Skip to Content


SAP offers a comprehensive portfolio of security products and services that provide you with the tools you need to protect your data - and your business.

sky diving

Putting Ethics into Practice with Your SAP Security Strategy

This new article provides guidance on how to mitigate the risks posed by artificial intelligence (AI) software by expanding your existing security standards with a clearly defined set of digital ethics. Learn about typical ethical challenges and get started developing a strategy for ethical AI in your own organization.

Read the SAPinsider article

Group of colleagues working on a project

Universal Identity and Access Management for Employees and Consumers

The article explains how three cloud-based SAP offerings — SAP Cloud Platform Identity Authentication, SAP Cloud Platform Identity Provisioning, and SAP Customer Identity — can help you manage user identities and authorizations in employee and customer-facing scenarios.

Read the SAPinsider article

solar panels

Security at SAP TechEd 2018: Replays Now Available

Missed SAP TechEd this year? Get up to speed on enterprise security in cloud, hybrid, and on-premise environments as well as trends in the security world. Listen now to some of the most popular security-related sessions via SAP TechEd Online!

Watch SAP TechEd replays

man at board

Identity Lifecycle in Hybrid Landscapes

This new guide explains how identity and access management (IAM) software from SAP supports building successful software integrations in cloud and hybrid environments and provides a seamless user experience while ensuring security and compliance.

Read the SAP CIO guide

Expert Content

cloud secure icon

Simple and Secure Cloud Access

SAP Cloud Platform Identity Authentication service is a cloud service for secure authentication and user management in SAP cloud and on-premise applications.

continuous arrows

Simple Cloud Identity Lifecycle Management

SAP Cloud Platform Identity Provisioning service helps you provision identities and their authorizations to various cloud and on-premise business applications.

user icon

Enhance the User Experience and Strengthen Security

SAP Single Sign-On gives users secure access to SAP and non-SAP applications with a single password. Enhance the user experience, strengthen cybersecurity, and streamline administration.

user access icon

Reduce Risk and Manage User Access

Embed identity management into your business processes for tighter IT security. Reduce risk and centrally manage user access across your enterprise with SAP Identity Management.

binoculars with cylinder

Cybersecurity Monitoring

Identify, analyze, and neutralize cyberattacks before they impact your organization with SAP Enterprise Threat Detection.

stack of paper icon

SAP NetWeaver Platform Security

With SAP NetWeaver Application Server, add-on for code vulnerability analysis you can easily and efficiently locate security risks in your ABAP source code.

The Read Access Logging (RAL) tool for SAP NetWeaver Application Server ABAP allows you to monitor and log read access to sensitive data.

And with the Unified Connectivity (UCON) framework you can secure Remote Function Calls (RFCs).

Latest Questions and Answers
one tcode with 3 different auth objects for 3 different set of teams with 3 different set of roles..

Hi Gurus... In ECC.. We have one custom tcode already present in production system in some roles... This tcode is used by 2 different set of team.. One team should access only one tab and able to chan...

BW security : why UNION do not work authorization issue

Hello, I need your help in other to understand one point on BW security. On SAP site, it is written that with BW 7.x it is possible to do « UNION » on authorization Objects ( page 94 on this Link: htt...

May 29th, 2019
Where used list doesn't exist in S4Hana 1809 PFCG

Hi Experts, i am suffering one issue. for S4Hana system whilst creating/editing role, for authorization tab there is no icon called Where used list button. On the other hand, in ECC system there was a...


Hi All, Can you please help me to get correct values for below query: Select SESSION_CONTEXT('XS_DEVICE') from DUMMY; I'm getting out put as below: {"Objects": [{"SESSION_CONTEXT('XS_DEVICE')": "[\"3\...

May 29th, 2019
SAP Router installation in Demilitarized Zone (DMZ)

Dear all, I would like to know best what is the best practice to be followed while installing SAPRouter. 1. Shall we install SAProuter in Demilitarized Zone (DMZ) or in the same LAN network / IP segme...

Fire fighter id assignments reduction - SE16D - Ideas \ Best practices

Dear Friends, Fire fighter id's assignments for both business and IT users has grown out of proposition with one of our clients. I am in the process of analysis. Two aspects which stand out as a major...

Latest Blogs
Enterprise VPNs Found Vulnerable

Enterprise VPNs Found Vulnerable: Is Yours One? What do you do when the measures you put in place to protect yourself online are insecure? That's just what customers of Pulse Secure Connect, Cisco Any...

June 5th, 2019
Implement instance-based access control in Spring-based SAP Cloud Platform applications

Ever thought about using instance-based authorizations? Maybe your functional authorization checks are not fitting your use case. Assume you want to protect business objects or data records and the ex...

June 4th, 2019
Applying lean start-up to help fast-track security at SAP

Over the last year, I have been busy building up a small team with the goal of delivering security ideas to SAP customers. We are small (or agile as some of you may say) with great ambition to become ...

June 4th, 2019
Is Your Payment Gateway Safe from Hackers

If you run an e-Commerce website or take any kind of payment online, you want to make certain that your payment gateway is safe from hackers. If a hacker were to find and exploit a vulnerability in th...

May 31st, 2019
Principal Propagation - Using a SAML Assertion Attribute as SAP Identifier

Principal Propagation - Using a SAML Assertion Attribute as SAP Identifier Introduction One of the most important requirement when implementing principal propagation is to ensure that we are able to m...

May 28th, 2019
And Once Again About SAP and Security

SAP is the global market leader in business software applications. Today, SAP software solutions are installed in more than 40K companies, and they are used by about 12 million users in more than 120 ...

May 24th, 2019

Back to top