Identity and Access Management

Single Sign-On and Multi-Factor Authentication

Single Sign-On

Secure Authentication Framework

A secure authentication infrastructure provides centralized user management, supports multi-factor and risk-based authentication, and enables single sign-on (SSO) across various devices, resources, and applications, both in the cloud and on-premises. This infrastructure ensures comprehensive security and user convenience by offering flexible authentication methods tailored to the specific security needs and access scenarios of an enterprise.

Highlights of Our Service

SAP Single Sign-On and Multi-Factor Authentication for all SAP applications
SSO as a central component of modern IT security strategies
Comprehensive support and consulting for secure authentication
Comprehensive SAP landscape coverage with SAP Cloud Identity Services and SAP Secure Login Service for SAP GUI
Considering modern security requirements and the zero-trust approach
Integration of SAP security into existing IT security concepts

Secure Authentication

What sets our service apart?

Your Challenge

Modern security strategies emphasize the need for Single Sign-On (SSO) beyond traditional network perimeters, focusing on identity and device authentication. This enables seamless integration into comprehensive IT security initiatives to ensure confidentiality, authenticity, and integrity of communication connections. Companies are increasingly aiming to utilize established central systems such as Entra ID and Intune for implementing security policies in SAP applications, thereby overcoming silo thinking.

Our Services

We offer our customers comprehensive support and consulting on secure authentication, not only through established SSO standards, but especially through multi-factor authentication, which is indispensable today. With the SAP Cloud Identity Services and the SAP Secure Login Service for SAP GUI, we cover the entire SAP landscape – from the classic SAP GUI to portals and ICF services like the Fiori Launchpad or the Business Client, extending to services of the SAP Business Technology Platform (BTP) and SAP’s SaaS products.

Our Solution

With our expertise in integrating the SAP landscape into IT security infrastructure, we meet the requirements of the Zero Trust approach and act as a link and advocate between SAP applications and your company’s IT security strategy.

After the SSO project is before the SSO project. It’s a continuous process, similar to permissions with ‘Get Clean’ and ‘Stay Clean’. A cleanup and hardening phase is crucial to ensure the success of the SSO project. Why should a regular SAP user even need a password anymore?

Do you want to book this service?

Please contact me!

Olaf Sauer

Head of Direct Sales

Tel : +49 765 6899 9002​


Related Services of Identity and Access Management

Best Practice Workshop

Our BPW focuses on IDM, BTP security, ID lifecycle, and SSO, offering practical knowledge transfer through experts. We provide best practices and expertise and document the workshop results.

Audit & Security Check​

Our Security Audit Service includes an expert analysis of your system landscape according to SAP best practices to uncover critical configurations and risks. You will receive a report with a risk analysis and concrete recommendations for action.

SAP Training

As an SAP Education Partner, Xiting offers the official training courses for SAP IDM 8.0 (ADM920) and SAP Single Sign-On 3.0 (WDESSO).

Your Contact

Carsten Olt
Head of Identity and Access Management

Use Cases

Related Use Cases of Identity and Access Management

Integration of SAP Cloud Identity Services

Extend your existing ID lifecycle processes through SAP Cloud Identity Services.

Automation of Identity Lifecycle Management

Automation of user and role management with or without common IAM solutions


Discover the comprehensive service portfolio of Xiting.


Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now