SAP Identity Management


What is SAP Identity Management?

With SAP Identity Management, organizations can perform identity provisioning, data synchronization, and identity virtualization. It enables organizations to embed identity management into their business processes and centralize user access management. The SAP Identity Management component helps organizations align user lifecycle management with key business processes running in cloud and on-premise. Business managers can define role-based user access rights and implement identity management across enterprise applications while providing centralized data, alerts, and reporting. The solution supports identity management across SAP software as well as heterogeneous and hybrid landscapes, including third-party business applications, operations systems, e-mail systems, and databases.

Key capabilities include:

  • Line-of-business-driven identity management
  • Built-in connector to cloud-based Identity Provisioning service
  • Reporting and auditing functionality
  • Password management and employee self-service
  • Business-aligned user access rights, roles, and privileges

Key Considerations for SAPinsiders

What is SAP Identity Management?

With SAP Identity Management, organizations can perform identity provisioning, data synchronization, and identity virtualization. It enables organizations to embed identity management into their business processes and centralize user access management. The SAP Identity Management component helps organizations align user lifecycle management with key business processes running in cloud and on-premise. Business managers can define role-based user access rights and implement identity management across enterprise applications while providing centralized data, alerts, and reporting. The solution supports identity management across SAP software as well as heterogeneous and hybrid landscapes, including third-party business applications, operations systems, e-mail systems, and databases.

Key capabilities include:

  • Line-of-business-driven identity management
  • Built-in connector to cloud-based Identity Provisioning service
  • Reporting and auditing functionality
  • Password management and employee self-service
  • Business-aligned user access rights, roles, and privileges

Key Considerations for SAPinsiders

Centralize identity management across applications and platforms. According to SAPinsider’s User Access and Identity Management for SAP S/4HANA benchmark report, a top goal for SAPinsider members is to centralize user access and identity management. Members are particularly worried about the proliferation of access points from the use of cloud-based apps. By centralizing identity management, SAP customers can improve security for cloud-based apps, reduce fraud, increase productivity, and speed up role setup, the report found. A centralized platform enables the organization to manage users of SAP and third-party applications in one place.

Shift identity management responsibilities from IT to lines of business. Putting password management, self-service portals, and workflow approvals in the hands of line-of-business managers improves productivity and security and reduces costs while freeing up IT to focus on more pressing issues. Business managers are also better at aligning roles and privileges with business processes rather than technical directory structures. They can quickly provision employees and business partners and make changes to access rights and privileges in a timely manner.

Integrate identity management with GRC to improve compliance with regulatory and audit requirements. In the previously cited benchmark report, SAPinsider members said that increasing government regulations were a driver for updating their organization’s identity management processes. By integrating identity management and GRC, multiple groups within the organization become involved in identity management. More departments with a stake mean that identity management gets a higher priority and more money within the organization, leading to improved processes and compliance. In addition, tighter integration enables mitigation of segregation-of-duties risks and a compliant user-provisioning process.

20 results

  1. Managing the Identity Life Cycle in Hybrid SAP Environments

    Managing the Identity Life Cycle in Hybrid SAP Environments

    Reading time: 13 mins

    This article explains how to build a security bridge between on-premise and cloud-based applications in hybrid SAP landscapes by extending on-premise user authentication and identity management into the cloud.

  2. How to Simplify Business Role Integration in SAP Identity Management and SAP Access Control

    Reading time: 8 mins

    IT organizations typically use identity management solutions to handle a large amount of personnel changes to provision and de-provision users throughout an enterprise. The process contains technical roles that manage different resources. SAP Access Control provides a business role concept that users define (i.e., users or administrators manage the roles) and use to manage a…

  3. Universal Identity and Access Management for Employees and Consumers

    Universal Identity and Access Management for Employees and Consumers

    Reading time: 15 mins

    As digital technologies have expanded their reach, the task of ensuring secure authentication and identity management within business processes has become more complex. Employees are no longer the only users involved — external users, such as consumers accessing a web shop, must also be considered. To help you navigate this new reality, this article explains…

  4. Comprehensive Identity and Access Management in the Cloud

    Comprehensive Identity and Access Management in the Cloud

    Reading time: 8 mins

    Digital technologies are transforming enterprise system landscapes, bringing with them a range of security issues businesses must address — particularly when it comes to managing user identities and access to business solutions. To address these challenges, businesses require a comprehensive, unified, centralized approach to identity management and access governance. This article introduces SAP Cloud Identity…

  5. Tips on How to Maximize Security and Productivity with SAP Single Sign-On

    Reading time: 1 mins

    In his session at the Cybersecurity for SAP Customers 2018 conference titled “Secure Authentication and Access Management with SAP Single Sign-On,” Kristian Lehment, senior product manager at SAP SE, provides an overview of the role of SAP Single Sign-On in secure authentication. He discusses the basics of the key technologies involved: Kerberos, X.509 certificates, and…

  6. Compliant Identity Management Processes Can Do More

    Reading time: 2 mins

    SAP’s solutions for identity management and governance, risk, and compliance (GRC) provide a powerful, integrated toolset for managing SAP accounts and authorizations. In some cases, however, users may have too many authorizations or licensing needs that exceed current agreements. Learn how using compliant identity management (CIM) practices in combination with SAP Identity Management and SAP…

  7. Live from SAPinsider Studio: New SAP Solutions for Governance and Security

    Christian Cohrs, Product Manager of SAP Identity and Access Management, offers insights into new SAP functionality for governance and security. The conversation occurred during the Financials/GRC 2017 conference held in Las Vegas, Nevada. Topics covered include: Advice on secure approaches for cloud and on-premise implementations of SAP Identity and Access Management A mini dive into...…

  8. Identity and Access Management in Cloud and Hybrid SAP Landscapes

    Reading time: 13 mins

    While ensuring appropriate user access to your enterprise systems has always been a difficult task, it has become profoundly more challenging as IT landscapes have grown more complex with changing user roles and new technologies. To help you meet this challenge, SAP provides a comprehensive set of solutions — SAP Single Sign-On, SAP Cloud Platform…

  9. End-to-End Identity and Access Management in the Cloud

    Reading time: 7 mins

    As businesses extend their technology deployments into the cloud, new security concerns arise as users start accessing business applications from an array of locations and devices. How do you protect your data? How do you ensure that users have access to the right information — and only that information? SAP addresses these concerns with two…

  10. Secure Single Sign-On Across SAP Landscapes

    Reading time: 14 mins

    As the number and diversity of applications, systems, and devices in any given business network continues to grow, secure user authentication becomes both increasingly challenging and increasingly important. SAP Single Sign-On enables seamless, simple, and secure authentication for almost every SAP and non-SAP system across a heterogeneous IT landscape, and version 3.0 extends its functionality…