Process Overview - Request Privileged Access (Requester POV)

Summary
This guide outlines methods for extracting change logs from SAP Ariba. Users with the appropriate roles can access and export audit logs at both document and tenant levels. For individual documents (such as purchase requisitions or invoices), open the document and use the History tab or the event audit log export function. Administrators can retrieve tenant-wide logs via the Core Administration or ICM Audit Reports tools, with options to filter and export data for comprehensive auditing and reporting.
📝Pre-requisites (roles you’ll need)
- Customer Administrator (to see tenant-level Audit Log / ICM Audit Reports).
- Access to Analytical/Advanced Reporting (to build/export change-history reports).
- Event Owner/Team for Guided Sourcing event audit logs.
Step 1: One-off “change log” from a single document
- Buying & Invoicing (PR/PO/Receipt/Invoice): Open the document, go to History tab.
- Guided Sourcing events: Open event → More actions (…) → View audit logs → Export to Excel.
Step 2: Tenant-wide Audit Log (administrator view)
- Legacy: Core Administration → Site Manager → Audit Log → Filter → Export to Excel.
- New (ICM Audit Reports): Generate report in ICM Audit Log → Download encrypted ZIP → Decrypt locally.

Step 3: Bulk “change history” via Analytical/Advanced Reporting
- Create → Analytical Report.

- Select Source Data (views that expose change/approval history).

- Add fields: Document ID, Change Action, Old/New values, Changed by, Timestamp.
- Set Filters (date range, document type, user).
- Run & Export (CSV/Excel).
Â
The Field Attributes contains the detail of the changes, however this is unformatted
This can be formatted by text to columns
Â
And manual formatting
Step 4: Fill Request DetailsÂ
- Below page will be displayed after clicking on the Create Request button.
Provide the below information for the PAM access request.
- Reason for Request: PAM for SAAS Application
- Priority: Select High, Medium, Low as per the urgency basisÂ
- Description: Why emergency access request is raised and what will be done in the system(mandatory for approval)
- Duration of access requirement in the description section(Mandatory for approval)
- Manager and Email address will be populated automatically.

Step 5: Submit Request
- Click on the Submit RequestÂ

- Click on OK, to check request statusÂ

- Check request status for access request information.

Step 6: Receive email notification for submission
- The user receives an email notification confirming that the access request has been submitted successfully.

Step 7: Receive email confirmation for approval status
- The user receives an email confirmation on the approval or rejection status of the access request.

Step 8: Login and Use of Privileged Access in Target Applications
- Once the access request is approved and provisioned, the user may log in to the respective application, such as SAP Ariba or Icertis, and perform activities using the granted privileged access.