Understanding the Differences Between SAP Access Control and SAP Cloud Identity Access Governance

Objective

After completing this lesson, you will be able to understand the Differences Between SAP Access Control and SAP Cloud Identity Access Governance.

Comparison of SAP Cloud Identity Access Governance and SAP Access Control

Before describing the details of SAP Cloud Identity Access Governance, we will outline the differences between SAP Access Control and SAP Cloud Identity Access Governance.

SAP Cloud Identity Access Governance is a cloud solution running on the SAP Business Technology Platform (BTP). It is a counterpart to SAP Access Control, but it does not replace SAP Access Control. It offers similar capabilities to a broader environment (cloud) with some overlapping functions.

For example, SAP Cloud Identity Access Governance can run a risk analysis against on-premise applications (similar to SAP Access Control), and offers firefighting capabilities with the Privileged Access Management (PAM) for on-premise systems (for example, SAP ERP and SAP S/4HANA).

Additionally, SAP Cloud Identity Access Governance can connect to both cloud and on-premise applications. For the integration with on-premise application, the Cloud Connector is used. The Cloud Connector is located on the intranet (the customer network) as an on-premise agent and establishes connectivity between the SAP Business Technology Platform (internet), on which SAP Cloud Identity Access Governance is running, and the target system (intranet).

The following table shows a high-level comparison of the modules and their core functionalities.

High-Level Comparison of SAP Cloud Identity Access Governance and SAP Access Control

SAP Access ControlSAP Cloud Identity Access Governance
ModuleFunctionModuleFunction
Access risk analysis (ARA)Access analysis for on-premise systems, ruleset managementAccess analysisAccess analysis for on-premise and cloud, limitation for simulation of users and roles, ruleset management
Business role management (BRM)Role management and business rolesRole designBusiness roles for hybrid landscapes
Access request management (ARM)Fully customizable and extendable access request workflowsAccess requestPredefined set of workflows with limited configuration capabilities
Emergency access management (EAM)Firefighter for on-premise SAP systems (for example, ABAP-based systems, SAP HANA databasePrivileged access managementFirefighter for ABAP systems
User access review (UAR) and SOD risk reviewCustomizable UAR and SOD risk review workflows through ARMAccess certificationCampaigns with predefined workflow templates to review user access

Even though SAP Cloud Identity Access Governance is not officially the direct replacement for SAP Access Control, it might serve that purpose for some customers, depending on requirements. For many customers considering access governance solutions, or for those moving from a third-party to SAP, SAP Cloud Identity Access Governance might offer all that is needed. SAP Cloud Identity Access Governance is capable of covering the most relevant use cases, not only for the on-premise world but also for the cloud (including access risk analysis and access provisioning).

The user interface (UI) for SAP Cloud Identity Access Governance is SAP Fiori, which is the standard UI for SAP’s cloud services. SAP Fiori apps are also available for SAP Access Control. However, SAP Access Control still comes with the SAP NetWeaver Business Client (NWBC), which is the desired UI of most administrators. Furthermore, some of the SAP Fiori apps are still the "old" WebDynpros that we know from the NWBC. The user experience is similar in both tools when using SAP Fiori.

Which Solution for Which Use Case

With SAP Cloud Identity Access Governance and SAP Access Control, you can have three scenarios for multiple use cases. Let’s try to understand them first before we look specifically into the bridging capability.

Scenario 1: SAP Cloud Identity Access Governance Only

Diagram displaying the first scenario, SAP Cloud Identity Access Governance only.

This scenario is for customers who want an out-of-the-box solution for access governance that runs entirely in the cloud. With this approach, you will have reduced flexibility as SAP Cloud Identity Access Governance is a software as a service (SaaS) solution that only offers limited configuration capabilities. However, if you want to use standard workflows to provision users across on-premise and cloud applications, analyze cross-system access risks, perform firefighting (emergency access), as well as user access reviews, SAP Cloud Identity Access Governance can be the right solution for you.

Scenario 2: SAP Access Control Only

Diagram displaying the second scenario, SAP Access Control only.

This scenario is for customers who primarily use on-premise applications. SAP Access Control gives you total flexibility to govern access in the on-premise landscape. Its Access Request Management (ARM) workflows are fully customizable and allow for extensive enhancements. This is one of the main limitations in SAP Cloud Identity Access Governance compared to SAP Access Control.

Scenario 3: SAP Cloud Identity Access Governance and SAP Access Control – SAP Cloud Identity Access Governance Bridge

You have SAP Access Control and you would like to provision users and authorizations to cloud applications and analyze risks for cloud applications. Connecting to cloud applications is not supported directly from SAP Access Control and hence the bridge scenario is used. SAP Cloud Identity Access Governance is used as a bridge between the SAP Access Control and the cloud applications.

Diagram displaying the third scenario, SAP Cloud Identity Access Governance and SAP Access Control – IAG Bridge.

This scenario is for customers who need to govern access in a hybrid landscape (on-premise and in the cloud) and want to have one leading system for it: SAP Access Control. The bridging scenario offers the best of both worlds combined; however, you need to implement (as well as run, service and license) two applications.