Integrated User and Access
Management
The IT scenario
Integrated User and Access Management represents two recommended
implementations of the integrated user and access management. This caters to
the requirement of an organization for the storage and management of user data
and controlled access of users to data, while also reducing redundancies.
SAP's well-developed, finely-tuned authorization concept allows the precise
assignment of access authorizations (for example, with the ABAP Authorization
Roles and
Portal Roles). The
consolidation of the user and authorization data reduces complexity and
increases transparency and therefore also security. With integrated user and
access management, customers can use existing investments appropriately, for
example, by using data that already exists in an SAP system or an
LDAP-compatible directory server.
You can use the scenario Integrated User and Access Managementtogether with the other SAP NetWeaver IT scenarios. Depending on how your actual system landscape is configured, you could, for example, adjust the scenario variants described.
The IT scenario Integrated User and Access Management includes the following scenario variants:
Variant |
Description |
Integrated User and Access Management incl. third-party directory server |
Integration of user and access management using a Central User Administration, a User Management Engine, and a third-party LDAP-compatible directory server. |
Integrating User Management and Access Management |
Integration of user and access management using a Central User Administration and a User Management Engine. |
The following role-specific guides provide useful information to users of the scenario:
User Role and Task |
Guide |
Installation and upgrade |
More information: service.sap.com/instguides ® SAP NetWeaver ® Release 7.0 ® Installation or Upgrade. |
Configuration |
|
Administration |
|
Security |
|

This IT
scenario describes only two of the possibilities for setting up user and
access management for SAP systems. For more information about user and
authorization management, see
Identity
Management.