Learn about the different aspects and flexibility of risk mitigations in SAP Access Control 10.1. Access risk mitigation is used to mitigate access risk violations. It is applicable for all types of risks for different objects such as users, roles, profiles, and HR objects (job, org unit, and position) in SAP Access Control. Access risk mitigation is a process screen used to mitigate access risk violations.
Reading this article you will learn:
- How to identify invalid and expired mitigations
- How to delete invalid mitigations
- How to extend the validity for the expired mitigations
- Practical scenarios of invalid and expired mitigations
Using the Invalid Mitigation Controls screen, you can identify invalid mitigations, delete invalid mitigations, and extend the validity of expired mitigation assignments for user-level mitigations and role-level mitigations. Two hyperlinks are introduced for user-level and role-level invalid mitigations under menu path NWBC > Access Management > Access Risk Analysis: User Level Invalid Mitigations and Role Level Invalid Mitigations.