GRC AC risk

Is there anyone who can help us to understand/explain the u201CS0260B401 : Maintain an invoice and enter or change payments against itu201D risk on Post Incoming Payments (F-28)  and   Clear Customer (F-32)?
Also, the Clear Customer (F-32) and Post with Clearing (F-30) conflict.
Thanks,

Hi Vikas,
Further to your comment above, I would like to point you to my thread here and specifically ask you about the following statement:...
3. Open your GRC functions and make sure you have correct back end system updated for them. Check the status of all your GRC functions and make sure they all are active.
I opened up the Functions from NWBC and realized that all the systems for each function were as follows:
1. SAP Basis
2. SAP CRM
3. SAP ECCS
4. SAP HR
5. SAP R3 NON HR Basis Logical Group
6. SAP R3
7. Logical Group
AND ALSO
8. The DESCRIPTION of my RFC Connector ?!
Now my question is as follows:
1. Where in the Pre/Post/GRC300 documents does it say that one must configure each function with the backend system as you state above....should the configurations Connector/Connector/etc etc already mapped the functions to the backend system ?
2. Also Why is the description of my RFC Connector available as a drop down menu from " System" tab on the function edit mode - see attached screenshot.
Your advice would be appreciated.
Best regards,
Paul

Similar Messages

  • GRC 10 - Risk Analysis in legacy system

    Hi everybody,
    I have a problem with legacy connectors in GRC 10. I implemented the note 1594963. So, I created the legacy files and storage it in GRC server.
    When I run the user synch, the legacy connector only synch the first record.
    Someone can help me? Someone did implement a risk analysis for legacy systems?
    Regards,

    Hi  Claudio Ekel
    Can you share some inputs on the Legacy Risk Analysis.
    We have configured the Legacy Connector as per the note 1594963 ; Placed the files on the server & tried running Synchronization Jobs. But the data is not getting uploaded to GRC10 .
    We made sure that text files are in UTF-8 format
    Is it mandatory to load all the 11 files that are provided in the note 1594963? We have excluded the Profile related files
    Can you share a sample of Legacy file formats that you have used for the sync.
    Can you throw some light on what could be the possible issues for data not getting uplaoded to GRC10?
    Regards,
    Pavan Muthyala

  • GRC CUP risk analysis

    Hi,
    Risk analysis give risk status result in balls like red in critical, light red in high,orange in medium.we want,it should say critical,high,medium and low intead of balls and simulate also give same result as risk analysis.we also don't want if critical conflict then it should not allow that role/roles/request to be approved by approver.In stages it already set as "no" for approve roles despite any conflict and also in mitigation too in configuration.
    Thanks
    Mushu.

    Hi Mushu,
      None of these is possible in 5.x. You can not customize any of the screens or the process. Go for GRC 10.0 which will be going on ramp-up by end of december as that would allow you to customize most of the screens.
    Alpesh

  • GRC CC Risk Analysis download to Excel SE characters

    Hi All,
    I have performed a Risk Analysis in our GRC CC5.2 and the output was good. I was able to read Swedish characters in the Internet Explorer. However, when I download the report into Excel and open the file locally from my hardware, I see the Swedish Characters as:
    Anna Sjöberg                                        (via GRC CC in IE, it display Anna Sjöberg)
    Gerd Jönsson                                       (via GRC CC in IE, it display Gerd Jönsson)
    Anyone have the same display issue with Swedish characters?
    Thanks.
    Raymond

    Hi Raymond,
    Kindly let me know which version of Microsoft Excel are you using??
    If you are using excel 2000
    Check the note 1282267
    Regards
    Gangadhar
    Edited by: gangadhar hm on Sep 4, 2009 1:08 PM

  • [GRC] IS-Risks in Complex Value Networks

    Hi everybody,
    I would like to discuss my current research project with you:
    Especially in complex value networks, it is important to have mutual risk understanding and mechanisms to control risks among all value adding partners. How can global sourcing projects along automotive supply chains manage and distribute risks among each member? How are risks and their spreading treated within trade cooperation, e. g. how do retailers deal with erroneous labeled EANs or misleading information on goods, provided by wholesaler or manufacturer? Compliance, risk and governance are important factors in the health sector. Time-critical processes in unstructured, complex hospital information systems need to be managed with careful regards to legal regulations and security related limitations.
    These are questions, I want to focus on and answer is my research. Do you have any experiences with these issues? What are interesting features in SAP GRC components, supporting these points indirectly or directly? What other features could you imagine to be implemented in future? What are, from your perspective, interesting GRC-topics?
    Kind regards     
    Manuel

    Quote from: DaLoona on 26-June-08, 18:30:31
    …Your talking nanoseconds here 
    To give you an idea, we are talking a few seconds gain per hour.  Not worth it if you are on the border of stability.  Unless you are shooting for some kind of benchmark award.
    Quote from: youeffsee on 26-June-08, 03:29:52
    ...overclocking is extremely addictive...
    Oh YEA!!!  I still remember my pride when my neighbor said my Pentium 75Mhz was faster than his 125Mhz Pentium.  I had it over-clocked to 92Mhz and had cleaned Windows 95 of all the overhead.

  • GRC AC10 Risk analysis error

    Hi Experts,
    We are getting error in Risk analysis.
    We have checked configuration, RFC, Batch Jobs, Rule Generation.
    Rules are showing active in Rules library, User and Roles are appearing while searching. I searched SMP for notes and sdn for similar issue but couldn't find anyone.
    During risk analysis, explorer gives dump -
    The URL call http://itdgrctest.itconline.in:8002/sap/bc/webdynpro/SAP/grac_sod_search_appln was terminated because of an error.
    Note
    The following error occurred in system G10 : File Could not be opened
    The error occurred on application server ITDGRCTEST_G10_02 and in work process 4 .
    The termination type was: ERROR_MESSAGE_STATE
    The ABAP call stack was:
    Method: UPDATE_FILE_DATA_DETAIL of program CL_GRAC_SOD_REPORTING=========CP
    Method: SET_VIOLATIONS of program CL_GRAC_SOD_REPORTING=========CP
    Method: WRITE_OUTPUT_TO_DB of program CL_GRAC_SOD_RISK_ANALYSIS=====CP
    Method: RISK_ANALYSIS of program CL_GRAC_SOD_RISK_ANALYSIS=====CP
    Method: DO_RISK_ANALYSIS of program /1BCWDY/0O2TMNDMBELX0AO58TG7==CP
    Method: IWCI_GRAC_RISK_ANALYSIS~DO_RISK_ANALYSIS of program /1BCWDY/0O2TMNDMBELX0AO58TG7==CP
    Method: EXECUTE_ANALYSIS of program /1BCWDY/0O2TMNDMBFK6DDPI1C1Q==CP
    Method: IF_SEARCH_VIEW~EXECUTE_ANALYSIS of program /1BCWDY/0O2TMNDMBFK6DDPI1C1Q==CP
    Method: ONACTIONSEARCH of program /1BCWDY/0O2TMNDMBFK6DDPI1C1Q==CP
    Method: IF_WDR_VIEW_DELEGATE~WD_INVOKE_EVENT_HANDLER of program /1BCWDY/0O2TMNDMBFK6DDPI1C1Q==CP
    What can I do?
    If the termination type is RABAX_STATE, you will find more information on the cause of termination in system G10 in transaction ST22.
    If the termination type is ABORT_MESSAGE_STATE, you will find more information on the cause of termination on the application server ITDGRCTEST_G10_02 in transaction SM21.
    If the termination type is ERROR_MESSAGE_STATE, you can search for further information in the trace file for the work process 4 in transaction ST11 on the application server. ITDGRCTEST_G10_02 . You may also need to analyze the trace files of other work processes.
    If you do not yet have a user ID, contact your system adminmistrator.
    Error Code: ICF-IE-http -c: 600 -u: SABITADA -l: E -s: G10 -i: ITDGRCTEST_G10_02 -w: 4 -d: 20111115 -t: 162851 -v: ERROR_MESSAGE_STATE -e: File Could not be opened -X: 005056A41E8C1ED183EF148A3F5AFCCF_005056A41E8C1ED183EF142157E41CCF_1 -x: A4780FE1FA51F1DD9CCF005056A41E8C
    The termination type was: ERROR_MESSAGE_STATE, we I checked in St11. There error log is -
    N  *** ERROR => System ID and client from ticket are not the same than mine. [ssoxxkrn.c   1061]
    N  {root-id=005056A41E8C1ED183EEA264CAA11CCF}_{conn-id=005056A41E8C1ED183EEA264C5BA5CCF}_1
    N  *** ERROR => Neither was ticket issued by myself nor can I find issuer in TWPSSO2ACL (see note 1055856). [ssoxxkrn.c   1067]
    N  {root-id=005056A41E8C1ED183EEA264CAA11CCF}_{conn-id=005056A41E8C1ED183EEA264C5BA5CCF}_1
    M
    M Tue Nov 15 16:02:49 2011
    M  *** ERROR => AdCvtRecToExt: unknown opcode 71 (AD_OPCODE_71), ser 0, ex 0, errno 0 [adxx.c       2472]
    M  {root-id=005056A41E8C1ED183EEA4E10D4C3CCF}_{conn-id=00000000000000000000000000000000}_0
    M  *** ERROR => AdCvtRecToInt: unknown opcode 71 (AD_OPCODE_71), ser 0, ex 1, errno 1 [adxx.c       2530]
    M  {root-id=005056A41E8C1ED183EEA4E10D4C3CCF}_{conn-id=00000000000000000000000000000000}_0
    M
    If anyone has encountered the similar issue and has found a solution, please reply.
    Thanks in advance, Regards,
    Sabita

    Hi Experts,
    Iam also facing the same issue as below..
    Please let me konow if nay one of you encountered same issue and how you  resolved..
    Error while processing your query
    What has happened?
    The URL call http://yashgrcsrv.sapyash.com:8010/sap/bc/webdynpro/SAP/GRAC_UI_SPM_OWNER_POWL was terminated because of an error.
    Note
    The following error text was processed in system G10 : The ASSERT condition was violated.
    The error occurred on the application server YASHGRCSRV_G10_10 and in the work process 1 .
    The termination type was: RABAX_STATE
    The ABAP call stack was:
    Method: IF_POWL_FEEDER~HANDLE_ACTION of program CL_GRAC_POWL_SPM_FFOWNER======CP
    Method: FEEDER_HANDLE_ACTION of program CL_POWL_MODEL=================CP
    Method: DISPATCH_ACTION of program CL_POWL_MODEL=================CP
    Method: DISPATCH_PREPARED_ACTION of program CL_POWL_TABLE_HELPER==========CP
    Method: ON_OBJECT_ACTION of program /1BCWDY/07CT55XNN6UHRCSZMBJE==CP
    Method: IF_TABLE_DATA~ON_OBJECT_ACTION of program /1BCWDY/07CT55XNN6UHRCSZMBJE==CP
    Method: ON_TOOLBAR_OBJECT_ACTION of program /1BCWDY/07CT55XNN6UHRCSZMBJE==CP
    Method: ON_TOOLBAR_OBJECT_ACTION of program /1BCWDY/07CT55XNN6UHRCSZMBJE==CP
    Method: IF_WDR_VIEW_DELEGATE~WD_INVOKE_EVENT_HANDLER of program /1BCWDY/07CT55XNN6UHRCSZMBJE==CP
    Method: INVOKE_EVENTHANDLER of program CL_WDR_DELEGATING_VIEW========CP
    What can I do?
    If the termination type is RABAX_STATE, you will find more information on the cause of termination in system G10 in transaction ST22.
    If the termination type is ABORT_MESSAGE_STATE, you will find more information on the cause of termination on the application server YASHGRCSRV_G10_10 in transaction SM21.
    If the termination type is ERROR_MESSAGE_STATE, you cansearch for further information in the trace file for the work process 1 in transaction ST11 on the application server. YASHGRCSRV_G10_10 . You may also need to analyze the trace files of other work processes.
    If you do not yet have a user ID, contact your system adminmistrator.
    Error Code: ICF-IE-http -c: 100 -u: GRCADMIN -l: E -s: G10 -i: YASHGRCSRV_G10_10 -w: 1 -d: 20111117 -t: 124258 -v: RABAX_STATE -e: ASSERTION_FAILED -X: 00188B01D3231EE1849D72367EF328EF_00188B01D3231EE1849D723252D408EF_1 -x: 91EB10E1F7B3F19FA8EF00188B01D323
    HTTP 500 - Internal Server Error
    Your SAP Internet Communication Framework Team
    Regards,
    Ravi Alluri.

  • GRC! Realmente devo investir em aprende-lo só agora?

    Boa noite,
    Sou consultor PI da Gafisa S.A construtora em SP.
    Aqui não precisamos implementar o GRC, a SPED foi feito por um software de terceiro e a única coisa que temos desenvolvida no PI são interfaces que levam informações para o SQL desse software terceirizado.
    Gostaria de saber se com o limite do prazo para a entrega da SPED, é realmente importante aprender como utilizar o GRC nessa altura do campeonato ? O GRC possui alguma outra funcionalidade tão bem utilizada além da NFE ? Se eu sair do meu atual emprego em 1 ano. Nessa data daqui à 1 ano, terão oportunidades para NFE ou já estará tudo implementado e será algo já extinto ?
    Gostaria de sugestões de vocês que estão tão envolvidos com esse módulo, e gostaria de saber se devo estudar sobre o GRC afim de aumentar minhas habilidades de PI.
    Muito Obrigado,
    Diego Crespo

    Muita informacao misturada no mesmo canto.
    Vamos tentar desmistificar alguns conceitos:
    - SPED: projeto nacional conceitual, que visa a reducao do chamado "Custo Brasil", focando principalmente na eliminacao de obrigacoes em papel e "simplificando" (ou reduzindo o numero de) reports e processos eletronicos;
    - EFD (tb chamado "SPED Fiscal"): Escrituracao Fiscal Digital, report eletronico que visa substituir diversos livros fiscais, entre eles nota fiscal de saida, de entrada, inventario etc. Faz parte, num contexto macro, do projeto nacional SPED.
    - ECD (tb chamado "SPED Contabil"): Escritruacao Contabil Digital, report eletronico que visa substituir obrigacoes contabeis (e.g. Diario, Razao etc). Faz parte, num contexto macro, do projeto nacional SPED.
    - NF-e: Nota Fiscal eletronica, que criou um novo processo de autorizacao online para emissao de notas modelo 55 (em substituicao às notas modelo 1/1A). Faz parte, num contexto macro, do projeto nacional SPED.
    - SAP GRC NFE: solução SAP para o processo de NF-e. Utiliza o produto SAP Process Integration (SAP PI) para a comunicacao com Business Partners externos (e.g. SEFAZs, fornecedores (p/ recepcao de XML) e clientes (p/ envio de XML));
    - GRC: Governance, Risk & Compliance, uma suite de solucoes SAP que endereçam issues de governança, gerenciamento de risco e conformidade legal. Além do SAP NFE, existem diversas outras solucoes classificadas como GRC: SAP Access Control, SAP Process Control, SAP GTS, SAP EH&S etc. Todas essas solucoes sao independentes das outras no sentido de que não tem necessariamente a mesma arquitetura (e.g. usando o SAP PI).
    Quando vc diz que vcs utilizaram software de 3o p/ o "SPED", vc quis dizer p/ a NF-e ou EFD/ECD?
    A data limite de entrega do "SPED", imagino que esteja falando do EFD/ECD, que nao tem nada a ver com NF-e.
    P/ NF-e, existem diversas ondas de obrigatoriedade, com certeza muitas empresas já foram, mas existem ainda diversas para entrarem, então acho q ainda existe um mercado potencial pelos proximos 2 anos, no minimo. Com certeza, depois disso a tendencia é cair. O SAP NFE nao deve ser encarado como sendo um modulo a ser aprendido e viver só dele, mas sim como uma porta de entrada para os processos dentro do SAP. Uma vez aprendido o NFE, vc pode dar um foco mais funcional (no SD e MM) ou mais tecnico, no PI. Vai depender do seu perfil.
    Abs,
    Henrique.
    PS: vou mover o tópico p/ o forum de Discussoes Gerais

  • BI content of GRC 5.3 can be only partial actived

    I'm trying to active the GRC BI content in my BW system but same of the
    components are missing.
    For example:
    Process chain: GRC CC (Risk Analysis and Remediation)
    Chain: GCC_INITIAL_MASTERDATA
    If I'm trying to active this chain (of course has a part of the cube
    and dso) I'm getting this error messages:
    <h4>##Shadow object DTP_48BXIRIEBHM4UF6XWZY9LO76Z cannot be expanded; chain is inconsistent

    More Detail about error message :
    I'm trying to active the GRC BI content in my BW system but same of the
    components are missing.
    For example:
    Process chain: GRC CC (Risk Analysis and Remediation)
    Chain: GCC_INITIAL_MASTERDATA
    If I'm trying to active this chain (of course has a part of the cube
    and dso) I'm getting this error messages:
    ##Shadow object DTP_48BXIRIEBHM4UF6XWZY9LO76Z cannot be expanded;
    chain is inconsistent
    ##Shadow object DTP_48C2OR96HB1S3CL6B6RAT1RVE cannot be expanded;
    chain is inconsistent
    ##Shadow object 0PAK_47W5FW95SQZURT1SWZNHUL8N2 cannot be
    expanded; chain is inconsistent
    And there are 163 error messages like that.
    My BI content SP is:
    BI_CONT#704#0005#SAPK-70405INBICONT#Business Intelligence
    Content

  • Oracle IAM integration with GRC 10

    Hi All,
    Our client is using Oracle IAM for user provisioning process. Now they have SAP GRC being implemented for two of their SAP systems. Now client wants to integrate SAP GRC Access Risks analysis (ARA) for SOD analysis and User Access Management(UAM) for user provisioning modules of SAP GRC 10 with Oracle IAM.
    As far as i know, webservices needs to be activated in GRC 10 and has done that. Now i want to know how Oracle IAM communicates with GRC 10. How connectors needs to be developed, User account to be created for web service access and how the parameters are passed from oracle to grc.
    Also how many different scenarios are there in oracle IAM for this integration?
    In SAP IDM vs SAP GRC integration we have 2 scenarios.
    1. Request raised in IDM -> SOD analysis in GRC -> Provisioning in GRC -> Return success/failure status back to IDM
    2. Request raised in IDM -> SOD analysis in GRC -> Return SOD success/failure status back to IDM -> Provisioning in IDM
    So can anyone help with possible scenarios for this integration process??

    Hi vikas and Frank,
    Do you have any information related on How to enable the webservices in the GRC 10 (does NWBC holds the key). if you have any information related to it  please share it with me.
    Thanks and regards,
    keerthi

  • How to avoid GRC provisioning dynamically

    Hi All,
    I have typical scenario like this:
    I have integrated IDM with GRC for risk analysis and SAP system provisioning. I have various workflows where GRC provisioning framework is getting called when GRC privileges are assigned or revoke.
    But in one workflow, I need to assign GRC privileges to user but I do not want "AC Submit request" to be invoked.I want privileges to be assigned to the user without sending to GRC.
    Any suggestions how I can stop invoking "AC Submit Request" dynamically?
    Thanks,
    Dhiman Paul.

    Hi jai,
    Yes {A}{BYPASS_MEMBER_TASK=1} is working if we are writing directly in the To IdentityStore pass. Please find the below screenshot.
    But if we are using the script and trying to set the BYPASS_MEMBER_TASK=1 then we are not able to set the value.
    Below is the code:
    var PrivMskey = uIS_sGet(IDStore,"MSKEYVALUE",BRolePrivilege,true);--> Used to fetch the Mskey of the privileges.
    var task_property="{A}{BYPASS_MEMBER_TASK=1}";
    var tempval=task_property+PrivMskey;
    var SetPrivToUser = uIS_SetValue(mskey,IDStore,"MXREF_MX_PRIVILEGE",tempval);
    We are calling uIS_Setvalue to assign privileges to User through Action pass.
    This method is returning the following error, {A}{BYPASS_MEMBER_TASK=1}PrivMSKEY BYPASS_MEMBER_TASK=1 is getting concatenated with PrivMskey while BYPASS_MEMBER_TASK should have got set to 1.
    Please find the below screenshot.
    Thanks,
    Dhiman

  • IDM GRC Business Role managment

    Hi experts,
    We integrated SAP IDM with GRC,
    Now our requirement is creating a business in IDM/GRC, request for business role is raised for IDM and approved by role owner in GRC after risk analysis.
    But SAP said business roles and portal groups are not supported between the systems.
    Kindly suggest how to accomplish this.
    Regards,
    Jaya

    Hi Jaya,
    Yes I remember this is possible. You can setup a customize attribute in GRC privileges. And put the business role name into this attribute.
    Try this URL, but perhaps your GRC consultant should read it instead of you.
    http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/d0e2c628-2690-2e10-0d82-dbf1931db2cd?QuickLink=index&overridelayout=true&51565377381172
    After creating the attribute, you need to revise the GRC framework to include this attribute (business role name) in your request.
    I don't have a working IDM system (with GRC integration) with me. I could not provide you more details.
    Cheers,
    Chenyang Xiong

  • What is GRC all about?

    Hello
    What is GRC (Governance; Risk and Compliance) module all about?
    What is its implementation time if it is to be implemented stand alone post Go live?
    What are the functionalities available in it a

    SAP GRC Access Control has a central repository for access and authorization based risks and controls:-
    1. Provides risk analysis for every Process that can be covered by the solution
    2. Supports the creation and assignment of a mitigation control out of an approval workflow via  
        the mitigation service
    SAP Access Control contains the following tools which are becoming increasingly integrated for optimum usage:
    1. Compliance Calibrator (Risk Analysis and Remediation u2013 RAR)
    This tool supports real-time compliance by stopping security and controls violations before they occur. It contains the most comprehensive library of Segregation of Duty (SoD) rules available for enterprise applications from SAP, Oracle, and PeopleSoft. This makes it easy for business-process owners to deploy rules applicable to their organization and to eliminate risks from enterprise applications.
    2. Firefighter (Super Privilege Management u2013 SPM)
    This enables super-users to perform emergency activities outside the parameters of their normal role, but to do so within a controlled, fully auditable environment. The application assigns a temporary ID that grants the super-user broad yet regulated access, and tracks and logs every activity the super-user performs using that temporary ID.
    3. Role Expert (Enterprise Role Management - ERM)
    ERM centralizes and standardizes enterprise wide role management. This helps to eliminate manual errors, provides an audit trail for changes, and enforces best practices. Using the application, business managers can define functional roles, and IT managers can define the associated technical permissions.
    4. Access Enforcer (Compliant User Provisioning - CUP)
    CUP supports fully compliant user provisioning across applications throughout the employee life cycle. Multi-step guided procedures automate approval processes and enforce mandatory, real-time risk assessments prior to provisioning users to enterprise applications.

  • IDM connected with GRC

    Hi All,
    Would like to check a question with you. As I know SAP IDM can be connected with SAP GRC for risk analysis during user request. Does anyone know if there are any other IDM solutions (other than SAP IDM) which can be connected with SAP GRC and do risk analysis during user request?
    Thanks in advance.
    Benny Ren

    Hi Ankur,
    Thanks for your reply. As I understand the GRC adapter in ITIM works only with SAP resource (please correct me if I am wrong) and not any other ERP or non-ERP resource. Is there any way so that I can directly use webservices with ITIM without using ITIM adapter.
    Hi Frank,
    If I can integrate the webservice directly with ITIM, then what I can do is using the risk analysis find out what are the roles which violates the SoD. If web services can return that, then I can use the following steps:
    - Create a Life cycle rule to find all the violations.
    - Once violations are identified then send an approval for the violations.
    - If this are approved, then the role can remain with the person.
    - If rejected then the role will be removed through the life cycle it self.
    Please let me know if what I think can be done and is feasible.
    Thanks to all for your replies.
    Regards,
    Ashish Choudhary

  • Discovery V3 does it consist GRC Process Control.

    Hi All,
        In Discovery V3 we have Compliance calibrator and Acess enforcer as part of GRC(governance Risk and Complaince), what i want to know is that Disocvery V3 consist of GRC process control or not?
    Regards,
    Naveen.

    Hi,
    DS V3 does not have GRC Process control but only the following as you are aware of.
    Compliance Calibrator 5.2, Access Enforcer 5.2, Role Expert 5.2, and Fire Fighter 5.2
    Hope this helps.
    Kathir

  • Access Control functionality in Oracle workflow

    Hi everyone,
    I am doing research into access control models and workflow systems (separation of duty policies in particular). As far as I could tell, Oracle Workflow does not provide much in terms of securing access to data in a workflow process (except from the normal login authentication of course).
    One usually assigns a task's performer to a CONSTANT role from your database roles so that only certain users will have access to that task. This is not always enough though, especially when the role-hierarchy is not properly contructed and maintained. So, I've been working on a few scripts to dynamically prevent users from receiving tasks on their worklists based on their previous participation in the process (e.g. to prevent a manager from approving his own leave application).
    I was just wondering if anyone else have been working on access control in Oracle Workflow. Is there any built-in functionality that I missed that controls task-user assignment?
    Thanks,
    Carmen

    Thank you very much Sirish for your help.
    We are facing huge performance issues while Risk Analysis with Oracle Application servers through Greenlight Adaptor - its taking around 10 hours for 3000 users. Can you please point out what can be the possibilities and how can we trace out exact root cause and then solve it.
    This is happening on GRC AC 5.2 SP10 and GRC logs doesn't say much , it just gives output taken 12 secs for one user Risk Analysis.
    Here is our understanding on how GRC does Risk Analysis and our observations on our systems -->
    1. GRC asks for 1 user details at a time from Oracle Application Server - please confirm does GRC do Risk Analysis for one user at a time or a bunch of users?
    2. Oralce App server get details of that user and sends back results to GRC.
    3. Now there is a wait time for around 3 secs before Oracle Server gets request for the second user. 3 sec for one user means 2.5 hours of wait time for 3000 users. We are not able to understand why Oracle Server needs to wait for next user request from GRC?
    Would highly appreciate if you can share your experience on GRC Risk Analysis with Oracle (Greenlight Adaptor) and with SAP systems.
    Best Regards
    Davinderpal Singh

Maybe you are looking for

  • Accessing NFS mounts in Finder

    I currently have trouble accessing NFS mounts with finder. The mount is O.K. I can access the directories on the NFS server in Terminal. However, in Finder when I click on the mount, instead of seeing the contents of the NFS mount I only see the "Ali

  • Routing Types

    Hi, Could some one explain about the differences between, content based routing, context based routing and dynamic routing Thanks, Balaji.

  • Re-work mapping in SAP B1

    Hi all How we can map the re-work in SAP B1 like I had released the production order for 100 qty with x-item and made the report completion for 100 qty after that i came to know that 20 has to be reworked which means 20 of the x-item has to issue to

  • MVPN Extranet Issues in IOS XR (ASR9k)

    Hello Experts ! We have analyzed and worked through a customer scenario where the following situation was given and did not work properly: 3 vrfs on various PEs where interconnected by matching imp and exp Rts (so they are ONE core  unicast domain) M

  • Mac OS X 10.4.7 for Intel re-released; now posted

    For those with issues with the latest update for the Macbook, try this link and sees if it resolves your issues David http://www.macfixit.com/article.php?story=2006062914492384