Security
SAP offers a comprehensive portfolio of security products and services that provide you with the tools you need to protect your data - and your business.
In a large landscape, changing the root certificates that are the anchor of trust of TLS-protected communication requires some preparation, to ensure that everybody can communicate securely and without disruption. With the new BTP Trust Store, we want to help you avoid outages by providing information about changes in the trust anchors of SAP BTP early.
As a trusted identity management provider, SAP understands the critical role SAP Identity Management plays in many organizations. While its end-of-maintenance arrives in 2027, with extended support until 2030, SAP provides new guidance and recommendations for the future. A new collaboration between SAP and Microsoft is aimed at simplifying identity management and enhancing access governance.
With the new Authorization Management service, administrators can assign access based on policies centrally within SAP Cloud Identity Services. An access policy allows a user to perform certain actions on a resource, subject to restricting rules. These rules can be adapted by administrators so that policies fit company requirements before being assigned to users.
Check out our security recommendations for SAP BTP services, helping you to secure the configuration and operation of these services in your landscape. A new hands-on guide is now available where you will learn more about the security recommendations and how to implement them.
SAP BTP account administrators can now configure trust to multiple custom Identity Authentication tenants for login of platform users. Custom domains offer a streamlined user experience. And with the improved federation support you can dynamically assign platform authorizations based on user attributes such as groups.
On May 4, 2023, we released the SAP Secure Login Service for SAP GUI. This new solution builds on top of the tried and proven SAP Single Sign-On product and offers single sign-on in a cloud-oriented way. It allows you to rely on a lean cloud service that integrates with your existing corporate identity provider to benefit from its authentication capabilities.
Check out our one-stop-shop to find identity and access management related content relevant for SAP S/4HANA Cloud, simplifying your journey for becoming an S/4HANA Cloud IAM expert. Learn about managing authorizations and identities as well as available tools.
Get a comprehensive overview on how to enable single sign-on for SAP S/4HANA Cloud, private edition. Learn about the various authentication options available for the solution and best practices for user access via SAP GUI and Web browsers.
Cloud Identity Services
SAP Cloud Identity Services are our central solution for managing authentication, single sign-on, and the identity lifecycle. They improve system integration, provide a seamless user experience, and enhance security and compliance.
Hybrid Identity and Access Management
When it comes to securing on-premise landscapes, most companies have invested in proven SAP software to ensure the protection of their data and business processes. Today, most companies are running a hybrid model – a combination of cloud and on-premise systems. SAP provides options for bringing cloud-based security solutions together with existing on-premise security solutions.
Secure Development Services
SAP offers secure development services that enable developers to design secure business applications for the cloud. By reusing security services, you can develop secure and compliant applications without re-inventing the wheel. Developers need a platform which is ready for enterprise-grade business applications, and SAP Business Technology Platform (SAP BTP) can help you with this challenge.
Risk and Compliance
SAP offers cloud-based security services in the area of risk and compliance, comprising topics such as segregation of duties, access certification, and business role management or the compliant collection of consumer data.
Insight
By moving solutions into the cloud, security insight and control are getting more and more important to companies. Questions that arise about such topics are: which certifications are necessary, where the current operating status can be seen, where the data is located, and what critical data movements have taken place?