SAP Identity Management Overview



Similar documents
SAP Identity Management Overview

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2

Business-Driven, Compliant Identity Management

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Business-Driven, Compliant Identity Management

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP NetWeaver Identity

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

GR5 Access Request. Process Diagram

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

R49 Using SAP Payment Engine for payment transactions. Process Diagram

Minimize Access Risk and Prevent Fraud With SAP Access Control

Mobile app for Android Version 1.2.x, December 2015

SAP Document Center. May Public

Cut Costs and Improve Agility by Simplifying and Automating Common System Administration Tasks

SAP Business Intelligence Adoption V6.41: Software and Delivery Requirements. SAP Business Intelligence Adoption February 2015 English

Simplify and Secure Cloud Access to Critical Business Data

Rapid database migration of SAP Business Suite to SAP HANA (V4.10): Software and Delivery Requirements. SAP HANA November 2014 English

Integration capabilities of SAP S/4HANA to SAP Cloud Solutions

SAP BusinessObjects BI Clients

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

SAP Mobile Documents. December, 2015

SAP S/4HANA Embedded Analytics

SAP Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements

Cybersecurity and Secure Authentication with SAP Single Sign-On

SuccessFactors Global Human Capital Management (HCM) Academy and Admin Training Schedule (Q3 Q4 2014)

SAP BusinessObjects Business Intelligence 4.1 One Strategy for Enterprise BI. May 2013

Mobile app for ios Version 1.11.x, December 2015

Partner Certification to Operate SAP Solutions and SAP Software Environments

SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements

Streamline HR Tasks with Centralized Document Access

Mobile app for ios Version 1.10.x, August 2014

Two UX Solutions Now Included with SAP Software

How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer

Automate Complex Pay Rules While Streamlining Time and Attendance Management

SAP Solution Manager: The IT Solution from SAP for IT Service Management and More

Software Requirements

Protect Your Connected Business Systems by Identifying and Analyzing Threats

Software and Delivery Requirements

SM250 IT Service Management Configuration

SAP BusinessObjects Cloud

SAP Business One mobile app for Android Version 1.0.x November 2013

Mobile app for Android Version 1.0.x, January 2014

Integration Capabilities of SAP S/4HANA to SAP Cloud Solutions

ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013

SAP MII for Manufacturing rapid-deployment solution: Software Requirements

Price and Revenue Management - Manual Price Changes. SAP Best Practices for Retail

SAP HANA SPS 09 - What s New? HANA IM Services: SDI and SDQ

Real-Time Reconciliation of Invoice and Goods Receipts powered by SAP HANA. Stefan Karl, Finance Solutions, SAP ASUG Presentation, May 2013

This presentation provides a SECOND LEVEL of information about the topic of Central Finance.

SAP Cloud Identity Service

Managing Customer Relationships with SAP Business One

SAP Identity Management Connector Overview. SAP SE Walldorf, August 2015

Sun Communities: Reducing Manual Processes for New Hires by 97% Using SuccessFactors Onboarding

Real-Time Enterprise Management with SAP Business Suite on the SAP HANA Platform

Enabling Better Business Intelligence and Information Architecture With SAP PowerDesigner Software

Software and Delivery Requirements

Multi Channel Sales Order Management: Mail Order. SAP Best Practices for Retail

How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture

Software and Delivery Requirements

Unlock the Value of Your Microsoft and SAP Software Investments

SAP Business Intelligence Adoption V7.41:Software and Delivery Requirements. SAP Business Intelligence Adoption August 2015 English

How To Use An Automotive Consulting Solution In Ansap

SAP Project Portfolio Monitoring Rapid- Deployment Solution: Software Requirements

Build an Advanced Incentive- Compensation Program That Meets Today s Sales Goals

Data Doesn t Communicate Itself Using Visualization to Tell Better Stories

Enterprise Information Management Services Managing Your Company Data Along Its Lifecycle

Setting up Visual Enterprise Integration (WM6)

SAP Business Warehouse Powered by SAP HANA for the Utilities Industry

University Competence Center: Leading a Co-Innovation Project on SAP Cloud Appliance Library

Keolis: Accelerating Recruitment with SAP Cloud for HR Solutions

Enterprise Identity Management Reference Architecture

Introducing SAP s Landscape and Data Center Innovation Platform. Phil Jackson SAP Solution Engineer

K88 - Additional Business Operations for Loans. Process Diagram

Integrated solution for subsidiaries, suppliers and franchises powered by SAP HANA

Help Users Rapidly Adopt New Technology for a Faster Return on Investment

Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive

Aditro: Increasing Contact Center Efficiency for Improved Customer Satisfaction

SAP MDG, central governance, financial data. Nov. 2015

K75 SAP Payment Engine for Credit transfer (SWIFT & SEPA) Process Diagram

rapid data load for SAP hybris Marketing: Software and Delivery Requirements

Simplify Complex Architectures and See the Potential Impact of New Technologies

Managing Procurement with SAP Business One

SAP NetWeaver Identity Management Identity Services Configuration Guide

Increase Efficiency and Cut Costs with Automated Payroll Processes

SAM Enterprise Identity Manager

Landscape Deployment Recommendations for. SAP Fiori Front-End Server

Reimagining Business with SAP HANA Cloud Platform for the Internet of Things

SAP 3D Visual Enterprise Rapid-Deployment Solution

Textile Rubber and Chemical Company: Driving Cost Savings with SAP Business Suite powered by SAP HANA

SAP Single Sign-On 2.0 Overview Presentation

Transcription:

Identity Management Overview October 2014 Public

Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password Management Connectivity Architecture Identity Virtualization Summary & Additional Information Appendices 2014 SE or an affiliate company. All rights reserved. Public 2

Introduction to Identity Management

Security Portfolio IT Application Security IT Application Security Portfolio Identity, governance and administration Identity and access management (IAM) Authentication and single sign-on Code vulnerabilities Threat management Manage identity lifecycle Segregation of duties Emergency access Role management Reporting Single sign-on Secure network communication Central access policies 2-factor authentication Find vulnerabilities in customer code Detect cyber crime attacks based on user behavior Identity Management Access Control Single Sign-On Cloud Identity NetWeaver AS, add-on for code vulnerability analysis Enterprise Threat Detection 2014 SE or an affiliate company. All rights reserved. Public 4

Key Capabilities Enables the efficient, secure and compliant execution of business processes Consistent with user roles and privileges Holistic approach Manage identities and permissions Identity Management Ensures that the right users have the right access to the right systems at the right time Across all systems and applications 2014 SE or an affiliate company. All rights reserved. Public 5

Business Drivers for Identity Management Operational costs Multiple sources of identity data Manual user provisioning Labor-intensive, paper-based approval systems Manual password reset processes Changing business processes Transactions involve multiple enterprises Partners participate in business processes Company-specific requirements for user provisioning solutions Compliance challenges No record of who has access to which IT resources Inability to deprovision user access rights upon termination No complete audit trail available Prevention of unauthorized access in multi-enterprise environments 2014 SE or an affiliate company. All rights reserved. Public 6

Identity Lifecycle How long does it take for new employees to receive all permissions and become productive in their new job? How can you remove permissions automatically if employees change their position? Are permissions automatically adjusted if someone is promoted to a new position? How long does it take to remove ALL permissions of an employee? And how can you ensure that they were properly removed? Who has adequate permissions to fill in for a coworker? 2014 SE or an affiliate company. All rights reserved. Public 7

Solution in a Nutshell Central management of identities throughout the system landscape Rule-driven workflow and approval process Extensive audit trail, logging, and reporting functionality Governance through centralized and auditable identity data Compliance through integration with Access Control Compliant and integrated identity management solution to mitigate segregation-of-duties risks SCM ERP HCM ERP Access Control applications Java Portal SuccessFactors Identity Management Non- applications Database Legacy OS E-mail Web app 2014 SE or an affiliate company. All rights reserved. Public 8

A Holistic Approach to Compliant Identity Management Success Factors ERP HCM Example: On-boarding Central identity store Integration with Business Suite and SuccessFactors Identity virtualization and identity as a service Compliance checks BusinessObjects Control Access Control (GRC) Reporting Access Rule-based assignment of business roles applications Identity Management Provisioning to and non- systems Non- applications Approval workflows Web-based single sign-on and identity federation Password management 2014 SE or an affiliate company. All rights reserved. Public 9

Solution in Detail Role Management and Workflows

Role Definition and Provisioning Role Definition (design, one-time task) Read system access information (roles, groups, authorizations, etc.) from target systems Define a business role hierarchy Assign technical roles to business roles Develop rules for role assignments Business roles Employee Accounting Manager Provisioning (regularly) Assign or remove roles to/from people Through request/approval workflow Manually (administrator) Automatically, e.g. HR-driven Automatic adjustment of master data and assignments of technical authorizations in target systems Technical roles E-mail E-mail system AD user Active Directory Portal role Portal Accounting (ABAP role) FI HR manager (ABAP role) HR 2014 SE or an affiliate company. All rights reserved. Public 11

Context-Based Role Management: Reducing Complexity Context-based role management simplifies the structure of roles through dynamic role assignment based on user context information. Benefits Reduced number of roles Reduced complexity Sufficient granularity Improved data consistency and governance User Business Role NetWeaver Identity Management Position Location Identity Management Technical role A Technical role B Technical role C Managed System User Managed System Technical role A Technical role B Example: 20 roles in 1000 factories Conventional method: 20.000 entries (roles) Context-based: 1.020 entries (roles + contexts) 2014 SE or an affiliate company. All rights reserved. Public 12

Workflows Notification Identity Center sends a notification to user/manager Request User sends a role request Provisioning Identity Center provisions new roles and privileges to respective systems Processing Identity Center processes request Sends alert to manager / administrator Approval Manager checks request and approves/denies 2014 SE or an affiliate company. All rights reserved. Public 13

Solution in Detail Business-Driven Identity Management

Integration with Business Applications Portfolio and Product Management Customer Relationship Management Success Factors Employee Central Supply Network Collaboration Extended Warehouse Management Supplier Relationship Management Identity Management Transportation Management Product Lifecycle Management HANA ERP Financials Service Parts Planning ERP Human Capital Management 2014 SE or an affiliate company. All rights reserved. Public 15

Business Process Driven Identity Management On-Boarding Kim Perkins joins the company as a marketing specialist. From the first day with her new company, she is able to log on to all relevant systems, including access to the employee self-services, and access to CRM to track the marketing activities she is responsible for. Pre-hire phase HR ensures that all necessary employee data for Kim is available, such as position and entry date 2 3 Based on the position in 4 HCM, IDM automatically Event-based extraction assigns the business of personnel data role Marketing Specialist ERP HCM Success Factors HR Operations 1 Identity Management Kim s manager approves the assignment Line Manager 5 First day at work Provisioning of role and authorization information to relevant target systems ERP HCM ERP CRM Portal User created Employee Business Partner created User created Marketing Professional User created Access to ESS Access to CRM 2014 SE or an affiliate company. All rights reserved. Public 16

Business Process Driven Identity Management Position Change After two years as a marketing specialist, Kim is promoted and takes over personnel and budget responsibility for her marketing team. On the first day in her new role, she has access to the manager self-services. In her new position, she is responsible for budget approvals for all marketing campaigns - this requires immediate access to ERP to view the marketing costs. 2 1 Event-based extraction of personnel data ERP HCM HR ensures that all necessary employee data for Kim is available 3 Identity Management recognizes the line manager information for Kim and automatically assigns the business role Marketing Manager 4 Day of position change Provisioning of role and authorization information to relevant target systems ERP HCM ERP CRM User updated Employee Line Manager User created Marketing Controller User updated Marketing Controller Success Factors HR Operations Identity Management Portal User updated Access to ESS Access to MSS Access to CRM 2014 SE or an affiliate company. All rights reserved. Public 17

Business Process Driven Identity Management Termination After eight years, Kim leaves the company. The day after her official assignment with the company ends, she is no longer able to access any corporate systems. 1 HR ensures that all data relevant for the employment contract termination is available, such as last day of work 4 Day after termination of employment 2 Event-based extraction of personnel data ERP HCM 3 Identity Management recognizes the last day information for Kim; it automatically takes away all access rights and disables her accounts ERP HCM ERP CRM User disabled User disabled User disabled Success Factors HR Operations Identity Management Portal User disabled 2014 SE or an affiliate company. All rights reserved. Public 18

Solution in Detail Compliant Identity Management

Compliant Identity Management: Capabilities Consistent view on current and historic access rights, approvals and policy violations Central management of heterogeneous environments Manage identities and permissions Identify and mitigate risks Compliance checks Integration based on standards Identity Management Access Control Business risk controls and mitigation Compliant identity management across and heterogeneous landscapes in one integrated solution 2014 SE or an affiliate company. All rights reserved. Public 20

Compliant Identity Management: Process View 4 Risk analysis BusinessObjects Access Control (GRC) 3 Access Control 5 Risk mitigation 6 Forward request for risk analysis Risk status applications Request role assignment 1 Identity Management 2 8 7 Manager approval Non- applications Notification to user and manager Provisioning to target systems SCM Java Database E-mail ERP HCM Portal Legacy Web app ERP OS 2014 SE or an affiliate company. All rights reserved. Public 21

Compliant, Business-Driven Identity Management Requirement: Provide automated, position-based role management while ensuring compliance Solution: Simplify and automate role assignment Reduce risk through compliance checks and remediation Automate manual processes through integration with Business Suite 1 New Hire ERP HCM Calculate entitlements based on position Compliance check Remediation 2 3 4 Approve assignments Yes 5 ERP HCM ERP FI No Portal Non- ERP HCM Identity Management Access Control Line Manager Landscape 2014 SE or an affiliate company. All rights reserved. Public 22

Solution in Detail Reporting

Reporting Options at a Glance Basic Reporting Focus: Static, printable reports Report creation on database level Extended Reporting with Business Warehouse ( BW)* Focus: Dynamic reports, offering more, highly detailed, and customizable reporting options Data is extracted from Identity Management on a regular basis (as per defined job) Predefined report templates available, custom reports can be freely defined filtering, sorting, export to MS Excel, CSV, PDF, send via e-mail, etc. Reporting with Lumira Focus: Customer-specific reposts/analyses for identity management Rich graphical capabilities for visualizing and utilizing reported data Low integration and maintenance efforts Easy extension * BW and Lumira are not part of the ID Mgmt license 2014 SE or an affiliate company. All rights reserved. Public 24

Basic Reporting Application/privilege-centric Determination of system access User-centric Determination of user privileges Entry data Current data, historical data, time stamps, modified by, audit flags Approval data Who approved what when? Who had which privilege when? Segregation of duties, Attestation Task audit log Determination of tasks run on user / by user General logs Off-the-shelf reporting tools can be used 2014 SE or an affiliate company. All rights reserved. Public 25

Extended Reporting with Business Warehouse BW report templates Persons, privileges, roles and their assignments over time and for specific dates Content-based and time-based reporting Advanced filtering and sorting options Access control Roles for reporting user (administrator, manager, owner) Basic audit data Who changed what Change history up to the time of last synchronization Flexibility BEX reports 2014 SE or an affiliate company. All rights reserved. Public 26

Reporting with Lumira Customer-specific reposts/analyses for identity management Rich graphical capabilities for visualizing and utilizing reported data Low integration and maintenance efforts Easy extension 2014 SE or an affiliate company. All rights reserved. Public 27

Solution in Detail Password Management

Password Management Requirement: Reduce help desk calls related to password reset inquiries Enable password provisioning across heterogeneous landscapes Solution: Centralize and automate password management Reset password Recover lost password ERP HCM ERP FI Set new password Portal Non- User Helpdesk Identity Management Landscape 2014 SE or an affiliate company. All rights reserved. Public 29

Solution in Detail Connectivity

Connectivity Framework Databases Microsoft SQL Server Microsoft Access Oracle database IBM UDB (DB2) MySQL Sybase HANA Directory Servers Microsoft Active Directory IBM Tivoli Directory Novell edirectory SunONE Java Directory Oracle Internet Directory Microsoft ADAM Siemens DirX OpenLDAP eb2bcom View500 Directory Server CA etrust Directory IDM Virtual Directory Server Any LDAP v3 compliant directory srv Identity Management Application Server Microsoft Windows NT Unix/Linux On-Prem/Cloud Applications Other Business Suite SuccessFactors Access Control Lotus Domino / Notes Microsoft Exchange RSA ClearTrust RSA SecurID Shell execute Custom Java connector API Script-based connector API Technical SPML LDAP ODBC/JDBC/OLE-DB RFC LDIF files XML files CSV files 2014 SE or an affiliate company. All rights reserved. Public 31

Third Party Connector Certification ICC Integration Scenario NW-IDM-CON Identity Management Integration Scenario NW-IDM-CON The Integration and Certification Center (ICC) offers a certification for the integration scenario NW-IDM-CON. partners as well as potential partners and independent software vendors (ISVs) are invited to use the Connector Development Kit (CDK) to create an Identity Management connector for their application, and to integrate the application into the identity management landscape. This connector can then be certified by the ICC. For general information about third party certifications with products, please refer to http://www.sdn.sap.com/irj/sdn/interface-certifications, or contact the Integration and Certification Center (ICC) directly at icc@sap.com 2014 SE or an affiliate company. All rights reserved. Public 32

Solution in Detail Architecture

Identity Management Architecture 2014 SE or an affiliate company. All rights reserved. Public 34

Solution in Detail Identity Virtualization

Virtual Directory Server Virtual Directory Server (VDS) provides Single consistent view and entry point for multiple distributed identity data sources Identity information as a service for applications through standard protocols (LDAP, SPML) Abstraction layer for underlying data stores Consumer only sees one standard interface Transform incoming LDAP requests, and connect directly to the existing data repositories Data stays within original data source Efficient caching SPML Virtual Directory Server LDAP Properties Real-time access to data SPML LDAP JDBC No need to consolidate data sources No extra data store Quick LDAP deployment Easier and cheaper maintenance Attribute manipulation Name space modifications Directory Server Directory Server Database Application Complex operations on-the-fly 2014 SE or an affiliate company. All rights reserved. Public 36

Summary & Additional Information

Summary Identity Management is part of a comprehensive security suite that includes access control as well as secure programming and compliance aspects. The solution covers the entire identity lifecycle and automation capabilities based on business processes. A strong integration with Access Control creates a holistic identity and access governance solution. Extensive connectivity with and non- applications extends identity management to all areas of the enterprise. 2014 SE or an affiliate company. All rights reserved. Public 38

Find More Information Community Network Visit the Community Network (SCN) for comprehensive information on Identity Management, such as Discussion forum, product information, documentation, training, and support information Articles, blogs, WIKI, FAQs, and newsletters Downloads http://scn.sap.com/community/idm 2014 SE or an affiliate company. All rights reserved. Public 39

Identity Management Rapid deployment solution Short project times and reduced TCO by simplifying assignment and management of roles and privileges to users Implementation of best practice processes out of the box with a fixed scope and most important and common scenarios, e.g. defined set of customer specific configuration, connection of source- and target-systems, provisioning etc Connection of 1 source- and 2 target systems Standard solution Mass user administration jobs Automatic authorization assignment E-mail notification framework Approval workflows Pre-configured functionality of Identity Management in a development system Support of system specific attributes Predefined HTML based reports New Web UI tasks Step-by-step guide, describing each activity during deployment Solution can be extended with additional add-on options Add-On 1: Connection to additional systems Add-On 2: Additional Go-Live Support 2014 SE or an affiliate company. All rights reserved. Public 40

2014 SE or an affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SE or an affiliate company. and other products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SE (or an affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SE or an affiliate company for informational purposes only, without representation or warranty of any kind, and SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SE or affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SE s or its affiliated companies strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 2014 SE or an affiliate company. All rights reserved. Public 43