Detailed Report
Complete risk listing with all columns:
| Column | Description |
|---|---|
| User ID | Username (user analysis) |
| User Group | User's group assignment |
| Access Risk ID | Risk identifier |
| Risk Description | Risk name |
| Risk Level | Critical/High/Medium/Low |
| Risk Type | SoD or Critical Access |
| Function | Business function |
| Function Description | Function name |
| System | Source system |
| Action | Transaction code |
| Action Description | Transaction name |
| Resource | Authorization object |
| Resource Extn | Authorization field |
| Value From | Field value start |
| Value To | Field value end |
| Role/Profile | Role providing access |
| Role/Profile Description | Role name |
| Composite Role | Parent composite (if applicable) |
| Composite Role Description | Composite role name |
| Business Process | Process category |
| Simulation | Add/Remove/unchanged (if simulation) |
Summary Report
Aggregated view of risks.
Execution Log
Audit trail including:
- Version and build information
- Licensed customer
- Execution timestamp