https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/SAP-Cloud-Identity-Access-Governance-blog-posts.xml SAP Community - SAP Cloud Identity Access Governance 2024-05-20T11:12:24.749384+00:00 python-feedgen SAP Cloud Identity Access Governance blog posts in SAP Community https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-identity-access-governance-iag-integration-with-identity/ba-p/13562764 SAP Cloud Identity Access Governance (IAG) integration with Identity Authentication Service (IAS) 2023-06-17T16:48:16+02:00 muthu_kumar https://community.sap.com/t5/user/viewprofilepage/user-id/137199 In this blog I will go through the steps to Integrate IAG with IAS.<BR /> <BR /> SAP Cloud Identity Access Governance is a cloud-based service for creating self-service requests to applications for on-premise and cloud source applications and systems. By connecting to the SAP Cloud Identity Access Governance solution, it enables Identity Authentication users to initiate access requests, which are then provisioned to target applications.<BR /> <BR /> <STRONG>Prerequisite</STRONG>: IAG Administrator, IAS &amp; IPS administrator or knowledge in IAS &amp; IPS is preferred to do this setup.<BR /> <BR /> <STRONG>Make sure you completed initial setup for IAG (IAS and IPS enablement) in IAG before following the below steps.</STRONG><BR /> <DIV><BR /> <DIV><BR /> <DIV data-v-0e3cd7da=""><BR /> <H2 id="topic-title" id="toc-hId-962975846">Process Overview</H2><BR /> </DIV><BR /> <DIV data-v-99f69c78="" data-v-0e3cd7da="" aria-labelledby="topic-title"><BR /> <P class="shortdesc">There are four overall steps to enable integration between Identity Authentication Service (SAP IAS) and the SAP Cloud Identity Access Governance solution and its services:</P><BR /> <BR /> <DIV><BR /> <OL id="loio9d30b67e18c041d1913f286afc622eb8__ol_cnl_k3y_y3b" class="ol"><BR /> <LI class="li"><BR /> <P class="p">Connect Identity Provisioning with IAG</P><BR /> </LI><BR /> <LI>Create Proxy System for IAS In the IPS</LI><BR /> <LI class="li"><BR /> <P class="p">Create an instance for Cloud Foundry in the IAG</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Run the repository synch job&nbsp;to sync user data and provision access requests.</P><BR /> </LI><BR /> </OL><BR /> <H3 id="toc-hId-895545060">1.Connect Identity Provisioning with IAG</H3><BR /> The following step is applicable for an Identity Provisioning bundle tenant was created or updated on the SAP Cloud Identity (SCI) platform for use with SAP Cloud Identity Access Governance.<BR /> <P class="p">The URL for Identity Provisioning is as follows:</P><BR /> <P class="p"><SPAN class="ph emphasis emphasis"><A href="https://UNIQUEID.accounts.ondemand.com/ips" target="test_blank" rel="nofollow noopener noreferrer">https://UNIQUEID.accounts.ondemand.com/ips</A></SPAN></P><BR /> <BR /> <OL><BR /> <LI class="li"><BR /> <P class="p">Login to the IAS &gt; User &amp; Authorizations &gt; Administrators &gt; Add System user and provide the Access Proxy System API access. Note down the Client ID and Secret ( Once Secret is generated, you cannot retrieve or change it.)</P><BR /> </LI><BR /> <LI>Login to the IAG BTP Subaccount and create a destination with the name&nbsp;<SPAN class="ph uicontrol">IPS_PROXY</SPAN>&nbsp;as shown in the table below.</LI><BR /> <LI class="li"><BR /> <P class="p">Enter the&nbsp;<SPAN class="ph uicontrol">Properties</SPAN>&nbsp;listed in the table below for the destination. All properties must be entered. Some properties must be added as&nbsp;<SPAN class="ph uicontrol">Additional Properties</SPAN>.&nbsp;<STRONG>Copy the names of all properties as displayed. Property names and values are case sensitive.</STRONG></P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Check the Use default JDK truststore checkbox.</P><BR /> </LI><BR /> <LI>Save your entries.You can test the destination in the BTP Cockpit. However, the URL does not point to a valid API for Identity Provisioning, and shows green status, but HTTP 301 or similar.</LI><BR /> </OL><BR /> <TABLE id="loio2f35348ac2514c5b85f59903a9b46152__table_fhb_h1g_fpb" class="table" border="1" summary="" width="542" rules="all" data-table-id="table_fhb_h1g_fpb"><BR /> <TBODY class="tbody"><BR /> <TR class="row"><BR /> <TD class="entry">Name</TD><BR /> <TD class="entry">IPS_PROXY</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">Type</TD><BR /> <TD class="entry">HTTP</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">Description</TD><BR /> <TD class="entry">IPS Destination</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">URL</TD><BR /> <TD class="entry"><A href="https://&lt;&lt;YOUR_IPS_URL_BUT_WITHOUT_THE__ips&gt;&gt;" target="test_blank" rel="nofollow noopener noreferrer">https://&lt;&lt;YOUR_IPS_URL_BUT_WITHOUT_THE__ips&gt;&gt;</A>; (For example: <A href="https://UNIQUEID.accounts.ondemand.com" target="test_blank" rel="nofollow noopener noreferrer">https://UNIQUEID.accounts.ondemand.com</A></TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">Proxy Type</TD><BR /> <TD class="entry">Internet</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">Authentication</TD><BR /> <TD class="entry">BasicAuthentication</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">User</TD><BR /> <TD class="entry">&lt;&lt;CLIENT_ID_FROM_STEP_1_ABOVE&gt;&gt;</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">Password</TD><BR /> <TD class="entry">&lt;&lt; SECRET_FROM_STEP 1_ABOVE&gt;&gt;</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">Accept</TD><BR /> <TD class="entry">application/scim+json</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">GROUPSURL</TD><BR /> <TD class="entry">/Groups</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">serviceURL</TD><BR /> <TD class="entry">/ipsproxy/service/api/v1/scim/</TD><BR /> </TR><BR /> <TR class="row"><BR /> <TD class="entry">USERSURL</TD><BR /> <TD class="entry">/Users</TD><BR /> </TR><BR /> </TBODY><BR /> </TABLE><BR /> <H3 id="toc-hId-699031555">2.Create Proxy System for IAS In the IPS</H3><BR /> Need to create a proxy system to enable Identity authentication service to connect with the IAG Subaccount. Before creating proxy system, please set up the technical user (of type <SPAN class="ph uicontrol">System</SPAN>) in&nbsp;<SPAN class="ph pname">Identity Authentication</SPAN>&nbsp;and assign this user the necessary authorizations.<BR /> <H4 id="toc-hId-631600769"><STRONG>2.1) How to create a technical user in IAS?</STRONG></H4><BR /> <UL><BR /> <LI>In SAP Cloud Identity Services admin console, navigate to&nbsp;<SPAN class="ph menucascade"><SPAN class="ph uicontrol">Users &amp; Authorizations</SPAN> &gt;&nbsp;<SPAN class="ph uicontrol">Administrators</SPAN></SPAN>.</LI><BR /> <LI>Add an administrator user of type&nbsp;<SPAN class="ph emphasis emphasis">System</SPAN> and configure the basic authentication method for this user.</LI><BR /> </UL><BR /> <STRONG style="font-size: 1rem">Please note down the Client Id, Secret from the system user once it created.</STRONG><BR /> <BR /> </DIV><BR /> </DIV><BR /> <DIV data-v-99f69c78="" data-v-0e3cd7da="" aria-labelledby="topic-title"><BR /> <DIV><BR /> <H4 id="toc-hId-435087264">2.2) Create<STRONG>&nbsp;a Proxy System</STRONG></H4><BR /> <OL id="loio48a26ba670724f148b16e0de48d4f8c1__ol_lf5_5qy_y3b" class="ol"><BR /> <LI class="li"><BR /> <P class="p">Open your&nbsp;<SPAN class="ph uicontrol">Identity Provisioning Launchpad</SPAN>.</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Copy the external system ID and use it to set up the Cloud Foundry instance in the&nbsp;<SPAN class="ph uicontrol">Systems</SPAN>&nbsp;app.</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Add a proxy system for IAS and choose <SPAN class="ph uicontrol">Save</SPAN>. The&nbsp;<SPAN class="ph uicontrol">Type</SPAN> should be Identity Authentication</P><BR /> <BR /> <DIV data-v-61339f50=""><BR /> <DIV data-v-61339f50=""><BR /> <TABLE id="loio48a26ba670724f148b16e0de48d4f8c1__table_cwh_2yy_jnb" class="table" style="height: 70px" border="1" summary="" rules="all" data-table-id="table_cwh_2yy_jnb"><COLGROUP> <COL width="34.96503496503496%" /> <COL width="65.03496503496503%" /></COLGROUP><BR /> <THEAD class="thead"><BR /> <TR class="row" style="height: 14px"><BR /> <TH id="d26468e66" class="entry" style="width: 127px;height: 14px"></TH><BR /> <TH id="d26468e68" class="entry" style="width: 238px;height: 14px"></TH><BR /> </TR><BR /> </THEAD><BR /> <TBODY class="tbody"><BR /> <TR class="row" style="height: 14px"><BR /> <TD class="entry" style="width: 127px;height: 14px" headers="d26468e66 ">Type</TD><BR /> <TD class="entry" style="width: 238px;height: 14px" headers="d26468e68 ">Identity Authentication</TD><BR /> </TR><BR /> <TR class="row" style="height: 14px"><BR /> <TD class="entry" style="width: 127px;height: 14px" headers="d26468e66 ">System Name</TD><BR /> <TD class="entry" style="width: 238px;height: 14px" headers="d26468e68 ">&lt;Free text&gt;</TD><BR /> </TR><BR /> <TR class="row" style="height: 14px"><BR /> <TD class="entry" style="width: 127px;height: 14px" headers="d26468e66 ">Destination Name</TD><BR /> <TD class="entry" style="width: 238px;height: 14px" headers="d26468e68 "></TD><BR /> </TR><BR /> <TR class="row" style="height: 14px"><BR /> <TD class="entry" style="width: 127px;height: 14px" headers="d26468e66 ">Description</TD><BR /> <TD class="entry" style="width: 238px;height: 14px" headers="d26468e68 ">&lt;Free text&gt;</TD><BR /> </TR><BR /> </TBODY><BR /> </TABLE><BR /> </DIV><BR /> <DIV><BR /> <DIV><BR /> <DIV></DIV><BR /> </DIV><BR /> <DIV><BR /> <DIV></DIV><BR /> </DIV><BR /> </DIV><BR /> </DIV></LI><BR /> <LI class="li"><BR /> <P class="p"><SPAN class="ph uicontrol">Enter the Properties as shown in below table</SPAN></P><BR /> <BR /> <TABLE id="loiofef74f6574214bec980c4ee2fb4d107a__table_cdw_yvd_5gb" class="table" border="1" summary="" rules="all" data-table-id="table_cdw_yvd_5gb"><COLGROUP> <COL width="100%" /></COLGROUP><BR /> <TBODY class="tbody"><BR /> <TR class="row"><BR /> <TD class="entry"><BR /> <P class="p"><SPAN class="keyword parmname">Type</SPAN>=<SPAN class="ph uicontrol">HTTP</SPAN></P><BR /> <P class="p"><SPAN class="keyword parmname">Authentication</SPAN>=<SPAN class="ph uicontrol">BasicAuthentication</SPAN></P><BR /> <P class="p"><SPAN class="keyword parmname">ProxyType</SPAN>=<SPAN class="ph uicontrol">Internet</SPAN></P><BR /> <P class="p"><SPAN class="keyword parmname">URL</SPAN>= Specify the URL of the <SPAN class="ph pname">Identity Authentication</SPAN>&nbsp;tenant of your company.</P><BR /> <P class="p">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; For example: <SPAN class="ph emphasis emphasis"><A href="https://mytenant.accounts.ondemand.com" target="test_blank" rel="nofollow noopener noreferrer">https://mytenant.accounts.ondemand.com</A></SPAN></P><BR /> <P class="p"><SPAN class="keyword parmname">User</SPAN>=&lt;&lt;CLIENT_ID_FROM_STEP_2.1_ABOVE&gt;&gt;</P><BR /> <P class="p"><SPAN class="keyword parmname">Password</SPAN>=&lt;&lt; SECRET_FROM_STEP 2.1_ABOVE&gt;&gt;</P><BR /> ias.api.version=2<BR /> <BR /> ias.support.patch.operation=true<BR /> <BR /> ips.trace.failed.entity.content=false</TD><BR /> </TR><BR /> </TBODY><BR /> </TABLE><BR /> </LI><BR /> </OL><BR /> <H3 id="toc-hId-109491040">3.Create an instance for IAS in the IAG</H3><BR /> <OL id="loio48a26ba670724f148b16e0de48d4f8c1__ol_lf5_5qy_y3b" class="ol"><BR /> <LI class="li"><BR /> <P class="p">Log into the SAP Cloud Identity Access Governance launchpad and open the&nbsp;<SPAN class="ph uicontrol">Application</SPAN>&nbsp;app.</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Create a system for IAS. For <SPAN class="ph uicontrol">System Type</SPAN>, select&nbsp;<SPAN class="ph uicontrol">IAS</SPAN>.</P><BR /> </LI><BR /> <LI>Enter the external system ID mentioned in step 2.2 in the section&nbsp;<SPAN class="ph uicontrol">Create Proxy system</SPAN>&nbsp;and&nbsp;<SPAN class="ph uicontrol">Save</SPAN>.</LI><BR /> </OL><BR /> <H3 id="toc-hId--87022465">4.Run the repository synch job&nbsp;to sync user data and provision access requests.</H3><BR /> <P class="p">In the SAP Cloud Identity Access Governance launchpad, open the&nbsp;<SPAN class="ph uicontrol">Job Scheduler</SPAN>&nbsp;app. In the&nbsp;<SPAN class="ph uicontrol">Job Category</SPAN>&nbsp;dropdown list, schedule the following jobs:</P><BR /> <BR /> <DIV><BR /> <UL id="loio356bc5187a3549ffbe81af353a13b6cd__ul_itx_blt_tdb" class="ul"><BR /> <LI class="li"><SPAN class="ph uicontrol">Repository Sync&nbsp;</SPAN>to synchronize the relevant data from Identity Authentication.</LI><BR /> <LI class="li">In the&nbsp;<SPAN class="ph uicontrol">System Type</SPAN>&nbsp;dropdown list, select&nbsp;<SPAN class="ph uicontrol">Identity Authentication V2</SPAN>.</LI><BR /> <LI class="li">In the&nbsp;<SPAN class="ph uicontrol">System</SPAN>&nbsp;dropdown list, select the configured&nbsp;<SPAN class="ph uicontrol">Identity Authentication V2</SPAN>&nbsp;system.</LI><BR /> </UL><BR /> </DIV><BR /> </DIV><BR /> <STRONG>Note:</STRONG><BR /> <BR /> If you are using IAG Standard edition and users are maintained in the IAS group IAG_WF_MANAGER, then they can be selected as managers in the access request.<BR /> <BR /> But if a user’s manager is directly maintained in ‘Employee Information’ – ‘Manager’, then it is not automatically retrieved in the access request.<BR /> <BR /> Example: The user TESTUSER has user MANAGER maintained as a manager. But MANAGERis not automatically populated in the access request in manager field.<BR /> <BR /> If managers are assigned manually to users in IAS, IAS needs to be set as User Source in IAG and the repository sync job needs to be run against IAS for retrieving user information such as email address, employee's manager..Please follow the below steps to make IAS as user source<BR /> <UL><BR /> <LI>Maintain IAS system in IAG in System app.</LI><BR /> <LI>Open the Configuration app and in Application Parameters, enter the IAS system under the Parameter Value for the UserSource.</LI><BR /> <LI>Run the repository sync against IAS</LI><BR /> <LI>Run the SCI User group sync</LI><BR /> </UL><BR /> <H3 class="note" aria-labelledby="n0t" id="toc-hId--283535970"><STRONG>Conclusion</STRONG></H3><BR /> These steps complete the Integration of IAS with IAG. Please check the help.sap.com for SAP Cloud Identity Access Governance for more detailed document on how to integrate IAS with IAG<BR /> <BR /> &nbsp;<BR /> <BR /> </DIV><BR /> <H3 id="toc-hId--480049475"><STRONG>References</STRONG></H3><BR /> <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/ea7cd136465b4f7db01cbc1ba2fe43d8.html?version=2302" target="_blank" rel="noopener noreferrer">SAP Documentation for IAS integration with IAG</A><BR /> <BR /> <A href="https://help.sap.com/docs/identity-provisioning/identity-provisioning/proxy-identity-authentication?version=Cloud" target="_blank" rel="noopener noreferrer">Proxy Settings for IAS</A><BR /> <BR /> <A href="https://launchpad.support.sap.com/#/notes/2924629" target="_blank" rel="noopener noreferrer">Manager from IAS not populated in Access Request</A><BR /> <BR /> Note: Please share your feedback or thoughts in a comment below or ask questions in the Q&amp;A tag area here about&nbsp;<A href="https://answers.sap.com/tags/73555000100800000334" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Access Governance.</A><BR /> <BR /> </DIV><BR /> <DIV><BR /> <DIV><BR /> <DIV><BR /> <DIV><BR /> <DIV><BUTTON id="sap-button-follow-hdr-id" class="sap-button-follow ds-button ds-button--primary ds-blog-post__social-action ds-blog-post__social-action--follow" title="You are not following this post. Click here to start following the post. " type="button" data-content-type="blogpost" data-content-id="1751715" data-nonce="6fd1505a22"><SPAN class="ds-button-text">Follow</SPAN></BUTTON><BUTTON class="ds-button ds-button--secondary ds-button--icon-button ds-blog-post__social-action likes-post-link ds-button--disabled" title="Like" type="button" data-nonce="e7ec8e83b6" data-post-id="1751715"><I class="ds-icon ds-icon--likes-outline ds-icon--regular ds-m-r-xs"></I><SPAN class="ds-button-text">Like</SPAN></BUTTON><BUTTON class="ds-button ds-button--secondary ds-button--icon-button ds-blog-post__social-action" title="RSS Feed" type="button"><I class="ds-icon ds-icon--rss-feed ds-icon--regular ds-m-r-xs"></I>RSS Feed</BUTTON></DIV><BR /> </DIV><BR /> </DIV><BR /> </DIV><BR /> </DIV><BR /> </DIV> 2023-06-17T16:48:16+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/3-ways-cfos-can-capitalize-on-ai-in-finance/ba-p/13553547 3 Ways CFOs can Capitalize on AI in Finance 2023-07-07T00:18:56+02:00 p0522patterson https://community.sap.com/t5/user/viewprofilepage/user-id/148962 Over the past few years, CFOs have been challenged like never before to manage costs through supply chain constraints, inventory issues, inflation, currency fluctuation, regulations and more. They're often relied upon to identify where costs can be optimized, resources re-allocated, and margins protected to be prepared to capitalize on new market opportunities. &nbsp;CFO’s are also increasingly enlisted in sustainability efforts, such as the <A href="https://www.sap.com/events/sapphire/news-guide/sustainability.html" target="_blank" rel="noopener noreferrer">green ledger</A>.<BR /> <BR /> Consequently, CFOs are looking for innovative technology to free their teams from routine tasks and arm them with greater foresight and control to increase productivity.<BR /> <BR /> We are here to help CFO’s with our unique approach to AI.<BR /> <BR /> At SAP, we deliver AI that is built into the SAP applications that power your most critical business processes. It works for your entire business because it is developed using extensive industry-specific data and deep process knowledge. Organizations can use it with confidence as it is created using responsible AI practices. In essence, <STRONG><B>SAP AI is AI built for business</B></STRONG>.<BR /> <H1 id="toc-hId-832997416"><STRONG>How to Turn AI Potential into Reality for Finance Departments</STRONG></H1><BR /> With AI-powered insights, recommendations, and automation built into your SAP applications, you can reap the rewards of AI by simply activating intelligent capabilities inside your existing applications. In a nutshell, you take advantage of AI that is designed to work with your data and business processes from the get-go.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/07/Screenshot-2023-07-10-at-11.29.27-AM.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Benefits of AI in Finance</P><BR /> For example, you can use AI to automate tedious tasks such as inputting invoices, tracking receivables, and logging payment transactions without requiring constant manual rule updates. AI can help you evaluate new business opportunities by enabling you to use scenario-based, iterative planning and forecasting in real time. Plus, you can leverage AI to proactively enforce policies and data quality standards, lowering your data disclosure risks and simplifying compliance. You can also use powerful predictive analytics models to devise payment and collection strategies. Plus, AI-powered business integrity screening and access governance further enhance your security and compliance.<BR /> <BR /> Let’s look in more detail at three ways CFOs can quickly capitalize on AI with SAP.<BR /> <H1 id="toc-hId-636483911"><STRONG>1. Grow Efficiency with AI-infused Business Processes </STRONG></H1><BR /> Leveraging business AI embedded in your finance applications can dramatically increase the productivity of your finance teams. Take the example of <A href="https://www.sap.com/documents/2022/10/0023e3d1-497e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener noreferrer">Accenture</A>. The company issues more than half a million client-facing invoices each year from 200 locations globally - and that volume is projected to increase exponentially every five years. By leveraging intelligence built into <A href="https://www.sap.com/products/financial-management/cash-application.html" target="_blank" rel="noopener noreferrer">SAP Cash Application</A> and SAP S/4HANA Cloud, the company can match invoices and payments faster, with fewer errors, and has increased its automatic clearing rate by more than 24%.<BR /> <BR /> Connecting AI to your business processes maximizes the value of your digitalization investments because automation and predictions can take advantage of transactional data and the business context in which that data is used. For example, when an accountant creates a journal entry, the AI capabilities in <A href="https://www.sap.com/products/erp.html" target="_blank" rel="noopener noreferrer">SAP S/4HANA Cloud</A> can automatically retrieve pertinent information, such cost centers or profit centers, to fill in mandatory fields, speeding up data entry and avoiding errors.<BR /> <BR /> A close connection between AI and business processes can also ensure that AI-based predictions and recommendations remain accurate over time. When AI capabilities are embedded into business processes, algorithms can more easily recognize changing business patterns, learn from human exception handling, and recommend retraining when performance can improve. Since AI algorithms automatically learn from past experiences, you no longer need to manually update obsolete rules to get accurate automation and insights.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/07/ca14.png_laptop.png" /></P><BR /> <P class="image_caption" style="text-align:center;font-style:italic;, Arial, sans-serif">SAP Cash Application in SAP S/4HANA reduces manual post-processing of incoming bank statements by applying machine learning to match open receivables to incoming bank statement items, and to intelligently extract relevant information from payment advice documents and use them for the matching and clearing process.</P><BR /> <BR /> <H1 id="toc-hId-439970406"><STRONG>2. Enable Business Foresight with AI-powered Predictive Insights </STRONG></H1><BR /> Increasingly our customers want to steer business strategy based on forward-looking insights. AI-powered insights capture and adjust to business events as they happen, helping your organization become more proactive.<BR /> <BR /> For example, with business AI in SAP S/4HANA Cloud and <A href="https://www.sap.com/products/technology-platform/cloud-analytics.html" target="_blank" rel="noopener noreferrer">SAP Analytics Cloud</A>, treasury departments can anticipate future liquidity needs to make timely investment decisions. You take advantage of predictive analytics that help you mitigate liquidity risks by leveraging operating activities, such as invoice payment dates, historical transactional data trends, and external market data. The resulting insights improve the accuracy of mid-to-long-term liquidity forecasts and help you optimize investments despite high market volatility and changing business patterns.<BR /> <H1 id="toc-hId-243456901"><STRONG>3. Enhance Security and Compliance with AI-powered policy enforcement</STRONG></H1><BR /> We all know that finance processes and reporting must align with growing industry, government, and tax regulations. And, with today's stringent privacy requirements, it is equally important to <A href="https://www.sap.com/products/financial-management/grc.html?pdf-asset=6ce0ca1b-c27d-0010-87a3-c30de2ffd8ff&amp;page=1#access" target="_blank" rel="noopener noreferrer">preserve data privacy and protect data access</A>.<BR /> <BR /> For example, business AI embedded in SAP governance, compliance, and risk management solutions can detect errors as financial transactions are processed and propose remedies based on past successful interventions. And system administrators can leverage AI in <A href="https://www.sap.com/products/financial-management/cloud-iam.html?pdf-asset=864e3f79-137d-0010-87a3-c30de2ffd8ff&amp;page=1" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Access Governance</A> to define fine-grained access rights that factor in users’ roles and functional responsibilities, improving productivity and mitigating compliance risks.<BR /> <BR /> To learn more about leveraging <A href="https://www.sap.com/products/artificial-intelligence.html" target="_blank" rel="noopener noreferrer">SAP AI</A> in your finance department, visit the <A href="https://www.sap.com/products/artificial-intelligence/finance.html" target="_blank" rel="noopener noreferrer">Finance with SAP AI page</A> on sap.com and read our <A href="https://www.sap.com/products/artificial-intelligence/finance.html?pdf-asset=625f0f46-4c7e-0010-bca6-c68f7e60039b&amp;page=1" target="_blank" rel="noopener noreferrer">latest report.</A> 2023-07-07T00:18:56+02:00 https://community.sap.com/t5/financial-management-blogs-by-members/sap-iag-vs-access-control-which-one-is-right-for-me/ba-p/13556248 SAP IAG vs Access Control: Which one is right for me? 2023-07-10T12:26:11+02:00 GRCwithRaghu https://community.sap.com/t5/user/viewprofilepage/user-id/600573 SAP GRC framework has a new buzzword - IAG, or Identity and Access Governance. Many of us have heard about this for the past couple of years, but are unsure of its capabilities. The purpose of this blog is to explain what IAG is and how it differs from Access Control solution. There are even answers to a few frequently asked questions in it.<BR /> <BR /> The SAP Cloud IAG service was introduced in 2018/19 as a public cloud offering from SAP. This application is based on SAP Business Technology Platform (SAP BTP), and uses SAP NetWeaver APIs to fetch data from on-premise and cloud solutions. IAG offers the following services:<BR /> <UL><BR /> <LI>SAP Cloud IAG - Access Analysis Service (Similar to Access Risk Analysis)</LI><BR /> <LI>SAP Cloud IAG - Access Request Service (Similar to Access Request Management)</LI><BR /> <LI>SAP Cloud IAG - Role Design Service (Similar to Business Role Management)</LI><BR /> <LI>SAP Cloud IAG - Access Certification Service (Similar to Access Re-certification)</LI><BR /> <LI>SAP Cloud IAG - Privileged Access Management service (Similar to Emergency Access Management)</LI><BR /> </UL><BR /> <STRONG>Q) What is the difference between IAG and Access Control when both provide the same services?</STRONG><BR /> <BR /> While both the solutions offer the same services, the difference is that IAG is completely that it is on Public Cloud. It is not available either as on-premise or Private cloud solution. The below table lists few of the differences between IAG and Access Control:<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/07/Cloud-IAG-vs-Access-Control.png" /></P><BR /> <P class="image_caption" style="text-align:center;font-style:italic;, Arial, sans-serif">Table 1.0: Differences between Cloud IAG and Access Control</P><BR /> <STRONG>Q) Is IAG a replacement to SAP GRC Access Control?</STRONG><BR /> <BR /> As detailed by Thomas Frenehard in his GRC Tuesdays <A href="https://blogs.sap.com/2023/05/09/grc-tuesdays-announcing-saps-plans-for-a-next-generation-governance-risk-and-compliance-platform-sap-grc-edition-for-sap-hana/" target="_blank" rel="noopener noreferrer">blog</A>, SAP is releasing a new version of its GRC platform: SAP GRC edition for SAP HANA. This product is planned for release in Q1 2026 and will replace SAP's existing platform of v12.0 that includes SAP GRC Access Control, Process Control, and Risk Management. Clearly, IAG is not intended to replace GRC Access Control, but could serve as a complementary solution to those who prefer cloud-based access control.<BR /> <BR /> <STRONG>Q) In the event that I have on-premise Access Control, how do I connect to Cloud systems such as Ariba, SAC, Success Factors? Are they limited to the IAG Cloud?</STRONG><BR /> <BR /> Actually, you still have options! You can utilize the IAG Bridge scenario to establish a connection between the SAP Access Control 12.0 on-premise system and cloud applications. In the case of Cloud IAG, it provides support for both cloud and on-premise applications. In terms of licensing, you don’t have to have extra licenses for Access Control.<BR /> <BR /> <STRONG>Q) What are the limitations in Cloud IAG where compared to Access Control with respective to Access Risk Analysis and management?</STRONG><BR /> <BR /> The Cloud IAG has evolved continuously since its inception. There are, however, some limitations to it. Here are some differences/limitations:<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/07/Risk-Analysis-Limitations-in-Cloud-IAG-1.png" /></P><BR /> <P class="image_caption" style="text-align:center;font-style:italic;, Arial, sans-serif">Table 2.0 - Risk Analysis Management Limitations in Cloud IAG</P><BR /> <STRONG>Q) What is IAG Bridge scenario?</STRONG><BR /> <BR /> The IAG Bridge scenario is used when the Access Control 12.0 system needs to establish a connection with cloud systems like Ariba, SuccessFactors, and others. In this scenario, both solutions are necessary, with the majority of activities being performed in Access Control. The role of IAG is primarily to facilitate the connection between Access Control and the cloud systems. Its purpose is to enable seamless communication and integration between the on-premise Access Control system and the various cloud applications.<BR /> <BR /> <STRONG>Q) Which is the best option? Cloud IAG or Access Control?</STRONG><BR /> <BR /> Directly comparing solutions is not a straightforward and recommended approach. Each solution has its own set of advantages and disadvantages. When selecting a solution, it is crucial to consider an organization's specific requirements and priorities. What works well for one enterprise may not necessarily be suitable for another. Therefore, it is vital to thoroughly assess and validate an organization's needs before making a product choice. By taking this approach, organizations can make informed decisions that align with their unique circumstances.<BR /> <BR /> In conclusion, SAP IAG and SAP Access Control are two powerful solutions offered by SAP to address the critical challenges of identity and access management. Understanding their features, benefits, and differences can help organizations make informed decisions while designing their SAP security strategies. By implementing the right solution, organizations can enhance their data security, streamline access management processes, and ensure compliance with regulatory standards. 2023-07-10T12:26:11+02:00 https://community.sap.com/t5/technology-blogs-by-members/access-request-service-configuration-in-sap-iag-for-target-sap-s4hana/ba-p/13572459 Access Request Service Configuration in SAP IAG for Target SAP S4Hana Private Cloud 2023-08-26T13:12:52+02:00 amalakar https://community.sap.com/t5/user/viewprofilepage/user-id/122984 SAP Cloud Identity Access Governance (often referred to as SAP IAG) is a cloud service from SAP Business Technology Platform (BTP). It offers similar functionality as SAP Access Control (SAP GRC).<BR /> <BR /> SAP Cloud Identity Access Governance offers Software as a Service (SaaS), which enables companies to comprise several distinct identity management and access governance capabilities .<BR /> <BR /> SAP Cloud IAG offers five core services:<BR /> <UL><BR /> <LI>Access Analysis</LI><BR /> <LI>Role Design</LI><BR /> <LI>Access Request</LI><BR /> <LI>Access Certification</LI><BR /> <LI>Privileged Access Management</LI><BR /> </UL><BR /> In this Blog I will explain how Access Request Service is configured in SAP Identity access and governance and SAP user access request can be raised for SAP S4Hana Private Cloud.<BR /> <BR /> Make Sure SAP IAS (Identity Authentication Service) and IPS (Identity Provision Service) initial setup has been completed.<BR /> <BR /> Below are the steps for configuring the Access Request Service: -<BR /> <OL><BR /> <LI>S4Hana Private Cloud System integration with SAP IAG.</LI><BR /> <LI>Responsibilities are defined with proper Authorizaiton</LI><BR /> <LI>IPS Proxy System is enabled between SAP IAG and SAP IAS.</LI><BR /> <LI>Workflow Setup</LI><BR /> <LI>Business Rules Activation and deploy.</LI><BR /> <LI>Upload Notification template.</LI><BR /> <LI>Access Request Priority are maintained.</LI><BR /> <LI>Access Request Reason codes are maintained.</LI><BR /> </OL><BR /> <STRONG>Architecture Overview</STRONG><BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Achitecture-1.png" height="264" width="451" /><BR /> <BR /> 1.<STRONG>S4Hana Private Cloud System integration with SAP IAG.</STRONG><BR /> <BR /> For integration, please perform below steps: -<BR /> <OL><BR /> <LI>Cloud Connector Setup. Like S4Hana On Premise – S4Hana Private cloud will connect SAP Cloud Identity Access Governance through the Cloud Connector.</LI><BR /> <LI>Create Destination for the S4Hana Private Cloud System in the SAP Cloud Identity Access Governance Subaccount</LI><BR /> <LI>Create an Application Instance for SAP S4Hana Private Cloud System in SAP Cloud Identity Access Governance Fiori Launchpad.</LI><BR /> </OL><BR /> After above configuration Run Repository Sync to sync all relevant data from the SAP S4Hana private cloud target system to SAP Cloud Identity Access Governance, which can be applied in access request service.<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture2-29.png" /><BR /> <BR /> in SAP IAG , for S4hana Private Cloud system – Application Type will be “S4Hana on – Premise”.<BR /> <OL start="2"><BR /> <LI><STRONG> Responsibilities are defined with proper Authorizaiton.</STRONG></LI><BR /> </OL><BR /> Predefined role collections are deployed with the SAP Cloud Identity Access Governance service. These role collections ensure that users can access and use specific apps that are relevant for their job function and their dedicated tasks.<BR /> <BR /> Role collections are not directly assigned to users in the SAP BTP cockpit. Instead, users in Identity Authentication (IAS) are assigned to groups. These groups are mapped with SAP BTP role collections.<BR /> <BR /> The required steps are the following:<BR /> <OL><BR /> <LI>Create user groups in Identity Authentication and assign users to them.</LI><BR /> <LI>Map role collections in the SAP BTP Cockpit to the created user groups.</LI><BR /> <LI>Synchronize user groups information between the Identity Authentication and SAP Cloud Identity Access Governance subaccount.</LI><BR /> </OL><BR /> The following groups are required in SAP IAS. The SAP Cloud Identity Access Governance services look for these specific groups. Make sure you create them with the names listed below with the same case. The name is case sensitive.<BR /> <BR /> When you create these groups, you must follow this naming convention: IAG_&lt;TYPE&gt;_&lt;NAME&gt;<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture3-25.png" height="154" width="516" /><BR /> <BR /> Role collection in BTP is mapped with these groups for proper authorization in Identity authentication Tenant. Before that Set Identity Authentication as a trusted identity provider.<BR /> <BR /> To ensure user groups information is synchronized between the Identity Authentication service tenant and the tenant for SAP Cloud Identity Access Governance on SAP Business Technology Platform (SAP BTP), you must maintain the required system in Identity Authentication and the destination in the tenant for SAP Cloud Identity Access Governance in SAP BTP and then run the SCI User Group Sync job in the Job Scheduler app.<BR /> <OL start="3"><BR /> <LI><STRONG> IPS Proxy is enabled between SAP IAG and SAP IAS.</STRONG></LI><BR /> </OL><BR /> To Create an access request for a new user id in target application, user should be present in SAP IAG user source. We have made SAP IAS as user source, for this we must create a proxy system and map that proxy system in SAP IAG.<BR /> <OL><BR /> <LI>Map Proxy system in SAP IAG: -</LI><BR /> </OL><BR /> Navigate to Administration - Applications<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture5-24.png" /><BR /> <OL start="2"><BR /> <LI>Map User Source as IAS system&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Navigate to Administration – Configuration – Application Parameter and maintain user source as IAS system created in above step.</LI><BR /> </OL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture6-22.png" /></P><BR /> 4.<STRONG>Workflow Setup: -</STRONG><BR /> <BR /> There is no configuration required for the workflow. For all workflow-related actions, you need to make use of pre-delivered workflow templates. You require these templates to create access requests.<BR /> <BR /> The SAP Identity Access Governance solution pre-delivers both the workflow and notification templates. If this has not been the case, create a support ticket using the GRC-IAG component and request those templates.<BR /> <BR /> You can find the uploaded workflow templates in the Maintain Workflow Template app. Use one of these template.<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture7-22.png" /><BR /> <BR /> 5.<STRONG>Business Rules Activation and deploy.</STRONG><BR /> <BR /> SAP Business Rules service is used to define the stages, paths, and other workflow rules used by Access Request service to move the request items through the stages of an access request.<BR /> <BR /> SAP Cloud Identity Access Governance offers pre-delivered business rules. To access these rules, create a support ticket. To do so, select the component GRC-IAG.<BR /> <BR /> To access business rules, navigate to Administration → Configuration Go to Business Rule and choose Launch. The Business Rule editor opens.<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture8-23.png" /><BR /> <BR /> Navigate to Rules and select RequestTypeRule in the Local Rules section. For this rule, workflow paths have been defined.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture9-20.png" /></P><BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture10-20.png" /><BR /> <BR /> You must ensure that this minimum setup is in place, at least you need a mapping entry for request type "CHANGE". That is the mandatory entry for all created access requests (for all non-PAMID related requests)<BR /> <P style="overflow: hidden;margin-bottom: 0px">Finally, the business rules need to be activated and the new workflow version needs to be deployed.</P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture11-20.png" /></P><BR /> 6.<STRONG>Upload Notification Template: -</STRONG><BR /> <BR /> Click on the Template Upload tile.<BR /> <BR /> In the Notification section click on the Download button for the Standard Template.<BR /> <BR /> Click on the Browse button and select the zip file you downloaded for the Template Archive.<BR /> <BR /> Click on the Upload Button.<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture12-19.png" /><BR /> <BR /> 7.<STRONG>Access Request Priority are maintained.</STRONG><BR /> <BR /> Access Request Priority are defined. Navigate to Administration → Access Request Priority.<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture13-16.png" /><BR /> <BR /> 8.<STRONG>Access Request Reason codes are maintained.</STRONG><BR /> <BR /> Access Request Reason are defined. Navigate to Administration → Request Reason.<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture14-16.png" /><BR /> <BR /> After the above configuration are successfully performed, you can start raising your access request in SAP IAG to create users in S4Hana Private cloud system.<BR /> <BR /> <STRONG>Please note:</STRONG> - You have to schedule Provisioning job to trigger the provisioning of SAP Cloud Identity Access Governance access request in Target S4Hana Private cloud system.<BR /> <BR /> <STRONG>Conclusion:</STRONG><BR /> <BR /> In Rise with SAP Solution – Customer are opting for cloud based IAG solution as a replacement for GRC On premise solution. This blog post provides a high-level step for configuring Access Request service in SAP Cloud Identity Access Governance.<BR /> <BR /> I hope this blog post helps you during your Access Service Configuration. We look forward to your comments and feedback.<BR /> <BR /> <STRONG>References: -</STRONG><BR /> <BR /> <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/69a38b285a184e548557435052b48197.html?state=DRAFT&amp;version=2205" target="_blank" rel="noopener noreferrer">Mapping Role Collections to Identity Authentication | SAP Help Portal</A><BR /> <BR /> <A href="https://help.sap.com/docs/identity-provisioning/identity-provisioning/proxy-identity-authentication" target="_blank" rel="noopener noreferrer">Identity Authentication | SAP Help Portal</A> 2023-08-26T13:12:52+02:00 https://community.sap.com/t5/technology-blogs-by-sap/unleashing-the-power-of-cloud-a-fun-guide-to-automating-user-administration/ba-p/13574681 Unleashing the Power of Cloud: A Fun Guide to Automating User Administration - SAP Best Practices Identity Lifecycle Service (IDLS) for SAP Cloud Identity Services (SCI) 2023-09-05T16:16:38+02:00 normann https://community.sap.com/t5/user/viewprofilepage/user-id/92028 <H1 id="toc-hId-834875328">Why You Should Jump On Board!</H1><BR /> <P id="output" class="output">Picture this: You're using SAP Cloud Identity Services (SCI), but there's a hitch. You can't whip out your magic wand and conjure up some custom logic for any event in the Identity Directory Service (IDDS). What a downer, right?</P><BR /> Well, wipe that frown away! The SAP Best Practices Identity Lifecycle Service (IDLS) is here to save the day. It's like your personal superhero, giving you the power to inject your own custom wizardry into the SCI. Whether there's a tiny tweak or a mammoth modification in the IDDS, IDLS is ready to execute your custom logic, written in the language of the internet - JavaScript!<BR /> <BR /> Three Fabulous Feats You Can Perform:<BR /> <OL><BR /> <LI class="output">Abra-cadabra! Change a name and the email address recalculates automatically!</LI><BR /> <LI class="output">Have a new hire? Or a sudden termination? No worries! Activate or deactivate identities based on data in the IDDS.</LI><BR /> <LI class="output">Organize a coup! Automatically assign groups based on juicy info like cost center.</LI><BR /> </OL><BR /> <H1 id="toc-hId-638361823">How This Magic Works:</H1><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/IdLS_architecture.png" /></P><BR /> <BR /> <OL><BR /> <LI id="output" class="output">IDLS acts like a busy bee, frequently buzzing around the IDDS to gather user information. You decide how often it buzzes.</LI><BR /> <LI class="output">Detects any changes in the user data and neatly stacks them up in a queue in the Event Mesh service.</LI><BR /> <LI class="output">Voila! It executes your custom logic.</LI><BR /> <LI class="output">Writes back the modification into the IDDS, like a diligent scribe.</LI><BR /> </OL><BR /> The service comes with a treasure chest of predefined JavaScript functions. It's nostalgia-inducing, just like good old SAP IdM. Use these to perform certain operations inside IDDS.<BR /> <H1 id="toc-hId-441848318">Peek Into A Sample Spellbook:</H1><BR /> Here's a sneak peek at a script that covers two of the scenarios mentioned above: Recalculating an email address (including checking for uniqueness) and assigning a group based on the user's cost center.<BR /> <PRE class="language-javascript"><CODE>function eventTriggered(value, event) {<BR /> if (event.getValue() == "Changed") {<BR /> if (value instanceof Java.type("com.sap.openapi.idds.model.User")) {<BR /> let changesMap = new Map(Object.entries(JSON.parse(changes)));<BR /> changesMap.forEach((valueAttr, key) =&gt; {<BR /> print(`Changes: ${value.getUserName()} : ${key} `); <BR /> if (key == 'familyName' || key == 'givenName') {<BR /> handleUserNameChanged(value);<BR /> }<BR /> <BR /> if (key == 'costCenter') {<BR /> addUserToGroupByCC(value);<BR /> }<BR /> });<BR /> utils.patchValues('user', value);<BR /> }<BR /> }<BR /> }<BR /> <BR /> <BR /> function handleUserNameChanged(user) {<BR /> let name = user.getName();<BR /> var familyName = name.getFamilyName();<BR /> var givenName = name.getGivenName();<BR /> var emailList = [];<BR /> var email = `${givenName}.${familyName}@company.com`;<BR /> email = deleteUmlauts(email);<BR /> var index = 1;<BR /> while (utils.getValueByEntry("email", email)) {<BR /> email = `${givenName}.${familyName}${index}@company.com`;<BR /> index++;<BR /> }<BR /> user.getEmails().forEach(element =&gt; {<BR /> element.setValue(email);<BR /> element.display(email);<BR /> element.setPrimary(true);<BR /> element.setType(utils.getEmailType('work'));<BR /> emailList.push(element);<BR /> });<BR /> print(emailList);<BR /> user.setEmails(emailList);<BR /> user.setUserName(email);<BR /> }<BR /> <BR /> function addUserToGroupByCC(user) {<BR /> if (user.isActive()) {<BR /> var listGroups = utils.getGroups();<BR /> listGroups.forEach((group) =&gt; {<BR /> let name = group.getGroupExentsion().getName();<BR /> print(`Cost Center Name: ${name}`);<BR /> if(name.indexOf("_") &gt; -1) {<BR /> let cc_number = name.substring(name.indexOf("_") + 1)<BR /> print(`Cost Center Number: ${name}`);<BR /> if (cc_number == (user.getEnterpriseUser().getCostCenter())) {<BR /> utils.addUserToGroup(user.getId(), group.getId());<BR /> }<BR /> }<BR /> });<BR /> } <BR /> }<BR /> <BR /> function deleteUmlauts(value) {<BR /> value = value.replace(/\u00e4/g, "ae");<BR /> value = value.replace(/\u00fc/g, "ue");<BR /> value = value.replace(/\u00f6/g, "oe");<BR /> value = value.replace(/\u00df/g, "ss");<BR /> value = value.replace(/\u00dc/g, "Ue");<BR /> value = value.replace(/\u00c4/g, "Ae");<BR /> value = value.replace(/\u00d6/g, "Oe");<BR /> return value;<BR /> }</CODE></PRE><BR /> <P id="output" class="output">The function "eventTriggered" is like the red carpet rolled out for every modification the IDSL detects. This function sorts out the modifications ("Created", "Changed", "Deleted") and provides all the juicy details related to the event (like the modified name). This function is your VIP pass into the IDSL.</P><BR /> The functions "handleUserNameChanged" and "addUserToGroupByCC" jump into action when the name or cost center are tweaked, and perform the necessary operations. Think of them as your trusty sidekicks, ready to perform more feats as you add them.<BR /> <BR /> So, buckle up and get ready to automate your user administration in the Cloud with SAP's IDLS!<BR /> <H1 id="toc-hId-245334813">Predefined Script Functions</H1><BR /> This is a list of the predefined script functions available as of now:<BR /> <H2 id="toc-hId-177904027">patchValues</H2><BR /> <UL><BR /> <LI>Input Parameters:&lt;entryType&gt;,&lt;JSONEntry&gt;</LI><BR /> <LI>Updating the entry in the IDDS</LI><BR /> </UL><BR /> <H2 id="toc-hId--18609478">getValueByEntry</H2><BR /> <UL><BR /> <LI>Input Parameters: &lt;searchAttribute&gt;,&lt;searchValue&gt;</LI><BR /> <LI>Return Value: Boolean (true if entry was found in the IDDS)</LI><BR /> <LI>Search for an entry in IDDS by attribute name and value</LI><BR /> </UL><BR /> <H2 id="toc-hId--215122983">addUserToGroup</H2><BR /> <UL><BR /> <LI>Input Parameters: &lt;userScimId&gt;,&lt;groupScimId&gt;</LI><BR /> <LI>Adding a user as member of a group inside the IDDS</LI><BR /> </UL><BR /> <H2 id="toc-hId--411636488">deleteUserFromGroup</H2><BR /> <UL><BR /> <LI>Input Parameters: &lt;userScimId&gt;,&lt;groupScimId&gt;</LI><BR /> <LI>Removing a user as member from a group inside the IDDS</LI><BR /> </UL><BR /> <H2 id="toc-hId--608149993">deleteUser</H2><BR /> <UL><BR /> <LI>InputParameters: &lt;userScimId&gt;</LI><BR /> <LI>Delete a user form IDDS</LI><BR /> </UL><BR /> <H2 id="toc-hId--804663498">deleteGroup</H2><BR /> <UL><BR /> <LI>InputParameters: &lt;groupScimId&gt;</LI><BR /> <LI>Delete a group form IDDS</LI><BR /> </UL><BR /> <H2 id="toc-hId--653922646">getGroups</H2><BR /> <UL><BR /> <LI>Returning a List of all groups inside the IDDS</LI><BR /> </UL><BR /> <H1 id="toc-hId--557033144"><SPAN id="__symantecMPKIClientDetector">Prerequisites</SPAN></H1><BR /> The following BTP Services are required to be available to be able to use this SAP Best Practices Service:<BR /> <UL><BR /> <LI>SAP Cloud Identity Services</LI><BR /> <LI>SAP Cloud Foundry Runtime Environment</LI><BR /> <LI>SAP Event Mesh Service</LI><BR /> <LI>SAP Object Store Service</LI><BR /> </UL><BR /> <H1 id="output" class="output" id="toc-hId--753546649">The Inside Scoop</H1><BR /> <P class="output">If your curiosity is piqued and you're itching to know more about this service and how to roll it out, don't be shy! Reach out to me directly or shoot an email to security.consulting@sap.com. We're all ears!</P> 2023-09-05T16:16:38+02:00 https://community.sap.com/t5/technology-blogs-by-sap/how-to-handle-usernames-global-user-ids-and-external-ids-in-your-landscape/ba-p/13575968 How to handle “usernames”, “Global User IDs” and “external IDs” in your landscape? 2023-09-12T14:41:17+02:00 1Gunnar https://community.sap.com/t5/user/viewprofilepage/user-id/11449 When it comes to setting up Identity Access Management (IAM) flows, we are often asked for best practices regarding usernames, Global User Ids and external ids. This blog post explains exactly this so let's crack it !<BR /> <BR /> In a nutshell, it is safe to say that it is good practice to avoid sensitive data when choosing a policy for usernames and IDs.<BR /> <BR /> Here are some example of what <EM>sensitive data</EM> means:<BR /> <UL><BR /> <LI>credit card information,</LI><BR /> <LI>user session identifiers,</LI><BR /> <LI>customer data,</LI><BR /> <LI><STRONG>personal data</STRONG> / employee data.</LI><BR /> </UL><BR /> The data type which is mainly processed in IAM context is personal data.<BR /> <BR /> IAM admins might feel tempted to choose personal data derivations for usernames, Global User IDs and external IDs. This is bad practice.<BR /> <BR /> Usernames, Global User IDs or external IDs appear in log files and other traces. DevOps who have access and authorisations to such log files might see personal data that they are otherwise not allowed to (need-to-know principle).<BR /> <BR /> Furthermore if you use personal data in these attributes, the changes to values might not be applied, because the effort to keep track of audit-trails in log files would be too high. Keeping a history of multiple username- or external-ID-values over time (log files are read-only) is expensive. Some applications do not allow an ID change at all, which adds up complexity in the processes.<BR /> <H2 id="toc-hId-963990666">What is the difference between these attributes and when to use them?</H2><BR /> <STRONG>The username</STRONG> is a mutable attribute which can be used for login hints like an email address, but which is also often distributed into applications.<BR /> <BR /> Best described in the <A href="https://www.rfc-editor.org/rfc/rfc7643#section-4.1.1" target="_blank" rel="nofollow noopener noreferrer">SCIM2 RFC7643</A> a username is the service provider's unique identifier for the user, typically used by the user to directly authenticate to the service provider. Often displayed to the user as their unique identifier within the system (as opposed to "id" or "externalId", which are generally opaque and not user-friendly identifiers).<BR /> <BR /> Imagine your user is provisioned in various target applications and for business purposes (such as workflows), the same user must be uniquely identified between them. In this case, one needs a correlation attribute. We in SAP call it the <A href="https://help.sap.com/docs/cloud-identity/system-integration-guide/global-user-id-in-integration-scenarios?locale=en-US" target="_blank" rel="noopener noreferrer"><STRONG>Global User ID</STRONG></A>.<BR /> <BR /> Also, in case the application requires data from another systems, it fetches it based on a mapping done via this correlation attribute.<BR /> <BR /> The <STRONG>externalID</STRONG> is also described in the <A href="https://www.rfc-editor.org/rfc/rfc7643#section-3.1" target="_blank" rel="nofollow noopener noreferrer">SCIM2 RFC7643</A> - it is mutable, defined by the client (and not the server) and optional within SCIM2.<BR /> <BR /> The <STRONG>email attribute </STRONG>is often used in cloud services as login-name, as notification attribute and sometimes also as userID. Emails frequently contain personal data. The email is mutable and changes more often than we think. Name changes happen for several reasons but also domain changes in case of company changes. The email is easy to remember as login name and indicates the notification channel, but it creates headaches regarding Security, Data Protection and Privacy if the app doesn't have other ways to identify the person at hand.<BR /> <H2 id="toc-hId-767477161">Best practices:</H2><BR /> <UL><BR /> <LI><EM><STRONG>Generated usernames / IDs are better than manually assigned ones.</STRONG></EM><BR /> First and foremost, admins should differentiate between the processes where the attributes are used. It is common to use personal data derived attributes (such as email or a human-friendly username) as logon aliases at the authenticating Identity Provider (IdP). On the other hand, for technical integrations which are not visible to the end user (such as SAML/OIDC flows or SCIM based replication), generate unique values without personal data as usernames, external IDs or Global User ID. Consider uuid formats because uuids are, for practical purposes, unique. Their uniqueness does not depend on a central registration authority and uuid does not contain derived personal data.</LI><BR /> </UL><BR /> <UL><BR /> <LI><EM><STRONG>The usage of immutable IDs (referencing to mutable information) for the entire Identity Lifecycle.</STRONG></EM><BR /> During the Identity Lifecycle, attributes such as lastname and email change. With stable identity identifiers the system to system communication continues without disruptions. The SAP Cloud Identity Services automatically generate the SCIM ID and Global User Id in uuid format for each record (The Global User Id is technically defined as mutable but there are rare reasons to change it during normal operations).</LI><BR /> </UL><BR /> <UL><BR /> <LI><EM><STRONG>Avoid the usage of IDs in User Interfaces (UI).</STRONG></EM><BR /> In the User Interface the technical identifiers should be replaced with human-friendly attributes. No one likes to be greeted in the morning with a <STRONG><EM>Hello 0ae23960-721d-453c-8b1f-12eab5494e93!</EM></STRONG>. Instead, what is being displayed in UIs or in self service portals should be a personal data attribute like the Displayname or firstname (belonging to the identity having this uuid). At the same time, DevOps engineers can observe in monitoring tools the successful authentication of a user&nbsp;based on the uuid value (or a username / external ID) without seeing any personal data.</LI><BR /> </UL><BR /> <H2 id="toc-hId-570963656">You can find more details in the links bellow:</H2><BR /> <UL><BR /> <LI><A href="https://help.sap.com/docs/cloud-identity/system-integration-guide/system-integration-guide-for-sap-cloud-identity-services?version=Cloud&amp;locale=en-US" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services (incl. IAM recommendations)</A></LI><BR /> <LI><A href="https://help.sap.com/docs/cloud-identity/system-integration-guide/global-user-id-in-integration-scenarios?version=Cloud&amp;locale=en-US" target="_blank" rel="noopener noreferrer">Global User ID concept</A></LI><BR /> </UL><BR /> &nbsp; 2023-09-12T14:41:17+02:00 https://community.sap.com/t5/crm-and-cx-blogs-by-sap/the-added-value-of-a-cdp-part-2/ba-p/13574811 The Added Value of a CDP (Part 2) 2023-10-27T20:10:13+02:00 peter_gergen https://community.sap.com/t5/user/viewprofilepage/user-id/354428 <H3 id="toc-hId-1093042471"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/10/1697631264355.png" /></H3><BR /> <H2 id="toc-hId-767446247">A Deeper Analysis of the Benefits of a Customer Data Platform</H2><BR /> By&nbsp;<A href="https://www.linkedin.com/in/petergergen/" target="_blank" rel="noopener nofollow noreferrer">Peter Gergen</A>, Solution Architect CX<BR /> <BR /> A Customer Data Platform (CDP) offers companies a wide range of benefits when it comes to using and managing their customer information. It enables extensive insights into customer behavior, personalized customer journeys, improved data quality and data integrity, automated marketing processes, and real-time interaction over a variety of channels. A CDP optimizes marketing strategies, improves customer satisfaction, and increases sales.<BR /> <BR /> I will be examining the decisive differences between “traditional” decentralized handling of customer information and managing this information in a Customer Data Platform (CDP). I will highlight the many ways that a CDP adds value in the effective use and management of customer information. I will split my assessment into three posts, to facilitate a comprehensive examination. In the first part, I discussed the aspects of centralized data storage. In this second post, I will be examining the benefits provided by the customer-centric focus in the CDP in more detail.<BR /> <H4 id="toc-hId-829098180"><STRONG>Customer-Centric Focus</STRONG></H4><BR /> The term “customer experience” (CX) plays a key role in many current initiatives for generating new business, as well as for maintaining and deepening business relationships with existing customers. But what exactly is this “experience” about?<BR /> <BR /> To get to the bottom of this aspect, we need to change our perspective. This means companies have to temporarily give up their familiar perspective and instead put themselves in the place of a customer who is interacting with their company. This change of perspective often reveals deficits and deficiencies in the processes that have to be rectified.<BR /> <H4 id="toc-hId-632584675"><STRONG>Customer Use Cases</STRONG></H4><BR /> Use cases make it possible to take on the customer’s perspective. To do so, an exemplary process involving interaction with the company is examined from the customer perspective, with all its individual steps. This approach enables you to capture improvements in both service offerings and activities to increase customer satisfaction. Complex, time-intensive process steps that can be burdensome for the customer can be reduced, while new, innovative measures can be tested.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/10/1697640389978.png" height="400" width="400" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Planning improvements to the customer experience begins with outlining the use cases from the customer’s perspective</P><BR /> A number of different starting points are important to a successful customer experience. Examples:<BR /> <UL><BR /> <LI>As soon as a customer registers, their customer information is immediately distributed to all relevant channels. Negative example: It is extremely detrimental when a customer has to register, log in, and define their preferences and interests again during every interaction and over every channel.</LI><BR /> <LI>Based on a customer’s declarations of consent, their information may only be passed on to the channels for which the customer has explicitly granted their consent. If the customer agrees to the processing of their information in accordance with the company’s general terms and conditions, but rejects marketing-related activities, then every advertising activity that is carried out represents a violation of the customer’s expressed wishes – and a breach of the General Data Protection Regulation.</LI><BR /> <LI>Take this drastic example of a completely failed customer experience: A customer opens a support ticket for a product and faces a complex repair. Their sales contact is not notified of this support case, however, and instead suggests a repeat purchase of the product, combined with a price increase. The fact that the customer has already searched for the conditions under which the contract can be canceled is hidden in the log files on the web server in the best case. This information is not taken into account in dealings with the customer.</LI><BR /> </UL><BR /> In all three scenarios, a CDP can help to prevent this misguided handling of the customer. This is built on a foundation of targeted interchange of customer information and activities, compliant with data protection regulations, between the source and target systems (such as website, purchasing portal, support and service system, and CRM), all facilitated by the CDP.<BR /> <BR /> Whether a CDP implementation is successful depends mainly on meticulous execution, especially of a company’s most important use cases for its customers.<BR /> <H4 id="toc-hId-436071170"><STRONG>The Customer Journey</STRONG></H4><BR /> The customer journey describes the full path that a customer takes from their first contact with a company until the fulfillment of their needs – and potential repeat purchases. It passes various milestones, such as the ones described in the following example:<BR /> <UL><BR /> <LI>An anonymous user who has contact with a company for the first time and is interested in its products or services</LI><BR /> <LI>A potential customer who has already given the company their contact information, such as an email address, to subscribe to a newsletter, for instance</LI><BR /> <LI>A registered potential customer who has defined their full contact information, preferences, and consent options and has already interacted with the company through a variety of communication channels, including buying products</LI><BR /> <LI>A regular customer who is known to the company in all their facets and has a dedicated contact person, including discounts and exclusive service offerings</LI><BR /> </UL><BR /> The primary objective of every company is to guide customers through this journey from the beginning and give them the custom-tailored information they need at every milestone to convert a potential customer from unknown user to regular customer.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/10/1697642810853.png" height="400" width="400" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">The aim of the customer journey is to guide the customer from prospect to regular customer. A successful customer experience plays a key role in this conversion</P><BR /> But let’s start at the beginning. The customer journey can start long before a prospect is even aware of the company. Targeted “lookalike” campaigns can be launched on social media, such as Instagram, to address specific target audiences on these platforms who could potentially be relevant for our company. If an anonymous prospect visits the company’s website to find out about its product range, their click patterns provide important insights about the parts of the product range they are interested in. The company can then issue a targeted response by making these products the focus of the user’s attention.<BR /> <BR /> The customer journey continues when the anonymous user shows interest by subscribing to a newsletter and provides their contact information, such as an email address. This creates the first, loose connection with the company, which the marketing department can identify and use. In this process, the available information such as the user’s click patterns and dwell time on specific products is taken into account, so the newsletter can be generated for the user in a targeted way.<BR /> <BR /> The customer’s journey toward the company continues. Every touchpoint on the customer journey marks important milestones as the customer is converted from an anonymous prospect to a loyal repeat customer. A CDP collects and structures customer information and activities from different source systems, to create profiles in categories, segments, and target groups. This information is then made available to the relevant channels. At the start of the customer journey, the marketing system plays a key role in exchanging information with the customer, while the company’s contact persons and the CRM system become increasingly more important as the journey to becoming a regular customer continues.<BR /> <BR /> Are you still with me? If so, let’s continue with the last item: the aspect of data security, privacy, and data protection regulations.<BR /> <H4 id="toc-hId-239557665"><STRONG>Data Security, Privacy, and Data Protection Regulations</STRONG></H4><BR /> If a customer is willing to give your company their contact information and grants their consent to recording their activities and interactions and use them to improve their customer experience, this is an important signal of trust – one that you should not treat lightly as a company. Of course, it isn’t possible to discuss these topics individually with every customer, down to the smallest detail. Therefore, basic formalities that the customer can consent to (or reject) are defined ahead of time.<BR /> <BR /> The subject of data security and data privacy is divided into three areas:<BR /> <UL><BR /> <LI>Data collection: Every time a potential customer registers, they step out of their anonymity and reveal their identity. In this process, they define how they want to be kept up to date and which guidelines the company must observe with regard to their data.</LI><BR /> <LI>Data storage and processing: The company is obliged to process the customer’s information exclusively for the stated purposes and in accordance with the consent granted by that customer. If a consent has not been granted, the company must take this into account and may not use the information for the affected purpose, even if it is available. Furthermore, it is the company’s obligation to take all measures needed to ensure that the data is stored securely and inaccessible to unauthorized third parties. It is also very important for the customer to have the ability to change their own information and that there is no way for third parties to manipulate this information.</LI><BR /> <LI>Data erasure and profile removal: The “right to be forgotten” gives individuals the option to demand that companies erase their personal data. It empowers them to control their digital presence and remove information that they deem to be irrelevant, outdated, or inappropriate from the public sphere. The right to be forgotten is intended to strengthen privacy protections and the right to informational self-determination. It obliges companies to review requests from data subjects and, if necessary, erase or anonymize the requested information.</LI><BR /> </UL><BR /> These aspects are not only simple demands that customers can make of companies; they are firmly embedded in the corresponding data protection regulations. The European General Data Protection Regulation (GDPR) is the strictest data protection regime in the world. The regulation was passed by the European Union and came into force on May 25, 2018. All European companies are obliged to comply with the requirements of the GDPR.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/10/1697706695710.png" height="400" width="400" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Trusted customer relationships demand clear data protection agreements</P><BR /> A CDP plays a key role in the collection, analysis, and transfer of customer information. Therefore, it is highly important for data protection policies to be an inherent part of CDP processes. How this “data governance” is implemented in the CDP is dependent on both the system manufacturer and the configuration of the processes.<BR /> <BR /> Regretfully, a more detailed explanation of this topic would be too long here, so I’ll ask you to consult the relevant literature for the time being. I will tackle this topic in a future blog post.<BR /> <H3 id="toc-hId--86038559"><STRONG>Summary and Outlook</STRONG></H3><BR /> A CDP gives customers decisive benefits with regard to the customer experience. An analysis of the use cases that examines interactions between a customer and the company reveals weak points and obstacles in the customer experience. When a CDP is implemented, the customer’s experiences and activities from these use cases are merged and evaluated in a comprehensive customer profile.<BR /> <BR /> The CDP also represents a powerful tool for supporting the conversion of anonymous users into regular customer. To do so, the CDP defines precise phases of this conversion and then carries out automated processes to increase customer retention based on these phases.<BR /> <BR /> Last but not least, a CDP supports comprehensive data governance and compliance with the General Data Protection Regulation (GDPR). It facilitates centralized data control, transparency in data collection and use, and the implementation of security mechanisms such as encryption and access controls. The CDP supports the erasure and anonymization of information in accordance with the “right to be forgotten”, as well as the management of consent and customer preferences. With these activities, the CDP supports compliance with data protection regulations, strengthens the trust of customers, and minimizes breaches of data protection.<BR /> <BR /> All of these benefits help companies to improve customer satisfaction, boost conversion rates, and build long-term customer relationships. In the third and final part of my observations of the benefits of a Customer Data Platform in the context of customer data, I’ll be focusing on internal data analytics within the CDP. In the process, I will be examining how a CDP supports the company in creating a more precise customer journey, while at the same time capturing added value such as improved customer loyalty and increased sales.<BR /> <BR /> <HR /><BR /> <BR /> <H3 id="toc-hId--282552064"><STRONG>More about SAP CDP:</STRONG></H3><BR /> <P id="ember1803" class="ember-view reader-content-blocks__paragraph"><A href="https://blogs.sap.com/2023/10/27/customer-data-pl…omer-information/ ‎" target="_blank" rel="noopener noreferrer">Customer Data Platform: The Core Element for Customer Information</A></P><BR /> <A href="https://blogs.sap.com/2021/04/29/the-real-360-customer-view-sap-customer-data-platform-in-action/" target="_blank" rel="noopener noreferrer">The Real 360° Customer View – SAP Customer Data Platform in Action</A><BR /> <UL><BR /> <LI><A href="https://blogs.sap.com/2023/10/27/the-added-value-of-a-cdp-part-1" target="_blank" rel="noopener noreferrer">The Added Value of a CDP (Part 1) –&nbsp;Central Data Store</A></LI><BR /> <LI><STRONG>The Added Value of a CDP (Part 2) –&nbsp;Customer-Centric Focus</STRONG></LI><BR /> <LI><A href="https://blogs.sap.com/2023/10/27/the-added-value-of-a-cdp-part-3/" target="_blank" rel="noopener noreferrer">The Added Value of a CDP (Part 3) – Data Analytics, Customer Segmentation, and Audience-Building</A></LI><BR /> </UL><BR /> <BR /> <HR /><BR /> <BR /> <A href="https://blogs.sap.com/2021/11/23/data-governance-and-compliance/" target="_blank" rel="noopener noreferrer">Data Governance and Compliance in CDP</A><BR /> <BR /> <A href="https://blogs.sap.com/2023/10/25/unlocking-value-in-cx-development/" target="_blank" rel="noopener noreferrer">Unlocking Value in CX Development: The Way to the Perfect Set of Use Cases</A><BR /> <UL><BR /> <LI><A href="https://blogs.sap.com/2023/10/24/unleashing-customer-insights-sap-cdp-for-insurance-companies/" target="_blank" rel="noopener noreferrer">Unleashing Customer Insights: SAP CDP for Insurance Companies</A></LI><BR /> <LI><A href="https://blogs.sap.com/2023/11/07/unleashing-customer-insights-sap-cdp-for-retail/" target="_blank" rel="noopener noreferrer">Unleashing Customer Insights: SAP CDP for Retail</A></LI><BR /> </UL><BR /> <BR /> <HR /><BR /> <BR /> <A href="https://blogs.sap.com/2021/08/16/an-architectural-look-at-integrations-with-sap-cdp/" target="_blank" rel="noopener noreferrer">An Architectural Look at Integrations with SAP CDP</A><BR /> <UL><BR /> <LI><A href="https://blogs.sap.com/2021/05/25/open-in-all-directions-sap-cdps-and-the-integration-of-source-and-target-systems/" target="_blank" rel="noopener noreferrer">Open in all directions: SAP CDP and the integration of source and target systems</A></LI><BR /> <LI><A href="https://blogs.sap.com/2022/02/04/real-time-really/" target="_blank" rel="noopener noreferrer">Real-time … Really?</A></LI><BR /> </UL> 2023-10-27T20:10:13+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-members/monitoring-the-remote-access-from-sap-on-application-level-part-3-8/ba-p/13577249 Monitoring the remote access from SAP on application-level (Part 3.8) 2023-11-03T10:56:02+01:00 christinadeloitte https://community.sap.com/t5/user/viewprofilepage/user-id/784762 <P><STRONG>Background</STRONG><BR /><BR />In a cloud environment (Software-as-a-Service), the software is usually not maintained by the customer, but by the software/cloud provider.<BR /><BR /><STRONG>Control description</STRONG><BR /><BR />Remote access to the SAP S/4HANA Cloud system for e.g. incident management or software maintenance by the SAP vendor is restricted, approved by management, and removed in a timely manner.&nbsp; Access to the SAP Support IDs is appropriately controlled when IDs are not in use.<BR /><BR /><STRONG>Population</STRONG><BR /><BR />Application 'Display Technical Users' displays all technical users from SAP that are available in the customer system and the related SAP support request logs. Using the Incident ID, it is possible to display more information about when and why SAP Support Users requested a user for a customer system in the past twelve months:</P><P><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Application-Display-Technical-Users.png" border="0" /></P><P><BR />&nbsp;<BR /><BR /><EM>Note 1: Column “Customer User” displays if SAP user used authorizations from a customer user. </EM><BR /><BR /><EM>Note 2: Access with the _SAPxxx users is only possible via special URLs, which are not reachable outside of SAP, therefore customers cannot access those technical user accounts.</EM><BR /><BR /><EM>Note 3: Technical users are only used on SAP side for defined activities. SAP Support User can only request a user if there is a valid and open customer ticket in place. It is not possible to bypass this process.</EM><BR /><BR />Using the Security Audit Log (SAL), the last log-on of the SAP technical users can be monitored. The SAL is per default activated in the SAP S/4HANA cloud system (for details please read blog post part 2 “SAP S/4HANA Cloud, public edition – Secure by Default”).<BR /><BR />After the auditor has determined whether SAP employees had access to the productive customer system in the audited period, it should be evaluated, if the access to the SAP user accounts was reviewed by the customer timely after the fix / maintenance was completed.<BR /><BR />Note: There is no explicit approval by the customer after SAP did a change in the productive system. This is done implicitly when opening a customer ticket to SAP. The review of the activities by the customer is solely a customer internal process to ensure, that only authorized and appropriate changes were conducted and that the impact on the Internal Control System is evaluated.<BR /><BR />The access of SAP users to customer productive systems in case of e.g. incidents in also covered in the SOC1 type 2 report. For details please refer to our blog article Service Organization Controls Report Review (Part 4) | SAP Blogs.<BR /><BR />Using the SAP Help portal, it is possible to get further information about the access levels and access categories for the SAP support to customer systems (<A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/3cdb582583b342fd82b3caf3f3763af8.html" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/3cdb582583b342fd82b3caf3f3763af8.html</A><span class="lia-unicode-emoji" title=":disappointed_face:">😞</span></P><P><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/access-levels.png" border="0" /></P><P>&nbsp;</P><P><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/access-categories.png" border="0" /></P><P><BR />&nbsp;<BR /><BR /><STRONG><EM>Engage with us</EM></STRONG><BR /><BR /><EM>To read all upcoming posts in this series, please follow the&nbsp;</EM><A href="https://community.sap.com/t5/tag/S4HANACloud%20audit/tg-p/board-id/erp-blog-sap" target="_blank"><EM>S4HANACloud audit</EM></A><EM>&nbsp;tag we’ve created for this purpose.”</EM><BR /><BR /><EM>Or contact us on LinkedIn.</EM><BR /><BR /><EM>&nbsp;</EM><BR /><STRONG><EM>Your feedback</EM></STRONG><BR /><BR /><EM>Feel free to share your feedback and thoughts in the comment section below.</EM><BR /><BR />&nbsp;<STRONG>Who we are</STRONG></P><P><EM>A big thank you to my colleagues for their collaboration and support</EM></P><TABLE border="0"><TBODY><TR><TD><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/MEms_BusinessPortrait_Small.jpg" border="0" width="188" height="114" /></TD><TD><BR /><BR /><STRONG>Matthias Ems (SAP) –&nbsp;</STRONG><EM>Business Information Security Officer SAP S/4HANA&nbsp;and Chief Security Product Owner S/4HANA</EM><BR /><BR />With more than 20 years of experience in SAP Security, Auditing and Compliance, Matthias leads a team of Security Experts, responsible for Cloud Operations Security, Secure Development, Data Protection &amp; Privacy and Security Attestation &amp; Certification.</TD></TR><TR><TD><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/Florian_Portrait-scaled.jpg" border="0" width="188" height="114" /></TD><TD><BR /><BR /><STRONG>Florian Eller (SAP) –&nbsp;</STRONG><EM>Product Management SAP S/4HANA Security</EM><BR /><BR />Florian has more than 15 years of experience working at SAP. For the past 8 years, his focus has been on application security.</TD></TR><TR><TD><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/bjorn.png" border="0" width="157" height="157" /></TD><TD><BR /><BR /><STRONG>Björn Brencher (SAP) –&nbsp;</STRONG><EM><SPAN>Chief Product Security Architect SAP S/4HANA</SPAN></EM><BR /><BR />Bjoern is working in the field of SAP security for more than 2 decades with additional experience in SAP implementation and IT auditing.</TD></TR><TR><TD><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/Boch_SAP.jpg" border="0" width="159" height="159" /></TD><TD><BR /><BR /><STRONG>Patrick Boch (SAP) –&nbsp;</STRONG><EM>Product Management SAP S/4HANA Security</EM><BR /><BR />Patrick has 20 years experience of working with SAP, with a focus on SAP security for over a decade.</TD></TR><TR><TD><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/HJacob.jpg" border="0" width="190" height="184" /></TD><TD><BR /><BR /><STRONG>Heiko Jacob (Deloitte) –&nbsp;</STRONG><EM>Partner Risk Advisory (IT &amp; Specialized Assurance)</EM><BR /><BR />Heiko Jacob has more than 20 years of experience in the field of IT auditing and IT consulting, both in industry and with financial service providers.</TD></TR><TR><TD><IMG src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/Ckohler.jpg" border="0" width="192" height="192" /></TD><TD><BR /><BR /><STRONG>Christina Köhler (Deloitte) –&nbsp;</STRONG><EM>Senior Manager Risk Advisory (IT &amp; Specialized Assurance)</EM><BR /><BR />Christina Köhler has more than 6 years of professional experience in the field of IT auditing and IT consulting, both in industry and with financial service providers.</TD></TR></TBODY></TABLE><P><BR />&nbsp;</P> 2023-11-03T10:56:02+01:00 https://community.sap.com/t5/technology-blogs-by-sap/%E3%82%AF%E3%83%A9%E3%82%A6%E3%83%89%E6%99%82%E4%BB%A3%E3%81%AEsap%E3%81%AEid%E3%81%A8%E3%82%A2%E3%82%AF%E3%82%BB%E3%82%B9%E7%AE%A1%E7%90%86%E3%82%BD%E3%83%AA%E3%83%A5%E3%83%BC%E3%82%B7%E3%83%A7%E3%83%B3%E3%81%AE%E3%81%94%E7%B4%B9%E4%BB%8B/ba-p/13574222 クラウド時代のSAPのIDとアクセス管理ソリューションのご紹介 2023-11-27T09:22:35+01:00 masahiroo https://community.sap.com/t5/user/viewprofilepage/user-id/4299 こんにちは!<BR /> <BR /> 今回のブログでは、クラウド時代にふさわしい SAP が提供する IDとアクセス管理(いわゆる IAM、Identity and Access Management)のためのソリューションをご紹介します。<BR /> <H1 id="toc-hId-834871299">ソリューションポートフォリオ</H1><BR /> 企業ユーザのための IDとアクセス管理ソリューションは、以下の3つの領域において、クラウドでの提供サービスと、従来からのオンプレミスソリューションで構成されます。<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/portofolio-1.png" /></P><BR /> &nbsp;<BR /> <H1 id="toc-hId-638357794">クラウドソリューション</H1><BR /> <H3 id="toc-hId-700009727">SAP Cloud Identity Services</H3><BR /> SAP Cloud Identity Services では、ユーザ認証およびプロビジョニングの基本機能が提供されます。SAP Cloud Identity Services は、Identity Authentication と Identity Provisioning の 2 つの主要コンポーネントで構成されています。<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/identity-services-1.png" /></P><BR /> 詳細については、ヘルプ「<A href="https://help.sap.com/docs/cloud-identity" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services</A>」を参照ください。<BR /> <H3 id="toc-hId-503496222">SAP Cloud Identity Services - Identity Provisioning</H3><BR /> SAP Cloud Identity Services - Identity Provisioning は、ID ライフサイクルプロセスを管理するための SCIM ベースのクラウドサービスです。このサービスにより、アイデンティティライフサイクルプロセスが自動化され、さまざまなクラウドおよびオンプレミスのビジネスアプリケーションへの ID とその権限のプロビジョニングが容易になります。<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/ips.png" /></P><BR /> 詳細については、ヘルプ <A href="https://help.sap.com/docs/identity-provisioning?locale=ja-JP" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Provisioning</A>、SAP Discovery Center でのサービスカタログ <A href="https://discovery-center.cloud.sap/serviceCatalog/identity-provisioning" target="_blank" rel="nofollow noopener noreferrer">SAP Cloud Identity Services - Identity Provisioning</A> を参照ください。<BR /> <H3 id="toc-hId-306982717">SAP Cloud Identity Services - Identity Authentication</H3><BR /> SAP Cloud Identity Services, Identity Authentication は、SAP クラウドおよびオンプレミスアプリケーションの安全な認証およびシングルサインオンのためのパブリッククラウドサービスです。これは、アイデンティティプロバイダ自体として機能することも、顧客の既存のシングルサインオンインフラストラクチャと統合するためのプロキシとして使用することもできます。<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/ias.png" /></P><BR /> <P style="overflow: hidden;margin-bottom: 0px">詳細については、ヘルプ <A href="https://help.sap.com/docs/identity-authentication?locale=ja-JP" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services - Identity Authentication</A>、SAP Discovery Center でのサービスカタログ <A href="https://discovery-center.cloud.sap/serviceCatalog/identity-authentication" target="_blank" rel="nofollow noopener noreferrer">SAP Cloud Identity Services - Identity Authentication</A> を参照ください。</P><BR /> <BR /> <H3 id="toc-hId-110469212">SAP Cloud Identity Access Governance</H3><BR /> SAP Cloud Identity Access Governance は、シンプルでシームレスな適応型のビジネス主導の継続的なアクセス分析、ユーザプロビジョニング、およびロール設計により、管理者、監査人、およびビジネスユーザのアクセスガバナンスとコンプライアンスの複雑さとコストを削減します。IAG は、動的なロールエンジニアリングに機械学習を活用しています。<BR /> <BR /> 詳細については、ブログ「<A href="https://blogs.sap.com/2020/12/02/sap-cloud-identity-access-governance-iag-%E3%81%AE%E6%A6%82%E8%A6%81/" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Access Governance (IAG) の概要</A>」、ヘルプ <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE?locale=en-US" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Access Governance</A> を参照ください。<BR /> <H3 id="toc-hId--86044293">SAP Secure Login Service for SAP GUI</H3><BR /> SAP Secure Login Service for SAP GUI では、SAP GUI for Windows における安全な認証およびシングルサインオンが提供されます。<BR /> <BR /> 詳細については、ブログ「<A href="https://blogs.sap.com/2023/11/27/sap-gui-for-windows-%e3%81%ae%e3%81%9f%e3%82%81%e3%81%ae%e3%82%b7%e3%83%b3%e3%82%b0%e3%83%ab%e3%82%b5%e3%82%a4%e3%83%b3%e3%82%aa%e3%83%b3%e3%82%bd%e3%83%aa%e3%83%a5%e3%83%bc%e3%82%b7%e3%83%a7%e3%83%b3/" target="_blank" rel="noopener noreferrer">SAP GUI for Windows のためのシングルサインオンソリューションのご紹介</A>」、ヘルプ <A href="https://help.sap.com/docs/SAP%20SECURE%20LOGIN%20SERVICE?locale=en-US" target="_blank" rel="noopener noreferrer">SAP Secure Login Service for SAP GUI</A>&nbsp;を参照ください。<BR /> <BR /> &nbsp;<BR /> <H1 id="toc-hId--540723236">オンプレミスソリューション</H1><BR /> <H3 id="toc-hId--479071303">SAP Identity Management</H3><BR /> SAP Identity Management は、オンプレミス環境のSAP、SAP以外のアプリケーションのためのIDMソリューションです。<BR /> <BR /> 詳細については、このブログの最後の概要、あるいはヘルプ <A href="https://help.sap.com/docs/SAP_IDENTITY_MANAGEMENT?locale=en-US" target="_blank" rel="noopener noreferrer">SAP Identity Management</A> を参照ください。<BR /> <H3 id="toc-hId--675584808">SAP Access Control</H3><BR /> SAP Access Control では、アクセスリスク違反を検出、修正、および最終的に防止するプロセス、ロール管理アクティビティの標準化、プロビジョニングプロセスとユーザアクセスレビュープロセスの自動化、およびスーパーユーザアクティビティのエンドツーエンドの可視性の提供が含まれます。<BR /> <BR /> 詳細については、ブログ「<A href="https://blogs.sap.com/2019/12/06/sap-access-control-%E3%81%AE%E6%A6%82%E8%A6%81/" target="_blank" rel="noopener noreferrer">SAP Access Control の概要</A>」、ヘルプ <A href="https://help.sap.com/docs/SAP_ACCESS_CONTROL?locale=en-US" target="_blank" rel="noopener noreferrer">SAP Access Control</A> を参照ください。<BR /> <H3 id="toc-hId--947329682">SAP Single Sign-On</H3><BR /> SAP Single Sign-On は、オンプレミスのシングルサインオンソリューションです。<BR /> <BR /> 詳細については、ブログ「<A href="https://blogs.sap.com/2023/11/27/sap-gui-for-windows-%e3%81%ae%e3%81%9f%e3%82%81%e3%81%ae%e3%82%b7%e3%83%b3%e3%82%b0%e3%83%ab%e3%82%b5%e3%82%a4%e3%83%b3%e3%82%aa%e3%83%b3%e3%82%bd%e3%83%aa%e3%83%a5%e3%83%bc%e3%82%b7%e3%83%a7%e3%83%b3/" target="_blank" rel="noopener noreferrer">SAP GUI for Windows のためのシングルサインオンソリューションのご紹介</A>」、ヘルプ <A href="https://help.sap.com/docs/SAP_SINGLE_SIGN-ON?locale=en-US" target="_blank" rel="noopener noreferrer">SAP Single Sign-On</A> を参照ください。<BR /> <BR /> <HR /><BR /> <BR /> <H1 id="toc-hId--557037173">補足: SAP Identity Management の主な機能について</H1><BR /> 以下は、過去、別サイトに投稿したブログからの抜粋です。該当サイトが近く閉鎖されることから記録として残すために、転載しています。灰色の文字が元のブログから、黒字が今回追記した箇所を示しています。<BR /> <H2 id="toc-hId--1046953685"><SPAN style="color: #999999"><STRONG>SAP Identity Managementとは?</STRONG></SPAN></H2><BR /> <SPAN style="color: #999999">SAP Identity Management によって、企業は、複雑で異機種混在のシステム環境において、ユーザーIDとそのIDへの権限の割当を集中管理できます。例えば、複数のシステムに分散した、本社、関連会社、契約社員のユーザーIDを一元管理できます。</SPAN><BR /> <BR /> SAP Cloud Identity Services により、本社、関連会社、契約社員を含むユーザID を一元管理できます。<BR /> <BR /> <SPAN style="color: #999999">SAPおよびSAP以外のアプリケーションにユーザーIDと権限割当を自動的に配信できます。また、SAP Access Controlソリューションと連携することで、職務分掌に適合したコンプライアンス対応のID管理を実現できます。</SPAN><BR /> <BR /> SAP Cloud Identity Services - Identity Provisioning、あるいは、SAP Cloud Identity Services - Identity Provisioning と SAP Cloud Identity Access Governance との組み合わせにより、SAPおよびSAP以外のアプリケーションにユーザーIDと権限割当を自動的に配信でき、SAP Cloud Identity Access Governance を利用して職務分掌に適合したコンプライアンス対応をサポートできます。<BR /> <BR /> <SPAN style="color: #999999">ワークフロー、レポート、セルフサービス機能を提供します。SAPのシングルサインオンソリューションと連携することで、ITシステム全体に対するシングルサインを、アクセスセキュリティを確保したうえで安全に提供できます。</SPAN><BR /> <BR /> SAP Cloud Identity Access Governance により、ワークフロー、レポート、セルフサービスの権限申請をサポートできます。SAP Cloud Identity Services - Identity Authentication により、ITシステム全体に対するブラウザベースでのシングルサインオンを実現できます。SAP GUI for Windows でのシングルサインオンに対しては、SAP Secure Login Service for SAP GUI がこれをサポートします。<BR /> <DIV><BR /> <BR /> <SPAN style="color: #999999"><A style="color: #999999" href="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-1.png" target="_blank" rel="noopener nofollow noreferrer"><IMG class="wp-image-15213 size-medium" src="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-1-614x332.png" alt="capture-1" width="614" height="332" aria-describedby="caption-attachment-15213" /></A></SPAN><BR /> <P id="caption-attachment-15213" class="wp-caption-text"><SPAN style="color: #999999">図: SAP Identity Management の主な機能</SPAN></P><BR /> <BR /> </DIV><BR /> <H2 id="toc-hId--1243467190"><SPAN style="color: #999999">SAP Identity Managementの差別化要因</SPAN></H2><BR /> <UL><BR /> <LI><SPAN style="color: #999999">SAPアプリケーションとの技術的連携</SPAN><BR /> <UL><BR /> <LI><SPAN style="color: #999999">SAP S/4HANA、SAP Business Suite、SAP HANA、SAP BusinessObjects、SAP SuccessFactorsを含むSAPアプリケーションとの連携</SPAN></LI><BR /> </UL><BR /> </LI><BR /> <LI><SPAN style="color: #999999">ビジネスプロセスレベルの連携</SPAN><BR /> <UL><BR /> <LI><SPAN style="color: #999999">SAP HCM、SAP SuccessFactorsとの連携(従業員情報)</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP CRMとの連携(ビジネスパートナー情報)</SPAN></LI><BR /> </UL><BR /> </LI><BR /> <LI><SPAN style="color: #999999">SAP Access Controlとの連携 -&gt; コンプライアンス(職務分掌)</SPAN></LI><BR /> <LI><SPAN style="color: #999999">多くのSAPおよびSAP以外とのコネクタを標準装備(例: Active Directory、Outlook、Lotus Notes、データベース、ファイル、他)</SPAN></LI><BR /> </UL><BR /> <H2 id="toc-hId--1439980695"><SPAN style="color: #999999">SAP Identity Managementの利用シナリオ</SPAN></H2><BR /> <SPAN style="color: #999999">統制されたID管理の代表例としてユーザーによるロール(権限)割当申請のシナリオと、ビジネスプロセスの効率化に有効な人事ビジネスプロセスとの連携によるプロビジョニングのシナリオを紹介します。</SPAN><BR /> <H5 id="toc-hId-1778264075"><SPAN style="color: #999999">(1) ユーザーによるロール(権限)割当申請のシナリオ</SPAN></H5><BR /> <OL><BR /> <LI><SPAN style="color: #999999">ユーザーがSAP Identity Managementにログインし、Web UIを使って、ロール割当を申請</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP Identity Managementのワークフロー機能により、マネージャーにワークフローのタスクが通知され、マネージャーは申請を承認</SPAN><BR /> <SPAN style="color: #999999">(3から6はオプション)</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP Identity ManagementはSAP Access Controlのリスク分析へ依頼を転送</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP Access Controlはリスクを分性(職務分掌に適合することをチェック)</SPAN></LI><BR /> <LI><SPAN style="color: #999999">リスクがある場合は適切な担当者が緩和処置を実行</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP Access ControlはリスクステータスをSAP Identity Managementに転送</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP Identity Managementは、ターゲットシステムへ配信(例えば、SAP ERPの請求処理ロールの申請のケースでは、SAP ERPのユーザIDに請求処理ロールを割当てる。ユーザーIDが未登録であればそのIDを登録する。)</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP Identity Managementは、ユーザーとマネージャーへメールで完了を通知</SPAN></LI><BR /> </OL><BR /> <DIV><BR /> <BR /> <SPAN style="color: #999999"><A style="color: #999999" href="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-3.png" target="_blank" rel="noopener nofollow noreferrer"><IMG class="wp-image-15216 size-medium" src="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-3-614x343.png" alt="capture-3" width="614" height="343" aria-describedby="caption-attachment-15216" /></A></SPAN><BR /> <P id="caption-attachment-15216" class="wp-caption-text"><SPAN style="color: #999999">図: ロール割当申請から配信までのプロセスフロー</SPAN></P><BR /> <BR /> </DIV><BR /> <H5 id="toc-hId-1581750570"><SPAN style="color: #999999">(2)人事プロセス主導のIDとロール割当のシナリオ(採用時)</SPAN></H5><BR /> <OL><BR /> <LI><SPAN style="color: #999999">採用前フェーズ: 人事は、ポジションや入社日などの彼女の社員データを入力</SPAN></LI><BR /> <LI><SPAN style="color: #999999">イベント起動で個人データを抽出</SPAN></LI><BR /> <LI><SPAN style="color: #999999">SAP HCMでのポジションに基づき、IDMは、ビジネスロール “Marketing Specialist” を自動的に割当て</SPAN></LI><BR /> <LI><SPAN style="color: #999999">彼女の上司が割当を承認</SPAN></LI><BR /> <LI><SPAN style="color: #999999">仕事の初日: 関連システムにロールと権限情報を配信</SPAN></LI><BR /> </OL><BR /> <DIV><BR /> <BR /> <SPAN style="color: #999999"><A style="color: #999999" href="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-4.png" target="_blank" rel="noopener nofollow noreferrer"><IMG class="wp-image-15217 size-medium" src="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-4-614x285.png" alt="capture-4" width="614" height="285" aria-describedby="caption-attachment-15217" /></A></SPAN><BR /> <P id="caption-attachment-15217" class="wp-caption-text"><SPAN style="color: #999999">図: ビジネスプロセス主導のID管理(採用時)</SPAN></P><BR /> <BR /> </DIV><BR /> <H2 id="toc-hId--2029521210"><SPAN style="color: #999999">SAP Identity Managementのコネクタ</SPAN></H2><BR /> <SPAN style="color: #999999">SAP Identity Managementの標準コネクタの一覧を示します。多くのコネクタが提供されていることを確認いただけると思います。これら以外に、パートナー企業から提供されているコネクタもあります。必要に応じて、コネクタを独自に開発することも可能です。</SPAN><BR /> <DIV><BR /> <BR /> <SPAN style="color: #999999"><A style="color: #999999" href="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-5.png" target="_blank" rel="noopener nofollow noreferrer"><IMG class="wp-image-15218 size-medium" src="https://www.sapjp.com/blog/wp-content/uploads/2016/11/Capture-5-614x341.png" alt="capture-5" width="614" height="341" aria-describedby="caption-attachment-15218" /></A></SPAN><BR /> <P id="caption-attachment-15218" class="wp-caption-text"><SPAN style="color: #999999">図: SAP Identity Management のコネクタ一覧</SPAN></P><BR /> <BR /> </DIV> 2023-11-27T09:22:35+01:00 https://community.sap.com/t5/financial-management-blogs-by-sap/enhance-your-sap-experience-with-sap-approved-grc-ac-experts-through-the/ba-p/13574468 Enhance your SAP experience with SAP approved GRC AC Experts through the Ask an Expert Peer channel 2023-12-04T15:55:49+01:00 neerajmanocha https://community.sap.com/t5/user/viewprofilepage/user-id/45911 &nbsp;<BR /> <H1 id="toc-hId-834873351">What is Ask an Expert Peer?</H1><BR /> <P style="text-align: left"><A href="https://support.sap.com/en/my-support/product-support/ask-expert-peer.html" target="_blank" rel="noopener noreferrer">Ask an Expert Peer</A>&nbsp;lets you&nbsp;<STRONG>collaborate</STRONG>&nbsp;on your technical, product-related questions through one-on-one interactions with a qualified and approved expert&nbsp;<STRONG>outside</STRONG>&nbsp;of SAP. This channel is best to deliver fast issue resolutions for your basic, non-business critical questions and all&nbsp;<STRONG>low&nbsp;</STRONG>to&nbsp;<STRONG>medium&nbsp;</STRONG>priority cases. Ask an Expert Peer is currently available for&nbsp;<STRONG>SAP SuccessFactors</STRONG>&nbsp;and&nbsp;<STRONG>SAP ERP, SAP S/4 HANA, Technology, GRC &amp; Finance</STRONG>&nbsp;solutions&nbsp;at no additional cost.</P><BR /> More information, including expanded product areas for Ask an Expert Peer, can be found in&nbsp;<A href="https://me.sap.com/notes/2998816" target="_blank" rel="noopener noreferrer">KBA 2998816</A>.&nbsp; More details in <A href="https://blogs.sap.com/2023/10/05/ask-an-expert-peer-is-now-live-in-the-get-support-application-in-sap-for-me/" target="_blank" rel="noopener noreferrer">blog</A><BR /> <BR /> &nbsp;<BR /> <H1 id="toc-hId-638359846">Ask an Expert Peer channel is available for which GRC Product Areas?</H1><BR /> This channel is available for <STRONG>SAP Access Control</STRONG> and <STRONG>SAP Access Control for SAP S/4HANA</STRONG>.<BR /> <BR /> Experts are available for all sub-product functions of Access Control.<BR /> <BR /> Product Function includes:-<BR /> <OL><BR /> <LI>Emergency Access Management</LI><BR /> <LI>Business Role Management</LI><BR /> <LI>Access Risk Analysis</LI><BR /> <LI>Access Request Management</LI><BR /> <LI>Analysis and Reports</LI><BR /> </OL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Product_Function.png" /></P><BR /> &nbsp;<BR /> <H1 id="toc-hId-441846341">How to Access Ask an Expert Peer from SAP&nbsp;for&nbsp;ME?</H1><BR /> <UL><BR /> <LI>Logon to <A href="https://me.sap.com/" target="_blank" rel="noopener noreferrer">SAP for Me</A> with valid S user id. Navigate to <STRONG>Services &amp; Support</STRONG> and select <STRONG>Get Support</STRONG> App</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/SAP4ME.png" /></P><BR /> &nbsp;<BR /> <UL><BR /> <LI>Provide all basic information about your issue, System, Product and Product Function.</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Basic_info.png" /></P><BR /> &nbsp;<BR /> <UL><BR /> <LI>Based upon Product <STRONG>SAP Access Control</STRONG> / <STRONG>SAP Access Control for SAP S/4HANA </STRONG>selection, all available channels will be shown. Select button “Ask an Expert Peer” to launch the experience</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/AaEP.png" /></P><BR /> <BR /> <UL><BR /> <LI>Provide details about your issue and submit your question. A&nbsp;qualified and approved&nbsp;expert outside of SAP will work with you to resolve your case through a chat window.</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Submit_Question.png" /></P><BR /> <BR /> <UL><BR /> <LI>If the expert is unable to resolve your question or you are not satisfied with the answer, you have the option to&nbsp;easily switch to another channel and interact with SAP support&nbsp;by starting&nbsp;<STRONG>Schedule an Expert&nbsp;</STRONG>or by submitting <STRONG>Case</STRONG>. The conversation transcript from Ask an Expert Peer will be saved, so there will be no duplication of effort for you.</LI><BR /> </UL><BR /> <H3 id="toc-hId-503498274"></H3><BR /> <H3 style="text-align: center" id="toc-hId-306984769"><STRONG>Start using Ask an Expert Peer</STRONG> <STRONG>today for all your&nbsp;</STRONG><STRONG>low&nbsp;</STRONG><STRONG>to&nbsp;</STRONG><STRONG>medium</STRONG><STRONG><BR /> priority incidents.</STRONG></H3><BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> &nbsp; 2023-12-04T15:55:49+01:00 https://community.sap.com/t5/technology-blogs-by-members/privileged-access-management-in-sap-s-4hana-cloud-a-comprehensive-guide/ba-p/13571778 Privileged Access Management in SAP S/4HANA Cloud: A Comprehensive Guide 2024-01-03T18:58:26+01:00 SubbuIyer https://community.sap.com/t5/user/viewprofilepage/user-id/179044 <STRONG>Introduction:</STRONG> In the dynamic world of cloud computing, managing privileged access is crucial for maintaining security and operational integrity. SAP's introduction of Privileged Access Management (PAM) for SAP S/4HANA Cloud, as part of the SAP Cloud Identity and Access Governance (IAG) release 2302, marks a significant advancement in this field. This feature streamlines access control, ensuring enhanced security and compliance within your SAP environment. In this blog post, we'll explore the key steps and best practices for implementing PAM in SAP S/4HANA Cloud.<BR /> <BR /> <STRONG>Understanding the Basics:</STRONG><BR /> <BR /> Privileged Access Management (PAM) in the context of SAP S/4HANA Cloud is a critical aspect of cybersecurity and compliance. It serves as the cornerstone of secure cloud operations. But what exactly is PAM, and why is it so vital in the SAP ecosystem? At its core, PAM is a security solution designed to monitor and control elevated ('privileged') access within an IT environment. Privileged accounts are those that have administrative or specialized access to critical systems. In SAP S/4HANA Cloud, these accounts could include system administrators, superusers, or any account with access to sensitive data and controls.<BR /> <BR /> Privileged or Emergency Access Management in SAP refers to the process of <STRONG><U>securely granting</U></STRONG> and <STRONG><U>monitoring temporary</U></STRONG>, <STRONG><U>high-level access </U></STRONG>to critical systems and data in <STRONG><U>exceptional situations </U></STRONG>while <STRONG><U>ensuring strict controls</U></STRONG>, <STRONG><U>auditability</U></STRONG>, and <STRONG><U>accountability</U></STRONG>. This access is typically granted to <STRONG><U>authorized personnel </U></STRONG>for <STRONG><U>urgent tasks </U></STRONG>and it is closely managed to minimize security risks.<BR /> <BR /> The figure below explains some of the scenarios where PAM can be potentially used.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture1-52.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM Usage Scenarios</P><BR /> The figure below explains the PAM process for SAP S/4HANA Cloud.<BR /> <UL><BR /> <LI>Users can create self-service requests for emergency access to systems and applications.</LI><BR /> <LI>Approvers, reviewers and security&nbsp;can review requests for emergency access and grant access.</LI><BR /> <LI>Compliance persons can perform periodic audit and monitoring based on usage logs.</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture2-39.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM Process</P><BR /> The benefits of PAM are:<BR /> <UL><BR /> <LI><STRONG>Enhanced Security</STRONG>: PAM ensures that only authorized personnel have access to critical systems, reducing the risk of security breaches.</LI><BR /> <LI><STRONG>Audit and Compliance</STRONG>: It provides detailed logging and tracking of privileged activities, which is crucial for audits and regulatory compliance.</LI><BR /> <LI><STRONG>Least Privilege Principle</STRONG>: PAM enforces the principle of least privilege, where users are granted only the access necessary for their role, minimizing the potential for unauthorized access or actions.</LI><BR /> </UL><BR /> The various terminologies used within PAM process in SAP are:<BR /> <UL><BR /> <LI><STRONG>PAM User: </STRONG>The IT Support User who requires the elevated access.</LI><BR /> <LI><STRONG>PAM ID: </STRONG>The PAM User Id with elevated privileges.</LI><BR /> <LI><STRONG>PAM Approver: </STRONG>The person(s) who approvers the PAM ID assignment to a PAM User.</LI><BR /> <LI><STRONG>PAM Reviewer: </STRONG>The person(s) who reviews the log request and investigates any differences between intended and actual usage.</LI><BR /> </UL><BR /> The PAM ID is a generic ID created in SAP IAG and backend SAP S/4HANA Cloud system.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture3-32.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">What is a PAM ID?</P><BR /> <STRONG>Implementation Steps:</STRONG><BR /> <OL><BR /> <LI><STRONG>Client Authentication Setup</STRONG>: This step involves creating a client ID and secret for the S/4HANA application in Identity Authentication (IAS). It is crucial for establishing a secure connection.</LI><BR /> <LI><STRONG>Destination Creation in BTP</STRONG>: We then proceed to create a destination in the BTP for PAM in the IAG Subaccount.</LI><BR /> <LI><STRONG>Privileged Access IDs Creation</STRONG>: This is a critical step where privileged access IDs are set up in PAM on IAG.</LI><BR /> <LI><STRONG>Provisioning Job Execution</STRONG>: Finally, running the provisioning job on IAG is essential to ensure that all configurations take effect.</LI><BR /> </OL><BR /> <STRONG>Prerequisites:</STRONG><BR /> <BR /> Before diving into the implementation of Privileged Access Management (PAM) in SAP S/4HANA Cloud, certain foundational steps must be completed. Here's what needs to be in place:<BR /> <UL><BR /> <LI>IPS_PROXY destination has been set as per <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/2f35348ac2514c5b85f59903a9b46152.html" target="_blank" rel="noopener noreferrer">SAP documentation</A></LI><BR /> <LI>S/4HANA Cloud application setup has been completed as per <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/3c7e891872a547b182587c4814b2d783.html" target="_blank" rel="noopener noreferrer">SAP documentation</A></LI><BR /> <LI>Worker IDs have been created for the PAM IDs using the Manage Workforce app in S/4HANA Cloud.</LI><BR /> <LI>Business roles have been defined for PAM in IAG</LI><BR /> <LI>PAM access has been provided using BTP role collections for PAM to the administrators, approvers, reviewers, and the PAM end users. (Pre-delivered role collection CIAG_Privileged_Access)</LI><BR /> <LI>Access Request workflow has been set up for PAM as per <A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/e12d8683adfa4471ac4edd40809b9038/27449edc553640f683565cf662c92351.html" target="_blank" rel="noopener noreferrer">SAP documentation</A>. (Request Type: PAM and PAMREVIEW)</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture4-26.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Request Type Rule for PAM Access Request Process</P><BR /> <BR /> <UL><BR /> <LI>The following communication scenarios have been added to the communication user in S/4HANA:</LI><BR /> </UL><BR /> <TABLE class=" aligncenter" style="height: 294px" width="484"><BR /> <TBODY><BR /> <TR><BR /> <TD style="width: 126px">SAP_COM_0193</TD><BR /> <TD style="width: 342px">Identity Provisioning Integration</TD><BR /> </TR><BR /> <TR><BR /> <TD style="width: 126px">SAP_COM_0066</TD><BR /> <TD style="width: 342px">SAP Cloud Identity Access Governance Integration</TD><BR /> </TR><BR /> <TR><BR /> <TD style="width: 126px">SAP_COM_0093</TD><BR /> <TD style="width: 342px">Identity Management Integration</TD><BR /> </TR><BR /> <TR><BR /> <TD style="width: 126px">SAP_COM_0327</TD><BR /> <TD style="width: 342px">Business User Change Document Integration</TD><BR /> </TR><BR /> <TR><BR /> <TD style="width: 126px">SAP_COM_0366</TD><BR /> <TD style="width: 342px">Business Role Change Document Integration</TD><BR /> </TR><BR /> <TR><BR /> <TD style="width: 126px">SAP_COM_0750</TD><BR /> <TD style="width: 342px">Security Audit Log Integration</TD><BR /> </TR><BR /> </TBODY><BR /> </TABLE><BR /> We started implementing PAM after we completed the implementation of the Access Request Service. So, some of these prerequisites were already in place.<BR /> <BR /> <STRONG>Configuration Steps</STRONG><BR /> <BR /> Let's walk through the key configuration steps.<BR /> <UL><BR /> <LI><STRONG>Client Authentication Setup for S/4HANA Application in Identity Authentication (IAS)</STRONG></LI><BR /> </UL><BR /> To integrate with IAG, we will create a Client ID and Secret on the S/4HANA application in IAS. This is because IAG currently only supports basic authentication. You will need to use this client and secret as your user and password when setting up the BTP destination for PAM.<BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Navigate to Applications and Resources  Applications.</LI><BR /> <LI>Select the SAP S/4HANA Cloud Tenant and navigate to Trust  Application APIs  Client Authentication.</LI><BR /> <LI>Go to the Secrets section and click on Add. Enter a description and click Save.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture5-20.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Add a Secret in S/4HANA API Authentication on IAS</P><BR /> <BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Copy and securely store the Client and Secret values. They will be required to create the BTP destination for PAM.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture6-17.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Copy Client ID and Secret</P><BR /> <BR /> <UL><BR /> <LI><STRONG>Create a destination in BTP for PAM in the IAG Subaccount</STRONG></LI><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Login to the IAG Subaccount on BTP and navigate to Connectivity  Destinations.</LI><BR /> <LI>Create a new destination with these values:</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Name: (e.g., S4C-IAG-PAM)</LI><BR /> <LI>Description: PAM Destination for S/4HANA</LI><BR /> <LI>Type: HTTP</LI><BR /> <LI>Accept: *<EM>/*</EM></LI><BR /> <LI>Authentication: BasicAuthentication</LI><BR /> <LI>ProxyType: Internet</LI><BR /> <LI>URL: [Your IAS URL, e.g.,https://&lt;yourtenant&gt;.accounts.ondemand.com]</LI><BR /> <LI>User: [Client ID from IAS]</LI><BR /> <LI>Password: [Secret from IAS]</LI><BR /> <LI>USERSURL: /service/users</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture7-12.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Destination for PAM in the IAG Subaccount on SAP BTP</P><BR /> <BR /> <UL><BR /> <LI><STRONG>Update the S/4HANA destination with PAM parameters in the IAG Subaccount</STRONG></LI><BR /> </UL><BR /> Add these additional properties to the S/4HANA destination in BTP in the IAG subaccount.<BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>IASApplicationName: Application name of Identity Authentication system in IAG</LI><BR /> <LI>IASDestinationName: Name of the PAM destination created in the previous step</LI><BR /> <LI>IASSubjectNameIdentifier: The Subject Name Identifier used for user authentication to S/4HANA in the IAS application configuration. E.g. UserID or Email</LI><BR /> <LI>S4HCHomePageURL: URL to the S/4HANA system. If you have set up a corporate identity provider and if you are using IAS as a proxy then you will need the URL to bypass the corporate identity provider. This can be found under the conditional authentication of the S/4HANA application configuration in IAS.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture8-11.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Destination for S/4HANA Cloud in IAG Subaccount on SAP BTP</P><BR /> <BR /> <UL><BR /> <LI><STRONG>Create Privileged Access Ids in PAM on IAG</STRONG></LI><BR /> </UL><BR /> You can now start creating the PAM Ids using the “Maintain Privileged Access” app on IAG.<BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Login to IAG and navigate to Privilege Access Management tab.</LI><BR /> <LI>Open the app “Maintain Privileged Access”</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture9-12.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Maintain Privileged Access App on IAG</P><BR /> <BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Click on “+” button on the right.</LI><BR /> <LI>In the attributes section enter all the mandatory fields.</LI><BR /> <LI>Name: Same as Worker ID</LI><BR /> <LI>Description: Provide a suitable description for the PAM ID</LI><BR /> <LI>Business Role: Role defined for the PAM ID in IAG</LI><BR /> <LI><STRONG>PS: Upon selecting the business role, the Employee ID and Email fields are displayed. These fields are not displayed initially.</STRONG></LI><BR /> <LI>Employee ID: Same as Worker ID</LI><BR /> <LI>Email: Same as the email provided for the Worker ID</LI><BR /> <LI>Criticality: Can be CRITICAL, HIGH, MEDIUM or LOW</LI><BR /> <LI>Duration in Days: Max number of days for which the PAM can be requested.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture10-10.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Attributes Section of a PAM ID on IAG</P><BR /> <BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>In the allowed activities, you will be provided with a list of catalogs based on the business role assigned. Here you can select the activities for which the PAM ID is designed to be used. This is not an authorization restriction for the PAM ID. It is just for documentation purposes only.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture11-13.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Catalogs allowed for the PAM ID based on the assigned business role</P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture12-10.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Allowed activities section of the PAM ID on IAG</P><BR /> <BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>In the Approvers / Reviewers section you will assign the users who should approve the PAM ID in the access request workflow in the “ROLE OWNER” stage and the person who will review the log access review request after the PAM ID has been used by a user. PS: All IAS users are listed for selection. There is no dependency upon any group to be assigned for users to be listed here.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture13-8.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Approvers and Reviewers section of the PAM ID on IAG</P><BR /> <BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Click on Save and Activate to save the PAM ID.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> &nbsp;<BR /> <UL><BR /> <LI><STRONG>Run the provisioning job on IAG</STRONG><BR /> <UL><BR /> <LI>Navigate to Administration  Job Scheduler</LI><BR /> <LI>Provide a suitable job description and job category as Provisioning</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture14-7.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Schedule Job for PAM ID Provisioning on IAG</P><BR /> <BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Click on Schedule Job</LI><BR /> <LI>Navigate to the Job History App to confirm that the PAM ID has been provisioned in the S/4HANA Cloud backend system.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture15-8.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Log of Provisioned PAM ID in the Job History app on IAG</P><BR /> <BR /> <UL><BR /> <LI style="list-style-type: none"><BR /> <UL><BR /> <LI>Login to the backend S/4HANA Cloud to ensure the account has been created.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture16-6.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM ID displayed in Maintain Business Users app on S/4HANA Cloud</P><BR /> <STRONG>PAM Access Request Process</STRONG><BR /> <BR /> The Access Request app now allows you to request the PAM ID. Simply search for the PAM ID you need using the search field, or filter by “Access Type = Privilege Access”.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture17-6.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Search for PAM ID in Access Request on IAG</P><BR /> Once the PAM end user submits the request, the access request workflow for the "PAM" request type will be triggered. Note, the PAM end user is any IT support user who requires elevated access to perform a critical task in Production.<BR /> <BR /> The defined workflow will send the request to the appropriate approver. In the case below, the approver is the PAM Owner defined in the Maintain Privileged Access app on the PAM ID. You can define your own workflow stages and have multiple stage approval as well as multiple approvers for a stage (except the Manager stage).<BR /> <BR /> Note that the access request inbox for approving PAM requests is under the Privileged Access Management tab and the app is called "Privileged Access Request – Inbox”. This can cause confusion for approvers because the normal tendency would be to check the "Access Request - Inbox". I hope that in future releases SAP would consolidate the different inboxes of the services that have workflow capabilities on IAG.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture18-5.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Approval work item in Privileged Access Request – Inbox app on IAG</P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture19-7.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM Request Details for Approval on IAG</P><BR /> Once the request is approved, the user who made the request is assigned an ID.<BR /> <BR /> <STRONG>PAM Execution</STRONG><BR /> <BR /> The PAM end user can now log in to IAG and execute the PAM ID session using the "PAM Execute Session" application.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture20-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Assigned PAM ID displayed in PAM Execute Session app on IAG</P><BR /> Upon clicking “Execute Session”, the user is presented with a popup with a link to activate the PAM ID.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture21-3.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Access Link to activate PAM ID for the session</P><BR /> Click the link to open a new tab. The message displayed states that you are required to sign out from the current application to activate the new account. Click on Sign out and continue.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture22-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Sign Out page for activating the PAM ID</P><BR /> On the next page, enter a password for the account and click on continue.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture23-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">IAS Password entry page for activating PAM ID</P><BR /> You will now be logged in to the target S/4HANA Cloud system with the PAM ID.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture24-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">S/4HANA Account to confirm the logged in PAM ID</P><BR /> If you go to your IAS Tenant and navigate to the User Management section, you will see that the PAM ID is created after this step. Once the PAM session is terminated, the ID will be removed from IAS. This process will be repeated each time the user logs in and terminates the PAM session.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture25-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">IAS User Management displaying the activated PAM ID</P><BR /> Once you have completed the PAM tasks, sign out of the PAM ID from S/4HANA.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture26-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM Sign Out after completion of the session tasks</P><BR /> Navigate back to the IAG tab. If you have been logged out of IAG then close the browser and log back into IAG using a new browser window. Navigate back to the “PAM Execute Session” app.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture27-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM Execute Session app on IAG after Signing Out of PAM from S/4HANA</P><BR /> Click on “Terminate Session”. A pop up message confirms that the session has been terminated.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture28-5.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Termination Confirmation</P><BR /> The “Execute Session” button is displayed once again.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture29-3.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM Execute Session app on IAG after session is terminated</P><BR /> If you check the user in IAS you will find that the user has been deleted.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture30-3.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">PAM ID is deleted from IAS after session is terminated</P><BR /> <STRONG>PAM Log generation and review</STRONG><BR /> <BR /> To proceed, we need to schedule the Log Sync and Access Request Review jobs. It's recommended to schedule these jobs to run regularly, particularly in a production scenario.<BR /> <BR /> Using the Job Scheduler application on IAG, you can schedule the "Privileged Access Log Sync" job. This job syncs the logs from the S/4HANA backend system to IAG.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture31-4.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Scheduling the Privileged Access Log Sync Job on IAG</P><BR /> Check the Job History to confirm the job is completed. Next use the Job scheduler app on IAG, to schedule the “Privileged Access Review Request” Job.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture32-3.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Scheduling the Privileged Access Review Request job on IAG</P><BR /> The second job creates a log review request and sends it to the PAM ID reviewer for approval. The PAM reviewer can access the PAM Logs review request in the app “Privileged Access Monitoring – Inbox”.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture33-3.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Log review work item in Privileged Access Monitoring – Inbox app on IAG</P><BR /> The log review request has three files as attachment.<BR /> <OL><BR /> <LI>Business Role Changes: An excel file with changes made to the business role using the PAM ID during that PAM session.</LI><BR /> <LI>Business User Changes: An excel file with changes made to any business users using the PAM ID during that PAM session.</LI><BR /> <LI>Security Audit Log: An excel file with the details of the login session and the apps used during the PAM session.</LI><BR /> </OL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/12/Picture34-2.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Log attachments for the PAM session in the review work item</P><BR /> <STRONG>Important Note on PAM Log File Generation</STRONG><BR /> <BR /> As of the writing of this content, there is a known challenge with the consistent generation of log files in the Privileged Access Management (PAM) system. This issue primarily arises from a timing discrepancy between the PAM log generation process on SAP Cloud Identity Access Governance (IAG) and the synchronization with the SAP S/4HANA backend system. SAP is actively aware of this issue and is diligently working towards a resolution.<BR /> <BR /> In the interim, SAP has proposed a manual workaround for this issue. It involves the use of the "Click to upload attachment" feature to manually add log files from the SAP backend system. This method ensures that crucial log files are not missed and maintains a comprehensive audit trail for privileged access activities.<BR /> <BR /> To aid in the prioritization and rapid resolution of this issue, I have initiated a customer influence request. If you, like many others, are keen on seeing a more streamlined and automated solution to this log file generation challenge, your support would be invaluable. By voting on this customer influence request, you can significantly contribute to highlighting the importance of this issue to SAP, thereby potentially accelerating its resolution.<BR /> <BR /> <A href="https://influence.sap.com/sap/ino/#/idea/314189" target="_blank" rel="noopener noreferrer">https://influence.sap.com/sap/ino/#/idea/314189</A><BR /> <BR /> <STRONG>Completing the Privileged Access Management Cycle</STRONG><BR /> <BR /> The final step in the Privileged Access Management (PAM) process within SAP S/4HANA Cloud is crucial and signifies the completion of a comprehensive cycle of secure access management. Once a PAM ID has been used, it undergoes a thorough review process. This review is essential to ensure that the privileged access was utilized appropriately and by the established guidelines and policies.<BR /> <BR /> The PAM reviewer, a designated authority within the system, plays a pivotal role at this juncture. After the PAM ID usage, the reviewer meticulously examines the access logs and activities performed. This step is not just a formality but a critical component of maintaining the integrity and security of the system. It helps in identifying any discrepancies, unauthorized activities, or potential security risks.<BR /> <BR /> Upon a detailed review, when the PAM reviewer approves the review request, it marks the successful conclusion of the PAM process. This approval indicates that the privileged access was managed, executed, and reviewed in line with the stringent security standards set by the organization. 2024-01-03T18:58:26+01:00 https://community.sap.com/t5/technology-blogs-by-sap/creating-and-managing-campaigns-in-iag-access-certification-service/ba-p/13586060 Creating and Managing Campaigns in IAG - Access Certification Service 2024-01-31T10:37:26.306000+01:00 prashanthkumard https://community.sap.com/t5/user/viewprofilepage/user-id/891545 <P style=" text-align : left; "><STRONG>Introduction to SAP Cloud Identity Access Governance (IAG)</STRONG></P><P style=" text-align : left; ">SAP Cloud Identity Access Governance (SAP IAG) is a SaaS (Software as a service) application built on SAP Business Technology Platform (BTP). Although it offers features that are comparable to SAP GRC Access Control, it will not replace Access Control.</P><P>It provides out of the box integration with existing on-premise ECC applications along with latest cloud applications such as Ariba, SuccessFactors, S/4HANA, Analytics Cloud and other cloud solutions with many more SAP integrations on the roadmap. It helps customers achieve access control and governance through the below key services:</P><P style=" text-align : left; ">Access Analysis, Role Design, Access Request, Access Certification and Privileged Access Management.</P><P style=" text-align : left; ">I'll guide you through the Access Certification service in this blog post.</P><P style=" text-align : left; "><STRONG>What is Access Certification Service?</STRONG></P><P style=" text-align : left; ">Access certification service is used for periodically reviewing and certifying access to business applications in the cloud and on-premises area. It ensures that users have optimized access based on their designation.</P><P style=" text-align : left; ">The Managers and designated reviewers validate access to business applications. Periodic review process can be carried out for single roles, composite roles, business roles, profiles, and SAP SuccessFactors static groups.</P><P style=" text-align : left; "><STRONG>Responsibilities</STRONG><STRONG>&nbsp;of Campaign Administrators, Coordinators and Reviewers</STRONG></P><P style=" text-align : left; "><STRONG>Administrator</STRONG> – is responsible for creating and editing campaigns.</P><P style=" text-align : left; "><STRONG>Coordinator</STRONG> – is responsible for coordinating campaign activities, for example, reassign items, remind reviewers, escalating to the reviewer's manager etc.</P><P style=" text-align : left; "><STRONG>Reviewer</STRONG> – is responsible for approving/rejecting user access during review stage.</P><P style=" text-align : left; "><STRONG>Access required for Campaign Administrators, Coordinators, and Reviewers.</STRONG></P><TABLE border="1" width="100%"><TBODY><TR><TD width="27.091633466135455%" height="50px"><P><STRONG>User</STRONG></P></TD><TD width="46.34794156706507%" height="50px"><P><STRONG>Role collections on BTP</STRONG></P></TD><TD width="26.42762284196547%" height="50px"><P><STRONG>User groups on IAS</STRONG></P></TD></TR><TR><TD width="27.091633466135455%" height="50px"><P>Campaign Administrator</P></TD><TD width="46.34794156706507%" height="50px"><P>CIAG_Access_Certification_Admin</P></TD><TD width="26.42762284196547%" height="50px"><P>IAG_CPG_ADMIN</P></TD></TR><TR><TD width="27.091633466135455%" height="50px"><P>Coordinator</P></TD><TD width="46.34794156706507%" height="50px"><P>CIAG_Access_Certification_Coordinator</P></TD><TD width="26.42762284196547%" height="50px"><P>IAG_CPG_CO</P></TD></TR><TR><TD width="27.091633466135455%" height="50px"><P>Reviewer</P></TD><TD width="46.34794156706507%" height="50px"><P>CIAG_Access_Certification_Reviewer</P></TD><TD width="26.42762284196547%" height="50px"><P>IAG_CPG_REVIEWER</P></TD></TR></TBODY></TABLE><P style=" text-align : left; "><STRONG>&nbsp;</STRONG><STRONG>Note: </STRONG></P><P style=" text-align : left; ">IAG_WF_ADMIN - Users assigned to this group can receive and work on access certification review items in the security stage.</P><P style=" text-align : left; ">IAG_WF_DEFAULT - When managers or role owners are not available, the task of reviewing a user’s access is forwarded to members of this group.</P><P style=" text-align : left; "><STRONG>Access Certification Service apps</STRONG></P><P style=" text-align : left; ">Below are the apps available on<SPAN>&nbsp;the launchpad for the&nbsp;</SPAN><SPAN>access certification service.</SPAN></P><P style=" text-align : left; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_1-1706586854302.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55402i1B0DEBB9155D774E/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_1-1706586854302.jpeg" alt="prashanthkumard_1-1706586854302.jpeg" /></span></P><P style=" text-align : left; "><STRONG>How to create campaigns</STRONG>&nbsp;- Campaign administrators use the Create Campaigns app to create, edit, and submit campaigns.&nbsp;</P><UL style=" text-align : left; "><LI>Open Create Campaigns app and select the option new certification campaign as mentioned in the screenshot below.</LI></UL><P style=" text-align : left; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_5-1706587830893.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55406i6A26D46C19E04FDF/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_5-1706587830893.jpeg" alt="prashanthkumard_5-1706587830893.jpeg" /></span></P><UL style=" text-align : left; "><LI>In step 1 – General information, provide campaign name without spaces or special characters, description, planned duration, coordinators (the person responsible for managing the campaign) and send notification (coordinator will receive a notification about the upcoming end of the campaign’s planned duration) as mentioned in the screenshot below.</LI></UL><P style=" text-align : left; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_7-1706588863237.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55409iEA8AAEB13E0D86E9/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_7-1706588863237.jpeg" alt="prashanthkumard_7-1706588863237.jpeg" /></span></P><UL style=" text-align : left; "><LI>In step 2 – Data selection,&nbsp;add relevant information in the search fields to refine the set of users, access, and systems that are to be part of the campaign. You can choose any search criteria based on your requirement. In this instance, the search criteria is the application, which takes into account every application user for the purpose of evaluation.</LI></UL><P style=" text-align : left; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_8-1706591027986.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55417i99DD99BD73C379A5/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_8-1706591027986.jpeg" alt="prashanthkumard_8-1706591027986.jpeg" /></span></P><UL style=" text-align : left; "><LI>In step 3 - Workflow selection, select a workflow for approval process. You can choose any workflow from the list of workflows available. Here, the security workflow path is chosen.</LI></UL><P style=" text-align : left; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_9-1706591380257.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55420i02576C8B4162E915/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_9-1706591380257.jpeg" alt="prashanthkumard_9-1706591380257.jpeg" /></span></P><UL style=" text-align : left; "><LI>Review all the information and submit the campaign. Once it is submitted, review requests will be created and assigned to the corresponding reviewers.&nbsp;<STRONG>Note :</STRONG><SPAN> Once the campaign is in progress, it is sent to the Manage Active Campaigns app where the coordinator can view its status and monitor and manage the progress of the campaign.</SPAN></LI></UL><P style=" text-align : left; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_10-1706591543230.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55421i49228A26E81BD6C9/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_10-1706591543230.jpeg" alt="prashanthkumard_10-1706591543230.jpeg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_11-1706592042519.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55423iE1B048E838242350/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_11-1706592042519.jpeg" alt="prashanthkumard_11-1706592042519.jpeg" /></span></P><P style=" text-align : left; "><STRONG>How to Manage Active Campaigns - </STRONG>Campaign coordinators use the Manage Active Campaigns app to see the overall status of campaigns assigned to them. They can<SPAN>&nbsp;close an existing campaign, reassign tasks to a different reviewer, or remind a current reviewer of items to evaluate.&nbsp;</SPAN></P><UL><LI><SPAN>Select the campaign which was created previously.</SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_12-1706593067248.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55436i28DB50A33DBF563B/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_12-1706593067248.jpeg" alt="prashanthkumard_12-1706593067248.jpeg" /></span></P><UL><LI>Once you open the campaign, you can see the list of reviewers for the campaign and what status the review is in. It also includes the options to reassign to another reviewer, remind the reviewer that there are items to review, escalate the task to the reviewer’s manager, or release the claimed task. The Escalate option sends an e-mail notification to the reviewer’s manager, and the remind option sends an e-mail notification to the reviewer.&nbsp;</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_0-1706593996856.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55444i857101EABD07632C/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_0-1706593996856.jpeg" alt="prashanthkumard_0-1706593996856.jpeg" /></span></P><P><STRONG>How to Manage Campaign Reviewer Inbox - </STRONG>Campaign reviewers use the app Manage Campaign Reviewer Inbox app to review and approve the review requests.&nbsp;</P><UL><LI>Select the campaign that was created previously to review and approve requests.</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_0-1706595228651.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55453i7932F64A2FE4D1D2/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_0-1706595228651.jpeg" alt="prashanthkumard_0-1706595228651.jpeg" /></span></P><UL><LI>To perform a review, approve/reject each line item individually or choose approve/reject all to handle all line items. Here, a few line items were chosen for approval and a few for rejection. Following submission, requests that are approved will not be subject to any further action, while requests that are rejected will be deprovisioned.</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prashanthkumard_2-1706595777677.jpeg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55458iB11E106BF8FE4F20/image-size/large?v=v2&amp;px=999" role="button" title="prashanthkumard_2-1706595777677.jpeg" alt="prashanthkumard_2-1706595777677.jpeg" /></span></P><P><STRONG>What does Access Certification Audit Log app contain?</STRONG></P><P>Every campaign is listed in the audit log. This app can be used by anyone handling access certification campaigns to verify the steps that have been performed. Utilize the search function to locate particular campaigns.</P><P><STRONG>What does Access Certification Campaign Log app contain?</STRONG></P><P>Details about that campaign's log history are shown in the app. This covers any messages that are generated while the request creation process is run. Furthermore, the app assists you in confirming that the steps have been generated correctly.</P><P><STRONG>Conclusion</STRONG></P><P>I would like to conclude saying that, IAG - Access Certification service help organizations reduce losses from unforeseen risk (fraud, access risk) - by performing periodic access reviews for users.</P><P>It lowers compliance and risk management costs by empowering the business with automated user access management and efficient, cost-effective access audits.</P><P><STRONG>References</STRONG></P><P><A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/4458f419d4364b338a58864a24686eb3/053e74d967624c709f8cc30064f22234.html?version=CLOUDFOUNDRY" target="_blank" rel="noopener noreferrer">Product Overview | SAP Help Portal</A></P><P>&nbsp;</P> 2024-01-31T10:37:26.306000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/governance-risk-and-compliance-grc-with-sap-s-4hana-cloud-public-edition/ba-p/13586848 Governance, Risk, and Compliance (GRC) with SAP S/4HANA Cloud Public Edition 2402 2024-02-05T14:32:19.582000+01:00 KatrinDeissner https://community.sap.com/t5/user/viewprofilepage/user-id/181251 <P><STRONG>Hello and welcome to the release highlights for Governance, Risk, and Compliance (GRC) with <SPAN><SPAN class="">SAP S/4HANA Cloud Public Edition 2402</SPAN></SPAN>. This blog contains selected highlights from SAP Risk and Assurance Management (formerly known as SAP Financial Compliance Management), SAP Document and Reporting Compliance, and SAP Cloud Identity Access Governance along with their business benefits and deep-dive system demos.</STRONG></P><P>To get a quick overview of our <SPAN><SPAN class="">SAP S/4HANA Cloud Public Edition 2402&nbsp;</SPAN></SPAN>highlights for Governance, Risk, and Compliance (GRC), watch this 4-minute video:</P><P>&nbsp;</P><P><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FCVgOV6V3Cq8%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCVgOV6V3Cq8&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FCVgOV6V3Cq8%2Fhqdefault.jpg&amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;type=text%2Fhtml&amp;schema=youtube" width="200" height="112" scrolling="no" title="Governance, Risk, and Compliance with SAP S/4HANA Cloud Public Edition 2402" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"></iframe></div></P><H3 id="toc-hId-1094025674">&nbsp;</H3><H3 id="toc-hId-897512169"><STRONG>Topics of Covered in this Blog</STRONG></H3><UL><LI><P><STRONG>Expert Talk: Empower the Intelligent, Sustainable Enterprise with SAP Finance &amp; Risk – 2023 Update</STRONG></P></LI><LI><STRONG>SAP Risk and Assurance Management (formerly known as SAP Financial Compliance Management)</STRONG><UL><LI>Integrated Risk Management</LI><LI>Additional Assurance Activity Type in Control Management</LI><LI>Automated and Manual Grouping and Ungrouping of Issues</LI><LI>Preconfigured internal control framework for medium-sized companies</LI></UL></LI></UL><UL><LI><STRONG>SAP Cloud Identity Access Governance</STRONG><UL><LI>Support for Multiple Rulesets in Access Analysis</LI></UL></LI><LI><STRONG>SAP Document and Reporting Compliance</STRONG><UL><LI>Streamlined Communication with Authorities with SAP Document and Reporting Compliance</LI><LI><SPAN class="">​</SPAN><SPAN class=""><SPAN class="">Simplified Review and Clearing of Withholding Tax Items for Reporting</SPAN></SPAN></LI><LI>Early Adopter:&nbsp;<SPAN class=""><SPAN class="">Enablement of Sales<SPAN>&nbsp;</SPAN></SPAN></SPAN><SPAN class=""><SPAN class="">and Use Tax Reporting for<SPAN>&nbsp;</SPAN></SPAN></SPAN><SPAN class=""><SPAN class="">the United States through<SPAN>&nbsp;</SPAN></SPAN></SPAN><SPAN class=""><SPAN class="">SAP Document and<SPAN>&nbsp;</SPAN></SPAN></SPAN><SPAN class=""><SPAN class="">Reporting Compliance</SPAN></SPAN></LI></UL></LI><LI><STRONG>SAP S/4HANA for International Trade</STRONG><UL><LI>Ability to Suppress Output from a Sales Order in Case of Trade Compliance Blocks in SAP Global Trade Services</LI><LI><SPAN class="">Produce and Sell Standard Products - Inventory Management</SPAN></LI></UL></LI></UL><P>If you&nbsp; are interested in innovations for Finance, please refer to the <A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/finance-in-sap-s-4hana-cloud-public-edition-2402/ba-p/13590761" target="_self">blog 'Finance in SAP S/4HANA Cloud Public Edition 2402'</A>&nbsp;from UIrich Hauke.&nbsp;</P><P>&nbsp;</P><H1 id="toc-hId-442833226">Expert Talk: Empower the Intelligent, Sustainable Enterprise with SAP Finance &amp; Risk – 2023 Update</H1><P><SPAN>If you are interested in SAP's strategy on how to empower the intelligent, sustainable enterprise with SAP Finance &amp; Risk in a 2023 update, check out this expert talk video with Yannick Peterschmitt, Ulrich Hauke, Christoph Ernst </SPAN>and myself:&nbsp;</P><P><SPAN><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FOWnkugiG40w%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DOWnkugiG40w&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FOWnkugiG40w%2Fhqdefault.jpg&amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;type=text%2Fhtml&amp;schema=youtube" width="200" height="112" scrolling="no" title="Expert Talk: Empower the Intelligent, Sustainable Enterprise with SAP Finance &amp; Risk - 2023 Update" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"></iframe></div></SPAN></P><P><EM>Video 1: Expert talk video on&nbsp;h<SPAN>ow to empower the intelligent, sustainable enterprise with SAP Finance &amp; Risk - 2023 update</SPAN></EM></P><P>&nbsp;</P><H1 id="toc-hId-246319721"><STRONG>SAP Risk and Assurance Management (formerly known as </STRONG>SAP Financial Compliance Management)</H1><P>SAP Risk and Assurance Management is integrated with SAP S/4HANA Cloud, public edition and provides you with the tools to become compliant with internal controls, laws, and regulations that apply to your organization. The solution enables you to document your internal controls framework and manage potential risks to your organization, as well as develop and monitor checks put in place to ensure compliance.</P><H2 id="toc-hId-178888935">Integrated Risk Management</H2><P>We enhance the core compliance functionalities with a comprehensive risk management framework to outline purpose and benefit of each control, and&nbsp;to provide transparency to the overall process health and compliance.</P><P><STRONG>Value Proposition</STRONG></P><UL><LI>Enable customers to set up and maintain risk information in financial compliance</LI><LI>Empower customers to continuously update risk information and quickly identify risk areas</LI><LI>Provide the overview of the risk and control matrix to customers</LI></UL><P><STRONG>Capabilities</STRONG></P><UL><LI>Leverage existing controls in your risk-mitigation response</LI><LI>Add existing risks to controls and, thereby, leverage control for risk mitigation</LI><LI>When risk attributes, such as risk level, validity, and status, are updated, display the corresponding changes in controls</LI></UL><P>If you are interested in a <STRONG>system demo of the new risk management functionality</STRONG>, check out this video:<BR /><BR /></P><P><A href="https://sapvideo.cfapps.eu10-004.hana.ondemand.com/?entry_id=1_c2z2bbqb" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_c2z2bbqb_1_0vqk48we.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/60478i61C85E7BBB3C8074/image-size/large?v=v2&amp;px=999" role="button" title="1_c2z2bbqb_1_0vqk48we.jpg" alt="1_c2z2bbqb_1_0vqk48we.jpg" /></span></A></P><P><EM>Video 2: Integrated Risk Management with SAP Risk and Assurance Management</EM></P><P>For more information,&nbsp;see:&nbsp;<A href="https://help.sap.com/docs/FINANCIAL_COMPLIANCE_CF/940e5ff4fb9f4038be35a8167b64babe/893f73947b0e4fdf8b468c93c1fd7fa5.html?locale=en-US" target="_blank" rel="noopener noreferrer">GRC Risk Service in SAP FCM</A></P><P>&nbsp;</P><H2 id="toc-hId--17624570">Additional Assurance Activity Type in Control Management</H2><P>With the concept of assurance activity types, the solution allows customers to establish a 3 lines of defence concept&nbsp; (perform, test and assess control).</P><P><STRONG>Value Proposition</STRONG></P><UL><LI>Complete holistic approach for compliance by adding control assessments to control-related compliance activities</LI><LI>Enable compliance officers to collect information to assess completeness and maturity of the implemented control framework</LI><LI>Assist management and compliance teams for monitoring or identifying control unidentified weaknesses and risks</LI></UL><P><STRONG>Capabilities</STRONG></P><UL><LI>Support control assessments as new assurance activity type for controls</LI><LI>Support survey-based assessment on controls and provide rating of control assessment</LI><LI>Generate issue in case control assessment rating is deficient or significantly deficient</LI></UL><P>If you are interested in a <STRONG>system demo of the control assessment functionality</STRONG>, check out this video:</P><P><A href="https://sapvideo.cfapps.eu10-004.hana.ondemand.com/?entry_id=1_gqr33vfb" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_gqr33vfb_1_9147chyz.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/60486i4E939A3DD7473653/image-size/large?v=v2&amp;px=999" role="button" title="1_gqr33vfb_1_9147chyz.jpg" alt="1_gqr33vfb_1_9147chyz.jpg" /></span></A></P><P><EM>Video 3: Three lines of defense concept thanks to introduction of third assurance activity type 'Control Assessment' in SAP Financial Compliance Management</EM></P><P>For more information,&nbsp;see:&nbsp;<A href="https://help.sap.com/docs/FINANCIAL_COMPLIANCE_CF/8221c6e024d845ec9e4cf6c835ed0af8/b89a056a7fb745d2b5ebe213d80cfaf0.html?locale=en-US" target="_blank" rel="noopener noreferrer">Assurance Activity</A></P><P>&nbsp;</P><H2 id="toc-hId--214138075">Automated Grouping and Ungrouping of Issues</H2><P><SPAN>Issue grouping complements the capabilities to manage issues and run remediation&nbsp;</SPAN><SPAN>activities in more more advanced.&nbsp;&nbsp;</SPAN><SPAN>​</SPAN></P><P><STRONG><SPAN>Value Proposition</SPAN></STRONG><SPAN>​</SPAN></P><UL><LI><SPAN>Automatic grouping of issues based on configurable grouping rules</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Manual group and ungroup of issues based on business decision</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Group issues cross data sources</SPAN><SPAN>​</SPAN></LI></UL><P><STRONG><SPAN>Capabilities</SPAN></STRONG><SPAN>​</SPAN></P><UL><LI><SPAN>Streamline issue processing by addressing similar findings with less issues&nbsp;</SPAN><SPAN>enabled through automatic issue grouping&nbsp;</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Optimize issue processing by manual grouping and ungrouping of issues to</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Bundle issues according to business needs</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Split issue items in case they need separate processing</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Address same defect at multiple business documents with one issue</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Address multiple defects at the same business document with one issue</SPAN></LI></UL><P><SPAN>​<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2404_Financial Compliance Management_Grouping.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59246iB8D9F13D329DEA4C/image-size/large?v=v2&amp;px=999" role="button" title="2404_Financial Compliance Management_Grouping.png" alt="2404_Financial Compliance Management_Grouping.png" /></span></SPAN></P><P><SPAN>​<EM>Fig. 1: You can automatically and manually group and ungroup issues in SAP Financial Compliance Management</EM></SPAN></P><P><SPAN>For more information,&nbsp;see:&nbsp;</SPAN></P><UL><LI><A href="https://help.sap.com/docs/FINANCIAL_COMPLIANCE_CF/dc9590073546445684529f40040a2f2b/a89d8ff721654d03ac4c505d1e00b064.html?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>How to Set Up Automatic Grouping</SPAN></A></LI><LI><A href="https://help.sap.com/docs/FINANCIAL_COMPLIANCE_CF/489dc5cf7e914e05b2741116f34e56d8/9b929aa0d61b48dd85afed344c941e46.html?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>Process Issues</SPAN></A></LI></UL><P>&nbsp;</P><H2 id="toc-hId--410651580">Preconfigured Internal Control Framework for Medium-Sized Companies</H2><P><SPAN>The solution comes with a predefined internal control framework which has been&nbsp;</SPAN><SPAN>extended with additional focus areas such as Environmental, Social and Governance&nbsp;</SPAN><SPAN>(ESG) and Human Rights Due Diligence for Suppliers in Risky Countries. In addition, a&nbsp;</SPAN><SPAN>new control around Supplier Duplicate Invoices with additional flexible logic was&nbsp;</SPAN><SPAN>provided.</SPAN><SPAN>​</SPAN></P><P><STRONG><SPAN>Value Proposition</SPAN></STRONG><SPAN>​</SPAN></P><UL><LI><SPAN>Empower the CFO and the head of finance with ready-to-run internal controls</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Minimize the effort of building your financial compliance management framework</SPAN><SPAN>​</SPAN></LI></UL><P><SPAN>​</SPAN><STRONG><SPAN>Capabilities</SPAN></STRONG><SPAN>​</SPAN></P><UL><LI><SPAN>Use out-of-the-box business content, such as predefined controls</SPAN><SPAN>​</SPAN></LI><LI><SPAN>Addition of internal controls for new focus areas such as ESG and Human Rights&nbsp;</SPAN><SPAN>Due Diligence</SPAN></LI></UL><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2404_Financial Compliance Management_Control_Framework.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59251iAB90C0C4A4030F20/image-size/large?v=v2&amp;px=999" role="button" title="2404_Financial Compliance Management_Control_Framework.png" alt="2404_Financial Compliance Management_Control_Framework.png" /></span></SPAN></P><P><EM>Fig. 4: Additional preconfigured controls in new focus areas such as ESG and Human Rights Due Diligence​</EM></P><P><SPAN>For more information,&nbsp;see:&nbsp;</SPAN><A href="https://help.sap.com/docs/FINANCIAL_COMPLIANCE_CF/eb2cb166f76248bdba43bf04fccd143e/2ff91490b0b94395882803533ddb9e84.html?version=1.0&amp;locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>Business Content for SAP Financial Compliance&nbsp;</SPAN></A><A href="https://help.sap.com/docs/FINANCIAL_COMPLIANCE_CF/eb2cb166f76248bdba43bf04fccd143e/2ff91490b0b94395882803533ddb9e84.html?version=1.0&amp;locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>Management</SPAN></A></P><P><SPAN>​</SPAN></P><H1 id="toc-hId--736247804">SAP Cloud Identity Access Governance</H1><P>&nbsp;</P><H2 id="toc-hId--803678590">Support for Multiple Rulesets in Access Analysis</H2><P>SAP Cloud Identity Access Governance now has the capability to assist in meeting external audit standards through the support of multiple rulesets. These rulesets can be employed to simplify the external auditor's independent assessment, such as evaluating location-specific Segregation of Duties (SoD) rulesets for employees assigned to specific locations. Additionally, users have the option to define multiple customized rulesets for conducting further analyses.</P><P><STRONG>Value Proposition</STRONG></P><UL><LI>Make comprehensive and thorough assessments of various types of risks and scenarios</LI><LI>Have flexibility and adaptability to apply different rules within specific contexts</LI><LI>Allow external auditors to maintain independent evaluations by enabling them to use their own rules</LI></UL><P><STRONG>Capabilities</STRONG></P><UL><LI>Evaluate and manage risks in different contexts by leveraging multiple rule sets to define and apply various sets of rules, criteria, or frameworks</LI><LI>Address specific needs through customization using the rule sets; for example, meet the unique risk considerations of different departments or units within an organization</LI></UL><P>&nbsp;</P><P>If you are interested in a <STRONG>system demo of the multiple ruleset functionality</STRONG>, check out this video:</P><P><A href="https://sapvideo.cfapps.eu10-004.hana.ondemand.com/?entry_id=1_rd50b95e" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_rd50b95e_1_hzwiy7br.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/60488i7FE2E654A63B7B2F/image-size/large?v=v2&amp;px=999" role="button" title="1_rd50b95e_1_hzwiy7br.jpg" alt="1_rd50b95e_1_hzwiy7br.jpg" /></span></A></P><P><EM>Video 4:&nbsp;Support for Multiple Rulesets in Access Analysis in SAP Cloud Identity Access Governance</EM></P><P>For more information,&nbsp;see:&nbsp;<A href="https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/9621f10c676c497a8355b7e36053e837/67021431679c40cfa4894c97bfea3e9a.html?q=ruleet&amp;locale=en-US" target="_blank" rel="noopener noreferrer">Rulesets</A></P><P>&nbsp;</P><H1 id="toc-hId--359534731">SAP Document and Reporting Compliance</H1><H2 id="toc-hId--849451243">Streamlined Communication with Authorities with SAP Document and Reporting Compliance</H2><P>Increasing complexity driven by regulations requiring integration with local authorities for electronic documents, statutory reports, validation of VAT registrations and more. SAP Document and Reporting Compliance, cloud edition provides a single channel for all submissions across countries and processes, that can be easily activated and managed leveraging the new scope item 78L.</P><P><STRONG>Value Proposition</STRONG></P><UL><LI>Easy to use and simple to configure</LI><LI>Faster implementation of legal changes / new reporting requirements</LI><LI>Simplify IT landscape and reduce total cost of ownership</LI><LI>Manage your integrations to tax authorities within your global SAP BTP account</LI></UL><P><STRONG>Capabilities</STRONG></P><UL><LI>Electronic exchange of invoices for Israel and more planned in the roadmap.</LI><LI>Electronic submission of statutory reports</LI><LI>One API-based integration between SAP S/4HANA Cloud, Public Edition and SAP Document and Reporting Compliance, cloud edition scalable across countries and scenarios</LI><LI>Seamless activation per country</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2402_Document and Reporting Compliance_02.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/56123i1D2CD10BF2C22A49/image-size/large?v=v2&amp;px=999" role="button" title="2402_Document and Reporting Compliance_02.png" alt="2402_Document and Reporting Compliance_02.png" /></span></P><P><EM>Fig. 2: Streamlined communication with authorities with SAP Document and Reporting Compliance</EM></P><P>For more information, see: <A href="https://help.sap.com/docs/cloud-edition/internal-sap-document-and-reporting-compliance-cloud-edition/integrating-cloud-edition-with-sap-s-4hana-cloud-202a275b8aa04496a9dcfe06181d2285?state=DRAFT" target="_blank" rel="noopener noreferrer">Integrating the Cloud Edition with SAP S/4HANA Cloud</A></P><P>&nbsp;</P><H2 id="toc-hId--1045964748">Simplified Review and Clearing of Withholding Tax Items for Reporting</H2><UL><LI>As part of withholding tax reporting, withholding tax items need to be reviewed and cleared to create a payable document to the authorities</LI><LI>Review of withholding tax items to be settled to the authorities<UL><LI>User-friendly preview of documents to be settled</LI><LI>Confirmation of items to be settled to authorities</LI></UL></LI><LI>Automated clearing of withholding tax items confirmed and creation of payable documents to authorities</LI><LI>Creation of withholding legal reports based on cleared items</LI></UL><P>If you are interested in a <STRONG>system demo of the functionality for withholding tax items</STRONG>, check out this video:</P><P><A href="https://sapvideo.cfapps.eu10-004.hana.ondemand.com/?entry_id=1_fg8z8orv" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_fg8z8orv_1_tc9fvgn0.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/60494iAE08091CDFA15241/image-size/large?v=v2&amp;px=999" role="button" title="1_fg8z8orv_1_tc9fvgn0.jpg" alt="1_fg8z8orv_1_tc9fvgn0.jpg" /></span></A></P><P><EM>Video 5:&nbsp;Simplified Review and Clearing of Withholding Tax Items for Reporting with SAP Document and Reporting Compliance</EM></P><P>&nbsp;</P><H2 id="toc-hId--1242478253">Early Adopter:&nbsp;<SPAN class="">Enablement of Sales<SPAN>&nbsp;</SPAN></SPAN><SPAN class="">and Use Tax Reporting for<SPAN>&nbsp;</SPAN></SPAN><SPAN class="">the United States through<SPAN>&nbsp;</SPAN></SPAN><SPAN class="">SAP Document and<SPAN>&nbsp;</SPAN></SPAN><SPAN class="">Reporting Compliance</SPAN></H2><P>Please note the following functionality is currently <STRONG>only available for early adopter customers</STRONG>:</P><P>Functionality:</P><UL><LI>Integration with partner solutions to enable sales and use tax reporting for United States&nbsp;through SAP Document and Reporting Compliance and standardize tax reporting worldwide<UL><LI>Definition and mapping of entities from partner solution</LI><LI>Seamless replication of transactional data</LI></UL></LI><LI>Generation and review of legal file using ‘Run Statutory Reports’ application in SAP S/4HANA Cloud</LI><LI>Output files retrieved from partner solution and managed centrally (same solution of all other countries)<UL><LI>User-friendly preview of tax data</LI><LI>Download of ready-to-upload-file</LI></UL></LI><LI>Central monitoring of all deadlines for statutory reporting</LI></UL><P>If you are interested in a <STRONG>system demo of the functionality for the enablement of sales and use tax reporting for the U.S. through SAP Document and Reporting Compliance</STRONG>, check out this video:</P><P><A href="https://sapvideo.cfapps.eu10-004.hana.ondemand.com/?entry_id=1_71t8xr75" target="_self" rel="nofollow noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_71t8xr75_1_l4o9nuhc.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/60495iF0F0E93D1C7C09F0/image-size/large?v=v2&amp;px=999" role="button" title="1_71t8xr75_1_l4o9nuhc.jpg" alt="1_71t8xr75_1_l4o9nuhc.jpg" /></span></A></P><P><EM>Video 6: For early adopters: Sales and Use Tax Reporting for the U.S. with SAP Document and Reporting Compliance</EM></P><P>&nbsp;</P><H1 id="toc-hId--1145588751">SAP S/4HANA for International Trade</H1><H2 id="toc-hId--1635505263"><STRONG>Ability to Suppress Output from a Sales Order in Case of Trade Compliance Blocks in SAP Global Trade Services</STRONG></H2><P><STRONG>Value Proposition</STRONG></P><UL><LI>Help ensure that follow-on functions can be suppressed to stay legally compliant</LI></UL><P><STRONG>Capabilities</STRONG></P><UL><LI>Provide the ability to suppress output as a follow up action in sales orders when the document is blocked by trade compliance functionality in SAP Global Trade Services (GTS)</LI></UL><P>&nbsp;</P><H2 id="toc-hId--1832018768"><STRONG><SPAN class="">Produce and Sell Standard Products - Inventory Management</SPAN></STRONG></H2><P><SPAN class="">We have added the possibility to include legal control checks for compliance with the international trade regulations during the sales order creation process. In a follow-up step you can analyze and resolve the blocked documents. After the completion of the sales cycle, we have added the option to trigger an Intrastat declaration for the EU-wide business.</SPAN></P><P>&nbsp;</P><P>Meanwhile, don’t hesitate to leave a comment and check out our<SPAN>&nbsp;</SPAN><SPAN><A href="https://pages.community.sap.com/topics/s4hana-cloud" target="_self" rel="noopener noreferrer">new community</A></SPAN>&nbsp;page to ask your questions and engage with the experts. Follow the<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/tag/PSCC_Enablement/tg-p/board-id/erp-blog-sap" target="_self">PSCC_Enablement</A><SPAN>&nbsp;</SPAN>tag to stay up to date with our latest blog posts.</P><P>Follow us on<SPAN>&nbsp;</SPAN><SPAN><A href="https://twitter.com/sap" target="_blank" rel="noopener nofollow noreferrer">@SAP</A></SPAN><SPAN>&nbsp;</SPAN>and #S4HANA, and myself on<SPAN>&nbsp;</SPAN><SPAN><A href="https://www.linkedin.com/in/katrin-dei%C3%9Fner/" target="_blank" rel="nofollow noopener noreferrer">LinkedIn</A></SPAN><SPAN>&nbsp;</SPAN>and<SPAN>&nbsp;</SPAN><SPAN><A href="https://twitter.com/DeissnerKatrin" target="_blank" rel="nofollow noopener noreferrer">X</A></SPAN>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KatrinDeissner_0-1706882341507.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59340i55A7F3E4B63538B6/image-size/medium?v=v2&amp;px=400" role="button" title="KatrinDeissner_0-1706882341507.png" alt="KatrinDeissner_0-1706882341507.png" /></span></P><P>&nbsp;</P><H4 id="toc-hId-1679629009">️<STRONG>Watch Our Live Sessions</STRONG></H4><P>This month, we hosted a series of<SPAN>&nbsp;</SPAN><STRONG>19 compelling live sessions</STRONG><SPAN>&nbsp;</SPAN><SPAN>to highlight the exciting innovations shipped with the&nbsp;</SPAN><STRONG>SAP S/4HANA Cloud Public Edition 2402</STRONG><SPAN>&nbsp;release. Missed the live sessions? No problem! Take advantage of the entire series or pick and choose the sessions most relevant to you&nbsp;<A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/watch-the-replays-of-our-exclusive-sap-s-4hana-cloud-public-edition-2402/ba-p/13587019" target="_blank"><STRONG>on demand</STRONG></A>.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KatrinDeissner_1-1706882341509.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59341i3ACF4B8DF6C6D5E7/image-size/medium?v=v2&amp;px=400" role="button" title="KatrinDeissner_1-1706882341509.png" alt="KatrinDeissner_1-1706882341509.png" /></span></P><P>&nbsp;</P><H4 id="toc-hId-1483115504"><STRONG>️ Inside SAP S/4HANA Cloud</STRONG></H4><P>There is no customer success without project success and product success! Leverage the unique knowledge and expertise of SAP S/4HANA Cloud experts, partners, and customers, sharing their SAP S/4HANA Cloud implementation project best practices and lessons learned – anywhere, anytime. In this podcast, we give you all ingredients to get to the next level and make your SAP S/4HANA Cloud project a success.<SPAN>&nbsp;</SPAN><SPAN><A href="https://podcast.opensap.info/inside-sap/" target="_blank" rel="noopener nofollow noreferrer">Subscribe now</A></SPAN><SPAN>&nbsp;</SPAN>and benefit from the shared knowledge!</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KatrinDeissner_2-1706882341507.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59342iD6E4219B1267A4F1/image-size/medium?v=v2&amp;px=400" role="button" title="KatrinDeissner_2-1706882341507.png" alt="KatrinDeissner_2-1706882341507.png" /></span></P><P>&nbsp;</P><H4 id="toc-hId-1286601999"><STRONG>openSAP Microlearnings for SAP S/4HANA Cloud</STRONG></H4><P>Our openSAP microlearnings for SAP S/4HANA Cloud offer an exciting new learning opportunity. What began with a small batch of 20 videos, has now become a channel with more than 50 microlearnings that have generated over 20,000 views. Today, we cover multiple lines of business such as finance, manufacturing, and supply chain management, and key technology topics like Master Data Management, extensibility, SAP User Experience, and upgrade management. We are continuously adding new microlearnings to<SPAN>&nbsp;</SPAN><SPAN><A href="https://blogs.sap.com/2020/05/07/boost-your-knowledge-with-sap-s-4hana-microlearnings/" target="_blank" rel="noopener noreferrer">our channel</A></SPAN>, so make sure you check them out.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KatrinDeissner_3-1706882341510.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59344iD0B64B40C45E0486/image-size/medium?v=v2&amp;px=400" role="button" title="KatrinDeissner_3-1706882341510.png" alt="KatrinDeissner_3-1706882341510.png" /></span></P><P>&nbsp;</P><H4 id="toc-hId-1258272185"><STRONG>️ Your Voice Matters</STRONG></H4><P>You want to learn more and actively engage with SAP subject matter experts on SAP S/4HANA Cloud topics? We have just the right place for you! Join our<SPAN>&nbsp;</SPAN><SPAN><A href="https://pages.community.sap.com/topics/s4hana-cloud" target="_blank" rel="noopener noreferrer">interactive community</A></SPAN><SPAN>&nbsp;</SPAN>where we bring together customers, partners, and SAP experts with a clear mission: To engage with one another about best practices and product solutions. We invite you to explore the ‘one-stop shop’ as the central place for all resources, tools, content questions, answers and to connect with experts who will guide you through your journey to the intelligent, sustainable enterprise.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KatrinDeissner_4-1706882341508.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59343iEE3FF23057234219/image-size/medium?v=v2&amp;px=400" role="button" title="KatrinDeissner_4-1706882341508.png" alt="KatrinDeissner_4-1706882341508.png" /></span></P><P>&nbsp;</P><H4 id="toc-hId-1061758680"><STRONG>Find All of Our Assets</STRONG></H4><P>SAP S/4HANA Cloud is the foundation of the intelligent, sustainable enterprise and is an innovative, robust, and scalable ERP. We at Cloud ERP Product Success and Cloud Co-Innovation offer a service as versatile as our product itself. Check out the numerous offerings our team has created for you by clicking on the image below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KatrinDeissner_5-1706882341531.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59345iDEE0A71C31008D0B/image-size/medium?v=v2&amp;px=400" role="button" title="KatrinDeissner_5-1706882341531.png" alt="KatrinDeissner_5-1706882341531.png" /></span></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KatrinDeissner_6-1706882341506.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59346iFDF8B3602A3DFA4D/image-size/medium?v=v2&amp;px=400" role="button" title="KatrinDeissner_6-1706882341506.png" alt="KatrinDeissner_6-1706882341506.png" /></span></P><P>&nbsp;</P><H4 id="toc-hId-865245175"><STRONG>Where to Find More Information:</STRONG></H4><UL><LI><A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/link-collection-governance-risk-and-compliance-grc-with-sap-s-4hana-and-sap/ba-p/13434696" target="_self">Link Collection - Governance, Risk and Compliance (GRC) with SAP S/4HANA and SAP S/4HANA Cloud</A></LI><LI><A href="https://pages.community.sap.com/topics/s4hana-cloud-finance" target="_self" rel="noopener noreferrer">SAP Community for Finance</A></LI><LI>Watch the replays of our exclusive SAP S/4HANA Cloud Public Edition 2402 Early Release Series here:&nbsp;<A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/watch-the-replays-of-our-exclusive-sap-s-4hana-cloud-public-edition-2402/ba-p/13587019" target="_blank">https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/watch-the-replays-of-our-excl...</A>&nbsp;</LI><LI>Explore the ready-to-run cloud ERP here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://www.sap.com/products/erp/s4hana.html" target="_blank" rel="noopener noreferrer">https://www.sap.com/products/erp/s4hana.html</A></SPAN></LI><LI>Watch our SAP S/4HANA Cloud product update videos on YouTube:<SPAN>&nbsp;</SPAN><SPAN><A href="https://www.youtube.com/playlist?list=PLWV533hWWvDnnyN2j-CcUheNN-GaNCb3H" target="_blank" rel="noopener nofollow noreferrer">https://www.youtube.com/playlist?list=PLWV533hWWvDnnyN2j-CcUheNN-GaNCb3H</A></SPAN></LI><LI>Check out our digital enablement wheel here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://chart-bdmaicr0au.dispatcher.eu2.hana.ondemand.com/index.html?hc_reset" target="_blank" rel="noopener nofollow noreferrer">https://chart-bdmaicr0au.dispatcher.eu2.hana.ondemand.com/index.html?hc_reset</A></SPAN></LI><LI>Find out how to switch from groups to spaces and pages here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://blogs.sap.com/2023/11/06/deactivation-of-groups-in-the-sap-fiori-launchpad-in-sap-s-4hana-cloud-public-edition-2402-switching-to-spaces-and-pages-mandatory/" target="_blank" rel="noopener noreferrer">https://blogs.sap.com/2023/11/06/deactivation-of-groups-in-the-sap-fiori-launchpad-in-sap-s-4hana-cl...</A></SPAN></LI><LI>Become an early adopter for Joule in SAP S/4HANA Cloud Public Edition here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://influence.sap.com/sap/ino/#campaign/3612" target="_blank" rel="noopener noreferrer">https://influence.sap.com/sap/ino/#campaign/3612</A></SPAN></LI><LI>Check out the SAP Activate Roadmap for early adopters here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://go.support.sap.com/roadmapviewer/#/group/658F507A-D6F5-4B78-9EE1-0300C5F1E40F/roadmapOverviewPage/0894b61141a74a65b8da92db32685da5" target="_blank" rel="noopener noreferrer">https://go.support.sap.com/roadmapviewer/#/group/658F507A-D6F5-4B78-9EE1-0300C5F1E40F/roadmapOvervie...</A></SPAN></LI><LI>Review the PPL content here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://go.support.sap.com/roadmapviewer/#/group/658F507A-D6F5-4B78-9EE1-0300C5F1E40F/roadmapContentPage/0894b61141a74a65b8da92db32685da5:t8" target="_blank" rel="noopener noreferrer">https://go.support.sap.com/roadmapviewer/#/group/658F507A-D6F5-4B78-9EE1-0300C5F1E40F/roadmapContent...</A></SPAN></LI><LI>Listen to our podcast here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://podcast.opensap.info/inside-sap/" target="_blank" rel="noopener nofollow noreferrer">https://podcast.opensap.info/inside-sap/</A></SPAN></LI><LI>Watch our openSAP microlearnings to learn about SAP S/4HANA Cloud topics at your own pace here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://microlearning.opensap.com/" target="_blank" rel="noopener noreferrer">https://microlearning.opensap.com/</A></SPAN></LI><LI>Find best practices on SAP S/4HANA Cloud Public Edition here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://me.sap.com/processnavigator/SolS/EARL_SolS-013/latest?region=DE" target="_blank" rel="noopener noreferrer">https://me.sap.com/processnavigator/SolS/EARL_SolS-013/latest?region=DE</A></SPAN></LI><LI>Check out what’s new here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://help.sap.com/doc/ce01d82756b947a1a043a5d5a3204226" target="_blank" rel="noopener noreferrer">https://help.sap.com/doc/ce01d82756b947a1a043a5d5a3204226</A></SPAN><SPAN>&nbsp;</SPAN><SPAN>&nbsp;</SPAN></LI><LI>Find help here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/SAP_S4HANA_CLOUD</A></SPAN></LI><LI>Read the feature scope description here:<SPAN>&nbsp;</SPAN><SPAN><A href="https://help.sap.com/doc/7c9e0bbbd1664c2581b2038a1c7ae4b3" target="_blank" rel="noopener noreferrer">https://help.sap.com/doc/7c9e0bbbd1664c2581b2038a1c7ae4b3</A></SPAN></LI></UL> 2024-02-05T14:32:19.582000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/preparing-for-sap-identity-management-s-end-of-maintenance-in-2027/ba-p/13596101 Preparing for SAP Identity Management’s End-of-Maintenance in 2027 2024-02-06T10:43:55.073000+01:00 MichaelFr https://community.sap.com/t5/user/viewprofilepage/user-id/77947 <P><SPAN>Maintenance for SAP Identity Management (SAP IDM), our on-premises tool for managing the identity lifecycle, will end in 2027. </SPAN><A href="https://launchpad.support.sap.com/#/notes/3268799" target="_self" rel="noopener noreferrer">Extended maintenance</A><SPAN> will be available until 2030. This extension is intended to give your organization ample time to plan and execute a well-considered migration strategy.</SPAN></P><P><SPAN>There are several topics for SAP IDM customers to consider. </SPAN></P><P><A href="https://pages.community.sap.com/topics/cloud-identity-services" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services</A><SPAN> are the center point of SAP’s IAM strategy, relying on widely established industry standards such as Security Assertion Markup Language (SAML), OpenID Connect (OIDC), X.509 certificates and System for Cross-Domain Identity Management (SCIM). Their focus is to simplify system integration and help ensure security and compliance while providing a seamless user experience. </SPAN></P><P><SPAN>With SAP Cloud Identity Services it is easy to integrate SAP Cloud applications with an existing IAM system infrastructure. SAP Cloud Identity Services provides a central integration point that enables a single one-time integration to support extended partner identity scenarios for SAP Cloud solutions. </SPAN></P><P><SPAN>You can find more details in the </SPAN><A href="https://help.sap.com/docs/cloud-identity/system-integration-guide/identity-lifecycle-with-identity-management-solution?locale=en-US#evolving-on-premise-setups-to-hybrid-landscapes" target="_blank" rel="noopener noreferrer"><SPAN>System Integration Guide</SPAN></A><SPAN> for SAP Cloud Identity Services.</SPAN></P><P><SPAN>Furthermore, recognizing the importance of seamless integration within the identity and access management landscape, SAP is committed to further enhance SAP Cloud Identity Services and SAP Cloud Identity Access Governance. These enhancements are designed to facilitate integration with other partner identity management solutions, like <STRONG>Microsoft Entra ID</STRONG>, that provide a comprehensive approach to enterprise-wide identity and access scenarios.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MichaelFr_1-1707210692931.jpeg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/61123i0749C9FDE4A06CFE/image-size/medium?v=v2&amp;px=400" role="button" title="MichaelFr_1-1707210692931.jpeg" alt="MichaelFr_1-1707210692931.jpeg" /></span></P><P><SPAN>Microsoft and SAP are actively collaborating to develop guidance that enables customers to migrate their identity management scenarios from SAP Identity Management to Microsoft Entra ID. Microsoft Entra ID offers a universal identity platform that provides your people, partners, and customers with a single identity to access applications and collaborate from any platform and device. This work and partnership are in progress; stay tuned for updates and blogs with details about our collaboration efforts</SPAN></P> 2024-02-06T10:43:55.073000+01:00 https://community.sap.com/t5/technology-blogs-by-members/2024-sap-cloud-identity-services-amp-iam-portfolio-what-s-new/ba-p/13622951 2024 SAP Cloud Identity Services & IAM Portfolio: What’s New? 2024-02-28T19:10:38.504000+01:00 Colt https://community.sap.com/t5/user/viewprofilepage/user-id/59375 <!-- ScriptorStartFragment --><P><SPAN>This blog explores the latest 2024 updates in SAP's Identity and Access Management (IAM) portfolio derived from various early 2024 SAP events, particularly focusing on SAP Cloud Identity Services (SCI).&nbsp;</SPAN></P><H2 id="toc-hId-987912801"><SPAN>IAM</SPAN><SPAN> 101</SPAN><SPAN>: Identity Lifecycle, Authorization, and Authentication</SPAN></H2><DIV class=""><SPAN>In simple terms, Identity and Access Management (IAM) revolves around three core aspects:</SPAN></DIV><OL class=""><LI><STRONG>Identity Lifecycle</STRONG><SPAN>: This encompasses the journey of user identities within a system, from creation to deletion.</SPAN></LI><LI><STRONG>Authorization</STRONG><SPAN>: Determining what actions users are allowed to perform within a system.</SPAN></LI><LI><STRONG>Authentication</STRONG><SPAN>: Ensuring that users are who they claim to be when accessing applications or services.</SPAN></LI></OL><H2 id="toc-hId-791399296"><SPAN>Identity Access Management Portfolio by SAP</SPAN></H2><DIV class=""><SPAN>SAP offers a Identity Access Management (IAM) portfolio that caters to both on-premises and public cloud solutions. Let's delve into each category - Identity Lifecycle, Authentication, and Authorization - highlighting the different components within SAP's Cloud Identity Services (SCI) suite.</SPAN></DIV><DIV class="">&nbsp;</DIV><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_0-1709142943811.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72979i908AE047F560680E/image-size/large?v=v2&amp;px=999" role="button" title="Colt_0-1709142943811.png" alt="Colt_0-1709142943811.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><DIV class="">&nbsp;</DIV><H3 id="toc-hId-723968510"><SPAN>Identity Lifecycle Management</SPAN></H3><DIV class=""><SPAN>For managing the lifecycle of identities, SAP provides several solutions:</SPAN></DIV><UL class=""><LI><STRONG>Identity Provisioning</STRONG><SPAN>: Part of SCI. Facilitates seamless creation and management of user identities.</SPAN></LI><LI><STRONG>Identity Directory</STRONG><SPAN>: Part of SCI. Serves as a centralized repository for user and group information.</SPAN></LI><LI><STRONG>SAP Identity Management</STRONG><SPAN>: An on-premises product ensuring robust identity lifecycle management unitl the end of 2027/2030.</SPAN></LI></UL><H3 id="toc-hId-527455005"><SPAN>Authentication Solutions</SPAN></H3><DIV class=""><SPAN>SAP's authentication solutions ensure secure access to applications and services:</SPAN></DIV><UL class=""><LI><STRONG>Identity Authentication</STRONG><SPAN>: Part of SCI. Provides seamless and secure authentication for users across applications.</SPAN></LI><LI><STRONG>SAP Single Sign-On 3.0</STRONG><SPAN>: An on-premises product offering single sign-on capabilities until the end of 2027.</SPAN></LI><LI><SPAN><STRONG>Secure Login Service</STRONG>: </SPAN><SPAN>A standout addition to SAP's IAM lineup is the </SPAN><SPAN>SAP Secure Login Service</SPAN><SPAN>, heralded as the new star in the SAP Single Sign-On horizon. This service promises enhanced security and user experience in single sign-on scenarios.</SPAN></LI></UL><DIV class=""><SPAN>Want to know more? Read here: </SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/exploring-sap-secure-login-service-for-sap-gui-a-comprehensive-review/ba-p/13573382" target="_blank">https://community.sap.com/t5/technology-blogs-by-members/exploring-sap-secure-login-service-for-sap-gui-a-comprehensive-review/ba-p/13573382</A></DIV><H3 id="toc-hId-330941500"><SPAN>Authorization Management</SPAN></H3><DIV class=""><SPAN>Authorization management is crucial for defining user permissions and access control:</SPAN></DIV><UL class=""><LI><STRONG>SAP Cloud Identity Access Governance</STRONG><SPAN>: Symbiotically linked with SCI, it offers comprehensive authorization management and access governance.</SPAN></LI><LI><SPAN><STRONG>Authorization Management of SAP Cloud Identity Services</STRONG>: </SPAN><SPAN>Streamlines authorization management for developers on SAP BTP. Define access policies with specified conditions, easily adjustable by administrators post-deployment. This centralizes access control, mitigating complexity and ensuring precise authorization levels.</SPAN></LI></UL><DIV class=""><SPAN>Want to know more? Read here:</SPAN> <A href="https://community.sap.com/t5/technology-blogs-by-sap/sap-btp-innobytes-january-2024/ba-p/13584601" target="_blank">https://community.sap.com/t5/technology-blogs-by-sap/sap-btp-innobytes-january-2024/ba-p/13584601</A></DIV><UL class=""><LI><STRONG>SAP Access Control</STRONG><SPAN>: An on-premises product offering </SPAN><SPAN>that enables organizations to control access and prevent fraud across the enterprise, while minimizing the time and cost of compliance</SPAN><SPAN>.</SPAN><SPAN> An upcoming version (release 2026) will further enhance authorization capabilities within SAP's IAM portfolio.</SPAN></LI></UL><DIV class=""><SPAN>While SAP's IAM portfolio boasts a comprehensive suite of solutions, it's worth noting that the </SPAN><SPAN>SAP Customer Data Cloud </SPAN><SPAN>is beyond the scope of this discussion due to the author's limited experience with it.</SPAN></DIV><H2 id="toc-hId-5345276"><SPAN>SAP Cloud Identity Services</SPAN></H2><H3 id="toc-hId--62085510"><SPAN>Short Overview</SPAN></H3><DIV class=""><SPAN>SAP Cloud Identity Services (SCI) offer a suite of components tailored to address various facets of IAM:</SPAN></DIV><UL class=""><LI><STRONG>Identity Provisioning</STRONG><SPAN>: Streamlining the process of creating and managing user identities.</SPAN></LI><LI><STRONG>Identity Directory</STRONG><SPAN>: Serving as a centralized repository for storing and accessing user and group information.</SPAN></LI><LI><STRONG>Authorization Management</STRONG><SPAN>: Facilitating the assignment and management of user permissions.</SPAN></LI><LI><STRONG>Identity Authentication</STRONG><SPAN>: Ensuring secure and seamless user authentication across applications.</SPAN></LI></UL><H3 id="toc-hId--258599015"><SPAN>Key Features of SCI</SPAN></H3><UL class=""><LI><STRONG>Predefined Connectivity and Bundling</STRONG><SPAN>: </SPAN><SPAN>SCI seamlessly integrates with SAP cloud solutions, providing out-of-the-box configuration for user provisioning and authentication.</SPAN></LI><LI><STRONG>Automated Service Enablement</STRONG><SPAN>: </SPAN><SPAN>Identity Services are automatically enabled as part of the product delivery process, simplifying setup for customers.</SPAN></LI><LI><STRONG>Default Pre-Configuration</STRONG><SPAN>: </SPAN><SPAN>SAP cloud solutions come pre-configured with Identity Services, catering to common scenarios without the need for separate licensing.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_1-1709142943815.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72981iC7A82C30A31A6033/image-size/large?v=v2&amp;px=999" role="button" title="Colt_1-1709142943815.png" alt="Colt_1-1709142943815.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><DIV class=""><SPAN>Long story? Read here: </SPAN><A href="https://xiting.com/en/downloads/download-sap-cloud-identity-services-e-book/" target="_blank" rel="noreferrer noopener nofollow">https://xiting.com/en/downloads/download-sap-cloud-identity-services-e-book/</A></DIV><H3 id="toc-hId--455112520">&nbsp;</H3><H3 id="toc-hId--651626025"><SPAN>Cross-Enterprise Access Governance</SPAN></H3><DIV class=""><SPAN>Cross-enterprise identity management and access governance integration is set to be streamlined with the integration of Microsoft Entra ID and Microsoft Entra ID Governance alongside SAP Cloud Identity services and SAP Cloud Identity Access Governance. This integration will empower organizations to achieve single sign-on and provisioning capabilities across a range of SAP business applications, including SAP S/4HANA Public Cloud, SAP Ariba, SAP Concur, and SAP SuccessFactors. Furthermore, the linkage between Microsoft Entra ID and Microsoft Entra ID Governance with SAP Cloud Identity Access Governance will enable cohesive identity and access risk assessments, alongside monitoring and management of compliance controls.</SPAN></DIV><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_2-1709142943817.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72980i9C4C9C173330027F/image-size/large?v=v2&amp;px=999" role="button" title="Colt_2-1709142943817.png" alt="Colt_2-1709142943817.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT></DIV><H2 id="toc-hId--629967892"><SPAN>Identity Lifecycle Management with SCI</SPAN></H2><DIV class=""><SPAN>SAP Cloud Identity Services </SPAN><SPAN>facilitates efficient management of the employee lifecycle, from onboarding to offboarding, ensuring smooth transitions and access management throughout.</SPAN></DIV><DIV class=""><SPAN>It </SPAN><SPAN>play</SPAN><SPAN>s</SPAN><SPAN> a key role by centralizing Identity Access Management. They collect the derived identities and act as a single source of truth. The Identity Directory and Identity Provisioning components of SAP Cloud Identity Services work together to manage identities efficiently across systems.</SPAN></DIV><H3 id="toc-hId--1119884404"><SPAN>Identity Directory: Centralized User Management</SPAN></H3><DIV class=""><SPAN>The Identity Directory serves as a central repository for user and group information, accessible via APIs and admin UI, simplifying connectivity and integration with SAP SaaS applications.&nbsp;</SPAN><SPAN>It </SPAN><SPAN>provides a System for Cross-domain Identity Management (SCIM) 2.0 REST API for managing resources (users, groups and custom schemas) with a set of attributes. Those attributes are defined in the SCIM 2.0 Core schema and the Enterprise user resource schema. Custom attributes are supported through a schema extension</SPAN><SPAN>.</SPAN></DIV><H2 id="toc-hId--1022994902"><SPAN>Identity Provisioning</SPAN></H2><H3 id="toc-hId--1512911414"><SPAN>Transformation Engine</SPAN></H3><DIV class=""><SPAN>Identity Provisioning Connectors play a crucial role in the Identity Lifecycle process. These connectors come in various types, including Source System Connectors, Target System Connectors, and Proxy System Connectors. They enable seamless integration between different systems, allowing for the provisioning and authentication of users.</SPAN></DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>The Identity Provisioning transformation engine offers several powerful capabilities:</SPAN></DIV><OL class=""><LI><STRONG>Assignment</STRONG><SPAN><STRONG>:</STRONG> Users can define rules for assignments based on input data. For instance, organizations can use the value of an identity's organizational unit to determine the roles required for that user.</SPAN></LI><LI><STRONG>Mapping between identity models</STRONG><SPAN>: The engine facilitates mapping between attributes in different models. For example, it can map the surname attribute to the family name attribute. Additionally, it allows for adjustments to data formats, such as converting time or number formats as needed.</SPAN></LI><LI><STRONG>Filtering</STRONG><SPAN>: Organizations can specify detailed criteria for determining which objects should be read or written. This enables fine-grained control over data synchronization and provisioning processes, ensuring that only relevant information is transferred between systems.</SPAN></LI></OL><H3 id="toc-hId--1709424919"><SPAN>Various types of connectors to facilitate seamless integration</SPAN></H3><OL class=""><LI><STRONG>Source System Connectors</STRONG><SPAN>: These connectors enable the extraction of user data from source systems, such as SAP Cloud solutions, on-premise solutions, and third-party solutions.</SPAN></LI><LI><STRONG>Target System Connectors</STRONG><SPAN>: These connectors facilitate the transfer of user data to target systems, including SAP Cloud solutions, on-premise solutions, and third-party solutions.</SPAN></LI><LI><STRONG>Proxy System Connectors</STRONG><SPAN><STRONG>:</STRONG> These connectors act as intermediaries between source and target systems, ensuring smooth data transfer and integration.</SPAN></LI></OL><DIV class=""><SPAN>With support for over 20 SAP Cloud solutions, on-premise solutions, and third-party solutions, Identity Provisioning Connectors offer out-of-the-box configuration for user provisioning and authentication. This ensures quick and easy setup for organizations, enabling efficient management of user identities across diverse systems.</SPAN></DIV><H2 id="toc-hId--1612535417"><SPAN>Authorization </SPAN><SPAN>Management</SPAN></H2><DIV class=""><SPAN>Authorization plays a crucial role in ensuring secure access to applications and resources. Here's how SAP addresses authorization management:</SPAN></DIV><UL class=""><LI><STRONG>Internal Authorization Definition</STRONG><SPAN>: Many applications define authorizations internally, tailored to their specific domain requirements.</SPAN></LI><LI><STRONG>Central User Assignment</STRONG><SPAN>: SAP Cloud Identity Services centralizes user assignment to roles and groups, streamlining access management.</SPAN></LI><LI><STRONG>Authorization Management Service (AMS)</STRONG><SPAN>: This "new" service provides centralized management of end-user authorizations for applications on the SAP Business Technology Platform. AMS integrates seamlessly with SAP Cloud Identity Services, allowing for configuration and assignment of policies directly from the administration console.</SPAN></LI><LI><STRONG>Policy Assignment</STRONG><SPAN>: In SAP Cloud Identity, each policy corresponds to a group in the identity directory. Policies can be assigned to users by making them members of the respective policy group. Customers have the flexibility to assign SAP-provided or custom policies to users using the user-friendly UIs in the SAP Cloud Identity console or programmatically via the SCIM API of the Identity Directory.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_3-1709142943819.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72983i947E449682E1C294/image-size/large?v=v2&amp;px=999" role="button" title="Colt_3-1709142943819.png" alt="Colt_3-1709142943819.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><DIV class="">&nbsp;</DIV><H2 id="toc-hId--1809048922"><SPAN>Identity </SPAN><SPAN>Access </SPAN><SPAN>Governance</SPAN></H2><BLOCKQUOTE><DIV><!-- ScriptorStartFragment --><DIV class=""><SPAN>SAP Cloud Identity Access Governance (IAG) is already widely recognized, offering a comprehensive suite of features aimed at enhancing security and compliance.<!-- ScriptorEndFragment --></SPAN></DIV></DIV></BLOCKQUOTE><DIV class=""><SPAN>Key Features:</SPAN></DIV><UL class=""><LI><STRONG>Privileged Access Management</STRONG><SPAN>: Enables the management of super-user access, log consolidation, and automated log assessment to ensure stringent security measures.</SPAN></LI><LI><STRONG>Access Certification</STRONG><SPAN>: Facilitates the review of access, roles, risks, and mitigation controls to maintain compliance with regulatory standards.</SPAN></LI><LI><STRONG>Access Analysis</STRONG><SPAN>: Provides tools to analyze access, refine user assignments, and manage controls effectively.</SPAN></LI><LI><STRONG>Access Request</STRONG><SPAN>: Optimizes access by streamlining workflows, policy-based assignment, and processes to ensure efficient access provisioning.</SPAN></LI><LI><STRONG>Role Design</STRONG><SPAN>: Allows organizations to optimize role definition and governance processes, enhancing overall security posture.</SPAN></LI></UL><DIV class=""><SPAN>Moreover, SAP Cloud Identity Access Governance offers HR-driven identity lifecycle management by integrating with SAP SuccessFactors. This integration enables automatic access requests triggered by changes in employee status within the HR system. The IAG Bridge Cloud facilitates the creation of access requests for cloud applications, with risk analysis and provisioning handled by SAP Cloud Identity Access Governance.</SPAN></DIV><DIV class=""><SPAN>API-based integrations further enhance flexibility, allowing external applications to submit requests to SAP Cloud Identity Access Governance for processing. This enables efficient access provisioning and deprovisioning based on approval processes, with the option to retrieve request status periodically.</SPAN></DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>With support for over 16 SAP Cloud solutions, on-premises solutions, and third-party solutions, SAP Cloud Identity Access Governance provides a robust platform for organizations to maintain security, compliance, and efficient access management across their IT environment.</SPAN></DIV><H2 id="toc-hId--2005562427"><SPAN>Authentication</SPAN></H2><DIV class=""><SPAN>Authentication within SAP's ecosystem is facilitated through SAP Cloud Identity Services, serving as the interface for Identity Access Management. Here's how authentication in the overall hybrid SAP landscape idealy works:</SPAN></DIV><UL class=""><LI><STRONG>SAP Cloud Identity Services</STRONG><SPAN>: This platform acts as the primary hub for authentication. SAP applications inherently trust SAP Cloud Identity Services for identity authentication, ensuring a secure login process.</SPAN></LI><LI><STRONG>User Interaction</STRONG><SPAN>: Users have the flexibility to interact with either Identity Authentication provided by SAP Cloud Identity Services or third-party Identity Providers. Regardless of the chosen method, users benefit from Single Sign-On capabilities, enhancing user experience and simplifying access to multiple applications.</SPAN></LI><LI><STRONG>Integration with SAP GUI</STRONG><SPAN>: SAP GUI seamlessly integrates with short-term X.509 certificates from SAP Secure Login Service, further enhancing authentication security </SPAN><SPAN>supporting MFA </SPAN><SPAN>within SAP environments.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_4-1709142943823.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72984i7014963F770F62D6/image-size/large?v=v2&amp;px=999" role="button" title="Colt_4-1709142943823.png" alt="Colt_4-1709142943823.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT></DIV><P>&nbsp;</P><BLOCKQUOTE><!-- ScriptorStartFragment --><DIV class=""><SPAN>Short Comparative Note: SAP Secure Login Service (SLS) for SAP GUI versus SAP Single Sign-On (SSO) 3.0.&nbsp;</SPAN><SPAN>While SAP Single Sign-On 3.0 remains a viable solution for certain use cases, the emerging preference leans towards the new SLS for SAP GUI for most scenarios. The rationale behind this shift lies in the fact that SSO relies on capabilities like multi-factor authentication and CLM (Certificate Lifecycyle Management with </SPAN><SPAN>NDES </SPAN><SPAN>CA</SPAN><SPAN>-I</SPAN><SPAN>ntegr</SPAN><SPAN>ation</SPAN><SPAN>) on SAP NetWeaver Application Server Java, which is scheduled to exit mainstream maintenance by the end of 2027.</SPAN></DIV><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_5-1709142943824.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72982iB5904E43B94AB340/image-size/large?v=v2&amp;px=999" role="button" title="Colt_5-1709142943824.png" alt="Colt_5-1709142943824.png" /></span></DIV><DIV class="">&nbsp;</DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from SAP</SPAN></FONT><P>&nbsp;</P></DIV><DIV class=""><SPAN>Contrarily, the new SLS does not depend on SAP NetWeaver AS Java; instead, it leverages a cloud-based service. It emphasizes seamless integration with cloud-centric identity providers, such as SAP Cloud Identity Services – Identity Authentication. Furthermore, it is offered as a cloud subscription, aligning with the contemporary preferences of software licensing among customers.</SPAN><SPAN> However, it is important to note that currently, some features are still missing in direct comparison with the SAP SSO 3.0 Suite.<BR /><!-- ScriptorEndFragment --></SPAN></DIV></BLOCKQUOTE><UL class=""><LI><STRONG>Principal Propagation</STRONG><SPAN>: SAP Cloud Identity Services facilitates principal propagation between applications, ensuring consistent authentication across various systems and enhancing interoperability.</SPAN></LI></UL><H2 id="toc-hId-2092891364"><SPAN>Upcoming Developments and Enhancements</SPAN></H2><H3 id="toc-hId-1602974852"><SPAN>Upcoming: Simplified Principal Propagation for Authentication</SPAN></H3><DIV class=""><SPAN>SCI will act as a central token service, reducing complexity in system-to-system calls and enhancing trust between applications.</SPAN><SPAN> In an upcoming development, SAP Cloud Identity Services is poised to introduce a significant enhancement aimed at simplifying principal propagation for authentication. Here's what to expect:</SPAN></DIV><UL class=""><LI><STRONG>Central Token Service</STRONG><SPAN>: SAP Cloud Identity Services will transition into a central token service, streamlining the process of system-to-system calls. This move aims to reduce complexity and enhance efficiency in authentication workflows.</SPAN></LI><LI><STRONG>Token Request Flow</STRONG><SPAN>: When a sender application needs to call an API of the receiver application on behalf of the current user, it will request a token from Identity Authentication within SAP Cloud Identity Services.</SPAN></LI><LI><STRONG>Trust in Tokens</STRONG><SPAN>: SAP applications, along with third-party applications, will trust tokens issued by SAP Cloud Identity Services for API calls. This trust ensures secure and seamless communication between applications, regardless of their origin.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_6-1709142943825.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72985i88493C86A4C3AB2E/image-size/large?v=v2&amp;px=999" role="button" title="Colt_6-1709142943825.png" alt="Colt_6-1709142943825.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><H3 id="toc-hId-1574645038"><SPAN>SCIM </SPAN><SPAN>&amp; SAP: </SPAN><SPAN>Updates for Improved Enterprise Readiness</SPAN></H3><DIV class=""><SPAN>SAP is working on enhancements to the SCIM protocol, including cursor-based pagination and additional schema support, to enhance user assignment processes and enterprise readiness.</SPAN></DIV><DIV class=""><SPAN>Here's an overview of the recent developments:</SPAN></DIV><UL class=""><LI><STRONG>SCIM Adoption</STRONG><SPAN>: SAP initially adopted SCIM as a product standard with the Identity Provisioning Service (IPS). SCIM2 was subsequently designated as the primary user and group replication protocol for SAP applications, outlining the implementation guidelines.</SPAN></LI><LI><STRONG>SCIM User Lifecycle</STRONG><SPAN>: SCIM includes the "active" flag to control authentication and app interactions. It mandates responding to GET requests after a DELETE request with no result. Applications have the autonomy to set users to a blocked status or create new user records as needed.</SPAN></LI><LI><STRONG>Enterprise Readiness</STRONG><SPAN>: SAP identified areas for improving SCIM's enterprise readiness, including the lack of delta-read processes and index-based pagination. To address these concerns, SAP is working on implementing cursor-based pagination for entities like Users and Groups, as well as multi-valued attributes.</SPAN></LI><LI><STRONG>SCIM Groups and Schema Enhancements</STRONG><SPAN>: SAP envisions SCIM Groups as the primary method for user assignments, offering transparent concepts for SCIM clients. SAP's group schemas introduce additional capabilities, such as defining group types and supported operations, providing more precise operations for SCIM clients.</SPAN></LI><LI><STRONG>SAP User Extensions</STRONG><SPAN>: SAP plans to introduce additional user extensions for business attributes derived from the One Domain Model (ODM). This extension aims to enable applications to create users with related business attributes. The schema will support legacy approaches and integration scenarios with the Master Data Integration Service.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_7-1709142943826.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72986i3B1A76F74D97E9CE/image-size/large?v=v2&amp;px=999" role="button" title="Colt_7-1709142943826.png" alt="Colt_7-1709142943826.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT></DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>SAP Cloud Identity Services continue to evolve, offering comprehensive IAM solutions for businesses. With features such as predefined connectivity, automated service enablement, and upcoming enhancements, SAP remains innovat</SPAN><SPAN>ive</SPAN><SPAN>, ensuring secure and efficient identity and access management for its customers.<BR /></SPAN></DIV><!-- ScriptorEndFragment --> 2024-02-28T19:10:38.504000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/safeguarding-data-privacy-in-ksa-leveraging-sap-to-navigate-ndmo-s/ba-p/13652286 Safeguarding Data Privacy in KSA - Leveraging SAP to navigate NDMO’s Regulations in Digital Era 2024-03-28T12:05:30.971000+01:00 Zainab_ASalam https://community.sap.com/t5/user/viewprofilepage/user-id/1426218 <P><FONT face="courier new,courier" size="2" color="#333333">Blog v1.0 &nbsp;| &nbsp;</FONT><FONT face="courier new,courier" size="2" color="#333333">Published On: 28 March 2024</FONT></P><P><FONT face="courier new,courier" size="2"><FONT color="#333333">Authors:&nbsp;</FONT><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/76380">@asadkhan02</a>&nbsp;,&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1427434">@AyeshaSafeer</a>&nbsp;,&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1426218">@Zainab_ASalam</a>&nbsp;</FONT></P><P style=" text-align: center; "><FONT face="courier new,courier" size="2" color="#808080">_________________________________________</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080">In today's digital era, data privacy is a crucial issue for both individuals and organizations. The <STRONG>Saudi National Data Management Office</STRONG> (<STRONG>NDMO</STRONG>), in partnership with the <STRONG>Saudi Data and</STRONG> <STRONG>Artificial Intelligence Authority</STRONG> (<STRONG>SDAIA</STRONG>), has introduced stringent <STRONG>Data Governance and Personal Data Protection Standards</STRONG>. These regulations mandate all organizations operating across various industries in the Kingdom of Saudi Arabia comply by <STRONG>September 2024</STRONG>.</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080">Failure to comply with these regulations can result in hefty financial fines reaching SAR 3 million or higher in some cases, reputational damage, legal consequences, and loss of trust among customers and partners.</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080"><SPAN>To ensure compliance with these new regulations, organizations are encouraged to implement processes aligned with the 15 domains outlined by the NDMO for Data Governance and Personal Data Protection Standards. Leveraging technology as an enabler, organizations can implement robust data privacy measures and effectively meet these requirements.</SPAN></FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87957i2C22EE02F15D3B98/image-size/large?v=v2&amp;px=999" role="button" title="Picture1.png" alt="Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards</span></span></P><P><FONT size="3" color="#000080">SAP, a global leader in enterprise software, provides advanced technologies with artificial intelligence (AI) capabilities that provide a solid foundation for organizations to implement data governance and personal data protection processes. SAP solutions enable Saudi organizations to efficiently navigate and fulfill regulatory requirements:</FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#333399"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture2.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87931iD46B5558704106BA/image-size/large?v=v2&amp;px=999" role="button" title="Picture2.png" alt="Picture2.png" /></span></FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080"><SPAN>By implementing SAP solutions, Saudi organizations can empower their data privacy practices, mitigate compliance risks, and build trust among stakeholders. SAP technologies uphold data integrity, safeguard personal information, offer the framework for regulatory compliance implementation, and adapt to the demands of the digital age.</SPAN></FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080">As a team at SAP, we are committed to supporting organizations in achieving their regulatory compliance initiatives. We invite you to take the next step by exploring how our technologies and solutions can assist you on this journey.</FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080">Contact us today to learn more about how SAP can help you navigate the complex landscape of data privacy regulations in Saudi Arabia and ensure compliance.</FONT></P><P>&nbsp;</P> 2024-03-28T12:05:30.971000+01:00 https://community.sap.com/t5/technology-blogs-by-members/integrating-ibm-security-verify-with-sap-cloud-identity-services-in-sap-btp/ba-p/13651722 Integrating IBM Security Verify with SAP Cloud Identity Services in SAP BTP 2024-04-02T10:29:43.856000+02:00 TusharTrivedi https://community.sap.com/t5/user/viewprofilepage/user-id/150726 <P>This blog delves into the technical aspects of integrating IBM Security Verify with SAP Cloud Identity Services (CIS) in SAP Business Technology Platform (BTP) as a proxy.</P><P>SAP CIS offers a suite of solutions for managing user identities, access controls, and application integrations across the IT landscape. Conversely, IBM Security Verify provides identity governance, workforce and Customer Identity Access Management (CIAM), and privileged account controls through automated, cloud-based, and on-premises capabilities. By integrating these platforms, organisations can leverage their combined strengths to establish a secure business environment. This integration enhances operational control, regulatory compliance, and user experience in the digital era.</P><P>IBM Security Verify supports various authentication methods, including passwordless, fingerprints, and one-time passcodes, ensuring flexibility and robustness against unauthorised access. Meanwhile, SAP Cloud Identity Services serves as a comprehensive Identity and Access Management solution which is available in SAP BTP.</P><P>The integration process involves configuration updates in SAP CIS and IBM Security Verify to enable authentication utilising standard protocols supported by both components, such as SAML 2.0. Organisations must ensure they have the necessary admin privileges or access rights for editing configurations before initiating the integration procedure. Collaboration between the organisation and SAP is required for the integration, with most of the effort undertaken by the organisation.</P><P><STRONG><U>Reference Architecture</U></STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_0-1711558240041.png" style="width: 603px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87620iCDBBC15EAA0C32FA/image-dimensions/603x264?v=v2" width="603" height="264" role="button" title="TusharTrivedi_0-1711558240041.png" alt="TusharTrivedi_0-1711558240041.png" /></span></P><P>The diagram represents a SAP Cloud Identity Service that integrates with IBM Security Verify though which various SAP BTP application(s), SAP SaaS solution(s) and on-premises application(s) can be accessed. It demonstrates user sign-in via IBM Security Verify which allow possible passwordless, bio-metric or multi-factor authentication (MFA) using mobile devices for fast application access and pleasing user-experience.</P><P><STRONG><U>Prerequisites</U></STRONG></P><UL><LI>SAP Cloud Identity Services(for trial instance check this <A href="https://help.sap.com/docs/cloud-identity?locale=en-US" target="_blank" rel="noopener noreferrer">link</A>)</LI><LI>IBM Security Verify (for trial instance check this <A href="https://www.ibm.com/docs/en/security-verify?topic=overview-accessing-security-verify" target="_blank" rel="noopener nofollow noreferrer">link</A>)</LI><LI>A smartphone with IBM Security Verify App</LI></UL><P><STRONG><U>Configurations and Settings in IBM Security Verify</U></STRONG></P><P>Log in into <A href="https://ibmlabs.verify.ibm.com/ui/admin" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify</A> as an administrator&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_1-1711558240051.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87619iDD2FB2053352AAF9/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_1-1711558240051.png" alt="TusharTrivedi_1-1711558240051.png" /></span></P><P>When a user logs in, home screen as shown below will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_2-1711558240063.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87621i225AF80516E58B56/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_2-1711558240063.png" alt="TusharTrivedi_2-1711558240063.png" /></span></P><P>Now on the left panel, click on "Applications" under "Applications". On the right side of the screen, there is an “Add application” button. Click on it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_3-1711558240075.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87624iB89E19C5B29F0C09/image-dimensions/581x318?v=v2" width="581" height="318" role="button" title="TusharTrivedi_3-1711558240075.png" alt="TusharTrivedi_3-1711558240075.png" /></span></P><P>Fill the necessary details under “General” section as below and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_4-1711558240081.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87622iE900EAD3FCED43E8/image-dimensions/583x351?v=v2" width="583" height="351" role="button" title="TusharTrivedi_4-1711558240081.png" alt="TusharTrivedi_4-1711558240081.png" /></span></P><P>Before we go further, let’s log into SAP BTP account and you will be navigated on SAP BTP Cockpit. As suggested below, navigate to the “Instances and Subscriptions” tab, which is under “Services”.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_5-1711558240088.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87623i84B54FDB35A41913/image-dimensions/581x305?v=v2" width="581" height="305" role="button" title="TusharTrivedi_5-1711558240088.png" alt="TusharTrivedi_5-1711558240088.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_6-1711558240097.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87625i2B53267225252EA7/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_6-1711558240097.png" alt="TusharTrivedi_6-1711558240097.png" /></span></P><P>Upload the metadata file which you have recently saved on your device to IBM Verify dashboard</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_7-1711558240104.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87626iFC489D70B361D987/image-dimensions/581x327?v=v2" width="581" height="327" role="button" title="TusharTrivedi_7-1711558240104.png" alt="TusharTrivedi_7-1711558240104.png" /></span></P><P><STRONG><U>Configurations and Settings in SAP Cloud Identity Services</U></STRONG></P><P>Now, get back to SAP BTP and navigate to “Instances and Subscriptions.”</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_8-1711558240123.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87627iD26384015971092A/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_8-1711558240123.png" alt="TusharTrivedi_8-1711558240123.png" /></span></P><P>Now, enable the “Cloud Identity Services” if it’s not and once done it will be accessible as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_9-1711558240142.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87630i22174F3EA9625389/image-dimensions/583x306?v=v2" width="583" height="306" role="button" title="TusharTrivedi_9-1711558240142.png" alt="TusharTrivedi_9-1711558240142.png" /></span></P><P>Once you click on “Cloud Identity Services”, you will be redirected to the login screen of the SAP authentication screen as shown below</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_10-1711558240151.png" style="width: 585px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87628iEBE7E7B581BEAD5D/image-dimensions/585x306?v=v2" width="585" height="306" role="button" title="TusharTrivedi_10-1711558240151.png" alt="TusharTrivedi_10-1711558240151.png" /></span></P><P>After successful login, you can see the home screen of Cloud identity service. Go to the “Identity Providers” as highlighted below</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_11-1711558240165.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87629iE9F459AA6A3456D1/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_11-1711558240165.png" alt="TusharTrivedi_11-1711558240165.png" /></span></P><P>Click on the Corporate Identity providers and create new identity provider</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_12-1711558240180.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87631i14BC0DD99326AD6F/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_12-1711558240180.png" alt="TusharTrivedi_12-1711558240180.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_13-1711558240199.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87632iA827A103C5B7CE0F/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_13-1711558240199.png" alt="TusharTrivedi_13-1711558240199.png" /></span></P><P>Once the new identity provider is added successfully, click on the identity provider type and select SAML 2.0 compliant as shown below</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_14-1711558240217.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87633iBF1B725FC5F931FA/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_14-1711558240217.png" alt="TusharTrivedi_14-1711558240217.png" /></span></P><P>Go to the SAML configuration section and fill in the information as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_15-1711558240253.png" style="width: 465px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87635i9249EB9FC9127D47/image-dimensions/465x243?v=v2" width="465" height="243" role="button" title="TusharTrivedi_15-1711558240253.png" alt="TusharTrivedi_15-1711558240253.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_16-1711558240282.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87636iF17F5BCC71338399/image-dimensions/582x303?v=v2" width="582" height="303" role="button" title="TusharTrivedi_16-1711558240282.png" alt="TusharTrivedi_16-1711558240282.png" /></span></P><P>You can browse the “Metadata” file from your device once you download it from IBM Security Verify dashboard. Go to “Sign on” section of the application and on the right side of the screen, download the file from the given URL and upload the same in SAP Cloud Identity Service as highlighted below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_17-1711558240291.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87634i31E8A06AE0210E24/image-dimensions/580x319?v=v2" width="580" height="319" role="button" title="TusharTrivedi_17-1711558240291.png" alt="TusharTrivedi_17-1711558240291.png" /></span></P><P>Click on the Trusting application section and add SAP BTP trial sub-account.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_18-1711558240308.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87637iCC89A43551D2E79A/image-dimensions/581x302?v=v2" width="581" height="302" role="button" title="TusharTrivedi_18-1711558240308.png" alt="TusharTrivedi_18-1711558240308.png" /></span></P><P>Now, navigate back to SAP BTP cockpit and establish the trust configuration which is under “Security” section &nbsp;for the cloud identity application as shown in the below screenshots.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_19-1711558240327.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87639i167BF05ECCDAFF00/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_19-1711558240327.png" alt="TusharTrivedi_19-1711558240327.png" /></span></P><P>Select “Establish Trust”</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_20-1711558240343.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87638i162E95E24B25C60D/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_20-1711558240343.png" alt="TusharTrivedi_20-1711558240343.png" /></span></P><P>You will see the below steps once you click on establish trust.&nbsp; As a first step, choose tenant and click on next.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_21-1711558240362.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87640i0A33044697A8BC5B/image-dimensions/583x306?v=v2" width="583" height="306" role="button" title="TusharTrivedi_21-1711558240362.png" alt="TusharTrivedi_21-1711558240362.png" /></span></P><P>After selecting a tenant in the next step choose the domain for your SAP Cloud identity services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_22-1711558240383.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87641iEFD4BF3271BCFE37/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_22-1711558240383.png" alt="TusharTrivedi_22-1711558240383.png" /></span></P><P>Click on the next button and configure parameters as shown in below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_23-1711558240404.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87642iFB90AFAA4E99207C/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_23-1711558240404.png" alt="TusharTrivedi_23-1711558240404.png" /></span></P><P>Click on the next button and make a final review of the setup you have done while establishing the trust.&nbsp; Then click on the finish button and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_24-1711558240426.png" style="width: 586px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87645i81921A9A59AC826E/image-dimensions/586x306?v=v2" width="586" height="306" role="button" title="TusharTrivedi_24-1711558240426.png" alt="TusharTrivedi_24-1711558240426.png" /></span></P><P>Once done, you can see the new active trust configuration as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_25-1711558240444.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87644i1759C90ACFBCBE7C/image-dimensions/581x305?v=v2" width="581" height="305" role="button" title="TusharTrivedi_25-1711558240444.png" alt="TusharTrivedi_25-1711558240444.png" /></span></P><P>To provide access to the user, click on the Users section which is inside the “Security” section on the left menu.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_26-1711558240458.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87643i7725168E02472D61/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_26-1711558240458.png" alt="TusharTrivedi_26-1711558240458.png" /></span></P><P>Click on the user and assign role collection to the user as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_27-1711558240478.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87646iCC474B356848F0EC/image-dimensions/581x305?v=v2" width="581" height="305" role="button" title="TusharTrivedi_27-1711558240478.png" alt="TusharTrivedi_27-1711558240478.png" /></span></P><P>You can select different roles and assign them to the user. Here we have added three roles to the user.&nbsp; After selecting all the roles, click on the&nbsp; “Assign role collection” button and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_28-1711558240506.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87648iDFCEFBDD87A73D6E/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_28-1711558240506.png" alt="TusharTrivedi_28-1711558240506.png" /></span></P><P>We have completed the configurations in IBM Security Verify and SAP Cloud Identity Services. Let’s test it now by opening the SAP business studio application as shown below.</P><P><STRONG><U>How does it work? Let’s Check.</U></STRONG></P><P>Log into SAP BTP Cockpit and Navigate to “Instances and Subscriptions” under “Services” as highlighted below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_29-1711558240524.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87647i747B918F47100581/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_29-1711558240524.png" alt="TusharTrivedi_29-1711558240524.png" /></span></P><P>It will redirect to the sign in options screen of the SAP. Here, select SAP cloud identity service as an identity provider.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_30-1711558240534.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87649iBB43174F0F6B5561/image-dimensions/583x306?v=v2" width="583" height="306" role="button" title="TusharTrivedi_30-1711558240534.png" alt="TusharTrivedi_30-1711558240534.png" /></span></P><P>Once you select, it will redirect to the verify sign in option screen for a authentication. Here you can select a different sign in option for Verify or can log in with IBM id/Cloud directory.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_31-1711558240543.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87650i48ED1F1BEB730AAE/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_31-1711558240543.png" alt="TusharTrivedi_31-1711558240543.png" /></span></P><P>Enter your IBMid for log in and click the continue button.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_32-1711558240557.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87651iE87EDDC24774E25E/image-dimensions/583x305?v=v2" width="583" height="305" role="button" title="TusharTrivedi_32-1711558240557.png" alt="TusharTrivedi_32-1711558240557.png" /></span></P><P>&nbsp;<SPAN>It will redirect you for w3 authentication screen where you can enter your w3 id &amp; password.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_33-1711558240565.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87653i9F758C1762A1DA16/image-dimensions/580x304?v=v2" width="580" height="304" role="button" title="TusharTrivedi_33-1711558240565.png" alt="TusharTrivedi_33-1711558240565.png" /></span></P><P>Once you click on sign in, you will see below screen of SAP business application studio.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_34-1711558240572.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87652i3AE86427757EF2BF/image-dimensions/582x306?v=v2" width="582" height="306" role="button" title="TusharTrivedi_34-1711558240572.png" alt="TusharTrivedi_34-1711558240572.png" /></span></P><P>Click on the “OK” button and you will be redirected to the SAP Business Application Studio home screen.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_35-1711558240600.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87654i00A7A88933D64B54/image-dimensions/581x304?v=v2" width="581" height="304" role="button" title="TusharTrivedi_35-1711558240600.png" alt="TusharTrivedi_35-1711558240600.png" /></span></P><P><STRONG><U>Conclusion</U></STRONG></P><P>To summarise, combining IBM Security Verify with SAP Cloud Identity Services via SAML 2.0 provides a strong solution for organisations wishing to:<BR /><BR /><U>Enhance security</U>: By implementing multi-factor authentication and centralised user management, businesses may greatly minimise the risk of unauthorised access to vital data and applications.</P><P><U>Improve the user experience</U>: SAML 2.0 integration offers single sign-on, which allows users to access various applications with a single login, eliminating login fatigue and increasing overall user experience.</P><P><U>Simplify identity management</U>: Consolidating identity management across several platforms allows organisations to streamline administration operations and reduce the complexity of managing user access.</P><P>Overall, this integration enables organisations to achieve a balance between strong security and a user-friendly interface, building trust and confidence in this digital era.</P> 2024-04-02T10:29:43.856000+02:00 https://community.sap.com/t5/technology-blogs-by-members/streamlining-user-provisioning-from-ibm-verify-to-sap-cloud-identity/ba-p/13695010 Streamlining User Provisioning from IBM Verify to SAP Cloud Identity Services 2024-05-08T12:57:02.652000+02:00 TusharTrivedi https://community.sap.com/t5/user/viewprofilepage/user-id/150726 <P>SAP Cloud Identity Services (CIS), part of SAP BTP, can be used to integrate Identity Access Management (IAM). In our last blog, we discussed the integration of SAP Cloud Identity Services (CIS) with IBM Security Verify, and now we're taking the next step in this integration. User provisioning is the process of setting up new user accounts in a system or application. In this blog, we will explore a common use case - - transitioning user provisioning from IBM Verify to SAP Cloud Identity Services, and how this transition can streamline operations and enhance security.</P><P><STRONG>The Challenge of User Provisioning</STRONG></P><P>User provisioning is the process of granting and controlling access to resources within an organisation’s information technology infrastructure. Historically, on-boarding or off-boarding users has been a laborious and time-consuming procedure that frequently required numerous processes across multiple systems. As businesses embrace cloud solutions, the complexity of user provisioning has grown, necessitating automated and integrated approaches.</P><P><STRONG>Transitioning from IBM Verify to SAP Cloud Identity Services</STRONG></P><P>IBM Verify is a comprehensive identity and access management system that includes multi-factor authentication (MFA) and adaptive access control, while SAP Cloud Identity Services offers identity lifecycle management, single sign-on (SSO), and access governance features. Integrating these two systems can help organisations automate and streamline user provisioning operations, while also improving security and user experience.</P><P>&nbsp;</P><P><STRONG><U>How does it work?</U></STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 1.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107254iC87D93636632C1FF/image-dimensions/600x390?v=v2" width="600" height="390" role="button" title="Picture 1.jpg" alt="Picture 1.jpg" /></span></P><P>The diagram shows that IBM Security Verify acts as a central user management system. It creates user accounts and manages their attributes, and also provisions them (or creates them) in SAP Cloud Identity Services, potentially syncing relevant user attributes. Selected attributes from Verify are&nbsp;mapped&nbsp;to specific target attributes in SAP Cloud Identity Services, ensuring consistent user information across both systems. SCIM, a standardised protocol, enables communication between Verify and SAP Cloud Identity Services. On the left side of the diagram, IBM Security Verify acts as a SCIM server, receiving requests for user management and then modifying the target directory as needed. This streamlines user creation and ensures consistent user information across both systems.</P><P>&nbsp;</P><P><STRONG><U>Prerequisites</U></STRONG></P><UL><LI>SAP Cloud Identity Services (for trial instance check this <A href="https://help.sap.com/docs/cloud-identity?locale=en-US" target="_blank" rel="noopener noreferrer">link</A>)</LI><LI>IBM Security Verify (for trial instance check this <A href="https://www.ibm.com/docs/en/security-verify?topic=overview-accessing-security-verify" target="_blank" rel="noopener nofollow noreferrer">link</A>)</LI><LI>A smartphone with IBM Security Verify App</LI></UL><P>&nbsp;</P><P><STRONG><U>Configurations and Settings in IBM Security Verify and SAP Cloud Identity Services</U></STRONG></P><P>Log into <A href="https://ibmlabs.verify.ibm.com/ui/admin" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify</A> as an administrator  </P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 2.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107255iF33506AB018341EE/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 2.jpg" alt="Picture 2.jpg" /></span></P><P>When a user logs in, the home screen as shown below will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 3.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107256iA46ECE028C7D63C1/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 3.jpg" alt="Picture 3.jpg" /></span></P><P>On the left panel, click on "Applications" under "Applications". On the right side of the screen, there is an “Add application” button. Click on it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 4.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107258i998C9B160EB85555/image-dimensions/600x329?v=v2" width="600" height="329" role="button" title="Picture 4.jpg" alt="Picture 4.jpg" /></span></P><P>Fill in the necessary details under “General” section as below and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 5.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107259iF49D6F1784AAD6A7/image-dimensions/600x363?v=v2" width="600" height="363" role="button" title="Picture 5.jpg" alt="Picture 5.jpg" /></span></P><P>Before we go further, let’s log into SAP BTP account and you will be navigated on SAP BTP Cockpit. As suggested below, navigate to the “Instances and Subscriptions” tab which is under “Services.”</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 6.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107261i1A4FCC6A1C0D1C12/image-dimensions/601x326?v=v2" width="601" height="326" role="button" title="Picture 6.jpg" alt="Picture 6.jpg" /></span></P><P>You have to enable the cloud identity services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 7.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107262i0B72D5F41CB61C9B/image-dimensions/601x316?v=v2" width="601" height="316" role="button" title="Picture 7.jpg" alt="Picture 7.jpg" /></span></P><P>Once enabled, it will look as below. Now, click on Cloud Identity Services application and you will be redirected to the login screen of the SAP authentication screen as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 8.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107263iCC19230226369943/image-dimensions/601x316?v=v2" width="601" height="316" role="button" title="Picture 8.jpg" alt="Picture 8.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 9.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107266i357621A8168E5EF0/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 9.jpg" alt="Picture 9.jpg" /></span></P><P>After a successful login, you can see the home screen of Cloud identity Services. Go to the “Identity Providers” as highlighted below :</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 10.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107268i5D2F63349F825C38/image-dimensions/601x337?v=v2" width="601" height="337" role="button" title="Picture 10.jpg" alt="Picture 10.jpg" /></span></P><P>Click on the Corporate Identity providers and create new identity provider.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 11.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107269i7DEC6BF3C2F442CB/image-dimensions/601x313?v=v2" width="601" height="313" role="button" title="Picture 11.jpg" alt="Picture 11.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 12.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107270iDFD2CD3C9DA26807/image-dimensions/601x337?v=v2" width="601" height="337" role="button" title="Picture 12.jpg" alt="Picture 12.jpg" /></span></P><P>Once the new identity provider is successfully added,&nbsp; click on the identity provider type and select SAML 2.0 compliant, as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 13.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107271i5C962799BF791BA2/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 13.jpg" alt="Picture 13.jpg" /></span></P><P>Go to the SAML configuration section and fill in the information as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 14.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107275iD992FDB591A7B11C/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 14.jpg" alt="Picture 14.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 15.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107279i5840BC903244CD42/image-dimensions/601x314?v=v2" width="601" height="314" role="button" title="Picture 15.jpg" alt="Picture 15.jpg" /></span></P><P>You can browse the “Metadata” file from your device once you download it from IBM Security Verify dashboard. Go to the &nbsp;“Sign on” section of the application and on the right side of the screen, download the file from the given URL and upload the same in SAP Cloud Identity Services as highlighted below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 16.jpg" style="width: 598px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107280i74553FB8FBABC481/image-dimensions/598x329?v=v2" width="598" height="329" role="button" title="Picture 16.jpg" alt="Picture 16.jpg" /></span></P><P>Click on the Trusting application section and add SAP BTP trial subaccount.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 17.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107281i7C0241A7448A67D6/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 17.jpg" alt="Picture 17.jpg" /></span></P><P>Establish the trust configuration, which is under the “Security” section &nbsp;for the cloud identity application as shown in the below screenshots.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 18.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107282i6B60DB321260CD72/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 18.jpg" alt="Picture 18.jpg" /></span></P><P>You will see the below steps once you click on establish trust. In the first step, choose tenant and click on the next.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 19.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107284iC5DF2A58932143A3/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 19.jpg" alt="Picture 19.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 20.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107285i669823593CB1EF97/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 20.jpg" alt="Picture 20.jpg" /></span></P><P>After selecting a tenant, choose domain for your SAP Cloud Identity Services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 21.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107286iDC0DF0A0829D035F/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 21.jpg" alt="Picture 21.jpg" /></span></P><P>Click on the next button and configure parameters as shown in the below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 22.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107288iD40F34CDECC0FD9A/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 22.jpg" alt="Picture 22.jpg" /></span></P><P>Click on the next button and review the setup that you have done while establishing the trust. Finally, click on the finish button and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 23.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107289iD6BAA6A35F4A9AA5/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 23.jpg" alt="Picture 23.jpg" /></span></P><P>Once done, you can see the trust new active trust configuration as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 24.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107392i27CD4C569D25B32C/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 24.jpg" alt="Picture 24.jpg" /></span></P><P>Now go back to IBM Security Verify and click on “Sign-on” section, then select “Use metadata” checkbox. It will allow us to upload the metadata file which we have downloaded from SAP BTP as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 25.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107394i216EC7591BDAD303/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 25.jpg" alt="Picture 25.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 26.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107395i35F9A561397134EF/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 26.jpg" alt="Picture 26.jpg" /></span></P><P>Upload the metadata file which you have recently saved on your device to IBM Verify dashboard.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 27.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107397i52227C152B94583A/image-dimensions/600x339?v=v2" width="600" height="339" role="button" title="Picture 27.jpg" alt="Picture 27.jpg" /></span></P><P>Now go to the “Account lifecycle” tab and add SCIM URL, Username and password detail as shown in below image. You can get all the details from SAP Cloud Identity Services application page.</P><P>&nbsp;</P><P>To get SCIM URL, go to SAP CIS and get the URL details from the browser and add “SCIM” at the end of URL.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 28.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107398i0F1E9139A1B89A00/image-dimensions/600x333?v=v2" width="600" height="333" role="button" title="Picture 28.jpg" alt="Picture 28.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 29.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107399iC0B3302E3F629661/image-dimensions/600x333?v=v2" width="600" height="333" role="button" title="Picture 29.jpg" alt="Picture 29.jpg" /></span></P><P>After adding the above details, scroll down and you can see “Attribute mapping” section. &nbsp;Click on the checkbox for which attribute you want to map from IBM Verify to SAP CIS and want to keep updated. Here we have checked email. &nbsp;Save this detail once changes are completed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 30.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107400i05DBB07F4608DEC7/image-dimensions/600x351?v=v2" width="600" height="351" role="button" title="Picture 30.jpg" alt="Picture 30.jpg" /></span></P><P>We have completed the configurations in IBM Security Verify and SAP Cloud Identity Services. Let’s add user with attribute&nbsp; into Verify and check if it is mapped to Cloud Identity Users dashboard.</P><P>Go to the Users tab under the “Directory” section on the left side of the verify dashboard and click on the “Add User” button as shown in below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 31.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107401iD25469100AB22F06/image-dimensions/601x359?v=v2" width="601" height="359" role="button" title="Picture 31.jpg" alt="Picture 31.jpg" /></span></P><P>Fill out the necessary information for the user as mentioned in the below image and click on the “Save” user tab.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 32.jpg" style="width: 300px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107402i6BC43DACFD285AE2/image-dimensions/300x427?v=v2" width="300" height="427" role="button" title="Picture 32.jpg" alt="Picture 32.jpg" /></span></P><P>Scroll down and you can add more detail about the user. Here we have added an email ID, mobile number and user company details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 33.jpg" style="width: 300px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107404i61838B107F605CA6/image-dimensions/300x495?v=v2" width="300" height="495" role="button" title="Picture 33.jpg" alt="Picture 33.jpg" /></span>&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 34.jpg" style="width: 293px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107405i6D6E7519C623DBAE/image-dimensions/293x495?v=v2" width="293" height="495" role="button" title="Picture 34.jpg" alt="Picture 34.jpg" /></span></P><P>Once done, click on the Save button and the user detail will be saved.</P><P>Open the Cloud Identity Services application and go to the user section to check whether the newly-created user from Verify is mapped.</P><P>Click on the “Instance and subscription” section from the “Services” section on the left menu, and once the application list is shown, click on the Cloud Identity Services application as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 35.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107406i9D4A6985D7838094/image-dimensions/601x353?v=v2" width="601" height="353" role="button" title="Picture 35.jpg" alt="Picture 35.jpg" /></span></P><P>When the new application is loaded, click on the “User Management” tile and all the user list will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 36.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107407i4908B40D66F3039E/image-dimensions/600x354?v=v2" width="600" height="354" role="button" title="Picture 36.jpg" alt="Picture 36.jpg" /></span></P><P>As you can see in the below screenshot, a new user is created, which is added from Verify and mapped into SAP Cloud Identity Services. Also, the user detail is mapped into Cloud Identity Services.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 37.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107408i49144A562C9FB9B1/image-dimensions/600x351?v=v2" width="600" height="351" role="button" title="Picture 37.jpg" alt="Picture 37.jpg" /></span></P><P><STRONG><U>Conclusion</U></STRONG></P><P>Effective user provisioning is critical to maintaining security, compliance, and operational efficiency. Centralising identity management, improving security, and streamlining administration activities enables organisations to successfully manage user identities and access controls across their entire IT infrastructure. Embracing integrated identity management solutions is more than just convenient - - &nbsp;it is a strategic need for businesses looking to flourish in an increasingly linked and security-conscious environment.</P><P><STRONG><U>More information:</U></STRONG></P><P>Refer to our another blog on <A href="https://community.sap.com/t5/technology-blogs-by-members/integrating-ibm-security-verify-with-sap-cloud-identity-services-in-sap-btp/ba-p/13651722" target="_blank">SAP Cloud Identity Service integration with IBM Security Verify</A>.</P><P>If you have any question or query about&nbsp;SAP BTP please refer to <A href="https://community.sap.com/" target="_blank">SAP Community</A> and for any question or query about IBM Security Verify refer to <A href="https://community.ibm.com/community/user/security/communities/community-home?CommunityKey=e7c36119-46d7-42f2-97a9-b44f0cc89c6d" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify Community</A></P> 2024-05-08T12:57:02.652000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/identity-access-management-iam-reference-architectures-2024/ba-p/13697891 Identity Access Management (IAM) Reference Architectures 2024 2024-05-10T17:20:21.397000+02:00 1Gunnar https://community.sap.com/t5/user/viewprofilepage/user-id/11449 <H1 id="toc-hId-865442847"><STRONG>Identity Access Management Reference Architectures in 2024</STRONG></H1><P>We are happy to share with you that we just released an update to our reference architectures (2024 version).</P><P>The latest version is published in&nbsp;<A href="https://discovery-center.cloud.sap/refArchCatalog/?category=security" target="_self" rel="nofollow noopener noreferrer">SAP Discovery Center</A> along with further links to our documentation and to related missions. We want to support you trying out easily what we describe.</P><P>If you are new to this topic, consider reading my&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-sap/identity-lifecycle-sap-reference-architecture-for-identity-access/ba-p/13504029" target="_self">older blog post about Cloud leading Identity Lifecycle from 2021.</A>&nbsp;The 1st chapter is still valid to start with - although it's 3 years old <span class="lia-unicode-emoji" title=":slightly_smiling_face:">🙂</span></P><P data-unlink="true">We have an updated version of the <A href="https://support.sap.com/en/offerings-programs/support-services/security-optimization-services-portfolio.html?anchorId=section_1784311506" target="_self" rel="noopener noreferrer">SAP Secure Operations Map</A>&nbsp;which allows you to verify your security requirements and map them to the regional requirements like NIST or BSI.<BR />The Secure Operations Map contains in the application layer the three main IAM pillars that are now described in the SAP Discovery Center:</P><H3 id="toc-hId-927094780"><A href="https://discovery-center.cloud.sap/refArchDetail/ref-arch-cloud-leading-authentication" target="_self" rel="nofollow noopener noreferrer">Authentication flows</A></H3><H3 id="toc-hId-730581275"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="[SAP Official]_SAP_Cloud_Leading_Authentication_L2.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110029iB2CEA4D6F70D5B65/image-size/medium?v=v2&amp;px=400" role="button" title="[SAP Official]_SAP_Cloud_Leading_Authentication_L2.png" alt="[SAP Official]_SAP_Cloud_Leading_Authentication_L2.png" /></span><BR /><A href="https://discovery-center.cloud.sap/refArchDetail/ref-arch-cloud-leading-identity-lifecycle-authorizations" target="_self" rel="nofollow noopener noreferrer">Authorization flows as part of the identity lifecycle</A></H3><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="[SAP-official]_SAP_Cloud_Identity_Services_Authorization_L1.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110031iA2E47F0A81B02F75/image-size/medium?v=v2&amp;px=400" role="button" title="[SAP-official]_SAP_Cloud_Identity_Services_Authorization_L1.png" alt="[SAP-official]_SAP_Cloud_Identity_Services_Authorization_L1.png" /></span></P><H2 id="toc-hId-404985051"><A href="https://discovery-center.cloud.sap/refArchDetail/ref-arch-cloud-leading-identity-lifecycle" target="_self" rel="nofollow noopener noreferrer">Identity Lifecycle flows</A></H2><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="[SAP Official]_SAP_Cloud_Identity_Services_Identity_Lifecycle_L1.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110027iF904C1A7D2C1D674/image-size/medium?v=v2&amp;px=400" role="button" title="[SAP Official]_SAP_Cloud_Identity_Services_Identity_Lifecycle_L1.png" alt="[SAP Official]_SAP_Cloud_Identity_Services_Identity_Lifecycle_L1.png" /></span></P><P>&nbsp;</P><P>Please read them and we can use this community to discuss.</P><P>If you want to know more about the SAP Cloud Identity Services I recommend <A href="https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-identity-services-why-and-how-to-integrate-them-for-a-consistent/ba-p/13560015" target="_self">this blog post</A>.</P><P>&nbsp;</P><P>PS: Yes, we are already working on an integrated architecture which considers SAP Access Control - but we need a bit more time.</P><P>&nbsp;</P> 2024-05-10T17:20:21.397000+02:00 https://community.sap.com/t5/human-capital-management-blogs-by-members/sso-sf-single-sign-on-for-sap-successfactors/ba-p/13697478 [SSO] [SF] (Single Sign-On) for SAP SuccessFactors 2024-05-11T06:44:44.370000+02:00 AhmedAranda https://community.sap.com/t5/user/viewprofilepage/user-id/154294 <UL><LI><FONT size="5"><STRONG><U>IAS Tenant preparation: Log onto Identity Authentication service</U></STRONG></FONT></LI></UL><OL><LI><STRONG>&nbsp;</STRONG>Navigate to Identity provisioning &gt; Source &gt; Properties &gt; sf.user.filter&nbsp; make it (active eq "true")</LI><LI>Navigate to Identity provisioning &gt; Source &gt; Outbound Certificates and make sure that the certificate is valid, if not generate a new one and delete the old one and activate the automatic generation</LI><LI>Go to Identity provisioning &gt; Target &gt; Outbound Certificates and make sure that the certificate is valid, if not generate a new one and delete the old one and activate the automatic generation</LI></OL><P>Note: If the IAS tenant links were not provided from SAP, you can activate from the Upgrade Center, and after completing the configuration, testing and activation will be done again from the Upgrade Center</P><UL><LI><FONT size="5"><STRONG><U>Created trust between Azure Active Directory and Identity Authentication service</U></STRONG></FONT></LI></UL><P><STRONG>Step 1: Download Identity Authentication service tenant metadata</STRONG></P><P>Navigate to Applications and resources &gt; Tenant Setting &gt; Single Sign-On &gt; SAML 2.0 Configuration and download the IAS Meta data file</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-11 065825.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108926iF5BD30107BA3D0E5/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-11 065825.png" alt="Screenshot 2024-05-11 065825.png" /></span></P><P>Download&nbsp;the metadata file.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-11 065937.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108927i75280C3C146197FB/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-11 065937.png" alt="Screenshot 2024-05-11 065937.png" /></span></P><P><STRONG>Step 2: Create enterprise application in Azure Active Directory</STRONG></P><P>Navigate to the Enterprise applications, Click&nbsp;New application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (267).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108939i857C350E39AA0B7C/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (267).png" alt="Screenshot (267).png" /></span></P><P>Azure Active Directory has templates for a variety of applications, one of them is the SAP Cloud Platform Identity Authentication Service.&nbsp;Search&nbsp;for this and select it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (269).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108940iC01880ECFF32656F/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (269).png" alt="Screenshot (269).png" /></span></P><P>A new column on the right side will appear to give the application a name. Give the application a name and click&nbsp;Add.</P><P><FONT size="3">Go to&nbsp;Single sign-on&nbsp;and select&nbsp;SAML&nbsp;as Single-Sign On method.</FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (270).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108941i11A6EC811D8C987A/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (270).png" alt="Screenshot (270).png" /></span></P><P> <span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screenshot (271).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108942i34B2A8D9FFC3D306/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (271).png" alt="Screenshot (271).png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P><STRONG>STEP 3: Upload the IAS tenant metadata file you get from the step 1&nbsp;</STRONG></P><P>Select the application you just created, Click&nbsp;Upload metadata&nbsp;to upload the metadata file from Identity Authentication service.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (273).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108947i3EBB679C78AEF1AA/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (273).png" alt="Screenshot (273).png" /></span></P><P>All the details are now taken from the metadata file. There’s nothing to do for you other than saving the details. Therefore, click&nbsp;Save.</P><P><STRONG>STEP 4: Download single sign-on metadata from Azure Active Directory</STRONG></P><P>Download the federation metadata as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_12-1715334222762.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108548iC740874D16E66A3B/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_12-1715334222762.png" alt="aranda_12-1715334222762.png" /></span></P><P>With this information we can setup the trust between Azure Active Directory and Identity Authentication service.</P><P><STRONG>Step 5: Create corporate identity provider in IAS</STRONG></P><P>Go back to IAS and navigate to Identity provider &gt; Create &gt; Microsoft ADFS / Entra AD (SAML 2.0) Type</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssd.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108944i395853CA96A7E75D/image-size/medium?v=v2&amp;px=400" role="button" title="ssd.png" alt="ssd.png" /></span></P><P> <span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="aranda_14-1715334222768.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108550i316E778C466E734A/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_14-1715334222768.png" alt="aranda_14-1715334222768.png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P><STRONG>STEP 6: Upload Azure Active Directory federation metadata file</STRONG></P><P>Click&nbsp;SAML 2.0 Configuration&nbsp;and to upload the recently downloaded federation metadata from Azure Active Directory.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_15-1715334222777.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108552i8A6F9F6E33C3BC8E/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_15-1715334222777.png" alt="aranda_15-1715334222777.png" /></span></P><P>Choose the file from your local file system.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_16-1715334222782.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108551iC47F5399986D9CB9/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_16-1715334222782.png" alt="aranda_16-1715334222782.png" /></span></P><P>All fields below are automatically going to be filled due to the information provided through the uploaded file.</P><P>Click&nbsp;Save&nbsp;at the top of the page.</P><P><STRONG>STEP 6: Add a new user in the Users and groups Microsoft Azure application</STRONG></P><P data-unlink="true">Go back to your&nbsp;overview of enterprise applications&nbsp;in Microsoft Azure AD and click your application. Add a new user by clicking&nbsp;<STRONG>Add user</STRONG>&nbsp;in the&nbsp;<STRONG>Users and groups</STRONG>&nbsp;submenu, as shown on the screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_17-1715334222788.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108553iDE382E1C645AC867/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_17-1715334222788.png" alt="aranda_17-1715334222788.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_18-1715334222793.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108554i5A8199C61BFFF2BA/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_18-1715334222793.png" alt="aranda_18-1715334222793.png" /></span></P><P>By hitting the result tile, you select the user, which should appear under&nbsp;Selected members&nbsp;panel. Finish your user assignment with clicks on&nbsp;<STRONG>Select</STRONG>&nbsp;and&nbsp;<STRONG>Assign</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_19-1715334222799.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108555i40CE7E86C27A151A/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_19-1715334222799.png" alt="aranda_19-1715334222799.png" /></span></P><P>Congrats Now you created trust between Azure Active Directory and Identity Authentication service.</P><UL><LI><FONT size="5"><STRONG><U>IAS Tenant Final Preparation: </U></STRONG></FONT></LI></UL><P>Navigate to Identity provisioning &gt; Source &gt; Jobs and run now read job to get all users from SF then schedule the job for future new hires.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-10 120631.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108930iBAF78458541D5C1A/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-10 120631.png" alt="Screenshot 2024-05-10 120631.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-10 120828.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108931i2301BDF299D8E755/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-10 120828.png" alt="Screenshot 2024-05-10 120828.png" /></span></P><P>Navigate to Applications and resources &gt; Applications &gt; SuccessFactors &gt; Conditional Authentication and create a rule for all domains you need it to access the system from the identity provider you created... this step will define the domains witch will access as SSO, any other domain will access from the default identity provider.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_22-1715334222816.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108559i7F07FB07C5ED3FF8/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_22-1715334222816.png" alt="aranda_22-1715334222816.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-10 121953.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108932i14F69134B531ADFC/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-10 121953.png" alt="Screenshot 2024-05-10 121953.png" /></span></P><P>Set the Default Identity Provider as Identity Authentication.</P><P>Navigate to Identity provider &gt; Identity Federation &gt; switch On Use Identity Authentication user store and Switch On User Access</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_24-1715334222826.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108560iD12AF981EB601304/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_24-1715334222826.png" alt="aranda_24-1715334222826.png" /></span></P><P>Now you can test and be sure that the user you are try to test with is already added to the SF tenant.</P><P>Hope you enjoy the process.</P><P>Thanks</P><P>Ahmed Aranda&nbsp;</P> 2024-05-11T06:44:44.370000+02:00