Sizing Guide For Access Control 12.0
Sizing Guide For Access Control 12.0
2024-06-26
1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Functions of SAP Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
SAP Access Control 12.0 (Access Control) delivers a comprehensive, cross-enterprise set of access controls
that enables corporate compliance stakeholders -- including business managers, auditors, and IT security
managers -to collaboratively define and oversee proper Segregation of Duties (SoD) enforcement, enterprise
role management, compliant provisioning, and super-user privilege management. SAP Access Control
addresses a complete range of control risks.
SAP NetWeaver also helps organizations align IT with their business. With SAP NetWeaver, organizations can
compose and enhance business applications rapidly using enterprise services. As the foundation for enterprise
service-oriented architecture (enterprise SOA), SAP NetWeaver allows organizations to evolve their current IT
landscapes into a strategic environment that drives business change.
This guide provides guidelines and rules for sizing SAP Access Control in your environment. Sizing is the
process of translating business requirements into the hardware requirements (such as physical memory, CPU
processing power, and network capacity). The guide describes the steps of this process and explains the
factors that influence performance and hardware requirements. the steps of this process and explains the
factors that influence performance and hardware requirements.
SAP Access Control provides several features including access risk analysis, business role management,
emergency access management, and access request management, among others. Access Control offers the
following capabilities:
Risk Detection
SAP Access Control detects access and authorization risks across SAP and third-party applications, providing
protection against a range of potential risk sources including segregation of duties and transaction monitoring.
SAP Access Control enables fast, efficient remediation and mitigation of access and authorization risks by
automating workflows and enabling collaboration among business and technical users.
Reporting
SAP Access Control delivers the comprehensive reports and role-based dashboards businesses need to
monitor the performance of compliance initiatives and to take action as needed.
Risk Prevention
After access and authorization risks have been remediated, Access Control prevents new risks from entering
a production system. By empowering business users to check for risks in real time and automating user
administration, Access Control makes risk prevention a continuous, proactive process.
Access Control is an add-on (software component GRCFND_A) to SAP NetWeaver 7.52 (ABAP) that allows you
to use all databases and operating systems supported by the SAP Web Application Server. Figure 1 illustrates
the architecture.
Furthermore, GRC Plug-In Adapters are required for standard integration of SAP/third-party systems and SAP
Access Control.
Note
Additional extensions (not considered in this initial sizing) are also available, including Identity
Management Solutions integration, LDAP user repositories integration, third-party systems provisioning,
and SAP NW Enterprise Portal provisioning integration, among others.
This section explains important sizing terms, as these terms are used extensively in this document.
Sizing
Sizing means determining the hardware requirements of an SAP application, such as network bandwidth,
physical memory, CPU processing power, and I/O capacity. The size of the hardware and database is
influenced by both business aspects and technological aspects. This means that the number of users using the
various application components and the data load they put on the server must be taken into account.
Benchmarking
Sizing information can be determined using SAP Standard Application Benchmarks (www.sap.com/
benchmark). Released for technology partners, benchmarks provide basic sizing recommendations to
customers by placing a substantial load upon a system during the testing of new hardware, system software
components, and relational database management systems (RDBMS). All performance data relevant to the
system, user, and business applications are monitored during a benchmark run and can be used to compare
platforms.
SAPS
The SAP Application Performance Standard (SAPS) is a hardware-independent unit that describes the
performance of a system configuration in the SAP environment. It is derived from the Sales and Distribution
(SD) Benchmark, where 100 SAPS is defined as the computing power to handle 2,000 fully business processed
order line items per hour. (For more information about SAPS, see www.sap.com/benchmark → Measuring in
SAPS).
You need to identify which tasks run in parallel and which tasks run in sequential order to calculate SAPs
correctly.
Note
• If tasks are done at the same time (parallel), then add the SAPS for all parallel tasks to get a total SAPS
number.
• If tasks are done sequentially (one after another) then do not add them together.
Example
Synchronization and Batch User Risk Analysis tasks run in sequential order.
Synchronization with 10.000 users = 5000 SAPS o Batch User Risk Analysis with 10.000 users = 20,000 SAPS
o Therefore, you would need 20,000 SAPS (not 25,000 SAPS).
Initial Sizing
Initial sizing refers to the sizing approach that provides statements about platform-independent requirements
of the hardware resources necessary for representative, standard delivery SAP applications. The initial sizing
guidelines assume optimal system parameter settings, standard business scenarios, and so on.
Expert Sizing
Expert Sizing refers to a sizing exercise where customer data is analyzed and used to provide more detail for
the sizing result. The main objective is to determine the resource consumption of customized content and
applications (not SAP standard delivery) by comprehensive measurements. At SAP, expert sizing is typically
covered by Consulting or Support. For more information, see support.sap.com.
Hardware resource and system configuration depend on the requirements of the customer-specific project.
This includes the implementation of distribution, security, and high availability solutions by different
approaches using third-party tools. In the case of high availability through redundant resources, for example,
the final resource requirements must be adjusted accordingly.
There are “best practices” which may be valid for a specific combination of operating system and database. To
provide guidance, SAP created NetWeaver configuration guides (help.sap.com and search for NetWeaver).
This section describes the procedure for sizing SAP Access Control.
3.1 Assumptions
This section describes the assumptions used when sizing Access Control.
• The standard, out-of-the-box access analysis rule set is used in all access risk.
• The sizing relates to the Access Control server only.
• Plug-ins installed on backend systems can add overhead when Access Control retrieves data. This
overhead is not included.
• Initial sizing is completed using only select use cases, including full batch access risk analysis.
• Database sizing is included, but network sizing is not.
• Table logging has been turned off:
This guide does not include sizing considerations for the following:
• NetWeaver Portal
• Report printing using Adobe Document Services (ADS)
Initial sizing involves a coordinated effort between SAP Basis and AC Functional experts to determine the
expected number of users and transactional volume for the implemented features of Access Control.
With this user and transaction data, you can then use the sizing guidelines in the next section to determine the
processing requirements, measured in SAPS.
Note
The SAPS numbers in the tables are based on the quantity of transactions that can be processed by a CPU
per hour.
You can provide these results to your hardware partners to ensure that the appropriate processor, memory,
and storage resources are available for your production environment.
Note
In this section, synchronization refers to the standard User/Role/Profile synchronization job in Access Risk
Analysis (ARA). You run the synchronization when you first build the system and thereafter you run it as a
scheduled job. The frequency of the scheduled job is dependent on the user/access scenario.
The sizing results described in this section were obtained by measuring the following scenarios:
In this scenario, users perform user synchronization as a background job by running the SPRO transaction and
executing SAP Reference IMG Governance, Risk and Compliance Access Control Synchronization Jobs
Repository Object Synch .
Procedure
The following table shows the sizing guidelines according to the usage categories:
Note
The sizing numbers apply to User Synchronization which includes Role and Profile Synchronization.
In this scenario, users perform user synchronization as a background job by running the SPRO transaction and
executing SAP Reference IMG Governance, Risk and Compliance Access Control Synchronization Jobs
Repository Object Synch .
Procedure
The following table shows the sizing guidelines according to the usage categories:
*5 languages
Note
The sizing numbers apply to Role Synchronization which includes Profile Synchronization.
In this scenario, users perform user risk analysis using the Access Management Access Risk Analysis
User Level Analysis Control .
Procedure
1. Choose Access Management Access Risk Analysis User Level Analysis Control .
2. Enter values in the required fields.
3. Choose Run in Foreground to run the risk analysis.
The following table shows the sizing guidelines according to the usage categories:
In this scenario, users perform user risk analysis using the Access Management Access Risk Analysis
Role Level Application .
Procedure
The following table shows the sizing guidelines according to the usage categories:
In this scenario, users perform user synchronization as a background job by running the SPRO transaction and
executing SAP Reference IMG Governance, Risk and Compliance Access Control Access Risk Analysis
Batch Risk Analysis Execute Batch Risk Analysis .
Procedure
The following table shows the sizing guidelines according to the usage categories:
Note
Each violating user with 1000 violations has a SAPS value of 20.
In this scenario, users perform user synchronization as a background job by running the SPRO transaction and
executing SAP Reference IMG Governance, Risk and Compliance Access Control Access Risk Analysis
Batch Risk Analysis Execute Batch Risk Analysis .
Procedure
The following table shows the sizing guidelines according to the usage categories:
In this scenario, users perform user risk analysis using the Access Management Access Request Creation
Access Request .
Procedure
The following table shows the sizing guidelines according to the usage categories:
In this scenario, users perform user risk analysis using the My Home My Work .
Procedure
The following table shows the sizing guidelines according to the usage categories:
*1000 violations
In this scenario, users perform user risk analysis using the Access Management Role Mass Maintenance
Role Import .
Procedure
The following table shows the sizing guidelines according to the usage categories:
*Background execution.
In this scenario, users perform user risk analysis using the Access Management Role Mass Maintenance
Role Import .
Procedure
The following table shows the sizing guidelines according to the usage categories:
*Background execution
In this scenario, users perform user risk analysis using the Access Management Role Management Role
Maintenance .
Procedure
The following table shows the sizing guidelines according to the usage categories:
*Creating 1 role with 50 transactions and 20 auth objects, searching 1 role from among 10,000 roles.
** Each user creates 1 role with 50 transactions and 20 auth objects, searches 1 role from among 10,000 roles.
In this scenario, users perform log collection as a background job by running the SPRO transaction and
executing SAP Reference IMG Governance, Risk and Compliance Access Control Synchronization Jobs
Firefighter Log Synch .
Procedure
*5 languages
Note
The sizing numbers apply to Role Synchronization which includes Profile Synchronization.
In this scenario, users create roles and then search for the role using the Reports and Analytics Super User
Management Reports Firefighter Log Summary Report .
Procedure
1. Choose Reports and Analytics Super User Management Reports Firefighter Log Summary Report .
2. Enter values in the required fields.
3. Choose the Run in Foreground pushbutton to run the report.
The following table shows the sizing guidelines according to the usage categories:
3.4.1.1.12 IDM Calls via Web Services for User Risk Analysis
In this scenario, the user has applications making IDM calls to Access Control via web services (WS) for user
risk analysis. Since each IDM call is considered as a single user connection, the sizing guidelines for user risk
analysis are also applicable for IDM.
In this scenario, each IDM call is the equivalent of a Small, 1 user risk analysis:
Note
The information in the table above is taken from section 3.4.3 User Risk Analysis.
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
• Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
• The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
• SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
• Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering an SAP-hosted Web site. By using
such links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Bias-Free Language
SAP supports a culture of diversity and inclusion. Whenever possible, we use unbiased language in our documentation to refer to people of all cultures, ethnicities,
genders, and abilities.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.