{"id":2294,"date":"2017-06-06T06:00:49","date_gmt":"2017-06-06T10:00:49","guid":{"rendered":"https:\/\/www.xiting.us\/?p=2294"},"modified":"2020-05-05T09:29:36","modified_gmt":"2020-05-05T07:29:36","slug":"sap-access-control-grc-online-vs-offline-risk-analysis","status":"publish","type":"post","link":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/","title":{"rendered":"SAP Access Control (GRC) Online vs. Offline Risk Analysis"},"content":{"rendered":"<p>This article describes the differences between Online and Offline Risk Analysis in SAP Access Control (GRC) based on several SAP Notes and our implementation experience.<\/p>\n<p>Before you can run offline analysis at all, you have to set the configuration option \u201cEnable Offline Risk Analysis\u201d to YES (Parameter 1027) in the Access Control configuration settings in SPRO.<\/p>\n<figure id=\"attachment_2296\" aria-describedby=\"caption-attachment-2296\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.xiting.us\/wp-content\/uploads\/2017\/06\/Online_Offline_Risk_Analysis_01.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-2296\" src=\"https:\/\/www.xiting.us\/wp-content\/uploads\/2017\/06\/Online_Offline_Risk_Analysis_01-600x95.png\" alt=\"Online Offline Risk Analysis\" width=\"600\" height=\"95\"><\/a><figcaption id=\"caption-attachment-2296\" class=\"wp-caption-text\">Configuration Parameter in SPRO<\/figcaption><\/figure>\n<p>This configuration option is now selectable in the Risk Analysis &gt; Additional Criteria.<\/p>\n<figure id=\"attachment_2298\" aria-describedby=\"caption-attachment-2298\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.xiting.us\/wp-content\/uploads\/2017\/06\/Online_Offline_Risk_Analysis_02.png\"><img decoding=\"async\" class=\"size-medium wp-image-2298\" src=\"https:\/\/www.xiting.us\/wp-content\/uploads\/2017\/06\/Online_Offline_Risk_Analysis_02-600x379.png\" alt=\"Online Offline Risk Analysis\" width=\"600\" height=\"379\"><\/a><figcaption id=\"caption-attachment-2298\" class=\"wp-caption-text\">Risk Analysis on User Level<\/figcaption><\/figure>\n<p>Offline analysis is not real-time data but is dependent on the generated data of the last Batch Risk Analysis. We recommend running the Batch Risk Analysis in the background by using transaction GRAC_BATCH_RA (program GRAC_BATCH_RISK_ANALYSIS). This is the same job that updates the management reports, and you should run this job on a frequent basis to ensure the management reports are up to date. Running the Offline analysis has the same effect as drilling down in the Management View.<\/p>\n<h2>Benefits of offline analysis<\/h2>\n<p>The main benefit of using the offline analysis is reduced response time. By using offline analysis data, the risk analysis and remediation pulls data from its database tables and hence will return results much faster than using the online analysis. However, please keep in mind that offline analysis is not real-time and will not take into account any changes that have been made since the last Batch Risk Analysis has been run.<\/p>\n<p>Using offline analysis, you can obtain both summary and detail reports. The one exception is that if you run the report types Critical Action or Critical Permission, you will not be able to see the detail report, only the summary report. Please note that this is only for Critical Action and Critical Permission. Report types of Permission level and Action level can go down to the detail level in offline mode, too.<\/p>\n<p>Also, note that your configuration (how you run the batch risk analysis) will impact the data you have available for your offline analysis. For example, in Configuration under Risk Analysis, you have the option \u201cExclude Locked Users.\u201d If this is set to YES, when running the batch risk analysis, it will not evaluate locked users. That means the tables holding the conflicts will not include any data for locked users.<\/p>\n<p>When you run a real-time analysis, you have the option to change Ignored Users field to something other than what is set up in the configuration. However, if you change this to NOT ignore locked users and run in offline mode, you will not receive any conflicts because no locked users were evaluated during the batch risk analysis. Running this report in online mode may show up conflicts with locked users.<\/p>\n<h2>Impacts on Workflows<\/h2>\n<p>The following section outlines the impact on workflows which use data from the risk analysis, either offline or online.<\/p>\n<h3>Segregation of Duty (SoD) Review<\/h3>\n<p>The system uses Offline Risk Analysis data to update management graphics and to generate SoD Review workflow requests. When the system detects SoD violations, it automatically sends reports to managers so that they can take actions to either remove user access or to mitigate the SoD risks.<\/p>\n<h3>User Access Review<\/h3>\n<p>The system uses Offline Risk Analysis data to update and generate UAR review workflow requests.<\/p>\n<h3>Access Request Submission<\/h3>\n<p>The application automatically performs an online risk analysis when the requestor submits the request. This behavior can be configured in parameter 1071 (Enable risk analysis on form submission). Note: The risk analysis results are intended for the approver. Therefore, the risk analysis results appear on the approver\u2019s screens but not on the requestor\u2019s screens. SoD violations for access requests are stored in table GRACSODREPDATA. With later support packages, you also have the option to run the risk analysis in the background by setting parameter 1071 to ASYNC (Asynchronous). The asynchronous mode also performs a real-time analysis with the advantage that the user doesn&#8217;t have to wait until the analysis is finished to continue.<\/p>\n<h3>Role Approval Workflow<\/h3>\n<p>In Business Role Management (BRM), some customers may have the requirement that once a role is sent for approval to the Role Approval workflow, the role owner(s) must re-run the risk analysis and mitigate the risks before approval. The risk analysis has to be performed during Analyze Access Risk methodology step and is always performed as Online Risk Analysis.<\/p>\n<h2>Impact on Reports<\/h2>\n<p>The following listing shows the impact on Reports which uses data from the risk analysis.<\/p>\n<h3>Risk Analysis in Access Management<\/h3>\n<p>The risk analysis results in Access Management, like User Level, Role Level, Profile Level, or HR Object level are based on real-time risk analysis. Also, all the simulations use real-time risk analysis data. However, if you tick the box &#8220;Offline Data&#8221;, the analysis will include offline data.<\/p>\n<h3>Risk Analysis in Reports and Analytics<\/h3>\n<p>The risk analysis in Reports and Analytics tab is always an offline analysis, and hence you should have run the Batch Risk Analysis to populate the violations data.<\/p>\n<div class=\"grammarly-disable-indicator\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This article describes the differences between Online and Offline Risk Analysis in SAP Access Control (GRC) based on several SAP Notes and our implementation experience. Before you can run offline analysis at all, you have to set the configuration option \u201cEnable Offline Risk Analysis\u201d to YES (Parameter 1027) in the Access Control configuration settings in [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9426,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1835],"tags":[],"class_list":["post-2294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Access Control (GRC) Online vs. Offline Risk Analysis - Xiting<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Access Control (GRC) Online vs. Offline Risk Analysis\" \/>\n<meta property=\"og:description\" content=\"This article describes the differences between Online and Offline Risk Analysis in SAP Access Control (GRC) based on several SAP Notes and our\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-06T10:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-05T07:29:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2017\/11\/sap-security-blog-compliance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"964\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Banzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Banzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/\"},\"author\":{\"name\":\"Alessandro Banzer\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\"},\"headline\":\"SAP Access Control (GRC) Online vs. Offline Risk Analysis\",\"datePublished\":\"2017-06-06T10:00:49+00:00\",\"dateModified\":\"2020-05-05T07:29:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/sap-security-blog-compliance.jpg\",\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/\",\"name\":\"SAP Access Control (GRC) Online vs. Offline Risk Analysis - Xiting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/sap-security-blog-compliance.jpg\",\"datePublished\":\"2017-06-06T10:00:49+00:00\",\"dateModified\":\"2020-05-05T07:29:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/sap-security-blog-compliance.jpg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/sap-security-blog-compliance.jpg\",\"width\":964,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/sap-access-control-grc-online-vs-offline-risk-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Access Control (GRC) Online vs. Offline Risk Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xiting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XitingAG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1345129\\\/\",\"https:\\\/\\\/www.instagram.com\\\/xiting.global\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/person\\\/9f4b7239bdd4d109e5a45c9432779d5e\",\"name\":\"Alessandro Banzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g\",\"caption\":\"Alessandro Banzer\"},\"description\":\"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Access Control (GRC) Online vs. Offline Risk Analysis - Xiting","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"SAP Access Control (GRC) Online vs. Offline Risk Analysis","og_description":"This article describes the differences between Online and Offline Risk Analysis in SAP Access Control (GRC) based on several SAP Notes and our","og_url":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_published_time":"2017-06-06T10:00:49+00:00","article_modified_time":"2020-05-05T07:29:36+00:00","og_image":[{"width":964,"height":600,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2017\/11\/sap-security-blog-compliance.jpg","type":"image\/jpeg"}],"author":"Alessandro Banzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Banzer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/#article","isPartOf":{"@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/"},"author":{"name":"Alessandro Banzer","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e"},"headline":"SAP Access Control (GRC) Online vs. Offline Risk Analysis","datePublished":"2017-06-06T10:00:49+00:00","dateModified":"2020-05-05T07:29:36+00:00","mainEntityOfPage":{"@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/"},"wordCount":849,"publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"image":{"@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2017\/11\/sap-security-blog-compliance.jpg","articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/","url":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/","name":"SAP Access Control (GRC) Online vs. Offline Risk Analysis - Xiting","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2017\/11\/sap-security-blog-compliance.jpg","datePublished":"2017-06-06T10:00:49+00:00","dateModified":"2020-05-05T07:29:36+00:00","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2017\/11\/sap-security-blog-compliance.jpg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2017\/11\/sap-security-blog-compliance.jpg","width":964,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/sap-access-control-grc-online-vs-offline-risk-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Access Control (GRC) Online vs. Offline Risk Analysis"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]},{"@type":"Person","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/9f4b7239bdd4d109e5a45c9432779d5e","name":"Alessandro Banzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd69cf75d8008518f801684fb686af7daad3e988b323551989d44fb47d82a240?s=96&d=mm&r=g","caption":"Alessandro Banzer"},"description":"Alessandro has worked in the field of IT since 2004, specializing in SAP in 2009 and working on global SAP projects in various roles since that date. Alessandro is an active contributor and moderator in the Governance, Risk, and Compliance space on SAP SCN. Alessandro is in charge of Xiting's operations in the United States and a subject matter expert in SAP Access Control, SAP Cloud IAG, and SAP Security.","url":"https:\/\/xiting.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=2294"}],"version-history":[{"count":1,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2294\/revisions"}],"predecessor-version":[{"id":9473,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/2294\/revisions\/9473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/9426"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=2294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=2294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/tags?post=2294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}