SAP-IAG Admin Guide
SAP-IAG Admin Guide
2020-11-19
1 Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1 About This Document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 Document History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Terminology and Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 Quick-Start Guides. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3 Upgrade Schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5 Onboarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6 Solution Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
7 Initial Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
7.1 Create Subaccount. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
7.2 Subscribe to SAP Identity Access Governance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
7.3 Maintain Administrators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
11 Integration Scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
11.1 SAP SuccessFactors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
The SAP Cloud Identity Access Governance (IAG) solution is built on the SAP Cloud Platform. It uses SAP
NetWeaver APIs to fetch data from on-premise and cloud solutions, and enables you to use the following
services to create access requests, analyze risks, and design roles.
This administration guide describes the steps you need to perform as an administrator to set up and run the
SAP Cloud Identity Access Governance solution. It covers solution-specific information only. For general
information about SAP Cloud Platform, see the documentation on SAP Help Portal at https://
help.sap.com/CP.
● System administrators
● Key users
For convenience, this guide, and the information therein, is applicable to all the IAG services. Any mention of
IAG in the documentation means the information is relevant for all the IAG services. Information that is
applicable for only a specific service will be called out accordingly.
Provides details about the changes made in each version of this document.
Date Comment
Here you can find terms and concepts applicable for the SAP Cloud Identity Access Governance services. Over
time product names may change; you may see different versions of a product name within the same guide.
This topic also lists the conventions and abbreviations used.
● HCP: Abbreviation for HANA Cloud Platform. This usage is obsolete and is replaced by SCP. See SCP.
● IAG: Abbreviation for SAP Cloud Identity Access Governance. Due to the length of the full name of the
solution, for readability within this guide, we use the abbreviation "IAG".
● Identity Authentication: Shortened version of SAP Cloud Platform Identity Authentication. See also SCI.
● IAS: Updated abbreviation for SAP Cloud Platform Identity Authentication service. This is a convention
used within this guide. Due to the length of the full name of the solution, for readability, we use the
abbreviation "IAS".
● SCI: Old abbreviation for SAP Cloud Platform Identity Authentication service. (See IAS).
● SCP: Abbreviation for SAP Cloud Platform. Due to the length of the full name of the product, for readability
within this guide, we use the convention "SCP"
The following guides are provided for your convenience. Each guide provides an overview and also detailed
steps for enabling IAG services and integrating with specific target applications.
Note
These guides are to be used in conjunction with the admin guide; they do not replace the complete set of
information in the admin guide.
SAP Access Control 12.0 (on-premise) Using SAP Cloud Identity Access Gover AC12 to IAG Bridge Integration.pdf
to IAG and Cloud Target Applications nance as a bridge to enable creation of
access requests from SAP Access Con
trol12 (on-premise) to cloud target ap
plications.
SAP Access Analysis Service to Target Configuring SAP Cloud Identity Access IAG Access Analysis_Integration.pdf
Applications Governance, access analysis service to
analyze user access for on-premise and
cloud target applications.
Maintenance Windows for Cloud services, SAP Cloud Platform (SCP), and SAP IdentityAccess Governance
(IAG) are listed below.
SAP Merchandising
SAP TwoGo
The maintenance windows mentioned above define the maximum scheduled downtime, which certain cloud
services only consume partially.
Start time in UTC per region: Americas SUN 4am Time frame in UTC per region: Americas SAT 1pm – 7pm
This administration guide describes the steps you need to perform as an administrator to set up and run the
SAP Cloud Identity Access Governance solution. It covers solution-specific information only. For general
information about SAP Cloud Platform, see the documentation on SAP Help Portal at https://
help.sap.com/CP.
● System administrators
● Key users
The SAP Cloud Identity Access Governance (IAG) solution is built on the SAP Cloud Platform. It uses SAP
NetWeaver APIs to fetch data from on-premise and cloud solutions, and enables you to use the following
services to create access requests, analyze risks, and design roles.
For convenience, this guide, and the information therein, is applicable to all the IAG services. Any mention of
IAG in the documentation means the information is relevant for all the IAG services. Information that is
applicable for only a specific service will be called out accordingly.
This guide assumes that the onboarding process has already been completed – this means that the
administrator has already access to the Global Accounts and has administrator authorization. For further
details, refer to the notification email that you received after you set up your Global Account.
For information about the onboarding process, see the SAP Cloud Platform documentation on SAP Help Portal
at https://help.sap.com/CP under Getting Started.
The diagram below illustrates the architectural components of SAP Cloud Identity Access Governance (IAG)
solution.
IAG is a service on the SAP Cloud Platform, it integrates with other SAP Cloud Platform services, and connects
with cloud and on-premise target applications.
Components
Component Description
Target Applications (on-Premise, cloud) This is the target system containing user data.
IAG API The IAG Services API extracts data from the target applica
tion. The API is part of NetWeaver; make sure your system
has the required NetWeaver Basis Support Packs. The API is
available for on-premise and the SAP HANA Cloud.
SAP Cloud Platform connector The cloud connector sits behind the firewall and establishes
connectivity between the SAP Cloud Platform and the target
system.
IAG Services IAG services include: Access Analysis service; Access Re
quest service; Role Design service; Access Certification;
Privileged Access Management.
SAP Cloud Platform Identity Authentication service Identity Authentication service is used to authenticate users
before allowing access to the IAG solution and services.
SAP Cloud Platform Workflow service Workflow service is used for automation of access requests
through the various stages of creation and approval.
SAP Cloud Platform Business Rules service Business Rules service enables embedding business deci
sions into the workflow.
SAP Cloud Platform Identity Provisioning service Identity Provisioning service allows provisioning of centrally
managed identities and their access across the enterprise
(on-premsie and cloud).
SAP Cloud Identity Access Governance (IAG) 2.0 is available on the Amazon Web Service (AWS) platform.
Note
If you have already implemented or are currently implementing this solution with IAG 1.0 release in the SAP
Cloud Platform (SCP) NEO environment, message the support team by creating a support incident. Select
the component GRC-IAG and add Migration to the subject line so that SAP can contact you and guide you
with the next steps.
Prerequisites
● A SAP Cloud Platform (SCP) cockpit/subaccount in the NEO environment where your existing IAG
application is provisioned (only for existing customers who are using IAG 1.0).
● A new SCP Global Account provisioned in the Cloud Foundry environment.
● An instance of the cloud connector if you wish to use on-premise applications or the IAG Bridge scenario.
● An instance of the SAP Identity Authentication Service (IAS).
● An instance of the SAP Identity Provisioning Service (IPS).
Note
If you are an existing customer of the IAG 1.0 release, you can continue to reuse the SAP Identity
Provisioning Service (IPS) that has been provided to you. To obtain an IPS instance, create a support
ticket. To do so, select the component GRC-IAG.
Note
Currently, IAG is available only on the Amazon Web Service (AWS) platform in US East (VA) and Europe
(Frankfurt) regions. Based on your current NEO subaccount region, you need to select one of the
regions to create a subaccount.
When you purchase a variant of SAP Cloud Identity Access Governance, you are offered both the
test and standard plans. For these plans, you must create two subaccounts in your Global Account
and subscribe to one plan in one subaccount only. Refer to the example above to choose a unique
naming convention for the subdomains for your two subaccounts.
After creating your subaccount, you need to subscribe to SAP Identity Access Governance (IAG).
After subscribing to the SAP Identity Access Governance (IAG) application, you must maintain security
administrators.
Add security administrators to your subaccount by entering their e-mail addresses instead of the user IDs.
Security administrators can add other security administrators, and manage authentication and authorization
in this subaccount, such as configuring trust to identity providers, and assigning role collections to business
users.
IAG solution and its services use SAP Cloud Platform Identity Authentication Service (IAS) for user
authentication and to manage access to IAG apps. Security and permissions are maintained in groups and
roles. You control the tasks a user can perform, and the apps they can access, through the appropriate
assignment of group and role combinations to the user.
The assignment of groups and roles to users controls these three security aspects:
The process to configure authentication and access requires you to perform configuration tasks on both the
SAP Cloud Platform tenant (SCP-IAG tenant) and the Identity Authentication service (IAS).
In the IAS, tenant administrators can manage user accounts and groups.
Create User Create users via the Add user option in Create a New User
Create User Groups Create new user groups via User Create a New User Group
Note
It is mandatory to follow the User
Group Naming Guidelines and cre
ate the Required Groups provided
below.
Assign Groups to User Assign groups to a user via the adminis Assign Groups to a User
tration console for Identity Authentica
tion.
When you create these groups, you must follow this naming convention: IAG_<TYPE>_<NAME>.
In this string, the <TYPE> must be one of the delivered types shown in the table below. The <NAME> can be of
your choosing, though we recommend choosing a name that is clear and concise.
Example: IAG_WF_ADMIN
CADM Candidate Business Role Adminstrator Users assigned to this group have ac
cess to the Candidate Business Role
Adminstration app and carry out ad
ministrative tasks.
RCA Business Role Content Approver Users can modify and approve business
roles. Users assigned to this group are
included in the dropdown list of
Business Role Content Approvers.
RAA Business Role Assignment Approver Users can approve business role as
signments. Users assigned to this
group are included in the dropdown list
of Assignment Approvers.
USER IAG Application Users Assign this group by default to all IAG
application users.
Required Groups
The following groups are required for using IAG services. Make sure you create them with the names listed
below with the same case. The name is case-sensitive.
In the IAS tenant, create the groups as described below, and then assign the relevant users to them. These are
suggested groupings and names. In your own implementation, you can create groups that suit your needs.
As you will map these groups with the SCP groups, to make it easier to track, we recommend you use the same
group names in both IAS and SCP.
You can create users in IAS or make them available on a connected LDAP server.
Note
To connect to LDAP and other services for app user, you must configure this in IAS. For more information,
see SAP Cloud Platform Identity Authentication Service.
In the SCP-IAG tenant, the administrator can view the pre-delivered role collections. Refer to the tables below
for the role collections.
Note
If you are subscribing to the SAP Cloud Identity Access Governance, integration edition, refer to SAP IAG
integration edition
CIAG_Display Destination Certificate Viewer This is the default role collections for all
business users.
Destination Configuration Viewer
Destination Viewer
EXTERNAL_PORTAL_USER
IAGDisplay_Admin
sap_scheduler_configuration_template
sap_scheduler_viewer_template
Token_Exchange_Admin
Role Collections and Associated Roles for the Access Request Service
Associated Roles for the Role Collec
Assign this Role Collection tion To perform these tasks
iag_custom_field_groups
iag_custom_fields
iag_field_mapping
iag_maint_user_data
iag_notif_upload
iag_reason_code
RuleRepositorySuperUser
RuleRuntimeSuperUser
WorkflowAdmin
WorkflowDeveloper
iag_configuration service
● Setting up master data in the app
iag_departments ● Set IAG configurations, such as UI
language
iag_projects
● View the Role Design Audit Log
IAG_Role_Designer_AdminAdministra
tion
IAG_Role_Designer_AdminReports
IAG_Role_Designer_AdminRole_de
signer
Role Collections and Associated Roles for the Access Analysis Service
Associated Roles for the Role Collec
Assign this Role Collection tion To perform these tasks
iag_business_processes
iag_configuration
iag_functions
iag_mitigaton_control_master_data
iag_risk
iag_risk_level
iag_risk_score_policy
iag_test_plans
RuleRepositorySuperUser
RuleRuntimeSuperUser
iag_business_processes
iag_configuration
IAG_Configuration_AdminAdministra-
tion
iag_custom_field_groups
iag_custom_fields
iag_field_mapping
iag_functions
iag_maint_user_data
iag_mitigaton_control_master_data
iag_notif_upload
iag_projects
iag_reason_code
iag_risk
iag_risk_level
iag_risk_score_policy
iag_test_plans
RuleRepositorySuperUser
RuleRuntimeSuperUser
WorkflowAdmin
WorkflowDeveloper
WorkflowParticipant
IAG_Access_Analysis_AdminReports
IAG_Access_AnalysisAccess_Analysis
IAG_Access_AnalysisAdministration
IAG_Access_AnalysisReports
IAG_Access_Request_AdminAc
cess_Request
IAG_Access_Request_AdminAdminis
tration
iag_access_request_priority
IAG_Access_RequestAccess_Request
IAG_Access_RequestAdministration
iag_authorization_policy
iag_business_processes
iag_configuration
iag_custom_field_groups
iag_custom_fields
iag_departments
iag_field_mapping
iag_functions
iag_maint_user_data
iag_mitigaton_control_master_data
iag_notif_upload
IAG_Privileged_AccessAdministration
IAG_Privileged_AccessPrivileged_Ac
cess_Management
IAG_Privileged_AccessPrivilegedRoles
IAG_Privileged_AccessReports
iag_projects
iag_reason_code
iag_risk
iag_risk_level
iag_risk_score_policy
IAG_Role_Designer_AdminAdministra
tion
IAG_Role_Designer_AdminReports
IAG_Role_Designer_AdminRole_de
signer
IAG_Role_DesignerAdministration
IAG_Role_DesignerReports
IAG_Role_DesignerRole_designer
iag_test_plans
RuleRepositorySuperUser
RuleRuntimeSuperUser
WorkflowAdmin
WorkflowDeveloper
WorkflowParticipant
IAG_Privileged_AccessPrivileged_Ac
cess_Management
IAG_Privileged_AccessPrivilegedRoles
IAG_Privileged_AccessReports
iag_reason_code
In the SCP-IAG tenant, the administrator can assign the role collections. For more information, refer to Assign
Role Collections.
Note
If you wish to customize your role collections, you have the option of creating and assigning them manually.
If you need a list of roles belonging to role collections for workflow management and business rules, refer to
the following links SAP Cloud Platform Workflow Management - Authorization Configuration
SAP Cloud Platform Business Rules in the Cloud Foundry Environment - Authorization Configuration
Next: Map SCP-IAG Role Collections and IAS Group [page 32]
SAP Cloud Identity Access Governance, integration edition uses six role collections and associated roles that
are listed below.
CIAG_INT_Display Destination Certificate Viewer This is the default role collection for all
business users.
Destination Configuration Viewer
Destination Viewer
EXTERNAL_PORTAL_USER
IAGDisplay_Admin
sap_scheduler_configuration_template
sap_scheduler_viewer_template
Token_Exchange_Admin
ü+zt
Role Collections and Associated Roles for the Access Analysis Service
Associated Roles for the Role Collec
Assign this Role Collection tion To perform these tasks
iag_business_processes
iag_configuration
iag_functions
IAG_INTG_Role_Designer
iag_maint_user_data
iag_mitigaton_control_master_data
iag_risk
iag_risk_level
iag_risk_score_policy
iag_test_plans
iag_configuration
IAG_Configuration_AdminAdministra-
tion
iag_functions
iag_maint_user_data
iag_mitigaton_control_master_data
iag_risk
iag_risk_level
iag_risk_score_policy
iag_test_plans
IAG_Role_DesignerReports
IAG_Access_Analysis_AdminReports
IAG_Access_AnalysisAccess_Analysis
IAG_Access_AnalysisAdministration
IAG_Access_AnalysisReports
iag_authorization_policy
iag_business_processes
iag_configuration
iag_departments
iag_functions
IAG_INTG_Role_Designer
iag_maint_user_data
iag_mitigaton_control_master_data
iag_risk
iag_risk_level
iag_risk_score_policy
IAG_Role_Designer_AdminReports
IAG_Role_DesignerReports
iag_test_plans
To map the SCP-IAG Role Collections to your IAS tenant, you must do the following:
Next: Syncing User Groups from SAP Identity Authentication Service [page 38]
IAG services use SAP Cloud Platform Identity Authentication Service (IAS) to provide user identity
authentication.
To enable IAS as your identity provider, you must set up a trust relationship between your IAS tenant and your
SAP Cloud Platform (SCP-IAG) tenant. This is done via the exchange of metadata files.
1. Log into the SAP Cloud Platform Cockpit as administrator, and go to your tenant account.
2. Navigate to Security Trust Configuration .
3. Select SAML Metadata to download the metadata file.
Make sure to download the metadata file to a directory that is accessible by the SAP Cloud Platform
Identity Authentication Service (IAS) tenant.
On the SAP Cloud Platform Identity Authentication Service (IAS) Identity Authentication Cockpit, create a
custom application for IAG services, which will be used to establish the trust relationship with the SAP Cloud
Platform tenant.
1. On the IAS Identity Authentication Cockpit, navigate to Applications & Resources > Applications.
2. Add a custom application and save.
3. Upload the metadata from the SAP Cloud Platform tenant.
1. From the Custom Applications list, select your new custom application, and then select SAML 2.0
Configuration.
2. In the Metadata File field, browse to the location of the SCP metata file.
3. Upload the file and then save.
1. In the SAP Cloud Platform Identity Authentication Service (IAS) tenant, navigate to Applications &
Resources Tenant Setting, and open SAML 2.0 Configuration.
2. Select Download Metadata File.
Note
Make sure you save the metadata file in a directory that is accessible for upload to the the SCP tenant.
3. Save.
For more information on Identity Authentication Service and SAP Cloud Platform trust configuration, see
SAP Cloud Identity Authentication Service.
1. Log in to the Identity Authentication tenant and navigate to Applications & Resources Applications .
2. Under Custom Applications, select your custom application. (This is the application you created as part of
the procedure for setting up a trust relationship between the SAP Cloud Platform Identity Authentication
Service (SCI) tenant and the SCP tenant.)
3. Click Assertion Attributes and create the following attributes:
Groups Groups
E-mail mail
4. Save.
4. Save.
Within the framework of access governance, tasks have different levels of risk and sensitivity. You use IAS tools
to ensure that only designated users can perform administrative tasks. For example, only users designated as
business role approvers can approve new business roles.
1. In the IAS tenant, create your groups according to the guidelines below.
2. Assign the appropriate users to the relevant groups.
3. Sync the user-group assignments.
In the IAG Fiori Launchpad, open the Job Scheduler app, and run Sync User Groups from IAS job.
For more information about creating user groups and assigning users, see the For More Information section
below.
For group naming conventions and assigning users to groups, refer to the Group Naming Guidelines section
mentioned in Maintain Users and User Groups in IAS [page 20].
Required Groups
The following groups are required. The IAG services look for these specific groups. Make sure you create them
with the names listed below with the same case. The name is case sensitive.
Access Request Service IAG_WF_MANAGER In the Create Access Request app there
is the Manager field. You assign users to
the IAG_WF_MANAGER group to make
them available for selection in this field.
Managers are responsible for approving
access requests.
Note
If a user's manager is explicitly as
signed in IAS, then the manager is
displayed in this field and is read-
only.
Role Design Service IAG_WF_CBRRefine Users assigned to this group can refine
the proposed candidate business roles.
To ensure user groups information is synchronized between the SAP Identity Authentication Service (IAS) and
SAP Cloud Platform (SCP-IAG tenant) tenants, you must maintain the required system in IAS and the
destination in the SCP-IAG tenant and then run the SCI User Group Sync job in the Job Scheduler app.
Caution
Choose the name carefully for your system as administrator. Once created, the name cannot be
changed.
6. To be a tenant administrator, a user must be assigned to Manage Users and Manage Groups from the
following roles.
Administrator Roles
Authorization Description
Manage Corporate Identity Providers This role gives the tenant administrator permission to
configure the identity providers via the administration
console.
Manage Groups This role gives the tenant administrator permission to cre
ate, edit and delete user groups via the administration
console.
Manage Tenant Configuration This role gives the tenant administrator permission to
manage tenant configuration and authorization assign
ments to users.
7. In the Configure Authorizations section, assign the Manage Users and Manage Groups option to ON, and
Save.
8. Select the IAG Sync system and click Set Password.
9. Enter a password and save (the app automatically generates a user ID.).
Note
Make a note of the user ID and password. You will use them in the next step.
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Connectivity Destinations in the navigation panel.
3. Search and Select SCIUserGroup destination and click the pencil icon to edit it.
4. In the URL field, update the SCI_TENANT_ID text with IAS Tenant ID.
Ex: https://SCI_TENANT_ID.accounts.ondemand.com/service/scim/Users
5. In the User and Password fields, enter the user ID and password of IAG Sync system from IAS tenant
(configured under Users & Authorizations → Administrators), and save.
1. Login the IAG launchpad and open the Job Scheduler app.
2. In the Job Name field, enter Job Name.
3. In the Job Category field, select SCI User Group Sync from the dropdown list.
4. In the Recurring Job field, select No.
5. In the Start Immediately field, select Yes.
6. Enter information in all required fields and choose Schedule Job. The job status and log can be checked in
the Job History app.
Note
To schedule a Recurring Job, refer to 2859618 for recommendation on the frequency of the jobs.
Previous: Map SCP-IAG Role Collections and IAS Group [page 32]
The IAG solution integrates with other SAP services, such as SAP Identity Provisioning Service. These services
require users to have specific roles to use them.
Procedure
Parameter Value
Name IPSPROXY
Description Any
ID Generated ID or any ID
For more information, see SAP Cloud Platform Identity Provisioning Service - Access the Identity Provisioning
Service
Previous: Syncing User Groups from SAP Identity Authentication Service [page 38]
SAP Cloud Connector serves as the link between on-demand applications in SAP Cloud Platform and existing
on premise systems.
The cloud Connector runs as an on-premise agent in a secured network and acts as a reverse invoke proxy
between the on premise network and SAP Cloud Platform.
To Install the cloud connector, view the help documentation for SAP Cloud Platform Cloud Connector, and
follow the instructions for the scenario: Connecting Cloud Applications to On-Premise Systems.
Pre-requisite: You have already activated your user (Pxxxx) in SAP Cloud Identity and have administrator
access to this account.
Note
For the following, maintain one SAP Cloud Platform Connector for each target system.
1. Login to your SAP Cloud Platform Connector and create a new account.
Go to Account Dashboard and click Add Account.
2. Enter the following details and save the data:
○ Landscape Host - us2.hana.ondemand.com if your cloud tenant hosted in US data center or
eu1.hana.ondemand.com if it is hosted in Europe data center
○ Account Name: <HCP account name>
○ Display Name: <Company Name>
In the SAP Cloud Platform Cockpit, maintain destinations for each target system to enable communication via
the SAP Cloud Platform Connector.
For on premise systems, make sure to select the Proxy Type OnPremise.
For more information about using the destination service, see the following SAP Cloud Platform
documentation: Configure Destinations from the Cockpit
Note
Only HTTP destinations are relevant for the destination service. For more information, see the following
documentation: Create HTTP Destinations
The access request service integrates with additional SAP Cloud Platform services to utilize workflow
management, provisioning, and business logic. You must configure the following additional services to fully
utilize the access request service:
● SAP Cloud Platform Business Rule Management service to provide decision making and business logic
● SAP Cloud Platform Workflow service to enable the movement of access requests to owners, approvers,
etc. and through stages, such as creation, review, approval, etc.
● SAP Cloud Platform Identity Provisioning service (Identity Provisioning service) to provision access
requests to target systems
1. Required Roles for SAP Cloud Platform Workflow Service [page 45]
2. Delivered Workflow Templates (read only) [page 46]
The access request service includes three non-modifiable out-of-the-box workflow templates.
3. Setting Up Business Rules for Workflow [page 48]
The SAP Cloud Platform Workflow service is delivered with three apps that enable you to maintain the
workflow.
To access and use the Workflow Definition and Workflow Instances apps, assign to them the following workflow
roles:
To learn more about the required roles and additional available roles, see the SAP Cloud Platform Workflow
Service security guide.
Parent topic: Setting Up SAP Cloud Platform Workflow Service [page 45]
The access request service includes three non-modifiable out-of-the-box workflow templates.
Note
The information herein is provided for your information only. The SAP operations team configure and
deploy the workflow and notification templates.
Manager - Role Owner - Security Owner The access request goes to the following roles for approval
before it is provisioned:
● manager
● role owner
● security owner
Manager - Security Owner The access request goes to the following roles for approval
before it is provisioned:
● manager
● security owner
Manager Only The access request goes only to the manager for approval
before it is provisioned.
The access request service delivers out-of-the-box notification emails. The notifications are sent for the
following events:
Notify Approvers
Notify Provisioned
Parent topic: Setting Up SAP Cloud Platform Workflow Service [page 45]
Previous: Required Roles for SAP Cloud Platform Workflow Service [page 45]
To create a new mail notification template, follow these steps. If you need to change the content of the
delivered mail notificadtion template, you can directly edit the template in Web IDE Full Stack.
4. Locate the created workflow project, containing a workflow template, under Workflows subfolder.
5. Add Mail Task to the workflow template. Refer to Configure Mail Tasks.
6. In the Mail Task Properties area, choose the Details tab.
7. Enter the following content into the To, CC, and BCC fields:
○ To: ${context.to}
○ CC: ${context.cc}
○ BCC: ${context.bcc}
8. In Subject and Mail Body fields, enter your content.
9. For dynamic content, use the following fields:
○ Request Id: ${context.requestId}
The access request service integrates with SAP Cloud Platform Business Rules Service. You use the SAP Cloud
Platform Business Rules service to define the stages, path, and other workflow rules used by access request
service to move request items through the stages of an access request.
Parent topic: Setting Up SAP Cloud Platform Workflow Service [page 45]
10.1.3.1 Prerequisite
SAP Cloud Identity Access Goverance offers pre-delivered business rules. To access these rules, create a
support ticket. To do so, select the component GRC-IAG.
If, however, you wish to create or edit your own objects, follow the steps described below:
Procedure
10.1.3.2 Introduction
SAP Cloud Identity Access Governance, access request service integrates with SAP Cloud Platform Workflow
Service and SAP Cloud Platform Business Rules Service.
You use the SAP Cloud Platform Business Rules service to define the path and other workflow rules used by
access request service to move request items through the stages of an access request.
10.1.3.2.1 Concepts
● Project: A container that holds business rule entities such as, data objects, rules, rulesets, and rule
services.
● Data objects: It describe the data and serve as data carrier in the context or the result of an expression.
● Rule: It is the technical representation of a simple business rule to be applied to a particular business case.
It defines a business logic that, once evaluated against live data, leads to a decision. A decision table is a
tabular representation of related rules.
● Ruleset: A collection of rules to be processed in a particular business case. It serves as an entry point for
rule processing, and links a rule service to a collection of rules.
● Rule service: An interface or end point that enables an application to invoke a decision logic.
1. Create a project
2. Add data objects with attributes that represent your application context.
3. Model rule services to perform operations.
4. Model your business logic using business rules. Define the condition constraints and the results to be
returned for different business logic.
5. Configure the ruleset by grouping the related rules together and assigning them to a rule service.
1. Login to your SAP Cloud Platform Cockpit tenant account, navigate to Services > Business Rules, and click
Business Rule Editor.
2. On the Manage Projects screen add the project as follows.
Project Name: IAGWorkflowBusinessRule
Description: IAG Workflow Business Rule
3. Save.
For more information, see SAP Cloud Platform Business Rules - Creating Projects.
Data Objects
Note
For each data object, you must add attributes, associations, and mappings per the respective tables.
For instructions how to navigate the screen, see SAP Cloud Platform Business Rules - Modeling Data Objects.
Type: Structure
Attributes
Associations
Mappings
Java Cloud
Type: Structure
Attributes
Mappings
Java Cloud
Type: Structure
Attributes
Mappings
Java Cloud
Type: Structure
Attributes
Mappings
Java Cloud
Type: Structure
Mappings
Java Cloud
Rule Services
Name Description
Note
For each rule service, you must add Execution Contexts and Target Runtimes per the respective tables
below.
Execution Context
Name Usage
Request Input
RequestUser Input
WorkflowApprover Result
Target Runtimes
Java Cloud
Execution Context
Name Usage
Request Input
RequestUser Input
RequestAccess Input
WorkflowPath Result
Target Runtimes
Java Cloud
For instructions how to navigate the screen, see SAP Cloud Platform Business Rules - Modeling a Rule Service.
Rules
Note
For each rule, you must add a Decision Table per the information in the topic: Decision Tables [page 56].
The access request service (beta) is delivered with the following workflow templates. You can use them to
choose which roles are required to approve an access request before it is provisioned.
1. In your project, select the Rules tab, and edit the rule: RequestTypeRule.
2. For the decision table, change the PathName to one of the workflow templates.
'mangerrolesecuritypath' The access request goes to the following roles for approval
before it is provisioned:
● manager
● role owner
● security owner
'accessrequestmangersecuritywf' The access request goes to the following roles for approval
before it is provisioned:
● manager
● security owner
SECURITY' The access request goes only to the manager for approval
before it is provisioned.
For each rule, you must add a Decision Table per the respective tables below.
Decision Table
If Then
'CHANGE' 'mangerrolesecuritypath'
Rule: WorkflowApprover
Decision Table
If Then
Rulesets
For instructions on navigating the screen and creating the rulesets, see SAP Cloud Platform Business Rules -
Defining Rulesets.
For more information see, SAP Cloud Platform Business Rules - Deploying a Rule Service.
You can connect the SAP Cloud Identity Access Governance, access request service to the following cloud
products and on-premise systems.
You can configure integration for SAP SuccessFactors with SAP Cloud Identity Access Governance solution and
its services (Access Request, Access Analysis, and Role Design). This enables users to create access requests,
design business roles, and analysis access risks for on-premise and on-cloud applications and systems.
Applications Integration of Applications with SAP SAP Cloud Identity Access Gover
Cloud Identity Access Governance nance
Log into the SCP cockpit and navigate to your tenant. In the left-hand pane click Connectivity
Destinations .
This destination describes the SAP SuccessFactors system where the HR user information is stored, is the
source system
Note
If you are using this as a source system, you must enter the destination names exactly as described.
Otherwise, you can enter any desired name.
SuccessFactorsEC
Name: SuccessFactorsEC.
Type: HTTP.
Note
2215682
Authentication: BasicAuthentication
User: Enter the authenticated user for SuccessFactors system followed by Company ID such as
<UserID@CompanyID>
For information on how to use the destination service, see: Configure Destinations from the Cockpit
Note
Only HTTP destinations are relevant for the destination service. For information on creating HTTP
connections, see: Create HTTP Destinations
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP SuccessFactors. For System Type, select SAP SuccessFactors.
3. In the HCP Destination field, enter the name of the SAP Cloud Platform destination for SAP
SuccessFactors.
4. Save.
In the access request service launchpad, open the Job Scheduler app, and run the following jobs:
● Repository Sync to synchronize the user data from the SAP SuccessFactors tenant.
In the System Type field, select SAP SuccessFactors.
● Provisioning to synchronize the user data from the SAP SuccessFactors tenant.
You can integrate the SAP Cloud Identity Access Governance solution with your HR systems. This enables
changes in employee status (HR triggers) in the HR system to initiate access requests. The access request
There are three overall steps to enable HR trigger integration between SAP SuccessFactors and the SAP Cloud
Identity Access Governance solution and its services:
1. In the SAP Cloud Platform, set up one destination to connect to the SAP SuccessFactors tenant.
2. Use the SAP Cloud Platform Business Rules service to define the rules for converting user changes from
SAP SuccessFactors to access requests.
3. Run the Job Scheduler for the HR Trigger job and to sync user data for SAP SuccessFactors.
11.2.2 Prerequisites
Concurrent Employment:
New Hire, Concurrent Hire, Job Change, Termination, Retirement, Rehire. For more information, see:
Configuring Events
Global Assignment:
● Home Assignment: Away from global assignment, Back from global assignment
● Global Assignment: Add global assignment, End global assignment, Obsolete global assignment
For more information, see: Creating Events Reasons for Global Assignments
Contingent Worker:
Start contingent worker, End contingent worker. For more information, see: Configuring ECWK and SCWK for
Contingent Workers
Note
You must enter the destination names exactly as described. If you have already created a destination, then
you do not require a new one. If not, then you must create a destination and use the name specified below.
This destination describes the SAP SuccessFactors system where the HR user information is stored, which is
the source system.
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Connectivity Destinations .
3. Choose New Destination and add the parameters and values given below.
Parameter Value
Name SuccessFactorsEC
Type HTTP
URL Enter the URL for the SuccessFactors system API Service
such as <https://apisuccessfactors.com/> For more infor
mation, see 2215682 and/or SAP SuccessFactors HXM
Suite OData API: Reference Guide
Authentication BasicAuthentication
Log into the IAG launchpad and create an instance for SAP SuccessFactors in the Systems app.
Note
You can ignore these steps, if you have already created this instance.
You use the SAP Cloud Platform Business Rules service to define the rules and structures for processing user
data from SuccessFactors and creating access requests.
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Services Business Rules in the navigation panel.
3. Click Manage Rules Project in Take Action list.
Create a project with the name: IAGSFHRFieldChanges. The project is the overall container for the related
business rules and objects.
Note
Data objects define the input and output structures for the rule.
In the IAGSFHRFieldChanges project, go to the Data Objects tab, and create the following data objects:
● UserHRFields for the input fields. This is the data coming from SuccessFactors.
● Access for the output fields. This is the data for the access requests.
Note
You define the data objects as input or output in the Create Rule Service [page 71] step. Data objects and
attributes are case-sensitive.
Open the UserHRFields data object and add attributes for the data coming from SuccessFactors.
Open the Access data object and add attributes for the data to be used in creating access requests.
1. From the IAGSFHRFieldChanges project, click Rule Service, and create the IAGRequestAccessData rule
service.
2. Under the Vocabulary section, add two vocabulary objects. From the dropdown, select the data objects you
defined earlier, and select the Usage.
For the UserHRFields data object, select Input usage.
For the Access data object, select Result usage.
In Rules, you create a decision table based on input and the desired results. You can create multiple rules, as
suits your needs.
2. Make sure for Type, you select Decision Table, and for Mode you select Advanced.
3. Click Create. The New Rule screen is displayed. At the bottom of the screen click Start building the table in
Settings to start building your decision table.
The decision table is the core of the access request rule. Here you define the conditions and results that take
the user change information from SuccessFactors and convert them into access requests and provisioning
actions.
This is an explanation of how the information on the Decision Table Settings screen relates to the decision table
itself.
● The Condition Expressions are the "If" columns in the decision table. You can enter multiple condition
expressions. They appear as rows.
You cannot enter values for the conditions in the Decision Table Settings screen; you can enter values in
the next step in the decision table itself.
● The Result settings are the "Then" columns in the decision table.
Note
You can enter values for results in the Decision Table Settings screen. You can also edit them in the
decision table itself.
○ Hit Policy sets the parameters the rule uses when matching results from the conditions.
○ Conditions Expressions is where you define the input data relevant for the request. The attributes in the
dropdown list are pulled from the UserHRFields data object.
○ Result is where you define output values. Click the dropdown list and select the Access data object. You
can use three Access Types:
○ TR - Technical Role
○ BR - Business Role
○ CR - Composite Role
○ GP - Group
○ SYS - Application
Note
The Default Value field are optional and can be left blank.
2. Click Apply. The New Rule screen and the new decision table are displayed.
3. To define the values for decision table, click Add Row.
Note
These values must match the values from the SuccessFactors tenant, such as (ACE_US), and so on.
Note
Ensure the data and fields match the data and fields in the SuccessFactors tenant.
Set Up Rulesets
The final step for setting up a rule is to configure and activate the ruleset. Resets enable you to group multiple
rules in one collection. Even if you have only one rule, you still need to add it to a ruleset and activate it.
1. On the IAGSFHRFieldChanges project page, click Rulesets, and then click the plus sign to add a new
ruleset.
2. On the New Ruleset screen, click the Rule Service dropdown list, and select IAGRequestAccessData.
3. In the Rules section, click the plus sign to select from the rules you defined.
4. Save and activate the ruleset.
For more information see, SAP Cloud Platform Business Rules - Deploying a Rule Service.
Log into the IAG launchpad, open the Job Scheduler app, and run the following jobs:
● Repository Sync to synchronize the user data, permission roles and permission groups from the SAP
SuccessFactors system.
1. In the Job Name field, enter Job Name.
2. In the Job Category field, select Repository Sync.
3. In the Recurring Job field, select No.
4. In the Start Immediately field, select Yes.
5. In the System Type field, select SAP SuccessFactors.
6. In the System field, select System.
7. Choose Schedule Job. The job status and log can be checked in the Job History app.
Note
To schedule a Recurring Job for both the Repository Sync and HR Triggers, refer to the SAP Note
2859618 for recommendation on the frequency of the jobs.
When an employee in SAP SuccessFactors is terminated or retired, the HR Triggers in SAP Cloud Identity Access
Governance capture the event to deprovision the roles and users in the corresponding systems. HR Triggers are
repeatedly executed to capture the event.
The information in this section covers the scenario of the SAP Cloud Identity Access Governance solution and
its services connecting to SAP ABAP (on-premise) applications. The following graphic illustrates the solution
fetching data from SAP ABAP target applications that reside behind a firewall, and using SAP Cloud Platform
Identity Authentication for user authentication.
The information in this section describes the procedure for connecting SAP ABAP (on-premise) applications to
the access request service. By connecting to the access request service, it enables SAP ABAP (on-premise)
users to use the self-service access requests, auto-provisioning, and auditable workflows. The graphic below
● You have upgraded the target system to one of the supported NetWeaver versions and support packs.
● You have created the required RFC user.
● Your SAP Cloud Platform and SAP Cloud Platform Identity Authentication Service (SCI) tenant accounts
have been created by SAP, and you have received the respective tenant account information and activation
notification.
You must have upgraded the target system to one of the supported NetWeaver versions and support packs.
The IAG Services Data Extractor API is included in the following NetWeaver versions and support packs.
NW 700 SP34
NW 701 SP19
NW 702 SP19
NW 710 SP21
NW 711 SP16
NW 730 SP16
NW 731 SP19
NW 740 SP16
NW 750 SP04
NW751 SP02
An RFC user is needed in the target SAP system to allow communication with IAG services using the SAP Cloud
Platform.
Create an RFC user with the authorization objects and values listed in the table below.
BAPT RFC1
SUSR
SUUS
SU_USER
SYST
SYSU
RFC_TYPE FUGR
DICBERCLS &NC& SC
SS
ZV&G
ZV&H
ZV&N
ACT_GROUP *
OBJECT *
ACT_GROUP *
CLASS *
PROFILE *
SUBSYSTEM *
OBJECT *
DEVCLASS SUSO
OBJNAME SIAG*
OBJTYPE FUGR
OBJTYPE *
SAP Cloud Connector serves as the link between on-demand applications in SAP Cloud Platform and existing
on premise systems.
The cloud Connector runs as an on-premise agent in a secured network and acts as a reverse invoke proxy
between the on premise network and SAP Cloud Platform.
To Install the cloud connector, view the help documentation for SAP Cloud Platform Cloud Connector, and
follow the instructions for the scenario: Connecting Cloud Applications to On-Premise Systems.
Parent topic: Maintaining Cloud Connector for On-Premise Scenario [page 82]
Pre-requisite: You have already activated your user (Pxxxx) in SAP Cloud Identity and have administrator
access to this account.
Note
For the following, maintain one SAP Cloud Platform Connector for each target system.
1. Login to your SAP Cloud Platform Connector and create a new account.
Go to Account Dashboard and click Add Account.
Parent topic: Maintaining Cloud Connector for On-Premise Scenario [page 82]
Next: Maintain Destinations for SAP Cloud Platform Connector [page 84]
In the SAP Cloud Platform Cockpit, maintain destinations for each target system to enable communication via
the SAP Cloud Platform Connector.
For on premise systems, make sure to select the Proxy Type OnPremise.
For more information about using the destination service, see the following SAP Cloud Platform
documentation: Configure Destinations from the Cockpit
Only HTTP destinations are relevant for the destination service. For more information, see the following
documentation: Create HTTP Destinations
Parent topic: Maintaining Cloud Connector for On-Premise Scenario [page 82]
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Job Scheduler app.
2. Select the job category Provisioning, fill in the required attributes, and click Schedule Job.
The information in this section describes the procedure for connecting SAP Ariba to the SAP Cloud Identity
Access Governance solution and its services. SAP Cloud Identity Access Governance is a cloud-based solution
for creating self-service requests to applications for on-premise and cloud source applications and systems. By
connecting to the solution, it enables SAP Ariba users to initiate access requests, which are then provisioned to
target applications.
Ensure you have completed enablement and configuration for the SAP Cloud Identity Access Governance
solution.
Note
The integration of SAP Cloud Identity Access Governance and SAP Ariba solutions is based on the Master
Data Native Interface (MDNI). This integration is currently available for SAP Ariba Buying and SAP Ariba
Strategic Sourcing applications. Support for other SAP Ariba solutions is possible; this depends, however,
on the synchronization options between the respective SAP Ariba solution and SAP Ariba Buying and SAP
Ariba Sourcing applications. Refer to the SAP Ariba documentation to determine if such options exist for
your scenario.
There are three overall steps to enable integration between SAP Ariba solutions and the SAP Cloud Identity
Access Governance solution and its service.:
1. In the SAP Cloud Platform, set up destination for the SAP Ariba solution.
2. In the access request service, use the Systems app to create an instance for the SAP Ariba solution.
In the SAP Cloud Platform, create destinations for your SAP Ariba instance.
1. Log into the SAP Cloud Platform cockpit, and go to your tenant.
2. In the left-hand pane, click Connectivity Destinations , and then click New Destination.
3. Create a destination for the SAP Ariba instance, and add the following properties listed in the table below.
Note
You may need to manually add the property field if it is not automatically displayed.
Caution
It is very important to accurately enter the text strings as specified below. We recommending copying
and pasting them.
*Name ARIBA_DEST
Type: HTTP
Authentication: BasicAuthentication
User: Userid access MDNI service in ariba (You need to get this
from Ariba by creation Service request)
fetchGroups /mdni/erpintegration/api/fetchGroups
objectName User
uploadXMLUserData /mdni/erpintegration/api/uploadXMLData
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Ariba. For System Type, select SAP Ariba.
3. In the HCP Destination field, enter the name of the SAP Cloud Platform destination for SAP Ariba.
4. Save.
In the access request service launchpad, open the Job Scheduler app. In the Job Category dropdown, schedule
the following jobs:
● Repository Sync to synchronize the relevant data from SAP Ariba to the access request service.
In the System dropdown, select SAP Ariba.
● Provisioning to initiate the provisioning of access requests.
The information in this section describes the procedure for connecting SAP Fieldglass to the SAP Cloud
Identity Access Governance solution and its services. SAP Cloud Identity Access Governance is a cloud-based
solution for creating self-service requests to applications for on-premise and cloud source applications and
systems. By connecting to the IAG solution, it enables SAP Fieldglass users to initiate access requests, which
are then provisioned to target applications. This leverages out-of-box authorizations and risk modeling to
analyze SAP Fieldglass access requests.
Note
Ensure you have completed enablement and configuration for the SAP Cloud Identity Access Governance
solution.
There are three overall steps to enable integration between SAP Fieldglass and the SAP Cloud Identity Access
Governance solution and its services:
1. In the SAP Cloud Platform, set up destination for the SAP Fieldglass solution.
2. In the access request service, use the Systems app to create an instance for the SAP Fieldglass solution.
3. In the access request service, use the Job Scheduler app to sync user data and provision access requests.
In the SAP Cloud Platform, create destinations for your SAP Fieldglass instance.
1. Log into the SAP Cloud Platform cockpit, and go to your tenant.
2. In the left-hand pane, click Connectivity Destinations , and then click New Destination.
3. Create a destination for the SAP Fieldglass instance, using the following constraints.
Caution
It is very important to accurately enter the text strings as specified below. We recommending copying
and pasting them.
*Name FieldGlassDest
Type: HTTP
Authentication: BasicAuthentication
User: Name of the user SCP uses to access the SAP Fieldglass
instance.
accessToken /api/oauth2/v2.0/token?
grant_type=client_credentials&response_
type=token
x-ApplicationKey Enter the application key from the SAP Fieldglass in
stance.
Create an instance for SAP Fieldglass in the access request service Systems app.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Fieldglass. For System Type, select SAP Fieldglass.
3. In the HCP Destination field, enter the name of the SAP Cloud Platform destination for the SAP Fieldglass
instance.
4. Save.
In the access request service launchpad, open the Job Scheduler app. In the Job Category dropdown, schedule
the following jobs:
● Repository Sync to synchronize the relevant data from SAP Fieldglass to the access request service.
In the System dropdown, select SAP Fieldglass.
● Provisioning to initiate the provisioning of access requests.
The information in this section describes the procedure for connecting your SAP S/4HANA Cloud tenant to the
SAP Cloud Identity Access Governance solution (IAG). This connection allows SAP S/4HANA Cloud users to
use the IAG services such as access request, access analysis, and features such as auto-provisioning, and
auditable workflows.
The procedure consists of configuration steps on the S/4HANA Cloud tenant, and on the SAP Cloud Platform
(SCP) tenant for IAG. The following is a summary of the procedure steps. For details, see the respective
sections.
The information in this section describes the prerequisites and procedures you carry out on SAP S/4 HANA
Cloud to enable the integration with the access request service.
Prerequisites
You must have completed the following prerequisites before you can begin the configuration tasks.
● Your SAP S/4HANA Cloud user has been assigned the business catalog SAP_CORE_BC_COM.
Procedure
For more information on creating communication users and communication arrangements, see
Communication Management.
Create a communication user and upload the SSL certificate. The uses the private key to enable secure
communication.
Note
For more information, refer to: SAP Cloud Identity Provisioning Service.
1. Log onto your SAP S/4HANA Cloud tenant, and open group Communication Management.
Value Parameter
Tip
Create a password via Propose Password to receive a
password which satisfies the password rules.
3. Choose Upload Certificate and select the SSL Client Certificate from Verisign.
4. Choose Create.
1. Log onto your SAP S/4HANA Cloud tenant, and open group Communication Management.
Value Parameter
Tip
Create a password via Propose Password to receive a
password which satisfies the password rules.
1. Start the app Communication Systems and choose New to create a Communication System representing
your SCP-IAG tenant account.
4. Enter the hostname of your SCP-IAG Provider Tenant ID. Enter only the hostname without protocol and
path. For example: xxxxx.us2.hana.ondemand.com.
5. Choose Save.
6. In the User for Inbound Communication section, choose the + button.
7. Select Authentication Method as SSL Client Certificate and add the communication user you created in the
previous step for the SSL Certificate option.
Note
1. Start the Communication Systems app and choose New to create a Communication System representing
your SCP-IAG tenant account.
2. Choose a System ID and System Name to represent your SAP Cloud Platform account.
3. Choose Create.
4. Enter the hostname of your SCP-IAG Provider Tenant ID. Enter only the hostname without protocol and
path. For example: xxxxx.us2.hana.ondemand.com.
5. Choose Save.
6. In the User for Inbound Communication section, choose the + button.
7. Select Authentication Method as User ID and Password and add the communication user you created in the
previous step for the Basic Authentication option.
8. In the User for Outbound Communication section, choose the + button.
9. Select Authentication Method as User ID and Password and add the communication user you created in the
previous step for the Basic Authentication option.
Create a communication arrangement, one for each communication scenario. Two scenarios are available.
You may choose to implement one or both. To implement both, complete all the steps in this procedure to
create a communication arrangement for one, and then repeat the procedure again to create an arrangement
for the other.
Example:
3. Select the Communication System you created in the previous step.
The other data is defined by the system.
The information in this section describes the prerequisites and procedures you carry out on SAP Cloud
Platform tenant to enable the connection with the SAP S/4HANA Cloud tenant.
Prerequisites
You must have completed the following prerequisites before you can begin the configuration tasks:
● You have completed the configuration steps for the SAP S/4HANA Cloud tenant.
● You have the SSL certificate from your SAP S/4HANA tenant (applicable for only certificate based).
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Connectivity Destinations in the navigation panel.
3. Click New Destination and create the following destination.
Type HTTP
Authentication ClientCertificateAuthentication
4. Choose New Property and select sap-client and enter S4HANA client value.
5. Choose Upload and Delete Certificate link to upload the SSL certificate for your S/4HANA tenant. Select
the file location for the S/4HANA certificate. (This is the public key (xxxx.p12) generated from the private
key for the user in S/4 HANA.)
1. From the Key Store Location drop-down menu, select your keystore.
2. In the Key Store Password, enter the keystore password
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Connectivity Destinations in the navigation panel.
3. Click New Destination and create the following destination.
Type HTTP
URL Enter the URL for the SAP S/4HANA Cloud system Serv
ice such as < https://xxxx.s4hana.ondemand.com>
User The name of the communication user you have in the SAP
S/4HANA Cloud tenant.
4. Choose New Property and select sap-client and enter S4HANA client value.
Parameter Value
IAG services use OAuth to protect communication between the IAG Provisioning and SAP S/4HANA Cloud.
Note
Since SAP Identity Provisioning Service runs in the NEO environment, the configurations described below
must be performed in the NEO subaccount under which IPS is subscribed. For more information, refer to
the link for SAP Identity Provisioning Service provided at the bottom of this page.
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Security OAuth in the navigation panel.
3. Switch to the Clients tab.
4. Choose Register New Client in the Clients table and create the following client by adding the parameters
and values given below.
Parameter Value
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Applications Subscriptions in the navigation panel.
3. Choose the application ipsproxy in the Subscriped Java Applications table.
4. Choose Roles in the navigation panel.
5. Select IPS_PROXY_USER role and choose Assign to add User ID.
6. Enter the OAuth Client ID created in the previous step.
7. Choose Assign.
In the SAP Cloud Platform (SCP), create destinations for your SAP Identity Provisioning Service.
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Connectivity Destinations in the navigation panel.
3. Choose New Destination and create the following destination.
It is very important to accurately enter the text strings as specified below. We recommend copying and
pasting them.
Parameter Value
*Name IPS_PROXY
Type HTTP
Authentication BasicAuthentication
Note
This user is configured in Security OAuth
4. Choose New Property and select sap-client and enter S4HANA client value.
Parameter Value
Accept application/scim+json
*OAuth2TokenServiceURL Enter the URL for the OAUTH Token endpoint suffixed with
grant_type=client_credentials such as <https://oauthas
services-<SubscriptionTenant ID><Regional Host>//
oauth2/api/v1/token?grant_type=client_credentials>
Note
The OAuth Token Endpoint URL can be found in
GROUPSURL /Groups
serviceURL /ipsproxy/api/v1/scim/
USERSURL /Users
Step 1: Assign role IPS_ADMIN to the user by following the below steps:
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Services Identity Provisioning in the navigation panel.
3. Click Configure Service.
4. Choose Roles in the navigation panel.
5. Select IPS_ADMIN role and click Assign to add User ID.
6. Click Assign.
Note
Add the SCP-IAG Tenant Admin so that the user can later perform Step 2 mentioned below.
Step 2: Create a proxy system to connect SAP S4/HANA Cloud with the SCP-IAG tenant.
1. In the SCP-IAG tenant, go to the Subaccounts dropdown menu and choose your subaccount.
2. Choose Services Identity Provisioning in the navigation panel.
3. Click Go to Service.
4. Add a proxy system for SAP S/4HANA Cloud.
5. Select Type as SAP S/4HANA Cloud.
6. Enter the System Name, Description and Destination Name.
The Destination Name is the destination created in the previous section Create Destination for the S/
4HANA Cloud system.
{ {
"user": { "user": {
"mappings": [ "mappings": [
{ {
"sourcePath": "sourcePath": "$
"$.personID", ['urn:ietf:params:scim:schemas:extens
"targetPath": "$.id", ion:enterprise:2.0:User']
"targetVariable": ['employeeNumber']",
"entityIdSourceSystem" "targetPath":
}, "$.personExternalID"
{ },
"sourcePath": {
"$.user.role[*].roleName", "sourceVariable":
"entityIdTargetSystem",
"preserveArrayWithSingleElement": "targetPath":
true, "$.personID"
"optional": true, },
"targetPath": {
"$.groups[?(@.value)]" "targetPath":
}, "$.businessPartnerRoleCode",
{ "type":
"sourceVariable": "valueMapping",
"entityBaseLocation", "sourcePaths": [
"targetPath": "$.userType"
"$.meta.location", ],
"targetVariable": "defaultValue":
"entityLocationSourceSystem", "BUP003",
"functions": [ "valueMappings": [
{ {
"type": "key": [
"concatString",
"suffix": "$ "Employee"
{entityIdSourceSystem}" ],
}
] "mappedValue": "BUP003"
}, },
{ {
"sourcePath": "key": [
"$.personalInformation.firstName",
"optional": true, "Freelancer"
"targetPath": ],
"$.name.givenName"
}, "mappedValue": "BBP010"
{ },
"sourcePath": {
"$.personalInformation.lastName", "key": [
"optional": true, "Service
"targetPath": Performer"
"$.name.familyName" ],
},
{ "mappedValue": "BBP005"
"sourcePath": }
"$.personalInformation.middleName", ]
"optional": true, },
"targetPath": {
"$.name.middleName" "sourceVariable":
}, "currentDate",
{ "targetPath":
"$.validityPeriod.startDate",
"sourcePath": "scope":
"$.personalInformation.personFullName "createEntity"
", },
"optional": true, {
"targetPath": "constant":
"$.name.formatted" "9999-12-31",
}, "targetPath":
{ "$.validityPeriod.endDate",
"sourcePath": "scope":
"$.user.userName", "createEntity"
"optional": true, },
"targetPath": {
"$.userName", "sourcePath":
"$.name.givenName",
"correlationAttribute": true "optional": true,
}, "targetPath":
{ "$.personalInformation.firstName"
"constant": true, },
"targetPath": {
"$.active" "sourcePath":
}, "$.name.familyName",
{ "optional": true,
"condition": "targetPath":
"$.user.lockedIndicator == 'X'", "$.personalInformation.lastName"
"constant": false, },
"optional": true, {
"targetPath": "sourcePath":
"$.active" "$.name.middleName",
}, "optional": true,
{ "targetPath":
"sourcePath": "$.personalInformation.middleName"
"$.workplaceInformation.emailAddress" },
, {
"optional": true, "sourcePath":
"targetPath": "$.name.formatted",
"$.emails[0].value", "optional": true,
"targetPath":
"correlationAttribute": true "$.personalInformation.personFullName
}, "
{ },
"sourcePath": {
"$.user.logonLanguageCode", "sourcePath":
"optional": true, "$.userName",
"targetPath": "targetPath":
"$.locale" "$.user.userName"
}, },
{ {
"sourcePath": "sourcePath":
"$.personExternalID", "$.locale",
"optional": true, "optional": true,
"targetPath": "targetPath":
"$.personExternalID", "$.user.logonLanguageCode"
},
"correlationAttribute": true {
}, "sourcePath":
{ "$.groups[*].value",
"targetPath":
"$.timeZone", "preserveArrayWithSingleElement":
"type": true,
"valueMapping", "optional": true,
"sourcePaths": [ "targetPath":
"$.user.role[?(@.roleName)]"
"$.user.timeZoneCode" },
{
], "sourcePath":
"defaultValue": "$.emails[0].value",
"Europe/Berlin", "optional": true,
"valueMappings": [ "targetPath":
{ "$.workplaceInformation.emailAddress"
"key": [ },
"UTC" {
], "condition":
"$.active == false",
"mappedValue": "Etc/UTC" "constant": "X",
}, "targetPath":
{ "$.user.lockedIndicator"
"key": [ }
"EST" ],
], "scimEntityEndpoint": "Users"
},
"mappedValue": "America/New_York" "group": {
}, "mappings": [],
{ "scimEntityEndpoint":
"key": [ "Groups"
"UTC+8" }
], }
"mappedValue": "Asia/Shanghai"
},
{
"key": [
"BRAZIL"
],
"mappedValue": "America/Sao_Paulo"
},
{
"key": [
"MSTNO"
],
"mappedValue": "America/Phoenix"
},
{
"key": [
"AUSNSW"
],
"mappedValue": "Australia/Sydney"
},
{
"key": [
"BRZLEA"
],
"mappedValue": "America/Sao_Paulo"
},
{
"key": [
"WDFT"
],
"mappedValue": "Europe/Berlin"
},
{
"key": [
"JAPAN"
],
"mappedValue": "Asia/Tokyo"
},
{
"key": [
"ISRAEL"
],
"mappedValue": "Asia/Jerusalem"
},
{
"key": [
"UTC+4"
],
"mappedValue": "Asia/Dubai"
},
{
"key": [
"EST_"
],
"mappedValue": "America/Toronto"
},
{
"key": [
"RUS03"
],
"mappedValue": "Europe/Moscow"
},
{
"key": [
"UTC+3"
],
"mappedValue": "Asia/Riyadh"
}
]
},
{
"targetPath":
"$.userType",
"type":
"valueMapping",
"sourcePaths": [
"$.businessPartnerRoleCode"
],
"defaultValue":
"Employee",
"valueMappings": [
{
"key": [
"BBP005"
],
],
"mappedValue": "Employee"
},
{
"key": [
"BBP010"
],
"mappedValue": "Freelancer"
}
]
}
],
"scimEntityEndpoint": "Users"
},
"group": {
"mappings": [
{
"sourcePath": "$.ID",
"targetPath": "$.id",
"targetVariable":
"entityIdSourceSystem"
},
{
"sourceVariable":
"entityBaseLocation",
"targetPath":
"$.meta.location",
"targetVariable":
"entityLocationSourceSystem",
"functions": [
{
"type":
"concatString",
"suffix": "$
{entityIdSourceSystem}"
}
]
},
{
"constant":
"urn:ietf:params:scim:schemas:core:
2.0:Group",
"targetPath":
"$.schemas[0]"
},
{
"sourcePath": "$.ID",
"targetPath":
"$.displayName"
},
{
"sourcePath":
"$.to_BusinessUserAssignment.results"
,
"preserveArrayWithSingleElement":
true,
"optional": true,
"targetPath":
"$.members"
},
{
"targetPath":
"$.members[*].__metadata",
"type": "remove"
},
{
"constant": "value",
"targetPath":
"$.members[*].PersonID",
"type": "rename"
},
{
"constant": "user",
"targetPath":
"$.members[*].type"
}
],
"scimEntityEndpoint":
"Groups"
}
}
Note
Copy the external system ID and use it to set up the SAP S4/HANA Cloud instance in the Systems app in
the next section Add SAP S/4HANA Cloud System.
Create an instance for the SAP S/4HANA Cloud system in the access request service Systems app.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP S/4HANA Cloud. For the System Type, select SAP S/4HANA Cloud.
3. In the HCP Destination field, enter the System name of the S/4HANA Cloud destination created in the
previous section Create Destination.
4. Enter the external system ID which was marked in previous section Create Proxy System.
5. Save your entries.
Note
Perform the below steps only if S/4HANA Cloud System is created in IAG prior to 1911 release.
In the IAG launchpad, open the Job Scheduler app and schedule the following job:
● Repository Sync to synchronize the relevant data from SAP Identity Authentication to the access request
service.
1. In the Job Name field, enter Job Name.
2. In the Job Category field, select Repository Sync.
3. In the Recurring Job field, select No.
4. In the Start Immediately field, select Yes.
5. In the System Type field, select SAP S4/HANA Cloud.
6. In the System field, select System.
7. Click Schedule Job button. The job status and log can be checked in the Job History app.
Note
To schedule a Recurring Job for both Repository Sync and Provisioning, refer to 2859618 for
recommendation on the frequency of the jobs.
The information in this section describes the procedure for connecting SAP S/4HANA On-Premise to the SAP
Cloud Identity Access Governance solution and its services. SAP Cloud Identity Access Governance is a cloud-
based service for creating self-service requests to applications for on-premise and cloud source applications
and systems. By connecting to the IAG solution, it enables SAP S/4HANA On-Premise users to initiate access
requests, which are then provisioned to target applications.
Ensure you have completed enablement and configuration for the SAP Cloud Identity Access Governance
solution.
There are three overall steps to enable integration between SAP S/4HANA on-premise systems and the SAP
Cloud Identity Access Governance solution and its services:
1. In the SAP Cloud Platform, set up destination for the S/4HANA on-premise system.
2. In the access request service, use the Systems app to create an instance for the S/4HANA on-premise
system.
3. In the access request service, use the Job Scheduler app to sync user data and provision access requests.
If you have not already done so, insteall the SAP Cloud Platform Connector to enable secure communication
between the access request service and the SAP S/4HANA on-premise system.
For the procedure, refer to the topic Maintaining Cloud Connect for On-Premise Scenario [page 42].
In the access request service launchpad, open the Job Scheduler app, and schedule the following jobs:
● Repository Sync to synchronize the relevant data from SAP S/4HANA system to the access request
service.
● Provisioning to initiate the provisioning of access requests.
Create an instance for SAP S/4HANA in the access request service Systems app.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP S/4HANA. For System Type, select SAP S/4HANA On-Premise.
3. In the HCP Destination field, enter the name of the SAP S/4HANA destination from SAP Cloud Platform.
4. Save.
The information in this section describes the procedure for connecting Microsoft Azure to the SAP Cloud
Identity Access Governance solution and its services. SAP Cloud Identity Access Governance is a cloud-based
service for creating self-service requests to applications for on-premise and cloud source applications and
systems. By connecting to the IAG solution, it enables Microsoft Azure users to initiate access requests, which
are then provisioned to target applications.
There are three overall steps to enable integration between Microsoft Azure and the SAP Cloud Identity Access
Governance solution and its services:
1. In the SAP Cloud Platform Identity Provisioning service (SCIM), create a proxy system for the Microsoft
Azure system.
2. In the access request service launchpad, use the Systems app to create a system for Azure, using the
external system ID generated from step 1.
3. In the SAP Cloud Platform, create two destinations: one to generate an authentication token; one for
provisioning.
4. In the access request service, schedule jobs to synch Azure users and roles, and to provision the access
requests.
Create a proxy system to enable Microsoft Azure to connect with the SAP Cloud Platform.
1. Log into the SAP Cloud Platform cockpit, go to your SCP tenant instance, and open Services Identity
Provisioning Go To Service Proxy System .
2. Add a proxy system for Azure and click Save.
The service generates a URL for the Azure proxy system. The external system ID is included in the
URL. (See the illustration below.)
3. Copy the external system ID, and use it to set up the Azure instance in the Systems app in the next step.
Create an instance for Azure in the access request service Systems app.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for Azure. For System Type, select Microsoft Azure.
3. In the External System ID field, paste the ID you copied from the SCP proxy system.
4. Save.
Note
When creating the destinations, enter the name exactly as described below.
IAGprovisioning_IDMOauth
Field Value
Name IAGprovisioning_IDMOauth
Type HTTP
URL
Authentication BasicAuthentication
Body grant_type=client_credentials
Header {"Content-Type":"application/x-www-form-
urlencoded","Authorization":"Basic
Yzk3YTY3YTEtOTUxZS0zN2NjLWJmMWUtZjgwNDlhYTMxZ
mRiOkFiY2QxMjM0","Accept":"application/json"}
IAGProvisioning_SCIMService
Field Value
Name IAGProvisioning_SCIMService
Type HTTP
URL
Authentication BasicAuthentication
GroupAssignmentURL /Groups/
UserURL /Users
In the access request service launchpad, open the Job Scheduler app, and schedule the following jobs:
● Repository Sync to synchronize the relevant data from Azure to the access request service.
● Provisioning to initiate the provisioning of access requests.
The information in this section describes the procedure for connecting SAP Marketing Cloud to the SAP Cloud
Identity Access Governance solution and its services. SAP Cloud Identity Access Governance is a cloud-based
solution for creating self-service requests to applications for on-premise and cloud source applications and
systems. By connecting to the solution, it enables SAP Marketing Cloud users to initiate access requests, which
are then provisioned to target applications.
Prerequisites
Ensure you have completed enablement and configuration for the SAP Cloud Identity Access Governance
solution.
There are three overall steps to enable integration between SAP Marketing Cloud solutions and the SAP Cloud
Identity Access Governance solution and its service:
1. In the SAP Cloud Platform, set up destination for the SAP Marketing Cloud solution.
2. In the access request service, use the Systems app to create an instance for the SAP Marketing Cloud
solution.
3. In the access request service, use the Job Scheduler app to sync user data and provision access requests.
In the SAP Cloud Platform, create destinations for your SAP Marketing Cloud instance.
Note
You may need to manually add the property field if it is not automatically displayed.
Caution
It is very important to accurately enter the text strings as specified below. We recommend copying and
pasting them.
Type: HTTP
Authentication: BasicAuthentication
User: Name of the user SCP uses to access the SAP Marketing
Cloud instance
WRITE /sap/bc/srt/scs/sap/
managebusinessuserin
1. Log in to the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Marketing Cloud. For System Type, select SAP Marketing Cloud.
3. In the HCP Destination field, enter the name of the SAP Cloud Platform destination for SAP Marketing
Cloud.
4. Save.
In the access request service launchpad, open the Job Scheduler app. In the Job Category dropdown list,
schedule the following jobs:
● Repository Sync to synchronize the relevant data from SAP Marketing Cloud to the access request service.
In the System dropdown list, select SAP Marketing Cloud.
● Provisioning to initiate the provisioning of access requests.
● Open a Configuration tile from the Administration group in the SAP Cloud Identity Access Governance (IAG)
Fiori launchpad. Make sure there is an entry for USERIDGROUP as shown below.
Field Length 40
13. On the next tab, choose the Custom Field Group created in the first step. Save the custom field using Save
button at the bottom.
After creating this configuration, there will be a new custom field in Access Request which will read the login
name from the authentication system (example: IAS). This will be blank if the login name is not maintained. In
this case, it will use the same P-number for the user provisioning.
The information in this section describes the procedure for connecting SAP Integrated Business Planning to
the SAP Cloud Identity Access Governance solution and its services. SAP Cloud Identity Access Governance is
a cloud-based solution for creating self-service requests to applications for on-premise and cloud source
applications and systems. By connecting to the solution, it enables SAP Integrated Business Planning users to
initiate access requests, which are then provisioned to target applications.
Prerequisites
Ensure you have completed enablement and configuration for the SAP Cloud Identity Access Governance
solution.
There are four overall steps to enable integration between SAP Integrated Business Planning solution and the
SAP Cloud Identity Access Governance solution and its service:
1. In the SAP Integrated Business solution, carry out the required configuration tasks and steps.
2. In the SAP Cloud Platform, set up destination for the SAP Integrated Business Planning solution.
3. In the access request service, use the Systems app to create an instance for the SAP Integrated Business
Planning solution.
4. In the access request service, use the Job Scheduler app to sync user data and provision access requests.
The information in this section describes the prerequisites and procedures you carry out in SAP Integrated
Business Planning to enable the integration with the access request service.
Prerequisites
You must have completed the following prerequisites before you can begin the configuration tasks.
● Your user for SAP Integrated Business Planning has been assigned the business catalog
SAP_CORE_BC_COM.
● You can use the business role template SAP_BR_ADMINISTRATOR.
● You have a signed SSL certificate from Verisign for your tenant [optional].
The certificate is used to enable secure communication between SAP Integrated Business Planning and
the SAP Cloud Platform tenant for IAG.
Procedure
Create a communication user and upload the SSL certificate. The uses the private key to enable secure
communication.
1. Log onto your SAP Integrated Business Planning, and open group Communication Management.
Value Parameter
Tip
Create a password via Propose Password to receive a
password which satisfies the password rules.
3. Click Upload Certificate and select the SSL Client Certificate from Verisign.
4. Choose Create.
1. Log onto your SAP Integrated Business Planning, and open group Communication Management.
Value Parameter
Tip
Create a password via Propose Password to receive a
password which satisfies the password rules.
3. Choose Create.
1. Start the app Communication Systems and click New to create a Communication System representing
your SCP-IAG tenant account.
4. Enter the hostname of your SCP-IAG Provider Tenant ID. Enter only the hostname without protocol and
path. For example: xxxxx.us2.hana.ondemand.com.
5. Choose Save.
6. In the User for Inbound Communication section, choose the + button.
7. Select Authentication Method as SSL Client Certificate and add the communication user you created in the
previous step for SSL Certificate option.
Note
1. Start the Communication Systems app and click New to create a Communication System representing your
SCP-IAG tenant account.
2. Choose a System ID and System Name to represent your SAP Cloud Platform account.
3. Choose Create.
4. Enter the hostname of your SCP-IAG Provider Tenant ID. Enter only the hostname without protocol and
path. For example: xxxxx.us2.hana.ondemand.com.
5. Choose Save.
6. In the User for Inbound Communication section, choose the + button.
7. Select Authentication Method as User ID and Password and add the communication user you created in
the previous step for Basic Authentication option.
Create a communication arrangement, one for each communication scenario. Two scenarios are available.
You may choose to implement one or both. To implement both, complete all the steps in this procedure to
create a communication arrangement for one, and then repeat the procedure again to create an arrangement
for the other.
Example:
3. Select the Communication System you created in the previous step.
The other data is defined by the system.
In the SAP Cloud Platform, create destinations for your SAP Integrated Business Planning instance.
Note
You may need to manually add the property field if it is not automatically displayed.
Caution
It is very important to accurately enter the text strings as specified below. We recommend copying and
pasting them.
*Name IBPCLOUD
Type: HTTP
*URL https://myXXXXXX-api.scmibp.ondemand.com
Authentication: BasicAuthentication
User: Name of the user SCP uses to access the SAP Integrated
Business Planning instance
WRITE /sap/bc/srt/scs_ext/sap/
managebusinessuserin
Create an instance for SAP Integrated Business Planning in the Systems app.
1. Log in to the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Integrated Business Planning. For System Type, select SAP Integrated System
Planning.
3. In the HCP Destination field, enter the name of the SAP Cloud Platform destination for SAP Integrated
Business Planning.
4. Save.
In the access request service launchpad, open the Job Scheduler app. In the Job Category dropdown list,
schedule the following jobs:
● Repository Sync to synchronize the relevant data from SAP Integrated Business Planning to the access
request service.
In the System dropdown list, select the SAP Integrated Business Planning system defined in the
previous step.
● Provisioning to initiate the provisioning of access requests.
● Open a Configuration tile from the Administration group in the SAP Cloud Identity Access Governance (IAG)
Fiori launchpad. Make sure there is an entry for USERIDGROUP as shown below.
Name IBP_Group
Description IBP_Group
Name IBP_USERNAME
Description IBP_USERNAME
Label UserName
Field Length 40
8. On the next tab, choose the Custom Field Group created in the first step. Save the custom field using Save
button at the bottom.
9. In the Field Mapping app, create a new field mapping between the IAG custom field and SAP Integrated
Business Planning field.
After creating this configuration, there will be a new custom field in Access Request which will read the
login name from the authentication system (example: IAS). This will be blank if the login name is not
maintained. In this case, it will use the same P-number for the user provisioning.
The information in this section describes the procedure for connecting SAP Analytics Cloud to the SAP Cloud
Identity Access Governance solution and its services.
SAP Cloud Identity Access Governance is a cloud-based solution for creating self-service requests to
applications for on-premise and cloud source applications and systems. By connecting to the solution, it
enables SAP Analytics Cloud users to initiate access requests, which are then provisioned to target
applications.
There are three overall steps to enable integration between SAP Analytics Cloud systems and the SAP Cloud
Identity Access Governance solution and its services:
1. In the SAP Cloud Platform, set up destination for the SAP Analytics Cloud system.
2. In the access request service, use the Systems app to create an instance for the SAP Analytics Cloud
system.
3. In the access request service, use the Job Scheduler app to sync user data and provision access requests.
Create a proxy system to enable SAP Analytics Cloud to connect with the SAP Cloud Platform.
Context
Procedure
1. Log into the SAP Cloud Platform cockpit, go to your SCP tenant instance, and open Services Identity
Provisioning Go To Service Proxy System .
2. Copy the external system ID and use it to set up the SAP Analytics Cloud instance in the Systems app in the
next step.
The OAUTH2 service token can be generated in the SAC system. Click on System Administration App
Integration Click on Add a new OAuth Client
In the SAP Cloud Platform, create destinations for your SAP Analytics Cloud instance.
1. Log into the SAP Cloud Platform cockpit and go to your tenant.
2. In the left-hand pane, Connectivity Destinations, and then select New Destination.
Note
It is very important to accurately enter the text strings as specified below. We recommend copying and
pasting them.
*Name IPS_PROXY
Type HTTP
Authentication BasicAuthentication
Accept application/scim+json
GROUPSURL /Groups
serviceURL /ipsproxy/api/v1/scim/
USERSURL /Users
Create an instance for SAP Analytics Cloud in the access request service Systems app.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Analytics Cloud. For System Type, select SAP Analytics Cloud.
3. In the SCP Destination field, enter the name of the IPS destination created in the above step for the SAP
Analytics Cloud instance.
4. Enter the external system ID marked in previous step Create Proxy System.
5. Save.
● Repository Sync to synchronize the relevant data from SAP Analytics Cloud to the access request service.
In the System Type dropdown list, select SAP Analytics Cloud. In the System dropdown list, select the
configured Analytics Cloud System.
Note
You can only assign groups to a user because it is not possible to directly assign roles.
The information in this section describes the procedure for connecting LDAP to the SAP Cloud Identity Access
Governance solution and its services.
SAP Cloud Identity Access Governance is a cloud-based solution for creating self-service requests to
applications for on-premise and cloud source applications and systems. By connecting to the solution, it
enables IAG users to initiate access requests, which are then provisioned to target applications.
Note
Currently, we only support Microsoft LDAP (Microsoft Active Directory). Additionally, only users in the top
organization unit on the LDAP server can be provisioned. The users can then be assigned to or removed
from groups.
There are three overall steps to integrate the LDAP system with the SAP Cloud Identity Access Governance
solution and its services:
Procedure
1. In the SAP Cloud Platform cockpit, set up destination for the SAP LDAP system.
2. In the SAP Cloud Identity Access Governance launchpad, use the Systems app to create an instance for the
LDAP system.
3. In the SAP Cloud Identity Access Governance launchpad, use the Job Scheduler app to sync user data and
provision access requests.
Create a proxy system to connect the SAP LDAP system with the SAP Cloud Platform.
Procedure
1. Log into the SAP Cloud Platform cockpit, go to your SCP tenant instance, and open Services Identity
Provisioning Go To Service Proxy System .
2. Add a proxy system for the LDAP system and select Microsoft Active Directory or LDAP based on the target
LDAP system type.
3. Properties should have ldap.group.path and ldap.user.path.
Name Value
ldap.respond.with.resource.after.create true
ldap.respond.with.resource.after.update true
In the SAP Cloud Platform, create a destination for your LDAP instance.
Procedure
1. Log into the SAP Cloud Platform cockpit and go to your subaccount.
2. In the left-hand pane, select Destinations, and then select New Destination.
3. Create a destination for the LDAP instance, using the following properties.
Authentication BasicAuthentication
Create an instance for LDAP in the SAP Cloud Identity Access Governance launchpad.
Procedure
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for LDAP. For System Type, select LDAP.
3. In the HCP Destination field, enter the name of the LDAP destination created in the above step for the LDAP
instance.
4. Enter the external system ID marked in previous step Create Proxy System and save your entries.
Procedure
Protocol LDAP
In SAP Cloud Identity Access Governance launchpad, open the Job Scheduler app.
● Repository Sync to synchronize the relevant data from LDAP to the access request service.
In the System Type dropdown list, select LDAP.
In the System dropdown list, select the configured LDAP System.
● Provisioning to initiate the provisioning of access requests.
The information in this section describes the procedure for connecting the SAP Identity Authentication to
the SAP Cloud Identity Access Governance solution and its services. SAP Cloud Identity Access Governance
(IAG) is a cloud-based solution for creating self-service requests to applications for on-premise and cloud
source applications and systems. By connecting to the solution, it enables the SAP Identity Authentication
users to initiate access requests, which are then provisioned to target applications.
There are three overall steps to enable integration between the SAP Identity Authentication system and the
SAP Cloud Identity Access Governance solution and its services:
1. In the SAP Cloud Platform cockpit, set up destination for the SAP Identity Authentication system.
2. In the access request service, use the Systems app to create an instance for the SAP Identity
Authentication system.
In the SAP Cloud Platform (SCP), create destinations for your Identity Provisioning Service.
1. Log into the SAP Cloud Platform cockpit and go to your tenant.
2. In the left-hand pane, select Connectivity Destination New Destination .
It is very important to accurately enter the text strings as specified below. We recommend copying and
pasting them.
Parameter Value
*Name IPS_PROXY
Type HTTP
Authentication BasicAuthentication
Accept application/scim+json
GROUPSURL /Groups
serviceURL /ipsproxy/api/v1/scim/
USERSURL /Users
3. Note
The URL can be copied from the SAP Cloud Platform (SCP)-Subscriptions-ipsproxy-Application URLs.
Create a proxy system to enable the SAP Identity Authentication system to connect with the SAP Cloud
Platform.
1. Log into the SAP Cloud Platform cockpit, go to your SCP tenant instance, and open Services Identity
Provisioning Go To Service Proxy System .
2. Add a proxy system for the SAP Identity Authentication and select Save; the Type should be SAP Cloud
Platform Identity Authentication.
The service generates a URL for the proxy system specified for the SAP Identity Authentication. The
external ID is included in the URL as displayed below.
Note
Copy the external system ID and use it to set up the SAP Identity Authentication instance in the
Systems app in the next section Add SAP Identity Authentication System
1. To obtain the URL for IAS, go to SCP Trust Application Identity Provider .
2. For the property User, enter the technical user name configured for the Identity Authentication. This
name is automatically generated.
Example: <Technical ID>
3. For the property Password, enter the password for the technical user.
4. Default read and write transformations are generated.
{ {
"user": { "user": {
"mappings": [ "condition":
{ "($.emails.length() > 0) &&
"sourcePath": "$", ($.name.familyName EMPTY false)",
"targetPath": "$" "mappings": [
}, {
{ "sourcePath": "$",
"sourcePath": "$.id", "targetPath": "$"
"targetVariable": },
"entityIdSourceSystem" {
}, "sourcePath":
{ "$.groups",
"sourceVariable":
"entityBaseLocation", "preserveArrayWithSingleElement":
"targetPath": true,
"$.meta.location", "optional": true,
"targetVariable": "targetPath":
"entityLocationSourceSystem", "$.corporateGroups"
"functions": [ },
{ {
"type": "sourceVariable":
"concatString", "entityIdTargetSystem",
"suffix": "$ "targetPath": "$.id"
{entityIdSourceSystem}" },
} {
] "constant": true,
}, "targetPath":
{ "$.active"
"targetPath": },
"$.hasPassword", {
"type": "remove" "constant": "true",
}, "targetPath":
{ "$.sendMail",
"targetPath": "scope":
"$.groups[*].display", "createEntity"
"type": "remove" },
}, {
{ "constant": "true",
"condition": "targetPath":
"$.displayName EMPTY true", "$.mailVerified",
"targetPath": "scope":
"$.displayName", "createEntity"
"type": "remove" },
}, {
{ "constant":
"sourcePath": "disabled",
"$.timeZone", "targetPath":
"optional": true, "$.passwordStatus",
"targetPath": "scope":
"$.timezone" "createEntity"
}, },
{ {
"sourcePath": "$ "constant":
['urn:ietf:params:scim:schemas:extens "employee",
ion:enterprise:2.0:User'] "targetPath":
['employeeNumber']", "$.userType"
"optional": true, },
"targetPath": "$ {
['urn:ietf:params:scim:schemas:extens
ion:enterprise:2.0:User'] "targetPath":
['employeeNumber']" "$.groups",
}, "type": "remove"
{ },
"sourcePath": "$ {
['urn:ietf:params:scim:schemas:extens "sourcePath": "$
ion:enterprise:2.0:User'] ['urn:ietf:params:scim:schemas:extens
['costCenter']", ion:enterprise:2.0:User']",
"optional": true, "optional": true,
"targetPath": "$ "targetPath": "$
['urn:ietf:params:scim:schemas:extens ['urn:ietf:params:scim:schemas:extens
ion:enterprise:2.0:User'] ion:enterprise:2.0:User']"
['costCenter']" },
}, {
{ "sourcePath":
"sourcePath": "$ "$.timezone",
['urn:ietf:params:scim:schemas:extens "optional": true,
ion:enterprise:2.0:User'] "targetPath":
['organization']", "$.timeZone"
"optional": true, }
"targetPath": "$ ],
['urn:ietf:params:scim:schemas:extens "scimEntityEndpoint": "Users"
ion:enterprise:2.0:User'] },
['organization']" "group": {
}, "mappings": [
{ {
"sourcePath": "$ "sourceVariable":
['urn:ietf:params:scim:schemas:extens "entityIdTargetSystem",
ion:enterprise:2.0:User'] "targetPath": "$.id"
['division']", },
"optional": true, {
"targetPath": "$ "sourcePath":
['urn:ietf:params:scim:schemas:extens "$.displayName",
ion:enterprise:2.0:User'] "targetPath":
['division']" "$.displayName"
}, },
{ {
"sourcePath": "$ "sourcePath":
['urn:ietf:params:scim:schemas:extens "$.displayName",
ion:enterprise:2.0:User'] "targetPath": "$
['department']", ['urn:sap:cloud:scim:schemas:extensio
"optional": true, n:custom:2.0:Group']['name']",
"targetPath": "$ "scope":
['urn:ietf:params:scim:schemas:extens "createEntity",
ion:enterprise:2.0:User'] "functions": [
['department']" {
}, "type":
{ "replaceAllString",
"sourcePath": "$ "regex": "[\
['urn:ietf:params:scim:schemas:extens \s\\p{Punct}]",
ion:enterprise:2.0:User']['manager']
['value']", "replacement": "_"
"optional": true, }
"targetPath": "$ ]
['urn:ietf:params:scim:schemas:extens },
ion:enterprise:2.0:User']['manager'] {
['value']" "sourcePath": "$
}, ['urn:sap:cloud:scim:schemas:extensio
{ n:custom:2.0:Group']['name']",
"sourcePath": "$ "optional": true,
['urn:ietf:params:scim:schemas:extens "targetPath": "$
ion:enterprise:2.0:User']['manager'] ['urn:sap:cloud:scim:schemas:extensio
['displayName']", n:custom:2.0:Group']['name']"
},
"optional": true, {
"targetPath": "$ "sourcePath": "$
['urn:ietf:params:scim:schemas:extens ['urn:sap:cloud:scim:schemas:extensio
ion:enterprise:2.0:User']['manager'] n:custom:2.0:Group']['description']",
['displayName']" "optional": true,
}, "targetPath": "$
{ ['urn:sap:cloud:scim:schemas:extensio
"sourcePath": "$ n:custom:2.0:Group']['description']"
['urn:sap:cloud:scim:schemas:extensio },
n:custom:2.0:User']", {
"optional": true, "sourcePath":
"targetPath": "$ "$.members",
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:User']" "preserveArrayWithSingleElement":
}, true,
{ "optional": true,
"sourcePath": "targetPath":
"$.company", "$.members"
"optional": true, }
"targetPath": "$ ],
['urn:ietf:params:scim:schemas:extens "scimEntityEndpoint":
ion:enterprise:2.0:User'] "Groups"
['organization']" }
} }
],
"scimEntityEndpoint": "Users"
},
"group": {
"mappings": [
{
"sourcePath": "$.id",
"targetPath": "$.id",
"targetVariable":
"entityIdSourceSystem"
},
{
"sourceVariable":
"entityBaseLocation",
"targetPath":
"$.meta.location",
"targetVariable":
"entityLocationSourceSystem",
"functions": [
{
"type":
"concatString",
"suffix": "$
{entityIdSourceSystem}"
}
]
},
{
"constant":
"urn:ietf:params:scim:schemas:core:
2.0:Group",
"targetPath":
"$.schemas[0]"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['name']",
"targetPath":
"$.displayName"
},
{
"sourcePath":
"$.members",
"preserveArrayWithSingleElement":
true,
"optional": true,
"targetPath":
"$.members"
},
{
"constant":
"urn:sap:cloud:scim:schemas:extension
:custom:2.0:Group",
"targetPath":
"$.schemas[1]"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['name']",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['name']"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['description']",
"optional": true,
"targetPath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['description']"
}
],
"scimEntityEndpoint":
"Groups"
}
}
Create an instance for the SAP Identity Authentication system in the Systems app for the access request
service.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Identity Authentication. For System Type, select SAP Identity Authentication.
3. In the SCP Destination field, enter the name of the IPS destination (IPS_PROXY) created in the previous
section Create Destination.
4. Enter the external system ID marked in the previous step Create Proxy System.
5. Save your entries.
To create a user in SAP Identity Authentication (IAS) for single sign-on, business rules must be defined.
Procedure
In the access request service launchpad, open the Job Scheduler app.
● Repository Sync to synchronize the relevant data from the SAP Identity Authentication to the access
request service.
In the System Type dropdown list, select the SAP Identity Authentication.
In the System dropdown list, select the configured SAP Identity Authentication System.
● Provisioning to initiate the provisioning of access requests.
The information in this section describes the procedure for connecting the SAP Cloud Platform (SCP) to
the SAP Cloud Identity Access Governance solution and its services.
This section provides details for connecting the following platforms to the SAP Cloud Identity Access
Governance (IAG):
The information in this section describes the procedure for connecting SAP Cloud Foundry to the SAP Cloud
Identity Access Governance solution and its services.
SAP Cloud Identity Access Governance is a cloud-based solution for creating self-service requests to
applications for on-premise and cloud source applications and systems. By connecting to the solution, it
enables SAP Cloud Foundry users to initiate access requests, which are then provisioned to target applications.
There are three overall steps to enable integration between SAP Cloud Platform and the SAP Cloud Identity
Access Governance solution and its services:
1. In the SAP Cloud Platform cockpit set up destination for the SAP Cloud Foundry.
2. In the access request service, use the Systems app to create an instance for the SAP Cloud Foundry.
3. In the access request service, use the Job Scheduler app to sync user data and provision access requests.
Create a proxy system to enable SAP Cloud Foundry to connect with the SAP Cloud Platform cockpit.
1. Log into the SAP Cloud Platform cockpit, go to your SCP tenant instance, and open Services Identity
Provisioning Service Proxy System .
2. Copy the external system ID and use it to set up the SAP Cloud Foundry instance in the Systems app.
3. Add a proxy system for SAP Cloud Foundry and choose Save. The Type should be SAP HANA XS
Advanced UAA Server. For more details, refer to SAP HANA XS Advanced UAA Server
Destination Name
Name Value
Authentication BasicAuthentication
ips.trace.failed.entity.content false
OAuth2TokenServiceURL OAuth token service to Cloud Foundry that needs to be configured in the
Cloud Foundry system.
Password ********************
ProxyType Internet
scim.support.patch.operation true
Type HTTP
xsuaa.origin.filter.enabled true
In the SAP Cloud Platform, create destinations for your SAP Analytics Cloud instance.
1. Log into the SAP Cloud Platform cockpit and go to your tenant.
2. In the left-hand pane, click Connectivity Destinations, and then click New Destination.
3. Create a destination for the Cloud Foundry instance, using the following constraints.
Note
It is very important to accurately enter the text strings as specified below. We recommend copying and
pasting them.
*Name IPS_PROXY
Type HTTP
Authentication BasicAuthentication
Accept application/scim+json
GROUPSURL /Groups
serviceURL /ipsproxy/api/v1/scim/
USERSURL /Users
Create an instance for SAP Cloud Foundry in the access request service Systems app.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Cloud Foundry. For System Type, select Cloud Foundry.
3. Enter the external system ID marked in the previous step Create Proxy system.
4. In the HCP Destination field, enter the name of the IPS destination for the SAP Cloud Foundry instance.
5. Save.
In the access request service launchpad, open the Job Scheduler app. In the Job Category dropdown list,
schedule the following jobs:
● Repository Sync to synchronize the relevant data from SAP Cloud Foundry to the access request service.
In the System Type dropdown list, select Cloud Foundry.
In the System dropdown list, select the configured Cloud Foundry System.
● Provisioning to initiate the provisioning of access requests.
The information in this section describes the procedure for connecting the SAP Cloud Platform (SCP) to
the SAP Cloud Identity Access Governance solution and its services. SAP Cloud Identity Access Governance
(IAG) is a cloud-based solution for creating self-service requests to applications for on-premise and cloud
source applications and systems. By connecting to the solution, it enables the SAP Cloud Platform users to
initiate access requests, which are then provisioned to target applications.
There are three overall steps to enable integration between the SAP Cloud Platform and the SAP Cloud Identity
Access Governance solution and its services:
1. In the SAP Cloud Platform cockpit, set up destination for the Identity Provisioning Service to integrate the
SAP Cloud Platform with the IAG solution.
2. In the access request service, use the Systems app to create an instance for the SAP Cloud Platform.
3. In the access request service, use the Job Scheduler app to sync user data and provision access requests.
1. Log into the SAP Cloud Platform cockpit, go to your SCP tenant instance, and open Services Identity
Provisioning Go To Service Proxy System .
2. Add a proxy system for the SAP Cloud Platform and select Save; the Type should be SAP Cloud Platform
Java/HTML5 Apps.
Note
Copy the external system ID and use it to set up the SAP Cloud Platform instance in the Systems app in
the next section Add SAP Cloud Platform.
hcp.application.names some-app-name
hcp.patch.response.with.resource true
hcp.read.group.roles true
ips.trace.failed.entity.content true
OAuth2TokenServiceURL https://api.<hostname>/authorization/v1/accounts/
<tenantid>
ProxyType Internet
Type HTTP
URL https://api.<hostname>/oauth2/apitoken/v1
Authentication BasicAuthentication
1. To obtain the Admin user for the SAP Cloud Platform, go to Security OAuth Platform API.
2. To create oAuthclient for oAuth Platform API, select Authorization Management.
3. For the property Password, enter the password for the technical user.
4. Default read and write transformations are generated.
{ {
"user": { "user": {
"mappings": [ "condition":
{ "($.emails.length() > 0) &&
"sourcePath": "$", ($.name.familyName EMPTY false)",
"targetPath": "$" "mappings": [
}, {
{ "sourcePath": "$",
"sourcePath": "$.id", "targetPath": "$"
"targetVariable": },
"entityIdSourceSystem" {
}, "sourcePath":
{ "$.groups",
"sourceVariable":
"entityBaseLocation", "preserveArrayWithSingleElement":
"targetPath": true,
"$.meta.location", "optional": true,
"targetVariable": "targetPath":
"entityLocationSourceSystem", "$.corporateGroups"
"functions": [ },
{ {
"type": "sourceVariable":
"concatString", "entityIdTargetSystem",
"suffix": "$ "targetPath": "$.id"
{entityIdSourceSystem}" },
} {
] "constant": true,
}, "targetPath":
{ "$.active"
"targetPath": },
"$.hasPassword", {
"type": "remove" "constant": "true",
}, "targetPath":
{ "$.sendMail",
"targetPath": "scope":
"$.groups[*].display", "createEntity"
"type": "remove" },
}, {
{ "constant": "true",
"condition": "targetPath":
"$.displayName EMPTY true", "$.mailVerified",
"targetPath": "scope":
"$.displayName", "createEntity"
"type": "remove" },
}, {
{ "constant":
"sourcePath": "disabled",
"$.timeZone", "targetPath":
"optional": true, "$.passwordStatus",
"targetPath": "scope":
"$.timezone" "createEntity"
}, },
{ {
"sourcePath": "$ "constant":
['urn:ietf:params:scim:schemas:extens "employee",
ion:enterprise:2.0:User'] "targetPath":
['employeeNumber']", "$.userType"
"optional": true, },
"targetPath": "$ {
['urn:ietf:params:scim:schemas:extens
ion:enterprise:2.0:User'] "targetPath":
['employeeNumber']" "$.groups",
}, "type": "remove"
{ },
"sourcePath": "$ {
['urn:ietf:params:scim:schemas:extens "sourcePath": "$
ion:enterprise:2.0:User'] ['urn:ietf:params:scim:schemas:extens
['costCenter']", ion:enterprise:2.0:User']",
"optional": true, "optional": true,
"targetPath": "$ "targetPath": "$
['urn:ietf:params:scim:schemas:extens ['urn:ietf:params:scim:schemas:extens
ion:enterprise:2.0:User'] ion:enterprise:2.0:User']"
['costCenter']" },
}, {
{ "sourcePath":
"sourcePath": "$ "$.timezone",
['urn:ietf:params:scim:schemas:extens "optional": true,
ion:enterprise:2.0:User'] "targetPath":
['organization']", "$.timeZone"
"optional": true, }
"targetPath": "$ ],
['urn:ietf:params:scim:schemas:extens "scimEntityEndpoint": "Users"
ion:enterprise:2.0:User'] },
['organization']" "group": {
}, "mappings": [
{ {
"sourcePath": "$ "sourceVariable":
['urn:ietf:params:scim:schemas:extens "entityIdTargetSystem",
ion:enterprise:2.0:User'] "targetPath": "$.id"
['division']", },
"optional": true, {
"targetPath": "$ "sourcePath":
['urn:ietf:params:scim:schemas:extens "$.displayName",
ion:enterprise:2.0:User'] "targetPath":
['division']" "$.displayName"
}, },
{ {
"sourcePath": "$ "sourcePath":
['urn:ietf:params:scim:schemas:extens "$.displayName",
ion:enterprise:2.0:User'] "targetPath": "$
['department']", ['urn:sap:cloud:scim:schemas:extensio
"optional": true, n:custom:2.0:Group']['name']",
"targetPath": "$ "scope":
['urn:ietf:params:scim:schemas:extens "createEntity",
ion:enterprise:2.0:User'] "functions": [
['department']" {
}, "type":
{ "replaceAllString",
"sourcePath": "$ "regex": "[\
['urn:ietf:params:scim:schemas:extens \s\\p{Punct}]",
ion:enterprise:2.0:User']['manager']
['value']", "replacement": "_"
"optional": true, }
"targetPath": "$ ]
['urn:ietf:params:scim:schemas:extens },
ion:enterprise:2.0:User']['manager'] {
['value']" "sourcePath": "$
}, ['urn:sap:cloud:scim:schemas:extensio
{ n:custom:2.0:Group']['name']",
"sourcePath": "$ "optional": true,
['urn:ietf:params:scim:schemas:extens "targetPath": "$
ion:enterprise:2.0:User']['manager'] ['urn:sap:cloud:scim:schemas:extensio
['displayName']", n:custom:2.0:Group']['name']"
},
"optional": true, {
"targetPath": "$ "sourcePath": "$
['urn:ietf:params:scim:schemas:extens ['urn:sap:cloud:scim:schemas:extensio
ion:enterprise:2.0:User']['manager'] n:custom:2.0:Group']['description']",
['displayName']" "optional": true,
}, "targetPath": "$
{ ['urn:sap:cloud:scim:schemas:extensio
"sourcePath": "$ n:custom:2.0:Group']['description']"
['urn:sap:cloud:scim:schemas:extensio },
n:custom:2.0:User']", {
"optional": true, "sourcePath":
"targetPath": "$ "$.members",
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:User']" "preserveArrayWithSingleElement":
}, true,
{ "optional": true,
"sourcePath": "targetPath":
"$.company", "$.members"
"optional": true, }
"targetPath": "$ ],
['urn:ietf:params:scim:schemas:extens "scimEntityEndpoint":
ion:enterprise:2.0:User'] "Groups"
['organization']" }
} }
],
"scimEntityEndpoint": "Users"
},
"group": {
"mappings": [
{
"sourcePath": "$.id",
"targetPath": "$.id",
"targetVariable":
"entityIdSourceSystem"
},
{
"sourceVariable":
"entityBaseLocation",
"targetPath":
"$.meta.location",
"targetVariable":
"entityLocationSourceSystem",
"functions": [
{
"type":
"concatString",
"suffix": "$
{entityIdSourceSystem}"
}
]
},
{
"constant":
"urn:ietf:params:scim:schemas:core:
2.0:Group",
"targetPath":
"$.schemas[0]"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['name']",
"targetPath":
"$.displayName"
},
{
"sourcePath":
"$.members",
"preserveArrayWithSingleElement":
true,
"optional": true,
"targetPath":
"$.members"
},
{
"constant":
"urn:sap:cloud:scim:schemas:extension
:custom:2.0:Group",
"targetPath":
"$.schemas[1]"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['name']",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['name']"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['description']",
"optional": true,
"targetPath": "$
['urn:sap:cloud:scim:schemas:extensio
n:custom:2.0:Group']['description']"
}
],
"scimEntityEndpoint":
"Groups"
}
In the SAP Cloud Platform (SCP), create destinations for your Identity Provisioning Service.
1. Log into the SAP Cloud Platform cockpit and go to your tenant.
2. In the left-hand pane, select Connectivity Destination New Destination .
Note
It is very important to accurately enter the text strings as specified below. We recommend copying and
pasting them.
*Name IPS_PROXY
Type HTTP
Authentication BasicAuthentication
Accept application/scim+json
GROUPSURL /Groups
serviceURL /ipsproxy/api/v1/scim/
USERSURL /Users
3. Note
The URL can be copied from the SAP Cloud Platform (SCP)-Subscriptions-ipsproxy-Application URLs.
After copying the URL, remove /ipsproxy from the URL.
4. User is the Client ID configured through the SAP Cloud Platform - Security OAUTH Clients for
service IPSProxy (or) it is the same as configured in the previous section.
Create an instance for the SAP Cloud Platform in the Systems app for the access request service.
1. Log into the SAP Cloud Identity Access Governance launchpad and open the Systems app.
2. Create a system for SAP Cloud Platform. For System Type, select SAP Cloud Platform.
3. In the SCP Destination field, enter the name of the IPS destination (IPS_PROXY) created in the previous
section Create Destination.
4. Enter the external system ID marked in the previous step Create Proxy System.
5. Save your entries.
In the access request service launchpad, open the Job Scheduler app.
● Repository Sync to synchronize the relevant data from the SAP Cloud Platform to the access request
service.
In the System Type dropdown list, select the SAP Cloud Platform.
In the System dropdown list, select the configured SAP Cloud Platform.
● Provisioning to initiate the provisioning of access requests.
Maintain the following master data to get the full functionality of the SAP Cloud Identity Access Governance
services.
Note
The following is a comprehensive list of the required master data. Some master data may be required for
more than one service. For example: Systems is required for all the services.
Systems Systems
Functions Functions
Risks Risks
Rules Rules
Monitoring Groups Monitoring Groups are defined in the SAP Cloud Platform Identity Authentication serv
ice.
Owners Owners are defined in the SAP Cloud Platform Identity Authentication service.
Departments Departments
Projects Projects
Setting Up Master Data for the Role Design Service [page 168]
After setting up the Common Master Data, you must then set up the Master Data specific to your
services. This topic outlines the Master Data needed for the Role Design service.
Related Information
You must set up Master Data for all three SAP Cloud Identity Access Governance services: access analysis
service, access request service, and role design service. This topic outlines the common set-up that is required
This image shows master data that is needed for all three SAP Cloud Identity Access Governance services:
access analysis service, access request service, and role design service.
Note
You must set up business processes first, then business subprocesses, then access maintenance.
Dependency / Prerequi
Master Data tile site How the Master Data is Used
Access Maintenance Business Subprocess App is used to display and maintain different types of technical
access.
Access Types None App is used to create and update different types of access
such as single roles, composite roles, and business roles.
Application Types None App is used to create types that categorize applications. Exam
ples of categories could be S/4HANA or HR.
Business Processses None App is used to define your company's operational processes
such as Finance and Marketing
Departments None App is used to create and maintain your company's depart
ments such as Finance and Public Relations
Systems None App is used to define the various source and target systems
that connect with SAP Cloud Identity Access Governance. For
example, system connections must be defined for the role
source system and the user source system
To complete the Master Data setup, go to the topic specific to the Services you are setting up. There are
additional setup steps for each service.
Related Information
After setting up the Common Master Data, you must then set up the Master Data specific to your services. This
topic outlines the Master Data needed for Access Request.
The table below describes the master data elements that must be set up for the Access Request Service after
you have finished setting up the common Master Data.
Dependency / Prerequi
Master Data App site How the Master Data is Used
Access Request Priority None App is used to define priorities for access requests.
Access Request Reason Code None App is used app to define the Reason for Request choices for
access requests
After setting up the Common Master Data, you must then set up the Master Data specific to your services. This
topic outlines the Master Data needed for the Role Design service.
The table below describes the master data elements that must be set up for the Role Design Service after you
have finished setting up the common Master Data.
After setting up the Common Master Data, you must then set up the Master Data specific to your services. This
topic outlines the Master Data needed for Access Analysis.
Note
In some cases, you must define the data in the indicated order. For example, you must define business
function groups before you can define rule setup.
The table below describes the master data elements that must be set up for the Access Analysis service after
you have finished setting up the common Master Data.
Functions Business Process App is used to define and maintain functions which are a col
lection of authorizations (actions and permissions). Access
risks are defined based on functions.
Business Functions Group Systems App is used to assign source systems to SAP Cloud Identity
Access Governance. Source can be one or multiple systems.
Mitigation Control Monitoring 1. Business Subprocess App is used to define and maintain mitigation controls which
are used to remediate and monitor access risks.
2. Risks
3. Test Plans
Risk Score Policy 1. Business Process App is used to create, edit, view, deactivate, or delete risks.
2. Function
3. Risk Level
Risk Level None App is used to define the criticality of a risk and the sensitivity
of a risk.
Rule Setup Business Function Group App used to establish, customize, and maintain your SoD or
critical access rules for access analysis.
Test Plans None App allows you to upload test plans for testing mitigation con
trols. Test plans are maintained offline.
Related Information
The Configuration app is intended for administrators only. It enables administrators to configure a set of
behaviors and parameters in IAG to align with business needs.
From the Configuration app, you can limit the languages that the data from the database is imported into SAP
Cloud Identity Access Governance.
Choose which languages are used by your company and select Apply.
● English
● German
● Chinese
● French
● Japanese
● Portuguese
● Russian
● Spanish
Note
The Application Parameters feature contains a list of configuration groups and parameters that enable you to
set certain attributes and behaviors for IAG.
Note
UserSource SourceSystem <enter the name of your Designate a User Source System
system or application> for retrieving user information
such as email address, employ
ee's manager, etc.
You use the Application Users app to upload and download larger data files relevant for application users.
Procedure
For SaaS customers, many of the necessary security measures are taken care of by SAP. For SAP Cloud
Identity Access Governance security information, see the Security Guide on https://help.sap.com/viewer/
product/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE.
Content Location
For assistance and questions, you can go to the SAP Support Portal at https://support.sap.com, and click on
Report an Incident.
Service Component
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such
links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Gender-Related Language
We try not to use gender-specific word forms and formulations. As appropriate for context and readability, SAP may use masculine word forms to refer to all genders.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.