Technology Blogs by SAP
Learn how to extend and personalize SAP applications. Follow the SAP technology blog for insights into SAP BTP, ABAP, SAP Analytics Cloud, SAP HANA, and more.
Showing results for 
Search instead for 
Did you mean: 
Product and Topic Expert
Product and Topic Expert
In this blog I will go through the steps to Integrate IAG with IAS.

SAP Cloud Identity Access Governance is a cloud-based service for creating self-service requests to applications for on-premise and cloud source applications and systems. By connecting to the SAP Cloud Identity Access Governance solution, it enables Identity Authentication users to initiate access requests, which are then provisioned to target applications.

Prerequisite: IAG Administrator, IAS & IPS administrator or knowledge in IAS & IPS is preferred to do this setup.

Make sure you completed initial setup for IAG (IAS and IPS enablement) in IAG before following the below steps.

Process Overview

There are four overall steps to enable integration between Identity Authentication Service (SAP IAS) and the SAP Cloud Identity Access Governance solution and its services:

  1. Connect Identity Provisioning with IAG

  2. Create Proxy System for IAS In the IPS

  3. Create an instance for Cloud Foundry in the IAG

  4. Run the repository synch job to sync user data and provision access requests.

1.Connect Identity Provisioning with IAG

The following step is applicable for an Identity Provisioning bundle tenant was created or updated on the SAP Cloud Identity (SCI) platform for use with SAP Cloud Identity Access Governance.

The URL for Identity Provisioning is as follows:

  1. Login to the IAS > User & Authorizations > Administrators > Add System user and provide the Access Proxy System API access. Note down the Client ID and Secret ( Once Secret is generated, you cannot retrieve or change it.)

  2. Login to the IAG BTP Subaccount and create a destination with the name IPS_PROXY as shown in the table below.

  3. Enter the Properties listed in the table below for the destination. All properties must be entered. Some properties must be added as Additional PropertiesCopy the names of all properties as displayed. Property names and values are case sensitive.

  4. Check the Use default JDK truststore checkbox.

  5. Save your entries.You can test the destination in the BTP Cockpit. However, the URL does not point to a valid API for Identity Provisioning, and shows green status, but HTTP 301 or similar.

Description IPS Destination
URL https://<<YOUR_IPS_URL_BUT_WITHOUT_THE__ips>>; (For example:
Proxy Type Internet
Authentication BasicAuthentication
Accept application/scim+json
serviceURL /ipsproxy/service/api/v1/scim/

2.Create Proxy System for IAS In the IPS

Need to create a proxy system to enable Identity authentication service to connect with the IAG Subaccount. Before creating proxy system, please set up the technical user (of type System) in Identity Authentication and assign this user the necessary authorizations.

2.1) How to create a technical user in IAS?

  • In SAP Cloud Identity Services admin console, navigate to Users & AuthorizationsAdministrators.

  • Add an administrator user of type System and configure the basic authentication method for this user.

Please note down the Client Id, Secret from the system user once it created.

2.2) Create a Proxy System

  1. Open your Identity Provisioning Launchpad.

  2. Copy the external system ID and use it to set up the Cloud Foundry instance in the Systems app.

  3. Add a proxy system for IAS and choose Save. The Type should be Identity Authentication

    Type Identity Authentication
    System Name <Free text>
    Destination Name
    Description <Free text>

  4. Enter the Properties as shown in below table




    URL= Specify the URL of the Identity Authentication tenant of your company.

              For example:


    Password=<< SECRET_FROM_STEP 2.1_ABOVE>>



3.Create an instance for IAS in the IAG

  1. Log into the SAP Cloud Identity Access Governance launchpad and open the Application app.

  2. Create a system for IAS. For System Type, select IAS.

  3. Enter the external system ID mentioned in step 2.2 in the section Create Proxy system and Save.

4.Run the repository synch job to sync user data and provision access requests.

In the SAP Cloud Identity Access Governance launchpad, open the Job Scheduler app. In the Job Category dropdown list, schedule the following jobs:

  • Repository Sync to synchronize the relevant data from Identity Authentication.

  • In the System Type dropdown list, select Identity Authentication V2.

  • In the System dropdown list, select the configured Identity Authentication V2 system.


If you are using IAG Standard edition and users are maintained in the IAS group IAG_WF_MANAGER, then they can be selected as managers in the access request.

But if a user’s manager is directly maintained in ‘Employee Information’ – ‘Manager’, then it is not automatically retrieved in the access request.

Example: The user TESTUSER has user MANAGER maintained as a manager. But MANAGERis not automatically populated in the access request in manager field.

If managers are assigned manually to users in IAS, IAS needs to be set as User Source in IAG and the repository sync job needs to be run against IAS for retrieving user information such as email address, employee's manager..Please follow the below steps to make IAS as user source

  • Maintain IAS system in IAG in System app.

  • Open the Configuration app and in Application Parameters, enter the IAS system under the Parameter Value for the UserSource.

  • Run the repository sync against IAS

  • Run the SCI User group sync


These steps complete the Integration of IAS with IAG. Please check the for SAP Cloud Identity Access Governance for more detailed document on how to integrate IAS with IAG



SAP Documentation for IAS integration with IAG

Proxy Settings for IAS

Manager from IAS not populated in Access Request

Note: Please share your feedback or thoughts in a comment below or ask questions in the Q&A tag area here about SAP Cloud Identity Access Governance.