Operations Guide For SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1
Operations Guide For SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1
Operations Guide For SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk Management 10.1
13-07-25
1 Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Global Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Important SAP Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
5 High Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
2 PUBLIC Content
6.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.2 Transport and Change Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.3 Development Requests and Development Release Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.4 Quality Management and Test Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.5 Support Packages and Patch Implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7 Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
9 Appendix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
9.1 Categories of System Components for Backup and Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
9.2 Related Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Content PUBLIC 3
1 Getting Started
1.1 Introduction
The Operations Guide provides administration information for Access Control, Process Control, and Risk
Management.
SAP Access Control is an enterprise software application that enables organizations to control access and
prevent fraud across the enterprise, while minimizing the time and cost of compliance. The application
streamlines compliance processes, including access risk analysis and remediation, business role management,
access request management, emergency access maintenance, and periodic compliance certifications. It delivers
visibility of the current risk situation with real-time data.
SAP Process Control is an enterprise software solution for compliance and policy management. The compliance
management capabilities enable organizations to manage and monitor its internal control environment. This
provides the ability to remediate any identified issues, and then certify and report on the state of the
corresponding compliance activities. The policy management capabilities support the management of the overall
policy lifecycle, including the distribution and attestation of policies by target groups. These combined capabilities
help reduce the cost of compliance and improve management transparency and confidence in compliance
management processes.
SAP Risk Management enables organizations to balance business opportunities with financial, legal, and
operational risks to minimize the market penalties from high-impact events. The application allows customers to
identify these risks and monitor them on a continuous basis. Stakeholders and owners are provided with such
tools as analytic dashboards for visibility in mitigating risks in their areas of responsibility.
This guide provides a starting point for managing your SAP applications and maintaining and running them. It
contains information for tasks and lists the tools to implement them. This guide also provides references to the
documentation required for these tasks.
Note
The guide refers to the SAP NetWeaver Operations Guide as most production operation tasks are done at the
server level. The application tasks are in the Monitoring and Management sections.
Caution
This guide does not replace the daily operations handbook that we recommend customers create for their
production operations.
Target Groups
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
4 PUBLIC Getting Started
The guide is written for the following audiences:
● Technical Consultants
● System Administrators
● Solution Consultants
● Business Process Owner
● Support Specialist
SAP Application:
An SAP software solution that serves a specific business area like ERP, CRM, PLM, SRM, SCM.
Business Scenario:
From a microeconomic perspective, a business scenario is a cycle that consists of several different
interconnected logical processes in time. A business scenario includes several company departments and
business partners. From a technical point of view, a business scenario needs at least one SAP application (SAP
ERP, SAP SCM, or others) for each cycle and possibly other third-party systems. A business scenario is a unit that
can be implemented separately and reflects the customer’s prospective course of business.
Component:
The smallest individual unit considered within the Solution Development Lifecycle. Components are separately
produced, delivered, installed, and maintained.
For a list of important SAP Notes for the applications, see the following:
● For Access Control, see the SAP Access Control 10.1 Master Guide at http://help.sap.com/grc-ac .
● For Process Control, see the SAP Process Control 10.1 Master Guide at http://help.sap.com/pc .
● For Risk Management, see the SAP Risk Management 10.1 Master Guide at http://help.sap.com/rm .
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Getting Started PUBLIC 5
2 Technical System Landscape
2.1 Introduction
For information about the technical system landscape and the software component matrix, see the application
master guides.
Scroll down to the Installation information to find a link to the Master Guide.
For more information about the technical system landscape, see the guides in the following table.
Table 1:
Technical Configuration
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
6 PUBLIC Technical System Landscape
3 Monitoring of the Application
3.1 Introduction
The information in this section applies to Access Control, Process Control, and Risk Management. Within the
management of SAP Technology, monitoring is an essential task. The Computing Center Management System
(CCMS) is a set of integrated tools for monitoring and administration of SAP system landscapes. The transaction
code is RZ20.
Recommendation
For more information about the underlying technology, see the Technical Operations for SAP NetWeaver at
http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and Maintenance
Information
This section lists the CCMS monitor sets you can use to monitor the application components. The CCMS Monitor
Templates include the following:
● Background processing
● Performance overview
● Syslog
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 7
Figure 1: CCMS Monitor Template and Web Service Monitor
3.3.1 Introduction
Proactive, automated monitoring is the basis for ensuring reliable operations for your SAP system environment.
SAP provides you with the infrastructure needed to set up your alert monitoring to recognize situations for Access
Control, Process Control and Risk Management as quickly as possible.
Recommendation
To enable the auto-alert mechanism of CCMS, see SAP Note 617547 .
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
8 PUBLIC Monitoring of the Application
3.3.2 Component Specific Monitoring
You monitor the following data in the SAP Standard CCMS tool for Access Control, Process Control and Risk
Management:
● Background job
● Performance Overview
● DB access time
● System log
● System errors
● Web Services Call
Background Jobs
You monitor the background job status for jobs that are aborted, canceled, or have been running for a long time.
Example
This is an example of background jobs with the status of Long Running Jobs and Aborted Jobs:
Figure 2: Background Jobs with status of Long Running Jobs and Aborted Jobs
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 9
Example
The following graphic illustrates that BFC_001 through BFC_005 jobs have the status of Canceled:
You can check the details of canceled jobs by selecting a job and clicking Step. The following graphic is an example
of the details for a selected job.
Note
The Program name/command for the applications start with GRAC, GRPC, or GRFN. They should be alerted.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
10 PUBLIC Monitoring of the Application
Figure 4: Details of a Job
Performance Overview
In the Performance Overview CCMS Monitor Templates, look for processes with a high Response Time.
Note
● Access Control processes begin with GRAC.
● Process Control processes begin with GRPC.
● Risk Management processes begin with GRFN.
Example
The following figure illustrates that the GR4 system has a response time of 1448 milliseconds.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 11
Figure 5: System Response Time
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
12 PUBLIC Monitoring of the Application
Example
The following graphic illustrates an example of Process Control process (GRPCRTA_PC):
System Logs
Example
The following graphic illustrates that the R3Syslog displays a runtime error.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 13
Figure 7: Runtime error
You can review the System Log (Syslog): Local Analysis for errors.
Note
● Access Control transaction codes start with GRAC.
● Process Control transaction codes start with GRPC.
● Risk Management transaction codes start with GRFN.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
14 PUBLIC Monitoring of the Application
Example
The following graphic illustrates local analysis of Process Control transaction codes:
Access the complete list of Access Control transaction codes with transaction code SE93. Search for GRAC*.
Some of the most used codes include:
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 15
System Errors
You review the CCMS Monitor Templates (System Errors) for error messages.
Example
The following graphic illustrates system errors such as Aborted Batch Jobs and Update Errors:
Web Services
You monitor the SAP Web Service Monitor Templates for errors.
Example
The following graphic illustrates the following monitors:
● Task Watcher
● Supervisor Destination
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
16 PUBLIC Monitoring of the Application
● Web Services Reliable Messaging (WSRM) Event Handler
● Web Services (WS) Namespace for Inbound Destinations
● WS Service Destinations
3.4.1 Introduction
Process Control, Risk Management and Access Control are based on SAP NetWeaver Web Application Server
7.40.
Recommendation
For information about technical problem analysis (such as database, operating system, or workload analysis)
see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver SAP
NetWeaver Platform System Administration and Maintenance Information
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 17
3.4.2 Trace and Log Files
The information in this section applies to Access Control, Process Control and Risk Management. Trace files and
log files are essential for analyzing problems. You can use SAP NetWeaver transactions, such as ST22 and SM2, to
monitor trace and log files.
Note
The archiving object for Access Control is GRAC_REQ.
Recommendation
For more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/
netweaver SAP NetWeaver Platform System Administration and Maintenance Information
Additionally, the GRC applications use the SAP NetWeaver application log to store application error warning and
success messages issued in critical processes. For example, the delivery interface between ERP and Process
Control, or in UI transactions stores the messages in the SAP NetWeaver application log. For UI transactions, the
application log must be explicitly saved by the user.
Recommendation
For more information about application logs, see http://help.sap.com/netweaver SAP NetWeaver 7.4
Application Help Function-oriented View (select language) Solution Life Cycle Management Application
Log (BC-SRV-BAL) .
Application Logs – The application logs can be monitored with transaction SLG1.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
18 PUBLIC Monitoring of the Application
Log Object Log Subobjects Description
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 19
Log Object Log Subobjects Description
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
20 PUBLIC Monitoring of the Application
Log Object Log Subobjects Description
Job Logs – You can view job logs using transaction SM37.
Workflow Item Logs – You can view the workflow item logs using transaction SWI1.
Recommendation
For more information, see the SAP Library at http://help.sap.com and search for SAP Workflow
Administration.
Scheduler Logs – Process Control only. To view the scheduler logs, log on to the portal, select a regulation
workset and click Rule Setup Scheduling
For a description of the tasks containing data growth, see the Periodic Task [page 26] section in this guide.
Process Control, Risk Management and Access Control use the standard tools for this function available in the
SAP NetWeaver Application Server 7.40 and do not require a component-specific tool.
Recommendation
For information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver
SAP NetWeaver Platform System Administration and Maintenance Information
Process Control, Risk Management and Access Control use the standard tools for this function available in the
SAP NetWeaver Application Server 7.40 and do not require a component-specific tool.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 21
Recommendation
For more information, see the Technical Operations Manual for SAP NetWeaver in the SAP Library under SAP
NetWeaver.
Process Control, Risk Management, and Access Control use the standard tools for this function available in the
SAP NetWeaver Application Server 7.40 and do not require a component-specific tool.
Recommendation
For information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver
SAP NetWeaver Platform System Administration and Maintenance Information
Interface monitors analyze problems with interfaces such as RFC, IDoc, and HTTP. Process Control, Risk
Management and Access Control use the standard tools available in the SAP NetWeaver Application Server 7.40
and do not require a component-specific tool.
Recommendation
For information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/netweaver
SAP NetWeaver Platform System Administration and Maintenance Information
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
22 PUBLIC Monitoring of the Application
3.5 Important Application Objects
We recommend you monitor the following Process Control, Risk Management and Access Control objects:
Process Overview Transaction SM50 The monitor tracks the amount of time critical processes
such as dialog (DIA), update (UPD), or background (BGD)
have been running. Processes that have been running too
long are shown in red in the runtime column.
Background Process Transaction SM37 Select the jobs by job name, user name, status, and time
period to display a status overview of scheduled jobs. Look
for any canceled jobs.
Process Control and Risk Transaction GRFN_LOG_ENABLE Enable logging for the following subobjects if you need to
Management Application track errors in API or authorization check areas:
Logs
● API — GRC API Logging
● AUTH — GRC Authorization
Application Logs Transaction SLG1 Enable the GRPC application logs for potential risk areas,
such as API access and authorization. Using transaction
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Monitoring of the Application PUBLIC 23
Object Tools Description
Shared Objects Memory Transaction SHMM Transaction SHMM provides an overview of the area instan
ces in the shared objects memory of the current applica
tion server.
Workflow event queue SWEQADM Use the event queue to delay the starting of receivers re
acting to a triggering event. This spreads the system load
over a longer time period to combat the threat of system
overload. The system administrator sets the event queue.
SICF Transaction SICF Use this transaction to activate Internet services, Web
services, and Web Dynpro.
SIGS Transaction SIGS Use this transaction to view the status of IGS services and
the required parameters.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
24 PUBLIC Monitoring of the Application
4 Managing the Application
4.1 Introduction
The information in this section applies to Process Control, Risk Management and Access Control. SAP provides
you with an infrastructure to help your technical support consultants and system administrators manage all SAP
components and complete tasks related to administration and operation. The underlying technology of Process
Control, Risk Management and Access Control are based on SAP NetWeaver.
Process Control, Risk Management, and Access Control are provided as add-on components for SAP NetWeaver.
You start and stop them with SAP NetWeaver Web Application Server.
Recommendation
For more information about STARTSAP/STOPSAP and SAPMMC, see the Technical Operations Manual for SAP
NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration and
Maintenance Information
You need to back up your system landscape regularly to ensure that you can restore and recover it in case of
failure. All application data for the applications reside in the underlying database. No special backup and recovery
methods apply for this component.
The applications rely on the SAP NetWeaver ABAP standard capabilities for the technical operations. The
configuration data is stored in the Implementation Guide (IMG) database tables. These settings are established
during the Customizing activities during implementation (transaction SPRO).
Note
If you use a document management system (DMS) that stores data outside of the underlying database, refer to
the backup and restore recommendations for that DMS.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Managing the Application PUBLIC 25
4.4 System Copy
For a system copy of Process Control, Risk Management or Access, the standard procedures of SAP NetWeaver
apply.
Recommendation
For more information, see the Technical Operations Manual for SAP NetWeaver in the SAP Library.
Heterogeneous system copies are performed on request and on a project basis. For more information, see
http://service.sap.com/osdbmigration .
Note
A client copy from one system into another system with a different operating system or database is not an
alternative to a complete heterogeneous migration. For example, client copies do not ensure that all repository
changes are taken over into the new system. Therefore, if you want to change your database or application
server platform, a heterogeneous system copy is the only procedure that ensures full data replication.
4.5.1 Introduction
The information in this section applies to Process Control, Risk Management and Access Control. In addition to
the standard jobs mentioned in the Technical Operations Manual for SAP NetWeaver, Process Control, Risk
Management and Access Control specific jobs must be scheduled in your system. Run all jobs, unless otherwise
specified, at times of minimal system activity (so as not to affect performance or otherwise disrupt your daily
operations). All jobs can be restarted. There are no dependencies between the jobs.
This information applies to Access Control, Process Control and Risk Management (unless noted). This
information describes the tasks required to keep the application running smoothly. You can configure the tasks to
automatically run. It is important that you monitor the execution of these tasks on a regular basis. The tasks are
scheduled using transaction SM36, except for the Background Job for Missed Deadlines, which uses transaction
SWU3.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
26 PUBLIC Managing the Application
Table 9: Scheduled Periodic Tasks
Schedule Background Job for Missed Every 3 minutes Specify a time interval at which the back
Deadlines ground job is called regularly. With each execu
tion, the background job checks whether new
deadlines have been missed since the last time
it ran.
Schedule Job for Sending E-Mail Every 3 minutes This program checks whether there are new
work items for Process Control and Risk Man
agement, and determines the e-mail addresses
of the work item recipients.
/GRCPI/GRIA_AM_CHANGELOG (in Daily This program captures the GRC PC change log.
plug-in system. Process Control only)
Transfer Work Items to Replacement Daily The program transfers work items from users
that are no longer working in Process Control
and Risk Management to the replacement
users entered in the system for these users.
Execute KRI Queries and Evaluate Busi Daily Schedule the report GRRM_KRI_RUNTIME.
ness Rules You schedule this job to query the KRI values
from the source systems, such as SAP Net
(Risk Management only)
Weaver Business Warehouse or SAP ERP, and
the business rules are evaluated to attain risk
alerts.
Document Copy after Sign-Off After event Schedule a job so that, after tasks have been
carried forward into a new timeframe, the
(Process Control only)
documents for those tasks are also copied into
the new timeframe. This applies to documents
that were created for issues or remediation
plans during assessment and tests.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Managing the Application PUBLIC 27
Access Control Synchronization Tasks
The following tasks are accomplished through the Customizing activities (transaction SPRO) found at SAP
Reference IMG Governance, Risk, and Compliance Access Control Synchronization Jobs . Also, refer to the
documentation next to each activity for detailed directions.
Note
The frequencies are recommendations, but adjust these according to your business need. For example, when
you are first implementing the product, you might want to run these tasks more often.
Process Control, Risk Management and Access Control use SAP NetWeaver for load balancing.
Recommendation
For more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/
netweaver SAP NetWeaver Platform System Administration and Maintenance Information
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
28 PUBLIC Managing the Application
4.7 User Management
Process Control, Risk Management and Access Control use SAP NetWeaver for user management.
Recommendation
For more information, see the documentation on the SAP Help Portal at help.sap.com/netweaver .
● For specific user management and authorization functions, see the application security guides at http://
help.sap.com/grc .
4.8 Printing
Process Control, Risk Management, and Access Control use SAP NetWeaver for printing.
Recommendation
For more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/
netweaver SAP NetWeaver Platform System Administration and Maintenance Information
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Managing the Application PUBLIC 29
5 High Availability
Use
Process Control, Risk Management, and Access Control use SAP NetWeaver for high availability.
Integration
Recommendation
For more information, see the documentation at http://www.sdn.sap.com/irj/sdn/ha .
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
30 PUBLIC High Availability
6 Software Change Management
6.1 Introduction
Software Change Management standardizes and automates software distribution, maintenance, and testing
procedures for software landscapes and multiple software development platforms. These functions support your
project teams, development teams, and application support teams.
Software Change Management establishes solution-wide change management that allows for specific
maintenance procedures, global rollouts (including localizations), and open integration with third-party products.
This section provides additional information about the most important software components.
For transport and change management issues, the procedures of SAP NetWeaver apply.
Recommendation
For more information, see the Technical Operations Manual for SAP NetWeaver at http://help.sap.com/
netweaver SAP NetWeaver Platform System Administration and Maintenance Information
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Software Change Management PUBLIC 31
6.3 Development Requests and Development Release
Management
The standard procedures of SAP NetWeaver apply. For more information, see the Technical Operations Manual for
SAP NetWeaver in the SAP Library.
You can use the SAP NetWeaver Development Infrastructure to learn about the various possibilities to test your
software changes.
We recommend you implement Support Package Stacks (SP-STACKS), which are sets of Support Packages and
patches for the respective product version that must be used in the given combination.
Read the corresponding Release and Information Notes (RIN) before you apply any Support Packages or Patches
of the selected SP-Stack.
The RIN and support packages for Process Control, Risk Management, and Access Control are available in the
SAP Service Marketplace at http://service.sap.com/patches .
Recommendation
For information about the tools required for implementing patches, see the Technical Operations Manual for
SAP NetWeaver at http://help.sap.com/netweaver SAP NetWeaver Platform System Administration
and Maintenance Information
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
32 PUBLIC Software Change Management
7 Troubleshooting
Use
Access Control, Process Control, and Risk Management are provided as add-on components for SAP NetWeaver
and use the same troubleshooting tools for the SAP NetWeaver Application server.
Recommendation
For more information about troubleshooting the SAP NetWeaver Application server, see the Technical
Operations Manual for SAP NetWeaver.
Process
The following troubleshooting procedure applies to the Process Control scheduler function only.
Symptom
Procedure
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Troubleshooting PUBLIC 33
The information for troubleshooting Process Control is maintained in SAP Notes. For troubleshooting information,
see SAP Note 1302302 Troubleshooting Guides for PC.
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
34 PUBLIC Troubleshooting
8 Configuring Remote Connection to SAP
Support
8.1 Introduction
SAP offers access to remote support and remote services. You have to set up a remote network connection to
SAP.
Recommendation
For more information, see SAP Service Marketplace at http://service.sap.com/remoteconnection .
Use
For remote support from SAP, a support user must have read-only access to the support tools. Since these
applications are built upon the NetWeaver ABAP stack, a support user can use the SAP standard CSS remote
support tool which is accessible through the SAPGUI or web browser.
Integration
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Configuring Remote Connection to SAP Support PUBLIC 35
9 Appendix
Table 11:
Categories of Sys Category Properties Suggested Methods for Backup and Re Examples
tem Components store
I Only software, no configu No backup, new installation in case of a re BDOC modeler
ration, or application data covery
II Only software and configu Backup after changes have been applied SAP Gateway
ration information, no appli
cation data No backup, new installation, and configura Communication Station
tion in case of a recovery
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
36 PUBLIC Appendix
Table 12:
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Appendix PUBLIC 37
Categories of Systems Com Category Properties Suggested Methods for Examples
ponents Backup and Restore
The following table contains links to information relating to the Solution Operation Guide.
Table 13:
/ibc
/network
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
38 PUBLIC Appendix
Important Disclaimers and Legal Information
Coding Samples
Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system
environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and
completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP
intentionally or by SAP's gross negligence.
Accessibility
The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a
binding guideline on how to ensure accessibility of software products. SAP in particular disclaims any liability in relation to this document. This disclaimer, however, does
not apply in cases of willful misconduct or gross negligence of SAP. Furthermore, this document does not result in any direct or indirect contractual obligations of SAP.
Gender-Neutral Language
As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales
person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not
exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible.
Internet Hyperlinks
The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not
warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages
caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. All links are categorized for transparency
(see: http://help.sap.com/disclaimer).
Operations Guide for SAP Access Control 10.1, SAP Process Control 10.1, and SAP Risk
Management 10.1
Important Disclaimers and Legal Information PUBLIC 39
go.sap.com/registration/
contact.html