To perform tasks on SAP BTP, platform users and business users need to be authorized accordingly. Across SAP BTP there are many predefined authorizations that are ready for immediate assignment to users. Usually there are at least roles that provide full access and others which provide read-only access (such as for auditors).
Apart from few exceptions, you also have the option to customize authorizations: You can group predefined authorizations into higher level roles. This helps authorize many users in a simple and consistent way, while also considering segregation of duties.
In some cases, there is an additional level of customizing: You can even restrict functional authorizations to certain subsets of your data. For example, a user might be allowed to view orders of all customers around the world but only manage orders for a certain market/region. Such restrictions are also called "instance-based authorizations".
Authorization models for platform users
- Account members (Global Account, Directory, Subaccount)
- You assign users to predefined and custom role collections to grant them authorizations. Role collections group roles from one or several services that are available in the same account context. All authorizations as well as user assignments are specific to the individual account context, such as a specific Subaccount. They are not available in other contexts, such as the corresponding global account, or other Subaccounts. Roles are predefined by application/service providers and are the finest granularity that administrators can work with. Administrators can group roles into custom role collections. For account members, there are only functional authorizations and no option for instance restrictions. This model is based on the Authorization and Trust Management service of SAP BTP which is also used for business users.
- Members of Cloud Foundry organizations and spaces
- For members of Cloud Foundry this approach differs: You assign users to predefined roles. Some apply to organizations, others apply to spaces. There is no option and need to customize the predefined authorizations. Role assignments are specific to an individual user and organization or space.
- Members of Kyma systems:
- For members of Kyma environment, you assign users to predefined and custom roles. You have fine-granular control on the individual authorizations in a role. They either apply to the complete system or individual namespaces.
- Members of ABAP Environment
There is no separation between platform and business users in the ABAP environment. In SAP BTP ABAP Environment, you will use the business users and business roles from ABAP's own Identity Access Management, which has a lot in common with the Identity Access Management in SAP S/4HANA Cloud Public Edition.
Authorization models for business users

Authorizations of applications are only available after the application has been subscribed (SaaS application) or deployed (custom application) to the Subaccount. Respectively, authorizations for reuse services are only available after at least one instance of the service has been created in the Subaccount. We can differentiate two different authorization models for the business users:
- Traditional model: Authorization and Trust Management service
- Most of the existing applications and services apply to the traditional model using the Authorization and Trust Management service to grant authorizations to users. This is the same model as used for account members. Applications and services include predefined roles and usually also predefined role collections. Some applications support instance-based authorizations for certain criteria (e.g. markets). They provide role templates which define possible restrictions. You can create custom roles based on them, specifying restrictions as needed. You can group roles across all applications and services in a Subaccount into custom role collections.
- New model: SAP Cloud Identity services – Authorization Management (AMS)
- The new strategic model going forward is using the Authorization Management service. It is natively integrated into SAP Cloud Identity services and has much more powerful capabilities for instance-based authorizations. Some first SaaS applications use it already, such as SAP Ariba Buying and SAP Green Ledger. You can also use it for your custom applications running on SAP BTP. The applications include predefined authorization policies that are available for immediate user assignments. Some applications support instance-based authorizations for certain criteria. They provide base policies which define possible restrictions. You create custom policies ("admin policies") based on them, specifying restrictions as needed.
Note
Currently, you assign policies to users and design custom policies directly in the Identity Directory of SAP Cloud Identity services and not using SAP BTP specific tools like SAP BTP cockpit. Assignment of policies to users requires user profiles to exist in the Identity Directory of SAP Cloud Identity services. You can still delegate user authentication to a corporate identity provider. Going forward, more and more scenarios across the SAP portfolio rely on the Identity Directory as central store for user profiles and as location to assign all kinds of authorizations to users.
