SAP Identity Management


What is SAP Identity Management?

With SAP Identity Management, organizations can perform identity provisioning, data synchronization, and identity virtualization. It enables organizations to embed identity management into their business processes and centralize user access management. The SAP Identity Management component helps organizations align user lifecycle management with key business processes running in cloud and on-premise. Business managers can define role-based user access rights and implement identity management across enterprise applications while providing centralized data, alerts, and reporting. The solution supports identity management across SAP software as well as heterogeneous and hybrid landscapes, including third-party business applications, operations systems, e-mail systems, and databases.

Key capabilities include:

  • Line-of-business-driven identity management
  • Built-in connector to cloud-based Identity Provisioning service
  • Reporting and auditing functionality
  • Password management and employee self-service
  • Business-aligned user access rights, roles, and privileges

Key Considerations for SAPinsiders

What is SAP Identity Management?

With SAP Identity Management, organizations can perform identity provisioning, data synchronization, and identity virtualization. It enables organizations to embed identity management into their business processes and centralize user access management. The SAP Identity Management component helps organizations align user lifecycle management with key business processes running in cloud and on-premise. Business managers can define role-based user access rights and implement identity management across enterprise applications while providing centralized data, alerts, and reporting. The solution supports identity management across SAP software as well as heterogeneous and hybrid landscapes, including third-party business applications, operations systems, e-mail systems, and databases.

Key capabilities include:

  • Line-of-business-driven identity management
  • Built-in connector to cloud-based Identity Provisioning service
  • Reporting and auditing functionality
  • Password management and employee self-service
  • Business-aligned user access rights, roles, and privileges

Key Considerations for SAPinsiders

Centralize identity management across applications and platforms. According to SAPinsider’s User Access and Identity Management for SAP S/4HANA benchmark report, a top goal for SAPinsider members is to centralize user access and identity management. Members are particularly worried about the proliferation of access points from the use of cloud-based apps. By centralizing identity management, SAP customers can improve security for cloud-based apps, reduce fraud, increase productivity, and speed up role setup, the report found. A centralized platform enables the organization to manage users of SAP and third-party applications in one place.

Shift identity management responsibilities from IT to lines of business. Putting password management, self-service portals, and workflow approvals in the hands of line-of-business managers improves productivity and security and reduces costs while freeing up IT to focus on more pressing issues. Business managers are also better at aligning roles and privileges with business processes rather than technical directory structures. They can quickly provision employees and business partners and make changes to access rights and privileges in a timely manner.

Integrate identity management with GRC to improve compliance with regulatory and audit requirements. In the previously cited benchmark report, SAPinsider members said that increasing government regulations were a driver for updating their organization’s identity management processes. By integrating identity management and GRC, multiple groups within the organization become involved in identity management. More departments with a stake mean that identity management gets a higher priority and more money within the organization, leading to improved processes and compliance. In addition, tighter integration enables mitigation of segregation-of-duties risks and a compliant user-provisioning process.

14 results

  1. Live from SAPinsider Studio: New SAP Solutions for Governance and Security

    Christian Cohrs, Product Manager of SAP Identity and Access Management, offers insights into new SAP functionality for governance and security. The conversation occurred during the Financials/GRC 2017 conference held in Las Vegas, Nevada. Topics covered include: Advice on secure approaches for cloud and on-premise implementations of SAP Identity and Access Management A mini dive into…

  2. Identity and Access Management in Cloud and Hybrid SAP Landscapes

    Published: 24/April/2017

    Reading time: 13 mins

    While ensuring appropriate user access to your enterprise systems has always been a difficult task, it has become profoundly more challenging as IT landscapes have grown more complex with changing user roles and new technologies. To help you meet this challenge, SAP provides a comprehensive set of solutions — SAP Single Sign-On, SAP Cloud Platform…

  3. End-to-End Identity and Access Management in the Cloud

    Published: 10/October/2016

    Reading time: 7 mins

    As businesses extend their technology deployments into the cloud, new security concerns arise as users start accessing business applications from an array of locations and devices. How do you protect your data? How do you ensure that users have access to the right information — and only that information? SAP addresses these concerns with two…

  4. Secure Single Sign-On Across SAP Landscapes

    Published: 04/August/2016

    Reading time: 14 mins

    As the number and diversity of applications, systems, and devices in any given business network continues to grow, secure user authentication becomes both increasingly challenging and increasingly important. SAP Single Sign-On enables seamless, simple, and secure authentication for almost every SAP and non-SAP system across a heterogeneous IT landscape, and version 3.0 extends its functionality…