https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/SAP-Cloud-Identity-Services-blog-posts.xml SAP Community - SAP Cloud Identity Services 2026-02-28T12:12:24.922122+00:00 python-feedgen SAP Cloud Identity Services blog posts in SAP Community https://community.sap.com/t5/technology-blog-posts-by-sap/is-it-possible-to-configure-scoped-roles-from-sap-datasphere-in-sap-cloud/ba-p/14278996 Is it possible to configure scoped roles from SAP Datasphere in SAP Cloud Identity Service? 2025-11-27T12:51:51.667000+01:00 FernandaFroelich https://community.sap.com/t5/user/viewprofilepage/user-id/1410810 <P><STRONG>Answer</STRONG>:&nbsp;No, feature is not available.&nbsp;</P> 2025-11-27T12:51:51.667000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/cloud-identity-services-github-at-your-service-to-help-with-feedback/ba-p/14279075 Cloud Identity Services - GitHub at Your Service To Help with Feedback 2025-11-27T15:05:49.380000+01:00 ValAtanassov https://community.sap.com/t5/user/viewprofilepage/user-id/125402 <P>Good documentation grows faster and better when users and authors work together. That’s exactly the spirit behind the initiative we started some time ago by opening the <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/identity-authentication-opens-its-documentation-for-your-feedback-with/ba-p/13536826" target="_blank">SAP Cloud Identity Services documentation to community feedback via GitHub</A>.</P><P>Your questions, issues, and edits have directly helped us improve the documentation and shape Cloud Identity Services for the community. Please continue to share your experiences — whether it’s a quick correction, a clarification, or a new example — every contribution helps.</P><P>Why this matters for Cloud Identity Services users and authors:</P><UL><LI>Faster fixes and clearer guidance: When you report unclear wording or missing information, we - the authors can respond and update docs more quickly.</LI><LI>Direct collaboration: Instead of waiting for a support ticket or guessing, you can open a conversation right where the documentation lives.</LI><LI>Learn and contribute: Submitting edits is a great way to share real-world tips or correct examples that help everyone.</LI></UL><P>Thank you! and keep the feedback coming.&nbsp;</P><P>But how to do that? See the links in More Information below.</P><H2 id="toc-hId-1765717437">More Information</H2><P><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/identity-authentication-opens-its-documentation-for-your-feedback-with/ba-p/13536826" target="_self">Identity Authentication Opens Its Documentation for Your Feedback with GitHub</A>&nbsp;</P><P><A href="https://blogs.sap.com/tag/open-documentation-initiative/" target="_blank" rel="noopener noreferrer">SAP Open Documentation Initiative</A><BR /><BR /><A href="https://community.sap.com/topics/cloud-identity-services" target="_blank">SAP Cloud Identity Services</A><BR /><BR />&nbsp;</P> 2025-11-27T15:05:49.380000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/new-security-optimization-service-for-sap-cloud-identity-services/ba-p/14250465 New Security Optimization Service for SAP Cloud Identity Services 2025-12-02T04:38:12.742000+01:00 Anisa2 https://community.sap.com/t5/user/viewprofilepage/user-id/2003264 <H3 id="toc-hId-1892688808"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Data Security for CIS.jpg" style="width: 887px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/331068i729977407BBD4359/image-dimensions/887x591?v=v2" width="887" height="591" role="button" title="Data Security for CIS.jpg" alt="Data Security for CIS.jpg" /></span></H3><P>Security is no longer optional—it’s the backbone of digital trust and business continuity.</P><P>The SAP Security Optimization Service (SOS) is designed to analyze, verify, and improve the security of your SAP system by identifying potential security risks and providing recommendations to mitigate these risks within the assessed systems.&nbsp;</P><P>There are many different SAP systems that can be analyzed with an SOS and can be referred from the <A href="https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/sap-enterprise-support/enterprise-support-academy/continuous-quality-check-improvement-services/cqcso.pdf" target="_blank" rel="noopener noreferrer">CQC SOS Infosheet</A></P><H3 id="toc-hId-1696175303"><STRONG><span class="lia-unicode-emoji" title=":glowing_star:">🌟</span>New in CQC SOS:</STRONG> <STRONG>SAP</STRONG> <STRONG>Cloud Identity Services!</STRONG></H3><P>What is CQC SOS for SAP Cloud Identity Services?</P><UL><LI>SAP Cloud Identity Services are a group of services of SAP Business Technology Platform (SAP BTP), which enable you to integrate identity and access management between systems.&nbsp;</LI><LI>Besides the CQC SOS for SAP BTP, which provides a security assessment of those security-relevant configurations and authorization assignments which are in the responsibility of the customer and focuses on reviewing the platform aspects, a new CQC SOS in the BTP realm is now available: &nbsp;CQC SOS for SAP Cloud Identity Services.&nbsp;</LI></UL><P>The CQC SOS for&nbsp;SAP Cloud Identity Services provides a security assessment structured in the following sections:</P><UL class="lia-list-style-type-disc"><LI><STRONG>General Security Status for SAP Cloud Identity Services</STRONG>&nbsp;- e.g. security aspects related to administrator user/system management like critical authorizations and MFA enforcement, the security alert and notification configuration etc.</LI><LI><STRONG>Security Checks for Identity Authentication</STRONG> - e.g. application&nbsp;specific checks like assigned password policy, MFA,&nbsp; &nbsp;Remember Me functionality etc.</LI><LI><STRONG>Security Checks for Identity Provisioning</STRONG> - e.g. source and target system settings like logging and tracing for personal&nbsp; &nbsp;and sensitive data, SSL Server Certificate Verification etc.&nbsp;</LI></UL><H3 id="toc-hId-1499661798"><STRONG><span class="lia-unicode-emoji" title=":envelope_with_arrow:">📩</span>How to request a CQC service?</STRONG></H3><P>Create an incident under component&nbsp;<A href="https://launchpad.support.sap.com/#/notes/1296527" target="_blank" rel="noopener noreferrer">SV-BO-REQ (SAP Note 1296527)</A>&nbsp;or</P><P>Contact the SAP Enterprise Support Advisory&nbsp;team via our&nbsp;<A href="https://go.support.sap.com/contactus/#/email" target="_blank" rel="noopener noreferrer">Customer Interaction Center</A><A href="https://go.support.sap.com/contactus/#/email" target="_blank" rel="noopener noreferrer">&nbsp;(</A><A href="https://go.support.sap.com/contactus/#/email" target="_blank" rel="noopener noreferrer">C</A><A href="https://go.support.sap.com/contactus/#/email" target="_blank" rel="noopener noreferrer">I</A><A href="https://go.support.sap.com/contactus/#/email" target="_blank" rel="noopener noreferrer">C</A><A href="https://go.support.sap.com/contactus/#/email" target="_blank" rel="noopener noreferrer">)</A></P><H3 id="toc-hId-1303148293"><STRONG><span class="lia-unicode-emoji" title=":cloud:">☁️</span>As an SAP Enterprise Support or cloud customer:</STRONG></H3><P>Make use of the&nbsp;security and the enablement offerings provided by the&nbsp;<A href="https://support.sap.com/en/offerings-programs/enterprise-support/enterprise-support-academy.html" target="_blank" rel="noopener noreferrer">SAP Enterprise Support Academy</A>.</P><P>For more information on the topics discussed in this blog visit <A href="https://help.sap.com/docs/" target="_blank" rel="noopener noreferrer">SAP Help Portal | SAP Online Help ,&nbsp;</A><A href="https://help.sap.com/docs/btp/sap-btp-security-recommendations-c8a9bb59fe624f0981efa0eff2497d7d/sap-btp-security-recommendations?seclist-index=BTP-IAS" target="_blank" rel="noopener noreferrer">Identity Authentication ,&nbsp;</A><A href="https://help.sap.com/docs/btp/sap-btp-security-recommendations-c8a9bb59fe624f0981efa0eff2497d7d/sap-btp-security-recommendations?seclist-index=BTP-IPS" target="_blank" rel="noopener noreferrer">Identity Provisioning</A></P><H3 id="toc-hId-1106634788"><STRONG><span class="lia-unicode-emoji" title=":link:">🔗</span>Stay connected</STRONG></H3><P>Want to stay up to date on our services? Join our <A href="https://community.sap.com/t5/sap-cloud-alm-cross-solution-topics-value-map/gh-p/alm-cross-vm" target="_blank">SAP Cloud ALM &amp; Cross-Solution Topics Value Map </A>&nbsp;and&nbsp;<A href="https://pages.community.sap.com/topics/cloud-identity-services" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services</A>&nbsp;communities!&nbsp;</P><P>&nbsp;</P> 2025-12-02T04:38:12.742000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/user-provisioning-with-microsoft-entra-id-ad-in-cloud-identity-service/ba-p/14287556 User Provisioning with Microsoft Entra ID (AD) in Cloud Identity Service 2025-12-10T07:50:10.594000+01:00 RohitGera https://community.sap.com/t5/user/viewprofilepage/user-id/7607 <P>(A Complete Step-by-Step Guide)**</P><P>Hi Folks,</P><P>After extensive analysis and hands-on troubleshooting with user provisioning in SAP Cloud Identity Services, I decided to document the entire process. My goal is to help others quickly and smoothly integrate Microsoft Entra ID (formerly Azure Active Directory) with SAP Cloud Identity Services.</P><P>If you are planning to onboard corporate users into SAP’s Identity Authentication Service (IAS) using Identity Provisioning Service (IPS), this guide will save you hours of effort.</P><P>&nbsp;</P><H2 id="toc-hId-1766586120"><STRONG>Requirement</STRONG></H2><OL><LI><P><STRONG>Sync all corporate users from Microsoft Entra ID into SAP Cloud Identity Services (CIS).</STRONG><BR />These users already exist in Entra ID and need to be replicated to IAS.</P></LI><LI><P><STRONG>Avoid manual user creation in IAS.</STRONG><BR />By configuring IPS, we can schedule daily jobs to automatically sync new or updated users.</P></LI><LI><P><STRONG>Use the synced users in SAP BTP applications</STRONG><BR />(especially those using CIS for authentication) to assign roles, groups, and access for our SAP Build Work Zone.</P></LI></OL><H2 id="toc-hId-1570072615">&nbsp;</H2><H2 id="toc-hId-1373559110"><STRONG>Analysis</STRONG></H2><P>After diving deep into SAP Help documentation and performing several tests, I consolidated the exact approach that fulfills the requirement. The complete activity consists of <STRONG>five main steps</STRONG>.</P><P>&nbsp;</P><H1 id="toc-hId-1047962886"><FONT size="5">Five-Step Integration Process</FONT></H1><H2 id="toc-hId-980532100"><FONT size="4">Step 1: Perform App Registration in Microsoft Entra ID</FONT></H2><P>This activity is typically handled by the Azure team.<BR />Refer to SAP Help documentation for detailed instructions:<BR /><STRONG>Microsoft Entra ID Integration</STRONG><BR /><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/microsoft-entra-id" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/microsoft-entra-id</A></P><P>Once App Registration is complete, the Azure team will share the following information:</P><UL><LI><P>Application ID</P></LI><LI><P>Directory Tenant ID</P></LI><LI><P>Object ID</P></LI><LI><P>Client Secret Value</P></LI><LI><P>Client Secret ID</P></LI><LI><P><STRONG>aad.domain.name</STRONG></P></LI></UL><P>These parameters will be used in the Source System configuration of Identity Provisioning Service (IPS).</P><P>&nbsp;</P><H2 id="toc-hId-784018595"><FONT size="4"><STRONG>Step 2: Configure Microsoft Entra ID as a Source System in IPS</STRONG></FONT></H2><P>Follow the SAP Help documentation:<BR /><STRONG>Microsoft Entra ID – Source System Configuration</STRONG><BR /><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/microsoft-entra-id" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/microsoft-entra-id</A></P><P>Below is the Screen Shot which shows the Source System:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Microsoft Entra ID as Source System in IPS.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/350601iA25C717F79F3D9E8/image-size/large?v=v2&amp;px=999" role="button" title="Microsoft Entra ID as Source System in IPS.jpg" alt="Microsoft Entra ID as Source System in IPS.jpg" /></span></P><P>Below is an example of mandatory source system properties:</P><P>Property Name Value</P><TABLE><TBODY><TR><TD width="211.387px" height="30px">aad.domain.name</TD><TD width="756.463px" height="30px"><CODE>&lt;CompanyName&gt;.onmicrosoft.com</CODE></TD></TR><TR><TD width="211.387px" height="30px">aad.group.attributes</TD><TD width="756.463px" height="30px">id,displayName,mailNickname</TD></TR><TR><TD width="211.387px" height="30px">aad.user.attributes</TD><TD width="756.463px" height="30px">id,mail,userPrincipalName,displayName,mailNickname,givenName,surname,mobilePhone,businessPhones</TD></TR><TR><TD width="211.387px" height="30px">Authentication</TD><TD width="756.463px" height="30px">BasicAuthentication</TD></TR><TR><TD width="211.387px" height="30px">ips.trace.failed.entity.content</TD><TD width="756.463px" height="30px">false</TD></TR><TR><TD width="211.387px" height="30px">oauth.resource.name</TD><TD width="756.463px" height="30px"><A href="https://graph.microsoft.com/" target="_blank" rel="noopener nofollow noreferrer">https://graph.microsoft.com</A></TD></TR><TR><TD width="211.387px" height="30px">OAuth2TokenServiceURL</TD><TD width="756.463px" height="30px"><A target="_self">https://login.microsoftonline.com/&lt;Company Name&gt;.onmicrosoft.com/oauth2/token</A></TD></TR><TR><TD width="211.387px" height="30px">Password</TD><TD width="756.463px" height="30px">Client Secret Value</TD></TR><TR><TD width="211.387px" height="30px">ProxyType</TD><TD width="756.463px" height="30px">Internet</TD></TR><TR><TD width="211.387px" height="30px">Type</TD><TD width="756.463px" height="30px">HTTP</TD></TR><TR><TD width="211.387px" height="30px">URL</TD><TD width="756.463px" height="30px"><A href="https://graph.microsoft.com/" target="_blank" rel="noopener nofollow noreferrer">https://graph.microsoft.com</A></TD></TR><TR><TD width="211.387px" height="30px">User</TD><TD width="756.463px" height="30px">Application ID</TD></TR></TBODY></TABLE><P>Below the screenshot for same:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Source System Proprty details.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/350605iADF4A85EAEFE3601/image-size/large?v=v2&amp;px=999" role="button" title="Source System Proprty details.jpg" alt="Source System Proprty details.jpg" /></span></P><P>&nbsp;</P><H2 id="toc-hId-587505090"><FONT size="4"><STRONG>Step 3: Configure Identity Authentication (IAS) as the Target System</STRONG></FONT></H2><P>SAP Help documentation for IAS as a target:<BR /><STRONG>Identity Authentication – Target System Configuration</STRONG><BR /><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/target-identity-authentication" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/target-identity-authentication</A></P><P>Important:<BR /><STRONG>Select the correct Source System</STRONG> for this Target System.<BR />Otherwise, IAS will attempt to read data from all existing source systems in IPS.</P><P>Below is the Screen shot of Target System for referece:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Identity Authentication as Target System in IPS.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/350610i06D4BFBF1FACE35A/image-size/large?v=v2&amp;px=999" role="button" title="Identity Authentication as Target System in IPS.jpg" alt="Identity Authentication as Target System in IPS.jpg" /></span></P><P>Mandatory IAS target system properties:</P><P>Property Name Value</P><TABLE><TBODY><TR><TD>Authentication</TD><TD>ClientCertificateAuthentication</TD></TR><TR><TD>ias.api.version</TD><TD>2</TD></TR><TR><TD>ias.user.unique.attribute</TD><TD>userName</TD></TR><TR><TD>ips.failed.request.retry.attempts</TD><TD>2</TD></TR><TR><TD>ips.failed.request.retry.attempts.interval</TD><TD>60</TD></TR><TR><TD>ips.trace.failed.entity.content</TD><TD>false</TD></TR><TR><TD>ProxyType</TD><TD>Internet</TD></TR><TR><TD>Type</TD><TD>HTTP</TD></TR><TR><TD>URL</TD><TD>https://<CODE>&lt;CIS Domain Name&gt;</CODE>.accounts.ondemand.com/</TD></TR></TBODY></TABLE><HR /><H2 id="toc-hId-390991585"><FONT size="4"><STRONG>Step 4: Run the “Simulate Job”</STRONG></FONT></H2><P>Before performing the actual sync, run the <STRONG>Simulate Job</STRONG> from the Source System.</P><P>Below is the screen shot to run the Simulate Job:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Run the Simulate Job.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/350603i4139E831C56C0AA0/image-size/large?v=v2&amp;px=999" role="button" title="Run the Simulate Job.jpg" alt="Run the Simulate Job.jpg" /></span></P><P>This job allows you to check:</P><UL><LI><P>How many users will be read</P></LI><LI><P>What changes will be made</P></LI><LI><P>Any potential errors or mismatches</P></LI></UL><P>You can view results under <STRONG>Provisioning Logs</STRONG> in IPS.</P><P>&nbsp;</P><H2 id="toc-hId-194478080"><FONT size="4"><STRONG>Step 5: Run the “Read Job” (Actual User Sync)</STRONG></FONT></H2><P>This is the real provisioning job.</P><UL><LI><P>IPS reads users from Microsoft Entra ID</P></LI><LI><P>Then writes them into Identity Authentication Service (IAS)</P></LI></UL><P>Check <STRONG>Provisioning Logs</STRONG> for status, errors, or successful user creation.&nbsp;</P><P>Below is the screen shot for reference:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Provisioning Log result.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/350604i19D974CDE3064D75/image-size/large?v=v2&amp;px=999" role="button" title="Provisioning Log result.jpg" alt="Provisioning Log result.jpg" /></span></P><P>&nbsp;</P><H2 id="toc-hId--2035425"><FONT size="4"><STRONG>Optional: Schedule Recurring Provisioning Jobs</STRONG></FONT></H2><P>You can set up a scheduled job (daily, weekly, etc.) to automatically sync delta changes from Microsoft Entra ID into IAS.</P><P>This ensures user data stays consistently updated without manual intervention.</P><P>&nbsp;</P><H1 id="toc-hId-442108434"><FONT size="4"><STRONG>Summary</STRONG></FONT></H1><P>This guide provides all essential steps required to integrate Microsoft Entra ID with SAP Cloud Identity Services using Identity Provisioning Service (IPS). I hope it helps you streamline user onboarding and avoid manual user creation in IAS.</P><P>If you have any questions or face any issues, feel free to ask.</P><P>Regards,<BR />Rohit Gera</P> 2025-12-10T07:50:10.594000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-architecture-and-key/ba-p/14293827 SAP User Access Management in a Hybrid Landscape – Architecture and Key Concepts (Part 1) 2025-12-22T18:05:01.288000+01:00 SubbuIyer https://community.sap.com/t5/user/viewprofilepage/user-id/179044 <P>This blog is Part 1 of a 3-part series on SAP User Access Management in a Hybrid Landscape.</P><P>• Part 1 – Architecture and Key Concepts (this post)<BR />• <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-business-roles-and/ba-p/14293839" target="_self">Part 2 – Business Roles and Provisioning Models</A><BR />• <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-challenges-and-mitigation/ba-p/14293851" target="_self">Part 3 – SAP IAG Two-Tenant Model: Challenges and Mitigation Strategies</A></P><H2 id="toc-hId-1767393268">Purpose</H2><P>As organizations continue to adopt SAP cloud solutions, hybrid SAP landscapes—combining SAP S/4HANA in on-premise or private cloud environments with SAP SaaS applications and SAP BTP—have become increasingly common. While this model enables flexibility and innovation, it also introduces new challenges in managing user access consistently across systems.</P><P>This blog focuses on the architecture and key concepts behind managing user access in a hybrid SAP landscape using SAP GRC Access Control and SAP Identity and Access Governance (IAG) via the IAG Access Control Bridge. It outlines how these components work together with SAP Cloud Identity Services to provide centralized governance, controlled provisioning, and audit-ready access management across both on-premise and cloud applications.</P><P>Rather than providing step-by-step configuration instructions, this blog shares practical architectural guidance and implementation insights based on real-world project experience, complementing SAP’s official documentation and helping practitioners understand how to design an effective hybrid access management framework.</P><H2 id="toc-hId-1570879763">Scope and Landscape Overview</H2><P><SPAN>The scope of this blog is to outline an integrated user access management approach for a hybrid SAP landscape, covering both on-premise/private cloud ERP systems and SAP public cloud and SaaS applications.</SPAN></P><H3 id="toc-hId-1503448977">In-Scope Systems</H3><UL><LI>SAP S/4HANA (On-Premise or RISE Private Cloud)</LI><LI>SAP GRC Access Control 12</LI><LI>SAP Cloud Identity Access Governance – Integration Edition (IAG AC Bridge)</LI><LI>SAP Cloud Identity Services (IAS &amp; IPS)</LI><LI>SAP Cloud Connector</LI><LI>SAP SaaS Applications</LI><LI>SAP BTP Applications</LI></UL><H2 id="toc-hId-1177852753">Target Architecture</H2><H3 id="toc-hId-1110421967">High-Level Architecture Overview</H3><P>The target architecture defines the end-to-end user access governance and provisioning model for a hybrid SAP landscape. This model integrates on-premise and private cloud SAP systems with SAP Public Cloud and SaaS applications, ensuring cohesive and centralized oversight. The solution leverages several key SAP technologies—SAP GRC Access Control, SAP Identity and Access Governance (IAG – Integration Edition), SAP Cloud Identity Services, and SAP Cloud Connector—to deliver consistent approval workflows, centralized governance, and automated provisioning across the entire SAP environment.</P><P><SPAN>The following diagram illustrates the reference architecture for SAP user access management in a hybrid landscape, highlighting the interaction between SAP GRC Access Control, SAP IAG AC Bridge, SAP Cloud Identity Services, and SAP SaaS applications.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_0-1766084227863.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353905i06048C09E85CC35B/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_0-1766084227863.png" alt="SubbuIyer_0-1766084227863.png" /></span></P><H3 id="toc-hId-913908462">SAP GRC Access Control: Central Governance for Hybrid SAP Landscapes</H3><H4 id="toc-hId-846477676">Overview</H4><P>SAP GRC Access Control operates as the primary governance and control layer for user access management across the hybrid SAP landscape. It provides a unified framework supporting both on-premise/private cloud and public cloud SAP applications, enabling organizations to maintain comprehensive oversight and streamlined processes for provisioning and managing user access.</P><H4 id="toc-hId-649964171">Key Functional Capabilities</H4><UL><LI>Access Request Management (ARM): Provides a centralized platform for intake and processing of access requests. Structured approval workflows ensure that every request is systematically reviewed and authorized according to organizational policies.</LI><LI>Access Risk Analysis: Performs real-time Segregation of Duties (SoD) analysis for on-premise systems and supported cloud environments, enabling proactive identification and mitigation of user access risks.</LI><LI>Business Role Management: Facilitates the design, maintenance, and lifecycle management of business roles, supporting the evolving access requirements of the organization.</LI></UL><H3 id="toc-hId-324367947">Integration with On-Premise and Private Cloud SAP Systems</H3><P>SAP GRC Access Control is directly integrated with core on-premise and private cloud SAP systems, such as SAP S/4HANA, SAP MDG, and SAP BW/4HANA. This integration is achieved through RFC-based communication, enabling essential functions including user provisioning and management, risk analysis and reporting, and business role management. All provisioning and governance activities for these systems are managed from SAP GRC Access Control, ensuring thorough audit traceability and alignment with internal control requirements.</P><H3 id="toc-hId-127854442">Cloud Integration via SAP Cloud Connector and SAP IAG</H3><P>The SAP Cloud Connector establishes a secure communication channel between the SAP cloud environment and the on-premise SAP landscape. Within the architecture, the SAP IAG subaccount on the Cloud Connector serves as an integration bridge, connecting SAP GRC Access Control with SAP Cloud Identity and Access Governance (IAG). This configuration enables cloud-to-on-premise RFC communication with GRC Access Control, supports SoD authorization checks, and allows approved access requests in GRC to be extended to SAP SaaS applications. This approach ensures organizations can apply their established GRC processes consistently across both on-premise and cloud environments.</P><H3 id="toc-hId--143890432">SAP Cloud Identity and Access Governance (IAG) Integration for SAP SaaS Applications</H3><P>Integration with SAP SaaS applications is facilitated through SAP Cloud Identity and Access Governance (IAG), which operates on the SAP Business Technology Platform (BTP). For clarity and security, IAG is deployed in a dedicated BTP subaccount, using the integration edition known as the IAG AC Bridge. Within this subaccount, a destination is configured to connect SAP GRC Access Control to the SAP Cloud environment via the Cloud Connector, ensuring secure and efficient access management. The IAG application is accessed through a dedicated URL, allowing administrators to manage configurations as required.</P><P>During the initial setup of IAG, administrators create an application entry for each SAP SaaS application that will be managed. This ensures that every application is properly integrated and governed within the overall access management framework. IAG utilizes SAP Cloud Identity Services for user provisioning, leveraging the Identity Provisioning Service to automate and monitor user access. For SaaS applications supporting direct provisioning through SCIM, a proxy system is configured for each application in Identity Provisioning, enabling secure and seamless user provisioning across the SAP SaaS ecosystem.</P><H2 id="toc-hId--47000930"><STRONG>Summary and Next Steps</STRONG></H2><P>This first part of the series establishes the architectural foundation for SAP user access management in a hybrid landscape. By combining SAP GRC Access Control with SAP IAG AC Bridge and SAP Cloud Identity Services, organizations can extend centralized governance into SAP cloud applications while maintaining strong security and compliance controls.</P><P>In Part 2, we will focus on GRC Business Roles and provisioning models, including direct and federated access patterns across SAP S/4HANA and SAP SaaS applications.</P> 2025-12-22T18:05:01.288000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-business-roles-and/ba-p/14293839 SAP User Access Management in a Hybrid Landscape – Business Roles and Provisioning Models (Part 2) 2025-12-22T18:06:45.115000+01:00 SubbuIyer https://community.sap.com/t5/user/viewprofilepage/user-id/179044 <H2 id="toc-hId-1767393301">Introduction</H2><P>In <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-architecture-and-key/ba-p/14293827" target="_self">Part 1</A> of this series, we explored the reference architecture for managing user access in a hybrid SAP landscape using SAP GRC Access Control, SAP Identity and Access Governance (IAG) via the IAG AC Bridge, and SAP Cloud Identity Services.</P><P>With the architectural foundation in place, this second part shifts focus to how access is actually designed and provisioned across on-premise and SAP cloud applications. In particular, it highlights the role of GRC Business Roles and explains the different provisioning models used for SAP S/4HANA and SAP SaaS applications.</P><P>Understanding these concepts is essential for building scalable, auditable, and maintainable access management processes in hybrid SAP environments.</P><H2 id="toc-hId-1570879796">Access Control: Business Role Management</H2><H3 id="toc-hId-1503449010">Overview of GRC Business Roles</H3><P>In SAP GRC, a Business Role comprises a set of access rights, permissions, and authorizations that can be assigned to multiple users who perform similar functions. Unlike traditional technical roles, Business Roles are designed to be system-independent, allowing organizations to streamline access management across various SAP applications. In a typical SAP Greenfield implementation, these Business Roles are crafted to reflect users' job functions or positions, ensuring both consistency and security for access to on-premise and cloud-based SAP solutions such as SAP S/4HANA, SAP Ariba, and SAP Sales Cloud.</P><H3 id="toc-hId-1306935505">Significance of GRC Business Roles in a Hybrid Landscape</H3><P>The adoption of GRC Business Roles is especially crucial in a hybrid SAP landscape that encompasses both on-premise and cloud applications. By centralizing access provisioning and abstracting user permissions from the underlying technical roles, GRC Business Roles provide a unified structure for user access management. This approach ensures that users have consistent and appropriate access regardless of whether their work takes place in S/4HANA, Ariba, Sales Cloud, or a combination of these platforms. As organizations transition toward hybrid and cloud-centric architectures, GRC Business Roles facilitate secure, scalable, and efficient user access management—reducing complexity for administrators and minimizing risk by aligning permissions with business needs. This unified approach directly supports the document’s objectives of robust SAP User Access Management and governance across disparate systems.</P><H3 id="toc-hId-1110422000">Structure of GRC Business Roles</H3><P>A GRC Business Role aggregates one or more technical roles from different systems into a single logical unit, simplifying the assignment process and ensuring users have access to the necessary tools and applications for their roles. Each Business Role consists of Technical Roles specific to individual applications or systems. These Technical Roles grant permissions for distinct modules or applications (e.g., "Accounts Payable Manager" in S/4HANA or "Requestor" in Ariba). GRC Business Roles are mapped to Technical Roles spanning multiple systems, such as:</P><UL><LI>SAP S/4HANA: Business process roles (e.g., Accounts Payable Manager, Maintenance Technician).</LI><LI>SAP Ariba: Groups or functional roles (e.g., Procurement Manager, Requestor).</LI><LI>SAP Sales Cloud: Sales-related roles (e.g., Sales Manager, Operations</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_0-1766085561593.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353906i8B3E60A5C153857F/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_0-1766085561593.png" alt="SubbuIyer_0-1766085561593.png" /></span></P><H3 id="toc-hId-913908495">Key Benefits of GRC Business Roles in Project Implementation</H3><UL><LI>Unified access provisioning across SAP S/4HANA and SAP SaaS applications, reducing complexity.</LI><LI>Consistent access mapping aligned with Segregation of Duties (SoD) requirements and regulatory compliance.</LI><LI>Centralized role definition and assignment in GRC simplifies access management for administrators.</LI><LI>Automatic updates to technical roles when business roles change, ensuring accuracy.</LI><LI>Comprehensive access provisioning for users' job functions across multiple systems via a single Business Role.</LI></UL><H3 id="toc-hId-717394990"><SPAN>Business Role Design Approach</SPAN></H3><P>The design of GRC Business Roles follows a structured process to ensure alignment with organizational job roles and access requirements:</P><H4 id="toc-hId-649964204">Technical Role Design</H4><UL><LI>The Security Team develops Technical Roles for each application, guided by detailed access requirements from:<UL><LI>Process Design Documents: Identify transactions, applications, and authorizations required for each business process.</LI><LI>User Stories: Outline access needs based on end-user roles and responsibilities.</LI><LI>Workshops and Discussions: Collaborate with process teams to specify operational transactions and applications for each role.</LI></UL></LI></UL><H4 id="toc-hId-453450699">Alignment with Organizational Job Roles</H4><UL><LI>GRC Business Roles are structured according to users’ jobs and responsibilities as defined by the Organizational Change Management (OCM) Team.</LI><LI>User job roles are defined based on L3 Processes, representing detailed activities within each business process.</LI><LI>L3 Processes linked to each job role are reviewed to determine the necessary technical roles and access rights.&nbsp;</LI><LI>The Security Team creates GRC Business Roles based on these definitions, consolidating required technical roles across applications to ensure consistent and accurate access provisioning.</LI></UL><H2 id="toc-hId--1228244">Detailed Provisioning Flows by Application Type</H2><P>This section will provide an overview of the provisioning workflows for various applications within a hybrid environment.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_1-1766085865271.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353907i8D76E491EB6F27D2/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_1-1766085865271.png" alt="SubbuIyer_1-1766085865271.png" /></span></P><H3 id="toc-hId--143890399">SAP S/4HANA (On-Premise / Private Cloud)</H3><P>Provisioning for SAP S/4HANA, whether deployed on-premise or in a private cloud environment, is facilitated through SAP GRC Access Control. The process is initiated when a user submits an access request using the GRC Access Request Management (ARM) module. Once the access request is submitted, it progresses through an approval workflow. This workflow typically involves the user's manager, the role owner, or the security team, depending on the organization's structure and policies.</P><P>During the approval process, a Segregation of Duties (SoD) risk analysis is conducted within GRC. This analysis ensures compliance with internal control requirements and helps minimize potential risks associated with conflicting access privileges. Upon successful approval, SAP GRC automatically assigns the designated roles directly to the S/4HANA system. The user's master record is subsequently updated through standard SAP connectors, enabling seamless integration and ensuring the accuracy of user data.</P><P>All audit logs generated during these provisioning activities are maintained within GRC. This comprehensive logging supports compliance requirements and enhances traceability. Notable characteristics of this provisioning flow include real-time SoD checks and immediate role assignment.</P><H2 id="toc-hId--47000897">Direct Provisioning to SAP SaaS Applications (Ariba, SuccessFactors, SAC) via SCIM API</H2><P>Provisioning for SAP SaaS applications that support the SCIM API, including Ariba, SuccessFactors, and SAP Analytics Cloud (SAC), is managed through SAP IAG leveraging the Identity Provisioning Service (IPS). The access request process is initiated using GRC Access Request, and the subsequent approval workflow follows a structure similar to the S/4HANA scenario. Once the access request is approved, GRC communicates the request to IAG using the Access Control Bridge (AC Bridge).</P><P>A scheduled provisioning job then runs at regular intervals to grant the requested access directly within the relevant SaaS applications. This automated process helps streamline user access management for cloud-based SAP solutions and ensures timely provisioning of roles.</P><H2 id="toc-hId--243514402">Indirect Provisioning to SAP SaaS Applications (FSM, BTP)</H2><P>For applications such as SAP Business Technology Platform (BTP) or Field Service Management (FSM), provisioning is managed by SAP IAG through the assignment of IAS Groups associated with these applications. Users submit access requests for specific IAS Groups, and these requests are routed through the required approval workflow. Upon approval, SAP IAG provisions the relevant IAS groups to the users.</P><P>For BTP, the IAS groups that are set up are linked to BTP role collections. When users next log in, they receive access to these specific collections. For applications such as FSM, which can interpret the assigned FSM IAS groups and map them to user policy groups within a company’s FSM environment, a scheduled read job on IPS will assign the appropriate user policy group and company automatically.</P><P><STRONG>Please note</STRONG>: While Field Service Management (FSM) may not be explicitly included under an integration scenario for IAG, it is identified as both a source and target system within <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/supported-systems?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Identity Provisioning</A>. Consequently, it is appropriate to utilize a combination of provisioning processes in order to provision end user access to FSM in such circumstances.</P><H2 id="toc-hId--440027907">Summary and What’s Next</H2><P>In this part of the series, we explored how GRC Business Roles and provisioning models enable scalable and controlled user access across hybrid SAP landscapes. By abstracting technical roles into business-aligned constructs and leveraging both direct and federated provisioning models, organizations can maintain strong governance while supporting diverse SAP applications.</P><P>In Part 3, we will focus on the SAP IAG two-tenant model, examining why it presents challenges in real-world implementations and how project teams can mitigate associated risks.</P> 2025-12-22T18:06:45.115000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-user-access-management-in-a-hybrid-landscape-challenges-and-mitigation/ba-p/14293851 SAP User Access Management in a Hybrid Landscape – Challenges and Mitigation Strategies (Part 3) 2025-12-22T18:08:07.815000+01:00 SubbuIyer https://community.sap.com/t5/user/viewprofilepage/user-id/179044 <H2 id="toc-hId-1767393355">Introduction</H2><P>In the first two parts of this series, we covered the architecture and execution model for managing user access in hybrid SAP landscapes using SAP GRC Access Control and SAP Identity and Access Governance (IAG) via the IAG Access Control Bridge.</P><P>In this final part, we focus on a topic that frequently surfaces during implementations but is often underestimated during planning—the SAP IAG tenant model. Specifically, we examine why the standard two-tenant model introduces challenges when integrated with a typical three-tier SAP GRC Access Control landscape, and how project teams can mitigate these challenges in practice.</P><H2 id="toc-hId-1570879850">Challenges and Considerations with the SAP IAG Two-Tenant Model</H2><H3 id="toc-hId-1503449064">Overview of SAP IAG Tenant Mapping</H3><P>SAP Identity and Access Governance (IAG) enforces a strict tenant-to-system mapping model when integrated with SAP GRC Access Control through the IAG AC Bridge. According to SAP Note 3389374, only one SAP Access Control system can be mapped to one IAG tenant. SAP advises against connecting multiple Access Control systems to the same IAG tenant to avoid potential data inconsistencies. The guidance further highlights that after an Access Control system has been connected and data synchronized with an IAG tenant, no other Access Control system should be connected to that tenant, even if the previous system has been disconnected. SAP explicitly states that they may not take responsibility for any resulting data inconsistencies. Therefore, the number of IAG tenants should align with the number of Access Control systems.</P><H3 id="toc-hId-1306935559">Typical Landscape Mismatch</H3><P>In practice, most SAP customers operate a three-tier SAP GRC Access Control landscape, consisting of Development (DEV), Quality/Test (QAS), and Production (PRD) systems. However, SAP typically provisions only two IAG tenants per customer: one for Test and one for Production. This two-tenant limit also applies to several SAP SaaS solutions, such as Ariba, Fieldglass, and FSM, as well as SAP Cloud Identity Services. This creates a structural mismatch between the number of SAP Access Control systems and the available IAG tenants.</P><H3 id="toc-hId-1110422054"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SubbuIyer_0-1766087841600.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353909i8CA1F81CF79B0459/image-size/large?v=v2&amp;px=999" role="button" title="SubbuIyer_0-1766087841600.png" alt="SubbuIyer_0-1766087841600.png" /></span></H3><P><EM>Figure: Typical mismatch between SAP GRC Access Control landscapes and IAG tenant availability</EM></P><H3 id="toc-hId-913908549">Challenges During Project Implementation</H3><P><EM>Note:&nbsp;While this discussion refers to the SAP GRC Access Control system, it is important to note that in most Greenfield implementations today, GRC Access Control is deployed as an embedded component within the SAP S/4HANA system. The overall three-to-six-month implementation timeline in the development system typically reflects the broader S/4HANA program, encompassing multiple business processes, and not GRC in isolation.</EM></P><P>During project implementations, especially in Greenfield scenarios, the SAP GRC Access Control Development system is usually implemented first and is available early in the project lifecycle. At this stage, configuration and development activities take place in the DEV system, and the Realize and Build phases can extend over three to six months. Early integration of the IAG AC Bridge is often required to support access request testing, role design validation, and initial cloud provisioning scenarios. However, the Quality (QAS) Access Control system—which ideally should connect to the IAG test tenant—may not be available until just before formal testing begins.</P><P>This situation presents a dilemma. While SAP recommends a one-to-one mapping between Access Control systems and IAG tenants, most customers do not have more than the standard two IAG tenants. Procuring an additional IAG tenant is often cost-prohibitive, not planned in the initial contract, and operationally challenging.</P><H3 id="toc-hId-717395044">Practical Implications for IAG AC Bridge Setup</H3><P>With only two IAG tenants, setting up the IAG AC Bridge can be particularly complex when the GRC QAS system is not yet available, but integration testing needs to start during the development phase. Early validation of cloud provisioning scenarios is also impacted. As a result, project teams are often forced to make architectural and sequencing decisions that are not directly addressed in SAP's official documentation.</P><H3 id="toc-hId-520881539">Recommended Mitigation Approach</H3><UL><LI>Early Availability of GRC QAS: If possible, teams should bring up the GRC Quality system earlier than originally planned, aligning its availability with the IAG Test tenant timeline. This enables completion of IAG AC Bridge integration in a supported manner, provides sufficient time for end-to-end testing without rework, and reduces last-minute risks during formal testing.</LI><LI>Adequate Time for Production Deployment: When deploying the integration in Production, ample lead time should be allowed. It should not be assumed that configurations can be transported end-to-end. Approximately 60% of the IAG AC Bridge integration steps performed in Test must be repeated manually in Production, as these steps are tenant-specific, involve cloud-side configurations, and cannot be transported using SAP CTS.</LI></UL><H3 id="toc-hId-324368034">Disconnecting and Reconnecting Access Control Systems</H3><P>Although SAP does not recommend disconnecting an Access Control system from an IAG tenant to connect a new one, i<SPAN>n some controlled project scenarios, teams have executed this approach without observing significant functional or data consistency issues, provided strict procedural discipline was followed.</SPAN>&nbsp;However, this approach should be clearly documented, approved by the customer, and understood as a pragmatic workaround rather than an SAP-endorsed best practice.</P><H2 id="toc-hId--1228190"><SPAN>Additional Functional Considerations in IAG AC Bridge Scenarios</SPAN></H2><H3 id="toc-hId--143890345">User Access Review</H3><P>User Access Reviews can continue to be performed within Access Control, following the established process. Upon completion of the review, a provisioning or deprovisioning request is automatically generated in IAG for the corresponding SaaS application related to the review request. For S/4HANA roles, these are removed automatically once the review request is submitted.</P><H3 id="toc-hId--340403850">SOD Review Process</H3><P>The SOD (Segregation of Duties) Review Process is not supported within the GRC IAG AC Bridge environment.</P><H3 id="toc-hId--536917355">Workflow Limitations in GRC</H3><P>Function, Risk, and Mitigating Control workflows are no longer available in GRC, as ruleset maintenance must now be conducted within IAG.</P><H3 id="toc-hId--733430860">Mitigating Controls Monitoring</H3><P>Mitigating controls monitoring can be performed within IAG. Additionally, test results for these controls can be uploaded directly to IAG.</P><H3 id="toc-hId--929944365">User and Role Simulation</H3><P>User and role level simulations for S/4HANA risks are not supported in IAG but may still be carried out in GRC AC.&nbsp;<SPAN>If simulations are performed, customers should validate this approach with SAP and ensure alignment with supported usage scenarios.</SPAN></P><H3 id="toc-hId--1126457870">Conclusion</H3><P>Across this three-part series, we explored how SAP user access management can be effectively designed and implemented in modern hybrid SAP landscapes.</P><UL><LI><P>Part 1 established the architectural foundation, explaining how SAP GRC Access Control, SAP Identity and Access Governance (IAG), and SAP Cloud Identity Services work together to extend centralized governance into SAP cloud applications.</P></LI><LI><P>Part 2 focused on execution, highlighting the importance of GRC Business Roles and outlining direct and federated provisioning models across SAP S/4HANA and SAP SaaS applications.</P></LI><LI><P>Part 3 examined the practical challenges introduced by the SAP IAG tenant model and shared mitigation strategies based on real-world implementation experience.</P></LI></UL><P>Together, these perspectives demonstrate that while SAP provides a robust framework for hybrid access management, successful implementations require early planning, architectural clarity, and pragmatic decision-making—particularly when navigating tenant constraints and project timelines.</P><P>By combining strong role design, well-defined provisioning models, and a clear understanding of platform limitations, organizations can achieve secure, scalable, and auditable user access management across both on-premise and cloud SAP environments.</P> 2025-12-22T18:08:07.815000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/sap-cloud-logging-service-%E3%83%80%E3%83%83%E3%82%B7%E3%83%A5%E3%83%9C%E3%83%BC%E3%83%89%E3%82%92-ias-%E3%81%AE-saml-%E8%AA%8D%E8%A8%BC%E3%81%A7%E5%88%A9%E7%94%A8%E3%81%99%E3%82%8B%E6%96%B9%E6%B3%95/ba-p/14299441 SAP Cloud Logging Service ダッシュボードを IAS の SAML 認証で利用する方法 2025-12-30T10:25:31.386000+01:00 Umezuki https://community.sap.com/t5/user/viewprofilepage/user-id/841332 <P><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/how-to-access-sap-cloud-logging-service-dashboards-using-ias-saml/ba-p/14299525" target="_self">English version</A></P><H2 id="toc-hId-1767568226">はじめに</H2><P>SAP Cloud Logging Service(以下、CLS)は、アプリケーションログやメトリクスを一元的に管理できる、OpenSearch ベースのオブザーバビリティサービスです。</P><P>CLS が提供する Dashboards では上記のようなアプリケーションデータを閲覧できるため、アクセス制御や認証方式には適切なセキュリティ対策が求められます。</P><P>CLS ダッシュボードは Service Key を用いたアクセスも可能ですが、本番環境ではユーザー管理やセキュリティの観点から、IAS を利用した SAML 認証が推奨されています。</P><P>そこで、本記事では、CLS ダッシュボードで SAML 認証を利用するために必要な設定手順を解説します。</P><H2 id="toc-hId-1571054721">前提条件</H2><P>以下の条件を満たしていることを前提とします。</P><UL><LI>IAS テナントが有効化されていること</LI><LI>SAP BTP サブアカウントで CLS が利用可能であること</LI><LI>IAS とBTPサブアカウントの管理者権限を持っていること</LI></UL><H2 id="toc-hId-1374541216">手順1 : IAS で SAML 2.0 アプリケーションを作成</H2><P>IAS 管理画面で ‘Applications &amp; Resources’ &gt; ’Applications’ を開き、アプリケーションを作成します。</P><UL><LI>Display Name : &lt;任意&gt;</LI><LI>Protocol Type : SAML 2.0</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_0-1767076542378.png" style="width: 920px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357151iC6512A28A20EA65A/image-dimensions/920x601?v=v2" width="920" height="601" role="button" title="Umezuki_0-1767076542378.png" alt="Umezuki_0-1767076542378.png" /></span></P><H2 id="toc-hId-1178027711">手順2 : CLSインスタンスの作成と SAML 設定</H2><P>既存の CLS インスタンスがある場合は、インスタンス作成時と同様にパラメータを更新することで対応可能です。</P><P>本記事では、新規インスタンス作成時の設定手順を説明します。</P><H3 id="toc-hId-1110596925">2-1. CLS インスタンスの作成</H3><P>BTPサブアカウント上でCLSインスタンスを作成します。</P><UL><LI>Service:Cloud Logging</LI><LI>Plan、Runtime Environment:&lt;用途に応じて選択&gt;</LI><LI>Instance Name:&lt;任意&gt;</LI></UL><P>入力後、「Next」をクリックし、パラメータ設定画面へ進みます。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_1-1767076542380.png" style="width: 644px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357149i8C12411CB87C95FC/image-dimensions/644x599?v=v2" width="644" height="599" role="button" title="Umezuki_1-1767076542380.png" alt="Umezuki_1-1767076542380.png" /></span></P><H3 id="toc-hId-914083420">2-2. SAML パラメータの設定</H3><P>デフォルトのパラメータが表示されるため、saml セクションを編集します。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_2-1767076542383.png" style="width: 645px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357150i39A40FF708269C62/image-dimensions/645x600?v=v2" width="645" height="600" role="button" title="Umezuki_2-1767076542383.png" alt="Umezuki_2-1767076542383.png" /></span></P><P class="lia-align-center" style="text-align: center;"><EM>デフォルトのパラメータ設定</EM></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_3-1767076263976.png" style="width: 1596px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357136i0ED05C88C389F217/image-dimensions/1596x702?v=v2" width="1596" height="702" role="button" title="Umezuki_3-1767076263976.png" alt="Umezuki_3-1767076263976.png" /></span></P><P class="lia-align-center" style="text-align: center;"><EM>編集後のパラメータ設定</EM></P><pre class="lia-code-sample language-json"><code>{ "saml": { "enabled": true, "admin_group": "&lt;IAS_ADMIN_GROUP_NAME&gt;", "initiated": true, "roles_key": "groups", "idp": { "metadata_url": "&lt;IAS_TENANT_URL&gt;/saml2/metadata", "entity_id": "&lt;IAS_IDP_ENTITY_ID&gt;" }, "sp": { "entity_id": "&lt;CLS_SP_ENTITY_ID&gt;" } } }</code></pre><P class="lia-align-center" style="text-align: center;"><EM>samlセクションのテンプレート</EM></P><H3 id="toc-hId-717569915">各パラメータの説明</H3><P><STRONG>admin_group</STRONG></P><P>指定した IAS グループに属するユーザーに管理者権限(all_access)が付与されます。本記事では 'cls-admin' と設定します。</P><P><STRONG>idp.metadata_url</STRONG></P><P>CLSが IAS から SAML メタデータを取得するための URL です。IAS テナントのエンドポイントに /saml2/metadata を付与して指定します。例えば、IAS テナントが <A target="_blank" rel="noopener">'https://&lt;YOUR-TENANT-NAME&gt;.accounts400.ondemand.com</A>'の場合、'<A target="_blank" rel="noopener">https://&lt;YOUR-TENANT-NAME&gt;.accounts400.ondemand.com/saml2/metadata'</A>を設定します。</P><P><STRONG>idp.entity_id</STRONG></P><P>上記 metadata_url をブラウザで開き、XML の先頭に記載されている entityID の値を設定します。</P><P><STRONG>sp.entity_id</STRONG></P><P>Service Provider としての CLS を識別する ID で、今回は 'CLS-Demo' を使用します。IAS 側の SAML 設定において、同じ値を登録する必要があります。</P><H2 id="toc-hId-391973691">手順3 : IAS 側の SAML 設定</H2><P>IAS のアプリケーション設定画面で Configure Manually を選択し、SAML 設定を行います。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_4-1767076263980.png" style="width: 1184px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357138iC16415FC31F69697/image-dimensions/1184x602?v=v2" width="1184" height="602" role="button" title="Umezuki_4-1767076263980.png" alt="Umezuki_4-1767076263980.png" /></span></P><P>&nbsp;</P><UL><LI>Entity ID:&lt;CLSインスタンスの sp.entity_id と同じ値&gt;</LI></UL><P>SAML 連携において Service Provider(CLS)を一意に識別するためのID です。CLS 側の SAML 設定で指定した SP Entity ID と同じ値 を設定しなければいけませんので、今回は 'CLS-Demo' となります。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_5-1767076263983.png" style="width: 1042px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357137i8A891467C0DD819E/image-dimensions/1042x596?v=v2" width="1042" height="596" role="button" title="Umezuki_5-1767076263983.png" alt="Umezuki_5-1767076263983.png" /></span></P><P>エンドポイント設定</P><UL><LI>SSO Endpoint : &lt;Dashboards URL&gt;/_opendistro/_security/saml/acs</LI><LI>Single Logout Endpoint : &lt;Dashboards URL&gt;</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_6-1767076263985.png" style="width: 1021px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357140i004B154C2A547446/image-dimensions/1021x599?v=v2" width="1021" height="599" role="button" title="Umezuki_6-1767076263985.png" alt="Umezuki_6-1767076263985.png" /></span></P><P>&nbsp;</P><H2 id="toc-hId-195460186">動作確認 (認証)</H2><P>CLS の Dashboards URL にアクセスし、認証が通ることを確認します。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_7-1767076263988.png" style="width: 1069px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357141iD2FBDE6C8E878651/image-dimensions/1069x615?v=v2" width="1069" height="615" role="button" title="Umezuki_7-1767076263988.png" alt="Umezuki_7-1767076263988.png" /></span></P><P>この時点では、ダッシュボードやインデックス一覧を開くとブランクなページが表示されたり、権限不足のエラーが表示されたりします。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_8-1767076263988.png" style="width: 1061px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357139i5BF3E68B512AD830/image-dimensions/1061x479?v=v2" width="1061" height="479" role="button" title="Umezuki_8-1767076263988.png" alt="Umezuki_8-1767076263988.png" /></span></P><P>Developer Tools でも HTTP 403 (Forbidden) が返却されていることが確認できます。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_9-1767076263991.png" style="width: 1024px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357143i0B9BEE2A80E1F380/image-dimensions/1024x368?v=v2" width="1024" height="368" role="button" title="Umezuki_9-1767076263991.png" alt="Umezuki_9-1767076263991.png" /></span></P><P>また、ユーザーアイコンから”View roles and identities”をクリックして付与されているロールを確認すると、付与されているロールは own_index のみであることが確認できます。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_10-1767076263992.png" style="width: 789px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357142iBE96C3AD884C2561/image-dimensions/789x504?v=v2" width="789" height="504" role="button" title="Umezuki_10-1767076263992.png" alt="Umezuki_10-1767076263992.png" /></span></P><P>これは SAML 認証は成功しているものの、ロール割り当て(認可)が未設定であるために発生しています。</P><H2 id="toc-hId--1053319">手順4 : IAS アプリケーションの Attributes 設定</H2><P>CLS 側で IAS のグループ情報をロール割り当てに利用するため、SAML アサーションにグループ情報を含める必要があります。</P><P>IAS アプリケーションの Attributes を開き、以下を設定します。</P><UL><LI>Name : groups</LI><LI>Source : Identity Directory</LI><LI>Values : All Groups</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_11-1767076263997.png" style="width: 1031px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357144i6073916EC4D873D0/image-dimensions/1031x507?v=v2" width="1031" height="507" role="button" title="Umezuki_11-1767076263997.png" alt="Umezuki_11-1767076263997.png" /></span></P><H2 id="toc-hId-149687533">手順5:グループ作成とユーザー追加</H2><P>手順2で設定した admin_group と同じ名前のグループを IAS の User Groups に作成します。今回は、'cls-admin'となります。</P><UL><LI>Name:&lt;CLSインスタンスの admin_group と同じ値&gt;</LI><LI>Display Name : &lt;任意&gt;</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_12-1767076264004.png" style="width: 853px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357147i237A169AA5D09B2F/image-dimensions/853x603?v=v2" width="853" height="603" role="button" title="Umezuki_12-1767076264004.png" alt="Umezuki_12-1767076264004.png" /></span></P><P>対象のユーザーを追加します。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_13-1767076264005.png" style="width: 1031px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357145i782A635FD8E9DF07/image-dimensions/1031x560?v=v2" width="1031" height="560" role="button" title="Umezuki_13-1767076264005.png" alt="Umezuki_13-1767076264005.png" /></span></P><H2 id="toc-hId--46825972">動作確認 (認可)</H2><P>再びダッシュボードページにアクセスすると、ダッシュボード一覧が表示されていることが確認できます。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_14-1767076264009.png" style="width: 1162px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357146i88A6DC64F2DB0565/image-dimensions/1162x478?v=v2" width="1162" height="478" role="button" title="Umezuki_14-1767076264009.png" alt="Umezuki_14-1767076264009.png" /></span></P><P>また、ユーザーに cls-admin 経由で all_access ロールが付与されていることも確認できます。</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_15-1767076264010.png" style="width: 706px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357148i8EC6943695176C50/image-dimensions/706x556?v=v2" width="706" height="556" role="button" title="Umezuki_15-1767076264010.png" alt="Umezuki_15-1767076264010.png" /></span></P><P><BR />BTPを使ったアプリケーション開発・運用のお役に立てれば幸いです!</P><H2 id="toc-hId--243339477">参考</H2><UL><LI><SPAN><A href="https://docs.opensearch.org/latest/security/authentication-backends/saml/" target="_blank" rel="noopener nofollow noreferrer">https://docs.opensearch.org/latest/security/authentication-backends/saml/</A></SPAN></LI><LI><SPAN><A href="https://help.sap.com/docs/cloud-logging/cloud-logging/prerequisites" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-logging/cloud-logging/prerequisites</A></SPAN></LI><LI><A href="https://help.sap.com/docs/cloud-logging/cloud-logging/configuration-parameters" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-logging/cloud-logging/configuration-parameters</A></LI></UL> 2025-12-30T10:25:31.386000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/how-to-access-sap-cloud-logging-service-dashboards-using-ias-saml/ba-p/14299525 How to Access SAP Cloud Logging Service Dashboards Using IAS SAML Authentication 2025-12-30T11:14:12.065000+01:00 Umezuki https://community.sap.com/t5/user/viewprofilepage/user-id/841332 <P><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/sap-cloud-logging-service-%E3%83%80%E3%83%83%E3%82%B7%E3%83%A5%E3%83%9C%E3%83%BC%E3%83%89%E3%82%92-ias-%E3%81%AE-saml-%E8%AA%8D%E8%A8%BC%E3%81%A7%E5%88%A9%E7%94%A8%E3%81%99%E3%82%8B%E6%96%B9%E6%B3%95/ba-p/14299441" target="_self">Japanese version</A></P><H2 id="toc-hId-1767569129">Introduction</H2><P>SAP Cloud Logging Service (CLS) is an OpenSearch-based observability service that allows you to centrally manage application logs and metrics.</P><P>Because CLS Dashboards provide access to application data such as logs and metrics, proper security measures such as authentication methods and access control are essential.</P><P>Although CLS Dashboards can be accessed using a Service Key, SAP recommends using SAML authentication with IAS in production environments to ensure proper user management and stronger security.</P><P>In this article, we walk through the configuration steps required to enable SAML authentication for CLS Dashboards using IAS.</P><H2 id="toc-hId-1571055624">Prerequisites</H2><P>This guide assumes the following conditions are met:</P><UL><LI>An IAS tenant is active</LI><LI>SAP Cloud Logging Service is available in your SAP BTP subaccount</LI><LI>You have administrator privileges for both IAS and the BTP subaccount</LI></UL><H2 id="toc-hId-1374542119">Step 1: Create a SAML 2.0 Application in IAS</H2><P>In the IAS administration application, navigate to&nbsp;<STRONG>Applications &amp; Resources → <STRONG>Applications</STRONG></STRONG>, and create a new application.</P><UL><LI><STRONG>Display Name</STRONG>: Any name</LI><LI><STRONG><STRONG>Protocol Type</STRONG></STRONG>: SAML 2.0</LI></UL><H2 id="toc-hId-1178028614"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_0-1767076542378.png" style="width: 920px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357151iC6512A28A20EA65A/image-dimensions/920x601?v=v2" width="920" height="601" role="button" title="Umezuki_0-1767076542378.png" alt="Umezuki_0-1767076542378.png" /></span></H2><H2 id="toc-hId-981515109">Step 2: Create a CLS Instance and Configure SAML</H2><P>If you already have an existing CLS instance, you can update its parameters in the same way as during instance creation.</P><P>In this article, we describe the steps using a new CLS instance.</P><H3 id="toc-hId-914084323">2-1. Create a CLS Instance</H3><P>Create a CLS instance in your BTP subaccount.</P><UL><LI><STRONG>Service</STRONG>: Cloud Logging</LI><LI><STRONG>Plan / Runtime Environment</STRONG>: Choose according to your use case</LI><LI><STRONG><STRONG>Instance Name</STRONG></STRONG>: Any name</LI></UL><P>After entering the values, click <STRONG>Next</STRONG> to proceed to the parameter configuration screen.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_1-1767076542380.png" style="width: 644px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357149i8C12411CB87C95FC/image-dimensions/644x599?v=v2" width="644" height="599" role="button" title="Umezuki_1-1767076542380.png" alt="Umezuki_1-1767076542380.png" /></span></P><H3 id="toc-hId-717570818">2-2. Configure SAML Parameters</H3><P>The default parameters will be displayed. Edit the saml section as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_2-1767076542383.png" style="width: 645px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357150i39A40FF708269C62/image-dimensions/645x600?v=v2" width="645" height="600" role="button" title="Umezuki_2-1767076542383.png" alt="Umezuki_2-1767076542383.png" /></span></P><P class="lia-align-center" style="text-align: center;"><EM>Default parameters</EM></P><P class="lia-align-center" style="text-align: center;"><EM><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_3-1767076263976.png" style="width: 1596px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357136i0ED05C88C389F217/image-dimensions/1596x702?v=v2" width="1596" height="702" role="button" title="Umezuki_3-1767076263976.png" alt="Umezuki_3-1767076263976.png" /></span></EM></P><P class="lia-align-center" style="text-align: center;"><EM>Updated parameters</EM></P><pre class="lia-code-sample language-json"><code>{ "saml": { "enabled": true, "admin_group": "&lt;IAS_ADMIN_GROUP_NAME&gt;", "initiated": true, "roles_key": "groups", "idp": { "metadata_url": "&lt;IAS_TENANT_URL&gt;/saml2/metadata", "entity_id": "&lt;IAS_IDP_ENTITY_ID&gt;" }, "sp": { "entity_id": "&lt;CLS_SP_ENTITY_ID&gt;" } } }</code></pre><P class="lia-align-center" style="text-align: center;"><EM><EM>saml section template</EM></EM></P><H4 id="toc-hId-650140032">Parameter Explanation</H4><P><STRONG>admin_group<BR /></STRONG>Users who belong to the specified IAS group are granted administrator privileges (<STRONG>all_access</STRONG>).<BR />In this example, we use <STRONG>cls-admin</STRONG>.</P><P><STRONG>idp.metadata_url<BR /></STRONG>The URL from which CLS retrieves SAML metadata from IAS.<BR />Append /saml2/metadata&nbsp;to your IAS tenant URL.<BR />For example, if your IAS tenant URL is:<BR /><A target="_blank" rel="noopener">https://&lt;YOUR-TENANT-NAME&gt;.accounts400.ondemand.com</A></P><P>then set:<BR /><A target="_blank" rel="noopener">https://&lt;YOUR-TENANT-NAME&gt;.accounts400.ondemand.com/saml2/metadata</A></P><P><STRONG>idp.entity_id<BR /></STRONG>Open the <STRONG>metadata_url</STRONG>&nbsp;in a browser and set the value of 'entityID' found at the beginning of the XML.</P><P><STRONG>sp.entity_id<BR /></STRONG>The identifier for CLS as a Service Provider. In this example, we use 'CLS-Demo'. The same value must be configured on the IAS side.</P><H2 id="toc-hId-195461089">Step 3: Configure SAML Settings in IAS</H2><P>In the IAS application settings, select <STRONG>Configure Manually </STRONG>and configure the SAML settings.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_4-1767076263980.png" style="width: 1184px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357138iC16415FC31F69697/image-dimensions/1184x602?v=v2" width="1184" height="602" role="button" title="Umezuki_4-1767076263980.png" alt="Umezuki_4-1767076263980.png" /></span></P><UL><LI><STRONG><STRONG>Entity ID</STRONG></STRONG>: Same value as 'sp.entity_id'&nbsp;of the CLS instance</LI></UL><P>This ID uniquely identifies CLS as the Service Provider in the SAML integration.<BR />Since we used 'CLS-Demo'in the CLS configuration, the same value must be set here.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_5-1767076263983.png" style="width: 1042px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357137i8A891467C0DD819E/image-dimensions/1042x596?v=v2" width="1042" height="596" role="button" title="Umezuki_5-1767076263983.png" alt="Umezuki_5-1767076263983.png" /></span></P><P>Endpoint Configuration</P><UL><LI><P><STRONG>SSO Endpoint</STRONG>:&nbsp;&lt;Dashboards URL&gt;/_opendistro/_security/saml/acs</P></LI><LI><P><STRONG>Single Logout Endpoint</STRONG>:&nbsp;&lt;Dashboards URL&gt;</P></LI></UL><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_6-1767076263985.png" style="width: 1021px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357140i004B154C2A547446/image-dimensions/1021x599?v=v2" width="1021" height="599" role="button" title="Umezuki_6-1767076263985.png" alt="Umezuki_6-1767076263985.png" /></span></STRONG></P><H2 id="toc-hId--1052416">Verification (Authentication)</H2><P>Access the CLS Dashboards URL and confirm that authentication succeeds.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_7-1767076263988.png" style="width: 1069px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357141iD2FBDE6C8E878651/image-dimensions/1069x615?v=v2" width="1069" height="615" role="button" title="Umezuki_7-1767076263988.png" alt="Umezuki_7-1767076263988.png" /></span></P><P>At this point, when opening dashboards or index lists, you may see a blank page or permission-related errors.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_8-1767076263988.png" style="width: 1061px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357139i5BF3E68B512AD830/image-dimensions/1061x479?v=v2" width="1061" height="479" role="button" title="Umezuki_8-1767076263988.png" alt="Umezuki_8-1767076263988.png" /></span></P><P>In <STRONG>Developer Tools</STRONG>, you can also confirm that HTTP 403 (Forbidden) responses are returned.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_9-1767076263991.png" style="width: 1024px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357143i0B9BEE2A80E1F380/image-dimensions/1024x368?v=v2" width="1024" height="368" role="button" title="Umezuki_9-1767076263991.png" alt="Umezuki_9-1767076263991.png" /></span></P><P>If you click <STRONG>View roles and identities</STRONG> from the user icon, you will see that only the 'own_index'&nbsp;role is assigned.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_10-1767076263992.png" style="width: 789px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357142iBE96C3AD884C2561/image-dimensions/789x504?v=v2" width="789" height="504" role="button" title="Umezuki_10-1767076263992.png" alt="Umezuki_10-1767076263992.png" /></span></P><P>This indicates that SAML authentication is working correctly, but authorization (role assignment) has not yet been configured.</P><H2 id="toc-hId-149688436">Step 4: Configure Attributes in the IAS Application</H2><P>To use IAS group information for role assignment in CLS, group data must be included in the SAML assertion.</P><P>Open <STRONG>Attributes </STRONG>in the IAS application and configure the following:</P><UL><LI><STRONG>Name</STRONG>: groups</LI><LI><STRONG>Source</STRONG><SPAN>: Identity Directory</SPAN></LI><LI><STRONG>Values</STRONG><SPAN>: All Groups</SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_11-1767076263997.png" style="width: 1031px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357144i6073916EC4D873D0/image-dimensions/1031x507?v=v2" width="1031" height="507" role="button" title="Umezuki_11-1767076263997.png" alt="Umezuki_11-1767076263997.png" /></span></P><H2 id="toc-hId--46825069">Step 5: Create a Group and Add Users</H2><P>Create a user group in IAS with the same name as the 'admin_group' configured in Step 2.<BR />In this example, the group name is 'cls-admin'.</P><UL><LI><P><STRONG>Name</STRONG>: Same as 'admin_group'</P></LI><LI><STRONG>Display Name</STRONG>: Any name</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_12-1767076264004.png" style="width: 853px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357147i237A169AA5D09B2F/image-dimensions/853x603?v=v2" width="853" height="603" role="button" title="Umezuki_12-1767076264004.png" alt="Umezuki_12-1767076264004.png" /></span></P><P>Add the target users to the group.</P><P>&nbsp;</P><H2 id="toc-hId--243338574">Verification (Authorization)</H2><P>Access the dashboard page again and confirm that the list of dashboard is now visible.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_14-1767076264009.png" style="width: 1162px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357146i88A6DC64F2DB0565/image-dimensions/1162x478?v=v2" width="1162" height="478" role="button" title="Umezuki_14-1767076264009.png" alt="Umezuki_14-1767076264009.png" /></span></P><P>You can also verify that the 'all_access' role has been assigned to the user via the 'cls_admin' group.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Umezuki_15-1767076264010.png" style="width: 706px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/357148i8EC6943695176C50/image-dimensions/706x556?v=v2" width="706" height="556" role="button" title="Umezuki_15-1767076264010.png" alt="Umezuki_15-1767076264010.png" /></span></P><P><BR />I&nbsp;hope this article helps you with application development and operations on SAP BTP!!</P><H2 id="toc-hId--439852079">References</H2><UL><LI><SPAN><A href="https://docs.opensearch.org/latest/security/authentication-backends/saml/" target="_blank" rel="noopener nofollow noreferrer">https://docs.opensearch.org/latest/security/authentication-backends/saml/</A></SPAN></LI><LI><SPAN><A href="https://help.sap.com/docs/cloud-logging/cloud-logging/prerequisites" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-logging/cloud-logging/prerequisites</A></SPAN></LI><LI><A href="https://help.sap.com/docs/cloud-logging/cloud-logging/configuration-parameters" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-logging/cloud-logging/configuration-parameters</A></LI></UL> 2025-12-30T11:14:12.065000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-s4hana-fiori-launchpad-authentication-via-ias-sap-cloud-identity/ba-p/14301584 SAP S4HANA Fiori Launchpad authentication via IAS (SAP Cloud Identity services) 2026-01-05T16:58:36.858000+01:00 bhargav_bhatt https://community.sap.com/t5/user/viewprofilepage/user-id/209408 <P>Hello,</P><P>This blog will help us configure our S4HANA Fiori through SAP Cloud Identity Services and still using our own corporate IDP.</P><P>This is one of prerequisite of enabling joule for S4HANA Fiori launchpad for private cloud edition.</P><P>Our organization is already having SAML authentication for our Fiori users with our corporate IDP but in order to use Joule within Fiori SAP Fiori should also use same authentication method as that of Joule.</P><P><STRONG>&nbsp;Architectural flow&nbsp;</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_0-1767624856797.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358211i00E22E3C934002C6/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_0-1767624856797.png" alt="bhargav_bhatt_0-1767624856797.png" /></span></P><P>Steps to integrate Fiori with IAS</P><OL><LI>Get the SAML Metadata of Your Identity Authentication Tenant</LI><LI>Create an App for Your SAP S/4HANA Solution</LI><LI>Enable the ABAP Platform as an SAML Service Provider</LI><LI>Trust Identity Authentication as an Identity Provider</LI><LI>Trust the ABAP Platform Client as a Service Provider</LI><LI>Configure Corporate IDP in SAP IAS</LI><LI>Configuring the Conditional authentication for your app in IAS</LI></OL><P><STRONG>Get the SAML Metadata of Your Identity Authentication Tenant</STRONG></P><P>Login to your IAS tenant --&gt; <SPAN>https://</SPAN>&lt;tenant ID&gt;<SPAN>.accounts.ondemand.com/admin</SPAN></P><P><SPAN><SPAN class="">Under&nbsp;<SPAN class="">Applications &amp; Resources</SPAN>, choose the&nbsp;<SPAN class="">Tenant Settings</SPAN>&nbsp;tile.</SPAN></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_1-1767625624017.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358220iBC90FF1BC859E217/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_1-1767625624017.png" alt="bhargav_bhatt_1-1767625624017.png" /></span></P><P>&nbsp;</P><P><SPAN class="">Choose the<SPAN>&nbsp;</SPAN><SPAN class="">SAML 2.0 Configuration</SPAN><SPAN>&nbsp;</SPAN>list item.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_2-1767625701856.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358223i7D7FE401AAD94B8B/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_2-1767625701856.png" alt="bhargav_bhatt_2-1767625701856.png" /></span></P><P><SPAN class="">Choose<SPAN>&nbsp;</SPAN><SPAN class="">Download Metadata File</SPAN>.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_3-1767625831525.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358225i14764DFA260A839E/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_3-1767625831525.png" alt="bhargav_bhatt_3-1767625831525.png" /></span></P><P><SPAN>From the&nbsp;</SPAN><SPAN class="">Signing Certificate</SPAN><SPAN>&nbsp;section, download the certificate too.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_4-1767625897525.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358228i4D4DF162E87D8AFC/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_4-1767625897525.png" alt="bhargav_bhatt_4-1767625897525.png" /></span></P><P>&nbsp;</P><P><STRONG>Create an App for Your SAP S/4HANA Solution</STRONG></P><P><SPAN class="">Under<SPAN>&nbsp;</SPAN><SPAN class="">Applications &amp; Resources</SPAN>, choose the<SPAN>&nbsp;</SPAN><SPAN class="">Applications</SPAN><SPAN>&nbsp;</SPAN>tile.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_5-1767626057605.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358233iCF597E207FACDD39/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_5-1767626057605.png" alt="bhargav_bhatt_5-1767626057605.png" /></span></P><P><SPAN class="">Choose the<SPAN>&nbsp;</SPAN><SPAN class="">Create</SPAN><SPAN>&nbsp;</SPAN>button.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_6-1767626120187.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358236i9825188E7077BD4E/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_6-1767626120187.png" alt="bhargav_bhatt_6-1767626120187.png" /></span></P><P><SPAN class="">Enter the required information.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_7-1767626178448.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358240i9CC07505C3CA24D9/image-size/medium/is-moderation-mode/true?v=v2&amp;px=400" role="button" title="bhargav_bhatt_7-1767626178448.png" alt="bhargav_bhatt_7-1767626178448.png" /></span></P><P>&nbsp;</P><DIV class=""><P class="">Set the<SPAN>&nbsp;</SPAN><SPAN class="">Application Type</SPAN><SPAN>&nbsp;</SPAN>to<SPAN>&nbsp;</SPAN>SAP on-premise Solution.</P><P class=""><SPAN>Click on create.</SPAN></P></DIV><P>&nbsp;</P><P><STRONG>Enable the ABAP Platform as an SAML Service Provider</STRONG></P><P><SPAN class="">Login to your S4HANA system and open<SPAN>&nbsp;</SPAN><SPAN class="">SAML 2.0&nbsp;</SPAN></SPAN><SPAN class="">Configuration</SPAN><SPAN>&nbsp;</SPAN><SPAN>(transaction</SPAN><SPAN>&nbsp;</SPAN><SPAN class="">SAML2</SPAN><SPAN>).</SPAN></P><DIV class=""><P class="">If your ABAP client has never been configured for SAML, you see the message<SPAN>&nbsp;</SPAN>Client "&lt;Client_Id&gt;" is not configured to support SAML 2.0.</P><P class="">To enable the configuration, choose<SPAN>&nbsp;</SPAN><SPAN class=""><SPAN class="">Enable SAML 2.0 Support --&gt;</SPAN>&nbsp;&nbsp;<SPAN class="">Create SAML 2.0 Local Provider</SPAN></SPAN>.</P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_8-1767626500689.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358249iF93388233058C67B/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_8-1767626500689.png" alt="bhargav_bhatt_8-1767626500689.png" /></span></DIV><DIV class="">&nbsp;</DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>Enter a name for the provider.</SPAN></DIV><DIV class="">&nbsp;</DIV><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_10-1767626550405.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358251i48CCE7A57DA548A3/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_10-1767626550405.png" alt="bhargav_bhatt_10-1767626550405.png" /></span><P>&nbsp;</P><P class="">&nbsp;</P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_11-1767626616868.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358252i8C3C45EA73139DE3/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_11-1767626616868.png" alt="bhargav_bhatt_11-1767626616868.png" /></span></DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>Choose</SPAN><SPAN>&nbsp;</SPAN><SPAN class="">Metadata</SPAN><SPAN>.</SPAN><DIV class=""><P class="">Save the metadata to a file, such as<SPAN>&nbsp;</SPAN><SPAN class="">abap_client_metadata.xml</SPAN>.</P></DIV></DIV><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_12-1767626713095.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358254i3BB7225D7A120FB9/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_12-1767626713095.png" alt="bhargav_bhatt_12-1767626713095.png" /></span></P><P><STRONG>Trust Identity Authentication as an Identity Provider</STRONG></P><P>In SAML2 tcode goto Trusted Provider and click on add</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_13-1767626823434.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358258i9A9BB7CB95167BBB/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_13-1767626823434.png" alt="bhargav_bhatt_13-1767626823434.png" /></span><SPAN class="">Select the metadata file you downloaded from your<SPAN>&nbsp;</SPAN><SPAN class="">Identity Authentication</SPAN><SPAN>&nbsp;</SPAN>tenant for upload and choose<SPAN>&nbsp;</SPAN><SPAN class="">Next</SPAN>.</SPAN></P><P><SPAN class="">Then you need to choose the certificate which you have downloaded from tenant setting</SPAN></P><P><SPAN class="">once you finish the wizard. provider is added as shown below</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_15-1767627191189.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358268i16BA5A32E0E804BF/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_15-1767627191189.png" alt="bhargav_bhatt_15-1767627191189.png" /></span></P><P>click on identity federation and click add</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_16-1767627299971.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358269i4C819B22EA15170B/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_16-1767627299971.png" alt="bhargav_bhatt_16-1767627299971.png" /></span></P><P>you can save and activate this provider</P><P>&nbsp;</P><P><STRONG>Trust the ABAP Platform Client as a Service Provider</STRONG></P><P>login to SAP IAS&nbsp;<SPAN>https://</SPAN>&lt;tenant ID&gt;<SPAN>.accounts.ondemand.com/admin</SPAN></P><P><SPAN class="">Under<SPAN>&nbsp;</SPAN><SPAN class="">Applications &amp; Resources</SPAN>, choose the<SPAN>&nbsp;</SPAN><SPAN class="">Applications</SPAN><SPAN>&nbsp;</SPAN>tile.</SPAN></P><P><SPAN class=""><SPAN>Select the application you created for your&nbsp;</SPAN><SPAN class="">ABAP Platform</SPAN><SPAN>&nbsp;client</SPAN></SPAN></P><P><SPAN class="">Under the<SPAN>&nbsp;</SPAN><SPAN class="">Trust</SPAN><SPAN>&nbsp;</SPAN>tab, choose<SPAN>&nbsp;</SPAN><SPAN class="">SAML 2.0 Configuration</SPAN>.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_17-1767627530324.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358271i5A3A1849274521F7/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_17-1767627530324.png" alt="bhargav_bhatt_17-1767627530324.png" /></span></P><P>&nbsp;</P><P><SPAN>Upload the service provider metadata XML file which you downloaded from SAML2 tcode</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_18-1767627617598.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358273iC55CE003711F2C1C/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_18-1767627617598.png" alt="bhargav_bhatt_18-1767627617598.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_19-1767627746347.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358277iA1CC40D2832DAC6C/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_19-1767627746347.png" alt="bhargav_bhatt_19-1767627746347.png" /></span></P><P>&nbsp;</P><P><STRONG>Configure Corporate IDP in SAP IAS</STRONG></P><P><STRONG>prerequisite</STRONG> : you need metadata file from your corporate IDP&nbsp;</P><P>Login to IAS and go to Identity provided --&gt; Corporate Identity Providers</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_20-1767627838830.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358278i838450C65B12ECC6/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_20-1767627838830.png" alt="bhargav_bhatt_20-1767627838830.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_21-1767627908913.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358287i77DD7979B9F08BB5/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_21-1767627908913.png" alt="bhargav_bhatt_21-1767627908913.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_22-1767627989228.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358288i07A586A9831158C5/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_22-1767627989228.png" alt="bhargav_bhatt_22-1767627989228.png" /></span></P><P>click on SAML configuration</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_23-1767628058569.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358292i9392F05B5311A9D9/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_23-1767628058569.png" alt="bhargav_bhatt_23-1767628058569.png" /></span></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_24-1767628097167.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358293iB959E54439940541/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_24-1767628097167.png" alt="bhargav_bhatt_24-1767628097167.png" /></span></P><P>&nbsp;</P><P>Name ID format you can keep unspecified</P><P><STRONG>Configuring the Conditional authentication for your app in IAS</STRONG></P><P>login to IAS and click on application and resource&nbsp;</P><P>select your application " SAP ABAP " in my case</P><P>then scroll down to conditional authentication</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_25-1767628332545.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358296i33B2EE118FF61467/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_25-1767628332545.png" alt="bhargav_bhatt_25-1767628332545.png" /></span></P><P>choose the corporate IDP which you create in above step and click on save</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_26-1767628374756.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358297i060324E5CF14940E/image-size/medium/is-moderation-mode/true?v=v2&amp;px=400" role="button" title="bhargav_bhatt_26-1767628374756.png" alt="bhargav_bhatt_26-1767628374756.png" /></span></P><P>you have to trust your corporate IDP&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_27-1767628462639.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358298i426CF5ACD912373C/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="bhargav_bhatt_27-1767628462639.png" alt="bhargav_bhatt_27-1767628462639.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bhargav_bhatt_28-1767628538609.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358300iD5F4A2FC1BDFC817/image-size/medium/is-moderation-mode/true?v=v2&amp;px=400" role="button" title="bhargav_bhatt_28-1767628538609.png" alt="bhargav_bhatt_28-1767628538609.png" /></span></P><P>you are all set</P><P>now when request comes from SAP Fiori it will be redirected to SAP IAS and SAP IAS will redirect that request to your corporate IDP. It will pass the authentication and same will be pass on to your SAP application by SAP IAS. It will just act like proxy.</P><P>In case if you are not using Corporate IDP for login then you need to create each SAP user in your SAP IAS so that they can login fiori with your SAP IAS login credentails.</P><P>&nbsp;</P><P>Reference Article :&nbsp;<A href="https://help.sap.com/docs/cloud-identity/system-integration-guide/identity-authentication-configuration-for-sap-s-4hana?locale=en-US" target="_self" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity/system-integration-guide/identity-authentication-configuration-for-sap-s-4hana?locale=en-US</A></P><P>&nbsp;</P><P>&nbsp;</P> 2026-01-05T16:58:36.858000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/new-expert-guided-implementation-joule-prerequisites-and-activation/ba-p/14308272 New Expert-Guided Implementation: Joule Prerequisites and Activation 2026-01-16T00:06:43.973000+01:00 mirnachaanine https://community.sap.com/t5/user/viewprofilepage/user-id/8362 <P><A href="https://accounts.sap.com/saml2/idp/sso?sp=https://www.successfactors.eu/learninghub&amp;RelayState=%2Fsf%2Flearning%3FdestUrl%3Dhttps%253a%252f%252fsaplearninghub%252eplateau%252ecom%252flearning%252fuser%252fdeeplink%255fredirect%252ejsp%253flinkId%253dCATALOG%255fSEARCH%2526sbArSel%253d%2526keywords%253dSUP_EDE_00012366%2526selKeyWordHeader%253dSUP_EDE_00012366%2526catSel%253d%2526srcSel%253dESAC%2526delMthSel%253d%2526ILDateFrm%253d%2526ILDateTo%253d%2526ILBlend%253d%2526ILSchd%253d%2526fromSF%253dY%26company%3Dlearninghub" target="_self" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mirnachaanine_0-1769125086418.png" style="width: 721px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/364277i4E3AD51202FE9C69/image-dimensions/721x155/is-moderation-mode/true?v=v2" width="721" height="155" role="button" title="mirnachaanine_0-1769125086418.png" alt="mirnachaanine_0-1769125086418.png" /></span></A></P><H4 id="toc-hId-2046019507">Establish the Foundation for Your AI Journey&nbsp;</H4><P><SPAN>SAP Joule is transforming how organizations interact with SAP applications by bringing intelligence directly into everyday workflows.&nbsp;For&nbsp;customers&nbsp;to&nbsp;activate Joule and unlock its AI-powered capabilities, they must first prepare their&nbsp;SAP Cloud Identity Services (CIS),&nbsp;SAP Business Technology Platform (BTP), and integration foundations&nbsp;to&nbsp;fully realize the value of&nbsp;Joule from day one.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>To support customers with this essential preparation,&nbsp;we are&nbsp;pleased to introduce a new Expert-Guided Implementation (EGI):&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><A href="https://accounts.sap.com/saml2/idp/sso?sp=https://www.successfactors.eu/learninghub&amp;RelayState=%2Fsf%2Flearning%3FdestUrl%3Dhttps%253a%252f%252fsaplearninghub%252eplateau%252ecom%252flearning%252fuser%252fdeeplink%255fredirect%252ejsp%253flinkId%253dCATALOG%255fSEARCH%2526sbArSel%253d%2526keywords%253dSUP_EDE_00012366%2526selKeyWordHeader%253dSUP_EDE_00012366%2526catSel%253d%2526srcSel%253dESAC%2526delMthSel%253d%2526ILDateFrm%253d%2526ILDateTo%253d%2526ILBlend%253d%2526ILSchd%253d%2526fromSF%253dY%26company%3Dlearninghub" target="_self" rel="noopener noreferrer"><STRONG><SPAN>Joule Prerequisites &amp; Activation</SPAN></STRONG><SPAN>&nbsp;</SPAN></A><SPAN>-&nbsp;a hands-on, expert-led program designed to help you configure all required technical components for a smooth Joule activation.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>This new offering helps customers understand Joule’s architecture, explore deployment options, configure platform prerequisites, and&nbsp;establish&nbsp;the identity and access foundation&nbsp;required&nbsp;for a secure activation. By the end of the EGI, participants will be positioned to complete all the prerequisites&nbsp;required&nbsp;to&nbsp;</SPAN><STRONG><SPAN>activate&nbsp;Joule</SPAN></STRONG><SPAN>, ensuring a seamless start to their AI adoption journey.</SPAN><SPAN>&nbsp;<BR /><BR /></SPAN></P><H4 id="toc-hId-1849506002">Workshop Schedule<SPAN>&nbsp;</SPAN></H4><P><SPAN>To accommodate global participants, this session will be offered on the following dates and time zones as follows:</SPAN><SPAN>&nbsp;<BR /><BR /></SPAN></P><TABLE border="1" width="100%"><TBODY><TR><TD width="33.333333333333336%" height="30px"><STRONG>2026 Dates</STRONG></TD><TD width="33.333333333333336%" height="30px"><STRONG>Time</STRONG></TD><TD width="33.333333333333336%" height="30px"><STRONG>Time Zone&nbsp;</STRONG></TD></TR><TR><TD width="33.333333333333336%" height="30px"><FONT color="#999999"><STRONG>January 19-20</STRONG></FONT></TD><TD width="33.333333333333336%" height="30px"><FONT color="#999999"><STRONG>10:00AM - 12:00PM</STRONG></FONT></TD><TD width="33.333333333333336%" height="30px"><FONT color="#999999"><STRONG>EMEA | CET</STRONG></FONT></TD></TR><TR><TD width="33.333333333333336%" height="31px"><FONT color="#000000"><STRONG>January 26-27</STRONG></FONT></TD><TD width="33.333333333333336%" height="31px"><FONT color="#000000"><STRONG>11:00AM - 1:00PM</STRONG></FONT></TD><TD width="33.333333333333336%" height="31px"><FONT color="#000000"><STRONG>NA/LA | EST&nbsp;</STRONG></FONT></TD></TR><TR><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>February 9-10</STRONG></FONT></TD><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>10:00AM-12:00PM</STRONG></FONT></TD><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>EMEA | CET</STRONG></FONT></TD></TR><TR><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>February 16-17</STRONG></FONT></TD><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>11:00AM - 1:00PM</STRONG></FONT></TD><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>NA/LA | EST&nbsp;</STRONG></FONT></TD></TR><TR><TD width="33.333333333333336%" height="30px"><STRONG>March 2-3</STRONG></TD><TD width="33.333333333333336%" height="30px"><STRONG>10:00AM-12:00PM</STRONG></TD><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>EMEA | CET</STRONG></FONT></TD></TR><TR><TD width="33.333333333333336%"><STRONG>March 9-10</STRONG></TD><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>11:00AM - 1:00PM</STRONG></FONT></TD><TD width="33.333333333333336%" height="30px"><FONT color="#000000"><STRONG>NA/LA | EST&nbsp;</STRONG></FONT></TD></TR></TBODY></TABLE><H4 id="toc-hId-1652992497"><BR />Why This EGI Matters&nbsp;</H4><P><SPAN>Before Joule can be activated, customers must ensure the right technical prerequisites are in place—across SAP BTP, Cloud Identity Services, Build Work Zone, and Line-of-Business systems. This EGI provides:</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>A&nbsp;</SPAN><STRONG><SPAN>clear, step-by-step path</SPAN></STRONG><SPAN>&nbsp;to completing these prerequisites</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><STRONG><SPAN>Expert-led</SPAN></STRONG><SPAN>&nbsp;</SPAN><STRONG><SPAN>guidance</SPAN></STRONG><SPAN>&nbsp;for setting up SAP Cloud Identity Services including Identity Authentication Service (IAS)/Identity&nbsp;Provisioning&nbsp;Service (IPS), and entitlements</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><STRONG><SPAN>Live configuration guidance</SPAN></STRONG><SPAN>&nbsp;in your SAP BTP environment&nbsp;and SAP Build Workzone (BWZ)</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><STRONG><SPAN>Hands-on support</SPAN></STRONG><SPAN>&nbsp;through real examples and troubleshooting</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><SPAN>With AI rapidly becoming central to SAP’s product strategy, organizations need the right technical foundation to adopt Joule with confidence, security, and scalability.</SPAN><SPAN>&nbsp;<BR /><BR /></SPAN></P><H4 id="toc-hId-1456478992">What&nbsp;You’ll&nbsp;Learn: Program Overview&nbsp;</H4><P><SPAN>This&nbsp;2-day EGI blends instruction, demonstrations, and guided hands-on exercises.</SPAN><SPAN>&nbsp;</SPAN></P><P><STRONG><SPAN>Day 1 – Foundation &amp; Architecture</SPAN></STRONG><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>Understand Joule’s system architecture and deployment scenarios</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Learn how&nbsp;SAP&nbsp;Cloud Identity Services (IAS/IPS),&nbsp;SAP BTP,&nbsp;SAP&nbsp;Build Work Zone, and LOB solutions work together</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Navigate BTP global accounts, subaccounts, entitlements, and subscriptions</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Validate system readiness and begin configuring your Joule environment</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Experience a live demonstration of Joule integrated with SAP SuccessFactors</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><STRONG><SPAN>Day 2 – Identity, Provisioning &amp; Work Zone Integration</SPAN></STRONG><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>Deep-dive into&nbsp;SAP Cloud Identity Services -&nbsp;Identity Authentication (IAS) and Identity Provisioning (IPS) for Joule</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Integrate CIS with your corporate Identity Provider</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Configure&nbsp;SAP Build Workzone (BWZ)&nbsp;as the unified interface for Joule</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Establish trust relationships between systems</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Expose LOB content to BWZ and&nbsp;validate&nbsp;provisioning flows</SPAN><SPAN>&nbsp;</SPAN></LI></UL><H4 id="toc-hId-1259965487"><STRONG><SPAN><BR /></SPAN></STRONG>What You Will Achieve&nbsp;</H4><P><SPAN>This new EGI equips your organization with everything needed to prepare for Joule activation,&nbsp;ensuring compliance, security, and a streamlined technical foundation from day one.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>If your organization is planning to adopt SAP Joule or&nbsp;preparing for&nbsp;AI-driven innovation within SAP applications, this EGI is the ideal starting point to fast-track your readiness and reduce implementation risk.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>By the end of the EGI, you will have:</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>A configured SAP BTP environment with a designated Joule subaccount</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Completed IAS/IPS setup for secure authentication and provisioning</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Integrated BWZ as the experience layer for Joule</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Verified all activation prerequisites using a comprehensive readiness checklist</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Gained expert-backed confidence to run the Joule Booster and&nbsp;proceed&nbsp;with activation</SPAN></LI></UL><H4 id="toc-hId-1063451982"><SPAN>How to Register&nbsp;<BR /></SPAN></H4><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mirnachaanine_1-1768517062801.png" style="width: 17px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361743i9F8DA86CD8872CFF/image-dimensions/17x17/is-moderation-mode/true?v=v2" width="17" height="17" role="button" title="mirnachaanine_1-1768517062801.png" alt="mirnachaanine_1-1768517062801.png" /></span><STRONG><A href="https://accounts.sap.com/saml2/idp/sso?sp=https://www.successfactors.eu/learninghub&amp;RelayState=%2Fsf%2Flearning%3FdestUrl%3Dhttps%253a%252f%252fsaplearninghub%252eplateau%252ecom%252flearning%252fuser%252fdeeplink%255fredirect%252ejsp%253flinkId%253dCATALOG%255fSEARCH%2526sbArSel%253d%2526keywords%253dSUP_EDE_00012366%2526selKeyWordHeader%253dSUP_EDE_00012366%2526catSel%253d%2526srcSel%253dESAC%2526delMthSel%253d%2526ILDateFrm%253d%2526ILDateTo%253d%2526ILBlend%253d%2526ILSchd%253d%2526fromSF%253dY%26company%3Dlearninghub" target="_blank" rel="noopener noreferrer">Register here to secure your spot</A>*&nbsp;</STRONG><SPAN>today to learn from SAP experts and gain the skills to bring&nbsp;<STRONG>Business AI to life</STRONG>&nbsp;across your enterprise.</SPAN></P><P><SPAN>&nbsp;*&nbsp;<EM>You may need to register your S-user for access to SAP Learning Hub to access the EGI registration page.&nbsp; It is a one-time registration, click&nbsp;<A href="https://support.sap.com/en/offerings-programs/enterprise-support/enterprise-support-academy/learn.html" target="_blank" rel="noopener noreferrer">here.</A></EM></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mirnachaanine_0-1768519307900.png" style="width: 159px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361744i9721FA1F62F2C8E7/image-dimensions/159x159/is-moderation-mode/true?v=v2" width="159" height="159" role="button" title="mirnachaanine_0-1768519307900.png" alt="mirnachaanine_0-1768519307900.png" /></span></P><H4 id="toc-hId-866938477">Related Articles</H4><P><STRONG><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/new-expert-guided-implementation-unlocking-joule-and-sap-business-ai-from/ba-p/14237653" target="_self">Unlocking Joule and SAP Business AI from Strategy to Activation: Expert-Guided Implementation</A></STRONG></P> 2026-01-16T00:06:43.973000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/creating-and-accessing-an-ias-tenant-on-sap-btp-part-2/ba-p/14302873 Creating and Accessing an IAS Tenant on SAP BTP (Part 2) 2026-01-20T06:19:07.567000+01:00 juliaSchiebelbein https://community.sap.com/t5/user/viewprofilepage/user-id/1618051 <P>In <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/part-1-why-ias-is-essential-for-enterprise-div-implementations/ba-p/14302808" target="_self"><STRONG>Part 1</STRONG></A> of this series, the role of SAP Cloud Identity Services – Identity Authentication (IAS) as a foundational component for enterprise-grade SAP Decentralized Identity Verification (DIV) implementations was introduced.</P><P>This article focuses on <STRONG>creating and accessing an IAS tenant on SAP BTP</STRONG>.<BR />At this stage, no DIV-specific configuration is performed. Instead, the identity foundation required for later integration with DIV is prepared.</P><H1 id="toc-hId-1658598371">&nbsp;</H1><H1 id="toc-hId-1462084866">Positioning in the Overall Architecture</H1><P>At a high level, IAS acts as a central authentication and authorization layer between <STRONG>corporate identity providers</STRONG> and <STRONG>DIV components</STRONG>.</P><P>This architectural positioning corresponds to the enterprise requirements introduced in Part 1, where IAS acts as the central identity layer between corporate identity providers and DIV (Figure 1).</P><P><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="High-level architecture diagram" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/358951i3924F34DA3947E1B/image-size/medium/is-moderation-mode/true?v=v2&amp;px=400" role="button" title="Unbenannte Zeichnung.png" alt="Unbenannte Zeichnung.png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P><EM>Figure 1: High-level identity architecture integrating SAP Cloud Identity Services (IAS) with SAP Decentralized Identity Verification (DIV).</EM></P><P>&nbsp;</P><H1 id="toc-hId-1265571361">Prerequisites</H1><P>Before starting the setup, the following prerequisites must be fulfilled:</P><UL><LI>An <STRONG>SAP BTP global account</STRONG></LI><LI>A <STRONG>BTP subaccount</STRONG> (existing or newly created)</LI><LI><STRONG>Administrative permissions</STRONG> to:<UL><LI>Manage entitlements</LI><LI>Create service instances</LI><LI>Configure identity services</LI></UL></LI></UL><P>&nbsp;</P><H1 id="toc-hId-1069057856">Step 1: Access the SAP BTP Global Account</H1><OL><LI>Open the SAP BTP Cockpit:&nbsp;<A href="https://account.hana.ondemand.com/#/home/welcome" target="_blank" rel="noopener nofollow noreferrer">https://account.hana.ondemand.com/#/home/welcome</A></LI><LI>Log in using SAP credentials</LI><LI>Select the relevant <STRONG>global account</STRONG></LI></OL><DIV><FONT color="#808080"><STRONG>Note:</STRONG></FONT><BR /><FONT color="#808080">In enterprise environments, multiple global accounts may exist (for example, development, test, and production). The correct global account for the DIV implementation must be selected.</FONT></DIV><P>&nbsp;</P><H1 id="toc-hId-872544351"><STRONG>Step 2: Select or Create a Subaccount</STRONG></H1><P>Subaccounts provide logical isolation for different projects, environments, or organizational units.</P><OL><LI>In the left navigation panel, open <STRONG>Account Explorer</STRONG></LI><LI>Either:<UL><LI>Select an <U>existing</U> subaccount, or</LI><LI>Create a <U>new</U> subaccount:<OL><LI>Click&nbsp;<STRONG>Create → Subaccount</STRONG></LI><LI>Enter a display name (e.g.&nbsp;manufacturer-div-test)</LI><LI>Select a region (e.g. AWS, Europe)</LI><LI>Click&nbsp;<STRONG>Create</STRONG></LI></OL></LI></UL></LI></OL><P>&nbsp;</P><H1 id="toc-hId-676030846">Step 3: Check and Add Cloud Identity Service Entitlements</H1><P>IAS is provided as part of <STRONG>SAP Cloud Identity Services</STRONG> and must be entitled before it can be consumed within a subaccount.</P><OL><LI><U>In the subaccount</U>, navigate to <STRONG>Entitlements&nbsp;</STRONG></LI><LI>Search for <STRONG>Cloud Identity Services</STRONG></LI><LI>If the service is already listed, continue with the next step</LI><LI>If the service is not listed:<OL><LI>Click <STRONG>Edit</STRONG> in the top right corner</LI><LI>Select <STRONG>Add Service Plans</STRONG> (top right)</LI><LI>Search for <STRONG>Cloud Identity Services</STRONG></LI><LI>Select the service</LI><LI>Choose the <STRONG>default</STRONG> application plan</LI><LI>Click <STRONG>Add Service Plan</STRONG></LI><LI>Click <STRONG>Save</STRONG></LI></OL></LI></OL><P><FONT color="#808080"><STRONG>Good to know:<BR /></STRONG>Each SAP BTP global account includes&nbsp;one <STRONG>free</STRONG> <STRONG>production</STRONG> IAS tenant and one <STRONG>free</STRONG> <STRONG>test</STRONG> IAS tenant.</FONT></P><H1 id="toc-hId-479517341">&nbsp;</H1><H1 id="toc-hId-283003836"><STRONG>Step 4: Create an IAS Instance</STRONG></H1><P>The IAS instance represents the <STRONG>actual IAS tenant</STRONG> that will later serve as the identity provider for DIV.</P><OL><LI>In the subaccount navigation, go to&nbsp;<STRONG>Services → Instances and Subscriptions</STRONG></LI><LI>&nbsp;Click&nbsp;<STRONG>Create</STRONG></LI><LI>Configure the instance with the following values:<UL><LI><STRONG>Service:&nbsp;</STRONG>Cloud identity Service</LI><LI><STRONG>Plan:</STRONG> default</LI><LI><STRONG>Runtime environment:&nbsp;</STRONG>Cloud Foundry</LI><LI><STRONG>Instance name:&nbsp;</STRONG>for example, manufacturer-div-ias-test</LI></UL></LI><LI>Click&nbsp;<STRONG>Create</STRONG></LI></OL><P>Provisioning of the IAS tenant typically completes within 1-2 minutes.</P><P>&nbsp;</P><H1 id="toc-hId-86490331">Step 5: Access the IAS Admin Console</H1><P>After provisioning is complete, the IAS administration interface becomes available.</P><OL><LI>In&nbsp;<STRONG>Instances and Subscriptions</STRONG>, locate the newly created IAS instance</LI><LI>Click on the instance name to open the instance details</LI><LI>Open the&nbsp;<STRONG>Admin Console</STRONG> or&nbsp;<STRONG>Dashboard URL </STRONG>(URL format:&nbsp;<STRONG><A target="_blank" rel="noopener">https://&lt;tenant-id&gt;.accounts.ondemand.com/admin</A></STRONG><A target="_blank" rel="noopener"><FONT color="#000000">)</FONT></A></LI><LI>Log in using SAP credentials</LI></OL><P>The<STRONG> IAS Admin Console&nbsp;</STRONG>is the central place for:</P><UL><LI>Managing users and groups</LI><LI>Configuring authentication and identity federation</LI><LI>Controlling access to DIV wallets and provisioning tenants</LI></UL><P>&nbsp;</P><H1 id="toc-hId--110023174">Result</H1><P>After completing the steps above:</P><UL><LI>An IAS tenant is successfully provisioned on SAP BTP</LI><LI>The IAS Admin Console is accessible</LI><LI>No integration with DIV has been configured yet</LI></UL><P>This completes the <STRONG>identity foundation</STRONG> required for the DIV setup.</P><P>&nbsp;</P><H1 id="toc-hId-463203404">Read more</H1><P><span class="lia-unicode-emoji" title=":right_arrow:">➡️</span>&nbsp; &nbsp;Continue with <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/connecting-ias-with-sap-decentralized-identity-verification-part-3/ba-p/14302941" target="_self"><STRONG>Connecting IAS with SAP Decentralized Identity Verification (Part 3)</STRONG></A></P><P><STRONG><span class="lia-unicode-emoji" title=":left_arrow:">⬅️</span>&nbsp; &nbsp;</STRONG>Go back to <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/why-ias-is-essential-for-enterprise-div-implementations-part-1/ba-p/14302808" target="_self"><STRONG>Why IAS Is Essential for Enterprise DIV Implementations (Part 1)</STRONG></A></P><P>&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/introduction-to-sap-decentralized-identity-verification-div-and-related-ssi/ba-p/14226121" target="_self">Introduction to SAP Decentralized Identity Verification (DIV) and Related SSI Blog Posts</A>&nbsp;</LI><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/self-sovereign-identity-ssi-a-usage-catalyst-for-data-spaces/ba-p/14054162" target="_self">Self-Sovereign Identity (SSI): A Usage Catalyst for Data Spaces</A>&nbsp;</LI><LI><A href="https://help.sap.com/docs/DECENTRALIZED_IDENTITY_VERIFICATION/ffd0e76d13f5453bbc3839e15a2b95f4/95924fe9ff474fdfae2f8d0611fa4c61.html?locale=en-US" target="_self" rel="noopener noreferrer">Feature Scope Description for Decentralized Identity Verification (help page)</A></LI><LI><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-is-identity-authentication?locale=en-US" target="_self" rel="noopener noreferrer">What Are Cloud Identity Services? (help page)</A></LI></UL><P>&nbsp;</P> 2026-01-20T06:19:07.567000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/why-ias-is-essential-for-enterprise-div-implementations-part-1/ba-p/14302808 Why IAS Is Essential for Enterprise DIV Implementations (Part 1) 2026-01-20T12:16:13.294000+01:00 juliaSchiebelbein https://community.sap.com/t5/user/viewprofilepage/user-id/1618051 <P><EM>This is Part 1 of a three-part series on setting up SAP Cloud Identity Services – Identity Authentication (IAS) with the BTP service Decentralized Identity Verification (DIV). It lays the foundation by explaining what IAS is and why it is a core building block for enterprise-grade DIV implementations.</EM></P><H1 id="toc-hId-1658598159">&nbsp;</H1><H1 id="toc-hId-1462084654">Introduction</H1><P>Consider a scenario where a global automotive manufacturer has decided to implement SAP’s <STRONG>Decentralized Identity Verification (DIV)</STRONG> solution to enable secure, privacy-preserving digital identity management across its supply chain. The company needs to issue verifiable credentials to suppliers, partners, and employees while maintaining full control over the authentication infrastructure.</P><P>However, there’s a critical requirement: the organization wants to use its own corporate identity system rather than creating and managing separate user accounts in SAP. Employees and suppliers should authenticate using their existing corporate credentials, such as those from the manufacturer’s domain or a gearbox supplier’s identity provider, not additional SAP-specific identities.</P><P>Additionally, granular access control is essential. The manufacturer needs to define which users can access specific digital wallets and which administrators have the authority to provision and manage these wallets across different business units and partner organizations. This is where <STRONG>SAP Cloud Identity Services – Identity Authentication (IAS)</STRONG> becomes indispensable.</P><H1 id="toc-hId-1265571149">&nbsp;</H1><H1 id="toc-hId-1069057644">What is IAS?</H1><P>IAS is a cloud-based identity management solution that serves as a central authentication and single sign-on (SSO) hub for SAP and non-SAP applications.</P><P><STRONG>Core Capabilities</STRONG></P><UL><LI><EM>Single Sign-On (SSO):&nbsp;</EM>Users authenticate once and gain access to multiple applications without repeated logins.</LI><LI><EM>Identity Federation:</EM> IAS can integrate with existing corporate identity providers (like Microsoft Azure AD, Google Workspace, etc.) through standards like SAML 2.0 and OpenID Connect (OIDC). This avoids duplicate user accounts.</LI><LI><EM>Fine-Grained Access Control:</EM> Users can be assigned access to specific applications or resources—critical for multi-tenant DIV wallet scenarios.</LI><LI><EM>Centralized User Lifecycle Management:</EM> Manage users, groups, authentication policies, and access rights consistently across systems.</LI></UL><H1 id="toc-hId-872544139">&nbsp;</H1><H1 id="toc-hId-676030634">Why Use IAS with DIV?</H1><P>While DIV can technically operate without IAS, enterprise deployments strongly benefit from it. IAS addresses three core challenges: identity reuse, access control, and security.</P><P><STRONG>1. Reusing Existing Corporate Identities</STRONG></P><P>Most organizations already operate mature identity systems. IAS allows DIV to integrate seamlessly by:</P><UL><LI>Federating with corporate and partner identity providers</LI><LI>Eliminating DIV-specific user accounts</LI><LI>Simplifying onboarding and offboarding: disabling a corporate account automatically revokes DIV access</LI></UL><P>This ensures users authenticate with familiar credentials while IT retains centralized control.</P><P><STRONG>2. Granular Access Control in Multi-Tenant Environments</STRONG></P><P>In realistic enterprise scenarios, different stakeholders require different levels of access. Consider the automotive manufacturer example: The finance department needs access to a dedicated wallet tenant for financial audit credentials. The supply chain team requires access to supplier verification credentials in a separate tenant while quality assurance must access quality certification credentials without visibility into financial or HR data. Furthermore, an external gearbox supplier should only access the specific wallet tenant designated for supplier interactions.</P><P>IAS enables this sophisticated access model through:</P><UL><LI>Group-based access control mapped to DIV wallet tenants</LI><LI>Role-based administrative permissions for provisioning and management</LI><LI>Tenant isolation, preventing unauthorized access across departments or partners</LI></UL><P><STRONG>3. Centralized Security and Auditability</STRONG></P><P>Without IAS, organizations would need to manage separate authentication mechanisms for DIV, adding complexity and risk. IAS provides:</P><UL><LI>Central enforcement of security policies (e.g. MFA, password rules, session timeouts)</LI><LI>Reduced credential sprawl and fewer attack surfaces</LI><LI>Improved visibility into authentication activity for security monitoring and audits</LI></UL><H1 id="toc-hId-479517129">&nbsp;</H1><H1 id="toc-hId-283003624">What this Series Will Build</H1><P>To provide concrete context throughout this series, the following scenario is used: an automotive manufacturer implementing DIV with the following requirements:</P><P><STRONG>Authentication</STRONG>:</P><OL><LI>Employees from the manufacturing company authenticate using their corporate domain credentials</LI><LI>Partner organizations (such as a gearbox supplier) authenticate using their own identity systems, federated through IAS</LI><LI>Authentication is mandatory before opening any DIV wallet or accessing the DIV provisioning interface</LI></OL><P><STRONG>Authorization</STRONG>:</P><OL><LI>Define which employees can open which wallet tenants (e.g., finance employees cannot access HR credential wallets)</LI><LI>Define which administrators from the manufacturer can provision wallet tenants</LI><LI>Define which administrators from partner organizations (like gearbox supplier) can manage their own supplier wallets</LI><LI>Map corporate roles to predefined DIV user roles and permissions</LI></OL><P><STRONG>Outcome:</STRONG></P><P>The manufacturer maintains full control over user identities, access rights, and administrative boundaries while enabling seamless integration with partner organizations’ identity systems using IAS.</P><H3 id="toc-hId-344655557">&nbsp;</H3><H1 id="toc-hId--110023386">Read more</H1><P><span class="lia-unicode-emoji" title=":right_arrow:">➡️</span>&nbsp; &nbsp;Continue with <STRONG><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/part-2-creating-and-accessing-an-ias-tenant-on-sap-btp/ba-p/14302873" target="_self">Creating and Accessing an IAS Tenant on SAP BTP (Part 2)</A></STRONG></P><P><span class="lia-unicode-emoji" title=":right_arrow:">➡️</span><span class="lia-unicode-emoji" title=":right_arrow:">➡️</span>&nbsp; &nbsp;Jump to&nbsp;<A href="https://community.sap.com/t5/technology-blog-posts-by-sap/connecting-ias-with-sap-decentralized-identity-verification-part-3/ba-p/14302941" target="_self"><STRONG>Connecting IAS with SAP Decentralized Identity Verification (Part 3)</STRONG></A></P><P>&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/introduction-to-sap-decentralized-identity-verification-div-and-related-ssi/ba-p/14226121" target="_self">Introduction to SAP Decentralized Identity Verification (DIV) and Related SSI Blog Posts</A>&nbsp;</LI><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/self-sovereign-identity-ssi-a-usage-catalyst-for-data-spaces/ba-p/14054162" target="_self">Self-Sovereign Identity (SSI): A Usage Catalyst for Data Spaces</A>&nbsp;</LI><LI><A href="https://help.sap.com/docs/DECENTRALIZED_IDENTITY_VERIFICATION/ffd0e76d13f5453bbc3839e15a2b95f4/95924fe9ff474fdfae2f8d0611fa4c61.html?locale=en-US" target="_self" rel="noopener noreferrer">Feature Scope Description for Decentralized Identity Verification (help page)</A></LI><LI><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-is-identity-authentication?locale=en-US" target="_self" rel="noopener noreferrer">What Are Cloud Identity Services? (help page)</A></LI></UL> 2026-01-20T12:16:13.294000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/connecting-ias-with-decentralized-identity-verification-div-part-3/ba-p/14302941 Connecting IAS with Decentralized Identity Verification (DIV) (Part 3) 2026-01-23T10:29:29.783000+01:00 juliaSchiebelbein https://community.sap.com/t5/user/viewprofilepage/user-id/1618051 <P>In <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/why-ias-is-essential-for-enterprise-div-implementations-part-1/ba-p/14302808" target="_self"><STRONG>Part 1</STRONG></A>, the role of SAP Cloud Identity Services – Identity Authentication (IAS) as the central identity layer for Decentralized Identity Verification (DIV) was introduced.<BR />In <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/creating-and-accessing-an-ias-tenant-on-sap-btp-part-2/ba-p/14302873" target="_self"><STRONG>Part 2</STRONG></A>, an IAS tenant was created and made accessible on SAP BTP.</P><P>This article completes the setup by <STRONG>connecting the IAS tenant to DIV</STRONG>, explaining how authentication and authorization are enforced, and showing how administrators and end users are granted access to DIV provisioning and wallet tenants.</P><P>&nbsp;</P><H1 id="toc-hId-1658599237">Authentication and Authorization Overview</H1><P>Once IAS is connected to DIV, <STRONG>all access to DIV components is mediated by IAS</STRONG>. This applies to both:</P><UL><LI><STRONG>DIV Provisioning UI</STRONG> (administrative access)</LI><LI><STRONG>DIV Wallet Tenants</STRONG> (end-user access)</LI></UL><P>During authentication, IAS performs two checks:</P><OL><LI><STRONG>Authentication</STRONG>&nbsp;by verifying the user’s identity via the federated corporate identity provider</LI><LI><STRONG>Authorization</STRONG>&nbsp;by validating whether the authenticated user is allowed to access the requested DIV tenant or application</LI></OL><P>Only if both checks succeed access is granted.</P><P>This model ensures that authentication and authorization decisions are consistently enforced across the DIV components.</P><P>&nbsp;</P><H1 id="toc-hId-1462085732">Step 1: Starting DIV Provisioning via SAP for Me</H1><P>The connection between DIV and IAS is established during the <STRONG>DIV provisioning process</STRONG> in SAP for Me.</P><P>In SAP for Me, navigate to&nbsp;<STRONG>Systems &amp; Provisioning → Provisioning</STRONG></P><P>The <EM>Provisioning</EM> tab lists all systems that can be provisioned for the account. In the section <STRONG>“Systems to be Provisioned”</STRONG>, a <STRONG>Start Provisioning</STRONG> button is available (Figure 1).</P><P>Selecting this option initiates the provisioning workflow for DIV.</P><P><EM><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="juliaSchiebelbein_0-1767795101242.png" style="width: 640px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/359029i41ADE3B2B5D17759/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="juliaSchiebelbein_0-1767795101242.png" alt="juliaSchiebelbein_0-1767795101242.png" /></span></EM></P><P><EM>Figure 1:&nbsp;SAP for Me - Systems &amp; Provisioning - Provisioning</EM></P><P>&nbsp;</P><P>During the provisioning process for DIV, an IAS tenant must be selected. The provisioning screen displays the available <STRONG>SAP Cloud Identity Services tenants</STRONG>. This might be the URL created during the previous blog article.</P><P>Typically, the default IAS tenant associated with the BTP global account is selected (Figure 2). Once confirmed, the provisioning request can be submitted. After a short processing time, the provisioning status changes from <EM>requested</EM> to <EM>provided</EM>. The DIV Provisioning Service becomes available and is automatically linked to the selected IAS tenant.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="juliaSchiebelbein_5-1767796231610.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/359046iAB6A0486FA2EB0D2/image-size/large?v=v2&amp;px=999" role="button" title="juliaSchiebelbein_5-1767796231610.png" alt="juliaSchiebelbein_5-1767796231610.png" /></span></P><P><EM>Figure 2:&nbsp;SAP for Me - Start New Provisioning Request</EM></P><P>&nbsp;</P><H1 id="toc-hId-1265572227">Step 2: IAS Application Created for DIV</H1><P>As part of the provisioning process, an <STRONG>IAS application</STRONG> representing the DIV service is automatically created and linked to the corresponding BTP subaccount.&nbsp;This application functions as the technical anchor point for all authentication and authorization decisions related to DIV.</P><P>In the IAS Admin Console, this application appears under <STRONG>Applications &amp; Resources</STRONG>, grouped under the relevant BTP subaccount (Figure 3).</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="juliaSchiebelbein_4-1767796179163.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/359045i99F10A12CFF919AD/image-size/large?v=v2&amp;px=999" role="button" title="juliaSchiebelbein_4-1767796179163.png" alt="juliaSchiebelbein_4-1767796179163.png" /></span></P><P><EM>Figure 3:&nbsp;DIV application automatically created in the IAS Admin Console and linked to the corresponding SAP BTP subaccount.</EM></P><P>&nbsp;</P><H1 id="toc-hId-1069058722">Step 3: Restricting Application Access in IAS</H1><P>By default, IAS applications can be configured with different access modes. For enterprise DIV deployments, access must be restricted.</P><P>In the <U>IAS Admin Console</U>:</P><OL><LI>Open the DIV application (Figure 4)</LI><LI>Navigate to the <STRONG>Authentication and Access</STRONG> tab</LI><LI>Select <STRONG>Private</STRONG> access mode</LI></OL><P>The <EM>Private</EM> option ensures that:</P><UL><LI>Users cannot self-register</LI><LI>Only users explicitly imported or provisioned are allowed to authenticate</LI></UL><P>This setting is mandatory for controlled, enterprise-grade DIV deployments.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="juliaSchiebelbein_6-1767796525454.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/359047iA8336F046759E0A7/image-size/large?v=v2&amp;px=999" role="button" title="juliaSchiebelbein_6-1767796525454.png" alt="juliaSchiebelbein_6-1767796525454.png" /></span></P><P><EM>Figure 4:&nbsp;Configuration of application access mode for the DIV application in IAS</EM></P><P>&nbsp;</P><H1 id="toc-hId-872545217">Step 4: Authorization Model for DIV</H1><P>IAS enforces authorization separately for:</P><UL><LI>DIV Provisioning UI</LI><LI>DIV Wallet Tenants</LI></UL><P>This separation enables fine-grained access control and clear separation of duties.</P><P>&nbsp;</P><H2 id="toc-hId-805114431">DIV Provisioning Authorization</H2><P>The following user groups are created in the IAS tenant by default:</P><UL><LI><P><STRONG>DIV_Provisioning_Admin</STRONG></P></LI><LI><STRONG>DIV_Provisioning_Viewer</STRONG></LI></UL><P>Only users assigned to these groups are able to access provisioning functions such as tenant creation, configuration, and user management.</P><P>&nbsp;</P><H2 id="toc-hId-608600926">DIV Wallet Authorization</H2><P>For wallet access, IAS restricts users to <STRONG>specific wallet tenants</STRONG>. Even if authentication succeeds, access is denied if the user is not authorized for the requested tenant.</P><P>This prevents lateral access between departments or partner organizations in multi-tenant environments.</P><P>&nbsp;</P><H1 id="toc-hId-283004702">Step 5: Importing Users and Assigning Roles in IAS</H1><P>Users must be explicitly imported into IAS and assigned to the appropriate DIV-related groups.</P><P>In the IAS Admin Console:</P><OL><LI>Navigate to <STRONG>Users &amp; Authorizations</STRONG></LI><LI>Select the DIV application</LI><LI>Choose <STRONG>Import Users</STRONG> and upload a CSV file (Figure 5)</LI></OL><P>The CSV file contains user attributes such as:</P><UL><LI><STRONG>Status</STRONG> (mandatory)</LI><LI>First name</LI><LI><STRONG>Last name</STRONG> (mandatory)</LI><LI><STRONG>Email address&nbsp;</STRONG>(mandatory)</LI><LI>Group memberships</LI></UL><P>More CSV file attributes are listed and described on the&nbsp;<A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/import-or-update-users-for-specific-application?locale=en-US" target="_self" rel="noopener noreferrer">SAP Cloud Identity Services help page</A>.</P><P>An example CSV file includes a <EM>groups</EM> column containing DIV-specific roles (Table 1). These group assignments determine whether a user receives provisioning access, wallet access, or both.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="juliaSchiebelbein_7-1767796807953.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/359065iE8AE98BD2DCB1AD4/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="juliaSchiebelbein_7-1767796807953.png" alt="juliaSchiebelbein_7-1767796807953.png" /></span></P><P><EM>Figure 5:&nbsp;User and authorization management for the DIV application in the IAS Admin Console, including user import via CSV</EM></P><P>&nbsp;</P><TABLE border="1" width="100%"><TBODY><TR><TD width="20%"><STRONG>status</STRONG></TD><TD width="20%"><STRONG>firstName</STRONG></TD><TD width="20%"><STRONG>lastName</STRONG></TD><TD width="20%"><STRONG>mail</STRONG></TD><TD width="20%"><STRONG>groups</STRONG></TD></TR><TR><TD>active</TD><TD>John</TD><TD>Doe</TD><TD>john.doe@sap.com</TD><TD>"DIV_System_Administrator, DIV_Application_Administrator"&nbsp;</TD></TR><TR><TD>active</TD><TD>Jane</TD><TD>Doe</TD><TD>jane.doe@sap.com</TD><TD>"DIV_Application_User"</TD></TR></TBODY></TABLE><P><EM>Table 1:&nbsp;Example CSV file used to import users into IAS with assigned DIV-specific authorization groups</EM></P><P>&nbsp;</P><H1 id="toc-hId-86491197">Step 6: Authentication and Access Enforcement</H1><P>When a user attempts to access a DIV component, IAS performs an authorization check.</P><P>For example, when accessing the <STRONG>DIV Provisioning UI</STRONG>, the user is first redirected to IAS. The authentication screen displays the associated BTP subaccount and requests credentials (Figure 7).</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="juliaSchiebelbein_11-1767797100719.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/359071i77CB75D51C6E850F/image-size/medium/is-moderation-mode/true?v=v2&amp;px=400" role="button" title="juliaSchiebelbein_11-1767797100719.png" alt="juliaSchiebelbein_11-1767797100719.png" /></span></P><P><EM>Figure 7:&nbsp;IAS authentication and authorization check triggered when accessing the DIV Provisioning UI</EM></P><P>&nbsp;</P><P>Only if:</P><UL><LI>Authentication via the corporate identity provider succeeds, and</LI><LI>The user belongs to a group authorized for the requested application,</LI></UL><P>is access granted and the user redirected back to DIV.</P><P>&nbsp;</P><H1 id="toc-hId--110022308">Resulting Architecture and Security Model</H1><P>After completing the steps described above, the following architecture and security characteristics are in place:</P><UL><LI>IAS acts as the <STRONG>single authentication entry point</STRONG> for all DIV components</LI><LI>Corporate identity providers remain the source of user identities</LI><LI>Authorization is centrally enforced through IAS groups and role assignments</LI><LI>Administrative and end-user access paths are clearly separated at the application level</LI><LI>Multi-tenant isolation is consistently enforced</LI></UL><P>The trust relationship between the SAP BTP subaccount and IAS is established during provisioning and configuration. At runtime, IAS issues authentication tokens containing group claims. These tokens are validated directly by the DIV applications based on the preconfigured trust.</P><P>The result is a <STRONG>secure, scalable, and enterprise-ready DIV setup</STRONG> aligned with real-world organizational structures (Figure 8).</P><P><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="AuthFlow-DIVIAS-HighLevel (1).png" style="width: 613px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/359333iF833F6BE04285463/image-size/large?v=v2&amp;px=999" role="button" title="AuthFlow-DIVIAS-HighLevel (1).png" alt="AuthFlow-DIVIAS-HighLevel (1).png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P><EM>Figure 8:&nbsp;High-level authentication and authorization flow for DIV using IAS</EM></P><P>&nbsp;</P><P><span class="lia-unicode-emoji" title=":light_bulb:">💡</span>This concludes the three-part series on integrating <STRONG>SAP Cloud Identity Services – Identity Authentication</STRONG> with<STRONG>&nbsp;Decentralized Identity Verification</STRONG>.</P><P>&nbsp;</P><H1 id="toc-hId-463204270">Read more</H1><P><span class="lia-unicode-emoji" title=":left_arrow:">⬅️</span><STRONG>&nbsp; &nbsp;</STRONG>Go back to <STRONG><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/creating-and-accessing-an-ias-tenant-on-sap-btp-part-2/ba-p/14302873" target="_self">Creating and Accessing an IAS Tenant on SAP BTP&nbsp;(Part 2)</A></STRONG></P><P><span class="lia-unicode-emoji" title=":left_arrow:">⬅️</span><span class="lia-unicode-emoji" title=":left_arrow:">⬅️</span>&nbsp; &nbsp;Go back to <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/why-ias-is-essential-for-enterprise-div-implementations-part-1/ba-p/14302808" target="_self"><STRONG>Why IAS Is Essential for Enterprise DIV Implementations (Part 1)</STRONG></A></P><P>&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/introduction-to-sap-decentralized-identity-verification-div-and-related-ssi/ba-p/14226121" target="_self">Introduction to SAP Decentralized Identity Verification (DIV) and Related SSI Blog Posts</A>&nbsp;</LI><LI><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/self-sovereign-identity-ssi-a-usage-catalyst-for-data-spaces/ba-p/14054162" target="_self">Self-Sovereign Identity (SSI): A Usage Catalyst for Data Spaces</A>&nbsp;</LI><LI><A href="https://help.sap.com/docs/DECENTRALIZED_IDENTITY_VERIFICATION/ffd0e76d13f5453bbc3839e15a2b95f4/95924fe9ff474fdfae2f8d0611fa4c61.html?locale=en-US" target="_self" rel="noopener noreferrer">Feature Scope Description for Decentralized Identity Verification (DIV help page)</A></LI><LI><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-is-identity-authentication?locale=en-US" target="_self" rel="noopener noreferrer">What Are Cloud Identity Services? (IAS help page)</A></LI><LI><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/import-or-update-users-for-specific-application?locale=en-US" target="_self" rel="noopener noreferrer">Import or Update Users for a Specific Application (IAS help page)</A></LI></UL> 2026-01-23T10:29:29.783000+01:00 https://community.sap.com/t5/spend-management-blog-posts-by-sap/discovering-the-power-of-sap-cloud-identity-services-with-sap-fieldglass/ba-p/14316792 Discovering the Power of SAP Cloud Identity Services with SAP Fieldglass 2026-01-28T14:03:44.923000+01:00 ClaudiaLima https://community.sap.com/t5/user/viewprofilepage/user-id/1645250 <P><SPAN>SAP Cloud Identity Services (SCI) is a central cloud identity suite on&nbsp;Business Technology Platform&nbsp;(BTP)&nbsp;that helps companies to easily manage users on-boarding and application services.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>It offers comprehensive single sign-on and encryption across organizational and technical boundaries, but not only this.&nbsp;It’s&nbsp;comprised of a few different components, it’s a broader application that covers more than just single sign-on into applications.</SPAN><SPAN>&nbsp;</SPAN></P><P><STRONG>Benefits to&nbsp;Using SCI</STRONG></P><P><SPAN>SAP Cloud Identity Services offer several benefits for managing identities, authorizations, and&nbsp;Single&nbsp;Sign-On (SSO) across cloud and on-premise solutions.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Key advantages include:</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>Seamless Single Sign-On: Provides a unified SSO experience across systems using standards like SAML 2.0 and OpenID Connect, simplifying user access to multiple applications.</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Integration&nbsp;flexibility: Supports integration with both SAP and non-SAP systems, allowing for centralized user and group management.</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Data&nbsp;persistence and&nbsp;privacy: Provides a central repository for managing users and groups while ensuring compliance with data privacy regulations.</SPAN></LI></UL><P><SPAN><SPAN class=""><SPAN class="">One of SCI's main features is the Identity Authentication Service (IAS). This feature focuses on providing secure user access to applications, and it offers a range of tools to enhance security, such as password policies, multi-factor authentication, and risk-based authentication.</SPAN></SPAN><SPAN class="">&nbsp;</SPAN></SPAN></P><P><STRONG>The Role of IAS&nbsp;</STRONG></P><P><SPAN>IAS plays a&nbsp;crucial&nbsp;role in critical areas, which are:</SPAN><SPAN>&nbsp;</SPAN></P><OL><LI><STRONG><SPAN>User&nbsp;management:</SPAN></STRONG><SPAN> IAS efficiently manages user accounts and disseminates user data to various SAP cloud applications, including SAP Fieldglass</SPAN><SPAN>.&nbsp;</SPAN></LI><LI><STRONG><SPAN>Login&nbsp;management:</SPAN></STRONG><SPAN> Every time users access the SAP Fieldglass URL, they are directed to the SAP IAS. This service then verifies the user’s identity either through single sign-on with the buyer’s own&nbsp;identity management system&nbsp;or by using a username and password.&nbsp;</SPAN><SPAN>&nbsp;&nbsp;</SPAN></LI><LI><STRONG><SPAN>Authentication:</SPAN></STRONG><SPAN>&nbsp;</SPAN><SPAN>IAS facilitates the authentication process, ensuring that users are who they claim to be. This can be done through various methods such as passwords, biometrics, or tokens</SPAN><SPAN>.&nbsp;</SPAN></LI><LI><STRONG><SPAN>Authorization:</SPAN></STRONG><SPAN>&nbsp;</SPAN><SPAN>Beyond just authenticating users, IAS also manages authorization by controlling access to resources based on user roles, attributes, and policies. This ensures that users can only access what they are permitted to.</SPAN><SPAN>&nbsp;</SPAN></LI></OL><P><STRONG>Pre-requisites for IAS</STRONG><SPAN>&nbsp;</SPAN></P><P><SPAN>In order to use IAS, you first need:</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>A BTP&nbsp;license</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Bundles (a group of pre-configured products and services that are sold together)</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Tenant Provisioning&nbsp;(SAP Fieldglass&nbsp;is&nbsp;automatically&nbsp;provisioned. This speeds up the entire process to get up and running)</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><STRONG>Subscribing to SAP Cloud Identity Services</STRONG><SPAN>&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>If you already have&nbsp;the SAP Fieldglass solution,&nbsp;you can start using SAP Cloud Identity Services at no extra cost by subscribing to it in the SAP Business Technology Platform.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>See&nbsp;<A class="" href="https://d.dam.sap.com/a/KzNbC6j/Cloud_Identity_Services__CIS__-_Identity_Authentication_Services__IAS_.pdf?rc=67&amp;inline=true" target="_blank" rel="noreferrer noopener"><SPAN class=""><SPAN class="">Identity Authentication Services (IAS) for SAP Fieldglass</SPAN></SPAN></A>&nbsp;to learn how to</SPAN><SPAN>&nbsp;subscribe to SCI and add the SAP FG&nbsp;application to SCI.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN><STRONG>Integration</STRONG>&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>SAP is continually integrating SCI into an increasing number of its applications. This integration is crucial as SAP’s product suite evolves, ensuring centralized management of user profiles and streamlining the integration process with SAP’s offerings.&nbsp;You need to have SCI in order to use the following features:</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><A href="https://help.sap.com/docs/SAP_Fieldglass/80b8ccad6f7f4591936ed7d6beea4529/4906e776acd94908b1d19513cbe6599f.html?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>Embedded Analytics and Analytics Add-on</SPAN></A><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><A href="https://www.sap.com/products/data-cloud/cloud-analytics.html" target="_blank" rel="noopener noreferrer"><SPAN>SAP Analytics Cloud (SAC)</SPAN></A><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><A href="https://help.sap.com/docs/task-center?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>SAP Task Center</SPAN></A><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><A href="https://help.sap.com/docs/joule?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>Joule</SPAN></A><SPAN>&nbsp;</SPAN></LI></UL><P><SPAN>By integrating SCI, you gain access to Joule's intelligent automation capabilities, simplifying access to information and automating business processes, thereby enhancing productivity.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Joule uses Identity Authentication for user login and Identity Provisioning to manage user identities and their authorizations across various business applications.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>The&nbsp;<A class="" href="https://help.sap.com/docs/SAP_FIELDGLASS_INTEGRATION/3a206fd25e62405f8659ffc38a00859a/2d05e4033b154be487ebf29728ff7d72.html?locale=en-US" target="_blank" rel="noreferrer noopener"><SPAN class=""><SPAN class="">Identity Provisioning</SPAN></SPAN></A><SPAN class=""><SPAN class="">&nbsp;</SPAN><SPAN class="">help</SPAN></SPAN><SPAN class=""><SPAN class="">s</SPAN></SPAN></SPAN><SPAN>&nbsp;you provision identities and their authorizations to various business applications. It enables customers to set up faster and more efficient administration of user onboarding and offboarding, and its benefits are:</SPAN><SPAN>&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>Automatic set up of&nbsp;user accounts and authorizations</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Optimized&nbsp;for SAP cloud applications</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>The reuse of existing&nbsp;on-premise&nbsp;and cloud user&nbsp;stores</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Jointly working with the SAP Identity Management product</SPAN><SPAN>&nbsp;</SPAN>&nbsp;</LI></UL><P><STRONG>Start&nbsp;Using SCI Today!</STRONG><SPAN>&nbsp;</SPAN></P><P><SPAN>Do not miss all the benefits you can get using SAP SCI!&nbsp;It’s&nbsp;not just a tool for identity management,&nbsp;it’s&nbsp;a strategic asset that simplifies and enhances how you manage user profiles across your SAP cloud applications. By integrating SCI, you unlock numerous benefits, including cost-effectiveness, unified identity management, and simplified connectivity, ultimately leading to a more efficient and productive SAP environment.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>&nbsp;</SPAN></P><P><STRONG>See Also</STRONG><SPAN>&nbsp;</SPAN></P><P><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-is-identity-authentication?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>What Are Cloud Identity Services</SPAN></A><SPAN>&nbsp;</SPAN></P><P><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/configuration-sap-fieldglass-sso-with-sap-cloud-identity-services-identity/ba-p/13747208" target="_blank"><SPAN>Configuration SAP Fieldglass SSO with SAP Cloud Identity Services Identity</SPAN></A><SPAN>&nbsp;</SPAN></P> 2026-01-28T14:03:44.923000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/retrieving-users-and-groups-via-scim-integrating-sap-ariba-with-sap-cloud/ba-p/14318420 Retrieving Users and Groups via SCIM: Integrating SAP Ariba with SAP Cloud Identity Services 2026-01-30T18:06:25.352000+01:00 JianZhu https://community.sap.com/t5/user/viewprofilepage/user-id/146662 <P><STRONG><FONT size="5">SAP Ariba SCIM API </FONT></STRONG></P><P>The SAP Ariba SCIM API is a REST API based on the SCIM (System for Cross-domain Identity Management) 2.0 specification. It is intended for use as an interface between SAP Ariba cloud solutions and SAP Cloud Identity Services to transfer user information as part of user management.</P><H2 id="prerequisites" id="toc-hId-1788779355"><FONT size="4"><SPAN>Prerequisites</SPAN></FONT></H2><P class="">To call the methods of this SAP Ariba SCIM API you must have SAP Ariba Procurement or Strategic Sourcing Realms.</P><P><FONT size="4"><STRONG>ACCESS SAP Ariba APIs</STRONG></FONT></P><P>1. Access SAP Ariba APIs :&nbsp;<A href="https://developer.ariba.com/api/home" target="_blank" rel="noopener nofollow noreferrer">https://developer.ariba.com/api/home</A></P><P>2. Select the right <STRONG>Data Center</STRONG> where your SAP Ariba Realms located, in my case is Japan Data Center:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_0-1769760847114.png" style="width: 640px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367288iE499CD95607973E9/image-dimensions/640x533?v=v2" width="640" height="533" role="button" title="JianZhu_0-1769760847114.png" alt="JianZhu_0-1769760847114.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_1-1769760951165.png" style="width: 641px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367289iD4612B126129F359/image-dimensions/641x445?v=v2" width="641" height="445" role="button" title="JianZhu_1-1769760951165.png" alt="JianZhu_1-1769760951165.png" /></span></P><P>3. To find the API Specs, click Discover, fill the right solution, <STRONG>Procurement</STRONG> or <STRONG>Strategic Sourcing</STRONG>, search the page with&nbsp;<STRONG>SCIM API for User and Group Master Data</STRONG>&nbsp;and click.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_2-1769761591183.png" style="width: 641px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367293iD6E03A8EF239BD46/image-dimensions/641x365?v=v2" width="641" height="365" role="button" title="JianZhu_2-1769761591183.png" alt="JianZhu_2-1769761591183.png" /></span></P><P>4. Now we will request SCIM API. Go to <STRONG>Manage</STRONG>, click + to&nbsp;Create a New Application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_3-1769761784651.png" style="width: 639px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367295i033BE8D99D9B644B/image-dimensions/639x329?v=v2" width="639" height="329" role="button" title="JianZhu_3-1769761784651.png" alt="JianZhu_3-1769761784651.png" /></span></P><P>5. Fill necessary information and click <STRONG>submit</STRONG>:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_4-1769761838893.png" style="width: 640px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367296i827757B60E2B4755/image-dimensions/640x384?v=v2" width="640" height="384" role="button" title="JianZhu_4-1769761838893.png" alt="JianZhu_4-1769761838893.png" /></span></P><P>6. Application created, you can click <STRONG>Action</STRONG>&nbsp;and then click <STRONG>Request API Access</STRONG>, then select the SCIM API and select SAP Ariba Realms that you want to retrieve data from. Then click <STRONG>Submit</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_5-1769762185897.png" style="width: 642px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367297i8D403A73C3D3ED1D/image-dimensions/642x601?v=v2" width="642" height="601" role="button" title="JianZhu_5-1769762185897.png" alt="JianZhu_5-1769762185897.png" /></span></P><P>7. Screen shows as below and auto-Approval will happen in about 1 day:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_6-1769762325694.png" style="width: 649px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367298i4EA3C22FC2C79043/image-dimensions/649x326?v=v2" width="649" height="326" role="button" title="JianZhu_6-1769762325694.png" alt="JianZhu_6-1769762325694.png" /></span></P><P>&nbsp;</P><P><SPAN>8. Once approved, click Actions and click Generate Auth Secret. Note down them and will be used in API.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_0-1769762660406.png" style="width: 645px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367300i3975A92CABDB5C47/image-dimensions/645x309?v=v2" width="645" height="309" role="button" title="JianZhu_0-1769762660406.png" alt="JianZhu_0-1769762660406.png" /></span></P><P><STRONG><FONT size="4">CALL&nbsp;SAP Ariba SCIM API</FONT></STRONG></P><P>1. My personal preference is to test post and get in PowerShell and once it works ok, configure in Postman or Bruno to have a more filtered or formatted view of the result. Now open PowerShell:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_1-1769791052371.png" style="width: 643px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367471iA949E73D22F6BBE1/image-dimensions/643x233?v=v2" width="643" height="233" role="button" title="JianZhu_1-1769791052371.png" alt="JianZhu_1-1769791052371.png" /></span></P><P>2. Type below into powershell to post and get the Access_Token:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_0-1769783657336.png" style="width: 643px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367406iAF1C99129605574F/image-dimensions/643x118?v=v2" width="643" height="118" role="button" title="JianZhu_0-1769783657336.png" alt="JianZhu_0-1769783657336.png" /></span></P><P>3. Enter and you will find the necessary access token and token type as below, note them down:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_1-1769783697113.png" style="width: 645px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367407i29622A2B2E75C662/image-dimensions/645x169?v=v2" width="645" height="169" role="button" title="JianZhu_1-1769783697113.png" alt="JianZhu_1-1769783697113.png" /></span></P><P>4. Now use the access token above to type below command, enter and all users will be listed as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_2-1769783918060.png" style="width: 643px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367410iCEA179A78772EC38/image-dimensions/643x164?v=v2" width="643" height="164" role="button" title="JianZhu_2-1769783918060.png" alt="JianZhu_2-1769783918060.png" /></span></P><P>Now all necessary info to call SCIM and retrieve user and group data is ready.&nbsp;</P><P><FONT size="4"><STRONG>CALL&nbsp;SAP Ariba SCIM API in Bruno</STRONG></FONT></P><P>1. Change to Bruno UI, create a new request, select Type as <STRONG>HTTP</STRONG>&nbsp;, fill <STRONG>Request Name</STRONG> , select <STRONG>URL</STRONG>&nbsp; with <STRONG>POST&nbsp;</STRONG>and fill the&nbsp;<STRONG>URL</STRONG>, then click <STRONG>Create</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_5-1769785344796.png" style="width: 597px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367427i266F063D26352D85/image-dimensions/597x431?v=v2" width="597" height="431" role="button" title="JianZhu_5-1769785344796.png" alt="JianZhu_5-1769785344796.png" /></span></P><P>2. Go to Headers, configure <STRONG>Content-Type</STRONG> as <STRONG>application/x-www-form-urlencoded</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_6-1769785551404.png" style="width: 609px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367428iCCC562CEC1A715C7/image-dimensions/609x343?v=v2" width="609" height="343" role="button" title="JianZhu_6-1769785551404.png" alt="JianZhu_6-1769785551404.png" /></span></P><P>3. Then go to params, configure below 3 attributes:</P><P><STRONG>grant_type :&nbsp;client_credentials</STRONG></P><P><STRONG>client_id : Oauth Client Id</STRONG></P><P><STRONG>client_secret : Oauth Secret Generated</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_7-1769786132321.png" style="width: 647px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367429i42E97BE68F9B77C5/image-dimensions/647x218?v=v2" width="647" height="218" role="button" title="JianZhu_7-1769786132321.png" alt="JianZhu_7-1769786132321.png" /></span></P><P>4. Run the request and note down the <STRONG>access_token</STRONG>:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_8-1769786226309.png" style="width: 640px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367430iDA6E0D283C805341/image-dimensions/640x168?v=v2" width="640" height="168" role="button" title="JianZhu_8-1769786226309.png" alt="JianZhu_8-1769786226309.png" /></span></P><P>&nbsp;</P><P>5. Create a new request, select Type as <STRONG>HTTP</STRONG>&nbsp;, fill <STRONG>Request Name</STRONG> , select <STRONG>URL</STRONG>&nbsp; with <STRONG>GET</STRONG> and <STRONG>URL</STRONG>, then click <STRONG>Create</STRONG>.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_3-1769784146582.png" style="width: 647px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367412i99CE260A6BEC8EC5/image-dimensions/647x363?v=v2" width="647" height="363" role="button" title="JianZhu_3-1769784146582.png" alt="JianZhu_3-1769784146582.png" /></span></P><P>6. Go to <STRONG>Headers</STRONG>, fill below four attributes:</P><P><STRONG>Authorization :&nbsp;&lt;token_type&gt; &lt;access_token&gt;</STRONG></P><P><STRONG>apiKey : Application API Key</STRONG></P><P><STRONG>x-anId : Realm ANID *for test with -T</STRONG></P><P><STRONG>Accept :&nbsp;application/scim+json</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_4-1769785029643.png" style="width: 634px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367424iD26979FB592A6E08/image-dimensions/634x194?v=v2" width="634" height="194" role="button" title="JianZhu_4-1769785029643.png" alt="JianZhu_4-1769785029643.png" /></span></P><P>7. Run the request, you can see more formatted data as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_9-1769786414338.png" style="width: 641px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367432i15973146CA76B404/image-dimensions/641x370?v=v2" width="641" height="370" role="button" title="JianZhu_9-1769786414338.png" alt="JianZhu_9-1769786414338.png" /></span></P><P>8. Based on the specs below, you can search more data with filters etc.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_10-1769786619515.png" style="width: 634px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367434iB751D404E9423BA4/image-dimensions/634x431?v=v2" width="634" height="431" role="button" title="JianZhu_10-1769786619515.png" alt="JianZhu_10-1769786619515.png" /></span></P><P>For example, you want to get User with email address equals below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_0-1769787346677.png" style="width: 647px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367443i55CC1E46F90A723E/image-dimensions/647x369?v=v2" width="647" height="369" role="button" title="JianZhu_0-1769787346677.png" alt="JianZhu_0-1769787346677.png" /></span></P><P>9. You can also retrieve all group data as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_2-1769791449161.png" style="width: 636px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367472i2F4C521FEAACF840/image-dimensions/636x368?v=v2" width="636" height="368" role="button" title="JianZhu_2-1769791449161.png" alt="JianZhu_2-1769791449161.png" /></span></P><P>&nbsp;</P><H1 id="toc-hId-1463183131">Identity Directory API (CIS - IdDS)</H1><P><SPAN>Manage users, groups and custom schemas in the cloud. Help Portal :&nbsp;<A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/identity-directory-scim-rest-api" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/identity-directory-scim-rest-api</A></SPAN></P><H2 id="prerequisites" id="toc-hId-1395752345"><FONT size="4"><SPAN>Prerequisites</SPAN></FONT></H2><P class="">To call the methods of this SCIM REST API you must have a system as administrator with an assigned<SPAN>&nbsp;</SPAN><SPAN class="">Manage Users</SPAN><SPAN>&nbsp;</SPAN>role.&nbsp;</P><P class=""><STRONG><FONT size="4">API SPECS</FONT></STRONG></P><P>Please find detailed API info from here :&nbsp;<A href="https://api.sap.com/api/IdDS_SCIM/overview" target="_blank" rel="noopener noreferrer">https://api.sap.com/api/IdDS_SCIM/overview</A>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_12-1769789905111.png" style="width: 647px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367463iF04772528A1D39A8/image-dimensions/647x326?v=v2" width="647" height="326" role="button" title="JianZhu_12-1769789905111.png" alt="JianZhu_12-1769789905111.png" /></span></P><P>&nbsp;</P><P><STRONG><FONT size="4">ACCESS&nbsp;Identity Directory API:</FONT></STRONG></P><P>Make sure you are Administrator User in CIS - idDS:</P><P>1. Administrator can login to CIS via link :&nbsp;<A href="https://XXXX.accounts.ondemand.com/admin/" target="_blank" rel="noopener nofollow noreferrer">https://&lt;Tenant ID&gt;.accounts.ondemand.com/admin/</A></P><P>2. To check other Administrators, click and select as below:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_1-1769788213912.png" style="width: 638px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367445iCB8058E8C7249747/image-dimensions/638x381?v=v2" width="638" height="381" role="button" title="JianZhu_1-1769788213912.png" alt="JianZhu_1-1769788213912.png" /></span></P><P>3. Call API via PowerShell by typing as below, click enter and you will see all users.</P><P><STRONG>-u UserID:Password</STRONG></P><P><STRONG>-H "Accept: application/scim+json" `</STRONG></P><P><STRONG>-H "Content-Type: application/scim+json" </STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_2-1769788515099.png" style="width: 648px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367448iF9208C5685215D6E/image-dimensions/648x119?v=v2" width="648" height="119" role="button" title="JianZhu_2-1769788515099.png" alt="JianZhu_2-1769788515099.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_3-1769788650504.png" style="width: 645px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367449i5477AE3602054702/image-dimensions/645x149?v=v2" width="645" height="149" role="button" title="JianZhu_3-1769788650504.png" alt="JianZhu_3-1769788650504.png" /></span></P><P>4. Now use Bruno to get better formatted result. Create a Request as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_4-1769788881387.png" style="width: 652px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367450i6AAF32D10966EB1C/image-dimensions/652x475?v=v2" width="652" height="475" role="button" title="JianZhu_4-1769788881387.png" alt="JianZhu_4-1769788881387.png" /></span></P><P>5. Clich <STRONG>Auth</STRONG>, then select <STRONG>Basic Auth</STRONG>&nbsp;from dropdown list, Fill UserName and password with your Administrator(User) email address and password.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_6-1769789203286.png" style="width: 647px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367452iDDD67458B5404EB9/image-dimensions/647x317?v=v2" width="647" height="317" role="button" title="JianZhu_6-1769789203286.png" alt="JianZhu_6-1769789203286.png" /></span></P><P>6. Click Headers, configure&nbsp;<STRONG>Accept</STRONG>&nbsp;and <STRONG>Content-Type</STRONG>&nbsp;as&nbsp;<STRONG>application/scim+json</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_7-1769789275527.png" style="width: 648px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367455i11878F63DF0293D6/image-dimensions/648x339?v=v2" width="648" height="339" role="button" title="JianZhu_7-1769789275527.png" alt="JianZhu_7-1769789275527.png" /></span></P><P>7. Execute and all users of CIS(IdDS) retrieved as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_8-1769789454605.png" style="width: 645px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367457i80CE821DA1555B8F/image-dimensions/645x378?v=v2" width="645" height="378" role="button" title="JianZhu_8-1769789454605.png" alt="JianZhu_8-1769789454605.png" /></span></P><P>8. Add filter based on user Login Name, execute then you can see the user has been extracted:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_10-1769789777416.png" style="width: 647px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367461i71C1A4B23CCD1C83/image-dimensions/647x383?v=v2" width="647" height="383" role="button" title="JianZhu_10-1769789777416.png" alt="JianZhu_10-1769789777416.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_11-1769789812035.png" style="width: 648px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367462i22311CEC3DDBF8D5/image-dimensions/648x375?v=v2" width="648" height="375" role="button" title="JianZhu_11-1769789812035.png" alt="JianZhu_11-1769789812035.png" /></span></P><P>9. You can also retrieve group data by filter as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_4-1769791665343.png" style="width: 638px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367474i392B1A60D564CEAC/image-dimensions/638x233?v=v2" width="638" height="233" role="button" title="JianZhu_4-1769791665343.png" alt="JianZhu_4-1769791665343.png" /></span></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JianZhu_5-1769791781389.png" style="width: 637px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367475i668329B85BC8886F/image-dimensions/637x360?v=v2" width="637" height="360" role="button" title="JianZhu_5-1769791781389.png" alt="JianZhu_5-1769791781389.png" /></span></P><P>&nbsp;</P><P><STRONG><FONT size="5">Summary</FONT></STRONG></P><P>This blog walked through how to retrieve user and group master data using <STRONG>SCIM 2.0 APIs</STRONG> from both <STRONG><SPAN class=""><SPAN class="">SAP Ariba</SPAN></SPAN></STRONG> and <STRONG><SPAN class=""><SPAN class="">SAP Cloud Identity Services</SPAN></SPAN> (Identity Directory / IdDS)</STRONG>—a foundational requirement for user provisioning and synchronization scenarios.</P><P>Instead of introducing the full functionality of <STRONG>Identity Provisioning Service (IPS)</STRONG>, the focus was placed on the <STRONG>practical API calls</STRONG> that IPS relies on internally: how to access the API specifications, request API access, authenticate, and retrieve users and groups using SCIM-compliant endpoints. Both <STRONG>PowerShell</STRONG> and <STRONG>Bruno</STRONG> were used to demonstrate how to call these APIs and inspect responses in a structured and readable way.</P><P>By understanding how SAP Ariba and Identity Directory expose identity data through SCIM—along with supported filters, attributes, and authentication mechanisms—you gain deeper insight into <STRONG>IPS properties, mappings, and transformations</STRONG>. This knowledge is especially critical when enabling <STRONG>SAP Ariba Joule</STRONG>, where accurate user and group synchronization across SAP Ariba, SAP Cloud Identity Services, and SAP Build Work Zone is essential.</P><P>In short, mastering these SCIM APIs is not just about calling endpoints—it is about building a solid foundation for reliable identity integration in SAP’s AI-driven and Business AI–focused landscape.</P> 2026-01-30T18:06:25.352000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/custom-domain-service-in-sap-btp-build-work-zone-standard-edition/ba-p/14314511 Custom Domain Service in SAP BTP Build Work Zone (Standard Edition) 2026-02-03T06:12:27.191000+01:00 RohitGera https://community.sap.com/t5/user/viewprofilepage/user-id/7607 <P>Hello Everyone,</P><P>After analyzing and successfully implementing <STRONG>Custom Domain Service</STRONG> in <STRONG>SAP Build Work Zone, Standard Edition</STRONG>, I’m writing this blog to share my learnings. This post explains the <STRONG>concept of Custom Domain Service in SAP BTP</STRONG> and provides <STRONG>end-to-end steps</STRONG> to configure and use it with SAP Build Work Zone.</P><P>This blog will help you get started with <STRONG>SAP Custom Domain Service</STRONG> in <STRONG>SAP BTP Build Work Zone (Standard Edition)</STRONG>.</P><P>&nbsp;</P><H2 id="toc-hId-1788661122">Business Requirement</H2><P>Our client required the use of a <STRONG>custom (client-specific) domain</STRONG> instead of the <STRONG>SAP standard domain</STRONG>.</P><P>By default, when accessing an SAP Build Work Zone site, the URL looks like this:</P><PRE><CODE>https://&lt;SubAccount&gt;.launchpad.cfapps.&lt;DataCenter&gt;.hana.ondemand.com/site/&lt;site-alias&gt;#Shell-home</CODE></PRE><P>(Here, we are using <STRONG>SAP Build Work Zone – Standard Edition</STRONG>.). We can use it for advanced edition too.</P><P>The requirement was to replace this with a <STRONG>client-friendly URL</STRONG>, for example:</P><PRE><CODE>https://abc.com OR https://abcservices.abc.com</CODE></PRE><P>We initially tried redirecting traffic from<BR /><CODE><A href="https://abcservices.abc.com" target="_blank" rel="noopener nofollow noreferrer">https://abcservices.abc.com</A></CODE> to the SAP BTP Work Zone URL.<BR />However, this approach didn’t meet the requirement because:</P><UL><LI><P>Network-level redirection works, but</P></LI><LI><P>The browser address bar changes to the SAP BTP URL,</P></LI><LI><P>The client URL (<CODE><A href="https://abcservices.abc.com" target="_blank" rel="noopener nofollow noreferrer">https://abcservices.abc.com</A></CODE>) is no longer visible.</P></LI></UL><P>To solve this, we implemented <STRONG>SAP Custom Domain Service</STRONG>.</P><P>&nbsp;</P><H2 id="toc-hId-1592147617">Prerequisites</H2><P>Before starting the configuration, ensure the following prerequisites are met:</P><H3 id="toc-hId-1524716831">1. Enable Custom Domain Service</H3><P>Add <STRONG>Custom Domain Service</STRONG> to your <STRONG>subaccount</STRONG> with the <STRONG>Standard</STRONG> plan.</P><BLOCKQUOTE><P>Note: Another plan exists but is deprecated at the time of writing this blog.</P></BLOCKQUOTE><P><STRONG>SAP Help Document:</STRONG><BR /><A href="https://help.sap.com/docs/custom-domain/custom-domain-manager/initial-setup" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/custom-domain/custom-domain-manager/initial-setup</A></P><P>Below is the screen shot from sub account for reference:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_0-1769766584396.png" style="width: 680px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367327iF67382972CABCD82/image-dimensions/680x128?v=v2" width="680" height="128" role="button" title="RohitGera_0-1769766584396.png" alt="RohitGera_0-1769766584396.png" /></span></P><P>Please note SAP will charge based on how many certificate you have uploaded in the Cusotm Domain Manager irrespective of Number of Custom Domain.</P><P>&nbsp;</P><H3 id="toc-hId-1328203326">2. Finalize Reserved and Custom Domains</H3><P>Finalize your <STRONG>reserved domain</STRONG> and <STRONG>custom domains</STRONG> in advance.</P><P><STRONG>Do’s:</STRONG></P><UL><LI><P>Do not rush this step.&nbsp;</P></LI><LI><P>Finalize domains separately for <STRONG>Non-Prod (DEV &amp; QA)</STRONG> and <STRONG>Prod</STRONG> subaccounts.</P></LI><LI><P>Changing domains later can be complex and time-consuming.</P></LI></UL><P><STRONG>Dont’s:</STRONG></P><UL><LI>Do not signed the CSR form Trusted CA authority because it involved cost and time.&nbsp;</LI><LI>If possible dont configure the Non Prod and Prod Custom domain in single custom domain manager because it will mess the things. Try to keep the Custom Domain Service for Production seperately.</LI><LI>Dont configure the Custom Domain Manager for Production untill you get success in the Non Prod environment.</LI><LI>&nbsp;</LI></UL><H3 id="toc-hId-1131689821">3. Runtime Destination Naming</H3><P>Ensure the <STRONG>runtime destination names</STRONG> are finalized as per project standards, as these are referenced by applications.</P><P>&nbsp;</P><H2 id="toc-hId-806093597">Implementation Steps</H2><H3 id="toc-hId-738662811">Step 1: Define a Default Site</H3><P>A <STRONG>default site</STRONG> is the site that opens when no site ID is specified in the URL.</P><P>Key points:</P><UL><LI><P>A default site is configured <STRONG>per custom domain</STRONG>.</P></LI><LI><P>It does <STRONG>not</STRONG> affect all domains in the subaccount.</P></LI><LI><P>A custom domain can be mapped to only <STRONG>one entry point</STRONG>, which is why it’s mapped to the <STRONG>default site</STRONG> and not to a specific site. Below is the screen shot of the default site:</P></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_1-1769767006507.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367339i272B63F06D9A7C11/image-size/medium?v=v2&amp;px=400" role="button" title="RohitGera_1-1769767006507.png" alt="RohitGera_1-1769767006507.png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><H3 id="toc-hId-542149306">Step 2: Identify the Reserved Domain</H3><P>The <STRONG>reserved domain</STRONG> should be the <STRONG>parent domain</STRONG>, for example:</P><PRE><CODE>abc.com or abcservices.abc.com</CODE></PRE><P>The <STRONG>custom domain</STRONG> is created using the reserved domain, such as:</P><PRE><CODE>wz.abcservices.abc.com</CODE></PRE><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_2-1769767132424.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367340i0B87C53C0FE7B467/image-size/medium?v=v2&amp;px=400" role="button" title="RohitGera_2-1769767132424.png" alt="RohitGera_2-1769767132424.png" /></span></P><P>&nbsp;</P><H3 id="toc-hId-345635801">Step 3: Define Custom Domains for Applications</H3><P>Create custom domains for the following applications as needed:</P><OL><LI><P><STRONG>SAP Build Work Zone</STRONG></P></LI><LI><P><STRONG>On-Premise Backend Systems</STRONG> (S/4HANA, CRM, BW, etc.) – <EM>Optional</EM></P></LI><LI><P><STRONG>Identity Authentication Service (IAS)</STRONG> – <EM>Optional</EM></P></LI></OL><BLOCKQUOTE><P>IAS works with the SAP standard domain by default. A custom domain for IAS is optional.</P></BLOCKQUOTE><H4 id="toc-hId-278205015">IAS Considerations</H4><P>In our case, we did <STRONG>not</STRONG> configure a custom domain for IAS because:</P><UL><LI><P>IAS requires a separate CSR and CA-signed certificate.</P></LI><LI><P>This involves additional cost.</P></LI><LI><P>Wildcard certificates used in Custom Domain Manager <STRONG>do not work for IAS</STRONG>.</P></LI></UL><P><STRONG>Reference Documents:</STRONG></P><UL><LI><P><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/use-custom-domain-in-identity-authentication" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/use-custom-domain-in-identity-authentication</A></P></LI><LI><P><A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/regional-availability?version=Cloud" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/regional-availability?version=Cloud</A></P></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_3-1769767311802.png" style="width: 794px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367342i55A7F4ECD9A52254/image-dimensions/794x261?v=v2" width="794" height="261" role="button" title="RohitGera_3-1769767311802.png" alt="RohitGera_3-1769767311802.png" /></span></P><P>&nbsp;</P><H3 id="toc-hId--122622578">Step 4: Configure Custom Domain Manager</H3><P>Add the <STRONG>reserved domain</STRONG> and <STRONG>custom domains</STRONG> in <STRONG>Custom Domain Manager</STRONG>.</P><H4 id="toc-hId--612539090">Required Roles:</H4><P>Assign the following roles to the user (Default or Custom IAS):</P><UL><LI><P><STRONG>Custom Domain Administrator</STRONG> – Manage configurations</P></LI><LI><P><STRONG>Custom Domain Viewer</STRONG> – View configurations</P></LI></UL><P>Once roles are assigned, you can access <STRONG>Custom Domain Manager</STRONG> from the subaccount.</P><H3 id="toc-hId--515649588">&nbsp;</H3><H3 id="toc-hId--712163093">Step 5: Create SaaS Routes</H3><P>Create a <STRONG>SaaS route</STRONG> for each custom domain.<BR />These routes act as redirection endpoints for:</P><UL><LI><P>SAP Build Work Zone</P></LI><LI><P>Backend systems (if applicable)</P></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_4-1769767538312.png" style="width: 751px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367343i212651F7AB4CCB1D/image-dimensions/751x252?v=v2" width="751" height="252" role="button" title="RohitGera_4-1769767538312.png" alt="RohitGera_4-1769767538312.png" /></span></P><P>&nbsp;</P><H3 id="toc-hId--908676598">Step 6: Create TLS Configuration</H3><P>Create a <STRONG>TLS configuration</STRONG> for secure communication.</P><P><STRONG>SAP Help Document:</STRONG><BR /><A href="https://help.sap.com/docs/custom-domain/custom-domain-manager/manage-tls-configurations" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/custom-domain/custom-domain-manager/manage-tls-configurations</A></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_0-1770095743175.png" style="width: 721px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368389iD08C164C486F3758/image-dimensions/721x292?v=v2" width="721" height="292" role="button" title="RohitGera_0-1770095743175.png" alt="RohitGera_0-1770095743175.png" /></span></P><H3 id="toc-hId--1105190103">Step 7: Generate CSR (Certificate Signing Request)</H3><P>Generate a <STRONG>CSR</STRONG> from Custom Domain Manager and get it signed by a <STRONG>trusted Certificate Authority (CA)</STRONG>.</P><H4 id="toc-hId--1595106615">CSR Generation Options</H4><P><STRONG>Option A: Individual Certificates</STRONG><BR />Generate one CSR per domain, for example:</P><UL><LI><P><CODE>s4.abcservices.abc.com</CODE></P></LI><LI><P><CODE>crm.abcservices.abc.com</CODE></P></LI><LI><P><CODE>bw.abcservices.abc.com</CODE></P></LI></UL><P><STRONG>Option B: Wildcard Certificate</STRONG><BR />Generate a wildcard CSR:</P><PRE><CODE>CN: *.abcservices.abc.com SAN: *.abcservices.abc.com, abcservices.abc.com</CODE></PRE><H4 id="toc-hId--1791620120">Certificate Signing Guidelines</H4><UL><LI><P><STRONG>Internal network</STRONG> → Internal CA is acceptable and all the applicaiton will work.</P></LI><LI><P><STRONG>Public access</STRONG> → Internal CA will cause browser warnings as below and navigation to the backend&nbsp;</P></LI><LI><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_0-1770289776904.png" style="width: 730px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/369147iD0C82EE0588CE3CF/image-dimensions/730x301?v=v2" width="730" height="301" role="button" title="RohitGera_0-1770289776904.png" alt="RohitGera_0-1770289776904.png" /></span></P><P>&nbsp;</P><P>Use a trusted CA like <STRONG>DigiCert&nbsp;</STRONG>if you want to access the custom domain publically.</P><P>&nbsp;</P></LI></UL><P><STRONG>Important Notes:</STRONG></P><UL><LI><P>Verify <STRONG>CN and SAN</STRONG> before submitting CSR.</P></LI><LI><P>Certificates are valid <STRONG>only for the Custom Domain Manager instance</STRONG> from which the CSR was generated.</P></LI><LI><P>Non-Prod certificates cannot be reused in Prod.</P></LI><LI>We have generated the Wild Card Certificate for Production and Single Certificate (Included all SAN) for Non Prod System. Below is the Certificate Screen shot:</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_1-1770095804785.png" style="width: 729px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368390iF1D61E742E487AE9/image-dimensions/729x279?v=v2" width="729" height="279" role="button" title="RohitGera_1-1770095804785.png" alt="RohitGera_1-1770095804785.png" /></span></P><P>&nbsp;</P><P><STRONG>DigiCert Reference:</STRONG><BR /><A href="https://docs.digicert.com/en/certcentral/manage-certificates/reissue-an-ssl-tls-certificate.html" target="_blank" rel="noopener nofollow noreferrer">https://docs.digicert.com/en/certcentral/manage-certificates/reissue-an-ssl-tls-certificate.html</A></P><H3 id="toc-hId--1694730618">&nbsp;</H3><H3 id="toc-hId--1891244123">(Optional) IAS CSR Generation</H3><P>Wildcard certificates <STRONG>do not work</STRONG> for IAS.<BR />A separate CSR and certificate are required.</P><BLOCKQUOTE><P>We skipped IAS custom domain due to additional cost and renewal overhead.</P></BLOCKQUOTE><H3 id="toc-hId--1919573937">&nbsp;</H3><H3 id="toc-hId--2116087442">Step 8: Upload and Activate Certificate</H3><P>Once signed, upload the certificate to <STRONG>Custom Domain Manager</STRONG>.</P><P>The certificate package includes:</P><UL><LI><P>Actual certificate</P></LI><LI><P>Intermediate certificate</P></LI><LI><P>Root certificate</P></LI></UL><H4 id="toc-hId-1688963342">Certificate Chain Format</H4><PRE><CODE>Actual Certificate + Intermediate Certificate + Root Certificate</CODE></PRE><P><STRONG>Tips:</STRONG></P><UL><LI><P>Combine the full chain in a text file.</P></LI><LI><P>Remove extra spaces or blank lines.</P></LI><LI><P>Activate the certificate after upload.</P></LI></UL><P>Once activated:</P><UL><LI><P>Certificate expiry days are visible.</P></LI><LI><P>Renewal can be planned proactively.</P></LI></UL><P>&nbsp;</P><H2 id="toc-hId-2079255851">Final Result</H2><P>After successful activation, SAP Build Work Zone is accessible using the custom domain:</P><PRE><CODE>https://wz.abccompany.company.com</CODE></PRE><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_7-1769767998071.png" style="width: 744px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367348iBDC5C3EF8C1F5AB0/image-dimensions/744x388?v=v2" width="744" height="388" role="button" title="RohitGera_7-1769767998071.png" alt="RohitGera_7-1769767998071.png" /></span></P><P>&nbsp;</P><P><STRONG>Errors that can occur: </STRONG>After all the configuration,&nbsp;If you stuck in the IAS authentication while accessing the work zone and getting the below error then add the custom domain in the IAS application:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_1-1770290146587.png" style="width: 620px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/369150iC32C59E05990BEF7/image-dimensions/620x245?v=v2" width="620" height="245" role="button" title="RohitGera_1-1770290146587.png" alt="RohitGera_1-1770290146587.png" /></span></P><P>&nbsp;</P><P>Add you custom domain in the following path in the IAS if not came automatically:</P><P>Login to IAS -&gt; Applications &amp; Resources -&gt; Applications -&gt; Select the Application of Build Work Zone -&gt; Single Sign On -&gt; OpenID Connet Configuraiton and then in the&nbsp;<STRONG>Redirect URIs </STRONG>and<STRONG>Post Logout Redirect URIs&nbsp;</STRONG>section add the URl as&nbsp;<STRONG>https://*.abcservices.abc.ae/**&nbsp;</STRONG>(Your custom domain so that IAS will trust this domain)</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_2-1770290505147.png" style="width: 699px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/369153i9EA8DF7B7FA4BAC4/image-dimensions/699x365?v=v2" width="699" height="365" role="button" title="RohitGera_2-1770290505147.png" alt="RohitGera_2-1770290505147.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RohitGera_4-1770290594863.png" style="width: 700px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/369156i336613B50C700C5C/image-dimensions/700x366?v=v2" width="700" height="366" role="button" title="RohitGera_4-1770290594863.png" alt="RohitGera_4-1770290594863.png" /></span></P><P>&nbsp;</P><H2 id="toc-hId-1882742346">Conclusion</H2><P>I hope this blog helps you understand the <STRONG>Custom Domain Service</STRONG> concept and implement it successfully in <STRONG>SAP Build Work Zone</STRONG> projects.</P><P>Happy learning and implementing! <span class="lia-unicode-emoji" title=":rocket:">🚀</span></P><P>&nbsp;</P><P><STRONG>Regards,</STRONG><BR /><STRONG>Rohit Gera</STRONG></P> 2026-02-03T06:12:27.191000+01:00 https://community.sap.com/t5/spend-management-blog-posts-by-sap/ai-readiness-you-don-t-need-an-orchestra-yet-you-need-a-steady-bass-line/ba-p/14322456 AI Readiness: You don’t need an orchestra yet, you need a steady bass line 2026-02-05T19:01:46.690000+01:00 AliaDouglas https://community.sap.com/t5/user/viewprofilepage/user-id/151389 <P><STRONG><EM>&nbsp;</EM></STRONG>Any other big music fans in the procurement world out there? I know I am. And while I like music from most genres, what I really love is some intricate symphonic soul, like Isaac Hayes, or Curtis Mayfield. Strings, horns, keys, even a vibraphone. I get caught up in all the different sounds, the complex chords, how it all comes together.&nbsp; But a real groove needs a great bass line. If that one thing is off, the whole production feels wrong.</P><P>That’s how a lot of my customer conversations on AI in procurement feel lately. Everyone’s focusing on those extras – AI assistants, instant answers and insights, getting to talk to AI like a person, and shiny demos of the vast possibilities with SAP Joule. And while those things DO matter, and they are the end goal, without that steady bassline carrying us through, those other sounds won’t land the way they’re supposed to.</P><P><STRONG><BR /><FONT color="#333333">So what’s the bass line in SAP AI?</FONT></STRONG></P><P>In SAP landscapes, a solid foundation comes down to a few important things.</P><UL><LI>Clean, consistent identity and access (IAS)</LI><LI>Reliable integrations and flows of data (BTP)</LI><LI>And, incredibly important, clear ownership and usable data in systems like Ariba</LI></UL><P>When identity is fragmented, data between systems becomes inconsistent, or processes start to vary depending on who’s involved and who’s taking action. When this happens, AI doesn’t become on-beat and insightful, it becomes…improvisational, like jazz (but not in the good way, more the kind that just feels like chaos). We need to feel the rhythm first, since procurement is often where we see issues show up first.</P><P>Maybe your suppliers don’t line up across systems. Or risk is managed in a separate system, and doesn’t connect to anything today. And, likely the most common thing we hear, users work around the process because it’s faster than doing it the right way.</P><P>These things aren’t always a technology problem, but more of a rhythm problem.&nbsp; Which is why building the foundation (bass line) is so important.</P><P>How are others laying down the groove and actually making progress? A few ways:</P><OL><LI><STRONG>Standardizing across their SAP applications:</STRONG>&nbsp; This doesn’t mean everything has to be identical or locked down overnight. It usually starts much more simply: agreeing on how users authenticate, how suppliers are identified, and which system is the source of truth for what. When different SAP applications each have their own rules, logins, and data assumptions, things get out of sync fast. Standardization is what keeps the rhythm steady across the landscape instead of constantly drifting off-beat.<BR /><BR /></LI><LI><STRONG>Building strong integrations through BTP:&nbsp; </STRONG>BTP is often talked about in very abstract terms, but in practice, this is about making sure data can move cleanly and predictably between systems. For procurement, this mostly means having supplier data flow consistently between Ariba and your ERP, risk info actually connecting back to suppliers, and integrations that are monitored and understood. When those integrations are brittle or one-off, that means AI is going to make guesses. We don’t want that.<BR /><BR /></LI><LI><STRONG>Cleaning up supplier lifecycles and ownership in Ariba:</STRONG>&nbsp; Who owns onboarding? Who makes updates to supplier data? If you’re thinking, “It depends,” then that’s where problems likely start. Clarifying ownership of supplier lifecycles in Ariba doesn’t just improve data quality, rather it makes downstream automation and AI insights far more reliable.<BR /><BR /></LI><LI><STRONG>Making processes easy enough that users can follow them:</STRONG>&nbsp; If a process is technically correct but painful in practice, users will work around it. Simplifying steps, reducing exceptions, and designing for how people actually work is part of the composition.<BR /><BR /></LI><LI><STRONG>Policies in place that are actually enforced, both internally and with suppliers:</STRONG>&nbsp; Policies only help if they show up in the systems people use every day. When rules are enforced inconsistently (or not at all), data quality erodes, as does trust in the system.</LI></OL><P>That’s it, that’s the groove. Once you find this rhythm, the rest of the instruments can shine, take solos, and please a crowd. With that foundation, AI features become easier to adopt, and give better insights, and automation helps to <EM>reduce</EM> work, improve cycle time, ensure compliance, and other things you care about, instead of just confusing the people who actually have to use it.</P><P>&nbsp;</P> 2026-02-05T19:01:46.690000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/q4-2025-quarterly-release-highlights-sap-btp-security-and-identity-amp/ba-p/14324273 Q4 2025 Quarterly Release Highlights: SAP BTP Security and Identity & Access Management 2026-02-10T09:00:00.021000+01:00 RegineSchimmer https://community.sap.com/t5/user/viewprofilepage/user-id/8286 <P><SPAN>In the last quarter of 2025, we release a number of new features, as well as the SAP Key Management Service.</SPAN></P><P><SPAN>Want the full overview for SAP Cloud Identity Services? You’ll find a list of all new feature announcements for SAP Cloud Identity Services in the <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-s-new-for-identity-authentication" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services Release Notes</A> on the SAP Help Portal. </SPAN></P><H2 id="toc-hId-1789581948"><SPAN>SAP Cloud Identity Services: Use Data Control Language (DCL) to Define Authorization Policies</SPAN></H2><P><SPAN>Developers define authorization policies in&nbsp;SAP Cloud Identity Services, using an SQL-like language - the data control language (DCL). Administrators can restrict base policies and combine authorization policies into a new authorization policy. For more details, please check the <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/data-control-language-dcl" target="_blank" rel="noopener noreferrer">SAP Help Portal</A>. </SPAN></P><H2 id="toc-hId-1593068443"><SPAN>SAP Key Management Service</SPAN></H2><P><SPAN>We released the <A href="https://help.sap.com/docs/SAP_Key_Management_Service?locale=en-US" target="_blank" rel="noopener noreferrer"><STRONG>SAP Key Management Service (KMS)</STRONG></A>, which puts customers in control of their data across SAP cloud services and products. By managing their own encryption keys, customers decide exactly who can access their information. </SPAN></P><P><SPAN>With SAP KMS</SPAN><SPAN>, data remains inaccessible to any external party, including SAP, government agencies, or legal authorities, unless the customer explicitly authorizes access. The service enables customers to securely create, manage, and control the encryption keys used to protect their data, and helps ensure that encryption and decryption can occur only with their approval. </SPAN></P><H2 id="toc-hId-1396554938"><SPAN>SAP Cryptographic Library</SPAN></H2><P><SPAN>The latest <STRONG>SAP Cryptographic Library</STRONG> release (version 8.6) supports quantum-safe cryptography and contains updated compliance certifications. It introduces a quantum-safe TLS 1.3 handshake using a hybrid key exchange that protects encrypted communications even against future quantum attacks. </SPAN></P><P><SPAN>In addition, SAP’s FIPS crypto kernel has achieved FIPS 140-3 certification, meeting strict security requirements for regulated industries. Together, these enhancements help customers future-proof their data protection while maintaining compliance. For more information, check our latest <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/new-version-8-6-of-the-sap-cryptographic-library-with-quantum-safe/ba-p/14280039" target="_blank">blog </A>&nbsp;as well as release notes <A href="https://me.sap.com/notes/3685428" target="_blank" rel="noopener noreferrer">3685428 - Fixes and features in CommonCryptoLib 8.6.2</A> and <A href="https://me.sap.com/notes/1848999" target="_blank" rel="noopener noreferrer">1848999 - Central Note for CommonCryptoLib 8 (SAPCRYPTOLIB)</A>.</SPAN></P><H2 id="toc-hId-1200041433"><SPAN>Application Vulnerability Report for SAP BTP</SPAN></H2><P><SPAN>Frequent security issues in open-source components endanger business data in applications. Use the&nbsp;application vulnerability report&nbsp;to detect and remediate any vulnerabilities in your SAP BTP landscape. The&nbsp;application vulnerability report&nbsp;focuses on detecting publicly-known security vulnerabilities based on Common Vulnerabilities and Exposures (CVEs). It's crucial to solve such vulnerabilities quickly as attackers are generally aware of them and might try to break into vulnerable systems. Check our <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/beta-version-of-application-vulnerability-report-for-sap-btp-now-available/ba-p/14283839" target="_blank">blog</A> for details.</SPAN></P><H2 id="toc-hId-1003527928"><SPAN>Stay connected</SPAN></H2><P><SPAN>Want to stay up to date on our services? Join our <A href="https://pages.community.sap.com/topics/btp-security" target="_blank" rel="noopener noreferrer">SAP BTP Security</A> and <A href="https://pages.community.sap.com/topics/cloud-identity-services" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services</A> communities!&nbsp; </SPAN></P><P><SPAN>&nbsp;</SPAN></P><P>&nbsp;</P> 2026-02-10T09:00:00.021000+01:00 https://community.sap.com/t5/tooling-sap-build-blog-posts/joule-studio-enablement-guide/ba-p/14336951 Joule Studio Enablement Guide 2026-02-26T06:12:49.948000+01:00 I578473 https://community.sap.com/t5/user/viewprofilepage/user-id/2233288 <H1 id="JouleStudioEnablementGuide-📑TableofContents" id="toc-hId-1661488995"><STRONG><span class="lia-unicode-emoji" title=":bookmark_tabs:">📑</span></STRONG><STRONG><SPAN>&nbsp;</SPAN>Table of Contents</STRONG></H1><OL><LI><STRONG><SPAN>Overview</SPAN></STRONG></LI><LI><STRONG><SPAN>Use Case &amp; Mission Description</SPAN></STRONG></LI><LI><STRONG><SPAN>Prerequisites</SPAN></STRONG></LI><LI><STRONG><SPAN>Setting Up SAP Build for Joule Studio</SPAN></STRONG></LI><LI><STRONG><SPAN>Required Subscriptions &amp; Instances in BTP</SPAN></STRONG></LI><LI><STRONG><SPAN>Mandatory Roles &amp; Role Collections</SPAN></STRONG></LI><LI><STRONG><SPAN>Ensuring Required Subscriptions Are Available</SPAN></STRONG></LI><LI><STRONG><SPAN>Adding Missing Cloud Identity Service (Additional Tenant)</SPAN></STRONG></LI><LI><STRONG><SPAN>Formation Creation (Mandatory for Joule Integration)</SPAN></STRONG></LI><LI><STRONG><SPAN>Enablement Complete</SPAN></STRONG></LI></OL><P><SPAN>&nbsp;</SPAN></P><H1 id="JouleStudioEnablementGuide-1.Overview" id="toc-hId-1464975490"><STRONG>1. Overview</STRONG></H1><P>Joule Studio is SAP’s platform to build<SPAN>&nbsp;</SPAN><STRONG><SPAN>Joule Agents</SPAN></STRONG>,<SPAN>&nbsp;</SPAN><STRONG><SPAN>Joule Skills</SPAN></STRONG>, and integrate enterprise AI capabilities directly into SAP applications. It is part of<SPAN>&nbsp;</SPAN><STRONG><SPAN>SAP Build</SPAN></STRONG>, enabling teams to create and extend business applications and AI solutions with built-in governance and clean core alignment.</P><P><SPAN>&nbsp;</SPAN></P><H1 id="JouleStudioEnablementGuide-2.UseCase&amp;MissionDescription" id="toc-hId-1268461985"><STRONG>2. Use Case &amp; Mission Description</STRONG></H1><UL><LI>Joule Studio is activated</LI><LI>Required BTP services are set up</LI><LI>Identity and trust between Joule and IAS are configured</LI><LI>Administrators can deploy Joule agents</LI><LI>Developers can create Joule Skills, Document Grounding, and integrate custom APIs</LI></UL><H1 id="JouleStudioEnablementGuide-3.Prerequisites" id="toc-hId-1071948480"><STRONG>3. Prerequisites</STRONG></H1><P>To activate Joule Studio, the following must be fulfilled:</P><H3 id="JouleStudioEnablementGuide-RequiredEntitlements" id="toc-hId-1133600413"><STRONG>Required Entitlements</STRONG></H3><UL><LI>SAP Build Process Automation — Subscriptions(<STRONG><SPAN>build_default)</SPAN></STRONG></LI><LI>Joule — Subscriptions(<STRONG><SPAN>standard)</SPAN></STRONG></LI><LI>SAP Cloud Identity Services — Subscriptions(<STRONG><SPAN>additional-tenant)</SPAN></STRONG></LI></UL><H1 id="JouleStudioEnablementGuide-📑TableofContents" id="toc-hId-678921470"><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-02-25 at 4.03.42 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/377144i182200E806F3AC3F/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2026-02-25 at 4.03.42 PM.png" alt="Screenshot 2026-02-25 at 4.03.42 PM.png" /></span></STRONG></H1><H3 id="" id="toc-hId-740573403"><STRONG>Cloud Identity Services (Mandatory)</STRONG></H3><P>IAS is required for:</P><UL><LI>Authentication</LI><LI>SSO</LI><LI>Authorization management</LI><LI>Trust configuration for Joule</LI></UL><P>If you do not have IAS, you must create a new tenant.</P><P><SPAN>&nbsp;</SPAN></P><H1 id="JouleStudioEnablementGuide-5.SettingUpSAPBuildforJouleStudio" id="toc-hId-285894460"><STRONG>4. Setting Up SAP Build for Joule Studio</STRONG></H1><P>Standalone activation of:</P><UL><LI>Joule</LI><LI>SAP Build Process Automation</LI></UL><P><SPAN>&nbsp;</SPAN></P><H1 id="JouleStudioEnablementGuide-SAPBTPBoosters/Subscriptions" id="toc-hId-89380955">SAP BTP Boosters/Subscriptions</H1><P>Boosters automate service activation.<BR />Navigate:</P><P><STRONG><SPAN>Global Account → Boosters&nbsp;</SPAN></STRONG><SPAN>or Create Subscriptions of each of the plans given.</SPAN></P><P>Use the following:</P><UL><LI>“<STRONG><SPAN>Set Up SAP Build Process Automation</SPAN></STRONG>”</LI><LI>“<STRONG><SPAN>Set Up Joule</SPAN></STRONG>”</LI></UL><P>Each booster/Subscriptions:</P><UL><LI>Assigns roles</LI><LI>Creates role collections</LI><LI>Subscribes necessary services</LI></UL><P><SPAN>&nbsp;</SPAN></P><H1 id="JouleStudioEnablementGuide-6.RequiredSubscriptions&amp;InstancesinBTP" id="toc-hId--107132550"><STRONG>5. Required Subscriptions &amp; Instances in BTP</STRONG></H1><H3 id="JouleStudioEnablementGuide-Mandatory" id="toc-hId--120711986"><STRONG>Mandatory</STRONG></H3><DIV class=""><TABLE><TBODY><TR><TD><P><STRONG><SPAN>Service</SPAN></STRONG></P></TD><TD><P><STRONG><SPAN>Plan</SPAN></STRONG></P></TD><TD><P><STRONG><SPAN>Required For</SPAN></STRONG></P></TD></TR><TR><TD><P><STRONG>SAP Build Process Automation</STRONG></P></TD><TD><P><SPAN>build_default</SPAN></P></TD><TD><P><SPAN>Joule Studio backend</SPAN></P></TD></TR><TR><TD><P><STRONG>Joule</STRONG></P></TD><TD><P><SPAN>standard</SPAN></P></TD><TD><P><SPAN>Joule Studio AI</SPAN></P></TD></TR><TR><TD><P><STRONG>SAP Cloud Identity Services</STRONG></P></TD><TD><P><SPAN>Additional-Tenant</SPAN></P></TD><TD><P><SPAN>Authentication, SSO</SPAN></P></TD></TR></TBODY></TABLE></DIV><P><SPAN>&nbsp;</SPAN></P><H1 id="JouleStudioEnablementGuide-7.MandatoryRoles&amp;RoleCollections" id="toc-hId-269580523"><STRONG>6. Mandatory Roles &amp; Role Collections</STRONG></H1><P>The Joule Booster<SPAN>&nbsp;</SPAN><STRONG><SPAN>does NOT create</SPAN></STRONG><SPAN>&nbsp;</SPAN>a role collection.</P><P>You MUST manually create one:</P><H3 id="JouleStudioEnablementGuide-CreateRoleCollection" id="toc-hId--513738996"><STRONG>Create Role Collection</STRONG></H3><OL><LI>Subaccount →<SPAN>&nbsp;</SPAN><STRONG><SPAN>Security → Role Collections</SPAN></STRONG></LI><LI>Click<SPAN>&nbsp;</SPAN><STRONG><SPAN>Create</SPAN></STRONG></LI><LI>Name it: Joule_Role_Collection</LI></OL><H3 id="JouleStudioEnablementGuide-AddRoles" id="toc-hId--710252501"><STRONG>Add Roles</STRONG></H3><P>Navigate to:<BR /><STRONG><SPAN>Security → Role Collections → Joule_Role_Collection → Edit</SPAN></STRONG></P><P>Add:</P><UL><LI>extensibility_developer</LI><LI>end_user</LI></UL><P>Save.</P><H3 id="JouleStudioEnablementGuide-AssigntoYourUser" id="toc-hId--906766006"><STRONG>Assign to Your User</STRONG></H3><P>Security →<SPAN>&nbsp;</SPAN><STRONG><SPAN>Users</SPAN></STRONG><BR />Assign:<SPAN>&nbsp;</SPAN><STRONG><SPAN>Joule_Role_Collection</SPAN></STRONG></P><P><SPAN>&nbsp;</SPAN></P><H1 id="JouleStudioEnablementGuide-8.EnsureAllRequiredSubscriptionsAreVisibleintheSystems" id="toc-hId--516473497"><STRONG>7. Ensure All Required Subscriptions Are Visible in the Systems</STRONG></H1><P>Under:<BR /><STRONG>Global A</STRONG><STRONG><SPAN>ccount →</SPAN><SPAN>&nbsp;</SPAN></STRONG><STRONG><SPAN>System Landscape → Systems</SPAN></STRONG></P><P>Confirm:</P><UL><LI>Joule (standard)</LI><LI>SAP Build Process Automation (build_default)</LI><LI>SAP Cloud Identity Services (Additional Tenant)*</LI></UL><P>(*) If missing, add manually (next section).</P><P><SPAN>&nbsp;</SPAN></P><H1 id="" id="toc-hId--712987002"><STRONG>8. Adding Cloud Identity Service (Additional Tenant)</STRONG></H1><P>If IAS additional tenant is not visible:</P><H3 id="JouleStudioEnablementGuide-Navigate:" id="toc-hId--1496306521"><SPAN>Navigate:</SPAN></H3><P><STRONG><SPAN>Global Account → System Landscape → Systems → Service Owner View</SPAN></STRONG></P><P>Click<SPAN>&nbsp;</SPAN><STRONG><SPAN>Add System</SPAN></STRONG></P><H3 id="JouleStudioEnablementGuide-Enter:" id="toc-hId--1692820026"><SPAN>Enter:</SPAN></H3><UL><LI><STRONG><SPAN>System Type:</SPAN></STRONG><SPAN>&nbsp;</SPAN>SAP Cloud Identity Services</LI><LI><STRONG><SPAN>System Name:</SPAN></STRONG><SPAN>&nbsp;</SPAN>any name</LI><LI><STRONG><SPAN>CLD Tenant ID:</SPAN></STRONG><SPAN>&nbsp;</SPAN>IAS tenant ID</LI></UL><H3 id="JouleStudioEnablementGuide-FindingCLDTenantID" id="toc-hId--1889333531"><SPAN>Finding CLD Tenant ID</SPAN></H3><P>Use Cloud Reporting:</P><P><span class="lia-unicode-emoji" title=":small_blue_diamond:">🔹</span><SPAN>&nbsp;</SPAN><STRONG><SPAN>Live Landscape</SPAN></STRONG><BR /><A class="" href="https://reporting.ondemand.com/sap/crp/cdo?query=xxx&amp;type=crp_search" target="_blank" rel="nofollow noopener noreferrer">https://reporting.ondemand.com/sap/crp/cdo?query=xxx&amp;type=crp_search</A></P><P><span class="lia-unicode-emoji" title=":small_blue_diamond:">🔹</span><SPAN>&nbsp;</SPAN><STRONG><SPAN>Canary Landscape</SPAN></STRONG><BR /><A class="" href="https://spc-vlab.ondemand.com/sap/crp/cdo?query=xxx&amp;type=crp_search" target="_blank" rel="nofollow noopener noreferrer">https://spc-vlab.ondemand.com/sap/crp/cdo?query=xxx&amp;type=crp_search</A></P><P>Replace<SPAN>&nbsp;</SPAN><STRONG><SPAN>xxx</SPAN></STRONG><SPAN>&nbsp;</SPAN>with your IAS tenant ID.</P><P><span class="lia-unicode-emoji" title=":hourglass_not_done:">⏳</span>Note: It may take up to<SPAN>&nbsp;</SPAN><STRONG><SPAN>24 hours</SPAN></STRONG><SPAN>&nbsp;</SPAN>for reporting to sync newly created IAS tenants.</P><P><SPAN>&nbsp;</SPAN></P><H1 id="" id="toc-hId--1330857331"><STRONG>9. Formation Creation (Mandatory for Joule Integration)</STRONG></H1><P>Navigate:<BR /><STRONG><SPAN>Subaccount → System Landscape → Formations → Create Formation</SPAN></STRONG></P><H3 id="JouleStudioEnablementGuide-1.GeneralInformation" id="toc-hId--2114176850"><STRONG>1. General Information</STRONG></H3><UL><LI>Formation Name:<SPAN>&nbsp;</SPAN><EM>Your Choice</EM></LI><LI>Formation Type:<SPAN>&nbsp;</SPAN><STRONG><SPAN>Integration with Joule</SPAN></STRONG></LI></UL><H3 id="JouleStudioEnablementGuide-2.IncludeSystems" id="toc-hId-1984276941"><STRONG>2. Include Systems</STRONG></H3><P>Add:</P><UL><LI>SAP Build Process Automation</LI><LI>Joule</LI><LI>SAP Cloud Identity Services</LI></UL><H3 id="JouleStudioEnablementGuide-3.IntegrationDetails" id="toc-hId-1787763436"><STRONG>3. Integration Details</STRONG></H3><P>Check the box:<BR /><STRONG><SPAN>Enable Capability Deployment</SPAN></STRONG></P><H3 id="JouleStudioEnablementGuide-4.Create" id="toc-hId-1591249931"><STRONG>4. Create</STRONG></H3><P>System may take time (~10–30 minutes) to reach<SPAN>&nbsp;</SPAN><STRONG><SPAN>Ready</SPAN></STRONG><SPAN>&nbsp;</SPAN>status.</P><P>This deployment links Joule, BPA, and IAS together.</P><P>&nbsp;</P><P><SPAN>&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-02-25 at 4.02.21 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/377154i9B42841CEA9CC434/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2026-02-25 at 4.02.21 PM.png" alt="Screenshot 2026-02-25 at 4.02.21 PM.png" /></span></SPAN></P><H1 id="JouleStudioEnablementGuide-11.EnablementComplete—YouCanBuildJouleAgents" id="toc-hId-1981542440"><STRONG>10. Enablement Complete — You Can Build Joule Agents</STRONG></H1><P>Once the Formation is Ready:</P><P>You can now:</P><UL><LI>Build Joule Agents</LI><LI>Build Joule Skills</LI><LI>Use Document Grounding</LI><LI>Call Custom APIs</LI></UL><P>&nbsp;</P> 2026-02-26T06:12:49.948000+01:00