This section defines the three types of systems you can use for provisioning identities: source, target, and proxy.
Source Systems
A source system is the connector used for reading entities (users, groups, or roles). Source systems can be on-premise or cloud-based, SAP or non-SAP, and usually represent the corporate user store where identities are currently maintained. Identity Provisioning reads the entities from the source system and creates or updates them in the relevant target ones. The provisioning is triggered from the Jobs tab of a source system.
You can connect one source system to one or multiple target systems.
Target Systems
A target system is the connector used for writing (provisioning) entities. Target systems are usually clouds where Identity Provisioning creates or updates the entities taken from the source system.
A target system can be connected to a single or multiple source systems.
In the case of multiple source systems, we recommend that you run the provisioning jobs successively for each system, not simultaneously. By doing this, you will avoid incorrect overwriting or merging of entity data and, therefore, failed provisioning jobs.Proxy Systems
A proxy system is a special connector used for hybrid scenarios. It exposes any Identity Provisioning supported back-end system as a SCIM 2.0 service provider, which can be consumed by any SCIM 2.0 compatible client application, without making a direct connection between them.
To achieve this, the Identity Provisioning service uses this special proxy system to execute provisioning operations (create, update, delete, and so on) requested by the client application.
The examples in this section cover the use of SAP Identity Management as a consuming client application, but you can use any other SCIM-based identity management solution.
To provide communication between SAP Identity Management and the back-end system, the proxy application uses a SCIM 2.0 protocol. A system can act as a proxy if it supports both read and write operations.
Proxy System - How It Works

- The Identity Provisioning service exposes the back end of a supported system as a "proxy".
- An external application (for example, SAP Identity Management) regards the proxy system as its back-end system.
- The entities (users) exposed by the back-end system are mapped to SCIM 2.0 entities if possible. If not possible, the SCIM standard provides a mechanism to define a new resource type with the appropriate schema. You can use the custom resource type to map the back-end entities.
- Finally, the external application can start sending REST web service requests to the proxy system in order to read identities from the back end of the SCIM 2.0 system.