2024 Sep 27 8:49 AM - edited 2024 Sep 27 9:49 AM
Hello Experts,
If I understand correctly, it is recommended to use the IAS user store as the central user management system.
I have the following question for clarification:
I have configured Azure as the Idp and the IAS as a proxy. Using the IPS, the groups from Azure are provisioned to IAS. If I, for example, delete/modify a user in IAS, that user is re-provisioned to the IAS user store during the next IPS job. Or, for example, the users were still existing as shadow users in the BTP subaccounts, even though they were deleted in Azure AD
How is central user management in IAS configured?
Is this the recommended approach?
Many Thanks
Request clarification before answering.
SAP Cloud Identity Services have emerged as the central approach for identity and access management (IAM) in SAP landscapes over the past few years. The key benefit of this strategy is the unification and simplification of user and rights management across all SAP applications. This is highlighted in the latest SAP CIO Guide on "Identity Lifecycle in SAP Landscapes," which focuses on consolidating IAM services.
Centralized User Management: Many SAP applications and sub-accounts within the SAP Business Technology Platform (BTP) currently manage their own users, resulting in unnecessary complexity and increased administrative effort. With SAP Cloud Identity Services, centralized user management is enabled, eliminating this challenge.
Reduced Effort in Deploying New Applications: New applications and functionalities in SAP BTP require that the identity directory in SAP Cloud Identity Services includes all relevant users. Centralized management through this service significantly reduces the effort needed to manage user directories, as subsequent applications no longer require separate directories. For example, activating SAP Task Center becomes much simpler without the need for extensive IAM projects.
Future-Proof and Scalable: Many new SAP applications, such as SAP Joule and upcoming features, already rely on SAP Cloud Identity Services. These services form the backbone for future expansion and integration of new features into SAP landscapes. Without using SAP Cloud Identity Services, it would be much harder to benefit from new innovations and functionalities.
Strategic Alignment: SAP's strategy focuses on centralizing identity and access management and consolidating user administration. SAP Cloud Identity Services serve as the central IAM interface, simplifying not only integration and security but also allowing for easier and more consistent cross-vendor integrations, such as with Microsoft Entra ID.
Summary: SAP Cloud Identity Services offer a centralized and future-proof framework for integrating and managing identities across the entire SAP landscape. This reduces complexity and administrative burden, while also enabling companies to take advantage of future innovations without requiring extensive adjustments to existing systems.
To fully utilize new applications and functionalities within SAP BTP, it’s essential that the identity directory in SAP Cloud Identity Services contains all relevant users. SAP's long-term strategy aims to simplify this complexity using SAP Cloud Identity Services by centralizing user and group management, enabling remote administration of the entire SAP cloud landscape through APIs. For this functionality, the identity directory must be populated with all necessary users, making it easier to manage policies via the Authorization Management Service (AMS).
It is recommended to persist user profiles in the IAS and enable identity federation. Persisting user profiles in the Identity Directory (IdDS) is also essential for authorization in SAP applications. For new applications in the SAP Business Technology Platform (BTP), the UUID or SAP global User ID plays an increasingly important role (e.g., for the BTP Task Center).
While the initial setup of SAP Cloud Identity Services may involve additional effort for the first application, it greatly reduces the workload for subsequent applications since no additional application-specific user directories are required.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi,
If you manually delete a user in IAS, the next IPS job will replicate the user to IAS. Once you configure Azure as a corporate IdP, you need to manage your users in Azure.
For the user delete scenario in Azure, you can add transformation logic to map the 'accountEnabled' flag from Azure to the 'Inactive' flag in IAS. However, the BTP shadow user will still exist.
Rrgards,
Bhagya
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
thanks
User | Count |
---|---|
33 | |
22 | |
17 | |
8 | |
7 | |
5 | |
4 | |
4 | |
4 | |
4 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.