SAP Cloud - IAG Security Guide
SAP Cloud - IAG Security Guide
2302-02-28
1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1 Security Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Default Security Configuration and Security Recommendations. . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
7 User Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
7.1 Setting Up User Authentication and Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
Maintain Users and User Groups in Identity Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Pre-Delivered Role Collections on SAP BTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
8 Support Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
The SAP Cloud Identity Access Governance solution is built on the SAP Business Technology Platform (SAP
BTP). It uses SAP NetWeaver APIs to fetch data from target systems and perform access analysis.
This document covers security relevant information for only the scenario of SAP Cloud Identity Access
Governance fetching data from SAP target systems behind a firewall and using the Identity Authentication
for user authentication with SAP BTP applications.
The SAP Cloud Identity Access Governance solution includes the following services.
Note
Unless specifically stated, it is understood that the information in this security guide applies to all SAP
Cloud Identity Access Governance services.
The diagram below illustrates security relevant components in the SAP Cloud Identity Access Governance
services architecture.
Component Description
Target Applications (on-premise and cloud) This is the customer target system which contains the data
to be analyzed.
IAG API (SAP Cloud Identity Access Governance) The IAG Services API extracts data from the target applica-
tion. The API is part of NetWeaver, therefore you need to
upgrade your system to the required NetWeaver Basis Sup-
port Packs. The API is available for on-premise and the SAP
Business Technology Platform (SAP BTP).
SAP Business Technology Platform cloud connector The cloud connector sits behind the firewall and establishes
connectivity between SAP BTP and the target system.
SAP Cloud Identity Access Governance Services SAP Cloud Identity Access Governance services include: ac-
cess analysis, access request, role design, access certifica-
tion, and privileged access management
SAP Cloud Identity Access Governance Technical Compo- SAP Cloud Identity Access Governance services compo-
nents nents include: Repository, Scheduler, Reporting and Analyt-
ics, Appproval Workflow, and Users and Roles
SAP Workflow Service SAP Workflow service is used for automation of access re-
quests through the various stages of creation and approval.
SAP Business Rule Service Business Rules service enables embedding of decisions into
the workflow.
SAP Cloud Portal Services and Authorizations This controls the access of apps to the end user and is pro-
tected by SAP Cloud Identity Access Governance services
roles.
Since SAP Cloud Identity Access Governance runs on SAP BTP platform, refer here for more information on its
Default Security Configuration and Recommendations.
SAP Cloud Identity Access Governance services use OAuth to protect communication between the
Provisioning and Repository services for SAP Cloud Identity Access Governance.
In the SAP Business Technology Platform (SAP BTP) cockpit, you need to set up the OAuth service and
maintain the destinations.
For more information on maintaining OAuth, see the SAP Cloud Identity Access Governance Admin Guide.
The following table shows the roles defined by OAuth and their respective entities in the SAP Business
Technology Platform (SAP BTP).
OAuth Roles
Resource server Application The server that hosts the resource own-
er's protected assets.
Client Third-party application The third party entity that needs to ac-
cess the protected assets on behalf of
the resource owner.
Authorization server SAP BTP infrastructure The server that manages the authenti-
cation and authorization of the different
entities involved.
SAP Cloud Identity Access Governance services use Identity Authentication for authentication, and uses user
groups to manage access to specific apps.
1. Set Up User Groups and assign them the delivered SAP Cloud Identity Access Governance services roles in
the SAP Business Technology Platform (SAP BTP).
2. Set up Users and User Groups in Identity Authentication.
3. Set up Identity Authentication as an Identity Provider for the SAP BTP tenant.
For more information on maintaining authentication and application access, see the SAP Cloud Identity Access
Governance Administrator Guide.
Business roles associated with a Privileged Access Management (PAM) ID should have access or a role that has
authorization to launch a remote session.
Procedure
1. In your ABAP system, create a role (for example: ZSIAG_PAMID_RFC_ACCESS) with the following
authorizations:
S_RFC ACTVT *
RFC_NAME *
2. Sync this role to the SAP Cloud Identity Access Governance application using the Repository Sync job. This
role should be part of all the business roles that will be associated with the PAM ID.
3. To access the PAM Launchpad, create a role (for example: ZSIAG_USER_LAUNCHPAD_ACCESS) in ABAP
systems with the following authorizations:
S_RFC
RFC_NAME *
ACTVT 16
S_TCODE
TCD SIAG_PAM_LAUNCH_PAD
S_USER_GRP
CLASS *
ACTVT *
This role should also be synced to the SAP Cloud Identity Access Governance application using the
Repository Sync job. The PAM User (user who requires the emergency access) should add this role to the
access request.
The SAP Business technology Platform (SAP BTP) cloud connector serves as the link between on-demand
applications in the SAP BTP and existing on-premise systems.
The cloud connector runs as an on-premise agent in a secured network and acts as a reverse invoke proxy
between the on-premise network and the SAP BTP. You need to install the cloud connector in your landscape
and configure it for the SAP BTP.
For more information on configuring the cloud connector, see the Administrator Guide.
An RFC user is needed in the target SAP system to allow communication with SAP Cloud Identity Access
Governance services using the SAP Business Technology Platform (SAP BTP).
Create an RFC user with the authorization objects and values listed in the table below.
Note
Applicable for SAP Basis
release 7.53 and higher
versions
CLASS *
EXTUID_TYP GU
RFC_NAME SIAG*
BAPT RFC1
SDIF
SDIFRUNTIME
SDTX
SUSR
SUUS
SU_USER
SYST
SYSU
RFCPING
RFC_TYPE FUGR
FUNC
DICBERCLS &NC&
SC
SS
ZV&G
ZV&H
ZV&N
ACT_GROUP *
OBJECT *
ACT_GROUP *
CLASS *
PROFILE *
SUBSYSTEM *
Infotype INFOTYP *
Subtype SUBTYP *
OBJECT *
DEVCLASS SUSO
OBJNAME SIAG*
OBJTYPE FUGR
P_GROUP *
Note
If you wish to integrate SAP Cloud Identity Access Governance with SAP Access Control in addition to the RFC
authorization objects listed above, you need the authorization object GRAC_MITC.
4.1 Introduction
Data protection is associated with numerous legal requirements and privacy concerns. In addition to
compliance with general data protection and privacy acts, it is necessary to consider compliance with industry-
specific legislation in different countries. SAP provides specific features and functions to support compliance
with regard to relevant legal requirements, including data protection, which are documented in these templates
along with the assumptions that have been guiding the implementation in the software. By nature of legal
requirements the conclusion whether these features are covering customer specific demands as well as the
conclusion whether additional measures have to be taken is solely with the customer.
Note
SAP does not provide legal advice in any form. SAP software supports data protection compliance by
providing security features and specific data protection-relevant functions, such as simplified blocking and
deletion of personal data. In many cases, compliance with applicable data protection and privacy laws will
not be covered by a product feature. Definitions and other terms used in this document are not taken from
a particular legal source.
Caution
The extent to which data protection is supported by technical means depends on secure system operation.
Network security, security note implementation, adequate logging of system changes, and appropriate
usage of the system are the basic technical requirements for compliance with data privacy legislation and
other legislation.
Term Definition
Automated Decision Making The ability to make decisions by technological means with-
out human involvement.
Business Purpose The legal, contractual, or in other form justified reason for
the processing of personal data to complete an end-to-end
business process. The personal data used to complete the
process is predefined in a purpose, which is defined by the
data controller. The process must be defined before the per-
sonal data required to fulfill the purpose can be determined.
Consent The action of the data subject confirming that the usage
of his or her personal data shall be allowed for a given pur-
pose. A consent functionality allows the storage of a consent
record in relation to a specific purpose and shows if a data
subject has granted, withdrawn, or denied consent.
End of Business Defines the end of active business and the start of residence
time and retention period.
End of Purpose (EoP) The point in time when the processing of a set of personal
data is no longer required for the primary business purpose,
for example, when a contract is fulfilled. After the EoP has
been reached, the data is blocked and can only be accessed
by users with special authorizations (for example, tax audi-
tors).
End of Purpose (EoP) check A method of identifying the point in time for a data set when
the processing of personal data is no longer required for the
primary business purpose. After the EoP has been reached,
the data is blocked and can only be accessed by users with
special authorization, for example, tax auditors.
Processing of Personal Data Processing means any operation or set of operations which
is performed on personal data or on sets of personal data,
whether or not by automated means, such as collection, re-
cording, organisation, structuring, storage, adaptation or al-
teration, retrieval, consultation, use, disclosure by transmis-
sion, dissemination or otherwise making available, alignment
or combination, restriction, erasure or destruction.
Purpose The information that specifies the reason and the goal for
the processing of a specific set of personal data. As a rule,
the purpose references the relevant legal basis for the proc-
essing of personal data.
Residence period The period of time between the end of business and the
end of purpose (EoP) for a data set during which the data
remains in the database and can be used in case of sub-
sequent processes related to the original purpose. At the
end of the longest configured residence period, the data is
blocked or deleted. The residence period is part of the over-
all retention period.
Retention period The period of time between the end of the last business
activity involving a specific object (for example, a business
partner) and the deletion of the corresponding data, subject
to applicable laws. The retention period is a combination of
the residence period and the blocking period.
Sensitive personal data A category of personal data that usually includes the follow-
ing type of information:
Technical and organizational measures (TOM) Some basic requirements that support data protection and
privacy are often referred to as technical and organizational
measures (TOM). The following topics are related to data
protection and privacy and require appropriate TOMs, for
example:
Data subjects have the right to receive information regarding their personal data undergoing processing. The
personal data record feature helps you to comply with the relevant legal requirements for data protection by
allowing you to search for and retrieve all personal data for a specified data subject. The search results are
displayed in a comprehensive and structured list containing all personal data of the data subject specified,
organized according to the purpose for which the data was collected and processed.
You can view your personal data record in the My Information app. The app is available on the SAP Cloud
Identity Access Governance launchpad Home screen.
SAP Cloud Identity Access Governance logs record information relevant to your employment and access, such
as:
• User ID
• First Name
• Last Name
• Email
• Phone Number
• Personnel Number
• Organization
• Department
• Company
• Business Unit
• Division
• Location
• Cost Center
• Position
• Job
• Employee Type
• Manager ID
In addition, SAP Cloud Identity Access Governance records your user group information, which has been
synched from SAP Cloud Identity (SCI) that are relevant for workflows. The following table explains the
abbreviations for the user group types.
CM Control Monitor
CO Control Owner
WF Workflow Administrator
• Simplified Blocking and Deletion: In addition to compliance with the general data protection regulation,
it is necessary to consider compliance with industry-specific legislation in different countries. A typical
potential scenario in certain countries is that personal data shall be deleted after the specified, explicit,
and legitimate purpose for the processing of personal data has ended, but only as long as no other
retention periods are defined in legislation, for example, retention periods for financial documents. Legal
requirements in certain scenarios or countries also often require blocking of data in cases where the
specified, explicit, and legitimate purposes for the processing of this data has ended, but the data has to
be retained in the database due to other legally defined retention periods. In some scenarios, personal
data also includes referenced data. Therefore, the challenge for deletion and blocking is to first handle
referenced data and finally other data, such as business partner data.
• Deletion of personal data: The handling of personal data is subject to applicable laws related to the deletion
of such data at the end of purpose (EoP). If there is no longer a legitimate purpose that requires the use
of personal data, it must be deleted. When deleting data in a data set, all referenced objects related to that
data set must be deleted as well. It is also necessary to consider industry-specific legislation in different
countries in addition to general data protection laws. After the expiration of the longest retention period,
the data must be deleted.
SAP Cloud Identity Access Governance services use the IAG Synchronization Job to synchronize user data
between the source system and the Repository tables for SAP Cloud Identity Access Governance. Therefore,
users deleted on the source system are also deleted from all relevant Repository tables.
• Deleted Users
The SAP Cloud Identity Access Governance synch job ensures that only active authorized users are
synched. When users have been deleted on target systems, the Synch automatically identifies the changes
and deletes all the information corresponding to the user in SAP Cloud Identity Access Governance.
• Deleting User Information and Action Usage Information from SAP Cloud Identity Access Governance
Action Usage data can be used for future audits.
In the Maintain User Data app, you can delete users’ action usage data and you can also delete the user
information from SAP Cloud Identity Access Governance.
You must have administrator authorization to use the app and carry out these tasks.
The following is a list of tables that relate the USER_ID field to the user information stored in the IAGUSER
table.
• IAGUSERSYSTEM
• IAGUSERGROUP
• IAGUSERPRIVILEGEEXT
• IAGUSERPRIVILEGE
• IAGUSERCONTROL
• IAGUSERPRMVL
• IAGUSERPRMVLDTL
• IAGUSERPRMVLTAG
• IAGUSERPRMVLDTLTAG
• IAGUSERCONTROLTAG
The IAGAPPLUSER table stores the app user’s information. This table is for users who actually log in to SAP
Cloud Identity Access Governance services apps.
IAG User
The following is a list of tables that reference the APPLUSER_ID field in table IAGAPPLUSER.
• IAGAPPLUSERTYPEAPPLUSER
• IAGAPPLUSERGROUPAPPLUSER
SAP Cloud Identity Access Governance supports the SAP Information Lifecycle Management (ILM) framework
for data retention management.
At present, SAP Cloud Identity Access Governance supports the following ILM objects:
Privileged Access Manage- Privileged Access Log Privileged Access Logs Object has these attributes:
ment stored in the Privileged Ac-
Date: Last workflow stage ap-
cess Monitoring Report will
be affected. proval timestamp
Access Request Access Request Access Requests stored in Object has these attributes:
the Access Request Status
Date: Last Updated On time-
and Access Request Audit
Log will be affected. stamp
Access Analysis Access Analysis Audit Log Data stored in Access Analy- Object has these attributes:
sis Audit Log will be affected.
Date: Last Updated On time-
stamp
Access Analysis Access Analysis Change Log Data stored in the Change Object has these attributes:
Log Report will be affected.
Date: Last Updated On time-
stamp
Access Analysis Manage Job Log All jobs and job logs are de- Object has these attributes:
leted from the Manage Jobs
Date: Created On timestamp
app.
Schedule Type: Immediate
Note
Recurring jobs are re-
tained but associated job
run histories that are
older than the retention
period configured by you
are deleted. For instance,
if a job has been sched-
uled to run for 10 years
and has been running for
the past 7 years, the job
will continue to run for
the next three years.
Role Designer Role Designer Data stored in the Role De- Object has these attributes:
sign Inbox, Role Design Ad-
Date: Last Updated On time-
ministration, and Role De-
signer Audit Log will be af- stamp
fected.
Status of object: Pending,
Canceled, Closed
Access Certification Access Certification Cam- All campaigns, reviewed Object has these attributes:
paign
data, and logs stored in the
Date: Close Date On time-
following apps are deleted:
stamp
Create Campaigns
Status of object: Closed
Manage Active Campaigns
Note
The data is also deleted from the Attachment and Workflow services.
Prerequisite
Before you start using the data retention management, ensure that you have correctly defined the Retention
Policies in the Configuration app. You must separately configure the configuration parameters. Depending on
what your needs are, the retention periods can be, for instance, 5 years, 15 years, or 30 years. Once the
retention period is added in the Configuration app, you run the job in Manage Jobs app.
Note
This feature allows you to remove data for a time period spanning five years and higher.
Configuration Application
The Manage Retention Policies application provides data controllers with a dedicated interface to configure
and manage data retention policies. This application ensures that data is retained and deleted according to
organizational policies and regulatory requirements, enhancing data governance and compliance.
The table includes three main columns: Configuration Parameter, ILM Object Name, and Retention Period.
Configuration Parameter: This column shows MANAGE_RETENTION_POLICIES for all entries, indicating that
these settings fall under the configuration for managing retention policies. The parameter and ILM Object
columns are predefined. No changes can be made in those; the only editable fields are under the Retention
Period column.
Retention Period: This column specifies the retention period settings for each corresponding ILM object. The
default value is NEVER.
Note
The retention period is calculated from the end of the business day. For instance, for Access Request, the
status of the log depends on the workflow stage, i.e, when the job was last approved or completed. To view
details of the job such as the Job Parameters, Job Run History and Job Log Messages, choose the relevant job
from the Jobs list.
If your retention period for PAM logs is set for 5 years, then from today’s date, it will calculate and subtract 5
years in the past; this will be then the end of the retention period. It will take into consideration all objects that
are older than five years from the current date.
In addition, for retention period in months, the calculation will consider the number of days (28, 30, or 31 days)
in a month to calculate the correct retention period.
Explanation:
The retention period for Privileged Access Logs is defined as 15 years. That means that all PAM Logs older than
15 years are deleted from the system.
For example, if the retention period starts on January 1, 2022, the logs will be retained until after January 1,
2037. The data destruction job can be scheduled anytime after January 1, 2037.
Summary:
The Privileged Access Logs are retained for a total of 15 years, starting from the date they reach the end of
business day and ending 15 years later.
Before removing any data such as PAM logs or access requests permanently, you can use the simulation or test
mode to obtain an overview about what will be deleted. The job calculates the number of ILM objects, workflow
objects, and attachments. There are no limitations for the retention period.
If the Notification box is checked, administrators receive emails about the scheduled jobs.
Once the job is completed, you can view the details in the following three sections:
• Job Parameters
• Job Run History
• Job Log Messages
The authorization concept is based on the assignment of authorizations to users via policy sets.
You enable data level security by selecting the authorization object attributes to which the policy applies. For
example, you can be as granular as a specific back-end user ID, an organization, etc.
5.2 Prerequisites
Ensure the latest user information is synched to the repository by running the following background jobs:
You maintain authorization policies via the Authorization Policy app. The app allows you to do the following:
1. From the Authorization Policy app Policy Set screen, click the plus sign (+).
2. In the New Policy Set window, enter the name and select a policy type. The policy type defines the
authorization object, such as mitigation control.
3. Click Save.
You cannot directly deactivate or delete a policy set. To deactivate a policy set you deactivate its policies.
1. To create a policy, open a policy set, and click the plus sign (+).
2. Click Save.
Note
Once you save a policy, you cannot edit the policy. You can delete or deactivate the policy and create a new
one.
To Delete Policies:
Note
On the policy set detail screen, you can also choose to Deactivate All policies.
SAP Cloud Identity Access Governance delivers a specific role for the Authorization Policy app on the SAP
Busines Technology Platform (SAP BTP). On SAP BTP, assign the delivered role to specific users who are
responsible to setup SAP Cloud Identity Access Governance and Authorization Policies. This role collection can
be either directly assigned to the user or via SAP Cloud Identity Access Governance User Mapping.
For more information on other roles, refer to the section Pre-Delivered Role Collections on SAP BTP [page 53]
By default, the access analysis service provides sufficient authorizations for users to remediate all access
risks for all back-end users. We recommend administrators use the Authorization Policy app to adjust the
authorization policies to be in line with your company’s guidelines.
The tables below list and describe the default policy sets and policies.
Policy Set Policy Set Access Risk Auth Allows the assigned users to take action
ALL on all access risks.
Policy Access_Risk_Auth_ALL
Policy Set Policy Set Back-end User Auth Allows the assigned users to take action
ALL on all back-end users.
Policy Back-end_User_Auth__ALL
Policy Set Policy Set Mitigation Control Allows the assigned users to take action
Auth ALL on all mitigation controls.
Policy Mitigation_Control_Auth_ALL
Policy Set Policy Set Business Role Auth Allows the assigned users to request
ALL access to all business roles.
Policy Business_Role_Auth_ALL
Policy Set Policy Set Access Auth ALL Allows the assigned users to request
access to all access.
Policy IAG_Access_Auth_ALL
Policy Set Policy Set Application Auth Allows the assigned users to request
ALL access to all applications.
Policy IAG_Application_Auth_ALL
Default Policy Set and Policy for Deleting Business Function Groups (By default, this policy is inactive and needs to be
activated for granting access)
Policy Set Policy Set Business Function Allows the assigned users to perform
Group Delete Auth ALL the delete action on all business func-
tion groups.
Policy Business_Function_Group_Delete
_Auth_ALL
Default Policy Set and Policy for Viewing, Editing, and Creating Business Function Groups (By default, this policy is inactive
and needs to be activated for granting access)
Policy Set Policy Set Business Function Allows the assigned users to perform
Group Auth ALL actions pertaining to viewing, editing,
and creating on all business function
Policy Business_Function_Group_View_E groups.
dit_Create_Auth_ALL
Policy Set Policy Set Access Request Auth Enables Access Request fields for as-
ALL signed users.
Policy Access_Request_Auth_ALL
For information on the value help for the various Policy Type Attributes, refer to2788255 .
Use the following information to maintain authorization policies for the scenario - Access Risks Remediation.
When performing user access analysis in the Access Analysis app, users can remediate user access risks by
refining the access or mitigating the SoD and critical access risks. By default users can remediate access
risks for all back-end users, which includes refining the access and assigning mitigation controls. As an
administrator, you can use the Authorization Policy app to clarify these authorizations, and define which
access risks a user can remediate, which mitigation controls they can assign, and for which back-end users
they can perform these tasks.
The following image provides an overview of what can be defined through authorization policies.
Use the information in the following table to maintain authorizations for access risk remediation.
Back-end User Mitigate Allow user to mitigate access Back-end User ID, Orgaiza-
risks for the back-end users tion, Location
specified by the authoriza-
tion object attributes.
Access Risk Mitigate Allow user to mitigate risks Risk ID, Business Process,
specified by the authoriza- Risk Level, Risk Type
tion object attributes.
Mitigation Control Assign Allow user to assign mitiga- Mitigation Control ID, Organi-
tion controls specified by zation, Business Subprocess
the authorization object at-
tributes.
Note
If the user does not have
authorization to assign
a mitigation control, the
risk information is still
displayed, but the mit-
igation control field is
grayed.
You enable data level security by selecting the authorization object attributes to which the policy applies. For
example, you can be as granular as a specific back-end user ID, an organization, etc.
Each of the policy types and their actions controls authorizations for an aspect of access risk remediation.
Therefore, to fully set up authorizations for the access risk remediation scenario, you must assign all 3
policy types to the users.
You enable data level security by selecting the authorization object attributes to which the policy applies.
For assigning the users to Authorization policies, you can use the following user attributes to define a fine-
grained authorization.
USER_ID User ID
LOCATION Location
DEPARTMENT Department
COMPANY Company
DIVISION Division
ALL: When you enter ALL as the value for the USER_ID field, the Authorization engine skips the runtime
evaluation of this policy. This keyword is used with all of the default Auth policies.
ALL_USERS: When you put ALL_USERS as the value for the USER_ID field, the Authorization engine
substitutes the logged in user at runtime when evaluating Auth Policy. This is for the scenarios where a policy is
intended for all users. You can define a minimum privilege for all users in this way and then customize specific
ones based on user’s other attributes as needed.
For information on the value help for the various Policy Type Attributes, refer to 2788255 - Value Help
Attribute Values for Auth Policy UI.
Use the following information to maintain authorization policies for the scenario - Access Request Role Search.
When performing role search in Access Request app, the search results can be restricted or filtered out based
on the Authorization policy definition.
As an administrator, you can use the Authorization Policy app to define these authorizations and define which
Access/Application or Business Role an end user can search and request via Access Request Application.
Use the information in the following table to maintain authorizations for access request role search.
Access Request Access Allow the assigned users to Name, Application, Applica-
request access to all Access tion Type, Access Type, Busi-
specified by the authoriza- ness Process, Business Sub-
tion object attributes. process
Business Role Request Access Allow the assigned users to Name, Business Process,
request access to all Busi- Business Subprocess, Criti-
ness Roles specified by the cality
authorization object attrib-
utes.
Application / System Request Access Allow the assigned users to Application, Application Type
request access to all Applica-
tions/Systems specified by
the authorization object at-
tributes.
Use the following information to maintain authorization policies for the scenario - Access Request user
interface (UI) - Enable/Disable Manager and Email fields.
When you create an access request, the Manager and Email fields are enabled or disabled based on the
Authorization policy definition.
As an administrator, you can use the Authorization Policy app to define these authorizations and define which
field is to be enabled for endusers.
Use the information in the following table to maintain authorizations for access request UI.
Access Request Manager Editable Enable Manager ID field on Request Priority, Request
the UI Reason
You enable data level security by selecting the authorization object attributes to which the policy applies.
For assigning the users to Authorization policies, you can use the following user attributes to define a fine-
grained authorization.
USER_ID User ID
LOCATION Location
DEPARTMENT Department
COMPANY Company
DIVISION Division
ALL: When you enter ALL as the value for the USER_ID field, the Authorization engine skips the runtime
evaluation of this policy. This keyword is used with all of the default Auth policies.
ALL_USERS: When you put ALL_USERS as the value for the USER_ID field, the Authorization engine
substitutes the logged in user at runtime when evaluating Auth Policy. This is for the scenarios where a policy is
intended for all users. You can define a minimum privilege for all users in this way and then customize specific
ones based on user’s other attributes as needed.
For information on the value help for the various Policy Type Attributes, refer to 2788255 - Value Help
Attribute Values for Auth Policy UI.
Use the following information to maintain authorization policies for the scenario – Deleting Business Function
Groups.
Deleting business function groups includes deleting all related master data, for example, Risks, Functions,
Rules etc. This authorization controls who can see the delete button enabled on the tile and delete business
function groups.
As an administrator, you can use the Authorization Policy app to define these authorizations and define which
business function group an end user can delete via UI.
Use the information in the following table to maintain authorizations for business function groups.
Business Function Group Delete Allows the assigned users to Business Function Group
Name, Business Function
delete all business function
Group Type
groups specified by the au-
thorization object attributes.
You enable data level security by selecting the authorization object attributes to which the policy applies.
Refer to the Business Function Group tile for possible values for the authorization object attributes.
For assigning the users to Authorization policies, you can use following user attribute to define a fine-grained
authorization.
USER_ID User ID
LOCATION Location
DEPARTMENT Department
COMPANY Company
DIVISION Division
ALL: When you enter ALL as the value for the USER_ID field, the Authorization engine skips the runtime
evaluation of this policy. This keyword is used with all of the default Auth policies.
ALL_USERS: When you put ALL_USERS as the value for the USER_ID field, the Authorization engine
substitutes the logged in user at runtime when evaluating Auth Policy. This is for the scenarios where a policy is
intended for all users. You can define a minimum privilege for all users in this way and then customize specific
ones based on user’s other attributes as needed.
SAP Cloud Identity Access Governance sends relevant information about changes made to security and
configuration events to SAP Audit Log Service where it is stored centrally.
Retention time:
By default, SAP Audit Log Service allow 90 days for retention. If you wish to have a different retention time, you
can enable the Audit Log service, premium edition service plan, to configure a flexible retention period, longer
than the free 90 days. For more information, refer to Audit Log Retention for Cloud Foundry Environment.
Application Maintenance
Area Event Key Message Event Category
Business Function Group Create business Business function group created. audit.security-events
function group
Recurring Jobs
Area Event Key Example Event Category
Configuration
Area Event Key Example Event Category
Workflow Template
Area Event Key Example Event Category
Authorization Policy
Area Event Key Example Event Category
User Mapping Upload Upload user User mapping file uploaded. audit.security-events
mapping
Approver Upload
Area Event Key Example Event Category
Application User Upload Upload applica- Application user file uploaded. audit.security-events
tion users
Functions
Area Event Key Example Event Category
Mitigation Control
Area Event Key Example Event Category
Mitigation Control As- Delete Assign- User mitigation control assignment deleted. audit.security-events
signments ment
or
or
or
Invalid Mitigation Control Delete Assign- Invalid user mitigation control assignment de- audit.security-events
Assignments ment
leted.
or
or
Risks
Area Event Key Example Event Category
Rule Setup
Area Event Key Message Event Category
Mass Update
Area Event Key Message Event Category
Rulesets
Area Event Key Message Event Category
Business Roles
Area Event Key Message Event Category
or
or
or
Manage Jobs
Area Event Key Message Event Category
Recurring
curring
Note
To see Privileged Access Log ID, open Log
Entry Details.
1. An actor - the actorId variable represents the unique identifier of the actor associated with an auditable
event. The actor is typically a user or system that triggers the event. The actorId value is used to track and
identify the source of the event.
2. A tenant identifier - the tenantId variable represents the unique identifier of the tenant associated with
an auditable event. The tenant is a grouping or subdivision within an organization that is separate from
other groupings. The tenantId value is used to track and identify the specific tenant associated with the
event.
3. The SAP passport ID – the passportId represents the SAP passport ID associated with an auditable
event. See also: SAP Passport.
4. A group - permissionGroups stores the permission groups associated with an auditable event. For
SAP Cloud Identity Access Governance users, this is the role collection of which the user is currently a
member. This is useful in diagnosing security events and for auditing changes. The permission groups are
represented as a list of strings.
SAP Cloud Identity Access Governance solution and its services use Identity Authentication service for user
authentication and to manage access to the solution's apps. Security and permissions are maintained in
groups and role collections. You control the tasks a user can perform, and the apps they can access, through
the appropriate assignment of group and role collections to the user.
The assignment of groups and roles to users controls these three security aspects:
The process to configure authentication and access requires you to perform configuration tasks on SAP
Business Technology Platform (SAP BTP) for the SAP Cloud Identity Access Governance tenant and the
Identity Authentication service.
In Identity Authentication, tenant administrators can manage user accounts and groups.
Create User Create users via the Add user option in Create a New User
Create User Groups Create new user groups via User Create a New User Group
Note
It is mandatory to follow the User
Group Naming Guidelines and cre-
ate the Required Groups provided
below.
Assign Groups to User Assign groups to a user via the adminis- Assign Groups to a User
tration console for Identity Authentica-
tion.
When you create these groups, you must follow this naming convention: IAG_<TYPE>_<NAME>.
In this string, the <TYPE> must be one of the delivered types shown in the table below. The <NAME> can be of
your choosing, though we recommend choosing a name that is clear and concise.
Example: IAG_WF_ADMIN
Group Types
CADM Candidate Business Role Adminstrator Users assigned to this group have ac-
cess to the Candidate Business Role
Adminstration app and carry out ad-
ministrative tasks.
RCA Business Role Content Approver Users can modify and approve busi-
ness roles. Users assigned to this group
are included in the dropdown list of
Business Role Content Approvers.
RAA Business Role Assignment Approver Users can approve business role as-
signments. Users assigned to this
group are included in the dropdown list
of Assignment Approvers.
USER IAG Application Users Assign this group by default to all appli-
cation users for SAP Cloud Identity Ac-
cess Governance.
Required Groups
The following groups are required for using SAP Cloud Identity Access Governance services. Make sure you
create them with the names listed below with the same case. The name is case-sensitive.
In the Identity Authentication tenant, create the groups as described below, and then assign the relevant users
to them. These are suggested groupings and names. In your own implementation, you can create groups that
suit your needs.
Note
You can create users in Identity Authentication or make them available on a connected LDAP server.
Note
To connect to LDAP and other services for app user, you must configure this in Identity Authentication. For
more information, see SAP Cloud Identity Services - Identity Authentication.
Required Groups
The following groups are required. The SAP Cloud Identity Access Governance services look for these specific
groups. Make sure you create them with the names listed below with the same case. The name is case
sensitive.
Access Request Service IAG_WF_MANAGER In the Create Access Request app there
is the Manager field. You assign users to
the IAG_WF_MANAGER group to make
them available for selection in this field.
Managers are responsible for approving
access requests.
Note
If a user's manager is explicitly as-
signed in Identity Authentication,
then the manager is displayed in
this field and is read-only.
Role Design Service IAG_WF_CBRRefine Users assigned to this group can refine
the proposed candidate business roles.
Privileged Access Management IAG_WF_ADMIN Users assigned to this group can re-
ceive and work on privileged access
request and log items in the security
stage.
In the tenant for SAP Cloud Identity Access Governance on SAP BTP, the administrator can view the
pre-delivered role collections. The role collections CIAG_Display, CIAG_Access_Certification_Admin, and
CIAG_Super_Admin are primarily required to gain full access to the apps in SAP Identity Cloud Access
Governance. Refer to the tables below for the role collections.
Note
If you are subscribing to the SAP Cloud Identity Access Governance, integration edition, refer to SAP Cloud
Identity Access Governance, integration edition
CIAG_Display Destination Certificate Viewer This is the default role collection. It in-
cluded roles that are needed by the
Destination Configuration Viewer framework. They are grouped under a
single role collection and must be as-
Destination Subaccount Trust Viewer signed to all business users.
Destination Viewer
EXTERNAL_PORTAL_USER
IAGDisplay_Admin
sap_scheduler_configuration_template
sap_scheduler_viewer_template
Token_Exchange_Admin
Role Collections and Associated Roles for the Access Request Service
Associated Roles for the Role Collec-
Assign this Role Collection tion To perform these tasks
Note
To create a new role collection,
for instance, ZIAG_ARQ_WF_AP-
PROVE role, carry out the steps be-
low:
IAG_Access_Request_AdminAdminis- service
iag_custom_field_groups
iag_custom_fields
iag_field_mapping
iag_maint_user_data
iag_notif_upload
iag_reason_code
RuleRepositorySuperUser
RuleRuntimeSuperUser
WorkflowAdmin
WorkflowDeveloper
Role Collections and Associated Roles for the Role Design Service
Associated Roles for the Role Collec-
Assign this Role Collection tion To perform these tasks
IAG_Role_Designer_AdminReports
IAG_Role_Designer_AdminRole_de-
signer
Role Collections and Associated Roles for the Access Analysis Service
Associated Roles for the Role Collec-
Assign this Role Collection tion To perform these tasks
iag_configuration
iag_functions
iag_mitigaton_control_master_data
iag_risk
iag_risk_level
iag_risk_score_policy
iag_test_plans
RuleRepositorySuperUser
RuleRuntimeSuperUser
iag_business_processes
iag_configuration
IAG_Configuration_AdminAdministra-
tion
iag_custom_field_groups
iag_custom_fields
iag_field_mapping
iag_functions
iag_maint_user_data
iag_mitigaton_control_master_data
iag_notif_upload
iag_projects
iag_reason_code
iag_risk
iag_risk_level
iag_risk_score_policy
iag_test_plans
RuleRepositorySuperUser
RuleRuntimeSuperUser
WorkflowAdmin
WorkflowDeveloper
WorkflowParticipant
CIAG_Administrator_v1 iag_connector_type
CIAG_Job_Scheduler_Admin IAGSchedulerAdmin
IAG_Access_Analysis_AdminReports
IAG_Access_AnalysisAccess_Analysis
IAG_Access_AnalysisAdministration
IAG_Access_AnalysisReports
IAG_Access_Request_AdminAc-
cess_Request
IAG_Access_Request_AdminAdminis-
tration
iag_access_request_priority
IAG_Access_RequestAccess_Request
IAG_Access_RequestAdministration
iag_authorization_policy
iag_business_processes
iag_configuration
iag_custom_field_groups
iag_custom_fields
iag_departments
iag_field_mapping
iag_functions
iag_maint_user_data
iag_mitigaton_control_master_data
iag_notif_upload
IAG_Privileged_AccessAdministration
IAG_Privileged_AccessPrivileged_Ac-
cess_Management
IAG_Privileged_AccessPrivilegedRoles
IAG_Privileged_AccessReports
iag_projects
iag_reason_code
iag_risk
iag_risk_level
iag_risk_score_policy
IAG_Role_Designer_AdminAdministra-
tion
IAG_Role_Designer_AdminReports
IAG_Role_Designer_AdminRole_de-
signer
IAG_Role_DesignerAdministration
IAG_Role_DesignerReports
IAG_Role_DesignerRole_designer
iag_test_plans
RuleRepositorySuperUser
RuleRuntimeSuperUser
WorkflowAdmin
WorkflowDeveloper
WorkflowParticipant
iag_massupdate
CIAG_Job_Scheduler_Admin IAGSchedulerAdmin
CIAG_Administrator_v1 iag_connector_type
IAG_Privileged_AccessPrivileged_Ac-
cess_Management
IAG_Privileged_AccessPrivilegedRoles
IAG_Privileged_AccessReports
iag_reason_code
In the tenant for SAP Cloud Identity Access Governance, the administrator can assign the role collections. For
more information, refer to Assign Role Collections.
Note
If you wish to customize your role collections, you have the option of creating and assigning them manually.
If you need a list of roles belonging to role collections for workflow management and business rules, refer to
the following links SAP Workflow Management - Authorization Configuration
SAP Business Rules Service for the Cloud Foundry Environment - Authorization Configuration
Previous: Maintain Users and User Groups in Identity Authentication [page 50]
Next: Map Role Collections and Identity Authentication Group [page 62]
To map the role collections to your Identity Authentication tenant, you must do the following:
Next: Set Up Assertion-based Groups for IdentityAuthentication and Role Collection Mapping [page 64]
SAP Cloud Identity Access Governance services use Identity Authentication to provide user identity
authentication.
Before you can start using the solution, you must federate your SAP Identity Access Service tenant with the
subscriber subaccount for SAP Cloud Identity Access Governance. This is a simple exchange of certificates;
however, some special settings must be implemented for optimum usability of the software.
1. Log into the SAP BTP as administrator, and go to your tenant account.
2. Navigate to Security Trust Configuration .
3. Select SAML Metadata to download the metadata file.
Make sure to download the metadata file to a directory that is accessible by the Identity Authentication
tenant.
For more information on Identity Authentication and SAP BTP trust configuration, see SAP Cloud Identity
Services - Identity Authentication.
In the Identity Authentication cockpit, create a custom application for SAP Cloud Identity Access Governance
services, which are used to establish the trust relationship with the SAP Business Technology Platform tenant
(SAP BTP).
1. In the Identity Authentication cockpit, navigate to Applications & Resources > Applications.
2. Add a custom application and save.
Note
For ease of use, the application and the subaccount should have the same name.
1. In the Identity Authentication cockpit, navigate to Tenant Settings SAML 2.0 Configuration .
2. In the SAML 2.0 Configuration , in the Identity Provider Settings, go to Signing Certificate at the bottom of
the page to down the metadata file.
3. Rename the file. Use the tenant ID of the Identity Authentication Service for this purpose.
4. In the field Description, enter the description (optional).
5. Save.
Attributes
Note
Make sure that the Application in Identity Authentication contains ONLY the attributes listed in the table in
Step 3. The Subject Name Identifier (SNI) MUST be User ID.
1. Log in to the Identity Authentication tenant and navigate to Applications & Resources Applications .
2. Under Applications, select your application for SAP Cloud Identity Access Governance (This is the
application you created as part of the procedure for setting up a trust relationship between the Identity
Authentication service tenant and the SAP Cloud Identity Access Governance application on SAP BTP.).
3. Go to Trust and choose Attributes and make sure only the following attributes are defined:
Name Value
Groups Groups
mail Email
If role collections values are unavailable in the Identity Authentication system, you need to
manually create them. Other role collections listed here
Pre-Delivered Role Collections on SAP BTP [page 53] must be mapped in the same manner as the
examples listed below.
4. Save.
Previous: Map Role Collections and Identity Authentication Group [page 62]
Within the framework of access governance, tasks have different levels of risk and sensitivity. You use Identity
Authentication tools to ensure that only designated users can perform administrative tasks. For example, only
users designated as business role approvers can approve new business roles.
1. In the Identity Authentication tenant, create your groups according to the guidelines below.
2. Assign the appropriate users to the relevant groups.
3. Sync the user-group assignments.
In the Fiori launchpad for SAP Cloud Identity Access Governance, open the Job Scheduler app, and run
Sync User Groups from IAS job.
For more information about creating user groups and assigning users, see the For More Information section
below.
For group naming conventions and assigning users to groups, refer to the Group Naming Guidelines section
mentioned in Maintain Users and User Groups in Identity Authentication [page 50].
Previous: Set Up Assertion-based Groups for IdentityAuthentication and Role Collection Mapping [page 64]
Next: Syncing User Groups from SAP Identity Services Identity Directory [page 66]
With the configuration on in this page, Users/Groups and managed users’ attributes in SAP Cloud Identity
Access Governance application will all use SAP Identity Services Identity Directory as source system (), instead
of Identity Authentication Service. The configuration to use Identity Authentication Service as source () is no
longer needed.
To ensure user groups information is synchronized between the SAP Cloud Identity Services tenant and the
tenant for SAP Cloud Identity Access Governance on SAP Business Technology Platform (SAP BTP), you must
maintain the required system in SAP Cloud Identity Services and the destination in the tenant for SAP Cloud
Identity Access Governance and then run the SCI User Group Sync job in the Job Scheduler app.
Step 1: Set Up IAG Sync System as Administrator in the SAP Cloud Identity
Service Tenant
Authorization Description
Manage Groups This role gives the tenant administrator permission to cre-
ate, edit and delete user groups via the administration
console.
Access Proxy System API Authorizations to access API for provisioning identities via
proxy systems
Access Real-Time Provisioning API Authorizations to access API for real-time provisioning of
identities
Access Identity Provisioning Tenant Admin API Authorizations to access tenant API for running Identity
Provisioning jobs or downloading job logs
Step 2: Create Destination in the Tenant for SAP Cloud Identity Access
Governance on SAP BTP
1. In the tenant for SAP Cloud Identity Access Governance, go to the Subaccounts dropdown menu and
choose your subaccount.
2. Choose Connectivity Destinations in the navigation panel.
3. Create SAP_Identity_Services_Identity_Directory destination and choose the pencil icon to
edit it.
Enter the properties listed below:
*Name SAP_Identity_Services_Identity_Directory
Type HTTP
Authentication: BasicAuthentication or
ClientCertificateAuthentication
Accept application/scim+json
GROUPSURL /Groups
serviceURL /scim
USERSURL /Users
In the , Configuration Group UserSource, Parameter SourceSystem, set Parameter Value as:
SAP_Identity_Services_Identity_Directory.
1. Login the SAP Cloud Identity Access Governance and open the Job Scheduler app.
2. In the Job Name field, enter the Job Name.
3. In the Job Category field, select SCI User Group Sync from the dropdown list.
4. In the Recurring Job field, select No.
5. In the Start Immediately field, select Yes.
6. Enter information in all required fields and choose Schedule Job. The job status and log can be checked in
the Job History app.
Note
To schedule a Recurring Job, refer to 2859618 for recommendation on the frequency of the jobs.
The SAP Cloud Identity Access Governance solution integrates with other SAP services, such as SAP Cloud
Identity Services - Identity Provisioning. These services require users to have specific roles to use them.
Identity Provisioning service is available as part of the bundled SAP Cloud Identity Access Governance solution.
For a successful integration, always use the Identity Provisioning tenant that is included in the bundle.
To obtain your Identity Provisioning tenant, or to have your existing bundle tenant upgraded for use with SAP
Cloud Identity Access Governance, create an incident for component GRC-IAG-OPS.
• That you request Identity Provisioning tenant from SAP Cloud Identity Access Governance bundle
• ID of the account where you have subscribed to SAP Cloud Identity Access Governance
• Whether the subscription is for test or production: specify plan test, standard, or tandd
• The URL of the Identity Authentication tenant for which you have established trust from your subscriber
account for SAP Cloud Identity Access Governance.
• S-user (ID and email address) who should be administrator in the Identity Provisioning tenant
• File separate incidents for test and production landscapes
Note
Do not use any standalone Identity Provisioning tenant or the Identity Provisioning service from SAP
Identity Access Governance (1.0) tenants (SAP BTP, Neo environment). Technically, it is still possible to use
Identity Provisioning from SAP Identity Access Governance (1.0) but not once the grace period expires.
Previous: Syncing User Groups from SAP Identity Services Identity Directory [page 66]
The SAP Cloud Platform Business Rules service delivers the predefined role: RuleSuperUser. This role enables
you to create, modify, read, and activate a business rule project and other entities within it.
Assign the role to the groups you want to have those authorizations.
For more information, see SAP Cloud Platform Business Rules service - Authorization Configuration.
The SAP Cloud Platform Workflow service is delivered with predefined roles. Assign the following roles to the
Access Request Group to enable users to use the workflow service.
Role Description
WorkflowDeveloper (global role) • Permission to use the workflow editor and deploy workflow definitions
• Permission to query workflow definitions
• Permission to retrieve the current error messages of a workflow instance
• Permission to retrieve the model of the latest version of a specified workflow
definition
WorkflowContextAdmin (global • Permission to partially modify or completely override the workflow context of a
role) workflow instance
contextAdminUsers
• Permission to retrieve the context of a task instance
contextAdminGroups
contextViewerUsers
contextViewerGroups
WorkflowInitiator (global role) • Permission to view the sample context of a workflow definition
• Permission to start workflow instances (using the API or the Monitor Workflows
app)
WorkflowParticipant (global • Permission to view tasks in My Inbox, where the user assigned to this role is a
role) recipient
• Permission to perform task operations including the following:
• Claim
• Release
• Call the task completion API
• This role is a prerequisite to work with instance-specific permissions.
adminUsers
• Permission to query workflow definitions as well as query and cancel workflow
instances*
adminGroups • Permission to retrieve and modify the tasks of a workflow instance
• Permission to retrieve the current error messages of a workflow instance
• Permission to retry the failed steps of an erroneous workflow instance
• Permission to suspend and resume a workflow instance for temporary suspen-
sion of processing
• Permission to retrieve the workflow logs for a given workflow instance
• Permission to download the workflow model in the Monitor Workflow app*
WorkflowMessageSender (global • Permission to send a message to a set of workflow instances for consumption in
role) intermediate message events
WorkflowViewer (global role) • Permission to query workflow definitions* as well as query workflow instances
viewerUsers
• Permission to view context of workflow instances and task instances
• Permission to retrieve the tasks of a workflow instance
viewerGroups
• Permission to retrieve the workflow logs for a given workflow instance
• Permission to download the workflow model
WorkflowBusinessExpert • Permission to work with process variants. For internal use only.
(global role)
The SAP Cloud Platform Workflow service is delivered with three apps to enable you to maintain it.
To access and use the Workflow Definition and Workflow Instances apps, assign to them the following roles:
Role Description
1. On the SAP Cloud Platform cockpit open > Services > Identity Provisioning> Configure Service > Roles.
2. IPS_ADMIN is a predefined role. Assign administrator’s S-user ID to this role so that they can configure the
IPS proxy system.
For more information, see SAP Cloud Platform Identity Provisioning service - Access the Identity Provisioning
Service
For assistance and questions, you can go to the SAP Support Portal at https://support.sap.com , and click on
Get Support button to report a new issue.
Service Component
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
• Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
• The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
• SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
• Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering an SAP-hosted Web site. By using
such links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Bias-Free Language
SAP supports a culture of diversity and inclusion. Whenever possible, we use unbiased language in our documentation to refer to people of all cultures, ethnicities,
genders, and abilities.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.