Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Related insights
Identity and Access Managaement
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Related insights
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
Related insights
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Partners
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social ResponsibilityCSR
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Related insights
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Related insights
Careers
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Related insights
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Related insights
Blogs
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Related insights
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Related insights
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Related insights
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
Related insights
FAQs
We've put together a comprehensive list of frequently asked questions - along with our responses - to the most common GRC and SAP security issues.
Related insights
18 February 2019

Managing SAP's automated access termination process

Companies across the globe all face similar issues when it comes to effectively managing the termination of access to IT applications when an employee/contractor has the left the organisation. 

It is not uncommon to find terminated users who are inconsistently managed across the environment, for example; a terminated user who is both valid and unlocked; a user who is locked but is valid; a user who is unlocked but is invalid; or a user who is assigned to the group terminated but is neither locked or valid.

Often the system that manages employment status and validity (employee source of truth) is independent of the systems performing access management, which can cause a disconnect in the termination process if the two systems are not integrated. This regularly leads to ongoing audit issues and a lot of manual effort to manage.

The video below illustrates a use case of an organisation who is looking for an automated way to address this concern in their IT landscape.

 



The companies Active Directory system is the source of truth for employees and the subsequent network account disablement of users is independent of the SAP account disablement process, which often leads to an inconsistent treatment of user access and terminated user accounts left open.

The company leverages their SAP GRC Access Control tool and integrates this with their ITSM tool ServiceNow to automate the termination of users, based on AD account termination events to provide a consistent and automated way of managing the user termination process.

So that's a quick overview to help you manage this process effectively.

 



How integrating SAP IDM and SAP GRC can help your business twitter banner

 

About Turnkey

Turnkey Consulting is helping to make the world a safer place to do business by specialising its expertise across Integrated Risk Management, Identity and Access Management, and Cyber and Application Security. We provide business consulting, technology implementation and managed services to help customers safeguard their application environments - protecting critical ERPs (such as SAP, Oracle and MS Dynamics) and wider enterprise systems.