operations guide for sap access control 10.1, sap · pdf fileoperations guide for sap access...

40
Operations Guide PUBLIC 13-07-25 Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Upload: doandang

Post on 12-Mar-2018

268 views

Category:

Documents


8 download

TRANSCRIPT

Page 1: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Operations Guide PUBLIC

13-07-25

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Page 2: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Content

1 Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.2 Global Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51.3 Important SAP Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

2 Technical System Landscape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62.2 Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

3 Monitoring of the Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73.2 CCMS Monitor Templates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73.3 Alert Monitoring with CCMS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8Component Specific Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

3.4 Detailed Monitoring and Tools for Problem and Performance Analysis. . . . . . . . . . . . . . . . . . . . . . . . . 17Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Trace and Log Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18Operating System Monitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Workload Monitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Other Important Problem Analysis and Monitoring Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Interface Monitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

3.5 Important Application Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

4 Managing the Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254.2 Starting and Stopping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254.3 Backup and Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .254.4 System Copy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264.5 Periodic Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Scheduled Periodic Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4.6 Load Balancing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284.7 User Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294.8 Printing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

5 High Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

6 Software Change Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

2 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Content

Page 3: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

6.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316.2 Transport and Change Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316.3 Development Requests and Development Release Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326.4 Quality Management and Test Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326.5 Support Packages and Patch Implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

7 Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

8 Configuring Remote Connection to SAP Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358.2 Read Only Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

9 Appendix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369.1 Categories of System Components for Backup and Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369.2 Related Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Content P U B L I C 3

Page 4: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

1 Getting Started

1.1 Introduction

The Operations Guide provides administration information for Access Control, Process Control, and Risk Management.

SAP Access Control is an enterprise software application that enables organizations to control access and prevent fraud across the enterprise, while minimizing the time and cost of compliance. The application streamlines compliance processes, including access risk analysis and remediation, business role management, access request management, emergency access maintenance, and periodic compliance certifications. It delivers visibility of the current risk situation with real-time data.

SAP Process Control is an enterprise software solution for compliance and policy management. The compliance management capabilities enable organizations to manage and monitor its internal control environment. This provides the ability to remediate any identified issues, and then certify and report on the state of the corresponding compliance activities. The policy management capabilities support the management of the overall policy lifecycle, including the distribution and attestation of policies by target groups. These combined capabilities help reduce the cost of compliance and improve management transparency and confidence in compliance management processes.

SAP Risk Management enables organizations to balance business opportunities with financial, legal, and operational risks to minimize the market penalties from high-impact events. The application allows customers to identify these risks and monitor them on a continuous basis. Stakeholders and owners are provided with such tools as analytic dashboards for visibility in mitigating risks in their areas of responsibility.

About this Guide

This guide provides a starting point for managing your SAP applications and maintaining and running them. It contains information for tasks and lists the tools to implement them. This guide also provides references to the documentation required for these tasks.

NoteThe guide refers to the SAP NetWeaver Operations Guide as most production operation tasks are done at the server level. The application tasks are in the Monitoring and Management sections.

CautionThis guide does not replace the daily operations handbook that we recommend customers create for their production operations.

Target Groups

4 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Getting Started

Page 5: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

The guide is written for the following audiences:

● Technical Consultants● System Administrators● Solution Consultants● Business Process Owner● Support Specialist

1.2 Global Definitions

SAP Application:

An SAP software solution that serves a specific business area like ERP, CRM, PLM, SRM, SCM.

Business Scenario:

From a microeconomic perspective, a business scenario is a cycle that consists of several different interconnected logical processes in time. A business scenario includes several company departments and business partners. From a technical point of view, a business scenario needs at least one SAP application (SAP ERP, SAP SCM, or others) for each cycle and possibly other third-party systems. A business scenario is a unit that can be implemented separately and reflects the customer’s prospective course of business.

Component:

The smallest individual unit considered within the Solution Development Lifecycle. Components are separately produced, delivered, installed, and maintained.

1.3 Important SAP Notes

For a list of important SAP Notes for the applications, see the following:

● For Access Control, see the SAP Access Control 10.1 Master Guide at http://help.sap.com/grc-ac .● For Process Control, see the SAP Process Control 10.1 Master Guide at http://help.sap.com/pc .● For Risk Management, see the SAP Risk Management 10.1 Master Guide at http://help.sap.com/rm .

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Getting Started P U B L I C 5

Page 6: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

2 Technical System Landscape

2.1 Introduction

For information about the technical system landscape and the software component matrix, see the application master guides.

● SAP Access Control 10.1 Master Guide at http://help.sap.com/grc-ac .● SAP Process Control 10.1 Master Guide at http://help.sap.com/pc● SAP Risk Management 10.1 Master Guide at http://help.sap.com/rm .

Scroll down to the Installation information to find a link to the Master Guide.

2.2 Related Documentation

For more information about the technical system landscape, see the guides in the following table.

Table 1:

Topic Guide/Tool Link on SAP Service Marketplace

Application and industry specific compo­nents such as SAP Financials and SAP Retail

Master Guide http://service.sap.com/instguides

Technology Components such as SAP NetWeaver Application Server

Technical Configuration

Sizing Quick Sizer Tool http://service.sap.com/sizing

Installation Installation Guide http://service.sap.com/instguides

Security Security Guide http://service.sap.com/security

6 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Technical System Landscape

Page 7: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

3 Monitoring of the Application

3.1 Introduction

The information in this section applies to Access Control, Process Control, and Risk Management. Within the management of SAP Technology, monitoring is an essential task. The Computing Center Management System (CCMS) is a set of integrated tools for monitoring and administration of SAP system landscapes. The transaction code is RZ20.

RecommendationFor more information about the underlying technology, see the Technical Operations for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

3.2 CCMS Monitor Templates

This section lists the CCMS monitor sets you can use to monitor the application components. The CCMS Monitor Templates include the following:

● Background processing● Performance overview● Syslog

The SAP Web Service Monitor Template is Web Service Monitor.

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 7

Page 8: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Figure 1: CCMS Monitor Template and Web Service Monitor

3.3 Alert Monitoring with CCMS

3.3.1 Introduction

Proactive, automated monitoring is the basis for ensuring reliable operations for your SAP system environment. SAP provides you with the infrastructure needed to set up your alert monitoring to recognize situations for Access Control, Process Control and Risk Management as quickly as possible.

Recommendation

To enable the auto-alert mechanism of CCMS, see SAP Note 617547 .

8 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 9: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

3.3.2 Component Specific Monitoring

You monitor the following data in the SAP Standard CCMS tool for Access Control, Process Control and Risk Management:

● Background job● Performance Overview● DB access time● System log● System errors● Web Services Call

Background Jobs

You monitor the background job status for jobs that are aborted, canceled, or have been running for a long time.

ExampleThis is an example of background jobs with the status of Long Running Jobs and Aborted Jobs:

Figure 2: Background Jobs with status of Long Running Jobs and Aborted Jobs

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 9

Page 10: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

ExampleThe following graphic illustrates that BFC_001 through BFC_005 jobs have the status of Canceled:

Figure 3: Job Overview

You can check the details of canceled jobs by selecting a job and clicking Step. The following graphic is an example of the details for a selected job.

NoteThe Program name/command for the applications start with GRAC, GRPC, or GRFN. They should be alerted.

10 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 11: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Figure 4: Details of a Job

Performance Overview

In the Performance Overview CCMS Monitor Templates, look for processes with a high Response Time.

Note● Access Control processes begin with GRAC.● Process Control processes begin with GRPC.● Risk Management processes begin with GRFN.

ExampleThe following figure illustrates that the GR4 system has a response time of 1448 milliseconds.

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 11

Page 12: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Figure 5: System Response Time

12 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 13: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

ExampleThe following graphic illustrates an example of Process Control process (GRPCRTA_PC):

Figure 6: Workload in System

System Logs

Monitor system logs for any errors.

ExampleThe following graphic illustrates that the R3Syslog displays a runtime error.

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 13

Page 14: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Figure 7: Runtime error

You can review the System Log (Syslog): Local Analysis for errors.

Note● Access Control transaction codes start with GRAC.● Process Control transaction codes start with GRPC.● Risk Management transaction codes start with GRFN.

14 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 15: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

ExampleThe following graphic illustrates local analysis of Process Control transaction codes:

Figure 8: Local Analysis

Access the complete list of Access Control transaction codes with transaction code SE93. Search for GRAC*. Some of the most used codes include:

Table 2: Access Control Transaction Codes

Transaction Code Description

NWBC Access the majority of the Access Control capabilities and reports (role: SAP_GRC_NWBC)

GRAC_ALERT_GENERATE Alert generation

GRAC_BATCH_RA Risk Analysis in Batch Mode

GRAC_EAM Emergency Access Management (EAM) Launchpad Logon

GRAC_SPM_CLEANUP Cleanup EAM (SPM) Application Data

GRACRABATCH_MONITOR Batch Risk Analysis Monitor

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 15

Page 16: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

System Errors

You review the CCMS Monitor Templates (System Errors) for error messages.

ExampleThe following graphic illustrates system errors such as Aborted Batch Jobs and Update Errors:

Figure 9: System Errors

Web Services

You monitor the SAP Web Service Monitor Templates for errors.

ExampleThe following graphic illustrates the following monitors:

● Task Watcher● Supervisor Destination

16 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 17: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

● Web Services Reliable Messaging (WSRM) Event Handler● Web Services (WS) Namespace for Inbound Destinations● WS Service Destinations

Figure 10: Monitors

3.4 Detailed Monitoring and Tools for Problem and Performance Analysis

3.4.1 IntroductionProcess Control, Risk Management and Access Control are based on SAP NetWeaver Web Application Server 7.40.

RecommendationFor information about technical problem analysis (such as database, operating system, or workload analysis) see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 17

Page 18: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

3.4.2 Trace and Log Files

The information in this section applies to Access Control, Process Control and Risk Management. Trace files and log files are essential for analyzing problems. You can use SAP NetWeaver transactions, such as ST22 and SM2, to monitor trace and log files.

NoteThe archiving object for Access Control is GRAC_REQ.

RecommendationFor more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

Additionally, the GRC applications use the SAP NetWeaver application log to store application error warning and success messages issued in critical processes. For example, the delivery interface between ERP and Process Control, or in UI transactions stores the messages in the SAP NetWeaver application log. For UI transactions, the application log must be explicitly saved by the user.

Recommendation

For more information about application logs, see http://help.sap.com/netweaver SAP NetWeaver 7.4Application Help Function-oriented View (select language) Solution Life Cycle Management Application Log (BC-SRV-BAL) .

Application Logs – The application logs can be monitored with transaction SLG1.

● The Access Control log object is GRAC.● The Process Control log object is GRPC.● The Risk Management log object is GRRM.● The shared components log object is GRFN.

The following tables list the log subobjects:

Table 3: Access Control Log Subobjects

Log Object Log Subobjects Description

GRAC AUTH Authorization check

GRAC BATCH Batch risk analysis

GRAC HRTRIGGER HR trigger

GRAC SOD_RISK_ANALYSIS Segregation of Duties (SOD) Risk Analy­sis

GRAC SPM Emergency Access Management log

18 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 19: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Log Object Log Subobjects Description

GRAC UAR User Access Review (UAR)

Table 4: Process Control Log Subogjects

Log Object Log Subobjects Description

GRPC API GRPC Entity API Calls

GRPC AS_REORG GRPC AS REORG Log

GRPC ATTACHMENTS_CLONING Copy Documents During Carryforward

GRPC ATTACHMENTS_DOWNLOAD Documents download log

GRPC ATTACHMENTS_SERVICES Documents Log for Backend Services

GRPC AUTHORIZE Logging of Authorization Checks

GRPC CASE_INT Case Management Integration

GRPC EVENT Event-based Control Monitoring

GRPC NWBC Netweaver Business Client Integration

GRPC PLANNER Planner

GRPC REPLACEMENT Succession

GRPC SCHEDULER Scheduler log

GRPC SIGNOFF Sign off

GRPC SOD_CHECK Check of Function Separator

Table 5: Risk Management Log Subobjects

Log Object Log Subobjects Description

GRRM AGGR_RUN Aggregation Run

GRRM ANLS_AUTOMATION Analysis Automation

GRRM CLEANUP Cleanup report to delete transaction data

GRRM CONTEXT Context Values

GRRM KRI KRI runtime

GRRM MIGRATION Migration

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 19

Page 20: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Log Object Log Subobjects Description

GRRM RESPONSE_NOTIF Response Due Date Notification

GRRM RESP_AUTOMATION Response Automation

GRRM SURVEY Survey

Table 6: GRC Foundation (shared) Lob Subobjects

Log Object Log Subobjects Description

GRFN AC_PROV Access Control Provisioning Engine

GRFN AC_REP Access Control Repository

GRFN API GRC API logging

GRFN ASYNC_UPDATE Asynchronous Update Infrastructure

GRFN AUTH GRC authorization

GRFN CASE_INT Continuous monitoring case integration

GRFN FDS Continuous monitoring flexible data store

GRFN HRMAINT Access to HR ORG maintenance

GRFN IO_EXPORT IO Export

GRFN IO_IMPORT IO Import

GRFN IO_META IO Metadata

GRFN JOB AMF Job Step Execution

GRFN JOB_DESIGN AMF Job Step Design Time

GRFN MDCHECK Master Data Consistency Check

GRFN MIGRATION GRC migration

GRFN MSMP_WF_CN Multi-Stage Multi-Path (MSMP) Work­flow – Configuration

GRFN MSMP_WF_NT Multi-Stage Multi-Path (MSMP) Work­flow – Notification

GRFN MSMP_WF_RT Multi-Stage Multi-Path (MSMP) Work­flow – Runtime

20 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 21: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Log Object Log Subobjects Description

GRFN OWP Offline Workflow Process

GRFN POLICY Policy Management

GRFN REPLACEMENT GRC replacement

GRFN REP_ENGINE Reporting engine

GRFN RISK_AGGR Risk Aggregation

GRFN RM_BANKING Operational Risk Management for Bank­ing Industry

GRFN SURVEY Survey planning

Job Logs – You can view job logs using transaction SM37.

Workflow Item Logs – You can view the workflow item logs using transaction SWI1.

Recommendation

For more information, see the SAP Library at http://help.sap.com and search for SAP Workflow Administration.

Scheduler Logs – Process Control only. To view the scheduler logs, log on to the portal, select a regulation workset and click Rule Setup Scheduling

For a description of the tasks containing data growth, see the Periodic Task [page 26] section in this guide.

3.4.3 Operating System Monitors

Process Control, Risk Management and Access Control use the standard tools for this function available in the SAP NetWeaver Application Server 7.40 and do not require a component-specific tool.

Recommendation

For information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaverSAP NetWeaver Platform System Administration and Maintenance Information

3.4.4 Workload Monitors

Process Control, Risk Management and Access Control use the standard tools for this function available in the SAP NetWeaver Application Server 7.40 and do not require a component-specific tool.

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 21

Page 22: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

RecommendationFor more information, see the Technical Operations Manual for SAP NetWeaver in the SAP Library under SAP NetWeaver.

Table 7: Components to Monitor

Component Monitor Relevant Application Description

Datamart GRFN_DATAMART_UP­LOAD_BTC

Process Control

Risk Management

This is the reporting compo­nent.

Scheduler GRPC_SCHEDULER Process Control This sends jobs from the Process Control job query to the SAP standard job query (SM36). It retrieves objects from the HR info type, such as control and organization In­formation.

KRI Runtime GRRM_KRI_RUNTIME Risk Management Periodic runtime of KRIs.

3.4.5 Other Important Problem Analysis and Monitoring Tools

Process Control, Risk Management, and Access Control use the standard tools for this function available in the SAP NetWeaver Application Server 7.40 and do not require a component-specific tool.

Recommendation

For information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaverSAP NetWeaver Platform System Administration and Maintenance Information

3.4.6 Interface Monitors

Interface monitors analyze problems with interfaces such as RFC, IDoc, and HTTP. Process Control, Risk Management and Access Control use the standard tools available in the SAP NetWeaver Application Server 7.40 and do not require a component-specific tool.

Recommendation

For information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaverSAP NetWeaver Platform System Administration and Maintenance Information

22 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 23: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

3.5 Important Application Objects

We recommend you monitor the following Process Control, Risk Management and Access Control objects:

Table 8: Objects to Monitor

Object Tools Description

Process Overview Transaction SM50 The monitor tracks the amount of time critical processes such as dialog (DIA), update (UPD), or background (BGD) have been running. Processes that have been running too long are shown in red in the runtime column.

Ensure there are enough background work processes on the GRC system. You can use operation mode to switch work processes.

Background Process Transaction SM37 Select the jobs by job name, user name, status, and time period to display a status overview of scheduled jobs. Look for any canceled jobs.

Process Control and Risk Management Application Logs

Transaction GRFN_LOG_ENABLE Enable logging for the following subobjects if you need to track errors in API or authorization check areas:

● API — GRC API Logging

● AUTH — GRC Authorization

For troubleshooting, enable logging for REP_ENGINE — Reporting Engine.

For more information about objects and subobjects, see Trace and Log Files.

Application Logs Transaction SLG1 Enable the GRPC application logs for potential risk areas, such as API access and authorization. Using transaction

SPRO, select Governance, Risk and Compliance

Process Control Administration Programs

For more information, see Trace and Log Files.

CCMS Transaction RZ20 Monitor the following:

● SAP buffer configuration● Database workload● Operating system workload● System logs for errors● System errors for application dumps● Workload analysis for any performance issues

For more information, see the Technical Operations Man­ual for SAP NetWeaver at help.sap.com/netweaver .

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Monitoring of the Application P U B L I C 23

Page 24: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Object Tools Description

Shared Objects Memory Transaction SHMM Transaction SHMM provides an overview of the area instan­ces in the shared objects memory of the current applica­tion server.

Workflow event queue SWEQADM Use the event queue to delay the starting of receivers re­acting to a triggering event. This spreads the system load over a longer time period to combat the threat of system overload. The system administrator sets the event queue.

SICF Transaction SICF Use this transaction to activate Internet services, Web services, and Web Dynpro.

SIGS Transaction SIGS Use this transaction to view the status of IGS services and the required parameters.

24 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Monitoring of the Application

Page 25: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

4 Managing the Application

4.1 Introduction

The information in this section applies to Process Control, Risk Management and Access Control. SAP provides you with an infrastructure to help your technical support consultants and system administrators manage all SAP components and complete tasks related to administration and operation. The underlying technology of Process Control, Risk Management and Access Control are based on SAP NetWeaver.

4.2 Starting and Stopping

Process Control, Risk Management, and Access Control are provided as add-on components for SAP NetWeaver. You start and stop them with SAP NetWeaver Web Application Server.

RecommendationFor more information about STARTSAP/STOPSAP and SAPMMC, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

4.3 Backup and Restore

You need to back up your system landscape regularly to ensure that you can restore and recover it in case of failure. All application data for the applications reside in the underlying database. No special backup and recovery methods apply for this component.

The applications rely on the SAP NetWeaver ABAP standard capabilities for the technical operations. The configuration data is stored in the Implementation Guide (IMG) database tables. These settings are established during the Customizing activities during implementation (transaction SPRO).

NoteIf you use a document management system (DMS) that stores data outside of the underlying database, refer to the backup and restore recommendations for that DMS.

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Managing the Application P U B L I C 25

Page 26: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

4.4 System Copy

For a system copy of Process Control, Risk Management or Access, the standard procedures of SAP NetWeaver apply.

RecommendationFor more information, see the Technical Operations Manual for SAP NetWeaver in the SAP Library. Heterogeneous system copies are performed on request and on a project basis. For more information, see http://service.sap.com/osdbmigration .

NoteA client copy from one system into another system with a different operating system or database is not an alternative to a complete heterogeneous migration. For example, client copies do not ensure that all repository changes are taken over into the new system. Therefore, if you want to change your database or application server platform, a heterogeneous system copy is the only procedure that ensures full data replication.

4.5 Periodic Tasks

4.5.1 Introduction

The information in this section applies to Process Control, Risk Management and Access Control. In addition to the standard jobs mentioned in the Technical Operations Manual for SAP NetWeaver, Process Control, Risk Management and Access Control specific jobs must be scheduled in your system. Run all jobs, unless otherwise specified, at times of minimal system activity (so as not to affect performance or otherwise disrupt your daily operations). All jobs can be restarted. There are no dependencies between the jobs.

4.5.2 Scheduled Periodic Tasks

This information applies to Access Control, Process Control and Risk Management (unless noted). This information describes the tasks required to keep the application running smoothly. You can configure the tasks to automatically run. It is important that you monitor the execution of these tasks on a regular basis. The tasks are scheduled using transaction SM36, except for the Background Job for Missed Deadlines, which uses transaction SWU3.

26 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Managing the Application

Page 27: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Table 9: Scheduled Periodic Tasks

Program Name/Task Recommended Frequency Description

Schedule Background Job for Missed Deadlines

Every 3 minutes Specify a time interval at which the back­ground job is called regularly. With each execu­tion, the background job checks whether new deadlines have been missed since the last time it ran.

Schedule Job for Sending E-Mail Every 3 minutes This program checks whether there are new work items for Process Control and Risk Man­agement, and determines the e-mail addresses of the work item recipients.

GRFN_AM_JOBSTEP_MONITOR Hourly The monitoring program to update job / job step status.

/GRCPI/GRIA_AM_CHANGELOG (in plug-in system. Process Control only)

Daily This program captures the GRC PC change log.

Transfer Work Items to Replacement Daily The program transfers work items from users that are no longer working in Process Control and Risk Management to the replacement users entered in the system for these users.

Maintain DataMart Daily Schedule the report GRFN_DATAMART_MAINTAIN. This can be used for maintaining and uploading the data to DataMart.

Execute KRI Queries and Evaluate Busi­ness Rules

(Risk Management only)

Daily Schedule the report GRRM_KRI_RUNTIME. You schedule this job to query the KRI values from the source systems, such as SAP Net­Weaver Business Warehouse or SAP ERP, and the business rules are evaluated to attain risk alerts.

Carryforward after Sign-Off

(Process Control only)

After event Schedule the program close (GRPC_CLOSING_BACKGROUND). Once sign-off has been performed for an organiza­tion, the program copies any open cases to the new timeframe, and clears the workflows.

Document Copy after Sign-Off

(Process Control only)

After event Schedule a job so that, after tasks have been carried forward into a new timeframe, the documents for those tasks are also copied into the new timeframe. This applies to documents that were created for issues or remediation plans during assessment and tests.

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Managing the Application P U B L I C 27

Page 28: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Access Control Synchronization Tasks

The following tasks are accomplished through the Customizing activities (transaction SPRO) found at SAP Reference IMG Governance, Risk, and Compliance Access Control Synchronization Jobs . Also, refer to the documentation next to each activity for detailed directions.

NoteThe frequencies are recommendations, but adjust these according to your business need. For example, when you are first implementing the product, you might want to run these tasks more often.

Table 10: Access Control Synchronization Tasks

Customizing Task Name Recommended Frequency Transaction

Authorization Synch Weekly GRAC_AUTH_SYNC

Repository Object Synch

(includes Profile, Role and User Synchroniza­tion)

Daily GRAC_REP_OBJ_SYNC

Action Usage Synch Daily GRAC_ACT_USAGE_SYNC

Role Usage Synch Daily GRAC_ROLE_USAGE_SYNC

Firefighter Log Synch Daily GRAC_SPM_LOG_SYNC

Firefighter Workflow Synch Daily GRAC_SPM_WF_SYNC

Fetch IDM Schema as needed GRAC_IDM_SCHEMA_SYNC

EAM Master Data Synch as needed GRAC_SPM_SYNC

4.6 Load Balancing

Process Control, Risk Management and Access Control use SAP NetWeaver for load balancing.

RecommendationFor more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

28 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Managing the Application

Page 29: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

4.7 User Management

Process Control, Risk Management and Access Control use SAP NetWeaver for user management.

Recommendation

For more information, see the documentation on the SAP Help Portal at help.sap.com/netweaver .

● For specific user management and authorization functions, see the application security guides at http://help.sap.com/grc .

4.8 Printing

Process Control, Risk Management, and Access Control use SAP NetWeaver for printing.

RecommendationFor more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Managing the Application P U B L I C 29

Page 30: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

5 High Availability

Use

Process Control, Risk Management, and Access Control use SAP NetWeaver for high availability.

Integration

Recommendation

For more information, see the documentation at http://www.sdn.sap.com/irj/sdn/ha .

30 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1High Availability

Page 31: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

6 Software Change Management

6.1 Introduction

Software Change Management standardizes and automates software distribution, maintenance, and testing procedures for software landscapes and multiple software development platforms. These functions support your project teams, development teams, and application support teams.

Software Change Management establishes solution-wide change management that allows for specific maintenance procedures, global rollouts (including localizations), and open integration with third-party products.

This section provides additional information about the most important software components.

The following topics are covered:

● Transport and Change Management:Enables and secures the distribution of software changes from the development environment to the quality assurance and production environment.

● Development Request and Development Release Management:Enables customer-specific maintenance procedures and open integration with third-party products.

● Template Management:Enables and secures the rollout of global templates, including localizations.

● Quality Management and Test Management:Reduce the time, cost, and risk associated with software changes.

● Support Packages and SAP Notes Implementation:Provide standardized software distribution and maintenance procedures.

● Release and Upgrade Management:Reduces the time, cost, and risk associated with upgrades.

6.2 Transport and Change Management

For transport and change management issues, the procedures of SAP NetWeaver apply.

Recommendation

For more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Software Change Management P U B L I C 31

Page 32: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

6.3 Development Requests and Development Release Management

The standard procedures of SAP NetWeaver apply. For more information, see the Technical Operations Manual for SAP NetWeaver in the SAP Library.

6.4 Quality Management and Test Management

You can use the SAP NetWeaver Development Infrastructure to learn about the various possibilities to test your software changes.

6.5 Support Packages and Patch Implementation

We recommend you implement Support Package Stacks (SP-STACKS), which are sets of Support Packages and patches for the respective product version that must be used in the given combination.

Read the corresponding Release and Information Notes (RIN) before you apply any Support Packages or Patches of the selected SP-Stack.

The RIN and support packages for Process Control, Risk Management, and Access Control are available in the SAP Service Marketplace at http://service.sap.com/patches .

RecommendationFor information about the tools required for implementing patches, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance Information

32 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Software Change Management

Page 33: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

7 Troubleshooting

Use

Access Control, Process Control, and Risk Management are provided as add-on components for SAP NetWeaver and use the same troubleshooting tools for the SAP NetWeaver Application server.

RecommendationFor more information about troubleshooting the SAP NetWeaver Application server, see the Technical Operations Manual for SAP NetWeaver.

Use the following components when reporting issues:

● GRC-SAC for Access Control● GRC-SPC for Process Control● GRC-RM for Risk Management

Process

Troubleshooting Process Control Scheduler

The following troubleshooting procedure applies to the Process Control scheduler function only.

Symptom

The Monitor Scheduler does not display Completed.

Procedure

1. Determine if the cause is in Process Control or the ERP server.1. In the Monitor Scheduler, select the line item and click Show Log. The details screen appears.2. Select the job and click Job Status. This shows the job log for process control. If the Job Detail button is

disabled, the cause is in Process Control. If the Job Detail button is enabled, the cause is in the ERP application.

2. Do the following to troubleshoot issues in Process Control:1. In transaction SM37, enter the job name, user, and date, and click Log to display the Job Status.2. If there is an ABAP dump, click the line item or go to transaction ST22 to view more information to

address the issue.3. Do the following to troubleshoot issues in the ERP server:

1. In transaction SM37, enter the job name and date, and click Log to display the Job Detail.2. If there is an ABAP dump, click the line item or go to transaction ST22 to view more information to

address the issue.

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Troubleshooting P U B L I C 33

Page 34: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

The information for troubleshooting Process Control is maintained in SAP Notes. For troubleshooting information, see SAP Note 1302302 Troubleshooting Guides for PC.

34 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Troubleshooting

Page 35: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

8 Configuring Remote Connection to SAP Support

8.1 Introduction

SAP offers access to remote support and remote services. You have to set up a remote network connection to SAP.

Recommendation

For more information, see SAP Service Marketplace at http://service.sap.com/remoteconnection .

8.2 Read Only Role

Use

For remote support from SAP, a support user must have read-only access to the support tools. Since these applications are built upon the NetWeaver ABAP stack, a support user can use the SAP standard CSS remote support tool which is accessible through the SAPGUI or web browser.

Integration

The read-only roles are as follows:

● SAP_GRAC_DISPLAY_ALL for Access Control● SAP_GRC_FN_DISPLAY for Process Control and Risk Management

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Configuring Remote Connection to SAP Support P U B L I C 35

Page 36: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

9 Appendix

9.1 Categories of System Components for Backup and Restore

Table 11:

Categories of Sys­tem Components

Category Properties Suggested Methods for Backup and Re­store

Examples

I Only software, no configu­ration, or application data

No backup, new installation in case of a re­covery

BDOC modeler

Initial software backup after installation and upgrade

Backup of log files

II Only software and configu­ration information, no appli­cation data

Backup after changes have been applied SAP Gateway

No backup, new installation, and configura­tion in case of a recovery

Communication Station

Backup of log files SAP Business Connector, SAP IPC (2.0C)

III Only replicated application data, replication time is suf­ficiently small for a recov­ery

Data SAP IMS/Search

No data backup needed Engine

Backup of software, configuration, log files SAP IPC (2.0B)

IV Only replicated application data, backup recom­mended because replica­tion time is too long, data not managed by a DBMS

Data SAP IMS/Search

Application specific file system backup or Engine

Multiple instances Web server

Backup of software, configuration, log files SAP IPC (2.0B)

V Only replicated application data, backup recom­mended because replica­tion time is too long, data managed by a DBMS

Data SAP IPC (2.0B)

Database and log backup or Catalog Server

Multiple instances Web server

Backup of software, configuration, log files SAP IPC (2.0B)

36 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Appendix

Page 37: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Table 12:

Categories of Systems Com­ponents

Category Properties Suggested Methods for Backup and Restore

Examples

VI Original application data, standalone system, data not managed by a DBMS

Data

Application specific file sys­tem backup

Backup of software, configu­ration and log files

Web Server

VII Original application data, standalone system, data managed by a DBMS, not based on SAP NetWeaver Ap­plication Server

Data

Database and log backup

Backup of software, configu­ration and log files

none available

VIII Original application data, standalone system, based on SAP NetWeaver Application Server

Data

Database and log backup, ap­plication log backup (such as job logs in file system)

Backup of software, configu­ration and log files

Standalone SAP

SAP ERP

none available

IX Original application data, data exchange with other systems, data not managed by a DBMS

Data

Application specific file sys­tem backup, data consistency with other systems must be considered

Backup of software, configu­ration, log files

none available

X Original application data, data exchange with other systems, data managed by a DBMS, not based on SAP NetWeaver Application Server

Data

Database and log backup, data consistency with other systems must be considered

Backup of software, configu­ration, log files

SAP Live Cache

SAP Mobile

Workbench

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Appendix P U B L I C 37

Page 38: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Categories of Systems Com­ponents

Category Properties Suggested Methods for Backup and Restore

Examples

XI Original application data, data exchange with other systems, based on SAP NetWeaver Ap­plication Server

Data

Database and log backup, ap­plication log backup (such as job logs in the system), data consistency with other sys­tems must be considered

Backup of software, configu­ration, log files

SAP ERP

SAP CRM

SAP APO

SAP NetWeaver Business Warehouse

9.2 Related Information

The following table contains links to information relating to the Solution Operation Guide.

Table 13:

Content Quick Link to the SAP Service Marketplace (http://serv­ice.sap.com)

Master Guide, Installation Guide and Upgrade Guide /instguides

/ibc

Related SAP Notes /notes

Released Platforms /platforms

Network Security /securityguide

/network

Technical Infrastructure /ti

SAP Solution Manager /solutionmanager

38 P U B L I C

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1

Appendix

Page 39: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

Important Disclaimers and Legal Information

Coding SamplesAny software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence.

AccessibilityThe information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP in particular disclaims any liability in relation to this document. This disclaimer, however, does not apply in cases of willful misconduct or gross negligence of SAP. Furthermore, this document does not result in any direct or indirect contractual obligations of SAP.

Gender-Neutral LanguageAs far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible.

Internet HyperlinksThe SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. All links are categorized for transparency (see: http://help.sap.com/disclaimer).

Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1Important Disclaimers and Legal Information P U B L I C 39

Page 40: Operations Guide for SAP Access Control 10.1, SAP  · PDF fileOperations Guide for SAP Access Control 10.1, SAP ... 3 Monitoring of the Application ... (SPM) Application Data

go.sap.com/registration/contact.html

© 2017 SAP SE or an SAP affiliate company. All rights reserved.No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice.Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary.These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies.Please see http://www.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices.