SlideShare a Scribd company logo
1 of 41
Download to read offline
SAP Identity Management 
Overview 
October 2014 Public
Agenda 
Introduction to Identity Management 
Role Management and Workflows 
Business-Driven Identity Management 
Compliant Identity Management 
Reporting 
Password Management 
Connectivity 
Architecture 
Identity Virtualization 
Summary & Additional Information 
Appendices 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
Introduction to 
SAP Identity Management
SAP Security Portfolio 
IT Application Security 
IT Application Security – SAP Portfolio 
Identity and access management (IAM) 
Identity, governance and 
administration Authentication and single sign-on 
• Manage identity lifecycle 
• Segregation of duties 
• Emergency access 
• Role management 
• Reporting 
• … 
• Single sign-on 
• Secure network communication 
• Central access policies 
• 2-factor authentication 
• … 
Code 
vulnerabilities 
Find 
vulnerabilities 
in customer 
code 
Threat 
management 
Detect cyber 
crime attacks 
based on user 
behavior 
SAP Identity 
Management 
SAP Access 
Control SAP Single 
Sign-On 
SAP Cloud 
Identity 
SAP 
NetWeaver AS, 
add-on for 
code 
vulnerability 
analysis 
SAP 
Enterprise 
Threat 
Detection 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 4
Key Capabilities 
Enables the 
efficient, 
secure and 
compliant 
execution of business 
processes 
Holistic approach 
Manage identities and 
permissions 
SAP Identity 
Management 
Ensures that the right 
users have the 
right access to the 
right systems at the 
right time 
Consistent with user 
roles and 
privileges 
Across 
all systems 
and applications 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
Business Drivers for Identity Management 
Operational 
costs 
Changing 
business 
processes 
Compliance 
challenges 
y Multiple sources of identity data 
y Manual user provisioning 
y Labor-intensive, paper-based approval systems 
y Manual password reset processes 
y Transactions involve multiple enterprises 
y Partners participate in business processes 
y Company-specific requirements for user provisioning solutions 
y No record of who has access to which IT resources 
y Inability to deprovision user access rights upon termination 
y No complete audit trail available 
y Prevention of unauthorized access in multi-enterprise 
environments 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
Identity Lifecycle 
How long does it take for new 
employees to receive all 
permissions and become 
productive in their new job? 
Are permissions automatically 
adjusted if someone is 
promoted to a new position? 
How can you remove 
permissions automatically if 
employees change their 
Who has adequate 
position? 
permissions to fill in for a co-worker? 
co-How 
long does it take to remove ALL 
worker? 
How permissions of an employee? And 
how can you ensure that they were 
properly removed? 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
Solution in a Nutshell 
Central management of identities 
throughout the system landscape 
Rule-driven workflow and approval 
process 
Extensive audit trail, logging, and 
reporting functionality 
Governance through centralized and 
auditable identity data 
Compliance through integration with 
SAP Access Control 
Compliant and integrated identity 
management solution to mitigate 
segregation-of-duties risks 
SAP Access 
Control 
SAP Identity 
Management 
SAP applications Non-SAP applications 
SAP SCM 
SAP ERP HCM 
SAP ERP 
Java 
Portal 
Database 
Legacy 
OS 
E-mail 
Web app 
SuccessFactors … 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 8
A Holistic Approach to Compliant Identity Management 
Example: On-boarding 
Success 
Factors 
SAP ERP 
HCM 
Approval 
workflows 
Web-based single sign-on 
and identity federation 
Integration with 
SAP Business Suite 
and SuccessFactors 
SAP applications Non-SAP applications 
Password 
management 
Identity virtualization and 
Central identity as a service 
identity store 
SAP Identity 
Management 
Provisioning to SAP 
and non-SAP systems 
SAP Access 
Control 
Compliance 
checks 
SAP BusinessObjects 
Access Control (GRC) 
Reporting 
Rule-based assignment 
of business roles 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
Solution in Detail 
Role Management and Workflows
Role Definition and Provisioning 
Role Definition (design, one-time task) 
Read system access information (roles, 
groups, authorizations, etc.) from target 
systems 
Define a business role hierarchy 
Assign technical roles to business roles 
Develop rules for role assignments 
Provisioning (regularly) 
Assign or remove roles to/from people 
ƒ Through request/approval workflow 
ƒ Manually (administrator) 
ƒ Automatically, e.g. HR-driven 
Automatic adjustment of master data and 
assignments of technical authorizations in 
target systems 
Employee Accounting 
Portal 
role 
Accounting 
(ABAP role) 
Manager 
HR manager 
AD 
user 
E-mail (ABAP role) 
E-mail 
system 
Active 
Directory 
SAP 
Portal 
SAP 
FI 
SAP 
HR 
Technical roles Business roles 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
Context-Based Role Management: Reducing Complexity 
SAP Identity Management 
Business Role 
User 
Position 
Location 
… 
SAP NetWeaver Identity Management 
Technical role A Technical role C 
Technical role B 
Managed System 
User 
Managed System 
Technical role A 
Technical role B 
Context-based role management simplifies 
the structure of roles through dynamic 
role assignment based on user context 
information. 
Benefits 
Reduced number of roles 
Reduced complexity 
Sufficient granularity 
Improved data consistency 
and governance 
Example: 
20 roles in 1000 factories 
y Conventional method: 20.000 entries (roles) 
y Context-based: 1.020 entries (roles + contexts) 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 12
Workflows 
Approval 
Notification 
y Identity Center sends a 
notification to user/manager 
Provisioning 
y Identity Center provisions 
new roles and privileges to 
respective systems 
Request 
y User sends a 
role request 
Processing 
y Identity Center 
processes request 
– Sends alert to manager / 
administrator 
y Manager checks request 
and approves/denies 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
Solution in Detail 
Business-Driven Identity Management
Integration with SAP Business Applications 
Success 
Factors 
Employee 
Central 
SAP Identity 
Management 
SAP Supply 
Network 
Collaboration 
SAP Extended 
Warehouse 
Management 
Transportation 
Management 
SAP ERP 
Financials 
SAP 
SAP Portfolio 
and Product 
Management 
SAP Customer 
Relationship 
Management 
SAP Supplier 
Relationship 
Management 
SAP Product 
Lifecycle 
Management 
SAP HANA 
SAP Service 
Parts Planning 
SAP ERP 
Human Capital 
Management 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
Business Process Driven Identity Management 
On-Boarding 
Kim Perkins joins the company as a marketing specialist. 
From the first day with her new company, she is able to log on to all relevant systems, 
including access to the employee self-services, and access to SAP CRM to track the 
marketing activities she is responsible for. 
Kim’s manager 
approves the 
assignment 
2 3 4 
Line Manager 
Pre-hire phase 
HR ensures that all necessary 
employee data for Kim is 
available, such as position and 
entry date 
1 
Event-based extraction 
of personnel data 
First day at work 
Based on the position in 
HCM, IDM automatically 
assigns the business 
role “Marketing 
Specialist” 
SAP 
ERP 
HCM 
Success 
Factors 
HR Operations 
Provisioning of role and 
authorization information to 
relevant target systems 
User created 
“Employee” 
Business Partner created 
User created “Marketing 
Professional” 
User created 
Access to SAP ESS 
Access to SAP CRM 
SAP Identity Management 
SAP 
ERP 
HCM 
SAP 
ERP 
SAP 
CRM 
SAP 
Portal 
5 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 16
Business Process Driven Identity Management 
Position Change 
After two years as a marketing specialist, Kim is promoted and takes over personnel and 
budget responsibility for her marketing team. 
On the first day in her new role, she has access to the manager self-services. In her new 
position, she is responsible for budget approvals for all marketing campaigns - this requires 
immediate access to SAP ERP to view the marketing costs. 
HR ensures that all necessary 
employee data for Kim is 
available 
Day of position change 
SAP Identity Management 
recognizes the line manager 
information for Kim and 
automatically assigns the business 
role “Marketing Manager” 
SAP Identity Management 
3 
4 
Provisioning of role and 
authorization information to 
relevant target systems 
SAP 
ERP 
HCM 
SAP 
ERP 
SAP 
CRM 
SAP 
Portal 
User updated 
“Employee” 
“Line Manager” 
User created 
“Marketing Controller” 
User updated 
“Marketing Controller” 
User updated 
Access to SAP ESS 
Access to SAP MSS 
1 
2 
Event-based extraction 
of personnel data 
SAP 
ERP 
HCM 
Success 
Factors 
HR Operations Access to SAP CRM 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
Business Process Driven Identity Management 
Termination 
After eight years, Kim leaves the company. 
The day after her official assignment with the company ends, she is no longer able to access 
any corporate systems. 
HR ensures that all data relevant 
for the employment contract 
termination is available, such as 
last day of work 
Day after termination of employment 
SAP Identity Management 
recognizes the last day information 
for Kim; it automatically takes away 
all access rights and disables her 
accounts 
SAP Identity Management 
3 
SAP 
ERP 
HCM 
SAP 
ERP 
SAP 
CRM 
SAP 
Portal 
4 
User disabled 
User disabled 
User disabled 
User disabled 
1 
2 
Event-based extraction 
of personnel data 
SAP 
ERP 
HCM 
Success 
Factors 
HR Operations 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
Solution in Detail 
Compliant Identity Management
Compliant Identity Management: Capabilities 
Consistent view on current and historic access rights, approvals 
and policy violations 
Manage identities 
and permissions 
SAP Identity 
Management 
Identify and 
mitigate risks 
SAP Access 
Control 
Central 
management of 
heterogeneous 
environments 
Integration 
based on standards 
Compliance 
checks 
Business risk 
controls and 
mitigation 
Compliant identity management across SAP and heterogeneous 
landscapes in one integrated solution 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 20
Compliant Identity Management: Process View 
4 Risk 
analysis 
SAP BusinessObjects 
Access Control (GRC) 
Request role 
assignment 1 
SAP 
Identity Management 
SAP Access Control 
Forward 
request for 
risk analysis 
3 
6 Risk status 
Manager 
2 approval 
Notification to 
8 user and manager 
Provisioning to 
7 target systems 
5 Risk 
mitigation 
SAP applications Non-SAP applications 
SAP SCM 
SAP ERP HCM 
SAP ERP 
Java 
Portal 
Database 
Legacy 
OS 
E-mail 
Web app 
… … 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
Compliant, Business-Driven Identity Management 
Solution: 
Simplify and automate role assignment 
Reduce risk through compliance checks and remediation 
Automate manual processes through integration with SAP 
Business Suite 
Yes 
Approve 
assignments 
No 
Requirement: 
Provide automated, position-based role management 
while ensuring compliance 
Calculate entitlements 
based on position 
Compliance check 
Remediation 
1 
New Hire 
SAP 
ERP 
HCM 
SAP 
ERP 
HCM 
SAP 
ERP 
FI 
Portal 
Non- 
SAP 
2 3 4 
5 
SAP ERP HCM SAP Identity Management SAP Access Control Line Manager Landscape 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
Solution in Detail 
Reporting
Reporting Options at a Glance 
Basic Reporting 
„ Focus: Static, printable reports 
„ Report creation on database level 
Extended Reporting with SAP Business Warehouse (SAP BW)* 
„ Focus: Dynamic reports, offering more, highly detailed, and customizable reporting options 
„ Data is extracted from SAP Identity Management on a regular basis (as per defined job) 
„ Predefined report templates available, custom reports can be freely defined 
„ filtering, sorting, export to MS Excel, CSV, PDF, send via e-mail, etc. 
Reporting with SAP Lumira 
„ Focus: Customer-specific reposts/analyses for identity management 
„ Rich graphical capabilities for visualizing and utilizing reported data 
„ Low integration and maintenance efforts 
„ Easy extension 
*SAP BW and SAP Lumira are not part of the SAP ID Mgmt license 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 24
Basic Reporting 
Application/privilege-centric 
Determination of system access 
User-centric 
Determination of user privileges 
Entry data 
Current data, historical data, time stamps, 
modified by, audit flags 
Approval data 
Who approved what when? 
Who had which privilege when? 
Segregation of duties, Attestation 
Task audit log 
Determination of tasks run on 
user / by user 
General logs 
Off-the-shelf reporting tools 
can be used 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
Extended Reporting with SAP Business Warehouse 
SAP BW report templates 
Persons, privileges, roles and their assignments 
over time and for specific dates 
Content-based and time-based reporting 
Advanced filtering and sorting options 
Access control 
Roles for reporting user 
(administrator, manager, owner) 
Basic audit data 
Who changed what 
Flexibility 
BEX reports 
Change history 
up to the time of 
last synchronization 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
Reporting with SAP Lumira 
Customer-specific reposts/analyses for 
identity management 
Rich graphical capabilities for 
visualizing and utilizing reported data 
Low integration and maintenance efforts 
Easy extension 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
Solution in Detail 
Password Management
Password Management 
Centralize and automate password management 
SAP 
ERP 
HCM 
SAP 
ERP 
FI 
Portal 
Non- 
SAP 
Solution: 
SAP Identity Management Landscape 
Requirement: 
Reduce help desk calls related to password reset 
inquiries 
Enable password provisioning across heterogeneous 
landscapes 
Reset password 
Recover lost password 
Set new password 
User Helpdesk 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 29
Solution in Detail 
Connectivity
Connectivity Framework 
On-Prem/Cloud Applications 
„ SAP Business Suite 
„ SuccessFactors 
„ SAP Access Control 
„ Lotus Domino / Notes 
„ Microsoft Exchange 
„ RSA ClearTrust 
„ RSA SecurID 
Technical 
Other 
Databases 
„ Microsoft SQL Server 
„ Microsoft Access 
„ Oracle database 
„ IBM UDB (DB2) 
„ MySQL 
„ Sybase 
„ SAP HANA 
Directory Servers 
„ Microsoft Active Directory 
„ IBM Tivoli Directory 
„ Novell eDirectory 
„ SunONE Java Directory 
„ Oracle Internet Directory 
„ Microsoft ADAM 
„ Siemens DirX 
„ OpenLDAP 
„ eB2Bcom View500 Directory Server 
„ CA eTrust Directory 
„ SAP IDM Virtual Directory Server 
„ Any LDAP v3 compliant directory srv 
„ SPML 
„ LDAP 
„ ODBC/JDBC/OLE-DB 
„ RFC 
„ LDIF files 
„ XML files 
„ CSV files 
SAP Identity 
Management 
„ SAP Application Server 
„ Microsoft Windows NT 
„ Unix/Linux 
„ Shell execute 
„ Custom Java connector API 
„ Script-based connector API 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 31
Third Party Connector Certification 
SAP ICC Integration Scenario NW-IDM-CON 
SAP Identity Management Integration Scenario NW-IDM-CON 
ƒ The SAP Integration and Certification Center (ICC) offers a certification for 
the integration scenario NW-IDM-CON. 
ƒ SAP partners as well as potential partners and independent software 
vendors (ISVs) are invited to use the Connector Development Kit (CDK) to 
create an SAP Identity Management connector for their application, and to 
integrate the application into the identity management landscape. This 
connector can then be certified by the SAP ICC. 
For general information about third party certifications with SAP products, please 
refer to http://www.sdn.sap.com/irj/sdn/interface-certifications, or contact the SAP 
Integration and Certification Center (ICC) directly at icc@sap.com 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 32
Solution in Detail 
Architecture
SAP Identity Management Architecture 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 34
Solution in Detail 
Identity Virtualization
Virtual Directory Server 
Virtual Directory Server (VDS) provides 
„ Single consistent view and entry point for multiple 
distributed identity data sources 
„ Identity information as a service for applications 
through standard protocols (LDAP, SPML) 
„ Abstraction layer for underlying data stores 
Consumer only sees one standard interface 
„ Transform incoming LDAP requests, and connect 
directly to the existing data repositories 
„ Data stays within original data source 
„ Efficient caching 
Properties 
„ Real-time access to data 
„ No need to consolidate data sources 
„ No extra data store 
„ Quick LDAP deployment 
„ Easier and cheaper maintenance 
„ Attribute manipulation 
„ Name space modifications 
„ Complex operations on-the-fly 
SPML 
SPML LDAP 
Virtual Directory Server 
LDAP JDBC 
Database 
Directory Application 
Server 
Directory 
Server 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 36
Summary & Additional 
Information
Summary 
SAP Identity Management is part of a comprehensive SAP security suite that includes 
access control as well as secure programming and compliance aspects. 
The solution covers the entire identity lifecycle and automation capabilities based on 
business processes. 
A strong integration with SAP Access Control creates a holistic identity and access 
governance solution. 
Extensive connectivity with SAP and non-SAP applications extends identity 
management to all areas of the enterprise. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 38
Find More Information 
SAP Community Network 
Visit the SAP Community Network (SCN) for comprehensive information on 
SAP Identity Management, such as 
ƒ Discussion forum, 
product information, 
documentation, training, 
and support information 
ƒ Articles, blogs, WIKI, 
FAQs, and newsletters 
ƒ Downloads 
http://scn.sap.com/community/idm 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 39
SAP Identity Management 
Rapid deployment solution 
Short project times and reduced TCO by simplifying 
assignment and management of roles and privileges to 
users 
ƒ Implementation of best practice processes out of the 
box with a fixed scope and most important and 
common scenarios, e.g. defined set of customer 
specific configuration, connection of source- and 
target-systems, provisioning etc 
ƒ Pre-configured functionality of SAP Identity 
Management in a development system 
ƒ Step-by-step guide, describing each activity during 
deployment 
ƒ Solution can be extended with additional add-on 
options 
Standard solution 
Automatic 
authorization 
assignment 
Mass user 
administration 
E-mail 
notification 
framework 
Predefined 
HTML based 
reports 
Add-On 1: 
Connection of 
1 source- and 
2 target 
systems 
Approval 
workflows 
jobs 
Support of 
system specific 
attributes 
New Web UI 
tasks 
Connection to additional SAP systems 
Add-On 2: 
Additional Go-Live Support 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 40
© 2014 SAP SE or an SAP affiliate company. 
All rights reserved. 
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an 
SAP affiliate company. 
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE 
(or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional 
trademark information and notices. 
Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. 
National product specifications may vary. 
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, 
and SAP SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or 
SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and 
services, if any. Nothing herein should be construed as constituting an additional warranty. 
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related 
presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated 
companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be 
changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, 
promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties 
that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking 
statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 43

More Related Content

What's hot

Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Guang Ying Yuan
 
SAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSingbBablu
 
SAP Activate Methodology for S/4HANA Implementation
SAP Activate Methodology for S/4HANA ImplementationSAP Activate Methodology for S/4HANA Implementation
SAP Activate Methodology for S/4HANA ImplementationKellton Tech Solutions Ltd
 
SAP INTRO
SAP INTROSAP INTRO
SAP INTRODr.Ravi
 
SAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementationSAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementationBluefin Solutions
 
Sap basics (SAP Modules)
Sap basics (SAP Modules)Sap basics (SAP Modules)
Sap basics (SAP Modules)Kamal Joshi
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 
Sap Implementation Presentation
Sap Implementation PresentationSap Implementation Presentation
Sap Implementation Presentationlarrymcc
 
Introduction to SAP ERP
Introduction to SAP ERPIntroduction to SAP ERP
Introduction to SAP ERPhasan2000
 
SAP S4/HANA meetup overview
SAP S4/HANA meetup overview SAP S4/HANA meetup overview
SAP S4/HANA meetup overview Accenture Hungary
 
SAP S/4HANA Migration Cockpit
SAP S/4HANA Migration CockpitSAP S/4HANA Migration Cockpit
SAP S/4HANA Migration CockpitEdwin Weijers
 

What's hot (20)

Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1Day1 Sap Basis Overview V1 1
Day1 Sap Basis Overview V1 1
 
SAP ECC to S/4HANA Move
SAP ECC to S/4HANA MoveSAP ECC to S/4HANA Move
SAP ECC to S/4HANA Move
 
SAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptx
 
SAP Activate Methodology for S/4HANA Implementation
SAP Activate Methodology for S/4HANA ImplementationSAP Activate Methodology for S/4HANA Implementation
SAP Activate Methodology for S/4HANA Implementation
 
SAP INTRO
SAP INTROSAP INTRO
SAP INTRO
 
SAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementationSAP S/4HANA: Everything you need to know for a successul implementation
SAP S/4HANA: Everything you need to know for a successul implementation
 
Sap basics (SAP Modules)
Sap basics (SAP Modules)Sap basics (SAP Modules)
Sap basics (SAP Modules)
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
Sap Implementation Presentation
Sap Implementation PresentationSap Implementation Presentation
Sap Implementation Presentation
 
Introduction to SAP ERP
Introduction to SAP ERPIntroduction to SAP ERP
Introduction to SAP ERP
 
Migration to sap s4 hana
Migration to sap s4 hanaMigration to sap s4 hana
Migration to sap s4 hana
 
Moving to SAP S/4HANA
Moving to SAP S/4HANAMoving to SAP S/4HANA
Moving to SAP S/4HANA
 
Introduction to sap
Introduction to sapIntroduction to sap
Introduction to sap
 
Sap- An Overview
Sap- An OverviewSap- An Overview
Sap- An Overview
 
Sap introduction
Sap introductionSap introduction
Sap introduction
 
S 4 HANA 4 CEOs and CFOs
S 4 HANA 4 CEOs and CFOsS 4 HANA 4 CEOs and CFOs
S 4 HANA 4 CEOs and CFOs
 
SAP S4/HANA meetup overview
SAP S4/HANA meetup overview SAP S4/HANA meetup overview
SAP S4/HANA meetup overview
 
Migrating to SAP S/4HANA
Migrating to SAP S/4HANAMigrating to SAP S/4HANA
Migrating to SAP S/4HANA
 
SAP S/4HANA Migration Cockpit
SAP S/4HANA Migration CockpitSAP S/4HANA Migration Cockpit
SAP S/4HANA Migration Cockpit
 
SAP Fiori ppt
SAP Fiori pptSAP Fiori ppt
SAP Fiori ppt
 

Similar to SAP Identity Management Overview

XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPGourav Ladha
 
SAP HCM Mann India Offering
SAP HCM Mann India OfferingSAP HCM Mann India Offering
SAP HCM Mann India OfferingMann-India
 
Mann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRCMann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRCMann-India
 
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?SAPinsider Events
 
Brochure Auditing Erp System V2
Brochure   Auditing Erp System V2Brochure   Auditing Erp System V2
Brochure Auditing Erp System V2agc infotech
 
ARMS_Corporate Presentation
ARMS_Corporate PresentationARMS_Corporate Presentation
ARMS_Corporate PresentationAnand Murali
 
AppExchange 101 - Building Custom Apps to Extend Salesforce
AppExchange 101 - Building Custom Apps to Extend SalesforceAppExchange 101 - Building Custom Apps to Extend Salesforce
AppExchange 101 - Building Custom Apps to Extend Salesforcedreamforce2006
 
Class 22. sap hr (hcm) end user 1 v7.0
Class 22. sap hr (hcm) end user 1 v7.0Class 22. sap hr (hcm) end user 1 v7.0
Class 22. sap hr (hcm) end user 1 v7.0HR Spot
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresaSAP Latinoamérica
 
Intelligent Business Operations for Utilities, powered by SAP HANA
Intelligent Business Operations for Utilities, powered by SAP HANAIntelligent Business Operations for Utilities, powered by SAP HANA
Intelligent Business Operations for Utilities, powered by SAP HANAHarsh Jegadeesan
 
iExtensions CRM
iExtensions CRMiExtensions CRM
iExtensions CRMshoaibnz
 
SAP HCM Overview - ITChamps Software Private Limited
SAP HCM Overview - ITChamps Software Private LimitedSAP HCM Overview - ITChamps Software Private Limited
SAP HCM Overview - ITChamps Software Private LimitedITChamps Software Pvt. Ltd
 
Sap hr (hcm) end user
Sap hr (hcm) end userSap hr (hcm) end user
Sap hr (hcm) end userHR Spot
 

Similar to SAP Identity Management Overview (20)

shravan
shravanshravan
shravan
 
XsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAPXsXprt, a User Access Compliance and License Management tool for SAP
XsXprt, a User Access Compliance and License Management tool for SAP
 
SAP HCM Mann India Offering
SAP HCM Mann India OfferingSAP HCM Mann India Offering
SAP HCM Mann India Offering
 
SAP Access Authorization Solution
SAP Access Authorization SolutionSAP Access Authorization Solution
SAP Access Authorization Solution
 
Mann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRCMann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRC
 
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Brochure Auditing Erp System V2
Brochure   Auditing Erp System V2Brochure   Auditing Erp System V2
Brochure Auditing Erp System V2
 
GRC IMPRIVA
GRC IMPRIVAGRC IMPRIVA
GRC IMPRIVA
 
ARMS_Corporate Presentation
ARMS_Corporate PresentationARMS_Corporate Presentation
ARMS_Corporate Presentation
 
sap s4 hana introduction and outlook
sap s4 hana introduction and outlooksap s4 hana introduction and outlook
sap s4 hana introduction and outlook
 
IMC IMPRIVA
IMC IMPRIVAIMC IMPRIVA
IMC IMPRIVA
 
AppExchange 101 - Building Custom Apps to Extend Salesforce
AppExchange 101 - Building Custom Apps to Extend SalesforceAppExchange 101 - Building Custom Apps to Extend Salesforce
AppExchange 101 - Building Custom Apps to Extend Salesforce
 
Class 22. sap hr (hcm) end user 1 v7.0
Class 22. sap hr (hcm) end user 1 v7.0Class 22. sap hr (hcm) end user 1 v7.0
Class 22. sap hr (hcm) end user 1 v7.0
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresa
 
Intelligent Business Operations for Utilities, powered by SAP HANA
Intelligent Business Operations for Utilities, powered by SAP HANAIntelligent Business Operations for Utilities, powered by SAP HANA
Intelligent Business Operations for Utilities, powered by SAP HANA
 
iExtensions CRM
iExtensions CRMiExtensions CRM
iExtensions CRM
 
SAP HCM Overview - ITChamps Software Private Limited
SAP HCM Overview - ITChamps Software Private LimitedSAP HCM Overview - ITChamps Software Private Limited
SAP HCM Overview - ITChamps Software Private Limited
 
Sap hr (hcm) end user
Sap hr (hcm) end userSap hr (hcm) end user
Sap hr (hcm) end user
 
One Vision
One VisionOne Vision
One Vision
 

More from SAP Technology

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1SAP Technology
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...SAP Technology
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...SAP Technology
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesSAP Technology
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...SAP Technology
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformSAP Technology
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...SAP Technology
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANASAP Technology
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Technology
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...SAP Technology
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsSAP Technology
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...SAP Technology
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...SAP Technology
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareSAP Technology
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP Technology
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANASAP Technology
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Technology
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESAP Technology
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP Technology
 

More from SAP Technology (20)

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processes
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANA
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer Products
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and Healthcare
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital Core
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial Data
 
Why SAP HANA?
Why SAP HANA?Why SAP HANA?
Why SAP HANA?
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASE
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance Features
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

SAP Identity Management Overview

  • 1. SAP Identity Management Overview October 2014 Public
  • 2. Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password Management Connectivity Architecture Identity Virtualization Summary & Additional Information Appendices © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
  • 3. Introduction to SAP Identity Management
  • 4. SAP Security Portfolio IT Application Security IT Application Security – SAP Portfolio Identity and access management (IAM) Identity, governance and administration Authentication and single sign-on • Manage identity lifecycle • Segregation of duties • Emergency access • Role management • Reporting • … • Single sign-on • Secure network communication • Central access policies • 2-factor authentication • … Code vulnerabilities Find vulnerabilities in customer code Threat management Detect cyber crime attacks based on user behavior SAP Identity Management SAP Access Control SAP Single Sign-On SAP Cloud Identity SAP NetWeaver AS, add-on for code vulnerability analysis SAP Enterprise Threat Detection © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 4
  • 5. Key Capabilities Enables the efficient, secure and compliant execution of business processes Holistic approach Manage identities and permissions SAP Identity Management Ensures that the right users have the right access to the right systems at the right time Consistent with user roles and privileges Across all systems and applications © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
  • 6. Business Drivers for Identity Management Operational costs Changing business processes Compliance challenges y Multiple sources of identity data y Manual user provisioning y Labor-intensive, paper-based approval systems y Manual password reset processes y Transactions involve multiple enterprises y Partners participate in business processes y Company-specific requirements for user provisioning solutions y No record of who has access to which IT resources y Inability to deprovision user access rights upon termination y No complete audit trail available y Prevention of unauthorized access in multi-enterprise environments © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
  • 7. Identity Lifecycle How long does it take for new employees to receive all permissions and become productive in their new job? Are permissions automatically adjusted if someone is promoted to a new position? How can you remove permissions automatically if employees change their Who has adequate position? permissions to fill in for a co-worker? co-How long does it take to remove ALL worker? How permissions of an employee? And how can you ensure that they were properly removed? © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
  • 8. Solution in a Nutshell Central management of identities throughout the system landscape Rule-driven workflow and approval process Extensive audit trail, logging, and reporting functionality Governance through centralized and auditable identity data Compliance through integration with SAP Access Control Compliant and integrated identity management solution to mitigate segregation-of-duties risks SAP Access Control SAP Identity Management SAP applications Non-SAP applications SAP SCM SAP ERP HCM SAP ERP Java Portal Database Legacy OS E-mail Web app SuccessFactors … © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 8
  • 9. A Holistic Approach to Compliant Identity Management Example: On-boarding Success Factors SAP ERP HCM Approval workflows Web-based single sign-on and identity federation Integration with SAP Business Suite and SuccessFactors SAP applications Non-SAP applications Password management Identity virtualization and Central identity as a service identity store SAP Identity Management Provisioning to SAP and non-SAP systems SAP Access Control Compliance checks SAP BusinessObjects Access Control (GRC) Reporting Rule-based assignment of business roles © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
  • 10. Solution in Detail Role Management and Workflows
  • 11. Role Definition and Provisioning Role Definition (design, one-time task) Read system access information (roles, groups, authorizations, etc.) from target systems Define a business role hierarchy Assign technical roles to business roles Develop rules for role assignments Provisioning (regularly) Assign or remove roles to/from people ƒ Through request/approval workflow ƒ Manually (administrator) ƒ Automatically, e.g. HR-driven Automatic adjustment of master data and assignments of technical authorizations in target systems Employee Accounting Portal role Accounting (ABAP role) Manager HR manager AD user E-mail (ABAP role) E-mail system Active Directory SAP Portal SAP FI SAP HR Technical roles Business roles © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
  • 12. Context-Based Role Management: Reducing Complexity SAP Identity Management Business Role User Position Location … SAP NetWeaver Identity Management Technical role A Technical role C Technical role B Managed System User Managed System Technical role A Technical role B Context-based role management simplifies the structure of roles through dynamic role assignment based on user context information. Benefits Reduced number of roles Reduced complexity Sufficient granularity Improved data consistency and governance Example: 20 roles in 1000 factories y Conventional method: 20.000 entries (roles) y Context-based: 1.020 entries (roles + contexts) © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 12
  • 13. Workflows Approval Notification y Identity Center sends a notification to user/manager Provisioning y Identity Center provisions new roles and privileges to respective systems Request y User sends a role request Processing y Identity Center processes request – Sends alert to manager / administrator y Manager checks request and approves/denies © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
  • 14. Solution in Detail Business-Driven Identity Management
  • 15. Integration with SAP Business Applications Success Factors Employee Central SAP Identity Management SAP Supply Network Collaboration SAP Extended Warehouse Management Transportation Management SAP ERP Financials SAP SAP Portfolio and Product Management SAP Customer Relationship Management SAP Supplier Relationship Management SAP Product Lifecycle Management SAP HANA SAP Service Parts Planning SAP ERP Human Capital Management © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
  • 16. Business Process Driven Identity Management On-Boarding Kim Perkins joins the company as a marketing specialist. From the first day with her new company, she is able to log on to all relevant systems, including access to the employee self-services, and access to SAP CRM to track the marketing activities she is responsible for. Kim’s manager approves the assignment 2 3 4 Line Manager Pre-hire phase HR ensures that all necessary employee data for Kim is available, such as position and entry date 1 Event-based extraction of personnel data First day at work Based on the position in HCM, IDM automatically assigns the business role “Marketing Specialist” SAP ERP HCM Success Factors HR Operations Provisioning of role and authorization information to relevant target systems User created “Employee” Business Partner created User created “Marketing Professional” User created Access to SAP ESS Access to SAP CRM SAP Identity Management SAP ERP HCM SAP ERP SAP CRM SAP Portal 5 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 16
  • 17. Business Process Driven Identity Management Position Change After two years as a marketing specialist, Kim is promoted and takes over personnel and budget responsibility for her marketing team. On the first day in her new role, she has access to the manager self-services. In her new position, she is responsible for budget approvals for all marketing campaigns - this requires immediate access to SAP ERP to view the marketing costs. HR ensures that all necessary employee data for Kim is available Day of position change SAP Identity Management recognizes the line manager information for Kim and automatically assigns the business role “Marketing Manager” SAP Identity Management 3 4 Provisioning of role and authorization information to relevant target systems SAP ERP HCM SAP ERP SAP CRM SAP Portal User updated “Employee” “Line Manager” User created “Marketing Controller” User updated “Marketing Controller” User updated Access to SAP ESS Access to SAP MSS 1 2 Event-based extraction of personnel data SAP ERP HCM Success Factors HR Operations Access to SAP CRM © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
  • 18. Business Process Driven Identity Management Termination After eight years, Kim leaves the company. The day after her official assignment with the company ends, she is no longer able to access any corporate systems. HR ensures that all data relevant for the employment contract termination is available, such as last day of work Day after termination of employment SAP Identity Management recognizes the last day information for Kim; it automatically takes away all access rights and disables her accounts SAP Identity Management 3 SAP ERP HCM SAP ERP SAP CRM SAP Portal 4 User disabled User disabled User disabled User disabled 1 2 Event-based extraction of personnel data SAP ERP HCM Success Factors HR Operations © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
  • 19. Solution in Detail Compliant Identity Management
  • 20. Compliant Identity Management: Capabilities Consistent view on current and historic access rights, approvals and policy violations Manage identities and permissions SAP Identity Management Identify and mitigate risks SAP Access Control Central management of heterogeneous environments Integration based on standards Compliance checks Business risk controls and mitigation Compliant identity management across SAP and heterogeneous landscapes in one integrated solution © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 20
  • 21. Compliant Identity Management: Process View 4 Risk analysis SAP BusinessObjects Access Control (GRC) Request role assignment 1 SAP Identity Management SAP Access Control Forward request for risk analysis 3 6 Risk status Manager 2 approval Notification to 8 user and manager Provisioning to 7 target systems 5 Risk mitigation SAP applications Non-SAP applications SAP SCM SAP ERP HCM SAP ERP Java Portal Database Legacy OS E-mail Web app … … © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
  • 22. Compliant, Business-Driven Identity Management Solution: Simplify and automate role assignment Reduce risk through compliance checks and remediation Automate manual processes through integration with SAP Business Suite Yes Approve assignments No Requirement: Provide automated, position-based role management while ensuring compliance Calculate entitlements based on position Compliance check Remediation 1 New Hire SAP ERP HCM SAP ERP HCM SAP ERP FI Portal Non- SAP 2 3 4 5 SAP ERP HCM SAP Identity Management SAP Access Control Line Manager Landscape © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
  • 23. Solution in Detail Reporting
  • 24. Reporting Options at a Glance Basic Reporting „ Focus: Static, printable reports „ Report creation on database level Extended Reporting with SAP Business Warehouse (SAP BW)* „ Focus: Dynamic reports, offering more, highly detailed, and customizable reporting options „ Data is extracted from SAP Identity Management on a regular basis (as per defined job) „ Predefined report templates available, custom reports can be freely defined „ filtering, sorting, export to MS Excel, CSV, PDF, send via e-mail, etc. Reporting with SAP Lumira „ Focus: Customer-specific reposts/analyses for identity management „ Rich graphical capabilities for visualizing and utilizing reported data „ Low integration and maintenance efforts „ Easy extension *SAP BW and SAP Lumira are not part of the SAP ID Mgmt license © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 24
  • 25. Basic Reporting Application/privilege-centric Determination of system access User-centric Determination of user privileges Entry data Current data, historical data, time stamps, modified by, audit flags Approval data Who approved what when? Who had which privilege when? Segregation of duties, Attestation Task audit log Determination of tasks run on user / by user General logs Off-the-shelf reporting tools can be used © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
  • 26. Extended Reporting with SAP Business Warehouse SAP BW report templates Persons, privileges, roles and their assignments over time and for specific dates Content-based and time-based reporting Advanced filtering and sorting options Access control Roles for reporting user (administrator, manager, owner) Basic audit data Who changed what Flexibility BEX reports Change history up to the time of last synchronization © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
  • 27. Reporting with SAP Lumira Customer-specific reposts/analyses for identity management Rich graphical capabilities for visualizing and utilizing reported data Low integration and maintenance efforts Easy extension © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
  • 28. Solution in Detail Password Management
  • 29. Password Management Centralize and automate password management SAP ERP HCM SAP ERP FI Portal Non- SAP Solution: SAP Identity Management Landscape Requirement: Reduce help desk calls related to password reset inquiries Enable password provisioning across heterogeneous landscapes Reset password Recover lost password Set new password User Helpdesk © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 29
  • 30. Solution in Detail Connectivity
  • 31. Connectivity Framework On-Prem/Cloud Applications „ SAP Business Suite „ SuccessFactors „ SAP Access Control „ Lotus Domino / Notes „ Microsoft Exchange „ RSA ClearTrust „ RSA SecurID Technical Other Databases „ Microsoft SQL Server „ Microsoft Access „ Oracle database „ IBM UDB (DB2) „ MySQL „ Sybase „ SAP HANA Directory Servers „ Microsoft Active Directory „ IBM Tivoli Directory „ Novell eDirectory „ SunONE Java Directory „ Oracle Internet Directory „ Microsoft ADAM „ Siemens DirX „ OpenLDAP „ eB2Bcom View500 Directory Server „ CA eTrust Directory „ SAP IDM Virtual Directory Server „ Any LDAP v3 compliant directory srv „ SPML „ LDAP „ ODBC/JDBC/OLE-DB „ RFC „ LDIF files „ XML files „ CSV files SAP Identity Management „ SAP Application Server „ Microsoft Windows NT „ Unix/Linux „ Shell execute „ Custom Java connector API „ Script-based connector API © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 31
  • 32. Third Party Connector Certification SAP ICC Integration Scenario NW-IDM-CON SAP Identity Management Integration Scenario NW-IDM-CON ƒ The SAP Integration and Certification Center (ICC) offers a certification for the integration scenario NW-IDM-CON. ƒ SAP partners as well as potential partners and independent software vendors (ISVs) are invited to use the Connector Development Kit (CDK) to create an SAP Identity Management connector for their application, and to integrate the application into the identity management landscape. This connector can then be certified by the SAP ICC. For general information about third party certifications with SAP products, please refer to http://www.sdn.sap.com/irj/sdn/interface-certifications, or contact the SAP Integration and Certification Center (ICC) directly at icc@sap.com © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 32
  • 33. Solution in Detail Architecture
  • 34. SAP Identity Management Architecture © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 34
  • 35. Solution in Detail Identity Virtualization
  • 36. Virtual Directory Server Virtual Directory Server (VDS) provides „ Single consistent view and entry point for multiple distributed identity data sources „ Identity information as a service for applications through standard protocols (LDAP, SPML) „ Abstraction layer for underlying data stores Consumer only sees one standard interface „ Transform incoming LDAP requests, and connect directly to the existing data repositories „ Data stays within original data source „ Efficient caching Properties „ Real-time access to data „ No need to consolidate data sources „ No extra data store „ Quick LDAP deployment „ Easier and cheaper maintenance „ Attribute manipulation „ Name space modifications „ Complex operations on-the-fly SPML SPML LDAP Virtual Directory Server LDAP JDBC Database Directory Application Server Directory Server © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 36
  • 37. Summary & Additional Information
  • 38. Summary SAP Identity Management is part of a comprehensive SAP security suite that includes access control as well as secure programming and compliance aspects. The solution covers the entire identity lifecycle and automation capabilities based on business processes. A strong integration with SAP Access Control creates a holistic identity and access governance solution. Extensive connectivity with SAP and non-SAP applications extends identity management to all areas of the enterprise. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 38
  • 39. Find More Information SAP Community Network Visit the SAP Community Network (SCN) for comprehensive information on SAP Identity Management, such as ƒ Discussion forum, product information, documentation, training, and support information ƒ Articles, blogs, WIKI, FAQs, and newsletters ƒ Downloads http://scn.sap.com/community/idm © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 39
  • 40. SAP Identity Management Rapid deployment solution Short project times and reduced TCO by simplifying assignment and management of roles and privileges to users ƒ Implementation of best practice processes out of the box with a fixed scope and most important and common scenarios, e.g. defined set of customer specific configuration, connection of source- and target-systems, provisioning etc ƒ Pre-configured functionality of SAP Identity Management in a development system ƒ Step-by-step guide, describing each activity during deployment ƒ Solution can be extended with additional add-on options Standard solution Automatic authorization assignment Mass user administration E-mail notification framework Predefined HTML based reports Add-On 1: Connection of 1 source- and 2 target systems Approval workflows jobs Support of system specific attributes New Web UI tasks Connection to additional SAP systems Add-On 2: Additional Go-Live Support © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 40
  • 41. © 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 43