or use F4 help to choose a valid entry.
Note
For example, if the person to whom the FFID is assigned is promoted to a new position, clicking Reassign
will reassign all of his FFID's to someone else.
Use
You can choose to have the application send e-mail notifications to controllers when a Firefighter logs on to
perform ID-based firefighting.
You can also customize the notification text. If you do not customize the text, the application uses the default
message text.
Process
Centralized
For the centralized firefighting scenarios, all firefighting logons and Firefighting Logon E-mail Notifications are
handled on the GRC system.
Configure the following Customizing activities under Governance, Risks, and Compliance Access Control
Workflow Access Control .
Decentralized
For the decentralized firefighting scenarios, all firefighting logons and firefighting logon e-mail notifications are
handled on each plug-in system. You must maintain user accounts for the controllers and owners on the plug-in
systems in order for them to receive notifications. You maintain the following settings for each plug-in system.
Configure the following Customizing activities under Governance, Risks, and Compliance (Plug-In) Access
Control .
Use
When a Firefighter uses the Emergency Access Management (EAM) Launchpad to logon to the system to carry out
Firefighter activities, the Firefighter must provide a reason for logging on by choosing from available reason codes.
To open the Reason Codes screen, choose Access Management Emergency Access Maintenance Reason
Codes .
More Information
Procedure
1. To create a new reason code, choose Create on the Reason Code - All screen.
The Reason Code New screen appears.
2. In the Reason Code field, enter a name for the new reason code.
3. In the Status field dropdown menu, choose either Active or Inactive.
4. Enter a description.
5. In the System area, choose Add to add a system or systems to the new reason code.
6. Choose Save Close
More Information
Context
You assign reason codes to one or many systems. The application tracks reason code usage across each system.
Procedure
The Reason Codes screen appears and displays a list of the existing reason codes and related fields and
buttons.
2. Choose Status to set the existing reason codes as active or inactive.
3. To assign a system to a reason code, select an existing active reason code or create a new reason code.
Next Steps
Use
Process
More Information
The procedure to configure firefighting for HANA target systems follow the same core steps as the procedure for
configuring ID-based firefighting. The information in this section describes the additional steps required to set up
firefighting for HANA target systems.
Overview
Create audit policy for HANA firefighting sessions HANA target system
Maintain the firefighter role on the target system HANA target system
10.1 Prerequisites
You must have completed the following prerequisites before proceeding with the configuration procedures.
● You have installed the SAP Access Control 12.0 plug-in for S/4HANA/ERP HR functions: GRCPIERP
V1200_S4, version SAP GRC PLUGIN S4HANA 1610+.
● In access control, you have created and configured connectors for the S/4HANA target system.
This procedure creates an audit policy for tracking and logging actions on the HANA system when someone
performs firefighting activities it.
1. In HANA Studio, right-click the target system, and choose Security Open Security Console .
2. Ensure Auditing Status is set to Enabled, and Audit Trail Target is set to Database Table.
3. Enter a name for the audit policy that is meaningful to you. For example, in the bottom graphic, we have used
SAPGRCFirefighterAudit.
Note
You will need to enter the audity policy name in the later step for configuring the connector.
For efficiency, and ease of readability, we recommend creating four separate audit policies and selecting specific
actions to track in each.
The following are suggested actions to include for the respective audit policies. We recommend consulting with
your administrator or compliance officer as your company may have specific guidelines and requirements for
logging information.
1. Use SAP Logon to log onto the GRC system and run transaction SPRO.
2. Open Governance, Risk and Compliance Access Control Maintain Connector Settings .
3. Add a connector for the HANA target system. Ensure the Appl Type is 17. Save the connector settings.
4. Select the connector and double-click Assign attributes to the connector.
5. Create the following attributes and enter the attribute values as follows:
HANA AUDIT POLICY NAME Enter the name of the audit policy you created on the HANA
target system.
Note
The value must match the name on the HANA system.
HANA IDE URL The syntax for the HANA IDE URL is as follows: http://
<system name>:<port><instance>/sap/
hana/xs/ide. See the image below for an example.
1. In SPRO, open Governance, Risk and Compliance Common Component Settings Integration Framework
Maintain Connector Settings .
2. In the Integration Scenario Work Area, select SUPMG.
3. Create a sub-scenario for SUPMG with the following values.
HDB CL_GRAC_AD_SUPER_USER_HDB
SAP CL_GRAC_AD_SUPER_USER_RFC
The following lists the parmeters relevant for configuring EAM. You maintain the parameters in SPRO
Governancee, Risk andn Compliance Access Control Maintain Configuration Settings .
Parameter ID Description
For logs to be properly captured, the time zones in the connected target systems need to be configured to match
the operating system and also the SAP GRC server time zone. Even a slight difference (e.g. 2 minutes) can cause
logs to be missed.
To maintain time zones, go to SPRO SAP Netweaver General Setetings Time Zones Maintain System
Settings .
Enable mass changes and additions to Emergency Access Management (EAM) user assignments.
Before beginning the mass maintenance process, ensure that the following prerequisites are followed:
● Owners and Controllers must already exist as Access Control Owners (located on the Setup tab, in the Access
Owners section).
● The FFIDs, Controller IDs and Owner IDs must already be in the Access Control repository.
● If only FFIDs are being uploaded, they must have their respective Owners maintained. You can verify this in the
Emergency Access Assignment section, Owners link.
● A user cannot upload himself as Owner or Firefighter user.
● The Owner and Firefighter user for a record cannot be the same.
● The Controller and FFID for a record cannot be the same.
● Validity dates for existing assignments will be updated with the uploaded information.
1. On the Setup tab, in the Emergency Access Management section, select Mass Maintenance. This displays the
Upload Emergency Access Assignments page.
2. Select the Download button.
○ To download the template, select the Template button. Ensure that all the checkboxes are selected. Select
Download.
Note
The downloaded XML file contains 6 tabs (Owners_Data, Owners_Comments, Firefighters_Data,
Firefighters_Comments, Controllers_Data and Controllers_Comments). It is mandatory to preserve the
downloaded format of the XML file.
○ To download data, select the Data button. Select the desired system(s). Select the content to download
(Owners, Firefighters, Controllers). Select Download.
3. Input your changes to the existing data or add new information into the blank template.
4. Select the Upload button from the Upload Emergency Access Assignments page.
5. Select Choose File to upload the completed XML file from your computer.
6. Select Upload and Validate.
7. Verify the information was uploaded:
○ If the status is green, the records are validated. Select Save to save the data. The message will change to
Record Saved Successfully.
○ If the status is yellow, this is a warning message indicating some tabs do not have data. If this is what you
intended, you can select Save and proceed.
○ If the status is red, this is an error. The XML file cannot be uploaded and needs to be corrected. Verify the
format is still in the original format.
8. View the modified and uploaded data in the Emergency Access Assignment section, Owners link and the
Emergency Access Maintenance section, Firefighters and Controllers link.
Open SPRO, and go to Governance, Risk and Compliance Access Control Synchorinization Jobs .
● Repository Object Synch to synchronize the user, role, and profile data.
● Firefighter Log Synch to synchronize firefighter logs from target systems to the GRC repository.
● EAM Master Data Synch to synchronize master data from the target system to the GRC repository.
Coding Samples
Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system
environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and
completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP
intentionally or by SAP's gross negligence.
Gender-Neutral Language
As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales
person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not
exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible.
Internet Hyperlinks
The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not
warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages
caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. All links are categorized for transparency (see:
https://help.sap.com/viewer/disclaimer).