Keep your access management operations above par

by Gary Byrne, Editor, Wellesley Information Services

November 22, 2011

I read an article in The Economist this week equating success in golf with success in business. The article cited the traits of good golfers — strategic thinking, poise under pressure, and the ability to keep a lid on anger — as ones that also enable businesspeople to succeed.

Security teams can use these same traits to succeed in their organizations. Take the first trait, for example. Just as golfers strategize by analyzing their swings or switching clubs at different holes, security administrators also face challenges to find ways of improving the efficiency of their operations.

In his article in GRC Expert titled “Manage Multiple Access Requests Efficiently with SAP BusinessObjects Access Control 10.0,” the author, whose pseudonym is Rudr, explains how SAP BusinessObjects Access Control 10.0’s multiuser request feature enables organizations to boost the efficiency of their access management tasks:

“Before the release of SAP BusinessObjects Access Control 10.0, security administrators who wanted to grant access to a large numbe r of users could use transaction SU10. Administrators needed to document and provide the approvals for granting access to auditors for later reference and tracking. In some companies, to track all the approvals in the compliant user provisioning functionality of SAP BusinessObjects Access Control 5.3 itself, administrators were faced with the time-consuming, tedious task of submitting requests one by one for each user. SAP BusinessObjects Access Control 10.0’s multiuser request feature enables security administrators to include all their access requests within a single request that is sent to the SAP BusinessObjects GRC system.”

Rudr walks the readers through a series of five steps for submitting a multiuser request to the SAP BusinessObjects GRC system. The first step is preparing the user list — a task that requires the preparation of a csv file. Rudr states that the “file is relatively simple and straightforward, but the correct columns need to be populated. Any errors at this stage may result in the request being incorrectly submitted.”

I hope this article helps make your access management operations more efficient. You can spend your extra time practicing your putting.

An email has been sent to:

More from SAPinsider


Please log in to post a comment.

No comments have been submitted on this article. Be the first to comment!