SAP Cloud Identity Access Governance (IAG)

Distribute, manage, and validate roles and users in the cloud with SAP IAG

Arrange a consultation

 

Manage users and authorizations

Implement compliance requirements

Manage hybrid system landscapes

This is what SAP Cloud IAG looks like in live operation

 

Cloud-based Identity & Access Management

SAP Cloud Identity Access Governance (IAG) is the cloud counterpart to SAP Access Control, which is bundled with SAP cloud products. The identity management and access control processes of the user lifecycle are moved to the cloud to specifically manage cloud systems (but also on-premise systems).

With an intuitive Fiori interface and interactive dashboards, SAP IAG is the central solution to manage user and authorization processes as well as audits and business role management.

In conjunction with SAP Identity Provisioning (IPS) and SAP Identity Authentication (IAS), employee onboarding and offboarding processes are mapped in a fully comprehensive user lifecycle. Rules can be created and analyses performed to avoid access risks and conflicts of interest (SoD). As with SAP Access Control, it is possible to perform and monitor mitigations when rule violations are detected for access requests.

The advantage of SAP Cloud Identity Access Governance is the simple connection of SAP and non-SAP cloud and on-premise systems via SAP Cloud Connector.

Using SAP IAS, end-to-end authentication via single sign-on (SSO) is achieved to provide users with an efficient and convenient way of working without media disruption.

SAP Cloud Identity as part of Identity & Access Management

SAP Cloud Identity solutions enable authentication (IAS), single sign-on (SSO) and provisioning (IPS) against SAP cloud systems. SAP Cloud Identity Access Governance (IAG) provides the ability to manage workflows, risk checks and emergency access. Especially in a hybrid system landscape and in the communication between on-premise and cloud systems, the products ensure complete integration.

SAP Cloud Identity | IBsolution

SAP Identity Management focuses on the traceable management and consistent distribution of digital identities throughout their lifecycle – assignment, repeated adjustments, deletion. The SAP IdM solution makes it possible to flexibly map individual workflows so that required user accounts, roles, and authorizations can be assigned in a rule-based and automated manner.

Click here for SAP Identity Management

SAP Identity Management | IBsolution

SAP Access Control is a product to identify risks, minimize risks and automate workflows.

  • Access Request Management (ARM)

  • Access Risk Analysis (ARA)

  • Emergency Access Management (EAM)

  • Business Role Management (BRM)

Click here for SAP Access Control

SAP Access Control | IBsolution

Single sign-on enables end-to-end authentication against SAP and non-SAP applications. Central management of access data increases security, as only one user ID is required for all applications. This means that passwords can be made truly secure without restricting user convenience too much. Constantly changing passwords for each application is a thing of the past, and password resets are minimized. You also avoid duplicate administration efforts in your IT and free up valuable resources.

Click here for SAP Single Sign-On

SAP Single Sign-On | IBsolution

Simplify your identity and access management with SAP Cloud Identity Access Governance

 

 

The SAP Cloud Identity Services

SAP Cloud Identity Access Governance (SAP IAG)

  • Centralized risk and compliance management for on-premise and cloud
  • Reduced complexity of role management through optimized design and governance
  • Policy-driven workflow processes for access management and certification

SAP Identity Provisioning (SAP IPS)

  • Cloud-based service for Identity Lifecycle Management
  • Management of users, roles and groups in cloud and hybrid landscapes
  • Based on the SCIM industry standard

SAP Identity Authentication (SAP IAS)

  • Single sign-on for browser-based applications (cloud and on-premise)
  • Various authentication options
  • Different integration scenarios of the user store

 

Power Workshop for SAP Access Governance

You would like to newly implement SAP Access Control, SAP Cloud Identity Access Governance or SAP Identity Management (IdM) or extend your existing system? With our Power Workshop for SAP Access Governance, you benefit from de facto standards that we adapt step by step to your individual requirements. As a result, you will receive a recommended action with a suitable project plan for introducing the access governance product that is optimal for you.

Learn more

 

How does SAP IAG support the fulfillment of compliance requirements?

Especially in a hybrid system landscape with cloud and on-premise systems as well as non-SAP software such as Microsoft Azure, a continuous identity lifecycle is mandatory. Clear monitoring and audits are possible at any time via Fiori Launchpad to ensure the security of the systems. In conjunction with SAP Identity Management and/or SAP Access Control, the entire hybrid system landscape can be covered according to company-specific compliance requirements. Synchronization between the systems enables constant data storage and cross-platform administration.

The following systems can be connected with SAP Cloud Identity Access Governance:

  • SAP SuccessFactors

  • HR Driven Identity Lifecycle Management

  • SAP ABAP (on-premise)

  • SAP Ariba

  • SAP Fieldglass

  • SAP S/4HANA Cloud

  • SAP S/4HANA on-premise

 

Your contact person

Simon Toepper IBsolution

Simon Toepper

simon.toepper@ibsolution.com

+49 7131 2711-3000

Choose from our packages

Starter Package for SAP Cloud Identity Access Governance | IBsolution

Starter Package for SAP Cloud Identity Access Governance

Integrate SAP Cloud Identity Access Governance into your system landscape to extend user and authorization management and risk assessment to your cloud systems.

Learn more
Starter Package for SAP Cloud Identity | IBsolution

Starter Package for SAP Cloud Identity

Automate your identity management processes in the cloud. Use the new SAP Cloud Identity Services (Identity Provisioning and Identity Authentication) to establish an interface for all your cloud systems.

Learn more

We support you in optimizing your way of working with the help of cloud-based SAP solutions around Identity & Access Management.

 

The reality is hybrid

The path to the cloud is also mapped out in identity and access management. However, not all companies are yet following this trend at the speed that software manufacturers hope for. In reality, hybrid scenarios predominate, bringing with them completely new challenges in the management and distribution of roles and digital identities.

Today, hybrid often means that complex workflows in SAP Identity Management are handled on-premise and transferred to the cloud via various interfaces.

SAP Cloud Identity and Access Management

Many companies wonder:

  • What is the right strategy for the coming years?
  • What is the next step with SAP Identity Management?
  • Do I have to go to the cloud or can I continue to run hybrid scenarios?

We give answers. Arrange a non-binding consultation and let us discuss your initial questions together on the phone or on site.

Arrange an appointment

More SAP Identity & Access Management solutions

SAP Identity Management | IBsolution

SAP Identity Management

SAP Identity Management focuses on the traceable management and consistent distribution of digital identities throughout their lifecycle – assignment, repeated adjustments, deletion.

Learn more
SAP Access Control | IBsolution

SAP Access Control

SAP Access Control is a product for identifying risks, minimizing risks, and automating workflows. The focus is on the traceable management and consistent distribution of users and authorizations throughout their lifecycle.

Learn more
SAP Single Sign-On | IBsolution

SAP Single Sign-On

SAP Single Sign-On enables end-to-end authentication against SAP and non-SAP applications. Central management of access data increases security, as only one user ID is required for all applications.

Learn more

Would you like more information about our Cloud Identity Access Governance offerings?

Simply complete the form and submit it. We will contact you as soon as possible.