Nowadays, our systems run in a hybrid system landscape with On-Premise and Cloud systems. For this reason, it makes sense to be able to centrally manage the user accounts for On-Premise as well as for Cloud systems. To centrally managed, there is the SAP Cloud Identity Provisioning Service (Identity Provisioning Service), which cooperates…(Read More)

In my earlier blog about Firefighter lifecycles (https://blogs.sap.com/2014/03/03/firefighter-id-lifecycle/), I mentioned the requirement to review Firefighter IDs on a regular basis. Over the last couple of years, this requirement has become an audit finding in most organizations. Firefighter ID management is still a challenge for most organizations…(Read More)

“Insider Tips” talks about some of the lesser known configuration options of SAP Single Sign-On. In volume #2 and upcoming blog articles, we will look at best practices for hardening your SAP Single Sign-On implementation. We will discuss challenges companies face when trying to enforce encryption for SAP GUI and RFC. We will…(Read More)

In the previous articles about the migration to S/4HANA, we talked about the changes in transactions and the difficulties that come with them. One more of a general problem is the question “Where do I start?” No matter if you just want to see what changes might have to be done to your roles…(Read More)

This article describes the differences between Online and Offline Risk Analysis in SAP Access Control (GRC) based on several SAP Notes and our implementation experience. Before you can run offline analysis at all, you have to set the configuration option “Enable Offline Risk Analysis” to YES (Parameter 1027) in the Access Control configuration settings in…(Read More)

Migration to S4HANA

Xiting offers a free S/4HANA role migration analysis tool to estimate the impact of a S/4HANA migration on your roles and authorizations. S/4HANA is the next generation of enterprise software from SAP, and it comes with an entirely new security model. With S/4HANA, SAP has decided to combine, replace or remove…(Read More)

Subscribe to our SAP Security Newsletter

Stay up to date with the latest SAP security news and receive valuable tips and tricks by subscribing to our newsletter.