Mahindra CIE Automotive Ltd. Reduces Risk and Hours of Manual Effort by Automating Its SAP User Provisioning Processes

Plug-and-Play GRC Overhaul in One Week

663 results

  1. Get Your System Clean with Compliant User Provisioning

    Audit-proof your daily user management with SAP GRC Access Control’s Compliant User Provisioning capability. Learn about its main features and see an example of how to set it up for requesting, approving, and providing access to your business target systems. Key Concept Auto-provisioning refers to the automatic creation or change of user IDs and their...…

  2. firefighter

    Brighthouse Financial Accelerates User Provisioning Cycles

    Reading time: 4 mins

    Before integrating Saviynt’s Identity Governance and Administration (IGA) solution and SAP Access Control, Brighthouse Financial ran an entirely manual user provisioning process using an access request feature in SharePoint. This case study explains how the Fortune 500 company improved their user provisioning processes for SAP products with SAP Access Control and then implemented Saviynt’s IGA…

  3. Mahindre CIE crankshaft

    Mahindra CIE Automotive Ltd. Reduces Risk and Hours of Manual Effort by Automating Its SAP User Provisioning Processes

    Reading time: 6 mins

    Mahindra CIE Automotive Ltd. (MCIE), as a growing, publicly traded, international company, must follow a variety of regulations and compliance standards and undergo various statutory audits. In the first quarter of 2019, the company’s board of directors stressed the importance of putting in place stronger security and compliance controls to provide better assurance to investors…

  4. Compliant User Provisioning from Hire to Retire: How to Streamline, Manage, and Automate User Access Provisioning

    Click Here to View the Session Deck. User access is constant and ever-changing. From the creation of a person’s user account, their changing roles in an organization, to the day that it gets locked or deleted, potentially hundreds of access assignment shifts will be required to make sure that a person has the right access...…

  5. Make Identity Management Sarbanes-Oxley-Compliant by Leveraging Integrated SAP Solutions

    Efficient processes for identity management (IDM) are a challenge to many companies — in particular when access- and authorization-related risks must be managed and taken under consideration prior to provisioning access privileges. SAP BusinessObjects Access Control 5.3 comes with a Web service-based interface intended to provide risk analysis and mitigation features to IDM solutions. See...…

  6. Impact20: User Provisioning from “Hire to Retire:” How to Streamline, Manage, and Automate User Provisioning

    Click Here to View the Session Deck User access is a constant and ever-changing process. From the creation of a person’s user account, their changing roles in an organization, to the day that the account gets locked or deleted, potentially hundreds of access assignment changes are required. This session provides real world solutions to make...…

  7. Portal and SAP System Provisioning in One Step

    Jatin Grover explains how to provision access to an SAP system and SAP Enterprise Portal through a single access request when both of them have different user IDs for an employee in the organization. Key Concept The provisioning engine in SAP Access Control accomplishes user provisioning. Usually the provisioning happens either to a single user...…

  8. Manual Provisioning of Non-SAP Roles Using SAP Access Control

    SAP Professional Journal Learn how to minimize multiple access requests by configuring SAP Access Control so that you can manually provision access for non-SAP applications. Key Concept Transaction code SPRO is used for setting up SAP Access Control configuration settings. You execute SPRO to integrate non-SAP Remote Function Call (RFC) connections with the logical file...…

  9. Implement a Compliant Identity Management Solution for Effective Provisioning, Reporting, and Role Management

    Learn how to achieve efficient, compliant, and secure management of user accounts and identities with SAP NetWeaver Identity Management (SAP NetWeaver IDM). Step through an overview of SAP NetWeaver IDM, including the product’s architecture and integration capabilities. Key Concept SAP NetWeaver Identity Management (SAP NetWeaver IDM) provides provisioning capabilities for SAP and third-party applications. You...…

  10. How to Set Up and Implement User Defaults in SAP Access Control 10.0

    Learn how to configure user defaults functionality in SAP Access Control 10.0 to drive automatic assignment of values to user master data based on specific request attributes. Key Concept A user defaults business rule can be used to define the default entries automatically maintained for a user master record based on defined attributes and conditions...…