The JAMToolkit Transaction Usage feature provides detailed analysis of user transaction executions and can assist with periodic access reviews and access redesign.
SAP end-users can accumulate access over long periods of time when moving to and from positions and changing SAP responsibilities. This can often lead to redundant access being retained by end-users, causing potential issues with controlling transactional data (by business process and user roles and responsibilities) and segregation of duties (applying unnecessary compensating controls). Furthermore, implementing a new role design is a daunting task, as mapping the required access is fraught with risk and often requires time and effort from the business.
The JAMToolkit has the ability to capture and store end-user transaction usage. This data and subsequent analysis can be used to support periodic access reviews to ensure that access is aligned to users roles and responsibilities. This data can also be used to support the implementation of a new role design by understanding the transactions frequently used by an end-user and therefore allows the mapping and provisioning of the access that is needed.
This article will explain the analysis that can be performed with the Transaction Usage feature alongside other JAMToolkit applications such as User Sync, User Mapping and Access Design. There are short demonstration videos and interactive dashboards for illustration.