https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/SAP-Cloud-Identity-Access-Governance-blog-posts.xml SAP Community - SAP Cloud Identity Access Governance 2026-03-02T12:12:17.362860+00:00 python-feedgen SAP Cloud Identity Access Governance blog posts in SAP Community https://community.sap.com/t5/technology-blog-posts-by-members/kickstart-your-cloud-sap-grc-learning-journey-introduction-to-cloud-sap-grc/ba-p/14115962 Kickstart your Cloud SAP GRC Learning Journey: Introduction to Cloud SAP GRC, its Submodules details 2025-06-05T10:56:56.081000+02:00 santhosha_dasari https://community.sap.com/t5/user/viewprofilepage/user-id/750626 <P>&nbsp;</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="1743422989454.jpg" style="width: 890px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/268149i095F279DDAFBCAC8/image-size/large?v=v2&amp;px=999" role="button" title="1743422989454.jpg" alt="1743422989454.jpg" /></span></SPAN></P><P><SPAN>I would recommend referring</SPAN><EM> my below earlier article on SAP GRC (On-premise) before you start your journey into Cloud SAP GRC. It helps you understand the basic concepts and how On-premise SAP GRC helps organization to achieve business goals.</EM></P><P class=""><A href="https://community.sap.com/t5/technology-blog-posts-by-members/kickstart-your-sap-grc-learning-journey-introduction-to-sap-grc-submodules/ba-p/13997059" target="_blank">https://community.sap.com/t5/technology-blog-posts-by-members/kickstart-your-sap-grc-learning-journey-introduction-to-sap-grc-submodules/ba-p/13997059</A></P><P class="">SAP Cloud GRC encompasses a range of robust solutions tailored to meet diverse organizational needs.</P><P class="">Below are some of the key offerings in the SAP GRC, public cloud solutions portfolio.</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud Identity Access Governance</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Risk Assurance Management</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Enterprise Threat Detection, Cloud Edition</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Watchlist Screening</P><P class=""><STRONG>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud Identity Access Governance</STRONG></P><P class="">SAP Cloud Identity Access Governance is a comprehensive solution designed to simplify user access management in the cloud environment. While it offers similar functionality like on-premises SAP Access Control, it is not a cloud version of SAP Access Control (On-prem) or SAP Access Control hosted on cloud. Instead, it is a new SAAS solution from SAP, built on the SAP Business Technology Platform (BTP). It supports both on-premise and cloud systems.</P><P class=""><STRONG>Submodules/services:</STRONG></P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud Identity Access Governance, Access Analysis Service (like ARA)</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud Identity Access Governance, Access Request Service (like ARM)</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud Identity Access Governance, Role Design Service (like BRM)</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud Identity Access Governance, Privileged Access Management service (like EAM)</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud Identity Access Governance, access certification service (like UAR etc.)</P><P>&nbsp;</P><DIV class=""><DIV class=""><DIV class=""><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="iag.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/268150i38EADC525E94D316/image-size/large?v=v2&amp;px=999" role="button" title="iag.png" alt="iag.png" /></span><SPAN>Image Source: SAP</SPAN><P>&nbsp;</P></DIV></DIV></DIV></DIV><P class=""><STRONG>Common IAG and Access Control scenarios:</STRONG></P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud IAG only - supports only Cloud systems</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Cloud IAG with Cloud Connector - supports both On-prem and cloud systems</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Access Control with IAG integrated edition (as a bridge) - supports both On-prem and cloud systems</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Access Control – supports only On-Prem and SuccessFactors EC.</P><P class="">Reference SAP hep portal:</P><P class=""><A class="" href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE</A></P><P class=""><STRONG>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Risk and Assurance Management</STRONG></P><P class="">SAP Risk Assurance Management (RAM) is a comprehensive solution designed to document risks and controls, automate controls to safeguard financial and nonfinancial data, policies, and processes in the cloud environment. &nbsp;This can be like on-prem SAP Process Control. However, it is not a cloud version of SAP Process Control (On-Prem) or either SAP Process Control (on-Prem) hosted on cloud.</P><P class="">Earlier it was called as “SAP Financial Compliance Management” solution.</P><P class="">It provides the predefined integration and content for SAP S/4HANA on premise and in the cloud.</P><DIV class=""><DIV class=""><DIV class="">&nbsp;</DIV></DIV><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ram.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/268151iEEE5DD30D275BAA6/image-size/large?v=v2&amp;px=999" role="button" title="ram.png" alt="ram.png" /></span></SPAN></P><P>&nbsp;<SPAN>Image Source: SAP</SPAN></P></DIV><P class="">Reference SAP hep portal:</P><P class=""><A class="" href="https://help.sap.com/docs/risk-and-assurance-management" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/risk-and-assurance-management</A></P><P class=""><STRONG>3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Enterprise Threat Detection, Cloud Edition</STRONG></P><P class="">SAP Enterprise Threat Detection enables you to evaluate security threats in your IT landscapes in real time by leveraging SAP and non-SAP log data. It helps to identify, analyze, and neutralize cybersecurity threats with real-time SIEM intelligence in your SAP applications as they happen and before serious damage occurs.</P><P class="">This solution allows organizations to monitor and respond to potential threats in real-time, ensuring the security of your cloud operations.</P><P class=""><STRONG>Key features/modules:</STRONG></P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Log correlation and analysis</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Automated threat detection and alerting</P><P class="">·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Straightforward integration</P><P class=""><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="etd.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/268152iA2B078CF662E87C4/image-size/large?v=v2&amp;px=999" role="button" title="etd.png" alt="etd.png" /></span></P><P>&nbsp;<SPAN>Image Source: SAP</SPAN></P><P class="">Reference SAP hep portal:</P><P class=""><A class="" href="https://help.sap.com/docs/SAP_ENTERPRISE_THREAT_DETECTION" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/SAP_ENTERPRISE_THREAT_DETECTION</A></P><P class="">4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SAP Watchlist Screening</P><P class="">SAP Watch List Screening enables enterprises across all industries to screen the names and addresses of their business partners against sanctioned party lists, thus ensuring their compliance with guidelines, regulations, and legislation. To facilitate this task, SAP Watch List Screening is integrated with SAP Business Partner.</P><P class="">It helps in assessing potential risks on an exception basis helps avoid high-risk businesses, individuals, and entities.</P><P class="">This can be integrated with SAP S/4HANA and SAP S/4HANA Cloud, as well as with APIs to extend to other systems.</P><P class="">A vital tool for screening against various watchlists to ensure compliance with legal and regulatory requirements.</P><P class="">Reference SAP hep portal:</P><P class=""><A class="" href="https://help.sap.com/docs/SAP_WATCH_LIST_SCREENING" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/SAP_WATCH_LIST_SCREENING</A></P><P class=""><EM>&nbsp;</EM></P><P class=""><EM>I hope this helps to start your journey into Cloud SAP GRC also if you're aiming to level up your skills in Cloud SAP GRC ! By diving deep into these modules, you'll gain the knowledge and skills needed to excel in the world of Governance, Risk, and Compliance.</EM></P><P class=""><EM>Please connect and follow&nbsp;</EM><EM>me for the next upcoming informative articles in SAP Security, GRC, BTP, Internal Controls and Risk &amp; Controls area.</EM></P><P class=""><EM>Share your thoughts in the comments below !</EM></P> 2025-06-05T10:56:56.081000+02:00 https://community.sap.com/t5/financial-management-blog-posts-by-sap/streamlining-privileged-access-in-sap-practical-tips-for-reliable-session/ba-p/14124644 Streamlining Privileged Access in SAP: Practical Tips for Reliable Session Management 2025-06-11T04:38:01.776000+02:00 ElyasAhmed https://community.sap.com/t5/user/viewprofilepage/user-id/1886529 <P><FONT size="4"><SPAN>For enterprises running SAP at scale, privileged access is both a necessity and a significant risk. Whether responding to production incidents, executing sensitive financial transactions, or configuring core systems, elevated access must be tightly governed. Without robust controls, organizations risk compliance violations, audit gaps, and unauthorized exposure of sensitive data.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>This post highlights how </SPAN><STRONG><SPAN>SAP Identity Access Governance (IAG)</SPAN></STRONG><SPAN> can help your organization secure, monitor, and audit privileged access, with practices tailored to meet the scrutiny of internal auditors, external regulators, and executive risk committees.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P>&nbsp;</P><P><FONT size="4"><STRONG><SPAN>Common Use Cases&nbsp;</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><STRONG><SPAN>When to Assign Privileged Access</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>PAM IDs are </SPAN><STRONG><SPAN>not</SPAN></STRONG><SPAN> for routine tasks. They should be reserved for high-risk or time-sensitive operations such as:</SPAN><SPAN>&nbsp;</SPAN></FONT></P><UL><LI><FONT size="4"><STRONG><SPAN>Urgent Fixes</SPAN></STRONG><SPAN> – for example responding to production outages.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><STRONG><SPAN>System Setup or Configuration Changes</SPAN></STRONG><SPAN> – including user management or master data updates.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><STRONG><SPAN>Sensitive Transactions in Regulated Areas</SPAN></STRONG><SPAN> – such as finance or healthcare, where full traceability is required.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><P><FONT size="4"><STRONG><SPAN>Where to Use PAM IDs</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>Not all systems require the same level of access control. Here’s how to prioritize:</SPAN><SPAN>&nbsp;</SPAN></FONT></P><UL><LI><FONT size="4"><STRONG><SPAN>Production Systems</SPAN></STRONG><SPAN>: Always enforce PAM to protect live data.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><STRONG><SPAN>Development/Test Systems</SPAN></STRONG><SPAN>: Use PAM for high-impact changes, while allowing standard accounts for daily work.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><P><FONT size="4"><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><STRONG><SPAN>Best Practices</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><STRONG><SPAN>Synchronizing PAM Logs</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>Reliable synchronization between SAP ABAP systems and SAP IAG ensures that every privileged session is logged, reviewed, and auditable.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><STRONG><SPAN>Recommendations:</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><UL><LI><FONT size="4"><STRONG><SPAN>Sync Interval:</SPAN></STRONG><SPAN> Schedule synchronization jobs every </SPAN><STRONG><SPAN>6 to 12 hours</SPAN></STRONG><SPAN> to achieve near real-time visibility without overburdening the system.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><STRONG><SPAN>Avoid Over-Syncing:</SPAN></STRONG><SPAN> Running sync jobs too frequently (e.g., every 30 minutes) can lead to job overlaps and potential failures.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><STRONG><SPAN>Optimize Timing:</SPAN></STRONG><SPAN> Execute jobs during </SPAN><STRONG><SPAN>off-peak hours</SPAN></STRONG><SPAN> (e.g., midnight) to reduce system load and avoid conflicts with business operations.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><STRONG><SPAN>Proactive Monitoring:</SPAN></STRONG><SPAN> Regularly monitor sync jobs and review log files to detect errors or delays early and prevent data gaps.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><P><FONT size="4"><STRONG><SPAN>Tip:</SPAN></STRONG><SPAN> In high-volume environments, a single sync job may take over an hour. Plan sync windows accordingly to avoid cascading delays.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>The </SPAN><STRONG><SPAN>Privileged Access Log Sync job</SPAN></STRONG><SPAN> scans all sessions tied to PAM assignments across connected systems, including both active and expired sessions (within the last six months). This ensures continuity—even if a system was temporarily unavailable or if one system’s sync succeeded while another failed.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><STRONG><SPAN>Note:</SPAN></STRONG><SPAN> As of the last release, the PAMLOGSYNC - LAST_SYNC_DATE_TIME setting has been removed from the Configuration app, simplifying setup and reducing sync inconsistencies.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><STRONG><SPAN>Pitfalls in Session Handling: The “Unlock” Problem</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>A common issue in customer environments is </SPAN><STRONG><SPAN>improper session termination</SPAN></STRONG><SPAN>. Many users do not select </SPAN><STRONG><SPAN>"Unlock"</SPAN></STRONG><SPAN> button in the SIAG_PAM_LAUNCH_PAD after completing their task. This leads to:</SPAN><SPAN>&nbsp;</SPAN></FONT></P><UL><LI><FONT size="4"><SPAN>Sessions remain open for hours—or even for days.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><SPAN>Overlapping sessions under the same PAM ID.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><SPAN>Inaccurate audit trails and failed sync jobs.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><P><FONT size="4"><STRONG><SPAN>Quick Fix:</SPAN></STRONG><SPAN> Implement </SPAN><STRONG><SPAN>SAP Note </SPAN></STRONG><A href="https://me.sap.com/notes/3604073/E" target="_blank" rel="noopener noreferrer"><STRONG><SPAN>3604073</SPAN></STRONG></A><SPAN> to fix missing logged off timestamps. This ensures sessions are properly closed, even when users forget to terminate them manually.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><STRONG><SPAN>Additional Recommendations</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>For improved performance and session accuracy, we recommend applying the following SAP Notes:</SPAN><SPAN>&nbsp;</SPAN></FONT></P><UL><LI><FONT size="4"><A href="https://me.sap.com/notes/3606297/E" target="_blank" rel="noopener noreferrer"><STRONG><SPAN>3606297</SPAN></STRONG></A><SPAN> – Configure sync intervals for better log preparation.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><UL><LI><FONT size="4"><A href="https://me.sap.com/notes/3586699/E" target="_blank" rel="noopener noreferrer"><STRONG><SPAN>3586699</SPAN></STRONG></A><STRONG><SPAN> and </SPAN></STRONG><A href="https://me.sap.com/notes/3586925/E" target="_blank" rel="noopener noreferrer"><STRONG><SPAN>3586925</SPAN></STRONG></A><SPAN> – Enable paging for PAM access logs to boost sync reliability.</SPAN><SPAN>&nbsp;</SPAN></FONT></LI></UL><P>&nbsp;</P><P><FONT size="4"><STRONG><SPAN>Final Takeaway</SPAN></STRONG><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>When used effectively, Privileged Access Management in SAP IAG is more than a compliance checkbox—it’s a strategic layer of defense. With proper assignment policies, smart sync scheduling, and user discipline, you can ensure privileged sessions are secure, auditable, and well-managed.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>Want to learn more about implementing PAM in your SAP landscape? Contact us or explore the latest updates in <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE" target="_self" rel="noopener noreferrer">SAP Help Portal</A>.</SPAN><SPAN>&nbsp;</SPAN></FONT></P><P><FONT size="4"><SPAN>&nbsp;</SPAN></FONT></P><P><EM><STRONG>Author(s)</STRONG>&nbsp;</EM></P><UL><LI><EM>Yuliia Shpak&nbsp;</EM></LI></UL><UL><LI><EM>Swetta Singh&nbsp;</EM></LI></UL> 2025-06-11T04:38:01.776000+02:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-business-technology-platform-btp-security-best-practices-expert-tips-to/ba-p/14125423 SAP Business Technology Platform(BTP) Security Best Practices: Expert Tips to Protect Your Platform 2025-06-13T16:10:20.147000+02:00 AditiArora16 https://community.sap.com/t5/user/viewprofilepage/user-id/1581574 <P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="flyd-zAhAUSdRLJ8-unsplash.jpg" style="width: 800px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/273155i92CE2F1EF6A6D165/image-size/large?v=v2&amp;px=999" role="button" title="flyd-zAhAUSdRLJ8-unsplash.jpg" alt="flyd-zAhAUSdRLJ8-unsplash.jpg" /></span><SPAN>Heard about those big cyber-attacks recently? No names needed, but chances are, your weekly shop has been hit. The interesting thing is that they followed a familiar pattern. Security analysts found that over 52,000 new vulnerabilities were disclosed in 2024, indicating that outdated or misconfigured systems are a growing invitation to attackers (sentinelone.com). Hackers often slip in via a ‘side door’: an unpatched server, an ill-configured cloud service, or a tricked user giving up a password. Another analysis of supply-chain incidents found that about half were driven by stolen or weak credentials (securityinfowatch.com). In plain terms, cybercrooks lean on low-hanging fruit - phishing, reused passwords, forgotten updates , more than any sci-fi-style hack.</SPAN></P><P><SPAN>Naturally, this has SAP customers asking: “Are our own SAP BTP environments secure? Is our user management tight? Are we following cloud security best practices?” These are great questions, and we’ve been hearing them a lot. So in this blog post we tried to answer these burning questions. We will address everything from locking down user accounts to broader security best practices, and we promise it won’t be a parade of jargon or doom-and-gloom.&nbsp;</SPAN></P><H2 id="toc-hId-1732355204">What can we learn from the recent cyber-attacks in the UK?</H2><P>The recent cyber-attacks targeting major UK retailers mark a significant moment in cyber security as these are among the first Distributed Denial-of-Service (DDoS) attacks to penetrate networks that were protected by enterprise-grade firewalls. In many cases, these firewalls are managed by hyper scalars such as AWS, Microsoft Azure, or Google Cloud, who provide the foundational infrastructure.</P><P>However, it’s important to recognise that responsibility for security is shared. There’s a fine line between what the hyper scaler secures and what platform providers, like SAP BTP or Microsoft Power Platform, are responsible for. Most organisations today operate across multiple platforms, each with its own security model, tools, and SLAs, which can lead to gaps in the overall defence posture if not carefully managed.</P><P>It’s also a reminder of the real-world consequences of cybersecurity failures. When breaches occur, especially those involving customer data, organisations face not just supply chain or reputational damage, but significant financial penalties under regulations like GDPR. We’ve seen this play out repeatedly, including with major social media companies in recent years.</P><P>These all point to the importance of a well-coordinated, multi-layered security approach. It’s got to be holistic and span infrastructure, platforms, and application layers, with clear roles and responsibilities.</P><H2 id="toc-hId-1535841699">How secure is SAP BTP out of the box, and what are the most common gaps you see in customer configurations?</H2><P>So, that’s the approach, but how is this carried out? The&nbsp;<A href="https://bluestonex.com/knowledge-bank/the-ultimate-guide-to-sap-btp/" target="_blank" rel="noopener nofollow noreferrer">Business Technology Platform</A>&nbsp;is designed with security and governance in mind across multiple layers. Out of the box, SAP BTP offers:</P><UL><LI><STRONG>Built</STRONG><STRONG>‑</STRONG><STRONG>in Identity &amp; Access Management (IAM) &amp; Network Security:</STRONG>&nbsp;Native support for Single Sign On(SSO) /Multi-Factor Authentication (MFA), Role Based Access Control(RBAC), and the SAP Authorisation Management service. Only authorised users and roles can access each sub-account or application.</LI><LI><STRONG>Encryption &amp; Transport Security:</STRONG>&nbsp;All user traffic is TLS-encrypted&nbsp;, and SAP exclusively establishes encrypted communication channels by default.</LI><LI><STRONG>Monitoring &amp; Audit:</STRONG>&nbsp;SAP BTP automatically logs admin and user activities. The Cloud Foundry&nbsp;<EM>Audit Log Viewer</EM>&nbsp;service lets you review all operations (applications created, users added, etc.), and connect these logs as desired.</LI><LI><STRONG>Secure Development Tools:</STRONG>&nbsp;SAP’s Cloud Application Programming Model (CAP) and other frameworks include built-in security guards (XSRF tokens, JWT checks, etc.), plus tools like the SAP Code Vulnerability Analyser (CVA) that statically scan ABAP code on SAP BTP before deployment.</LI></UL><P>However, despite this strong foundation, we often see gaps in how customers configure their environments. The most common issues include:</P><UL><LI><STRONG>Bypassing SAP BTP Connectivity Guidelines</STRONG>
Customers sometimes integrate third-party APIs or services directly, without using the secure connectivity mechanisms provided by SAP BTP. This can create vulnerabilities and reduce visibility over traffic flows.</LI><LI><STRONG>Improper Credential Management</STRONG>
Instead of using SAP BTP’s built-in credential stores, credentials are sometimes hardcoded or stored in less secure ways, leaving applications open to compromise.</LI><LI><STRONG>Neglecting Secure App Design Principles</STRONG>
Applications are not always developed using the security best practices. This can lead to poor access controls, exposure to common vulnerabilities, or lack of proper authorisation checks.</LI></UL><P>While SAP BTP provides a secure foundation, maintaining a strong security posture requires careful configuration and adherence to recommended best practices, particularly when it comes to connectivity, credential management, and application architecture.</P><H2 id="toc-hId-1339328194">How to prevent similar attacks when running business-critical workloads on SAP BTP?</H2><P>To safeguard business-critical workloads on SAP BTP, a few key practices should be followed:</P><UL><LI><STRONG>Use SAP Services for All Integrations:</STRONG>&nbsp;Ensure every integration and API call goes through SAP’s connectivity and security layers. Use the SAP Destination Service, API Management, and the Cloud Connector/Connectivity Service, rather than hard‑coding endpoints. This way, TLS is enforced and flows are logged and constrained. (Think of&nbsp;<A href="https://bluestonex.com/service/sap-btp-partner-managed-cloud/" target="_self" rel="nofollow noopener noreferrer">SAP BTP services</A>&nbsp;like a secure gateway that you should not bypass.)</LI><LI><STRONG>Enforce Multi-Factor Authentication Everywhere:</STRONG>&nbsp;Require MFA for all user logins – not just admins. SAP Cloud Identity Service (or your corporate IdP) can enforce MFA policies on every SAP BTP access. SAP’s TechEd guide even walks through configuring MFA for SAP BTP apps. This means stolen passwords alone won’t give attackers an easy in.</LI><LI><STRONG>Harden IAM and Accounts:</STRONG>&nbsp;Follow the principle of least privilege. Regularly audit user roles and prune any unused or generic accounts. Disable any unused features like self-registration or social sign-on. Use roles and groups in your Identity Provider (IdP) to ensure people only get the permissions needed for their job.</LI><LI><STRONG>Monitor and Respond to Logs:</STRONG>&nbsp;Subscribing to the SAP Audit Log Viewer (for Cloud Foundry (CF)) is critical. Review logs periodically for anomalies (e.g. logins from new locations, sudden privilege grants). Configure alerts or integrate these logs into your Security Information &amp; Event Management(SIEM). Quick detection can stop an incident in its tracks.</LI></UL><P>Even doing just these steps drastically cuts risk. In effect,&nbsp;<STRONG>you’re closing the ‘side doors’</STRONG>: every inbound or outbound connection is tracked by SAP, every user action is logged, and strong authentication blocks the common tricks that took down those retailers.</P><H2 id="toc-hId-1142814689">What role does identity and access management play in defending against modern cyber threats in SAP environments?</H2><P>Identity and Access Management (IAM) is the keystone of SAP BTP security. SAP BTP supports a full identity lifecycle and fine-grained authorisation model:</P><UL><LI><STRONG>Role-Based Access Control (RBAC):</STRONG>&nbsp;You define roles or role collections in your SAP BTP sub-accounts (and business roles in the ABAP environment) that grant only needed permissions. Then you assign these roles to users/groups. This enforces&nbsp;<EM>least privilege</EM>, so even if a user’s credentials are compromised, the attacker’s access is limited.</LI><LI><STRONG>Trusted Identity Providers:</STRONG>&nbsp;BTP can federate with SAP Cloud Identity (Identity Authentication Service) or any SAML/OAuth IdP. Once trust is set up, employees authenticate with corporate credentials (with MFA, if you’ve enforced it). This ensures a single point of control over user accounts and policies. IAM integrates with identity providers and defines roles and permissions to secure applications and data.</LI><LI><STRONG>Principal Propagation:</STRONG>&nbsp;When a user calls between SAP systems (for example, a CF app calling an ABAP endpoint), their identity and roles “travel” with the request. This maintains security boundaries across services.</LI></UL><P>IAM practices help organisations enforce strict access boundaries, maintain compliance, and defend against unauthorised access—whether from external attackers or internal misconfigurations.</P><H2 id="toc-hId-946301184"><STRONG>How can organisations balance innovation on SAP BTP with the need for robust security and compliance?</STRONG></H2><P>Innovation and security are not opposing forces—they must evolve together. As applications built on SAP BTP grow in complexity, the security measures surrounding them must also mature. The more advanced and interconnected your solutions become, the greater the need for enhanced controls, monitoring, and governance.</P><P>Organisations that fail to innovate risk becoming obsolete. But equally, those that innovate without embedding strong security and compliance practices expose themselves to serious vulnerabilities. Every new capability, integration, or user touchpoint introduces potential risks that must be addressed as part of the innovation lifecycle.</P><P>Training is also key. Ensure developers and admins know SAP BTP best practices. Ignorance may be bliss, but it also breeds vulnerabilities, since human error is often the weakest link. If all personal interacting with the platform are aware of the threats, they can help mitigate them but also spot them. Make security part of your culture and process – every innovation needs to come with corresponding security guardrails.</P><P><STRONG>Sustainable innovation on SAP BTP requires a security-first mindset—where governance, compliance, and threat prevention are integrated into every phase of development and deployment.</STRONG></P><H2 id="toc-hId-749787679">Securing your innovation on SAP BTP</H2><P>The recent cyber-attacks serve as a stark reminder that even the most well-defended systems are not immune to evolving and opportunistic threats. For organisations leveraging SAP BTP to drive innovation, the message is clear: security must be treated as a continuous discipline, not a one-time checklist.</P><P>While SAP BTP provides a strong out-of-the-box security framework, real resilience comes from how that framework is implemented, monitored, and adapted. From enforcing secure connectivity and managing access intelligently, to following coding best practices and monitoring audit logs—every detail matters.</P><P>To conclude, the balance between innovation and security is not a compromise; it’s a partnership. With the right governance, identity management, and adherence to best practices, organisations can confidently build and scale on SAP BTP—without sacrificing trust, compliance, or control.</P><P>Please feel free to share your experiences and thoughts on the similar approaches you might have taken securing your applications on SAP BTP in the comments section.</P> 2025-06-13T16:10:20.147000+02:00 https://community.sap.com/t5/financial-management-blog-posts-by-sap/what-s-new-in-sap-cloud-identity-access-governance-q2-2025/ba-p/14147771 What’s New in SAP Cloud Identity Access Governance: Q2 2025 2025-07-08T23:52:00.006000+02:00 ElyasAhmed https://community.sap.com/t5/user/viewprofilepage/user-id/1886529 <P>Welcome to the Q2&nbsp;2025 release highlights for <A href="https://www.sap.com/products/financial-management/cloud-iam.html" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Access Governance</A> (IAG), where we unveil the new features designed to enhance security, streamline access governance, and empower your teams. <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e739622ded9b4d92964c6a0f50b5f90e/513aadc0379642feb989a4a9480da00f.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">This quarter’s release</A> brings refined role-based risk controls, seamless system integrations, and powerful in-app analysis tools designed to keep your security posture both robust and agile. Whether you’re aiming to automate provisioning tasks or tighten privileged-access reviews, these updates deliver practical improvements you can implement today. Dive into the details below to see how each enhancement makes your day-to-day access governance faster, smarter, and more reliable.</P><P><STRONG>Mitigation Control Assignment to Business Roles</STRONG></P><P>Mitigation controls can now be assigned directly to Business Roles through the <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/2cb258274e40490988a23df89883a647.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Business Role UI</A> or the Mitigation Assignment application, which includes a new Business Roles–specific category. All assignments are recorded in the audit log, and risk assessments for Business Roles inherit any access-level mitigations.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_0-1752011080802.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/284329i7B49669A65E8C7A7/image-size/large?v=v2&amp;px=999" role="button" title="ElyasAhmed_0-1752011080802.png" alt="ElyasAhmed_0-1752011080802.png" /></span></P><P>&nbsp;</P><P><STRONG>Secure Storage of Reports on a Customer-Owned Document Server</STRONG></P><P>Analyze User Access downloads can now be directed straight to your organization’s <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/5cd1a3b708c74efbbb047622540202b1.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Document Management Service (DMS)</A>. Each report is stored in accordance with your retention and classification policies, removing the need for manual file handling and keeping sensitive data securely within your content repository. Keep an eye on the <A href="https://roadmaps.sap.com/board?PRODUCT=73555000100800000334&amp;range=CURRENT-LAST#Q3%202025" target="_blank" rel="noopener noreferrer">roadmap</A> as this feature will be extended to include other report types in future releases.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_1-1752011080815.png" style="width: 931px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/284330i52BEE6D5A91F8E54/image-dimensions/931x600?v=v2" width="931" height="600" role="button" title="ElyasAhmed_1-1752011080815.png" alt="ElyasAhmed_1-1752011080815.png" /></span></P><P>&nbsp;</P><P><STRONG>Enhanced Access Analysis App</STRONG></P><P>The <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/9621f10c676c497a8355b7e36053e837/33373ebe82a84bfb9c34d037f9f0667d.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Access Analysis detail view</A> now includes a built-in smart filter bar for both Access and Risk lists, letting you search, sort, and filter your dataset without ever leaving the interface. This one-pane experience replaces spreadsheet workarounds and speeds up investigations by keeping all controls at your fingertips.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_0-1752186737063.png" style="width: 1006px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/285291i9B252C95D031CF0A/image-dimensions/1006x561?v=v2" width="1006" height="561" role="button" title="ElyasAhmed_0-1752186737063.png" alt="ElyasAhmed_0-1752186737063.png" /></span></P><P>&nbsp;</P><P><STRONG>Ariba Integration</STRONG></P><P>Additional Ariba user attributes stored in IdDS are automatically provisioned to newly created <A href="https://help.sap.com/docs/buying-invoicing/common-data-import-and-administration-for-sap-ariba-procurement-solutions/sap-ariba-solutions-integration-with-sap-cloud-identity-access-governance-ad9fbd99ee1a49038ee9e767d9511ba1?version=2505" target="_blank" rel="noopener noreferrer">Ariba accounts</A>. This capability is available in both standalone Cloud Identity Access Governance and SAP Access Control via Bridge integration for IdDS customers. By sourcing attributes directly from the central IdDS, it eliminates manual updates in Ariba and ensures provisioning remains compliant with corporate standards across systems.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_3-1752011080835.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/284331i79B43BD9C6263414/image-size/large?v=v2&amp;px=999" role="button" title="ElyasAhmed_3-1752011080835.png" alt="ElyasAhmed_3-1752011080835.png" /></span></P><P>&nbsp;</P><P><STRONG>Updated Rulesets for Concur &amp; BTP Financial Applications</STRONG></P><P>This release adds new segregation-of-duties rulesets for Concur (Expense, Invoice, Request), SAP S/4HANA and SuccessFactors core transactions, and BTP’s advanced financial-closing processes, so you can detect and manage cross-system risks with greater precision and enforce compliance consistently across your finance and HR applications.</P><P><STRONG>Forward Privileged Access Review Requests</STRONG></P><P>The <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/37bacb728d75468c92b1f1e20d5afbe2/cee1cb62728f469bb027ec60a543f499.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">forward functionality</A> in the Privileged Access Monitoring Report enables PAM administrators to efficiently reassign log-review requests to additional reviewers without altering the current workflow stage. This feature enhances resource flexibility by allowing easy redistribution of reviewer responsibilities while maintaining the integrity of existing review processes.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_4-1752011080846.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/284332i5703AECB7969D671/image-size/large?v=v2&amp;px=999" role="button" title="ElyasAhmed_4-1752011080846.png" alt="ElyasAhmed_4-1752011080846.png" /></span></P><P>&nbsp;</P><P><STRONG>Looking Ahead!</STRONG></P><P>With Q2 2025’s release, SAP Cloud Identity Access Governance continues its march toward more intuitive, integrated, and audit-ready access management. These updates deliver targeted improvements that reduce administrative overhead and bolster compliance. Stay tuned for even more innovations next quarter as we refine workflows and expand capabilities based on your feedback.</P><P>For more information, to view detailed feature lists, or to get started with SAP Cloud Identity Access Governance, please visit SAP Cloud Identity Access Governance&nbsp;<A href="https://www.sap.com/products/financial-management/cloud-iam.html?video=2805c5b3-e57d-0010-bca6-c68f7e60039b" target="_blank" rel="noopener noreferrer">Product Page</A>&nbsp;and&nbsp;<A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE" target="_blank" rel="noopener noreferrer">Documentation</A>.</P> 2025-07-08T23:52:00.006000+02:00 https://community.sap.com/t5/technology-blog-posts-by-members/what-s-next-for-sap-access-control-12-0/ba-p/14171491 What’s Next for SAP Access Control 12.0? 2025-08-11T12:09:08.939000+02:00 santhosha_dasari https://community.sap.com/t5/user/viewprofilepage/user-id/750626 <P><STRONG><EM>What’s Next for SAP Access Control 12.0? </EM></STRONG>This is one of the common questions to most of the Organizations, Leaders, IT Directors, Managers, SMEs, Consultants and Vendors who are currently using IAM solution - SAP Access Control 12.0 on any Data Base (Non-HANA DB or HANA DB).</P><P>First let’s explore the possible applicable scenarios of the Organizations who are using SAP GRC Access Control 12.0 solution.</P><OL><LI><STRONG>Hub Model on HANA DB: </STRONG>SAP GRC Access Control 12.0 on standalone SAP NetWeaver system on HANA Database, connected side-by-side with SAP S/4HANA, ECC, ECP, SuccessFactors or other ABAP systems.</LI><LI><STRONG>Hub Model on Non-HANA DB: </STRONG>SAP GRC Access Control 12.0 on standalone SAP NetWeaver system on Oracle, MYSQL or another non-HANA database and connected side-by-side with SAP S/4HANA, ECC, SAP ECP, SuccessFactors or other ABAP systems.</LI><LI><STRONG>Embedded Model on HANA DB: </STRONG>SAP GRC Access Control 12.0 installed on business systems (SAP S/4HANA or SAP ECC etc.) running on HANA database.</LI><LI><STRONG>Embedded Model on Non-HANA DB: </STRONG>Embedded Model - SAP GRC Access Control 12.0 installed on business systems (SAP ECC, etc.) running on a non-HANA database.</LI></OL><P>As SAP continues its strategic pivot toward cloud-first solutions, many Organizations using&nbsp;<STRONG>On-Prem SAP Access Control</STRONG>&nbsp;are asking:&nbsp;<EM>What’s next?</EM>&nbsp;With SAP Access Control 12.0 nearing the end of its innovation cycle and the emergence of new GRC platforms, it’s time to evaluate the future roadmap and available options.</P><P>SAP has announced that it will&nbsp;<STRONG>sunset innovation for GRC 12.0</STRONG>, however SAP Access Control and GRC solutions for SAP are NOT end-of-life! SAP is actively developing a&nbsp;<STRONG>next-generation GRC platform</STRONG>:&nbsp;<STRONG>SAP GRC Edition for SAP HANA</STRONG>, expected in&nbsp;<STRONG>Q1 2026</STRONG>. Along with SAP also has cloud-based product called <STRONG>SAP Cloud Identity Access Governance (IAG).</STRONG></P><P>Also, the existing SAP Access Control 12.0 mainstream support ends by 2027 and extended support ends by 2030.</P><P>For more information, refer to <A href="https://userapps.support.sap.com/sap/support/pam" target="_blank" rel="noopener noreferrer">SAP Product Availability Matrix </A></P><P>For compatibility of SAP Access Control 12.0 with all the target on-premise SAP Applications, please refer to KBA: <A href="https://me.sap.com/notes/1352498" target="_blank" rel="noopener noreferrer">1352498 - Support Pack Numbering - GRC Access Control</A></P><P>Now let’s explore the possible upgrade/migrate/future roadmap options in SAP for existing Organizations who are using SAP Access Control 12.0 solution.</P><H2 id="toc-hId-1736853860">Option 1: Upgrade to SAP GRC for HANA 2026</H2><P>SAP GRC for HANA 2026 is a new version (not a new product) for any SAP GRC on HANA Organizations. This 2026 release is planned for both on-premises and private cloud deployments. Organizations wanting to stay on-prem or private cloud with long-term GRC needs and have existing /future needs of other SAP GRC modules like SAP Process Control or SAP Risk Management can upgrade to this.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="santhosha_dasari_0-1754360922146.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/296284iB7BD1F61E1CA97A4/image-size/large?v=v2&amp;px=999" role="button" title="santhosha_dasari_0-1754360922146.png" alt="santhosha_dasari_0-1754360922146.png" /></span></P><P><FONT size="2">Image Source: SAP</FONT></P><P>For more information, refer to</P><OL><LI><A href="https://help.sap.com/doc/9edb299a36224c6b8f7593287a37dd41/12.0.25/en-US/SAP%20GRC%20FOR%20HANA,%202026%20_PAM.pdf" target="_blank" rel="noopener noreferrer">SAP GRC FOR HANA, 2026* (*current working title)</A></LI><LI><A href="https://community.sap.com/t5/financial-management-blog-posts-by-sap/understanding-sap-s-product-strategy-for-governance-risk-and-compliance-grc/ba-p/14053197" target="_blank"><STRONG>Understanding SAP’s Product Strategy for Governance, Risk, and Compliance (GRC) Solutions</STRONG></A></LI></OL><P>SAP GRC for HANA 2026 requires below 2 prerequisites</P><UL><LI>SAP NetWeaver should be minimum SAP S/4HANA Foundation. S/4HANA Foundation is just an upgraded version for SAP NetWeaver. This is not SAP S/4HANA full version. Organizations who are using SAP Fiori 2.0 would have already migrated their SAP NetWeaver to SAP S/4HANA Foundation. Incase if you are having lower version of GRC Support pack or still on Fiori 1.0 or using SAP NetWeaver as a base component for SAP GRC, then this is a mandatory step.&nbsp; In case for an Embedded GRC model, SAP GRC for HANA 2026 can be installed on S4Core.</LI><LI>Databased as HANA DB: As HANA 2026 only supports SAP HANA DB, Organizations are forced to migrate their Non-HANA Database to HANA DB.</LI></UL><P><EM>Organizations can choose the “Hub Model” or “Embedded Model” for their SAP GRC for HANA 2026 upgrade/migration. &nbsp;In case if an existing Hub Model setup customer wants to move to Embedded model, it is like a new implementation of SAP GRC for HANA 2026 but can reuse existing GRC design.&nbsp; </EM><EM>&nbsp;</EM></P><P><STRONG>How to Migrate to SAP GRC for HANA 2026 from SAP GRC Access Control 12.0?</STRONG></P><P>Once the above prerequisites are complete, SAP Access Control 12.0 can be upgraded to SAP GRC for HANA 2026 release as part of their standard maintenance program, meaning no new SKU or additional purchase is required.</P><P>End-of-maintenance (EOM) dates for the 2026 version will be updated to align with HANA EOM dates, extending support until 2040.</P><H2 id="toc-hId-1540340355">Option 2: Migrate to SAP Cloud Identity Access Governance (IAG) – Standard Edition</H2><P>SAP Cloud Identity Access Governance (IAG), a cloud-based solution designed to manage and govern user access across SAP and non-SAP systems. It's part of SAP’s broader GRC (Governance, Risk, and Compliance) strategy and is hosted on the SAP Business Technology Platform (BTP). It can be considered as cloud Access Control in layman terms. It is best for Cloud-first organizations or those adopting SAP S/4HANA Cloud.</P><P>This is ideal for the customer who are looking for a standalone cloud governance solution with full lifecycle capabilities.</P><P><EM>In case if an existing SAP GRC Access Control 12.0 customer wants to move to Cloud IAG solution, it is like a new implementation of SAP Cloud IAG with reference to existing GRC design. </EM></P><UL><LI><EM>With SAP Cloud IAG Standard Edition, customer can integrate to Cloud system like SAP S/4HANA Public cloud, SAP SuccessFactors, SAP Ariba etc. </EM></LI><LI><EM>With Cloud Connector, custom can integrate to On-Prem system like SAP S/4HANA (On-Prem), SAP ECC and other On-Prem systems.</EM></LI></UL><P>Similar Access Control features, SAP Cloud IAG offers below features:</P><UL><LI><STRONG>Access Analysis</STRONG>: Real-time insights into user access to detect violations and risks. This is like Access Risk Analysis (ARA).</LI><LI><STRONG>Role Design</STRONG>: Create and optimize business roles for cloud and on-premises systems. This is like Business Role Management (BRM)</LI><LI><STRONG>Access Request</STRONG>: Self-service access provisioning for users across systems. This is like Access Request Management (ARM).</LI><LI><STRONG>Access Certification</STRONG>: Periodic reviews and certifications of user access. This is like User Access Review (UAR) or other certifications reviews.</LI><LI><STRONG>Privileged Access Management</STRONG>: Emergency access handling and monitoring for sensitive operations. This is like Emergency Access Management (EAM).</LI></UL><P><EM>Will be creating a new blog on “SAP </EM>Cloud Identity Access Governance (IAG) with different options, Pros and Cons, possible options<EM>”, stay tuned for this.</EM></P><H2 id="toc-hId-1343826850">Option 3: Stay on SAP Access Control 12.0 (Short-Term)</H2><P>Staying on SAP Access Control 12.0 isn’t a long-term strategy, but it’s a valid short-term option for organizations that need more time to prepare. &nbsp;As SAP prepares to sunset support for Access Control 12.0 by December 31, 2027 (extended support runs until 2030), many Organizations are evaluating their next move. While cloud-first strategies and the upcoming SAP GRC Edition for HANA (2026) are gaining momentum, some organizations may choose to stay on Access Control 12.0—at least for now so Organizations can get more time for budgeting, complex landscape planning, or team training.</P><P>For organizations with complex landscapes, regulatory constraints, or budgetary limitations, staying on Access Control 12.0 offers a stable, compliant, and familiar environment while they prepare for the future. Meanwhile, Organizations can prepare internal teams for the shift to SAP GRC for HANA or SAP Cloud IAG.</P><P><EM>In case if an existing SAP GRC Access Control 12.0 customer wants to connect to Cloud systems using Access Control 12.0, SAP Cloud IAG – Integration Edition can be used,</EM></P><UL><LI><STRONG>SAP Cloud IAG – Integration Edition</STRONG> is a specialized deployment model designed to <STRONG>extend SAP Access Control (on-premise)</STRONG> to manage access governance for <STRONG>cloud applications</STRONG> also like SAP S/4HANA Cloud, Ariba, SAP SuccessFactors etc.</LI><LI>It uses the <STRONG>IAG Bridge</STRONG> to connect your existing Access Control system to SAP Cloud IAG, enabling centralized governance across hybrid landscapes.</LI><LI>Like SAP Cloud IAG standard edition, SAP Cloud IAG Integration offers Access Control features, however this has limited features than Standard Edition. For example, PAM and Access Certification features are available with Integration Edition. Use IAG Bridge now, then migrate to unified GRC 2026 platform for future-proofing.</LI></UL><TABLE><TBODY><TR><TD width="28"><P>#</P></TD><TD width="187"><P><STRONG>Scenario</STRONG></P></TD><TD width="133"><P><STRONG>Recommended Solution</STRONG></P></TD><TD width="253"><P><STRONG>Why It Works </STRONG></P></TD></TR><TR><TD width="28"><P>1</P></TD><TD width="187"><P>Long-term on-prem/private-cloud GRC modernization</P></TD><TD width="133"><P>SAP GRC for HANA 2026</P></TD><TD width="253"><P>Unified, AI-powered platform; support to 2040</P></TD></TR><TR><TD width="28"><P>2</P></TD><TD width="187"><P>Cloud-first strategy (SAP RISE, SuccessFactors, Ariba, etc.)</P></TD><TD width="133"><P>SAP Cloud IAG – Standard Edition</P></TD><TD width="253"><P>End-to-end cloud governance with full lifecycle capabilities</P></TD></TR><TR><TD width="28"><P>3</P></TD><TD width="187"><P>Using SAP Access Control 12.0. Hybrid landscape with both cloud and on-premises systems</P></TD><TD width="133"><P>Short-term: IAG Integration Edition<BR />Long-term: GRC for HANA 2026</P></TD><TD width="253"><P>Leverage current investment, add cloud governance, buy time</P></TD></TR></TBODY></TABLE><H2 id="toc-hId-1147313345">Summary</H2><UL><LI><STRONG>Option 1: Upgrade to SAP GRC for HANA 2026</STRONG><BR />Ideal for on-premise or private-cloud customers using multiple GRC modules. Also with complex landscape, heavy customization and workflows. Provides a unified, AI-powered platform on SAP HANA with support extended to 2040.</LI><LI><STRONG>Option 2: Migrate to SAP Cloud Identity Access Governance (IAG)</STRONG><BR />Suits cloud-first organizations on RISE, S/4HANA Cloud, SuccessFactors, Ariba, or other BTP scenarios. Delivers full lifecycle access governance across SAP and non-SAP systems.</LI><LI><STRONG>Option 3: Stay on SAP Access Control 12.0 (Short-Term)</STRONG><BR />Gives organizations extra time for budgeting, complex landscape planning, and team training. Pair Access Control 12.0 with IAG Integration Edition and the IAG Bridge for hybrid visibility.</LI></UL><H2 id="toc-hId-950799840">Conclusion</H2><P>Choosing the right path from SAP Access Control 12.0 depends on your organization’s strategy, timeline, and risk profile. If you’re committed to on-premise GRC and need long-term stability, upgrading to GRC for HANA 2026 keeps you covered through 2040. For those accelerating cloud adoption, migrating to SAP Cloud IAG delivers a scalable, unified governance experience with less customization options than on-premise. And if you need breathing room to prepare, extending Access Control 12.0 in the short term—combined with IAG Integration—offers continuity without sacrificing compliance.</P><P>Whichever route you take, start by mapping your current landscape, aligning stakeholders on priorities, and building a clear project roadmap. Weigh the long-term benefits against immediate constraints to make an informed decision that drives both security and innovation.</P><P>What option works best for your organization? Tell us your GRC challenge in the comments. Like this post if it helped and subscribe for more SAP GRC blogs, news, tips!</P><P><a href="https://community.sap.com/t5/c-khhcw49343/SAP+Access+Control/pd-p/01200615320800000796" class="lia-product-mention" data-product="380-1">SAP Access Control</a>&nbsp;<a href="https://community.sap.com/t5/c-khhcw49343/SAP+Access+Control+for+SAP+S%25252F4HANA/pd-p/73554900100800000773" class="lia-product-mention" data-product="381-1">SAP Access Control for SAP S/4HANA</a>&nbsp; <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Cloud+Identity+Access+Governance/pd-p/73555000100800000334" class="lia-product-mention" data-product="480-1">SAP Cloud Identity Access Governance</a>&nbsp;</P> 2025-08-11T12:09:08.939000+02:00 https://community.sap.com/t5/financial-management-blog-posts-by-sap/sap-cloud-identity-access-governance-2506-adoption-campaign-series-a/ba-p/14184275 SAP Cloud Identity Access Governance: 2506 Adoption Campaign Series – A Reflective Recap 2025-08-19T18:48:08.208000+02:00 ElyasAhmed https://community.sap.com/t5/user/viewprofilepage/user-id/1886529 <P>Over the past few weeks, we have had the pleasure of connecting with customers through our <STRONG>SAP Cloud Identity Access Governance (IAG) Adoption Campaign Series</STRONG>. These sessions brought together our community to share best practices, explore new capabilities, and maximize the value of IAG in enabling secure, compliant, and efficient access governance.</P><P><STRONG>A Look Back at the Series</STRONG></P><P>Throughout the campaign, we hosted targeted feature adoption sessions and deep dives, designed to equip participants with both strategic insights and practical know-how. These weren’t just presentations; they were conversations, enriched by your questions, feedback, and shared experiences.</P><P>Your engagement helped shape the discussions and even influenced future considerations for enhancements, reinforcing the collaborative nature of ourSAP Cloud Identity Access Governance community.</P><P><STRONG>Introduction &amp; Solution Overview (6/18/2025)</STRONG></P><P>We began with a foundational overview of why identity governance remains a critical pillar for today’s enterprises. The session explored SAP Cloud Identity Access Governance’s role in streamlining access management, reducing risk, and supporting compliance through design, automated workflows, and actionable insights.<BR />We showcased a live demo, walked through key workflows, and shared real-world examples of how organizations are using SAP Cloud Identity Access Governance to boost efficiency and security.</P><P><STRONG>Feature Set Adoption: Access Analysis (7/2/2025)</STRONG></P><P>This session highlighted how Access Analysis delivers deep visibility into user permissions, revealing hidden risks and unusual access patterns. Attendees learned how data-driven analysis strengthens risk assessments and guides remediation strategies.<BR />The discussion emphasized how improved visibility leads to proactive governance, allowing organizations to act before risks become incidents.</P><P><STRONG>Feature Set Adoption: Privileged Access Management (7/9/2025)</STRONG></P><P>We explored the importance of centralizing privileged account management to minimize insider threats and maintain compliance. The session demonstrated howSAP Cloud Identity Access Governance unifies privileged access controls without adding complexity, increasing transparency, and enhancing governance over sensitive permissions.</P><P><STRONG>Feature Set Adoption: Access Request (7/16/2025)</STRONG></P><P>This session focused on streamlining approval workflows through Access Request. Attendees saw how automation eliminates bottlenecks, accelerates access provisioning, and boosts productivity while ensuring compliance.<BR />We discussed how efficient request handling directly impacts operational agility and user satisfaction.</P><P><STRONG>Feature Set Adoption: User Certification (7/23/2025)</STRONG></P><P>We examined the importance of User Certification campaigns in maintaining governance, ensuring audit readiness, and building trust within the organization. The session demonstrated how IAG automates and simplifies these campaigns, cutting down on manual effort.</P><P><STRONG>Feature Set Adoption: Business Role Management (7/30/2025)</STRONG></P><P>This session provided best practices for creating and managing business roles that align with organizational needs while reducing permission sprawl. We showcased how IAG’s role-based approach supports scalability and enforces least-privilege principles as the organization evolves.</P><P><STRONG>Integration: Access Control &amp; CIAG Integration (8/6/2025)</STRONG></P><P>We concluded with a deep dive into hybrid governance strategies, demonstrating how SAP Access Control andSAP Cloud Identity Access Governance can work together for consistent policy enforcement across cloud and on-premise environments. The session covered data synchronization, risk sharing, and role management in integrated scenarios, offering a low-disruption pathway to cloud adoption.</P><P><STRONG>Resources</STRONG></P><P>Here are key resources to help you continue exploring and optimizing SAP Cloud Identity Access Governance:</P><UL><LI><STRONG><A href="https://me.sap.com/notes/0003645673" target="_self" rel="noopener noreferrer">KBA</A>: Complete Q&amp;A from the Adoption Campaign Series</STRONG></LI><LI><A href="https://influence.sap.com/sap/ino/#/campaign/1739" target="_self" rel="noopener noreferrer"><STRONG>Influence Channel</STRONG></A> – Submit enhancement ideas and vote on requests from the SAP community</LI><LI><A href="https://www.sap.com/products/financial-management/cloud-iam.html" target="_self" rel="noopener noreferrer"><STRONG>SAP Cloud Identity Access Governance Product Page</STRONG></A>&nbsp;-&nbsp;High-level overview with features, benefits, pricing, customer stories, and more.</LI><LI><A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE" target="_self" rel="noopener noreferrer"><STRONG>SAP Cloud Identity Access Governance Documentation</STRONG></A>&nbsp;- Detailed guides on modules, integrations, setup, new updates,&nbsp;and more.</LI></UL><P><STRONG>Thank You for Joining Us</STRONG></P><P>We are incredibly grateful to every attendee who participated in this campaign. Your insights and questions were invaluable in making the sessions rich, interactive, and directly relevant to real-world challenges.</P><P>This campaign reaffirmed the power of our user community, not just as consumers of technology but as active contributors to shaping its evolution. We look forward to continuing this journey together with more sessions, resources, and opportunities to connect.</P> 2025-08-19T18:48:08.208000+02:00 https://community.sap.com/t5/crm-and-cx-blog-posts-by-sap/introducing-scim-api-for-sap-sales-amp-service-cloud-v2-seamless-user-sync/ba-p/14200658 🚀 Introducing SCIM API for SAP Sales & Service Cloud v2: Seamless User Sync between Source & Target 2025-08-30T10:53:18.129000+02:00 Yogananda https://community.sap.com/t5/user/viewprofilepage/user-id/75 <P>&nbsp;</P><TABLE border="1" width="100%"><TBODY><TR><TD width="100%"><FONT color="#FF0000">Note</FONT> :&nbsp;<STRONG>Please note that the SCIM feature is in General Availability.</STRONG><SPAN>&nbsp;<BR /><A href="https://api.sap.com/package/SAPSalesServiceCloudV2/rest" target="_blank" rel="noopener noreferrer">https://api.sap.com/package/SAPSalesServiceCloudV2/rest</A>&nbsp;<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-09-29_10-46-03.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/321042iDC4C2E49F38904F1/image-size/large?v=v2&amp;px=999" role="button" title="2025-09-29_10-46-03.png" alt="2025-09-29_10-46-03.png" /></span><BR /></SPAN></TD></TR></TBODY></TABLE><P><STRONG>SAP Sales &amp; Service Cloud v2</STRONG> now supports&nbsp;SCIM (System for Cross-domain Identity Management)&nbsp;APIs, enabling seamless and secure user provisioning from&nbsp;<STRONG>SAP Identity Authentication Service (IAS)</STRONG>&nbsp;or&nbsp;<FONT color="#0000FF">Customer Identity Directory</FONT>&nbsp;via&nbsp;<STRONG>SAP Identity Provisioning Service (IPS).</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Yogananda_0-1756638756679.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/307008iFC5ACCB41E22419F/image-size/large?v=v2&amp;px=999" role="button" title="Yogananda_0-1756638756679.png" alt="Yogananda_0-1756638756679.png" /></span></P><P><STRONG>This integration simplifies identity lifecycle management, ensures compliance, and eliminates manual user creation in the target system (SAP Sales &amp; Service Cloud v2).</STRONG></P><BLOCKQUOTE><P><FONT color="#993366">SCIM API in SAP Sales &amp; Service Cloud v2 is available&nbsp; by default.</FONT></P></BLOCKQUOTE><H2 id="toc-hId-1758990378"><FONT color="#0000FF"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image_2025-07-21_105541907.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/306875i3AFF9A45D26B58A2/image-size/large?v=v2&amp;px=999" role="button" title="image_2025-07-21_105541907.png" alt="image_2025-07-21_105541907.png" /></span></FONT></H2><H2 id="toc-hId-1562476873"><FONT color="#0000FF">SSC v2 SCIM API (Official API Documentation)</FONT></H2><pre class="lia-code-sample language-json"><code>### Tenant Details but you need to pass the tenant id in the URL GET {{SSCv2url}}/scim/v2/Users Content-Type: application/scim+json Authorization: Bearer {{accessToken}} PUT {{SSCv2url}}/scim/v2/Users/&lt;id&gt; Content-Type: application/scim+json Authorization: Bearer {{accessToken}} &lt;payload of the user&gt; PATCH {{SSCv2url}}/scim/v2/Users/&lt;id&gt; Content-Type: application/scim+json Authorization: Bearer {{accessToken}} &lt;payload of the user&gt;</code></pre><H2 id="toc-hId-1365963368"><span class="lia-unicode-emoji" title=":prohibited:">🚫</span><FONT color="#FF0000">Important Notes to keep in mind before enabling: </FONT></H2><H2 id="toc-hId-1169449863"><FONT color="#FF0000">No Manual User Creation Allowed</FONT></H2><P><FONT color="#000000">This ensures that all user data is centrally managed and synchronized, maintaining consistency and reducing the risk of identity mismatches or unauthorized access.</FONT></P><P>Once SCIM-based provisioning is enabled in SAP Sales &amp; Service Cloud V2:</P><BLOCKQUOTE><P><FONT color="#993366">Manual user creation in SAP Sales &amp; Service Cloud v2 is disabled.</FONT></P></BLOCKQUOTE><P><SPAN>When using IPS (SCIM 2.0 based API), only users of type Employee are provisioned. This version introduces an enhanced SCIM API that no longer requires SAP Cloud Integration. It supports patch operations and provisioning of application-specific groups(Business Roles). In addition to pagination using&nbsp;</SPAN>startIndex<SPAN>&nbsp;and&nbsp;</SPAN>count<SPAN>, cursor-based pagination is also supported.</SPAN></P><H2 id="toc-hId-972936358">Why SCIM API Matters</H2><P>SCIM is an open standard designed to automate the exchange of user identity information between identity providers and service providers. With SCIM support in SAP Sales &amp; Service Cloud v2, organizations can:</P><UL><LI>Automatically provision and de-provision users</LI><LI>Sync user attributes and roles</LI><LI>Ensure consistent identity governance</LI><LI>Reduce administrative overhead</LI></UL><H2 id="toc-hId-776422853">Benefits of SCIM Integration</H2><UL><LI>Automated User Lifecycle Management</LI><LI>Improved Security &amp; Compliance</LI><LI>Centralized Identity Governance</LI><LI>Reduced Manual Effort</LI><LI>Scalable for Large Enterprises</LI></UL><H2 id="toc-hId-579909348">Integration Flow:&nbsp; SAP IAS or Microsoft Active Directory to SAP Sales &amp; Service Cloud v2</H2><P>Below is the flow diagram illustrating how users are synced from&nbsp;<STRONG>Microsoft Active Directory or/both SAP Identity Authentication IAS</STRONG> to&nbsp;SAP Sales &amp; Service Cloud v2&nbsp;using&nbsp;IAS&nbsp;and&nbsp;IPS:<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Yogananda_0-1756542686365.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/306873iCA6B0F59ECB2F27D/image-size/large?v=v2&amp;px=999" role="button" title="Yogananda_0-1756542686365.png" alt="Yogananda_0-1756542686365.png" /></span></P><H3 id="toc-hId-512478562">Flow Breakdown:</H3><OL><LI>Microsoft Active Directory (AD): Acts as the source of truth for user identities.</LI><LI>SAP Identity Authentication Service (IAS): Connects to AD via LDAP or Azure AD and serves as the identity provider.</LI><LI>SAP Identity Provisioning Service (IPS): Pulls user data from IAS and pushes it to SAP Sales &amp; Service Cloud v2 using SCIM APIs.</LI><LI>SAP Sales &amp; Service Cloud v2: Receives user data via SCIM and provisions users automatically.</LI></OL><H2 id="toc-hId-186882338"><FONT color="#3366FF"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-09-03_20-07-51.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/308759i2A5759B11D276141/image-size/large?v=v2&amp;px=999" role="button" title="2025-09-03_20-07-51.png" alt="2025-09-03_20-07-51.png" /></span></FONT></H2><H2 id="toc-hId--9631167"><FONT color="#3366FF">Identity Provisioning (IPS) Documentation - Target System&nbsp;</FONT></H2><P><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/target-sap-sales-cloud-and-sap-service-cloud" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/target-sap-sales-cloud-and-sap-service-cloud</A>&nbsp;</P><H2 id="toc-hId-141109685">Final Thoughts</H2><P>The introduction of SCIM API support in SAP Sales &amp; Service Cloud v2 marks a significant step toward modern identity management. By leveraging IAS and IPS, organizations can streamline user provisioning, enhance security, and ensure a consistent user experience across systems.</P><P>&nbsp;</P> 2025-08-30T10:53:18.129000+02:00 https://community.sap.com/t5/technology-blog-posts-by-members/create-and-assign-authorization-policies-in-ias/ba-p/14218457 CREATE AND ASSIGN AUTHORIZATION POLICIES IN IAS 2025-09-17T12:37:51.141000+02:00 ajitchirania88 https://community.sap.com/t5/user/viewprofilepage/user-id/11152 <H3 id="toc-hId-1889233023">Introduction</H3><P>SAP Identity Authentication Services (IAS) provides secure access management for SAP cloud applications. One of the core features in IAS is <STRONG>Authorization Policies</STRONG>, which allow administrators to control access to applications and resources based on defined rules.</P><P>In this blog, we’ll go through the steps to <STRONG>create</STRONG> and <STRONG>assign</STRONG> authorization policies in IAS, ensuring only the right users have the right level of access.</P><HR /><H3 id="toc-hId-1692719518">Why Authorization Policies Matter</H3><UL><LI><P>Control user access based on attributes like group, role, or user ID</P></LI><LI><P>Enforce compliance and security requirements</P></LI><LI><P>Provide flexibility for hybrid or multi-application scenarios</P></LI><LI><P>Simplify administration by centralizing access control in IAS</P></LI></UL><P>Please follow the step by step process to create authorization policies in IAS :</P><P><STRONG>HOW THE IAS SUPER ADMIN CAN CREATE AND ASSIGN AUTHORIZATION POLICIES IN IAS </STRONG></P><OL><LI><STRONG>CREATION OF AUTHORIZATION POLICIES</STRONG></LI></OL><P><SPAN>This document tells you how you can assign the authorization policies or give admin access to Granular level to HR managing their own HR Organization and division. This will help to give granular access to HR admin in IAS by creating the authorization policies in IAS so that they can see only the employees belonging to their organization unit and reset the password for them. </SPAN></P><P><SPAN>We are creating the custom Policies for customers as we have different divisions and organization, and we would like to give access to the HR managers to their respective divisions accordingly.</SPAN></P><P><SPAN>The screen shots below are for your reference from the test system, and you can use the same step for production as well. </SPAN></P><P><SPAN>Prerequisite: You have SUPER ADMIN access to IAS tenants in which you are going to create the authorization policy. </SPAN></P><P><SPAN>IAS Tenants: </SPAN></P><P><SPAN>For Test: <A href="https://XXXXXXX.accounts.ondemand.com/admin/" target="_blank" rel="noopener nofollow noreferrer">https://XXXXXXX.accounts.ondemand.com/admin/</A></SPAN></P><OL><LI><SPAN>Login to the test IAS System:</SPAN></LI></OL><P><SPAN>Give the URL <A href="https://XXXXXXX.accounts.ondemand.com/admin/" target="_blank" rel="noopener nofollow noreferrer">https://XXXXXXX.accounts.ondemand.com/admin/</A> in the browser and the below&nbsp;&nbsp; window will open. </SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_0-1758011179856.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315030i305B53BA54349583/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_0-1758011179856.png" alt="ajitchirania88_0-1758011179856.png" /></span></P><OL><LI><SPAN>Give your Email or Username and password to login to IAS an ADMIN and click on continue. </SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_1-1758011179858.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315031i7EC62659F9DA5971/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_1-1758011179858.png" alt="ajitchirania88_1-1758011179858.png" /></span></P><OL><LI><SPAN>You will see the login screen of IAS as shown below:</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_2-1758011179860.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315028iF252F00186EF08C9/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_2-1758011179860.png" alt="ajitchirania88_2-1758011179860.png" /></span><SPAN>&nbsp;</SPAN></P><OL><LI><SPAN>Not go to the “Application Resources” and click on the tenant settings :</SPAN></LI></OL><P><SPAN>Here , you can go the policy-based authorization and enabled the option in the right context window.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_3-1758011179864.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315033iC51E25FECA31FF2A/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_3-1758011179864.png" alt="ajitchirania88_3-1758011179864.png" /></span></P><OL><LI><SPAN>Now go to the “Application Resources” section and click on the SuccessFactors application.</SPAN>&nbsp;&nbsp;</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_4-1758011179866.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315032i7552290344C60A5C/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_4-1758011179866.png" alt="ajitchirania88_4-1758011179866.png" /></span></P><OL><LI><SPAN>Click on the applications and it will show you the screen below.&nbsp;&nbsp;&nbsp;&nbsp;</SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_5-1758011179872.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315034iB6D080D72B78B358/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_5-1758011179872.png" alt="ajitchirania88_5-1758011179872.png" /></span></LI><LI><SPAN>Go the Administration console as shown below under the System Application. You can see below highlighted one:</SPAN></LI></OL><P><SPAN>&nbsp;</SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_6-1758011179875.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315035iA3F09EBA277CBEBC/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_6-1758011179875.png" alt="ajitchirania88_6-1758011179875.png" /></span></P><OL><LI><SPAN>Now you can see to the right-side pane of the screen with Authorization policies.&nbsp; Click on that and you will see the screen below. </SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_7-1758011179879.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315036i11DDEF71964438FD/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_7-1758011179879.png" alt="ajitchirania88_7-1758011179879.png" /></span></P><OL><LI><SPAN>Click on the create button and give a name for which you want to create a new policy. It will ask for the Policy name and the Base Policies. We have given a name as IMAS_AUT_USER as an example to show and giving access to Read the users and update the users’ details in IAS (Identity Authentication services).</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_8-1758011179884.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315037i38FBB6C6437C09F6/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_8-1758011179884.png" alt="ajitchirania88_8-1758011179884.png" /></span></P><OL><LI><SPAN>Now click on the create button and it will take you to the screen below:</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_10-1758011179889.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315039i1A769A340E3EA9AD/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_10-1758011179889.png" alt="ajitchirania88_10-1758011179889.png" /></span></P><OL><LI><SPAN>Here click on the + sign and it will take you to the screen below where you can choose the user. Division and assign the division according to the employee export file.</SPAN>&nbsp;</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_11-1758011179894.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315040i955C2F8EDF475376/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_11-1758011179894.png" alt="ajitchirania88_11-1758011179894.png" /></span></P><OL><LI><SPAN>Choose for both the restrictions + Sign and choose user. division for both the places because we would like to give admin access to HR to see and update only the users belonging to those division.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_31-1758011838217.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315065i456CAF541C7DC072/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_31-1758011838217.png" alt="ajitchirania88_31-1758011838217.png" /></span></P><P><SPAN>13. Now we need to find the value from the SF export file as attached here to see what the value is coming from the SuccessFactors for the organization/division and use the exact same field value here. </SPAN></P><P><SPAN>PFA.</SPAN></P><P><SPAN>&nbsp;</SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_13-1758011179897.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315041i57673EF92758038E/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_13-1758011179897.png" alt="ajitchirania88_13-1758011179897.png" /></span></P><OL><LI><SPAN>Check the column AS and field name custom06 value and use the same value in the above user.division field. In our case we have set up rules for AUT, so we need to filter column06 from the exported file from SF and search for AUT. We go custom06 value as AUT(AUT). This value needs to be updated in the user. Division value . ( Please note you need to fill this custom06 values from Successfactors to each user in IAS by using the source and target transformation) .</SPAN></LI></OL><P><STRONG><SPAN>Source transformation code :</SPAN></STRONG></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; {</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "sourcePath": "$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']['customFields'][?(@.customFieldName == 'custom06')]['value']",</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "targetPath": "$.custom06",</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "optional": true</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; }</SPAN></P><P><STRONG><SPAN>Target transformation code :</SPAN></STRONG></P><P><SPAN>{</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "sourcePath": "$.custom06",</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "optional": true,</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']"</SPAN></P><P><SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; }</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_14-1758011179902.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315043iDC29A21793393423/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_14-1758011179902.png" alt="ajitchirania88_14-1758011179902.png" /></span></P><OL><LI><SPAN>The same value we need to update in the user. Division field as shown below.</SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_15-1758011179906.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315046i038877F82F9F88F6/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_15-1758011179906.png" alt="ajitchirania88_15-1758011179906.png" /></span></LI><LI>At the end you can add the below authorization as well USE schemas.READ_SCIM_SCHEMAS click on ADD USE and select from the dropdown the authorization as USE schemas.READ_SCIM_SCHEMAS. This is also required READ_SCIM_SCHEMAS&nbsp;authorization policies. Otherwise, you won't be able to see and access the&nbsp;<STRONG>Export Users’</STRONG>&nbsp;title.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_16-1758011179911.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315045iC365F9F8F81165AA/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_16-1758011179911.png" alt="ajitchirania88_16-1758011179911.png" /></span></P><OL><LI><SPAN>Click on confirmation and it will be added.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_17-1758011179914.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315044iF008FC62FC83E92D/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_17-1758011179914.png" alt="ajitchirania88_17-1758011179914.png" /></span></P><OL><LI><SPAN>First click on SAVE and then click on the Assignments tab and add the user you would like to give this &nbsp;&nbsp;authorization.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_18-1758011179918.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315048iE6FE2B1DE678B571/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_18-1758011179918.png" alt="ajitchirania88_18-1758011179918.png" /></span></P><OL><LI><SPAN>Assign/click on ADD to add the users whom you want to give granular authorization. Please note that the user should exist in the IAS User directory. Now I am giving access to one user for example Mohana@gmail.com </SPAN></LI></OL><P><SPAN>&nbsp;</SPAN><SPAN>I can click on add and search the user using the email address and add the user. After that the user is assigned to the new authorization policy and the user can access the employees belongs to AUT organization.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_19-1758011179924.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315049i3AB77F188B638056/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_19-1758011179924.png" alt="ajitchirania88_19-1758011179924.png" /></span></P><P>&nbsp;</P><OL><LI><SPAN>Search for the user whom you want to give access to.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_20-1758011179926.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315047i04C731C218AF1CCA/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_20-1758011179926.png" alt="ajitchirania88_20-1758011179926.png" /></span></P><OL><LI><SPAN>Click on the ADD.&nbsp; The user is added successfully. </SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_21-1758011179928.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315050i8151CACF654DFF05/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_21-1758011179928.png" alt="ajitchirania88_21-1758011179928.png" /></span></P><P><SPAN>The above steps complete the creation of the new Authorization policies and assignment of users. </SPAN></P><P><STRONG><U>HOW TO ASSING AUTHORIZATION TO HR ADMIN/ ANY USERS USING THE EXISTING AUTHORIZATION POLICIES &nbsp;</U></STRONG></P><OL><LI><SPAN>Follow the steps from 1 to 7 and complete the steps as mentioned above. ( The above example shows the process , now you want to assign other users in the same authorization policies)</SPAN></LI><LI><SPAN>Now you are in the authorization policies tab, and you need to click on the filter to easily access the custom packages created and choose the one required for you to be updated. Please note that IMSA_AUT_USER is the test Authorization policy. I have created many authorizations policy for each division, that is why you can see many customer packages but here I am assigning the user to only IMSA_AUT_USER authorization policy. </SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_22-1758011179934.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315051iDFF4254ABFB38A73/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_22-1758011179934.png" alt="ajitchirania88_22-1758011179934.png" /></span></P><OL><LI><SPAN>Click on the filter and choose customer packages.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_23-1758011179940.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315052iC6F02E75A32507E5/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_23-1758011179940.png" alt="ajitchirania88_23-1758011179940.png" /></span></P><OL><LI><SPAN>Click ok to see all the customer packages filtered and you can choose the one required for you. I am choosing the IMSA_AUT_USER and would like to assign one existing user.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_24-1758011179945.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315054i058874EA9ACC3E45/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_24-1758011179945.png" alt="ajitchirania88_24-1758011179945.png" /></span></P><OL><LI><SPAN>Now open the customer authorization policies named IMSA_AUT_USER. You can choose the package as per your requirements. I would like to give access to the below user for the authorization policies IMSA_AUT_USER. </SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_25-1758011179947.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315053i15E1F1AD09AE5E25/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_25-1758011179947.png" alt="ajitchirania88_25-1758011179947.png" /></span></P><OL><LI><SPAN>You must click on the IMSA_AUT_USER authorization policy as shown in the above step. It will show you the screen below. Go to the assignments tab and assign/add the above user.</SPAN></LI></OL><P><SPAN>Click on the ADD and search for the user with username as </SPAN>BHR.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_26-1758011179951.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315055i73F7F1150880FF73/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_26-1758011179951.png" alt="ajitchirania88_26-1758011179951.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ajitchirania88_27-1758011179952.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/315056i73E268F0336750C9/image-size/medium?v=v2&amp;px=400" role="button" title="ajitchirania88_27-1758011179952.png" alt="ajitchirania88_27-1758011179952.png" /></span></P><P><SPAN>Now the user has assigned the authorization policies created by you. You can reset the password for this user in IAS and try to login and you will see that this user will be able to see only a few users who are belonging to the division AUT(AUT).&nbsp; </SPAN></P><P><STRONG><SPAN>Please note :</SPAN></STRONG><SPAN> You must remove the user from Administrator group if it is assigned as an administrator otherwise the Administrator group in IAS under user &amp; Authorizations-&gt;administrator will give more permissions to the administrator. </SPAN></P> 2025-09-17T12:37:51.141000+02:00 https://community.sap.com/t5/human-capital-management-blog-posts-by-members/deprecation-of-api-basic-authentication-amp-configuring-open-id-connect/ba-p/14215998 Deprecation of API Basic Authentication & Configuring Open ID Connect 2025-09-18T13:03:24.954000+02:00 sohaibhassan https://community.sap.com/t5/user/viewprofilepage/user-id/1487759 <P><FONT size="5"><U><STRONG>Understanding OpenID Connect (OIDC) in SuccessFactors with Identity Authentication Service (IAS)</STRONG></U></FONT></P><P class="lia-align-justify" style="text-align : justify;"><SPAN>In SuccessFactors and IAS (Identity Authentication Service), OIDC has replaced the older Basic Authentication model. With Basic Authentication, every API call carried a username and password. It was simple but highly insecure because those credentials could be intercepted or reused indefinitely. OIDC, by contrast, replaces static credentials with short-lived, digitally signed tokens. These tokens, usually in the form of JSON Web Tokens (JWT), are generated by IAS after a proper authentication flow and then used to prove both identity and authorization when calling SuccessFactors APIs.</SPAN></P><P class="lia-align-justify" style="text-align : justify;"><SPAN>The way this works is that any application or middleware that needs to call SuccessFactors first registers itself in IAS as a trusted client. IAS then issues that application a client ID and a client secret. When the application needs to call an API, it does not directly pass usernames or passwords. Instead, it requests a token from IAS using its client credentials. IAS verifies this request and returns an access token, and in many cases an ID token as well. The access token is then attached to the API call in the authorization header. SuccessFactors checks the validity of this token against IAS, and if the token is still valid and has the right scope, the API call is processed.</SPAN></P><P class="lia-align-justify" style="text-align : justify;"><SPAN>The security advantage here is that the tokens are short-lived, often valid only for minutes or hours. Even if someone managed to intercept them, their usefulness would be very limited. On top of that, IAS can enforce security policies like multifactor authentication, conditional access, or centralized identity checks before it ever issues a token. All of this dramatically reduces the risk of unauthorized access compared to Basic Authentication.</SPAN></P><P><U><FONT size="4"><STRONG>Pre-Requisites For Configuring OIDC</STRONG></FONT></U></P><OL><LI>Admin access of Security Centre to configure OIDC Client Application in <STRONG>Manage OIDC OAuth Client Application</STRONG> on SuccessFactors.</LI><LI>Admin access of Identity Authentication Services for configuring OIDC on IAS end in Applications under <STRONG>Applications &amp; Resources.</STRONG></LI><LI>OIDC must be enabled in IAS tenant and propagated to the SuccessFactors tenant that is linked to IAS, we can verify this by clicking&nbsp; SuccessFactors tenant. The protocol type shall be <STRONG>SAML 2.0 &amp; OpenID Connect</STRONG>&nbsp;and it should display a message above, like in the picture below.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (52).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313683iDE373D22E9F7E016/image-size/large?v=v2&amp;px=999" role="button" title="image (52).png" alt="image (52).png" /></span></LI></OL><P><U><FONT size="4"><STRONG>Configuration Steps of Open ID Connect In Identity Authentication Services (IAS):</STRONG></FONT></U></P><OL><LI>For the very first step, login to IAS tenant and select <STRONG>Applications</STRONG> under <STRONG>Applications &amp; Resources</STRONG>. Register OIDC Application by selecting <STRONG>Create. </STRONG>Select a display name of application and select <STRONG>OpenID Connect </STRONG>in the protocol type, rest of the selections are optional.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (53).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313687i60367D6759C5177A/image-size/large?v=v2&amp;px=999" role="button" title="image (53).png" alt="image (53).png" /></span><BR /><BR /></LI><LI>Now go to <STRONG>Provided APIs </STRONG>under<STRONG> Application APIs </STRONG>&nbsp;of recently created OIDC Application and enable the check for <STRONG>Allow all APIs for principal propagation.</STRONG><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (54).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313714iAA655D451C51F8D8/image-size/large?v=v2&amp;px=999" role="button" title="image (54).png" alt="image (54).png" /></span><BR /><BR /></LI><LI>Now navigate to <STRONG>Trust&gt;Single Sign-On</STRONG> and under that option access <STRONG>OpenID Connect Configuration.<BR /></STRONG>• Provide <STRONG>Name</STRONG> for a configuration as this is the mandatory field.<BR />• Scroll down to <STRONG>Grant Types</STRONG> and enable the check for&nbsp;<STRONG>Token Exchange (RFC 8693)<BR /></STRONG>• The checked boxes enabled here will be the required attributes during API authentication.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (55).png" style="width: 0px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313716i2F718A507BB6A5AC/image-size/small?v=v2&amp;px=200" width="0" height="0" role="button" title="image (55).png" alt="image (55).png" /></span></LI><LI>We can further alter the validity of access tokens, refresh tokens and even control the maximum sessions per user from <STRONG>Token Policy (Custom)</STRONG> in <STRONG>OpenID Configuration.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-12 233621.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313717i24AB09D0F191070E/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-12 233621.png" alt="Screenshot 2025-09-12 233621.png" /></span><BR /><BR /></STRONG></LI><LI>Now under<STRONG> Advanced Settings </STRONG>select<STRONG> JSON Web Token </STRONG>in<STRONG> Access Token Format.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (56).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313718i66F3EEC19CD82CBB/image-size/large?v=v2&amp;px=999" role="button" title="image (56).png" alt="image (56).png" /></span><BR /><BR /></STRONG></LI><LI>Now navigate to<STRONG> Dependencies</STRONG> under <STRONG>Application APIs. </STRONG>(The dependency name described here will be used later in the API call)<BR />• For Application, select SuccessFactors Tenant and the rest of the configuration will remain the same as below.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-13 000805.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313719i11F9C940BF6F21C8/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-13 000805.png" alt="Screenshot 2025-09-13 000805.png" /></span><BR /><BR /></LI><LI>Now go to <STRONG>Client Authentication</STRONG> under <STRONG>Application APIs</STRONG> to get the<STRONG>&nbsp;Client ID </STRONG>and <STRONG>Client Secret</STRONG> for using it in API authentication later.<BR />Upon saving a pop-up <FONT size="3">will</FONT> appear with a system generated <STRONG>Client ID</STRONG> and <STRONG>Client Secret, </STRONG>copy and save for using it later.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-13 015036.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313722iA994F796BE5C9CF2/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-13 015036.png" alt="Screenshot 2025-09-13 015036.png" /></span><BR /><BR /></LI><LI>We can also copy our Client ID by scrolling top on the same screen.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-13 015740.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313725i8CDB72DED6C14D19/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-13 015740.png" alt="Screenshot 2025-09-13 015740.png" /></span></LI></OL><P><U><FONT size="4"><STRONG>Configuration Steps of Open ID Connect In SuccessFactors:</STRONG></FONT></U></P><OL><LI><FONT size="3">Access <STRONG>Security Centre</STRONG> on SuccessFactors and navigate to <STRONG>Manage OIDC OAuth Client Application.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (57).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313726iBE4D1183CB0571A9/image-size/large?v=v2&amp;px=999" role="button" title="image (57).png" alt="image (57).png" /></span><BR /><BR /></STRONG></FONT></LI><LI><FONT size="3">Register an application in<STRONG> Application Type </STRONG>by entering the name of application.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (58).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313727i6284C134F0E60053/image-size/large?v=v2&amp;px=999" role="button" title="image (58).png" alt="image (58).png" /></span><BR /><BR /></FONT></LI><LI><FONT size="3">Now map the newly created application on SuccessFactors with the one configured on Identity Authentication Services by navigating to <STRONG>Application Map</STRONG> screen.<BR />• Click on <STRONG>Register</STRONG> on the top right corner of the screen.<BR />• Provide an <STRONG>Application Map Name.<BR /></STRONG>• Provide a <STRONG>Client ID</STRONG> that we copied in <STRONG>step 6 in IAS.<BR /></STRONG>• Choose an<STRONG> Application Type</STRONG> from dropdown. (It will appear with the same name as we created in Step 2 above in SuccessFactors)<BR />• Click Save.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (59).png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313728iA5395881FF721380/image-size/large?v=v2&amp;px=999" role="button" title="image (59).png" alt="image (59).png" /></span><BR /><BR /></FONT></LI><LI><FONT size="3">We have now successfully configured OpenID Connect application on IAS and mapped it to SuccessFactors Tenant. Now we can run our test API through postman (in our case).</FONT></LI></OL><P class="lia-align-justify" style="text-align : justify;"><FONT size="3"><U><FONT size="4"><STRONG>Initiating An API Call Using Postman:</STRONG></FONT></U></FONT></P><OL><LI><FONT size="3">Open postman and using POST method paste the below API call.<BR /><SPAN>•&nbsp;<A href="https://&lt;&lt;Your" target="_blank" rel="noopener nofollow noreferrer">https://&lt;&lt;Your</A>&nbsp;IAS Tenant Here&gt;&gt;/oauth2/token</SPAN><BR /></FONT></LI><LI><FONT size="3"><SPAN>In <STRONG>Header</STRONG> Section add following keys,<BR />• Accept - application/json<BR />• Content-Type -&nbsp;application/x-www-form-urlencoded<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-12 235056 - Copy.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313733i4894A59F98C52635/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-12 235056 - Copy.png" alt="Screenshot 2025-09-12 235056 - Copy.png" /></span><BR /><BR /></SPAN></FONT></LI><LI><FONT size="3"><SPAN>In Body Select&nbsp;<STRONG>x-www-form-urlencoded </STRONG>and enter below keys,<BR />• client_id - The one we saved in Step 6 in IAS.<BR />• client_secret - The one we saved in Step 6 in IAS.<BR />• grant_type - password<BR />• username - The admin account of IAS (It should be synced in IAS and login name must be used)<BR />• password - Password of that user account in IAS</SPAN></FONT></LI><LI><FONT size="3"><SPAN>Upon clicking <STRONG>Send</STRONG> an Access Token will be generated which will be used to authenticate an another API call. That API call will be used to connect SF.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-12 235455.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313779iD53C00A913AA74D1/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-12 235455.png" alt="Screenshot 2025-09-12 235455.png" /></span><BR /><BR /></SPAN></FONT></LI><LI><FONT size="3"><SPAN>For the next API call, use the same API as step 1 using POST method with same headers keys but additional keys in Body (Assertion &amp; Resource)<BR />• client_id - Same as step 3 above.<BR />• client_secret - Same as step 3 above.<BR />• grant_type -&nbsp;urn:ietf:params:oauth:grant-type:jwt-bearer<BR />• assertion - the <STRONG>access token</STRONG> that was generated in the previous API call.<BR />• resource - urn:sap:identity:application:provider:name:&lt;&lt;Dependency Name in OIDC Application&gt;&gt;<BR /></SPAN></FONT><FONT size="3"><SPAN><BR /></SPAN></FONT></LI><LI><FONT size="3"><SPAN>Upon pressing <STRONG>Send </STRONG>another access token will be generated which will be the final token for fetching results from SuccessFactors through an API.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-12 235819.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313823iA127CB306A1AF112/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-12 235819.png" alt="Screenshot 2025-09-12 235819.png" /></span><BR /><BR /></SPAN></FONT></LI><LI><FONT size="3"><SPAN>For the last step, use the GET commamd with your actual API (created through OData dictionary on SuccessFactors) along with Authorization as a <STRONG>Headers</STRONG> key and upon pressing <STRONG>Send</STRONG> API will generate the result.<BR />• Authorization - Bearer&nbsp;&lt;&lt;access token generated in previous step&gt;&gt;<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-13 000253.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313853i587209A2D39013F1/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-13 000253.png" alt="Screenshot 2025-09-13 000253.png" /></span><BR /><BR /></SPAN></FONT></LI><LI><FONT size="3"><SPAN>Incase we faced a Invalid Client or Client Locked error during any step in API calls, make sure to check the Client ID status in OIDC Client Authentication under Application APIs in IAS as the client might have been locked due to wrong login attempts through Postman.<BR />Change the status to unlock and attempt API call again.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-12 200128.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313854i28D89F04C6A5EDDB/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-12 200128.png" alt="Screenshot 2025-09-12 200128.png" /></span><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-09-12 234546.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/313855iDBC5AD75AEFB93D3/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2025-09-12 234546.png" alt="Screenshot 2025-09-12 234546.png" /></span><BR /></SPAN></FONT></LI></OL><P><FONT size="3"><U><FONT size="4"><STRONG>Ending Note:<BR /></STRONG></FONT></U></FONT></P><P class="lia-align-justify" style="text-align : justify;">With the introduction of multiple access tokens alongside traditional username and password authentication, SAP has significantly strengthened the security framework for API interactions. This enhancement not only adds an extra layer of protection against unauthorized access but also streamlines the user experience for those accessing a wide range of data across systems.</P><P class="lia-align-justify" style="text-align : justify;">Previously, maintaining secure API access often required manual intervention such as regularly updating passwords for technical users. This process was both time-consuming and prone to errors. Now, SAP’s approach allows for automatic management of token lifecycles, intelligently selecting expiry durations based on system needs and user roles. This reduces administrative overhead and ensures continuous, secure connectivity without disrupting workflows.</P><P class="lia-align-justify" style="text-align : justify;">By automating token renewal and offering flexible authentication options, SAP has made it easier for developers and integration teams to maintain secure, scalable connections to enterprise data while adhering to modern security standards and compliance requirements.</P><P>&nbsp;</P> 2025-09-18T13:03:24.954000+02:00 https://community.sap.com/t5/financial-management-blog-posts-by-sap/sap-grc-for-sap-hana-early-adopter-care-program-is-open/ba-p/14233031 SAP GRC for SAP HANA - Early Adopter Care Program is Open! 2025-10-02T00:21:59.824000+02:00 ElyasAhmed https://community.sap.com/t5/user/viewprofilepage/user-id/1886529 <P><FONT size="4" color="#000000"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_0-1759352102523.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/322135iD1B8CB16C87AB043/image-size/large?v=v2&amp;px=999" role="button" title="ElyasAhmed_0-1759352102523.png" alt="ElyasAhmed_0-1759352102523.png" /></span></FONT></P><P>&nbsp;</P><P><FONT size="6"><STRONG>Ready to Shape the Future of SAP GRC for SAP HANA?</STRONG></FONT></P><P><FONT size="4">The <STRONG>Early Adopter Care (EAC) Program for SAP GRC for SAP HANA</STRONG> (<A href="https://community.sap.com/t5/financial-management-blog-posts-by-sap/understanding-sap-s-product-strategy-for-governance-risk-and-compliance-grc/ba-p/14053197" target="_self">GRC 2026</A>) is now open!</FONT></P><P><FONT size="4">This is an opportunity to gain early access to SAP’s latest innovations in governance, risk, and compliance (GRC), which include:</FONT></P><UL><LI><FONT size="4">SAP Access Control</FONT></LI><LI><FONT size="4">SAP Process Control</FONT></LI><LI><FONT size="4">SAP Risk Management</FONT></LI><LI><FONT size="4">SAP Audit Management</FONT></LI><LI><FONT size="4">SAP Business Integrity Screening</FONT></LI><LI><FONT size="4">SAP Tax Compliance</FONT></LI><LI><FONT size="4">SAP UI Data Protection Masking</FONT></LI><LI><FONT size="4">SAP UI Data Protection Logging</FONT></LI></UL><P><FONT size="4">As a participant, you’ll be among the first to implement and provide feedback on SAP GRC for SAP HANA before general availability.</FONT></P><P><FONT size="4">This program is run in close collaboration with SAP experts, giving you direct access to development teams and dedicated support as you modernize compliance processes on SAP S/4HANA.</FONT></P><P><STRONG>&nbsp;</STRONG></P><P><FONT size="6"><STRONG>What’s in it for you?</STRONG></FONT></P><UL><LI><FONT size="4">Early access to <STRONG>SAP GRC for SAP HANA innovations</STRONG></FONT></LI><LI><FONT size="4"><STRONG>Close collaboration with SAP Development</STRONG> to minimize risks and safeguard projects</FONT></LI><LI><FONT size="4"><STRONG>Dedicated feedback channel</STRONG> with product experts and project coaches</FONT></LI><LI><FONT size="4">Visibility into who is adopting the newest GRC capabilities</FONT></LI><LI><FONT size="4">Opportunity to <STRONG>influence the direction of future releases</STRONG> with your feedback</FONT></LI></UL><P><STRONG>&nbsp;</STRONG></P><P><FONT size="6"><STRONG>When is it happening and how to register?</STRONG></FONT></P><UL><LI><FONT size="4"><STRONG>Registration:</STRONG> October 1 - November 15, 2025</FONT></LI><LI><FONT size="4"><STRONG>Program Start:</STRONG> March 9, 2026</FONT></LI></UL><P><FONT size="4">Customers can apply directly on the <A href="https://influence.sap.com/sap/ino/#campaign/4014" target="_blank" rel="noopener noreferrer">Influence Platform</A> and become part of a select group helping shape the future of SAP GRC capabilities.</FONT></P><P><STRONG>&nbsp;</STRONG></P><P><FONT size="6"><STRONG>Who should join?</STRONG></FONT></P><P><FONT size="4">This program is ideal for organizations:</FONT></P><UL><LI><FONT size="4">Already running SAP GRC solutions and planning to transition to SAP GRC for SAP HANA</FONT></LI><LI><FONT size="4">Looking to <STRONG>modernize governance, risk, and compliance</STRONG> processes on SAP S/4HANA</FONT></LI></UL><P><STRONG>&nbsp;</STRONG></P><P><FONT size="6"><STRONG>Why it matters</STRONG></FONT></P><P><FONT size="4">The Early Adopter Care Program is more than an early access, it’s a partnership. By joining, you’ll:</FONT></P><UL><LI><FONT size="4">Shape SAP GRC for SAP HANA with your <STRONG>real-world use cases</STRONG></FONT></LI><LI><FONT size="4">Gain <STRONG>first-hand support</STRONG> from SAP’s development organization</FONT></LI><LI><FONT size="4">Establish your organization as a <STRONG>thought leader</STRONG> in modern GRC adoption</FONT></LI></UL><P><STRONG>&nbsp;</STRONG></P><P><FONT size="6"><STRONG>Take the next step</STRONG></FONT></P><P><FONT size="4">Don’t miss the chance to be part of the future of SAP GRC. Join the Early Adopter Care Program today and secure your seat at the forefront of innovation.</FONT></P><P><FONT size="4">Apply now via the <A href="https://influence.sap.com/sap/ino/#campaign/4014" target="_blank" rel="noopener noreferrer">Influence Platform</A>.</FONT></P> 2025-10-02T00:21:59.824000+02:00 https://community.sap.com/t5/financial-management-blog-posts-by-sap/streamlining-access-governance-or-crave-infotech-and-sap-session-overview/ba-p/14223197 Streamlining Access Governance or Crave Infotech and SAP Session Overview 2025-10-07T13:23:10.190000+02:00 andrei_nifatov https://community.sap.com/t5/user/viewprofilepage/user-id/295249 <P><STRONG>Why it is important to s<SPAN>treamline Access Governance</SPAN>?</STRONG></P><P>SAP ERP is a comprehensive system for managing various business processes. Integrating it with other non-SAP systems can yield significant benefits, such as enhanced user experience,&nbsp; and access to specialized features. This integration creates a more robust and flexible IT landscape, which better supports complex and dynamic business needs by leveraging the strengths of multiple systems.</P><P>However, the benefits of a flexible IT landscape require stringent security controls across all systems. It's crucial to conduct detailed risk analyses and implement segregation of duties for roles and authorizations in both SAP and non-SAP systems. This prevents unauthorized access and potential fraud, ensuring that no single individual can complete critical processes or transactions without oversight. This approach helps mitigate risks like unauthorized data modification, financial misstatements, and operational disruptions, ultimately helping enhance overall organizational security and compliance.</P><P><STRONG>What are the possible use cases and benefits for our customers:</STRONG></P><P><STRONG>1. Identity Management systems</STRONG></P><P><STRONG>Use Case:</STRONG></P><UL><LI><STRONG>Identity Management and Governance:</STRONG><SPAN>&nbsp;</SPAN>Identity management systems help manage user identities, access rights, and compliance across multiple systems, including SAP ERP. It provides a centralized view for identity governance and ensures that only authorized users have access to critical business data.</LI></UL><P><STRONG>Value:</STRONG></P><UL><LI>Enhanced security by managing and governing identities.</LI><LI>Help with regulatory requirements like GDPR, SOX, etc.</LI><LI>Streamlined access management processes, reducing manual errors and increasing efficiency.</LI></UL><P><STRONG>2. IT Service Management</STRONG></P><P><STRONG>Use Case:</STRONG></P><UL><LI><STRONG>IT Service Request and Incident Management:</STRONG><SPAN>&nbsp;</SPAN>Service Management can handle IT service requests, incidents, and changes, integrating with SAP ERP for tasks like asset management, purchasing, and financial tracking.</LI><LI><STRONG>Automation Workflows:</STRONG><SPAN>&nbsp;</SPAN>Automates IT processes that may not be covered by SAP, such as incident management workflows.</LI></UL><P><STRONG>Value:</STRONG></P><UL><LI>Improved IT service delivery and efficiency.</LI><LI>Enhanced visibility and control over IT operations.</LI><LI>Better integration of IT processes with business processes managed in SAP.</LI></UL><P><STRONG>3. Other ERP Systems</STRONG></P><P><STRONG>Use Case:</STRONG></P><UL><LI><STRONG>Subsidiaries or Specific Departments:</STRONG><SPAN>&nbsp;</SPAN>Some businesses may use different ERP systems for specific departments, subsidiaries, or geographic regions. This can be due to historical reasons, specialization, or specific functional requirements.</LI><LI><STRONG>Integration and Data Exchange:</STRONG><SPAN>&nbsp;</SPAN>Using middleware and integration platforms to sync data between multiple ERP systems.</LI></UL><P><STRONG>Value:</STRONG></P><UL><LI>Flexibility in meeting diverse business needs.</LI><LI>Ability to leverage best-of-breed solutions for specific areas.</LI></UL><P><STRONG>4. Non-SAP HR Systems</STRONG></P><P><STRONG>Use Case:</STRONG></P><UL><LI><STRONG>Specialized HR Functions:</STRONG><SPAN>&nbsp;integration with non-SAP HR for event management process. Authorization are in place when changes are needed from HR perspective.</SPAN></LI><LI><STRONG>Integration for Employee Data:</STRONG><SPAN>&nbsp;</SPAN>Syncing HR data with centralized authorization process.</LI></UL><P><STRONG>Value:</STRONG></P><UL><LI>Enhanced HR capabilities and user experiences.</LI><LI>Better alignment of HR information with user authorizations.</LI></UL><P><STRONG>With the value of integration now clear, let's delve deeper into the insights from our webinar, 'Simplifying SAP GRC Access Governance Deployments: Extending IAG Standard and Bridge Edition to Cover the Enterprise'.</STRONG></P><P><STRONG>Date:</STRONG>&nbsp;September 17, 2025</P><P><STRONG>Key Speakers:</STRONG></P><UL><LI><STRONG>Swetta Singh</STRONG>, Chief Product Expert, Product Management at SAP Governance, Risk &amp; Compliance</LI><LI><STRONG>Vishal Verma</STRONG>, Global Vice President - AccessHub, Crave Infotech</LI></UL><P><STRONG><BR />Session Content</STRONG></P><P><STRONG>Swetta Singh (SAP)</STRONG></P><OL><LI><STRONG>Overview of Identity and Access Governance Solutions:</STRONG>&nbsp;Swetta provided a comprehensive overview of SAP's identity and access governance solutions, highlighting their capabilities and benefits.</LI><LI><STRONG>Differences Between Standard and Integration Editions:</STRONG>&nbsp;She explained the distinctions between the standard and integration editions of SAP IAG. This included features, functionalities, and scenarios where each is most beneficial.</LI><LI><STRONG>Hybrid Landscape:</STRONG>&nbsp;Swetta discussed the implications and differences in moving towards a hybrid landscape. This involved detailing how SAP's solutions can be effectively deployed and managed in both cloud and on-premise environments.</LI></OL><P><STRONG>Vishal Verma (Crave Infotech)</STRONG></P><OL><LI><STRONG>Extending SAP Access Governance Solutions to Non-SAP Apps:</STRONG>&nbsp;Vishal introduced four scenarios for extending SAP access governance solutions to non-SAP applications. These scenarios illustrate different integration strategies and use cases.</LI></OL><P><STRONG>Four Access Governance Scenarios</STRONG></P><OL><LI><STRONG>Enterprise-wide Access Governance with SAP IAG</STRONG></LI><UL><LI><STRONG>Description:</STRONG>&nbsp;Extending SAP's landscape to other applications where <SPAN>AccessHub&nbsp;</SPAN>provides integration and content. This includes seamlessly integrating non-SAP applications into the existing SAP IAG framework for consistent governance.</LI></UL><LI><STRONG>Enterprise-wide Access Governance with SAP Access Control</STRONG></LI><UL><LI><STRONG>Description:</STRONG> <SPAN>AccessHub</SPAN> integrates with SAP Access Control solutions to enable comprehensive governance. This scenario ensures that all access requests and compliance checks are managed centrally through SAP Access Control.</LI></UL><LI><STRONG>Automate HR-Driven Access Across SAP &amp; Enterprise Apps</STRONG></LI><UL><LI><STRONG>Description:</STRONG> <SPAN>AccessHub</SPAN> integrates with HR applications to automate access requests based on HR processes and changes. This includes scenarios where employee access is automatically updated based on HR records.</LI></UL><LI><STRONG>Embed Access Governance into Workflows</STRONG></LI><UL><LI><STRONG>Description:</STRONG>&nbsp;Third-party tools perform the role of a ServiceDesk, and <SPAN>AccessHub</SPAN> connects these tools with provisioning systems like SAP IAG. This integration allows access governance functions to be directly embedded within ServiceDesk workflows.</LI></UL></OL><P><STRONG>Conclusion</STRONG></P><P>Vishal concluded the session by highlighting a success story:</P><UL><LI><STRONG>70% Reduction in Provisioning Time:</STRONG>&nbsp;At a large utility company, Crave connected Access Hub with SAP Access Control solutions to achieve significant improvements in provisioning time. This setup enabled cross-system risk analysis, streamlined access requests, efficient user access reviews, and robust audit reporting.</LI></UL><P><STRONG>Summary</STRONG></P><P>The webinar emphasized the benefits of extending SAP's access governance solutions to non-SAP applications. Real-world success stories were presented to underscore the critical role of seamless integration in delivering comprehensive access governance across the enterprise landscape. The session highlighted the significant improvements in efficiency, compliance, and overall security provided by these integrations.</P><P><STRONG>Follow-Up</STRONG></P><P>If you are interested in reviewing the session, follow these links to access the slides and recording:</P><UL><LI><A href="https://dam.sap.com/mac/u/a/USggRNV?rc=10&amp;doi=SAP1238870" target="_blank" rel="noopener noreferrer">Slides</A></LI><LI><A href="https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fevent.on24.com%2Fwcc%2Fr%2F5065756%2F49835EDC8742FBBE4B3544E83D4FBC19&amp;data=05%7C02%7Candrei.nifatov%40sap.com%7C6fa10c7ff23e4324becc08de04d74487%7C42f7676cf455423c82f6dc2d99791af7%7C0%7C0%7C638953519786144928%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=d7HWxWyc%2FoLIQT0WR9ZuFTFZaUXmMayE2ClmsYHV8oQ%3D&amp;reserved=0" target="_blank" rel="noopener nofollow noreferrer">Recording</A></LI></UL> 2025-10-07T13:23:10.190000+02:00 https://community.sap.com/t5/technology-blog-posts-by-sap/identity-access-governance-understanding-authorization-policies/ba-p/14270279 Identity Access Governance - Understanding Authorization Policies 2025-11-15T13:02:47.618000+01:00 karanbir1418 https://community.sap.com/t5/user/viewprofilepage/user-id/151086 <P><FONT size="4">We have often seen business scenarios where requirement is to restrict the Access/Role search in IAG&nbsp; Access Request to specific list of roles for defined set of users. For e.g. Users in country/company code X should only see the roles for country/company code X in the Access request form to request.</FONT></P><P><FONT size="4">In GRC Access Controls, we achieve this requirement from traditional authorizations/roles concept and role search functionality</FONT></P><P><FONT size="4">IAG offers the concept of defining Authorization Policies to achieve this goal</FONT></P><P>&nbsp;</P><P><FONT size="5"><STRONG>Overview</STRONG></FONT></P><P><FONT size="4">Authorization policies determine which roles, applications, or business roles end users can search and request in the Access Request application. Administrators can configure these policies in the <STRONG>Authorization Policy</STRONG> app to control search visibility and request capability</FONT></P><P>&nbsp;</P><P><FONT size="5"><STRONG>Authorizations for Access Request</STRONG></FONT></P><P><FONT size="4">When performing a role search in the Access Request app, results may be restricted based on authorization policies. Administrators define which Access objects, Business Roles, or Applications/Systems users can search and request.</FONT></P><P>&nbsp;</P><P><U><STRONG>Policy Types for Role Search</STRONG></U></P><P><STRONG>Access</STRONG></P><UL><LI><STRONG>Action:</STRONG> Request Access</LI><LI><STRONG>Description:</STRONG> Allows assigned users to request access for all Access items defined by the authorization object attributes.</LI><LI><STRONG>Authorization Object Attributes:</STRONG></LI><UL><LI>Name</LI><LI>Application</LI><LI>Application Type</LI><LI>Access Type</LI><LI>Business Process</LI><LI>Business Subprocess</LI></UL></UL><P><STRONG>Business Role</STRONG></P><UL><LI><STRONG>Action:</STRONG> Request Access</LI><LI><STRONG>Description:</STRONG> Allows assigned users to request access for all Business Roles defined by the authorization object attributes.</LI><LI><STRONG>Authorization Object Attributes:</STRONG></LI><UL><LI>Name</LI><LI>Business Process</LI><LI>Business Subprocess</LI><LI>Criticality</LI></UL></UL><P><STRONG>Application/System</STRONG></P><UL><LI><STRONG>Action:</STRONG> Request Access</LI><LI><STRONG>Description:</STRONG> Allows assigned users to request access for all Applications/Systems defined by the authorization object attributes.</LI><LI><STRONG>Authorization Object Attributes:</STRONG></LI><UL><LI>Application</LI><LI>Application Type</LI></UL></UL><P>&nbsp;</P><P><STRONG>Application - Authorization Policy under Administration section</STRONG></P><P><U><STRONG>Flowchart</STRONG></U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karanbir1418_0-1763204978548.png" style="width: 679px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/341467iAF3071055937C2C6/image-dimensions/679x224?v=v2" width="679" height="224" role="button" title="karanbir1418_0-1763204978548.png" alt="karanbir1418_0-1763204978548.png" /></span></P><P>&nbsp;</P><OL><LI><STRONG>Policy Set</STRONG> - Container of multiple policies of a specific Policy type (for e,g, Access/Access Risk/Business Role etc.). <STRONG>Users are assigned to Policy sets based on User attributes.</STRONG></LI><LI><STRONG>Policies -&nbsp;</STRONG>Policies are maintained within policy set and can be activated/deactivated based on need. Each policy contains <STRONG>Authorizations&nbsp;</STRONG>which further contains<OL class="lia-list-style-type-lower-alpha"><LI>&nbsp; "<STRONG>Actions</STRONG>"&nbsp; (for e,g, Request Access in policy set type Access and Business Role)</LI><LI>&nbsp;"<STRONG>Access/Business Roles"&nbsp;</STRONG>based on attributes.</LI></OL></LI></OL><P>&nbsp;</P><P><FONT size="5"><U><STRONG>Screenshots</STRONG></U></FONT></P><P>&nbsp;</P><P><U>Authorization Policy App</U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karanbir1418_1-1763206914346.png" style="width: 687px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/341540iBDE1A3982A854155/image-dimensions/687x103/is-moderation-mode/true?v=v2" width="687" height="103" role="button" title="karanbir1418_1-1763206914346.png" alt="karanbir1418_1-1763206914346.png" /></span></P><P>&nbsp;</P><P><U>Creation of Policy Set</U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karanbir1418_2-1763207033198.png" style="width: 634px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/341542iDDFCEC13E73303C2/image-dimensions/634x263?v=v2" width="634" height="263" role="button" title="karanbir1418_2-1763207033198.png" alt="karanbir1418_2-1763207033198.png" /></span></P><P>&nbsp;</P><P><U>Creation of Policy</U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karanbir1418_3-1763207219317.png" style="width: 660px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/341543i4C9CF6297F451EB6/image-dimensions/660x243?v=v2" width="660" height="243" role="button" title="karanbir1418_3-1763207219317.png" alt="karanbir1418_3-1763207219317.png" /></span></P><P>&nbsp;</P><P><U>Configuration of Authorizations and Access/Business role based on attributes</U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karanbir1418_4-1763207366856.png" style="width: 637px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/341544iFDEE60209455C60C/image-dimensions/637x298?v=v2" width="637" height="298" role="button" title="karanbir1418_4-1763207366856.png" alt="karanbir1418_4-1763207366856.png" /></span></P><P>&nbsp;</P><P><U>Defining Access</U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karanbir1418_5-1763207422764.png" style="width: 703px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/341545iEA9EFA0B8EB4275E/image-dimensions/703x243?v=v2" width="703" height="243" role="button" title="karanbir1418_5-1763207422764.png" alt="karanbir1418_5-1763207422764.png" /></span></P><P>&nbsp;</P><P><U>Defining Users based on attributes</U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karanbir1418_6-1763207620874.png" style="width: 688px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/341546i0D3279C777BD31F7/image-dimensions/688x320?v=v2" width="688" height="320" role="button" title="karanbir1418_6-1763207620874.png" alt="karanbir1418_6-1763207620874.png" /></span></P><P>&nbsp;</P><P><FONT size="5"><STRONG>Conclusion</STRONG> </FONT></P><P>Once policy is activated, Access and Business roles will be filtered based on defined authorization policies.</P><P>Standard SAP documentation -&nbsp;<A title="Authorization Policies in Identity Access Governance" href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/8927ff487e3e4520b3211167b7f06c31/fd8f1af89bae4d579c8470a712e127ce.html?version=LATEST&amp;locale=en-US" target="_blank" rel="noopener noreferrer">Authorization Policies in Identity Access Governance</A>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P> 2025-11-15T13:02:47.618000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/sap-cloud-identity-access-governance-license-counting-logic/ba-p/14272137 SAP Cloud Identity Access Governance License Counting Logic 2025-11-18T18:10:08.301000+01:00 JuliaLu https://community.sap.com/t5/user/viewprofilepage/user-id/131826 <P><SPAN>For Expired Users in SAP ERP, understand it should not counted for IAG licenses, correct? When a SAP S4 User is deemed to be expired, will IAG automatically stop monitoring? Thanks.</SPAN></P> 2025-11-18T18:10:08.301000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-architecture-and-key/ba-p/14293827 SAP User Access Management in a Hybrid Landscape – Architecture and Key Concepts (Part 1) 2025-12-22T18:05:01.288000+01:00 SubbuIyer https://community.sap.com/t5/user/viewprofilepage/user-id/179044 <P>This blog is Part 1 of a 3-part series on SAP User Access Management in a Hybrid Landscape.</P><P>• Part 1 – Architecture and Key Concepts (this post)<BR />• <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-business-roles-and/ba-p/14293839" target="_self">Part 2 – Business Roles and Provisioning Models</A><BR />• <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-challenges-and-mitigation/ba-p/14293851" target="_self">Part 3 – SAP IAG Two-Tenant Model: Challenges and Mitigation Strategies</A></P><H2 id="toc-hId-1767393268">Purpose</H2><P>As organizations continue to adopt SAP cloud solutions, hybrid SAP landscapes—combining SAP S/4HANA in on-premise or private cloud environments with SAP SaaS applications and SAP BTP—have become increasingly common. While this model enables flexibility and innovation, it also introduces new challenges in managing user access consistently across systems.</P><P>This blog focuses on the architecture and key concepts behind managing user access in a hybrid SAP landscape using SAP GRC Access Control and SAP Identity and Access Governance (IAG) via the IAG Access Control Bridge. It outlines how these components work together with SAP Cloud Identity Services to provide centralized governance, controlled provisioning, and audit-ready access management across both on-premise and cloud applications.</P><P>Rather than providing step-by-step configuration instructions, this blog shares practical architectural guidance and implementation insights based on real-world project experience, complementing SAP’s official documentation and helping practitioners understand how to design an effective hybrid access management framework.</P><H2 id="toc-hId-1570879763">Scope and Landscape Overview</H2><P><SPAN>The scope of this blog is to outline an integrated user access management approach for a hybrid SAP landscape, covering both on-premise/private cloud ERP systems and SAP public cloud and SaaS applications.</SPAN></P><H3 id="toc-hId-1503448977">In-Scope Systems</H3><UL><LI>SAP S/4HANA (On-Premise or RISE Private Cloud)</LI><LI>SAP GRC Access Control 12</LI><LI>SAP Cloud Identity Access Governance – Integration Edition (IAG AC Bridge)</LI><LI>SAP Cloud Identity Services (IAS &amp; IPS)</LI><LI>SAP Cloud Connector</LI><LI>SAP SaaS Applications</LI><LI>SAP BTP Applications</LI></UL><H2 id="toc-hId-1177852753">Target Architecture</H2><H3 id="toc-hId-1110421967">High-Level Architecture Overview</H3><P>The target architecture defines the end-to-end user access governance and provisioning model for a hybrid SAP landscape. This model integrates on-premise and private cloud SAP systems with SAP Public Cloud and SaaS applications, ensuring cohesive and centralized oversight. The solution leverages several key SAP technologies—SAP GRC Access Control, SAP Identity and Access Governance (IAG – Integration Edition), SAP Cloud Identity Services, and SAP Cloud Connector—to deliver consistent approval workflows, centralized governance, and automated provisioning across the entire SAP environment.</P><P><SPAN>The following diagram illustrates the reference architecture for SAP user access management in a hybrid landscape, highlighting the interaction between SAP GRC Access Control, SAP IAG AC Bridge, SAP Cloud Identity Services, and SAP SaaS applications.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_0-1766084227863.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353905i06048C09E85CC35B/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_0-1766084227863.png" alt="SubbuIyer_0-1766084227863.png" /></span></P><H3 id="toc-hId-913908462">SAP GRC Access Control: Central Governance for Hybrid SAP Landscapes</H3><H4 id="toc-hId-846477676">Overview</H4><P>SAP GRC Access Control operates as the primary governance and control layer for user access management across the hybrid SAP landscape. It provides a unified framework supporting both on-premise/private cloud and public cloud SAP applications, enabling organizations to maintain comprehensive oversight and streamlined processes for provisioning and managing user access.</P><H4 id="toc-hId-649964171">Key Functional Capabilities</H4><UL><LI>Access Request Management (ARM): Provides a centralized platform for intake and processing of access requests. Structured approval workflows ensure that every request is systematically reviewed and authorized according to organizational policies.</LI><LI>Access Risk Analysis: Performs real-time Segregation of Duties (SoD) analysis for on-premise systems and supported cloud environments, enabling proactive identification and mitigation of user access risks.</LI><LI>Business Role Management: Facilitates the design, maintenance, and lifecycle management of business roles, supporting the evolving access requirements of the organization.</LI></UL><H3 id="toc-hId-324367947">Integration with On-Premise and Private Cloud SAP Systems</H3><P>SAP GRC Access Control is directly integrated with core on-premise and private cloud SAP systems, such as SAP S/4HANA, SAP MDG, and SAP BW/4HANA. This integration is achieved through RFC-based communication, enabling essential functions including user provisioning and management, risk analysis and reporting, and business role management. All provisioning and governance activities for these systems are managed from SAP GRC Access Control, ensuring thorough audit traceability and alignment with internal control requirements.</P><H3 id="toc-hId-127854442">Cloud Integration via SAP Cloud Connector and SAP IAG</H3><P>The SAP Cloud Connector establishes a secure communication channel between the SAP cloud environment and the on-premise SAP landscape. Within the architecture, the SAP IAG subaccount on the Cloud Connector serves as an integration bridge, connecting SAP GRC Access Control with SAP Cloud Identity and Access Governance (IAG). This configuration enables cloud-to-on-premise RFC communication with GRC Access Control, supports SoD authorization checks, and allows approved access requests in GRC to be extended to SAP SaaS applications. This approach ensures organizations can apply their established GRC processes consistently across both on-premise and cloud environments.</P><H3 id="toc-hId--143890432">SAP Cloud Identity and Access Governance (IAG) Integration for SAP SaaS Applications</H3><P>Integration with SAP SaaS applications is facilitated through SAP Cloud Identity and Access Governance (IAG), which operates on the SAP Business Technology Platform (BTP). For clarity and security, IAG is deployed in a dedicated BTP subaccount, using the integration edition known as the IAG AC Bridge. Within this subaccount, a destination is configured to connect SAP GRC Access Control to the SAP Cloud environment via the Cloud Connector, ensuring secure and efficient access management. The IAG application is accessed through a dedicated URL, allowing administrators to manage configurations as required.</P><P>During the initial setup of IAG, administrators create an application entry for each SAP SaaS application that will be managed. This ensures that every application is properly integrated and governed within the overall access management framework. IAG utilizes SAP Cloud Identity Services for user provisioning, leveraging the Identity Provisioning Service to automate and monitor user access. For SaaS applications supporting direct provisioning through SCIM, a proxy system is configured for each application in Identity Provisioning, enabling secure and seamless user provisioning across the SAP SaaS ecosystem.</P><H2 id="toc-hId--47000930"><STRONG>Summary and Next Steps</STRONG></H2><P>This first part of the series establishes the architectural foundation for SAP user access management in a hybrid landscape. By combining SAP GRC Access Control with SAP IAG AC Bridge and SAP Cloud Identity Services, organizations can extend centralized governance into SAP cloud applications while maintaining strong security and compliance controls.</P><P>In Part 2, we will focus on GRC Business Roles and provisioning models, including direct and federated access patterns across SAP S/4HANA and SAP SaaS applications.</P> 2025-12-22T18:05:01.288000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-business-roles-and/ba-p/14293839 SAP User Access Management in a Hybrid Landscape – Business Roles and Provisioning Models (Part 2) 2025-12-22T18:06:45.115000+01:00 SubbuIyer https://community.sap.com/t5/user/viewprofilepage/user-id/179044 <H2 id="toc-hId-1767393301">Introduction</H2><P>In <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-architecture-and-key/ba-p/14293827" target="_self">Part 1</A> of this series, we explored the reference architecture for managing user access in a hybrid SAP landscape using SAP GRC Access Control, SAP Identity and Access Governance (IAG) via the IAG AC Bridge, and SAP Cloud Identity Services.</P><P>With the architectural foundation in place, this second part shifts focus to how access is actually designed and provisioned across on-premise and SAP cloud applications. In particular, it highlights the role of GRC Business Roles and explains the different provisioning models used for SAP S/4HANA and SAP SaaS applications.</P><P>Understanding these concepts is essential for building scalable, auditable, and maintainable access management processes in hybrid SAP environments.</P><H2 id="toc-hId-1570879796">Access Control: Business Role Management</H2><H3 id="toc-hId-1503449010">Overview of GRC Business Roles</H3><P>In SAP GRC, a Business Role comprises a set of access rights, permissions, and authorizations that can be assigned to multiple users who perform similar functions. Unlike traditional technical roles, Business Roles are designed to be system-independent, allowing organizations to streamline access management across various SAP applications. In a typical SAP Greenfield implementation, these Business Roles are crafted to reflect users' job functions or positions, ensuring both consistency and security for access to on-premise and cloud-based SAP solutions such as SAP S/4HANA, SAP Ariba, and SAP Sales Cloud.</P><H3 id="toc-hId-1306935505">Significance of GRC Business Roles in a Hybrid Landscape</H3><P>The adoption of GRC Business Roles is especially crucial in a hybrid SAP landscape that encompasses both on-premise and cloud applications. By centralizing access provisioning and abstracting user permissions from the underlying technical roles, GRC Business Roles provide a unified structure for user access management. This approach ensures that users have consistent and appropriate access regardless of whether their work takes place in S/4HANA, Ariba, Sales Cloud, or a combination of these platforms. As organizations transition toward hybrid and cloud-centric architectures, GRC Business Roles facilitate secure, scalable, and efficient user access management—reducing complexity for administrators and minimizing risk by aligning permissions with business needs. This unified approach directly supports the document’s objectives of robust SAP User Access Management and governance across disparate systems.</P><H3 id="toc-hId-1110422000">Structure of GRC Business Roles</H3><P>A GRC Business Role aggregates one or more technical roles from different systems into a single logical unit, simplifying the assignment process and ensuring users have access to the necessary tools and applications for their roles. Each Business Role consists of Technical Roles specific to individual applications or systems. These Technical Roles grant permissions for distinct modules or applications (e.g., "Accounts Payable Manager" in S/4HANA or "Requestor" in Ariba). GRC Business Roles are mapped to Technical Roles spanning multiple systems, such as:</P><UL><LI>SAP S/4HANA: Business process roles (e.g., Accounts Payable Manager, Maintenance Technician).</LI><LI>SAP Ariba: Groups or functional roles (e.g., Procurement Manager, Requestor).</LI><LI>SAP Sales Cloud: Sales-related roles (e.g., Sales Manager, Operations</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_0-1766085561593.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353906i8B3E60A5C153857F/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_0-1766085561593.png" alt="SubbuIyer_0-1766085561593.png" /></span></P><H3 id="toc-hId-913908495">Key Benefits of GRC Business Roles in Project Implementation</H3><UL><LI>Unified access provisioning across SAP S/4HANA and SAP SaaS applications, reducing complexity.</LI><LI>Consistent access mapping aligned with Segregation of Duties (SoD) requirements and regulatory compliance.</LI><LI>Centralized role definition and assignment in GRC simplifies access management for administrators.</LI><LI>Automatic updates to technical roles when business roles change, ensuring accuracy.</LI><LI>Comprehensive access provisioning for users' job functions across multiple systems via a single Business Role.</LI></UL><H3 id="toc-hId-717394990"><SPAN>Business Role Design Approach</SPAN></H3><P>The design of GRC Business Roles follows a structured process to ensure alignment with organizational job roles and access requirements:</P><H4 id="toc-hId-649964204">Technical Role Design</H4><UL><LI>The Security Team develops Technical Roles for each application, guided by detailed access requirements from:<UL><LI>Process Design Documents: Identify transactions, applications, and authorizations required for each business process.</LI><LI>User Stories: Outline access needs based on end-user roles and responsibilities.</LI><LI>Workshops and Discussions: Collaborate with process teams to specify operational transactions and applications for each role.</LI></UL></LI></UL><H4 id="toc-hId-453450699">Alignment with Organizational Job Roles</H4><UL><LI>GRC Business Roles are structured according to users’ jobs and responsibilities as defined by the Organizational Change Management (OCM) Team.</LI><LI>User job roles are defined based on L3 Processes, representing detailed activities within each business process.</LI><LI>L3 Processes linked to each job role are reviewed to determine the necessary technical roles and access rights.&nbsp;</LI><LI>The Security Team creates GRC Business Roles based on these definitions, consolidating required technical roles across applications to ensure consistent and accurate access provisioning.</LI></UL><H2 id="toc-hId--1228244">Detailed Provisioning Flows by Application Type</H2><P>This section will provide an overview of the provisioning workflows for various applications within a hybrid environment.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_1-1766085865271.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353907i8D76E491EB6F27D2/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_1-1766085865271.png" alt="SubbuIyer_1-1766085865271.png" /></span></P><H3 id="toc-hId--143890399">SAP S/4HANA (On-Premise / Private Cloud)</H3><P>Provisioning for SAP S/4HANA, whether deployed on-premise or in a private cloud environment, is facilitated through SAP GRC Access Control. The process is initiated when a user submits an access request using the GRC Access Request Management (ARM) module. Once the access request is submitted, it progresses through an approval workflow. This workflow typically involves the user's manager, the role owner, or the security team, depending on the organization's structure and policies.</P><P>During the approval process, a Segregation of Duties (SoD) risk analysis is conducted within GRC. This analysis ensures compliance with internal control requirements and helps minimize potential risks associated with conflicting access privileges. Upon successful approval, SAP GRC automatically assigns the designated roles directly to the S/4HANA system. The user's master record is subsequently updated through standard SAP connectors, enabling seamless integration and ensuring the accuracy of user data.</P><P>All audit logs generated during these provisioning activities are maintained within GRC. This comprehensive logging supports compliance requirements and enhances traceability. Notable characteristics of this provisioning flow include real-time SoD checks and immediate role assignment.</P><H2 id="toc-hId--47000897">Direct Provisioning to SAP SaaS Applications (Ariba, SuccessFactors, SAC) via SCIM API</H2><P>Provisioning for SAP SaaS applications that support the SCIM API, including Ariba, SuccessFactors, and SAP Analytics Cloud (SAC), is managed through SAP IAG leveraging the Identity Provisioning Service (IPS). The access request process is initiated using GRC Access Request, and the subsequent approval workflow follows a structure similar to the S/4HANA scenario. Once the access request is approved, GRC communicates the request to IAG using the Access Control Bridge (AC Bridge).</P><P>A scheduled provisioning job then runs at regular intervals to grant the requested access directly within the relevant SaaS applications. This automated process helps streamline user access management for cloud-based SAP solutions and ensures timely provisioning of roles.</P><H2 id="toc-hId--243514402">Indirect Provisioning to SAP SaaS Applications (FSM, BTP)</H2><P>For applications such as SAP Business Technology Platform (BTP) or Field Service Management (FSM), provisioning is managed by SAP IAG through the assignment of IAS Groups associated with these applications. Users submit access requests for specific IAS Groups, and these requests are routed through the required approval workflow. Upon approval, SAP IAG provisions the relevant IAS groups to the users.</P><P>For BTP, the IAS groups that are set up are linked to BTP role collections. When users next log in, they receive access to these specific collections. For applications such as FSM, which can interpret the assigned FSM IAS groups and map them to user policy groups within a company’s FSM environment, a scheduled read job on IPS will assign the appropriate user policy group and company automatically.</P><P><STRONG>Please note</STRONG>: While Field Service Management (FSM) may not be explicitly included under an integration scenario for IAG, it is identified as both a source and target system within <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/supported-systems?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Identity Provisioning</A>. Consequently, it is appropriate to utilize a combination of provisioning processes in order to provision end user access to FSM in such circumstances.</P><H2 id="toc-hId--440027907">Summary and What’s Next</H2><P>In this part of the series, we explored how GRC Business Roles and provisioning models enable scalable and controlled user access across hybrid SAP landscapes. By abstracting technical roles into business-aligned constructs and leveraging both direct and federated provisioning models, organizations can maintain strong governance while supporting diverse SAP applications.</P><P>In Part 3, we will focus on the SAP IAG two-tenant model, examining why it presents challenges in real-world implementations and how project teams can mitigate associated risks.</P> 2025-12-22T18:06:45.115000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-challenges-and-mitigation/ba-p/14293851 SAP User Access Management in a Hybrid Landscape – Challenges and Mitigation Strategies (Part 3) 2025-12-22T18:08:07.815000+01:00 SubbuIyer https://community.sap.com/t5/user/viewprofilepage/user-id/179044 <H2 id="toc-hId-1767393355">Introduction</H2><P>In the first two parts of this series, we covered the architecture and execution model for managing user access in hybrid SAP landscapes using SAP GRC Access Control and SAP Identity and Access Governance (IAG) via the IAG Access Control Bridge.</P><P>In this final part, we focus on a topic that frequently surfaces during implementations but is often underestimated during planning—the SAP IAG tenant model. Specifically, we examine why the standard two-tenant model introduces challenges when integrated with a typical three-tier SAP GRC Access Control landscape, and how project teams can mitigate these challenges in practice.</P><H2 id="toc-hId-1570879850">Challenges and Considerations with the SAP IAG Two-Tenant Model</H2><H3 id="toc-hId-1503449064">Overview of SAP IAG Tenant Mapping</H3><P>SAP Identity and Access Governance (IAG) enforces a strict tenant-to-system mapping model when integrated with SAP GRC Access Control through the IAG AC Bridge. According to SAP Note 3389374, only one SAP Access Control system can be mapped to one IAG tenant. SAP advises against connecting multiple Access Control systems to the same IAG tenant to avoid potential data inconsistencies. The guidance further highlights that after an Access Control system has been connected and data synchronized with an IAG tenant, no other Access Control system should be connected to that tenant, even if the previous system has been disconnected. SAP explicitly states that they may not take responsibility for any resulting data inconsistencies. Therefore, the number of IAG tenants should align with the number of Access Control systems.</P><H3 id="toc-hId-1306935559">Typical Landscape Mismatch</H3><P>In practice, most SAP customers operate a three-tier SAP GRC Access Control landscape, consisting of Development (DEV), Quality/Test (QAS), and Production (PRD) systems. However, SAP typically provisions only two IAG tenants per customer: one for Test and one for Production. This two-tenant limit also applies to several SAP SaaS solutions, such as Ariba, Fieldglass, and FSM, as well as SAP Cloud Identity Services. This creates a structural mismatch between the number of SAP Access Control systems and the available IAG tenants.</P><H3 id="toc-hId-1110422054"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_0-1766087841600.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353909i8CA1F81CF79B0459/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_0-1766087841600.png" alt="SubbuIyer_0-1766087841600.png" /></span></H3><P><EM>Figure: Typical mismatch between SAP GRC Access Control landscapes and IAG tenant availability</EM></P><H3 id="toc-hId-913908549">Challenges During Project Implementation</H3><P><EM>Note:&nbsp;While this discussion refers to the SAP GRC Access Control system, it is important to note that in most Greenfield implementations today, GRC Access Control is deployed as an embedded component within the SAP S/4HANA system. The overall three-to-six-month implementation timeline in the development system typically reflects the broader S/4HANA program, encompassing multiple business processes, and not GRC in isolation.</EM></P><P>During project implementations, especially in Greenfield scenarios, the SAP GRC Access Control Development system is usually implemented first and is available early in the project lifecycle. At this stage, configuration and development activities take place in the DEV system, and the Realize and Build phases can extend over three to six months. Early integration of the IAG AC Bridge is often required to support access request testing, role design validation, and initial cloud provisioning scenarios. However, the Quality (QAS) Access Control system—which ideally should connect to the IAG test tenant—may not be available until just before formal testing begins.</P><P>This situation presents a dilemma. While SAP recommends a one-to-one mapping between Access Control systems and IAG tenants, most customers do not have more than the standard two IAG tenants. Procuring an additional IAG tenant is often cost-prohibitive, not planned in the initial contract, and operationally challenging.</P><H3 id="toc-hId-717395044">Practical Implications for IAG AC Bridge Setup</H3><P>With only two IAG tenants, setting up the IAG AC Bridge can be particularly complex when the GRC QAS system is not yet available, but integration testing needs to start during the development phase. Early validation of cloud provisioning scenarios is also impacted. As a result, project teams are often forced to make architectural and sequencing decisions that are not directly addressed in SAP's official documentation.</P><H3 id="toc-hId-520881539">Recommended Mitigation Approach</H3><UL><LI>Early Availability of GRC QAS: If possible, teams should bring up the GRC Quality system earlier than originally planned, aligning its availability with the IAG Test tenant timeline. This enables completion of IAG AC Bridge integration in a supported manner, provides sufficient time for end-to-end testing without rework, and reduces last-minute risks during formal testing.</LI><LI>Adequate Time for Production Deployment: When deploying the integration in Production, ample lead time should be allowed. It should not be assumed that configurations can be transported end-to-end. Approximately 60% of the IAG AC Bridge integration steps performed in Test must be repeated manually in Production, as these steps are tenant-specific, involve cloud-side configurations, and cannot be transported using SAP CTS.</LI></UL><H3 id="toc-hId-324368034">Disconnecting and Reconnecting Access Control Systems</H3><P>Although SAP does not recommend disconnecting an Access Control system from an IAG tenant to connect a new one, i<SPAN>n some controlled project scenarios, teams have executed this approach without observing significant functional or data consistency issues, provided strict procedural discipline was followed.</SPAN>&nbsp;However, this approach should be clearly documented, approved by the customer, and understood as a pragmatic workaround rather than an SAP-endorsed best practice.</P><H2 id="toc-hId--1228190"><SPAN>Additional Functional Considerations in IAG AC Bridge Scenarios</SPAN></H2><H3 id="toc-hId--143890345">User Access Review</H3><P>User Access Reviews can continue to be performed within Access Control, following the established process. Upon completion of the review, a provisioning or deprovisioning request is automatically generated in IAG for the corresponding SaaS application related to the review request. For S/4HANA roles, these are removed automatically once the review request is submitted.</P><H3 id="toc-hId--340403850">SOD Review Process</H3><P>The SOD (Segregation of Duties) Review Process is not supported within the GRC IAG AC Bridge environment.</P><H3 id="toc-hId--536917355">Workflow Limitations in GRC</H3><P>Function, Risk, and Mitigating Control workflows are no longer available in GRC, as ruleset maintenance must now be conducted within IAG.</P><H3 id="toc-hId--733430860">Mitigating Controls Monitoring</H3><P>Mitigating controls monitoring can be performed within IAG. Additionally, test results for these controls can be uploaded directly to IAG.</P><H3 id="toc-hId--929944365">User and Role Simulation</H3><P>User and role level simulations for S/4HANA risks are not supported in IAG but may still be carried out in GRC AC.&nbsp;<SPAN>If simulations are performed, customers should validate this approach with SAP and ensure alignment with supported usage scenarios.</SPAN></P><H3 id="toc-hId--1126457870">Conclusion</H3><P>Across this three-part series, we explored how SAP user access management can be effectively designed and implemented in modern hybrid SAP landscapes.</P><UL><LI><P>Part 1 established the architectural foundation, explaining how SAP GRC Access Control, SAP Identity and Access Governance (IAG), and SAP Cloud Identity Services work together to extend centralized governance into SAP cloud applications.</P></LI><LI><P>Part 2 focused on execution, highlighting the importance of GRC Business Roles and outlining direct and federated provisioning models across SAP S/4HANA and SAP SaaS applications.</P></LI><LI><P>Part 3 examined the practical challenges introduced by the SAP IAG tenant model and shared mitigation strategies based on real-world implementation experience.</P></LI></UL><P>Together, these perspectives demonstrate that while SAP provides a robust framework for hybrid access management, successful implementations require early planning, architectural clarity, and pragmatic decision-making—particularly when navigating tenant constraints and project timelines.</P><P>By combining strong role design, well-defined provisioning models, and a clear understanding of platform limitations, organizations can achieve secure, scalable, and auditable user access management across both on-premise and cloud SAP environments.</P> 2025-12-22T18:08:07.815000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/push-uuid-from-ias-to-s4hana-tasks-list-on-btp-task-center-is-empty-for/ba-p/14298510 Push UUID from IAS to S4HANA - Tasks list on BTP task Center is empty for S4HANA 2026-01-01T05:41:20.344000+01:00 navyaaa https://community.sap.com/t5/user/viewprofilepage/user-id/448321 <H2 id="toc-hId-1767539302"><STRONG>Introduction:</STRONG></H2><P>After completing all prerequisites and following the SAP documentation to configure the Task Center for an SAP S/4HANA system, it is quite common to encounter a situation where no tasks are displayed in the Task Center—even though task creation appears to be working correctly in the backend.</P><P>This blog addresses one of the most frequently overlooked root causes behind this issue: the absence of a Global User ID (UUID) in the SAP S/4HANA system. Even when the Task Center is correctly configured on SAP BTP and tasks are visible in the pull cache, missing UUID mapping can prevent the Task Center from resolving the processor correctly, resulting in an empty Task Center UI.</P><P>In this blog, I will walk you through a critical but often missed step required to ensure tasks are displayed correctly in the Task Center. The focus is on establishing a one-way synchronization from SAP Identity Authentication Service (IAS) to SAP S/4HANA to push the UUIDs for existing users, without performing a full user provisioning or re-synchronization.</P><H2 id="toc-hId-1571025797"><STRONG>Solution:</STRONG></H2><P>Even after configuring the Task Center on HANA on-premise and completing all required steps on BTP, the Task Center may appear empty, as shown in the screenshot below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_1-1767006178298.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356437i84006257B39A5258/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_1-1767006178298.png" alt="navya_shree2_1-1767006178298.png" /></span></P><P>When you check the Task Center pull cache, you can see that the task exists; however, it is still not displayed in the Task Center app. As shown in the screenshot below, the task appears with the processor name set to the SAP user ID. This situation occurs when a GUID (UUID) is not available in the SAP HANA system. In such cases, the system falls back to using the SAP user ID instead of the UUID. As a result, the Task Center is unable to correctly resolve the processor, and the task is not displayed in the Task Center app.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_0-1767007359114.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356438i1CDC325FBBFB0B86/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_0-1767007359114.png" alt="navya_shree2_0-1767007359114.png" /></span></P><P>To resolve this issue, we need to ensure that a UUID is available in the SAP system. The steps to achieve this are explained below. Before updating the UUID in the SAP HANA system, the user profile in the SU01 screen appears as shown in the screenshot below.<BR />SU01--&gt;Goto--&gt;External User ID(UID)</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_0-1767010597234.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356452i4161A4071731B134/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_0-1767010597234.png" alt="navya_shree2_0-1767010597234.png" /></span></P><P>Please note that in this scenario, we are not synchronizing SAP users to IAS and then syncing the UUID back to the HANA system. Since the UUIDs and users already exist in IAS as a result of the SuccessFactors integration, we will establish a one-way synchronization from IAS to SAP S/4HANA solely to push the UUID into the system</P><P>To push the UUID (Global User ID) to SAP system please follow below steps.</P><P><BR /><STRONG>Prerequisite:</STRONG><BR />1.&nbsp; Login to your Cloud Connector: Make sure your Cloud connectors connection from BTP to HANA has access to below BAPI/FM&nbsp;</P><UL><LI>PRGN_ROLE_GETLIST</LI><LI>BAPI_USER_GETLIST</LI><LI>BAPI_USER_GET_DETAIL</LI><LI>BAPI_USER_CREATE1</LI><LI>BAPI_USER_ACTGROUPS_ASSIGN</LI><LI>IDENTITY_MODIFY</LI><LI>BAPI_USER_DELETE</LI><LI>PRGN_ACTIVITY_GROUPS_LOAD_RFC</LI></UL><P>2. Create a technical user in SAP HANA, or reuse an existing technical user that is used to pull tasks for the Task Center. Ensure that this user is assigned the required role listed below. This technical user will be used to create the RFC destination in the BTP subaccount, which will later be used to create the target system in IAS</P><UL><LI>SAP_BC_JSF_COMMUNICATION</LI></UL><P>3. Create a RFC destination on the BTP account where your IAS is hosted by referring to below SAP guide.<BR /><A href="https://help.sap.com/docs/connectivity/sap-btp-connectivity-cf/create-rfc-destinations" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/connectivity/sap-btp-connectivity-cf/create-rfc-destinations</A></P><P><STRONG>Note:</STRONG> If you prefer to create the RFC destination in a different subaccount - perhaps within the same sub account as SAP Work Zone or the Task Center- ensure that you create an Identity Access Management (IAM) service instance in that subaccount. This is required so that the RFC destination you create is visible in the IAS administration console.<BR /><BR />After completing the prerequisites, log in to IAS and create the source and destination systems to perform the push.</P><P><STRONG>Creating Source system:</STRONG> Because the users are already available in IAS, select <STRONG>Local Identity Directory</STRONG> as the source system.<BR />Creating the Source system is straightforward.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_0-1767008453477.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356439iE721D5A04E25215A/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_0-1767008453477.png" alt="navya_shree2_0-1767008453477.png" /></span></P><pre class="lia-code-sample language-abap"><code>{ "user": { "mappings": [ { "sourcePath": "$.id", "targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']['userId']", "targetVariable": "entityIdSourceSystem" }, { "sourcePath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userUuid']", "targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userUuid']" }, { "sourcePath": "$.schemas", "targetPath": "$.schemas", "preserveArrayWithSingleElement": true }, { "sourcePath": "$.userName", "targetPath": "$.userName", "optional": true, "correlationAttribute": true }, { "sourcePath": "$.displayName", "targetPath": "$.displayName", "optional": true }, { "sourcePath": "$.groups", "targetPath": "$.groups", "optional": true, "preserveArrayWithSingleElement": true }, { "sourcePath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']", "targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']", "optional": true }, { "sourcePath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['sourceSystem']", "targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['sourceSystem']", "optional": true }, { "sourcePath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['sourceSystemId']", "targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['sourceSystemId']", "optional": true }, { "sourcePath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userId']", "targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userId']", "optional": true }, { "sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['employeeNumber']", "targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['employeeNumber']", "optional": true } ] }, "group": { "ignore": true, "mappings": [ { "sourcePath": "$.id", "targetVariable": "entityIdSourceSystem", "correlationAttribute": true }, { "sourcePath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']", "targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']" }, { "sourcePath": "$.displayName", "targetPath": "$.displayName" }, { "sourcePath": "$.members", "targetPath": "$.members", "optional": true, "preserveArrayWithSingleElement": true } ] } }</code></pre><P><BR /><STRONG>Create Target system:</STRONG>&nbsp;Here our target is SAP HANA. below refer below screenshots and code snippet to create the same. here the target system type is&nbsp;SAP Application Server ABAP. and please select the destination which you created in prerequisite step 3.<BR />Make sure you skip operations for delete and create as we trying to do update only and you can also update the alias(email), groups roles to S4HANA along with UUID but here i am only focusing on UUID.<BR /><BR /></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_1-1767008671705.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356444i3F6448B3BB285AC3/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_1-1767008671705.png" alt="navya_shree2_1-1767008671705.png" /></span></P><pre class="lia-code-sample language-abap"><code>{ "user": { "skipOperations": [ "create", "delete" ], "mappings": [ { "sourceVariable": "entityIdTargetSystem", "targetPath": "$.USERNAME" }, { "sourcePath": "$.userName", "targetPath": "$.USERNAME" }, { "sourcePath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userUuid']", "targetPath": "$.SAPUSER_UUID.SAP_UID" }, { "constant": "updateEntity", "targetVariable": "operationTypeVariable" }, { "constant": "createEntity", "targetVariable": "operationTypeVariable", "scope": "createEntity" }, { "condition": "$.active == false &amp;&amp; '${operationTypeVariable}' == 'createEntity'", "constant": "X", "targetPath": "$.LOCK_LOCALLY" }, { "condition": "'${operationTypeVariable}' == 'updateEntity'", "constant": "U", "targetPath": "$.LOCK" }, { "condition": "$.active == false &amp;&amp; '${operationTypeVariable}' == 'updateEntity'", "constant": "L", "targetPath": "$.LOCK" } ] } }</code></pre><P>Once the source and target systems are created, open the source system and perform a test run for a single user to ensure that everything is working correctly. After successful validation, you can remove the user filter and perform a mass update for all users in the system.<BR /><BR /></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_0-1767008999198.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356445iB45F09A6EA31BA4D/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_0-1767008999198.png" alt="navya_shree2_0-1767008999198.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_2-1767009113766.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356447iBE0085F23015ED91/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_2-1767009113766.png" alt="navya_shree2_2-1767009113766.png" /></span></P><P>Once the update is completed you will be able to see UUID in SU01 user profile as below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_1-1767010698860.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356453i8AD86CDB937DD320/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_1-1767010698860.png" alt="navya_shree2_1-1767010698860.png" /></span></P><P><BR />Also, The&nbsp;Task Center pull cache will have UUID for the processor field instead of the SAP user name and Tasks will be shown in the Task center as below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_3-1767009382945.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356449iF64088A2EC869FAE/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_3-1767009382945.png" alt="navya_shree2_3-1767009382945.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="navya_shree2_0-1767010251154.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/356450iA08EE5FF60B1BCC7/image-size/medium?v=v2&amp;px=400" role="button" title="navya_shree2_0-1767010251154.png" alt="navya_shree2_0-1767010251154.png" /></span></P><P>&nbsp;</P><H2 id="toc-hId-1374512292"><STRONG>Conclusion:</STRONG></H2><P>An empty Task Center—despite correct backend task creation and successful pull cache entries—can be misleading and time-consuming to troubleshoot. As demonstrated in this blog, the root cause is often the absence of a UUID in the SAP S/4HANA user master, which prevents the Task Center from resolving the task processor correctly.</P><P>By ensuring that the Global User ID (UUID) is pushed from IAS to SAP S/4HANA through a one-way synchronization, this issue can be resolved effectively without impacting existing user provisioning or SuccessFactors integrations. Once the UUID is updated in the SU01 user profile, the Task Center pull cache correctly reflects the UUID, and tasks become visible in the Task Center application as expected.</P><P>I hope this blog helps you avoid common pitfalls during Task Center setup and saves valuable troubleshooting time. Feel free to share your feedback or experiences, and happy learning!</P><P>Thanks and Regards,<BR />Navyashree</P><P>&nbsp;</P><P><BR /><BR /></P><P>&nbsp;</P><P>&nbsp;</P> 2026-01-01T05:41:20.344000+01:00 https://community.sap.com/t5/abap-blog-posts/understanding-gos-attachments-and-their-backend-tables-in-sap-abap/ba-p/14298036 Understanding GOS Attachments and Their Backend Tables in SAP ABAP 2026-01-11T23:43:57.119000+01:00 juveria_sap_integrity https://community.sap.com/t5/user/viewprofilepage/user-id/2271579 <H3 id="toc-hId-1896617284"><STRONG>Introduction</STRONG></H3><P>Generic Object Services (GOS) play a crucial role in SAP by allowing users to attach documents, notes, and URLs to business objects such as Purchase Orders, Accounting Documents, Materials, and Customer Masters.<BR />For ABAP developers and functional consultants, understanding how these attachments are stored and retrieved at the database level is essential for reporting, audits, migrations, and enhancements.</P><P>This article explains the<SPAN>&nbsp;</SPAN><STRONG>core tables, object relationships, and practical ABAP insights</STRONG><SPAN>&nbsp;</SPAN>related to GOS attachments.</P><HR /><H3 id="toc-hId-1700103779"><STRONG>What Are GOS Attachments?</STRONG></H3><P>GOS (Generic Object Services) enables users to:</P><UL><LI><P>Attach files (PDF, Excel, etc.)</P></LI><LI><P>Create notes</P></LI><LI><P>Link external documents</P></LI></UL><P>These attachments are visible via<SPAN>&nbsp;</SPAN><STRONG>Services for Object</STRONG><SPAN>&nbsp;</SPAN>in SAP GUI transactions like:</P><UL><LI><P>ME23N (Purchase Order)</P></LI><LI><P>FB03 (Accounting Document)</P></LI><LI><P>MM03 (Material Master)</P></LI></UL><HR /><H3 id="toc-hId-1503590274"><STRONG>Key Tables Used for GOS Attachments</STRONG></H3><H4 id="toc-hId-1436159488"><STRONG>1. SRGBTBREL – Relationship Table</STRONG></H4><P>This is the<SPAN>&nbsp;</SPAN><STRONG>most important table</STRONG><SPAN>&nbsp;</SPAN>for GOS.</P><UL><LI><P>Stores the relationship between:</P><UL><LI><P>Business Object (e.g., BUS2012, BKPF, KNA1)</P></LI><LI><P>Attachment or note</P></LI></UL></LI><LI><P>Common fields:</P><UL><LI><P><CODE>TYPEID_A</CODE><SPAN>&nbsp;</SPAN>– Business object type</P></LI><LI><P><CODE>INSTID_A</CODE><SPAN>&nbsp;</SPAN>– Object key (e.g., PO number, document number)</P></LI><LI><P><CODE>RELTYPE</CODE><SPAN>&nbsp;</SPAN>– ATTA (Attachment), NOTE, URL</P></LI></UL></LI></UL><P><span class="lia-unicode-emoji" title=":white_heavy_check_mark:">✅</span> Used to<SPAN>&nbsp;</SPAN><STRONG>check whether an attachment exists</STRONG>.</P><HR /><H4 id="toc-hId-1239645983"><STRONG>2. SOOD / SOFM / SOC3 (SAPoffice Documents)</STRONG></H4><UL><LI><P>Stores SAPoffice document metadata and content</P></LI><LI><P>Often used when attachments are created as<SPAN>&nbsp;</SPAN><STRONG>SAPoffice objects</STRONG></P></LI><LI><P>Can be read using:</P><UL><LI><P><CODE>SO_OBJECT_READ</CODE></P></LI><LI><P><CODE>SO_DOCUMENT_READ_API1</CODE></P></LI></UL></LI></UL><HR /><H4 id="toc-hId-1043132478"><STRONG>3. DRAD (DMS-Based Attachments)</STRONG></H4><P>If attachments are stored using<SPAN>&nbsp;</SPAN><STRONG>Document Management System (DMS)</STRONG>:</P><UL><LI><P>Table:<SPAN>&nbsp;</SPAN><CODE>DRAD</CODE></P></LI><LI><P>Object key may contain:</P><UL><LI><P>Material Number</P></LI><LI><P>Equipment</P></LI><LI><P>Other master data keys</P></LI></UL></LI></UL><HR /><H3 id="toc-hId-717536254"><STRONG>How to Identify Attachments for a Business Object</STRONG></H3><P>Example:<SPAN>&nbsp;</SPAN><STRONG>Purchase Order (ME23N)</STRONG></P><UL><LI><P>Business Object:<SPAN>&nbsp;</SPAN><CODE>BUS2012</CODE></P></LI><LI><P>Table:<SPAN>&nbsp;</SPAN><CODE>SRGBTBREL</CODE></P></LI><LI><P>Filter:</P><UL><LI><P><CODE>TYPEID_A = 'BUS2012'</CODE></P></LI><LI><P><CODE>INSTID_A = &lt;PO Number&gt;</CODE></P></LI></UL></LI></UL><P>If an entry exists → attachment is present.</P><HR /><H3 id="toc-hId-521022749"><STRONG>Common Use Cases</STRONG></H3><UL><LI><P>Audit reports to find documents<SPAN>&nbsp;</SPAN><STRONG>without attachments</STRONG></P></LI><LI><P>Mass download of attachments</P></LI><LI><P>Migration from Content Server / FileNet / SharePoint</P></LI><LI><P>Custom reports showing attachment count</P></LI><LI><P>Enhancing attachment list display</P></LI></UL><HR /><H3 id="toc-hId-324509244"><STRONG>Important Notes</STRONG></H3><UL><LI><P>There is<SPAN>&nbsp;</SPAN><STRONG>no direct T-code to attachment mapping</STRONG></P></LI><LI><P>Attachments are linked to<SPAN>&nbsp;</SPAN><STRONG>Business Objects</STRONG>, not transactions</P></LI><LI><P>Same attachment can be visible in multiple transactions</P></LI></UL><HR /><H3 id="toc-hId-127995739"><STRONG>Conclusion</STRONG></H3><P>Understanding GOS attachment architecture helps SAP professionals build robust reports, support audits, and design scalable document solutions.<BR />Tables like<SPAN>&nbsp;</SPAN><STRONG>SRGBTBREL, SOOD, and DRAD</STRONG><SPAN>&nbsp;</SPAN>are essential tools in every ABAP developer’s toolkit.</P><P>If you frequently work with attachments, mastering these relationships will save significant time and effort.</P> 2026-01-11T23:43:57.119000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/configure-role-owner-stage-auto-approval-in-sap-iag/ba-p/14308750 Configure Role Owner Stage Auto Approval in SAP IAG 2026-01-23T06:15:25.857000+01:00 SuryaPrakash_Machavarapu https://community.sap.com/t5/user/viewprofilepage/user-id/2274419 <P><STRONG>Introduction</STRONG></P><P>This blog explains how to configure Role Owner Stage Auto Approval in IAG. focusing on setting up the required data objects, business rules, and workflow configuration to automate approvals.</P><P><STRONG>Step 1: Create Data Object</STRONG></P><P>Create a data object called <STRONG>RoleOwnerAttributes</STRONG>. This object holds the input values used to determine whether the Role Owner stage should be automatically approved.</P><P>Add the following attributes to the data object:</P><UL><LI>roleName (String)</LI><LI>roleCriticality (String)</LI><LI>roleApprover (String)</LI><LI>roleBusinessProcess (String)</LI><LI>roleSubprocess (String)</LI><LI>roleRiskCount (Number)<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_0-1769169958942.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364560iDF3842AFE0B0991C/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_0-1769169958942.png" alt="SuryaPrakash_Machavarapu_0-1769169958942.png" /></span><P>&nbsp;</P></LI></UL><P><STRONG>Step 2: Create another Data Object&nbsp;</STRONG></P><P>Create another data object called <STRONG>AutoApproveRoleOwnerStage</STRONG>. This object stores the output of the rule.</P><P>Add the following attributes to the data object:</P><UL><LI>roleName (String)</LI><LI>roleOwnerAutoStage (Boolean)<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_1-1769169958949.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364561i1F32A140A8F35A87/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_1-1769169958949.png" alt="SuryaPrakash_Machavarapu_1-1769169958949.png" /></span><P>&nbsp;</P></LI></UL><P><BR /><STRONG>Step 3: Create Local Rule</STRONG><BR />Create a local rule called&nbsp;<STRONG>RoleOwnerStageAutoRule</STRONG></P><P>decision table settings:</P><UL><LI>Use the fields from <STRONG>RoleOwnerAttributes</STRONG> (Step 1) as the <STRONG>conditions</STRONG>.</LI><LI>Use <STRONG>AutoApproveRoleOwnerStage</STRONG> (Step 2) as the <STRONG>result</STRONG>.</LI></UL><P>Result Attributes:</P><UL><LI>Role Owner Auto Stage → Access: <STRONG>Editable</STRONG></LI><LI>Role Name → Access: <STRONG>Hidden</STRONG></LI><LI>Set the hardcoded value as the <STRONG>roleName from RoleOwnerAttributes.</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_2-1769169958959.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364562i1A27DAB1957F3995/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_2-1769169958959.png" alt="SuryaPrakash_Machavarapu_2-1769169958959.png" /></span><SPAN>In this scenario, the condition is defined based on the Role Name.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_3-1769169958966.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364565i6E32B7A8800AFA8E/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_3-1769169958966.png" alt="SuryaPrakash_Machavarapu_3-1769169958966.png" /></span></P><P>&nbsp;</P><P>Step 4: Create Rule Set</P><P>Create a rule set called <STRONG>RoleOwnerRuleSet&nbsp;</STRONG> and add the local rule <STRONG>RoleOwnerStageAutoRule</STRONG> (from Step 3) to it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_4-1769169958971.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364563i4EBBE1941F1C56D3/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_4-1769169958971.png" alt="SuryaPrakash_Machavarapu_4-1769169958971.png" /></span></P><P>&nbsp;</P><P><STRONG>Step 5: Create Rule Service</STRONG></P><P>Create a rule service called&nbsp;<STRONG>AutoApproveRoleOwnerStage</STRONG>.</P><UL><LI><STRONG>Input</STRONG> → RoleOwnerAttributes (from Step 1)</LI><LI><STRONG>Result</STRONG> → AutoApproveRoleOwnerStage (from Step 2)</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_5-1769169958976.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364564iF128A564D349DC4A/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_5-1769169958976.png" alt="SuryaPrakash_Machavarapu_5-1769169958976.png" /></span></P><P>&nbsp;</P><P><STRONG>Step 6: Assign Rule Service</STRONG></P><P>Assign the rule service <STRONG>AutoApproveRoleOwnerStage</STRONG> (from Step 5) to the rule set <STRONG>RoleOwnerRuleSe</STRONG>t (from Step 4).</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_6-1769169958981.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364566i669B685D247F8FD9/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_6-1769169958981.png" alt="SuryaPrakash_Machavarapu_6-1769169958981.png" /></span></P><P>&nbsp;</P><P><STRONG>Step 7: Activate and Deploy</STRONG></P><P>Activate all the created objects and deploy the business rule service. If any changes are made, the service must be deployed again.</P><P><STRONG>Existing Workflow Setup</STRONG></P><P>In the current existing workflow, the access request is configured to follow the Role Owner approval path as the stage 1&nbsp;during the approval process.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_7-1769169958987.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364568i454F979113C3606B/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_7-1769169958987.png" alt="SuryaPrakash_Machavarapu_7-1769169958987.png" /></span></P><P>&nbsp;</P><P><STRONG>Testing Scenario</STRONG></P><P>The following test scenario was performed to validate the configuration:</P><UL><LI>An access request was raised for the role PR_approver_0_1M.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_8-1769169958991.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364567i574F015F3DBE1147/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_8-1769169958991.png" alt="SuryaPrakash_Machavarapu_8-1769169958991.png" /></span></LI><LI>The audit log shows that the request was automatically approved by the system.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_9-1769169958997.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364570i2E564CBDA85D6276/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_9-1769169958997.png" alt="SuryaPrakash_Machavarapu_9-1769169958997.png" /></span></LI><LI>The Access request status shows that it moved to the Risk Owner stage, confirming that the Role Owner stage was automatically approved successfully.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SuryaPrakash_Machavarapu_10-1769169959002.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364569i989392EC4F87CEC6/image-size/large?v=v2&amp;px=999" role="button" title="SuryaPrakash_Machavarapu_10-1769169959002.png" alt="SuryaPrakash_Machavarapu_10-1769169959002.png" /></span></LI></UL><P><STRONG>Conclusion</STRONG></P><P>Role Owner stage auto approval reduces manual effort and speeds up the approval process for eligible access requests. Using rule-based conditions, organizations can automatically approve condition based requests while keeping manual approvals for critical cases.</P> 2026-01-23T06:15:25.857000+01:00 https://community.sap.com/t5/financial-management-blog-posts-by-sap/what-s-new-in-sap-cloud-identity-access-governance/ba-p/14321051 What’s New in SAP Cloud Identity Access Governance 2026-02-03T23:52:32.042000+01:00 ElyasAhmed https://community.sap.com/t5/user/viewprofilepage/user-id/1886529 <P><STRONG>Strengthening Access Visibility, Automation, and Governance</STRONG></P><P>As organizations continue to modernize their system landscapes, access governance must adapt to increasing complexity. Managing users, roles, groups, and entitlements across hybrid and cloud environments calls for clearer visibility, smarter integration options, and dependable audit support.</P><P>The <STRONG>Q4 2025</STRONG> updates to <STRONG>SAP Cloud Identity Access Governance (IAG) i</STRONG>ntroduce a fresh set of enhancements spanning application integrations, APIs, job management, and reporting. These additions bring more flexibility, improved insight into access data, and expanded options for governing access. As a result, this helps teams work more efficiently as their environments grow and evolve.</P><P>Let’s take a closer look at what’s new in this release!</P><P>&nbsp;</P><P><STRONG>Seamless Application Integration with SAP HANA Cloud</STRONG></P><P>SAP Cloud Identity Access Governance now supports deeper integration with SAP HANA Cloud, enabling synchronization of users, groups, and group authorizations. This integration lays the foundation for consistent access governance by supporting risk assessment, user provisioning with group assignments, and certification processes, all from a centralized governance layer.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_0-1770158616210.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368710iFB1EA40B5F119714/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_0-1770158616210.png" alt="ElyasAhmed_0-1770158616210.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/3c7e891872a547b182587c4814b2d783.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P>&nbsp;</P><P><STRONG>User Filter Support Across All Applications</STRONG></P><P>User filter functionality is now extended to all SAP Cloud Identity Access Governance integration scenarios. This enhancement allows customers to exclude users who do not need to be governed, ensuring governance efforts remain focused and effective.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_1-1770158667498.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368711i768A9697FE4C18E6/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_1-1770158667498.png" alt="ElyasAhmed_1-1770158667498.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/cdf3eee6159c4e48aad7833e5a442211.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P>&nbsp;</P><P><STRONG>Enhanced Access Request API for Greater Flexibility</STRONG></P><P>The Access Request API has been enhanced by removing the mandatory domain field and introducing flexible user identification options. Users can now be retrieved using identifiers such as email, global user ID, or a universal search parameter.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_2-1770158714433.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368712iADC8CC12E6D81F84/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_2-1770158714433.png" alt="ElyasAhmed_2-1770158714433.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/83f383d3123c4f57b036d2707ec2e730/6e1721dfad2344a4b70d6d73d322a13b.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P>&nbsp;</P><P><STRONG>Manage Jobs - Change History Visibility</STRONG></P><P>A new change history capability has been introduced in the Manage Jobs application. Administrators can now view updates made to jobs, including pause and resume actions, as well as the users responsible for those changes.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_3-1770158752324.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368713iF3C472B5ED5B072B/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_3-1770158752324.png" alt="ElyasAhmed_3-1770158752324.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/9621f10c676c497a8355b7e36053e837/993181201218426db2319e876bf92b9f.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P>&nbsp;</P><P><STRONG>Business Role Coverage Report</STRONG></P><P>The new Business Role Coverage Report provides clear insights into how user roles are mapped within business roles. With smart filters, intuitive selection tools, and easy download options, administrators can quickly identify gaps and ensure proper role coverage.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_4-1770158785078.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368714i27B4A1C3CFBECE9F/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_4-1770158785078.png" alt="ElyasAhmed_4-1770158785078.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/0690d9da060b452f92f6628376e7f56d.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P>&nbsp;</P><P><STRONG>Unassociated Access Report</STRONG></P><P>Embedded within the Business Coverage Report, the Unassociated Access Report helps administrators identify roles and groups that are not linked to any business roles. Users can drill down into details and refine searches using smart filters to pinpoint specific unassociated accesses.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_5-1770158826506.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368715iA448A3C632794958/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_5-1770158826506.png" alt="ElyasAhmed_5-1770158826506.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/540abcfcb8e44a5ca5251832a72f6f27.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P>&nbsp;</P><P><STRONG>Access Report</STRONG></P><P>The Access Report provides a comprehensive view of all users along with their assigned and unassigned accesses. It also shows how accesses relate to business roles, making it easier to validate access origins and appropriateness.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_6-1770158872132.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368716i3BA20A7792EE2FED/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_6-1770158872132.png" alt="ElyasAhmed_6-1770158872132.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/48ffa3fca6c54a18b4f406e6f0a049a7.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P>&nbsp;</P><P><STRONG>Access Usage Report</STRONG></P><P>The new Access Usage Report combines the functionality of the previously separate Unused Access and Actively Used Access reports into a single unified view. It supports on-premise and ABAP-based systems, including SAP HANA on-premise and SAP ERP.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ElyasAhmed_7-1770158904053.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368717i86C413A17ADB066D/image-size/medium?v=v2&amp;px=400" role="button" title="ElyasAhmed_7-1770158904053.png" alt="ElyasAhmed_7-1770158904053.png" /></span></P><P>Please refer to the following for more information: <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/96f4b1ec2df9455492adaec07e6029f4/52812dfd4b304dba8a7f4bb31279c2fd.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Help Portal Documentation</A></P><P><STRONG>&nbsp;</STRONG></P><P><STRONG>Closing Thoughts</STRONG></P><P>These enhancements mark another strong step forward for <STRONG>SAP Cloud Identity Access Governance</STRONG>, bringing greater clarity, flexibility, and control to how organizations manage access across increasingly complex landscapes. From deeper integrations and APIs to unified reporting and stronger audit transparency, this release is designed to help teams govern access with confidence, efficiency, and precision.</P><P>As access governance continues to evolve alongside cloud and hybrid environments, SAP Cloud Identity Access Governance remains committed to delivering practical, scalable innovations that reduce risk, simplify operations, and support compliance at every stage. We’re excited to see how these capabilities help you strengthen your governance processes, and we look forward to continuing this journey with you as even more improvements arrive in upcoming releases.</P><P data-unlink="true">For more details and configuration guidance, please refer to the <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE?version=CLOUDFOUNDRY" target="_self" rel="noopener noreferrer">SAP Help Portal</A> documentation for SAP Cloud Identity Access Governance.</P> 2026-02-03T23:52:32.042000+01:00