Support  |  1-800-620-4210  |  
Home » Solutions » Role Lifecycle Management » Role Management (RM)
 

Streamlined control of the entire role lifecycle with Role Management

Managing SAP roles can be time-consuming, costly, and complicated. Errors increase as security administrators and IT staff struggle to design, develop, test, provision, and manage roles under stressful conditions with only rudimentary tools. Our Role Management module automates many of the key processes at each stage of the role lifecycle and ensures roles are built to the right requirements with the proper documentation for audits.


Understand how roles are being used with detailed role reporting.

Detailed reports show how a role is being used (or not used) in production, the number of users assigned a role, the number of derived roles, and what license requirements are associated with each role.

Understand how roles are being used with detailed role reporting.


Manage SAP roles from your mobile device.

Manage SAP roles from your mobile device.

With Role Management, managers can approve roles directly from their mobile devices. They do not have to log into the module. Administrators can access the roles they are working on directly from their email and so reduce the time it takes to make comment or design adjustments.



Ensure SOD and critical access checks take place.

Crucial segregation of duties (SOD) and critical access checks can be completed at any stage in the role development process. Roles with SOD conflicts can be blocked from progressing through the development process until they receive special approvals and proper mitigation. This ensures your environment stays clean of SOD conflicts.

Ensure SOD and critical access checks take place.


Simplify requirements gathering with pre-built templates.

Simplify requirements gathering with pre-built templates.

Templates can be used to consistently and easily capture design requirements. These time-saving templates allow administrators to ask the right questions and get the right information, thereby helping administrators to make the right technical decisions, auditors to have confidence that application access is well controlled, and managers to have the information they need to decide if a new role, or changes to an existing role, should be approved.