SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Reduce the burden of
managing SAP and gain
unified business view with
enterprise Identity
Management
One Identity - Restricted - Confidential2
Introductions
Alex Binotto – Sr. Product Manager
Alex.Binotto@OneIdentity.com
Cengiz Tuztas – Sr. Solutions Architect
Cengiz.Tuztas@OneIdentity.com
One Identity - Restricted - Confidential3
Agenda
• Identity and Access Management has its own challenges. Now,
let’s add SAP, and SAP Cloud Apps into the mix
• What are the challenges of managing SAP through your IAM
processes
• How does One Identity help you solve these Challenges, and
reduce the overall burden of Managing SAP
One Identity - Restricted - Confidential4
Identity and Access Management
What does Alex have access to?
Why does he have access to
resources?
Who gave him that access?
One Identity - Restricted - Confidential5
Now, let’s add SAP
• SAP has users and groups like most
applications
• SAP also has clients, profiles, roles,
menus, and transaction codes
• Different inheritance rules for each of
these objects increases complexity
• Trying to resolve these complex
relationships down to users and groups
is close to impossible
• SAP Cloud Applications have own data
model
One Identity - Restricted - Confidential6
The challenges
• One common behavior among the organizations that we have worked with is
to divide the enterprise into “SAP” and “everything else.”
• Many IAG solutions don’t have rich support for SAP
• Administrators from the Windows and Unix universes don’t share a common
entitlement “mental map” with the SAP teams, so it’s easier to treat the
platforms separately
• A challenge for organizations to get a single view of a user
• Silo approach results in redundant platforms and processes for entitlement
requests
• Difficult to enforce controls like separation of duty rules across the various
platforms
Identity Management
System
One Identity - Restricted - Confidential7
SAP User Account Challenges
• Access business objects or
execute SAP transactions,
authorization must be assigned to
users
• Master record is required for log
on
• Master records are client specific
One Identity - Restricted - Confidential8
SAP Compliance & SoD Challenges
• SAP GRC execute rules on single
independent SAP accounts
• SAP accounts, such as a
superordinate employee identity, is
not included in GRC rule
calculations
• No cross platform support
Let’s take a look
How Identity Manager can
help
One Identity - Restricted - Confidential10
How to solve
SAP Account
Management Challenges
One Identity - Restricted - Confidential12
SAP System & Client overview
One Identity - Restricted - Confidential13
SAP Client overview
One Identity - Restricted - Confidential14
SAP Company overview
One Identity - Restricted - Confidential15
SAP User overview
One Identity - Restricted - Confidential16
SAP Profile overview
One Identity - Restricted - Confidential17
SAP Role overview
One Identity - Restricted - Confidential18
SAP Group overview
How to solve
SAP Compliance &
SoD Challenges
One Identity - Restricted - Confidential20
SAP Objects not displayed directly in the Admin
tool • Connector can synchronise many objects that are not displayed in their
own section in the Administration tool
• SAP Transactions, Authorization Objects, and elements like Activities and
Authorization Groups are rather displayed as linked to SAP Functions for
the purposes of SOD definition
One Identity - Restricted - Confidential21
SAP Function Instance and Affected Groups:
used to easily define SOD Rules
Example: FI06 Bank deletion role will match this Function
One Identity - Restricted - Confidential22
SAP Audit Rule overview
One Identity - Restricted - Confidential23
SAP Audit Rule (SoD) configuration
• Example: showing AND across the clauses and OR over a list of SAP
Functions
One Identity - Restricted - Confidential24
SAP Audit Rule
(Transaction 1)
(Transaction 2)
(Authorization object 1)
(Authorization object 2)
(Function element 1)
(Function element 2)
(Authorization object 3)
(Function element 3)
(Function element 4)
OR (1)
AND (2)
AND (3)
AND (3)
One Identity - Restricted - Confidential25
SAP Function Definition
Adding SAP HCM
One Identity - Restricted - Confidential27
Pre-defined Templates speeds up the
project• Simple configuration
• Extensibility to custom information (all the Z_ tables)
One Identity - Restricted - Confidential28
One-To-One relationship from the source of
truth
• SAP HCM is the leading system for Org and Employee data
One Identity - Restricted - Confidential29
View on «ALL» the relationships
• All in One
• Reflects the
Org changes as
it is
• And more …
One Identity - Restricted - Confidential30
Write back Communication Data to SAP
HCM• Write back important communication data from other systems
like Mail and Phone system
Adding SAP Cloud
Applications
One Identity - Restricted - Confidential32
One Identity Manager & Starling Connect
Summary
One Identity - Restricted - Confidential34
Identity Manager delivers unified administration
and security for cloud and on-premises SAP
applications
One Identity - Restricted - Confidential35
SAP & Identity Manager Benefits
• Enhances SAP compliance and governance with a cross-platform
view that merges the SAP ecosystem with a comprehensive view
of non-SAP resources
• Best fit for companies requiring strong governance for SAP
• Scales to the largest and most complex SAP organizations
• Delivers fine-grained SAP object management required for
efficient, secure, and successful SAP operations
• Understands and provides IGA for the difficult-to-manage aspects of SAP
(Transaction Codes, Process Codes, support for custom SAP Z Tables, and other
attributes)
• Provides SAP-optimized SoD verification and enforcement
• Delivers SAP-specialized workflows and business logic within enterprise governance
One Identity - Restricted - Confidential36
7,000+
Customers of One Identity solutions
130+million
Identities managed through One Identity solutions
Award-winning support
94%
of One Identity customers report “overall
satisfaction with support experience”
Stability
15 years of profitability and growth
Why One Identity?
2018 Leader
Gartner has named One Identity a Leader in its
February 2018 MQ for Identity Governance and
Administration
4.2 out of 5
One Identity’s score on the Gartner Peer Insights
tool
Innovation
• Most comprehensive SAP Connector
• Market leader in AD management & security
• Pioneered AD bridge market
• Starling identity-as-a-service platform
Award-winning Partner Program
Computer Reseller News Channel Chief 2018
and 5 Star Rating
One Identity - Restricted - Confidential38
SAP Connector (additional cost)
SAP connector is certified by SAP for both SAP R/3 and S/4HANA and provides the
full user account lifecycle for SAP user accounts
Modules:
• SAP R/3 User Management Module (SAP)
• SAP R/3 Structural Profiles Add-on Module (SAP HCM)
• SAP R/3 Analysis Authorizations Add-on Module (SAP Business Intelligence)
• SAP R/3 Compliance Add-on Module (SAP Compliance)

Weitere ähnliche Inhalte

Was ist angesagt?

Tier1 Hyperion Managed Services
Tier1 Hyperion Managed ServicesTier1 Hyperion Managed Services
Tier1 Hyperion Managed Services
Toby Schwab
 
Itil v3 versus itil v2 overview
Itil v3 versus itil v2 overviewItil v3 versus itil v2 overview
Itil v3 versus itil v2 overview
Dr Richard Motie
 
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
 WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k... WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
WSO2
 

Was ist angesagt? (12)

Tier1 Hyperion Managed Services
Tier1 Hyperion Managed ServicesTier1 Hyperion Managed Services
Tier1 Hyperion Managed Services
 
ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance ServiceNow Governance, Risk, and Compliance
ServiceNow Governance, Risk, and Compliance
 
Merit Event - ITIL Framework
Merit Event - ITIL FrameworkMerit Event - ITIL Framework
Merit Event - ITIL Framework
 
Introduction to Oracle BPM Suite
Introduction to Oracle BPM SuiteIntroduction to Oracle BPM Suite
Introduction to Oracle BPM Suite
 
Oracle BPM 11G
Oracle BPM 11GOracle BPM 11G
Oracle BPM 11G
 
Guide to the ITIL v3 Framework
Guide to the ITIL v3 FrameworkGuide to the ITIL v3 Framework
Guide to the ITIL v3 Framework
 
Itil v3 versus itil v2 overview
Itil v3 versus itil v2 overviewItil v3 versus itil v2 overview
Itil v3 versus itil v2 overview
 
Reduce timeline and budget for sap business objects 4.2 migration and upgrade...
Reduce timeline and budget for sap business objects 4.2 migration and upgrade...Reduce timeline and budget for sap business objects 4.2 migration and upgrade...
Reduce timeline and budget for sap business objects 4.2 migration and upgrade...
 
Oracle DBA Admin Add-on Tools
Oracle DBA Admin Add-on ToolsOracle DBA Admin Add-on Tools
Oracle DBA Admin Add-on Tools
 
SaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & StrategySaaS vs BPO: Friends or Foes? -- Overview & Strategy
SaaS vs BPO: Friends or Foes? -- Overview & Strategy
 
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
 WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k... WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
WSO2 and Agile Path - How the WSO2 Governance Registry is being used for a k...
 
Salesforce Consulting Services
Salesforce Consulting ServicesSalesforce Consulting Services
Salesforce Consulting Services
 

Ähnlich wie Reduce the Burden Of Managing SAP With Enterprise Identity Management

TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
Charley Hanania
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
hkodali
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
Harish Sharma
 
Run IT as Business Meetup self-service BI
Run IT as Business Meetup self-service BIRun IT as Business Meetup self-service BI
Run IT as Business Meetup self-service BI
Mark Wu
 

Ähnlich wie Reduce the Burden Of Managing SAP With Enterprise Identity Management (20)

TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
 
Run IT as Business Meetup self-service BI
Run IT as Business Meetup self-service BIRun IT as Business Meetup self-service BI
Run IT as Business Meetup self-service BI
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
 
HP's vision for an integrated IT Service Portfolio Management
HP's vision for an integrated IT Service Portfolio ManagementHP's vision for an integrated IT Service Portfolio Management
HP's vision for an integrated IT Service Portfolio Management
 
Mann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRCMann-India_SAP_Service-Offering_GRC
Mann-India_SAP_Service-Offering_GRC
 
Dynamics 365 fall summit 2017 final uploaded
Dynamics 365 fall summit 2017 final uploadedDynamics 365 fall summit 2017 final uploaded
Dynamics 365 fall summit 2017 final uploaded
 
Syllabus for Dynamics 365 CRM/ CE Functional Consultant Course
Syllabus for Dynamics 365 CRM/ CE Functional Consultant CourseSyllabus for Dynamics 365 CRM/ CE Functional Consultant Course
Syllabus for Dynamics 365 CRM/ CE Functional Consultant Course
 
Service Manager: More than a help desk support solution
Service Manager: More than a help desk support solutionService Manager: More than a help desk support solution
Service Manager: More than a help desk support solution
 
CFO and the Corporate Performance
CFO and the Corporate PerformanceCFO and the Corporate Performance
CFO and the Corporate Performance
 
How To Optimize Data And Processes with AI/ ML and SAP Fiori
How To Optimize Data And Processes with AI/ ML and SAP Fiori How To Optimize Data And Processes with AI/ ML and SAP Fiori
How To Optimize Data And Processes with AI/ ML and SAP Fiori
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Day 2- Solution Design in Process Analysis.pptx
Day 2- Solution Design in Process Analysis.pptxDay 2- Solution Design in Process Analysis.pptx
Day 2- Solution Design in Process Analysis.pptx
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
Oracle eBS Overview.pptx
Oracle eBS Overview.pptxOracle eBS Overview.pptx
Oracle eBS Overview.pptx
 
Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability Sap tech ed_Delivering Continuous SAP Solution Availability
Sap tech ed_Delivering Continuous SAP Solution Availability
 
How Oracle Sales Cloud Release 12 Will Boost Sales Productivity
How Oracle Sales Cloud Release 12 Will Boost Sales ProductivityHow Oracle Sales Cloud Release 12 Will Boost Sales Productivity
How Oracle Sales Cloud Release 12 Will Boost Sales Productivity
 

Mehr von SBWebinars

Mehr von SBWebinars (20)

Securing Mobile Apps, From the Inside Out
Securing Mobile Apps, From the Inside OutSecuring Mobile Apps, From the Inside Out
Securing Mobile Apps, From the Inside Out
 
SAP Concur’s Cloud Journey
SAP Concur’s Cloud JourneySAP Concur’s Cloud Journey
SAP Concur’s Cloud Journey
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and Right
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
 
The Next Generation of Application Security
The Next Generation of Application SecurityThe Next Generation of Application Security
The Next Generation of Application Security
 
You're Bleeding. Exposing the Attack Surface in your Supply Chain
You're Bleeding. Exposing the Attack Surface in your Supply ChainYou're Bleeding. Exposing the Attack Surface in your Supply Chain
You're Bleeding. Exposing the Attack Surface in your Supply Chain
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High Impact
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
 
Reducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at NetflixReducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at Netflix
 
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities Management
 
Flow Metrics: What They Are & Why You Need Them
Flow Metrics: What They Are & Why You Need ThemFlow Metrics: What They Are & Why You Need Them
Flow Metrics: What They Are & Why You Need Them
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
Building Blocks of Secure Development: How to Make Open Source Work for You
Building Blocks of Secure Development: How to Make Open Source Work for YouBuilding Blocks of Secure Development: How to Make Open Source Work for You
Building Blocks of Secure Development: How to Make Open Source Work for You
 
Take a Bite Out of the Remediation Backlog
Take a Bite Out of the Remediation BacklogTake a Bite Out of the Remediation Backlog
Take a Bite Out of the Remediation Backlog
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Reduce the Burden Of Managing SAP With Enterprise Identity Management

  • 1. Reduce the burden of managing SAP and gain unified business view with enterprise Identity Management
  • 2. One Identity - Restricted - Confidential2 Introductions Alex Binotto – Sr. Product Manager Alex.Binotto@OneIdentity.com Cengiz Tuztas – Sr. Solutions Architect Cengiz.Tuztas@OneIdentity.com
  • 3. One Identity - Restricted - Confidential3 Agenda • Identity and Access Management has its own challenges. Now, let’s add SAP, and SAP Cloud Apps into the mix • What are the challenges of managing SAP through your IAM processes • How does One Identity help you solve these Challenges, and reduce the overall burden of Managing SAP
  • 4. One Identity - Restricted - Confidential4 Identity and Access Management What does Alex have access to? Why does he have access to resources? Who gave him that access?
  • 5. One Identity - Restricted - Confidential5 Now, let’s add SAP • SAP has users and groups like most applications • SAP also has clients, profiles, roles, menus, and transaction codes • Different inheritance rules for each of these objects increases complexity • Trying to resolve these complex relationships down to users and groups is close to impossible • SAP Cloud Applications have own data model
  • 6. One Identity - Restricted - Confidential6 The challenges • One common behavior among the organizations that we have worked with is to divide the enterprise into “SAP” and “everything else.” • Many IAG solutions don’t have rich support for SAP • Administrators from the Windows and Unix universes don’t share a common entitlement “mental map” with the SAP teams, so it’s easier to treat the platforms separately • A challenge for organizations to get a single view of a user • Silo approach results in redundant platforms and processes for entitlement requests • Difficult to enforce controls like separation of duty rules across the various platforms Identity Management System
  • 7. One Identity - Restricted - Confidential7 SAP User Account Challenges • Access business objects or execute SAP transactions, authorization must be assigned to users • Master record is required for log on • Master records are client specific
  • 8. One Identity - Restricted - Confidential8 SAP Compliance & SoD Challenges • SAP GRC execute rules on single independent SAP accounts • SAP accounts, such as a superordinate employee identity, is not included in GRC rule calculations • No cross platform support
  • 9. Let’s take a look How Identity Manager can help
  • 10. One Identity - Restricted - Confidential10
  • 11. How to solve SAP Account Management Challenges
  • 12. One Identity - Restricted - Confidential12 SAP System & Client overview
  • 13. One Identity - Restricted - Confidential13 SAP Client overview
  • 14. One Identity - Restricted - Confidential14 SAP Company overview
  • 15. One Identity - Restricted - Confidential15 SAP User overview
  • 16. One Identity - Restricted - Confidential16 SAP Profile overview
  • 17. One Identity - Restricted - Confidential17 SAP Role overview
  • 18. One Identity - Restricted - Confidential18 SAP Group overview
  • 19. How to solve SAP Compliance & SoD Challenges
  • 20. One Identity - Restricted - Confidential20 SAP Objects not displayed directly in the Admin tool • Connector can synchronise many objects that are not displayed in their own section in the Administration tool • SAP Transactions, Authorization Objects, and elements like Activities and Authorization Groups are rather displayed as linked to SAP Functions for the purposes of SOD definition
  • 21. One Identity - Restricted - Confidential21 SAP Function Instance and Affected Groups: used to easily define SOD Rules Example: FI06 Bank deletion role will match this Function
  • 22. One Identity - Restricted - Confidential22 SAP Audit Rule overview
  • 23. One Identity - Restricted - Confidential23 SAP Audit Rule (SoD) configuration • Example: showing AND across the clauses and OR over a list of SAP Functions
  • 24. One Identity - Restricted - Confidential24 SAP Audit Rule (Transaction 1) (Transaction 2) (Authorization object 1) (Authorization object 2) (Function element 1) (Function element 2) (Authorization object 3) (Function element 3) (Function element 4) OR (1) AND (2) AND (3) AND (3)
  • 25. One Identity - Restricted - Confidential25 SAP Function Definition
  • 27. One Identity - Restricted - Confidential27 Pre-defined Templates speeds up the project• Simple configuration • Extensibility to custom information (all the Z_ tables)
  • 28. One Identity - Restricted - Confidential28 One-To-One relationship from the source of truth • SAP HCM is the leading system for Org and Employee data
  • 29. One Identity - Restricted - Confidential29 View on «ALL» the relationships • All in One • Reflects the Org changes as it is • And more …
  • 30. One Identity - Restricted - Confidential30 Write back Communication Data to SAP HCM• Write back important communication data from other systems like Mail and Phone system
  • 32. One Identity - Restricted - Confidential32 One Identity Manager & Starling Connect
  • 34. One Identity - Restricted - Confidential34 Identity Manager delivers unified administration and security for cloud and on-premises SAP applications
  • 35. One Identity - Restricted - Confidential35 SAP & Identity Manager Benefits • Enhances SAP compliance and governance with a cross-platform view that merges the SAP ecosystem with a comprehensive view of non-SAP resources • Best fit for companies requiring strong governance for SAP • Scales to the largest and most complex SAP organizations • Delivers fine-grained SAP object management required for efficient, secure, and successful SAP operations • Understands and provides IGA for the difficult-to-manage aspects of SAP (Transaction Codes, Process Codes, support for custom SAP Z Tables, and other attributes) • Provides SAP-optimized SoD verification and enforcement • Delivers SAP-specialized workflows and business logic within enterprise governance
  • 36. One Identity - Restricted - Confidential36 7,000+ Customers of One Identity solutions 130+million Identities managed through One Identity solutions Award-winning support 94% of One Identity customers report “overall satisfaction with support experience” Stability 15 years of profitability and growth Why One Identity? 2018 Leader Gartner has named One Identity a Leader in its February 2018 MQ for Identity Governance and Administration 4.2 out of 5 One Identity’s score on the Gartner Peer Insights tool Innovation • Most comprehensive SAP Connector • Market leader in AD management & security • Pioneered AD bridge market • Starling identity-as-a-service platform Award-winning Partner Program Computer Reseller News Channel Chief 2018 and 5 Star Rating
  • 37.
  • 38. One Identity - Restricted - Confidential38 SAP Connector (additional cost) SAP connector is certified by SAP for both SAP R/3 and S/4HANA and provides the full user account lifecycle for SAP user accounts Modules: • SAP R/3 User Management Module (SAP) • SAP R/3 Structural Profiles Add-on Module (SAP HCM) • SAP R/3 Analysis Authorizations Add-on Module (SAP Business Intelligence) • SAP R/3 Compliance Add-on Module (SAP Compliance)