SAP Cloud Identity Access Governance can be used as a bridge to enable access requests for cloud applications in SAP Access Control and to enable risk analysis for cloud applications in SAP Access Control.

The architecture shows all of the components / systems involved for the integration between SAP Cloud Identity Access Governance and SAP Access Control. This integration setup is called IAG Bridge, and it unifies a landscape between the on-premise and cloud environment.
The IAG Bridge between SAP Access Control and SAP Cloud Identity Access Governance enables SAP Access Control to facilitate the creation of access requests, and performing risk analysis, for cloud applications.
For example, if you are going to use SAP Access Control system to create access requests for your cloud application, the risk analysis, assignment of mitigation controls (if needed), and provisioning can be handled by SAP Cloud Identity Access Governance.
In this scenario, we have a hybrid setup containing on-premise installed and cloud-installed systems/components:
On-premise installed components:
Cloud Connector: Cloud Connector serves as a link between SAP BTP applications (here, SAP Cloud Identity Access Governance) and on-premise systems. Cloud Connector establishes a connection to SAP Access Control system (called Cloud to On-Premise).
Note
The following is further information regarding the Cloud Connector:
- Combines an easy setup with a clear configuration of the systems that are exposed to the SAP BTP
- Runs as an on-premise agent in a secured network
- Acts as a reverse invoke proxy between the on-premise network and SAP BTP
SAP Access Control: SAP Cloud Identity Access Governance connects to SAP Access Control through the Cloud Connector. This connection enables a communication channel of SAP Cloud Identity Access Governance downwards to the SAP Access Control. This is possible because the Cloud Connector acts as a reverse invoke proxy. The other way around it is, however, not needed because the connection from the on-premise system to the cloud application is not considered as dangerous. Therefore, we can use some direct connections from SAP Access Control to SAP Cloud Identity Access Governance.
Note
To connect SAP Cloud Identity Access Governance with SAP Access Control through the Cloud Connector, you will need two cloud-to-on-premise connection setups: one of type RFC and a second one of type HTTP.
SAP Access Control system connects to SAP Cloud Identity Access Governance directly. Two following RFC connections are necessary for the communication upwards from SAP Access Control to SAP Cloud Identity Access Governance (see the Architecture Overview figure).
- IAG_SOD_AUTH: This connection is needed for authentication so that SAP Access Control is capable of logging on.
- IAG_SOD_CHECK: This connection is needed so that SAP Access Control can communicate with the SAP Cloud Identity Access Governance "iagtrigger" service primarily for the risk analysis.
Note
Both are RFC connections (type: G - HTTP Connections to External Server), which are maintained in SAP Access Control in transaction SM59.
Cloud components:
SAP Cloud Identity Access Governance is running on SAP Business Technology Platform, Cloud Foundry environment and connects to SAP Access Control system. In case, you have to connect specific on-premise target systems, which in turn are connected to SAP Access Control, you have to set up the destinations within the SAP Cloud Identity Access Governance subaccount as well. The same has to be performed in case you have to connect specific cloud target systems.
If you want to connect cloud target systems in this overall scenario, keep in mind that you have to create an SM59 destination for these cloud target systems (type: G - HTTP Connections to External Server) in SAP Access Control.
More information regarding the setup of cloud target systems on SAP Access Control can be found on the SAP Help Portal: https://help.sap.com/docs/SAP_CLOUD_IDENTITY_ACCESS_GOVERNANCE/5c19369f0b924946abc80242ffaa2f27/28eff9bacfed40ba874dd90991871567.html?locale=en-US - see section 3. Create the third destination (create one for each cloud application).
IAS and IPS: Identity Authentication and Identity Provisioning are bundled in the "SAP Cloud Identity Services" (CIS) running on SAP BTP Cloud Foundry.
Identity Authentication is responsible for authentication (acts as central authentication component) on SAP BTP / cloud systems, thus, it is also required for SAP Cloud Identity Access Governance and the respective SAP Cloud Identity Access Governance user authentication.
- Identity Provisioning acts as proxy (see "IPS_PROXY") for several cloud systems and connects such systems with SAP Cloud Identity Access Governance. Therefore, it is mainly used for user provisioning.
Note
Identity Provisioning is not mandatory and is not used in this integration scenario.



























