SAP Cloud Identity Authentication Service provides simple and secure access to Web-based applications with various authentication methods at any time and from anywhere.
Authentication and Single Sign-On in the Cloud
The Identity Authentication service provides secure and simple access based on the following factors:
- Identity federation based on SAML 2.0
- Web Single Sign-On SSO and desktop SSO
- Secure on-premise integration to reuse existing authentication systems
- Social login and two-factor authentication
- Risk-based authentication

The Identity Authentication service provides user and access management based on the following factors:
- User administration and integration with on-premise user stores
- User groups and application access management
- User self-service, for example, password reset, registration, and user profile maintenance
- System for Cross-domain Identity Management (SCIM) API
The Identity Authentication service provides the following enterprise features:
- Branding of end user UIs
- Password and privacy policies
The following image illustrates the architecture of SAP Identity Authentication, showing how users such as customers, partners, and employees securely access SAP Cloud solutions and third-party applications via SAML or OpenID Connect using a centralized identity provider integrated with various on-premise and corporate user directories.

Open Security Standards
The Identity Authentication service is interoperable with all application supporting SAML* 2.0 standard or OpenID Connect (OIDC).

Delegated Authentication- Identity Authentication Service as a Proxy to a Corporate Identity Provider (IdP)
The Identity Authentication service has the following IdP proxy features:
- Authentication that is delegated to corporate IdP login
- Reuse of existing SSO infrastructure
- Easy and secure authentication for employee scenarios
- Federation based on the SAML 2.0 standard

Delegated Authentication - Authentication with an On-Premise User Store
The Identity Authentication service can connect to an on-premise user store.
- Users' credentials are taken from:
- Active Directory (through LDAP)
- AS Java (which can be either local UME, ABAP store or AD)
- There is no user replication required to the cloud
- Internal network ports do not need to be exposed to the Internet
- Other Identity Authentication product features can be used, including UI configuration policies and two-factor authentication

Delegated Authentication Reuse of Windows Domain Authentication (SPNEGO)
SPNEGO authentication provides the following:
- Users authenticated with Microsoft Active Directory can utilize SSO for Cloud applications without re-authentication
- Reuse of existing corporate identity infrastructure
- Secure authentication and SSO for Cloud and on-premise Web applications

Delegated Authentication Conditional Authentication
The following image illustrates an Identity Authentication system that manages access for employees, externals, and partners using various attributes, and connects to both corporate and partner identity providers.

Depending on several factors, different types of users can be rerouted to different IDPs for authentication.

As a proxy to multiple IdPs, the Identity Authentication service provides:
- A secure business network and allows partner users to login via their corporate IdP
- Authentication that is initiated by the corporate IdP
- An optional check for correct user group assignment can be configured upon successful authentication; a sync of users from IdPs to groups in the Identity Authentication service is required
User Creation Sources
The following image illustrates various methods for provisioning users in an identity authentication system, enabling secure access to applications.











