SAP Identity Management


What is SAP Identity Management?

With SAP Identity Management, organizations can perform identity provisioning, data synchronization, and identity virtualization. It enables organizations to embed identity management into their business processes and centralize user access management. The SAP Identity Management component helps organizations align user lifecycle management with key business processes running in cloud and on-premise. Business managers can define role-based user access rights and implement identity management across enterprise applications while providing centralized data, alerts, and reporting. The solution supports identity management across SAP software as well as heterogeneous and hybrid landscapes, including third-party business applications, operations systems, e-mail systems, and databases.

Key capabilities include:

  • Line-of-business-driven identity management
  • Built-in connector to cloud-based Identity Provisioning service
  • Reporting and auditing functionality
  • Password management and employee self-service
  • Business-aligned user access rights, roles, and privileges

Key Considerations for SAPinsiders

What is SAP Identity Management?

With SAP Identity Management, organizations can perform identity provisioning, data synchronization, and identity virtualization. It enables organizations to embed identity management into their business processes and centralize user access management. The SAP Identity Management component helps organizations align user lifecycle management with key business processes running in cloud and on-premise. Business managers can define role-based user access rights and implement identity management across enterprise applications while providing centralized data, alerts, and reporting. The solution supports identity management across SAP software as well as heterogeneous and hybrid landscapes, including third-party business applications, operations systems, e-mail systems, and databases.

Key capabilities include:

  • Line-of-business-driven identity management
  • Built-in connector to cloud-based Identity Provisioning service
  • Reporting and auditing functionality
  • Password management and employee self-service
  • Business-aligned user access rights, roles, and privileges

Key Considerations for SAPinsiders

Centralize identity management across applications and platforms. According to SAPinsider’s User Access and Identity Management for SAP S/4HANA benchmark report, a top goal for SAPinsider members is to centralize user access and identity management. Members are particularly worried about the proliferation of access points from the use of cloud-based apps. By centralizing identity management, SAP customers can improve security for cloud-based apps, reduce fraud, increase productivity, and speed up role setup, the report found. A centralized platform enables the organization to manage users of SAP and third-party applications in one place.

Shift identity management responsibilities from IT to lines of business. Putting password management, self-service portals, and workflow approvals in the hands of line-of-business managers improves productivity and security and reduces costs while freeing up IT to focus on more pressing issues. Business managers are also better at aligning roles and privileges with business processes rather than technical directory structures. They can quickly provision employees and business partners and make changes to access rights and privileges in a timely manner.

Integrate identity management with GRC to improve compliance with regulatory and audit requirements. In the previously cited benchmark report, SAPinsider members said that increasing government regulations were a driver for updating their organization’s identity management processes. By integrating identity management and GRC, multiple groups within the organization become involved in identity management. More departments with a stake mean that identity management gets a higher priority and more money within the organization, leading to improved processes and compliance. In addition, tighter integration enables mitigation of segregation-of-duties risks and a compliant user-provisioning process.

279 results

  1. The Basics of Basis Administration

    Reading time: 38 mins

    Panelists: Deb Donohoe and Christian Baessler, Enowa Date: Wednesday, January 17th Sponsor: Basis & SAP Administration 2018 Read transcript of the chat with Deb Donohoe and Christian Baessler from Syskoplan Reply (formerly Enowa) to get answers to your most pressing questions about Basis administration to ensure your SAP landscape runs smoothly and efficiently. Whether you…...…

  2. Automating Access Governance in a Cloud-Based Landscape

    Reading time: 6 mins

    According to our research, the most popular GRC solution being used by the SAPinsider Community is SAP Access Control. And yet more than half (63%) said that their current GRC solutions do not meet the need to effectively handle risk analysis and mitigation for cloud-based products without some sort of connector or bridge to a…

  3. How to Implement SAP Cloud Identity Access Governance

    You’ve heard of the SAP Identity and Access Governance (IAG) cloud version—but do you know how this cloud version could be implemented into your existing environment? This presentation will walk you through SAP IAG implementation, from covering key requirements for on-premise and cloud environments to planning for connections to ABAP and cloud applications. You will…

  4. Making the Case for Your Identity Access Governance and GRC Solutions

    Click Here to View the Session Deck Come away with practical tips on how to create a business case for the Identity Access Governance and GRC solutions your company needs…. This content is for SAPinsider Monthly Subscription, SAPinsider Annual Subscription, and SAPinsider Premium Annual Subscription members only.Log In Join Now... This content is for SAPinsider…

  5. Trust Matters! The SAP Security Strategy and Roadmap

    This session provides an up-to-date overview of SAP security strategy as well as their related solutions and products. The intelligence and persistence of potential threats is only increasing. There is growing attention on SAP systems as they house organization’s most critical data and business assets. SAP is expanding its security expertise and solution portfolio accordingly.…

  6. What’s New in Version 10.0 of SAP BusinessObjects Access Control?

    Reading time: 16 mins

    Learn about the key benefits arising from recoding version 10.0 of SAP BusinessObjects Access Control on the ABAP platform and its harmonization with other SAP BusinessObjects GRC solutions such as version 10.0 of SAP BusinessObjects Process Control and version 10.0 of SAP BusinessObjects Risk Management. Walk through the key improvements in the areas of access…...…

  7. Six Tasks to Ensure a Successful External-Facing Portal Implementation

    Reading time: 20 mins

    To implement an external facing portal, you first need to configure the server side of the portal. Learn how to prepare the necessary portal components and develop light top-level navigation with interactive hover functionality, configure master rules and a URL alias, and implement security for this single point of access for your external portal users…....…

  8. 6 Steps to Adopting a Hybrid Cloud Scenario with Your SAP ECC System and SAP Cloud Platform

    Reading time: 14 mins

    Learn about the steps required to get a hybrid electronic bill presentment and payment scenario set up using an SAP-delivered application in SAP Cloud Platform. Key Concept Electronic bill presentment and payment is a process that enables a company’s end customers to view their bills and make a payment in an Internet portal. SAP delivers…...…

  9. Simple and Secure User Authentication with SAP Single Sign-On 2.0

    Reading time: 13 mins

    Get a full introduction into the latest support packages for SAP Single Sign-On 2.0 and the innovative new enhancements that address security, authentication and administration functionality, and user experience. Learn how these features enhance productivity and lower administration costs, while strengthening security of sensitive data. This content is for Basic Access, SAPinsider Monthly Subscription, SAPinsider…

  10. Secure Single Sign-On Across SAP Landscapes

    Reading time: 14 mins

    As the number and diversity of applications, systems, and devices in any given business network continues to grow, secure user authentication becomes both increasingly challenging and increasingly important. SAP Single Sign-On enables seamless, simple, and secure authentication for almost every SAP and non-SAP system across a heterogeneous IT landscape, and version 3.0 extends its functionality…