Call Us Now:
+91 9642208877

You are here

  • Overview of GRC
  • Access Control 10.0: Introduction
  • Access Control 10.0: Landscape & Architecture
  • Explanation of Installation steps
  • GRC 10.0 Post-Installation
  • Configuration of Access Control

ARA (Access Risk Analysis)

  • Configuring and Maintaining the Rule Set
  • Analyze and Manage Risk
  • Maintain a Critical Access Rule
  • Role Level Simulation
  • User Level Simulation
  • Perform Ad Hoc Risk Analysis
  • Mitigating Risks

EAM (Emergency Access Management)

  • Emergency Access Management Configuration
  • Maintain Owners and Controllers in Central Owner Maintenance
  • Assign Owners to Firefighter IDs
  • Assign Controllers to Firefighter IDs
  • Assign Firefighter Users to Firefighter IDs
  • Maintain Reason Codes
  • Monitoring Emergency Access
  • Review a Log Report

BRM (Business Role Management)

  • Configuring Role Management
  • Roles-Specific Configuration Options
  • Configuring Role Methodology
  • Settings for Condition Groups
  • Maintain Owners for Role Management
  • Create a Single Role
  • Mass Maintenance of Roles

ARM (Access Request Management)

  • Maintaining MSMP Workflow
  • Customize Workflow
  • Settings Specific to Provisioning and Managing Users
  • End User Personalization Forms
  • Create an Access Request
  • Business Rules Framework

Migration from GRC 5.3 to GRC 10.0

  • Explanation Of Migration