Integrating IBM Security and SAP Solutions

An IBM Redbooks publication

Published 23 February 2012, updated 19 March 2012

cover image

ISBN-10: 0738436569
ISBN-13: 9780738436562
IBM Form #: SG24-8015-00
(434 pages)

More options

Rate and comment

Authors: Axel Buecker, Ivy Chiu, Kenny Chow, Ingo Dressler, Anthony Ferguson, Vaughan Harper, David Moore, Zoran Radenkovic, Guy Redding, John Robinson, Sascha Schefenacker, Franz Wolfhagen

Abstract

Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements.

In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli® Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager.

This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment.

Table of contents

Part 1. Business context and SAP solution overview
Chapter 1. Business context for SAP security integration
Chapter 2. Introduction to SAP solutions and security technology

Part 2. Identity management integration
Chapter 3. IBM Security identity management offerings
Chapter 4. IBM Tivoli Identity Manager
Chapter 5. IBM Tivoli Directory Integrator
Chapter 6. IBM Tivoli Directory Server
Chapter 7. Identity management use cases

Part 3. Access management integration
Chapter 8. IBM Security access management offerings
Chapter 9. IBM Tivoli Access Manager for Enterprise Single Sign-on
Chapter 10. IBM Tivoli Access Manager for e-business
Chapter 11. IBM Tivoli Federated Identity Manager
Chapter 12. Access management use cases

Appendix A. IBM Security systems integrations: Beyond identity and access management

Follow IBM Redbooks

Follow IBM Redbooks