SAP IAG Implementation Guide
SAP IAG Implementation Guide
2021-08-20
1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 Integration Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3 Complete Integration for SAP Cloud Identity Access Governance and Target Cloud
Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4 Sync Repository Data from Target Cloud Application to SAP Identity Access Governance
Repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
5 Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
Governance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
5.1 Install Connector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
5.2 Maintain RFC Destinations for Cloud Connectors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
5.3 Configure the Identity Authentication Service in SAP BTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
5.4 Configure Parameters for Cloud Integration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
5.5 Create Connectors and Connector Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.6 Create Destinations for SAP Cloud Identity Access Governance Service. . . . . . . . . . . . . . . . . . . . . . 11
5.7 Sync Cloud Application Repository Data from IAG Repository to SAP Access Control System. . . . . . . 12
5.8 Create Access Requests for Cloud Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.9 User Access Review in SAP Access Control 12.0 for the Bridge Scenario. . . . . . . . . . . . . . . . . . . . . . 12
5.10 Run Provisioning Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
2 PUBLIC Content
1 Introduction
This document explains the procedure to enable SAP Access Control 12.0 (on-premise) to use SAP Cloud
Identity Access Governance as a bridge to facilitate creation of access requests, and performing risk analysis,
for cloud applications.
For example, you use the access control on-premise application to create access requests for your cloud
application. The risk analysis, assignment of mitigation controls (if needed), and provisioning is handled by the
SAP Cloud Identity Access Governance.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Introduction PUBLIC 3
2 Integration Overview
Note
To integrate SAP Access Control using the bridge scenario, you can only connect one SAP Access Control
system at a time.
Prerequisites
You must have completed the following prerequisites before proceeding with this integration:
● Working instance of SAP Cloud Identity Access Governance (see IAG Admin Guide)
● Working instance of SAP Access Control 12.0 on-premise (see AC 12.0 Admin Guide)
● Working instance of at least one integrated target cloud application
● Working instance of Identity Authentication
Procedure
1. Complete the integration process for SAP Cloud Identity Access Governance and target cloud
application, for instance, SAP Ariba.
2. In the SAP Cloud Identity Access Governance launchpad, sync the repository data from target app to the
IAG repository.
3. Complete the integration process for the SAP Access Control on-premise system and SAP Cloud
Identity Access Governance .
4. In the SAP Access Control system, sync the repository data from the IAG repository to the SAP Access
Control system.
5. In the SAP Access Control system, create access requests for target cloud application.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
4 PUBLIC Integration Overview
3 Complete Integration for SAP Cloud
Identity Access Governance and Target
Cloud Applications
Full integration enables communication and data sync between SAP Cloud Identity Access Governance and
target cloud applications.
Note
Procedure
To enable communication and data syncing between SAP Cloud Identity Access Governance and a target cloud
application for testing, do the following:
1. In the SAP Business Technology Platform cockpit (SAP-BTP), create destinations for your specific target
application, e.g. SAP Ariba. (see Administration Guide – Integration Scenarios)
2. In SAP Cloud Identity Access Governance launchpad, add a system for the target application destination.
3. Open the Systems app and choose the plus (+) to create a system. Use the information from the
destination you created in SAP-BTP to fill in the fields. (See Administration Guide – Integration Scenarios –
Add App Instance)
Note
For a successful integration of SAP Access Control with SAP Cloud Identity Access Governance, the
Systems and Business Function Group apps created in SAP Cloud Identity Access Governance must have
10 characters or less.
This completes the communication setup between SAP Cloud Identity Access Governance and your target
cloud application.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration for SAP Cloud Identity Access Governance and Target Cloud
Applications PUBLIC 5
4 Sync Repository Data from Target Cloud
Application to SAP Identity Access
Governance Repository
Procedure
To sync repository data from a cloud application to SAP Cloud Identity Access Governance repository, do the
following:
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Sync Repository Data from Target Cloud Application to SAP Identity Access
6 PUBLIC Governance Repository
5 Complete Integration of SAP Access
Control On-Premise to SAP Cloud
Identity Access Governance
Complete integration enables communication and data sync between SAP Cloud Identity Access Governance
and SAP Access Control.
Note
The information in this section refers to the Administration Guide - Integration Scenarios - SAP ABAP (on-
premise).
Prerequisites
● You have upgraded the target system to one of the supported NetWeaver versions and support packs (see
Required NW version and SP).
● You have created the required RFC user allow communication with SAP Cloud Identity Access Governance
(see Required RFC User).
● You have set up a trust configuration for Identity Authentication.
In the customer landscape, install and configure the connector for the SAP Business Technology Platform
(SAP-BTP) to enable communication between on-premise systems and the SAP-BTP, and maintain
destinations for each SAP Access Control system. (For detailed steps, see Maintaining Cloud Connector).
After performing the steps mentioned in the link above, enter the Function Name and the Naming Policy for
the SAP Access Control system added to the cloud connector.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
Governance PUBLIC 7
5.2 Maintain RFC Destinations for Cloud Connectors
Prerequisites
1. For authentication, set up a connection between SAP Cloud Identity Access Governance and Identity
Authentication service.
1. Use one of the URL listed below.
Depending on your region, the following URLs apply:
For customers in the United States subscribing to the standard edition:
grc-iag-us10-grc-iag-core-us10-java-rest-authentication.cfapps.us10.hana.ondemand.com
For customers in the United States subscribing to the integration edition:
grc-iag-us10-grc-iag-core-us10-java-rest-authentication-intg.cfapps.us10.hana.ondemand.com
For customers in the EU region subscribing to the standard edition:
grc-iag-eu10-grc-iag-core-eu10-java-rest-authentication.cfapps.eu10.hana.ondemand.com
For customers in the EU region subscribing to the integration edition:
grc-iag-eu10-grc-iag-core-eu10-java-rest-authentication-intg.cfapps.eu10.hana.ondemand.com
2. Create authorization credentials
You only require to create a system user for Identity Authentication and to add the domain name to the
username separated by @.
Username:<IAS SYSTEM USER LOGON NAME OR USERID>@<CUSTOMER-SUBDOMAIN NAME>
In SAP BTP, you can obtain your unique subdomain name from the overview page of your subaccount
for SAP Cloud Identity Access Governance.
Password: Identity Authentication password.
Example:
UserName User@iagcustone
Password xxxx
Path /authentication
Port 443
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
8 PUBLIC Governance
2. Destination for SOD check
Path /
Port 443
Use the region-based URLs listed below for the Trigger service application for SAP Cloud Identity
Access Governance:
For customers in the United States:
grc-iag-us10-grc-iag-core-us10-java-rest-trigger.cfapps.us10.hana.ondemand.com
For customers in the United States subscribing to the integration edition:
grc-iag-us10-grc-iag-core-us10-java-rest-trigger-intg.cfapps.us10.hana.ondemand.com
For customers in the EU region:
grc-iag-eu10-grc-iag-core-eu10-java-rest-trigger.cfapps.eu10.hana.ondemand.com
For customers in the EU region subscribing to the integration edition:
grc-iag-eu10-grc-iag-core-eu10-java-rest-trigger-intg.cfapps.eu10.hana.ondemand.com
3. Create the third destination (create one for each cloud application).
1. Configure SM59.
2. Create HTTP external destinations.
3. Run SM59 Transaction.
4. Select External HTTP Destination.
Refer to the table below for an example of a destination.
Host URL - same as the trigger URL from the previous step.
Leave the login blank (do not provide any user/
password) and select SSL active.
Path /com/sap/grc/iag/service/roleSimulationService.svc/
Port 443
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
Governance PUBLIC 9
3. Create destinations as specified below.
Name IAGAuthService
Type HTTP
Description IAGAuthService
Note
Authentication No Authentication
1. Go to SPRO Governance, Risks and Compliance Access Control Maintain Configuration Settings .
2. Maintain the following parameters and values. (For more information, see Configure Parameters for SAP
Identity Access Governance).
Create connectors and connector groups for the target cloud application.
Note
For steps 3 and 4 below, the Systems and Business Function Group apps in SAP Identity Access
Governance must have 10 characters or less, as SAP Access Control supports only 10 characters.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
10 PUBLIC Governance
5.6 Create Destinations for SAP Cloud Identity Access
Governance Service
This delivered service is used by SAP Cloud Identity Access Governance to push provisioning status updates to
SAP Access Control. This enables the proper and accurate display of provisioning status for access requests.
1. Go to SPRO Governance, Risks and Compliance SAP NetWeaver SAP Gateway Administration
General Settings Activate and Maintain Services .
2. In the Service Catalog screen, select IAG_PROVISION_STATUS_UPDATE_SRV and activate it.
3. In the System Aliases pane, choose Add System Alias, and add it as local host, and Save.
4. In the ICF Nodes pane, choose SAP Gateway Client, and Execute.
5. In the html pane, copy the href link. You need it for the next step.
6. In the Cloud Connector, create a system mapping for the provisioning status update service.
1. Open the SAP Cloud Platform Connector, select the subaccount, and choose Cloud To On-Premise.
2. Go to the Access Control tab and choose the plus (+) sign to add a new system mapping.
3. For Backend Type, select ABAP System and choose Next.
4. For Protocol, select HTTPS, and choose Next.
5. Enter the internal host and port information and choose Next.
You can copy this information from the services URL. Refer to the image in step 5.
○ For Internal Host: enter the root URL; do not include the protocol.
○ For Internal Port: enter the port number.
6. For Principal Type, select X.509 Certificate (General Usage) and choose Next.
7. Select the Check the Internal Host box and choose Finish.
8. Add a resource path. In the Mapping Virtual To Internal System table, select the new mapping. In the
Resources Accessible On section, choose the pencil icon to edit it.
In the URL Path field, make sure /sap/opu/odata/sap/IAG_PROVISION_STATUS_UPDATE_SRV is
entered, and save.
9. Test the configuration. In the Mapping Virtual To Internal System table, select the new mapping, and
choose the check-availability icon.
7. In SAP BTP, create a destination for the Provisioning Status Update virtual mapping.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
Governance PUBLIC 11
1. Go to Connectivity, choose Destinations and the plus sign (+) to add a destination. Add the destination.
Enter the name as IAGProvisionStatusUpdate.
2. For the URL field, copy and paste the URL from the services configuration step.
3. Save the entries.
Go to SPRO Governance, Risks and Compliance Synchronization Jobs and run the Repository Object
Sync.
Use SAP Access Control to create access requests for the target cloud applications.
5.9 User Access Review in SAP Access Control 12.0 for the
Bridge Scenario
User Access Review (UAR) in Access Control 12.0 is an automated process for periodic access review.
Some other features of the UAR include a decentralized review of user access; workflow of requests for review
and approval; automatic role removal, if needed; status and history reports to assist in monitoring the review
process; audit trail and reports for supporting internal and external audits; and support for business roles and
backend systems integrated with SAP Access Control as well as legacy systems.
Procedure
For scheduling a background job in SAP NetWeaver Business Client (NWBC), fill out the details as follows:
1. Go to Schedule Details.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
12 PUBLIC Governance
1. Select Generate data for access request UAR review.
2. Select Recurring Plan or Start Immediately.
2. In Select Variant, select the relevant Connector ID. The connector ID should belong to the Application type
IAG or IAG_GRP.
3. Once the job is finished, schedule the 2nd job Update Workflow for UAR request.
The request sent to the role owner’s or manager’s inbox depends on the UAR configurations: SPRO
Governance, Risk and Compliance Access Control Maintain Configuration Settings .
4. After the approval process is completed in SAP Access Control, the request is sent to SAP Cloud Identity
Access Governance for deprovisioning.
5. After deprovisioning, the cloud application updates the provision status, repository, audit log, and
workflow.
In the SAP Fiori launchpad for SAP Identity Access Governance, run the provisioning job to retrieve provisioning
requests from SAP Access Control and push them to the target cloud application.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Complete Integration of SAP Access Control On-Premise to SAP Cloud Identity Access
Governance PUBLIC 13
Important Disclaimers and Legal Information
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such
links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Gender-Related Language
We try not to use gender-specific word forms and formulations. As appropriate for context and readability, SAP may use masculine word forms to refer to all genders.
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
14 PUBLIC Important Disclaimers and Legal Information
IAG Bridge Cloud: SAP AC 12.0 (on-premise), SAP Cloud Identity Access Governance, and
Cloud Applications
Important Disclaimers and Legal Information PUBLIC 15
www.sap.com/contactsap
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.